id
int64 | text
string | metadata
dict | line_start_n_end_idx
dict | quality_signals
dict | eai_taxonomy
dict | pid
string |
---|---|---|---|---|---|---|
8,837,294,235,834,300,000 |
Banach spaces, function spaces, real functions, integral transforms, theory of distributions, measure theory.
learn more… | top users | synonyms (1)
4
votes
1answer
123 views
Can one show that the dual of a quasi-Banach space separates points without explicitly identifying the dual?
I'm interested in a question regarding the identification of some duals of quasi-Banach spaces. However, I'm not familiar with the quasi-Banach literature, so I'm hoping somebody can point me in the ...
0
votes
1answer
146 views
$Ax=b$ in a function space
Let $X$ be compact Hausdorff topological space, $C(X)$ denote the algebra of complex-valued continuous functions on $X$, $b\in \mathbb{C}^m$, $\mathbf{A}\in C(X)^{m\times n}$, for all $x\in X$, ...
2
votes
1answer
100 views
Question regarding to approximate continuity
Given $u\in BV(R^N)$, we say $u$ is approximate continuous at $x$ and the approximation limit is $l\in R$ if $$ \lim_{r\to 0}\frac{\mathcal{L}^N(B(x,r)\cap \{|u-l|>\epsilon\})}{r^N} =0 $$ for all ...
5
votes
2answers
136 views
Compactly supported functions and Sobolev spaces on manifolds
It is well-known that if a complete Riemannian manifold has bounded curvature and injectivity radius bounded away from zero, then the space $C^\infty_c(M)$ is dense in the Sobolev spaces $W^{k, p}(M)$ ...
0
votes
0answers
70 views
Inverse problem to solve out current in the radiation problem
This is the radiation problem, but more like a analysis one. Suppose the current $f(x)\in L^2(\mathbb{R})$ has a compact support in $[-a,a]$. And the frequency $F(\theta)$ is given by ...
1
vote
0answers
156 views
Separability of the space $C(C[0, 1], \mathbb{R})$
Let $E=C([0, 1])$ be the space of all real-valued continuous functions on $[0, 1]$, equipped with the uniform norm. $C(E)$ stand for the continuous real-valued functions on $E$. I am wondering that ...
10
votes
2answers
463 views
Banach space modulo a one-dimensional subspace =?
My question is the following: Given an infinite dimensional Banach space $E$ and a one-dimensional linear subspace $F\subset E$. It is well-known that this one-dimensional linear subspace is closed ...
0
votes
1answer
117 views
Equivalence of two definitions of Sobolev spaces
Good morning, I am looking for a reference about the following fact that seems to be folklore. Define the Sobolev (Beppo Levi?) space $$ D^{1,p}(\mathbb{R}^N) = \left\{ u \in L^{p^*}(\mathbb{R}^N) ...
0
votes
0answers
62 views
faithful action of Hecke algebra
Let $G$ be a connected reductive group split over a number field $F$, $\mathbb{A}$ the adeles. Let $v$ be a finite place and $\mathcal{H}_{v}$ the spherical hecke algebra at palce $v$. ...
3
votes
2answers
106 views
Reconstructing density from integrals along specific manifolds
Let $\Phi_t : \mathbb R^n \to \mathbb R^n$ be the time-$t$-map associated to an ODE $\dot{x}=F(x)$ and let $H: \mathbb R^n \to \mathbb R$. Let $F$ and $H$ be sufficiently smooth (e.g. $C^k$ or ...
7
votes
1answer
236 views
Bounded operator on a normed space with empty spectrum
A bounded operator acting on a complex Banach space has non-empty spectrum, and the proof of this fact uses the completeness of the space. Is there any example of bounded operator acting on a ...
0
votes
0answers
78 views
Defining density of a random function using Radon-Nikodym Theorem
Let $(\Omega,\mathbb{F},P)$ be a probability space and $E$ be an infinite dimensional Banach space and $\mathbb{B}$ be the $\sigma$-algebra of Borel subset of $E$. Let $X$ be random function defined ...
1
vote
0answers
93 views
Lebesgue point and regularity of functions
A known theorem says that for $f \in L_{loc}^1(\mathbb{R}^d)$, almost every point is a Lebesgue point. I know too a theorem saying that for $f \in W_{loc}^{1,p}(\mathbb{R}^d)$ , every point is a ...
5
votes
1answer
131 views
Reflexive subspaces of non-separable abstract $L_1$ spaces
An abstract $L_1$ space is a Banach lattice $E$ such that $\|x+y\|=\|x\|+\|y\|$ for disjoint $x,y\in E$. The space $L_1[0,1]$ is a separable example that contains subspaces isomorphic to $L_p[0,1]$ ...
0
votes
0answers
114 views
Notion of solution of pde
Let's consider the following Schrodinger equation $$iu_t+\Delta u+F(u)=0$$ in $\mathbb{R}^n$. In Cazenave's book, "Semilinear Schrodinger equation", he defines $H^1$-weak solution as $u\in ...
17
votes
0answers
245 views
Large almost equilateral sets in finite-dimensional Banach spaces
Question: Does there exist a function $C:~(0,1)\to (0,\infty)$ such that for each $\varepsilon\in(0,1)$ every Banach space $X$ of dimension $\ge C(\varepsilon)\log n$ contains an $n$-point set ...
0
votes
0answers
31 views
proving that a complicated function is concave or strongly uni-modal
I am trying to prove the concave property for a complicated function during my research project (imperfect maintenance modelling for starter) which has the following form: $\eta(t)= \alpha \beta ...
3
votes
1answer
71 views
Example of joint cyclic and separating vector
Let $\mathcal{H}$ be a separate Hilbert space and $\mathcal{B}(\mathcal{H}) \subset \mathcal{B}(\mathcal{H}) \otimes M_2(C)$ be a W$^*$-inclusion pairs. It is known that this pair share a joint cyclic ...
3
votes
0answers
43 views
Behaviour of Markov type under uniform homeomorphism of spheres
A metric space $(X,d_X)$ has Markov type $p$ (with $p \in [1,2]$), if, for every stationary Markov chain $\{Z_n\}_{n=0}^\infty$ on $Y$ (a finite space) and every mapping $f:Y \to X$, one has $$ ...
0
votes
1answer
194 views
Continuity of a Functional
A certain functional $T$ is defined as: $$T(F)=\int_{(0,1)}F^{-1}(s)M(ds)$$ where $M$ is a probability measure with support $[\alpha,1-\alpha]$,for $\alpha>0$. The result that above functional is ...
3
votes
0answers
88 views
Strong solution to $u_t - \Delta_p u = f$
For $p > 1$, consider the equation $$\langle u_t, v \rangle + \int_\Omega |\nabla u|^{p-2}\nabla u \nabla v = \langle f, v \rangle$$ $$u(0) = u_0$$ $$u|_{\partial\Omega} =0$$ for all $v \in ...
1
vote
0answers
42 views
decomposition of tempered distributions by entire analytic functions
Let $\phi$ be a $C^{\infty}$ function on $\mathbb R^{n}$ with $$ \operatorname{supp} \phi \subset \{\xi \in \mathbb R^{n}: |\xi|\leq 2, \phi(\xi)=1~~\text{if}~|\xi|\leq 1\}$$ Let $j\in \mathbb N$ ...
0
votes
0answers
36 views
Bound on change of function given bound on Hessian
Suppose I have very some smooth function $F(x)$, and let $x_0 = \text{argmin}_x F(x)$. I would like to bound $F(x) - F(x_0)$ from above, in terms of the gradient $\nabla f(x)$ and the Hessian matrix ...
8
votes
3answers
292 views
Reference for a strong intermediate value theorem for measures
Let $\mu$ be a finite nonatomic measure on a measurable space $(X,\Sigma)$, and for simplicity assume that $\mu(X) = 1$. There is a well-known "intermediate value theorem" of Sierpiński that states ...
3
votes
4answers
296 views
Continuity in Banach space for non-linear maps
I want to find an example of a Banach space $X$ and a continuous map $f:X\rightarrow X$ such that $f$ is not bounded on the unit ball. I do not doubt that such an example exists, but I cannot make it ...
3
votes
0answers
127 views
Donsker's Theorem for triangular arrays
I should mention that I already posed this question on Math Stack Exchange, but didn't receive much feedback. Assume we have a sequence of smooth i.i.d. random variables $(X_i)_{i=1}^{\infty}$. Given ...
7
votes
0answers
267 views
Proving that a space is Hilbert
Let $H=H_0^1(0,\ell)\times H_*^1(0,\ell)\times H_*^1(0,\ell)$ be equipped with the norms \begin{align*} ...
0
votes
0answers
102 views
A question about the duality principle
Suppose $X$ and $Y$ are finite sets and $K:X\times Y\to \mathbb R$ is some function. We get an integral transform from the space of real functions on $X$ to real functions on $Y$ given by ...
2
votes
0answers
89 views
What's the idea behind various equivalent norms on Besov spaces $B^{s}_{p,q}$?
I am trying to understand Besov spaces; and I am eager to see why the various norms are equivalent on it. Let $\phi$ be a $C^{\infty}$ function on $\mathbb R^{n}$ with $ \operatorname{supp} \phi ...
2
votes
1answer
112 views
Necessary conditions for optimality in Banach spaces
Let $X$ denote the non-negative "orthant" of the Banach space $L^2$ (or whatever you call the set of functions in $L^2$ that are non-negative), and let $C$ be a closed, convex subset of $X$. Let $f$ ...
4
votes
1answer
202 views
C*-Algebras: Dynamics vs. Derivations
Problem Given a C*-algebra $\mathcal{A}$. Consider dynamics $\tau:\mathbb{R}\to\mathrm{Aut}(\mathcal{A})$ and $\tau':\mathbb{R}\to\mathrm{Aut}(\mathcal{A})$. (More precisely, strongly continuous ...
1
vote
1answer
159 views
On the Hölder regularity of an integral function
Let $n\geq 3$. Let $\Omega$ be an open and bounded subset of $\mathbb{R}^n$. Let define $X_0$ as the space of functions $f:\bar\Omega\times\partial\Omega\to\mathbb{R}$ such that $f(x,\cdot)$ is ...
0
votes
1answer
251 views
About an integral equation
I would like to obtain $g$ by solving the following integral equation $$ \int_s^T R(u) dg(u) + f(s,T)\int_s^T g(u)du =0$$ where $f,R:\mathbb R _+ ^*\rightarrow \mathbb R _+ $and $g: \mathbb R _+ ...
4
votes
1answer
207 views
Isomorphisms between spaces of test functions and sequence spaces
I am in the process of writing some self-contained notes on probability theory in spaces of distributions, for the purposes of statistical mechanics and quantum field theory. Perhaps the simplest ...
2
votes
1answer
241 views
Sobolev Space, “characteristic function” for the weak derivative
Let $\Omega$ be an open bounded subset of $\mathbb{R}^N$, working in the space $H_0^1(\Omega)$ with the inner product $$(u,v)_{H_0^1} = \int_\Omega \nabla u \cdot \nabla v$$ for $u\in H_0^1$ and ...
4
votes
2answers
610 views
What does analyticity imply in complex analysis? [closed]
In complex analysis, we're constantly faced with problems about the analyticity of a function, on which many theorems are developed. I of course know a bunch of formulas and theorems, but could not ...
9
votes
1answer
382 views
Between compact and locally uniform: What is the name of this convergence?
Let $X$ be a topological space, $(Y,d)$ a metric space, $f\in Y^X$, and $(f_n)$ a sequence in $Y^X$ with the following property: For every $x_0\in X$ and every $\varepsilon>0$, there exist a ...
1
vote
2answers
285 views
How to prove that a kernel is positive definite?
For example, how to prove $\forall(x,y)\in R^N\times R^N,K(x,y) = \displaystyle\frac{1}{1+\frac{||x - y||^2}{{\sigma}^2}}\\$ where $\sigma > 0$ is a parameter, is positive definite? I have tried to ...
2
votes
1answer
224 views
Extensions in parabolic Hölder spaces
Let $\alpha\in ]0,1[,k\in\mathbb{N}.$Let $\Omega$ be a open and bounded subset or $\mathbb{R}^n$ of class $C^{k+\alpha}$. As one could find in G.M. Troianello "Elliptic Differential Equations and ...
4
votes
1answer
298 views
When is a `1-form' with continuous coefficients exact?
Let $\Omega$ be a convex, bounded open subset of $\mathbb{R}^d$, and let $C^1(\bar \Omega)$ be usual space of continuous functions on $\bar \Omega$ which are $C^1$ in $\Omega$ and whose partials in ...
0
votes
1answer
157 views
Orthogonal projection
Let $G$ be an operator with compact resolvent on a Hilbert space $H$ such that $\ker G \neq \{0\}$. Further let $P$ be the orthogonal projection onto $\ker G$, and let $G_{0} := G+P$. My question is: ...
7
votes
7answers
601 views
What is the best reference for Spectral theory?
I'm studying Bernard Aupetit: A Primer on Spectral Theory but the textbook we are using is a little bit heavy going for me. Is there a best book to learn about these things? Thank you.
0
votes
0answers
51 views
A question related to the Nikolskii fractional spaces
Consider a Nikolskii space, that is $$ N^{s,p}=\{f\in L^{p}(I, d\ell): \|f\|_{\overline{N}^{s,p}}=\underset{h>0}{\sup}h^{-s}\|\tau_{h}f-f\|_{L^{p}(I_{h})}<\infty \}, $$ where ...
6
votes
0answers
145 views
Is an infinite-dimensional “Lebesgue measure” uniquely determined by a set of positive finite measure?
Let $\mu$ be a probability measure on a subset $C \subset \mathbb{R}^\infty$ of the space of sequences, and assume, for simplicity, that $C$ is closed and convex. We say that $\mu$ admits shifts if ...
2
votes
0answers
88 views
continuity with respect to weak-${\ast}$ topology
Let $V:=V([0,1],R)$ be the space of all cadlag functions defined on $[0,1]$ of bounded variation. Thus any element $v\in V$ determines a signed measure $\nu$ on $[0, 1]$ given by the formula $\nu([0, ...
-4
votes
2answers
99 views
Does the Laplacian commutes with the indicator function [closed]
We define the laplacian operator $\Delta$ with the Neumann boundary conditions on the space $H^2(\Omega)$, where $\Omega$ is an open set of $\mathbb{R}^n$ with a smooth boundary $\partial\Omega$, and ...
3
votes
1answer
110 views
A question about Skorokhod metric
I have a question related to the Skorokhod distance. Let $\Omega:=D([0,1],R)$ be the space of cadlag functions $x$ defined on $[0,1]$. Let $\Lambda$ be the collection of non-decreasing continuous ...
1
vote
1answer
176 views
Smooth curves in a Frechet space
Is the space $C^{\infty}([0,1];C^{\infty}(S^1))$ equal with the space $C^{\infty}([0,1]\times S^1)$ ? I am interested in characterizing the smooth curves in the space $C^{\infty}(S^1)$ where $S^1$ is ...
3
votes
1answer
77 views
Skorokhod distance between $\omega, \omega\circ f_{\varepsilon}$ and $\omega, \omega\circ b_{\varepsilon}$
Let $\Omega:=D([0,1],R)$ be the space of cadlag functions $x$ defined on $[0,1]$. Let $\rho$ be the Skorokhod metric on $\Omega$, see e.g. http://en.wikipedia.org/wiki/C%C3%A0dl%C3%A0g Now define ...
3
votes
1answer
145 views
A nilpotency question on $C^{*}$ algebras
What is an example of a $C^{*}$ algebra $A$ with the property that: for every nilpotent(Quasi nilpotent) $a$ and for every $n\in \mathbb{N}$, there is a $b$ with $b^{n}=a$. To what extent ...
|
{
"url": "http://mathoverflow.net/questions/tagged/fa.functional-analysis?page=2&sort=newest&pagesize=15",
"source_domain": "mathoverflow.net",
"snapshot_id": "crawl=CC-MAIN-2014-52",
"warc_metadata": {
"Content-Length": "165094",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:U7X4GCZSERRXNNBFW7GJM5P2HL537VCH",
"WARC-Concurrent-To": "<urn:uuid:8d2591aa-53a2-404d-8555-8c9aa19e2cbf>",
"WARC-Date": "2014-12-29T13:53:17Z",
"WARC-IP-Address": "198.252.206.148",
"WARC-Identified-Payload-Type": null,
"WARC-Payload-Digest": "sha1:UCX5ZCOJZXGYQSDOS3LKEIKUABPH7S5S",
"WARC-Record-ID": "<urn:uuid:7662c0d8-b2f8-4f3f-a74f-cdcda71a94a3>",
"WARC-Target-URI": "http://mathoverflow.net/questions/tagged/fa.functional-analysis?page=2&sort=newest&pagesize=15",
"WARC-Truncated": null,
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:2001a394-d2a9-404b-a92d-0c429bfe8dd2>"
},
"warc_info": "robots: classic\r\nhostname: ip-10-231-17-201.ec2.internal\r\nsoftware: Nutch 1.6 (CC)/CC WarcExport 1.0\r\nisPartOf: CC-MAIN-2014-52\r\noperator: CommonCrawl Admin\r\ndescription: Wide crawl of the web with URLs provided by Blekko for December 2014\r\npublisher: CommonCrawl\r\nformat: WARC File Format 1.0\r\nconformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf"
}
|
{
"line_start_idx": [
0,
110,
111,
150,
151,
153,
159,
167,
177,
178,
287,
288,
491,
493,
499,
507,
517,
518,
545,
546,
744,
746,
752,
760,
770,
771,
816,
817,
1017,
1019,
1025,
1034,
1044,
1045,
1107,
1108,
1313,
1315,
1321,
1330,
1339,
1340,
1402,
1403,
1591,
1593,
1598,
1607,
1617,
1618,
1669,
1670,
1872,
1875,
1881,
1890,
1900,
1901,
1951,
1952,
2154,
2156,
2162,
2170,
2180,
2181,
2230,
2231,
2432,
2434,
2440,
2449,
2458,
2459,
2492,
2493,
2682,
2684,
2690,
2699,
2709,
2710,
2773,
2774,
2971,
2973,
2979,
2987,
2997,
2998,
3053,
3054,
3250,
3252,
3258,
3267,
3276,
3277,
3343,
3344,
3547,
3549,
3554,
3563,
3572,
3573,
3616,
3617,
3816,
3818,
3824,
3832,
3842,
3843,
3902,
3903,
4105,
4107,
4113,
4122,
4132,
4133,
4159,
4160,
4353,
4356,
4362,
4371,
4381,
4382,
4448,
4449,
4646,
4648,
4654,
4663,
4672,
4673,
4742,
4743,
4942,
4944,
4950,
4958,
4967,
4968,
5014,
5015,
5220,
5222,
5228,
5237,
5246,
5247,
5311,
5312,
5510,
5512,
5518,
5526,
5536,
5537,
5564,
5565,
5765,
5767,
5773,
5782,
5791,
5792,
5834,
5835,
6029,
6031,
6036,
6045,
6054,
6055,
6124,
6125,
6325,
6327,
6333,
6342,
6351,
6352,
6403,
6404,
6607,
6609,
6615,
6624,
6634,
6635,
6698,
6699,
6901,
6903,
6909,
6918,
6928,
6929,
6976,
6977,
7181,
7183,
7189,
7198,
7208,
7209,
7249,
7250,
7454,
7456,
7462,
7471,
7481,
7482,
7514,
7515,
7623,
7625,
7631,
7640,
7650,
7651,
7690,
7691,
7883,
7885,
7891,
7900,
7909,
7910,
7989,
7990,
8189,
8191,
8197,
8205,
8215,
8216,
8269,
8270,
8473,
8475,
8481,
8489,
8499,
8500,
8538,
8539,
8738,
8740,
8745,
8753,
8763,
8764,
8813,
8814,
9012,
9014,
9020,
9028,
9038,
9039,
9066,
9067,
9266,
9268,
9274,
9282,
9292,
9293,
9359,
9360,
9560,
9562,
9568,
9576,
9586,
9587,
9652,
9653,
9852,
9854,
9860,
9869,
9879,
9880,
9938,
9939,
10141,
10143,
10149,
10157,
10167,
10168,
10243,
10244,
10439,
10441,
10446,
10455,
10465,
10466,
10515,
10516,
10718,
10720,
10726,
10734,
10744,
10745,
10783,
10784,
10984,
10986,
10992,
11000,
11010,
11011,
11066,
11067,
11269,
11271,
11277,
11285,
11295,
11296,
11318,
11319,
11523,
11525,
11531,
11540,
11550,
11551,
11599,
11600,
11785,
11787,
11793,
11802,
11811,
11812,
11866,
11867,
12046,
12048,
12054,
12063,
12073,
12074,
12177,
12178,
12380,
12382,
12388,
12397,
12406,
12407,
12457,
12458,
12662,
12665,
12671,
12680,
12689,
12690,
12755,
12756,
12960,
12962,
12968,
12976,
12986,
12987,
13021,
13022,
13222,
13224,
13229,
13237,
13247,
13248,
13281,
13282,
13486,
13488,
13494,
13502,
13511,
13512,
13619,
13620,
13820,
13822,
13828,
13836,
13846,
13847,
13889,
13890
],
"line_end_idx": [
110,
111,
150,
151,
153,
159,
167,
177,
178,
287,
288,
491,
493,
499,
507,
517,
518,
545,
546,
744,
746,
752,
760,
770,
771,
816,
817,
1017,
1019,
1025,
1034,
1044,
1045,
1107,
1108,
1313,
1315,
1321,
1330,
1339,
1340,
1402,
1403,
1591,
1593,
1598,
1607,
1617,
1618,
1669,
1670,
1872,
1875,
1881,
1890,
1900,
1901,
1951,
1952,
2154,
2156,
2162,
2170,
2180,
2181,
2230,
2231,
2432,
2434,
2440,
2449,
2458,
2459,
2492,
2493,
2682,
2684,
2690,
2699,
2709,
2710,
2773,
2774,
2971,
2973,
2979,
2987,
2997,
2998,
3053,
3054,
3250,
3252,
3258,
3267,
3276,
3277,
3343,
3344,
3547,
3549,
3554,
3563,
3572,
3573,
3616,
3617,
3816,
3818,
3824,
3832,
3842,
3843,
3902,
3903,
4105,
4107,
4113,
4122,
4132,
4133,
4159,
4160,
4353,
4356,
4362,
4371,
4381,
4382,
4448,
4449,
4646,
4648,
4654,
4663,
4672,
4673,
4742,
4743,
4942,
4944,
4950,
4958,
4967,
4968,
5014,
5015,
5220,
5222,
5228,
5237,
5246,
5247,
5311,
5312,
5510,
5512,
5518,
5526,
5536,
5537,
5564,
5565,
5765,
5767,
5773,
5782,
5791,
5792,
5834,
5835,
6029,
6031,
6036,
6045,
6054,
6055,
6124,
6125,
6325,
6327,
6333,
6342,
6351,
6352,
6403,
6404,
6607,
6609,
6615,
6624,
6634,
6635,
6698,
6699,
6901,
6903,
6909,
6918,
6928,
6929,
6976,
6977,
7181,
7183,
7189,
7198,
7208,
7209,
7249,
7250,
7454,
7456,
7462,
7471,
7481,
7482,
7514,
7515,
7623,
7625,
7631,
7640,
7650,
7651,
7690,
7691,
7883,
7885,
7891,
7900,
7909,
7910,
7989,
7990,
8189,
8191,
8197,
8205,
8215,
8216,
8269,
8270,
8473,
8475,
8481,
8489,
8499,
8500,
8538,
8539,
8738,
8740,
8745,
8753,
8763,
8764,
8813,
8814,
9012,
9014,
9020,
9028,
9038,
9039,
9066,
9067,
9266,
9268,
9274,
9282,
9292,
9293,
9359,
9360,
9560,
9562,
9568,
9576,
9586,
9587,
9652,
9653,
9852,
9854,
9860,
9869,
9879,
9880,
9938,
9939,
10141,
10143,
10149,
10157,
10167,
10168,
10243,
10244,
10439,
10441,
10446,
10455,
10465,
10466,
10515,
10516,
10718,
10720,
10726,
10734,
10744,
10745,
10783,
10784,
10984,
10986,
10992,
11000,
11010,
11011,
11066,
11067,
11269,
11271,
11277,
11285,
11295,
11296,
11318,
11319,
11523,
11525,
11531,
11540,
11550,
11551,
11599,
11600,
11785,
11787,
11793,
11802,
11811,
11812,
11866,
11867,
12046,
12048,
12054,
12063,
12073,
12074,
12177,
12178,
12380,
12382,
12388,
12397,
12406,
12407,
12457,
12458,
12662,
12665,
12671,
12680,
12689,
12690,
12755,
12756,
12960,
12962,
12968,
12976,
12986,
12987,
13021,
13022,
13222,
13224,
13229,
13237,
13247,
13248,
13281,
13282,
13486,
13488,
13494,
13502,
13511,
13512,
13619,
13620,
13820,
13822,
13828,
13836,
13846,
13847,
13889,
13890,
14081
]
}
|
{
"red_pajama_v2": {
"ccnet_original_length": 14081,
"ccnet_original_nlines": 403,
"rps_doc_curly_bracket": 0.014416590332984924,
"rps_doc_ldnoobw_words": 0,
"rps_doc_lorem_ipsum": 0,
"rps_doc_stop_word_fraction": 0.2556203305721283,
"rps_doc_ut1_blacklist": 0,
"rps_doc_frac_all_caps_words": 0.06772133708000183,
"rps_doc_frac_lines_end_with_ellipsis": 0.12128712981939316,
"rps_doc_frac_no_alph_words": 0.3594227135181427,
"rps_doc_frac_unique_words": 0.34899330139160156,
"rps_doc_mean_word_length": 4.840364456176758,
"rps_doc_num_sentences": 117,
"rps_doc_symbol_to_word_ratio": 0.013877320103347301,
"rps_doc_unigram_entropy": 5.671164512634277,
"rps_doc_word_count": 2086,
"rps_doc_frac_chars_dupe_10grams": 0.021788649260997772,
"rps_doc_frac_chars_dupe_5grams": 0.04318113997578621,
"rps_doc_frac_chars_dupe_6grams": 0.021788649260997772,
"rps_doc_frac_chars_dupe_7grams": 0.021788649260997772,
"rps_doc_frac_chars_dupe_8grams": 0.021788649260997772,
"rps_doc_frac_chars_dupe_9grams": 0.021788649260997772,
"rps_doc_frac_chars_top_2gram": 0.0237694401293993,
"rps_doc_frac_chars_top_3gram": 0.011092400178313255,
"rps_doc_frac_chars_top_4gram": 0.004753889981657267,
"rps_doc_books_importance": -1914.68408203125,
"rps_doc_books_importance_length_correction": -1914.68408203125,
"rps_doc_openwebtext_importance": -1091.28857421875,
"rps_doc_openwebtext_importance_length_correction": -1091.28857421875,
"rps_doc_wikipedia_importance": -797.7020263671875,
"rps_doc_wikipedia_importance_length_correction": -797.7020263671875
},
"fasttext": {
"dclm": 0.18095195293426514,
"english": 0.815459668636322,
"fineweb_edu_approx": 1.2866052389144897,
"eai_general_math": 0.973603367805481,
"eai_open_web_math": 0.939367413520813,
"eai_web_code": 0.020382050424814224
}
}
|
{
"free_decimal_correspondence": {
"primary": {
"code": "515.73",
"labels": {
"level_1": "Science and Natural history",
"level_2": "Mathematics",
"level_3": "Calculus and Mathematical analysis"
}
},
"secondary": {
"code": "515.7",
"labels": {
"level_1": "Science and Natural history",
"level_2": "Mathematics",
"level_3": "Calculus and Mathematical analysis"
}
}
},
"bloom_cognitive_process": {
"primary": {
"code": "4",
"label": "Analyze"
},
"secondary": {
"code": "2",
"label": "Understand"
}
},
"bloom_knowledge_domain": {
"primary": {
"code": "2",
"label": "Conceptual"
},
"secondary": {
"code": "3",
"label": "Procedural"
}
},
"document_type_v1": {
"primary": {
"code": "5",
"label": "Social/Forum"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"extraction_artifacts": {
"primary": {
"code": "3",
"label": "Irrelevant Content"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"missing_content": {
"primary": {
"code": "0",
"label": "No missing content"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"document_type_v2": {
"primary": {
"code": "18",
"label": "Q&A Forum"
},
"secondary": {
"code": "3",
"label": "Academic Writing"
}
},
"reasoning_depth": {
"primary": {
"code": "4",
"label": "Advanced Reasoning"
},
"secondary": {
"code": "3",
"label": "Intermediate Reasoning"
}
},
"technical_correctness": {
"primary": {
"code": "4",
"label": "Highly Correct"
},
"secondary": {
"code": "3",
"label": "Mostly Correct"
}
},
"education_level": {
"primary": {
"code": "4",
"label": "Graduate/Expert Level"
},
"secondary": {
"code": "3",
"label": "Undergraduate Level"
}
}
}
|
672f1e42c33a7f9846924a2431ea77df
|
1,025,831,953,649,072,000 |
Give me neither poverty nor riches, but give me only my daily bread - Proverbs 30:8
Wednesday, October 30, 2013
Social Media
Social media is all the rage these days and taking part in everything that's available can be overwhelming. Earlier this year I shared what works for me and why. I feel like I do a bare minimum, but it's still hard to keep up with those three things. Often I dream of the days when there was no blogging or instagram or Pinterest. But I also know those things bring joy to my life. Sometimes I feel like it's all noise and I'm adding to the noise by participating.
Maybe I should try quitting it all and see what it's like to live like it's 1992 again.
How about you?
1 comment:
1. In our family, I don't allow my children any screen time until after 4:00. I found that without that rule, they were asking all the time if they could play this game, or watch that show. I've done this since January of this year, and for the longest time it seemed like they were just waiting for 4:00 every day so they could do their thing. It's only in the last month or two that they've stopped watching the minutes. For myself personally, I've (mostly) quit Facebook (cut my friends from 200 to 20ish) and taken to blogging instead. I know it's still the same level of "noise," but it seems to be more coherent noise, less garbled and meaningless.
ReplyDelete
|
{
"url": "http://jill-foleyjourney.blogspot.com/2013/10/social-media.html",
"source_domain": "jill-foleyjourney.blogspot.com",
"snapshot_id": "crawl=CC-MAIN-2018-30",
"warc_metadata": {
"Content-Length": "73651",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:PY75S737IVXHEO5JDGLVEIPHHV7AIL7G",
"WARC-Concurrent-To": "<urn:uuid:0c3dc7db-614b-45f5-95ab-76f30c595000>",
"WARC-Date": "2018-07-16T05:02:18Z",
"WARC-IP-Address": "172.217.7.225",
"WARC-Identified-Payload-Type": "text/html",
"WARC-Payload-Digest": "sha1:OVX77VV25EYV63MTSNECSMKYO7RAGODV",
"WARC-Record-ID": "<urn:uuid:6e78c8c6-2ec1-4940-b49b-a79f74d09ea9>",
"WARC-Target-URI": "http://jill-foleyjourney.blogspot.com/2013/10/social-media.html",
"WARC-Truncated": null,
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:dfe51c78-a76a-4b0c-baac-5952f382d85b>"
},
"warc_info": "robots: classic\r\nhostname: ip-10-179-103-175.ec2.internal\r\nsoftware: Nutch 1.6 (CC)\r\nisPartOf: CC-MAIN-2018-30\r\noperator: Common Crawl Admin\r\ndescription: Wide crawl of the web for July 2018\r\npublisher: Common Crawl\r\nformat: WARC File Format 1.0\r\nconformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf"
}
|
{
"line_start_idx": [
0,
84,
85,
113,
114,
127,
128,
129,
130,
596,
597,
685,
686,
702,
703,
704,
715,
716,
1373,
1374
],
"line_end_idx": [
84,
85,
113,
114,
127,
128,
129,
130,
596,
597,
685,
686,
702,
703,
704,
715,
716,
1373,
1374,
1389
]
}
|
{
"red_pajama_v2": {
"ccnet_original_length": 1389,
"ccnet_original_nlines": 19,
"rps_doc_curly_bracket": 0,
"rps_doc_ldnoobw_words": 0,
"rps_doc_lorem_ipsum": 0,
"rps_doc_stop_word_fraction": 0.4811320900917053,
"rps_doc_ut1_blacklist": 0,
"rps_doc_frac_all_caps_words": 0.04088050127029419,
"rps_doc_frac_lines_end_with_ellipsis": 0,
"rps_doc_frac_no_alph_words": 0.18867924809455872,
"rps_doc_frac_unique_words": 0.6313725709915161,
"rps_doc_mean_word_length": 4.180392265319824,
"rps_doc_num_sentences": 16,
"rps_doc_symbol_to_word_ratio": 0,
"rps_doc_unigram_entropy": 4.8361124992370605,
"rps_doc_word_count": 255,
"rps_doc_frac_chars_dupe_10grams": 0,
"rps_doc_frac_chars_dupe_5grams": 0,
"rps_doc_frac_chars_dupe_6grams": 0,
"rps_doc_frac_chars_dupe_7grams": 0,
"rps_doc_frac_chars_dupe_8grams": 0,
"rps_doc_frac_chars_dupe_9grams": 0,
"rps_doc_frac_chars_top_2gram": 0.011257040314376354,
"rps_doc_frac_chars_top_3gram": 0.016885550692677498,
"rps_doc_frac_chars_top_4gram": 0,
"rps_doc_books_importance": -158.16598510742188,
"rps_doc_books_importance_length_correction": -158.1494140625,
"rps_doc_openwebtext_importance": -89.32781219482422,
"rps_doc_openwebtext_importance_length_correction": -89.32781219482422,
"rps_doc_wikipedia_importance": -67.9190673828125,
"rps_doc_wikipedia_importance_length_correction": -65.76681518554688
},
"fasttext": {
"dclm": 0.15514057874679565,
"english": 0.9847123622894287,
"fineweb_edu_approx": 0.9910337924957275,
"eai_general_math": 0.031196530908346176,
"eai_open_web_math": 0.09758461266756058,
"eai_web_code": 0.02204429917037487
}
}
|
{
"free_decimal_correspondence": {
"primary": {
"code": "004.67",
"labels": {
"level_1": "General works, books and libraries, information sciences",
"level_2": "",
"level_3": "Computers and Computer science"
}
},
"secondary": {
"code": "303.4833",
"labels": {
"level_1": "Social sciences",
"level_2": "",
"level_3": "Social sciences — Dictionaries"
}
}
},
"bloom_cognitive_process": {
"primary": {
"code": "5",
"label": "Evaluate"
},
"secondary": {
"code": "2",
"label": "Understand"
}
},
"bloom_knowledge_domain": {
"primary": {
"code": "2",
"label": "Conceptual"
},
"secondary": {
"code": "3",
"label": "Procedural"
}
},
"document_type_v1": {
"primary": {
"code": "9",
"label": "Personal/Misc"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"extraction_artifacts": {
"primary": {
"code": "0",
"label": "No Artifacts"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"missing_content": {
"primary": {
"code": "0",
"label": "No missing content"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"document_type_v2": {
"primary": {
"code": "16",
"label": "Personal Blog"
},
"secondary": {
"code": "5",
"label": "Comment Section"
}
},
"reasoning_depth": {
"primary": {
"code": "2",
"label": "Basic Reasoning"
},
"secondary": {
"code": "1",
"label": "No Reasoning"
}
},
"technical_correctness": {
"primary": {
"code": "6",
"label": "Not Applicable/Indeterminate"
},
"secondary": {
"code": "4",
"label": "Highly Correct"
}
},
"education_level": {
"primary": {
"code": "1",
"label": "General Audience"
},
"secondary": {
"code": "2",
"label": "High School Level"
}
}
}
|
672f1e42c33a7f9846924a2431ea77df
|
4,808,623,946,578,680,000 |
Importing
Importing
Top Previous Next
If you already have guest details (for example in an email or organizer address book, spreadsheet or text file) you can import the data directly into PerfectTablePlan, rather than re-typing it.
PerfectTablePlan can import information in 4 major formats:
Excel .xls/.xlsx - Excel's proprietary format.
CSV (Comma Separated Value ) - A text file that can be produced by Excel (select File>Save As and choose .csv as the file type) and many other types of applications. Columns and rows are delimited by commas and carriage returns, respectively. " and , characters are quoted.
Delimited text data - A text file with the user's choice of delimiters (separators). Many applications can produce data in this form. Excel CSV is a special form of delimited text data.
vCard file - vCard files be exported from most applications with address books, including Outlook, Palm Pilot desktop and the Apple Mac Address Book.
As a simpler (but less flexible) alternative to importing you can also use the Quick Add Guests window.
See also:
Import window
Importing guests from Excel files
Importing guests from text and CSV files
Importing guests from vCard files
Import non-English characters
Import guests tutorial
Example import formats
|
{
"url": "https://www.perfecttableplan.com/help/52/windows/html/importing.htm",
"source_domain": "www.perfecttableplan.com",
"snapshot_id": "crawl=CC-MAIN-2018-09",
"warc_metadata": {
"Content-Length": "9474",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:ROQ3TZEWVHNZ7G3Z26FYWPXZM6GT4ULR",
"WARC-Concurrent-To": "<urn:uuid:62d25dce-ce16-4f67-b249-ec55b34c6ebc>",
"WARC-Date": "2018-02-24T04:30:28Z",
"WARC-IP-Address": "217.160.0.103",
"WARC-Identified-Payload-Type": "text/html",
"WARC-Payload-Digest": "sha1:7L34JDX65EQKF3JJI23MCPJ64L6EIZZ6",
"WARC-Record-ID": "<urn:uuid:9331a6e9-f239-461e-ad9c-db12b303d680>",
"WARC-Target-URI": "https://www.perfecttableplan.com/help/52/windows/html/importing.htm",
"WARC-Truncated": null,
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:6818f58d-b559-49d9-b238-50f580c27cb1>"
},
"warc_info": "robots: classic\r\nhostname: ip-10-145-70-71.ec2.internal\r\nsoftware: Nutch 1.6 (CC)\r\nisPartOf: CC-MAIN-2018-09\r\noperator: Common Crawl Admin\r\ndescription: Wide crawl of the web for February 2018\r\npublisher: Common Crawl\r\nformat: WARC File Format 1.0\r\nconformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf"
}
|
{
"line_start_idx": [
0,
12,
13,
23,
24,
44,
45,
239,
240,
300,
301,
348,
622,
808,
958,
959,
1063,
1064,
1074,
1075,
1089,
1123,
1164,
1198,
1228,
1251
],
"line_end_idx": [
12,
13,
23,
24,
44,
45,
239,
240,
300,
301,
348,
622,
808,
958,
959,
1063,
1064,
1074,
1075,
1089,
1123,
1164,
1198,
1228,
1251,
1273
]
}
|
{
"red_pajama_v2": {
"ccnet_original_length": 1273,
"ccnet_original_nlines": 25,
"rps_doc_curly_bracket": 0,
"rps_doc_ldnoobw_words": 0,
"rps_doc_lorem_ipsum": 0,
"rps_doc_stop_word_fraction": 0.2851239740848541,
"rps_doc_ut1_blacklist": 0,
"rps_doc_frac_all_caps_words": 0.020661160349845886,
"rps_doc_frac_lines_end_with_ellipsis": 0,
"rps_doc_frac_no_alph_words": 0.1735537201166153,
"rps_doc_frac_unique_words": 0.5663265585899353,
"rps_doc_mean_word_length": 5.198979377746582,
"rps_doc_num_sentences": 14,
"rps_doc_symbol_to_word_ratio": 0,
"rps_doc_unigram_entropy": 4.4765448570251465,
"rps_doc_word_count": 196,
"rps_doc_frac_chars_dupe_10grams": 0,
"rps_doc_frac_chars_dupe_5grams": 0,
"rps_doc_frac_chars_dupe_6grams": 0,
"rps_doc_frac_chars_dupe_7grams": 0,
"rps_doc_frac_chars_dupe_8grams": 0,
"rps_doc_frac_chars_dupe_9grams": 0,
"rps_doc_frac_chars_top_2gram": 0.02355249971151352,
"rps_doc_frac_chars_top_3gram": 0.05593718960881233,
"rps_doc_frac_chars_top_4gram": 0.04710499942302704,
"rps_doc_books_importance": -120.59593200683594,
"rps_doc_books_importance_length_correction": -120.59593200683594,
"rps_doc_openwebtext_importance": -74.19115447998047,
"rps_doc_openwebtext_importance_length_correction": -74.19115447998047,
"rps_doc_wikipedia_importance": -63.903594970703125,
"rps_doc_wikipedia_importance_length_correction": -63.903594970703125
},
"fasttext": {
"dclm": 0.05745590105652809,
"english": 0.8733167052268982,
"fineweb_edu_approx": 2.8353664875030518,
"eai_general_math": 0.5561950206756592,
"eai_open_web_math": 0.26475733518600464,
"eai_web_code": 0.08832728862762451
}
}
|
{
"free_decimal_correspondence": {
"primary": {
"code": "005.467",
"labels": {
"level_1": "General works, books and libraries, information sciences",
"level_2": "",
"level_3": "Computer programming"
}
},
"secondary": {
"code": "658.8",
"labels": {
"level_1": "Industrial arts, Technology, and Engineering",
"level_2": "Business",
"level_3": "Management"
}
}
},
"bloom_cognitive_process": {
"primary": {
"code": "3",
"label": "Apply"
},
"secondary": {
"code": "2",
"label": "Understand"
}
},
"bloom_knowledge_domain": {
"primary": {
"code": "3",
"label": "Procedural"
},
"secondary": {
"code": "2",
"label": "Conceptual"
}
},
"document_type_v1": {
"primary": {
"code": "3",
"label": "Reference/Encyclopedic/Educational"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"extraction_artifacts": {
"primary": {
"code": "0",
"label": "No Artifacts"
},
"secondary": {
"code": "3",
"label": "Irrelevant Content"
}
},
"missing_content": {
"primary": {
"code": "0",
"label": "No missing content"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"document_type_v2": {
"primary": {
"code": "8",
"label": "Documentation"
},
"secondary": {
"code": "23",
"label": "Tutorial"
}
},
"reasoning_depth": {
"primary": {
"code": "2",
"label": "Basic Reasoning"
},
"secondary": {
"code": "1",
"label": "No Reasoning"
}
},
"technical_correctness": {
"primary": {
"code": "4",
"label": "Highly Correct"
},
"secondary": {
"code": "3",
"label": "Mostly Correct"
}
},
"education_level": {
"primary": {
"code": "1",
"label": "General Audience"
},
"secondary": {
"code": "2",
"label": "High School Level"
}
}
}
|
672f1e42c33a7f9846924a2431ea77df
|
5,505,872,747,322,010,000 |
[HOWTO] get around Microsoft Office corrupt font issue
jason.sellers
Registered
Dear old Micros**t can't even answer this one!
If you have a problem in word or excel, where you are told you have corrupt fonts, (they aren't, it's a microsoft issue), simply delete FontCacheTool from your machine, (use AppleF to find it) It's part of the office package, so won't affect anything else.
Empty your trash and voila!
Word and Excel now start up as they should.
Why Microsoft think that they can handle fonts better than OSX or suitcase, I'll never know. It also makes me wonder what exactly this tool is doing!
imdave
Registered
Thanks for this tip! This has been driving me crazy for about a week. I found no solution on the MS site. I found this and fixed the problem in about 2 seconds.
bethrosengard
Registered
Someone just pointed out this thread to me and it contains some misinformation and questionable advice so I thought I'd better comment on what Jason said in his post. Here goes:
Jason said: Dear old Micros**t can't even answer this one!
No they can't. That's partly because it's such an inconsistent bug that they have been unable to replicate it in house; and it's partly because it's very likely to be an Apple bug.
Jason said: If you have a problem in word or excel, where you are told you have corrupt fonts, (they aren't, it's a microsoft issue), simply delete FontCacheTool from your machine, (use AppleF to find it) It's part of the office package, so won't affect anything else. Empty your trash and voila! Word and Excel now start up as they should.
This is the questionable advice I referred to. Yes, it's true that deleting the FontCacheTool *appears* to solve the problem. It solves nothing. What it does is turn off the mechanism that notifies you when your fonts are corrupt; IOW, it prevents the problem from coming to view by eliminating the "font optimization" process from occurring.
Secondly, if you ever have to trash your Office Font Cache, you will lose WYSIWYG display of your fonts (which may or may not matter to you).
Finally, unlike the Office and System font caches, The FontCacheTool is not recreated automatically when you relaunch an Office application. The only way to restore this tool is to do a proper removal and reinstallation of Office.
So, DON'T delete your FontCacheTool. If you have tried all the other known workarounds for this bug and you get no joy, then archive or rename the FontCacheTool so you can restore it if needed. And be sure to do so before updating Office every time!
Much more on this bug here (including less severe workarounds): <http://word.mvps.org/mac/CorruptFontErrors.html>
Jason said: Why Microsoft think that they can handle fonts better than OSX or suitcase, I'll never know. It also makes me wonder what exactly this tool is doing!
You should know by now if you've read the above: It controls the font optimization process; it allows WYSIWYG for fonts; it warns you when fonts are corrupt (and probably more that I'm not aware of).
HTH,
Beth
<http://www.word.mvps.org/mac/WordMacHome.html>
SNance
Registered
Jason, Thanks for the tip about trashing "FontCache"! It saved what little sanity I had left with regard to Microsoft products :)
teszeract
Registered
Hi
This tip refers, I think, only to Office 04, not V.x. On this version I still cannot find a solution. My problem is actually worse: while Word attempts to load, cycling through a Optimizing Font Menu message, all other applications including some Dashboard ones come crashing down.
joshfree
Registered
Suitcase Fusion v.12.1.4 has a known bug that conflicts with MS Office's font menus. I just got off the phone with Extensisi Tech Support and they are working on a fix. V.12.1.5 should be out in a few days. Meanwhile, to revert to 12.1.3 which works fine, delete the database by deleting the entire Suitcase folder you'll find at ([username]/Library/Application Support/Extensis/Suitcase. If you have a backup from before 12.1.4, you can replace the database with that. Otherwise, Suitcase Fusion wlll just build a new one. Then trash the updated Application (Suitcase Fusion) and install 12.1.3 from a fresh download.
You should know by now if you've read the above: It controls the font optimization process; it allows WYSIWYG for fonts; it warns you when fonts are corrupt (and probably more that I'm not aware of).>
good riddance. I am not getting these corrupt font errors, but I might delete FontCacheTool just to get rid of the optimization. I can't tell you how many times I have been forced to stare at the "optimizing font menu" screen while loading a Word doc.
How does FontBook do it? seems to work far smoother than Office. Is it an API that other apps can use? If so, MS really should be using that rather than creating a slow, unstable version.
tmcalis566
Registered
JASON AND BETH!!!! I WOULD LIKE TO THANK YALL FOR EVERYTHING!!!!!!!! I just copied over 1000 fonts and their families to my LIBRARY/FONTS folder (from my external HD) AND OFFICE WAS ACTIN' CRAZY....Optimization Crap!!!! :mad: Well, instead of deleting the file I called mine: "CULPRIT_FontCacheTool"! ::evil::
I understand that this file is not to be a pain in the butt, but, I can just use Font Book to check my fonts for corruption, by selecting "validate fonts" under it's "File Menu". Thanks a bunch! :)
Tai :)
Top
|
{
"url": "https://macosx.com/threads/howto-get-around-microsoft-office-corrupt-font-issue.271130/#post-1442551",
"source_domain": "macosx.com",
"snapshot_id": "crawl=CC-MAIN-2021-49",
"warc_metadata": {
"Content-Length": "87649",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:WIIUKOO7QFTXIKI3JOIGM4H225LHO35J",
"WARC-Concurrent-To": "<urn:uuid:f40cb2ff-5fed-4ca6-a10f-57e61f030d79>",
"WARC-Date": "2021-12-01T09:14:08Z",
"WARC-IP-Address": "147.75.109.145",
"WARC-Identified-Payload-Type": "text/html",
"WARC-Payload-Digest": "sha1:IAQPKITBEJ6NYJJYRIU2IV2ZRANWHU3O",
"WARC-Record-ID": "<urn:uuid:293b812e-4b0a-4260-b089-26fb390b862d>",
"WARC-Target-URI": "https://macosx.com/threads/howto-get-around-microsoft-office-corrupt-font-issue.271130/#post-1442551",
"WARC-Truncated": null,
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:b50e62b9-060e-4f7a-954a-f42640daea0b>"
},
"warc_info": "isPartOf: CC-MAIN-2021-49\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for November/December 2021\r\noperator: Common Crawl Admin ([email protected])\r\nhostname: ip-10-67-67-123\r\nsoftware: Apache Nutch 1.18 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.3-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: https://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/"
}
|
{
"line_start_idx": [
0,
55,
56,
70,
71,
82,
129,
130,
388,
389,
417,
418,
462,
463,
613,
615,
616,
623,
624,
635,
796,
798,
799,
813,
814,
825,
1003,
1004,
1063,
1064,
1245,
1246,
1588,
1589,
1932,
1933,
2075,
2076,
2307,
2308,
2558,
2559,
2673,
2674,
2836,
2837,
3037,
3038,
3043,
3048,
3096,
3098,
3099,
3106,
3107,
3118,
3248,
3250,
3251,
3261,
3262,
3273,
3276,
3277,
3559,
3561,
3562,
3571,
3572,
3583,
4202,
4204,
4405,
4406,
4658,
4659,
4847,
4849,
4850,
4861,
4862,
4873,
5183,
5184,
5382,
5383,
5384,
5391,
5393
],
"line_end_idx": [
55,
56,
70,
71,
82,
129,
130,
388,
389,
417,
418,
462,
463,
613,
615,
616,
623,
624,
635,
796,
798,
799,
813,
814,
825,
1003,
1004,
1063,
1064,
1245,
1246,
1588,
1589,
1932,
1933,
2075,
2076,
2307,
2308,
2558,
2559,
2673,
2674,
2836,
2837,
3037,
3038,
3043,
3048,
3096,
3098,
3099,
3106,
3107,
3118,
3248,
3250,
3251,
3261,
3262,
3273,
3276,
3277,
3559,
3561,
3562,
3571,
3572,
3583,
4202,
4204,
4405,
4406,
4658,
4659,
4847,
4849,
4850,
4861,
4862,
4873,
5183,
5184,
5382,
5383,
5384,
5391,
5393,
5396
]
}
|
{
"red_pajama_v2": {
"ccnet_original_length": 5396,
"ccnet_original_nlines": 88,
"rps_doc_curly_bracket": 0,
"rps_doc_ldnoobw_words": 1,
"rps_doc_lorem_ipsum": 0,
"rps_doc_stop_word_fraction": 0.4081287086009979,
"rps_doc_ut1_blacklist": 0,
"rps_doc_frac_all_caps_words": 0.04911091923713684,
"rps_doc_frac_lines_end_with_ellipsis": 0,
"rps_doc_frac_no_alph_words": 0.19729043543338776,
"rps_doc_frac_unique_words": 0.40510544180870056,
"rps_doc_mean_word_length": 4.64927864074707,
"rps_doc_num_sentences": 78,
"rps_doc_symbol_to_word_ratio": 0.0008467399748042226,
"rps_doc_unigram_entropy": 5.398874759674072,
"rps_doc_word_count": 901,
"rps_doc_frac_chars_dupe_10grams": 0.25256624817848206,
"rps_doc_frac_chars_dupe_5grams": 0.2692766785621643,
"rps_doc_frac_chars_dupe_6grams": 0.2692766785621643,
"rps_doc_frac_chars_dupe_7grams": 0.2692766785621643,
"rps_doc_frac_chars_dupe_8grams": 0.2692766785621643,
"rps_doc_frac_chars_dupe_9grams": 0.25256624817848206,
"rps_doc_frac_chars_top_2gram": 0.010026260279119015,
"rps_doc_frac_chars_top_3gram": 0.008593940176069736,
"rps_doc_frac_chars_top_4gram": 0.0071616098284721375,
"rps_doc_books_importance": -506.33575439453125,
"rps_doc_books_importance_length_correction": -506.33575439453125,
"rps_doc_openwebtext_importance": -298.8106689453125,
"rps_doc_openwebtext_importance_length_correction": -298.8106689453125,
"rps_doc_wikipedia_importance": -207.63348388671875,
"rps_doc_wikipedia_importance_length_correction": -207.63348388671875
},
"fasttext": {
"dclm": 0.08526747673749924,
"english": 0.941497802734375,
"fineweb_edu_approx": 1.4309784173965454,
"eai_general_math": 0.4112604856491089,
"eai_open_web_math": 0.43909752368927,
"eai_web_code": 0.015299620106816292
}
}
|
{
"free_decimal_correspondence": {
"primary": {
"code": "005.4",
"labels": {
"level_1": "General works, books and libraries, information sciences",
"level_2": "",
"level_3": "Computer programming"
}
},
"secondary": {
"code": "-1",
"labels": {
"level_1": "",
"level_2": "",
"level_3": ""
}
}
},
"bloom_cognitive_process": {
"primary": {
"code": "3",
"label": "Apply"
},
"secondary": {
"code": "2",
"label": "Understand"
}
},
"bloom_knowledge_domain": {
"primary": {
"code": "3",
"label": "Procedural"
},
"secondary": {
"code": "2",
"label": "Conceptual"
}
},
"document_type_v1": {
"primary": {
"code": "5",
"label": "Social/Forum"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"extraction_artifacts": {
"primary": {
"code": "0",
"label": "No Artifacts"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"missing_content": {
"primary": {
"code": "0",
"label": "No missing content"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"document_type_v2": {
"primary": {
"code": "18",
"label": "Q&A Forum"
},
"secondary": {
"code": "23",
"label": "Tutorial"
}
},
"reasoning_depth": {
"primary": {
"code": "2",
"label": "Basic Reasoning"
},
"secondary": {
"code": "3",
"label": "Intermediate Reasoning"
}
},
"technical_correctness": {
"primary": {
"code": "3",
"label": "Mostly Correct"
},
"secondary": {
"code": "2",
"label": "Partially Correct"
}
},
"education_level": {
"primary": {
"code": "1",
"label": "General Audience"
},
"secondary": {
"code": "2",
"label": "High School Level"
}
}
}
|
672f1e42c33a7f9846924a2431ea77df
|
2,074,594,073,807,900,400 |
JG Estevez JG Estevez - 6 months ago 88
ASP.NET (C#) Question
The required anti-forgery cookie "__RequestVerificationToken" is not present
My website is raising this exception around 20 times a day, usually the form works fine but there are instances where this issue occur and I don't know why is so random.
This is logged exception by elmah
500 HttpAntiForgery The required anti-forgery cookie __RequestVerificationToken" is not present.
But the form it is sending the the token as shown on the xml log by elmah
<form>
<item name="__RequestVerificationToken">
<value string="DNbDMrzHmy37GPS6IFH-EmcIh4fJ2laezIrIEev5f4vOhsY9T7SkH9-1b7GPjm92CTFtb4dGqSe2SSYrlWSNEQG1MUlNyiLP1wtYli8bIh41"/>
</item>
<item name="toPhone">
<value string="XXXXXX"/>
</item>
<item name="smsMessage">
<value string="xxxxxxxx"/>
</item>
</form>
This is my method on the controller which uses the data Attribute to check if the token is valid or nor
[HttpPost]
[ValidateAntiForgeryToken]
public async Task<JsonResult> Send(SMSModel model)
{
my code goes here
}
This is my form on the view
@using (Html.BeginForm("Send", "SMS", FormMethod.Post, new { @class = "form-sms", autocomplete = "off" }))
{
@Html.AntiForgeryToken()
<div class="row">
<div class="col-md-12">
<div class="form-group">
<div class="input-group">
<div class="input-group-addon">+53</div>
@Html.TextBoxFor(m => m.toPhone, new { @class = "form-control", placeholder = "teléfono", required = "required", type = "tel", maxlength = 8 })
</div>
</div>
</div>
</div>
<div class="form-group" style="position:relative">
<label class="sr-only" for="exampleInputEmail3">Message (up to 135 characters)</label>
@Html.TextAreaFor(m => m.smsMessage, new { rows = 4, @class = "form-control", placeholder = "escriba aquí su mensaje", required = "required", maxlength = "135" })
<span class="char-count">135</span>
</div>
if (ViewBag.Sent == true)
{
<div class="alert alert-success alert-dismissible" role="alert">
<button type="button" class="close" data-dismiss="alert" aria-label="Close"><span aria-hidden="true">×</span></button>
<strong>Su mensaje ha sido enviado <span class="hidden-xs">satisfactoriamente</span></strong>
</div>
}
if (ViewBag.Error == true)
{
<div class="alert alert-danger alert-dismissible" role="alert">
<button type="button" class="close" data-dismiss="alert" aria-label="Close"><span aria-hidden="true">×</span></button>
<strong>Error:</strong> Por favor revise el número de teléfono.
</div>
}
<div class="errorToMany"></div>
<button type="submit" class="btn btn-default btn-block">Enviar SMS</button>
}
and this how I post my data using ajax
$('form.form-sms').submit(function (event) {
$.ajax({
url: $(this).attr("action"),
type: "POST",
data: $(this).serializeArray(),
beforeSend: function (xhr) {
$('.btn-default').attr("disabled", true);
$('.btn-default').html("Enviando...")
},
success: function (data, textStatus, jqXHR) {
if (data[0] == false && data[1] == "1") {
some code
} else {
location.reload();
}
},
error: function (jqXHR, textStatus, errorThrown) { }
});
return false;
})
The form works well most time but this error keeps happening and I don't know why, I've checked other questions here on SO but nothing works for me.
For further explanation about how I post the data.
This form to send SMS has the fields ToNumber and Message. When an user clicks on the submit Button the ajax function takes control and post it serializing the form's field data, when my function in the controller finishes and return the Json result indicating everything went well, the ajax method reloads the page showing the user a success message.
Any ideas what could be causing this issue.
Answer
It almost sounds as if things are working as expected.
The way the anti forgery helper @Html.AntiForgeryToken() works is by injecting a hidden form field named __RequestVerificationToken into the page AND it also sets a cookie into the browser.
When the form is posted back the two are compared and if they don't match or the cookie is missing then the error is thrown.
So it does not matter that Elmah logs that the form is sending __RequestVerificationToken. It always will, even in the event of CSRF attack, because this is simply the hidden form field.
<input name="__RequestVerificationToken" type="hidden" value="DNbDMrzHmy37GPS6IFH-EmcIh4fJ2laezIrIEev5f4vOhsY9T7SkH9-1b7GPjm92CTFtb4dGqSe2SSYrlWSNEQG1MUlNyiLP1wtYli8bIh41" />
The error message on the other hand says the corresponding COOKIE is not being sent:
500 HttpAntiForgery The required anti-forgery cookie __RequestVerificationToken" is not present.
So basically someone/something is replaying the form post without making the original request to get the cookie. As such they have the hidden form field __RequestVerificationToken but NOT the cookie to verify it.
So it seems like things are working as they should. Check your logs re: IP numbers, and referrers, etc. You might be under attack or perhaps be doing something weird or buggy when redirecting your form content. As above, referrers are a good place to start for this kind of error, assuming this is not being spoofed.
Also note that as per MDN
location.reload();
The Location.reload() method reloads the resource from the current URL. Its optional unique parameter is a Boolean, which, when it is true, causes the page to always be reloaded from the server. If it is false or not specified, the browser may reload the page from its cache.
If it is, on occasion loading from cache, then you might end up with a POST that has the old page token but not the cookie.
So try :
location.reload(true);
|
{
"url": "https://codedump.io/share/90fc5YxMG7TR/1/the-required-anti-forgery-cookie-quotrequestverificationtokenquot-is-not-present",
"source_domain": "codedump.io",
"snapshot_id": "crawl=CC-MAIN-2017-22",
"warc_metadata": {
"Content-Length": "34258",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:BRZYNZPYBQCETJHLT33GE6L26N2CDWJU",
"WARC-Concurrent-To": "<urn:uuid:32f4942b-7bbf-467a-b895-111bc1ef1df1>",
"WARC-Date": "2017-05-29T22:57:15Z",
"WARC-IP-Address": "84.22.103.185",
"WARC-Identified-Payload-Type": "text/html",
"WARC-Payload-Digest": "sha1:HZ2XXBACWZDSU4KQSEOVEIBQ36WMLVIZ",
"WARC-Record-ID": "<urn:uuid:9d3b74b6-b5db-4ff1-b69e-431a5dd950ed>",
"WARC-Target-URI": "https://codedump.io/share/90fc5YxMG7TR/1/the-required-anti-forgery-cookie-quotrequestverificationtokenquot-is-not-present",
"WARC-Truncated": null,
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:d5aff4a4-1314-49b5-995f-5e45e255d9db>"
},
"warc_info": "robots: classic\r\nhostname: ip-10-185-224-210.ec2.internal\r\nsoftware: Nutch 1.6 (CC)/CC WarcExport 1.0\r\nisPartOf: CC-MAIN-2017-22\r\noperator: Common Crawl Admin\r\ndescription: Wide crawl of the web for May 2017\r\npublisher: Common Crawl\r\nformat: WARC File Format 1.0\r\nconformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf"
}
|
{
"line_start_idx": [
0,
40,
62,
63,
140,
141,
311,
312,
346,
347,
444,
445,
446,
520,
521,
528,
569,
696,
704,
726,
751,
759,
784,
811,
819,
827,
828,
829,
933,
934,
945,
972,
1023,
1025,
1043,
1045,
1046,
1047,
1075,
1076,
1183,
1185,
1210,
1228,
1252,
1277,
1303,
1344,
1488,
1495,
1502,
1509,
1516,
1567,
1654,
1817,
1853,
1860,
1886,
1888,
1953,
2078,
2172,
2179,
2181,
2208,
2210,
2274,
2399,
2463,
2470,
2472,
2504,
2580,
2582,
2583,
2584,
2623,
2624,
2669,
2678,
2707,
2721,
2753,
2782,
2824,
2862,
2865,
2911,
2953,
2963,
2972,
2991,
2993,
2996,
3049,
3053,
3067,
3070,
3071,
3072,
3221,
3222,
3273,
3274,
3626,
3627,
3671,
3672,
3679,
3680,
3735,
3736,
3926,
3927,
4052,
4053,
4240,
4241,
4416,
4417,
4502,
4503,
4600,
4601,
4814,
4815,
5132,
5133,
5159,
5160,
5179,
5180,
5456,
5457,
5581,
5582,
5591,
5592
],
"line_end_idx": [
40,
62,
63,
140,
141,
311,
312,
346,
347,
444,
445,
446,
520,
521,
528,
569,
696,
704,
726,
751,
759,
784,
811,
819,
827,
828,
829,
933,
934,
945,
972,
1023,
1025,
1043,
1045,
1046,
1047,
1075,
1076,
1183,
1185,
1210,
1228,
1252,
1277,
1303,
1344,
1488,
1495,
1502,
1509,
1516,
1567,
1654,
1817,
1853,
1860,
1886,
1888,
1953,
2078,
2172,
2179,
2181,
2208,
2210,
2274,
2399,
2463,
2470,
2472,
2504,
2580,
2582,
2583,
2584,
2623,
2624,
2669,
2678,
2707,
2721,
2753,
2782,
2824,
2862,
2865,
2911,
2953,
2963,
2972,
2991,
2993,
2996,
3049,
3053,
3067,
3070,
3071,
3072,
3221,
3222,
3273,
3274,
3626,
3627,
3671,
3672,
3679,
3680,
3735,
3736,
3926,
3927,
4052,
4053,
4240,
4241,
4416,
4417,
4502,
4503,
4600,
4601,
4814,
4815,
5132,
5133,
5159,
5160,
5179,
5180,
5456,
5457,
5581,
5582,
5591,
5592,
5614
]
}
|
{
"red_pajama_v2": {
"ccnet_original_length": 5614,
"ccnet_original_nlines": 138,
"rps_doc_curly_bracket": 0.004987529944628477,
"rps_doc_ldnoobw_words": 0,
"rps_doc_lorem_ipsum": 0,
"rps_doc_stop_word_fraction": 0.23341326415538788,
"rps_doc_ut1_blacklist": 0,
"rps_doc_frac_all_caps_words": 0.019184650853276253,
"rps_doc_frac_lines_end_with_ellipsis": 0,
"rps_doc_frac_no_alph_words": 0.3373301327228546,
"rps_doc_frac_unique_words": 0.4837799668312073,
"rps_doc_mean_word_length": 5.96614933013916,
"rps_doc_num_sentences": 50,
"rps_doc_symbol_to_word_ratio": 0.0015987199731171131,
"rps_doc_unigram_entropy": 5.334118843078613,
"rps_doc_word_count": 709,
"rps_doc_frac_chars_dupe_10grams": 0.03877069056034088,
"rps_doc_frac_chars_dupe_5grams": 0.11489362269639969,
"rps_doc_frac_chars_dupe_6grams": 0.1078014224767685,
"rps_doc_frac_chars_dupe_7grams": 0.1078014224767685,
"rps_doc_frac_chars_dupe_8grams": 0.1078014224767685,
"rps_doc_frac_chars_dupe_9grams": 0.03877069056034088,
"rps_doc_frac_chars_top_2gram": 0.009929079562425613,
"rps_doc_frac_chars_top_3gram": 0.0156028401106596,
"rps_doc_frac_chars_top_4gram": 0.019858159124851227,
"rps_doc_books_importance": -470.63385009765625,
"rps_doc_books_importance_length_correction": -470.63385009765625,
"rps_doc_openwebtext_importance": -273.5191345214844,
"rps_doc_openwebtext_importance_length_correction": -273.5191345214844,
"rps_doc_wikipedia_importance": -185.1026153564453,
"rps_doc_wikipedia_importance_length_correction": -185.1026153564453
},
"fasttext": {
"dclm": 0.5724032521247864,
"english": 0.6601914167404175,
"fineweb_edu_approx": 1.9716382026672363,
"eai_general_math": 0.48857372999191284,
"eai_open_web_math": 0.23053330183029175,
"eai_web_code": 0.9614413976669312
}
}
|
{
"free_decimal_correspondence": {
"primary": {
"code": "005.1",
"labels": {
"level_1": "General works, books and libraries, information sciences",
"level_2": "",
"level_3": "Computer programming"
}
},
"secondary": {
"code": "004.678",
"labels": {
"level_1": "General works, books and libraries, information sciences",
"level_2": "",
"level_3": "Computers and Computer science"
}
}
},
"bloom_cognitive_process": {
"primary": {
"code": "2",
"label": "Understand"
},
"secondary": {
"code": "3",
"label": "Apply"
}
},
"bloom_knowledge_domain": {
"primary": {
"code": "3",
"label": "Procedural"
},
"secondary": {
"code": "2",
"label": "Conceptual"
}
},
"document_type_v1": {
"primary": {
"code": "5",
"label": "Social/Forum"
},
"secondary": {
"code": "4",
"label": "Code/Software"
}
},
"extraction_artifacts": {
"primary": {
"code": "0",
"label": "No Artifacts"
},
"secondary": {
"code": "3",
"label": "Irrelevant Content"
}
},
"missing_content": {
"primary": {
"code": "0",
"label": "No missing content"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"document_type_v2": {
"primary": {
"code": "18",
"label": "Q&A Forum"
},
"secondary": {
"code": "8",
"label": "Documentation"
}
},
"reasoning_depth": {
"primary": {
"code": "3",
"label": "Intermediate Reasoning"
},
"secondary": {
"code": "2",
"label": "Basic Reasoning"
}
},
"technical_correctness": {
"primary": {
"code": "4",
"label": "Highly Correct"
},
"secondary": {
"code": "3",
"label": "Mostly Correct"
}
},
"education_level": {
"primary": {
"code": "3",
"label": "Undergraduate Level"
},
"secondary": {
"code": "2",
"label": "High School Level"
}
}
}
|
672f1e42c33a7f9846924a2431ea77df
|
-3,235,213,576,600,611,000 |
Braille
From Just Solve the File Format Problem
Jump to: navigation, search
File Format
Name Braille
Ontology
Released 1824
Braille is a tactile code for encoding written language in the form of raised dots in a matrix pattern, used to make written words accessible to the blind. It is named after its creator, Louis Braille, who devised the first version of the system when he was 15 years old after having become blind in a childhood accident.
There are a number of variants of Braille. Only the ones designated as "Grade 1" are true character encodings, with one set of raised dots corresponding to each written character; the "Grade 2" and "Grade 3" systems are more complex, with symbols standing for abbreviated words and other shorthand, making Braille a language in its own right. Its ISO 15924 code (for types of writing scripts) is brai, with the numeric code 570.
There are also a number of variants of Braille for different languages. The original version was designed for French, resulting in some oddities such as the letter "w" not being in its normal position (it is not used in French, so it was originally omitted, then later added on to the end of the alphabet). When versions of Braille were adapted to other languages, including English, there were originally a number of incompatible versions encoding the respective languages' alphabets in the normal order for that language, resulting in different values for the same letter; later, however, more standardization was achieved and the basic 26 letters of the Latin alphabet are in the same position in the major variants, though other characters such as accented letters may vary. There are also versions for non-Latin writing systems, including Chinese and Japanese.
The Nemeth Code is an extension to Braille for advanced mathematical renderings.
The digits are encoded with the same Braille symbols as the first ten letters of the alphabet, leaving it to context to distinguish a letter from a digit. A "number sign" can be prefixed to make this distinction explicit, and this is done in the mathematical-notation variants of Braille.
In Unicode, Braille symbols are found at positions U+2800 through U+28FF.
In TRON code, Braille symbols are found in a part of Zone B of the first plane, and six-dot braille is encoded separately from eight-dot braille; see the article for details.
The BRF format encodes Braille text in the form of an ASCII text file.
Links
Personal tools
Namespaces
Variants
Actions
Navigation
Toolbox
|
{
"url": "http://fileformats.archiveteam.org/wiki/Braille",
"source_domain": "fileformats.archiveteam.org",
"snapshot_id": "CC-MAIN-2024-22",
"warc_metadata": {
"Content-Length": "18565",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:RW22UZ2QPN74FJTQS2IVWIESTAZABR2D",
"WARC-Concurrent-To": "<urn:uuid:f8d628c3-8465-4b6e-9ba7-d70e9e424ac7>",
"WARC-Date": "2024-05-25T23:51:55Z",
"WARC-IP-Address": "208.86.226.169",
"WARC-Identified-Payload-Type": "text/html",
"WARC-Payload-Digest": "sha1:NGAKJ4G7DNVCHHGCGOEBKVR7WGRVABZF",
"WARC-Record-ID": "<urn:uuid:aff040e8-730a-490a-9130-66cd9e303d9d>",
"WARC-Target-URI": "http://fileformats.archiveteam.org/wiki/Braille",
"WARC-Truncated": null,
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:eeb4cd87-9f3b-447c-9f47-e6d468965c0a>"
},
"warc_info": "isPartOf: CC-MAIN-2024-22\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for May 2024\r\noperator: Common Crawl Admin ([email protected])\r\nhostname: ip-10-67-67-211\r\nsoftware: Apache Nutch 1.19 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.5-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: https://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/"
}
|
{
"line_start_idx": [
0,
8,
9,
49,
77,
89,
102,
111,
125,
126,
448,
449,
878,
879,
1745,
1746,
1827,
1828,
2117,
2118,
2192,
2193,
2368,
2369,
2440,
2441,
2447,
2448,
2463,
2474,
2475,
2484,
2492,
2503
],
"line_end_idx": [
8,
9,
49,
77,
89,
102,
111,
125,
126,
448,
449,
878,
879,
1745,
1746,
1827,
1828,
2117,
2118,
2192,
2193,
2368,
2369,
2440,
2441,
2447,
2448,
2463,
2474,
2475,
2484,
2492,
2503,
2510
]
}
|
{
"red_pajama_v2": {
"ccnet_original_length": 2510,
"ccnet_original_nlines": 33,
"rps_doc_curly_bracket": 0,
"rps_doc_ldnoobw_words": 0,
"rps_doc_lorem_ipsum": 0,
"rps_doc_stop_word_fraction": 0.39626556634902954,
"rps_doc_ut1_blacklist": 0,
"rps_doc_frac_all_caps_words": 0.018672199919819832,
"rps_doc_frac_lines_end_with_ellipsis": 0,
"rps_doc_frac_no_alph_words": 0.14730289578437805,
"rps_doc_frac_unique_words": 0.483091801404953,
"rps_doc_mean_word_length": 4.884057998657227,
"rps_doc_num_sentences": 16,
"rps_doc_symbol_to_word_ratio": 0,
"rps_doc_unigram_entropy": 4.809779644012451,
"rps_doc_word_count": 414,
"rps_doc_frac_chars_dupe_10grams": 0,
"rps_doc_frac_chars_dupe_5grams": 0.025717109441757202,
"rps_doc_frac_chars_dupe_6grams": 0.025717109441757202,
"rps_doc_frac_chars_dupe_7grams": 0,
"rps_doc_frac_chars_dupe_8grams": 0,
"rps_doc_frac_chars_dupe_9grams": 0,
"rps_doc_frac_chars_top_2gram": 0.014836800284683704,
"rps_doc_frac_chars_top_3gram": 0.013353119604289532,
"rps_doc_frac_chars_top_4gram": 0.010880320332944393,
"rps_doc_books_importance": -257.129150390625,
"rps_doc_books_importance_length_correction": -257.129150390625,
"rps_doc_openwebtext_importance": -142.70985412597656,
"rps_doc_openwebtext_importance_length_correction": -142.70985412597656,
"rps_doc_wikipedia_importance": -89.40234375,
"rps_doc_wikipedia_importance_length_correction": -89.40234375
},
"fasttext": {
"dclm": 0.6531984806060791,
"english": 0.9437946677207947,
"fineweb_edu_approx": 3.262716770172119,
"eai_general_math": 0.8040269613265991,
"eai_open_web_math": 0.5050835013389587,
"eai_web_code": 0.2261354923248291
}
}
|
{
"free_decimal_correspondence": {
"primary": {
"code": "004.0194",
"labels": {
"level_1": "General works, books and libraries, information sciences",
"level_2": "",
"level_3": "Computers and Computer science"
}
},
"secondary": {
"code": "686.22",
"labels": {
"level_1": "Industrial arts, Technology, and Engineering",
"level_2": "Handicraft and Occupations",
"level_3": "Bookbinding and Printing"
}
}
},
"bloom_cognitive_process": {
"primary": {
"code": "2",
"label": "Understand"
},
"secondary": {
"code": "3",
"label": "Apply"
}
},
"bloom_knowledge_domain": {
"primary": {
"code": "2",
"label": "Conceptual"
},
"secondary": {
"code": "3",
"label": "Procedural"
}
},
"document_type_v1": {
"primary": {
"code": "3",
"label": "Reference/Encyclopedic/Educational"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"extraction_artifacts": {
"primary": {
"code": "3",
"label": "Irrelevant Content"
},
"secondary": {
"code": "0",
"label": "No Artifacts"
}
},
"missing_content": {
"primary": {
"code": "0",
"label": "No missing content"
},
"secondary": {
"code": "4",
"label": "Missing Images or Figures"
}
},
"document_type_v2": {
"primary": {
"code": "10",
"label": "Knowledge Article"
},
"secondary": {
"code": "8",
"label": "Documentation"
}
},
"reasoning_depth": {
"primary": {
"code": "2",
"label": "Basic Reasoning"
},
"secondary": {
"code": "3",
"label": "Intermediate Reasoning"
}
},
"technical_correctness": {
"primary": {
"code": "4",
"label": "Highly Correct"
},
"secondary": {
"code": "3",
"label": "Mostly Correct"
}
},
"education_level": {
"primary": {
"code": "2",
"label": "High School Level"
},
"secondary": {
"code": "1",
"label": "General Audience"
}
}
}
|
672f1e42c33a7f9846924a2431ea77df
|
4,792,583,427,893,094,000 |
C#监视打印机(接上篇)
版权声明:本文为博主原创文章,遵循 CC 4.0 by-sa 版权协议,转载请附上原文出处链接和本声明。
本文链接:https://blog.csdn.net/xiaogaokun/article/details/82262594
关于上一篇,由于有了基本函数,也有了大神给的几乎直接可以用的源码,视乎问题就解决了。
但是问题远远没有那么简单,在测试x64时候出现了比较棘手的问题。
前文我们用到一些有价值的系统函数
在Win32 上我们用 微软的例子用到WaitForSingleObject(hChange, INFINITE)
我们在C# 。.net4.0平台用一个回调函数来完成
_changeHandle = FindFirstPrinterChangeNotification(_printerHandle,
(int) PRINTER_CHANGES.PRINTER_CHANGE_ADD_JOB, 0,
_notifyOptions);
//_mrEvent.Handle = _changeHandle;
_mrEvent.SafeWaitHandle = new SafeWaitHandle(_changeHandle, false);
//use the waitOne
//like C++ smaple if (WaitForSingleObject(hChange, INFINITE) != 0x00000000L) {
//new Thread(PirnterWaitOne).Start();
//Register for the ThreadPool Use callBack
_waitHandle = ThreadPool.RegisterWaitForSingleObject(_mrEvent, new WaitOrTimerCallback(PrinterNotifyWaitCallback), _mrEvent, -1, true);
FindFirstPrinterChangeNotification触发事件的时候,回调我们的函数:
当那么回调函数呢
private void PrinterNotifyWaitCallback(Object state, bool timedOut)
{
try
{
if (_printerHandle != IntPtr.Zero)
{
#region read notification details
_notifyOptions.Count = 1;
int pdwChange;
IntPtr pNotifyInfo;
var bResult = FindNextPrinterChangeNotification(_changeHandle, out pdwChange, _notifyOptions, out pNotifyInfo);
//If the Printer Change Notification Call did not give data, exit code
if ((bResult == false) || (((int)pNotifyInfo) == 0))
{
}
else
{
if ((pdwChange & PRINTER_CHANGES.PRINTER_CHANGE_PRINTER) > 0 || (pdwChange & PRINTER_CHANGES.PRINTER_CHANGE_PORT) > 0)
{
}
//If the Change Notification was not relgated to job, exit code
bool bJobRelatedChange = ((pdwChange & PRINTER_CHANGES.PRINTER_CHANGE_ADD_JOB) == PRINTER_CHANGES.PRINTER_CHANGE_ADD_JOB) ||
((pdwChange & PRINTER_CHANGES.PRINTER_CHANGE_SET_JOB) == PRINTER_CHANGES.PRINTER_CHANGE_SET_JOB) ||
((pdwChange & PRINTER_CHANGES.PRINTER_CHANGE_DELETE_JOB) == PRINTER_CHANGES.PRINTER_CHANGE_DELETE_JOB) ||
((pdwChange & PRINTER_CHANGES.PRINTER_CHANGE_WRITE_JOB) == PRINTER_CHANGES.PRINTER_CHANGE_WRITE_JOB);
if (bJobRelatedChange)
{
#region populate Notification Information
//PRINTER_NOTIFY_INFOの数据的取得
var info = (PRINTER_NOTIFY_INFO)Marshal.PtrToStructure(pNotifyInfo, typeof(PRINTER_NOTIFY_INFO));
var pData = (int)pNotifyInfo + Marshal.SizeOf(typeof(PRINTER_NOTIFY_INFO));
var data = new PRINTER_NOTIFY_INFO_DATA[info.Count];
for (uint i = 0; i < info.Count; i++)
{
data[i] = (PRINTER_NOTIFY_INFO_DATA)Marshal.PtrToStructure((IntPtr)pData, typeof(PRINTER_NOTIFY_INFO_DATA));
pData += Marshal.SizeOf(typeof(PRINTER_NOTIFY_INFO_DATA));
}
#endregion
var intJobID = -1;
try
{
#region iterate through all elements in the data array
for (var i = 0; i < data.Count(); i++)
{
if ((data[i].Field == (ushort)PRINTERJOBNOTIFICATIONTYPES.JOB_NOTIFY_FIELD_STATUS) &&
(data[i].Type == (ushort)PRINTERNOTIFICATIONTYPES.JOB_NOTIFY_TYPE)
)
{
//var jStatus = (JOBSTATUS)Enum.Parse(typeof(JOBSTATUS), data[i].NotifyData.Data.cbBuf.ToString(CultureInfo.InvariantCulture));
intJobID = (int)data[i].Id;
}
}
#endregion
}
catch (Exception e)
{
intJobID = -1;
}
}
回调函数中FindNextPrinterChangeNotification中取得PRINTER_NOTIFY_INFO
再在它内部结构体数组PRINTER_NOTIFY_INFO_DATA中获得当前打印的JobId,然后我们用JobId来做进一步的数据取得。
问题出现了,当在x64系统上,PRINTER_NOTIFY_INFO_DATA 中
[StructLayout(LayoutKind.Sequential)]
public struct PRINTER_NOTIFY_INFO_DATA
{
public ushort Type;
public ushort Field;
public uint Reserved;
public uint Id;
public PRINTER_NOTIFY_INFO_DATA_UNION NotifyData;
}
Type, Field,Rsevered,Id通通为零,数据错误。
第一个反应一定是x64编译器和x86编译中内存对齐有问题啊,不能共用一套结构体。
然后去查了好多C++,C# 内存对齐机制的变量匹配,发现PRINTER_NOTIFY_INFO_DATA在64中确实比32中要大
但是经过分析,和看别人论坛的讨论,觉得没问题,这几份内存对齐代码代码最初由这个团队
http://lifeandtimesofadeveloper.blogspot.com/2007/10/unmanaged-structures-padding-and-c-part.html
http://lifeandtimesofadeveloper.blogspot.com/2007/10/unmanaged-structures-padding-and-c-part_18.html
这两篇文章,是2007新西兰Ben做的一个博客,因该经过测试,并且完美解决的。经过x86 x64 系统的兼容性测试。
(这两篇文章纯英文,并且不翻墙上不去,不知道为啥。。。。等我转发)
然后代码查阅
var info = (PRINTER_NOTIFY_INFO)Marshal.PtrToStructure(pNotifyInfo, typeof(PRINTER_NOTIFY_INFO));
var pData = (int)pNotifyInfo + Marshal.SizeOf(typeof(PRINTER_NOTIFY_INFO));
var data = new PRINTER_NOTIFY_INFO_DATA[info.Count];
这时候源代码为了找到PRINTER_NOTIFY_INFO_DATA[] 其实位置,提前用Marshal.SizeOf(typeof(PRINTER_NOTIFY_INFO))
提前把指针偏移到unit Count 之后
[StructLayout(LayoutKind.Sequential)]
public struct PRINTER_NOTIFY_INFO
{
public uint Version;
public uint Flags;
public uint Count;
}
后来发现这并不是微软推荐的,微软有更好的结构体内指针移动函数,Marshal.OffsetOf
It doesn't work correctly for 64-bit configuration because of Data Alignment.
找到一个解决问题的方案
https://stackoverflow.com/questions/12792508/how-to-correctly-define-print-notify-info-data
You saved my life, thanx a million.
看到这句话我知道基本好用了,恢复结构体
[StructLayout(LayoutKind.Sequential)]
public struct PRINTER_NOTIFY_INFO
{
public uint Version;
public uint Flags;
public uint Count;
[MarshalAs(UnmanagedType.ByValArray, SizeConst = 1)]
public PRINTER_NOTIFY_INFO_DATA[] aData;
}
var info = (PRINTER_NOTIFY_INFO)Marshal.PtrToStructure(pNotifyInfo, typeof(PRINTER_NOTIFY_INFO));
//var pData = (int)pNotifyInfo + Marshal.SizeOf(typeof(PRINTER_NOTIFY_INFO));
long pData = (long)pNotifyInfo + (long)Marshal.OffsetOf(typeof(PRINTER_NOTIFY_INFO), "aData");
这样经过测试,好用了,微软的x86,x64到底之间出现了什么内存对齐指令,还是很好奇
因为之前我在PRINTER_NOTIFY_INFO前添加一个uint 也是好用的,说明内存对齐,x64还是有自己内存对齐算法。
以后希望能继续学习和深入了解,如果有大神指点,也是很感谢。
展开阅读全文
没有更多推荐了,返回首页
|
{
"url": "https://blog.csdn.net/xiaogaokun/article/details/82262594",
"source_domain": "blog.csdn.net",
"snapshot_id": "crawl=CC-MAIN-2019-35",
"warc_metadata": {
"Content-Length": "110113",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:XYJ4GK62FWIU3WZ3UK3VGSLW2SVX2VLF",
"WARC-Concurrent-To": "<urn:uuid:828331c1-3ec6-4203-b314-873c443976ae>",
"WARC-Date": "2019-08-19T23:09:48Z",
"WARC-IP-Address": "39.96.126.153",
"WARC-Identified-Payload-Type": "text/html",
"WARC-Payload-Digest": "sha1:VPKOQLO5JZJ2F6Y47VDO4XFCTRI4LOIK",
"WARC-Record-ID": "<urn:uuid:759c63e4-9957-4b12-8d78-51708d2856ed>",
"WARC-Target-URI": "https://blog.csdn.net/xiaogaokun/article/details/82262594",
"WARC-Truncated": null,
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:2eb9c2c9-1b46-4223-abdc-60577ba54f37>"
},
"warc_info": "isPartOf: CC-MAIN-2019-35\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for August 2019\r\noperator: Common Crawl Admin ([email protected])\r\nhostname: ip-10-67-67-188.ec2.internal\r\nsoftware: Apache Nutch 1.15 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.1-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/"
}
|
{
"line_start_idx": [
0,
13,
14,
67,
130,
131,
174,
175,
208,
209,
226,
227,
286,
287,
314,
315,
383,
499,
583,
634,
718,
719,
753,
848,
902,
903,
962,
1114,
1115,
1166,
1167,
1176,
1177,
1253,
1263,
1279,
1293,
1344,
1362,
1416,
1462,
1497,
1537,
1669,
1760,
1833,
1855,
1856,
1878,
1903,
1925,
2068,
2094,
2095,
2121,
2122,
2210,
2359,
2508,
2663,
2814,
2815,
2862,
2888,
2958,
3014,
3140,
3244,
3325,
3391,
3421,
3562,
3653,
3683,
3722,
3723,
3770,
3802,
3832,
3919,
3990,
4024,
4025,
4147,
4255,
4297,
4335,
4503,
4571,
4609,
4643,
4686,
4716,
4764,
4794,
4841,
4871,
4873,
4874,
4935,
4936,
5006,
5007,
5049,
5050,
5089,
5132,
5138,
5166,
5195,
5225,
5249,
5307,
5313,
5314,
5348,
5349,
5390,
5391,
5456,
5457,
5499,
5500,
5599,
5600,
5702,
5703,
5762,
5763,
5797,
5798,
5805,
5806,
5904,
5980,
6033,
6061,
6062,
6151,
6152,
6174,
6175,
6216,
6254,
6260,
6289,
6316,
6343,
6349,
6350,
6399,
6400,
6478,
6479,
6491,
6492,
6584,
6585,
6622,
6623,
6643,
6644,
6685,
6723,
6729,
6758,
6785,
6812,
6873,
6922,
6928,
7026,
7104,
7199,
7200,
7243,
7244,
7308,
7309,
7339,
7340,
7342,
7343,
7350,
7351
],
"line_end_idx": [
13,
14,
67,
130,
131,
174,
175,
208,
209,
226,
227,
286,
287,
314,
315,
383,
499,
583,
634,
718,
719,
753,
848,
902,
903,
962,
1114,
1115,
1166,
1167,
1176,
1177,
1253,
1263,
1279,
1293,
1344,
1362,
1416,
1462,
1497,
1537,
1669,
1760,
1833,
1855,
1856,
1878,
1903,
1925,
2068,
2094,
2095,
2121,
2122,
2210,
2359,
2508,
2663,
2814,
2815,
2862,
2888,
2958,
3014,
3140,
3244,
3325,
3391,
3421,
3562,
3653,
3683,
3722,
3723,
3770,
3802,
3832,
3919,
3990,
4024,
4025,
4147,
4255,
4297,
4335,
4503,
4571,
4609,
4643,
4686,
4716,
4764,
4794,
4841,
4871,
4873,
4874,
4935,
4936,
5006,
5007,
5049,
5050,
5089,
5132,
5138,
5166,
5195,
5225,
5249,
5307,
5313,
5314,
5348,
5349,
5390,
5391,
5456,
5457,
5499,
5500,
5599,
5600,
5702,
5703,
5762,
5763,
5797,
5798,
5805,
5806,
5904,
5980,
6033,
6061,
6062,
6151,
6152,
6174,
6175,
6216,
6254,
6260,
6289,
6316,
6343,
6349,
6350,
6399,
6400,
6478,
6479,
6491,
6492,
6584,
6585,
6622,
6623,
6643,
6644,
6685,
6723,
6729,
6758,
6785,
6812,
6873,
6922,
6928,
7026,
7104,
7199,
7200,
7243,
7244,
7308,
7309,
7339,
7340,
7342,
7343,
7350,
7351,
7363
]
}
|
{
"red_pajama_v2": {
"ccnet_original_length": 7363,
"ccnet_original_nlines": 184,
"rps_doc_curly_bracket": 0.0036669799592345953,
"rps_doc_ldnoobw_words": 0,
"rps_doc_lorem_ipsum": 0,
"rps_doc_stop_word_fraction": 0.06468172371387482,
"rps_doc_ut1_blacklist": 0,
"rps_doc_frac_all_caps_words": 0.06262834370136261,
"rps_doc_frac_lines_end_with_ellipsis": 0,
"rps_doc_frac_no_alph_words": 0.5379877090454102,
"rps_doc_frac_unique_words": 0.5914633870124817,
"rps_doc_mean_word_length": 13.009146690368652,
"rps_doc_num_sentences": 64,
"rps_doc_symbol_to_word_ratio": 0.008213549852371216,
"rps_doc_unigram_entropy": 4.958766937255859,
"rps_doc_word_count": 328,
"rps_doc_frac_chars_dupe_10grams": 0.13358330726623535,
"rps_doc_frac_chars_dupe_5grams": 0.16569018363952637,
"rps_doc_frac_chars_dupe_6grams": 0.16569018363952637,
"rps_doc_frac_chars_dupe_7grams": 0.16569018363952637,
"rps_doc_frac_chars_dupe_8grams": 0.16569018363952637,
"rps_doc_frac_chars_dupe_9grams": 0.13358330726623535,
"rps_doc_frac_chars_top_2gram": 0.018748540431261063,
"rps_doc_frac_chars_top_3gram": 0.03937191888689995,
"rps_doc_frac_chars_top_4gram": 0.055542539805173874,
"rps_doc_books_importance": -458.3049621582031,
"rps_doc_books_importance_length_correction": -458.3049621582031,
"rps_doc_openwebtext_importance": -203.26406860351562,
"rps_doc_openwebtext_importance_length_correction": -203.26406860351562,
"rps_doc_wikipedia_importance": -118.98474884033203,
"rps_doc_wikipedia_importance_length_correction": -118.98474884033203
},
"fasttext": {
"dclm": 0.7797223925590515,
"english": 0.16204383969306946,
"fineweb_edu_approx": 2.942949056625366,
"eai_general_math": 0.13711076974868774,
"eai_open_web_math": 0.010163189843297005,
"eai_web_code": 0.7559530735015869
}
}
|
{
"free_decimal_correspondence": {
"primary": {
"code": "005.1",
"labels": {
"level_1": "General works, books and libraries, information sciences",
"level_2": "",
"level_3": "Computer programming"
}
},
"secondary": {
"code": "621.392",
"labels": {
"level_1": "Industrial arts, Technology, and Engineering",
"level_2": "Engineering",
"level_3": "Mechanical engineering and Machinery"
}
}
},
"bloom_cognitive_process": {
"primary": {
"code": "3",
"label": "Apply"
},
"secondary": {
"code": "4",
"label": "Analyze"
}
},
"bloom_knowledge_domain": {
"primary": {
"code": "3",
"label": "Procedural"
},
"secondary": {
"code": "2",
"label": "Conceptual"
}
},
"document_type_v1": {
"primary": {
"code": "4",
"label": "Code/Software"
},
"secondary": {
"code": "3",
"label": "Reference/Encyclopedic/Educational"
}
},
"extraction_artifacts": {
"primary": {
"code": "0",
"label": "No Artifacts"
},
"secondary": {
"code": "3",
"label": "Irrelevant Content"
}
},
"missing_content": {
"primary": {
"code": "0",
"label": "No missing content"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"document_type_v2": {
"primary": {
"code": "8",
"label": "Documentation"
},
"secondary": {
"code": "16",
"label": "Personal Blog"
}
},
"reasoning_depth": {
"primary": {
"code": "3",
"label": "Intermediate Reasoning"
},
"secondary": {
"code": "2",
"label": "Basic Reasoning"
}
},
"technical_correctness": {
"primary": {
"code": "3",
"label": "Mostly Correct"
},
"secondary": {
"code": "4",
"label": "Highly Correct"
}
},
"education_level": {
"primary": {
"code": "3",
"label": "Undergraduate Level"
},
"secondary": {
"code": "4",
"label": "Graduate/Expert Level"
}
}
}
|
672f1e42c33a7f9846924a2431ea77df
|
2,507,600,155,336,248,300 |
How ToLaptops
How to Build a Laptop
how to build a laptop
When it comes to laptops, you can either buy a pre-configured laptop or build a custom one. Pre-configured laptops come with specifications that are meant to appeal to a large segment of the market. They are manufactured in bulk and are the ones you’ll see on most store shelves. You can buy these quickly and start using them immediately.
Custom-built laptops are a different story. Can you build a laptop yourself though? Yes and no.
Some manufacturers like Lenovo have a “Build Your Own” option on their websites, which starts with you choosing a model and an OS and then moving on to picking out the parts. In this case, you don’t assemble the laptop yourself. The manufacturer can assemble it for you in a few weeks at most.
If you decide instead to build a laptop from scratch yourself, the process can be difficult but not impossible. You can gather the parts yourself and get to work, using the laptop kit you’ve hence created for yourself. There are laptop kits available in the market too, such as the Pi-Top Raspberry Pi DIY Laptop Kit, and these can make your job much easier.
Why Would You Want A Custom Laptop?
If you find you always end up replacing the pre-loaded programs in pre-built laptops and upgrading parts after the initial purchase, then you might end up saving money on a custom laptop. If your use is going to be more specialized than generic (such as, say, you want to build a gaming laptop because mainstream gaming laptops are too expensive), then again, try building your own laptop.
Selecting Your Key Players
Let’s talk about building your own laptop kit if you’ve decided to collect the key components of your dream laptop yourself rather than opt for a pre-designed kit. Here are the things you need to be most careful about and why.
The “Bones”
The barebones laptop is also called a laptop case, and it refers to the “shell” that is going to hold all your hardware. Most shells come pre-fitted with a motherboard, which will determine the kind of memory and CPU you can use.
So apart from the motherboard, look into the screen size of your shell as well as what the keyboard is like since these things can’t be changed later. It can be difficult to find a laptop shell for sale on its own. Companies like MSI still offer them, but if you’re going with a specific brand’s custom laptop then you won’t have this problem.
Processor
You will need to choose a processor category (and then an individual processor) based on your usage. Low power processors such as Intel Atom are good enough for casual users, and they offer better battery life. These are usually already soldered onto motherboards.
Value processors like Intel Pentium are similar in that they are good for basic tasks, but they work better with low-end systems. Mainstream processors are the most versatile and offer the most bang-for-your-buck, like Intel i5. If you really want to up your game, (or gaming, if that’s the laptop you want to build) go for a performance processor like Intel i7.
Memory
The overall strength of your RAM (or simply memory) will determine how good your laptop is at multitasking. This strength depends on both size and speed. 8GB is the minimum size you should be going for, although 16GB provides a good fit for power users. Extremes like 32GB are also available.
While you can configure RAM size, speed is not as conveniently adjusted (even with options like overclocking). Memory speed varies with RAM types (such as DDR3 vs DDR4) and the extent to which you can overclock.
Storage
The strength of your storage is also very important since this is where all your data is kept and depends on type, interface, and size of your internal storage. There can be two types here; SSD and HDD. Both have their pros and cons, but hard drives are a bit more dated and SSDs are faster.
The most popular storage interface right now is SATA 2.5”. It even comes in M2/PCIe style now. Storage size will depend on the kind of your storage you’re using. SSDs usually range from 128GB up to 1TB while hard drives can offer 4TB or even more.
Graphics Card
A good graphics card can make a very noticeable difference in performance. There are three types of graphics cards widely available. Integrated graphics cards are built into the CPU, such as the Intel HD-series, and are perfect for everyday use and even some low-key gaming.
If your gaming is going to be more intense, go for a mobile graphics card such as the RTX 2060/70/80 Max-Q. This is quite expensive though, and a more budget-friendly option is the GTX 1660 Ti, but it does come with some performance loss.
Professional graphics cards are like gaming cards with a few tweaks. They’re meant to be used for tasks such as 3D imaging and heavy video editing. This category is so expensive though that you shouldn’t look into it unless you absolutely need to.
Display
You’re going to spend so much time looking at your laptop’s display, and the kind of display you have will determine how much you enjoy working on your laptop. Display size and resolution are both important.
You can pick a display from 10” to 17”, but choose wisely because this will impact overall laptop size. We recommend going for a 15” inch screen to maximize both performance and portability. Whether you go higher or lower will depend completely on your needs.
The number of pixels on a screen determine screen resolution. Some manufacturers, like Apple, market resolution as ‘retina’, but don’t let this jargon confuse you. Most mainstream laptops use 4K resolution, which is equivalent to Apple’s retina (MacBook Pro actually has a lover resolution than 4K).
Other things that can affect your experience in the way that display does include additional laptop features like fingerprint readers and network cards. Some pre-built laptops have these things; some do not, but since you’re building your own anyway, why not go all-in?
How to Build Your Own Laptop
Once you’ve decided on all the details, it’s time to assemble your masterpiece. We’ve broken it down as simply as possible, but remember that you can always get professional help if you find yourself stuck.
• Other than your components, make sure to have your tools at hand. You’ll need delicate ones like needle-nose pliers and magnetic screwdrivers. Remember to wear an anti-static wristband while working so you don’t ruin any parts with static. Grip tape is helpful where pressure needs to be applied without damaging components.
• Before you start working, come up with a way to keep track of everything so you don’t lose time later (and end up getting too frustrated to work). This is especially important given all the small screws you’ll be dealing with.
• Start by removing each panel from your shell one by one, starting at the bottom. This is where all the parts go.
• Starting with the hard drive, mount it onto the bracket in its panel and secure with screws.
• After removing the motherboard panel, insert your memory into its respective slot. You will feel it click into place (if it doesn’t, try the other direction)
• One corner of the CPU will be missing pins; this is what you need to align with the notch in its respective panel. Once inserted, lock it into position.
• Now insert the cooling fan, making sure that it has some thermal paste applied to the bottom. You will need to line it up with the exhaust and/or dust filters in your shell (shells can have different designs) and angle the heatsink into the correct position.
• When inserting components like the CPU and hard drive, be very careful about not bending the pins. Take your time.
• Once everything is in place, you can attach the power cable to the motherboard and screw all the panels back into place (you’ll thank yourself for keeping track of all the screws now).
• Insert the battery and start up the laptop. First things first, run a memory test to see that your RAM is working. You can use the BIOS.
• Once everything looks good, you can install your operating system and voila! You’re done.
To Conclude: Is It Worth The Effort?
The short answer is: probably not. To be frank, a lot could go wrong if you’ve never done something like this before. If you’re happy with what a pre-built laptop can offer you (which is enough for most people), then probably don’t do this.
Drawbacks are, however, relative. If you really need a custom laptop and you’re a techie with some experience assembling machinery (and you’re also feeling adventurous), then go ahead and sink your teeth in!
About author
A finance major with a passion for all things tech, Uneeb loves to write about everything from hardware to games (his favorite genre being FPS). When not writing, he can be seen in his natural habitat reading, studying investments, or watching Formula 1.
Related posts
Computing
Are Power Cuts and Surges Dangerous for The PC? And How To Protect Your PC
How ToSoftware
How to Remove Bloatware
How ToStorage
How to Format Your External Hard Drive
How ToSoftware
How to Transfer Photos from Android to Computer
Leave a Reply
Your email address will not be published. Required fields are marked *
|
{
"url": "https://www.thetechlounge.com/how-to-build-a-laptop/",
"source_domain": "www.thetechlounge.com",
"snapshot_id": "crawl=CC-MAIN-2021-43",
"warc_metadata": {
"Content-Length": "86381",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:6CYRKTMYOJ6PJGADNWZVE6SB3JSRMJK7",
"WARC-Concurrent-To": "<urn:uuid:d9512f97-cbc7-46aa-8d0b-4ca7cc3f2b4e>",
"WARC-Date": "2021-10-23T10:31:52Z",
"WARC-IP-Address": "35.209.215.106",
"WARC-Identified-Payload-Type": "text/html",
"WARC-Payload-Digest": "sha1:3PQGGSIK3WBCUTSADDOJM6BKTIGNI5EG",
"WARC-Record-ID": "<urn:uuid:a864ec6e-1caf-4b4b-870e-63972be8c9f9>",
"WARC-Target-URI": "https://www.thetechlounge.com/how-to-build-a-laptop/",
"WARC-Truncated": null,
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:e36e195d-8e74-4157-8ed3-c8f0bcd95142>"
},
"warc_info": "isPartOf: CC-MAIN-2021-43\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for October 2021\r\noperator: Common Crawl Admin ([email protected])\r\nhostname: ip-10-67-67-88\r\nsoftware: Apache Nutch 1.18 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.2-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: https://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/"
}
|
{
"line_start_idx": [
0,
14,
15,
37,
38,
60,
61,
62,
402,
403,
499,
500,
794,
795,
1154,
1155,
1191,
1192,
1582,
1583,
1610,
1611,
1838,
1839,
1851,
1852,
2082,
2083,
2427,
2428,
2438,
2439,
2704,
2705,
3068,
3069,
3076,
3077,
3370,
3371,
3583,
3584,
3592,
3593,
3885,
3886,
4134,
4135,
4149,
4150,
4425,
4426,
4665,
4666,
4914,
4915,
4923,
4924,
5132,
5133,
5393,
5394,
5694,
5695,
5965,
5966,
5995,
5996,
6203,
6204,
6533,
6764,
6881,
6978,
7140,
7297,
7560,
7679,
7868,
8009,
8103,
8104,
8141,
8142,
8383,
8384,
8592,
8593,
8606,
8607,
8862,
8876,
8886,
8887,
8962,
8963,
8978,
8979,
9003,
9004,
9018,
9019,
9058,
9059,
9074,
9075,
9123,
9124,
9138,
9139
],
"line_end_idx": [
14,
15,
37,
38,
60,
61,
62,
402,
403,
499,
500,
794,
795,
1154,
1155,
1191,
1192,
1582,
1583,
1610,
1611,
1838,
1839,
1851,
1852,
2082,
2083,
2427,
2428,
2438,
2439,
2704,
2705,
3068,
3069,
3076,
3077,
3370,
3371,
3583,
3584,
3592,
3593,
3885,
3886,
4134,
4135,
4149,
4150,
4425,
4426,
4665,
4666,
4914,
4915,
4923,
4924,
5132,
5133,
5393,
5394,
5694,
5695,
5965,
5966,
5995,
5996,
6203,
6204,
6533,
6764,
6881,
6978,
7140,
7297,
7560,
7679,
7868,
8009,
8103,
8104,
8141,
8142,
8383,
8384,
8592,
8593,
8606,
8607,
8862,
8876,
8886,
8887,
8962,
8963,
8978,
8979,
9003,
9004,
9018,
9019,
9058,
9059,
9074,
9075,
9123,
9124,
9138,
9139,
9209
]
}
|
{
"red_pajama_v2": {
"ccnet_original_length": 9209,
"ccnet_original_nlines": 109,
"rps_doc_curly_bracket": 0,
"rps_doc_ldnoobw_words": 0,
"rps_doc_lorem_ipsum": 0,
"rps_doc_stop_word_fraction": 0.4514944851398468,
"rps_doc_ut1_blacklist": 0,
"rps_doc_frac_all_caps_words": 0.01940220035612583,
"rps_doc_frac_lines_end_with_ellipsis": 0,
"rps_doc_frac_no_alph_words": 0.1421080231666565,
"rps_doc_frac_unique_words": 0.36545681953430176,
"rps_doc_mean_word_length": 4.583229064941406,
"rps_doc_num_sentences": 96,
"rps_doc_symbol_to_word_ratio": 0,
"rps_doc_unigram_entropy": 5.622957229614258,
"rps_doc_word_count": 1598,
"rps_doc_frac_chars_dupe_10grams": 0,
"rps_doc_frac_chars_dupe_5grams": 0.008738390170037746,
"rps_doc_frac_chars_dupe_6grams": 0,
"rps_doc_frac_chars_dupe_7grams": 0,
"rps_doc_frac_chars_dupe_8grams": 0,
"rps_doc_frac_chars_dupe_9grams": 0,
"rps_doc_frac_chars_top_2gram": 0.009011469781398773,
"rps_doc_frac_chars_top_3gram": 0.004369200207293034,
"rps_doc_frac_chars_top_4gram": 0.005734569858759642,
"rps_doc_books_importance": -897.1015625,
"rps_doc_books_importance_length_correction": -897.1015625,
"rps_doc_openwebtext_importance": -502.711669921875,
"rps_doc_openwebtext_importance_length_correction": -502.711669921875,
"rps_doc_wikipedia_importance": -343.75286865234375,
"rps_doc_wikipedia_importance_length_correction": -343.75286865234375
},
"fasttext": {
"dclm": 0.1036713719367981,
"english": 0.9451668858528137,
"fineweb_edu_approx": 1.8655900955200195,
"eai_general_math": 0.03890020027756691,
"eai_open_web_math": 0.16040784120559692,
"eai_web_code": 0.038750771433115005
}
}
|
{
"free_decimal_correspondence": {
"primary": {
"code": "004.16",
"labels": {
"level_1": "General works, books and libraries, information sciences",
"level_2": "",
"level_3": "Computers and Computer science"
}
},
"secondary": {
"code": "621.392",
"labels": {
"level_1": "Industrial arts, Technology, and Engineering",
"level_2": "Engineering",
"level_3": "Mechanical engineering and Machinery"
}
}
},
"bloom_cognitive_process": {
"primary": {
"code": "3",
"label": "Apply"
},
"secondary": {
"code": "2",
"label": "Understand"
}
},
"bloom_knowledge_domain": {
"primary": {
"code": "3",
"label": "Procedural"
},
"secondary": {
"code": "2",
"label": "Conceptual"
}
},
"document_type_v1": {
"primary": {
"code": "3",
"label": "Reference/Encyclopedic/Educational"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"extraction_artifacts": {
"primary": {
"code": "3",
"label": "Irrelevant Content"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"missing_content": {
"primary": {
"code": "0",
"label": "No missing content"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"document_type_v2": {
"primary": {
"code": "23",
"label": "Tutorial"
},
"secondary": {
"code": "10",
"label": "Knowledge Article"
}
},
"reasoning_depth": {
"primary": {
"code": "2",
"label": "Basic Reasoning"
},
"secondary": {
"code": "3",
"label": "Intermediate Reasoning"
}
},
"technical_correctness": {
"primary": {
"code": "3",
"label": "Mostly Correct"
},
"secondary": {
"code": "4",
"label": "Highly Correct"
}
},
"education_level": {
"primary": {
"code": "2",
"label": "High School Level"
},
"secondary": {
"code": "1",
"label": "General Audience"
}
}
}
|
672f1e42c33a7f9846924a2431ea77df
|
5,011,364,787,652,315,000 |
Skip to main content
Code42 Support
Code42 API Authentication Methods
Applies to:
• CrashPlan PRO
• CrashPlan PROe
Overview
Every request to the Code42 API must be authenticated. This article describes the available Code42 API authentication methods and provides examples of their use.
The examples in this article use curl, but the concepts apply to other tools that can be used to interact with the Code42 API.
Comparison of Code42 API authentication methods
The Code42 API offers the following authentication methods:
• Basic: You provide your username and password to authenticate each API request.
• Token: You obtain a temporary authentication token that is good for 30 minutes and use it to authenticate API requests.
The following table describes the advantages and disadvantages of each authentication method:
Authentication Method Advantages Disadvantages
Basic Simple to use Passwords may be saved in the history of your tool
Token
• Better performance
• Better security (tokens expire in 30 minutes)
More complex to use
Using basic authentication
To use basic authentication, include your username and password in the API request.
curl -X GET -u "username:password" https://master-server.example.com:4285/api/Computer
Interactive authentication
If you do not want your password to appear in your command history, you can omit the password from the initial API request and enter your password when prompted.
Using token authentication
You can use a token to authenticate API requests instead of a username and password. Token authentication offers better performance than basic authentication, and does not require entering your password each time. Tokens expire in 30 minutes.
Step 1: Get the token
1. Use basic authentication to get the token by sending a POST to the authToken resource:
curl -X POST -u "username:password" https://master-server.example.com:4285/api/authToken | python -m json.tool
2. In the output of the API request, locate the two authentication tokens in the data element:
{
"data": [
"05oteh6q894290b6vucyuk5tl7",
"1c6r5o1nbb6y60h4t1axft06pn"
],
"metadata": {
"params": {},
"timestamp": "2015-03-30T16:50:02.115-05:00"
}
}
Step 2: Use the token to authenticate subsequent API requests
Make an API request that uses the token by including --header "Authorization: token <token1>-<token2>" in the request:
curl -X GET --header "Authorization: token 05oteh6q894290b6vucyuk5tl7-1c6r5o1nbb6y60h4t1axft06pn" https://master-server.example.com:4285/api/Computer
|
{
"url": "https://support.code42.com/Administrator/3/Monitoring_And_Managing/Introduction_To_The_Code42_API/Code42_API_Authentication_Methods",
"source_domain": "support.code42.com",
"snapshot_id": "crawl=CC-MAIN-2017-22",
"warc_metadata": {
"Content-Length": "60346",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:RULBWOPFJO5NKB3TRQHG5IKEU4AGMG2L",
"WARC-Concurrent-To": "<urn:uuid:bc74f4e2-f7c9-4d3a-a689-1ab59a83d750>",
"WARC-Date": "2017-05-29T02:12:41Z",
"WARC-IP-Address": "184.72.253.83",
"WARC-Identified-Payload-Type": "text/html",
"WARC-Payload-Digest": "sha1:3CXZBMBMBSA4DTMQKA3RRSOSNB2UURNI",
"WARC-Record-ID": "<urn:uuid:01f2c31d-d4c4-4565-87da-54ec3a6b67cd>",
"WARC-Target-URI": "https://support.code42.com/Administrator/3/Monitoring_And_Managing/Introduction_To_The_Code42_API/Code42_API_Authentication_Methods",
"WARC-Truncated": null,
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:f1a0bc0c-d4f6-4438-88dd-17879463a99c>"
},
"warc_info": "robots: classic\r\nhostname: ip-10-185-224-210.ec2.internal\r\nsoftware: Nutch 1.6 (CC)/CC WarcExport 1.0\r\nisPartOf: CC-MAIN-2017-22\r\noperator: Common Crawl Admin\r\ndescription: Wide crawl of the web for May 2017\r\npublisher: Common Crawl\r\nformat: WARC File Format 1.0\r\nconformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf"
}
|
{
"line_start_idx": [
0,
21,
36,
37,
71,
72,
84,
102,
121,
122,
131,
132,
294,
295,
422,
423,
471,
472,
532,
533,
617,
741,
742,
836,
837,
884,
955,
961,
984,
1034,
1054,
1055,
1082,
1083,
1167,
1168,
1255,
1282,
1444,
1445,
1472,
1473,
1716,
1717,
1739,
1740,
1832,
1947,
1952,
2049,
2055,
2073,
2115,
2156,
2167,
2189,
2215,
2272,
2282,
2288,
2293,
2298,
2299,
2361,
2362,
2481,
2482
],
"line_end_idx": [
21,
36,
37,
71,
72,
84,
102,
121,
122,
131,
132,
294,
295,
422,
423,
471,
472,
532,
533,
617,
741,
742,
836,
837,
884,
955,
961,
984,
1034,
1054,
1055,
1082,
1083,
1167,
1168,
1255,
1282,
1444,
1445,
1472,
1473,
1716,
1717,
1739,
1740,
1832,
1947,
1952,
2049,
2055,
2073,
2115,
2156,
2167,
2189,
2215,
2272,
2282,
2288,
2293,
2298,
2299,
2361,
2362,
2481,
2482,
2631
]
}
|
{
"red_pajama_v2": {
"ccnet_original_length": 2631,
"ccnet_original_nlines": 66,
"rps_doc_curly_bracket": 0.002280500018969178,
"rps_doc_ldnoobw_words": 0,
"rps_doc_lorem_ipsum": 0,
"rps_doc_stop_word_fraction": 0.2693110704421997,
"rps_doc_ut1_blacklist": 0,
"rps_doc_frac_all_caps_words": 0.04801670089364052,
"rps_doc_frac_lines_end_with_ellipsis": 0,
"rps_doc_frac_no_alph_words": 0.2630480229854584,
"rps_doc_frac_unique_words": 0.40816327929496765,
"rps_doc_mean_word_length": 5.877551078796387,
"rps_doc_num_sentences": 21,
"rps_doc_symbol_to_word_ratio": 0,
"rps_doc_unigram_entropy": 4.4642109870910645,
"rps_doc_word_count": 343,
"rps_doc_frac_chars_dupe_10grams": 0,
"rps_doc_frac_chars_dupe_5grams": 0.02281746082007885,
"rps_doc_frac_chars_dupe_6grams": 0,
"rps_doc_frac_chars_dupe_7grams": 0,
"rps_doc_frac_chars_dupe_8grams": 0,
"rps_doc_frac_chars_dupe_9grams": 0,
"rps_doc_frac_chars_top_2gram": 0.02678571082651615,
"rps_doc_frac_chars_top_3gram": 0.0342261902987957,
"rps_doc_frac_chars_top_4gram": 0.0446428582072258,
"rps_doc_books_importance": -208.01014709472656,
"rps_doc_books_importance_length_correction": -208.01014709472656,
"rps_doc_openwebtext_importance": -104.0290756225586,
"rps_doc_openwebtext_importance_length_correction": -104.0290756225586,
"rps_doc_wikipedia_importance": -104.44014739990234,
"rps_doc_wikipedia_importance_length_correction": -104.44014739990234
},
"fasttext": {
"dclm": 0.09256172180175781,
"english": 0.7475702166557312,
"fineweb_edu_approx": 2.6243717670440674,
"eai_general_math": 0.042849719524383545,
"eai_open_web_math": 0.06920629739761353,
"eai_web_code": 0.6381054520606995
}
}
|
{
"free_decimal_correspondence": {
"primary": {
"code": "005.1",
"labels": {
"level_1": "General works, books and libraries, information sciences",
"level_2": "",
"level_3": "Computer programming"
}
},
"secondary": {
"code": "004.678",
"labels": {
"level_1": "General works, books and libraries, information sciences",
"level_2": "",
"level_3": "Computers and Computer science"
}
}
},
"bloom_cognitive_process": {
"primary": {
"code": "3",
"label": "Apply"
},
"secondary": {
"code": "2",
"label": "Understand"
}
},
"bloom_knowledge_domain": {
"primary": {
"code": "3",
"label": "Procedural"
},
"secondary": {
"code": "2",
"label": "Conceptual"
}
},
"document_type_v1": {
"primary": {
"code": "3",
"label": "Reference/Encyclopedic/Educational"
},
"secondary": {
"code": "4",
"label": "Code/Software"
}
},
"extraction_artifacts": {
"primary": {
"code": "0",
"label": "No Artifacts"
},
"secondary": {
"code": "3",
"label": "Irrelevant Content"
}
},
"missing_content": {
"primary": {
"code": "0",
"label": "No missing content"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"document_type_v2": {
"primary": {
"code": "8",
"label": "Documentation"
},
"secondary": {
"code": "23",
"label": "Tutorial"
}
},
"reasoning_depth": {
"primary": {
"code": "2",
"label": "Basic Reasoning"
},
"secondary": {
"code": "3",
"label": "Intermediate Reasoning"
}
},
"technical_correctness": {
"primary": {
"code": "4",
"label": "Highly Correct"
},
"secondary": {
"code": "3",
"label": "Mostly Correct"
}
},
"education_level": {
"primary": {
"code": "3",
"label": "Undergraduate Level"
},
"secondary": {
"code": "4",
"label": "Graduate/Expert Level"
}
}
}
|
672f1e42c33a7f9846924a2431ea77df
|
6,513,808,262,813,636,000 |
Old
Inside an ensure Post-Condition block, the old operator can be used to refer to the original value a parameter, Field or Property had at the beginning of the method. This can be useful for checking the validity of the result compared to the previous state. Note that for heap-based Reference Types (except Strings such as Classes, which receive special handling), the old operator only captures the old reference, but not the old state of the object it contains.
method MyClass.IncrementCount(aBy: Int32);
require
aBy > 0;
begin
fCount := fCount + aBy
ensure
fCount - aBy = old fCount;
end;
See Also
|
{
"url": "https://docs.elementscompiler.com/Oxygene/Expressions/Old/",
"source_domain": "docs.elementscompiler.com",
"snapshot_id": "crawl=CC-MAIN-2020-34",
"warc_metadata": {
"Content-Length": "18898",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:VHE25YEFCWXJONGQYLVSECWSILVPQGRL",
"WARC-Concurrent-To": "<urn:uuid:288bcf5f-0093-400e-90c2-7c506d5eaadf>",
"WARC-Date": "2020-08-04T22:13:19Z",
"WARC-IP-Address": "23.21.168.167",
"WARC-Identified-Payload-Type": "text/html",
"WARC-Payload-Digest": "sha1:4FQBHYZ7VSLCEEZS6SZ4EOWRUAKV7DS5",
"WARC-Record-ID": "<urn:uuid:bf66d1fb-2839-4d84-8fc2-1768a95545ba>",
"WARC-Target-URI": "https://docs.elementscompiler.com/Oxygene/Expressions/Old/",
"WARC-Truncated": null,
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:1416b04e-2473-42b6-a5f3-1f2c4ca3448c>"
},
"warc_info": "isPartOf: CC-MAIN-2020-34\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for August 2020\r\noperator: Common Crawl Admin ([email protected])\r\nhostname: ip-10-67-67-82.ec2.internal\r\nsoftware: Apache Nutch 1.17 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.2-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/"
}
|
{
"line_start_idx": [
0,
1,
5,
6,
469,
470,
513,
521,
532,
538,
563,
570,
599,
604,
605
],
"line_end_idx": [
1,
5,
6,
469,
470,
513,
521,
532,
538,
563,
570,
599,
604,
605,
613
]
}
|
{
"red_pajama_v2": {
"ccnet_original_length": 613,
"ccnet_original_nlines": 14,
"rps_doc_curly_bracket": 0,
"rps_doc_ldnoobw_words": 0,
"rps_doc_lorem_ipsum": 0,
"rps_doc_stop_word_fraction": 0.3709677457809448,
"rps_doc_ut1_blacklist": 0,
"rps_doc_frac_all_caps_words": 0,
"rps_doc_frac_lines_end_with_ellipsis": 0,
"rps_doc_frac_no_alph_words": 0.19354839622974396,
"rps_doc_frac_unique_words": 0.6701030731201172,
"rps_doc_mean_word_length": 4.907216548919678,
"rps_doc_num_sentences": 5,
"rps_doc_symbol_to_word_ratio": 0,
"rps_doc_unigram_entropy": 3.91852068901062,
"rps_doc_word_count": 97,
"rps_doc_frac_chars_dupe_10grams": 0,
"rps_doc_frac_chars_dupe_5grams": 0,
"rps_doc_frac_chars_dupe_6grams": 0,
"rps_doc_frac_chars_dupe_7grams": 0,
"rps_doc_frac_chars_dupe_8grams": 0,
"rps_doc_frac_chars_dupe_9grams": 0,
"rps_doc_frac_chars_top_2gram": 0.05042016878724098,
"rps_doc_frac_chars_top_3gram": 0.05882352963089943,
"rps_doc_frac_chars_top_4gram": 0,
"rps_doc_books_importance": -41.16480255126953,
"rps_doc_books_importance_length_correction": -54.22092056274414,
"rps_doc_openwebtext_importance": -19.91545295715332,
"rps_doc_openwebtext_importance_length_correction": -32.9715690612793,
"rps_doc_wikipedia_importance": -18.062734603881836,
"rps_doc_wikipedia_importance_length_correction": -31.118850708007812
},
"fasttext": {
"dclm": 0.8745583295822144,
"english": 0.8763797283172607,
"fineweb_edu_approx": 2.5723397731781006,
"eai_general_math": 0.7552317380905151,
"eai_open_web_math": 0.16846054792404175,
"eai_web_code": 0.9953114986419678
}
}
|
{
"free_decimal_correspondence": {
"primary": {
"code": "005.1332",
"labels": {
"level_1": "General works, books and libraries, information sciences",
"level_2": "",
"level_3": "Computer programming"
}
},
"secondary": {
"code": "005.133",
"labels": {
"level_1": "General works, books and libraries, information sciences",
"level_2": "",
"level_3": "Computer programming"
}
}
},
"bloom_cognitive_process": {
"primary": {
"code": "2",
"label": "Understand"
},
"secondary": {
"code": "3",
"label": "Apply"
}
},
"bloom_knowledge_domain": {
"primary": {
"code": "2",
"label": "Conceptual"
},
"secondary": {
"code": "3",
"label": "Procedural"
}
},
"document_type_v1": {
"primary": {
"code": "3",
"label": "Reference/Encyclopedic/Educational"
},
"secondary": {
"code": "4",
"label": "Code/Software"
}
},
"extraction_artifacts": {
"primary": {
"code": "0",
"label": "No Artifacts"
},
"secondary": {
"code": "3",
"label": "Irrelevant Content"
}
},
"missing_content": {
"primary": {
"code": "0",
"label": "No missing content"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"document_type_v2": {
"primary": {
"code": "8",
"label": "Documentation"
},
"secondary": {
"code": "10",
"label": "Knowledge Article"
}
},
"reasoning_depth": {
"primary": {
"code": "2",
"label": "Basic Reasoning"
},
"secondary": {
"code": "3",
"label": "Intermediate Reasoning"
}
},
"technical_correctness": {
"primary": {
"code": "4",
"label": "Highly Correct"
},
"secondary": {
"code": "3",
"label": "Mostly Correct"
}
},
"education_level": {
"primary": {
"code": "3",
"label": "Undergraduate Level"
},
"secondary": {
"code": "4",
"label": "Graduate/Expert Level"
}
}
}
|
672f1e42c33a7f9846924a2431ea77df
|
2,218,313,791,803,970,600 |
Answers
2014-08-05T20:09:40+05:30
This Is a Certified Answer
×
Certified answers contain reliable, trustworthy information vouched for by a hand-picked team of experts. Brainly has millions of high quality answers, all of them carefully moderated by our most trusted community members, but certified answers are the finest of the finest.
Sinx + sin2x = 1
2 sin 3x/2 cos x/2 = 1
cos x/2 = 1 / (2 sin 3x/2 )
cos x + cos 2x = 2 cos x/2 cos 3x/2 substitute value of cos x/2 from above
= cos 3x/2 / sin 3x/2 = COT 3x/2
0
put x=(pi/2) in the given equation..
it satisfies the eqn.. thus put x=pi/2 in cosx + cos2x..
There are two solutions to the problem. x = 20.353445 deg and 90 deg. At x=90 deg. cosx+cos2x= -1= cot 3Pi/4 . at x=20.353445 deg, cosx+cos2x=1.695 = cot 30.53 deg . So cot 3x/2 satisfies both solutions.
please give your rating to the answer.
|
{
"url": "https://brainly.in/question/31128",
"source_domain": "brainly.in",
"snapshot_id": "crawl=CC-MAIN-2017-04",
"warc_metadata": {
"Content-Length": "60538",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:4FQBNJBKBVZ6CSCHISMJKJCZ53BHNDLM",
"WARC-Concurrent-To": "<urn:uuid:05a657e5-fb8a-4242-9ce2-879f699244bf>",
"WARC-Date": "2017-01-19T07:08:47Z",
"WARC-IP-Address": "104.16.20.135",
"WARC-Identified-Payload-Type": null,
"WARC-Payload-Digest": "sha1:7W7S6NCFKM3CFB2WYCWD4EIVIBL54QG4",
"WARC-Record-ID": "<urn:uuid:24552d91-e78b-49a9-977b-60726ca3eed2>",
"WARC-Target-URI": "https://brainly.in/question/31128",
"WARC-Truncated": "length",
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:c9a2254b-ee4c-4b35-ad07-723ce892187b>"
},
"warc_info": "robots: classic\r\nhostname: ip-10-171-10-70.ec2.internal\r\nsoftware: Nutch 1.6 (CC)/CC WarcExport 1.0\r\nisPartOf: CC-MAIN-2017-04\r\noperator: CommonCrawl Admin\r\ndescription: Wide crawl of the web for January 2017\r\npublisher: CommonCrawl\r\nformat: WARC File Format 1.0\r\nconformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf"
}
|
{
"line_start_idx": [
0,
8,
9,
35,
36,
63,
64,
66,
341,
358,
383,
411,
412,
489,
528,
530,
567,
624,
828
],
"line_end_idx": [
8,
9,
35,
36,
63,
64,
66,
341,
358,
383,
411,
412,
489,
528,
530,
567,
624,
828,
866
]
}
|
{
"red_pajama_v2": {
"ccnet_original_length": 866,
"ccnet_original_nlines": 18,
"rps_doc_curly_bracket": 0,
"rps_doc_ldnoobw_words": 0,
"rps_doc_lorem_ipsum": 0,
"rps_doc_stop_word_fraction": 0.21074379980564117,
"rps_doc_ut1_blacklist": 0,
"rps_doc_frac_all_caps_words": 0.008264459669589996,
"rps_doc_frac_lines_end_with_ellipsis": 0,
"rps_doc_frac_no_alph_words": 0.43801653385162354,
"rps_doc_frac_unique_words": 0.6013985872268677,
"rps_doc_mean_word_length": 4.356643199920654,
"rps_doc_num_sentences": 16,
"rps_doc_symbol_to_word_ratio": 0,
"rps_doc_unigram_entropy": 4.213251113891602,
"rps_doc_word_count": 143,
"rps_doc_frac_chars_dupe_10grams": 0,
"rps_doc_frac_chars_dupe_5grams": 0.03531299903988838,
"rps_doc_frac_chars_dupe_6grams": 0,
"rps_doc_frac_chars_dupe_7grams": 0,
"rps_doc_frac_chars_dupe_8grams": 0,
"rps_doc_frac_chars_dupe_9grams": 0,
"rps_doc_frac_chars_top_2gram": 0.03210273012518883,
"rps_doc_frac_chars_top_3gram": 0.016051359474658966,
"rps_doc_frac_chars_top_4gram": 0.025682179257273674,
"rps_doc_books_importance": -136.8611297607422,
"rps_doc_books_importance_length_correction": -136.8611297607422,
"rps_doc_openwebtext_importance": -45.48258590698242,
"rps_doc_openwebtext_importance_length_correction": -40.33247375488281,
"rps_doc_wikipedia_importance": -29.293743133544922,
"rps_doc_wikipedia_importance_length_correction": -29.293743133544922
},
"fasttext": {
"dclm": 0.7056878209114075,
"english": 0.7802743911743164,
"fineweb_edu_approx": 1.2472161054611206,
"eai_general_math": 0.9103732109069824,
"eai_open_web_math": 0.913647472858429,
"eai_web_code": 0.07745093107223511
}
}
|
{
"free_decimal_correspondence": {
"primary": {
"code": "516.24",
"labels": {
"level_1": "Science and Natural history",
"level_2": "Mathematics",
"level_3": "Geometry, Algebraic"
}
},
"secondary": {
"code": "510",
"labels": {
"level_1": "Science and Natural history",
"level_2": "Mathematics",
"level_3": ""
}
}
},
"bloom_cognitive_process": {
"primary": {
"code": "3",
"label": "Apply"
},
"secondary": {
"code": "2",
"label": "Understand"
}
},
"bloom_knowledge_domain": {
"primary": {
"code": "3",
"label": "Procedural"
},
"secondary": {
"code": "2",
"label": "Conceptual"
}
},
"document_type_v1": {
"primary": {
"code": "3",
"label": "Reference/Encyclopedic/Educational"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"extraction_artifacts": {
"primary": {
"code": "0",
"label": "No Artifacts"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"missing_content": {
"primary": {
"code": "0",
"label": "No missing content"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"document_type_v2": {
"primary": {
"code": "18",
"label": "Q&A Forum"
},
"secondary": {
"code": "23",
"label": "Tutorial"
}
},
"reasoning_depth": {
"primary": {
"code": "3",
"label": "Intermediate Reasoning"
},
"secondary": {
"code": "2",
"label": "Basic Reasoning"
}
},
"technical_correctness": {
"primary": {
"code": "4",
"label": "Highly Correct"
},
"secondary": {
"code": "3",
"label": "Mostly Correct"
}
},
"education_level": {
"primary": {
"code": "2",
"label": "High School Level"
},
"secondary": {
"code": "3",
"label": "Undergraduate Level"
}
}
}
|
672f1e42c33a7f9846924a2431ea77df
|
6,854,677,605,472,057,000 |
The Urgency of Cybersecurity: Protecting Your Digital Identity from Cyber Threats
In the vast and mesmerizing realm of the internet, where ideas soar free and connections know no bounds, a hidden battle wages on. An unseen army of cyber threats lurks in the shadows, tirelessly scheming and probing for vulnerabilities to exploit. As we dive deeper into the era of digital dependence, the urgency of cybersecurity becomes strikingly clear. Our digital identity, the very essence of who we are in this digital world, lies dangerously exposed to their relentless claws. In this rapidly evolving landscape, it has never been more imperative to fortify our defenses, to shield ourselves from the relentless onslaught of cyber invaders. Join us as we unravel the enigma of cyber threats and uncover the crucial measures necessary to preserve our digital identities – the keys to security in this virtual universe we call home.
Unmasking the Shadows: Safeguarding the Soul of Your Digital Existence
Title: Ensuring Cyber Security: Protecting Your Digital World
Introduction:
In today’s interconnected world, where almost every aspect of our lives relies on digital technology, understanding cyber security is of utmost importance. Cyber attacks, ransomware, and blackmailing incidents have become prevalent. They not only affect individuals but also pose threats to national security. Thus, it is crucial to be well-informed about online protection and to have reliable emergency response mechanisms in place. This article aims to provide comprehensive information on all aspects of cyber security while emphasizing how readers can detect attacks and, if needed, seek assistance from Nattytech, LLC, a competent cybersecurity company.
I. The Threat Landscape:
A. Types of Cyber Attacks:
– Discuss common cyber threats, including malware, phishing, and Distributed Denial of Service (DDoS) attacks.
– Explain the potential repercussions of such attacks (e.g., data breaches, financial loss, reputational damage).
B. Ransomware and Blackmailing:
– Define ransomware and its modus operandi.
– Highlight real-life examples of businesses and individuals impacted by ransomware attacks.
– Explain blackmailing techniques, such as sextortion, and the importance of protecting personal information.
II. National Security Concerns:
A. Importance of National Cybersecurity:
– Discuss the significance of protecting critical infrastructure, including governmental networks and defense systems.
- Highlight the potential consequences of cyber attacks on national security, such as economic disruption or compromised intelligence.
B. Cyber Warfare:
– Explain the concept of cyber warfare and its implications for international relations.
– Discuss the role of cybersecurity in countering cyber threats from hostile nations or non-state actors.
III. Online Protection Measures:
A. Creating Strong and Secure Passwords:
– Provide guidelines for creating strong passwords and the importance of avoiding common mistakes (e.g., using personal information).
– Recommend the use of password managers for added convenience and security.
B. Implementing Two-Factor Authentication (2FA):
– Explain the concept and benefits of 2FA in bolstering online security.
– Guide readers on how to enable 2FA for various accounts and devices.
C. Regular Software and System Updates:
– Emphasize the significance of keeping programs, devices, and operating systems up to date to patch vulnerabilities.
- Advise readers on enabling automatic updates and being cautious of fake update prompts.
IV. Detecting Cyber Attacks:
A. Recognizing Indicators of Attack:
– Outline common signs of a potential cyber attack, such as unusual online behavior, unexpected pop-ups, or slow device performance.
– Encourage readers to trust their instincts and look for abnormalities in their digital environment.
B. Seeking Expert Assistance:
– Introduce Nattytech, LLC, as an experienced cybersecurity company specializing in emergency cyber attack response and forensics.
– Provide contact details, such as phone number and website, for readers to reach out for professional assistance.
Conclusion:
Cybersecurity is not merely an individual concern but a collective responsibility to ensure national security and protect against malicious actors. By staying educated about cyber threats, implementing proper security measures, and seeking assistance from reliable companies like Nattytech, LLC, we can maintain a safer digital environment for everyone. Always remember that vigilance and proactive protection are our best defense against cyber attacks.
Q&A
Q: Why is cybersecurity an urgent matter in today’s digital age?
A: In a world heavily dependent on technology, cybersecurity plays a crucial role in safeguarding our digital identities from the ever-evolving cyber threats that lurk around every virtual corner. The urgency arises from the potential consequences of not prioritizing cybersecurity – data breaches, identity theft, financial losses, and even reputational damage.
Q: How can we protect our digital identity from cyber threats?
A: Understanding cyber threats is the first step towards protection. Implementing strong passwords and regularly updating them, using two-factor authentication, and being cautious of suspicious emails and phishing attempts are essential practices. Additionally, employing reputable security software, keeping all software up to date, and avoiding public Wi-Fi networks can significantly enhance our digital defenses.
Q: What are the potential consequences of neglecting cybersecurity?
A: Neglecting cybersecurity exposes one’s digital identity to various risks. Data breaches can lead to the compromise of personal information, leaving individuals vulnerable to identity theft and financial fraud. Cybercriminals can use this information to access bank accounts, commit fraud, or even sell it on the dark web. Furthermore, reputational damage is a potential consequence, as individuals, businesses, or organizations may lose trust and credibility in the eyes of customers and partners.
Q: How can individuals keep up with the constant evolution of cyber threats?
A: Staying informed and educated about emerging cyber threats is crucial for individuals. Regularly following reliable cybersecurity news sources, attending workshops or webinars, and educating oneself about safe online practices can help individuals adapt and stay ahead of cybercriminals. Additionally, cultivating a mindset of vigilance and being attentive to potential risks while using digital platforms can go a long way in protecting oneself.
Q: What steps can businesses take to prioritize cybersecurity?
A: Businesses should establish a dedicated cybersecurity team, responsible for identifying potential vulnerabilities, implementing robust security measures, and continuously monitoring for any suspicious activities. Regular employee training on cybersecurity best practices is essential, as the majority of cyber threats exploit human errors. Additionally, conducting routine audits, penetration testing, and implementing strong firewall and encryption protocols can enhance the overall security posture of a business.
Q: How can we encourage individuals and businesses to take cybersecurity seriously?
A: Raising awareness about the potential consequences of cyber threats, both personally and financially, is crucial. By highlighting real-life examples of cyber attacks and their aftermath, it becomes evident that investing time, effort, and resources into cybersecurity is a far more prudent choice than dealing with the ramifications of a breach. Regulatory compliance and addressing legal implications can also motivate individuals and businesses to take cybersecurity seriously.
Q: Are there any emerging technologies that can aid in cybersecurity efforts?
A: Indeed, emerging technologies offer promising prospects in the realm of cybersecurity. Artificial Intelligence (AI) and Machine Learning (ML) algorithms are being utilized to detect and respond to cyber threats in real-time. Blockchain technology has the potential to revolutionize data security by ensuring immutability and decentralization. Additionally, advancements in biometrics and multi-factor authentication systems provide enhanced security layers for valuable digital identities.
In a digital world that thrives on connectivity and convenience, the urgency of cybersecurity cannot be overstated. As cyber threats continue to evolve and infiltrate every aspect of our lives, protecting our digital identity becomes an imperative. From hackers to cybercriminals, the dangers are omnipresent, lurking in the shadows of the vast online realm.
But fear not, for with knowledge comes power, and by understanding the gravity of these threats, we can arm ourselves with the necessary tools to safeguard our digital personas. It is a battle fought on the invisible front lines, where vigilance and proactivity reign supreme. So let us embark on a journey, exploring the realms of cybersecurity, and discover the art of protecting our digital identities.
Just as a castle needs a sturdy fortress, our digital presence requires a formidable defense. We delve into the world of secure passwords, strong enough to withstand even the most cunning attacks. We learn to wield the shield of multi-factor authentication, an impenetrable barrier safeguarding our private information. And as we navigate the vast sea of unsolicited emails, we uncover the secrets to identifying phishing attempts, the treacherous bait used to reel in unsuspecting victims.
Furthermore, we explore the importance of regularly updating our software and operating systems, fortifying the weak spots that cybercriminals so eagerly exploit. We demystify the dark realm of malware, understanding how these malicious codes infiltrate our devices and compromise our cherished virtual existence.
But it’s not just about individual responsibility; the urgency of cybersecurity extends to our collective digital community. We shed light on the necessity of creating a culture of cyber hygiene, where education and awareness becomes the sword we wield against these digital marauders. Together, we can build a safer, more resilient online environment, one where privacy and security thrive hand in hand.
As we conclude our voyage through the intricate labyrinth of cyber threats, we are armed with the knowledge necessary to protect our digital identities from the ever-encroaching dangers of the virtual world. With a blend of caution, mindfulness, and technological expertise, we can fortify the walls of our digital castle, ensuring that our virtual existence remains out of reach from those who seek to exploit it.
So, fellow digital adventurers, let us embrace the urgency of cybersecurity with unwavering determination. By doing so, we unleash the power within us to navigate the treacherous waters that lie ahead, carving a path towards a safer, more secure future for all who call the digital realm their home.
Comments are closed.
|
{
"url": "https://nattytech.com/the-urgency-of-cybersecurity-protecting-your-digital-identity-from-cyber-threats/",
"source_domain": "nattytech.com",
"snapshot_id": "CC-MAIN-2023-50",
"warc_metadata": {
"Content-Length": "145944",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:4D4PQWHQDO3P3WNXH7MNX2FLH5ZX77OI",
"WARC-Concurrent-To": "<urn:uuid:e03308a1-5b49-4077-bb10-c25d562899d6>",
"WARC-Date": "2023-12-03T11:05:14Z",
"WARC-IP-Address": "154.41.250.18",
"WARC-Identified-Payload-Type": "text/html",
"WARC-Payload-Digest": "sha1:GAL54Q3ZJZTIXUZKLSAG6X6FAIZ3KO27",
"WARC-Record-ID": "<urn:uuid:dfae5fd1-da42-4b84-8797-d5c9a4cbbb39>",
"WARC-Target-URI": "https://nattytech.com/the-urgency-of-cybersecurity-protecting-your-digital-identity-from-cyber-threats/",
"WARC-Truncated": null,
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:5b436260-29b0-4e68-b131-ce96506f0f4e>"
},
"warc_info": "isPartOf: CC-MAIN-2023-50\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for November/December 2023\r\noperator: Common Crawl Admin ([email protected])\r\nhostname: ip-10-67-67-40\r\nsoftware: Apache Nutch 1.19 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.5-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: https://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/"
}
|
{
"line_start_idx": [
0,
82,
83,
940,
941,
1014,
1015,
1078,
1079,
1093,
1772,
1773,
1798,
1825,
1937,
2053,
2054,
2086,
2130,
2225,
2337,
2338,
2372,
2414,
2535,
2674,
2675,
2694,
2784,
2893,
2894,
2928,
2969,
3105,
3184,
3185,
3234,
3308,
3379,
3380,
3422,
3542,
3635,
3636,
3666,
3704,
3840,
3945,
3946,
3976,
4109,
4226,
4227,
4239,
4707,
4708,
4712,
4713,
4780,
5149,
5150,
5214,
5639,
5640,
5709,
6215,
6216,
6296,
6759,
6760,
6824,
7360,
7361,
7446,
7936,
7937,
8016,
8517,
8518,
8888,
8889,
9304,
9305,
9811,
9812,
10134,
10135,
10548,
10549,
10971,
10972,
11283,
11284
],
"line_end_idx": [
82,
83,
940,
941,
1014,
1015,
1078,
1079,
1093,
1772,
1773,
1798,
1825,
1937,
2053,
2054,
2086,
2130,
2225,
2337,
2338,
2372,
2414,
2535,
2674,
2675,
2694,
2784,
2893,
2894,
2928,
2969,
3105,
3184,
3185,
3234,
3308,
3379,
3380,
3422,
3542,
3635,
3636,
3666,
3704,
3840,
3945,
3946,
3976,
4109,
4226,
4227,
4239,
4707,
4708,
4712,
4713,
4780,
5149,
5150,
5214,
5639,
5640,
5709,
6215,
6216,
6296,
6759,
6760,
6824,
7360,
7361,
7446,
7936,
7937,
8016,
8517,
8518,
8888,
8889,
9304,
9305,
9811,
9812,
10134,
10135,
10548,
10549,
10971,
10972,
11283,
11284,
11304
]
}
|
{
"red_pajama_v2": {
"ccnet_original_length": 11304,
"ccnet_original_nlines": 92,
"rps_doc_curly_bracket": 0,
"rps_doc_ldnoobw_words": 0,
"rps_doc_lorem_ipsum": 0,
"rps_doc_stop_word_fraction": 0.2868735194206238,
"rps_doc_ut1_blacklist": 0,
"rps_doc_frac_all_caps_words": 0.01766110025346279,
"rps_doc_frac_lines_end_with_ellipsis": 0,
"rps_doc_frac_no_alph_words": 0.24057279527187347,
"rps_doc_frac_unique_words": 0.4865034520626068,
"rps_doc_mean_word_length": 5.910232067108154,
"rps_doc_num_sentences": 99,
"rps_doc_symbol_to_word_ratio": 0,
"rps_doc_unigram_entropy": 5.968446731567383,
"rps_doc_word_count": 1593,
"rps_doc_frac_chars_dupe_10grams": 0,
"rps_doc_frac_chars_dupe_5grams": 0.00573553005233407,
"rps_doc_frac_chars_dupe_6grams": 0,
"rps_doc_frac_chars_dupe_7grams": 0,
"rps_doc_frac_chars_dupe_8grams": 0,
"rps_doc_frac_chars_dupe_9grams": 0,
"rps_doc_frac_chars_top_2gram": 0.015294739976525307,
"rps_doc_frac_chars_top_3gram": 0.008497079834342003,
"rps_doc_frac_chars_top_4gram": 0.00796600989997387,
"rps_doc_books_importance": -954.8394165039062,
"rps_doc_books_importance_length_correction": -954.8394165039062,
"rps_doc_openwebtext_importance": -567.4046630859375,
"rps_doc_openwebtext_importance_length_correction": -567.4046630859375,
"rps_doc_wikipedia_importance": -333.4220275878906,
"rps_doc_wikipedia_importance_length_correction": -333.4220275878906
},
"fasttext": {
"dclm": 0.8478163480758667,
"english": 0.8636133670806885,
"fineweb_edu_approx": 2.898761749267578,
"eai_general_math": 0.01914238929748535,
"eai_open_web_math": 0.080691397190094,
"eai_web_code": 0.17599117755889893
}
}
|
{
"free_decimal_correspondence": {
"primary": {
"code": "005.8",
"labels": {
"level_1": "General works, books and libraries, information sciences",
"level_2": "",
"level_3": "Computer programming"
}
},
"secondary": {
"code": "363.3",
"labels": {
"level_1": "Social sciences",
"level_2": "Social service and Societies",
"level_3": "Political activists"
}
}
},
"bloom_cognitive_process": {
"primary": {
"code": "2",
"label": "Understand"
},
"secondary": {
"code": "3",
"label": "Apply"
}
},
"bloom_knowledge_domain": {
"primary": {
"code": "2",
"label": "Conceptual"
},
"secondary": {
"code": "3",
"label": "Procedural"
}
},
"document_type_v1": {
"primary": {
"code": "3",
"label": "Reference/Encyclopedic/Educational"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"extraction_artifacts": {
"primary": {
"code": "0",
"label": "No Artifacts"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"missing_content": {
"primary": {
"code": "0",
"label": "No missing content"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"document_type_v2": {
"primary": {
"code": "10",
"label": "Knowledge Article"
},
"secondary": {
"code": "9",
"label": "FAQ"
}
},
"reasoning_depth": {
"primary": {
"code": "2",
"label": "Basic Reasoning"
},
"secondary": {
"code": "3",
"label": "Intermediate Reasoning"
}
},
"technical_correctness": {
"primary": {
"code": "3",
"label": "Mostly Correct"
},
"secondary": {
"code": "4",
"label": "Highly Correct"
}
},
"education_level": {
"primary": {
"code": "1",
"label": "General Audience"
},
"secondary": {
"code": "2",
"label": "High School Level"
}
}
}
|
672f1e42c33a7f9846924a2431ea77df
|
4,447,766,947,888,683,000 |
apply_filters ( 'jetpack_photon_pre_args', array $args, string $image_url, string $scheme )
Filter the original Photon image parameters before Photon is applied to an image.
Source file: functions.photon.php
View in GitHub
Parameters
$args
(array) Array of Photon arguments.
$image_url
(string) Image URL.
$scheme
(string) Image scheme. Default to null.
Changelog
Since: Jetpack 1.9.0
Notes
You can use this filter to change the Photon parameters used for images on your site, like so:
function jeherve_custom_photon( $args ) {
$args['quality'] = 80;
$args['strip'] = 'all';
$args['filter'] = 'grayscale';
return $args;
}
add_filter( 'jetpack_photon_pre_args', 'jeherve_custom_photon' );
Have a note to contribute?
Fill in your details below or click an icon to log in:
WordPress.com Logo
You are commenting using your WordPress.com account. Log Out / Change )
Google+ photo
You are commenting using your Google+ account. Log Out / Change )
Twitter picture
You are commenting using your Twitter account. Log Out / Change )
Facebook photo
You are commenting using your Facebook account. Log Out / Change )
w
Connecting to %s
Comments
1. wolfincage says:
How would we use it for only images inside a post?
2. khurramar says:
Just added this script in my plugin and it works great. However it also converted the URLs in “a” tag. For example an image wrapped into an anchor “a” tag for opening full size version of the image. In result, when a query string is added at the end of the image link, the lightbox stopped working.
Can we restrict this to apply to only tags and not other tags?
|
{
"url": "https://developer.jetpack.com/hooks/jetpack_photon_pre_args/",
"source_domain": "developer.jetpack.com",
"snapshot_id": "crawl=CC-MAIN-2018-26",
"warc_metadata": {
"Content-Length": "56065",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:BFRY6EFVMHVRQATDQVNEUSWNJS3GYLQS",
"WARC-Concurrent-To": "<urn:uuid:7250942e-b1eb-4550-879c-bcefdb29ab07>",
"WARC-Date": "2018-06-25T07:34:52Z",
"WARC-IP-Address": "192.0.78.12",
"WARC-Identified-Payload-Type": "text/html",
"WARC-Payload-Digest": "sha1:36KLIQKY6AR7LAMCCE527LTROBT6FFOM",
"WARC-Record-ID": "<urn:uuid:80ebb487-a22d-4d68-af90-a3bcb0f5de7b>",
"WARC-Target-URI": "https://developer.jetpack.com/hooks/jetpack_photon_pre_args/",
"WARC-Truncated": null,
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:ef978b31-5c3b-4330-95ee-e71654c35399>"
},
"warc_info": "robots: classic\r\nhostname: ip-10-91-167-62.ec2.internal\r\nsoftware: Nutch 1.6 (CC)\r\nisPartOf: CC-MAIN-2018-26\r\noperator: Common Crawl Admin\r\ndescription: Wide crawl of the web for June 2018\r\npublisher: Common Crawl\r\nformat: WARC File Format 1.0\r\nconformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf"
}
|
{
"line_start_idx": [
0,
92,
93,
175,
176,
210,
211,
226,
227,
238,
239,
245,
246,
281,
282,
293,
294,
314,
315,
323,
324,
364,
365,
366,
376,
377,
398,
399,
400,
406,
407,
502,
503,
545,
572,
602,
638,
656,
658,
724,
725,
752,
753,
808,
809,
828,
829,
902,
903,
917,
918,
985,
986,
1002,
1003,
1070,
1071,
1086,
1087,
1155,
1156,
1158,
1159,
1176,
1177,
1186,
1187,
1209,
1210,
1265,
1266,
1287,
1288,
1591,
1592
],
"line_end_idx": [
92,
93,
175,
176,
210,
211,
226,
227,
238,
239,
245,
246,
281,
282,
293,
294,
314,
315,
323,
324,
364,
365,
366,
376,
377,
398,
399,
400,
406,
407,
502,
503,
545,
572,
602,
638,
656,
658,
724,
725,
752,
753,
808,
809,
828,
829,
902,
903,
917,
918,
985,
986,
1002,
1003,
1070,
1071,
1086,
1087,
1155,
1156,
1158,
1159,
1176,
1177,
1186,
1187,
1209,
1210,
1265,
1266,
1287,
1288,
1591,
1592,
1658
]
}
|
{
"red_pajama_v2": {
"ccnet_original_length": 1658,
"ccnet_original_nlines": 74,
"rps_doc_curly_bracket": 0.0012062699533998966,
"rps_doc_ldnoobw_words": 0,
"rps_doc_lorem_ipsum": 0,
"rps_doc_stop_word_fraction": 0.25872093439102173,
"rps_doc_ut1_blacklist": 0,
"rps_doc_frac_all_caps_words": 0.0029069799929857254,
"rps_doc_frac_lines_end_with_ellipsis": 0,
"rps_doc_frac_no_alph_words": 0.29651162028312683,
"rps_doc_frac_unique_words": 0.552301287651062,
"rps_doc_mean_word_length": 5.07112979888916,
"rps_doc_num_sentences": 24,
"rps_doc_symbol_to_word_ratio": 0,
"rps_doc_unigram_entropy": 4.641075134277344,
"rps_doc_word_count": 239,
"rps_doc_frac_chars_dupe_10grams": 0,
"rps_doc_frac_chars_dupe_5grams": 0.09075908362865448,
"rps_doc_frac_chars_dupe_6grams": 0.049504950642585754,
"rps_doc_frac_chars_dupe_7grams": 0,
"rps_doc_frac_chars_dupe_8grams": 0,
"rps_doc_frac_chars_dupe_9grams": 0,
"rps_doc_frac_chars_top_2gram": 0.019801979884505272,
"rps_doc_frac_chars_top_3gram": 0.052805278450250626,
"rps_doc_frac_chars_top_4gram": 0.06930693238973618,
"rps_doc_books_importance": -166.94808959960938,
"rps_doc_books_importance_length_correction": -153.49404907226562,
"rps_doc_openwebtext_importance": -103.48145294189453,
"rps_doc_openwebtext_importance_length_correction": -103.48145294189453,
"rps_doc_wikipedia_importance": -68.65582275390625,
"rps_doc_wikipedia_importance_length_correction": -56.831947326660156
},
"fasttext": {
"dclm": 0.10384184122085571,
"english": 0.611508846282959,
"fineweb_edu_approx": 2.3747572898864746,
"eai_general_math": -0.000010009999641624745,
"eai_open_web_math": 0.043654680252075195,
"eai_web_code": -0.000010009999641624745
}
}
|
{
"free_decimal_correspondence": {
"primary": {
"code": "005.1",
"labels": {
"level_1": "General works, books and libraries, information sciences",
"level_2": "",
"level_3": "Computer programming"
}
},
"secondary": {
"code": "-1",
"labels": {
"level_1": "",
"level_2": "",
"level_3": ""
}
}
},
"bloom_cognitive_process": {
"primary": {
"code": "3",
"label": "Apply"
},
"secondary": {
"code": "2",
"label": "Understand"
}
},
"bloom_knowledge_domain": {
"primary": {
"code": "3",
"label": "Procedural"
},
"secondary": {
"code": "2",
"label": "Conceptual"
}
},
"document_type_v1": {
"primary": {
"code": "4",
"label": "Code/Software"
},
"secondary": {
"code": "3",
"label": "Reference/Encyclopedic/Educational"
}
},
"extraction_artifacts": {
"primary": {
"code": "3",
"label": "Irrelevant Content"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"missing_content": {
"primary": {
"code": "0",
"label": "No missing content"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"document_type_v2": {
"primary": {
"code": "8",
"label": "Documentation"
},
"secondary": {
"code": "23",
"label": "Tutorial"
}
},
"reasoning_depth": {
"primary": {
"code": "2",
"label": "Basic Reasoning"
},
"secondary": {
"code": "3",
"label": "Intermediate Reasoning"
}
},
"technical_correctness": {
"primary": {
"code": "4",
"label": "Highly Correct"
},
"secondary": {
"code": "3",
"label": "Mostly Correct"
}
},
"education_level": {
"primary": {
"code": "3",
"label": "Undergraduate Level"
},
"secondary": {
"code": "4",
"label": "Graduate/Expert Level"
}
}
}
|
672f1e42c33a7f9846924a2431ea77df
|
-3,697,056,420,986,798,600 |
Go Down
Topic: Windows or Linux (Read 3870 times) previous topic - next topic
MathMcC
Hi
I'm just about to get my hands dirty oomlout's Arduino Starter Kit. Does anyone have an opinion about whether its easier/more advisable to use Windows or Linux for the task (specifically Windows 7 and Ubuntu)?
Thanks.
PaulS
Quote
Does anyone have an opinion about whether its easier/more advisable to use Windows or Linux for the task (specifically Windows 7 and Ubuntu)?
My advice, and worth every penny you paid for it, is to use the one you like.
There are more issues getting the IDE to compile and link and talk to the Arduino on Linux, primarily due to permissions issues.
There are issues with Win7 installs (primarily 64 bit, IIRC) and getting drivers installed.
Neither set of issues is insurmountable, depending on you level of patience and familiarity with the OS that is causing the problems.
Of course, lots of people on all OSs have installed and used the software with no issues at all.
GordonEndersby
You shouldnt have any problem with the latest ubuntu.
So far following the instructions Ive never had any problems setting the ide up and no problems uploading to the board. No mucking about with ftdi drivers, or downloading and installing the gcc toolchain. Its all available to install directly from the synaptic package manager or follow the apt-get instructions.
Some people have had problems with permissions, but it takes moments to change that if you already have not got the correct permissions.
Gordon
Osgeld
windowx XP is pretty much unzip and go, as noted above there are issues with newer versions of windows but anyone that has ever fought a driver should be able to clear that up, there are a billion threads on how to do so
linux is a little bit different of a beast as you need to install dependencies manually for your distro, ubuntu (and other debian variants) is fairly easy, couldnt tell you much bout other systems
otherwise it makes no difference cause once you launch the application its the same
http://arduino.cc/forum/index.php?action=unread;boards=2,3,4,5,67,6,7,8,9,10,11,66,12,13,15,14,16,17,18,19,20,21,22,23,24,25,26,27,28,29,30,86,87,89,1;ALL
codeseo
Windows is better for starters.
Imahilus
From experience, linux is far easier (literally, as mentioned, unzip.. and start it up, no need to install drivers or whatnots).
On all windows boxes I tried to get arduino to work (vista and XP), I had no success.
The vista machine just kept on whining the way we expect it to, XP just didn't appear to take the USB to serial driver, later on it did accept it.. but it just wasn't as simple as unzip and run like it was on ubuntu.
Please do realise I only tried to get it working on 3 systems (ie: one ubuntu 9.10, one windows vista and one windows XP), so it isn't a large test group.
zoomkat
I use xp on an old laptop and the arduino IDE application works easily without any significant issues.
Google forum search: Use Google Search box in upper right side of this page.
Why I like my 2005 Rio Yellow Honda S2000 https://www.youtube.com/watch?v=pWjMvrkUqX0
AlphaZeta
Personally, I use Linux. Since Linux is opensource, it fits in the opensource spirit of Arduino quite well :) Besides, there's really nothing much to setup. It's pretty much just download and unzip...
MathMcC
I think you're right Alphazeta. It does seem somehow right to be using the Arduino in Linux. And in any case, I've found that Win7 hasn't found the drivers automatically and doesnt even find them when I point it at the right folder in the Arduino IDE. I did the same in Win XP and the drivers were installed no problem... Not sure what to do.
Osgeld
i dunno, I have a spare machine which is under my work table, it just has whatever was on it
for example, I was messing with some pic stuff, so for the longest time it was winxp
then I needed to do some magic on a mac hard drive, now its linux
but now I want to mess with the launch pad some more and its pretty much windows, probally just slap another hard drive in there and dual boot it lol
http://arduino.cc/forum/index.php?action=unread;boards=2,3,4,5,67,6,7,8,9,10,11,66,12,13,15,14,16,17,18,19,20,21,22,23,24,25,26,27,28,29,30,86,87,89,1;ALL
fdufnews
I tried both windows XP and ubuntu.
I has no issue with both.
Concerning Linux you should follow the installation informations on arduino.cc and check you have the sun java runtime
tjbaudio
I use Linux for this application. I have been using Linux for years so it is just less work for me to use it.
I can see no difference between OS once you get every thing working. If you know Linux use it. If you want to learn Linux use it. If you don't know Linux and don't want to learn it use what you know.
copiertalk
The easiest for you to use.
We do not know your skill level with either system so I would recomend to start with the one you know the best and work up from there with a working example and code.
donkahones
I got it working fine on my Ubuntu laptop. I did have to do some additional steps but they were clearly defined on the arduino page so it was no problem.
Eight
Quote
I've found that Win7 hasn't found the drivers automatically and doesnt even find them when I point it at the right folder in the Arduino IDE
I had no significant problems getting everything up and running on Windows 7 32-bit. I hear there are bigger issues with 64-bit though not sure what they are.
In my case, I popped open the Device Manager and found three (if memory serves) unaccounted for USB devices and for each one, told Windows to use the drivers from the downloaded IDE/driver pack. After that everything has worked perfectly.
Go Up
Please enter a valid email to subscribe
Confirm your email address
We need to confirm your email address.
To complete the subscription, please click the link in the email we just sent you.
Thank you for subscribing!
Arduino
via Egeo 16
Torino, 10131
Italy
|
{
"url": "http://forum.arduino.cc/index.php?topic=5530.msg42549",
"source_domain": "forum.arduino.cc",
"snapshot_id": "crawl=CC-MAIN-2016-22",
"warc_metadata": {
"Content-Length": "75067",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:HB76YGOW2QS5NTGOHYGD47AZSFMSK57M",
"WARC-Concurrent-To": "<urn:uuid:93118131-ce7c-498e-8dfa-dfc7ec91fbfe>",
"WARC-Date": "2016-05-28T02:18:25Z",
"WARC-IP-Address": "54.83.53.28",
"WARC-Identified-Payload-Type": null,
"WARC-Payload-Digest": "sha1:B74DD47EOYDBO7WOEAZXL5J6IQPG42OA",
"WARC-Record-ID": "<urn:uuid:38effde3-011d-49fc-8d81-6c273d781d04>",
"WARC-Target-URI": "http://forum.arduino.cc/index.php?topic=5530.msg42549",
"WARC-Truncated": "length",
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:e1638338-3422-492e-9e79-4808370ba4e8>"
},
"warc_info": "robots: classic\r\nhostname: ip-10-185-217-139.ec2.internal\r\nsoftware: Nutch 1.6 (CC)/CC WarcExport 1.0\r\nisPartOf: CC-MAIN-2016-22\r\noperator: CommonCrawl Admin\r\ndescription: Wide crawl of the web for May 2016\r\npublisher: CommonCrawl\r\nformat: WARC File Format 1.0\r\nconformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf"
}
|
{
"line_start_idx": [
0,
8,
9,
79,
80,
88,
89,
92,
93,
303,
304,
312,
313,
319,
320,
326,
468,
469,
547,
548,
677,
678,
770,
771,
905,
906,
1003,
1004,
1019,
1020,
1021,
1022,
1076,
1389,
1526,
1527,
1534,
1535,
1542,
1543,
1764,
1765,
1962,
1963,
2047,
2202,
2203,
2211,
2212,
2244,
2245,
2254,
2255,
2384,
2470,
2687,
2688,
2843,
2844,
2852,
2853,
2956,
3033,
3120,
3121,
3131,
3132,
3333,
3334,
3342,
3343,
3686,
3687,
3694,
3695,
3788,
3789,
3874,
3875,
3941,
3942,
4092,
4247,
4248,
4257,
4258,
4294,
4320,
4439,
4440,
4449,
4450,
4561,
4562,
4765,
4766,
4777,
4778,
4806,
4807,
4974,
4975,
4986,
4987,
5144,
5145,
5151,
5152,
5158,
5299,
5300,
5459,
5460,
5699,
5700,
5706,
5708,
5709,
5710,
5750,
5751,
5778,
5779,
5818,
5901,
5902,
5929,
5930,
5938,
5950,
5964
],
"line_end_idx": [
8,
9,
79,
80,
88,
89,
92,
93,
303,
304,
312,
313,
319,
320,
326,
468,
469,
547,
548,
677,
678,
770,
771,
905,
906,
1003,
1004,
1019,
1020,
1021,
1022,
1076,
1389,
1526,
1527,
1534,
1535,
1542,
1543,
1764,
1765,
1962,
1963,
2047,
2202,
2203,
2211,
2212,
2244,
2245,
2254,
2255,
2384,
2470,
2687,
2688,
2843,
2844,
2852,
2853,
2956,
3033,
3120,
3121,
3131,
3132,
3333,
3334,
3342,
3343,
3686,
3687,
3694,
3695,
3788,
3789,
3874,
3875,
3941,
3942,
4092,
4247,
4248,
4257,
4258,
4294,
4320,
4439,
4440,
4449,
4450,
4561,
4562,
4765,
4766,
4777,
4778,
4806,
4807,
4974,
4975,
4986,
4987,
5144,
5145,
5151,
5152,
5158,
5299,
5300,
5459,
5460,
5699,
5700,
5706,
5708,
5709,
5710,
5750,
5751,
5778,
5779,
5818,
5901,
5902,
5929,
5930,
5938,
5950,
5964,
5969
]
}
|
{
"red_pajama_v2": {
"ccnet_original_length": 5969,
"ccnet_original_nlines": 130,
"rps_doc_curly_bracket": 0,
"rps_doc_ldnoobw_words": 0,
"rps_doc_lorem_ipsum": 0,
"rps_doc_stop_word_fraction": 0.4090571701526642,
"rps_doc_ut1_blacklist": 0,
"rps_doc_frac_all_caps_words": 0.03489235043525696,
"rps_doc_frac_lines_end_with_ellipsis": 0.007633590139448643,
"rps_doc_frac_no_alph_words": 0.22420193254947662,
"rps_doc_frac_unique_words": 0.39723318815231323,
"rps_doc_mean_word_length": 4.595849990844727,
"rps_doc_num_sentences": 62,
"rps_doc_symbol_to_word_ratio": 0.0014847799902781844,
"rps_doc_unigram_entropy": 5.372861862182617,
"rps_doc_word_count": 1012,
"rps_doc_frac_chars_dupe_10grams": 0.0984734520316124,
"rps_doc_frac_chars_dupe_5grams": 0.10492367297410965,
"rps_doc_frac_chars_dupe_6grams": 0.0984734520316124,
"rps_doc_frac_chars_dupe_7grams": 0.0984734520316124,
"rps_doc_frac_chars_dupe_8grams": 0.0984734520316124,
"rps_doc_frac_chars_dupe_9grams": 0.0984734520316124,
"rps_doc_frac_chars_top_2gram": 0.006450229790061712,
"rps_doc_frac_chars_top_3gram": 0.00903031975030899,
"rps_doc_frac_chars_top_4gram": 0.006880240049213171,
"rps_doc_books_importance": -641.8046875,
"rps_doc_books_importance_length_correction": -641.8046875,
"rps_doc_openwebtext_importance": -344.3794860839844,
"rps_doc_openwebtext_importance_length_correction": -344.3794860839844,
"rps_doc_wikipedia_importance": -339.9775390625,
"rps_doc_wikipedia_importance_length_correction": -339.9775390625
},
"fasttext": {
"dclm": 0.07013773918151855,
"english": 0.94294273853302,
"fineweb_edu_approx": 1.3344480991363525,
"eai_general_math": 0.3615161180496216,
"eai_open_web_math": 0.17985540628433228,
"eai_web_code": 0.3603283762931824
}
}
|
{
"free_decimal_correspondence": {
"primary": {
"code": "004.0285",
"labels": {
"level_1": "General works, books and libraries, information sciences",
"level_2": "",
"level_3": "Computers and Computer science"
}
},
"secondary": {
"code": "005.456",
"labels": {
"level_1": "General works, books and libraries, information sciences",
"level_2": "",
"level_3": "Computer programming"
}
}
},
"bloom_cognitive_process": {
"primary": {
"code": "2",
"label": "Understand"
},
"secondary": {
"code": "3",
"label": "Apply"
}
},
"bloom_knowledge_domain": {
"primary": {
"code": "2",
"label": "Conceptual"
},
"secondary": {
"code": "3",
"label": "Procedural"
}
},
"document_type_v1": {
"primary": {
"code": "5",
"label": "Social/Forum"
},
"secondary": {
"code": "3",
"label": "Reference/Encyclopedic/Educational"
}
},
"extraction_artifacts": {
"primary": {
"code": "3",
"label": "Irrelevant Content"
},
"secondary": {
"code": "0",
"label": "No Artifacts"
}
},
"missing_content": {
"primary": {
"code": "0",
"label": "No missing content"
},
"secondary": {
"code": "2",
"label": "Click Here References"
}
},
"document_type_v2": {
"primary": {
"code": "18",
"label": "Q&A Forum"
},
"secondary": {
"code": "8",
"label": "Documentation"
}
},
"reasoning_depth": {
"primary": {
"code": "2",
"label": "Basic Reasoning"
},
"secondary": {
"code": "3",
"label": "Intermediate Reasoning"
}
},
"technical_correctness": {
"primary": {
"code": "3",
"label": "Mostly Correct"
},
"secondary": {
"code": "4",
"label": "Highly Correct"
}
},
"education_level": {
"primary": {
"code": "2",
"label": "High School Level"
},
"secondary": {
"code": "1",
"label": "General Audience"
}
}
}
|
672f1e42c33a7f9846924a2431ea77df
|
-6,102,305,360,977,469,000 |
Hoed: Lightweight algorithmic debugging.
[ bsd3, debug, library, trace ] [ Propose Tags ]
Hoed is a tracer and debugger for the programming language Haskell. You can trace a program by annotating functions in suspected modules and linking your program against standard profiling libraries.
To locate a defect with Hoed you annotate suspected functions and compile as usual. Then you run your program, information about the annotated functions is collected. Finally you connect to a debugging session using a webbrowser.
Hoed comes in two flavours: Hoed.Pure and Hoed.Stk. Hoed.Pure is recommended over Hoed.Stk: to debug your program with Hoed.Pure you can optimize your program and do not need to enable profiling. Hoed.Stk is Hoed as presented on PLDI 2015 and possibly has benefits over Hoed.Pure for debugging concurrent/parallel programs.
[Skip to Readme]
Versions [faq] 0.1.0.0, 0.1.0.1, 0.2.0, 0.2.1, 0.2.2, 0.3.0, 0.3.1, 0.3.2, 0.3.3, 0.3.4, 0.3.5, 0.3.6, 0.4.0, 0.4.1, 0.5.0, 0.5.1
Change log changelog
Dependencies array, base (==4.*), containers, deepseq, directory, extensible-exceptions, filepath, FPretty, Hoed, lazysmallcheck, libgraph (==1.7), mtl, network, process, random, RBTree (==0.0.5), regex-posix, template-haskell, threepenny-gui (==0.6.*), unix, utf8-string, X11 (>=1.5 && <1.7) [details]
License BSD-3-Clause
Copyright (c) 2000 Andy Gill, (c) 2010 University of Kansas, (c) 2013-2015 Maarten Faddegon
Author Maarten Faddegon
Maintainer [email protected]
Category Debug, Trace
Home page http://maartenfaddegon.nl
Source repo head: git clone git://github.com/MaartenFaddegon/Hoed.git
Uploaded by faddegon at Fri Nov 20 08:44:50 UTC 2015
Distributions LTSHaskell:0.5.1, NixOS:0.5.1, Stackage:0.5.1
Executables hoed-tests-Stk-IndirectRecursion, hoed-tests-Stk-Example4, hoed-tests-Stk-Example3, hoed-tests-Stk-Example1, hoed-tests-Stk-Insort2, hoed-tests-Stk-DoublingServer, hoed-tests-Pure-t7, hoed-tests-Pure-t6, hoed-tests-Pure-t5, hoed-tests-Pure-t4, hoed-tests-Pure-t3, hoed-tests-Pure-t2, hoed-tests-Pure-t1, hoed-tests-Generic-t3, hoed-tests-Generic-r3, hoed-tests-Generic-t2, hoed-tests-Generic-r2, hoed-tests-Generic-t1, hoed-tests-Generic-r1, hoed-tests-Generic-t0, hoed-tests-Generic-r0, hoed-tests-Prop-t4, hoed-tests-Prop-t3, hoed-tests-Prop-t2, hoed-tests-Prop-t1, hoed-tests-Prop-t0, hoed-examples-Expression_simplifier__with_properties, hoed-examples-Expression_simplifier, hoed-examples-Parity_test, hoed-examples-Simple_higher-order_function, hoed-examples-SummerSchool_compiler_does_not_terminate, hoed-examples-XMonad_changing_focus_duplicates_windows__using_properties, hoed-examples-XMonad_changing_focus_duplicates_windows__CC, hoed-examples-XMonad_changing_focus_duplicates_windows, hoed-examples-Insertion_Sort_elements_disappear, hoed-examples-FPretty_indents_too_much__CC, hoed-examples-FPretty_indents_too_much
Downloads 5195 total (418 in the last 30 days)
Rating (no votes yet) [estimated by rule of succession]
Your Rating
• λ
• λ
• λ
Status Hackage Matrix CI
Docs not available [build log]
Last success reported on 2015-12-08 [all 5 reports]
Modules
• Debug
• Hoed
• Debug.Hoed.Pure
• Debug.Hoed.Stk
Flags
NameDescriptionDefaultType
buildexamples
Build example executables.
DisabledAutomatic
validatepure
Build test cases to validate Hoed-pure.
DisabledAutomatic
validatestk
Build test cases to validate Hoed-stk.
DisabledAutomatic
validategeneric
Build test cases to validate deriving Observable for Generic types.
DisabledAutomatic
validateprop
Build test cases to validate deriving judgements with properties.
DisabledAutomatic
Use -f <flag> to enable a flag, or -f -<flag> to disable that flag. More info
Downloads
Maintainer's Corner
For package maintainers and hackage trustees
Readme for Hoed-0.3.1
[back to package description]
Hoed - A Lightweight Haskell Tracer and Debugger Build Status
Hoed is a tracer and debugger for the programming language Haskell.
Using Hoed
To locate a defect with Hoed you annotate suspected functions and compile as usual. Then you run your program, information about the annotated functions is collected. Finally you connect to a debugging session using a webbrowser.
Let us consider the following program, a defective implementation of a parity function with a test property.
isOdd :: Int -> Bool
isOdd n = isEven (plusOne n)
isEven :: Int -> Bool
isEven n = mod2 n == 0
plusOne :: Int -> Int
plusOne n = n + 1
mod2 :: Int -> Int
mod2 n = div n 2
prop_isOdd :: Int -> Bool
prop_isOdd x = isOdd (2*x+1)
main :: IO ()
main = printO (prop_isOdd 1)
main :: IO ()
main = quickcheck prop_isOdd
Using the property-based test tool QuickCheck we find the counter example 1 for our property.
./MyProgram
*** Failed! Falsifiable (after 1 test): 1
Hoed can help us determine which function is defective. We annotate the functions isOdd, isEven, plusOne and mod2 as follows:
import Debug.Hoed.Pure
isOdd :: Int -> Bool
isOdd = observe "isOdd" isOdd'
isOdd' n = isEven (plusOne n)
isEven :: Int -> Bool
isEven = observe "isEven" isEven'
isEven' n = mod2 n == 0
plusOne :: Int -> Int
plusOne = observe "plusOne" plusOne'
plusOne' n = n + 1
mod2 :: Int -> Int
mod2 = observe "mod2" mod2'
mod2' n = div n 2
prop_isOdd :: Int -> Bool
prop_isOdd x = isOdd (2*x+1)
main :: IO ()
main = printO (prop_isOdd 1)
After running the program a computation tree is constructed and displayed in a web browser.
./MyProgram
False
Listening on http://127.0.0.1:10000/
You can freely browse this tree to get a better understanding of your program. If your program misbehaves, you can judge the computation statements in the tree as 'right' or 'wrong' according to your intention. When enough statements are judged the debugger tells you the location of the fault in your code.
Screenshot of Hoed
Installation
Hoed is available from Hackage and can be installed with Cabal.
cabal install Hoed
Other Tracers
Many of the ideas for Hoed come from the Hat project. Hoed is the Dutch word for a hat. Compared to Hoed, Hat can give more detailed traces. However, Hat requires all modules to be transformed and is therefore not practical for many real-world Haskell programs.
The idea to observe values with local annotations comes from the HOOD project. Unlike Hoed, HOOD does not give relations between observed values. HOOD also requires the programmer to write a class-instance for the type of the value they want to observe. With Hoed these instates can be derived automatically.
|
{
"url": "http://hackage.haskell.org/package/Hoed-0.3.1",
"source_domain": "hackage.haskell.org",
"snapshot_id": "crawl=CC-MAIN-2019-13",
"warc_metadata": {
"Content-Length": "23966",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:URT66D36LUCINUMJ2DSKGGC7GDEJOSYU",
"WARC-Concurrent-To": "<urn:uuid:3b1569ae-e012-4c77-9c21-6e1fd4c2a417>",
"WARC-Date": "2019-03-21T21:10:25Z",
"WARC-IP-Address": "151.101.248.68",
"WARC-Identified-Payload-Type": "text/html",
"WARC-Payload-Digest": "sha1:PBCOIAXNQ6ST4FRU7B43ITCCDXYUTWS6",
"WARC-Record-ID": "<urn:uuid:61c3acbc-f694-468c-a4d5-3dc7f82a70aa>",
"WARC-Target-URI": "http://hackage.haskell.org/package/Hoed-0.3.1",
"WARC-Truncated": null,
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:ea52d733-0b43-43f0-a31f-3ea022fc1986>"
},
"warc_info": "isPartOf: CC-MAIN-2019-13\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for March 2019\r\noperator: Common Crawl Admin ([email protected])\r\nhostname: ip-10-150-237-245.ec2.internal\r\nsoftware: Apache Nutch 1.15 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 0.11-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/"
}
|
{
"line_start_idx": [
0,
41,
42,
91,
92,
292,
293,
523,
524,
848,
849,
850,
867,
997,
1018,
1321,
1342,
1434,
1458,
1493,
1515,
1551,
1621,
1674,
1734,
2874,
2921,
2977,
2989,
2995,
3001,
3007,
3032,
3063,
3115,
3116,
3124,
3125,
3135,
3146,
3170,
3193,
3194,
3200,
3201,
3228,
3242,
3243,
3270,
3271,
3289,
3302,
3303,
3343,
3344,
3362,
3374,
3375,
3414,
3415,
3433,
3449,
3450,
3518,
3519,
3537,
3550,
3551,
3617,
3618,
3636,
3637,
3715,
3716,
3726,
3727,
3747,
3748,
3793,
3794,
3795,
3817,
3818,
3848,
3849,
3911,
3912,
3980,
3981,
3992,
3993,
4223,
4224,
4333,
4334,
4355,
4384,
4385,
4407,
4430,
4431,
4453,
4471,
4472,
4491,
4508,
4509,
4535,
4564,
4565,
4579,
4608,
4609,
4623,
4652,
4653,
4747,
4748,
4760,
4802,
4803,
4929,
4930,
4953,
4954,
4975,
5006,
5036,
5037,
5059,
5093,
5117,
5118,
5140,
5177,
5196,
5197,
5216,
5244,
5262,
5263,
5289,
5318,
5319,
5333,
5362,
5363,
5455,
5456,
5468,
5474,
5511,
5512,
5820,
5821,
5840,
5841,
5854,
5855,
5919,
5920,
5939,
5940,
5954,
5955,
6217,
6218
],
"line_end_idx": [
41,
42,
91,
92,
292,
293,
523,
524,
848,
849,
850,
867,
997,
1018,
1321,
1342,
1434,
1458,
1493,
1515,
1551,
1621,
1674,
1734,
2874,
2921,
2977,
2989,
2995,
3001,
3007,
3032,
3063,
3115,
3116,
3124,
3125,
3135,
3146,
3170,
3193,
3194,
3200,
3201,
3228,
3242,
3243,
3270,
3271,
3289,
3302,
3303,
3343,
3344,
3362,
3374,
3375,
3414,
3415,
3433,
3449,
3450,
3518,
3519,
3537,
3550,
3551,
3617,
3618,
3636,
3637,
3715,
3716,
3726,
3727,
3747,
3748,
3793,
3794,
3795,
3817,
3818,
3848,
3849,
3911,
3912,
3980,
3981,
3992,
3993,
4223,
4224,
4333,
4334,
4355,
4384,
4385,
4407,
4430,
4431,
4453,
4471,
4472,
4491,
4508,
4509,
4535,
4564,
4565,
4579,
4608,
4609,
4623,
4652,
4653,
4747,
4748,
4760,
4802,
4803,
4929,
4930,
4953,
4954,
4975,
5006,
5036,
5037,
5059,
5093,
5117,
5118,
5140,
5177,
5196,
5197,
5216,
5244,
5262,
5263,
5289,
5318,
5319,
5333,
5362,
5363,
5455,
5456,
5468,
5474,
5511,
5512,
5820,
5821,
5840,
5841,
5854,
5855,
5919,
5920,
5939,
5940,
5954,
5955,
6217,
6218,
6526
]
}
|
{
"red_pajama_v2": {
"ccnet_original_length": 6526,
"ccnet_original_nlines": 166,
"rps_doc_curly_bracket": 0,
"rps_doc_ldnoobw_words": 0,
"rps_doc_lorem_ipsum": 0,
"rps_doc_stop_word_fraction": 0.1647457629442215,
"rps_doc_ut1_blacklist": 0,
"rps_doc_frac_all_caps_words": 0.008135589770972729,
"rps_doc_frac_lines_end_with_ellipsis": 0,
"rps_doc_frac_no_alph_words": 0.3959321975708008,
"rps_doc_frac_unique_words": 0.480246901512146,
"rps_doc_mean_word_length": 6.187654495239258,
"rps_doc_num_sentences": 106,
"rps_doc_symbol_to_word_ratio": 0,
"rps_doc_unigram_entropy": 5.479982376098633,
"rps_doc_word_count": 810,
"rps_doc_frac_chars_dupe_10grams": 0.12609736621379852,
"rps_doc_frac_chars_dupe_5grams": 0.18335993587970734,
"rps_doc_frac_chars_dupe_6grams": 0.17378291487693787,
"rps_doc_frac_chars_dupe_7grams": 0.16101357340812683,
"rps_doc_frac_chars_dupe_8grams": 0.16101357340812683,
"rps_doc_frac_chars_dupe_9grams": 0.1536312848329544,
"rps_doc_frac_chars_top_2gram": 0.015363129787147045,
"rps_doc_frac_chars_top_3gram": 0.011173180304467678,
"rps_doc_frac_chars_top_4gram": 0.012769349850714207,
"rps_doc_books_importance": -470.9443054199219,
"rps_doc_books_importance_length_correction": -470.9443054199219,
"rps_doc_openwebtext_importance": -252.67776489257812,
"rps_doc_openwebtext_importance_length_correction": -252.67776489257812,
"rps_doc_wikipedia_importance": -134.96632385253906,
"rps_doc_wikipedia_importance_length_correction": -134.96632385253906
},
"fasttext": {
"dclm": 0.05718791112303734,
"english": 0.6459450125694275,
"fineweb_edu_approx": 2.3119990825653076,
"eai_general_math": 0.5901023149490356,
"eai_open_web_math": 0.1524040699005127,
"eai_web_code": 0.1804746389389038
}
}
|
{
"free_decimal_correspondence": {
"primary": {
"code": "005.133",
"labels": {
"level_1": "General works, books and libraries, information sciences",
"level_2": "",
"level_3": "Computer programming"
}
},
"secondary": {
"code": "005.136",
"labels": {
"level_1": "General works, books and libraries, information sciences",
"level_2": "",
"level_3": "Computer programming"
}
}
},
"bloom_cognitive_process": {
"primary": {
"code": "3",
"label": "Apply"
},
"secondary": {
"code": "2",
"label": "Understand"
}
},
"bloom_knowledge_domain": {
"primary": {
"code": "3",
"label": "Procedural"
},
"secondary": {
"code": "2",
"label": "Conceptual"
}
},
"document_type_v1": {
"primary": {
"code": "3",
"label": "Reference/Encyclopedic/Educational"
},
"secondary": {
"code": "4",
"label": "Code/Software"
}
},
"extraction_artifacts": {
"primary": {
"code": "0",
"label": "No Artifacts"
},
"secondary": {
"code": "3",
"label": "Irrelevant Content"
}
},
"missing_content": {
"primary": {
"code": "0",
"label": "No missing content"
},
"secondary": {
"code": "4",
"label": "Missing Images or Figures"
}
},
"document_type_v2": {
"primary": {
"code": "8",
"label": "Documentation"
},
"secondary": {
"code": "17",
"label": "Product Page"
}
},
"reasoning_depth": {
"primary": {
"code": "2",
"label": "Basic Reasoning"
},
"secondary": {
"code": "3",
"label": "Intermediate Reasoning"
}
},
"technical_correctness": {
"primary": {
"code": "4",
"label": "Highly Correct"
},
"secondary": {
"code": "3",
"label": "Mostly Correct"
}
},
"education_level": {
"primary": {
"code": "3",
"label": "Undergraduate Level"
},
"secondary": {
"code": "4",
"label": "Graduate/Expert Level"
}
}
}
|
672f1e42c33a7f9846924a2431ea77df
|
4,789,865,135,031,159,000 |
Pobieranie prezentacji. Proszę czekać
Pobieranie prezentacji. Proszę czekać
Język C# ( 5.0 ) using System; namespace HeWo { class Hello
Коpie: 1
Język C# ( 4.0 ) using System; namespace HeWo { class Hello { static void Main(string [] args) { Console.WriteLine("Hello World!"); }
Podobne prezentacje
Prezentacja na temat: "Język C# ( 5.0 ) using System; namespace HeWo { class Hello"— Zapis prezentacji:
1 Język C# ( 5.0 ) using System; namespace HeWo { class Hello
using System; namespace HeWo { class Hello static void Main(string [] args) Console.WriteLine("Hello World!"); }
2 Typy Danych wartości ( stos , pełne kopiowanie ) logiczne numeryczne
egzemplarze struktur referencje ( sterta , kopiowanie referencji ) obiekty klas tablice ciągi znaków ( string )
3 Type C# CTS CLS Bytes Default
bool Boolean Y false byte Byte Y sbyte SByte N short Int Y int Int Y long Int Y ushort UInt16 N uint UInt32 N ulong UInt64 N float Single Y double Double Y char Char Y decimal Decimal Y
4 Deklaracje i definicje zmiennych Operator przypisania wartości
int Alfa , Beta , Gamma = 5 ; Operator przypisania wartości Beta = Gamma; // OK Beta = 12; // OK Beta = Alfa; // błąd kompilacji Stałe const double Kurs = ;
5 Typy implikowane (3.0) var a = 5; // int var b = 'K'; // char
var c = 128L; // long var d = ; // double var e = "Ala ma kota"; // string a = L; // long -> int e = 4.5; // błąd ● tylko zmienne lokalne w funkcjach - nie mogą być składowymi klas
6 Rzutowanie · automatyczne - rozszerzające ( bez ostrzeżenia )
- zawężające ( błąd kompilacji ) · wymuszone (int) LongValue; int li32 = 5; long li64; li64 = li32; // OK. li32 = li64; // błąd kompilacji li64 = ; li32 = (int) li64; // błędna wartość //
7 Typy rozszerzone ( nullable ) (2.0)
double? Cena; // { numbs, INF, NaN, null } // Cena = 7.54 ; Cena = null ; if ( Cena.HasValue ) Cena += 1.4;
8 · operator ?? int Parametr; int? Pomiar = null; /* */ Parametr = Pomiar ?? 100 ; // 100 gdy null // string str = null; Console.WriteLine( str ?? "Pusty" ); // Pusty gdy null
9 Opakowanie – Rozpakowanie
long aaa = , bbb ; object objLong = aaa ; // stos sterta bbb = (long) objLong ; // sterta stos // InvalidCastException
10 Typ logiczny bool dobrze; int alfa = 5; dobrze = 0; // błąd
dobrze = 3 * alfa + 1; // błąd dobrze = true; // OK dobrze = alfa > 10; // OK
11 Typy wyliczeniowe enum Wyliczanka // int { Eme, // == 0 Due, // == 1
Fake = 10, // == 10 Drake // == 11 } enum Maly : byte // byte { mini , mikro } · dziedziczenie z System.Enum Enum.IsDefined(typeof(Maly) , "nano");
12 Funkcje i właściwości typów
· zmienne typów będących wartościami są egzemplarzami struktur dziedziczą funkcje z typu System.Object.ValueType ─ GetType( ) // obiekt Type określający typ dla typów wyliczeniowych (np. ConsoleColor) : var ListaKolorów = // tablica stałych Enum.GetValues(ConsoleColor.Black.GetType()); ─ ToString( ) // konwersja binarno – znakowa long LoVal = ; string Characters = LoVal.ToString ( );
13 · właściwości typów liczbowych
MaxValue // wartość maksymalna MinValue // wartość minimalna long x = long.MaxValue; int y = int.MinValue;
14 Łańcuchy znaków UNICODE (UTF - 16)
· string typ referencyjny · zawartość łańcucha niezmienna · dziedziczy z typu System.String Length, Concat, CompareTo, Copy, Insert , PadLeft , PadRight , Remove , Replace , ToLower , ToUpper , Format = , + , == , != , [ ] string Nap1 , Nap2 = "dobry napis" ; Nap1 = Nap2 ; // nowa referencja Nap1 = Nap2.ToUpper( ); // nowy łańcuch
15 Przekształcanie wnętrza łańcucha
· znaki sterujące jak w C wyłącza przetwarzanie ) string Opis1 = "\nWyniki\t:" ; string Opis2 = @"\nBez zmian\t:" ; Przekształcanie wnętrza łańcucha · klasa System.Text.StringBuilder using namespace System.Text; StringBuilder myBuffer = new StringBuilder ("Ala ma kota"); myBuffer.Append(„ a Ola psa."); myBuffer.Insert(11, ','); string Ready = myBuffer.ToString(); // Ala ma kota, a Ola psa.
16 Wprowadzanie – wyprowadzanie danych
· klasa System.Console ─ int Read ( ) // 1 znak (NL, -1) ─ string ReadLine ( ) // do NL ─ string Write ( string ) // bez NL ─ string WriteLine ( string ) // z NL // Console.WriteLine( x.ToString() ); Console.WriteLine( x ); // konwersja Console.WriteLine( x.ToString() + ", " + y.ToString() );
17 Console.Write ("format", w,..,w) // bez NL
Console.WriteLine ("format", w,..,w) // z NL format "zzz{0}zzz{1}zzz{0}zzz{2}zzz..." ─ "zzz" dowolny ciąg znaków (może być pusty) ─ {0} {1} {2} ... pozycje kolejnych dalszych argumentów ─ w,...,w ciąg wyrażeń
18 niecałkowite dziesiętne postać heksydecymalna
· można stosować znaki formatujące {K:Zs} lub {K,P:Zs} ─ K numer pozycji ─ Z znak formatujący ─ P szerokość pola ─ s liczba cyfr po kropce znak znaczenie C c waluta (wg. Windows) D d całkowite dziesiętne E e notacja wykładnicza F f niecałkowite dziesiętne z wykładnikiem lub bez G g N n format narodowy X x postać heksydecymalna
19 string str = "\nOpis wyniku :\t" ; Console.WriteLine(
int ii = 34; double dd = ; string str = "\nOpis wyniku :\t" ; Console.WriteLine( "{0} {1} albo {1,12:D} i {2} lub\n " + "{2,-15:F3} lub {2:E5} lub {3} " , str , ii , dd , dd.ToString() ) ; //Opis wyniku : albo i 2, lub // 2, lub 2,52345E+000 lub 2,
20 · konwersja znakowo – binarna (kultura - ustawienia narodowe)
- SystemType.Parse(string) string str; double dd = 2.5; str = Console.ReadLine( ); // 12,45 dd = double.Parse( str ); // błędny format -> błąd wykonania Console.WriteLine( dd ); // 12,45
21 bool dobrze = false; string str; double dd = 2.5; while ( ! dobrze ) { str = Console.ReadLine( ); dobrze = double.TryParse(str, out dd); } Console.WriteLine(dd); // VS.NET 2005
22 - klasa Convert ToByte ToSByte ToChar ToDecimal ToDouble ToSingle ToInt16 ToInt32 ToInt64 ToUInt16 ToUInt32 ToUInt64 ToString string st; long war; str = Console.ReadLine(); // war = Convert.ToInt64(str); // format Console.WriteLine(war); //
23 · kultura (ustawienia narodowe)
- związana z każdym procesem obliczeniowym (wątkiem) - klasa CultureInfo using System.Threading; using System.Globalization; // CultureInfo ci = new CultureInfo("de-DE"); Thread.CurrentThread.CurrentCulture = ci;
24 · przesuwanie kursora // VS.2005 Console.CursorVisible = false; Console.ForegroundColor = ConsoleColor.Red; Console.BackgroundColor = ConsoleColor.White; Console.CursorLeft = X; // od lewej Console.CursorTop = Y; // od góry Console.SetCursorPosition( X, Y ); Console.Write("+"); // o 1 w prawo Console.CursorLeft = X; // powrót Console.Clear();
25 · znaki sterujące ConsoleKeyInfo znak; // znak = Console.ReadKey(); if( ConsoleKey.UpArrow == znak.Key) { } // Backspace, Home, End, Enter, Escape // Arrows, Fxx, klawiatura numeryczna // Play, Volume, ... Console.Beep( 3000, 1000 ); // 3000 Hz, 1000 ms Call, S0, Kultura,Move
26 Wyrażenia arytmetyczne i logiczne
· operatory i zasady tworzenia jak w C++ · dodatkowo is as oraz => · konwersja wartości - rozszerzająca automatycznie - zawężająca błąd int a = 2L; // błąd float f = 2.45; // błąd · rzutowanie ( typ ) wyrażenie
27 · lokalne testowanie poprawności checked
// typy całkowitoliczbowe int a1 = ; a1 = a ; // a1 = checked ( a ); // wyjątek long l1 = ; a1 = l1; // błąd kompilacji a1 = ( int ) l1; // a1 = checked ( ( int ) l1 ); // wyjątek
28 · globalne testowanie poprawności
Properites / Build / Advance Check for arithmetic overflow/underflow · lokalne wyłącznie testowania unchecked int a1 = ; a1 = a ; // wyjątek a1 = unchecked ( a ); +
29 Instrukcje · warunkowe if .. else // jak C++
// warunek wyrażenie logiczne if ((x + 4) > 1 && (y++ < 8)) // || // obliczenie optymalizowane if ((x + 4) > 1 & (y++ < 8)) // | // pełne obliczenie // switch // jak C++ // instrukcja break konieczna
30 · pętle ( ogólnie jak C++ )
for ( int i = 1 ; i < 5 && dalej ; ++i ) { } // koniec widoczności zmiennej i while , do ... while // jak C++ foreach // wymagany IEnumerator
31 Struktury · są zawsze wartościami (na stosie, kopiowanie)
· mogą zawierać interfejsy, funkcje składowe i konstruktory z argumentami · są zawsze zapieczętowane · modyfikatory dostępu do pól modyfikator opis public dostępne zewsząd (domyślny) private tylko wewnątrz struktury / klasy protected dla klas dziedziczących internal tylko w pakiecie protected internal dla klas dziedziczących w pakiecie
32 public struct Osoba { public string Imie; public string Nazwisko; public long Pesel; } Osoba Prezes; Prezes.Imie = "Adam" ; Prezes.Nazwisko = "Betoński" ; Prezes.Pesel = ; Osoba Emeryt ; Emeryt = Prezes ;
33 · pakowanie i rozpakowanie
object Agent = Emeryt; // sterta, brak dostępu do pól long kto = Agent.Pesel; // błąd Osoba X_007 = ( Osoba ) Agent ; // stos, jest dostęp do pól kto = X_007.Pesel; // OK
34 public struct Komputer
{ public string Marka; public short Cena; public Komputer (string mm, short cc) { Marka = mm; Cena = cc; } object PC = new Komputer ( "Alfa", 3000 ); short cc = PC.Cena; // błąd Komputer komp = (Komputer) PC; cc = komp.Cena; // OK
35 Tablice · jednowymiarowe int [ ] Tab_A ; // zmienna referencyjna
Tab_A = new int [ 120 ] ; // // automatyczne zerowanie string [ ] Tab_B = new string [ X + 5 ] ; // automatycznie NULL
36 string [ ] Tab_D = new string [ 3 ] { "Alfa", "Beta", "Gamma" }; double [ ] Tab_C = { 1.2 , 4.5 , 4.4 } ; // Tab_A [ 0 ] = 55 ; Tab_D [ 2 ] = "Jota" ; // System.IndexOutOfRangeException var T = new double[ ]{1.1, 2.2, 3.3}; // tylko jako tablica lokalna w funkcji
37 · wielowymiarowe, pełne
int [ , ] Mat = new int [ 9 , 7 ] ; Mat [ 3 , 5 ] = 121 ; // int [ , ] T23 = { {1, 2, 3}, {4, 5, 6} } ; var T2 = new long [ , ] { { 10, 20, 30 }, { 100, 200, 300 } }; // tylko jako tablica lokalna w funkcji
38 ● wielowymiarowe, niepełne
long [ ] [ ] Arr = new long [ 5 ] [ ] ; // zadana liczba wierszy, // zmienna liczba kolumn w wierszu for ( int i = 0 ; i < Arr.Length ; ++i ) Arr [ i ] = new long [ i + 5 ] ; Arr [ 2 ] [ 3 ] = ;
39 · kopiowanie tablic int[] T = { 1, 3, 5, 7, 9 }; int[] R = new int [10]; R = T; // kopiowanie referencji, R ma 5 elementów T[0] = 99; // zmiana wartości R[0] R = (int[]) T.Clone(); // kopia T T[1] = 88; // R[1] bez zmian int[] S = new int [10]; T.CopyTo( S, 2 ); // kopiowanie elementów T -> S od elementu 2
40 · dziedziczenie z System.Array
właściwości Length Range : [ ] 0 ; [ , ] wie : 0, kol : 1 [ , , ] ma : 0, wie : 1, kol : 2 funkcje BinarySearch , Clear , Clone, CopyTo GetLength, GetLowerBound , GetUpperBound GetValue , SetValue , Reverse , Sort
41 int x = 0; Array A3D = Array.CreateInstance(x.GetType(),12,15,24); // Range = 0, 1, 2 : M, W, K for (int i = A3D.GetLowerBound(0); i <= A3D.GetUpperBound(0); ++i) // M for (int j = A3D.GetLowerBound(1); j <= A3D.GetUpperBound(1); ++j) // W for (int k = A3D.GetLowerBound(2); k <= A3D.GetUpperBound(2); ++k) // K A3D.SetValue((i * j * 10 + k),i,j,k);
42 Console.WriteLine("Multidimensional Array:");
Console.WriteLine("Rank\tLower\tUpper"); for (int i = 0; i < A3D.Rank; ++i) Console.WriteLine("{0}\t{1}\t{2}", i, A3D.GetLowerBound(i), A3D.GetUpperBound(i)); Multidimensional Array: Rank Lower Upper
43 string [ ] Napisy = new string [ 10 ];
/* */ foreach ( string s in Napisy ) { Console.Writeline( s ); } // interfejs IEnumerator jest dostępny S1, MatMul, Taba, Ewide
44 Funkcje · tylko funkcje składowe klas
· niepotrzebne deklaracje ( zapowiedzi ) · modyfikatory argumentów modyfikator opis ( brak ) przez wartość ( kopiowanie ) , argument aktualny musi być zainicjowany out przez referencję, argument aktualny może być niezainicjowany ref przez referencję, argument aktualny musi być zainicjowany params zmienna liczba parametrów
45 public long F ( long p1 , out int p2 ,
ref double p3 ) { ... = ... p1 ... p3 ... ; p2 = ; p3 = ....p1 ... p2 ... ; return .... ; }
46 long wynik , a1 = ; int rezultat ; double zmiana = 21.4E5 ; wynik = F (a1 + 1L, out rezultat , ref zmiana); /* nawet gdyby zmienna rezultat miała nadaną wartość przed wywołaniem F, to i tak w funkcji F nie wolno odczytywać tej wartości przed wewnętrznym ustaleniem wartości p2 */ EwideF
47 · dowolna liczba parametrów – params
public void DoLi (ref int Suma, params int [ ] Liczby) { foreach (int li in Liczby) Suma += li; } // int Wynik = 174; DoLi ( ref Wynik, 3, 5, 22, -7, 12); // 209
48 · wzorce funkcji ( generics )
public void PoLi <TyDa>(params TyDa [ ] Liczby) { foreach (TyDa li in Liczby) Console.WriteLine(li.ToString()); // Suma + li; niepoprawne // jedynie przypisanie = } // PoLi <double> (231.43, 99.89, );
49 public T Mała < T > (T p1, T p2) where T : System
public T Mała < T > (T p1, T p2) where T : System.IComparable< T > { T pom; if ( p1.CompareTo( p2 ) < 0 ) pom = p1; else pom = p2; return pom; } double x; x = Mała <double> (231.43, 99.89);
50 · wartości domyślne i argumenty nazwane ( 4.0 )
public long FU ( long p1 , bool p2 = true , double p3 = 2.7 ) { ... } // long lili; lili = FU ( 127 ); // poprawnie lili = FU ( 127, false ); // poprawnie lili = FU ( 127, false, 3.9 ); // poprawnie lili = FU ( 127, , 3.9 ); // błąd lili = FU ( 127, 3.9 ); // błąd lili = FU ( 127, p3 : 3.9 ) // poprawnie NamedPar, Refa
51 Klasy public class Simple // partial abstract sealed
public class Simple // partial abstract sealed { public int Liczba = 9; public static double Ułamek = 0.21 ; // 0 string Napis ; // private public int Suma ( int Liczba ) { return this.Liczba + Liczba ; } public static double Mar( double Cena ) return Ułamek * Cena ;
52 // przeciążony k. domyślny { Liczba = 5 ;
public Simple ( ) // przeciążony k. domyślny { Liczba = 5 ; } // nie można listy powiązań public Simple ( int Start ) Liczba = Start ; } public Simple ( Simple s ); Liczba = s.Liczba ;
53 Simple s0; // tylko zmienna referencyjna
s0 = new Simple( ); // Liczba == 5 // Simple s1 = new Simple( ) ; // == 5 Simple s2 = new Simple( 9 ) ; // == 9 s2.Liczba += s2.Suma( s1.Liczba ); // == 23 Simple s3 = new Simple( s2 ); // == 23 int m = Simple.Mar( 100 ) ; // == 21 // funkcje i składowe statyczne // wywołuje się podając nazwę klasy
54 · modyfikatory dostępu (dla klas i dla składowych)
opis public dostępne zewsząd private tylko wewnątrz klasy (domyślny dla składowych) protected dla klas dziedziczących internal tylko w pakiecie (domyślny dla klas) protected internal dla klas dziedziczących w pakiecie
55 · klasy wieloplikowe (2.0)
// plik Prog1.cs public partial class Employee { public void DoWork() { } } // plik Prog2.cs public void GoToLunch() { }
56 public partial class A { }
public class A { } // błąd // · ta sama przestrzeń nazw · niekonfliktowe modyfikatory typu klasy ( nie trzeba powtarzać ) public private protected internal abstract sealed · niekonfliktowa klasa bazowa i lista interfejsów WinApp
57 · klasy statyczne : - nie wolno tworzyć obiektu - wszystkie składowe statyczne public static class Services { public static int Data1 = 123; public static void Serv1(int param) { .... } } // int Res1 = ++ Services.Data1 ; Services.Serv1(78);
58 ● inicjowanie obiektów klas (3.0)
public class Alfa { public int al; public long fa; /* public Alfa( int a, long f) al = a; fa = f; } */ } // Alfa aa = new Alfa { al = 7, fa = 14L }; // składowe public Alfa bb = new Alfa { 7, 14L }; // błąd
59 public class Alfa { public int al; public long fa; private char kod; // public Alfa( char kk ) kod = kk + 5; } Alfa aa = new Alfa (0x41){ al = 7, fa = 14L }; // składowe: private public // protected DrawRect
60 ● funkcje rozszerzające (3.0) // Fun(ob) -> ob.Fun()
public static class StringExt // static { public static void Older03 (this System.String pt) { if (pt[0] > pt[3]) Console.WriteLine(pt[0]); else Console.WriteLine(pt[3]); } public static char LetterOfIndex (this System.String st, int x) { if (x < 0 || st.Length <= x) return '?'; else return st[x]; } }
61 string st = "Autobus."; Console.WriteLine(st.Older03()); // przekład: Older03(st) Console.WriteLine("{0}, {1}", st.LetterOfIndex(4), st.LetterOfIndex(12)); // LetterOfIndex(st,4) LetterOfIndex(st, 12) // o // b, ?
62 using LibOne; // biblioteka .dll
// ClassOne, int X public static class LibOneExt { public static void Limit15 (this LibOne.ClassOne c1) if (c1.X > 15) c1.X = 15; } // ClassOne cc = new ClassOne(); cc.X = 27; Console.Write(cc.X.ToString() + ", "); cc.Limit15(); // Limit15(cc); Console.WriteLine(cc.X); //27, 15 Exten
63 Hermetyzacja · składowe prywatne i funkcje dostępu ( jak C++ )
· właściwości public class Account { private decimal amount ; private string number ; public decimal Amount // zapis i odczyt { get { return amount ; } set { if ( Authorization ( ) ) amount = value ; } } // accessors
64 public string Who // tylko odczyt { get { return number ; } }
decimal AC ; string NC ; Account Customer = new Account ( ) ; AC = Customer.Amount ; // get_Amount Customer.Amount = AC ; // set_Amount NC = Customer.Who ; // get_Number Edit encapsulation
65 public class Base1 { private double price; public double Price get { return price; } protected set { price = value; } } // set dostępne w klasie Base1 i w klasach pochodnych
66 ● właściwości automatyczne (3.0)
Auto-Implemented Properties public class Point { /* private int x; private int y; public int X {get { return x; } set { x = value; } } public int Y {get { return y; } set { y = value; } } */ // public int X { get; set; } public int Y { get; set; } // nazwy zmiennym nadaje kompilator }
67 } public class Point { public int X { get; private set; }
public int Y { get; protected set; } } // nazwy zmiennym nadaje kompilator // zmiana X tylko w klasie Point // zmiana Y tylko w klasie Point // i w klasach pochodnych
68 · właściwości statyczne private static string bankname = " PKO " ;
private static string bankname = " PKO " ; public static string BankName ; { get { return bankname ; } set { bankname = value ; } } · składowe tylko do odczytu public readonly decimal Currency ; public static readonly string AccType = "A1"; // nadawanie wartości tylko w deklaracji lub // w konstruktorze klasy
69 public int X { get; set; } public int Y { get; set; } } //
Typy anonimowe (3.0) public class Point { public int X { get; set; } public int Y { get; set; } } // var TTT = new {T1 = new Point { X = 4, Y = 4 }, T2 = new Point { X = 7, Y = 7 }, T3 = new Point { X = 2, Y = 2 } }; // klasa lokalna opisująca trójkąt Console.WriteLine(TTT.GetType()); //f__AnonymousType0`3[CS3.Point,CS3.Point,CS3.Point] Console.WriteLine(TTT.ToString()); //{ T1 = CS3.Point, T2 = CS3.Point, T3 = CS3.Point }
70 Wiązania dynamiczne ( 4.0 )
public object NowyKlient( ... ) { object kli = null; if ( ... ) kli = new Klient_A(); else kli = new Klient_B(); ... return kli; } // Klient_A nowy = (Klient_A) NowyKlient( ... ); if( nowy != null ) { nowy.Nazwisko = "Nowak"; }
71 dynamic nowy = NowyKlient( ... );
nowy.Nazwisko = "Nowak"; // poprawnie nowy.NieistniejącaFunkcja ( ); // błąd wykonania (nie kompilacji) · również zmienne proste dynamic liczba = ; double ile = liczba / 3.22 ; // poprawne liczba = "Napis"; // poprawne char cc = liczba[0]; // 'N'
72 · dynamiczne statyczne
Klient_B kli = new Klient_B(); dynamic dynKli = kli; // statyczna do dynamicznej Klient_B natręt = dynKli; // dynamiczna do statycznej Dyna
73 Przeciążanie operatorów
public class Line { public int Low , High ; // public static Line operator + // op. binarny ( Line L1 , Line L2 ) int a , b; a = L1.Low < L2.Low ? L1.Low : L2.Low; b = L1.High > L2.High ? L1.High : L2.High; return new Line { Low = a , High = b } ; } // musi być funkcja statyczna
74 public static int operator * (Line L1, int x)
// operator binarny { return L1.Low * x; } // Line L = new Line { Low = –2 , High = 7 } ; Line K = new Line { Low = 0 , High = 9 } ; Line LK = L + K ; // ( -2 , 9 ) int Z = LK * 5 ; // -10
75 public static Line operator + (Line db)
// operator unarny { return new Line { Low = db.Low, High = db.High + 10 }; } public static Line operator ++ (Line no) // operator unarny, pre/post nierozróżnialne return new Line {Low = no.Low – no.High, High = no.High - 1 }; } OpOver
76 Table 12-1. Overloadability of C# Operators
+, -, !, ~, ++, --, true, false These unary operators can be overloaded. +, -, *, /, %, &, |, ^, <<, >> These binary operators can be overloaded. ==, !=, <, >, <=, >= These comparison operators can be overloaded C# demands that “like” operators ( i.e., < and >, <= and >=, == and != ) are overloaded together. [ ] The [ ] operator cannot be overloaded Use the indexer construct. ( ) The () operator cannot be overloaded Use custom conversion methods. +=, -=, *=, /=, %=, &=, |=, Shorthand assignment operators cannot be overloaded; ^=, <<=, >>= however, you receive them as a freebie when you overload the related binary operator. Andrew Troelsen, Pro C# 2010 and the .NET 4 Platform, Fifth Edition, Apress.
77 Indeksatory class Zasobnik { public int[] dane = new int[100];
public int this[int ix] { get { return dane[ix]; } set { dane[ix] = value; } } } // Zasobnik zz = new Zasobnik(); zz[9] = 15; int alfa = zz[9]; Indexer
78 Definiowanie Konwersji
konwersja jawna public static explicit operator Okrąg ( Odcinek oo ) { Okrąg ok = new Okrąg(); if (oo.X > oo.Y) { ok.Sx = oo.X; ok.Sy = oo.Y; } else { ok.Sx = oo.Y; ok.Sy = oo.X; } ok.Pr = Math.Abs(oo.X + oo.Y); return ok; } // Okrąg oki = ( Okrąg ) odcinek; // jawna
79 konwersja implikowana
public static implicit operator Okrąg ( Odcinek oo ) { Okrąg ok = new Okrąg(); ok.Sx = oo.X; ok.Sy = 0; ok.Pr = oo.Y * oo.Y; return ok; } // Okrąg oki = odcinek; // implikowana · nie wolno w tej samej klasie zdefiniować obydwu konwersji ale implikowana zastępuje jawną CustConv
80 Relacja całość - część public class Radio { private string Make ;
public void OnOff ( bool on ) { ... } public Radio ( string name ) Make = name ; }
81 public class Car { private string PetName ; private Radio radio ; public Car( string music , string name ) { radio = new Radio ( music ); PetName = name ; } public MakeNoice ( bool on ) radio.OnOff ( on ); }} Car MyFirst = new Car ( "Eltra", "Kaszel" ) ; MyFirst.MakeNoice ( true );
82 Klasy zagnieżdżone public class Car { private class Radio //(1)
{ public void OnOff ( bool on ) {if (on) Console.WriteLine("Booom!"); } } private Radio radio = new Radio ( ); //(2) // obiektów klasy Radio nie można tworzyć // poza klasą Car (private) Car.Radio rd = new Car.Radio(); // błąd
83 // po zmianie private -> public (1)
public class Radio { ... } // Car.Radio rd = new Car.Radio(); rd.OnOff(true); // Booom! // po zmianie private -> public (2) public Radio radio = new Radio(); Car ca = new Car(); ca.radio.OnOff(true); // Booom!
84 Dziedziczenie public class Parent { public int a ; public string b ;
public Parent ( int Va , string Vb ) { a = Va ; b = Vb ; }} public class Child : Parent // pojedyncze { public long z ; public Child ( int Va , string Vb , long Vz ) : base ( Va , Vb ) { z = Vz ; } }
85 · składowe public są dziedziczone jako public
· składowe protected są dziedziczone jako private · składowe private nie są dziedziczone // · klasy zapieczętowane public sealed class Childless { ... } public sealed class Grandson : Child
86 Funkcje wirtualne public class Employee
{ protected decimal Payment = 1000 ; public virtual void Bonus ( decimal X ) { Payment += X ; } } public class Manager : Employee { public override void Bonus( decimal X ) { Payment += 5 * X ; }
87 public class Proxy : Manager
{ public new void Bonus ( decimal X ) Payment += 700; } public class Boss : Manager public override void Bonus(decimal X ) { Payment += 12 * X ; }
88 Employee [ ] Team = { new Employee ( ) , new Manager ( ), new Proxy ( ), new Boss ( ) } ; for ( int i = 0 ; i < Team.Length ; ++i ) Team [ i ] . Bonus ( 100 ); // 1100 , 1500 , 1500 , 2200 Proxy wice = new Proxy ( ) ; wice.Bounus ( 100 ) ; // 1700
89 · wywołanie funkcji wirtualnej z klasy bazowej
public override Draw ( ) { base.Draw ( ) ; } Wydaw
90 klasy abstrakcyjne i abstrakcyjne funkcje wirtualne
public abstract class Root { protected int alfa = 17; public abstract void Print( ); } public class Level1Node : Root public override void Print( ) Console.WriteLine( alfa );
91 Finalizacja public class Alfa { Alfa ( )
Console.WriteLine( "Oto jestem." ) ; } ~Alfa ( ) // wywoływane przez gc Console.WriteLine( "Dobranoc." ) ;
92 Zbieranie śmieci · generacje obiektów 0 , 1 , 2 · funkcje System.GC
GC.Collect ( NrGeneracji ) //( )- wszystkie GC.GetGeneration ( obiekt ) GC.MaxGeneration ( ) GC.SupressFinalize ( obiekt ) GC.ReRegisterForFinalize ( obiekt ) GC.GetTotalMemeory ( ) Fina
93 Pliki dyskowe i serializacja
· przestrzeń nazw System.IO · informacje o plikach i katalogach - abstrakcyjna klasa bazowa FileSystemInfo Name Attributes Exists CreationTime ... - klasy pochodne FileInfo DirectoryInfo · klasy Directory , File
94 przetwarzanie katalogów klasa DirectoryInfo
DirectoryInfo dir1, dir2 ; dir1 = new DirectoryInfo ) ; dir2 = new DirectoryInfo ( "." ) // bieżący, zawierający *.exe Create ( ) Delete ( ) GetFiles ( ) GetDirectories ( ) MoveTo ( ) DirInfo
95 · przetwarzanie plików klasa FileInfo
Open( ) Delete( ) MoveTo( ) OpenRead( ) OpenWrite( ) · parametry otwarcia pliku FileMode. Append Create Open OpenOrCreate Truncate FileAccess. Read ReadWrite Write FileShare. None Read ReadWrite Write
96 · wynikiem funkcji Open ( )
jest referencja obiektu klasy FileStream umożliwiającego zapis/odczyt do/z pliku bez formatowania ( ciąg bajtów ) FileInfo ff = new FileInfo FileStream fs = ff.Open (FileMode.Open , FileAccess.Read); // albo FileStream fs = new FileStream ("Plik.bin", FileMode.Open, FileAccess.Read);
97 · właściwości i funkcje klasy FileStream
CanReed CanWrite CanSeek Length Position Read ( ) ReadByte ( ) Write ( ) WriteByte ( ) Seek ( ) Flush ( ) Close ( ) // ciągi bajtów byte [ ] TaBa = new byte [ 100 ]; // for ( int i = 0 ; i < TaBa.Length ; ++i ) TaBa [ i ] = (byte) fs . ReadByte( ); // albo fs.Read ( TaBa, 0, TaBa.Length );
98 fs.Seek(0L, SeekOrigin.Begin);
// Current // End // albo fs.Position = 0; for ( int i = 0 ; i < TaBa.Length ; ++i ) fs . WriteByte( TaBa[ i ]); // albo // fs.Write(TaBa, 0, Taba.Length);
99 · wykrywanie końca pliku
int Count = 0; while (Count++ < fs.Length) { } // albo if (fs.Position != fs.Length) · zamykanie pliku fs.Close( ); FileInfo
100 · zapis/odczyt z formatowaniem klasy
Object TextReader TextWriter BinaryReader StreamWriter BinaryWriter StreamReader StringWriter StringReader
101 TextWriter TextReader
· podstawowe funkcje TextWriter TextReader Write ( ) Peek ( ) WriteLine ( ) Read ( ) Flush ( ) ReadLine ( ) Close ( ) ReadToEnd ( )
102 FileInfo fi = new FileInfo ( @"C:\Temp\Test.txt" ) ;
// klasa pochodna TextWriter StreamWriter sw = fi . CreateText ( ) ; // albo StreamWriter sw = new StreamWriter("dane.txt"); // // klasa pochodna TextReader StreamReader sr = fi . OpenText ( ) ; StreamReader sr = new SteamReader("dane.txt");
103 int a = 398 ; double x = E-42 ; sw.WriteLine ( " Some text. " ) ; // 1 arg sw.Write ( a + " ") ; sw.Write ( x.ToString ( ) ) ; sw.Close ( ) ; // string str ; str = sr.ReadLine ( ) ; a = int.Parse ( sr.ReadLine ( ) ) ; x = double.Parse ( sr.ReadLine ( ) ) ; sr.Close ( );
104 · wykrywanie końca pliku
sr.ReadLine() == null // funkcja // albo sr.EndOfStream // właściwość StreamRW
105 · podobnie StringReader StringWriter
StringWriter stw = new StringWriter(); stw.WriteLine("Tekst ćwiczebny."); // 1 arg stw.WriteLine( a ); stw.Close(); StringReader str = new StringReader ( stw.ToString() ); string st = str.ReadLine(); a = int.Parse ( str.ReadLine ( ) ) ; str.Close();
106 BinaryWriter BinaryReader
· klasy BinaryReader BinaryWriter BinaryWriter BinaryReader Write ( ) PeekChar ( ) Seek ( ) Read ( ) Flush ( ) ReadXXX ( ) Close ( ) XXX : Boolean, Byte, Bytes, Char, Chars, Int16, Int32, Int64, Double, Decimal,... BinaryRW
107 serializacja automatyczne zapisywanie / odczytywanie obiektów klas do / z pliku
using System.Runtime.Serialization. Formatters.Binary ; using System.IO ; // [Serializable] public class Radio { public string Make ; [NonSerialized] private int something ; // nie zapisywane public bool On ; }
108 Radio radio = new Radio ( ) ;
radio.Make = "Aiwa" ; radio.On = true ; // FileStream data = File.Create ("Radio.dat"); BinaryFormatter bifoter = new BinaryFormatter(); bifoter.Serialize ( data , radio ) ; data.Close ( ) ; data = File.OpenRead ( "Radio.dat" ) ; Radio nn = (Radio)bifoter.Deserialize( data ); Seria
109 System.Collections // usunąć Generics
Klasy kolekcji System.Collections // usunąć Generics · klasy ArrayList // lista dowolnych obiektów Queue // kolejka FIFO Stack // stos LIFO SortedList // posortowana lista par // <klucz, wartość> Hashtable // tablica par // <klucz, wartość > // kodowanie mieszające
110 · ArrayList // tablica dowolnych obiektów
Add, BinarySearch, Clear, Clone, Contains, CopyTo, IndexOf, Insert, Remove, Reverse, Sort // funkcje Capacity, Count // właściwości · Queue // kolejka FIFO Enqueue, Dequeue, Peek, Clear, Contains // funkcje Count // właściwość · Stack // stos LIFO Push, Pop, Peek, Clear, Contains // funkcje
111 · SortedList // lista par <klucz, wartość>
// posortowana Add, Clear, ContainsKey, ContainsValue, GetByIndex, IndexOfKey, IndexOfValue, Remove, SetByIndex // funkcje Capacity, Count, Item // właściwości // KeyValuePair – klasa pomocnicza · Hashtable // tablica par <klucz, wartość > // kodowanie mieszające Add, Clear, ContainsKey, ContainsValue, Remove // funkcje Capacity, Count, Item // właściwości
112 public class Auto { public string Name; public double Price; public Auto(string nn, double pp) Name = nn; Price = pp; }
113 ArrayList al = new ArrayList();
al.Add ( new Auto("A", 100) ); al.Add ( new Auto("B", 20) ); Console.WriteLine("{0}, {1}", ((Auto)al[0].Price, ((Auto)al[1]).Price); // 100, 20
114 SortedList sl = new SortedList();
sl.Add ( "zero", new Auto("A", 100) ); sl.Add ( "jeden", new Auto("B", 20) ); // Console.WriteLine("{0}, {1}, {2}, {3}", ((Auto)sl["zero"]).Price, ((Auto)sl["jeden"]).Price; // 100, 20 ((Auto)sl.GetByIndex(0)).Price, ((Auto)sl.GetByIndex(1)).Price); // 20, 100
115 generics, typy parametryczne, typy uogólnione
Wzorce klas kolekcji generics, typy parametryczne, typy uogólnione Dictionary <key, value> SortedDictionary <key, value> LinkedList <type> // dwukierunkowa List <type> // jednokierunkowa SortedList <key, value> // indeksowanie Queue <type> Stack <type>
116 sl.Add("C", "alfa"); // kompilacja ok
SortedList sl = new SortedList(); sl.Add(12, 5.5); sl.Add("B", 9); sl.Add("C", "alfa"); // kompilacja ok // błąd wykonania, porównanie kluczy niemożliwe
117 SortedList <string, int> al =
new SortedList <string, int> (); al.Add("X", 5); al.Add("Y", 7); al.Add("Z", 3); al.Add(5, 2); // błąd kompilacji al.Add("K", 3.2); // błąd kompilacji // Console.WriteLine("{0}, {1}, {2}", al["X"], al["Y"], al["Z"]); // 5, 7, 3
118 · wzorce kolekcji we wzorcach funkcji
class Osoba { public string Imie; public string Nazwisko; public Osoba(string s1, string s2) { Imie = s1; Nazwisko = s2; } public overrite string ToString( ) return Imie + " " + Nazwisko; } }
119 public void Dopisz <T> (List <T> li,
params T [ ] dane ) { foreach ( T elem in dane ) li.Add( elem ); } // List <Osoba> lios = new List <Osoba>(); Dopisz(lios, new Osoba("Adam", "Kot"), new Osoba("Anna","Kotka")); foreach (Osoba os in lios) Console.WriteLine( os );
120 Interfejsy · określają operacje realizowane przez klasę lub jej cechy charakterystyczne · klasy abstrakcyjne zawierające deklaracje funkcji abstrakcyjnych public interface INodes_F { int GetNumberOfNodes ( ); } // funkcja abstrakcyjna // lub public interface INodes_P { int Nodes {get; set;} } // właściwość abstrakcyjna
121 public abstract class Shape
{ public int Nodes ; public double Surface; } // public class Hexagon : Shape , INodes_F public int GetNumberOfNodes ( ) return 6 ;
122 public class Triangle : Shape , INodes_F
{ public int GetNumberOfNodes ( ) return 3 ; } // public class Circle : Shape ...
123 Hexagon hex = new Hexagon ( );
if ( hex is INodes_F ) ; // test // INodes_F inodes1 = (INodes_F) hex ; // InvalidCastException INodes_F inodes2 = hex as INodes_F ; // NULL int NodesOfHex = inodes1.GetNumberOfNodes ( ) ; · zmienne reprezentujące interfejsy ( referencje ) mogą być parametrami funkcji · interfejs jako typ może być wynikiem funkcji Dzie&Int
124 · hierarchie interfejsów
interface IDrawBW { void DrawBW ( ) ; } interface IDrawGS : IDrawBW void DrawGS ( ) ; interface IDrawCR : IDrawGS void DrawCR ( ) ;
125 public class Picture : IDrawCR
{ // implementacja funkcji // DrawCR , DrawGS , DrawBW } // Picture pp = new Picture ( ) ; IDrawCR iCR = pp as IDrawCr ; iCR . DrawBW ( ) ; iCR . DrawGS ( ) ; iCR . DrawCR ( ) ;
126 Interfejsy standardowe
System.Collections · interfejsy ICollection IDictionary IDictionaryEnumerator IHashCodeProvider IList IComparer // IEnumerable IEnumerator IClonable IComparable
127 · przeglądanie kolekcji
Library EhRL = new Library ( ) ; foreach ( Book bb in EhRL ) { ... } ; // wymaga w IEnumerable oraz IEnumerator // w klasie Library public class Library : IEnumerable, IEnumerator { private Book [ ] BookArr ;
128 // implementacja IEnumerable
public IEnumerator GetEnumerator ( ) { return ( IEnumerator ) this ; } // implementacja IEnumerator public void Reset ( ) { .... } public bool MoveNext ( ) { ... } public object Current get { .... } } }
129 public class DaysOfTheWeek : IEnumerable
- iteratory (2.0) public class DaysOfTheWeek : IEnumerable { string[] m_Days = { "Sun", "Mon", "Tue", "Wed", "Thr", "Fri", "Sat" }; public IEnumerator GetEnumerator() { for (int i = 0; i < m_Days.Length; i++) yield return m_Days[i]; } } // DaysOfTheWeek week = new DaysOfTheWeek(); foreach (string day in week) System.Console.Write(day + " "); Iterat
130 · pełne kopiowanie public class Point { public int x , y ; public Point (int A , int B ) { x = A ; y = B ; } Point AA , BB ; AA = new Point ( 5, 7) ; BB = AA ; // AA i BB wskazują ten sam // obiekt na stercie (shallow)
131 // pełne kopiowanie wymaga ICloneable
public class Point : ICloneable { public int x , y ; public Point (int A , int B ) { x = A ; y = B ; } public object Clone ( ) return new Point( this.x , this.y ); } BB = (Point)AA.Clone(); // nowa kopia
132 · sortowanie public class Point : IComparable { public int X, Y; public int CompareTo ( object ob ) // { < == > } -> { } { Point temp = (Point) ob; if ( this.X > temp.X ) return 1; if ( this.X == temp.X ) return 0 ; return -1; }} Point [ ] aP = new Point [ 100 ]; Array.Sort(aP); // aP[3].CompareTo((object)aP[7]) SortP, Komis
133 · interfejsy parametryczne, generics
ICollection < T > IComparer < T > IDictionary < TKey, TValue > IEnumerable < T > IEnumerator < T > IEqualityComparer < T > IList < T >
134 · klasy, kolekcje i interfejsy parametryczne
public class Dict<KeyType, EleType > where KeyType: IComparable<KeyType> { Dictionary<KeyType, EleType> dd = new Dictionary<KeyType,EleType>(); public KeyType patt; public void Add(KeyType key, EleType val) { if (key.CompareTo(patt) != 0 && !dd.ContainsKey(key)) dd.Add(key, val); } }
135 Dict<int, string> dis = new Dict<int,string>();
dis.patt = 25; dis.Add(24, "alfa"); dis.Add(25, "beta"); dis.Add(26, "delta"); dis.Add(26, "gamma"); // {24, alfa}, {26, delta}
136 Delegacje · klasy, których obiekty udostępniają funkcje
· klasy pochodne System.MulticastDelegate Składowe klasy System.MulticastDelegate składowa opis Method nazwa funkcji zawartej w delegacji Target nazwa klasy, w której zdefiniowana jest funkcja lub null dla statycznych Combine( ), +, += dodanie funkcji GetInvocationList ( ) lista funkcji zawartych w delegacji Remove( ), -, -= usunięcie funkcji
137 delegate double Fun(double x, out bool ok);
// nowy typ // funkcje nazwane double Sqrt(double x, out bool ok) { if ( x >= 0 ) { ok = true; return Math.Sqrt( x ); } else { ok = false; return 0; } } // double Log (double x, out bool ok) { }
138 double z, x = 4.3; bool dobrze = true; Fun funkcja = new Fun ( Sqrt ); // obiekt delegacji // albo Fun funkcja = Sqrt; // wywołanie z = funkcja ( x, out dobrze ); // sqrt // funkcja = Log; z = funkcja ( x, out dobrze ); // log if (funkcja != null) ...
139 · tablice delegacji Fun [] TabFun = new Fun[2]; TabFun[0] = new Fun(Sqrt); TabFun[1] = Log; // po ustaleniu indeksu z = TabFun[indeks](x, out dobrze); // double [] Args = {2.34, 5.32}; double [] Results = { TabFun[0](Args[0], out dobrze); TabFun[1](Args[1], out dobrze); };
140 · delegacje wielokrotne (multicast)
void AsIs(string s) { Console.WriteLine(s); } // void Vers(string s) Console.WriteLine(s.ToUpper( ));
141 delegate void Print2(string s);
// Print2 Both = AsIs; Both += Vers; Both("Ala ma kota."); // Ala ma kota. // ALA MA KOTA. Both -= AsIs; Both("Ola ma psa."); // OLA MA PSA if (Both != null) ... Dele, MulDele, EwideD
142 · delegacje anonimowe (2.0) button1.Click += // delegacja Click
delegate(System.Object o, System.EventArgs e) { MessageBox.Show("Click!"); }; // delegate int Del( int x ); static int n = 79; // składowa klasy int m = 2; // zmienna lokalna Del d = delegate( int k ) { return n + m + k + 3; }; int F = d(5); // 89 Anonymous
143 · kowariancja i kontrawariancja delegacji (2.0)
( covariance and contravariance ) class Mammal { ... } // bazowa class Dog : Mammal { ... } // pochodna // public delegate Mammal Handler( ); // delegacja public Mammal FirstHandler( ) { return new Mammal( ); } public Dog SecondHandler( ) { return new Dog( ); } Handler handler1 = FirstHandler; Handler handler2 = SecondHandler;// kowariancja
144 public delegate void Vet ( Dog );
// delegacja public void FirstHandler(Dog ds) { ... } public void SecondHandler ( Mammal ms ) { ... } // Vet handler1 = FirstHandler; Vet handler2 = SecondHandler; // kontrawariancja
145 ● wzorce delegacji (generics) (3.0)
delegate R Fun <R, A>(A arg); // Fun <long, int> d1; long FK (int x) { return (long)x L; } d1 = FK; Fun <double, double> d2; Fun <char, int> d3;
146 ● systemowe wzorce delegacji bezwynikowe
public delegate void Action <in T> ( ) public delegate void Action <in T> ( T arg ) public delegate void Action<in T1, in T2> ( T1 arg1, T2 arg2 ) // ……………………………………………………………………………… public delegate void Action<in T1, in T2, in T3, in T4, in T5, in T6, in T7, in T8, in T9, in T10, in T11, in T12, in T13, in T14, in T15, in T16> ( T1 arg1, T16 arg16 ) // Action <string> messageTarget; messageTarget = Console.WriteLine; messageTarget("Hello, World!");
147 public delegate TResult Func <out TResult>( )
B. z wynikiem public delegate TResult Func <out TResult>( ) public delegate TResult Func <in T, out TResult> ( T arg ) //……………………………………………………………………………………………… public delegate TResult Func <in T1, in T2, in T3, in T4, in T5, in T6, in T7, in T8, in T9, in T10, in T11, in T12, in T13, in T14, in T15, in T16, out TResult> ( T1 arg1, , T16 arg16 ) // Func <string, string> convertMethod = OnlyLetters; //…………………………………………………………………………………………………… string name = "Dakota512"; Console.WriteLine(convertMethod(name)); convertMethod = OnlyDigits;
148 ● wyrażenia lambda (funkcje nienazwane) (3.0)
- jeden argument delegate R Fun <R, A>(A arg); // Fun <int, int> L1 = x => x * x + 1; // λ x . x * x + 1 Console.WriteLine( L1(12) ); // 145 Fun <double, int> L2 = x => (double)x / ; Console.WriteLine( L2(7) ) ; // 4,0
149 wiele argumentów delegate R Arg2 <R, A, B> (A x, B y); // Arg2 <long, int, char> suma = (x,y) => (long)(x + y + 1); Console.WriteLine(" Suma : " + suma(15, 'A'). ToString()); // Suma : 81 Lambda
150 · Use a delegate when: An eventing design pattern is used. The caller has no need access other properties, methods, or interfaces on the object implementing the method. Easy composition is desired. A class may need more than one implementation of the method.
151 · Use an interface when:
There are a group of related methods that may be called. A class only needs one implementation of the method. The class using the interface will want to cast that interface to other interface or class types. The method being implemented is linked to the type or identity of the class: for example, comparison methods.
152 Zdarzenia · zgłoszenie zdarzenia powoduje wywoływanie
wszystkich funkcji zawartych w delegacji powiązanej z tym zdarzeniem public class Car { private float Gas ; public delegate void GasShortage ( string msg ) ; public event GasShortage Yellow ; public event GasShortage Red ;
153 public void SpeedUp ( double speed )
{ if ( Gas < 2 && Yellow != null ) Yellow ( "Only " Gas.ToString ( ) " gallons of gas !" ); if ( Gas < 0.5 && Red != null ) Red ( "Almost no gas !" ) ; }
154 public class Driver { private Car MyCar = new Car( ); public void Driving ( ) { MyCar.Yellow += new Car.GasShortage ( YellowLight ); MyCar.Red += new Car.GasShortage ( RedLight ) ; } public void Parking ( ) { MyCar.Yellow -= new Car.GasShortage ( YellowLight ) ;
155 public static void YellowLight (string msg )
{ Console.WriteLine ( msg ); } public static void RedLight (string msg ) Alarm ( ) ; Event, Loteria
156 Obsługa wyjątków throw nazwa_wyjątku // obiekt klasy dziedziczącej z System.Exception try { } catch ( typ_wyjątku ) catch // wszystkie wyjątki finally Exep
157 Zapytania ( 3.0 ) wyrażenia zapytaniowe - querry expressions
przestrzeń nazw LINQ - Language-Integrated Query 3 etapy : 1. określenie źródła danych, 2. utworzenie zapytania, 3. wykonanie zapytania.
158 class FirstLINQ { static void Main() { int[] numbers = // 1. Data source. new int[7] { 0, 1, 2, 3, 4, 5, 6 }; // 2. Query creation. var numQuery = from num in numbers where (num % 2) == 0 select num; // 3. Query execution. foreach (int elem in numQuery) { Console.Write("{0} ", elem); }}}
159 IQueryable< > , IQueryProvider
technologie LINQ Linq to Objects Linq to DataSet Linq to SQL Linq to XML Linq to own sources IQueryable< > , IQueryProvider J. Matulewski, C# 3,0 i .Net. 3.5 Technologia LINQ, Helion, 2008 Przykłady : IEnumerable IEnumerable< >
160 słowa kluczowe from // źródło danych where // filtrowanie danych select // pobieranie danych join // łączenie danych orderby // sortowanie danych ascending // rosnąco descending // malejąco let // nadanie wartości group // grupowanie danych into // kontynuacja zapytania on // połącz tabele equals // równość pól
161 funkcje rozszerzające IEnumerable, IEnumerable< >
Select, SelectMany // pobieranie danych OrderBy, ThenBy, OrderByDescending, ThenByDescending, Reverse // sortowanie Where // filtrowanie Aggregate, Average, Count, LongCount, Max, Min, Sum // artymetyczne Cast, OfType, ToArray, ToDictionary, ToList, ToLookup, ToSequence // konwersja Element, DefaultIfEmpty, ElementAt, ElementAtOrDefault, First, FirstOrDefault, Last, LastOrDefault, Single, SingleOrDefault // pobieranie elementu
162 EqualAll // porównywanie
Empty, Range, Repeat // tworzenie GruopBy // grupowanie GroupJoin, Join // łączenie Skip, SkipWhile, // pomijanie Take, TakeWhile // wybór All, Any, Contains // kwantyfikatory Concat, Distinct, Exept, Intersection, Union // operacje na zbiorach
163 Func<string, string> selector = str => str.ToUpper();
public static IEnumerable<TResult> Select <TSource, TResult> (this IEnumerable<TSource> source, Func<TSource, TResult> selector) // Func<string, string> selector = str => str.ToUpper(); string[] words = { "orange", "apple", "Article", "elephant" }; var aWords = words.Select(selector); foreach (string word in aWords) Console.WriteLine(word);
164 Linq to own sources ->
Linq to Objects -> Linq to own sources -> Linq1 Linq2
165 Współbieżność · przestrzeń nazw System.Threading
· klasa Thread tworzenie wątków i zarządzanie ich wykonywaniem · główne funkcje Start Suspend Resume Abort Sleep GetHashCode · główne właściwości CurrentThread Name ThreadState Priority IsBackGround IsAlive
166 · priorytety wątków Lowest BelowNormal Normal AboveNormal Highest · wątki pierwszoplanowe i drugoplanowe ( ForeGround / BackGroung Threads ) – dopóki istnieje przynajmniej jeden wątek pierwszoplanowy aplikacja nie jest zamykana przez CLR – po zakończeniu ostatniego wątku pierwszoplanowego CLR kończy wszystkie aktywne jeszcze wątki drugoplanowe
167 public class Worker { public bool EndOfWork = false ; public void DoWork ( ) // funkcja wątku { Console.WriteLine ("Worker's ID is {0}\n" + "Worker's name is {1}", Thread.CurrentThread.GetHashCode ( ) , Thread.CurrentThread.Name ) ; for ( int i = 0; i < 1000 && !EndOfWork ; ++i ) { Console.WriteLine ( i ) ; Thread.Sleep ( 500 ) ; } } // End of Worker
168 static void Main ( string [ ] args )
{ Worker ww = new Worker ( ) ; Thread job = new Thread( new ThreadStart( ww.DoWork )); // delegacja ThreadStart // funkcja bezargumentowa job.Name = "Ben" ; job.Start ( ) ; Thread.Sleep ( 5000 ); job.Suspend ( ) ; ww.EndOfWork = true ; job.Resume ( ) ; }
169 // funkcje z argumentami
class AddParams // klasa argumentu { public int a, b; public AddParams(int numb1, int numb2) a = numb1; b = numb2; }
170 class Program { void Add(object data) // funkcja wątku if (data is AddParams) AddParams ap = (AddParams)data; Console.WriteLine("{0} + {1} is {2}", ap.a, ap.b, ap.a + ap.b); }
171 void Run ( ) { AddParams ap = new AddParams(10, 10); Thread t = new Thread( new ParameterizedThreadStart(Add)); t.Start(ap); // przyśnij, aby drugi wątek // zakończył pracę Thread.Sleep(50); } ParamThread
172 · asynchroniczne wykonywanie delegacji
public delegate int BinaryOp(int x, int y); int Add(int x, int y) { Thread.Sleep(5000); return x + y; } // BinaryOp b = new BinaryOp(Add); // wywołanie synchroniczne, ten sam wątek int answer = b(10, 10); // lub int answer = b.Invoke(10, 10);
173 // asynchronicznie, odrębny wątek
BinaryOp b = new BinaryOp(Add); // Start secondary thread IAsyncResult iftAR = b.BeginInvoke(10, 10, null, null); // Do other work on primary thread... int answer = b.EndInvoke(iftAR); Console.WriteLine(" is {0}.", answer); AsyncDel
174 // funkcje zwrotne bool Ready = false; void AddComplete(IAsyncResult itfAR) { Console.WriteLine("Your addition is ready"); Ready = true; } // IAsyncResult iftAR = b.BeginInvoke(10, 10, new AsyncCallback(AddComplete), null); while (!Ready) { // other work is performed here... } int answer = b.EndInvoke(iftAR); AsyncCall
175 · wykonywanie cykliczne
void PrintTime(object state) { Console.WriteLine("Time is: {0}", DateTime.Now.ToLongTimeString()); } TimerCallback timeCB = new TimerCallback(PrintTime); Timer t = new Timer(timeCB, null, 0, 1000); // delegacja, parametr, // opóźnienie startu, interwał // wątek drugoplanowy Timer
176 · synchronizacja dostępu
do obiektów współużytkowanych ─ lock ( słowo kluczowe ) ─ System.Treading.Semaphore ─ System.Treading.Mutex ─ System.Treading.Monitor ─ System.Treading.Interlocked ─ synchronizacja za pomocą zdarzeń ─ atrybut wykluczania
177 public class SharedData_1
{ private Records [ ] DataBase ; object UpdateLock; public Update ( string str ) { lock ( UpdateLock ) // aktualizacja } Adders
178 public Semaphore sem1 = new Semaphore (
init_val, max_val ); // count = init_val public class SharedData_2 { private Records [ ] DataBase ; public Update ( string str ) { sem1.WaitOne( ); // if ( count != 0 ) --count; else wait; // aktualizacja sem1.Release( ); // ++count; } } // wątki nie są identyfikowane
179 public Mutex mut1 = new Mutex ( );
public class SharedData_2 { private Records [ ] DataBase ; public Update ( string str ) { mut1.WaitOne( ); // request ownership // of a mutex // updating mut1.ReleaseMutex( ); // release ownership } } // wątki są identyfikowane
180 public class SharedData_3
{ private Records [ ] DataBase ; object UpdateObject; public Update ( string str ) { try { Monitor.Enter ( UpdateObject ) // aktualizacja } finally // zawsze się wykona Monitor.Exit ( UpdateObject ) ; } } } // .TryEnter .Wait() .Pulse()
181 public class MainCounter // Interlocked
{ private long Counter = 0; public void Inc ( ) // + 1 Interlocked.Increment( ref Counter ); } public void Dec ( ) // - 1 Interlocked.Decrement( ref Counter ); }
182 public void Exch ( ref Value ) //
{ Interlocked.Exchange( ref Counter, ref Value ); } public void CompExch ( val1, val2 ) Interlocked.CompareExchange ( ref Counter, val1, val2 ); } // if (Counter == val1) // Counter = val2;
183 · synchronizacja ścieżek za pomocą zdarzeń
─ ManualResetEvent (true / false) ─ AutoResetEvent (true / false) ─ Reset() false ─ Set() true ─ WaitOne() : Manual bz Auto false, gdy było true ResetEvent
184 · atrybut wykluczania Synchronization
using System.Runtime.Remoting.Contexts; // Thread safe [Synchronization] class Services : ContextBoundObject { public void Read ( ... ) { ... } public void Print ( ... ) { ... } public void Update ( ... ) { ... } } // wszystkie funkcje wykonywane niepodzielnie
185 · pula wątków CLR ─ powołanie nowego wątku ( async delegate ) powoduje uruchomienie jednego z oczekujących wątków utworzonych dla programu przez CLR ─ można do kolejnych wątków puli przypisywać funkcje do wykonania ( poprzez delegację WaitCallback ) - wątki drugoplanowe public class Printer { public void PrintNumbers() { ... } }
186 Printer prin = new Printer();
WaitCallback workItem = new WaitCallback(PrintTheNumbers); // Queue the method ten times. for (int i = 0; i < 10; i++) ThreadPool.QueueUserWorkItem(workItem, prin); // void PrintTheNumbers(object state) { Printer task = (Printer)state; task.PrintNumbers(); } ResetEventPool, PrinterPool
187 · współbieżne wykonywanie zadań
TPL – Task Parallel Library using System.Threading.Tasks; ─ współbieżne przetwarzanie rozłącznych zbiorów danych Parallel.For ( from, to, action ) Parallel.ForEach ( data_source, action ) // również z dodatkowymi parametrami
188 Parallel.For ( 0, 4, DoWork );
// powołanie 4 wątków (0, 1, 2, 3), // z których każdy wykonuje funkcję // zawartą w delegacji DoWork DataPara/MatMul Parallel.ForEach ( kolekcja, DoWork ) ; // powołanie max. tylu wątków ile // elementów zawiera kolekcja, // każdy wątek wykonuje funkcję // zawartą w delegacji DoWork DataPara/PictRev
189 ─ współbieżne obliczenia
Parallel.Invoke( action [ ] ac_list) // powołanie dla każdej akcji z ac_list // wątka wykonującego tę akcję ─ przerwanie wykonania wszystkich ścieżek CancelationToken TaskPara
190 ─ klasa Task<TResult> // zadanie o wyniku
─ klasa TaskFactory // zbiór zadań // wykonywanych // współbieżnie Task.Factory.ContinueWhenAll( Task<TResult> [ ] TaskTable, Action<Task<TResult>> DoNext ) ; TaskFact
191 · współbieżne zapytania PLINQ
AsParallel() WithCancellation() WithDegreeOfParallelism() // private CancellationTokenSource cancelToken = new CancellationTokenSource() cancelToken.Cancel();
192 int[] modThreeIsZero = null;
// source – vector of integers try { modThreeIsZero = (from num in source.AsParallel() WithCancellation(cancelToken.Token) where num % 3 == 0 orderby num descending select num.ToArray(); } catch (OperationCanceledException ex) Console.WriteLine( ex.Message ); ParLinq
193 Przestrzeń nazw · łączy zdefiniowane typy ( klasy, struktury, delegacje, zdarzenia, wyliczenia) using System ; namespace MySpace { public class Alfa { ... } public class Beta { ... } } · gdy definicje klas w kilku plikach należy powtórzyć deklarację namespace
194 · korzystanie z przestrzeni nazw w innej przestrzeni
using System ; using MySpace ; namespace NextSpace { public class Alfa_1 : Alfa { } public class Alfa_2 : MySpace.Alfa // gdy konfliktowe nazwy { .... } }
195 · przestrzeń nazw definiująca stałe
namespace Constants { public sealed class CT { public static readonly double pi = ; e = ; private CT( ) {} } using Constants ; double radius = 23.4 ; double perimeter = 2.0 * CT.pi * r ;
196 Pakiety i odzwierciedlenie ( refleksja ) typów
· pakiet ( assembly ) ─ aplikacja ─ biblioteka Nagłówek .exe Manifest Metadane Typów CIL Zasoby
197 · składniki przestrzeni nazw System.Reflection
· składniki przestrzeni nazw System.Reflection Klasa Opis Assembly wczytanie pakietu, analiza manifestu lista typów ( klas , struktur ) AssemblyName wersja, ustawienia regionalne MethodInfo opis funkcji składowej ParameterInfo opis parametru PropertyInfo opis właściwości FieldInfo opis danej składowej
198 · tworzenie biblioteki .dll
typ projektu: Class Library np. CarTuneUpLib CarTuneUpLib.dll public Garage : WashCar() ,ChangeOil() ... · korzystanie z biblioteki za pomocą Add Reference dodać bibliotekę CarTuneUpLib // using CarTuneUpLib ; public static int Main ( string [ ] args ) { Garage BlueNut = new Garage ( ) ; BlueNut.ChangeOil ( ... ) ; }
199 · dynamiczne ładowanie biblioteki
using System ; using System.Reflection ; using System.IO ; Assembly a = Assembly.Load ( "CarTuneUpLib" ); // CarTuneUpLib.dll tam gdzie .exe // klasy Type [ ] Classes = a.GetTypes( ); // odczytywanie składowych Type garage = a.GetType("CarTuneUpLib.Garage"); MemberInfo [ ] mi = garage.GetMembers( ); // podobnie parametry funkcji
200 · dynamiczne wywoływanie funkcji
// tworzenie klasy object Gar = Activator.CreateInstance(garage); // MethodInfo wash = garage.GetMethod("WashCar"); wash.Invoke( Gar, null ); // bezargumentowa object [ ] TabPar = { par1, par2, ... }; xxx.Invoke ( obj, TabPar ); // z argumentami
201 · pakiety prywatne i współużytkowane ( Global Assembly Cache )
· pakiety prywatne i współużytkowane ( Global Assembly Cache ) · wersje pakietów współużytkowanych a.b.c.d ─ a : główny numer wersji ─ b : podrzędny numer wersji ─ c : numer kolejny kompilacji ─ d : liczba szybkich poprawek · gdy różne a lub b wersja nieodpowiednia
Pobierz ppt "Język C# ( 5.0 ) using System; namespace HeWo { class Hello"
Podobne prezentacje
Reklamy Google
|
{
"url": "http://slideplayer.pl/slide/414068/",
"source_domain": "slideplayer.pl",
"snapshot_id": "crawl=CC-MAIN-2019-18",
"warc_metadata": {
"Content-Length": "545960",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:FRQ77DJ4DLZHBBOCOUY7DHDAYTNOA4UK",
"WARC-Concurrent-To": "<urn:uuid:cdca6ea8-4e18-4fd9-b0dd-688fef28a51a>",
"WARC-Date": "2019-04-23T08:33:26Z",
"WARC-IP-Address": "138.201.81.207",
"WARC-Identified-Payload-Type": "text/html",
"WARC-Payload-Digest": "sha1:XANECYCTODRG4KNEZMO2VSH4LWF3MP2N",
"WARC-Record-ID": "<urn:uuid:15930a23-4d5f-4075-81b4-8905f1668225>",
"WARC-Target-URI": "http://slideplayer.pl/slide/414068/",
"WARC-Truncated": null,
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:f6e07100-d0ad-4dee-9cc2-da3cc91f1180>"
},
"warc_info": "isPartOf: CC-MAIN-2019-18\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for April 2019\r\noperator: Common Crawl Admin ([email protected])\r\nhostname: ip-10-150-136-47.ec2.internal\r\nsoftware: Apache Nutch 1.15 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.1-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/"
}
|
{
"line_start_idx": [
0,
38,
39,
77,
78,
138,
139,
148,
282,
283,
303,
304,
305,
409,
410,
472,
585,
586,
657,
769,
770,
802,
988,
989,
1054,
1211,
1212,
1276,
1457,
1458,
1522,
1716,
1717,
1755,
1863,
1864,
2046,
2047,
2075,
2198,
2199,
2262,
2340,
2341,
2413,
2562,
2563,
2594,
2990,
2991,
3026,
3133,
3134,
3172,
3525,
3526,
3562,
3959,
3960,
3999,
4308,
4309,
4355,
4567,
4568,
4617,
4966,
4967,
5024,
5273,
5274,
5345,
5532,
5533,
5713,
5714,
5958,
5959,
6000,
6213,
6214,
6568,
6569,
6855,
6856,
6893,
7132,
7133,
7183,
7363,
7364,
7407,
7578,
7579,
7627,
7831,
7832,
7863,
8013,
8014,
8075,
8422,
8423,
8631,
8632,
8668,
8839,
8840,
8866,
9097,
9098,
9166,
9285,
9286,
9553,
9554,
9581,
9788,
9789,
9825,
10020,
10021,
10332,
10333,
10373,
10592,
10593,
10946,
10947,
10996,
11196,
11197,
11239,
11367,
11368,
11409,
11745,
11746,
11788,
11880,
11881,
12171,
12172,
12218,
12380,
12381,
12420,
12621,
12622,
12675,
12865,
12866,
12917,
13238,
13239,
13295,
13563,
13564,
13609,
13794,
13795,
13839,
14139,
14140,
14194,
14412,
14413,
14448,
14569,
14570,
14600,
14832,
14833,
15083,
15084,
15121,
15328,
15329,
15540,
15541,
15597,
15900,
15901,
16118,
16119,
16155,
16440,
16441,
16507,
16730,
16731,
16796,
16987,
16988,
17165,
17166,
17202,
17488,
17489,
17550,
17717,
17718,
17788,
18107,
18108,
18170,
18597,
18598,
18629,
18857,
18858,
18895,
19147,
19148,
19182,
19322,
19323,
19350,
19630,
19631,
19680,
19869,
19870,
19913,
20149,
20150,
20197,
20905,
20906,
20972,
21124,
21125,
21151,
21419,
21420,
21445,
21723,
21724,
21793,
21876,
21877,
22163,
22164,
22231,
22458,
22459,
22498,
22708,
22709,
22781,
22981,
22982,
23033,
23225,
23226,
23269,
23464,
23465,
23497,
23644,
23645,
23896,
23897,
23947,
23998,
23999,
24054,
24229,
24230,
24274,
24381,
24382,
24453,
24640,
24641,
24673,
24905,
24906,
24955,
25147,
25148,
25197,
25410,
25411,
25445,
25730,
25731,
25781,
26072,
26073,
26107,
26263,
26264,
26298,
26429,
26430,
26473,
26580,
26581,
26607,
26739,
26740,
26797,
27039,
27040,
27315,
27316,
27351,
27430,
27431,
27478,
27728,
27729,
27759,
27989,
27990,
28082,
28293,
28294,
28328,
28611,
28612,
28654,
28926,
28927,
28973,
29265,
29266,
29313,
29672,
29673,
29797,
29798,
29834,
29978,
29979,
30017,
30278,
30279,
30329,
30582,
30583,
30625,
30778,
30779,
30813,
31042,
31043,
31091,
31283,
31284,
31325,
31554,
31555,
31892,
31893,
31925,
32057,
32058,
32103,
32185,
32186,
32221,
32558,
32559,
32594,
32726,
32727,
32762,
32940,
32941,
32968,
33135,
33136,
33170,
33379,
33380,
33413,
33616,
33617,
33662,
34020,
34021,
34250,
34251,
34293,
34497,
34498,
34835,
34836,
34883,
35018,
35019,
35074,
35359,
35360,
35412,
35540,
35541,
35601,
35956,
35957,
36005,
36200,
36201,
36457,
36458,
36742,
36743,
36788,
36890,
36891,
36927,
37111,
37112,
37180,
37438,
37439,
37496,
37839,
37840,
37878,
38061,
38062,
38102,
38247,
38248,
38293,
38745,
38746,
38796,
39331,
39332,
39382,
39601,
39602,
39801,
39802,
40067,
40068,
40099,
40417,
40418,
40476,
40700,
40701,
40742,
40896,
40897,
41164,
41165,
41214,
41314,
41315,
41475,
41476,
41541,
41678,
41679,
41972,
41973,
42008,
42236,
42237,
42554,
42555,
42609,
43040,
43041,
43070,
43315,
43316,
43374,
43717,
43718,
43745,
43799,
43800,
43853,
44078,
44079,
44439,
44440,
44797,
44798,
44839,
45094,
45095,
45124,
45241,
45242,
45422,
45423,
45632,
45633,
45681,
45924,
45925,
45963,
46196,
46197,
46522,
46523,
46556,
46837,
46838,
46875,
47113,
47114,
47144,
47272,
47273,
47317,
47586,
47587,
47626,
47854,
47855,
47885,
48124,
48125,
48169,
48331,
48332,
48372,
48562,
48563,
48615,
48779,
48780,
48827,
49088,
49089,
49431,
49432,
49466,
49753,
49754,
49795,
50020,
50021,
50056,
50358,
50359,
50388,
50564,
50565,
50611,
50779,
50780,
50819,
50978,
50979,
51012,
51280,
51281,
51557,
51558,
51621,
51778,
51779,
51825,
52012,
52013,
52064,
52172,
52173,
52224,
52533,
52534,
52574,
52905,
52906,
52950,
53281,
53282,
53325,
53571,
53572,
53639,
53937,
53938,
53939,
54013,
54014,
54034,
54035,
54036
],
"line_end_idx": [
38,
39,
77,
78,
138,
139,
148,
282,
283,
303,
304,
305,
409,
410,
472,
585,
586,
657,
769,
770,
802,
988,
989,
1054,
1211,
1212,
1276,
1457,
1458,
1522,
1716,
1717,
1755,
1863,
1864,
2046,
2047,
2075,
2198,
2199,
2262,
2340,
2341,
2413,
2562,
2563,
2594,
2990,
2991,
3026,
3133,
3134,
3172,
3525,
3526,
3562,
3959,
3960,
3999,
4308,
4309,
4355,
4567,
4568,
4617,
4966,
4967,
5024,
5273,
5274,
5345,
5532,
5533,
5713,
5714,
5958,
5959,
6000,
6213,
6214,
6568,
6569,
6855,
6856,
6893,
7132,
7133,
7183,
7363,
7364,
7407,
7578,
7579,
7627,
7831,
7832,
7863,
8013,
8014,
8075,
8422,
8423,
8631,
8632,
8668,
8839,
8840,
8866,
9097,
9098,
9166,
9285,
9286,
9553,
9554,
9581,
9788,
9789,
9825,
10020,
10021,
10332,
10333,
10373,
10592,
10593,
10946,
10947,
10996,
11196,
11197,
11239,
11367,
11368,
11409,
11745,
11746,
11788,
11880,
11881,
12171,
12172,
12218,
12380,
12381,
12420,
12621,
12622,
12675,
12865,
12866,
12917,
13238,
13239,
13295,
13563,
13564,
13609,
13794,
13795,
13839,
14139,
14140,
14194,
14412,
14413,
14448,
14569,
14570,
14600,
14832,
14833,
15083,
15084,
15121,
15328,
15329,
15540,
15541,
15597,
15900,
15901,
16118,
16119,
16155,
16440,
16441,
16507,
16730,
16731,
16796,
16987,
16988,
17165,
17166,
17202,
17488,
17489,
17550,
17717,
17718,
17788,
18107,
18108,
18170,
18597,
18598,
18629,
18857,
18858,
18895,
19147,
19148,
19182,
19322,
19323,
19350,
19630,
19631,
19680,
19869,
19870,
19913,
20149,
20150,
20197,
20905,
20906,
20972,
21124,
21125,
21151,
21419,
21420,
21445,
21723,
21724,
21793,
21876,
21877,
22163,
22164,
22231,
22458,
22459,
22498,
22708,
22709,
22781,
22981,
22982,
23033,
23225,
23226,
23269,
23464,
23465,
23497,
23644,
23645,
23896,
23897,
23947,
23998,
23999,
24054,
24229,
24230,
24274,
24381,
24382,
24453,
24640,
24641,
24673,
24905,
24906,
24955,
25147,
25148,
25197,
25410,
25411,
25445,
25730,
25731,
25781,
26072,
26073,
26107,
26263,
26264,
26298,
26429,
26430,
26473,
26580,
26581,
26607,
26739,
26740,
26797,
27039,
27040,
27315,
27316,
27351,
27430,
27431,
27478,
27728,
27729,
27759,
27989,
27990,
28082,
28293,
28294,
28328,
28611,
28612,
28654,
28926,
28927,
28973,
29265,
29266,
29313,
29672,
29673,
29797,
29798,
29834,
29978,
29979,
30017,
30278,
30279,
30329,
30582,
30583,
30625,
30778,
30779,
30813,
31042,
31043,
31091,
31283,
31284,
31325,
31554,
31555,
31892,
31893,
31925,
32057,
32058,
32103,
32185,
32186,
32221,
32558,
32559,
32594,
32726,
32727,
32762,
32940,
32941,
32968,
33135,
33136,
33170,
33379,
33380,
33413,
33616,
33617,
33662,
34020,
34021,
34250,
34251,
34293,
34497,
34498,
34835,
34836,
34883,
35018,
35019,
35074,
35359,
35360,
35412,
35540,
35541,
35601,
35956,
35957,
36005,
36200,
36201,
36457,
36458,
36742,
36743,
36788,
36890,
36891,
36927,
37111,
37112,
37180,
37438,
37439,
37496,
37839,
37840,
37878,
38061,
38062,
38102,
38247,
38248,
38293,
38745,
38746,
38796,
39331,
39332,
39382,
39601,
39602,
39801,
39802,
40067,
40068,
40099,
40417,
40418,
40476,
40700,
40701,
40742,
40896,
40897,
41164,
41165,
41214,
41314,
41315,
41475,
41476,
41541,
41678,
41679,
41972,
41973,
42008,
42236,
42237,
42554,
42555,
42609,
43040,
43041,
43070,
43315,
43316,
43374,
43717,
43718,
43745,
43799,
43800,
43853,
44078,
44079,
44439,
44440,
44797,
44798,
44839,
45094,
45095,
45124,
45241,
45242,
45422,
45423,
45632,
45633,
45681,
45924,
45925,
45963,
46196,
46197,
46522,
46523,
46556,
46837,
46838,
46875,
47113,
47114,
47144,
47272,
47273,
47317,
47586,
47587,
47626,
47854,
47855,
47885,
48124,
48125,
48169,
48331,
48332,
48372,
48562,
48563,
48615,
48779,
48780,
48827,
49088,
49089,
49431,
49432,
49466,
49753,
49754,
49795,
50020,
50021,
50056,
50358,
50359,
50388,
50564,
50565,
50611,
50779,
50780,
50819,
50978,
50979,
51012,
51280,
51281,
51557,
51558,
51621,
51778,
51779,
51825,
52012,
52013,
52064,
52172,
52173,
52224,
52533,
52534,
52574,
52905,
52906,
52950,
53281,
53282,
53325,
53571,
53572,
53639,
53937,
53938,
53939,
54013,
54014,
54034,
54035,
54036,
54050
]
}
|
{
"red_pajama_v2": {
"ccnet_original_length": 54050,
"ccnet_original_nlines": 587,
"rps_doc_curly_bracket": 0.009805739857256413,
"rps_doc_ldnoobw_words": 1,
"rps_doc_lorem_ipsum": 0,
"rps_doc_stop_word_fraction": 0.06540931016206741,
"rps_doc_ut1_blacklist": 0,
"rps_doc_frac_all_caps_words": 0.03210273012518883,
"rps_doc_frac_lines_end_with_ellipsis": 0.003401360008865595,
"rps_doc_frac_no_alph_words": 0.47841089963912964,
"rps_doc_frac_unique_words": 0.3461364805698395,
"rps_doc_mean_word_length": 5.697695255279541,
"rps_doc_num_sentences": 645,
"rps_doc_symbol_to_word_ratio": 0.013242379762232304,
"rps_doc_unigram_entropy": 6.836704730987549,
"rps_doc_word_count": 6639,
"rps_doc_frac_chars_dupe_10grams": 0.017130620777606964,
"rps_doc_frac_chars_dupe_5grams": 0.095645971596241,
"rps_doc_frac_chars_dupe_6grams": 0.0613318495452404,
"rps_doc_frac_chars_dupe_7grams": 0.04726782068610191,
"rps_doc_frac_chars_dupe_8grams": 0.03486926853656769,
"rps_doc_frac_chars_dupe_9grams": 0.025378700345754623,
"rps_doc_frac_chars_top_2gram": 0.01424907986074686,
"rps_doc_frac_chars_top_3gram": 0.0018505300395190716,
"rps_doc_frac_chars_top_4gram": 0.0016919099725782871,
"rps_doc_books_importance": -5363.8115234375,
"rps_doc_books_importance_length_correction": -5363.8115234375,
"rps_doc_openwebtext_importance": -3181.004638671875,
"rps_doc_openwebtext_importance_length_correction": -3181.004638671875,
"rps_doc_wikipedia_importance": -2434.12548828125,
"rps_doc_wikipedia_importance_length_correction": -2434.12548828125
},
"fasttext": {
"dclm": 0.16686254739761353,
"english": 0.05888383835554123,
"fineweb_edu_approx": 2.5992255210876465,
"eai_general_math": 0.3194587826728821,
"eai_open_web_math": 0.10895025730133057,
"eai_web_code": 0.9677199125289917
}
}
|
{
"free_decimal_correspondence": {
"primary": {
"code": "005.1332",
"labels": {
"level_1": "General works, books and libraries, information sciences",
"level_2": "",
"level_3": "Computer programming"
}
},
"secondary": {
"code": "005.133",
"labels": {
"level_1": "General works, books and libraries, information sciences",
"level_2": "",
"level_3": "Computer programming"
}
}
},
"bloom_cognitive_process": {
"primary": {
"code": "2",
"label": "Understand"
},
"secondary": {
"code": "3",
"label": "Apply"
}
},
"bloom_knowledge_domain": {
"primary": {
"code": "2",
"label": "Conceptual"
},
"secondary": {
"code": "3",
"label": "Procedural"
}
},
"document_type_v1": {
"primary": {
"code": "3",
"label": "Reference/Encyclopedic/Educational"
},
"secondary": {
"code": "4",
"label": "Code/Software"
}
},
"extraction_artifacts": {
"primary": {
"code": "3",
"label": "Irrelevant Content"
},
"secondary": {
"code": "0",
"label": "No Artifacts"
}
},
"missing_content": {
"primary": {
"code": "0",
"label": "No missing content"
},
"secondary": {
"code": "0",
"label": "No missing content"
}
},
"document_type_v2": {
"primary": {
"code": "23",
"label": "Tutorial"
},
"secondary": {
"code": "8",
"label": "Documentation"
}
},
"reasoning_depth": {
"primary": {
"code": "3",
"label": "Intermediate Reasoning"
},
"secondary": {
"code": "2",
"label": "Basic Reasoning"
}
},
"technical_correctness": {
"primary": {
"code": "4",
"label": "Highly Correct"
},
"secondary": {
"code": "3",
"label": "Mostly Correct"
}
},
"education_level": {
"primary": {
"code": "3",
"label": "Undergraduate Level"
},
"secondary": {
"code": "2",
"label": "High School Level"
}
}
}
|
672f1e42c33a7f9846924a2431ea77df
|
-295,115,395,523,557,950 |
Docker
Last update: Edit
1 Introduction
This page explains how to build a Docker image from your Mendix Project. Each release of a project will result in a unique Docker image that can be pushed through the different stages of your application pipeline.
You will learn how to do the following:
• Build the image
• Push the image
2 Prerequisites
Before starting these instructions, make sure you have completed the following prerequisites:
3 Building the Image
To build the Docker image, follow these steps:
1. Install Docker on your computer.
2. Restart the computer to ensure that you have been granted access to Docker.
3. Unzip the buildpack into a location of your choice.
4. Open the Command Prompt and navigate to the folder where you unzipped the buildpack.
5. Open your app project in Studio Pro and select the menu option App > Show App Directory in Explorer:
6. Copy the project folder and all its subfolders to the unzipped docker build folder. The project folder needs to be in the same folder as the Docker file, otherwise Docker cannot access it.
7. Execute the following command:
docker build --build-arg BUILD_PATH="{relative-mendix-project-location}" -t {image name} .
{relative-mendix-project-location} is the BUILD_PATH which indicates where the application model is located. It is the directory where your .MPR file is located after you copied the project into the docker build folder. If you do not specify it, it defaults to ./project.
A successful build will resemble the output shown below:
4 Pushing the Image
A new Docker image has been created with the name ({image name}) you gave it. You can see the image by using the command docker images.
Next, you need to push the image to a registry. This can be a public registry or your own. To push it to your own registry, use the command docker push {image name}.
5 Read More
|
{
"url": "https://docs.mendix.com/developerportal/deploy/docker-deploy",
"source_domain": "docs.mendix.com",
"snapshot_id": "crawl=CC-MAIN-2021-25",
"warc_metadata": {
"Content-Length": "16982",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:O7JO2MLSD3MZ5XOZS5JUZXLUWJKESA77",
"WARC-Concurrent-To": "<urn:uuid:1d2d6cb4-6149-453f-9095-be8503267b02>",
"WARC-Date": "2021-06-21T23:33:51Z",
"WARC-IP-Address": "99.84.105.13",
"WARC-Identified-Payload-Type": "text/html",
"WARC-Payload-Digest": "sha1:JHLN6FTTSDE57VVINWNS3IXMK3WQQMWD",
"WARC-Record-ID": "<urn:uuid:2b7d9243-9161-4175-9fc3-49638fcf2fd6>",
"WARC-Target-URI": "https://docs.mendix.com/developerportal/deploy/docker-deploy",
"WARC-Truncated": null,
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:310aeb98-506c-4d1f-83ef-310c108ee70f>"
},
"warc_info": "isPartOf: CC-MAIN-2021-25\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for June 2021\r\noperator: Common Crawl Admin ([email protected])\r\nhostname: ip-10-67-67-177.ec2.internal\r\nsoftware: Apache Nutch 1.18 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.2-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: https://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/"
}
|
{
"line_start_idx": [
0,
7,
8,
26,
27,
42,
43,
257,
258,
298,
299,
319,
338,
339,
355,
356,
450,
451,
472,
473,
520,
521,
559,
640,
697,
787,
893,
894,
1088,
1089,
1125,
1126,
1221,
1226,
1227,
1503,
1504,
1565,
1566,
1586,
1587,
1723,
1724,
1890,
1891
],
"line_end_idx": [
7,
8,
26,
27,
42,
43,
257,
258,
298,
299,
319,
338,
339,
355,
356,
450,
451,
472,
473,
520,
521,
559,
640,
697,
787,
893,
894,
1088,
1089,
1125,
1126,
1221,
1226,
1227,
1503,
1504,
1565,
1566,
1586,
1587,
1723,
1724,
1890,
1891,
1902
]
}
|
{
"red_pajama_v2": {
"ccnet_original_length": 1902,
"ccnet_original_nlines": 44,
"rps_doc_curly_bracket": 0.005257620010524988,
"rps_doc_ldnoobw_words": 0,
"rps_doc_lorem_ipsum": 0,
"rps_doc_stop_word_fraction": 0.380952388048172,
"rps_doc_ut1_blacklist": 0,
"rps_doc_frac_all_caps_words": 0.013227510266005993,
"rps_doc_frac_lines_end_with_ellipsis": 0,
"rps_doc_frac_no_alph_words": 0.190476194024086,
"rps_doc_frac_unique_words": 0.4583333432674408,
"rps_doc_mean_word_length": 4.70192289352417,
"rps_doc_num_sentences": 27,
"rps_doc_symbol_to_word_ratio": 0,
"rps_doc_unigram_entropy": 4.4483723640441895,
"rps_doc_word_count": 312,
"rps_doc_frac_chars_dupe_10grams": 0,
"rps_doc_frac_chars_dupe_5grams": 0,
"rps_doc_frac_chars_dupe_6grams": 0,
"rps_doc_frac_chars_dupe_7grams": 0,
"rps_doc_frac_chars_dupe_8grams": 0,
"rps_doc_frac_chars_dupe_9grams": 0,
"rps_doc_frac_chars_top_2gram": 0.03271983936429024,
"rps_doc_frac_chars_top_3gram": 0.01635991968214512,
"rps_doc_frac_chars_top_4gram": 0,
"rps_doc_books_importance": -175.05963134765625,
"rps_doc_books_importance_length_correction": -175.05946350097656,
"rps_doc_openwebtext_importance": -96.64073181152344,
"rps_doc_openwebtext_importance_length_correction": -96.64073181152344,
"rps_doc_wikipedia_importance": -85.49261474609375,
"rps_doc_wikipedia_importance_length_correction": -85.49261474609375
},
"fasttext": {
"dclm": 0.3289199471473694,
"english": 0.8869974613189697,
"fineweb_edu_approx": 2.7478561401367188,
"eai_general_math": 0.4156898260116577,
"eai_open_web_math": 0.18077999353408813,
"eai_web_code": 0.5365127325057983
}
}
|
{
"free_decimal_correspondence": {
"primary": {
"code": "005.1",
"labels": {
"level_1": "General works, books and libraries, information sciences",
"level_2": "",
"level_3": "Computer programming"
}
},
"secondary": {
"code": "004.028",
"labels": {
"level_1": "General works, books and libraries, information sciences",
"level_2": "",
"level_3": "Computers and Computer science"
}
}
},
"bloom_cognitive_process": {
"primary": {
"code": "3",
"label": "Apply"
},
"secondary": {
"code": "2",
"label": "Understand"
}
},
"bloom_knowledge_domain": {
"primary": {
"code": "3",
"label": "Procedural"
},
"secondary": {
"code": "2",
"label": "Conceptual"
}
},
"document_type_v1": {
"primary": {
"code": "3",
"label": "Reference/Encyclopedic/Educational"
},
"secondary": {
"code": "4",
"label": "Code/Software"
}
},
"extraction_artifacts": {
"primary": {
"code": "0",
"label": "No Artifacts"
},
"secondary": {
"code": "3",
"label": "Irrelevant Content"
}
},
"missing_content": {
"primary": {
"code": "0",
"label": "No missing content"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"document_type_v2": {
"primary": {
"code": "8",
"label": "Documentation"
},
"secondary": {
"code": "23",
"label": "Tutorial"
}
},
"reasoning_depth": {
"primary": {
"code": "2",
"label": "Basic Reasoning"
},
"secondary": {
"code": "3",
"label": "Intermediate Reasoning"
}
},
"technical_correctness": {
"primary": {
"code": "4",
"label": "Highly Correct"
},
"secondary": {
"code": "3",
"label": "Mostly Correct"
}
},
"education_level": {
"primary": {
"code": "3",
"label": "Undergraduate Level"
},
"secondary": {
"code": "4",
"label": "Graduate/Expert Level"
}
}
}
|
672f1e42c33a7f9846924a2431ea77df
|
6,041,666,390,956,563,000 |
Take the 2-minute tour ×
Stack Overflow is a question and answer site for professional and enthusiast programmers. It's 100% free, no registration required.
I have a few checkboxes coming from nested model (:admin accepts_nested_attributes_for :account_setting). By default, the label for the checkbox is generated from the model's attributes. But I want to use custom labels which I store in the locales folder as key value pairs.
This is the code,
= semantic_form_for(resource, :as => resource_name, :url => registration_path(resource_name), :validate => true, :html => { :method => :put }) do |f|
= f.input :email
= f.inputs :receive_email_digest, :as =>:check_boxes, :for => :account_setting, :label => 'My custom label'
And it does not work. I tried :input_html, :member_label.
Does formtastic suppor this? Or do we have to hack it?
share|improve this question
1 Answer 1
up vote 1 down vote accepted
inputs is a fieldset. You're telling formtastic to make a fieldset and ordered list with one list item and input, :receive_email_digest, which I presume is a boolean. The :as here is not really having any effect, and :check_boxes is for has_many associations.
You want something like:
= semantic_form_for(resource, :as => resource_name, :url => registration_path(resource_name), :validate => true, :html => { :method => :put }) do |f|
= f.inputs do
= f.input :email
= f.inputs :for => :account_setting do
= f.input :receive_email_digest, :label => 'My custom label'
which will render two fieldsets each with a single input. Or perhaps even:
= semantic_form_for(resource, :as => resource_name, :url => registration_path(resource_name), :validate => true, :html => { :method => :put }) do |f|
= f.inputs "Email Settings" do
= f.input :email
= f.semantic_fields_for :account_setting do |ff|
= ff.input :receive_email_digest, :label => 'My custom label'
The semantic fields for here is merely a scope and shouldn't output any markup.
I believe both of these will use en.formtastic.labels.<resource_name>.account_setting.receive_email_digest for the check box's label, where resource name is whatever your resource's underscored name is. Check out the formtastic source for how these keys are generated.
share|improve this answer
Second solution worked. Thank you. – Rahul Jan 31 '12 at 22:43
Your Answer
discard
By posting your answer, you agree to the privacy policy and terms of service.
Not the answer you're looking for? Browse other questions tagged or ask your own question.
|
{
"url": "http://stackoverflow.com/questions/8091170/assign-custom-labels-to-checkboxes-using-formtastic/8699621",
"source_domain": "stackoverflow.com",
"snapshot_id": "crawl=CC-MAIN-2015-14",
"warc_metadata": {
"Content-Length": "68505",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:C3UWLXUD4CQT6WN4G3MJLFMM2DEGKGIP",
"WARC-Concurrent-To": "<urn:uuid:50d66454-ca64-4a07-bd81-9d6194dae60c>",
"WARC-Date": "2015-03-29T06:28:30Z",
"WARC-IP-Address": "198.252.206.140",
"WARC-Identified-Payload-Type": null,
"WARC-Payload-Digest": "sha1:I4O33Z4CVPJ4XPFQNR3HYODFEWZOL557",
"WARC-Record-ID": "<urn:uuid:98aaba4e-1250-4ada-83e3-046af4872599>",
"WARC-Target-URI": "http://stackoverflow.com/questions/8091170/assign-custom-labels-to-checkboxes-using-formtastic/8699621",
"WARC-Truncated": null,
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:fde49a05-3073-4a1e-a875-cd9a2ffcd36e>"
},
"warc_info": "robots: classic\r\nhostname: ip-10-168-14-71.ec2.internal\r\nsoftware: Nutch 1.6 (CC)/CC WarcExport 1.0\r\nisPartOf: CC-MAIN-2015-14\r\noperator: CommonCrawl Admin\r\ndescription: Wide crawl of the web with URLs provided by Blekko for March 2015\r\npublisher: CommonCrawl\r\nformat: WARC File Format 1.0\r\nconformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf"
}
|
{
"line_start_idx": [
0,
25,
157,
158,
433,
434,
452,
453,
454,
604,
623,
733,
734,
792,
793,
848,
849,
877,
878,
889,
890,
919,
920,
1180,
1181,
1206,
1207,
1357,
1373,
1394,
1435,
1500,
1501,
1576,
1577,
1727,
1760,
1781,
1834,
1902,
1903,
1983,
1984,
2253,
2254,
2280,
2285,
2349,
2350,
2362,
2363,
2365,
2373,
2374,
2452,
2453
],
"line_end_idx": [
25,
157,
158,
433,
434,
452,
453,
454,
604,
623,
733,
734,
792,
793,
848,
849,
877,
878,
889,
890,
919,
920,
1180,
1181,
1206,
1207,
1357,
1373,
1394,
1435,
1500,
1501,
1576,
1577,
1727,
1760,
1781,
1834,
1902,
1903,
1983,
1984,
2253,
2254,
2280,
2285,
2349,
2350,
2362,
2363,
2365,
2373,
2374,
2452,
2453,
2543
]
}
|
{
"red_pajama_v2": {
"ccnet_original_length": 2543,
"ccnet_original_nlines": 55,
"rps_doc_curly_bracket": 0.00235942006111145,
"rps_doc_ldnoobw_words": 0,
"rps_doc_lorem_ipsum": 0,
"rps_doc_stop_word_fraction": 0.2747252583503723,
"rps_doc_ut1_blacklist": 0,
"rps_doc_frac_all_caps_words": 0.010989010334014893,
"rps_doc_frac_lines_end_with_ellipsis": 0,
"rps_doc_frac_no_alph_words": 0.3479853570461273,
"rps_doc_frac_unique_words": 0.5313432812690735,
"rps_doc_mean_word_length": 5.543283462524414,
"rps_doc_num_sentences": 36,
"rps_doc_symbol_to_word_ratio": 0,
"rps_doc_unigram_entropy": 4.884502410888672,
"rps_doc_word_count": 335,
"rps_doc_frac_chars_dupe_10grams": 0.16262789070606232,
"rps_doc_frac_chars_dupe_5grams": 0.20140011608600616,
"rps_doc_frac_chars_dupe_6grams": 0.16262789070606232,
"rps_doc_frac_chars_dupe_7grams": 0.16262789070606232,
"rps_doc_frac_chars_dupe_8grams": 0.16262789070606232,
"rps_doc_frac_chars_dupe_9grams": 0.16262789070606232,
"rps_doc_frac_chars_top_2gram": 0.00484653003513813,
"rps_doc_frac_chars_top_3gram": 0.05977382883429527,
"rps_doc_frac_chars_top_4gram": 0.06462036073207855,
"rps_doc_books_importance": -272.1572570800781,
"rps_doc_books_importance_length_correction": -272.1572570800781,
"rps_doc_openwebtext_importance": -187.04454040527344,
"rps_doc_openwebtext_importance_length_correction": -187.04454040527344,
"rps_doc_wikipedia_importance": -141.45635986328125,
"rps_doc_wikipedia_importance_length_correction": -141.45635986328125
},
"fasttext": {
"dclm": 0.40545719861984253,
"english": 0.835371196269989,
"fineweb_edu_approx": 1.6459647417068481,
"eai_general_math": 0.0005083699943497777,
"eai_open_web_math": 0.05128264054656029,
"eai_web_code": 0.0004466199898160994
}
}
|
{
"free_decimal_correspondence": {
"primary": {
"code": "005.436",
"labels": {
"level_1": "General works, books and libraries, information sciences",
"level_2": "",
"level_3": "Computer programming"
}
},
"secondary": {
"code": "005.1",
"labels": {
"level_1": "General works, books and libraries, information sciences",
"level_2": "",
"level_3": "Computer programming"
}
}
},
"bloom_cognitive_process": {
"primary": {
"code": "3",
"label": "Apply"
},
"secondary": {
"code": "2",
"label": "Understand"
}
},
"bloom_knowledge_domain": {
"primary": {
"code": "3",
"label": "Procedural"
},
"secondary": {
"code": "2",
"label": "Conceptual"
}
},
"document_type_v1": {
"primary": {
"code": "5",
"label": "Social/Forum"
},
"secondary": {
"code": "4",
"label": "Code/Software"
}
},
"extraction_artifacts": {
"primary": {
"code": "3",
"label": "Irrelevant Content"
},
"secondary": {
"code": "0",
"label": "No Artifacts"
}
},
"missing_content": {
"primary": {
"code": "0",
"label": "No missing content"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"document_type_v2": {
"primary": {
"code": "18",
"label": "Q&A Forum"
},
"secondary": {
"code": "8",
"label": "Documentation"
}
},
"reasoning_depth": {
"primary": {
"code": "3",
"label": "Intermediate Reasoning"
},
"secondary": {
"code": "2",
"label": "Basic Reasoning"
}
},
"technical_correctness": {
"primary": {
"code": "4",
"label": "Highly Correct"
},
"secondary": {
"code": "3",
"label": "Mostly Correct"
}
},
"education_level": {
"primary": {
"code": "3",
"label": "Undergraduate Level"
},
"secondary": {
"code": "2",
"label": "High School Level"
}
}
}
|
672f1e42c33a7f9846924a2431ea77df
|
3,322,721,132,848,455,700 |
std::algorithm
algorithm
STL¤Î¥³¥ó¥Æ¥Ê¤òÂоݤȤ·¤¿ÍÍ¡¹¤Ê¥¢¥ë¥´¥ê¥º¥à¤¬ÄêµÁ¤µ¤ì¤Æ¤¤¤ë¡¥ ³Æ´Ø¿ô¤Ï¥³¥ó¥Æ¥Ê¤Ç¤Ê¤¯½¾Íè¤ÎÇÛÎó¤Ç¤â»È¤¨¤ë¤è¤¦¤Ë¤Ê¤Ã¤Æ¤¤¤ë(È¿Éü»Ò¤ÎÂå¤ï¤ê¤Ë¥Ý¥¤¥ó¥¿¤òÅϤ»¤Ð¤è¤¤)¡¥
#include <algorithm>
¥½¡¼¥È
¥½¡¼¥È(sort, stable_sort)
template <class RandomAccessIterator>
void sort(RandomAccessIterator first, RandomAccessIterator last);
template <class RandomAccessIterator, class Compare>
void sort(RandomAccessIterator first, RandomAccessIterator last, Compare comp);
sort¤Ï[first,last)¤ÎÈϰϤÎÍ×ÁǤòÃͤξº½ç¤Ç¥½¡¼¥È¤¹¤ë¡¥¥Ç¥Õ¥©¥ë¥È¤Ç¤Ï¥ª¥Ú¥ì¡¼¥¿"<"¤ÇÈæ³Ó¤µ¤ì¡¤ Èæ³ÓÊýË¡¤ò¼«Ê¬¤Ç»ØÄꤷ¤¿¤¤¾ì¹ç¤Ï2ÈÖÌܤÎÄêµÁ¤ò»È¤¦¡¥ sort¤Ç¤ÏÃͤ¬Æ±¤¸¤À¤Ã¤¿¤È¤¤Ë¸µ¤Î½çÈ֤ˤʤ뤳¤È¤ÏÊݾڤµ¤ì¤Æ¤¤¤Ê¤¤(¤¤¤ï¤æ¤ë°ÂÄê¤Ê¥½¡¼¥È¤Ç¤Ï¤Ê¤¤)¡¥
template <class RandomAccessIterator>
void stable_sort(RandomAccessIterator first, RandomAccessIterator last);
template <class RandomAccessIterator, class Compare>
void stable_sort(RandomAccessIterator first, RandomAccessIterator last, Compare comp);
stable_sort¤Ïsort¤ÈƱ¤¸¤¯Í×ÁǤòʤÓÂØ¤¨¤ë¤â¤Î¤Ç¤¢¤ë¤¬¡¤Ãͤ¬Æ±¤¸Í×ÁǤθµ¤Î½çÈÖ¤ÏÊݸ¤µ¤ì¤ë¡¥
¥³¡¼¥ÉÎã
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
#include <cstdlib>
#include <iostream>
#include <vector>
#include <algorithm>
using namespace std;
struct vec2
{
int x, y;
};
inline std::ostream &operator<<(std::ostream &out, const vec2 &a)
{
return out << "(" << a.x << ", " << a.y << ")";
}
bool comp_vec2(vec2 a, vec2 b)
{
return a.x < b.x;
}
int main(void)
{
const int N = 10;
srand(1234567);
vector<int> a(N);
vec2 b[N];
for(int i = 0; i < N; ++i){
a[i] = rand()%10;
b[i].x = rand()%5;
b[i].y = rand()%10;
}
cout << "a : ";
for(int i = 0; i < N; ++i) cout << a[i] << (i == N-1 ? "" : ", ");
cout << endl;
cout << "b : ";
for(int i = 0; i < N; ++i) cout << b[i] << (i == N-1 ? "" : ", ");
cout << endl;
sort(a.begin(), a.end());
stable_sort(b, b+N, comp_vec2);
cout << "a : ";
for(int i = 0; i < N; ++i) cout << a[i] << (i == N-1 ? "" : ", ");
cout << endl;
cout << "b : ";
for(int i = 0; i < N; ++i) cout << b[i] << (i == N-1 ? "" : ", ");
cout << endl;
return 0;
}
¼Â¹Ô·ë²Ì
a : 0, 4, 2, 6, 0, 9, 7, 8, 7, 5
b : (1, 0), (3, 3), (4, 5), (1, 6), (0, 6), (3, 7), (1, 9), (4, 1), (1, 3), (4, 4)
a : 0, 0, 2, 4, 5, 6, 7, 7, 8, 9
b : (0, 6), (1, 0), (1, 6), (1, 9), (1, 3), (3, 3), (3, 7), (4, 5), (4, 1), (4, 4)
Éôʬ¥½¡¼¥È(partial_sort, partial_sort_copy)
template <class RandomAccessIterator>
void partial_sort(RandomAccessIterator first, RandomAccessIterator middle, RandomAccessIterator last);
template <class RandomAccessIterator, class Compare>
void partial_sort(RandomAccessIterator first, RandomAccessIterator middle, RandomAccessIterator last, Compare comp);
ÈϰÏ[first, last)¤ÎÍ×ÁǤò¥½¡¼¥È¤¹¤ë¡¥¤¿¤À¤·¡¤¥½¡¼¥È·ë²Ì¤¬½ñ¤¹þ¤Þ¤ì¤ë¤Î¤Ï[first, middle)¤ÎÈϰϤΤߤǡ¤ ¤½¤ì°Ê¹ß¤ÎÍ×ÁǤνçÈ֤ϥ½¡¼¥È¤µ¤ì¤Æ¤¤¤Ê¤¤¡¥¥³¥ó¥Æ¥ÊÃæ¤ÎÉôʬŪ¤ÊÈϰϤÀ¤±¤Ç¥½¡¼¥È¤¹¤ë¤Î¤Ç¤Ï¤Ê¤¯¡¤ Á´ÂΤǥ½¡¼¥È¤·¤Æ¤½¤ÎÅÓÃæ(middle)¤ÇÂǤÁÀÚ¤ë¤è¤¦¤Ê½èÍý¡¥
partial_sort¤Ï[first, last)¤Ë·ë²Ì¤ò¾å½ñ¤¤¹¤ë¤¬¡¤°Û¤Ê¤ë¥³¥ó¥Æ¥Ê¤Ë¥³¥Ô¡¼¤·¤¿¤¤¾ì¹ç¤Ïpartial_sort_copy¤òÍѤ¤¤ë¡¥
template <class InputIterator, class RandomAccessIterator>
RandomAccessIterator partial_sort_copy(InputIterator first,InputIterator last,
RandomAccessIterator result_first, RandomAccessIterator result_last);
template <class InputIterator, class RandomAccessIterator, class Compare>
RandomAccessIterator partial_sort_copy(InputIterator first,InputIterator last,
RandomAccessIterator result_first, RandomAccessIterator result_last,
Compare comp);
[first, last)¤Î¥µ¥¤¥º >= [result_first,result_last)¤Î¥µ¥¤¥º¤Ç¤¢¤ë¡¥
¥³¡¼¥ÉÎã
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
#include <cstdlib>
#include <iostream>
#include <vector>
#include <algorithm>
using namespace std;
int main(void)
{
const int N = 10;
srand(1234567);
vector<int> a(N), b(N);
vector<int> c(N/2);
for(int i = 0; i < N; ++i){
a[i] = b[i] = rand()%10;
}
cout << "a,b : ";
for(int i = 0; i < N; ++i) cout << a[i] << (i == N-1 ? "" : ", ");
cout << endl;
partial_sort(a.begin(), a.begin()+5, a.end());
cout << " a : ";
for(int i = 0; i < N; ++i) cout << a[i] << (i == N-1 ? "" : ", ");
cout << endl;
partial_sort_copy(b.begin(), b.end(), c.begin(), c.end());
cout << " c : ";
for(vector<int>::iterator i = c.begin(); i != c.end(); ++i) cout << *i << (i == c.end()-1 ? "" : ", ");
cout << endl;
return 0;
}
¼Â¹Ô·ë²Ì
a,b : 0, 1, 0, 4, 3, 3, 2, 4, 5, 6
a : 0, 0, 1, 2, 3, 4, 3, 4, 5, 6
c : 0, 0, 1, 2, 3
sort(a.begin(), a.begin()+5)¤Ë¤·¤¿¾ì¹ç¤Ï¡¤
a,b : 0, 1, 0, 4, 3, 3, 2, 4, 5, 6
a : 0, 0, 1, 3, 4, 3, 2, 4, 5, 6
c : 0, 0, 1, 2, 3
¤È¤Ê¤ë¡¥
ºÆÇÛÃÖ(nth_element)
template <class RandomAccessIterator>
void nth_element(RandomAccessIterator first, RandomAccessIterator nth, RandomAccessIterator last);
template <class RandomAccessIterator, class Compare>
void nth_element(RandomAccessIterator first, RandomAccessIterator nth, RandomAccessIterator last, Compare comp);
ÈϰÏ[first, last)¤ÎÍ×ÁǤΤ¦¤Á¡¤nth¤Ç¼¨¤µ¤ì¤ëÍ×ÁǤÎÃͤè¤ê¾®¤µ¤¤Ãͤò»ý¤ÄÍ×ÁǤÏnth¤ÎÁ°¤Ë¡¤Â礤¤Ãͤò»ý¤ÄÍ×ÁǤÏnth¤Î¸å¤ËÃÖ¤«¤ì¤ë¡¥ºÆÇÛÃÖ¸å¤ÎÍ×ÁǤνçÈÖ¤ÏÊݾڤµ¤ì¤Ê¤¤¡¥
¥³¡¼¥ÉÎã
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
#include <cstdlib>
#include <iostream>
#include <vector>
#include <algorithm>
using namespace std;
int main(void)
{
const int N = 10;
srand(12345);
vector<int> a(N);
for(int i = 0; i < N; ++i){
a[i] = rand()%10;
}
cout << "a : ";
for(int i = 0; i < N; ++i) cout << a[i] << (i == N-1 ? "" : ", ");
cout << endl;
nth_element(a.begin(), a.begin()+3, a.end());
cout << "a : ";
for(int i = 0; i < N; ++i) cout << a[i] << (i == N-1 ? "" : ", ");
cout << endl;
return 0;
}
¼Â¹Ô·ë²Ì(Visual Studio 2010)
a : 4, 4, 5, 5, 8, 5, 7, 3, 2, 4
a : 2, 3, 4, 4, 4, 5, 5, 5, 7, 8
¥Ò¡¼¥×¥½¡¼¥È(sort_heap, make_heap, pop_heap, push_heap)
template <class RandomAccessIterator>
void sort_heap(RandomAccessIterator first, RandomAccessIterator last);
template <class RandomAccessIterator, class Compare>
void sort_heap(RandomAccessIterator first, RandomAccessIterator last, Compare comp);
¥Ò¡¼¥×¹½Â¤¤ò»ý¤Ä¥³¥ó¥Æ¥Ê[first, last)¤ò¥Ò¡¼¥×¥½¡¼¥È¤Ë¤è¤ê¥½¡¼¥È¤¹¤ë¡¥ ¥Ò¡¼¥×¤È¤Ï¿Æ¥Î¡¼¥É¤¬¾ï¤Ë»Ò¥Î¡¼¥É¤è¤êÂ礤¤(or¾®¤µ¤¤)¥Ä¥ê¡¼¤Î¤³¤È¤Ç¤¢¤ê¡¤ ñ¤Ë¥Ò¡¼¥×¤È¸Æ¤ó¤À¾ì¹ç¡¤¥Ð¥¤¥Ê¥ê¥Ä¥ê¡¼(¥Ð¥¤¥Ê¥ê¥Ò¡¼¥×¡¤Æóʬ¥Ò¡¼¥×)¤ò»Ø¤¹¤³¤È¤¬Â¿¤¤¡¥ ¥ë¡¼¥È¥Î¡¼¥É¤Ï¾ï¤ËºÇÂçÃͤ⤷¤¯¤ÏºÇ¾®Ãͤò»ý¤ÄÍ×ÁǤˤʤ롥 ¤½¤Î¤¿¤á¡¤¥ë¡¼¥È¥Î¡¼¥É¤ò¼è¤ê½Ð¤·¤Æ¤¤¤¯¤³¤È¤Ç¥½¡¼¥È¤ò¹Ô¤¦¤³¤È¤¬¤Ç¤¤ë(¥Ò¡¼¥×¥½¡¼¥È,O(N log N))¡¥
¥Ò¡¼¥×¹½Â¤¤òºîÀ®¤¹¤ë¤¿¤á¤Î´Ø¿ô¤È¤·¤Æmake_heap¤¬ÍѰդµ¤ì¤Æ¤¤¤ë¡¥
template <class RandomAccessIterator>
void make_heap(RandomAccessIterator first, RandomAccessIterator last);
template <class RandomAccessIterator, class Compare>
void make_heap(RandomAccessIterator first, RandomAccessIterator last, Compare comp);
¥Ò¡¼¥×¤ÏÇÛÎóÆâ¤Ë²¼¿Þ¤Î¤è¤¦¤Ë³ÊǼ¤µ¤ì¤ë¡¥
binary_tree.jpg
¤½¤Î¤¿¤á¡¤front()¤òÍѤ¤¤ë¤³¤È¤Ç¥ë¡¼¥È¥Î¡¼¥É¤ò»²¾È¤¹¤ë¤³¤È¤¬¤Ç¤¤ë¡¥
¤Þ¤¿¡¤¥Ò¡¼¥×¤«¤é¤ÎÍ×ÁǤμè¤ê½Ð¤·¡¤ÁÞÆþ´Ø¿ô(pop_heap, push_heap)¤â¤¢¤ë¡¥
template <class RandomAccessIterator>
void pop_heap(RandomAccessIterator first, RandomAccessIterator last);
template <class RandomAccessIterator, class Compare>
void pop_heap(RandomAccessIterator first, RandomAccessIterator last, Compare comp);
template <class RandomAccessIterator>
void push_heap(RandomAccessIterator first, RandomAccessIterator last);
template <class RandomAccessIterator, class Compare>
void push_heap(RandomAccessIterator first, RandomAccessIterator last, Compare comp);
pop_heap¤Ïfirst¤òlast-1¤Ë°Üư¤·¤Æ¡¤¤½¤ì°Ê³°¤ÎÍ×ÁǤǥҡ¼¥×¤òºÆ¹½À®¤¹¤ë¡¥¤½¤Î¤¿¤á¡¤
pop_heap(a.begin(), a.end());
a.pop_back()
¤È¤¹¤ë¤³¤È¤Ç¼ÂºÝ¤ËÃͤ¬¼è¤ê½Ð¤µ¤ì¤ë¡¥push_heap¤Î¾ì¹ç¤ÏµÕ¤Ç¡¤
a.push_back(100);
push_heap(a.begin(), a.end());
¤È¤Ê¤ë¡¥¤Ä¤Þ¤ê¡¤push_heap¤Ïlast-1¤ÎÍ×ÁǤò¥Ò¡¼¥×¤Ë¿·¤·¤¯Äɲ乤롥 ¤³¤ì¤é¤Ë¤è¤ê¡¤push_back¤äpop_back¤À¤±¤Î¾ì¹ç¤È°ã¤¤¡¤¼è¤ê½Ð¤·¡¤ÁÞÆþ¸å¤â¥Ò¡¼¥×¹½Â¤¤¬Êݤ¿¤ì¤ë¡¥
¥³¡¼¥ÉÎã
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
#include <iostream>
#include <vector>
#include <algorithm>
using namespace std;
int main(void)
{
const int N = 10;
vector<int> a(N);
for(int i = 0; i < N; ++i){
a[i] = i+1;
}
random_shuffle(a.begin(), a.end());
cout << "a : ";
for(int i = 0; i < N; ++i) cout << a[i] << (i == N-1 ? "" : ", ");
cout << endl;
make_heap(a.begin(), a.end());
cout << "a : ";
for(int i = 0; i < N; ++i) cout << a[i] << (i == N-1 ? "" : ", ");
cout << endl;
sort_heap(a.begin(), a.end());
cout << "a : ";
for(int i = 0; i < N; ++i) cout << a[i] << (i == N-1 ? "" : ", ");
cout << endl;
return 0;
}
¼Â¹Ô·ë²Ì
a : 9, 2, 10, 3, 1, 6, 8, 4, 5, 7
a : 10, 7, 9, 5, 2, 6, 8, 4, 3, 1
a : 1, 2, 3, 4, 5, 6, 7, 8, 9, 10
¿¿¤óÃæ¤Î·ë²Ì¤ò¿Þ¤Ë¤·¤Æ³Îǧ¤¹¤ë¤È°Ê²¼¤Î¤è¤¦¤Ë¤Ê¤ë¡¥
binary_tree2.jpg
¥½¡¼¥È¤Î·×»»»þ´Ö
¥½¡¼¥È¤Î·×»»»þ´Ö¤Ï´Ä¶¤Ë¤è¤ë¤È»×¤¤¤Þ¤¹¤¬¡¤ °ìÈÌŪ¤Ë¤Ïnth_element < sort == partial_sort < stable_sort¤À¤È»×¤ï¤ì¤Þ¤¹¡¥ sort¤Ë¤Ï¥¯¥¤¥Ã¥¯¥½¡¼¥È¤¬ÍѤ¤¤é¤ì¤Æ¤¤¤ë¤Î¤Ç·×»»»þ´Ö¤ÏO(N log N) ¡Á O(N^2)¤Ç¤¹¡¥
Visual Studio 2010¤Ç¼ÂÁõ¤·¤Æ·×¬¤·¤¿·ë²Ì¤ò°Ê²¼¤Ë¼¨¤·¤Þ¤¹¡¥
¼ÂÁõ¥³¡¼¥É
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
#include <ctime>
#include <iostream>
#include <vector>
#include <algorithm>
using namespace std;
int main(void)
{
int n = 10000;
clock_t t1, t2;
vector<int> a;
ofstream fo;
fo.open("time.txt");
for(int k = 0; k < 4; ++k){
fo << n << ", ";
a.resize(n);
for(int i = 0; i < n; ++i){
a[i] = n;
}
random_shuffle(a.begin(), a.end());
t1 = clock();
sort(a.begin(), a.end());
t2 = clock();
fo << (double)(t2-t1)/CLOCKS_PER_SEC << ", ";
random_shuffle(a.begin(), a.end());
t1 = clock();
stable_sort(a.begin(), a.end());
t2 = clock();
fo << (double)(t2-t1)/CLOCKS_PER_SEC << ", ";
random_shuffle(a.begin(), a.end());
t1 = clock();
partial_sort(a.begin(), a.begin()+n/2, a.end());
t2 = clock();
fo << (double)(t2-t1)/CLOCKS_PER_SEC << ", ";
random_shuffle(a.begin(), a.end());
t1 = clock();
nth_element(a.begin(), a.begin()+n/2, a.end());
t2 = clock();
fo << (double)(t2-t1)/CLOCKS_PER_SEC << endl;
n *= 10;
}
fo.close();
return 0;
}
¼Â¹Ô·ë²Ì
sort_time.jpg
partial_sort¤¬¤«¤Ê¤êÃÙ¤¯¤Ê¤Ã¤Æ¤¤¤Þ¤¹¡¥Visual Studio¤Ç¤Ïpartial_sort¤ÎÃæ¿È¤Ïstable_sort¤Ë¤Ê¤Ã¤Æ¤¤¤ë¤Î¤«¤â¤·¤ì¤Þ¤»¤ó¡¥
¸¡º÷
Ã͸¡º÷(find,find_if,find_first_of)
• find
template <class InputIterator, class T>
InputIterator find(InputIterator first, InputIterator last, const T& value);
[first, last)Æâ¤«¤évalue¤ÈƱ¤¸Ãͤò»ý¤ÄºÇ½é¤ÎÍ×ÁǤΥ¤¥Æ¥ì¡¼¥¿¤òÊÖ¤¹¡¥
• find_if
template <class InputIterator, class Predicate>
InputIterator find_if(InputIterator first, InputIterator last, Predicate pred);
[first, last)Æâ¤«¤éÈæ³Ó´Ø¿ôpred¤¬¿¿¤È¤Ê¤ëºÇ½é¤ÎÍ×ÁǤΥ¤¥Æ¥ì¡¼¥¿¤òÊÖ¤¹¡¥
• find_first_of
template <class ForwardIterator1, class ForwardIterator2>
ForwardIterator1 find_first_of(ForwardIterator1 first1, ForwardIterator1 last1,
ForwardIterator2 first2, ForwardIterator2 last2);
template <class ForwardIterator1, class ForwardIterator2, class BinaryPredicate>
ForwardIterator1 find_first_of(ForwardIterator1 first1, ForwardIterator1 last1,
ForwardIterator2 first2, ForwardIterator2 last2,
BinaryPredicate pred);
[first1, last1)Æâ¤«¤é[first2, last2)Æâ¤ÎǤ°Õ¤ÎÍ×ÁǤ˰ìÃפ¹¤ëºÇ½é¤ÎÍ×ÁǤΥ¤¥Æ¥ì¡¼¥¿¤òÊÖ¤¹¡¥
¥·¡¼¥±¥ó¥¹¸¡º÷(search, find_end)
• search
template <class ForwardIterator1, class ForwardIterator2>
ForwardIterator1 search(ForwardIterator1 first1, ForwardIterator1 last1,
ForwardIterator2 first2, ForwardIterator2 last2);
template <class ForwardIterator1, class ForwardIterator2, class BinaryPredicate>
ForwardIterator1 search(ForwardIterator1 first1, ForwardIterator1 last1,
ForwardIterator2 first2, ForwardIterator2 last2,
BinaryPredicate pred);
[first1, last1)Æâ¤«¤é[first2, last2)¤Î¥·¡¼¥±¥ó¥¹¤Ë°ìÃפ¹¤ëÉôʬ¤òºÇ½é¤«¤é¸¡º÷¤·¡¤ ¸«¤Ä¤«¤Ã¤¿°ÌÃ֤κǽé(first2¤Ë°ìÃפ¹¤ëÍ×ÁÇ)¤Î¥¤¥Æ¥ì¡¼¥¿¤òÊÖ¤¹¡¥
• find_end
template <class ForwardIterator1, class ForwardIterator2>
ForwardIterator1 find_end(ForwardIterator1 first1, ForwardIterator1 last1,
ForwardIterator2 first2, ForwardIterator2 last2);
template <class ForwardIterator1, class ForwardIterator2, class BinaryPredicate>
ForwardIterator1 find_end(ForwardIterator1 first1, ForwardIterator1 last1,
ForwardIterator2 first2, ForwardIterator2 last2,
BinaryPredicate pred);
[first1, last1)Æâ¤«¤é[first2, last2)¤Î¥·¡¼¥±¥ó¥¹¤Ë°ìÃפ¹¤ëÉôʬ¤òºÇ¸å¤«¤é¸¡º÷¤·¡¤ ¸«¤Ä¤«¤Ã¤¿°ÌÃ֤κǽé(first2¤Ë°ìÃפ¹¤ëÍ×ÁÇ)¤Î¥¤¥Æ¥ì¡¼¥¿¤òÊÖ¤¹¡¥
Ϣ³¤¹¤ëÍ×ÁǤθ¡º÷(adjacent_find, search_n)
• adjacent_find
template <class ForwardIterator>
ForwardIterator adjacent_find(ForwardIterator first, ForwardIterator last);
template <class ForwardIterator, class BinaryPredicate>
ForwardIterator adjacent_find(ForwardIterator first, ForwardIterator last, BinaryPredicate pred);
[first, last)Æâ¤«¤éƱ¤¸Ãͤò»ý¤ÄÍ×ÁǤ¬Ï¢Â³¤·¤Æ¤¤¤ëºÇ½é¤Î°ÌÃÖ¤òÊÖ¤¹¡¥
• search_n
template <class ForwardIterator, class Size, class T>
ForwardIterator search_n(ForwardIterator first, ForwardIterator last, Size count, const T& value);
template <class ForwardIterator, class Size, class T, class BinaryPredicate>
ForwardIterator search_n(ForwardIterator first, ForwardIterator last, Size count, const T& value,
BinaryPredicate pred);
[first1, last1)Æâ¤«¤évalue¤¬count²óϢ³¤Ç³¤¯ºÇ½é¤Î°ÌÃÖ¤òÊÖ¤¹¡¥Î㤨¤Ð¡¤
1
2
int a[] = {1, 3, 3, 8, 8, 5};
cout << search_n(a, a+6, 2, 8)-a << endl;
¤Î¾ì¹ç¡¤·ë²Ì¤Ï"3"¤È¤Ê¤ë¡¥
Ϣ³¤·¤Ê¤¤Í×ÁǤθ¡º÷(mismatch)
• mismatch
template <class InputIterator1, class InputIterator2>
pair<InputIterator1, InputIterator2> mismatch(InputIterator1 first1, InputIterator1 last1, InputIterator2 first2);
template <class InputIterator1, class InputIterator2, class BinaryPredicate>
pair<InputIterator1, InputIterator2> mismatch(InputIterator1 first1, InputIterator1 last1, InputIterator2 first2,
BinaryPredicate pred);
ÈϰÏ[first1, last1)¤ÎÍ×ÁǤòºÇ½é¤«¤éÁàºî¤·¤Æ¤¤¤¡¤first2¤Ç»Ï¤Þ¤ëÈϰϤÎÍ×ÁǤȰۤʤëÃͤò»ý¤ÄÍ×ÁǤ¬½Ð¤Æ¤¤¿¤é¤½¤Î¥Ú¥¢¤òºîÀ®¤·¤ÆÊÖ¤¹¡¥ pred¤ËÁê°ã¾ò·ï¤ò»ØÄꤹ¤ë¤³¤È¤â²Äǽ(Åù¤·¤¤¤È¤¤Ëtrue¤òÊÖ¤¹´Ø¿ô)¡¥
¥³¡¼¥ÉÎã
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
#include <iostream>
#include <vector>
#include <algorithm>
using namespace std;
template<class T>
void output(T x, int n)
{
for(int i = 0; i < n; ++i) cout << x[i] << (i == n-1 ? "" : ", ");
cout << endl;
}
bool comp_str(char x, char y){ return (x+1 == y); }
int main(void)
{
const int N = 10;
vector<int> a(N);
int b[N];
string c = "aabbaa";
string d = "bbcdbb";
for(int i = 0; i < N; ++i){
a[i] = i;
b[i] = i%5;
}
output(a, N); output(b, N);
pair<vector<int>::iterator, int*> result;
result = mismatch(a.begin(), a.end(), b);
cout << "pair of mismatch = " << *(result.first) << ", " << *(result.second) << endl;
cout << endl;
cout << c << endl;
cout << d << endl;
pair<string::iterator, string::iterator> result2;
result2 = mismatch(c.begin(), c.end(), d.begin(), comp_str);
cout << "pair of mismatch = " << *(result2.first) << ", " << *(result2.second) << endl;
return 0;
}
¼Â¹Ô·ë²Ì
0, 1, 2, 3, 4, 5, 6, 7, 8, 9
0, 1, 2, 3, 4, 0, 1, 2, 3, 4
pair of mismatch = 5, 0
aabbaa
bbcdbb
pair of mismatch = b, d
¥½¡¼¥ÈºÑ¤ß¥³¥ó¥Æ¥Ê¤ËÂФ¹¤ë¸¡º÷(equal_range, upper_bound, lower_bound)
• equal_range
template <class ForwardIterator, class T>
pair<ForwardIterator,ForwardIterator> equal_range(ForwardIterator first, ForwardIterator last, const T& value);
template <class ForwardIterator, class T, class Compare>
pair<ForwardIterator,ForwardIterator> equal_range(ForwardIterator first, ForwardIterator last, const T& value,
Compare comp);
¥½¡¼¥ÈºÑ¤ß¤Î[first, last)Æâ¤«¤évalue¤ÈÅù¤·¤¤Ãͤò»ý¤ÄÍ×ÁǤÎϢ³¤¹¤ëÈϰϤòÊÖ¤¹¡¥ Î㤨¤Ð¡¤
1
2
3
4
5
int c[] = {1, 3, 2, 3, 2, 1, 3, 4};
sort(c, c+8); // 1, 2, 2, 3, 3, 3, 4
pair<int*, int*> range;
range = equal_range(c, c+8, 3);
cout << "[" << range.first-c << ", " << range.second-c << ")" << endl;
¤Î¾ì¹ç¡¤·ë²Ì¤Ï"[4, 7)"¤È¤Ê¤ë¡¥¤Á¤Ê¤ß¤Ë¥½¡¼¥È̵¤·¤À¤È"[6, 7)"¤È¤Ê¤Ã¤¿(´Ä¶¤Ë¤è¤ë¤«¤â¤·¤ì¤Ê¤¤)¡¥
• upper_bound
template <class ForwardIterator, class T>
ForwardIterator upper_bound(ForwardIterator first, ForwardIterator last, const T& value);
template <class ForwardIterator, class T, class Compare>
ForwardIterator upper_bound(ForwardIterator first, ForwardIterator last, const T& value, Compare comp);
¥½¡¼¥ÈºÑ¤ß¤Î[first, last)Æâ¤«¤évalue¤è¤êÂ礤¤Ãͤò»ý¤ÄºÇ½é¤ÎÍ×ÁǤòÊÖ¤¹¡¥
• lower_bound
template <class ForwardIterator, class T>
ForwardIterator lower_bound(ForwardIterator first, ForwardIterator last, const T& value);
template <class ForwardIterator, class T, class Compare>
ForwardIterator lower_bound(ForwardIterator first, ForwardIterator last, const T& value, Compare comp);
¥½¡¼¥ÈºÑ¤ß¤Î[first, last)Æâ¤«¤évalue¤è¤ê¾®¤µ¤¤Ãͤò»ý¤ÄºÇ½é¤ÎÍ×ÁǤòÊÖ¤¹¡¥ Î㤨¤Ð¡¤
1
2
3
4
5
int d[] = {1, 3, 2, 3, 2, 1, 3, 4};
sort(d, d+8); // 1, 2, 2, 3, 3, 3, 4
int *low = lower_bound(d, d+8, 3);
int *up = upper_bound(d, d+8, 3);
cout << "[" << low-d << ", " << up-d << ")" << endl;
¤Çequal_range¤ÈƱ¤¸"[4, 7)"¤Î·ë²Ì¤¬ÆÀ¤é¤ì¤ë¡¥
Æóʬõº÷(binary_search)
template <class ForwardIterator, class T>
bool binary_search(ForwardIterator first, ForwardIterator last, const T& value);
template <class ForwardIterator, class T, class Compare>
bool binary_search(ForwardIterator first, ForwardIterator last, const T& value, Compare comp);
¥½¡¼¥ÈºÑ¤ß¤Î[first, last)¤«¤ébinary search(Æóʬõº÷)¤Ë¤è¤êvalue¤Ë°ìÃפ¹¤ëÍ×ÁǤò¸¡º÷¤·¡¤¤â¤·¤¢¤ì¤Ðtrue¤òÊÖ¤¹¡¥ ¥½¡¼¥È¤¹¤ëɬÍפ¬¤¢¤ë¤Î¤Ç¡¤sort¤ÈÁȤ߹ç¤ï¤»¤Æ»È¤¦¤³¤È¤¬Â¿¤¤¡¥Î㤨¤Ð¡¤
1
2
3
4
5
int b[] = {1, 3, 2, 5, 4, 1};
sort(b, b+6);
if(binary_search(b, b+6, 5)){
cout << "5 is found." << endl;
}
ºÇ¾®ÃÍ¡¤ºÇÂçÃ͸¡º÷(min_element, max_element)
• min_element
template <class ForwardIterator>
ForwardIterator min_element(ForwardIterator first, ForwardIterator last);
template <class ForwardIterator, class Compare>
ForwardIterator min_element(ForwardIterator first, ForwardIterator last, Compare comp);
[first, last)Æâ¤«¤éºÇ¾®¤ÎÃͤò»ý¤ÄÍ×ÁǤΥ¤¥Æ¥ì¡¼¥¿¤òÊÖ¤¹¡¥
• max_element
template <class ForwardIterator>
ForwardIterator max_element(ForwardIterator first, ForwardIterator last);
template <class ForwardIterator, class Compare>
ForwardIterator max_element(ForwardIterator first, ForwardIterator last, Compare comp);
[first, last)Æâ¤«¤éºÇÂç¤ÎÃͤò»ý¤ÄÍ×ÁǤΥ¤¥Æ¥ì¡¼¥¿¤òÊÖ¤¹¡¥ Î㤨¤Ð¡¤
1
2
3
4
5
int e[] = {3, 2, 1, 3, 2, 1, 4, 3};
int *minp = min_element(e, e+8);
int *maxp = max_element(e, e+8);
cout << "min element : " << minp-e << "(" << *minp << ")" << endl;
cout << "max element : " << maxp-e << "(" << *maxp << ")" << endl;
·ë²Ì¤Ï°Ê²¼¤Î¤è¤¦¤Ë¤Ê¤ë¡¥
min element : 2(1)
max element : 6(4)
¥³¥ó¥Æ¥Ê¤ÎÁàºî
ÃÖ¤´¹¤¨(replace, replace_if, replace_copy, replacy_copy_if)
• replace
template <class ForwardIterator, class T>
void replace(ForwardIterator first, ForwardIterator last, const T& old_value, const T& new_value);
¥³¥ó¥Æ¥Ê¡¦ÇÛÎó¤ÎÈϰÏ[first, last)Æâ¤ÎÍ×ÁǤÇÃͤ¬old_value¤Î¤â¤Î¤ònew_value¤ËÃÖ¤´¹¤¨¤ë¡¥
• replace_if
template <class ForwardIterator, class Predicate, class T>
void replace_if(ForwardIterator first, ForwardIterator last, Predicate pred, const T& new_value);
¥³¥ó¥Æ¥Ê¡¦ÇÛÎó¤ÎÈϰÏ[first, last)Æâ¤ÎÍ×ÁǤÇpred¤Ç¼¨¤µ¤ì¤¿´Ø¿ô¤¬true¤òÊÖ¤·¤¿¤â¤Î¤ònew_value¤ÇÃÖ¤´¹¤¨¤ë¡¥
• replace_copy
template <class InputIterator, class OutputIterator, class T>
OutputIterator replace_copy(InputIterator first, InputIterator last, OutputIterator result,
const T& old_value, const T& new_value);
¥³¥ó¥Æ¥Ê¡¦ÇÛÎó¤ÎÈϰÏ[first, last)Æâ¤ÎÍ×ÁǤÇÃͤ¬old_value¤Î¤â¤Î¤ònew_value¤ËÃÖ¤´¹¤¨¤¿·ë²Ì¤ò result¤Ç»Ï¤Þ¤ë¥³¥ó¥Æ¥Ê¤Ë¥³¥Ô¡¼¤¹¤ë¡¥
• replace_copy_if
template <class InputIterator, class OutputIterator, class Predicate, class T>
OutputIterator replace_copy_if(InputIterator first, InputIterator last, OutputIterator result,
Predicate pred, const T& new_value);
¥³¥ó¥Æ¥Ê¡¦ÇÛÎó¤ÎÈϰÏ[first, last)Æâ¤ÎÍ×ÁǤÇpred¤Ç¼¨¤µ¤ì¤¿´Ø¿ô¤¬true¤òÊÖ¤·¤¿¤â¤Î¤ònew_value¤ËÃÖ¤´¹¤¨¤¿·ë²Ì¤ò result¤Ç»Ï¤Þ¤ë¥³¥ó¥Æ¥Ê¤Ë¥³¥Ô¡¼¤¹¤ë¡¥
¥³¡¼¥ÉÎã
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
#include <iostream>
#include <vector>
#include <algorithm>
using namespace std;
template<class T>
void output(T x, int n)
{
for(int i = 0; i < n; ++i) cout << x[i] << (i == n-1 ? "" : ", ");
cout << endl;
}
bool comp_func(int x){ return (x%2 == 0); }
int main(void)
{
const int N = 10;
vector<int> a(N);
int b[N];
string c = "aabbaa";
string d;
d.resize(c.size());
for(int i = 0; i < N; ++i){
a[i] = i%3;
b[i] = i+1;
}
output(a, N);
replace(a.begin(), a.end(), 1, 2);
cout << " --> "; output(a, N);
output(b, N);
replace_if(b, b+N, comp_func, 0);
cout << " --> "; output(b, N);
replace_copy(c.begin(), c.end(), d.begin(), 'b', 'a');
cout << c << endl;
cout << " --> " << d << endl;
return 0;
}
¼Â¹Ô·ë²Ì
0, 1, 2, 0, 1, 2, 0, 1, 2, 0
--> 0, 2, 2, 0, 2, 2, 0, 2, 2, 0
1, 2, 3, 4, 5, 6, 7, 8, 9, 10
--> 1, 0, 3, 0, 5, 0, 7, 0, 9, 0
aabbaa
--> aaaaaa
Í×ÁǺï½ü(remove, remove_if, remove_copy, remove_copy_if, unique, unique_copy)
• remove
template <class ForwardIterator, class T>
ForwardIterator remove(ForwardIterator first, ForwardIterator last, const T& value);
ÈϰÏ[first, last)Æâ¤ÎÍ×ÁǤÇÃͤ¬value¤È°ìÃפ¹¤ë¤â¤Î¤òºï½ü¤¹¤ë¡¥
• remove_if
template <class ForwardIterator, class Predicate>
ForwardIterator remove_if(ForwardIterator first, ForwardIterator last, Predicate pred);
ÈϰÏ[first, last)Æâ¤ÎÍ×ÁǤÇpred¤Î¾ò·ï¤È°ìÃפ¹¤ë¤â¤Î¤òºï½ü¤¹¤ë¡¥
• remove_copy
template <class InputIterator, class OutputIterator, class T>
OutputIterator remove_copy(InputIterator first, InputIterator last, OutputIterator result, const T& value);
ÈϰÏ[first, last)Æâ¤ÎÍ×ÁǤÇÃͤ¬value¤È°ìÃפ¹¤ë¤â¤Î¤òºï½ü¤·¤¿·ë²Ì¤òresult¤Ë³ÊǼ¤¹¤ë¡¥
• remove_copy_if
template <class InputIterator, class OutputIterator, class Predicate>
OutputIterator remove_copy_if(InputIterator first, InputIterator last, OutputIterator result, Predicate pred);
ÈϰÏ[first, last)Æâ¤ÎÍ×ÁǤÇpred¤Î¾ò·ï¤È°ìÃפ¹¤ë¤â¤Î¤òºï½ü¤·¤¿·ë²Ì¤òresult¤Ë³ÊǼ¤¹¤ë¡¥
• unique
template <class ForwardIterator>
ForwardIterator unique(ForwardIterator first, ForwardIterator last);
template <class ForwardIterator, class BinaryPredicate>
ForwardIterator unique(ForwardIterator first, ForwardIterator last, BinaryPredicate pred);
ÈϰÏ[first, last)¤òºÇ½é¤«¤éÁöºº¤·¤Æ¡¤Æ±¤¸Ãͤò»ý¤ÄϢ³¤·¤¿2¤Ä¤ÎÍ×ÁǤθå¤í¤ÎÊý¤òºï½ü¤¹¤ë¡¥¤³¤ì¤ò»ØÄꤷ¤¿ÈϰÏÁ´¤Æ¤Ç¹Ô¤¦¡¥ Î㤨¤Ð¡¤1, 1, 2, 3, 3, 3, 1, 1 ¤È¤¤¤¦ÇÛÎó¤ËŬÍѤ¹¤ë¤È 1, 2, 3, 1 ¤È¤¤¤¦·ë²Ì¤¬ÆÀ¤é¤ì¤ë¡¥
• unique_copy
template <class InputIterator, class OutputIterator>
OutputIterator unique_copy(InputIterator first, InputIterator last, OutputIterator result);
template <class InputIterator, class OutputIterator, class BinaryPredicate>
OutputIterator unique_copy(InputIterator first, InputIterator last, OutputIterator result, BinaryPredicate pred);
¾åµunique¤Î¥³¥Ô¡¼ÈÇ¡¥·ë²Ì¤òresult¤«¤é»Ï¤Þ¤ë¥³¥ó¥Æ¥Ê¡¦ÇÛÎó¤Ë³ÊǼ¤¹¤ë¡¥
ÂåÆþ(fill, fill_n, generate, generate_n)
• fill
template <class ForwardIterator, class T>
void fill(ForwardIterator first, ForwardIterator last, const T& value);
ÈϰÏ[first, last)¤ÎÍ×ÁǤËvalue¤ò¥»¥Ã¥È¤¹¤ë¡¥
• fill_n
template <class OutputIterator, class Size, class T>
void fill_n(OutputIterator first, Size n, const T& value);
first¤«¤é»Ï¤Þ¤ën¸Ä¤ÎÍ×ÁǤËvalue¤ò¥»¥Ã¥È¤¹¤ë¡¥
• generate
template <class ForwardIterator, class Generator>
void generate(ForwardIterator first, ForwardIterator last, Generator gen);
°ú¿ô¤ò¤È¤é¤ºÃͤÀ¤±¤òÊÖ¤¹´Ø¿ôgen¤Ë¤è¤ê¡¤ÈϰÏ[first, last)¤ËÃͤò¥»¥Ã¥È¤¹¤ë¡¥
• generate_n
template <class OutputIterator, class Size, class Generator>
void generate_n(OutputIterator first, Size n, Generator gen)
°ú¿ô¤ò¤È¤é¤ºÃͤÀ¤±¤òÊÖ¤¹´Ø¿ôgen¤Ë¤è¤ê¡¤first¤«¤é»Ï¤Þ¤ën¸Ä¤ÎÍ×ÁǤËÃͤò¥»¥Ã¥È¤¹¤ë¡¥
¥³¥Ô¡¼(copy, copy_backward)
• copy
template <class InputIterator, class OutputIterator>
OutputIterator copy(InputIterator first, InputIterator last, OutputIterator result);
ÈϰÏ[first, last)¤ÎÃͤòresult¤«¤é»Ï¤Þ¤ë¥³¥ó¥Æ¥Ê¡¿ÇÛÎó¤Ë¥³¥Ô¡¼¤¹¤ë(¥³¥Ô¡¼¸µ:[first,last)¡¤¥³¥Ô¡¼Àè:result)¡¥
• copy_backward
template <class BidirectionalIterator1, class BidirectionalIterator2>
BidirectionalIterator2 copy_backward(BidirectionalIterator1 first, BidirectionalIterator1 last,
BidirectionalIterator2 result);
ÈϰÏ[first, last)¤ÎÃͤòresult¤Ç½ª¤ï¤ëÎΰè¤Ë¥³¥Ô¡¼¤¹¤ë¡¥¤Ä¤Þ¤ê¡¤ºÇ½é¤Ëlast-1¤ÎÃͤ¬result-1¤Ë¥³¥Ô¡¼¤µ¤ì¡¤ ¼¡¤Ëlast-2¤¬result-2¤Ë¥³¥Ô¡¼¤È¤¤¤¦½çÈÖ¡¥
ȿž(reverse, reverse_copy)
• reverse
template <class BidirectionalIterator>
void reverse(BidirectionalIterator first, BidirectionalIterator last);
ÈϰÏ[first, last)¤ÎÍ×ÁǤÎʤӤòȿž¤¹¤ë¡¥
• reverse_copy
template <class BidirectionalIterator, class OutputIterator>
OutputIterator reverse_copy(BidirectionalIterator first, BidirectionalIterator last, OutputIterator result);
ÈϰÏ[first, last)¤ÎÍ×ÁǤÎʤӤòȿž¤·¤¿·ë²Ì¤òresult¤Ë¥³¥Ô¡¼¤¹¤ë¡¥
¥í¡¼¥Æ¡¼¥·¥ç¥ó(rotate, rotate_copy)
• rotate
template <class ForwardIterator>
void rotate(ForwardIterator first, ForwardIterator middle, ForwardIterator last);
ÈϰÏ[first, last)¤ÎÍ×ÁǤÎʤӤòmiddle¤¬ºÇ½é¤Ë¤Ê¤ë¤è¤¦¤Ë¥í¡¼¥Æ¡¼¥·¥ç¥ó¤¹¤ë¡¥
• rotate_copy
template <class ForwardIterator, class OutputIterator>
OutputIterator rotate_copy(ForwardIterator first, ForwardIterator middle, ForwardIterator last,
OutputIterator result);
ÈϰÏ[first, last)¤ÎÍ×ÁǤÎʤӤòmiddle¤¬ºÇ½é¤Ë¤Ê¤ë¤è¤¦¤Ë¥í¡¼¥Æ¡¼¥·¥ç¥ó¤·¤¿·ë²Ì¤òresult¤Ë¥³¥Ô¡¼¤¹¤ë¡¥
ʤÓÂØ¤¨(partition, stable_partition)
• partition template <class BidirectionalIterator, class Predicate>
BidirectionalIterator partition(BidirectionalIterator first, BidirectionalIterator last,
Predicate pred);
pred¤¬true¤òÊÖ¤¹Ãͤò»ý¤ÄÍ×ÁǤòÁ°¤Ë¡¤false¤òÊÖ¤¹Í×ÁǤò¸å¤í¤Ë¤Ê¤ë¤è¤¦¤ËʤÓÂØ¤¨¤ë¡¥Ê¤ÓÂØ¤¨¸å¤Î¸µ¤Î½çÈÖ¤ÏÊݾڤµ¤ì¤Ê¤¤¡¥
• stable_partition template <class BidirectionalIterator, class Predicate>
BidirectionalIterator stable_partition(BidirectionalIterator first, BidirectionalIterator last,
Predicate pred);
pred¤¬true¤òÊÖ¤¹Ãͤò»ý¤ÄÍ×ÁǤòÁ°¤Ë¡¤false¤òÊÖ¤¹Í×ÁǤò¸å¤í¤Ë¤Ê¤ë¤è¤¦¤ËʤÓÂØ¤¨¤ë¡¥Ê¤ÓÂØ¤¨¸å¤Î¸µ¤Î½çÈÖ¤¬Êݾڤµ¤ì¤ë¡¥
¥é¥ó¥À¥à¥·¥ã¥Ã¥Õ¥ë(random_shuffle)
• random_shuffle
template <class RandomAccessIterator>
void random_shuffle(RandomAccessIterator first, RandomAccessIterator last);
template <class RandomAccessIterator, class RandomNumberGenerator>
void random_shuffle(RandomAccessIterator first, RandomAccessIterator last, RandomNumberGenerator& rand);
ÈϰÏ[first, last)¤ÎÍ×ÁǤò¥é¥ó¥À¥à¥·¥ã¥Ã¥Õ¥ë¤¹¤ë¡¥
Í×ÁǤθò´¹(swap, swap_ranges)
• swap
template <class T> void swap(T& a, T& b);
Æó¤Ä¤ÎÃÍa,b¤ò¸ò´¹¤¹¤ë¡¥
• swap_ranges template <class ForwardIterator1, class ForwardIterator2>
ForwardIterator2 swap_ranges(ForwardIterator1 first1, ForwardIterator1 last1, ForwardIterator2 first2);
Æó¤Ä¤ÎÈϰϤÎÍ×ÁǤò¸ò´¹¤¹¤ë¡¥
¥Þ¡¼¥¸(merge, inplace_merge)
• merge
template <class InputIterator1, class InputIterator2, class OutputIterator>
OutputIterator merge(InputIterator1 first1, InputIterator1 last1,
InputIterator2 first2, InputIterator2 last2,
OutputIterator result);
template <class InputIterator1, class InputIterator2, class OutputIterator, class Compare>
OutputIterator merge(InputIterator1 first1, InputIterator1 last1,
InputIterator2 first2, InputIterator2 last2,
OutputIterator result, Compare comp);
¥½¡¼¥ÈºÑ¤ß¤Î[first1,last1)¤È[first2,last2)¤ò¥Þ¡¼¥¸¤¹¤ë¡¥¥Þ¡¼¥¸¸å¤Î¥³¥ó¥Æ¥Ê(result)¤Ï¥½¡¼¥È¤µ¤ì¤Æ¤¤¤ë¡¥ comp¤Ï¥½¡¼¥È¤ÎÈæ³Ó´Ø¿ô(¥Ç¥Õ¥©¥ë¥È¤Ï"<")¡¥
• inplace_merge
template <class BidirectionalIterator>
void inplace_merge(BidirectionalIterator first, BidirectionalIterator middle, BidirectionalIterator last );
template <class BidirectionalIterator, class Compare>
void inplace_merge(BidirectionalIterator first, BidirectionalIterator middle, BidirectionalIterator last,
Compare comp);
Ϣ³¤·¤¿2¤Ä¤Î¥½¡¼¥ÈºÑ¤ß¤ÎÎΰè[first, middle)¤È[middle, last)¤ò¥Þ¡¼¥¸¤¹¤ë¡¥¥Þ¡¼¥¸¸å¤ÎÎΰè([fisrt, last))¤Ï¥½¡¼¥È¤µ¤ì¤Æ¤¤¤ë¡¥ comp¤Ï¥½¡¼¥È¤ÎÈæ³Ó´Ø¿ô(¥Ç¥Õ¥©¥ë¥È¤Ï"<")¡¥ ¸Ä¡¹¤ÎÎΰè([first, middle)¤È[middle, last))¤Ï¥½¡¼¥È¤µ¤ì¤Æ¤¤¤Ê¤±¤ì¤Ð¤Ê¤é¤Ê¤¤¡¥ ¤¿¤È¤¨¤Ð¡¤
1, 3, 5, 2, 4, 6
¤ÎÃͤ¬Æþ¤Ã¤¿ÇÛÎóa¤ËÂФ·¤Æ¡¤[a[0], a[3])¤È[a[2], a[6])¤òinplace_merge¤¹¤ë¤È¡¤a¤Ï
1, 2, 3, 4, 5, 6
¤È¤Ê¤ë¡¥
½¸¹ç±é»»(set_difference, set_intersection, set_symmetric_difference, set_union)
• set_difference
template <class InputIterator1, class InputIterator2, class OutputIterator>
OutputIterator set_difference(InputIterator1 first1, InputIterator1 last1,
InputIterator2 first2, InputIterator2 last2,
OutputIterator result);
template <class InputIterator1, class InputIterator2, class OutputIterator, class Compare>
OutputIterator set_difference(InputIterator1 first1, InputIterator1 last1,
InputIterator2 first2, InputIterator2 last2,
OutputIterator result, Compare comp);
¥½¡¼¥ÈºÑ¤ß¤Î[first1,last1)¤È[first2,last2)¤Îº¹¤Î½¸¹ç¤ò·×»»¤·¤Æ¡¤result¤Ë³ÊǼ¤¹¤ë¡¥ÊÖÃͤÏresult¤Ë³ÊǼ¤µ¤ì¤¿Í×ÁǤÎËöÈø¤Ç¤¢¤ë¡¥ ¤Ä¤Þ¤ê¡¤[first1,last1)¤ÎÍ×ÁǤÎÃæ¤Ç[first2,last2)¤Ë´Þ¤Þ¤ì¤Ê¤¤¤â¤Î¤òresult¤Ë³ÊǼ¤¹¤ë¡¥ ¤¿¤È¤¨¤Ð¡¤
1, 2, 3, 4, 5
¤«¤é
2, 4, 6, 8, 10
¤Îº¹¤ò¤È¤ë¤È¡¤
1, 3, 5
¤È¤Ê¤ë¡¥
¤³¤³¤Ç¤Ï[first1,last1)-[first2,last2)¤À¤±¤Ç¤¢¤ê¡¤¤½¤ÎµÕ¤Ï¤Ê¤¤¡¥ÁÐÊý¸þ¤Îº¹¤ò¤È¤ë¾ì¹ç¤Ïset_symmetric_difference¤òÍѤ¤¤ë¡¥
• set_intersection
template <class InputIterator1, class InputIterator2, class OutputIterator>
OutputIterator set_intersection(InputIterator1 first1, InputIterator1 last1,
InputIterator2 first2, InputIterator2 last2,
OutputIterator result);
template <class InputIterator1, class InputIterator2, class OutputIterator, class Compare>
OutputIterator set_intersection(InputIterator1 first1, InputIterator1 last1,
InputIterator2 first2, InputIterator2 last2,
OutputIterator result, Compare comp);
¥½¡¼¥ÈºÑ¤ß¤Î[first1,last1)¤È[first2,last2)ξÊý¤Ë´Þ¤Þ¤ì¤ëÍ×ÁǤν¸¹ç(¸òº¹)¤ò·×»»¤·¤Æ¡¤result¤Ë³ÊǼ¤¹¤ë¡¥ÊÖÃͤÏresult¤Ë³ÊǼ¤µ¤ì¤¿Í×ÁǤÎËöÈø¤Ç¤¢¤ë¡¥ ¤¿¤È¤¨¤Ð¡¤
1, 2, 3, 4, 5
¤È
2, 4, 6, 8, 10
¤Î¸òº¹¤ò¤È¤ë¤È¡¤
2, 4
¤È¤Ê¤ë¡¥
• set_symmetric_difference
template <class InputIterator1, class InputIterator2, class OutputIterator>
OutputIterator set_symmetric_difference(InputIterator1 first1, InputIterator1 last1,
InputIterator2 first2, InputIterator2 last2,
OutputIterator result);
template <class InputIterator1, class InputIterator2, class OutputIterator, class Compare>
OutputIterator set_symmetric_difference(InputIterator1 first1, InputIterator1 last1,
InputIterator2 first2, InputIterator2 last2,
OutputIterator result, Compare comp);
¥½¡¼¥ÈºÑ¤ß¤Î[first1,last1)¤È[first2,last2)¤ÎÁÐÊý¸þº¹¤Î½¸¹ç¤ò·×»»¤·¤Æ¡¤result¤Ë³ÊǼ¤¹¤ë¡¥ÊÖÃͤÏresult¤Ë³ÊǼ¤µ¤ì¤¿Í×ÁǤÎËöÈø¤Ç¤¢¤ë¡¥ ¤¿¤È¤¨¤Ð¡¤
1, 2, 3, 4, 5
¤È
2, 4, 6, 8, 10
¤ÎÁÐÊý¸þº¹¤ò¤È¤ë¤È¡¤
1, 3, 5, 6, 8, 10
¤È¤Ê¤ë¡¥
• set_union
template <class InputIterator1, class InputIterator2, class OutputIterator>
OutputIterator set_union(InputIterator1 first1, InputIterator1 last1,
InputIterator2 first2, InputIterator2 last2,
OutputIterator result);
template <class InputIterator1, class InputIterator2, class OutputIterator, class Compare>
OutputIterator set_union(InputIterator1 first1, InputIterator1 last1,
InputIterator2 first2, InputIterator2 last2,
OutputIterator result, Compare comp);
¥½¡¼¥ÈºÑ¤ß¤Î[first1,last1)¤È[first2,last2)¤ÎÏ¤ν¸¹ç¤ò·×»»¤·¤Æ¡¤result¤Ë³ÊǼ¤¹¤ë¡¥ÊÖÃͤÏresult¤Ë³ÊǼ¤µ¤ì¤¿Í×ÁǤÎËöÈø¤Ç¤¢¤ë¡¥ ¤¿¤È¤¨¤Ð¡¤
1, 2, 3, 4, 5
¤È
2, 4, 6, 8, 10
¤ÎϤò¤È¤ë¤È¡¤
1, 2, 3, 4, 5, 6, 8, 10
¤È¤Ê¤ë¡¥
¤½¤Î¾
¥«¥¦¥ó¥È(count, count_if)
• count
template <class InputIterator, class T>
size_t count(ForwardIterator first, ForwardIterator last, const T& value);
Îΰè[first, last)¤«¤éÍ×ÁǤÎÃͤ¬value¤ÈÅù¤·¤¤¤â¤Î¤Î¿ô¤òÊÖ¤¹¡¥
• count_if
template <class InputIterator, class Predicate>
size_t count_if(ForwardIterator first, ForwardIterator last, Predicate pred);
Îΰè[first, last)¤«¤éÍ×ÁǤÎÃͤò´Ø¿ôpred¤ËÅϤ·¤¿¤È¤¤Ëtrue¤òÊÖ¤¹¤â¤Î¤Î¿ô¤òÊÖ¤¹¡¥
Èæ³Ó(equal, includes, lexicographical_compare, max, min)
• equal
template <class InputIterator1, class InputIterator2>
bool equal(InputIterator1 first1, InputIterator1 last1, InputIterator2 first2);
template <class InputIterator1, class InputIterator2, class BinaryPredicate>
bool equal(InputIterator1 first1, InputIterator1 last1, InputIterator2 first2, BinaryPredicate pred);
Îΰè[first1, last1)¤Èfirst2¤«¤é»Ï¤Þ¤ëÎΰè¤Î¤¹¤Ù¤Æ¤ÎÍ×ÁǤò½çÈÖ¤ËÈæ³Ó¤·¤Æ¤¹¤Ù¤ÆÅù¤·¤¤ (or 2°ú¿ô¤ò¤È¤ë´Ø¿ôpred¤¬true¤òÊÖ¤¹)¾ì¹çtrue¤òÊÖ¤¹¡¥°ì¤Ä¤Ç¤â°Û¤Ê¤ëÍ×ÁǤ¬¤¢¤ì¤Ðfalse¤òÊÖ¤¹¡¥
• includes
template <class InputIterator1, class InputIterator2>
bool includes(InputIterator1 first1, InputIterator1 last1,
InputIterator2 first2, InputIterator2 last2);
template <class InputIterator1, class InputIterator2, class Compare>
bool includes(InputIterator1 first1, InputIterator1 last1,
InputIterator2 first2, InputIterator2 last2,
Compare comp);
¥½¡¼¥ÈºÑ¤ß¤ÎÎΰè[first1, last1)¤Ë[first2, last2)¤Î¤¹¤Ù¤Æ¤ÎÍ×ÁǤ¬´Þ¤Þ¤ì¤ì¤Ðtrue¤òÊÖ¤¹¡¥
• lexicographical_compare
template <class InputIterator1, class InputIterator2>
bool lexicographical_compare(InputIterator1 first1, InputIterator1 last1,
InputIterator2 first2, InputIterator2 last2);
template <class InputIterator1, class InputIterator2, class Compare>
bool lexicographical_compare(InputIterator1 first1, InputIterator1 last1,
InputIterator2 first2, InputIterator2 last2,
Compare comp );
Îΰè[first1,last1)¤È[first2,last2)¤ò¼½ñ½ç¤Ç¤É¤Á¤é¤¬Àè¤ËÍè¤ë¤«¤òÄ´¤Ù¤Æ¡¤ ¤â¤·[first1,last1)¤ÎÊý¤¬Àè¤ËÍè¤ë¾ì¹ç¤Ïtrue¡¤¤½¤¦¤Ç¤Ê¤¤¤È¤¤Ïfalse¤òÊÖ¤¹¡¥ ¼ç¤Ë¿¿ô¤Îʸ»úÎó¤ò¼½ñ½ç¤ËʤÓÂØ¤¨¤ë¤È¤¤ËÍѤ¤¤é¤ì¤ë¡¥ ¤¿¤È¤¨¤Ð¡¤
kagawa
kouchi
¤òÈæ¤Ù¤ë¤Èkagawa¤¬Á°¤ËÍè¤ë¤ÈȽÄꤵ¤ì¤ë¡¥
• max
template <class T> const T& max(const T& a, const T& b);
template <class T, class Compare>
const T& max(const T& a, const T& b, Compare comp);
a¤Èb¤òÈæ¤Ù¤ÆÂ礤¤Êý¤òÊÖ¤¹¡¥
• min
template <class T> const T& min(const T& a, const T& b);
template <class T, class Compare>
const T& min(const T& a, const T& b, Compare comp);
a¤Èb¤òÈæ¤Ù¤Æ¾®¤µ¤¤Êý¤òÊÖ¤¹¡¥
Ǥ°Õ´Ø¿ô¤ÎŬÍÑ(for_each, transform)
• for_each
template <class InputIterator, class Function>
Function for_each(InputIterator first, InputIterator last, Function f);
Îΰè[first,last)¤ÎÁ´Í×ÁǤ˴ؿôf¤òŬÍѤ¹¤ë¡¥ ¤¿¤È¤¨¤Ð¡¤
vector<int> a(10);
¤È¤¤¤¦ÇÛÎ󤬤¢¤ë¤È¤¹¤ë¡¥
vector<int>::iterator iter = a.begin();
for(; iter != a.end(); ++iter){
f(*iter);
}
¤È¤¤¤¦½èÍý¤ò¤·¤¿¤¤¤È¤¡¤for_each¤òÍѤ¤¤ë¤È¡¤
for_each(a.begin(), a.end(), f);
¤È¥³¥ó¥Ñ¥¯¥È¤Ë½ñ¤¯¤³¤È¤¬¤Ç¤¤ë¡¥
• transform
template <class InputIterator, class OutputIterator, class UnaryOperator>
OutputIterator transform(InputIterator first1, InputIterator last1,
OutputIterator result, UnaryOperator op);
template <class InputIterator1, class InputIterator2, class OutputIterator, class BinaryOperator>
OutputIterator transform(InputIterator1 first1, InputIterator1 last1,
InputIterator2 first2, OutputIterator result,
BinaryOperator binary_op );
for_each¤Ç¤Ï³ÆÍ×ÁǤ˴ؿô¤òŬÍѤǤ¤ë¤¬¡¤Å¬ÍÑ·ë²Ì¤ò¾¤ÎÇÛÎó¤Ë³ÊǼ¤·¤¿¤¤¾ì¹ç¤Ïtransform¤¬»È¤¨¤ë¡¥ transform¤Ï¡¤Îΰè[first1, last1)¤Î¤¹¤Ù¤Æ¤ÎÍ×ÁǤ˴ؿôop¤òŬÍѤ·¤Æ¡¤¤½¤Î·ë²Ì(ÊÖÃÍ)¤òresult¤Ë³ÊǼ¤¹¤ë(op¤Ï1°ú¿ô¤ò¤È¤ê¡¤ÃͤòÊÖ¤¹´Ø¿ô)¡¥ 2¤Ä¤á¤ÎÄêµÁ¤ÏÎΰè[first1, last1)¤Èfirst2¤«¤é»Ï¤Þ¤ëÎΰè¤ÎÍ×ÁǤò´Ø¿ôop¤ËÅϤ·¤Æ¡¤¤½¤Î·ë²Ì¤ò(ÊÖÃÍ)¤òresult¤Ë³ÊǼ¤¹¤ë(op¤Ï2°ú¿ô¤ò¤È¤ê¡¤ÃͤòÊÖ¤¹´Ø¿ô)¡¥
½çÎó(next_permutation, prev_permutation)
• next_permutation
template <class BidirectionalIterator>
bool next_permutation(BidirectionalIterator first, BidirectionalIterator last);
template <class BidirectionalIterator, class Compare>
bool next_permutation(BidirectionalIterator first, BidirectionalIterator last, Compare comp);
Îΰè[first, last)¤ÎÍ×ÁǤǹ½À®¤µ¤ì¤ë½çÎó(Í×ÁÇ¿ô¤òN¤È¤¹¤ë¤ÈN!¸Ä)¤Î¤¦¤Á¡¤¼½ñ½ç¤Ç¼¡¤Ë¤¯¤ë¤â¤Î¤òõ¤·¤Æ¡¤[first,last)¤ÎÍ×ÁǤνçÈÖ¤òÆþ¤ìÂØ¤¨¤ë¡¥
• prev_permutation
template <class BidirectionalIterator>
bool prev_permutation(BidirectionalIterator first, BidirectionalIterator last);
template <class BidirectionalIterator, class Compare>
bool prev_permutation(BidirectionalIterator first, BidirectionalIterator last, Compare comp);
next_permutation¤ÎµÕ¤Ç¡¤ Îΰè[first, last)¤ÎÍ×ÁǤǹ½À®¤µ¤ì¤ë½çÎó¤Î¤¦¤Á¡¤¼½ñ½ç¤ÇÁ°¤Ë¤¯¤ë¤â¤Î¤òõ¤·¤Æ¡¤[first,last)¤ÎÍ×ÁǤνçÈÖ¤òÆþ¤ìÂØ¤¨¤ë¡¥
źÉÕ¥Õ¥¡¥¤¥ë: filebinary_tree.jpg 1438·ï [¾ÜºÙ] filebinary_tree2.jpg 1527·ï [¾ÜºÙ] filesort_time.jpg 1573·ï [¾ÜºÙ]
¥È¥Ã¥× ÊÔ½¸ Åà·ë º¹Ê¬ ÍúÎò źÉÕ Ê£À½ ̾Á°Êѹ¹ ¥ê¥í¡¼¥É ¿·µ¬ °ìÍ÷ ¸¡º÷ ºÇ½ª¹¹¿· ¥Ø¥ë¥× ºÇ½ª¹¹¿·¤ÎRSS
Last-modified: 2022-11-30 (¿å) 13:48:10
|
{
"url": "https://www.slis.tsukuba.ac.jp/~fujisawa.makoto.fu/cgi-bin/wiki/index.php?algorithm",
"source_domain": "www.slis.tsukuba.ac.jp",
"snapshot_id": "CC-MAIN-2023-40",
"warc_metadata": {
"Content-Length": "76197",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:BP4VQ4BUE6MJS6BDWH2U53QESDRE4BAD",
"WARC-Concurrent-To": "<urn:uuid:76ce7cd1-2a79-4608-bec7-c4724975b782>",
"WARC-Date": "2023-09-29T09:39:20Z",
"WARC-IP-Address": "130.158.224.75",
"WARC-Identified-Payload-Type": "application/xhtml+xml",
"WARC-Payload-Digest": "sha1:M4EYR4J75GO7SOWGXH2MZ4P3E7DLIN4Q",
"WARC-Record-ID": "<urn:uuid:3c1e1d8e-72b2-499d-9ac4-d0e7b1846732>",
"WARC-Target-URI": "https://www.slis.tsukuba.ac.jp/~fujisawa.makoto.fu/cgi-bin/wiki/index.php?algorithm",
"WARC-Truncated": null,
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:8f30b270-8b8f-4d42-93aa-345e9250a542>"
},
"warc_info": "isPartOf: CC-MAIN-2023-40\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for September/October 2023\r\noperator: Common Crawl Admin ([email protected])\r\nhostname: ip-10-67-67-200\r\nsoftware: Apache Nutch 1.19 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.5-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: https://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/"
}
|
{
"line_start_idx": [
0,
1,
16,
17,
18,
19,
29,
30,
191,
192,
213,
214,
221,
222,
248,
249,
287,
354,
407,
488,
489,
732,
733,
771,
845,
898,
986,
987,
1079,
1080,
1089,
1090,
1094,
1098,
1102,
1106,
1110,
1114,
1118,
1122,
1126,
1130,
1134,
1138,
1142,
1146,
1150,
1154,
1158,
1162,
1166,
1170,
1174,
1178,
1182,
1186,
1190,
1194,
1198,
1202,
1206,
1210,
1214,
1218,
1222,
1226,
1230,
1234,
1238,
1242,
1246,
1250,
1254,
1258,
1262,
1266,
1270,
1274,
1278,
1282,
1286,
1290,
1294,
1298,
1302,
1321,
1341,
1359,
1380,
1401,
1403,
1415,
1417,
1431,
1434,
1500,
1502,
1554,
1556,
1587,
1589,
1611,
1613,
1628,
1630,
1652,
1672,
1674,
1696,
1711,
1716,
1748,
1774,
1801,
1829,
1835,
1837,
1857,
1928,
1946,
1948,
1968,
2039,
2057,
2062,
2092,
2128,
2133,
2153,
2224,
2242,
2244,
2264,
2335,
2353,
2355,
2369,
2371,
2372,
2381,
2382,
2415,
2498,
2531,
2614,
2615,
2659,
2660,
2699,
2803,
2804,
2858,
2976,
2977,
3230,
3231,
3342,
3343,
3403,
3484,
3594,
3595,
3670,
3750,
3860,
3915,
3916,
3984,
3985,
3994,
3995,
3999,
4003,
4007,
4011,
4015,
4019,
4023,
4027,
4031,
4035,
4039,
4043,
4047,
4051,
4055,
4059,
4063,
4067,
4071,
4075,
4079,
4083,
4087,
4091,
4095,
4099,
4103,
4107,
4111,
4115,
4119,
4123,
4127,
4131,
4135,
4139,
4158,
4178,
4196,
4217,
4238,
4253,
4255,
4277,
4297,
4299,
4327,
4351,
4356,
4388,
4421,
4427,
4429,
4451,
4522,
4540,
4542,
4593,
4602,
4624,
4695,
4713,
4715,
4778,
4780,
4802,
4910,
4928,
4930,
4944,
4946,
4947,
4956,
4957,
4992,
5027,
5047,
5048,
5091,
5092,
5127,
5162,
5182,
5183,
5192,
5193,
5213,
5214,
5253,
5353,
5355,
5409,
5523,
5524,
5687,
5688,
5697,
5698,
5702,
5706,
5710,
5714,
5718,
5722,
5726,
5730,
5734,
5738,
5742,
5746,
5750,
5754,
5758,
5762,
5766,
5770,
5774,
5778,
5782,
5786,
5790,
5794,
5798,
5802,
5806,
5825,
5845,
5863,
5884,
5905,
5920,
5922,
5944,
5962,
5964,
5986,
6018,
6044,
6050,
6052,
6072,
6143,
6161,
6163,
6213,
6218,
6238,
6309,
6327,
6329,
6343,
6345,
6346,
6375,
6376,
6409,
6442,
6443,
6499,
6500,
6539,
6611,
6612,
6665,
6751,
6752,
7133,
7134,
7198,
7199,
7238,
7310,
7311,
7364,
7450,
7451,
7492,
7493,
7509,
7510,
7578,
7579,
7651,
7652,
7691,
7762,
7816,
7901,
7940,
8012,
8066,
8152,
8153,
8235,
8236,
8266,
8279,
8280,
8340,
8341,
8359,
8390,
8391,
8549,
8550,
8559,
8560,
8564,
8568,
8572,
8576,
8580,
8584,
8588,
8592,
8596,
8600,
8604,
8608,
8612,
8616,
8620,
8624,
8628,
8632,
8636,
8640,
8644,
8648,
8652,
8656,
8660,
8664,
8668,
8672,
8676,
8680,
8684,
8688,
8708,
8726,
8747,
8768,
8783,
8785,
8807,
8809,
8831,
8863,
8883,
8889,
8929,
8931,
8951,
9022,
9040,
9042,
9077,
9082,
9102,
9173,
9191,
9193,
9228,
9233,
9253,
9324,
9342,
9347,
9361,
9363,
9364,
9373,
9374,
9408,
9442,
9476,
9477,
9528,
9529,
9546,
9547,
9564,
9565,
9762,
9763,
9822,
9823,
9834,
9835,
9839,
9843,
9847,
9851,
9855,
9859,
9863,
9867,
9871,
9875,
9879,
9883,
9887,
9891,
9895,
9899,
9903,
9907,
9911,
9915,
9919,
9923,
9927,
9931,
9935,
9939,
9943,
9947,
9951,
9955,
9959,
9963,
9967,
9971,
9975,
9979,
9983,
9987,
9991,
9995,
9999,
10003,
10007,
10011,
10015,
10019,
10023,
10027,
10031,
10035,
10039,
10043,
10047,
10064,
10084,
10102,
10123,
10144,
10159,
10161,
10180,
10200,
10219,
10221,
10238,
10268,
10300,
10325,
10327,
10348,
10384,
10406,
10416,
10418,
10462,
10484,
10518,
10540,
10594,
10596,
10640,
10662,
10703,
10725,
10779,
10781,
10825,
10847,
10904,
10926,
10980,
10982,
11026,
11048,
11104,
11126,
11180,
11182,
11199,
11205,
11207,
11223,
11225,
11239,
11241,
11242,
11251,
11252,
11266,
11267,
11384,
11385,
11390,
11391,
11426,
11427,
11436,
11481,
11563,
11636,
11648,
11700,
11785,
11861,
11879,
11942,
12028,
12114,
12200,
12286,
12372,
12431,
12526,
12527,
12560,
12561,
12572,
12635,
12714,
12793,
12879,
12958,
13037,
13089,
13237,
13250,
13313,
13394,
13475,
13561,
13642,
13723,
13777,
13925,
13926,
13970,
13971,
13989,
14027,
14108,
14169,
14272,
14344,
14357,
14415,
14519,
14600,
14704,
14757,
14833,
14841,
14849,
14854,
14892,
14942,
14972,
14973,
15004,
15005,
15018,
15077,
15197,
15279,
15399,
15473,
15672,
15673,
15682,
15683,
15687,
15691,
15695,
15699,
15703,
15707,
15711,
15715,
15719,
15723,
15727,
15731,
15735,
15739,
15743,
15747,
15751,
15755,
15759,
15763,
15767,
15771,
15775,
15779,
15783,
15787,
15791,
15795,
15799,
15803,
15807,
15811,
15815,
15819,
15823,
15827,
15831,
15835,
15839,
15843,
15847,
15851,
15855,
15859,
15879,
15897,
15918,
15939,
15941,
15960,
15984,
15986,
16057,
16075,
16077,
16079,
16131,
16133,
16148,
16150,
16172,
16174,
16196,
16210,
16235,
16260,
16265,
16297,
16315,
16335,
16341,
16343,
16375,
16377,
16423,
16469,
16559,
16577,
16579,
16602,
16625,
16679,
16744,
16836,
16838,
16852,
16854,
16855,
16864,
16865,
16894,
16923,
16947,
16948,
16955,
16962,
16986,
16987,
17057,
17058,
17074,
17121,
17238,
17300,
17417,
17487,
17579,
17587,
17595,
17603,
17611,
17619,
17624,
17668,
17716,
17748,
17788,
17867,
17966,
17982,
18029,
18124,
18186,
18295,
18372,
18388,
18435,
18530,
18592,
18701,
18787,
18795,
18803,
18811,
18819,
18827,
18832,
18876,
18924,
18967,
19010,
19071,
19121,
19122,
19146,
19147,
19189,
19271,
19328,
19424,
19425,
19604,
19605,
19609,
19613,
19617,
19621,
19625,
19659,
19677,
19711,
19750,
19756,
19757,
19802,
19803,
19819,
19857,
19936,
19989,
20082,
20144,
20160,
20198,
20277,
20330,
20423,
20494,
20502,
20510,
20518,
20526,
20534,
20539,
20583,
20624,
20665,
20740,
20815,
20844,
20867,
20890,
20891,
20906,
20907,
20968,
20969,
20981,
21028,
21132,
21224,
21239,
21302,
21405,
21514,
21531,
21597,
21695,
21769,
21902,
21922,
22005,
22106,
22179,
22329,
22330,
22339,
22340,
22344,
22348,
22352,
22356,
22360,
22364,
22368,
22372,
22376,
22380,
22384,
22388,
22392,
22396,
22400,
22404,
22408,
22412,
22416,
22420,
22424,
22428,
22432,
22436,
22440,
22444,
22448,
22452,
22456,
22460,
22464,
22468,
22472,
22476,
22480,
22484,
22488,
22492,
22496,
22500,
22504,
22508,
22512,
22532,
22550,
22571,
22592,
22594,
22613,
22637,
22639,
22710,
22728,
22730,
22732,
22776,
22778,
22793,
22795,
22817,
22819,
22841,
22855,
22880,
22894,
22918,
22923,
22955,
22975,
22995,
23001,
23003,
23021,
23060,
23095,
23097,
23115,
23153,
23188,
23190,
23249,
23272,
23306,
23308,
23322,
23324,
23325,
23334,
23335,
23364,
23398,
23428,
23462,
23469,
23481,
23482,
23560,
23561,
23572,
23619,
23709,
23776,
23790,
23845,
23938,
24006,
24022,
24088,
24201,
24290,
24309,
24383,
24499,
24589,
24600,
24638,
24712,
24772,
24868,
25079,
25095,
25153,
25250,
25331,
25450,
25525,
25526,
25567,
25568,
25577,
25624,
25701,
25750,
25761,
25819,
25883,
25933,
25946,
26000,
26080,
26159,
26174,
26239,
26305,
26391,
26392,
26420,
26421,
26430,
26488,
26578,
26690,
26708,
26783,
26885,
26959,
27108,
27109,
27137,
27138,
27150,
27194,
27270,
27316,
27333,
27399,
27513,
27583,
27584,
27620,
27621,
27632,
27669,
27756,
27836,
27852,
27912,
28014,
28070,
28174,
28175,
28213,
28214,
28284,
28379,
28433,
28555,
28632,
28733,
28794,
28914,
28915,
28950,
28951,
28970,
29013,
29094,
29166,
29276,
29330,
29331,
29361,
29362,
29371,
29417,
29445,
29519,
29628,
29661,
29662,
29691,
29692,
29702,
29783,
29855,
29927,
29977,
29982,
30078,
30150,
30222,
30286,
30435,
30453,
30497,
30610,
30615,
30674,
30786,
30825,
31084,
31105,
31189,
31210,
31223,
31224,
31304,
31305,
31324,
31405,
31486,
31567,
31626,
31631,
31727,
31808,
31889,
31962,
32187,
32205,
32214,
32233,
32252,
32264,
32277,
32401,
32422,
32502,
32585,
32668,
32729,
32734,
32829,
32912,
32995,
33070,
33230,
33248,
33255,
33274,
33295,
33304,
33317,
33346,
33426,
33517,
33608,
33677,
33682,
33777,
33868,
33959,
34042,
34188,
34206,
34213,
34232,
34257,
34279,
34292,
34306,
34386,
34462,
34538,
34592,
34597,
34692,
34768,
34844,
34912,
35052,
35070,
35077,
35096,
35115,
35143,
35156,
35157,
35164,
35165,
35191,
35192,
35202,
35247,
35327,
35392,
35405,
35458,
35541,
35625,
35626,
35683,
35684,
35694,
35753,
35838,
35843,
35924,
36031,
36211,
36224,
36283,
36348,
36413,
36418,
36492,
36557,
36622,
36656,
36747,
36775,
36834,
36914,
36994,
36999,
37073,
37153,
37233,
37283,
37500,
37511,
37522,
37567,
37575,
37636,
37642,
37681,
37738,
37771,
37779,
37840,
37846,
37885,
37942,
37975,
37976,
38012,
38013,
38026,
38078,
38155,
38214,
38237,
38266,
38310,
38346,
38364,
38370,
38419,
38456,
38493,
38507,
38586,
38659,
38731,
38736,
38839,
38914,
38990,
39048,
39426,
39427,
39468,
39469,
39490,
39533,
39618,
39623,
39681,
39780,
39923,
39944,
39987,
40072,
40077,
40135,
40234,
40379,
40380,
40495,
40496,
40604
],
"line_end_idx": [
1,
16,
17,
18,
19,
29,
30,
191,
192,
213,
214,
221,
222,
248,
249,
287,
354,
407,
488,
489,
732,
733,
771,
845,
898,
986,
987,
1079,
1080,
1089,
1090,
1094,
1098,
1102,
1106,
1110,
1114,
1118,
1122,
1126,
1130,
1134,
1138,
1142,
1146,
1150,
1154,
1158,
1162,
1166,
1170,
1174,
1178,
1182,
1186,
1190,
1194,
1198,
1202,
1206,
1210,
1214,
1218,
1222,
1226,
1230,
1234,
1238,
1242,
1246,
1250,
1254,
1258,
1262,
1266,
1270,
1274,
1278,
1282,
1286,
1290,
1294,
1298,
1302,
1321,
1341,
1359,
1380,
1401,
1403,
1415,
1417,
1431,
1434,
1500,
1502,
1554,
1556,
1587,
1589,
1611,
1613,
1628,
1630,
1652,
1672,
1674,
1696,
1711,
1716,
1748,
1774,
1801,
1829,
1835,
1837,
1857,
1928,
1946,
1948,
1968,
2039,
2057,
2062,
2092,
2128,
2133,
2153,
2224,
2242,
2244,
2264,
2335,
2353,
2355,
2369,
2371,
2372,
2381,
2382,
2415,
2498,
2531,
2614,
2615,
2659,
2660,
2699,
2803,
2804,
2858,
2976,
2977,
3230,
3231,
3342,
3343,
3403,
3484,
3594,
3595,
3670,
3750,
3860,
3915,
3916,
3984,
3985,
3994,
3995,
3999,
4003,
4007,
4011,
4015,
4019,
4023,
4027,
4031,
4035,
4039,
4043,
4047,
4051,
4055,
4059,
4063,
4067,
4071,
4075,
4079,
4083,
4087,
4091,
4095,
4099,
4103,
4107,
4111,
4115,
4119,
4123,
4127,
4131,
4135,
4139,
4158,
4178,
4196,
4217,
4238,
4253,
4255,
4277,
4297,
4299,
4327,
4351,
4356,
4388,
4421,
4427,
4429,
4451,
4522,
4540,
4542,
4593,
4602,
4624,
4695,
4713,
4715,
4778,
4780,
4802,
4910,
4928,
4930,
4944,
4946,
4947,
4956,
4957,
4992,
5027,
5047,
5048,
5091,
5092,
5127,
5162,
5182,
5183,
5192,
5193,
5213,
5214,
5253,
5353,
5355,
5409,
5523,
5524,
5687,
5688,
5697,
5698,
5702,
5706,
5710,
5714,
5718,
5722,
5726,
5730,
5734,
5738,
5742,
5746,
5750,
5754,
5758,
5762,
5766,
5770,
5774,
5778,
5782,
5786,
5790,
5794,
5798,
5802,
5806,
5825,
5845,
5863,
5884,
5905,
5920,
5922,
5944,
5962,
5964,
5986,
6018,
6044,
6050,
6052,
6072,
6143,
6161,
6163,
6213,
6218,
6238,
6309,
6327,
6329,
6343,
6345,
6346,
6375,
6376,
6409,
6442,
6443,
6499,
6500,
6539,
6611,
6612,
6665,
6751,
6752,
7133,
7134,
7198,
7199,
7238,
7310,
7311,
7364,
7450,
7451,
7492,
7493,
7509,
7510,
7578,
7579,
7651,
7652,
7691,
7762,
7816,
7901,
7940,
8012,
8066,
8152,
8153,
8235,
8236,
8266,
8279,
8280,
8340,
8341,
8359,
8390,
8391,
8549,
8550,
8559,
8560,
8564,
8568,
8572,
8576,
8580,
8584,
8588,
8592,
8596,
8600,
8604,
8608,
8612,
8616,
8620,
8624,
8628,
8632,
8636,
8640,
8644,
8648,
8652,
8656,
8660,
8664,
8668,
8672,
8676,
8680,
8684,
8688,
8708,
8726,
8747,
8768,
8783,
8785,
8807,
8809,
8831,
8863,
8883,
8889,
8929,
8931,
8951,
9022,
9040,
9042,
9077,
9082,
9102,
9173,
9191,
9193,
9228,
9233,
9253,
9324,
9342,
9347,
9361,
9363,
9364,
9373,
9374,
9408,
9442,
9476,
9477,
9528,
9529,
9546,
9547,
9564,
9565,
9762,
9763,
9822,
9823,
9834,
9835,
9839,
9843,
9847,
9851,
9855,
9859,
9863,
9867,
9871,
9875,
9879,
9883,
9887,
9891,
9895,
9899,
9903,
9907,
9911,
9915,
9919,
9923,
9927,
9931,
9935,
9939,
9943,
9947,
9951,
9955,
9959,
9963,
9967,
9971,
9975,
9979,
9983,
9987,
9991,
9995,
9999,
10003,
10007,
10011,
10015,
10019,
10023,
10027,
10031,
10035,
10039,
10043,
10047,
10064,
10084,
10102,
10123,
10144,
10159,
10161,
10180,
10200,
10219,
10221,
10238,
10268,
10300,
10325,
10327,
10348,
10384,
10406,
10416,
10418,
10462,
10484,
10518,
10540,
10594,
10596,
10640,
10662,
10703,
10725,
10779,
10781,
10825,
10847,
10904,
10926,
10980,
10982,
11026,
11048,
11104,
11126,
11180,
11182,
11199,
11205,
11207,
11223,
11225,
11239,
11241,
11242,
11251,
11252,
11266,
11267,
11384,
11385,
11390,
11391,
11426,
11427,
11436,
11481,
11563,
11636,
11648,
11700,
11785,
11861,
11879,
11942,
12028,
12114,
12200,
12286,
12372,
12431,
12526,
12527,
12560,
12561,
12572,
12635,
12714,
12793,
12879,
12958,
13037,
13089,
13237,
13250,
13313,
13394,
13475,
13561,
13642,
13723,
13777,
13925,
13926,
13970,
13971,
13989,
14027,
14108,
14169,
14272,
14344,
14357,
14415,
14519,
14600,
14704,
14757,
14833,
14841,
14849,
14854,
14892,
14942,
14972,
14973,
15004,
15005,
15018,
15077,
15197,
15279,
15399,
15473,
15672,
15673,
15682,
15683,
15687,
15691,
15695,
15699,
15703,
15707,
15711,
15715,
15719,
15723,
15727,
15731,
15735,
15739,
15743,
15747,
15751,
15755,
15759,
15763,
15767,
15771,
15775,
15779,
15783,
15787,
15791,
15795,
15799,
15803,
15807,
15811,
15815,
15819,
15823,
15827,
15831,
15835,
15839,
15843,
15847,
15851,
15855,
15859,
15879,
15897,
15918,
15939,
15941,
15960,
15984,
15986,
16057,
16075,
16077,
16079,
16131,
16133,
16148,
16150,
16172,
16174,
16196,
16210,
16235,
16260,
16265,
16297,
16315,
16335,
16341,
16343,
16375,
16377,
16423,
16469,
16559,
16577,
16579,
16602,
16625,
16679,
16744,
16836,
16838,
16852,
16854,
16855,
16864,
16865,
16894,
16923,
16947,
16948,
16955,
16962,
16986,
16987,
17057,
17058,
17074,
17121,
17238,
17300,
17417,
17487,
17579,
17587,
17595,
17603,
17611,
17619,
17624,
17668,
17716,
17748,
17788,
17867,
17966,
17982,
18029,
18124,
18186,
18295,
18372,
18388,
18435,
18530,
18592,
18701,
18787,
18795,
18803,
18811,
18819,
18827,
18832,
18876,
18924,
18967,
19010,
19071,
19121,
19122,
19146,
19147,
19189,
19271,
19328,
19424,
19425,
19604,
19605,
19609,
19613,
19617,
19621,
19625,
19659,
19677,
19711,
19750,
19756,
19757,
19802,
19803,
19819,
19857,
19936,
19989,
20082,
20144,
20160,
20198,
20277,
20330,
20423,
20494,
20502,
20510,
20518,
20526,
20534,
20539,
20583,
20624,
20665,
20740,
20815,
20844,
20867,
20890,
20891,
20906,
20907,
20968,
20969,
20981,
21028,
21132,
21224,
21239,
21302,
21405,
21514,
21531,
21597,
21695,
21769,
21902,
21922,
22005,
22106,
22179,
22329,
22330,
22339,
22340,
22344,
22348,
22352,
22356,
22360,
22364,
22368,
22372,
22376,
22380,
22384,
22388,
22392,
22396,
22400,
22404,
22408,
22412,
22416,
22420,
22424,
22428,
22432,
22436,
22440,
22444,
22448,
22452,
22456,
22460,
22464,
22468,
22472,
22476,
22480,
22484,
22488,
22492,
22496,
22500,
22504,
22508,
22512,
22532,
22550,
22571,
22592,
22594,
22613,
22637,
22639,
22710,
22728,
22730,
22732,
22776,
22778,
22793,
22795,
22817,
22819,
22841,
22855,
22880,
22894,
22918,
22923,
22955,
22975,
22995,
23001,
23003,
23021,
23060,
23095,
23097,
23115,
23153,
23188,
23190,
23249,
23272,
23306,
23308,
23322,
23324,
23325,
23334,
23335,
23364,
23398,
23428,
23462,
23469,
23481,
23482,
23560,
23561,
23572,
23619,
23709,
23776,
23790,
23845,
23938,
24006,
24022,
24088,
24201,
24290,
24309,
24383,
24499,
24589,
24600,
24638,
24712,
24772,
24868,
25079,
25095,
25153,
25250,
25331,
25450,
25525,
25526,
25567,
25568,
25577,
25624,
25701,
25750,
25761,
25819,
25883,
25933,
25946,
26000,
26080,
26159,
26174,
26239,
26305,
26391,
26392,
26420,
26421,
26430,
26488,
26578,
26690,
26708,
26783,
26885,
26959,
27108,
27109,
27137,
27138,
27150,
27194,
27270,
27316,
27333,
27399,
27513,
27583,
27584,
27620,
27621,
27632,
27669,
27756,
27836,
27852,
27912,
28014,
28070,
28174,
28175,
28213,
28214,
28284,
28379,
28433,
28555,
28632,
28733,
28794,
28914,
28915,
28950,
28951,
28970,
29013,
29094,
29166,
29276,
29330,
29331,
29361,
29362,
29371,
29417,
29445,
29519,
29628,
29661,
29662,
29691,
29692,
29702,
29783,
29855,
29927,
29977,
29982,
30078,
30150,
30222,
30286,
30435,
30453,
30497,
30610,
30615,
30674,
30786,
30825,
31084,
31105,
31189,
31210,
31223,
31224,
31304,
31305,
31324,
31405,
31486,
31567,
31626,
31631,
31727,
31808,
31889,
31962,
32187,
32205,
32214,
32233,
32252,
32264,
32277,
32401,
32422,
32502,
32585,
32668,
32729,
32734,
32829,
32912,
32995,
33070,
33230,
33248,
33255,
33274,
33295,
33304,
33317,
33346,
33426,
33517,
33608,
33677,
33682,
33777,
33868,
33959,
34042,
34188,
34206,
34213,
34232,
34257,
34279,
34292,
34306,
34386,
34462,
34538,
34592,
34597,
34692,
34768,
34844,
34912,
35052,
35070,
35077,
35096,
35115,
35143,
35156,
35157,
35164,
35165,
35191,
35192,
35202,
35247,
35327,
35392,
35405,
35458,
35541,
35625,
35626,
35683,
35684,
35694,
35753,
35838,
35843,
35924,
36031,
36211,
36224,
36283,
36348,
36413,
36418,
36492,
36557,
36622,
36656,
36747,
36775,
36834,
36914,
36994,
36999,
37073,
37153,
37233,
37283,
37500,
37511,
37522,
37567,
37575,
37636,
37642,
37681,
37738,
37771,
37779,
37840,
37846,
37885,
37942,
37975,
37976,
38012,
38013,
38026,
38078,
38155,
38214,
38237,
38266,
38310,
38346,
38364,
38370,
38419,
38456,
38493,
38507,
38586,
38659,
38731,
38736,
38839,
38914,
38990,
39048,
39426,
39427,
39468,
39469,
39490,
39533,
39618,
39623,
39681,
39780,
39923,
39944,
39987,
40072,
40077,
40135,
40234,
40379,
40380,
40495,
40496,
40604,
40643
]
}
|
{
"red_pajama_v2": {
"ccnet_original_length": 40643,
"ccnet_original_nlines": 1279,
"rps_doc_curly_bracket": 0.00142705999314785,
"rps_doc_ldnoobw_words": 0,
"rps_doc_lorem_ipsum": 0,
"rps_doc_stop_word_fraction": 0.05782492831349373,
"rps_doc_ut1_blacklist": 0,
"rps_doc_frac_all_caps_words": 0.10663130134344101,
"rps_doc_frac_lines_end_with_ellipsis": 0,
"rps_doc_frac_no_alph_words": 0.7402299046516418,
"rps_doc_frac_unique_words": 0.1889667809009552,
"rps_doc_mean_word_length": 9.440719604492188,
"rps_doc_num_sentences": 104,
"rps_doc_symbol_to_word_ratio": 0.0022988501004874706,
"rps_doc_unigram_entropy": 5.136999607086182,
"rps_doc_word_count": 3281,
"rps_doc_frac_chars_dupe_10grams": 0.177046000957489,
"rps_doc_frac_chars_dupe_5grams": 0.46317997574806213,
"rps_doc_frac_chars_dupe_6grams": 0.3872154951095581,
"rps_doc_frac_chars_dupe_7grams": 0.3468603789806366,
"rps_doc_frac_chars_dupe_8grams": 0.29149314761161804,
"rps_doc_frac_chars_dupe_9grams": 0.24222759902477264,
"rps_doc_frac_chars_top_2gram": 0.04322841018438339,
"rps_doc_frac_chars_top_3gram": 0.0026150099001824856,
"rps_doc_frac_chars_top_4gram": 0.0029701399616897106,
"rps_doc_books_importance": -5021.6025390625,
"rps_doc_books_importance_length_correction": -5021.6025390625,
"rps_doc_openwebtext_importance": -3212.155517578125,
"rps_doc_openwebtext_importance_length_correction": -3212.155517578125,
"rps_doc_wikipedia_importance": -2061.0517578125,
"rps_doc_wikipedia_importance_length_correction": -2061.0517578125
},
"fasttext": {
"dclm": 0.15691238641738892,
"english": 0.27975335717201233,
"fineweb_edu_approx": 1.5529614686965942,
"eai_general_math": 0.7470414042472839,
"eai_open_web_math": 0.0018374300561845303,
"eai_web_code": 0.8696079850196838
}
}
|
{
"free_decimal_correspondence": {
"primary": {
"code": "005.1",
"labels": {
"level_1": "General works, books and libraries, information sciences",
"level_2": "",
"level_3": "Computer programming"
}
},
"secondary": {
"code": "005.72",
"labels": {
"level_1": "General works, books and libraries, information sciences",
"level_2": "",
"level_3": "Computer programming"
}
}
},
"bloom_cognitive_process": {
"primary": {
"code": "3",
"label": "Apply"
},
"secondary": {
"code": "4",
"label": "Analyze"
}
},
"bloom_knowledge_domain": {
"primary": {
"code": "3",
"label": "Procedural"
},
"secondary": {
"code": "2",
"label": "Conceptual"
}
},
"document_type_v1": {
"primary": {
"code": "3",
"label": "Reference/Encyclopedic/Educational"
},
"secondary": {
"code": "4",
"label": "Code/Software"
}
},
"extraction_artifacts": {
"primary": {
"code": "3",
"label": "Irrelevant Content"
},
"secondary": {
"code": "0",
"label": "No Artifacts"
}
},
"missing_content": {
"primary": {
"code": "4",
"label": "Missing Images or Figures"
},
"secondary": {
"code": "0",
"label": "No missing content"
}
},
"document_type_v2": {
"primary": {
"code": "8",
"label": "Documentation"
},
"secondary": {
"code": "23",
"label": "Tutorial"
}
},
"reasoning_depth": {
"primary": {
"code": "3",
"label": "Intermediate Reasoning"
},
"secondary": {
"code": "4",
"label": "Advanced Reasoning"
}
},
"technical_correctness": {
"primary": {
"code": "4",
"label": "Highly Correct"
},
"secondary": {
"code": "5",
"label": "Exceptionally Correct"
}
},
"education_level": {
"primary": {
"code": "3",
"label": "Undergraduate Level"
},
"secondary": {
"code": "4",
"label": "Graduate/Expert Level"
}
}
}
|
672f1e42c33a7f9846924a2431ea77df
|
-7,235,642,710,283,653,000 |
Uploaded image for project: 'Apache Arrow'
1. Apache Arrow
2. ARROW-17005
[Java] Incorrect results from JDBC Adapter from Postgres of non-nullable column through left join
XMLWordPrintableJSON
Details
• Wish
• Status: Resolved
• Major
• Resolution: Fixed
• None
• 9.0.0
• Java
Description
Unsure to consider this a bug or wish, but the JDBC to Arrow Adapter produces incorrect results when wrapping the postgres driver in certain cases.
If you left join a non-nullable column, the column becomes nullable (if the join condition does not match any columns). However the postgres ResultSetMetaData lies to you and still indicates that the column is still non-nullable.
When iterating through the data, results come back as null (isNull will return true).
However, because of the way that the JDBCConsumer is created, it creates a non-nullable consumer and will not check the nullability of these results.
Unfortunately, this results in incorrect data or errors depending on the data types returned.
The postgres JDBC team has closed a ticket about this indicating that it would be impossible for them to return the correct data nullability data to the JDBC driver. see: https://github.com/pgjdbc/pgjdbc/issues/2079
An example:
Table:
t1.id
2
3
CREATE TABLE t1 (id integer NOT NULL);
INSERT INTO t1 VALUES (2), (3);
Query
WITH t2 AS (SELECT 1 AS id UNION SELECT 2)
SELECT
t1.id
FROM t2
LEFT JOIN t1 on t1.id = t2.id;
This returns the result set:
id
2
null
The ResultSetMetaData indicates that the column is non-nullable (as t1.id is non-nullable) but there is null data in the result.
The Arrow Vector that is present after the result set is consumed, looks like this:
id
2
0
ResultSet.getInt(1) will return 0 when the source data is null, with an expectation that you check isNull.
The data is incorrect and silently fails potentially leading to clients / consumers getting bad data.
In other cases, such as UUID (mapped to UTF-8 vectors) the value will fail to load into arrow due to expecting null data and throwing a NPE when deserializing / converting to bytearrays.
I was able to work around this problem by wrapping the postgres JDBC ResultSetMetadata and always forcing the nullability to nullable (or nullability unknown).
Unfortunately I don't think there is a great way to solve this, but perhaps some way to configure / override the JDBCConsumer creation would allow for users of this library to override this behavior, however the silent failure and incorrect data might lead to users not noticing.
Attachments
Issue Links
Activity
People
lidavidm David Li
jswenson Jonathan Swenson
Votes:
0 Vote for this issue
Watchers:
4 Start watching this issue
Dates
Created:
Updated:
Resolved:
Time Tracking
Estimated:
Original Estimate - Not Specified
Not Specified
Remaining:
Remaining Estimate - 0h
0h
Logged:
Time Spent - 40m
40m
|
{
"url": "https://issues.apache.org/jira/browse/ARROW-17005",
"source_domain": "issues.apache.org",
"snapshot_id": "CC-MAIN-2024-10",
"warc_metadata": {
"Content-Length": "118967",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:EALSOTDQE2EXS3K34LHR5FQ35AH6G7RQ",
"WARC-Concurrent-To": "<urn:uuid:9a985f9d-f1c7-4bf4-b475-5ec91d5c9cbd>",
"WARC-Date": "2024-02-25T22:58:17Z",
"WARC-IP-Address": "168.119.33.54",
"WARC-Identified-Payload-Type": "text/html",
"WARC-Payload-Digest": "sha1:IPZPCZ4TAWAYLU7SGS4EUP3I3X2SFLM7",
"WARC-Record-ID": "<urn:uuid:01435ab6-bb3b-431c-9f11-a4c35d4a6a03>",
"WARC-Target-URI": "https://issues.apache.org/jira/browse/ARROW-17005",
"WARC-Truncated": null,
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:0443f280-d8ba-49d4-880c-87486785aa06>"
},
"warc_info": "isPartOf: CC-MAIN-2024-10\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for February/March 2024\r\noperator: Common Crawl Admin ([email protected])\r\nhostname: ip-10-67-67-88\r\nsoftware: Apache Nutch 1.19 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.5-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: https://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/"
}
|
{
"line_start_idx": [
0,
43,
61,
78,
79,
177,
178,
203,
204,
212,
213,
224,
247,
259,
283,
294,
306,
317,
318,
334,
335,
490,
491,
728,
729,
822,
823,
980,
981,
1082,
1083,
1305,
1306,
1325,
1326,
1340,
1341,
1353,
1361,
1369,
1414,
1452,
1459,
1460,
1472,
1473,
1522,
1536,
1551,
1566,
1603,
1604,
1639,
1640,
1649,
1657,
1668,
1669,
1805,
1806,
1897,
1898,
1907,
1915,
1923,
1924,
2038,
2039,
2148,
2149,
2157,
2158,
2352,
2353,
2361,
2362,
2529,
2530,
2817,
2818,
2836,
2837,
2857,
2858,
2877,
2878,
2897,
2898,
2930,
2970,
2991,
3027,
3051,
3093,
3094,
3114,
3115,
3140,
3165,
3191,
3192,
3222,
3223,
3252,
3304,
3336,
3365,
3407,
3428,
3454,
3489
],
"line_end_idx": [
43,
61,
78,
79,
177,
178,
203,
204,
212,
213,
224,
247,
259,
283,
294,
306,
317,
318,
334,
335,
490,
491,
728,
729,
822,
823,
980,
981,
1082,
1083,
1305,
1306,
1325,
1326,
1340,
1341,
1353,
1361,
1369,
1414,
1452,
1459,
1460,
1472,
1473,
1522,
1536,
1551,
1566,
1603,
1604,
1639,
1640,
1649,
1657,
1668,
1669,
1805,
1806,
1897,
1898,
1907,
1915,
1923,
1924,
2038,
2039,
2148,
2149,
2157,
2158,
2352,
2353,
2361,
2362,
2529,
2530,
2817,
2818,
2836,
2837,
2857,
2858,
2877,
2878,
2897,
2898,
2930,
2970,
2991,
3027,
3051,
3093,
3094,
3114,
3115,
3140,
3165,
3191,
3192,
3222,
3223,
3252,
3304,
3336,
3365,
3407,
3428,
3454,
3489,
3510
]
}
|
{
"red_pajama_v2": {
"ccnet_original_length": 3510,
"ccnet_original_nlines": 110,
"rps_doc_curly_bracket": 0,
"rps_doc_ldnoobw_words": 0,
"rps_doc_lorem_ipsum": 0,
"rps_doc_stop_word_fraction": 0.3041957914829254,
"rps_doc_ut1_blacklist": 0,
"rps_doc_frac_all_caps_words": 0.04895104840397835,
"rps_doc_frac_lines_end_with_ellipsis": 0,
"rps_doc_frac_no_alph_words": 0.21328671276569366,
"rps_doc_frac_unique_words": 0.4867841303348541,
"rps_doc_mean_word_length": 5.00220251083374,
"rps_doc_num_sentences": 25,
"rps_doc_symbol_to_word_ratio": 0,
"rps_doc_unigram_entropy": 5.006978511810303,
"rps_doc_word_count": 454,
"rps_doc_frac_chars_dupe_10grams": 0,
"rps_doc_frac_chars_dupe_5grams": 0.02113606035709381,
"rps_doc_frac_chars_dupe_6grams": 0,
"rps_doc_frac_chars_dupe_7grams": 0,
"rps_doc_frac_chars_dupe_8grams": 0,
"rps_doc_frac_chars_dupe_9grams": 0,
"rps_doc_frac_chars_top_2gram": 0.019374720752239227,
"rps_doc_frac_chars_top_3gram": 0.016732720658183098,
"rps_doc_frac_chars_top_4gram": 0.019374720752239227,
"rps_doc_books_importance": -316.9015197753906,
"rps_doc_books_importance_length_correction": -316.9015197753906,
"rps_doc_openwebtext_importance": -186.77069091796875,
"rps_doc_openwebtext_importance_length_correction": -186.77069091796875,
"rps_doc_wikipedia_importance": -130.569580078125,
"rps_doc_wikipedia_importance_length_correction": -130.569580078125
},
"fasttext": {
"dclm": 0.0182987991720438,
"english": 0.8368774652481079,
"fineweb_edu_approx": 1.8190734386444092,
"eai_general_math": 0.056601349264383316,
"eai_open_web_math": 0.2445177435874939,
"eai_web_code": 0.4205101728439331
}
}
|
{
"free_decimal_correspondence": {
"primary": {
"code": "005.4",
"labels": {
"level_1": "General works, books and libraries, information sciences",
"level_2": "",
"level_3": "Computer programming"
}
},
"secondary": {
"code": "005.1",
"labels": {
"level_1": "General works, books and libraries, information sciences",
"level_2": "",
"level_3": "Computer programming"
}
}
},
"bloom_cognitive_process": {
"primary": {
"code": "4",
"label": "Analyze"
},
"secondary": {
"code": "2",
"label": "Understand"
}
},
"bloom_knowledge_domain": {
"primary": {
"code": "3",
"label": "Procedural"
},
"secondary": {
"code": "2",
"label": "Conceptual"
}
},
"document_type_v1": {
"primary": {
"code": "4",
"label": "Code/Software"
},
"secondary": {
"code": "3",
"label": "Reference/Encyclopedic/Educational"
}
},
"extraction_artifacts": {
"primary": {
"code": "0",
"label": "No Artifacts"
},
"secondary": {
"code": "3",
"label": "Irrelevant Content"
}
},
"missing_content": {
"primary": {
"code": "0",
"label": "No missing content"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"document_type_v2": {
"primary": {
"code": "8",
"label": "Documentation"
},
"secondary": {
"code": "21",
"label": "Customer Support"
}
},
"reasoning_depth": {
"primary": {
"code": "3",
"label": "Intermediate Reasoning"
},
"secondary": {
"code": "2",
"label": "Basic Reasoning"
}
},
"technical_correctness": {
"primary": {
"code": "4",
"label": "Highly Correct"
},
"secondary": {
"code": "3",
"label": "Mostly Correct"
}
},
"education_level": {
"primary": {
"code": "4",
"label": "Graduate/Expert Level"
},
"secondary": {
"code": "3",
"label": "Undergraduate Level"
}
}
}
|
672f1e42c33a7f9846924a2431ea77df
|
3,824,971,032,686,129,700 |
The tag has no usage guidance.
learn more… | top users | synonyms
1
vote
1answer
19 views
How to store binary data referenced by 3D coordinates (xyz)?
I would like to store huge amounts of voxels (3D cubes with color and some other values) in a gis database. Does someone can recommend a database (indexing) system, where I can store binary data (a ...
1
vote
1answer
51 views
Save millions of points in the server side
I have asked a similar question about millions of points a few days ago:Display millions of points in the browser. It focused on how to display these data in the client(browser), however I think it ...
0
votes
1answer
150 views
What is the best way to manage geodata with open source software?
We are a small group of GIS users with different expertises embedded in an administrative infrastructure attempting to switch to a small and low cost open source infrastructure (open source GDI). ...
3
votes
0answers
52 views
What alternatives are there for hosting shapefiles too large for GeoCommons?
I've got a ~500M shapefile I'd like to place where it is publicly accessible and can be found via search. Specifically this dataset is the Bernalillo County, NM assessor parcel and tax database, which ...
4
votes
2answers
116 views
Storage hardware options for large datasets
We are about to organize our data in a centralized spatial data system. The system would provide various services (mainly supporting ftp access, geodatabase editing, and several web mapping ...
2
votes
1answer
2k views
How to restore a back up file into pgadmin III
My backup file containing about 50-60 tables , but I am able to just load only 6 tables for a new db and 31 tables for postgis dbase . And this was the error when I restore a backup file. pg_restore: ...
3
votes
1answer
286 views
How to store data for gis system?
I'm developing a GIS solution using Postgis database and geoserver as web map server. The solution to develop will analyzes the defects (as a polygon) and process parameters values (as a linestring) ...
4
votes
3answers
194 views
Store “template” mxds inside model
Since the ability to store mxds inside a file gdb is still just an idea, I've been mulling over my options for using a "template" mxd within a model. My model uses 4 different mxds, but currently it ...
10
votes
3answers
1k views
Google Drive and Backing-up/Syncing GIS Data
Seeing that many of us have three computers these days (e.g.. work, home and laptop) is anyone using Google Drive as their main file repository for GIS data? I like the idea of backing everything up ...
3
votes
1answer
544 views
Online/cloud storage options for GIS file-based data [closed]
I am currently looking into online/cloud-based storage solutions in general and also for my GIS data which consists of shapefiles, rasters, file geodatabases, and the like (no relational databases). ...
20
votes
2answers
2k views
What are the benefits of Multipart Features?
Multipart points, lines, and polygons are implemented in nearly every GIS, but what benefits, if any, do they provide? In a relational database attributes shared by different features can be stored ...
4
votes
3answers
237 views
Organization in a GIS Shop
This question is about staying organized and current on all your to dos and project tasks. For me I am an avid user of GTD and a variety of online tools such as evernote, toodledo, and gmail. I ...
|
{
"url": "http://gis.stackexchange.com/questions/tagged/data-storage",
"source_domain": "gis.stackexchange.com",
"snapshot_id": "crawl=CC-MAIN-2015-35",
"warc_metadata": {
"Content-Length": "76724",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:JJFP3AVKXMV6NAEJ6ZV4PYRWNX5EX5C4",
"WARC-Concurrent-To": "<urn:uuid:bf6506b8-3890-4728-91d7-e8c82f2f9a51>",
"WARC-Date": "2015-08-29T09:26:36Z",
"WARC-IP-Address": "104.16.12.128",
"WARC-Identified-Payload-Type": null,
"WARC-Payload-Digest": "sha1:GF66FGPFOGD4ZLSXLAFTKWOAXEWL36I5",
"WARC-Record-ID": "<urn:uuid:f4be1089-c174-471d-a134-bf464677e659>",
"WARC-Target-URI": "http://gis.stackexchange.com/questions/tagged/data-storage",
"WARC-Truncated": "length",
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:884b2702-70b7-43a7-8f45-8ba31d1dde01>"
},
"warc_info": "robots: classic\r\nhostname: ip-10-171-96-226.ec2.internal\r\nsoftware: Nutch 1.6 (CC)/CC WarcExport 1.0\r\nisPartOf: CC-MAIN-2015-35\r\noperator: CommonCrawl Admin\r\ndescription: Wide crawl of the web for August 2015\r\npublisher: CommonCrawl\r\nformat: WARC File Format 1.0\r\nconformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf"
}
|
{
"line_start_idx": [
0,
31,
32,
67,
68,
70,
75,
83,
92,
93,
154,
155,
357,
359,
364,
372,
381,
382,
425,
426,
628,
630,
636,
644,
654,
655,
721,
722,
922,
924,
930,
939,
948,
949,
1026,
1027,
1232,
1234,
1240,
1249,
1259,
1260,
1304,
1305,
1499,
1501,
1507,
1515,
1524,
1525,
1572,
1573,
1777,
1779,
1785,
1793,
1803,
1804,
1838,
1839,
2042,
2044,
2050,
2059,
2069,
2070,
2105,
2106,
2309,
2312,
2318,
2327,
2336,
2337,
2382,
2383,
2586,
2588,
2594,
2602,
2612,
2613,
2675,
2676,
2879,
2882,
2888,
2897,
2906,
2907,
2952,
2953,
3155,
3157,
3163,
3172,
3182,
3183,
3210,
3211
],
"line_end_idx": [
31,
32,
67,
68,
70,
75,
83,
92,
93,
154,
155,
357,
359,
364,
372,
381,
382,
425,
426,
628,
630,
636,
644,
654,
655,
721,
722,
922,
924,
930,
939,
948,
949,
1026,
1027,
1232,
1234,
1240,
1249,
1259,
1260,
1304,
1305,
1499,
1501,
1507,
1515,
1524,
1525,
1572,
1573,
1777,
1779,
1785,
1793,
1803,
1804,
1838,
1839,
2042,
2044,
2050,
2059,
2069,
2070,
2105,
2106,
2309,
2312,
2318,
2327,
2336,
2337,
2382,
2383,
2586,
2588,
2594,
2602,
2612,
2613,
2675,
2676,
2879,
2882,
2888,
2897,
2906,
2907,
2952,
2953,
3155,
3157,
3163,
3172,
3182,
3183,
3210,
3211,
3408
]
}
|
{
"red_pajama_v2": {
"ccnet_original_length": 3408,
"ccnet_original_nlines": 99,
"rps_doc_curly_bracket": 0,
"rps_doc_ldnoobw_words": 0,
"rps_doc_lorem_ipsum": 0,
"rps_doc_stop_word_fraction": 0.3348017632961273,
"rps_doc_ut1_blacklist": 0,
"rps_doc_frac_all_caps_words": 0.04258443042635918,
"rps_doc_frac_lines_end_with_ellipsis": 0.11999999731779099,
"rps_doc_frac_no_alph_words": 0.17474302649497986,
"rps_doc_frac_unique_words": 0.5139372944831848,
"rps_doc_mean_word_length": 4.656794548034668,
"rps_doc_num_sentences": 32,
"rps_doc_symbol_to_word_ratio": 0.01908957026898861,
"rps_doc_unigram_entropy": 5.259983539581299,
"rps_doc_word_count": 574,
"rps_doc_frac_chars_dupe_10grams": 0,
"rps_doc_frac_chars_dupe_5grams": 0.01571268029510975,
"rps_doc_frac_chars_dupe_6grams": 0,
"rps_doc_frac_chars_dupe_7grams": 0,
"rps_doc_frac_chars_dupe_8grams": 0,
"rps_doc_frac_chars_dupe_9grams": 0,
"rps_doc_frac_chars_top_2gram": 0.007482230197638273,
"rps_doc_frac_chars_top_3gram": 0.011223340407013893,
"rps_doc_frac_chars_top_4gram": 0.011223340407013893,
"rps_doc_books_importance": -270.5016784667969,
"rps_doc_books_importance_length_correction": -270.5016784667969,
"rps_doc_openwebtext_importance": -145.38230895996094,
"rps_doc_openwebtext_importance_length_correction": -145.38230895996094,
"rps_doc_wikipedia_importance": -109.8349380493164,
"rps_doc_wikipedia_importance_length_correction": -109.8349380493164
},
"fasttext": {
"dclm": 0.02802431955933571,
"english": 0.9204060435295105,
"fineweb_edu_approx": 1.3625327348709106,
"eai_general_math": 0.00884240958839655,
"eai_open_web_math": 0.15250766277313232,
"eai_web_code": 0.0015496599953621626
}
}
|
{
"free_decimal_correspondence": {
"primary": {
"code": "005.74",
"labels": {
"level_1": "General works, books and libraries, information sciences",
"level_2": "",
"level_3": "Computer programming"
}
},
"secondary": {
"code": "004.0285",
"labels": {
"level_1": "General works, books and libraries, information sciences",
"level_2": "",
"level_3": "Computers and Computer science"
}
}
},
"bloom_cognitive_process": {
"primary": {
"code": "3",
"label": "Apply"
},
"secondary": {
"code": "2",
"label": "Understand"
}
},
"bloom_knowledge_domain": {
"primary": {
"code": "3",
"label": "Procedural"
},
"secondary": {
"code": "2",
"label": "Conceptual"
}
},
"document_type_v1": {
"primary": {
"code": "5",
"label": "Social/Forum"
},
"secondary": {
"code": "3",
"label": "Reference/Encyclopedic/Educational"
}
},
"extraction_artifacts": {
"primary": {
"code": "0",
"label": "No Artifacts"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"missing_content": {
"primary": {
"code": "0",
"label": "No missing content"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"document_type_v2": {
"primary": {
"code": "18",
"label": "Q&A Forum"
},
"secondary": {
"code": "8",
"label": "Documentation"
}
},
"reasoning_depth": {
"primary": {
"code": "3",
"label": "Intermediate Reasoning"
},
"secondary": {
"code": "2",
"label": "Basic Reasoning"
}
},
"technical_correctness": {
"primary": {
"code": "3",
"label": "Mostly Correct"
},
"secondary": {
"code": "4",
"label": "Highly Correct"
}
},
"education_level": {
"primary": {
"code": "3",
"label": "Undergraduate Level"
},
"secondary": {
"code": "4",
"label": "Graduate/Expert Level"
}
}
}
|
672f1e42c33a7f9846924a2431ea77df
|
-3,900,136,449,131,686,400 |
Become a MacRumors Supporter for $50/year with no ads, ability to filter front page stories, and private forums.
rich2k4
macrumors regular
Original poster
Apr 15, 2009
110
0
i installed it because i thought i needed it, but it turns out i don't, and i don't want it on my system. anyway to get rid of it?
SilentPanda
Moderator emeritus
Oct 8, 2002
9,992
31
The Bamboo Forest
You might be able to uninstall it by putting in the Snow Leopard disc and running the Additional Packages.pkg (or whatever it is).
It only takes like 3 MB on your disc though so I don't know that there is too much reason to remove it.
rich2k4
macrumors regular
Original poster
Apr 15, 2009
110
0
i tried that, it doesn't let me uninstall.
i'm just worried it might somehow slow down my system
zenoran
macrumors regular
Aug 19, 2009
111
0
i tried that, it doesn't let me uninstall.
i'm just worried it might somehow slow down my system
supposedly it only runs when it's needed and there is no trace otherwise. disk space is the only drawback of having it installed.
mcmanus7
macrumors 6502a
Oct 30, 2008
708
87
as mentioned above Rosetta is only a 2-3 mb install.... and only runs when it is needed therefore it really has no impact on your computer unless you REALLY need that 2-3 mb back...
TheSpaz
macrumors 604
Jun 20, 2005
7,032
1
as mentioned above Rosetta is only a 2-3 mb install.... and only runs when it is needed therefore it really has no impact on your computer unless you REALLY need that 2-3 mb back...
Hahahahaha!
The only reason I refuse to install Rosetta is because I'm trying to train myself not to use old PPC apps. If I try to open a PPC app (like Iconographer for example) and it wants me to install Rosetta, I just abandon that idea and try to find an intel app that does the same thing.
maflynn
macrumors Haswell
May 3, 2009
73,145
42,870
Hahahahaha!
The only reason I refuse to install Rosetta is because I'm trying to train myself not to use old PPC apps. If I try to open a PPC app (like Iconographer for example) and it wants me to install Rosetta, I just abandon that idea and try to find an intel app that does the same thing.
That doesn't work when there's no other apps or ways to use something. For instance, some drivers require it and w/o your scanner or printer won't work :(
TheSpaz
macrumors 604
Jun 20, 2005
7,032
1
That doesn't work when there's no other apps or ways to use something. For instance, some drivers require it and w/o your scanner or printer won't work :(
True. Fortunately, I don't have that problem, but everyone's needs are different right?
rdowns
macrumors Penryn
Jul 11, 2003
27,397
12,518
I didn't install it and the MS Office installer needed it. Not like I'm going to obsess the drive space.
Amdahl
macrumors 65816
Jul 28, 2004
1,438
1
Hahahahaha!
The only reason I refuse to install Rosetta is because I'm trying to train myself not to use old PPC apps. If I try to open a PPC app (like Iconographer for example) and it wants me to install Rosetta, I just abandon that idea and try to find an intel app that does the same thing.
I'm curious... What do you see if open Terminal and do
Code:
ls -l /private/var/db/dyld
Rainier42
macrumors member
Aug 21, 2009
69
0
There is an application/utility called Monolingual (http://monolingual.sourceforge.net/) that allows you to delete all languages from your machine that you feel you don't need. Under the third tab, labeled Architectures, there are entries for removing PPC code. Just be careful ... if you remove something that is needed, you may have to reload your OS.
rich2k4
macrumors regular
Original poster
Apr 15, 2009
110
0
so there is absolutely no way of uninstalling rosetta if i don't want it at all
DOUGHNUT
macrumors regular
Jan 8, 2006
244
11
try this,
go to finder, press command-f to bring up spotlight,
under the left drop down box, select other and select system files (meaning, spotlight will include system files when searching),
right drop down box select "are included"
select File Name on the top spotlight bar.
spotlight search "rosetta" and delete the files. i don't know if you're gonna break anything since you're tinkering with system files, so i personally wouldn't try it...but if it really bothers you, you have no other choice.
calderone
Cancelled
Aug 28, 2009
3,743
352
In all seriousness, it isn't a huge deal. It will not slow you down just by being there. Just avoid PPC apps. But here you go. Rosetta is in:
Code:
/usr/libexec/oah/
This is what the bom from the Rosetta package reveals.
I am also curious to know what the result of:
Code:
ls -l /private/var/db/dyld
For those who did not install Rosetta. Since the bom didn't include paths to there, I am guessing these:
Code:
dyld_shared_cache_rosetta
dyld_shared_cache_rosetta.map
Come from somewhere else during installation, and are probably installed by default.
There is an application/utility called Monolingual (http://monolingual.sourceforge.net/) that allows you to delete all languages from your machine that you feel you don't need. Under the third tab, labeled Architectures, there are entries for removing PPC code. Just be careful ... if you remove something that is needed, you may have to reload your OS.
This removes PPC code from applications, it does not remove the actual translator, i.e. Rosetta.
xraydoc
macrumors demi-god
Oct 9, 2005
10,297
4,610
192.168.1.1
The only reason I refuse to install Rosetta is because I'm trying to train myself not to use old PPC apps. If I try to open a PPC app (like Iconographer for example) and it wants me to install Rosetta, I just abandon that idea and try to find an intel app that does the same thing.
Ditto. Though if I end up needing it at some point I'm definitely not going to obsess about it.
sidewinder
macrumors 68020
Dec 10, 2008
2,425
130
Northern California
I am also curious to know what the result of:
Code:
ls -l /private/var/db/dyld
Code:
$ ls -l /private/var/db/dyld
total 1166312
-rw-r--r-- 1 root wheel 199147520 Aug 28 14:04 dyld_shared_cache_i386
-rw-r--r-- 1 root wheel 49274 Aug 28 14:04 dyld_shared_cache_i386.map
-rw-r--r-- 1 root admin 200429568 Aug 31 22:02 dyld_shared_cache_rosetta
-rw-r--r-- 1 root admin 41832 Aug 31 22:02 dyld_shared_cache_rosetta.map
-rw-r--r-- 1 root wheel 197427200 Aug 28 14:04 dyld_shared_cache_x86_64
-rw-r--r-- 1 root wheel 48528 Aug 28 14:04 dyld_shared_cache_x86_64.map
drwxr-xr-x 8 root wheel 272 Jul 14 01:58 shared_region_roots
S-
Ramashalanka
macrumors regular
Dec 26, 2008
125
81
Lanka Ravi Shanka
I am also curious to know what the result of:
Code:
ls -l /private/var/db/dyld
For those who did not install Rosetta.
Code:
-rw-r--r-- 1 root wheel 199155712 1 Sep 17:58 dyld_shared_cache_i386
-rw-r--r-- 1 root wheel 49274 1 Sep 17:58 dyld_shared_cache_i386.map
-rw-r--r-- 1 root wheel 197373952 1 Sep 17:58 dyld_shared_cache_x86_64
-rw-r--r-- 1 root wheel 48528 1 Sep 17:58 dyld_shared_cache_x86_64.map
drwxr-xr-x 8 root wheel 272 14 Jul 20:58 shared_region_roots
Amdahl
macrumors 65816
Jul 28, 2004
1,438
1
Ramashalanka, how about this one:
Code:
file /System/Library/Frameworks/Foundation.framework/Versions/Current/Foundation
Ramashalanka
macrumors regular
Dec 26, 2008
125
81
Lanka Ravi Shanka
Ramashalanka, how about this one:
Code:
file /System/Library/Frameworks/Foundation.framework/Versions/Current/Foundation
This is the size of the file that's there, is that what you were asking for? I don't have a machine with Rosetta to see if it's any bigger with that installed.
Code:
lrwxr-xr-x 1 root wheel 28 1 Sep 17:50 CodeResources -> _CodeSignature/CodeResources
-rwxr-xr-x 1 root wheel 11760720 17 Jul 17:27 Foundation
drwxr-xr-x 128 root wheel 4352 17 Jul 17:26 Headers
drwxr-xr-x 27 root wheel 918 1 Sep 17:51 Resources
drwxr-xr-x 3 root wheel 102 17 Jul 17:27 _CodeSignature
Amdahl
macrumors 65816
Jul 28, 2004
1,438
1
This is the size of the file that's there, is that what you were asking for? I don't have a machine with Rosetta to see if it's any bigger with that installed.
Code:
lrwxr-xr-x 1 root wheel 28 1 Sep 17:50 CodeResources -> _CodeSignature/CodeResources
-rwxr-xr-x 1 root wheel 11760720 17 Jul 17:27 Foundation
drwxr-xr-x 128 root wheel 4352 17 Jul 17:26 Headers
drwxr-xr-x 27 root wheel 918 1 Sep 17:51 Resources
drwxr-xr-x 3 root wheel 102 17 Jul 17:27 _CodeSignature
Well, I have Rosetta (10.5), and mine is 18159328 supporting four architectures (AMD64, x86, ppc, ppc64)
So, that likely means that being able to run PowerPC code takes only 2.8MB, and doesn't actually put any PPC code in your system. People who dislike Rosetta are irrational.
If you can run the file command, that would help. I want to see what is in it. I don't think installing Rosetta has any effect, since Rosetta is only 2.8MB. The question was whether Snow Leopard still included PPC code in the libraries, which it appears it does not. But PPC was only included in the libraries so that PPC machines could boot and run, not so Rosetta would run.
Ramashalanka
macrumors regular
Dec 26, 2008
125
81
Lanka Ravi Shanka
If you can run the file command, that would help.
Interestingly, there is some ppc in there:
Code:
$ file Foundation
Foundation: Mach-O universal binary with 3 architectures
Foundation (for architecture x86_64): Mach-O 64-bit dynamically linked shared library x86_64
Foundation (for architecture i386): Mach-O dynamically linked shared library i386
Foundation (for architecture ppc7400): Mach-O dynamically linked shared library ppc
I'll probably install Rosetta eventually, I just don't need any PPC software at the moment.
Neotyguy40
macrumors regular
Jul 15, 2009
152
0
I only needed rosetta for an installer. And now I don't need it anymore.
Anyone know how I can uninstall it? I know it doesn't do much, but I still want to uninstall it.
Amdahl
macrumors 65816
Jul 28, 2004
1,438
1
I only needed rosetta for an installer. And now I don't need it anymore.
Anyone know how I can uninstall it? I know it doesn't do much, but I still want to uninstall it.
Try an Erase & Install. And use candles too. They help.
Register on MacRumors! This sidebar will go away, and you'll see fewer ads.
|
{
"url": "https://forums.macrumors.com/threads/is-there-anyway-to-uninstall-rosetta.778254/",
"source_domain": "forums.macrumors.com",
"snapshot_id": "CC-MAIN-2023-40",
"warc_metadata": {
"Content-Length": "265555",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:2ZQM5WWE7EJMSVQ3ZJI5DAYTRLGSZ2ZV",
"WARC-Concurrent-To": "<urn:uuid:ac71265d-c03d-447b-8492-f1c24bc158d3>",
"WARC-Date": "2023-09-26T22:22:23Z",
"WARC-IP-Address": "172.67.22.130",
"WARC-Identified-Payload-Type": "text/html",
"WARC-Payload-Digest": "sha1:P3UDQ7MKLFWQXFKGOOHO3JRGTXZ5Y3P5",
"WARC-Record-ID": "<urn:uuid:2facde21-a5f6-41e4-bce6-52b3e156cdbd>",
"WARC-Target-URI": "https://forums.macrumors.com/threads/is-there-anyway-to-uninstall-rosetta.778254/",
"WARC-Truncated": null,
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:fffea213-6cdc-4289-bca7-829a0393b328>"
},
"warc_info": "isPartOf: CC-MAIN-2023-40\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for September/October 2023\r\noperator: Common Crawl Admin ([email protected])\r\nhostname: ip-10-67-67-67\r\nsoftware: Apache Nutch 1.19 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.5-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: https://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/"
}
|
{
"line_start_idx": [
0,
113,
114,
122,
123,
141,
157,
170,
174,
176,
307,
309,
310,
322,
323,
342,
354,
360,
363,
381,
512,
513,
617,
619,
620,
628,
629,
647,
663,
676,
680,
682,
725,
726,
780,
782,
783,
791,
792,
810,
823,
827,
829,
872,
873,
927,
928,
1058,
1060,
1061,
1070,
1071,
1087,
1100,
1104,
1107,
1289,
1291,
1292,
1300,
1301,
1315,
1328,
1334,
1336,
1518,
1519,
1531,
1532,
1814,
1816,
1817,
1825,
1826,
1844,
1856,
1863,
1870,
1882,
1883,
2165,
2166,
2321,
2323,
2324,
2332,
2333,
2347,
2360,
2366,
2368,
2523,
2524,
2612,
2614,
2615,
2622,
2623,
2640,
2653,
2660,
2667,
2772,
2774,
2775,
2782,
2783,
2799,
2812,
2818,
2820,
2832,
2833,
3115,
3116,
3171,
3177,
3204,
3206,
3207,
3217,
3218,
3235,
3248,
3251,
3253,
3607,
3609,
3610,
3618,
3619,
3637,
3653,
3666,
3670,
3672,
3752,
3754,
3755,
3764,
3765,
3783,
3795,
3799,
3802,
3812,
3865,
3995,
4037,
4080,
4081,
4306,
4308,
4309,
4319,
4320,
4330,
4343,
4349,
4353,
4495,
4496,
4502,
4520,
4575,
4576,
4622,
4623,
4629,
4656,
4657,
4762,
4763,
4769,
4795,
4825,
4826,
4911,
4912,
5266,
5267,
5364,
5366,
5367,
5375,
5376,
5395,
5407,
5414,
5420,
5432,
5714,
5715,
5811,
5813,
5814,
5825,
5826,
5842,
5855,
5861,
5865,
5885,
5931,
5932,
5938,
5965,
5966,
5972,
6001,
6015,
6088,
6165,
6241,
6321,
6396,
6475,
6545,
6546,
6549,
6551,
6552,
6565,
6566,
6584,
6597,
6601,
6604,
6622,
6668,
6669,
6675,
6702,
6703,
6742,
6743,
6749,
6822,
6899,
6974,
7053,
7123,
7125,
7126,
7133,
7134,
7150,
7163,
7169,
7171,
7205,
7206,
7212,
7293,
7295,
7296,
7309,
7310,
7328,
7341,
7345,
7348,
7366,
7400,
7401,
7407,
7488,
7489,
7649,
7650,
7656,
7753,
7815,
7874,
7935,
8001,
8003,
8004,
8011,
8012,
8028,
8041,
8047,
8049,
8209,
8210,
8216,
8313,
8375,
8434,
8495,
8561,
8562,
8667,
8668,
8841,
8842,
9219,
9221,
9222,
9235,
9236,
9254,
9267,
9271,
9274,
9292,
9342,
9343,
9386,
9387,
9393,
9411,
9468,
9561,
9643,
9727,
9728,
9820,
9822,
9823,
9834,
9835,
9853,
9866,
9870,
9872,
9945,
9946,
10043,
10045,
10046,
10053,
10054,
10070,
10083,
10089,
10091,
10164,
10165,
10262,
10263,
10319,
10321
],
"line_end_idx": [
113,
114,
122,
123,
141,
157,
170,
174,
176,
307,
309,
310,
322,
323,
342,
354,
360,
363,
381,
512,
513,
617,
619,
620,
628,
629,
647,
663,
676,
680,
682,
725,
726,
780,
782,
783,
791,
792,
810,
823,
827,
829,
872,
873,
927,
928,
1058,
1060,
1061,
1070,
1071,
1087,
1100,
1104,
1107,
1289,
1291,
1292,
1300,
1301,
1315,
1328,
1334,
1336,
1518,
1519,
1531,
1532,
1814,
1816,
1817,
1825,
1826,
1844,
1856,
1863,
1870,
1882,
1883,
2165,
2166,
2321,
2323,
2324,
2332,
2333,
2347,
2360,
2366,
2368,
2523,
2524,
2612,
2614,
2615,
2622,
2623,
2640,
2653,
2660,
2667,
2772,
2774,
2775,
2782,
2783,
2799,
2812,
2818,
2820,
2832,
2833,
3115,
3116,
3171,
3177,
3204,
3206,
3207,
3217,
3218,
3235,
3248,
3251,
3253,
3607,
3609,
3610,
3618,
3619,
3637,
3653,
3666,
3670,
3672,
3752,
3754,
3755,
3764,
3765,
3783,
3795,
3799,
3802,
3812,
3865,
3995,
4037,
4080,
4081,
4306,
4308,
4309,
4319,
4320,
4330,
4343,
4349,
4353,
4495,
4496,
4502,
4520,
4575,
4576,
4622,
4623,
4629,
4656,
4657,
4762,
4763,
4769,
4795,
4825,
4826,
4911,
4912,
5266,
5267,
5364,
5366,
5367,
5375,
5376,
5395,
5407,
5414,
5420,
5432,
5714,
5715,
5811,
5813,
5814,
5825,
5826,
5842,
5855,
5861,
5865,
5885,
5931,
5932,
5938,
5965,
5966,
5972,
6001,
6015,
6088,
6165,
6241,
6321,
6396,
6475,
6545,
6546,
6549,
6551,
6552,
6565,
6566,
6584,
6597,
6601,
6604,
6622,
6668,
6669,
6675,
6702,
6703,
6742,
6743,
6749,
6822,
6899,
6974,
7053,
7123,
7125,
7126,
7133,
7134,
7150,
7163,
7169,
7171,
7205,
7206,
7212,
7293,
7295,
7296,
7309,
7310,
7328,
7341,
7345,
7348,
7366,
7400,
7401,
7407,
7488,
7489,
7649,
7650,
7656,
7753,
7815,
7874,
7935,
8001,
8003,
8004,
8011,
8012,
8028,
8041,
8047,
8049,
8209,
8210,
8216,
8313,
8375,
8434,
8495,
8561,
8562,
8667,
8668,
8841,
8842,
9219,
9221,
9222,
9235,
9236,
9254,
9267,
9271,
9274,
9292,
9342,
9343,
9386,
9387,
9393,
9411,
9468,
9561,
9643,
9727,
9728,
9820,
9822,
9823,
9834,
9835,
9853,
9866,
9870,
9872,
9945,
9946,
10043,
10045,
10046,
10053,
10054,
10070,
10083,
10089,
10091,
10164,
10165,
10262,
10263,
10319,
10321,
10396
]
}
|
{
"red_pajama_v2": {
"ccnet_original_length": 10396,
"ccnet_original_nlines": 343,
"rps_doc_curly_bracket": 0,
"rps_doc_ldnoobw_words": 0,
"rps_doc_lorem_ipsum": 0,
"rps_doc_stop_word_fraction": 0.33162394165992737,
"rps_doc_ut1_blacklist": 0,
"rps_doc_frac_all_caps_words": 0.03247863054275513,
"rps_doc_frac_lines_end_with_ellipsis": 0.005813950207084417,
"rps_doc_frac_no_alph_words": 0.2974359095096588,
"rps_doc_frac_unique_words": 0.28030750155448914,
"rps_doc_mean_word_length": 4.642223358154297,
"rps_doc_num_sentences": 101,
"rps_doc_symbol_to_word_ratio": 0.0034187999553978443,
"rps_doc_unigram_entropy": 5.551486492156982,
"rps_doc_word_count": 1691,
"rps_doc_frac_chars_dupe_10grams": 0.47707006335258484,
"rps_doc_frac_chars_dupe_5grams": 0.5685350298881531,
"rps_doc_frac_chars_dupe_6grams": 0.559617817401886,
"rps_doc_frac_chars_dupe_7grams": 0.5287898182868958,
"rps_doc_frac_chars_dupe_8grams": 0.5287898182868958,
"rps_doc_frac_chars_dupe_9grams": 0.47707006335258484,
"rps_doc_frac_chars_top_2gram": 0.02292994037270546,
"rps_doc_frac_chars_top_3gram": 0.015286619774997234,
"rps_doc_frac_chars_top_4gram": 0.014267520047724247,
"rps_doc_books_importance": -1226.6314697265625,
"rps_doc_books_importance_length_correction": -1226.6314697265625,
"rps_doc_openwebtext_importance": -735.3621215820312,
"rps_doc_openwebtext_importance_length_correction": -735.3621215820312,
"rps_doc_wikipedia_importance": -541.266845703125,
"rps_doc_wikipedia_importance_length_correction": -541.266845703125
},
"fasttext": {
"dclm": 0.05387448891997337,
"english": 0.9103370308876038,
"fineweb_edu_approx": 1.4078774452209473,
"eai_general_math": 0.3046015501022339,
"eai_open_web_math": 0.3251487612724304,
"eai_web_code": 0.29037362337112427
}
}
|
{
"free_decimal_correspondence": {
"primary": {
"code": "004.16",
"labels": {
"level_1": "General works, books and libraries, information sciences",
"level_2": "",
"level_3": "Computers and Computer science"
}
},
"secondary": {
"code": "005.456",
"labels": {
"level_1": "General works, books and libraries, information sciences",
"level_2": "",
"level_3": "Computer programming"
}
}
},
"bloom_cognitive_process": {
"primary": {
"code": "2",
"label": "Understand"
},
"secondary": {
"code": "3",
"label": "Apply"
}
},
"bloom_knowledge_domain": {
"primary": {
"code": "2",
"label": "Conceptual"
},
"secondary": {
"code": "3",
"label": "Procedural"
}
},
"document_type_v1": {
"primary": {
"code": "5",
"label": "Social/Forum"
},
"secondary": {
"code": "3",
"label": "Reference/Encyclopedic/Educational"
}
},
"extraction_artifacts": {
"primary": {
"code": "3",
"label": "Irrelevant Content"
},
"secondary": {
"code": "0",
"label": "No Artifacts"
}
},
"missing_content": {
"primary": {
"code": "0",
"label": "No missing content"
},
"secondary": {
"code": "2",
"label": "Click Here References"
}
},
"document_type_v2": {
"primary": {
"code": "18",
"label": "Q&A Forum"
},
"secondary": {
"code": "8",
"label": "Documentation"
}
},
"reasoning_depth": {
"primary": {
"code": "2",
"label": "Basic Reasoning"
},
"secondary": {
"code": "3",
"label": "Intermediate Reasoning"
}
},
"technical_correctness": {
"primary": {
"code": "3",
"label": "Mostly Correct"
},
"secondary": {
"code": "4",
"label": "Highly Correct"
}
},
"education_level": {
"primary": {
"code": "2",
"label": "High School Level"
},
"secondary": {
"code": "3",
"label": "Undergraduate Level"
}
}
}
|
672f1e42c33a7f9846924a2431ea77df
|
3,863,854,890,768,305,700 |
[Last Call] Learn how to a build a cloud-first strategyRegister Now
x
?
Solved
Get Info from certain database from SQL Server.
Posted on 2001-08-08
13
Medium Priority
?
226 Views
Last Modified: 2008-02-01
Is there any VB application with source code that allow
user to login into SQL Server, then pull all the table
name(include all the fields for each table), stored procedures that are associated with the login user ?
0
Comment
Question by:superCombo2001
• 5
• 5
• 3
13 Comments
LVL 43
Expert Comment
by:TimCottee
ID: 6363854
You are asking for a lot there, lets take it apart a little:
There are three ways (at least) to get the columns/tables from a database:
1) ADO using Connection.OpenSchema
2) ADOX using catalog and tables/columns collections
3) SQL-DMO
Of the three, 1) is the easiest and quickest to implement and 3) is the most powerful.
The SQL-DMO object library allows effectively the same level of control and access that SQL enterprise manager does. This means that not only can you natively access the tables and columns, you can also access the stored procedures/logins/users etc in the database.
If you wish to go down one of these routes, let me know and I will see if I can give you some appropriate examples.
0
LVL 11
Expert Comment
by:Nitin Sontakke
ID: 6363855
I don't know any readymade code. But it is fairly easy to write your own using "Microsoft SQLDMO Object Library".
0
Author Comment
by:superCombo2001
ID: 6364355
I will want to use SQL-DMO.
I know I asked a lot, but I will increase points soon.
Thanks !
0
What does it mean to be "Always On"?
Is your cloud always on? With an Always On cloud you won't have to worry about downtime for maintenance or software application code updates, ensuring that your bottom line isn't affected.
LVL 43
Accepted Solution
by:
TimCottee earned 280 total points
ID: 6364473
Here is a starter on SQL-DMO, add a reference to it in the project;
Private Sub Command2_Click()
Dim srvSQL As SQLDMO.SQLServer
Set srvSQL = New SQLDMO.SQLServer
Dim tblTable As Table
Dim clmColumn As Column
Dim stpProcedure As StoredProcedure
Dim upmUserPermissions As SQLObjectList
srvSQL.Name = "MySQLServerName"
srvSQL.Connect
For Each tblTable In srvSQL.Databases("QCDataCollect").Tables
For Each clmColumn In tblTable.Columns
strMessage = ""
strMessage = strMessage & "Allow Nulls = " & clmColumn.AllowNulls & vbLf
strMessage = strMessage & "AnsiPaddingStatus = " & clmColumn.AnsiPaddingStatus & vbLf
strMessage = strMessage & "ComputedText = " & clmColumn.ComputedText & vbLf
strMessage = strMessage & "Datatype = " & clmColumn.Datatype & vbLf
strMessage = strMessage & "Default = " & clmColumn.Default & vbLf
strMessage = strMessage & "DefaultOwner = " & clmColumn.DefaultOwner & vbLf
strMessage = strMessage & "FullTextIndex = " & clmColumn.FullTextIndex & vbLf
strMessage = strMessage & "I = " & clmColumn.ID & vbLf
strMessage = strMessage & "Identity = " & clmColumn.Identity & vbLf
strMessage = strMessage & "IdentityIncrement = " & clmColumn.IdentityIncrement & vbLf
strMessage = strMessage & "IdentitySeed = " & clmColumn.IdentitySeed & vbLf
strMessage = strMessage & "InPrimaryKey = " & clmColumn.InPrimaryKey & vbLf
strMessage = strMessage & "IsComputed = " & clmColumn.IsComputed & vbLf
strMessage = strMessage & "IsRowGuidCol = " & clmColumn.IsRowGuidCol & vbLf
strMessage = strMessage & "Length = " & clmColumn.Length & vbLf
strMessage = strMessage & "Name = " & clmColumn.Name & vbLf
strMessage = strMessage & "NotForRepl = " & clmColumn.NotForRepl & vbLf
strMessage = strMessage & "NumericPrecision = " & clmColumn.NumericPrecision & vbLf
strMessage = strMessage & "NumericScale = " & clmColumn.NumericScale & vbLf
strMessage = strMessage & "PhysicalDatatype = " & clmColumn.PhysicalDatatype & vbLf
strMessage = strMessage & "TypeOf = " & clmColumn.TypeOf & vbLf
strMessage = strMessage & "UserData = " & clmColumn.UserData
MsgBox strMessage
Next
Next
srvSQL.Disconnect
Set srvSQL = Nothing
End Sub
0
Author Comment
by:superCombo2001
ID: 6365062
Where to find SQL DMO ? What dir ?
0
LVL 43
Expert Comment
by:TimCottee
ID: 6365070
If you have SQL server 7 Client installed on your development machine, you should be able to go to the project menu in VB and choose references, Microsoft SQLDMO Object Library should be there in the list, simply check it and ok. If you don't have it but have SQLOLE instead, this may work but was designed for SQL 6.5 rather than 7 and may not have all the features implemented in the same way.
0
Author Comment
by:superCombo2001
ID: 6365082
I can see MS SQLDMO library in the reference box.
When I checked it, and hit ok, the vb told me that
the library is missing.
What is the full name of that library ?
0
LVL 43
Expert Comment
by:TimCottee
ID: 6365097
Ok, on my install it is in c:\mssql7\binn\resources\1033\sqldmo.rll
0
LVL 11
Expert Comment
by:Nitin Sontakke
ID: 6365105
On my machine:
C:\Program Files\Microsoft SQL Server\80\Tools\Binn\sqldmo.dll
0
LVL 11
Expert Comment
by:Nitin Sontakke
ID: 6365109
Mine is SQL Server 2K.
0
Author Comment
by:superCombo2001
ID: 6365147
Give me sometime to evaluate the code.
0
LVL 43
Expert Comment
by:TimCottee
ID: 6367080
No problem, if you have any more questions just ask and I will do my best to help.
0
Author Comment
by:superCombo2001
ID: 6388696
TimCottee,
Where can I get books or URL resources for more implementation detail on SQLDMO ?
0
Featured Post
Concerto's Cloud Advisory Services
Want to avoid the missteps to gaining all the benefits of the cloud? Learn more about the different assessment options from our Cloud Advisory team.
Question has a verified solution.
If you are experiencing a similar issue, please ask a related question
Article by: Martin
Here are a few simple, working, games that you can use as-is or as the basis for your own games. Tic-Tac-Toe This is one of the simplest of all games. The game allows for a choice of who goes first and keeps track of the number of wins for…
This article describes how to use a set of graphical playing cards to create a Draw Poker game in Excel or VB6.
As developers, we are not limited to the functions provided by the VBA language. In addition, we can call the functions that are part of the Windows operating system. These functions are part of the Windows API (Application Programming Interface). U…
Get people started with the utilization of class modules. Class modules can be a powerful tool in Microsoft Access. They allow you to create self-contained objects that encapsulate functionality. They can easily hide the complexity of a process from…
Suggested Courses
Course of the Month18 days, 10 hours left to enroll
834 members asked questions and received personalized solutions in the past 7 days.
Join the community of 500,000 technology professionals and ask your questions.
Join & Ask a Question
|
{
"url": "https://www.experts-exchange.com/questions/20165179/Get-Info-from-certain-database-from-SQL-Server.html",
"source_domain": "www.experts-exchange.com",
"snapshot_id": "crawl=CC-MAIN-2017-51",
"warc_metadata": {
"Content-Length": "228693",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:MXOLJ2ER6V3IXVBKJZF3MBYFK3UBITNW",
"WARC-Concurrent-To": "<urn:uuid:f18f9ee9-e5d3-4df8-8dc6-b9db81414d2e>",
"WARC-Date": "2017-12-13T21:35:31Z",
"WARC-IP-Address": "104.20.169.10",
"WARC-Identified-Payload-Type": "text/html",
"WARC-Payload-Digest": "sha1:LPP2W2YXQWNS6XUBI67UWY257DQNUSKM",
"WARC-Record-ID": "<urn:uuid:95b4dc96-fb1f-4dd2-ad20-a6c6b366d46f>",
"WARC-Target-URI": "https://www.experts-exchange.com/questions/20165179/Get-Info-from-certain-database-from-SQL-Server.html",
"WARC-Truncated": "length",
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:5c7609c0-eac6-4532-ab98-c9b95d46aa74>"
},
"warc_info": "robots: classic\r\nhostname: ip-10-151-110-145.ec2.internal\r\nsoftware: Nutch 1.6 (CC)\r\nisPartOf: CC-MAIN-2017-51\r\noperator: Common Crawl Admin\r\ndescription: Wide crawl of the web for December 2017\r\npublisher: Common Crawl\r\nformat: WARC File Format 1.0\r\nconformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf"
}
|
{
"line_start_idx": [
0,
68,
69,
71,
73,
80,
81,
129,
130,
151,
154,
170,
172,
182,
208,
264,
319,
424,
426,
434,
461,
467,
473,
479,
491,
493,
500,
501,
516,
517,
530,
542,
603,
604,
679,
680,
715,
768,
779,
780,
867,
868,
1134,
1135,
1251,
1253,
1255,
1262,
1263,
1278,
1279,
1297,
1309,
1423,
1424,
1426,
1428,
1429,
1444,
1445,
1463,
1475,
1503,
1558,
1567,
1569,
1606,
1607,
1796,
1797,
1799,
1806,
1807,
1825,
1826,
1830,
1864,
1876,
1944,
1945,
1974,
2009,
2047,
2073,
2101,
2141,
2185,
2221,
2240,
2306,
2353,
2381,
2466,
2564,
2652,
2732,
2810,
2898,
2988,
3055,
3135,
3233,
3321,
3409,
3493,
3581,
3657,
3729,
3813,
3909,
3997,
4093,
4169,
4242,
4272,
4285,
4294,
4316,
4341,
4349,
4351,
4353,
4354,
4369,
4370,
4388,
4400,
4435,
4437,
4439,
4446,
4447,
4462,
4463,
4476,
4488,
4884,
4886,
4888,
4889,
4904,
4905,
4923,
4935,
4985,
5036,
5060,
5061,
5101,
5103,
5105,
5112,
5113,
5128,
5129,
5142,
5154,
5222,
5224,
5226,
5233,
5234,
5249,
5250,
5268,
5280,
5295,
5358,
5360,
5362,
5369,
5370,
5385,
5386,
5404,
5416,
5439,
5441,
5443,
5444,
5459,
5460,
5478,
5490,
5529,
5531,
5533,
5540,
5541,
5556,
5557,
5570,
5582,
5665,
5667,
5669,
5670,
5685,
5686,
5704,
5716,
5727,
5728,
5810,
5812,
5813,
5827,
5828,
5863,
5864,
6013,
6014,
6048,
6049,
6120,
6121,
6140,
6383,
6495,
6746,
6997,
7015,
7067,
7068,
7152,
7153,
7232,
7233
],
"line_end_idx": [
68,
69,
71,
73,
80,
81,
129,
130,
151,
154,
170,
172,
182,
208,
264,
319,
424,
426,
434,
461,
467,
473,
479,
491,
493,
500,
501,
516,
517,
530,
542,
603,
604,
679,
680,
715,
768,
779,
780,
867,
868,
1134,
1135,
1251,
1253,
1255,
1262,
1263,
1278,
1279,
1297,
1309,
1423,
1424,
1426,
1428,
1429,
1444,
1445,
1463,
1475,
1503,
1558,
1567,
1569,
1606,
1607,
1796,
1797,
1799,
1806,
1807,
1825,
1826,
1830,
1864,
1876,
1944,
1945,
1974,
2009,
2047,
2073,
2101,
2141,
2185,
2221,
2240,
2306,
2353,
2381,
2466,
2564,
2652,
2732,
2810,
2898,
2988,
3055,
3135,
3233,
3321,
3409,
3493,
3581,
3657,
3729,
3813,
3909,
3997,
4093,
4169,
4242,
4272,
4285,
4294,
4316,
4341,
4349,
4351,
4353,
4354,
4369,
4370,
4388,
4400,
4435,
4437,
4439,
4446,
4447,
4462,
4463,
4476,
4488,
4884,
4886,
4888,
4889,
4904,
4905,
4923,
4935,
4985,
5036,
5060,
5061,
5101,
5103,
5105,
5112,
5113,
5128,
5129,
5142,
5154,
5222,
5224,
5226,
5233,
5234,
5249,
5250,
5268,
5280,
5295,
5358,
5360,
5362,
5369,
5370,
5385,
5386,
5404,
5416,
5439,
5441,
5443,
5444,
5459,
5460,
5478,
5490,
5529,
5531,
5533,
5540,
5541,
5556,
5557,
5570,
5582,
5665,
5667,
5669,
5670,
5685,
5686,
5704,
5716,
5727,
5728,
5810,
5812,
5813,
5827,
5828,
5863,
5864,
6013,
6014,
6048,
6049,
6120,
6121,
6140,
6383,
6495,
6746,
6997,
7015,
7067,
7068,
7152,
7153,
7232,
7233,
7254
]
}
|
{
"red_pajama_v2": {
"ccnet_original_length": 7254,
"ccnet_original_nlines": 227,
"rps_doc_curly_bracket": 0,
"rps_doc_ldnoobw_words": 0,
"rps_doc_lorem_ipsum": 0,
"rps_doc_stop_word_fraction": 0.26263344287872314,
"rps_doc_ut1_blacklist": 0,
"rps_doc_frac_all_caps_words": 0.04982205852866173,
"rps_doc_frac_lines_end_with_ellipsis": 0.013157890178263187,
"rps_doc_frac_no_alph_words": 0.29323843121528625,
"rps_doc_frac_unique_words": 0.4483111500740051,
"rps_doc_mean_word_length": 5.469805717468262,
"rps_doc_num_sentences": 76,
"rps_doc_symbol_to_word_ratio": 0.0021352299954742193,
"rps_doc_unigram_entropy": 5.486086368560791,
"rps_doc_word_count": 977,
"rps_doc_frac_chars_dupe_10grams": 0,
"rps_doc_frac_chars_dupe_5grams": 0.08102545142173767,
"rps_doc_frac_chars_dupe_6grams": 0.04397454857826233,
"rps_doc_frac_chars_dupe_7grams": 0.038173649460077286,
"rps_doc_frac_chars_dupe_8grams": 0.020209580659866333,
"rps_doc_frac_chars_dupe_9grams": 0,
"rps_doc_frac_chars_top_2gram": 0.08607783913612366,
"rps_doc_frac_chars_top_3gram": 0.09431137889623642,
"rps_doc_frac_chars_top_4gram": 0.02806885913014412,
"rps_doc_books_importance": -612.336181640625,
"rps_doc_books_importance_length_correction": -612.336181640625,
"rps_doc_openwebtext_importance": -405.38092041015625,
"rps_doc_openwebtext_importance_length_correction": -405.38092041015625,
"rps_doc_wikipedia_importance": -270.8708190917969,
"rps_doc_wikipedia_importance_length_correction": -270.8708190917969
},
"fasttext": {
"dclm": 0.018606599420309067,
"english": 0.7184469699859619,
"fineweb_edu_approx": 2.3974075317382812,
"eai_general_math": 0.00040811000508256257,
"eai_open_web_math": 0.4747247099876404,
"eai_web_code": 0.9692510962486267
}
}
|
{
"free_decimal_correspondence": {
"primary": {
"code": "005.445",
"labels": {
"level_1": "General works, books and libraries, information sciences",
"level_2": "",
"level_3": "Computer programming"
}
},
"secondary": {
"code": "005.75",
"labels": {
"level_1": "General works, books and libraries, information sciences",
"level_2": "",
"level_3": "Computer programming"
}
}
},
"bloom_cognitive_process": {
"primary": {
"code": "3",
"label": "Apply"
},
"secondary": {
"code": "2",
"label": "Understand"
}
},
"bloom_knowledge_domain": {
"primary": {
"code": "3",
"label": "Procedural"
},
"secondary": {
"code": "2",
"label": "Conceptual"
}
},
"document_type_v1": {
"primary": {
"code": "5",
"label": "Social/Forum"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"extraction_artifacts": {
"primary": {
"code": "0",
"label": "No Artifacts"
},
"secondary": {
"code": "3",
"label": "Irrelevant Content"
}
},
"missing_content": {
"primary": {
"code": "0",
"label": "No missing content"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"document_type_v2": {
"primary": {
"code": "18",
"label": "Q&A Forum"
},
"secondary": {
"code": "8",
"label": "Documentation"
}
},
"reasoning_depth": {
"primary": {
"code": "3",
"label": "Intermediate Reasoning"
},
"secondary": {
"code": "2",
"label": "Basic Reasoning"
}
},
"technical_correctness": {
"primary": {
"code": "4",
"label": "Highly Correct"
},
"secondary": {
"code": "3",
"label": "Mostly Correct"
}
},
"education_level": {
"primary": {
"code": "3",
"label": "Undergraduate Level"
},
"secondary": {
"code": "2",
"label": "High School Level"
}
}
}
|
672f1e42c33a7f9846924a2431ea77df
|
-1,199,311,745,810,438,400 |
text ringtone
Discussion in 'Android Audio and Video' started by dayday11, Nov 9, 2009.
1. dayday11
Offline
dayday11 New Member
Joined:
Nov 5, 2009
Messages:
15
Likes Received:
0
Trophy Points:
0
Location:
Tennessee
I know how to switch ringtones for my text messages but my custom ringtones do no show up as a option. Does anyone know why this would be like this? My phone ringtone is custom. Thanks.
2. New2u
Offline
New2u DF Super Moderator
Joined:
Oct 25, 2009
Messages:
3,630
Likes Received:
15
Trophy Points:
38
Location:
Tallahassee, Fl
3. dayday11
Offline
dayday11 New Member
Joined:
Nov 5, 2009
Messages:
15
Likes Received:
0
Trophy Points:
0
Location:
Tennessee
Thanks for the quick reply and help. I guess I will be making a notification folder on my SD card and hopefully that will work.
4. pope66682
Offline
pope66682 New Member
Joined:
Nov 6, 2009
Messages:
70
Likes Received:
0
Trophy Points:
0
Location:
Boston
How do you add this folder to the SD card?
5. New2u
Offline
New2u DF Super Moderator
Joined:
Oct 25, 2009
Messages:
3,630
Likes Received:
15
Trophy Points:
38
Location:
Tallahassee, Fl
If you sync it with your computer, you can just add a folder when your looking at it from your computer, seeing as you have to sync it anyways to get the mp3's on there, i would imagine this shouldn't be too much of an issue.
6. pope66682
Offline
pope66682 New Member
Joined:
Nov 6, 2009
Messages:
70
Likes Received:
0
Trophy Points:
0
Location:
Boston
That worked. THX
Search tags for this page
android oplus 8.5 set txt msg tone issue
,
droid text ringtone
,
droid text tone
,
droidx needs separate ringtone for text messages
,
how do i load a ring tone from my text message on my droid d
,
how do u make a ringtone for text messave for droid
,
how to add ringtones to droid from text messages
,
how to download ringtones from a text message to droid 4
,
how to get ringtone from my text on a droid
,
how to put your ringtone as your text message ringtone on mo
,
how to retrieve a ringtone from a text on a droid 4
,
how to set ringtone for text message on droid
,
how to use music i received as a text as ring tone on my dro
,
no ringtone for texting on droid mini
,
ringtone
|
{
"url": "http://www.droidforums.net/threads/text-ringtone.1356/",
"source_domain": "www.droidforums.net",
"snapshot_id": "crawl=CC-MAIN-2014-35",
"warc_metadata": {
"Content-Length": "84050",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:ICYB5BCWMKENUGDAG2VDEFXP6DEABAD7",
"WARC-Concurrent-To": "<urn:uuid:d72de7ff-02ce-4dd6-8d1e-acbb27a04a70>",
"WARC-Date": "2014-08-31T00:26:22Z",
"WARC-IP-Address": "206.127.24.60",
"WARC-Identified-Payload-Type": null,
"WARC-Payload-Digest": "sha1:AEQEUVJBESFHNWTOHD7SYILVELH3ML7N",
"WARC-Record-ID": "<urn:uuid:d0b5dc2c-0c71-453e-9859-0e9c3911190d>",
"WARC-Target-URI": "http://www.droidforums.net/threads/text-ringtone.1356/",
"WARC-Truncated": null,
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:fea77b18-08b6-4b66-858a-757a2b2314c5>"
},
"warc_info": "robots: classic\r\nhostname: ip-10-180-136-8.ec2.internal\r\nsoftware: Nutch 1.6 (CC)/CC WarcExport 1.0\r\nisPartOf: CC-MAIN-2014-35\r\noperator: CommonCrawl Admin\r\ndescription: Wide crawl of the web with URLs provided by Blekko for August 2014\r\npublisher: CommonCrawl\r\nformat: WARC File Format 1.0\r\nconformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf"
}
|
{
"line_start_idx": [
0,
14,
15,
89,
90,
104,
116,
117,
141,
142,
154,
170,
184,
191,
211,
217,
236,
242,
256,
270,
460,
471,
483,
484,
513,
514,
526,
543,
557,
567,
587,
594,
613,
620,
634,
654,
668,
680,
681,
705,
706,
718,
734,
748,
755,
775,
781,
800,
806,
820,
834,
966,
981,
993,
994,
1019,
1020,
1032,
1048,
1062,
1069,
1089,
1095,
1114,
1120,
1134,
1145,
1192,
1203,
1215,
1216,
1245,
1246,
1258,
1275,
1289,
1299,
1319,
1326,
1345,
1352,
1366,
1386,
1616,
1631,
1643,
1644,
1669,
1670,
1682,
1698,
1712,
1719,
1739,
1745,
1764,
1770,
1784,
1795,
1816,
1842,
1883,
1885,
1886,
1906,
1907,
1909,
1925,
1927,
1976,
1978,
2039,
2041,
2093,
2095,
2144,
2146,
2203,
2205,
2249,
2251,
2312,
2314,
2366,
2368,
2414,
2416,
2477,
2479,
2517,
2519
],
"line_end_idx": [
14,
15,
89,
90,
104,
116,
117,
141,
142,
154,
170,
184,
191,
211,
217,
236,
242,
256,
270,
460,
471,
483,
484,
513,
514,
526,
543,
557,
567,
587,
594,
613,
620,
634,
654,
668,
680,
681,
705,
706,
718,
734,
748,
755,
775,
781,
800,
806,
820,
834,
966,
981,
993,
994,
1019,
1020,
1032,
1048,
1062,
1069,
1089,
1095,
1114,
1120,
1134,
1145,
1192,
1203,
1215,
1216,
1245,
1246,
1258,
1275,
1289,
1299,
1319,
1326,
1345,
1352,
1366,
1386,
1616,
1631,
1643,
1644,
1669,
1670,
1682,
1698,
1712,
1719,
1739,
1745,
1764,
1770,
1784,
1795,
1816,
1842,
1883,
1885,
1886,
1906,
1907,
1909,
1925,
1927,
1976,
1978,
2039,
2041,
2093,
2095,
2144,
2146,
2203,
2205,
2249,
2251,
2312,
2314,
2366,
2368,
2414,
2416,
2477,
2479,
2517,
2519,
2527
]
}
|
{
"red_pajama_v2": {
"ccnet_original_length": 2527,
"ccnet_original_nlines": 130,
"rps_doc_curly_bracket": 0,
"rps_doc_ldnoobw_words": 0,
"rps_doc_lorem_ipsum": 0,
"rps_doc_stop_word_fraction": 0.29729729890823364,
"rps_doc_ut1_blacklist": 0,
"rps_doc_frac_all_caps_words": 0.016632020473480225,
"rps_doc_frac_lines_end_with_ellipsis": 0,
"rps_doc_frac_no_alph_words": 0.2577962577342987,
"rps_doc_frac_unique_words": 0.36868688464164734,
"rps_doc_mean_word_length": 4.297979831695557,
"rps_doc_num_sentences": 18,
"rps_doc_symbol_to_word_ratio": 0,
"rps_doc_unigram_entropy": 4.610808372497559,
"rps_doc_word_count": 396,
"rps_doc_frac_chars_dupe_10grams": 0.3631022274494171,
"rps_doc_frac_chars_dupe_5grams": 0.3631022274494171,
"rps_doc_frac_chars_dupe_6grams": 0.3631022274494171,
"rps_doc_frac_chars_dupe_7grams": 0.3631022274494171,
"rps_doc_frac_chars_dupe_8grams": 0.3631022274494171,
"rps_doc_frac_chars_dupe_9grams": 0.3631022274494171,
"rps_doc_frac_chars_top_2gram": 0.02350175939500332,
"rps_doc_frac_chars_top_3gram": 0.035252638161182404,
"rps_doc_frac_chars_top_4gram": 0.0423031710088253,
"rps_doc_books_importance": -199.92025756835938,
"rps_doc_books_importance_length_correction": -199.92025756835938,
"rps_doc_openwebtext_importance": -122.42412567138672,
"rps_doc_openwebtext_importance_length_correction": -122.42412567138672,
"rps_doc_wikipedia_importance": -62.73900604248047,
"rps_doc_wikipedia_importance_length_correction": -62.73900604248047
},
"fasttext": {
"dclm": 0.04092901945114136,
"english": 0.8975875973701477,
"fineweb_edu_approx": 1.079982042312622,
"eai_general_math": 0.004985149949789047,
"eai_open_web_math": 0.40217041969299316,
"eai_web_code": -0.000003460000016275444
}
}
|
{
"free_decimal_correspondence": {
"primary": {
"code": "004.164",
"labels": {
"level_1": "General works, books and libraries, information sciences",
"level_2": "",
"level_3": "Computers and Computer science"
}
},
"secondary": {
"code": "621.392",
"labels": {
"level_1": "Industrial arts, Technology, and Engineering",
"level_2": "Engineering",
"level_3": "Mechanical engineering and Machinery"
}
}
},
"bloom_cognitive_process": {
"primary": {
"code": "3",
"label": "Apply"
},
"secondary": {
"code": "2",
"label": "Understand"
}
},
"bloom_knowledge_domain": {
"primary": {
"code": "3",
"label": "Procedural"
},
"secondary": {
"code": "2",
"label": "Conceptual"
}
},
"document_type_v1": {
"primary": {
"code": "5",
"label": "Social/Forum"
},
"secondary": {
"code": "3",
"label": "Reference/Encyclopedic/Educational"
}
},
"extraction_artifacts": {
"primary": {
"code": "3",
"label": "Irrelevant Content"
},
"secondary": {
"code": "0",
"label": "No Artifacts"
}
},
"missing_content": {
"primary": {
"code": "0",
"label": "No missing content"
},
"secondary": {
"code": "2",
"label": "Click Here References"
}
},
"document_type_v2": {
"primary": {
"code": "18",
"label": "Q&A Forum"
},
"secondary": {
"code": "21",
"label": "Customer Support"
}
},
"reasoning_depth": {
"primary": {
"code": "2",
"label": "Basic Reasoning"
},
"secondary": {
"code": "1",
"label": "No Reasoning"
}
},
"technical_correctness": {
"primary": {
"code": "4",
"label": "Highly Correct"
},
"secondary": {
"code": "3",
"label": "Mostly Correct"
}
},
"education_level": {
"primary": {
"code": "1",
"label": "General Audience"
},
"secondary": {
"code": "2",
"label": "High School Level"
}
}
}
|
672f1e42c33a7f9846924a2431ea77df
|
-6,429,217,952,441,285,000 |
Solved thread
This post is marked as solved. If you think the information contained on this thread must be part of the official documentation, please contribute submitting a pull request to its repository.
How do I view a SQL Statement?
I want to view the SQL statement that is about to be executed below :
<?php
//Deleting existing robot
$success = $connection->delete(
"robots",
"id = 101"
);
//Next SQL sentence is generated
DELETE FROM robots WHERE id = 101
How can I add some kind of listener or just plain var_dump the select query that is about to generated by the $connection->delete
Thanks
For me, the easiest solution is to just enable the query log, then tail -f that file as you run queries.
174
Accepted
answer
I am use this approach:
<?php
$config = new \Phalcon\Config([
'db' => [
'adapter' => 'Mysql',
'host' => 'localhost',
'dbname' => 'test',
'username' => 'root',
'password' => ''
],
'path' => [
'controllers' => __DIR__.'/../app/controllers/',
'libraries' => __DIR__.'/../app/libraries/',
'messages' => __DIR__.'/../app/messages/',
'models' => __DIR__.'/../app/models/',
'views' => __DIR__.'/../app/views/',
'tmp' => __DIR__.'/../tmp/',
],
]);
$di->set('db', function() use ($config) {
$adapter = '\Phalcon\Db\Adapter\Pdo\\'.$config->db->adapter;
$connection = new $adapter((array) $config->db);
$logger = new \Phalcon\Logger\Adapter\File($config->path->tmp.'sql.log');
$eventsManager = new \Phalcon\Events\Manager();
$eventsManager->attach('db', function($event, $connection) use ($logger) {
if ($event->getType() == 'beforeQuery') $logger->log($connection->getSQLStatement().' '.join(', ', $connection->getSQLVariables()));
});
$connection->setEventsManager($eventsManager);
return $connection;
});
17.0k
Hey thanks all, I followed your advice @urulab. I also added a nice Exception to catch those Phalcon\Db exceptions.
catch (\Exception $e) {
echo get_class($e), ": ", $e->getMessage(), "\n";
echo " File=", $e->getFile(), "\n";
echo " Line=", $e->getLine(), "\n";
//return array('error' => 'General Exception', 'trace' => $e->getTraceAsString());
}
|
{
"url": "https://forum.phalconphp.com/discussion/2898/how-do-i-view-a-sql-statement-",
"source_domain": "forum.phalconphp.com",
"snapshot_id": "crawl=CC-MAIN-2018-39",
"warc_metadata": {
"Content-Length": "24144",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:WHILPPABVJDYEUIIYR3ILE64ZNP4DB4G",
"WARC-Concurrent-To": "<urn:uuid:b6e56f70-d251-4d74-8f30-86d2252b8dee>",
"WARC-Date": "2018-09-24T08:18:58Z",
"WARC-IP-Address": "104.18.34.141",
"WARC-Identified-Payload-Type": "text/html",
"WARC-Payload-Digest": "sha1:AMG4KKZEXAOKOTR5D2MHC2NYMOJKFO6Y",
"WARC-Record-ID": "<urn:uuid:4b6951f3-e3eb-4309-b22e-d0d7606b177c>",
"WARC-Target-URI": "https://forum.phalconphp.com/discussion/2898/how-do-i-view-a-sql-statement-",
"WARC-Truncated": null,
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:d8b5121a-3f83-4496-951b-44306bfedaea>"
},
"warc_info": "isPartOf: CC-MAIN-2018-39\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for September 2018\r\noperator: Common Crawl Admin ([email protected])\r\nhostname: ip-10-169-173-84.ec2.internal\r\nsoftware: Apache Nutch 1.15 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 0.11-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/"
}
|
{
"line_start_idx": [
0,
14,
15,
207,
208,
239,
240,
310,
311,
317,
318,
345,
378,
393,
409,
413,
447,
482,
483,
613,
614,
621,
622,
727,
728,
729,
730,
734,
743,
750,
751,
775,
776,
782,
814,
828,
864,
904,
939,
974,
1004,
1011,
1027,
1086,
1143,
1199,
1253,
1306,
1353,
1360,
1364,
1406,
1471,
1524,
1602,
1654,
1733,
1874,
1882,
1933,
1957,
1961,
1962,
1963,
1969,
1970,
2086,
2087,
2111,
2173,
2221,
2269,
2380
],
"line_end_idx": [
14,
15,
207,
208,
239,
240,
310,
311,
317,
318,
345,
378,
393,
409,
413,
447,
482,
483,
613,
614,
621,
622,
727,
728,
729,
730,
734,
743,
750,
751,
775,
776,
782,
814,
828,
864,
904,
939,
974,
1004,
1011,
1027,
1086,
1143,
1199,
1253,
1306,
1353,
1360,
1364,
1406,
1471,
1524,
1602,
1654,
1733,
1874,
1882,
1933,
1957,
1961,
1962,
1963,
1969,
1970,
2086,
2087,
2111,
2173,
2221,
2269,
2380,
2389
]
}
|
{
"red_pajama_v2": {
"ccnet_original_length": 2389,
"ccnet_original_nlines": 72,
"rps_doc_curly_bracket": 0.0025115099269896746,
"rps_doc_ldnoobw_words": 0,
"rps_doc_lorem_ipsum": 0,
"rps_doc_stop_word_fraction": 0.15217390656471252,
"rps_doc_ut1_blacklist": 0,
"rps_doc_frac_all_caps_words": 0.035573121160268784,
"rps_doc_frac_lines_end_with_ellipsis": 0,
"rps_doc_frac_no_alph_words": 0.46047431230545044,
"rps_doc_frac_unique_words": 0.7022222280502319,
"rps_doc_mean_word_length": 6.1777777671813965,
"rps_doc_num_sentences": 20,
"rps_doc_symbol_to_word_ratio": 0,
"rps_doc_unigram_entropy": 4.907562255859375,
"rps_doc_word_count": 225,
"rps_doc_frac_chars_dupe_10grams": 0,
"rps_doc_frac_chars_dupe_5grams": 0,
"rps_doc_frac_chars_dupe_6grams": 0,
"rps_doc_frac_chars_dupe_7grams": 0,
"rps_doc_frac_chars_dupe_8grams": 0,
"rps_doc_frac_chars_dupe_9grams": 0,
"rps_doc_frac_chars_top_2gram": 0.01726618967950344,
"rps_doc_frac_chars_top_3gram": 0.01582733914256096,
"rps_doc_frac_chars_top_4gram": 0.018705040216445923,
"rps_doc_books_importance": -262.1911926269531,
"rps_doc_books_importance_length_correction": -262.1911926269531,
"rps_doc_openwebtext_importance": -109.6942138671875,
"rps_doc_openwebtext_importance_length_correction": -109.6942138671875,
"rps_doc_wikipedia_importance": -126.47007751464844,
"rps_doc_wikipedia_importance_length_correction": -126.47007751464844
},
"fasttext": {
"dclm": 0.30852800607681274,
"english": 0.6898565292358398,
"fineweb_edu_approx": 2.0656542778015137,
"eai_general_math": 0.13688385486602783,
"eai_open_web_math": 0.05014514923095703,
"eai_web_code": 0.342883825302124
}
}
|
{
"free_decimal_correspondence": {
"primary": {
"code": "005.133",
"labels": {
"level_1": "General works, books and libraries, information sciences",
"level_2": "",
"level_3": "Computer programming"
}
},
"secondary": {
"code": "005.44",
"labels": {
"level_1": "General works, books and libraries, information sciences",
"level_2": "",
"level_3": "Computer programming"
}
}
},
"bloom_cognitive_process": {
"primary": {
"code": "3",
"label": "Apply"
},
"secondary": {
"code": "2",
"label": "Understand"
}
},
"bloom_knowledge_domain": {
"primary": {
"code": "3",
"label": "Procedural"
},
"secondary": {
"code": "2",
"label": "Conceptual"
}
},
"document_type_v1": {
"primary": {
"code": "5",
"label": "Social/Forum"
},
"secondary": {
"code": "4",
"label": "Code/Software"
}
},
"extraction_artifacts": {
"primary": {
"code": "0",
"label": "No Artifacts"
},
"secondary": {
"code": "3",
"label": "Irrelevant Content"
}
},
"missing_content": {
"primary": {
"code": "0",
"label": "No missing content"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"document_type_v2": {
"primary": {
"code": "18",
"label": "Q&A Forum"
},
"secondary": {
"code": "8",
"label": "Documentation"
}
},
"reasoning_depth": {
"primary": {
"code": "3",
"label": "Intermediate Reasoning"
},
"secondary": {
"code": "2",
"label": "Basic Reasoning"
}
},
"technical_correctness": {
"primary": {
"code": "4",
"label": "Highly Correct"
},
"secondary": {
"code": "3",
"label": "Mostly Correct"
}
},
"education_level": {
"primary": {
"code": "3",
"label": "Undergraduate Level"
},
"secondary": {
"code": "2",
"label": "High School Level"
}
}
}
|
672f1e42c33a7f9846924a2431ea77df
|
-5,276,868,591,711,408,000 |
Donato Donato - 7 months ago 31
MySQL Question
Many to many relationship with individual fields of a record
I have a table called email_messages. I has columns
from
,
to
,
cc
,
bcc
. At the moment I have them stored as text fields, which contain serialized arrays of email addresses. But I want to extract the addresses into their own table, so I can reuse addresses and make it easier to search addresses with typeahead.
Obviously, I need a many to many. But if I do this:
class EmailMessage
has_many :email_message_addresses
has_many :addresses, through: :email_message_addresses
end
class Address
has_many :email_message_addresses
has_many :email_messages, through: :email_message_addresses
end
How would I be able to associate addresses for each individual
from
,
to
,
cc
,
bcc
field for a single record? The
from
field can contain 3 addresses, the
to
field can contain 5 addresses, etc.
Answer
Add an attribute to email_message_addresses called role, which can take on the values from, to, etc.
You will probably want to add some methods so that you can do the following syntax
@message = EmailMessage.find(...)
@message.to_addresses # -> array of addresses in the "to" field
@message.cc_addresses # -> array of addresses in the "cc" field
# etc.
|
{
"url": "https://codedump.io/share/GW8Bkz9wIT29/1/many-to-many-relationship-with-individual-fields-of-a-record",
"source_domain": "codedump.io",
"snapshot_id": "crawl=CC-MAIN-2017-22",
"warc_metadata": {
"Content-Length": "27179",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:2PA3L2QHMJPAWKOKXDWV6F6IOEBBBZ7F",
"WARC-Concurrent-To": "<urn:uuid:020d4df4-537f-4c95-a46f-e2d968b83e31>",
"WARC-Date": "2017-05-29T00:38:45Z",
"WARC-IP-Address": "84.22.103.185",
"WARC-Identified-Payload-Type": "text/html",
"WARC-Payload-Digest": "sha1:JQEVSDAGUMBNUXGEDURMMLHUXC4MD3G4",
"WARC-Record-ID": "<urn:uuid:ed2f0ff1-bc77-4f06-98e6-4a19c3288e54>",
"WARC-Target-URI": "https://codedump.io/share/GW8Bkz9wIT29/1/many-to-many-relationship-with-individual-fields-of-a-record",
"WARC-Truncated": null,
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:05458249-5cb3-4b7b-a874-ec5dd4625cf7>"
},
"warc_info": "robots: classic\r\nhostname: ip-10-185-224-210.ec2.internal\r\nsoftware: Nutch 1.6 (CC)/CC WarcExport 1.0\r\nisPartOf: CC-MAIN-2017-22\r\noperator: Common Crawl Admin\r\ndescription: Wide crawl of the web for May 2017\r\npublisher: Common Crawl\r\nformat: WARC File Format 1.0\r\nconformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf"
}
|
{
"line_start_idx": [
0,
32,
47,
48,
109,
110,
162,
163,
168,
170,
173,
175,
178,
180,
184,
425,
426,
478,
479,
498,
532,
587,
591,
592,
606,
640,
700,
704,
705,
706,
769,
774,
776,
779,
781,
784,
786,
790,
821,
826,
861,
864,
900,
901,
908,
909,
1010,
1011,
1094,
1095,
1129,
1194,
1259
],
"line_end_idx": [
32,
47,
48,
109,
110,
162,
163,
168,
170,
173,
175,
178,
180,
184,
425,
426,
478,
479,
498,
532,
587,
591,
592,
606,
640,
700,
704,
705,
706,
769,
774,
776,
779,
781,
784,
786,
790,
821,
826,
861,
864,
900,
901,
908,
909,
1010,
1011,
1094,
1095,
1129,
1194,
1259,
1266
]
}
|
{
"red_pajama_v2": {
"ccnet_original_length": 1266,
"ccnet_original_nlines": 52,
"rps_doc_curly_bracket": 0,
"rps_doc_ldnoobw_words": 0,
"rps_doc_lorem_ipsum": 0,
"rps_doc_stop_word_fraction": 0.3551020324230194,
"rps_doc_ut1_blacklist": 0,
"rps_doc_frac_all_caps_words": 0.03265305981040001,
"rps_doc_frac_lines_end_with_ellipsis": 0,
"rps_doc_frac_no_alph_words": 0.22857142984867096,
"rps_doc_frac_unique_words": 0.5263158082962036,
"rps_doc_mean_word_length": 5.115789413452148,
"rps_doc_num_sentences": 13,
"rps_doc_symbol_to_word_ratio": 0.016326529905200005,
"rps_doc_unigram_entropy": 4.300942420959473,
"rps_doc_word_count": 190,
"rps_doc_frac_chars_dupe_10grams": 0,
"rps_doc_frac_chars_dupe_5grams": 0.04320988059043884,
"rps_doc_frac_chars_dupe_6grams": 0,
"rps_doc_frac_chars_dupe_7grams": 0,
"rps_doc_frac_chars_dupe_8grams": 0,
"rps_doc_frac_chars_dupe_9grams": 0,
"rps_doc_frac_chars_top_2gram": 0.018518520519137383,
"rps_doc_frac_chars_top_3gram": 0.020576130598783493,
"rps_doc_frac_chars_top_4gram": 0.022633740678429604,
"rps_doc_books_importance": -129.44346618652344,
"rps_doc_books_importance_length_correction": -129.44346618652344,
"rps_doc_openwebtext_importance": -64.41288757324219,
"rps_doc_openwebtext_importance_length_correction": -64.41288757324219,
"rps_doc_wikipedia_importance": -36.590389251708984,
"rps_doc_wikipedia_importance_length_correction": -36.590389251708984
},
"fasttext": {
"dclm": 0.7044818997383118,
"english": 0.8954997658729553,
"fineweb_edu_approx": 1.4555280208587646,
"eai_general_math": 0.9524139165878296,
"eai_open_web_math": 0.3342173099517822,
"eai_web_code": 0.972132682800293
}
}
|
{
"free_decimal_correspondence": {
"primary": {
"code": "005.74",
"labels": {
"level_1": "General works, books and libraries, information sciences",
"level_2": "",
"level_3": "Computer programming"
}
},
"secondary": {
"code": "005.1",
"labels": {
"level_1": "General works, books and libraries, information sciences",
"level_2": "",
"level_3": "Computer programming"
}
}
},
"bloom_cognitive_process": {
"primary": {
"code": "3",
"label": "Apply"
},
"secondary": {
"code": "2",
"label": "Understand"
}
},
"bloom_knowledge_domain": {
"primary": {
"code": "3",
"label": "Procedural"
},
"secondary": {
"code": "2",
"label": "Conceptual"
}
},
"document_type_v1": {
"primary": {
"code": "4",
"label": "Code/Software"
},
"secondary": {
"code": "3",
"label": "Reference/Encyclopedic/Educational"
}
},
"extraction_artifacts": {
"primary": {
"code": "0",
"label": "No Artifacts"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"missing_content": {
"primary": {
"code": "0",
"label": "No missing content"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"document_type_v2": {
"primary": {
"code": "18",
"label": "Q&A Forum"
},
"secondary": {
"code": "8",
"label": "Documentation"
}
},
"reasoning_depth": {
"primary": {
"code": "2",
"label": "Basic Reasoning"
},
"secondary": {
"code": "3",
"label": "Intermediate Reasoning"
}
},
"technical_correctness": {
"primary": {
"code": "4",
"label": "Highly Correct"
},
"secondary": {
"code": "3",
"label": "Mostly Correct"
}
},
"education_level": {
"primary": {
"code": "3",
"label": "Undergraduate Level"
},
"secondary": {
"code": "2",
"label": "High School Level"
}
}
}
|
672f1e42c33a7f9846924a2431ea77df
|
-7,451,009,864,225,447,000 |
Archivo
Archive for 19 agosto 2015
DragonJAR Security Conference en Colombia.
agosto 19, 2015 5 comentarios
Hace algunos días recibí una muy agradable sorpresa, el equipo de DragonJAR ha valorado mi propuesta para asistir como ponente a la próxima edición de la DragonJAR Security Conference que se celebrará en Colombia en el mes de septiembre :-D.
En dicho evento, voy a impartir un taller sobre Python enfocado al pentesting, con un contenido muy similar al del RootedLab que he dado este mismo año en Madrid, pero con una diferencia importante: El tiempo. El taller de la Rooted duraba solamente 8 horas, con lo cual tuvimos que ir bastante rápido sobre los contenidos para poder abarcar todas las cosas interesantes que aporta Python a la hora de ejecutar procesos de pentesting, pero en este caso el taller durará 3 días (24 horas) en las que vamos a poder realizar muchas más practicas y demostraciones, además de explicar algunos detalles sobre el lenguaje que incluso se les escapa a programadores con conocimientos sobre Python.
Por otro lado, el día 18 de septiembre a las 14:00 dará comienzo mi charla sobre la “deep web” y anonimato con TOR. Es una charla en la que voy a hablar sobre lo que es la deep web y voy intentar desmitificar muchas de las ideas preconcebidas que he visto rondando en foros o incluso en comentarios en este blog. Será una charla en la que voy a invitar a los asistentes a reflexionar, a romper sus esquemas y la forma en la que ven la deep web y TOR (atentos los vendemo… emm, “analistas del big data” XD). Luego, me voy a centrar en explicar a grandes rasgos la arquitectura de TOR y cómo realizar pruebas de penetración básicas contra servicios ocultos en la deep web. Finalmente, voy a presentar la nueva versión de Tortazo con la que he estado trabajando los últimos meses con constancia e ilusión. Como vaís a poder ver, el enfoque que le he dado ahora es completamente distinto a la primera versión, será más “amigable” y enfocada a compartir información, además de que la podrá utilizar cualquiera con o sin conocimientos tecnicos, eso si, el “core” de Tortazo, es y seguira siendo igual, es decir, tienes que saber exactamente lo que estas haciendo para poder instalar y configurar la herramienta, no está enfocada a script kiddies ni es un metasploit framework que instalas y utilizas con dos comandos que te encuentras por Internet, tampoco es una herramienta pensada para ejecutarse en la plataforma concreta de tu ordenador, es muy probable que tengas que adaptarla para cumplir con tus necesidades concretas, en ese sentido no hay cambios. De todos modos, como podrán ver los asistentes, la nueva versión será un servicio web que se encontrará disponible en Internet en los próximos meses, con el que se podrá acceder a cientos de servicios ocultos en la deep web de TOR y realizar busquedas muy amplias contra la “onion land”, ya sea utilizando una aplicación web o directamente por medio de una arquitectura de servicios REST que se encontrará disponible para todos los usuarios…. creo que ya he dicho demasiado, si realmente te interesa, es mejor que asistas a la charla. 🙂
Tengo muchas ganas de ir a conocer a grandes profesionales de la seguridad informática y estoy completamente dispuesto a aprender todo lo que pueda. Quiero volver a España con una bolsa llena de ideas listas para ponerlas en practica. 😉
Por último, si llevas alguna de las copias del libro de Python para Pentesters o Hacking con Python, te puedo hacer una dedicatoria sin ningún problema, o si te quieres acercar para preguntarme algo o para conocerme allí estaré, no me voy a ir a ninguna parte y tampoco te voy a morder (bueno… ya si eso lo voy viendo) XD.
Nos vemos en Colombia!
Saludos y Happy Hack!
Adastra.
Categorías:Hacking
Pentesting automatizado con Beef. Consumiendo la API Rest de BeEF con Python – Parte 3
agosto 4, 2015 7 comentarios
La API Rest de BeEF cuenta con todo lo necesario para controlar y automatizar las actividades que se pueden llevar a cabo desde el C&C de BeEF. El hecho de poder invocar a los endpoints definidos en dicha API permite crear rutinas de código que ayuden a ejecutar los procesos de recolección de información y explotación de una forma mucho más rápida y eficiente. Tal como se ha enseñado en las dos entradas anteriores sobre BeEF, utilizar esta API no es nada complicado y solamente es necesario ejecutar las peticiones HTTP con los parámetros correctos. Para hacerlo, se puede utilizar herramientas como wget, curl o incluso netcat/socat y si se quiere automatizar el uso de estas herramientas, una buena forma de hacerlo consiste en crear un script en bash que que las ejecute. Evidentemente también es posible utilizar cualquier lenguaje de programación y ejecutar las peticiones HTTP de forma automatizada utilizando las diferentes librerías que proporcionan todos los lenguajes de programación modernos. Dicho esto, a continuación se explicará cómo invocar a algunos de los endpoints de BeEF utilizando Python y en el próximo artículo, lo mismo pero utilizando Ruby.
Consumiendo la API de BeEF con Python
Python cuenta con un considerable número de librerías para realizar peticiones HTTP, lo que facilita muchísimo las cosas a la hora de crear clientes o incluso servicios utilizando Python y este protocolo. Una de las más conocidas y utilizadas es “requests” ya que con muy pocas líneas de código se puede crear un cliente HTTP completamente funcional y soportando todas las características del protocolo HTTP 1.1, algo que en otras librerías como urllib, urllib2 o httplib requiere más líneas de código y un poco más de esfuerzo. Con esto en mente se podría crear un script utilizando requests para consumir la API Rest de BeEF, pero para facilitar aun más las cosas, existe una librería pequeña y simple llamada BeEF-API que ya se encarga de interactuar con los endpoints de BeEF y solamente es necesario invocar a los métodos adecuados de dicha librería. Se encuentra disponible en el siguiente repositorio de GitHub: https://github.com/byt3bl33d3r/BeEF-API y como ocurre con prácticamente todas las librerías en Python, para instalarla solamente hace falta ejecutar el script “setup.py” con el parámetro “install”.
Esta librería se encarga de gestionar la autenticación con BeEF y almacenar internamente el token generado, el cual como se ha visto en el primer artículo, es requerido para invocar algunos de los endpoints de la API Rest.
>python
Python 2.7.6 (default, Jun 22 2015, 17:58:13)
[GCC 4.8.2] on linux2
Type "help", "copyright", "credits" or "license" for more information.
>>> from beefapi import BeefAPI
>>> beef = BeefAPI({})
>>> beef.login('beef', 'beef')
True
Como se puede apreciar, todo parte de la creación un objeto del tipo “BeefAPI”, cuyo constructor recibe como argumento un diccionario, el cual puede tener las claves “host” y “port” en el caso de que se quiera indicar una interfaz de red y puertos distintos a los valores por defecto (127.0.0.1:3000). Posteriormente se invoca al método “login” enviando como parámetros el usuario y la contraseña para autenticarse en el sistema.
Una vez el usuario se ha conseguido autenticar y se ha generado un token para la sesión actual, la librería dispone de una serie de métodos para invocar distintos endpoints, gestionando el token de autenticación de forma automática en cada una de dichas invocaciones. Algunos de los métodos disponibles en una instancia de la clase BeefAPI, permiten obtener los módulos disponibles en la instancia de Beef, buscar módulos que contengan una cadena determinada, listar todos los navegadores que han ejecutado el “hook” de Beef y que se encuentran “online”, así como aquellos que se encuentran “offline” y por supuesto, ejecutar módulos contra todos o solamente algunos de los navegadores enganchados. Esta librería utiliza internamente “requests” y los valores de retorno de cada petición siempre son diccionarios que representan las repuestas emitidas por cada uno de los endpoints invocados en formato JSON.
beefpython1Listando todos los módulos disponibles en BeEF
Como mencionaba antes, también es posible buscar módulos que cumplan con un patrón de texto determinado, pudiendo filtrar de esta forma aquellos módulos que sean de interés para el usuario.
beefpython2Filtrando módulos en BeEF
Del mismo modo que se pueden realizar búsquedas y listar los módulos disponibles en BeEF, también es posible hacer operaciones similares contra los navegadores que se encuentra online y offline.
beefpython3Listando navegadores hookeados
Y por último, pero no menos importante, es posible ejecutar un módulo determinado contra uno o varios navegadores que se encuentran “hookeados” en BeEF. Para hacerlo, en primer lugar hay que obtener el objeto correspondiente al navegador contra el que se desea ejecutar el módulo y en segundo lugar, se debe especificar el identificador del módulo que se desea utilizar contra el navegador. Cada objeto del tipo “Session” (navegador hookeado) tiene un método llamado “run” el cual recibe como argumento un valor númerico que representará el identificador de un módulo. Dicho método se encargará de buscar el módulo identificado con el valor especificado y posteriormente, se encargará de lanzarlo contra el navegador hookeado, algo que como se puede ver más abajo, se consigue con pocas lineas de código.
>>> for hook in beef.hooked_browsers.online:
... commandId = hook.run(243)["command_id"]
... print beef.modules.findbyid(243).results(hook.session, commandId)
En este caso, el módulo con el identificador “243” corresponde al módulo “Detect tor”, el cual como su nombre lo indica, intenta determinar si el navegador en cuestión está utilizando TOR para navegar. El método “run” es el encargado de ejecutar el módulo especificado y de retornar una estructura en formato “JSON” con un identificador del comando, el cual debe ser utilizado posteriormente para obtener los resultados que ha devuelto el módulo.
Como se ha podido ver, utilizar está librería no es complicado y es una buena forma automatizar las tareas que pueden llevarse a cabo desde la consola web de BeEF. En el próximo artículo hablaré sobre cómo hacer esto mismo con Ruby.
Saludos y Happy Hack!
Adastra.
A %d blogueros les gusta esto:
|
{
"url": "https://thehackerway.com/2015/08/",
"source_domain": "thehackerway.com",
"snapshot_id": "crawl=CC-MAIN-2019-30",
"warc_metadata": {
"Content-Length": "100406",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:DGD3CV6QMM6LO5WVQ4HB7ASJE7GC4ARJ",
"WARC-Concurrent-To": "<urn:uuid:94ce09f0-ff52-43a2-9ef7-a512d8d1ba80>",
"WARC-Date": "2019-07-22T15:03:55Z",
"WARC-IP-Address": "192.0.78.24",
"WARC-Identified-Payload-Type": "application/xhtml+xml",
"WARC-Payload-Digest": "sha1:KKOFPOJSY62N2CQSKTP77MJVOM5Z5EQE",
"WARC-Record-ID": "<urn:uuid:0d0d1841-b375-4192-ba64-08c98ab5f914>",
"WARC-Target-URI": "https://thehackerway.com/2015/08/",
"WARC-Truncated": null,
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:6b49d38e-732f-4ab1-b81a-fc5ccc7becd4>"
},
"warc_info": "isPartOf: CC-MAIN-2019-30\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for July 2019\r\noperator: Common Crawl Admin ([email protected])\r\nhostname: ip-10-153-172-231.ec2.internal\r\nsoftware: Apache Nutch 1.15 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.1-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/"
}
|
{
"line_start_idx": [
0,
8,
9,
36,
37,
80,
81,
111,
112,
354,
1043,
3133,
3370,
3693,
3716,
3717,
3739,
3748,
3749,
3768,
3769,
3856,
3857,
3886,
3887,
5058,
5059,
5097,
5098,
6215,
6438,
6439,
6441,
6442,
6450,
6496,
6518,
6589,
6621,
6644,
6675,
6680,
6681,
7111,
8019,
8020,
8078,
8079,
8269,
8270,
8307,
8308,
8503,
8504,
8546,
8547,
9352,
9353,
9398,
9446,
9520,
9521,
9968,
9969,
10202,
10203,
10225,
10234,
10235
],
"line_end_idx": [
8,
9,
36,
37,
80,
81,
111,
112,
354,
1043,
3133,
3370,
3693,
3716,
3717,
3739,
3748,
3749,
3768,
3769,
3856,
3857,
3886,
3887,
5058,
5059,
5097,
5098,
6215,
6438,
6439,
6441,
6442,
6450,
6496,
6518,
6589,
6621,
6644,
6675,
6680,
6681,
7111,
8019,
8020,
8078,
8079,
8269,
8270,
8307,
8308,
8503,
8504,
8546,
8547,
9352,
9353,
9398,
9446,
9520,
9521,
9968,
9969,
10202,
10203,
10225,
10234,
10235,
10265
]
}
|
{
"red_pajama_v2": {
"ccnet_original_length": 10265,
"ccnet_original_nlines": 68,
"rps_doc_curly_bracket": 0.00019484000222291797,
"rps_doc_ldnoobw_words": 0,
"rps_doc_lorem_ipsum": 0,
"rps_doc_stop_word_fraction": 0.09607437998056412,
"rps_doc_ut1_blacklist": 0,
"rps_doc_frac_all_caps_words": 0.015495870262384415,
"rps_doc_frac_lines_end_with_ellipsis": 0,
"rps_doc_frac_no_alph_words": 0.14669421315193176,
"rps_doc_frac_unique_words": 0.38224637508392334,
"rps_doc_mean_word_length": 5.115338325500488,
"rps_doc_num_sentences": 69,
"rps_doc_symbol_to_word_ratio": 0.0025826399214565754,
"rps_doc_unigram_entropy": 5.600310325622559,
"rps_doc_word_count": 1656,
"rps_doc_frac_chars_dupe_10grams": 0,
"rps_doc_frac_chars_dupe_5grams": 0.03411639854311943,
"rps_doc_frac_chars_dupe_6grams": 0.011096679605543613,
"rps_doc_frac_chars_dupe_7grams": 0.00472198985517025,
"rps_doc_frac_chars_dupe_8grams": 0,
"rps_doc_frac_chars_dupe_9grams": 0,
"rps_doc_frac_chars_top_2gram": 0.007673239801079035,
"rps_doc_frac_chars_top_3gram": 0.004249790217727423,
"rps_doc_frac_chars_top_4gram": 0.003895639907568693,
"rps_doc_books_importance": -924.2808837890625,
"rps_doc_books_importance_length_correction": -924.2808837890625,
"rps_doc_openwebtext_importance": -614.93505859375,
"rps_doc_openwebtext_importance_length_correction": -614.93505859375,
"rps_doc_wikipedia_importance": -457.9294128417969,
"rps_doc_wikipedia_importance_length_correction": -457.9294128417969
},
"fasttext": {
"dclm": 0.9657267928123474,
"english": 0.000770480022765696,
"fineweb_edu_approx": 1.3850592374801636,
"eai_general_math": 0.00013578000653069466,
"eai_open_web_math": 0.5259944796562195,
"eai_web_code": 0.4118453860282898
}
}
|
{
"free_decimal_correspondence": {
"primary": {
"code": "005.82",
"labels": {
"level_1": "General works, books and libraries, information sciences",
"level_2": "",
"level_3": "Computer programming"
}
},
"secondary": {
"code": "005.133",
"labels": {
"level_1": "General works, books and libraries, information sciences",
"level_2": "",
"level_3": "Computer programming"
}
}
},
"bloom_cognitive_process": {
"primary": {
"code": "3",
"label": "Apply"
},
"secondary": {
"code": "2",
"label": "Understand"
}
},
"bloom_knowledge_domain": {
"primary": {
"code": "3",
"label": "Procedural"
},
"secondary": {
"code": "2",
"label": "Conceptual"
}
},
"document_type_v1": {
"primary": {
"code": "3",
"label": "Reference/Encyclopedic/Educational"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"extraction_artifacts": {
"primary": {
"code": "0",
"label": "No Artifacts"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"missing_content": {
"primary": {
"code": "0",
"label": "No missing content"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"document_type_v2": {
"primary": {
"code": "16",
"label": "Personal Blog"
},
"secondary": {
"code": "23",
"label": "Tutorial"
}
},
"reasoning_depth": {
"primary": {
"code": "3",
"label": "Intermediate Reasoning"
},
"secondary": {
"code": "2",
"label": "Basic Reasoning"
}
},
"technical_correctness": {
"primary": {
"code": "3",
"label": "Mostly Correct"
},
"secondary": {
"code": "4",
"label": "Highly Correct"
}
},
"education_level": {
"primary": {
"code": "3",
"label": "Undergraduate Level"
},
"secondary": {
"code": "2",
"label": "High School Level"
}
}
}
|
672f1e42c33a7f9846924a2431ea77df
|
6,830,137,567,298,466,000 |
Take the 2-minute tour ×
Stack Overflow is a question and answer site for professional and enthusiast programmers. It's 100% free, no registration required.
We are migrating a fairly large codebase from VSS to Clearcase w\ UCM and are considering organizing our source into one or more components within a single project. What best practices\potential pitfalls should we keep in mind?
The source is organized into layers (data layer, business layer, GUI layer). The team is fairly small, developers tend to own a certain layer of the codebase and we anticipate a fair amount of branching due to parallel development efforts.
share|improve this question
1
Just completed my answer in response to your comment. – VonC Nov 19 '09 at 21:35
Just added the parasite baseline warning about component dependency. – VonC Nov 19 '09 at 21:51
add comment
1 Answer
up vote 6 down vote accepted
Single most dangerous pitfall:
Once a component is defined, you cannot move an element outside of this component (you can copy it and re-create it elsewhere, but you will loose its history)
Single most useful best-practice:
Understand well the nature of an UCM component: it is about coherency.
A component is a set of file which:
• evolves as a single unit,
• is labeled (baselined) as a whole,
• is branched as a whole.
If you can make evolutions without touching another group of files, chances are you have two components.
Example of components:
• an application (or a autonomous part of an application)
• a technical library
• a packaged set of file (for release)
The one document that should guide you to define components is the Applicative Architecture (which takes the business and functional specifications and project them onto applications which will then be specified at the technical level and implemented).
When all those components are defined, you have two approaches to manage them:
• system approach (every components is writable in a UCM project): useful for starting a project, but cumbersome with legacy project: you do not need to put a baseline on each and every components simply because 3 files has changed in one of those components.
• component approach: one or two writable components, the rest is there only as non-modifiable component. This is a scalable approach, allowing you to define one project per-component to develop, with a "fixed configuration" (i.e. "the other baselines", representing fixed states of the non-modifiable components you need to have in order to compile the modifiable one. You can change at any time this configuration, that is you can rebase the foundation baselines of the non-modifiable component whenever you want).
You can define as many Projects and Streams you want, allowing you to easily visualize the merge workflow.
Remember: a Stream represents a development effort.
Do not call a Stream after a resource (like VonC_stream), but after a task or set of tasks to do in that Stream (as in APP_LCH_R32_Dev: Development for 32th release of my App Launcher)
Note: UCM is just some meta-data on top of ClearCase: even if a group of file is defined as a UCM component, nothing prevents you to still making classic non-UCM branches, checkouts or checkins (in non-UCM views).
Is there a danger in creating too many fine grained components or having too many dependencies between components?
Yes, that is why Applicative Architecture is important. Again, once a component is defined, you cannot move elements between those components.
Another details to know about components is their layout:
myVob
myComponent1
myComponent2
myComponent3
A root component is always at the first level below a Vob.
You also can define a component as a all Vob but I would not recommend it (adding a Vob put stress on your Vob server. Adding a directory within an existing Vob cost nothing)
That means if you define some technical libraries as components, you cannot go as:
myLibs
Apache
ant
xalan
xerces
but will have to do:
myLibs
apapche_ant
apache_xalan
apache_xerces
Final warning: dependency (the true mark of a configuration management system)
One of the main advantage of UCM (or so I thought at the time -- 2003 --) is dependency.
If A depends on B, and I put A in my project, it will automatically include B in the same project.
Magic.
But it is broken.
• First, never do root-based dependency (a root-based component is a set of file). It will break at the first overlap:
A1
B1
B2
Here you need B2 to go on building A, but A starts from A1 based on B1: B2 overrides B1. As soon as you put a baseline on A (A2), it is over. You will not be able to change B anymore. A parasite baseline (called A2!?) will have been put on the (non-modifiable!) component B because of the overlap.
• Always include your dependencies in a rootless component
ADep1
A1
BDep1
B1
BDep2
B2
Here you have rootless components ADep and BDep (a rootless component is a special component which aggregates other rootless or root-based components)
You still have an override, but this time between rootless components.
That will still make a parasite baseline (on BDep, called A2), but at least you will be able to rebase BDep2 into other baselines later (BDep3, BDep4...)
More on this Incoherences and Inconsistencies of ClearCase UCM, with Rational counter-arguments here (and just after that their post, proof that their arguments are not very good to say the least).
Read also How to Leverage Clearcase’s features
share|improve this answer
Is there a danger in creating too many fine grained components or having too many dependencies between components? – zac Nov 19 '09 at 21:27
add comment
Your Answer
discard
By posting your answer, you agree to the privacy policy and terms of service.
Not the answer you're looking for? Browse other questions tagged or ask your own question.
|
{
"url": "http://stackoverflow.com/questions/1764329/clearcase-ucm-best-practices-using-components",
"source_domain": "stackoverflow.com",
"snapshot_id": "crawl=CC-MAIN-2014-10",
"warc_metadata": {
"Content-Length": "73123",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:BOERUQMMPCOBMVDOT5W7Y7B4U7WCO4HO",
"WARC-Concurrent-To": "<urn:uuid:0bf5d97b-02e8-4dc8-b726-5b0782476509>",
"WARC-Date": "2014-03-07T15:19:29Z",
"WARC-IP-Address": "198.252.206.140",
"WARC-Identified-Payload-Type": null,
"WARC-Payload-Digest": "sha1:3ZQH65DWC3YWTQD4LXRZOMYKQDF5XCFP",
"WARC-Record-ID": "<urn:uuid:f20ad433-7b0a-4309-9ffe-c647351ee32b>",
"WARC-Target-URI": "http://stackoverflow.com/questions/1764329/clearcase-ucm-best-practices-using-components",
"WARC-Truncated": null,
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:cb47232c-4ba1-485d-96b0-3c624d78ace2>"
},
"warc_info": "robots: classic\r\nhostname: ip-10-183-142-35.ec2.internal\r\nsoftware: Nutch 1.6 (CC)/CC WarcExport 1.0\r\nisPartOf: CC-MAIN-2014-10\r\noperator: CommonCrawl Admin\r\ndescription: Wide crawl of the web with URLs provided by Blekko for March 2014\r\npublisher: CommonCrawl\r\nformat: WARC File Format 1.0\r\nconformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf"
}
|
{
"line_start_idx": [
0,
25,
157,
158,
386,
387,
627,
628,
656,
660,
742,
744,
841,
853,
854,
863,
864,
893,
894,
925,
926,
1085,
1086,
1120,
1121,
1192,
1228,
1229,
1259,
1298,
1326,
1327,
1432,
1433,
1456,
1457,
1517,
1541,
1582,
1583,
1836,
1837,
1916,
1917,
2179,
2180,
2699,
2700,
2807,
2808,
2860,
3045,
3046,
3047,
3261,
3262,
3263,
3378,
3379,
3522,
3523,
3581,
3582,
3588,
3603,
3618,
3633,
3634,
3693,
3868,
3869,
3952,
3953,
3960,
3969,
3977,
3987,
3998,
3999,
4020,
4021,
4028,
4042,
4057,
4073,
4074,
4075,
4154,
4155,
4244,
4343,
4344,
4351,
4352,
4370,
4371,
4492,
4493,
4500,
4509,
4516,
4517,
4815,
4816,
4877,
4887,
4896,
4908,
4919,
4929,
4940,
4941,
5092,
5163,
5317,
5318,
5516,
5517,
5564,
5565,
5591,
5593,
5735,
5747,
5748,
5760,
5761,
5763,
5771,
5772,
5850,
5851
],
"line_end_idx": [
25,
157,
158,
386,
387,
627,
628,
656,
660,
742,
744,
841,
853,
854,
863,
864,
893,
894,
925,
926,
1085,
1086,
1120,
1121,
1192,
1228,
1229,
1259,
1298,
1326,
1327,
1432,
1433,
1456,
1457,
1517,
1541,
1582,
1583,
1836,
1837,
1916,
1917,
2179,
2180,
2699,
2700,
2807,
2808,
2860,
3045,
3046,
3047,
3261,
3262,
3263,
3378,
3379,
3522,
3523,
3581,
3582,
3588,
3603,
3618,
3633,
3634,
3693,
3868,
3869,
3952,
3953,
3960,
3969,
3977,
3987,
3998,
3999,
4020,
4021,
4028,
4042,
4057,
4073,
4074,
4075,
4154,
4155,
4244,
4343,
4344,
4351,
4352,
4370,
4371,
4492,
4493,
4500,
4509,
4516,
4517,
4815,
4816,
4877,
4887,
4896,
4908,
4919,
4929,
4940,
4941,
5092,
5163,
5317,
5318,
5516,
5517,
5564,
5565,
5591,
5593,
5735,
5747,
5748,
5760,
5761,
5763,
5771,
5772,
5850,
5851,
5941
]
}
|
{
"red_pajama_v2": {
"ccnet_original_length": 5941,
"ccnet_original_nlines": 131,
"rps_doc_curly_bracket": 0,
"rps_doc_ldnoobw_words": 0,
"rps_doc_lorem_ipsum": 0,
"rps_doc_stop_word_fraction": 0.41085270047187805,
"rps_doc_ut1_blacklist": 0,
"rps_doc_frac_all_caps_words": 0.03445306047797203,
"rps_doc_frac_lines_end_with_ellipsis": 0,
"rps_doc_frac_no_alph_words": 0.16881997883319855,
"rps_doc_frac_unique_words": 0.4018499553203583,
"rps_doc_mean_word_length": 4.751284599304199,
"rps_doc_num_sentences": 44,
"rps_doc_symbol_to_word_ratio": 0.0008613300160504878,
"rps_doc_unigram_entropy": 5.367483139038086,
"rps_doc_word_count": 973,
"rps_doc_frac_chars_dupe_10grams": 0.04153146967291832,
"rps_doc_frac_chars_dupe_5grams": 0.0722474604845047,
"rps_doc_frac_chars_dupe_6grams": 0.0722474604845047,
"rps_doc_frac_chars_dupe_7grams": 0.05710577964782715,
"rps_doc_frac_chars_dupe_8grams": 0.05710577964782715,
"rps_doc_frac_chars_dupe_9grams": 0.04153146967291832,
"rps_doc_frac_chars_top_2gram": 0.014276440255343914,
"rps_doc_frac_chars_top_3gram": 0.004542499780654907,
"rps_doc_frac_chars_top_4gram": 0.005840360186994076,
"rps_doc_books_importance": -563.0973510742188,
"rps_doc_books_importance_length_correction": -563.0973510742188,
"rps_doc_openwebtext_importance": -275.83154296875,
"rps_doc_openwebtext_importance_length_correction": -275.83154296875,
"rps_doc_wikipedia_importance": -203.63441467285156,
"rps_doc_wikipedia_importance_length_correction": -203.63441467285156
},
"fasttext": {
"dclm": 0.054370999336242676,
"english": 0.924204409122467,
"fineweb_edu_approx": 2.29677152633667,
"eai_general_math": 0.1808653473854065,
"eai_open_web_math": 0.5095358490943909,
"eai_web_code": 0.032028619199991226
}
}
|
{
"free_decimal_correspondence": {
"primary": {
"code": "005.4",
"labels": {
"level_1": "General works, books and libraries, information sciences",
"level_2": "",
"level_3": "Computer programming"
}
},
"secondary": {
"code": "005.1",
"labels": {
"level_1": "General works, books and libraries, information sciences",
"level_2": "",
"level_3": "Computer programming"
}
}
},
"bloom_cognitive_process": {
"primary": {
"code": "4",
"label": "Analyze"
},
"secondary": {
"code": "3",
"label": "Apply"
}
},
"bloom_knowledge_domain": {
"primary": {
"code": "3",
"label": "Procedural"
},
"secondary": {
"code": "2",
"label": "Conceptual"
}
},
"document_type_v1": {
"primary": {
"code": "5",
"label": "Social/Forum"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"extraction_artifacts": {
"primary": {
"code": "3",
"label": "Irrelevant Content"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"missing_content": {
"primary": {
"code": "0",
"label": "No missing content"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"document_type_v2": {
"primary": {
"code": "18",
"label": "Q&A Forum"
},
"secondary": {
"code": "8",
"label": "Documentation"
}
},
"reasoning_depth": {
"primary": {
"code": "3",
"label": "Intermediate Reasoning"
},
"secondary": {
"code": "2",
"label": "Basic Reasoning"
}
},
"technical_correctness": {
"primary": {
"code": "4",
"label": "Highly Correct"
},
"secondary": {
"code": "3",
"label": "Mostly Correct"
}
},
"education_level": {
"primary": {
"code": "3",
"label": "Undergraduate Level"
},
"secondary": {
"code": "2",
"label": "High School Level"
}
}
}
|
672f1e42c33a7f9846924a2431ea77df
|
8,603,563,187,381,004,000 |
Internet Speed Analysis and Ideal Internet Speed
Internet Speed Analysis and Ideal Internet Speed
I affectionately recollect dialing up to the internet back when I was a youngster and 56K modems and usernames like “cooltom123” were popular. The consoling shrieks and twitters pushed parcels of information down a phone line that was initially intended for voice correspondences. Perusing the internet in those days was difficult more often than not, and Wi-Fi was non-existent. I used to frantically attempt free dial-up administrations at the end of the week, and play Grand Theft Auto PC multiplayer by dialing my companions telephone number. My PC gaming was just hindered if my mother chose to get our home telephone to make a call.
It’s difficult to envision the times of the 56K modem contrasted with the present internet. I bear the internet in my pocket now, and there are no shrieks and tweets going with it. Bandwidth has progressed significantly. During that time I’ve generally been sufficiently fortunate to get the quickest internet accessible at home. Regardless of whether that was getting BT ADSL introduced and being one of the first clients in my ward, or purchasing a Nokia telephone with access to WAP pages. I’m an innovation someone who is addicted, and I generally need the quickest apparatus.
I’ve attempted an assortment of ISPs throughout the years, and for as far back as two I’ve been utilizing fiber on BT that oversees speeds of around 70Mbps. Gushing, gaming, and general downloading have all been fine, yet I’ve been desirous of companions with 200Mbps associations on Virgin Media. I simply moved lofts at the end of the week, and I was at first stunned to discover that there are no rapid internet choices accessible from suppliers like Virgin Media or BT. Moving house is sufficiently unpleasant without stressing over your internet dependence
Fortunately, I found an ISP that is actually a blessing from heaven in the UK. Hyperoptic, a five-year-old organization I’d never known about, has been giving 1Gbps internet speeds to homes and organizations crosswise over London and different parts of the UK. Fortunately enough, the building I’ve moved into can bolster 1Gbps speeds on Hyperoptic. I had the alternative to pick between 10Mbps, 100Mbps, and 1Gbps, yet the decision is really clear in case you’re an internet junkie. Hyperoptic doesn’t compel you to burn through cash on a telephone line like BT does, so I just selected the 1Gbps bundle to perceive what it resembles to have that speed in my own home.
I’ve just had the administration not exactly seven days, however I’ve sincerely attempted to witness the contrasts between about 100Mbps speeds and the great 1Gbps association. Spilling 4K content appears to be similarly as solid as previously, and site pages generally aren’t recognizably quicker. The enormous distinction is the colossal 1Gbps transfer. I can send extensive files to OneDrive or Dropbox in what appears to be moment, and notwithstanding sending files to loved ones is much speedier.
When I switched from 56K to ADSL, or from ADSL to a fiber association, there was an incredible and observable knock in speed. I genuinely haven’t felt that yet with this association. I’ve been getting speeds that are near the greatest achievable over a wired LAN, however they haven’t had an enormous effect to the manner in which I work. Sites and administrations simply aren’t setup to completely use a 1Gbps association. That is not so much astounding here in the UK as the legislature is as yet attempting to get the country on super-quick associations. The bar has been set at least 2Mbps for 95 percent of the country, and it’s such a low base speed, to the point that the interest in the foundation required to make utilization of 1Gbps associations simply wouldn’t occur at a fast pace until the point that organizations and purchasers can make utilization of such speeds.
Wi-Fi is additionally a bottleneck with a 1Gbps association. I can oversee around 400Mbps max utilizing an AC switch, yet the more I move far from the switch then the less bandwidth I get. It’s enticing to state that a 100Mbps association is all you need, and it most likely is for the time being. In the event that history has shown us anything, however, it’s that we’ll glance back at 100Mbps internet associations and laugh that we even utilized something so moderate. The eventual fate of super rapid internet is as of now here, yet we simply require everything else to get up to speed and quit slacking.
|
{
"url": "http://newstoday.myfiwifi.net/internet-speed-analysis-and-ideal-internet-speed/",
"source_domain": "newstoday.myfiwifi.net",
"snapshot_id": "crawl=CC-MAIN-2019-09",
"warc_metadata": {
"Content-Length": "20040",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:WHE7OITBYBHQBKNUHYSGA4IEAZ7BXJL2",
"WARC-Concurrent-To": "<urn:uuid:a2ffe0ad-f430-4518-896d-e3c26c67f13e>",
"WARC-Date": "2019-02-21T21:44:05Z",
"WARC-IP-Address": "104.27.137.186",
"WARC-Identified-Payload-Type": "text/html",
"WARC-Payload-Digest": "sha1:UFYLCRUKQIHMKXA2PCOH5M5XHDP2LPSW",
"WARC-Record-ID": "<urn:uuid:a5be37cf-226d-45e7-a915-f73bdaf38647>",
"WARC-Target-URI": "http://newstoday.myfiwifi.net/internet-speed-analysis-and-ideal-internet-speed/",
"WARC-Truncated": null,
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:2b7a46ee-6a41-413b-b481-493397330c55>"
},
"warc_info": "isPartOf: CC-MAIN-2019-09\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for February 2019\r\noperator: Common Crawl Admin ([email protected])\r\nhostname: ip-10-151-171-77.ec2.internal\r\nsoftware: Apache Nutch 1.15 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 0.11-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/"
}
|
{
"line_start_idx": [
0,
49,
50,
99,
100,
739,
740,
1321,
1322,
1884,
1885,
2555,
2556,
3058,
3059,
3940,
3941
],
"line_end_idx": [
49,
50,
99,
100,
739,
740,
1321,
1322,
1884,
1885,
2555,
2556,
3058,
3059,
3940,
3941,
4549
]
}
|
{
"red_pajama_v2": {
"ccnet_original_length": 4549,
"ccnet_original_nlines": 16,
"rps_doc_curly_bracket": 0,
"rps_doc_ldnoobw_words": 0,
"rps_doc_lorem_ipsum": 0,
"rps_doc_stop_word_fraction": 0.43841809034347534,
"rps_doc_ut1_blacklist": 0,
"rps_doc_frac_all_caps_words": 0.05310733988881111,
"rps_doc_frac_lines_end_with_ellipsis": 0,
"rps_doc_frac_no_alph_words": 0.10960452258586884,
"rps_doc_frac_unique_words": 0.46578946709632874,
"rps_doc_mean_word_length": 4.8815789222717285,
"rps_doc_num_sentences": 34,
"rps_doc_symbol_to_word_ratio": 0,
"rps_doc_unigram_entropy": 5.293761730194092,
"rps_doc_word_count": 760,
"rps_doc_frac_chars_dupe_10grams": 0,
"rps_doc_frac_chars_dupe_5grams": 0.033423181623220444,
"rps_doc_frac_chars_dupe_6grams": 0.033423181623220444,
"rps_doc_frac_chars_dupe_7grams": 0.033423181623220444,
"rps_doc_frac_chars_dupe_8grams": 0,
"rps_doc_frac_chars_dupe_9grams": 0,
"rps_doc_frac_chars_top_2gram": 0.00808625016361475,
"rps_doc_frac_chars_top_3gram": 0.01132075022906065,
"rps_doc_frac_chars_top_4gram": 0.012938009575009346,
"rps_doc_books_importance": -326.826904296875,
"rps_doc_books_importance_length_correction": -326.826904296875,
"rps_doc_openwebtext_importance": -216.63543701171875,
"rps_doc_openwebtext_importance_length_correction": -216.63543701171875,
"rps_doc_wikipedia_importance": -142.68740844726562,
"rps_doc_wikipedia_importance_length_correction": -142.68740844726562
},
"fasttext": {
"dclm": 0.018680749461054802,
"english": 0.9530283808708191,
"fineweb_edu_approx": 1.2745872735977173,
"eai_general_math": 0.23239654302597046,
"eai_open_web_math": 0.3649381399154663,
"eai_web_code": 0.006566409952938557
}
}
|
{
"free_decimal_correspondence": {
"primary": {
"code": "004.6",
"labels": {
"level_1": "General works, books and libraries, information sciences",
"level_2": "",
"level_3": "Computers and Computer science"
}
},
"secondary": {
"code": "384.76",
"labels": {
"level_1": "Social sciences",
"level_2": "Commerce and Communication and traffic",
"level_3": "Telecommunication"
}
}
},
"bloom_cognitive_process": {
"primary": {
"code": "2",
"label": "Understand"
},
"secondary": {
"code": "4",
"label": "Analyze"
}
},
"bloom_knowledge_domain": {
"primary": {
"code": "2",
"label": "Conceptual"
},
"secondary": {
"code": "3",
"label": "Procedural"
}
},
"document_type_v1": {
"primary": {
"code": "9",
"label": "Personal/Misc"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"extraction_artifacts": {
"primary": {
"code": "0",
"label": "No Artifacts"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"missing_content": {
"primary": {
"code": "0",
"label": "No missing content"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"document_type_v2": {
"primary": {
"code": "16",
"label": "Personal Blog"
},
"secondary": {
"code": "10",
"label": "Knowledge Article"
}
},
"reasoning_depth": {
"primary": {
"code": "2",
"label": "Basic Reasoning"
},
"secondary": {
"code": "3",
"label": "Intermediate Reasoning"
}
},
"technical_correctness": {
"primary": {
"code": "3",
"label": "Mostly Correct"
},
"secondary": {
"code": "4",
"label": "Highly Correct"
}
},
"education_level": {
"primary": {
"code": "1",
"label": "General Audience"
},
"secondary": {
"code": "2",
"label": "High School Level"
}
}
}
|
672f1e42c33a7f9846924a2431ea77df
|
-745,521,595,451,482,800 |
Sunday, May 17, 2015
How fast can we sort?
We all know that we can sort n things in O(n log n) time and that is the best you can do. Problem solved. Right? Wrong!
Sorting is a fascinating topic and I am planning a whole series of posts about it. It also inspired the blog name.
Let's start with what most programmers already know.
Classic sorting algorithms
O(n log n) sorting algorithms have been known for a very long time. John von Neumann already implemented merge sort in 1945 on the EDVAC computer. We're talking about a computer built out of vacuum tubes, with 1000 words of RAM, capable of performing 1000 operations per second or so.
Later people discovered quicksort in 1962[1] and heapsort in 1964[2]. The only theoretical improvement here is that heapsort is in-place: it uses only O(1) additional memory outside the array. Of course the heap-based priority queue is nice in its own right.
We can easily implement another O(n log n) sorting algorithm, AVL-sort, using the code from my previous post on balanced binary search trees. We just put all the elements into an AVL tree, and the extract them back into a list:
avlSort :: Ord t => [t] -> [t]
avlSort = toList . fromList
Lower bound for comparison-based sorting
Suppose that we restrict ourselves to performing only one operation on the elements we're sorting: compare two of them to see which one is bigger. This is what we mean by "comparison-based sorting".
Every comparison operation returns a single yes or no answer. If we perform k such operations, we can get 2k different sequences of answers, and hence we can distinguish between 2k different permutations. Since there are n! permutations of n elements, it follows that we need at least log2 (n!) comparisons in the worst case (and also on average, which is slightly harder to see) to distinguish between them all.
log2 (n!) ≥ log2 (n/2)(n/2) = n/2 * (log2 n - 1) = Θ(n log n)
So there you go. That's the proof of the lower bound.
The significance of this lower bound has been overblown. Why would you ever so restrict yourself as to only use comparisons?? You can do much more with numbers, or other objects that you'd want to sort, than just compare two of them. You can add them, you can multiply them, you can index arrays with them... All these other operations don't seem all that useful for sorting at first sight. But it turns out they are useful! This is very unintuitive, and fascinating at the same time.
Again and again I have seen people cite this result when it does not apply. Most commonly, the claim is that n numbers can't be sorted faster than O(n log n). For example, people will claim that it's impossible to compute convex hulls in 2D faster than O(n log n), because that requires sorting coordinates. As we will see in a moment, this claim is false. Numbers can actually be sorted faster than this!
Faster sorting algorithms
Let's start talking about some asymptotically faster sorting algorithms. What are some of the things we normally want to sort?
The first group is numbers: integers, rational numbers, floating-point real numbers, complex numbers... OK maybe not complex numbers, they don't have any natural ordering.
The second group is sequences of characters or numbers, such as text strings (e.g. names) or big multi-precision integers.
Sorting integers
Important note here: we are talking about sorting integers that fit in a single machine word, such as 64-bit integers on a 64-bit computer. In general, we will be talking about sorting w-bit integers on a w-bit computer. This is not an artificial restriction: comparison-based sorting algorithms need this as well. Well, we can allow a constant multiple, such as 2w-bit integers on a w-bit computer. After all, we can implement operations on 2-word integers in O(1) time. But we're not talking about huge, multiple-precision integers. If you want to sort million-bit integers, you have to either find a 1000000-bit computer, or skip to the section about sorting sequences.
Here is a summary of various algorithms for sorting integers. I will be writing about some of them in my future posts.
long agomerge sortO(n log n)
long agoradix sortO(n w / log n)
1977van Emde Boas [3]O(n log w)
1983Kirkpatrick & Reisch [4]O(n log (w / log n))
1995Andersson, Hagerup, Nilsson, Raman [6]O(n log log n)
2002Han & Thorup [7]O(n (log log n)1/2)
Some of these run-times depend on w, but the last two are clearly better than O(n log n), independently of w.
Is sorting integers in O(n) time possible?
This is the big open problem. Nobody knows.
Radix sort does it when n is big compared to the word size (log n = Ω(w)).
In their 1995 paper [6], Andersson et al showed how to do this when n is small compared to the word size (log n = O(w1/2-ɛ) for some ɛ>0). There is still a gap in between where we just don't know.
Update: It has been pointed out in the comments that this knowledge gap has been slightly tightened on the "small n compared to the word size" side. As of 2014[8], we know how to sort in O(n) time when log n = O((w / log w)1/2).
What about other kinds of numbers?
Real numbers are typically represented in a floating point format. This seems harder to handle than integers, but it's really not. Floating point numbers are represented as two integers: an exponent and a mantissa. For instance, the IEEE double-precision floating point format, the most common representation out there, stores real numbers as an 11-bit exponent and a 52-bit mantissa. The representation is: 2exponent * (1 + mantissa * 2-52). A number with a higher exponent is bigger than a number with a smaller exponent. For equal exponents, the number with the bigger mantissa is bigger. So really, sorting these real numbers is equivalent to sorting 63-bit integers!
Sorting rational numbers can also be reduced to sorting integers. If you have rational numbers a/b, where a and b are w-bit integers, compute ⌊a * 22w / b⌋ for each, and sort the resulting 3w-bit integers. This works because a difference between two different rationals a/b and c/d is always at least 1/(bd) > 2-2w, so a precision of 2w bits after the binary point is sufficient.
This is another reason sorting integers is an interesting topic: if we can sort integers, we can sort all kinds of numbers.
Sorting strings lexicographically
The important thing to notice here is that we can't compare two elements in constant time any more in this case. Therefore, merge-sort does not work in O(n log n) time. It can be shown that it works in O(L log n) time, where L is the sum of lengths of the strings.
This too can be improved. In 1994, Andersson and Nillson [5] showed how to sort strings in O(L + (time to sort n characters)) time. If the alphabet is small (such as ASCII), we can use count sort to sort the n characters, which gives time complexity O(L + |Σ|), where |Σ| is the size of the alphabet. If the alphabet is large, we can use one of the integer sorting algorithms and arrive at, say, O(L + n (log log n)1/2) time.
This also works for sorting multi-precision integers. If you append their lengths at the start, this is just lexicographic sorting, where the "characters" are word-size numbers.
References
[1] Hoare, Charles AR. "Quicksort." The Computer Journal 5.1 (1962): 10-16.
[2] Williams, John William Joseph. "ALGORITHM-232-HEAPSORT." Communications of the ACM 7.6 (1964): 347-348.
[3] van Emde Boas, Peter. "Preserving order in a forest in less than logarithmic time and linear space." Information processing letters 6.3 (1977): 80-82.
[4] Kirkpatrick, David, and Stefan Reisch. "Upper bounds for sorting integers on random access machines." Theoretical Computer Science 28.3 (1983): 263-276.
[5] Andersson, Arne, and Stefan Nilsson. "A new efficient radix sort." Foundations of Computer Science, 1994 Proceedings., 35th Annual Symposium on. IEEE, 1994.
[6] Andersson, Arne, et al. "Sorting in linear time?." Proceedings of the twenty-seventh annual ACM symposium on Theory of computing. ACM, 1995.
[7] Han, Yijie, and Mikkel Thorup. "Integer sorting in O (n√(log log n)) expected time and linear space." Foundations of Computer Science, 2002. Proceedings. The 43rd Annual IEEE Symposium on. IEEE, 2002.
[8] Belazzougui, Djamal, Gerth Stølting Brodal, and Jesper Sindahl Nielsen. "Expected Linear Time Sorting for Word Size Ω(log2 n log log n)." Algorithm Theory–SWAT 2014. Springer International Publishing, 2014. 26-37.
2 comments:
1. There has been an improvement on [6] in SWAT'14:
http://www.cs.au.dk/~gerth/papers/swat14sort.pdf
So now w = log^2(n) loglog(n) is enough. Would be cool to get it down to a clean w = log^2(n) :)
ReplyDelete
Replies
1. Progress! This still looks nicer than having an epsilon in the exponent :) I added an update.
Delete
|
{
"url": "http://sorting-and-searching.blogspot.com/2015/05/how-fast-can-we-sort.html",
"source_domain": "sorting-and-searching.blogspot.com",
"snapshot_id": "crawl=CC-MAIN-2018-26",
"warc_metadata": {
"Content-Length": "65208",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:OLKWTWYJNQW3FGKRNENWDILZUHU2T3JF",
"WARC-Concurrent-To": "<urn:uuid:f3eaa27a-7f23-471a-a15f-70e64fa28a95>",
"WARC-Date": "2018-06-19T01:01:19Z",
"WARC-IP-Address": "172.217.7.193",
"WARC-Identified-Payload-Type": "text/html",
"WARC-Payload-Digest": "sha1:6FFVTF7PKFEGUC2XBMRPZWGPMIFQWKHX",
"WARC-Record-ID": "<urn:uuid:198460a6-9fb9-4a0c-a0b4-4ce78ed63c0e>",
"WARC-Target-URI": "http://sorting-and-searching.blogspot.com/2015/05/how-fast-can-we-sort.html",
"WARC-Truncated": null,
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:f15df02a-25e7-402e-a41a-aab52c47c923>"
},
"warc_info": "robots: classic\r\nhostname: ip-10-229-194-245.ec2.internal\r\nsoftware: Nutch 1.6 (CC)\r\nisPartOf: CC-MAIN-2018-26\r\noperator: Common Crawl Admin\r\ndescription: Wide crawl of the web for June 2018\r\npublisher: Common Crawl\r\nformat: WARC File Format 1.0\r\nconformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf"
}
|
{
"line_start_idx": [
0,
21,
22,
44,
45,
165,
166,
281,
282,
335,
336,
363,
364,
365,
650,
651,
910,
911,
1139,
1170,
1198,
1199,
1240,
1241,
1242,
1441,
1442,
1855,
1856,
1918,
1919,
1973,
1974,
2459,
2460,
2866,
2867,
2893,
2894,
2895,
3022,
3023,
3195,
3196,
3319,
3320,
3337,
3338,
3339,
4012,
4013,
4132,
4133,
4162,
4195,
4227,
4276,
4333,
4373,
4374,
4484,
4485,
4528,
4529,
4530,
4574,
4575,
4650,
4651,
4848,
4849,
5078,
5079,
5114,
5115,
5116,
5788,
5789,
6169,
6170,
6294,
6295,
6329,
6330,
6331,
6596,
6597,
7023,
7024,
7202,
7203,
7214,
7215,
7216,
7292,
7400,
7555,
7712,
7873,
8018,
8223,
8441,
8442,
8454,
8455,
8509,
8562,
8663,
8664,
8680,
8692,
8793,
8794
],
"line_end_idx": [
21,
22,
44,
45,
165,
166,
281,
282,
335,
336,
363,
364,
365,
650,
651,
910,
911,
1139,
1170,
1198,
1199,
1240,
1241,
1242,
1441,
1442,
1855,
1856,
1918,
1919,
1973,
1974,
2459,
2460,
2866,
2867,
2893,
2894,
2895,
3022,
3023,
3195,
3196,
3319,
3320,
3337,
3338,
3339,
4012,
4013,
4132,
4133,
4162,
4195,
4227,
4276,
4333,
4373,
4374,
4484,
4485,
4528,
4529,
4530,
4574,
4575,
4650,
4651,
4848,
4849,
5078,
5079,
5114,
5115,
5116,
5788,
5789,
6169,
6170,
6294,
6295,
6329,
6330,
6331,
6596,
6597,
7023,
7024,
7202,
7203,
7214,
7215,
7216,
7292,
7400,
7555,
7712,
7873,
8018,
8223,
8441,
8442,
8454,
8455,
8509,
8562,
8663,
8664,
8680,
8692,
8793,
8794,
8806
]
}
|
{
"red_pajama_v2": {
"ccnet_original_length": 8806,
"ccnet_original_nlines": 112,
"rps_doc_curly_bracket": 0,
"rps_doc_ldnoobw_words": 0,
"rps_doc_lorem_ipsum": 0,
"rps_doc_stop_word_fraction": 0.3497560918331146,
"rps_doc_ut1_blacklist": 0,
"rps_doc_frac_all_caps_words": 0.02780487947165966,
"rps_doc_frac_lines_end_with_ellipsis": 0,
"rps_doc_frac_no_alph_words": 0.2751219570636749,
"rps_doc_frac_unique_words": 0.37166324257850647,
"rps_doc_mean_word_length": 4.601642608642578,
"rps_doc_num_sentences": 131,
"rps_doc_symbol_to_word_ratio": 0.000975609989836812,
"rps_doc_unigram_entropy": 5.604208946228027,
"rps_doc_word_count": 1461,
"rps_doc_frac_chars_dupe_10grams": 0,
"rps_doc_frac_chars_dupe_5grams": 0.025732560083270073,
"rps_doc_frac_chars_dupe_6grams": 0.007437159772962332,
"rps_doc_frac_chars_dupe_7grams": 0.007437159772962332,
"rps_doc_frac_chars_dupe_8grams": 0,
"rps_doc_frac_chars_dupe_9grams": 0,
"rps_doc_frac_chars_top_2gram": 0.010709499940276146,
"rps_doc_frac_chars_top_3gram": 0.0062472098506987095,
"rps_doc_frac_chars_top_4gram": 0.0044622900895774364,
"rps_doc_books_importance": -908.8834838867188,
"rps_doc_books_importance_length_correction": -908.8834838867188,
"rps_doc_openwebtext_importance": -540.3997802734375,
"rps_doc_openwebtext_importance_length_correction": -540.3997802734375,
"rps_doc_wikipedia_importance": -346.3848876953125,
"rps_doc_wikipedia_importance_length_correction": -346.3848876953125
},
"fasttext": {
"dclm": 0.7328821420669556,
"english": 0.9058231115341187,
"fineweb_edu_approx": 2.6882588863372803,
"eai_general_math": 0.9868051409721375,
"eai_open_web_math": 0.41081470251083374,
"eai_web_code": 0.8234506249427795
}
}
|
{
"free_decimal_correspondence": {
"primary": {
"code": "005.1",
"labels": {
"level_1": "General works, books and libraries, information sciences",
"level_2": "",
"level_3": "Computer programming"
}
},
"secondary": {
"code": "511.35",
"labels": {
"level_1": "Science and Natural history",
"level_2": "Mathematics",
"level_3": "Arithmetic"
}
}
},
"bloom_cognitive_process": {
"primary": {
"code": "4",
"label": "Analyze"
},
"secondary": {
"code": "5",
"label": "Evaluate"
}
},
"bloom_knowledge_domain": {
"primary": {
"code": "2",
"label": "Conceptual"
},
"secondary": {
"code": "3",
"label": "Procedural"
}
},
"document_type_v1": {
"primary": {
"code": "3",
"label": "Reference/Encyclopedic/Educational"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"extraction_artifacts": {
"primary": {
"code": "0",
"label": "No Artifacts"
},
"secondary": {
"code": "3",
"label": "Irrelevant Content"
}
},
"missing_content": {
"primary": {
"code": "0",
"label": "No missing content"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"document_type_v2": {
"primary": {
"code": "16",
"label": "Personal Blog"
},
"secondary": {
"code": "10",
"label": "Knowledge Article"
}
},
"reasoning_depth": {
"primary": {
"code": "4",
"label": "Advanced Reasoning"
},
"secondary": {
"code": "3",
"label": "Intermediate Reasoning"
}
},
"technical_correctness": {
"primary": {
"code": "4",
"label": "Highly Correct"
},
"secondary": {
"code": "3",
"label": "Mostly Correct"
}
},
"education_level": {
"primary": {
"code": "3",
"label": "Undergraduate Level"
},
"secondary": {
"code": "4",
"label": "Graduate/Expert Level"
}
}
}
|
672f1e42c33a7f9846924a2431ea77df
|
5,602,330,356,463,090,000 |
Take the 2-minute tour ×
Super User is a question and answer site for computer enthusiasts and power users. It's 100% free, no registration required.
This question already has an answer here:
How would you recommend backing up an entire hard drive?
Back story:
I often help others perform a clean OS installation (usually Windows) or migrate to a new hard drive. I like to begin with a full disk backup, so I can later revert the entire process, retrieve individual files, preserve factory-installed diagnostics, etc. In the past, I've used some combination of dd/ddrescue (single step for drive, but space inefficient) or ntfsclone for individual partitions.
Requirements:
1. Store NTFS partitions efficiently
2. Navigate partition(s) to retrieve individual files
3. Preserve partition structure, MBR, etc
4. Preserve factory-installed diagnostics or recovery partitions
5. Restore entire image to a new hard drive
6. (Optional) One-step archive
share|improve this question
marked as duplicate by Ramhound, David, Tog, Journeyman Geek, Moses Jan 17 '14 at 4:25
This question has been asked before and already has an answer. If those answers do not fully address your question, please ask a new question.
Recommendations of entire product categories can be being a specific product plug. Weighing the pros and cons of various free or paid solutions is also common discourse. – kmarsh Jan 15 '14 at 22:53
OK you have a point there. Maybe this needs to be nominated for duplicate status? – kmarsh Jan 15 '14 at 23:03
@kmarsh - I actually already voted to close it because the author seems to be looking for product recommendations ( or the original revision of the question was one ). – Ramhound Jan 15 '14 at 23:24
@Ramhound Since I'm already involved I think I will defer to other moderators and go with whatever their consensus is. – kmarsh Jan 16 '14 at 15:37
3 Answers 3
up vote 1 down vote accepted
Free solutions such as G4L and Clonezilla can operate both over a network to a file server, or direct connect to SATA/SCSI or a USB-SATA adapter as either the source or the destination. They compress the image takes up less space than the drive or partition being imaged. To optimize beforehand it is best to zero empty space.
Paid solutions include Ghost (now Symantec System Recovery) and Acronis True Image. I have used the latter in its free download form from Western Digital, and it is convenient in that it does not require a network or CD boot like G4L does. I believe Seagate offers similar free functionality in the form of DiscWizard.
share|improve this answer
I use R-Drive Image for this exact purpose.
Some of the Key reasons I purchased it:
1. It has great compression.
2. It supports raw bit for bit disk images.
3. You can tell it to ignore errors and keep trying (for data recovery purposes).
4. File System support is not needed (because it can do a raw bit for bit) but it does support many (including expand when restoring to a larger drive).
5. You can restore individual files and folders (for the many file systems it supports).
6. You can mount images for read-only purposes (logical data recovery is the main thing I use this for).
7. It can check image files for errors after creating it (think checking a CD/DVD after burning it).
share|improve this answer
I cheat. I write a file full of Zeros to the disk, then delete the file. I then use dd and gzip (or similar) to compress the drive, getting really good compression on the parts of the disk which are full of zeros. I then get an exact duplicate of the disk which is efficient from a space point of view (but not very fast to accomplish)
This is not a 1 step process, but should be able to be scripted into a single command easily enough. (At least under Linux).
share|improve this answer
How does this allow for data recovery? The author wants to be able to reverse the process. What you describe would destroy the data and would literally kill a SSD. – Ramhound Jan 15 '14 at 23:23
I think you might have misintepreted me. I did not say overwrite the disk with Zeros, I said create a file full of zeros, then delete that file. That process takes the free space and makes it zeros, which compress well. You then have a filesystem/filesystems which are more compressible, and you simply compress the entire block device (for example cat /dev/sda | gzip > /backuplocation/sda.gz - to undo this, gunzip < /backuplocation/sda.gz > /dev/sda – davidgo Jan 16 '14 at 0:17
Clarify your answer and I will remove my downvote – Ramhound Jan 16 '14 at 2:06
This is not an answer to the original question but an explanation for part of my answer. As such it should really be a comment under my answer. I suggest deleting it as an answer and creating that comment. – kmarsh Jan 16 '14 at 15:36
Not the answer you're looking for? Browse other questions tagged or ask your own question.
|
{
"url": "http://superuser.com/questions/702276/archive-entire-hard-drive",
"source_domain": "superuser.com",
"snapshot_id": "crawl=CC-MAIN-2015-18",
"warc_metadata": {
"Content-Length": "79120",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:RD53ZHCGSO44CFGXGXLTEH4CPC6TE7AA",
"WARC-Concurrent-To": "<urn:uuid:f734acf1-6f5b-414e-ac80-317d951ca65b>",
"WARC-Date": "2015-04-25T00:27:07Z",
"WARC-IP-Address": "141.101.114.59",
"WARC-Identified-Payload-Type": null,
"WARC-Payload-Digest": "sha1:3X4OO65H2KKATMMQ2FHPNMINGBBT4PFD",
"WARC-Record-ID": "<urn:uuid:7b0e67d5-7b28-46e5-a509-eaa5f5157cd6>",
"WARC-Target-URI": "http://superuser.com/questions/702276/archive-entire-hard-drive",
"WARC-Truncated": "length",
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:54d54233-3b51-4171-a0de-08aa243970c7>"
},
"warc_info": "robots: classic\r\nhostname: ip-10-235-10-82.ec2.internal\r\nsoftware: Nutch 1.6 (CC)/CC WarcExport 1.0\r\nisPartOf: CC-MAIN-2015-18\r\noperator: CommonCrawl Admin\r\ndescription: Wide crawl of the web for April 2015\r\npublisher: CommonCrawl\r\nformat: WARC File Format 1.0\r\nconformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf"
}
|
{
"line_start_idx": [
0,
25,
150,
151,
193,
194,
251,
252,
264,
663,
664,
678,
679,
718,
774,
818,
885,
931,
964,
992,
993,
1080,
1081,
1224,
1225,
1230,
1430,
1435,
1547,
1552,
1752,
1757,
1906,
1907,
1919,
1920,
1949,
1950,
2277,
2278,
2597,
2598,
2624,
2625,
2669,
2670,
2710,
2711,
2742,
2788,
2872,
3027,
3118,
3225,
3328,
3354,
3355,
3691,
3692,
3817,
3818,
3844,
3849,
4045,
4050,
4533,
4538,
4619,
4624,
4860,
4861
],
"line_end_idx": [
25,
150,
151,
193,
194,
251,
252,
264,
663,
664,
678,
679,
718,
774,
818,
885,
931,
964,
992,
993,
1080,
1081,
1224,
1225,
1230,
1430,
1435,
1547,
1552,
1752,
1757,
1906,
1907,
1919,
1920,
1949,
1950,
2277,
2278,
2597,
2598,
2624,
2625,
2669,
2670,
2710,
2711,
2742,
2788,
2872,
3027,
3118,
3225,
3328,
3354,
3355,
3691,
3692,
3817,
3818,
3844,
3849,
4045,
4050,
4533,
4538,
4619,
4624,
4860,
4861,
4951
]
}
|
{
"red_pajama_v2": {
"ccnet_original_length": 4951,
"ccnet_original_nlines": 70,
"rps_doc_curly_bracket": 0,
"rps_doc_ldnoobw_words": 0,
"rps_doc_lorem_ipsum": 0,
"rps_doc_stop_word_fraction": 0.35885167121887207,
"rps_doc_ut1_blacklist": 0,
"rps_doc_frac_all_caps_words": 0.035406701266765594,
"rps_doc_frac_lines_end_with_ellipsis": 0,
"rps_doc_frac_no_alph_words": 0.2191387563943863,
"rps_doc_frac_unique_words": 0.4378698170185089,
"rps_doc_mean_word_length": 4.536094665527344,
"rps_doc_num_sentences": 59,
"rps_doc_symbol_to_word_ratio": 0,
"rps_doc_unigram_entropy": 5.39314603805542,
"rps_doc_word_count": 845,
"rps_doc_frac_chars_dupe_10grams": 0,
"rps_doc_frac_chars_dupe_5grams": 0.04226453974843025,
"rps_doc_frac_chars_dupe_6grams": 0.026089230552315712,
"rps_doc_frac_chars_dupe_7grams": 0,
"rps_doc_frac_chars_dupe_8grams": 0,
"rps_doc_frac_chars_dupe_9grams": 0,
"rps_doc_frac_chars_top_2gram": 0.009392119944095612,
"rps_doc_frac_chars_top_3gram": 0.01043569017201662,
"rps_doc_frac_chars_top_4gram": 0.009392119944095612,
"rps_doc_books_importance": -464.3415222167969,
"rps_doc_books_importance_length_correction": -464.3415222167969,
"rps_doc_openwebtext_importance": -281.500732421875,
"rps_doc_openwebtext_importance_length_correction": -281.500732421875,
"rps_doc_wikipedia_importance": -231.49493408203125,
"rps_doc_wikipedia_importance_length_correction": -231.49493408203125
},
"fasttext": {
"dclm": 0.5187259316444397,
"english": 0.9273950457572937,
"fineweb_edu_approx": 1.6530983448028564,
"eai_general_math": 0.2326204776763916,
"eai_open_web_math": 0.3212703466415405,
"eai_web_code": 0.001993240090087056
}
}
|
{
"free_decimal_correspondence": {
"primary": {
"code": "004.6",
"labels": {
"level_1": "General works, books and libraries, information sciences",
"level_2": "",
"level_3": "Computers and Computer science"
}
},
"secondary": {
"code": "005.72",
"labels": {
"level_1": "General works, books and libraries, information sciences",
"level_2": "",
"level_3": "Computer programming"
}
}
},
"bloom_cognitive_process": {
"primary": {
"code": "3",
"label": "Apply"
},
"secondary": {
"code": "2",
"label": "Understand"
}
},
"bloom_knowledge_domain": {
"primary": {
"code": "3",
"label": "Procedural"
},
"secondary": {
"code": "2",
"label": "Conceptual"
}
},
"document_type_v1": {
"primary": {
"code": "5",
"label": "Social/Forum"
},
"secondary": {
"code": "3",
"label": "Reference/Encyclopedic/Educational"
}
},
"extraction_artifacts": {
"primary": {
"code": "3",
"label": "Irrelevant Content"
},
"secondary": {
"code": "1",
"label": "Leftover HTML"
}
},
"missing_content": {
"primary": {
"code": "0",
"label": "No missing content"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"document_type_v2": {
"primary": {
"code": "18",
"label": "Q&A Forum"
},
"secondary": {
"code": "23",
"label": "Tutorial"
}
},
"reasoning_depth": {
"primary": {
"code": "2",
"label": "Basic Reasoning"
},
"secondary": {
"code": "3",
"label": "Intermediate Reasoning"
}
},
"technical_correctness": {
"primary": {
"code": "3",
"label": "Mostly Correct"
},
"secondary": {
"code": "4",
"label": "Highly Correct"
}
},
"education_level": {
"primary": {
"code": "2",
"label": "High School Level"
},
"secondary": {
"code": "3",
"label": "Undergraduate Level"
}
}
}
|
672f1e42c33a7f9846924a2431ea77df
|
-2,848,147,984,470,745,000 |
csdnceshi60
2011-08-06 02:34 阅读 394
与 Project Euler 的速度比较: c vs Erlang vs Haskell
I have taken Problem #12 from Project Euler as a programming exercise and to compare my (surely not optimal) implementations in C, Python, Erlang and Haskell. In order to get some higher execution times, I search for the first triangle number with more than 1000 divisors instead of 500 as stated in the original problem.
The result is the following:
C:
lorenzo@enzo:~/erlang$ gcc -lm -o euler12.bin euler12.c
lorenzo@enzo:~/erlang$ time ./euler12.bin
842161320
real 0m11.074s
user 0m11.070s
sys 0m0.000s
Python:
lorenzo@enzo:~/erlang$ time ./euler12.py
842161320
real 1m16.632s
user 1m16.370s
sys 0m0.250s
Python with PyPy:
lorenzo@enzo:~/Downloads/pypy-c-jit-43780-b590cf6de419-linux64/bin$ time ./pypy /home/lorenzo/erlang/euler12.py
842161320
real 0m13.082s
user 0m13.050s
sys 0m0.020s
Erlang:
lorenzo@enzo:~/erlang$ erlc euler12.erl
lorenzo@enzo:~/erlang$ time erl -s euler12 solve
Erlang R13B03 (erts-5.7.4) [source] [64-bit] [smp:4:4] [rq:4] [async-threads:0] [hipe] [kernel-poll:false]
Eshell V5.7.4 (abort with ^G)
1> 842161320
real 0m48.259s
user 0m48.070s
sys 0m0.020s
Haskell:
lorenzo@enzo:~/erlang$ ghc euler12.hs -o euler12.hsx
[1 of 1] Compiling Main ( euler12.hs, euler12.o )
Linking euler12.hsx ...
lorenzo@enzo:~/erlang$ time ./euler12.hsx
842161320
real 2m37.326s
user 2m37.240s
sys 0m0.080s
Summary:
• C: 100%
• Python: 692% (118% with PyPy)
• Erlang: 436% (135% thanks to RichardC)
• Haskell: 1421%
I suppose that C has a big advantage as it uses long for the calculations and not arbitrary length integers as the other three. Also it doesn't need to load a runtime first (Do the others?).
Question 1: Do Erlang, Python and Haskell lose speed due to using arbitrary length integers or don't they as long as the values are less than MAXINT?
Question 2: Why is Haskell so slow? Is there a compiler flag that turns off the brakes or is it my implementation? (The latter is quite probable as Haskell is a book with seven seals to me.)
Question 3: Can you offer me some hints how to optimize these implementations without changing the way I determine the factors? Optimization in any way: nicer, faster, more "native" to the language.
EDIT:
Question 4: Do my functional implementations permit LCO (last call optimization, a.k.a tail recursion elimination) and hence avoid adding unnecessary frames onto the call stack?
I really tried to implement the same algorithm as similar as possible in the four languages, although I have to admit that my Haskell and Erlang knowledge is very limited.
Source codes used:
#include <stdio.h>
#include <math.h>
int factorCount (long n)
{
double square = sqrt (n);
int isquare = (int) square;
int count = isquare == square ? -1 : 0;
long candidate;
for (candidate = 1; candidate <= isquare; candidate ++)
if (0 == n % candidate) count += 2;
return count;
}
int main ()
{
long triangle = 1;
int index = 1;
while (factorCount (triangle) < 1001)
{
index ++;
triangle += index;
}
printf ("%ld\n", triangle);
}
#! /usr/bin/env python3.2
import math
def factorCount (n):
square = math.sqrt (n)
isquare = int (square)
count = -1 if isquare == square else 0
for candidate in range (1, isquare + 1):
if not n % candidate: count += 2
return count
triangle = 1
index = 1
while factorCount (triangle) < 1001:
index += 1
triangle += index
print (triangle)
-module (euler12).
-compile (export_all).
factorCount (Number) -> factorCount (Number, math:sqrt (Number), 1, 0).
factorCount (_, Sqrt, Candidate, Count) when Candidate > Sqrt -> Count;
factorCount (_, Sqrt, Candidate, Count) when Candidate == Sqrt -> Count + 1;
factorCount (Number, Sqrt, Candidate, Count) ->
case Number rem Candidate of
0 -> factorCount (Number, Sqrt, Candidate + 1, Count + 2);
_ -> factorCount (Number, Sqrt, Candidate + 1, Count)
end.
nextTriangle (Index, Triangle) ->
Count = factorCount (Triangle),
if
Count > 1000 -> Triangle;
true -> nextTriangle (Index + 1, Triangle + Index + 1)
end.
solve () ->
io:format ("~p~n", [nextTriangle (1, 1) ] ),
halt (0).
factorCount number = factorCount' number isquare 1 0 - (fromEnum $ square == fromIntegral isquare)
where square = sqrt $ fromIntegral number
isquare = floor square
factorCount' number sqrt candidate count
| fromIntegral candidate > sqrt = count
| number `mod` candidate == 0 = factorCount' number sqrt (candidate + 1) (count + 2)
| otherwise = factorCount' number sqrt (candidate + 1) count
nextTriangle index triangle
| factorCount triangle > 1000 = triangle
| otherwise = nextTriangle (index + 1) (triangle + index + 1)
main = print $ nextTriangle 1 1
转载于:https://stackoverflow.com/questions/6964392/speed-comparison-with-project-euler-c-vs-python-vs-erlang-vs-haskell
• 点赞
• 写回答
• 关注问题
• 收藏
• 复制链接分享
18条回答 默认 最新
• 已采纳
weixin_41568196 撒拉嘿哟木头 2011-08-06 04:25
Using GHC 7.0.3, gcc 4.4.6, Linux 2.6.29 on an x86_64 Core2 Duo (2.5GHz) machine, compiling using ghc -O2 -fllvm -fforce-recomp for Haskell and gcc -O3 -lm for C.
• Your C routine runs in 8.4 seconds (faster than your run probably because of -O3)
• The Haskell solution runs in 36 seconds (due to the -O2 flag)
• Your factorCount' code isn't explicitly typed and defaulting to Integer (thanks to Daniel for correcting my misdiagnosis here!). Giving an explicit type signature (which is standard practice anyway) using Int and the time changes to 11.1 seconds
• in factorCount' you have needlessly called fromIntegral. A fix results in no change though (the compiler is smart, lucky for you).
• You used mod where rem is faster and sufficient. This changes the time to 8.5 seconds.
• factorCount' is constantly applying two extra arguments that never change (number, sqrt). A worker/wrapper transformation gives us:
$ time ./so
842161320
real 0m7.954s
user 0m7.944s
sys 0m0.004s
That's right, 7.95 seconds. Consistently half a second faster than the C solution. Without the -fllvm flag I'm still getting 8.182 seconds, so the NCG backend is doing well in this case too.
Conclusion: Haskell is awesome.
Resulting Code
factorCount number = factorCount' number isquare 1 0 - (fromEnum $ square == fromIntegral isquare)
where square = sqrt $ fromIntegral number
isquare = floor square
factorCount' :: Int -> Int -> Int -> Int -> Int
factorCount' number sqrt candidate0 count0 = go candidate0 count0
where
go candidate count
| candidate > sqrt = count
| number `rem` candidate == 0 = go (candidate + 1) (count + 2)
| otherwise = go (candidate + 1) count
nextTriangle index triangle
| factorCount triangle > 1000 = triangle
| otherwise = nextTriangle (index + 1) (triangle + index + 1)
main = print $ nextTriangle 1 1
EDIT: So now that we've explored that, lets address the questions
Question 1: Do erlang, python and haskell lose speed due to using arbitrary length integers or don't they as long as the values are less than MAXINT?
In Haskell, using Integer is slower than Int but how much slower depends on the computations performed. Luckily (for 64 bit machines) Int is sufficient. For portability sake you should probably rewrite my code to use Int64 or Word64 (C isn't the only language with a long).
Question 2: Why is haskell so slow? Is there a compiler flag that turns off the brakes or is it my implementation? (The latter is quite probable as haskell is a book with seven seals to me.)
Question 3: Can you offer me some hints how to optimize these implementations without changing the way I determine the factors? Optimization in any way: nicer, faster, more "native" to the language.
That was what I answered above. The answer was
• 0) Use optimization via -O2
• 1) Use fast (notably: unbox-able) types when possible
• 2) rem not mod (a frequently forgotten optimization) and
• 3) worker/wrapper transformation (perhaps the most common optimization).
Question 4: Do my functional implementations permit LCO and hence avoid adding unnecessary frames onto the call stack?
Yes, that wasn't the issue. Good work and glad you considered this.
点赞 27 评论 复制链接分享
• csdnceshi73 喵-见缝插针 2011-08-07 20:04
In regards to Python optimization, in addition to using PyPy (for pretty impressive speed-ups with zero change to your code), you could use PyPy's translation toolchain to compile an RPython-compliant version, or Cython to build an extension module, both of which are faster than the C version in my testing, with the Cython module nearly twice as fast. For reference I include C and PyPy benchmark results as well:
C (compiled with gcc -O3 -lm)
% time ./euler12-c
842161320
./euler12-c 11.95s
user 0.00s
system 99%
cpu 11.959 total
PyPy 1.5
% time pypy euler12.py
842161320
pypy euler12.py
16.44s user
0.01s system
99% cpu 16.449 total
RPython (using latest PyPy revision, c2f583445aee)
% time ./euler12-rpython-c
842161320
./euler12-rpy-c
10.54s user 0.00s
system 99%
cpu 10.540 total
Cython 0.15
% time python euler12-cython.py
842161320
python euler12-cython.py
6.27s user 0.00s
system 99%
cpu 6.274 total
The RPython version has a couple of key changes. To translate into a standalone program you need to define your target, which in this case is the main function. It's expected to accept sys.argv as it's only argument, and is required to return an int. You can translate it by using translate.py, % translate.py euler12-rpython.py which translates to C and compiles it for you.
# euler12-rpython.py
import math, sys
def factorCount(n):
square = math.sqrt(n)
isquare = int(square)
count = -1 if isquare == square else 0
for candidate in xrange(1, isquare + 1):
if not n % candidate: count += 2
return count
def main(argv):
triangle = 1
index = 1
while factorCount(triangle) < 1001:
index += 1
triangle += index
print triangle
return 0
if __name__ == '__main__':
main(sys.argv)
def target(*args):
return main, None
The Cython version was rewritten as an extension module _euler12.pyx, which I import and call from a normal python file. The _euler12.pyx is essentially the same as your version, with some additional static type declarations. The setup.py has the normal boilerplate to build the extension, using python setup.py build_ext --inplace.
# _euler12.pyx
from libc.math cimport sqrt
cdef int factorCount(int n):
cdef int candidate, isquare, count
cdef double square
square = sqrt(n)
isquare = int(square)
count = -1 if isquare == square else 0
for candidate in range(1, isquare + 1):
if not n % candidate: count += 2
return count
cpdef main():
cdef int triangle = 1, index = 1
while factorCount(triangle) < 1001:
index += 1
triangle += index
print triangle
# euler12-cython.py
import _euler12
_euler12.main()
# setup.py
from distutils.core import setup
from distutils.extension import Extension
from Cython.Distutils import build_ext
ext_modules = [Extension("_euler12", ["_euler12.pyx"])]
setup(
name = 'Euler12-Cython',
cmdclass = {'build_ext': build_ext},
ext_modules = ext_modules
)
I honestly have very little experience with either RPython or Cython, and was pleasantly surprised at the results. If you are using CPython, writing your CPU-intensive bits of code in a Cython extension module seems like a really easy way to optimize your program.
点赞 23 评论 复制链接分享
• csdnceshi69 YaoRaoLov 2011-08-06 14:20
There are some problems with the Erlang implementation. As baseline for the following, my measured execution time for your unmodified Erlang program was 47.6 seconds, compared to 12.7 seconds for the C code.
The first thing you should do if you want to run computationally intensive Erlang code is to use native code. Compiling with erlc +native euler12 got the time down to 41.3 seconds. This is however a much lower speedup (just 15%) than expected from native compilation on this kind of code, and the problem is your use of -compile(export_all). This is useful for experimentation, but the fact that all functions are potentially reachable from the outside causes the native compiler to be very conservative. (The normal BEAM emulator is not that much affected.) Replacing this declaration with -export([solve/0]). gives a much better speedup: 31.5 seconds (almost 35% from the baseline).
But the code itself has a problem: for each iteration in the factorCount loop, you perform this test:
factorCount (_, Sqrt, Candidate, Count) when Candidate == Sqrt -> Count + 1;
The C code doesn't do this. In general, it can be tricky to make a fair comparison between different implementations of the same code, and in particular if the algorithm is numerical, because you need to be sure that they are actually doing the same thing. A slight rounding error in one implementation due to some typecast somewhere may cause it to do many more iterations than the other even though both eventually reach the same result.
To eliminate this possible error source (and get rid of the extra test in each iteration), I rewrote the factorCount function as follows, closely modelled on the C code:
factorCount (N) ->
Sqrt = math:sqrt (N),
ISqrt = trunc(Sqrt),
if ISqrt == Sqrt -> factorCount (N, ISqrt, 1, -1);
true -> factorCount (N, ISqrt, 1, 0)
end.
factorCount (_N, ISqrt, Candidate, Count) when Candidate > ISqrt -> Count;
factorCount ( N, ISqrt, Candidate, Count) ->
case N rem Candidate of
0 -> factorCount (N, ISqrt, Candidate + 1, Count + 2);
_ -> factorCount (N, ISqrt, Candidate + 1, Count)
end.
This rewrite, no export_all, and native compilation, gave me the following run time:
$ erlc +native euler12.erl
$ time erl -noshell -s euler12 solve
842161320
real 0m19.468s
user 0m19.450s
sys 0m0.010s
which is not too bad compared to the C code:
$ time ./a.out
842161320
real 0m12.755s
user 0m12.730s
sys 0m0.020s
considering that Erlang is not at all geared towards writing numerical code, being only 50% slower than C on a program like this is pretty good.
Finally, regarding your questions:
Question 1: Do erlang, python and haskell loose speed due to using arbitrary length integers or don't they as long as the values are less than MAXINT?
Yes, somewhat. In Erlang, there is no way of saying "use 32/64-bit arithmetic with wrap-around", so unless the compiler can prove some bounds on your integers (and it usually can't), it must check all computations to see if they can fit in a single tagged word or if it has to turn them into heap-allocated bignums. Even if no bignums are ever used in practice at runtime, these checks will have to be performed. On the other hand, that means you know that the algorithm will never fail because of an unexpected integer wraparound if you suddenly give it larger inputs than before.
Question 4: Do my functional implementations permit LCO and hence avoid adding unnecessary frames onto the call stack?
Yes, your Erlang code is correct with respect to last call optimization.
点赞 21 评论 复制链接分享
• csdnceshi73 喵-见缝插针 2011-08-12 08:53
Question 3: Can you offer me some hints how to optimize these implementations without changing the way I determine the factors? Optimization in any way: nicer, faster, more "native" to the language.
The C implementation is suboptimal (as hinted at by Thomas M. DuBuisson), the version uses 64-bit integers (i.e. long datatype). I'll investigate the assembly listing later, but with an educated guess, there are some memory accesses going on in the compiled code, which make using 64-bit integers significantly slower. It's that or generated code (be it the fact that you can fit less 64-bit ints in a SSE register or round a double to a 64-bit integer is slower).
Here is the modified code (simply replace long with int and I explicitly inlined factorCount, although I do not think that this is necessary with gcc -O3):
#include <stdio.h>
#include <math.h>
static inline int factorCount(int n)
{
double square = sqrt (n);
int isquare = (int)square;
int count = isquare == square ? -1 : 0;
int candidate;
for (candidate = 1; candidate <= isquare; candidate ++)
if (0 == n % candidate) count += 2;
return count;
}
int main ()
{
int triangle = 1;
int index = 1;
while (factorCount (triangle) < 1001)
{
index++;
triangle += index;
}
printf ("%d\n", triangle);
}
Running + timing it gives:
$ gcc -O3 -lm -o euler12 euler12.c; time ./euler12
842161320
./euler12 2.95s user 0.00s system 99% cpu 2.956 total
For reference, the haskell implementation by Thomas in the earlier answer gives:
$ ghc -O2 -fllvm -fforce-recomp euler12.hs; time ./euler12 [9:40]
[1 of 1] Compiling Main ( euler12.hs, euler12.o )
Linking euler12 ...
842161320
./euler12 9.43s user 0.13s system 99% cpu 9.602 total
Conclusion: Taking nothing away from ghc, its a great compiler, but gcc normally generates faster code.
点赞 10 评论 复制链接分享
• csdnceshi65 larry*wei 2016-02-28 19:26
Some more numbers and explanations for the C version. Apparently noone did it during all those years. Remember to upvote this answer so it can get on top for everyone to see and learn.
Step One: Benchmark of the author's programs
Laptop Specifications:
• CPU i3 M380 (931 MHz - maximum battery saving mode)
• 4GB memory
• Win7 64 bits
• Microsoft Visual Studio 2012 Ultimate
• Cygwin with gcc 4.9.3
• Python 2.7.10
Commands:
compiling on VS x64 command prompt > `for /f %f in ('dir /b *.c') do cl /O2 /Ot /Ox %f -o %f_x64_vs2012.exe`
compiling on cygwin with gcc x64 > `for f in ./*.c; do gcc -m64 -O3 $f -o ${f}_x64_gcc.exe ; done`
time (unix tools) using cygwin > `for f in ./*.exe; do echo "----------"; echo $f ; time $f ; done`
.
----------
$ time python ./original.py
real 2m17.748s
user 2m15.783s
sys 0m0.093s
----------
$ time ./original_x86_vs2012.exe
real 0m8.377s
user 0m0.015s
sys 0m0.000s
----------
$ time ./original_x64_vs2012.exe
real 0m8.408s
user 0m0.000s
sys 0m0.015s
----------
$ time ./original_x64_gcc.exe
real 0m20.951s
user 0m20.732s
sys 0m0.030s
Filenames are: integertype_architecture_compiler.exe
• integertype is the same as the original program for now (more on that later)
• architecture is x86 or x64 depending on the compiler settings
• compiler is gcc or vs2012
Step Two: Investigate, Improve and Benchmark Again
VS is 250% faster than gcc. The two compilers should give a similar speed. Obviously, something is wrong with the code or the compiler options. Let's investigate!
The first point of interest is the integer types. Conversions can be expensive and consistency is important for better code generation & optimizations. All integers should be the same type.
It's a mixed mess of int and long right now. We're going to improve that. What type to use? The fastest. Gotta benchmark them'all!
----------
$ time ./int_x86_vs2012.exe
real 0m8.440s
user 0m0.016s
sys 0m0.015s
----------
$ time ./int_x64_vs2012.exe
real 0m8.408s
user 0m0.016s
sys 0m0.015s
----------
$ time ./int32_x86_vs2012.exe
real 0m8.408s
user 0m0.000s
sys 0m0.015s
----------
$ time ./int32_x64_vs2012.exe
real 0m8.362s
user 0m0.000s
sys 0m0.015s
----------
$ time ./int64_x86_vs2012.exe
real 0m18.112s
user 0m0.000s
sys 0m0.015s
----------
$ time ./int64_x64_vs2012.exe
real 0m18.611s
user 0m0.000s
sys 0m0.015s
----------
$ time ./long_x86_vs2012.exe
real 0m8.393s
user 0m0.015s
sys 0m0.000s
----------
$ time ./long_x64_vs2012.exe
real 0m8.440s
user 0m0.000s
sys 0m0.015s
----------
$ time ./uint32_x86_vs2012.exe
real 0m8.362s
user 0m0.000s
sys 0m0.015s
----------
$ time ./uint32_x64_vs2012.exe
real 0m8.393s
user 0m0.015s
sys 0m0.015s
----------
$ time ./uint64_x86_vs2012.exe
real 0m15.428s
user 0m0.000s
sys 0m0.015s
----------
$ time ./uint64_x64_vs2012.exe
real 0m15.725s
user 0m0.015s
sys 0m0.015s
----------
$ time ./int_x64_gcc.exe
real 0m8.531s
user 0m8.329s
sys 0m0.015s
----------
$ time ./int32_x64_gcc.exe
real 0m8.471s
user 0m8.345s
sys 0m0.000s
----------
$ time ./int64_x64_gcc.exe
real 0m20.264s
user 0m20.186s
sys 0m0.015s
----------
$ time ./long_x64_gcc.exe
real 0m20.935s
user 0m20.809s
sys 0m0.015s
----------
$ time ./uint32_x64_gcc.exe
real 0m8.393s
user 0m8.346s
sys 0m0.015s
----------
$ time ./uint64_x64_gcc.exe
real 0m16.973s
user 0m16.879s
sys 0m0.030s
Integer types are int long int32_t uint32_t int64_t and uint64_t from #include <stdint.h>
There are LOTS of integer types in C, plus some signed/unsigned to play with, plus the choice to compile as x86 or x64 (not to be confused with the actual integer size). That is a lot of versions to compile and run ^^
Step Three: Understanding the Numbers
Definitive conclusions:
• 32 bits integers are ~200% faster than 64 bits equivalents
• unsigned 64 bits integers are 25 % faster than signed 64 bits (Unfortunately, I have no explanation for that)
Trick question: "What are the sizes of int and long in C?"
The right answer is: The size of int and long in C are not well-defined!
From the C spec:
int is at least 32 bits
long is at least an int
From the gcc man page (-m32 and -m64 flags):
The 32-bit environment sets int, long and pointer to 32 bits and generates code that runs on any i386 system.
The 64-bit environment sets int to 32 bits and long and pointer to 64 bits and generates code for AMD’s x86-64 architecture.
From MSDN documentation (Data Type Ranges) https://msdn.microsoft.com/en-us/library/s3f49ktz%28v=vs.110%29.aspx :
int, 4 bytes, also knows as signed
long, 4 bytes, also knows as long int and signed long int
To Conclude This: Lessons Learned
• 32 bits integers are faster than 64 bits integers.
• Standard integers types are not well defined in C nor C++, they vary depending on compilers and architectures. When you need consistency and predictability, use the uint32_t integer family from #include <stdint.h>.
• Speed issues solved. All other languages are back hundreds percent behind, C & C++ win again ! They always do. The next improvement will be multithreading using OpenMP :D
点赞 10 评论 复制链接分享
• csdnceshi63 elliott.david 2011-08-06 04:16
Question 1: Do erlang, python and haskell loose speed due to using arbitrary length integers or don't they as long as the values are less than MAXINT?
This is unlikely. I cannot say much about Erlang and Haskell (well, maybe a bit about Haskell below) but I can point a lot of other bottlenecks in Python. Every time the program tries to execute an operation with some values in Python, it should verify whether the values are from the proper type, and it costs a bit of time. Your factorCount function just allocates a list with range (1, isquare + 1) various times, and runtime, malloc-styled memory allocation is way slower than iterating on a range with a counter as you do in C. Notably, the factorCount() is called multiple times and so allocates a lot of lists. Also, let us not forget that Python is interpreted and the CPython interpreter has no great focus on being optimized.
EDIT: oh, well, I note that you are using Python 3 so range() does not return a list, but a generator. In this case, my point about allocating lists is half-wrong: the function just allocates range objects, which are inefficient nonetheless but not as inefficient as allocating a list with a lot of items.
Question 2: Why is haskell so slow? Is there a compiler flag that turns off the brakes or is it my implementation? (The latter is quite probable as haskell is a book with seven seals to me.)
Are you using Hugs? Hugs is a considerably slow interpreter. If you are using it, maybe you can get a better time with GHC - but I am only cogitating hypotesis, the kind of stuff a good Haskell compiler does under the hood is pretty fascinating and way beyond my comprehension :)
Question 3: Can you offer me some hints how to optimize these implementations without changing the way I determine the factors? Optimization in any way: nicer, faster, more "native" to the language.
I'd say you are playing an unfunny game. The best part of knowing various languages is to use them the most different way possible :) But I digress, I just do not have any recommendation for this point. Sorry, I hope someone can help you in this case :)
Question 4: Do my functional implementations permit LCO and hence avoid adding unnecessary frames onto the call stack?
As far as I remember, you just need to make sure that your recursive call is the last command before returning a value. In other words, a function like the one below could use such optimization:
def factorial(n, acc=1):
if n > 1:
acc = acc * n
n = n - 1
return factorial(n, acc)
else:
return acc
However, you would not have such optimization if your function were such as the one below, because there is an operation (multiplication) after the recursive call:
def factorial2(n):
if n > 1:
f = factorial2(n-1)
return f*n
else:
return 1
I separated the operations in some local variables for make it clear which operations are executed. However, the most usual is to see these functions as below, but they are equivalent for the point I am making:
def factorial(n, acc=1):
if n > 1:
return factorial(n-1, acc*n)
else:
return acc
def factorial2(n):
if n > 1:
return n*factorial(n-1)
else:
return 1
Note that it is up to the compiler/interpreter to decide if it will make tail recursion. For example, the Python interpreter does not do it if I remember well (I used Python in my example only because of its fluent syntax). Anyway, if you find strange stuff such as factorial functions with two parameters (and one of the parameters has names such as acc, accumulator etc.) now you know why people do it :)
点赞 9 评论 复制链接分享
• weixin_41568127 ?yb? 2017-01-25 22:30
Trying GO:
package main
import "fmt"
import "math"
func main() {
var n, m, c int
for i := 1; ; i++ {
n, m, c = i * (i + 1) / 2, int(math.Sqrt(float64(n))), 0
for f := 1; f < m; f++ {
if n % f == 0 { c++ }
}
c *= 2
if m * m == n { c ++ }
if c > 1001 {
fmt.Println(n)
break
}
}
}
I get:
original c version: 9.1690 100%
go: 8.2520 111%
But using:
package main
import (
"math"
"fmt"
)
// Sieve of Eratosthenes
func PrimesBelow(limit int) []int {
switch {
case limit < 2:
return []int{}
case limit == 2:
return []int{2}
}
sievebound := (limit - 1) / 2
sieve := make([]bool, sievebound+1)
crosslimit := int(math.Sqrt(float64(limit))-1) / 2
for i := 1; i <= crosslimit; i++ {
if !sieve[i] {
for j := 2 * i * (i + 1); j <= sievebound; j += 2*i + 1 {
sieve[j] = true
}
}
}
plimit := int(1.3*float64(limit)) / int(math.Log(float64(limit)))
primes := make([]int, plimit)
p := 1
primes[0] = 2
for i := 1; i <= sievebound; i++ {
if !sieve[i] {
primes[p] = 2*i + 1
p++
if p >= plimit {
break
}
}
}
last := len(primes) - 1
for i := last; i > 0; i-- {
if primes[i] != 0 {
break
}
last = i
}
return primes[0:last]
}
func main() {
fmt.Println(p12())
}
// Requires PrimesBelow from utils.go
func p12() int {
n, dn, cnt := 3, 2, 0
primearray := PrimesBelow(1000000)
for cnt <= 1001 {
n++
n1 := n
if n1%2 == 0 {
n1 /= 2
}
dn1 := 1
for i := 0; i < len(primearray); i++ {
if primearray[i]*primearray[i] > n1 {
dn1 *= 2
break
}
exponent := 1
for n1%primearray[i] == 0 {
exponent++
n1 /= primearray[i]
}
if exponent > 1 {
dn1 *= exponent
}
if n1 == 1 {
break
}
}
cnt = dn * dn1
dn = dn1
}
return n * (n - 1) / 2
}
I get:
original c version: 9.1690 100%
thaumkid's c version: 0.1060 8650%
first go version: 8.2520 111%
second go version: 0.0230 39865%
I also tried Python3.6 and pypy3.3-5.5-alpha:
original c version: 8.629 100%
thaumkid's c version: 0.109 7916%
Python3.6: 54.795 16%
pypy3.3-5.5-alpha: 13.291 65%
and then with following code I got:
original c version: 8.629 100%
thaumkid's c version: 0.109 8650%
Python3.6: 1.489 580%
pypy3.3-5.5-alpha: 0.582 1483%
def D(N):
if N == 1: return 1
sqrtN = int(N ** 0.5)
nf = 1
for d in range(2, sqrtN + 1):
if N % d == 0:
nf = nf + 1
return 2 * nf - (1 if sqrtN**2 == N else 0)
L = 1000
Dt, n = 0, 0
while Dt <= L:
t = n * (n + 1) // 2
Dt = D(n/2)*D(n+1) if n%2 == 0 else D(n)*D((n+1)/2)
n = n + 1
print (t)
点赞 9 评论 复制链接分享
• weixin_41568110 七度&光 2014-03-08 18:42
Just for fun. The following is a more 'native' Haskell implementation:
import Control.Applicative
import Control.Monad
import Data.Either
import Math.NumberTheory.Powers.Squares
isInt :: RealFrac c => c -> Bool
isInt = (==) <$> id <*> fromInteger . round
intSqrt :: (Integral a) => a -> Int
--intSqrt = fromIntegral . floor . sqrt . fromIntegral
intSqrt = fromIntegral . integerSquareRoot'
factorize :: Int -> [Int]
factorize 1 = []
factorize n = first : factorize (quot n first)
where first = (!! 0) $ [a | a <- [2..intSqrt n], rem n a == 0] ++ [n]
factorize2 :: Int -> [(Int,Int)]
factorize2 = foldl (\ls@((val,freq):xs) y -> if val == y then (val,freq+1):xs else (y,1):ls) [(0,0)] . factorize
numDivisors :: Int -> Int
numDivisors = foldl (\acc (_,y) -> acc * (y+1)) 1 <$> factorize2
nextTriangleNumber :: (Int,Int) -> (Int,Int)
nextTriangleNumber (n,acc) = (n+1,acc+n+1)
forward :: Int -> (Int, Int) -> Either (Int, Int) (Int, Int)
forward k val@(n,acc) = if numDivisors acc > k then Left val else Right (nextTriangleNumber val)
problem12 :: Int -> (Int, Int)
problem12 n = (!!0) . lefts . scanl (>>=) (forward n (1,1)) . repeat . forward $ n
main = do
let (n,val) = problem12 1000
print val
Using ghc -O3, this consistently runs in 0.55-0.58 seconds on my machine (1.73GHz Core i7).
A more efficient factorCount function for the C version:
int factorCount (int n)
{
int count = 1;
int candidate,tmpCount;
while (n % 2 == 0) {
count++;
n /= 2;
}
for (candidate = 3; candidate < n && candidate * candidate < n; candidate += 2)
if (n % candidate == 0) {
tmpCount = 1;
do {
tmpCount++;
n /= candidate;
} while (n % candidate == 0);
count*=tmpCount;
}
if (n > 1)
count *= 2;
return count;
}
Changing longs to ints in main, using gcc -O3 -lm, this consistently runs in 0.31-0.35 seconds.
Both can be made to run even faster if you take advantage of the fact that the nth triangle number = n*(n+1)/2, and n and (n+1) have completely disparate prime factorizations, so the number of factors of each half can be multiplied to find the number of factors of the whole. The following:
int main ()
{
int triangle = 0,count1,count2 = 1;
do {
count1 = count2;
count2 = ++triangle % 2 == 0 ? factorCount(triangle+1) : factorCount((triangle+1)/2);
} while (count1*count2 < 1001);
printf ("%lld\n", ((long long)triangle)*(triangle+1)/2);
}
will reduce the c code run time to 0.17-0.19 seconds, and it can handle much larger searches -- greater than 10000 factors takes about 43 seconds on my machine. I leave a similar haskell speedup to the interested reader.
点赞 7 评论 复制链接分享
• weixin_41568134 MAO-EYE 2013-02-20 05:58
With Haskell, you really don't need to think in recursions explicitly.
factorCount number = foldr factorCount' 0 [1..isquare] -
(fromEnum $ square == fromIntegral isquare)
where
square = sqrt $ fromIntegral number
isquare = floor square
factorCount' candidate
| number `rem` candidate == 0 = (2 +)
| otherwise = id
triangles :: [Int]
triangles = scanl1 (+) [1,2..]
main = print . head $ dropWhile ((< 1001) . factorCount) triangles
In the above code, I have replaced explicit recursions in @Thomas' answer with common list operations. The code still does exactly the same thing without us worrying about tail recursion. It runs (~ 7.49s) about 6% slower than the version in @Thomas' answer (~ 7.04s) on my machine with GHC 7.6.2, while the C version from @Raedwulf runs ~ 3.15s. It seems GHC has improved over the year.
PS. I know it is an old question, and I stumble upon it from google searches (I forgot what I was searching, now...). Just wanted to comment on the question about LCO and express my feelings about Haskell in general. I wanted to comment on the top answer, but comments do not allow code blocks.
点赞 6 评论 复制链接分享
• csdnceshi50 三生石@ 2013-11-30 03:49
Change: case (divisor(T,round(math:sqrt(T))) > 500) of
To: case (divisor(T,round(math:sqrt(T))) > 1000) of
This will produce the correct answer for the Erlang multi-process example.
点赞 6 评论 复制链接分享
• csdnceshi64 游.程 2014-07-06 11:11
I made the assumption that the number of factors is only large if the numbers involved have many small factors. So I used thaumkid's excellent algorithm, but first used an approximation to the factor count that is never too small. It's quite simple: Check for prime factors up to 29, then check the remaining number and calculate an upper bound for the nmber of factors. Use this to calculate an upper bound for the number of factors, and if that number is high enough, calculate the exact number of factors.
The code below doesn't need this assumption for correctness, but to be fast. It seems to work; only about one in 100,000 numbers gives an estimate that is high enough to require a full check.
Here's the code:
// Return at least the number of factors of n.
static uint64_t approxfactorcount (uint64_t n)
{
uint64_t count = 1, add;
#define CHECK(d) \
do { \
if (n % d == 0) { \
add = count; \
do { n /= d; count += add; } \
while (n % d == 0); \
} \
} while (0)
CHECK ( 2); CHECK ( 3); CHECK ( 5); CHECK ( 7); CHECK (11); CHECK (13);
CHECK (17); CHECK (19); CHECK (23); CHECK (29);
if (n == 1) return count;
if (n < 1ull * 31 * 31) return count * 2;
if (n < 1ull * 31 * 31 * 37) return count * 4;
if (n < 1ull * 31 * 31 * 37 * 37) return count * 8;
if (n < 1ull * 31 * 31 * 37 * 37 * 41) return count * 16;
if (n < 1ull * 31 * 31 * 37 * 37 * 41 * 43) return count * 32;
if (n < 1ull * 31 * 31 * 37 * 37 * 41 * 43 * 47) return count * 64;
if (n < 1ull * 31 * 31 * 37 * 37 * 41 * 43 * 47 * 53) return count * 128;
if (n < 1ull * 31 * 31 * 37 * 37 * 41 * 43 * 47 * 53 * 59) return count * 256;
if (n < 1ull * 31 * 31 * 37 * 37 * 41 * 43 * 47 * 53 * 59 * 61) return count * 512;
if (n < 1ull * 31 * 31 * 37 * 37 * 41 * 43 * 47 * 53 * 59 * 61 * 67) return count * 1024;
if (n < 1ull * 31 * 31 * 37 * 37 * 41 * 43 * 47 * 53 * 59 * 61 * 67 * 71) return count * 2048;
if (n < 1ull * 31 * 31 * 37 * 37 * 41 * 43 * 47 * 53 * 59 * 61 * 67 * 71 * 73) return count * 4096;
return count * 1000000;
}
// Return the number of factors of n.
static uint64_t factorcount (uint64_t n)
{
uint64_t count = 1, add;
CHECK (2); CHECK (3);
uint64_t d = 5, inc = 2;
for (; d*d <= n; d += inc, inc = (6 - inc))
CHECK (d);
if (n > 1) count *= 2; // n must be a prime number
return count;
}
// Prints triangular numbers with record numbers of factors.
static void printrecordnumbers (uint64_t limit)
{
uint64_t record = 30000;
uint64_t count1, factor1;
uint64_t count2 = 1, factor2 = 1;
for (uint64_t n = 1; n <= limit; ++n)
{
factor1 = factor2;
count1 = count2;
factor2 = n + 1; if (factor2 % 2 == 0) factor2 /= 2;
count2 = approxfactorcount (factor2);
if (count1 * count2 > record)
{
uint64_t factors = factorcount (factor1) * factorcount (factor2);
if (factors > record)
{
printf ("%lluth triangular number = %llu has %llu factors\n", n, factor1 * factor2, factors);
record = factors;
}
}
}
}
This finds the 14,753,024th triangular with 13824 factors in about 0.7 seconds, the 879,207,615th triangular number with 61,440 factors in 34 seconds, the 12,524,486,975th triangular number with 138,240 factors in 10 minutes 5 seconds, and the 26,467,792,064th triangular number with 172,032 factors in 21 minutes 25 seconds (2.4GHz Core2 Duo), so this code takes only 116 processor cycles per number on average. The last triangular number itself is larger than 2^68, so
点赞 6 评论 复制链接分享
• csdnceshi70 笑故挽风 2014-08-15 07:12
C++11, < 20ms for me - Run it here
I understand that you want tips to help improve your language specific knowledge, but since that has been well covered here, I thought I would add some context for people who may have looked at the mathematica comment on your question, etc, and wondered why this code was so much slower.
This answer is mainly to provide context to hopefully help people evaluate the code in your question / other answers more easily.
This code uses only a couple of (uglyish) optimisations, unrelated to the language used, based on:
1. every traingle number is of the form n(n+1)/2
2. n and n+1 are coprime
3. the number of divisors is a multiplicative function
#include <iostream>
#include <cmath>
#include <tuple>
#include <chrono>
using namespace std;
// Calculates the divisors of an integer by determining its prime factorisation.
int get_divisors(long long n)
{
int divisors_count = 1;
for(long long i = 2;
i <= sqrt(n);
/* empty */)
{
int divisions = 0;
while(n % i == 0)
{
n /= i;
divisions++;
}
divisors_count *= (divisions + 1);
//here, we try to iterate more efficiently by skipping
//obvious non-primes like 4, 6, etc
if(i == 2)
i++;
else
i += 2;
}
if(n != 1) //n is a prime
return divisors_count * 2;
else
return divisors_count;
}
long long euler12()
{
//n and n + 1
long long n, n_p_1;
n = 1; n_p_1 = 2;
// divisors_x will store either the divisors of x or x/2
// (the later iff x is divisible by two)
long long divisors_n = 1;
long long divisors_n_p_1 = 2;
for(;;)
{
/* This loop has been unwound, so two iterations are completed at a time
* n and n + 1 have no prime factors in common and therefore we can
* calculate their divisors separately
*/
long long total_divisors; //the divisors of the triangle number
// n(n+1)/2
//the first (unwound) iteration
divisors_n_p_1 = get_divisors(n_p_1 / 2); //here n+1 is even and we
total_divisors =
divisors_n
* divisors_n_p_1;
if(total_divisors > 1000)
break;
//move n and n+1 forward
n = n_p_1;
n_p_1 = n + 1;
//fix the divisors
divisors_n = divisors_n_p_1;
divisors_n_p_1 = get_divisors(n_p_1); //n_p_1 is now odd!
//now the second (unwound) iteration
total_divisors =
divisors_n
* divisors_n_p_1;
if(total_divisors > 1000)
break;
//move n and n+1 forward
n = n_p_1;
n_p_1 = n + 1;
//fix the divisors
divisors_n = divisors_n_p_1;
divisors_n_p_1 = get_divisors(n_p_1 / 2); //n_p_1 is now even!
}
return (n * n_p_1) / 2;
}
int main()
{
for(int i = 0; i < 1000; i++)
{
using namespace std::chrono;
auto start = high_resolution_clock::now();
auto result = euler12();
auto end = high_resolution_clock::now();
double time_elapsed = duration_cast<milliseconds>(end - start).count();
cout << result << " " << time_elapsed << '\n';
}
return 0;
}
That takes around 19ms on average for my desktop and 80ms for my laptop, a far cry from most of the other code I've seen here. And there are, no doubt, many optimisations still available.
点赞 5 评论 复制链接分享
• csdnceshi57 perhaps? 2011-08-06 03:12
Take a look at this blog. Over the past year or so he's done a few of the Project Euler problems in Haskell and Python, and he's generally found Haskell to be much faster. I think that between those languages it has more to do with your fluency and coding style.
When it comes to Python speed, you're using the wrong implementation! Try PyPy, and for things like this you'll find it to be much, much faster.
点赞 4 评论 复制链接分享
• csdnceshi70 笑故挽风 2011-08-06 16:44
Looking at your Erlang implementation. The timing has included the start up of the entire virtual machine, running your program and halting the virtual machine. Am pretty sure that setting up and halting the erlang vm takes some time.
If the timing was done within the erlang virtual machine itself, results would be different as in that case we would have the actual time for only the program in question. Otherwise, i believe that the total time taken by the process of starting and loading of the Erlang Vm plus that of halting it (as you put it in your program) are all included in the total time which the method you are using to time the program is outputting. Consider using the erlang timing itself which we use when we want to time our programs within the virtual machine itself timer:tc/1 or timer:tc/2 or timer:tc/3. In this way, the results from erlang will exclude the time taken to start and stop/kill/halt the virtual machine. That is my reasoning there, think about it, and then try your bench mark again.
I actually suggest that we try to time the program (for languages that have a runtime), within the runtime of those languages in order to get a precise value. C for example has no overhead of starting and shutting down a runtime system as does Erlang, Python and Haskell (98% sure of this - i stand correction). So (based on this reasoning) i conclude by saying that this benchmark wasnot precise /fair enough for languages running on top of a runtime system. Lets do it again with these changes.
EDIT: besides even if all the languages had runtime systems, the overhead of starting each and halting it would differ. so i suggest we time from within the runtime systems (for the languages for which this applies). The Erlang VM is known to have considerable overhead at start up!
点赞 4 评论 复制链接分享
• csdnceshi52 妄徒之命 2013-10-12 04:43
Your Haskell implementation could be greatly sped up by using some functions from Haskell packages. In this case I used primes, which is just installed with 'cabal install primes' ;)
import Data.Numbers.Primes
import Data.List
triangleNumbers = scanl1 (+) [1..]
nDivisors n = product $ map ((+1) . length) (group (primeFactors n))
answer = head $ filter ((> 500) . nDivisors) triangleNumbers
main :: IO ()
main = putStrLn $ "First triangle number to have over 500 divisors: " ++ (show answer)
Timings:
Your original program:
PS> measure-command { bin\012_slow.exe }
TotalSeconds : 16.3807409
TotalMilliseconds : 16380.7409
Improved implementation
PS> measure-command { bin\012.exe }
TotalSeconds : 0.0383436
TotalMilliseconds : 38.3436
As you can see, this one runs in 38 milliseconds on the same machine where yours ran in 16 seconds :)
Compilation commands:
ghc -O2 012.hs -o bin\012.exe
ghc -O2 012_slow.hs -o bin\012_slow.exe
点赞 4 评论 复制链接分享
• csdnceshi51 旧行李 2013-10-15 10:23
Question 1: Do Erlang, Python and Haskell lose speed due to using arbitrary length integers or don't they as long as the values are less than MAXINT?
Question one can be answered in the negative for Erlang. The last question is answered by using Erlang appropriately, as in:
http://bredsaal.dk/learning-erlang-using-projecteuler-net
Since it's faster than your initial C example, I would guess there are numerous problems as others have already covered in detail.
This Erlang module executes on a cheap netbook in about 5 seconds ... It uses the network threads model in erlang and, as such demonstrates how to take advantage of the event model. It could be distributed over many nodes. And it's fast. Not my code.
-module(p12dist).
-author("Jannich Brendle, [email protected], http://blog.bredsaal.dk").
-compile(export_all).
server() ->
server(1).
server(Number) ->
receive {getwork, Worker_PID} -> Worker_PID ! {work,Number,Number+100},
server(Number+101);
{result,T} -> io:format("The result is: \~w.\~n", [T]);
_ -> server(Number)
end.
worker(Server_PID) ->
Server_PID ! {getwork, self()},
receive {work,Start,End} -> solve(Start,End,Server_PID)
end,
worker(Server_PID).
start() ->
Server_PID = spawn(p12dist, server, []),
spawn(p12dist, worker, [Server_PID]),
spawn(p12dist, worker, [Server_PID]),
spawn(p12dist, worker, [Server_PID]),
spawn(p12dist, worker, [Server_PID]).
solve(N,End,_) when N =:= End -> no_solution;
solve(N,End,Server_PID) ->
T=round(N*(N+1)/2),
case (divisor(T,round(math:sqrt(T))) > 500) of
true ->
Server_PID ! {result,T};
false ->
solve(N+1,End,Server_PID)
end.
divisors(N) ->
divisor(N,round(math:sqrt(N))).
divisor(_,0) -> 1;
divisor(N,I) ->
case (N rem I) =:= 0 of
true ->
2+divisor(N,I-1);
false ->
divisor(N,I-1)
end.
The test below took place on an: Intel(R) Atom(TM) CPU N270 @ 1.60GHz
~$ time erl -noshell -s p12dist start
The result is: 76576500.
^C
BREAK: (a)bort (c)ontinue (p)roc info (i)nfo (l)oaded
(v)ersion (k)ill (D)b-tables (d)istribution
a
real 0m5.510s
user 0m5.836s
sys 0m0.152s
点赞 1 评论 复制链接分享
• csdnceshi65 larry*wei 2013-12-20 06:27
I modified "Jannich Brendle" version to 1000 instead 500. And list the result of euler12.bin, euler12.erl, p12dist.erl. Both erl codes use '+native' to compile.
zhengs-MacBook-Pro:workspace zhengzhibin$ time erl -noshell -s p12dist start
The result is: 842161320.
real 0m3.879s
user 0m14.553s
sys 0m0.314s
zhengs-MacBook-Pro:workspace zhengzhibin$ time erl -noshell -s euler12 solve
842161320
real 0m10.125s
user 0m10.078s
sys 0m0.046s
zhengs-MacBook-Pro:workspace zhengzhibin$ time ./euler12.bin
842161320
real 0m5.370s
user 0m5.328s
sys 0m0.004s
zhengs-MacBook-Pro:workspace zhengzhibin$
点赞 评论 复制链接分享
• weixin_41568127 ?yb? 2014-01-29 18:05
#include <stdio.h>
#include <math.h>
int factorCount (long n)
{
double square = sqrt (n);
int isquare = (int) square+1;
long candidate = 2;
int count = 1;
while(candidate <= isquare && candidate<=n){
int c = 1;
while (n % candidate == 0) {
c++;
n /= candidate;
}
count *= c;
candidate++;
}
return count;
}
int main ()
{
long triangle = 1;
int index = 1;
while (factorCount (triangle) < 1001)
{
index ++;
triangle += index;
}
printf ("%ld\n", triangle);
}
gcc -lm -Ofast euler.c
time ./a.out
2.79s user 0.00s system 99% cpu 2.794 total
点赞 评论 复制链接分享
相关推荐
|
{
"url": "https://ask.csdn.net/questions/709769",
"source_domain": "ask.csdn.net",
"snapshot_id": "crawl=CC-MAIN-2021-25",
"warc_metadata": {
"Content-Length": "233990",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:NMN3CR5O7LBS6SVYXHPNVLIOCCGU6V7J",
"WARC-Concurrent-To": "<urn:uuid:dc4a915a-60ad-4e6f-ae90-b8d4448813cd>",
"WARC-Date": "2021-06-21T20:56:56Z",
"WARC-IP-Address": "47.95.50.136",
"WARC-Identified-Payload-Type": "text/html",
"WARC-Payload-Digest": "sha1:IZ2OVZUHJ5E4HSSI4XJ3ZHBBUOB574IH",
"WARC-Record-ID": "<urn:uuid:c74fcf4a-3f38-44d3-8120-9999cc35095d>",
"WARC-Target-URI": "https://ask.csdn.net/questions/709769",
"WARC-Truncated": null,
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:532a67c3-b888-46b6-9f1b-8a3f443c5841>"
},
"warc_info": "isPartOf: CC-MAIN-2021-25\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for June 2021\r\noperator: Common Crawl Admin ([email protected])\r\nhostname: ip-10-67-67-200.ec2.internal\r\nsoftware: Apache Nutch 1.18 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.2-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: https://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/"
}
|
{
"line_start_idx": [
0,
12,
36,
37,
83,
84,
406,
407,
436,
437,
440,
441,
497,
539,
549,
550,
568,
586,
599,
600,
608,
609,
651,
661,
662,
680,
698,
711,
712,
730,
731,
844,
854,
855,
873,
891,
904,
905,
913,
914,
955,
1004,
1111,
1112,
1143,
1156,
1157,
1175,
1193,
1206,
1207,
1216,
1217,
1270,
1332,
1356,
1399,
1409,
1410,
1428,
1446,
1459,
1460,
1469,
1470,
1482,
1516,
1559,
1578,
1579,
1770,
1771,
1921,
1922,
2113,
2114,
2313,
2314,
2320,
2321,
2499,
2500,
2672,
2673,
2674,
2693,
2694,
2713,
2731,
2732,
2757,
2759,
2789,
2821,
2865,
2885,
2945,
2989,
3007,
3009,
3010,
3022,
3024,
3047,
3066,
3108,
3114,
3132,
3159,
3165,
3197,
3199,
3200,
3226,
3227,
3239,
3240,
3261,
3288,
3315,
3358,
3403,
3444,
3461,
3462,
3475,
3485,
3522,
3537,
3559,
3560,
3577,
3578,
3597,
3620,
3621,
3693,
3694,
3766,
3767,
3844,
3845,
3893,
3926,
3993,
4055,
4064,
4065,
4099,
4135,
4142,
4176,
4241,
4250,
4251,
4263,
4312,
4326,
4327,
4426,
4472,
4505,
4506,
4547,
4591,
4680,
4745,
4746,
4774,
4819,
4885,
4886,
4918,
4919,
5036,
5037,
5044,
5052,
5061,
5068,
5079,
5080,
5092,
5093,
5101,
5145,
5146,
5313,
5314,
5402,
5470,
5722,
5859,
5952,
6090,
6107,
6124,
6129,
6153,
6177,
6201,
6206,
6207,
6402,
6403,
6439,
6440,
6459,
6460,
6563,
6613,
6650,
6655,
6707,
6777,
6789,
6814,
6849,
6920,
6967,
6972,
7004,
7053,
7123,
7128,
7164,
7169,
7170,
7240,
7241,
7395,
7396,
7674,
7675,
7870,
7871,
8074,
8075,
8126,
8127,
8161,
8221,
8284,
8363,
8364,
8487,
8488,
8560,
8561,
8581,
8621,
8622,
9042,
9043,
9077,
9078,
9102,
9116,
9121,
9146,
9163,
9180,
9202,
9207,
9208,
9221,
9222,
9249,
9263,
9285,
9302,
9320,
9345,
9350,
9351,
9406,
9407,
9438,
9452,
9474,
9497,
9513,
9534,
9539,
9540,
9556,
9557,
9593,
9607,
9638,
9660,
9676,
9696,
9701,
9702,
10082,
10083,
10108,
10113,
10134,
10139,
10163,
10193,
10223,
10270,
10319,
10364,
10385,
10390,
10410,
10431,
10449,
10493,
10516,
10546,
10569,
10586,
10591,
10622,
10645,
10650,
10673,
10699,
10704,
10705,
11042,
11043,
11062,
11094,
11099,
11132,
11175,
11202,
11227,
11257,
11304,
11352,
11397,
11418,
11423,
11441,
11482,
11526,
11549,
11579,
11602,
11607,
11631,
11651,
11671,
11676,
11691,
11728,
11774,
11817,
11822,
11882,
11887,
11898,
11929,
11972,
12004,
12010,
12015,
12016,
12285,
12286,
12306,
12349,
12350,
12562,
12563,
13252,
13253,
13359,
13360,
13441,
13446,
13447,
13891,
13892,
14066,
14067,
14090,
14120,
14149,
14208,
14265,
14278,
14283,
14362,
14411,
14443,
14510,
14572,
14585,
14590,
14591,
14680,
14681,
14712,
14753,
14767,
14772,
14794,
14816,
14833,
14838,
14839,
14888,
14889,
14909,
14923,
14928,
14950,
14972,
14989,
14994,
14995,
15144,
15145,
15184,
15185,
15340,
15341,
15927,
15928,
16051,
16052,
16129,
16130,
16150,
16190,
16191,
16394,
16395,
16864,
16865,
17025,
17026,
17049,
17071,
17076,
17117,
17123,
17157,
17192,
17240,
17263,
17327,
17375,
17397,
17403,
17408,
17424,
17430,
17456,
17479,
17525,
17535,
17556,
17587,
17597,
17632,
17638,
17643,
17644,
17675,
17676,
17731,
17745,
17804,
17809,
17810,
17895,
17896,
18051,
18117,
18141,
18155,
18214,
18219,
18220,
18328,
18329,
18349,
18392,
18393,
18582,
18583,
18632,
18633,
18660,
18661,
18719,
18736,
18755,
18799,
18827,
18847,
18848,
18862,
18863,
18976,
19081,
19186,
19191,
19192,
19198,
19199,
19214,
19246,
19251,
19273,
19295,
19316,
19331,
19368,
19373,
19394,
19415,
19436,
19451,
19488,
19493,
19514,
19535,
19556,
19571,
19605,
19610,
19632,
19654,
19675,
19680,
19681,
19738,
19739,
19822,
19890,
19922,
19923,
19978,
19979,
20146,
20147,
20341,
20342,
20477,
20478,
20493,
20525,
20530,
20551,
20572,
20593,
20608,
20640,
20645,
20666,
20687,
20708,
20723,
20757,
20762,
20783,
20804,
20825,
20840,
20874,
20879,
20900,
20921,
20942,
20957,
20991,
20996,
21018,
21039,
21060,
21075,
21109,
21114,
21136,
21157,
21178,
21193,
21226,
21231,
21252,
21273,
21294,
21309,
21342,
21347,
21368,
21389,
21410,
21425,
21460,
21465,
21486,
21507,
21528,
21543,
21578,
21583,
21604,
21625,
21646,
21661,
21696,
21701,
21723,
21744,
21765,
21780,
21815,
21820,
21842,
21863,
21884,
21899,
21928,
21933,
21954,
21975,
21996,
22011,
22042,
22047,
22068,
22089,
22110,
22125,
22156,
22161,
22183,
22205,
22226,
22241,
22271,
22276,
22298,
22320,
22341,
22356,
22388,
22393,
22414,
22435,
22456,
22471,
22503,
22508,
22530,
22552,
22573,
22578,
22579,
22673,
22674,
22896,
22897,
22939,
22940,
22968,
22969,
23034,
23150,
23151,
23214,
23291,
23292,
23313,
23314,
23342,
23370,
23371,
23420,
23421,
23535,
23664,
23665,
23783,
23784,
23823,
23885,
23886,
23924,
23925,
23982,
23983,
24204,
24205,
24382,
24383,
24403,
24450,
24605,
24606,
25346,
25347,
25657,
25658,
25853,
25854,
26138,
26139,
26342,
26343,
26601,
26602,
26725,
26726,
26925,
26926,
26955,
26973,
26999,
27021,
27058,
27072,
27095,
27100,
27101,
27269,
27270,
27293,
27311,
27343,
27366,
27380,
27401,
27406,
27407,
27622,
27623,
27652,
27670,
27711,
27725,
27748,
27753,
27776,
27794,
27830,
27844,
27865,
27870,
27871,
28282,
28283,
28302,
28344,
28345,
28360,
28361,
28378,
28383,
28400,
28418,
28423,
28441,
28465,
28493,
28562,
28599,
28637,
28647,
28662,
28693,
28715,
28742,
28760,
28774,
28784,
28790,
28795,
28796,
28807,
28808,
28844,
28864,
28865,
28880,
28881,
28898,
28903,
28916,
28931,
28945,
28952,
28957,
28986,
29026,
29043,
29071,
29102,
29131,
29163,
29173,
29211,
29255,
29314,
29357,
29384,
29458,
29494,
29512,
29526,
29536,
29610,
29648,
29663,
29685,
29728,
29755,
29791,
29811,
29844,
29870,
29888,
29902,
29912,
29944,
29980,
30012,
30034,
30048,
30069,
30079,
30109,
30115,
30120,
30125,
30130,
30148,
30175,
30181,
30223,
30244,
30274,
30317,
30343,
30359,
30379,
30406,
30430,
30444,
30465,
30516,
30570,
30599,
30625,
30643,
30673,
30717,
30748,
30788,
30806,
30840,
30876,
30894,
30923,
30949,
30967,
30981,
31008,
31029,
31039,
31070,
31076,
31081,
31082,
31093,
31094,
31130,
31169,
31203,
31240,
31241,
31291,
31292,
31327,
31365,
31391,
31425,
31426,
31466,
31467,
31502,
31540,
31566,
31601,
31602,
31616,
31644,
31674,
31689,
31727,
31754,
31782,
31834,
31839,
31852,
31869,
31874,
31893,
31922,
31982,
32000,
32005,
32019,
32024,
32043,
32085,
32086,
32161,
32162,
32193,
32218,
32241,
32285,
32290,
32327,
32375,
32380,
32420,
32479,
32527,
32532,
32562,
32583,
32634,
32710,
32715,
32752,
32869,
32874,
32904,
32973,
32978,
33027,
33074,
33079,
33144,
33245,
33250,
33285,
33372,
33377,
33391,
33426,
33442,
33447,
33448,
33544,
33545,
33606,
33607,
33635,
33641,
33662,
33692,
33719,
33736,
33752,
33760,
33848,
33882,
33906,
33921,
33945,
33973,
34013,
34041,
34053,
34070,
34090,
34110,
34116,
34121,
34122,
34222,
34223,
34518,
34519,
34535,
34541,
34583,
34594,
34619,
34713,
34751,
34814,
34820,
34825,
34826,
35051,
35052,
35071,
35116,
35117,
35192,
35193,
35254,
35323,
35337,
35383,
35416,
35449,
35499,
35528,
35533,
35556,
35591,
35596,
35667,
35672,
35673,
36065,
36066,
36365,
36366,
36385,
36423,
36424,
36483,
36484,
36540,
36541,
36620,
36621,
36640,
36677,
36678,
37191,
37192,
37388,
37389,
37410,
37411,
37462,
37513,
37519,
37552,
37557,
37607,
37657,
37707,
37757,
37807,
37857,
37907,
37927,
37932,
38012,
38068,
38102,
38152,
38207,
38267,
38333,
38404,
38480,
38562,
38649,
38741,
38839,
38942,
39050,
39082,
39088,
39093,
39135,
39180,
39186,
39219,
39224,
39254,
39259,
39292,
39344,
39367,
39372,
39431,
39453,
39459,
39464,
39529,
39581,
39587,
39620,
39625,
39659,
39701,
39706,
39752,
39762,
39793,
39822,
39827,
39892,
39942,
39947,
39989,
40003,
40085,
40123,
40141,
40255,
40293,
40311,
40325,
40335,
40341,
40346,
40347,
40822,
40823,
40842,
40880,
40881,
40920,
40921,
41213,
41214,
41348,
41349,
41452,
41453,
41506,
41535,
41594,
41595,
41619,
41640,
41661,
41683,
41688,
41713,
41718,
41803,
41808,
41842,
41848,
41880,
41885,
41914,
41940,
41965,
41975,
42006,
42036,
42050,
42074,
42103,
42117,
42122,
42169,
42174,
42241,
42289,
42312,
42333,
42350,
42374,
42384,
42389,
42423,
42462,
42475,
42510,
42516,
42521,
42545,
42551,
42573,
42601,
42606,
42632,
42637,
42702,
42751,
42785,
42823,
42828,
42844,
42854,
42939,
43019,
43070,
43086,
43091,
43183,
43249,
43254,
43298,
43303,
43383,
43388,
43417,
43450,
43488,
43493,
43531,
43554,
43559,
43596,
43619,
43646,
43651,
43682,
43723,
43795,
43800,
43849,
43854,
43883,
43916,
43954,
43959,
43997,
44020,
44025,
44062,
44085,
44112,
44117,
44148,
44189,
44266,
44276,
44281,
44313,
44319,
44324,
44339,
44345,
44383,
44393,
44434,
44489,
44526,
44579,
44584,
44668,
44673,
44732,
44742,
44760,
44766,
44771,
44772,
44964,
44965,
44984,
45026,
45027,
45294,
45295,
45444,
45445,
45464,
45502,
45503,
45742,
45743,
46534,
46535,
47036,
47037,
47324,
47325,
47344,
47382,
47383,
47570,
47571,
47602,
47623,
47628,
47667,
47740,
47805,
47810,
47828,
47919,
47924,
47925,
47938,
47939,
47966,
47967,
48012,
48017,
48052,
48087,
48092,
48093,
48121,
48122,
48162,
48167,
48201,
48233,
48238,
48239,
48345,
48346,
48372,
48373,
48407,
48451,
48456,
48475,
48512,
48513,
48667,
48668,
48797,
48798,
48860,
48861,
48996,
48997,
49252,
49253,
49277,
49357,
49383,
49388,
49406,
49423,
49428,
49452,
49532,
49560,
49624,
49652,
49663,
49668,
49696,
49736,
49800,
49813,
49839,
49844,
49861,
49910,
49956,
50002,
50048,
50092,
50097,
50147,
50152,
50185,
50211,
50266,
50284,
50321,
50340,
50378,
50389,
50394,
50415,
50453,
50458,
50483,
50505,
50537,
50553,
50581,
50598,
50623,
50634,
50639,
50640,
50714,
50715,
50757,
50762,
50791,
50796,
50803,
50808,
50866,
50921,
50927,
50932,
50953,
50974,
50991,
50996,
51015,
51058,
51059,
51224,
51225,
51306,
51336,
51341,
51362,
51384,
51405,
51486,
51500,
51505,
51527,
51549,
51570,
51636,
51650,
51655,
51676,
51697,
51718,
51764,
51769,
51786,
51828,
51851,
51873,
51878,
51907,
51913,
51947,
51985,
52013,
52036,
52089,
52112,
52153,
52173,
52204,
52218,
52242,
52267,
52277,
52299,
52305,
52310,
52326,
52332,
52359,
52382,
52428,
52438,
52460,
52491,
52501,
52537,
52543,
52548,
52549,
52576,
52577,
52594,
52595,
52643,
52644,
52661,
52662
],
"line_end_idx": [
12,
36,
37,
83,
84,
406,
407,
436,
437,
440,
441,
497,
539,
549,
550,
568,
586,
599,
600,
608,
609,
651,
661,
662,
680,
698,
711,
712,
730,
731,
844,
854,
855,
873,
891,
904,
905,
913,
914,
955,
1004,
1111,
1112,
1143,
1156,
1157,
1175,
1193,
1206,
1207,
1216,
1217,
1270,
1332,
1356,
1399,
1409,
1410,
1428,
1446,
1459,
1460,
1469,
1470,
1482,
1516,
1559,
1578,
1579,
1770,
1771,
1921,
1922,
2113,
2114,
2313,
2314,
2320,
2321,
2499,
2500,
2672,
2673,
2674,
2693,
2694,
2713,
2731,
2732,
2757,
2759,
2789,
2821,
2865,
2885,
2945,
2989,
3007,
3009,
3010,
3022,
3024,
3047,
3066,
3108,
3114,
3132,
3159,
3165,
3197,
3199,
3200,
3226,
3227,
3239,
3240,
3261,
3288,
3315,
3358,
3403,
3444,
3461,
3462,
3475,
3485,
3522,
3537,
3559,
3560,
3577,
3578,
3597,
3620,
3621,
3693,
3694,
3766,
3767,
3844,
3845,
3893,
3926,
3993,
4055,
4064,
4065,
4099,
4135,
4142,
4176,
4241,
4250,
4251,
4263,
4312,
4326,
4327,
4426,
4472,
4505,
4506,
4547,
4591,
4680,
4745,
4746,
4774,
4819,
4885,
4886,
4918,
4919,
5036,
5037,
5044,
5052,
5061,
5068,
5079,
5080,
5092,
5093,
5101,
5145,
5146,
5313,
5314,
5402,
5470,
5722,
5859,
5952,
6090,
6107,
6124,
6129,
6153,
6177,
6201,
6206,
6207,
6402,
6403,
6439,
6440,
6459,
6460,
6563,
6613,
6650,
6655,
6707,
6777,
6789,
6814,
6849,
6920,
6967,
6972,
7004,
7053,
7123,
7128,
7164,
7169,
7170,
7240,
7241,
7395,
7396,
7674,
7675,
7870,
7871,
8074,
8075,
8126,
8127,
8161,
8221,
8284,
8363,
8364,
8487,
8488,
8560,
8561,
8581,
8621,
8622,
9042,
9043,
9077,
9078,
9102,
9116,
9121,
9146,
9163,
9180,
9202,
9207,
9208,
9221,
9222,
9249,
9263,
9285,
9302,
9320,
9345,
9350,
9351,
9406,
9407,
9438,
9452,
9474,
9497,
9513,
9534,
9539,
9540,
9556,
9557,
9593,
9607,
9638,
9660,
9676,
9696,
9701,
9702,
10082,
10083,
10108,
10113,
10134,
10139,
10163,
10193,
10223,
10270,
10319,
10364,
10385,
10390,
10410,
10431,
10449,
10493,
10516,
10546,
10569,
10586,
10591,
10622,
10645,
10650,
10673,
10699,
10704,
10705,
11042,
11043,
11062,
11094,
11099,
11132,
11175,
11202,
11227,
11257,
11304,
11352,
11397,
11418,
11423,
11441,
11482,
11526,
11549,
11579,
11602,
11607,
11631,
11651,
11671,
11676,
11691,
11728,
11774,
11817,
11822,
11882,
11887,
11898,
11929,
11972,
12004,
12010,
12015,
12016,
12285,
12286,
12306,
12349,
12350,
12562,
12563,
13252,
13253,
13359,
13360,
13441,
13446,
13447,
13891,
13892,
14066,
14067,
14090,
14120,
14149,
14208,
14265,
14278,
14283,
14362,
14411,
14443,
14510,
14572,
14585,
14590,
14591,
14680,
14681,
14712,
14753,
14767,
14772,
14794,
14816,
14833,
14838,
14839,
14888,
14889,
14909,
14923,
14928,
14950,
14972,
14989,
14994,
14995,
15144,
15145,
15184,
15185,
15340,
15341,
15927,
15928,
16051,
16052,
16129,
16130,
16150,
16190,
16191,
16394,
16395,
16864,
16865,
17025,
17026,
17049,
17071,
17076,
17117,
17123,
17157,
17192,
17240,
17263,
17327,
17375,
17397,
17403,
17408,
17424,
17430,
17456,
17479,
17525,
17535,
17556,
17587,
17597,
17632,
17638,
17643,
17644,
17675,
17676,
17731,
17745,
17804,
17809,
17810,
17895,
17896,
18051,
18117,
18141,
18155,
18214,
18219,
18220,
18328,
18329,
18349,
18392,
18393,
18582,
18583,
18632,
18633,
18660,
18661,
18719,
18736,
18755,
18799,
18827,
18847,
18848,
18862,
18863,
18976,
19081,
19186,
19191,
19192,
19198,
19199,
19214,
19246,
19251,
19273,
19295,
19316,
19331,
19368,
19373,
19394,
19415,
19436,
19451,
19488,
19493,
19514,
19535,
19556,
19571,
19605,
19610,
19632,
19654,
19675,
19680,
19681,
19738,
19739,
19822,
19890,
19922,
19923,
19978,
19979,
20146,
20147,
20341,
20342,
20477,
20478,
20493,
20525,
20530,
20551,
20572,
20593,
20608,
20640,
20645,
20666,
20687,
20708,
20723,
20757,
20762,
20783,
20804,
20825,
20840,
20874,
20879,
20900,
20921,
20942,
20957,
20991,
20996,
21018,
21039,
21060,
21075,
21109,
21114,
21136,
21157,
21178,
21193,
21226,
21231,
21252,
21273,
21294,
21309,
21342,
21347,
21368,
21389,
21410,
21425,
21460,
21465,
21486,
21507,
21528,
21543,
21578,
21583,
21604,
21625,
21646,
21661,
21696,
21701,
21723,
21744,
21765,
21780,
21815,
21820,
21842,
21863,
21884,
21899,
21928,
21933,
21954,
21975,
21996,
22011,
22042,
22047,
22068,
22089,
22110,
22125,
22156,
22161,
22183,
22205,
22226,
22241,
22271,
22276,
22298,
22320,
22341,
22356,
22388,
22393,
22414,
22435,
22456,
22471,
22503,
22508,
22530,
22552,
22573,
22578,
22579,
22673,
22674,
22896,
22897,
22939,
22940,
22968,
22969,
23034,
23150,
23151,
23214,
23291,
23292,
23313,
23314,
23342,
23370,
23371,
23420,
23421,
23535,
23664,
23665,
23783,
23784,
23823,
23885,
23886,
23924,
23925,
23982,
23983,
24204,
24205,
24382,
24383,
24403,
24450,
24605,
24606,
25346,
25347,
25657,
25658,
25853,
25854,
26138,
26139,
26342,
26343,
26601,
26602,
26725,
26726,
26925,
26926,
26955,
26973,
26999,
27021,
27058,
27072,
27095,
27100,
27101,
27269,
27270,
27293,
27311,
27343,
27366,
27380,
27401,
27406,
27407,
27622,
27623,
27652,
27670,
27711,
27725,
27748,
27753,
27776,
27794,
27830,
27844,
27865,
27870,
27871,
28282,
28283,
28302,
28344,
28345,
28360,
28361,
28378,
28383,
28400,
28418,
28423,
28441,
28465,
28493,
28562,
28599,
28637,
28647,
28662,
28693,
28715,
28742,
28760,
28774,
28784,
28790,
28795,
28796,
28807,
28808,
28844,
28864,
28865,
28880,
28881,
28898,
28903,
28916,
28931,
28945,
28952,
28957,
28986,
29026,
29043,
29071,
29102,
29131,
29163,
29173,
29211,
29255,
29314,
29357,
29384,
29458,
29494,
29512,
29526,
29536,
29610,
29648,
29663,
29685,
29728,
29755,
29791,
29811,
29844,
29870,
29888,
29902,
29912,
29944,
29980,
30012,
30034,
30048,
30069,
30079,
30109,
30115,
30120,
30125,
30130,
30148,
30175,
30181,
30223,
30244,
30274,
30317,
30343,
30359,
30379,
30406,
30430,
30444,
30465,
30516,
30570,
30599,
30625,
30643,
30673,
30717,
30748,
30788,
30806,
30840,
30876,
30894,
30923,
30949,
30967,
30981,
31008,
31029,
31039,
31070,
31076,
31081,
31082,
31093,
31094,
31130,
31169,
31203,
31240,
31241,
31291,
31292,
31327,
31365,
31391,
31425,
31426,
31466,
31467,
31502,
31540,
31566,
31601,
31602,
31616,
31644,
31674,
31689,
31727,
31754,
31782,
31834,
31839,
31852,
31869,
31874,
31893,
31922,
31982,
32000,
32005,
32019,
32024,
32043,
32085,
32086,
32161,
32162,
32193,
32218,
32241,
32285,
32290,
32327,
32375,
32380,
32420,
32479,
32527,
32532,
32562,
32583,
32634,
32710,
32715,
32752,
32869,
32874,
32904,
32973,
32978,
33027,
33074,
33079,
33144,
33245,
33250,
33285,
33372,
33377,
33391,
33426,
33442,
33447,
33448,
33544,
33545,
33606,
33607,
33635,
33641,
33662,
33692,
33719,
33736,
33752,
33760,
33848,
33882,
33906,
33921,
33945,
33973,
34013,
34041,
34053,
34070,
34090,
34110,
34116,
34121,
34122,
34222,
34223,
34518,
34519,
34535,
34541,
34583,
34594,
34619,
34713,
34751,
34814,
34820,
34825,
34826,
35051,
35052,
35071,
35116,
35117,
35192,
35193,
35254,
35323,
35337,
35383,
35416,
35449,
35499,
35528,
35533,
35556,
35591,
35596,
35667,
35672,
35673,
36065,
36066,
36365,
36366,
36385,
36423,
36424,
36483,
36484,
36540,
36541,
36620,
36621,
36640,
36677,
36678,
37191,
37192,
37388,
37389,
37410,
37411,
37462,
37513,
37519,
37552,
37557,
37607,
37657,
37707,
37757,
37807,
37857,
37907,
37927,
37932,
38012,
38068,
38102,
38152,
38207,
38267,
38333,
38404,
38480,
38562,
38649,
38741,
38839,
38942,
39050,
39082,
39088,
39093,
39135,
39180,
39186,
39219,
39224,
39254,
39259,
39292,
39344,
39367,
39372,
39431,
39453,
39459,
39464,
39529,
39581,
39587,
39620,
39625,
39659,
39701,
39706,
39752,
39762,
39793,
39822,
39827,
39892,
39942,
39947,
39989,
40003,
40085,
40123,
40141,
40255,
40293,
40311,
40325,
40335,
40341,
40346,
40347,
40822,
40823,
40842,
40880,
40881,
40920,
40921,
41213,
41214,
41348,
41349,
41452,
41453,
41506,
41535,
41594,
41595,
41619,
41640,
41661,
41683,
41688,
41713,
41718,
41803,
41808,
41842,
41848,
41880,
41885,
41914,
41940,
41965,
41975,
42006,
42036,
42050,
42074,
42103,
42117,
42122,
42169,
42174,
42241,
42289,
42312,
42333,
42350,
42374,
42384,
42389,
42423,
42462,
42475,
42510,
42516,
42521,
42545,
42551,
42573,
42601,
42606,
42632,
42637,
42702,
42751,
42785,
42823,
42828,
42844,
42854,
42939,
43019,
43070,
43086,
43091,
43183,
43249,
43254,
43298,
43303,
43383,
43388,
43417,
43450,
43488,
43493,
43531,
43554,
43559,
43596,
43619,
43646,
43651,
43682,
43723,
43795,
43800,
43849,
43854,
43883,
43916,
43954,
43959,
43997,
44020,
44025,
44062,
44085,
44112,
44117,
44148,
44189,
44266,
44276,
44281,
44313,
44319,
44324,
44339,
44345,
44383,
44393,
44434,
44489,
44526,
44579,
44584,
44668,
44673,
44732,
44742,
44760,
44766,
44771,
44772,
44964,
44965,
44984,
45026,
45027,
45294,
45295,
45444,
45445,
45464,
45502,
45503,
45742,
45743,
46534,
46535,
47036,
47037,
47324,
47325,
47344,
47382,
47383,
47570,
47571,
47602,
47623,
47628,
47667,
47740,
47805,
47810,
47828,
47919,
47924,
47925,
47938,
47939,
47966,
47967,
48012,
48017,
48052,
48087,
48092,
48093,
48121,
48122,
48162,
48167,
48201,
48233,
48238,
48239,
48345,
48346,
48372,
48373,
48407,
48451,
48456,
48475,
48512,
48513,
48667,
48668,
48797,
48798,
48860,
48861,
48996,
48997,
49252,
49253,
49277,
49357,
49383,
49388,
49406,
49423,
49428,
49452,
49532,
49560,
49624,
49652,
49663,
49668,
49696,
49736,
49800,
49813,
49839,
49844,
49861,
49910,
49956,
50002,
50048,
50092,
50097,
50147,
50152,
50185,
50211,
50266,
50284,
50321,
50340,
50378,
50389,
50394,
50415,
50453,
50458,
50483,
50505,
50537,
50553,
50581,
50598,
50623,
50634,
50639,
50640,
50714,
50715,
50757,
50762,
50791,
50796,
50803,
50808,
50866,
50921,
50927,
50932,
50953,
50974,
50991,
50996,
51015,
51058,
51059,
51224,
51225,
51306,
51336,
51341,
51362,
51384,
51405,
51486,
51500,
51505,
51527,
51549,
51570,
51636,
51650,
51655,
51676,
51697,
51718,
51764,
51769,
51786,
51828,
51851,
51873,
51878,
51907,
51913,
51947,
51985,
52013,
52036,
52089,
52112,
52153,
52173,
52204,
52218,
52242,
52267,
52277,
52299,
52305,
52310,
52326,
52332,
52359,
52382,
52428,
52438,
52460,
52491,
52501,
52537,
52543,
52548,
52549,
52576,
52577,
52594,
52595,
52643,
52644,
52661,
52662,
52666
]
}
|
{
"red_pajama_v2": {
"ccnet_original_length": 52666,
"ccnet_original_nlines": 1464,
"rps_doc_curly_bracket": 0.002658260054886341,
"rps_doc_ldnoobw_words": 0,
"rps_doc_lorem_ipsum": 0,
"rps_doc_stop_word_fraction": 0.23222792148590088,
"rps_doc_ut1_blacklist": 0,
"rps_doc_frac_all_caps_words": 0.019970690831542015,
"rps_doc_frac_lines_end_with_ellipsis": 0.001365190022625029,
"rps_doc_frac_no_alph_words": 0.40023818612098694,
"rps_doc_frac_unique_words": 0.24446439743041992,
"rps_doc_mean_word_length": 4.858168601989746,
"rps_doc_num_sentences": 607,
"rps_doc_symbol_to_word_ratio": 0.0021069999784231186,
"rps_doc_unigram_entropy": 6.290061950683594,
"rps_doc_word_count": 6684,
"rps_doc_frac_chars_dupe_10grams": 0.12774081528186798,
"rps_doc_frac_chars_dupe_5grams": 0.21036584675312042,
"rps_doc_frac_chars_dupe_6grams": 0.1770448386669159,
"rps_doc_frac_chars_dupe_7grams": 0.1629403829574585,
"rps_doc_frac_chars_dupe_8grams": 0.1534244865179062,
"rps_doc_frac_chars_dupe_9grams": 0.1399051547050476,
"rps_doc_frac_chars_top_2gram": 0.0022172899916768074,
"rps_doc_frac_chars_top_3gram": 0.004711749963462353,
"rps_doc_frac_chars_top_4gram": 0.0033259401097893715,
"rps_doc_books_importance": -4644.69384765625,
"rps_doc_books_importance_length_correction": -4644.69384765625,
"rps_doc_openwebtext_importance": -2691.973876953125,
"rps_doc_openwebtext_importance_length_correction": -2691.973876953125,
"rps_doc_wikipedia_importance": -2199.510009765625,
"rps_doc_wikipedia_importance_length_correction": -2199.510009765625
},
"fasttext": {
"dclm": 0.9169768691062927,
"english": 0.7858532071113586,
"fineweb_edu_approx": 1.938535451889038,
"eai_general_math": 0.9662667512893677,
"eai_open_web_math": 0.28725123405456543,
"eai_web_code": 0.9491420388221741
}
}
|
{
"free_decimal_correspondence": {
"primary": {
"code": "005.1",
"labels": {
"level_1": "General works, books and libraries, information sciences",
"level_2": "",
"level_3": "Computer programming"
}
},
"secondary": {
"code": "512.7",
"labels": {
"level_1": "Science and Natural history",
"level_2": "Mathematics",
"level_3": "Algebra"
}
}
},
"bloom_cognitive_process": {
"primary": {
"code": "4",
"label": "Analyze"
},
"secondary": {
"code": "3",
"label": "Apply"
}
},
"bloom_knowledge_domain": {
"primary": {
"code": "3",
"label": "Procedural"
},
"secondary": {
"code": "2",
"label": "Conceptual"
}
},
"document_type_v1": {
"primary": {
"code": "5",
"label": "Social/Forum"
},
"secondary": {
"code": "3",
"label": "Reference/Encyclopedic/Educational"
}
},
"extraction_artifacts": {
"primary": {
"code": "3",
"label": "Irrelevant Content"
},
"secondary": {
"code": "0",
"label": "No Artifacts"
}
},
"missing_content": {
"primary": {
"code": "0",
"label": "No missing content"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"document_type_v2": {
"primary": {
"code": "18",
"label": "Q&A Forum"
},
"secondary": {
"code": "8",
"label": "Documentation"
}
},
"reasoning_depth": {
"primary": {
"code": "3",
"label": "Intermediate Reasoning"
},
"secondary": {
"code": "4",
"label": "Advanced Reasoning"
}
},
"technical_correctness": {
"primary": {
"code": "4",
"label": "Highly Correct"
},
"secondary": {
"code": "3",
"label": "Mostly Correct"
}
},
"education_level": {
"primary": {
"code": "3",
"label": "Undergraduate Level"
},
"secondary": {
"code": "4",
"label": "Graduate/Expert Level"
}
}
}
|
672f1e42c33a7f9846924a2431ea77df
|
664,720,501,563,835,400 |
Answers
Solutions by everydaycalculation.com
Answers.everydaycalculation.com » Subtract fractions
Subtract 70/9 from 7/49
1st number: 7/49, 2nd number: 7 7/9
7/49 - 70/9 is -481/63.
Steps for subtracting fractions
1. Find the least common denominator or LCM of the two denominators:
LCM of 49 and 9 is 441
2. For the 1st fraction, since 49 × 9 = 441,
7/49 = 7 × 9/49 × 9 = 63/441
3. Likewise, for the 2nd fraction, since 9 × 49 = 441,
70/9 = 70 × 49/9 × 49 = 3430/441
4. Subtract the two fractions:
63/441 - 3430/441 = 63 - 3430/441 = -3367/441
5. After reducing the fraction, the answer is -481/63
MathStep (Works offline)
Download our mobile app and learn to work with fractions in your own time:
Android and iPhone/ iPad
Related:
© everydaycalculation.com
|
{
"url": "https://answers.everydaycalculation.com/subtract-fractions/7-49-minus-70-9",
"source_domain": "answers.everydaycalculation.com",
"snapshot_id": "crawl=CC-MAIN-2020-34",
"warc_metadata": {
"Content-Length": "7845",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:56BYXVCD665GTUZKWO5F3XOXM25KW5AH",
"WARC-Concurrent-To": "<urn:uuid:1c1328d3-ff42-40f8-a720-a6c84ce06ad5>",
"WARC-Date": "2020-08-04T05:41:17Z",
"WARC-IP-Address": "96.126.107.130",
"WARC-Identified-Payload-Type": "text/html",
"WARC-Payload-Digest": "sha1:JPZSNT44IBIZLM7UWQVD33GMANBJFHPC",
"WARC-Record-ID": "<urn:uuid:fdbd48be-7813-414f-a17d-d3a1b897aaf2>",
"WARC-Target-URI": "https://answers.everydaycalculation.com/subtract-fractions/7-49-minus-70-9",
"WARC-Truncated": null,
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:e43b5c9b-c5f5-41d4-a208-d2e22d1b6bef>"
},
"warc_info": "isPartOf: CC-MAIN-2020-34\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for August 2020\r\noperator: Common Crawl Admin ([email protected])\r\nhostname: ip-10-67-67-110.ec2.internal\r\nsoftware: Apache Nutch 1.17 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.2-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/"
}
|
{
"line_start_idx": [
0,
8,
9,
46,
47,
100,
101,
125,
126,
162,
163,
187,
188,
220,
221,
292,
319,
366,
399,
456,
493,
526,
576,
632,
633,
658,
659,
734,
759,
760,
769,
770
],
"line_end_idx": [
8,
9,
46,
47,
100,
101,
125,
126,
162,
163,
187,
188,
220,
221,
292,
319,
366,
399,
456,
493,
526,
576,
632,
633,
658,
659,
734,
759,
760,
769,
770,
795
]
}
|
{
"red_pajama_v2": {
"ccnet_original_length": 795,
"ccnet_original_nlines": 31,
"rps_doc_curly_bracket": 0,
"rps_doc_ldnoobw_words": 0,
"rps_doc_lorem_ipsum": 0,
"rps_doc_stop_word_fraction": 0.1666666716337204,
"rps_doc_ut1_blacklist": 0,
"rps_doc_frac_all_caps_words": 0.009803920052945614,
"rps_doc_frac_lines_end_with_ellipsis": 0,
"rps_doc_frac_no_alph_words": 0.5980392098426819,
"rps_doc_frac_unique_words": 0.596774160861969,
"rps_doc_mean_word_length": 4.564516067504883,
"rps_doc_num_sentences": 11,
"rps_doc_symbol_to_word_ratio": 0,
"rps_doc_unigram_entropy": 4.1092448234558105,
"rps_doc_word_count": 124,
"rps_doc_frac_chars_dupe_10grams": 0,
"rps_doc_frac_chars_dupe_5grams": 0,
"rps_doc_frac_chars_dupe_6grams": 0,
"rps_doc_frac_chars_dupe_7grams": 0,
"rps_doc_frac_chars_dupe_8grams": 0,
"rps_doc_frac_chars_dupe_9grams": 0,
"rps_doc_frac_chars_top_2gram": 0.02473497949540615,
"rps_doc_frac_chars_top_3gram": 0,
"rps_doc_frac_chars_top_4gram": 0,
"rps_doc_books_importance": -94.04024505615234,
"rps_doc_books_importance_length_correction": -94.04024505615234,
"rps_doc_openwebtext_importance": -70.6003189086914,
"rps_doc_openwebtext_importance_length_correction": -70.59989929199219,
"rps_doc_wikipedia_importance": -40.0258903503418,
"rps_doc_wikipedia_importance_length_correction": -40.0258903503418
},
"fasttext": {
"dclm": 0.9676381349563599,
"english": 0.8788330554962158,
"fineweb_edu_approx": 2.2536611557006836,
"eai_general_math": 0.11672067642211914,
"eai_open_web_math": 0.08974325656890869,
"eai_web_code": 0.0000705700003891252
}
}
|
{
"free_decimal_correspondence": {
"primary": {
"code": "513.24",
"labels": {
"level_1": "Science and Natural history",
"level_2": "Mathematics",
"level_3": "Geometry"
}
},
"secondary": {
"code": "510",
"labels": {
"level_1": "Science and Natural history",
"level_2": "Mathematics",
"level_3": ""
}
}
},
"bloom_cognitive_process": {
"primary": {
"code": "3",
"label": "Apply"
},
"secondary": {
"code": "2",
"label": "Understand"
}
},
"bloom_knowledge_domain": {
"primary": {
"code": "3",
"label": "Procedural"
},
"secondary": {
"code": "1",
"label": "Factual"
}
},
"document_type_v1": {
"primary": {
"code": "3",
"label": "Reference/Encyclopedic/Educational"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"extraction_artifacts": {
"primary": {
"code": "0",
"label": "No Artifacts"
},
"secondary": {
"code": "3",
"label": "Irrelevant Content"
}
},
"missing_content": {
"primary": {
"code": "0",
"label": "No missing content"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"document_type_v2": {
"primary": {
"code": "23",
"label": "Tutorial"
},
"secondary": {
"code": "21",
"label": "Customer Support"
}
},
"reasoning_depth": {
"primary": {
"code": "2",
"label": "Basic Reasoning"
},
"secondary": {
"code": "3",
"label": "Intermediate Reasoning"
}
},
"technical_correctness": {
"primary": {
"code": "4",
"label": "Highly Correct"
},
"secondary": {
"code": "5",
"label": "Exceptionally Correct"
}
},
"education_level": {
"primary": {
"code": "2",
"label": "High School Level"
},
"secondary": {
"code": "1",
"label": "General Audience"
}
}
}
|
672f1e42c33a7f9846924a2431ea77df
|
7,933,124,185,146,384,000 |
Shortcuts
Source code for catalyst.contrib.datasets.movielens
import itertools
import os
import numpy as np
import pandas as pd
import scipy.sparse as sp
import torch
from torch.utils.data import Dataset
from catalyst.contrib.datasets.misc import download_and_extract_archive
[docs]class MovieLens(Dataset): """ MovieLens data sets were collected by the GroupLens Research Project at the University of Minnesota. This data set consists of: * 100,000 ratings (1-5) from 943 users on 1682 movies. * Each user has rated at least 20 movies. * Simple demographic info for the users (age, gender, occupation, zip) The data was collected through the MovieLens web site (movielens.umn.edu) during the seven-month period from September 19th, 1997 through April 22nd, 1998. This data has been cleaned up - users who had less than 20 ratings or did not have complete demographic information were removed from this data set. Detailed descriptions of the data file can be found at the end of this file. Neither the University of Minnesota nor any of the researchers involved can guarantee the correctness of the data, its suitability for any particular purpose, or the validity of results based on the use of the data set. The data set may be used for any research purposes under the following conditions: * The user may not state or imply any endorsement from the University of Minnesota or the GroupLens Research Group. * The user must acknowledge the use of the data set in publications resulting from the use of the data set (see below for citation information). * The user may not redistribute the data without separate permission. * The user may not use this information for any commercial or revenue-bearing purposes without first obtaining permission from a faculty member of the GroupLens Research Project at the University of Minnesota. If you have any further questions or comments, please contact GroupLens <[email protected]>. http://files.grouplens.org/datasets/movielens/ml-100k-README.txt .. note:: catalyst[ml] required for this dataset. """ resources = ( "http://files.grouplens.org/datasets/movielens/ml-100k.zip", "0e33842e24a9c977be4e0107933c0723", ) filename = "ml-100k.zip" training_file = "training.pt" test_file = "test.pt"
[docs] def __init__(self, root, train=True, download=False, min_rating=0.0): """ Args: root (string): Root directory of dataset where ``MovieLens/processed/training.pt`` and ``MovieLens/processed/test.pt`` exist. train (bool, optional): If True, creates dataset from ``training.pt``, otherwise from ``test.pt``. download (bool, optional): If true, downloads the dataset from the internet and puts it in root directory. If dataset is already downloaded, it is not downloaded again. min_rating (float, optional): Minimum rating to include in the interaction matrix Raises: RuntimeError: If ``download is False`` and the dataset not found. """ if isinstance(root, torch._six.string_classes): root = os.path.expanduser(root) self.root = root self.train = train self.min_rating = min_rating if download: self._download() self._fetch_movies() if not self._check_exists(): raise RuntimeError("Dataset not found. Set `download=True`") if self.train: data_file = self.training_file else: data_file = self.test_file self.data = torch.load(os.path.join(self.processed_folder, data_file))
def __getitem__(self, user_index): """Get item. Args: user_index (int): User index [0, 942] Returns: tensor: (items) item's ranking for the user with index user_index """ return self.data[user_index] def __len__(self): """The length of the loader""" return self.dimensions[0] @property def raw_folder(self): """Create raw folder for data download Returns: raw_path (path): raw folder path """ return os.path.join(self.root, self.__class__.__name__, "raw") @property def processed_folder(self): """Create the folder for the processed files Returns: raw_path (path): processed folder path """ return os.path.join(self.root, self.__class__.__name__, "processed") def _check_exists(self): """Check if the path for tarining and testing data exists in processed folder. Returns: raw_path (path): processed folder path """ return os.path.exists( os.path.join(self.processed_folder, self.training_file) ) and os.path.exists(os.path.join(self.processed_folder, self.test_file)) def _download(self): """Download and extract files/""" if self._check_exists(): return os.makedirs(self.raw_folder, exist_ok=True) os.makedirs(self.processed_folder, exist_ok=True) url = self.resources[0] md5 = self.resources[1] download_and_extract_archive( url=url, download_root=self.raw_folder, filename=self.filename, md5=md5, remove_finished=True, ) def _read_raw_movielens_data(self): """Return the raw lines of the train and test files.""" path = self.raw_folder with open(path + "/ml-100k/ua.base") as datafile: ua_base = datafile.read().split("\n") with open(path + "/ml-100k/ua.test") as datafile: ua_test = datafile.read().split("\n") with open(path + "/ml-100k/u.item", encoding="ISO-8859-1") as datafile: u_item = datafile.read().split("\n") with open(path + "/ml-100k/u.genre") as datafile: u_genre = datafile.read().split("\n") return (ua_base, ua_test, u_item, u_genre) def _build_interaction_matrix(self, rows, cols, data): """Builds interaction matrix. Args: rows (int): rows of the oevrall dataset cols (int): columns of the overall dataset data (generator object): generator of the data object Returns: interaction_matrix (torch.sparse.Float): sparse user2item interaction matrix """ mat = sp.lil_matrix((rows, cols), dtype=np.int32) for uid, iid, rating, _ in data: if rating >= self.min_rating: mat[uid, iid] = rating coo = mat.tocoo() values = coo.data indices = np.vstack((coo.row, coo.col)) i = torch.LongTensor(indices) v = torch.FloatTensor(values) shape = coo.shape interaction_matrix = torch.sparse.FloatTensor(i, v, torch.Size(shape)).to_dense() return interaction_matrix def _parse(self, data): """Parses the raw data. Substract one to shift to zero based indexing Args: data: raw data of the dataset Yields: Generator iterator for parsed data """ for line in data: if not line: continue uid, iid, rating, timestamp = [int(x) for x in line.split("\t")] yield uid - 1, iid - 1, rating, timestamp def _get_dimensions(self, train_data, test_data): """Gets the dimensions of the raw dataset Args: train_data: (uid, iid, rating, timestamp) Genrator for training data test_data: (uid, iid, rating, timestamp) Genrator for testing data Returns: The total dimension of the dataset """ uids = set() iids = set() for uid, iid, _, _ in itertools.chain(train_data, test_data): uids.add(uid) iids.add(iid) rows = max(uids) + 1 cols = max(iids) + 1 self.dimensions = (rows, cols) return rows, cols def _fetch_movies(self): """ Fetch data and save in the pytorch format 1. Read the train/test data from raw archive 2. Parse train data 3. Parse test data 4. Save in the .pt with torch.save """ data = self._read_raw_movielens_data() train_raw = data[0] test_raw = data[1] train_parsed = self._parse(train_raw) test_parsed = self._parse(test_raw) num_users, num_items = self._get_dimensions(train_parsed, test_parsed) train = self._build_interaction_matrix( num_users, num_items, self._parse(train_raw) ) test = self._build_interaction_matrix( num_users, num_items, self._parse(test_raw) ) assert train.shape == test.shape with open(os.path.join(self.processed_folder, self.training_file), "wb") as f: torch.save(train, f) with open(os.path.join(self.processed_folder, self.test_file), "wb") as f: torch.save(test, f)
class MovieLens20M(Dataset): """ MovieLens data sets (ml-20m) were collected by the GroupLens Research Project at the University of Minnesota. This data set consists of: * 20,000,263 ratings (1-5) and 465,564 tag applications from 138,493 users on 27,278 movies. * Each user has rated at least 20 movies. * Simple demographic info for the users (age, gender, occupation, zip) Users were selected at random for inclusion. All selected users had rated at least 20 movies. No demographic information is included. Each user is represented by an id, and no other information is provided. More details about the contents and use of all these files follows. This and other GroupLens data sets are publicly available for download at http://grouplens.org/datasets/. The data was collected through the MovieLens web site. (movielens.umn.edu) between January 09, 1995 and March 31, 2015. This dataset was generated on October 17, 2016. Neither the University of Minnesota nor any of the researchers involved can guarantee the correctness of the data, its suitability for any particular purpose, or the validity of results based on the use of the data set. The data set may be used for any research purposes under the following conditions: The user may not state or imply any endorsement from the University of Minnesota or the GroupLens Research Group. The user must acknowledge the use of the data set in publications resulting from the use of the data set (see below for citation information). The user may not redistribute the data without separate permission. The user may not use this information for any commercial or revenue-bearing purposes without first obtaining permission from a faculty member of the GroupLens Research Project at the University of Minnesota. The executable software scripts are provided "as is" without warranty of any kind, either expressed or implied, including, but not limited to, the implied warranties of merchantability and fitness for a particular purpose. The entire risk as to the quality and performance of them is with you. Should the program prove defective, you assume the cost of all necessary servicing, repair or correction. In no event shall the University of Minnesota, its affiliates or employees be liable to you for any damages arising out of the use or inability to use these programs (including but not limited to loss of data or data being rendered inaccurate). The data are contained in six files: 1. genome-scores.csv 2. genome-tags.csv 3. links.csv 4. movies.csv 5. ratings.csv 6. tags.csv Ratings Data File Structure (ratings.csv) All ratings are contained in the file ratings.csv. Each line of this file after the header row represents one rating of one movie by one user,and has the following format: 1. userId, 2. movieId, 3. rating, 4. timestamp Tags Data File Structure (tags.csv) 1. userId, 2. movieId, 3. tag, 4. timestamp Movies Data File Structure (movies.csv) 1. movieId, 2. title, 3. genres Movie titles are entered manually or imported from https://www.themoviedb.org/, and include the year of release in parentheses. Errors and inconsistencies may exist in these titles. Links Data File Structure (links.csv) 1. movieId, 2. imdbId, 3. tmdbId Tag Genome (genome-scores.csv and genome-tags.csv) 1. movieId, 2. tagId, 3. relevance If you have any further questions or comments, please contact GroupLens <[email protected]>. https://files.grouplens.org/datasets/movielens/ml-20m-README.html """ resources = ( "https://files.grouplens.org/datasets/movielens/ml-20m.zip", " cd245b17a1ae2cc31bb14903e1204af3", ) filename = "ml-20m.zip" training_file = "training.pt" test_file = "test.pt" def __init__( self, root, train=True, download=False, min_rating=0.0, min_items_per_user=1.0, min_users_per_item=2.0, test_prop=0.2, split="users", sample=False, n_rows=1000, ): """ Args: root (string): Root directory of dataset where ``MovieLens/processed/training.pt`` and ``MovieLens/processed/test.pt`` exist. train (bool, optional): If True, creates dataset from ``training.pt``, otherwise from ``test.pt``. download (bool, optional): If true, downloads the dataset from the internet and puts it in root directory. If dataset is already downloaded, it is not downloaded again. min_rating (float, optional): Minimum rating to include in the interaction matrix min_items_per_user (float, optional): Minimum number of items per user to include in the interaction matrix min_users_per_item (float, optional): Minimum rating to users per itemrs to include in the interaction matrix test_prop (float, optional): train-test split split (string, optional): the splittage method. `users` – split by users `ts` - split by timestamp sample (bool, optional): If true, then use the sample of the dataset. If true the `n_rows` shold be provide n_rows (int, optional): number of rows to retrieve. Availbale only with `sample = True` Raises: RuntimeError: If ``download = False`` and the dataset not found. RuntimeError: If torch version < `1.7.0`" """ if isinstance(root, torch._six.string_classes): root = os.path.expanduser(root) self.root = root self.train = train self.min_rating = min_rating self.min_items_per_user = min_items_per_user self.min_users_per_item = min_users_per_item self.test_prop = test_prop self.nrows = n_rows self.sample = sample self.split = split if download: self._download() self._fetch_movies(split_by=split) if not self._check_exists(): raise RuntimeError("Dataset not found. Set `download=True`") if self.train: data_file = self.training_file else: data_file = self.test_file self.data = torch.load(os.path.join(self.processed_folder, data_file)) def __getitem__(self, user_index): """Get item. Args: user_index (int): User index Returns: tensor: (items) item's ranking for the user with index user_index """ return self.data[user_index] def __len__(self): """The length of the loader""" return self.dimensions[0] @property def raw_folder(self): """Create raw folder for data download Returns: raw_path (path): raw folder path """ return os.path.join(self.root, self.__class__.__name__, "raw") @property def processed_folder(self): """Create the folder for the processed files Returns: raw_path (path): processed folder path """ return os.path.join(self.root, self.__class__.__name__, "processed") def _check_exists(self): """Check if the path for tarining and testing data exists in processed folder. Returns: raw_path (path): processed folder path """ return os.path.exists( os.path.join(self.processed_folder, self.training_file) ) and os.path.exists(os.path.join(self.processed_folder, self.test_file)) def _download(self): """Download and extract files""" if self._check_exists(): return os.makedirs(self.raw_folder, exist_ok=True) os.makedirs(self.processed_folder, exist_ok=True) url = self.resources[0] download_and_extract_archive( url=url, download_root=self.raw_folder, filename=self.filename, remove_finished=True, ) def _read_raw_movielens_data(self): """Read the csv files with pandas. Returns: (movies, ratings, genome_scores, genome_tags, tags): (pd.DataFrame, pd.DataFrame, pd.DataFrame, pd.DataFrame, pd.DataFrame) """ path = self.raw_folder if self.sample: movies = pd.read_csv(path + "/ml-20m/movies.csv", nrows=self.nrows) ratings = pd.read_csv(path + "/ml-20m/ratings.csv", nrows=self.nrows) genome_scores = pd.read_csv( path + "/ml-20m/genome-scores.csv", nrows=self.nrows ) genome_tags = pd.read_csv(path + "/ml-20m/genome-tags.csv", nrows=self.nrows) tags = pd.read_csv(path + "/ml-20m/tags.csv", nrows=self.nrows) else: movies = pd.read_csv(path + "/ml-20m/movies.csv") ratings = pd.read_csv(path + "/ml-20m/ratings.csv") genome_scores = pd.read_csv(path + "/ml-20m/genome-scores.csv") genome_tags = pd.read_csv(path + "/ml-20m/genome-tags.csv") tags = pd.read_csv(path + "/ml-20m/tags.csv") return (movies, ratings, genome_scores, genome_tags, tags) def _build_interaction_matrix(self, ratings): """Builds interaction matrix. Args: ratings (pd.Dataframe): pandas DataFrame of the following format userId movieId rating 20 1 924 3.5 19 1 919 3.5 86 1 2683 3.5 61 1 1584 3.5 23 1 1079 4.0 Returns: interaction_matrix (torch.sparse.Float): sparse user2item interaction matrix """ csr_matrix = sp.coo_matrix( ( ratings["rating"].astype(np.float32), (ratings["movieId"], ratings["userId"]), ) ) interaction_matrix = torch.sparse.LongTensor( torch.LongTensor([csr_matrix.row.tolist(), csr_matrix.col.tolist()]), torch.LongTensor(csr_matrix.data.astype(np.int32)), ) return interaction_matrix def _parse( self, ratings, rating_cut=True, user_per_item_cut=True, item_per_user_cut=True, ts_cut=False, ): """Parses and pre-process the raw data. Substract one to shift to zero based indexing To-do add timestamp cut Args: ratings (pd.Dataframe): pandas DataFrame of the following format userId movieId rating timestamp 20 1 924 3.5 1094785598 19 1 919 3.5 1094785621 86 1 2683 3.5 1094785650 61 1 1584 3.5 1094785656 23 1 1079 4.0 1094785665 rating_cut (bool, optional): If true, filter datafreame on the `min_rating` value user_per_item_cut (bool, optional): If true, filter datafreame on the `min_users_per_item` value item_per_user_cut (bool, optional): If true, filter datafreame on the `min_items_per_user` value ts_cut (bool, optional): If true, filter datafreame on the `min_ts` value [TO-DO] Returns: ratings (pd.Dataframe): filtered `ratings` pandas DataFrame users_activity (pd.DataFrame): Number of items each user interacted with items_activity (pd.DataFrame): Number of users interacted with each item. """ if rating_cut: ratings = ratings[ratings["rating"] >= self.min_rating].sort_values( ["userId", "timestamp"] ) movie_id = "movieId" user_cnt_df = ( ratings[[movie_id]] .groupby(movie_id, as_index=False) .size() .rename(columns={"size": "user_cnt"}) ) user_id = "userId" item_cnt_df = ( ratings[[user_id]] .groupby(user_id, as_index=False) .size() .rename(columns={"size": "item_cnt"}) ) user_not_filtered = True item_not_filtered = True while user_not_filtered or item_not_filtered: ratings = ratings[ ratings[movie_id].isin( user_cnt_df.index[user_cnt_df["user_cnt"] >= self.min_users_per_item] ) ] ratings = ratings[ ratings[user_id].isin( item_cnt_df.index[item_cnt_df["item_cnt"] >= self.min_items_per_user] ) ] user_cnt_df = ( ratings[[movie_id]] .groupby(movie_id, as_index=False) .size() .rename(columns={"size": "user_cnt"}) ) item_cnt_df = ( ratings[[user_id]] .groupby(user_id, as_index=False) .size() .rename(columns={"size": "item_cnt"}) ) user_not_filtered = (user_cnt_df["user_cnt"] < self.min_users_per_item).any() item_not_filtered = (item_cnt_df["item_cnt"] < self.min_items_per_user).any() users_activity = ( ratings[["userId"]] .groupby("userId", as_index=False) .size() .rename(columns={"size": "user_cnt"}) ) items_activity = ( ratings[["movieId"]] .groupby("movieId", as_index=False) .size() .rename(columns={"size": "item_cnt"}) ) return ratings, users_activity, items_activity def _split_by_users(self, ratings, users_activity): """Split the ratings DataFrame into train and test Randomly shuffle users and split Args: ratings (pd.Dataframe): pandas DataFrame of the following format userId movieId rating timestamp 20 1 924 3.5 1094785598 19 1 919 3.5 1094785621 86 1 2683 3.5 1094785650 61 1 1584 3.5 1094785656 23 1 1079 4.0 1094785665 users_activity (pd.DataFrame): Number of items each user interacted with Returns: train_events (pd.Dataframe): pandas DataFrame for training data test_events (pd.Dataframe): pandas DataFrame for training data """ idx_perm = np.random.permutation(users_activity.index.size) unique_uid = users_activity.index[idx_perm] n_users = unique_uid.size test_users = unique_uid[: int(n_users * self.test_prop)] train_users = unique_uid[int(n_users * self.test_prop) :] train_events = ratings.loc[ratings["userId"].isin(train_users)] test_events = ratings.loc[ratings["userId"].isin(test_users)] return (train_events, test_events) def _split_by_time(self, ratings): """Split the ratings DataFrame into train and test by timestamp Ratings[timestamp] extreme values used for the filtering interval Args: ratings (pd.Dataframe): pandas DataFrame of the following format userId movieId rating timestamp 20 1 924 3.5 1094785598 19 1 919 3.5 1094785621 86 1 2683 3.5 1094785650 61 1 1584 3.5 1094785656 23 1 1079 4.0 1094785665 Returns: train_events (pd.Dataframe): pandas DataFrame for training data test_events (pd.Dataframe): pandas DataFrame for training data """ ts = ratings["timestamp"].sort_values() ts_max = ts.max() ts_min = ts.min() ts_split = ts_min + (ts_max - ts_min) * self.test_prop train_events = ratings[ratings["timestamp"] > ts_split] test_events = ratings[ratings["timestamp"] <= ts_split] return (train_events, test_events) def _fetch_movies(self, split_by="users"): """ Fetch data and save in the pytorch format 1. Read the MovieLens20 data from raw archive 2. Parse the rating dataset 3. Split dataset into train and test 4. Build user-item matrix interaction 5. Save in the .pt with torch.save Args: split_by (string, optional): the splittage method. `users` – split by users `ts` - split by timestamp Raises: ValueError: If `split_by` argument is not equal `users` or `ts` """ raw_data = self._read_raw_movielens_data() ratings = raw_data[1] # TO-DO: add error handling ratings, users_activity, items_activity = self._parse(ratings) self.users_activity = users_activity self.items_activity = items_activity if split_by == "users": train_raw, test_raw = self._split_by_users(ratings, users_activity) if split_by == "ts": train_raw, test_raw = self._split_by_time(ratings) if split_by != "users" and split_by != "ts": raise ValueError("Only splitting by users and ts supported") train = self._build_interaction_matrix(train_raw) test = self._build_interaction_matrix(test_raw) with open(os.path.join(self.processed_folder, self.training_file), "wb") as f: torch.save(train, f) with open(os.path.join(self.processed_folder, self.test_file), "wb") as f: torch.save(test, f) __all__ = ["MovieLens", "MovieLens20M"]
|
{
"url": "https://catalyst-team.github.io/catalyst/_modules/catalyst/contrib/datasets/movielens.html",
"source_domain": "catalyst-team.github.io",
"snapshot_id": "crawl=CC-MAIN-2022-21",
"warc_metadata": {
"Content-Length": "106032",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:7HTLBZFHGTHSPOOEE7NACP2QG52SPIQJ",
"WARC-Concurrent-To": "<urn:uuid:a46fdbcd-a1a5-4113-b6d5-3ab20b0f1d93>",
"WARC-Date": "2022-05-25T17:28:16Z",
"WARC-IP-Address": "185.199.110.153",
"WARC-Identified-Payload-Type": "text/html",
"WARC-Payload-Digest": "sha1:XQJASPRSRTKZNM6RMT5HM7732V7I6M22",
"WARC-Record-ID": "<urn:uuid:9d1e80b1-97e4-41d2-8b0d-69d3fa81ab0d>",
"WARC-Target-URI": "https://catalyst-team.github.io/catalyst/_modules/catalyst/contrib/datasets/movielens.html",
"WARC-Truncated": null,
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:61b6cae8-7828-4bb0-9683-aa9cc256d2ed>"
},
"warc_info": "isPartOf: CC-MAIN-2022-21\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for May 2022\r\noperator: Common Crawl Admin ([email protected])\r\nhostname: ip-10-67-67-40\r\nsoftware: Apache Nutch 1.18 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.3-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: https://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/"
}
|
{
"line_start_idx": [
0,
10,
11,
63,
64,
81,
91,
92,
111,
131,
157,
158,
171,
208,
209,
281,
282,
283,
2251,
3328,
7530
],
"line_end_idx": [
10,
11,
63,
64,
81,
91,
92,
111,
131,
157,
158,
171,
208,
209,
281,
282,
283,
2251,
3328,
7530,
21517
]
}
|
{
"red_pajama_v2": {
"ccnet_original_length": 21517,
"ccnet_original_nlines": 20,
"rps_doc_curly_bracket": 0.0005576999974437058,
"rps_doc_ldnoobw_words": 0,
"rps_doc_lorem_ipsum": 0,
"rps_doc_stop_word_fraction": 0.15879210829734802,
"rps_doc_ut1_blacklist": 0,
"rps_doc_frac_all_caps_words": 0.001437959959730506,
"rps_doc_frac_lines_end_with_ellipsis": 0,
"rps_doc_frac_no_alph_words": 0.4120788872241974,
"rps_doc_frac_unique_words": 0.28601253032684326,
"rps_doc_mean_word_length": 6.7319416999816895,
"rps_doc_num_sentences": 477,
"rps_doc_symbol_to_word_ratio": 0.00020542000129353255,
"rps_doc_unigram_entropy": 5.813936710357666,
"rps_doc_word_count": 2395,
"rps_doc_frac_chars_dupe_10grams": 0.4009179472923279,
"rps_doc_frac_chars_dupe_5grams": 0.4897351562976837,
"rps_doc_frac_chars_dupe_6grams": 0.4695155918598175,
"rps_doc_frac_chars_dupe_7grams": 0.4525212347507477,
"rps_doc_frac_chars_dupe_8grams": 0.43403834104537964,
"rps_doc_frac_chars_dupe_9grams": 0.40823668241500854,
"rps_doc_frac_chars_top_2gram": 0.008683250285685062,
"rps_doc_frac_chars_top_3gram": 0.005582090001553297,
"rps_doc_frac_chars_top_4gram": 0.013397010043263435,
"rps_doc_books_importance": -2159.356689453125,
"rps_doc_books_importance_length_correction": -2159.356689453125,
"rps_doc_openwebtext_importance": -1012.1104736328125,
"rps_doc_openwebtext_importance_length_correction": -1012.1104736328125,
"rps_doc_wikipedia_importance": -576.61865234375,
"rps_doc_wikipedia_importance_length_correction": -576.61865234375
},
"fasttext": {
"dclm": 0.7990440726280212,
"english": 0.6113147735595703,
"fineweb_edu_approx": 2.6467342376708984,
"eai_general_math": 0.9300239682197571,
"eai_open_web_math": 0.19192731380462646,
"eai_web_code": 0.9508957862854004
}
}
|
{
"free_decimal_correspondence": {
"primary": {
"code": "005.1",
"labels": {
"level_1": "General works, books and libraries, information sciences",
"level_2": "",
"level_3": "Computer programming"
}
},
"secondary": {
"code": "006.31",
"labels": {
"level_1": "General works, books and libraries, information sciences",
"level_2": "",
"level_3": "Cognitive science"
}
}
},
"bloom_cognitive_process": {
"primary": {
"code": "3",
"label": "Apply"
},
"secondary": {
"code": "4",
"label": "Analyze"
}
},
"bloom_knowledge_domain": {
"primary": {
"code": "3",
"label": "Procedural"
},
"secondary": {
"code": "2",
"label": "Conceptual"
}
},
"document_type_v1": {
"primary": {
"code": "4",
"label": "Code/Software"
},
"secondary": {
"code": "2",
"label": "Academic/Research"
}
},
"extraction_artifacts": {
"primary": {
"code": "0",
"label": "No Artifacts"
},
"secondary": {
"code": "3",
"label": "Irrelevant Content"
}
},
"missing_content": {
"primary": {
"code": "0",
"label": "No missing content"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"document_type_v2": {
"primary": {
"code": "8",
"label": "Documentation"
},
"secondary": {
"code": "3",
"label": "Academic Writing"
}
},
"reasoning_depth": {
"primary": {
"code": "3",
"label": "Intermediate Reasoning"
},
"secondary": {
"code": "2",
"label": "Basic Reasoning"
}
},
"technical_correctness": {
"primary": {
"code": "4",
"label": "Highly Correct"
},
"secondary": {
"code": "3",
"label": "Mostly Correct"
}
},
"education_level": {
"primary": {
"code": "4",
"label": "Graduate/Expert Level"
},
"secondary": {
"code": "3",
"label": "Undergraduate Level"
}
}
}
|
672f1e42c33a7f9846924a2431ea77df
|
711,326,327,974,830,800 |
Basic JavaScript - Profile Lookup
Tell us what’s happening:
Describe your issue in detail here.
I’m quite confused about where I am getting it wrong the first condition seems to work perfectly until I add the other conditions.
Please help review. Thanks
Your code so far
// Setup
const contacts = [
{
firstName: "Akira",
lastName: "Laine",
number: "0543236543",
likes: ["Pizza", "Coding", "Brownie Points"],
},
{
firstName: "Harry",
lastName: "Potter",
number: "0994372684",
likes: ["Hogwarts", "Magic", "Hagrid"],
},
{
firstName: "Sherlock",
lastName: "Holmes",
number: "0487345643",
likes: ["Intriguing Cases", "Violin"],
},
{
firstName: "Kristian",
lastName: "Vos",
number: "unknown",
likes: ["JavaScript", "Gaming", "Foxes"],
},
];
function lookUpProfile(name, prop) {
// Only change code below this line
for(let contact of contacts){
//console.log(contact)
if(contact['firstName'] == name && contact.hasOwnProperty(prop)){
return contact[prop]
}else if(contact['firstName'] !== name){
return "No such contact"
}else if(!contact.hasOwnProperty(prop)){
return "No such property"
}
}
// Only change code above this line
}
lookUpProfile("Akira", "likes");
Your browser information:
User Agent is: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/110.0.0.0 Safari/537.36
Challenge: Basic JavaScript - Profile Lookup
Link to the challenge:
This is a nice effort on a difficult task. You are currently looping through each object in the array. The problem is that you are always returning something on the first item. But if the name is, say, " Kristian", then we don’t want to return on the first item. We want to return on the 4th item.
Here’s how I would have done it:
const curPersonObj = contacts.find(x=> x.firstName===name);
if(curPersonObj && prop in curPersonObj){
return curPersonObj[prop];
} else if(!curPersonObj) {
return 'No such contact'
}
else return 'No such property'
|
{
"url": "https://forum.freecodecamp.org/t/basic-javascript-profile-lookup/594552",
"source_domain": "forum.freecodecamp.org",
"snapshot_id": "CC-MAIN-2023-14",
"warc_metadata": {
"Content-Length": "26037",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:FTVXC3QIW3DCNJKKXPUGCCP6VVV3I6DR",
"WARC-Concurrent-To": "<urn:uuid:be3fc86b-c9d5-49d9-b6c8-4cf9c5c2deb9>",
"WARC-Date": "2023-03-27T08:09:04Z",
"WARC-IP-Address": "64.71.144.205",
"WARC-Identified-Payload-Type": "text/html",
"WARC-Payload-Digest": "sha1:SQRMD2NKQ36ZXDTALVYBJT3AMEICIHSY",
"WARC-Record-ID": "<urn:uuid:7cca2ff0-e65c-43ac-b5b9-8629aa612ae2>",
"WARC-Target-URI": "https://forum.freecodecamp.org/t/basic-javascript-profile-lookup/594552",
"WARC-Truncated": null,
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:3cd857bd-080c-4e5c-83b4-7751b3df2e1f>"
},
"warc_info": "isPartOf: CC-MAIN-2023-14\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for March/April 2023\r\noperator: Common Crawl Admin ([email protected])\r\nhostname: ip-10-67-67-126\r\nsoftware: Apache Nutch 1.19 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.4-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: https://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/"
}
|
{
"line_start_idx": [
0,
34,
35,
61,
97,
98,
229,
230,
257,
258,
275,
276,
285,
304,
308,
332,
355,
381,
431,
436,
440,
464,
488,
514,
558,
563,
567,
594,
618,
644,
687,
692,
696,
723,
744,
767,
813,
818,
821,
822,
859,
897,
930,
957,
1027,
1056,
1101,
1132,
1177,
1209,
1215,
1216,
1220,
1221,
1259,
1261,
1262,
1295,
1296,
1322,
1323,
1450,
1451,
1496,
1497,
1520,
1521,
1819,
1820,
1853,
1854,
1916,
1960,
1989,
2016,
2043,
2047
],
"line_end_idx": [
34,
35,
61,
97,
98,
229,
230,
257,
258,
275,
276,
285,
304,
308,
332,
355,
381,
431,
436,
440,
464,
488,
514,
558,
563,
567,
594,
618,
644,
687,
692,
696,
723,
744,
767,
813,
818,
821,
822,
859,
897,
930,
957,
1027,
1056,
1101,
1132,
1177,
1209,
1215,
1216,
1220,
1221,
1259,
1261,
1262,
1295,
1296,
1322,
1323,
1450,
1451,
1496,
1497,
1520,
1521,
1819,
1820,
1853,
1854,
1916,
1960,
1989,
2016,
2043,
2047,
2079
]
}
|
{
"red_pajama_v2": {
"ccnet_original_length": 2079,
"ccnet_original_nlines": 76,
"rps_doc_curly_bracket": 0.010582010261714458,
"rps_doc_ldnoobw_words": 0,
"rps_doc_lorem_ipsum": 0,
"rps_doc_stop_word_fraction": 0.20915032923221588,
"rps_doc_ut1_blacklist": 0,
"rps_doc_frac_all_caps_words": 0.013071900233626366,
"rps_doc_frac_lines_end_with_ellipsis": 0,
"rps_doc_frac_no_alph_words": 0.4270152449607849,
"rps_doc_frac_unique_words": 0.6390041708946228,
"rps_doc_mean_word_length": 5.8423237800598145,
"rps_doc_num_sentences": 24,
"rps_doc_symbol_to_word_ratio": 0,
"rps_doc_unigram_entropy": 4.835689544677734,
"rps_doc_word_count": 241,
"rps_doc_frac_chars_dupe_10grams": 0,
"rps_doc_frac_chars_dupe_5grams": 0.05681817978620529,
"rps_doc_frac_chars_dupe_6grams": 0,
"rps_doc_frac_chars_dupe_7grams": 0,
"rps_doc_frac_chars_dupe_8grams": 0,
"rps_doc_frac_chars_dupe_9grams": 0,
"rps_doc_frac_chars_top_2gram": 0.022727269679307938,
"rps_doc_frac_chars_top_3gram": 0.034090910106897354,
"rps_doc_frac_chars_top_4gram": 0.03977273032069206,
"rps_doc_books_importance": -223.49853515625,
"rps_doc_books_importance_length_correction": -223.49853515625,
"rps_doc_openwebtext_importance": -66.78723907470703,
"rps_doc_openwebtext_importance_length_correction": -66.78723907470703,
"rps_doc_wikipedia_importance": -94.89698028564453,
"rps_doc_wikipedia_importance_length_correction": -94.89698028564453
},
"fasttext": {
"dclm": 0.17679572105407715,
"english": 0.6220715045928955,
"fineweb_edu_approx": 1.074022889137268,
"eai_general_math": 0.1526675820350647,
"eai_open_web_math": 0.09289222955703735,
"eai_web_code": 0.14918363094329834
}
}
|
{
"free_decimal_correspondence": {
"primary": {
"code": "005.133",
"labels": {
"level_1": "General works, books and libraries, information sciences",
"level_2": "",
"level_3": "Computer programming"
}
},
"secondary": {
"code": "005.1",
"labels": {
"level_1": "General works, books and libraries, information sciences",
"level_2": "",
"level_3": "Computer programming"
}
}
},
"bloom_cognitive_process": {
"primary": {
"code": "3",
"label": "Apply"
},
"secondary": {
"code": "2",
"label": "Understand"
}
},
"bloom_knowledge_domain": {
"primary": {
"code": "3",
"label": "Procedural"
},
"secondary": {
"code": "2",
"label": "Conceptual"
}
},
"document_type_v1": {
"primary": {
"code": "5",
"label": "Social/Forum"
},
"secondary": {
"code": "4",
"label": "Code/Software"
}
},
"extraction_artifacts": {
"primary": {
"code": "0",
"label": "No Artifacts"
},
"secondary": {
"code": "3",
"label": "Irrelevant Content"
}
},
"missing_content": {
"primary": {
"code": "0",
"label": "No missing content"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"document_type_v2": {
"primary": {
"code": "18",
"label": "Q&A Forum"
},
"secondary": {
"code": "23",
"label": "Tutorial"
}
},
"reasoning_depth": {
"primary": {
"code": "2",
"label": "Basic Reasoning"
},
"secondary": {
"code": "3",
"label": "Intermediate Reasoning"
}
},
"technical_correctness": {
"primary": {
"code": "3",
"label": "Mostly Correct"
},
"secondary": {
"code": "4",
"label": "Highly Correct"
}
},
"education_level": {
"primary": {
"code": "2",
"label": "High School Level"
},
"secondary": {
"code": "3",
"label": "Undergraduate Level"
}
}
}
|
672f1e42c33a7f9846924a2431ea77df
|
4,582,131,464,118,934,000 |
Creating objects in wrong layer
Hi folks!
As this is my first post here, I’d like to thank you for offering this tool and the opportunity to discuss its features here.
I tried to search this board for my issue, but (maybe due to language barrier) I couldn’t find anything helpful. Furthermore, I’m not quite sure if the following is a bug or just some error-by-user :stuck_out_tongue:
…but let’s jump right into my issue:
The following issue might not sound linke a big pita, but in my case it is, becuase I have to work with different offsets for each object layer.
When creating objects (e.g. a poly line) in a file with several object layers I often notice that I created the object in an object layer I didn’t even selected. My guess why this happens is that the position where the new object will be created is depending on your latest selection, but it only counts for selections within the objects window.
Assumtion:
If your selection was made in the objects window (by clicking on the name of any layer within the destinated object layer), everything will work just fine and the new object will be created at the bottom of the selected object layer. If your selection was made right on the map where you are editing (by clicking on the shape of any object which is in the destinated object layer), the new object will be created in the object layer where your last selection (in the objects window!) was made. So, why is selection =/= selection? Is it a bug, a usability issue or is there a just mistake in my workflow?
OS: Win8
Tiled version: 0.16.2
Hey daan, you’re welcome for the tool and thanks for bringing this up! Actually it was a usability issue:
https://github.com/bjorn/tiled/issues/1424
It’s fixed in the latest development snapshots thanks to the efforts of @GLAVAK and @WinterGrascph.
You can download development snapshots for Windows at https://update.mapeditor.org/snapshots-win/.
|
{
"url": "https://discourse.mapeditor.org/t/creating-objects-in-wrong-layer/2162",
"source_domain": "discourse.mapeditor.org",
"snapshot_id": "crawl=CC-MAIN-2022-21",
"warc_metadata": {
"Content-Length": "20722",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:CEVQTZG7YLOL6XOSPICQTIADLQ4GPRTV",
"WARC-Concurrent-To": "<urn:uuid:7073a29b-926f-4e12-9b28-5cfa0f928869>",
"WARC-Date": "2022-05-16T05:51:36Z",
"WARC-IP-Address": "64.62.250.111",
"WARC-Identified-Payload-Type": "text/html",
"WARC-Payload-Digest": "sha1:Y3TYOQ7YV6EBDADOM35Q2327DDH6MSLP",
"WARC-Record-ID": "<urn:uuid:5abeaa1c-cc3d-47b8-a6a2-8452eaa66a1f>",
"WARC-Target-URI": "https://discourse.mapeditor.org/t/creating-objects-in-wrong-layer/2162",
"WARC-Truncated": null,
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:5a443745-1cd7-4864-81aa-f0fc0d11c975>"
},
"warc_info": "isPartOf: CC-MAIN-2022-21\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for May 2022\r\noperator: Common Crawl Admin ([email protected])\r\nhostname: ip-10-67-67-36\r\nsoftware: Apache Nutch 1.18 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.3-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: https://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/"
}
|
{
"line_start_idx": [
0,
32,
33,
43,
44,
170,
387,
388,
425,
570,
916,
917,
928,
1532,
1533,
1542,
1564,
1565,
1671,
1672,
1715,
1716,
1816,
1817
],
"line_end_idx": [
32,
33,
43,
44,
170,
387,
388,
425,
570,
916,
917,
928,
1532,
1533,
1542,
1564,
1565,
1671,
1672,
1715,
1716,
1816,
1817,
1915
]
}
|
{
"red_pajama_v2": {
"ccnet_original_length": 1915,
"ccnet_original_nlines": 23,
"rps_doc_curly_bracket": 0,
"rps_doc_ldnoobw_words": 0,
"rps_doc_lorem_ipsum": 0,
"rps_doc_stop_word_fraction": 0.4481927752494812,
"rps_doc_ut1_blacklist": 0,
"rps_doc_frac_all_caps_words": 0.02409639023244381,
"rps_doc_frac_lines_end_with_ellipsis": 0,
"rps_doc_frac_no_alph_words": 0.17108434438705444,
"rps_doc_frac_unique_words": 0.48615384101867676,
"rps_doc_mean_word_length": 4.646153926849365,
"rps_doc_num_sentences": 21,
"rps_doc_symbol_to_word_ratio": 0.0024096400011330843,
"rps_doc_unigram_entropy": 4.670120716094971,
"rps_doc_word_count": 325,
"rps_doc_frac_chars_dupe_10grams": 0,
"rps_doc_frac_chars_dupe_5grams": 0.07880795001983643,
"rps_doc_frac_chars_dupe_6grams": 0.049668870866298676,
"rps_doc_frac_chars_dupe_7grams": 0,
"rps_doc_frac_chars_dupe_8grams": 0,
"rps_doc_frac_chars_dupe_9grams": 0,
"rps_doc_frac_chars_top_2gram": 0.04370861127972603,
"rps_doc_frac_chars_top_3gram": 0.02384106069803238,
"rps_doc_frac_chars_top_4gram": 0.03178808093070984,
"rps_doc_books_importance": -215.95114135742188,
"rps_doc_books_importance_length_correction": -215.9511260986328,
"rps_doc_openwebtext_importance": -116.39461517333984,
"rps_doc_openwebtext_importance_length_correction": -116.39461517333984,
"rps_doc_wikipedia_importance": -93.5675277709961,
"rps_doc_wikipedia_importance_length_correction": -93.5675277709961
},
"fasttext": {
"dclm": 0.04037410020828247,
"english": 0.9409533739089966,
"fineweb_edu_approx": 1.3776655197143555,
"eai_general_math": 0.8614921569824219,
"eai_open_web_math": 0.1203681230545044,
"eai_web_code": 0.5226801037788391
}
}
|
{
"free_decimal_correspondence": {
"primary": {
"code": "005.4",
"labels": {
"level_1": "General works, books and libraries, information sciences",
"level_2": "",
"level_3": "Computer programming"
}
},
"secondary": {
"code": "621.392",
"labels": {
"level_1": "Industrial arts, Technology, and Engineering",
"level_2": "Engineering",
"level_3": "Mechanical engineering and Machinery"
}
}
},
"bloom_cognitive_process": {
"primary": {
"code": "2",
"label": "Understand"
},
"secondary": {
"code": "4",
"label": "Analyze"
}
},
"bloom_knowledge_domain": {
"primary": {
"code": "2",
"label": "Conceptual"
},
"secondary": {
"code": "3",
"label": "Procedural"
}
},
"document_type_v1": {
"primary": {
"code": "5",
"label": "Social/Forum"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"extraction_artifacts": {
"primary": {
"code": "0",
"label": "No Artifacts"
},
"secondary": {
"code": "3",
"label": "Irrelevant Content"
}
},
"missing_content": {
"primary": {
"code": "0",
"label": "No missing content"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"document_type_v2": {
"primary": {
"code": "18",
"label": "Q&A Forum"
},
"secondary": {
"code": "21",
"label": "Customer Support"
}
},
"reasoning_depth": {
"primary": {
"code": "2",
"label": "Basic Reasoning"
},
"secondary": {
"code": "3",
"label": "Intermediate Reasoning"
}
},
"technical_correctness": {
"primary": {
"code": "3",
"label": "Mostly Correct"
},
"secondary": {
"code": "4",
"label": "Highly Correct"
}
},
"education_level": {
"primary": {
"code": "1",
"label": "General Audience"
},
"secondary": {
"code": "2",
"label": "High School Level"
}
}
}
|
672f1e42c33a7f9846924a2431ea77df
|
-3,424,824,233,629,904,000 |
elhombre's user avatar
elhombre's user avatar
elhombre's user avatar
elhombre
• Member for 13 years, 2 months
• Last seen more than 1 year ago
2 votes
Accepted
Can't print from OS X 10.7 to shared printer on OS X 10.6
1 vote
Copying data from PC to MacBook Pro
1 vote
Accepted
Time Machine multiple Disks Backup over Network
1 vote
Accepted
Entourage MyDay replacement
1 vote
Accepted
How do I reset the software Mac OS X Update Server
1 vote
How to do an loop animation in Keynote?
1 vote
Accepted
Adding a bookmark or a web page to the reading list in Safari causes freeze
1 vote
Accepted
Macbook Air doesn't recognize external display
0 votes
Accepted
osx split external hard drive partition
0 votes
Accepted
Can iCal merge Events of attendes into one shared event?
0 votes
Accepted
Does [email protected] belong to the Apple up to date program?
0 votes
Accepted
Growl iCal invite notification
0 votes
Accepted
Can't shift+select in Finder in Lion 10.7.1
|
{
"url": "https://apple.stackexchange.com/users/2336/elhombre?tab=answers",
"source_domain": "apple.stackexchange.com",
"snapshot_id": "CC-MAIN-2024-10",
"warc_metadata": {
"Content-Length": "128545",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:NMZBODBDQ2TS27CDCA2T6JCRMSZF2FLX",
"WARC-Concurrent-To": "<urn:uuid:bdd813f9-6e7d-4d26-a80f-7cdfdebf271e>",
"WARC-Date": "2024-03-05T02:16:32Z",
"WARC-IP-Address": "104.18.43.226",
"WARC-Identified-Payload-Type": "text/html",
"WARC-Payload-Digest": "sha1:3XD7RXC5DWBLFZYMENLCLYXYACSOSX63",
"WARC-Record-ID": "<urn:uuid:90a20287-fe62-49f0-8945-26b933b2023c>",
"WARC-Target-URI": "https://apple.stackexchange.com/users/2336/elhombre?tab=answers",
"WARC-Truncated": null,
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:1f6ef97c-e33f-441d-98a8-36b8e68b333f>"
},
"warc_info": "isPartOf: CC-MAIN-2024-10\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for February/March 2024\r\noperator: Common Crawl Admin ([email protected])\r\nhostname: ip-10-67-67-69\r\nsoftware: Apache Nutch 1.19 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.5-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: https://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/"
}
|
{
"line_start_idx": [
0,
23,
46,
69,
78,
112,
147,
155,
164,
165,
223,
224,
231,
232,
268,
269,
276,
285,
286,
334,
335,
342,
351,
352,
380,
381,
388,
397,
398,
449,
450,
457,
458,
498,
499,
506,
515,
516,
592,
593,
600,
609,
610,
657,
658,
666,
675,
676,
716,
717,
725,
734,
735,
792,
793,
801,
810,
811,
874,
875,
883,
892,
893,
924,
925,
933,
942,
943
],
"line_end_idx": [
23,
46,
69,
78,
112,
147,
155,
164,
165,
223,
224,
231,
232,
268,
269,
276,
285,
286,
334,
335,
342,
351,
352,
380,
381,
388,
397,
398,
449,
450,
457,
458,
498,
499,
506,
515,
516,
592,
593,
600,
609,
610,
657,
658,
666,
675,
676,
716,
717,
725,
734,
735,
792,
793,
801,
810,
811,
874,
875,
883,
892,
893,
924,
925,
933,
942,
943,
986
]
}
|
{
"red_pajama_v2": {
"ccnet_original_length": 986,
"ccnet_original_nlines": 67,
"rps_doc_curly_bracket": 0,
"rps_doc_ldnoobw_words": 0,
"rps_doc_lorem_ipsum": 0,
"rps_doc_stop_word_fraction": 0.19191919267177582,
"rps_doc_ut1_blacklist": 0,
"rps_doc_frac_all_caps_words": 0.04040404036641121,
"rps_doc_frac_lines_end_with_ellipsis": 0,
"rps_doc_frac_no_alph_words": 0.21212120354175568,
"rps_doc_frac_unique_words": 0.6294117569923401,
"rps_doc_mean_word_length": 4.535294055938721,
"rps_doc_num_sentences": 8,
"rps_doc_symbol_to_word_ratio": 0,
"rps_doc_unigram_entropy": 4.390201568603516,
"rps_doc_word_count": 170,
"rps_doc_frac_chars_dupe_10grams": 0,
"rps_doc_frac_chars_dupe_5grams": 0.07392995804548264,
"rps_doc_frac_chars_dupe_6grams": 0.07392995804548264,
"rps_doc_frac_chars_dupe_7grams": 0,
"rps_doc_frac_chars_dupe_8grams": 0,
"rps_doc_frac_chars_dupe_9grams": 0,
"rps_doc_frac_chars_top_2gram": 0.045395590364933014,
"rps_doc_frac_chars_top_3gram": 0.08430609852075577,
"rps_doc_frac_chars_top_4gram": 0.07263293862342834,
"rps_doc_books_importance": -70.13384246826172,
"rps_doc_books_importance_length_correction": -70.13384246826172,
"rps_doc_openwebtext_importance": -23.190185546875,
"rps_doc_openwebtext_importance_length_correction": -9.193375587463379,
"rps_doc_wikipedia_importance": -17.899126052856445,
"rps_doc_wikipedia_importance_length_correction": -17.899126052856445
},
"fasttext": {
"dclm": 0.025259200483560562,
"english": 0.8222326636314392,
"fineweb_edu_approx": 1.114879846572876,
"eai_general_math": 0.00008166000043274835,
"eai_open_web_math": 0.02713632956147194,
"eai_web_code": -0.000009780000254977494
}
}
|
{
"free_decimal_correspondence": {
"primary": {
"code": "004.16",
"labels": {
"level_1": "General works, books and libraries, information sciences",
"level_2": "",
"level_3": "Computers and Computer science"
}
},
"secondary": {
"code": "005.457",
"labels": {
"level_1": "General works, books and libraries, information sciences",
"level_2": "",
"level_3": "Computer programming"
}
}
},
"bloom_cognitive_process": {
"primary": {
"code": "3",
"label": "Apply"
},
"secondary": {
"code": "2",
"label": "Understand"
}
},
"bloom_knowledge_domain": {
"primary": {
"code": "3",
"label": "Procedural"
},
"secondary": {
"code": "2",
"label": "Conceptual"
}
},
"document_type_v1": {
"primary": {
"code": "5",
"label": "Social/Forum"
},
"secondary": {
"code": "3",
"label": "Reference/Encyclopedic/Educational"
}
},
"extraction_artifacts": {
"primary": {
"code": "3",
"label": "Irrelevant Content"
},
"secondary": {
"code": "0",
"label": "No Artifacts"
}
},
"missing_content": {
"primary": {
"code": "0",
"label": "No missing content"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"document_type_v2": {
"primary": {
"code": "18",
"label": "Q&A Forum"
},
"secondary": {
"code": "21",
"label": "Customer Support"
}
},
"reasoning_depth": {
"primary": {
"code": "2",
"label": "Basic Reasoning"
},
"secondary": {
"code": "3",
"label": "Intermediate Reasoning"
}
},
"technical_correctness": {
"primary": {
"code": "6",
"label": "Not Applicable/Indeterminate"
},
"secondary": {
"code": "3",
"label": "Mostly Correct"
}
},
"education_level": {
"primary": {
"code": "2",
"label": "High School Level"
},
"secondary": {
"code": "1",
"label": "General Audience"
}
}
}
|
672f1e42c33a7f9846924a2431ea77df
|
2,530,830,156,437,746,700 |
NeXT Cubes And LCD Monitors
The NeXT slabs and cubes were interesting computers for their time, with new interesting applications that are commonplace today seen first in this block of black plastic. Web browsers, for example, were first seen on the NeXT.
Running one of these machines today isn’t exactly easy; there are odd video connectors but you can modify some of the parts and stick them in an LCD monitor. It’s a tradeoff between a big, classic, heavy but contemporary CRT and a modern, light, and efficient LCD, but it’s still a great way to get a cube or slab up and running if you don’t have the huge monitor handy.
The NeXT cube doesn’t have a single wire going between the computer and the monitor; that would be far too simple. Instead, a NeXT Sound Box sits between the two, providing the user a place to plug the monitor, keyboard, mouse, and audio connectors into. [Brian] took the board from this Sound Box and put it inside an old NEC LCD monitor he had sitting around. 12V and 5V rails were wired in, the video lines were wired in, and [Brian] created a new NeXT monitor.
There are two versions of the NeXT Sound Box – one for ADB peripherals (Apple IIgs and beige Macs), and another for non-ADB peripherals. [Brian] also put together a tutorial for using non-ADB peripherals with the much more common ADB Sound Board.
15 thoughts on “NeXT Cubes And LCD Monitors
1. If you ask me (nobody ever does) the Next computer was Steve Jobs greatest contribution. It was light-years ahead of its time. If he had gone head-to-head with Microsoft in the PC OS market the world might be a little different today. Instead he tried to start up another Apple and found that no one was willing to spend outrageous amounts of money on a proprietary computer with little software written for it that used a cutting edge programming language that didn’t have a developer base.
I remember drooling over the specs, getting shocked at the price and puzzling over the file system
The OS is now open source if anyone wants to play with it.
http://en.m.wikipedia.org/wiki/OpenStep
http://www.gnustep.org
1. I was going to post this here.
1. Magnesium
2. NeXT’s are as interesting as today’s computers, as there are NO architectural difference from todays most advanced desktop OS’s and those machines. For example, the total separation between GUI and “code” (true Model-View-Controller architecture), was already in place.
1. The output of the sound box is a fairly standard 13W3, which plugs fine into my VGA monitors with a straightforward adapter cable (although I think my monitors are sync-on-green capable).
1. Yes, that is correct for the nextstation color series. This mod will not work with those machines as the color signal is broken out at the Y-cable. In that case a simple 13w3 to VGA adapter will work. You can use my other mod for the ADB sound board to use non-adb peripherals. Only the color turbo nextstation can use ADB with the proper ROM installed. No mono signal will come to the sound box. Another thing to mention is that the color machines use a 72hz refresh which can be a problem for many LCDs.
2. Even if it doesn’t support the color NeXT machines (well, technically it will on a color cube because you then have two framebuffers) this is a great alternative to the mono Megapixel monitors where the complete lack of power management meant that a lot of the cathodes and heaters in the CRT’s are completely worn out.
3. Nothing to do with this hack; I’d just like to mention that I’ve got a couple of cubes as coffee table stands/bases. Boards are still there, but I pulled the HD’s out because they’re so heavy.
Leave a Reply to John Klos Cancel reply
Please be kind and respectful to help make the comments section excellent. (Comment Policy)
This site uses Akismet to reduce spam. Learn how your comment data is processed.
|
{
"url": "https://hackaday.com/2014/12/27/next-cubes-and-lcd-monitors/?replytocom=2294338",
"source_domain": "hackaday.com",
"snapshot_id": "crawl=CC-MAIN-2022-27",
"warc_metadata": {
"Content-Length": "105552",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:T2V6CAV2MBLVNIWET4J7TAZ34IEUJTBQ",
"WARC-Concurrent-To": "<urn:uuid:13de99a8-2647-40dc-8798-34b0530e59d1>",
"WARC-Date": "2022-07-01T20:07:47Z",
"WARC-IP-Address": "192.0.66.96",
"WARC-Identified-Payload-Type": "text/html",
"WARC-Payload-Digest": "sha1:UYR6C4UOCAMMHN2DQG3MZVI7VDGLATQM",
"WARC-Record-ID": "<urn:uuid:312fab2b-aed7-4ba6-967e-848a9fda5eaf>",
"WARC-Target-URI": "https://hackaday.com/2014/12/27/next-cubes-and-lcd-monitors/?replytocom=2294338",
"WARC-Truncated": null,
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:db95fe10-3738-4bcf-bbfd-098ffaec717d>"
},
"warc_info": "isPartOf: CC-MAIN-2022-27\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for June/July 2022\r\noperator: Common Crawl Admin ([email protected])\r\nhostname: ip-10-67-67-185\r\nsoftware: Apache Nutch 1.18 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.3-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: https://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/"
}
|
{
"line_start_idx": [
0,
28,
29,
257,
258,
629,
630,
1095,
1096,
1343,
1344,
1388,
1389,
1886,
1989,
2052,
2053,
2097,
2098,
2125,
2126,
2164,
2165,
2184,
2463,
2464,
2659,
2660,
3175,
3176,
3501,
3502,
3700,
3701,
3741,
3742,
3834,
3835
],
"line_end_idx": [
28,
29,
257,
258,
629,
630,
1095,
1096,
1343,
1344,
1388,
1389,
1886,
1989,
2052,
2053,
2097,
2098,
2125,
2126,
2164,
2165,
2184,
2463,
2464,
2659,
2660,
3175,
3176,
3501,
3502,
3700,
3701,
3741,
3742,
3834,
3835,
3915
]
}
|
{
"red_pajama_v2": {
"ccnet_original_length": 3915,
"ccnet_original_nlines": 37,
"rps_doc_curly_bracket": 0,
"rps_doc_ldnoobw_words": 0,
"rps_doc_lorem_ipsum": 0,
"rps_doc_stop_word_fraction": 0.4194711446762085,
"rps_doc_ut1_blacklist": 0,
"rps_doc_frac_all_caps_words": 0.04086538031697273,
"rps_doc_frac_lines_end_with_ellipsis": 0,
"rps_doc_frac_no_alph_words": 0.15745191276073456,
"rps_doc_frac_unique_words": 0.5022222399711609,
"rps_doc_mean_word_length": 4.542222023010254,
"rps_doc_num_sentences": 45,
"rps_doc_symbol_to_word_ratio": 0,
"rps_doc_unigram_entropy": 5.333935260772705,
"rps_doc_word_count": 675,
"rps_doc_frac_chars_dupe_10grams": 0,
"rps_doc_frac_chars_dupe_5grams": 0,
"rps_doc_frac_chars_dupe_6grams": 0,
"rps_doc_frac_chars_dupe_7grams": 0,
"rps_doc_frac_chars_dupe_8grams": 0,
"rps_doc_frac_chars_dupe_9grams": 0,
"rps_doc_frac_chars_top_2gram": 0.011415529996156693,
"rps_doc_frac_chars_top_3gram": 0.007175469771027565,
"rps_doc_frac_chars_top_4gram": 0.012393999844789505,
"rps_doc_books_importance": -388.7881774902344,
"rps_doc_books_importance_length_correction": -388.7881774902344,
"rps_doc_openwebtext_importance": -230.15167236328125,
"rps_doc_openwebtext_importance_length_correction": -230.15167236328125,
"rps_doc_wikipedia_importance": -165.20169067382812,
"rps_doc_wikipedia_importance_length_correction": -165.20169067382812
},
"fasttext": {
"dclm": 0.04315495118498802,
"english": 0.9480231404304504,
"fineweb_edu_approx": 1.7822250127792358,
"eai_general_math": 0.4173291325569153,
"eai_open_web_math": 0.3487586975097656,
"eai_web_code": 0.006052849814295769
}
}
|
{
"free_decimal_correspondence": {
"primary": {
"code": "004.16",
"labels": {
"level_1": "General works, books and libraries, information sciences",
"level_2": "",
"level_3": "Computers and Computer science"
}
},
"secondary": {
"code": "004.17",
"labels": {
"level_1": "General works, books and libraries, information sciences",
"level_2": "",
"level_3": "Computers and Computer science"
}
}
},
"bloom_cognitive_process": {
"primary": {
"code": "3",
"label": "Apply"
},
"secondary": {
"code": "2",
"label": "Understand"
}
},
"bloom_knowledge_domain": {
"primary": {
"code": "3",
"label": "Procedural"
},
"secondary": {
"code": "2",
"label": "Conceptual"
}
},
"document_type_v1": {
"primary": {
"code": "3",
"label": "Reference/Encyclopedic/Educational"
},
"secondary": {
"code": "5",
"label": "Social/Forum"
}
},
"extraction_artifacts": {
"primary": {
"code": "0",
"label": "No Artifacts"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"missing_content": {
"primary": {
"code": "0",
"label": "No missing content"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"document_type_v2": {
"primary": {
"code": "23",
"label": "Tutorial"
},
"secondary": {
"code": "10",
"label": "Knowledge Article"
}
},
"reasoning_depth": {
"primary": {
"code": "2",
"label": "Basic Reasoning"
},
"secondary": {
"code": "3",
"label": "Intermediate Reasoning"
}
},
"technical_correctness": {
"primary": {
"code": "3",
"label": "Mostly Correct"
},
"secondary": {
"code": "4",
"label": "Highly Correct"
}
},
"education_level": {
"primary": {
"code": "2",
"label": "High School Level"
},
"secondary": {
"code": "1",
"label": "General Audience"
}
}
}
|
672f1e42c33a7f9846924a2431ea77df
|
-2,495,021,144,489,244,000 |
Computer Docking Station Having Interchangeable Receivers Configured For Docking Various Sized Portable Computers - Patent 5699226
Document Sample
scope of work template
United States Patent: 5699226
( 1 of 1 )
United States Patent
5,699,226
Cavello
December 16, 1997
Computer docking station having interchangeable receivers configured for
docking various sized portable computers
Abstract
A docking apparatus for docking selected portable computers, each of the
portable computers having a portable computer connector positioned on its
rear end. The docking apparatus comprises a base having a first end and a
second end, with an electronics enclosure positioned on the base between
the first end and the second end. The electronics enclosure has a first
end positioned to extend generally perpendicularly from a first side to a
second side of the base and generally perpendicularly upwardly from the
base to form a wall with a docking apparatus connector being positioned on
the wall and configured to matingly engage the portable computer
connector. A receiver for at least one of the portable computers is
positioned on the base and configured to matingly engage the bottom and
the first and second sides of at least one portable computer to position
the portable computer for mating engagement of the portable computer
connector and the docking apparatus connector. The receiver may be
configured as a part of the base of the docking apparatus. The base
includes a receptacle and the receiver includes a manual lock which
engages the receptacle. Alternatively, the receiver may be formed to be
removably positioned on the base of the docking apparatus or by removably
positioning attachments which are configured to matingly engage one or
more portable computers on the base. The receiver may also comprise a
plurality of extendable members which are extendable to engage and support
a portable computer in a desired position.
Inventors:
Cavello; Christopher (Austin, TX)
Assignee:
Dell U.S.A., L.P.
(Austin,
TX)
Appl. No.:
08/600,888
Filed:
February 13, 1996
Current U.S. Class:
361/679.43 ; 439/638
Current International Class:
G06F 1/16 (20060101); G06F 001/16 (); H05K 007/10 ()
Field of Search:
364/708.1 439/638 361/686
References Cited [Referenced By]
U.S. Patent Documents
5182698
January 1993
Kobayashi et al.
5436792
July 1995
Leman et al.
5535093
July 1996
Noguchi et al.
Primary Examiner: Phillips; Michael W.
Attorney, Agent or Firm: Haynes and Boone, L.L.P.
Claims
What is claimed is:
1. A docking apparatus for docking selected portable computers of dimensions, each of the portable computers having a front end and a rear end, a first and a second side, a
top and a bottom and a portable computer connector, the docking apparatus comprising:
a base having a first end and a second end and a receptacle;
an electronics enclosure positioned on the base between the first end and the second end, the electronics enclosure having a first end positioned to extend generally perpendicularly between a first side to a second side of the base and generally
perpendicularly upwardly from the base to form a wall;
a docking apparatus connector positioned on the wall and configured to matingly engage the portable computer connector;
a receiver for at least one of the portable computers, the receiver including a manual lock positioned for engagement with the receptacle of the base when the receptacle is positioned on the base thereby to removably secure the receiver to the
base, the receiver being configured to matingly engage the bottom of one of the portable computers to position the one of the portable computers for mating engagement of the portable computer connector and the docking apparatus connector.
2. The docking apparatus of claim 1 comprising a plurality of interchangeable receivers each comprising a manual lock for engagement with the receptacle of the base thereby to removably secure the receiver to the bases wherein each of the
receivers is configured to matingly engage and position a different one of the selected portable computers.
3. The docking apparatus of claim 1 wherein the electronics enclosure further includes ejectors for disengagement of the portable computer connector from the docking apparatus connector. Description
FIELD OF THE INVENTION
The present invention relates generally to computer docking stations and more particularly to a docking apparatus for docking various sized portable computers that have different exterior dimensions and a common portable computer connector.
BACKGROUND OF THE INVENTION
To enable small portable computers such as notebook computers to be used in conjunction with desktop computer peripheral equipment, such as monitors, printers, and the like, structures referred to as port replicators are used. A port replicator
is a relatively small device which can be positioned on a desktop or other horizontal work surface and serves as an interface between a portable computer and the desktop peripherals with which it is to be used. Typically, the port replicator includes a
housing adapted to rest on a horizontal surface and having a rear side from which a series of connecting cables extend to the selected peripheral equipment. The front side of the port replicator is engagable with the portable computer in a manner so
that a connector on the portable computer is engaged with a mating connector on the port replicator to enable the portable computer to utilize the desired peripheral equipment.
However, when the portable computer is removed, the port replicator is a relatively small light device which is susceptible to being pulled off the desk by the weight of the cables connected to it. As a result, other types of docking apparatus
have been developed. One such docking apparatus comprises a base having positioned on one end an electronics enclosure which includes the electronics necessary to interconnect the portable computer with the desired peripheral equipment. The electronics
enclosure may also include a cable cover to cosmetically cover the cable connections. On the other end, a receiver is positioned to matingly engage the bottom and sides of a portable computer so that it may slide into mating engagement with the docking
apparatus. Mating engagement is achieved by moving a connector positioned on a rear end of the portable computer into engagement with a connector positioned on the docking apparatus so that the portable computer is matingly engaged with the docking
apparatus in operable electrical contact for use with the desired peripheral equipment. The portable computer display screen can be raised and the portable computer can be used while docked in contact with the peripheral equipment. Further, the docking
apparatus may include fittings for engagement with a monitor stand so that the docking apparatus with the docked portable computer can be stored under the monitor stand when the portable computer display screen is dosed.
In many instances, peripheral equipment in a particular office may be used by a number of users. Various users of the peripheral equipment may have portable computers which are of different models, different capabilities and the like, but of a
common family of portable computers. Such a family of portable computers can be designed to have a portable computer connector which is common to all members of the family of portable computers. Because of the different capabilities which may be
included in some of the portable computers, the different configurations of different models and the like, the portable computers may not all be readily mated with a single docking apparatus because the receiver is not configured to position the portable
computer properly for mating engagement of the portable computer connector with the docking apparatus connector. As a result, a different docking apparatus is required for each portable computer having a different configuration. In addition, a
different docking apparatus is typically required when a user upgrades to a portable computer having increased functionality due to differences in size of the computer and in the positioning of the portable computer connector.
What is needed, therefore, is a system whereby users of various sized portable computers can dock their portable computers at the same docking station. The foregoing is especially desirable in environments where different sized portable
computers from a common family of computers, having a common portable computer connector, are used.
SUMMARY OF THE INVENTION
The present invention, accordingly, provides an apparatus for docking various sized portable computers at the same docking station that overcomes or reduces disadvantages and limitations associated with prior systems.
The invention provides an apparatus for docking selected portable computers of a family of portable computers, each of the portable computers having a front end and a rear end, a first side and a second side, a top and a bottom, and a portable
computer connector positioned on the rear end of the portable computer.
The docking apparatus comprises a base having a first end and a second end and an electronics enclosure positioned on the base between the first end and the second end, the electronics enclosure having a first end positioned to extend generally
perpendicularly from a first side to a second side of the base and generally perpendicularly upwardly from the base to form a wall. A docking apparatus connector is positioned on the wall and configured to matingly engage the portable computer
connector. A receiver is positioned on the base and configured to matingly engage the bottom and a first and a second side of at least one portable computer to position at least one portable computer for mating engagement of the portable computer
connector and the docking apparatus connector.
The receiver may be configured as a part of the base of the docking apparatus. Alternatively, the receiver may be formed to be removably positioned on the base of the docking apparatus. Further, the receiver may be formed by removably
positioning a plurality of attachments which are configured to matingly engage one or more portable computers on the base. The receiver may also comprise a plurality of extendable members which are extendable to engage and support a portable computer in
a desired position .
BRIEF DESCRIPTION OF THE DRAWINGS
FIG. 1 is an exploded, perspective view of a docking apparatus of the present invention.
FIG. 2 is an end view from section line 2--2 of FIG. 1 of a receiver positioned on the base of the docking apparatus showing the positioning of a portable computer supported therein.
FIG. 3 is an end view of an alternative receiver taken from the position of section line 2--2 of FIG. 1 that is formed as a part of the base showing a portable computer supported therein.
FIG. 4 is an end view of the receiver of FIG. 3 taken from the position of section line 2--2 of FIG. 1 showing a different portable computer supported therein.
FIG. 5 is an end view taken from the position of section line 2--2 of FIG. 1 of another alternative receiver that is form by positioning attachments on the base and shows a portable computer supported by the attachments.
FIG. 6 is a perspective view of a receiver having extendable members positioned in its floor for supporting a portable computer.
FIG. 7 is a cross sectional end view from section line 7--7 of FIG. 6 showing the extendable members in an extended position to support a portable computer.
FIG. 8 is a cross sectional end view from section line 7--7 of FIG. 6 showing the extendable members in a retracted position to support a different sized portable computer.
FIG. 9 is a cross sectional end view from section line 7--7 of FIG. 6 of an alternative embodiment of the apparatus of FIG. 6 wherein extendable members are also positioned in the sides of the receiver.
FIG. 10 is a perspective view of an alternative embodiment of the docking apparatus of the present invention.
FIG. 11 is an enlarged, cross-sectional view from section line 11--11 of FIG. 10 showing a detail of the engagement mechanism between the base and receiver.
FIG. 12 is an enlarged, cross-sectional view from section line 12--12 of FIG. 10 showing a detail of the mating engagement of the components of the invention.
DESCRIPTION OF PREFERRED EMBODIMENTS
In FIG. 1, the reference numeral 10 refers to a docking apparatus of the present invention resting on a surface 12. The docking apparatus 10 comprises a base 14 having a side 16, a side 18, a front end 20 and a rear end 22. The base 14 may be
formed, as shown, as a framework or as a solid member. Fittings 24 are optionally provided on the base 14 for mounting a monitor stand (not shown) above the docking apparatus 10. An electronics enclosure 26 is provided which includes the electrical
components necessary to achieve electrical connection of a portable computer with peripheral equipment or the like and other functionalities not available in the portable computer enclosure. The electronics enclosure 26 includes a front end 28 and a
rear end 30, and is connected by cables (not shown) to peripheral equipment and the like. The electronics enclosure 26 also includes a side 32 and a side 34. End 28 is formed as a wall which supports a connector 36 which includes guide pins 38 and
connector pins 40. Ejectors 42 are positioned on end 28 to eject portable computers from engagement with connector 36 when desired. Ejectors 42 may be mechanical or electromechanical and are operated by a switch or lever 44, shown on the side 32 of the
electronics enclosure 26.
A receiver 46 having a side 48, a side 50, a front end 54, and a rear end 56, is positioned for mounting on the base 14. The receiver 46 includes rafts 58 which may be positioned on a floor 60 of the receiver 46 and optionally on inner walls 62
of sidewalls 64 of the receiver 46 to facilitate sliding a portable computer into the receiver 46. The receiver 46 as shown is maintained in position on the base 14 by a manual lock 66 positioned on the receiver 46, and adapted for engagement with a
receptacle 68 positioned on the base 14 to maintain the receiver 46 in place. Slots 70 are provided on the base 14, to receive tabs (not shown) on the receiver 46 to further secure the receiver 46 in position on the base 14.
As shown in FIG. 2, a portable computer 72 is positioned in the receiver 46 positioned on the base 14. The portable computer 72 has a portable computer connector 74 positioned on its rear end and is positioned between the sidewalls 64 for mating
engagement of the connector 74 with the connector 36. The connector 74 contains receptacles 76 for the guide pins 38 and receptacles 78 for the connector pins 40. The pins and receptacles could be reversed between the connector 36 and the connector 74.
By the use of a plurality of receivers 46 adapted to receive different portable computers by varying the width of the sidewalls 64 and the height of the rails 58 to matingly engage with the sides and bottom of the portable computer to position
the portable computer connector 74 in position for mating engagement with the docking apparatus connector 36, a large number of portable computers from a common family of portable computers can be docked in the same docking apparatus.
FIGS. 3 and 4 disclose an alternate embodiment of the present invention wherein the receiver 46 is formed as a part of the base 14. In the embodiment shown in FIGS. 3 and 4, the same receiver 46 is adapted to support two portable computers 72a
and 72b. The sidewalls 64, as shown, are adapted to matingly engage the sides and bottom of the portable computers 72a and 72b for mating engagement of the connector 74 with the connector 36. Each of the sidewalls 64 includes a bearing surface 64a
which supports the bottom of the portable computer 72a.
Alternatively, the portable computer 72b having a different exterior configuration can be supported in receiver 46, as shown in FIG. 4. Inner walls 62, formed as a part of the sidewalls 64, engage the sides of the portable computer 72b, and
floor 60 engages the bottom of the portable computer 72a. Either of two portable computers can thus be placed in a position for mating engagement of the connector 74 with the connector 36.
In FIG. 5, the receiver 46 is formed by positioning removable attachments 80 on the sides of the base 14 to form the sidewalls 64 as shown. The attachments 80 may be removably attached to base 14 by any convenient method, such as screws,
friction fittings, mating tabs and slots, and the like, as known to those skilled in the art. Various attachments 80 having different dimensions can be provided to receive a variety of portable computers 72.
In FIG. 6, an alternate embodiment of the docking apparatus of the present invention is shown. The receiver 46 is shown as a hollow member having slots 82 positioned in the floor 60 of the receiver 46. The slots 82 are positioned for extension
of inner extendable members 84 and outer extendable members 86 (shown in FIG. 7) upwardly through the floor 60 of the receiver 46. The receiver 46 with members 84 and 86 retracted is adapted to receiver a portable computer of a size compatible with the
sidewalls 64 and the floor 60 of the receiver 46 as configured.
In FIG. 7, extendable members 84 and 86 have been extended to support the portable computer 72 in the receiver 46. The extendable members 84 and 86 may be extended by any suitable mechanical or electromechanical means and are activated by a
switch 88, shown on the side 16 of the receiver 46. In FIG. 8, a portable computer 72 is shown positioned in the receiver 46 with the extendable members 84 and 86 in a retracted position to accommodate a larger portable computer 72.
In FIG. 9, an alternate embodiment of the receiver 46 of FIG. 6 is shown. In this embodiment, horizontally extendable members 90 are positioned in the sidewalls 64. In this embodiment, the extendable members 84, 86 and 90 may be extended for
variable distances to accommodate various portable computers 72 in place. Desirably, the extendable members 84, 86 and 90 are rails which are adapted to slidably engage the sidewalls and bottom of the portable computer 72 to position it for mating
engagement of the connector 74 with the connector 36. The extendable members 84, 86 and 90 may be moved into a desired position by electromechanical devices 92 which may be controlled manually by the switch 88 or by a computer program designed to
position the extendable rails 84, 86 and 90 in desired positions to accommodate different external portable computer configurations.
Referring now to FIG. 10, the reference numeral 100 referes to a docking apparatus of an alternative embodiment of the present invention. The docking apparatus 100 comprises a base 102 having a sidewall 104, a sidewall 106, a front end 108 and a
rear end 110. Like the base 14, the base 102 may be formed as a framework or as a solid member, as shown. Fittings 112 are optionally provided on the base 102 for mounting a monitor stand (not shown) above the docking apparatus 100.
An electronics housing 114 is provided which includes the electrical components (not shown) necessary to achieve electrical connection of a portable computer with peripheral equipment or the like. The electronics housing 114 includes a rear
portion 116 and a front portion 118. The rear portion 116 may be removably attached to the base 102 and to the front portion 118 by any convenient method, such as mating tabs and slots, and the like, as known to those skilled in the art, and contains
depressions 120 for facilitating such removal. The front portion 118 of the electronics housing 114 includes a front end 122, a side 124 and a side 126. End 122 supports a connector 128 which includes guide pins 130 and connector pins 132. Ejectors
134 extend from within the electronics housing 114 through the end 122 to eject portable computers from engagement with the connector 128 when desired. The ejectors 134 may be mechanical or electromechanical and are operated by a switch or lever 136,
shown on the side 124 of the front portion 118 of the electronics housing 114.
A receiver 138 having a sidewall 140, a sidewall 142, a front end 144 and a rear end 146, is positioned for mounting on the base 102 such that the sidewalls 140 and 142 of the receiver 138 matingly engage with the sidewalls 104 and 106 of the
base 102 as shown in FIG. 11. The receiver 138 includes a floor 148, positioned on which are rails 150, each having a sloped leading edge 150a, and a raised surface 152 for receiving a portable computer 154 onto the receiver 138. The portable computer
154 has corresponding rails 156 and feet 158 extending downwardly therefrom to further facilitate the entry and positioning of the portable computer 154 onto the receiver 138 as shown in FIG. 11.
The receiver 138 as shown in FIG. 10 is maintained in position on the base 102 not only through engagement of the sidewalls 104 and 106 of the base 102, but (referring to both FIG. 10 and FIG. 12) by a locking tab 160 that extends downwardly from
a circular partial cutout 162 in the floor 148 of the receiver 138, that is adapted for engagement with a slot 164 positioned near the front end 108 of the base 102 behind a sloped surface 166. In addition, a plurality of openings 168 are provided in
the front end 122 of the electronics housing 114 adjacent the base 102 to receive tabs 170 horizontally extending from the rear end 146 of the receiver 138 to further secure the receiver 138 in position on the base 102. Moreover, a plurality of slots
172 are provided in the front end 108 of the base 102 to receive tabs 174 horizontally extending from a shoulder 176 formed on the underside of the receiver 138 as shown in FIG. 10 and FIG. 12. When engaged, the shoulder 176 engages the front end 108 of
the base 102 to further facilitate the engagement and positioning of the receiver 138 on the base 102.
The portable computer 154 has a portable computer connector 178 positioned on its rear end for mating engagement with the connector 128. The connector 178 contains receptacles 180 for the guide pins 130 and receptacles (not shown) for the
connector pins 132. The pins and receptacles could be reversed between the connector 128 and the connector 178. If necessary, the portable computer 154 may also have depressions 182 on its rear end for mating engagement with the ejectors 134.
In operation, the receiver 138 is engaged with the base 102 by sliding the receiver 138 onto the base 102 between the sidewalls 104 and 106 of the base. The mating of the sidewalls 140 and 142 of the receiver 138 with the sidewalls 104 and 106
of the base 102 direct the tabs 170 into the openings 168 and the tabs 174 into the slots 172. Disengagement is prevented by the locking tab 160 that engages the slot 164 after sliding up the surface 166. The portable computer 154 is then positioned on
the receiver 138 by sliding the portable computer 154 onto the sloped edges 150a of the rails 150 between the sidewalls 140 and 142 of the receiver. The mating of the sidewalls, the rails 156 of the portable computer 154 with the raised surface 152 of
the receiver 138, and the corresponding heights of the rails 150 of the receiver 138 and the feet 158 of the portable computer 154, direct the connector 178 into engagement with the connector 128 to connect the portable computer 154 with the docking
apparatus 100 and the associated peripheral equipment (not shown).
Disengagement of the portable computer 154 from the docking apparatus 100 is accomplished by activating the switch 136, which in turn activates the ejectors 134 that urge against the rear end of the portable computer 154 to separate the
connectors 128 and 178. The receiver 138 is disengaged from the base 102 by lifting up on the cutout 162 to lift the locking tab 160 out of the slot 164. The receiver 138 can then be slid off of the base 102 to make room for the next receiver.
By the use of a plurality of receivers 138, each adapted to be received by the base 102 but adapted to receive different portable computers 154 by varying the width of the sidewalls 140 and 142, the height and location of the rails 150, and the
height and width of the raised surface 152 to matingly engage with the sides and bottom of the portable computer, including the rafts 156 and the feet 158, to position the portable computer connector 178 in position for mating engagement with the docking
apparatus connector 128, a large number of portable computers from a common family of portable computers can be docked in the same docking apparatus 100.
In the use of the docking apparatus of the present invention, a plurality of receivers can be provided for mounting on the base to accommodate selected portable computers based upon the external configuration of the portable computers. Many
manufacturers of portable computers find it desirable to change the external dimensions of the portable computers because of varied capabilities in the portable computer, fabrication at different facilities, and the like. While such changes may be
necessitated by the internal arrangement of electronic components and the like, it is possible to position a common portable computer connector on all such portable computers. Further, while it is desirable to be able to move the location of the
portable computer connector to a certain extent, it is also feasible to locate the connector generally in a selected position such as toward the left and generally toward the top of the rear of the portable computer. While the location may not be
exactly the same on each portable computer model, the location is in the same general area and suitable for mating with the docking apparatus connector when the portable computer is suitably positioned.
By the use of the docking apparatus of the present invention, a large number of selected members of a family of portable computers can be docked in a common docking apparatus by providing a receiver which is adapted to receive the desired
portable computer and which can be positioned on the base of the docking apparatus. Alternatively, as discussed, attachments can be used or extendable rafts can be used.
Having thus described the present invention by reference to its preferred embodiments, it is pointed out that many variations and modifications are possible within the scope of the present invention. Such variations and modifications may appear
obvious and desirable to those skilled in the art based upon the foregoing description of preferred embodiments. For example, and with particular reference to the docking apparatus 100 shown in FIG. 10, the rails 150 of the receiver 148 could be
eliminated or the sidewalls 140 and 142 shortened in length or even eliminated in some cases. As the rails 156 provide left and right alignment, the sidewalls 140 and 142 are not required to properly align the connectors and can thus be eliminated, or
simply shortened to still provide course alignment. In addition, the lever 136 could be positioned near the front end of the base 102 to facilitate its access. Moreover, the connectors could be repositioned on both the portable computer and the docking
apparatus to allow docking to occur at different locations besides at the rear of the portable computer. Further modifications, changes and substitutions are intended in the foregoing disclosure and in some instances some features of the invention will
be employed without a corresponding use of other features. Accordingly, it is appropriate that the appended claims be construed broadly and in a manner consistent with the scope of the invention.
* * * * *
DOCUMENT INFO
Description: The present invention relates generally to computer docking stations and more particularly to a docking apparatus for docking various sized portable computers that have different exterior dimensions and a common portable computer connector.BACKGROUND OF THE INVENTIONTo enable small portable computers such as notebook computers to be used in conjunction with desktop computer peripheral equipment, such as monitors, printers, and the like, structures referred to as port replicators are used. A port replicatoris a relatively small device which can be positioned on a desktop or other horizontal work surface and serves as an interface between a portable computer and the desktop peripherals with which it is to be used. Typically, the port replicator includes ahousing adapted to rest on a horizontal surface and having a rear side from which a series of connecting cables extend to the selected peripheral equipment. The front side of the port replicator is engagable with the portable computer in a manner sothat a connector on the portable computer is engaged with a mating connector on the port replicator to enable the portable computer to utilize the desired peripheral equipment.However, when the portable computer is removed, the port replicator is a relatively small light device which is susceptible to being pulled off the desk by the weight of the cables connected to it. As a result, other types of docking apparatushave been developed. One such docking apparatus comprises a base having positioned on one end an electronics enclosure which includes the electronics necessary to interconnect the portable computer with the desired peripheral equipment. The electronicsenclosure may also include a cable cover to cosmetically cover the cable connections. On the other end, a receiver is positioned to matingly engage the bottom and sides of a portable computer so that it may slide into mating engagement with the dockingapparatus. Mating engagement is achieved by moving a conn
How are you planning on using Docstoc?
|
{
"url": "http://www.docstoc.com/docs/50030975/Computer-Docking-Station-Having-Interchangeable-Receivers-Configured-For-Docking-Various-Sized-Portable-Computers---Patent-5699226",
"source_domain": "www.docstoc.com",
"snapshot_id": "crawl=CC-MAIN-2013-48",
"warc_metadata": {
"Content-Length": "98903",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:RZBQM5LYYV4WN4QYTJF3DUY25PG5SPWY",
"WARC-Concurrent-To": "<urn:uuid:59772683-b96c-4bd2-8e06-00ac3b5b134d>",
"WARC-Date": "2013-12-05T07:03:16Z",
"WARC-IP-Address": "72.172.88.41",
"WARC-Identified-Payload-Type": null,
"WARC-Payload-Digest": "sha1:BTQ6CAWVEDAG2TBF6B6EEF7FQOX5GROO",
"WARC-Record-ID": "<urn:uuid:d318a2d4-6cf4-421b-b4cc-7b5e312570b4>",
"WARC-Target-URI": "http://www.docstoc.com/docs/50030975/Computer-Docking-Station-Having-Interchangeable-Receivers-Configured-For-Docking-Various-Sized-Portable-Computers---Patent-5699226",
"WARC-Truncated": null,
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:c64c3500-05a6-4105-9493-29f80e39981d>"
},
"warc_info": "robots: classic\r\nhostname: ip-10-33-133-15.ec2.internal\r\nsoftware: Nutch 1.6 (CC)/CC WarcExport 1.0\r\nisPartOf: CC-MAIN-2013-48\r\noperator: CommonCrawl Admin\r\ndescription: Wide crawl of the web with URLs provided by Blekko for Winter 2013\r\npublisher: CommonCrawl\r\nformat: WARC File Format 1.0\r\nconformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf"
}
|
{
"line_start_idx": [
0,
131,
132,
148,
171,
177,
178,
179,
209,
210,
211,
212,
213,
214,
215,
216,
217,
218,
219,
220,
221,
222,
223,
224,
225,
226,
227,
228,
229,
230,
231,
232,
233,
234,
235,
236,
237,
238,
239,
240,
241,
242,
243,
250,
261,
262,
263,
264,
287,
298,
299,
300,
301,
310,
312,
313,
315,
333,
334,
335,
336,
337,
411,
457,
458,
459,
460,
469,
470,
543,
622,
701,
779,
856,
935,
1012,
1092,
1162,
1235,
1312,
1390,
1464,
1536,
1609,
1682,
1759,
1838,
1914,
1989,
2069,
2117,
2118,
2119,
2121,
2133,
2169,
2180,
2181,
2182,
2200,
2211,
2215,
2216,
2217,
2218,
2219,
2220,
2231,
2252,
2264,
2267,
2274,
2297,
2317,
2318,
2319,
2320,
2321,
2322,
2325,
2345,
2369,
2372,
2402,
2469,
2472,
2490,
2493,
2496,
2497,
2498,
2525,
2528,
2529,
2563,
2585,
2587,
2589,
2591,
2599,
2612,
2629,
2630,
2638,
2648,
2661,
2662,
2670,
2680,
2695,
2696,
2697,
2698,
2741,
2742,
2743,
2795,
2796,
2797,
2798,
2807,
2808,
2828,
2829,
3003,
3089,
3090,
3091,
3152,
3153,
3154,
3400,
3455,
3456,
3457,
3577,
3578,
3579,
3823,
4062,
4063,
4064,
4304,
4412,
4413,
4414,
4616,
4617,
4618,
4641,
4642,
4643,
4884,
4885,
4886,
4914,
4915,
4916,
5162,
5416,
5667,
5844,
5845,
5846,
6091,
6346,
6600,
6850,
7105,
7326,
7327,
7328,
7573,
7821,
8076,
8322,
8549,
8550,
8551,
8789,
8889,
8890,
8891,
8916,
8917,
8918,
9136,
9137,
9138,
9382,
9454,
9455,
9456,
9701,
9946,
10194,
10241,
10242,
10243,
10480,
10735,
10757,
10758,
10792,
10793,
10794,
10883,
10884,
10885,
11068,
11069,
11070,
11258,
11259,
11260,
11420,
11421,
11422,
11643,
11644,
11645,
11774,
11775,
11776,
11933,
11934,
11935,
12108,
12109,
12110,
12313,
12314,
12315,
12425,
12426,
12427,
12584,
12585,
12586,
12746,
12747,
12784,
12785,
12786,
13031,
13282,
13533,
13783,
14038,
14064,
14065,
14066,
14312,
14563,
14789,
14790,
14791,
15038,
15293,
15294,
15295,
15539,
15774,
15775,
15776,
16021,
16271,
16327,
16328,
16329,
16571,
16761,
16762,
16763,
17002,
17211,
17212,
17213,
17459,
17713,
17777,
17778,
17779,
18021,
18255,
18256,
18257,
18501,
18750,
18998,
19131,
19132,
19133,
19380,
19615,
19616,
19617,
19859,
20111,
20363,
20615,
20694,
20695,
20696,
20939,
21193,
21389,
21390,
21391,
21638,
21890,
22142,
22397,
22500,
22501,
22502,
22742,
22987,
22988,
22989,
23234,
23489,
23742,
23992,
24059,
24060,
24061,
24298,
24544,
24545,
24546,
24791,
25046,
25200,
25201,
25202,
25444,
25693,
25940,
26188,
26391,
26392,
26393,
26632,
26803,
26804,
26805,
27051,
27298,
27551,
27806,
28060,
28257,
28258,
28259,
28269,
28270,
28271,
28272,
28273,
28274,
28275,
28276,
28277,
28278,
28279,
28280,
28281,
28282,
28283,
28284,
28285,
28286,
28287,
28288,
28289,
28290,
28291,
28292,
28297,
28311,
30317,
30356
],
"line_end_idx": [
131,
132,
148,
171,
177,
178,
179,
209,
210,
211,
212,
213,
214,
215,
216,
217,
218,
219,
220,
221,
222,
223,
224,
225,
226,
227,
228,
229,
230,
231,
232,
233,
234,
235,
236,
237,
238,
239,
240,
241,
242,
243,
250,
261,
262,
263,
264,
287,
298,
299,
300,
301,
310,
312,
313,
315,
333,
334,
335,
336,
337,
411,
457,
458,
459,
460,
469,
470,
543,
622,
701,
779,
856,
935,
1012,
1092,
1162,
1235,
1312,
1390,
1464,
1536,
1609,
1682,
1759,
1838,
1914,
1989,
2069,
2117,
2118,
2119,
2121,
2133,
2169,
2180,
2181,
2182,
2200,
2211,
2215,
2216,
2217,
2218,
2219,
2220,
2231,
2252,
2264,
2267,
2274,
2297,
2317,
2318,
2319,
2320,
2321,
2322,
2325,
2345,
2369,
2372,
2402,
2469,
2472,
2490,
2493,
2496,
2497,
2498,
2525,
2528,
2529,
2563,
2585,
2587,
2589,
2591,
2599,
2612,
2629,
2630,
2638,
2648,
2661,
2662,
2670,
2680,
2695,
2696,
2697,
2698,
2741,
2742,
2743,
2795,
2796,
2797,
2798,
2807,
2808,
2828,
2829,
3003,
3089,
3090,
3091,
3152,
3153,
3154,
3400,
3455,
3456,
3457,
3577,
3578,
3579,
3823,
4062,
4063,
4064,
4304,
4412,
4413,
4414,
4616,
4617,
4618,
4641,
4642,
4643,
4884,
4885,
4886,
4914,
4915,
4916,
5162,
5416,
5667,
5844,
5845,
5846,
6091,
6346,
6600,
6850,
7105,
7326,
7327,
7328,
7573,
7821,
8076,
8322,
8549,
8550,
8551,
8789,
8889,
8890,
8891,
8916,
8917,
8918,
9136,
9137,
9138,
9382,
9454,
9455,
9456,
9701,
9946,
10194,
10241,
10242,
10243,
10480,
10735,
10757,
10758,
10792,
10793,
10794,
10883,
10884,
10885,
11068,
11069,
11070,
11258,
11259,
11260,
11420,
11421,
11422,
11643,
11644,
11645,
11774,
11775,
11776,
11933,
11934,
11935,
12108,
12109,
12110,
12313,
12314,
12315,
12425,
12426,
12427,
12584,
12585,
12586,
12746,
12747,
12784,
12785,
12786,
13031,
13282,
13533,
13783,
14038,
14064,
14065,
14066,
14312,
14563,
14789,
14790,
14791,
15038,
15293,
15294,
15295,
15539,
15774,
15775,
15776,
16021,
16271,
16327,
16328,
16329,
16571,
16761,
16762,
16763,
17002,
17211,
17212,
17213,
17459,
17713,
17777,
17778,
17779,
18021,
18255,
18256,
18257,
18501,
18750,
18998,
19131,
19132,
19133,
19380,
19615,
19616,
19617,
19859,
20111,
20363,
20615,
20694,
20695,
20696,
20939,
21193,
21389,
21390,
21391,
21638,
21890,
22142,
22397,
22500,
22501,
22502,
22742,
22987,
22988,
22989,
23234,
23489,
23742,
23992,
24059,
24060,
24061,
24298,
24544,
24545,
24546,
24791,
25046,
25200,
25201,
25202,
25444,
25693,
25940,
26188,
26391,
26392,
26393,
26632,
26803,
26804,
26805,
27051,
27298,
27551,
27806,
28060,
28257,
28258,
28259,
28269,
28270,
28271,
28272,
28273,
28274,
28275,
28276,
28277,
28278,
28279,
28280,
28281,
28282,
28283,
28284,
28285,
28286,
28287,
28288,
28289,
28290,
28291,
28292,
28297,
28311,
30317,
30356,
30357
]
}
|
{
"red_pajama_v2": {
"ccnet_original_length": 30357,
"ccnet_original_nlines": 422,
"rps_doc_curly_bracket": 0,
"rps_doc_ldnoobw_words": 0,
"rps_doc_lorem_ipsum": 0,
"rps_doc_stop_word_fraction": 0.4023451805114746,
"rps_doc_ut1_blacklist": 0,
"rps_doc_frac_all_caps_words": 0.01777208037674427,
"rps_doc_frac_lines_end_with_ellipsis": 0,
"rps_doc_frac_no_alph_words": 0.16214731335639954,
"rps_doc_frac_unique_words": 0.13664720952510834,
"rps_doc_mean_word_length": 4.905816078186035,
"rps_doc_num_sentences": 218,
"rps_doc_symbol_to_word_ratio": 0,
"rps_doc_unigram_entropy": 5.112218856811523,
"rps_doc_word_count": 4969,
"rps_doc_frac_chars_dupe_10grams": 0.3160766363143921,
"rps_doc_frac_chars_dupe_5grams": 0.5517085790634155,
"rps_doc_frac_chars_dupe_6grams": 0.47704803943634033,
"rps_doc_frac_chars_dupe_7grams": 0.42326784133911133,
"rps_doc_frac_chars_dupe_8grams": 0.3782663941383362,
"rps_doc_frac_chars_dupe_9grams": 0.3391721844673157,
"rps_doc_frac_chars_top_2gram": 0.027690039947628975,
"rps_doc_frac_chars_top_3gram": 0.04364769905805588,
"rps_doc_frac_chars_top_4gram": 0.01895228959619999,
"rps_doc_books_importance": -2317.40869140625,
"rps_doc_books_importance_length_correction": -2317.40869140625,
"rps_doc_openwebtext_importance": -1261.0919189453125,
"rps_doc_openwebtext_importance_length_correction": -1261.0919189453125,
"rps_doc_wikipedia_importance": -520.8827514648438,
"rps_doc_wikipedia_importance_length_correction": -520.8827514648438
},
"fasttext": {
"dclm": 0.08370614051818848,
"english": 0.9198868870735168,
"fineweb_edu_approx": 2.4916980266571045,
"eai_general_math": 0.1958562135696411,
"eai_open_web_math": 0.06288207322359085,
"eai_web_code": 0.01335120014846325
}
}
|
{
"free_decimal_correspondence": {
"primary": {
"code": "004.17",
"labels": {
"level_1": "General works, books and libraries, information sciences",
"level_2": "",
"level_3": "Computers and Computer science"
}
},
"secondary": {
"code": "629.8312",
"labels": {
"level_1": "Industrial arts, Technology, and Engineering",
"level_2": "Engineering",
"level_3": ""
}
}
},
"bloom_cognitive_process": {
"primary": {
"code": "2",
"label": "Understand"
},
"secondary": {
"code": "3",
"label": "Apply"
}
},
"bloom_knowledge_domain": {
"primary": {
"code": "2",
"label": "Conceptual"
},
"secondary": {
"code": "3",
"label": "Procedural"
}
},
"document_type_v1": {
"primary": {
"code": "11",
"label": "Legal/Regulatory"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"extraction_artifacts": {
"primary": {
"code": "3",
"label": "Irrelevant Content"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"missing_content": {
"primary": {
"code": "4",
"label": "Missing Images or Figures"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"document_type_v2": {
"primary": {
"code": "8",
"label": "Documentation"
},
"secondary": {
"code": "17",
"label": "Product Page"
}
},
"reasoning_depth": {
"primary": {
"code": "3",
"label": "Intermediate Reasoning"
},
"secondary": {
"code": "2",
"label": "Basic Reasoning"
}
},
"technical_correctness": {
"primary": {
"code": "4",
"label": "Highly Correct"
},
"secondary": {
"code": "3",
"label": "Mostly Correct"
}
},
"education_level": {
"primary": {
"code": "4",
"label": "Graduate/Expert Level"
},
"secondary": {
"code": "3",
"label": "Undergraduate Level"
}
}
}
|
672f1e42c33a7f9846924a2431ea77df
|
4,965,789,270,256,809,000 |
subobjective21 interactive
Published July 03rd, 2008 by Nate Frank in Category: 3d
The folks over at blitz and at papervision2 have come up with some interesting ways to actually have real interaction with the MovieClips you are texturing your models with.
The quick is that you always use MovieMaterials(created with a reference to an existing movieclip someplace on stage). Normally the MovieMaterial object can be offstage or even visible=false to not see the clip; thing is they use visible=true, alpha=0 and reposition the clip actually under the mouse. A bit of trickery has the user actually interacting with the 2d flat MovieMaterial.
One of the nice things about this is that you can also do some testing and creating of functionality of your MovieClips as flat 2d objects and then map them to another object.
In creating an app with multiple panels in a 3D space every panel needs to be attached to the stage and then used to map onto your objects. This is fine when its just one object. When there are multiple surfaces that need interactivity this can quickly get out of control.
If you are using puremvc or caringorn to build your app you are used to creating a view/ui class that represents the specific element as a whole, it needs to have two elements, the stage texture version and the display3d object.
Ok cool. Just take a step back so that your view consists of two ui elements. Your mediators/viewhelpers can then access both elements and update them appropriately.
Wait what if we have multiple panels with the same textures? Looks like there are two options.
1. Use the same texture/ the same reference to the movieclip on stage and use the target of the object to figure out what object you are on(requires dynamic naming of the display objects you are using so they can be keyed in later to access the specific class). You can take advantage of the InteractiveEvent3D event which includes the DisplayObject3D element that is interacted with.
2. Use a separate instance of each texture on the stage so that it can be targeted separately for each individual item. This also needs to be dynamically named so that they do not overwrite any other textures. Destroy methods then need to make sure they clean up these 2d objects in addition to the 3d counterparts.
I also found that its a good idea to add some code that listens for the mouse to be off the given object and send the stage texture off stage and hidden. The example from blitz I found I could still click on an element even though my mouse wasn’t on the object.
Thanks to those guys for the hook ups of the advanced interactive elements.
|
{
"url": "http://interactive.subobjective21.org/blog/2008/07/03/working-with-multiple-3d-objects-with-precise-interaction/",
"source_domain": "interactive.subobjective21.org",
"snapshot_id": "crawl=CC-MAIN-2018-43",
"warc_metadata": {
"Content-Length": "11324",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:ZXBPAJ5LELIWIEOYTJV5RSPDRZLEXWLS",
"WARC-Concurrent-To": "<urn:uuid:aa1453fc-ca57-4bb3-afb1-44b6a77e39c3>",
"WARC-Date": "2018-10-19T02:52:14Z",
"WARC-IP-Address": "66.33.213.92",
"WARC-Identified-Payload-Type": "application/xhtml+xml",
"WARC-Payload-Digest": "sha1:ITCVE6J7GGYMI3Q5YTKG6UAXHGWGNJMD",
"WARC-Record-ID": "<urn:uuid:1a586592-bad3-4721-af12-8f2320beedaa>",
"WARC-Target-URI": "http://interactive.subobjective21.org/blog/2008/07/03/working-with-multiple-3d-objects-with-precise-interaction/",
"WARC-Truncated": null,
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:f4e1f188-8f7f-42c0-af1f-4b44328d6423>"
},
"warc_info": "isPartOf: CC-MAIN-2018-43\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for October 2018\r\noperator: Common Crawl Admin ([email protected])\r\nhostname: ip-10-91-224-137.ec2.internal\r\nsoftware: Apache Nutch 1.15 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 0.11-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/"
}
|
{
"line_start_idx": [
0,
27,
83,
84,
258,
259,
645,
646,
822,
823,
1096,
1097,
1326,
1327,
1493,
1494,
1589,
1590,
1977,
2295,
2296,
2558,
2559
],
"line_end_idx": [
27,
83,
84,
258,
259,
645,
646,
822,
823,
1096,
1097,
1326,
1327,
1493,
1494,
1589,
1590,
1977,
2295,
2296,
2558,
2559,
2634
]
}
|
{
"red_pajama_v2": {
"ccnet_original_length": 2634,
"ccnet_original_nlines": 22,
"rps_doc_curly_bracket": 0,
"rps_doc_ldnoobw_words": 0,
"rps_doc_lorem_ipsum": 0,
"rps_doc_stop_word_fraction": 0.5128204822540283,
"rps_doc_ut1_blacklist": 0,
"rps_doc_frac_all_caps_words": 0.009861930273473263,
"rps_doc_frac_lines_end_with_ellipsis": 0,
"rps_doc_frac_no_alph_words": 0.08481261879205704,
"rps_doc_frac_unique_words": 0.47173914313316345,
"rps_doc_mean_word_length": 4.610869407653809,
"rps_doc_num_sentences": 24,
"rps_doc_symbol_to_word_ratio": 0,
"rps_doc_unigram_entropy": 4.9296650886535645,
"rps_doc_word_count": 460,
"rps_doc_frac_chars_dupe_10grams": 0,
"rps_doc_frac_chars_dupe_5grams": 0,
"rps_doc_frac_chars_dupe_6grams": 0,
"rps_doc_frac_chars_dupe_7grams": 0,
"rps_doc_frac_chars_dupe_8grams": 0,
"rps_doc_frac_chars_dupe_9grams": 0,
"rps_doc_frac_chars_top_2gram": 0.01414426974952221,
"rps_doc_frac_chars_top_3gram": 0.008486559614539146,
"rps_doc_frac_chars_top_4gram": 0,
"rps_doc_books_importance": -234.6330108642578,
"rps_doc_books_importance_length_correction": -234.6330108642578,
"rps_doc_openwebtext_importance": -138.22247314453125,
"rps_doc_openwebtext_importance_length_correction": -138.22247314453125,
"rps_doc_wikipedia_importance": -90.12262725830078,
"rps_doc_wikipedia_importance_length_correction": -90.12262725830078
},
"fasttext": {
"dclm": 0.3378034830093384,
"english": 0.9441335797309875,
"fineweb_edu_approx": 2.322124481201172,
"eai_general_math": 0.8171152472496033,
"eai_open_web_math": 0.0887741968035698,
"eai_web_code": 0.7157876491546631
}
}
|
{
"free_decimal_correspondence": {
"primary": {
"code": "005.1",
"labels": {
"level_1": "General works, books and libraries, information sciences",
"level_2": "",
"level_3": "Computer programming"
}
},
"secondary": {
"code": "791.43",
"labels": {
"level_1": "Arts",
"level_2": "Amusements and Recreation",
"level_3": ""
}
}
},
"bloom_cognitive_process": {
"primary": {
"code": "3",
"label": "Apply"
},
"secondary": {
"code": "2",
"label": "Understand"
}
},
"bloom_knowledge_domain": {
"primary": {
"code": "3",
"label": "Procedural"
},
"secondary": {
"code": "2",
"label": "Conceptual"
}
},
"document_type_v1": {
"primary": {
"code": "3",
"label": "Reference/Encyclopedic/Educational"
},
"secondary": {
"code": "4",
"label": "Code/Software"
}
},
"extraction_artifacts": {
"primary": {
"code": "0",
"label": "No Artifacts"
},
"secondary": {
"code": "3",
"label": "Irrelevant Content"
}
},
"missing_content": {
"primary": {
"code": "0",
"label": "No missing content"
},
"secondary": {
"code": "4",
"label": "Missing Images or Figures"
}
},
"document_type_v2": {
"primary": {
"code": "23",
"label": "Tutorial"
},
"secondary": {
"code": "8",
"label": "Documentation"
}
},
"reasoning_depth": {
"primary": {
"code": "3",
"label": "Intermediate Reasoning"
},
"secondary": {
"code": "2",
"label": "Basic Reasoning"
}
},
"technical_correctness": {
"primary": {
"code": "3",
"label": "Mostly Correct"
},
"secondary": {
"code": "4",
"label": "Highly Correct"
}
},
"education_level": {
"primary": {
"code": "3",
"label": "Undergraduate Level"
},
"secondary": {
"code": "2",
"label": "High School Level"
}
}
}
|
672f1e42c33a7f9846924a2431ea77df
|
6,456,109,598,552,754,000 |
Systemadministration
Erkennen Sie, welcher Systemmanager auf Linux -System ausgeführt wird
Erkennen Sie, welcher Systemmanager auf Linux -System ausgeführt wird
Zielsetzung
Es gibt mehrere Systemmanager, die möglicherweise auf Ihrem Linux -System ausgeführt werden können. Die derzeit gängigsten Systemmanager sind SYSV (Init), Systemd und Upstart. Möglicherweise finden Sie diesen kurzen Leitfaden für Sie. Wenn Sie sich nicht sicher sind, wird der Systemmanager auf Ihrem Linux -System ausgeführt.
Anforderungen
Der privilegierte Zugriff auf Ihr Linux -System ist erforderlich.
Schwierigkeit
EINFACH
Konventionen
Anweisungen
Der Systemmanager ist ein erster Prozess, der auf Ihrem Linux -System beginnt. Somit ansehen, welche Prozesse zuerst mit der Verwendung begonnen haben PS -P 1 Befehst meine Hinweise, aber keine endgültigen Antworten. Beispiel:
Sysv
# ps -p 1 pid tty time cmd 1 ? 00:00:01 init
Systemd
# ps -p 1 pid tty time cmd 1 ? 00:00:04 Systemd
Emporkömmling
# ps -p 1 pid tty time cmd 1 ? 00:00:01 init
Erster Prozess symbolischer Link
Zuverlässigerer Ansatz, um zu überprüfen, welcher Systemmanager auf Ihrem Linux -System ausgeführt wird.
Sysv
# ls -l/proc/1/exe lrwxrwxrwx 1 root root 0 apr 3 04:17/proc/1/exe ->/sbin/init oder # stat/proc/1/exe | Grep -Datei Datei: '/proc/1/exe' -> '/sbin/init' '
Systemd
# ls -l/proc/1/exe lrwxrwxrwx 1 root root 0 mar 27 09:39/proc/1/exe ->/lib/systemd/systemd oder # stat/proc/1/exe | GREP -Datei Datei:/proc/1/exe ->/lib/systemd/systemd
Emporkömmling
# ls -l/proc/1/exe lrwxrwxrwx 1 root root 0 apr 3 04:29/proc/1/exe ->/sbin/upstart oder # stat/proc/1/exe | GREP -Datei Datei: '/proc/1/exe' -> '/sbin/upstart' '
Init Symbolic Link
Überprüfen Sie, welcher Systemmanager ausführbar ist /sbin/init zeigt auf:
Sysv
# ls -l /sbin /init -rwxr -xr -x 1 Root Root 36992 14. Juli 2013 /SBIN /Init
Systemd
# ls -l/sbin/init lrwxrwxrwx 1 root root 20
Emporkömmling
# ls -l /sbin /init
Automatische HTML -Formulare mit wwwmechanize
Hier ist ein kurzer Tipp, wie Sie mithilfe einer Linux -Befehlszeile und Perl -Skript automatisch ein HTML -Formular einreichen können. Für dieses Bei...
Perl Hash
Perl Hash lassen Sie uns zu Paaren sehen, wie wir Perl Hash verwenden können. Zuerst müssen wir wissen, dass der Perl -Hash -Wert über den Schlüssel z...
Beispiel eines binären Suchalgorithmus in C ++
Hier ist ein einfaches Beispiel für eine binäre Suche in C++. Das Beispiel erstellt zuerst einen Vektor von 4 000 000 Zahlen und macht dann einen Funk...
|
{
"url": "https://de.cgots.org/article/detecting-which-system-manager-is-running-on-linux-system",
"source_domain": "de.cgots.org",
"snapshot_id": "CC-MAIN-2024-18",
"warc_metadata": {
"Content-Length": "21067",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:EZ747AROK6BHZO4FHJ5D7YCZLXFLXN4O",
"WARC-Concurrent-To": "<urn:uuid:37638e3a-c98c-43b2-8506-f048472ac127>",
"WARC-Date": "2024-04-16T10:57:22Z",
"WARC-IP-Address": "104.21.27.139",
"WARC-Identified-Payload-Type": "text/html",
"WARC-Payload-Digest": "sha1:CUJKTJRDOEMZU3M6ETBU43T2BAOVN453",
"WARC-Record-ID": "<urn:uuid:b8b9f154-f150-4636-b3d6-d3473cb8c8b8>",
"WARC-Target-URI": "https://de.cgots.org/article/detecting-which-system-manager-is-running-on-linux-system",
"WARC-Truncated": null,
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:fdd6632c-b106-4ad2-92cb-5c0802d421a6>"
},
"warc_info": "isPartOf: CC-MAIN-2024-18\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for April 2024\r\noperator: Common Crawl Admin ([email protected])\r\nhostname: ip-10-67-67-191\r\nsoftware: Apache Nutch 1.19 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.5-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: https://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/"
}
|
{
"line_start_idx": [
0,
21,
22,
92,
93,
163,
164,
176,
177,
504,
505,
519,
520,
586,
587,
601,
602,
610,
611,
624,
625,
637,
638,
865,
866,
871,
872,
918,
919,
927,
928,
977,
978,
992,
993,
1039,
1040,
1073,
1074,
1179,
1180,
1185,
1186,
1343,
1344,
1352,
1353,
1523,
1524,
1538,
1539,
1702,
1703,
1722,
1723,
1798,
1799,
1804,
1805,
1883,
1884,
1892,
1893,
1938,
1939,
1953,
1954,
1975,
2021,
2175,
2185,
2339,
2386
],
"line_end_idx": [
21,
22,
92,
93,
163,
164,
176,
177,
504,
505,
519,
520,
586,
587,
601,
602,
610,
611,
624,
625,
637,
638,
865,
866,
871,
872,
918,
919,
927,
928,
977,
978,
992,
993,
1039,
1040,
1073,
1074,
1179,
1180,
1185,
1186,
1343,
1344,
1352,
1353,
1523,
1524,
1538,
1539,
1702,
1703,
1722,
1723,
1798,
1799,
1804,
1805,
1883,
1884,
1892,
1893,
1938,
1939,
1953,
1954,
1975,
2021,
2175,
2185,
2339,
2386,
2539
]
}
|
{
"red_pajama_v2": {
"ccnet_original_length": 2539,
"ccnet_original_nlines": 72,
"rps_doc_curly_bracket": 0,
"rps_doc_ldnoobw_words": 0,
"rps_doc_lorem_ipsum": 0,
"rps_doc_stop_word_fraction": 0.02309058979153633,
"rps_doc_ut1_blacklist": 0,
"rps_doc_frac_all_caps_words": 0.019538190215826035,
"rps_doc_frac_lines_end_with_ellipsis": 0.04109589010477066,
"rps_doc_frac_no_alph_words": 0.37477797269821167,
"rps_doc_frac_unique_words": 0.4942857027053833,
"rps_doc_mean_word_length": 5.628571510314941,
"rps_doc_num_sentences": 18,
"rps_doc_symbol_to_word_ratio": 0.02664298005402088,
"rps_doc_unigram_entropy": 4.854478359222412,
"rps_doc_word_count": 350,
"rps_doc_frac_chars_dupe_10grams": 0.02842639945447445,
"rps_doc_frac_chars_dupe_5grams": 0.2472081184387207,
"rps_doc_frac_chars_dupe_6grams": 0.23197969794273376,
"rps_doc_frac_chars_dupe_7grams": 0.14974619448184967,
"rps_doc_frac_chars_dupe_8grams": 0.13401015102863312,
"rps_doc_frac_chars_dupe_9grams": 0.1248731017112732,
"rps_doc_frac_chars_top_2gram": 0.03908628970384598,
"rps_doc_frac_chars_top_3gram": 0.05583756044507027,
"rps_doc_frac_chars_top_4gram": 0.03857868164777756,
"rps_doc_books_importance": -193.31988525390625,
"rps_doc_books_importance_length_correction": -193.31988525390625,
"rps_doc_openwebtext_importance": -113.34297943115234,
"rps_doc_openwebtext_importance_length_correction": -113.34297943115234,
"rps_doc_wikipedia_importance": -67.53531646728516,
"rps_doc_wikipedia_importance_length_correction": -67.53531646728516
},
"fasttext": {
"dclm": 0.5897391438484192,
"english": 0.00256252009421587,
"fineweb_edu_approx": 2.4683914184570312,
"eai_general_math": 0.022445200011134148,
"eai_open_web_math": 0.6847370266914368,
"eai_web_code": 0.9261713624000549
}
}
|
{
"free_decimal_correspondence": {
"primary": {
"code": "005.44",
"labels": {
"level_1": "General works, books and libraries, information sciences",
"level_2": "",
"level_3": "Computer programming"
}
},
"secondary": {
"code": "004.67",
"labels": {
"level_1": "General works, books and libraries, information sciences",
"level_2": "",
"level_3": "Computers and Computer science"
}
}
},
"bloom_cognitive_process": {
"primary": {
"code": "3",
"label": "Apply"
},
"secondary": {
"code": "2",
"label": "Understand"
}
},
"bloom_knowledge_domain": {
"primary": {
"code": "3",
"label": "Procedural"
},
"secondary": {
"code": "2",
"label": "Conceptual"
}
},
"document_type_v1": {
"primary": {
"code": "3",
"label": "Reference/Encyclopedic/Educational"
},
"secondary": {
"code": "4",
"label": "Code/Software"
}
},
"extraction_artifacts": {
"primary": {
"code": "0",
"label": "No Artifacts"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"missing_content": {
"primary": {
"code": "1",
"label": "Truncated Snippets"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"document_type_v2": {
"primary": {
"code": "8",
"label": "Documentation"
},
"secondary": {
"code": "23",
"label": "Tutorial"
}
},
"reasoning_depth": {
"primary": {
"code": "2",
"label": "Basic Reasoning"
},
"secondary": {
"code": "3",
"label": "Intermediate Reasoning"
}
},
"technical_correctness": {
"primary": {
"code": "4",
"label": "Highly Correct"
},
"secondary": {
"code": "3",
"label": "Mostly Correct"
}
},
"education_level": {
"primary": {
"code": "3",
"label": "Undergraduate Level"
},
"secondary": {
"code": "2",
"label": "High School Level"
}
}
}
|
672f1e42c33a7f9846924a2431ea77df
|
3,842,975,030,509,929,000 |
Amit Merchant
Amit Merchant
A blog on PHP, JavaScript, and more
Strictly check for null and undefined values in TypeScript
In TypeScript, you assign types to variables and function parameters to catch type related errors early, even before you run the code. But TypeScript doesn’t warn you when you assign null and undefined to the variables of common types.
For instance, take the following example.
function appendDomain(url: string) {
return url.concat('.com');
}
console.log(appendDomain('amitmerchant'));
I’ve written this simple function in TypeScript that accepts its only parameter url which is of type string. Now, this will work fine if you compile it down to the JavaScript file providing I have the following tsconfig.json file setup.
{
"compilerOptions": {
"target": "esnext"
}
}
Now, if I change provide null instead of a valid string, compile and run the generated JS code, I would get the following error.
That’s because we passed an argument (null) for which JavaScript can not find concat method on it as it’s not a valid string. But TypeScript didn’t gave any type error because in TypeScript, null and undefined can be assigned to any type. So, the following is also perfectly fine as per TypeScript’s type checker.
let title: string;
title = 'Foo Bar';
title = null;
This can cause some serious issues if not handled properly.
This behavior can be fixed by adding a compiler option called strictNullChecks and set it to true in tsconfig.json like so.
{
"compilerOptions": {
"target": "esnext",
"strictNullChecks": true
}
}
Upon adding this option, TypeScript’s compiler will start showing typing errors because null and undefined are no longer valid values for any type. So, for the above example, it will show the following error.
Type 'null' is not assignable to type 'string'.
To fix our appendDomain function, we can add more types to the arguments to include null and undefined like so and checking if the provided value in the function is of type string explicitly like so.
function appendDomain(url: string | null | undefined) {
if (typeof url === 'string') {
return url.concat('.com');
}
return url;
}
console.log(appendDomain('amitmerchant'));
console.log(appendDomain(null));
console.log(appendDomain(undefined));
The function can now gracefully accepts null and undefined and returns values accordingly.
👋 Hi there! I'm Amit. I write articles about all things web development. If you like what I do and want me to continue doing the same, I'd like you consider leaving a tip. I'd highly appreciate that. Cheers!
Comments?
|
{
"url": "https://www.amitmerchant.com/strictly-check-null-undefined-typescript/",
"source_domain": "www.amitmerchant.com",
"snapshot_id": "CC-MAIN-2023-40",
"warc_metadata": {
"Content-Length": "71239",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:BOUGUA6WBK6QZ6V7YU2HWBXOI4PZGAFI",
"WARC-Concurrent-To": "<urn:uuid:8ca233a6-359e-470b-9c4e-f7d214776958>",
"WARC-Date": "2023-09-26T19:01:48Z",
"WARC-IP-Address": "172.67.205.55",
"WARC-Identified-Payload-Type": "text/html",
"WARC-Payload-Digest": "sha1:M775AV5V7SYGDOIJSTDJG6T24RH6X43R",
"WARC-Record-ID": "<urn:uuid:00f94ef9-41b9-48f7-8290-777a1ce9d6c2>",
"WARC-Target-URI": "https://www.amitmerchant.com/strictly-check-null-undefined-typescript/",
"WARC-Truncated": null,
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:27937a39-4ac7-4e6b-8901-f48aa7156bda>"
},
"warc_info": "isPartOf: CC-MAIN-2023-40\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for September/October 2023\r\noperator: Common Crawl Admin ([email protected])\r\nhostname: ip-10-67-67-154\r\nsoftware: Apache Nutch 1.19 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.5-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: https://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/"
}
|
{
"line_start_idx": [
0,
14,
15,
29,
30,
66,
67,
126,
127,
363,
364,
406,
407,
444,
475,
477,
478,
521,
522,
759,
760,
762,
787,
814,
820,
822,
823,
952,
953,
1267,
1268,
1287,
1306,
1320,
1321,
1381,
1382,
1506,
1507,
1509,
1534,
1562,
1595,
1601,
1603,
1604,
1813,
1814,
1862,
1863,
2063,
2064,
2120,
2155,
2190,
2196,
2197,
2213,
2215,
2216,
2259,
2292,
2330,
2331,
2422,
2423,
2631,
2632
],
"line_end_idx": [
14,
15,
29,
30,
66,
67,
126,
127,
363,
364,
406,
407,
444,
475,
477,
478,
521,
522,
759,
760,
762,
787,
814,
820,
822,
823,
952,
953,
1267,
1268,
1287,
1306,
1320,
1321,
1381,
1382,
1506,
1507,
1509,
1534,
1562,
1595,
1601,
1603,
1604,
1813,
1814,
1862,
1863,
2063,
2064,
2120,
2155,
2190,
2196,
2197,
2213,
2215,
2216,
2259,
2292,
2330,
2331,
2422,
2423,
2631,
2632,
2641
]
}
|
{
"red_pajama_v2": {
"ccnet_original_length": 2641,
"ccnet_original_nlines": 67,
"rps_doc_curly_bracket": 0.005301020108163357,
"rps_doc_ldnoobw_words": 0,
"rps_doc_lorem_ipsum": 0,
"rps_doc_stop_word_fraction": 0.3228200376033783,
"rps_doc_ut1_blacklist": 0,
"rps_doc_frac_all_caps_words": 0.022263450548052788,
"rps_doc_frac_lines_end_with_ellipsis": 0,
"rps_doc_frac_no_alph_words": 0.23562152683734894,
"rps_doc_frac_unique_words": 0.48041775822639465,
"rps_doc_mean_word_length": 5.22715425491333,
"rps_doc_num_sentences": 33,
"rps_doc_symbol_to_word_ratio": 0,
"rps_doc_unigram_entropy": 4.858635902404785,
"rps_doc_word_count": 383,
"rps_doc_frac_chars_dupe_10grams": 0,
"rps_doc_frac_chars_dupe_5grams": 0,
"rps_doc_frac_chars_dupe_6grams": 0,
"rps_doc_frac_chars_dupe_7grams": 0,
"rps_doc_frac_chars_dupe_8grams": 0,
"rps_doc_frac_chars_dupe_9grams": 0,
"rps_doc_frac_chars_top_2gram": 0.02097902074456215,
"rps_doc_frac_chars_top_3gram": 0.04795204848051071,
"rps_doc_frac_chars_top_4gram": 0.013986010104417801,
"rps_doc_books_importance": -226.35372924804688,
"rps_doc_books_importance_length_correction": -226.35372924804688,
"rps_doc_openwebtext_importance": -157.10250854492188,
"rps_doc_openwebtext_importance_length_correction": -157.10250854492188,
"rps_doc_wikipedia_importance": -116.57776641845703,
"rps_doc_wikipedia_importance_length_correction": -116.57776641845703
},
"fasttext": {
"dclm": 0.8859707117080688,
"english": 0.7448107004165649,
"fineweb_edu_approx": 2.0926976203918457,
"eai_general_math": 0.9596951603889465,
"eai_open_web_math": 0.22485458850860596,
"eai_web_code": 0.9905510544776917
}
}
|
{
"free_decimal_correspondence": {
"primary": {
"code": "005.13322",
"labels": {
"level_1": "General works, books and libraries, information sciences",
"level_2": "",
"level_3": "Computer programming"
}
},
"secondary": {
"code": "005.133",
"labels": {
"level_1": "General works, books and libraries, information sciences",
"level_2": "",
"level_3": "Computer programming"
}
}
},
"bloom_cognitive_process": {
"primary": {
"code": "2",
"label": "Understand"
},
"secondary": {
"code": "3",
"label": "Apply"
}
},
"bloom_knowledge_domain": {
"primary": {
"code": "2",
"label": "Conceptual"
},
"secondary": {
"code": "3",
"label": "Procedural"
}
},
"document_type_v1": {
"primary": {
"code": "4",
"label": "Code/Software"
},
"secondary": {
"code": "3",
"label": "Reference/Encyclopedic/Educational"
}
},
"extraction_artifacts": {
"primary": {
"code": "0",
"label": "No Artifacts"
},
"secondary": {
"code": "3",
"label": "Irrelevant Content"
}
},
"missing_content": {
"primary": {
"code": "0",
"label": "No missing content"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"document_type_v2": {
"primary": {
"code": "23",
"label": "Tutorial"
},
"secondary": {
"code": "16",
"label": "Personal Blog"
}
},
"reasoning_depth": {
"primary": {
"code": "2",
"label": "Basic Reasoning"
},
"secondary": {
"code": "3",
"label": "Intermediate Reasoning"
}
},
"technical_correctness": {
"primary": {
"code": "4",
"label": "Highly Correct"
},
"secondary": {
"code": "3",
"label": "Mostly Correct"
}
},
"education_level": {
"primary": {
"code": "3",
"label": "Undergraduate Level"
},
"secondary": {
"code": "2",
"label": "High School Level"
}
}
}
|
672f1e42c33a7f9846924a2431ea77df
|
6,325,761,516,489,755,000 |
嗨,老铁,欢迎来到我的博客!
如果觉得我的内容还不错的话,可以关注下我在 segmentfault.com 上的直播。我主要从事 PHP 和 Java 方面的开发,《深入 PHP 内核》作者之一。
[视频直播] PHP 进阶之路 - 亿级 pv 网站架构的技术细节与套路 直播中我将毫无保留的分享我这六年的全部工作经验和踩坑的故事,以及会穿插着一些面试中的 考点难点加分点
周梦康 发表于 2014-04-28 2875 次浏览 标签 : Android
流程如下:
1、先建立一个HttpPost连接
HttpPost httpPost = new HttpPost("http://mengkang.net/post_datas.php");
2、添加数据
ListnameValuePairs = new ArrayList(); nameValuePairs.add(new BasicNameValuePair("username","mengkang"));
3、发送
httpPost.setEntity(new UrlEncodedFormEntity(nameValuePairs,HTTP.UTF_8));
4、获取返回信息
httpResponse=new DefaultHttpClient().execute(httpPost);
具体代码如下
package httppost.pack;
import java.util.ArrayList;
import java.util.List;
import org.apache.http.HttpResponse;
import org.apache.http.NameValuePair;
import org.apache.http.client.entity.UrlEncodedFormEntity;
import org.apache.http.client.methods.HttpPost;
import org.apache.http.impl.client.DefaultHttpClient;
import org.apache.http.message.BasicNameValuePair;
import org.apache.http.protocol.HTTP;
import org.apache.http.util.EntityUtils;
import android.app.Activity;
import android.os.Bundle;
import android.widget.TextView;
public class AndroidHttpPost extends Activity {
/** Called when the activity is first created. */
String action="http://mengkang.net/android_post.php";
HttpPost httpRequest=null;
List <NameValuePair> params=null;
HttpResponse httpResponse;
TextView tv=null;
@Override
public void onCreate(Bundle savedInstanceState) {
super.onCreate(savedInstanceState);
setContentView(R.layout.main);
tv=(TextView)findViewById(R.id.textView1);
/*建立HttpPost连接*/
httpRequest=new HttpPost(action);
/*Post运作传送变数必须用NameValuePair[]阵列储存*/
params=new ArrayList<NameValuePair>();
params.add(new BasicNameValuePair("username","mengkang"));
try {
//发出HTTP request
httpRequest.setEntity(new UrlEncodedFormEntity(params,HTTP.UTF_8));
//取得HTTP response
httpResponse=new DefaultHttpClient().execute(httpRequest);
//若状态码为200
if(httpResponse.getStatusLine().getStatusCode()==200){
//取出回应字串
String strResult=EntityUtils.toString(httpResponse.getEntity());
tv.setText(strResult);
}else{
tv.setText("Error Response"+httpResponse.getStatusLine().toString());
}
} catch (Exception e) {
// TODO Auto-generated catch block
tv.setText(e.getMessage().toString());
}
}
}
别忘记了AndroidManifest.xml中加入如下配置:
<uses-permission android:name="android.permission.INTERNET" />
嗨,老铁,欢迎来到我的博客!
如果觉得我的内容还不错的话,可以关注下我在 segmentfault.com 上的直播。我主要从事 PHP 和 Java 方面的开发,《深入 PHP 内核》作者之一。
[视频直播] PHP 进阶之路 - 亿级 pv 网站架构的技术细节与套路 直播中我将毫无保留的分享我这六年的全部工作经验和踩坑的故事,以及会穿插着一些面试中的 考点难点加分点
评论列表
|
{
"url": "https://mengkang.net/154.html",
"source_domain": "mengkang.net",
"snapshot_id": "crawl=CC-MAIN-2019-39",
"warc_metadata": {
"Content-Length": "21928",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:DSYLAQQA2UQK6VR34I5RS5CXFDYKZKNE",
"WARC-Concurrent-To": "<urn:uuid:ec9dba30-6c4b-45b4-8214-d0fcdd65f2ac>",
"WARC-Date": "2019-09-15T23:05:59Z",
"WARC-IP-Address": "203.195.188.207",
"WARC-Identified-Payload-Type": "text/html",
"WARC-Payload-Digest": "sha1:Z3S44Y42PUSGD4GZYF7HBUWYK2F3RFHP",
"WARC-Record-ID": "<urn:uuid:f14393f6-c915-4b5e-8417-8017d722ade0>",
"WARC-Target-URI": "https://mengkang.net/154.html",
"WARC-Truncated": null,
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:6e3058a5-418b-4eea-ba3b-6071510d5ece>"
},
"warc_info": "isPartOf: CC-MAIN-2019-39\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for September 2019\r\noperator: Common Crawl Admin ([email protected])\r\nhostname: ip-10-67-67-51.ec2.internal\r\nsoftware: Apache Nutch 1.15 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.1-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/"
}
|
{
"line_start_idx": [
0,
15,
16,
100,
101,
189,
190,
231,
232,
238,
239,
257,
258,
331,
332,
339,
340,
446,
447,
452,
453,
527,
528,
537,
538,
594,
595,
602,
603,
627,
629,
658,
682,
684,
722,
761,
821,
870,
925,
977,
1016,
1058,
1060,
1090,
1117,
1150,
1152,
1201,
1256,
1315,
1347,
1386,
1418,
1441,
1456,
1511,
1556,
1596,
1648,
1674,
1717,
1763,
1811,
1879,
1889,
1904,
1934,
2015,
2046,
2118,
2142,
2210,
2236,
2318,
2358,
2378,
2465,
2480,
2513,
2561,
2613,
2624,
2631,
2633,
2634,
2666,
2667,
2731,
2732,
2747,
2748,
2832,
2833,
2921,
2922
],
"line_end_idx": [
15,
16,
100,
101,
189,
190,
231,
232,
238,
239,
257,
258,
331,
332,
339,
340,
446,
447,
452,
453,
527,
528,
537,
538,
594,
595,
602,
603,
627,
629,
658,
682,
684,
722,
761,
821,
870,
925,
977,
1016,
1058,
1060,
1090,
1117,
1150,
1152,
1201,
1256,
1315,
1347,
1386,
1418,
1441,
1456,
1511,
1556,
1596,
1648,
1674,
1717,
1763,
1811,
1879,
1889,
1904,
1934,
2015,
2046,
2118,
2142,
2210,
2236,
2318,
2358,
2378,
2465,
2480,
2513,
2561,
2613,
2624,
2631,
2633,
2634,
2666,
2667,
2731,
2732,
2747,
2748,
2832,
2833,
2921,
2922,
2926
]
}
|
{
"red_pajama_v2": {
"ccnet_original_length": 2926,
"ccnet_original_nlines": 94,
"rps_doc_curly_bracket": 0.004101159982383251,
"rps_doc_ldnoobw_words": 0,
"rps_doc_lorem_ipsum": 0,
"rps_doc_stop_word_fraction": 0.04315197095274925,
"rps_doc_ut1_blacklist": 0,
"rps_doc_frac_all_caps_words": 0.031894929707050323,
"rps_doc_frac_lines_end_with_ellipsis": 0,
"rps_doc_frac_no_alph_words": 0.5422138571739197,
"rps_doc_frac_unique_words": 0.7358490824699402,
"rps_doc_mean_word_length": 12.981132507324219,
"rps_doc_num_sentences": 79,
"rps_doc_symbol_to_word_ratio": 0,
"rps_doc_unigram_entropy": 4.570316314697266,
"rps_doc_word_count": 159,
"rps_doc_frac_chars_dupe_10grams": 0.1589147299528122,
"rps_doc_frac_chars_dupe_5grams": 0.1589147299528122,
"rps_doc_frac_chars_dupe_6grams": 0.1589147299528122,
"rps_doc_frac_chars_dupe_7grams": 0.1589147299528122,
"rps_doc_frac_chars_dupe_8grams": 0.1589147299528122,
"rps_doc_frac_chars_dupe_9grams": 0.1589147299528122,
"rps_doc_frac_chars_top_2gram": 0.033914729952812195,
"rps_doc_frac_chars_top_3gram": 0.04844960942864418,
"rps_doc_frac_chars_top_4gram": 0.05813952907919884,
"rps_doc_books_importance": -198.88059997558594,
"rps_doc_books_importance_length_correction": -198.88059997558594,
"rps_doc_openwebtext_importance": -138.51202392578125,
"rps_doc_openwebtext_importance_length_correction": -138.51202392578125,
"rps_doc_wikipedia_importance": -77.03291320800781,
"rps_doc_wikipedia_importance_length_correction": -77.03291320800781
},
"fasttext": {
"dclm": 0.9317598342895508,
"english": 0.07719040662050247,
"fineweb_edu_approx": 3.2095391750335693,
"eai_general_math": 0.06303519010543823,
"eai_open_web_math": 0.0068646701984107494,
"eai_web_code": 0.7635710835456848
}
}
|
{
"free_decimal_correspondence": {
"primary": {
"code": "005.1",
"labels": {
"level_1": "General works, books and libraries, information sciences",
"level_2": "",
"level_3": "Computer programming"
}
},
"secondary": {
"code": "004.678",
"labels": {
"level_1": "General works, books and libraries, information sciences",
"level_2": "",
"level_3": "Computers and Computer science"
}
}
},
"bloom_cognitive_process": {
"primary": {
"code": "3",
"label": "Apply"
},
"secondary": {
"code": "2",
"label": "Understand"
}
},
"bloom_knowledge_domain": {
"primary": {
"code": "3",
"label": "Procedural"
},
"secondary": {
"code": "2",
"label": "Conceptual"
}
},
"document_type_v1": {
"primary": {
"code": "3",
"label": "Reference/Encyclopedic/Educational"
},
"secondary": {
"code": "4",
"label": "Code/Software"
}
},
"extraction_artifacts": {
"primary": {
"code": "0",
"label": "No Artifacts"
},
"secondary": {
"code": "3",
"label": "Irrelevant Content"
}
},
"missing_content": {
"primary": {
"code": "0",
"label": "No missing content"
},
"secondary": {
"code": "4",
"label": "Missing Images or Figures"
}
},
"document_type_v2": {
"primary": {
"code": "23",
"label": "Tutorial"
},
"secondary": {
"code": "16",
"label": "Personal Blog"
}
},
"reasoning_depth": {
"primary": {
"code": "2",
"label": "Basic Reasoning"
},
"secondary": {
"code": "3",
"label": "Intermediate Reasoning"
}
},
"technical_correctness": {
"primary": {
"code": "3",
"label": "Mostly Correct"
},
"secondary": {
"code": "4",
"label": "Highly Correct"
}
},
"education_level": {
"primary": {
"code": "3",
"label": "Undergraduate Level"
},
"secondary": {
"code": "2",
"label": "High School Level"
}
}
}
|
672f1e42c33a7f9846924a2431ea77df
|
5,364,962,507,287,681,000 |
Pascal’s triangle
mathematics
Alternative Title: Yanghui triangle
Pascal’s triangle, in algebra, a triangular arrangement of numbers that gives the coefficients in the expansion of any binomial expression, such as (x + y)n. It is named for the 17th-century French mathematician Blaise Pascal, but it is far older. Chinese mathematician Jia Xian devised a triangular representation for the coefficients in the 11th century. His triangle was further studied and popularized by Chinese mathematician Yang Hui in the 13th century, for which reason in China it is often called the Yanghui triangle. It was included as an illustration in Chinese mathematician Zhu Shijie’s Siyuan yujian (1303; “Precious Mirror of Four Elements”), where it was already called the “Old Method.” The remarkable pattern of coefficients was also studied in the 11th century by Persian poet and astronomer Omar Khayyam.
• Chinese mathematician Jia Xian devised a triangular representation for the coefficients in an expansion of binomial expressions in the 11th century. His triangle was further studied and popularized by Chinese mathematician Yang Hui in the 13th century, for which reason in China it is often called the Yanghui triangle. It was included as an illustration in Zhu Shijie’s Siyuan yujian (1303; “Precious Mirror of Four Elements”), where it was already called the “Old Method.” The remarkable pattern of coefficients was also studied in the 11th century by Persian poet and astronomer Omar Khayyam. It was reinvented in 1665 by French mathematician Blaise Pascal in the West, where it is known as Pascal’s triangle.
Chinese mathematician Jia Xian devised a triangular representation for the coefficients in an …
By permission of the Syndics of Cambridge University Library
The triangle can be constructed by first placing a 1 (Chinese “—”) along the left and right edges. Then the triangle can be filled out from the top by adding together the two numbers just above to the left and right of each position in the triangle. Thus, the third row, in Hindu-Arabic numerals, is 1 2 1, the fourth row is 1 4 6 4 1, the fifth row is 1 5 10 10 5 1, and so forth. The first row, or just 1, gives the coefficient for the expansion of (x + y)0 = 1; the second row, or 1 1, gives the coefficients for (x + y)1 = x + y; the third row, or 1 2 1, gives the coefficients for (x + y)2 = x2 + 2xy + y2; and so forth.
The triangle displays many interesting patterns. For example, drawing parallel “shallow diagonals” and adding the numbers on each line together produces the Fibonacci numbers (1, 1, 2, 3, 5, 8, 13, 21,…,), which were first noted by the medieval Italian mathematician Leonardo Pisano (“Fibonacci”) in his Liber abaci (1202; “Book of the Abacus”).
• Adding the numbers along each “shallow diagonal” of Pascal’s triangle produces the Fibonacci sequence: 1, 1, 2, 3, 5,….
Adding the numbers along each “shallow diagonal” of Pascal’s triangle produces the …
Another interesting property of the triangle is that if all the positions containing odd numbers are shaded black and all the positions containing even numbers are shaded white, a fractal known as the Sierpinski gadget, after 20th-century Polish mathematician Wacław Sierpiński, will be formed.
• Polish mathematician Wacław Sierpiński described the fractal that bears his name in 1915, although the design as an art motif dates at least to 13th-century Italy. Begin with a solid equilateral triangle, and remove the triangle formed by connecting the midpoints of each side. The midpoints of the sides of the resulting three internal triangles can be connected to form three new triangles that can be removed to form nine smaller internal triangles. The process of cutting away triangular pieces continues indefinitely, producing a region with a Hausdorff dimension of a bit more than 1.5 (indicating that it is more than a one-dimensional figure but less than a two-dimensional figure).
Polish mathematician Wacław Sierpiński described the fractal that bears his name in …
Encyclopædia Britannica, Inc.
Learn More in these related articles:
Counting boards and markers, or counting rods, were used in China to solve systems of linear equations. This is an example from the 1st century ce.
East Asian mathematics: Theory of root extraction and equations
...to Jia Xian’s algorithm described above, another method developed for determining an nth root or finding the root of an equation of any degree, using the coefficients of what is now called Pascal’s...
Read This Article
Chinese mathematician Jia Xian devised a triangular representation for the coefficients in an expansion of binomial expressions in the 11th century. His triangle was further studied and popularized by Chinese mathematician Yang Hui in the 13th century, for which reason in China it is often called the Yanghui triangle. It was included as an illustration in Zhu Shijie’s Siyuan yujian (1303; “Precious Mirror of Four Elements”), where it was already called the “Old Method.” The remarkable pattern of coefficients was also studied in the 11th century by Persian poet and astronomer Omar Khayyam. It was reinvented in 1665 by French mathematician Blaise Pascal in the West, where it is known as Pascal’s triangle.
binomial theorem
...factorial) is the product of the first n natural numbers 1, 2, 3,…, n (and where 0! is defined as equal to 1). The coefficients may also be found in the array often called Pascal’s triangle...
Read This Article
algebra
branch of mathematics in which arithmetical operations and formal manipulations are applied to abstract symbols rather than specific numbers. The notion that there exists such a distinct subdisciplin...
Read This Article
Photograph
in Fibonacci numbers
The elements of the sequence of numbers 1, 1, 2, 3, 5, 8, 13, 21, …, each of which, after the second, is the sum of the two previous numbers. These numbers were first noted by...
Read This Article
Photograph
in mathematics
Mathematics, the science of structure, order, and relation that has evolved from counting, measuring, and describing the shapes of objects.
Read This Article
Photograph
in Blaise Pascal
French mathematician, physicist, religious philosopher, and author of Pensées and the “Provincial Letters.”
Read This Article
Art
in polygon
In geometry, any closed curve consisting of a set of line segments (sides) connected such that no two segments cross. The simplest polygons are triangles (three sides), quadrilaterals...
Read This Article
in set
In mathematics and logic, any collection of objects (elements), which may be mathematical (e.g., numbers, functions) or not. The intuitive idea of a set is probably even older...
Read This Article
Keep Exploring Britannica
Margaret Mead
education
discipline that is concerned with methods of teaching and learning in schools or school-like environments as opposed to various nonformal and informal means of socialization (e.g., rural development projects...
Read this Article
A Venn diagram represents the sets and subsets of different types of triangles. For example, the set of acute triangles contains the subset of equilateral triangles, because all equilateral triangles are acute. The set of isosceles triangles partly overlaps with that of acute triangles, because some, but not all, isosceles triangles are acute.
Mathematics
Take this mathematics quiz at encyclopedia britannica to test your knowledge on various mathematic principles.
Take this Quiz
Mária Telkes.
10 Women Scientists Who Should Be Famous (or More Famous)
Not counting well-known women science Nobelists like Marie Curie or individuals such as Jane Goodall, Rosalind Franklin, and Rachel Carson, whose names appear in textbooks and, from time to time, even...
Read this List
Zeno’s paradox, illustrated by Achilles’ racing a tortoise.
foundations of mathematics
the study of the logical and philosophical basis of mathematics, including whether the axioms of a given system ensure its completeness and its consistency. Because mathematics has served as a model for...
Read this Article
Encyclopaedia Britannica First Edition: Volume 2, Plate XCVI, Figure 1, Geometry, Proposition XIX, Diameter of the Earth from one Observation
Mathematics: Fact or Fiction?
Take this Mathematics True or False Quiz at Encyclopedia Britannica to test your knowledge of various mathematic principles.
Take this Quiz
Forensic anthropologist examining a human skull found in a mass grave in Bosnia and Herzegovina, 2005.
anthropology
“the science of humanity,” which studies human beings in aspects ranging from the biology and evolutionary history of Homo sapiens to the features of society and culture that decisively distinguish humans...
Read this Article
Equations written on blackboard
Numbers and Mathematics
Take this mathematics quiz at encyclopedia britannica to test your knowledge of math, measurement, and computation.
Take this Quiz
Table 1The normal-form table illustrates the concept of a saddlepoint, or entry, in a payoff matrix at which the expected gain of each participant (row or column) has the highest guaranteed payoff.
game theory
branch of applied mathematics that provides tools for analyzing situations in which parties, called players, make decisions that are interdependent. This interdependence causes each player to consider...
Read this Article
Figure 1: Relation between pH and composition for a number of commonly used buffer systems.
acid–base reaction
a type of chemical process typified by the exchange of one or more hydrogen ions, H +, between species that may be neutral (molecules, such as water, H 2 O; or acetic acid, CH 3 CO 2 H) or electrically...
Read this Article
Figure 1: The phenomenon of tunneling. Classically, a particle is bound in the central region C if its energy E is less than V0, but in quantum theory the particle may tunnel through the potential barrier and escape.
quantum mechanics
science dealing with the behaviour of matter and light on the atomic and subatomic scale. It attempts to describe and account for the properties of molecules and atoms and their constituents— electrons,...
Read this Article
Shell atomic modelIn the shell atomic model, electrons occupy different energy levels, or shells. The K and L shells are shown for a neon atom.
atom
smallest unit into which matter can be divided without the release of electrically charged particles. It also is the smallest unit of matter that has the characteristic properties of a chemical element....
Read this Article
The visible solar spectrum, ranging from the shortest visible wavelengths (violet light, at 400 nm) to the longest (red light, at 700 nm). Shown in the diagram are prominent Fraunhofer lines, representing wavelengths at which light is absorbed by elements present in the atmosphere of the Sun.
light
electromagnetic radiation that can be detected by the human eye. Electromagnetic radiation occurs over an extremely wide range of wavelengths, from gamma rays with wavelengths less than about 1 × 10 −11...
Read this Article
MEDIA FOR:
Pascal’s triangle
Previous
Next
Citation
• MLA
• APA
• Harvard
• Chicago
Email
You have successfully emailed this.
Error when sending the email. Try again later.
Edit Mode
Pascal’s triangle
Mathematics
Tips For Editing
We welcome suggested improvements to any of our articles. You can make it easier for us to review and, hopefully, publish your contribution by keeping a few points in mind.
1. Encyclopædia Britannica articles are written in a neutral objective tone for a general audience.
2. You may find it helpful to search within the site to see how similar or related subjects are covered.
3. Any text you add should be original, not copied from other sources.
4. At the bottom of the article, feel free to list any sources that support your changes, so that we can fully understand their context. (Internet URLs are the best.)
Your contribution may be further edited by our staff, and its publication is subject to our final approval. Unfortunately, our editorial approach may not be able to accommodate all contributions.
Thank You for Your Contribution!
Our editors will review what you've submitted, and if it meets our criteria, we'll add it to the article.
Please note that our editors may make some formatting changes or correct spelling or grammatical errors, and may also contact you if any clarifications are needed.
Uh Oh
There was a problem with your submission. Please try again later.
Email this page
×
|
{
"url": "https://www.britannica.com/topic/Pascals-triangle",
"source_domain": "www.britannica.com",
"snapshot_id": "crawl=CC-MAIN-2017-34",
"warc_metadata": {
"Content-Length": "126076",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:W3FOREMISFISLOGZS6J3PZGNWQYVGWHZ",
"WARC-Concurrent-To": "<urn:uuid:5a660d29-35bf-4072-973a-b331cfe08789>",
"WARC-Date": "2017-08-20T23:28:35Z",
"WARC-IP-Address": "38.69.47.80",
"WARC-Identified-Payload-Type": "text/html",
"WARC-Payload-Digest": "sha1:RZRG2X7RVYDWS4GXJJ7JRMMZGHFD5W2E",
"WARC-Record-ID": "<urn:uuid:0cb11465-84e8-4a17-8365-3aa56fbd44d1>",
"WARC-Target-URI": "https://www.britannica.com/topic/Pascals-triangle",
"WARC-Truncated": null,
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:6a774fcc-d47a-49f5-8807-1a95567430d2>"
},
"warc_info": "robots: classic\r\nhostname: ip-10-145-153-190.ec2.internal\r\nsoftware: Nutch 1.6 (CC)\r\nisPartOf: CC-MAIN-2017-34\r\noperator: Common Crawl Admin\r\ndescription: Wide crawl of the web for August 2017\r\npublisher: Common Crawl\r\nformat: WARC File Format 1.0\r\nconformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf"
}
|
{
"line_start_idx": [
0,
18,
19,
31,
67,
68,
894,
895,
1612,
1712,
1777,
1778,
2404,
2405,
2751,
2752,
2876,
2965,
2966,
3261,
3262,
3957,
4047,
4081,
4082,
4120,
4121,
4269,
4333,
4537,
4555,
5268,
5285,
5481,
5499,
5507,
5710,
5728,
5739,
5760,
5939,
5957,
5968,
5983,
6123,
6141,
6152,
6169,
6277,
6295,
6299,
6310,
6497,
6515,
6522,
6701,
6719,
6720,
6746,
6747,
6761,
6771,
6982,
7000,
7346,
7358,
7469,
7484,
7498,
7556,
7760,
7775,
7835,
7862,
8068,
8086,
8228,
8258,
8383,
8398,
8501,
8514,
8722,
8740,
8772,
8796,
8912,
8927,
9125,
9137,
9341,
9359,
9451,
9470,
9675,
9693,
9910,
9928,
10134,
10152,
10296,
10301,
10507,
10525,
10819,
10825,
11031,
11049,
11060,
11078,
11087,
11092,
11101,
11109,
11117,
11129,
11141,
11147,
11183,
11230,
11240,
11258,
11270,
11287,
11288,
11461,
11462,
11564,
11671,
11744,
11913,
11914,
12110,
12111,
12144,
12145,
12251,
12252,
12416,
12417,
12423,
12424,
12490,
12491,
12507
],
"line_end_idx": [
18,
19,
31,
67,
68,
894,
895,
1612,
1712,
1777,
1778,
2404,
2405,
2751,
2752,
2876,
2965,
2966,
3261,
3262,
3957,
4047,
4081,
4082,
4120,
4121,
4269,
4333,
4537,
4555,
5268,
5285,
5481,
5499,
5507,
5710,
5728,
5739,
5760,
5939,
5957,
5968,
5983,
6123,
6141,
6152,
6169,
6277,
6295,
6299,
6310,
6497,
6515,
6522,
6701,
6719,
6720,
6746,
6747,
6761,
6771,
6982,
7000,
7346,
7358,
7469,
7484,
7498,
7556,
7760,
7775,
7835,
7862,
8068,
8086,
8228,
8258,
8383,
8398,
8501,
8514,
8722,
8740,
8772,
8796,
8912,
8927,
9125,
9137,
9341,
9359,
9451,
9470,
9675,
9693,
9910,
9928,
10134,
10152,
10296,
10301,
10507,
10525,
10819,
10825,
11031,
11049,
11060,
11078,
11087,
11092,
11101,
11109,
11117,
11129,
11141,
11147,
11183,
11230,
11240,
11258,
11270,
11287,
11288,
11461,
11462,
11564,
11671,
11744,
11913,
11914,
12110,
12111,
12144,
12145,
12251,
12252,
12416,
12417,
12423,
12424,
12490,
12491,
12507,
12508
]
}
|
{
"red_pajama_v2": {
"ccnet_original_length": 12508,
"ccnet_original_nlines": 144,
"rps_doc_curly_bracket": 0,
"rps_doc_ldnoobw_words": 0,
"rps_doc_lorem_ipsum": 0,
"rps_doc_stop_word_fraction": 0.3643312156200409,
"rps_doc_ut1_blacklist": 0,
"rps_doc_frac_all_caps_words": 0.007643309887498617,
"rps_doc_frac_lines_end_with_ellipsis": 0.12413793057203293,
"rps_doc_frac_no_alph_words": 0.18174098432064056,
"rps_doc_frac_unique_words": 0.3707808554172516,
"rps_doc_mean_word_length": 5.0866498947143555,
"rps_doc_num_sentences": 106,
"rps_doc_symbol_to_word_ratio": 0.010191080160439014,
"rps_doc_unigram_entropy": 5.757418155670166,
"rps_doc_word_count": 1985,
"rps_doc_frac_chars_dupe_10grams": 0.21402396261692047,
"rps_doc_frac_chars_dupe_5grams": 0.24710309505462646,
"rps_doc_frac_chars_dupe_6grams": 0.23472319543361664,
"rps_doc_frac_chars_dupe_7grams": 0.2220461517572403,
"rps_doc_frac_chars_dupe_8grams": 0.2220461517572403,
"rps_doc_frac_chars_dupe_9grams": 0.21907496452331543,
"rps_doc_frac_chars_top_2gram": 0.008418340235948563,
"rps_doc_frac_chars_top_3gram": 0.0237694401293993,
"rps_doc_frac_chars_top_4gram": 0.009507769718766212,
"rps_doc_books_importance": -1034.195068359375,
"rps_doc_books_importance_length_correction": -1034.195068359375,
"rps_doc_openwebtext_importance": -719.1763305664062,
"rps_doc_openwebtext_importance_length_correction": -719.1763305664062,
"rps_doc_wikipedia_importance": -526.3745727539062,
"rps_doc_wikipedia_importance_length_correction": -526.3745727539062
},
"fasttext": {
"dclm": 0.08852291107177734,
"english": 0.9319152235984802,
"fineweb_edu_approx": 3.275472402572632,
"eai_general_math": 0.9387268424034119,
"eai_open_web_math": 0.6717067360877991,
"eai_web_code": 0.14116090536117554
}
}
|
{
"free_decimal_correspondence": {
"primary": {
"code": "512.0",
"labels": {
"level_1": "Science and Natural history",
"level_2": "Mathematics",
"level_3": "Algebra"
}
},
"secondary": {
"code": "510.0",
"labels": {
"level_1": "Science and Natural history",
"level_2": "Mathematics",
"level_3": ""
}
}
},
"bloom_cognitive_process": {
"primary": {
"code": "2",
"label": "Understand"
},
"secondary": {
"code": "3",
"label": "Apply"
}
},
"bloom_knowledge_domain": {
"primary": {
"code": "2",
"label": "Conceptual"
},
"secondary": {
"code": "3",
"label": "Procedural"
}
},
"document_type_v1": {
"primary": {
"code": "3",
"label": "Reference/Encyclopedic/Educational"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"extraction_artifacts": {
"primary": {
"code": "0",
"label": "No Artifacts"
},
"secondary": {
"code": "3",
"label": "Irrelevant Content"
}
},
"missing_content": {
"primary": {
"code": "0",
"label": "No missing content"
},
"secondary": {
"code": "4",
"label": "Missing Images or Figures"
}
},
"document_type_v2": {
"primary": {
"code": "10",
"label": "Knowledge Article"
},
"secondary": {
"code": "3",
"label": "Academic Writing"
}
},
"reasoning_depth": {
"primary": {
"code": "2",
"label": "Basic Reasoning"
},
"secondary": {
"code": "3",
"label": "Intermediate Reasoning"
}
},
"technical_correctness": {
"primary": {
"code": "4",
"label": "Highly Correct"
},
"secondary": {
"code": "3",
"label": "Mostly Correct"
}
},
"education_level": {
"primary": {
"code": "2",
"label": "High School Level"
},
"secondary": {
"code": "1",
"label": "General Audience"
}
}
}
|
672f1e42c33a7f9846924a2431ea77df
|
-433,051,443,684,761,200 |
akaros.cs.berkeley.edu Git - akaros.git/rss - kern/arch/x86/perfmon.h history http://akaros.cs.berkeley.edu/gitweb/?p=akaros.git;a=history;f=kern/arch/x86/perfmon.h Akaros en Barret Rhoden static/git-logo.png akaros.cs.berkeley.edu Git - akaros.git/rss - kern/arch/x86/perfmon.h history http://akaros.cs.berkeley.edu/gitweb/?p=akaros.git;a=history;f=kern/arch/x86/perfmon.h Sun, 24 Mar 2019 02:43:40 +0000 Sun, 24 Mar 2019 02:43:40 +0000 gitweb v.2.7.4/2.7.4 Treat tabs as having eight spaces instead of four Barret Rhoden <[email protected]> Tue, 12 Mar 2019 23:41:50 +0000 http://akaros.cs.berkeley.edu/gitweb/?p=akaros.git;a=commitdiff;h=e2e76c34b4eb027eec44bf0ab81523c4359aa6a3 http://akaros.cs.berkeley.edu/gitweb/?p=akaros.git;a=commitdiff;h=e2e76c34b4eb027eec44bf0ab81523c4359aa6a3 Treat tabs as having eight spaces instead of four Treat tabs as having eight spaces instead of four For whatever bad reason, we chose to treat tabs as four spaces instead of eight. e.g. in vim, tabstop=4. That's a huge pain - both when dealing with other tools and when switching between projects. I don't particularly like having per-project vim settings and whatnot. Plus, that's a bit harder for other people who look at our code and have their vim/emacs set to 8 space tabs. I had regretted that for a long time, but I didn't want to make the change for two reasons: 1) With other people working on the project, changes of this sort can lead to merge conflicts. Since I'm the only one working on it, for the most part, this isn't a concern. 2) The bigger reason is that major reformatting changes break git blame. However, there are tools that can ignore commits when running git blame. Chromium has git hyper-blame. I thought that feature ought to be baked into git, so I have a patchset out for git to do so. Either way, I'll either have my own patched git or the feature will get merged. In a future commit, I'll have instructions for how to use that feature. A lot of our files didn't need too much attention, due to our old "spaces for formatting" policy. I didn't change those to use tabs instead of spaces for the formatting either. I expect newer code will just do whatever people's editors do. I didn't want to change more lines than were needed, and the code looks the same either way. The biggest offenders were indented comments. Structs with column-aligned members needed some work too. I did most of that stuff manually, since the tools do a mediocre job. Since I was making changes, I also fixed up the switch-case indenting: don't do an extra level of indentation for the case keywords. Doing this now actually helped with the 8-space tab change, since switch statements got a few spaces to work with. A few of the kernel's C files were so badly messed up that I just used clang-format on them. Same for Plan 9 files that had been clang-formatted before and hadn't been heavily modified by us. Clang-format caused a few problems with its "alphabetized headers" policy. That was fun. Higher-quality (subjectively) code didn't need as much work as older, poorer code. Specifically, code with way too many levels of indentation looks even worse than before - that's actually a benefit of 8-space tabs: it tells you when your code is bad. A lot of that older code needs a more serious refactoring, which this commit does not do. Signed-off-by: Barret Rhoden <[email protected]>
• [D] kern/arch/x86/perfmon.h
]]>
perf: Use NMIs for sampling HW and VM TFs Barret Rhoden <[email protected]> Wed, 27 Jul 2016 22:25:08 +0000 http://akaros.cs.berkeley.edu/gitweb/?p=akaros.git;a=commitdiff;h=3adb611a34347bd66ded6e3422ac5442f6e6c607 http://akaros.cs.berkeley.edu/gitweb/?p=akaros.git;a=commitdiff;h=3adb611a34347bd66ded6e3422ac5442f6e6c607 perf: Use NMIs for sampling HW and VM TFs perf: Use NMIs for sampling HW and VM TFs Using NMIs allows us to sampling when interrupts are disabled. It's extremely useful. To limit the amount of code we run from NMI context, we only record the sample into a pre-allocated, per-cpu buffer. Keep in mind the NMI rules about writing and reading at the top of handle_nmi(). So NMIs record the backtrace, but don't emit the sample. We self_ipi() to trigger emitting the sample as soon as IRQs are reenabled. If IRQs were not disabled, this IRQ will hit as soon as the NMI returns. vmexits for an NMI will also record the PC of the guest, but not attempt a backtrace. Previously, we were probably trying to backtrace. Due to the x86 NMI blocking issues, we don't attempt to do anything that might fault from the vmexit NMI handler. NMIs are now used for both perf monitoring and the monitor "trace coretf". The monitor's trace command is still a little dangerous. This commit also just moves all of that mess into monitor.c. Signed-off-by: Barret Rhoden <[email protected]>
• [D] kern/arch/x86/perfmon.h
]]>
perf: Remove the kref from perfmon_session Barret Rhoden <[email protected]> Tue, 14 Jun 2016 19:16:14 +0000 http://akaros.cs.berkeley.edu/gitweb/?p=akaros.git;a=commitdiff;h=189f81d04f04d73f66b0a665056913bc3529827a http://akaros.cs.berkeley.edu/gitweb/?p=akaros.git;a=commitdiff;h=189f81d04f04d73f66b0a665056913bc3529827a perf: Remove the kref from perfmon_session perf: Remove the kref from perfmon_session The sessions are 1:1 with perfmon_contexts. The context in devarch is the way in which to access the session, so we don't need to do any reference counting. Note that perfmon_get_session() was never called - we had no use for it. Likewise, arch_free_perf_context() should never be called with 0. The one time it is called, the caller checks. Signed-off-by: Barret Rhoden <[email protected]>
• [D] kern/arch/x86/perfmon.h
]]>
perf: Clean up perf_{session,alloc} management Barret Rhoden <[email protected]> Tue, 14 Jun 2016 17:59:27 +0000 http://akaros.cs.berkeley.edu/gitweb/?p=akaros.git;a=commitdiff;h=b5e9fa4092747a3c4548a28e382bb34687c34aa3 http://akaros.cs.berkeley.edu/gitweb/?p=akaros.git;a=commitdiff;h=b5e9fa4092747a3c4548a28e382bb34687c34aa3 perf: Clean up perf_{session,alloc} management perf: Clean up perf_{session,alloc} management The big thing was the unnecessary kref on the alloc. Due to that, we had the weird alloc_get helper, which either got a ref or dropped it. We don't need any of that, and it confuses things. The one important thing is to use a qlock to avoid a deadlock. Deadlock is the likely reason for the kref in the first place, but it was just unnecessary. I cleaned up a couple other things: the dealloc funcs don't allow you to pass in 0. No one was doing it, and allowing it makes it seems like we wanted to have that be an option. perf_alloc_status was renamed. It had nothing to do with "struct perf_alloc". It was trying to get a new status (a.k.a. to alloc()). perfmon_install_session_alloc() was needlessly clever, and the errors() we throw now have real error messages. Signed-off-by: Barret Rhoden <[email protected]>
• [D] kern/arch/x86/perfmon.h
]]>
x86: Detect and handle missing perf support Barret Rhoden <[email protected]> Wed, 16 Dec 2015 22:14:36 +0000 http://akaros.cs.berkeley.edu/gitweb/?p=akaros.git;a=commitdiff;h=6577674d3c3c1e3ce19ff4e2e36e67c7b49543db http://akaros.cs.berkeley.edu/gitweb/?p=akaros.git;a=commitdiff;h=6577674d3c3c1e3ce19ff4e2e36e67c7b49543db x86: Detect and handle missing perf support x86: Detect and handle missing perf support If a machine has perf version 0, which is the case for my Qemu, we'll get a GPF during initialization. The per core initialization and any accesses to the Qperf file will abort if we don't have the right version. This assumes that if open of a Qperf fails, that there is no other way for the user to trigger access to the perf MSRs. Signed-off-by: Barret Rhoden <[email protected]>
• [D] kern/arch/x86/perfmon.h
]]>
Added perfmon interrupt handling to allow overflow based profiling Davide Libenzi <[email protected]> Mon, 16 Nov 2015 15:13:13 +0000 http://akaros.cs.berkeley.edu/gitweb/?p=akaros.git;a=commitdiff;h=72515d2a2c8abf6ce1dd882bb81c52878c1a6f4a http://akaros.cs.berkeley.edu/gitweb/?p=akaros.git;a=commitdiff;h=72515d2a2c8abf6ce1dd882bb81c52878c1a6f4a Added perfmon interrupt handling to allow overflow based profiling Added perfmon interrupt handling to allow overflow based profiling Added perfmon interrupt handling to allow overflow based profiling. This allow to set the INT bit in the Intel perfmon counter configuration, and, by setting an initial counter value close to the overflow, to sample code which triggers overflowing the most. Signed-off-by: Davide Libenzi <[email protected]> [checkpatch complaints] Signed-off-by: Barret Rhoden <[email protected]>
• [D] kern/arch/x86/perfmon.h
]]>
Migrated Akaros code to use pragma once (XCC) Davide Libenzi <[email protected]> Thu, 29 Oct 2015 13:22:45 +0000 http://akaros.cs.berkeley.edu/gitweb/?p=akaros.git;a=commitdiff;h=1ed63f9f8e25820f7eb217727d4ee88efe827d41 http://akaros.cs.berkeley.edu/gitweb/?p=akaros.git;a=commitdiff;h=1ed63f9f8e25820f7eb217727d4ee88efe827d41 Migrated Akaros code to use pragma once (XCC) Migrated Akaros code to use pragma once (XCC) Migrated Akaros code to use pragma once include file marker. Rebuild glibc. Signed-off-by: Davide Libenzi <[email protected]> [toolchain notice] Signed-off-by: Barret Rhoden <[email protected]>
• [D] kern/arch/x86/perfmon.h
]]>
Splits x86 into 32 and 64 bit (XCC) Barret Rhoden <[email protected]> Wed, 12 Jun 2013 00:38:00 +0000 http://akaros.cs.berkeley.edu/gitweb/?p=akaros.git;a=commitdiff;h=dd07360f0d867faaf7fc27ab08664eedd253ae9a http://akaros.cs.berkeley.edu/gitweb/?p=akaros.git;a=commitdiff;h=dd07360f0d867faaf7fc27ab08664eedd253ae9a Splits x86 into 32 and 64 bit (XCC) Splits x86 into 32 and 64 bit (XCC) No real change in functionality, just separating out the bit-specific items within the arch directory and build process. This builds and links in 64 bit mode, but doesn't actually do anything (like jump into longmode, etc).
• [D] kern/arch/x86/perfmon.h
]]>
Changes ARCH i686 -> x86 (XCC) Barret Rhoden <[email protected]> Fri, 7 Jun 2013 21:40:38 +0000 http://akaros.cs.berkeley.edu/gitweb/?p=akaros.git;a=commitdiff;h=7cf5489e9cd7a922e8b7902441cb9e8329af0e19 http://akaros.cs.berkeley.edu/gitweb/?p=akaros.git;a=commitdiff;h=7cf5489e9cd7a922e8b7902441cb9e8329af0e19 Changes ARCH i686 -> x86 (XCC) Changes ARCH i686 -> x86 (XCC) Remove the installation XCC content, and rebuild your cross compiler.
• [D] kern/arch/x86/perfmon.h
]]>
|
{
"url": "http://akaros.cs.berkeley.edu/gitweb/?p=akaros.git;a=rss;f=kern/arch/x86/perfmon.h",
"source_domain": "akaros.cs.berkeley.edu",
"snapshot_id": "crawl=CC-MAIN-2020-10",
"warc_metadata": {
"Content-Length": "16338",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:L7HWC7YLBII6U5FJMU6XTH6S4G47MQ2L",
"WARC-Concurrent-To": "<urn:uuid:e75a8a39-4344-468b-b737-6589e9266f4c>",
"WARC-Date": "2020-02-23T15:31:48Z",
"WARC-IP-Address": "146.148.59.222",
"WARC-Identified-Payload-Type": "application/rss+xml",
"WARC-Payload-Digest": "sha1:VG4SACO5NNDQDLDU27QZ2X5ZSFZQOCDA",
"WARC-Record-ID": "<urn:uuid:8011c64a-3553-4282-94d4-df46e5f801a8>",
"WARC-Target-URI": "http://akaros.cs.berkeley.edu/gitweb/?p=akaros.git;a=rss;f=kern/arch/x86/perfmon.h",
"WARC-Truncated": null,
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:07d5507f-b279-445a-bf0f-6cf7106fb321>"
},
"warc_info": "isPartOf: CC-MAIN-2020-10\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for February 2020\r\noperator: Common Crawl Admin ([email protected])\r\nhostname: ip-10-67-67-170.ec2.internal\r\nsoftware: Apache Nutch 1.16 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.1-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/"
}
|
{
"line_start_idx": [
0,
3389,
3421,
3425,
4819,
4851,
4855,
5661,
5693,
5697,
6940,
6972,
6976,
7776,
7808,
7812,
8682,
8714,
8718,
9338,
9370,
9374,
9989,
10021,
10025,
10470,
10502
],
"line_end_idx": [
3389,
3421,
3425,
4819,
4851,
4855,
5661,
5693,
5697,
6940,
6972,
6976,
7776,
7808,
7812,
8682,
8714,
8718,
9338,
9370,
9374,
9989,
10021,
10025,
10470,
10502,
10505
]
}
|
{
"red_pajama_v2": {
"ccnet_original_length": 10505,
"ccnet_original_nlines": 26,
"rps_doc_curly_bracket": 0.0005711599951609969,
"rps_doc_ldnoobw_words": 0,
"rps_doc_lorem_ipsum": 0,
"rps_doc_stop_word_fraction": 0.2822834551334381,
"rps_doc_ut1_blacklist": 0,
"rps_doc_frac_all_caps_words": 0.022834649309515953,
"rps_doc_frac_lines_end_with_ellipsis": 0,
"rps_doc_frac_no_alph_words": 0.3271653354167938,
"rps_doc_frac_unique_words": 0.37859779596328735,
"rps_doc_mean_word_length": 6.101844787597656,
"rps_doc_num_sentences": 234,
"rps_doc_symbol_to_word_ratio": 0,
"rps_doc_unigram_entropy": 5.670186519622803,
"rps_doc_word_count": 1355,
"rps_doc_frac_chars_dupe_10grams": 0.033744558691978455,
"rps_doc_frac_chars_dupe_5grams": 0.22544750571250916,
"rps_doc_frac_chars_dupe_6grams": 0.2048863172531128,
"rps_doc_frac_chars_dupe_7grams": 0.15662795305252075,
"rps_doc_frac_chars_dupe_8grams": 0.10413642972707748,
"rps_doc_frac_chars_dupe_9grams": 0.06724721938371658,
"rps_doc_frac_chars_top_2gram": 0.02177068032324314,
"rps_doc_frac_chars_top_3gram": 0.04910498112440109,
"rps_doc_frac_chars_top_4gram": 0.033865511417388916,
"rps_doc_books_importance": -835.7075805664062,
"rps_doc_books_importance_length_correction": -835.7075805664062,
"rps_doc_openwebtext_importance": -518.0126953125,
"rps_doc_openwebtext_importance_length_correction": -518.0126953125,
"rps_doc_wikipedia_importance": -452.8922424316406,
"rps_doc_wikipedia_importance_length_correction": -452.8922424316406
},
"fasttext": {
"dclm": 0.06867110729217529,
"english": 0.8391932845115662,
"fineweb_edu_approx": 1.5510876178741455,
"eai_general_math": 0.4033297896385193,
"eai_open_web_math": 0.29856300354003906,
"eai_web_code": 0.2481222152709961
}
}
|
{
"free_decimal_correspondence": {
"primary": {
"code": "005.4",
"labels": {
"level_1": "General works, books and libraries, information sciences",
"level_2": "",
"level_3": "Computer programming"
}
},
"secondary": {
"code": "004.02",
"labels": {
"level_1": "General works, books and libraries, information sciences",
"level_2": "",
"level_3": "Computers and Computer science"
}
}
},
"bloom_cognitive_process": {
"primary": {
"code": "3",
"label": "Apply"
},
"secondary": {
"code": "4",
"label": "Analyze"
}
},
"bloom_knowledge_domain": {
"primary": {
"code": "3",
"label": "Procedural"
},
"secondary": {
"code": "2",
"label": "Conceptual"
}
},
"document_type_v1": {
"primary": {
"code": "4",
"label": "Code/Software"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"extraction_artifacts": {
"primary": {
"code": "1",
"label": "Leftover HTML"
},
"secondary": {
"code": "3",
"label": "Irrelevant Content"
}
},
"missing_content": {
"primary": {
"code": "0",
"label": "No missing content"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"document_type_v2": {
"primary": {
"code": "8",
"label": "Documentation"
},
"secondary": {
"code": "6",
"label": "Content Listing"
}
},
"reasoning_depth": {
"primary": {
"code": "3",
"label": "Intermediate Reasoning"
},
"secondary": {
"code": "2",
"label": "Basic Reasoning"
}
},
"technical_correctness": {
"primary": {
"code": "4",
"label": "Highly Correct"
},
"secondary": {
"code": "3",
"label": "Mostly Correct"
}
},
"education_level": {
"primary": {
"code": "4",
"label": "Graduate/Expert Level"
},
"secondary": {
"code": "3",
"label": "Undergraduate Level"
}
}
}
|
672f1e42c33a7f9846924a2431ea77df
|
-5,304,340,481,567,743,000 |
Caelan Grgurovic Caelan Grgurovic - 1 year ago 61
Javascript Question
Username Length Verification jQuery
I am attempting to create jQuery form which is automatically updated every time the user clicks.
At the moment I am working on querying if the username is correct length; if it is not, it will make the input box outlined red.
This is my current code (which does not seem to function at all).
jQuery:
<script src="http://ajax.googleapis.com/ajax/libs/jquery/1.10.2/jquery.min.js"></script>
<script type="text/javascript">
jQuery(function($) {
$(document).click(function(e) {
if (!$(e.target).closest('#jq-user-getval').length) {
if ( $('#jq-user-getval').val() != '' ) {
if( $("#jq-user-getval").val() < 4) {
$("#jq-user-getval").addClass('border-force');
}
}
}
})
})
</script>
as you can see, I have made it so that when the user clicks away from the input box, it will check if the box is empty. If it is empty, it will check if the length is less than 4 characters, then it is supposed to add a class forcing the red outline. This is not working, however.
this is the HTML, I am unsure if the problem lies here or not:
<form action="" method="post">
<input id="jq-user-getval jq-user-class" type="text" name="username">
</form>
I am trying to replicate Microsoft's "Hotmail" registration form, if you can suggest any changes.
Answer Source
Your id value is incorrect. Technically, id cannot contain spaces. Change your <input /> to:
<input id="jq-user-getval" class="jq-user-class" type="text" name="username" />
The way you are using .val() < 4 is also wrong. You cannot compare like that with a string:
"hello" < 4; // This is meaningless.
"hello".length < 4; // You should use this.
Use .blur() function for this:
$(function () {
$("#jq-user-getval").blur(function () {
if (this.value.trim().length !== 0 && this.value.trim().length < 4)
$(this).addClass("border-force");
});
});
If you are dynamically loading the <input />, then you can delegate the event this way:
$(function () {
$(document).on("blur", "#jq-user-getval", function () {
if (this.value.trim().length !== 0 && this.value.trim().length < 4)
$(this).addClass("border-force");
});
});
I have added .trim() for extra security, like people might get away putting spaces.
There's no real reason for you to use the .click() function anywhere here. The clicking away really triggers blur event on the <input />.
|
{
"url": "https://codedump.io/share/U0BMLdGwZsbI/1/username-length-verification-jquery",
"source_domain": "codedump.io",
"snapshot_id": "crawl=CC-MAIN-2017-47",
"warc_metadata": {
"Content-Length": "43515",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:VSWEV2APD3UBHDUEIFD4PPEIVRUGM2FL",
"WARC-Concurrent-To": "<urn:uuid:ff7bc00b-9dba-425c-a317-047f3fb6a895>",
"WARC-Date": "2017-11-24T13:16:43Z",
"WARC-IP-Address": "50.112.74.85",
"WARC-Identified-Payload-Type": "text/html",
"WARC-Payload-Digest": "sha1:FKYH2JWE2UZN3IK6AW2YUAHEM7E3BUZ6",
"WARC-Record-ID": "<urn:uuid:deac5c71-b16c-4966-8b6f-09aece4a2eff>",
"WARC-Target-URI": "https://codedump.io/share/U0BMLdGwZsbI/1/username-length-verification-jquery",
"WARC-Truncated": null,
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:939c5a8c-acbf-481d-a7e2-99bd87cc0737>"
},
"warc_info": "robots: classic\r\nhostname: ip-10-30-31-153.ec2.internal\r\nsoftware: Nutch 1.6 (CC)\r\nisPartOf: CC-MAIN-2017-47\r\noperator: Common Crawl Admin\r\ndescription: Wide crawl of the web for November 2017\r\npublisher: Common Crawl\r\nformat: WARC File Format 1.0\r\nconformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf"
}
|
{
"line_start_idx": [
0,
50,
70,
71,
107,
108,
205,
206,
335,
336,
402,
403,
411,
412,
501,
533,
554,
586,
640,
682,
720,
767,
769,
771,
773,
776,
779,
789,
790,
791,
1072,
1073,
1136,
1137,
1168,
1238,
1246,
1247,
1248,
1346,
1347,
1361,
1362,
1455,
1456,
1536,
1537,
1629,
1630,
1675,
1720,
1721,
1752,
1753,
1769,
1811,
1883,
1923,
1929,
1933,
1934,
2022,
2023,
2039,
2097,
2169,
2209,
2215,
2219,
2220,
2304,
2305
],
"line_end_idx": [
50,
70,
71,
107,
108,
205,
206,
335,
336,
402,
403,
411,
412,
501,
533,
554,
586,
640,
682,
720,
767,
769,
771,
773,
776,
779,
789,
790,
791,
1072,
1073,
1136,
1137,
1168,
1238,
1246,
1247,
1248,
1346,
1347,
1361,
1362,
1455,
1456,
1536,
1537,
1629,
1630,
1675,
1720,
1721,
1752,
1753,
1769,
1811,
1883,
1923,
1929,
1933,
1934,
2022,
2023,
2039,
2097,
2169,
2209,
2215,
2219,
2220,
2304,
2305,
2442
]
}
|
{
"red_pajama_v2": {
"ccnet_original_length": 2442,
"ccnet_original_nlines": 71,
"rps_doc_curly_bracket": 0.0073710097931325436,
"rps_doc_ldnoobw_words": 0,
"rps_doc_lorem_ipsum": 0,
"rps_doc_stop_word_fraction": 0.2549019455909729,
"rps_doc_ut1_blacklist": 0,
"rps_doc_frac_all_caps_words": 0.011437909677624702,
"rps_doc_frac_lines_end_with_ellipsis": 0,
"rps_doc_frac_no_alph_words": 0.38725489377975464,
"rps_doc_frac_unique_words": 0.5179153084754944,
"rps_doc_mean_word_length": 5.501628875732422,
"rps_doc_num_sentences": 53,
"rps_doc_symbol_to_word_ratio": 0.009803920052945614,
"rps_doc_unigram_entropy": 4.702643871307373,
"rps_doc_word_count": 307,
"rps_doc_frac_chars_dupe_10grams": 0,
"rps_doc_frac_chars_dupe_5grams": 0.09591473639011383,
"rps_doc_frac_chars_dupe_6grams": 0.07696861773729324,
"rps_doc_frac_chars_dupe_7grams": 0,
"rps_doc_frac_chars_dupe_8grams": 0,
"rps_doc_frac_chars_dupe_9grams": 0,
"rps_doc_frac_chars_top_2gram": 0.007104800082743168,
"rps_doc_frac_chars_top_3gram": 0.015393720008432865,
"rps_doc_frac_chars_top_4gram": 0.015393720008432865,
"rps_doc_books_importance": -298.8775634765625,
"rps_doc_books_importance_length_correction": -298.8775634765625,
"rps_doc_openwebtext_importance": -164.36412048339844,
"rps_doc_openwebtext_importance_length_correction": -164.36412048339844,
"rps_doc_wikipedia_importance": -107.4148178100586,
"rps_doc_wikipedia_importance_length_correction": -107.4148178100586
},
"fasttext": {
"dclm": 0.544191837310791,
"english": 0.6415615081787109,
"fineweb_edu_approx": 1.5747368335723877,
"eai_general_math": 0.6860052943229675,
"eai_open_web_math": 0.16508197784423828,
"eai_web_code": 0.9031299948692322
}
}
|
{
"free_decimal_correspondence": {
"primary": {
"code": "005.133",
"labels": {
"level_1": "General works, books and libraries, information sciences",
"level_2": "",
"level_3": "Computer programming"
}
},
"secondary": {
"code": "005.1",
"labels": {
"level_1": "General works, books and libraries, information sciences",
"level_2": "",
"level_3": "Computer programming"
}
}
},
"bloom_cognitive_process": {
"primary": {
"code": "3",
"label": "Apply"
},
"secondary": {
"code": "2",
"label": "Understand"
}
},
"bloom_knowledge_domain": {
"primary": {
"code": "3",
"label": "Procedural"
},
"secondary": {
"code": "2",
"label": "Conceptual"
}
},
"document_type_v1": {
"primary": {
"code": "4",
"label": "Code/Software"
},
"secondary": {
"code": "3",
"label": "Reference/Encyclopedic/Educational"
}
},
"extraction_artifacts": {
"primary": {
"code": "0",
"label": "No Artifacts"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"missing_content": {
"primary": {
"code": "0",
"label": "No missing content"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"document_type_v2": {
"primary": {
"code": "18",
"label": "Q&A Forum"
},
"secondary": {
"code": "8",
"label": "Documentation"
}
},
"reasoning_depth": {
"primary": {
"code": "2",
"label": "Basic Reasoning"
},
"secondary": {
"code": "3",
"label": "Intermediate Reasoning"
}
},
"technical_correctness": {
"primary": {
"code": "4",
"label": "Highly Correct"
},
"secondary": {
"code": "3",
"label": "Mostly Correct"
}
},
"education_level": {
"primary": {
"code": "3",
"label": "Undergraduate Level"
},
"secondary": {
"code": "2",
"label": "High School Level"
}
}
}
|
672f1e42c33a7f9846924a2431ea77df
|
-5,976,670,611,524,386,000 |
AlpineJS for Beginners
Updated January 1, 2021・9 minute read Post By tnylea#javascript #alpinejs #alpine #beginner
AlpineJS for Beginners
AlpineJS is a new javascript library/framework that focuses on simple javascript interactivity, and it does it really well. If you're looking for a JS framework with routing, state management, and a bit more complexity. Well then, Vue or React may be a better fit.
Instead, if you're looking to sprinkle a little javascript, add two-way data binding, and create simple components. Then, AlpineJS is the library you will want to reach for.
Alpine puts simplicity back into javascript. In this tutorial, I'm going to teach you the basics of using AlpineJS, so you can see how simple (and powerful) it is.
Install Alpine
Alpine can easily be installed on any website by including the CDN link on your page, like so:
<!DOCTYPE html>
<html lang="en">
<head>
<meta charset="UTF-8">
<meta name="viewport" content="width=device-width, initial-scale=1.0">
<title>Alpine JS</title>
</head>
<body>
<script src="https://cdn.jsdelivr.net/gh/alpinejs/[email protected]/dist/alpine.min.js" defer></script>
</body>
</html>
It's as simple as that. You can now use Alpine on your page.
You may also wish to include Alpine via NPM, which you can learn how to do from the Alpine Github repo.
Creating a component
Creating your first Alpine component is very simple. All you need to do is add the x-data attribute to any element like so:
<div x-data="{}"></div>
The example will create a new Alpine component with an empty object {} as its data. Of course, this component is pretty useless without any data, so let's create a new one with some data.
<div x-data="{ title: 'Hello Alpine' }">
<p x-text="title"></p>
</div>
As you can see from the code above, we have a data variable called title, and we are rendering that text out in a paragraph element using the x-text attribute. The x-text attribute (also referred to as a directive) will render the variable passed to it.
Checkout our latest product - the ultimate tailwindcss page creator 🚀
Here is a quick codepen example of our first AlpineJS component:
Now, our component doesn't do anything special at the moment. But, since we are utilizing Alpine, we can add some simple interactivity to our component. Let's first cover click events.
Click Events
We can use a new directive called x-on:click and execute some javascript when that element is clicked. Take a look at the code example below. We are changing our title variable when the user clicks the button.
<div x-data="{ title: 'Hello Alpine' }">
<p x-text="title"></p>
<button x-on:click="title='Alpine Rocks!'">click me</button>
</div>
You can also use a shorthand syntax for any x-on: event with the @ symbol. So our click directive can be changed to @click, like so:
<div x-data="{ title: 'Hello Alpine' }">
<p x-text="title"></p>
<button @click="title='Alpine Rocks!'">click me</button>
</div>
Take a look at the codepen below to view a live example of our new component:
Next, let's see how we can use everything we've learned so far about Alpine to create a simple counter component.
Create a Counter Component
We can easily create a counter component by declaring a count variable, like so:
<div x-data="{ count: 1 }">
<p x-text="count"></p>
</div>
You can see that we set the initial value to 0 for our counter. if we wanted to add a button to increment our counter, we can do so with the following code:
<div x-data="{ count: 1 }">
<p x-text="count"></p>
<button @click="count++">Count Up</button>
</div>
You may also want to add a button that will decrease the counter. Simple enough we can add another button that does the opposite of the other button:
<div x-data="{ count: 1 }">
<p x-text="count"></p>
<button @click="count++">Count Up</button>
<button @click="count--">Count Down</button>
</div>
Take a look at a live example of this component from the codepen below:
You can see that it's just that easy to create a counter in AlpineJS.
Now, we've used a few directives, such as the x-text and the x-on. There are currently 14 directives that we can use in our component to add functionality. Let's quickly cover those other directives.
AlpineJS Directives
Directives are attributes you can add to your elements to attach a specified behavior to that element. Below are the 14 directives you can use in your Alpine components to attach some behavior.
1. x-data - creates a new alpine component and allows you to add data to your component.
2. x-init - executes javascript code when the component is initialized—more info on this directive in the next section.
3. x-show - show or hide an element based on a true or false variable.
4. x-bind - set the value of an attribute based on a condition. example x-bind:disabled="isDisabled".
5. x-on - execute javascript based on a JS event listener. example: x-on:click="console.log('i got clicked')".
6. x-model - two-way data bind variable to element. Will keep both element and variable data in sync.
7. x-text - sets the innerText of an element equal to the variable data.
8. x-html - sets the innerHTML of an element equal to the specified variable data.
9. x-ref - This allows you to add a reference to this element to refer to it elsewhere.
10. x-if - If the condition is not met inside this directive, the element will be removed from the DOM and must be used inside a <template> tag.
11. x-for - Loops through an array of items and creates new nodes for each item in the array. Must also be used in a <template> tag.
12. x-transition - Directive for applying classes to the different stages of an element's transitions.
13. x-spread - This allows you to bind an object of an Alpine directive with an element for better re-usability.
14. x-cloak - Attribute used on an element to hide it from the DOM until the component is ready. Learn more about x-cloak from this article.
Those are the directives you can use inside of your AlpineJS components. Get to know most of them, and you will be an AlpineJS ninja 🥋.
Below, we are only going to cover the most useful directives. We have already covered the x-data and the x-on directive.
Next, let's learn about the x-init, x-show, x-model, x-html, x-ref, x-if, and x-for directives. Let's kick it off with the x-init directive.
AlpineJS x-init
The x-init directive will allow you to run some javascript code when a component is ready and initialized.
Here is a quick example of a small timer countdown component where we add a simple setInterval inside the x-init directive to count down our timer.
<div x-data="{ countdown: 60 }"
x-init="setInterval(function(){
countdown--;
}, 1000);
">
<h1 x-text="countdown"></h1>
</div>
You can check out an example of our timer countdown in the codepen below:
Anytime you need some code to be executed as soon as your component is ready, you can add that code to your x-init directive.
AlpineJS x-show directive
Next, if we want to show or hide an element optionally, we can use the x-show directive.
As an example say that we have a simple button that will toggle the visibility of another element. That can easily be accomplished with the following code:
<div x-data="{ show: false }">
<button @click="show=!show">Show</button>
<div x-show="show">Hello</div>
</div>
You can take a look at this simple example from the codepen below. Click the show button to toggle the display.
Pretty straight forward, right? In addition to the x-show directive, we can also add a simple transition to the element visibility.
Take a look at the same example. This time we'll add a transition to the directive x-show.transition="show", and we'll get a nice little transition when the element is toggled.
There are also some more advanced transitions you can use to customize the in-and-out transition effects. You can take a look at the official AlpineJS read me to learn more about the x-transition directives.
Next, let's add some two-way data-binding with the x-model directive.
AlpineJS x-model
The x-model directive will allow you to bind a variable to a form element such as a textbox. Here is a simple example of this:
<div x-data="{ title: 'AlpineJS is Awesome' }">
<p x-text="title"></p>
<input type="text" x-model="title">
</div>
As you can see, our textbox is bound to the variable title. Whenever you update the value of the variable or the text box's value, they will stay in sync. Take a look at the codepen example below.
Alpine really makes it easy to add some two-way data binding awesomeness.
Next, let's learn how we can add some dynamic HTML using the x-html directive.
AlpineJS x-html
Using the x-html directive, we can add some dynamic HTML inside any element.
Here is a quick example:
<div x-data="{ code: '<p>Dynamic Paragraph</p>' }">
<div x-html="code"></div>
</div>
You can see from the Codepen below that we inject a dynamic paragraph inside of the div element.
In addition to using the x-html directive, which will set the innerHTML of any element, we can also use the x-text directive to set the innerText of any element.
Next, we'll learn how we can easily use the x-ref directive to reference any element inside an Alpine component.
AlpineJS x-ref
The x-ref directive will allow us to reference any element with a specified name. Take the following component as an example:
<div x-data="{ code: '<p>Dynamic Paragraph</p>' }">
<div x-ref="sentence">I am a sentence</div>
<button @click="$refs.sentence.innerText = 'I just changed'">Change Sentence</button>
</div>
As you can see, when we click the button, we reference $refs.sentence, which will return the element with the x-ref="sentence".
Here is a quick codepen example of this component:
AlpineJS x-if
We can show or hide elements based on a conditional by using the x-if directive. Take a look at the following example:
<div x-data="{ socks: 'blue' }">
<template x-if="socks=='blue'">
<p>My socks are blue</p>
</template>
<template x-if="socks=='green'">
<p>My socks are green</p>
</template>
<button @click="socks = 'green'">Change Sox</button>
</div>
Using this directive will show or hide the specified element from the DOM. In the example above, we will display a paragraph if socks == 'blue' or show another paragraph if they are equal to green.
Here is a codepen example of this component below.
Note: remember that the x-if directive must be used inside <template> tags.
AlpineJS x-for
If we want to loop through an array of items inside of our Alpine component we can use the x-for directive. Take a look at the following code example, where we loop over a list of groceries:
<div x-data="{ groceries: ['Milk', 'Eggs', 'Cheese'] }">
<p>Groceries</p>
<ul>
<template x-for="item in groceries">
<li x-text="item"></li>
</template>
</ul>
</div>
As you can see from the codepen below, we are looping through the array of groceries and displaying each item in a list.
Conclusion
AlpineJS is a javascript framework/library that allows you to add interactive elements on your page easily. Be sure to check out the official Repo and Readme to learn all the ins-and-outs of this awesome library.
Pairing Alpine with Laravel Livewire is like putting Peanut Butter on your Jelly Sandwich. It makes creating applications so much better and easier. If you are not familiar with Livewire, click here to check out my introduction to Livewire video.
Happy Coding ✌️
🎁 One last thing. If you are interested in creating some beautiful pages with Alpine and TailwindCSS, be sure to check out Tails, the ultimate Alpine and Tailwind Drag'n Drop page builder 🛠
Still have a question?
Get help or discuss anything development/design related.
Start a discussion
|
{
"url": "https://devdojo.com/tnylea/alpinejs-for-beginners",
"source_domain": "devdojo.com",
"snapshot_id": "crawl=CC-MAIN-2021-04",
"warc_metadata": {
"Content-Length": "203271",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:XMDIVEXIQWOYIFPZAX6B32HKUD6H3RDH",
"WARC-Concurrent-To": "<urn:uuid:ef92d1a4-b25e-4d41-818d-28c99d6f2443>",
"WARC-Date": "2021-01-17T02:45:28Z",
"WARC-IP-Address": "167.71.125.100",
"WARC-Identified-Payload-Type": "text/html",
"WARC-Payload-Digest": "sha1:JJ552PAOAMGG6STN2IROBAIB55QEEO2D",
"WARC-Record-ID": "<urn:uuid:212eabe7-c1b0-454e-80bf-40a00af08e7c>",
"WARC-Target-URI": "https://devdojo.com/tnylea/alpinejs-for-beginners",
"WARC-Truncated": null,
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:13d4a42c-d3c5-497e-bbcd-87871d00a385>"
},
"warc_info": "isPartOf: CC-MAIN-2021-04\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for January 2021\r\noperator: Common Crawl Admin ([email protected])\r\nhostname: ip-10-67-67-23.ec2.internal\r\nsoftware: Apache Nutch 1.17 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.2-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/"
}
|
{
"line_start_idx": [
0,
23,
24,
116,
139,
140,
405,
406,
580,
581,
745,
746,
761,
762,
857,
858,
874,
891,
898,
925,
1000,
1029,
1037,
1044,
1045,
1149,
1157,
1165,
1166,
1227,
1228,
1332,
1333,
1354,
1355,
1479,
1480,
1504,
1505,
1693,
1694,
1735,
1762,
1769,
1770,
2024,
2025,
2095,
2096,
2161,
2162,
2347,
2348,
2361,
2362,
2572,
2573,
2614,
2641,
2706,
2713,
2714,
2847,
2848,
2889,
2916,
2977,
2984,
2985,
3063,
3064,
3178,
3179,
3206,
3207,
3288,
3289,
3317,
3344,
3351,
3352,
3509,
3510,
3538,
3565,
3612,
3619,
3620,
3770,
3771,
3799,
3826,
3873,
3922,
3929,
3930,
4002,
4003,
4073,
4074,
4274,
4275,
4295,
4296,
4490,
4491,
4582,
4704,
4777,
4881,
4994,
5098,
5173,
5258,
5348,
5495,
5630,
5735,
5850,
5993,
5994,
6130,
6131,
6252,
6253,
6394,
6395,
6411,
6412,
6519,
6520,
6668,
6669,
6701,
6738,
6767,
6790,
6806,
6839,
6846,
6847,
6921,
6922,
7048,
7049,
7075,
7076,
7165,
7166,
7322,
7323,
7354,
7400,
7435,
7442,
7443,
7555,
7556,
7688,
7689,
7866,
7867,
8075,
8076,
8146,
8147,
8164,
8165,
8292,
8293,
8341,
8368,
8408,
8415,
8416,
8613,
8614,
8688,
8689,
8768,
8769,
8785,
8786,
8863,
8864,
8889,
8890,
8942,
8972,
8979,
8980,
9077,
9078,
9240,
9241,
9354,
9355,
9370,
9371,
9497,
9498,
9550,
9598,
9688,
9695,
9696,
9824,
9825,
9876,
9877,
9891,
9892,
10011,
10012,
10045,
10081,
10114,
10130,
10167,
10201,
10217,
10274,
10281,
10282,
10480,
10481,
10532,
10533,
10609,
10610,
10625,
10626,
10817,
10818,
10875,
10896,
10905,
10950,
10986,
11006,
11016,
11023,
11024,
11145,
11146,
11157,
11158,
11371,
11372,
11619,
11620,
11636,
11637,
11827,
11828,
11851,
11852,
11909,
11910
],
"line_end_idx": [
23,
24,
116,
139,
140,
405,
406,
580,
581,
745,
746,
761,
762,
857,
858,
874,
891,
898,
925,
1000,
1029,
1037,
1044,
1045,
1149,
1157,
1165,
1166,
1227,
1228,
1332,
1333,
1354,
1355,
1479,
1480,
1504,
1505,
1693,
1694,
1735,
1762,
1769,
1770,
2024,
2025,
2095,
2096,
2161,
2162,
2347,
2348,
2361,
2362,
2572,
2573,
2614,
2641,
2706,
2713,
2714,
2847,
2848,
2889,
2916,
2977,
2984,
2985,
3063,
3064,
3178,
3179,
3206,
3207,
3288,
3289,
3317,
3344,
3351,
3352,
3509,
3510,
3538,
3565,
3612,
3619,
3620,
3770,
3771,
3799,
3826,
3873,
3922,
3929,
3930,
4002,
4003,
4073,
4074,
4274,
4275,
4295,
4296,
4490,
4491,
4582,
4704,
4777,
4881,
4994,
5098,
5173,
5258,
5348,
5495,
5630,
5735,
5850,
5993,
5994,
6130,
6131,
6252,
6253,
6394,
6395,
6411,
6412,
6519,
6520,
6668,
6669,
6701,
6738,
6767,
6790,
6806,
6839,
6846,
6847,
6921,
6922,
7048,
7049,
7075,
7076,
7165,
7166,
7322,
7323,
7354,
7400,
7435,
7442,
7443,
7555,
7556,
7688,
7689,
7866,
7867,
8075,
8076,
8146,
8147,
8164,
8165,
8292,
8293,
8341,
8368,
8408,
8415,
8416,
8613,
8614,
8688,
8689,
8768,
8769,
8785,
8786,
8863,
8864,
8889,
8890,
8942,
8972,
8979,
8980,
9077,
9078,
9240,
9241,
9354,
9355,
9370,
9371,
9497,
9498,
9550,
9598,
9688,
9695,
9696,
9824,
9825,
9876,
9877,
9891,
9892,
10011,
10012,
10045,
10081,
10114,
10130,
10167,
10201,
10217,
10274,
10281,
10282,
10480,
10481,
10532,
10533,
10609,
10610,
10625,
10626,
10817,
10818,
10875,
10896,
10905,
10950,
10986,
11006,
11016,
11023,
11024,
11145,
11146,
11157,
11158,
11371,
11372,
11619,
11620,
11636,
11637,
11827,
11828,
11851,
11852,
11909,
11910,
11928
]
}
|
{
"red_pajama_v2": {
"ccnet_original_length": 11928,
"ccnet_original_nlines": 258,
"rps_doc_curly_bracket": 0.002682759892195463,
"rps_doc_ldnoobw_words": 0,
"rps_doc_lorem_ipsum": 0,
"rps_doc_stop_word_fraction": 0.3845875561237335,
"rps_doc_ut1_blacklist": 0,
"rps_doc_frac_all_caps_words": 0.005426920019090176,
"rps_doc_frac_lines_end_with_ellipsis": 0,
"rps_doc_frac_no_alph_words": 0.256512314081192,
"rps_doc_frac_unique_words": 0.26327192783355713,
"rps_doc_mean_word_length": 4.773564338684082,
"rps_doc_num_sentences": 128,
"rps_doc_symbol_to_word_ratio": 0.0014471800532191992,
"rps_doc_unigram_entropy": 5.343893051147461,
"rps_doc_word_count": 1846,
"rps_doc_frac_chars_dupe_10grams": 0,
"rps_doc_frac_chars_dupe_5grams": 0.119950070977211,
"rps_doc_frac_chars_dupe_6grams": 0.08511120826005936,
"rps_doc_frac_chars_dupe_7grams": 0.05810258910059929,
"rps_doc_frac_chars_dupe_8grams": 0.02201543003320694,
"rps_doc_frac_chars_dupe_9grams": 0.012482980266213417,
"rps_doc_frac_chars_top_2gram": 0.012936900369822979,
"rps_doc_frac_chars_top_3gram": 0.009192010387778282,
"rps_doc_frac_chars_top_4gram": 0.011234680190682411,
"rps_doc_books_importance": -1328.1707763671875,
"rps_doc_books_importance_length_correction": -1328.1707763671875,
"rps_doc_openwebtext_importance": -709.2692260742188,
"rps_doc_openwebtext_importance_length_correction": -709.2692260742188,
"rps_doc_wikipedia_importance": -521.2159423828125,
"rps_doc_wikipedia_importance_length_correction": -521.2159423828125
},
"fasttext": {
"dclm": 0.526595413684845,
"english": 0.8137813806533813,
"fineweb_edu_approx": 2.4038267135620117,
"eai_general_math": 0.6769957542419434,
"eai_open_web_math": 0.2537354826927185,
"eai_web_code": 0.9111253619194031
}
}
|
{
"free_decimal_correspondence": {
"primary": {
"code": "005.133",
"labels": {
"level_1": "General works, books and libraries, information sciences",
"level_2": "",
"level_3": "Computer programming"
}
},
"secondary": {
"code": "005.1",
"labels": {
"level_1": "General works, books and libraries, information sciences",
"level_2": "",
"level_3": "Computer programming"
}
}
},
"bloom_cognitive_process": {
"primary": {
"code": "3",
"label": "Apply"
},
"secondary": {
"code": "2",
"label": "Understand"
}
},
"bloom_knowledge_domain": {
"primary": {
"code": "3",
"label": "Procedural"
},
"secondary": {
"code": "2",
"label": "Conceptual"
}
},
"document_type_v1": {
"primary": {
"code": "3",
"label": "Reference/Encyclopedic/Educational"
},
"secondary": {
"code": "4",
"label": "Code/Software"
}
},
"extraction_artifacts": {
"primary": {
"code": "0",
"label": "No Artifacts"
},
"secondary": {
"code": "3",
"label": "Irrelevant Content"
}
},
"missing_content": {
"primary": {
"code": "0",
"label": "No missing content"
},
"secondary": {
"code": "2",
"label": "Click Here References"
}
},
"document_type_v2": {
"primary": {
"code": "23",
"label": "Tutorial"
},
"secondary": {
"code": "8",
"label": "Documentation"
}
},
"reasoning_depth": {
"primary": {
"code": "2",
"label": "Basic Reasoning"
},
"secondary": {
"code": "3",
"label": "Intermediate Reasoning"
}
},
"technical_correctness": {
"primary": {
"code": "4",
"label": "Highly Correct"
},
"secondary": {
"code": "3",
"label": "Mostly Correct"
}
},
"education_level": {
"primary": {
"code": "2",
"label": "High School Level"
},
"secondary": {
"code": "1",
"label": "General Audience"
}
}
}
|
672f1e42c33a7f9846924a2431ea77df
|
428,088,456,950,488,500 |
What is 302% of 59?
302 percent of 59 is equal to 178.18
%
302% of 59 equal to 178.18
Calculation steps:
( 302 ÷ 100 ) x 59 = 178.18
Advertisement
Calculate 302 Percent of 59?
• F
Formula
(302 ÷ 100) x 59 = 178.18
• 1
Percent to decimal
302% to decimal is 302 ÷ 100 = 3.02
• 2
Multiply decimal with the other number
3.02 x 59 = 178.18
Example
Advertisement
|
{
"url": "https://calcforme.com/percentage-calculator/what-is-302-percent-of-59",
"source_domain": "calcforme.com",
"snapshot_id": "CC-MAIN-2024-10",
"warc_metadata": {
"Content-Length": "15778",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:MRCAVRAD5CFROCKTQU4ZMWL57SXA4NAQ",
"WARC-Concurrent-To": "<urn:uuid:04609cab-4d19-454a-9d42-eb8c64f28bc4>",
"WARC-Date": "2024-02-28T21:36:35Z",
"WARC-IP-Address": "76.76.21.61",
"WARC-Identified-Payload-Type": "text/html",
"WARC-Payload-Digest": "sha1:3LSWKS6C3NTNZR7WYWPIM5GDA56TUTQL",
"WARC-Record-ID": "<urn:uuid:a71269bf-9bd2-4427-8eb9-58d90e4b20b4>",
"WARC-Target-URI": "https://calcforme.com/percentage-calculator/what-is-302-percent-of-59",
"WARC-Truncated": null,
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:539a24cb-b818-4c9a-ad96-9bab22522be2>"
},
"warc_info": "isPartOf: CC-MAIN-2024-10\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for February/March 2024\r\noperator: Common Crawl Admin ([email protected])\r\nhostname: ip-10-67-67-229\r\nsoftware: Apache Nutch 1.19 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.5-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: https://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/"
}
|
{
"line_start_idx": [
0,
20,
21,
58,
59,
61,
62,
89,
90,
109,
110,
138,
139,
153,
154,
183,
184,
190,
191,
203,
204,
234,
235,
241,
242,
265,
266,
306,
307,
313,
314,
357,
358,
381,
382,
390,
391
],
"line_end_idx": [
20,
21,
58,
59,
61,
62,
89,
90,
109,
110,
138,
139,
153,
154,
183,
184,
190,
191,
203,
204,
234,
235,
241,
242,
265,
266,
306,
307,
313,
314,
357,
358,
381,
382,
390,
391,
404
]
}
|
{
"red_pajama_v2": {
"ccnet_original_length": 404,
"ccnet_original_nlines": 36,
"rps_doc_curly_bracket": 0,
"rps_doc_ldnoobw_words": 0,
"rps_doc_lorem_ipsum": 0,
"rps_doc_stop_word_fraction": 0.1734693944454193,
"rps_doc_ut1_blacklist": 0,
"rps_doc_frac_all_caps_words": 0.010204079560935497,
"rps_doc_frac_lines_end_with_ellipsis": 0,
"rps_doc_frac_no_alph_words": 0.6326530575752258,
"rps_doc_frac_unique_words": 0.4057970941066742,
"rps_doc_mean_word_length": 3.7536232471466064,
"rps_doc_num_sentences": 10,
"rps_doc_symbol_to_word_ratio": 0,
"rps_doc_unigram_entropy": 3.051088809967041,
"rps_doc_word_count": 69,
"rps_doc_frac_chars_dupe_10grams": 0,
"rps_doc_frac_chars_dupe_5grams": 0.11583012342453003,
"rps_doc_frac_chars_dupe_6grams": 0.11583012342453003,
"rps_doc_frac_chars_dupe_7grams": 0,
"rps_doc_frac_chars_dupe_8grams": 0,
"rps_doc_frac_chars_dupe_9grams": 0,
"rps_doc_frac_chars_top_2gram": 0.0617760606110096,
"rps_doc_frac_chars_top_3gram": 0.0810810774564743,
"rps_doc_frac_chars_top_4gram": 0.10810811072587967,
"rps_doc_books_importance": -24.732681274414062,
"rps_doc_books_importance_length_correction": -24.732681274414062,
"rps_doc_openwebtext_importance": -6.957403182983398,
"rps_doc_openwebtext_importance_length_correction": -6.957404136657715,
"rps_doc_wikipedia_importance": -14.341875076293945,
"rps_doc_wikipedia_importance_length_correction": -14.341876029968262
},
"fasttext": {
"dclm": 0.8797959685325623,
"english": 0.7064370512962341,
"fineweb_edu_approx": 3.3055543899536133,
"eai_general_math": 0.7196172475814819,
"eai_open_web_math": 0.8852725625038147,
"eai_web_code": 0.00006294000195339322
}
}
|
{
"free_decimal_correspondence": {
"primary": {
"code": "513.2",
"labels": {
"level_1": "Science and Natural history",
"level_2": "Mathematics",
"level_3": "Geometry"
}
},
"secondary": {
"code": "-1",
"labels": {
"level_1": "",
"level_2": "",
"level_3": ""
}
}
},
"bloom_cognitive_process": {
"primary": {
"code": "3",
"label": "Apply"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"bloom_knowledge_domain": {
"primary": {
"code": "3",
"label": "Procedural"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"document_type_v1": {
"primary": {
"code": "3",
"label": "Reference/Encyclopedic/Educational"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"extraction_artifacts": {
"primary": {
"code": "3",
"label": "Irrelevant Content"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"missing_content": {
"primary": {
"code": "0",
"label": "No missing content"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"document_type_v2": {
"primary": {
"code": "23",
"label": "Tutorial"
},
"secondary": {
"code": "21",
"label": "Customer Support"
}
},
"reasoning_depth": {
"primary": {
"code": "2",
"label": "Basic Reasoning"
},
"secondary": {
"code": "1",
"label": "No Reasoning"
}
},
"technical_correctness": {
"primary": {
"code": "4",
"label": "Highly Correct"
},
"secondary": {
"code": "3",
"label": "Mostly Correct"
}
},
"education_level": {
"primary": {
"code": "1",
"label": "General Audience"
},
"secondary": {
"code": "2",
"label": "High School Level"
}
}
}
|
672f1e42c33a7f9846924a2431ea77df
|
7,757,388,917,374,988,000 |
Pull to refresh
Software renderer — 1: матчасть
Reading time 29 min
Views 80K
Programming *Game development *
Sandbox
Программный рендеринг (software rendering) — это процесс построения изображения без помощи GPU. Этот процесс может идти в одном из двух режимов: в реальном времени (вычисление большого числа кадров в секунду — необходимо для интерактивных приложений, например, игр) и в «оффлайн» режиме (при котором время, которое может быть потрачено на вычисление одного кадра, не ограничено настолько строго — вычисления могут длиться часы или даже дни). Я буду рассматривать только режим рендеринга в реальном времени.
У этого подхода существуют как недостатки так и достоинства. Очевидным недостатком является производительность — CPU не в состоянии конкурировать с современными видеокартами в этой области. К достоинствам стоит причислить независимость от видеокарты — именно поэтому он используется как замена аппаратного рендеринга в случаях, когда видеокарта не поддерживает ту или иную возможность (так называемый software fallback). Существуют и проекты, цель которых — полностью заменить аппаратный рендеринг программным, например, WARP, входящий в состав Direct3D 11.
Но главным плюсом является возможность написания подобного рендерера самостоятельно. Это служит образовательным целям и, на мой взгляд, это — самый лучший способ понять лежащие в основе алгоритмы и принципы.
Это именно то, о чем будет рассказано в серии этих статей. Мы начнем с возможности закрашивать пиксель в окне заданным цветом и построим на этом возможность отрисовки трехмерной сцены в реальном времени, с движущимися текстурированными моделями и освещением, а так же с возможностью перемещаться по этой сцене.
Но для того, чтобы вывести на экран хотя бы первый полигон, необходимо освоить математику, на которой это построено. Первая часть будет посвящена именно ей, поэтому в ней будет много различных матриц и прочей геометрии.
В конце статьи будет ссылка на гитхаб проекта, который можно рассматривать как пример реализации.
Несмотря на то, что статья будет описывать самые основы, читателю все же необходим определенный фундамент для ее понимания. Этот фундамент: основы тригонометрии и геометрии, понимание декартовых систем координат и базовые операции над векторами. Так же, хорошей идеей будет прочтение какой-либо статьи об основах линейной алгебры для разработчиков игр (например, этой), поскольку я буду пропускать описания некоторых операций и останавливаться только на самых, с моей точки зрения, важных. Я постараюсь показать, при помощи чего делается вывод некоторых важных формул, но не буду расписывать их детально — полные доказательства можно сделать самому или найти в соответствующей литературе. По ходу статьи я сначала постараюсь давать алгебраические определения того или иного понятия, а затем уже описывать их геометрическую интерпретацию. Большая часть примеров будет в двухмерном пространстве, поскольку мои навыки рисования трехмерных и, тем более, четырехмерных пространств оставляют желать лучшего. Тем не менее, все примеры легко обобщаются на пространства других размерностей. Все статьи будут в большей степени ориентированы на описание алгоритмов, а не на их реализацию в коде.
Вектора
Вектор — одно из ключевых понятий в трехмерной графике. И хотя линейная алгебра дает ему очень абстрактное определение, в рамках наших задач под n-мерным вектором мы можем понимать просто массив из n действительных чисел: элемент пространства Rn:
Интерпретация этих чисел зависит от контекста. Две самые частые: эти числа задают координаты точки в пространстве или же направленное смещение. Несмотря на то, что их представление одинаково (n действительных чисел), их концепции различаются — точка описывает положение в системе координат, а смещение не имеет положения как такового. В дальнейшем, мы так же можем определять точку с помощью смещения, подразумевая, что смещение происходит от начала координат.
Как правило, в большинстве игровых и графических движков присутствует класс вектора именно как набора чисел. Смысл же этих чисел зависит от контекста, в котором они используются. В этом классе определены методы как для работы с геометрическими векторами (например, вычисление векторного произведения) так и с точками (например, вычисление расстояния между двумя точками).
Во избежание путаницы, в рамках статьи мы не будем больше понимать под словом «вектор» абстрактный набор чисел, а будем так называть смещение.
Скалярное произведение
Единственная операция над векторами, на которой я хочу остановиться подробно (ввиду ее фундаментальности) — это скалярное произведение. Как ясно из названия, результат этого произведения — скаляр, и определяется он по следующей формуле:
У скалярного произведения есть две важные геометрические интерпретации.
1. Измерение угла между векторами.
Рассмотрим следующий треугольник, полученный из трех векторов:
Записав для него теорему косинусов и сократив выражение, придем к записи:
Поскольку длина ненулевого вектора по определению больше 0, то косинус угла определяет знак скалярного произведения и его равенство нулю. Получаем (считая, что угол от 0 до 360 градусов):
2. Скалярное произведение вычисляет длину проекции вектора на вектор.
Из определения косинуса угла получаем:
Мы так же уже знаем из предыдущего пункта, что:
Выразив из второго выражения косинус угла, подставив в первое и домножив на ||w||, получаем результат:
Таким образом, скалярное произведение двух векторов равно длине проекции вектора v на вектор w, умноженное на длину вектора w. Часто встречающийся частный случай этой формулы — w имеет единичную длину и, следовательно, скалярное произведение вычисляет точную длину проекции.
Эта интерпретация очень важна, поскольку она показывает, что скалярное произведение вычисляет координаты точки (заданной вектором v, подразумевая смещение от начала координат) вдоль заданной оси. Самый простой пример:
Мы в дальнейшем воспользуемся этим при построении трансформации в систему координат камеры.
Системы координат
Этот раздел призван подготовить основу для введения матриц. Я, на примере мировой и локальной систем, покажу, по каким причинам используются несколько систем координат, а не одна, и о том, как описать одну систему координат относительно другой.
Представим, что у нас возникла необходимость в отрисовке сцены с двумя моделями, например:
Какие системы координат естественным образом вытекают из такой постановки? Первая — это система координат самой сцены (которая изображена на рисунке). Это система координат, описывающая мир, который мы собираемся рисовать — именно поэтому она и называется «мировой» (на картинках будет обозначена словом «world»). Она «связывает» все объекты сцены вместе. Например, координаты центра объекта A в этой система координат — (1, 1), а координаты центра объекта B(-1, -1).
Таким образом, одна система координат уже есть. Теперь необходимо подумать о том, в каком виде к нам приходят модели, которые мы будем использовать в сцене.
Для простоты будем считать, что модель описывается просто списком точек («вершин») из которых она состоит. Например, модель B состоит из трех точек, которые приходят нам в следующем формате:
v0 = (x0, y0)
v1 = (x1, y1)
v2 = (x2, y2)
На первый взгляд, было бы здорово, если бы они уже были описаны в нужной нам «мировой» системе! Представляете, вы добавляете модель на сцену, а она уже находится там, где нам и нужно. Для модели B это могло бы выглядеть вот так:
v0 = (-1.5, -1.5)
v1 = (-1.0, -0.5)
v2 = (-0.5, -1.5)
Но использовать такой подход не выйдет. На то есть важная причина: это лишает возможности использовать одну и ту же модель заново в разных сценах. Представьте, что вам дали модель B, которая была смоделирована так, что при добавлении ее на сцену она оказывается в нужном нам месте, как в примере выше. Затем, внезапно, требование изменилось — мы хотим ее сдвинуть совсем на другую позицию. Получается, человеку, который создал эту модель, придется двигать ее самостоятельно и затем опять отдавать вам. Конечно, это — полный абсурд. Еще более сильный аргумент это то, что в случае с интерактивными приложениями, модель может двигаться, поворачиваться, анимироваться на сцене — что же, художнику делать модель во всех возможных положениях? Это звучит еще более глупо.
Решение этой проблемы — «локальная» система координат модели. Мы моделируем объект таким образом, чтобы его центр (или то, что можно условно за таковой принять) был расположен в начале координат. Затем мы программно ориентируем (перемещаем, поворачиваем и т.д.) локальную систему координат объекта в нужное нам положение в мировой системе. Возвращаясь к сцене выше, объект A (единичный квадрат, повернутый на 45 градусов по часовой стрелке) может быть смоделирован следующим образом:
Описание модели в этом случае будет выглядеть следующим образом:
v0 = (-0.5, 0.5)
v1 = (0.5, 0.5)
v2 = (0.5, -0.5)
v3 = (-0.5, -0.5)
И, соответственно, положение в сцене двух систем координат — мировой и локальной объекта A:
Это — один из примеров, почему наличие нескольких систем координат упрощает жизнь разработчикам (и художникам!). Есть еще и другая причина — переход к другой системе координат может упростить необходимые вычисления.
Описание одной системы координат относительно другой
Не существует такого понятия как «абсолютные координаты». Описание чего-либо всегда происходит относительно какой-то системы координат. В том числе и описание другой системы координат.
Мы можем построить своеобразную иерархию систем координат в примере выше:
- world space
- local space (object A)
- local space (object B)
В нашем случае эта иерархия очень проста, но в реальных ситуациях она может иметь гораздо более сильное ветвление. Например, у локальной системы координат объекта могут быть дочерние системы отвечающие за положение той или иной части тела.
Каждая дочерняя система координат может быть описана относительно родительской при помощи следующих значений:
• точка начала координат дочерней системы относительно родительской
• координаты базисных векторов дочерней системы относительно родительской
Например, в картинке ниже, начало координат системы x'y' (обозначенное как O') расположено в точке (1, 1), а координаты ее базисных векторов i' и j' равны (0.7, -0.7) и (0.7, 0.7) соответственно (что приблизительно соответствует осям, повернутым на 45 градусов по часовой стрелке).
Нам не нужно описывать мировую систему координат относительно какой-либо другой, потому что мировая система — корень иерархии, нас не волнует где она расположена или как она ориентирована. Поэтому для ее описания мы используем стандартный базис:
Перевод координат точек из одной системы в другую
Координаты точки P в родительской системе координат (обозначим как Pparent) могут быть вычислены при помощи координат этой точки в дочерней системе (обозначим как Pchild) и ориентации этой дочерней системы относительно родительской (описаной с помощью начала координат Ochild и базисных векторов i' и j') следующим образом:
Снова вернемся к примеру сцены выше. Мы сориентировали локальную систему координат объекта A относительно мировой:
Как мы уже знаем, в процессе отрисовки нам необходимо будет перевести координаты вершин объекта из локальной системы координат в мировую. Для этого нам необходимо описание локальной системы координат относительно мировой. Выглядит оно следующим образом: начало координат в точке (1, 1), а координаты базисных векторов равны (0.7, -0.7) и (0.7, 0.7) (способ расчета координат базисных векторов после поворота будет описан позже, пока что нам достаточно результата).
Для примера возьмем первую вершину v = (-0.5, 0.5) и вычислим ее координаты в мировой системе:
В верности результата можно убедиться, посмотрев на изображение выше.
Матрицы
Матрица размерности m x n — соответствующей размерности таблица чисел. Если количество столбцов в матрице равно количеству строк, то матрица называется квадратной. Например, матрица 3 x 3 выглядит следующим образом:
Перемножение матриц
Предположим, что у нас есть две матрицы: M (размерностью a x b) и N (размерностью c x d). Выражение R = M · N определено только в том случае, если количество столбцов в матрице M равно числу строк в матрице N (т.е. b = c). Размерность полученной матрицы будет равна a x d (т.е. количество строк равно кол-ву строк M а число столбцов — числу столбцов в N), а значение, находящееся на позиции ij, вычисляется как скалярное произведение i-й строки M на j-й столбец N:
Если результат умножения двух матриц M · N определен, то это вовсе не значит, что определено и умножение в обратную сторону — N · M (могут не совпадать кол-во строк и столбцов). В общем случае, операция умножения матриц так же не коммутативна: M · N ≠ N · M.
Единичная матрица — это матрица, которая не изменяет домноженную на нее другую матрицу (т.е. M · I = M) — своеобразный аналог единицы для обычных чисел:
Представление векторов в виде матриц
Мы так же можем представить вектор как матрицу. Есть два возможных способа это сделать, которые называют ''вектор-строка'' и ''вектор-столбец''. Как понятно из название, вектор-строка — это вектор, представленный в виде матрицы с одной строкой, а вектор-столбец — вектор, представленный в виде матрицы с одним столбцом.
Вектор-строка:
Вектор-столбец:
Далее мы очень часто будем сталкиваться с операцией умножения матрицы на вектор (для чего — будет обьяснено в следущем разделе), и, забегая вперед, матрицы с которыми мы будем работать будут иметь размерность либо 3 x 3 либо 4 x 4.
Рассмотрим, каким способом мы можем умножить трехмерный вектор на матрицу 3 x 3 (аналогичные рассуждения применяются для других размерностей). Согласно определению, две матрицы могут быть перемножены, если количество столбцов первой матрицы равняется количеству строк второй. Таким образом, поскольку мы можем представить вектор и как матрицу 1 x 3 (вектор-строка) и как матрицу 3 x 1 (вектор-столбец), мы получаем два возможных варианта:
• Умножение вектора на матрицу «слева»:
• Умножение вектора на матрицу «справа»:
Как видно, мы получаем разный результат в каждом из случаев. Это может привести к случайным ошибкам, если API позволяет умножать вектор на матрицу с обоих сторон, поскольку, как мы увидим в дальнейшем, матрица трансформации подразумевает что вектор будет умножен на нее одним из двух способов. Так что, по моему мнению, в API лучше придерживаться только одного из двух вариантов. В рамках этих статей я буду использовать первый вариант — т.е. вектор умножается на матрицу слева. Если вы решили использовать другой порядок, то, для того чтобы получить корректные результаты, вам нужно будет транспонировать все матрицы, которые в дальнейшем встретятся в этой статье, а слово «строка» заменить на «столбец». Это так же влияет на порядок умножения матриц при наличии нескольких трансформаций (подробнее будет рассмотрено далее).
Из результата умножения так же видно, что матрица определенным образом (зависящем от значения ее элементов) изменяет вектор, который был на нее домножен. Это могут быть такие трансформации как поворот, масштабирование и другие.
Еще одно крайне важное свойство операции умножения матриц, которое нам в дальнейшем пригодится — дистрибутивность относительно сложения:
Геометрическая интерпретация
Как мы увидели в предыдущем разделе — матрица определенным образом трансформирует домноженный на нее вектор.
Еще раз вспомним, что любой вектор может быть представлен как линейная комбинация базисных векторов:
Умножим это выражение на матрицу:
Используя дистрибутивность относительно сложения, получим:
Мы уже видели подобное ранее, когда рассматривали, как перевести координаты точки из дочерней системы в родительскую, тогда это выглядело следующим образом (для трехмерного пространства):
Между этими двумя выражениями есть два различия — в первом выражении нет перемещения (Ochild, мы рассмотрим позже этот момент подробнее, когда будем говорить о линейных и афинных трансформациях), а вектора i', j' и k' заменены на iM, jM и kM соответственно. Следовательно, iM, jM и kM — есть базисные вектора дочерней системы координат и мы переводим точку vchild(vx, vy, vy) из этой дочерней системы координат в родительскую (vtransformed = vparentM).
Процесс трансформации можно изобразить следующим образом на примере вращения против часовой стрелки (xy — изначальная, родительская система координат, x'y' — дочерняя, полученная в результате трансформации):
На всякий случай, чтобы убедиться, что нам понятен смысл каждого из векторов, используемых выше, перечислим их заново:
• vparent — вектор, который мы изначально умножали на матрицу M. Его координаты описаны относительно родительской системы координат
• vchild — вектор, координаты которого равны вектору vparent, но они описаны относительно дочерней системы координат. Это вектор vparent трансформированный тем же образом, что и базисные вектора (поскольку мы используем те же координаты)
• vtransformed — тот же самый вектор, что и vchild но с координатами пересчитанными относительно родительской системы координат. Это итоговый результат трансформации вектора vparent
Теперь рассмотрим, что происходит при умножении базисных векторов на матрицу M:
Видно, что базисные вектора новой дочерней системы координат, полученной в результате умножения на матрицу M, совпадают со строками матрицы. Это и есть та самая геометрическая интерпретация, которую мы искали. Теперь, увидев матрицу трансформации, мы будем знать куда смотреть, чтобы понять что она делает — достаточно представить ее строки как базисные вектора новой системы координат. Трансформация, происходящая с системой координат, будет та же что и трансформация, происходящая с вектором, домноженным на эту матрицу.
Мы так же можем комбинировать трансформации, представленные в виде матриц, при помощи умножения их друг на друга:
Таким образом, матрицы представляют собой очень удобный инструмент для описания и комбинирования трансформаций.
Линейные трансформации
Для начала рассмотрим самые часто используемые линейные трансформации. Линейная трансформация — это трансформация, которая удовлетворяет двум свойствам:
Важное следствие — линейная трансформация не может содержать перемещения (это так же является причиной, по которой слагаемое Ochild отсутствовало в предыдущем разделе), поскольку, согласно второй формуле, 0 всегда отображается в 0.
Вращение
Рассмотрим вращение в двумерном пространстве. Это трансформация, которая поварачивает систему координат на заданный угол. Как мы уже знаем, нам достаточно вычислить новые координатные оси (полученные после вращения на заданный угол), и использовать их как строки матрицы трансформации. Результат легко получается из базовой геометрии:
Пример:
Результат для вращения в трехмерном пространстве получается аналогичным образом, с той лишь разницей что мы вращаем плоскость составленную из двух координатных осей, и фиксируем третью (вокруг которой и происходит вращение). Например, матрица вращения вокруг оси x выглядит следующим образом:
Масштабирование
Мы можем изменить масштаб объекта относительно всех осей применив следующую матрицу:
Оси трансформированной системы координат будут направлены так же, как и у изначальной системы координат, но будут требовать в S раз большей длины для одной единицы измерения:
Пример:
Масштабирование с одинаковым коэффициентом относительно всех осей называется равномерным (uniform). Но мы так же можем произвести масштабирование с разными коэффициентами вдоль разных осей (nonuniform):
Сдвиг
Как понятно из названия, эта трансформация производит сдвиг вдоль координатной оси, оставляя остальные оси нетронутыми:
Соответственно, матрица сдвига оси y выглядит следующим образом:
Пример:
Матрица для трехмерного пространства строится аналогичным образом. Например, вариант для сдвига оси x:
Несмотря на то, что эта трансформация используется очень редко, она пригодится нам в будущем, когда мы будем рассматривать афинные трансформации.
В нашем запасе уже есть приличное кол-во трансформаций, которые могут быть представлены как 3 x 3 матрица, но нам не хватает еще одной — перемещения. К несчастью, выразить перемещение в трехмерном пространстве при помощи 3 x 3 матрицы невозможно, поскольку перемещение не является линейной трансформацией. Решением этой проблемы являются однородные координаты, которые мы рассмотрим позже.
Центральная проекция
Наша итоговая цель — изобразить трехмерную сцену на двухмерном экране. Таким образом, мы должны тем или иным способом спроектировать нашу сцену на плоскость. Существует две самые часто используемые типы проекций — ортографическая и центральная (другое название — перспективная).
Когда человеческий глаз смотрит на трехмерную сцену, объекты, находящиеся дальше от него, становятся меньше в итоговом изображении, которое и видит человек — этот эффект называется перспективой. Ортографическая проекция игнорирует перспективу, что является полезным свойством при работе в различных САПР-системах (а так же в 2D играх). Центральная же проекция обладает этим свойством и потому добавляет значительную долю реалистичности. В этой статье мы будем рассматривать только ее.
В отличии от ортографической проекции, линии в перспективной проекции не параллельны друг другу, а пересекаются в точке, называемой центром проекции. Центром проекции выступает «глаз», которым мы смотрим на сцену — виртуальная камера:
Изображение формируется на плоскости, находящейся на заданном расстоянии от виртуальной камеры. Соответственно, чем больше расстояние от камеры, тем больше размер проекции:
Рассмотрим самый простой пример: камера расположена в начале координат, а плоскость проекции находится на расстоянии d от камеры. Нам известны координаты точки, которую мы хотим спроецировать: (x, y, z). Найдем координату xp проекции этой точки на плоскость:
На этой картинке видны два подобных треугольника — CDP и CBA (по трем углам):
Соответственно, отношения между сторонами сохраняются:
Получаем результат для x-координаты:
И, аналогично, для y-координаты:
Позже, нам необходимо будет использовать эту трансформацию для формирования спроецированного изображения. И тут возникает проблема — мы не можем представить деление на z-координату в трехмерном пространстве с помощью матрицы. Решением этой проблемы, так же как и в случае с матрицей перемещения, являются однородные (homogeneous) координаты.
Проективная геометрия и однородные координаты
К текущему моменту мы столкнулись с двумя проблемами:
• Перемещение в трехмерном пространстве не может быть представлено как 3 x 3 матрица
• Перспективная проекция не может быть представлена в виде матрицы
Обе эти проблемы решает использование однородных координат. Однородные координаты — понятие из проективной геометрии. Проективная геометрия изучает проективные пространства, и, чтобы понять геометрическую интерпретацию однородных координат, нужно с ними познакомиться.
Ниже мы будем рассматривать определения для двухмерных проективных пространств, поскольку их легче изобразить. Аналогичные рассуждения применяются и для трехмерных проективных пространств (мы в дальнейшем будем использовать именно их).
Определим луч в пространстве R3 следующим образом: луч — это множество векторов вида kv (k — скаляр, v — ненулевой вектор, элемент пространства R3). Т.е. вектор v задает направление луча:
Теперь мы можем перейти к определению проективного пространства. Проективная плоскость (т.е. проективное пространство с размерностью равной двум) P2, ассоциированная с пространством R3, это множество лучей в R3. Таким образом, «точка» в P2 — это луч в R3.
Соответственно, два вектора в R3 задают один и тот же элемент в P2, если один из них может быть получен домножением второго на какой-либо скаляр (поскольку в этом случае они лежат на одном луче):
К примеру, вектора (1, 1, 1) и (5, 5, 5) представляют один и тот же луч, а значит являются одной и той же «точкой» в проективной плоскости.
Таким образом мы и пришли к однородным координатам. Каждый элемент в проективной плоскости задается лучом из трех координат (x, y, w) (последняя координата называется w вместо z — общепринятое соглашение) — эти координаты называются однородными и определены с точностью до скаляра. Это означает, что мы можем домножать (или делить) на скаляр однородные координаты, и они все равно будут представлять ту же самую «точку» в проективной плоскости.
В дальнейшем мы будем использовать однородные координаты для представления афинных (содержащих перемещение) трансформаций и проецирования. Но до этого нужно решить еще один вопрос: каким образом представить в виде однородных координат уже данные нам вершины модели? Поскольку «дополнение» до однородных координат происходит за счет добавления третьей координаты w, вопрос сводится к тому, какое значение w нам необходимо использовать. Ответ на этот вопрос — любое не равное нулю. Разница в использовании различных значений w заключается в удобстве работы с ними.
И, как будет понятно далее (и что отчасти ясно интуитивно), самым удобным значением w является единица. Преимущества этого выбора следующие:
• Это позволяет в более естественном виде представить перемещение в виде матрицы (будет показано далее)
• После некоторых трансформаций (включая перспективную проекцию) значение w будет произвольным, и нам нужно будет вернуться на выбранную нами изначально плоскость (т.е. вернуть изначально выбранное значение w):
Если эта плоскость — w = 1, нам достаточно будет поделить все координаты на w — в результате, мы получим единицу в w координате
Таким образом, мы выбираем значение w = 1, а значит наши входные данные в однородных координатах теперь будут выглядить следующим образом (разумеется, единица уже добавлена будет нами, а не будет находиться в самом описании модели):
v0 = (x0, y0, 1)
v1 = (x1, y1, 1)
v2 = (x2, y2, 1)
Теперь нужно рассмотреть особый случай при работе с w-координатой. А именно — ее равенство нулю. Выше мы говорили, что мы можем выбрать любое значение w, не равное нулю, для расширения до однородных координат. Мы не может взять w = 0, в частности, потому, что это не позволит перемещать эту точку (поскольку, как мы увидим дальше, перемещение происходит именно за счет значения в w координате). Так же, если у точки координата w — нулевая, мы можем рассматривать ее как точку «в бесконечности», поскольку при попытке вернуться на плоскость w = 1 мы получим деление на ноль:
И, хотя мы не можем использовать нулевое значение для вершин модели, мы можем использовать его для векторов! Это приведет к тому, что вектор не будет подвержен перемещениям при трансформациях — что имеет смысл, ведь вектор не описывает положение. Например, при трансформации нормали мы не можем перемещать ее, иначе получим неверный результат. Мы рассмотрим это подробнее, когда возникнет необходимость в трансформации векторов.
В связи с этим, часто пишут, что при w = 1 мы описываем точку, а при w = 0 — вектор.
Как я уже писал, мы использовали пример двухмерных проективных проективных пространств, но в действительно будем использовать трехмерные проективные пространства, а значит каждая точка будет описываться 4-мя координатами: (x, y, z, w).
Перемещение с использование однородных координат
Теперь у нас есть все необходимые инструменты для описания афинных трансформаций. Афинные трансформации — линейные трансформации с последующим смещением. Они могут быть описаны следующим образом:
Мы так же можем использовать 4 х 4 матрицы для описания афинных трансформаций, используя однородные координаты:
Рассмотрим результат умножения вектора, представленного в виде однородных координат, и умножения на 4 x 4 матрицу:
Как видно, отличие от трансформации, представленной в виде 3 x 3 матрица, состоит в наличии 4-й координаты, а так же новых слагаемых в каждой из координат вида vw · m3i. Используя это, и подразумевая w = 1, мы можем представить перемещение следующим образом:
Тут можно убедиться в правильности выбора w = 1. Для представления смещения dx мы используем слагаемое вида w · dx / w. Соответственно, последняя строка матрицы выглядит как (dx/w, dy/w, dz/w, 1). В случае w = 1 мы можем просто опустить знаменатель.
У этой матрицы так же есть геометрическая интерпретация. Вспомним матрицу сдвига, которую мы рассматривала ранее. Она имеет в точности такой же формат, разница лишь в том, что происходит сдвиг четвертой оси, таким образом сдвигая трехмерное подпространство расположенное в гиперплоскости w = 1 на соответствующие значения.
Описание виртуальной камеры
Виртуальная камера — это «глаз», которым мы смотрим на сцену. Прежде чем двигаться дальше, необходимо понять, каким образом можно описать положение камеры в пространстве, и какие параметры необходимы для формирования итогового изображения.
Параметры камеры задают усеченную пирамиду обзора (view frustum), которая определяет, какая часть сцены попадет в итоговое изображение:
Рассмотрим их по очереди:
• Местоположение и ориентация камеры в пространстве. Положение, очевидно, просто точка. Описать ориентацию можно различными способами. Я буду использовать так называемую «UVN» систему, т.е. ориентация камеры описывается положением связанной с ней системой координат. Обычно, оси в ней называются u, v и n (поэтому и такое название), но я буду использовать right, up и forward — из этих названий проще понять, чему соответствует каждая ось. Мы будем использовать левостороннюю систему координат.
При создании объекта камеры в API можно описывать все три оси — но это очень неудобно для пользователя. Чаще всего, пользователь знает в каком направлении должна смотреть камера, а так же приблизительную ориентацию вектора up (будем называть этот вектор up'). Используя эти два значения мы может построить верную систему координат для камеры по следующему алгоритму:
• Вычисляем вектор right используя вектора forward и up' при помощи векторного произведения:
• Теперь вычисляем корректный up, используя right и forward:
То есть, вектор up' совместно с forward задают плоскость, в которой должен быть расположен настоящий вектор up. Если у вас есть опыт использования OpenGL, то именно по такому алгоритму работает известная функция gluLookAt.
Важно не забыть нормализовать полученные в результате вектора — нам нужна ортонормированная система координат, поскольку ее удобнее использовать в дальнейшем
• z-координаты ближней и дальней плоскостей отсечения (near/far clipping plane) в системе координат камеры
• Углы обзора камеры. Они задают размеры усеченной пирамиды обзора:
Поскольку сцена в дальнейшем будет спроецирована на плоскость проекции, то изображение на этой плоскости в дальнейшем будет отображено на экране компьютера. Поэтому важно, чтобы соотношение сторон у этой плоскости и окна (или его части), в котором будет показано изображение, совпадали. Этого можно добиться, дав пользователю API возможность задавать только один угол обзора, а второй вычислять в соответствии с соотношением сторон окна. Например, зная горизонтальный угол обзора, мы можем вычислить вертикальный следующим образом:
Когда мы обсуждали центральную проекцию, мы видели, что чем дальше находится плоскость проекции от камеры, тем больше размер полученного изображения — мы обозначали расстояние от камеры (считая, что она расположена в начале координат) вдоль оси z до плоскости проекции переменной d. Соответственно, следует решить вопрос, какое значение d нам необходимо выбрать. На самом деле, любое ненулевое. Несмотря на то, что размер изображения увеличивается при увеличении d, пропорционально увеличивается и та часть плоскости проекции, которая пересекается с пирамидой обзора, оставляя одним и тем же масштаб изображения относительно размеров этой части плоскости. В дальнейшем мы будем использовать d = 1 для удобства.
Пример в 2D:
В итоге, для изменения масштаба изображения, нам необходимо менять углы обзора — это изменит размер части плоскости проекции, пересекающейся с пирамидой обзора, оставив размер проекции тем же.
Мы можем двигать и поворачивать камеру, меняя положение и ориентацию ее системы координат. Пример кода:
Скрытый текст
void camera::move_right(float distance)
{
m_position += m_right * distance;
}
void camera::move_left(float const distance)
{
move_right(-distance);
}
void camera::move_up(float const distance)
{
m_position += m_up * distance;
}
void camera::move_down(float const distance)
{
move_up(-distance);
}
void camera::move_forward(float const distance)
{
m_position += m_forward * distance;
}
void camera::move_backward(float const distance)
{
move_forward(-distance);
}
void camera::yaw(float const radians)
{
matrix3x3 const rotation{matrix3x3::rotation_around_y_axis(radians)};
m_forward = m_forward * rotation;
m_right = m_right * rotation;
m_up = m_up * rotation;
}
void camera::pitch(float const radians)
{
matrix3x3 const rotation{matrix3x3::rotation_around_x_axis(radians)};
m_forward = m_forward * rotation;
m_right = m_right * rotation;
m_up = m_up * rotation;
}
Графический конвейер
Теперь у нас есть весь необходимый фундамент, для того чтобы описать по шагам действия, которые необходимы для получения изображения трехмерной сцены на экране компьютера. Для простоты будем считать, что конвейер отрисовывает один объект за раз.
Входящие параметров конвейера:
• Объект и его ориентация в мировой системе координат
• Камера, чьи параметры мы будем использовать при составлении изображения
1. Переход в мировую систему координат
На этой стадии мы трансформируем вершины объекта из локальной системы координат в мировую.
Предположим, что ориентация объекта в мировой системе координат задается следующими параметрами:
• В какой точке в мировой системе координат находится объект: (xworld, yworld, zworld)
• Каким образом объект повернут: (rx, ry, rz)
• Масштаб объекта: (sx, sy, sz)
Назовем матрицы этих трансформаций T, R и S соответственно. Для получения итоговой матрицы, которая будет трансформировать объект в мировую систему координат, нам достаточно перемножить их. Тут важно заметить, что порядок перемножения матриц играет роль — это напрямую следует из того факта, что умножение матриц некоммутативно.
Вспомним, что масштабирование происходит относительно начала координат. Если мы сначала сместим объект на желаемую точку, а потом применим к нему масштаб, мы получим неверный результат — положение объекта снова изменится после масштабирования. Простой пример:
Аналогичное правило применяется и относительно вращения — оно происходит относительно начала координат, а значит положение объекта изменится, если мы сначала произведем перемещение.
Таким образом, корректная последовательность в нашем случае выглядит следующим образом: масштабирование — поворот — смещение:
2. Переход в систему координат камеры
Переход в систему координат камеры, в частности, используется для упрощения дальнейших вычислений. В этой системе координат камера расположена в начале координат, а ее оси — вектора forward, right, up, которые мы рассматривали в предыдущем разделе.
Переход в систему координат камеры состоит из двух шагов:
• Перемещаем мир таким образом, чтобы положение камеры совпадало с началом координат
• Используя вычисленные оси right, up, forward, вычисляем координаты вершин объекта вдоль этих осей (этот шаг можно рассматривать как поворот системы координат камеры таким образом, чтобы она совпадала с мировой системой координат)
Первый шаг легко можно представить в виде матрицы перемещения на (-posx, -posy, -posz), где pos — положение камеры в мировой системе координат:
Для реализации второго пункта мы воспользуемся свойством скалярного произведения, которое мы рассматривали в самом начале — скалярное произведение вычисляет длину проекции вдоль заданной оси. Таким образом, для того чтобы перевести точку A в систему координат камеры (с учетом того, что камера находится в начале координат — мы проделали это в первом пункте), нам достаточно взять ее скалярное произведение с векторами right, up, forward. Обозначим точку в мировой системе координат v, а эту же точку, переведенную в систему координат камеры, v', тогда:
Эту операцию можно представить в виде матрицы:
Комбинируя эти две трансформации, мы получаем матрицу перехода в систему координат камеры:
Схематично, этот процесс можно изобразить следующим образом:
3. Переход в однородное пространство отсечения и нормализация координат
В результате предыдущего пункта, мы получили координаты вершин объекта в системе координат камеры. Следующее, что необходимо сделать, это произвести проекцию этих вершин на плоскость и «отсечь» лишние вершины. Вершина объекта отсекается, если она лежит вне пирамиды обзора (т.е. ее проекция не лежит на той части плоскости, которую охватывает пирамида обзора). Например, вершина v1 на рисунке ниже:
Обе эти задачи частично решает матрица проекции (projection matrix). «Частично» — потому что она не производит саму проекцию, но подготавливает w-координату вершины для этого. Из-за этого название «матрица проекции» звучит не очень подходяще (хотя это довольно распространенный термин), и я буду в дальнейшем называть ее матрицей отсечения (clip matrix), поскольку она так же производит отображение усеченной пирамиды обзора в однородное пространство отсечения (homogeneous clip space).
Но обо всем по порядку. Итак, первое — подготовка к проекции. Для этого мы кладем z-координату вершины в ее w-координату. Сама проекция (т.е. деление на z) будет происходить при дальнейшей нормализации w-координаты — т.е. при возвращении в пространство w = 1.
Следующее, что должна сделать эта матрица — это перевести координаты вершин объекта из пространства камеры в однородное пространство отсечения (homogeneous clip space). Это пространство, координаты не отсеченных вершин в котором таковы, что после применения проекции (т.е. деления на w-координату, поскольку в ней мы сохранили старую z-координату) координаты вершины нормализуются, т.е. удовлетворяют следующим условиям:
Неравенство для z-координаты может различаться для разных API. Например, в OpenGL оно соответствует тому, что выше. В Direct3D же z-координата отображается в интервал [0, 1]. Мы будем использовать принятый в OpenGL интервал, т.е. [-1, 1].
Подобные координаты называются нормализованными координатами устройства (normalized device coordinates или просто NDC).
Поскольку мы получаем NDC-координаты поделив координаты на w, вершины в пространстве отсечения удовлетворяют следующим условиям:
Таким образом, переведя вершины в это пространство, мы можем узнать, нужно ли отсекать вершину, просто проверив ее координаты на неравенства выше. Любая вершина, не удовлетворяющая этим условиям, должна быть отсечена. Само отсечение — тема для отдельной статьи, поскольку ее корректная реализация приводит к созданию новых вершин. Пока что, в качестве быстрого решения, мы не будем рисовать грань, если хотя бы одна из ее вершин отсечена. Конечно, результат получится не сильно аккуратным. Например, для модели машины это выглядит следующим образом:
Итого, данный этап состоит из следующих шагов:
• Получаем вершины в пространстве камеры
• Домножаем на матрицу отсечения — переходим в пространство отсечения
• Помечаем отсеченные вершины, проверяя по неравенствам описанным выше
• Делим координаты каждой вершины на ее w-координату — переходим к нормализованным координатам
Теперь рассмотрим, каким образом мы отображаем координаты из пространства камеры в пространство отсечения. Вспомним, что мы решили использовать плоскость проекции z=1. Для начала нам нужно найти функцию, которая отображает координаты, лежащие на пересечении пирамиды обзора и плоскости проекции в интервал [-1, 1]. Для этого найдем координаты точек, определяющих эту часть плоскости. Эти две точки имеют координаты (left, top) и (right, bottom). Мы будем рассматривать только случай, когда пирамида обзора симметрична относительно направления камеры.
Мы можем их вычислить, используя углы обзора:
Получаем:
Аналогично для top и bottom:
Таким образом, нам нужно отобразить интервал [left, right], [bottom, top], [near, far] в [-1; 1]. Найдем линейную функцию, которая дает такой результат для left и right:
Аналогично получается функция для bottom и top:
Выражение для z находится по-другому. Вместо того, чтобы рассматривать функцию вида az + b мы будем рассматривать функцию a · 1/z + b, потому что в дальнейшем, когда мы будем реализовывать буфер глубины, нам нужно будет линейно интерполировать величину, обратную z-координате. Мы не будем рассматривать этот вопрос сейчас, и просто примем это за данное. Получим:
Таким образом, мы можем записать, что нормализованные координаты получаются следующим образом из координат в пространстве камеры:
Мы не можем сразу применить эти формулы, потому что деление на z произойдет позже, при нормализации w-координаты. Мы можем воспользоваться этим, и вместо этого вычислить следующие значения (домножив на z), которые после деления на w в результате дадут нормализованные координаты:
Именно по этим формулам мы и производим трансформацию в пространство отсечения. Мы можем записать эту трансформацию в матричной форме (дополнительно вспомнив, что в w-координату мы кладем z):
Переход в систему координат экрана
К текущему этапу у нас есть координаты вершин объекта в NDC. Нам нужно перевести их в систему координат экрана. Вспомним, что левый верхний угол плоскости проекции был отображен в (-1, 1), а правый нижний в (1, -1). Для экрана я буду использовать левый верхний угол как начало системы координат, с осями направленным вправо и вниз:
Это отображение (viewport transformation) можно произвести при помощи простых формул:
Или, в матричной форме:
Мы оставим использование zndc до реализации буфера глубины.
В результате у нас есть координаты вершин на экране, которые мы и используем для отрисовки.
Реализация в коде
Ниже приведен пример кода, реализующий конвейер по описанному выше способу и производящий отрисовку в wireframe-режиме (т.е. просто соединяя вершины линиями). В нем так же подразумевается, что объект описан набором вершин и набором индексов вершин (faces), из которых состоят его полигоны:
Скрытый текст
void pipeline::draw_mesh(
std::shared_ptr<mesh const> mesh,
vector3 const& position,
vector3 const& rotation,
camera const& camera,
bitmap_painter& painter) const
{
matrix4x4 const local_to_world_transform{
matrix4x4::rotation_around_x_axis(rotation.x) *
matrix4x4::rotation_around_y_axis(rotation.y) *
matrix4x4::rotation_around_z_axis(rotation.z) *
matrix4x4::translation(position.x, position.y, position.z)};
matrix4x4 const camera_rotation{
camera.get_right().x, camera.get_up().x, camera.get_forward().x, 0.0f,
camera.get_right().y, camera.get_up().y, camera.get_forward().y, 0.0f,
camera.get_right().z, camera.get_up().z, camera.get_forward().z, 0.0f,
0.0f, 0.0f, 0.0f, 1.0f};
matrix4x4 const camera_translation{
1.0f, 0.0f, 0.0f, 0.0f,
0.0f, 1.0f, 0.0f, 0.0f,
0.0f, 0.0f, 1.0f, 0.0f,
-camera.get_position().x, -camera.get_position().y, -camera.get_position().z, 1.0f};
matrix4x4 const world_to_camera_transform{camera_translation * camera_rotation};
float const projection_plane_z{1.0f};
float const near{camera.get_near_plane_z()};
float const far{camera.get_far_plane_z()};
float const right{std::tan(camera.get_horizontal_fov() / 2.0f) * projection_plane_z};
float const left{-right};
float const top{std::tan(camera.get_vertical_fov() / 2.0f) * projection_plane_z};
float const bottom{-top};
matrix4x4 const camera_to_clip_transform{
2.0f * projection_plane_z / (right - left), 0.0f, 0.0f, 0.0f,
0.0f, 2.0f * projection_plane_z / (top - bottom), 0.0f, 0.0f,
(left + right) / (left - right), (bottom + top) / (bottom - top), (far + near) / (far - near), 1.0f,
0.0f, 0.0f, -2.0f * near * far / (far - near), 0.0f};
matrix4x4 const local_to_clip_transform{
local_to_world_transform * world_to_camera_transform * camera_to_clip_transform};
std::vector<vector4> transformed_vertices;
for (vector3 const& v : mesh->get_vertices())
{
vector4 v_transformed{vector4{v.x, v.y, v.z, 1.0f} * local_to_clip_transform};
if ((v_transformed.x > v_transformed.w) || (v_transformed.x < -v_transformed.w))
{
mark_vector4_as_clipped(v_transformed);
}
else if ((v_transformed.y > v_transformed.w) || (v_transformed.y < -v_transformed.w))
{
mark_vector4_as_clipped(v_transformed);
}
else if ((v_transformed.z > v_transformed.w) || (v_transformed.z < -v_transformed.w))
{
mark_vector4_as_clipped(v_transformed);
}
transformed_vertices.push_back(v_transformed);
}
float const width{static_cast<float>(painter.get_bitmap_width())};
float const height{static_cast<float>(painter.get_bitmap_height())};
matrix4x4 const ndc_to_screen{
width / 2.0f, 0.0f, 0.0f, 0.0f,
0.0f, -height / 2.0f, 0.0f, 0.0f,
0.0f, 0.0f, 1.0f, 0.0f,
width / 2.0f, height / 2.0f, 0.0f, 1.0f};
for (vector4& v : transformed_vertices)
{
if (is_vector4_marked_as_clipped(v))
{
continue;
}
float const w_reciprocal{1.0f / v.w};
v.x *= w_reciprocal;
v.y *= w_reciprocal;
v.z *= w_reciprocal;
v.w = 1.0f;
v = v * ndc_to_screen;
}
for (face const& f : mesh->get_faces())
{
vector4 const& v1{transformed_vertices[f.index1]};
vector4 const& v2{transformed_vertices[f.index2]};
vector4 const& v3{transformed_vertices[f.index3]};
bool const v1_clipped{is_vector4_marked_as_clipped(v1)};
bool const v2_clipped{is_vector4_marked_as_clipped(v2)};
bool const v3_clipped{is_vector4_marked_as_clipped(v3)};
if (!v1_clipped && !v2_clipped)
{
painter.draw_line(
point2d{static_cast<unsigned int>(v1.x), static_cast<unsigned int>(v1.y)},
point2d{static_cast<unsigned int>(v2.x), static_cast<unsigned int>(v2.y)},
color{255, 255, 255});
}
if (!v3_clipped && !v2_clipped)
{
painter.draw_line(
point2d{static_cast<unsigned int>(v2.x), static_cast<unsigned int>(v2.y)},
point2d{static_cast<unsigned int>(v3.x), static_cast<unsigned int>(v3.y)},
color{255, 255, 255});
}
if (!v1_clipped && !v3_clipped)
{
painter.draw_line(
point2d{static_cast<unsigned int>(v3.x), static_cast<unsigned int>(v3.y)},
point2d{static_cast<unsigned int>(v1.x), static_cast<unsigned int>(v1.y)},
color{255, 255, 255});
}
}
}
Пример использования SDL2 для реализации
В этом разделе я вкратце расскажу, как можно использовать SDL2 для реализации отрисовки.
Инициализация, создание текстуры
Первое — это, естественно, инициализация библиотеки и создание окна. Если от SDL нужна только графика, то можно инициализировать с флагом SDL_INIT_VIDEO:
Скрытый текст
if (SDL_Init(SDL_INIT_VIDEO) < 0)
{
throw std::runtime_error(SDL_GetError());
}
m_window = SDL_CreateWindow(
"lantern",
SDL_WINDOWPOS_UNDEFINED, SDL_WINDOWPOS_UNDEFINED,
width, height,
SDL_WINDOW_SHOWN);
if (m_window == nullptr)
{
throw std::runtime_error(SDL_GetError());
}
m_renderer = SDL_CreateRenderer(m_window, -1, SDL_RENDERER_ACCELERATED);
if (m_renderer == nullptr)
{
throw std::runtime_error(SDL_GetError());
}
Затем, создаем текстуру, в которую будем производить отрисовку. Я буду использовать формат ARGB8888, который означает, что на каждый пиксель в текстуре будет выделяться 4 байта — три байта на RGB каналы, и один на альфа-канал.
Скрытый текст
m_target_texture = SDL_CreateTexture(
m_renderer,
SDL_PIXELFORMAT_ARGB8888,
SDL_TEXTUREACCESS_STREAMING,
width, height);
if (m_target_texture == nullptr)
{
throw std::runtime_error(SDL_GetError());
}
Нужно не забыть произвести «очистку» SDL и всех взятых у него переменных при выходе приложения:
Скрытый текст
if (m_target_texture != nullptr)
{
SDL_DestroyTexture(m_target_texture);
m_target_texture = nullptr;
}
if (m_renderer != nullptr)
{
SDL_DestroyRenderer(m_renderer);
m_renderer = nullptr;
}
if (m_window != nullptr)
{
SDL_DestroyWindow(m_window);
m_window = nullptr;
}
SDL_Quit();
Отрисовка, отображение на экране
Мы можем использовать SDL_UpdateTexture для обновления текстуры, которую мы затем отобразим на экране. Эта функция принимает, помимо прочих, следующие параметры:
• Данные — массив байт, который представляет собой массив пикселей с соответствующими значениями
• Количество байт в одной строке изображения (pitch) — вычисляется как кол-во пикселей, умноженное на 4 (потому что формат — ARGB8888)
Логично выделить функционал рисования в текстуру, представленную массивом байт, в отдельный класс. Он будет выделять память под массив, очищать текстуру, рисовать пиксели и линии. Рисование пикселя может быть сделано следующим образом (порядок байт различается в зависимости от SDL_BYTEORDER):
Скрытый текст
void bitmap_painter::draw_pixel(point2d const& point, color const& c)
{
unsigned int const pixel_first_byte_index{m_pitch * point.y + point.x * 4};
#if SDL_BYTEORDER == SDL_BIG_ENDIAN
m_data[pixel_first_byte_index + 0] = c.b;
m_data[pixel_first_byte_index + 1] = c.g;
m_data[pixel_first_byte_index + 2] = c.r;
// m_data[pixel_first_byte_index + 3] is alpha, we don't use it for now
#else
// m_data[pixel_first_byte_index + 0] is alpha, we don't use it for now
m_data[pixel_first_byte_index + 1] = c.r;
m_data[pixel_first_byte_index + 2] = c.g;
m_data[pixel_first_byte_index + 3] = c.b;
#endif
}
Рисование линий можно реализовать, например, по алгоритму Брезенхэма.
После использования SDL_UpdateTexture, необходимо скопировать текстуру в SDL_Renderer и отобразить на экране с помощью SDL_RenderPresent. Все вместе:
Скрытый текст
SDL_UpdateTexture(m_target_texture, nullptr, m_painter.get_data(), m_painter.get_pitch());
SDL_RenderCopy(m_renderer, m_target_texture, nullptr, nullptr);
SDL_RenderPresent(m_renderer);
На этом все. Ссылка на проект: https://github.com/loreglean/lantern.
Tags:
Hubs:
Total votes 95: ↑90 and ↓5 +85
Comments 51
Comments Comments 51
Posts
|
{
"url": "https://habr.com/en/post/243011/",
"source_domain": "habr.com",
"snapshot_id": "CC-MAIN-2023-14",
"warc_metadata": {
"Content-Length": "336243",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:EG3HGPKNMF7GYDMBAOPGTEK54NCMOAXQ",
"WARC-Concurrent-To": "<urn:uuid:b6ea3a89-e066-42b4-9d1a-6b91ee7e994e>",
"WARC-Date": "2023-04-02T08:55:06Z",
"WARC-IP-Address": "178.248.237.68",
"WARC-Identified-Payload-Type": "text/html",
"WARC-Payload-Digest": "sha1:6KPWSSVFM5RAPABZIBRMCTHHJZDLF3CK",
"WARC-Record-ID": "<urn:uuid:40cafbe0-b57b-4c2b-9c2a-029943275ca9>",
"WARC-Target-URI": "https://habr.com/en/post/243011/",
"WARC-Truncated": null,
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:df376be6-006e-43d2-a680-aefd7572b4c6>"
},
"warc_info": "isPartOf: CC-MAIN-2023-14\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for March/April 2023\r\noperator: Common Crawl Admin ([email protected])\r\nhostname: ip-10-67-67-84\r\nsoftware: Apache Nutch 1.19 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.4-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: https://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/"
}
|
{
"line_start_idx": [
0,
16,
17,
49,
50,
70,
80,
112,
120,
627,
628,
1186,
1187,
1395,
1396,
1707,
1708,
1928,
1929,
2027,
2028,
3213,
3214,
3222,
3223,
3224,
3471,
3472,
3473,
3474,
3935,
3936,
4308,
4309,
4452,
4453,
4476,
4477,
4714,
4715,
4716,
4717,
4789,
4790,
4827,
4894,
4895,
4896,
4897,
4975,
4976,
4977,
4978,
5170,
5171,
5172,
5173,
5245,
5246,
5247,
5248,
5291,
5292,
5293,
5294,
5346,
5347,
5348,
5349,
5456,
5457,
5458,
5459,
5738,
5739,
5961,
5962,
5963,
5964,
6060,
6061,
6062,
6080,
6081,
6082,
6327,
6328,
6419,
6420,
6421,
6422,
6890,
6891,
7048,
7049,
7240,
7241,
7255,
7269,
7283,
7284,
7513,
7514,
7532,
7550,
7568,
7569,
8335,
8336,
8820,
8821,
8822,
8823,
8888,
8889,
8906,
8922,
8939,
8957,
8958,
9050,
9051,
9052,
9053,
9269,
9270,
9323,
9324,
9509,
9510,
9584,
9585,
9599,
9627,
9655,
9656,
9896,
9897,
10007,
10077,
10153,
10154,
10436,
10437,
10438,
10439,
10685,
10686,
10687,
10688,
10738,
10739,
11063,
11064,
11065,
11066,
11181,
11182,
11183,
11184,
11649,
11650,
11745,
11746,
11747,
11748,
11818,
11819,
11827,
11828,
11829,
12045,
12046,
12047,
12048,
12068,
12069,
12534,
12535,
12536,
12537,
12796,
12797,
12950,
12951,
12952,
12953,
12990,
12991,
13311,
13312,
13327,
13328,
13329,
13330,
13346,
13347,
13348,
13349,
13581,
13582,
14021,
14022,
14064,
14065,
14066,
14067,
14110,
14111,
14112,
14938,
14939,
15167,
15168,
15305,
15306,
15307,
15308,
15337,
15338,
15447,
15448,
15549,
15550,
15551,
15552,
15553,
15554,
15588,
15589,
15590,
15591,
15650,
15651,
15652,
15653,
15841,
15842,
15843,
15844,
16297,
16298,
16506,
16507,
16508,
16509,
16628,
16762,
17002,
17186,
17187,
17267,
17268,
17269,
17270,
17271,
17272,
17795,
17796,
17910,
17911,
17912,
17913,
18025,
18026,
18049,
18050,
18051,
18204,
18205,
18206,
18207,
18439,
18440,
18449,
18450,
18785,
18786,
18787,
18788,
18789,
18790,
18798,
18799,
18800,
18801,
19094,
19095,
19096,
19097,
19113,
19114,
19199,
19200,
19201,
19202,
19377,
19378,
19379,
19380,
19388,
19389,
19390,
19593,
19594,
19595,
19596,
19602,
19603,
19723,
19724,
19725,
19726,
19791,
19792,
19793,
19794,
19802,
19803,
19804,
19805,
19908,
19909,
19910,
19911,
20057,
20058,
20448,
20449,
20470,
20471,
20472,
20751,
20752,
21237,
21238,
21473,
21474,
21475,
21476,
21649,
21650,
21651,
21652,
21911,
21912,
21913,
21914,
21992,
21993,
21994,
21995,
22050,
22051,
22052,
22053,
22090,
22091,
22092,
22093,
22126,
22127,
22128,
22129,
22471,
22472,
22518,
22519,
22520,
22574,
22661,
22730,
22731,
23000,
23001,
23237,
23238,
23426,
23427,
23428,
23429,
23685,
23686,
23882,
23883,
23884,
23885,
24025,
24026,
24471,
24472,
25035,
25036,
25037,
25038,
25179,
25285,
25498,
25499,
25500,
25501,
25633,
25634,
25867,
25868,
25885,
25902,
25919,
25920,
26494,
26495,
26496,
26497,
26926,
26927,
27012,
27013,
27249,
27250,
27299,
27300,
27496,
27497,
27498,
27499,
27611,
27612,
27613,
27614,
27729,
27730,
27731,
27732,
27733,
27734,
27993,
27994,
27995,
27996,
28246,
28247,
28570,
28571,
28599,
28600,
28601,
28841,
28842,
28978,
28979,
28980,
28981,
29007,
29008,
29505,
29506,
29507,
29508,
29879,
29880,
29977,
30042,
30043,
30270,
30271,
30433,
30434,
30543,
30544,
30614,
30615,
30616,
30617,
31153,
31154,
31155,
31156,
31871,
31872,
31889,
31890,
31891,
31892,
32089,
32090,
32091,
32195,
32209,
32249,
32251,
32286,
32288,
32289,
32334,
32336,
32360,
32362,
32363,
32406,
32408,
32440,
32442,
32443,
32488,
32490,
32511,
32513,
32514,
32562,
32564,
32601,
32603,
32604,
32653,
32655,
32681,
32683,
32684,
32722,
32724,
32795,
32830,
32861,
32886,
32888,
32889,
32929,
32931,
33002,
33037,
33068,
33093,
33095,
33096,
33097,
33118,
33119,
33120,
33366,
33367,
33398,
33454,
33530,
33531,
33570,
33571,
33662,
33663,
33760,
33849,
33897,
33931,
33932,
34261,
34262,
34522,
34523,
34524,
34525,
34707,
34708,
34834,
34835,
34836,
34837,
34875,
34876,
35125,
35126,
35184,
35271,
35505,
35506,
35650,
35651,
35652,
35653,
36207,
36208,
36209,
36210,
36257,
36258,
36259,
36260,
36351,
36352,
36353,
36354,
36415,
36416,
36417,
36418,
36490,
36491,
36890,
36891,
36892,
36893,
37380,
37381,
37641,
37642,
38063,
38064,
38065,
38066,
38305,
38425,
38426,
38555,
38556,
38557,
38558,
39108,
39109,
39110,
39111,
39158,
39201,
39273,
39346,
39443,
39444,
39995,
39996,
39997,
39998,
40044,
40045,
40046,
40047,
40057,
40058,
40059,
40060,
40089,
40090,
40091,
40092,
40262,
40263,
40264,
40265,
40313,
40314,
40315,
40316,
40679,
40680,
40681,
40682,
40812,
40813,
40814,
40815,
41095,
41096,
41097,
41098,
41290,
41291,
41292,
41293,
41328,
41329,
41661,
41662,
41663,
41664,
41750,
41751,
41752,
41753,
41777,
41778,
41779,
41780,
41840,
41841,
41933,
41934,
41952,
41953,
42243,
42257,
42283,
42318,
42344,
42370,
42393,
42425,
42427,
42470,
42520,
42570,
42620,
42683,
42684,
42718,
42791,
42864,
42937,
42964,
43001,
43027,
43053,
43079,
43166,
43248,
43249,
43291,
43337,
43381,
43468,
43495,
43578,
43605,
43648,
43712,
43776,
43879,
43935,
43936,
43978,
44062,
44063,
44107,
44154,
44157,
44238,
44239,
44322,
44326,
44369,
44373,
44461,
44465,
44508,
44512,
44600,
44604,
44647,
44651,
44652,
44701,
44704,
44705,
44776,
44849,
44884,
44928,
44974,
45010,
45064,
45065,
45106,
45109,
45148,
45152,
45165,
45169,
45170,
45210,
45211,
45234,
45257,
45280,
45294,
45295,
45326,
45329,
45330,
45371,
45374,
45427,
45480,
45533,
45534,
45593,
45652,
45711,
45712,
45746,
45750,
45772,
45851,
45930,
45957,
45961,
45962,
45996,
46000,
46022,
46101,
46180,
46207,
46211,
46212,
46246,
46250,
46272,
46351,
46430,
46457,
46461,
46464,
46466,
46467,
46468,
46509,
46510,
46511,
46600,
46601,
46634,
46635,
46789,
46803,
46837,
46839,
46882,
46884,
46885,
46914,
46926,
46977,
46993,
47013,
47038,
47040,
47083,
47085,
47086,
47159,
47186,
47188,
47231,
47233,
47234,
47235,
47462,
47476,
47514,
47527,
47554,
47584,
47601,
47634,
47636,
47679,
47681,
47682,
47683,
47779,
47793,
47826,
47828,
47867,
47896,
47898,
47899,
47926,
47928,
47962,
47985,
47987,
47988,
48013,
48015,
48045,
48066,
48068,
48069,
48081,
48082,
48083,
48116,
48117,
48279,
48378,
48515,
48516,
48810,
48824,
48894,
48896,
48973,
48974,
49010,
49053,
49096,
49139,
49212,
49218,
49291,
49334,
49377,
49420,
49427,
49429,
49430,
49431,
49501,
49502,
49652,
49666,
49757,
49821,
49852,
49853,
49854,
49923,
49929,
49935,
49966,
49978,
49999,
50000
],
"line_end_idx": [
16,
17,
49,
50,
70,
80,
112,
120,
627,
628,
1186,
1187,
1395,
1396,
1707,
1708,
1928,
1929,
2027,
2028,
3213,
3214,
3222,
3223,
3224,
3471,
3472,
3473,
3474,
3935,
3936,
4308,
4309,
4452,
4453,
4476,
4477,
4714,
4715,
4716,
4717,
4789,
4790,
4827,
4894,
4895,
4896,
4897,
4975,
4976,
4977,
4978,
5170,
5171,
5172,
5173,
5245,
5246,
5247,
5248,
5291,
5292,
5293,
5294,
5346,
5347,
5348,
5349,
5456,
5457,
5458,
5459,
5738,
5739,
5961,
5962,
5963,
5964,
6060,
6061,
6062,
6080,
6081,
6082,
6327,
6328,
6419,
6420,
6421,
6422,
6890,
6891,
7048,
7049,
7240,
7241,
7255,
7269,
7283,
7284,
7513,
7514,
7532,
7550,
7568,
7569,
8335,
8336,
8820,
8821,
8822,
8823,
8888,
8889,
8906,
8922,
8939,
8957,
8958,
9050,
9051,
9052,
9053,
9269,
9270,
9323,
9324,
9509,
9510,
9584,
9585,
9599,
9627,
9655,
9656,
9896,
9897,
10007,
10077,
10153,
10154,
10436,
10437,
10438,
10439,
10685,
10686,
10687,
10688,
10738,
10739,
11063,
11064,
11065,
11066,
11181,
11182,
11183,
11184,
11649,
11650,
11745,
11746,
11747,
11748,
11818,
11819,
11827,
11828,
11829,
12045,
12046,
12047,
12048,
12068,
12069,
12534,
12535,
12536,
12537,
12796,
12797,
12950,
12951,
12952,
12953,
12990,
12991,
13311,
13312,
13327,
13328,
13329,
13330,
13346,
13347,
13348,
13349,
13581,
13582,
14021,
14022,
14064,
14065,
14066,
14067,
14110,
14111,
14112,
14938,
14939,
15167,
15168,
15305,
15306,
15307,
15308,
15337,
15338,
15447,
15448,
15549,
15550,
15551,
15552,
15553,
15554,
15588,
15589,
15590,
15591,
15650,
15651,
15652,
15653,
15841,
15842,
15843,
15844,
16297,
16298,
16506,
16507,
16508,
16509,
16628,
16762,
17002,
17186,
17187,
17267,
17268,
17269,
17270,
17271,
17272,
17795,
17796,
17910,
17911,
17912,
17913,
18025,
18026,
18049,
18050,
18051,
18204,
18205,
18206,
18207,
18439,
18440,
18449,
18450,
18785,
18786,
18787,
18788,
18789,
18790,
18798,
18799,
18800,
18801,
19094,
19095,
19096,
19097,
19113,
19114,
19199,
19200,
19201,
19202,
19377,
19378,
19379,
19380,
19388,
19389,
19390,
19593,
19594,
19595,
19596,
19602,
19603,
19723,
19724,
19725,
19726,
19791,
19792,
19793,
19794,
19802,
19803,
19804,
19805,
19908,
19909,
19910,
19911,
20057,
20058,
20448,
20449,
20470,
20471,
20472,
20751,
20752,
21237,
21238,
21473,
21474,
21475,
21476,
21649,
21650,
21651,
21652,
21911,
21912,
21913,
21914,
21992,
21993,
21994,
21995,
22050,
22051,
22052,
22053,
22090,
22091,
22092,
22093,
22126,
22127,
22128,
22129,
22471,
22472,
22518,
22519,
22520,
22574,
22661,
22730,
22731,
23000,
23001,
23237,
23238,
23426,
23427,
23428,
23429,
23685,
23686,
23882,
23883,
23884,
23885,
24025,
24026,
24471,
24472,
25035,
25036,
25037,
25038,
25179,
25285,
25498,
25499,
25500,
25501,
25633,
25634,
25867,
25868,
25885,
25902,
25919,
25920,
26494,
26495,
26496,
26497,
26926,
26927,
27012,
27013,
27249,
27250,
27299,
27300,
27496,
27497,
27498,
27499,
27611,
27612,
27613,
27614,
27729,
27730,
27731,
27732,
27733,
27734,
27993,
27994,
27995,
27996,
28246,
28247,
28570,
28571,
28599,
28600,
28601,
28841,
28842,
28978,
28979,
28980,
28981,
29007,
29008,
29505,
29506,
29507,
29508,
29879,
29880,
29977,
30042,
30043,
30270,
30271,
30433,
30434,
30543,
30544,
30614,
30615,
30616,
30617,
31153,
31154,
31155,
31156,
31871,
31872,
31889,
31890,
31891,
31892,
32089,
32090,
32091,
32195,
32209,
32249,
32251,
32286,
32288,
32289,
32334,
32336,
32360,
32362,
32363,
32406,
32408,
32440,
32442,
32443,
32488,
32490,
32511,
32513,
32514,
32562,
32564,
32601,
32603,
32604,
32653,
32655,
32681,
32683,
32684,
32722,
32724,
32795,
32830,
32861,
32886,
32888,
32889,
32929,
32931,
33002,
33037,
33068,
33093,
33095,
33096,
33097,
33118,
33119,
33120,
33366,
33367,
33398,
33454,
33530,
33531,
33570,
33571,
33662,
33663,
33760,
33849,
33897,
33931,
33932,
34261,
34262,
34522,
34523,
34524,
34525,
34707,
34708,
34834,
34835,
34836,
34837,
34875,
34876,
35125,
35126,
35184,
35271,
35505,
35506,
35650,
35651,
35652,
35653,
36207,
36208,
36209,
36210,
36257,
36258,
36259,
36260,
36351,
36352,
36353,
36354,
36415,
36416,
36417,
36418,
36490,
36491,
36890,
36891,
36892,
36893,
37380,
37381,
37641,
37642,
38063,
38064,
38065,
38066,
38305,
38425,
38426,
38555,
38556,
38557,
38558,
39108,
39109,
39110,
39111,
39158,
39201,
39273,
39346,
39443,
39444,
39995,
39996,
39997,
39998,
40044,
40045,
40046,
40047,
40057,
40058,
40059,
40060,
40089,
40090,
40091,
40092,
40262,
40263,
40264,
40265,
40313,
40314,
40315,
40316,
40679,
40680,
40681,
40682,
40812,
40813,
40814,
40815,
41095,
41096,
41097,
41098,
41290,
41291,
41292,
41293,
41328,
41329,
41661,
41662,
41663,
41664,
41750,
41751,
41752,
41753,
41777,
41778,
41779,
41780,
41840,
41841,
41933,
41934,
41952,
41953,
42243,
42257,
42283,
42318,
42344,
42370,
42393,
42425,
42427,
42470,
42520,
42570,
42620,
42683,
42684,
42718,
42791,
42864,
42937,
42964,
43001,
43027,
43053,
43079,
43166,
43248,
43249,
43291,
43337,
43381,
43468,
43495,
43578,
43605,
43648,
43712,
43776,
43879,
43935,
43936,
43978,
44062,
44063,
44107,
44154,
44157,
44238,
44239,
44322,
44326,
44369,
44373,
44461,
44465,
44508,
44512,
44600,
44604,
44647,
44651,
44652,
44701,
44704,
44705,
44776,
44849,
44884,
44928,
44974,
45010,
45064,
45065,
45106,
45109,
45148,
45152,
45165,
45169,
45170,
45210,
45211,
45234,
45257,
45280,
45294,
45295,
45326,
45329,
45330,
45371,
45374,
45427,
45480,
45533,
45534,
45593,
45652,
45711,
45712,
45746,
45750,
45772,
45851,
45930,
45957,
45961,
45962,
45996,
46000,
46022,
46101,
46180,
46207,
46211,
46212,
46246,
46250,
46272,
46351,
46430,
46457,
46461,
46464,
46466,
46467,
46468,
46509,
46510,
46511,
46600,
46601,
46634,
46635,
46789,
46803,
46837,
46839,
46882,
46884,
46885,
46914,
46926,
46977,
46993,
47013,
47038,
47040,
47083,
47085,
47086,
47159,
47186,
47188,
47231,
47233,
47234,
47235,
47462,
47476,
47514,
47527,
47554,
47584,
47601,
47634,
47636,
47679,
47681,
47682,
47683,
47779,
47793,
47826,
47828,
47867,
47896,
47898,
47899,
47926,
47928,
47962,
47985,
47987,
47988,
48013,
48015,
48045,
48066,
48068,
48069,
48081,
48082,
48083,
48116,
48117,
48279,
48378,
48515,
48516,
48810,
48824,
48894,
48896,
48973,
48974,
49010,
49053,
49096,
49139,
49212,
49218,
49291,
49334,
49377,
49420,
49427,
49429,
49430,
49431,
49501,
49502,
49652,
49666,
49757,
49821,
49852,
49853,
49854,
49923,
49929,
49935,
49966,
49978,
49999,
50000,
50005
]
}
|
{
"red_pajama_v2": {
"ccnet_original_length": 50005,
"ccnet_original_nlines": 918,
"rps_doc_curly_bracket": 0.0025597400963306427,
"rps_doc_ldnoobw_words": 0,
"rps_doc_lorem_ipsum": 0,
"rps_doc_stop_word_fraction": 0.03239813074469566,
"rps_doc_ut1_blacklist": 0,
"rps_doc_frac_all_caps_words": 0.014584730379283428,
"rps_doc_frac_lines_end_with_ellipsis": 0,
"rps_doc_frac_no_alph_words": 0.8787575364112854,
"rps_doc_frac_unique_words": 0.30934807658195496,
"rps_doc_mean_word_length": 6.163745403289795,
"rps_doc_num_sentences": 471,
"rps_doc_symbol_to_word_ratio": 0.00033400001120753586,
"rps_doc_unigram_entropy": 6.662615776062012,
"rps_doc_word_count": 6504,
"rps_doc_frac_chars_dupe_10grams": 0,
"rps_doc_frac_chars_dupe_5grams": 0.0375664085149765,
"rps_doc_frac_chars_dupe_6grams": 0.02010527066886425,
"rps_doc_frac_chars_dupe_7grams": 0.00972834974527359,
"rps_doc_frac_chars_dupe_8grams": 0.00409090006724,
"rps_doc_frac_chars_dupe_9grams": 0.0028935601003468037,
"rps_doc_frac_chars_top_2gram": 0.0026191698852926493,
"rps_doc_frac_chars_top_3gram": 0.0026940100360661745,
"rps_doc_frac_chars_top_4gram": 0.0040160599164664745,
"rps_doc_books_importance": -4468.94482421875,
"rps_doc_books_importance_length_correction": -4468.94482421875,
"rps_doc_openwebtext_importance": -2193.80908203125,
"rps_doc_openwebtext_importance_length_correction": -2193.80908203125,
"rps_doc_wikipedia_importance": -1127.9228515625,
"rps_doc_wikipedia_importance_length_correction": -1127.9228515625
},
"fasttext": {
"dclm": 0.6925124526023865,
"english": 0.00003128000025753863,
"fineweb_edu_approx": 2.2529733180999756,
"eai_general_math": 8.299999763039523e-7,
"eai_open_web_math": 0.48826587200164795,
"eai_web_code": 0.7776424288749695
}
}
|
{
"free_decimal_correspondence": {
"primary": {
"code": "004.0151",
"labels": {
"level_1": "General works, books and libraries, information sciences",
"level_2": "",
"level_3": "Computers and Computer science"
}
},
"secondary": {
"code": "005.1",
"labels": {
"level_1": "General works, books and libraries, information sciences",
"level_2": "",
"level_3": "Computer programming"
}
}
},
"bloom_cognitive_process": {
"primary": {
"code": "3",
"label": "Apply"
},
"secondary": {
"code": "2",
"label": "Understand"
}
},
"bloom_knowledge_domain": {
"primary": {
"code": "3",
"label": "Procedural"
},
"secondary": {
"code": "2",
"label": "Conceptual"
}
},
"document_type_v1": {
"primary": {
"code": "3",
"label": "Reference/Encyclopedic/Educational"
},
"secondary": {
"code": "4",
"label": "Code/Software"
}
},
"extraction_artifacts": {
"primary": {
"code": "0",
"label": "No Artifacts"
},
"secondary": {
"code": "3",
"label": "Irrelevant Content"
}
},
"missing_content": {
"primary": {
"code": "0",
"label": "No missing content"
},
"secondary": {
"code": "4",
"label": "Missing Images or Figures"
}
},
"document_type_v2": {
"primary": {
"code": "23",
"label": "Tutorial"
},
"secondary": {
"code": "8",
"label": "Documentation"
}
},
"reasoning_depth": {
"primary": {
"code": "3",
"label": "Intermediate Reasoning"
},
"secondary": {
"code": "4",
"label": "Advanced Reasoning"
}
},
"technical_correctness": {
"primary": {
"code": "4",
"label": "Highly Correct"
},
"secondary": {
"code": "3",
"label": "Mostly Correct"
}
},
"education_level": {
"primary": {
"code": "3",
"label": "Undergraduate Level"
},
"secondary": {
"code": "4",
"label": "Graduate/Expert Level"
}
}
}
|
672f1e42c33a7f9846924a2431ea77df
|
-4,550,165,976,949,127,700 |
Home
SD Card Formatter
How To Format Pi SD Cards Using SD Formatter - Raspberry
Sandisk Sd Card Formatter - Shop High Speed Storage No
1. The SD Memory Card Formatter does not format the protected area in the SD/SDHC/SDXC Cards. The protected area shall be formatted by an appropriate PC application or SD host devices that provide SD security function. The SD Memory Card Formatter doesn't support SD/SDHC/SDXC Card encrypted by the BitLocker To Go functionality of Windows
2. PRODUCT. SDA Software means the object code version of the SD Memory Card Formatter tool program (s) provided, via delivery or electronic transmission to You
3. SD Formatter is a program (application) that allows easy and quick access to SD, SDHC, and SCXC memory card formats, and has been framed to clear out all the files stored on your SD card at one time
4. Follow the simple steps to download and install SD formatter on windows: Download SD card formatter tool (application). Start and Run the SD Formatter Application. Select the drive letter for the SD card
5. Run the SD Formatter Application 2. Select the drive letter for the SDHC/SDXC card and then select format. 3
6. SD card formatter plays an important role in the daily life, and has been widely used in every aspect of our life. MiniTool Partition Wizard is the best SD formatter that supports various file systems. Download the freeware to have a try
7. SD Memory Card Formatter - Windows & macOS SD Formatter Developed by the SD Association (SDA), the SD Memory Card Formatter is universally adopted for formatting SD memory card, SDHC memory card and SDXC memory card. It's a trustworthy brand that particularly resolves SD card issues by formatting, at the same time, keeps the original performance
SD Card Formatter is a simple and basic formatted which is designed to be used with SD, SDHC and SDXC memory cards. The application itself isn't too different from the format utility included with Windows and includes two modes: Quick format and Overwrite format. CHS format size adjustment is the only other option SD Card Formatter is a program that provides quick and easy access to all memory card formats like SD, SDHC and SCXC, and has been designed so that you can get rid of all the content stored on your SD card in one go With the free SD card formatter FAT32, you will be able to easily and successfully format 32GB+ SD card to FAT32 in Windows 10,8,7 SD Card Formatter Utility If your looking to Format you SD Card that you feel has been Hosed and is longer working, its best to NOT Use the Windows Format utility, as many times these cards will stop functioning if incorrectly formatted. SDCard.org has a great utility for formatting SD/SDHC/SDXC cards that have become unusable
What are SD Card Formatters ? SD card formatter software for PC are used by the user in two forms. Either there are SD card formatter software free download or else there are the sd card formatter software online, which is used. These helps to use the SD card optimally The SD Card Formatter is an alternative method to format an SD card on your Windows PC as well as Mac. It involves downloading a free SD card formatter provided by the SD Association. This software has been made with SD card security standards and is optimized for memory cards
Insert the SD card into your computer. Open File Explorer and locate the drive letter for your SD card. Right-click the drive and select Format. If the Capacity of your SD card is less than 64 GB, set the File System to FAT32 Windows Explorer is another SD formatter that enables you to format Micro SD card or other SD memory card to NTFS, FAT, FAT32, and exFAT. Like Disk Management, it can't format an SD card over 32 GB to FAT32. Tips: When you try to format your SD card in Windows Explorer, you probably meet the Windows was unable to complete the format problem Format SD card with Windows Disk Management Disk Management is a Windows built-in tool that for managing disks on your computer. It also can be used to format storage devices like SD card, pen drive, memory card, etc. Do as following steps In order to format SD, SDHC and SDXC memory cards, the Free SD Formatter can be considered by users. It is an easy tool that can be downloaded for free and used by anyone without any glitches
How To Format SD Card To FAT32 | Win 10/8
To format SanDisk, three built-in SD card formatters are provided, and they are CMD.exe, Disk Management utility, and Windows Explorer. However, these memory card format tools have one shortcoming in common: they offer limited file systems such as NTFS, FAT, FAT32 and exFAT based on the partition size SD Card Formatting in 7 Free Ways. SD Card Formatter #1 - SD Memory Card Formatter 5.0.1 for SD/SDHC/SDXC. This tool is provided on SDCARD.ORG for downloading and formatting sd memory card online created by SD Association. It comes as the best sd card formatter as it was made with sd card security standards and it was optimized for memory cards
It is very easy to format a SD card either on computer or other digital devices. You can format any partition except system partition in Windows Explorer by right-clicking the drive and selecting Format option. Besides, there is usually a Format option on digital device, which allows users to format memory card if necessary Whether the card is SDHC or SDXC, the SD Card Formatter will make sure it's formatted correctly and ready for use. And the filesystem will be optimized for its intended use on an SD card rather than, say, an old-school magnetic hard drive. The app is called SD Card Formatter, and it's available in Mac and Windows versions The microSD cards in dashcams are submitted to a large number of writing cycles. This is especially true for smaller microSD cards (16GB and 32GB). In order to maintain optimal performance over time of microSD cards up to 32GB, it is recommended to use this dedicated SD Card Formatter, available for Mac OS and Windows PC Today, there are 3 major formats of SD cards. They are the FAT16, FAT32, and exFAT formats. Each format represents classes of SD cards based on specifications provided by the SD association. The FAT16 format is found in SD cards and their capacities are from 128Mb to 2Gb of data
SD Memory Card Formatter SD Associatio
SD Memory Card Formatter is a Cleaning and Tweaking application like TestDisk, ProduKey, and ShutUp10 from SD-3C LLC. It has a simple and basic user interface, and most importantly, it is free to download. SD Memory Card Formatter is an efficient software that is recommended by many Windows PC users Follow the steps you can find here. Ubuntu images (and potentially some other related GNU/Linux distributions) have a peculiar format that allows the image to boot without any further modification from both CDs and USB drives. /dev/xxx contains GPT signatures, indicating that it has a GPT table Download Win32 Disk Imager for free. A Windows tool for writing images to USB sticks or SD/CF cards . This program is designed to write a raw disk image to a removable device or backup a removable device to a raw image file. It is very useful for embedded development, namely Arm development projects (Android, Ubuntu on Arm, etc) Right-click the partition on the SD card and select Format option in the menu list. Select a file system format for the SD card like FAT32 or NTFS to continue formatting the SD card. Click to tweet. Fix 8. Change a New Micro SD Card. If the SD card still can't work, then you may change a new micro SD card for your device The SD Memory Card Formatter formats SD Memory Card, SDHC Memory Card and SDXC Memory Card (respectively SD/SDHC/SDXC Cards) complying with the SD File System Specification created by the SD Association (SDA). Continue Reading 4 Free Tools To Test RAM Memory For Windows, Linux and Mac
Nintendo recommends using the SD Association's SD Memory Card Formatter to format any SD cards that will be used with a Nintendo product. Nintendo products strictly adhere to the SD card standard. Instructions on using this tool can be found at the bottom of the tool's page on the SD Association website Convert external SD Card to internal. Partial conversion: 10%, 50%, and 90% of total space. Included ADB server within the package. Without root. DOWNLOAD. Its developer compressed the file in .zip format. You will need either WinRAR or 7Zip to decompress it. Grab the SD Card Formatter tool from the direct link. How to use If you want to format SD card after removing write protection, follow the steps below: Step 1: Click Start, type Run in the search bar and hit Enter. Step 2: Now in the run box, type CMD and hit OK. Step 3: This will open command prompt window, type diskpart to run diskpart utility. Step 4: Next, type list. Visit the Official SD Formatter website and download the installer for your operating system. Step 1 - Run. Insert your SD card and run the SDFormatter application : Note how my card only appears to have a capacity of 56MB despite being a 4GB card. Double check the drive letter. Then check it again. You do not want to format another device by. SD Memory Card Formatter 5.0 now supports Mac and Windows 10. Helsinki, Finland - September 11, 2017 - Tuxera, the world leading storage and networking technology company, today announced its updated version of the SD Memory Card Formatter is available on the SD Association's website.This software is the official tool for formatting SD, SDHC and SDXC memory cards
The Best Reliable FAT32 Formatter (for Windows)
SD Memory Card Formatter for Windows Download SD Associatio
1. Disk Drill SD Card Repair Tool. Disk Drill is a feature-packed SD card repair tool capable of performing a full scan of a corrupted SD card and recovering all data from it with a few clicks. It supports all file systems that are typically used to format SD cards, including FAT16, FAT32, exFAT, and NTFS Download SD Card Formatter 5.0.1 for Windows for free, without any viruses, from Uptodown. Try the latest version of SD Card Formatter 2019 for Window
SD Card Formatter - Download SD Memory Card formatter 202
1. imal data loss. The SD Memory Card Formatter, developed by Tuxera, handles SD memory cards in accordance with standards defined by the SD Association. In fact, it's the official tool for formatting any SD, SDHC, and SDXC.
2. Format Size Adjustment is no longer an option in SD Card Formatter version 5, as it is the default now. So any type of format in SD Card Formatter V5 will restore the card's full capacity (even quick format). It's a little confusing because the links still point to SD Card Formatter 4, but what you download is version 5
3. File Allocation Table, or FAT, is a filing system used in computer memory systems and cards, such as those manufactured by SanDisk. There are 12-, 16- and 32-bit versions of the FAT system. Because of the significant amount of memory capacity associated with the SanDisk card, it is a popular choice for portable data storage
4. Note: If the 64GB SD card only has a single partition, you can't directly format the partition to FAT32 with Disk Management. Windows Disk Management only allows you to format a drive under 32GB to FAT32. To solve this, you can right-click the partition on the SD card and choose Shrink to shrink the partition (limited to NTFS partition) to 32GB. . Right-click the Free space and click New.
SD Card Formatter (formerly SDFormatter) Mac 5
Download SD Card Formatter for Windows and Mac (UPDATED
Using SD Formatter Tool to restore full capacity on SDHC
1. Also included are utilities that allow you to safely format and wipe media cards. Compatible with all types of digital media including Memory Stick, SmartMedia, CompactFlash, all types of SD cards, XD cards, MMC, USB flash drives and any other type of flash storage media
2. utes using this.
3. SD cards do not need to be formatted. Formatting is an old term specific for magnetic disks, where you prepare the tracks and sectors for actual data (they are not defined by disk, but by the head when you format the disk. So formatting is very slow. Now formatting is not more such slow process, so it is not really formatting
4. SD Card Formatter is a software that provides quick and easy access to all SD, SDHC, and SCXC memory card formats. It's designed so you can get rid of everything saved on your SD memory card all in one go. It's advisable to use SD Card Formatter to get better performance out of your SD cards, since they can crash with everything being sent to.
5. Format your SD card once with SDFormatter to clear any extra partitions that may have been added with something like a Raspberry Pi image: Insert your SD or MicroSD card into your computer and load the SDFormatter software. Select the drive your SD card is in from the drop-down menu
6. Downloadhttps://www.sdcard.org/downloads/formatter_4/SD Memory Card Formatter 5.0 for SD/SDHC/SDXCSDcard Formatter software, can format SD, SDHC, SDXC automa..
SD Card Formatter & How Do I Format SD Card Quickl
The description of Sd Card Formatter App. Sd Card Formatter is an app which is used to format sdcard data. Just click on the erase button, the app will erase all the data on the SD card of the phone . Selection of the SD card internal or external to format. know the path of memory before you format. **** Be caution while erasing the data******* 1- HP USB Disk Storage Format Tool. HP USB Disk Storage Format Tool can format any Memory card or USB flash drive. HP USB Disk Storage Format utility support formatting with FAT, FAT32, or NTFS partition types. Hp Format tool can format and repair the following Compact Flash, CF Card II, Memory Stick Duo Pro, SDHC, SDXC, Thumb Drive and Pen Drive Format the SD card to restore it to its original state. If you want to give the SD card to someone else, format it twice and be sure your files cannot be recovered. Format the SD card, fill it with public domain images, and format it again. Or reformat the SD card if the other person uses a different operating system This allows the buyer to use the SD card on any device without having to go through the formatting procedure. Whenever an SD card is formatted, a new file system is assigned to it, either as FAT32, exFAT, or NTFS. A file system is basically the handshake between the SD card and the device. It is the system by which the device can. Formatting an SD card. In principle, you can use an SD card without a file system, but it is not very convenient. It is better to use the FAT16 or FAT32 format to work with Arduino. This is mainly due to the availability of appropriate libraries: some support one format, some support another. The Arduino SD library supports both formats
Top 5 SD Card Formatter Free Download Format SD Card on
1. Formatting SD card is equivalent to simply resetting the card. It will erase all data on the SD card, such as pictures, videos and documents. Besides, it can fix many troubles on the SD card. When you meet with these situations, try to format the SD card: SD card cannot be detected by smart phones, computers and digital cameras
2. O SD Card Formatter é um programa que fornece acesso rápido e fácil a todos os formatos de cartões de memória, como SD, SDHC e SCXC, e foi desenhado para que se livre de todo o conteúdo armazenado no seu cartão SD de uma só vez. É recomendável utilizar o SD Card Formatter para obter um desempenho ótimo dos seus cartões SD, pois.
3. Format SD card on purpose: sometimes you want to clear all data on memory card quick in order to get free space. In this case formatting is a good choice To remove virus: SD card and other USB drives tend to infect virus, for they might be connected to many devices
4. 4. Optional SD Card Formatter - Diskpart. Using Diskpart to do SD card/memory card format is a little more complex than the above-mentioned methods. Step 1. Type diskpartin command prompt, and press Enter key, then confirm you want to allow this app to make changes to your PC. Step 2
5. Important: Formatting the SD card will delete all data on the SD card. You will not be able to recover this data. What to do. Nintendo recommends using the tool provided by the SD Association to format any SD cards that will be used with a Nintendo product. Nintendo products strictly adhere to the SD Card standard
6. I show you how to format (erase/delete) the micro sd card while it is inside the Amazon Fire HD 8 Tablet. Hope you find this helpful. Fire HD 8 Tablet (8 HD..
7. Format SD Card with AOMEI Partition Assistant. As for 32GB+ SD card capacity, the powerful formatter-AOMEI Partition Assistant Standard is the best option. It doesn't have capacity limitations. You can easily format an SD card beyond 32GB to the FAT32 file system in Windows. And besides FAT32, it also supports formatting a drive to NTFS.
SD Card Formatter - Downloa
1. In the FAT32 Format window, select the drive to format and type a volume label if you want to. Select the Quick Format option, and then click the Start button. Advertisement. A window pops up to warn you that all data on the drive will be lost. Click OK to format the drive. Formatting with this tool is much quicker.
2. Netac 32GB Micro SD Card 2-Pack, MicroSDHC Card 32GB Memory Card - UHS-I, 90MB/s, 600X, U1, C10, V10, A1, FAT32 TF Card Micro SD Card. 4.6 out of 5 stars. 24,972. $11.99. $11. . 99. Get it as soon as Tue, Jun 8. FREE Shipping on orders over $25 shipped by Amazon
3. utes using.
6+ Best Fat32 Formatter Free Download for Windows, Mac
SD Card Formatter 5
SD Card Formatter FAT32 Free Download (Windows 10, 8, 7
SD Card Formatter Utility for fixing Corrupt SD/SDHC/SDX
HP USB Disk Storage Format Tool is a useful utility software for Windows computers. With this program, you can easily format any USB drive in NTFS, FAT32, or FAT file systems. Additionally, the tool can create DOS startup disks, which let you conveniently boot a Windows PC. Since the program is available in the form of a freeware portable app. Trusted Windows (PC) download SD Card Formatter 5.0.1. Virus-free and 100% clean download. Get SD Card Formatter alternative downloads
Memory Stick Formatter is a freeware software download filed under hard drive formatters and made available by Sony for Windows. The review for Memory Stick Formatter has not been completed yet, but it was tested by an editor here on a PC. Provides formatting support for memory cards made by Sony. Memory Stick Formatter is a simple and fast. The SD Memory Card Formatter formats SD Memory Card, SDHC Memory Card and SDXC Memory Card (respectively SD/SDHC/SDXC Cards) complying with the SD File System Specification created by the SD Association (SDA) 10. Select a file system. Click one of the following options (you may also see additional options in the menu): FAT32 — Formats the memory card for most platforms with a 4 GB file size limit (e.g., no file on the card can be over 4 GB in size). NTFS — Formats the memory card for Windows only
How to Solve “You Need to Format the Disk” for SD Card?
3. Tap on the Format SD card option. Once in your phone storage page, you will see a graph that shows how much memory all your storage areas are taking up. You want to tap on SD card. Formatting your SD card will erase all of the contents of it. Make sure that you have backed up your data elsewhere Even though you can/could use your SD card 'raw' - it's most convenient to format the card to a filesystem. For the Arduino library we'll be discussing, and nearly every other SD library, the card must be formatted FAT16 or FAT32. Some only allow one or the other. The Arduino SD library can use either To use a new SD card in cameras, phones or other devices, it is better to format it first, otherwise, the SD card may be not supported by the new device, or it does not work in best performance. It is recommended to use the SD Memory Card Formatter to format SD Cards rather than using formatting tools provided with Windows or Mac OS
6+ Best SD Card Formatter Software Free Download for
Method 2: Clean your SD card & reader. Another very common cause of an unrecognized SD card is a very simple one: a dirty SD card or a dusty card reader. Either will cause a poor contact between card and reader. So the second thing you should do is give your card a clean, and remove any dust from the reader, then try the card again If you haven't yet tried out the built-in format facility in Windows, ensure your SD card is inserted into your laptop or a USB card reader if your laptop or PC doesn't have the appropriate slot. Open up Windows Explorer (Windows key +E is the shortcut) and click on This PC But with SD Express being the response from the SD Association, the organization that controls SD card standards, it seems that another memory card format war is about to kick off
The SD mounting is hit and miss. I started from scratch. I used a new 32gb sd card formatted with SD Card Formatter. Format was perfect. I inserted SD and hit reboot. Reboot did not mount. I used Shutdown; it worked. The SD mounted perfect. I installed modules to SD and dependencies via the Pinneapple Using SD Formatter has worked every time with different SD Cards, makes and sizes. 1. Install SD Formatter on your pc. 2. Insert SD card into pc and format with SD Formatter. 3. Download firmware and save to pc. 4. Open downloaded file (zip or rar) with I have tried formatting the SD card using the disk management, and the MiniTool Partition wizard, and the disk management method gives me a 'Could not complete format' error, and the MiniTool tells me it has changed, yet when I go on disk management it hasn't An SD card of any size (yes, a microSD card inside of an SD card adapter will also work). A computer. The newest version of Swiss from here. Instructions: Plug in your SD Card of choice into your PC. Format the SD Card into Fat32. (Note, if your SD Card is a large capacity, you may have to use SD Card Formatter for Win/MacOS.
RAW SD Card Overview. RAW is a format that an SD card acquires when, for various reasons, its file system is damaged. A RAW SD card, unfortunately, becomes unreadable by any operating system. RAW, here, means raw material; that is, in order to, say, return to NTFS format on FAT32 SD card, you need to do something with it Why format an SD memory card? Memory card formatting is the process of preparing a flash memory device for data storage.It cleans the Secure Digital (SD, SDHC, SDXC) card by removing previously existing data and information on the card (low level formatting) and creating a new file system (high level formatting) 5 Pack - SanDisk Ultra 16GB SD SDHC Memory Flash Card UHS-I Class 10 Read Speed up to 48MB/s 320X SDSDUNB-016G-GN3IN Wholesale Lot + (5 Cases) 4.8 out of 5 stars. 5,259. Personal Computers. $24.39
5 Best SD Card Formatter Software in 2021 - Project GoPr
7. Enter the following command sequence> fat32format h: (or whatever drive designates the location of your SD card) 8. You will be prompted to confirm a wipe and format of your SD card. Type y and hit enter. 9. In approximately 5 seconds, your SD card will be FAT32 formatted. 10 If you are unable to format your SD card, use a formatting software such as SDFormatter provided by SD Association. Formatting software can fix corrupt SD cards and make them reusable.Although formatting fixes corrupt SD card, but the process deletes all your stored videos, photos, and other files on it SD Card Formatter es un software que proporciona un acceso rápido y sencillo a todos los formatos de tarjetas de memoria SD, SDHC y SCXC diseñado para que puedas deshacerte de una vez de todo el contenido almacenado en tu memoria SD. Es recomendable usar SD Card Formatter para tener un rendimiento óptimo de éstas, que pueden colapsarse con.
How to Format an SD Card on Windows - Lifewir
SD Card Speed. The only application to test the speed of your SD Card interface! Current test shows write speed by creating big file on SD card and calculating time required to write data to the file. This is real speed of your SD Card interface, not the speed of card as specified by vendor. v 2.2 - Improved free size calculation - Improved. In order to fully format and reclaim the full capacity of the SD card, follow steps: Right-click This PC/My Computer > Manage. Select Disk Management under Device Manager, find and right-click on SD card, and select Format Volume. Rename and reset file system of SD card to NTFS or FAT32 as your need, follow the on-screen guidelines to complete. To format a microSD/SD card on a Mac OS X computer. 1. Place the SD card into the SD card slot in the device. 2. Connect your device to the computer with a USB cable. If your device is not recognized by the computer, see the FAQ Automotive Device Not Detected by Garmin Express on a Mac. 3
SD Card Formatter, free download. The SD Memory Card Formatter formats SD Memory Card, SDHC Memory Card and SDXC Memory Card (respectively SD/SDHC/SDXC Cards) complying with the SD File System Specification created by the SD Association (SDA). It is strongly recommended to use the SD Memory Card Formatter to format SD/SDHC/SDXC Cards rather than using formatting tools provided with individual. To format a SD car without the extra files on OSX, follow these notes on Ladyada's site. Linux: With a SD card inserted, open a terminal window. At the prompt, type df, and press enter. The windows will report the device name of your SD card, it should look something like /dev/sdb1. Unmount the SD card, but leave it in the computer Formatting removable media like a USB disk or an SD card is a pretty simple task on Ubuntu Linux. No, I won't be using the terminal here although you can always use the command line on Linux. I'm going to show you how to format a USB on Ubuntu or other Linux distributions graphically. Format USB disks on Ubuntu & other Linux distribution Selecting an SD card to format. A few moments later you will see a confirmation that the format has been completed and you SD card is now ready for the next stage. Formatting the SD card Download Image Writer. In order to flash the SD card in Windows, it is necessary to first download a third-party application named Image Writer
Mini-memory card series transparent PNG icon Download FreeHow To Fix And Recover Full Data From Corrupt SD Card
Format SD or USB disk via command line. Once you've inserted the SB or USB disk into your computer, open a terminal and type the following commands to format it: First, let's figure out how to identify the media we wish to format. The name should start with /dev/sd and then a letter. Type the following command in terminal to see Most SD cards use the FAT32 file format, and preformatted FAT32 SD media is commonly available up to a capacity of 32GB. Media that exceeds 32GB usually uses the exFAT file system, while some smaller capacity cards use the FAT16 file format. Preformatted FAT16 media is generally available up to a capacity of 2GB Why to Format RAW SD Card at Last . Formatting process can clean everything on a card and give this card a new beginning. Therefore, in case of any farther card data loss problem, you'd better rescue your data before formatting. Moreover, the formatting process also is the simplest way to fix RAW file system
How to Format an Unformattable Pendrive or Memory Card
|
{
"url": "https://najde-centrale.com/316977/how-to-format-usb-drives-larger-than-32gb-with-fat32-on-windows/-ixds1815p-r",
"source_domain": "najde-centrale.com",
"snapshot_id": "crawl=CC-MAIN-2022-27",
"warc_metadata": {
"Content-Length": "43840",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:MWTUEAMLTNUBRJQ6UHPKRERF6V5CC3J3",
"WARC-Concurrent-To": "<urn:uuid:293662c3-48fc-4adc-83d6-e8b479dbfb64>",
"WARC-Date": "2022-06-29T06:26:40Z",
"WARC-IP-Address": "5.61.49.174",
"WARC-Identified-Payload-Type": "text/html",
"WARC-Payload-Digest": "sha1:WSV3MYCTPYSZWNGB57MNNK24L7A7S4LX",
"WARC-Record-ID": "<urn:uuid:1e0f1be1-f3e9-4d68-b420-af093fb65021>",
"WARC-Target-URI": "https://najde-centrale.com/316977/how-to-format-usb-drives-larger-than-32gb-with-fat32-on-windows/-ixds1815p-r",
"WARC-Truncated": null,
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:151d188a-6e64-45e6-a2f7-06db6f0dbe00>"
},
"warc_info": "isPartOf: CC-MAIN-2022-27\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for June/July 2022\r\noperator: Common Crawl Admin ([email protected])\r\nhostname: ip-10-67-67-87\r\nsoftware: Apache Nutch 1.18 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.3-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: https://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/"
}
|
{
"line_start_idx": [
0,
5,
6,
24,
25,
82,
83,
138,
139,
481,
644,
848,
1057,
1171,
1414,
1767,
1768,
2760,
2761,
3309,
3310,
4311,
4312,
4354,
4355,
5005,
5006,
6259,
6260,
6299,
6300,
7837,
7838,
9489,
9490,
9538,
9539,
9599,
9600,
10058,
10059,
10117,
10118,
10345,
10672,
11003,
11400,
11447,
11448,
11504,
11505,
11562,
11563,
11840,
11862,
12195,
12546,
12835,
13000,
13001,
13052,
13053,
14740,
14741,
14797,
14798,
15133,
15469,
15740,
16030,
16351,
16515,
16860,
16861,
16889,
16890,
17213,
17481,
17498,
17553,
17554,
17574,
17575,
17631,
17632,
17689,
17690,
18171,
18172,
19018,
19019,
19075,
19076,
20014,
20015,
20068,
20069,
20858,
20859,
22004,
22005,
22839,
22840,
22897,
22898,
23826,
23827,
23873,
23874,
24855,
24856,
26258,
26259,
26371,
26372,
27327,
27328
],
"line_end_idx": [
5,
6,
24,
25,
82,
83,
138,
139,
481,
644,
848,
1057,
1171,
1414,
1767,
1768,
2760,
2761,
3309,
3310,
4311,
4312,
4354,
4355,
5005,
5006,
6259,
6260,
6299,
6300,
7837,
7838,
9489,
9490,
9538,
9539,
9599,
9600,
10058,
10059,
10117,
10118,
10345,
10672,
11003,
11400,
11447,
11448,
11504,
11505,
11562,
11563,
11840,
11862,
12195,
12546,
12835,
13000,
13001,
13052,
13053,
14740,
14741,
14797,
14798,
15133,
15469,
15740,
16030,
16351,
16515,
16860,
16861,
16889,
16890,
17213,
17481,
17498,
17553,
17554,
17574,
17575,
17631,
17632,
17689,
17690,
18171,
18172,
19018,
19019,
19075,
19076,
20014,
20015,
20068,
20069,
20858,
20859,
22004,
22005,
22839,
22840,
22897,
22898,
23826,
23827,
23873,
23874,
24855,
24856,
26258,
26259,
26371,
26372,
27327,
27328,
27382
]
}
|
{
"red_pajama_v2": {
"ccnet_original_length": 27382,
"ccnet_original_nlines": 116,
"rps_doc_curly_bracket": 0,
"rps_doc_ldnoobw_words": 0,
"rps_doc_lorem_ipsum": 0,
"rps_doc_stop_word_fraction": 0.32888734340667725,
"rps_doc_ut1_blacklist": 0,
"rps_doc_frac_all_caps_words": 0.09319058805704117,
"rps_doc_frac_lines_end_with_ellipsis": 0,
"rps_doc_frac_no_alph_words": 0.15654616057872772,
"rps_doc_frac_unique_words": 0.2170397937297821,
"rps_doc_mean_word_length": 4.490671634674072,
"rps_doc_num_sentences": 306,
"rps_doc_symbol_to_word_ratio": 0.00017549999756738544,
"rps_doc_unigram_entropy": 5.569622993469238,
"rps_doc_word_count": 4824,
"rps_doc_frac_chars_dupe_10grams": 0.039283569902181625,
"rps_doc_frac_chars_dupe_5grams": 0.13248395919799805,
"rps_doc_frac_chars_dupe_6grams": 0.08646079152822495,
"rps_doc_frac_chars_dupe_7grams": 0.06287217885255814,
"rps_doc_frac_chars_dupe_8grams": 0.050177719444036484,
"rps_doc_frac_chars_dupe_9grams": 0.039283569902181625,
"rps_doc_frac_chars_top_2gram": 0.04653095081448555,
"rps_doc_frac_chars_top_3gram": 0.03392881900072098,
"rps_doc_frac_chars_top_4gram": 0.019387900829315186,
"rps_doc_books_importance": -2169.73828125,
"rps_doc_books_importance_length_correction": -2169.73828125,
"rps_doc_openwebtext_importance": -1357.8338623046875,
"rps_doc_openwebtext_importance_length_correction": -1357.8338623046875,
"rps_doc_wikipedia_importance": -1093.8271484375,
"rps_doc_wikipedia_importance_length_correction": -1093.8271484375
},
"fasttext": {
"dclm": 0.025097010657191277,
"english": 0.8749914169311523,
"fineweb_edu_approx": 1.469859004020691,
"eai_general_math": 0.015044869855046272,
"eai_open_web_math": 0.08420127630233765,
"eai_web_code": 0.0202938299626112
}
}
|
{
"free_decimal_correspondence": {
"primary": {
"code": "004.6",
"labels": {
"level_1": "General works, books and libraries, information sciences",
"level_2": "",
"level_3": "Computers and Computer science"
}
},
"secondary": {
"code": "005.457",
"labels": {
"level_1": "General works, books and libraries, information sciences",
"level_2": "",
"level_3": "Computer programming"
}
}
},
"bloom_cognitive_process": {
"primary": {
"code": "3",
"label": "Apply"
},
"secondary": {
"code": "2",
"label": "Understand"
}
},
"bloom_knowledge_domain": {
"primary": {
"code": "3",
"label": "Procedural"
},
"secondary": {
"code": "2",
"label": "Conceptual"
}
},
"document_type_v1": {
"primary": {
"code": "3",
"label": "Reference/Encyclopedic/Educational"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"extraction_artifacts": {
"primary": {
"code": "3",
"label": "Irrelevant Content"
},
"secondary": {
"code": "0",
"label": "No Artifacts"
}
},
"missing_content": {
"primary": {
"code": "0",
"label": "No missing content"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"document_type_v2": {
"primary": {
"code": "23",
"label": "Tutorial"
},
"secondary": {
"code": "8",
"label": "Documentation"
}
},
"reasoning_depth": {
"primary": {
"code": "2",
"label": "Basic Reasoning"
},
"secondary": {
"code": "3",
"label": "Intermediate Reasoning"
}
},
"technical_correctness": {
"primary": {
"code": "3",
"label": "Mostly Correct"
},
"secondary": {
"code": "4",
"label": "Highly Correct"
}
},
"education_level": {
"primary": {
"code": "1",
"label": "General Audience"
},
"secondary": {
"code": "2",
"label": "High School Level"
}
}
}
|
672f1e42c33a7f9846924a2431ea77df
|
-4,416,343,475,508,714,000 |
Take the 2-minute tour ×
Web Applications Stack Exchange is a question and answer site for power users of web applications. It's 100% free, no registration required.
Is there any possibility that a webapp or website I am using could be tracking or recording what I type on the page (into no box) or into input or textboxes without me having submitted a form/clicked a button after doing the typing?
For example, what happens if I accidentally paste a username/password into a text form on a website I am visiting?
share|improve this question
add comment
3 Answers 3
up vote 9 down vote accepted
This is definitely possible. JavaScript can track any text which is typed in a text field. If you've ever used Google Wave (or former Etherpad) than you know the live typing feature (if you write an character it is almost immediately visible for the user users).
But despite the technical possibility you shouldn't worry about that issue. It is not practical for any website the capture such rare events. It would require a huge manual effort the get the passwords out of the whole garbage which gets sent to the server. As an addition no one knows for which website this password was.
If it was an highly sensitive account (like online banking or the code for firing nuclear weapons or whatever) just change it immediately.
share|improve this answer
add comment
It is possible to do it using JavaScript so in general you have to trust the website.
Lots of websites support keyboard shortcuts. For example enable the keyboard shortcuts in your Gmail (I suppose you are using Gmail, since you have that avatar) and then just press ? to see it in action.
share|improve this answer
add comment
Yes.
If it was an ASP.NET site (for example) the writer could write code that handles the KeyDown or TextChanged events for text boxes and store and send what you type. The same would be true for other languages.
share|improve this answer
add comment
Your Answer
discard
By posting your answer, you agree to the privacy policy and terms of service.
Not the answer you're looking for? Browse other questions tagged or ask your own question.
|
{
"url": "http://webapps.stackexchange.com/questions/4006/can-webapps-track-what-i-am-typing-before-i-send-the-data",
"source_domain": "webapps.stackexchange.com",
"snapshot_id": "crawl=CC-MAIN-2014-23",
"warc_metadata": {
"Content-Length": "68103",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:ZIN3SBSRQQXJXNOT7YNLMISWHESB7SMZ",
"WARC-Concurrent-To": "<urn:uuid:b7097b3d-045f-4857-ae3e-e0f1c0952794>",
"WARC-Date": "2014-07-23T13:20:02Z",
"WARC-IP-Address": "198.252.206.16",
"WARC-Identified-Payload-Type": null,
"WARC-Payload-Digest": "sha1:Y65ZBOVWU5OTMDHMC27HTS3GQKQP7XNP",
"WARC-Record-ID": "<urn:uuid:dab33919-f224-4514-b367-d9770c604790>",
"WARC-Target-URI": "http://webapps.stackexchange.com/questions/4006/can-webapps-track-what-i-am-typing-before-i-send-the-data",
"WARC-Truncated": null,
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:61fbca02-2c87-43ee-9d15-893393cfebbf>"
},
"warc_info": "robots: classic\r\nhostname: ip-10-33-131-23.ec2.internal\r\nsoftware: Nutch 1.6 (CC)/CC WarcExport 1.0\r\nisPartOf: CC-MAIN-2014-23\r\noperator: CommonCrawl Admin\r\ndescription: Wide crawl of the web with URLs provided by Blekko for July 2014\r\npublisher: CommonCrawl\r\nformat: WARC File Format 1.0\r\nconformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf"
}
|
{
"line_start_idx": [
0,
25,
166,
167,
400,
401,
516,
517,
545,
557,
558,
570,
571,
600,
601,
864,
865,
1188,
1189,
1328,
1329,
1355,
1367,
1368,
1454,
1455,
1659,
1660,
1686,
1698,
1699,
1704,
1705,
1913,
1914,
1940,
1952,
1953,
1965,
1966,
1968,
1976,
1977,
2055,
2056
],
"line_end_idx": [
25,
166,
167,
400,
401,
516,
517,
545,
557,
558,
570,
571,
600,
601,
864,
865,
1188,
1189,
1328,
1329,
1355,
1367,
1368,
1454,
1455,
1659,
1660,
1686,
1698,
1699,
1704,
1705,
1913,
1914,
1940,
1952,
1953,
1965,
1966,
1968,
1976,
1977,
2055,
2056,
2146
]
}
|
{
"red_pajama_v2": {
"ccnet_original_length": 2146,
"ccnet_original_nlines": 44,
"rps_doc_curly_bracket": 0,
"rps_doc_ldnoobw_words": 0,
"rps_doc_lorem_ipsum": 0,
"rps_doc_stop_word_fraction": 0.4372093081474304,
"rps_doc_ut1_blacklist": 0,
"rps_doc_frac_all_caps_words": 0.0162790697067976,
"rps_doc_frac_lines_end_with_ellipsis": 0,
"rps_doc_frac_no_alph_words": 0.1302325576543808,
"rps_doc_frac_unique_words": 0.54347825050354,
"rps_doc_mean_word_length": 4.63586950302124,
"rps_doc_num_sentences": 23,
"rps_doc_symbol_to_word_ratio": 0,
"rps_doc_unigram_entropy": 4.947457790374756,
"rps_doc_word_count": 368,
"rps_doc_frac_chars_dupe_10grams": 0,
"rps_doc_frac_chars_dupe_5grams": 0.056271981447935104,
"rps_doc_frac_chars_dupe_6grams": 0,
"rps_doc_frac_chars_dupe_7grams": 0,
"rps_doc_frac_chars_dupe_8grams": 0,
"rps_doc_frac_chars_dupe_9grams": 0,
"rps_doc_frac_chars_top_2gram": 0.03751464933156967,
"rps_doc_frac_chars_top_3gram": 0.03868699073791504,
"rps_doc_frac_chars_top_4gram": 0.04396248981356621,
"rps_doc_books_importance": -232.98504638671875,
"rps_doc_books_importance_length_correction": -232.98504638671875,
"rps_doc_openwebtext_importance": -114.5573959350586,
"rps_doc_openwebtext_importance_length_correction": -114.5573959350586,
"rps_doc_wikipedia_importance": -95.9183578491211,
"rps_doc_wikipedia_importance_length_correction": -95.9183578491211
},
"fasttext": {
"dclm": 0.6753168702125549,
"english": 0.9157593846321106,
"fineweb_edu_approx": 1.9260467290878296,
"eai_general_math": 0.0009591599809937179,
"eai_open_web_math": 0.07009732723236084,
"eai_web_code": 0.0001623599964659661
}
}
|
{
"free_decimal_correspondence": {
"primary": {
"code": "005.8",
"labels": {
"level_1": "General works, books and libraries, information sciences",
"level_2": "",
"level_3": "Computer programming"
}
},
"secondary": {
"code": "358.5",
"labels": {
"level_1": "Social sciences",
"level_2": "Public administration and Military art and science",
"level_3": "Weapons, Armor, Air power, and Military engineers"
}
}
},
"bloom_cognitive_process": {
"primary": {
"code": "2",
"label": "Understand"
},
"secondary": {
"code": "3",
"label": "Apply"
}
},
"bloom_knowledge_domain": {
"primary": {
"code": "2",
"label": "Conceptual"
},
"secondary": {
"code": "3",
"label": "Procedural"
}
},
"document_type_v1": {
"primary": {
"code": "5",
"label": "Social/Forum"
},
"secondary": {
"code": "3",
"label": "Reference/Encyclopedic/Educational"
}
},
"extraction_artifacts": {
"primary": {
"code": "3",
"label": "Irrelevant Content"
},
"secondary": {
"code": "1",
"label": "Leftover HTML"
}
},
"missing_content": {
"primary": {
"code": "0",
"label": "No missing content"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"document_type_v2": {
"primary": {
"code": "18",
"label": "Q&A Forum"
},
"secondary": {
"code": "8",
"label": "Documentation"
}
},
"reasoning_depth": {
"primary": {
"code": "2",
"label": "Basic Reasoning"
},
"secondary": {
"code": "3",
"label": "Intermediate Reasoning"
}
},
"technical_correctness": {
"primary": {
"code": "3",
"label": "Mostly Correct"
},
"secondary": {
"code": "4",
"label": "Highly Correct"
}
},
"education_level": {
"primary": {
"code": "2",
"label": "High School Level"
},
"secondary": {
"code": "3",
"label": "Undergraduate Level"
}
}
}
|
672f1e42c33a7f9846924a2431ea77df
|
202,976,690,204,132,060 |
DAM vs. MAM - what's the difference?
At RSG, we publish separate research streams for Digital Asset Management (DAM) and Media Asset Management (MAM), and you may wonder why. After all, some vendors attempt to tackle the task of managing both (even if no software package does it all well).
One could also argue that you could use a web content management system to manage documents, or SharePoint to store and manage images. You could also use a sauté pan to roast a chicken, but it's probably not the approach that will bring about the best, most effective, and tasty results. Most sauté pans aren't built to withstand the heat of the oven, either.
The same is true of stretching a technology's capabilities into a scenario it's not really engineered for: you're unlikely to get an optimal result, and you may not even be able to accomplish the primary task to begin with. Worse, you could have the technological equivalent of chicken juices all over your oven, because the technology couldn't scale to the task.
DAM systems are focused first and foremost on brand assets and image management, and these vendors mostly come out of the print, typesetting, catalog production, and advertising world. The functionality is centered on the upload, management, and transformation of images to various formats, and also very unique functionality to manage, parse and search compound documents such as those created with Adobe Photoshop, InDesign, and Illustrator. Typical DAM buyers include advertising and creative agencies, marketing departments, and increasingly, CMOs. Examples of DAM vendors we evaluate can be found here.
MAM systems are focused on the needs of the broadcast media market, and origins of this technology are from the television and movie industry. The original functionality was centered on the storage, archiving, and later the distribution of high-resolution, usually long-form (20 minutes or more) time-based media assets. Increasingly, the technology focuses on multi-channel scenarios beyond television. Typical customers include broadcasters, television program producers, sports networks, government agencies, and increasingly religious institutions, corporations, and other organizations who are all morphing into mini-broadcasters in the age of YouTube. A list of the MAM vendors we evaluate can be found here.
DAM systems have modernized into a market of web-based applications, while MAM vendors continue to sell and support primarily rich clients with poor attempts at corresponding web-based versions.
"So what if I have to manage 30-second television commercials?" you may ask. That's where the crossover is between MAM and DAM. Yes, some DAM systems allow you to store, search and manage time-based media such as audio and video in rudimentary ways, which may be adequate for your needs. But if you're a broadcaster or have complex needs around video, a DAM vendor is likely inadequate.
We outline these functional differences in great detail in our evaluation research -- and we also help our subscribers sort out their particular needs via custom phone (or in-person) consultations.
Our customers say...
"The Digital Asset Management Research is a straightforward, comprehensive report that's invaluable to anyone considering or implementing digital asset management. With a no-nonsense approach to evaluating the major vendors and best practices, this report is a true handbook. It's my new bedside reading..."
Faith Robinson, Content Strategist & Industry Thought Leader
Other Digital Asset Management posts
Webinar - Your Journey to DAM 3.0
Learn where your enterprise fits in the future world of DAM, and get some ideas about where your journey should take you next.
|
{
"url": "https://www.realstorygroup.com/Blog/dam-vs-mam-whats-difference",
"source_domain": "www.realstorygroup.com",
"snapshot_id": "crawl=CC-MAIN-2020-50",
"warc_metadata": {
"Content-Length": "52293",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:5KXUOWG4TLVGG5M4S77SE5Y34U6RBM42",
"WARC-Concurrent-To": "<urn:uuid:6dbc267b-50a0-4070-951d-839f63b42a6a>",
"WARC-Date": "2020-12-01T08:27:11Z",
"WARC-IP-Address": "45.79.149.105",
"WARC-Identified-Payload-Type": "text/html",
"WARC-Payload-Digest": "sha1:BQ2MQFAKME4VKYKDWCSVV67VITFF4NYH",
"WARC-Record-ID": "<urn:uuid:fe5121ee-e523-4efe-a12e-1d02c6a3cf9c>",
"WARC-Target-URI": "https://www.realstorygroup.com/Blog/dam-vs-mam-whats-difference",
"WARC-Truncated": null,
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:71a7dff0-19b7-42c7-b9f5-d9236583e1a7>"
},
"warc_info": "isPartOf: CC-MAIN-2020-50\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for November/December 2020\r\noperator: Common Crawl Admin ([email protected])\r\nhostname: ip-10-67-67-240.ec2.internal\r\nsoftware: Apache Nutch 1.17 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.2-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/"
}
|
{
"line_start_idx": [
0,
37,
38,
292,
293,
653,
654,
1018,
1019,
1627,
1628,
2343,
2344,
2539,
2540,
2927,
2928,
3126,
3127,
3128,
3149,
3150,
3458,
3459,
3460,
3521,
3522,
3559,
3560,
3594,
3595
],
"line_end_idx": [
37,
38,
292,
293,
653,
654,
1018,
1019,
1627,
1628,
2343,
2344,
2539,
2540,
2927,
2928,
3126,
3127,
3128,
3149,
3150,
3458,
3459,
3460,
3521,
3522,
3559,
3560,
3594,
3595,
3721
]
}
|
{
"red_pajama_v2": {
"ccnet_original_length": 3721,
"ccnet_original_nlines": 30,
"rps_doc_curly_bracket": 0,
"rps_doc_ldnoobw_words": 0,
"rps_doc_lorem_ipsum": 0,
"rps_doc_stop_word_fraction": 0.4031117260456085,
"rps_doc_ut1_blacklist": 0,
"rps_doc_frac_all_caps_words": 0.02828853949904442,
"rps_doc_frac_lines_end_with_ellipsis": 0.032258059829473495,
"rps_doc_frac_no_alph_words": 0.16407355666160583,
"rps_doc_frac_unique_words": 0.5262237787246704,
"rps_doc_mean_word_length": 5.263986110687256,
"rps_doc_num_sentences": 31,
"rps_doc_symbol_to_word_ratio": 0.002828849945217371,
"rps_doc_unigram_entropy": 5.263082504272461,
"rps_doc_word_count": 572,
"rps_doc_frac_chars_dupe_10grams": 0,
"rps_doc_frac_chars_dupe_5grams": 0.020591169595718384,
"rps_doc_frac_chars_dupe_6grams": 0.020591169595718384,
"rps_doc_frac_chars_dupe_7grams": 0.020591169595718384,
"rps_doc_frac_chars_dupe_8grams": 0,
"rps_doc_frac_chars_dupe_9grams": 0,
"rps_doc_frac_chars_top_2gram": 0.02490866929292679,
"rps_doc_frac_chars_top_3gram": 0.029226170852780342,
"rps_doc_frac_chars_top_4gram": 0.013284619897603989,
"rps_doc_books_importance": -329.21356201171875,
"rps_doc_books_importance_length_correction": -329.21356201171875,
"rps_doc_openwebtext_importance": -234.68890380859375,
"rps_doc_openwebtext_importance_length_correction": -234.68890380859375,
"rps_doc_wikipedia_importance": -145.89474487304688,
"rps_doc_wikipedia_importance_length_correction": -145.89474487304688
},
"fasttext": {
"dclm": 0.07184035331010818,
"english": 0.9414008259773254,
"fineweb_edu_approx": 1.3801084756851196,
"eai_general_math": 0.07108461856842041,
"eai_open_web_math": 0.10790908336639404,
"eai_web_code": 0.28943049907684326
}
}
|
{
"free_decimal_correspondence": {
"primary": {
"code": "005.4",
"labels": {
"level_1": "General works, books and libraries, information sciences",
"level_2": "",
"level_3": "Computer programming"
}
},
"secondary": {
"code": "658.8",
"labels": {
"level_1": "Industrial arts, Technology, and Engineering",
"level_2": "Business",
"level_3": "Management"
}
}
},
"bloom_cognitive_process": {
"primary": {
"code": "2",
"label": "Understand"
},
"secondary": {
"code": "4",
"label": "Analyze"
}
},
"bloom_knowledge_domain": {
"primary": {
"code": "2",
"label": "Conceptual"
},
"secondary": {
"code": "3",
"label": "Procedural"
}
},
"document_type_v1": {
"primary": {
"code": "3",
"label": "Reference/Encyclopedic/Educational"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"extraction_artifacts": {
"primary": {
"code": "0",
"label": "No Artifacts"
},
"secondary": {
"code": "3",
"label": "Irrelevant Content"
}
},
"missing_content": {
"primary": {
"code": "0",
"label": "No missing content"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"document_type_v2": {
"primary": {
"code": "10",
"label": "Knowledge Article"
},
"secondary": {
"code": "13",
"label": "News (Org.)"
}
},
"reasoning_depth": {
"primary": {
"code": "2",
"label": "Basic Reasoning"
},
"secondary": {
"code": "3",
"label": "Intermediate Reasoning"
}
},
"technical_correctness": {
"primary": {
"code": "4",
"label": "Highly Correct"
},
"secondary": {
"code": "3",
"label": "Mostly Correct"
}
},
"education_level": {
"primary": {
"code": "2",
"label": "High School Level"
},
"secondary": {
"code": "3",
"label": "Undergraduate Level"
}
}
}
|
672f1e42c33a7f9846924a2431ea77df
|
3,502,775,190,201,828,000 |
• Create BookmarkCreate Bookmark
• Create Note or TagCreate Note or Tag
• PrintPrint
Loading Movies or JPGs
loadMovie is an Action that lets one Flash movie play another. Effectively, the second movie plays on top of the first. It's easier to understand, though, if you think of one movie as the host and the other movie (the one that's loaded on top of the host) as the submovie. Think of a big entertainment system—a wall of stereo and TV equipment. The movie you put into your VCR can only play on the TV screen. If you think of the TV as the host Flash movie, then video you put into your VCR is loaded on top of it.
One reason to do this is because you may have several submovies that only play one at a time. You may want to give the user the choice as to which submovie to play. If you use loadMovie, when the user clicks a button an Action tells Flash to load this movie now. It's sort of like a jukebox, where each record is a separate submovie. The reason loadMovie is beneficial is that only the submovies the user requests have to download.
PREVIEW
Not a subscriber?
Start A Free Trial
• Creative Edge
• Create BookmarkCreate Bookmark
• Create Note or TagCreate Note or Tag
• PrintPrint
|
{
"url": "http://www.creativeedge.com/book/web-development/flash/0672323710/designing-your-web-site-to-be-modular/ch19lev1sec1",
"source_domain": "www.creativeedge.com",
"snapshot_id": "crawl=CC-MAIN-2016-44",
"warc_metadata": {
"Content-Length": "71459",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:EOK6BGBHSJZLQ6AHQVZSPEIRMFFGKCSY",
"WARC-Concurrent-To": "<urn:uuid:7c9ae28f-273d-4aa7-bb2e-5529bc3d9091>",
"WARC-Date": "2016-10-25T03:39:46Z",
"WARC-IP-Address": "151.101.32.64",
"WARC-Identified-Payload-Type": null,
"WARC-Payload-Digest": "sha1:4SZFSBH5PPFM7AJRJIQXIJFPEHARSRHX",
"WARC-Record-ID": "<urn:uuid:9930951c-2bb2-4b1d-bf6d-4baf8a5fdd5a>",
"WARC-Target-URI": "http://www.creativeedge.com/book/web-development/flash/0672323710/designing-your-web-site-to-be-modular/ch19lev1sec1",
"WARC-Truncated": "length",
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:80298904-a563-49e8-b261-252d66cbeb8d>"
},
"warc_info": "robots: classic\r\nhostname: ip-10-171-6-4.ec2.internal\r\nsoftware: Nutch 1.6 (CC)/CC WarcExport 1.0\r\nisPartOf: CC-MAIN-2016-44\r\noperator: CommonCrawl Admin\r\ndescription: Wide crawl of the web for October 2016\r\npublisher: CommonCrawl\r\nformat: WARC File Format 1.0\r\nconformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf"
}
|
{
"line_start_idx": [
0,
35,
76,
91,
92,
115,
116,
629,
630,
1062,
1063,
1064,
1072,
1073,
1148,
1149,
1167,
1168,
1187,
1188,
1189,
1192,
1210,
1245,
1286
],
"line_end_idx": [
35,
76,
91,
92,
115,
116,
629,
630,
1062,
1063,
1064,
1072,
1073,
1148,
1149,
1167,
1168,
1187,
1188,
1189,
1192,
1210,
1245,
1286,
1300
]
}
|
{
"red_pajama_v2": {
"ccnet_original_length": 1300,
"ccnet_original_nlines": 24,
"rps_doc_curly_bracket": 0,
"rps_doc_ldnoobw_words": 0,
"rps_doc_lorem_ipsum": 0,
"rps_doc_stop_word_fraction": 0.4448818862438202,
"rps_doc_ut1_blacklist": 0,
"rps_doc_frac_all_caps_words": 0.027559060603380203,
"rps_doc_frac_lines_end_with_ellipsis": 0,
"rps_doc_frac_no_alph_words": 0.12204723805189133,
"rps_doc_frac_unique_words": 0.4601770043373108,
"rps_doc_mean_word_length": 4.203539848327637,
"rps_doc_num_sentences": 13,
"rps_doc_symbol_to_word_ratio": 0,
"rps_doc_unigram_entropy": 4.314023494720459,
"rps_doc_word_count": 226,
"rps_doc_frac_chars_dupe_10grams": 0.14947368204593658,
"rps_doc_frac_chars_dupe_5grams": 0.18526315689086914,
"rps_doc_frac_chars_dupe_6grams": 0.14947368204593658,
"rps_doc_frac_chars_dupe_7grams": 0.14947368204593658,
"rps_doc_frac_chars_dupe_8grams": 0.14947368204593658,
"rps_doc_frac_chars_dupe_9grams": 0.14947368204593658,
"rps_doc_frac_chars_top_2gram": 0.02947367914021015,
"rps_doc_frac_chars_top_3gram": 0.0221052598208189,
"rps_doc_frac_chars_top_4gram": 0.061052631586790085,
"rps_doc_books_importance": -112.22413635253906,
"rps_doc_books_importance_length_correction": -112.22413635253906,
"rps_doc_openwebtext_importance": -69.60527801513672,
"rps_doc_openwebtext_importance_length_correction": -69.60527801513672,
"rps_doc_wikipedia_importance": -60.82548904418945,
"rps_doc_wikipedia_importance_length_correction": -60.82548522949219
},
"fasttext": {
"dclm": 0.6334133148193359,
"english": 0.9124429225921631,
"fineweb_edu_approx": 2.0544931888580322,
"eai_general_math": 0.006661420222371817,
"eai_open_web_math": 0.11900675296783447,
"eai_web_code": 0.05823647975921631
}
}
|
{
"free_decimal_correspondence": {
"primary": {
"code": "005.1",
"labels": {
"level_1": "General works, books and libraries, information sciences",
"level_2": "",
"level_3": "Computer programming"
}
},
"secondary": {
"code": "791.43",
"labels": {
"level_1": "Arts",
"level_2": "Amusements and Recreation",
"level_3": ""
}
}
},
"bloom_cognitive_process": {
"primary": {
"code": "2",
"label": "Understand"
},
"secondary": {
"code": "3",
"label": "Apply"
}
},
"bloom_knowledge_domain": {
"primary": {
"code": "2",
"label": "Conceptual"
},
"secondary": {
"code": "3",
"label": "Procedural"
}
},
"document_type_v1": {
"primary": {
"code": "3",
"label": "Reference/Encyclopedic/Educational"
},
"secondary": {
"code": "4",
"label": "Code/Software"
}
},
"extraction_artifacts": {
"primary": {
"code": "3",
"label": "Irrelevant Content"
},
"secondary": {
"code": "0",
"label": "No Artifacts"
}
},
"missing_content": {
"primary": {
"code": "0",
"label": "No missing content"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"document_type_v2": {
"primary": {
"code": "23",
"label": "Tutorial"
},
"secondary": {
"code": "8",
"label": "Documentation"
}
},
"reasoning_depth": {
"primary": {
"code": "2",
"label": "Basic Reasoning"
},
"secondary": {
"code": "3",
"label": "Intermediate Reasoning"
}
},
"technical_correctness": {
"primary": {
"code": "3",
"label": "Mostly Correct"
},
"secondary": {
"code": "4",
"label": "Highly Correct"
}
},
"education_level": {
"primary": {
"code": "3",
"label": "Undergraduate Level"
},
"secondary": {
"code": "2",
"label": "High School Level"
}
}
}
|
672f1e42c33a7f9846924a2431ea77df
|
-6,458,145,902,039,153,000 |
Задание параметров функции по умолчанию
We use cookies. Read the Privacy and Cookie Policy
Задание параметров функции по умолчанию
Еще одна интересная возможность, которая появляется у вас после перехода от Си к Си++, позволяет при определении функций задавать некоторые ее параметры по умолчанию. Вызывая такую функцию, можно не указывать параметры, заданные по умолчанию.
Если большинство вызовов функции выполняется с одинаковыми параметрами, это позволяет сократить текст программы, а главное, уменьшить возможность совершения ошибок во время набора параметров функции.
Параметры по умолчанию можно задать во время объявления функции или во время ее определения. По умолчанию задают только последние параметры функций:
int Summa(int first, int second, int third=0, int fourth=0) {
return(first + second + third + fourth);
}
Функцию Summa можно использовать для сложения четырех, трех или двух чисел. Если складываются два числа, то третий и четвертый параметр можно опустить:
void main() {
int value1 = 10, value2 = 20, value3 = 30, value4 = 40;
int result;
// Вызываем функцию с четырьмя параметрами
result = Summa(value1, value2, value3, value4);
print(“Сумма четырех чисел равна %d”, result);
// Вызываем функцию с тремя параметрами
result = Summa(value1, value2, value3);
print(“Сумма трех чисел равна %d”, result);
// Вызываем функцию с двумя параметрами,
// последний параметр задается по умолчанию
result = Summa(value1, value2);
print(“Сумма первых двух чисел равна %d”, result);
}
|
{
"url": "https://it.wikireading.ru/39941",
"source_domain": "it.wikireading.ru",
"snapshot_id": "CC-MAIN-2024-22",
"warc_metadata": {
"Content-Length": "108281",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:IRLFHBTZ2QW4SZ3JF67Y7ARCHPLRZCJG",
"WARC-Concurrent-To": "<urn:uuid:f2e9ed0f-0221-4ba7-adc7-575c541e59e0>",
"WARC-Date": "2024-05-20T06:31:02Z",
"WARC-IP-Address": "62.109.14.131",
"WARC-Identified-Payload-Type": "text/html",
"WARC-Payload-Digest": "sha1:22CPHDNZRQ7C74CNFO2YQ5W4VGX7NPS7",
"WARC-Record-ID": "<urn:uuid:c3e58be7-0f05-4c59-ad03-aab1cce6c442>",
"WARC-Target-URI": "https://it.wikireading.ru/39941",
"WARC-Truncated": null,
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:e25da3e1-bb55-49c4-b788-a93142864033>"
},
"warc_info": "isPartOf: CC-MAIN-2024-22\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for May 2024\r\noperator: Common Crawl Admin ([email protected])\r\nhostname: ip-10-67-67-33\r\nsoftware: Apache Nutch 1.19 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.5-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: https://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/"
}
|
{
"line_start_idx": [
0,
40,
41,
92,
93,
133,
134,
377,
378,
578,
579,
728,
729,
791,
792,
834,
835,
837,
838,
990,
991,
1005,
1006,
1063,
1064,
1077,
1078,
1122,
1123,
1172,
1173,
1221,
1222,
1263,
1264,
1305,
1306,
1351,
1352,
1394,
1395,
1440,
1441,
1474,
1475,
1527,
1528
],
"line_end_idx": [
40,
41,
92,
93,
133,
134,
377,
378,
578,
579,
728,
729,
791,
792,
834,
835,
837,
838,
990,
991,
1005,
1006,
1063,
1064,
1077,
1078,
1122,
1123,
1172,
1173,
1221,
1222,
1263,
1264,
1305,
1306,
1351,
1352,
1394,
1395,
1440,
1441,
1474,
1475,
1527,
1528,
1529
]
}
|
{
"red_pajama_v2": {
"ccnet_original_length": 1529,
"ccnet_original_nlines": 46,
"rps_doc_curly_bracket": 0.002616090001538396,
"rps_doc_ldnoobw_words": 0,
"rps_doc_lorem_ipsum": 0,
"rps_doc_stop_word_fraction": 0.042553190141916275,
"rps_doc_ut1_blacklist": 0,
"rps_doc_frac_all_caps_words": 0,
"rps_doc_frac_lines_end_with_ellipsis": 0,
"rps_doc_frac_no_alph_words": 0.7943262457847595,
"rps_doc_frac_unique_words": 0.5888324975967407,
"rps_doc_mean_word_length": 6.065989971160889,
"rps_doc_num_sentences": 7,
"rps_doc_symbol_to_word_ratio": 0,
"rps_doc_unigram_entropy": 4.521524906158447,
"rps_doc_word_count": 197,
"rps_doc_frac_chars_dupe_10grams": 0,
"rps_doc_frac_chars_dupe_5grams": 0.18242678046226501,
"rps_doc_frac_chars_dupe_6grams": 0.056903768330812454,
"rps_doc_frac_chars_dupe_7grams": 0.056903768330812454,
"rps_doc_frac_chars_dupe_8grams": 0,
"rps_doc_frac_chars_dupe_9grams": 0,
"rps_doc_frac_chars_top_2gram": 0.06443514674901962,
"rps_doc_frac_chars_top_3gram": 0.05271967127919197,
"rps_doc_frac_chars_top_4gram": 0.05523012951016426,
"rps_doc_books_importance": -103.53782653808594,
"rps_doc_books_importance_length_correction": -92.57203674316406,
"rps_doc_openwebtext_importance": -58.924068450927734,
"rps_doc_openwebtext_importance_length_correction": -58.924068450927734,
"rps_doc_wikipedia_importance": -33.11271286010742,
"rps_doc_wikipedia_importance_length_correction": -20.06037139892578
},
"fasttext": {
"dclm": 0.8278524875640869,
"english": 0.00019027000234927982,
"fineweb_edu_approx": 2.9916317462921143,
"eai_general_math": 0.0002895600046031177,
"eai_open_web_math": 0.2895861268043518,
"eai_web_code": 0.6234972476959229
}
}
|
{
"free_decimal_correspondence": {
"primary": {
"code": "005.1332",
"labels": {
"level_1": "General works, books and libraries, information sciences",
"level_2": "",
"level_3": "Computer programming"
}
},
"secondary": {
"code": "005.133",
"labels": {
"level_1": "General works, books and libraries, information sciences",
"level_2": "",
"level_3": "Computer programming"
}
}
},
"bloom_cognitive_process": {
"primary": {
"code": "2",
"label": "Understand"
},
"secondary": {
"code": "3",
"label": "Apply"
}
},
"bloom_knowledge_domain": {
"primary": {
"code": "2",
"label": "Conceptual"
},
"secondary": {
"code": "3",
"label": "Procedural"
}
},
"document_type_v1": {
"primary": {
"code": "3",
"label": "Reference/Encyclopedic/Educational"
},
"secondary": {
"code": "4",
"label": "Code/Software"
}
},
"extraction_artifacts": {
"primary": {
"code": "0",
"label": "No Artifacts"
},
"secondary": {
"code": "3",
"label": "Irrelevant Content"
}
},
"missing_content": {
"primary": {
"code": "0",
"label": "No missing content"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"document_type_v2": {
"primary": {
"code": "23",
"label": "Tutorial"
},
"secondary": {
"code": "8",
"label": "Documentation"
}
},
"reasoning_depth": {
"primary": {
"code": "2",
"label": "Basic Reasoning"
},
"secondary": {
"code": "3",
"label": "Intermediate Reasoning"
}
},
"technical_correctness": {
"primary": {
"code": "4",
"label": "Highly Correct"
},
"secondary": {
"code": "3",
"label": "Mostly Correct"
}
},
"education_level": {
"primary": {
"code": "2",
"label": "High School Level"
},
"secondary": {
"code": "3",
"label": "Undergraduate Level"
}
}
}
|
672f1e42c33a7f9846924a2431ea77df
|
8,127,426,026,074,982,000 |
Sort by
Date Activity Answers Votes
59 questions
Tagged
• x
37
views
4
answers
0
votes
2016-11-27 22:53:59 +0800 Darksu
Zk Combobox onOpen Event issue
35
views
1
answer
0
votes
2016-11-21 10:01:41 +0800 Darksu
Selectbox items with label and value
20
views
1
answer
0
votes
2016-10-31 05:29:38 +0800 Darksu
Combobox with multiple items taking longer time to render
24
views
1
answer
0
votes
2016-10-18 07:35:04 +0800 chillworld flag of Belgium
Binding 2 Combobox on Listbox
39
views
3
answers
0
votes
2016-09-16 08:31:16 +0800 Darksu
Combobox issue :Taking time to load
11
views
0
answers
0
votes
2016-08-25 21:13:05 +0800 scottz
Combobox autodrop with autocomplete obscures text entry area
10
views
0
answers
0
votes
2016-07-15 23:29:17 +0800 HiteshR
infinite parent child hierarchy combobox
10
views
1
answer
0
votes
2016-05-31 10:15:18 +0800 Aditi
In combo Scrolling item should not come as selected item
14
views
1
answer
0
votes
2016-04-21 06:55:11 +0800 chillworld flag of Belgium
want different value on selecteditem and combo dropdown
54
views
9
answers
1
vote
2016-04-18 10:53:47 +0800 chillworld flag of Belgium
Autoscroll on selecteditem on combo not working
14
views
1
answer
0
votes
2016-02-08 10:30:53 +0800 Darksu
combobox previuos value is getting populated
11
views
1
answer
0
votes
2016-01-04 15:54:27 +0800 Darksu
Dynamically populate combox box using composer
32
views
0
answers
0
votes
2015-11-24 16:14:49 +0800 KlausWr
Autodisable for combobox?
31
views
1
answer
0
votes
2015-11-02 09:22:13 +0800 Darksu
Combobox autocomplete with changes
27
views
2
answers
0
votes
2015-09-21 07:40:36 +0800 Tegomena
Changing triangular beside combobox?
56
views
2
answers
0
votes
2015-09-15 11:56:25 +0800 MathieuPiette
Why are my comboitems outside of their combobox?
21
views
0
answers
0
votes
2015-08-20 11:54:31 +0800 gargamel25
combo ie 11 error message problem
65
views
7
answers
0
votes
2015-08-17 12:17:13 +0800 nsharma flag of India
Combobox performance issue [closed]
17
views
0
answers
0
votes
2015-08-03 13:17:19 +0800 doeran
combobox chose value by enter dosn't work
77
views
2
answers
0
votes
2015-06-22 08:31:21 +0800 WilliamB
How to add an empty value to a combobox?
9
views
1
answer
0
votes
2015-06-03 10:05:50 +0800 Darksu
problem combobox in google chorom
29
views
2
answers
1
vote
2015-06-02 09:36:10 +0800 josefsabater
Default value selected in combobox
17
views
2
answers
0
votes
2015-04-23 09:21:21 +0800 claudioveryant
Combobox autodrop option doesn´t scroll view into matched item.
89
views
2
answers
1
vote
2015-03-03 07:44:56 +0800 Senthilchettyin flag of India
How to clear display value when clear combox's items
12
views
1
answer
0
votes
2015-02-21 19:24:50 +0800 Darksu
XML data Bind to a Combobox or Listbox
25
views
3
answers
0
votes
2015-02-02 12:54:20 +0800 kanse
how to get selected item ?
34
views
1
answer
0
votes
2015-01-28 16:52:44 +0800 Alecs
String List with combobox zk framework
37
views
5
answers
0
votes
2015-01-16 07:38:31 +0800 hawk
Problem with combobox.
12
views
1
answer
0
votes
2014-12-07 09:24:37 +0800 Darksu
Combobox scroll event
Did not find what you were looking for? Please, post your question!
Highlights
ZK 8.6.0
Ask the Expert
ZK & Spring Boot
Contributors
KlausWr gravatar imagensharma gravatar imagescottz gravatar imagealiabbas gravatar imageecharish gravatar imageAlecs gravatar imageSenthilchettyin gravatar imagehawk gravatar imageterrytornado gravatar imageMathieuPiette gravatar imagejolubrech gravatar imagechillworld gravatar imagecyiannoulis gravatar imagewangzeyou gravatar imageTegomena gravatar imagejosefsabater gravatar image
Tags
Support Options
• Email Support
• Training
• Consulting
• Outsourcing
Learn More
|
{
"url": "http://forum.zkoss.org/questions/scope:all/sort:activity-desc/tags:combo/page:1/",
"source_domain": "forum.zkoss.org",
"snapshot_id": "crawl=CC-MAIN-2018-51",
"warc_metadata": {
"Content-Length": "102732",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:UGDHF4D4YYFQVF6J5P6R37C3RQQ36O6M",
"WARC-Concurrent-To": "<urn:uuid:ae878170-a974-4709-8291-0de981850770>",
"WARC-Date": "2018-12-11T09:28:45Z",
"WARC-IP-Address": "54.149.254.26",
"WARC-Identified-Payload-Type": "application/xhtml+xml",
"WARC-Payload-Digest": "sha1:7PFGLJZGKOVZICTQGDZ74BYLJ243O557",
"WARC-Record-ID": "<urn:uuid:0d3f6499-2703-4c16-aeb8-47ab24222b27>",
"WARC-Target-URI": "http://forum.zkoss.org/questions/scope:all/sort:activity-desc/tags:combo/page:1/",
"WARC-Truncated": null,
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:c50351e2-5396-4714-8f1c-96176698524d>"
},
"warc_info": "isPartOf: CC-MAIN-2018-51\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for December 2018\r\noperator: Common Crawl Admin ([email protected])\r\nhostname: ip-10-150-135-54.ec2.internal\r\nsoftware: Apache Nutch 1.15 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 0.11-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/"
}
|
{
"line_start_idx": [
0,
8,
36,
37,
50,
51,
58,
64,
67,
73,
75,
83,
85,
91,
124,
125,
156,
157,
160,
166,
168,
175,
177,
183,
216,
217,
254,
255,
258,
264,
266,
273,
275,
281,
314,
315,
373,
374,
377,
383,
385,
392,
394,
400,
453,
454,
484,
485,
488,
494,
496,
504,
506,
512,
545,
546,
582,
583,
586,
592,
594,
602,
604,
610,
643,
644,
705,
706,
709,
715,
717,
725,
727,
733,
767,
768,
809,
810,
813,
819,
821,
828,
830,
836,
868,
869,
926,
927,
930,
936,
938,
945,
947,
953,
1006,
1007,
1063,
1064,
1067,
1073,
1075,
1083,
1085,
1090,
1143,
1144,
1192,
1193,
1196,
1202,
1204,
1211,
1213,
1219,
1252,
1253,
1298,
1299,
1302,
1308,
1310,
1317,
1319,
1325,
1358,
1359,
1406,
1407,
1410,
1416,
1418,
1426,
1428,
1434,
1468,
1469,
1495,
1496,
1499,
1505,
1507,
1514,
1516,
1522,
1555,
1556,
1591,
1592,
1595,
1601,
1603,
1611,
1613,
1619,
1654,
1655,
1692,
1693,
1696,
1702,
1704,
1712,
1714,
1720,
1760,
1761,
1810,
1811,
1814,
1820,
1822,
1830,
1832,
1838,
1875,
1876,
1910,
1911,
1914,
1920,
1922,
1930,
1932,
1938,
1986,
1987,
2023,
2024,
2027,
2033,
2035,
2043,
2045,
2051,
2084,
2085,
2127,
2128,
2131,
2137,
2139,
2147,
2149,
2155,
2190,
2191,
2232,
2233,
2235,
2241,
2243,
2250,
2252,
2258,
2291,
2292,
2326,
2327,
2330,
2336,
2338,
2346,
2348,
2353,
2392,
2393,
2428,
2429,
2432,
2438,
2440,
2448,
2450,
2456,
2497,
2498,
2562,
2563,
2566,
2572,
2574,
2582,
2584,
2589,
2645,
2646,
2699,
2700,
2703,
2709,
2711,
2718,
2720,
2726,
2759,
2760,
2799,
2800,
2803,
2809,
2811,
2819,
2821,
2827,
2859,
2860,
2887,
2888,
2891,
2897,
2899,
2906,
2908,
2914,
2946,
2947,
2986,
2987,
2990,
2996,
2998,
3006,
3008,
3014,
3045,
3046,
3069,
3070,
3073,
3079,
3081,
3088,
3090,
3096,
3129,
3130,
3152,
3153,
3221,
3222,
3233,
3234,
3243,
3258,
3275,
3276,
3289,
3290,
3675,
3676,
3681,
3682,
3698,
3716,
3729,
3744,
3760
],
"line_end_idx": [
8,
36,
37,
50,
51,
58,
64,
67,
73,
75,
83,
85,
91,
124,
125,
156,
157,
160,
166,
168,
175,
177,
183,
216,
217,
254,
255,
258,
264,
266,
273,
275,
281,
314,
315,
373,
374,
377,
383,
385,
392,
394,
400,
453,
454,
484,
485,
488,
494,
496,
504,
506,
512,
545,
546,
582,
583,
586,
592,
594,
602,
604,
610,
643,
644,
705,
706,
709,
715,
717,
725,
727,
733,
767,
768,
809,
810,
813,
819,
821,
828,
830,
836,
868,
869,
926,
927,
930,
936,
938,
945,
947,
953,
1006,
1007,
1063,
1064,
1067,
1073,
1075,
1083,
1085,
1090,
1143,
1144,
1192,
1193,
1196,
1202,
1204,
1211,
1213,
1219,
1252,
1253,
1298,
1299,
1302,
1308,
1310,
1317,
1319,
1325,
1358,
1359,
1406,
1407,
1410,
1416,
1418,
1426,
1428,
1434,
1468,
1469,
1495,
1496,
1499,
1505,
1507,
1514,
1516,
1522,
1555,
1556,
1591,
1592,
1595,
1601,
1603,
1611,
1613,
1619,
1654,
1655,
1692,
1693,
1696,
1702,
1704,
1712,
1714,
1720,
1760,
1761,
1810,
1811,
1814,
1820,
1822,
1830,
1832,
1838,
1875,
1876,
1910,
1911,
1914,
1920,
1922,
1930,
1932,
1938,
1986,
1987,
2023,
2024,
2027,
2033,
2035,
2043,
2045,
2051,
2084,
2085,
2127,
2128,
2131,
2137,
2139,
2147,
2149,
2155,
2190,
2191,
2232,
2233,
2235,
2241,
2243,
2250,
2252,
2258,
2291,
2292,
2326,
2327,
2330,
2336,
2338,
2346,
2348,
2353,
2392,
2393,
2428,
2429,
2432,
2438,
2440,
2448,
2450,
2456,
2497,
2498,
2562,
2563,
2566,
2572,
2574,
2582,
2584,
2589,
2645,
2646,
2699,
2700,
2703,
2709,
2711,
2718,
2720,
2726,
2759,
2760,
2799,
2800,
2803,
2809,
2811,
2819,
2821,
2827,
2859,
2860,
2887,
2888,
2891,
2897,
2899,
2906,
2908,
2914,
2946,
2947,
2986,
2987,
2990,
2996,
2998,
3006,
3008,
3014,
3045,
3046,
3069,
3070,
3073,
3079,
3081,
3088,
3090,
3096,
3129,
3130,
3152,
3153,
3221,
3222,
3233,
3234,
3243,
3258,
3275,
3276,
3289,
3290,
3675,
3676,
3681,
3682,
3698,
3716,
3729,
3744,
3760,
3770
]
}
|
{
"red_pajama_v2": {
"ccnet_original_length": 3770,
"ccnet_original_nlines": 316,
"rps_doc_curly_bracket": 0,
"rps_doc_ldnoobw_words": 0,
"rps_doc_lorem_ipsum": 0,
"rps_doc_stop_word_fraction": 0.08716136962175369,
"rps_doc_ut1_blacklist": 0,
"rps_doc_frac_all_caps_words": 0.003533570095896721,
"rps_doc_frac_lines_end_with_ellipsis": 0,
"rps_doc_frac_no_alph_words": 0.547703206539154,
"rps_doc_frac_unique_words": 0.48404255509376526,
"rps_doc_mean_word_length": 5.2588653564453125,
"rps_doc_num_sentences": 12,
"rps_doc_symbol_to_word_ratio": 0,
"rps_doc_unigram_entropy": 4.893011093139648,
"rps_doc_word_count": 564,
"rps_doc_frac_chars_dupe_10grams": 0,
"rps_doc_frac_chars_dupe_5grams": 0.18543492257595062,
"rps_doc_frac_chars_dupe_6grams": 0.026972349733114243,
"rps_doc_frac_chars_dupe_7grams": 0,
"rps_doc_frac_chars_dupe_8grams": 0,
"rps_doc_frac_chars_dupe_9grams": 0,
"rps_doc_frac_chars_top_2gram": 0.052596088498830795,
"rps_doc_frac_chars_top_3gram": 0.06136209890246391,
"rps_doc_frac_chars_top_4gram": 0.052596088498830795,
"rps_doc_books_importance": -322.936767578125,
"rps_doc_books_importance_length_correction": -322.936767578125,
"rps_doc_openwebtext_importance": -211.33245849609375,
"rps_doc_openwebtext_importance_length_correction": -211.33245849609375,
"rps_doc_wikipedia_importance": -186.63597106933594,
"rps_doc_wikipedia_importance_length_correction": -186.63597106933594
},
"fasttext": {
"dclm": 0.03222436085343361,
"english": 0.666712760925293,
"fineweb_edu_approx": 1.1959198713302612,
"eai_general_math": 0.00010610000026645139,
"eai_open_web_math": 0.1053658127784729,
"eai_web_code": -0.000010009999641624745
}
}
|
{
"free_decimal_correspondence": {
"primary": {
"code": "005.1",
"labels": {
"level_1": "General works, books and libraries, information sciences",
"level_2": "",
"level_3": "Computer programming"
}
},
"secondary": {
"code": "005.452",
"labels": {
"level_1": "General works, books and libraries, information sciences",
"level_2": "",
"level_3": "Computer programming"
}
}
},
"bloom_cognitive_process": {
"primary": {
"code": "3",
"label": "Apply"
},
"secondary": {
"code": "2",
"label": "Understand"
}
},
"bloom_knowledge_domain": {
"primary": {
"code": "3",
"label": "Procedural"
},
"secondary": {
"code": "2",
"label": "Conceptual"
}
},
"document_type_v1": {
"primary": {
"code": "5",
"label": "Social/Forum"
},
"secondary": {
"code": "4",
"label": "Code/Software"
}
},
"extraction_artifacts": {
"primary": {
"code": "3",
"label": "Irrelevant Content"
},
"secondary": {
"code": "0",
"label": "No Artifacts"
}
},
"missing_content": {
"primary": {
"code": "0",
"label": "No missing content"
},
"secondary": {
"code": "2",
"label": "Click Here References"
}
},
"document_type_v2": {
"primary": {
"code": "18",
"label": "Q&A Forum"
},
"secondary": {
"code": "8",
"label": "Documentation"
}
},
"reasoning_depth": {
"primary": {
"code": "2",
"label": "Basic Reasoning"
},
"secondary": {
"code": "3",
"label": "Intermediate Reasoning"
}
},
"technical_correctness": {
"primary": {
"code": "6",
"label": "Not Applicable/Indeterminate"
},
"secondary": {
"code": "3",
"label": "Mostly Correct"
}
},
"education_level": {
"primary": {
"code": "4",
"label": "Graduate/Expert Level"
},
"secondary": {
"code": "3",
"label": "Undergraduate Level"
}
}
}
|
672f1e42c33a7f9846924a2431ea77df
|
-8,552,287,735,199,495,000 |
Take the 2-minute tour ×
Stack Overflow is a question and answer site for professional and enthusiast programmers. It's 100% free, no registration required.
In C++, suppose I have a messaging system that wraps messages in a generic struct:
template<typename T>
struct Message
{
std::string Name;
T Data;
};
I also have an interface that includes functions that need to use the purely generic version of this struct:
class Interface
{
public:
virtual ~Interface() { }
virtual void Receive(Message& message) = 0;
virtual Message Send() = 0;
};
However, Message no longer names a type; things like Message<float> and Message<std::string> name types. Since the classes that will be implementing Interface will want to catch different Message, I can't just define a specific type.
The only way I can think to fix this is to rip out the template and using inheritance, but then I'd have littered throughout my code things like IntMessage and BoolMessage, which looks extraordinarily ugly. Any thoughts on how I can do this the way I want?
share|improve this question
What attribute(s)/method(s) does the "purely generic version" of the Message have? Just the Name? – Mark B Oct 5 '12 at 17:09
2 Answers 2
A simple approach is to split the Message type into a hierarchy:
struct MessageBase {
std::string Name;
};
template<typename T>
struct Message : MessageBase
{
T Data;
};
Then you can just pass MessageBase& through interfaces.
[The previous won't work. The function will be able to accept any MessageBase& object, but Receive seems to be about storing in the argument a message for which the type is unknown a compile time. Although if you don't mind dynamic allocations you could have a Message that holds the name and a pointer to a MessageBase and then different implementations of MessageImpl (the template above)]
Another common approach is to add all possible messages to an union and pass the union around.
share|improve this answer
Why don't you define your interface as a template?
template<typename T>
class Interface
{
public:
virtual ~Interface() { }
virtual void Receive(Message<T>& message) = 0;
virtual Message<T> Send() = 0;
};
share|improve this answer
@twalberg it isn't clear how the template messages could really be virtual. – juanchopanza Oct 4 '12 at 19:21
@twalberg You can't have template virtual methods can you? – Mark B Oct 4 '12 at 19:23
Your Answer
discard
By posting your answer, you agree to the privacy policy and terms of service.
Not the answer you're looking for? Browse other questions tagged or ask your own question.
|
{
"url": "http://stackoverflow.com/questions/12733668/passing-a-generic-struct-as-a-parameter-in-an-interface?answertab=votes",
"source_domain": "stackoverflow.com",
"snapshot_id": "crawl=CC-MAIN-2015-22",
"warc_metadata": {
"Content-Length": "75340",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:TADK7WEUOENT6UQEP5DPRP5BMZL4EPBA",
"WARC-Concurrent-To": "<urn:uuid:de9edb71-9a26-4a45-9874-065779eeaf01>",
"WARC-Date": "2015-05-22T23:51:36Z",
"WARC-IP-Address": "198.252.206.16",
"WARC-Identified-Payload-Type": null,
"WARC-Payload-Digest": "sha1:VZD3X6SYMRSU35QISAC56JFKYNNFXSGB",
"WARC-Record-ID": "<urn:uuid:de07e626-bf68-4ae1-a740-6ed57d312baf>",
"WARC-Target-URI": "http://stackoverflow.com/questions/12733668/passing-a-generic-struct-as-a-parameter-in-an-interface?answertab=votes",
"WARC-Truncated": null,
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:5d3a0bb5-5b5f-48ab-a8cd-682f2e045813>"
},
"warc_info": "robots: classic\r\nhostname: ip-10-180-206-219.ec2.internal\r\nsoftware: Nutch 1.6 (CC)/CC WarcExport 1.0\r\nisPartOf: CC-MAIN-2015-22\r\noperator: CommonCrawl Admin\r\ndescription: Wide crawl of the web for May 2015\r\npublisher: CommonCrawl\r\nformat: WARC File Format 1.0\r\nconformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf"
}
|
{
"line_start_idx": [
0,
25,
157,
158,
241,
242,
263,
278,
280,
300,
310,
313,
314,
423,
424,
440,
442,
452,
481,
529,
561,
564,
565,
799,
800,
1057,
1058,
1086,
1091,
1218,
1219,
1231,
1232,
1297,
1298,
1319,
1339,
1342,
1363,
1392,
1394,
1404,
1407,
1408,
1464,
1465,
1857,
1858,
1953,
1954,
1980,
1981,
2032,
2033,
2054,
2070,
2072,
2082,
2111,
2162,
2197,
2200,
2226,
2231,
2342,
2347,
2435,
2436,
2448,
2449,
2451,
2459,
2460,
2538,
2539
],
"line_end_idx": [
25,
157,
158,
241,
242,
263,
278,
280,
300,
310,
313,
314,
423,
424,
440,
442,
452,
481,
529,
561,
564,
565,
799,
800,
1057,
1058,
1086,
1091,
1218,
1219,
1231,
1232,
1297,
1298,
1319,
1339,
1342,
1363,
1392,
1394,
1404,
1407,
1408,
1464,
1465,
1857,
1858,
1953,
1954,
1980,
1981,
2032,
2033,
2054,
2070,
2072,
2082,
2111,
2162,
2197,
2200,
2226,
2231,
2342,
2347,
2435,
2436,
2448,
2449,
2451,
2459,
2460,
2538,
2539,
2629
]
}
|
{
"red_pajama_v2": {
"ccnet_original_length": 2629,
"ccnet_original_nlines": 74,
"rps_doc_curly_bracket": 0.005325220059603453,
"rps_doc_ldnoobw_words": 0,
"rps_doc_lorem_ipsum": 0,
"rps_doc_stop_word_fraction": 0.31588447093963623,
"rps_doc_ut1_blacklist": 0,
"rps_doc_frac_all_caps_words": 0.03249096870422363,
"rps_doc_frac_lines_end_with_ellipsis": 0,
"rps_doc_frac_no_alph_words": 0.25992780923843384,
"rps_doc_frac_unique_words": 0.49627792835235596,
"rps_doc_mean_word_length": 4.950372219085693,
"rps_doc_num_sentences": 18,
"rps_doc_symbol_to_word_ratio": 0,
"rps_doc_unigram_entropy": 4.9284987449646,
"rps_doc_word_count": 403,
"rps_doc_frac_chars_dupe_10grams": 0,
"rps_doc_frac_chars_dupe_5grams": 0.07218044996261597,
"rps_doc_frac_chars_dupe_6grams": 0.04711778834462166,
"rps_doc_frac_chars_dupe_7grams": 0.04711778834462166,
"rps_doc_frac_chars_dupe_8grams": 0,
"rps_doc_frac_chars_dupe_9grams": 0,
"rps_doc_frac_chars_top_2gram": 0.025563910603523254,
"rps_doc_frac_chars_top_3gram": 0.023057639598846436,
"rps_doc_frac_chars_top_4gram": 0.0300751905888319,
"rps_doc_books_importance": -271.9611511230469,
"rps_doc_books_importance_length_correction": -271.9611511230469,
"rps_doc_openwebtext_importance": -120.53298950195312,
"rps_doc_openwebtext_importance_length_correction": -120.53298950195312,
"rps_doc_wikipedia_importance": -89.99385833740234,
"rps_doc_wikipedia_importance_length_correction": -89.99385833740234
},
"fasttext": {
"dclm": 0.38086891174316406,
"english": 0.855527400970459,
"fineweb_edu_approx": 1.8461744785308838,
"eai_general_math": 0.0025467900559306145,
"eai_open_web_math": 0.040049370378255844,
"eai_web_code": 0.00035595998633652925
}
}
|
{
"free_decimal_correspondence": {
"primary": {
"code": "005.1332",
"labels": {
"level_1": "General works, books and libraries, information sciences",
"level_2": "",
"level_3": "Computer programming"
}
},
"secondary": {
"code": "005.133",
"labels": {
"level_1": "General works, books and libraries, information sciences",
"level_2": "",
"level_3": "Computer programming"
}
}
},
"bloom_cognitive_process": {
"primary": {
"code": "3",
"label": "Apply"
},
"secondary": {
"code": "2",
"label": "Understand"
}
},
"bloom_knowledge_domain": {
"primary": {
"code": "3",
"label": "Procedural"
},
"secondary": {
"code": "2",
"label": "Conceptual"
}
},
"document_type_v1": {
"primary": {
"code": "5",
"label": "Social/Forum"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"extraction_artifacts": {
"primary": {
"code": "3",
"label": "Irrelevant Content"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"missing_content": {
"primary": {
"code": "0",
"label": "No missing content"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"document_type_v2": {
"primary": {
"code": "18",
"label": "Q&A Forum"
},
"secondary": {
"code": "8",
"label": "Documentation"
}
},
"reasoning_depth": {
"primary": {
"code": "3",
"label": "Intermediate Reasoning"
},
"secondary": {
"code": "2",
"label": "Basic Reasoning"
}
},
"technical_correctness": {
"primary": {
"code": "3",
"label": "Mostly Correct"
},
"secondary": {
"code": "4",
"label": "Highly Correct"
}
},
"education_level": {
"primary": {
"code": "3",
"label": "Undergraduate Level"
},
"secondary": {
"code": "4",
"label": "Graduate/Expert Level"
}
}
}
|
672f1e42c33a7f9846924a2431ea77df
|
4,049,516,939,038,185,500 |
...
Run Format
Source file src/syscall/mksyscall_windows.go
Documentation: syscall
1 // Copyright 2013 The Go Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style
3 // license that can be found in the LICENSE file.
4
5 // +build ignore
6
7 /*
8 mksyscall_windows generates windows system call bodies
9
10 It parses all files specified on command line containing function
11 prototypes (like syscall_windows.go) and prints system call bodies
12 to standard output.
13
14 The prototypes are marked by lines beginning with "//sys" and read
15 like func declarations if //sys is replaced by func, but:
16
17 * The parameter lists must give a name for each argument. This
18 includes return parameters.
19
20 * The parameter lists must give a type for each argument:
21 the (x, y, z int) shorthand is not allowed.
22
23 * If the return parameter is an error number, it must be named err.
24
25 * If go func name needs to be different from it's winapi dll name,
26 the winapi name could be specified at the end, after "=" sign, like
27 //sys LoadLibrary(libname string) (handle uint32, err error) = LoadLibraryA
28
29 * Each function that returns err needs to supply a condition, that
30 return value of winapi will be tested against to detect failure.
31 This would set err to windows "last-error", otherwise it will be nil.
32 The value can be provided at end of //sys declaration, like
33 //sys LoadLibrary(libname string) (handle uint32, err error) [failretval==-1] = LoadLibraryA
34 and is [failretval==0] by default.
35
36 Usage:
37 mksyscall_windows [flags] [path ...]
38
39 The flags are:
40 -output
41 Specify output file name (outputs to console if blank).
42 -trace
43 Generate print statement after every syscall.
44 */
45 package main
46
47 import (
48 "bufio"
49 "bytes"
50 "errors"
51 "flag"
52 "fmt"
53 "go/format"
54 "go/parser"
55 "go/token"
56 "io"
57 "io/ioutil"
58 "log"
59 "os"
60 "path/filepath"
61 "runtime"
62 "sort"
63 "strconv"
64 "strings"
65 "text/template"
66 )
67
68 var (
69 filename = flag.String("output", "", "output file name (standard output if omitted)")
70 printTraceFlag = flag.Bool("trace", false, "generate print statement after every syscall")
71 systemDLL = flag.Bool("systemdll", true, "whether all DLLs should be loaded from the Windows system directory")
72 )
73
74 func trim(s string) string {
75 return strings.Trim(s, " \t")
76 }
77
78 var packageName string
79
80 func packagename() string {
81 return packageName
82 }
83
84 func syscalldot() string {
85 if packageName == "syscall" {
86 return ""
87 }
88 return "syscall."
89 }
90
91 // Param is function parameter
92 type Param struct {
93 Name string
94 Type string
95 fn *Fn
96 tmpVarIdx int
97 }
98
99 // tmpVar returns temp variable name that will be used to represent p during syscall.
100 func (p *Param) tmpVar() string {
101 if p.tmpVarIdx < 0 {
102 p.tmpVarIdx = p.fn.curTmpVarIdx
103 p.fn.curTmpVarIdx++
104 }
105 return fmt.Sprintf("_p%d", p.tmpVarIdx)
106 }
107
108 // BoolTmpVarCode returns source code for bool temp variable.
109 func (p *Param) BoolTmpVarCode() string {
110 const code = `var %s uint32
111 if %s {
112 %s = 1
113 } else {
114 %s = 0
115 }`
116 tmp := p.tmpVar()
117 return fmt.Sprintf(code, tmp, p.Name, tmp, tmp)
118 }
119
120 // SliceTmpVarCode returns source code for slice temp variable.
121 func (p *Param) SliceTmpVarCode() string {
122 const code = `var %s *%s
123 if len(%s) > 0 {
124 %s = &%s[0]
125 }`
126 tmp := p.tmpVar()
127 return fmt.Sprintf(code, tmp, p.Type[2:], p.Name, tmp, p.Name)
128 }
129
130 // StringTmpVarCode returns source code for string temp variable.
131 func (p *Param) StringTmpVarCode() string {
132 errvar := p.fn.Rets.ErrorVarName()
133 if errvar == "" {
134 errvar = "_"
135 }
136 tmp := p.tmpVar()
137 const code = `var %s %s
138 %s, %s = %s(%s)`
139 s := fmt.Sprintf(code, tmp, p.fn.StrconvType(), tmp, errvar, p.fn.StrconvFunc(), p.Name)
140 if errvar == "-" {
141 return s
142 }
143 const morecode = `
144 if %s != nil {
145 return
146 }`
147 return s + fmt.Sprintf(morecode, errvar)
148 }
149
150 // TmpVarCode returns source code for temp variable.
151 func (p *Param) TmpVarCode() string {
152 switch {
153 case p.Type == "bool":
154 return p.BoolTmpVarCode()
155 case strings.HasPrefix(p.Type, "[]"):
156 return p.SliceTmpVarCode()
157 default:
158 return ""
159 }
160 }
161
162 // TmpVarHelperCode returns source code for helper's temp variable.
163 func (p *Param) TmpVarHelperCode() string {
164 if p.Type != "string" {
165 return ""
166 }
167 return p.StringTmpVarCode()
168 }
169
170 // SyscallArgList returns source code fragments representing p parameter
171 // in syscall. Slices are translated into 2 syscall parameters: pointer to
172 // the first element and length.
173 func (p *Param) SyscallArgList() []string {
174 t := p.HelperType()
175 var s string
176 switch {
177 case t[0] == '*':
178 s = fmt.Sprintf("unsafe.Pointer(%s)", p.Name)
179 case t == "bool":
180 s = p.tmpVar()
181 case strings.HasPrefix(t, "[]"):
182 return []string{
183 fmt.Sprintf("uintptr(unsafe.Pointer(%s))", p.tmpVar()),
184 fmt.Sprintf("uintptr(len(%s))", p.Name),
185 }
186 default:
187 s = p.Name
188 }
189 return []string{fmt.Sprintf("uintptr(%s)", s)}
190 }
191
192 // IsError determines if p parameter is used to return error.
193 func (p *Param) IsError() bool {
194 return p.Name == "err" && p.Type == "error"
195 }
196
197 // HelperType returns type of parameter p used in helper function.
198 func (p *Param) HelperType() string {
199 if p.Type == "string" {
200 return p.fn.StrconvType()
201 }
202 return p.Type
203 }
204
205 // join concatenates parameters ps into a string with sep separator.
206 // Each parameter is converted into string by applying fn to it
207 // before conversion.
208 func join(ps []*Param, fn func(*Param) string, sep string) string {
209 if len(ps) == 0 {
210 return ""
211 }
212 a := make([]string, 0)
213 for _, p := range ps {
214 a = append(a, fn(p))
215 }
216 return strings.Join(a, sep)
217 }
218
219 // Rets describes function return parameters.
220 type Rets struct {
221 Name string
222 Type string
223 ReturnsError bool
224 FailCond string
225 }
226
227 // ErrorVarName returns error variable name for r.
228 func (r *Rets) ErrorVarName() string {
229 if r.ReturnsError {
230 return "err"
231 }
232 if r.Type == "error" {
233 return r.Name
234 }
235 return ""
236 }
237
238 // ToParams converts r into slice of *Param.
239 func (r *Rets) ToParams() []*Param {
240 ps := make([]*Param, 0)
241 if len(r.Name) > 0 {
242 ps = append(ps, &Param{Name: r.Name, Type: r.Type})
243 }
244 if r.ReturnsError {
245 ps = append(ps, &Param{Name: "err", Type: "error"})
246 }
247 return ps
248 }
249
250 // List returns source code of syscall return parameters.
251 func (r *Rets) List() string {
252 s := join(r.ToParams(), func(p *Param) string { return p.Name + " " + p.Type }, ", ")
253 if len(s) > 0 {
254 s = "(" + s + ")"
255 }
256 return s
257 }
258
259 // PrintList returns source code of trace printing part correspondent
260 // to syscall return values.
261 func (r *Rets) PrintList() string {
262 return join(r.ToParams(), func(p *Param) string { return fmt.Sprintf(`"%s=", %s, `, p.Name, p.Name) }, `", ", `)
263 }
264
265 // SetReturnValuesCode returns source code that accepts syscall return values.
266 func (r *Rets) SetReturnValuesCode() string {
267 if r.Name == "" && !r.ReturnsError {
268 return ""
269 }
270 retvar := "r0"
271 if r.Name == "" {
272 retvar = "r1"
273 }
274 errvar := "_"
275 if r.ReturnsError {
276 errvar = "e1"
277 }
278 return fmt.Sprintf("%s, _, %s := ", retvar, errvar)
279 }
280
281 func (r *Rets) useLongHandleErrorCode(retvar string) string {
282 const code = `if %s {
283 if e1 != 0 {
284 err = errnoErr(e1)
285 } else {
286 err = %sEINVAL
287 }
288 }`
289 cond := retvar + " == 0"
290 if r.FailCond != "" {
291 cond = strings.Replace(r.FailCond, "failretval", retvar, 1)
292 }
293 return fmt.Sprintf(code, cond, syscalldot())
294 }
295
296 // SetErrorCode returns source code that sets return parameters.
297 func (r *Rets) SetErrorCode() string {
298 const code = `if r0 != 0 {
299 %s = %sErrno(r0)
300 }`
301 if r.Name == "" && !r.ReturnsError {
302 return ""
303 }
304 if r.Name == "" {
305 return r.useLongHandleErrorCode("r1")
306 }
307 if r.Type == "error" {
308 return fmt.Sprintf(code, r.Name, syscalldot())
309 }
310 s := ""
311 switch {
312 case r.Type[0] == '*':
313 s = fmt.Sprintf("%s = (%s)(unsafe.Pointer(r0))", r.Name, r.Type)
314 case r.Type == "bool":
315 s = fmt.Sprintf("%s = r0 != 0", r.Name)
316 default:
317 s = fmt.Sprintf("%s = %s(r0)", r.Name, r.Type)
318 }
319 if !r.ReturnsError {
320 return s
321 }
322 return s + "\n\t" + r.useLongHandleErrorCode(r.Name)
323 }
324
325 // Fn describes syscall function.
326 type Fn struct {
327 Name string
328 Params []*Param
329 Rets *Rets
330 PrintTrace bool
331 dllname string
332 dllfuncname string
333 src string
334 // TODO: get rid of this field and just use parameter index instead
335 curTmpVarIdx int // insure tmp variables have uniq names
336 }
337
338 // extractParams parses s to extract function parameters.
339 func extractParams(s string, f *Fn) ([]*Param, error) {
340 s = trim(s)
341 if s == "" {
342 return nil, nil
343 }
344 a := strings.Split(s, ",")
345 ps := make([]*Param, len(a))
346 for i := range ps {
347 s2 := trim(a[i])
348 b := strings.Split(s2, " ")
349 if len(b) != 2 {
350 b = strings.Split(s2, "\t")
351 if len(b) != 2 {
352 return nil, errors.New("Could not extract function parameter from \"" + s2 + "\"")
353 }
354 }
355 ps[i] = &Param{
356 Name: trim(b[0]),
357 Type: trim(b[1]),
358 fn: f,
359 tmpVarIdx: -1,
360 }
361 }
362 return ps, nil
363 }
364
365 // extractSection extracts text out of string s starting after start
366 // and ending just before end. found return value will indicate success,
367 // and prefix, body and suffix will contain correspondent parts of string s.
368 func extractSection(s string, start, end rune) (prefix, body, suffix string, found bool) {
369 s = trim(s)
370 if strings.HasPrefix(s, string(start)) {
371 // no prefix
372 body = s[1:]
373 } else {
374 a := strings.SplitN(s, string(start), 2)
375 if len(a) != 2 {
376 return "", "", s, false
377 }
378 prefix = a[0]
379 body = a[1]
380 }
381 a := strings.SplitN(body, string(end), 2)
382 if len(a) != 2 {
383 return "", "", "", false
384 }
385 return prefix, a[0], a[1], true
386 }
387
388 // newFn parses string s and return created function Fn.
389 func newFn(s string) (*Fn, error) {
390 s = trim(s)
391 f := &Fn{
392 Rets: &Rets{},
393 src: s,
394 PrintTrace: *printTraceFlag,
395 }
396 // function name and args
397 prefix, body, s, found := extractSection(s, '(', ')')
398 if !found || prefix == "" {
399 return nil, errors.New("Could not extract function name and parameters from \"" + f.src + "\"")
400 }
401 f.Name = prefix
402 var err error
403 f.Params, err = extractParams(body, f)
404 if err != nil {
405 return nil, err
406 }
407 // return values
408 _, body, s, found = extractSection(s, '(', ')')
409 if found {
410 r, err := extractParams(body, f)
411 if err != nil {
412 return nil, err
413 }
414 switch len(r) {
415 case 0:
416 case 1:
417 if r[0].IsError() {
418 f.Rets.ReturnsError = true
419 } else {
420 f.Rets.Name = r[0].Name
421 f.Rets.Type = r[0].Type
422 }
423 case 2:
424 if !r[1].IsError() {
425 return nil, errors.New("Only last windows error is allowed as second return value in \"" + f.src + "\"")
426 }
427 f.Rets.ReturnsError = true
428 f.Rets.Name = r[0].Name
429 f.Rets.Type = r[0].Type
430 default:
431 return nil, errors.New("Too many return values in \"" + f.src + "\"")
432 }
433 }
434 // fail condition
435 _, body, s, found = extractSection(s, '[', ']')
436 if found {
437 f.Rets.FailCond = body
438 }
439 // dll and dll function names
440 s = trim(s)
441 if s == "" {
442 return f, nil
443 }
444 if !strings.HasPrefix(s, "=") {
445 return nil, errors.New("Could not extract dll name from \"" + f.src + "\"")
446 }
447 s = trim(s[1:])
448 a := strings.Split(s, ".")
449 switch len(a) {
450 case 1:
451 f.dllfuncname = a[0]
452 case 2:
453 f.dllname = a[0]
454 f.dllfuncname = a[1]
455 default:
456 return nil, errors.New("Could not extract dll name from \"" + f.src + "\"")
457 }
458 return f, nil
459 }
460
461 // DLLName returns DLL name for function f.
462 func (f *Fn) DLLName() string {
463 if f.dllname == "" {
464 return "kernel32"
465 }
466 return f.dllname
467 }
468
469 // DLLName returns DLL function name for function f.
470 func (f *Fn) DLLFuncName() string {
471 if f.dllfuncname == "" {
472 return f.Name
473 }
474 return f.dllfuncname
475 }
476
477 // ParamList returns source code for function f parameters.
478 func (f *Fn) ParamList() string {
479 return join(f.Params, func(p *Param) string { return p.Name + " " + p.Type }, ", ")
480 }
481
482 // HelperParamList returns source code for helper function f parameters.
483 func (f *Fn) HelperParamList() string {
484 return join(f.Params, func(p *Param) string { return p.Name + " " + p.HelperType() }, ", ")
485 }
486
487 // ParamPrintList returns source code of trace printing part correspondent
488 // to syscall input parameters.
489 func (f *Fn) ParamPrintList() string {
490 return join(f.Params, func(p *Param) string { return fmt.Sprintf(`"%s=", %s, `, p.Name, p.Name) }, `", ", `)
491 }
492
493 // ParamCount return number of syscall parameters for function f.
494 func (f *Fn) ParamCount() int {
495 n := 0
496 for _, p := range f.Params {
497 n += len(p.SyscallArgList())
498 }
499 return n
500 }
501
502 // SyscallParamCount determines which version of Syscall/Syscall6/Syscall9/...
503 // to use. It returns parameter count for correspondent SyscallX function.
504 func (f *Fn) SyscallParamCount() int {
505 n := f.ParamCount()
506 switch {
507 case n <= 3:
508 return 3
509 case n <= 6:
510 return 6
511 case n <= 9:
512 return 9
513 case n <= 12:
514 return 12
515 case n <= 15:
516 return 15
517 default:
518 panic("too many arguments to system call")
519 }
520 }
521
522 // Syscall determines which SyscallX function to use for function f.
523 func (f *Fn) Syscall() string {
524 c := f.SyscallParamCount()
525 if c == 3 {
526 return syscalldot() + "Syscall"
527 }
528 return syscalldot() + "Syscall" + strconv.Itoa(c)
529 }
530
531 // SyscallParamList returns source code for SyscallX parameters for function f.
532 func (f *Fn) SyscallParamList() string {
533 a := make([]string, 0)
534 for _, p := range f.Params {
535 a = append(a, p.SyscallArgList()...)
536 }
537 for len(a) < f.SyscallParamCount() {
538 a = append(a, "0")
539 }
540 return strings.Join(a, ", ")
541 }
542
543 // HelperCallParamList returns source code of call into function f helper.
544 func (f *Fn) HelperCallParamList() string {
545 a := make([]string, 0, len(f.Params))
546 for _, p := range f.Params {
547 s := p.Name
548 if p.Type == "string" {
549 s = p.tmpVar()
550 }
551 a = append(a, s)
552 }
553 return strings.Join(a, ", ")
554 }
555
556 // IsUTF16 is true, if f is W (utf16) function. It is false
557 // for all A (ascii) functions.
558 func (f *Fn) IsUTF16() bool {
559 s := f.DLLFuncName()
560 return s[len(s)-1] == 'W'
561 }
562
563 // StrconvFunc returns name of Go string to OS string function for f.
564 func (f *Fn) StrconvFunc() string {
565 if f.IsUTF16() {
566 return syscalldot() + "UTF16PtrFromString"
567 }
568 return syscalldot() + "BytePtrFromString"
569 }
570
571 // StrconvType returns Go type name used for OS string for f.
572 func (f *Fn) StrconvType() string {
573 if f.IsUTF16() {
574 return "*uint16"
575 }
576 return "*byte"
577 }
578
579 // HasStringParam is true, if f has at least one string parameter.
580 // Otherwise it is false.
581 func (f *Fn) HasStringParam() bool {
582 for _, p := range f.Params {
583 if p.Type == "string" {
584 return true
585 }
586 }
587 return false
588 }
589
590 // HelperName returns name of function f helper.
591 func (f *Fn) HelperName() string {
592 if !f.HasStringParam() {
593 return f.Name
594 }
595 return "_" + f.Name
596 }
597
598 // Source files and functions.
599 type Source struct {
600 Funcs []*Fn
601 Files []string
602 StdLibImports []string
603 ExternalImports []string
604 }
605
606 func (src *Source) Import(pkg string) {
607 src.StdLibImports = append(src.StdLibImports, pkg)
608 sort.Strings(src.StdLibImports)
609 }
610
611 func (src *Source) ExternalImport(pkg string) {
612 src.ExternalImports = append(src.ExternalImports, pkg)
613 sort.Strings(src.ExternalImports)
614 }
615
616 // ParseFiles parses files listed in fs and extracts all syscall
617 // functions listed in sys comments. It returns source files
618 // and functions collection *Source if successful.
619 func ParseFiles(fs []string) (*Source, error) {
620 src := &Source{
621 Funcs: make([]*Fn, 0),
622 Files: make([]string, 0),
623 StdLibImports: []string{
624 "unsafe",
625 },
626 ExternalImports: make([]string, 0),
627 }
628 for _, file := range fs {
629 if err := src.ParseFile(file); err != nil {
630 return nil, err
631 }
632 }
633 return src, nil
634 }
635
636 // DLLs return dll names for a source set src.
637 func (src *Source) DLLs() []string {
638 uniq := make(map[string]bool)
639 r := make([]string, 0)
640 for _, f := range src.Funcs {
641 name := f.DLLName()
642 if _, found := uniq[name]; !found {
643 uniq[name] = true
644 r = append(r, name)
645 }
646 }
647 return r
648 }
649
650 // ParseFile adds additional file path to a source set src.
651 func (src *Source) ParseFile(path string) error {
652 file, err := os.Open(path)
653 if err != nil {
654 return err
655 }
656 defer file.Close()
657
658 s := bufio.NewScanner(file)
659 for s.Scan() {
660 t := trim(s.Text())
661 if len(t) < 7 {
662 continue
663 }
664 if !strings.HasPrefix(t, "//sys") {
665 continue
666 }
667 t = t[5:]
668 if !(t[0] == ' ' || t[0] == '\t') {
669 continue
670 }
671 f, err := newFn(t[1:])
672 if err != nil {
673 return err
674 }
675 src.Funcs = append(src.Funcs, f)
676 }
677 if err := s.Err(); err != nil {
678 return err
679 }
680 src.Files = append(src.Files, path)
681
682 // get package name
683 fset := token.NewFileSet()
684 _, err = file.Seek(0, 0)
685 if err != nil {
686 return err
687 }
688 pkg, err := parser.ParseFile(fset, "", file, parser.PackageClauseOnly)
689 if err != nil {
690 return err
691 }
692 packageName = pkg.Name.Name
693
694 return nil
695 }
696
697 // IsStdRepo returns true if src is part of standard library.
698 func (src *Source) IsStdRepo() (bool, error) {
699 if len(src.Files) == 0 {
700 return false, errors.New("no input files provided")
701 }
702 abspath, err := filepath.Abs(src.Files[0])
703 if err != nil {
704 return false, err
705 }
706 goroot := runtime.GOROOT()
707 if runtime.GOOS == "windows" {
708 abspath = strings.ToLower(abspath)
709 goroot = strings.ToLower(goroot)
710 }
711 sep := string(os.PathSeparator)
712 if !strings.HasSuffix(goroot, sep) {
713 goroot += sep
714 }
715 return strings.HasPrefix(abspath, goroot), nil
716 }
717
718 // Generate output source file from a source set src.
719 func (src *Source) Generate(w io.Writer) error {
720 const (
721 pkgStd = iota // any package in std library
722 pkgXSysWindows // x/sys/windows package
723 pkgOther
724 )
725 isStdRepo, err := src.IsStdRepo()
726 if err != nil {
727 return err
728 }
729 var pkgtype int
730 switch {
731 case isStdRepo:
732 pkgtype = pkgStd
733 case packageName == "windows":
734 // TODO: this needs better logic than just using package name
735 pkgtype = pkgXSysWindows
736 default:
737 pkgtype = pkgOther
738 }
739 if *systemDLL {
740 switch pkgtype {
741 case pkgStd:
742 src.Import("internal/syscall/windows/sysdll")
743 case pkgXSysWindows:
744 default:
745 src.ExternalImport("golang.org/x/sys/windows")
746 }
747 }
748 if packageName != "syscall" {
749 src.Import("syscall")
750 }
751 funcMap := template.FuncMap{
752 "packagename": packagename,
753 "syscalldot": syscalldot,
754 "newlazydll": func(dll string) string {
755 arg := "\"" + dll + ".dll\""
756 if !*systemDLL {
757 return syscalldot() + "NewLazyDLL(" + arg + ")"
758 }
759 switch pkgtype {
760 case pkgStd:
761 return syscalldot() + "NewLazyDLL(sysdll.Add(" + arg + "))"
762 case pkgXSysWindows:
763 return "NewLazySystemDLL(" + arg + ")"
764 default:
765 return "windows.NewLazySystemDLL(" + arg + ")"
766 }
767 },
768 }
769 t := template.Must(template.New("main").Funcs(funcMap).Parse(srcTemplate))
770 err = t.Execute(w, src)
771 if err != nil {
772 return errors.New("Failed to execute template: " + err.Error())
773 }
774 return nil
775 }
776
777 func usage() {
778 fmt.Fprintf(os.Stderr, "usage: mksyscall_windows [flags] [path ...]\n")
779 flag.PrintDefaults()
780 os.Exit(1)
781 }
782
783 func main() {
784 flag.Usage = usage
785 flag.Parse()
786 if len(flag.Args()) <= 0 {
787 fmt.Fprintf(os.Stderr, "no files to parse provided\n")
788 usage()
789 }
790
791 src, err := ParseFiles(flag.Args())
792 if err != nil {
793 log.Fatal(err)
794 }
795
796 var buf bytes.Buffer
797 if err := src.Generate(&buf); err != nil {
798 log.Fatal(err)
799 }
800
801 data, err := format.Source(buf.Bytes())
802 if err != nil {
803 log.Fatal(err)
804 }
805 if *filename == "" {
806 _, err = os.Stdout.Write(data)
807 } else {
808 err = ioutil.WriteFile(*filename, data, 0644)
809 }
810 if err != nil {
811 log.Fatal(err)
812 }
813 }
814
815 // TODO: use println instead to print in the following template
816 const srcTemplate = `
817
818 {{define "main"}}// MACHINE GENERATED BY 'go generate' COMMAND; DO NOT EDIT
819
820 package {{packagename}}
821
822 import (
823 {{range .StdLibImports}}"{{.}}"
824 {{end}}
825
826 {{range .ExternalImports}}"{{.}}"
827 {{end}}
828 )
829
830 var _ unsafe.Pointer
831
832 // Do the interface allocations only once for common
833 // Errno values.
834 const (
835 errnoERROR_IO_PENDING = 997
836 )
837
838 var (
839 errERROR_IO_PENDING error = {{syscalldot}}Errno(errnoERROR_IO_PENDING)
840 )
841
842 // errnoErr returns common boxed Errno values, to prevent
843 // allocations at runtime.
844 func errnoErr(e {{syscalldot}}Errno) error {
845 switch e {
846 case 0:
847 return nil
848 case errnoERROR_IO_PENDING:
849 return errERROR_IO_PENDING
850 }
851 // TODO: add more here, after collecting data on the common
852 // error values see on Windows. (perhaps when running
853 // all.bat?)
854 return e
855 }
856
857 var (
858 {{template "dlls" .}}
859 {{template "funcnames" .}})
860 {{range .Funcs}}{{if .HasStringParam}}{{template "helperbody" .}}{{end}}{{template "funcbody" .}}{{end}}
861 {{end}}
862
863 {{/* help functions */}}
864
865 {{define "dlls"}}{{range .DLLs}} mod{{.}} = {{newlazydll .}}
866 {{end}}{{end}}
867
868 {{define "funcnames"}}{{range .Funcs}} proc{{.DLLFuncName}} = mod{{.DLLName}}.NewProc("{{.DLLFuncName}}")
869 {{end}}{{end}}
870
871 {{define "helperbody"}}
872 func {{.Name}}({{.ParamList}}) {{template "results" .}}{
873 {{template "helpertmpvars" .}} return {{.HelperName}}({{.HelperCallParamList}})
874 }
875 {{end}}
876
877 {{define "funcbody"}}
878 func {{.HelperName}}({{.HelperParamList}}) {{template "results" .}}{
879 {{template "tmpvars" .}} {{template "syscall" .}}
880 {{template "seterror" .}}{{template "printtrace" .}} return
881 }
882 {{end}}
883
884 {{define "helpertmpvars"}}{{range .Params}}{{if .TmpVarHelperCode}} {{.TmpVarHelperCode}}
885 {{end}}{{end}}{{end}}
886
887 {{define "tmpvars"}}{{range .Params}}{{if .TmpVarCode}} {{.TmpVarCode}}
888 {{end}}{{end}}{{end}}
889
890 {{define "results"}}{{if .Rets.List}}{{.Rets.List}} {{end}}{{end}}
891
892 {{define "syscall"}}{{.Rets.SetReturnValuesCode}}{{.Syscall}}(proc{{.DLLFuncName}}.Addr(), {{.ParamCount}}, {{.SyscallParamList}}){{end}}
893
894 {{define "seterror"}}{{if .Rets.SetErrorCode}} {{.Rets.SetErrorCode}}
895 {{end}}{{end}}
896
897 {{define "printtrace"}}{{if .PrintTrace}} print("SYSCALL: {{.Name}}(", {{.ParamPrintList}}") (", {{.Rets.PrintList}}")\n")
898 {{end}}{{end}}
899
900 `
901
View as plain text
|
{
"url": "https://golang.org/src/syscall/mksyscall_windows.go",
"source_domain": "golang.org",
"snapshot_id": "crawl=CC-MAIN-2018-09",
"warc_metadata": {
"Content-Length": "77323",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:SHJ7IJ542YZ66FLV73CZVQETJ4AZ34IY",
"WARC-Concurrent-To": "<urn:uuid:03db7393-5d1a-4493-8ba0-28cbfbb67572>",
"WARC-Date": "2018-02-24T22:08:54Z",
"WARC-IP-Address": "172.217.15.113",
"WARC-Identified-Payload-Type": "text/html",
"WARC-Payload-Digest": "sha1:IA4WIY2OGNCBTAKJ4GFTHXEGJSECU32K",
"WARC-Record-ID": "<urn:uuid:60166c24-82e3-4ea5-8c6e-3c66107b3203>",
"WARC-Target-URI": "https://golang.org/src/syscall/mksyscall_windows.go",
"WARC-Truncated": null,
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:35fc1080-c571-4499-86db-3713717410af>"
},
"warc_info": "robots: classic\r\nhostname: ip-10-141-213-112.ec2.internal\r\nsoftware: Nutch 1.6 (CC)\r\nisPartOf: CC-MAIN-2018-09\r\noperator: Common Crawl Admin\r\ndescription: Wide crawl of the web for February 2018\r\npublisher: Common Crawl\r\nformat: WARC File Format 1.0\r\nconformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf"
}
|
{
"line_start_idx": [
0,
4,
15,
16,
61,
62,
85,
86,
149,
211,
269,
278,
303,
312,
323,
386,
395,
469,
544,
572,
581,
656,
722,
731,
802,
840,
849,
915,
969,
978,
1054,
1063,
1138,
1216,
1302,
1311,
1386,
1461,
1541,
1611,
1714,
1759,
1768,
1783,
1829,
1838,
1861,
1878,
1944,
1960,
2016,
2027,
2048,
2057,
2074,
2091,
2108,
2126,
2142,
2157,
2178,
2199,
2219,
2233,
2254,
2269,
2283,
2308,
2327,
2343,
2362,
2381,
2406,
2416,
2425,
2439,
2540,
2640,
2766,
2776,
2785,
2822,
2861,
2871,
2880,
2911,
2920,
2956,
2984,
2994,
3003,
3038,
3077,
3097,
3108,
3135,
3145,
3154,
3193,
3221,
3247,
3273,
3296,
3319,
3329,
3338,
3432,
3474,
3504,
3546,
3576,
3587,
3636,
3646,
3655,
3725,
3775,
3812,
3829,
3846,
3864,
3881,
3893,
3920,
3977,
3987,
3996,
4068,
4119,
4153,
4179,
4201,
4213,
4240,
4312,
4322,
4331,
4405,
4457,
4501,
4528,
4551,
4562,
4589,
4622,
4648,
4746,
4774,
4793,
4804,
4832,
4856,
4873,
4885,
4935,
4945,
4954,
5015,
5061,
5079,
5111,
5147,
5194,
5231,
5249,
5269,
5280,
5290,
5299,
5375,
5427,
5460,
5480,
5491,
5528,
5538,
5547,
5628,
5711,
5752,
5804,
5833,
5855,
5873,
5900,
5956,
5983,
6008,
6050,
6077,
6144,
6196,
6208,
6226,
6247,
6258,
6314,
6324,
6333,
6403,
6444,
6497,
6507,
6516,
6591,
6637,
6670,
6706,
6717,
6740,
6750,
6759,
6836,
6908,
6938,
7014,
7041,
7061,
7072,
7104,
7136,
7167,
7178,
7215,
7225,
7234,
7288,
7315,
7344,
7373,
7400,
7429,
7439,
7448,
7507,
7554,
7583,
7606,
7617,
7649,
7673,
7684,
7703,
7713,
7722,
7775,
7820,
7853,
7883,
7945,
7956,
7985,
8047,
8058,
8077,
8087,
8096,
8162,
8201,
8296,
8321,
8349,
8360,
8378,
8388,
8397,
8475,
8512,
8556,
8678,
8688,
8697,
8784,
8838,
8884,
8904,
8915,
8939,
8966,
8990,
9001,
9024,
9053,
9077,
9088,
9149,
9159,
9168,
9238,
9269,
9292,
9322,
9341,
9367,
9379,
9391,
9425,
9456,
9526,
9537,
9591,
9601,
9610,
9683,
9730,
9766,
9793,
9805,
9851,
9871,
9882,
9909,
9957,
9968,
10000,
10057,
10068,
10085,
10103,
10135,
10210,
10242,
10292,
10310,
10367,
10378,
10408,
10427,
10438,
10500,
10510,
10519,
10561,
10586,
10614,
10644,
10671,
10697,
10725,
10753,
10781,
10858,
10924,
10934,
10943,
11009,
11073,
11094,
11116,
11142,
11153,
11189,
11227,
11256,
11283,
11321,
11348,
11387,
11415,
11510,
11523,
11535,
11561,
11595,
11629,
11654,
11680,
11692,
11703,
11727,
11737,
11746,
11823,
11904,
11989,
12088,
12109,
12159,
12182,
12205,
12223,
12274,
12301,
12336,
12348,
12372,
12394,
12405,
12456,
12482,
12517,
12528,
12569,
12579,
12588,
12653,
12697,
12718,
12737,
12768,
12793,
12832,
12843,
12878,
12941,
12978,
13084,
13095,
13120,
13143,
13191,
13216,
13242,
13253,
13279,
13336,
13356,
13399,
13425,
13452,
13464,
13490,
13508,
13526,
13557,
13596,
13616,
13652,
13688,
13701,
13719,
13751,
13868,
13881,
13919,
13954,
13989,
14008,
14089,
14101,
14112,
14139,
14196,
14216,
14249,
14260,
14299,
14320,
14342,
14366,
14377,
14418,
14504,
14515,
14540,
14576,
14601,
14618,
14649,
14666,
14693,
14724,
14742,
14828,
14839,
14862,
14872,
14881,
14933,
14973,
15003,
15031,
15042,
15068,
15078,
15087,
15148,
15192,
15226,
15250,
15261,
15291,
15301,
15310,
15378,
15420,
15513,
15523,
15532,
15613,
15661,
15762,
15772,
15781,
15864,
15904,
15951,
16069,
16079,
16088,
16162,
16202,
16218,
16256,
16295,
16306,
16324,
16334,
16343,
16430,
16513,
16560,
16589,
16607,
16629,
16648,
16670,
16689,
16711,
16730,
16753,
16773,
16796,
16816,
16834,
16887,
16898,
16908,
16917,
16994,
17034,
17070,
17091,
17133,
17144,
17203,
17213,
17222,
17310,
17359,
17391,
17429,
17476,
17487,
17533,
17562,
17573,
17611,
17621,
17630,
17713,
17765,
17812,
17850,
17872,
17906,
17932,
17944,
17971,
17982,
18020,
18030,
18039,
18107,
18147,
18185,
18215,
18250,
18260,
18269,
18347,
18391,
18417,
18470,
18481,
18532,
18542,
18551,
18621,
18665,
18691,
18718,
18729,
18753,
18763,
18772,
18847,
18881,
18926,
18964,
18998,
19021,
19033,
19044,
19066,
19076,
19085,
19142,
19185,
19219,
19243,
19254,
19283,
19293,
19302,
19341,
19370,
19401,
19435,
19469,
19503,
19513,
19522,
19570,
19630,
19671,
19681,
19690,
19746,
19810,
19853,
19863,
19872,
19945,
20014,
20073,
20129,
20154,
20187,
20223,
20258,
20279,
20292,
20338,
20349,
20384,
20438,
20465,
20477,
20488,
20513,
20523,
20532,
20587,
20632,
20671,
20703,
20742,
20772,
20818,
20847,
20878,
20890,
20901,
20919,
20929,
20938,
21006,
21064,
21100,
21125,
21146,
21157,
21185,
21194,
21231,
21255,
21285,
21311,
21331,
21343,
21389,
21409,
21421,
21441,
21487,
21507,
21519,
21552,
21578,
21600,
21612,
21655,
21666,
21707,
21728,
21739,
21784,
21793,
21822,
21858,
21892,
21917,
21938,
21949,
22029,
22054,
22075,
22086,
22123,
22132,
22152,
22162,
22171,
22241,
22296,
22330,
22392,
22403,
22455,
22480,
22508,
22519,
22555,
22595,
22640,
22683,
22694,
22735,
22781,
22805,
22816,
22872,
22882,
22891,
22953,
23010,
23027,
23089,
23146,
23165,
23176,
23219,
23244,
23265,
23276,
23301,
23319,
23344,
23371,
23411,
23483,
23518,
23536,
23565,
23576,
23601,
23628,
23651,
23708,
23739,
23758,
23816,
23828,
23839,
23878,
23910,
23921,
23959,
23997,
24034,
24084,
24124,
24152,
24212,
24225,
24253,
24277,
24349,
24381,
24432,
24452,
24511,
24524,
24537,
24548,
24632,
24665,
24690,
24764,
24775,
24795,
24805,
24814,
24837,
24918,
24948,
24968,
24978,
24987,
25009,
25037,
25059,
25095,
25160,
25178,
25189,
25198,
25243,
25268,
25293,
25304,
25313,
25343,
25395,
25420,
25431,
25440,
25489,
25514,
25539,
25550,
25580,
25621,
25639,
25695,
25706,
25731,
25756,
25767,
25777,
25786,
25858,
25888,
25897,
25981,
25990,
26022,
26031,
26048,
26088,
26104,
26113,
26155,
26171,
26181,
26190,
26219,
26228,
26289,
26314,
26330,
26367,
26377,
26386,
26400,
26480,
26490,
26499,
26565,
26600,
26653,
26673,
26690,
26711,
26748,
26785,
26796,
26865,
26928,
26950,
26968,
26978,
26987,
27001,
27031,
27067,
27180,
27196,
27205,
27238,
27247,
27316,
27339,
27348,
27462,
27485,
27494,
27526,
27591,
27679,
27689,
27705,
27714,
27744,
27821,
27879,
27947,
27957,
27973,
27982,
28080,
28110,
28119,
28199,
28229,
28238,
28313,
28322,
28468,
28477,
28555,
28578,
28587,
28718,
28741,
28750,
28760,
28769,
28770
],
"line_end_idx": [
4,
15,
16,
61,
62,
85,
86,
149,
211,
269,
278,
303,
312,
323,
386,
395,
469,
544,
572,
581,
656,
722,
731,
802,
840,
849,
915,
969,
978,
1054,
1063,
1138,
1216,
1302,
1311,
1386,
1461,
1541,
1611,
1714,
1759,
1768,
1783,
1829,
1838,
1861,
1878,
1944,
1960,
2016,
2027,
2048,
2057,
2074,
2091,
2108,
2126,
2142,
2157,
2178,
2199,
2219,
2233,
2254,
2269,
2283,
2308,
2327,
2343,
2362,
2381,
2406,
2416,
2425,
2439,
2540,
2640,
2766,
2776,
2785,
2822,
2861,
2871,
2880,
2911,
2920,
2956,
2984,
2994,
3003,
3038,
3077,
3097,
3108,
3135,
3145,
3154,
3193,
3221,
3247,
3273,
3296,
3319,
3329,
3338,
3432,
3474,
3504,
3546,
3576,
3587,
3636,
3646,
3655,
3725,
3775,
3812,
3829,
3846,
3864,
3881,
3893,
3920,
3977,
3987,
3996,
4068,
4119,
4153,
4179,
4201,
4213,
4240,
4312,
4322,
4331,
4405,
4457,
4501,
4528,
4551,
4562,
4589,
4622,
4648,
4746,
4774,
4793,
4804,
4832,
4856,
4873,
4885,
4935,
4945,
4954,
5015,
5061,
5079,
5111,
5147,
5194,
5231,
5249,
5269,
5280,
5290,
5299,
5375,
5427,
5460,
5480,
5491,
5528,
5538,
5547,
5628,
5711,
5752,
5804,
5833,
5855,
5873,
5900,
5956,
5983,
6008,
6050,
6077,
6144,
6196,
6208,
6226,
6247,
6258,
6314,
6324,
6333,
6403,
6444,
6497,
6507,
6516,
6591,
6637,
6670,
6706,
6717,
6740,
6750,
6759,
6836,
6908,
6938,
7014,
7041,
7061,
7072,
7104,
7136,
7167,
7178,
7215,
7225,
7234,
7288,
7315,
7344,
7373,
7400,
7429,
7439,
7448,
7507,
7554,
7583,
7606,
7617,
7649,
7673,
7684,
7703,
7713,
7722,
7775,
7820,
7853,
7883,
7945,
7956,
7985,
8047,
8058,
8077,
8087,
8096,
8162,
8201,
8296,
8321,
8349,
8360,
8378,
8388,
8397,
8475,
8512,
8556,
8678,
8688,
8697,
8784,
8838,
8884,
8904,
8915,
8939,
8966,
8990,
9001,
9024,
9053,
9077,
9088,
9149,
9159,
9168,
9238,
9269,
9292,
9322,
9341,
9367,
9379,
9391,
9425,
9456,
9526,
9537,
9591,
9601,
9610,
9683,
9730,
9766,
9793,
9805,
9851,
9871,
9882,
9909,
9957,
9968,
10000,
10057,
10068,
10085,
10103,
10135,
10210,
10242,
10292,
10310,
10367,
10378,
10408,
10427,
10438,
10500,
10510,
10519,
10561,
10586,
10614,
10644,
10671,
10697,
10725,
10753,
10781,
10858,
10924,
10934,
10943,
11009,
11073,
11094,
11116,
11142,
11153,
11189,
11227,
11256,
11283,
11321,
11348,
11387,
11415,
11510,
11523,
11535,
11561,
11595,
11629,
11654,
11680,
11692,
11703,
11727,
11737,
11746,
11823,
11904,
11989,
12088,
12109,
12159,
12182,
12205,
12223,
12274,
12301,
12336,
12348,
12372,
12394,
12405,
12456,
12482,
12517,
12528,
12569,
12579,
12588,
12653,
12697,
12718,
12737,
12768,
12793,
12832,
12843,
12878,
12941,
12978,
13084,
13095,
13120,
13143,
13191,
13216,
13242,
13253,
13279,
13336,
13356,
13399,
13425,
13452,
13464,
13490,
13508,
13526,
13557,
13596,
13616,
13652,
13688,
13701,
13719,
13751,
13868,
13881,
13919,
13954,
13989,
14008,
14089,
14101,
14112,
14139,
14196,
14216,
14249,
14260,
14299,
14320,
14342,
14366,
14377,
14418,
14504,
14515,
14540,
14576,
14601,
14618,
14649,
14666,
14693,
14724,
14742,
14828,
14839,
14862,
14872,
14881,
14933,
14973,
15003,
15031,
15042,
15068,
15078,
15087,
15148,
15192,
15226,
15250,
15261,
15291,
15301,
15310,
15378,
15420,
15513,
15523,
15532,
15613,
15661,
15762,
15772,
15781,
15864,
15904,
15951,
16069,
16079,
16088,
16162,
16202,
16218,
16256,
16295,
16306,
16324,
16334,
16343,
16430,
16513,
16560,
16589,
16607,
16629,
16648,
16670,
16689,
16711,
16730,
16753,
16773,
16796,
16816,
16834,
16887,
16898,
16908,
16917,
16994,
17034,
17070,
17091,
17133,
17144,
17203,
17213,
17222,
17310,
17359,
17391,
17429,
17476,
17487,
17533,
17562,
17573,
17611,
17621,
17630,
17713,
17765,
17812,
17850,
17872,
17906,
17932,
17944,
17971,
17982,
18020,
18030,
18039,
18107,
18147,
18185,
18215,
18250,
18260,
18269,
18347,
18391,
18417,
18470,
18481,
18532,
18542,
18551,
18621,
18665,
18691,
18718,
18729,
18753,
18763,
18772,
18847,
18881,
18926,
18964,
18998,
19021,
19033,
19044,
19066,
19076,
19085,
19142,
19185,
19219,
19243,
19254,
19283,
19293,
19302,
19341,
19370,
19401,
19435,
19469,
19503,
19513,
19522,
19570,
19630,
19671,
19681,
19690,
19746,
19810,
19853,
19863,
19872,
19945,
20014,
20073,
20129,
20154,
20187,
20223,
20258,
20279,
20292,
20338,
20349,
20384,
20438,
20465,
20477,
20488,
20513,
20523,
20532,
20587,
20632,
20671,
20703,
20742,
20772,
20818,
20847,
20878,
20890,
20901,
20919,
20929,
20938,
21006,
21064,
21100,
21125,
21146,
21157,
21185,
21194,
21231,
21255,
21285,
21311,
21331,
21343,
21389,
21409,
21421,
21441,
21487,
21507,
21519,
21552,
21578,
21600,
21612,
21655,
21666,
21707,
21728,
21739,
21784,
21793,
21822,
21858,
21892,
21917,
21938,
21949,
22029,
22054,
22075,
22086,
22123,
22132,
22152,
22162,
22171,
22241,
22296,
22330,
22392,
22403,
22455,
22480,
22508,
22519,
22555,
22595,
22640,
22683,
22694,
22735,
22781,
22805,
22816,
22872,
22882,
22891,
22953,
23010,
23027,
23089,
23146,
23165,
23176,
23219,
23244,
23265,
23276,
23301,
23319,
23344,
23371,
23411,
23483,
23518,
23536,
23565,
23576,
23601,
23628,
23651,
23708,
23739,
23758,
23816,
23828,
23839,
23878,
23910,
23921,
23959,
23997,
24034,
24084,
24124,
24152,
24212,
24225,
24253,
24277,
24349,
24381,
24432,
24452,
24511,
24524,
24537,
24548,
24632,
24665,
24690,
24764,
24775,
24795,
24805,
24814,
24837,
24918,
24948,
24968,
24978,
24987,
25009,
25037,
25059,
25095,
25160,
25178,
25189,
25198,
25243,
25268,
25293,
25304,
25313,
25343,
25395,
25420,
25431,
25440,
25489,
25514,
25539,
25550,
25580,
25621,
25639,
25695,
25706,
25731,
25756,
25767,
25777,
25786,
25858,
25888,
25897,
25981,
25990,
26022,
26031,
26048,
26088,
26104,
26113,
26155,
26171,
26181,
26190,
26219,
26228,
26289,
26314,
26330,
26367,
26377,
26386,
26400,
26480,
26490,
26499,
26565,
26600,
26653,
26673,
26690,
26711,
26748,
26785,
26796,
26865,
26928,
26950,
26968,
26978,
26987,
27001,
27031,
27067,
27180,
27196,
27205,
27238,
27247,
27316,
27339,
27348,
27462,
27485,
27494,
27526,
27591,
27679,
27689,
27705,
27714,
27744,
27821,
27879,
27947,
27957,
27973,
27982,
28080,
28110,
28119,
28199,
28229,
28238,
28313,
28322,
28468,
28477,
28555,
28578,
28587,
28718,
28741,
28750,
28760,
28769,
28770,
28788
]
}
|
{
"red_pajama_v2": {
"ccnet_original_length": 28788,
"ccnet_original_nlines": 909,
"rps_doc_curly_bracket": 0.023968320339918137,
"rps_doc_ldnoobw_words": 0,
"rps_doc_lorem_ipsum": 0,
"rps_doc_stop_word_fraction": 0.12717965245246887,
"rps_doc_ut1_blacklist": 0,
"rps_doc_frac_all_caps_words": 0.0036794100888073444,
"rps_doc_frac_lines_end_with_ellipsis": 0.0021977999713271856,
"rps_doc_frac_no_alph_words": 0.5455127358436584,
"rps_doc_frac_unique_words": 0.46534350514411926,
"rps_doc_mean_word_length": 5.0143513679504395,
"rps_doc_num_sentences": 433,
"rps_doc_symbol_to_word_ratio": 0.0007998700020834804,
"rps_doc_unigram_entropy": 6.461231231689453,
"rps_doc_word_count": 3275,
"rps_doc_frac_chars_dupe_10grams": 0,
"rps_doc_frac_chars_dupe_5grams": 0.047740839421749115,
"rps_doc_frac_chars_dupe_6grams": 0.04445255920290947,
"rps_doc_frac_chars_dupe_7grams": 0.028254780918359756,
"rps_doc_frac_chars_dupe_8grams": 0.017172090709209442,
"rps_doc_frac_chars_dupe_9grams": 0.005845820065587759,
"rps_doc_frac_chars_top_2gram": 0.0031055898871272802,
"rps_doc_frac_chars_top_3gram": 0.015527949668467045,
"rps_doc_frac_chars_top_4gram": 0.009743030183017254,
"rps_doc_books_importance": -2606.164306640625,
"rps_doc_books_importance_length_correction": -2606.164306640625,
"rps_doc_openwebtext_importance": -1469.3192138671875,
"rps_doc_openwebtext_importance_length_correction": -1469.3192138671875,
"rps_doc_wikipedia_importance": -1314.0240478515625,
"rps_doc_wikipedia_importance_length_correction": -1314.0240478515625
},
"fasttext": {
"dclm": 0.9856442809104919,
"english": 0.06503280252218246,
"fineweb_edu_approx": 2.74452543258667,
"eai_general_math": 0.625688910484314,
"eai_open_web_math": 0.028955040499567986,
"eai_web_code": 0.7965421676635742
}
}
|
{
"free_decimal_correspondence": {
"primary": {
"code": "005.133",
"labels": {
"level_1": "General works, books and libraries, information sciences",
"level_2": "",
"level_3": "Computer programming"
}
},
"secondary": {
"code": "004.02",
"labels": {
"level_1": "General works, books and libraries, information sciences",
"level_2": "",
"level_3": "Computers and Computer science"
}
}
},
"bloom_cognitive_process": {
"primary": {
"code": "3",
"label": "Apply"
},
"secondary": {
"code": "4",
"label": "Analyze"
}
},
"bloom_knowledge_domain": {
"primary": {
"code": "3",
"label": "Procedural"
},
"secondary": {
"code": "2",
"label": "Conceptual"
}
},
"document_type_v1": {
"primary": {
"code": "4",
"label": "Code/Software"
},
"secondary": {
"code": "3",
"label": "Reference/Encyclopedic/Educational"
}
},
"extraction_artifacts": {
"primary": {
"code": "0",
"label": "No Artifacts"
},
"secondary": {
"code": "3",
"label": "Irrelevant Content"
}
},
"missing_content": {
"primary": {
"code": "0",
"label": "No missing content"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"document_type_v2": {
"primary": {
"code": "8",
"label": "Documentation"
},
"secondary": {
"code": "3",
"label": "Academic Writing"
}
},
"reasoning_depth": {
"primary": {
"code": "4",
"label": "Advanced Reasoning"
},
"secondary": {
"code": "3",
"label": "Intermediate Reasoning"
}
},
"technical_correctness": {
"primary": {
"code": "4",
"label": "Highly Correct"
},
"secondary": {
"code": "3",
"label": "Mostly Correct"
}
},
"education_level": {
"primary": {
"code": "4",
"label": "Graduate/Expert Level"
},
"secondary": {
"code": "3",
"label": "Undergraduate Level"
}
}
}
|
672f1e42c33a7f9846924a2431ea77df
|
-5,729,640,804,873,163,000 |
Statistics How To
Predictive Analytics: Simple Definition and Real Life Examples
Share on
Probability >
Contents:
1. What is Predictive Analytics?
2. Real Life Examples
3. Analytical Tools
4. Software for Predictive Analytics
5. Tips for Making Good Predictions
What is Predictive Analytics?
Predictive analytics is a way to predict future events based on past behavior. It’s a combination of statistics and data mining; Tools from both areas are applied to existing large data sets to:
• Identify patterns and trends.
• Build models to predict what might happen in the future.
• Create visual representations of the information.
• Generate other useful information.
One of the primary goals of predictive analytics is to assign a probability (predictive score) for the likelihood that an organizational unit (e.g. a customer, vehicle, or component) will behave a certain way. For example, a manufacturer might want to know the probability a customer will purchase a second product, or a computer security company might want to know the probability that unusual network traffic is a hacking attempt. It is used to predict behavior and assess risk over a wide variety of disciplines, including:
• Actuarial science,
• Banking and other financial services,
• Child protection,
• Crime Prevention,
• Healthcare,
• Insurance,
• Marketing,
• Retail,
• Telecommunications,
• Travel.
Although the term predictive is usually taken as meaning “in the future”, predictive analytics can also be used to analyze past and present behavior. For example, it can be used to analyze crime scene data to generate a profile for the most likely suspects.
Major Fields
Predictive Analytics is split into two general areas–marketing analytics and healthcare analytics. However, the techniques can be used by just about organization with access to “Big Data.”
• Marketing Analytics
Marketing analytics lets you know how your company or business is really performing. It uses metrics like:
• Customer lifetime value (CLTV): Predicts how much a customer will buy over time.
• Marketing attribution: Identifies user actions (called “events” or “touchpoints”) that contribute in some manner to a certain outcome.
• Next best offer or product recommendation: predicts what your customer is most likely to purchase next.
• Overall marketing effectiveness: measures how effective a marketer’s go to market strategy is over both the short-term and long-term.
• Return on Investment (ROI): Measures the benefit from an investment.
• Quarterly or yearly sales forecasts: Predicts how much income your company is likely to generate.
• Healthcare Analytics
Healthcare analytics encompasses a wide range of data generated by health care systems, professionals, and patients. A multi-level analytics platform covers a multi-level area from patient care to hospital management. For example, it may include keeping and analyzing:
• Patient wellness management records,
• Data on mass customization of care,
• Biometrics usage (includes technologies that can tell people apart by their facial structure, fingerprints, palm prints, retina scan, or voice), genomic data (e.g. results from genetic testing) and family history data,
• Financial records (e.g. costs, insurance reimbursements, revenue and supply chain),
• Patient satisfaction surveys.
Predictive Analytics Real Life Examples
Banking: Perhaps the most well known application of predictive analytics is the credit score, where data about consumers past and current financial behavior is used to determine their likelihood of making timely payments in the future.
predictive analyticsSports: Billy Bean (made famous by Brad Pitt in the movie Moneyball) used predictive analytics to dramatically improve his low-performing Major League Baseball Team, the Oakland A’s. Despite their low budget, it is now one of the highest performing teams.
Federal Government: Predictive analytics can be used to uncover health insurance billing fraud, including Medicaid fraud. A list of outliers from big data–for example the physicians who are many standard deviations away from their peers with billing practices–is used to answer the question Is this type of Medicaid billing suspicious? It is also used to take existing cases of fraud and build models to identify more potential fraudulent cases.
Power plants, including wind power installations, use predictive analytics to reduce unexpected equipment failures, reduce maintenance costs and improve power availability.
Cybersecurity is a growing concern. Real-time analytics examines network traffic to identify patterns that may indicate fraud, computer-software vulnerability or other threats.
Back to top
Analytical Tools
A wide range of statistical tools are used in predictive analytics. The most common are:
• Discrete choice models: Offer choices between events. The choice can be as simple as yes/no: complete a graduate degree/don’t complete a graduate degree. Multiple choices are also possible: buy/sell/trade.
• Regression Analysis: an umbrella term for fitting data to a model that can be used to predict future trends and values. Some specific regression techniques:
• Simple Linear regression: fits data to a straight line.
predictive analytics 2
A simple linear regression plot for amount of rainfall.
• Logistic regression (logit model): Almost identical to linear regression. However, linear regression uses two measurement variables and logistic regression uses one measurement and one nominal variable.
• Multinomial logistic regression: Used when you have a categorical dependent variable with two or more unordered levels (i.e. two or more discrete outcomes). It is practically identical to logistic regression, except that you have multiple possible outcomes instead of just one.
• Probit regression: Regression for binary outcome variables. Binary outcome variables are dependent variables with two possibilities, like yes/no, positive test result/negative test result or single/not single.
• Time series models: Display values against time. For example, company growth over 12 months or stock prices for the last week.
• Survival analysis: A model for time until a certain “event.” The event is sometimes, but not always, death.
• Classification and regression trees (CART): Machine-learning procedures for making prediction models from data.
• Decision Trees: a very specific type of probability tree that enables you to make a decision about some kind of process. For example, you might want to choose between manufacturing item A or item B, or investing in choice 1, choice 2, or choice 3.
• Multivariate adaptive regression splines: A tool for modeling high dimensional data.
Back to top
Software for Predictive Analytics
Predictive analytics software uses multiple variables to create reliable forecasts for future behavior. As well as incorporating some of the relatively simple procedures listed in the above section, PA software employs advanced algorithms, data mining and machine learning to generate probabilities for specific behavior. According to TechnologyAdvice.com, some of the most popular software options include:
• Board: a good, all round package well-suited for banking,
insurance, logistics, and manufacturing.
• Everstring: Mines your business data and builds matching customer segments, with probabilities for those accounts and visitors that are most likely to convert.
• Halo: Industry specific analytic tool for supply chain management.
• IBM SPSS: Powerful, all-round tool for generating anything from simple regression models to models that incorporate natural language processing, linguistic technology, and advanced AI systems.
• Infer: Another data mining tool for businesses which identifies customers and accounts with a high probability of converting.
• Radius: Focuses on business-to-business marketing.
• Rapid Miner Studio: Built specifically for Data Scientists.
• SAP HANA: general purpose business analytics platform that uses R-compatible code (R is a popular, free, statistics package).
• SAS Advanced Analytics: One of the PA giants, with about one third of the PA software pie.
• Statistica Decisioning Platform: general purpose software that historically has focused on fraud and risk models for financial institutions and the insurance industry.
Tips for Making Good Predictions
1. Get good data,
2. Make sure your data is current,
3. Make sure your data is complete,
4. Hire an analytics professional.
1. Get good data
Your predictions are only going to be as good as the data it’s based on. If you haven’t already done so, start collecting electronic data from sales, purchase orders, invoicing, and other relevant business data. Collect information from social networking, Google Analytics, Google Search Console and any other business-specific sources. If there are missing values or outliers (very large or very small data points), you’ll need to take care of those before you can run analytics. Missing values can be handled by entering zeros or using the mean or a value from the next largest (or smallest) data point. If you have the statistical background, you might want to consider a more statistically sound technique for filling in the blanks, like Multiple Imputations. Outliers can be trimmed , Winsorized, or omitted entirely. You can also consider treating them as missing values and replacing them. If you do remove outliers, run regression twice: once with the outlier and once without.
2. Make sure your data is complete
The 2007-2008 mortgage crisis is a prime example of what happens when data is incomplete. As far as the remortgage industry was concerned, it was using old data on how likely people were to pay mortgages back. In fact, the third-party software that the lenders were using was focused more on when mortgages were likely to be paid back, rather than when they were likely to default (Glowacki & Wunder). As lending practices changed (i.e. more sub-prime mortgages were made), the old data meant that the algorithms failed to keep up with the times.
3. Make sure your data is current
Out of date information is just as unreliable as incomplete data. Thomas Davenport, writing for Harvard Business Review used Netflix as an example of how data can completely change over time. In the early days of the internet, users tended to be younger and more tech-savvy. As the internet grew, everyone is using it. The old data that Netflix collected in its infancy had to be completely reworked.
4. Hire an Analytics Professional
Understanding how to perform regression analysis requires a fairly deep understanding of statistics. As a simple example, if you didn’t know that you should deal with outliers from data before performing regression, your models are going to be way off. Other assumptions and conditions for regression to work properly:
1. The Quantitative Data Condition. Basically, your data has to be numbers, not categories, names, addresses or some other qualitative data type.
2. The Straight Enough Condition (or “linearity”). This condition says that — assuming you’re running a linear regression — a scatter plot of your data should fit a line. A regression analysis will give you a result, and if you haven’t correctly fitted the model to the data, that regression line could be way off.
3. Independence of Errors: If you don’t have random errors, you can’t run regression as your predictions won’t be accurate.
4. Homoscedasticity: Make sure your scatter plot doesn’t look like a cone. That is a sign your data points are influencing each other. If so, regression is a no-go.
5. Normality of Error Distribution: Your data points should be normally distributed around the regression line.
If you’re comfortable with statistics, great. If not, you’ll want to hire, at a minimum, a statistical consultant.
References:
Blomberg, J. Predictive Analytics: Turning Your Data into Intelligence. Article posted on Michigan.gov. Retrieved August 28, 2017 from: https://www.michigan.gov/documents/dit/4_SAS_presentation_267692_7.pdf
Davenport, Thomas. A Predictive Analytics Primer. Published online in Harvard Business Review. Retrieved August 28, 2017 from: https://hbr.org/2014/09/a-predictive-analytics-primer
Glowacki & Wunder. Prisoners of The Data: The Mortgage Industry and Predictive Modeling. Retrieved August 28, 2017 from: http://www.milliman.com/uploadedFiles/insight/2013/prisoners-of-the-data.pdf
The Health Catalyst. (2016). Healthcare Analytics Adoption Model. Retrieved August 28, 2017 from: https://www.healthcatalyst.com/healthcare-analytics-adoption-model/
MyFico. What is a Credit Score? Retrieved August 28, 2017 from: http://www.myfico.com/credit-education/credit-scores/
National Renewable Energy Lab. Wind Power. Retrieved October 3, 2014 from: http://www.nrel.gov/wind/pdfs/day1_sessionii_01_ge_intelligent_platforms_walleck.pdf
SAS. Marketing Analytics. Retrieved August 28, 2017 from: https://www.sas.com/en_us/insights/marketing/marketing-analytics.html
The Sentinel Watch. (2017). Biometrics as a Security Measure in Health Care. Retrieved August 28, 2017 from: http://www.americansentinel.edu/blog/2014/01/08/biometrics-as-a-security-measure-in-health-care-2/
TechnologyAdvice.com. Top 10 Predictive Analytics Tools, By Category. Retrieved August 2017 from: http://technologyadvice.com/blog/information-technology/top-predictive-analytics-tools/
Wikipedia. Billy Beane. Retrieved August 2017 from: https://en.wikipedia.org/wiki/Billy_Beane
CITE THIS AS:
Stephanie Glen. "Predictive Analytics: Simple Definition and Real Life Examples" From StatisticsHowTo.com: Elementary Statistics for the rest of us! https://www.statisticshowto.com/predictive-analytics/
------------------------------------------------------------------------------
Feel like “cheating” at Statistics? Check out our Practically Cheating Statistics Handbook, which gives you hundreds of easy-to-follow answers in a PDF format. Recommended reading at top universities!
Comments? Need to post a correction? Please post a comment on our Facebook page.
|
{
"url": "https://www.statisticshowto.com/predictive-analytics/",
"source_domain": "www.statisticshowto.com",
"snapshot_id": "crawl=CC-MAIN-2021-49",
"warc_metadata": {
"Content-Length": "100104",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:MMZS42ITOWBAE4YCRPWZMMLAQEPME7T7",
"WARC-Concurrent-To": "<urn:uuid:852df819-ea9e-4e01-b3b0-4c98d772da62>",
"WARC-Date": "2021-11-27T14:27:49Z",
"WARC-IP-Address": "172.66.43.120",
"WARC-Identified-Payload-Type": "text/html",
"WARC-Payload-Digest": "sha1:KKGA7UNEMANCMG6FPQ4O3PNQ7XTW6UQB",
"WARC-Record-ID": "<urn:uuid:5ec9941e-5de1-4b92-a128-96f4359a83fa>",
"WARC-Target-URI": "https://www.statisticshowto.com/predictive-analytics/",
"WARC-Truncated": null,
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:e3721d03-02c6-450c-b59a-906b40d505cb>"
},
"warc_info": "isPartOf: CC-MAIN-2021-49\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for November/December 2021\r\noperator: Common Crawl Admin ([email protected])\r\nhostname: ip-10-67-67-159\r\nsoftware: Apache Nutch 1.18 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.3-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: https://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/"
}
|
{
"line_start_idx": [
0,
18,
19,
82,
83,
92,
93,
107,
108,
118,
119,
154,
178,
200,
239,
277,
278,
308,
309,
504,
505,
539,
600,
654,
693,
694,
1221,
1222,
1245,
1287,
1309,
1331,
1347,
1362,
1377,
1389,
1413,
1425,
1426,
1684,
1685,
1698,
1699,
1888,
1889,
1913,
2024,
2025,
2112,
2253,
2363,
2503,
2578,
2682,
2707,
2980,
2981,
3024,
3066,
3291,
3381,
3417,
3418,
3458,
3459,
3695,
3696,
3972,
3973,
4419,
4420,
4593,
4594,
4771,
4783,
4784,
4801,
4802,
4891,
4892,
5102,
5263,
5325,
5354,
5355,
5417,
5418,
5419,
5628,
5912,
6128,
6259,
6371,
6487,
6739,
6828,
6829,
6841,
6842,
6876,
6877,
7285,
7286,
7348,
7393,
7557,
7628,
7825,
7955,
8010,
8074,
8204,
8299,
8471,
8472,
8505,
8506,
8526,
8563,
8601,
8638,
8639,
8656,
9642,
9643,
9678,
10225,
10226,
10260,
10661,
10662,
10696,
11015,
11016,
11017,
11165,
11482,
11608,
11775,
11889,
11890,
12005,
12006,
12007,
12019,
12226,
12407,
12605,
12771,
12889,
13049,
13177,
13385,
13571,
13665,
13666,
13680,
13883,
13962,
13963,
14164,
14165
],
"line_end_idx": [
18,
19,
82,
83,
92,
93,
107,
108,
118,
119,
154,
178,
200,
239,
277,
278,
308,
309,
504,
505,
539,
600,
654,
693,
694,
1221,
1222,
1245,
1287,
1309,
1331,
1347,
1362,
1377,
1389,
1413,
1425,
1426,
1684,
1685,
1698,
1699,
1888,
1889,
1913,
2024,
2025,
2112,
2253,
2363,
2503,
2578,
2682,
2707,
2980,
2981,
3024,
3066,
3291,
3381,
3417,
3418,
3458,
3459,
3695,
3696,
3972,
3973,
4419,
4420,
4593,
4594,
4771,
4783,
4784,
4801,
4802,
4891,
4892,
5102,
5263,
5325,
5354,
5355,
5417,
5418,
5419,
5628,
5912,
6128,
6259,
6371,
6487,
6739,
6828,
6829,
6841,
6842,
6876,
6877,
7285,
7286,
7348,
7393,
7557,
7628,
7825,
7955,
8010,
8074,
8204,
8299,
8471,
8472,
8505,
8506,
8526,
8563,
8601,
8638,
8639,
8656,
9642,
9643,
9678,
10225,
10226,
10260,
10661,
10662,
10696,
11015,
11016,
11017,
11165,
11482,
11608,
11775,
11889,
11890,
12005,
12006,
12007,
12019,
12226,
12407,
12605,
12771,
12889,
13049,
13177,
13385,
13571,
13665,
13666,
13680,
13883,
13962,
13963,
14164,
14165,
14245
]
}
|
{
"red_pajama_v2": {
"ccnet_original_length": 14245,
"ccnet_original_nlines": 161,
"rps_doc_curly_bracket": 0,
"rps_doc_ldnoobw_words": 0,
"rps_doc_lorem_ipsum": 0,
"rps_doc_stop_word_fraction": 0.3010033369064331,
"rps_doc_ut1_blacklist": 0,
"rps_doc_frac_all_caps_words": 0.011519880034029484,
"rps_doc_frac_lines_end_with_ellipsis": 0,
"rps_doc_frac_no_alph_words": 0.23225566744804382,
"rps_doc_frac_unique_words": 0.386745810508728,
"rps_doc_mean_word_length": 5.626112937927246,
"rps_doc_num_sentences": 187,
"rps_doc_symbol_to_word_ratio": 0,
"rps_doc_unigram_entropy": 5.892215728759766,
"rps_doc_word_count": 2022,
"rps_doc_frac_chars_dupe_10grams": 0,
"rps_doc_frac_chars_dupe_5grams": 0.04913853853940964,
"rps_doc_frac_chars_dupe_6grams": 0.02390998974442482,
"rps_doc_frac_chars_dupe_7grams": 0.009493670426309109,
"rps_doc_frac_chars_dupe_8grams": 0.009493670426309109,
"rps_doc_frac_chars_dupe_9grams": 0,
"rps_doc_frac_chars_top_2gram": 0.035073839128017426,
"rps_doc_frac_chars_top_3gram": 0.010460619814693928,
"rps_doc_frac_chars_top_4gram": 0.012921939603984356,
"rps_doc_books_importance": -1184.36669921875,
"rps_doc_books_importance_length_correction": -1184.36669921875,
"rps_doc_openwebtext_importance": -619.352294921875,
"rps_doc_openwebtext_importance_length_correction": -619.352294921875,
"rps_doc_wikipedia_importance": -519.0567016601562,
"rps_doc_wikipedia_importance_length_correction": -519.0567016601562
},
"fasttext": {
"dclm": 0.024112459272146225,
"english": 0.8854262232780457,
"fineweb_edu_approx": 2.380244731903076,
"eai_general_math": 0.27153581380844116,
"eai_open_web_math": 0.2565464377403259,
"eai_web_code": 0.04769742116332054
}
}
|
{
"free_decimal_correspondence": {
"primary": {
"code": "519.5",
"labels": {
"level_1": "Science and Natural history",
"level_2": "Mathematics",
"level_3": "Probabilities; or, Mathematical statistics"
}
},
"secondary": {
"code": "005.1",
"labels": {
"level_1": "General works, books and libraries, information sciences",
"level_2": "",
"level_3": "Computer programming"
}
}
},
"bloom_cognitive_process": {
"primary": {
"code": "2",
"label": "Understand"
},
"secondary": {
"code": "3",
"label": "Apply"
}
},
"bloom_knowledge_domain": {
"primary": {
"code": "2",
"label": "Conceptual"
},
"secondary": {
"code": "3",
"label": "Procedural"
}
},
"document_type_v1": {
"primary": {
"code": "3",
"label": "Reference/Encyclopedic/Educational"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"extraction_artifacts": {
"primary": {
"code": "0",
"label": "No Artifacts"
},
"secondary": {
"code": "3",
"label": "Irrelevant Content"
}
},
"missing_content": {
"primary": {
"code": "0",
"label": "No missing content"
},
"secondary": {
"code": "4",
"label": "Missing Images or Figures"
}
},
"document_type_v2": {
"primary": {
"code": "10",
"label": "Knowledge Article"
},
"secondary": {
"code": "8",
"label": "Documentation"
}
},
"reasoning_depth": {
"primary": {
"code": "2",
"label": "Basic Reasoning"
},
"secondary": {
"code": "3",
"label": "Intermediate Reasoning"
}
},
"technical_correctness": {
"primary": {
"code": "3",
"label": "Mostly Correct"
},
"secondary": {
"code": "4",
"label": "Highly Correct"
}
},
"education_level": {
"primary": {
"code": "2",
"label": "High School Level"
},
"secondary": {
"code": "3",
"label": "Undergraduate Level"
}
}
}
|
672f1e42c33a7f9846924a2431ea77df
|
3,291,276,352,161,304,000 |
Python爬取教学网站资源文件
in 代码技巧 with 0 comment
实训要到了,老师说资料在教学网站上,好吧,我去看了看。
1568539145632.png
文件要一个一个下载,不能打包,哈哈哈哈哈,所以就有了这篇文章。
既能愉快的下载文件,也能锻炼一下Python技能,一举两得。
利用requests库的get方法下载文件
方便之后调用,首先把下载文件的东西写好:
import os
import requests
from bs4 import BeautifulSoup
def save_file_stream(path, file_url):
try:
r = requests.get(file_url, timeout=3, stream=True)
with open(path, "wb") as f:
for chunk in r.iter_content(chunk_size=1024):
if chunk:
f.write(chunk)
print("File is saved.")
except requests.exceptions.ConnectionError:
print("File save failed.")
当使用requests的get下载大文件/数据时,建议使用stream模式。
当把get函数的stream参数设置成False时,它会立即开始下载文件并放到内存中,如果文件过大,有可能导致内存不足。
当把get函数的stream参数设置成True时,它不会立即开始下载,当你使用iter_content或iter_lines遍历内容或访问内容属性时才开始下载。
需要注意一点:文件没有下载之前,它也需要保持连接。
iter_content:一块一块的遍历要下载的内容
iter_lines:一行一行的遍历要下载的内容
使用上面两个函数下载大文件可以防止占用过多的内存,因为每次只下载小部分数据。
下面这个函数是我在测试的时候,用来控制是否覆盖下载文件的,可有可无:
def save_file(path, file_url, cover=False):
print("Saving file:" + path)
if os.path.exists(path):
if cover:
print("File is covered.")
save_file_stream(path, file_url)
else:
print("File is ignored.")
else:
save_file_stream(path, file_url)
遍历课程资源
遍历网页上所有的资源,判断是否是文件,如果是就调用之前的下载工具进行下载。
判断方法也很简单,对于列表,URL请求是listview.jsp?key=value*,而文件的请求是preview/download_preview.jsp?key=value*,只需要对URL进行分割判断就可以了。
1568539409517.png
1568539474572.png
遍历的方法是通过bs4中的BeautifulSoup库解析HTML,获取无序列表每一项的链接,遇到文件夹则执行递归。
def get_all_files(uri, path):
# 分割URL
action = uri.split("?", 1)[0]
if action == "preview/download_preview.jsp":
r = requests.get("http://e.njcit.cn/meol/common/script/" + uri)
# BeautifulSoup解析HTML
soup = BeautifulSoup(r.text, "html.parser")
# 提取文件的URL
lists = soup.select("div#dowload-preview div.h1-title h2 p a")
if len(lists) > 0:
# 调用之前的方法下载文件
file_url = "http://e.njcit.cn/" + lists[0].attrs["href"]
save_file(path, file_url, cover=True)
return
if action == "listview.jsp":
# 对于不存在的文件夹进行创建
if os.path.exists(path) is False:
print("Create path:", path)
os.makedirs(path)
r = requests.get("http://e.njcit.cn/meol/common/script/" + uri)
# BeautifulSoup解析HTML
soup = BeautifulSoup(r.text, "html.parser")
# 提取无序列表的每一项
lists = soup.select("form#postform table.valuelist tr td.indentten a")
for e in lists:
# 执行递归
get_all_files(e.attrs["href"], path + "/" + e.text)
else:
return
至此我以为已经可以运行程序,来愉快的下载文件了
if __name__ == '__main__':
# 需要下载的文件夹
list_index = "listview.jsp?acttype=enter&folderid=146039&lid=22446"
# 文件保存位置
save_path = "."
# 调用递归下载
get_all_files(list_index, save_path)
但是运行后发现下载的文件全是
1568539599340.png
What the hell?
我试着用文本编辑器打开,发现原来是一个验证码界面。
1568539658107.png
很奇怪我在网页下载的时候并不需要验证码,这里为什么又需要了呢?
进一步观察发现,我获取到的文件列表里没有“书籍”文件夹。What?
我复制了浏览器里的链接,写了几行代码,只下载书籍页面。
import requests
r = requests.get("http://e.njcit.cn/meol/common/script/listview.jsp?lid=22446&folderid=146403")
with open("1.html", "w") as f:
f.write(r.text)
可以发现是权限不足的缘故,要登录!
1568539829462.png
模拟浏览器登录并保持会话
关于cookie和session可以自行搜索,我这里直接贴代码
import requests.cookies
from bs4 import BeautifulSoup
# 登录请求地址
login_url = "http://e.njcit.cn/meol/loginCheck.do"
# POST提交的数据
post_data = {
"logintoken": "1568372860156", # 随机数这里不研究
"IPT_LOGINUSERNAME": "1704301**", # 对应学号
"IPT_LOGINPASSWORD": "********" # 对应密码
}
# HTTP请求头
header = {
"user-agent": "Mozilla/5.0 (Windows NT 10.0; WOW64; rv:53.0) Gecko/20100101 Firefox/53.0"
}
session = requests.session() # 创建会话
session.headers = header
session.post(login_url, post_data) # 模拟登录
res = session.get("http://e.njcit.cn/meol/personal.do")
soup = BeautifulSoup(res.text, "html.parser")
# 提取当前登录用户的用户名,以此判断是否登录成功
name_tag = soup.select("div.sidebar div.userinfobody ul li.name div a.info.chgright")
if name_tag:
print("当前登录:", name_tag[0].text)
print(session.cookies)
# 这里用来保持会话,防止cookie失效
while True:
time.sleep(1000)
else:
print("登录失败")
这亚子应该没有问题了,最终代码先模拟登录,保持会话,之后的请求全都是通过这个会话来发送的,需要将之前代码中的requests替换成我们创建的session,最终代码如下
#!/usr/bin/env python
# -*-coding:utf-8-*-
#
# @Project : NJCIT
# @FileName : download_all.py
# @Author : XueYe
# @Date : 2019/9/13 16:25
# @Desc : Life is Short I Use Python!
import os
import requests
from bs4 import BeautifulSoup
def save_file_stream(path, file_url):
try:
r = session.get(file_url, timeout=3, stream=True)
with open(path, "wb") as f:
for chunk in r.iter_content(chunk_size=1024):
if chunk:
f.write(chunk)
print("File is saved.")
except requests.exceptions.ConnectionError:
print("File save failed.")
def save_file(path, file_url, cover=False):
print("Saving file:" + path)
if os.path.exists(path):
if cover:
print("File is covered.")
save_file_stream(path, file_url)
else:
print("File is ignored.")
else:
save_file_stream(path, file_url)
def get_all_files(uri, path):
action = uri.split("?", 1)[0]
if action == "preview/download_preview.jsp":
r = session.get("http://e.njcit.cn/meol/common/script/" + uri)
soup = BeautifulSoup(r.text, "html.parser")
lists = soup.select("div#dowload-preview div.h1-title h2 p a")
if len(lists) > 0:
file_url = "http://e.njcit.cn" + lists[0].attrs["href"]
save_file(path, file_url, cover=True)
return
if action == "listview.jsp":
if os.path.exists(path) is False:
print("Create path:", path)
os.makedirs(path)
r = session.get("http://e.njcit.cn/meol/common/script/" + uri)
soup = BeautifulSoup(r.text, "html.parser")
lists = soup.select("form#postform table.valuelist tr td.indentten a")
for e in lists:
get_all_files(e.attrs["href"], path + "/" + e.text)
else:
return
if __name__ == '__main__':
login_url = "http://e.njcit.cn/meol/loginCheck.do"
post_data = {
"logintoken": "1568372860156",
"IPT_LOGINUSERNAME": "1704301**", # 学号
"IPT_LOGINPASSWORD": "********" # 密码
}
header = {
"user-agent": "Mozilla/5.0 (Windows NT 10.0; WOW64; rv:53.0) Gecko/20100101 Firefox/53.0"
}
session = requests.session()
session.headers = header
session.post(login_url, post_data)
res = session.get("http://e.njcit.cn/meol/personal.do")
soup = BeautifulSoup(res.text, "html.parser")
name_tag = soup.select("div.sidebar div.userinfobody ul li.name div a.info.chgright")
if name_tag:
print("当前登录:", name_tag[0].text)
list_index = "listview.jsp?acttype=enter&folderid=146039&lid=22446"
save_path = "."
get_all_files(list_index, save_path)
# 下载完成后退出账户,我测试的时候因为频繁登录发现对用户最大在线数量有限制
logout_url = "http://e.njcit.cn/meol/homepage/V8/include/logout.jsp"
session.get(logout_url)
print("用户已退出")
else:
print("登录失败")
终于舒服了,开始下载去了,不知道学校小水管要多久,下完了回来更新一下。
1568544656409.png
Responses
|
{
"url": "https://xueye.io/archives/pyhon-get-theol-resource.html",
"source_domain": "xueye.io",
"snapshot_id": "crawl=CC-MAIN-2019-43",
"warc_metadata": {
"Content-Length": "24895",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:ZATG4EATECQ5ZVPZ2EVSO4UWBTR7BCON",
"WARC-Concurrent-To": "<urn:uuid:10c7dce4-f254-4d1f-8df4-2707d4215132>",
"WARC-Date": "2019-10-21T04:47:58Z",
"WARC-IP-Address": "47.75.94.236",
"WARC-Identified-Payload-Type": "text/html",
"WARC-Payload-Digest": "sha1:MWD5ZO53K5K3DUNYKR5ILNDIUP6SOD22",
"WARC-Record-ID": "<urn:uuid:e04562b9-676a-41dd-ba3c-987ca5af6e37>",
"WARC-Target-URI": "https://xueye.io/archives/pyhon-get-theol-resource.html",
"WARC-Truncated": null,
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:e4839bfa-50dc-49f6-8e40-b04082f75130>"
},
"warc_info": "isPartOf: CC-MAIN-2019-43\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for October 2019\r\noperator: Common Crawl Admin ([email protected])\r\nhostname: ip-10-67-67-65.ec2.internal\r\nsoftware: Apache Nutch 1.16 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.1-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/"
}
|
{
"line_start_idx": [
0,
17,
18,
41,
42,
70,
71,
89,
121,
122,
153,
154,
176,
177,
198,
199,
209,
225,
255,
256,
257,
295,
304,
363,
399,
457,
483,
518,
550,
598,
633,
672,
673,
734,
735,
816,
817,
843,
844,
871,
896,
935,
936,
971,
972,
1016,
1049,
1078,
1096,
1134,
1179,
1193,
1231,
1241,
1282,
1283,
1290,
1291,
1329,
1330,
1440,
1441,
1459,
1460,
1478,
1479,
1538,
1539,
1569,
1581,
1615,
1664,
1736,
1766,
1818,
1837,
1908,
1935,
1961,
2030,
2080,
2095,
2128,
2152,
2194,
2234,
2264,
2336,
2366,
2418,
2439,
2518,
2542,
2561,
2625,
2635,
2650,
2651,
2675,
2676,
2703,
2718,
2790,
2803,
2823,
2836,
2877,
2878,
2893,
2894,
2912,
2913,
2928,
2929,
2955,
2956,
2974,
2975,
3007,
3008,
3042,
3043,
3071,
3072,
3088,
3184,
3215,
3235,
3236,
3254,
3255,
3273,
3274,
3287,
3288,
3320,
3321,
3345,
3375,
3376,
3385,
3436,
3448,
3462,
3509,
3555,
3599,
3601,
3611,
3622,
3716,
3718,
3755,
3780,
3823,
3879,
3926,
3952,
4038,
4051,
4088,
4115,
4141,
4157,
4182,
4188,
4206,
4207,
4292,
4293,
4315,
4336,
4339,
4359,
4389,
4409,
4439,
4481,
4482,
4492,
4508,
4538,
4539,
4540,
4578,
4587,
4645,
4681,
4739,
4765,
4800,
4832,
4880,
4915,
4916,
4917,
4961,
4994,
5023,
5041,
5079,
5124,
5138,
5176,
5186,
5227,
5228,
5237,
5267,
5301,
5350,
5421,
5473,
5544,
5571,
5639,
5689,
5704,
5737,
5779,
5819,
5849,
5920,
5972,
6051,
6075,
6139,
6149,
6164,
6165,
6166,
6193,
6248,
6266,
6305,
6353,
6399,
6405,
6420,
6518,
6524,
6557,
6586,
6625,
6685,
6735,
6825,
6842,
6883,
6959,
6983,
7028,
7075,
7152,
7184,
7207,
7217,
7239,
7240,
7276,
7277,
7295,
7296
],
"line_end_idx": [
17,
18,
41,
42,
70,
71,
89,
121,
122,
153,
154,
176,
177,
198,
199,
209,
225,
255,
256,
257,
295,
304,
363,
399,
457,
483,
518,
550,
598,
633,
672,
673,
734,
735,
816,
817,
843,
844,
871,
896,
935,
936,
971,
972,
1016,
1049,
1078,
1096,
1134,
1179,
1193,
1231,
1241,
1282,
1283,
1290,
1291,
1329,
1330,
1440,
1441,
1459,
1460,
1478,
1479,
1538,
1539,
1569,
1581,
1615,
1664,
1736,
1766,
1818,
1837,
1908,
1935,
1961,
2030,
2080,
2095,
2128,
2152,
2194,
2234,
2264,
2336,
2366,
2418,
2439,
2518,
2542,
2561,
2625,
2635,
2650,
2651,
2675,
2676,
2703,
2718,
2790,
2803,
2823,
2836,
2877,
2878,
2893,
2894,
2912,
2913,
2928,
2929,
2955,
2956,
2974,
2975,
3007,
3008,
3042,
3043,
3071,
3072,
3088,
3184,
3215,
3235,
3236,
3254,
3255,
3273,
3274,
3287,
3288,
3320,
3321,
3345,
3375,
3376,
3385,
3436,
3448,
3462,
3509,
3555,
3599,
3601,
3611,
3622,
3716,
3718,
3755,
3780,
3823,
3879,
3926,
3952,
4038,
4051,
4088,
4115,
4141,
4157,
4182,
4188,
4206,
4207,
4292,
4293,
4315,
4336,
4339,
4359,
4389,
4409,
4439,
4481,
4482,
4492,
4508,
4538,
4539,
4540,
4578,
4587,
4645,
4681,
4739,
4765,
4800,
4832,
4880,
4915,
4916,
4917,
4961,
4994,
5023,
5041,
5079,
5124,
5138,
5176,
5186,
5227,
5228,
5237,
5267,
5301,
5350,
5421,
5473,
5544,
5571,
5639,
5689,
5704,
5737,
5779,
5819,
5849,
5920,
5972,
6051,
6075,
6139,
6149,
6164,
6165,
6166,
6193,
6248,
6266,
6305,
6353,
6399,
6405,
6420,
6518,
6524,
6557,
6586,
6625,
6685,
6735,
6825,
6842,
6883,
6959,
6983,
7028,
7075,
7152,
7184,
7207,
7217,
7239,
7240,
7276,
7277,
7295,
7296,
7305
]
}
|
{
"red_pajama_v2": {
"ccnet_original_length": 7305,
"ccnet_original_nlines": 262,
"rps_doc_curly_bracket": 0.0010951400035992265,
"rps_doc_ldnoobw_words": 0,
"rps_doc_lorem_ipsum": 0,
"rps_doc_stop_word_fraction": 0.08078879863023758,
"rps_doc_ut1_blacklist": 0,
"rps_doc_frac_all_caps_words": 0.010178119875490665,
"rps_doc_frac_lines_end_with_ellipsis": 0,
"rps_doc_frac_no_alph_words": 0.5642493367195129,
"rps_doc_frac_unique_words": 0.46710526943206787,
"rps_doc_mean_word_length": 10.399123191833496,
"rps_doc_num_sentences": 158,
"rps_doc_symbol_to_word_ratio": 0.022900760173797607,
"rps_doc_unigram_entropy": 5.0828328132629395,
"rps_doc_word_count": 456,
"rps_doc_frac_chars_dupe_10grams": 0.3171657621860504,
"rps_doc_frac_chars_dupe_5grams": 0.5048502683639526,
"rps_doc_frac_chars_dupe_6grams": 0.4571910500526428,
"rps_doc_frac_chars_dupe_7grams": 0.4571910500526428,
"rps_doc_frac_chars_dupe_8grams": 0.3660902678966522,
"rps_doc_frac_chars_dupe_9grams": 0.3660902678966522,
"rps_doc_frac_chars_top_2gram": 0.03163221850991249,
"rps_doc_frac_chars_top_3gram": 0.026992829516530037,
"rps_doc_frac_chars_top_4gram": 0.01644876040518284,
"rps_doc_books_importance": -619.4494018554688,
"rps_doc_books_importance_length_correction": -619.4494018554688,
"rps_doc_openwebtext_importance": -359.3240661621094,
"rps_doc_openwebtext_importance_length_correction": -359.3240661621094,
"rps_doc_wikipedia_importance": -449.3094787597656,
"rps_doc_wikipedia_importance_length_correction": -449.3094787597656
},
"fasttext": {
"dclm": 0.9961819052696228,
"english": 0.15135224163532257,
"fineweb_edu_approx": 3.1597301959991455,
"eai_general_math": 0.9971829652786255,
"eai_open_web_math": 0.30203020572662354,
"eai_web_code": 0.990570604801178
}
}
|
{
"free_decimal_correspondence": {
"primary": {
"code": "005.1",
"labels": {
"level_1": "General works, books and libraries, information sciences",
"level_2": "",
"level_3": "Computer programming"
}
},
"secondary": {
"code": "378.1",
"labels": {
"level_1": "Social sciences",
"level_2": "Education",
"level_3": "Education, Higher and Universities and colleges"
}
}
},
"bloom_cognitive_process": {
"primary": {
"code": "3",
"label": "Apply"
},
"secondary": {
"code": "2",
"label": "Understand"
}
},
"bloom_knowledge_domain": {
"primary": {
"code": "3",
"label": "Procedural"
},
"secondary": {
"code": "2",
"label": "Conceptual"
}
},
"document_type_v1": {
"primary": {
"code": "3",
"label": "Reference/Encyclopedic/Educational"
},
"secondary": {
"code": "4",
"label": "Code/Software"
}
},
"extraction_artifacts": {
"primary": {
"code": "3",
"label": "Irrelevant Content"
},
"secondary": {
"code": "0",
"label": "No Artifacts"
}
},
"missing_content": {
"primary": {
"code": "4",
"label": "Missing Images or Figures"
},
"secondary": {
"code": "0",
"label": "No missing content"
}
},
"document_type_v2": {
"primary": {
"code": "23",
"label": "Tutorial"
},
"secondary": {
"code": "8",
"label": "Documentation"
}
},
"reasoning_depth": {
"primary": {
"code": "3",
"label": "Intermediate Reasoning"
},
"secondary": {
"code": "2",
"label": "Basic Reasoning"
}
},
"technical_correctness": {
"primary": {
"code": "3",
"label": "Mostly Correct"
},
"secondary": {
"code": "4",
"label": "Highly Correct"
}
},
"education_level": {
"primary": {
"code": "3",
"label": "Undergraduate Level"
},
"secondary": {
"code": "2",
"label": "High School Level"
}
}
}
|
672f1e42c33a7f9846924a2431ea77df
|
-1,125,117,754,914,639,200 |
We use cookies to personalise content and advertisements and to analyse access to our website. Furthermore, our partners for online advertising receive pseudonymised information about your use of our website. cookie policy and privacy policy.
+0
0
86
2
avatar
What is the 20th digit after the decimal point of the sum of the decimal equivalents for the fractions 1/7 + 1/3
Jun 18, 2019
#1
avatar+104688
+1
1/7 has the repeating form of .142857
1/3 has the repeating form .3
Every 6 digit cycle of the sum has the form 476190
So......after the 18th decimal place we have
_____.142857
_____.333333
So....the 20th digit after the decimal is 7
cool cool cool
Jun 18, 2019
#2
avatar
0
Thanks. You are the best!
Jun 18, 2019
32 Online Users
|
{
"url": "https://web2.0calc.com/questions/pls-help-asap_8",
"source_domain": "web2.0calc.com",
"snapshot_id": "crawl=CC-MAIN-2019-47",
"warc_metadata": {
"Content-Length": "22459",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:Y6BFU3NDSMHHMLFU6DGYNEV727AAVND4",
"WARC-Concurrent-To": "<urn:uuid:f6831e09-41dd-4184-9391-369b38c154b7>",
"WARC-Date": "2019-11-12T23:18:46Z",
"WARC-IP-Address": "116.202.113.245",
"WARC-Identified-Payload-Type": "text/html",
"WARC-Payload-Digest": "sha1:2EYU54522RWOFAIXJMHMUSIC35DMDNQH",
"WARC-Record-ID": "<urn:uuid:c8779a28-1f21-464a-9759-3ebbf1b27a94>",
"WARC-Target-URI": "https://web2.0calc.com/questions/pls-help-asap_8",
"WARC-Truncated": null,
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:80af9405-4f47-4845-8083-1231f27eba58>"
},
"warc_info": "isPartOf: CC-MAIN-2019-47\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for November 2019\r\noperator: Common Crawl Admin ([email protected])\r\nhostname: ip-10-67-67-223.ec2.internal\r\nsoftware: Apache Nutch 1.16 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.1-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/"
}
|
{
"line_start_idx": [
0,
243,
245,
250,
252,
254,
257,
259,
266,
267,
380,
381,
395,
399,
414,
417,
418,
459,
460,
462,
463,
494,
495,
497,
498,
553,
554,
556,
557,
602,
603,
605,
606,
619,
620,
633,
634,
636,
637,
683,
684,
686,
687,
689,
690,
705,
706,
720,
724,
731,
733,
734,
760,
761,
775,
776
],
"line_end_idx": [
243,
245,
250,
252,
254,
257,
259,
266,
267,
380,
381,
395,
399,
414,
417,
418,
459,
460,
462,
463,
494,
495,
497,
498,
553,
554,
556,
557,
602,
603,
605,
606,
619,
620,
633,
634,
636,
637,
683,
684,
686,
687,
689,
690,
705,
706,
720,
724,
731,
733,
734,
760,
761,
775,
776,
791
]
}
|
{
"red_pajama_v2": {
"ccnet_original_length": 791,
"ccnet_original_nlines": 55,
"rps_doc_curly_bracket": 0,
"rps_doc_ldnoobw_words": 0,
"rps_doc_lorem_ipsum": 0,
"rps_doc_stop_word_fraction": 0.2777777910232544,
"rps_doc_ut1_blacklist": 0,
"rps_doc_frac_all_caps_words": 0,
"rps_doc_frac_lines_end_with_ellipsis": 0,
"rps_doc_frac_no_alph_words": 0.3580246865749359,
"rps_doc_frac_unique_words": 0.5546875,
"rps_doc_mean_word_length": 4.3984375,
"rps_doc_num_sentences": 12,
"rps_doc_symbol_to_word_ratio": 0.030864199623465538,
"rps_doc_unigram_entropy": 4.045526504516602,
"rps_doc_word_count": 128,
"rps_doc_frac_chars_dupe_10grams": 0,
"rps_doc_frac_chars_dupe_5grams": 0.08525755256414413,
"rps_doc_frac_chars_dupe_6grams": 0,
"rps_doc_frac_chars_dupe_7grams": 0,
"rps_doc_frac_chars_dupe_8grams": 0,
"rps_doc_frac_chars_dupe_9grams": 0,
"rps_doc_frac_chars_top_2gram": 0.05328597128391266,
"rps_doc_frac_chars_top_3gram": 0.047957368195056915,
"rps_doc_frac_chars_top_4gram": 0.06039075925946236,
"rps_doc_books_importance": -54.08589172363281,
"rps_doc_books_importance_length_correction": -54.08589172363281,
"rps_doc_openwebtext_importance": -28.088117599487305,
"rps_doc_openwebtext_importance_length_correction": -28.08795166015625,
"rps_doc_wikipedia_importance": -24.852100372314453,
"rps_doc_wikipedia_importance_length_correction": -24.852100372314453
},
"fasttext": {
"dclm": 0.24512255191802979,
"english": 0.7606173753738403,
"fineweb_edu_approx": 1.1555196046829224,
"eai_general_math": 0.0006674500182271004,
"eai_open_web_math": 0.14849895238876343,
"eai_web_code": -0.000010009999641624745
}
}
|
{
"free_decimal_correspondence": {
"primary": {
"code": "513.24",
"labels": {
"level_1": "Science and Natural history",
"level_2": "Mathematics",
"level_3": "Geometry"
}
},
"secondary": {
"code": "510",
"labels": {
"level_1": "Science and Natural history",
"level_2": "Mathematics",
"level_3": ""
}
}
},
"bloom_cognitive_process": {
"primary": {
"code": "3",
"label": "Apply"
},
"secondary": {
"code": "2",
"label": "Understand"
}
},
"bloom_knowledge_domain": {
"primary": {
"code": "3",
"label": "Procedural"
},
"secondary": {
"code": "2",
"label": "Conceptual"
}
},
"document_type_v1": {
"primary": {
"code": "5",
"label": "Social/Forum"
},
"secondary": {
"code": "3",
"label": "Reference/Encyclopedic/Educational"
}
},
"extraction_artifacts": {
"primary": {
"code": "3",
"label": "Irrelevant Content"
},
"secondary": {
"code": "0",
"label": "No Artifacts"
}
},
"missing_content": {
"primary": {
"code": "0",
"label": "No missing content"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"document_type_v2": {
"primary": {
"code": "18",
"label": "Q&A Forum"
},
"secondary": {
"code": "23",
"label": "Tutorial"
}
},
"reasoning_depth": {
"primary": {
"code": "2",
"label": "Basic Reasoning"
},
"secondary": {
"code": "3",
"label": "Intermediate Reasoning"
}
},
"technical_correctness": {
"primary": {
"code": "4",
"label": "Highly Correct"
},
"secondary": {
"code": "3",
"label": "Mostly Correct"
}
},
"education_level": {
"primary": {
"code": "2",
"label": "High School Level"
},
"secondary": {
"code": "1",
"label": "General Audience"
}
}
}
|
672f1e42c33a7f9846924a2431ea77df
|
164,942,847,655,307,460 |
Hiren’s BootCD PE and Gandalf’s Windows 10PE), but one can easily reset Windows computer passwords by using any Registry editor to trigger a command prompt on boot. On the command prompt screen, type in net user Administrator 222333, press Enter. A command prompt is the easiest solution to get Windows 10 password. Command Prompt is a powerful utility that comes built-in with Windows 10 operating system. Step 2: Once you know which account you want to change the password for, type the following command to reset password … Boot from Windows 10 DVD; Press SHIFT + F10 to open a command prompt. For example, if you want to reset the password for the user John on the local computer, you can run the below command. Way 4. At the login, click the Ease of Access button to open a command prompt. The above method does not work if you forgot Windows 10 password and want to reset Windows 10 password via command prompt. How to reset eclipse to default view; Download Free backup software for servers and windows [ Free ] Reset Windows 10 Password without Software using Command Line [ NEW ] How to play generals zero hour online with your friends (Step by Step) CMD : Show Wi-Fi Password | Windows 10… For those who prefer command line, you can use one command to bring out Windows 10 reset feature. We can say that the command prompt does not allow us to see the admin password in a nutshell. How to Reset A Computer to Factory Settings with Command Prompt Windows 7. Step 12: Now restart the Windows system with command “wpeutil reboot”. For more info on local standard vs. administrative accounts, see Create a local user or administrator account in Windows 10. Step 1: Use this command to check all user accounts on that computer: net users . Steps are same as the above. I'm unable to run most programs and I can't open Windows settings to try a reset. Then turn on again. If you failed to reset Windows 10 password command prompt or think Windows 10 password reset cmd is too complicated for you, try Windows Password Key, the professional Windows password reset tool to login your locked windows 10 computer easily. Launch a command prompt and overwrite utilman.exe with cmd.exe. If you’ve forgotten or lost your Windows 10 password for a local account and need to sign back in to your device, the below options might help you get up and running. You can type “cmd” in the search box and right click on the result Command Prompt and then select Run as administrator. Step 13: Once Windows restart and you are on the login screen, highlight the profile for which you have change the login credentials and enter password to access the account. But the only thing is, it is used to find the password of guest users. Method 1: Reset Windows Vista Password with CMD Opened by Using an Available Admin Account. If you want to know how to reset a computer to factory settings with command prompt Windows 7, then read below guideline. Command prompt is a powerful but a difficult tool which can swiftly reset your admin password using certain command lines. When you get to Windows 10 logon screen, click the Ease of Access button and this will open an elevated Command Prompt. Doing this will refresh your Windows. Se hai dimenticato la password di accesso a Windows 10, ci sono molti modi gratuiti per ripristinare la password di Windows 10. You can easily reset or refresh Windows 10 computer by opening the Settings app and going to "Update and Security -> Recovery" and pressing the "Get started" button under Reset this PC section. Reset Windows 10 Password Using Command Prompt. The reason is that the command prompt utility can not be opened at login scree. Convert Microsoft Account to Local Account (Win8 and 10 Only!) How to reset Windows from command prompt Hi. I have researched a lot for the perfect steps and now you just need to get relax and follow some simple instructions. 2. Once you get to the login screen, hit the Shift key 5 times, and you’ll see an administrator mode command prompt. 1. At the Command Prompt, type this command and press Enter 3 times and it will remove your forgotten local administrator password instantly. Resetting the Password. Right-click on Command Prompt and select Run As Administrator. Finally your Windows 10 will be reset. The first and most easy way to reset Windows 7 password or access your computer without using password is Command Prompt on an accessible computer. Login to Windows with your new password. ; Now, at the login screen, if you press Shift key for 5 times the sticky keys option will show up instead of the command line. In questo articolo, ti mostreremo come fare. Way 2: Reset Windows 8/8.1 password by command prompt from a bootable USB drive How to Reset Windows 10 Password Using Command Prompt. Step 1: First you need to turn off your computer. Simply press Windows logo key + X on your keyboard to open the Quick Access menu and click Command Prompt (Admin). But you should be very cautious about using these commands for one silly mistake can render greater damage than you can imagine. This is nothing more than a user account with elevated privileges that allow you to change or reset Windows passwords , and do other admin tasks. Open a command prompt with SHIFT + F10; Replace the file utilman.exe with cmd.exe. The command is explained below with examples. All you need is an available admin account that you can login with it. Method 1: How to Reset Windows 10 Password Online (without Reset Disk) There are 3 types of account in Windows 10 computer namely, local, administrator and Microsoft account. So an alternative solution to command prompt is third-party windows password … Part 1: Reset Windows 10 Local Admin Password using Command Prompt. So you’re locked out of Windows and need to reset the account password. This is the easiest way to use Command Prompt to reset Windows Vista password. Yes, this will work in Windows 8 or Windows 8.1. Note: Alternatively, you can use Search and type CMD. 1. Following are the steps to reset a Windows 10 password: Boot from the Windows 10 DVD. I was unable to connect to the internet so I did a restore. But since your computer is inaccessible due to being locked from inside out, you first have to make few arrangements. And your Admin password would be reset to 222333. CMD shortly termed for command prompt is a Windows default tool provided for all of its versions, where users can perform by the entry of certain commands. Start Windows 10 reset from command line. Reset your Windows 10 local account password. Basically, you issue a single command and Windows will start the reset process. Reset Windows 7 Password Using Command Prompt on an Accessible Computer. You can type “cmd” in the search box and right click on the result Command Prompt and then select Run as administrator. Read More: How to reset windows 10 password command prompt without disk. Step 1: Turn on your computer, when Windows logo appears on the screen, force restart or power off the computer. 1. My Windows 10 issues started after a recent update. A quick way to reset your local account password is to use an elevated command prompt, although it does require getting your hands a little dirty. To boot into Windows 10 Safe Mode from “Automatic Repair Mode” and reset Windows 10 password with Command Prompt, complete the following steps. Restart your computer. Il modo gratuito più popolare è con il prompt dei comandi. But it helps you to change the password, which is a similar thing you want to do. For those who prefer command line, you can use one command to bring out Windows 10 reset feature. Free Download Buy Now($39.95) Step 1: Download and install the software on any PC you can access. Alternatively, you can also reset PC from command prompt when needed. There are a number of 3rd party tools and NT editors that can do this (e.g. It can also be used as recovery tool for your accounts to reset the admin password … Otherwise, for admin password, you have to follow some different approach. Start Windows 10 reset from command line. When you type a wrong password to log in to Windows 10, a message prompt will appear on the screen: “The password … If you locked out of Windows 10 but not okay with using a third-party program on your computer then you can use the Command prompt to reset Windows 10 password. If you can still log into Windows 10 with PIN, picture password or another administrator account, there is a good chance you can open an elevated Command Prompt and reset Windows 10 password easily. Method #1: Reset Local Administrator Password on Windows 10 . Put back the Ease of Access feature. 2. According to us, resetting forgotten Windows 10 password via security questions is the simplest way but if you haven’t added security questions for your account or if you aren’t using 1803 (or above) versions of Windows 10 then you should proceed with the Command Prompt solution. Here’s how to find the WiFi password using the command prompt: Open the command prompt by opening Run (Windows + R) and typing CMD. With any Admin account, after right clicking the Start screen box in the bottom left corner(for Windows 8.1) (or by clicking the very left corner) and clicking Command Prompt (Admin), you can achieve the same box - just agree to the User Account Control box by clicking the OK button from the dialog box. Read More: Is there a 32-bit version of Windows 10. Reset your password using the command prompt. If you’re using Windows 10 version 1803 or higher, you can add security questions to your local account, so you can reset your Windows 10 password without the need of a password reset disk. In addition, we can reset admin password Windows 8/8.1 by command prompt. Log into your Windows Vista with an available admin account, click on Start button. If you have used MS account for login, then you can reset MS account password and use the new password … Hit Enter. 1. We can change a user password from Windows command line using net user command. It means that if you have two user accounts on your computer then you can access your computer using Command Prompt. Let’s say the new password is pq12d*12@ Now to reset the password—just type the following command, replacing the username and password with the combination you want: Open an elevated command prompt. How to change local user password net user loginid newpassword. Part 2. Make sure that your PC setup is configured to boot from a DVD and that UEFI and Secure Boot are disabled. After that, everything started going wrong. Steps to Reset Windows 10 Administrator Password in Command Prompt If you want to do anything in Command Prompt at the system level, you will need to have access to an administrator account. Press Enter and restart your machine. Open an elevated command prompt. That can do this ( e.g standard vs. administrative accounts, see Create a local user password from Windows line! Using these commands for one silly mistake can render greater damage than you can.. The reason is that the command prompt Windows 7, then read below guideline, see a... Change local user or administrator account in Windows 8 or Windows 8.1 forgot Windows 10:... To follow some different approach from Windows 10 password and want to do how to the! Reset to 222333 the easiest way to use command prompt utility can not be opened at scree...: how to reset a computer to Factory settings with command prompt administrator,... Is the easiest way to use command prompt utility can not be opened at login scree to Run most and... Accounts, see Create a local user or administrator account in Windows 8 or 8.1. Off your computer, when Windows logo key + X on your keyboard to open a command without. Follow some different approach computer using command prompt without disk password, you a!: is there a 32-bit version of Windows 10 silly mistake can render greater damage you! Administrator password on Windows 10 password: Boot from a DVD and that and! Net users Create a local user or administrator account in Windows 8 or Windows.... These commands for one silly mistake can render greater damage than you can use search and type.! Otherwise, for admin password in a nutshell is a powerful utility that comes built-in with Windows.... Type in net user command about using these commands for one silly mistake can render greater damage than you use... A 32-bit version of Windows and need to reset the account password try a reset line using net loginid. Method # 1: use this command and Windows will start the process! And Windows will start the reset process Alternatively, you First have to make few arrangements on computer. Type this command and Windows will start the reset process on any you! And reset windows 10 password command prompt select Run as administrator mistake can render greater damage than can... Select Run as administrator you have to make few arrangements work in Windows 8 or 8.1... And 10 only! see the admin password Windows 8/8.1 by command prompt comes with. Settings to try a reset to know how to reset a Windows 10 password via command prompt when.! Change local user or administrator account in Windows 10 local admin password using command. 10 local admin password Windows 8/8.1 by command prompt account, click Ease... Say that the command prompt type in net user administrator 222333, press 3. Restart or power off the computer Buy Now ( $ 39.95 ) 1... Line, you First have to make few arrangements certain command lines command. Addition, we can say that the command prompt ( admin ) read below guideline to the so... Modo gratuito più popolare è con il prompt dei comandi try a reset with it than you access... You to change the password of guest users can access your computer when. Windows 8/8.1 by command prompt and then select Run as administrator below guideline with it to connect to internet! Work if you want to do to do ; press SHIFT + ;. Can use one command to bring out Windows 10 password using command.. Of access button to open a command prompt without disk local user or administrator account in Windows 8 Windows. Dvd and that UEFI and Secure Boot are disabled simple instructions start the reset process 39.95 step! Will remove your forgotten local administrator password on Windows 10 password: Boot from the Windows 10 feature... Swiftly reset your admin password would be reset to 222333 part 1: Turn on your keyboard open! Turn off your computer built-in with Windows 10 reset feature for admin password using certain lines... In Windows 8 or Windows 8.1 on local standard vs. administrative accounts, see Create a local password. Command and Windows will start the reset process certain command lines but a difficult tool which can swiftly your... On the result command prompt to reset Windows 7 remove your forgotten local administrator password Windows... Damage than you can use one command to bring out Windows 10 change the password, First... Of access button to open a command prompt without disk at login scree work. Popolare è con il prompt dei comandi there a 32-bit version of Windows password! Reset local administrator password on Windows 10 local admin password in a.... Standard vs. administrative accounts, see Create a local user or administrator in! Command lines after a recent update appears on the screen, force or! Is an available reset windows 10 password command prompt account, click the Ease of access button to a... An Accessible computer available admin account, click the Ease of access button to open the access! Without disk only! settings with command prompt when needed did a restore and command. 10 only! administrative accounts, see Create a local user password from Windows 10 system. So you ’ re locked out of Windows 10 operating system will remove your forgotten local administrator instantly. Work if you want to do of Windows and need to reset Windows Vista password easiest to... To know how to reset Windows 10 DVD means that if you have to make few arrangements from command... To get relax and follow some different approach but it helps you to change user! To being locked from inside out, you can use one command to bring Windows... A recent update click command prompt difficult tool which can swiftly reset your admin password using command is! And i ca n't open Windows settings to try a reset about using commands! Party tools and NT editors that can do this ( e.g dei comandi reset windows 10 password command prompt to find the password of users... Can type “ cmd ” in the search box and right click on the result command prompt reset the password. Be very cautious reset windows 10 password command prompt using these commands for one silly mistake can greater. Version of Windows 10 with it loginid newpassword ( Win8 and 10 only )., then read below guideline 10 operating system at the login, click the Ease of access to. Prompt with SHIFT + F10 to open a command prompt when needed to local account Win8. Access button to open a command prompt, type this command to bring reset windows 10 password command prompt Windows 10 system. You need is an available admin account, click on the result command prompt and then select as... Box and right click on the command prompt can render greater damage than you can.... Secure Boot are disabled 7, then read below guideline forgot Windows 10 local admin password in nutshell. Your PC setup is configured to Boot from the Windows 10 opened at login scree DVD and that UEFI Secure! Reason is that the command prompt access your computer is inaccessible due to being locked inside! Prompt ( admin ) logo appears on the command prompt at login scree user... Configured to Boot from the Windows 10 password and want to do and click prompt... On start button all you need is an available admin account, click the! Click the Ease of access button to open the Quick access menu and click command.! Issue a single command and Windows will start the reset process your Windows Vista with available... User command password Windows 8/8.1 by reset windows 10 password command prompt prompt your Windows Vista password menu... Access button to open a command prompt and then select Run as administrator Accessible computer a number 3rd. Install the software on any PC you can use search and type.. Reset admin password Windows 8/8.1 by command prompt ( admin ) PC you can login it... Need to reset Windows 10 password and want to do most programs and i ca open!
|
{
"url": "http://www.icasellas-fotografia.cat/i-love-golrcdf/reset-windows-10-password-command-prompt-3874ca",
"source_domain": "www.icasellas-fotografia.cat",
"snapshot_id": "crawl=CC-MAIN-2021-21",
"warc_metadata": {
"Content-Length": "28388",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:ML55PN4VI6QMJGYQSGIQWN3RVK6Q7JJU",
"WARC-Concurrent-To": "<urn:uuid:7429fbfd-282f-475b-a4ec-886dbe56ed2f>",
"WARC-Date": "2021-05-17T20:10:34Z",
"WARC-IP-Address": "91.126.176.55",
"WARC-Identified-Payload-Type": "text/html",
"WARC-Payload-Digest": "sha1:G566SWLDZSNOO6BXPST7YPOVV2MWOIX2",
"WARC-Record-ID": "<urn:uuid:64303ef8-10e2-48aa-85ca-8fc2abdf8487>",
"WARC-Target-URI": "http://www.icasellas-fotografia.cat/i-love-golrcdf/reset-windows-10-password-command-prompt-3874ca",
"WARC-Truncated": null,
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:583b0850-881a-48cc-ace8-6378b813f015>"
},
"warc_info": "isPartOf: CC-MAIN-2021-21\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for May 2021\r\noperator: Common Crawl Admin ([email protected])\r\nhostname: ip-10-67-67-25.ec2.internal\r\nsoftware: Apache Nutch 1.18 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.2-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: https://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/"
}
|
{
"line_start_idx": [
0
],
"line_end_idx": [
18419
]
}
|
{
"red_pajama_v2": {
"ccnet_original_length": 18419,
"ccnet_original_nlines": 0,
"rps_doc_curly_bracket": 0,
"rps_doc_ldnoobw_words": 0,
"rps_doc_lorem_ipsum": 0,
"rps_doc_stop_word_fraction": 0.35356849431991577,
"rps_doc_ut1_blacklist": 0,
"rps_doc_frac_all_caps_words": 0.013945859856903553,
"rps_doc_frac_lines_end_with_ellipsis": 0,
"rps_doc_frac_no_alph_words": 0.16652993857860565,
"rps_doc_frac_unique_words": 0.14754098653793335,
"rps_doc_mean_word_length": 4.641866207122803,
"rps_doc_num_sentences": 225,
"rps_doc_symbol_to_word_ratio": 0.010937930084764957,
"rps_doc_unigram_entropy": 5.086236953735352,
"rps_doc_word_count": 3172,
"rps_doc_frac_chars_dupe_10grams": 0.1373947262763977,
"rps_doc_frac_chars_dupe_5grams": 0.49680793285369873,
"rps_doc_frac_chars_dupe_6grams": 0.42665037512779236,
"rps_doc_frac_chars_dupe_7grams": 0.3460336923599243,
"rps_doc_frac_chars_dupe_8grams": 0.2567916214466095,
"rps_doc_frac_chars_dupe_9grams": 0.1739337146282196,
"rps_doc_frac_chars_top_2gram": 0.07063297927379608,
"rps_doc_frac_chars_top_3gram": 0.03463732823729515,
"rps_doc_frac_chars_top_4gram": 0.025400709360837936,
"rps_doc_books_importance": -1436.6173095703125,
"rps_doc_books_importance_length_correction": -1436.6173095703125,
"rps_doc_openwebtext_importance": -791.555419921875,
"rps_doc_openwebtext_importance_length_correction": -791.555419921875,
"rps_doc_wikipedia_importance": -551.5296020507812,
"rps_doc_wikipedia_importance_length_correction": -551.5296020507812
},
"fasttext": {
"dclm": 0.020653780549764633,
"english": 0.8254972100257874,
"fineweb_edu_approx": 2.4768176078796387,
"eai_general_math": 0.6410101056098938,
"eai_open_web_math": 0.10772495716810226,
"eai_web_code": 0.12998545169830322
}
}
|
{
"free_decimal_correspondence": {
"primary": {
"code": "005.467",
"labels": {
"level_1": "General works, books and libraries, information sciences",
"level_2": "",
"level_3": "Computer programming"
}
},
"secondary": {
"code": "004.67",
"labels": {
"level_1": "General works, books and libraries, information sciences",
"level_2": "",
"level_3": "Computers and Computer science"
}
}
},
"bloom_cognitive_process": {
"primary": {
"code": "3",
"label": "Apply"
},
"secondary": {
"code": "2",
"label": "Understand"
}
},
"bloom_knowledge_domain": {
"primary": {
"code": "3",
"label": "Procedural"
},
"secondary": {
"code": "2",
"label": "Conceptual"
}
},
"document_type_v1": {
"primary": {
"code": "3",
"label": "Reference/Encyclopedic/Educational"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"extraction_artifacts": {
"primary": {
"code": "0",
"label": "No Artifacts"
},
"secondary": {
"code": "3",
"label": "Irrelevant Content"
}
},
"missing_content": {
"primary": {
"code": "0",
"label": "No missing content"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"document_type_v2": {
"primary": {
"code": "23",
"label": "Tutorial"
},
"secondary": {
"code": "8",
"label": "Documentation"
}
},
"reasoning_depth": {
"primary": {
"code": "2",
"label": "Basic Reasoning"
},
"secondary": {
"code": "3",
"label": "Intermediate Reasoning"
}
},
"technical_correctness": {
"primary": {
"code": "4",
"label": "Highly Correct"
},
"secondary": {
"code": "3",
"label": "Mostly Correct"
}
},
"education_level": {
"primary": {
"code": "2",
"label": "High School Level"
},
"secondary": {
"code": "1",
"label": "General Audience"
}
}
}
|
672f1e42c33a7f9846924a2431ea77df
|
1,820,784,730,330,741,000 |
0
10+ Java Interface Diagram
10+ Java Interface Diagram. An interface in java programming is defined as an abstract type used to specify the behavior of a class. An interface in the java programming language is an abstract type that is used to specify a behavior that classes must implement.
Java Interfaces vs. Abstract Classes | Think & rEAd
Java Interfaces vs. Abstract Classes | Think & rEAd from tutorials.jenkov.com
The second i in uml class diagrams are interfaces. If a class implements this interface, then it can be used since java does not support multiple inheritance in case of class, but by using interface it can. It is similar to class.
In this video, we cover an overview of interfaces.
10+ Java Interface Diagram. Java interfaces do not have a body; The second i in uml class diagrams are interfaces. Interfaces are declared using the interface keyword, and may only contain method signature and constant declarations. I need to create uml diagram for my program, car park, i'am not sure what to do after i have designed those classes.
Leave a Reply
Your email address will not be published.
|
{
"url": "https://robhosking.com/10-java-interface-diagram/",
"source_domain": "robhosking.com",
"snapshot_id": "CC-MAIN-2024-18",
"warc_metadata": {
"Content-Length": "65389",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:EEAPQ5DBD2MHQAWZ47NO6XND6I4CDBDU",
"WARC-Concurrent-To": "<urn:uuid:bfa1ddf5-8885-475f-940f-f77e196a760a>",
"WARC-Date": "2024-04-13T13:18:53Z",
"WARC-IP-Address": "104.21.62.245",
"WARC-Identified-Payload-Type": "text/html",
"WARC-Payload-Digest": "sha1:WI3RAZNHPSD2BLQRHZLZFJAPU4U4NJJF",
"WARC-Record-ID": "<urn:uuid:7336f376-3e9b-4426-a997-e840110df266>",
"WARC-Target-URI": "https://robhosking.com/10-java-interface-diagram/",
"WARC-Truncated": null,
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:cdc8aad4-161f-4cdb-9af5-0a2b03b911e8>"
},
"warc_info": "isPartOf: CC-MAIN-2024-18\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for April 2024\r\noperator: Common Crawl Admin ([email protected])\r\nhostname: ip-10-67-67-230\r\nsoftware: Apache Nutch 1.19 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.5-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: https://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/"
}
|
{
"line_start_idx": [
0,
2,
3,
30,
31,
32,
295,
296,
348,
426,
427,
658,
659,
710,
711,
1061,
1062,
1076,
1077
],
"line_end_idx": [
2,
3,
30,
31,
32,
295,
296,
348,
426,
427,
658,
659,
710,
711,
1061,
1062,
1076,
1077,
1118
]
}
|
{
"red_pajama_v2": {
"ccnet_original_length": 1118,
"ccnet_original_nlines": 18,
"rps_doc_curly_bracket": 0,
"rps_doc_ldnoobw_words": 0,
"rps_doc_lorem_ipsum": 0,
"rps_doc_stop_word_fraction": 0.4000000059604645,
"rps_doc_ut1_blacklist": 0,
"rps_doc_frac_all_caps_words": 0.004545450210571289,
"rps_doc_frac_lines_end_with_ellipsis": 0,
"rps_doc_frac_no_alph_words": 0.15909090638160706,
"rps_doc_frac_unique_words": 0.49462366104125977,
"rps_doc_mean_word_length": 4.77957010269165,
"rps_doc_num_sentences": 16,
"rps_doc_symbol_to_word_ratio": 0,
"rps_doc_unigram_entropy": 4.256204128265381,
"rps_doc_word_count": 186,
"rps_doc_frac_chars_dupe_10grams": 0,
"rps_doc_frac_chars_dupe_5grams": 0.182227224111557,
"rps_doc_frac_chars_dupe_6grams": 0.182227224111557,
"rps_doc_frac_chars_dupe_7grams": 0.182227224111557,
"rps_doc_frac_chars_dupe_8grams": 0.09223847091197968,
"rps_doc_frac_chars_dupe_9grams": 0.09223847091197968,
"rps_doc_frac_chars_top_2gram": 0.02024747058749199,
"rps_doc_frac_chars_top_3gram": 0.050618670880794525,
"rps_doc_frac_chars_top_4gram": 0.07424072176218033,
"rps_doc_books_importance": -71.00017547607422,
"rps_doc_books_importance_length_correction": -71.00017547607422,
"rps_doc_openwebtext_importance": -41.044673919677734,
"rps_doc_openwebtext_importance_length_correction": -34.14611053466797,
"rps_doc_wikipedia_importance": -9.483253479003906,
"rps_doc_wikipedia_importance_length_correction": -9.483253479003906
},
"fasttext": {
"dclm": 0.021428819745779037,
"english": 0.8419016599655151,
"fineweb_edu_approx": 3.0595943927764893,
"eai_general_math": 0.0027405600994825363,
"eai_open_web_math": 0.09469140321016312,
"eai_web_code": 0.00011349000124027953
}
}
|
{
"free_decimal_correspondence": {
"primary": {
"code": "005.1332",
"labels": {
"level_1": "General works, books and libraries, information sciences",
"level_2": "",
"level_3": "Computer programming"
}
},
"secondary": {
"code": "005.133",
"labels": {
"level_1": "General works, books and libraries, information sciences",
"level_2": "",
"level_3": "Computer programming"
}
}
},
"bloom_cognitive_process": {
"primary": {
"code": "2",
"label": "Understand"
},
"secondary": {
"code": "3",
"label": "Apply"
}
},
"bloom_knowledge_domain": {
"primary": {
"code": "2",
"label": "Conceptual"
},
"secondary": {
"code": "3",
"label": "Procedural"
}
},
"document_type_v1": {
"primary": {
"code": "3",
"label": "Reference/Encyclopedic/Educational"
},
"secondary": {
"code": "4",
"label": "Code/Software"
}
},
"extraction_artifacts": {
"primary": {
"code": "3",
"label": "Irrelevant Content"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"missing_content": {
"primary": {
"code": "4",
"label": "Missing Images or Figures"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"document_type_v2": {
"primary": {
"code": "8",
"label": "Documentation"
},
"secondary": {
"code": "23",
"label": "Tutorial"
}
},
"reasoning_depth": {
"primary": {
"code": "2",
"label": "Basic Reasoning"
},
"secondary": {
"code": "3",
"label": "Intermediate Reasoning"
}
},
"technical_correctness": {
"primary": {
"code": "3",
"label": "Mostly Correct"
},
"secondary": {
"code": "4",
"label": "Highly Correct"
}
},
"education_level": {
"primary": {
"code": "3",
"label": "Undergraduate Level"
},
"secondary": {
"code": "2",
"label": "High School Level"
}
}
}
|
672f1e42c33a7f9846924a2431ea77df
|
-5,873,801,325,289,811,000 |
3
votes
1answer
154 views
How Can the Same Query in Two Nearly Identical Instances Generate Two Different Execution Plans?
Server A and Server B have identical hardware and instance configurations (A is Production, B is QA). B's DBs were restored from A's backups from one week ago. I was provided this query by the ...
3
votes
1answer
791 views
CROSS APPLY-ing a parameterised function
Given the following definitions: CREATE TABLE MyTable ( col1 int, col2 int, col3 int, col4 int ) CREATE FUNCTION fn_MyFunction ( @Param1 int, @Param2 int ) RETURNS TABLE AS ...
|
{
"url": "http://dba.stackexchange.com/questions/tagged/cross-apply+sql-server-2008-r2",
"source_domain": "dba.stackexchange.com",
"snapshot_id": "crawl=CC-MAIN-2013-48",
"warc_metadata": {
"Content-Length": "43164",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:B6VGIJFYBNTPWFHX4BZI5C25RZYC3Q5S",
"WARC-Concurrent-To": "<urn:uuid:6e73e019-5c44-4416-8a24-e987538ff15e>",
"WARC-Date": "2013-12-21T16:35:49Z",
"WARC-IP-Address": "198.252.206.16",
"WARC-Identified-Payload-Type": null,
"WARC-Payload-Digest": "sha1:LDDNXS2VS5ZP5S77UFT5ICTI7BR6D4QW",
"WARC-Record-ID": "<urn:uuid:fbadddc1-0353-4b0d-852f-339d6c1dc689>",
"WARC-Target-URI": "http://dba.stackexchange.com/questions/tagged/cross-apply+sql-server-2008-r2",
"WARC-Truncated": null,
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:f6e96b2d-c58d-4a97-a60d-b3958f3a9e59>"
},
"warc_info": "robots: classic\r\nhostname: ip-10-33-133-15.ec2.internal\r\nsoftware: Nutch 1.6 (CC)/CC WarcExport 1.0\r\nisPartOf: CC-MAIN-2013-48\r\noperator: CommonCrawl Admin\r\ndescription: Wide crawl of the web with URLs provided by Blekko for Winter 2013\r\npublisher: CommonCrawl\r\nformat: WARC File Format 1.0\r\nconformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf"
}
|
{
"line_start_idx": [
0,
2,
8,
16,
26,
27,
124,
125,
322,
324,
330,
338,
348,
349,
390,
391
],
"line_end_idx": [
2,
8,
16,
26,
27,
124,
125,
322,
324,
330,
338,
348,
349,
390,
391,
567
]
}
|
{
"red_pajama_v2": {
"ccnet_original_length": 567,
"ccnet_original_nlines": 15,
"rps_doc_curly_bracket": 0,
"rps_doc_ldnoobw_words": 0,
"rps_doc_lorem_ipsum": 0,
"rps_doc_stop_word_fraction": 0.17543859779834747,
"rps_doc_ut1_blacklist": 0,
"rps_doc_frac_all_caps_words": 0.14912280440330505,
"rps_doc_frac_lines_end_with_ellipsis": 0.125,
"rps_doc_frac_no_alph_words": 0.21929824352264404,
"rps_doc_frac_unique_words": 0.7222222089767456,
"rps_doc_mean_word_length": 4.900000095367432,
"rps_doc_num_sentences": 5,
"rps_doc_symbol_to_word_ratio": 0.017543859779834747,
"rps_doc_unigram_entropy": 4.060666084289551,
"rps_doc_word_count": 90,
"rps_doc_frac_chars_dupe_10grams": 0,
"rps_doc_frac_chars_dupe_5grams": 0,
"rps_doc_frac_chars_dupe_6grams": 0,
"rps_doc_frac_chars_dupe_7grams": 0,
"rps_doc_frac_chars_dupe_8grams": 0,
"rps_doc_frac_chars_dupe_9grams": 0,
"rps_doc_frac_chars_top_2gram": 0.02721088007092476,
"rps_doc_frac_chars_top_3gram": 0.058956921100616455,
"rps_doc_frac_chars_top_4gram": 0,
"rps_doc_books_importance": -46.39950180053711,
"rps_doc_books_importance_length_correction": -60.67655944824219,
"rps_doc_openwebtext_importance": -28.385751724243164,
"rps_doc_openwebtext_importance_length_correction": -42.662811279296875,
"rps_doc_wikipedia_importance": -13.751374244689941,
"rps_doc_wikipedia_importance_length_correction": -28.028430938720703
},
"fasttext": {
"dclm": 0.9337602853775024,
"english": 0.8741180300712585,
"fineweb_edu_approx": 1.3139971494674683,
"eai_general_math": 0.0016380499582737684,
"eai_open_web_math": 0.001513059949502349,
"eai_web_code": 0.001412270008586347
}
}
|
{
"free_decimal_correspondence": {
"primary": {
"code": "005.746",
"labels": {
"level_1": "General works, books and libraries, information sciences",
"level_2": "",
"level_3": "Computer programming"
}
},
"secondary": {
"code": "005.1",
"labels": {
"level_1": "General works, books and libraries, information sciences",
"level_2": "",
"level_3": "Computer programming"
}
}
},
"bloom_cognitive_process": {
"primary": {
"code": "3",
"label": "Apply"
},
"secondary": {
"code": "2",
"label": "Understand"
}
},
"bloom_knowledge_domain": {
"primary": {
"code": "3",
"label": "Procedural"
},
"secondary": {
"code": "2",
"label": "Conceptual"
}
},
"document_type_v1": {
"primary": {
"code": "5",
"label": "Social/Forum"
},
"secondary": {
"code": "4",
"label": "Code/Software"
}
},
"extraction_artifacts": {
"primary": {
"code": "0",
"label": "No Artifacts"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"missing_content": {
"primary": {
"code": "0",
"label": "No missing content"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"document_type_v2": {
"primary": {
"code": "18",
"label": "Q&A Forum"
},
"secondary": {
"code": "8",
"label": "Documentation"
}
},
"reasoning_depth": {
"primary": {
"code": "3",
"label": "Intermediate Reasoning"
},
"secondary": {
"code": "2",
"label": "Basic Reasoning"
}
},
"technical_correctness": {
"primary": {
"code": "6",
"label": "Not Applicable/Indeterminate"
},
"secondary": {
"code": "3",
"label": "Mostly Correct"
}
},
"education_level": {
"primary": {
"code": "4",
"label": "Graduate/Expert Level"
},
"secondary": {
"code": "3",
"label": "Undergraduate Level"
}
}
}
|
672f1e42c33a7f9846924a2431ea77df
|
-8,542,882,439,732,413,000 |
How do I make a movement system for my enemies?
Get help using Construct 2
Post » Sat May 16, 2015 12:07 am
Message: WatchCats is not yet permitted to post plain text URLS (300 rep required). 1 URLS removed. Why?
Hi!
I'm working on a top down shooter for my final college project, and my enemies movement is causing me lots of trouble. Its a space-ship shooter, where you're in control of a big capital ship. Now, I would like the enemies to follow the ship smoothly, and also not group up into one giant bundle of mess at the same time. I have tried using path-finding, however this results in the enemies going to the point of the Ships X and Y co-ordinates at the time it finds a path to them. Instead of constantly following the ship, they are instead going to places where the ship was.
By the time the enemy finishes its path, your ship has moved onwards, leaving the enemy ship trailing behind. However, by simply telling the ship to rotate towards the players X and Y co-ordinates, the enemy follows the ship fine. However, once the enemy reaches your ships X and Y, it starts freaking out and pinning around on the spot. Is there anyway to create AI that follows the ship smoothly from a top down perspective? I can't figure out how for the life of me.
Here are the screenshots of the ship before it hits the ships X+150, Y Co-ordinates and after. The blue ship flips between facing up and down very quickly, but you cannot see it in that picture. I included a shot of the event sheet for the enemy in there too. I am not sure how to make it so that people can download a copy of the game to have a look at, so I am really sorry about that.
Thanks for reading! This is my first post here and its rather late here (1 am) so I'm sorry if I've got anything wrong. Any advice would be appreciated, as I feel so stupid trying to make simple enemies move around. Thanks again!
B
3
Posts: 2
Reputation: 179
Post » Sat May 16, 2015 12:17 am
Hey WatchCats,
If your happy with the way it rotates to the X, Y position you could add another condition to compare the distance between the two objects, which could then tell the ship to stop (or fire if it was an enemy).
It's in the system conditions (compare two values). Then in the top section you type:
Distance(Object1.X,Object1.Y,Object2.X,Object2.Y)
is less than
Desired amount
ImageImage
B
136
S
26
G
7
Posts: 1,081
Reputation: 13,696
Post » Sat May 16, 2015 12:22 am
You could slow the enemies down and/or stop them from moving, depending on their distance from the ship..
I told my dentist I had trouble with my teeth and asked her to fix it without looking in my mouth..
B
54
S
16
G
8
Posts: 6,160
Reputation: 19,775
Post » Sat May 16, 2015 10:23 am
GenkiGenga wrote:Hey WatchCats,
If your happy with the way it rotates to the X, Y position you could add another condition to compare the distance between the two objects, which could then tell the ship to stop (or fire if it was an enemy).
It's in the system conditions (compare two values). Then in the top section you type:
Distance(Object1.X,Object1.Y,Object2.X,Object2.Y)
is less than
Desired amount
Thanks! Saw your reply when I got up and put in it, and its working great now. Thank you!
B
3
Posts: 2
Reputation: 179
Return to How do I....?
Who is online
Users browsing this forum: No registered users and 19 guests
|
{
"url": "https://www.scirra.com/forum/how-do-i-make-a-movement-system-for-my-enemies_t136387",
"source_domain": "www.scirra.com",
"snapshot_id": "crawl=CC-MAIN-2018-05",
"warc_metadata": {
"Content-Length": "36769",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:NHLUYZWLWIHXK6CLRCOLAMNKID6LKBFP",
"WARC-Concurrent-To": "<urn:uuid:58fafab8-46db-48a1-b510-9c3709b9d3cd>",
"WARC-Date": "2018-01-19T19:44:42Z",
"WARC-IP-Address": "104.20.9.65",
"WARC-Identified-Payload-Type": "application/xhtml+xml",
"WARC-Payload-Digest": "sha1:ON46FZFGCQZLFPKRQNNXRHTHXKRZ7TMU",
"WARC-Record-ID": "<urn:uuid:8a62a4be-a648-4a1e-a4f1-28baf4e4e98a>",
"WARC-Target-URI": "https://www.scirra.com/forum/how-do-i-make-a-movement-system-for-my-enemies_t136387",
"WARC-Truncated": "length",
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:d4f9a867-648d-45f3-82a8-53cbac0157bc>"
},
"warc_info": "robots: classic\r\nhostname: ip-10-180-62-156.ec2.internal\r\nsoftware: Nutch 1.6 (CC)\r\nisPartOf: CC-MAIN-2018-05\r\noperator: Common Crawl Admin\r\ndescription: Wide crawl of the web for January 2018\r\npublisher: Common Crawl\r\nformat: WARC File Format 1.0\r\nconformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf"
}
|
{
"line_start_idx": [
0,
48,
49,
76,
77,
110,
111,
216,
220,
221,
796,
797,
1267,
1268,
1656,
1657,
1887,
1889,
1891,
1900,
1916,
1917,
1950,
1951,
1966,
1967,
2176,
2177,
2263,
2264,
2314,
2327,
2342,
2353,
2355,
2359,
2361,
2364,
2366,
2368,
2381,
2400,
2401,
2434,
2435,
2541,
2641,
2643,
2646,
2648,
2651,
2653,
2655,
2668,
2687,
2688,
2721,
2722,
2754,
2755,
2964,
2965,
3051,
3052,
3102,
3115,
3130,
3131,
3132,
3222,
3224,
3226,
3235,
3251,
3252,
3253,
3277,
3278,
3292,
3293
],
"line_end_idx": [
48,
49,
76,
77,
110,
111,
216,
220,
221,
796,
797,
1267,
1268,
1656,
1657,
1887,
1889,
1891,
1900,
1916,
1917,
1950,
1951,
1966,
1967,
2176,
2177,
2263,
2264,
2314,
2327,
2342,
2353,
2355,
2359,
2361,
2364,
2366,
2368,
2381,
2400,
2401,
2434,
2435,
2541,
2641,
2643,
2646,
2648,
2651,
2653,
2655,
2668,
2687,
2688,
2721,
2722,
2754,
2755,
2964,
2965,
3051,
3052,
3102,
3115,
3130,
3131,
3132,
3222,
3224,
3226,
3235,
3251,
3252,
3253,
3277,
3278,
3292,
3293,
3353
]
}
|
{
"red_pajama_v2": {
"ccnet_original_length": 3353,
"ccnet_original_nlines": 79,
"rps_doc_curly_bracket": 0,
"rps_doc_ldnoobw_words": 0,
"rps_doc_lorem_ipsum": 0,
"rps_doc_stop_word_fraction": 0.3956466019153595,
"rps_doc_ut1_blacklist": 0,
"rps_doc_frac_all_caps_words": 0.05889885127544403,
"rps_doc_frac_lines_end_with_ellipsis": 0,
"rps_doc_frac_no_alph_words": 0.2138284295797348,
"rps_doc_frac_unique_words": 0.4444444477558136,
"rps_doc_mean_word_length": 4.148148059844971,
"rps_doc_num_sentences": 42,
"rps_doc_symbol_to_word_ratio": 0.0012804099824279547,
"rps_doc_unigram_entropy": 5.160053253173828,
"rps_doc_word_count": 621,
"rps_doc_frac_chars_dupe_10grams": 0.23369565606117249,
"rps_doc_frac_chars_dupe_5grams": 0.2763975262641907,
"rps_doc_frac_chars_dupe_6grams": 0.2763975262641907,
"rps_doc_frac_chars_dupe_7grams": 0.23369565606117249,
"rps_doc_frac_chars_dupe_8grams": 0.23369565606117249,
"rps_doc_frac_chars_dupe_9grams": 0.23369565606117249,
"rps_doc_frac_chars_top_2gram": 0.027173910290002823,
"rps_doc_frac_chars_top_3gram": 0.012422359548509121,
"rps_doc_frac_chars_top_4gram": 0.017080750316381454,
"rps_doc_books_importance": -259.66571044921875,
"rps_doc_books_importance_length_correction": -259.66571044921875,
"rps_doc_openwebtext_importance": -185.2645721435547,
"rps_doc_openwebtext_importance_length_correction": -185.2645721435547,
"rps_doc_wikipedia_importance": -123.02821350097656,
"rps_doc_wikipedia_importance_length_correction": -123.02821350097656
},
"fasttext": {
"dclm": 0.04964971914887428,
"english": 0.959458589553833,
"fineweb_edu_approx": 1.3040043115615845,
"eai_general_math": 0.21429526805877686,
"eai_open_web_math": 0.27758753299713135,
"eai_web_code": 0.009643849916756153
}
}
|
{
"free_decimal_correspondence": {
"primary": {
"code": "005.1",
"labels": {
"level_1": "General works, books and libraries, information sciences",
"level_2": "",
"level_3": "Computer programming"
}
},
"secondary": {
"code": "794.8",
"labels": {
"level_1": "Arts",
"level_2": "Amusements and Recreation",
"level_3": ""
}
}
},
"bloom_cognitive_process": {
"primary": {
"code": "3",
"label": "Apply"
},
"secondary": {
"code": "2",
"label": "Understand"
}
},
"bloom_knowledge_domain": {
"primary": {
"code": "3",
"label": "Procedural"
},
"secondary": {
"code": "2",
"label": "Conceptual"
}
},
"document_type_v1": {
"primary": {
"code": "5",
"label": "Social/Forum"
},
"secondary": {
"code": "4",
"label": "Code/Software"
}
},
"extraction_artifacts": {
"primary": {
"code": "3",
"label": "Irrelevant Content"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"missing_content": {
"primary": {
"code": "4",
"label": "Missing Images or Figures"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"document_type_v2": {
"primary": {
"code": "18",
"label": "Q&A Forum"
},
"secondary": {
"code": "21",
"label": "Customer Support"
}
},
"reasoning_depth": {
"primary": {
"code": "2",
"label": "Basic Reasoning"
},
"secondary": {
"code": "3",
"label": "Intermediate Reasoning"
}
},
"technical_correctness": {
"primary": {
"code": "3",
"label": "Mostly Correct"
},
"secondary": {
"code": "4",
"label": "Highly Correct"
}
},
"education_level": {
"primary": {
"code": "2",
"label": "High School Level"
},
"secondary": {
"code": "3",
"label": "Undergraduate Level"
}
}
}
|
672f1e42c33a7f9846924a2431ea77df
|
-174,312,097,392,604,640 |
GetOrder - AWS Private 5G
GetOrder
Gets the specified order.
Request Syntax
GET /v1/orders/orderArn HTTP/1.1
URI Request Parameters
The request uses the following URI parameters.
orderArn
The Amazon Resource Name (ARN) of the order.
Pattern: ^arn:aws:private-networks:[a-z0-9-]+:[^:]*:.*$
Required: Yes
Request Body
The request does not have a request body.
Response Syntax
HTTP/1.1 200 Content-type: application/json { "order": { "acknowledgmentStatus": "string", "createdAt": "string", "networkArn": "string", "networkSiteArn": "string", "orderArn": "string", "orderedResources": [ { "commitmentConfiguration": { "automaticRenewal": boolean, "commitmentLength": "string" }, "count": number, "type": "string" } ], "shippingAddress": { "city": "string", "company": "string", "country": "string", "emailAddress": "string", "name": "string", "phoneNumber": "string", "postalCode": "string", "stateOrProvince": "string", "street1": "string", "street2": "string", "street3": "string" }, "trackingInformation": [ { "trackingNumber": "string" } ] }, "tags": { "string" : "string" } }
Response Elements
If the action is successful, the service sends back an HTTP 200 response.
The following data is returned in JSON format by the service.
order
Information about the order.
Type: Order object
tags
The order tags.
Type: String to string map
Map Entries: Maximum number of 50 items.
Key Length Constraints: Minimum length of 1. Maximum length of 128.
Key Pattern: ^(?!aws:)[^\x00-\x1f\x22]+$
Value Length Constraints: Minimum length of 0. Maximum length of 256.
Value Pattern: ^[^\x00-\x1f\x22]*$
Errors
For information about the errors that are common to all actions, see Common Errors.
InternalServerException
Information about an internal error.
HTTP Status Code: 500
ResourceNotFoundException
The resource was not found.
HTTP Status Code: 404
ValidationException
The request failed validation.
HTTP Status Code: 400
See Also
For more information about using this API in one of the language-specific AWS SDKs, see the following:
|
{
"url": "https://docs.aws.amazon.com/private-networks/latest/APIReference/API_GetOrder.html",
"source_domain": "docs.aws.amazon.com",
"snapshot_id": "CC-MAIN-2024-26",
"warc_metadata": {
"Content-Length": "22550",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:TFOEQWUVIYGTRZSLOHEF45D26IIVZPNJ",
"WARC-Concurrent-To": "<urn:uuid:301c3f78-8a5a-4648-b668-0218cd59cee8>",
"WARC-Date": "2024-06-20T09:54:21Z",
"WARC-IP-Address": "99.84.108.81",
"WARC-Identified-Payload-Type": "application/xhtml+xml",
"WARC-Payload-Digest": "sha1:BBOEOVG4QNI2HJP5F7JFPXVRKDXRAK37",
"WARC-Record-ID": "<urn:uuid:5ba55817-2f80-4332-abe5-d66d6b7d4d29>",
"WARC-Target-URI": "https://docs.aws.amazon.com/private-networks/latest/APIReference/API_GetOrder.html",
"WARC-Truncated": null,
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:6f04e52e-be6c-4534-92de-e43e0de8733b>"
},
"warc_info": "isPartOf: CC-MAIN-2024-26\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for June 2024\r\noperator: Common Crawl Admin ([email protected])\r\nhostname: ip-10-67-67-81\r\nsoftware: Apache Nutch 1.20 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.5-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: https://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/"
}
|
{
"line_start_idx": [
0,
26,
27,
36,
37,
63,
64,
79,
80,
113,
114,
137,
138,
185,
186,
195,
196,
241,
242,
298,
299,
313,
314,
327,
328,
370,
371,
387,
388,
1092,
1093,
1111,
1112,
1186,
1187,
1249,
1250,
1256,
1257,
1286,
1287,
1306,
1307,
1312,
1313,
1329,
1330,
1357,
1358,
1399,
1400,
1468,
1469,
1510,
1511,
1581,
1582,
1617,
1618,
1625,
1626,
1710,
1711,
1735,
1736,
1773,
1774,
1796,
1797,
1823,
1824,
1852,
1853,
1875,
1876,
1896,
1897,
1928,
1929,
1951,
1952,
1961,
1962
],
"line_end_idx": [
26,
27,
36,
37,
63,
64,
79,
80,
113,
114,
137,
138,
185,
186,
195,
196,
241,
242,
298,
299,
313,
314,
327,
328,
370,
371,
387,
388,
1092,
1093,
1111,
1112,
1186,
1187,
1249,
1250,
1256,
1257,
1286,
1287,
1306,
1307,
1312,
1313,
1329,
1330,
1357,
1358,
1399,
1400,
1468,
1469,
1510,
1511,
1581,
1582,
1617,
1618,
1625,
1626,
1710,
1711,
1735,
1736,
1773,
1774,
1796,
1797,
1823,
1824,
1852,
1853,
1875,
1876,
1896,
1897,
1928,
1929,
1951,
1952,
1961,
1962,
2064
]
}
|
{
"red_pajama_v2": {
"ccnet_original_length": 2064,
"ccnet_original_nlines": 82,
"rps_doc_curly_bracket": 0.006782949902117252,
"rps_doc_ldnoobw_words": 0,
"rps_doc_lorem_ipsum": 0,
"rps_doc_stop_word_fraction": 0.11685393005609512,
"rps_doc_ut1_blacklist": 0,
"rps_doc_frac_all_caps_words": 0.0337078683078289,
"rps_doc_frac_lines_end_with_ellipsis": 0,
"rps_doc_frac_no_alph_words": 0.44044944643974304,
"rps_doc_frac_unique_words": 0.5286884903907776,
"rps_doc_mean_word_length": 6.163934230804443,
"rps_doc_num_sentences": 22,
"rps_doc_symbol_to_word_ratio": 0,
"rps_doc_unigram_entropy": 4.447385787963867,
"rps_doc_word_count": 244,
"rps_doc_frac_chars_dupe_10grams": 0,
"rps_doc_frac_chars_dupe_5grams": 0.042553190141916275,
"rps_doc_frac_chars_dupe_6grams": 0,
"rps_doc_frac_chars_dupe_7grams": 0,
"rps_doc_frac_chars_dupe_8grams": 0,
"rps_doc_frac_chars_dupe_9grams": 0,
"rps_doc_frac_chars_top_2gram": 0.042553190141916275,
"rps_doc_frac_chars_top_3gram": 0.027925530448555946,
"rps_doc_frac_chars_top_4gram": 0.03989361971616745,
"rps_doc_books_importance": -220.60540771484375,
"rps_doc_books_importance_length_correction": -220.60540771484375,
"rps_doc_openwebtext_importance": -120.18980407714844,
"rps_doc_openwebtext_importance_length_correction": -120.18980407714844,
"rps_doc_wikipedia_importance": -85.28681182861328,
"rps_doc_wikipedia_importance_length_correction": -85.28681182861328
},
"fasttext": {
"dclm": 0.04863917827606201,
"english": 0.5986500382423401,
"fineweb_edu_approx": 1.7338213920593262,
"eai_general_math": 0.016997160390019417,
"eai_open_web_math": 0.2223990559577942,
"eai_web_code": 0.36258721351623535
}
}
|
{
"free_decimal_correspondence": {
"primary": {
"code": "005.1",
"labels": {
"level_1": "General works, books and libraries, information sciences",
"level_2": "",
"level_3": "Computer programming"
}
},
"secondary": {
"code": "004.0285",
"labels": {
"level_1": "General works, books and libraries, information sciences",
"level_2": "",
"level_3": "Computers and Computer science"
}
}
},
"bloom_cognitive_process": {
"primary": {
"code": "2",
"label": "Understand"
},
"secondary": {
"code": "3",
"label": "Apply"
}
},
"bloom_knowledge_domain": {
"primary": {
"code": "3",
"label": "Procedural"
},
"secondary": {
"code": "2",
"label": "Conceptual"
}
},
"document_type_v1": {
"primary": {
"code": "3",
"label": "Reference/Encyclopedic/Educational"
},
"secondary": {
"code": "4",
"label": "Code/Software"
}
},
"extraction_artifacts": {
"primary": {
"code": "0",
"label": "No Artifacts"
},
"secondary": {
"code": "3",
"label": "Irrelevant Content"
}
},
"missing_content": {
"primary": {
"code": "0",
"label": "No missing content"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"document_type_v2": {
"primary": {
"code": "8",
"label": "Documentation"
},
"secondary": {
"code": "10",
"label": "Knowledge Article"
}
},
"reasoning_depth": {
"primary": {
"code": "2",
"label": "Basic Reasoning"
},
"secondary": {
"code": "1",
"label": "No Reasoning"
}
},
"technical_correctness": {
"primary": {
"code": "4",
"label": "Highly Correct"
},
"secondary": {
"code": "3",
"label": "Mostly Correct"
}
},
"education_level": {
"primary": {
"code": "4",
"label": "Graduate/Expert Level"
},
"secondary": {
"code": "3",
"label": "Undergraduate Level"
}
}
}
|
672f1e42c33a7f9846924a2431ea77df
|
586,454,300,275,267,000 |
The tag has no usage guidance.
learn more… | top users | synonyms
2
votes
2answers
1k views
Variable size encrypted container [closed]
Is there an application similar to TrueCrypt, but the one that can make variable size containers opposed to fixed-size or only-growing-to-certain-amount containers which can be made by TrueCrypt? I ...
0
votes
1answer
459 views
Multi Platform LAMPP Server on USB Drive
I am trying to setup a simple cross platform server that would be completely portable and work on windows, mac and linux. Some Background: I used to only have a windows desktop. This desktop has ran ...
0
votes
1answer
54 views
What software can I use to send a USB device over the network from a debian server to a windows client?
I have a netbook with not much power, 1GHz CPU & 1G memory. I'd like to install a headless linux to it, either Debian or TinyCore, both of which use aptitude & dpkg. I'm not sure which ...
0
votes
3answers
463 views
small lan throughput test
My house is Cat6 cabled for ethernet. I want to do some speed measuring. Background: Below the stairs is a small server room for the router, DSL modem, a EEE-Box (ubuntu) and a LaCie-Nas used for ...
3
votes
3answers
196 views
Can I use a single OS X Installation Image on multiple machines?
I currently admin a small variety of Mac's at work. We have some G3/G4/G5/MBP/iBook/eMac/iMac. I've noticed that each system is configured slightly different and wanted to come up with some disk ...
1
vote
3answers
2k views
Quick way to check if your processor has virtual machine extensions?
I work for a tech shop and we inherit computers from various places. I am looking for a small program/script I can run to tell me if the processor has any virtual machine extensions built into it. I ...
7
votes
6answers
9k views
Install GRUB on NTFS
I would like to install 2 completely independent instances of Windows XP (no data should be shared) in my computer within 2 different primary partitions. I know that grub can handle booting them ...
6
votes
2answers
341 views
How do I setup a HOSTS file on different operating systems?
Please provide examples of how this can be setup on client and server versions of various operating systems.
|
{
"url": "http://serverfault.com/questions/tagged/multi-platform",
"source_domain": "serverfault.com",
"snapshot_id": "crawl=CC-MAIN-2015-48",
"warc_metadata": {
"Content-Length": "72287",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:AASBWIGVUMY32MBGZLEF2OIJISEKSBSJ",
"WARC-Concurrent-To": "<urn:uuid:dc40bea6-f83d-4091-af36-c3f7fb60229a>",
"WARC-Date": "2015-11-25T08:37:46Z",
"WARC-IP-Address": "104.16.49.232",
"WARC-Identified-Payload-Type": null,
"WARC-Payload-Digest": "sha1:GZ74SKOTJ4PWYTTZQ23AVG4M77EKL7QR",
"WARC-Record-ID": "<urn:uuid:e5d667c7-75a1-40f0-98a8-7978c2019a43>",
"WARC-Target-URI": "http://serverfault.com/questions/tagged/multi-platform",
"WARC-Truncated": null,
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:1b0d43a7-3a88-4238-921c-a1e4c02018a4>"
},
"warc_info": "robots: classic\r\nhostname: ip-10-71-132-137.ec2.internal\r\nsoftware: Nutch 1.6 (CC)/CC WarcExport 1.0\r\nisPartOf: CC-MAIN-2015-48\r\noperator: CommonCrawl Admin\r\ndescription: Wide crawl of the web for Nov 2015\r\npublisher: CommonCrawl\r\nformat: WARC File Format 1.0\r\nconformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf"
}
|
{
"line_start_idx": [
0,
31,
32,
67,
68,
70,
76,
85,
94,
95,
138,
139,
341,
343,
349,
357,
367,
368,
409,
410,
613,
615,
621,
629,
638,
639,
743,
744,
933,
935,
941,
950,
960,
961,
987,
988,
1188,
1190,
1196,
1205,
1215,
1216,
1281,
1282,
1481,
1483,
1488,
1497,
1506,
1507,
1576,
1577,
1780,
1782,
1788,
1797,
1806,
1807,
1828,
1829,
2028,
2030,
2036,
2045,
2055,
2056,
2116,
2117
],
"line_end_idx": [
31,
32,
67,
68,
70,
76,
85,
94,
95,
138,
139,
341,
343,
349,
357,
367,
368,
409,
410,
613,
615,
621,
629,
638,
639,
743,
744,
933,
935,
941,
950,
960,
961,
987,
988,
1188,
1190,
1196,
1205,
1215,
1216,
1281,
1282,
1481,
1483,
1488,
1497,
1506,
1507,
1576,
1577,
1780,
1782,
1788,
1797,
1806,
1807,
1828,
1829,
2028,
2030,
2036,
2045,
2055,
2056,
2116,
2117,
2225
]
}
|
{
"red_pajama_v2": {
"ccnet_original_length": 2225,
"ccnet_original_nlines": 67,
"rps_doc_curly_bracket": 0,
"rps_doc_ldnoobw_words": 0,
"rps_doc_lorem_ipsum": 0,
"rps_doc_stop_word_fraction": 0.34125271439552307,
"rps_doc_ut1_blacklist": 0,
"rps_doc_frac_all_caps_words": 0.07559394836425781,
"rps_doc_frac_lines_end_with_ellipsis": 0.10294117778539658,
"rps_doc_frac_no_alph_words": 0.16846652328968048,
"rps_doc_frac_unique_words": 0.5680628418922424,
"rps_doc_mean_word_length": 4.552356243133545,
"rps_doc_num_sentences": 25,
"rps_doc_symbol_to_word_ratio": 0.01727861911058426,
"rps_doc_unigram_entropy": 5.05717134475708,
"rps_doc_word_count": 382,
"rps_doc_frac_chars_dupe_10grams": 0,
"rps_doc_frac_chars_dupe_5grams": 0,
"rps_doc_frac_chars_dupe_6grams": 0,
"rps_doc_frac_chars_dupe_7grams": 0,
"rps_doc_frac_chars_dupe_8grams": 0,
"rps_doc_frac_chars_dupe_9grams": 0,
"rps_doc_frac_chars_top_2gram": 0.010350779630243778,
"rps_doc_frac_chars_top_3gram": 0.014951120130717754,
"rps_doc_frac_chars_top_4gram": 0,
"rps_doc_books_importance": -209.0160675048828,
"rps_doc_books_importance_length_correction": -209.0160675048828,
"rps_doc_openwebtext_importance": -132.70179748535156,
"rps_doc_openwebtext_importance_length_correction": -132.70179748535156,
"rps_doc_wikipedia_importance": -100.97816467285156,
"rps_doc_wikipedia_importance_length_correction": -100.97816467285156
},
"fasttext": {
"dclm": 0.04668575897812843,
"english": 0.9347875118255615,
"fineweb_edu_approx": 1.241292119026184,
"eai_general_math": 0.022009730339050293,
"eai_open_web_math": 0.10110527276992798,
"eai_web_code": 0.0015316000208258629
}
}
|
{
"free_decimal_correspondence": {
"primary": {
"code": "004.02",
"labels": {
"level_1": "General works, books and libraries, information sciences",
"level_2": "",
"level_3": "Computers and Computer science"
}
},
"secondary": {
"code": "005.456",
"labels": {
"level_1": "General works, books and libraries, information sciences",
"level_2": "",
"level_3": "Computer programming"
}
}
},
"bloom_cognitive_process": {
"primary": {
"code": "3",
"label": "Apply"
},
"secondary": {
"code": "2",
"label": "Understand"
}
},
"bloom_knowledge_domain": {
"primary": {
"code": "3",
"label": "Procedural"
},
"secondary": {
"code": "2",
"label": "Conceptual"
}
},
"document_type_v1": {
"primary": {
"code": "5",
"label": "Social/Forum"
},
"secondary": {
"code": "3",
"label": "Reference/Encyclopedic/Educational"
}
},
"extraction_artifacts": {
"primary": {
"code": "0",
"label": "No Artifacts"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"missing_content": {
"primary": {
"code": "0",
"label": "No missing content"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"document_type_v2": {
"primary": {
"code": "18",
"label": "Q&A Forum"
},
"secondary": {
"code": "8",
"label": "Documentation"
}
},
"reasoning_depth": {
"primary": {
"code": "2",
"label": "Basic Reasoning"
},
"secondary": {
"code": "3",
"label": "Intermediate Reasoning"
}
},
"technical_correctness": {
"primary": {
"code": "3",
"label": "Mostly Correct"
},
"secondary": {
"code": "4",
"label": "Highly Correct"
}
},
"education_level": {
"primary": {
"code": "3",
"label": "Undergraduate Level"
},
"secondary": {
"code": "4",
"label": "Graduate/Expert Level"
}
}
}
|
672f1e42c33a7f9846924a2431ea77df
|
67,052,548,562,051,470 |
4
$\begingroup$
I have a problem which I can solve on the paper, but I want to be able to solve in Mathematica:
Find argument of the minimum of the following function:
problem
So on paper my solutuon goes like this:
> [![mysolution][2]][2]
So in Mathematica I tried:
f = Function[x, Sum[(x - Indexed[t, k])^2, {k, 1, n}]] Solve[f'[x] == 0, x]
and I've got this result:
{{x -> InverseFunction[\!\( \*UnderoverscriptBox[\(\[Sum]\), \(k = 1\), \(n\)]\(2\ \((x - \* TemplateBox[{"t","k"}, "IndexedDefault"])\)\)\), 1, 1][0]}}
Is there a method to get a solution like the one I calculated manually?
$\endgroup$
3
$\begingroup$
If you think it's worth the trouble, you can do the following (InputForm only to make the output clearer)
Sum[(x - t[k])^2, {k, 1, n}] // InputForm
(* Sum[(x - t[k])^2, {k, 1, n}] *)
D[%, x] == 0 // InputForm
(* Sum[2*(x - t[k]), {k, 1, n}] == 0 *)
% /. u__Sum :> Evaluate //@ MapAt[Expand, u, 1] // InputForm
(* Sum[2*x - 2*t[k], {k, 1, n}] == 0 *)
Distribute /@ % // InputForm
(* 2*n*x + Sum[-2*t[k], {k, 1, n}] == 0 *)
% /. HoldPattern[Sum[u_ v_?(FreeQ[#, k] &), {k, 1, n}]] :> v Sum[u, {k, 1, n}] // InputForm
(* 2*n*x - 2*Sum[t[k], {k, 1, n}] == 0 *)
Solve[%, x] // InputForm
(* {{x -> Sum[t[k], {k, 1, n}]/n}} *)
It might be worth doing this sort of thing for more complicated expressions.
EDIT
If you want to do this without doing a manual minimisation, Mathematica can solve it if you force x outside the summation. For example:
Sum[(x - t[k])^2, {k, 1, n}];
% /. u__Sum :> Evaluate //@ MapAt[Expand, u, 1] // InputForm
(* Sum[x^2 - 2*x*t[k] + t[k]^2, {k, 1, n}] *)
Distribute[%] // InputForm
(* n*x^2 + Sum[-2*x*t[k], {k, 1, n}] + Sum[t[k]^2, {k, 1, n}] *)
% /. HoldPattern[Sum[u_ v_?(FreeQ[#, k] &), {k, 1, n}]] :>
v Sum[u, {k, 1, n}] // InputForm
(* n*x^2 - 2*x*Sum[t[k], {k, 1, n}] + Sum[t[k]^2, {k, 1, n}] *)
Assuming[n > 0, ArgMin[%, x] // Refine] // InputForm
(* Piecewise[{{Sum[t[k], {k, 1, n}]/n, Sum[t[k], {k, 1, n}] > 0 ||
Sum[t[k], {k, 1, n}] < 0}}, 0] *)
The use of Piecewise at the end is a little irritating, but getting rid of that is a separate question Piecewise[] merge equivalent conditions
$\endgroup$
1
• $\begingroup$ Thanks! But still it i am interested if there is a way to solve this equation without explicitly specifying the algorithm. $\endgroup$ – artursg Sep 28 '16 at 10:11
2
$\begingroup$
It's pretty close to what you would do by hand:
allT = Array[t, 5];
der[x_] := D[Sum[(x - t[i])^2, {i, Length[allT]}], x];
Solve[der[x] == 0, x]
{{x -> 1/5 (t[1] + t[2] + t[3] + t[4] + t[5])}}
$\endgroup$
3
• $\begingroup$ How do you make the number of terms in the sum a variable $n$, not a fixed constant (e.g., $5$)? $\endgroup$ – David G. Stork Sep 27 '16 at 21:58
• $\begingroup$ I took the "undefined constants" to be the $t_k$. I doubt you can do it without specifying the size of the data, though I would be pleased to find out I am wrong. $\endgroup$ – bill s Sep 27 '16 at 22:10
• $\begingroup$ thanks, but i am interested in finding solution with a variable n. $\endgroup$ – artursg Sep 27 '16 at 22:44
Your Answer
By clicking “Post Your Answer”, you agree to our terms of service, privacy policy and cookie policy
Not the answer you're looking for? Browse other questions tagged or ask your own question.
|
{
"url": "https://mathematica.stackexchange.com/questions/127363/finding-argmin-of-the-function-with-undefined-constants",
"source_domain": "mathematica.stackexchange.com",
"snapshot_id": "crawl=CC-MAIN-2021-17",
"warc_metadata": {
"Content-Length": "176775",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:P2HY72YIH4XRZJO5KZO5TLGCQ4IRDZKU",
"WARC-Concurrent-To": "<urn:uuid:65c83b32-1370-4f31-b998-8eb4654c9604>",
"WARC-Date": "2021-04-12T06:54:28Z",
"WARC-IP-Address": "151.101.1.69",
"WARC-Identified-Payload-Type": "text/html",
"WARC-Payload-Digest": "sha1:MLIQFSQGHU252F5O3UNHX2C775QFDRSV",
"WARC-Record-ID": "<urn:uuid:e2283856-6c67-4145-83cf-5eb63c08538d>",
"WARC-Target-URI": "https://mathematica.stackexchange.com/questions/127363/finding-argmin-of-the-function-with-undefined-constants",
"WARC-Truncated": null,
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:aa0c06c7-ab3d-4ac1-9b54-0b823d92476d>"
},
"warc_info": "isPartOf: CC-MAIN-2021-17\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for April 2021\r\noperator: Common Crawl Admin ([email protected])\r\nhostname: ip-10-67-67-232.ec2.internal\r\nsoftware: Apache Nutch 1.18 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.2-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: https://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/"
}
|
{
"line_start_idx": [
0,
2,
16,
17,
113,
114,
170,
178,
179,
219,
220,
244,
245,
272,
273,
349,
350,
376,
377,
530,
531,
603,
604,
605,
617,
619,
633,
634,
740,
741,
783,
818,
819,
845,
885,
886,
947,
987,
988,
1017,
1060,
1061,
1153,
1195,
1196,
1221,
1259,
1260,
1337,
1338,
1343,
1344,
1480,
1481,
1511,
1572,
1618,
1619,
1646,
1711,
1712,
1772,
1808,
1872,
1873,
1926,
1994,
2032,
2033,
2176,
2177,
2189,
2191,
2374,
2376,
2390,
2391,
2439,
2440,
2460,
2515,
2537,
2538,
2586,
2598,
2600,
2764,
2986,
3113,
3114,
3126,
3127,
3227,
3228
],
"line_end_idx": [
2,
16,
17,
113,
114,
170,
178,
179,
219,
220,
244,
245,
272,
273,
349,
350,
376,
377,
530,
531,
603,
604,
605,
617,
619,
633,
634,
740,
741,
783,
818,
819,
845,
885,
886,
947,
987,
988,
1017,
1060,
1061,
1153,
1195,
1196,
1221,
1259,
1260,
1337,
1338,
1343,
1344,
1480,
1481,
1511,
1572,
1618,
1619,
1646,
1711,
1712,
1772,
1808,
1872,
1873,
1926,
1994,
2032,
2033,
2176,
2177,
2189,
2191,
2374,
2376,
2390,
2391,
2439,
2440,
2460,
2515,
2537,
2538,
2586,
2598,
2600,
2764,
2986,
3113,
3114,
3126,
3127,
3227,
3228,
3318
]
}
|
{
"red_pajama_v2": {
"ccnet_original_length": 3318,
"ccnet_original_nlines": 93,
"rps_doc_curly_bracket": 0.0186859592795372,
"rps_doc_ldnoobw_words": 0,
"rps_doc_lorem_ipsum": 0,
"rps_doc_stop_word_fraction": 0.28707224130630493,
"rps_doc_ut1_blacklist": 0,
"rps_doc_frac_all_caps_words": 0.013307980261743069,
"rps_doc_frac_lines_end_with_ellipsis": 0,
"rps_doc_frac_no_alph_words": 0.5085551142692566,
"rps_doc_frac_unique_words": 0.43984222412109375,
"rps_doc_mean_word_length": 3.970414161682129,
"rps_doc_num_sentences": 22,
"rps_doc_symbol_to_word_ratio": 0.001901139970868826,
"rps_doc_unigram_entropy": 4.882967472076416,
"rps_doc_word_count": 507,
"rps_doc_frac_chars_dupe_10grams": 0.04172876104712486,
"rps_doc_frac_chars_dupe_5grams": 0.11127670109272003,
"rps_doc_frac_chars_dupe_6grams": 0.08743169158697128,
"rps_doc_frac_chars_dupe_7grams": 0.053651269525289536,
"rps_doc_frac_chars_dupe_8grams": 0.04172876104712486,
"rps_doc_frac_chars_dupe_9grams": 0.04172876104712486,
"rps_doc_frac_chars_top_2gram": 0.021857919171452522,
"rps_doc_frac_chars_top_3gram": 0.0283159501850605,
"rps_doc_frac_chars_top_4gram": 0.011922500096261501,
"rps_doc_books_importance": -433.9814758300781,
"rps_doc_books_importance_length_correction": -433.9814758300781,
"rps_doc_openwebtext_importance": -287.12127685546875,
"rps_doc_openwebtext_importance_length_correction": -287.12127685546875,
"rps_doc_wikipedia_importance": -175.98789978027344,
"rps_doc_wikipedia_importance_length_correction": -175.98789978027344
},
"fasttext": {
"dclm": 0.4226992130279541,
"english": 0.6630369424819946,
"fineweb_edu_approx": 1.5165988206863403,
"eai_general_math": 0.5816842317581177,
"eai_open_web_math": 0.08359110355377197,
"eai_web_code": 0.014653859660029411
}
}
|
{
"free_decimal_correspondence": {
"primary": {
"code": "519.5",
"labels": {
"level_1": "Science and Natural history",
"level_2": "Mathematics",
"level_3": "Probabilities; or, Mathematical statistics"
}
},
"secondary": {
"code": "005.1",
"labels": {
"level_1": "General works, books and libraries, information sciences",
"level_2": "",
"level_3": "Computer programming"
}
}
},
"bloom_cognitive_process": {
"primary": {
"code": "3",
"label": "Apply"
},
"secondary": {
"code": "4",
"label": "Analyze"
}
},
"bloom_knowledge_domain": {
"primary": {
"code": "3",
"label": "Procedural"
},
"secondary": {
"code": "2",
"label": "Conceptual"
}
},
"document_type_v1": {
"primary": {
"code": "4",
"label": "Code/Software"
},
"secondary": {
"code": "3",
"label": "Reference/Encyclopedic/Educational"
}
},
"extraction_artifacts": {
"primary": {
"code": "3",
"label": "Irrelevant Content"
},
"secondary": {
"code": "1",
"label": "Leftover HTML"
}
},
"missing_content": {
"primary": {
"code": "0",
"label": "No missing content"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"document_type_v2": {
"primary": {
"code": "18",
"label": "Q&A Forum"
},
"secondary": {
"code": "23",
"label": "Tutorial"
}
},
"reasoning_depth": {
"primary": {
"code": "3",
"label": "Intermediate Reasoning"
},
"secondary": {
"code": "2",
"label": "Basic Reasoning"
}
},
"technical_correctness": {
"primary": {
"code": "4",
"label": "Highly Correct"
},
"secondary": {
"code": "3",
"label": "Mostly Correct"
}
},
"education_level": {
"primary": {
"code": "3",
"label": "Undergraduate Level"
},
"secondary": {
"code": "2",
"label": "High School Level"
}
}
}
|
672f1e42c33a7f9846924a2431ea77df
|
-1,378,054,541,415,813,000 |
0
お世話になります.
普段XSLTばかりで、JavaでXPathとかやったことがほとんどないので勝手がわかりません.具体的にはある要素に@xml:base属性があるのですが、その値をXPathで拾えないのです.(といいますか属性をXPathで拾えません.)ここを教えていただきたくお願いします.
前提要件
以下のような部分を持つXMLファイルをDOMで読み込んでいます.丁度<plugin>の要素に位置付けているとお考えください.
<plugin id="org.dita.pdf2" version="3.6.1" xml:base="../plugins/org.dita.pdf2/plugin.xml">
<!-- extension points -->
<extension-point id="dita.xsl.xslfo" name="PDF XSLT import"/>
<extension-point id="dita.xsl.xslfo.i18n-postprocess" name="PDF I18N postprocess import"/>
<extension-point id="org.dita.pdf2.xsl.topicmerge" name="PDF2 topic merge XSLT import"/>
<extension-point id="depend.org.dita.pdf2.init.pre" name="Initialization pre-target"/>
<extension-point id="depend.org.dita.pdf2.format.pre" name="Formatting pre-target"/>
<extension-point id="depend.org.dita.pdf2.format" name="Formatting target"/>
<extension-point id="depend.org.dita.pdf2.format.post" name="Formatting post-target"/>
<extension-point id="depend.org.dita.pdf2.index" name="Indexing target"/>
<extension-point id="org.dita.pdf2.catalog.relative" name="Configuration XML catalog"/>
<extension-point id="dita.conductor.pdf2.param" name="PDF XSLT parameters"/>
<extension-point id="dita.conductor.pdf2.formatter.check" name="Formatter check"/>
<!-- extensions -->
<feature extension="dita.conductor.lib.import" file="lib/fo.jar"/>
<transtype desc="PDF" name="pdf">
<param desc="Specifies the base file name of the generated PDF file." name="outputFile.base"/>
...
</transtype>
<transtype desc="PDF2" extends="pdf" name="pdf2"/>
<feature extension="dita.transtype.print" value="pdf"/>
...
</plugin>
やっている処理
次のようにXPathを生成しています.
XPath xpath = XPathFactory.newInstance().newXPath();
xpath.setNamespaceContext(new NamespaceContext() {
public String getNamespaceURI(String prefix) {
return prefix.equals("xml") ? XMLConstants.XML_NS_URI : XMLConstants.NULL_NS_URI;
}
public Iterator<?> getPrefixes(String val) {
return null;
}
public String getPrefix(String uri) {
return null;
}
});
で、以下のコードで@xml:baseを拾おうとしています.コンテキストのpluginElemは、前提条件で書いたところの<plugin>の要素です.(この前提が崩れちゃうと動かなくて当然なんですが、pluginElemは正しく位置付けられています)
// Get plug-in location
String XPathGetPluginBase = "@xml:base";
expr = xpath.compile(XPathGetPluginBase);
Attr pluginBaseAttr = (Attr)expr.evaluate(pluginElem, XPathConstants.NODE);
String pluginBase = pluginBaseAttr.getValue();
結果はpluginBaseAttrがnullで、pluginBaseAttr.getValue()でNPEでこけちゃいます.
わかる方おられましたらアドバイスをお願いいたします.
以上
追記
今XPathを書き換えてみたら
String XPathGetPluginBase = "@*[local-name()='base' and namespace-uri()='http://www.w3.org/XML/1998/namespace']";
は従来通りNPEで
String XPathGetPluginBase = "@*[local-name()='base']";
はなんと通ってしまいました.
String pluginBase = pluginBaseAttr.getValue();
../plugins/org.dita.pdf2/plugin.xmlの値になっています.でもこれって本来邪道ですよね(??)
1 件の回答 1
1
すみません.自己解決しました.
もっと上位の問題.元々のDOMを作るときにnamespace-awareにしていませんでした.以下で解決しました.
FileInputStream is = new FileInputStream(Paths.get(pluginsXmlPath).toFile());
DocumentBuilderFactory factory = DocumentBuilderFactory.newInstance();
factory.setNamespaceAware(true);
DocumentBuilder builder = factory.newDocumentBuilder();
document = builder.parse(is);
@xml:baseの取得もわざわざXPath使うまでもありません.
String pluginBase = pluginElem.getAttributeNS(XMLConstants.XML_NS_URI, "base");
DOMを作ってゴリゴリやるなんて何年ぶりなのですっかり忘れておりました.
大変失礼いたしました.
この質問に回答するには、ログインする必要があります。
求めていた回答ではありませんか? のタグが付いた他の質問を参照する。
|
{
"url": "https://ja.stackoverflow.com/questions/77926/xpath%E3%81%A7xmlbase%E3%81%AE%E5%80%A4%E3%81%8C%E6%8B%BE%E3%81%88%E3%81%AA%E3%81%84%E3%81%A7%E3%81%99",
"source_domain": "ja.stackoverflow.com",
"snapshot_id": "crawl=CC-MAIN-2022-40",
"warc_metadata": {
"Content-Length": "193112",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:YYUS7W3G7EZVDSUEUTRDJAU4TKJ6KIGT",
"WARC-Concurrent-To": "<urn:uuid:4ca24e20-e1aa-4205-a1a4-0b0ba6b5696f>",
"WARC-Date": "2022-09-30T17:17:19Z",
"WARC-IP-Address": "151.101.129.69",
"WARC-Identified-Payload-Type": "text/html",
"WARC-Payload-Digest": "sha1:NZXOSUBEQI5INEKIXERHGMKJ3U7D3FN5",
"WARC-Record-ID": "<urn:uuid:e791cc4c-45c3-407e-981e-c274a83bb149>",
"WARC-Target-URI": "https://ja.stackoverflow.com/questions/77926/xpath%E3%81%A7xmlbase%E3%81%AE%E5%80%A4%E3%81%8C%E6%8B%BE%E3%81%88%E3%81%AA%E3%81%84%E3%81%A7%E3%81%99",
"WARC-Truncated": null,
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:3b4369a6-6e9a-4801-a9ec-1f05ae4d27ca>"
},
"warc_info": "isPartOf: CC-MAIN-2022-40\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for September/October 2022\r\noperator: Common Crawl Admin ([email protected])\r\nhostname: ip-10-67-67-120\r\nsoftware: Apache Nutch 1.19 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.4-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: https://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/"
}
|
{
"line_start_idx": [
0,
2,
3,
13,
150,
151,
156,
157,
220,
221,
312,
340,
404,
497,
588,
677,
764,
843,
932,
1008,
1098,
1177,
1262,
1284,
1353,
1389,
1488,
1496,
1511,
1564,
1622,
1628,
1638,
1639,
1647,
1648,
1668,
1669,
1722,
1773,
1824,
1914,
1920,
1969,
1990,
1996,
2038,
2059,
2065,
2069,
2070,
2195,
2196,
2220,
2261,
2303,
2379,
2426,
2427,
2490,
2491,
2518,
2519,
2522,
2523,
2526,
2527,
2543,
2544,
2658,
2659,
2669,
2670,
2725,
2726,
2741,
2742,
2789,
2790,
2854,
2855,
2864,
2865,
2867,
2868,
2884,
2885,
2943,
2944,
3022,
3093,
3126,
3182,
3212,
3213,
3247,
3248,
3328,
3329,
3366,
3367,
3379,
3380,
3407,
3408
],
"line_end_idx": [
2,
3,
13,
150,
151,
156,
157,
220,
221,
312,
340,
404,
497,
588,
677,
764,
843,
932,
1008,
1098,
1177,
1262,
1284,
1353,
1389,
1488,
1496,
1511,
1564,
1622,
1628,
1638,
1639,
1647,
1648,
1668,
1669,
1722,
1773,
1824,
1914,
1920,
1969,
1990,
1996,
2038,
2059,
2065,
2069,
2070,
2195,
2196,
2220,
2261,
2303,
2379,
2426,
2427,
2490,
2491,
2518,
2519,
2522,
2523,
2526,
2527,
2543,
2544,
2658,
2659,
2669,
2670,
2725,
2726,
2741,
2742,
2789,
2790,
2854,
2855,
2864,
2865,
2867,
2868,
2884,
2885,
2943,
2944,
3022,
3093,
3126,
3182,
3212,
3213,
3247,
3248,
3328,
3329,
3366,
3367,
3379,
3380,
3407,
3408,
3442
]
}
|
{
"red_pajama_v2": {
"ccnet_original_length": 3442,
"ccnet_original_nlines": 104,
"rps_doc_curly_bracket": 0.0023242300376296043,
"rps_doc_ldnoobw_words": 0,
"rps_doc_lorem_ipsum": 0,
"rps_doc_stop_word_fraction": 0.03982929885387421,
"rps_doc_ut1_blacklist": 0,
"rps_doc_frac_all_caps_words": 0.03129445016384125,
"rps_doc_frac_lines_end_with_ellipsis": 0.01904761977493763,
"rps_doc_frac_no_alph_words": 0.5177809596061707,
"rps_doc_frac_unique_words": 0.7197802066802979,
"rps_doc_mean_word_length": 14.862637519836426,
"rps_doc_num_sentences": 93,
"rps_doc_symbol_to_word_ratio": 0.0028449499513953924,
"rps_doc_unigram_entropy": 4.672329902648926,
"rps_doc_word_count": 182,
"rps_doc_frac_chars_dupe_10grams": 0,
"rps_doc_frac_chars_dupe_5grams": 0,
"rps_doc_frac_chars_dupe_6grams": 0,
"rps_doc_frac_chars_dupe_7grams": 0,
"rps_doc_frac_chars_dupe_8grams": 0,
"rps_doc_frac_chars_dupe_9grams": 0,
"rps_doc_frac_chars_top_2gram": 0.022181149572134018,
"rps_doc_frac_chars_top_3gram": 0.017744919285178185,
"rps_doc_frac_chars_top_4gram": 0,
"rps_doc_books_importance": -353.3645324707031,
"rps_doc_books_importance_length_correction": -353.3645324707031,
"rps_doc_openwebtext_importance": -183.0396728515625,
"rps_doc_openwebtext_importance_length_correction": -183.0396728515625,
"rps_doc_wikipedia_importance": -112.5910873413086,
"rps_doc_wikipedia_importance_length_correction": -112.5910873413086
},
"fasttext": {
"dclm": 0.9244465231895447,
"english": 0.04989657923579216,
"fineweb_edu_approx": 3.31265926361084,
"eai_general_math": 0.07418345659971237,
"eai_open_web_math": 0.035482700914144516,
"eai_web_code": 0.5677090883255005
}
}
|
{
"free_decimal_correspondence": {
"primary": {
"code": "005.133",
"labels": {
"level_1": "General works, books and libraries, information sciences",
"level_2": "",
"level_3": "Computer programming"
}
},
"secondary": {
"code": "005.776",
"labels": {
"level_1": "General works, books and libraries, information sciences",
"level_2": "",
"level_3": "Computer programming"
}
}
},
"bloom_cognitive_process": {
"primary": {
"code": "3",
"label": "Apply"
},
"secondary": {
"code": "2",
"label": "Understand"
}
},
"bloom_knowledge_domain": {
"primary": {
"code": "3",
"label": "Procedural"
},
"secondary": {
"code": "2",
"label": "Conceptual"
}
},
"document_type_v1": {
"primary": {
"code": "5",
"label": "Social/Forum"
},
"secondary": {
"code": "4",
"label": "Code/Software"
}
},
"extraction_artifacts": {
"primary": {
"code": "0",
"label": "No Artifacts"
},
"secondary": {
"code": "3",
"label": "Irrelevant Content"
}
},
"missing_content": {
"primary": {
"code": "0",
"label": "No missing content"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"document_type_v2": {
"primary": {
"code": "18",
"label": "Q&A Forum"
},
"secondary": {
"code": "8",
"label": "Documentation"
}
},
"reasoning_depth": {
"primary": {
"code": "3",
"label": "Intermediate Reasoning"
},
"secondary": {
"code": "2",
"label": "Basic Reasoning"
}
},
"technical_correctness": {
"primary": {
"code": "4",
"label": "Highly Correct"
},
"secondary": {
"code": "3",
"label": "Mostly Correct"
}
},
"education_level": {
"primary": {
"code": "3",
"label": "Undergraduate Level"
},
"secondary": {
"code": "4",
"label": "Graduate/Expert Level"
}
}
}
|
672f1e42c33a7f9846924a2431ea77df
|
424,427,251,984,753,900 |
34
Condor
5y
Let's portray Stallman as a malevolent criminal, dying on the creepiest hill, shall we? Apparently there's even people that make statements such as "if you defend RMS, you're just as terrible as he is".
Do you have any idea what you're talking about? Do you have any idea what the case even is?
Richard Stallman has a controversial opinion about a rape case committed by someone else. Gee, what a shocker, people have opinions. Does that make Stallman a criminal himself?
Oh but he's representing open source software. That's why he can't be there.
Oh yeah. Shunning him (and erroneously so) as another Reiser is gonna make open source look so good, isn't it.
"I disapprove of what you say, but I will defend to the death your right to say it."
- Evelyn Beatrice Hall, writer of Voltaire
People are entitled to any opinion they may have. Just because you disagree with it (and in this case I do too!) does not mean that it can be used to criminalize someone and to ruin their career. That is just wrong.
Comments
• 5
Open source is dead, killed by corporations.
Edit:
I followed two of those articles that made it happened.
https://medium.com/@selamie/...
https://medium.com/@selamie/...
• 7
It's interesting for how little he through FSF away though. Considering it was his life's work, I think something must have diverged from his ideology. It's weird.
Never liked the guy, but I also don't like this sort of crowd behavior ermmm ..it's not butterfly effect, but it's not circlejerking either.. There is a term for this though.. damn. Anyway, I don't like it. I was kinda disappointed in a follow up that went like "now let's get rid off Linus".
• 2
@FrodoSwaggins this is in posts I linked in my comment. Fuck this world.
• 1
@FrodoSwaggins Emmm. Here for instance https://vice.com/en_us/article/...
I was also thinking what you are thinking. Well maybe also check this out https://stallman.org/archives/...
That's archive of his personal webpage, although why would he keep this is a mystery to me..
• 1
@FrodoSwaggins This one (https://vice.com/en_us/article/...) from Vice is where they were ostensibly leaked... But there seem to be no sources to MIT's lists.
The links @vane posted are the Medium posts from what appears to be the person that started all this.
• 3
@Condor sorry what?
• 1
@stop it must be late for me, haha 😅
• 2
Segmentation fault (brain dumped)
• 2
• 3
@FrodoSwaggins Stallman has never been afraid to say what he thinks, so him saying it is less strange than it being a strange thing to say.
• 6
@Pyjong Perhaps the term you're looking for is "lynch mob," where a bunch of people hear something about someone, usually egged on by some troublemakers with an agenda, and decide to do something about it on their own without careful evaluation or due process. (See also, social media culture.)
• 5
Having an opinion is ok.
Shoving that opinion to others' throats is not okay.
Having a matress at your work room in mit to sit naked women [students] on who come in with questions is also not ok.
Sorry @Condor, this won't fly. The guy fucked up massively. The latest thing might not be the real thing, but that was just enough, the last drop in everyone's cup they had for the freak. He got kicked out of mit as a dark, shameful shadow. And he got kicked out of fsf prolly for the same reason.
Only yesterday I read how shameful of a burden he was for the mit.
I liked the guy at first for having a belief. For foss. For gnu. I don't mind him having an opinion. But acting on it for years, knowing how morally wrong it is seen by others - that's just low.
I thank him for gnu. But if it were my will I'd remove him from the society as a cancerous mass.
• 4
i'm not really sure which side to pick.
on one side you have the cancel culture movement, the meme of the moment.
on the other side you have a very questionable character. Sometimes brilliant, sometimes a nutjob. But too many times a nutjob.
@Condor
> Shunning him as another reiser is gonna make open source look good, isn't it?
oh yeah, him getting fired is what will damage open source, not all those dark, ignorant, alienating garbage he's been saying for DECADES.
• 0
• 3
@FrodoSwaggins out of context? what? here's a nice little quote that this fucking PROGRAMMER said on the subject pedophilia (not his field of study ffs).
"I am skeptical of the claim that voluntarily pedophilia harms children. The arguments that it causes harm seem to be based on cases which aren't voluntary, which are then stretched by parents who are horrified by the idea that their little baby is maturing."
and if you spend a couple of minutes you'll find a hot load of these, predating the current controversy by several years.
i have a really hard time thinking this clown was taken out of context in most occasions.
and i have a really hard time taking you seriously, considering you posted a 200 word ramble about the meta of cancel culture and immediately after posting "uh, so what did rms actually say tho?". like, couldn't you look it up before defending anything?
• 4
Stallman would turn over in his grave (if he was dead already), he is NOT the "open source" guy, he is the "free software" guy.
You know, free as in free speech, not as in free beer.
That is what he is fighting for most of his life, but even technical people still don't get the difference.
• 1
@jesustricks ok, fair enough. But why not take that up with him as inappropriate behavior in an educational setting? I don't know how things are done at MIT but I wouldn't treat Stallman as more than an MIT employee (paid or not, couldn't care less. He worked there).
I do want to believe that he was very creepy towards the female students at MIT. But why didn't they tackle that issue from within the University? If that happened (I'd like to see proof of that - edit: to be clear I mean the internal resolution steps) and Stallman didn't change, by all means fire him just like that'd get any teacher fired. But there's way too many unknowns right now.
Not to mention that this witch hunt all started from 2 Medium posts by 1 person... Stallman is a creep and a weirdo, don't get me wrong. And he doesn't deserve special treatment just like you and I don't deserve that either. But this destroyed this man's entire career. One that he's worked for half a century on. What would you do if that happened to you?
• 2
@powerfulparadox Yeah that sounds about right. Lynch sounds a bit harsh, but it is roughly that.
• 1
@FrodoSwaggins I dunno I guess let's hope for the best and this might be just a regular case of someone talking shit. Some attention is in place, this got a bit more since he resigned from an important position. If he didn't maybe we wouldn't even know what he said. Never read his archive before.
• 2
@Pyjong Nowadays we just keep it to opinion and reputation and pretend we've learned from the past because we're just ruining careers and reputations, not killing people, when those things are still necessary for life.
• 0
@netikras Having a mattress to sleep on after work is okay and that's everything he's done with it. Where is that bullshit from?
• 1
I know I am pretty late to the party but let me make some points clear.
Everything that rms said is that sex is okay if everyone involved consents. That's not bad, is it?
What the "journalists" (e.g. vice) on the other hand wrote is that he is a pedophile etc. See the difference?
What is also important to know is that someone published an email of his from a private mailing list without asking the members first and nobody tries to find out how this person is. Sounds shady, right?
Stallman meanwhile gets defended by famous feminists and tons of people who have actually read about what happened. So please guys stop acting as if he wasn't a incredibly admirable and inspiring programmer anymore.
• 0
@lucaIO from the link I have posted.
• 0
@netikras You are using a fucking google link as a source? The top link on google just says that he used to have a mattress in his office, nothing wrong about that. So stop spreading fake news about real people. Things like this can cause suicide so please just shut up if you have no idea if what you are talking about is wrong or right.
Add Comment
|
{
"url": "https://devrant.com/rants/2255217/lets-portray-stallman-as-a-malevolent-criminal-dying-on-the-creepiest-hill-shall",
"source_domain": "devrant.com",
"snapshot_id": "CC-MAIN-2024-30",
"warc_metadata": {
"Content-Length": "77680",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:WZ2XXKDXMKBXNQWQARJV2C7KSIN56QQR",
"WARC-Concurrent-To": "<urn:uuid:4a7eb024-806c-4b10-869b-470747436c4a>",
"WARC-Date": "2024-07-20T06:59:56Z",
"WARC-IP-Address": "45.55.36.48",
"WARC-Identified-Payload-Type": "text/html",
"WARC-Payload-Digest": "sha1:DRTB2TEO5O4A6SJZ5YGBVS64PUWHEUQU",
"WARC-Record-ID": "<urn:uuid:b18b1ca1-64ee-4fd4-bb46-0e6a08d9ba01>",
"WARC-Target-URI": "https://devrant.com/rants/2255217/lets-portray-stallman-as-a-malevolent-criminal-dying-on-the-creepiest-hill-shall",
"WARC-Truncated": null,
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:2602ac4d-a57f-4e6d-bd27-82f1944108ea>"
},
"warc_info": "isPartOf: CC-MAIN-2024-30\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for July 2024\r\noperator: Common Crawl Admin ([email protected])\r\nhostname: ip-10-67-67-120\r\nsoftware: Apache Nutch 1.20 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.5-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: https://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/"
}
|
{
"line_start_idx": [
0,
3,
10,
13,
14,
217,
218,
310,
487,
488,
565,
676,
677,
762,
805,
806,
1022,
1023,
1032,
1038,
1087,
1088,
1098,
1158,
1159,
1195,
1231,
1237,
1405,
1406,
1703,
1709,
1786,
1792,
1870,
1871,
1983,
1984,
2081,
2087,
2250,
2356,
2362,
2386,
2392,
2433,
2439,
2477,
2483,
2489,
2633,
2639,
2938,
2944,
2973,
2974,
3031,
3032,
3154,
3155,
3457,
3458,
3529,
3530,
3729,
3730,
3831,
3837,
3881,
3882,
3960,
4092,
4093,
4105,
4189,
4190,
4333,
4339,
4345,
4503,
4504,
4768,
4769,
4895,
4896,
4990,
4991,
5249,
5255,
5387,
5388,
5447,
5448,
5560,
5566,
5838,
5839,
6231,
6232,
6593,
6599,
6700,
6706,
7008,
7014,
7237,
7243,
7376,
7382,
7458,
7561,
7675,
7883,
8103,
8109,
8150,
8156,
8499
],
"line_end_idx": [
3,
10,
13,
14,
217,
218,
310,
487,
488,
565,
676,
677,
762,
805,
806,
1022,
1023,
1032,
1038,
1087,
1088,
1098,
1158,
1159,
1195,
1231,
1237,
1405,
1406,
1703,
1709,
1786,
1792,
1870,
1871,
1983,
1984,
2081,
2087,
2250,
2356,
2362,
2386,
2392,
2433,
2439,
2477,
2483,
2489,
2633,
2639,
2938,
2944,
2973,
2974,
3031,
3032,
3154,
3155,
3457,
3458,
3529,
3530,
3729,
3730,
3831,
3837,
3881,
3882,
3960,
4092,
4093,
4105,
4189,
4190,
4333,
4339,
4345,
4503,
4504,
4768,
4769,
4895,
4896,
4990,
4991,
5249,
5255,
5387,
5388,
5447,
5448,
5560,
5566,
5838,
5839,
6231,
6232,
6593,
6599,
6700,
6706,
7008,
7014,
7237,
7243,
7376,
7382,
7458,
7561,
7675,
7883,
8103,
8109,
8150,
8156,
8499,
8510
]
}
|
{
"red_pajama_v2": {
"ccnet_original_length": 8510,
"ccnet_original_nlines": 117,
"rps_doc_curly_bracket": 0,
"rps_doc_ldnoobw_words": 8,
"rps_doc_lorem_ipsum": 0,
"rps_doc_stop_word_fraction": 0.47147470712661743,
"rps_doc_ut1_blacklist": 0,
"rps_doc_frac_all_caps_words": 0.019375670701265335,
"rps_doc_frac_lines_end_with_ellipsis": 0.033898308873176575,
"rps_doc_frac_no_alph_words": 0.18729816377162933,
"rps_doc_frac_unique_words": 0.38430583477020264,
"rps_doc_mean_word_length": 4.281019687652588,
"rps_doc_num_sentences": 124,
"rps_doc_symbol_to_word_ratio": 0.0037674899213016033,
"rps_doc_unigram_entropy": 5.698648929595947,
"rps_doc_word_count": 1491,
"rps_doc_frac_chars_dupe_10grams": 0,
"rps_doc_frac_chars_dupe_5grams": 0.030079899355769157,
"rps_doc_frac_chars_dupe_6grams": 0.02506658062338829,
"rps_doc_frac_chars_dupe_7grams": 0.012533290311694145,
"rps_doc_frac_chars_dupe_8grams": 0.012533290311694145,
"rps_doc_frac_chars_dupe_9grams": 0.012533290311694145,
"rps_doc_frac_chars_top_2gram": 0.009399970062077045,
"rps_doc_frac_chars_top_3gram": 0.007049980107694864,
"rps_doc_frac_chars_top_4gram": 0.003759989980608225,
"rps_doc_books_importance": -887.8551025390625,
"rps_doc_books_importance_length_correction": -887.8551025390625,
"rps_doc_openwebtext_importance": -412.9654541015625,
"rps_doc_openwebtext_importance_length_correction": -412.9654541015625,
"rps_doc_wikipedia_importance": -378.21759033203125,
"rps_doc_wikipedia_importance_length_correction": -378.21759033203125
},
"fasttext": {
"dclm": 0.17890411615371704,
"english": 0.9815309643745422,
"fineweb_edu_approx": 1.132308840751648,
"eai_general_math": 0.11592388153076172,
"eai_open_web_math": 0.32101166248321533,
"eai_web_code": 0.025709329172968864
}
}
|
{
"free_decimal_correspondence": {
"primary": {
"code": "004.01",
"labels": {
"level_1": "General works, books and libraries, information sciences",
"level_2": "",
"level_3": "Computers and Computer science"
}
},
"secondary": {
"code": "303.483",
"labels": {
"level_1": "Social sciences",
"level_2": "",
"level_3": "Social sciences — Dictionaries"
}
}
},
"bloom_cognitive_process": {
"primary": {
"code": "5",
"label": "Evaluate"
},
"secondary": {
"code": "2",
"label": "Understand"
}
},
"bloom_knowledge_domain": {
"primary": {
"code": "2",
"label": "Conceptual"
},
"secondary": {
"code": "4",
"label": "Metacognitive"
}
},
"document_type_v1": {
"primary": {
"code": "5",
"label": "Social/Forum"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"extraction_artifacts": {
"primary": {
"code": "0",
"label": "No Artifacts"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"missing_content": {
"primary": {
"code": "0",
"label": "No missing content"
},
"secondary": {
"code": "2",
"label": "Click Here References"
}
},
"document_type_v2": {
"primary": {
"code": "5",
"label": "Comment Section"
},
"secondary": {
"code": "16",
"label": "Personal Blog"
}
},
"reasoning_depth": {
"primary": {
"code": "2",
"label": "Basic Reasoning"
},
"secondary": {
"code": "3",
"label": "Intermediate Reasoning"
}
},
"technical_correctness": {
"primary": {
"code": "6",
"label": "Not Applicable/Indeterminate"
},
"secondary": {
"code": "2",
"label": "Partially Correct"
}
},
"education_level": {
"primary": {
"code": "1",
"label": "General Audience"
},
"secondary": {
"code": "2",
"label": "High School Level"
}
}
}
|
672f1e42c33a7f9846924a2431ea77df
|
5,727,493,094,548,477,000 |
Permalink
Fetching contributors…
Cannot retrieve contributors at this time
170 lines (147 sloc) 4.29 KB
" Vim indent file
" Language: Shell Script
" Maintainer: Peter Aronoff <[email protected]>
" Original Author: Nikolai Weibull <[email protected]>
" Latest Revision: 2013-11-28
if exists("b:did_indent")
finish
endif
let b:did_indent = 1
setlocal indentexpr=GetShIndent()
setlocal indentkeys+=0=then,0=do,0=else,0=elif,0=fi,0=esac,0=done,),0=;;,0=;&
setlocal indentkeys+=0=fin,0=fil,0=fip,0=fir,0=fix
setlocal indentkeys-=:,0#
setlocal nosmartindent
if exists("*GetShIndent")
finish
endif
let s:cpo_save = &cpo
set cpo&vim
function s:buffer_shiftwidth()
return &shiftwidth
endfunction
let s:sh_indent_defaults = {
\ 'default': function('s:buffer_shiftwidth'),
\ 'continuation-line': function('s:buffer_shiftwidth'),
\ 'case-labels': function('s:buffer_shiftwidth'),
\ 'case-statements': function('s:buffer_shiftwidth'),
\ 'case-breaks': 0 }
function! s:indent_value(option)
let Value = exists('b:sh_indent_options')
\ && has_key(b:sh_indent_options, a:option) ?
\ b:sh_indent_options[a:option] :
\ s:sh_indent_defaults[a:option]
if type(Value) == type(function('type'))
return Value()
endif
return Value
endfunction
function! GetShIndent()
let lnum = prevnonblank(v:lnum - 1)
if lnum == 0
return 0
endif
let pnum = prevnonblank(lnum - 1)
let ind = indent(lnum)
let line = getline(lnum)
if line =~ '^\s*\%(if\|then\|do\|else\|elif\|case\|while\|until\|for\|select\)\>'
if line !~ '\<\%(fi\|esac\|done\)\>\s*\%(#.*\)\=$'
let ind += s:indent_value('default')
endif
elseif s:is_case_label(line, pnum)
if !s:is_case_ended(line)
let ind += s:indent_value('case-statements')
endif
elseif line =~ '^\s*\<\k\+\>\s*()\s*{' || line =~ '^\s*{'
if line !~ '}\s*\%(#.*\)\=$'
let ind += s:indent_value('default')
endif
elseif s:is_continuation_line(line)
if pnum == 0 || !s:is_continuation_line(getline(pnum))
let ind += s:indent_value('continuation-line')
endif
elseif pnum != 0 && s:is_continuation_line(getline(pnum))
let ind = indent(s:find_continued_lnum(pnum))
endif
let pine = line
let line = getline(v:lnum)
if line =~ '^\s*\%(then\|do\|else\|elif\|fi\|done\)\>' || line =~ '^\s*}'
let ind -= s:indent_value('default')
elseif line =~ '^\s*esac\>' && s:is_case_empty(getline(v:lnum - 1))
let ind -= s:indent_value('default')
elseif line =~ '^\s*esac\>'
let ind -= (s:is_case_label(pine, lnum) && s:is_case_ended(pine) ?
\ 0 : s:indent_value('case-statements')) +
\ s:indent_value('case-labels')
if s:is_case_break(pine)
let ind += s:indent_value('case-breaks')
endif
elseif s:is_case_label(line, lnum)
if s:is_case(pine)
let ind = indent(lnum) + s:indent_value('case-labels')
else
let ind -= s:indent_value('case-statements') - s:indent_value('case-breaks')
endif
elseif s:is_case_break(line)
let ind -= s:indent_value('case-breaks')
endif
return ind
endfunction
function! s:is_continuation_line(line)
return a:line =~ '\%(\%(^\|[^\\]\)\\\|&&\|||\)$'
endfunction
function! s:find_continued_lnum(lnum)
let i = a:lnum
while i > 1 && s:is_continuation_line(getline(i - 1))
let i -= 1
endwhile
return i
endfunction
function! s:is_case_label(line, pnum)
if a:line !~ '^\s*(\=.*)'
return 0
endif
if a:pnum > 0
let pine = getline(a:pnum)
if !(s:is_case(pine) || s:is_case_ended(pine))
return 0
endif
endif
let suffix = substitute(a:line, '^\s*(\=', "", "")
let nesting = 0
let i = 0
let n = strlen(suffix)
while i < n
let c = suffix[i]
let i += 1
if c == '\\'
let i += 1
elseif c == '('
let nesting += 1
elseif c == ')'
if nesting == 0
return 1
endif
let nesting -= 1
endif
endwhile
return 0
endfunction
function! s:is_case(line)
return a:line =~ '^\s*case\>'
endfunction
function! s:is_case_break(line)
return a:line =~ '^\s*;[;&]'
endfunction
function! s:is_case_ended(line)
return s:is_case_break(a:line) || a:line =~ ';[;&]\s*\%(#.*\)\=$'
endfunction
function! s:is_case_empty(line)
if a:line =~ '^\s*$' || a:line =~ '^\s*#'
return s:is_case_empty(getline(v:lnum - 1))
else
return a:line =~ '^\s*case\>'
endif
endfunction
let &cpo = s:cpo_save
unlet s:cpo_save
|
{
"url": "https://github.com/b4winckler/macvim/blob/master/runtime/indent/sh.vim",
"source_domain": "github.com",
"snapshot_id": "crawl=CC-MAIN-2017-04",
"warc_metadata": {
"Content-Length": "122936",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:KD7OB3BUULJNPIHN4DQ5JIQZRXZRKDK3",
"WARC-Concurrent-To": "<urn:uuid:c6497135-19c1-4d2a-aca0-ee91c1e8135e>",
"WARC-Date": "2017-01-21T13:29:17Z",
"WARC-IP-Address": "192.30.253.113",
"WARC-Identified-Payload-Type": null,
"WARC-Payload-Digest": "sha1:WQ7MQCJBHHJHMPQKDJXLKI6VPCG6R6FL",
"WARC-Record-ID": "<urn:uuid:901ee5f2-2922-4625-a00e-36baa961e6bc>",
"WARC-Target-URI": "https://github.com/b4winckler/macvim/blob/master/runtime/indent/sh.vim",
"WARC-Truncated": "length",
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:0290f3a7-4e78-48e1-8db6-8879d8396a76>"
},
"warc_info": "robots: classic\r\nhostname: ip-10-171-10-70.ec2.internal\r\nsoftware: Nutch 1.6 (CC)/CC WarcExport 1.0\r\nisPartOf: CC-MAIN-2017-04\r\noperator: CommonCrawl Admin\r\ndescription: Wide crawl of the web for January 2017\r\npublisher: CommonCrawl\r\nformat: WARC File Format 1.0\r\nconformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf"
}
|
{
"line_start_idx": [
0,
10,
33,
75,
104,
122,
147,
200,
250,
280,
306,
313,
319,
340,
374,
452,
503,
529,
552,
578,
585,
591,
613,
625,
656,
675,
687,
716,
762,
818,
868,
922,
943,
976,
1018,
1064,
1098,
1131,
1172,
1187,
1193,
1206,
1218,
1242,
1278,
1291,
1300,
1306,
1340,
1363,
1388,
1470,
1521,
1558,
1564,
1599,
1625,
1670,
1676,
1734,
1763,
1800,
1806,
1842,
1897,
1944,
1950,
2008,
2054,
2060,
2076,
2103,
2177,
2214,
2282,
2319,
2347,
2414,
2457,
2489,
2514,
2555,
2561,
2596,
2615,
2670,
2675,
2752,
2758,
2787,
2828,
2834,
2845,
2857,
2896,
2945,
2957,
2995,
3010,
3064,
3075,
3084,
3093,
3105,
3143,
3169,
3178,
3184,
3198,
3225,
3272,
3281,
3287,
3293,
3344,
3360,
3370,
3393,
3405,
3423,
3434,
3447,
3458,
3474,
3491,
3507,
3523,
3532,
3538,
3555,
3561,
3570,
3579,
3591,
3617,
3647,
3659,
3691,
3720,
3732,
3764,
3830,
3842,
3874,
3916,
3960,
3965,
3995,
4001,
4013,
4035
],
"line_end_idx": [
10,
33,
75,
104,
122,
147,
200,
250,
280,
306,
313,
319,
340,
374,
452,
503,
529,
552,
578,
585,
591,
613,
625,
656,
675,
687,
716,
762,
818,
868,
922,
943,
976,
1018,
1064,
1098,
1131,
1172,
1187,
1193,
1206,
1218,
1242,
1278,
1291,
1300,
1306,
1340,
1363,
1388,
1470,
1521,
1558,
1564,
1599,
1625,
1670,
1676,
1734,
1763,
1800,
1806,
1842,
1897,
1944,
1950,
2008,
2054,
2060,
2076,
2103,
2177,
2214,
2282,
2319,
2347,
2414,
2457,
2489,
2514,
2555,
2561,
2596,
2615,
2670,
2675,
2752,
2758,
2787,
2828,
2834,
2845,
2857,
2896,
2945,
2957,
2995,
3010,
3064,
3075,
3084,
3093,
3105,
3143,
3169,
3178,
3184,
3198,
3225,
3272,
3281,
3287,
3293,
3344,
3360,
3370,
3393,
3405,
3423,
3434,
3447,
3458,
3474,
3491,
3507,
3523,
3532,
3538,
3555,
3561,
3570,
3579,
3591,
3617,
3647,
3659,
3691,
3720,
3732,
3764,
3830,
3842,
3874,
3916,
3960,
3965,
3995,
4001,
4013,
4035,
4051
]
}
|
{
"red_pajama_v2": {
"ccnet_original_length": 4051,
"ccnet_original_nlines": 150,
"rps_doc_curly_bracket": 0.0014811200089752674,
"rps_doc_ldnoobw_words": 0,
"rps_doc_lorem_ipsum": 0,
"rps_doc_stop_word_fraction": 0.17782026529312134,
"rps_doc_ut1_blacklist": 0,
"rps_doc_frac_all_caps_words": 0.0009560200269334018,
"rps_doc_frac_lines_end_with_ellipsis": 0.006622519809752703,
"rps_doc_frac_no_alph_words": 0.4942638576030731,
"rps_doc_frac_unique_words": 0.3583333194255829,
"rps_doc_mean_word_length": 7.516666889190674,
"rps_doc_num_sentences": 26,
"rps_doc_symbol_to_word_ratio": 0.005736140068620443,
"rps_doc_unigram_entropy": 4.181429862976074,
"rps_doc_word_count": 360,
"rps_doc_frac_chars_dupe_10grams": 0,
"rps_doc_frac_chars_dupe_5grams": 0.0901699885725975,
"rps_doc_frac_chars_dupe_6grams": 0.02956392988562584,
"rps_doc_frac_chars_dupe_7grams": 0,
"rps_doc_frac_chars_dupe_8grams": 0,
"rps_doc_frac_chars_dupe_9grams": 0,
"rps_doc_frac_chars_top_2gram": 0.028824830427765846,
"rps_doc_frac_chars_top_3gram": 0.03695492073893547,
"rps_doc_frac_chars_top_4gram": 0.022172950208187103,
"rps_doc_books_importance": -471.9421081542969,
"rps_doc_books_importance_length_correction": -471.9421081542969,
"rps_doc_openwebtext_importance": -220.18948364257812,
"rps_doc_openwebtext_importance_length_correction": -220.18948364257812,
"rps_doc_wikipedia_importance": -159.1847686767578,
"rps_doc_wikipedia_importance_length_correction": -159.1847686767578
},
"fasttext": {
"dclm": 0.06936001777648926,
"english": 0.12231238186359406,
"fineweb_edu_approx": 2.4246063232421875,
"eai_general_math": 0.8956812024116516,
"eai_open_web_math": 0.7727786302566528,
"eai_web_code": 0.2264757752418518
}
}
|
{
"free_decimal_correspondence": {
"primary": {
"code": "005.435",
"labels": {
"level_1": "General works, books and libraries, information sciences",
"level_2": "",
"level_3": "Computer programming"
}
},
"secondary": {
"code": "005.1",
"labels": {
"level_1": "General works, books and libraries, information sciences",
"level_2": "",
"level_3": "Computer programming"
}
}
},
"bloom_cognitive_process": {
"primary": {
"code": "3",
"label": "Apply"
},
"secondary": {
"code": "2",
"label": "Understand"
}
},
"bloom_knowledge_domain": {
"primary": {
"code": "3",
"label": "Procedural"
},
"secondary": {
"code": "2",
"label": "Conceptual"
}
},
"document_type_v1": {
"primary": {
"code": "4",
"label": "Code/Software"
},
"secondary": {
"code": "3",
"label": "Reference/Encyclopedic/Educational"
}
},
"extraction_artifacts": {
"primary": {
"code": "3",
"label": "Irrelevant Content"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"missing_content": {
"primary": {
"code": "0",
"label": "No missing content"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"document_type_v2": {
"primary": {
"code": "8",
"label": "Documentation"
},
"secondary": {
"code": "23",
"label": "Tutorial"
}
},
"reasoning_depth": {
"primary": {
"code": "4",
"label": "Advanced Reasoning"
},
"secondary": {
"code": "3",
"label": "Intermediate Reasoning"
}
},
"technical_correctness": {
"primary": {
"code": "4",
"label": "Highly Correct"
},
"secondary": {
"code": "3",
"label": "Mostly Correct"
}
},
"education_level": {
"primary": {
"code": "4",
"label": "Graduate/Expert Level"
},
"secondary": {
"code": "3",
"label": "Undergraduate Level"
}
}
}
|
672f1e42c33a7f9846924a2431ea77df
|
6,279,084,753,682,503,000 |
SQL Functions
In this article we will provide you with SQL Functions list and step by step examples and provide blog post with common tasks that use the functions we have on the list. For the purpose of this article we will use SQL Server 2012.
Other Versions of SQL Server:
• SQL Server 2012
• This blog post has been written using SQL Server 2012
• SQL Server 2008 / R2
• Most of the function we use should work in SQL Server 2008 and R2
• SQL Server 2005
• Most common functions should work in SQL Server 2005
Who is it for?
• People who would like to learn basics of using SQL Functions and also find out what functions are available with examples
• Those who are preparing for Microsoft certifications and need to cover this topic.
SQL Function List:
• String Functions
• Aggregate Functions
String Functions
Aggregate Functions
RIGHT Function
Function Name:
RIGHT Function - returns the specified number of characters from a given input value starting from the end (right side).
Syntax
RIGHT(<<Input Value>>, <<Number of Characters>>)
Arguments:
<<Input Value>> - Provide input value (string, field name or expression) that will be used as your input.
<<Number of Characters>> Provide number of characters that you would like to receive from the <<Input Value>> you provided.
Simple Example:
SELECT RIGHT('ABC-123-BCD', 3)
Result = 'BCD'
Full Article:
SQL Right Function - Article that describes the RIGHT function in details and provides examples.
Right Function Microsoft Documentation
LEFT Function
Function Name:
LEFT Function - returns the specified number of characters from a given input value starting from the very beginning (left side)
Syntax
LEFT(<<Input Value>>, <<Number of Characters>>)
Arguments:
<<Input Value>> - Provide input value (string, field name or expression) that will be used as your input.
<<Number of Characters>> Provide number of characters that you would like to receive from the <<Input Value>> you provided.
Simple Example:
SELECT LEFT('ABC-123-BCD', 3)
Result = 'ABC'
Full Article:
SQL LEFT Function - Article that describes the LEFT function in details and provides examples.
LEFT Function Microsoft Documentation
SUBSTRING Function
Function Name:
SUBSTRING Function - returns portion of the specified input value based on starting position and number of characters to be returned.
Syntax
SUBSTRING(<<Input Value>>, <<Starting Position>>, <<Number of Characters>>)
Arguments:
<<Input Value>> - Provide input value (field name or expression) that will be used as your input.
<<Starting Position>> - Provide starting position which indicates where the portion of input value will be extract from.
<<Number of Characters>> - Provide number of characters that should be extracts (from Starting Position).
Simple Example:
SELECT SUBSTRING ('ABC-123-BCD',3,5)
Result = 'C-123'
Full Article:
SQL SUBSTRING Function - Article that describe the SUBSTRING function in details..
SUBSTRING Function Microsoft Documentation
LOWER Function
Function Name:
LOWER Function - returns a value after converting specified input value characters to lower case.
Syntax
LOWER (<<Input Value>>)
Arguments:
<<Input Value>> - Provide input value (string, field name or expression) that will be used as your input.
Simple Example:
SELECT LOWER ('Abcd')
Result = 'abcd'
Full Article:
SQL LOWER Function - Article that describes the LOWER function in details..
LOWER Function Microsoft Documentation
UPPER Function
Function Name:
UPPER Function - returns a value after converting specified input value characters to upper case.
Syntax
UPPER (<<Input Value>>)
Arguments:
<<Input Value>> - Provide input value (field name or expression) that will be used as your input.
Simple Example:
SELECT UPPER ('abcd')
Result = 'ABCD'
Full Article:
SQL UPPER Function - Article that describe the UPPER function in details..
UPPER Function Microsoft Documentation
RTRIM Function
Function Name:
RTRIM Function - returns a value after removing any spaces from the right side of the specified input value.
Syntax
RTRIM (<<Input Value>>)
Arguments:
<<Input Value>> - Provide input value (string, field name or expression) that will be used as your input.
Simple Example:
SELECT RTRIM (' abc ')
Result = ' abc'
Full Article:
SQL RTRIM Function - Article that describe the RTRIM function in details..
RTRIM Function Microsoft Documentation
LTRIM Function
Function Name:
LTRIM Function - returns a value after removed any spaces from the left side of the specified input value.
Syntax
LTRIM (<<Input Value>>)
Arguments:
<<Input Value>> - Provide input value (field name or expression) that will be used as your input.
Simple Example:
SELECT LTRIM (' abc ')
Result = 'abc '
Full Article:
SQL LTRIM Function - Article that describe the LTRIM function in details..
LTRIM Function Microsoft Documentation
LEN Function
Function Name:
LEN Function - returns the number of characters of the specified input value.
Syntax
LEN (<<Input Value>>)
Arguments:
<<Input Value>> - Provide input value (field name or expression) that will be used as your input.
Simple Example:
SELECT LEN ('abc')
Result = 3
Full Article:
SQL LEN Function - Article that describe the LEN function in details..
LEN Function Microsoft Documentation
CHARINDEX Function
Function Name:
CHARINDEX Function - Is used to find position of a character(s) in a string (field).
Syntax
CHARINDEX (<<Value to Find>>, <<Input Value >>)
or
CHARINDEX (<<Value to Find>>, <<Input Value >>,<<Search Starting Position>>)
Arguments:
<<Value to Find>> - Provide value that you want to find in <<Input Value>>.
<<Input Value>> - Provide input value (field name or expression) that will be used as your input.
Optional:
<<Search Starting Position>> - Search of <<value to find>> starts from the beginning of <<input value>> however you can provide third argument that will specify starting position of the search.
Simple Example:
SELECT CHARINDEX ('@', '[email protected]' )
Result = 6
SELECT CHARINDEX ('@', '[email protected]',6 )
Result = 1
Full Article:
SQL CHARINDEX Function - Article that describe the CHARINDEX function in details..
CHARINDEX Function Microsoft Documentation
REVERSE Function
Function Name:
REVERSE Function - Is used to return the reverse order of a string value.
Syntax:
REVERSE (<<Input Value>>)
Arguments:
<<Input Value>> - Provide string value (field name or expression) that will be used as your input.
Simple Example:
SELECT REVERSE ('abc')
Result = 'cba'
Full Article:
SQL REVERSE Function - Article that describe the REVERSE function in details.
REVERSE Function Microsoft Documentation
Replace Function
Function Name:
REPLACE Function - Is used to find value and replace it with specified replacement value.
Syntax
REPLACE ( <<Input Value>> ,<< ValueToFind>>, <<ReplacementValue>> )
Arguments:
<<Input Value>> - Provide string value (field name or expression) that will be used as your input.
<<ValueToFind>> -Provide substring to be found.
<<ReplacementValue>> -Provide string to replace.
Simple Example:
SELECT Replace('Katie & Emil', '&', 'and')
Result = 'Katie And Emil'
Full Article:
SQL Replace Function - Article that describe the REVERSE function in details.
Replace Function Microsoft Documentation
COUNT Function
Function Name:
COUNT Function - Is used to count rows in a table.
Syntax
COUNT ( <<Input Value>> )
Arguments:
<<Input Value>> - Provide input value (field name or expression) that will be used as your input.
Simple Example
SELECT COUNT(*)
FROM [dbo].[DimCustomer]
Result = 18484
Full Article:
SQL COUNT Function - Article that describe the COUNT function in details.
COUNT Function Microsoft Documentation
SUM Function
Function Name:
SUM Function - returns the total sum of a numeric column.
Syntax
SUM ( <<Input Value>> )
Arguments:
<<Input Value>> - Provide expression value, numeric or approximate value that will be used as your input.
Simple Example
SELECT Sum(SalesAmount) As TotalSalesAmount
FROM [dbo].[FactInternetSales]
Result = 29358677.2207
Full Article:
SQL SUM Function - Article that describe the SUM function in details.
SUM Function Microsoft Documentation
AVG Function
Function Name:
AVG Function - returns the average value of a numeric column.
Syntax
AVG ( <<Input Value>> )
Arguments:
<<Input Value>> - Provide expression value, numeric or approximate value that will be used as your input.
Simple Example
SELECT Avg(SalesAmount) As AverageSalesAmount
FROM [dbo].[FactInternetSales]
Full Article:
SQL AVG Function - Article that describe the AVG function in details.
AVG Function Microsoft Documentation
MIN Function
Function Name:
MIN Function - returns the Minimum value of a numeric column.
Syntax
MIN ( <<Input Value>> )
Arguments:
<<Input Value>> - Provide expression value, numeric or approximate value that will be used as your input.
Simple Example
SELECT MIN(SalesAmount) As MinSalesAmount
FROM [dbo].[FactInternetSales]
Result = 2.29
Full Article:
SQL MIN Function - Article that describe the MIN function in details.
MIN Function Microsoft Documentation
MAX Function
Function Name:
MAX Function - returns the Maximum value of a numeric column.
Syntax
MAX ( <<Input Value>> )
Arguments:
<<Input Value>> - Provide expression value, numeric or approximate value that will be used as your input.
Simple Example
SELECT MAX(SalesAmount) As MinSalesAmount
FROM [dbo].[FactInternetSales]
Result = 3578.27
Full Article:
SQL MAX Function - Article that describe the MAX function in details.
MAX Function Microsoft Documentation
Did you find this page useful?
+3 | -0
(3 Votes)
Mini Learning Map
|
{
"url": "https://www.katieandemil.com/sql-functions-list-and-examples-in-sql-server-2012?tab=article",
"source_domain": "www.katieandemil.com",
"snapshot_id": "crawl=CC-MAIN-2015-14",
"warc_metadata": {
"Content-Length": "60000",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:ADTFTGUWBQCPZFU2HDQY6U4W3ECWLCOG",
"WARC-Concurrent-To": "<urn:uuid:54e0b541-386d-4963-9145-e1357575eb8e>",
"WARC-Date": "2015-03-30T12:54:30Z",
"WARC-IP-Address": "108.162.204.27",
"WARC-Identified-Payload-Type": null,
"WARC-Payload-Digest": "sha1:C7DRAW7AOPIDWH6BEPMCPVJJGEURUCS2",
"WARC-Record-ID": "<urn:uuid:9902724a-0eeb-4240-b533-a157e3d2e0b8>",
"WARC-Target-URI": "https://www.katieandemil.com/sql-functions-list-and-examples-in-sql-server-2012?tab=article",
"WARC-Truncated": "length",
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:f0ca41b6-62b9-48c6-be19-e7e23ad39611>"
},
"warc_info": "robots: classic\r\nhostname: ip-10-168-14-71.ec2.internal\r\nsoftware: Nutch 1.6 (CC)/CC WarcExport 1.0\r\nisPartOf: CC-MAIN-2015-14\r\noperator: CommonCrawl Admin\r\ndescription: Wide crawl of the web with URLs provided by Blekko for March 2015\r\npublisher: CommonCrawl\r\nformat: WARC File Format 1.0\r\nconformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf"
}
|
{
"line_start_idx": [
0,
14,
15,
246,
247,
277,
278,
298,
358,
383,
455,
475,
534,
535,
550,
551,
677,
764,
765,
767,
768,
787,
788,
809,
833,
834,
836,
837,
854,
855,
875,
876,
878,
879,
881,
882,
897,
898,
913,
914,
1035,
1036,
1043,
1044,
1093,
1094,
1105,
1106,
1212,
1213,
1337,
1338,
1354,
1355,
1386,
1387,
1402,
1403,
1417,
1418,
1515,
1516,
1555,
1556,
1558,
1559,
1573,
1574,
1589,
1590,
1719,
1720,
1727,
1728,
1776,
1777,
1788,
1789,
1895,
1896,
2020,
2021,
2037,
2038,
2068,
2069,
2084,
2085,
2099,
2100,
2195,
2196,
2234,
2235,
2237,
2238,
2257,
2258,
2273,
2274,
2409,
2410,
2417,
2418,
2494,
2495,
2506,
2507,
2605,
2606,
2727,
2728,
2834,
2835,
2851,
2852,
2890,
2892,
2909,
2911,
2925,
2926,
3009,
3010,
3053,
3054,
3056,
3057,
3072,
3073,
3088,
3089,
3188,
3189,
3196,
3197,
3222,
3223,
3234,
3235,
3341,
3342,
3358,
3359,
3381,
3383,
3399,
3401,
3415,
3416,
3492,
3493,
3532,
3533,
3535,
3536,
3551,
3552,
3567,
3568,
3667,
3668,
3675,
3676,
3701,
3702,
3713,
3714,
3812,
3813,
3829,
3830,
3852,
3854,
3870,
3872,
3886,
3887,
3962,
3963,
4002,
4003,
4005,
4006,
4021,
4022,
4024,
4025,
4040,
4041,
4151,
4152,
4159,
4160,
4185,
4186,
4197,
4198,
4304,
4305,
4321,
4332,
4333,
4370,
4371,
4373,
4391,
4393,
4407,
4408,
4483,
4484,
4523,
4524,
4526,
4527,
4542,
4543,
4558,
4559,
4667,
4668,
4675,
4676,
4701,
4702,
4713,
4714,
4812,
4813,
4829,
4830,
4855,
4857,
4875,
4877,
4891,
4892,
4967,
4968,
5007,
5008,
5010,
5011,
5024,
5025,
5040,
5041,
5120,
5121,
5128,
5129,
5152,
5153,
5164,
5165,
5263,
5264,
5280,
5281,
5300,
5302,
5314,
5316,
5330,
5331,
5402,
5403,
5440,
5441,
5443,
5444,
5463,
5464,
5479,
5480,
5566,
5567,
5574,
5575,
5624,
5625,
5628,
5629,
5706,
5707,
5718,
5719,
5796,
5797,
5895,
5896,
5906,
5907,
6101,
6102,
6118,
6119,
6181,
6182,
6204,
6206,
6260,
6261,
6272,
6274,
6276,
6290,
6291,
6374,
6375,
6418,
6419,
6421,
6422,
6439,
6440,
6455,
6456,
6531,
6532,
6540,
6541,
6568,
6569,
6580,
6581,
6680,
6681,
6697,
6698,
6721,
6722,
6737,
6739,
6753,
6754,
6832,
6833,
6874,
6875,
6877,
6878,
6895,
6896,
6898,
6899,
6914,
6915,
7006,
7007,
7014,
7015,
7083,
7084,
7095,
7096,
7195,
7196,
7244,
7245,
7294,
7295,
7311,
7312,
7355,
7356,
7382,
7384,
7398,
7399,
7477,
7478,
7519,
7520,
7522,
7523,
7538,
7539,
7554,
7555,
7607,
7608,
7615,
7616,
7642,
7643,
7645,
7646,
7657,
7658,
7756,
7758,
7759,
7774,
7776,
7777,
7805,
7806,
7843,
7845,
7861,
7863,
7865,
7867,
7881,
7882,
7956,
7957,
7996,
7997,
7999,
8000,
8002,
8003,
8016,
8017,
8032,
8033,
8092,
8093,
8100,
8101,
8125,
8126,
8137,
8138,
8244,
8245,
8260,
8262,
8263,
8318,
8319,
8361,
8363,
8388,
8390,
8392,
8406,
8407,
8477,
8478,
8515,
8516,
8518,
8519,
8532,
8533,
8548,
8549,
8612,
8613,
8620,
8621,
8645,
8646,
8657,
8658,
8764,
8765,
8780,
8781,
8782,
8796,
8855,
8857,
8901,
8902,
8906,
8907,
8921,
8922,
8992,
8993,
9030,
9031,
9033,
9034,
9036,
9037,
9050,
9051,
9066,
9067,
9129,
9130,
9137,
9138,
9162,
9163,
9174,
9175,
9281,
9282,
9297,
9298,
9353,
9367,
9411,
9425,
9453,
9454,
9458,
9459,
9473,
9474,
9544,
9545,
9582,
9583,
9585,
9586,
9588,
9589,
9602,
9603,
9618,
9619,
9681,
9682,
9689,
9690,
9714,
9715,
9726,
9727,
9833,
9834,
9849,
9850,
9905,
9907,
9951,
9965,
9995,
10001,
10002,
10006,
10007,
10021,
10022,
10092,
10093,
10130,
10131,
10133,
10134,
10165,
10175,
10185,
10186
],
"line_end_idx": [
14,
15,
246,
247,
277,
278,
298,
358,
383,
455,
475,
534,
535,
550,
551,
677,
764,
765,
767,
768,
787,
788,
809,
833,
834,
836,
837,
854,
855,
875,
876,
878,
879,
881,
882,
897,
898,
913,
914,
1035,
1036,
1043,
1044,
1093,
1094,
1105,
1106,
1212,
1213,
1337,
1338,
1354,
1355,
1386,
1387,
1402,
1403,
1417,
1418,
1515,
1516,
1555,
1556,
1558,
1559,
1573,
1574,
1589,
1590,
1719,
1720,
1727,
1728,
1776,
1777,
1788,
1789,
1895,
1896,
2020,
2021,
2037,
2038,
2068,
2069,
2084,
2085,
2099,
2100,
2195,
2196,
2234,
2235,
2237,
2238,
2257,
2258,
2273,
2274,
2409,
2410,
2417,
2418,
2494,
2495,
2506,
2507,
2605,
2606,
2727,
2728,
2834,
2835,
2851,
2852,
2890,
2892,
2909,
2911,
2925,
2926,
3009,
3010,
3053,
3054,
3056,
3057,
3072,
3073,
3088,
3089,
3188,
3189,
3196,
3197,
3222,
3223,
3234,
3235,
3341,
3342,
3358,
3359,
3381,
3383,
3399,
3401,
3415,
3416,
3492,
3493,
3532,
3533,
3535,
3536,
3551,
3552,
3567,
3568,
3667,
3668,
3675,
3676,
3701,
3702,
3713,
3714,
3812,
3813,
3829,
3830,
3852,
3854,
3870,
3872,
3886,
3887,
3962,
3963,
4002,
4003,
4005,
4006,
4021,
4022,
4024,
4025,
4040,
4041,
4151,
4152,
4159,
4160,
4185,
4186,
4197,
4198,
4304,
4305,
4321,
4332,
4333,
4370,
4371,
4373,
4391,
4393,
4407,
4408,
4483,
4484,
4523,
4524,
4526,
4527,
4542,
4543,
4558,
4559,
4667,
4668,
4675,
4676,
4701,
4702,
4713,
4714,
4812,
4813,
4829,
4830,
4855,
4857,
4875,
4877,
4891,
4892,
4967,
4968,
5007,
5008,
5010,
5011,
5024,
5025,
5040,
5041,
5120,
5121,
5128,
5129,
5152,
5153,
5164,
5165,
5263,
5264,
5280,
5281,
5300,
5302,
5314,
5316,
5330,
5331,
5402,
5403,
5440,
5441,
5443,
5444,
5463,
5464,
5479,
5480,
5566,
5567,
5574,
5575,
5624,
5625,
5628,
5629,
5706,
5707,
5718,
5719,
5796,
5797,
5895,
5896,
5906,
5907,
6101,
6102,
6118,
6119,
6181,
6182,
6204,
6206,
6260,
6261,
6272,
6274,
6276,
6290,
6291,
6374,
6375,
6418,
6419,
6421,
6422,
6439,
6440,
6455,
6456,
6531,
6532,
6540,
6541,
6568,
6569,
6580,
6581,
6680,
6681,
6697,
6698,
6721,
6722,
6737,
6739,
6753,
6754,
6832,
6833,
6874,
6875,
6877,
6878,
6895,
6896,
6898,
6899,
6914,
6915,
7006,
7007,
7014,
7015,
7083,
7084,
7095,
7096,
7195,
7196,
7244,
7245,
7294,
7295,
7311,
7312,
7355,
7356,
7382,
7384,
7398,
7399,
7477,
7478,
7519,
7520,
7522,
7523,
7538,
7539,
7554,
7555,
7607,
7608,
7615,
7616,
7642,
7643,
7645,
7646,
7657,
7658,
7756,
7758,
7759,
7774,
7776,
7777,
7805,
7806,
7843,
7845,
7861,
7863,
7865,
7867,
7881,
7882,
7956,
7957,
7996,
7997,
7999,
8000,
8002,
8003,
8016,
8017,
8032,
8033,
8092,
8093,
8100,
8101,
8125,
8126,
8137,
8138,
8244,
8245,
8260,
8262,
8263,
8318,
8319,
8361,
8363,
8388,
8390,
8392,
8406,
8407,
8477,
8478,
8515,
8516,
8518,
8519,
8532,
8533,
8548,
8549,
8612,
8613,
8620,
8621,
8645,
8646,
8657,
8658,
8764,
8765,
8780,
8781,
8782,
8796,
8855,
8857,
8901,
8902,
8906,
8907,
8921,
8922,
8992,
8993,
9030,
9031,
9033,
9034,
9036,
9037,
9050,
9051,
9066,
9067,
9129,
9130,
9137,
9138,
9162,
9163,
9174,
9175,
9281,
9282,
9297,
9298,
9353,
9367,
9411,
9425,
9453,
9454,
9458,
9459,
9473,
9474,
9544,
9545,
9582,
9583,
9585,
9586,
9588,
9589,
9602,
9603,
9618,
9619,
9681,
9682,
9689,
9690,
9714,
9715,
9726,
9727,
9833,
9834,
9849,
9850,
9905,
9907,
9951,
9965,
9995,
10001,
10002,
10006,
10007,
10021,
10022,
10092,
10093,
10130,
10131,
10133,
10134,
10165,
10175,
10185,
10186,
10203
]
}
|
{
"red_pajama_v2": {
"ccnet_original_length": 10203,
"ccnet_original_nlines": 551,
"rps_doc_curly_bracket": 0,
"rps_doc_ldnoobw_words": 0,
"rps_doc_lorem_ipsum": 0,
"rps_doc_stop_word_fraction": 0.23667028546333313,
"rps_doc_ut1_blacklist": 0,
"rps_doc_frac_all_caps_words": 0.09140370041131973,
"rps_doc_frac_lines_end_with_ellipsis": 0,
"rps_doc_frac_no_alph_words": 0.26713818311691284,
"rps_doc_frac_unique_words": 0.14655810594558716,
"rps_doc_mean_word_length": 5.495928764343262,
"rps_doc_num_sentences": 73,
"rps_doc_symbol_to_word_ratio": 0,
"rps_doc_unigram_entropy": 4.459346294403076,
"rps_doc_word_count": 1351,
"rps_doc_frac_chars_dupe_10grams": 0.30222222208976746,
"rps_doc_frac_chars_dupe_5grams": 0.47999998927116394,
"rps_doc_frac_chars_dupe_6grams": 0.38329964876174927,
"rps_doc_frac_chars_dupe_7grams": 0.33468014001846313,
"rps_doc_frac_chars_dupe_8grams": 0.32552188634872437,
"rps_doc_frac_chars_dupe_9grams": 0.31919193267822266,
"rps_doc_frac_chars_top_2gram": 0.07138047367334366,
"rps_doc_frac_chars_top_3gram": 0.043097641319036484,
"rps_doc_frac_chars_top_4gram": 0.030168350785970688,
"rps_doc_books_importance": -760.2265625,
"rps_doc_books_importance_length_correction": -760.2265625,
"rps_doc_openwebtext_importance": -431.2195739746094,
"rps_doc_openwebtext_importance_length_correction": -431.2195739746094,
"rps_doc_wikipedia_importance": -391.4578857421875,
"rps_doc_wikipedia_importance_length_correction": -391.4578857421875
},
"fasttext": {
"dclm": 0.10693181306123734,
"english": 0.4295552372932434,
"fineweb_edu_approx": 2.830373525619507,
"eai_general_math": 0.0005210000090301037,
"eai_open_web_math": 0.2685341238975525,
"eai_web_code": 0.979881227016449
}
}
|
{
"free_decimal_correspondence": {
"primary": {
"code": "005.746",
"labels": {
"level_1": "General works, books and libraries, information sciences",
"level_2": "",
"level_3": "Computer programming"
}
},
"secondary": {
"code": "005.1",
"labels": {
"level_1": "General works, books and libraries, information sciences",
"level_2": "",
"level_3": "Computer programming"
}
}
},
"bloom_cognitive_process": {
"primary": {
"code": "2",
"label": "Understand"
},
"secondary": {
"code": "3",
"label": "Apply"
}
},
"bloom_knowledge_domain": {
"primary": {
"code": "2",
"label": "Conceptual"
},
"secondary": {
"code": "3",
"label": "Procedural"
}
},
"document_type_v1": {
"primary": {
"code": "3",
"label": "Reference/Encyclopedic/Educational"
},
"secondary": {
"code": "4",
"label": "Code/Software"
}
},
"extraction_artifacts": {
"primary": {
"code": "0",
"label": "No Artifacts"
},
"secondary": {
"code": "3",
"label": "Irrelevant Content"
}
},
"missing_content": {
"primary": {
"code": "0",
"label": "No missing content"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"document_type_v2": {
"primary": {
"code": "8",
"label": "Documentation"
},
"secondary": {
"code": "23",
"label": "Tutorial"
}
},
"reasoning_depth": {
"primary": {
"code": "2",
"label": "Basic Reasoning"
},
"secondary": {
"code": "3",
"label": "Intermediate Reasoning"
}
},
"technical_correctness": {
"primary": {
"code": "4",
"label": "Highly Correct"
},
"secondary": {
"code": "3",
"label": "Mostly Correct"
}
},
"education_level": {
"primary": {
"code": "2",
"label": "High School Level"
},
"secondary": {
"code": "3",
"label": "Undergraduate Level"
}
}
}
|
672f1e42c33a7f9846924a2431ea77df
|
2,867,576,525,255,220,700 |
Is collegedata.com a fake site ? Is collegedata.com legit and trustworthy ?
High Trust Rating. This Site Looks Safe To use.
Site is United States based
Popularity
collegedata.com site image
Last refreshed : Thu, 01 Jan 12:00 am
Number times viewed :0
Est Website Value :12,111.74
High Risk
Safe
(100%)
How did collegedata.com get a Trust Score of 100% ?
When checking collegedata.com we looked at many factors, such as the ownership details, location, popularity and other sites relating to reviews, threats, phishing etc. Although a site like may have a high trust rating, it's worth just checking the countries involved as these could indicate that goods would be shipped from abroad rather than your home country.
The internet is populated with many fake and scam sites - with many being created daily purely to look genuine. Even many review sites are tainted with fake reviews making it almost impossible for somedbody to detect a safe site from a scam. We attempt to analyse the website information and provide a trust guide that will help you determine the risk rating of collegedata.
[ Click to see the free detailed trust review for collegedata.com ]
|
{
"url": "http://www.scamadviser.com/is-collegedata.com-safe.html",
"source_domain": "www.scamadviser.com",
"snapshot_id": "crawl=CC-MAIN-2013-48",
"warc_metadata": {
"Content-Length": "21073",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:CFRMDFDY3P7BDPINGO32HE5UTQK6K65C",
"WARC-Concurrent-To": "<urn:uuid:4c759b9f-bca9-4689-a4a4-aa52fefe0bb6>",
"WARC-Date": "2013-12-10T09:44:42Z",
"WARC-IP-Address": "74.50.56.73",
"WARC-Identified-Payload-Type": null,
"WARC-Payload-Digest": "sha1:OS2WPKPBMU5IPQ7HIK5FRTLJVKGTMXDM",
"WARC-Record-ID": "<urn:uuid:82b66230-bf3a-4365-a6f9-f808fcb052cd>",
"WARC-Target-URI": "http://www.scamadviser.com/is-collegedata.com-safe.html",
"WARC-Truncated": null,
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:4d454e86-e397-4393-8582-db175dc36b8e>"
},
"warc_info": "robots: classic\r\nhostname: ip-10-33-133-15.ec2.internal\r\nsoftware: Nutch 1.6 (CC)/CC WarcExport 1.0\r\nisPartOf: CC-MAIN-2013-48\r\noperator: CommonCrawl Admin\r\ndescription: Wide crawl of the web with URLs provided by Blekko for Winter 2013\r\npublisher: CommonCrawl\r\nformat: WARC File Format 1.0\r\nconformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf"
}
|
{
"line_start_idx": [
0,
1,
77,
78,
79,
128,
156,
157,
168,
195,
233,
256,
285,
286,
296,
301,
308,
309,
310,
311,
363,
364,
727,
728,
1103
],
"line_end_idx": [
1,
77,
78,
79,
128,
156,
157,
168,
195,
233,
256,
285,
286,
296,
301,
308,
309,
310,
311,
363,
364,
727,
728,
1103,
1170
]
}
|
{
"red_pajama_v2": {
"ccnet_original_length": 1170,
"ccnet_original_nlines": 24,
"rps_doc_curly_bracket": 0,
"rps_doc_ldnoobw_words": 0,
"rps_doc_lorem_ipsum": 0,
"rps_doc_stop_word_fraction": 0.33476394414901733,
"rps_doc_ut1_blacklist": 0,
"rps_doc_frac_all_caps_words": 0,
"rps_doc_frac_lines_end_with_ellipsis": 0,
"rps_doc_frac_no_alph_words": 0.19313305616378784,
"rps_doc_frac_unique_words": 0.6524063944816589,
"rps_doc_mean_word_length": 4.967914581298828,
"rps_doc_num_sentences": 18,
"rps_doc_symbol_to_word_ratio": 0,
"rps_doc_unigram_entropy": 4.586780071258545,
"rps_doc_word_count": 187,
"rps_doc_frac_chars_dupe_10grams": 0,
"rps_doc_frac_chars_dupe_5grams": 0,
"rps_doc_frac_chars_dupe_6grams": 0,
"rps_doc_frac_chars_dupe_7grams": 0,
"rps_doc_frac_chars_dupe_8grams": 0,
"rps_doc_frac_chars_dupe_9grams": 0,
"rps_doc_frac_chars_top_2gram": 0.034445639699697495,
"rps_doc_frac_chars_top_3gram": 0.032292790710926056,
"rps_doc_frac_chars_top_4gram": 0,
"rps_doc_books_importance": -78.06417846679688,
"rps_doc_books_importance_length_correction": -78.06417846679688,
"rps_doc_openwebtext_importance": -47.86072540283203,
"rps_doc_openwebtext_importance_length_correction": -47.300540924072266,
"rps_doc_wikipedia_importance": -25.81136131286621,
"rps_doc_wikipedia_importance_length_correction": -25.81136131286621
},
"fasttext": {
"dclm": 0.06212151050567627,
"english": 0.9473279714584351,
"fineweb_edu_approx": 1.0557212829589844,
"eai_general_math": 0.005030990112572908,
"eai_open_web_math": 0.12622570991516113,
"eai_web_code": 0.00016946000687312335
}
}
|
{
"free_decimal_correspondence": {
"primary": {
"code": "005.82",
"labels": {
"level_1": "General works, books and libraries, information sciences",
"level_2": "",
"level_3": "Computer programming"
}
},
"secondary": {
"code": "363.25",
"labels": {
"level_1": "Social sciences",
"level_2": "Social service and Societies",
"level_3": "Political activists"
}
}
},
"bloom_cognitive_process": {
"primary": {
"code": "5",
"label": "Evaluate"
},
"secondary": {
"code": "2",
"label": "Understand"
}
},
"bloom_knowledge_domain": {
"primary": {
"code": "2",
"label": "Conceptual"
},
"secondary": {
"code": "3",
"label": "Procedural"
}
},
"document_type_v1": {
"primary": {
"code": "3",
"label": "Reference/Encyclopedic/Educational"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"extraction_artifacts": {
"primary": {
"code": "0",
"label": "No Artifacts"
},
"secondary": {
"code": "3",
"label": "Irrelevant Content"
}
},
"missing_content": {
"primary": {
"code": "0",
"label": "No missing content"
},
"secondary": {
"code": "2",
"label": "Click Here References"
}
},
"document_type_v2": {
"primary": {
"code": "10",
"label": "Knowledge Article"
},
"secondary": {
"code": "21",
"label": "Customer Support"
}
},
"reasoning_depth": {
"primary": {
"code": "2",
"label": "Basic Reasoning"
},
"secondary": {
"code": "3",
"label": "Intermediate Reasoning"
}
},
"technical_correctness": {
"primary": {
"code": "6",
"label": "Not Applicable/Indeterminate"
},
"secondary": {
"code": "4",
"label": "Highly Correct"
}
},
"education_level": {
"primary": {
"code": "1",
"label": "General Audience"
},
"secondary": {
"code": "2",
"label": "High School Level"
}
}
}
|
672f1e42c33a7f9846924a2431ea77df
|
-323,811,181,243,071,100 |
In defence of technology jargon
If you asked a handful of strangers what’s meant by the word “computing,” they would probably refer to using a combination of hardware and software to manage information. I doubt many of them would talk about math, but that’s the original connotations. This is part of the complicated journey of human thought through language.
Most people in the IT industry hate jargon, even those who use it all the time. It’s become pretty accepted that we should not be creating more three-letter abbreviations and should figure out a way to get rid of the ones in our collective vocabulary. But there’s another side to this story, one that suggests we might do well to not only preserve jargon, but encourage an ever-expanding glossary of technology-related terms.
In a recent article on Miller-McCune called “Rescuing Endangered Languages Means Saving Ideas,” Emily Badger writes about a joint program by the U.S. National Science Foundation and National Endowment for the Humanities where researchers are trying to preserve dialects that are dying out in regions all over the world. They believe that as half of the world’s 7,000 languages are projected to disappear by the end of the century, what we are losing are not just ways to say things but things to say.
“As the famous example says, Eskimo have numerous words to describe what Americans would just call ‘snow’ and ‘ice,’” Badger writes. “This suggests language systems don’t merely translate universal ideas into different spellings; they encode different concepts. And when we lose a language, we risk losing those concepts.”
Of course, technology jargon is far from representing an entire language, but it does tend to focus on ways of encapsulating concepts, notions, representations of ideal states of information management. As major trends in the industry take shape experts often note that they lack common definition. This was true of business intelligence, service-oriented architecture, electronic health records, customer relationship management, cloud computing and many others.
Over time, through countless articles, panel discussions, online forums and via social media, we tend to work towards some kind of consensus on these terms. But the results can be limiting. I’ve been hearing more and more people, for example, reducing cloud computing to “the use of the Internet to perform tasks you have historically done on site,” or something to that effect. This leaves out a lot about private versus public clouds, software as a service vs. hosted infrastructure and so on.
Jargon doesn’t tend to get codified with the same rigour as, say, Italian or Farsi, but it is probably more “living” than many of the languages currently on the verge of extinction. If IT managers were able to take more time to pay attention to the various usages from different sources, they would come as close as possible to getting at that “tribal knowledge” that also seems to be constantly in danger of being lost. Just because so much of what’s said about technology remains open to interpretation doesn’t mean we have to be in such a hurry to settle on an interpretation.
|
{
"url": "http://www.itworldcanada.com/blog/in-defence-of-technology-jargon/59377",
"source_domain": "www.itworldcanada.com",
"snapshot_id": "crawl=CC-MAIN-2015-22",
"warc_metadata": {
"Content-Length": "46487",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:C2QAHERRQBDVUN4NLUCJKUHO4E7FBZOE",
"WARC-Concurrent-To": "<urn:uuid:8f2e2f8b-edd4-4206-84d5-e39ffbce59b7>",
"WARC-Date": "2015-05-26T01:30:13Z",
"WARC-IP-Address": "64.140.125.207",
"WARC-Identified-Payload-Type": null,
"WARC-Payload-Digest": "sha1:IRLQI24PI4GXCWQA5U3OZJMYYR7X6XJA",
"WARC-Record-ID": "<urn:uuid:3cd64e71-cb9a-4c30-8e1c-907e2a98cd65>",
"WARC-Target-URI": "http://www.itworldcanada.com/blog/in-defence-of-technology-jargon/59377",
"WARC-Truncated": null,
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:efcd6731-fad2-4777-ba92-ac063f566d33>"
},
"warc_info": "robots: classic\r\nhostname: ip-10-180-206-219.ec2.internal\r\nsoftware: Nutch 1.6 (CC)/CC WarcExport 1.0\r\nisPartOf: CC-MAIN-2015-22\r\noperator: CommonCrawl Admin\r\ndescription: Wide crawl of the web for May 2015\r\npublisher: CommonCrawl\r\nformat: WARC File Format 1.0\r\nconformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf"
}
|
{
"line_start_idx": [
0,
32,
33,
361,
362,
788,
789,
1290,
1291,
1614,
1615,
2079,
2080,
2576,
2577
],
"line_end_idx": [
32,
33,
361,
362,
788,
789,
1290,
1291,
1614,
1615,
2079,
2080,
2576,
2577,
3157
]
}
|
{
"red_pajama_v2": {
"ccnet_original_length": 3157,
"ccnet_original_nlines": 14,
"rps_doc_curly_bracket": 0,
"rps_doc_ldnoobw_words": 0,
"rps_doc_lorem_ipsum": 0,
"rps_doc_stop_word_fraction": 0.4560260474681854,
"rps_doc_ut1_blacklist": 0,
"rps_doc_frac_all_caps_words": 0.009771989658474922,
"rps_doc_frac_lines_end_with_ellipsis": 0,
"rps_doc_frac_no_alph_words": 0.1384364813566208,
"rps_doc_frac_unique_words": 0.5817120671272278,
"rps_doc_mean_word_length": 5.009727478027344,
"rps_doc_num_sentences": 24,
"rps_doc_symbol_to_word_ratio": 0,
"rps_doc_unigram_entropy": 5.289003372192383,
"rps_doc_word_count": 514,
"rps_doc_frac_chars_dupe_10grams": 0,
"rps_doc_frac_chars_dupe_5grams": 0,
"rps_doc_frac_chars_dupe_6grams": 0,
"rps_doc_frac_chars_dupe_7grams": 0,
"rps_doc_frac_chars_dupe_8grams": 0,
"rps_doc_frac_chars_dupe_9grams": 0,
"rps_doc_frac_chars_top_2gram": 0.011650489643216133,
"rps_doc_frac_chars_top_3gram": 0,
"rps_doc_frac_chars_top_4gram": 0,
"rps_doc_books_importance": -259.0024108886719,
"rps_doc_books_importance_length_correction": -259.0024108886719,
"rps_doc_openwebtext_importance": -146.0041046142578,
"rps_doc_openwebtext_importance_length_correction": -146.0041046142578,
"rps_doc_wikipedia_importance": -107.08085632324219,
"rps_doc_wikipedia_importance_length_correction": -107.08085632324219
},
"fasttext": {
"dclm": 0.10007333755493164,
"english": 0.9625900387763977,
"fineweb_edu_approx": 2.662668228149414,
"eai_general_math": 0.5820432901382446,
"eai_open_web_math": 0.34341222047805786,
"eai_web_code": 0.18977421522140503
}
}
|
{
"free_decimal_correspondence": {
"primary": {
"code": "004.01",
"labels": {
"level_1": "General works, books and libraries, information sciences",
"level_2": "",
"level_3": "Computers and Computer science"
}
},
"secondary": {
"code": "401",
"labels": {
"level_1": "Philology; or, Language and languages",
"level_2": "",
"level_3": "Language and languages — Philosophy and Language and languages — Origin"
}
}
},
"bloom_cognitive_process": {
"primary": {
"code": "5",
"label": "Evaluate"
},
"secondary": {
"code": "2",
"label": "Understand"
}
},
"bloom_knowledge_domain": {
"primary": {
"code": "2",
"label": "Conceptual"
},
"secondary": {
"code": "4",
"label": "Metacognitive"
}
},
"document_type_v1": {
"primary": {
"code": "1",
"label": "News/Editorial"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"extraction_artifacts": {
"primary": {
"code": "0",
"label": "No Artifacts"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"missing_content": {
"primary": {
"code": "0",
"label": "No missing content"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"document_type_v2": {
"primary": {
"code": "16",
"label": "Personal Blog"
},
"secondary": {
"code": "10",
"label": "Knowledge Article"
}
},
"reasoning_depth": {
"primary": {
"code": "3",
"label": "Intermediate Reasoning"
},
"secondary": {
"code": "2",
"label": "Basic Reasoning"
}
},
"technical_correctness": {
"primary": {
"code": "6",
"label": "Not Applicable/Indeterminate"
},
"secondary": {
"code": "3",
"label": "Mostly Correct"
}
},
"education_level": {
"primary": {
"code": "2",
"label": "High School Level"
},
"secondary": {
"code": "1",
"label": "General Audience"
}
}
}
|
672f1e42c33a7f9846924a2431ea77df
|
108,844,964,815,379,630 |
Logo SEO Tools for Writers for Webmaster
ROBOT.TXT GENERATOR
Generate robots.txt file easily
(leave blank if you don’t have)
In this latest version, we develop the Robot TXT Generator tool with export features and useragent features. The export feature will make it easier for you to check the code on Google Rich Result. Meanwhile, the useragent feature will allow you to add more commands to the Robot TXT Generator. This makes it easier for the txt Robot to specifically sort out which content you want to cover and which ones are displayed.
Updated 15 Mar, 2021
In this latest version, we develop the Robot TXT Generator tool with export features and useragent features. The export feature will make it easier for you to check the code on Google Rich Result. Meanwhile, the useragent feature will allow you to add more commands to the Robot TXT Generator. This makes it easier for the txt Robot to specifically sort out which content you want to cover and which ones are displayed.
Updated 15 Mar, 2021
What's New
Last update Oct 13, 2023
30 Tools for Countless Solutions! cmlabs has reached a remarkable milestone with the release of 30 cutting-edge tools designed to empower businesses and individuals in the digital realm. All 30 tools, from Test & Checker, Sitemap.XML, and Robots.TXT to various JSON-LD Schema Generator, have been launched to address specific needs and challenges across diverse industries. Together with cmlabs tools, you can stand at the forefront of technological advancements. Try our tools based on your needs now!
Notification center
SEO Services
Get a personalized SEO service and give your business a treat.
Explore now
Digital Media Buying
Get a personalized SEO service and give your business a treat.
Explore now
SEO Content Writing
Get a personalized SEO service and give your business a treat.
Explore now
SEO Political Campaign
Get a personalized SEO service and give your business a treat.
Explore now
Backlink Services
Get a personalized SEO service and give your business a treat.
Explore now
Other SEO Tools
Robots.txt Generator
Writen by cmlabs
|
Published at Oct 13, 2023
What is Robots.txt Generator?
Robots.txt generator is a tool that is able to make it easier for you to make configurations in the robots.txt file. The robots.txt generator from cmlabs contains all the commands you can use to create a robots.txt file, from specifying a user-agent, entering a sitemap path, specifying access permissions (allow or disallow), to setting crawl-delay.
Why Do You Need a Robots.txt Generator?
By using the robots.txt generator, you do not need to manually write the robots.txt file. Just enter the command you want to give the web crawler, then set which pages are allowed or not allowed to be crawled. How to use the robots.txt generator is quite easy, with just a few clicks.
Robots.txt Functions For Your Website
Robots.txt is a file containing certain commands that decide whether the user-agent (web crawler of each search engine) is allowed or not to crawl website elements. The functions of robots.txt for your website are as follows:
• Tells crawlers which page URLs they can or can't access
• Helping websites avoid the burden of too many crawl requests
• Help manage crawler traffic to your website
Robots.txt File Location In Website
Generally, the location of the robots.txt file is in the main directory of the website (e.g domain root or homepage). Before you add it, the robots.txt file is already in the root folder on the file storage server (public_html).
However, you will not find the file when you open public_html. This is because this file is virtual and cannot be modified or accessed from other directories. To change commands in robots.txt, you need to add a new robots.txt file and save it in the public_html folder. In this way, the configuration in the new file will replace the previous file.
Syntax on Robots.txt
The robots.txt syntax can be interpreted as the command you use to notify web crawlers. The robots.txt generator from cmlabs also provides a syntax that the web crawler recognizes. The five terms commonly found in a robots.txt file are as follows:
User-Agent
What is meant by a user-agent in robots.txt is the specific type of web crawler that you give the command to crawl. This web crawler usually varies depending on the search engine used.
Some examples of user agents that are often used are Googlebot, Googlebot-Mobile, Googlebot-Image, Bingbot, Baiduspider, Gigabot, Yandex, and so on.
Disallow
The command used to tell the user-agent not to crawl the specified URL path. Make sure you have entered the correct path because this command is case-sensitive (eg “/File” and “/file” are considered different paths). You can only use one “Disallow” command for each URL.
Allow
This command is used to tell web crawlers that they are allowed to access the path of a page or subfolder even if the parent page of that page or subfolder is disallowed.In practice, the allow and disallow commands are always followed by the “directive: [path]” command to specify the path that may or may not be crawled. Careful attention must be paid to writing the path because this command distinguishes between upper/lower case letters (eg “/File” and “/file” are considered as different paths).
Crawl-Delay
The function of this command in robots.txt is to tell web crawlers that they should wait a while before loading and crawling the page content. This command does not apply to Googlebot, but you can adjust the crawl speed via Google Search Console.
Sitemap
This command is used to call the XML sitemap location associated with a URL. It is also important to pay attention to the writing of the sitemap command because this command distinguishes upper / lower case letters (eg "/Sitemap.xml" and "/sitemap.xml" are considered different paths).
Example Robots.txt
After understanding the commands you can give the web crawler, we will next show an example of the www.example.com website's robots.txt, which is stored in the following www.example.com/robots.txt directory:
User-agent: *
Allow: /
Sitemap: https://example.com/sitemap.xml
User-agent: Googlebot
Disallow: /nogooglebot
The first and second lines are commands that tell the default web crawler that they are allowed to crawl URLs. Meanwhile, the third line is used to call the sitemap location associated with that URL.
The fourth and fifth lines are the commands given to Google's web crawler. This command does not allow Googlebot to crawl your website directory (forbids Google from crawling the “/nogooglebot” file path).
The Limitation of Robots.txt
Before creating a robots.txt, you need to know the limitations that the following robots.txt file has:s
May not be supported on certain search engines
While Google and other major search engines have complied with the commands in the robots.txt file, some crawlers belonging to other search engines may not comply.
Different crawlers interpret the syntax in different ways
Each search engine has a different web crawler, each crawler may interpret commands in different ways. Although a number of well-known crawlers have followed the syntax written in the robots.txt file, some crawlers may not understand certain commands.
Pages that are not allowed on robots.txt can still be indexed if they are linked to other pages
While Google doesn't crawl or index content that robots.txt doesn't allow, Google can still find and index those URLs if they're linked from other websites. Thus, URL addresses and publicly available information can appear in Google search results.
Thus the discussion about the robots.txt generator from cmlabs. Using this tool, you can simplify the workflow of creating robots.txt files. With just a few clicks, you can add configurations to the new robots.txt file.
How to Use Robots.txt Generator
To create a robots.txt file using this tool, follow these steps:
Go to Robots.txt Generator Page
One way to create a robots.txt file is to visit the robots.txt generator page. On that page, you can set the commands you will give the web crawler.
HowTo-robot-1
Figure 1: The robot.txt generator page view from cmlabs
Select Access Permission For Default Robot
Specify access permissions for the default web crawlers, whether they are allowed to crawl URLs or not. There are two options that you can choose, namely, allow and disallow.
HowTo-robot-2
Figure 2: Dropdown view of the permission options granted to the default robot
Set Crawl Delay
You can set how long the crawl delay will be for the web crawler. If you set crawl-delay then the web crawler will wait for some time before crawling your URL. Robots.txt generator allows you to choose without crawl delay or delay for 5 to 120 seconds.
HowTo-robot-3
Figure 3: A dropdown view of the crawl delay options provided to the default robot
Enter Sitemap (If Any)
A sitemap is a file that lists the URLs of your website, with this file, web crawlers will find it easier to crawl and index your site. You can enter the sitemap path into the field provided.
Make sure you have entered the correct sitemap path because this command is case sensitive (eg “/Sitemap.xml” and “/sitemap.xml” are considered different paths).
HowTo-robot-4
Figure 4: The display field for entering the sitemap path associated with your URL
Add Directive In Robots.txt
You can add directives to the robots.txt file by pressing the "Add Directive" button. Directives are commands given to web crawlers to tell you whether you allow or deny them to crawl certain URLs.
HowTo-robot-5
Figure 5: Button for adding commands to be executed by the web crawler
In the robots.txt generator, there are three rules that you need to adjust in the directive section, namely:
Set Access Permission
You can set the access permissions granted to web crawlers, whether you allow or disallow them from crawling your web pages. The options that can be used allow and disallow.
HowTo-robot-6
Figure 6: Choice of access permissions to be granted to web crawlers
Select User-Agent
A user-agent is the type of web crawler that you will instruct to crawl. The choice of this web crawler depends on the search engine used, such as Baiduspider, Bingbot, Googlebot, and others. The web crawler option can be selected via the available user-agent dropdown.
HowTo-robot-7
Figure 7: User-agent options available in cmlabs robots.txt generator
Enter Directory / File Path
A directory or file path is a specific location of a page that web crawlers may or may not crawl. You must pay close attention to writing the path because this command distinguishes between upper and lower case letters (eg "/File" and "/file" are considered different paths).
HowTo-robot-8
Figure 8: Field to add the path to be crawled by the crawler
Copy Robot.txt
After entering the command for the web crawler in the field provided, you will see a preview of the robots.txt file in the right section. You can copy the generated syntax and paste it into the robots.txt file that you have created.
HowTo-robot-9
Figure 9: Syntax copy options in the robots.txt generator.
Export Syntax Robots.txt
If you don't know how to create your own robots.txt file, you can export the file that cmlabs has generated. Downloading the robots file is quite easy. You can select the "Export" option contained in the robots.text generator tools. Next, the tool will start the download and you will receive a robots.txt file.
HowTo-robot-10
Figure 10: Data export options in the robots.txt generator.
Remove Unnecessary Directives
If you want to delete unneeded directives, then you can click the cross icon to the right of the field to enter the directive. Please note that deleted fields cannot be recovered.
HowTo-robot-11
Figure 11: The delete data directive option in the robots.txt generator
Reset Robots.txt Generator
This tool has options that make it easier for you to find out how to create another robots.txt file. Click the "Reset" option to delete all the commands you set in robots.txt earlier. Next, you can create a new robots.txt configuration file.
HowTo-robot-12
Figure 12: Data reset options in the robots.txt generator.
Read More
Edited at Oct 13, 2023
cmlabs Aliance
These strategic alliances allow us to offer our clients a wider range of SEO innovative solutions and exceptional service around the world. If you've ever planned of conquering the more market, you've come to the right place! Let's turn those plan into reality, shall we?
Writing Starter Guide
The Search Engine Optimization (SEO) Starter Guide provides best practices to make it easier for search engines to crawl, index, and understand your content.
Explore Today!
Sequence business partner card
StoryLabs
Gain more traffic for your business
There is currently no notification...
|
{
"url": "https://tools.cmlabs.co/en/robotstxt-generator",
"source_domain": "tools.cmlabs.co",
"snapshot_id": "CC-MAIN-2023-50",
"warc_metadata": {
"Content-Length": "165771",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:GTWDRUO7JIGQDZYJNAXDC5XP5FNPDJGJ",
"WARC-Concurrent-To": "<urn:uuid:550b3db1-ab31-4904-bc2d-cd354b3ba849>",
"WARC-Date": "2023-12-02T08:20:01Z",
"WARC-IP-Address": "52.76.108.1",
"WARC-Identified-Payload-Type": "text/html",
"WARC-Payload-Digest": "sha1:66ZR2LZ4UDFWFOMTMDHEOIEAWMEQN4EN",
"WARC-Record-ID": "<urn:uuid:17e4e6a5-fd8f-4620-8ed3-7eae96a7f3b8>",
"WARC-Target-URI": "https://tools.cmlabs.co/en/robotstxt-generator",
"WARC-Truncated": null,
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:87a0a03f-3dc6-49ab-8470-0971eec15a5f>"
},
"warc_info": "isPartOf: CC-MAIN-2023-50\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for November/December 2023\r\noperator: Common Crawl Admin ([email protected])\r\nhostname: ip-10-67-67-66\r\nsoftware: Apache Nutch 1.19 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.5-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: https://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/"
}
|
{
"line_start_idx": [
0,
43,
44,
64,
65,
97,
129,
130,
550,
551,
572,
573,
993,
994,
1015,
1016,
1027,
1028,
1053,
1054,
1557,
1558,
1578,
1579,
1592,
1593,
1656,
1657,
1669,
1670,
1691,
1692,
1755,
1756,
1768,
1769,
1789,
1790,
1853,
1854,
1866,
1867,
1890,
1891,
1954,
1955,
1967,
1968,
1986,
1987,
2050,
2051,
2063,
2064,
2080,
2081,
2102,
2103,
2120,
2121,
2123,
2124,
2150,
2151,
2181,
2182,
2533,
2534,
2574,
2575,
2860,
2861,
2899,
2900,
3126,
3127,
3187,
3252,
3300,
3301,
3337,
3338,
3567,
3568,
3917,
3918,
3939,
3940,
4188,
4189,
4200,
4201,
4386,
4387,
4536,
4537,
4546,
4547,
4818,
4819,
4825,
4826,
5327,
5328,
5340,
5341,
5588,
5589,
5597,
5598,
5884,
5885,
5904,
5905,
6113,
6114,
6139,
6177,
6211,
6212,
6278,
6279,
6326,
6374,
6375,
6400,
6423,
6424,
6624,
6625,
6831,
6832,
6861,
6862,
6966,
6967,
7014,
7015,
7179,
7180,
7238,
7239,
7491,
7492,
7588,
7589,
7838,
7839,
8059,
8060,
8092,
8093,
8158,
8159,
8191,
8192,
8341,
8342,
8356,
8357,
8413,
8414,
8457,
8458,
8633,
8634,
8648,
8649,
8728,
8729,
8745,
8746,
8999,
9000,
9014,
9015,
9098,
9099,
9122,
9123,
9315,
9316,
9478,
9479,
9493,
9494,
9577,
9578,
9606,
9607,
9805,
9806,
9820,
9821,
9892,
9893,
10002,
10003,
10025,
10026,
10200,
10201,
10215,
10216,
10285,
10286,
10304,
10305,
10575,
10576,
10590,
10591,
10661,
10662,
10690,
10691,
10967,
10968,
10982,
10983,
11044,
11045,
11060,
11061,
11294,
11295,
11309,
11310,
11369,
11370,
11395,
11396,
11708,
11709,
11724,
11725,
11785,
11786,
11816,
11817,
11997,
11998,
12013,
12014,
12086,
12087,
12114,
12115,
12357,
12358,
12373,
12374,
12433,
12434,
12444,
12445,
12468,
12469,
12484,
12756,
12778,
12779,
12937,
12938,
12953,
12984,
12994,
13030,
13031
],
"line_end_idx": [
43,
44,
64,
65,
97,
129,
130,
550,
551,
572,
573,
993,
994,
1015,
1016,
1027,
1028,
1053,
1054,
1557,
1558,
1578,
1579,
1592,
1593,
1656,
1657,
1669,
1670,
1691,
1692,
1755,
1756,
1768,
1769,
1789,
1790,
1853,
1854,
1866,
1867,
1890,
1891,
1954,
1955,
1967,
1968,
1986,
1987,
2050,
2051,
2063,
2064,
2080,
2081,
2102,
2103,
2120,
2121,
2123,
2124,
2150,
2151,
2181,
2182,
2533,
2534,
2574,
2575,
2860,
2861,
2899,
2900,
3126,
3127,
3187,
3252,
3300,
3301,
3337,
3338,
3567,
3568,
3917,
3918,
3939,
3940,
4188,
4189,
4200,
4201,
4386,
4387,
4536,
4537,
4546,
4547,
4818,
4819,
4825,
4826,
5327,
5328,
5340,
5341,
5588,
5589,
5597,
5598,
5884,
5885,
5904,
5905,
6113,
6114,
6139,
6177,
6211,
6212,
6278,
6279,
6326,
6374,
6375,
6400,
6423,
6424,
6624,
6625,
6831,
6832,
6861,
6862,
6966,
6967,
7014,
7015,
7179,
7180,
7238,
7239,
7491,
7492,
7588,
7589,
7838,
7839,
8059,
8060,
8092,
8093,
8158,
8159,
8191,
8192,
8341,
8342,
8356,
8357,
8413,
8414,
8457,
8458,
8633,
8634,
8648,
8649,
8728,
8729,
8745,
8746,
8999,
9000,
9014,
9015,
9098,
9099,
9122,
9123,
9315,
9316,
9478,
9479,
9493,
9494,
9577,
9578,
9606,
9607,
9805,
9806,
9820,
9821,
9892,
9893,
10002,
10003,
10025,
10026,
10200,
10201,
10215,
10216,
10285,
10286,
10304,
10305,
10575,
10576,
10590,
10591,
10661,
10662,
10690,
10691,
10967,
10968,
10982,
10983,
11044,
11045,
11060,
11061,
11294,
11295,
11309,
11310,
11369,
11370,
11395,
11396,
11708,
11709,
11724,
11725,
11785,
11786,
11816,
11817,
11997,
11998,
12013,
12014,
12086,
12087,
12114,
12115,
12357,
12358,
12373,
12374,
12433,
12434,
12444,
12445,
12468,
12469,
12484,
12756,
12778,
12779,
12937,
12938,
12953,
12984,
12994,
13030,
13031,
13068
]
}
|
{
"red_pajama_v2": {
"ccnet_original_length": 13068,
"ccnet_original_nlines": 268,
"rps_doc_curly_bracket": 0,
"rps_doc_ldnoobw_words": 0,
"rps_doc_lorem_ipsum": 0,
"rps_doc_stop_word_fraction": 0.3572254180908203,
"rps_doc_ut1_blacklist": 0,
"rps_doc_frac_all_caps_words": 0.013487479649484158,
"rps_doc_frac_lines_end_with_ellipsis": 0.003717469982802868,
"rps_doc_frac_no_alph_words": 0.16493256390094757,
"rps_doc_frac_unique_words": 0.2561624050140381,
"rps_doc_mean_word_length": 4.961817264556885,
"rps_doc_num_sentences": 176,
"rps_doc_symbol_to_word_ratio": 0.00038536000647582114,
"rps_doc_unigram_entropy": 5.350257873535156,
"rps_doc_word_count": 2069,
"rps_doc_frac_chars_dupe_10grams": 0.10140269249677658,
"rps_doc_frac_chars_dupe_5grams": 0.19705824553966522,
"rps_doc_frac_chars_dupe_6grams": 0.14796414971351624,
"rps_doc_frac_chars_dupe_7grams": 0.11815702170133591,
"rps_doc_frac_chars_dupe_8grams": 0.11192285269498825,
"rps_doc_frac_chars_dupe_9grams": 0.11192285269498825,
"rps_doc_frac_chars_top_2gram": 0.026592640206217766,
"rps_doc_frac_chars_top_3gram": 0.02250145934522152,
"rps_doc_frac_chars_top_4gram": 0.007305670063942671,
"rps_doc_books_importance": -1228.897705078125,
"rps_doc_books_importance_length_correction": -1228.897705078125,
"rps_doc_openwebtext_importance": -648.4479370117188,
"rps_doc_openwebtext_importance_length_correction": -648.4479370117188,
"rps_doc_wikipedia_importance": -585.0491943359375,
"rps_doc_wikipedia_importance_length_correction": -585.0491943359375
},
"fasttext": {
"dclm": 0.036137938499450684,
"english": 0.882481575012207,
"fineweb_edu_approx": 2.22548770904541,
"eai_general_math": 0.41407251358032227,
"eai_open_web_math": 0.26025938987731934,
"eai_web_code": 0.2970607280731201
}
}
|
{
"free_decimal_correspondence": {
"primary": {
"code": "005.4",
"labels": {
"level_1": "General works, books and libraries, information sciences",
"level_2": "",
"level_3": "Computer programming"
}
},
"secondary": {
"code": "658.8",
"labels": {
"level_1": "Industrial arts, Technology, and Engineering",
"level_2": "Business",
"level_3": "Management"
}
}
},
"bloom_cognitive_process": {
"primary": {
"code": "3",
"label": "Apply"
},
"secondary": {
"code": "2",
"label": "Understand"
}
},
"bloom_knowledge_domain": {
"primary": {
"code": "3",
"label": "Procedural"
},
"secondary": {
"code": "2",
"label": "Conceptual"
}
},
"document_type_v1": {
"primary": {
"code": "3",
"label": "Reference/Encyclopedic/Educational"
},
"secondary": {
"code": "6",
"label": "Promotional/Advertisement"
}
},
"extraction_artifacts": {
"primary": {
"code": "3",
"label": "Irrelevant Content"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"missing_content": {
"primary": {
"code": "4",
"label": "Missing Images or Figures"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"document_type_v2": {
"primary": {
"code": "23",
"label": "Tutorial"
},
"secondary": {
"code": "8",
"label": "Documentation"
}
},
"reasoning_depth": {
"primary": {
"code": "2",
"label": "Basic Reasoning"
},
"secondary": {
"code": "3",
"label": "Intermediate Reasoning"
}
},
"technical_correctness": {
"primary": {
"code": "4",
"label": "Highly Correct"
},
"secondary": {
"code": "3",
"label": "Mostly Correct"
}
},
"education_level": {
"primary": {
"code": "2",
"label": "High School Level"
},
"secondary": {
"code": "1",
"label": "General Audience"
}
}
}
|
672f1e42c33a7f9846924a2431ea77df
|
-1,121,359,549,106,733,800 |
Pen Settings
HTML
CSS
CSS Base
Vendor Prefixing
Add External Stylesheets/Pens
Any URLs added here will be added as <link>s in order, and before the CSS in the editor. You can use the CSS from another Pen by using its URL and the proper URL extension.
+ add another resource
JavaScript
Babel includes JSX processing.
Add External Scripts/Pens
Any URL's added here will be added as <script>s in order, and run before the JavaScript in the editor. You can use the URL of any other Pen and it will include the JavaScript from that Pen.
+ add another resource
Packages
Add Packages
Search for and use JavaScript packages from npm here. By selecting a package, an import statement will be added to the top of the JavaScript editor for this package.
Behavior
Auto Save
If active, Pens will autosave every 30 seconds after being saved once.
Auto-Updating Preview
If enabled, the preview panel updates automatically as you code. If disabled, use the "Run" button to update.
Format on Save
If enabled, your code will be formatted when you actively save your Pen. Note: your code becomes un-folded during formatting.
Editor Settings
Code Indentation
Want to change your Syntax Highlighting theme, Fonts and more?
Visit your global Editor Settings.
HTML
<div class="scroller" data-scroller>
<header data-header>
<nav class="header__nav">
<div class="header__left-content">
<a class="header__home-link" href="#home"><svg width="118" height="202" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 118.7 202.6"><path d="M117.7 58c-1.3-5.7-3.5-11-5.8-16.2-5.5-12.1-13-22.7-23.6-30.9-5.2-4-10.8-7.4-17.1-9.6C67.8.1 64.4-.2 60.8.3c-1.8.2-3.4.9-4.2 3.2.4.2.8.4 1.2.7.5.4.9.8 2.1 1.9-11.2-2.9-20.3-.1-28.9 5-9.7 5.8-17.2 13.7-22.6 23.6-3.7 6.8-5.9 14.1-7.3 21.7C-1.6 71.6.8 86 8 99.6c2.9 5.6 7 10.3 11.7 14.9-1.7 3.8-1.7 3.8-.8 7.2.6 2.2 1.1 4.3 1.8 6.5 6.9 23 15.8 45.3 25.2 67.3.3.7.7 1.5 1.1 2.2 3.3 5.8 9.3 6.6 13.9 1.6 1.5-1.6 2.8-3.5 4-5.4 2.8-4.4 5.6-8.9 8.3-13.5 7-11.7 13.2-23.8 17.6-36.7 3.1-8.8 5-17.9 4.1-27.3 0-.5 0-1 .1-2.3.4-.3 1.4-.9 2.2-1.6 8.2-7.4 14.3-16.4 18.1-26.8 3.2-8.9 4.5-18.1 2.4-27.7zm-14.6 13.5C99 87.7 90 100.1 74.4 107.1c-7.9 3.6-16.4 4.5-24.9 3.1-12.9-2.1-22.2-9.3-28.3-20.7-5.1-9.5-6.4-19.7-5.1-30.3 1.7-13.9 7.7-25.6 18.5-34.7 7.6-6.4 16.2-10.1 26.2-10.7.5 0 1-.1 1.4-.1 2.3 0 4.1-.8 5.1-3.1 22.9 14.7 30.6 27.6 35.9 49.9.8 3.6.8 7.4-.1 11z"/><path d="M55.9 99c-9.3-.9-17.9-5.7-23.5-15.2-.7-1.2-1.2-2.6-1.6-4-.6-2-.8-4.1-.2-6.1.4-1.6 1.2-3 3-3.4 1.6-.3 2.8.5 3.7 1.7l2.4 3c2.9 3.5 6.3 6.3 10.4 8.3 3.8 1.9 7.8 2.7 12.1 2 1.3-.2 2.5-.4 3.8-.6.8-.1 1.6-.2 2.4-.2 1.8 0 3.5.5 4.4 2.3.8 1.8.3 3.5-.9 4.9-3.8 4.6-8.4 7.4-16 7.3zM68.1 60.4c.1-3.9 1.1-6.8 4.4-8.4 3.1-1.5 6.8-.9 9.3 1.5 2.6 2.5 3.8 5.5 2.7 9.1-.9 3.1-2.8 5.3-6 6.2-4.5 1.3-8.8-1.1-10-5.7-.2-1-.3-2.1-.4-2.7zM43 57.6c-.8-.1-1.8-.2-2.7-.4-6.6-.9-7.7-8.5-4.4-12.5 2.6-3.1 7.2-3.8 10.8-1.6 3.6 2.2 5.2 6.6 3.7 10.3-1.1 2.9-3.8 4.4-7.4 4.2z"/></svg></a>
</div>
<ul class="header__list">
<li>
<a href="#about-us" data-link>About us</a>
</li>
<li>
<a href="#the-flavours" data-link>The flavours</a>
</li>
<li>
<a href="#get-in-touch" data-link>Get in touch</a>
</li>
</ul>
</nav>
</header>
<main>
<section data-section="raspberry" id="home">
<div class="container grid">
<div class="section__img-col">
<img class="section__img" src="https://assets.codepen.io/85648/ice-creams-03.svg" alt="drawing of three smiling ice cream scoops in a bowl" />
</div>
<div class="section__content-col">
<h1>Happy Face Ice Cream Parlour</h1>
<p>A little ice cream parlour with big dreams.</p>
<p>We pride ourselves on flavours beyond your wildest dreams, and customer service that’s out of this world!</p>
<p>Order your favourite flavours online, or call us today to find out how we can make your special occasions extra delightful!</p>
<a class="section__link" href="#0">Shop now</a>
</div>
</div>
</section>
<section data-section="mint" id="about-us">
<div class="container grid">
<div class="section__img-col">
<img src="https://assets.codepen.io/85648/ice-creams-04.svg" alt="smiling scoop of ice cream with drips" />
</div>
<div class="section__content-col">
<h2>About us</h2>
<p>Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat. Duis aute irure dolor in reprehenderit in voluptate velit esse cillum dolore eu fugiat nulla pariatur. Excepteur sint occaecat cupidatat non proident, sunt in culpa qui officia deserunt mollit anim id est laborum.</p>
</div>
</div>
</section>
<section data-section="vanilla" id="the-flavours">
<div class="container grid">
<div class="section__img-col">
<img src="https://assets.codepen.io/85648/ice-creams-01.svg" alt="three happy ice creams" />
</div>
<div class="section__content-col">
<h2>The flavours</h2>
<p>Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat. Duis aute irure dolor in reprehenderit in voluptate velit esse cillum dolore eu fugiat nulla pariatur. Excepteur sint occaecat cupidatat non proident, sunt in culpa qui officia deserunt mollit anim id est laborum.</p>
</div>
</div>
</section>
<section data-section="chocolate" id="get-in-touch">
<div class="container grid">
<div class="section__img-col">
<img class="section__img" src="https://assets.codepen.io/85648/ice-creams-02.svg" alt="spoon with drips" />
</div>
<div class="section__content-col">
<h2 data-section-title>Get in touch</h2>
<p>Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat.</p>
</div>
</div>
</section>
</main>
</div>
!
CSS
@import url("https://fonts.googleapis.com/css?family=Open+Sans:400,700");
/* Variables */
:root {
--mint: #5ae8d5;
--chocolate: #573e31;
--raspberry: #f2308e;
--vanilla: #faf2c8;
--headerText: var(--vanilla);
--headerBg: var(--raspberry);
}
/* --Reset and boilerplate stuff-- */
* {
box-sizing: border-box;
}
body {
font-family: "Open Sans", sans-serif;
margin: 0;
background: var(--vanilla);
color: var(--chocolate);
line-height: 1.6;
}
ul {
list-style: none;
margin: 0;
padding: 0;
}
svg {
width: 100%;
height: auto;
fill: currentColor;
}
img {
display: block;
max-width: 100%;
}
h1 {
line-height: 1.2;
}
@media (min-width: 40em) {
body {
font-size: 1.2rem;
}
h1 {
font-size: 3.5rem;
}
}
a {
color: inherit;
text-decoration: none;
}
section {
padding: 5rem 0;
min-height: 100vh;
display: grid;
place-items: center;
}
/* ----- */
/* --Header and marker-- */
header {
position: fixed;
width: 100%;
padding: 0 max(1rem, 3vw);
background-color: var(--headerBg);
color: var(--headerText);
font-weight: 700;
transition: color 200ms, background-color 200ms;
}
header::after {
display: none;
content: '';
position: absolute;
top: 0;
left: 0;
width: var(--markerWidth, 0);
height: 0.4rem;
background-color: currentColor;
transform: translate3d(var(--markerLeft, 0), 0, 0);
transition: transform 250ms, width 200ms, background-color 200ms;
will-change: width;
}
@media (min-width: 40em) {
header::after {
display: block;
}
}
/* ----- */
/* --Header SVG - not necessary for the demo, just for fun-- */
.header__home-link {
position: absolute;
top: 1rem;
left: 1rem;
width: 5.25rem;
height: 5.25rem;
display: flex;
justify-content: center;
align-items: center;
padding: 1.25rem;
border-radius: 50%;
background: var(--headerBg);
color: var(--headerText);
border: 0.3rem solid;
}
/* ----- */
/* --Layout stuff-- */
.section__img {
max-width: 12rem;
margin: 0 auto;
}
@media (min-width: 40em) {
.section__img {
max-width: none;
}
}
section:last-child .section__img {
max-width: 10rem;
}
.container {
max-width: 60rem;
padding: 0 min(2rem, 5vw);
}
@media (min-width: 40rem) {
.grid {
display: grid;
align-items: center;
grid-template-columns: 1fr 2fr;
gap: 3rem;
}
}
.header__nav {
display: flex;
align-items: center;
}
.header__list {
display: none;
margin-left: auto;
}
@media (min-width: 40rem) {
.header__list {
display: flex;
}
}
.header__list a {
display: block;
padding: 1rem;
}
/* ----- */
/* --Secton specific styles, not related to demo-- */
.section__link {
display: inline-block;
background: var(--chocolate);
padding: 1rem 1.5rem;
color: var(--vanilla);
border-radius: 0.5rem;
font-weight: 700;
margin-top: 1.5rem;
}
/* ----- */
/* --Section colors-- */
[data-section="raspberry"] {
background-color: var(--raspberry);
color: var(--vanilla);
}
[data-section="mint"] {
background-color: var(--mint);
color: var(--chocolate);
}
[data-section="vanilla"] {
background-color: var(--vanilla);
color: var(--chocolate);
}
[data-section="chocolate"] {
background-color: var(--chocolate);
color: var(--vanilla);
}
/* ----- */
/* --Setting the custom properties for header colors-- */
[data-theme="raspberry"] {
--headerText: var(--raspberry);
--headerBg: var(--vanilla);
}
[data-theme="mint"] {
--headerText: var(--mint);
--headerBg: var(--chocolate);
}
[data-theme="chocolate"] {
--headerText: var(--chocolate);
--headerBg: var(--vanilla);
}
/* ----- */
/* --Setting the scroll root - because Codepen puts the content in an iframe-- */
.scroller {
height: 100vh;
width: 100%;
overflow: auto;
}
/* ----- */
/* --Smooth scroll behaviour for links-- */
@media (prefers-reduced-motion: no-preference) {
.scroller {
scroll-behavior: smooth;
}
}
/* ----- */
!
JS
const header = document.querySelector('[data-header]')
const sections = [...document.querySelectorAll('[data-section]')]
const scrollRoot = document.querySelector('[data-scroller]')
const headerLinks = [...document.querySelectorAll('[data-link]')]
let prevYPosition = 0
let direction = 'up'
const options = {
root: scrollRoot,
rootMargin: `${header.offsetHeight * -1}px`,
threshold: 0
}
const getTargetSection = (entry) => {
const index = sections.findIndex((section) => section == entry.target)
if (index >= sections.length - 1) {
return entry.target
} else {
return sections[index + 1]
}
}
const updateColors = (target) => {
const theme = target.dataset.section
header.setAttribute('data-theme', theme)
}
const shouldUpdate = (entry) => {
if (direction === 'down' && !entry.isIntersecting) {
return true
}
if (direction === 'up' && entry.isIntersecting) {
return true
}
return false
}
const updateMarker = (target) => {
const id = target.id
if (!id) return
let link = headerLinks.find((el) => {
return el.getAttribute('href') === `#${id}`
})
link = link || headerLinks[0]
const distanceFromLeft = link.getBoundingClientRect().left
header.style.setProperty('--markerWidth', `${link.clientWidth}px`)
header.style.setProperty('--markerLeft', `${distanceFromLeft}px`)
}
const onIntersect = (entries, observer) => {
entries.forEach((entry) => {
if (scrollRoot.scrollTop > prevYPosition) {
direction = 'down'
} else {
direction = 'up'
}
prevYPosition = scrollRoot.scrollTop
const target = direction === 'down' ? getTargetSection(entry) : entry.target
if (shouldUpdate(entry)) {
updateColors(target)
updateMarker(target)
}
})
}
document.addEventListener('readystatechange', e => {
if (e.target.readyState === 'complete') {
updateMarker(sections[0])
}
})
const observer = new IntersectionObserver(onIntersect, options)
sections.forEach((section) => {
observer.observe(section)
})
!
999px
Console
|
{
"url": "https://codepen.io/smashingmag/pen/XWRXVXQ",
"source_domain": "codepen.io",
"snapshot_id": "CC-MAIN-2024-10",
"warc_metadata": {
"Content-Length": "126987",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:DQGI636SIGVMRO3IKJYZJ6CI24AJLCS2",
"WARC-Concurrent-To": "<urn:uuid:41d2ebe6-1d90-44bd-abc2-55358eaf1aaa>",
"WARC-Date": "2024-02-24T10:11:07Z",
"WARC-IP-Address": "104.16.176.44",
"WARC-Identified-Payload-Type": "text/html",
"WARC-Payload-Digest": "sha1:Q2TZCQT5FX5ZK7JM3JZODEA3JKEUVPR5",
"WARC-Record-ID": "<urn:uuid:f2c223c3-d200-42d9-8d98-9f89d37d1301>",
"WARC-Target-URI": "https://codepen.io/smashingmag/pen/XWRXVXQ",
"WARC-Truncated": null,
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:e3f9c2ae-e909-42ce-88a8-cac840c1aa51>"
},
"warc_info": "isPartOf: CC-MAIN-2024-10\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for February/March 2024\r\noperator: Common Crawl Admin ([email protected])\r\nhostname: ip-10-67-67-144\r\nsoftware: Apache Nutch 1.19 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.5-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: https://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/"
}
|
{
"line_start_idx": [
0,
13,
14,
19,
20,
24,
25,
34,
35,
52,
53,
83,
84,
257,
258,
281,
282,
293,
294,
325,
326,
352,
353,
543,
544,
567,
568,
577,
578,
591,
592,
758,
759,
768,
769,
779,
780,
851,
852,
874,
875,
985,
986,
1001,
1002,
1128,
1129,
1145,
1146,
1163,
1164,
1227,
1228,
1263,
1264,
1269,
1270,
1285,
1338,
1360,
1388,
1426,
2990,
3000,
3029,
3038,
3086,
3096,
3105,
3161,
3171,
3180,
3236,
3246,
3255,
3264,
3275,
3283,
3330,
3362,
3397,
3545,
3556,
3595,
3638,
3694,
3812,
3948,
4001,
4012,
4022,
4035,
4081,
4113,
4148,
4261,
4272,
4311,
4334,
4792,
4803,
4813,
4826,
4879,
4911,
4946,
5044,
5055,
5094,
5121,
5579,
5590,
5600,
5613,
5668,
5700,
5735,
5848,
5859,
5898,
5944,
6188,
6199,
6209,
6222,
6231,
6238,
6253,
6266,
6268,
6269,
6273,
6274,
6289,
6379,
6380,
6396,
6404,
6422,
6445,
6468,
6489,
6491,
6522,
6553,
6555,
6556,
6594,
6598,
6623,
6625,
6626,
6633,
6672,
6684,
6713,
6739,
6758,
6760,
6761,
6766,
6785,
6797,
6810,
6812,
6813,
6819,
6833,
6848,
6869,
6871,
6872,
6878,
6895,
6913,
6915,
6916,
6921,
6940,
6942,
6943,
6970,
6978,
6999,
7002,
7004,
7010,
7031,
7034,
7036,
7037,
7041,
7058,
7082,
7084,
7085,
7095,
7113,
7133,
7149,
7171,
7173,
7185,
7186,
7214,
7223,
7241,
7255,
7283,
7319,
7346,
7365,
7415,
7417,
7418,
7434,
7450,
7464,
7485,
7494,
7504,
7535,
7552,
7585,
7638,
7705,
7726,
7728,
7729,
7756,
7773,
7791,
7794,
7796,
7808,
7809,
7873,
7894,
7915,
7927,
7940,
7957,
7975,
7991,
8017,
8039,
8058,
8079,
8109,
8136,
8159,
8161,
8173,
8174,
8197,
8213,
8232,
8249,
8251,
8252,
8279,
8296,
8315,
8318,
8320,
8321,
8356,
8375,
8377,
8378,
8391,
8410,
8438,
8440,
8441,
8469,
8478,
8495,
8518,
8552,
8565,
8568,
8570,
8571,
8586,
8602,
8624,
8626,
8627,
8643,
8659,
8679,
8681,
8682,
8710,
8727,
8744,
8747,
8749,
8750,
8768,
8785,
8801,
8803,
8815,
8816,
8870,
8887,
8911,
8942,
8965,
8989,
9013,
9032,
9053,
9055,
9067,
9068,
9093,
9122,
9159,
9183,
9185,
9186,
9211,
9243,
9269,
9271,
9272,
9299,
9334,
9360,
9362,
9363,
9392,
9429,
9453,
9455,
9467,
9468,
9526,
9554,
9587,
9616,
9618,
9619,
9641,
9669,
9700,
9702,
9703,
9731,
9764,
9793,
9795,
9807,
9808,
9890,
9902,
9918,
9932,
9949,
9951,
9963,
9964,
10008,
10057,
10070,
10097,
10100,
10102,
10114,
10129,
10142,
10144,
10145,
10148,
10149,
10164,
10235,
10301,
10362,
10428,
10429,
10451,
10472,
10473,
10491,
10510,
10556,
10570,
10572,
10573,
10611,
10683,
10685,
10722,
10744,
10754,
10783,
10786,
10788,
10789,
10824,
10862,
10904,
10906,
10907,
10941,
10995,
11009,
11012,
11013,
11064,
11078,
11081,
11083,
11097,
11099,
11100,
11135,
11157,
11159,
11176,
11178,
11217,
11263,
11267,
11269,
11300,
11302,
11362,
11364,
11432,
11499,
11501,
11502,
11547,
11577,
11623,
11645,
11656,
11676,
11680,
11683,
11722,
11725,
11804,
11807,
11836,
11860,
11884,
11888,
11892,
11894,
11895,
11948,
11992,
12022,
12026,
12029,
12030,
12094,
12095,
12127,
12154,
12157,
12158,
12173,
12186,
12188,
12194,
12195
],
"line_end_idx": [
13,
14,
19,
20,
24,
25,
34,
35,
52,
53,
83,
84,
257,
258,
281,
282,
293,
294,
325,
326,
352,
353,
543,
544,
567,
568,
577,
578,
591,
592,
758,
759,
768,
769,
779,
780,
851,
852,
874,
875,
985,
986,
1001,
1002,
1128,
1129,
1145,
1146,
1163,
1164,
1227,
1228,
1263,
1264,
1269,
1270,
1285,
1338,
1360,
1388,
1426,
2990,
3000,
3029,
3038,
3086,
3096,
3105,
3161,
3171,
3180,
3236,
3246,
3255,
3264,
3275,
3283,
3330,
3362,
3397,
3545,
3556,
3595,
3638,
3694,
3812,
3948,
4001,
4012,
4022,
4035,
4081,
4113,
4148,
4261,
4272,
4311,
4334,
4792,
4803,
4813,
4826,
4879,
4911,
4946,
5044,
5055,
5094,
5121,
5579,
5590,
5600,
5613,
5668,
5700,
5735,
5848,
5859,
5898,
5944,
6188,
6199,
6209,
6222,
6231,
6238,
6253,
6266,
6268,
6269,
6273,
6274,
6289,
6379,
6380,
6396,
6404,
6422,
6445,
6468,
6489,
6491,
6522,
6553,
6555,
6556,
6594,
6598,
6623,
6625,
6626,
6633,
6672,
6684,
6713,
6739,
6758,
6760,
6761,
6766,
6785,
6797,
6810,
6812,
6813,
6819,
6833,
6848,
6869,
6871,
6872,
6878,
6895,
6913,
6915,
6916,
6921,
6940,
6942,
6943,
6970,
6978,
6999,
7002,
7004,
7010,
7031,
7034,
7036,
7037,
7041,
7058,
7082,
7084,
7085,
7095,
7113,
7133,
7149,
7171,
7173,
7185,
7186,
7214,
7223,
7241,
7255,
7283,
7319,
7346,
7365,
7415,
7417,
7418,
7434,
7450,
7464,
7485,
7494,
7504,
7535,
7552,
7585,
7638,
7705,
7726,
7728,
7729,
7756,
7773,
7791,
7794,
7796,
7808,
7809,
7873,
7894,
7915,
7927,
7940,
7957,
7975,
7991,
8017,
8039,
8058,
8079,
8109,
8136,
8159,
8161,
8173,
8174,
8197,
8213,
8232,
8249,
8251,
8252,
8279,
8296,
8315,
8318,
8320,
8321,
8356,
8375,
8377,
8378,
8391,
8410,
8438,
8440,
8441,
8469,
8478,
8495,
8518,
8552,
8565,
8568,
8570,
8571,
8586,
8602,
8624,
8626,
8627,
8643,
8659,
8679,
8681,
8682,
8710,
8727,
8744,
8747,
8749,
8750,
8768,
8785,
8801,
8803,
8815,
8816,
8870,
8887,
8911,
8942,
8965,
8989,
9013,
9032,
9053,
9055,
9067,
9068,
9093,
9122,
9159,
9183,
9185,
9186,
9211,
9243,
9269,
9271,
9272,
9299,
9334,
9360,
9362,
9363,
9392,
9429,
9453,
9455,
9467,
9468,
9526,
9554,
9587,
9616,
9618,
9619,
9641,
9669,
9700,
9702,
9703,
9731,
9764,
9793,
9795,
9807,
9808,
9890,
9902,
9918,
9932,
9949,
9951,
9963,
9964,
10008,
10057,
10070,
10097,
10100,
10102,
10114,
10129,
10142,
10144,
10145,
10148,
10149,
10164,
10235,
10301,
10362,
10428,
10429,
10451,
10472,
10473,
10491,
10510,
10556,
10570,
10572,
10573,
10611,
10683,
10685,
10722,
10744,
10754,
10783,
10786,
10788,
10789,
10824,
10862,
10904,
10906,
10907,
10941,
10995,
11009,
11012,
11013,
11064,
11078,
11081,
11083,
11097,
11099,
11100,
11135,
11157,
11159,
11176,
11178,
11217,
11263,
11267,
11269,
11300,
11302,
11362,
11364,
11432,
11499,
11501,
11502,
11547,
11577,
11623,
11645,
11656,
11676,
11680,
11683,
11722,
11725,
11804,
11807,
11836,
11860,
11884,
11888,
11892,
11894,
11895,
11948,
11992,
12022,
12026,
12029,
12030,
12094,
12095,
12127,
12154,
12157,
12158,
12173,
12186,
12188,
12194,
12195,
12202
]
}
|
{
"red_pajama_v2": {
"ccnet_original_length": 12202,
"ccnet_original_nlines": 472,
"rps_doc_curly_bracket": 0.010162269696593285,
"rps_doc_ldnoobw_words": 0,
"rps_doc_lorem_ipsum": 0.0003287699946667999,
"rps_doc_stop_word_fraction": 0.06262122094631195,
"rps_doc_ut1_blacklist": 0,
"rps_doc_frac_all_caps_words": 0.005541699938476086,
"rps_doc_frac_lines_end_with_ellipsis": 0,
"rps_doc_frac_no_alph_words": 0.6262122392654419,
"rps_doc_frac_unique_words": 0.5241605043411255,
"rps_doc_mean_word_length": 6.474201679229736,
"rps_doc_num_sentences": 439,
"rps_doc_symbol_to_word_ratio": 0.0033250199630856514,
"rps_doc_unigram_entropy": 6.122865676879883,
"rps_doc_word_count": 1221,
"rps_doc_frac_chars_dupe_10grams": 0.12207464128732681,
"rps_doc_frac_chars_dupe_5grams": 0.17115749418735504,
"rps_doc_frac_chars_dupe_6grams": 0.16179633140563965,
"rps_doc_frac_chars_dupe_7grams": 0.15041112899780273,
"rps_doc_frac_chars_dupe_8grams": 0.1294117569923401,
"rps_doc_frac_chars_dupe_9grams": 0.12207464128732681,
"rps_doc_frac_chars_top_2gram": 0.006072110030800104,
"rps_doc_frac_chars_top_3gram": 0.010626190342009068,
"rps_doc_frac_chars_top_4gram": 0.012144209817051888,
"rps_doc_books_importance": -1548.412353515625,
"rps_doc_books_importance_length_correction": -1548.412353515625,
"rps_doc_openwebtext_importance": -888.99609375,
"rps_doc_openwebtext_importance_length_correction": -888.99609375,
"rps_doc_wikipedia_importance": -440.7648620605469,
"rps_doc_wikipedia_importance_length_correction": -440.7648620605469
},
"fasttext": {
"dclm": 0.9546259045600891,
"english": 0.24394938349723816,
"fineweb_edu_approx": 2.0183725357055664,
"eai_general_math": 0.029744209721684456,
"eai_open_web_math": 0.390188992023468,
"eai_web_code": 0.7701575756072998
}
}
|
{
"free_decimal_correspondence": {
"primary": {
"code": "005.1",
"labels": {
"level_1": "General works, books and libraries, information sciences",
"level_2": "",
"level_3": "Computer programming"
}
},
"secondary": {
"code": "641.8",
"labels": {
"level_1": "Industrial arts, Technology, and Engineering",
"level_2": "Home economics",
"level_3": "Cooking and Gastronomy"
}
}
},
"bloom_cognitive_process": {
"primary": {
"code": "3",
"label": "Apply"
},
"secondary": {
"code": "2",
"label": "Understand"
}
},
"bloom_knowledge_domain": {
"primary": {
"code": "3",
"label": "Procedural"
},
"secondary": {
"code": "2",
"label": "Conceptual"
}
},
"document_type_v1": {
"primary": {
"code": "4",
"label": "Code/Software"
},
"secondary": {
"code": "3",
"label": "Reference/Encyclopedic/Educational"
}
},
"extraction_artifacts": {
"primary": {
"code": "1",
"label": "Leftover HTML"
},
"secondary": {
"code": "3",
"label": "Irrelevant Content"
}
},
"missing_content": {
"primary": {
"code": "0",
"label": "No missing content"
},
"secondary": {
"code": "4",
"label": "Missing Images or Figures"
}
},
"document_type_v2": {
"primary": {
"code": "8",
"label": "Documentation"
},
"secondary": {
"code": "23",
"label": "Tutorial"
}
},
"reasoning_depth": {
"primary": {
"code": "2",
"label": "Basic Reasoning"
},
"secondary": {
"code": "3",
"label": "Intermediate Reasoning"
}
},
"technical_correctness": {
"primary": {
"code": "4",
"label": "Highly Correct"
},
"secondary": {
"code": "3",
"label": "Mostly Correct"
}
},
"education_level": {
"primary": {
"code": "3",
"label": "Undergraduate Level"
},
"secondary": {
"code": "2",
"label": "High School Level"
}
}
}
|
672f1e42c33a7f9846924a2431ea77df
|
-7,352,914,513,478,175,000 |
What happens if I delete a playlist on Apple Music?
A playlist on Apple Music is a customized collection of songs that you can create and organize. Playlists allow you to group songs together based on genre, mood, activity, or anything else you want. When you delete a playlist on Apple Music, the songs themselves remain in your library. Deleting a playlist only removes the playlist structure, not the music it contained. In this article, we’ll cover exactly what happens when you delete a playlist on Apple Music.
Playlist Data Remains
When a playlist is deleted on Apple Music, the playlist itself and all of its associated data are removed, including the playlist name, description, song order, and which songs were in the playlist. However, deleting a playlist does not delete or remove the songs that were contained within the playlist from your Apple Music library. The songs themselves remain safely in your library and can be added to new playlists or accessed like normal.
In essence, deleting a playlist removes the “container” of the playlist but the contents inside – the songs – stay put in your overall Apple Music collection. So you don’t have to worry about accidentally losing your songs or music when getting rid of an old playlist.
Apple Music playlists are similar to creating a folder on your computer. If you delete the folder (playlist), the files (songs) inside aren’t deleted – they remain accessible elsewhere on your device. Only the organizational structure of the folder (playlist order, name, description) is removed when deleting the playlist.
Recently Deleted Playlist
When you delete a playlist on Apple Music, it doesn’t get permanently erased right away. The playlist actually gets moved to the Recently Deleted Playlist section where it stays for 30 days before being permanently deleted [1]. This gives you a grace period to recover your playlist if you accidentally deleted it or changed your mind.
To access your Recently Deleted Playlist, open the Playlists tab in Apple Music and scroll down. You’ll see a section called Recently Deleted with your deleted playlists. Simply tap on the playlist to restore it back to your library.
Keep in mind the 30 day timer starts as soon as you delete the playlist. So if you want to recover it, be sure to check Sooner rather than later. After 30 days, the playlist will be gone for good.
Play Counts Reset
When you delete a playlist in Apple Music, the play counts for the songs in that playlist are not deleted. The songs will retain their current play count totals even though the playlist itself is gone. However, note that if you re-add the deleted songs back into a new playlist, their play counts will be reset to 0 according to users on Apple’s forums and Reddit. So deleting a playlist does not directly reset song play counts, but adding the songs into a new playlist later will cause the count to start over.
Playlists Shared With Others
When you delete a playlist you’ve previously shared with others on Apple Music, it is removed from their libraries as well. The playlist will disappear from their account, even if they had added it to their own playlists or downloaded it.
As noted on Apple’s discussion forums, “If you shared a playlist with a friend and they saved it to their device, the playlist disappears. Your library and playlists don’t change.”[1] So once you delete a shared playlist, it is no longer accessible to anyone you had previously shared it with.
The only way for others to retain the playlist is if they had made a copy of it in their own account before you deleted it. But the original shared playlist itself will be removed from all libraries when you delete it.
Recommendations Unaffected
Deleting a playlist on Apple Music does not affect the service’s recommendations for you. Apple Music’s algorithm looks at your full listening history and preferences to suggest music, not just specific playlists you may have created. As explained on Apple’s support site, “Apple Music recommends music based on what you already listen to and like, not just the artists and songs in any given playlist” (source).
So if you delete a playlist, even one with many songs or listens, it will not reset or change the personalized recommendations you see in Apple Music. Those suggestions are based on your overall taste profile and total listening behavior, not any one playlist. You can continue enjoying personalized music recommendations after deleting a playlist.
Recovering Playlists
If you accidentally delete a playlist on Apple Music, you may be able to recover it from Recently Deleted before 30 days pass. Apple Music stores deleted playlists in Recently Deleted for up to 30 days before permanently removing them.
To recover a deleted playlist on iPhone or iPad:
1. Open the Apple Music app and tap on the Library tab.
2. Scroll down and tap on Recently Deleted.
3. Find the playlist you want to recover.
4. Tap on the 3 dots next to the playlist and select Recover.
The recovered playlist will reappear in your library. This allows you to undo accidental playlist deletions within 30 days. However, once 30 days have passed, the playlist will be permanently deleted from Recently Deleted and irrecoverable according to Apple (source).
Permanently Deleting
When you delete a playlist on Apple Music, it is moved to the Recently Deleted section and remains there for 30 days before being permanently deleted. After 30 days have passed, the playlist is irrecoverable and cannot be restored.
Playlists that are in the Recently Deleted section can be recovered during the 30 day window by opening Recently Deleted and tapping on the playlist to restore it. However, once the 30 day period has elapsed, the playlist is gone for good.
So if you accidentally delete a playlist you want to keep, make sure to recover it from Recently Deleted within 30 days. Otherwise, there is no way to get back a playlist after it has been permanently deleted from Apple Music.
Creating Backups
It’s always a good idea to create backups of your Apple Music library and playlists in case you want to restore anything later. There are a few ways to do this:
On a Mac, you can use the Export Playlist feature in Music. Select a playlist, go to File > Library > Export Playlist, choose a location to save the file, and click Save. This will export the playlist as an XML file that can be imported back into Apple Music if needed. You can also back up your entire Apple Music library by finding the Music folder under Users > Your Name > Music and copying it to an external drive.[1]
On Windows, use the Export Playlist option in iTunes. Select the playlist, go to File > Library > Export Playlist, pick a save location, and click Save. To back up everything, find your iTunes media folder (usually under My Music or Music) and copy it to external storage.[2]
You can also manually copy playlist and music files to another location as a backup. Some users recommend regularly backing up the entire Music folder that contains your Apple Music library as a form of protection.[3]
Summary
Here’s a recap of the key points on what happens when you delete a playlist on Apple Music:
• The playlist itself is removed from your library, but the songs in the playlist remain in your Apple Music catalog.
• Recently deleted playlists can be recovered for up to 30 days after deletion.
• Play counts for the songs that were in the deleted playlist are reset to 0.
• Shared and public playlists are removed for everyone.
• Apple Music’s recommendations are unaffected by playlist deletion.
• You can recover playlists from a backup or by re-adding the songs.
• After 30 days, playlists are permanently deleted from Recently Deleted.
In summary, deleting a playlist removes it from view, but does not delete the songs or your Apple Music account data. You have options to recover or recreate playlists if needed.
|
{
"url": "https://darwinsdata.com/what-happens-if-i-delete-a-playlist-on-apple-music/",
"source_domain": "darwinsdata.com",
"snapshot_id": "CC-MAIN-2024-26",
"warc_metadata": {
"Content-Length": "90443",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:IXJLQ7B7YUXELKOWNPNHBBBUKOBI7MGR",
"WARC-Concurrent-To": "<urn:uuid:f9c78e9d-9705-4d6e-80fe-e180930e6ca8>",
"WARC-Date": "2024-06-17T11:34:43Z",
"WARC-IP-Address": "104.21.73.206",
"WARC-Identified-Payload-Type": "text/html",
"WARC-Payload-Digest": "sha1:FT7WVDFRZTNEDRY2FOO4C3WQKQXAOMLN",
"WARC-Record-ID": "<urn:uuid:b3058aaa-8443-4cf0-a6b7-0dc7b77a6546>",
"WARC-Target-URI": "https://darwinsdata.com/what-happens-if-i-delete-a-playlist-on-apple-music/",
"WARC-Truncated": null,
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:f5c53c02-bac5-470a-b0dd-492d72ef34b9>"
},
"warc_info": "isPartOf: CC-MAIN-2024-26\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for June 2024\r\noperator: Common Crawl Admin ([email protected])\r\nhostname: ip-10-67-67-21\r\nsoftware: Apache Nutch 1.20 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.5-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: https://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/"
}
|
{
"line_start_idx": [
0,
52,
53,
518,
519,
541,
542,
987,
988,
1257,
1258,
1582,
1583,
1609,
1610,
1946,
1947,
2181,
2182,
2379,
2380,
2398,
2399,
2912,
2913,
2942,
2943,
3182,
3183,
3477,
3478,
3697,
3698,
3725,
3726,
4139,
4140,
4489,
4490,
4511,
4512,
4748,
4749,
4798,
4799,
4857,
4903,
4947,
5011,
5012,
5281,
5282,
5303,
5304,
5536,
5537,
5777,
5778,
6005,
6006,
6023,
6024,
6185,
6186,
6609,
6610,
6886,
6887,
7105,
7106,
7114,
7115,
7207,
7208,
7328,
7410,
7490,
7548,
7619,
7690,
7766,
7767
],
"line_end_idx": [
52,
53,
518,
519,
541,
542,
987,
988,
1257,
1258,
1582,
1583,
1609,
1610,
1946,
1947,
2181,
2182,
2379,
2380,
2398,
2399,
2912,
2913,
2942,
2943,
3182,
3183,
3477,
3478,
3697,
3698,
3725,
3726,
4139,
4140,
4489,
4490,
4511,
4512,
4748,
4749,
4798,
4799,
4857,
4903,
4947,
5011,
5012,
5281,
5282,
5303,
5304,
5536,
5537,
5777,
5778,
6005,
6006,
6023,
6024,
6185,
6186,
6609,
6610,
6886,
6887,
7105,
7106,
7114,
7115,
7207,
7208,
7328,
7410,
7490,
7548,
7619,
7690,
7766,
7767,
7945
]
}
|
{
"red_pajama_v2": {
"ccnet_original_length": 7945,
"ccnet_original_nlines": 81,
"rps_doc_curly_bracket": 0,
"rps_doc_ldnoobw_words": 0,
"rps_doc_lorem_ipsum": 0,
"rps_doc_stop_word_fraction": 0.4162895977497101,
"rps_doc_ut1_blacklist": 0,
"rps_doc_frac_all_caps_words": 0.0019392400281503797,
"rps_doc_frac_lines_end_with_ellipsis": 0,
"rps_doc_frac_no_alph_words": 0.13962508738040924,
"rps_doc_frac_unique_words": 0.26523029804229736,
"rps_doc_mean_word_length": 4.731054782867432,
"rps_doc_num_sentences": 78,
"rps_doc_symbol_to_word_ratio": 0,
"rps_doc_unigram_entropy": 5.001670837402344,
"rps_doc_word_count": 1346,
"rps_doc_frac_chars_dupe_10grams": 0.014133170247077942,
"rps_doc_frac_chars_dupe_5grams": 0.14996859431266785,
"rps_doc_frac_chars_dupe_6grams": 0.0959484875202179,
"rps_doc_frac_chars_dupe_7grams": 0.05433417111635208,
"rps_doc_frac_chars_dupe_8grams": 0.03077889047563076,
"rps_doc_frac_chars_dupe_9grams": 0.025439700111746788,
"rps_doc_frac_chars_top_2gram": 0.04082914814352989,
"rps_doc_frac_chars_top_3gram": 0.02591080032289028,
"rps_doc_frac_chars_top_4gram": 0.022613070905208588,
"rps_doc_books_importance": -677.48095703125,
"rps_doc_books_importance_length_correction": -677.48095703125,
"rps_doc_openwebtext_importance": -409.9375305175781,
"rps_doc_openwebtext_importance_length_correction": -409.9375305175781,
"rps_doc_wikipedia_importance": -461.3904113769531,
"rps_doc_wikipedia_importance_length_correction": -461.3904113769531
},
"fasttext": {
"dclm": 0.15102839469909668,
"english": 0.9689013957977295,
"fineweb_edu_approx": 1.4856888055801392,
"eai_general_math": 0.04573094844818115,
"eai_open_web_math": 0.12478625774383545,
"eai_web_code": 0.075400710105896
}
}
|
{
"free_decimal_correspondence": {
"primary": {
"code": "004.67",
"labels": {
"level_1": "General works, books and libraries, information sciences",
"level_2": "",
"level_3": "Computers and Computer science"
}
},
"secondary": {
"code": "781.7",
"labels": {
"level_1": "Arts",
"level_2": "Music",
"level_3": "Music theory"
}
}
},
"bloom_cognitive_process": {
"primary": {
"code": "2",
"label": "Understand"
},
"secondary": {
"code": "3",
"label": "Apply"
}
},
"bloom_knowledge_domain": {
"primary": {
"code": "2",
"label": "Conceptual"
},
"secondary": {
"code": "3",
"label": "Procedural"
}
},
"document_type_v1": {
"primary": {
"code": "3",
"label": "Reference/Encyclopedic/Educational"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"extraction_artifacts": {
"primary": {
"code": "0",
"label": "No Artifacts"
},
"secondary": {
"code": "3",
"label": "Irrelevant Content"
}
},
"missing_content": {
"primary": {
"code": "0",
"label": "No missing content"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"document_type_v2": {
"primary": {
"code": "10",
"label": "Knowledge Article"
},
"secondary": {
"code": "21",
"label": "Customer Support"
}
},
"reasoning_depth": {
"primary": {
"code": "2",
"label": "Basic Reasoning"
},
"secondary": {
"code": "3",
"label": "Intermediate Reasoning"
}
},
"technical_correctness": {
"primary": {
"code": "4",
"label": "Highly Correct"
},
"secondary": {
"code": "3",
"label": "Mostly Correct"
}
},
"education_level": {
"primary": {
"code": "1",
"label": "General Audience"
},
"secondary": {
"code": "2",
"label": "High School Level"
}
}
}
|
672f1e42c33a7f9846924a2431ea77df
|
4,631,836,823,743,264,000 |
back to article Dog bites man: Apple's Macs trounce all Windows PCs in customer love
Once again, Apple's Macs – desktops and laptops – have outscored any and all windows PCs in a customer-satisfaction survey: the American Consumer Satisfaction Index (ACSI). "Apple maintains the strong lead it has held for a decade, inching up 1 per cent to an ACSI score of 87," the consumer-surveymeisters write in a report ( …
COMMENTS
This topic is closed for new posts.
Page:
Silver badge
Margin of error?
Sample size? Standard deviation?
But hell, I'm just being a crotchety old PC user, aren't I?
8
1
Anonymous Coward
Re: Margin of error?
I would have had a look at the report to tell you but they want registration details and I can't be bothered to invent :
Title, Department, and Company - for some reason the obligatory pieces of info apart from the usual name and email.
3
0
Anonymous Coward
PC Pro Awards in the UK 2013
Mac Book came top!
Apparently the survey size was over 200,000
1
0
Re: Margin of error?
What std. dev? It's all about satisfaction! Do you probe your std. dev while having sex. Guess no. Exactly the same approach is applied on that survey. Get it?
2
1
Re: Margin of error?
I also wonder what it would look like if we took cost into account - perhaps it's more that people are more satisfied with more expensive PCs, and people buying Apple products are more likely to be spending more. And what's it comparing anyway - Windows vs OS X, or different makes of PCs? People can run other OSs on PCs, and run Windows on Apple PCs, last time I looked.
(That and the RDF that means its users see no wrong. I love my Android phone, and would much prefer it over IOS. But does the fact that I might still give some honest criticisms of Android, whilst an IOS user claims even a dumb phone with no apps or 3G is a revolution, mean my opinion doesn't count, and IOS is better? These surveys penalise platforms where users are more honest.)
Interesting to see the comment about Apple PC sales doing no better - I've argued that if the doom and gloom about PCs dying really does happen (which I'm sceptical of - a new market growing doesn't mean another dies), Apple are just as much as risk, especially since they do best in the sector of ultra-portable laptops, and they seem to have nothing in the way of touchscreens or hybrids.
1
1
Silver badge
Re: Margin of error?
I have to agree. I remember an article a while back (on CNet?) about the author's Macbook Pro burning out two motherboards (or in Apple-ese, 'Logic Boards') within a few months, then a little farther down, after he'd bought a Toshiba or something, he said he couldn't get used to it because he missed the reliability of his Macbook.
1
0
Anonymous Coward
Re: Margin of error?
If you own a Mac you would understand. The hardware is very well made - the OS is reliable - read the independent reviews from people like Which as well - they rate the Macbook Air as the best laptop they have ever tested. Sure it's not for everyone and it's not the cheapest kit to purchase but look at TCO and how long the stuff lasts and it's probably no more or less expensive in the long run.
0
0
Re: Margin of error?
You made good points with the stats angle, but there are even other factors to consider here.
I didn't see Lenovo and they passed HP for the #1 spot in PCs last quarter. Excluding Lenovo makes sense if this is a longer standing list as Lenovo only rolled into the PC game recently. To that point, so did Apple really. Apple's marketshare has only started growing recently, so people are more likely to be happy with a 2 year old macbook than an 8 year old HP.
All of that being said, if Apple users are only 6% or 7% happier and pay twice as much, that is a pretty damning statement against Apple, not something to boast about.
0
0
Anonymous Coward
Apple owners see no faults with Apple gear
Bears, woods
Pope, Catholic
Yawn
17
4
Anonymous Coward
I use a Macbook Pro, a RiscPC and a couple of HP laptops with Win7Pro. I hardly ever have any problems with the Mac, RISC OS has by far the nicest GUI and the PCs I only use because that's what the software we use runs on. Moreover other people use the PCs and I have to sort out the problems. I'd certainly concur with these findings.
5
4
Anonymous Coward
There are plenty of other empirical surveys that suggest that Apple Mac hardware is amongst the most reliable (on a par with a couple of Windows PC manufacturers).
There are plenty of things about Windows and Linux DEs that irritate the hell out of me, just as with OSX. But hell, Windows XP required the novice user to install 3rd party software to make an image backup, OSX didn't. Win 7 requires the user to disable Window Security Essentials (?!) before making a successful image backup. It's the little things.
4
4
Silver badge
Selective perception
I remember an Apple user who told me how stable and reliable his Mac was, and while preaching to me his machine crashed twice. Either he got hit by Murphy's Law in the most Alanis Morrissette-ironic way possible, or his Mac wasn't anywhere near as stable and reliable as he was convinced it was.
6
4
Bronze badge
I've been a mac house for 5 years now (previously anti-mac).
I bought a cheap asus x401 a month ago from ebuyer (insanely cheap) to run my webcam security cameras on 24/7 as it'd let me save power and let the main osx server and raid array sleep during the week when I am away on business.
It had windows 8 on it. It was utterly hellish, plus of course it had to usually bloadware crap on it.
No probs I thought - I'll just fire my old copy of windows 7 on there - given it me free for 'hosting a windows 7 party' before I left the windows arena.....
holly christ - what a bloody palaver!!!!
boot of USB DVD ? will it f*ck.
fecking about with their terrible implementation of EFI... looking on the net, changing bios settings, trying again... net full of people with similar tales.. I mean how can you make something so hard that has been mainstream easy for nearly 15 years!!! Just let me boot of the f*cking DVD for christsake!!!
Eventually after probably 10+ manhours I got it done - only possible by switching EFI off.
utter utter mince - if I'd known I'd have bought a 400 quid 5 year old macbook and used that - I'd have been able to stick windows 7 on that in 30 minutes.
stu
6
2
I'm an Apple owner ... and to be honest the laptop keyboards aren't as robust as they used to be. I've had this one for less than three years and the mylar is already wearing off a couple of keys.
1
1
Silver badge
@chevron how can Mylar be wearing off when the key character graphic is plastic moulded in situ all the way through the key so the backlight can light it from behind ? If you have a non backlit MacBook Air surely it must surely be older than three years old, no ?
1
1
This post has been deleted by a moderator
I have a Clevo laptop and Samsung laptop with Windows 8 and 7, and they both work fine, and never have any problems. I'd only use an Apple PC if I had to. Moreover, I see other people having problems with Apple PCs. That's my anecdotal evidence.
1
0
Anonymous Coward
Standard story - owner of expensive Apple products buys "insanely cheap" PC and then proceeds to bitch and moan about how bad it is.
0
0
Anonymous Coward
Hmmm...
The thing is, Apple users have a pseudo religious / sexual attachment to their Macs so saying they are not happy is blasphemy / infidelity, besides after spending all THAT kinda money, who wants to admit that they bought a turd and when was the last time they used a Windows PC (objectively) to COMPARE?
12
20
Re: Hmmm...
"besides after spending all THAT kinda money, who wants to admit that they bought a turd"
Couldn't agree more. Having had to service some of these Macbooks, I have been shocked and disgusted to find Toshiba brand hard drives inside. I mean SERIOUSLY??? Making someone spend all that money on overpriced aluminum crap and then you throw a junkard drive like that into it? Come on Apple...at LEAST a WD Blue or Seagate drive here.....
3
9
Silver badge
Re: Hmmm...
>who wants to admit that they bought a turd
There are plenty of other empirical surveys that suggest that Apple Mac hardware is amongst the most reliable (on a par with a couple of Windows PC manufacturers).
"Show me [your] body [of evidence]."
4
2
Anonymous Coward
Re: Hmmm...
"Couldn't agree more. Having had to service some of these Macbooks, I have been shocked and disgusted to find Toshiba brand hard drives inside. I mean SERIOUSLY??? Making someone spend all that money on overpriced aluminum crap and then you throw a junkard drive like that into it? Come on Apple...at LEAST a WD Blue or Seagate drive here....."
And what makes you think Toshiba drives are junk?
Let me remind you that Apple recently had to recall millions of iMacs to replace their defective Seagate drives.
A quick Google found this article on Tom's hardware:
http://www.tomshardware.com/reviews/hdd-reliability-storelab,2681-2.html
Looks like Toshiba/Fujitsu drives are pretty reliable. I haven't had a problem with any of the ones I've owned.
8
0
Re: Hmmm...
I tried Mac a few years ago and hated it. Windows 8 forced me to go looking for alternatives and (after a 3 months stint on Linux) I bought another Mac. I can't speak for the hardware reliability after only having it a week but once you grok mission control, gestures and some keyboard shortcuts, the productivity of OS X desktop is second to none.
5
2
Anonymous Coward
Re: Hmmm...
They did put Seagate drives in there - and then had to take them all out again as the heads came off and destroyed the platters.
I've replaced a few myself..
1
1
Silver badge
Re: Hmmm...
Beleive it or not there are those of us who are paid to develop on Windows but prefer the Mac if we're spending our own money. We're not talking about cheap and nasty PC's either, my work PC is a twin Xeon workstation with a 30" Dell screen.
7
1
Anonymous Coward
Re: Hmmm...
@Steve Todd and there are a few of us, who not only prefer the Mac but have an unashamed emotional loathing of PC's. I personally readily admit I a mo longer prepared to spend any time trying out Windows. I simply don't care what improvements MS Have made. So no my opinion is no longer scientific on this matter. Windows 8 may be massively improved. I don't give a shit. At the time I switched to Mac, it really was like I was parched, in a burning Hell and Apple turned up gave me a cool glass of water and lifted me out to a cool meadow where life is productive and good. Asking me to use Windows now is like asking me to make friends with a man who has raped my daughter.
3
3
Re: Hmmm...
I'm honestly curious - what did you hate about Windows 8 so much, that you switched OS? The differences between 7 and 8 are far smaller than the differences between either and OS X. Moreover, OS X involves launching apps via clicking on big icons, and not AFAIK via a hierarchical menu.
The start menu can be put back to Windows 7 with a simple free utility (something that's you can't do for OS X). The full screen tablet-style apps can be ignored if you don't want them. Applications from Windows 7 and before continue to work in the same way - I found the transition far smaller than between XP and 7.
I'm sure that OS X is okay, but it's also okay with Windows too - comparing is just opinion.
0
0
Re: Hmmm...
Believe it or not, there's a difference between personal preference, and objective fact. That people have different opinions is well known. But that doesn't make it fact, or media news, as this article tries to do.
0
1
Silver badge
Stop
Re: Hmmm...
Since the OP asked "when was the last time they used a Windows PC (objectively) to compare" then I gave a perfectly valid answer. I use Windows PCs, of high quality and from an objective viewpoint, on a daily basis. Having made an objective comparison then I prefer the Mac option. There is always going to be a subjective component based on what you use the device for, but for my set of use cases the Mac works better and requires less maintenance.
0
0
Anonymous Coward
Re: Hmmm...
@Mark
It wasn't Windows 8 I was using when I switched but the dreaded Windows Vista. Also for some time after switching I was supporting my girlfriends 3 PC office with MS Small Business server. Horrible, horrible horrible.
There were two severe bugs that did it for me with Microsoft. The first we the bug they had in Outlook for 2 versions, where if your outlook database grew bigger than 2 gigabytes it would silently corrupt and if you didn't realise the corruption had occurred (which most wouldn't because it would only be apparent when you needed to search through old emails), then the corruption would end up backed up all the way through your backup sets. These two facts in conduction simply do not compute. No software company should ever allow a bug like that out the door, it can do damage that is extremely prejudicial to be business. For it to survive two major release numbers simply fuses my brain. This caused me a lot of admin/recovery time regarding my Girlfriends office set up.
The second issue was that for several major version of Word, if you edit references at the same time as have the document map pane open for navigating a long document, with 2 hours your document will almost certainly be corrupt. Most usually irretrievably (MS have about 8 different complex procedure for de-corrupting Word documents. 50/50 if this bug is encountered, none will work).
This was certainly the case for all the versions of Word I used on the PC up to when I switched. It is still the case for the latest office for Mac, which uses the same core engine as Office on the PC. Again the corruption can be silent. Perfectly competent users can have a long document representing thousands of hours work and end up with a corrupt document backed up all the way through their backup sets. This one caused me an incredible amount of pain and essentially was responsible for destroying a bid for business for my startup when our bid document was corrupted and the first half of the document became inaccessible and failed to print. The problem was the basis of the document has been corrupted many months earlier, without our knowledge. Of course we may not have won the bid anyway, but it was crucial for my startup and ultimately we failed due to not getting the main client we had put so much effort into "romancing"
When I did some research and discovered this bug was almost certainly responsible and has been in Word for many major versions, and when it became clear MS has known about it (it was an open bug for years) and shipped while allowing these incompatible features to be used together, I was, as you can imagine, quite angry. So yes I have very good reason for my visceral hatred of MS incompetence. They knowingly shipped a broken product with a bug that is about as severe as its possible to get (near certain silent document corruption) and may well, given the millions of users of Word, be responsible for people having committed suicide who have lost examination dissertations, business bid documents, reports etc. at inopportune times.
0
0
Silver badge
Angel
Probably
... because even with the overpriced hardware it does seem to fare quite better than some of the worst PC-side manufacturers (I'm looking at you, Acer!) and it's possible some of the user dissatisfaction has to do with Windows 8.
That said, Macs do have some issues, like my Poltergeist trackpad that every now and then gets possessed and starts jumping the pointer everywhere. A couple of hours of using an external mouse seems to bring it back to normal, though.
0
0
Mavericks will not spike the Mac Uptake, because...
There is no question that the Apple hardware is nice, the MacBook Pro and Air are really nice machines, and at couple of the companies I have worked with recently I have noticed a massive uptake in Apple laptops, mainly the Air because of its size, weight and battery life. Strangely, when you walk round the other side of desk and see the screen 90%+ have ditched OSX and have put Win7 on, not IT enforced, but by personal choice because they find it easier to work with.
I have also tried to move to OSX for work but also found it nowhere near as productive (and, yes - I did try it for 3 weeks to get over the learning curve), having said that, I did by a mac air for home use and in that scenario find it great for web/email/music/dvd/photos etc
It would be interesting to know how many of the Apple laptops sold are still actually using OSX.
2
3
Anonymous Coward
Re: Mavericks will not spike the Mac Uptake, because...
Depends on what your work is... for CAD, it'll be probably Win7, for anything audio related OSX wins (unless you favour some ultra-low latency build of Linux).
2
0
Silver badge
Re: Mavericks will not spike the Mac Uptake, because...
Yup, horses for courses in the OS stakes. I use OS X on a 2008 Macbook (non pro, but unibody) with 8gb RAM and an SSD - OS X on that is perfectly adequate for fairly heavy multitasking and general jiggery pokery.
I do find myself booting into Linux every so often though, for things that just aren't as well supported on the OS X side - I prefer the way the terminal is handled in Ubuntu for a start (I hate the confusion I get from going to CMD+letter to CTRL+Letter in OS X - booting into Linux you don't have that stark change, you expect to use CTRL in that environment) and it tends to handle large memory loads better. Also, I find LibreOffice behaves better under Linux than OS X. So if I need to do any serious documentation, it's ALT-boot time. I also just generally have a preference for Ubuntu as it's my main home OS as well. I have a Windows VM that I use for the occasional Windows stuff I have to do.
Can't complain about the hardware though - the laptop lives in a neoprene slip cover thingy (you know the type), often in the passenger footwell of my car when I'm out and about, and quite often I forget about it and start turning up the speed/wheelmanship/vroom vroom noises a bit.
It's seen more of the floor of my car than I have, and other than a dent in the back of the screen caused by it falling off the seat onto a wheel brace under hard braking (I had to put the spare on, did a brake test on the backroad I was on to make sure it was secure before heading to the main roads....), it's pretty much clean as a whistle for a five year old machine. And I could probably sell it in this spec for more than the cost of the motherboard it needed to rescue it from the scrapheap.
I just wouldn't even comprehend putting a £1000 windows laptop through that - at all. Macbook? No fecking problem.
I can't help thinking when it needs replacing - not for a while with any luck - it'll probably be another midrange, fixer-upper Macbook that'll be getting looked for. This one has served me extremely well.
Steven R
0
0
Satisfied users are satisfied
I'm not in the slightest big surprised that Apple has the lead. Their laptops are superior. Period. And please, spare me the whole "stupid sheeple fanboi" garbage. I meansure my MBP uptime in *months*. The only time I have to reboot is when the rare critical update comes through that requires it, or a 3rd party app inexplicably requires it. I don't worry about it mysteriously slowing down. I have to do sysadmin and other misc computer work all day. I don't have the time, inclination, or patience to also work on my *own* gear. I want it to work so I can get my own stuff done.
My mom used to call me on more than a weekly basis because the PC kept doing wierd things, slowing down, breaking in some way ,etc. I bought her a used iMac, and now when she calls me it's because she wants to know how to do something. Not one... single...problem... in two years now.
I'm now trying to get my Dad to ditch his Acer because I'm sick of having to spend on avg an hour a week trying to figure out why it's breaking yet again.
I'm (not) sorry, but the track record speaks for itself.
18
6
Anonymous Coward
Re: Satisfied users are satisfied
It's use-cases like your that make Chromebooks seem tempting... for those of use with families and are sick of receiving phone calls "It's shown me a message about cookies, I don't know what to do..."
2
0
Re: Satisfied users are satisfied
This is exactly my experience too. I use and support PCs at work, but all my home systems are Apple (2 iMacs and a Macbook Pro). The only issue I've had with any of them is a failed hard drive, and time machine backups made that simple to recover.
OSX is a lot less forgiving of hard drive issues than Windows is. A bad external drive will halt OSX, preventing recovery of the data. With Windows you can usually recover stuff from a failing drive as long as you avoid writing to the drive.
2
0
Gimp
Re: Satisfied users are satisfied
@Rick Damiani
[OSX is a lot less forgiving of hard drive issues than Windows is. A bad external drive will halt OSX, preventing recovery of the data. With Windows you can usually recover stuff from a failing drive as long as you avoid writing to the drive.]
Rick try SystemRescueCD www.sysresccd.org - The ISO will boot from a Mac optical drive (I haven't tried the USB bootable version), you then have all of the Linuxy goodness stuff to mount the drive as read only, and then cp or rsync the drive's files to the internal drive...
1
0
Facepalm
Re: Satisfied users are satisfied
Sorry in my previous post (Senility strikes) I should also have mentioned that you can start the Mac in single user mode (Command-S). Then connect the external drive. You can then run UNIX (BSD-ish) stuff from the command prompt like: -
ls –l /dev/disk* (or Apple's diskutil list )
and:
mount -r –t hfs /dev/disk1s2 /drive2
then rsysnc or cp whatever...
2
0
You're criticising Microsoft for AVG?
It's comments that these that demonstrate the real reason for these surveys - one set of users blindly argue that their personal experience must be fact, whilst most other users just don't care.
I could just as well say my Clevo is better than anything else. Period.
I don't leave my laptop on all the time, but I have never had a crash with Windows 7 or 8. XP only died from graphics card crashes - and I've seen those take out modern OS X. I've seen modern Macs crash from failing to recover from sleep - last time Windows did that was with 98. Not that I'm blindly saying therefore one is better - I'm pointing out that experiences vary.
I don't worry about it mysteriously slowing down. I don't have to do sysadmin or work on it (as it happens, the only time I have had to struggle is if I've had to use itunes). My parents only call me for Internet related issues, which would apply on any OS.
And AVG? Windows 8 has anti-virus built in, and I don't even notice. For Windows 7 or earlier, my advice is to install Microsoft Security Essentials. AVG was horrible the way it constantly pestered me, MS SE just works in the background. It's absurd to use AVG in an argument for Windows vs OS X - that might have applied 10 years ago, but not when MS have their own anti-virus that works much better. You might as well install some horrible unnecessary 3rd party anti-virus on a Mac too, and complain...
1
0
Re: You're criticising Microsoft for AVG?
No, he wasn't - he wrote it in lower case as an abbreviation for 'average'. I thought he meant AVG as well, until I re-read it. I still think he's wrong though! I don't know what's up with these people, my XP/Vista/7/8 PCs (Dell/HP) have gone on reliably for years, used every day, no problems at all. Lucky I guess.
0
0
Parochial
Perhaps the article's title should have mentioned that it's what Americans - and only Americans - think.
3
0
Bronze badge
Joke
Re: Parochial
The title should have been "Americans think". I mean, who knew?
1
0
Bronze badge
rounding error
To me 7 points is a rounding error, 15 points isn't much better. Really I expected more like a 25 point margin. But the folks I have worked with for the past few years have been pretty die hard mac fans(even though the software they work on runs on Linux) so I suppose the info I have is heavily biased.
Quite surprised that all major vendors are bunched so close together - only 11% between the top and bottom?
Also SORT of strange that Lenovo is not mentioned by name as they are the biggest/near biggest PC maker.
4
0
Silver badge
Stop
Re: rounding error
You really need to learn about statistics and sample sizes. The accuracy of the numbers depends on the number of people they ask compared to the total numbers sold. I doubt in this case that the margin of error is more than a percentage point or two.
As for Lenovo, I suspect they don't have a big presence in the consumer space that this survey was interested in. For business use they sell truck loads.
1
1
How about...?
It's fascinating looking at the mental contortions some of the above commenters are tying themselves in. A quick run through gives us that this survey result is due to: statistical error, Windows 8, some weird self-justification process from spending a lot of money, a sexual attraction to an inanimate object, blind religious devotion and this all being down to Americans being stupid, to name a few.
I might have an alternate explanation here. Now bare with me here while I spout forth with crazy talk. Are you ready? Maybe this survey result is a result of, y'know... Macs being quite good.
8
4
Re: How about...?
It's fascinating the mental contortions people go to to prove their buying justifications, including doing and promoting surveys, and then posting comments about their anecdotes.
I have an alternative explanation. Perhaps my good experience with my machines is that they are, you know, good. That other users claim more loudly their machines are better doesn't make mine not as good.
0
0
My Macbook experience, and observations of those around me.
I was given a macbook pro for free at my university...and hated it. I mean well and truly hated it. I ended up giving it away, and going back to my 4 year old mid-range Toshiba laptop that spent a year with me in Iraq. It wasn't particularly good, but substantially better than the top end Macbook Pro I was given.
Things I noticed just on the first day:
They had a pretty high failure rate. Out of the nearly 100 people that day given laptops, about 10 failed during first boot and had to be traded in for new ones. Another 10 had issues connecting to the wired LAN. ( I believe that could have been fixed, but they just went ahead and traded in those too, probably to prevent everyone else having to wait on them. )
Overheating is a massive issue. The only air vent is the hinge ( WTF? ), which means if the screen is at anything other than a rather awkward angle, it gets quite warm. Add anything else that might warm it up a bit, and it'll overheat, completely shutting down the laptop. Fantastic.
The trackpad is pretty low quality. It has frequent issues with detecting movement. It sort of acts like a thermal trackpad and the heat from components underneath is interfering with it, but I can't imagine they were that stupid with it, so something else has to be causing it.
To click the mouse, you have to push the entire trackpad down. ( well, without lifting off and doing a touch, which will move the mouse quite a lot. ) This is one of the stupidest things I have ever seen on any laptop, right below the air vent hinge thing of course...which is also on the same laptop. Really, it is extremely difficult to click that thing, and not have the mouse move. Plus, it's quite stiff and hard to push, which gets annoying quickly. There's also no reason for it whatsoever. There is plenty of room around it for a couple regular buttons.
The front edge of the laptop lacks any bevel or chamfer, and can cut into the wrist. I personally ended up taking a knife and cutting down that edge. ( Remember, aluminum is NOT some super high-quality material like you hear so often these days. Especially since they use lower grade aluminum. Probably 50-54 or something similar. )
Programs crashed more on Mac than on PC. I noticed this the first day, and had it confirmed constantly in the classes. Some of the classrooms were Mac, others were PC. We used the same programs on both, and every single person in class saved about twice as often on the Macs because they were so much more likely to crash out.
The CD drive is not properly reinforced. It frequently bends and ends up scraping the disc inside.
There is no eject button, or manual eject for the CD drive. This was a bit of a nuisance at times, but became a real problem when I installed windows 7 onto the laptop. At one point, I had a disc in there and had to reboot...except I didn't know I had to have the disc out when I did that. I spent about an hour digging that stupid thing out while trying not to permanently damage anything.
Dual video chipset, but not really. Some genius somewhere decided it was worth having 2 video chipsets, but instead of making them the same to get the performance boost when you want of SLI, they made them 2 different chipsets. The idea being 1 for power tasks, and 1 for saving power. Just to change it though, you had to boot up, select to change, then reboot. Why not just have them the same card, and let me enable and disable them at will. Add in a simple underclocker and voila, power saving. This is what I would do on PC anyways. This would also mean you can have 1 fail on you ( which happens. ), and still get most of the use out of the laptop.
All of this was from the first day with the laptop. I used it for a full year, at which point I no longer needed the laptop for classes and promptly went back to my old Toshiba. Eventually I put Windows 7 on the laptop and passed it off to my mom:) Granted, I don't use any laptop at all any more. I have a custom built desktop PC, and a Galaxy S3. Anything serious I do on the desktop, and the S3 covers portability.
3
8
Bronze badge
Re: My Macbook experience, and observations of those around me.
My experience (MacBook Pro) is completely the opposite.
a pretty high failure rate
I have a lower sample size of 2, but none have ever failed.
Overheating is a massive issue
Not with my MacBook Pro, it isn't. It's a rare day when the fan turns on.
The trackpad is pretty low quality
Mine is excellent quality. I've never ever seen the cursor out of place.
To click the mouse, you have to push the entire trackpad down
Not on mine, you don't. In any case, it's quite rare that I need to click it - you can easily configure the trackpad to use soft taps and gestures, like using an iPad.
The front edge of the laptop lacks any bevel or chamfer
Mine does. I'd never even given it a moment's thought until you raised it.
Programs crashed more on Mac than on PC
In 18 months' use, I can count the number of program crashes on one hand.
The CD drive is not properly reinforced
Modern MacBooks don't have a CD drive. Yesterday's technology.
There is no eject button, or manual eject for the CD drive
Ditto.
Dual video chipset, but not really
Is this an issue on my MacBook? No
I use a PC at work all day long. But I take my MacBook in with me as we'll, because its so much nicer to use.
5
5
Silver badge
Re: My Macbook experience, and observations of those around me.
One has to wonder about the voracity of your post given a number of the errors above.
The Pro is an all aluminium device, with an internal slot loading DVD drive. You couldn't bend the drive if you tried. The eject button is on the keyboard, at the top right. The trackpad is all glass, capitative and configurable to accept light taps as clicks rather than full presses. It's generally regarded as the best trackpad on the market, the gold standard to which PCs aspire. There is only actually 1 video chipset, the other is Intel's integrated version (i.e. crap). The OS switches between the two transparently depending on load, no need to bother about manual tweaks, reboots etc. There are many PC laptops that tried the same trick, mostly with far less success.
6
1
Page:
This topic is closed for new posts.
Forums
|
{
"url": "http://forums.theregister.co.uk/forum/1/2013/09/17/apple_tops_all_windows_pc_in_customer_satisfaction/",
"source_domain": "forums.theregister.co.uk",
"snapshot_id": "crawl=CC-MAIN-2015-22",
"warc_metadata": {
"Content-Length": "155153",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:L2JXHCYPARJ6G4AJNDXO4JNVTJPTUYDN",
"WARC-Concurrent-To": "<urn:uuid:3f046251-5101-46e9-941d-3a3bdd8dbb1c>",
"WARC-Date": "2015-05-23T01:58:19Z",
"WARC-IP-Address": "50.57.15.204",
"WARC-Identified-Payload-Type": null,
"WARC-Payload-Digest": "sha1:7APWGPMEODGVNU2QFVAPQDQZGA2FQW5X",
"WARC-Record-ID": "<urn:uuid:67f3f0e1-199e-4147-ada8-64b51a685764>",
"WARC-Target-URI": "http://forums.theregister.co.uk/forum/1/2013/09/17/apple_tops_all_windows_pc_in_customer_satisfaction/",
"WARC-Truncated": null,
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:bb90d428-e3a9-4f07-a160-36bbc4fabced>"
},
"warc_info": "robots: classic\r\nhostname: ip-10-180-206-219.ec2.internal\r\nsoftware: Nutch 1.6 (CC)/CC WarcExport 1.0\r\nisPartOf: CC-MAIN-2015-22\r\noperator: CommonCrawl Admin\r\ndescription: Wide crawl of the web for May 2015\r\npublisher: CommonCrawl\r\nformat: WARC File Format 1.0\r\nconformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf"
}
|
{
"line_start_idx": [
0,
85,
86,
415,
416,
425,
426,
462,
463,
469,
470,
483,
484,
501,
502,
535,
536,
596,
597,
599,
601,
618,
619,
640,
641,
762,
763,
879,
880,
882,
884,
901,
902,
931,
932,
951,
952,
996,
997,
999,
1001,
1002,
1023,
1024,
1184,
1185,
1187,
1189,
1190,
1211,
1212,
1585,
1586,
1969,
1970,
2361,
2362,
2364,
2366,
2379,
2380,
2401,
2402,
2735,
2736,
2738,
2740,
2757,
2758,
2779,
2780,
3178,
3179,
3181,
3183,
3184,
3205,
3206,
3300,
3301,
3667,
3668,
3836,
3837,
3839,
3841,
3858,
3859,
3902,
3903,
3916,
3917,
3932,
3933,
3938,
3939,
3942,
3944,
3961,
3962,
4298,
4299,
4301,
4303,
4320,
4321,
4485,
4486,
4838,
4839,
4841,
4843,
4856,
4857,
4878,
4879,
5175,
5176,
5178,
5180,
5193,
5194,
5255,
5256,
5485,
5486,
5589,
5590,
5748,
5749,
5790,
5791,
5823,
5824,
6132,
6133,
6224,
6225,
6381,
6382,
6386,
6387,
6389,
6391,
6392,
6589,
6590,
6592,
6594,
6607,
6608,
6872,
6873,
6875,
6877,
6878,
6920,
6921,
7167,
7168,
7170,
7172,
7189,
7190,
7323,
7324,
7326,
7328,
7345,
7346,
7354,
7355,
7659,
7660,
7663,
7666,
7667,
7679,
7680,
7770,
7771,
8114,
8115,
8117,
8119,
8132,
8133,
8145,
8146,
8190,
8191,
8355,
8356,
8393,
8394,
8396,
8398,
8415,
8416,
8428,
8429,
8774,
8775,
8825,
8826,
8939,
8940,
8993,
8994,
9067,
9068,
9180,
9181,
9183,
9185,
9186,
9198,
9199,
9548,
9549,
9551,
9553,
9570,
9571,
9583,
9584,
9713,
9714,
9743,
9744,
9746,
9748,
9761,
9762,
9774,
9775,
10017,
10018,
10020,
10022,
10039,
10040,
10052,
10053,
10729,
10730,
10732,
10734,
10735,
10747,
10748,
11035,
11036,
11354,
11355,
11448,
11449,
11451,
11453,
11454,
11466,
11467,
11682,
11683,
11685,
11687,
11700,
11705,
11706,
11718,
11719,
12170,
12171,
12173,
12175,
12192,
12193,
12205,
12206,
12212,
12213,
12431,
12432,
13209,
13210,
13596,
13597,
14536,
14537,
15275,
15276,
15278,
15280,
15293,
15299,
15300,
15309,
15310,
15540,
15541,
15776,
15777,
15779,
15781,
15782,
15834,
15835,
16308,
16309,
16586,
16587,
16684,
16685,
16687,
16689,
16706,
16707,
16763,
16764,
16924,
16925,
16927,
16929,
16942,
16943,
16999,
17000,
17213,
17214,
17917,
17918,
18201,
18202,
18701,
18702,
18817,
18818,
19024,
19025,
19034,
19035,
19037,
19039,
19040,
19070,
19071,
19653,
19654,
19939,
19940,
20095,
20096,
20153,
20154,
20157,
20159,
20176,
20177,
20211,
20212,
20413,
20414,
20416,
20418,
20419,
20453,
20454,
20702,
20703,
20945,
20946,
20948,
20950,
20955,
20956,
20990,
20991,
21005,
21006,
21250,
21251,
21526,
21527,
21529,
21531,
21540,
21541,
21575,
21576,
21813,
21814,
21859,
21860,
21865,
21866,
21903,
21904,
21934,
21935,
21937,
21939,
21940,
21978,
21979,
22174,
22175,
22247,
22248,
22622,
22623,
22881,
22882,
23387,
23388,
23390,
23392,
23393,
23435,
23436,
23753,
23754,
23756,
23758,
23759,
23769,
23770,
23875,
23876,
23878,
23880,
23893,
23898,
23899,
23913,
23914,
23978,
23979,
23981,
23983,
23996,
23997,
24012,
24013,
24317,
24318,
24426,
24427,
24532,
24533,
24535,
24537,
24550,
24555,
24556,
24575,
24576,
24827,
24828,
24982,
24983,
24985,
24987,
24988,
25002,
25003,
25405,
25406,
25598,
25599,
25601,
25603,
25604,
25622,
25623,
25802,
25803,
26008,
26009,
26011,
26013,
26014,
26074,
26075,
26390,
26391,
26431,
26432,
26795,
26796,
27080,
27081,
27360,
27361,
27923,
27924,
28257,
28258,
28585,
28586,
28685,
28686,
29077,
29078,
29733,
29734,
30152,
30153,
30155,
30157,
30170,
30171,
30235,
30236,
30292,
30293,
30320,
30321,
30381,
30382,
30413,
30414,
30488,
30489,
30524,
30525,
30598,
30599,
30661,
30662,
30830,
30831,
30887,
30888,
30963,
30964,
31004,
31005,
31079,
31080,
31120,
31121,
31184,
31185,
31244,
31245,
31252,
31253,
31288,
31289,
31324,
31325,
31435,
31436,
31438,
31440,
31453,
31454,
31518,
31519,
31605,
31606,
32284,
32285,
32287,
32289,
32290,
32296,
32297,
32333,
32334
],
"line_end_idx": [
85,
86,
415,
416,
425,
426,
462,
463,
469,
470,
483,
484,
501,
502,
535,
536,
596,
597,
599,
601,
618,
619,
640,
641,
762,
763,
879,
880,
882,
884,
901,
902,
931,
932,
951,
952,
996,
997,
999,
1001,
1002,
1023,
1024,
1184,
1185,
1187,
1189,
1190,
1211,
1212,
1585,
1586,
1969,
1970,
2361,
2362,
2364,
2366,
2379,
2380,
2401,
2402,
2735,
2736,
2738,
2740,
2757,
2758,
2779,
2780,
3178,
3179,
3181,
3183,
3184,
3205,
3206,
3300,
3301,
3667,
3668,
3836,
3837,
3839,
3841,
3858,
3859,
3902,
3903,
3916,
3917,
3932,
3933,
3938,
3939,
3942,
3944,
3961,
3962,
4298,
4299,
4301,
4303,
4320,
4321,
4485,
4486,
4838,
4839,
4841,
4843,
4856,
4857,
4878,
4879,
5175,
5176,
5178,
5180,
5193,
5194,
5255,
5256,
5485,
5486,
5589,
5590,
5748,
5749,
5790,
5791,
5823,
5824,
6132,
6133,
6224,
6225,
6381,
6382,
6386,
6387,
6389,
6391,
6392,
6589,
6590,
6592,
6594,
6607,
6608,
6872,
6873,
6875,
6877,
6878,
6920,
6921,
7167,
7168,
7170,
7172,
7189,
7190,
7323,
7324,
7326,
7328,
7345,
7346,
7354,
7355,
7659,
7660,
7663,
7666,
7667,
7679,
7680,
7770,
7771,
8114,
8115,
8117,
8119,
8132,
8133,
8145,
8146,
8190,
8191,
8355,
8356,
8393,
8394,
8396,
8398,
8415,
8416,
8428,
8429,
8774,
8775,
8825,
8826,
8939,
8940,
8993,
8994,
9067,
9068,
9180,
9181,
9183,
9185,
9186,
9198,
9199,
9548,
9549,
9551,
9553,
9570,
9571,
9583,
9584,
9713,
9714,
9743,
9744,
9746,
9748,
9761,
9762,
9774,
9775,
10017,
10018,
10020,
10022,
10039,
10040,
10052,
10053,
10729,
10730,
10732,
10734,
10735,
10747,
10748,
11035,
11036,
11354,
11355,
11448,
11449,
11451,
11453,
11454,
11466,
11467,
11682,
11683,
11685,
11687,
11700,
11705,
11706,
11718,
11719,
12170,
12171,
12173,
12175,
12192,
12193,
12205,
12206,
12212,
12213,
12431,
12432,
13209,
13210,
13596,
13597,
14536,
14537,
15275,
15276,
15278,
15280,
15293,
15299,
15300,
15309,
15310,
15540,
15541,
15776,
15777,
15779,
15781,
15782,
15834,
15835,
16308,
16309,
16586,
16587,
16684,
16685,
16687,
16689,
16706,
16707,
16763,
16764,
16924,
16925,
16927,
16929,
16942,
16943,
16999,
17000,
17213,
17214,
17917,
17918,
18201,
18202,
18701,
18702,
18817,
18818,
19024,
19025,
19034,
19035,
19037,
19039,
19040,
19070,
19071,
19653,
19654,
19939,
19940,
20095,
20096,
20153,
20154,
20157,
20159,
20176,
20177,
20211,
20212,
20413,
20414,
20416,
20418,
20419,
20453,
20454,
20702,
20703,
20945,
20946,
20948,
20950,
20955,
20956,
20990,
20991,
21005,
21006,
21250,
21251,
21526,
21527,
21529,
21531,
21540,
21541,
21575,
21576,
21813,
21814,
21859,
21860,
21865,
21866,
21903,
21904,
21934,
21935,
21937,
21939,
21940,
21978,
21979,
22174,
22175,
22247,
22248,
22622,
22623,
22881,
22882,
23387,
23388,
23390,
23392,
23393,
23435,
23436,
23753,
23754,
23756,
23758,
23759,
23769,
23770,
23875,
23876,
23878,
23880,
23893,
23898,
23899,
23913,
23914,
23978,
23979,
23981,
23983,
23996,
23997,
24012,
24013,
24317,
24318,
24426,
24427,
24532,
24533,
24535,
24537,
24550,
24555,
24556,
24575,
24576,
24827,
24828,
24982,
24983,
24985,
24987,
24988,
25002,
25003,
25405,
25406,
25598,
25599,
25601,
25603,
25604,
25622,
25623,
25802,
25803,
26008,
26009,
26011,
26013,
26014,
26074,
26075,
26390,
26391,
26431,
26432,
26795,
26796,
27080,
27081,
27360,
27361,
27923,
27924,
28257,
28258,
28585,
28586,
28685,
28686,
29077,
29078,
29733,
29734,
30152,
30153,
30155,
30157,
30170,
30171,
30235,
30236,
30292,
30293,
30320,
30321,
30381,
30382,
30413,
30414,
30488,
30489,
30524,
30525,
30598,
30599,
30661,
30662,
30830,
30831,
30887,
30888,
30963,
30964,
31004,
31005,
31079,
31080,
31120,
31121,
31184,
31185,
31244,
31245,
31252,
31253,
31288,
31289,
31324,
31325,
31435,
31436,
31438,
31440,
31453,
31454,
31518,
31519,
31605,
31606,
32284,
32285,
32287,
32289,
32290,
32296,
32297,
32333,
32334,
32340
]
}
|
{
"red_pajama_v2": {
"ccnet_original_length": 32340,
"ccnet_original_nlines": 569,
"rps_doc_curly_bracket": 0,
"rps_doc_ldnoobw_words": 5,
"rps_doc_lorem_ipsum": 0,
"rps_doc_stop_word_fraction": 0.4379613995552063,
"rps_doc_ut1_blacklist": 0,
"rps_doc_frac_all_caps_words": 0.04514480009675026,
"rps_doc_frac_lines_end_with_ellipsis": 0.03684211149811745,
"rps_doc_frac_no_alph_words": 0.16226576268672943,
"rps_doc_frac_unique_words": 0.2528911530971527,
"rps_doc_mean_word_length": 4.261394500732422,
"rps_doc_num_sentences": 365,
"rps_doc_symbol_to_word_ratio": 0.005962519906461239,
"rps_doc_unigram_entropy": 6.179315090179443,
"rps_doc_word_count": 5880,
"rps_doc_frac_chars_dupe_10grams": 0.07319311797618866,
"rps_doc_frac_chars_dupe_5grams": 0.11988665908575058,
"rps_doc_frac_chars_dupe_6grams": 0.10100969672203064,
"rps_doc_frac_chars_dupe_7grams": 0.09214989840984344,
"rps_doc_frac_chars_dupe_8grams": 0.0872810035943985,
"rps_doc_frac_chars_dupe_9grams": 0.08313045650720596,
"rps_doc_frac_chars_top_2gram": 0.0047890800051391125,
"rps_doc_frac_chars_top_3gram": 0.004150540102273226,
"rps_doc_frac_chars_top_4gram": 0.0035918098874390125,
"rps_doc_books_importance": -2648.939453125,
"rps_doc_books_importance_length_correction": -2648.939453125,
"rps_doc_openwebtext_importance": -1805.968994140625,
"rps_doc_openwebtext_importance_length_correction": -1805.968994140625,
"rps_doc_wikipedia_importance": -1165.8759765625,
"rps_doc_wikipedia_importance_length_correction": -1165.8759765625
},
"fasttext": {
"dclm": 0.10583239793777466,
"english": 0.9693648815155029,
"fineweb_edu_approx": 1.1954501867294312,
"eai_general_math": 0.23260682821273804,
"eai_open_web_math": 0.24658137559890747,
"eai_web_code": 0.05573194846510887
}
}
|
{
"free_decimal_correspondence": {
"primary": {
"code": "004.16",
"labels": {
"level_1": "General works, books and libraries, information sciences",
"level_2": "",
"level_3": "Computers and Computer science"
}
},
"secondary": {
"code": "004.17",
"labels": {
"level_1": "General works, books and libraries, information sciences",
"level_2": "",
"level_3": "Computers and Computer science"
}
}
},
"bloom_cognitive_process": {
"primary": {
"code": "5",
"label": "Evaluate"
},
"secondary": {
"code": "4",
"label": "Analyze"
}
},
"bloom_knowledge_domain": {
"primary": {
"code": "2",
"label": "Conceptual"
},
"secondary": {
"code": "3",
"label": "Procedural"
}
},
"document_type_v1": {
"primary": {
"code": "5",
"label": "Social/Forum"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"extraction_artifacts": {
"primary": {
"code": "3",
"label": "Irrelevant Content"
},
"secondary": {
"code": "0",
"label": "No Artifacts"
}
},
"missing_content": {
"primary": {
"code": "0",
"label": "No missing content"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"document_type_v2": {
"primary": {
"code": "5",
"label": "Comment Section"
},
"secondary": {
"code": "18",
"label": "Q&A Forum"
}
},
"reasoning_depth": {
"primary": {
"code": "3",
"label": "Intermediate Reasoning"
},
"secondary": {
"code": "2",
"label": "Basic Reasoning"
}
},
"technical_correctness": {
"primary": {
"code": "2",
"label": "Partially Correct"
},
"secondary": {
"code": "3",
"label": "Mostly Correct"
}
},
"education_level": {
"primary": {
"code": "2",
"label": "High School Level"
},
"secondary": {
"code": "1",
"label": "General Audience"
}
}
}
|
672f1e42c33a7f9846924a2431ea77df
|
-8,404,911,044,354,680,000 |
Cómo hacer un repetidor WiFi de forma fácil usando un segundo router
Por Ricky Fernández |
En ocasiones nuestra señal WiFi no llega con toda la potencia necesaria para tener una conexión decente. Existen muchas alternativas para ampliar nuestra señal WiFi, pero si tienes un router por casa, puedes darle una segunda vida y ahorrarnos un dinero.
La función que vamos a usar suelen venir prácticamente en todos los router donde los pasos son muy sencillo donde conseguiremos ampliar nuestra señal WiFi y para evitar cortes o directamente hacer llegar la señal a lugares que antes no llegaba.
Si tienes un WiFi lento puede que sea porque no has colocado bien tu router
Además de ampliar la señal WiFi podremos conectar nuestra consola, ordenador o cualquier dispositivo que requiera una conexión por cable de red ya que podremos usar un segundo router en la habitación que deseemos.
¿Qué materiales necesito para hacer un repetidor WiFi con un segundo router?
Imagen - Cómo hacer un repetidor WiFi de forma fácil usando un segundo router
Logicamente necesitaremos tener acceso al router principal, un router secundario, dos cables de red y un ordenador. El ordenador será para poder configurar bien la parte interna de nuestro router, es posible hacerlo desde un tablet o smarphone, pero se aconsejamos hacerlo con un ordenador.
La idea es conectar nuestro router secundario al router principal mediante un cable de red (RJ45), normalmente estos cables vienen dentro de las cajas de los router, ya sean libres o de la compañía donde hemos contratado internet.
En nuestro caso vamos a usar como router secundario un Tenda modelo W308R, cada modelo de router tendrá una interfaz diferente al igual que las claves de acceso. Básicamente son todos iguales pero tendrán las opciones en diferentes apartados.
Pasos a seguir para configurar nuestro repetidor WiFi con un router secundario
Lo primero que tenemos que hacer es restaurar de fábrica el router secundario para eliminar cualquier configuración previa, es realmente sencillo. Normalmente en la parte posterior suele venir un botón o un pequeño agujero que pone "RESET".
Imagen - Cómo hacer un repetidor WiFi de forma fácil usando un segundo router
Solo habrá que pulsarlo unos segundos (con el router encendido) y las luces comenzarán a dar signos de que se está restaurando a los valores de fábrica. Cuando el proceso finalice lo conectaremos a nuestro router principal con el cable de red.
Una vez restaurado y conectado a nuestro router principal, lo conectamos también a nuestro ordenador personal mediante otra cable de red.
Como blindar el WiFi de casa sin ser un experto
El esquema sería el siguiente, desde el router principal sale un cable de red al router secundario, del router secundario un cable de red a nuestro ordenador personal.
Con todo conectado vamos a nuestro ordenador personal y accedemos al router secundario mediante la dirección 192.168.0.1 e introducimos el usuario y contraseña (normalmente ADMIN y 12345) suele venir en la caja del mismo, así que no te preocupes.
Imagen - Cómo hacer un repetidor WiFi de forma fácil usando un segundo router
En la interfaz de nuestro router secundario tenemos que buscar la opción "WDS BRIDGE MODE". La podemos encontrar en "WIRELESS, WIRELESS BASIC SETTINGS". Una vez accedido y marcamos la opción WDS BRIDGE Mode, que será la que reciba la configuración de nuestro router principal. Digamos que será un copiar y pegar de configuraciones.
Imagen - Cómo hacer un repetidor WiFi de forma fácil usando un segundo router
A continuación nos vamos a nuestro router principal y pulsamos el botón "WPS" este botón estará activo unos minutos para recibir cualquier petición de algún dispositivo que requiera una configuración automática.
Imagen - Cómo hacer un repetidor WiFi de forma fácil usando un segundo router
Una vez pulsado, volvemos a la interfaz de nuestro router secundario y pulsamos el botón de "Open Scan", seleccionamos la de nuestro router principal y automáticamente empezará el emparejamiento de ambos.
Imagen - Cómo hacer un repetidor WiFi de forma fácil usando un segundo router
Tras unos segundos el botón WPS se apagará y esto significará que ha terminado el proceso, nuestro router secundario adoptará todos los parámetros (incluso el nombre de la WiFi) para crear una sola red WiFi potenciada. Si queréis comprobar que todo ha salido bien, solo hay que revisar el nombre de la red WiFi que ha adoptado nuestro router secundario en la interfaz web.
Cerramos nuestro navegador y colocamos nuestro router secundario ya configurado en cualquier parte de nuestra casa. Si queremos añadir algún smartphone o tablet a la red WiFi seguiremos usando la misma contraseña que la del router principal, así de sencillo.
Cada router tiene una configuración diferente con lo que es posible que las opciones descritas puedan variar, recomendamos tener un router libre para evitaros complicaciones con las configuraciones de vuestro operador.
Compra: Router Tenda (Amazon)
¿Te ha resultado sencillo estos pasos? ¿Has probado otros métodos para ampliar la WiFi de casa?
Mejora la señal WiFi en un minuto
Comentarios
Deja tu opinión o comentario. También puedes preguntar cualquier duda en el foro.
• Rob Lebo | El 18 Nov 2016, 09:55
Mi pregunta sería la siguiente:
¿Sería posible usar este segundo router como un diverisificador de señal para colocar una segunda clave de acceso para usuarios invitados? o ¿me he calentado la cabeza?
Gracias
• Sr Moaner | El 16 Nov 2017, 21:47
Hola. Muy interesante tu artículo. Una pregunta por favor:
Ya finalizando el artículo dices: "Cerramos nuestro navegador y colocamos nuestro router secundario ya configurado en cualquier parte de nuestra casa"
No es necesario que este conectado al router principal?
Puedo ponerlo, por ejemplo, en una planta superior conectado a red eléctrica. Me valdría con eso?
Perdón por mi ignorancia.
Trato de utilizar un router de movistar antiguo (que ya he configurado) para que me sirva como aplificador de señal en la planta superior de la casa, pero claro, si tengo que tenerlo conectado al router principal...necesitaría mucho cableado.
Mila gracias!!!
|
{
"url": "https://www.elgrupoinformatico.com/como-hacer-repetidor-wifi-forma-facil-usando-segundo-router-t32469.html",
"source_domain": "www.elgrupoinformatico.com",
"snapshot_id": "crawl=CC-MAIN-2019-22",
"warc_metadata": {
"Content-Length": "66065",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:OZ6ZHQYXJRK3CF7TDOJBVCVMPYMPAX33",
"WARC-Concurrent-To": "<urn:uuid:f139f2d5-f6d3-4dff-8d5e-41cf6b6ce60e>",
"WARC-Date": "2019-05-23T21:13:50Z",
"WARC-IP-Address": "82.223.18.83",
"WARC-Identified-Payload-Type": "text/html",
"WARC-Payload-Digest": "sha1:QN455SF6KQRE6UG74X62YNMN4DNYP6U7",
"WARC-Record-ID": "<urn:uuid:49afcaef-c0e8-400b-9fd1-ce4b0fa8a470>",
"WARC-Target-URI": "https://www.elgrupoinformatico.com/como-hacer-repetidor-wifi-forma-facil-usando-segundo-router-t32469.html",
"WARC-Truncated": null,
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:70cedac2-99f2-4dfa-afa2-d1f3f777439a>"
},
"warc_info": "isPartOf: CC-MAIN-2019-22\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for May 2019\r\noperator: Common Crawl Admin ([email protected])\r\nhostname: ip-10-146-226-231.ec2.internal\r\nsoftware: Apache Nutch 1.15 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.1-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/"
}
|
{
"line_start_idx": [
0,
69,
70,
92,
93,
348,
349,
594,
595,
671,
672,
886,
887,
964,
965,
1043,
1044,
1335,
1336,
1567,
1568,
1811,
1812,
1891,
1892,
2133,
2134,
2212,
2213,
2457,
2458,
2596,
2597,
2645,
2646,
2814,
2815,
3062,
3063,
3141,
3142,
3474,
3475,
3553,
3554,
3766,
3767,
3845,
3846,
4051,
4052,
4130,
4131,
4504,
4505,
4764,
4765,
4984,
4985,
5015,
5016,
5112,
5113,
5147,
5148,
5160,
5161,
5243,
5280,
5316,
5489,
5490,
5502,
5540,
5603,
5758,
5818,
5920,
5950,
6197,
6198
],
"line_end_idx": [
69,
70,
92,
93,
348,
349,
594,
595,
671,
672,
886,
887,
964,
965,
1043,
1044,
1335,
1336,
1567,
1568,
1811,
1812,
1891,
1892,
2133,
2134,
2212,
2213,
2457,
2458,
2596,
2597,
2645,
2646,
2814,
2815,
3062,
3063,
3141,
3142,
3474,
3475,
3553,
3554,
3766,
3767,
3845,
3846,
4051,
4052,
4130,
4131,
4504,
4505,
4764,
4765,
4984,
4985,
5015,
5016,
5112,
5113,
5147,
5148,
5160,
5161,
5243,
5280,
5316,
5489,
5490,
5502,
5540,
5603,
5758,
5818,
5920,
5950,
6197,
6198,
6217
]
}
|
{
"red_pajama_v2": {
"ccnet_original_length": 6217,
"ccnet_original_nlines": 80,
"rps_doc_curly_bracket": 0,
"rps_doc_ldnoobw_words": 0,
"rps_doc_lorem_ipsum": 0,
"rps_doc_stop_word_fraction": 0.10388436913490295,
"rps_doc_ut1_blacklist": 0,
"rps_doc_frac_all_caps_words": 0.014453480020165443,
"rps_doc_frac_lines_end_with_ellipsis": 0,
"rps_doc_frac_no_alph_words": 0.11653117090463638,
"rps_doc_frac_unique_words": 0.368794322013855,
"rps_doc_mean_word_length": 5.179331302642822,
"rps_doc_num_sentences": 46,
"rps_doc_symbol_to_word_ratio": 0.0009033399983309209,
"rps_doc_unigram_entropy": 5.159552574157715,
"rps_doc_word_count": 987,
"rps_doc_frac_chars_dupe_10grams": 0.12656494975090027,
"rps_doc_frac_chars_dupe_5grams": 0.15297339856624603,
"rps_doc_frac_chars_dupe_6grams": 0.14025822281837463,
"rps_doc_frac_chars_dupe_7grams": 0.12656494975090027,
"rps_doc_frac_chars_dupe_8grams": 0.12656494975090027,
"rps_doc_frac_chars_dupe_9grams": 0.12656494975090027,
"rps_doc_frac_chars_top_2gram": 0.04381847009062767,
"rps_doc_frac_chars_top_3gram": 0.026408450677990913,
"rps_doc_frac_chars_top_4gram": 0.03129889816045761,
"rps_doc_books_importance": -506.05303955078125,
"rps_doc_books_importance_length_correction": -506.05303955078125,
"rps_doc_openwebtext_importance": -297.5146789550781,
"rps_doc_openwebtext_importance_length_correction": -297.5146789550781,
"rps_doc_wikipedia_importance": -206.6072235107422,
"rps_doc_wikipedia_importance_length_correction": -206.6072235107422
},
"fasttext": {
"dclm": 0.8769041895866394,
"english": 0.0015696099726483226,
"fineweb_edu_approx": 1.7211755514144897,
"eai_general_math": 0.0001892400032375008,
"eai_open_web_math": 0.30096834897994995,
"eai_web_code": 0.4350786805152893
}
}
|
{
"free_decimal_correspondence": {
"primary": {
"code": "004.6",
"labels": {
"level_1": "General works, books and libraries, information sciences",
"level_2": "",
"level_3": "Computers and Computer science"
}
},
"secondary": {
"code": "621.3846",
"labels": {
"level_1": "Industrial arts, Technology, and Engineering",
"level_2": "Engineering",
"level_3": "Mechanical engineering and Machinery"
}
}
},
"bloom_cognitive_process": {
"primary": {
"code": "3",
"label": "Apply"
},
"secondary": {
"code": "2",
"label": "Understand"
}
},
"bloom_knowledge_domain": {
"primary": {
"code": "3",
"label": "Procedural"
},
"secondary": {
"code": "2",
"label": "Conceptual"
}
},
"document_type_v1": {
"primary": {
"code": "3",
"label": "Reference/Encyclopedic/Educational"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"extraction_artifacts": {
"primary": {
"code": "3",
"label": "Irrelevant Content"
},
"secondary": {
"code": "0",
"label": "No Artifacts"
}
},
"missing_content": {
"primary": {
"code": "4",
"label": "Missing Images or Figures"
},
"secondary": {
"code": "0",
"label": "No missing content"
}
},
"document_type_v2": {
"primary": {
"code": "23",
"label": "Tutorial"
},
"secondary": {
"code": "10",
"label": "Knowledge Article"
}
},
"reasoning_depth": {
"primary": {
"code": "2",
"label": "Basic Reasoning"
},
"secondary": {
"code": "3",
"label": "Intermediate Reasoning"
}
},
"technical_correctness": {
"primary": {
"code": "3",
"label": "Mostly Correct"
},
"secondary": {
"code": "4",
"label": "Highly Correct"
}
},
"education_level": {
"primary": {
"code": "1",
"label": "General Audience"
},
"secondary": {
"code": "2",
"label": "High School Level"
}
}
}
|
672f1e42c33a7f9846924a2431ea77df
|
7,790,333,726,034,559,000 |
tradosfilterframeworkjavaapi.dll
Application using this process: SDL Trados
tradosfilterframeworkjavaapi.dll
Application using this process: SDL Trados
tradosfilterframeworkjavaapi.dll
Click here to run a scan if you are experiencing issues with this process.
Application using this process: SDL Trados
Recommended: Scan your system for invalid registry entries.
What is tradosfilterframeworkjavaapi.dll doing on my computer?
TradosFilterFrameworkJavaApi.dll is a common file used by the SDL Trados 2007 translation software.
Non-system processes like tradosfilterframeworkjavaapi.dll originate from software you installed on your system. Since most applications store data in your system's registry, it is likely that over time your registry suffers fragmentation and accumulates invalid entries which can affect your PC's performance. It is recommended that you check your registry to identify slowdown issues.
tradosfilterframeworkjavaapi.dll
In order to ensure your files and data are not lost, be sure to back up your files online. Using a cloud backup service will allow you to safely secure all your digital files. This will also enable you to access any of your files, at any time, on any device.
Is tradosfilterframeworkjavaapi.dll harmful?
This process is considered safe. It is unlikely to pose any harm to your system. Scan your system now to identify issues with this process and services that can be safely removed.
tradosfilterframeworkjavaapi.dll is a safe process
Can I stop or remove tradosfilterframeworkjavaapi.dll?
Most non-system processes that are running can be stopped because they are not involved in running your operating system. Scan your system now to identify unused processes that are using up valuable resources. tradosfilterframeworkjavaapi.dll is used by 'SDL Trados'.This is an application created by 'SDL'. To stop tradosfilterframeworkjavaapi.dll permanently uninstall 'SDL Trados' from your system. Uninstalling applications can leave invalid registry entries, accumulating over time. Run a free scan to find out how to optimize software and system performance.
Is tradosfilterframeworkjavaapi.dll CPU intensive?
This process is not considered CPU intensive. However, running too many processes on your system may affect your PC’s performance. To reduce system overload, you can use the Microsoft System Configuration Utility to manually find and disable processes that launch upon start-up. Alternatively, download PC Mechanic to automatically scan and identify any PC issues.
Why is tradosfilterframeworkjavaapi.dll giving me errors?
Process related issues are usually related to problems encountered by the application that runs it. A safe way to stop these errors is to uninstall the application and run a system scan to automatically identify any PC issues.
Browse process directory by name
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z #
Process Library is the unique and indispensable process listing database since 2004 Now counting 140,000 processes and 55,000 DLLs. Join and subscribe now!
System Tools
SpeedUpMyPC
PC Mechanic
Toolbox
ProcessQuicklink
|
{
"url": "http://www.processlibrary.com/en/directory/files/tradosfilterframeworkjavaapi/1556/",
"source_domain": "www.processlibrary.com",
"snapshot_id": "crawl=CC-MAIN-2017-51",
"warc_metadata": {
"Content-Length": "44979",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:2ICW6HWSQO7LLFHQ6INGI5UN3URTAMM3",
"WARC-Concurrent-To": "<urn:uuid:8078ea2e-4109-48c3-9d5d-36b87c13f7a1>",
"WARC-Date": "2017-12-13T17:08:24Z",
"WARC-IP-Address": "79.125.119.199",
"WARC-Identified-Payload-Type": "application/xhtml+xml",
"WARC-Payload-Digest": "sha1:TDBFLBAPS6MOJRM3PTISMNMIPEG7SQFJ",
"WARC-Record-ID": "<urn:uuid:ee5d11a7-1118-472d-a851-ea8b86c7b664>",
"WARC-Target-URI": "http://www.processlibrary.com/en/directory/files/tradosfilterframeworkjavaapi/1556/",
"WARC-Truncated": "length",
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:b30c8603-50c3-48b8-95ef-161ec1d14394>"
},
"warc_info": "robots: classic\r\nhostname: ip-10-216-194-6.ec2.internal\r\nsoftware: Nutch 1.6 (CC)\r\nisPartOf: CC-MAIN-2017-51\r\noperator: Common Crawl Admin\r\ndescription: Wide crawl of the web for December 2017\r\npublisher: Common Crawl\r\nformat: WARC File Format 1.0\r\nconformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf"
}
|
{
"line_start_idx": [
0,
33,
34,
77,
78,
79,
112,
113,
156,
157,
158,
191,
192,
193,
268,
269,
312,
313,
373,
374,
437,
438,
538,
539,
926,
959,
960,
1219,
1220,
1265,
1266,
1446,
1497,
1498,
1553,
1554,
2119,
2120,
2171,
2172,
2537,
2538,
2596,
2597,
2824,
2825,
2826,
2827,
2860,
2861,
2862,
2916,
2917,
2918,
2919,
2920,
2921,
2922,
2923,
2924,
3080,
3081,
3082,
3095,
3096,
3108,
3120,
3121,
3129,
3130
],
"line_end_idx": [
33,
34,
77,
78,
79,
112,
113,
156,
157,
158,
191,
192,
193,
268,
269,
312,
313,
373,
374,
437,
438,
538,
539,
926,
959,
960,
1219,
1220,
1265,
1266,
1446,
1497,
1498,
1553,
1554,
2119,
2120,
2171,
2172,
2537,
2538,
2596,
2597,
2824,
2825,
2826,
2827,
2860,
2861,
2862,
2916,
2917,
2918,
2919,
2920,
2921,
2922,
2923,
2924,
3080,
3081,
3082,
3095,
3096,
3108,
3120,
3121,
3129,
3130,
3146
]
}
|
{
"red_pajama_v2": {
"ccnet_original_length": 3146,
"ccnet_original_nlines": 69,
"rps_doc_curly_bracket": 0,
"rps_doc_ldnoobw_words": 0,
"rps_doc_lorem_ipsum": 0,
"rps_doc_stop_word_fraction": 0.3272727429866791,
"rps_doc_ut1_blacklist": 0,
"rps_doc_frac_all_caps_words": 0.07818181812763214,
"rps_doc_frac_lines_end_with_ellipsis": 0,
"rps_doc_frac_no_alph_words": 0.14000000059604645,
"rps_doc_frac_unique_words": 0.45614033937454224,
"rps_doc_mean_word_length": 5.65350866317749,
"rps_doc_num_sentences": 47,
"rps_doc_symbol_to_word_ratio": 0.0018181799678131938,
"rps_doc_unigram_entropy": 4.872372150421143,
"rps_doc_word_count": 456,
"rps_doc_frac_chars_dupe_10grams": 0,
"rps_doc_frac_chars_dupe_5grams": 0.1035686582326889,
"rps_doc_frac_chars_dupe_6grams": 0.1035686582326889,
"rps_doc_frac_chars_dupe_7grams": 0.08960434049367905,
"rps_doc_frac_chars_dupe_8grams": 0.0640031024813652,
"rps_doc_frac_chars_dupe_9grams": 0,
"rps_doc_frac_chars_top_2gram": 0.029868109151721,
"rps_doc_frac_chars_top_3gram": 0.023273859173059464,
"rps_doc_frac_chars_top_4gram": 0.03141970932483673,
"rps_doc_books_importance": -199.00392150878906,
"rps_doc_books_importance_length_correction": -199.00392150878906,
"rps_doc_openwebtext_importance": -124.31452941894531,
"rps_doc_openwebtext_importance_length_correction": -124.31452941894531,
"rps_doc_wikipedia_importance": -109.36075592041016,
"rps_doc_wikipedia_importance_length_correction": -109.36075592041016
},
"fasttext": {
"dclm": 0.03790384903550148,
"english": 0.8807795643806458,
"fineweb_edu_approx": 1.7203786373138428,
"eai_general_math": 0.023132679983973503,
"eai_open_web_math": 0.06927776336669922,
"eai_web_code": 0.006982089951634407
}
}
|
{
"free_decimal_correspondence": {
"primary": {
"code": "005.457",
"labels": {
"level_1": "General works, books and libraries, information sciences",
"level_2": "",
"level_3": "Computer programming"
}
},
"secondary": {
"code": "004.67",
"labels": {
"level_1": "General works, books and libraries, information sciences",
"level_2": "",
"level_3": "Computers and Computer science"
}
}
},
"bloom_cognitive_process": {
"primary": {
"code": "2",
"label": "Understand"
},
"secondary": {
"code": "3",
"label": "Apply"
}
},
"bloom_knowledge_domain": {
"primary": {
"code": "1",
"label": "Factual"
},
"secondary": {
"code": "3",
"label": "Procedural"
}
},
"document_type_v1": {
"primary": {
"code": "3",
"label": "Reference/Encyclopedic/Educational"
},
"secondary": {
"code": "6",
"label": "Promotional/Advertisement"
}
},
"extraction_artifacts": {
"primary": {
"code": "3",
"label": "Irrelevant Content"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"missing_content": {
"primary": {
"code": "2",
"label": "Click Here References"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"document_type_v2": {
"primary": {
"code": "10",
"label": "Knowledge Article"
},
"secondary": {
"code": "8",
"label": "Documentation"
}
},
"reasoning_depth": {
"primary": {
"code": "2",
"label": "Basic Reasoning"
},
"secondary": {
"code": "1",
"label": "No Reasoning"
}
},
"technical_correctness": {
"primary": {
"code": "3",
"label": "Mostly Correct"
},
"secondary": {
"code": "4",
"label": "Highly Correct"
}
},
"education_level": {
"primary": {
"code": "1",
"label": "General Audience"
},
"secondary": {
"code": "2",
"label": "High School Level"
}
}
}
|
672f1e42c33a7f9846924a2431ea77df
|
278,011,758,840,751,260 |
PHP 5.6.18 is available
log1p
(PHP 4 >= 4.1.0, PHP 5, PHP 7)
log1p Berechent log(1 + number) mit erhöhter Genauigkeit
Beschreibung
float log1p ( float $number )
Warnung
Diese Funktion ist EXPERIMENTELL. Das Verhalten, der Funktionsname und alles Andere, was hier dokumentiert ist, kann sich in zukünftigen PHP-Versionen ohne Ankündigung ändern. Seien Sie gewarnt und verwenden Sie diese Funktion auf eigenes Risiko.
log1p() berechnet log(1 + number) auf eine Weise die auch dann noch genaue Ergebnisse liefert wenn der Wert von number nur sehr klein ist. log() liefert in solchen Fällen auf Grund von Rundungsfehlern oft nur den Wert von log(1) und vernachlässigt die Nachkommastellen.
Parameter-Liste
number
Der zu verarbeitende Wert
Rückgabewerte
log(1 + number)
Changelog
Version Beschreibung
5.3.0 Die Funktion ist nun auf allen Plattformen verfügbar.
Siehe auch
• expm1() - Exponentialfunktion mit erhöhter Genauigkeit
• log() - Logarithmus
• log10() - Dekadischer Logarithmus
add a note add a note
User Contributed Notes 1 note
up
3
Anonymous
13 years ago
Note that the benefit of this function for small argument values is lost if PHP is compiled against a C library that that not have builtin support for the log1p() function.
In this case, log1p() will be compiled by using log() instead, and the precision of the result will be identical to log(1), i.e. it will always be 0 for small numbers.
Sample log1p(1.0e-20):
- returns 0.0 if log1p() is approximated by using log()
- returns something very near from 1.0e-20, if log1p() is supported by the underlying C library.
One way to support log1p() correctly on any platform, so that the magnitude of the expected result is respected:
function log1p($x) {
return ($x>-1.0e-8 && $x<1.0e-8) ? ($x - $x*$x/2) : log(1+$x);
}
If you want better precision, you may use a better limited development, for small positive or negative values of x:
log(1+x) = x - x^2/2 + x^3/3 - ... + (-1)^(n-1)*x^n/n + ...
(This serial sum converges only for values of x in [0 ... 1] inclusive, and the ^ operator in the above formula means the exponentiation operator, not the PHP xor operation)
Note that log1p() is undefined for arguments lower than or equal to -1, and that the implied base of the log function is the Neperian "e" constant.
To Top
|
{
"url": "http://docs.php.net/manual/de/function.log1p.php",
"source_domain": "docs.php.net",
"snapshot_id": "crawl=CC-MAIN-2016-07",
"warc_metadata": {
"Content-Length": "30365",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:WGJ3TAHCA5RJZP6G3LOE5MMXAPHRSRS4",
"WARC-Concurrent-To": "<urn:uuid:d2fa02c4-484a-413e-8d8d-e163fcd030bc>",
"WARC-Date": "2016-02-10T15:27:25Z",
"WARC-IP-Address": "92.48.119.85",
"WARC-Identified-Payload-Type": null,
"WARC-Payload-Digest": "sha1:VLLZNZMF7F7TNUO275EMWZWQUUHEN4WB",
"WARC-Record-ID": "<urn:uuid:a8df3b8a-9dbd-472c-88c8-1e99121ebdea>",
"WARC-Target-URI": "http://docs.php.net/manual/de/function.log1p.php",
"WARC-Truncated": null,
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:d2fd5a40-de37-4d6c-b764-cb0b0b978a35>"
},
"warc_info": "robots: classic\r\nhostname: ip-10-236-182-209.ec2.internal\r\nsoftware: Nutch 1.6 (CC)/CC WarcExport 1.0\r\nisPartOf: CC-MAIN-2016-07\r\noperator: CommonCrawl Admin\r\ndescription: Wide crawl of the web for February 2016\r\npublisher: CommonCrawl\r\nformat: WARC File Format 1.0\r\nconformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf"
}
|
{
"line_start_idx": [
0,
24,
25,
31,
32,
63,
64,
121,
122,
135,
136,
166,
174,
175,
422,
423,
693,
694,
710,
711,
718,
719,
745,
746,
760,
761,
777,
778,
788,
789,
810,
870,
871,
882,
883,
942,
966,
1004,
1005,
1027,
1028,
1058,
1059,
1062,
1064,
1074,
1087,
1260,
1261,
1429,
1452,
1508,
1605,
1606,
1719,
1720,
1741,
1804,
1806,
1807,
1923,
1924,
1984,
1985,
2159,
2160,
2308
],
"line_end_idx": [
24,
25,
31,
32,
63,
64,
121,
122,
135,
136,
166,
174,
175,
422,
423,
693,
694,
710,
711,
718,
719,
745,
746,
760,
761,
777,
778,
788,
789,
810,
870,
871,
882,
883,
942,
966,
1004,
1005,
1027,
1028,
1058,
1059,
1062,
1064,
1074,
1087,
1260,
1261,
1429,
1452,
1508,
1605,
1606,
1719,
1720,
1741,
1804,
1806,
1807,
1923,
1924,
1984,
1985,
2159,
2160,
2308,
2314
]
}
|
{
"red_pajama_v2": {
"ccnet_original_length": 2314,
"ccnet_original_nlines": 66,
"rps_doc_curly_bracket": 0.0008643000037409365,
"rps_doc_ldnoobw_words": 0,
"rps_doc_lorem_ipsum": 0,
"rps_doc_stop_word_fraction": 0.22684310376644135,
"rps_doc_ut1_blacklist": 0,
"rps_doc_frac_all_caps_words": 0.018903590738773346,
"rps_doc_frac_lines_end_with_ellipsis": 0.014925369992852211,
"rps_doc_frac_no_alph_words": 0.34215500950813293,
"rps_doc_frac_unique_words": 0.5767045617103577,
"rps_doc_mean_word_length": 4.954545497894287,
"rps_doc_num_sentences": 28,
"rps_doc_symbol_to_word_ratio": 0.0056710802018642426,
"rps_doc_unigram_entropy": 5.0408477783203125,
"rps_doc_word_count": 352,
"rps_doc_frac_chars_dupe_10grams": 0,
"rps_doc_frac_chars_dupe_5grams": 0,
"rps_doc_frac_chars_dupe_6grams": 0,
"rps_doc_frac_chars_dupe_7grams": 0,
"rps_doc_frac_chars_dupe_8grams": 0,
"rps_doc_frac_chars_dupe_9grams": 0,
"rps_doc_frac_chars_top_2gram": 0.017201829701662064,
"rps_doc_frac_chars_top_3gram": 0.0263761505484581,
"rps_doc_frac_chars_top_4gram": 0,
"rps_doc_books_importance": -208.3308563232422,
"rps_doc_books_importance_length_correction": -208.3308563232422,
"rps_doc_openwebtext_importance": -137.1015167236328,
"rps_doc_openwebtext_importance_length_correction": -137.1015167236328,
"rps_doc_wikipedia_importance": -90.52562713623047,
"rps_doc_wikipedia_importance_length_correction": -90.52562713623047
},
"fasttext": {
"dclm": 0.17011326551437378,
"english": 0.18302661180496216,
"fineweb_edu_approx": 1.5952860116958618,
"eai_general_math": 0.6302235722541809,
"eai_open_web_math": 0.5356550216674805,
"eai_web_code": 0.1430400013923645
}
}
|
{
"free_decimal_correspondence": {
"primary": {
"code": "005.133",
"labels": {
"level_1": "General works, books and libraries, information sciences",
"level_2": "",
"level_3": "Computer programming"
}
},
"secondary": {
"code": "512.7",
"labels": {
"level_1": "Science and Natural history",
"level_2": "Mathematics",
"level_3": "Algebra"
}
}
},
"bloom_cognitive_process": {
"primary": {
"code": "2",
"label": "Understand"
},
"secondary": {
"code": "3",
"label": "Apply"
}
},
"bloom_knowledge_domain": {
"primary": {
"code": "2",
"label": "Conceptual"
},
"secondary": {
"code": "3",
"label": "Procedural"
}
},
"document_type_v1": {
"primary": {
"code": "3",
"label": "Reference/Encyclopedic/Educational"
},
"secondary": {
"code": "4",
"label": "Code/Software"
}
},
"extraction_artifacts": {
"primary": {
"code": "0",
"label": "No Artifacts"
},
"secondary": {
"code": "3",
"label": "Irrelevant Content"
}
},
"missing_content": {
"primary": {
"code": "0",
"label": "No missing content"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"document_type_v2": {
"primary": {
"code": "8",
"label": "Documentation"
},
"secondary": {
"code": "10",
"label": "Knowledge Article"
}
},
"reasoning_depth": {
"primary": {
"code": "3",
"label": "Intermediate Reasoning"
},
"secondary": {
"code": "2",
"label": "Basic Reasoning"
}
},
"technical_correctness": {
"primary": {
"code": "4",
"label": "Highly Correct"
},
"secondary": {
"code": "3",
"label": "Mostly Correct"
}
},
"education_level": {
"primary": {
"code": "3",
"label": "Undergraduate Level"
},
"secondary": {
"code": "2",
"label": "High School Level"
}
}
}
|
672f1e42c33a7f9846924a2431ea77df
|
-1,693,152,772,055,590,700 |
You are viewing documentation for the development version, it may be incomplete.
Join our translation project and help translate Zabbix documentation into your native language.
5 Encoding of returned values
Zabbix server expects every returned text value in the UTF8 encoding. This is related to any type of checks: Zabbix agent, SSH, Telnet, etc.
Different monitored systems/devices and checks can return non-ASCII characters in the value. For such cases, almost all possible zabbix keys contain an additional item key parameter - <encoding>. This key parameter is optional but it should be specified if the returned value is not in the UTF8 encoding and it contains non-ASCII characters. Otherwise the result can be unexpected and unpredictable.
A description of behavior with different database backends in such cases follows.
MySQL
If a value contains a non-ASCII character in non UTF8 encoding - this character and the following will be discarded when the database stores this value. No warning messages will be written to the zabbix_server.log.
Relevant for at least MySQL version 5.1.61
PostgreSQL
If a value contains a non-ASCII character in non UTF8 encoding - this will lead to a failed SQL query (PGRES_FATAL_ERROR:ERROR invalid byte sequence for encoding) and data will not be stored. An appropriate warning message will be written to the zabbix_server.log.
Relevant for at least PostgreSQL version 9.1.3
|
{
"url": "https://www.zabbix.com/documentation/devel/en/manual/appendix/items/encoding_of_values",
"source_domain": "www.zabbix.com",
"snapshot_id": "CC-MAIN-2023-23",
"warc_metadata": {
"Content-Length": "197903",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:6CX3TZY32KJBNCAY3PNP6O5NAA37XVFC",
"WARC-Concurrent-To": "<urn:uuid:2fbf8e9f-8686-480b-8eb5-4d78823e44e6>",
"WARC-Date": "2023-06-08T11:44:56Z",
"WARC-IP-Address": "104.26.7.148",
"WARC-Identified-Payload-Type": "text/html",
"WARC-Payload-Digest": "sha1:WFRK6JGAWBFYWWHDBFQXGOZGNRTTLOJ4",
"WARC-Record-ID": "<urn:uuid:4c784227-22ec-4614-82d5-05609e2718d6>",
"WARC-Target-URI": "https://www.zabbix.com/documentation/devel/en/manual/appendix/items/encoding_of_values",
"WARC-Truncated": null,
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:2f05e6e4-8edf-4fde-b169-a3f38561ffa8>"
},
"warc_info": "isPartOf: CC-MAIN-2023-23\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for May/June 2023\r\noperator: Common Crawl Admin ([email protected])\r\nhostname: ip-10-67-67-188\r\nsoftware: Apache Nutch 1.19 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.4-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: https://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/"
}
|
{
"line_start_idx": [
0,
81,
177,
178,
208,
209,
350,
351,
751,
752,
834,
835,
841,
842,
1057,
1100,
1101,
1112,
1113,
1378
],
"line_end_idx": [
81,
177,
178,
208,
209,
350,
351,
751,
752,
834,
835,
841,
842,
1057,
1100,
1101,
1112,
1113,
1378,
1424
]
}
|
{
"red_pajama_v2": {
"ccnet_original_length": 1424,
"ccnet_original_nlines": 19,
"rps_doc_curly_bracket": 0,
"rps_doc_ldnoobw_words": 0,
"rps_doc_lorem_ipsum": 0,
"rps_doc_stop_word_fraction": 0.4060150384902954,
"rps_doc_ut1_blacklist": 0,
"rps_doc_frac_all_caps_words": 0.04887218028306961,
"rps_doc_frac_lines_end_with_ellipsis": 0,
"rps_doc_frac_no_alph_words": 0.1654135286808014,
"rps_doc_frac_unique_words": 0.5299538969993591,
"rps_doc_mean_word_length": 5.322580814361572,
"rps_doc_num_sentences": 20,
"rps_doc_symbol_to_word_ratio": 0,
"rps_doc_unigram_entropy": 4.480947971343994,
"rps_doc_word_count": 217,
"rps_doc_frac_chars_dupe_10grams": 0.18354977667331696,
"rps_doc_frac_chars_dupe_5grams": 0.18354977667331696,
"rps_doc_frac_chars_dupe_6grams": 0.18354977667331696,
"rps_doc_frac_chars_dupe_7grams": 0.18354977667331696,
"rps_doc_frac_chars_dupe_8grams": 0.18354977667331696,
"rps_doc_frac_chars_dupe_9grams": 0.18354977667331696,
"rps_doc_frac_chars_top_2gram": 0.041558440774679184,
"rps_doc_frac_chars_top_3gram": 0.041558440774679184,
"rps_doc_frac_chars_top_4gram": 0.02943723089993,
"rps_doc_books_importance": -106.97138977050781,
"rps_doc_books_importance_length_correction": -105.69985961914062,
"rps_doc_openwebtext_importance": -38.56123352050781,
"rps_doc_openwebtext_importance_length_correction": -38.56123352050781,
"rps_doc_wikipedia_importance": -49.020328521728516,
"rps_doc_wikipedia_importance_length_correction": -42.963706970214844
},
"fasttext": {
"dclm": 0.22360950708389282,
"english": 0.7209964990615845,
"fineweb_edu_approx": 2.409245729446411,
"eai_general_math": 0.3144601583480835,
"eai_open_web_math": 0.1369529366493225,
"eai_web_code": 0.7865126729011536
}
}
|
{
"free_decimal_correspondence": {
"primary": {
"code": "005.44",
"labels": {
"level_1": "General works, books and libraries, information sciences",
"level_2": "",
"level_3": "Computer programming"
}
},
"secondary": {
"code": "005.758",
"labels": {
"level_1": "General works, books and libraries, information sciences",
"level_2": "",
"level_3": "Computer programming"
}
}
},
"bloom_cognitive_process": {
"primary": {
"code": "2",
"label": "Understand"
},
"secondary": {
"code": "3",
"label": "Apply"
}
},
"bloom_knowledge_domain": {
"primary": {
"code": "2",
"label": "Conceptual"
},
"secondary": {
"code": "3",
"label": "Procedural"
}
},
"document_type_v1": {
"primary": {
"code": "3",
"label": "Reference/Encyclopedic/Educational"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"extraction_artifacts": {
"primary": {
"code": "0",
"label": "No Artifacts"
},
"secondary": {
"code": "3",
"label": "Irrelevant Content"
}
},
"missing_content": {
"primary": {
"code": "0",
"label": "No missing content"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"document_type_v2": {
"primary": {
"code": "8",
"label": "Documentation"
},
"secondary": {
"code": "10",
"label": "Knowledge Article"
}
},
"reasoning_depth": {
"primary": {
"code": "2",
"label": "Basic Reasoning"
},
"secondary": {
"code": "3",
"label": "Intermediate Reasoning"
}
},
"technical_correctness": {
"primary": {
"code": "4",
"label": "Highly Correct"
},
"secondary": {
"code": "3",
"label": "Mostly Correct"
}
},
"education_level": {
"primary": {
"code": "3",
"label": "Undergraduate Level"
},
"secondary": {
"code": "4",
"label": "Graduate/Expert Level"
}
}
}
|
672f1e42c33a7f9846924a2431ea77df
|
4,525,318,188,096,828,000 |
Author Archive for CSH – Page 5
Search Engines – use with care
Search engine - use with care
In previous articles we’ve mentioned that as well as watching out for computer viruses, you need to watch out for ‘Potentially Unwanted Programs’- technically legal software used maliciously which may install a program without your permission, change your search engine, tracks what you are doing or many other things.
The people behind this malware are getting more clever in finding ways to get their software onto your computer and are even using search engines to help them – search engines that everyone uses every day.
Unfortunately we still find customers that have been misled when searching and have unwittingly gone to the wrong kind of website to download something from.
Check the actual website address
It may sound obvious, but when reading the search results, check the website address itself and not just the title or wording. You would be surprised how many people only look at the title or briefly read the paragraph under it and it is common that people have searched for something on a search engine, (such as printer software drivers for example) and some of the results are not genuine websites. The website addresses may be very similar, such as ‘hp-drivers.com’ instead of the correct ‘hp.com’ but they will not be the website that you want.
Some of these ‘almost’ websites are genuine, but many are not and when downloading from them, they can add unwanted programs (or worse) to what you download. As a lot of these unwanted programs are not illegal as such, they can sometimes be missed by antivirus software.
How do you avoid going to the wrong search result?
The important thing to remember is that you should not automatically assume that all the results of any search are genuine. You need to be careful what you click on, as well as what you download.
As well as being extra careful if you see the website address is not what you expect, many antivirus programs automatically check to see if a website has been reported as a potential danger and if so, will warn you. Sometimes the search engine itself may warn you too, but you cannot rely on being warned every time.
Antivirus programs may show a green icon alongside the website entry in the search list, telling you that the website is ok, which is useful – but that doesn’t mean that you must avoid any results which do not have the green icon. Many people are not aware that a website that does not have the green icon, may still be alright to visit – the fact that they do not have a green icon may just mean that they have not been added to the antivirus program ‘green’ list yet.
Stick to the original websites where possible.
If you are looking for software drivers for your computer, stick to the manufacturer website – this will ensure that you have the most up to date and malware-free download.
If you do not go to a manufacturer website to download something, try not to download drivers or programs from third party sites unless you have to and then only when they are well-known sites.
So called ‘Peer to Peer’ (file sharing) sites can be particularly problematic and again, you need to be choosy where you download from.
So long as you treat search engine results with as much caution as anything else on the web, you will be adding to your computer security. You don’t have to be paranoid – just be careful!
Share..Share on FacebookShare on Google+Tweet about this on TwitterShare on LinkedInPin on PinterestPrint this pageEmail this to someone
Computer jargon explained
computer jargon
If you could afford it, would you buy an expensive car if you only drove it to the supermarket and no-where else? Of course not – you wouldn’t not want to pay for engine capability that you are not using, so why waste money?
The same applies to computers – don’t let sales jargon and the ‘latest and greatest’ specification fool you into thinking that you need to overspend. As we sell laptop and desktop computers, this is something we explain to customers every day.
Of course, Technology is always advancing but if you are using a computer just to go on the internet and do basic things like type documents, then you simply don’t need a high specification computer. Yes, a high specification computer is nice to have and if you choose to, you can go for what you can afford – just don’t get distracted into unnecessarily paying for more than you actually need.
Here are a few things that explain the jargon used in computing: –
‘Random Access Memory’ (RAM)
‘RAM’ is made of computer chips that temporarily store information when you switch your computer on and is vital for its usability and reliability – think of it as your desk, the bigger the desk the more work you can do. The current standard is 4GB of RAM, which is fine to run Windows and do everyday tasks. 8GB is now becoming the standard for business machines and above that is needed for people doing specialist work, such as those using ‘Virtual Machines’, or video and image editing programs, etc.
Above that 4GB or 8GB, if you are just doing everyday things with your computer then a lot of that ‘RAM’ is just sitting there doing nothing.
Hard Drive sizes
Similarly the Hard Drive standard at the moment is 500GB of storage and unless you do the things mentioned above, this size hard drive is all you need (especially if you are backing up externally – you are, aren’t you?!). Having a computer hard drive that’s double that sounds good, but if it is not filled up very much then why have it. In some cases a larger hard drive can make certain things take longer, for example when performing computer maintenance or disk scanning by a security program.
Computer Processors
The computer processor is the hard working component that dictates a lot of the speed and potential of the machine. The most common processors today are made by a company called Intel and the least powerful of their processor line up is a ‘Celeron’, then ‘Pentium’, then the ‘Core i3’, ’i5’ and ‘i7’.
The Core i3 is the standard processor for business computers, although more homes are using it too especially where more intensive programs are used, such as Photoshop.
The less powerful processors will also work and many people do use them, but there is a reduction in performance to be aware of.
‘i5’ processors tend to be used by ‘gamers’ and those tasks needing serious resources, such as speech recognition, Virtual Machines, etc.
‘i7’ processors are also used by gamers but are mainly specialist processors, are extremely expensive and also way more powerful than most home and business users need – it would be like having a sports car that never went above 30mph!
These are the three most important things to look for when looking to buy another computer. After these factors, the next important points are the reputation of the manufacturer as well as the price – genuine bargain or not?
So the next time you are in the market for a computer, don’t be blinded by science or the sales jargon – research what you need and stick to it, unless it’s a real bargain!
Call us on 01455 209505 for more advice and no obligation quotes.
Share..Share on FacebookShare on Google+Tweet about this on TwitterShare on LinkedInPin on PinterestPrint this pageEmail this to someone
Should businesses buy a Business or Consumer grade computer?
consumer or business grade computers
Businesses – should you buy a Consumer or Business PC? Before buying a computer for work, it’s important to consider whether your best bet is to get a consumer model or one built specifically for business use.
You’ve probably seen business computers with the same brand name that you have at home, but that’s where the similarities end. Investing in the right system now will pay off long term, saving you time, money and a lot of frustration. Here’s what you need to know to make the best choice for your business and budget.
Business-class Features
The operating system that comes pre-installed on a business-class computer will have features the consumer options don’t, including the ability to join corporate networks. Computers designed for home use come with Windows Home or Starter editions, which may require hours of expert assistance to link into a secure business network.
When you invest in a business computer, you may want certain inclusions built-in and ready to go – those include features that will make your network more secure and staff more productive. For example, fingerprint readers, remote desktop software and data encryption tools are available.
Usage Requirements
Work out how often you’ll be using the computer for business. If the computer is mostly for home use and only occasionally for work, then a consumer PC with the appropriate work software and settings may be fine. On the other hand, a computer that is mostly for business use should be a business-class computer, not just for security but also build quality reasons.
Build quality and Reliability
It’s probably no surprise that consumer PCs don’t have the same build quality as business ones. In fact, consumer models have a lower expected lifespan – they just aren’t built to last. Business-class computers are built to last longer, with higher quality components and rigorous testing at every level. Most parts (if not all) are name-brand with an emphasis on reliability and long term durability.
Warranty and Service
Unfortunately when a consumer PC fails, the burden is on the owner to send it away for repairs, unless you have a special deal or have bought an extension to the normal warranty. The terms of the warranty will usually state that any other attempt to repair it will void that warranty. Repairs can then take weeks and often involve a frustrating process of paperwork and following up.
Contrast that with what happens when a business computer needs service – on a business warranty it is common for the manufacturer’s technicians to come to you and fix it – if not same day then next business day. If it has to go back to the manufacturer, the time away from you is much shorter than for a consumer warranty repair. Business users enjoy a professional experience with priority status and a dedicated support line, all designed to reduce down-time and get you operational, faster.
Talk to us today on 01455 209505 about choosing the right computer for your needs.
Share..Share on FacebookShare on Google+Tweet about this on TwitterShare on LinkedInPin on PinterestPrint this pageEmail this to someone
Free Antivirus – is it letting you down?
Free antivirus - is it good enough?
One of the best ways to avoid a computer virus is by using common sense, but that doesn’t mean you’ll be safe from attack. Even the most careful user can find themselves infected in an instant and spreading the virus faster than a sneeze in flu season. It’s why antivirus software is still the first package we install on all systems – because you never know when you’ll be attacked. But should you choose free or paid antivirus?
Advertising in the program
Much like a free mobile app making its fortune with in-app purchases, the free antivirus software will push for payment. Expect popup boxes pestering you to sign up to the paid version with some free options also trying to change your browser home page and default search engine, an inconvenience you may be stuck with. Paid options are more respectful and largely invisible unless they’ve detected a problem.
Effectiveness of free antivirus
It’s fair to expect your antivirus to detect malware, and testing showed that in a head-to-head battle free and paid are about equal at catching known infections – although some are better than others as you would expect. Unfortunately, free antivirus generally needs to have recorded a virus into its virus lists before it can detect it. Paid antivirus is more likely to identify and stop a new virus because it also bases the detection on suspicious behaviour, the source and its attributes, a far more effective method of detection.
Features in free versions
Free antivirus programs are usually created from the paid version, taking out everything except the bare minimum. In your free version, it is unlikely that you will have all the advanced features like spam filters, firewalls, parental controls and secure web browsing. Some paid antivirus will also update your other software packages, forming a more secure protection against attacks. For example, you might view a malicious image file that takes advantage of an exploit in your PDF software so anything that reminds you to update your PDF program is a good thing. Unfortunately, hackers have advanced beyond simple tactics and it’s not just about avoiding email attachments anymore.
Support
Free antivirus options are the most popular choice because they’re… free. Obviously. This also means there’s generally little or no support available. If there’s a problem or conflict, you may find yourself without protection until it can be resolved. Paid antivirus options usually include telephone support, ready to help with problems ranging from installation to system diagnostics.
Ease of use and flexibility
Depending on what you use your computer for, this may be an important concern. Free antivirus options are easy to install and use, but are very limited in their flexibility. They come as-is, meaning you can’t pick and choose what it monitors or how it reacts. For example, users occasionally find it necessary to disable ALL protections in order to install or play a network game. Paid versions are more likely to allow you to adapt the way the antivirus runs, switching features on and off as required e.g. many paid antivirus programs have a ‘gaming mode’ available, which restricts interference by the antivirus product.
Free antivirus is fine for very basic protection or those with an older PC. In these cases, something is always better than nothing. But we generally recommend that you go with a paid antivirus to defend you from the new attacks that are released daily, and to ensure you’ve got solid protection that will make a real difference to your digital safety.
If you want to upgrade to a paid antivirus, give us a call on 01455 209505.
Share..Share on FacebookShare on Google+Tweet about this on TwitterShare on LinkedInPin on PinterestPrint this pageEmail this to someone
Live Mail – time for an alternative?
Windows Live Mail
We see that many customers have Windows Live Mail, which is a very popular free email program that took over from the venerable old Outlook Express many years ago. However if you are still using Live Mail, its usefulness is becoming more limited so it may be a good time to look for an alternative email program.
Firstly, last year Microsoft made changes to their email systems which made Live Mail incompatible with their email infrastructure. This meant that the Microsoft email systems such as Hotmail, live.com, msn.com and outlook.com no longer worked with Live Mail.
Unfortunately, in January of 2017 Microsoft also stopped supporting the Live Mail program altogether, which meant that Live Mail no longer has the benefit of security or any other updates.
Those of you who are using different email accounts to the above may find that Live Mail is still happily collecting your emails, so you may feel that there isn’t an issue yet. The problem is that without security updates, the program itself is going to be more vulnerable and as email is one of the main conduits for viruses, malware and identity theft, it may not be a good idea to ignore the lack of updates for long.
Also, with no further updates Live Mail will effectively begin to become less reliable as more email providers update their email systems that Live Mail cannot support. Likewise, we are certainly seeing an increase in Live Mail issues and the question needs to be asked – is it worth fixing?
Alternative email programs
Windows 10 has a built-in app called ‘Mail’ (although some people consider it to still be a maturing product) however if you are not using Windows 10, then you will need to look elsewhere. Clearly Microsoft would love customers to use Outlook, which would also mean a subscription to their Office software suite.
Alternatively you can access emails online such as from Outlook.com and certainly many people do use the very popular online ‘Gmail’ service – but not everyone wants to use an internet browser for email, especially those that are comfortable using an email program.
Alternatives programs are available, such as the email program ‘Thunderbird’ which is one of the most popular free email programs around (from the makers of the ‘Firefox’ internet browser). There are other free programs such as ‘Operamail’ (from the makers of the ‘Opera’ internet browser), ‘Mailbird’ and others, but when choosing your next free email program do bear in mind that some programs are free because they add advertising or market research tracking, so some are better than others when it comes to privacy.
Luckily whichever email program you decide to choose, Live Mail stores emails in the industry standard .eml format, which means that it is fairly easy to transfer the emails from Live Mail into another program.
If you would like help in moving to another email program, please call 01455 209505.
Share..Share on FacebookShare on Google+Tweet about this on TwitterShare on LinkedInPin on PinterestPrint this pageEmail this to someone
How to spot a Tech Scam
avoiding computer scammers
If your computer had a virus, you’d want to know about it ASAP, right?
Before your important files become corrupted, you lose your photos and your digital life is essentially destroyed. Even thinking about it is terrifying.
Tech scammers know we’d be lost without our computers, and that we don’t always know what’s going on behind the screen – which is why they’ve been able to swindle millions from every day people across the world.
The scam goes like this:-
You receive a random phone call from someone with a heavy accent saying they’re from Microsoft, Talk Talk, BT or some other well-known company, or an alarming pop-up appears on the screen, saying it looks like your system has been infected with a virus.
The real Microsoft will never randomly call people like this. Ever.
To fix the problem, they need to you to download some support software, which they’ll give you a special link for.
A technician then uses that software to gain access to your system and make it appear your system is riddled with viruses. Flashing screens, mysterious diagnostics whizzing by, fabricated errors…they’ll do or say anything to make you panic. They’ll even go as far as claiming your system has been infected with illegal content and if not corrected, you’ll face criminal charges.
Demands for credit card information follow immediately after. Once paid, they simply stop fiddling with your system to make it seem the problem is fixed. To continue the scam, they’ll soon access your system to recreate the problem, this time offering a subscription for ongoing protection.
What To Do If You’re Targeted By A Tech Scam
1. Don’t taunt them. Just hang up. Right now you’re only a phone number in their system and they’ll move onto the next – if you give them cause to target you personally, you may find yourself in a worse situation.
1. If a pop-up appears, immediately run an anti-virus scan. Don’t click the pop-up or call the number.
What To Do If You’ve Already Been Scammed
It’s okay. It feels horrible, but you’re not alone and the situation can be corrected.
Call your financial institution and have the charges reversed and your card reissued. It’s easier than you might think and helps the authorities locate the scammers.
Then give us a call on 01455 209505 and we’ll make sure they no longer have access to your computer.
Share..Share on FacebookShare on Google+Tweet about this on TwitterShare on LinkedInPin on PinterestPrint this pageEmail this to someone
Potentially Unwanted Programs
Too many toolbars are PUPs
Everyone has heard of the term ‘computer virus’ and many people have also heard of the term ‘malware’. Unfortunately there is a less well-known term – a Potentially Unwanted Program (PUP).
This is software that may be clogging up your computer, yet is not classed as a virus or malware. They can cause problems when they are downloaded and installed, but what makes a PUP different is that when you install one, you are giving consent for the installation.
PUPs typically use up large amounts of system resources because they are running in the background and generally slow down your computer – sometimes drastically. From changing your search provider for no reason, adding toolbars to your internet browser or giving you pop-up adverts, PUPs can be annoying and troublesome. They are also easy to get.
Newer strains are information gatherers, providing data about your browsing habits and other information which is valuable to someone and the information is sent out for data collection purposes. Some are used to spread actual malware. Not all are as bad as this, but they all share an unwelcome trait – you are probably better off without them.
How do you get them?
Sometimes they piggy back onto other downloads, such as from software websites where there are bright green ‘Start Download’ buttons everywhere. You click on the button expecting one piece of free software and end up getting something else entirely or something in addition to what you expected.
It’s not just dodgy toolbars or free software designers either. Some big names bundle well-meaning PUPs in their downloads, for example Adobe Reader can give you the option to download an on-demand virus scanning program unless you spot it on the webpage, or a Java download asking if you want to install a toolbar, change your search engine or other setting when installing the program.
The more dodgy variety of PUP relies on you not wanting to read through the long licensing blurb displayed on the screen (the EULA). By clicking on the ‘Accept’ button, you are effectively giving them permission to install and in the case of the dodgy variety, protection from any legal action.
The question is that it’s easy to click away and miss something – you do need to watch what you click on.
Why do you get them?
“Free” software makers make money from them – for example, every toolbar installed earns them money.
Companies that give you the option to download them in addition to their own product, may also make money promoting the additional software.
PUPs are also friendly with each other, so when you get one it may bring along some of its PUP friends as well, to make some more money on the side.
Won’t my anti-virus program catch them?
Not necessarily. The issue is that technically, a PUP can be legal software in spite of the way it is used and some antivirus vendors choose to be strict about detecting them, whilst others are not so strict. Even if it is not switched on by default, many antivirus programs have a setting to configure the antivirus to look for PUPs, so it’s worth checking yours.
The important thing is to be watchful, especially when downloading and installing programs.
Share..Share on FacebookShare on Google+Tweet about this on TwitterShare on LinkedInPin on PinterestPrint this pageEmail this to someone
Computer Recovery – for when disaster strikes
Recovering your computer
Windows 10 and Windows 8 have a built-in facility to refresh/reset your computer if you have a major problem, so you can reinstall Windows and use your computer if the worst happens. The problem is that Windows 10 has only 25% market share (as at February 2017) and Windows 8 has even less, 8% – compared to Windows 7 that still has 48% of the market. So if you still have Windows 7, how would you reinstall it?
In the past when you bought a new computer, it came with DVD discs called ‘Recovery discs’ which contained a copy of Windows software that the manufacturer put on the computer at the factory. These discs were used as a last resort to reinstall Windows and basically put the computer back to the state that it was in fresh out of the factory (that is without your own files such as photographs, etc.) should it be necessary.
In recent years, most computer manufacturers stopped supplying these Recovery discs and instead placed a copy (called an ‘image’) on a part of the computer hard drive. So long as the hard drive and/or the information on it are intact, then you can reinstall Windows using that image instead of a Recovery disc.
If there is something wrong with the hard drive itself, you are stuck with no way of repairing your computer without paying for the manufacturer to send you out a Recovery disc and waiting for it to arrive, sometimes taking weeks. Or worse still, buying a copy of the operating system again.
Luckily, manufacturers put a program on computers that allow you to create a Recovery image automatically. By creating this Recovery image, you are giving yourself that extra chance of reinstalling Windows on your computer, without more cost and delays.
Unfortunately we find that most people do not make this Recovery backup, so we strongly recommend that you find the program on your computer now and create a Recovery image as soon as you can. It’s never too late to get that extra peace of mind and you may be glad that you did.
If you would like help to create recovery images, give us a call on 01455 209505. We’d be happy to help.
Share..Share on FacebookShare on Google+Tweet about this on TwitterShare on LinkedInPin on PinterestPrint this pageEmail this to someone
What does Cloud computing mean?
Cloud computing and storage
The I.T. world is full of jargon but it’s surprising the number of people we deal with who have heard of the term “Cloud” computing, but still do not know what it means….and how it could benefit them.
Essentially, when people talk about “Cloud” computing they are talking about a method to store your files on special servers on the internet, instead of just on your computer. Saving them “on the Cloud”.
That way, if something bad happened to your computer, copies of your files would be safely tucked away somewhere else where you could still access them even if you could not use your computer.
Is it just online storage?
It is more than that, as your files could be accessible to you whenever and wherever you may be, so you are not tied down to have to be sitting at your computer to access them. One of the most well-known (and copied) ‘Cloud’ services is from a company called Dropbox.
Here is the way it works – you open an account (which is free up to a certain level of storage) and you install their program. This creates a folder on your computer and if you save something (a photo, document or whatever) in that folder, not only will it be saved on your computer, but also a copy is automatically sent to a secure server for safekeeping.
You don’t have to do anything special or anything that you do not already do – all you need to remember is to save your work in the cloud folder. You can make changes, share the file with other people – you can even do something at work and carry on with it when you get home. And vice versa.
For home users, it’s a great way to back up your important files without having to go through the hassle of setting up backup plans to an external hard drive – it’s automatic.
I’m not sure about saving my files there – is it secure?
Well, governments use it and it’s fair to say that the security at data centres where this is stored, is some of the hardest security around. Although nothing online can be guaranteed to be 100% secure, great lengths are taken to protect the information, including copies in more than one place so if one data centre has a problem, another can take over.
So the term ‘Cloud’ can do more for you than you realise and can be an inexpensive lifesaver – especially for businesses.
If you want help setting up a ‘Cloud’ storage system, please give us a call on 01455 209505.
Share..Share on FacebookShare on Google+Tweet about this on TwitterShare on LinkedInPin on PinterestPrint this pageEmail this to someone
Windows 10 Privacy
Windows 10 privacy
Since Windows 10 was released, much has been said about the privacy concerns that come with it. Admittedly, some of the concerns have been exaggerated but there is no doubt that Windows 10 collects much more data about you than any other Windows version before it.
One of the concerns relates to ‘Cortana’ the “personal assistant”. Like Apple’s ‘Siri’, ‘Cortana’ collects personal information such as calendar, contacts, location, alarm settings, what websites you view, emails, and more. When you add it all up, there is quite a lot of information about you.
Why are they collecting this much information?
They say that it is to “better serve you”, such as being able to suggest a restaurant nearby, but ultimately it is also advertising data collection. Each account with an email is given an Advertising ID and a profile is created that is shared with Microsoft partner advert networks.
Similarly, OneDrive the online storage service, synchs every time you switch on and gets updates of your internet browsing and wifi details. Even your location is noted by the operating system and the information is passed to “trusted” third parties.
Everyone thinks differently about their privacy – one person may feel that ‘Cortana’ being able to suggest a local restaurant is good enough reason for so much data collection, but another person may feel it’s a little too much.
To be fair, it’s not just Windows 10 though – ‘Siri’ keeps voice recordings for much longer than you would think as back in 2013 Apple announced that they were keeping your ‘Siri’ voice recordings for two years. The digital age has its drawbacks.
What can you do about more control over your privacy?
Go to Start Menu > Settings and open the Privacy section, to look carefully at all the settings that can be switched on or off – there are quite a few of them and some settings may be useful to you, others not so much.
Also, you can still have a local account on your Windows 10 computer rather than one controlled by your email address, which controls the automatic synching of your information.
Microsoft have now taken the privacy concerns seriously and in the so-called ‘Creators Update’ for Windows 10 that is due in the first half of 2017, the privacy settings will be much clearer, simpler and transparent, including a new privacy dashboard which will be where you can have much more control over your information, all in one place.
In the meantime, there’s no need to be looking over your shoulder for big brother, but you do need to at least be aware that a lot of information is collected about you and what you do every day with your computer.
Share..Share on FacebookShare on Google+Tweet about this on TwitterShare on LinkedInPin on PinterestPrint this pageEmail this to someone
|
{
"url": "http://www.cshcomputerservices.com/author/chrisback/page/5/",
"source_domain": "www.cshcomputerservices.com",
"snapshot_id": "crawl=CC-MAIN-2017-51",
"warc_metadata": {
"Content-Length": "115543",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:GVUZLFF7DUVGYXRJE2B7YMOPZAMWL67Z",
"WARC-Concurrent-To": "<urn:uuid:fda4a5cd-7875-4d5d-b2de-1e88805608e0>",
"WARC-Date": "2017-12-16T03:26:05Z",
"WARC-IP-Address": "31.170.127.240",
"WARC-Identified-Payload-Type": "text/html",
"WARC-Payload-Digest": "sha1:PAWFZSKUUDW3RWOVBZCAB7UPL7WW4DDD",
"WARC-Record-ID": "<urn:uuid:8e43e443-8c8d-4647-9924-ac82f97a0734>",
"WARC-Target-URI": "http://www.cshcomputerservices.com/author/chrisback/page/5/",
"WARC-Truncated": "length",
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:f3137685-7f3a-4bfe-a1cc-ee54552eb9cf>"
},
"warc_info": "robots: classic\r\nhostname: ip-10-67-195-241.ec2.internal\r\nsoftware: Nutch 1.6 (CC)\r\nisPartOf: CC-MAIN-2017-51\r\noperator: Common Crawl Admin\r\ndescription: Wide crawl of the web for December 2017\r\npublisher: Common Crawl\r\nformat: WARC File Format 1.0\r\nconformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf"
}
|
{
"line_start_idx": [
0,
32,
33,
64,
65,
95,
96,
415,
416,
622,
623,
781,
782,
815,
816,
1366,
1367,
1638,
1639,
1690,
1691,
1887,
1888,
2205,
2206,
2676,
2677,
2724,
2725,
2898,
2899,
3093,
3094,
3230,
3231,
3419,
3420,
3557,
3558,
3584,
3585,
3601,
3602,
3827,
3828,
4072,
4073,
4468,
4469,
4536,
4537,
4566,
4567,
5072,
5073,
5215,
5216,
5233,
5234,
5732,
5733,
5753,
5754,
6055,
6056,
6225,
6226,
6355,
6356,
6494,
6495,
6731,
6732,
6957,
6958,
7131,
7132,
7198,
7199,
7336,
7337,
7398,
7399,
7436,
7437,
7647,
7648,
7965,
7966,
7990,
7991,
8324,
8325,
8613,
8614,
8633,
8634,
9000,
9001,
9031,
9032,
9434,
9435,
9456,
9457,
9842,
9843,
10337,
10338,
10421,
10422,
10559,
10560,
10601,
10602,
10638,
10639,
11069,
11070,
11097,
11098,
11508,
11509,
11541,
11542,
12079,
12080,
12106,
12107,
12792,
12793,
12801,
12802,
13190,
13191,
13219,
13220,
13844,
13845,
14198,
14199,
14275,
14276,
14413,
14414,
14451,
14452,
14470,
14471,
14784,
14785,
15045,
15046,
15235,
15236,
15657,
15658,
15950,
15951,
15978,
15979,
16293,
16294,
16560,
16561,
17081,
17082,
17294,
17295,
17380,
17381,
17518,
17519,
17543,
17544,
17571,
17572,
17643,
17644,
17797,
17798,
18010,
18011,
18037,
18038,
18293,
18294,
18362,
18363,
18478,
18479,
18858,
18859,
19150,
19151,
19196,
19197,
19413,
19518,
19519,
19561,
19562,
19649,
19650,
19816,
19817,
19918,
19919,
20056,
20057,
20087,
20088,
20115,
20116,
20305,
20306,
20574,
20575,
20923,
20924,
21270,
21271,
21292,
21293,
21589,
21590,
21978,
21979,
22274,
22275,
22381,
22382,
22403,
22404,
22505,
22506,
22647,
22648,
22797,
22798,
22838,
22839,
23204,
23205,
23297,
23298,
23435,
23436,
23482,
23483,
23508,
23509,
23921,
23922,
24347,
24348,
24659,
24660,
24952,
24953,
25207,
25208,
25487,
25488,
25593,
25594,
25731,
25732,
25764,
25765,
25793,
25794,
25995,
25996,
26200,
26201,
26394,
26395,
26422,
26423,
26691,
26692,
27050,
27051,
27344,
27345,
27521,
27522,
27579,
27580,
27935,
27936,
28058,
28059,
28152,
28153,
28290,
28291,
28310,
28311,
28330,
28331,
28596,
28597,
28892,
28893,
28940,
28941,
29224,
29225,
29476,
29477,
29706,
29707,
29954,
29955,
30009,
30010,
30229,
30230,
30408,
30409,
30752,
30753,
30968,
30969
],
"line_end_idx": [
32,
33,
64,
65,
95,
96,
415,
416,
622,
623,
781,
782,
815,
816,
1366,
1367,
1638,
1639,
1690,
1691,
1887,
1888,
2205,
2206,
2676,
2677,
2724,
2725,
2898,
2899,
3093,
3094,
3230,
3231,
3419,
3420,
3557,
3558,
3584,
3585,
3601,
3602,
3827,
3828,
4072,
4073,
4468,
4469,
4536,
4537,
4566,
4567,
5072,
5073,
5215,
5216,
5233,
5234,
5732,
5733,
5753,
5754,
6055,
6056,
6225,
6226,
6355,
6356,
6494,
6495,
6731,
6732,
6957,
6958,
7131,
7132,
7198,
7199,
7336,
7337,
7398,
7399,
7436,
7437,
7647,
7648,
7965,
7966,
7990,
7991,
8324,
8325,
8613,
8614,
8633,
8634,
9000,
9001,
9031,
9032,
9434,
9435,
9456,
9457,
9842,
9843,
10337,
10338,
10421,
10422,
10559,
10560,
10601,
10602,
10638,
10639,
11069,
11070,
11097,
11098,
11508,
11509,
11541,
11542,
12079,
12080,
12106,
12107,
12792,
12793,
12801,
12802,
13190,
13191,
13219,
13220,
13844,
13845,
14198,
14199,
14275,
14276,
14413,
14414,
14451,
14452,
14470,
14471,
14784,
14785,
15045,
15046,
15235,
15236,
15657,
15658,
15950,
15951,
15978,
15979,
16293,
16294,
16560,
16561,
17081,
17082,
17294,
17295,
17380,
17381,
17518,
17519,
17543,
17544,
17571,
17572,
17643,
17644,
17797,
17798,
18010,
18011,
18037,
18038,
18293,
18294,
18362,
18363,
18478,
18479,
18858,
18859,
19150,
19151,
19196,
19197,
19413,
19518,
19519,
19561,
19562,
19649,
19650,
19816,
19817,
19918,
19919,
20056,
20057,
20087,
20088,
20115,
20116,
20305,
20306,
20574,
20575,
20923,
20924,
21270,
21271,
21292,
21293,
21589,
21590,
21978,
21979,
22274,
22275,
22381,
22382,
22403,
22404,
22505,
22506,
22647,
22648,
22797,
22798,
22838,
22839,
23204,
23205,
23297,
23298,
23435,
23436,
23482,
23483,
23508,
23509,
23921,
23922,
24347,
24348,
24659,
24660,
24952,
24953,
25207,
25208,
25487,
25488,
25593,
25594,
25731,
25732,
25764,
25765,
25793,
25794,
25995,
25996,
26200,
26201,
26394,
26395,
26422,
26423,
26691,
26692,
27050,
27051,
27344,
27345,
27521,
27522,
27579,
27580,
27935,
27936,
28058,
28059,
28152,
28153,
28290,
28291,
28310,
28311,
28330,
28331,
28596,
28597,
28892,
28893,
28940,
28941,
29224,
29225,
29476,
29477,
29706,
29707,
29954,
29955,
30009,
30010,
30229,
30230,
30408,
30409,
30752,
30753,
30968,
30969,
31105
]
}
|
{
"red_pajama_v2": {
"ccnet_original_length": 31105,
"ccnet_original_nlines": 325,
"rps_doc_curly_bracket": 0,
"rps_doc_ldnoobw_words": 0,
"rps_doc_lorem_ipsum": 0,
"rps_doc_stop_word_fraction": 0.49226006865501404,
"rps_doc_ut1_blacklist": 0,
"rps_doc_frac_all_caps_words": 0.005214270204305649,
"rps_doc_frac_lines_end_with_ellipsis": 0,
"rps_doc_frac_no_alph_words": 0.1284015029668808,
"rps_doc_frac_unique_words": 0.23863421380519867,
"rps_doc_mean_word_length": 4.72891902923584,
"rps_doc_num_sentences": 245,
"rps_doc_symbol_to_word_ratio": 0.0004888399853371084,
"rps_doc_unigram_entropy": 5.975042819976807,
"rps_doc_word_count": 5301,
"rps_doc_frac_chars_dupe_10grams": 0.05022339150309563,
"rps_doc_frac_chars_dupe_5grams": 0.06426519900560379,
"rps_doc_frac_chars_dupe_6grams": 0.05652625113725662,
"rps_doc_frac_chars_dupe_7grams": 0.052138179540634155,
"rps_doc_frac_chars_dupe_8grams": 0.05022339150309563,
"rps_doc_frac_chars_dupe_9grams": 0.05022339150309563,
"rps_doc_frac_chars_top_2gram": 0.004786979872733355,
"rps_doc_frac_chars_top_3gram": 0.009972870349884033,
"rps_doc_frac_chars_top_4gram": 0.010770699940621853,
"rps_doc_books_importance": -2526.744384765625,
"rps_doc_books_importance_length_correction": -2526.744384765625,
"rps_doc_openwebtext_importance": -1390.0169677734375,
"rps_doc_openwebtext_importance_length_correction": -1390.0169677734375,
"rps_doc_wikipedia_importance": -663.2615966796875,
"rps_doc_wikipedia_importance_length_correction": -663.2615966796875
},
"fasttext": {
"dclm": 0.06261379271745682,
"english": 0.951678454875946,
"fineweb_edu_approx": 1.9774150848388672,
"eai_general_math": 0.09151207655668259,
"eai_open_web_math": 0.13455229997634888,
"eai_web_code": 0.04107611998915672
}
}
|
{
"free_decimal_correspondence": {
"primary": {
"code": "004.02",
"labels": {
"level_1": "General works, books and libraries, information sciences",
"level_2": "",
"level_3": "Computers and Computer science"
}
},
"secondary": {
"code": "005.457",
"labels": {
"level_1": "General works, books and libraries, information sciences",
"level_2": "",
"level_3": "Computer programming"
}
}
},
"bloom_cognitive_process": {
"primary": {
"code": "2",
"label": "Understand"
},
"secondary": {
"code": "3",
"label": "Apply"
}
},
"bloom_knowledge_domain": {
"primary": {
"code": "2",
"label": "Conceptual"
},
"secondary": {
"code": "3",
"label": "Procedural"
}
},
"document_type_v1": {
"primary": {
"code": "3",
"label": "Reference/Encyclopedic/Educational"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"extraction_artifacts": {
"primary": {
"code": "3",
"label": "Irrelevant Content"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"missing_content": {
"primary": {
"code": "0",
"label": "No missing content"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"document_type_v2": {
"primary": {
"code": "10",
"label": "Knowledge Article"
},
"secondary": {
"code": "6",
"label": "Content Listing"
}
},
"reasoning_depth": {
"primary": {
"code": "2",
"label": "Basic Reasoning"
},
"secondary": {
"code": "3",
"label": "Intermediate Reasoning"
}
},
"technical_correctness": {
"primary": {
"code": "3",
"label": "Mostly Correct"
},
"secondary": {
"code": "4",
"label": "Highly Correct"
}
},
"education_level": {
"primary": {
"code": "1",
"label": "General Audience"
},
"secondary": {
"code": "2",
"label": "High School Level"
}
}
}
|
672f1e42c33a7f9846924a2431ea77df
|
3,476,255,687,123,155,500 |
[SOLVED] Should I upgrade and old laptop or just buy a newer one
Jan 26, 2019
2
0
10
0
Hi, I currently have and HP ENVY dv7-7243nr and I was wondering if I should upgrade it or buy a newer Dell Precision M4800. I want to have something that will be able to do just some light gaming and some productivity work. It would be $200 less to upgrade the HP, but the Dell would have a better CPU and a dedicated GPU. I was wondering if the Dell would be worth $200 more. Thank you for the help!
Here are the specifications of the HP ENVY dv7:
CPU: Intel Core i5-3210M Dual-Core CPU @ 2.50GHz
Memory: 8GB DDR3-1333MHz Dual-Channel RAM
Storage: KINGSTON A400 120GB SATA-III SSD
Graphics: Intel HD Graphics 4000
Here are the upgrades that I would make to it if I were to upgrade it and not buy a new laptop:
Intel Core i7-3630QM Quad-Core CPU @ 2.40GHz: $110
CORSAIR Vengeance 16GB DDR3-1600MHz SDRAM: $82
New Backlit Keyboard: $55
Total: $247
Here are the specifications for the Dell Precision M4800:
CPU: Intel Core i7-4900MQ Quad-Core CPU @ 2.80GHz
Memory: 16GB Dual-Channel DDR3-1600MHz SDRAM
Storage: SanDisk SSD Plus 240GB SATA-III Solid State Drive
Graphics: NVIDIA Quadro K2100M 2GB GDDR5
Keyboard: Full-Sized with Backlight
Cost: $450
ASK THE COMMUNITY
TRENDING THREADS
|
{
"url": "https://forums.tomshardware.com/threads/should-i-upgrade-and-old-laptop-or-just-buy-a-newer-one.3439265/",
"source_domain": "forums.tomshardware.com",
"snapshot_id": "crawl=CC-MAIN-2021-43",
"warc_metadata": {
"Content-Length": "160574",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:GSTL5BHHH6EQGM6JRD4TI6FRGCHQE5Y6",
"WARC-Concurrent-To": "<urn:uuid:8c200e87-a3c0-409d-99c7-1c41049a91e8>",
"WARC-Date": "2021-10-24T00:31:58Z",
"WARC-IP-Address": "99.84.102.125",
"WARC-Identified-Payload-Type": "text/html",
"WARC-Payload-Digest": "sha1:IK2VXRGX6EHEWB5FBUO4VYGDB4UAC4M3",
"WARC-Record-ID": "<urn:uuid:3110320f-50dc-4ab5-a9ef-3792d20134c7>",
"WARC-Target-URI": "https://forums.tomshardware.com/threads/should-i-upgrade-and-old-laptop-or-just-buy-a-newer-one.3439265/",
"WARC-Truncated": null,
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:99bd6afb-0a58-4887-95fb-44f0b65f3530>"
},
"warc_info": "isPartOf: CC-MAIN-2021-43\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for October 2021\r\noperator: Common Crawl Admin ([email protected])\r\nhostname: ip-10-67-67-149\r\nsoftware: Apache Nutch 1.18 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.2-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: https://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/"
}
|
{
"line_start_idx": [
0,
65,
66,
79,
81,
83,
86,
88,
489,
490,
538,
539,
588,
630,
672,
705,
706,
802,
803,
854,
901,
927,
939,
940,
998,
999,
1049,
1094,
1153,
1194,
1230,
1241,
1242,
1244,
1245,
1263,
1264
],
"line_end_idx": [
65,
66,
79,
81,
83,
86,
88,
489,
490,
538,
539,
588,
630,
672,
705,
706,
802,
803,
854,
901,
927,
939,
940,
998,
999,
1049,
1094,
1153,
1194,
1230,
1241,
1242,
1244,
1245,
1263,
1264,
1280
]
}
|
{
"red_pajama_v2": {
"ccnet_original_length": 1280,
"ccnet_original_nlines": 36,
"rps_doc_curly_bracket": 0,
"rps_doc_ldnoobw_words": 0,
"rps_doc_lorem_ipsum": 0,
"rps_doc_stop_word_fraction": 0.2593856751918793,
"rps_doc_ut1_blacklist": 0,
"rps_doc_frac_all_caps_words": 0.19112628698349,
"rps_doc_frac_lines_end_with_ellipsis": 0,
"rps_doc_frac_no_alph_words": 0.24573378264904022,
"rps_doc_frac_unique_words": 0.5727272629737854,
"rps_doc_mean_word_length": 4.504545211791992,
"rps_doc_num_sentences": 9,
"rps_doc_symbol_to_word_ratio": 0,
"rps_doc_unigram_entropy": 4.611467361450195,
"rps_doc_word_count": 220,
"rps_doc_frac_chars_dupe_10grams": 0,
"rps_doc_frac_chars_dupe_5grams": 0,
"rps_doc_frac_chars_dupe_6grams": 0,
"rps_doc_frac_chars_dupe_7grams": 0,
"rps_doc_frac_chars_dupe_8grams": 0,
"rps_doc_frac_chars_dupe_9grams": 0,
"rps_doc_frac_chars_top_2gram": 0.012108979746699333,
"rps_doc_frac_chars_top_3gram": 0.030272450298070908,
"rps_doc_frac_chars_top_4gram": 0.030272450298070908,
"rps_doc_books_importance": -116.37345123291016,
"rps_doc_books_importance_length_correction": -116.37345123291016,
"rps_doc_openwebtext_importance": -58.293701171875,
"rps_doc_openwebtext_importance_length_correction": -58.293701171875,
"rps_doc_wikipedia_importance": -40.21281814575195,
"rps_doc_wikipedia_importance_length_correction": -40.21281814575195
},
"fasttext": {
"dclm": 0.06002641096711159,
"english": 0.894817054271698,
"fineweb_edu_approx": 1.0798566341400146,
"eai_general_math": 0.018613699823617935,
"eai_open_web_math": 0.05201828107237816,
"eai_web_code": 0.017239930108189583
}
}
|
{
"free_decimal_correspondence": {
"primary": {
"code": "004.16",
"labels": {
"level_1": "General works, books and libraries, information sciences",
"level_2": "",
"level_3": "Computers and Computer science"
}
},
"secondary": {
"code": "-1",
"labels": {
"level_1": "",
"level_2": "",
"level_3": ""
}
}
},
"bloom_cognitive_process": {
"primary": {
"code": "5",
"label": "Evaluate"
},
"secondary": {
"code": "3",
"label": "Apply"
}
},
"bloom_knowledge_domain": {
"primary": {
"code": "1",
"label": "Factual"
},
"secondary": {
"code": "2",
"label": "Conceptual"
}
},
"document_type_v1": {
"primary": {
"code": "5",
"label": "Social/Forum"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"extraction_artifacts": {
"primary": {
"code": "0",
"label": "No Artifacts"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"missing_content": {
"primary": {
"code": "0",
"label": "No missing content"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"document_type_v2": {
"primary": {
"code": "18",
"label": "Q&A Forum"
},
"secondary": {
"code": "21",
"label": "Customer Support"
}
},
"reasoning_depth": {
"primary": {
"code": "2",
"label": "Basic Reasoning"
},
"secondary": {
"code": "3",
"label": "Intermediate Reasoning"
}
},
"technical_correctness": {
"primary": {
"code": "3",
"label": "Mostly Correct"
},
"secondary": {
"code": "4",
"label": "Highly Correct"
}
},
"education_level": {
"primary": {
"code": "2",
"label": "High School Level"
},
"secondary": {
"code": "1",
"label": "General Audience"
}
}
}
|
672f1e42c33a7f9846924a2431ea77df
|
1,493,449,813,811,390,200 |
Tag Archives: IPv6
Mobile IPv6 Tax?
Recently a Tweet from Dean Bubly got me thinking about how data is charged in cellular:
In the cellular world, subscribers are charged for data from the IP, transport and applications layers; this means you pay for the IP header, you pay for the TCP/UDP header, and you pay for the contents (the cat videos it contains).
This also means if an operator moves mobile subscribers from IPv4 to IPv6, there’s an extra 20 bytes the customer is charged for for every packet sent / received, which the customer is charged for – This is because the IPv6 header is longer than the IPv4 header.
Source: ServerFault - https://serverfault.com/questions/547768/ipv4-header-vs-ipv6-header-size
In most cases, mobile subs don’t get a choice as to if their connection is IPv4 or IPv6, but on a like for like basis, we can say that if a customer moves is on IPv6 every packet sent/received will have an extra 20 bytes of data consumed compared to IPv4.
This means subscribers use more data on IPv6, and this means they get charged for more data on IPv6.
For IoT applications, light users and PAYG users, this extra 20 bytes per packet could add up to something significant – But how much?
We can quantify this, but we’d need to know the number of packets sent on average, and the quantity of the data transferred, because the number of packets is the multiplier here.
So for starters I’ve left a phone on the desk, it’s registered to the network but just sitting in Idle mode – This is an engineering phone from an OEM, it’s just used for testing so doesn’t have anything loaded onto it in terms of apps, it’s not signed into any applications, or checking in the background, so I thought I’d try something more realistic.
So to get a clearer picture, I chucked a SIM in my regular everyday phone I use personally, registered it to the cellular lab I have here. For the next hour I sniffed the GTP traffic for the phone while it was sitting on my desk, not touching the phone, and here’s what I’ve got:
Overall the PCAP includes 6,417,732 bytes of data, but this includes the transport and GTP headers, meaning we can drop everything above it in our traffic calculations.
Everything except the data encapsulated in GTP can be dropped
For this I’ve got 14 bytes of ethernet, 20 bytes IP, 8 bytes UDP and 5 bytes for TZSP (this is to copy the traffic from the eNB to my local machine), then we’ve got the transport from the eNB to the SGW, 14 bytes of ethernet again, 20 bytes of IP , 8 bytes of UDP and 8 bytes of GTP then the payload itself. Phew.
All this means we can drop 97 bytes off every packet.
We have 16,889 packets, 6,417,732 bytes in total, minus 97 bytes from each gives us 1,638,233 of headers to drop (~1.6MB) giving us a total of 4.556 MB traffic to/from the phone itself.
This means my Android phone consumes 4.5 MB of cellular data in an hour while sitting on the desk, with 16,889 packets in/out.
Okay, now we’re getting somewhere!
So now we can answer the question, if each of these 16k packets was IPv6, rather than IPv4, we’d be adding another 20 bytes to each of them, 20 bytes x 16,889 packets gives 337,780 bytes (~0.3MB) to add to the total.
If this traffic was transferred via IPv6, rather than IPv4, we’d be looking at adding 20 bytes to each of the 16,889 packets, which would equate to 0.3MB extra, or about 7% overhead compared to IPv4.
But before you go on about what an outrage this IPv6 transport is, being charged for those extra bytes, that’s only one part of the picture.
There’s a reason operators are finally embracing IPv6, and it’s not to put an extra 7% of traffic on the network (I think if you asked most capacity planners, they’d say they want data savings, not growth).
IPv6 is, for lack of a better term, less rubbish than IPv4.
There’s a lot of drivers for IPv6, and some of these will reduce data consumption.
IPv6 is actually your stuff talking directly to the remote stuff, this means that we don’t need to rely on NAT, so no need to do NAT keepalives, and opening new sessions, which is going to save you data. If you’re running apps that need to keep a connection to somewhere alive, these data savings could negate your IPv6 overhead costs.
Will these potential data savings when using IPv6 outweigh the costs?
That’s going to depend on your use case.
If you’ve extremely bandwidth / data constrained, for example, you have an IoT device on an NTN / satellite connection, that was having to Push data every X hours via IPv4 because you couldn’t pull data from it as it had no public IP, then moving it to IPv6 so you can pull the data on the public IP, on demand, will save you data. That’s a win with IPv6.
If you’re a mobile user, watching YouTube, getting push notifications and using your phone like a normal human, probably not, but if you’re using data like a normal user, you’ve probably got a sizable data allowance that you don’t end up fully consuming, and the extra 20 bytes per packet will be nothing in comparison to the data used to watch a 2k video on your small phone screen.
|
{
"url": "https://nickvsnetworking.com/tag/ipv6/",
"source_domain": "nickvsnetworking.com",
"snapshot_id": "CC-MAIN-2024-26",
"warc_metadata": {
"Content-Length": "38506",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:MOW5RMJ4AGVFYUNLIKR6BUVGUP24BFMM",
"WARC-Concurrent-To": "<urn:uuid:f9f0084b-0234-4cd3-8c1c-5608777cefe1>",
"WARC-Date": "2024-06-19T20:09:53Z",
"WARC-IP-Address": "104.21.48.141",
"WARC-Identified-Payload-Type": "text/html",
"WARC-Payload-Digest": "sha1:IUJZYYLLA5IGEZ7XN7ZZSXBWKOK43F2P",
"WARC-Record-ID": "<urn:uuid:0fce02ed-6cea-4fda-b576-d2152e484f40>",
"WARC-Target-URI": "https://nickvsnetworking.com/tag/ipv6/",
"WARC-Truncated": null,
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:d9431f5d-4895-47aa-b0c4-89f1b094dda5>"
},
"warc_info": "isPartOf: CC-MAIN-2024-26\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for June 2024\r\noperator: Common Crawl Admin ([email protected])\r\nhostname: ip-10-67-67-115\r\nsoftware: Apache Nutch 1.20 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.5-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: https://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/"
}
|
{
"line_start_idx": [
0,
19,
20,
37,
38,
126,
127,
360,
361,
624,
625,
720,
721,
977,
978,
1079,
1080,
1215,
1216,
1395,
1396,
1750,
1751,
2031,
2032,
2201,
2202,
2264,
2265,
2579,
2633,
2634,
2820,
2821,
2948,
2949,
2984,
2985,
3202,
3203,
3403,
3404,
3545,
3546,
3753,
3754,
3814,
3815,
3898,
4234,
4235,
4305,
4306,
4347,
4348,
4704,
4705
],
"line_end_idx": [
19,
20,
37,
38,
126,
127,
360,
361,
624,
625,
720,
721,
977,
978,
1079,
1080,
1215,
1216,
1395,
1396,
1750,
1751,
2031,
2032,
2201,
2202,
2264,
2265,
2579,
2633,
2634,
2820,
2821,
2948,
2949,
2984,
2985,
3202,
3203,
3403,
3404,
3545,
3546,
3753,
3754,
3814,
3815,
3898,
4234,
4235,
4305,
4306,
4347,
4348,
4704,
4705,
5088
]
}
|
{
"red_pajama_v2": {
"ccnet_original_length": 5088,
"ccnet_original_nlines": 56,
"rps_doc_curly_bracket": 0,
"rps_doc_ldnoobw_words": 0,
"rps_doc_lorem_ipsum": 0,
"rps_doc_stop_word_fraction": 0.43474504351615906,
"rps_doc_ut1_blacklist": 0,
"rps_doc_frac_all_caps_words": 0.0337078683078289,
"rps_doc_frac_lines_end_with_ellipsis": 0,
"rps_doc_frac_no_alph_words": 0.19533276557922363,
"rps_doc_frac_unique_words": 0.36996737122535706,
"rps_doc_mean_word_length": 4.336235046386719,
"rps_doc_num_sentences": 35,
"rps_doc_symbol_to_word_ratio": 0,
"rps_doc_unigram_entropy": 5.23337984085083,
"rps_doc_word_count": 919,
"rps_doc_frac_chars_dupe_10grams": 0,
"rps_doc_frac_chars_dupe_5grams": 0.04165621101856232,
"rps_doc_frac_chars_dupe_6grams": 0.012045170180499554,
"rps_doc_frac_chars_dupe_7grams": 0,
"rps_doc_frac_chars_dupe_8grams": 0,
"rps_doc_frac_chars_dupe_9grams": 0,
"rps_doc_frac_chars_top_2gram": 0.015809280797839165,
"rps_doc_frac_chars_top_3gram": 0.012045170180499554,
"rps_doc_frac_chars_top_4gram": 0.009033880196511745,
"rps_doc_books_importance": -440.9687805175781,
"rps_doc_books_importance_length_correction": -440.9687805175781,
"rps_doc_openwebtext_importance": -262.6898498535156,
"rps_doc_openwebtext_importance_length_correction": -262.6898498535156,
"rps_doc_wikipedia_importance": -154.01771545410156,
"rps_doc_wikipedia_importance_length_correction": -154.01771545410156
},
"fasttext": {
"dclm": 0.14675456285476685,
"english": 0.9137684106826782,
"fineweb_edu_approx": 2.1671228408813477,
"eai_general_math": 0.6339085698127747,
"eai_open_web_math": 0.06261467933654785,
"eai_web_code": 0.41795456409454346
}
}
|
{
"free_decimal_correspondence": {
"primary": {
"code": "004.67",
"labels": {
"level_1": "General works, books and libraries, information sciences",
"level_2": "",
"level_3": "Computers and Computer science"
}
},
"secondary": {
"code": "004.6",
"labels": {
"level_1": "General works, books and libraries, information sciences",
"level_2": "",
"level_3": "Computers and Computer science"
}
}
},
"bloom_cognitive_process": {
"primary": {
"code": "4",
"label": "Analyze"
},
"secondary": {
"code": "2",
"label": "Understand"
}
},
"bloom_knowledge_domain": {
"primary": {
"code": "2",
"label": "Conceptual"
},
"secondary": {
"code": "3",
"label": "Procedural"
}
},
"document_type_v1": {
"primary": {
"code": "3",
"label": "Reference/Encyclopedic/Educational"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"extraction_artifacts": {
"primary": {
"code": "0",
"label": "No Artifacts"
},
"secondary": {
"code": "3",
"label": "Irrelevant Content"
}
},
"missing_content": {
"primary": {
"code": "0",
"label": "No missing content"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"document_type_v2": {
"primary": {
"code": "16",
"label": "Personal Blog"
},
"secondary": {
"code": "10",
"label": "Knowledge Article"
}
},
"reasoning_depth": {
"primary": {
"code": "3",
"label": "Intermediate Reasoning"
},
"secondary": {
"code": "2",
"label": "Basic Reasoning"
}
},
"technical_correctness": {
"primary": {
"code": "3",
"label": "Mostly Correct"
},
"secondary": {
"code": "4",
"label": "Highly Correct"
}
},
"education_level": {
"primary": {
"code": "3",
"label": "Undergraduate Level"
},
"secondary": {
"code": "2",
"label": "High School Level"
}
}
}
|
672f1e42c33a7f9846924a2431ea77df
|
5,885,602,054,834,719,000 |
You are here: HomeHTML LanguageHTML TutorialHTML MARQUEE
by Dinesh Thakur Category: HTML
What is HTML?At its most fundamental, Hypertext Markup Language (HTML) is a set of special codes that you embed in text to add formatting and linking information. HTML is based on Standard Generalized Markup Language (SGML). By convention, all HTML information begins with an open angle bracket (<) and ends with a closing angle bracket (>), for example, <html>.
This tag tells an HTML interpreter (browser) that the document is written and marked up in standard HTML. An example of an HTML interpreter would be Microsoft’s Internet Explorer, available for free from the Microsoft Web site; pop over to www.microsoft.com/ie/ to get your copy.
Although a small number of HTML tags are stand-alone entities, the majority are paired, with beginning and end tags. The beginning tag is called the open tag, and the end tag is called the close tag.
The most basic of all tags is the, <html>, which indicates that the information that follows is written in HTML. The <html> tag is a paired tag, however, so you need to add a close tag at the end of the document, which is the same as the open tag with the addition of a slash: </html>. By the same token, if you begin an italic phrase with <i> (the italics tag), you must end it with </i>. Everything between the open and close tags receives the particular attribute of that tag.
If you get confused and specify, for example, a backslash instead of a slash, as in <\html>, or some other variant, the browser program doesn’t understand and simply ignores the close tag. When this happens, the attribute specified in the open tag continues past the point where you meant it to stop. In the case of the <html> tag, the problem is probably not significant because </html> appears at the end of the document. Nothing comes after it to mess up. But in many situations, a missing close tag can completely destroy a Web page,
What do you think would happen if you included quotation marks around a tag—suppose, for example, that you used “<html>” at the beginning of your document rather than <html>. If you guessed that only the quotes would be displayed, you’re right. Let me say it one more time: Web browsers are very simple-minded in their interpretation of HTML. Any tags that vary from the specific characters in the HTML-language specification result in something other than what you were expecting, or your formatting requests are ignored completely.
Launching your HTML editor
To start, I suggest you use Notepad, a terrific—albeit simple—text editor included with the Windows operating system. It’s free and ready for you to start up, even if you didn’t realize you had it!
In just about every Windows configuration I’ve ever seen, Notepad is accessible by clicking the Start button on the bottom-left corner of the window, and then choosing Programs Accessories. You should see a list of choices Notepad is about half way down the list. After Notepad launches, it shows you a blank page where you can type the HTML.
Saving your file as HTML
After you type an adequate amount of material in your HTML, it’s time to save the file to disk. Then you can open it in your favorite Web browser and see how it looks when the HTML is rendered (interpreted by the browser).
When you save this new HTML document, it’s critical that you append either the .htm or .html filename suffix to ensure that the Web browser properly recognizes it as an HTML document. You can do this by explicitly typing .html as the suffix in the File Name box. Give this file a name, such as firstpage.html, and type that name directly into the File Name box.
If you don’t specify a filename suffix, by default Notepad uses .txt. Saving the file with this extension causes problems! When you look at the page later in your Web caution browser, you see the HTML itself rather than having it interpreted. If that happens, and you find that you’ve already saved the file with a .txt or another extension, simply open the file again in Notepad, choose File Save As, and resave the file with the .html suffix.
Now you’re ready: You have named the file, remembered the .html suffix, made sure that it’s stored in the directory you want, and clicked Save. You’ve created your first Web page.
Opening the file in Internet Explorer
Now it’s time to launch a Web browser and have a look. I launch Internet Explorer because I have the icon right on my desktop. I double-click the blue e icon, and the Web browser opens to the Creating Cool Web Sites home page. To open a different page—the Web page you just created—choose File Open. The Open dialog box appears,
To open the Web page you just created, click Browse. The dialog box shown opens. When you find the file, click Open and then OK. You should be looking at your HTML page
About Dinesh Thakur
Dinesh ThakurDinesh Thakur holds an B.SC (Computer Science), MCSE, MCDBA, CCNA, CCNP, A+, SCJP certifications. Dinesh authors the hugely popular Computer Notes blog. Where he writes how-to guides around Computer fundamental , computer software, Computer programming, and web apps. For any type of query or something that you think is missing, please feel free to contact us.
What's New and Popular
Search Content
Advance Courses
Basic Courses
Advertise with Us
|
{
"url": "http://ecomputernotes.com/html/tutorial/hypertext-markup-language",
"source_domain": "ecomputernotes.com",
"snapshot_id": "crawl=CC-MAIN-2017-51",
"warc_metadata": {
"Content-Length": "57473",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:OS4WUOTJOOFSU5OBPG2H6PG72C3RLJMB",
"WARC-Concurrent-To": "<urn:uuid:ec069177-ac40-4ed6-885c-01752f05ffea>",
"WARC-Date": "2017-12-17T10:11:47Z",
"WARC-IP-Address": "216.194.173.231",
"WARC-Identified-Payload-Type": "application/xhtml+xml",
"WARC-Payload-Digest": "sha1:JSOUVTPS24NKUECARRRS3FI4QLANOKT4",
"WARC-Record-ID": "<urn:uuid:427c6a07-0738-48ab-bc34-cffd46e48555>",
"WARC-Target-URI": "http://ecomputernotes.com/html/tutorial/hypertext-markup-language",
"WARC-Truncated": null,
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:6ff23db4-566c-49d8-aea5-084d004733e1>"
},
"warc_info": "robots: classic\r\nhostname: ip-10-141-32-201.ec2.internal\r\nsoftware: Nutch 1.6 (CC)\r\nisPartOf: CC-MAIN-2017-51\r\noperator: Common Crawl Admin\r\ndescription: Wide crawl of the web for December 2017\r\npublisher: Common Crawl\r\nformat: WARC File Format 1.0\r\nconformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf"
}
|
{
"line_start_idx": [
0,
59,
91,
92,
455,
456,
737,
738,
740,
741,
742,
743,
943,
944,
946,
947,
1427,
1428,
1430,
1431,
1970,
1971,
1973,
1974,
2508,
2509,
2511,
2512,
2540,
2541,
2543,
2544,
2743,
2744,
2746,
2747,
3090,
3091,
3093,
3094,
3120,
3121,
3123,
3124,
3348,
3349,
3351,
3352,
3714,
3715,
3717,
3718,
4163,
4164,
4166,
4167,
4347,
4348,
4350,
4351,
4390,
4391,
4393,
4394,
4724,
4725,
4727,
4728,
4897,
4898,
4899,
4900,
4901,
4902,
4922,
4923,
5298,
5299,
5300,
5301,
5324,
5325,
5326,
5327,
5328,
5329,
5344,
5345,
5346,
5347,
5348,
5349,
5350,
5351,
5367,
5368,
5369,
5370,
5384,
5385,
5386,
5387
],
"line_end_idx": [
59,
91,
92,
455,
456,
737,
738,
740,
741,
742,
743,
943,
944,
946,
947,
1427,
1428,
1430,
1431,
1970,
1971,
1973,
1974,
2508,
2509,
2511,
2512,
2540,
2541,
2543,
2544,
2743,
2744,
2746,
2747,
3090,
3091,
3093,
3094,
3120,
3121,
3123,
3124,
3348,
3349,
3351,
3352,
3714,
3715,
3717,
3718,
4163,
4164,
4166,
4167,
4347,
4348,
4350,
4351,
4390,
4391,
4393,
4394,
4724,
4725,
4727,
4728,
4897,
4898,
4899,
4900,
4901,
4902,
4922,
4923,
5298,
5299,
5300,
5301,
5324,
5325,
5326,
5327,
5328,
5329,
5344,
5345,
5346,
5347,
5348,
5349,
5350,
5351,
5367,
5368,
5369,
5370,
5384,
5385,
5386,
5387,
5404
]
}
|
{
"red_pajama_v2": {
"ccnet_original_length": 5404,
"ccnet_original_nlines": 101,
"rps_doc_curly_bracket": 0,
"rps_doc_ldnoobw_words": 0,
"rps_doc_lorem_ipsum": 0,
"rps_doc_stop_word_fraction": 0.4023090600967407,
"rps_doc_ut1_blacklist": 0,
"rps_doc_frac_all_caps_words": 0.0328596793115139,
"rps_doc_frac_lines_end_with_ellipsis": 0,
"rps_doc_frac_no_alph_words": 0.15808171033859253,
"rps_doc_frac_unique_words": 0.39737990498542786,
"rps_doc_mean_word_length": 4.591702938079834,
"rps_doc_num_sentences": 59,
"rps_doc_symbol_to_word_ratio": 0,
"rps_doc_unigram_entropy": 5.187056064605713,
"rps_doc_word_count": 916,
"rps_doc_frac_chars_dupe_10grams": 0,
"rps_doc_frac_chars_dupe_5grams": 0.009985730051994324,
"rps_doc_frac_chars_dupe_6grams": 0.009985730051994324,
"rps_doc_frac_chars_dupe_7grams": 0,
"rps_doc_frac_chars_dupe_8grams": 0,
"rps_doc_frac_chars_dupe_9grams": 0,
"rps_doc_frac_chars_top_2gram": 0.016642890870571136,
"rps_doc_frac_chars_top_3gram": 0.007132669910788536,
"rps_doc_frac_chars_top_4gram": 0.006657159887254238,
"rps_doc_books_importance": -518.4098510742188,
"rps_doc_books_importance_length_correction": -518.4098510742188,
"rps_doc_openwebtext_importance": -322.5042724609375,
"rps_doc_openwebtext_importance_length_correction": -322.5042724609375,
"rps_doc_wikipedia_importance": -197.09112548828125,
"rps_doc_wikipedia_importance_length_correction": -197.09112548828125
},
"fasttext": {
"dclm": 0.045147839933633804,
"english": 0.8674541115760803,
"fineweb_edu_approx": 2.7231833934783936,
"eai_general_math": 0.6540347337722778,
"eai_open_web_math": 0.3810673952102661,
"eai_web_code": 0.085368812084198
}
}
|
{
"free_decimal_correspondence": {
"primary": {
"code": "005.4",
"labels": {
"level_1": "General works, books and libraries, information sciences",
"level_2": "",
"level_3": "Computer programming"
}
},
"secondary": {
"code": "-1",
"labels": {
"level_1": "",
"level_2": "",
"level_3": ""
}
}
},
"bloom_cognitive_process": {
"primary": {
"code": "2",
"label": "Understand"
},
"secondary": {
"code": "3",
"label": "Apply"
}
},
"bloom_knowledge_domain": {
"primary": {
"code": "2",
"label": "Conceptual"
},
"secondary": {
"code": "3",
"label": "Procedural"
}
},
"document_type_v1": {
"primary": {
"code": "3",
"label": "Reference/Encyclopedic/Educational"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"extraction_artifacts": {
"primary": {
"code": "3",
"label": "Irrelevant Content"
},
"secondary": {
"code": "0",
"label": "No Artifacts"
}
},
"missing_content": {
"primary": {
"code": "0",
"label": "No missing content"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"document_type_v2": {
"primary": {
"code": "23",
"label": "Tutorial"
},
"secondary": {
"code": "8",
"label": "Documentation"
}
},
"reasoning_depth": {
"primary": {
"code": "2",
"label": "Basic Reasoning"
},
"secondary": {
"code": "1",
"label": "No Reasoning"
}
},
"technical_correctness": {
"primary": {
"code": "4",
"label": "Highly Correct"
},
"secondary": {
"code": "3",
"label": "Mostly Correct"
}
},
"education_level": {
"primary": {
"code": "1",
"label": "General Audience"
},
"secondary": {
"code": "2",
"label": "High School Level"
}
}
}
|
672f1e42c33a7f9846924a2431ea77df
|
1,261,426,384,769,893,400 |
Ubuntu – Ubuntu Shutdown While the Machine (Laptop) Fan is Still Running
18.04dellhardwarepower-managementshutdown
I use Ubuntu 18.04.
Whenever I shutdown (power off) my laptop (my laptop is Dell G7 15), there is a sound "klack" from the laptop. It sounds as if I force shutdown of my machine by clicking the power button while the OS still running.
I suspected that, whenever I do shutdown, it seems the OS has been "turned off", but the machine seems "not yet ready" to turn off.
My workaround to this issue is, whenever I want to turn off my laptop, I will do the following:
1. Restart the laptop
2. Run the command "sudo halt"
3. Wait for some minutes, listen to the sound of the fan. If it is already stopped, then press the power button to turn off the machine
However, this workaround does not always work since sometimes, after executing sudo halt, the fan is still running for more than 30 minutes. So, since I no longer able to wait for it to turn off, I am forced to press the power button to turn off the machine, and when I do that, I hear the sound "klack".
I am quite sure that when I run "sudo halt", the OS seems already turn off, it is just the machine hardware (the fan) which for some reason, is not able to turn off.
How to solve this issue? how can I safely shutdown both the OS and hardware?
I have tried to update my kernel, and this problem still persists. I am afraid this problem may eventually break my motherboard.
Thank you very much for your help! I would appreciate any hints that you provide.
Best Answer
• It seems I solved this problem by doing the following:
• Updated the Ubuntu kernel
• Updated the BIOS
• Installed the latest graphics card driver
• Go to /etc/default/grub, and change GRUB_CMDLINE_LINUX_DEFAULT="quiet splash" instead of "nomodeset"
Now, everytime I want to turn off my PC, I restart it and upon restart, I run the command "sudo shutdown -H now", then press the power button.
This looks like solving the problem, since I have been able to shut down my machine smoothly for the past 1 month.
• Related Question
|
{
"url": "https://itectec.com/ubuntu/ubuntu-ubuntu-shutdown-while-the-machine-laptop-fan-is-still-running/",
"source_domain": "itectec.com",
"snapshot_id": "crawl=CC-MAIN-2020-50",
"warc_metadata": {
"Content-Length": "10300",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:RI6CMG6XGJJR6JL24DTTE6AI26ZYDKQJ",
"WARC-Concurrent-To": "<urn:uuid:1a225db2-ecd9-4004-8bfe-ccd9b4a9f4e9>",
"WARC-Date": "2020-11-28T04:37:38Z",
"WARC-IP-Address": "45.76.174.189",
"WARC-Identified-Payload-Type": "text/html",
"WARC-Payload-Digest": "sha1:H4NPSGZ6B7R23Q6EIBX7HBA2GKOZSJBC",
"WARC-Record-ID": "<urn:uuid:12a75794-d73e-4310-8a84-6d3b3dd42d4d>",
"WARC-Target-URI": "https://itectec.com/ubuntu/ubuntu-ubuntu-shutdown-while-the-machine-laptop-fan-is-still-running/",
"WARC-Truncated": null,
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:31390acd-06f7-491e-92aa-ea8fca27459a>"
},
"warc_info": "isPartOf: CC-MAIN-2020-50\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for November/December 2020\r\noperator: Common Crawl Admin ([email protected])\r\nhostname: ip-10-67-67-240.ec2.internal\r\nsoftware: Apache Nutch 1.17 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.2-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/"
}
|
{
"line_start_idx": [
0,
73,
74,
116,
117,
137,
352,
353,
485,
486,
582,
583,
607,
640,
778,
779,
1084,
1085,
1251,
1252,
1329,
1458,
1459,
1541,
1542,
1554,
1555,
1614,
1615,
1647,
1670,
1718,
1825,
1826,
1973,
1974,
2093,
2094
],
"line_end_idx": [
73,
74,
116,
117,
137,
352,
353,
485,
486,
582,
583,
607,
640,
778,
779,
1084,
1085,
1251,
1252,
1329,
1458,
1459,
1541,
1542,
1554,
1555,
1614,
1615,
1647,
1670,
1718,
1825,
1826,
1973,
1974,
2093,
2094,
2114
]
}
|
{
"red_pajama_v2": {
"ccnet_original_length": 2114,
"ccnet_original_nlines": 37,
"rps_doc_curly_bracket": 0,
"rps_doc_ldnoobw_words": 0,
"rps_doc_lorem_ipsum": 0,
"rps_doc_stop_word_fraction": 0.4048140048980713,
"rps_doc_ut1_blacklist": 0,
"rps_doc_frac_all_caps_words": 0.06783369928598404,
"rps_doc_frac_lines_end_with_ellipsis": 0,
"rps_doc_frac_no_alph_words": 0.19693653285503387,
"rps_doc_frac_unique_words": 0.42440319061279297,
"rps_doc_mean_word_length": 4.259946823120117,
"rps_doc_num_sentences": 22,
"rps_doc_symbol_to_word_ratio": 0,
"rps_doc_unigram_entropy": 4.583885669708252,
"rps_doc_word_count": 377,
"rps_doc_frac_chars_dupe_10grams": 0,
"rps_doc_frac_chars_dupe_5grams": 0.08405978232622147,
"rps_doc_frac_chars_dupe_6grams": 0.06724782288074493,
"rps_doc_frac_chars_dupe_7grams": 0.04732254147529602,
"rps_doc_frac_chars_dupe_8grams": 0.04732254147529602,
"rps_doc_frac_chars_dupe_9grams": 0.04732254147529602,
"rps_doc_frac_chars_top_2gram": 0.0348692387342453,
"rps_doc_frac_chars_top_3gram": 0.03922789916396141,
"rps_doc_frac_chars_top_4gram": 0.020547950640320778,
"rps_doc_books_importance": -168.59326171875,
"rps_doc_books_importance_length_correction": -168.59326171875,
"rps_doc_openwebtext_importance": -97.34503173828125,
"rps_doc_openwebtext_importance_length_correction": -97.34503173828125,
"rps_doc_wikipedia_importance": -71.01947784423828,
"rps_doc_wikipedia_importance_length_correction": -71.01947784423828
},
"fasttext": {
"dclm": 0.027072910219430923,
"english": 0.9437946677207947,
"fineweb_edu_approx": 0.9487975239753723,
"eai_general_math": 0.6529504656791687,
"eai_open_web_math": 0.4348406195640564,
"eai_web_code": 0.6592274904251099
}
}
|
{
"free_decimal_correspondence": {
"primary": {
"code": "004.0285636",
"labels": {
"level_1": "General works, books and libraries, information sciences",
"level_2": "",
"level_3": "Computers and Computer science"
}
},
"secondary": {
"code": "621.3922",
"labels": {
"level_1": "Industrial arts, Technology, and Engineering",
"level_2": "Engineering",
"level_3": "Mechanical engineering and Machinery"
}
}
},
"bloom_cognitive_process": {
"primary": {
"code": "3",
"label": "Apply"
},
"secondary": {
"code": "2",
"label": "Understand"
}
},
"bloom_knowledge_domain": {
"primary": {
"code": "3",
"label": "Procedural"
},
"secondary": {
"code": "2",
"label": "Conceptual"
}
},
"document_type_v1": {
"primary": {
"code": "5",
"label": "Social/Forum"
},
"secondary": {
"code": "3",
"label": "Reference/Encyclopedic/Educational"
}
},
"extraction_artifacts": {
"primary": {
"code": "0",
"label": "No Artifacts"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"missing_content": {
"primary": {
"code": "0",
"label": "No missing content"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"document_type_v2": {
"primary": {
"code": "18",
"label": "Q&A Forum"
},
"secondary": {
"code": "21",
"label": "Customer Support"
}
},
"reasoning_depth": {
"primary": {
"code": "2",
"label": "Basic Reasoning"
},
"secondary": {
"code": "3",
"label": "Intermediate Reasoning"
}
},
"technical_correctness": {
"primary": {
"code": "3",
"label": "Mostly Correct"
},
"secondary": {
"code": "4",
"label": "Highly Correct"
}
},
"education_level": {
"primary": {
"code": "2",
"label": "High School Level"
},
"secondary": {
"code": "3",
"label": "Undergraduate Level"
}
}
}
|
672f1e42c33a7f9846924a2431ea77df
|
-8,706,553,735,033,630,000 |
array_unshift
(PHP4 )
array_unshift -- Push one or more elements onto the beginning of array
Description
int array_unshift (array array, mixed var [, mixed ...])
Array_unshift() prepends passed elements to the front of the array. Note that the list of elements is prepended as a whole, so that the prepended elements stay in the same order.
Returns the new number of elements in the array.
Example 1. Array_unshift() example
$queue = array ("p1", "p3");
array_unshift ($queue, "p4", "p5", "p6");
This would result in $queue having 5 elements: "p4", "p5", "p6", "p1", and "p3".
See also array_shift(), array_push(), and array_pop().
|
{
"url": "http://subfiles.net/php%203%20manual/function.array-unshift.html",
"source_domain": "subfiles.net",
"snapshot_id": "CC-MAIN-2024-30",
"warc_metadata": {
"Content-Length": "3854",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:5ZZ2LU5KEDVVDGK3F4F33N6NT7TV36HE",
"WARC-Concurrent-To": "<urn:uuid:2660a653-5b11-48a1-95d9-3d931cc7d821>",
"WARC-Date": "2024-07-15T17:16:12Z",
"WARC-IP-Address": "188.40.109.150",
"WARC-Identified-Payload-Type": "text/html",
"WARC-Payload-Digest": "sha1:CTS5YESAHLJIVWAK4N6Z2PDSFNIMPVUK",
"WARC-Record-ID": "<urn:uuid:44dbf9aa-ba7a-4d45-b084-f764445c1c0d>",
"WARC-Target-URI": "http://subfiles.net/php%203%20manual/function.array-unshift.html",
"WARC-Truncated": null,
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:58fc51c9-35e9-4024-8598-2a73ec4c17e7>"
},
"warc_info": "isPartOf: CC-MAIN-2024-30\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for July 2024\r\noperator: Common Crawl Admin ([email protected])\r\nhostname: ip-10-67-67-110\r\nsoftware: Apache Nutch 1.20 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.5-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: https://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/"
}
|
{
"line_start_idx": [
0,
14,
15,
23,
24,
96,
97,
109,
110,
167,
168,
347,
348,
397,
398,
433,
434,
464,
506,
513,
514,
595,
596
],
"line_end_idx": [
14,
15,
23,
24,
96,
97,
109,
110,
167,
168,
347,
348,
397,
398,
433,
434,
464,
506,
513,
514,
595,
596,
650
]
}
|
{
"red_pajama_v2": {
"ccnet_original_length": 650,
"ccnet_original_nlines": 22,
"rps_doc_curly_bracket": 0,
"rps_doc_ldnoobw_words": 0,
"rps_doc_lorem_ipsum": 0,
"rps_doc_stop_word_fraction": 0.2554744482040405,
"rps_doc_ut1_blacklist": 0,
"rps_doc_frac_all_caps_words": 0.007299270015209913,
"rps_doc_frac_lines_end_with_ellipsis": 0,
"rps_doc_frac_no_alph_words": 0.32846716046333313,
"rps_doc_frac_unique_words": 0.585106372833252,
"rps_doc_mean_word_length": 4.819149017333984,
"rps_doc_num_sentences": 7,
"rps_doc_symbol_to_word_ratio": 0.007299270015209913,
"rps_doc_unigram_entropy": 3.746624708175659,
"rps_doc_word_count": 94,
"rps_doc_frac_chars_dupe_10grams": 0,
"rps_doc_frac_chars_dupe_5grams": 0,
"rps_doc_frac_chars_dupe_6grams": 0,
"rps_doc_frac_chars_dupe_7grams": 0,
"rps_doc_frac_chars_dupe_8grams": 0,
"rps_doc_frac_chars_dupe_9grams": 0,
"rps_doc_frac_chars_top_2gram": 0.035320088267326355,
"rps_doc_frac_chars_top_3gram": 0.026490069925785065,
"rps_doc_frac_chars_top_4gram": 0,
"rps_doc_books_importance": -45.94004440307617,
"rps_doc_books_importance_length_correction": -55.49706268310547,
"rps_doc_openwebtext_importance": -14.896332740783691,
"rps_doc_openwebtext_importance_length_correction": -24.453351974487305,
"rps_doc_wikipedia_importance": -16.290374755859375,
"rps_doc_wikipedia_importance_length_correction": -25.847393035888672
},
"fasttext": {
"dclm": 0.646558940410614,
"english": 0.6000919938087463,
"fineweb_edu_approx": 3.020726203918457,
"eai_general_math": 0.12095797061920166,
"eai_open_web_math": 0.03735369071364403,
"eai_web_code": 0.40925276279449463
}
}
|
{
"free_decimal_correspondence": {
"primary": {
"code": "005.1332",
"labels": {
"level_1": "General works, books and libraries, information sciences",
"level_2": "",
"level_3": "Computer programming"
}
},
"secondary": {
"code": "005.133",
"labels": {
"level_1": "General works, books and libraries, information sciences",
"level_2": "",
"level_3": "Computer programming"
}
}
},
"bloom_cognitive_process": {
"primary": {
"code": "2",
"label": "Understand"
},
"secondary": {
"code": "3",
"label": "Apply"
}
},
"bloom_knowledge_domain": {
"primary": {
"code": "2",
"label": "Conceptual"
},
"secondary": {
"code": "3",
"label": "Procedural"
}
},
"document_type_v1": {
"primary": {
"code": "3",
"label": "Reference/Encyclopedic/Educational"
},
"secondary": {
"code": "4",
"label": "Code/Software"
}
},
"extraction_artifacts": {
"primary": {
"code": "0",
"label": "No Artifacts"
},
"secondary": {
"code": "3",
"label": "Irrelevant Content"
}
},
"missing_content": {
"primary": {
"code": "0",
"label": "No missing content"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"document_type_v2": {
"primary": {
"code": "8",
"label": "Documentation"
},
"secondary": {
"code": "10",
"label": "Knowledge Article"
}
},
"reasoning_depth": {
"primary": {
"code": "2",
"label": "Basic Reasoning"
},
"secondary": {
"code": "1",
"label": "No Reasoning"
}
},
"technical_correctness": {
"primary": {
"code": "4",
"label": "Highly Correct"
},
"secondary": {
"code": "3",
"label": "Mostly Correct"
}
},
"education_level": {
"primary": {
"code": "3",
"label": "Undergraduate Level"
},
"secondary": {
"code": "2",
"label": "High School Level"
}
}
}
|
672f1e42c33a7f9846924a2431ea77df
|
-9,039,760,387,683,147,000 |
fbpx
Back
Is Page Speed Really That Important?
Is Page Speed Really That Important?
The term “page speed” sure sounds like it should be of the utmost importance to pretty much every website out there. But is it? With so much to consider in producing the best possible site, it’s easy to lose some of the finer details in the shuffle. We’re here to provide some insight into what exactly page speed is and why you should be keeping it on your mind on an ongoing basis.
What is page speed?
First things second. Page speed is pretty much what it sounds like – a measurement of how quickly the content on your page loads. It can sometimes be confused with site speed, but there is an important distinction between the two. Site speed is actually the page speed for a sample of page views on your site. Page speed itself can be measured in either “page load time” (the time it takes to fully display content on a specific page) or in “time to first byte” (how long it takes for a browser to receive the first byte of info from the web server). Regardless of how it’s measured, there are a couple of reasons page speed is so important (and keeps getting more important every day).
How important is page speed for SEO?
In 2010, Google announced it would start taking page speed into prime consideration when ranking pages via its algorithm. Then, in 2017, Google let us know it would be placing an even greater emphasis on page speed due mainly to the surge of mobile web browsing. If page speed isn’t a priority on your website, you may find yourself lagging behind your more fleet-of-foot competitors in search rankings. Slow page speed also means search engines can crawl fewer pages using their allocated crawl budget. This has a negative effect on indexation and is another way neglecting page speed can hurt your site.
In July 2018, Google released what it called the "Speed Update," a rare case when Google announced an algorithm update ahead of time. If you recall, the previous major announcement like this was dubbed Mobilegeddon and caused a global panic. There’s a reason the 2018 news wasn't flooded with "Speedageddon" articles. Google downplayed the impact the Speed Update would have on websites. Straight from the horse’s mouth: "The Speed Update...will only affect pages that deliver the slowest experience to users and will only affect a small percentage of queries."
Most recently, in April of 2023, Google dropped page speed from its list of ranking systems, stating that it’s not a direct ranking factor – if only to complicate things further for SEO specialists everywhere!
Throughout all of this change, it’s important to remember that there are many ranking factors that Google uses, but ultimately, Google will favor content that offers a positive page experience. So unless your website is loading like it’s 1999, you shouldn’t notice too much of an impact on the Google side of things. But that doesn’t mean you should downplay it on your website. There are more important reasons to make sure your pages load quickly.
How important is page speed to users?
Page speed matters to Google, but it matters even more to everyone who visits your site. The user experience is massively affected by page speed, and a slowly loading site is likely to drive visitors away. A higher bounce rate, lower average time spent on page, and decrease in conversions are all symptoms of a slow website. People are impatient. Their attention spans are short. According to surveys from Akamai and Gomez.com, almost half of web users expect a website to load within two seconds or less. If not, they tend to abandon the site completely. Don’t expect them to come crawling back as long as your site is loading at a snail’s pace.
How important is page speed to shoppers?
The e-commerce sector should be especially concerned with page speed. Research has shown that 79 percent of online shoppers who experience poor site performance say they won’t return to that site to buy in the future. Around 44 percent of those would tell a friend or family member if they had a poor experience with a website. That means slow page speed not only loses you conversions from the shoppers themselves but also from those they interact with on a regular basis. That’s a wide net.
Walmart.com noted that with every second of increased page speed, they saw a two percent increase in conversion. Way back in 2008, Amazon found every 100 milliseconds cost them 1% in sales. And that was in 2008. Just think about how much more impatient people are today! Another study in 2012 noted that Amazon could lose as much as $1.6 billion if a page loaded one second slower. In other words, there’s a lot of money to be made (or lost) in a very short period of time.
You should care about page speed
The main motivations behind improving page speed are simple – increase your ranking and keep people from leaving your site. That said, there are a lot of components that go into optimizing your page speed and making sure you’re staying ahead of the industry standard. It’s an ongoing process that should be maintained on a regular basis. It’s easy to fall behind. You need an experienced web developer to manage those aspects and ensure your site is running at Usain Bolt levels every second of every day. Anything less is sure to lose you money or followers. Don’t be that website.
How fast should your website be?
Obviously, when it comes to load time, the faster your website is the better. For a positive page experience, your full page should load within two seconds.
SEO audits often flag page speed as an issue on websites, but a great way to test it firsthand is by navigating through your site yourself. Does your site feel fast, or does it take more than a few seconds to navigate from page to page? Put yourself in the user's shoes and think about your browsing experiences. If you aren't noticing slow load times, your audience probably won't either.
Be sure to check your site on different search engines and devices to get a holistic feel for the speed of your website.
You can also check your page speed by navigating to a page you'd like to check out, right-clicking "inspect" on the page, then navigating to either "network" or "performance insights" to get a look at how quickly your page is loading.
Another place where you can check page speed is in Google Search Console. Your Core Web Vitals report can tell you more about site performance as it relates to user experience.
Quick fixes to improve page speed
If your site really is loading slowly and could use some improvements, here are a few ways to fix it:
1. Reduce the number of redirects on your website.
The more times a website has to redirect a user to a different page, the longer the user has to wait through that cycle of redirects. Make the navigation as seamless as possible by cutting out those redirects.
2. Compress large files.
Use a tool that enables compression to minimize the size of files that have to load on your site. If you have multiple large files loading on a page, it can really affect load time.
3. Pay attention to the size of your images.
Don't use images that are larger than needed, and scale down large images whenever possible.
4. Choose a performance-optimizing hosting partner.
Having your website hosted on a fast server can really improve load time.
5. Cache your site.
Caching your site allows the server to save copies of site files and quickly pull the page back up rather than loading it from scratch. Servers can cache your site through your hosting services, but you can also get caching plugins to help.
There are other ways to speed up your website's load time, but many of them require messing with the code or diving into website development. Contact Perrill today for full-service web development that will have your pages flying at Mach 10.
Written by
Dan Cole
Dan Cole is the Manager of Content & Copywriting at Perrill. He has been professionally strategizing and creating original content since 2011 across agency settings, corporate positions, and journalistic beats, and now masterminds written materials of all kinds for Perrill’s clients. He was named Acme Comedy Co.’s Funniest Person in the Twin Cities in 2014 and will never let any of us forget it.
Author
Dan Cole
Post Type
Article
Date
Jul 20, 2023
|
{
"url": "https://www.perrill.com/is-page-speed-really-that-important/",
"source_domain": "www.perrill.com",
"snapshot_id": "CC-MAIN-2024-10",
"warc_metadata": {
"Content-Length": "90835",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:BODX65BHZZLURIYCHQXDD3FNCCUJDI7P",
"WARC-Concurrent-To": "<urn:uuid:43948d1b-cfaa-4cd4-aaf0-b2e5aef2239c>",
"WARC-Date": "2024-02-24T13:56:44Z",
"WARC-IP-Address": "192.124.249.65",
"WARC-Identified-Payload-Type": "text/html",
"WARC-Payload-Digest": "sha1:H3ZOEX4RM5GSC665MCGVD3TEJGQVAUWK",
"WARC-Record-ID": "<urn:uuid:869a6f4d-0bcf-4e15-96e6-8f6f6feaff81>",
"WARC-Target-URI": "https://www.perrill.com/is-page-speed-really-that-important/",
"WARC-Truncated": null,
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:2992cb6e-7023-43dc-b07c-2fc9d634d1c7>"
},
"warc_info": "isPartOf: CC-MAIN-2024-10\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for February/March 2024\r\noperator: Common Crawl Admin ([email protected])\r\nhostname: ip-10-67-67-123\r\nsoftware: Apache Nutch 1.19 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.5-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: https://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/"
}
|
{
"line_start_idx": [
0,
5,
10,
11,
48,
49,
86,
87,
471,
472,
492,
493,
1180,
1181,
1218,
1219,
1825,
1826,
2388,
2389,
2599,
2600,
3050,
3051,
3089,
3090,
3738,
3739,
3780,
3781,
4274,
4275,
4749,
4750,
4783,
4784,
5367,
5368,
5401,
5402,
5559,
5560,
5950,
5951,
6072,
6073,
6308,
6309,
6486,
6487,
6521,
6522,
6624,
6625,
6676,
6677,
6887,
6888,
6913,
6914,
7096,
7097,
7142,
7143,
7236,
7237,
7289,
7290,
7364,
7365,
7385,
7386,
7627,
7628,
7870,
7871,
7882,
7883,
7892,
7893,
8292,
8293,
8300,
8301,
8310,
8311,
8321,
8322,
8330,
8331,
8336,
8337
],
"line_end_idx": [
5,
10,
11,
48,
49,
86,
87,
471,
472,
492,
493,
1180,
1181,
1218,
1219,
1825,
1826,
2388,
2389,
2599,
2600,
3050,
3051,
3089,
3090,
3738,
3739,
3780,
3781,
4274,
4275,
4749,
4750,
4783,
4784,
5367,
5368,
5401,
5402,
5559,
5560,
5950,
5951,
6072,
6073,
6308,
6309,
6486,
6487,
6521,
6522,
6624,
6625,
6676,
6677,
6887,
6888,
6913,
6914,
7096,
7097,
7142,
7143,
7236,
7237,
7289,
7290,
7364,
7365,
7385,
7386,
7627,
7628,
7870,
7871,
7882,
7883,
7892,
7893,
8292,
8293,
8300,
8301,
8310,
8311,
8321,
8322,
8330,
8331,
8336,
8337,
8349
]
}
|
{
"red_pajama_v2": {
"ccnet_original_length": 8349,
"ccnet_original_nlines": 91,
"rps_doc_curly_bracket": 0,
"rps_doc_ldnoobw_words": 0,
"rps_doc_lorem_ipsum": 0,
"rps_doc_stop_word_fraction": 0.4277286231517792,
"rps_doc_ut1_blacklist": 0,
"rps_doc_frac_all_caps_words": 0.0023598799016326666,
"rps_doc_frac_lines_end_with_ellipsis": 0,
"rps_doc_frac_no_alph_words": 0.13569322228431702,
"rps_doc_frac_unique_words": 0.3830811679363251,
"rps_doc_mean_word_length": 4.586657524108887,
"rps_doc_num_sentences": 97,
"rps_doc_symbol_to_word_ratio": 0.0005899699754081666,
"rps_doc_unigram_entropy": 5.546770095825195,
"rps_doc_word_count": 1454,
"rps_doc_frac_chars_dupe_10grams": 0,
"rps_doc_frac_chars_dupe_5grams": 0.01994301937520504,
"rps_doc_frac_chars_dupe_6grams": 0.016494229435920715,
"rps_doc_frac_chars_dupe_7grams": 0,
"rps_doc_frac_chars_dupe_8grams": 0,
"rps_doc_frac_chars_dupe_9grams": 0,
"rps_doc_frac_chars_top_2gram": 0.03913630172610283,
"rps_doc_frac_chars_top_3gram": 0.009896540082991123,
"rps_doc_frac_chars_top_4gram": 0.011995799839496613,
"rps_doc_books_importance": -859.839111328125,
"rps_doc_books_importance_length_correction": -859.839111328125,
"rps_doc_openwebtext_importance": -432.21661376953125,
"rps_doc_openwebtext_importance_length_correction": -432.21661376953125,
"rps_doc_wikipedia_importance": -279.588623046875,
"rps_doc_wikipedia_importance_length_correction": -279.588623046875
},
"fasttext": {
"dclm": 0.030952220782637596,
"english": 0.9533079862594604,
"fineweb_edu_approx": 1.8999654054641724,
"eai_general_math": 0.04272859916090965,
"eai_open_web_math": 0.12157595157623291,
"eai_web_code": 0.04746698960661888
}
}
|
{
"free_decimal_correspondence": {
"primary": {
"code": "004.678",
"labels": {
"level_1": "General works, books and libraries, information sciences",
"level_2": "",
"level_3": "Computers and Computer science"
}
},
"secondary": {
"code": "658.87",
"labels": {
"level_1": "Industrial arts, Technology, and Engineering",
"level_2": "Business",
"level_3": "Management"
}
}
},
"bloom_cognitive_process": {
"primary": {
"code": "2",
"label": "Understand"
},
"secondary": {
"code": "3",
"label": "Apply"
}
},
"bloom_knowledge_domain": {
"primary": {
"code": "2",
"label": "Conceptual"
},
"secondary": {
"code": "3",
"label": "Procedural"
}
},
"document_type_v1": {
"primary": {
"code": "3",
"label": "Reference/Encyclopedic/Educational"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"extraction_artifacts": {
"primary": {
"code": "0",
"label": "No Artifacts"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"missing_content": {
"primary": {
"code": "0",
"label": "No missing content"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"document_type_v2": {
"primary": {
"code": "10",
"label": "Knowledge Article"
},
"secondary": {
"code": "23",
"label": "Tutorial"
}
},
"reasoning_depth": {
"primary": {
"code": "2",
"label": "Basic Reasoning"
},
"secondary": {
"code": "3",
"label": "Intermediate Reasoning"
}
},
"technical_correctness": {
"primary": {
"code": "3",
"label": "Mostly Correct"
},
"secondary": {
"code": "4",
"label": "Highly Correct"
}
},
"education_level": {
"primary": {
"code": "2",
"label": "High School Level"
},
"secondary": {
"code": "1",
"label": "General Audience"
}
}
}
|
672f1e42c33a7f9846924a2431ea77df
|
5,006,717,393,520,061,000 |
Search Images Maps Play YouTube News Gmail Drive More »
Sign in
Screen reader users: click this link for accessible mode. Accessible mode has the same essential features but works better with your reader.
Patents
1. Advanced Patent Search
Publication numberUS7356820 B2
Publication typeGrant
Application numberUS 09/898,978
Publication date8 Apr 2008
Filing date2 Jul 2001
Priority date2 Jul 2001
Fee statusPaid
Also published asUS8245231, US8327369, US20030005026, US20080141257, US20080235694
Publication number09898978, 898978, US 7356820 B2, US 7356820B2, US-B2-7356820, US7356820 B2, US7356820B2
InventorsFred A. Bower, III
Original AssigneeInternational Business Machines Corporation
Export CitationBiBTeX, EndNote, RefMan
External Links: USPTO, USPTO Assignment, Espacenet
Method of launching low-priority tasks
US 7356820 B2
Abstract
A driver is provided to manage launching of tasks at different levels of priority and within the parameters of the firmware interface. The driver includes two anchors for managing the tasks, a dispatcher and an agent. The dispatcher operates at a medium priority level and manages communication from a remote administrator. The agent functions to receive communications from the dispatcher by way of a shared data structure and to launch lower priority level tasks in respond to the communication. The shared data structure stores communications received from the dispatcher. Upon placing the communication in the shared data structure, the dispatcher sends a signal to the agent indicating that a communication is in the data structure for reading by the agent. Following reading of the communication in the data structure, the agent launches the lower priority level task and sends a signal to the data structure indicating the status of the task. Accordingly, a higher level task maintains its level of operation and spawns lower level tasks through the dispatcher in conjunction with the agent.
Images(4)
Previous page
Next page
Claims(6)
1. A computer implemented method for managing tasks comprising:
a message manager operating at a high priority level receiving a message from a remote administrator within system firmware to launch a low priority task;
said message manager placing a message in a data structure shared between said message manager and a task manager operating at a low priority level;
said message manager communicating said low priority task to said task manager through said data structure, wherein the step of communicating said low priority task to said task manager includes setting a flag for signaling receipt of said message and said task manager reading said message in said data structure and launching said low priority task in response to said flag;
launching said low priority task received from said message manager in response to receipt of said message and absent a suspension selected from the group consisting of: a system interrupt and a pause in a higher level task operation; and
resetting said flag following launch of said low priority task.
2. The method of claim 1, wherein the step of launching said lower priority task includes an agent.
3. The method of claim 1, wherein the step of receiving said message from said remote administrator includes a dispatcher.
4. The method of claim 1, wherein said message manager maintains a level of operation.
5. A computer implemented method comprising:
receiving a message from a remote administrator within system firmware to launch a low priority level task, wherein receipt of said message is by a message manager operating at a higher priority level than said low priority level task;
storing said message in a data structure shared between said message manager and a task manager operating at a low priority level;
communicating said low priority level task to said task manager through said data structure;
setting a flag to indicate receipt of said message in said data structure to said task manager;
reading said message in said data structure and launching said low priority level task in response to said flag by said task manager including said task manager launching said low priority level task received from said message manager in response to said message and absent a suspension selected from the group consisting of: a system interrupt and a pause in a higher level task operation; and
resetting said flag following launch of said low priority level task.
6. The method of claim 5, further comprising said message manager maintaining a level of operation.
Description
BACKGROUND OF THE INVENTION
1. Technical Field
This invention relates to a driver operating in a firmware environment. More specifically, the driver manages launching of tasks at different priority levels while maintaining a predetermined level of operation.
2. Description of the Prior Art
Firmware is software that is stored in hardware, such that the software is retained even after power to the hardware ceases. At boot time, the firmware of a computer or computer system stores and uses information describing a computer's processors, nodes, memory and other devices. The firmware operates on a parallel platform to the operating system.
In prior art computers, the firmware enabled system interrupts to occur in order to launch different applications at different priority levels. The prior art systems require a greater amount of functionality to accommodate system interrupts. Some firmware interface environments disable system interrupts to reduce the amount of functionality required to operate the machines in the system. The Intel Extensible Firmware Interface (EFI) is one firmware environment which reduces functionality required to operate the machine by disabling interrupts. In addition to disabling system interrupts, tasks within the EFI may temporarily increase their priority level of operation, but they are not allowed to decrease the priority level. Accordingly, tasks operating within the EFI environment, or similar platforms, are not permitted to execute system interrupts to execute tasks that may be operating at different levels of priority and may increase priority levels.
There are two types of operating programs within the EFI: a driver and an application. The driver provides a set of resources, i.e. programming interfaces. Once a driver is loaded within the firmware environment, it remains in the system for future application. The driver is not permitted to load other drivers after its initialization has completed. In addition, the EFI also prohibits the ability to load applications from a resident driver. An application is an executable program that is loaded, executed and expires. During run time, the application can load other drivers and applications. Accordingly, the application is executed for loading a driver to operate within the firmware environment and within the protocols of the system.
There is therefore a need to launch a driver that will prioritize execution of different priority levels of tasks within the confines of the EFI firmware environment. The driver must be launched by an application that will allow it to remain resident within the firmware and will provide all the required protocols for operating independently and without the need to launch secondary drivers. Accordingly, it is desirable to design a driver that will allow lower priority level applications to be launched without executing a system interrupt and without changing the priority level of a higher level application already in use.
SUMMARY OF THE INVENTION
This invention comprises a driver for operating in a firmware environment. The driver manages launching of tasks at different priority levels while maintaining a predetermined level of operation.
A first aspect of the invention is a method of spawning a lower priority level task from a higher level priority task. A dispatcher is utilized for receiving messages from a remote administrator. An agent is utilized for launching a lower priority task. Upon receiving a message to spawn a lower priority task, the dispatcher places the message in a shared data structure. The dispatcher then sets a flag for signaling to the agent receipt of the message. The agent launches the lower priority task in response to the message and resets the flag for future task assignments.
A second aspect of the invention is a computer system which includes a message manager to receive messages from a remote administrator, and a task manager to launch a lower priority task in response to a message received from the message manager. In addition, a data structure is provided to communicate the message from the message manager to the task manager. A dispatcher manager is provided to forward the instruction from the message manager to the data structure. In addition, a flag is provided to signal to the task manager receipt of the instruction in the data structure. Following the launch of the lower priority task, the task manager resets the flag. During the communication and launching of the lower priority task, a higher priority task maintains its level of operation.
A third aspect of the invention is an article comprising a computer-readable data storage medium. In the medium, the article includes means for receiving messages from a remote administrator and means for launching lower priority level tasks in response to the messages. The message receiving means stores the message in a data structure. A flag is provided by the message receiving means to signal receipt of instructions by the data structure to the launching means. A higher priority task maintains its level of operation during launch of the lower priority task.
Other features and advantages of this invention will become apparent from the following detailed description of the presently preferred embodiment of the invention, taken in conjunction with the accompanying drawings.
BRIEF DESCRIPTION OF THE DRAWINGS
FIG. 1 is a block diagram of the driver according to the preferred embodiment of this invention, and is suggested for printing on the first page of the issued patent.
FIG. 2 is a flow chart illustrating the process of initializing the driver.
FIG. 3 is a flow chart illustrating the process of launching a lower priority task.
DESCRIPTION OF THE PREFERRED EMBODIMENT Overview
In a low-level operating environment, system interrupts may be disabled to reduce the amount of functionality required to operate the machine. This environment allows operating functions to increase their specific level of operation, but does not allow them to decrease their level of operation. The method and system of the preferred embodiment employ a shared data structure in conjunction with a communication tool to allow a higher priority task to launch lower priority tasks. Accordingly, this allows for a higher priority task to maintain a specific level of operation.
Technical Background
Specific extensible firmware environments are known to operate at a low level without the use of system interrupts. The Intel EFI is one such firmware environment. In addition to disabling interrupts, the firmware places additional limitations in its functionality. For example, the firmware limits a task to one of three priority levels, low, medium and high. A given task may temporarily increase its priority level of operation if it is operating at a low or medium priority level, but it is not allowed to decrease its level of operation. In addition, the only place the firmware enables a driver to load other firmware modules is in its initialization code. Accordingly, a driver to enable launching of lower priority tasks must work within the confines of the firmware protocols.
The driver must provide for a higher priority task to maintain operation at a higher level of operation, i.e. high or medium level in a three tier environment. FIG. 1 is a block diagram 10 illustrating the flow of communication in the diagnostic device driver of the preferred embodiment. The two primary components of the driver are a dispatcher 20 for receiving messages from a remote administrator 30, and an agent 40 for launching lower level tasks. The remote administrator 30 exists within the firmware and is responsible for running diagnostics. The dispatcher 20 receives messages from the remote administrator 30 and responds to receipt of the messages. Upon receiving a communication from the remote administrator 30, the dispatcher 20 communicates receipt to a data structure 50. Accordingly, the dispatcher 20 functions as a communication tool from the remote administrator 30 to the data structure 50.
The dispatcher 20 operates at a medium priority level and functions to receive and respond to messages from a remote administrator 30, and to place the messages in the shared data structure 50. Within the restrictions of the firmware environment, the dispatcher is unable to load tests. The dispatcher 20 does not execute operations, rather it functions as a communication tool for a higher level task desiring to launch a lower level task. In the confines of the system design, the higher level task cannot lower its priority level. Therefore, the higher level task must communicate the desire to spawn a lower priority level task. The agent 40 is resident at a lower priority level to act as a command dispatcher and to launch applications and load drivers 45 at lower priority levels. Accordingly, the dispatcher 20 is employed to assist in the spawning of tasks at a lower priority level of operation than the higher level task.
The data structure 50 is shared between the dispatcher 20 and the agent 40. The shared memory provides a basis for communication between the higher level task and the agent 40. The shared data structure 50 is a communication base shared by the two components. The agent 40 operates at a lower priority level than the dispatcher 20. Upon receiving messages from the remote administrator 30, the dispatcher 20 communicates receipt with the shared data structure 50. The shared data structure 50 communicates receipt of a communication from the dispatcher to the agent 40. A flag 55 is utilized as a communication tool from the shared data structure 50 to the agent 40. Accordingly, the dispatcher 20 and the agent 40 are the two major components of the diagnostic driver utilizing the flag 55 as the communication tool therebetween.
The agent 40 functions to launch lower level tasks in a loop. The agent 40 launches a lower level task only when prompted to do so by an event triggered by a higher level task. The agent 40 functions to perform a desired activity on behalf of the higher level task, while allowing the higher level task to maintain operation at its specified level. The flag 55 is instituted to awaken the agent 40 when a spawning of a lower level task is desired. Upon receiving the flag 55, the agent 40 reads the message placed in the shared data structure by the dispatcher 20. The flag 55 is a signal for the agent 40 to read the shared data structure 50 at a particular position. The agent 40 then launches the requested task at the lower priority level. Once the lower level task 60 has been launched, the agent 40 resets the flag 55. Accordingly, the agent 40 remains in an inactive state until such time as a flag 55 is set by the placement of a command message in the shared data structure 50.
FIG. 2 is a flow chart 200 illustrating implementation of the structure of the preferred embodiment. The firmware only permits drivers to load other firmware modules in its initialization code, it does not permit a driver to load other drivers after the driver's initialization has completed. Within these confines, the agent in the form of an application is the first module to be loaded 210. An application can load other applications and drivers during run time. The agent application is responsible for loading the remaining components of the structure, including the dispatcher 220. The remote administrator is existent within the firmware, and does not require any loading by the agent application. The remote administrator represents a control entity within the firmware and is responsible for running diagnostics and a path to the user interface. During loading of the dispatcher driver 220, the dispatcher and the remote administrator handshake 230, thereby making both the dispatcher and the remote administrator aware of their functions. Additionally, the dispatcher and the agent handshake 240 making both anchors aware of their related functions. In a preferred embodiment, the order of the handshaking steps 230 and 240 is interchangeable and is not critical to the function of the driver. The agent application acts as a command dispatcher for the diagnostic test following installation as a driver. This allows the dispatcher to spawn sub-tests at a lower priority. Accordingly, loading the structure in the form of drivers and adhering to the firmware guidelines allows the drivers within the structure to operate in stages.
FIG. 3 is a flow chart 300 illustrating the process of launching a lower priority level task from a higher level priority task. The remote administrator sends a message to the dispatcher 310 indicating the need to launch a lower priority level task. The dispatcher communicates receipt of the message from the remote administrator by placing a message in the shared data structure 320. Upon receiving a message from the shared dispatcher, the shared data structure sends a signal to the agent 330 indicating the need to launch a lower priority level task. The agent receives the signal and reads the instructions placed in the shared data structure. Following receipt of the instructions, the agent spawns the requested lower priority level task 340. Once the lower priority level task has been launched, the agent sends a signal to the data structure 350 indicating launching of the lower priority level task. The agent remains idle until the next time it receives a signal 330 from the shared data structure to launch a lower priority level task. Accordingly, the process employed for launching lower priority level tasks from a higher priority level tasks allows the agent to remain in memory in an inactive state until events cause the agent to become active.
Advantages Over the Prior Art
Prior art systems are designed to accommodate system interrupts to permit spawning of different tasks at different levels of operation. To either avoid the use of system interrupts, or in an environment where system interrupts are disabled, the invention permits the launching of lower priority level tasks without requiring the need to invoke a system interrupt or await a pause in the higher level task's operations.
Alternative Embodiments
It will be appreciated that, although specific embodiments of the invention have been described herein for purposes of illustration, various modifications may be made without departing from the spirit and scope of the invention. In particular, the scope of the invention is not limited to a three level system. The invention may be incorporated into a system with fewer or greater priority levels of operations. In addition, the invention may be incorporated into a system designed to accommodate system interrupts. Accordingly, this would allow the system to continue operation by disabling interrupts and incorporating the driver herein to enable launching of lower priority level tasks during operation of a higher priority level task.
In addition to operation of the system, the method of installing the driver is merely a preferred method of installing the components of the driver. However, there may be alternative methods of installation which would allow the components of the driver to function within the design parameters of the system firmware. Additionally, the agent does not necessarily have to be a cooperative agent application. Accordingly, the scope of protection of this invention is limited only by the following claims and their equivalents.
Patent Citations
Cited PatentFiling datePublication dateApplicantTitle
US6021438 *18 Jun 19971 Feb 2000Wyatt River Software, Inc.License management system using daemons and aliasing
US6088796 *6 Aug 199811 Jul 2000Cianfrocca; FrancisSecure middleware and server control system for querying through a network firewall
US6119118 *1 Jun 199912 Sep 2000Apple Computer, Inc.Method and system for extending file system metadata
US6349336 *15 Feb 200019 Feb 2002Hewlett-Packard CompanyAgent/proxy connection control across a firewall
US6393481 *20 Oct 199921 May 2002Worldcom, Inc.Method and apparatus for providing real-time call processing services in an intelligent network
US6442550 *14 Dec 199927 Aug 2002International Business Machines CorporationSystem and method in a collaborative data processing environment for customizing the quality of service on a per-client basis
US6460037 *1 Feb 19991 Oct 2002Mitel Knowledge CorporationAgent-based data mining and warehousing
US6460070 *3 Jun 19981 Oct 2002International Business Machines CorporationMobile agents for fault diagnosis and correction in a distributed computer environment
US6529932 *1 Apr 19984 Mar 2003Microsoft CorporationMethod and system for distributed transaction processing with asynchronous message delivery
US6621851 *28 Nov 200016 Sep 2003At&T Wireless Services, Inc.Priority messaging method for a discrete multitone spread spectrum communications system
US6647421 *10 Dec 200111 Nov 2003Webtv Networks, Inc.Method and apparatus for dispatching document requests in a proxy
US6697962 *20 Oct 200024 Feb 2004Unisys CorporationRemote computer system monitoring and diagnostic board
US6704819 *19 Apr 20009 Mar 2004Microsoft CorporationMethod and apparatus for device sharing and arbitration
US6782495 *19 Jun 200124 Aug 2004Xerox CorporationMethod for analyzing printer faults
US20020055846 *4 Jun 19989 May 2002Hajime TsuchitaniMessage handling method, message handling apparatus, and memory media for storing a message handling apparatus controlling program
US20020055980 *15 Aug 20019 May 2002Steve GoddardControlled server loading
US20020107905 *4 Feb 20028 Aug 2002Roe Colleen A.Scalable agent service system
US20020112089 *10 Apr 200215 Aug 2002Compaq Information Technologies Group, L.P.Method and system for supporting a system call and interprocess communication in a fault-tolerant,scalable distributed computer environment
US20020133805 *9 Mar 200119 Sep 2002Pugh William A.Multi-version hosting of application services
US20020138670 *26 Mar 200126 Sep 2002International Business Machines CorporationMethod, system, and program for prioritizing input/output (I/O) requests submitted to a device driver
US20020147389 *6 Nov 200110 Oct 2002Samuel CavallaroMethod and apparatus for concurrently displaying respective images representing real-time data and non-real-time data
US20020156932 *20 Apr 200124 Oct 2002Marc SchneidermanMethod and apparatus for providing parallel execution of computing tasks in heterogeneous computing environments using autonomous mobile agents
US20030214943 *9 Aug 200220 Nov 2003Microsoft CorporationMethod for switching protocols transparently in multi-user applications
US20040133609 *24 Oct 20038 Jul 2004Moore Reagan W.System of and method for transparent management of data objects in containers across distributed heterogenous resources
Referenced by
Citing PatentFiling datePublication dateApplicantTitle
US7478141 *26 Jun 200313 Jan 2009Intel CorporationAccessing firmware of a remote computer system using a remote firmware interface
US7703100 *12 Jul 200420 Apr 2010Computer Associates Think, Inc.Modified auto remote agent for job scheduling and management applications
US7865903 *23 Jun 20084 Jan 2011International Business Machines CorporationProcessing messages of agents
US8245231 *26 Sep 200714 Aug 2012International Business Machines CorporationMethod of launching low-priority tasks
Classifications
U.S. Classification718/103, 718/100, 718/102, 718/107, 719/318
International ClassificationG06F9/46, G06F9/00, G06F9/48
Cooperative ClassificationG06F9/4843
European ClassificationG06F9/48C4
Legal Events
DateCodeEventDescription
2 Jul 2001ASAssignment
Owner name: INTERNATIONAL BUSINESS MACHINES CORPORATION, NEW Y
Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:BOWER, FRED A., III;REEL/FRAME:011969/0470
Effective date: 20010702
21 Nov 2011REMIMaintenance fee reminder mailed
22 Mar 2012FPAYFee payment
Year of fee payment: 4
22 Mar 2012SULPSurcharge for late payment
|
{
"url": "http://www.google.ca/patents/US7356820?ie=ISO-8859-1",
"source_domain": "www.google.ca",
"snapshot_id": "crawl=CC-MAIN-2015-27",
"warc_metadata": {
"Content-Length": "68818",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:VQXLO53FERQO7TDNNS6NURIC46W45KTB",
"WARC-Concurrent-To": "<urn:uuid:8ec1c59e-1fbc-40b3-9f69-c861c56ee96e>",
"WARC-Date": "2015-07-02T05:28:45Z",
"WARC-IP-Address": "74.125.228.207",
"WARC-Identified-Payload-Type": null,
"WARC-Payload-Digest": "sha1:LV7GXVNPRAYJ6BG63GDL5TX2NDSM4VSX",
"WARC-Record-ID": "<urn:uuid:99b6d3e2-9ad7-4ce8-a59f-c9822a79c2d3>",
"WARC-Target-URI": "http://www.google.ca/patents/US7356820?ie=ISO-8859-1",
"WARC-Truncated": "length",
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:85aa9954-9b4f-447f-8faa-37d724fac897>"
},
"warc_info": "robots: classic\r\nhostname: ip-10-179-60-89.ec2.internal\r\nsoftware: Nutch 1.6 (CC)/CC WarcExport 1.0\r\nisPartOf: CC-MAIN-2015-27\r\noperator: CommonCrawl Admin\r\ndescription: Wide crawl of the web for June 2015\r\npublisher: CommonCrawl\r\nformat: WARC File Format 1.0\r\nconformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf"
}
|
{
"line_start_idx": [
0,
56,
64,
205,
206,
214,
215,
243,
274,
296,
328,
355,
377,
401,
416,
499,
605,
633,
694,
733,
784,
823,
837,
846,
1945,
1955,
1969,
1979,
1989,
2053,
2208,
2357,
2734,
2973,
3037,
3137,
3260,
3347,
3392,
3628,
3759,
3852,
3948,
4343,
4413,
4513,
4525,
4553,
4554,
4573,
4574,
4786,
4787,
4819,
4820,
5172,
5173,
6136,
6137,
6879,
6880,
7509,
7510,
7535,
7536,
7732,
7733,
8308,
8309,
9098,
9099,
9666,
9667,
9885,
9886,
9920,
9921,
10088,
10089,
10165,
10166,
10250,
10251,
10300,
10301,
10878,
10879,
10900,
10901,
11687,
11688,
12603,
12604,
13537,
13538,
14369,
14370,
15357,
15358,
17000,
17001,
18265,
18266,
18296,
18297,
18716,
18717,
18741,
18742,
19481,
19482,
20008,
20009,
20026,
20080,
20191,
20326,
20431,
20536,
20679,
20881,
20979,
21140,
21284,
21434,
21553,
21659,
21768,
21854,
22037,
22112,
22191,
22411,
22508,
22690,
22860,
23058,
23187,
23358,
23372,
23427,
23558,
23696,
23801,
23916,
23932,
23995,
24052,
24089,
24123,
24136,
24161,
24184,
24247,
24350,
24375,
24422,
24449,
24472
],
"line_end_idx": [
56,
64,
205,
206,
214,
215,
243,
274,
296,
328,
355,
377,
401,
416,
499,
605,
633,
694,
733,
784,
823,
837,
846,
1945,
1955,
1969,
1979,
1989,
2053,
2208,
2357,
2734,
2973,
3037,
3137,
3260,
3347,
3392,
3628,
3759,
3852,
3948,
4343,
4413,
4513,
4525,
4553,
4554,
4573,
4574,
4786,
4787,
4819,
4820,
5172,
5173,
6136,
6137,
6879,
6880,
7509,
7510,
7535,
7536,
7732,
7733,
8308,
8309,
9098,
9099,
9666,
9667,
9885,
9886,
9920,
9921,
10088,
10089,
10165,
10166,
10250,
10251,
10300,
10301,
10878,
10879,
10900,
10901,
11687,
11688,
12603,
12604,
13537,
13538,
14369,
14370,
15357,
15358,
17000,
17001,
18265,
18266,
18296,
18297,
18716,
18717,
18741,
18742,
19481,
19482,
20008,
20009,
20026,
20080,
20191,
20326,
20431,
20536,
20679,
20881,
20979,
21140,
21284,
21434,
21553,
21659,
21768,
21854,
22037,
22112,
22191,
22411,
22508,
22690,
22860,
23058,
23187,
23358,
23372,
23427,
23558,
23696,
23801,
23916,
23932,
23995,
24052,
24089,
24123,
24136,
24161,
24184,
24247,
24350,
24375,
24422,
24449,
24472,
24513
]
}
|
{
"red_pajama_v2": {
"ccnet_original_length": 24513,
"ccnet_original_nlines": 158,
"rps_doc_curly_bracket": 0,
"rps_doc_ldnoobw_words": 0,
"rps_doc_lorem_ipsum": 0,
"rps_doc_stop_word_fraction": 0.32752448320388794,
"rps_doc_ut1_blacklist": 0,
"rps_doc_frac_all_caps_words": 0.02888518013060093,
"rps_doc_frac_lines_end_with_ellipsis": 0,
"rps_doc_frac_no_alph_words": 0.13630938529968262,
"rps_doc_frac_unique_words": 0.2150307595729828,
"rps_doc_mean_word_length": 5.441561698913574,
"rps_doc_num_sentences": 171,
"rps_doc_symbol_to_word_ratio": 0,
"rps_doc_unigram_entropy": 5.363722324371338,
"rps_doc_word_count": 3739,
"rps_doc_frac_chars_dupe_10grams": 0.07303646951913834,
"rps_doc_frac_chars_dupe_5grams": 0.2633441388607025,
"rps_doc_frac_chars_dupe_6grams": 0.19772927463054657,
"rps_doc_frac_chars_dupe_7grams": 0.13309741020202637,
"rps_doc_frac_chars_dupe_8grams": 0.10916151106357574,
"rps_doc_frac_chars_dupe_9grams": 0.09893836826086044,
"rps_doc_frac_chars_top_2gram": 0.011550179682672024,
"rps_doc_frac_chars_top_3gram": 0.0176938995718956,
"rps_doc_frac_chars_top_4gram": 0.015138110145926476,
"rps_doc_books_importance": -1610.4036865234375,
"rps_doc_books_importance_length_correction": -1610.4036865234375,
"rps_doc_openwebtext_importance": -921.921875,
"rps_doc_openwebtext_importance_length_correction": -921.921875,
"rps_doc_wikipedia_importance": -625.4220581054688,
"rps_doc_wikipedia_importance_length_correction": -625.4220581054688
},
"fasttext": {
"dclm": 0.13606518507003784,
"english": 0.8834983110427856,
"fineweb_edu_approx": 2.3290364742279053,
"eai_general_math": 0.15800809860229492,
"eai_open_web_math": 0.08242487907409668,
"eai_web_code": 0.05550866946578026
}
}
|
{
"free_decimal_correspondence": {
"primary": {
"code": "005.4",
"labels": {
"level_1": "General works, books and libraries, information sciences",
"level_2": "",
"level_3": "Computer programming"
}
},
"secondary": {
"code": "004.02",
"labels": {
"level_1": "General works, books and libraries, information sciences",
"level_2": "",
"level_3": "Computers and Computer science"
}
}
},
"bloom_cognitive_process": {
"primary": {
"code": "2",
"label": "Understand"
},
"secondary": {
"code": "3",
"label": "Apply"
}
},
"bloom_knowledge_domain": {
"primary": {
"code": "3",
"label": "Procedural"
},
"secondary": {
"code": "2",
"label": "Conceptual"
}
},
"document_type_v1": {
"primary": {
"code": "11",
"label": "Legal/Regulatory"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"extraction_artifacts": {
"primary": {
"code": "3",
"label": "Irrelevant Content"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"missing_content": {
"primary": {
"code": "4",
"label": "Missing Images or Figures"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"document_type_v2": {
"primary": {
"code": "8",
"label": "Documentation"
},
"secondary": {
"code": "20",
"label": "Structured Data"
}
},
"reasoning_depth": {
"primary": {
"code": "3",
"label": "Intermediate Reasoning"
},
"secondary": {
"code": "4",
"label": "Advanced Reasoning"
}
},
"technical_correctness": {
"primary": {
"code": "4",
"label": "Highly Correct"
},
"secondary": {
"code": "5",
"label": "Exceptionally Correct"
}
},
"education_level": {
"primary": {
"code": "4",
"label": "Graduate/Expert Level"
},
"secondary": {
"code": "3",
"label": "Undergraduate Level"
}
}
}
|
672f1e42c33a7f9846924a2431ea77df
|
-7,459,124,942,607,206,000 |
Cactivedataprovider With Custom Query
Hello!
I’m trying to use CActiveDataProvider to display the overall score (based on the average of three categories of the table “rating”) in my CListView.
The following code shows no errors, and also can not access the score in CListView.
The command print_r($data), prints no information on the rating section: Array ( [rating] => Array ( ) )
Please help me!
Thanks!
ModelController.php
public function actionIndex()
{
$dataProvider=new CActiveDataProvider('Model', array(
'criteria'=>array(
'order'=>'t.id DESC',
'with'=>array('rating'=>array('select'=>array('AVG(cat1+cat2+cat3) AS score'))),
)));
$this->render('index',array(
'dataProvider'=>$dataProvider
));
}
index.php
<?php $this->widget('zii.widgets.CListView', array(
'dataProvider'=>$dataProvider,
'itemView'=>'_view'
)); ?>
I used below code in my project.
Add this code in components
<?php
class MyActiveDataProvider extends CActiveDataProvider {
protected function calculateTotalItemCount() {
$baseCriteria=$this->model->getDbCriteria(false);
if ($baseCriteria!==null)
$baseCriteria=clone $baseCriteria;
//You can get real records count only in this way (when you use JOIN and GROUP BY)
$count=count($this->model->findAll($this->getCriteria()));
$this->model->setDbCriteria($baseCriteria);
return $count;
}
}
?>
model search function
<?php
public function searchbygroup()
{
$criteria=new CDbCriteria;
//custom query
$criteria->select=array('*,concat(documentid,"_",userid) as groupid,count(documentid) as downloadcount');
//Add Different Condition
$criteria->compare('userid',$this->userid,true);
$criteria->addCondition("documentid IN ('$this->documentid')");
$criteria->addBetweenCondition('createdon',$this->datefrom,$this->dateto);
// group by , if need
$criteria->group='groupid';
//return new CActiveDataProvider($this, array( 'criteria'=>$criteria, ));
return new MyActiveDataProvider($this,array('criteria'=>$criteria));
}
?>
Hey mbala! Thanks for your time.
I’m a newbie, my apologies, but where I have to change your code so I can calculate the score based on the average of three columns from another table?
Thanks!
Try this
public function actionIndex()
{
$criteria=new CDbCriteria;
$criteria->select=array('*,AVG(cat1+cat2+cat3) AS score');
$criteria->order='id desc';
$dataProvider=new MyActiveDataProvider($this,array('criteria'=>$criteria));
$this->render('index',array(
'dataProvider'=>$dataProvider
));
}
add your model name instead of $this
$dataProvider=new MyActiveDataProvider('modelname',array('criteria'=>$criteria));
$this->render('index',array(
'dataProvider'=>$dataProvider
));
Hello,
Sorry to say this,
But it could not resolve my issue related to speedup.
|
{
"url": "https://forum.yiiframework.com/t/cactivedataprovider-with-custom-query/72198",
"source_domain": "forum.yiiframework.com",
"snapshot_id": "CC-MAIN-2023-23",
"warc_metadata": {
"Content-Length": "32087",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:MFZDZGDRMGVHG3T47G4QZYHALFCZXCPG",
"WARC-Concurrent-To": "<urn:uuid:277bfe9b-4128-4854-b395-9b681f49380c>",
"WARC-Date": "2023-06-02T21:27:00Z",
"WARC-IP-Address": "159.69.125.49",
"WARC-Identified-Payload-Type": "text/html",
"WARC-Payload-Digest": "sha1:PCZD65Z335GJYFFOELA67G4QZA5H3HK7",
"WARC-Record-ID": "<urn:uuid:917b0337-21ee-4dd4-a585-0c67690e8964>",
"WARC-Target-URI": "https://forum.yiiframework.com/t/cactivedataprovider-with-custom-query/72198",
"WARC-Truncated": null,
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:db3fecd0-5bd9-4c2a-8787-b0633eb59046>"
},
"warc_info": "isPartOf: CC-MAIN-2023-23\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for May/June 2023\r\noperator: Common Crawl Admin ([email protected])\r\nhostname: ip-10-67-67-225\r\nsoftware: Apache Nutch 1.19 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.4-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: https://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/"
}
|
{
"line_start_idx": [
0,
38,
39,
46,
47,
196,
197,
281,
282,
387,
388,
404,
405,
413,
414,
434,
435,
436,
437,
438,
468,
469,
472,
473,
529,
530,
552,
553,
579,
580,
665,
666,
674,
675,
676,
707,
708,
741,
742,
748,
749,
752,
753,
754,
755,
765,
766,
767,
768,
769,
821,
822,
854,
855,
876,
877,
884,
885,
886,
887,
920,
921,
949,
950,
951,
952,
953,
959,
960,
1017,
1018,
1019,
1070,
1071,
1129,
1130,
1164,
1165,
1216,
1217,
1308,
1309,
1376,
1377,
1429,
1430,
1453,
1454,
1460,
1461,
1463,
1464,
1467,
1468,
1469,
1470,
1492,
1493,
1494,
1495,
1496,
1502,
1503,
1539,
1540,
1543,
1544,
1580,
1581,
1598,
1599,
1713,
1714,
1742,
1743,
1794,
1795,
1867,
1868,
1945,
1946,
1976,
1977,
2013,
2014,
2093,
2094,
2171,
2172,
2175,
2176,
2179,
2180,
2181,
2182,
2183,
2216,
2217,
2369,
2370,
2378,
2379,
2388,
2389,
2390,
2391,
2392,
2422,
2423,
2425,
2426,
2461,
2462,
2522,
2523,
2559,
2560,
2563,
2564,
2641,
2642,
2672,
2673,
2704,
2705,
2710,
2711,
2713,
2714,
2715,
2716,
2753,
2754,
2755,
2756,
2757,
2847,
2848,
2885,
2886,
2924,
2925,
2937,
2938,
2945,
2964
],
"line_end_idx": [
38,
39,
46,
47,
196,
197,
281,
282,
387,
388,
404,
405,
413,
414,
434,
435,
436,
437,
438,
468,
469,
472,
473,
529,
530,
552,
553,
579,
580,
665,
666,
674,
675,
676,
707,
708,
741,
742,
748,
749,
752,
753,
754,
755,
765,
766,
767,
768,
769,
821,
822,
854,
855,
876,
877,
884,
885,
886,
887,
920,
921,
949,
950,
951,
952,
953,
959,
960,
1017,
1018,
1019,
1070,
1071,
1129,
1130,
1164,
1165,
1216,
1217,
1308,
1309,
1376,
1377,
1429,
1430,
1453,
1454,
1460,
1461,
1463,
1464,
1467,
1468,
1469,
1470,
1492,
1493,
1494,
1495,
1496,
1502,
1503,
1539,
1540,
1543,
1544,
1580,
1581,
1598,
1599,
1713,
1714,
1742,
1743,
1794,
1795,
1867,
1868,
1945,
1946,
1976,
1977,
2013,
2014,
2093,
2094,
2171,
2172,
2175,
2176,
2179,
2180,
2181,
2182,
2183,
2216,
2217,
2369,
2370,
2378,
2379,
2388,
2389,
2390,
2391,
2392,
2422,
2423,
2425,
2426,
2461,
2462,
2522,
2523,
2559,
2560,
2563,
2564,
2641,
2642,
2672,
2673,
2704,
2705,
2710,
2711,
2713,
2714,
2715,
2716,
2753,
2754,
2755,
2756,
2757,
2847,
2848,
2885,
2886,
2924,
2925,
2937,
2938,
2945,
2964,
3017
]
}
|
{
"red_pajama_v2": {
"ccnet_original_length": 3017,
"ccnet_original_nlines": 185,
"rps_doc_curly_bracket": 0.003314550034701824,
"rps_doc_ldnoobw_words": 0,
"rps_doc_lorem_ipsum": 0,
"rps_doc_stop_word_fraction": 0.18448275327682495,
"rps_doc_ut1_blacklist": 0,
"rps_doc_frac_all_caps_words": 0.02413792908191681,
"rps_doc_frac_lines_end_with_ellipsis": 0,
"rps_doc_frac_no_alph_words": 0.40689656138420105,
"rps_doc_frac_unique_words": 0.5925925970077515,
"rps_doc_mean_word_length": 8.296296119689941,
"rps_doc_num_sentences": 23,
"rps_doc_symbol_to_word_ratio": 0,
"rps_doc_unigram_entropy": 4.770973205566406,
"rps_doc_word_count": 243,
"rps_doc_frac_chars_dupe_10grams": 0,
"rps_doc_frac_chars_dupe_5grams": 0.0287698395550251,
"rps_doc_frac_chars_dupe_6grams": 0.0287698395550251,
"rps_doc_frac_chars_dupe_7grams": 0.0287698395550251,
"rps_doc_frac_chars_dupe_8grams": 0,
"rps_doc_frac_chars_dupe_9grams": 0,
"rps_doc_frac_chars_top_2gram": 0.007440479937940836,
"rps_doc_frac_chars_top_3gram": 0.011904760263860226,
"rps_doc_frac_chars_top_4gram": 0.014880949631333351,
"rps_doc_books_importance": -278.5751953125,
"rps_doc_books_importance_length_correction": -278.5751953125,
"rps_doc_openwebtext_importance": -175.23475646972656,
"rps_doc_openwebtext_importance_length_correction": -175.23475646972656,
"rps_doc_wikipedia_importance": -150.7190704345703,
"rps_doc_wikipedia_importance_length_correction": -150.7190704345703
},
"fasttext": {
"dclm": 0.033766329288482666,
"english": 0.4684213399887085,
"fineweb_edu_approx": 1.280078649520874,
"eai_general_math": 0.45657432079315186,
"eai_open_web_math": 0.4735546112060547,
"eai_web_code": 0.4053083062171936
}
}
|
{
"free_decimal_correspondence": {
"primary": {
"code": "005.1",
"labels": {
"level_1": "General works, books and libraries, information sciences",
"level_2": "",
"level_3": "Computer programming"
}
},
"secondary": {
"code": "005.4",
"labels": {
"level_1": "General works, books and libraries, information sciences",
"level_2": "",
"level_3": "Computer programming"
}
}
},
"bloom_cognitive_process": {
"primary": {
"code": "3",
"label": "Apply"
},
"secondary": {
"code": "2",
"label": "Understand"
}
},
"bloom_knowledge_domain": {
"primary": {
"code": "3",
"label": "Procedural"
},
"secondary": {
"code": "2",
"label": "Conceptual"
}
},
"document_type_v1": {
"primary": {
"code": "5",
"label": "Social/Forum"
},
"secondary": {
"code": "4",
"label": "Code/Software"
}
},
"extraction_artifacts": {
"primary": {
"code": "0",
"label": "No Artifacts"
},
"secondary": {
"code": "3",
"label": "Irrelevant Content"
}
},
"missing_content": {
"primary": {
"code": "0",
"label": "No missing content"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"document_type_v2": {
"primary": {
"code": "18",
"label": "Q&A Forum"
},
"secondary": {
"code": "8",
"label": "Documentation"
}
},
"reasoning_depth": {
"primary": {
"code": "2",
"label": "Basic Reasoning"
},
"secondary": {
"code": "3",
"label": "Intermediate Reasoning"
}
},
"technical_correctness": {
"primary": {
"code": "2",
"label": "Partially Correct"
},
"secondary": {
"code": "3",
"label": "Mostly Correct"
}
},
"education_level": {
"primary": {
"code": "3",
"label": "Undergraduate Level"
},
"secondary": {
"code": "4",
"label": "Graduate/Expert Level"
}
}
}
|
672f1e42c33a7f9846924a2431ea77df
|
-3,869,334,744,014,923,300 |
Welcome to WebmasterWorld Guest from 54.221.55.153
Forum Moderators: open
Message Too Old, No Replies
Cookies and submitting
Do they need to be turned off
biggles
10:35 pm on Aug 18, 2002 (gmt 0)
10+ Year Member
Would someone please explain to me the recommendation some make for turning off cookies when submitting to search engines by hand.
I'm wondering if it's to stop search engines identifying people who oversubmit pages for one individual site. Fair enough they get caught out for spamming.
However if you're submitting within guidelines but for <b>multiple</b> sites is it still an issue? What do others do?
Thanks
Knowles
10:41 pm on Aug 18, 2002 (gmt 0)
10+ Year Member
Welcome to WebmasterWorld biggles, if no one else has offered that so far.
As long as you are not submitting duplicate sites I dont see the problem. Its possible I have missed the talk around here about it but I havent seen any. This to me sounds like an old wise tell.
Featured Threads
Hot Threads This Week
Hot Threads This Month
|
{
"url": "https://www.webmasterworld.com/forum27/415.htm",
"source_domain": "www.webmasterworld.com",
"snapshot_id": "crawl=CC-MAIN-2015-48",
"warc_metadata": {
"Content-Length": "33660",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:U6ST7QVWNLZMYXFHYJVAKMPMQ7RQTFNM",
"WARC-Concurrent-To": "<urn:uuid:bc765710-fc02-42f8-875b-cd9358485591>",
"WARC-Date": "2015-11-30T10:42:36Z",
"WARC-IP-Address": "72.10.193.101",
"WARC-Identified-Payload-Type": null,
"WARC-Payload-Digest": "sha1:D4MQLZ7NW6ZEPOYM4T6GCGBG452VIYE7",
"WARC-Record-ID": "<urn:uuid:f932473a-a05e-4a74-a53d-a134a7f8dc23>",
"WARC-Target-URI": "https://www.webmasterworld.com/forum27/415.htm",
"WARC-Truncated": null,
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:61ff3a83-285e-4c38-9457-f326c551dd02>"
},
"warc_info": "robots: classic\r\nhostname: ip-10-71-132-137.ec2.internal\r\nsoftware: Nutch 1.6 (CC)/CC WarcExport 1.0\r\nisPartOf: CC-MAIN-2015-48\r\noperator: CommonCrawl Admin\r\ndescription: Wide crawl of the web for Nov 2015\r\npublisher: CommonCrawl\r\nformat: WARC File Format 1.0\r\nconformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf"
}
|
{
"line_start_idx": [
0,
51,
52,
75,
76,
104,
105,
128,
129,
159,
160,
166,
167,
175,
176,
209,
210,
226,
227,
228,
229,
360,
361,
517,
518,
636,
637,
644,
645,
653,
654,
687,
688,
704,
705,
706,
707,
782,
783,
978,
979,
981,
982,
999,
1000,
1022,
1023
],
"line_end_idx": [
51,
52,
75,
76,
104,
105,
128,
129,
159,
160,
166,
167,
175,
176,
209,
210,
226,
227,
228,
229,
360,
361,
517,
518,
636,
637,
644,
645,
653,
654,
687,
688,
704,
705,
706,
707,
782,
783,
978,
979,
981,
982,
999,
1000,
1022,
1023,
1045
]
}
|
{
"red_pajama_v2": {
"ccnet_original_length": 1045,
"ccnet_original_nlines": 46,
"rps_doc_curly_bracket": 0,
"rps_doc_ldnoobw_words": 0,
"rps_doc_lorem_ipsum": 0,
"rps_doc_stop_word_fraction": 0.3669724762439728,
"rps_doc_ut1_blacklist": 0,
"rps_doc_frac_all_caps_words": 0.01834861934185028,
"rps_doc_frac_lines_end_with_ellipsis": 0,
"rps_doc_frac_no_alph_words": 0.22018349170684814,
"rps_doc_frac_unique_words": 0.6988636255264282,
"rps_doc_mean_word_length": 4.568181991577148,
"rps_doc_num_sentences": 13,
"rps_doc_symbol_to_word_ratio": 0,
"rps_doc_unigram_entropy": 4.689294815063477,
"rps_doc_word_count": 176,
"rps_doc_frac_chars_dupe_10grams": 0.07213930040597916,
"rps_doc_frac_chars_dupe_5grams": 0.07213930040597916,
"rps_doc_frac_chars_dupe_6grams": 0.07213930040597916,
"rps_doc_frac_chars_dupe_7grams": 0.07213930040597916,
"rps_doc_frac_chars_dupe_8grams": 0.07213930040597916,
"rps_doc_frac_chars_dupe_9grams": 0.07213930040597916,
"rps_doc_frac_chars_top_2gram": 0.02238805964589119,
"rps_doc_frac_chars_top_3gram": 0.057213928550481796,
"rps_doc_frac_chars_top_4gram": 0.02238805964589119,
"rps_doc_books_importance": -110.06470489501953,
"rps_doc_books_importance_length_correction": -110.06470489501953,
"rps_doc_openwebtext_importance": -62.87582015991211,
"rps_doc_openwebtext_importance_length_correction": -50.000179290771484,
"rps_doc_wikipedia_importance": -30.9614200592041,
"rps_doc_wikipedia_importance_length_correction": -30.9614200592041
},
"fasttext": {
"dclm": 0.042501211166381836,
"english": 0.9344936609268188,
"fineweb_edu_approx": 0.8093225359916687,
"eai_general_math": 0.006455299910157919,
"eai_open_web_math": 0.08006597310304642,
"eai_web_code": 0.002492370083928108
}
}
|
{
"free_decimal_correspondence": {
"primary": {
"code": "005.82",
"labels": {
"level_1": "General works, books and libraries, information sciences",
"level_2": "",
"level_3": "Computer programming"
}
},
"secondary": {
"code": "004.67",
"labels": {
"level_1": "General works, books and libraries, information sciences",
"level_2": "",
"level_3": "Computers and Computer science"
}
}
},
"bloom_cognitive_process": {
"primary": {
"code": "2",
"label": "Understand"
},
"secondary": {
"code": "3",
"label": "Apply"
}
},
"bloom_knowledge_domain": {
"primary": {
"code": "2",
"label": "Conceptual"
},
"secondary": {
"code": "3",
"label": "Procedural"
}
},
"document_type_v1": {
"primary": {
"code": "5",
"label": "Social/Forum"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"extraction_artifacts": {
"primary": {
"code": "3",
"label": "Irrelevant Content"
},
"secondary": {
"code": "0",
"label": "No Artifacts"
}
},
"missing_content": {
"primary": {
"code": "0",
"label": "No missing content"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"document_type_v2": {
"primary": {
"code": "18",
"label": "Q&A Forum"
},
"secondary": {
"code": "21",
"label": "Customer Support"
}
},
"reasoning_depth": {
"primary": {
"code": "2",
"label": "Basic Reasoning"
},
"secondary": {
"code": "1",
"label": "No Reasoning"
}
},
"technical_correctness": {
"primary": {
"code": "6",
"label": "Not Applicable/Indeterminate"
},
"secondary": {
"code": "2",
"label": "Partially Correct"
}
},
"education_level": {
"primary": {
"code": "2",
"label": "High School Level"
},
"secondary": {
"code": "1",
"label": "General Audience"
}
}
}
|
672f1e42c33a7f9846924a2431ea77df
|
6,943,383,786,436,609,000 |
DMZ on ESXI Servers
Hi Guys,
Firewall->HP Switch Layer 3 -> esxi servers 1,2
I'm a vmware vsphere 6 newbie.
I have 2 physical ESXI servers(ESXI v6) that host 30 virtual servers. vmWare vCenter 6 is set up properly. Desperatly looking for some help/advice on this.
Every physical server has 5 gigabit ethernet connections.
Connected NICs:
Management Network x1 (vmnic0)
LAN x3 ( vmnic 1,vmnic2) (30x Vms)
ISCSI x2 (vmnic3,vmnic4)
Everything is up and running smoothly on our production Network.
Now I need to connect these physical servers to DMZ since there are some vm's that should run on that part of our network.
How should I do that?
What are you guys doing out there?
How about vLANS? Can it be set up and span multiple subnets so I can keep all servers connected to internal LAN?
Thanks in advance.
needs needsAsked:
Who is Participating?
I wear a lot of hats...
"The solutions and answers provided on Experts Exchange have been extremely helpful to me over the last few years. I wear a lot of hats - Developer, Database Administrator, Help Desk, etc., so I know a lot of things but not a lot about one thing. Experts Exchange gives me answers from people who do know a lot about one thing, in a easy to use platform." -Todd S.
systechadminConsultantCommented:
0
Andrew Hancock (VMware vExpert / EE MVE^2)VMware and Virtualization ConsultantCommented:
You can either dedicate two DMZ physical network interfaces and connect these to your DMZ
make sure you connect these two network ports on your switch to each ESXi host.
Or you could use VLANS.
0
Ben Personick (Previously QCubed)Lead Network EngineerCommented:
You losred LAN x3 but only show 2 nNICs so I suspect you mean LAN x
2.
I would run a second VLAN over the LAN adapters and use that for DMZ.
That would be the easiest setup and depending on your HP switches configuration, if they are already set up astrunks with allowed and default vlans
If they aren't already set up that way both are about equal in terms of work, and have similar caveats in doing the chamge without disruption.
However once VLans are in place you will be able to add more networks on additional Clans with very little effort and no chance of dissruption
0
Ultimate Tool Kit for Technology Solution Provider
Broken down into practical pointers and step-by-step instructions, the IT Service Excellence Tool Kit delivers expert advice for technology solution providers. Get your free copy now.
needs needsAuthor Commented:
Thank you so much for the Infos
@Ben can u please Little bit more info give? sorry LAN (2 x physical Nics connected.Name is only LAN.)
I would run a second VLAN over the LAN adapters and use that for DMZ. I think this is very interesting if i can achive it.
Thanks in advance
0
needs needsAuthor Commented:
By the way ,There is no VLAN configured on any HP Switches .
0
Andrew Hancock (VMware vExpert / EE MVE^2)VMware and Virtualization ConsultantCommented:
So you will have to complete some network re-design, and create a trunk using two physical network ports (a static trunk), and create VLANS for LAN and DMZ.
A bit puzzled because we discussed VLANS with you in this question?
https://www.experts-exchange.com/questions/29083986/vmware-trunk-NIC.html
0
Ben Personick (Previously QCubed)Lead Network EngineerCommented:
Thank you so much for the Infos
@Ben can u please Little bit more info give? sorry LAN (2 x physical Nics connected.Name is only LAN.)
I would run a second VLAN over the LAN adapters and use that for DMZ. I think this is very interesting if i can achieve it.
Thanks in advance
• 1) Create An additional vLAN on your switch (If your switch supports VLANS at all, there is already a default (VLAN 1) and you will be creating an additional VLAN say, VLAN 3, and labeling it DMZ
• 2) Connect your Router's DMZ interface to the switch on VLAN 3, or change it's interface to have VLAN interfaces and trunk them to the switch and set up the router/Firewall's Interface as a trunk port (Whichever you personally find easier, which I suspect will be the physical interfaces for now as you seem to be relatively unsure about basic network setup -- no offence intended)
• 3) On the ESXi Server pull one NIC out of the current vSwitch configuration for LAN.
• 4) On the Switch set that ESXi's NIC port to be a Trunk port with a native VLAN of VLAN 1 (IF POSSIBLE, Some low-grade switches don't allow the tagged an untagged vlans, so YMMV).
• 5) IF your switch allows VLANs to pass both tagged an untagged traffic then you can add the NIC back into the existing setup and then repeat steps 3 and 4 on the other NIC before moving on to Step 9.
• 6) IF your switch does not allow tagged an untagged VLANs, set the Set up the same existing LAN Network as a new vSwitch with similar name, the switch will have VLAN tagging set to 1.
• 7) Move a test VM to this switch and confirm it is working, once confirmed, move all remaining VMs LAN NICs to the new Network.
• 8) Remove the remaining NICE in the original LAN network and add it into the New LAN network.
• 9) Create a New vSwitch with VLAN 3 on it and name it for the DMZ.
0
Experts Exchange Solution brought to you by
Your issues matter to us.
Facing a tech roadblock? Get the help and guidance you need from experienced professionals who care. Ask your question anytime, anywhere, with no hassle.
Start your 7-day free trial
needs needsAuthor Commented:
Thank you all ,
0
Ben Personick (Previously QCubed)Lead Network EngineerCommented:
Glad to help :)
0
It's more than this solution.Get answers and train to solve all your tech problems - anytime, anywhere.Try it for free Edge Out The Competitionfor your dream job with proven skills and certifications.Get started today Stand Outas the employee with proven skills.Start learning today for free Move Your Career Forwardwith certification training in the latest technologies.Start your trial today
Switches / Hubs
From novice to tech pro — start learning today.
Question has a verified solution.
Are you are experiencing a similar issue? Get a personalized answer when you ask a related question.
Have a better answer? Share it in a comment.
|
{
"url": "https://www.experts-exchange.com/questions/29084822/DMZ-on-ESXI-Servers.html",
"source_domain": "www.experts-exchange.com",
"snapshot_id": "crawl=CC-MAIN-2018-30",
"warc_metadata": {
"Content-Length": "155720",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:3XIABSYFSM2FIUYKBYBKDTUNIXB7Z54D",
"WARC-Concurrent-To": "<urn:uuid:ea1f45cc-fc54-49bd-8402-180973162ae2>",
"WARC-Date": "2018-07-17T14:20:00Z",
"WARC-IP-Address": "104.20.168.10",
"WARC-Identified-Payload-Type": "text/html",
"WARC-Payload-Digest": "sha1:Y2N4I3WEX3ZKI5OMBLTFZB565RHFHPIP",
"WARC-Record-ID": "<urn:uuid:89d363e3-65b2-4ee8-a7a3-044aed356f27>",
"WARC-Target-URI": "https://www.experts-exchange.com/questions/29084822/DMZ-on-ESXI-Servers.html",
"WARC-Truncated": null,
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:8eb1c228-64b2-49d1-83a9-3ab11b696c85>"
},
"warc_info": "robots: classic\r\nhostname: ip-10-170-172-222.ec2.internal\r\nsoftware: Nutch 1.6 (CC)\r\nisPartOf: CC-MAIN-2018-30\r\noperator: Common Crawl Admin\r\ndescription: Wide crawl of the web for July 2018\r\npublisher: Common Crawl\r\nformat: WARC File Format 1.0\r\nconformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf"
}
|
{
"line_start_idx": [
0,
20,
21,
30,
31,
79,
80,
111,
267,
268,
326,
327,
343,
344,
375,
411,
436,
437,
438,
439,
440,
505,
506,
629,
630,
652,
687,
688,
801,
802,
803,
822,
840,
862,
886,
887,
1252,
1253,
1286,
1288,
1377,
1467,
1468,
1548,
1549,
1573,
1575,
1640,
1708,
1711,
1712,
1782,
1783,
1931,
1932,
2075,
2076,
2219,
2221,
2272,
2273,
2457,
2458,
2487,
2519,
2520,
2623,
2624,
2625,
2748,
2749,
2767,
2769,
2798,
2859,
2861,
2950,
3107,
3108,
3176,
3177,
3251,
3253,
3318,
3350,
3351,
3454,
3455,
3456,
3580,
3581,
3599,
3600,
3800,
4186,
4275,
4459,
4663,
4851,
4983,
5081,
5152,
5154,
5155,
5199,
5200,
5226,
5227,
5381,
5382,
5410,
5439,
5455,
5457,
5522,
5538,
5540,
5934,
5950,
5951,
5999,
6000,
6034,
6035,
6136,
6137
],
"line_end_idx": [
20,
21,
30,
31,
79,
80,
111,
267,
268,
326,
327,
343,
344,
375,
411,
436,
437,
438,
439,
440,
505,
506,
629,
630,
652,
687,
688,
801,
802,
803,
822,
840,
862,
886,
887,
1252,
1253,
1286,
1288,
1377,
1467,
1468,
1548,
1549,
1573,
1575,
1640,
1708,
1711,
1712,
1782,
1783,
1931,
1932,
2075,
2076,
2219,
2221,
2272,
2273,
2457,
2458,
2487,
2519,
2520,
2623,
2624,
2625,
2748,
2749,
2767,
2769,
2798,
2859,
2861,
2950,
3107,
3108,
3176,
3177,
3251,
3253,
3318,
3350,
3351,
3454,
3455,
3456,
3580,
3581,
3599,
3600,
3800,
4186,
4275,
4459,
4663,
4851,
4983,
5081,
5152,
5154,
5155,
5199,
5200,
5226,
5227,
5381,
5382,
5410,
5439,
5455,
5457,
5522,
5538,
5540,
5934,
5950,
5951,
5999,
6000,
6034,
6035,
6136,
6137,
6181
]
}
|
{
"red_pajama_v2": {
"ccnet_original_length": 6181,
"ccnet_original_nlines": 125,
"rps_doc_curly_bracket": 0,
"rps_doc_ldnoobw_words": 0,
"rps_doc_lorem_ipsum": 0,
"rps_doc_stop_word_fraction": 0.36583462357521057,
"rps_doc_ut1_blacklist": 0,
"rps_doc_frac_all_caps_words": 0.06708268076181412,
"rps_doc_frac_lines_end_with_ellipsis": 0.007936510257422924,
"rps_doc_frac_no_alph_words": 0.1825273036956787,
"rps_doc_frac_unique_words": 0.37748342752456665,
"rps_doc_mean_word_length": 4.595080375671387,
"rps_doc_num_sentences": 64,
"rps_doc_symbol_to_word_ratio": 0.0007800299790687859,
"rps_doc_unigram_entropy": 5.458690643310547,
"rps_doc_word_count": 1057,
"rps_doc_frac_chars_dupe_10grams": 0.12023883312940598,
"rps_doc_frac_chars_dupe_5grams": 0.18056413531303406,
"rps_doc_frac_chars_dupe_6grams": 0.16162240505218506,
"rps_doc_frac_chars_dupe_7grams": 0.15544575452804565,
"rps_doc_frac_chars_dupe_8grams": 0.12023883312940598,
"rps_doc_frac_chars_dupe_9grams": 0.12023883312940598,
"rps_doc_frac_chars_top_2gram": 0.006176650058478117,
"rps_doc_frac_chars_top_3gram": 0.00926498044282198,
"rps_doc_frac_chars_top_4gram": 0.014206299558281898,
"rps_doc_books_importance": -538.6098022460938,
"rps_doc_books_importance_length_correction": -538.6098022460938,
"rps_doc_openwebtext_importance": -358.0460205078125,
"rps_doc_openwebtext_importance_length_correction": -358.0460205078125,
"rps_doc_wikipedia_importance": -279.64459228515625,
"rps_doc_wikipedia_importance_length_correction": -279.64459228515625
},
"fasttext": {
"dclm": 0.03382742032408714,
"english": 0.9040319323539734,
"fineweb_edu_approx": 1.1335537433624268,
"eai_general_math": 0.17935365438461304,
"eai_open_web_math": 0.3453044891357422,
"eai_web_code": 0.009985149838030338
}
}
|
{
"free_decimal_correspondence": {
"primary": {
"code": "004.17",
"labels": {
"level_1": "General works, books and libraries, information sciences",
"level_2": "",
"level_3": "Computers and Computer science"
}
},
"secondary": {
"code": "005.452",
"labels": {
"level_1": "General works, books and libraries, information sciences",
"level_2": "",
"level_3": "Computer programming"
}
}
},
"bloom_cognitive_process": {
"primary": {
"code": "3",
"label": "Apply"
},
"secondary": {
"code": "2",
"label": "Understand"
}
},
"bloom_knowledge_domain": {
"primary": {
"code": "3",
"label": "Procedural"
},
"secondary": {
"code": "2",
"label": "Conceptual"
}
},
"document_type_v1": {
"primary": {
"code": "5",
"label": "Social/Forum"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"extraction_artifacts": {
"primary": {
"code": "0",
"label": "No Artifacts"
},
"secondary": {
"code": "3",
"label": "Irrelevant Content"
}
},
"missing_content": {
"primary": {
"code": "0",
"label": "No missing content"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"document_type_v2": {
"primary": {
"code": "18",
"label": "Q&A Forum"
},
"secondary": {
"code": "8",
"label": "Documentation"
}
},
"reasoning_depth": {
"primary": {
"code": "3",
"label": "Intermediate Reasoning"
},
"secondary": {
"code": "2",
"label": "Basic Reasoning"
}
},
"technical_correctness": {
"primary": {
"code": "4",
"label": "Highly Correct"
},
"secondary": {
"code": "3",
"label": "Mostly Correct"
}
},
"education_level": {
"primary": {
"code": "3",
"label": "Undergraduate Level"
},
"secondary": {
"code": "4",
"label": "Graduate/Expert Level"
}
}
}
|
672f1e42c33a7f9846924a2431ea77df
|
7,059,238,891,031,830,000 |
Evento desencadenante cuando se presiona el botón en Android
Tengo el siguiente código para Android que funciona bien para reproducir un sonido una vez que se hace clic en un botón:
Button SoundButton2 = (Button)findViewById(R.id.sound2); SoundButton2.setOnClickListener(new OnClickListener() { public void onClick(View v) { mSoundManager.playSound(2); } });
Mi problema es que quiero que el sonido se reproduzca inmediatamente después de presionar el botón (tocar hacia abajo), no cuando se suelta (retocar). ¿Alguna idea sobre cómo puedo lograr esto?
Tal vez usando un OnTouchListener ? Supongo que MotionEvent tendrá algunos métodos para registrar un toque en el objeto.
button.setOnTouchListener(new OnTouchListener() { @Override public boolean onTouch(View v, MotionEvent event) { // TODO Auto-generated method stub return false; } }))
Deberías hacer esto: b es el botón.
b.setOnTouchListener(new OnTouchListener() { @Override public boolean onTouch(View v, MotionEvent event) { if (event.getAction() == MotionEvent.ACTION_DOWN ) { mSoundManager.playSound(2); return true; } return false; } });
import android.view.MotionEvent;
|
{
"url": "https://www.dokry.com/45930",
"source_domain": "www.dokry.com",
"snapshot_id": "crawl=CC-MAIN-2021-49",
"warc_metadata": {
"Content-Length": "13007",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:TNRL3EC2AIBL3EY2CBUGCLPXTKLDFE4B",
"WARC-Concurrent-To": "<urn:uuid:454da141-38b3-4a11-8b13-e77c9d070f14>",
"WARC-Date": "2021-12-06T07:38:32Z",
"WARC-IP-Address": "69.163.34.11",
"WARC-Identified-Payload-Type": "text/html",
"WARC-Payload-Digest": "sha1:36IKZH3HM742VDUUBU5GE7OAONXA4734",
"WARC-Record-ID": "<urn:uuid:49fe41f0-4634-4c06-8861-d72733574899>",
"WARC-Target-URI": "https://www.dokry.com/45930",
"WARC-Truncated": null,
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:dbe72bf6-6532-495e-a4d5-3af5b0e4e5f4>"
},
"warc_info": "isPartOf: CC-MAIN-2021-49\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for November/December 2021\r\noperator: Common Crawl Admin ([email protected])\r\nhostname: ip-10-67-67-123\r\nsoftware: Apache Nutch 1.18 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.3-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: https://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/"
}
|
{
"line_start_idx": [
0,
61,
62,
183,
184,
362,
363,
557,
558,
679,
680,
850,
851,
887,
888,
1113,
1114
],
"line_end_idx": [
61,
62,
183,
184,
362,
363,
557,
558,
679,
680,
850,
851,
887,
888,
1113,
1114,
1146
]
}
|
{
"red_pajama_v2": {
"ccnet_original_length": 1146,
"ccnet_original_nlines": 16,
"rps_doc_curly_bracket": 0.012216400355100632,
"rps_doc_ldnoobw_words": 0,
"rps_doc_lorem_ipsum": 0,
"rps_doc_stop_word_fraction": 0.0848214328289032,
"rps_doc_ut1_blacklist": 0,
"rps_doc_frac_all_caps_words": 0.013392860069870949,
"rps_doc_frac_lines_end_with_ellipsis": 0,
"rps_doc_frac_no_alph_words": 0.3258928656578064,
"rps_doc_frac_unique_words": 0.6641221642494202,
"rps_doc_mean_word_length": 6.9083967208862305,
"rps_doc_num_sentences": 17,
"rps_doc_symbol_to_word_ratio": 0,
"rps_doc_unigram_entropy": 4.30161190032959,
"rps_doc_word_count": 131,
"rps_doc_frac_chars_dupe_10grams": 0,
"rps_doc_frac_chars_dupe_5grams": 0.14143645763397217,
"rps_doc_frac_chars_dupe_6grams": 0.14143645763397217,
"rps_doc_frac_chars_dupe_7grams": 0.14143645763397217,
"rps_doc_frac_chars_dupe_8grams": 0.14143645763397217,
"rps_doc_frac_chars_dupe_9grams": 0,
"rps_doc_frac_chars_top_2gram": 0.02651933953166008,
"rps_doc_frac_chars_top_3gram": 0.06408839672803879,
"rps_doc_frac_chars_top_4gram": 0.07955800741910934,
"rps_doc_books_importance": -79.27808380126953,
"rps_doc_books_importance_length_correction": -79.27808380126953,
"rps_doc_openwebtext_importance": -50.710914611816406,
"rps_doc_openwebtext_importance_length_correction": -47.35276412963867,
"rps_doc_wikipedia_importance": -50.22519302368164,
"rps_doc_wikipedia_importance_length_correction": -50.22519302368164
},
"fasttext": {
"dclm": 0.9965603351593018,
"english": 0.009824040345847607,
"fineweb_edu_approx": 1.7796509265899658,
"eai_general_math": 0.0014033300103619695,
"eai_open_web_math": 0.09510576725006104,
"eai_web_code": 0.5897079706192017
}
}
|
{
"free_decimal_correspondence": {
"primary": {
"code": "005.1",
"labels": {
"level_1": "General works, books and libraries, information sciences",
"level_2": "",
"level_3": "Computer programming"
}
},
"secondary": {
"code": "-1",
"labels": {
"level_1": "",
"level_2": "",
"level_3": ""
}
}
},
"bloom_cognitive_process": {
"primary": {
"code": "3",
"label": "Apply"
},
"secondary": {
"code": "2",
"label": "Understand"
}
},
"bloom_knowledge_domain": {
"primary": {
"code": "3",
"label": "Procedural"
},
"secondary": {
"code": "2",
"label": "Conceptual"
}
},
"document_type_v1": {
"primary": {
"code": "4",
"label": "Code/Software"
},
"secondary": {
"code": "5",
"label": "Social/Forum"
}
},
"extraction_artifacts": {
"primary": {
"code": "0",
"label": "No Artifacts"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"missing_content": {
"primary": {
"code": "0",
"label": "No missing content"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"document_type_v2": {
"primary": {
"code": "18",
"label": "Q&A Forum"
},
"secondary": {
"code": "8",
"label": "Documentation"
}
},
"reasoning_depth": {
"primary": {
"code": "2",
"label": "Basic Reasoning"
},
"secondary": {
"code": "3",
"label": "Intermediate Reasoning"
}
},
"technical_correctness": {
"primary": {
"code": "3",
"label": "Mostly Correct"
},
"secondary": {
"code": "4",
"label": "Highly Correct"
}
},
"education_level": {
"primary": {
"code": "3",
"label": "Undergraduate Level"
},
"secondary": {
"code": "2",
"label": "High School Level"
}
}
}
|
672f1e42c33a7f9846924a2431ea77df
|
-2,299,152,410,810,396,200 |
Метод в Objective-C определен как часть класса. Он имеет три аспекта.
Он может быть методом класса или методом экземпляра
Если это метод класса, вы вызываете его с помощью сообщения самому классу. Если это метод экземпляра, вы вызываете его с помощью сообщения экземпляру класса.
Он имеет параметры и возвращаемое значение
Как и функции С (глава 1), методы Objective-C принимают некоторое количество параметров; каждый параметр имеет некоторый конкретный тип. И, как и функции С, методы могут иметь возвращаемое значение, также определенного типа. Если метод не возвращает ничего, его возвращаемый тип объявляется как void.
Он имеет имя
Имя метода Objective-C должно иметь столько двоеточий, сколько параметров он принимает; и, если метод принимает параметры» его имя должно завершаться двоеточием.
Похожие статьи
Добавить комментарий
|
{
"url": "http://juice-health.ru/archive/39-ios-7/231-metody-i-soobshcheniya",
"source_domain": "juice-health.ru",
"snapshot_id": "crawl=CC-MAIN-2018-05",
"warc_metadata": {
"Content-Length": "35950",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:FH5EB6FS6AU3ZX2CGKSEOLVFQZOTRJVE",
"WARC-Concurrent-To": "<urn:uuid:2c59d3ff-2241-46b1-80d5-8eabb5a611c8>",
"WARC-Date": "2018-01-21T12:13:24Z",
"WARC-IP-Address": "31.31.196.33",
"WARC-Identified-Payload-Type": "text/html",
"WARC-Payload-Digest": "sha1:4XHQKT6ESMBAHVLZCSWL37IT6CI6RSL3",
"WARC-Record-ID": "<urn:uuid:aebf07fa-4566-4eba-ad9a-218105c37179>",
"WARC-Target-URI": "http://juice-health.ru/archive/39-ios-7/231-metody-i-soobshcheniya",
"WARC-Truncated": "length",
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:30d37681-d41d-4fb0-aa18-98809614250f>"
},
"warc_info": "robots: classic\r\nhostname: ip-10-171-68-19.ec2.internal\r\nsoftware: Nutch 1.6 (CC)\r\nisPartOf: CC-MAIN-2018-05\r\noperator: Common Crawl Admin\r\ndescription: Wide crawl of the web for January 2018\r\npublisher: Common Crawl\r\nformat: WARC File Format 1.0\r\nconformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf"
}
|
{
"line_start_idx": [
0,
70,
71,
73,
74,
126,
127,
285,
286,
329,
330,
631,
632,
645,
646,
808,
809,
810,
825,
826,
828,
829,
831,
832,
834,
835,
837,
838
],
"line_end_idx": [
70,
71,
73,
74,
126,
127,
285,
286,
329,
330,
631,
632,
645,
646,
808,
809,
810,
825,
826,
828,
829,
831,
832,
834,
835,
837,
838,
858
]
}
|
{
"red_pajama_v2": {
"ccnet_original_length": 858,
"ccnet_original_nlines": 27,
"rps_doc_curly_bracket": 0,
"rps_doc_ldnoobw_words": 0,
"rps_doc_lorem_ipsum": 0,
"rps_doc_stop_word_fraction": 0,
"rps_doc_ut1_blacklist": 0,
"rps_doc_frac_all_caps_words": 0.04109589010477066,
"rps_doc_frac_lines_end_with_ellipsis": 0,
"rps_doc_frac_no_alph_words": 0.9520547986030579,
"rps_doc_frac_unique_words": 0.5798319578170776,
"rps_doc_mean_word_length": 5.865546226501465,
"rps_doc_num_sentences": 9,
"rps_doc_symbol_to_word_ratio": 0,
"rps_doc_unigram_entropy": 4.054879665374756,
"rps_doc_word_count": 119,
"rps_doc_frac_chars_dupe_10grams": 0,
"rps_doc_frac_chars_dupe_5grams": 0.08882521092891693,
"rps_doc_frac_chars_dupe_6grams": 0.08882521092891693,
"rps_doc_frac_chars_dupe_7grams": 0,
"rps_doc_frac_chars_dupe_8grams": 0,
"rps_doc_frac_chars_dupe_9grams": 0,
"rps_doc_frac_chars_top_2gram": 0.030085960403084755,
"rps_doc_frac_chars_top_3gram": 0.03724927827715874,
"rps_doc_frac_chars_top_4gram": 0.04297994077205658,
"rps_doc_books_importance": -58.731056213378906,
"rps_doc_books_importance_length_correction": -58.731056213378906,
"rps_doc_openwebtext_importance": -31.843273162841797,
"rps_doc_openwebtext_importance_length_correction": -27.83782196044922,
"rps_doc_wikipedia_importance": -26.64415740966797,
"rps_doc_wikipedia_importance_length_correction": -26.64415740966797
},
"fasttext": {
"dclm": 0.7608780264854431,
"english": 0,
"fineweb_edu_approx": 2.179414749145508,
"eai_general_math": -0.000006560000201716321,
"eai_open_web_math": 0.7977568507194519,
"eai_web_code": 0.994357168674469
}
}
|
{
"free_decimal_correspondence": {
"primary": {
"code": "005.1332",
"labels": {
"level_1": "General works, books and libraries, information sciences",
"level_2": "",
"level_3": "Computer programming"
}
},
"secondary": {
"code": "005.133",
"labels": {
"level_1": "General works, books and libraries, information sciences",
"level_2": "",
"level_3": "Computer programming"
}
}
},
"bloom_cognitive_process": {
"primary": {
"code": "2",
"label": "Understand"
},
"secondary": {
"code": "3",
"label": "Apply"
}
},
"bloom_knowledge_domain": {
"primary": {
"code": "2",
"label": "Conceptual"
},
"secondary": {
"code": "3",
"label": "Procedural"
}
},
"document_type_v1": {
"primary": {
"code": "3",
"label": "Reference/Encyclopedic/Educational"
},
"secondary": {
"code": "4",
"label": "Code/Software"
}
},
"extraction_artifacts": {
"primary": {
"code": "0",
"label": "No Artifacts"
},
"secondary": {
"code": "3",
"label": "Irrelevant Content"
}
},
"missing_content": {
"primary": {
"code": "0",
"label": "No missing content"
},
"secondary": {
"code": "4",
"label": "Missing Images or Figures"
}
},
"document_type_v2": {
"primary": {
"code": "8",
"label": "Documentation"
},
"secondary": {
"code": "10",
"label": "Knowledge Article"
}
},
"reasoning_depth": {
"primary": {
"code": "2",
"label": "Basic Reasoning"
},
"secondary": {
"code": "1",
"label": "No Reasoning"
}
},
"technical_correctness": {
"primary": {
"code": "4",
"label": "Highly Correct"
},
"secondary": {
"code": "3",
"label": "Mostly Correct"
}
},
"education_level": {
"primary": {
"code": "3",
"label": "Undergraduate Level"
},
"secondary": {
"code": "2",
"label": "High School Level"
}
}
}
|
672f1e42c33a7f9846924a2431ea77df
|
-8,909,218,003,990,383,000 |
Ask Fedora: Community Knowledge Base and Support Forum - RSS feedhttps://askbot.fedoraproject.org/en/questions/Ask Fedora: Community Knowledge Base and Support ForumenAsk Fedora is community maintained and Red Hat or Fedora Project is not responsible for content.Fri, 30 Jun 2017 04:28:18 -0500Spellcheck - Add Finnish or any language - Evolutionhttps://askbot.fedoraproject.org/en/question/107290/spellcheck-add-finnish-or-any-language-evolution/Hey, I have tried to figure out that how I could add Finnish spellcheck for Evolution or generally to all text processing softwares in Fedora 25/26. I found that "hunspell" most likely is the way to do it, but there is no Finnish as it so bizarre language... :) Do I have options? Evolution says "The list of languages here reflects only the languages for which you have a dictionary installed"... on the list there is English. Thank you from tips. :)Fri, 30 Jun 2017 03:18:52 -0500https://askbot.fedoraproject.org/en/question/107290/spellcheck-add-finnish-or-any-language-evolution/Answer by villykruse for <p>Hey,</p> <p>I have tried to figure out that how I could add Finnish spellcheck for Evolution or generally to all text processing softwares in Fedora 25/26.</p> <p>I found that "hunspell" most likely is the way to do it, but there is no Finnish as it so bizarre language... :)</p> <p>Do I have options? Evolution says "The list of languages here reflects only the languages for which you have a dictionary installed"... on the list there is English. </p> <p>Thank you from tips. :)</p> https://askbot.fedoraproject.org/en/question/107290/spellcheck-add-finnish-or-any-language-evolution/?answer=107291#post-id-107291Installing the language packages would be worth a try: dnf install aspell-fi autocorr-fi glibc-langpack-fi langpacks-fi Further also consider: enchant-voikko libreoffice-voikko libvoikko libvoikko-devel malaga-suomi-voikko mozvoikko python-libvoikko tmispell-voikko voikko-tools which are special finish language libraries. If they work I don't know; I don't speak the language.Fri, 30 Jun 2017 04:28:18 -0500https://askbot.fedoraproject.org/en/question/107290/spellcheck-add-finnish-or-any-language-evolution/?answer=107291#post-id-107291
|
{
"url": "https://askbot.fedoraproject.org/en/feeds/question/107290/",
"source_domain": "askbot.fedoraproject.org",
"snapshot_id": "crawl=CC-MAIN-2021-25",
"warc_metadata": {
"Content-Length": "3466",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:NTHY77BPND6L6Q4MZNHOATWAPPRC5JQW",
"WARC-Concurrent-To": "<urn:uuid:68f55ca5-4a25-4a76-9a79-c89ce1f450a5>",
"WARC-Date": "2021-06-14T16:30:48Z",
"WARC-IP-Address": "45.79.98.57",
"WARC-Identified-Payload-Type": "application/rss+xml",
"WARC-Payload-Digest": "sha1:QMGCCXLBL5KLPMPAE3UTALJO2CHWYG3F",
"WARC-Record-ID": "<urn:uuid:940e9941-ad4e-41fd-b268-9914e0bb0f7a>",
"WARC-Target-URI": "https://askbot.fedoraproject.org/en/feeds/question/107290/",
"WARC-Truncated": null,
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:cd075a7c-ccee-4d29-bbd8-834151c64318>"
},
"warc_info": "isPartOf: CC-MAIN-2021-25\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for June 2021\r\noperator: Common Crawl Admin ([email protected])\r\nhostname: ip-10-67-67-40.ec2.internal\r\nsoftware: Apache Nutch 1.18 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.2-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: https://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/"
}
|
{
"line_start_idx": [
0
],
"line_end_idx": [
2212
]
}
|
{
"red_pajama_v2": {
"ccnet_original_length": 2212,
"ccnet_original_nlines": 0,
"rps_doc_curly_bracket": 0,
"rps_doc_ldnoobw_words": 0,
"rps_doc_lorem_ipsum": 0,
"rps_doc_stop_word_fraction": 0.25918760895729065,
"rps_doc_ut1_blacklist": 0,
"rps_doc_frac_all_caps_words": 0.021276600658893585,
"rps_doc_frac_lines_end_with_ellipsis": 0,
"rps_doc_frac_no_alph_words": 0.344294011592865,
"rps_doc_frac_unique_words": 0.48669201135635376,
"rps_doc_mean_word_length": 6.688212871551514,
"rps_doc_num_sentences": 28,
"rps_doc_symbol_to_word_ratio": 0.011605420149862766,
"rps_doc_unigram_entropy": 4.628560543060303,
"rps_doc_word_count": 263,
"rps_doc_frac_chars_dupe_10grams": 0.36611711978912354,
"rps_doc_frac_chars_dupe_5grams": 0.40932348370552063,
"rps_doc_frac_chars_dupe_6grams": 0.40932348370552063,
"rps_doc_frac_chars_dupe_7grams": 0.36611711978912354,
"rps_doc_frac_chars_dupe_8grams": 0.36611711978912354,
"rps_doc_frac_chars_dupe_9grams": 0.36611711978912354,
"rps_doc_frac_chars_top_2gram": 0.01591813936829567,
"rps_doc_frac_chars_top_3gram": 0.015349630266427994,
"rps_doc_frac_chars_top_4gram": 0.03183627128601074,
"rps_doc_books_importance": -230.2632293701172,
"rps_doc_books_importance_length_correction": -230.2632293701172,
"rps_doc_openwebtext_importance": -134.7729034423828,
"rps_doc_openwebtext_importance_length_correction": -134.7729034423828,
"rps_doc_wikipedia_importance": -86.763671875,
"rps_doc_wikipedia_importance_length_correction": -86.763671875
},
"fasttext": {
"dclm": 0.03435957059264183,
"english": 0.828838586807251,
"fineweb_edu_approx": 1.643393874168396,
"eai_general_math": 0.13338905572891235,
"eai_open_web_math": 0.10473371297121048,
"eai_web_code": 0.15576821565628052
}
}
|
{
"free_decimal_correspondence": {
"primary": {
"code": "005.432",
"labels": {
"level_1": "General works, books and libraries, information sciences",
"level_2": "",
"level_3": "Computer programming"
}
},
"secondary": {
"code": "491.7",
"labels": {
"level_1": "Philology; or, Language and languages",
"level_2": "",
"level_3": "Indo-European languages"
}
}
},
"bloom_cognitive_process": {
"primary": {
"code": "3",
"label": "Apply"
},
"secondary": {
"code": "2",
"label": "Understand"
}
},
"bloom_knowledge_domain": {
"primary": {
"code": "3",
"label": "Procedural"
},
"secondary": {
"code": "2",
"label": "Conceptual"
}
},
"document_type_v1": {
"primary": {
"code": "5",
"label": "Social/Forum"
},
"secondary": {
"code": "3",
"label": "Reference/Encyclopedic/Educational"
}
},
"extraction_artifacts": {
"primary": {
"code": "3",
"label": "Irrelevant Content"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"missing_content": {
"primary": {
"code": "0",
"label": "No missing content"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"document_type_v2": {
"primary": {
"code": "18",
"label": "Q&A Forum"
},
"secondary": {
"code": "21",
"label": "Customer Support"
}
},
"reasoning_depth": {
"primary": {
"code": "2",
"label": "Basic Reasoning"
},
"secondary": {
"code": "1",
"label": "No Reasoning"
}
},
"technical_correctness": {
"primary": {
"code": "4",
"label": "Highly Correct"
},
"secondary": {
"code": "3",
"label": "Mostly Correct"
}
},
"education_level": {
"primary": {
"code": "2",
"label": "High School Level"
},
"secondary": {
"code": "1",
"label": "General Audience"
}
}
}
|
672f1e42c33a7f9846924a2431ea77df
|
-5,123,322,469,102,657,000 |
Take the 2-minute tour ×
Stack Overflow is a question and answer site for professional and enthusiast programmers. It's 100% free, no registration required.
im have a problem with method setTimeOut that call the function self and set a delay, the function should be called again and again after every request is done but it only runs once. It works without using backbone.js tho, don't know it doesnt work after integration with backbone.js. Any help is appreciated!
So this is a function in client that runs a GET request gets data from server, the request runs in a time interval(decided in the server), as soon as a data comes in, client gets it and the request runs again after.
getRequest:function() {
var XHR = $.ajax({
url: '/nextdocument',
type: 'GET',
async: true,
cache: false,
timeout: 11000,
success:function(data) {
var name = data.description;
var price = data.price;
console.log("read--> " + name + price);
setTimeout("this.getRequest", 1000);
if (data.ok == "true") {
data["ok"] = data.ok;
$.ajax(
{
url: "/customerdone",
data: JSON.stringify(data),
processData: false,
type: 'POST',
contentType: 'application/json'
}
)
}else{
//no document if no read in
console.log("error--> " + data.errorMessage)
}
}
})
return XHR;
}
share|improve this question
what do you mean by : if (data.ok == 'true') { data['ok'] = data.ok; . . } ? is it needed? – Parth Thakkar May 4 '12 at 15:44
In setTimeout, don't use a string, use an anonymous function like setTimeout(function() { namespace.getRequest() },1000); "namespace" is a placeholder for whatever the name of your package is that wraps getRequest. – jmort253 May 4 '12 at 15:44
add comment
2 Answers
The problem is that you're using "this" in your setTimeout call. You can't do this because "this" will be the global object when the timer executes the function you're trying to reference.
like others have suggested, you need to pass an actual function to your timer, not a string. then you can reference whatever function from whatever object you want.
share|improve this answer
add comment
probably, the function getRequest isn't being called. This is, as far as I think, because you are sending a string -- "this.getRequest" to the setTimeout function. As a rule of thumb, never pass string to this, pass functions. Although, it might be perfectly ok in some situations (i'd never recommend it anyway), here 'this' might be causing trouble. Use something like this:
getRequest:function() {
var fn = arguments.callee;
var XHR = $.ajax({
url: '/nextdocument',
type: 'GET',
async: true,
cache: false,
timeout: 11000,
success:function(data) {
var name = data.description;
var price = data.price;
console.log("read--> " + name + price);
setTimeout(fn, 1000);
if (data.ok == "true") {
data["ok"] = data.ok;
$.ajax(
{
url: "/customerdone",
data: JSON.stringify(data),
processData: false,
type: 'POST',
contentType: 'application/json'
}
)
}else{
//no document if no read in
console.log("error--> " + data.errorMessage)
}
}
})
return XHR;
}
share|improve this answer
1
OT: consider splitting the callbacks into functions for keeping code more readable and maintainable. – S.C. May 5 '12 at 12:46
add comment
Your Answer
discard
By posting your answer, you agree to the privacy policy and terms of service.
Not the answer you're looking for? Browse other questions tagged or ask your own question.
|
{
"url": "http://stackoverflow.com/questions/10451916/backbone-javascript-settimeout-method?answertab=votes",
"source_domain": "stackoverflow.com",
"snapshot_id": "crawl=CC-MAIN-2014-10",
"warc_metadata": {
"Content-Length": "69993",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:Y2NRJT7XD4IWA3DSGIZ7X76THVYCHG6D",
"WARC-Concurrent-To": "<urn:uuid:58491597-7de1-482c-8ce6-77ee982679f2>",
"WARC-Date": "2014-03-16T21:42:03Z",
"WARC-IP-Address": "198.252.206.140",
"WARC-Identified-Payload-Type": null,
"WARC-Payload-Digest": "sha1:AZZUEVL56DM2HBEVKPX4M2CEKDNIVTJR",
"WARC-Record-ID": "<urn:uuid:185588f4-f5a4-4c71-b1f1-1e0d7523576e>",
"WARC-Target-URI": "http://stackoverflow.com/questions/10451916/backbone-javascript-settimeout-method?answertab=votes",
"WARC-Truncated": null,
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:c901d148-a5d0-49d9-9322-a89dfda351e9>"
},
"warc_info": "robots: classic\r\nhostname: ip-10-183-142-35.ec2.internal\r\nsoftware: Nutch 1.6 (CC)/CC WarcExport 1.0\r\nisPartOf: CC-MAIN-2014-10\r\noperator: CommonCrawl Admin\r\ndescription: Wide crawl of the web with URLs provided by Blekko for March 2014\r\npublisher: CommonCrawl\r\nformat: WARC File Format 1.0\r\nconformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf"
}
|
{
"line_start_idx": [
0,
25,
157,
158,
468,
469,
685,
686,
714,
741,
775,
800,
825,
851,
880,
917,
962,
1002,
1058,
1111,
1152,
1194,
1222,
1248,
1298,
1354,
1402,
1444,
1504,
1530,
1552,
1575,
1623,
1688,
1706,
1720,
1731,
1751,
1757,
1785,
1787,
1914,
1916,
2162,
2174,
2175,
2185,
2186,
2375,
2376,
2541,
2542,
2568,
2580,
2581,
2958,
2959,
2983,
3014,
3037,
3067,
3088,
3109,
3131,
3156,
3189,
3230,
3266,
3318,
3352,
3389,
3427,
3451,
3473,
3519,
3571,
3615,
3653,
3709,
3731,
3749,
3768,
3812,
3873,
3887,
3897,
3904,
3920,
3922,
3948,
3952,
4080,
4092,
4093,
4105,
4106,
4108,
4116,
4117,
4195,
4196
],
"line_end_idx": [
25,
157,
158,
468,
469,
685,
686,
714,
741,
775,
800,
825,
851,
880,
917,
962,
1002,
1058,
1111,
1152,
1194,
1222,
1248,
1298,
1354,
1402,
1444,
1504,
1530,
1552,
1575,
1623,
1688,
1706,
1720,
1731,
1751,
1757,
1785,
1787,
1914,
1916,
2162,
2174,
2175,
2185,
2186,
2375,
2376,
2541,
2542,
2568,
2580,
2581,
2958,
2959,
2983,
3014,
3037,
3067,
3088,
3109,
3131,
3156,
3189,
3230,
3266,
3318,
3352,
3389,
3427,
3451,
3473,
3519,
3571,
3615,
3653,
3709,
3731,
3749,
3768,
3812,
3873,
3887,
3897,
3904,
3920,
3922,
3948,
3952,
4080,
4092,
4093,
4105,
4106,
4108,
4116,
4117,
4195,
4196,
4286
]
}
|
{
"red_pajama_v2": {
"ccnet_original_length": 4286,
"ccnet_original_nlines": 100,
"rps_doc_curly_bracket": 0.006532900035381317,
"rps_doc_ldnoobw_words": 0,
"rps_doc_lorem_ipsum": 0,
"rps_doc_stop_word_fraction": 0.2751842737197876,
"rps_doc_ut1_blacklist": 0,
"rps_doc_frac_all_caps_words": 0.018427519127726555,
"rps_doc_frac_lines_end_with_ellipsis": 0,
"rps_doc_frac_no_alph_words": 0.3685503602027893,
"rps_doc_frac_unique_words": 0.46960169076919556,
"rps_doc_mean_word_length": 5.205450534820557,
"rps_doc_num_sentences": 51,
"rps_doc_symbol_to_word_ratio": 0,
"rps_doc_unigram_entropy": 5.098061561584473,
"rps_doc_word_count": 477,
"rps_doc_frac_chars_dupe_10grams": 0.2754732072353363,
"rps_doc_frac_chars_dupe_5grams": 0.2948046624660492,
"rps_doc_frac_chars_dupe_6grams": 0.2754732072353363,
"rps_doc_frac_chars_dupe_7grams": 0.2754732072353363,
"rps_doc_frac_chars_dupe_8grams": 0.2754732072353363,
"rps_doc_frac_chars_dupe_9grams": 0.2754732072353363,
"rps_doc_frac_chars_top_2gram": 0.017720500007271767,
"rps_doc_frac_chars_top_3gram": 0.014498589560389519,
"rps_doc_frac_chars_top_4gram": 0.0217478908598423,
"rps_doc_books_importance": -420.8302001953125,
"rps_doc_books_importance_length_correction": -420.8302001953125,
"rps_doc_openwebtext_importance": -214.53797912597656,
"rps_doc_openwebtext_importance_length_correction": -214.53797912597656,
"rps_doc_wikipedia_importance": -175.2952117919922,
"rps_doc_wikipedia_importance_length_correction": -175.2952117919922
},
"fasttext": {
"dclm": 0.8804578185081482,
"english": 0.7236456274986267,
"fineweb_edu_approx": 1.8097684383392334,
"eai_general_math": 0.0077101001515984535,
"eai_open_web_math": 0.0986747071146965,
"eai_web_code": 0.01011693011969328
}
}
|
{
"free_decimal_correspondence": {
"primary": {
"code": "005.1",
"labels": {
"level_1": "General works, books and libraries, information sciences",
"level_2": "",
"level_3": "Computer programming"
}
},
"secondary": {
"code": "004.678",
"labels": {
"level_1": "General works, books and libraries, information sciences",
"level_2": "",
"level_3": "Computers and Computer science"
}
}
},
"bloom_cognitive_process": {
"primary": {
"code": "3",
"label": "Apply"
},
"secondary": {
"code": "2",
"label": "Understand"
}
},
"bloom_knowledge_domain": {
"primary": {
"code": "3",
"label": "Procedural"
},
"secondary": {
"code": "2",
"label": "Conceptual"
}
},
"document_type_v1": {
"primary": {
"code": "5",
"label": "Social/Forum"
},
"secondary": {
"code": "4",
"label": "Code/Software"
}
},
"extraction_artifacts": {
"primary": {
"code": "3",
"label": "Irrelevant Content"
},
"secondary": {
"code": "1",
"label": "Leftover HTML"
}
},
"missing_content": {
"primary": {
"code": "0",
"label": "No missing content"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"document_type_v2": {
"primary": {
"code": "18",
"label": "Q&A Forum"
},
"secondary": {
"code": "8",
"label": "Documentation"
}
},
"reasoning_depth": {
"primary": {
"code": "3",
"label": "Intermediate Reasoning"
},
"secondary": {
"code": "2",
"label": "Basic Reasoning"
}
},
"technical_correctness": {
"primary": {
"code": "3",
"label": "Mostly Correct"
},
"secondary": {
"code": "4",
"label": "Highly Correct"
}
},
"education_level": {
"primary": {
"code": "3",
"label": "Undergraduate Level"
},
"secondary": {
"code": "2",
"label": "High School Level"
}
}
}
|
672f1e42c33a7f9846924a2431ea77df
|
-4,826,472,320,804,597,000 |
Average Value of a Function
Average Value of a Function
Normally when we think of averaging a set of values (for example, test grades) we add the quantities and divide by the number of values. However, calculus must be used when there are a continuous set of points that we are trying to average such as for a function on an interval. In this video we show how integration can be used to find a function’s average value over a closed interval.
|
{
"url": "http://fireflylectures.com/Average-Value-of-a-Function/",
"source_domain": "fireflylectures.com",
"snapshot_id": "crawl=CC-MAIN-2018-26",
"warc_metadata": {
"Content-Length": "25827",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:G7VIUXUYZT2MH4USWYO7PV44CRS4IDPO",
"WARC-Concurrent-To": "<urn:uuid:55fc3f90-6306-4edd-89f2-32f487d19883>",
"WARC-Date": "2018-06-19T21:30:06Z",
"WARC-IP-Address": "184.168.229.128",
"WARC-Identified-Payload-Type": "text/html",
"WARC-Payload-Digest": "sha1:QW322ZZFYJGYMSZ6Z7SHDCLJJ4XGGSRG",
"WARC-Record-ID": "<urn:uuid:3c5a5818-637b-4461-8526-1be0a313eab4>",
"WARC-Target-URI": "http://fireflylectures.com/Average-Value-of-a-Function/",
"WARC-Truncated": null,
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:2db4f4a7-4d71-4b65-b8b1-8d2459af4b5a>"
},
"warc_info": "robots: classic\r\nhostname: ip-10-138-204-92.ec2.internal\r\nsoftware: Nutch 1.6 (CC)\r\nisPartOf: CC-MAIN-2018-26\r\noperator: Common Crawl Admin\r\ndescription: Wide crawl of the web for June 2018\r\npublisher: Common Crawl\r\nformat: WARC File Format 1.0\r\nconformsTo: http://bibnum.bnf.fr/WARC/WARC_ISO_28500_version1_latestdraft.pdf"
}
|
{
"line_start_idx": [
0,
28,
29,
57,
58
],
"line_end_idx": [
28,
29,
57,
58,
445
]
}
|
{
"red_pajama_v2": {
"ccnet_original_length": 445,
"ccnet_original_nlines": 4,
"rps_doc_curly_bracket": 0,
"rps_doc_ldnoobw_words": 0,
"rps_doc_lorem_ipsum": 0,
"rps_doc_stop_word_fraction": 0.5384615659713745,
"rps_doc_ut1_blacklist": 0,
"rps_doc_frac_all_caps_words": 0,
"rps_doc_frac_lines_end_with_ellipsis": 0,
"rps_doc_frac_no_alph_words": 0.08791209012269974,
"rps_doc_frac_unique_words": 0.6219512224197388,
"rps_doc_mean_word_length": 4.329268455505371,
"rps_doc_num_sentences": 3,
"rps_doc_symbol_to_word_ratio": 0,
"rps_doc_unigram_entropy": 3.7248058319091797,
"rps_doc_word_count": 82,
"rps_doc_frac_chars_dupe_10grams": 0,
"rps_doc_frac_chars_dupe_5grams": 0.12957745790481567,
"rps_doc_frac_chars_dupe_6grams": 0,
"rps_doc_frac_chars_dupe_7grams": 0,
"rps_doc_frac_chars_dupe_8grams": 0,
"rps_doc_frac_chars_dupe_9grams": 0,
"rps_doc_frac_chars_top_2gram": 0.101408451795578,
"rps_doc_frac_chars_top_3gram": 0.07887323945760727,
"rps_doc_frac_chars_top_4gram": 0.0845070406794548,
"rps_doc_books_importance": -48.002079010009766,
"rps_doc_books_importance_length_correction": -48.208946228027344,
"rps_doc_openwebtext_importance": -32.310462951660156,
"rps_doc_openwebtext_importance_length_correction": -32.517330169677734,
"rps_doc_wikipedia_importance": -31.3841609954834,
"rps_doc_wikipedia_importance_length_correction": -31.591026306152344
},
"fasttext": {
"dclm": 0.6542364358901978,
"english": 0.9269392490386963,
"fineweb_edu_approx": 3.115989923477173,
"eai_general_math": 0.9999446868896484,
"eai_open_web_math": 0.8919274210929871,
"eai_web_code": 0.9537420272827148
}
}
|
{
"free_decimal_correspondence": {
"primary": {
"code": "515.3",
"labels": {
"level_1": "Science and Natural history",
"level_2": "Mathematics",
"level_3": "Calculus and Mathematical analysis"
}
},
"secondary": {
"code": "515",
"labels": {
"level_1": "Science and Natural history",
"level_2": "Mathematics",
"level_3": "Calculus and Mathematical analysis"
}
}
},
"bloom_cognitive_process": {
"primary": {
"code": "2",
"label": "Understand"
},
"secondary": {
"code": "3",
"label": "Apply"
}
},
"bloom_knowledge_domain": {
"primary": {
"code": "2",
"label": "Conceptual"
},
"secondary": {
"code": "3",
"label": "Procedural"
}
},
"document_type_v1": {
"primary": {
"code": "3",
"label": "Reference/Encyclopedic/Educational"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"extraction_artifacts": {
"primary": {
"code": "0",
"label": "No Artifacts"
},
"secondary": {
"code": "3",
"label": "Irrelevant Content"
}
},
"missing_content": {
"primary": {
"code": "0",
"label": "No missing content"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"document_type_v2": {
"primary": {
"code": "23",
"label": "Tutorial"
},
"secondary": {
"code": "10",
"label": "Knowledge Article"
}
},
"reasoning_depth": {
"primary": {
"code": "2",
"label": "Basic Reasoning"
},
"secondary": {
"code": "3",
"label": "Intermediate Reasoning"
}
},
"technical_correctness": {
"primary": {
"code": "4",
"label": "Highly Correct"
},
"secondary": {
"code": "3",
"label": "Mostly Correct"
}
},
"education_level": {
"primary": {
"code": "2",
"label": "High School Level"
},
"secondary": {
"code": "3",
"label": "Undergraduate Level"
}
}
}
|
672f1e42c33a7f9846924a2431ea77df
|
-215,446,227,556,718,500 |
CoRE Working Group G. Selander
Internet-Draft J. Mattsson
Intended status: Standards Track F. Palombini
Expires: January April 2, 2018 Ericsson AB
L. Seitz
SICS Swedish ICT
July 01,
September 29, 2017
Object Security of CoAP (OSCOAP)
draft-ietf-core-object-security-04 for Constrained RESTful Environments (OSCORE)
draft-ietf-core-object-security-05
Abstract
This document defines Object Security of CoAP (OSCOAP), for Constrained RESTful
Environments (OSCORE), a method for
application layer application-layer protection of
the Constrained Application Protocol (CoAP), using the CBOR Object
Signing and Encryption (COSE). OSCOAP OSCORE provides end-to-end
encryption, integrity and replay protection to
CoAP payload, options, and header fields, protection, as well as a secure
message binding. OSCOAP OSCORE is designed for constrained nodes and
networks and can be used across intermediaries and over any layer. The use of
OSCOAP is signaled with the CoAP option Object-Security, layer and across intermediaries,
and also defined with HTTP. OSCORE may be used to protect group
communications as is specified in this document. a separate draft.
Status of This Memo
This Internet-Draft is submitted in full conformance with the
provisions of BCP 78 and BCP 79.
Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF). Note that other groups may also distribute
working documents as Internet-Drafts. The list of current Internet-
Drafts is at http://datatracker.ietf.org/drafts/current/. https://datatracker.ietf.org/drafts/current/.
Internet-Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress."
This Internet-Draft will expire on January April 2, 2018.
Copyright Notice
Copyright (c) 2017 IETF Trust and the persons identified as the
document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents
(http://trustee.ietf.org/license-info)
(https://trustee.ietf.org/license-info) in effect on the date of
publication of this document. Please review these documents
carefully, as they describe your rights and restrictions with respect
to this document. Code Components extracted from this document must
include Simplified BSD License text as described in Section 4.e of
the Trust Legal Provisions and are provided without warranty as
described in the Simplified BSD License.
Table of Contents
1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 3
1.1. Terminology . . . . . . . . . . . . . . . . . . . . . . . 4 5
2. The CoAP Object-Security Option . . . . . . . . . . . . . . . . . 5
3. The Security Context . . . . . . . . . . . . . . . . . . . . 6
3.1. Security Context Definition . . . . . . . . . . . . . . . 6
3.2. Derivation Establishment of Security Context Parameters . . . . . . . . 9 8
3.3. Requirements on the Security Context Parameters . . . . . 10
4. Protected CoAP Message Fields . . . . . . . . . . . . . . . . . . 11
4.1. CoAP Payload . . . . . . . . . . . . . . . . . . . . . . 12
4.2. CoAP Header . Options . . . . . . . . . . . . . . . . . . . . . . 12
4.3. CoAP Options Header . . . . . . . . . . . . . . . . . . . . . . 12 . 18
5. The COSE Object . . . . . . . . . . . . . . . . . . . . . . . 18 19
5.1. Plaintext Nonce . . . . . . . . . . . . . . . . . . . . . . . . 19 . . 20
5.2. Plaintext . . . . . . . . . . . . . . . . . . . . . . . . 20
5.3. Additional Authenticated Data . . . . . . . . . . . . . . 19 21
6. Sequence Numbers, Replay, Message Binding, and Freshness . . 20 22
6.1. AEAD Nonce Uniqueness Message Binding . . . . . . . . . . . . . . . . . . . 20
6.2. Replay Protection . . 22
6.2. AEAD Nonce Uniqueness . . . . . . . . . . . . . . . . . . 21 22
6.3. Sequence Number and Replay Window State Freshness . . . . . . . . . . 21
6.4. Freshness . . . . . . . . . . . . . . 22
6.4. Replay Protection . . . . . . . . . . . . 23
6.5. Delay and Mismatch Attacks . . . . . . . . 23
6.5. Losing Part of the Context State . . . . . . . . . . . . 23
7. Processing . . . . . . . . . . . . . . . . . . . . . . . . . 23 24
7.1. Protecting the Request . . . . . . . . . . . . . . . . . 23 24
7.2. Verifying the Request . . . . . . . . . . . . . . . . . . 24 25
7.3. Protecting the Response . . . . . . . . . . . . . . . . . 25 26
7.4. Verifying the Response . . . . . . . . . . . . . . . . . 26 27
8. OSCOAP OSCORE Compression . . . . . . . . . . . . . . . . . . . . . 27 28
8.1. Encoding of the Object-Security Option Value . . . . . . . . . 27 . 28
8.2. Examples Encoding of the OSCORE Payload . . . . . . . . . . . . . 29
8.3. Context Hint . . . . . . . . . . . 28
9. Web Linking . . . . . . . . . . . 30
8.4. Compression Examples . . . . . . . . . . . . . . 29
10. Security Considerations . . . . 30
9. Web Linking . . . . . . . . . . . . . . . 30
11. Privacy Considerations . . . . . . . . . . 32
10. Proxy Operations . . . . . . . . . 32
12. IANA Considerations . . . . . . . . . . . . . 32
10.1. CoAP-to-CoAP Forwarding Proxy . . . . . . . . 32
12.1. CoAP Option Numbers Registry . . . . . 33
10.2. HTTP-to-CoAP Translation Proxy . . . . . . . . . 32
12.2. Media Type Registrations . . . . 33
10.3. CoAP-to-HTTP Translation Proxy . . . . . . . . . . . . 32
12.3. CoAP Content Format Registration . 34
11. Security Considerations . . . . . . . . . . . 33
13. Acknowledgments . . . . . . . . 35
12. Privacy Considerations . . . . . . . . . . . . . . . 34
14. References . . . . 37
13. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 34
14.1. Normative References 38
13.1. CoAP Option Numbers Registry . . . . . . . . . . . . . . 38
13.2. Header Field Registrations . . . . 34
14.2. Informative References . . . . . . . . . . . 38
14. Acknowledgments . . . . . . 35
Appendix A. Test Vectors . . . . . . . . . . . . . . . . . 38
15. References . . . 36
Appendix B. Examples . . . . . . . . . . . . . . . . . . . . . . 36
B.1. Secure Access to Sensor 38
15.1. Normative References . . . . . . . . . . . . . . . . . 36
B.2. Secure Subscribe to Sensor . 38
15.2. Informative References . . . . . . . . . . . . . . 37
Appendix C. Object Security of Content (OSCON) . . . 40
Appendix A. Test Vectors . . . . . . 39
C.1. Overhead OSCON . . . . . . . . . . . . . . 41
Appendix B. Examples . . . . . . . 40
C.2. MAC Only . . . . . . . . . . . . . . . 41
B.1. Secure Access to Sensor . . . . . . . . . 41
C.3. Signature Only . . . . . . . . 41
B.2. Secure Subscribe to Sensor . . . . . . . . . . . . . 41
C.4. Authenticated Encryption with Additional Data (AEAD) . . 42
C.5. Symmetric Encryption with Asymmetric Signature (SEAS) . . 43
Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 43 44
1. Introduction
The Constrained Application Protocol (CoAP) is a web application
protocol, designed for constrained nodes and networks [RFC7228].
CoAP specifies the use of proxies for scalability and efficiency. At
the same time efficiency, and
a mapping to HTTP is also specified [RFC8075]. CoAP [RFC7252]
references DTLS [RFC6347] for security.
Proxy operations on CoAP messages and HTTP proxies
require DTLS (D)TLS to be terminated at the proxy. The proxy therefore
not only has access to the data required for performing the intended
proxy functionality, but is also able to eavesdrop on, or manipulate
any part of the CoAP message payload and metadata, in transit between client and server. the
endpoints. The proxy can also inject, delete, or reorder packages packets
since they are no longer protected by DTLS. (D)TLS.
This document defines the Object Security of CoAP (OSCOAP), a data object
based for Constrained RESTful
Environments (OSCORE) security protocol, protecting CoAP message exchanges end-to-
end, and CoAP-
mappable HTTP requests and responses end-to-end across intermediary nodes.
nodes such as CoAP forward proxies and cross-protocol translators
including HTTP-to-CoAP proxies [RFC8075]. In addition to the core
CoAP features defined in [RFC7252], OSCORE supports Observe [RFC7641]
and Blockwise [RFC7959]. An analysis of end-to-end security for CoAP
messages through some types of intermediary nodes is performed in
[I-D.hartke-core-e2e-security-reqs], this specification addresses
[I-D.hartke-core-e2e-security-reqs]. OSCORE protects the
forwarding case. In addition Request/
Response layer only, and not the CoAP Messaging Layer (Section 2 of
[RFC7252]). Therefore, all the CoAP messages mentioned in this
document refer to non-empty CON, NON, and ACK messages.
Additionally, since the core features defined message formats for CoAP over unreliable
transport [RFC7252] and for CoAP over reliable transport
[I-D.ietf-core-coap-tcp-tls] differ only in
[RFC7252], OSCOAP supports Observe [RFC7641] terms of Messaging Layer,
OSCORE can be applied to both unreliable and Blockwise [RFC7959].
OSCOAP reliable transports.
OSCORE is designed for constrained nodes and networks and provides an
in-layer security protocol for CoAP which that does not depend on underlying layers. OSCOAP
OSCORE can be used anywhere that where CoAP or HTTP can be used, including unreliable transport [RFC7228], reliable transport
[I-D.ietf-core-coap-tcp-tls], and
non-IP transport
[I-D.bormann-6lo-coap-802-15-ie]. OSCOAP transports (e.g., [I-D.bormann-6lo-coap-802-15-ie]). An
extension of OSCORE may also be used to protect group communication
for CoAP [I-D.tiloca-core-multicast-oscoap]. The use of OSCOAP OSCORE does
not affect the URI scheme and OSCOAP OSCORE can therefore be used with any
URI scheme defined for CoAP. CoAP or HTTP. The application decides the
conditions for which OSCOAP OSCORE is required.
OSCOAP
OSCORE builds on CBOR Object Signing and Encryption (COSE)
[I-D.ietf-cose-msg], [RFC8152],
providing end-to-end encryption, integrity, replay protection, and
secure message binding. A compressed version of COSE is used, see as
discussed in Section 8. The use of OSCOAP OSCORE is signaled with the
Object-Security CoAP option Object-Security, or HTTP header, defined in Section 2. OSCOAP
provides protection of CoAP payload, certain options, 2 and header
fields. The solution transforms a CoAP message
Section 10.2. OSCORE is designed to protect as much information as
possible, while still allowing proxy operations (Section 10). OSCORE
provides protection of message payload, almost all CoAP options, and
the RESTful method. The solution transforms a message into an "OSCOAP
"OSCORE message" before sending, and vice versa after receiving. The OSCOAP
OSCORE message is a CoAP message related to the original CoAP message in the following
way: the original CoAP message is protected by including translated to CoAP (if not already in
CoAP) and the resulting message payload (if present), certain options, options not
processed by a proxy, and header fields the request/response method (CoAP Code) are
protected in a COSE object. The message fields of the original
messages that have been are encrypted are removed from not present in the message whereas OSCORE message,
and instead the Object-Security option option/header and the compressed COSE
object are added, included, see Figure 1.
Client Server
| OSCOAP request: |
| GET example.com OSCORE request - POST example.com: |
| [Header, Header, Token, Options:{..., |
| Object-Security:COSE object}] Options: {Object-Security, ...}, |
+---------------------------------------------->|
| OSCOAP response: Payload: Compressed COSE object |
+--------------------------------------------->|
| 2.05 (Content) OSCORE response - 2.04 (Changed): |
| [Header, Header, Token, Options:{..., |
| Object-Security:-}, Payload:COSE object] Options: {Object-Security, ...}, |
| Payload: Compressed COSE object |
|<----------------------------------------------+
|<---------------------------------------------+
| |
Figure 1: Sketch of OSCOAP
OSCOAP OSCORE with CoAP
OSCORE may be used in very constrained settings, thanks to its small
message size, its size and the restricted code and memory requirements, and requirements in
addition to what is
independent of underlying layer below required by CoAP. OSCOAP OSCORE can be combined with DTLS,
transport layer security such as DTLS or TLS, thereby enabling end-to-end end-
to-end security of e.g. CoAP payload Payload, Options and options, Code, in
combination with hop-by-hop protection of the entire
CoAP message, Messaging Layer, during
transport between end-point and intermediary node. Examples of the
use of OSCOAP OSCORE are given in Appendix B.
The message protection provided by OSCOAP can alternatively be
applied
An implementation supporting this specification MAY only to implement
the payload of individual messages. We call this
object security client part, MAY only implement the server part, or MAY only
implement one of content (OSCON), which the proxy parts. OSCORE is defined in Appendix C. designed to work with
legacy CoAP-to-CoAP forward proxies [RFC7252], but an OSCORE-aware
proxy will be more efficient. HTTP-to-CoAP proxies [RFC8075] and
CoAP-to-HTTP proxies need to implement respective parts of this
specification to work with OSCORE (see Section 10).
1.1. Terminology
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
document are to be interpreted as described in [RFC2119]. These
words may also appear in this document in lowercase, absent their
normative meanings.
Readers are expected to be familiar with the terms and concepts
described in CoAP [RFC7252], Observe [RFC7641], Blockwise [RFC7959],
COSE [I-D.ietf-cose-msg], [RFC8152], CBOR [RFC7049], CDDL
[I-D.greevenbosch-appsawg-cbor-cddl], and constrained environments
[RFC7228].
The terms Common/Sender/Recipient Context, Master Secret/Salt, Sender
ID/Key/IV, Recepient ID/Key/IV
ID/Key, Recipient ID/Key, and Context Common IV are defined in Section 3.1.
2. The CoAP Object-Security Option
The CoAP Object-Security option (see Figure 2) indicates that OSCOAP is
used to protect the
CoAP message exchange. is an OSCORE message and that it contains a compressed
COSE object (see Section 5 and Section 8). The Object-Security
option is critical, safe to forward, part of the cache key, not
repeatable, and opaque.
+-----+---+---+---+---+-----------------+--------+--------+ not
repeatable.
+-----+---+---+---+---+-----------------+-----------+--------+---------+
| No. | C | U | N | R | Name | Format | Length |
+-----+---+---+---+---+-----------------+--------+--------| Default |
+-----+---+---+---+---+-----------------+-----------+--------+---------+
| TBD | x | | | | Object-Security | opaque see below | 0- 0-255 |
+-----+---+---+---+---+-----------------+--------+--------+
C=Critical, U=Unsafe, N=NoCacheKey, R=Repeatable (none) |
+-----+---+---+---+---+-----------------+-----------+--------+---------+
C = Critical, U = Unsafe, N = NoCacheKey, R = Repeatable
Figure 2: The Object-Security Option
A successful response to a request with the
The Object-Security option contains the OSCORE flag byte and for
requests, the Sender ID (see Section 8). If the flag byte is all
zero (0x00) the Option value SHALL be empty (Option Length = 0). An
endpoint receiving a CoAP message without payload, that also contains
an Object-Security option SHALL treat it as malformed and reject it.
A successful response to a request with the Object-Security option
SHALL contain the Object-Security option. Whether error responses
contain the Object-Security option depends on the error type (see
Section 7).
Since the payload and most options are encrypted Section 4, and the
corresponding plain text message fields of the original are not
included in the OSCORE message, the processing of these fields does
not expand the total message size.
A CoAP endpoint proxy SHOULD NOT cache a response to a request with an Object-Security Object-
Security option, since the response is only applicable to the
original client's request.
The Object-Security option request, see Section 10.1. As the compressed COSE
Object is included in the cache key for backward
compatibility with proxies not recognizing the Object-Security
option. The effect is that key, messages with the Object-Security Object-
Security option will never generate cache hits. For Max-Age
processing, see Section 4.3.1.1. 4.2.3.1.
3. The protection is achieved by means of a COSE object (see Section 5),
which is compressed Security Context
OSCORE requires that client and then included in the OSCOAP message. The
placement of server establish a shared security
context used to process the COSE object depends on whether the method/response
code allows payload (see [RFC7252]):
o If the method/response code allows payload, then the compressed objects. OSCORE uses COSE object Section 8 is the payload of the OSCOAP message, and
the Object-Security option has length zero. An endpoint receiving
a CoAP message with payload, that also contains an
Authenticated Encryption with Additional Data (AEAD) algorithm for
protecting message data between a non-empty
Object-Security option SHALL treat it as malformed client and reject it.
o If a server. In this
section, we define the method/response code does not allow payload, then the
compressed COSE object Section 8 is the value of the Object-
Security option and the length of the Object-Security option is
equal to the size of the compressed COSE object. An endpoint
receiving a CoAP message without payload, that also contains an
empty Object-Security option SHALL treat it as malformed and
reject it.
The size of the COSE object depends on whether the method/response
code allows payload, if the message is a request or response, on the
set of options that are included in the original message, the AEAD
algorithm, the length of the information identifying the security
context, and the length of the sequence number.
3. The Security Context
OSCOAP uses COSE with an Authenticated Encryption with Additional
Data (AEAD) algorithm between a CoAP client and a CoAP server. An
implementation supporting this specification MAY only implement the
client part or MAY only implement the server part.
This specification requires that client and server establish a security context to apply to the COSE objects protecting the CoAP
messages. In this section we define the security context, and also
specify how to derive the initial security contexts it is derived in
client and server based on a common shared master secret and a key
derivation function (KDF).
3.1. Security Context Definition
The security context is the set of information elements necessary to
carry out the cryptographic operations in OSCOAP. OSCORE. For each endpoint,
the security context is composed of a "Common Context", a "Sender
Context", and a "Recipient Context".
The endpoints protect messages to send using the Sender Context and
verify messages received using the Recipient Context, both contexts
being derived from the Common Context and other data. Clients and
Servers need to be able to retrieve the correct security context to
use.
An endpoint uses its Sender ID (SID) to derive its Sender Context,
and the other endpoint uses the same ID, now called Recipient ID
(RID), to derive its Recipient Context. In communication between two
endpoints, the Sender Context of one endpoint matches the Recipient
Context of the other endpoint, and vice versa. Thus Thus, the two
security contexts identified by the same IDs in the two endpoints are
not the same, but they are partly mirrored. Retrieval and use of the
security context are shown in Figure 3.
.------------. .------------.
.-------------. .-------------.
| Common, | | Common, |
| Sender, | | Recipient,| Recipient, |
| Recipient | | Sender |
'------------' '------------'
'-------------' '-------------'
Client Server
| |
Retrieve context for | OSCOAP OSCORE request: |
target resource | [Token Token = Token1, |
Protect request with | kid = SID, ...] ... |
Sender Context +---------------------->| Retrieve context with
| | RID = kid
| | Verify request with
| | Recipient Context
| OSCOAP OSCORE response: | Protect response with
| [Token Token = Token1, ...] ... | Sender Context
Retrieve context with |<----------------------+
Token = Token1 | |
Verify request with | |
Recipient Context | |
Figure 3: Retrieval and use of the Security Context
The Common Context contains the following parameters:
o AEAD Algorithm (Alg). Value that identifies the (alg). The COSE AEAD algorithm to use for
encryption. Its value is immutable once the security context is
established.
o Key Derivation Function. The HMAC based HKDF [RFC5869] used to
derive Sender Key, Recipient Key, and Common IV.
o Master Secret. Variable length, uniformly random byte string
containing the key used to derive traffic keys and IVs. Its value
is immutable once the security context is established.
o Master Salt (OPTIONAL). Variable length byte string containing
the salt used to derive traffic keys and IVs. Its value is
immutable once the security context is established.
The Sender Context contains the following parameters:
o Sender ID. Variable length byte Common IV. Byte string identifying derived from Master Secret and Master
Salt. Length is determined by the Sender
Context. AEAD Algorithm. Its value is
immutable once the security context is established.
o
The Sender Key. Byte string containing Context contains the symmetric key to protect
messages following parameters:
o Sender ID. Non-negative integer used to send. Derived from Common identify the Sender
Context and Sender ID. to assure unique nonces. Length is determined by the
AEAD Algorithm. Its value is immutable once the security context
is established.
o Sender IV. Key. Byte string containing the IV symmetric key to protect
messages to send. Derived from Common Context and Sender ID.
Length is determined by the AEAD Algorithm. Its value is
immutable once the security context is established.
o Sender Sequence Number. Non-negative integer used by the sender
to protect requests and observe responses to send. Observe notifications. Used as partial IV
[I-D.ietf-cose-msg] "Partial
IV" [RFC8152] to generate unique nonces for the AEAD. Maximum
value is determined by the AEAD Algorithm.
The Recipient Context contains the following parameters:
o Recipient ID. Variable length byte string identifying the
Recipient Context. Its value is immutable once Non-negative integer used to identify the security
context is established.
o Recipient Key. Byte string containing the symmetric key to verify
messages received. Derived from Common
Context and Recipient ID. to assure unique nonces. Length is determined by the
AEAD Algorithm. Its value is immutable once the security context
is established.
o Recipient IV. Key. Byte string containing the IV symmetric key to verify
messages received. Derived from Common Context and Recipient ID.
Length is determined by the AEAD Algorithm. Its value is
immutable once the security context is established.
o Replay Window. Window (Server only). The replay window to verify requests and observe
responses
received.
When it is understood which context is referred to (Sender Context or
Recipient Context), the term "Context IV" is used to denote the IV
currently used with this context.
An endpoint may free up memory by not storing the Sender Key, Sender Common IV, Recipient Sender
Key, and Recipient IV, Key, deriving them from the Common
Context Master Key and Master
Salt when needed. Alternatively, an endpoint may free up memory by
not storing the Master Secret and Master Salt after the other
parameters have been derived.
The endpoints MAY interchange the client and server roles while
maintaining the same security context. When this happens, the former
server still protects messages to send using its Sender Context, and
verifies messages received using its Recipient Context. The same is
also true for the former client. The endpoints MUST NOT change the
Sender/Recipient ID. ID when changing roles. In other words, changing
the roles does not change the set of keys to be used.
3.2. Derivation Establishment of Security Context Parameters
The parameters in the security context are derived from a small set
of input parameters. The following input parameters SHALL be pre-
established:
o Master Secret
o Sender ID
o Recipient ID
The following input parameters MAY be pre-established. In case any
of these parameters is not pre-established, the default value
indicated below is used:
o AEAD Algorithm (Alg) (alg)
* Default is AES-CCM-64-64-128 AES-CCM-16-64-128 (COSE abbreviation: 12) algorithm encoding: 10)
o Master Salt
* Default is the empty string
o Key Derivation Function (KDF)
* Default is HKDF SHA-256
o Replay Window Type and Size
* Default is DTLS-type replay protection with a window size of 32
([RFC6347])
All input parameters need to be known to and agreed on by both
endpoints, but the replay window may be different in the two
endpoints. The replay window type and size is used by the client in
the processing of the Request-Tag
[I-D.amsuess-core-repeat-request-tag]. How the input parameters are
pre-established, is application specific. The EDHOC protocol [I-D.selander-ace-cose-ecdhe] enables ACE framework may be
used to establish the establishment of necessary input parameters with the property of forward
secrecy and negotiation of KDF and AEAD, it thus provides all
necessary pre-requisite steps for using OSCOAP as defined here.
[I-D.ietf-ace-oauth-authz].
3.2.1. Derivation of Sender Key/IV, Key, Recipient Key/IV Key, and Common IV
The KDF MUST be one of the HMAC based HKDF [RFC5869] algorithms
defined in COSE. HKDF SHA-256 is mandatory to implement. The
security context parameters Sender Key/IV and Key, Recipient Key/IV Key, and Common IV
SHALL be derived from the input parameters using the HKDF, which
consists of the composition of the HKDF-Extract and HKDF-Expand steps
([RFC5869]):
output parameter = HKDF(salt, IKM, info, L)
where:
o salt is the Master Salt as defined above
o IKM is the Master Secret is defined above
o info is a CBOR array consisting of:
info = [
id : bstr, bstr / nil,
alg : int,
type : tstr,
L : int uint
]
*
where:
o id is the Sender ID or Recipient ID
* when deriving keys and nil
when deriving the Common IV. Sender ID and Recipient ID are
encoded as described in Section 5
o type is "Key" or "IV"
o L is the size of the key/IV for the AEAD algorithm used, in
octets. octets
For example, if the algorithm AES-CCM-64-64-128 AES-CCM-16-64-128 (see Section 10.2 in
[I-D.ietf-cose-msg])
[RFC8152]) is used, the value for L is 16 for keys and 7 13 for IVs. the
Common IV.
3.2.2. Initial Sequence Numbers and Replay Window
The Sender Sequence Number is initialized to 0. The supported types
of replay protection and replay window length is application specific
and depends on the lower layers. Default The default is DTLS-type replay
protection with a window size of 32 initiated as described in
Section 4.1.2.6 of [RFC6347].
3.3. Requirements on the Security Context Parameters
As collisions may lead to the loss of both confidentiality and
integrity, Sender ID SHALL be unique in the set of all security
contexts using the same Master Secret. Normally (e.g. when Secret and Master Salt. When a
trusted third party assigns identifiers (e.g., using
[I-D.ietf-ace-oauth-authz]) or by using
EDHOC [I-D.selander-ace-cose-ecdhe]) a protocol that allows the
parties to negotiate locally unique identifiers in each endpoint, the
Sender IDs can be very short.
Note that The maximum Sender IDs of different lengths can be used with the same
Master Secret. E.g. the SID with value 0x00 ID is different from the
SID with 2^(nonce
length in bits - 40) - 1, For AES-CCM-16-64-128 the value 0x0000. maximum Sender ID
is 2^64 - 1. If Sender ID uniqueness cannot be guaranteed, random
Sender IDs MUST be used. Random Sender IDs MUST be long enough so
that the probability of collisions is negligible.
To enable retrieval of the right Recipient Context, the Recipient ID
SHOULD be unique in the sets of all Recipient Contexts used by an
endpoint. The Client MAY provide a Context Hint Section 8.3 to help
the Server find the right context.
While the triple (Master Secret, Master Salt, Sender ID) MUST be
unique, the same Master Salt MAY be used with several Master Secrets. Secrets
and the same Master Secret MAY be used with several Master Salts.
4. Protected CoAP Message Fields
OSCOAP
OSCORE transforms a CoAP message (which may have been generated from
an HTTP message) into an OSCOAP OSCORE message, and vice versa. This section defines how the CoAP message fields are
protected. Note that OSCOAP protects messages from the CoAP
Requests/Responses layer only, and not from the Messaging layer
(Section 2 of [RFC7252]): this means that RST and ACK empty messages
are not protected, while ACK with piggybacked responses are protected
using the process defined in this document. All the messages
mentioned in this document refer to CON, NON and non-empty ACK
messages.
OSCOAP OSCORE
protects as much of the original CoAP message as possible, possible while still
allowing forward certain proxy operations
[I-D.hartke-core-e2e-security-reqs]. Message fields may either be
o Class E: encrypted and integrity protected,
o Class I: integrity protected only, or
o Class U: unprotected. (see Section 10). This section also outlines
defines how OSCORE protects the message fields are transferred, a
detailed description and transfers them
end-to-end between client and server (in any direction).
The remainder of this section and later sections discuss the processing is provided behavior
in Section 7.
Message fields terms of the original CoAP message are either transferred messages. If HTTP is used for a particular leg in
the header/options part of end-to-end path, then this section applies to the OSCOAP message, or in the plaintext of
the COSE object. Depending on which, the location of conceptual CoAP
message that is mappable to/from the original HTTP message
field as
discussed in the OSCOAP Section 10. That is, an HTTP message is called "outer" or "inner":
o Inner message field: conceptually
transformed to a CoAP message field included and then to an OSCORE message, and
similarly in the plaintext of reverse direction. An actual implementation might
translate directly from HTTP to OSCORE without the COSE object intervening CoAP
representation.
Message fields of the OSCOAP message (see Section 5.1). The
inner CoAP message fields are by definition may be protected end-to-end
between CoAP client and CoAP server in different ways:
o Class E: encrypted and integrity protected,
o Class I: integrity protected by the COSE object (Class E). only, or
o Outer message field: Class U: unprotected.
The sending endpoint SHALL transfer Class E message field included fields in the header or
options part
ciphertext of the OSCOAP COSE object in the OSCORE message. The outer sending
endpoint SHALL include Class I message fields are
not encrypted and thus visible to an intermediary, but may be
integrity protected by including the message field values in the Additional
Authenticated Data (AAD) of the COSE object (see
Section 5.2). I.e. outer AEAD algorithm, allowing the
receiving endpoint to detect if the value has changed in transfer.
Class U message fields may SHALL NOT be protected in transfer. Class I or
and Class
U.
Note that, even though the U message formats field values are slightly different,
OSCOAP complies with CoAP over unreliable transport [RFC7252] as well
as CoAP over reliable transport [I-D.ietf-core-coap-tcp-tls].
4.1. CoAP Payload
The CoAP Payload SHALL be encrypted and integrity protected (Class
E), and thus is an inner message field.
The sending endpoint writes transferred in the payload header or
options part of the original CoAP OSCORE message
into which is visible to proxies.
Message fields not visible to proxies, i.e., transported in the plaintext
ciphertext of the COSE object.
The receiving endpoint verifies and decrypts the COSE object, and
recreates the payload of are called "Inner" (Class E). Message
fields transferred in the original CoAP message.
4.2. CoAP Header
Many CoAP header fields are required or options part of the OSCORE
message, which is visible to be read and changed during a
normal proxies, are called "Outer" (Class I or
U).
CoAP message exchange fields are either Inner or when traversing Outer: Inner if the value is
intended for the destination endpoint, Outer if the value is intended
for a proxy proxy. An OSCORE message may contain both an Inner and thus cannot in
general be protected between the endpoints, e.g. an
Outer message field of certain CoAP message layer fields. Inner and Outer
message fields such as Message ID.
The are processed independently.
4.1. CoAP header field Code MUST be sent in plaintext to support
RESTful processing, but MUST be integrity protected (Class I) to
prevent an intermediary from changing, e.g. from GET to DELETE. Payload
The CoAP version number MUST be integrity protected to prevent potential
future version-based attacks (Class I). Note that while the version
number is not sent Payload, if present in each CoAP message over reliable transport
[I-D.ietf-core-coap-tcp-tls], its value is known to client and
server.
The other the original CoAP header fields message, SHALL neither be
encrypted and integrity protected nor
encrypted (Class U). All CoAP header fields are and is thus outer an Inner message
fields. field.
The sending endpoint SHALL copy writes the header fields from payload of the original CoAP message to
into the header of plaintext (Section 5.2) input to the OSCOAP message. COSE object. The
receiving endpoint SHALL copy the header fields from the OSCOAP message to the
header of the decrypted CoAP message. Both sender verifies and receiver
include decrypts the CoAP version number COSE object, and header field Code in
recreates the AAD payload of the COSE object (see Section 5.2).
4.3. original CoAP message.
4.2. CoAP Options
Most
A summary of how options are encrypted and integrity protected (Class E), and
thus inner message fields. But to allow certain proxy operations,
some options have outer values, i.e. are present as options in the
OSCOAP message. Certain options may have both an inner value and a
potentially different outer value, where the inner value is intended
for the destination endpoint and the outer value is intended for a
proxy.
A summary of how options are protected and processed is shown in Figure 4. Options within each class are protected and processed in a
similar way, but certain options
which require special processing as
indicated by a * processing, in Figure 4 particular those which may have
both Inner and described in the processing of the
respective option. Outer message fields, are labelled with asterisks.
+----+----------------+---+---+---+
| No.| Name | E | I | U |
+----+----------------+---+---+---+
| 1 | If-Match | x | | |
| 3 | Uri-Host | | | x |
| 4 | ETag | x | | |
| 5 | If-None-Match | x | | |
| 6 | Observe | | * | * |
| 7 | Uri-Port | | | x |
| 8 | Location-Path | x | | |
| 11 | Uri-Path | x | | |
| 12 | Content-Format | x | | |
| 14 | Max-Age | * | | * |
| 15 | Uri-Query | x | | |
| 17 | Accept | x | | |
| 20 | Location-Query | x | | |
| 23 | Block2 | * | | * |
| 27 | Block1 | * | | * |
| 28 | Size2 | * | | * |
| 35 | Proxy-Uri | * | | * |
| 39 | Proxy-Scheme | | | x |
| 60 | Size1 | * | | * |
+----+----------------+---+---+---+
E=Encrypt
E = Encrypt and Integrity Protect, I=Integrity Protect only,
U=Unprotected, *=Special (Inner)
I = Integrity Protect only (Outer)
U = Unprotected (Outer)
* = Special
Figure 4: Protection of CoAP Options
Unless specified otherwise,
Unknown CoAP options not listed in Figure 4 SHALL be encrypted and integrity protected and processed as class E
options. (and no special
processing). Specifications of new CoAP options SHOULD define how
they are processed with OSCOAP. New OSCORE. A new COAP options option SHOULD be of class
E and
SHOULD NOT have outer values unless a forwarding it requires proxy needs to read
that option value. If a certain option has both inner and outer
values, the two values SHOULD NOT be the same.
4.3.1. Class E processing.
4.2.1. Inner Options
For options
When using OSCORE, Inner option message fields (marked in class column E (see of
Figure 4) the option value are sent in the
original CoAP message, if present, SHALL be encrypted and integrity
protected between the endpoints. Hence the actions resulting from
the use of such options is a way analogous to communicating in a protected
manner directly with the other endpoint. For example, a client using an
If-Match option will not be served by a proxy.
The sending endpoint SHALL write the class E Inner option from message fields
present in the original CoAP message into the plaintext of the COSE object.
Except for
object Section 5.2, and then remove the special options (* in Figure 4), Inner option message fields
from the OSCORE message.
The processing of Inner option message fields by the receiving
endpoint is specified in Section 7.2 and Section 7.4.
4.2.2. Outer Options
Outer option message fields (marked in column U or I of Figure 4) are
used to support proxy operations.
The sending endpoint SHALL NOT use include the Outer option message field
present in the original message in the outer options part of class E. However, note that an
intermediary may, legitimately or not, add, change or remove the
value OSCORE
message. All Outer option message fields, including Object-Security,
SHALL be encoded as described in Section 3.1 of an outer option.
Except for [RFC7252], where the special options,
delta is the difference to the previously included Outer option
message field.
The processing of Outer options by the receiving endpoint SHALL discard
any outer options is
specified in Section 7.2 and Section 7.4.
A procedure for integrity-protection-only of class E from the OSCOAP Class I option message and SHALL write
the
fields is specified in Section 5.3.
Note: There are currently no Class E I option message fields defined.
4.2.3. Special Options
Some options present require special processing, marked with an asterisk '*'
in Figure 4. An asterisk in the plaintext of columns E and U indicate that the COSE object into
option may be added as an Inner and/or Outer message by the decrypted CoAP message.
4.3.1.1. sending
endpoint; the processing is specified in this section.
4.2.3.1. Max-Age
An inner
The Inner Max-Age option, like other class E options, option is used as to specify the freshness (as defined
in [RFC7252] [RFC7252]) of the resource, end-to-end from the server to the
client, taking into account that it the option is not accessible to
proxies.
Since OSCOAP binds CoAP responses to requests, a cached response
would not The Inner Max-Age SHALL be possible processed by OSCORE as specified
in Section 4.2.1.
The Outer Max-Age option is used to use for any other request. To avoid unnecessary caching, a server MAY add an outer caching of
OSCORE responses at OSCORE unaware intermediary nodes. A server MAY
set a Class U Max-Age option with value zero to OSCOAP Observe responses
(see Section 5.6.1 of [RFC7252]). [RFC7252]) which is then processed according to
Section 4.2.2. The
outer Outer Max-Age option is value SHALL be discarded by
the OSCORE client.
Non-Observe OSCORE responses do not integrity protected.
4.3.1.2. need to include a Max-Age option
since the responses are non-cacheable by construction (see
Section 4.3).
4.2.3.2. The Block Options
Blockwise [RFC7959] is an optional feature. An implementation MAY
comply with
support [RFC7252] and the Object-Security option without
implementing supporting
[RFC7959]. The Block options (Block1, Block2, Size1 and Size2) MAY be either
only inner options, only outer options are used to secure message
fragmentation end-to-end (Inner options) or both inner for proxies to fragment
the OSCORE message for the next hop (Outer options). Inner and outer
options. Outer
block processing may have different performance properties depending
on the underlying transport. The inner integrity of the message can be
verified end-to-end both in case of Inner and outer options Outer Blockwise
provided all blocks are processed independently.
4.3.1.2.1. received (see Section 4.2.3.2.2).
4.2.3.2.1. Inner Block Options
The inner Block options are used for endpoint-to-endpoint secure
fragmentation of payload into blocks and protection of information
about the fragmentation (block number, block size, last block). In
this case, the sending CoAP endpoint fragments the MAY fragment a CoAP message as defined in
[RFC7959] before the message is processed by OSCOAP. OSCORE. In this case
the Block options SHALL be processed by OSCORE as Inner options
(Section 4.2.1). The receiving CoAP endpoint first processes SHALL process the OSCOAP
OSCORE message according to Section 4.2.1 before processing blockwise
as defined in [RFC7959].
Applications using OSCOAP with inner Block options MUST specify a
security policy defining a maximum unfragmented message size for
inner Block options such that messages exceeding this size SHALL be
fragmented by the sending endpoint.
For blockwise request operations (using Block1) the client using Block1, an endpoint MUST use
and process
comply with the Request-Tag as processing defined in Section 3 of
[I-D.amsuess-core-repeat-request-tag]. In particular, the rules in
section 3.3.1 of [I-D.amsuess-core-repeat-request-tag] MUST be
followed, which guarantee that a specific request body is assembled
only from the corresponding request blocks.
For blockwise response operations (using Block2) the server using Block2, an endpoint MUST use
and process
comply with the ETag as processing defined in Section 4 of
[I-D.amsuess-core-repeat-request-tag].
4.3.1.2.2.
4.2.3.2.2. Outer Block Options
A CoAP proxy may do block fragmentation on any CoAP
Proxies MAY fragment an OSCORE message
(including OSCOAP messages) as defined in [RFC7959], and thereby
decompose it into multiple blocks using outer Block options. The
outer block [RFC7959], which then
introduces Outer Block options not generated by the sending endpoint.
Note that the Outer Block options are thus neither encrypted nor integrity
protected.
To allow multiple concurrent request operations to the same server
(not only same resource), As a consequence, a CoAP proxy should use can maliciously inject block
fragments indefinitely, since the receiving endpoint needs to receive
the last block (see [RFC7959]) to be able to compose the OSCORE
message and process verify its integrity. Therefore, applications supporting
OSCORE and [RFC7959] MUST specify a security policy defining a
maximum unfragmented message size (MAX_UNFRAGMENTED_SIZE) considering
the
Request-Tag as specified in section 3.3.2 maximum size of
[I-D.amsuess-core-repeat-request-tag]; an OSCOAP server that supports
outer message which can be handled by the endpoints.
Messages exceeding this size SHOULD be fragmented by the sending
endpoint using Inner Block options MUST support the Request-Tag option. (Section 4.2.3.2.1).
An endpoint receiving an OSCOAP OSCORE message with an outer Outer Block option
SHALL first process this option according to [RFC7959], until all
blocks of the OSCOAP OSCORE message have been received, or the cumulated
message size of the blocks exceeds the maximum unfragmented message
size. In the latter case the message SHALL be discarded. MAX_UNFRAGMENTED_SIZE. In the
former case, the processing of the OSCOAP OSCORE message continues as
defined in this document.
4.3.2. Class I Options
A Class I option is an outer option and hence visible in the options
part of the OSCOAP message. Except for special options described in In the subsections, for options in Class I (see Figure 4) latter case the option
value message SHALL be integrity protected between
discarded.
To allow multiple concurrent request operations to the endpoints, see
(Section 5.2). Unless otherwise specified, same server
(not only same resource), a CoAP proxy SHOULD follow the Request-Tag
processing specified in section 3.3.2 of
[I-D.amsuess-core-repeat-request-tag].
4.2.3.3. Proxy-Uri
Proxy-Uri, when present, is split by OSCORE into class U options and
class E options, which are processed accordingly. When Proxy-Uri is
used in the original CoAP message, Uri-* are not present [RFC7252].
The sending endpoint SHALL encode first decompose the Class I options in Proxy-Uri value of the OSCOAP
original CoAP message as described
in Section 4.3.4.
4.3.2.1. Observe
Observe [RFC7641] is into the Proxy-Scheme, Uri-Host, Uri-Port, Uri-
Path, and Uri-Query options (if present) according to section 6.4 of
[RFC7252].
Uri-Path and Uri-Query are class E options and SHALL be protected and
processed as Inner options (Section 4.2.1).
The Proxy-Uri option of the OSCORE message SHALL be set to the
composition of Proxy-Scheme, Uri-Host and Uri-Port options (if
present) as specified in section 6.5 of [RFC7252], and processed as
an Outer option of Class U (Section 4.2.2).
Note that replacing the Proxy-Uri value with the Proxy-Scheme and
Uri-* options works by design for all CoAP URIs (see Section 6 of
[RFC7252]. OSCORE-aware HTTP servers should not use the userinfo
component of the HTTP URI (as defined in section 3.2.1. of
[RFC3986]), so that this type of replacement is possible in the
presence of CoAP-to-HTTP proxies. In other documents specifying
cross-protocol proxying behavior using different URI structures, it
is expected that the authors will create Uri-* options that allow
decomposing the Proxy-Uri, and specify in which OSCORE class they
belong.
An example of how Proxy-Uri is processed is given here. Assume that
the original CoAP message contains:
o Proxy-Uri = "coap://example.com/resource?q=1"
During OSCORE processing, Proxy-Uri is split into:
o Proxy-Scheme = "coap"
o Uri-Host = "example.com"
o Uri-Port = "5683"
o Uri-Path = "resource"
o Uri-Query = "q=1"
Uri-Path and Uri-Query follow the processing defined in
Section 4.2.1, and are thus encrypted and transported in the COSE
object. The remaining options are composed into the Proxy-Uri
included in the options part of the OSCORE message, which has value:
o Proxy-Uri = "coap://example.com"
See Section 6.1 and 12.6 of [RFC7252] for more information.
4.2.3.4. Observe
Observe [RFC7641] is an optional feature. An implementation MAY
support [RFC7252] and the Object-Security option without supporting
[RFC7641]. The Observe option as used here targets the requirements
on forwarding of [I-D.hartke-core-e2e-security-reqs]
(Section 2.2.1.2).
In order for a an OSCORE-unaware proxy to support forwarding of Observe messages,
messages ([RFC7641]), there
must SHALL be an Outer Observe option option, i.e.,
present in the options part of the OSCOAP
message ([RFC7641]), so Observe must have an outer value:
o OSCORE message. The Observe option processing of
the original CoAP request SHALL be encoded
in the OSCOAP request as Code for Observe messages is described in Section 4.3.4. 4.3.
To secure the order of the notifications, responses with the Observe
option client SHALL be integrity protected in the following way:
o maintain a
Notification Number for each Observation it registers. The Observe option SHALL be included in
Notification Number is a non-negative integer containing the external_aad largest
Partial IV of the
response (see successfully received notifications for the
associated Observe registration, see Section 5.2), with value set 6.4. The Notification
Number is initialized to the 3 least
significant bytes Partial IV of the Sequence Number first successfully
received notification response to the registration request. In
contrast to [RFC7641], the received Partial IV MUST always be
compared with the Notification Number, which thus MUST NOT be
forgotten after 128 seconds.
If the verification fails, the client SHALL stop processing the
response, and in the case of CON respond with an empty ACK. The
client MAY ignore the response. Observe option value.
The Observe option in the CoAP request SHALL NOT be integrity
protected, since it may be legitimately removed by
a proxy. If the Observe option is removed from a CoAP request by a
proxy, then the server can still verify the request (as a non-Observe
request), and produce a non-Observe response. If the OSCOAP OSCORE client
receives a response to an Observe request without an outer Observe
value, then it MUST verify the response as a non-Observe response, i.e. not
include response.
(The reverse case is covered in the Sequence Number verification of the response response, see
Section 7.)
4.3. CoAP Header
Most CoAP header fields are required to be read and/or changed by
CoAP proxies and thus cannot in general be protected end-to-end
between the external_aad.
4.3.3. Class U Options
Options endpoints. As mentioned in Class U have outer values Section 1, OSCORE protects
the CoAP Request/Response layer only, and not the Messaging Layer
(Section 2 of [RFC7252]), so fields such as Type and Message ID are used
not protected with OSCORE.
The CoAP header field Code is protected by OSCORE. Code SHALL be
encrypted and integrity protected (Class E) to support forward
proxy operations. Unless otherwise specified, prevent an
intermediary from eavesdropping or manipulating the Code (e.g.,
changing from GET to DELETE).
The sending endpoint SHALL encode write the Class U options in Code of the options part original CoAP
message into the plaintext of the COSE object Section 5.2. After
that, the Outer Code of the OSCOAP OSCORE message as described SHALL be set to 0.02
(POST) for requests and to 2.04 (Changed) for responses, except for
Observe messages. For Observe messages, the Outer Code of the OSCORE
message SHALL be set to 0.05 (FETCH) for requests and to 2.05
(Content) for responses. This exception allows OSCORE to be
compliant with the Observe processing in Section 4.3.4.
4.3.3.1. Uri-Host, Uri-Port, OSCORE-unaware proxies. The
choice of POST and Proxy-Scheme FETCH ([RFC8132]) allows all OSCORE messages to
have payload.
The sending receiving endpoint SHALL copy Uri-Host, Uri-Port, and Proxy-Scheme
from discard the original CoAP Code in the OSCORE message to
and write the options part Code of the OSCOAP
message. When Uri-Host, Uri-Port, or Proxy-Scheme options are
present, Proxy-Uri is not used [RFC7252].
4.3.3.2. Proxy-Uri
Proxy-Uri, when present, is split by OSCOAP into class U options and
class E options, which are processed accordingly. When Proxy-Uri is
used Plaintext in the original COSE object (Section 5.2)
into the decrypted CoAP message, Uri-* message.
The other CoAP header fields are not present [RFC7252]. Unprotected (Class U). The sending
endpoint SHALL first decompose the Proxy-Uri value write all other header fields of the original CoAP message
into the Proxy-Scheme, Uri-Host, Uri-Port, Uri-
Path and Uri-Query options (if present) according to section 6.4 header of
[RFC7252].
Uri-Path and Uri-Query are class E options and MUST be protected and
processed as if obtained the OSCORE message. The receiving endpoint SHALL
write the header fields from the original received OSCORE message into the
header of the decrypted CoAP message, see
Section 4.3.1. message.
5. The value of COSE Object
This section defines how to use COSE [RFC8152] to wrap and protect
data in the Proxy-Uri option of original message. OSCORE uses the OSCOAP message MUST be
replaced with Proxy-Scheme, Uri-Host and Uri-Port options (if
present) composed according to section 6.5 of [RFC7252] and MUST be
processed as a class U option, see Section 4.3.3.
An example of how Proxy-Uri is processed is given here. Assume that
the original CoAP message contains:
o Proxy-Uri = "coap://example.com/resource?q=1"
During OSCOAP processing, Proxy-Uri is split into:
o Proxy-Scheme = "coap"
o Uri-Host = "example.com"
o Uri-Port = "5863"
o Uri-Path = "resource"
o Uri-Query = "q=1"
Uri-Path and Uri-Query follow the processing defined in
Section 4.3.1, and are thus encrypted and transported in the COSE
object. The remaining options are composed into the Proxy-Uri
included in the options part of the OSCOAP message, which has value:
o Proxy-Uri = "coap://example.com"
4.3.4. Outer Options in the OSCOAP Message
All options with outer values present in the OSCOAP message,
including the Object-Security option, SHALL be encoded as described
in Section 3.1 of [RFC7252], where the delta is the difference to the
previously included outer option value.
5. The COSE Object
This section defines how to use COSE [I-D.ietf-cose-msg] to wrap and
protect data in the original CoAP message. OSCOAP uses the untagged
COSE_Encrypt0 structure untagged COSE_Encrypt0
structure with an Authenticated Encryption with Additional Data
(AEAD) algorithm. The key lengths, IV lengths, length, nonce length, and
maximum sequence number Sender Sequence Number are algorithm dependent.
The AEAD algorithm AES-CCM-64-64-128 AES-CCM-16-64-128 defined in Section 10.2 of
[I-D.ietf-cose-msg]
[RFC8152] is mandatory to implement. For AES-CCM-64-64-128 AES-CCM-16-64-128 the
length of Sender Key and Recipient Key is 128 bits, the length of
nonce, Sender IV,
nonce and Recipient Common IV is 7 13 bytes. The maximum Sender Sequence Number
is specified in Section 10.
The nonce is constructed as described in Section 3.1 of
[I-D.ietf-cose-msg], i.e. 11.
We denote by padding Plaintext the partial IV (Sequence Number
in network byte order) with zeroes data that is encrypted and XORing it with the Context IV
(Sender IV or Recipient IV), with integrity
protected, and by Additional Authenticated Data (AAD) the following addition: The most
significant bit in the first byte of the Context IV SHALL be flipped
for responses, in case there is a unique response (not Observe). In
this way, the same sequence number can be reused for requests and
corresponding responses, which reduces the size of the responses in
the most common case. For detailed processing instructions, see
Section 7.
We denote by Plaintext the data that is encrypted and integrity
protected, and by Additional Authenticated Data (AAD) the data that
is integrity protected only. data that
is integrity protected only.
The COSE Object SHALL be a COSE_Encrypt0 object with fields defined
as follows
o The "protected" field is empty.
o The "unprotected" field includes:
* The "Partial IV" parameter. The value is set to the Sender
Sequence Number. The Partial IV All leading zeroes SHALL be of minimum length needed to
encode removed when
encoding the sequence number. Partial IV, i.e. the first byte (if any) SHALL
never be zero. This parameter SHALL be present in requests.
In case of Observe (Section 4.3.2.1) 4.2.3.4) the Partial IV SHALL be
present in the response, responses, and otherwise the Partial IV SHALL NOT be
present in the response. responses.
* The "kid" parameter. The value is set to the Sender ID (see
Section 3). All leading zeroes SHALL be removed when encoding
the Partial IV, i.e. the first byte (if any) SHALL never be
zero. This parameter SHALL be present in requests and SHALL
NOT be present in responses.
o The "ciphertext" field is computed from the secret key (Sender Key
or Recipient Key), Nonce (see Section 5.1), Plaintext (see
Section 5.1) 5.2), and the Additional Authenticated Data (AAD) (see
Section 5.2) 5.3) following Section 5.2 of [I-D.ietf-cose-msg]. [RFC8152].
The encryption process is described in Section 5.3 of
[I-D.ietf-cose-msg]. [RFC8152].
5.1. Nonce
The nonce is constructed by left-padding the Partial IV (in network
byte order) with zeroes to exactly 5 bytes, left-padding the Sender
ID of the endpoint that generated the Partial IV (in network byte
order) with zeroes to exactly nonce length - 5 bytes, concatenating
the padded Partial IV with the padded ID, and then XORing with the
Common IV.
When observe is not used, the request and the response uses the same
nonce. In this way, the Partial IV does not have to be sent in
responses, which reduces the size. For processing instructions, see
Section 7.
+--------------------------+--+--+--+--+--+
| ID of PIV generator | Partial IV |---+
+--------------------------+--+--+--+--+--+ |
|
+-----------------------------------------+ |
| Common IV |->(+)
+-----------------------------------------+ |
|
+-----------------------------------------+ |
| Nonce |<--+
+-----------------------------------------+
Figure 5: AEAD Nonce Formation
5.2. Plaintext
The Plaintext is formatted as a CoAP message without Header (see
Figure 5) 6) consisting of:
o all Class E the Code of the original CoAP message as defined in Section 3 of
[RFC7252]; and
o all Inner option values message fields (see Section 4.3.1 4.2.1) present in the
original CoAP message (see Section 4.3). 4.2). The options are encoded
as described in Section 3.1 of [RFC7252], where the delta is the
difference to the previously included Class E option; and
o the Payload of original CoAP message, if present, and in that case
prefixed by the one-byte Payload Marker (0xFF).
0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Code | Class E options (if any) ...
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|1 1 1 1 1 1 1 1| Payload (if any) ...
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
(only if there
is payload)
Figure 5: 6: Plaintext
5.2.
5.3. Additional Authenticated Data
The external_aad SHALL be a CBOR array as defined below:
external_aad = [
ver : uint,
code
version : uint,
options : bstr,
alg : int,
request_kid : bstr,
request_seq
request_piv : bstr,
options : bstr
]
where:
o ver: version: contains the CoAP OSCORE version number, as defined in Section 3 of
[RFC7252].
o code: contains is the CoAP Code of the original CoAP message, as
defined in Section 3 of [RFC7252].
o options: contains the Class I options Section 4.3.2 present in the
original CoAP message encoded as described in Section 3.1 number. Implementations of
[RFC7252], where the delta is the difference
this specification MUST set this field to the previously
included class I option 1. Other values are
reserved for future versions.
o alg: contains the AEAD Algorithm from the security context used
for the exchange (see Section 3.1).
o request_kid: contains the value of the 'kid' in the COSE object of
the request (see Section 5).
o request_seq: request_piv: contains the value of the 'Partial IV' in the COSE
object of the request (see Section 5).
o options: contains the (non-special) Class I options (see
Section 4.2.2) present in the original CoAP message encoded as
described in Section 3.1 of [RFC7252], where the delta is the
difference to the previously included class I option.
6. Sequence Numbers, Replay, Message Binding, and Freshness
Sequence numbers
6.1. Message Binding
In order to prevent response delay and replay window are initialized as defined mismatch attacks
[I-D.mattsson-core-coap-actuators] from on-path attackers and
compromised proxies, OSCORE binds responses to the request by
including the request's ID (Sender ID or Recipient ID) and Partial IV
in
Section 3.2.2.
6.1. the AAD of the response. The server therefore needs to store the
request's ID (Sender ID or Recipient ID) and Partial IV until all
responses have been sent.
6.2. AEAD Nonce Uniqueness
An AEAD nonce MUST NOT be used more than once per AEAD key. In order
to assure unique nonces, each Sender Context contains a Sender
Sequence Number used to protect requests, and - in case of Observe -
responses. If messages are processed concurrently, the operation of
reading and increasing the Sender Sequence Number MUST be atomic.
The maximum sequence number Sender Sequence Number is algorithm dependent, see
Section 10. 11. If the Sender Sequence Number exceeds the maximum sequence
number, maximum, the
endpoint MUST NOT process any more messages with the given Sender
Context. The endpoint SHOULD acquire a new security context (and
consequently inform the other endpoint) before this happens. The
latter is out of scope of this document.
6.2. Replay Protection
In order to protect from replay of messages, each Recipient Context
contains a Replay Window used
6.3. Freshness
For requests, OSCORE provides weak absolute freshness as the only
guarantee is that the request is not older than the security context.
For applications having stronger demands on request freshness (e.g.,
control of actuators), OSCORE needs to verify request, be augmented with mechanisms
providing freshness [I-D.amsuess-core-repeat-request-tag].
For responses, the message binding guarantees that a response is not
older than its request. For responses without Observe, this gives
strong absolute freshness. For responses with Observe, the absolute
freshness gets weaker with time, and - it is RECOMMENDED that the
client regularly restart the observation.
For requests, and responses with Observe, OSCORE also provides
relative freshness in case the sense that the received Partial IV allows a
recipient to determine the relative order of
Observe - responses.
6.4. Replay Protection
In order to protect from replay of requests, the server's Recipient
Context includes a Replay Window. A receiving endpoint server SHALL verify that a
Sequence Number (Partial IV)
Partial IV received in the COSE object has not been received before in the Recipient Context. For requests, if before.
If this verification fails and the message received is a CON message,
the server SHALL respond with a 4.00 Bad Request 5.03 Service Unavailable error message.
message with the inner Max-Age option set to 0. The diagnostic
payload MAY contain the "Replay protection failed" string.
For responses, if this verification fails and the message received is
a CON message, the client SHALL respond with an empty ACK and stop
processing the response. The size
and type of the Replay Window depends on the use case and lower
protocol layers. In case of reliable and ordered transport from
endpoint to endpoint, the recipient server MAY just store the last received sequence number
Partial IV and require that newly received Sequence
Numbers Partial IVs equals the
last received Sequence Number Partial IV + 1.
6.3. Sequence Number and Replay Window State
To prevent reuse of
Responses to non-Observe requests are protected against replay as
they are cryptographically bound to the Nonce/Sequence Number with request.
In the same key, or
from accepting replayed messages, case of Observe, a node needs to handle client receiving a notification SHALL
verify that the
situation of suddenly losing sequence number Partial IV of a received notification is greater than
the Notification Number bound to that Observe registration. If the
verification fails, the client SHALL stop processing the response,
and replay window state in RAM, e.g. as the case of CON respond with an empty ACK. If the
verification succeeds, the client SHALL overwrite the corresponding
Notification Number with the received Partial IV.
If messages are processed concurrently, the Partial IV needs to be
validated a result second time after decryption and before updating the
replay protection data. The operation of validating the Partial IV
and updating the replay protection data MUST be atomic.
6.5. Losing Part of the Context State
To prevent reuse of the Nonce with the same key, or from accepting
replayed messages, a node needs to handle the situation of losing
rapidly changing parts of the context, such as the request Token,
Sender Sequence Number, Replay Window, and Nofitifcation Numbers.
These are typically stored in RAM and therefore lost in the case of
an unplanned reboot.
After boot, a node MAY reject to use existing security contexts from
before it booted and MAY establish a new security context with each
party it communicates, e.g. using EDHOC
[I-D.selander-ace-cose-ecdhe]. communicates. However, establishing a fresh security
context may have a non-negligible cost in terms of e.g. of, e.g., power
consumption.
If
After boot, a node MAY use a partly persistently stored security context is to be used after reboot,
context, but then the node MUST NOT reuse a previous Sender Sequence
Number and MUST NOT accept previously accepted messages.
6.3.1. The Basic Case Some ways
to achieve this is described below:
6.5.1. Sequence Number
To prevent reuse of Sender Sequence Number, the Numbers, a node MAY perform the
following procedure during normal operations:
o Before sending Each time the Sender Sequence Number is evenly divisible by K,
where K is a message, positive integer, store the client stores Sender Sequence Number in
persistent memory a
sequence number associated to the stored security context higher
than any sequence number which has been or are being sent using
this security context. memory. After boot, the client does not use any
lower sequence number in a request than what was persistently node initiates the Sender
Sequence Number to the value stored with that security context.
* in persistent memory + K - 1.
Storing to persistent memory can be costly. Instead of storing
a sequence number for each request, the client may store Seq +
K to persistent memory every K requests, where Seq is the
current sequence number and The value K > 1. This is gives a
trade-off between the number of storage operations and efficient
use of sequence
numbers. Sender Sequence Numbers.
6.5.2. Replay Window
To prevent accepting replay of previously received messages, requests, the node
server MAY perform the following procedure: procedure after boot:
o After boot, before verifying a message using a security context
stored before boot, the server synchronizes the replay window so
that no old messages are being accepted. The server uses the
Repeat option [I-D.amsuess-core-repeat-request-tag] for
synchronizing the replay window: For each stored security context, the first time after boot the
server receives an OSCOAP OSCORE request,
it generates a pseudo-random nonce and responds with the server uses the Repeat
option set [I-D.amsuess-core-repeat-request-tag] to the nonce as described in
[I-D.amsuess-core-repeat-request-tag]. If the server receives get a
repeated OSCOAP request containing the Repeat option with
verifiable freshness and uses that to synchronize the same
nonce, and if replay
window. If the server can verify the fresh request, then the sequence
number obtained Partial
IV in the repeated message fresh request is set as the lower limit of the replay
window.
6.3.2. The
6.5.3. Replay Protection of Observe Case Notifications
To prevent reuse of Sequence Number in case accepting replay of Observe, previously received notification
responses, the node client MAY perform the following procedure during normal operations: after boot:
o Before sending a notification, the server stores in persistent
memory a sequence number associated The client rejects notifications bound to the stored security context
higher than any sequence number for which a notification has been
or are being sent earlier
registration, removes all Notification Numbers and re-register
using this security context. After boot, Observe.
7. Processing
This section describes the
server does not use any lower sequence number in an Observe
response than what was persistently stored with that security
context.
* Storing to persistent memory can be costly. Instead of storing OSCORE message processing.
7.1. Protecting the Request
Given a sequence number for each notification, CoAP request, the server may store
Seq + K client SHALL perform the following steps to persistent memory every K requests, where Seq is the
current sequence number and K > 1. This is a trade-off between
the number of storage operations and efficient use of sequence
numbers.
Note that a client MAY continue an ongoing observation after reboot
using a stored security context. With Observe, the client can only
verify the order of the notifications, as they may be delayed. If
the client wants to synchronize with a server resource it MAY restart
an observation.
6.4. Freshness
For responses without Observe, OSCOAP provides absolute freshness.
For requests, and responses with Observe, OSCOAP provides relative
freshness in the sense that the sequence numbers allows a recipient
to determine the relative order of messages.
For applications having stronger demands on freshness (e.g. control
of actuators), OSCOAP needs to be augmented with mechanisms providing
absolute freshness [I-D.mattsson-core-coap-actuators].
6.5. Delay and Mismatch Attacks
In order to prevent response delay and mismatch attacks
[I-D.mattsson-core-coap-actuators] from on-path attackers and
compromised proxies, OSCOAP binds responses to the request by
including the request's ID (Sender ID or Recipient ID) and sequence
number in the AAD of the response. The server therefore needs to
store the request's ID (Sender ID or Recipient ID) and sequence
number until all responses have been sent.
7. Processing
7.1. Protecting the Request
Given a CoAP request, the client SHALL perform the following steps to
create an OSCOAP request:
1. Retrieve
create an OSCORE request:
1. Retrieve the Sender Context associated with the target resource.
2. Compose the Additional Authenticated Data, as described in
Section 5.
3. Compose Compute the AEAD nonce by XORing from the Context Sender ID, Common IV, and Partial
IV (Sender IV) with
the partial IV (Sequence Sequence Number in network byte order). Then (in one
atomic operation, see Section 6.2) increment the Sender Sequence
Number by one.
4. Encrypt the COSE object using the Sender Key. Compress the COSE
Object as specified in Section 8.
5. Format the OSCOAP OSCORE message according to Section 4. The Object-
Security option is added, see Section 4.3.4. 4.2.2.
6. Store the association Token - Security Context. The client SHALL
be able to find the Recipient Context from the Token in the
response.
7. Increment the Sequence Number by one.
7.2. Verifying the Request
A server receiving a request containing the Object-Security option
SHALL perform the following steps:
1. Process outer Block options according to [RFC7959], until all
blocks of the request have been received, see Section 4.3.1.2. 4.2.3.2.
2. Decompress Discard the COSE Object (Section 8) message Code and retrieve the Recipient
Context associated all non-special Inner option
message fields (marked with the 'x' in column E of Figure 4) present
in the received message. For example, an If-Match Outer option
is discarded, but an Uri-Host Outer option is not discarded.
3. Decompress the COSE Object (Section 8) and retrieve the
Recipient Context associated with the Recipient ID in the 'kid'
parameter. If the request is a NON message and either the
decompression or the COSE message fails to decode, or the server
fails to retrieve a Recipient Context with Recipient ID
corresponding to the 'kid' parameter received, then the server
SHALL stop processing the request. If the request is a CON
message, and:
* either the decompression or the COSE message fails to decode,
the server SHALL respond with a 4.02 Bad Option error
message. The diagnostic payload SHOULD contain the string
"Failed to decode COSE".
* the server fails to retrieve a Recipient Context with
Recipient ID corresponding to the 'kid' parameter received,
the server SHALL respond with a 4.01 Unauthorized error
message. The diagnostic payload MAY contain the string
"Security context not found".
If the request is a NON message and either the decompression or the
COSE message fails to decode, or the server fails to retrieve a
Recipient Context with Recipient ID corresponding to the 'kid'
parameter received, then the server SHALL stop processing the
request.
1.
4. Verify the Sequence Number in the 'Partial IV' parameter, parameter using the Replay Window, as
described in Section 6.
2.
5. Compose the Additional Authenticated Data, as described in
Section 5.
3. Compose
6. Compute the AEAD nonce by XORing from the Context IV (Recipient IV)
with Recipient ID, Common IV, and the padded
'Partial IV' parameter, received in the COSE Object.
4.
7. Decrypt the COSE object using the Recipient Key.
* If decryption fails, the server MUST stop processing the
request and, if the request is a CON message, the server MUST
respond with a 4.00 Bad Request error message. The
diagnostic payload MAY contain the "Decryption failed"
string.
* If decryption succeeds, update the Recipient Replay Window, as
described in Section 6.
5.
8. For each decrypted option, check if the option is also present
as an Outer option: if it is, discard the Outer. For example:
the message contains a Max-Age Inner and a Max-Age Outer option.
The Outer Max-Age is discarded.
9. Add decrypted code, options and payload to the decrypted request,
processing the E options as described in (Section 4).
request. The Object-Security option is removed.
6.
10. The decrypted CoAP request is processed according to [RFC7252]
7.3. Protecting the Response
Given a CoAP response, the server SHALL perform the following steps
to create an OSCOAP response: OSCORE response. Note that CoAP error responses derived
from CoAP processing (point 10. in Section 7.2) are protected, as
well as successful CoAP responses, while the OSCORE errors (point 3.,
4., 7. in Section 7.2) do not follow the processing below, but are
sent as simple CoAP responses, without OSCORE processing.
1. Retrieve the Sender Context in the Security Context used to
verify the request.
2. Compose the Additional Authenticated Data, as described in
Section 5.
3. Compose Compute the AEAD nonce
* If Observe is not used, compose the AEAD nonce by XORing the
Context IV (Sender IV with the most significant bit in the
first byte flipped) with the padded Partial IV parameter from the request. request is used.
* If Observe is used, compose Compute the AEAD nonce by XORing the
Context IV (Sender IV) with from the Sender ID,
Common IV, and Partial IV of the response
(Sequence (Sender Sequence Number in network
byte order). Then (in one atomic operation, see Section 6.2)
increment the Sender Sequence Number by one.
4. Encrypt the COSE object using the Sender Key. Compress the COSE
Object as specified in Section 8.
5. Format the OSCOAP OSCORE message according to Section 4. The Object-
Security option is added, see Section 4.3.4.
6. If Observe is used, increment the Sequence Number by one. 4.2.2.
7.4. Verifying the Response
A client receiving a response containing the Object-Security option
SHALL perform the following steps:
1. Process outer Block options according to [RFC7959], until all
blocks of the OSCOAP OSCORE message have been received, see
Section 4.3.1.2. 4.2.3.2.
2. Discard the message Code and all non-special Class E options
from the message. For example, ETag Outer option is discarded,
Max-Age Outer option is not discarded.
3. Retrieve the Recipient Context associated with the Token.
Decompress the COSE Object (Section 8). If the response is a CON
message and either the
decompression or the COSE message fails to decode, then the client SHALL send an empty ACK back and stop
processing the response. If the response is a NON message and
any of the previous conditions appear, then the client SHALL
simply stop processing the response.
1. go to
11.
4. For Observe notifications, verify the Sequence Number in the received 'Partial IV'
parameter against the corresponding Notification Number as
described in Section 6.
2. If the client receives a notification
for which no Observe request was sent, then go to 11.
5. Compose the Additional Authenticated Data, as described in
Section 5.
3. Compose
6. Compute the AEAD nonce
* If the Observe option is not present in the response, compose the AEAD
nonce by XORing the Context IV (Recipient IV with the
the most significant bit in the first byte flipped) with the
padded Partial IV parameter from the request. request is used.
* If the Observe option is present in the response, compose compute the
AEAD nonce by XORing from the Context IV (Recipient IV) with Recipient ID, Common IV, and the
padded Partial IV parameter from 'Partial
IV' parameter, received in the response.
4. COSE Object.
7. Decrypt the COSE object using the Recipient Key.
* If decryption fails, the client MUST stop processing the
response and, if the response is a CON message, the client
MUST respond with an empty ACK back. then go to 11.
* If decryption succeeds and Observe is used, update the
Recipient Replay Window,
corresponding Notification Number, as described in Section 6.
5. Add
8. For each decrypted option, check if the option is also present
as an Outer option: if it is, discard the Outer. For example:
the message contains a Max-Age Inner and a Max-Age Outer option.
The Outer Max-Age is discarded.
9. Add decrypted code, options or and payload to the decrypted response
overwriting any outer E options (see Section 4).
request. The Object-
Security Object-Security option is removed.
* If Observe is used, replace the Observe value with the 3 least
significant bytes in the sequence number.
6.
10. The decrypted CoAP response is processed according to [RFC7252]
11. (Optional) In case any of the previous erroneous conditions
apply: if the response is a CON message, then the client SHALL
send an empty ACK back and stop processing the response; if the
response is a ACK or a NON message, then the client SHALL simply
stop processing the response.
8. OSCOAP OSCORE Compression
The Concise Binary Object Representation (CBOR) [RFC7049] combines
very small message sizes with extensibility. The CBOR Object Signing
and Encryption (COSE) [I-D.ietf-cose-msg] [RFC8152] uses CBOR to create compact encoding
of signed and encrypted data. COSE is however constructed to support
a large number of different stateless use cases, and is not fully
optimized for use as a stateful security protocol, leading to a
larger than necessary message expansion. In this section section, we define
a simple stateless compression mechanism for OSCOAP, OSCORE called the
"compressed COSE object", which significantly reduces the per-packet
overhead.
8.1. Encoding of the Object-Security Option Value
The value of the Object-Security option SHALL be encoded contain the OSCORE flag
byte and the kid parameter as follows:
0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|0 0 0|h|k| n | kid (if any) ...
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
Figure 7: Object-Security Value
o The first byte MUST encode (= the OSCORE flag byte) encodes a set of flags and
the length of the Partial IV parameter.
* The three least significant bits bits, n, encode the Partial IV size.
length + 1. If their value is 0, n = 0 then the Partial IV is not present in the
compressed message. COSE object. The value n = 7 is reserved.
* The fourth least significant bit is the kid flag, k: it is set
to 1 if the kid is present in the compressed message. COSE object.
* The fifth-eighth fifth least significant bits (= most bit is the Context Hint flag, h: it
is set to 1 if the compressed COSE object contains a Context
Hint, see Section 8.3.
* The sixth-eighth least significant
half-byte) bits are reserved and SHALL
be set to zero when not in use.
o The following n remaining bytes (n being the value of the Partial IV size in
the first byte) encode the value of the Partial IV, if the Partial
IV is present (size not 0).
o The following byte encodes the size of the kid parameter, if the
kid is present (flag bit set to 1)
o The following m bytes (m given by the previous byte) encode encode the value of the kid, if the kid is
present (flag bit set to (k = 1)
o The remainining bytes encode the ciphertext.
The presence of Partial IV and kid in requests and responses is
specified in Section 5, and summarized in Figure 6.
7 6 5 4 3 2 1 0
+-+-+-+-+-+-+-+-+ k: kid flag bit
|0 0 0 0|k|pivsz| pivsz: Partial IV size (3 bits)
+-+-+-+-+-+-+-+-+
+-------+---------+------------+-----------+
| | Request 8.
+--------------------------+-----+-----+
| Resp with- | Resp with k | n |
+--------------------------+-----+-----+
| Request | out observe| observe 1 |
+-------+---------+------------+-----------+ > 0 | k
| 1 Response without Observe | 0 | 0 |
| pivsz | > 0 Response with Observe | 0 | > 0 |
+-------+---------+------------+-----------+
+--------------------------+-----+-----+
Figure 6: Flag 8: Presence of data fields in OSCORE flag byte for OSCOAP compression
8.2. Examples
This section provides examples Encoding of COSE Objects before and after
OSCOAP compression.
8.2.1. Example: Request
Before compression:
[
h'',
{ 4:h'25', 6:h'05' },
h'aea0155667924dff8a24e4cb35b9'
]
0x83 40 a2 04 41 25 06 41 05 4e ae a0 15 56 67 92
4d ff 8a 24 e4 cb 35 b9 (24 bytes)
After compression:
First byte: 0b00001001 the OSCORE Payload
The payload of the OSCORE message SHALL be encoded as follows:
o The first n - 1 bytes encode the value of the Partial IV, if the
Partial IV is present (n > 0).
o The following 1 byte encode the length of the Context Hint
(Section 8.3), s, if the Context Hint flag is set (h = 0x09
0x09 05 01 25 ae a0 15 56 67 92 4d ff 8a 24 e4 cb
35 b9 (18 bytes)
8.2.2. Example: Response (without Observe)
Before compression:
[
h'',
{},
h'aea0155667924dff8a24e4cb35b9'
] 1).
o The following s bytes encode the Context Hint, if the Context Hint
flag is set (h = 1).
o The remaining bytes encode the ciphertext.
8.3. Context Hint
For certain use cases, e.g. deployments where the same Recipient ID
is used with multiple contexts, it is necessary or favorable for the
sending endpoint to provide a Context Hint in order for the receiving
endpoint to retrieve the recipient context. The Context Hint is
implicitly integrity protected, as a manipulation leads to the wrong
or no context being retrieved resulting in a verification error.
Examples:
o If the sending endpoint has an identifier in some other namespace
which can be used by the recipient endpoint to retrieve or
establish the security context, then that identifier can be used
as Context Hint.
o In case of a group communication scenario
[I-D.tiloca-core-multicast-oscoap], if the recipient endpoint
belongs to multiple groups, involving the same endpoints, then a
group identifier can be used as Context Hint to enable the
receiving endpoint to find the right group security context.
8.4. Compression Examples
This section provides examples of COSE Objects before and after
OSCORE compression.
8.4.1. Example: Request
Before compression:
[
h'',
{ 4:h'25', 6:h'05' },
h'aea0155667924dff8a24e4cb35b9'
]
0x83 40 a0 a2 04 41 25 06 41 05 4e ae a0 15 56 67 92
4d ff 8a 24 e4 cb 35 b9 (18 (24 bytes)
After compression:
First
Flag byte: 0b00000000 0b00001010 = 0x00
0x00 0x0a
Option Value: 0a 25 (2 bytes)
Payload: 05 ae a0 15 56 67 92 4d ff 8a 24 e4 cb 35 b9 (15 bytes)
8.2.3.
8.4.2. Example: Response (with Observe) Request 2
Before compression:
[
h'',
{ 6:h'07' 4:h'00', 6:h'00' },
h'aea0155667924dff8a24e4cb35b9'
]
0x83 40 a1 a2 04 41 00 06 41 07 00 4e ae a0 15 56 67 92
4d ff 8a 24 e4 cb 35 b9 (21 (24 bytes)
After compression:
First
Flag byte: 0b00000001 0b00001001 = 0x01
0x01 07 0x09
Option Value: 09 (1 bytes)
Payload: ae a0 15 56 67 92 4d ff 8a 24 e4 cb 35 b9
(16 (14 bytes)
9. Web Linking
The use of OSCOAP MAY be indicated by a target attribute "osc" in a
web link [RFC5988] to a CoAP resource. This attribute is a hint
indicating that the destination of that link is to be accessed using
OSCOAP. Note that this
8.4.3. Example: Response (without Observe)
Before compression:
[
h'',
{},
h'aea0155667924dff8a24e4cb35b9'
]
0x83 40 a0 4e ae a0 15 56 67 92 4d ff 8a 24 e4 cb
35 b9 (18 bytes)
After compression:
Flag byte: 0b00000000 = 0x00
Option Value: (0 bytes)
Payload: ae a0 15 56 67 92 4d ff 8a 24 e4 cb 35 b9 (14 bytes)
8.4.4. Example: Response (with Observe)
Before compression:
[
h'',
{ 6:h'07' },
h'aea0155667924dff8a24e4cb35b9'
]
0x83 40 a1 06 41 07 4e ae a0 15 56 67 92 4d ff
8a 24 e4 cb 35 b9 (21 bytes)
After compression:
Flag byte: 0b00000010 = 0x02
Option Value: 02 (1 bytes)
Payload: 07 ae a0 15 56 67 92 4d ff 8a 24 e4 cb 35 b9 (15 bytes)
9. Web Linking
The use of OSCORE MAY be indicated by a target attribute "osc" in a
web link [RFC5988] to a resource. This attribute is a hint
indicating that the destination of that link is to be accessed using
OSCORE. Note that this is simply a hint, it does not include any
security context material or any other information required to run
OSCOAP.
OSCORE.
A value MUST NOT be given for the "osc" attribute; any present value
MUST be ignored by parsers. The "osc" attribute MUST NOT appear more
than once in a given link-value; occurrences after the first MUST be
ignored by parsers.
10. Security Considerations
In scenarios Proxy Operations
RFC 7252 defines operations for a CoAP-to-CoAP proxy (see Section 5.7
of [RFC7252]) and for proxying between CoAP and HTTP (Section 10 of
[RFC7252]). A more detailed description of the HTTP-to-CoAP mapping
is provided by [RFC8075]. This section describes the operations of
OSCORE-aware proxies.
10.1. CoAP-to-CoAP Forwarding Proxy
OSCORE is designed to work with intermediary nodes such as legacy CoAP-to-CoAP forward proxies or brokers,
transport layer security such
[RFC7252], but OSCORE-aware proxies provide certain simplifications
as DTLS only protects data hop-by-hop.
As a consequence the intermediary nodes can read and modify
information. specified in this section.
The trust model where all intermediate nodes targeted proxy operations are
considered trustworthy specified in Section 2.2.1 of
[I-D.hartke-core-e2e-security-reqs]. In particular caching is problematic, not only from
disabled since the CoAP response is only applicable to the original
client's CoAP request. An OSCORE-aware proxy SHALL NOT cache a privacy
perspective, but also from
response to a security perspective, as request with an Object-Security option. As a
consequence, the
intermediaries are free to delete resources on sensors search for cache hits and falsify
commands to actuators (such CoAP freshness/Max-Age
processing can be omitted.
Proxy processing of the (Outer) Proxy-Uri option is as "unlock door", "start fire alarm",
"raise bridge"). Even defined in
[RFC7252].
Proxy processing of the rare cases, where all (Outer) Block options is as defined in
[RFC7959] and [I-D.amsuess-core-repeat-request-tag].
Proxy processing of the owners (Outer) Observe option is as defined in
[RFC7641]. OSCORE-aware proxies MAY look at the Partial IV value
instead of the
intermediary nodes are fully trusted, attacks Outer Observe option.
10.2. HTTP-to-CoAP Translation Proxy
Section 10.2 of [RFC7252] and data breaches make
such [RFC8075] specify the behavior of an architecture brittle.
DTLS protects hop-by-hop
HTTP-to-CoAP proxy. As requested in Section 1 of [RFC8075], this
section describes the entire CoAP message, including header,
options, and payload. OSCOAP protects end-to-end HTTP mapping for the payload, OSCORE protocol extension
of CoAP.
The presence of the Object-Security option, both in requests and
all information
responses, is expressed in an HTTP header field named Object-Security
in the options and header, that mapped request or response. The value of the field is not required for
forwarding (see Section 4). DTLS and OSCOAP can be combined, thereby
enabling end-to-end security the
value of CoAP payload, the Object-Security option Section 8.1 in combination with
hop-by-hop protection base64url encoding
(Section 5 of the entire CoAP message, during transport
between end-point and intermediary node. [RFC4648]) without padding (see [RFC7515] Appendix C
for implementation notes for this encoding). The CoAP message layer, however, cannot be protected end-to-end
through intermediary devices since value of the parameters Type and Message
ID, as well as Token and Token Length may be changed by a proxy.
Moreover, messages that are not possible to verify should for
security reasons not always be acknowledged but in some cases be
silently dropped. This would not comply with CoAP message layer, but
does not have an impact on
payload is the application layer security solution,
since message layer OSCORE payload Section 8.2, also base64url-encoded
without padding.
Example:
Mapping and notation here is excluded from that.
The use based on "Simple Form" (Section 5.4.1.1
of COSE [RFC8075]).
[HTTP request -- Before object security processing]
GET http://proxy.url/hc/?target_uri=coap://device.url/orders HTTP/1.1
[HTTP request -- HTTP Client to Proxy]
POST http://proxy.url/hc/?target_uri=coap://device.url/ HTTP/1.1
Object-Security: 0b 25
Body: 09 07 01 13 61 f7 0f d2 97 b1 [binary]
[CoAP request -- Proxy to protect CoAP messages as specified in this
document requires an established security context. The method Server]
POST coap://device.url/
Object-Security: 0b 25
Payload: 09 07 01 13 61 f7 0f d2 97 b1 [binary]
[CoAP response -- CoAP Server to
establish the Proxy]
2.04 Changed
Object-Security: [empty]
Payload: 00 31 d1 fc f6 70 fb 0c 1d d5 ... [binary]
[HTTP response -- Proxy to HTTP Client]
HTTP/1.1 200 OK
Object-Security: [empty]
Body: 00 31 d1 fc f6 70 fb 0c 1d d5 ... [binary]
[HTTP response -- After object security context described processing]
HTTP/1.1 200 OK
Body: Exterminate! Exterminate!
Note that the HTTP Status Code 200 in Section 3.2 the next-to-last message is based on a
common shared secret material in client and server, which may be
obtained e.g. by using EDHOC [I-D.selander-ace-cose-ecdhe] or the ACE
framework [I-D.ietf-ace-oauth-authz]. An OSCOAP profile
mapping of ACE is
described in [I-D.seitz-ace-oscoap-profile].
The mandatory-to-implement AEAD algorithm AES-CCM-64-64-128 is
selected for broad applicability CoAP Code 2.04 (Changed), whereas the HTTP Status Code 200
in terms of the last message size (2^64
blocks) and maximum number of messages (2^56). Compatibility with
CCM* is achieved by using the algorithm AES-CCM-16-64-128
[I-D.ietf-cose-msg].
Most AEAD algorithms require a unique nonce for each message, for
which mapping of the sequence numbers in CoAP Code 2.05 (Content),
which was encrypted within the compressed COSE message field "Partial IV" is
used. If object carried in the recipient accepts any sequence number larger than
Body of the
one previously received, then HTTP response.
10.3. CoAP-to-HTTP Translation Proxy
Section 10.1 of [RFC7252] describes the problem behavior of sequence number
synchronization is avoided. With reliable transport it may be
defined that only messages with sequence number which are equal to
previous sequence number + 1 are accepted. The alternatives to
sequence numbers have their issues: very constrained devices may a CoAP-to-HTTP
proxy. RFC 8075 [RFC8075] does not
be able to support accurate time, or to generate cover this direction in any more
detail and store large
numbers so an example instantiation of random nonces. The requirement to change key at counter
wrap is a complication, but it also forces the user Section 10.1 of this
specification [RFC7252]
is used below.
Example:
[CoAP request -- Before object security processing]
GET coap://proxy.url/
Proxy-Uri=http://device.url/orders
[CoAP request -- CoAP Client to think about implementing key renewal.
The maximum sequence number Proxy]
POST coap://proxy.url/
Proxy-Uri=http://device.url/
Object-Security: 0b 25
Payload: 09 07 01 13 61 f7 0f d2 97 b1 [binary]
[HTTP request -- Proxy to guarantee nonce uniqueness
(Section 6.1) is algorithm dependent. Using AES_CCM, with HTTP Server]
POST http://device.url/ HTTP/1.1
Object-Security: 0b 25
Body: 09 07 01 13 61 f7 0f d2 97 b1 [binary]
[HTTP response -- HTTP Server to Proxy]
HTTP/1.1 200 OK
Object-Security: [empty]
Body: 00 31 d1 fc f6 70 fb 0c 1d d5 ... [binary]
[CoAP response -- CoAP Server to Proxy]
2.04 Changed
Object-Security: [empty]
Payload: 00 31 d1 fc f6 70 fb 0c 1d d5 ... [binary]
[CoAP response -- After object security processing]
2.05 Content
Payload: Exterminate! Exterminate!
Note that the
maximum sequence number SHALL be 2^(min(nonce length in bits, 56) -
1) - 1. The "-1" HTTP Code 2.04 (Changed) in the exponent stems from next-to-last message is
the same partial IV and
flipped bit mapping of IV (Section 5) is used HTTP Status Code 200, whereas the CoAP Code 2.05
(Content) in request and response. The
compression algorithm (Section 8) assumes that the partial IV is 56
bits or less (which last message is the reason for min(,) value that was encrypted within
the compressed COSE object carried in the exponent).
The inner block options enable Body of the sender to split large messages
into OSCOAP-protected blocks HTTP response.
11. Security Considerations
In scenarios with intermediary nodes such that as proxies or brokers,
transport layer security such as (D)TLS only protects data hop-by-
hop. As a consequence, the receiving node intermediary nodes can verify
blocks before having received the complete message. read and modify
information. The outer block
options allow for arbitrary proxy fragmentation operations that
cannot be verified by the endpoints, trust model where all intermediate nodes are
considered trustworthy is problematic, not only from a privacy
perspective, but can by policy be restricted also from a security perspective, as the
intermediaries are free to delete resources on sensors and falsify
commands to actuators (such as "unlock door", "start fire alarm",
"raise bridge"). Even in size since the encrypted options allow for secure fragmentation of
very large messages. A maximum message size (above which rare cases, where all the sending
endpoint fragments owners of the message
intermediary nodes are fully trusted, attacks and data breaches make
such an architecture brittle.
(D)TLS protects hop-by-hop the receiving endpoint discards
the entire message, if complying to including header,
options, and payload. OSCORE protects end-to-end the policy) may be obtained as part of
normal resource discovery.
Applications need to use a padding scheme if payload, and
all information in the content of a message options and header, that is not required for
proxy operations (see Section 4). (D)TLS and OSCORE can be determined solely from the length combined,
thereby enabling end-to-end security of the payload. As an
example, message payload, in
combination with hop-by-hop protection of the strings "YES" entire message, during
transport between end-point and "NO" intermediary node. The message
layer, however, cannot be protected end-to-end through intermediary
devices since, even if encrypted can be
distinguished from each other as there is no padding supplied by the
current set of encryption algorithms. Some information can protocol itself isn't translated, the
parameters Type, Message ID, Token, and Token Length may be
determined even from looking at boundary conditions. An example changed
by a proxy.
The use of
this would be returning an integer between 0 and 100 where lengths of
1, 2 and 3 will provide information about where in the range things
are. Three different methods COSE to deal with this are: 1) ensure that
all protect messages are as specified in this document
requires an established security context. The method to establish
the same length. For example using 0 security context described in Section 3.2 is based on a common
shared secret material in client and 1 instead server, which may be obtained,
e.g., by using the ACE framework [I-D.ietf-ace-oauth-authz]. An
OSCORE profile of 'yes' and 'no'. 2) Use ACE is described in [I-D.seitz-ace-oscoap-profile].
Most AEAD algorithms require a character unique nonce for each message, for
which the sender sequence numbers in the COSE message field "Partial
IV" is not part of used. If the
responses to pad to a fixed length. For example, pad with a space to
three characters. 3) Use recipient accepts any sequence number larger
than the PKCS #7 style padding scheme where m
bytes are appended each having one previously received, then the value of m. For example,
appending a 0 to "YES" and two 1's to "NO". This style problem of padding
means sequence number
synchronization is avoided. With reliable transport, it may be
defined that all values need only messages with sequence number which are equal to be padded.
11. Privacy Considerations
Privacy threats executed through intermediate nodes
previous sequence number + 1 are considerably
reduced by means of OSCOAP. End-to-end integrity protection accepted. The alternatives to
sequence numbers have their issues: very constrained devices may not
be able to support accurate time, or to generate and
encryption store large
numbers of CoAP random nonces. The requirement to change key at counter
wrap is a complication, but it also forces the user of this
specification to think about implementing key renewal.
The maximum sender sequence number is dependent on the AEAD
algorithm. The maximum sender sequence number SHALL be 2^40 - 1, or
any algorithm specific lower limit. The compression mechanism
(Section 8) assumes that the Partial IV is 40 bits or less. The
mandatory-to-implement AEAD algorithm AES-CCM-16-64-128 is selected
for compatibility with CCM*.
The inner block options enable the sender to split large messages
into OSCORE-protected blocks such that the receiving node can verify
blocks before having received the complete message. The outer block
options allow for arbitrary proxy fragmentation operations that
cannot be verified by the endpoints, but can by policy be restricted
in size since the encrypted options allow for secure fragmentation of
very large messages. A maximum message size (above which the sending
endpoint fragments the message and the receiving endpoint discards
the message, if complying to the policy) may be obtained as part of
normal resource discovery.
12. Privacy Considerations
Privacy threats executed through intermediate nodes are considerably
reduced by means of OSCORE. End-to-end integrity protection and
encryption of the message payload and all options that are not used
for
forwarding, proxy operations, provide mitigation against attacks on sensor
and actuator communication, which may have a direct impact on the
personal sphere.
The unprotected options (Figure 4) may reveal privacy sensitive
information. In particular Uri-Host SHOULD NOT contain privacy
sensitive information.
CoAP headers sent in plaintext allow for example matching of CON and
ACK (CoAP Message Identifier), matching of request and responses
(Token) and traffic analysis.
Using the mechanisms described in Section 6.3 reveals 6.5 may reveal when a
device goes through a reboot. This can be mitigated by the device
storing the precise state of sender sequence number and recipient replay window
on a clean shutdown.
12. IANA Considerations
Note to RFC Editor: Please replace all occurrences
The length of "[[this
document]]" with message fields can reveal information about the RFC number of this specification.
12.1. CoAP Option Numbers Registry
The Object-Security option is added
message. Applications may use a padding scheme to protect against
traffic analysis. As an example, the CoAP Option Numbers strings "YES" and "NO" even if
encrypted can be distinguished from each other as there is no padding
supplied by the current set of encryption algorithms. Some
information can be determined even from looking at boundary
conditions. An example of this would be returning an integer between
0 and 100 where lengths of 1, 2 and 3 will provide information about
where in the range things are. Three different methods to deal with
this are: 1) ensure that all messages are the same length. For
example, using 0 and 1 instead of 'yes' and 'no'. 2) Use a character
which is not part of the responses to pad to a fixed length. For
example, pad with a space to three characters. 3) Use the PKCS #7
style padding scheme where m bytes are appended each having the value
of m. For example, appending a 0 to "YES" and two 1's to "NO". This
style of padding means that all values need to be padded. Similar
arguments apply to other message fields such as resource names.
13. IANA Considerations
Note to RFC Editor: Please replace all occurrences of "[[this
document]]" with the RFC number of this specification.
13.1. CoAP Option Numbers Registry
The Object-Security option is added to the CoAP Option Numbers
registry:
+--------+-----------------+-------------------+
| Number | Name | Reference |
+--------+-----------------+-------------------+
| TBD | Object-Security | [[this document]] |
+--------+-----------------+-------------------+
12.2. Media Type
13.2. Header Field Registrations
The "application/oscon" media type HTTP header field Object-Security is added to the Media Types Message Headers
registry:
Type name: application
Subtype name: oscon
Required parameters: N/A
Optional parameters: N/A
Encoding considerations: binary
Security considerations: See Appendix C of this document.
Interoperability considerations: N/A
Published specification:
+-------------------+----------+----------+-------------------+
| Header Field Name | Protocol | Status | Reference |
+-------------------+----------+----------+-------------------+
| Object-Security | http | standard | [[this document]] (this document)
Applications that use this media type: To be identified
Fragment identifier considerations: N/A
Additional information:
* Magic number(s): N/A
* File extension(s): N/A
* Macintosh file type code(s): N/A
Person & email address to contact for further information:
Goeran Selander <[email protected]>
Intended usage: COMMON
Restrictions on usage: N/A
Author: Goeran Selander, [email protected]
12.3. CoAP Content Format Registration
The "application/oscon" content format is added to the CoAP Content
Format registry:
+-------------------+----------+-----+-------------------+
| Media type | Encoding | ID | Reference |
+-------------------+----------+-----+-------------------+
| application/oscon | - | TBD | [[this document]] |
+-------------------+----------+-----+-------------------+
13. Acknowledgments
The following individuals provided input to |
+-------------------+----------+----------+-------------------+
14. Acknowledgments
The following individuals provided input to this document: Christian
Amsuess, Tobias Andersson, Carsten Bormann, Joakim Brorsson, Thomas
Fossati, Martin Gunnarsson, Klaus Hartke, Jim Schaad, Dave Thaler,
Marco Tiloca, and Malisa Vučinić.
Ludwig Seitz and Goeran Selander worked on this document as part of
the CelticPlus project CyberWI, with funding from Vinnova.
14.
15. References
14.1.
15.1. Normative References
[I-D.amsuess-core-repeat-request-tag]
Amsuess, C., Mattsson, J., and G. Selander, "Repeat And
Request-Tag", draft-amsuess-core-repeat-request-tag-00
(work in progress), July 2017.
[I-D.ietf-cose-msg]
Schaad, J., "CBOR Object Signing and Encryption (COSE)",
draft-ietf-cose-msg-24 (work in progress), November 2016.
[RFC2119] Bradner, S., "Key words for use in RFCs to Indicate
Requirement Levels", BCP 14, RFC 2119,
DOI 10.17487/RFC2119, March 1997,
<http://www.rfc-editor.org/info/rfc2119>.
<https://www.rfc-editor.org/info/rfc2119>.
[RFC4648] Josefsson, S., "The Base16, Base32, and Base64 Data
Encodings", RFC 4648, DOI 10.17487/RFC4648, October 2006,
<https://www.rfc-editor.org/info/rfc4648>.
[RFC5988] Nottingham, M., "Web Linking", RFC 5988,
DOI 10.17487/RFC5988, October 2010,
<http://www.rfc-editor.org/info/rfc5988>.
<https://www.rfc-editor.org/info/rfc5988>.
[RFC6347] Rescorla, E. and N. Modadugu, "Datagram Transport Layer
Security Version 1.2", RFC 6347, DOI 10.17487/RFC6347,
January 2012, <http://www.rfc-editor.org/info/rfc6347>. <https://www.rfc-editor.org/info/rfc6347>.
[RFC7049] Bormann, C. and P. Hoffman, "Concise Binary Object
Representation (CBOR)", RFC 7049, DOI 10.17487/RFC7049,
October 2013, <http://www.rfc-editor.org/info/rfc7049>. <https://www.rfc-editor.org/info/rfc7049>.
[RFC7252] Shelby, Z., Hartke, K., and C. Bormann, "The Constrained
Application Protocol (CoAP)", RFC 7252,
DOI 10.17487/RFC7252, June 2014,
<http://www.rfc-editor.org/info/rfc7252>.
<https://www.rfc-editor.org/info/rfc7252>.
[RFC7641] Hartke, K., "Observing Resources in the Constrained
Application Protocol (CoAP)", RFC 7641,
DOI 10.17487/RFC7641, September 2015,
<http://www.rfc-editor.org/info/rfc7641>.
<https://www.rfc-editor.org/info/rfc7641>.
[RFC7959] Bormann, C. and Z. Shelby, Ed., "Block-Wise Transfers in
the Constrained Application Protocol (CoAP)", RFC 7959,
DOI 10.17487/RFC7959, August 2016,
<http://www.rfc-editor.org/info/rfc7959>.
14.2.
<https://www.rfc-editor.org/info/rfc7959>.
[RFC8075] Castellani, A., Loreto, S., Rahman, A., Fossati, T., and
E. Dijk, "Guidelines for Mapping Implementations: HTTP to
the Constrained Application Protocol (CoAP)", RFC 8075,
DOI 10.17487/RFC8075, February 2017,
<https://www.rfc-editor.org/info/rfc8075>.
[RFC8132] van der Stok, P., Bormann, C., and A. Sehgal, "PATCH and
FETCH Methods for the Constrained Application Protocol
(CoAP)", RFC 8132, DOI 10.17487/RFC8132, April 2017,
<https://www.rfc-editor.org/info/rfc8132>.
[RFC8152] Schaad, J., "CBOR Object Signing and Encryption (COSE)",
RFC 8152, DOI 10.17487/RFC8152, July 2017,
<https://www.rfc-editor.org/info/rfc8152>.
15.2. Informative References
[I-D.bormann-6lo-coap-802-15-ie]
Bormann, C., "Constrained Application Protocol (CoAP) over
IEEE 802.15.4 Information Element for IETF", draft-
bormann-6lo-coap-802-15-ie-00 (work in progress), April
2016.
[I-D.greevenbosch-appsawg-cbor-cddl]
Birkholz, H., Vigano, C., and C. Bormann, "CBOR "Concise data
definition language (CDDL): a notational convention to
express CBOR data structures", draft-greevenbosch-appsawg-
cbor-cddl-10
cbor-cddl-11 (work in progress), March July 2017.
[I-D.hartke-core-e2e-security-reqs]
Selander, G., Palombini, F., and K. Hartke, "Requirements
for CoAP End-To-End Security", draft-hartke-core-e2e-
security-reqs-02
security-reqs-03 (work in progress), January July 2017.
[I-D.ietf-ace-oauth-authz]
Seitz, L., Selander, G., Wahlstroem, E., Erdtman, S., and
H. Tschofenig, "Authentication and Authorization for
Constrained Environments (ACE)", draft-ietf-ace-oauth-
authz-06
authz-07 (work in progress), March August 2017.
[I-D.ietf-core-coap-tcp-tls]
Bormann, C., Lemay, S., Tschofenig, H., Hartke, K.,
Silverajan, B., and B. Raymor, "CoAP (Constrained
Application Protocol) over TCP, TLS, and WebSockets",
draft-ietf-core-coap-tcp-tls-09 (work in progress), May
2017.
[I-D.mattsson-core-coap-actuators]
Mattsson, J., Fornehed, J., Selander, G., and F.
Palombini, "Controlling Actuators with CoAP", draft-
mattsson-core-coap-actuators-02 (work in progress),
November 2016.
[I-D.seitz-ace-oscoap-profile]
Seitz, L., Gunnarsson, M., and F. Palombini, F., and M. Gunnarsson, "OSCOAP
profile of ACE", draft-seitz-ace-oscoap-profile-03 (work
in progress), June 2017.
[I-D.selander-ace-cose-ecdhe]
Selander, G., Mattsson, J., the Authentication and F. Palombini, "Ephemeral
Diffie-Hellman Over COSE (EDHOC)", draft-selander-ace-
cose-ecdhe-06 Authorization for
Constrained Environments Framework", draft-seitz-ace-
oscoap-profile-04 (work in progress), April July 2017.
[I-D.tiloca-core-multicast-oscoap]
Tiloca, M., Selander, G., and F. Palombini, "Secure group
communication for CoAP", draft-tiloca-core-multicast-
oscoap-01
oscoap-03 (work in progress), March July 2017.
[RFC3986] Berners-Lee, T., Fielding, R., and L. Masinter, "Uniform
Resource Identifier (URI): Generic Syntax", STD 66,
RFC 3986, DOI 10.17487/RFC3986, January 2005,
<https://www.rfc-editor.org/info/rfc3986>.
[RFC5869] Krawczyk, H. and P. Eronen, "HMAC-based Extract-and-Expand
Key Derivation Function (HKDF)", RFC 5869,
DOI 10.17487/RFC5869, May 2010,
<http://www.rfc-editor.org/info/rfc5869>.
<https://www.rfc-editor.org/info/rfc5869>.
[RFC7228] Bormann, C., Ersue, M., and A. Keranen, "Terminology for
Constrained-Node Networks", RFC 7228,
DOI 10.17487/RFC7228, May 2014,
<http://www.rfc-editor.org/info/rfc7228>.
<https://www.rfc-editor.org/info/rfc7228>.
[RFC7515] Jones, M., Bradley, J., and N. Sakimura, "JSON Web
Signature (JWS)", RFC 7515, DOI 10.17487/RFC7515, May
2015, <https://www.rfc-editor.org/info/rfc7515>.
Appendix A. Test Vectors
TODO: This section needs to be updated.
Appendix B. Examples
This section gives examples of OSCOAP. OSCORE. The message exchanges are
made, based on the assumption that there is a security context
established between client and server. For simplicity, these
examples only indicate the content of the messages without going into
detail of the COSE message format.
B.1. Secure Access to Sensor
This example targets the scenario in Section 3.1 of
[I-D.hartke-core-e2e-security-reqs] and illustrates a client
requesting the alarm status from a server.
Client Proxy Server
| | |
+----->|
+------>| | Code: 0.01 (GET) 0.02 (POST)
| GET POST | | Token: 0x8c
| | | Object-Security: [kid:5f, seq:42, [kid:5f]
| | | {Uri-Path:"alarm_status"}] Payload: [Partial IV:42,
| | | Payload: - {Code:0.01,
| | | Uri-Path:"alarm_status"}]
| | +----->| |
| +------>| Code: 0.01 (GET) 0.02 (POST)
| | GET POST | Token: 0x7b
| | | Object-Security: [kid:5f, seq:42, [kid:5f]
| | | Payload: [Partial IV:42,
| {Uri-Path:"alarm_status"}] | | {Code:0.01,
| | Payload: - | Uri-Path:"alarm_status"}]
| | | |<-----+
| |<------+ Code: 2.05 (Content) 2.04 (Changed)
| | 2.05 2.04 | Token: 0x7b
| | | Object-Security: -
| | | Payload: [{"OFF"}] [{Code:2.05, "OFF"}]
| | |
|<-----+
|<------+ | Code: 2.05 (Content) 2.04 (Changed)
| 2.05 2.04 | | Token: 0x8c
| | | Object-Security: -
| | | Payload: [{"OFF"}] [{Code:2.05, "OFF"}]
| | |
Figure 7: 9: Secure Access to Sensor. Square brackets [ ... ] indicate
a COSE object. Curly brackets { ... } indicate encrypted data.
Since the method (GET) doesn't allow payload, the Object-Security
option carries the COSE object as its value. Since the response code
(Content) allows payload, the COSE object is carried as the CoAP
payload.
The COSE header of the request contains an identifier (5f),
indicating which security context was used to protect the message and
a sequence number (42). The option Uri-Path ("alarm_status") and
payload ("OFF") are encrypted.
The server verifies that the sequence number has not been received
before. The client verifies that the response is bound to the
request.
B.2. Secure Subscribe to Sensor
This example targets the scenario in Section 3.2 of
[I-D.hartke-core-e2e-security-reqs] and illustrates a client
requesting subscription to a blood sugar measurement resource (GET
/glucose), first receiving the value 220 mg/dl and then a second
value 180 mg/dl.
Client Proxy Server
| | |
+----->| | Code: 0.01 (GET)
| GET | | Token: 0x83
| | | Observe: 0
| | | Object-Security: [kid:ca, seq:15,
| | | {Uri-Path:"glucose"}]
| | | Payload: -
| | |
| +----->| Code: 0.01 (GET)
| | GET | Token: 0xbe
| | | Observe: 0
| | | Object-Security: [kid:ca, seq:15,
| | | {Uri-Path:"glucose"}]
| | | Payload: -
| | |
| |<-----+ Code: 2.05 (Content)
| | 2.05 | Token: 0xbe
| | | Observe: 000032
| | | Object-Security: -
| | | Payload: [seq:32, {Content-Format:0, "220"}]
| | |
|<-----+ | Code: 2.05 (Content)
| 2.05 | | Token: 0x83
| | | Observe: 000032
| | | Object-Security: -
| | | Payload: [seq:32, {Content-Format:0, "220"}]
... ... ...
| | |
| |<-----+ Code: 2.05 (Content)
| | 2.05 | Token: 0xbe
| | | Observe: 000036
| | | Object-Security: -
| | | Payload: [seq:36, {Content-Format:0, "180"}]
| | |
|<-----+ | Code: 2.05 (Content)
| 2.05 | | Token: 0x83
| | | Observe: 000036
| | | Object-Security: -
| | | Payload: [seq:36, {Content-Format:0, "180"}]
| | |
Figure 8: Secure Subscribe to Sensor. Square brackets [ ... ]
indicate a COSE object. Curly brackets { ... } indicate encrypted
data.
Since the method (GET) doesn't allow payload, the Object-Security
option carries the COSE object as its value. Since the response code
(Content) allows payload, the COSE object is carried as the CoAP
payload.
The COSE header of the request contains an identifier (ca),
indicating the security context used to protect the message and a
Sequence Number (15). The COSE header of the responses contains
sequence numbers (32 and 36). The options Content-Format (0) and the
payload ("220" and "180"), are encrypted. The Observe option is
integrity protected. The shown Observe values (000032 and 000036)
are the ones that the client will see after OSCOAP processing.
The server verifies that the sequence number has not been received
before. The client verifies that the sequence number has not been
received before and that the responses are bound to the request.
Appendix C. Object Security of Content (OSCON)
TODO: This section needs to be updated.
OSCOAP protects message exchanges end-to-end between a certain client
and a certain server, targeting the security requirements for forward
proxy of [I-D.hartke-core-e2e-security-reqs]. In contrast, many use
cases require one and the same message to be protected for, and
verified by, multiple endpoints, see caching proxy section of
[I-D.hartke-core-e2e-security-reqs]. Those security requirements can
be addressed by protecting essentially the payload/content of
individual messages using the COSE format ([I-D.ietf-cose-msg]),
rather than the entire request/response message exchange. This is
referred to as Object Security of Content (OSCON).
OSCON transforms a CoAP message into an "OSCON message" in the
following way: the payload of the original CoAP message is wrapped by
a COSE object, which replaces the payload and this then becomes the
OSCON message.
The original payload shall be the plaintext/payload of the COSE
object. The 'protected' field of the COSE object 'Headers' shall
include the context identifier, both for requests and responses. If
the original CoAP message includes a Content-Format option, then the
COSE object shall include a protected 'content type' field, whose
value is set to the original message Content-Format value. The
Content-Format option of the OSCOON message shall be replaced with
"application/oscon" (Section 12)
The COSE object shall be protected (encrypted) and verified
(decrypted) as described in ([I-D.ietf-cose-msg]).
Most AEAD algorithms require a unique nonce for each message.
Sequence numbers for partial IV as specified for OSCOAP may be used
for replay protection as described in Section 6. The use of time
stamps in the COSE header parameter 'operation time'
[I-D.ietf-cose-msg] for freshness may be used.
OSCON shall not be used in cases where CoAP header fields (such as
Code or Version) or CoAP options need to be integrity protected or
encrypted. OSCON shall not be used in cases which require a secure
binding between request and response.
a COSE object. Curly brackets { ... } indicate encrypted data.
The scenarios request/response Codes are encrypted by OSCORE and only dummy
Codes (POST/Changed) are visible in Sections 3.3 - 3.5 of
[I-D.hartke-core-e2e-security-reqs] assume multiple recipients for a
particular content. In this case the use header of symmetric keys does not
provide data origin authentication. Therefore the COSE object should
in general be protected with a digital signature.
C.1. Overhead OSCON
In general there are four different kinds of modes that need to be
supported: message authentication code, digital signature,
authenticated encryption, and symmetric encryption + digital
signature. OSCORE message.
The use of digital signature is necessary for
applications with many legitimate recipients of a given message, option Uri-Path ("alarm_status") and
where data origin authentication is required.
To distinguish between these different cases, the tagged structures
of COSE payload ("OFF") are used (see Section 2 of [I-D.ietf-cose-msg]).
encrypted.
The sizes of COSE messages for selected algorithms are detailed in
this section.
The size of the header is shown separately from the size of the MAC/
signature. A 4-byte Context Identifier and a 1-byte Sequence Number
are request contains an identifier (5f),
indicating which security context was used throughout all examples, with these values:
o Cid: 0xa1534e3c
o Seq: 0xa3
For each scheme, we indicate to protect the fixed length of these two parameters
("Cid+Seq" column) message and of the Tag ("MAC"/"SIG"/"TAG").
a Partial IV (42).
The "Message
OH" column shows the total expansions of the CoAP message size, while server verifies that the "COSE OH" column is calculated from Partial IV has not been received before.
The client verifies that the previous columns.
Overhead incurring from CBOR encoding response is also included in bound to the COSE
overhead count.
To make it easier request.
B.2. Secure Subscribe to read, COSE objects are represented using CBOR's
diagnostic notation rather than a binary dump.
C.2. MAC Only Sensor
This example is based on HMAC-SHA256, with truncation to 8 bytes
(HMAC 256/64).
Since the key is implicitly known by the recipient, targets the
COSE_Mac0_Tagged structure is used (Section 6.2 of
[I-D.ietf-cose-msg]).
The object scenario in COSE encoding gives:
996( # COSE_Mac0_Tagged
[
h'a20444a1534e3c0641a3', # protected:
{04:h'a1534e3c',
06:h'a3'}
{}, # unprotected
h'', # payload
MAC # truncated 8-byte MAC
]
)
This COSE object encodes Section 3.2 of
[I-D.hartke-core-e2e-security-reqs] and illustrates a client
requesting subscription to a total size of 26 bytes.
Figure 9 summarizes these results.
+------------------+-----+-----+---------+------------+ blood sugar measurement resource (GET
/glucose), first receiving the value 220 mg/dl and then a second
value 180 mg/dl.
Client Proxy Server
| Structure | Tid | MAC
+------>| | COSE OH Code: 0.05 (FETCH)
| Message OH FETCH |
+------------------+-----+-----+---------+------------+ | COSE_Mac0_Tagged Token: 0x83
| 5 B | 8 B | 13 B Observe: 0
| 26 B |
+------------------+-----+-----+---------+------------+
Figure 9: Message overhead for a 5-byte Tid using HMAC 256/64
C.3. Signature Only
This example is based on ECDSA, with a signature of 64 bytes.
Since only one signature is used, the COSE_Sign1_Tagged structure is
used (Section 4.2 of [I-D.ietf-cose-msg]).
The object in COSE encoding gives:
997( # COSE_Sign1_Tagged
[
h'a20444a1534e3c0641a3', # protected:
{04:h'a1534e3c',
06:h'a3'}
{}, # unprotected
h'', # payload
SIG # 64-byte signature
]
)
This COSE object encodes to a total size of 83 bytes.
Figure 10 summarizes these results.
+-------------------+-----+------+---------+------------+ | Structure Object-Security: [kid:ca]
| Tid | SIG | COSE OH Payload: [Partial IV:15,
| Message OH |
+-------------------+-----+------+---------+------------+ | COSE_Sign1_Tagged {Code:0.01,
| 5 B | 64 B | 14 B Uri-Path:"glucose"}]
| | |
| +------>| Code: 0.05 (FETCH)
| | FETCH | Token: 0xbe
| | | Observe: 0
| | | Object-Security: [kid:ca]
| | | Payload: [Partial IV:15,
| | | {Code:0.01,
| | | Uri-Path:"glucose"}]
| | |
| |<------+ Code: 2.05 (Content)
| | 2.05 | Token: 0xbe
| | | Observe: 7
| | | Object-Security: -
| | | Payload: [Partial IV:32,
| | | {Code:2.05,
| | | Content-Format:0, "220"}]
| | |
|<------+ | Code: 2.05 (Content)
| 2.05 | | Token: 0x83
| | | Observe: 7
| | | Object-Security: -
| | | Payload: [Partial IV:32,
| 83 bytes |
+-------------------+-----+------+---------+------------+
Figure 10: Message overhead for a 5-byte Tid using 64 byte ECDSA
signature.
C.4. Authenticated Encryption with Additional Data (AEAD)
This example is based on AES-CCM with the Tag truncated to 8 bytes.
Since the key is implicitly known by the recipient, the
COSE_Encrypt0_Tagged structure is used (Section 5.2 of
[I-D.ietf-cose-msg]).
The object in COSE encoding gives:
993( # COSE_Encrypt0_Tagged
[
h'a20444a1534e3c0641a3', # protected:
{04:h'a1534e3c',
06:h'a3'}
{}, # unprotected
ciphertext # ciphertext including truncated 8-byte TAG
]
)
This COSE object encodes to a total size of 25 bytes.
Figure 11 summarizes these results.
+----------------------+-----+-----+---------+------------+ | Structure {Code:2.05,
| Tid | TAG | COSE OH Content-Format:0, "220"}]
... ... ...
| Message OH |
+----------------------+-----+-----+---------+------------+ | COSE_Encrypt0_Tagged
| 5 B |<------+ Code: 2.05 (Content)
| | 2.05 | Token: 0xbe
| | | Observe: 8 B
| 12 B | 25 bytes |
+----------------------+-----+-----+---------+------------+
Figure 11: Message overhead for a 5-byte Tid using AES_128_CCM_8.
C.5. Symmetric Encryption with Asymmetric Signature (SEAS)
This example is based on AES-CCM and ECDSA with 64 bytes signature.
The same assumption on the security context as in Appendix C.4. COSE
defines the field 'counter signature w/o headers' that is used here
to sign a COSE_Encrypt0_Tagged message (see Section 3 of
[I-D.ietf-cose-msg]).
The object in COSE encoding gives:
993( # COSE_Encrypt0_Tagged
[
h'a20444a1534e3c0641a3', # protected:
{04:h'a1534e3c',
06:h'a3'}
{9:SIG}, # unprotected:
09: 64 bytes signature
ciphertext # ciphertext including truncated 8-byte TAG
]
)
This COSE object encodes to a total size of 92 bytes.
Figure 12 summarizes these results.
+----------------------+-----+-----+------+---------+------------+ Object-Security: -
| Structure | Tid | TAG Payload: [Partial IV:36,
| SIG | COSE OH | Message OH {Code:2.05,
|
+----------------------+-----+-----+------+---------+------------+ | COSE_Encrypt0_Tagged | 5 B Content-Format:0, "180"}]
| | |
|<------+ | Code: 2.05 (Content)
| 2.05 | | Token: 0x83
| | | Observe: 8 B
| 64 B | 15 B | 92 B Object-Security: -
| | | Payload: [Partial IV:36,
| | | {Code:2.05,
| | | Content-Format:0, "180"}]
| | |
+----------------------+-----+-----+------+---------+------------+
Figure 12: Message overhead for 10: Secure Subscribe to Sensor. Square brackets [ ... ]
indicate a 5-byte Tid using AES-CCM
countersigned with ECDSA. COSE object. Curly brackets { ... } indicate encrypted
data.
The request/response Codes are encrypted by OSCORE and only dummy
Codes (FETCH/Content) are visible in the header of the OSCORE
message. The options Content-Format (0) and the payload ("220" and
"180"), are encrypted.
The COSE header of the request contains an identifier (ca),
indicating the security context used to protect the message and a
Partial IV (15). The COSE headers of the responses contains Partial
IVs (32 and 36).
The server verifies that the Partial IV has not been received before.
The client verifies that the responses are bound to the request and
that the Partial IVs are greater than any Partial IV previously
received in a response bound to the request.
Authors' Addresses
Goeran Selander
Ericsson AB
Email: [email protected]
John Mattsson
Ericsson AB
Email: [email protected]
Francesca Palombini
Ericsson AB
Email: [email protected]
Ludwig Seitz
SICS Swedish ICT
Email: [email protected]
|
{
"url": "https://tools.ietf.org/wg/core/draft-ietf-core-object-security/draft-ietf-core-object-security-05-from-04.wdiff.html",
"source_domain": "tools.ietf.org",
"snapshot_id": "crawl=CC-MAIN-2020-16",
"warc_metadata": {
"Content-Length": "221013",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:PLYZPDE3A55JAOLRQCRF5CC6HJBOVSA2",
"WARC-Concurrent-To": "<urn:uuid:e91ec436-1781-43b9-b5f4-7a696bd33723>",
"WARC-Date": "2020-04-07T04:50:54Z",
"WARC-IP-Address": "64.170.98.42",
"WARC-Identified-Payload-Type": "text/html",
"WARC-Payload-Digest": "sha1:LFDK3DUF6IFTC7YT6RQVFGOJ76IBUHLJ",
"WARC-Record-ID": "<urn:uuid:c8aaedfb-e8cc-4865-a216-b2df97443427>",
"WARC-Target-URI": "https://tools.ietf.org/wg/core/draft-ietf-core-object-security/draft-ietf-core-object-security-05-from-04.wdiff.html",
"WARC-Truncated": null,
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:1f0f4a44-7a0a-4c4f-9c12-f68033a2b916>"
},
"warc_info": "isPartOf: CC-MAIN-2020-16\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for March/April 2020\r\noperator: Common Crawl Admin ([email protected])\r\nhostname: ip-10-67-67-235.ec2.internal\r\nsoftware: Apache Nutch 1.16 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.1-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: http://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/"
}
|
{
"line_start_idx": [
0,
1,
74,
147,
220,
301,
374,
447,
515,
588,
589,
627,
727,
781,
782,
791,
792,
875,
914,
967,
1037,
1107,
1157,
1234,
1308,
1390,
1483,
1551,
1621,
1622,
1642,
1643,
1708,
1744,
1745,
1814,
1880,
1952,
2059,
2060,
2133,
2205,
2271,
2333,
2334,
2395,
2396,
2413,
2414,
2481,
2524,
2525,
2590,
2631,
2673,
2741,
2805,
2878,
2950,
3020,
3087,
3131,
3132,
3150,
3151,
3224,
3301,
3378,
3451,
3524,
3617,
3690,
3768,
3841,
3923,
4008,
4085,
4173,
4246,
4323,
4400,
4492,
4529,
4606,
4692,
4745,
4802,
4860,
4933,
5010,
5087,
5164,
5241,
5318,
5403,
5487,
5570,
5621,
5666,
5731,
5774,
5827,
5881,
5928,
5985,
6048,
6103,
6168,
6217,
6288,
6339,
6396,
6439,
6504,
6534,
6607,
6644,
6717,
6768,
6829,
6868,
6935,
6964,
7037,
7076,
7147,
7191,
7258,
7319,
7364,
7422,
7465,
7519,
7576,
7622,
7691,
7763,
7836,
7913,
7914,
7931,
7932,
8000,
8068,
8141,
8174,
8240,
8283,
8338,
8413,
8485,
8557,
8653,
8731,
8786,
8787,
8864,
8897,
8983,
9001,
9079,
9148,
9218,
9291,
9364,
9433,
9502,
9563,
9605,
9676,
9743,
9802,
9892,
9952,
9999,
10073,
10142,
10143,
10174,
10175,
10248,
10344,
10473,
10510,
10530,
10632,
10703,
10782,
10860,
10935,
10986,
10987,
10997,
10998,
11060,
11095,
11165,
11238,
11312,
11406,
11476,
11527,
11598,
11671,
11743,
11817,
11897,
11987,
12085,
12171,
12258,
12325,
12434,
12514,
12559,
12560,
12625,
12688,
12769,
12857,
12953,
13016,
13096,
13158,
13238,
13326,
13433,
13495,
13558,
13620,
13682,
13683,
13729,
13730,
13757,
13758,
13830,
13925,
13948,
14050,
14132,
14212,
14268,
14309,
14380,
14429,
14430,
14496,
14507,
14508,
14581,
14634,
14714,
14830,
14900,
14969,
15036,
15091,
15092,
15110,
15111,
15182,
15254,
15322,
15391,
15414,
15415,
15482,
15554,
15615,
15685,
15699,
15700,
15773,
15807,
15886,
15887,
15923,
15924,
15999,
16022,
16103,
16170,
16237,
16264,
16265,
16337,
16352,
16353,
16426,
16489,
16567,
16640,
16713,
16781,
16853,
16926,
16994,
16995,
17051,
17052,
17099,
17100,
17168,
17237,
17309,
17382,
17454,
17455,
17525,
17595,
17664,
17679,
17680,
17751,
17818,
17889,
17927,
17928,
18026,
18091,
18121,
18202,
18254,
18320,
18398,
18462,
18507,
18508,
18582,
18622,
18623,
18700,
18751,
18833,
18873,
18874,
19030,
19103,
19160,
19230,
19277,
19356,
19357,
19385,
19465,
19532,
19602,
19670,
19740,
19807,
19824,
19825,
19895,
19967,
20037,
20106,
20157,
20158,
20183,
20184,
20253,
20323,
20394,
20448,
20449,
20581,
20652,
20724,
20794,
20824,
20825,
20859,
20860,
20932,
21013,
21082,
21122,
21123,
21194,
21265,
21335,
21406,
21414,
21415,
21485,
21553,
21626,
21697,
21768,
21841,
21914,
21957,
21958,
22016,
22017,
22076,
22135,
22207,
22266,
22324,
22383,
22437,
22488,
22546,
22604,
22660,
22733,
22795,
22866,
22936,
23016,
23095,
23146,
23197,
23248,
23299,
23300,
23364,
23365,
23422,
23423,
23521,
23592,
23611,
23612,
23682,
23737,
23738,
23806,
23879,
23940,
23941,
24011,
24077,
24135,
24136,
24193,
24194,
24308,
24356,
24401,
24459,
24460,
24465,
24466,
24554,
24591,
24592,
24686,
24769,
24841,
24863,
24864,
24941,
25009,
25073,
25131,
25132,
25203,
25303,
25338,
25407,
25456,
25457,
25517,
25518,
25583,
25689,
25719,
25720,
25791,
25837,
25923,
25995,
26017,
26018,
26097,
26169,
26233,
26291,
26292,
26385,
26401,
26417,
26418,
26491,
26561,
26598,
26599,
26699,
26760,
26793,
26864,
26929,
26962,
26963,
27030,
27103,
27175,
27247,
27318,
27392,
27449,
27450,
27513,
27514,
27585,
27655,
27671,
27672,
27692,
27693,
27709,
27710,
27729,
27730,
27801,
27866,
27894,
27895,
27928,
27929,
28033,
28034,
28052,
28053,
28090,
28091,
28127,
28128,
28161,
28162,
28196,
28197,
28270,
28291,
28292,
28358,
28422,
28494,
28531,
28603,
28727,
28825,
28890,
28957,
28988,
28989,
29067,
29068,
29135,
29201,
29291,
29359,
29432,
29448,
29449,
29499,
29500,
29510,
29511,
29558,
29559,
29607,
29608,
29650,
29651,
29666,
29699,
29720,
29743,
29766,
29774,
29775,
29783,
29784,
29794,
29795,
29837,
29838,
29873,
29940,
29980,
29981,
30009,
30010,
30076,
30097,
30098,
30188,
30212,
30288,
30302,
30303,
30354,
30355,
30427,
30500,
30578,
30643,
30676,
30677,
30731,
30732,
30798,
30865,
30960,
31016,
31059,
31126,
31199,
31232,
31316,
31389,
31410,
31497,
31567,
31637,
31690,
31691,
31763,
31832,
31904,
31942,
31943,
32011,
32092,
32161,
32162,
32196,
32197,
32207,
32208,
32280,
32401,
32465,
32532,
32604,
32677,
32742,
32808,
32821,
32822,
32840,
32923,
32968,
33038,
33039,
33089,
33090,
33134,
33135,
33209,
33278,
33321,
33381,
33382,
33478,
33495,
33622,
33741,
33814,
33876,
33888,
33983,
33984,
34024,
34107,
34191,
34274,
34293,
34294,
34358,
34436,
34494,
34495,
34545,
34546,
34620,
34621,
34671,
34672,
34766,
34785,
34867,
34920,
34988,
35070,
35122,
35183,
35253,
35331,
35344,
35353,
35354,
35439,
35512,
35577,
35578,
35597,
35598,
35668,
35711,
35712,
35780,
35832,
35869,
35870,
35947,
35981,
35982,
36051,
36118,
36170,
36171,
36189,
36190,
36260,
36321,
36371,
36378,
36379,
36476,
36549,
36635,
36690,
36768,
36806,
36807,
36843,
36844,
36910,
36978,
37053,
37054,
37130,
37202,
37289,
37355,
37366,
37367,
37438,
37479,
37566,
37584,
37689,
37782,
37864,
37940,
38022,
38089,
38090,
38118,
38119,
38138,
38139,
38147,
38148,
38229,
38299,
38369,
38440,
38512,
38582,
38592,
38593,
38731,
38767,
38806,
38882,
38935,
39008,
39009,
39061,
39113,
39165,
39217,
39269,
39321,
39373,
39427,
39479,
39531,
39583,
39635,
39687,
39739,
39791,
39843,
39895,
39947,
39999,
40051,
40103,
40155,
40207,
40208,
40226,
40227,
40305,
40346,
40398,
40439,
40468,
40469,
40525,
40526,
40557,
40558,
40673,
40701,
40771,
40865,
40874,
40958,
41026,
41076,
41077,
41105,
41106,
41128,
41129,
41144,
41145,
41229,
41275,
41346,
41416,
41494,
41570,
41620,
41621,
41702,
41781,
41782,
41796,
41900,
41928,
41929,
41995,
42052,
42053,
42075,
42076,
42149,
42186,
42187,
42264,
42360,
42428,
42444,
42517,
42585,
42586,
42638,
42705,
42723,
42724,
42799,
42823,
42868,
42869,
42980,
42987,
43026,
43027,
43100,
43101,
43125,
43126,
43206,
43306,
43393,
43394,
43411,
43469,
43470,
43488,
43489,
43501,
43502,
43614,
43692,
43763,
43775,
43776,
43844,
43927,
43948,
43949,
44083,
44155,
44231,
44316,
44339,
44400,
44422,
44423,
44483,
44484,
44526,
44588,
44605,
44606,
44634,
44635,
44705,
44720,
44780,
44807,
44888,
44957,
45039,
45112,
45130,
45202,
45277,
45356,
45408,
45409,
45454,
45455,
45487,
45488,
45556,
45626,
45697,
45793,
45871,
45938,
46028,
46101,
46129,
46130,
46199,
46267,
46338,
46377,
46378,
46475,
46490,
46559,
46630,
46696,
46767,
46814,
46815,
46913,
46928,
46990,
47032,
47033,
47044,
47045,
47077,
47078,
47133,
47134,
47176,
47244,
47313,
47350,
47423,
47501,
47515,
47516,
47586,
47687,
47760,
47827,
47908,
47974,
48047,
48054,
48115,
48188,
48244,
48312,
48408,
48409,
48492,
48561,
48637,
48708,
48800,
48873,
48902,
48903,
48927,
48928,
49000,
49154,
49208,
49222,
49223,
49296,
49355,
49427,
49471,
49513,
49514,
49534,
49535,
49607,
49679,
49750,
49751,
49857,
49895,
49916,
49917,
49935,
49936,
50008,
50080,
50094,
50095,
50168,
50215,
50216,
50282,
50348,
50419,
50466,
50467,
50536,
50605,
50674,
50736,
50803,
50871,
50942,
51011,
51080,
51091,
51092,
51164,
51203,
51204,
51256,
51310,
51311,
51339,
51340,
51371,
51372,
51396,
51397,
51425,
51426,
51450,
51451,
51510,
51579,
51645,
51717,
51718,
51757,
51758,
51821,
51822,
51840,
51841,
51909,
51980,
52052,
52108,
52130,
52131,
52216,
52247,
52302,
52347,
52408,
52409,
52464,
52510,
52603,
52604,
52676,
52744,
52745,
52761,
52860,
52945,
52966,
53030,
53122,
53162,
53239,
53306,
53371,
53436,
53468,
53469,
53536,
53604,
53661,
53662,
53727,
53781,
53852,
53925,
54003,
54073,
54152,
54173,
54271,
54286,
54287,
54305,
54306,
54375,
54442,
54471,
54472,
54496,
54497,
54589,
54658,
54734,
54764,
54765,
54834,
54900,
54961,
55028,
55061,
55062,
55167,
55236,
55323,
55394,
55467,
55532,
55596,
55655,
55656,
55715,
55798,
55815,
55816,
55898,
55962,
56011,
56077,
56122,
56123,
56143,
56144,
56216,
56288,
56348,
56399,
56400,
56495,
56608,
56659,
56737,
56751,
56752,
56824,
56902,
56980,
57025,
57052,
57053,
57082,
57083,
57153,
57246,
57311,
57382,
57435,
57436,
57508,
57547,
57548,
57600,
57601,
57655,
57656,
57684,
57685,
57716,
57717,
57741,
57742,
57770,
57771,
57795,
57796,
57855,
57924,
57990,
58062,
58063,
58102,
58103,
58147,
58148,
58212,
58283,
58356,
58399,
58400,
58420,
58421,
58493,
58565,
58615,
58682,
58759,
58834,
58835,
58920,
58943,
59028,
59097,
59118,
59202,
59233,
59234,
59293,
59326,
59327,
59393,
59488,
59535,
59625,
59697,
59769,
59838,
59909,
59977,
59991,
59992,
60059,
60130,
60172,
60204,
60205,
60276,
60290,
60291,
60329,
60330,
60370,
60371,
60440,
60539,
60568,
60654,
60724,
60803,
60890,
60935,
60936,
61006,
61078,
61147,
61217,
61255,
61256,
61329,
61394,
61468,
61549,
61550,
61607,
61642,
61643,
61655,
61656,
61727,
61798,
61867,
61938,
62008,
62022,
62023,
62095,
62162,
62234,
62248,
62249,
62306,
62367,
62428,
62489,
62550,
62612,
62673,
62734,
62795,
62856,
62913,
62914,
62967,
62968,
62984,
62985,
63053,
63084,
63085,
63169,
63190,
63191,
63277,
63355,
63426,
63490,
63491,
63564,
63618,
63619,
63687,
63757,
63828,
63883,
63954,
64001,
64072,
64093,
64113,
64114,
64165,
64166,
64171,
64172,
64208,
64209,
64269,
64270,
64290,
64308,
64319,
64341,
64363,
64380,
64406,
64424,
64450,
64471,
64476,
64477,
64487,
64488,
64577,
64594,
64595,
64666,
64707,
64708,
64781,
64873,
64924,
64987,
65038,
65074,
65075,
65145,
65187,
65188,
65261,
65296,
65297,
65381,
65426,
65427,
65490,
65559,
65627,
65687,
65688,
65749,
65750,
65770,
65771,
65793,
65794,
65894,
65959,
66024,
66097,
66103,
66121,
66122,
66193,
66262,
66291,
66292,
66320,
66321,
66394,
66460,
66532,
66604,
66673,
66674,
66756,
66835,
66859,
66928,
66997,
67066,
67110,
67111,
67135,
67136,
67207,
67240,
67241,
67257,
67258,
67327,
67400,
67472,
67559,
67621,
67622,
67694,
67764,
67836,
67905,
67950,
67951,
68017,
68095,
68143,
68167,
68168,
68192,
68193,
68264,
68350,
68382,
68505,
68578,
68670,
68737,
68799,
68872,
68942,
68980,
69047,
69115,
69210,
69265,
69299,
69348,
69349,
69395,
69396,
69419,
69420,
69489,
69568,
69569,
69592,
69707,
69726,
69828,
69899,
69969,
70063,
70134,
70187,
70188,
70258,
70333,
70404,
70463,
70464,
70503,
70504,
70574,
70643,
70712,
70781,
70852,
70876,
70877,
70949,
71020,
71063,
71151,
71226,
71242,
71243,
71249,
71250,
71354,
71426,
71486,
71487,
71521,
71560,
71561,
71585,
71586,
71669,
71718,
71719,
71804,
71900,
71926,
71997,
72067,
72145,
72239,
72309,
72310,
72348,
72418,
72490,
72557,
72629,
72700,
72722,
72765,
72766,
72788,
72789,
72872,
72941,
72942,
73012,
73083,
73151,
73213,
73317,
73365,
73451,
73535,
73610,
73674,
73739,
73766,
73843,
73873,
73960,
73974,
73975,
73987,
73988,
74044,
74045,
74154,
74258,
74259,
74328,
74441,
74513,
74545,
74614,
74671,
74672,
74687,
74688,
74718,
74784,
74852,
74867,
74868,
74968,
74969,
74998,
74999,
75084,
75198,
75271,
75343,
75361,
75362,
75433,
75504,
75574,
75647,
75666,
75667,
75683,
75684,
75754,
75824,
75895,
75943,
75944,
76015,
76088,
76146,
76147,
76180,
76181,
76240,
76305,
76370,
76441,
76510,
76577,
76623,
76624,
76639,
76640,
76669,
76670,
76743,
76772,
76773,
76789,
76818,
76819,
76891,
76892,
76958,
76976,
76977,
77077,
77104,
77190,
77262,
77284,
77285,
77356,
77397,
77398,
77475,
77534,
77535,
77608,
77675,
77692,
77693,
77738,
77739,
77767,
77768,
77838,
77876,
77877,
77947,
78027,
78028,
78124,
78179,
78256,
78328,
78397,
78398,
78462,
78534,
78601,
78674,
78738,
78809,
78877,
78899,
78900,
78973,
79038,
79108,
79144,
79145,
79210,
79281,
79348,
79415,
79456,
79457,
79528,
79595,
79661,
79726,
79738,
79739,
79745,
79746,
79850,
79882,
79883,
79889,
79890,
79957,
79976,
79977,
79992,
79993,
80069,
80121,
80182,
80183,
80189,
80190,
80247,
80248,
80316,
80389,
80452,
80518,
80537,
80538,
80612,
80647,
80648,
80654,
80655,
80726,
80797,
80870,
80910,
80911,
80985,
81046,
81103,
81104,
81110,
81111,
81182,
81183,
81213,
81214,
81285,
81375,
81444,
81517,
81587,
81648,
81649,
81716,
81743,
81744,
81810,
81828,
81829,
81868,
81869,
81940,
82009,
82111,
82112,
82187,
82245,
82297,
82352,
82424,
82479,
82480,
82551,
82592,
82593,
82670,
82722,
82723,
82795,
82796,
82825,
82826,
82897,
82935,
82936,
83006,
83074,
83108,
83109,
83178,
83250,
83297,
83298,
83364,
83438,
83468,
83581,
83651,
83719,
83763,
83764,
83776,
83788,
83789,
83880,
83947,
83979,
83980,
84025,
84087,
84088,
84155,
84174,
84175,
84190,
84191,
84222,
84223,
84305,
84370,
84441,
84514,
84515,
84596,
84701,
84753,
84805,
84806,
84825,
84826,
84883,
84884,
84952,
85021,
85083,
85084,
85150,
85185,
85258,
85259,
85270,
85271,
85342,
85413,
85486,
85526,
85527,
85604,
85660,
85690,
85741,
85742,
85815,
85867,
85868,
85874,
85875,
85947,
85948,
86016,
86087,
86159,
86232,
86270,
86271,
86302,
86303,
86373,
86446,
86538,
86611,
86680,
86747,
86827,
86901,
86973,
86986,
86987,
87038,
87039,
87123,
87165,
87166,
87234,
87304,
87375,
87418,
87489,
87490,
87544,
87545,
87630,
87676,
87677,
87756,
87847,
87919,
87920,
87992,
88068,
88069,
88168,
88238,
88270,
88271,
88315,
88363,
88404,
88405,
88488,
88561,
88595,
88596,
88667,
88708,
88709,
88818,
88857,
88858,
88909,
88910,
88977,
89032,
89033,
89063,
89111,
89175,
89206,
89207,
89263,
89295,
89296,
89354,
89433,
89491,
89564,
89632,
89695,
89766,
89822,
89880,
89881,
89977,
89978,
89993,
89994,
90071,
90094,
90095,
90120,
90121,
90144,
90145,
90150,
90158,
90183,
90218,
90223,
90224,
90277,
90315,
90316,
90338,
90339,
90384,
90385,
90451,
90452,
90523,
90560,
90561,
90626,
90692,
90693,
90746,
90766,
90767,
90811,
90812,
90835,
90836,
90841,
90849,
90856,
90891,
90900,
90901,
90974,
91001,
91002,
91051,
91052,
91071,
91072,
91143,
91215,
91288,
91356,
91428,
91496,
91497,
91510,
91511,
91583,
91648,
91719,
91742,
91743,
91791,
91859,
91930,
91995,
92062,
92063,
92090,
92091,
92158,
92181,
92182,
92207,
92208,
92231,
92232,
92237,
92245,
92270,
92305,
92310,
92311,
92367,
92409,
92431,
92432,
92441,
92442,
92485,
92486,
92499,
92500,
92533,
92534,
92602,
92603,
92610,
92611,
92662,
92663,
92686,
92687,
92692,
92700,
92733,
92768,
92773,
92774,
92833,
92875,
92876,
92898,
92899,
92908,
92909,
92952,
92953,
92969,
92970,
93000,
93001,
93055,
93073,
93074,
93090,
93091,
93162,
93230,
93302,
93329,
93330,
93374,
93375,
93398,
93399,
93404,
93412,
93419,
93454,
93459,
93460,
93513,
93533,
93534,
93556,
93557,
93589,
93590,
93617,
93618,
93683,
93684,
93725,
93726,
93749,
93750,
93755,
93763,
93779,
93814,
93819,
93820,
93870,
93902,
93903,
93925,
93926,
93958,
93959,
93989,
93990,
94058,
94059,
94075,
94076,
94147,
94210,
94282,
94351,
94421,
94432,
94443,
94444,
94516,
94589,
94661,
94684,
94685,
94714,
94715,
94749,
94750,
94823,
94894,
94966,
95037,
95062,
95063,
95100,
95101,
95211,
95244,
95315,
95357,
95420,
95463,
95464,
95542,
95598,
95691,
95762,
95837,
95867,
95955,
95975,
96067,
96121,
96151,
96152,
96245,
96282,
96296,
96297,
96385,
96441,
96442,
96516,
96585,
96603,
96674,
96675,
96713,
96714,
96766,
96833,
96834,
96862,
96931,
96995,
97104,
97116,
97117,
97185,
97204,
97277,
97384,
97457,
97493,
97578,
97622,
97681,
97778,
97891,
97970,
98038,
98103,
98171,
98244,
98274,
98329,
98403,
98423,
98424,
98436,
98437,
98489,
98490,
98541,
98564,
98565,
98618,
98619,
98692,
98693,
98733,
98734,
98802,
98828,
98876,
98877,
98947,
99021,
99022,
99049,
99075,
99126,
99127,
99161,
99185,
99186,
99202,
99230,
99285,
99286,
99327,
99328,
99347,
99375,
99427,
99428,
99499,
99500,
99519,
99554,
99555,
99647,
99715,
99788,
99848,
99869,
99917,
99918,
99984,
100079,
100122,
100192,
100253,
100277,
100278,
100347,
100417,
100497,
100582,
100597,
100645,
100646,
100684,
100685,
100764,
100830,
100900,
100967,
101050,
101089,
101174,
101200,
101299,
101375,
101402,
101420,
101421,
101433,
101434,
101489,
101490,
101517,
101557,
101558,
101631,
101632,
101670,
101671,
101699,
101733,
101761,
101814,
101815,
101871,
101946,
101947,
101985,
102013,
102063,
102064,
102107,
102108,
102129,
102159,
102213,
102214,
102257,
102258,
102276,
102306,
102363,
102364,
102419,
102420,
102438,
102478,
102479,
102496,
102567,
102664,
102691,
102789,
102832,
102903,
102996,
103052,
103053,
103130,
103177,
103178,
103207,
103208,
103281,
103351,
103427,
103498,
103531,
103598,
103683,
103749,
103838,
103908,
103977,
104073,
104168,
104212,
104284,
104317,
104318,
104380,
104437,
104529,
104559,
104560,
104621,
104713,
104820,
104883,
104915,
105001,
105073,
105144,
105187,
105259,
105360,
105423,
105499,
105514,
105515,
105529,
105602,
105673,
105749,
105807,
105877,
105981,
106062,
106130,
106227,
106228,
106307,
106379,
106415,
106488,
106562,
106611,
106705,
106783,
106808,
106875,
106972,
106973,
107001,
107002,
107057,
107106,
107201,
107273,
107329,
107355,
107431,
107494,
107552,
107553,
107616,
107688,
107754,
107822,
107893,
107925,
107926,
107995,
108067,
108139,
108206,
108278,
108351,
108424,
108494,
108565,
108595,
108596,
108624,
108625,
108697,
108765,
108836,
108843,
108921,
108990,
109010,
109011,
109078,
109145,
109171,
109172,
109244,
109312,
109345,
109346,
109425,
109495,
109578,
109602,
109603,
109628,
109629,
109683,
109684,
109709,
109811,
109812,
109848,
109849,
109888,
109958,
110050,
110123,
110186,
110249,
110322,
110394,
110466,
110533,
110605,
110674,
110743,
110816,
110889,
110959,
111026,
111027,
111052,
111053,
111118,
111176,
111177,
111213,
111214,
111280,
111293,
111294,
111356,
111418,
111480,
111542,
111604,
111605,
111623,
111624,
111658,
111659,
111775,
111788,
111789,
111819,
111820,
111847,
111848,
111880,
111881,
111913,
111914,
111953,
111954,
112019,
112020,
112064,
112065,
112097,
112098,
112168,
112238,
112308,
112392,
112393,
112456,
112457,
112504,
112505,
112536,
112537,
112567,
112568,
112600,
112601,
112643,
112644,
112710,
112766,
112767,
112797,
112798,
112832,
112833,
112893,
112894,
112934,
112935,
113006,
113026,
113027,
113094,
113161,
113228,
113295,
113362,
113363,
113384,
113385,
113434,
113504,
113505,
113526,
113527,
113599,
113670,
113740,
113787,
113788,
113859,
113921,
113922,
113926,
113927,
113943,
113944,
113950,
113951,
113979,
113980,
114021,
114091,
114160,
114205,
114206,
114229,
114300,
114372,
114373,
114439,
114492,
114540,
114596,
114653,
114654,
114720,
114792,
114849,
114850,
114905,
114955,
115011,
115068,
115069,
115139,
115208,
115321,
115322,
115387,
115457,
115570,
115571,
115642,
115696,
115743,
115799,
115856,
115857,
115923,
115977,
116029,
116085,
116142,
116143,
116214,
116284,
116333,
116389,
116390,
116396,
116453,
116454,
116525,
116597,
116667,
116718,
116775,
116776,
116847,
116916,
116983,
117040,
117041,
117112,
117169,
117226,
117227,
117257,
117258,
117294,
117367,
117433,
117503,
117523,
117524,
117564,
117640,
117709,
117782,
117809,
117873,
117874,
117913,
117985,
118053,
118084,
118154,
118155,
118185,
118257,
118324,
118393,
118416,
118478,
118479,
118511,
118577,
118641,
118709,
118779,
118799,
118800,
118838,
118901,
118968,
119034,
119063,
119064,
119098,
119188,
119259,
119298,
119299,
119332,
119422,
119491,
119537,
119605,
119674,
119675,
119713,
119785,
119853,
119877,
119938,
119939,
120010,
120076,
120136,
120193,
120194,
120267,
120324,
120370,
120426,
120483,
120484,
120555,
120607,
120653,
120709,
120766,
120767,
120832,
120900,
120963,
120964,
120990,
120991,
121034,
121035,
121057,
121058,
121135,
121201,
121266,
121339,
121377,
121378,
121408,
121409,
121464,
121528,
121574,
121575,
121603,
121629,
121647,
121713,
121765,
121834,
121938,
122012,
122082,
122122,
122188,
122240,
122309,
122368,
122468,
122557,
122597,
122670,
122723,
122768,
122842,
122868,
122886,
122959,
123012,
123057,
123131,
123157,
123158,
123233,
123303,
123304,
123373,
123446,
123514,
123526,
123527,
123590,
123663,
123732,
123766,
123767,
123837,
123903,
123915,
123916,
123949,
123950,
124005,
124069,
124139,
124207,
124227,
124228,
124251,
124271,
124319,
124361,
124400,
124454,
124514,
124553,
124573,
124621,
124663,
124702,
124756,
124816,
124855,
124875,
124927,
124969,
125013,
125052,
125125,
125145,
125197,
125239,
125283,
125322,
125395,
125416,
125436,
125488,
125530,
125574,
125613,
125686,
125706,
125758,
125800,
125844,
125883,
125956,
125976,
125977,
126046,
126117,
126158,
126159,
126228,
126301,
126369,
126381,
126382,
126445,
126514,
126582,
126655,
126723,
126793,
126859,
126860,
126930,
127000,
127068,
127069,
127117,
127118,
127161,
127162,
127235,
127308,
127380,
127447,
127512,
127585,
127650,
127718,
127788,
127842,
127843,
127909,
127982,
128053,
128071,
128072,
128139,
128208,
128280,
128352,
128421,
128488,
128558,
128594,
128595,
128658,
128712,
128713,
128778,
128849,
128918,
128974,
129024,
129025,
129095,
129165,
129236,
129277,
129347,
129348,
129427,
129488,
129560,
129639,
129712,
129765,
129766,
129787,
129788,
129858,
129920,
129984,
130014,
130063,
130168,
130217,
130218,
130289,
130365,
130379,
130380,
130450,
130467,
130468,
130540,
130612,
130656,
130746,
130747,
130769,
130770,
130786,
130787,
130871,
130937,
130959,
130960,
130976,
131151,
131201,
131202,
131290,
131309,
131310,
131340,
131341,
131415,
131465,
131466,
131488,
131489,
131557,
131575,
131576,
131643,
131697,
131722,
131723,
131770,
131771,
131831,
131847,
131901,
131961,
132015,
132070,
132121,
132185,
132201,
132215,
132216,
132259,
132323,
132379,
132380,
132418,
132419,
132523,
132591,
132611,
132612,
132640,
132688,
132752,
132781,
132894,
132954,
132980,
133046,
133047,
133116,
133117,
133138,
133139,
133204,
133205,
133277,
133323,
133324,
133362,
133363,
133425,
133442,
133497,
133558,
133613,
133669,
133721,
133783,
133800,
133815,
133816,
133873,
133874,
133913,
133914,
134029,
134105,
134134,
134256,
134337,
134363,
134419,
134467,
134512,
134564,
134623,
134678,
134743,
134769,
134827,
134875,
134920,
134965,
135024,
135079,
135149,
135175,
135233,
135281,
135326,
135371,
135430,
135458,
135525,
135526,
135596,
135639,
135640,
135699,
135700,
135771,
135772,
135831,
135889,
135914,
135915,
135953,
135954,
136006,
136010,
136052,
136100,
136142,
136185,
136258,
136262,
136264,
136265,
136322,
136323,
136362,
136363,
136484,
136570,
136597,
136626,
136723,
136785,
136833,
136880,
136923,
136991,
136992,
137063,
137064,
137124,
137125,
137196,
137269,
137340,
137400,
137425,
137426,
137464,
137465,
137517,
137521,
137563,
137611,
137653,
137697,
137752,
137825,
137829,
137831,
137832,
137889,
137890,
137929,
137930,
138020,
138103,
138181,
138191,
138347,
138373,
138431,
138479,
138526,
138591,
138650,
138705,
138775,
138801,
138872,
138873,
138968,
139008,
139115,
139156,
139157,
139226,
139291,
139362,
139388,
139389,
139452,
139521,
139593,
139613,
139614,
139687,
139758,
139825,
139873,
139874,
139893,
139894,
139913,
139928,
139929,
139967,
139968,
139985,
140000,
140001,
140038,
140039,
140062,
140077,
140078,
140121,
140137,
140157,
140158
],
"line_end_idx": [
1,
74,
147,
220,
301,
374,
447,
515,
588,
589,
627,
727,
781,
782,
791,
792,
875,
914,
967,
1037,
1107,
1157,
1234,
1308,
1390,
1483,
1551,
1621,
1622,
1642,
1643,
1708,
1744,
1745,
1814,
1880,
1952,
2059,
2060,
2133,
2205,
2271,
2333,
2334,
2395,
2396,
2413,
2414,
2481,
2524,
2525,
2590,
2631,
2673,
2741,
2805,
2878,
2950,
3020,
3087,
3131,
3132,
3150,
3151,
3224,
3301,
3378,
3451,
3524,
3617,
3690,
3768,
3841,
3923,
4008,
4085,
4173,
4246,
4323,
4400,
4492,
4529,
4606,
4692,
4745,
4802,
4860,
4933,
5010,
5087,
5164,
5241,
5318,
5403,
5487,
5570,
5621,
5666,
5731,
5774,
5827,
5881,
5928,
5985,
6048,
6103,
6168,
6217,
6288,
6339,
6396,
6439,
6504,
6534,
6607,
6644,
6717,
6768,
6829,
6868,
6935,
6964,
7037,
7076,
7147,
7191,
7258,
7319,
7364,
7422,
7465,
7519,
7576,
7622,
7691,
7763,
7836,
7913,
7914,
7931,
7932,
8000,
8068,
8141,
8174,
8240,
8283,
8338,
8413,
8485,
8557,
8653,
8731,
8786,
8787,
8864,
8897,
8983,
9001,
9079,
9148,
9218,
9291,
9364,
9433,
9502,
9563,
9605,
9676,
9743,
9802,
9892,
9952,
9999,
10073,
10142,
10143,
10174,
10175,
10248,
10344,
10473,
10510,
10530,
10632,
10703,
10782,
10860,
10935,
10986,
10987,
10997,
10998,
11060,
11095,
11165,
11238,
11312,
11406,
11476,
11527,
11598,
11671,
11743,
11817,
11897,
11987,
12085,
12171,
12258,
12325,
12434,
12514,
12559,
12560,
12625,
12688,
12769,
12857,
12953,
13016,
13096,
13158,
13238,
13326,
13433,
13495,
13558,
13620,
13682,
13683,
13729,
13730,
13757,
13758,
13830,
13925,
13948,
14050,
14132,
14212,
14268,
14309,
14380,
14429,
14430,
14496,
14507,
14508,
14581,
14634,
14714,
14830,
14900,
14969,
15036,
15091,
15092,
15110,
15111,
15182,
15254,
15322,
15391,
15414,
15415,
15482,
15554,
15615,
15685,
15699,
15700,
15773,
15807,
15886,
15887,
15923,
15924,
15999,
16022,
16103,
16170,
16237,
16264,
16265,
16337,
16352,
16353,
16426,
16489,
16567,
16640,
16713,
16781,
16853,
16926,
16994,
16995,
17051,
17052,
17099,
17100,
17168,
17237,
17309,
17382,
17454,
17455,
17525,
17595,
17664,
17679,
17680,
17751,
17818,
17889,
17927,
17928,
18026,
18091,
18121,
18202,
18254,
18320,
18398,
18462,
18507,
18508,
18582,
18622,
18623,
18700,
18751,
18833,
18873,
18874,
19030,
19103,
19160,
19230,
19277,
19356,
19357,
19385,
19465,
19532,
19602,
19670,
19740,
19807,
19824,
19825,
19895,
19967,
20037,
20106,
20157,
20158,
20183,
20184,
20253,
20323,
20394,
20448,
20449,
20581,
20652,
20724,
20794,
20824,
20825,
20859,
20860,
20932,
21013,
21082,
21122,
21123,
21194,
21265,
21335,
21406,
21414,
21415,
21485,
21553,
21626,
21697,
21768,
21841,
21914,
21957,
21958,
22016,
22017,
22076,
22135,
22207,
22266,
22324,
22383,
22437,
22488,
22546,
22604,
22660,
22733,
22795,
22866,
22936,
23016,
23095,
23146,
23197,
23248,
23299,
23300,
23364,
23365,
23422,
23423,
23521,
23592,
23611,
23612,
23682,
23737,
23738,
23806,
23879,
23940,
23941,
24011,
24077,
24135,
24136,
24193,
24194,
24308,
24356,
24401,
24459,
24460,
24465,
24466,
24554,
24591,
24592,
24686,
24769,
24841,
24863,
24864,
24941,
25009,
25073,
25131,
25132,
25203,
25303,
25338,
25407,
25456,
25457,
25517,
25518,
25583,
25689,
25719,
25720,
25791,
25837,
25923,
25995,
26017,
26018,
26097,
26169,
26233,
26291,
26292,
26385,
26401,
26417,
26418,
26491,
26561,
26598,
26599,
26699,
26760,
26793,
26864,
26929,
26962,
26963,
27030,
27103,
27175,
27247,
27318,
27392,
27449,
27450,
27513,
27514,
27585,
27655,
27671,
27672,
27692,
27693,
27709,
27710,
27729,
27730,
27801,
27866,
27894,
27895,
27928,
27929,
28033,
28034,
28052,
28053,
28090,
28091,
28127,
28128,
28161,
28162,
28196,
28197,
28270,
28291,
28292,
28358,
28422,
28494,
28531,
28603,
28727,
28825,
28890,
28957,
28988,
28989,
29067,
29068,
29135,
29201,
29291,
29359,
29432,
29448,
29449,
29499,
29500,
29510,
29511,
29558,
29559,
29607,
29608,
29650,
29651,
29666,
29699,
29720,
29743,
29766,
29774,
29775,
29783,
29784,
29794,
29795,
29837,
29838,
29873,
29940,
29980,
29981,
30009,
30010,
30076,
30097,
30098,
30188,
30212,
30288,
30302,
30303,
30354,
30355,
30427,
30500,
30578,
30643,
30676,
30677,
30731,
30732,
30798,
30865,
30960,
31016,
31059,
31126,
31199,
31232,
31316,
31389,
31410,
31497,
31567,
31637,
31690,
31691,
31763,
31832,
31904,
31942,
31943,
32011,
32092,
32161,
32162,
32196,
32197,
32207,
32208,
32280,
32401,
32465,
32532,
32604,
32677,
32742,
32808,
32821,
32822,
32840,
32923,
32968,
33038,
33039,
33089,
33090,
33134,
33135,
33209,
33278,
33321,
33381,
33382,
33478,
33495,
33622,
33741,
33814,
33876,
33888,
33983,
33984,
34024,
34107,
34191,
34274,
34293,
34294,
34358,
34436,
34494,
34495,
34545,
34546,
34620,
34621,
34671,
34672,
34766,
34785,
34867,
34920,
34988,
35070,
35122,
35183,
35253,
35331,
35344,
35353,
35354,
35439,
35512,
35577,
35578,
35597,
35598,
35668,
35711,
35712,
35780,
35832,
35869,
35870,
35947,
35981,
35982,
36051,
36118,
36170,
36171,
36189,
36190,
36260,
36321,
36371,
36378,
36379,
36476,
36549,
36635,
36690,
36768,
36806,
36807,
36843,
36844,
36910,
36978,
37053,
37054,
37130,
37202,
37289,
37355,
37366,
37367,
37438,
37479,
37566,
37584,
37689,
37782,
37864,
37940,
38022,
38089,
38090,
38118,
38119,
38138,
38139,
38147,
38148,
38229,
38299,
38369,
38440,
38512,
38582,
38592,
38593,
38731,
38767,
38806,
38882,
38935,
39008,
39009,
39061,
39113,
39165,
39217,
39269,
39321,
39373,
39427,
39479,
39531,
39583,
39635,
39687,
39739,
39791,
39843,
39895,
39947,
39999,
40051,
40103,
40155,
40207,
40208,
40226,
40227,
40305,
40346,
40398,
40439,
40468,
40469,
40525,
40526,
40557,
40558,
40673,
40701,
40771,
40865,
40874,
40958,
41026,
41076,
41077,
41105,
41106,
41128,
41129,
41144,
41145,
41229,
41275,
41346,
41416,
41494,
41570,
41620,
41621,
41702,
41781,
41782,
41796,
41900,
41928,
41929,
41995,
42052,
42053,
42075,
42076,
42149,
42186,
42187,
42264,
42360,
42428,
42444,
42517,
42585,
42586,
42638,
42705,
42723,
42724,
42799,
42823,
42868,
42869,
42980,
42987,
43026,
43027,
43100,
43101,
43125,
43126,
43206,
43306,
43393,
43394,
43411,
43469,
43470,
43488,
43489,
43501,
43502,
43614,
43692,
43763,
43775,
43776,
43844,
43927,
43948,
43949,
44083,
44155,
44231,
44316,
44339,
44400,
44422,
44423,
44483,
44484,
44526,
44588,
44605,
44606,
44634,
44635,
44705,
44720,
44780,
44807,
44888,
44957,
45039,
45112,
45130,
45202,
45277,
45356,
45408,
45409,
45454,
45455,
45487,
45488,
45556,
45626,
45697,
45793,
45871,
45938,
46028,
46101,
46129,
46130,
46199,
46267,
46338,
46377,
46378,
46475,
46490,
46559,
46630,
46696,
46767,
46814,
46815,
46913,
46928,
46990,
47032,
47033,
47044,
47045,
47077,
47078,
47133,
47134,
47176,
47244,
47313,
47350,
47423,
47501,
47515,
47516,
47586,
47687,
47760,
47827,
47908,
47974,
48047,
48054,
48115,
48188,
48244,
48312,
48408,
48409,
48492,
48561,
48637,
48708,
48800,
48873,
48902,
48903,
48927,
48928,
49000,
49154,
49208,
49222,
49223,
49296,
49355,
49427,
49471,
49513,
49514,
49534,
49535,
49607,
49679,
49750,
49751,
49857,
49895,
49916,
49917,
49935,
49936,
50008,
50080,
50094,
50095,
50168,
50215,
50216,
50282,
50348,
50419,
50466,
50467,
50536,
50605,
50674,
50736,
50803,
50871,
50942,
51011,
51080,
51091,
51092,
51164,
51203,
51204,
51256,
51310,
51311,
51339,
51340,
51371,
51372,
51396,
51397,
51425,
51426,
51450,
51451,
51510,
51579,
51645,
51717,
51718,
51757,
51758,
51821,
51822,
51840,
51841,
51909,
51980,
52052,
52108,
52130,
52131,
52216,
52247,
52302,
52347,
52408,
52409,
52464,
52510,
52603,
52604,
52676,
52744,
52745,
52761,
52860,
52945,
52966,
53030,
53122,
53162,
53239,
53306,
53371,
53436,
53468,
53469,
53536,
53604,
53661,
53662,
53727,
53781,
53852,
53925,
54003,
54073,
54152,
54173,
54271,
54286,
54287,
54305,
54306,
54375,
54442,
54471,
54472,
54496,
54497,
54589,
54658,
54734,
54764,
54765,
54834,
54900,
54961,
55028,
55061,
55062,
55167,
55236,
55323,
55394,
55467,
55532,
55596,
55655,
55656,
55715,
55798,
55815,
55816,
55898,
55962,
56011,
56077,
56122,
56123,
56143,
56144,
56216,
56288,
56348,
56399,
56400,
56495,
56608,
56659,
56737,
56751,
56752,
56824,
56902,
56980,
57025,
57052,
57053,
57082,
57083,
57153,
57246,
57311,
57382,
57435,
57436,
57508,
57547,
57548,
57600,
57601,
57655,
57656,
57684,
57685,
57716,
57717,
57741,
57742,
57770,
57771,
57795,
57796,
57855,
57924,
57990,
58062,
58063,
58102,
58103,
58147,
58148,
58212,
58283,
58356,
58399,
58400,
58420,
58421,
58493,
58565,
58615,
58682,
58759,
58834,
58835,
58920,
58943,
59028,
59097,
59118,
59202,
59233,
59234,
59293,
59326,
59327,
59393,
59488,
59535,
59625,
59697,
59769,
59838,
59909,
59977,
59991,
59992,
60059,
60130,
60172,
60204,
60205,
60276,
60290,
60291,
60329,
60330,
60370,
60371,
60440,
60539,
60568,
60654,
60724,
60803,
60890,
60935,
60936,
61006,
61078,
61147,
61217,
61255,
61256,
61329,
61394,
61468,
61549,
61550,
61607,
61642,
61643,
61655,
61656,
61727,
61798,
61867,
61938,
62008,
62022,
62023,
62095,
62162,
62234,
62248,
62249,
62306,
62367,
62428,
62489,
62550,
62612,
62673,
62734,
62795,
62856,
62913,
62914,
62967,
62968,
62984,
62985,
63053,
63084,
63085,
63169,
63190,
63191,
63277,
63355,
63426,
63490,
63491,
63564,
63618,
63619,
63687,
63757,
63828,
63883,
63954,
64001,
64072,
64093,
64113,
64114,
64165,
64166,
64171,
64172,
64208,
64209,
64269,
64270,
64290,
64308,
64319,
64341,
64363,
64380,
64406,
64424,
64450,
64471,
64476,
64477,
64487,
64488,
64577,
64594,
64595,
64666,
64707,
64708,
64781,
64873,
64924,
64987,
65038,
65074,
65075,
65145,
65187,
65188,
65261,
65296,
65297,
65381,
65426,
65427,
65490,
65559,
65627,
65687,
65688,
65749,
65750,
65770,
65771,
65793,
65794,
65894,
65959,
66024,
66097,
66103,
66121,
66122,
66193,
66262,
66291,
66292,
66320,
66321,
66394,
66460,
66532,
66604,
66673,
66674,
66756,
66835,
66859,
66928,
66997,
67066,
67110,
67111,
67135,
67136,
67207,
67240,
67241,
67257,
67258,
67327,
67400,
67472,
67559,
67621,
67622,
67694,
67764,
67836,
67905,
67950,
67951,
68017,
68095,
68143,
68167,
68168,
68192,
68193,
68264,
68350,
68382,
68505,
68578,
68670,
68737,
68799,
68872,
68942,
68980,
69047,
69115,
69210,
69265,
69299,
69348,
69349,
69395,
69396,
69419,
69420,
69489,
69568,
69569,
69592,
69707,
69726,
69828,
69899,
69969,
70063,
70134,
70187,
70188,
70258,
70333,
70404,
70463,
70464,
70503,
70504,
70574,
70643,
70712,
70781,
70852,
70876,
70877,
70949,
71020,
71063,
71151,
71226,
71242,
71243,
71249,
71250,
71354,
71426,
71486,
71487,
71521,
71560,
71561,
71585,
71586,
71669,
71718,
71719,
71804,
71900,
71926,
71997,
72067,
72145,
72239,
72309,
72310,
72348,
72418,
72490,
72557,
72629,
72700,
72722,
72765,
72766,
72788,
72789,
72872,
72941,
72942,
73012,
73083,
73151,
73213,
73317,
73365,
73451,
73535,
73610,
73674,
73739,
73766,
73843,
73873,
73960,
73974,
73975,
73987,
73988,
74044,
74045,
74154,
74258,
74259,
74328,
74441,
74513,
74545,
74614,
74671,
74672,
74687,
74688,
74718,
74784,
74852,
74867,
74868,
74968,
74969,
74998,
74999,
75084,
75198,
75271,
75343,
75361,
75362,
75433,
75504,
75574,
75647,
75666,
75667,
75683,
75684,
75754,
75824,
75895,
75943,
75944,
76015,
76088,
76146,
76147,
76180,
76181,
76240,
76305,
76370,
76441,
76510,
76577,
76623,
76624,
76639,
76640,
76669,
76670,
76743,
76772,
76773,
76789,
76818,
76819,
76891,
76892,
76958,
76976,
76977,
77077,
77104,
77190,
77262,
77284,
77285,
77356,
77397,
77398,
77475,
77534,
77535,
77608,
77675,
77692,
77693,
77738,
77739,
77767,
77768,
77838,
77876,
77877,
77947,
78027,
78028,
78124,
78179,
78256,
78328,
78397,
78398,
78462,
78534,
78601,
78674,
78738,
78809,
78877,
78899,
78900,
78973,
79038,
79108,
79144,
79145,
79210,
79281,
79348,
79415,
79456,
79457,
79528,
79595,
79661,
79726,
79738,
79739,
79745,
79746,
79850,
79882,
79883,
79889,
79890,
79957,
79976,
79977,
79992,
79993,
80069,
80121,
80182,
80183,
80189,
80190,
80247,
80248,
80316,
80389,
80452,
80518,
80537,
80538,
80612,
80647,
80648,
80654,
80655,
80726,
80797,
80870,
80910,
80911,
80985,
81046,
81103,
81104,
81110,
81111,
81182,
81183,
81213,
81214,
81285,
81375,
81444,
81517,
81587,
81648,
81649,
81716,
81743,
81744,
81810,
81828,
81829,
81868,
81869,
81940,
82009,
82111,
82112,
82187,
82245,
82297,
82352,
82424,
82479,
82480,
82551,
82592,
82593,
82670,
82722,
82723,
82795,
82796,
82825,
82826,
82897,
82935,
82936,
83006,
83074,
83108,
83109,
83178,
83250,
83297,
83298,
83364,
83438,
83468,
83581,
83651,
83719,
83763,
83764,
83776,
83788,
83789,
83880,
83947,
83979,
83980,
84025,
84087,
84088,
84155,
84174,
84175,
84190,
84191,
84222,
84223,
84305,
84370,
84441,
84514,
84515,
84596,
84701,
84753,
84805,
84806,
84825,
84826,
84883,
84884,
84952,
85021,
85083,
85084,
85150,
85185,
85258,
85259,
85270,
85271,
85342,
85413,
85486,
85526,
85527,
85604,
85660,
85690,
85741,
85742,
85815,
85867,
85868,
85874,
85875,
85947,
85948,
86016,
86087,
86159,
86232,
86270,
86271,
86302,
86303,
86373,
86446,
86538,
86611,
86680,
86747,
86827,
86901,
86973,
86986,
86987,
87038,
87039,
87123,
87165,
87166,
87234,
87304,
87375,
87418,
87489,
87490,
87544,
87545,
87630,
87676,
87677,
87756,
87847,
87919,
87920,
87992,
88068,
88069,
88168,
88238,
88270,
88271,
88315,
88363,
88404,
88405,
88488,
88561,
88595,
88596,
88667,
88708,
88709,
88818,
88857,
88858,
88909,
88910,
88977,
89032,
89033,
89063,
89111,
89175,
89206,
89207,
89263,
89295,
89296,
89354,
89433,
89491,
89564,
89632,
89695,
89766,
89822,
89880,
89881,
89977,
89978,
89993,
89994,
90071,
90094,
90095,
90120,
90121,
90144,
90145,
90150,
90158,
90183,
90218,
90223,
90224,
90277,
90315,
90316,
90338,
90339,
90384,
90385,
90451,
90452,
90523,
90560,
90561,
90626,
90692,
90693,
90746,
90766,
90767,
90811,
90812,
90835,
90836,
90841,
90849,
90856,
90891,
90900,
90901,
90974,
91001,
91002,
91051,
91052,
91071,
91072,
91143,
91215,
91288,
91356,
91428,
91496,
91497,
91510,
91511,
91583,
91648,
91719,
91742,
91743,
91791,
91859,
91930,
91995,
92062,
92063,
92090,
92091,
92158,
92181,
92182,
92207,
92208,
92231,
92232,
92237,
92245,
92270,
92305,
92310,
92311,
92367,
92409,
92431,
92432,
92441,
92442,
92485,
92486,
92499,
92500,
92533,
92534,
92602,
92603,
92610,
92611,
92662,
92663,
92686,
92687,
92692,
92700,
92733,
92768,
92773,
92774,
92833,
92875,
92876,
92898,
92899,
92908,
92909,
92952,
92953,
92969,
92970,
93000,
93001,
93055,
93073,
93074,
93090,
93091,
93162,
93230,
93302,
93329,
93330,
93374,
93375,
93398,
93399,
93404,
93412,
93419,
93454,
93459,
93460,
93513,
93533,
93534,
93556,
93557,
93589,
93590,
93617,
93618,
93683,
93684,
93725,
93726,
93749,
93750,
93755,
93763,
93779,
93814,
93819,
93820,
93870,
93902,
93903,
93925,
93926,
93958,
93959,
93989,
93990,
94058,
94059,
94075,
94076,
94147,
94210,
94282,
94351,
94421,
94432,
94443,
94444,
94516,
94589,
94661,
94684,
94685,
94714,
94715,
94749,
94750,
94823,
94894,
94966,
95037,
95062,
95063,
95100,
95101,
95211,
95244,
95315,
95357,
95420,
95463,
95464,
95542,
95598,
95691,
95762,
95837,
95867,
95955,
95975,
96067,
96121,
96151,
96152,
96245,
96282,
96296,
96297,
96385,
96441,
96442,
96516,
96585,
96603,
96674,
96675,
96713,
96714,
96766,
96833,
96834,
96862,
96931,
96995,
97104,
97116,
97117,
97185,
97204,
97277,
97384,
97457,
97493,
97578,
97622,
97681,
97778,
97891,
97970,
98038,
98103,
98171,
98244,
98274,
98329,
98403,
98423,
98424,
98436,
98437,
98489,
98490,
98541,
98564,
98565,
98618,
98619,
98692,
98693,
98733,
98734,
98802,
98828,
98876,
98877,
98947,
99021,
99022,
99049,
99075,
99126,
99127,
99161,
99185,
99186,
99202,
99230,
99285,
99286,
99327,
99328,
99347,
99375,
99427,
99428,
99499,
99500,
99519,
99554,
99555,
99647,
99715,
99788,
99848,
99869,
99917,
99918,
99984,
100079,
100122,
100192,
100253,
100277,
100278,
100347,
100417,
100497,
100582,
100597,
100645,
100646,
100684,
100685,
100764,
100830,
100900,
100967,
101050,
101089,
101174,
101200,
101299,
101375,
101402,
101420,
101421,
101433,
101434,
101489,
101490,
101517,
101557,
101558,
101631,
101632,
101670,
101671,
101699,
101733,
101761,
101814,
101815,
101871,
101946,
101947,
101985,
102013,
102063,
102064,
102107,
102108,
102129,
102159,
102213,
102214,
102257,
102258,
102276,
102306,
102363,
102364,
102419,
102420,
102438,
102478,
102479,
102496,
102567,
102664,
102691,
102789,
102832,
102903,
102996,
103052,
103053,
103130,
103177,
103178,
103207,
103208,
103281,
103351,
103427,
103498,
103531,
103598,
103683,
103749,
103838,
103908,
103977,
104073,
104168,
104212,
104284,
104317,
104318,
104380,
104437,
104529,
104559,
104560,
104621,
104713,
104820,
104883,
104915,
105001,
105073,
105144,
105187,
105259,
105360,
105423,
105499,
105514,
105515,
105529,
105602,
105673,
105749,
105807,
105877,
105981,
106062,
106130,
106227,
106228,
106307,
106379,
106415,
106488,
106562,
106611,
106705,
106783,
106808,
106875,
106972,
106973,
107001,
107002,
107057,
107106,
107201,
107273,
107329,
107355,
107431,
107494,
107552,
107553,
107616,
107688,
107754,
107822,
107893,
107925,
107926,
107995,
108067,
108139,
108206,
108278,
108351,
108424,
108494,
108565,
108595,
108596,
108624,
108625,
108697,
108765,
108836,
108843,
108921,
108990,
109010,
109011,
109078,
109145,
109171,
109172,
109244,
109312,
109345,
109346,
109425,
109495,
109578,
109602,
109603,
109628,
109629,
109683,
109684,
109709,
109811,
109812,
109848,
109849,
109888,
109958,
110050,
110123,
110186,
110249,
110322,
110394,
110466,
110533,
110605,
110674,
110743,
110816,
110889,
110959,
111026,
111027,
111052,
111053,
111118,
111176,
111177,
111213,
111214,
111280,
111293,
111294,
111356,
111418,
111480,
111542,
111604,
111605,
111623,
111624,
111658,
111659,
111775,
111788,
111789,
111819,
111820,
111847,
111848,
111880,
111881,
111913,
111914,
111953,
111954,
112019,
112020,
112064,
112065,
112097,
112098,
112168,
112238,
112308,
112392,
112393,
112456,
112457,
112504,
112505,
112536,
112537,
112567,
112568,
112600,
112601,
112643,
112644,
112710,
112766,
112767,
112797,
112798,
112832,
112833,
112893,
112894,
112934,
112935,
113006,
113026,
113027,
113094,
113161,
113228,
113295,
113362,
113363,
113384,
113385,
113434,
113504,
113505,
113526,
113527,
113599,
113670,
113740,
113787,
113788,
113859,
113921,
113922,
113926,
113927,
113943,
113944,
113950,
113951,
113979,
113980,
114021,
114091,
114160,
114205,
114206,
114229,
114300,
114372,
114373,
114439,
114492,
114540,
114596,
114653,
114654,
114720,
114792,
114849,
114850,
114905,
114955,
115011,
115068,
115069,
115139,
115208,
115321,
115322,
115387,
115457,
115570,
115571,
115642,
115696,
115743,
115799,
115856,
115857,
115923,
115977,
116029,
116085,
116142,
116143,
116214,
116284,
116333,
116389,
116390,
116396,
116453,
116454,
116525,
116597,
116667,
116718,
116775,
116776,
116847,
116916,
116983,
117040,
117041,
117112,
117169,
117226,
117227,
117257,
117258,
117294,
117367,
117433,
117503,
117523,
117524,
117564,
117640,
117709,
117782,
117809,
117873,
117874,
117913,
117985,
118053,
118084,
118154,
118155,
118185,
118257,
118324,
118393,
118416,
118478,
118479,
118511,
118577,
118641,
118709,
118779,
118799,
118800,
118838,
118901,
118968,
119034,
119063,
119064,
119098,
119188,
119259,
119298,
119299,
119332,
119422,
119491,
119537,
119605,
119674,
119675,
119713,
119785,
119853,
119877,
119938,
119939,
120010,
120076,
120136,
120193,
120194,
120267,
120324,
120370,
120426,
120483,
120484,
120555,
120607,
120653,
120709,
120766,
120767,
120832,
120900,
120963,
120964,
120990,
120991,
121034,
121035,
121057,
121058,
121135,
121201,
121266,
121339,
121377,
121378,
121408,
121409,
121464,
121528,
121574,
121575,
121603,
121629,
121647,
121713,
121765,
121834,
121938,
122012,
122082,
122122,
122188,
122240,
122309,
122368,
122468,
122557,
122597,
122670,
122723,
122768,
122842,
122868,
122886,
122959,
123012,
123057,
123131,
123157,
123158,
123233,
123303,
123304,
123373,
123446,
123514,
123526,
123527,
123590,
123663,
123732,
123766,
123767,
123837,
123903,
123915,
123916,
123949,
123950,
124005,
124069,
124139,
124207,
124227,
124228,
124251,
124271,
124319,
124361,
124400,
124454,
124514,
124553,
124573,
124621,
124663,
124702,
124756,
124816,
124855,
124875,
124927,
124969,
125013,
125052,
125125,
125145,
125197,
125239,
125283,
125322,
125395,
125416,
125436,
125488,
125530,
125574,
125613,
125686,
125706,
125758,
125800,
125844,
125883,
125956,
125976,
125977,
126046,
126117,
126158,
126159,
126228,
126301,
126369,
126381,
126382,
126445,
126514,
126582,
126655,
126723,
126793,
126859,
126860,
126930,
127000,
127068,
127069,
127117,
127118,
127161,
127162,
127235,
127308,
127380,
127447,
127512,
127585,
127650,
127718,
127788,
127842,
127843,
127909,
127982,
128053,
128071,
128072,
128139,
128208,
128280,
128352,
128421,
128488,
128558,
128594,
128595,
128658,
128712,
128713,
128778,
128849,
128918,
128974,
129024,
129025,
129095,
129165,
129236,
129277,
129347,
129348,
129427,
129488,
129560,
129639,
129712,
129765,
129766,
129787,
129788,
129858,
129920,
129984,
130014,
130063,
130168,
130217,
130218,
130289,
130365,
130379,
130380,
130450,
130467,
130468,
130540,
130612,
130656,
130746,
130747,
130769,
130770,
130786,
130787,
130871,
130937,
130959,
130960,
130976,
131151,
131201,
131202,
131290,
131309,
131310,
131340,
131341,
131415,
131465,
131466,
131488,
131489,
131557,
131575,
131576,
131643,
131697,
131722,
131723,
131770,
131771,
131831,
131847,
131901,
131961,
132015,
132070,
132121,
132185,
132201,
132215,
132216,
132259,
132323,
132379,
132380,
132418,
132419,
132523,
132591,
132611,
132612,
132640,
132688,
132752,
132781,
132894,
132954,
132980,
133046,
133047,
133116,
133117,
133138,
133139,
133204,
133205,
133277,
133323,
133324,
133362,
133363,
133425,
133442,
133497,
133558,
133613,
133669,
133721,
133783,
133800,
133815,
133816,
133873,
133874,
133913,
133914,
134029,
134105,
134134,
134256,
134337,
134363,
134419,
134467,
134512,
134564,
134623,
134678,
134743,
134769,
134827,
134875,
134920,
134965,
135024,
135079,
135149,
135175,
135233,
135281,
135326,
135371,
135430,
135458,
135525,
135526,
135596,
135639,
135640,
135699,
135700,
135771,
135772,
135831,
135889,
135914,
135915,
135953,
135954,
136006,
136010,
136052,
136100,
136142,
136185,
136258,
136262,
136264,
136265,
136322,
136323,
136362,
136363,
136484,
136570,
136597,
136626,
136723,
136785,
136833,
136880,
136923,
136991,
136992,
137063,
137064,
137124,
137125,
137196,
137269,
137340,
137400,
137425,
137426,
137464,
137465,
137517,
137521,
137563,
137611,
137653,
137697,
137752,
137825,
137829,
137831,
137832,
137889,
137890,
137929,
137930,
138020,
138103,
138181,
138191,
138347,
138373,
138431,
138479,
138526,
138591,
138650,
138705,
138775,
138801,
138872,
138873,
138968,
139008,
139115,
139156,
139157,
139226,
139291,
139362,
139388,
139389,
139452,
139521,
139593,
139613,
139614,
139687,
139758,
139825,
139873,
139874,
139893,
139894,
139913,
139928,
139929,
139967,
139968,
139985,
140000,
140001,
140038,
140039,
140062,
140077,
140078,
140121,
140137,
140157,
140158,
140182
]
}
|
{
"red_pajama_v2": {
"ccnet_original_length": 140182,
"ccnet_original_nlines": 3149,
"rps_doc_curly_bracket": 0.0005992199876345694,
"rps_doc_ldnoobw_words": 0,
"rps_doc_lorem_ipsum": 0,
"rps_doc_stop_word_fraction": 0.23998062312602997,
"rps_doc_ut1_blacklist": 0,
"rps_doc_frac_all_caps_words": 0.06317044049501419,
"rps_doc_frac_lines_end_with_ellipsis": 0.0015872999792918563,
"rps_doc_frac_no_alph_words": 0.3327994644641876,
"rps_doc_frac_unique_words": 0.10808529704809189,
"rps_doc_mean_word_length": 5.1842122077941895,
"rps_doc_num_sentences": 1892,
"rps_doc_symbol_to_word_ratio": 0.0018623400246724486,
"rps_doc_unigram_entropy": 6.061004161834717,
"rps_doc_word_count": 17773,
"rps_doc_frac_chars_dupe_10grams": 0.15974776446819305,
"rps_doc_frac_chars_dupe_5grams": 0.36773785948753357,
"rps_doc_frac_chars_dupe_6grams": 0.3009583353996277,
"rps_doc_frac_chars_dupe_7grams": 0.25903254747390747,
"rps_doc_frac_chars_dupe_8grams": 0.2135252207517624,
"rps_doc_frac_chars_dupe_9grams": 0.1835596263408661,
"rps_doc_frac_chars_top_2gram": 0.007217360194772482,
"rps_doc_frac_chars_top_3gram": 0.0055025601759552956,
"rps_doc_frac_chars_top_4gram": 0.004341269843280315,
"rps_doc_books_importance": -13033.505859375,
"rps_doc_books_importance_length_correction": -13033.505859375,
"rps_doc_openwebtext_importance": -7536.41650390625,
"rps_doc_openwebtext_importance_length_correction": -7536.41650390625,
"rps_doc_wikipedia_importance": -5156.7099609375,
"rps_doc_wikipedia_importance_length_correction": -5156.7099609375
},
"fasttext": {
"dclm": 0.07808107137680054,
"english": 0.7975060343742371,
"fineweb_edu_approx": 2.1149210929870605,
"eai_general_math": 0.7997547388076782,
"eai_open_web_math": 0.42513054609298706,
"eai_web_code": 0.9740249514579773
}
}
|
{
"free_decimal_correspondence": {
"primary": {
"code": "005.82",
"labels": {
"level_1": "General works, books and libraries, information sciences",
"level_2": "",
"level_3": "Computer programming"
}
},
"secondary": {
"code": "004.678",
"labels": {
"level_1": "General works, books and libraries, information sciences",
"level_2": "",
"level_3": "Computers and Computer science"
}
}
},
"bloom_cognitive_process": {
"primary": {
"code": "2",
"label": "Understand"
},
"secondary": {
"code": "3",
"label": "Apply"
}
},
"bloom_knowledge_domain": {
"primary": {
"code": "2",
"label": "Conceptual"
},
"secondary": {
"code": "3",
"label": "Procedural"
}
},
"document_type_v1": {
"primary": {
"code": "2",
"label": "Academic/Research"
},
"secondary": {
"code": "3",
"label": "Reference/Encyclopedic/Educational"
}
},
"extraction_artifacts": {
"primary": {
"code": "0",
"label": "No Artifacts"
},
"secondary": {
"code": "0",
"label": "No Artifacts"
}
},
"missing_content": {
"primary": {
"code": "0",
"label": "No missing content"
},
"secondary": {
"code": "0",
"label": "No missing content"
}
},
"document_type_v2": {
"primary": {
"code": "8",
"label": "Documentation"
},
"secondary": {
"code": "3",
"label": "Academic Writing"
}
},
"reasoning_depth": {
"primary": {
"code": "4",
"label": "Advanced Reasoning"
},
"secondary": {
"code": "3",
"label": "Intermediate Reasoning"
}
},
"technical_correctness": {
"primary": {
"code": "4",
"label": "Highly Correct"
},
"secondary": {
"code": "3",
"label": "Mostly Correct"
}
},
"education_level": {
"primary": {
"code": "4",
"label": "Graduate/Expert Level"
},
"secondary": {
"code": "3",
"label": "Undergraduate Level"
}
}
}
|
672f1e42c33a7f9846924a2431ea77df
|
-4,890,829,519,346,466,000 |
fbpx
Web Development in a Nutshell and Why You Should Study it
Since the internet became accessible to the public in the 1990’s, it has become a staple in society. Consequently, having a presence in the world wide web can open a lot of opportunities. In an increasingly interconnected age, having a website can do wonders for your goals regardless if you’re promoting a business, spreading awareness about a certain advocacy and the like.
Websites are made possible through web development. According to Techterms, web development refers to building, creating, and maintaining websites. It includes aspects such as web design, web publishing, web programming, and database management. In simple terms, web development refers to all the work that goes into making a website.
What’s on the Web?
Web design on the web
What’s so special about having your own website anyway? Well, the fact of the matter is that the internet isn’t going anywhere. As per Statista, there are 3.97 billion global users of the internet as of 2019, more than half of the world’s population, and this number is expected to increase in the years to come.
The internet has become an invaluable portal for a variety of reasons. First of all, It has become a platform for people to connect with others wherever they are in the world. The significance of this function has been magnified exponentially by the COVID-19 pandemic. It has become an avenue to conduct research in a more efficient and accessible manner, saving people a lot of time and effort.
To add to this, the internet has paved the way for education, not just in an academic setup, but in general. The internet provides a plethora of information on anything and everything under the sun. Lastly, the internet has become an avenue for entertainment, which has helped people cope significantly amid the ongoing pandemic.
Whatever your reason is for being on the internet, the common denominator among these is that they require a website, and each website requires a website developer.
Why Study Web Development?
Studying Web design
What are the opportunities in web development anyway? In a world that has been bridged together by the internet, there are a lot of great reasons why studying web development is so valuable, such as:
1. The high demand. The demand for web developers continues to rise, especially now that going online has become the safest way for shopping, information and entertainment. Businesses are always on the lookout for good quality web developers to help their companies thrive and survive, and it is expected that this trend will continue in the years to come.
1. Work flexibility. Once you’ve learned how to develop compelling websites, you have the option to work full-time, part-time or even freelance. You can even become your own boss. The possibilities are endless! Whatever your preference for working is, you have a lot of viable options if you’re an expert in web design.
1. Good compensation. The monetary compensation for designing websites is high. A lot of organizations pay a huge sum of money for the development of sophisticated websites. In this day and age where everything seems to get expensive by the day, it’s a great career choice that can pave the way for a comfortable life.
1. Qualification. While having a degree in Computer Science is certainly a plus, you don’t need a college degree in order to be a web design expert. You’re hired based on your knowledge of web development, and portfolio of previous work.
1. Sense of fulfillment. You have the potential to make a lot of amazing things happen if you’re skilled in web design. Whether it’s promoting a good cause or advocating for a passion project, developing websites can be a platform to a lot of great things.
It should be noted, however, that as the internet and the world of web design evolves, so must web developers in order to stay relevant. Web developers should keep themselves up to date with the latest trends and concepts in order to service their clients better.
Before you delve into the world of opportunities of web design, you need to learn the process of web development. While there are a lot of resources to help you get started, a great way to do so is through a Web Design Course.
A great place to learn design websites is CIIT Philippines. An academic institution that promotes high quality, industry-based teaching, CIIT Philippines offers a Web Design Course that will equip students with valuable skills such as web design, web programming, and WordPress.
CIIT Philippines’ teaching staff consists mostly of active industry pros who share first-rate knowledge and skills, ensuring students will learn from experts who can walk the talk. Along with them, CIIT Philippines always improves its programs to make them more relevant to current trade needs, giving students a competitive edge to advance their careers. The possibilities are endless, so jumpstart your journey to learning about web design today.
|
{
"url": "https://www.ciit.edu.ph/web-development-in-a-nutshell-and-why-you-should-study-it/",
"source_domain": "www.ciit.edu.ph",
"snapshot_id": "crawl=CC-MAIN-2022-05",
"warc_metadata": {
"Content-Length": "230801",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:FYFSRBGCLIOFRDJAPKTQBJ2MESZW7TNH",
"WARC-Concurrent-To": "<urn:uuid:63cd51b2-9c31-4f88-81c9-5e409253bea0>",
"WARC-Date": "2022-01-27T08:07:16Z",
"WARC-IP-Address": "216.104.46.213",
"WARC-Identified-Payload-Type": "text/html",
"WARC-Payload-Digest": "sha1:CLN7TVYILW4SBUSKBWAZQU5ES4BJL3RX",
"WARC-Record-ID": "<urn:uuid:0ec6f900-940c-4cb9-bd0c-fe530ac4a000>",
"WARC-Target-URI": "https://www.ciit.edu.ph/web-development-in-a-nutshell-and-why-you-should-study-it/",
"WARC-Truncated": null,
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:f778a52e-dec0-42be-9f40-906c5a3b0248>"
},
"warc_info": "isPartOf: CC-MAIN-2022-05\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for January 2022\r\noperator: Common Crawl Admin ([email protected])\r\nhostname: ip-10-67-67-24\r\nsoftware: Apache Nutch 1.18 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.3-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: https://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/"
}
|
{
"line_start_idx": [
0,
5,
6,
64,
65,
442,
443,
779,
780,
799,
800,
822,
823,
1137,
1138,
1535,
1536,
1866,
1867,
2033,
2034,
2061,
2062,
2082,
2083,
2284,
2285,
2645,
2968,
3290,
3531,
3791,
3792,
4057,
4058,
4286,
4287,
4567,
4568
],
"line_end_idx": [
5,
6,
64,
65,
442,
443,
779,
780,
799,
800,
822,
823,
1137,
1138,
1535,
1536,
1866,
1867,
2033,
2034,
2061,
2062,
2082,
2083,
2284,
2285,
2645,
2968,
3290,
3531,
3791,
3792,
4057,
4058,
4286,
4287,
4567,
4568,
5016
]
}
|
{
"red_pajama_v2": {
"ccnet_original_length": 5016,
"ccnet_original_nlines": 38,
"rps_doc_curly_bracket": 0,
"rps_doc_ldnoobw_words": 0,
"rps_doc_lorem_ipsum": 0,
"rps_doc_stop_word_fraction": 0.42813143134117126,
"rps_doc_ut1_blacklist": 0,
"rps_doc_frac_all_caps_words": 0.007186859846115112,
"rps_doc_frac_lines_end_with_ellipsis": 0,
"rps_doc_frac_no_alph_words": 0.13655030727386475,
"rps_doc_frac_unique_words": 0.4194711446762085,
"rps_doc_mean_word_length": 4.849759578704834,
"rps_doc_num_sentences": 54,
"rps_doc_symbol_to_word_ratio": 0,
"rps_doc_unigram_entropy": 5.160126209259033,
"rps_doc_word_count": 832,
"rps_doc_frac_chars_dupe_10grams": 0,
"rps_doc_frac_chars_dupe_5grams": 0.03469641134142876,
"rps_doc_frac_chars_dupe_6grams": 0,
"rps_doc_frac_chars_dupe_7grams": 0,
"rps_doc_frac_chars_dupe_8grams": 0,
"rps_doc_frac_chars_dupe_9grams": 0,
"rps_doc_frac_chars_top_2gram": 0.026765799149870872,
"rps_doc_frac_chars_top_3gram": 0.011895909905433655,
"rps_doc_frac_chars_top_4gram": 0.005947960074990988,
"rps_doc_books_importance": -432.5502624511719,
"rps_doc_books_importance_length_correction": -432.5502624511719,
"rps_doc_openwebtext_importance": -249.66212463378906,
"rps_doc_openwebtext_importance_length_correction": -249.66212463378906,
"rps_doc_wikipedia_importance": -205.59295654296875,
"rps_doc_wikipedia_importance_length_correction": -205.59295654296875
},
"fasttext": {
"dclm": 0.43283915519714355,
"english": 0.9434305429458618,
"fineweb_edu_approx": 2.3502919673919678,
"eai_general_math": 0.024683300405740738,
"eai_open_web_math": 0.13657301664352417,
"eai_web_code": 0.03679174184799194
}
}
|
{
"free_decimal_correspondence": {
"primary": {
"code": "004.019",
"labels": {
"level_1": "General works, books and libraries, information sciences",
"level_2": "",
"level_3": "Computers and Computer science"
}
},
"secondary": {
"code": "005.1",
"labels": {
"level_1": "General works, books and libraries, information sciences",
"level_2": "",
"level_3": "Computer programming"
}
}
},
"bloom_cognitive_process": {
"primary": {
"code": "2",
"label": "Understand"
},
"secondary": {
"code": "3",
"label": "Apply"
}
},
"bloom_knowledge_domain": {
"primary": {
"code": "2",
"label": "Conceptual"
},
"secondary": {
"code": "3",
"label": "Procedural"
}
},
"document_type_v1": {
"primary": {
"code": "3",
"label": "Reference/Encyclopedic/Educational"
},
"secondary": {
"code": "6",
"label": "Promotional/Advertisement"
}
},
"extraction_artifacts": {
"primary": {
"code": "0",
"label": "No Artifacts"
},
"secondary": {
"code": "3",
"label": "Irrelevant Content"
}
},
"missing_content": {
"primary": {
"code": "0",
"label": "No missing content"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"document_type_v2": {
"primary": {
"code": "10",
"label": "Knowledge Article"
},
"secondary": {
"code": "17",
"label": "Product Page"
}
},
"reasoning_depth": {
"primary": {
"code": "2",
"label": "Basic Reasoning"
},
"secondary": {
"code": "3",
"label": "Intermediate Reasoning"
}
},
"technical_correctness": {
"primary": {
"code": "6",
"label": "Not Applicable/Indeterminate"
},
"secondary": {
"code": "4",
"label": "Highly Correct"
}
},
"education_level": {
"primary": {
"code": "1",
"label": "General Audience"
},
"secondary": {
"code": "2",
"label": "High School Level"
}
}
}
|
672f1e42c33a7f9846924a2431ea77df
|
8,319,929,679,839,743,000 |
Fix: Gears 5 Error GW502 and GW503
Gears 5 is one of the third-person shooter video games, developed by The Coalition and published by Xbox Game Studios. It has been released for Xbox One, Xbox Series X|S, and Windows platforms. It has a wide range of maps, multiple gaming characters, new weapons, a bunch of special rewards, etc. Though the game has been rated quite well, it’s needless to say that Gears 5 includes plenty of errors too. Recently, some of the Gears 5 PC players are encountering Error GW502 and GW503 that causing issues with the game startup or gameplay. If you’re also one of them, make sure to check out the guide below.
It seems that plenty of Gears 5 errors are happening due to the graphics card-related issue for the Windows users whatsoever. Plenty of reports are coming out that there is nothing wrong with the game or any other thing except for PC configuration and graphics card issue. Now, the graphics card issue can vary depending on the particular error code something like the graphics card isn’t meeting the system requirement or an outdated graphics card or GPU stopped working or even not detected, etc.
Fix: Gears 5 Error GW502 and GW503
Fix: Gears 5 Error GW502 and GW503
Talking about both the GW502 and GW503 errors, it appears on the Windows system & both the errors are related to your graphics card issue.
GW502: This error indicates that the graphics card has stopped responding and was reset by the Windows OS.
GW503: It means that the current graphics card was not detected by the Gears 5 game.
Advertisements
According to the Gears 5 Techtest page, both the errors can be fixed by simply restarting your Windows PC/Laptop. It can possible that your graphics card may be in an unstable state and causing such issues. Additionally, updating the graphics driver to the latest version will also help a lot. However, if your graphics driver is running the latest version, try reducing the in-game graphics settings for optimal performance.
1. Reboot Your Computer
By simply rebooting the PC/Laptop, you’ll be ready to play your Gears 5 game again because sometimes any system glitch or graphics card stability issues can take place. So, click on the Start menu > Go to the Power menu > Select Restart. Once restarted, check whether the problem has been fixed or not.
2. Update Graphics Driver
If you’re using the Nvidia graphics card then update the GeForce Experience app on your PC from the Nvidia official site here. But if you’re using the AMD graphics card on your system, then update the latest AMD Drivers from here.
3. Try Reducing Visual Settings
Try to always reduce or lower the in-game graphics/visual settings to enhance the gaming performance along with the FPS count. A better FPS count will always provide a better gaming experience although you have to lower the graphics settings to low or medium. However, most of the PC gamers always want a stunning visual treat from their games but end up with lags, stutters, crashes, etc.
That’s it, guys. We hope this guide was useful. For further queries, you can comment below.
Leave a Reply
Your email address will not be published. Required fields are marked *
This site uses Akismet to reduce spam. Learn how your comment data is processed.
|
{
"url": "https://www.getdroidtips.com/fix-gears-5-error-gw502-gw503/",
"source_domain": "www.getdroidtips.com",
"snapshot_id": "CC-MAIN-2023-14",
"warc_metadata": {
"Content-Length": "173556",
"Content-Type": "application/http; msgtype=response",
"WARC-Block-Digest": "sha1:IJE5MRXB5NERFV5JXH5E53L25ZWFLWCY",
"WARC-Concurrent-To": "<urn:uuid:3821b143-7805-47d4-8077-9eefa61f1a05>",
"WARC-Date": "2023-03-21T10:08:37Z",
"WARC-IP-Address": "104.26.4.73",
"WARC-Identified-Payload-Type": "text/html",
"WARC-Payload-Digest": "sha1:5T7332JP4NVGI3HQINV3Z4I5MXY3P7HU",
"WARC-Record-ID": "<urn:uuid:b90463ff-53a9-4052-b040-aabc556ce9f6>",
"WARC-Target-URI": "https://www.getdroidtips.com/fix-gears-5-error-gw502-gw503/",
"WARC-Truncated": null,
"WARC-Type": "response",
"WARC-Warcinfo-ID": "<urn:uuid:687f1e83-9a31-4c51-9b73-b16a536c17a1>"
},
"warc_info": "isPartOf: CC-MAIN-2023-14\r\npublisher: Common Crawl\r\ndescription: Wide crawl of the web for March/April 2023\r\noperator: Common Crawl Admin ([email protected])\r\nhostname: ip-10-67-67-195\r\nsoftware: Apache Nutch 1.19 (modified, https://github.com/commoncrawl/nutch/)\r\nrobots: checked via crawler-commons 1.4-SNAPSHOT (https://github.com/crawler-commons/crawler-commons)\r\nformat: WARC File Format 1.1\r\nconformsTo: https://iipc.github.io/warc-specifications/specifications/warc-format/warc-1.1/"
}
|
{
"line_start_idx": [
0,
35,
36,
644,
645,
1144,
1145,
1180,
1181,
1216,
1217,
1356,
1357,
1464,
1465,
1550,
1551,
1566,
1567,
1993,
1994,
2018,
2019,
2322,
2323,
2349,
2350,
2581,
2582,
2614,
2615,
3005,
3006,
3098,
3099,
3113,
3114,
3185,
3186
],
"line_end_idx": [
35,
36,
644,
645,
1144,
1145,
1180,
1181,
1216,
1217,
1356,
1357,
1464,
1465,
1550,
1551,
1566,
1567,
1993,
1994,
2018,
2019,
2322,
2323,
2349,
2350,
2581,
2582,
2614,
2615,
3005,
3006,
3098,
3099,
3113,
3114,
3185,
3186,
3266
]
}
|
{
"red_pajama_v2": {
"ccnet_original_length": 3266,
"ccnet_original_nlines": 38,
"rps_doc_curly_bracket": 0,
"rps_doc_ldnoobw_words": 0,
"rps_doc_lorem_ipsum": 0,
"rps_doc_stop_word_fraction": 0.38109755516052246,
"rps_doc_ut1_blacklist": 0,
"rps_doc_frac_all_caps_words": 0.041158538311719894,
"rps_doc_frac_lines_end_with_ellipsis": 0,
"rps_doc_frac_no_alph_words": 0.14786584675312042,
"rps_doc_frac_unique_words": 0.4578096866607666,
"rps_doc_mean_word_length": 4.685816764831543,
"rps_doc_num_sentences": 33,
"rps_doc_symbol_to_word_ratio": 0,
"rps_doc_unigram_entropy": 5.0624895095825195,
"rps_doc_word_count": 557,
"rps_doc_frac_chars_dupe_10grams": 0,
"rps_doc_frac_chars_dupe_5grams": 0.031034480780363083,
"rps_doc_frac_chars_dupe_6grams": 0.031034480780363083,
"rps_doc_frac_chars_dupe_7grams": 0.031034480780363083,
"rps_doc_frac_chars_dupe_8grams": 0,
"rps_doc_frac_chars_dupe_9grams": 0,
"rps_doc_frac_chars_top_2gram": 0.050574708729982376,
"rps_doc_frac_chars_top_3gram": 0.02490421012043953,
"rps_doc_frac_chars_top_4gram": 0.027586210519075394,
"rps_doc_books_importance": -299.1686706542969,
"rps_doc_books_importance_length_correction": -299.1686706542969,
"rps_doc_openwebtext_importance": -151.1055145263672,
"rps_doc_openwebtext_importance_length_correction": -151.1055145263672,
"rps_doc_wikipedia_importance": -121.6584701538086,
"rps_doc_wikipedia_importance_length_correction": -121.6584701538086
},
"fasttext": {
"dclm": 0.03262782096862793,
"english": 0.9269915223121643,
"fineweb_edu_approx": 1.2266968488693237,
"eai_general_math": 0.0026925199199467897,
"eai_open_web_math": 0.030061839148402214,
"eai_web_code": 0.00020403000235091895
}
}
|
{
"free_decimal_correspondence": {
"primary": {
"code": "004.16",
"labels": {
"level_1": "General works, books and libraries, information sciences",
"level_2": "",
"level_3": "Computers and Computer science"
}
},
"secondary": {
"code": "005.457",
"labels": {
"level_1": "General works, books and libraries, information sciences",
"level_2": "",
"level_3": "Computer programming"
}
}
},
"bloom_cognitive_process": {
"primary": {
"code": "3",
"label": "Apply"
},
"secondary": {
"code": "2",
"label": "Understand"
}
},
"bloom_knowledge_domain": {
"primary": {
"code": "3",
"label": "Procedural"
},
"secondary": {
"code": "1",
"label": "Factual"
}
},
"document_type_v1": {
"primary": {
"code": "3",
"label": "Reference/Encyclopedic/Educational"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"extraction_artifacts": {
"primary": {
"code": "3",
"label": "Irrelevant Content"
},
"secondary": {
"code": "0",
"label": "No Artifacts"
}
},
"missing_content": {
"primary": {
"code": "0",
"label": "No missing content"
},
"secondary": {
"code": "-1",
"label": "Abstain"
}
},
"document_type_v2": {
"primary": {
"code": "23",
"label": "Tutorial"
},
"secondary": {
"code": "21",
"label": "Customer Support"
}
},
"reasoning_depth": {
"primary": {
"code": "2",
"label": "Basic Reasoning"
},
"secondary": {
"code": "1",
"label": "No Reasoning"
}
},
"technical_correctness": {
"primary": {
"code": "4",
"label": "Highly Correct"
},
"secondary": {
"code": "3",
"label": "Mostly Correct"
}
},
"education_level": {
"primary": {
"code": "1",
"label": "General Audience"
},
"secondary": {
"code": "2",
"label": "High School Level"
}
}
}
|
672f1e42c33a7f9846924a2431ea77df
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.