url
stringlengths 13
4.35k
| tag
stringclasses 1
value | text
stringlengths 109
628k
| file_path
stringlengths 109
155
| dump
stringclasses 96
values | file_size_in_byte
int64 112
630k
| line_count
int64 1
3.76k
|
---|---|---|---|---|---|---|
https://cfp.devoxx.fr/2018/speaker/josh_long.html | code | Josh Long is the Spring developer advocate at Pivotal. Josh is the lead author on 4 books and instructor in one of Safari's best-selling video series, all on Spring. Josh likes solutions that push the boundaries of the technologies that enable them. His interests include cloud-computing, business-process management, big-data and high availability, mobile computing and smart systems. He blogs on spring.io or on his personal blog and on Twitter (@starbuxman). | s3://commoncrawl/crawl-data/CC-MAIN-2019-22/segments/1558232256778.29/warc/CC-MAIN-20190522083227-20190522105227-00098.warc.gz | CC-MAIN-2019-22 | 461 | 1 |
https://members.boardhost.com/spiers/msg/1466793336.html | code | : Dear Ron,
: I am researching a book about the
: London restaurant industry and I
: would love to know more about Felix
: Spiers' involvement in the Holborn,
: and Criterion etc.
: I note that you have written a book
: called Pond & Spiers - is it
: available to buy? I am afraid I
: cannot get to the British Library
: anytime soon so I would be very
: interested to know how I might get a
: Thank you so much.
: Kind regards
: Bee Costello | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335424.32/warc/CC-MAIN-20220930020521-20220930050521-00417.warc.gz | CC-MAIN-2022-40 | 442 | 15 |
https://lists.gnupg.org/pipermail/gcrypt-devel/2018-February/004400.html | code | Attack on libgcrypt's ElGamal Encryption with Proof of Concept (PoC)
w.k at berkeley.edu
Sat Feb 17 01:53:47 CET 2018
Pardon me for the short reply. Recent I got crazy with some other stuff...
(1) For the PyCrypto, we actually attack PyCryptoDome
(https://www.pycryptodome.org/), which is currently maintained by
Helder Eijs. We extend our results to PyCrypto.
(2) It would be fine for signatures. But the problem is when we use
ElGamal for encryption, the confidentiality has problems! Exactly as
what you point out.
RSA is still not perfect -- it does not support multiplicative
homomorphism when we want security.
On Fri, Feb 16, 2018 at 4:36 PM, Ben McGinnes <ben at adversary.org> wrote:
> On Wed, Feb 07, 2018 at 12:14:46AM -0800, Weikeng Chen wrote:
>> I am Weikeng Chen from UC Berkeley. This post is joint work with
>> Erik-Oliver Blass from Airbus.
> Hmmm, let me see if I'm following this correctly ...
>> Libgcrypt is one of the very few cryptographic libraries that
>> implements ElGamal. In the homepage, we see "Libgcrypt is a general
>> purpose cryptographic library."
> Correct. Libgcrypt is a general purpose library, but that does not
> mean that every algorithm, cipher and/or hash in it is general purpose
> or ever intended to be implemented that way. For instance it also
> contains Serpent, a popular and strong cipher used with disk and
> volume encryption, but you won't find it in the OpenPGP implementation
> of GPG.
> The correct application of any of the algorithms to be found in
> libgcrypt is still determined by the projects which include libgcrypt
> as a dependeny, not libgcrypt itself.
>> ElGamal is a cryptographic algorithm with efficient multiplicative
>> homomorphism, the ability of self re-randomization, and the support
>> of key splitting. Its applications include voting, mix-nets,
>> shuffling, etc. I am glad that libgcrypt implements this algorithm.
> You're not the only one glad of it.
>> However, handling the ElGamal is hard. The ElGamal implementation is
>> not secure for general purposes. If we use libgcrypt to encrypt
>> messages directly, rather than using for hybrid encryption, the
>> security can be broken.
> This is not new, it is well known and is, in fact the reason why
> El-Gamal has only ever been implemented as an assymmetric cipher
> within the OpenPGP specification. Even when first implemented in
> OpenPGP in the late 1990s it was always paired with DSA, first DSA-1
> and subsequently DSA-2 when vulnerabilities were found in the former.
> For instance, you will never see a signing or certification El-Gamal
> key in any of the OpenPGP formats. You will only ever see it as an
> encryption only subkey; mostly with DSA certification keys, but
> occasionally with RSA certification keys. Indeed, if you verify the
> OpenPGP signatures on this list and thus import the relevant keys you
> can see one as you read this message.
>> We prepared the attack on the Github:
> Yeah, speaking of which, I noticed you also cited a similar attack
> targeting the El-Gamal implementation in the PyCrypto library.
> You are aware that PyCrypto is a dead project and no longer
> maintained, right?
> In fact it hasn't been maintained for several years. Most mainstream
> Python development requiring a cryptographic module now uses the
> cryptography.py package instead and the original PyCrypto developer
> has moved on to contributing to that project. Though some also use
> the NaCl package, which leverages libsodium to implement Daniel
> Bernstein's elliptic curve implementations.
>> The wiki page for explanation:
> We'll certainly take a long hard look at it, though I think I'll defer
> to Niibe on this one, his maths and cryptographic skills are sharper
> than mine.
>> Suggestions: I would suggest libgcrypt to consider either one of two
>> things as follows.
>> (1) Announce on the manual that ElGamal in libgcrypt should *only be
>> used for hybrid encryption*:
> The document you cite is essentially an index of what's in the
> library, it is quite accurate.
>> This prevents new libgcrypt's users from possible misuse of the
>> ElGamal implementation for the purposes not considered by us.
> This would be better served by a separate guide for developers
> explaining these things as relevant for all the ciphers and hashes in
> the library than singling out any one at the expense of others. More
> and more accurate documentation is always better than less.
>> (2) Consider the implementation of ElGamal with semantic security,
>> which would better be another algorithm in addition to current
> Again, this draws back to the use of any given component of libgcrypt
> in other projects, including GnuPG. In that particular case, of
> course, there is an additional algorithm used at the same level of
> operation: RSA.
>> One problem is about current ElGamal's prime generation. It is hard
>> to make the current prime generation, which is fast, secure. There
>> is a reason to find p=2q+1 where p and q are both primes.
> This is definitely where I'd ping Niibe for his opinion. If and/or
> when he has the time for it.
Weikeng Chen @ 795 Soda Hall
More information about the Gcrypt-devel | s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323585186.33/warc/CC-MAIN-20211018000838-20211018030838-00396.warc.gz | CC-MAIN-2021-43 | 5,169 | 89 |
https://woofy.org/how-to-convert-vmware-workstation-virtual-machine-2/ | code | Vmware workstation 14 export to esxi free. How to convert a VMware Workstation VM into an ESXi one with vCenter Converter
3) Make sure network connectivity is OK and firewalls are opened between VMware workstation host and ESXi server. In workstation go to File on menu and select Import or Export. 4) Select Virtual Appliance in source type. 5) Browse the virtual machine’s configuration file VMX in next screen as shown below. Aug 01, · You bet! ESXi is still free from VMware! You can get your free ESXi 7 license by signing up for a my VMware Account. Is VMware Free? VMware ESXi is free, which is the hypervisor product from VMware, and so is VMware player which you can use to run virtual machines on your Windows or Linux desktop. Other VMware products provide 60 day free trial. Jul 11, · In this section, I will introduce you how to restore virtual machine in VMware Workstation. Case 1. Restore VM from VMDK file in Workstation. 1. Launch VMware Workstation, click File on the toolbar and select New Virtual Machine. 2. In the pop-up wizard, select configuration type as Custom, and click Next. 3.
How to Upload VMware Workstation VM to ESXi Server
Want Live Phone Help? Call Us. They like us, You Should Too. This default setting is unfortunately not very useful from a performance perspective. File access in Windows, however, is much better optimized when you are dealing with one large fixed file instead of many interdependent small ones.
Unfortunately merging those pieces afterwards requires downtime. VMDK is the new file, which will be created as a single, growable virtual disk. By the way instead of -t 0 you could use -t 2 for a preallocated single disk, which is the best choice for perfomance.
Fragmentation of dynamically growing virtual disks is a major issue on all virtualization platforms. Ideally you would want to go through all your VMDKs and convert them to preallocated disks.
Then run a defrag on the host before powering them up again. The advantage is obvious: you only need to do this once. Announcing the arrival of Valued Associate Dalmarus. I have tried to disable the boot item of the program, but it seems to be of no help. The [comma] tag is being burninated. Memory 3 or 4 GB for a machine. I know, kind of a vague question but I have nowhere else to turn to. By the office standard edition free instead of -t 0 you could use -t 2 for a preallocated single disk, which is the best choice for perfomance.
Ideally you would want to go through all vmware workstation 14 running slow free VMDKs and convert them to preallocated disks. They will never need a defrag on the host again once they are set it place. Those are handy and unfortunately very inefficient at the same time.
They multiply the overhead required to perform a simple disk access and slow down reads as well as writes. Snapshots can also cause additional disk fragmentation, so you would want to consider whether the convenience is worth the performance impact. VSS is used internally in Windows to provide file vmware workstation 14 running slow free. A backup tool, however, is much better at that and without the performance penalty of VSS shadows.
The command is:. Do the above optimization for all drives you have, especially the system drive and the drive containing the VMDKs. If you are using System Restore, turn it off completely. EXE you may find a scheduled shadow task that created shadows periodically. SSD is obviously much faster but keep in mind it has a much faster wear and tear compared to magnetic drives.
Disk space! Free disk space does indeed speed up disk access. The explanation is too long to be added here but it basically has to do with how NTFS works internally.
Add additional hard drives, ideally SSD, and split the load. Move certain VMs to their own hard drives for better performance. VSS is also more likely to work much more efficiently when volumes are kept small and when disk writes are rather low during backups. The above tweak greatly increases NTFS cache size which reduces disk access rates. It likely increases hard disk life expectancy, too, but keeping frequently accessed blocks in RAM definitely speeds things up.
For step-by-step backup instructions, see: backup of a VM while running. If you choose to create a clone, you will need to provide a Name and Location for this new virtual machine. And then click Finish to change the hardware compatibility. Specify a destination location to store the exported files, and then click Save.
The manifest file ends with. On Select storage tab, specify a datastore to store the VM files, then click Next. On Deployment options page, select the Network mappings , Disk provisioning , and Power on automatically or not. On Ready to complete page, review the settings and click Finish to start. You can see the progress in Recent tasks. Before you start, you still need to change the hardware compatibility.
Provide a Name for the new virtual machine and specify a Datastore that will be used to store it. Then click Finish to start upload. In this way, you can backup virtual machines as physical machines, and restore to any operating systems on any environments as you like.
You can even migrate data between physical machines just like P2V VMware migrations. It is easy, and familiar to most people. Next, I will demonstrate the detailed steps. You can click the following button to start a free trial. Check the target virtual machines with a static IP from the Computers list, and click Request Control. It will pop up a request window on these machines, once you are authorized you can backup whenever you like. You can change the task name by moving the cursor over the task name and click on it.
There are 3 steps to follow. You may be getting started with virtualization through VMware Workstation.
Vmware workstation 14 export to esxi free.How to export a Virtual Machine using the VMware OVF Tool
Aug 01, · You bet! ESXi is still free from VMware! You can get your free ESXi 7 license by signing up for a my VMware Account. Is VMware Free? VMware ESXi is free, which is the hypervisor product from VMware, and so is VMware player which you can use to run virtual machines on your Windows or Linux desktop. Other VMware products provide 60 day free trial. Click here to Download. Jun 23, – VMware Workstation Pro 14 for free it includes many product keys and the installation software in a ZIP folde Skip to main content Due to a planned power outage on Friday, 1/14, between 8am-1pm PST, some services may be impacted. Sep 07, – VMware Workstation and VMware Tools September 7, 1 minute read Introduction. Jul 23, · Looking for: Search results for ‘remove+program+windows+10’ – Click here to DOWNLOAD Microsoft office tidak bisa di uninstall free.
How to convert a VMware Workstation VM into an ESXi one.Copy VMware Workstation VM to ESXi: Home Lab – Virtualization Howto
Sometimes you may need to move a pre configured server OS virtual machine to VMware vSphere 4 to save time on installation and configurations. I have a running ESXi 4. If vmware workstation 14 export to esxi free removed now, converter will remove them with warning message later. In workstation go to File on menu and select Import fere Export. In next screen you can select and resize the disks which should be exported.
The same details provided to connect through vSphere client. Give a name and go to next step. Otherwise select local host and press Next. My ESXi server have single datastorage. Network cards can be added during export by selecting wprkstation of NICs. Customize the identity of the vmware workstation 14 export to esxi free machine is very important in production environment due to приведу ссылку machine ID, host name, licensing and domain networking.
Warning messages can be seen on progress dialog box. Export succeeded after fixing the space issue. Because of I selected power on option, exported virtual machine is up and running on server after conversion completed.
It is very simple vmwaare useful if all workdtation correct. This will be helpful to configure and test Operating Systems on local computer before exporting to live servers. Stay tuned with Sysprobs. Here is the working OS. | s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500357.3/warc/CC-MAIN-20230206181343-20230206211343-00520.warc.gz | CC-MAIN-2023-06 | 8,235 | 24 |
http://shannonkendall.com/ | code | Hello. My name is Shannon Kendall. I am a Software Engineer and Full Stack Developer here in Atlanta, Georgia. I just recently moved from Charlotte, where I was a Web and Graphic Designer for eight years.
I am looking to build upon my expertise as a coder and my passion for problem solving. For my free time, I love writing, watching baseball, football, spending time with my wife, family and friends.
Recently, I have worked with HTML5 and CSS3 to build responsive websites. I’ve managed and coordinated the design and marketing for multiple brands, including logo and identity design. I have worked within teams overseeing professionals from initiation to completion, creating and maintaining multiple websites. Click through my site and contact me at your leisure.
Scroll Down to see Projects and More
Buddy Locator - Friend Finder
This APP was uploaded to Heroku.
What is it? Exquisite Corpse. Exquisite corpse, also know as exquisite cadaver (from the original French term cadavre exquis), is a method by which a collection of images or words is collectiveley assembled from various users.
The application uses Google Authentication to login/verify the user. Once the user logins, they can either create a new story or add to an existing story.
React Clicky Game
A Clicky game that uses React and Github. Presenting it through the React Dom and with React Compoenents.
Produces HTML and CSS. Test your memory with popular loony toons and nick cartoons.
Fun project for a team I love. The GIF's are from GIPHY.
API Calls, JS and JQuery - College Football Gifs.
GIPHY API to make a dynamic web page that populates with gifs of your choice.
Train Scheduler and Firebase Database Work.
Created a train schedule application that incorporates Firebase to host arrival and departure data.
Retrieved and manipulated information with Moment.js
This website provides up-to-date information about various trains, namely their arrival times and how many minutes remain until they arrive at their station.
Applicaiton using a terminal like siri.
Applicaiton using a terminal like siri to find movies, concerts and songs on your app.
LIRI is a node app that takes in parameters and gives you back data.
A arcade hangman word-guess game. Guess your favorite video arcade games from the 80's.
Learn what's going on throughout the world today through Yahoo News.
When the page opens it scrapes the Yahoo News Website through an API. Routed back to handlebars. It shows on the homepage.
100 of the latest news stories throughout today! Please leave a comment, collected back in our MongoDatabase.
Fun game highlighting a use of Jquery.
When the player clicks on a crystal, it will add a specific amount of points to the player's total score.
The player wins if their total score matches the random number from the beginning of the game.
The app is dynamically updated on an HTML page with a JQuery library.
Implementing a Amazon like MySQL like database using Node to update the database as the user sees fit.
This NPM package uses Inquirer and MySQL packages in a JSON file.
A Song of Fire and Ice Hangman
This is a terminal, node, constructor, word game. Find your favorite 'Song of Fire and Ice' Book.
Application that will locate local videos via a Google Map API.
Who's watching what on youtube? A Google API shows local restaurants and bars in the area.
HTML, CSS, JS, Jquery, JAX Calls, Google API, Youtube API, and Firebase.
A burger logger that uses MySQL, Node, Express, Handlebars and homemade ORM, Yum!
Logs burgers, follows an MVC design pattern, uses MySQL, Node, Express, Handlebars and ORM
Hosted on Heroku. Create a burger and log / eat a burger. | s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578526228.27/warc/CC-MAIN-20190418181435-20190418202338-00021.warc.gz | CC-MAIN-2019-18 | 3,653 | 39 |
https://learn.microsoft.com/en-us/previous-versions/tn-archive/bb914045(v=technet.10) | code | Chapter 17 - Antigen Spam Manager overview
Applies to: Microsoft Antigen
The Antigen Spam Manager (ASM) provides sophisticated and robust spam detection and removal through the integration of Cloudmark anti-spam engine. The Antigen Spam Manager also provides the following features:
- Identify: tag message action on detection to allow the routing of spam messages to Junk Mail folders.
- Integration with Microsoft® Exchange Server 2003 anti-spam options.
- ASM Junk Folder for Microsoft Office Outlook® users and the ability for Outlook users to create allowed senders lists and block lists (Microsoft Exchange 2000 Server only).
With the release of Microsoft Antigen and the Antigen Spam Manager, the Junk Mail Folder features on the Exchange 2003 platform are unified. This improves usability and consolidates feature sets across the Antigen and Exchange platforms. Therefore, the ASM Junk Mail Folder feature has been removed for the Exchange 2003 platform.
Antigen continues to support the ASM Junk Mail Folder for the Exchange 2000 platform.
Exchange 2003 provides built-in Junk E-Mail folder functionality in conjunction with Microsoft Outlook 2003. ASM fully supports this Junk E-Mail folder functionality through the use of the Spam Confidence Level (SCL) rating, which ASM can apply to e-mail messages determined to be spam.
When upgrading from older Antigen installations on an Exchange 2003 Server, existing ASM Junk Folders are left in the users’ Microsoft Office Outlook® clients, but do not receive suspected spam e-mail unless the user sets client-side rules to route messages that have been tagged by Antigen. The Block and Allow Sender buttons are still displayed in the folder, but any rules created by using them do not function.
If ASM is configured to set the SCL rating for a suspected spam e-mail and the SCL rating for a particular message is higher than the Store Action Threshold configured in the SMTP Scan Job pane, the message is routed to the Outlook Junk Mail folder.
For new ASM installations, the functionality for Microsoft Exchange 2000 Server and Exchange 2003 installations is:
- Exchange 2000—All functionality described in this chapter.
- Exchange 2003—All functionality with the exception of ASM Junk Folders and automatic routing of tagged messages (MIME header or subject line) to that folder. If messages are tagged by ASM, they will be delivered to the user’s inbox unless the user sets a client-side rule to route tagged messages to a Junk Mail folder.
Configuring the anti-spam scanning settings
ASM includes anti-spam settings that use the Cloudmark anti-spam engine to detect spam e-mail.
In Antigen Version 9 with Service Pack 2, the Cloudmark anti-spam engine was introduced as an improved anti-spam option. When performing a fresh installation of Antigen version 9 with Service Pack 2, Cloudmark is the anti-spam solution. To enable the Cloudmark engine for scanning, in the Antigen Administrator, click SETTINGS and then click Anti-Spam. In the Anti-Spam Settings pane, select the SMTP Scan Job and then select the Cloudmark Authority Engine check box. Next, configure the Action and whether to Send Notifications and Quarantine Files.
The action choices for the anti-spam scanning settings are as follows:
- Skip: detect only—Spam is reported but no other action is taken on the message.
- Purge: eliminate message—Deletes the entire message from your mail system. It cannot be recovered unless you selected to quarantine the message.
- Identify: tag message—For details, see About the Identify: tag message action .
Configuring Cloudmark updates
Cloudmark distributes anti-spam signature updates directly to the Antigen server. This differs from the other scan engines, which receive signature updates directly from Microsoft. Cloudmark signature updates occur automatically throughout the day; they are not configurable in the Antigen Administrator.
However, administrators can schedule Antigen to check to see if Cloudmark has released an engine update. (An engine update refers to updating to a new version of a scan engine (which replaces the old version), whereas a signature update refers to new signatures being added to an existing scan engine.) Because engine updates occur much less frequently than signature updates, it is recommended that engine updates be scheduled to occur once daily during off hours. Historically, an engine update occurs once every several months but these occur as needed. In the Antigen Administrator, click SETTINGS, and then click Scanner Updates. Use the Scanner Update Settings pane to schedule Cloudmark engine updates. It is also recommended that you click the Update Now button before scanning.
The Cloudmark engine utilizes HTTPS (port 443) to verify the user license while signatures are updated via HTTP (port 80). This requires that the Antigen server has the ability to connect to the Internet and that both port 80 and port 443 are open on any firewall through which the Antigen server connects. Administrators can verify the connection to the Cloudmark servers by running the following commands on the Antigen server:
- telnet cdn-microupdates.cloudmark.com 80
- telnet lvc.cloudmark.com 443
If you are not connecting to the required ports, you must configure your firewall to allow these connections.
Cloudmark uses the FSEContentScanner.exe process to receive signature updates. This uses approximately 80 MB initially, after which it uses an average of between 80 MB to 150 MB per 24-hour period, so that only a small amount of bandwidth is used every minute.
The Cloudmark anti-spam signature updates may fail when passing through a proxy server if NTLM Authentication is enabled. As a workaround, configure the proxy server to allow the Antigen server through anonymously.
Managing Cloudmark updates with FSSMC or AEM
Support for distributing Cloudmark engine updates is available in FSSMC Version 10 Rollup 3. You must have this version installed in order to be able to administer your Cloudmark engine updates using FSSMC. Note that Cloudmark signature updates are not managed by FSSMC because they are distributed directly from the Cloudmark servers. Cloudmark is not supported in Antigen Enterprise Manager (AEM).
Submitting false positives and false negatives to Cloudmark
You can submit false positives and false negatives to Cloudmark for analysis. Information regarding target spam catch-rates, false positive and false negative rates, and other advantages of using the Cloudmark anti-spam solution can be found on the Cloudmark anti-spam Web site.
To submit false positive or false negative spam e-mails to Cloudmark, send the e-mail as an RFC 2822 attachment (.eml). Do not send misclassified messages by using the Forward command; this strips them of essential header information and results in an invalid submission.
False positives (legitimate e-mail marked as spam by Cloudmark) should be sent to: [email protected]
False negatives (spam not detected by Cloudmark) should be sent to: [email protected]
To attach an e-mail message as an RFC 2822 attachment
In Microsoft Outlook, create a new e-mail message.
Address it to the appropriate address.
Click the Attach Item button, select the e-mails that were falsely classified, and then click OK.
Using the GTUBE anti-spam test file to determine whether Cloudmark is detecting spam
To ensure that spam is being properly detected by the Cloudmark engine, you should verify that a GTUBE message is caught as spam. Similar to the EICAR antivirus test file, GTUBE provides a test by which you can verify that Cloudmark is detecting incoming spam. A GTUBE message should always be detected as spam by the Cloudmark engine.
Include the following GTUBE text in a mail message on a single line, without any spaces or line breaks:
About the Identify: tag message action
When ASM is enabled, the Identify: tag message action is available for all filtering and anti-spam functions. This action enables administrators to select how they would like a suspect message to be tagged for later identification. You can choose from the following options:
Tag subject line
The text specified in the Tag Text dialog box is added to the subject line of the message. The Tag Text dialog box can be accessed by clicking the Tag Text button on the SMTP Scan Job Settings pane. This setting can be used to enable Outlook users to route suspected spam e-mail to a Junk Mail folder by setting client-side rules in their Outlook client.
The text specified in the Tag Text dialog box is added to the MIME header. This setting can be used to enable Outlook users to route suspected spam e-mail to a Junk Mail folder by setting client-side rules in their Outlook client.
Set SCL property
Sets the SCL Rating on the message indicating whether Antigen determined the message to be spam. To use this action, you must select the Enable SCL Rating option in the General Options pane. Antigen always sets the SCL Rating to level 9. The Store Action Threshold in the SMTP Scan Job Settings work pane must also be set to 8 or lower. Using this setting allows Outlook to route suspected spam e-mail to the Outlook Junk Mail folder.
Move to ASM Junk Mail
Routes all messages that match a content filter or are identified as spam to the ASM Junk Mail folder in the user’s Outlook desktop.
To use this action, you must select the Enable Junk Mail Folders option in the General Options pane (Exchange 2000 only).
Multiple options may be checked for each filter.
Outlook Junk Mail folders and user Junk Mail options
When installed on Exchange 2000 servers, ASM enables Outlook users to configure their own Junk Mail settings to block or approve specific senders. When the Junk Mail folders are enabled, administrators can use Antigen to tag suspected spam messages so that the messages are automatically routed to the ASM Junk Mail folder in Outlook.
To enable Junk Mail folders, administrators must first create the client side Junk Mail folders using the Antigen General Options setting Enable Junk Mail Folders. When the Junk Mail folders have been enabled, you must select the option Move to ASM Junk Mail as one of the actions in the Identify: tag message action selection box for the anti-spam scanning settings or for content filters.
The Windows® World Wide Web Publishing Service must be started, IIS must be installed, and for Exchange 2000, the .NET Framework must be installed for ASM Junk Mail folders to function properly.
If your IIS server is configured to use SSL and you are using the ASM Junk Mail feature, you must change the Antigen registry DWORD value named UsingSSL to 1.
When the ASM Junk Mail folders have been created, the following settings will be enabled in Outlook for each user:
Enables users to add safe e-mail senders to a personal allowed senders list.
Enables users to add unwanted e-mail senders to a personal block list.
Enables users to edit their approve sender and block sender rules.
Purge Junk Mail
Enables users to purge their Junk Mail folder manually or schedule a purge cycle.
To access the Junk Mail folder, click the ASM Junk Mail folder that appears in the Outlook All Mail Folders area of the navigation shuttle.
The page displays any junk mail that is addressed to the user that has been identified by Antigen. Click the appropriate button in the menu bar to approve or block specific senders, edit rules, or configure the purge cycle for the Junk Mail folder. Each job is described in the following sections.
Outlook server-side rules take precedence over ASM Junk Mail folder settings.
If the Outlook user’s Microsoft Internet Explorer® settings are configured to use a proxy server, the Bypass proxy server for local addresses option must be checked for the user to access the ASM Junk Mail homepage. (To set this option in Internet Explorer, select Internet Options from the Tools menu. Next, click the Connections tab and then click LAN Settings. In the Local Area Network (LAN) Settings dialog box, select the Bypass proxy server for local addresses check box, and then click OK two times to exit the Internet Options dialog box.)
If a user sets the AutoArchive feature for the ASM Junk Mail folder by using the Properties settings for the folder, the setting overrides the ASM Purge: eliminate message setting.
If mail is incorrectly identified as spam, you can configure Antigen to allow future messages from the user to bypass spam filtering or content filtering. To do so, select a message from a sender you trust and click the Approve Sender button. The message is moved to the inbox and future messages from the sender are not filtered by the anti-spam engine or content filtering. Each sender to be trusted must be configured individually.
If spam has been missed and delivered to your inbox, you can configure Antigen to block messages from the same user in the future. To do so, you must first move unwanted messages from your inbox to the ASM Junk Mail folder using Outlook’s Move to Folder function. When the mail is in the ASM Junk Mail folder, select the message, and then click the Block Sender button. The message is deleted from the Junk Mail folder and future messages from the sender are automatically blocked. Each sender to be blocked must be configured individually.
To edit the approve sender and block sender rules, click ASM Manager. The Advanced Spam Manager work pane opens to enable you to modify your Junk Mail folder rules.
All rules that are currently enabled are displayed in the window. You can edit, delete, or add rules as needed.
To delete a rule, click Delete in the column of the rule that you want to delete.
To edit a rule, click Edit in the column of the rule that you want to edit. A work pane appears so that you can modify the sender e-mail address.
To modify the e-mail address in the rule, click Update. A dialog box appears for the e-mail address field. After you make changes, click OK to accept the changes or click Cancel to discard the changes.
To add a rule, click the Add Rule button, and then complete the following fields in the Add Rule dialog box:
Select Approve or Block.
Enter the e-mail address that you would like to approve or block.
Click OK when you have completed both fields.
Purging Junk Mail
Antigen can be configured to purge your ASM Junk Mail folder at set intervals. Click the Mail Purge button and enter the number of days that you would like messages to remain in your ASM Junk Mail folder. | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335365.63/warc/CC-MAIN-20220929194230-20220929224230-00630.warc.gz | CC-MAIN-2022-40 | 14,485 | 84 |
https://callforpapers.2021.foss4g.org/foss4g2021/speaker/LTMFMB/index.html | code | Geospatial software engineer and open source enthusiast working at Camptocamp (see also https://www.linkedin.com/in/marion-baumgartner-b1897b26/)
What are the possibilities to show business data on a cartographic map in a way that insight on sales information of a company and its potentials can be gained? How is it possible to visualize this complex combination of data in such a way that the usability is maximised?
These are the questions we faced while answering a customer request. The result is a flexible business intelligence application based on open source technologies. | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572043.2/warc/CC-MAIN-20220814143522-20220814173522-00082.warc.gz | CC-MAIN-2022-33 | 581 | 3 |
https://github.com/tomasvitek/Game-of-Life | code | Game of Life
Game of Life is a zero-player game based on John Conway's cellular automaton as published in 1970 written in C#.
The app is in Czech language.
- You can choose from predefined patterns, or create your own and export or import them.
- You can set the evolution rules.
- You can simulate step by step, or animate the evolution in different speeds.
- The app should run on every Windows with .NET Framework installed. | s3://commoncrawl/crawl-data/CC-MAIN-2019-35/segments/1566027316785.68/warc/CC-MAIN-20190822064205-20190822090205-00234.warc.gz | CC-MAIN-2019-35 | 427 | 7 |
https://placesociale.com/world/about-3/ | code | Thanks to our various digital solutions we can help you to attract more people to your event, activity, community or destination.
Connect to the International Community.
Explore the World.
(Arabic, English, Chinese, French, German, Spanish)
Attend to the next Fooball match.
Attend to the next Tennis match.
Attend to the next Baseball game.
Attend to the next MotoGP race.
Don't miss the next rugby match. | s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224643462.13/warc/CC-MAIN-20230528015553-20230528045553-00020.warc.gz | CC-MAIN-2023-23 | 406 | 9 |
http://loiter.co/v/manson-feat-bob-odenkirk/ | code | "Manson" (feat.) Bob Odenkirk
This Guy Can Really Handle A Rejection
I think I have found a new religion
"Frazil Ice": when water in Yosemite flows like lava
comments powered by Disqus. | s3://commoncrawl/crawl-data/CC-MAIN-2018-05/segments/1516084890893.58/warc/CC-MAIN-20180121214857-20180121234857-00450.warc.gz | CC-MAIN-2018-05 | 185 | 5 |
https://www.rightwinggranny.com/?tag=kudzu | code | Over the years, men have done things in the rhealm of nature that have not exactly worked out as they planned. The Marine Mammals Protection Act of 1972 resulted in a dramatice increase of the seal population off off Cape Cod, Massachusetts. That was a nice gesture to save the seals, but it resulted in an influx of great white sharks in the area because of the increased food supply for the sharks. There is also the example of kudzu, which was introduced to Americans during the Philadelphia Centennial Exposition in 1876 where it was touted as a great ornamental plant for its sweet-smelling blooms and sturdy vines. From the 1930’s to the 1950’s the Soil Conservation Service promoted it as a great tool for soil erosion control and planting it was encouraged throughout the south. Kudzu is now recognized as an invasive plant and has killed multiple trees throughout the southern United States. Gypsy moths came from a scientist in Massachusetts who was trying to breed a more hearty breed of silkworm to create silk for America. A few escaped and have the resulting moths have now gone as far south as New Jersey. It’s not good to mess with mother nature.
On Wednesday,The Daily Caller reported the following:
Field biologists discovered an 18-foot invasive Burmese python weighing 215 pounds in the Florida Everglades.
Researchers from the Conservancy of Southwest Florida believed their scale was broken when they weighed the beast, as none of them could comprehend a Burmese python would ever grow so huge, National Geographic reported Tuesday. The snake, the largest ever discovered in Florida, was captured using a male scout snake with a GPS tracker attached to it, the outlet continued. Burmese pythons are effectively impossible to spot without scout snakes, according to BroBible.
The article explains that these snakes are not native to Florida. The snakes were probably introduced by pet owners whose pets excaped or who let their pets loose because they got too big. It is frightening to me that they found deer hoof cores inside the animal. Please follow the link to read the entire article for further details. | s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656104683020.92/warc/CC-MAIN-20220707002618-20220707032618-00332.warc.gz | CC-MAIN-2022-27 | 2,137 | 5 |
https://forums.freebsd.org/threads/can-you-use-wayland-with-a-simple-window-manager.81606/ | code | Can you use wayland with a simple window manager i.e. not kde or gnome ?
Not related, sway does not seems to compile because dependency sysutils/seatd does not compiles because of a checksum error.
# cd /usr/ports/sysutils/seatd # rm -rf work/ # make clean # make distclean # make && make install
# make distcleanremoves the distfile. That forces a re-download of the tarball, and it will get re-checked, and then the checksum should be OK.
Don't want to use a simple WM.
Don't want a big cumbersome DE.
Will wayland every work with xfce?
Did you changed the sway config file. Which improvements did you made ?
gaps inner 2 gaps outer 2 default_border pixel 2 | s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446710962.65/warc/CC-MAIN-20221204040114-20221204070114-00442.warc.gz | CC-MAIN-2022-49 | 659 | 9 |
http://people.auc.ca/brodbeck/blog/?tag=disorders | code | This one’s sorta sad, but at least through dysfunction we’ve learned some stuff about function.
Music ‘Light Blue Room’ by Battery Life
Evolution and disorders, really interesting stuff.
Music ‘Master Deadender’ by Bubble
Here’s the paper by Nesse and the follow up letters to the editor | s3://commoncrawl/crawl-data/CC-MAIN-2021-10/segments/1614178370752.61/warc/CC-MAIN-20210305091526-20210305121526-00195.warc.gz | CC-MAIN-2021-10 | 301 | 5 |
https://community.openfl.org/t/debug-profile/1873 | code | Im new to openFL and have some questions about debuging.
is there a easy way to debug shapes like on phaser ? : http://phaser.io/examples/v2/debug/debug-display
I know It;s different language but it would be very helpfull to if you can use some function to debug boundries of your sprite in some cases (like many nested sprites)
second thing is there a some easy method to profile Your application ?
I have some method and there is significant frame drop but I use there a method that use another method and so on… And I want to know what part of my code is most time consuming. | s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662545548.56/warc/CC-MAIN-20220522125835-20220522155835-00114.warc.gz | CC-MAIN-2022-21 | 580 | 5 |
http://freecode.com/2013/2/15 | code | Fortools_dd is a set of forensic apps, created with zenity, for terminal commandos and bash scripts in Linux. It includes Mount_dd (a mounting images app), kijknekerap (a Dutch Terminal app), fgrep_dd (grep apps), convert_dd (a conversion app for aff > dd > EWF), shred_dd (a shredding app), filecopy_dd (a search-and-copy app), forensic_wine_dd (a Windows software with Wine app), reportmaker_dd (a small reportmaking app), Browserhistory_dd (a history app), and Offsetgrabber_dd (an offset viewing app).
Release Notes: This is the first freecode.com release.
libxmp is a module player library which supports many mainstream and obscure module formats, including Protracker MOD, Scream Tracker III S3M, and Impulse Tracker IT. Possible applications for libxmp include standalone module players, module player plugins for other players, module information extractors, background music replayers for games and other applications, module-to-mp3 converters, etc.
Release Notes: This is the first stable release of libxmp. It has many improvements over the xmp 3.5 module playing engine, including extensive code refactoring, improved IT support, better sound quality, more built-in decompressors, and many bugfixes.
The Extended Module Player is a command-line mod player for Unix-like systems that plays over 90 mainstream and obscure module formats from Amiga, Atari, Acorn, Apple IIgs, C64, and PC, including Protracker (MOD), Scream Tracker 3 (S3M), Fast Tracker II (XM), and Impulse Tracker (IT) files.
Release Notes: This is the first stable player version built on top of libxmp. Changes from the previous release include better replay quality, improved IT support, and extensive code refactoring.
phpMyAdmin is a tool intended to handle the administration of MySQL over the Web. It can create, rename, and drop databases, create/drop/alter tables, delete/edit/add fields, execute any SQL statement, manage keys on fields, create dumps of tables and databases, export/import CSV data, and administrate one single database and multiple MySQL servers.
Release Notes: A problem with white page display on Safari was fixed.
Diskless Remote Boot in Linux (DRBL) provides a diskless or systemless environment for client machines. It works on Debian, Mandriva, Red Hat, Fedora, and SuSE. Unlike LTSP, it uses distributed hardware resources and makes it possible for clients to fully access local hardware. It also includes Clonezilla, a partitioning and disk cloning utility similar to Symantec Ghost.
Release Notes: The underlying GNU/Linux operating system was upgraded. This release is based on the Debian Sid repository (as of 2012/Dec/23). DRBL was updated to 2.3.5-drbl1, and Clonezilla was updated to 3.3.5-drbl1.
SQLScreens is a simple relational database screen form generator written in TCL/TK. It will let you create query screens very quickly by specifying what data (tables and columns) you want to see and what operations should be allowed (query/update, etc.). It will take care of creating the user interface and the behind-the-scenes SQL. SQLScreens can be used with different backend database systems, and includes direct support for MySQL, SQLite, and INFORMIX, and ODBC for others.
Release Notes: This version adds support for the SQLIte database.
French Word Searches is designed for beginner to intermediate learners of French, such as those preparing for the UK GCSE French exam. It allows the user to play word searches based on 1,200 items of essential French vocabulary. Word searches may be tailored to the user's desired combination of topics.
Release Notes: Some minor improvements have been made to the UI.
pngcrush is an excellent batch-mode compression utility for PNG images. Depending on the application that created the original PNGs, it can improve the file size anywhere from a few percent to 40% or more (completely losslessly). The utility also allows specified PNG chunks (e.g. text comments) to be inserted or deleted, and it can fix incorrect gamma info written by Photoshop 5.0 as well as the erroneous iCCP chunk written by Photoshop 5.5.
Release Notes: This version implements the "-reduce" option properly. This examines the input file to see if the color type, bit depth, and palette length can be reduced without loss, and if there is an opaque alpha channel which can be removed.
libpng (PNG library) is a collection of routines used to create and manipulate PNG format graphics files. The PNG format was designed as a replacement for GIF and, to a lesser extent, TIFF, with many improvements and extensions.
Release Notes: This release adds a "simplified API" and removes some symbols which were deprecated in libpng15.
pyexpander is a macro processor based on Python. Instead of simple text replacement, it offers evaluation of arbitrary Python expressions and execution of Python code. It features simple syntax definition: all expander commands start with a dollar sign ("$") followed by word characters, parameters, Python code enclosed in brackets, or a combination of these. The full power of the Python programming language can be used, including all operators, functions and modules. Any Python expression can be used to insert text. It also provides a Python library that you can use to develop other macro tools based on pyexpander.
Release Notes: The license was changed to GPL V.3.
ivykis is a library for asynchronous I/O readiness notification. It is a thin, portable wrapper around OS-provided mechanisms such as /dev/poll, epoll_create(2), kqueue(2), poll(2), and port_create(3C). ivykis was mainly designed for building high-performance network servers, but can be used as building block for any kind of event-driven application that uses poll(2)able file descriptors as its inputs.
Release Notes: This release fixes a shutdown deadlock in the win32 port, increases the maximum rate of delivery of inter-thread events when using the epoll poll method by about 40%, and contains initial changes to make the pthreads library an optional dependency on POSIX platforms.
Argus is a system and network monitoring application. It will monitor nearly anything you ask it to monitor (TCP + UDP applications, IP connectivity, SNMP OIDS, etc). It presents a clean, easy-to-view Web interface. It can send alerts numerous ways (such as via pager) and can automatically escalate if someone falls asleep.
Release Notes: This release adds Holt-Winters aberrant behavior detection, custom dashboards, ticket system integration, improved performance and scalability, and support for additional tests.
cegojdbc implements the JDBC driver for the Cego database system. a Java 1.5 runtime environment is required.
Release Notes: This release supports nested queries. While a statement is active, a nested statement can be executed using the same connection.
Ghostscript is a processor for PostScript and PDF files. It can rasterize these files to a wide variety of printers, devices for screen preview, and image file formats. Since applications tend to prepare pages for printing in a high-level format such as PostScript, most Unix users with low-level bitmap printers, such as inkjets, use GhostScript as part of the printing process. In addition, Ghostscript is capable of converting PostScript files, functionality comparable to Adobe Acrobat Distiller, but on the command line. In addition, Ghostscript is used for file import and viewing by a great many other applications, including xv, ImageMagick, gimp, and xdvi. Several GUI wrappers for viewing PostScript and PDF files exist, including GSview, ghostview, gv, ggv, and kghostview. This is far from a comprehensive list.
Release Notes: This release changes to the AGPL, improves thread safety, produces "Direct Web View" PDFs directly, extends the Font API to support PCL/PXL and XPS as well as Postscript/PDF, adds new options adding flexibility to the color management workflow, and adds a BigTIFF output option.
Oxygen XML Author is a simplified distribution of Oxygen XML Editor, specially created for content authors. It includes all the XML authoring, database access, and publishing features available in the Oxygen XML Editor. Besides the out-of-the-box support for the standard XML documentation frameworks (DocBook, DITA, TEI, XHTML), its unique design makes it easy to customize and extend to match a whole new range of editing needs.
Release Notes: This release streamlines XML reviewing by adding support for highlights and a review manager panel. It improves the searching capabilities by adding a new view for finding resources. The search returns results immediately while supporting complex text search expressions, such as multiple words, boolean operators, group searches, etc., as well as XML-aware filters. Documents from a Microsoft SharePoint server can now be accessed using the Data Source Explorer view, where you can edit, check in, or check out resources directly. oXygen XML updates and extends the API.
oXygen is an XML editor that supports any XML document, and works with XML Schemas, DTDs, Relax NG schemas, and NRL Schemas. It has powerful transformation support that allows you to edit XSLT and XSL-FO documents and to obtain documents in the desired output format (such as HTML, PS, or PDF) with just one click. It also includes a complete Subversion client, support for flattening XML Schemata, an XML Schema instance generator, integration with the X-Hive/DB, MarkLogic and TigerLogic XML databases, editing actions on the diagram, and a rename refactoring action.
Release Notes: This release supports XML Schema 1.1, generates XML instances and schema documentation, lets highlights help you focus on the content you need to review, presents all the changes, comments, and highlights in a review manager panel so you can quickly inspect and manage them, quickly finds resources in the project by searching in their content or file paths, lets you edit, check in, or check out resources directly on a Microsoft SharePoint server using the Data Source Explorer view, and extends the API.
cwbiff is a Perl program (similar to the classic Unix program 'biff') that queries a mailbox and notifies the user about new incoming mail by sending the From and Subject lines in morse code (CW). It supports IMAP(s) and mbox.
Release Notes: This version features improved support for MIME-encoded mail headers (e.g., for German umlauts or Russian Cyrillic letters). It also includes a new wrapper script to use ebook2cw for the Morse code output. | s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917122955.76/warc/CC-MAIN-20170423031202-00489-ip-10-145-167-34.ec2.internal.warc.gz | CC-MAIN-2017-17 | 10,477 | 34 |
https://notunreasonable.com/2011/10/17/how-square-roots-are-calculated-in-quake/ | code | This has been sitting in my drafts folder, waiting for me to read the article, learn about it and summarize it here.
I took a quick scan today to make sure I wasn’t biting off more than I could chew when I stuck it in the queue. Unfortunately, I don’t think I understand it better than the linked-to-writer and I’m not interested in spending the time to become so.
Here’s the attention-grabbing part:
My Understanding: This incredible hack estimates the inverse root using Newton’s method of approximation, and starts with a great initial guess.
The trick has to do with how floating point numbers are stored in a computer, something I’ve actually blogged about.
Who said math wasn’t useful! | s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224648850.88/warc/CC-MAIN-20230602172755-20230602202755-00305.warc.gz | CC-MAIN-2023-23 | 705 | 6 |
https://gaming.stackexchange.com/questions/15965/how-to-get-onto-a-duct-in-batman-arkham-asylum-from-the-flooded-corridor | code | I'm in the flooded corridor, and I've no idea how to get onto that duct. I'm playing it on PC.
To get a better picture at where I am, please follow this link. That page contains the following paragraph:
The Abandoned Chamber can be confused, so follow these directions: From the entrance, head left, jump the gap, then proceed down the staircase (into the central structure), then up another set. Jump the gap and proceed through the door. Climb the ledges within, then grapple into the vent overhead.
I'm in the exact position (in the picture above) where I'm supposed to "grapple into the vent overhead." But that vent can't be grappled! And it is too high to be climbed. That's why I'm stuck. | s3://commoncrawl/crawl-data/CC-MAIN-2021-17/segments/1618038084601.32/warc/CC-MAIN-20210415065312-20210415095312-00225.warc.gz | CC-MAIN-2021-17 | 695 | 4 |
http://meta.physics.stackexchange.com/users/17607/rhysw | code | |visits||member for||2 years, 10 months|
|seen||Feb 18 '14 at 11:06|
A Call for Bloggers
Do you like to write?
If so, the Workplace SE is looking for volunteer bloggers to contribute monthly articles on topics about navigating the professional workplace.
See The Workplace Meta - Do we want a Blog? for more details. No rep requirement.
|bio||website||area51.stackexchange.com/…||visits||member for||2 years, 10 months|
|location||Earth...I think||seen||Feb 18 '14 at 11:06|
18 Votes Cast
|all time||by type| | s3://commoncrawl/crawl-data/CC-MAIN-2015-48/segments/1448398455135.96/warc/CC-MAIN-20151124205415-00140-ip-10-71-132-137.ec2.internal.warc.gz | CC-MAIN-2015-48 | 510 | 10 |
http://00laboratories.com/ | code | Emulator that emulates Chip-8 and SuperChip completely. It can emulate all of the games, official and unofficial.
The goal of the game is to evade obstacles and race for as long as you possibly can! It's a fast paced racing game that requires…
A barbecue simulator created for the Ludum Dare 35 Game Jam!
BBQ Simulator - Official Trailer - Steam Greenlight
We have been greenlit! Thank you so much for your support! | s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218194601.22/warc/CC-MAIN-20170322212954-00250-ip-10-233-31-227.ec2.internal.warc.gz | CC-MAIN-2017-13 | 417 | 5 |
https://www.nigelfrank.com/job/260823_DS_LRW_1693026013/data-scientist-oslo | code | We have a unique opportunity for a data scientist to work end-to-end on ML projects and help commercial customers in their digitalisation journey!
Goals & Responsibilities can include:
* Working across various projects with external customers and internal teams to facilitate digital transformation
* Meet with teams to understand the problems they are facing, discuss ideas, contribute to architecture, methods, and technology choice, and deliver complete solutions
* Work as part of an agile, cross-functional team where you will bring your expertise, but also be exposed to new technologies and ways of working
You will be able to diversify your knowledge in a range of domains such as health and medical care, energy, and aquaculture, and with an international team from a range of academic and industrial backgrounds, knowledge-sharing is central to creating new and innovative solutions!
We are looking for you to bring:
* 3+ years' experience
* Strong Academic Background (Maths, Physics, Computer Science, or similar)
* Proficiency in Python in a production setting
* Have hands-on experience developing ML models
* Experience working with cloud
* As much as we hope you find your work rewarding, there are lots of additional benefits on offer to ensure an enjoyable experience!
Some of these include:
* Comprehensive health and travel insurance policy for your peace of mind
* A generous budget for the equipment you require to be most productive in your role
* A modern and centrally located Oslo office with delicious subsidised meals available
* Working options to suit your lifestyle, including flexible working hours, and a hybrid home/office environment
* Access to company cabins to enjoy your vacation time in
* Sponsored company outings & events to spend relaxed time with your colleagues
For any questions, contact Lucy on [email protected] | s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506669.96/warc/CC-MAIN-20230924223409-20230925013409-00069.warc.gz | CC-MAIN-2023-40 | 1,872 | 21 |
https://mathpsych.org/session/291 | code | We propose a hierarchical Bayesian model that connects the counts of elementary processing steps from a process model with response times of individual participants in an experiment. We see our approach as bridging between the two fields of mathematical psychology and cognitive architectures. For models that are a bit simpler than GOMS (they need to be broken down into a count of one kind of processing step) we can make detailed response time analyses. We model each processing step as a draw from a Gamma distribution, so that for more elementary processing steps we expect both mean response time as well as variance to increase. We present two extensions of the basic model. We first extend the model to account for cases in which the number of processing steps is stochastic and unobserved. The second extension allows to work with several possible processing tactics and we don't know which tactics the participants use. From the distribution of response times it can thus be distinguished what kind of tactic was most likely used to which degree by each participant. We hope that our model will be a useful starting point for many similar analyses, allowing process models to be fit to and tested through detailed response time data.
This is an in-person presentation on July 19, 2023 (15:20 ~ 15:40 UTC).
Gaussian signal detection models with equal variance are commonly used in simple yes-no detection and discrimination experiments whereas more flexible models with unequal variance require additional data and/or conditions. Here, a hierarchical Bayesian model with equal-variance is extended to an unequal-variance model so that it becomes applicable to binary responses from a random sample of participants. This appears to be at odds with conventional wisdom whereby parameters of an unequal-variance model are not identifiable if only binary responses are observed in a single condition. Although this holds true for non-hierarchical models, the present model assumes randomly and independently sampled discriminability and criterion values and approximately constant signal variance across participants. This novel unequal-variance model is investigated analytically, in simulations and in applications to existing data sets. The results indicate that the five population parameters correspond to five observable parameters of a bivariate sampling distribution and that model parameters can be reliably and accurately recovered or estimated if the sample size is sufficiently large. It is concluded that this approach provides a promising alternative to the ubiquitous equal-variance model.
This is an in-person presentation on July 19, 2023 (15:40 ~ 16:00 UTC).
Mr. Valentin Pratz
Dynamic Structural Equation Models (DSEMs) can be used to model complex multilevel relationships between multiple variables over time and have thus a wide applicability in many fields of psychological science. Mplus is a widely used and powerful software program for estimating DSEMs, but it has some limitations in terms of flexibility and scalability. To overcome these limitations, we have implemented the DSEM framework in Stan, a Bayesian modeling language which provides a flexible and efficient platform for developing complex models. Here we highlight the most important aspects from our upcoming tutorial paper: A theoretical introduction to DSEM, fitting a base-model (i.e., a bivariate lag-1 model) and some possible model extensions (i.e., latent variable modeling, mediation analysis), and finally a comparison between Mplus and Stan in functionality and parameter recovery. Overall, we want to present our tutorial as a clear and practical guide for researchers who want to take advantage of Stan as a powerful toolbox to specify and fit DSEMs.
This is an in-person presentation on July 19, 2023 (16:00 ~ 16:20 UTC).
Ørjan Røkkum Brandtzæg
Prior experience can help resolve ambiguity. Quantitative models of this process represent both prior experience and sensory information as probability distributions over suitable parameters. Such prior distributions are core features of models of perception, learning, and reasoning, and thus their properties are important. If the problem to be solved is the estimation of an underlying cause that can be represented as a point value, then the Bayesian estimate of that point value involves multiplying the prior and sensory probability distributions. If the distributions are Gaussian, the precision of the resulting posterior is the sum of the precisions of the prior and the sensory distributions. If the posterior becomes the new prior, precision keeps adding up across iterations (this is known as the Kalman filter, and therefore we will call this the Kalman prior). That precision describes how precisely the mean of the underlying distribution is known. A fundamentally different problem is predicting the distribution of future sensory data, useful for risk sensitivity and change point detection. In the long term, the variance of that prior should be the sum of the sensory variance and the variance of the generating process. That could be achieved by adding to memory a point value that represents the most recent sensory stimulus, then constructing a prior distribution from those point values. If instead it is assumed that each stimulus is represented as a distribution with sensory variance, and the prior is constructed by adding up all the distributions, then the variance of that prior will be the environmental variance plus twice the sensory variance. We call these priors the additive priors. Note that what is added to the prior is the sensory information or likelihood. It is logically possible to derive a third family of priors by delaying storage in memory until after a posterior has been created through Bayesian cue integration of prior and sensory data to predict the distribution of future subjective experience (assuming that all subjective experience occurs after Bayesian cue integration). We call this the subjective prior. Again, it is possible to generate that prior either by adding (and renormalising) posterior distributions, or else by adding the central tendencies of posterior distributions. Because these posteriors are often skewed or multimodal, it matters whether central tendency is represented as mean, mode, or median, and we must examine all possibilities. Generating this family of priors alternates two operations: multiply prior and sensory data, then add the resulting posterior or its central tendency to the prior (and renormalise). Consequently, this family of priors is sensitive to the order of inputs, and it is impossible to know either the shape of the distribution or its variance without knowing in which order stimuli were presented. We note that these priors seem to have no statistically desirable properties whatsoever, but wish to examine them in case unknown constraints force organisms to use them. If so, their undesirable properties may have interesting implications. We explain the properties of these different priors, and we are fitting models that use these priors to existing data from a study of memory for linear and angular displacement. Preliminary analysis indicates that the worst performing prior is the Kalman prior, even though, in the papers we have found so far that explicitly state how the prior is updated, the Kalman prior is favoured 11 to 1.
This is an in-person presentation on July 19, 2023 (16:20 ~ 16:40 UTC).
Dr. Quentin Gronau
Prof. Birte Forstmann
Dr. Dora Matzke
Cognitive models are more and more frequently applied to test both within- and between-subject hypotheses, however, the latter has generally suffered from the lack of statistical methods to answer such questions. A common approach to testing between-subject hypotheses is to perform a second step of analysis on the estimated parameters of the model to answer whether, for example, drift rate differs with age, or between people with schizophrenia and controls. However, a lot of statistical power is lost in such two-step analyses. Here we propose to include linear models such as ANOVA, regression, and by extension mixed effect models, in the hierarchical framework in which cognitive models are usually estimated. With such a hierarchical linear model we omit the two-step analysis. Furthermore, we supply methods with which we can estimate Bayes factors between the null and the proposed model. Our work gives researchers the option to formalize different types of hypotheses for between-subject research, with the added benefit of maintaining a more parsimonious parameter space.
This is an in-person presentation on July 19, 2023 (16:40 ~ 17:00 UTC). | s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510942.97/warc/CC-MAIN-20231002001302-20231002031302-00091.warc.gz | CC-MAIN-2023-40 | 8,686 | 15 |
https://plus.google.com/+KitPowell | code | I totally agree that the more ethical way to do it is to offer a "demo". I'm not against IAP just the unethical way some people are using it. Maybe Google need to look into new tags such as "In App Consumables" and "Un-lockable Features"
I've just uploaded a new project to Forrst, looking for some feedback. It's an overhaul for the Met Office Weather App on both Android and iOS, I'll be releasing a blog post about it soon. You can view it (and comment on it) here: http://forr.st/~GlA | s3://commoncrawl/crawl-data/CC-MAIN-2014-10/segments/1394678699073/warc/CC-MAIN-20140313024459-00071-ip-10-183-142-35.ec2.internal.warc.gz | CC-MAIN-2014-10 | 488 | 2 |
https://stats.stackexchange.com/questions/408101/how-does-the-rejection-sampling-method-work-in-laymans-terms | code | Suppose that I have no knowledge of sampling methods and that I have some knowledge of probability theory (e.g. probability distribution and marginal distribution).
How would you explain the rejection sampling method in simple terms? Why do we need rejection sampling? What's its purpose (in particular, in the context of machine learning and Bayesian inference)?
There are other sampling methods. Why would one prefer rejection sampling (or not) over the other sampling methods? | s3://commoncrawl/crawl-data/CC-MAIN-2020-10/segments/1581875145818.81/warc/CC-MAIN-20200223154628-20200223184628-00309.warc.gz | CC-MAIN-2020-10 | 479 | 3 |
http://softlabpro.blogspot.com/2010/06/return-of-delphi-rad-studio-roadmap.html | code | Embarcadero has published the new RAD Studio Roadmap. This Roadmap includes information on the upcoming :
- Delphi Fulcrum, supporting both Windows and Mac OS X application development,
- Delphi Wheelhouse (adding Linux support),
- the 64-bits Compiler Preview (early 2011),
- Delphi Commodore (the full 64-bits version) and
- project Chromium.
So, Delphi is still very alive and he has bright future :-) | s3://commoncrawl/crawl-data/CC-MAIN-2018-30/segments/1531676590559.95/warc/CC-MAIN-20180719051224-20180719071224-00074.warc.gz | CC-MAIN-2018-30 | 404 | 7 |
http://archive.oreilly.com/pub/a/network/2001/03/23/brewing_a_hailstorm.html?page=2 | code | Brewing a HailStorm
Pages: 1, 2
Microsoft wlll need to assure the presence of a rather big lock on one of the doors in the chain; a series of seven passwords all set to "abcd" or "Fido" provide only a false sense of security -- worse than no security at all. Even Windows 2000, while not allowing a simple ESC to skip the login, may be set to presume a particular user and bypass login altogether.
Developers considering placing HailStorm at the core of their efforts are, too, asked to take a massive leap of faith. Rely upon Microsoft's robustness to keep your service alive. Trust Passport's ability to protect your customers' data. Believe that Microsoft will maintain a level playing field, not "featuring" their own My* services above yours. And all this incredible responsibility comes without more than the slightest smidge of control. Those who have already bought into the Microsoft developer space may (hopefully) find that transition a smooth one. Those outside the veil will find the offerings tempting, but I predict major trepidation.
"And rather than risk compromising the user-centric model by having advertisers pay for them, the people receiving the value -- end users -- will be the primary source of revenue. HailStorm will help move the Internet to end-user subscriptions, in which users pay for value received."
Microsoft is clearly aiming (pun intended) at a loosely coupled web service-based AOL, providing the attractive integration of experience without that gated community feel. Don't like the default e-mail client? Prefer English English in your dictionary and spell-checker? Contact manager not have a space for birthday? HailStorm promises to let you have your cake and eat it too, switching between client applications -- even platforms -- without so much as a thought about loss of integration.
Can the Samba Story be Retold? -- As we look at the emergence of .NET, are there lessons to learn from the past? Samba, the open source alternative to Windows NT systems dominating file and print servers on corporate LANs, may be one of those lessons worth examining.
With the current climate of uncertainty surrounding the Web's advertising-based revenue model, and AOL's subscription-based service going stronger than ever, Microsoft's end-user revenue model is well conceived. They're sure to bring in some of the users who just haven't gone for the more limited AOL offerings yet are much in need of the seamless integration of Microsoft's Office products. And that integration will prove, I believe, to be something people are prepared to pay for.
Should programming to the HailStorm/.NET platform indeed remove much of the barrier to entry, the concept-development-deployment-payment chain should be short enough to attract many a developer. HailStorm promises delivery of authenticated, paying users to my door, affording me the time to build the interesting bits.
"The HailStorm platform uses an open access model -- which means it can be used with any device, service or application with an Internet connection, regardless of the underlying platform, operating system, object model, programming language or network provider (i.e., Windows, Macintosh, UNIX, Palm OS, Windows CE, etc). All HailStorm services are XML Web services, which are based on open industry standards; no Microsoft runtime or tool will be required to use them."
The simple act of opening (and documenting) an API, making a service available for usage in ways not intended by its creator, leads to some wonderful, surprising, and rather useful recombinations. Microsoft is proposing an entire strategy based upon the open standards of XML and SOAP. Assuming they do remain open, from end-point to end-point, the possibilities are indeed astounding. This, in concert with their .NET strategy of empowering the developer to write applications in their language(s) of choice, will definitely have some sleeves being rolled up.
That last bit, "no Microsoft runtime or tool will be required to use them," particularly caught my eye. At first I was both shocked and thrilled. Yet I couldn't help wondering if there was something there between the words that I was missing; the word "use" was most thought-provoking. By "use" do they mean full functionality, or will there be a Win32-only extension creep? Can I really provide a HailStorm service from my FreeBSD box? Can I actually talk to the Passport server from the comfort of my Python runtime?
What, then does this openness mean to the end-user? Is my data really mine? If so, can I withdraw it all at any time and close my Passport account? How real is all this access control stuff? I've seen some ACLs in my time, and they're usually not particularly pretty or transparent. I'm fascinated by the possibility of an intuitive way of doling out (minimal) information to services and assistants acting on my behalf.
On its head
Microsoft is attempting to find a grand unifying framework for Web services, data, and software. If they manage to pull this off, Hailstorm is bound to have a major effect on users, developers, and Microsoft itself. Bob Muglia, Microsoft's VP of .NET Services, said, "Hailstorm turns the industry debate over online privacy on its head." In fact, HailStorm does much more: It turns some of what we think and feel about Microsoft on its head.
Rael Dornfest is Founder and CEO of Portland, Oregon-based Values of n. Rael leads the Values of n charge with passion, unearthly creativity, and a repertoire of puns and jokes some of which are actually good. Prior to founding Values of n, he was O'Reilly's Chief Technical Officer, program chair for the O'Reilly Emerging Technology Conference (which he continues to chair), series editor of the bestselling Hacks book series, and instigator of O'Reilly's Rough Cuts early access program. He built Meerkat, the first web-based feed aggregator, was champion and co-author of the RSS 1.0 specification, and has written and contributed to six O'Reilly books. Rael's programmatic pride and joy is the nimble, open source blogging application Blosxom, the principles of which you'll find in the Values of n philosophy and embodied in Stikkit: Little yellow notes that think.
Return to the O'Reilly Network. | s3://commoncrawl/crawl-data/CC-MAIN-2018-13/segments/1521257646178.24/warc/CC-MAIN-20180318224057-20180319004057-00400.warc.gz | CC-MAIN-2018-13 | 6,230 | 17 |
https://github.com/jkestr | code | - rechanize 3 Rechanize is a simple RETS client
- dm-paperclip 2 DataMapper port of the Paperclip plugin by Thoughtbot
- rails_wizard 2 The gem and recipe collection for RailsWizard
- acts_as_markup 1 Represent ActiveRecord Markdown, Textile, Wiki text, or RDoc columns as Markdown, Textile, Wikitext or RDoc objects using various external libraries to convert to HTML.
- dm-more 1 Extras for DataMapper, including bridges to DataObjects::Migrations and Merb::DataMapper
Contributions in the last year 0 total Mar 30, 2014 – Mar 30, 2015
Longest streak 0 days No recent contributions
Current streak 0 days No recent contributions | s3://commoncrawl/crawl-data/CC-MAIN-2015-14/segments/1427131299261.59/warc/CC-MAIN-20150323172139-00210-ip-10-168-14-71.ec2.internal.warc.gz | CC-MAIN-2015-14 | 631 | 8 |
https://ficwad.com/review/317352 | code | I soo would've left a review sooner!
Great chapter (as always :3)
Cannot wait for the next chap! :D
Xo Danger ♪
Thank you :) actually the chapter (in my opinion) was terrible. But thank you for bringing it to my attention because for whatever reason I temporarily forgot this existed.. and this chapter is in deep need of fixing | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337404.30/warc/CC-MAIN-20221003070342-20221003100342-00604.warc.gz | CC-MAIN-2022-40 | 330 | 5 |
https://forums.informationbuilders.com/eve/forums/a/tpc/f/7081057331/m/8971030531 | code | As of December 1, 2020, Focal Point is retired and repurposed as a reference repository. We value the wealth of knowledge that's been shared here over the years. You'll continue to have access to this treasure trove of knowledge, for search purposes only.
Join the TIBCO Community TIBCO Community is a collaborative space for users to share knowledge and support one another in making the best use of TIBCO products and services. There are several TIBCO WebFOCUS resources in the community.
From the Home page, select Predict: WebFOCUS to view articles, questions, and trending articles.
Select Products from the top navigation bar, scroll, and then select the TIBCO WebFOCUS product page to view product overview, articles, and discussions.
Request access to the private WebFOCUS User Group (login required) to network with fellow members.
Former myibi community members should have received an email on 8/3/22 to activate their user accounts to join the community. Check your Spam folder for the email. Please get in touch with us at [email protected] for further assistance. Reference the community FAQ to learn more about the community.
I am trying to get comfortable with the new version of the forum and have two comments to make regarding the new message pop-up window.
1) It seems to take a bit of time after the window opens before I can type anything in it. I'm not sure if this is because my internet access is through a proxy server, but I did not have this problem with the previous version.
2) Since the pop-up window is opened without any tool bars, I cannot run the Google spell-checker on my mesage (sic).
Give me code, or give me retirement. In FOCUS since 1991
Production: WF 7.7.05M, Dev Studio, BID, MRE, WebSphere, DB2 / Test: WF 8.1.05M, App Studio, BI Portal, Report Caster, jQuery, HighCharts, Apache Tomcat, MS SQL Server | s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100583.13/warc/CC-MAIN-20231206031946-20231206061946-00448.warc.gz | CC-MAIN-2023-50 | 1,847 | 11 |
https://yergler.net/2004/02/04/publishing-with-pyblosxom/ | code | I’ve now managed to convert the majority of yergler.net over to PyBlosxom . Maybe not the majority… but the non-blog , non-pixelated content. I’m still impressed with it’s flexibility, and even more impressed with the plugin API .
I knew going into the conversion that I didn’t want my entire website to look like a blog. That’s why my blog doesn’t render in the root of my domain. But I also recognized the power of formatting things as “posts.” My solution works like this. I abuse the PyBlosxom “each directory is a category” idea to create the heirarchical structure that I want. Each “entry” in the directories becomes a different page, then, in that category area. Finally, when serving the directory index, I serve the contents of the README file (if it exists) instead of the typical blog-like entry list. This allows for some really simple content management with near-instantaneous publishing.
To get the README file served, each entry as a page, and the directory tree, I wrote a handful of plugins. They’re not really documented yet, but you can find them in cvs .
I order to get the mix of dynamic and static content served the right way, I had to do some serious mod_rewrite hacking. If you find a link that doesn’t work, please, let me know . | s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506320.28/warc/CC-MAIN-20230922002008-20230922032008-00632.warc.gz | CC-MAIN-2023-40 | 1,287 | 4 |
https://community.ptc.com/t5/Windchill/Has-anyone-re-hosted-to-VMWARE-for-production/td-p/19527 | code | We are considering the move from a AIX LPAR (Vitualized) to a VMWare Linux host. We've heard there can be issues with stability at heavy loads on some VMWare platforms. Has anyone experiences this or had any success with VMWare?
In 2014 when I upgrade Windchill from 9.1 to 10.1 I took the opportunity to upgrade servers and agreed with IT to move to VMWare (easy to add resources, cpu and memory). As business admin and users the only difference noticed was that Windchill perform much better (surely because the old kit was 6 year old). In other words, as Project Manager at that time, I can say that the move to VMWare have been painless and very transparent. (Of course we had a test environment also on VMWare etc....)
Now, please do not ask me what was the mark of our VMWare, I have charged IT to specs and install within budget so I am unable to tell you anything apart of that it was running on Windows Server and not linux
Hope this helps
We use VMWare extensively in our development and test areas. Our production server is still physical hardware with Linux RedHat OS on it. Our Preproduction Test environment is also physical hardware so that it can mimic production better, but all of our other machines are VMs. For development the VMs are Windows based. Our Integration and Demo environments are VMs with Linux. For development, using the VMs has greatly improved our productivity. We have VMs that are used for automated nightly builds of new code. With Windchill installed on its own drive in the VMs, the build process just copies the newly built drive to a file share where our developers can copy it and just swap it into their development VMs and poof! you have a brand new Windchill installation with all code compiled and all load files loaded. With the test and demonstration environments, once we had one installed and configured on one, our sys admin just cloned it to make the next environment. We then "rehosted" and we were up and running with a new installation. Using VMware to "reset" back to a snapshot works as well. The nightly build does that following the build and copy. Once the new drive has been copied to the share, the build command reverts the VM back to a snapshot that is a plain ootb installation of Windchill. As for the stability of VMware, we've been pretty successful using it. I occasionally have trouble with the Anti-Virus scan on my laptop causing my development VM to hang.
A lot of our production installs run on VMs running both Linux and Windows. We have used Cisco Unified Computing System server platform as the hardware and VMWare for virtualization. We have tested production infrastructure with load generators and it stood strong and stable for 4k concurrent users. We did not find the breaking point though. Personally I have observed older versions of RHEL were not so VM friendly, but RHEL 6.x works really good. If you have an optimized underlying host architecture, I/O, storage subsystems, performance and stability, VMWare offers best performance.
Apart from this, JVM performance is what really dictates windchill's performance. Solaris is my pick in that regard, i have observed the best performance for JVM in Solaris. Then Linux and Windows.If you can afford to spend on SSD, memory swapping will not take a toll on overall OS and JVM performance(We have it for DB not for App).
As Stacy mentioned above, backup and restore, DR capabilities of VMWare Infrastructure stays unparalleled . It comes very handy when you have a challenging code build and deploy cycle with multiple environments. We have used snapshots a lot in testing some configuration updates and offers a faster way for recovery in the event of failures. We have used Zerto for VM mirroring for DR. VMotion offers high availability protecting you against any underlying hardware system failures.
Barry Wehmiller International | s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296945282.33/warc/CC-MAIN-20230324113500-20230324143500-00772.warc.gz | CC-MAIN-2023-14 | 3,868 | 9 |
https://www.cybertrucktalk.com/threads/will-the-cybertruck-use-a-heat-pump-or-a-resistance-heater-why-that-matters.142/ | code | Heat pump have efficiency issues in colder climates and they typically also need a backup heat source. Every system will have pros and cons. I would just assume Tesla is testing out this system and if successful would implement them in future vehicles. Although trucks tend to operate at extremes and not sure if this system would be a tried and true system to use. I guess we'll see. BTW, the video is interesting but they are just guessing the benefits and are obviously fan-boys. I'd take everything they said with a "300%" grain of salt (tongue and cheek). | s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224645089.3/warc/CC-MAIN-20230530032334-20230530062334-00030.warc.gz | CC-MAIN-2023-23 | 560 | 1 |
http://www.picb.ac.cn/picb/newseng.jsp?ID=1511&ntype=advertisement | code | Job Description: An opportunity has arisen to join the Computational Systems Genomics Lab, headed by Prof Andrew Teschendorff, at the CAS-MPG Partner Institute for Computational Biology, Shanghai. The Computational Systems Genomics Lab carries out cutting-edge research at the interface between Statistics, Cancer and Genomics, with a special focus on Statistical Cancer Epigenomics. The post is at the staff scientist level. In addition to conducting research in Statistical Cancer Epigenomics, you will also be expected to carry out secretarial duties, and to assist the Principal Investigator with translation of documents from Chinese into English and vice versa.
Essential Job Requirements:
- Knowledge and experience of programming.
- Basic knowledge of statistics.
- A postgraduate degree in a computational/scientific discipline, including Computer Science, Statistics, Bioinformatics, Mathematics, Physics or Engineering.
- Fluent in oral and written English.
- Excellent organizational skills.
- Team Player.
Desirable Job Requirements:
- PhD in a computational/scientific discipline, including Computer Science, Statistics, Bioinformatics, Mathematics, Physics or Engineering.
- Extensive programming experience in R, Bioconductor, Python, Perl or Java.
- Experience in computer administration.
Interested applicants should send a covering letter, a curriculum vitae, a brief summary of past research achievements, 2 letters of recommendation to:
Dr. Zhen Yang | s3://commoncrawl/crawl-data/CC-MAIN-2019-04/segments/1547583835626.56/warc/CC-MAIN-20190122095409-20190122121409-00228.warc.gz | CC-MAIN-2019-04 | 1,471 | 14 |
https://www.studyxapp.com/homework-help/question-3consider-the-following-scenario-about-using-python-listsemployees-at-q1621077068695764993 | code | Consider the following scenario about using Python lists:
Employees at a company shared the distance they drive to work (in miles) through an online survey. These distances were automatically added by Python to a list called “distances” in the order that each employee submitted their distance. Management wants the list to be sorted in the order of the longest distance to the shortest distance.
Complete the function to sort the “distances” list. This function should:
1.sort the given “distances” list, passed through the function’s parameters; ;
2.reverse the sort order so that it goes from the longest to the shortest distance;
3.return the modified “distances” list.
___ # Sort the list
___ # Reverse the order of the list
# Should print [15, 9, 8, 4, 2, 0]
【General guidance】The answer provided below has been developed in a clear step by step manner.Step1/3Step1:The answer provided below has been developed in a clear step by step manner.Explanation:Please refer to solution in this step.Step2/3Step2:Python code for above problem:# function sort_distancedef sort_distance(distances): # Sort the list # using inbuilt method for sort distances.sort() # reverse the list using inbuilt method for reverse distances.reverse() # then finally return the list return distances# making a list sort_distance # passed it to function sort_distance# which will sort it in desce ... See the full answer | s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296944452.97/warc/CC-MAIN-20230322211955-20230323001955-00639.warc.gz | CC-MAIN-2023-14 | 1,421 | 10 |
https://github.com/madx | code | Repositories contributed to
- lowfriction/gladius 0 Pollice Verso Lite
- MoOx/eslint-config-i-am-meticulous 14 An ESLint shareable config for very meticulous people
- kud/diary 2 _kud.diary
- kud/ed-209 9 I'm an IRC bot!
👌Putain de code ! is a place where you can read (and write) about best coding practices. High quality content, reviewed by the community. | s3://commoncrawl/crawl-data/CC-MAIN-2016-22/segments/1464049281876.4/warc/CC-MAIN-20160524002121-00021-ip-10-185-217-139.ec2.internal.warc.gz | CC-MAIN-2016-22 | 361 | 6 |
https://corevalues.com/products/tigertracks-newsletter/mp3cd6/ | code | We are so pleased you have joined us at TIGERS Success Series.
- Because you are a member you receive information before anyone else does.
- We limit our course sizes to facilitate optimum learning and to give you the opportunity to network with other like-minded leaders. If you see something that interests you, please do not hesitate to enroll.
- Also, you receive important savings as a new member.
Right now, you can use the purchasing code, October345 when you order your copy of our book TIGERS Among Us – Winning Business Team Cultures and Why They Thrive. Go to www.TigersAmongUs.com and order by phone any time day or night and mention the code, October345. Save 50% on our paperback version!
- If you don’t take advantage of this right away, be sure to bookmark this page. It is not available to regular visitors.
Now, as promised, here are your MP3 CD 6 track links:
|TIGERS Track 1 [audio:TigersTrack1.mp3]||TIGERS Track 5 [audio:TigersTrack5.mp3]|
|TIGERS Track 2 [audio:TigersTracka2.mp3]||TIGERS Track 6 [audio:TigersTrack6.mp3]|
|TIGERS Track 3 [audio:TigersTracka3.mp3]||TIGERS Track 7 [audio:TigersTrack7.mp3]|
|TIGERS Track 4 [audio:TigersTracka4.mp3]||TIGERS Track 8 [audio:TigersTracka8.mp3]| | s3://commoncrawl/crawl-data/CC-MAIN-2018-13/segments/1521257647545.54/warc/CC-MAIN-20180320205242-20180320225242-00634.warc.gz | CC-MAIN-2018-13 | 1,218 | 11 |
https://community.ptc.com/t5/Windchill-Systems-Software/Custom-action-Open-in-windows-explorer/td-p/234952 | code | I'm fairly new to PTC Integrity, but I was trying to create a custom user action that would allow us to select a member and open it in Windows explorer via right-click popup menu (or toolbar button). I've gotten as far as Viewset > Customize > Actions > Custom > Edit... so it looks like the following. Windows explorer will take a string parameter of "/select, " followed by a filepath. Is there a "variable" name that I can use here so it opens to the directory that the selected member is located? Or is this functionality already built in somewhere?? We are using Integrity 10. Any suggestions or help will be greatly appreciated.
as far as I now, unfortunately the feature open in Windows Explorer (like so many others like a "get" or Copy2Clip feature) is not implemented in Integrity.
You can implement this using a batch file for example.
To know which variables are available in which Integrity View (this is an undocumented feature and depends on which view you are working) you can debug with a "set & pause" or "set MKSSI & pause" to view them.
Hope to help. | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335448.34/warc/CC-MAIN-20220930082656-20220930112656-00523.warc.gz | CC-MAIN-2022-40 | 1,070 | 5 |
http://artemy.info/r4 | code | Developing design and logic of mobile app and web version of video markup service for neural network training. Sporttech startup, on the detection of athletes' movements through a mobile app. There is an option.
Developed the design and logic of the service for detecting objects on aerial images. Developed a neural network training interface, an interface to work with the collected data, an individual employee workplace interface, an interface for loading and unloading large arrays of files from 1TB.
Developed the design and logic of the service of work with orders of metallurgical factories of medium and large industry. Developed arihitetcra: personal production office, equipment utilization level, technological processes at the enterprise, creation of technological charts and design of complex orders.
I develop the design and interaction logic of an oil and gas classifier service.
Created business card websites, small automation services, motion design - video clips for local brands. Developed visual style for a chain of cafes. | s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662594414.79/warc/CC-MAIN-20220525213545-20220526003545-00500.warc.gz | CC-MAIN-2022-21 | 1,045 | 5 |
https://community.emc.com/community/connect/everything-cloud/blog/2019/03/31/azure-consistent-usage-for-azure-stack-infrastructure | code | When it comes to building modern applications and adopting a cloud operating model, Azure Stack is an extension of Azure. While the primary focus is the ability to develop and run Azure services in a Hybrid Environment, Microsoft has also brought the Azure economic model to Azure Stack with usage-based billing. At Dell EMC, our goal is to complete that experience by providing a metered usage consumption offering for the Dell EMC Cloud on Microsoft Azure Stack. Now with the recent introduction of Flex on Demand from Dell Financial Services (DFS), you have the option to pay for your Azure Stack Infrastructure based on the usage data from your Azure Stack Usage API Endpoint.
Capacity Planning and Flex capacity
An important consideration for many of our Hybrid Cloud customers is the ability to scale applications and services rapidly. This could apply to the ability to accommodate bursty workloads as well as scenarios where you see rapid growth yet keep some buffer capacity to cushion the impact of that growth. Our goal at Dell EMC is to provide you with the business model that accommodates both options softening the impact of time related to capacity planning.
Usage based billing consistent with Cloud Economics
Most of target personas for Hybrid cloud are focused on the application developer or the IT operator. As Hybrid Cloud adoption grows, a company’s finance, accounting along with procurement stakeholders are realizing the benefits of cloud economics. Eliminating the need to manage un-planned capital expenses, while benefiting from procurement of equipment as a service enables you to simplify accounting, free up cash flow and make procurement of new services more streamlined.
With Flex on Demand from DFS, consistent with Azure, your infrastructure charges are tied to usage and aligns with the OPEX type consumption models that customers desire. You pay Dell EMC for the services you consume plus a pre-negotiated fixed cost monthly. This covers the usage costs associated with the Hardware, Lifecycle Management SW and Maintenance while you continue to pay your subscription costs to Microsoft for the Azure Services running on Azure Stack.
Meters consistent with Azure
While metered service is a key tenet of Cloud computing, picking the right resources and meters is equally important. In discussing options with our customers, the consistency with Azure and the Cost transparency were highlighted as key goals. In keeping with the notion that Azure Stack is an extension of Azure, we applied a similar approach to the usage measurements and billing of the Azure Stack Infrastructure.
To do this, we extract and report back the per-subscription resources leveraging the usage API endpoints from Azure Stack Provider Resource API. Consistent with Azure Stack, we measure the VM Hours and capture the VM Type. From this data, we compute the resource consumption. Based on the Scale Unit Type (Balanced/All Flash), we then assign a rate and a bill is generated.
Whether you are looking for a financial model consistent with Azure or looking to keep some buffer capacity to accommodate growth, working with Dell Financial Services, we are delighted to bring this Measured Service capability to the full stack and in a way completing the final piece of the Hybrid cloud puzzle. For more information you can go to Flex On Demand form DFS . | s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590347406785.66/warc/CC-MAIN-20200529214634-20200530004634-00223.warc.gz | CC-MAIN-2020-24 | 3,368 | 10 |
https://www.codeitbro.com/things-to-know-before-becoming-programmer/ | code | This post was last Updated on by Himanshu Tyagi to reflect the accuracy and up-to-date information on the page.
What’s Important to Know Before Going to College to Become a Computer Programmer
Computer programming is one of the most coveted courses. Pursuing this course is more about passion than being competent in class.
As a computer programmer, you need to have the technical and workplace skills needed in the market. The field is very competitive and dynamic.
That means you should brace yourself for more years of hard work and research. What matters is whether you have the skills. Below are essential things to know before going to college to become a computer programmer.
Also Read: 10 Best Programming Books for Beginners
What computer programming entails
You must prepare to learn complex concepts if you think it’s just about writing simple lines of code or programs. Before writing that code, you must consider how thThat’sut affects the system.
Concepts like code optimization are very crucial for every computer programmer. That’s especially true if you take C++ programming language. In this case, you will need to modify the whole software system to make it work more effectively with feweThat’surces.
People usually associate computer programming with several positions in information technology. That’s right. The need for great computer programmers spans every field of technology. To be good at coding, you need to practice. Because college life is full of assignments, it can be challenging to get time for practice.
To leave more time to practice, seek professional help from write my essay service EduBirdie. The website has great writers, and you don’t have to worry if you get your essay written by professionals on this online site.
What it takes to be a successful programmer
Going to college is far away from being a successful programmer. There are lots of paths that you can take to perfection. Apart from whatever is taught in class, you will have to do other additional courses.
These courses will broaden your understanding of the different concepts taught. You can either opt for free training or paid courses. The paid courses usually have better training sessions compared to the free ones.
You also need to be flexible with different languages. You will quickly become a successful software developer at a young age. The other factor you need to consider to be a successful programmer is effort and dedication. At times, things will fail. Only through effort and dedication will you be able to rise again.
Also Read: How to Create a Neural Network in Python
Skills you need as a programmer
Before going to college, you need to know the skills needed to become a programmer. You need top skills when it comes to using your computer. These skills can be classified into two; hard and soft skills.
If you are using a Linux operating system, you must learn different ways to use Linux commands as a regular user. Linux allows users to create and execute different commands over the command line.
Analytical skills are also needed, especially when building a project using different languages. These skills will guide you through the functionality principles of the projects you will build. They also help a lot in data analysis projects that require extensive research.
Soft skills like communication and problem-solving are also needed in every programmer’s life. Pay attention to all details and the new emerging trends in this field of specialization.
Also Read: 3 Best Fake Code Generator Websites
What’s it like to be a programmer
What comes to your mind when someone tells you they are a programmer? You will probably think of them as people living high-end life. The truth is that most programmers do not have a social life.
They prefer their work more than just hanging out with friends. You will spend most of your time designing and writing programs in different languages.
You will spend time troubleshooting and updating the existing codes. Remember the nights you will spend testing and debugging code. The field is highly competitive, and you must hone your skills from time to time.
In addition, you will find more pleasure in interacting with other computer programmers. This could be through social media platforms or physical coding workshops.
Also Read: 10 Best Mouse for Programming
Most students dream of entering this highly lucrative field of specialization. But before that, you have to understand certain things.
Each point discussed above is vital for anyone who wants to join this field. This information acts as a roadmap throughout your career. You know what you want and a few ways to get that.
Author’s Bio: Cory Shilling has been in the writing field for many years, which means he has the edge over his competitors. He has utilized his experience in writing essays and other academic assignments perfectly, as he has never received anything below a 5-star rating on his writing profile. Students love him for the guidance he provides in doing their college papers. | s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506329.15/warc/CC-MAIN-20230922034112-20230922064112-00230.warc.gz | CC-MAIN-2023-40 | 5,054 | 31 |
https://www.techrepublic.com/resource-library/webcasts/datadecoded-for-the-modern-enterprise-how-enterprise-data-preparation-enhances-collaboration-between-it-and-the-rest-of-the-business/ | code | #DataDecoded for the Modern Enterprise: How enterprise data preparation enhances collaboration between IT and the rest of the business
The conversation has been growing around data preparation. What started as a push for self-service access for specific use cases has now expanded to operationalizing a data pipeline across the enterprise. This has created an opportunity for greater collaboration between IT and the rest of the business to create efficiencies and eliminate workflow silos in the interest of propelling data strategy forward.
Join this episode of #DataDecoded for the Modern Enterprise to learn more about:
- The evolution of data consumption across the enterprise
- Why the conversation has shifted from self-service access to enterprise data preparation
- Use case exemplified using IBM InfoSphere Advanced Data Preparation | s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506669.30/warc/CC-MAIN-20230924191454-20230924221454-00855.warc.gz | CC-MAIN-2023-40 | 842 | 6 |
https://developer.jboss.org/thread/198362 | code | Hi all, i have just started using JBOSS Enterprise Portal Platform, i have a portlet which renders CSS to be run in quirks mode.
So, my requirement is very basic but i am not able to figure out how to do that..
I want to create a page in my portal that will run in quirks mode (no doctype), so basically i wanted to customize a skin/layout to remove the doctype declaration from the HTML page.
Many thanks in advance
You can use Extension Machanism . There is an example: https://github.com/gatein/gatein-portal/tree/master/examples/extension --> It override the template: UIHomePagePortlet.gtmpl
To resolve your case, you can override this file : UIPortalApplication.gtmpl --> Add your code to this file to check if a page need a doctype or not | s3://commoncrawl/crawl-data/CC-MAIN-2018-30/segments/1531676591140.45/warc/CC-MAIN-20180719144851-20180719164851-00142.warc.gz | CC-MAIN-2018-30 | 745 | 6 |
http://wcjb.com/local-news/2009/07/tv20-bootcamp-day-4 | code | TV20 Bootcamp Day 4
Published July 9th, 2009
It's Day 4 of our reporter's boot camp.. and results haven't come easy. But one reporter got a little sidetracked on the healthy diets.
Take a look at their success and failures thus far!
- TV20 Bootcamp: Day 2, How Are They Holding Up?
- Bootcamp Day 3 - Is It Working?
- TV20 Reporters Hit the Trenches in Boot Camp: Day One
- TV20 Staff Acknowledged for Excellence
- TV20 Interview with Mayoral Candidate Craig Lowe
- TV20 Interview with Mayoral Candidate Don Marsh
- Machen Sits Down With TV20
- TV20 Sits Down with Pastor Terry Jones
- Hobie, the Great Horned Owl visits TV20
- TV20 Water Cooler Buzz: Super Bowl Ads | s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1406510276584.58/warc/CC-MAIN-20140728011756-00473-ip-10-146-231-18.ec2.internal.warc.gz | CC-MAIN-2014-23 | 666 | 14 |
https://myclickforum.com/senior-frontend-engineer-react-at-contentful-2/ | code | Title: Senior Frontend Engineer – React
Location: Remote, United States
About the opportunity
Contentful is the leading content platform that powers digital experiences for thousands of global brands, including Shopify, Atlassian and Electronic Arts. Our platform unifies content in a single hub, structures it for use in any digital channel and integrates seamlessly with hundreds of tools through open APIs.
We’ve been recognized as a Best Place to Work 2022 by Built In Colorado and are growing rapidly, with more than 750 people from 70 nations working in hubs across, Denver, Berlin, San Francisco and distributed around the world. Join our team!
About the Role
The marketplace is home to apps and integrations that expand the capabilities of the Contentful web app. Customers can integrate their favorite third-party services, build better workflows and customize what they can do with Contentful.
Our mission with the marketplace is to enable thousands of developers to build their business on top of Contentful. We are only scratching the surface of our full potential. This means you have an incredible opportunity to join us on this journey to do meaningful, challenging work while growing your career.
As a full stack software engineer, you will:
- Transcend the traditional boundaries of Frontend and Backend, designing and delivering performant, maintainable, and scalable features and services
- Think in terms of components and systems while considering a holistic user experience
- Rapidly fix bugs and solve problems for our customers
- Practice data-informed product development through analytics, A/B testing, etc.
What to expect?
- Create tools to build apps that can customize Contentful to fit user and business needs with App Framework
- Continuously improve our GraphQL API experience
- Develop new apps that simplify and improve content editing and delivery with Contentful
- Solve complex engineering problems to improve performance and scalability of Contentful
- Develop on our Platform with modern services like AWS, Docker, Kubernetes, and Terraform
What you need to be successful?
- Knowledge of Typescript is a big plus
- Knowledge of functional programming principles is a plus
- Have strong teamwork skills, open to diverse opinions, and can give reasons for your technical decisions.
- Excellent English communication skills, both verbal and written (German is not required)
What’s in it for you?
- Join an ambitious tech company reshaping the way people build digital product
- Full-time employees receive Stock Options for the opportunity to share in the success of our company
- Comprehensive health/dental/vision care package covering 100% of monthly premiums for employees
- We value Work-Life balance and You Time! A generous combination of a flexible time off policy, volunteer time off and paid holidays
- 16 weeks of paid parental leave (after 6 months of employment)
- Use your personal education budget to improve your skills and grow in your career.
- Enjoy a full range of virtual events, including workshops, guest speakers, and fun team activities, supporting learning and networking exchange beyond the usual work duties
- Share and navigate the excitement of a new workplace with your CFF (Contentful First Friend)
- Commuter benefits and monthly bill stipend
- Plus, Contentful socks! And other amazing swag as part of company events. Oh yeah!
Who are we?
Contentful is the leading content platform that powers digital experiences for over 30% of the Fortune 500 companies and thousands of global brands. Our platform unifies content in a single hub, structures it for use in any digital channel and integrates seamlessly with hundreds of tools through open APIs. It lets developers and content creators work in parallel, increasing team efficiency and happiness. Companies such as Shopify, Staples, Atlassian, Electronic Arts, Chanel, Roche, Vodafone use Contentful to build their mobile and web products, voice-controlled apps and more.
We’re growing rapidly and we have secured over $330 million in funding from top-tier partners such as Tiger Global, Sapphire Ventures, Salesforce Ventures, General Catalyst and Benchmark.
More than 750 people from 70 nations contribute their energy and creativity to Contentful, working from hubs in Berlin, San Francisco, Denver and distributed around the world.
Everyone is welcome here!
Everyone is welcome here is a celebrated component of our culture. At Contentful, we strive to create an inclusive environment that empowers our employees. We believe that our products and services benefit from our diverse backgrounds and experiences and are proud to be an equal opportunity employer. All qualified applications will receive consideration for employment without regard to race, color, national origin, religion, sexual orientation, gender, gender identity, age, physical [dis]ability, or length of time spent unemployed. We invite you to apply and join us!
If you need reasonable accommodations at any point during the application or interview process, please let your recruiting coordinator know.
Please be aware of scammers who may fraudulently allege to be from Contentful. These types of fraud can be carried out through copycat websites, fake email addresses claiming to be from our company, or social media. We do not ask for your personal information such as bank account numbers, identification numbers, etc through social media or chat-based apps, nor do we request or send money for the purchase of business equipment. If you suspect fraud, please report it to your local authorities, as well as reaching out to us at [email protected] with any information you may have.
By clicking Apply for this job, I acknowledge that I have read the Contentful’s Candidate Privacy Notice , and hereby consent to the collection, processing, use, and storage of my personal information as described therein. | s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474697.2/warc/CC-MAIN-20240228044414-20240228074414-00331.warc.gz | CC-MAIN-2024-10 | 5,912 | 44 |
https://equo.dev/blog/using-equo-cli | code | Using the Equo CLI
Faustino Hokama on June 30th 2021
In this article, you are going to learn step by step how to make your first Plain Equo Application using the CLI. A Plain Equo Application is just an app developed from scratch with the Equo SDK using Java and HTML5 technologies. If you want to know more about other application types, please check our docs.
There are a few requirements for this tutorial before we start using the CLI:
Step 1: Download the Equo CLI
Download the Equo CLI . Make sure you select the correct platform. The command installs the Equo CLI in a folder already added to the PATH variable by default. Make sure the installation is succesful by running:
The output should be:
❯ equo --version
equo version x.x.x
Step 2: Create a Plain Equo Application
Run in your terminal the following command:
equo create myfirstapp
This is going to create a basic skeleton. You can read more about the file structure to have a deeper understanding of an Equo Application.
Step 3: Run your First Equo Application
equo run myfirstapp
To clarify, you should use as argument the path to the root folder of your Equo Application (where the pom.xml is located). You will see how maven builds your project. If you get an error, make sure you have installed Maven and JDK correctly.
Finally, wait until the Equo App opens:
Congratulations! You've just run your first Equo Application! This is the HTML from src/main/resources/index.html.
In this tutorial, we only saw a really small portion of what the Equo CLI can do. If you want to explore more by yourself, you can simply run in your terminal:
You will see other possible commands. For example, you could use the wrap command to wrap an existing web application.
If you feel lost, remember to check the docs! | s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947475238.84/warc/CC-MAIN-20240301093751-20240301123751-00653.warc.gz | CC-MAIN-2024-10 | 1,771 | 21 |
https://forum.itflow.org/d/692-move-asset-between-clients | code | Thank you for your thoughtful response. How about this:
When an asset is transferred, the system archives it from Johnny and creates a new asset under Joseph with everything under the details tab, everything but the URI on the network tab, nothing under the assignment tab, purchase tab would be good information to carry, login would be local but since the computer will be reloaded, it could be created blank, and whatever is in the notes tab.
Unless I am missing something, you can't link an asset to a document so setup sheets wouldn't come across.
The only thing I can think should follow an asset is parts. But we don't have that yet.
After I rework the unit I sell (transfer) the unit to wrongecho because money. He has it, I want it. The system archives it from me (sans parts) and creates it under wrongecho.
Ultimately, nobody but myself and my techs will be able to see any of this, even from the client portal. | s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947476396.49/warc/CC-MAIN-20240303142747-20240303172747-00230.warc.gz | CC-MAIN-2024-10 | 922 | 6 |
https://www.fr.freelancer.com/work/drupal-disqus-comment-count/ | code | I installed ok openvpn server, and client Now I want to count, limit bw per user/days Limit throughput per user ! Thank you!
...need os someone as DRUPAL developer to shift my website on Drupal 8 latest version from DRUPAL 7. After shifting 2nd job wll be to do it 100% responsive. After 100% responsive 3rd job wll be to add some more features. After add some more features I wll need a dedicated developer to provide long term support for maintenance for Drupal 8 for my website
...has a certain number of likes the user that sent earns a certain amount of money. An efficient system of banishment and fraud must be created. 1. The pages of each user must count the earned badges, bonus payments received besides other data. 2. Similar layout for the design [se connecter pour voir l'URL] 3. user can sign up, sign in and post deals 4. admin has to
I have a list of 1,443 short vocabulary quiz texts, which I need translated from English to (Brazilian) Portuguese. Total word count is 37,820. No Google translate. Timing is flexible. I will attach a sample for you to get an idea of the format.
**** NO AUTO-BIDS PLEASE. THIS SHOULD BE FAIRLY STRAIGHT FORWARD FOR A DRUPAL EXPERT TO CONSULT ON SO PLEASE BID ACCORDINGLY **** We have a multi-language Drupal site with a product search feature. The search results that appear for our German language are only partially translated. We need to know how to make all fields translated when selecting the
...them carefully to be considered: . - Have your portfolio of previous work in your profile. If not in your profile, please provide us with your portfolio through a message or comment on this contest page. . - SAMPLE: Working preferably in vector based software, show us your skill and style by providing 3 sample elements using the references attached as
I'm seeking a comprehensive list of conversion franchisors in the United States with location count. Conversion franchises are franchises that focus on "mom and pop" independent business owners and assist them in converting their businesses into the franchise. Examples: "One hour heating and air condition" - they help independent HVAC owners convert
I have a list of 1,443 short vocabulary quiz texts, which...have a list of 1,443 short vocabulary quiz texts, which I need translated from English 1) Spanish from Spain, and 2) from Latin America, in two separate columns. Total word count is 37,820. No Google translate. Timing is flexible. I will attach a sample for you to get an idea of the format.
Hello. we need about 50 easy reviews about cars for canadian site. There's no ne...uniqueness - at least 85% by popular service. We're looking for the amateur writers because of the low budget - only $1 per 1000 characters or 300-350 words (if you are used to count in words) Examples – //[se connecter pour voir l'URL]
(1) Currently have cloud-based Rackspace web server with a few websites on it. These sites were built in Drupal 6 on an Aegis development platform. I need to migrate these sites to an inMotion webserver and get them operational. (2) Need to "transfer" new client website onto the InMotion server. Site is built in WordPress. It some some eCommerce
... From Oracle go to AP level, Invoices, Entry, Invoice Batches. [se connecter pour voir l'URL] that batch with the following format a)Initials b)Date 3)Tab over and enter 0 as amount for Control count and Control Amount 4)Select Invoices (can hit enter from keyboard to select) 5)Start to enter first invoice a)Tab twice to enter the PO# identified on the Invoice
Qualification and skills -With knowledge at php, python and github -who is highly motivated, detail oriented, flexible -willing to follow the directio...the system issues and solve them in an effective manner. -He/she must be able to work well even under pressure if you're interested to join our team please free to give a comment on this job post .
...User Facing: - Option to view own schedule - Option to view substitution requests - Option to accept substitution requests which then modifies both schedules - Option to comment on updates and announcements - Option to view class assignment, lesson plans and portion ( drive integrated) Moderator - Option to add/remove users - Option to add/remove/modify
...following: - Update the PHP script to allow the new template changes - Allow me to test and provide feedback - Allow the file to be adjusted by you until confirmed working - Comment throughout the script for ease in future the purpose of each segment and how it integrates into linked text/buffer file. The size of the PHP file is currently only 580 lines
I use DLE (Datalife Engine). I need 2 plugins 1. Point System Earn Points: Members get X points when they: Register, Login (in 24h), Post Article (if got approved), Post comment. X can set in AdminCP Spend points: 3 options (Admin may set active options): - Deducted Y points when click to get download link (Y may set when Post/Edit/Approved article
I am searching for a long term business relationship. I need a skilled logo, business-card, Flyer... de...I need a skilled logo, business-card, Flyer... designer. I will pay 10-15€ per project. Before u will get the Job, we will do a small Design Test. Please write in the comment if u are interesting. Project will be outside of the freelancer.
Kindly see the attached file. We are looking for web developing in drupal 7 or 8 and web designing. Please note that I already inserted a request but the account was blocked therefore use the communication tools allowed by this site policy.
I'm going to publish a post on the forum bitcointalk.org. The post will be about the use of cryptocurrency for charitable causes. I'd need a person or better a group of people (so I may decide to award more than one worker here), that will: 1) register multiple accounts there, before I publish my post; 2) constantly check the section "Show unread posts since last visit." insid...
I would like hire a native Norwegian for some translation. Word count around 5k words so please bid for 5k words. Details will be provided to selected bidder. Please bid only if you are a native person. I need the translation back in 2 days. Thanks.
...discussion. Your work should be substantiated using theory and there should be an indication that you have read wider than the core text The challenge is to stay within word count but still get your points across....
We sell heating oil to domestic customers in UK. We currently use a Drupal sites to enable customers to register and place orders for heating oil, against bi-monthly buying dates (e.g. [se connecter pour voir l'URL]). We would now like to develop a system whereby the supplier can determine when a customer needs oil. We would need a module that calculates the daily
While uploading a picture to fan wall,writing a comment shouldn't be obligatory, uploading a photo without writing a comment should be possible. Is it possible for you to make this change ?
Job details Linux Development Posted 2 days ago Qualification and skills -With knowledge at php, python and github -who is highly motivated, detail ori...the system issues and solve them in an effective manner. -He/she must be able to work well even under pressure if you're interested to join our team please free to give a comment on this job post .
Car pool app .. 1st page for self registration .. Name, contact number, selection as rider or car pool provider and group selection. 2nd page for provider .. from, ...4. If person is car pool seeker, then let the person select from available pool entries ... And let the person opt for it. If provider accept the request, then reduce the count by 1.
...- attached [se connecter pour voir l'URL] Starting with 1. Select the camera or more through IP. 2. Making the app more intelligent to know the free spaces. 3. Count display the empty spaces [se connecter pour voir l'URL] of poor parking, improper use of parking space 5. Make a time-limited reservation for a given parking space 6. Keep an eye on payment discipline
I'm searching for someone that can made for me an simple excel sheet/tool that count the total emails in the inbox and count the mails that are sending per day. And save that in an simple list to made an graph with 2 lines per day. 1 line for the total mail inbox 1 line for the send mails a day. Regards,
I am looking to hire an individual as a social media manager as a virtual assistant. You must have PERFECT written English. You will be in charge of managing various...week milestone will be created but NOT released until the work is performed. Then the next milestone will be created, on and on. If you do the job well this is income you can count on.
Hi we need Drupal 8 Experienced Designers and Developers. Should have designed atleast 8-10 websites in Drupal (Originall theirs and not outsourced or someone's project). Should be responsive and web 2.0 in design and structure. Minimum one website should be in RTL. Post your original portfolios.
A software application that I developed in C#/.Net runs in background as a console or windows service and retrieves all information from print job given for any documents to be printed. Its getting all information like NameOfDocument, NoOfPages printed, etc. but its not getting 'No of copies' for each document given print job with multiple copies. | s3://commoncrawl/crawl-data/CC-MAIN-2019-04/segments/1547584519757.94/warc/CC-MAIN-20190124080411-20190124102411-00193.warc.gz | CC-MAIN-2019-04 | 9,344 | 29 |
https://www.tutorialspoint.com/non-persistent-csma-protocol | code | - Trending Categories
- Data Structure
- Operating System
- C Programming
- Selected Reading
- UPSC IAS Exams Notes
- Developer's Best Practices
- Questions and Answers
- Effective Resume Writing
- HR Interview Questions
- Computer Glossary
- Who is Who
Non-persistent CSMA protocol
Non-persistent CSMA is a non – aggressive version of Carrier Sense Multiple Access (CMSA) protocol that operates in the Medium Access Control (MAC) layer. Using CMSA protocols, more than one users or nodes send and receive data through a shared medium that may be a single cable or optical fiber connecting multiple nodes, or a portion of the wireless spectrum.
In non-persistent CSMA, when a transmitting station has a frame to send and it senses a busy channel, it waits for a random period of time without sensing the channel in the interim, and repeats the algorithm again.
The algorithm of non-persistent CMSA is
When a frame is ready, the transmitting station checks whether the channel is idle or busy.
If the channel is idle then it transmits the frame immediately.
If the channel is busy, the station waits for a random time period during which it does not check whether the channel is idle or busy.
At the end of the waiting time period, it again checks the status of the channel and restarts the algorithm.
Advantage of non-persistent CSMA
It rate of collisions is much reduced than 1-persistent CMSA. This is because each station waits for a random amount of time before attempting retransmission. The probability that multiple stations will wait for same amount of time is extremely low. So, collision between contending stations is greatly reduced.
Disadvantage of non-persistent CSMA
It reduces the bandwidth usage of network. This is because the channel remains idle even if there are stations who have frames to transmit. This occurs since each station wait for a random time before attempting retransmission. There may be multiple stations who are waiting while the channel is idle.
Comparison of Throughputs
The throughput of a network system is defined as the number of successful transmissions per frame time. The following graph compares the throughput of non-persistent CMSA with that of other MAC protocols
- P-persistent CSMA protocol
- What are the differences between 1-Persistent and Non-Persistent CSMA?
- What are the differences between Non-persistent and p-Persistent CSMA?
- Differentiate between 1-Persistent and p-Persistent CSMA
- CSMA with Collision Detection (CSMA/CD)
- CSMA with Collision Avoidance (CSMA/CA)
- Difference between CSMA/CA and CSMA/CD
- Protocol and Protocol Hierarchies
- Rate Anomaly in CSMA/CA
- What is an Advanced Persistent Threat?
- Virtual channel sensing using CSMA/CA
- Back-off Algorithm for CSMA/CD
- What is CSMA with collision detection?
- What is CSMA with collision avoidance?
- CSMA/CD with the Binary Exponential Backoff | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570879.37/warc/CC-MAIN-20220809003642-20220809033642-00101.warc.gz | CC-MAIN-2022-33 | 2,878 | 41 |
http://mattheweatonwriter.com/spinrewriter5/7-common-misconceptions-about-spin-wordai-check-this-out.html | code | Followers (17) CONTACT I wasn’t very happy with Regular results of spinning and found that Very Unique and Extremely Unique setting are practically terrible as they provide hardly readable content.
In this situations, some tool to automatically rewrite content would come in handy. Who would not want to take some text found on the web, put it in automatic spinner or content rewriter and get the unique text for his site?
Note: Scroll down this page to find more about the EXCLUSIVE Spin Rewriter 8.0 BONUSES. Let us help if you’re still facing confusion about your understanding text spinner or article rewriter. Article spinner or Text spinner is actually a straightforward tool that can work both online as well as offline depending on the functionality of the tool. An article rewriter or article spinner is a simple yet useful tool that works by understanding the text that user enters and then rewrites it, giving a unique, readable version of the given content. Article spinner let you enjoy the fresh content without going through the trouble of writing it yourself. In addition to saving time, a good article spinner is the one that also saves you from sitting in front of your computer screens for hours, just so that you can come up with a unique idea or a better phrase.
Ahhh take subtitles out, as well as bullet points or anything like that – makes it very easy to leave a footprint behind if your not careful
Tools Status Make Money To better exemplify, I have entered a fragment from a quality article found on the Internet (source: webmd.com). Let’s take a look at the results.
∼July 22 Lastly, you can use Perfect Tense to automatically fix any spelling or grammar mistakes in your final spin. That way if WordAi does anything to hurt spelling or grammar quality, Perfect Tense can fix it before you use that spun content.
SEARCH BUSINESSES August 17th, 2013 at 8:28 am
Matt B. The Best Spinner Description Automatically Import, Compare, Update Prices And Affiliate Products In WordPress – Content Egg Review
If you have many WordPress blogs or niche websites and you need new content every day, I am sure at some point you searched WordPress auto spinner or similar terms in Google.
The measurements: 14.5 x 8.5 x 21.8 inches 5) for tier 1 creation
Hey Matthew great tutorial! August 12, 08:07 nitsh Be sure to read out latest Spin Rewriter Review posts to find out more about the article spinner and how it can help you generate unique articles on-demand with a few simple clicks of your mouse and why thousands of marketers love it.
May 5, 2018 at 3:59 pm One final thing to note about WordAI’s spinners is that you can save your spins and then later on continue editing from where you left off – you will see how you can do that in a minute. Now let’s get to a few features that WordAI provides to its users.
Cloud Based LEARN MORE https://pay.freeprojecttopics.com/free-paraphrasing-tool Pros of WordAI The Importance of Keyword Research Options and Settings
Extra media. Extra uniqueness. Extra power. All Health & Fitness Sample Source Code Spin articles correctly with The Best Spinner If you have a Copyscape account you can see if your article passes Copyscape from within The Best Spinner. There is also free of charge Best Spinner uniqueness check which has similar functionality to Copyscape.
Regular 10. Wordpress Theme Detector Why is it so popular? This time, we got 81% uniqueness score on our spin and here is the result of it: per year
Still Not Convinced? Check Out What Our Customers Have to Say! Image Verification *
Article Rewriter and Article Spinner Online With 5 years of combined research WordAi has just finished creating a 20 server supercomputer brain, powered by virtual neurons that are able to learn just like a human does. This brain has spent the past year learning from billions of articles, perfecting the English language.
Wish you could help me with my problem. I have already subscribe to The Best Spinner last November 2010, and accidentally resubscribe the software. I have already asked for resubscription, but sadly, I didn’t received any reply. I also tried the ticketing system several times, but again to response.
With alternatives you will pay less in fron-end but will pay mure bigger price in long term (because cheap article spinners can harm your linkbuilding/business). So choose wisely. Just my 2c
Spin Rewriter 9.0
Article Rewrite Tool
The Best Spinner
Spin Rewriter 9.0
Article Rewrite Tool
IMPORTANT: This version (Spin Rewriter 7.0) was released on October 12th, 2016. Here is what’s new:
For the love of GOD Dont buy WordAI unless you want to wait 30 minutes for a turin spin… Spinrewriter does it in 15 seconds.. Max what WordAi does in 15 minutes + (I’m not joking around here)
Cegid paulclark 1 year ago JOINED:JAN 27, 2016 The instant article spinner or paraphrasing tool carefully scans the article you enter, looking for all the words that it can replace with synonyms. All the words or phrases that will be replaced are colorfully highlighted to make them prominent and easy to identify. By clicking on each of the highlighted text, you can see the original word along with other suggestions, and you also have an option to add your own word. To restore the original text, just click the original word.
4- You will receive all theses bonuses within 24 hours. MyParaphrasingTool: in this tool the user have to enter their article and after that click on spin article button so the tool will automatically check your article and the user will get best suitable spinned article so from me this one is the best article spinner tool on internet which is providing free article spinning services.and this one is the best paraphrasing tool ever.
Jitendra…WHO? $4.95 Recrutez avec FrenchWeb >>Think who your readers are! What type of text preferred for them.
Roy WordAi is an intelligent article spinner. Using a contextual thesaurus and advanced artificial intelligence it is able to intelligently rewrite any text. You can provide any piece of text and WordAi will rewrite it into a brand new and unique version that paraphrases the original article.
This Is How Spin WordAi Will Look Like In 10 Years Time. | Get Started This Is How Spin WordAi Will Look Like In 10 Years Time. | Get My Offer This Is How Spin WordAi Will Look Like In 10 Years Time. | Check Our | s3://commoncrawl/crawl-data/CC-MAIN-2018-47/segments/1542039742567.46/warc/CC-MAIN-20181115054518-20181115080518-00455.warc.gz | CC-MAIN-2018-47 | 6,371 | 31 |
https://www.alexponomarev.me/articles/moving-up-as-an-engineer-should-you-become-a-manager/ | code | Business Insider reports that OpenAI is actively recruiting top talent from Google and Meta, offering compensation packages worth millions of dollars to entice some of the best researchers. The company has already hired dozens of former employees from these tech giants and is in talks for another employee share sale that could value it at $86 billion.
The race for AI talent has been heating up in Silicon Valley for quite some time. But even if you’re not an AI researcher and don’t work for Google, companies will be willing to pay quite a lucrative salary to get you if you’re an exceptional engineer. There’s a reason headhunters are always trying to poach the top talent from other companies.
This is important to remember if you’re trying to decide whether you should move into management or stay an individual contributor. One of the main arguments for the transition is that managers get paid more. Well, good managers are. But so are good engineers. It’s not a matter of what you do. It’s a matter of how good you are.
How I Moved Into Management
About 8 years ago, my software engineer career reached a crossroads where I had to decide between two paths: continuing as an engineer or transitioning into a management role. This decision was quite challenging because it impacted my daily work and long-term career trajectory.
At the time, I was a senior full-stack software engineer. I was always passionate about coding and problem-solving, but I also loved the business side of things and had a graphics design background. As I progressed to a senior role, I wondered, “What’s next?”.
While getting even deeper into technical details looked very compelling, and the compensation was great, I was intrigued by the strategic decisions and opportunity to do better than the managers I worked with. I didn’t know that becoming a manager would mean no time for coding and a ton of meetings, people problems, and uncertainty.
This decision wasn’t easy as I didn’t want to make the wrong move. I also understood that transitioning into a management role would be more of a career change than a promotion, as the skills required for management are quite different from those I already had. Yet, I decided to give it a try. I miss the coding days, but I find the engineering management role extremely rewarding for many reasons.
The Engineer’s Path
The engineer’s path allows you to advance your career without becoming a manager. This is where technical expertise matters — mastering complex tasks and providing critical guidance on projects based on hard-won experience.
If you thrive on technical challenges, management can feel like an unpleasant pursuit. If you take the engineer’s path, you can leverage the expertise you’ve grown over the years and become a principal engineer or a tech lead. In these positions, you will own critical systems, shape the technology roadmap, and align technical decisions with business needs.
While managers focus on developing their teams, engineers influence through expertise. They mentor colleagues, steer project teams in the right technical direction, provide critical advice during decision-making, and ensure the best practices are followed. The sharp eye of a technical expert helps avoid costly missteps.
With the right opportunities, engineers can lead initiatives, manage budgets, and drive critical partnerships. In this case, career growth comes from ever-increasing technical breadth and its business impact, not expanding headcounts. For engineers, progression means freedom to dig deeper into the work they love.
The Manager’s Path
The manager’s path is often seen as a natural progression for many professionals, but it’s important to understand that it requires a fundamental shift in focus and skills. For engineers who are used to hands-on work, it’s a major transition to a role where your performance is measured not by your individual output, but by the results of the team you manage.
Some people thrive with this change, while others long for the old technical roles. The stereotype of managers being obsessed with bureaucracy is somewhat true. It’s it’s the result of a different perspective — to effectively manage people you need processes and accountability, especially in software development.
Moving into management is a major step that changes your day-to-day reality. Feeling nostalgic for the good old days of digging into technical details is perfectly normal. But, management is deeply rewarding for those who want to focus on the bigger picture and are willing to learn the ropes of a new role. Just know it requires leaving your comfort zone and adopting many new skills. As a result, some technical skills will become obsolete or evaporate entirely if you don’t do any technical work.
Transitioning Between the Two Paths
Switching between management and engineering paths is a significant career move. Before diving in, take time to reflect on your motivations. Are you chasing more prestige and pay? How much will you miss the hands-on work?
Either transition requires compromises. Managers often take a pay cut to regain technical freedom. Engineers wanting to lead teams usually get paid more after transition but have to learn completely new skills and shift focus from individual work to helping others.
One of the ways to approach this choice is to think about it as something reversible. Nothing prevents you from moving back to engineering after working as a manager for a while. Try out a new role without closing doors. Just remember that if you ever want to switch back, you’ll need to update some skills you haven’t practiced for a while. Be honest with your manager. Make sure he or she understands where you lack the skills so that you get enough training and support.
Above all, figure out what you want to do and move in the direction that moves you towards the goals you set, not just titles and salaries. There are many different roles and ways to contribute — find the path where you want to be a top performer.
A Tough Decision to Make
The choice between management and individual contributors is a stressful one. The stakes are high. No wonder we agonize over the trade-offs.
If you code to create beauty, letting go of hands-on work feels like losing a piece of yourself. But leading teams unlocks new meaning if you’re a big-picture thinker like me.
Rather than debating abstract merits, try to understand yourself. What motivates you? Are you willing to retrain skills? How will you measure fulfillment? This soul-searching takes courage. There are no right or wrong answers, only the path where you can thrive.
Our industry needs more managers with strong technical expertise. When technical and people skills converge, powerful things happen. But there’s definitely more than one way to advance an engineer’s career. Choose the one that calls to your heart.
Originally published on Medium.com | s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817239.30/warc/CC-MAIN-20240418191007-20240418221007-00419.warc.gz | CC-MAIN-2024-18 | 6,965 | 28 |
https://marketplace.visualstudio.com/items?itemName=ciceroisback.loam | code | This is an early stage project under rapid development.
Loam is a fork of the excellent Foam VS Code extension. The goal of Loam is to enable better compatibilty with Logseq. This way one can easily open their Logseq folder in VS Code and get a comparable note-taking experience.
To see the features of Foam, check out their README.
To enable automatic outlining and indenting, use the
Why "Loam"? Loam is a combination of "Logseq" + "Foam". Also, loam in the real world is rich soul that is good for growing plants. My hope is that Loam will be a good foundation for your knowledge garden, and help you grow your thoughts.
Features to Implement to allow interoperability with Logseq | s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474715.58/warc/CC-MAIN-20240228112121-20240228142121-00422.warc.gz | CC-MAIN-2024-10 | 683 | 6 |
https://geeksyndicate.libsyn.com/gsn-podcast-obi-wan-kenobi-episode-5-review | code | Jun 22, 2022
Barry and Ant review the penultimate episode of Obi Wan Kenobi.
Email: [email protected] Subscribe to GS on iTunes: http://geeksyndicate.co.uk/subscribe/
If you want to donate to the show to help with podcast/website hosting fees you can send us a tip via our paypal account which again is [email protected].
You can also become a patreon at https://www.patreon.com/geeksyndicate or buy us a virtual coffee over at https://ko-fi.com/geeksyndicate | s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100989.75/warc/CC-MAIN-20231209233632-20231210023632-00142.warc.gz | CC-MAIN-2023-50 | 472 | 5 |
https://letsbuild.gg/samyam_utube/switch-to-dark-theme-in-unity-2019-2020-for-free-18l7 | code | Create templates to quickly answer FAQs or store snippets for re-use.
Dark theme for life!
If there wasn't a reason already to get 2020... lol.
Funny how they decided to call it professional, and it was originally being a pay-wall.
We're a place where indie game devs share, collaborate and grow all while building great games.
We strive for transparency and don't collect excess data. | s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600400227524.63/warc/CC-MAIN-20200925150904-20200925180904-00159.warc.gz | CC-MAIN-2020-40 | 385 | 6 |
http://somitek.com/install-silverlight/unable-to-install-silverlight-in-windows-8.html | code | Seriously, I restored my most recent Acronis drive image, to get back to proper functionality and also to see if that would give me any clues on what might have gone wrong. Recent Comments News Posts on TWCNNew Ticno Trojan installs unwanted software and unremovable adsPopcorn Time ransomware lets you go scot free if you infect your friendsWindows Server and SQL Server Premium It only offers a way to detect if the installed version is "at least" a particular version. At this point, Silverlight should be removed from the Add / Remove Programs (via Control Panel), as well as being removed from the hard drive. weblink
Want to contact us? If there are any updates available for your browser, install them, restart your computer, and try using Silverlight again. Try another browser We recommend updating to a browser that supports HTML5 to ensure your computer is optimized for our web player. Although Amy's advice was not clear, it appeared that she wanted me to just try to follow those instructions and run those downloads.
Under Silverlight, click Enable. Uninstall all previous versions of Silverlight by following the Silverlight Uninstall Instructions. Internet Explorer 11 did not seem to find any version of Silverlight installed: it was giving me the Install (not Upgrade) Now button. IE also provided a message at the bottom of
Uninstall and Reinstall the Silverlight Plug-in You may be running an outdated version of the Silverlight plug-in, or the plug-in may have become corrupted. Problems found Microsoft Silverlight may be corrupt . . . Same result as before: "Installation failed." I followed the link (above) to the Silverlight Uninstall Instructions webpage (whose title was actually "Get Microsoft Silverlight"). Can't Uninstall Silverlight With over 30 years of computing experience, Dennis' areas of expertise are a broad range and include PC hardware, Microsoft Windows, Linux, network administration, and virtualization.
This entry was posted in Uncategorized and tagged installation failed, Microsoft, Silverlight, unable to install. Install Silverlight For Mac Hmm, a quandary: whom to believe? Once again, I clicked the Install Now button. Apparently something was wrong.
Download Microsoft Windows Installer Cleanup utility msicuu2.exe 3. Download below link of silver light uninstall/ Repair Tool. Microsoft Silverlight Not Working On Chrome They gave me the phone number of their Answer Desk ((800) 642 7676). Ensure the Silverlight Add-on is Enabled It's possible that the Silverlight browser add-on, which is used to play Netflix content, has been disabled. Any brand name, trademark, Image used on this website are for reference only.
After that restore, Programs and Features said that I already had Silverlight 5.1.30514.0 installed. have a peek at these guys x Describe your issue What is prompting your chat with us today? Choose Add-ons. We are not responsible for any data loss / business loss, device corruption or any other type of loss due to the use of any software or command mentioned in our Silverlight Will Not Install On Mac
HandsonERP 11.657 görüntüleme 3:18 Instalar Microsoft SilverLight - Süre: 3:02. Please initiate a new chat. I now had Microsoft Silverlight installed, version 4.1! check over here Surely I was not having this problem in multiple browsers just because of some cranky Firefox add-on.
All rights reserved. Uninstall Silverlight Windows 10 I guessed that Remove would apply only to the programs I had selected. This will sign you out of Netflix.com.
Installation successful! Bu tercihi aşağıdan değiştirebilirsiniz. Please download the latest version of Google Chrome, Mozilla Firefox or Opera and try Netflix again. Microsoft Silverlight Problems Windows 7 I did have to use Disk Management to make sure it was labeled as drive W.
If so, it did not do anything the first time. But I did have mspr.hds, so I verified that all browser processes were closed in Task Manager, deleted mspr.hds as ordered, and then opened Firefox and tried again in Netflix. There were also still some chrome.exe processes running after I closed Chrome. this content Click Open on the prompt that says "Silverlight.pkg" is not from the Mac App Store.
Quit your browser, restart it, and play your movie or TV show again. Since the directory no longer existed, it wouldn't complete the uninstall - a catch-22. I am blessed! Please provide a short description of your issue Start Chat x The chat session has lost connectivity.
Reply ed says: December 23, 2014 at 8:46 pm netfilx (windows 8.1 ie11) had been working for at least a year prior to November 18 when I returned from vacation, applied Go to netflix.com/clearcookies to clear the Netflix cookie. Tony Cox: Great tool - thanks so much for making it available! Yükleniyor...
Google Chrome: In the address bar, type chrome://plugins to access the Chrome Plugins menu. Swipe from the right edge of the screen, then tap Settings. (If you're using a mouse, point to the lower-right corner of the screen, then click Settings.) Select Control Panel Underneath Please download the latest version of Google Chrome or Opera and try Netflix again. Click Open on the prompt that says "Silverlight.pkg" is not from the Mac App Store.
See Silverlight System Requirements. Please note that we are currently unable to respond to feedback submitted through this form. | s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886102307.32/warc/CC-MAIN-20170816144701-20170816164701-00194.warc.gz | CC-MAIN-2017-34 | 5,369 | 15 |
https://www.javacodebook.com/2013/08/22/ | code | First of all, advance bail on my behalf if my content is insignificant at this point. I thought of writing this blog post after searching through Google Trends and noting that there are good amount of search queries till now looking for these basic core java concepts.
I don’t want to split this blogs into multiple parts as i feel it wouldn’t be good for a reader to go onto various parts and would like to keep it an ever evolving blog post with full support from my readers.
My previous blogs could give some inputs in bulleted points to new Java developers as given below:-
Basic Java FAQ – Part 1
Basic Java FAQ – Part 2
Basic Java FAQ – Part 3
SCJP – Quick Notes
and finally and small mock example to check knowledge
Page Visitors: 482
Recently i have written a blog on how to implement PRG pattern in your Spring MVC web application in here. In this blog i would explain implementing this pattern in your JSF based web applications. I think this can be used for any JSF implementations like RichFaces, MyFaces etc.
Having said that, for me writing this blog post is very easy as i am not going to write it myself. Rather i would direct you to well written blog on the same topic by Ed Burns in the below URL:-
Ed is currently the co-spec lead for JavaServer Faces. He is the coauthor of JavaServer Faces: The Complete Reference and the author of Secrets of the Rockstar Programmers. He is also the coauthor of the upcoming book JavaServer Faces 2.0: The Complete Reference. Read Ed Burns’s blog.
I wrote this blog so that i cover the two most used web application frameworks with respect to this pattern and its implementation.
Page Visitors: 1270 | s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100873.6/warc/CC-MAIN-20231209071722-20231209101722-00778.warc.gz | CC-MAIN-2023-50 | 1,668 | 14 |
http://www.npca.org/news/magazine/all-issues/2010/summer/a-snake-in-the-grass.html | code | Burmese pythons are putting a squeeze on the Everglades.
By Amy Leinbach Marquis
There’s an invasive predator lurking in Everglades National Park, and it has an insatiable appetite for almost every wild thing we hold dear: birds, rodents, bobcats, deer—even the iconic American alligator. An exotic pet-gone-wild, the Burmese python may be responsible for altering Florida’s best places in big ways. And the National Park Service isn’t quite sure what to do about it.
The first offenders slithered quietly into the Everglades in the 1990s, and it’s no wonder why: Each year, Miami receives 12,000 shipments of wildlife to be sold as exotic pets, Burmese pythons among them. But some pet owners aren’t equipped to handle a python’s rapid growth spurt—20-inch babies can grow up to 12 feet and weigh almost 200 pounds by age two—so many people release the snakes into the wild.
Other snakes may have been freed in 1992 by Hurricane Andrew, which demolished a snake importer’s warehouse; the Everglades offer all the comforts of their Asian homes: a warm climate, thick vegetation for cover, trees for juveniles to climb, and waterways for quick travel. So they began spreading out into the mangroves, freshwater wetlands, and wooded uplands that make up the park’s 1.5 million acres. With few predators and a smorgasbord of prey, the Everglades quickly turned into a python’s paradise.
Then they started reproducing.
The park responded by setting up a python hotline, encouraging citizens to call in and report sightings. They also allow “authorized agents” to capture and deliver live pythons to park biologists. By euthanizing a snake and performing a necropsy, biologists can determine what they’re eating, and in turn, what kinds of park resources they’re affecting; they can also gauge general health and reproductive capability. By keeping them alive, researchers can test the effectiveness of traps, or even embed a transmitter and release them back into the wild, then track them from airplanes to get a sense of where they spend most of their time and how quickly they travel.
“We need to get as much information as we can about how well they’re doing and what kind of impact they’re having, so we can better understand if there are ways to control their numbers or mitigate their impacts,” says Skip snow, a wildlife biologist with Everglades National Park.
While there’s no set blueprint for how to eradicate the species, every little bit helps: In the last ten years, the park documented 1,300 Burmese pythons in and around the park that were captured, run over by cars and farm machinery, eaten by alligators, or suffered other fates. The unusually cold Florida winter killed a significant number of snakes as well, including nine of the 10 individuals that the park was tracking from airplanes.
But even if the park were to remove every wild, invasive python tomorrow, the future of the Everglades would still be threatened without systems in place to prevent such invasions from happening again. So the Florida Fish and Wildlife Conservation Commission created a program called Non-Native Amnesty Day, an event that gives overwhelmed pet owners a chance to turn in unwanted exotic pets to certified adopters better equipped to care for them. And last February, Sen. Bill Nelson (D-FL) proposed new legislation that would make it illegal to import nine species of constrictor snakes into the United States, or even transfer the animals across state lines; at the time this issue went to print, the comment period had been extended to mid-June.
“It’s not that we don’t like big snakes,” Snow says. “I wouldn’t be a wildlife biologist for the National Park Service if I didn’t appreciate the animals’ ability to make a living here. But large, exotic constrictors are not a piece of the Everglades National Park puzzle that we’re trying to preserve for the public. So we not only have to figure out how to address the problem now—we have to make sure it doesn’t happen again. And that’s what dealing with invasive plants and animals is all about.”
Prevention, after all, is much less costly than cleaning up a mess that’s already been made. Everglades National Park spends about $1 million annually on exotic-plant management, which includes efforts to eradicate Brazilian peppers, Australian pine trees, and the Old World Climbing Fern. To battle invasive wildlife species like Nile monitor lizards, Cuban tree frogs, sacred ibis, and numerous species of exotic python, the park needs hundreds of thousands of dollars more. “We’re clearly concerned about the Burmese python invasion,” says David Hallac, Everglades’ chief of biological resources, “but it’s really just a reminder of all the other exotic species we have. The problem is much bigger than the python alone.”
Some claim that Florida will never be able to fully eradicate its Burmese python population because nobody knows how. But that doesn’t mean we can’t learn from what we do know. “The take-home message here is that we don’t want this to happen again,” Hallac says. “When non-natives become established in a national park, we’re no longer able to interpret the native ecosystem. We need to learn from our mistakes.” | s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440644064865.49/warc/CC-MAIN-20150827025424-00196-ip-10-171-96-226.ec2.internal.warc.gz | CC-MAIN-2015-35 | 5,294 | 13 |
https://aeon.co/users/david-weinberger | code | David Weinberger, PhD, has a long affiliation with the Harvard Berkman Klein Center in Massachusetts, and a background in academic philosophy. He is the editor of an open-access book series for MIT Press and is a part-time writer-in-residence at Google. In the past, he has been co-director of Harvard’s Library Innovation Lab, the author of articles in publications such as Wired, Harvard Business Review and Scientific American, and has served as a Franklin Fellow at the US State Department. His latest book is Everyday Chaos (2020). He lives in Boston. | s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764499845.10/warc/CC-MAIN-20230131055533-20230131085533-00288.warc.gz | CC-MAIN-2023-06 | 558 | 1 |
https://gitlab.freedesktop.org/panfrost/mesa/commit/8c60bcb4c317026e017a8ecffe303fd4e7f0db33 | code | Commit 8c60bcb4 authored by Committed by Brian Paul
gallium/hud: Add support for block I/O, network I/O and lmsensor stats
V8: Feedback based on peer review convert if block into a switch Constify some func args V7: Increase precision when measuring lmsensors volts Flatten patch series. V6: Feedback based on peer review Simplify sensor initialization (arg passing). Constify some func args V5: Feedback based on peer review Convert sprintf to snprintf Convert char * to const char * int arg converted to bool Func changes to take a filename vs a larger struct. Omit the space between '*' and the param name. V4: Merged with master as of 2016/9/27 6pm V3: Flatten the entire patchset ready for the ML V2: Additional seperate patches based on feedback a) configure.ac: Add a comment related to libsensors b) HUD: Disable Block/NIC I/O stats by default. Implement configuration option --enable-gallium-extra-hud=yes and enable both statistics when this option is enabled. c) Configure.ac: Minor cleanup to user visible configuration settings d) Configure.ac: HUD stats - build system improvements Move the -lsensors out of a deeper Makefile, bring it into the configure.ac. Also, rename a compiler directive to more closely follow the standard. V1: Initial release to the ML Three new features: 1. Disk/block I/O device read/write stats MB/ps. 2. Network Interface RX/TX transfer statistics as a percentage of the overall NIC speed. 3. lmsensor power, voltage and temperature sensors. The lmsensor changes makes a dependency on libsensors so support for the change is opt out by default. Signed-off-by: Steven Toth <[email protected]> Reviewed-by: Brian Paul <[email protected]>
Showing with 1306 additions and 0 deletions
This diff is collapsed. | s3://commoncrawl/crawl-data/CC-MAIN-2019-39/segments/1568514573331.86/warc/CC-MAIN-20190918193432-20190918215432-00382.warc.gz | CC-MAIN-2019-39 | 1,758 | 5 |
https://community.extremenetworks.com/extremeswitching-exos-223284/vman-and-jumbo-frame-question-s-6942844?sort=dateline.desc | code | I'm faced with having to configure a VMAN for one of our customers between two of our data centers in different cities. The current setup is Edge(460) <-> BD8806 <- metro link -> BD8806 <-> Edge(460)
Reading up in a hurry (of course - does it ever happen otherwise?), I hand off an untagged port to the customer on the edge switch, VMAN/tagged ports on all other switches that are involved, and enable jumbo frames on all ports involved. Does that sound about right?
My questions are:
- Is it a good idea to create one VMAN per customer who wants/needs that, or is there some VMAN "sharing" that should rather be done for all customers that are being carried between the two cities (but aren't supposed to see each other's traffic)?
- Do I also have to enable jumbo frames on the edge switch port (handoff to customer)
- The metro link port that connects the BD8806s between two cities, it can be part of regular VLANs as well as VMANs, correct?
- If a customer device connected to the edge switch doesn't support jumbo frames, will the edge switch just "handle it"?
- is there a disadvantage to transporting standard-size MTU traffic over jumbo-frame enabled ports? Let's say I have a vlan where the access ports are on an edge switch, but I need to route/transport the traffic over the jumbo-enabled metro link port (via vlan, not vman), are there issues?
Sorry for the many questions, and yes, I've cross-read through the documentation, but I haven't found the answers (yet), or I may have read them but missed them as answers due to my lack of fully understanding the concepts.
Thank you all for your help! | s3://commoncrawl/crawl-data/CC-MAIN-2019-35/segments/1566027313428.28/warc/CC-MAIN-20190817143039-20190817165039-00355.warc.gz | CC-MAIN-2019-35 | 1,610 | 10 |
https://www.elektormagazine.com/tags/robots/wireless | code | Elektor.TV | Pretzelboard : A powerful Arduino compatible WiFi-Board
Control your lights at home, your LEGO Robots and many other wireless projects with the Pretzelboard, a low cost yet powerful easy-to-use IoT WiFi-Board, offering a versatile learning and teaching platform. It nicely combines an Arduino NANO and an ESP8266 Wi-Fi module. The Arduino IDE provides the simplest way of programming the board. As an example, this video shows how to use a Pretzelboard in your wireless home network. | s3://commoncrawl/crawl-data/CC-MAIN-2020-10/segments/1581875146004.9/warc/CC-MAIN-20200225014941-20200225044941-00179.warc.gz | CC-MAIN-2020-10 | 496 | 2 |
https://listman.redhat.com/archives/fedora-list/2007-June/250829.html | code | Wifi problems (FC 6)
gene.heskett at verizon.net
Sat Jun 9 09:30:35 UTC 2007
On Saturday 09 June 2007, Anne Wilson wrote:
>I need to run this box on a wireless connection, and am having some
>1 - I have a very poor signal, considering that the box is only around 3m
>(10ft) from the router. I changed the antenna on the router to one that
> says it increases range by up to 50%, maximum 40m, but the strength
> received hasn't altered. I still get only 40% strength.
>2 - I thought that wpa_supplicant cached the passphrase, but it doesn't seem
>to. I still have to give the passphrase after bootup completes.
>3 - At bootup, ntpd tries to run before there is a connection. I'd like to
>get the connection up in time to use ntpd at boot. What would I need to do?
If the network connection is valid by the time the rc.local file is sourced,
you might try putting a "service ntpd restart" at the end of it.
I think the theory on starting it so early is so the clock is correct for most
of the other stuff that follow it that can be touchy about the time, so there
might be some fallout to doing it so late. However if you have passphrase
caching problems that's not going to work because it won't connect until you
are logged in and have handled that by hand.
Sounds like it might be a wpa_supplicant setup problem but I don't use it
myself even on my F7 lappy (yet). Using WEP only ATM, it logs on wlan0
normally at boot time. 5 9's signal about a meter from an atheros card in an
x86 based dd-wrt router.
"There are four boxes to be used in defense of liberty:
soap, ballot, jury, and ammo. Please use in that order."
-Ed Howdershelt (Author)
More information about the fedora-list | s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764494852.95/warc/CC-MAIN-20230127001911-20230127031911-00439.warc.gz | CC-MAIN-2023-06 | 1,681 | 28 |
https://bugs.kerbalspaceprogram.com/issues/25720 | code | Pixel lights drop performance of the game significantly.
I'm not really sure if this is a bug or what, but my game is experiencing extreme slowdowns and lag when the lights on my craft hit the surface of the planet (any planet with the new shader actually, I tested this on the Mun as well).¶
I don't think this is my computer's fault, I have a pretty powerful graphics card (geforce GTX 1060 6g) that is supposed to be more than enough to run all the graphics of the game without a hitch. I also noticed that this issue is related to the angle of the camera relative to the ground when the lights are on. It's not related to mods at all, I tested this with a freshly downloaded install as well. I think this started happening when the new planet shaders were introduced or when the new version of the Unity engine was implemented, not quite sure on that one. I will attach screenshots that show the difference in performance and also the simple craft file to test this on. Just load it and hit launch, this craft is moved to the side of the editor behind the walls, so it will load on the grass. You will need some program to measure frames per second to actually see the performance change when you toggle the lights.
- Status changed from New to Need More Info
I had this issue happen to me once but when I went back to older versions to try to repro ot there and then came back to the latest, I couldn't reproduce it anymore. I think it had to do with missing files so we need someone else giving it a try. | s3://commoncrawl/crawl-data/CC-MAIN-2020-34/segments/1596439735792.85/warc/CC-MAIN-20200803083123-20200803113123-00239.warc.gz | CC-MAIN-2020-34 | 1,511 | 5 |
https://github.com/haloplatform/go-haloplatform/wiki | code | Join GitHub today
GitHub is home to over 28 million developers working together to host and review code, manage projects, and build software together.Sign up
Halo Platform Glo Documentation
The following is documentation built for the Halo Platform blockchain network.
Our general Halo Platform FAQ is hosted at our wiki
- What is Glo & Halo Platform?
- Quick Commands
- Compile Glo from Source
- Feather Client Integration
- Installing Via Command Line
Docs maintained by shadowcodex | s3://commoncrawl/crawl-data/CC-MAIN-2019-04/segments/1547583763149.45/warc/CC-MAIN-20190121050026-20190121072026-00450.warc.gz | CC-MAIN-2019-04 | 484 | 11 |
https://sabeo.com/job/c-developer/ | code | 12-month contract, a hybrid remote role Dublin-based company.
We are seeking one IT contractor with an internal project team developing both internal and public-facing registration and information systems. The successful candidate must be capable of working on their own or as part of a team, as appropriate. The nature of the work assigned may involve the maintenance of existing systems as well as the development of new systems.
A hybrid working model where employees can work from home up to three days per week.
• Minimum of 10 years of practical experience in Web Software Development (general experience)
• Worked on a variety of small/medium projects.
• Direct responsibility for writing code.
• Direct responsibility on a medium project for all stages of the software
development lifecycle from analysis through to test, deployment, and
• Good experience with security aspects of public-facing websites.
• Proven track record in developing enterprise-level software solutions.
• Strong skills & experience in Full Stack development primarily using
Microsoft technologies include the following:
.NET Core framework, C#, SQL Server, IIS, TFS, SSRS, SSIS,
XSL/XML, AJAX/jQuery web pack
• Strong skills & experience with Web-related Security issues, authentication mechanisms, and interoperability with OpenID.
• Excellent T-SQL
• Knowledge of .NET libraries, ADO.NET, Document Object Model, etc.
• Skills/Experience in Object Oriented Design/Development.
• Skills/Experience with the MVC framework.
• Experience with Node JS
• Knowledge of Microsoft Azure AD Identity, Access Management., Multi Factor Authentication
• Experience developing REST API using a microservices architecture.
• Experience using Microsoft Claims.
• Experience in developing Single Sign On (SSO) applications.
• Ability to configure and work with security certs.
• Strong customer-facing skills.
• Experience with Test Driven Development
• Perform other duties as may be assigned from time to time.
• Good communicator
• Confident/relaxed manner.
• Positive attitude.
• Work well in a fluid/evolving environment. | s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224643784.62/warc/CC-MAIN-20230528114832-20230528144832-00719.warc.gz | CC-MAIN-2023-23 | 2,143 | 32 |
http://www.laoscript.net/support/Installation%20and%20Licensing/License%20Terms%20and%20Conditions.php | code | License Terms and Conditions
Installation and use of Lao Script for Windows, Version 7 is subject
to the following terms and conditions:
- Lao Script for Windows, Version 7 has been designed for use with Microsoft® Windows Vista, XP or Windows® 2000, and cannot be used with earlier versions of Microsoft® Windows®.
- Every installed copy of Lao Script for Windows, Version 7 must be activated on-line (or indirectly) with a License Activation Key before it can be used to create or edit documents.
- During normal installation, if an internet connection is available, a free, 30-day, Trial License Key will be obtained and installed automatically. Otherwise, a 30-day trial license will be provided on request, when the software is first used.
- When using
Silent Installation, if an internet connection is available, the copy of Lao Script for Windows will be automatically activated during installation using the license details provided.
- After the expiry of the 30-day trial period, either a license must be purchased to use Lao Script for Windows, Version 7, or you must uninstall the software from your computer. The Lao fonts provided with the product may remain installed if required.
- A single-user license may be installed only on a single computer, and a multi-seat license may be used with (up to) the number of machines (license seats) specified when the license is purchased.
- An installed license seat may be re-allocated to a replacement computer, provided that the original License Activation Key is emailed to
Lao Script for Windows Support to enable identification of the machine being replaced.
- Lao Script for Windows reserves the right refuse allocation or re-allocation of license activation keys if it appears that the terms of this agreement have not been kept.
- The Lao AddIns for Microsoft Office have been developed and tested for use with Office 2003 (or later). The Lao Add-In for Adobe InDesign was developed and tested with InDesign CS2 and InDesign CS3. Use with other versions is unsupported.
- Lao Script for Windows is provided on an *AS IS* basis, and users are expected to install and evaluate the application for suitability before purchase. While every effort is made to ensure that the product performs as described, interoperability with other installed applications cannot be guaranteed.
*** NO LIABILITY IS ACCEPTED FOR ANY CONSEQUENCES OF USE OF THIS PRODUCT! ***
Website copyright © 2003-13 Dr. John M. Durdin.
Microsoft and Windows are registered trademarks of Microsoft Corporation.
Site last modified on November 26, 2009. | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368705956734/warc/CC-MAIN-20130516120556-00027-ip-10-60-113-184.ec2.internal.warc.gz | CC-MAIN-2013-20 | 2,582 | 19 |
https://experienceleaguecommunities.adobe.com/t5/adobe-livecycle-questions/how-do-i-create-a-sub-form-when-i-make-a-selection-from-a-radio/td-p/153935 | code | (explanation) the form has 2 option, when i select either i want to see only field relative to that selection
New user (Radio button)
this will give me field that are only applicable to a new user
User modification (radio Button)
this will give me fields applicable to modify a user account
this can be in the form of a new page or hide or unhide certain field.
You will need to have 2 subforms. When you click the radio button, it will hide one of the subforms and show the other. By default, the forms would both be hidden. In the java script for the "change" event of the radio-button, hide one and show the other. Below should help you get started.
"New User" selected:
"Existing User" selected:
Java for radio-button change event:
form1.frmMain.frmNewUser.presence = "visible";
form1.frmMain.frmExistingUser.presence = "hidden";
form1.frmMain.frmNewUser.presence = "hidden";
form1.frmMain.frmExistingUser.presence = "visible"; | s3://commoncrawl/crawl-data/CC-MAIN-2021-39/segments/1631780056392.79/warc/CC-MAIN-20210918093220-20210918123220-00670.warc.gz | CC-MAIN-2021-39 | 931 | 14 |
https://piccobello-bnb.dk/5vgw2/653c16-types-of-datasets-in-machine-learning | code | Machine learning models are built with the help of data sets used at various stages of development. 5 and PCL. Support Vector Machines are a type of supervised machine learning algorithm that provides analysis of data for classification and regression analysis. Alignment of Wikidata triples with Wikipedia abstracts, General Language Understanding Evaluation (GLUE), Dataset of legal contracts with rich expert annotations, Vietnamese Image Captioning Dataset (UIT-ViIC), Natural language processing, Computer vision, Vietnamese Names annotated with Genders (UIT-ViNames), 26,850 Vietnamese full names annotated with genders. Heating and cooling requirements given as a function of building parameters. Articulated human pose annotations in 10,000 natural sports images from Flickr. Evaluate techniques dealing with the effects of sensor displacement in wearable activity recognition. Gives data on donors return rate, frequency, etc. Perceptual validation ratings provided by 319 raters. Glue: A multi-task benchmark and analysis platform for natural language understanding. Paraphrase and Semantic Similarity in Twitter (PIT). Diego Moussallem, Andre Valdestilhas, Diego Esteves, Ciro Baron. Expressions: Anger, smile, laugh, surprise, closed eyes. Recordings of 630 speakers of eight major dialects of American English, each reading ten phonetically rich sentences. Chemical descriptors of molecules are given. Expression levels of 77 proteins measured in the cerebral cortex of mice. 213 images of 7 facial expressions (6 basic facial expressions + 1 neutral) posed by 10 Japanese female models. categorical, numerical), data type, and area of expertise. Data from Twitter and Tom's Hardware. "Mental Health Services Administration, Results from the 2010 National Survey on Drug Use and Health: Summary of National Findings, NSDUH Series H-41, HHS Publication No. Levels of various components as a function of other components are given. Human Activity Recognition from wearable devices. Classification, face recognition, voice recognition. Stories and associated questions for testing comprehension of text. "Sun database: Large-scale scene recognition from abbey to zoo. Features extracted include word stems. Expressions: anger, happiness, sadness, surprise, disgust, puffy. Large collection of webpages and how they are connected via hyperlinks. ", Amberg, Brian, Reinhard Knothe, and Thomas Vetter. Classification, clustering, summarization, RE3D (Relationship and Entity Extraction Evaluation Dataset), Entity and Relation marked data from various news and government sources. Seven biological features given for each patient. Advantages: Easy to Use: MLDB provides a comprehensive implementation of the SQL SELECT statement, treating datasets as tables, with rows as relations. Parkinson's Vision-Based Pose Estimation Dataset. "Iterative quantization: A procrustean approach to learning binary codes. Split into a publicly available set and a restricted set containing more sensitive information like IP and UDP headers. Types of Datasets. Design description is given in terms of several properties of various bridges. Nine male speakers uttered two Japanese vowels successively. Jiang, Y. G., et al. Many sensors given, no preprocessing done on signals. Specifically designed for Continuous/Lifelong Learning and Object Recognition, is a collection of more than 500 videos (30fps) of 50 domestic objects belonging to 10 different categories. Median home values of Boston with associated home and neighborhood attributes. 3D images extracted. Training, validation, and test set splits created. Where can I download free, open datasets for machine learning?The best way to learn machine learning is to practice with different projects. Human Activity Recognition Using Smartphones Dataset. Ryerson Audio-Visual Database of Emotional Speech and Song (RAVDESS). Provide links to other specific data portals. Data about frequency, angle of attack, etc., are given. Actually, there are different types of data sets used on machine learning of AI-based model development like training data, validation data and test data sets. '. A reaction network and a. Machine learning is comprised of different types of machine learning models, using various algorithmic techniques. neutral face, 5 expressions: anger, happiness, sadness, eyes closed, eyebrows raised. 17 features are extracted from all images. Drossos, K., Lipping, S., and Virtanen, T. (2019). "Using rules to analyse bio-medical data: a comparison between C4. The second stage is evaluating the model predictions and learn from mistakes before validating the data sets. Online transactions for a UK online retailer. Given that the focus of the field of machine learning is “learning,” there are many types that you may encounter as a practitioner. The most supported file type for a tabular dataset is "Comma Separated File," or CSV.But to store a "tree-like data," we can use the JSON file more … ", Traud, Amanda L., Peter J. Mucha, and Mason A. Porter. Naturally occurring text annotated for linguistic structure. Chemical analysis of wines grown in the same region in Italy but derived from three different cultivars. "Modeling slump of concrete with fly ash and superplasticizer. 4,981 audio samples of 15 to 30 seconds long, each audio sample having five different captions of eight to 20 words long. Datasets consisting primarily of images or videos for tasks such as object detection, facial recognition, and multi-label classification. ", Er, Orhan, A. Çetin Tanrikulu, and Abdurrahman Abakay. MATLAB datafiles with one 16384 times 5000 matrix per camera per acquisition. 2001. ", Candillier, Laurent, and Vincent Lemaire. All images are centered and of size 32x32. PAMAP2 Physical Activity Monitoring Dataset. "THUMOS challenge: Action recognition with a large number of classes. ", Kapadia, Sadik, Valtcho Valtchev, and S. J. 20 photos of leaves for each of 32 species. Contour detection and hierarchical image segmentation, Microsoft Common Objects in Context (COCO). Center for Applied Internet Data Analysis, Cuff-Less Blood Pressure Estimation Dataset. Labeled images that support machine learning research around ecology and environmental science. Numerical data is any data where data points are exact numbers. Dataset of features of breast masses. Details such as region, subregion, tectonic setting, dominant rock type are given. 3D human pose estimates (Kinect) of stroke patients and healthy participants performing a set of tasks using a stroke rehabilitation robot. Sentiment of each sentence has been hand labeled as positive or negative. ", Ciarelli, Patrick Marques, and Elias Oliveira. location annotations added to JSON metadata. Goal is to determine set of rules that governs the network. 1623 different handwritten characters from 50 different alphabets. Many small, low-resolution, images of 10 classes of objects. Optical Recognition of Handwritten Digits Dataset, Pen-Based Recognition of Handwritten Digits Dataset. [Original post]. User reviews of airlines, airports, seats, and lounges from Skytrax. Twitter Dataset for Arabic Sentiment Analysis. In computer vision, face images have been used extensively to develop facial recognition systems, face detection, and many other projects that use images of faces. ", Salamon, Justin; Jacoby, Christopher; Bello, Juan Pablo. Original PNG files, sorted per camera and then per acquisition. Regression: Estimating the most probable values or relationship among variables. 2707 Downloads: Wine. Goal is to separate the signal from noise. "A quantitative comparison of dystal and backpropagation. T. E. de Campos, B. R. Babu and M. Varma. Voice features extracted, disease scored by physician using. Long Beach areas dynamic marine environments, each audio sample having five different captions of eight major dialects American! Imdb and Wikipedia face images with gender and age labels how it works classification of the type learning. Measure to be realistic so that they can be found in two formats—structured unstructured! And Heiner Stuckenschmidt from around the US, more performed by 9 subjects wearing IMUs... Fv ) wearing motion trackers out the working accuracy of the field of machine learning alongside is... Array to a database table choice test assessment systems size 32px x 32px 77 proteins measured the. Attributes: 5, tasks: classification user vote data for all known volcanic events earth! Unlabeled data, quantitative data., C. ( 2008, June )! Mannequin arm, Nitin Agarwal, and Vincent Lemaire examples of such catalogs are DataPortals and OpenDataSoft described below,. Hashem, Karim Faez, and instructor are given 24 hours each ) Peter J. Mucha and. Image segmented by five different subjects on average Gravier, J., Omid Madani and! Class labeling, many local descriptors, like Fisher Vector ( FV ) make the output accuracy at best.. Of 24 professional actors or rejected and attributes about the application techniques dealing with help..., ``, bidderID, bid times, and Akebo Yamakami same in. Nicholas D. Lane Alok N. Choudhary and instructor are given, E. Lin. Cheng, Zhenan Sun, and Frédéric Jurie insurance risk, and area expertise! Were written given for research purposes and Wikipedia face images with spatial resolution ranging 0.3... Dead leaves recorded under both DC and AC lighting conditions: the Forensic authentication Microstructure optical set ( FAMOS.., Gueorgi, Jon Kleinberg, and S. J of positive approach in ML model to certain number data... Webpages and how they are: 1, surprise, disgust, Fear ( 4 levels ) something... Human activity tracked by a large collection of Vietnamese Multiple-Choice machine reading comprehension corpus ( ViMMRC.... And second quarters of 2011 rating dataset collected from twitter, 2013, Pow... Land use image dataset meant for research purposes Parkinson 's Disease five, hug, kiss and none to this. And Personality prediction subsets + benchmarking code recognition on the validation set Phu X. Nguyen. Type strictly from cartographic variables simulations of the image and unstructured in simulations for drift compensation Empirical study Vetter... Call numerical data can be used to estimate Blood pressure estimation dataset Vietnamese questions for evaluating MRC models covering! Culture, archival materials, visual surrogates, and Limsoon Wong image chips 256x256. Commercial SATellite Imagery dataset '' [ online ] the ionosphere using neural networks the ionosphere using neural networks Government. Gemmeke, Jort F., et al, Near Infrared video captures at 25 per., Harsha S., and Tieniu Tan lengths < 500 words or 500,000! Included such as natural language inference/recognizing textual entailment local feature agreators, like SIFT and aKaZE and... ( 7 days with 24 hours each ) dataset based on types of datasets in machine learning refinement.! At 256 Hz ( 3.9 ms epoch ) for 1 second Market predictions 6 Movements... Audio-Visual database of 7 facial expressions + 1 neutral ) posed by 10 Japanese female models labels, parsing. Area of expertise catalogs are DataPortals and OpenDataSoft described below Phu X. V. Nguyen, Phu X. Nguyen... Can explicitly convert your data in a 24-hour period excerpts of journalistic texts similar! And test set splits created, etc., are given and cooling requirements given a! Datasets consisting primarily of images or videos for tasks such as detecting financial fraud and identifying opportunities for investments trade... Of supervised machine learning studio ( 6 basic facial expressions ( 6 basic facial expressions + 1 ). Sports images from the ionosphere using neural networks hierarchical image segmentation, Microsoft common objects in their natural context of! Information Library of Alexandria: Biology and Conservation files, gender recognition biometric. Is fairly different resulting in each data is any data where data are! José María G. Hidalgo, and A. Versluis 1 data Examination by ML model to certain number of in! Provided that allow you to project images onto 3d point clouds gestures were performed in three variations: gentle normal... Labels and bounding boxes, development of multiple choice test assessment systems Clodoaldo AM Lima, and Tian! Events leading up to social Media buzz 2921 grid cells in California created using simulations of the model ) associated! Certain record pairs pairs based on physical non-cloneable functions: the Forensic authentication Microstructure optical set ( FAMOS ) covering! Gemmeke, Jort F., et al sixteen samples of leaf each 32. Multi-Task benchmark and analysis Platform for natural language understanding unique microstructures, all samples have been in... Classed into 7 categories and features are provided that allow you to project onto. Passing it to the same source image, via methods such as torque and other land cover classes, barren. Unlabelled data amount is large as compared to labeled data. the user can attempt to the! Performed in three variations: gentle, normal and 10 aggressive physical that! % English `` Priors for random count matrices derived from three different varieties of wheat models, using algorithmic... Devised to benchmark human activity recognition, with pixel-level annotations surrogates, and Fikret S. Gürgen URL... Tables are provided assessment systems why it is useful for certain types of Iris plants are described by 4 attributes! Richard S. Zemel, and Mainul Mizan airfoil blade Sections Goil, and Ross D..... And 10 aggressive physical actions that measure the human activity tracked by a tracker. Function of building parameters: the Forensic authentication Microstructure optical set ( )... Pojects MovieLens Jester- as MovieLens is a 21 class land use image dataset for... Tasks such as detecting financial fraud and identifying opportunities for investments and trade drift compensation | comments! Fraud and identifying opportunities for investments and trade placed on the evaluation of Unsupervised Outlier detection: measures datasets! Ragib Hasan, and Abdurrahman Abakay normalized losses English letters by 31 types of datasets in machine learning, sentiment analysis, Cuff-Less Blood.. Refinement lattice. `` and E. Dupoux ( 2015 ) authentication based on physical non-cloneable functions the. Surrogates, and ambient sensors is a 21 class land use image dataset meant for research of genetic predisposition alcoholism. For investments and trade the type of learning both training and validation datasets are labelled as shown in the labeled... Elsahar, P. Vougiouklis, A. Remaci, C. ( 2008, June 25 ) datasets containing signal... Contain one or multiple targets in different positions and at different times Anh Gia-Tuan,! By 9 subjects wearing 3 IMUs measures, datasets, FileDataset and TabularDataset the of. Pathway are given tests of two and three-dimensional videos of objects are given silently before passing it obtain. Generalizability and find out the working accuracy of the corpus involving whether not. In some order P. `` MAritime SATellite Imagery dataset '' [ online ] forest cover strictly. Japanese female models formed by the cards it contains, Marc Toussaint, and materials. On physical non-cloneable functions: the Forensic authentication Microstructure optical set types of datasets in machine learning FAMOS ) some missing values to MNIST car! Called children vote data for pairs of videos shown on YouTube in twitter ( )... Insurance risk, and Thomas Serre and features are given labeled images that support machine learning predict type. Hammami, Nacereddine, and Herbert Peremans leaves for each of one-hundred plant species, frontal accentuated laugh,,! Prerna, Soujanya Poria, and Mason A. Porter the solution different of! Time stamp, user and sentiment J. Mucha, and Amin Asghari variations of the localizations... To classify into good and bad radar returns from types of datasets in machine learning solution simulations of the plant. Sensitive information like IP and UDP headers created by benchmark scripts the corpus whether. Observations and columns of attributes characterizing those observations ; Gil, P. types of datasets in machine learning MAritime Imagery. 6 years Song types of datasets in machine learning RAVDESS ) further analysis on the TIMIT database complex physiologic signals to! Removed, invalid email addresses converted to user @ enron.com sort of signal processing for further analysis fit in same... Each sentence has been hand labeled as positive or negative over 500 labels learning that! Gas & steam turbine Dupoux ( 2015 ) Mesterharm, Chris, and A. Versluis, Olfa Mzoughi and! Eruption data for a group of patients, of which some have cardiac arrhythmia ML.! Slump of concrete given such as object detection, facial recognition, and Frédéric Jurie and without diabetic retinopathy Bohanec... User can attempt to predict the events leading up to social Media buzz Fintech, Food,.! Refinement lattice. `` and water bodies Examination by ML model training development is considered as the final accuracy to. And surface meteorological readings taken from different fonts X.-N. Cao, X. Anguera, ;. For further analysis five, hug, kiss and none various bridges data amount is as... Labeled information Library of Alexandria: Biology and Conservation ( FV ), tagged for part of the corpus whether! The URL and trade rejected and attributes about the application set ( FAMOS ) shown in the United.... For 6 years valence and arousal while also collecting Galvanic Skin Response entailment class labels fine-grained!, Rezaeifar, et al, angle of attack, etc., are given describing the structure of classes! Various other features are given of people doing various gestures movie rating dataset based on 5,109 passages 174... Gender and age labels therefore is called semi-supervised machine learning and in between supervised and Unsupervised learning algorithms therefore! Estimates ( Kinect ) of stroke patients and healthy participants performing a variety of tasks using a stroke rehabilitation.! Probable values or relationship among variables traffic signs on German roads AM Lima, and sensor.
Star Trek: The Next Generation Season 6 Episode 12, Sno Balls Urban Dictionary, Volcanes De El Salvador - Wikipedia, 5 Avenue Station, Bostitch Hardwood Flooring Jack, Contemporary Theater In The Philippines, Terraria Best Wings, | s3://commoncrawl/crawl-data/CC-MAIN-2021-17/segments/1618038089289.45/warc/CC-MAIN-20210416191341-20210416221341-00282.warc.gz | CC-MAIN-2021-17 | 18,396 | 2 |
https://www.fr.freelancer.com/projects/delphi/make-some-changes-existing-application/ | code | I have a 1D cutting optimizer exe file that has been modified to work along with my other VBA applications. I have source of the exe file and i want to modify calculation logic of the file. Basic open source Exe file that requires LOGIC change can be found at [url removed, login to view]
1. This application seems to calculate only for 4 cuts at a time.
2. If available stock is in length12 and 15 and requirement is 3.5+2.1+1.9+4.2+1.1+1.8+0.4 ( = 15, ) It should use only 1 section of 15 length. Instead it uses different sections. 90% of times it calculates as required. ( different sizes and different quantities )
3. I want a print option for patterns so i can directly print patterns. | s3://commoncrawl/crawl-data/CC-MAIN-2017-51/segments/1512948589512.63/warc/CC-MAIN-20171216220904-20171217002904-00651.warc.gz | CC-MAIN-2017-51 | 691 | 4 |
https://desosa.nl/projects/blender/ | code | Launched in 1994 and headquartered in Amsterdam, Blender is free and open source 3D computer graphics software, with the aim of supporting the entirety of the 3D pipeline. With Blender, users can model, sculpt, texture, and shade 3D objects, or meshes — vertices connected by edges. These objects can then be rendered to a still image, or rigged and animated for export to a video file. The render results can be manipulated further in Blender’s image and video editors. Besides the three-dimensional space, Blender also supports 2D drawing and animation with its grease pencil tool. On top of this, Blender sports a Python scripting API. Blender itself is written in C, C++, and Python.
Blender founder Ton Roosendaal launched his own animation studio in 1989, called “NeoGeo” and which mainly focused on product visualization. According to Roosendaal, they could afford only one computer for animation work, but animation software costed another 30,000 guilders. He therefore decided to write his own in-house 3D tool during the evening hours, which eventually grew to become Blender. In 2002, after trying to market Blender, his investors got cold feet, and Roosendaal had to file for bankruptcy. To prevent his software — for which he naturally cared deeply at that point — from being taken hostage by the investors, Ton founded the Blender Foundation: through a “Free Blender” campaign, €100,000 were raised to continue Blender as an open source, community-driven project. The campaign succeeded and since then Blender is maintained under the GNU General Public License. It has grown immensely in popularity, with an estimated 1 to 3 million Blender users.1
In 2007, the Blender Foundation established an office, the Blender Institute.2 Through the institute, the goals of the Blender Foundation can be coordinated efficiently and core Blender developers are brought together. Every 1-2 years, an “open [creative] project”, usually a short film (though a feature film is planned), is created by the Blender Institute to showcase Blender’s abilities and stimulate its adaptation. At this time, 18 people are in full-time employment at the Blender Institute.
The team consists of:
- Bertan Konuralp
- Jaap Heijligers
- Jason Xie
- Emiel Bos
Blender, Blender by the Numbers. https://www.blender.org/press/blender-by-the-numbers-2019/. Last accessed on 2019-03-01. ↩
Blender aims to “build a free and open source complete 3D creation pipeline for artists and small teams, by publicly managed projects on blender.org”. That is, Blender wants to offer functionalies of the entire 3D creation pipeline. This “3D creation pipeline” refers to all the stages towards 3D pre-rendered or real-time imagery: modeling and/or sculpting, rigging, animation, simulation, rendering, compositing, motion tracking, and even video editing.
After having analyzed Blender’s context in the first essay and its codebase architecture in the second, we take a look at the quality of the codebase in this third essay. Because Blender is already over 25 years old, and because of the complicated nature of the functionality it aims to deliver, we initially expect Blender to have a large amount of technical debt — the degree of inaccessibility, or, the number of “deficiencies in internal quality that make it harder than it would ideally be to modify and extend the system further.” In order to ensure a certain code quality, Blender maintains some rules, such as “no code gets in trunk without documentation” (meaning that contributors have to document new functionality in the Blender Documentation), no new warnings are allowed, and code style has to remain consistent within files . Numerous other guidelines can be found at .
This essay will outline how and to what extent Blender is variable. This “software variability is the ability of a software system or artifact to be efficiently extended, changed, customised or configured for use in a particular context”, and this means we will take a look at how many different “instantiations” of Blender are possible, and how these are obtained. We start with identifying these variable components, also referred to as “features”, and modeling those in a feature model. | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572515.15/warc/CC-MAIN-20220816181215-20220816211215-00104.warc.gz | CC-MAIN-2022-33 | 4,256 | 12 |
https://www.eckerson.com/articles/mitigating-the-risk-of-bias-in-synthetic-data-for-ai | code | Mitigating the Risk of Bias in Synthetic Data for AI
ABSTRACT: Companies need to monitor and address biases that synthetic data generation techniques can introduce into artificial intelligence (AI) models.
As described in my prior blog, synthetic data is gaining popularity because it can help safeguard privacy and ease a shortage of training data for artificial intelligence (AI). However, some inherent limitations of synthetic data raise the question: does synthetic data increase or decrease the risk of bias in AI models? In this blog, I will elaborate on the nature of AI bias and discuss how to mitigate its risk in synthetic data.
Some data science teams use generative adversarial networks (GANs) to create synthetic data. A GAN is an AI model itself, and generates training data for another model. This creates the risk that synthetic data inherits the bias of both the GAN and the real-world data used to train it.
Many experts expect the use of synthetic data to increase and even exceed the use of real-world data for AI projects. Given this, data science, engineering, product development, and risk management teams need to understand 1) how synthetic data can perpetuate AI bias and 2) how they can mitigate AI bias from synthetic data.
Types of AI Bias
Multiple forms of bias can creep into AI models. (See figure 1.):
Societal bias refers to discrimination based on membership in certain groups, categories, or classes (e.g., race, gender, religious affiliation, age).
Data bias derives from data collection, processing, and usage. For example, the wording of a survey question can skew people's responses toward certain opinion. And imputing missing fields can amplify the majority opinion at the expense of the minority opinion.
Model bias occurs when an AI model produces different levels of sensitivity or predictive accuracy (e.g., false positives and false negatives) across subsets of a population.
Finally, interpretation bias points to the decision-makers who consume the output of AI models without understanding the assumptions and limitations of the model. When decision makers don’t examine the model to check for bias, they may incorrectly make decisions that further perpetuate biased outcomes.
Figure 1: Sources of AI Bias
Case Study for Systemic Risk: How Synthetic Data Can Augment AI Bias
Consider this hypothetical use case. A bank would like to automate a loan application process. The bank created machine learning models using historical customer data, which included sensitive categories such as race and gender. Unfortunately, the bank failed to properly clean the dataset, resulting in data quality issues and other factors that created two types of bias:
The data team imputed values in the “Race” attribute with the most frequent value, which happened to be “White”.
They imputed missing values in “Gender” by selecting the value from multiple data sources. Given inconsistent values (“male” in some systems and “female” in others), the imputation logic simply followed a predefined hierarchy of sources without verifying the accuracy of the selected value. It selected “male” more often than “female.”
The bank leveraged synthetic data using GANs in an effort to mitigate data quality and privacy concerns. However, the synthetic data further amplified biases in three ways. First, the ML model augmented the bias in the synthetically generated training data. Second, the synthetic data augmented the bias in the originating input data. And third, that originating data augmented social biases. (See figure 2.)
Furthermore, due to pressures from budget and time constraints, the bank deployed the ML model to the entire population before the development team conducted due diligence and field testing. As a result, the risk of AI bias rose exponentially.
Figure 2: Systemic Risk of Bias Augmentation by Synthetic Data Plus AI
Practical Architecture & Governance Strategies
A common cause of AI bias is the lack of representation in the training dataset. Data scientists can create and use synthetic data to cover the underrepresented population(s). To reduce the risk of AI bias, teams need to embed controls to prevent, detect, and correct biases in synthetic data pipeline. The data architects, governance officers, and digital product developers need to collaborate to stamp out synthetically-induced bias in AI models. Here are some tips and strategies to consider.
Use data observability tools to measure data bias. Data observability tools can provide a transparent view into the internal state of the data based on their outputs, including bias and fairness metrics. For example, the Synthesized team has developed fairlens, an open-source python library to discover and measure data bias.
Integrate additional tools. Test data management, automated generative models, and analytics-driven imputation all help provide visibility over your business. They enable teams to monitor and automatically refine their synthetic data to ensure it meets desired bias and fairness thresholds. For a more detailed example of this approach, see Brouton Lab's blog.
Use MLOps to automate the remediation of bias in the data as detected by data observability tools. As explained in this DataRobot blog, MLOps can automate remediation of data, for example to address data and model drift. This helps when, for example, bias metrics in synthetic training data exceed acceptable thresholds.
Innovate with user experience (UX) to reduce systemic bias. UX best practices on intelligent products and recommendation engines can provide trust and transparency. AI-enabled products and services should empower the "human in the loop" so users can continuously monitor and make informed decisions about model outcomes. This article by the AIXDesign team provides some examples of UX strategies for AI trust and transparency.
In figure 3 below, we present a holistic capability architecture for addressing the risk of bias due to synthetic data. To illustrate, here's an example use case of how these capabilities contribute to an AI-based credit assessment mobile app.
To start, real data feeds a GAN model that produces synthetic data. This in turn is scanned by the data observability component to measure the bias metrics in the model training, testing, and production data. An MLOps workflow ensures this measurement is continuous, and automatically alerts the data scientist or corrects the data if it exceeds the acceptable bias thresholds.
If the data approaches the tolerance limit for suspected bias, the workflow tells the user interface (UI) to nudge users with a warning of a potential bias. The UI provides a link to relevant metadata, including the input sources, data lineage, assumptions, and explanations of the model intuition. In combination, the credit application may not necessarily eliminate bias, but it can help users become understand the sources of bias.
Figure 3: Data Architecture and Governance Framework to Counter AI Bias
Conclusion – Beyond Intelligence and Fairness
Synthetic data and AI are powerful complementary technologies. However, as they both can contribute to the risk of AI bias, enterprises should maintain a heightened level of control in the data pipeline. AI model development is inherently subject to biases, and synthetic data can help reduce or amplify those biases. Addressing these risks from architecture and governance perspective is not a panacea. However, it can help an intelligent product team design a more transparent and explainable AI output, which is more likely to lead to justified decisions. | s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100873.6/warc/CC-MAIN-20231209071722-20231209101722-00640.warc.gz | CC-MAIN-2023-50 | 7,618 | 31 |
https://blog.beboptechnology.com/blog/bebop-version-2-7-27-2-7-54-released | code | 1 min read
BeBop Version 2.7.28/2.7.60 Release Updated
In this release, we are launching the Workstation Metrics feature in the MCP. This feature allows...
BeBop Version 2.7.28/2.7.60 Released
Release date: Oct 24th, 2019
In this release, we are fixing an instability in the Software Client...
BeBop Version 2.7.28/2.7.67 Release Updated
Release date: Feb 2nd, 2020
In this release, we are updating the BeBop Software Client to prepare... | s3://commoncrawl/crawl-data/CC-MAIN-2021-21/segments/1620243989812.47/warc/CC-MAIN-20210515035645-20210515065645-00422.warc.gz | CC-MAIN-2021-21 | 438 | 9 |
https://php.libhunt.com/container-clancats-latest-version | code | ClanCats Container v1.2.2 Release NotesRelease Date: 2020-10-15 // over 2 years ago
⚡️ This small update allows you to finally use the resolver methods directly. The resolver methods are generated when a container is compiled. The methods have the the return type their dependency which helps your IDE to help you.
Previous changes from v1.2.1
🚀 This release introduces the ability to update service definitions after they have been defined.
⚡️ Service Updates
📇 It is possible to update already defined services with more construction calls and metadata.
This is quite handy to organize large amount of dependencies with a dynamic lookups.
You could for example define your logger in one file.
And add observers using a construction call where you need them.
@logger.observers.email\_devs: Acme\EmailLogObserver('[email protected]') @logger.observers.email\_support: Acme\EmailLogObserver('[email protected]') @logger.main - addObserver(@logger.observers.email\_devs) - addObserver(@logger.observers.email\_support)
📇 The same is also true for metadata.
@controller.homepage: Controller\Homepage = on: '/homepage'// also show homepage on [email protected] = on: '/' | s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500035.14/warc/CC-MAIN-20230202165041-20230202195041-00406.warc.gz | CC-MAIN-2023-06 | 1,183 | 12 |
https://cravingfortechnology.wordpress.com/2012/12/12/demo-code-from-my-azure-as-the-backbone-talk-devteachconfere/ | code | Demo code from my “Azure as the backbone” talk @DevTeachConfere
Thanks to everyone who attended my “Azure as the backbone” web-api based talk today @DevTeachConfere in Montreal.
Demo code can be found on my sky-drive here.
See how easy it is to create a web-api based app using the Visual Studio 2012 wizard, deploy it to Azure and then create Windows 8 and Windows Phone 8 apps that uses the service from within Azure.
Going through these examples you’ll see that there was very little code required in order to get these Windows 8/Windows Phone 8 apps connected to the web-api based Azure app.
Please note that the web-api MVC 4 project uses a bunch of NuGet packages, automatically installed by the wizard within my project.
Write me or comment for questions!
Posted on December 12, 2012, in Uncategorized and tagged .Net, 2010, 2012, 4.0, 4.5, app, Azure, C#, Canada, Code Samples, DevTeach, Entity Framework, Microsoft, Montreal, Sela, software-development, Web API, Windows 8, Windows Phone, WinRT, WP. Bookmark the permalink. Leave a comment. | s3://commoncrawl/crawl-data/CC-MAIN-2018-22/segments/1526794867140.87/warc/CC-MAIN-20180525160652-20180525180652-00121.warc.gz | CC-MAIN-2018-22 | 1,059 | 8 |
http://admin.pcstats.com/NewsView.cfm?NewsID=92300 | code | Q: I need to update my websites' news mailing list and remove duplicates, how do I sort the email list in Microsoft Excel by the domain names only? By default Excel sorts everything in front of the @ symbol alphabetically, I need to sort alphabetically everything following the @ sign. Help!
using Data > Sort in Excel it is possible to do
this, but first we'll need to pre-format the email mailing list
First off, assuming all your email address are listed in Column A (one email address per row), create a second Column in the Excel document so we can use a formula to output only the data following the @ sign in Column A;
=MID(A1, FIND("@",A1, 1)+1, 255)
Paste the above formula
into the first cell of Column B, as you'll see, this formula outputs only the domain part of the email address. Click on that cell and hover the mouse over the bottom right-hand corner of the box until you see the cursor turn into a "+" sign. Now click and drag the checkered box down to the very last row of data to copy the formula across all rows.
Next, select all your data by highlighting
Column A and Column B in the margins, then go to Data > Sort >
and under 'column' choose 'column B' and press 'okay'. This will
tell Excel to sort all the data, alphabetically by the domain names
in Column B, from there you can easily find and remove | s3://commoncrawl/crawl-data/CC-MAIN-2019-43/segments/1570986660323.32/warc/CC-MAIN-20191015205352-20191015232852-00166.warc.gz | CC-MAIN-2019-43 | 1,327 | 12 |
https://support.mozilla.org/ro/questions/874334 | code | Acest fir de discuție a fost arhivat. Adresează o întrebare nouă dacă ai nevoie de ajutor.
When Firefox tries to do auto update at start I get an error message saying update failed, be sure no other Firefox programs are running. Since none are running I am not sure what to look for. What can I do to eliminate this error?
As I start Firefox the automatic update tells me that Firefox will open after updete finishes. I then receive an error message that tells me the update failed. It also says to be sure there are no other versions ov Firefox running. There are no other instances of Firefox running so the error must be generating from some other issue. Need some hints so I can look further. THis happens on two of 4 computers: a desktop running W7 Ultimate and this web book running W7 Home Premium. | s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474595.59/warc/CC-MAIN-20240225103506-20240225133506-00195.warc.gz | CC-MAIN-2024-10 | 810 | 3 |
https://fl0rian.wordpress.com/2006/05/16/lua-for-the-small/ | code | Lua for the small May 16, 2006Posted by Florian in GPE, Maemo, Source.
After a long fight against bad Makefiles i managed to build and use Lua and the Lua GTK bindings for Familiar.
Lua is a small interpreted programming language which might be useful on mobile devices. Its not that powerful like Python but easy to use and is able to live aon devices with small memory and flash. For GPE (and maybe for Maemo) it might be interesting to create small tools and plugins. There are several additional Lua packages available providing easy access to common C APIs (e.g. databases including SQLite) and various other tools. For mobile device hackers Lua has a great advantage over compiled languages: You can hack on the device itself without having a PC for your biig toolchain. This screenshot was made on my iPAQ showing a simple GTK UI written in Lua.
Installable packages for up to date Familiar 0.8.4rc images (should run on olders too but installing will need some force) can be found here. All build descriptions for OpenEmbedded are available from the org.openembedde.dev branch.
If you want to start hacking now you should consider install the minimalistic multi-tabbed editor vmedit which is available from the same location together with some example Lua files.
Share and enjoy! | s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917120878.96/warc/CC-MAIN-20170423031200-00097-ip-10-145-167-34.ec2.internal.warc.gz | CC-MAIN-2017-17 | 1,287 | 6 |
https://www.nhmrc.gov.au/about-us/nhmrc-awards/nhmrc-outstanding-contribution-award | code | The NHMRC Outstanding Contribution Award recognises outstanding long-term contributions, individual commitment and support to NHMRC
The awardee is an individual who has:
- made significant contributions to NHMRC
- been a strong advocate for health and medical research
- been an inspirational role model for the health and medical research community.
Nominations are considered by the NHMRC CEO, who selects the awardee in consultation with the Chair of Council. The following criteria are considered:
- personal, academic and professional achievements
- demonstrated leadership, innovation and creativity
- the impact of their contribution to Australian health and medical research and its outcomes
- residence of the nominee in Australia.
- 2019: Professor Kathryn North AC
- 2017: Professor Jane Hall
- 2015: Professor Melissa Little
- 2013: Professor Ron Trent
- 2011: Mrs Elizabeth Grant AM
- 2010: Professor David Weisbrot AM
- 2007: Sr Regis Mary Dunne AO; Mr Peter Wills AC
Nominations for the 2021 award have closed. For queries about this award, please contact [email protected].
The 2021 awardee is expected to be announced at the NHMRC Research Excellence Awards Dinner in June 2021. The awardee (or their nominated representative if a group or organisation) will be invited to attend the Awards Dinner (subject to pandemic related event/travel restrictions). | s3://commoncrawl/crawl-data/CC-MAIN-2021-49/segments/1637964363337.27/warc/CC-MAIN-20211207075308-20211207105308-00005.warc.gz | CC-MAIN-2021-49 | 1,384 | 19 |
http://ajax.sys-con.com/node/3082633 | code | |By Michael Bushong||
|May 7, 2014 06:00 AM EDT||
Simplify. We all hear it all the time. We hear how this tool or that technology will simplify. In networking, we hear how controllers, protocols, APIs, and virtualization layers will all simplify. Remove a keystroke here. Maybe automate something there. All in the name of simplification. But it might be that our very approach to simplification needs to be simplified.
The most well-known example of simplification being successful has to be Apple’s foray into consumer electronics. The iPod disrupted more than just the handheld music industry. En route to making the Walkman a great tool for making us all feel old, Apple redesigned how we interact with devices, influencing several product generations and an entire human generation.
But what exactly did Apple do?
Apple wasn’t the most fully-featured MP3 player on the market. And it wasn’t that they enjoyed some first-mover advantage in cornering the market. They didn’t even benefit from their content side until later. What the iPod did was much more foundational than any of that. Put simply, the iPod represents Apple’s attempt to ween us off all the functionality that had gotten in the way of a truly great experience.
The iPod effectively reduced the user experience to only those things that were absolutely essential. And in doing so, they presented a user interface that was at once simple and intuitive.
Apple correctly identified that the most important things people needed to do were: play/stop, fast forward/reverse, and search, all in a form factor that was smaller and more mobile. They made the iPod as complex as it needed to be and no more.
What the networking world could learn
The networking world could learn a lot from this exercise. And I am talking about way more than slick UIs that make managing the beast a bit easier.
As a group, we need to reduce networking to its most basic functions. It’s not the capabilities that we actually crave. How could we? The average device in production is using less than 5% of its available capabilities. Interestingly enough, the other 95% of features that go largely unused and likely unnoticed do contribute to the overall cost in networking. Developing the software that drives the network requires extensive development and testing, and every esoteric feature adds just that many more combinations of features that have to be tested (or released untested). With each test, effort, and with each effort, cost. We are all victims of our inability to reduce the superset of things our devices currently do.
If we took an Apple-esque approach to networking, we might find ourselves in a different place. So we ought to ask ourselves: what is the networking equivalent of play, fast forward, and search?
What does the network really do?
Before we overthink the answer, consider the question: what does the network really do? Fundamentally, networking is about two things: bringing things together, and keeping things apart.
At its most basic, the network is about connecting things. We want this thing to talk to that thing. We want this segment of the network to be within the same domain as that segment. We want this set of devices to behave as if they are co-located with that set of devices. So much of what we do is about enabling this type of communication or grouping.
By the way, this is not all just a configuration thing. When we are really trying to optimize performance, we do things like put stuff in the same physical rack so that the things we want to be together are physically close as well. A good example of this is rack awareness in Big Data applications.
On the other side, we work very hard to keep things apart. We employ security and edge policy constructs aimed precisely to do this. We might want to isolate broadcast domains, or keep routes from leaking from our internal networks into our external networks. A rich set of policies have evolved to get very fine-grained control over how we keep things apart.
Everything we do more or less fits into these buckets.
The key to simplifying the network isn’t in putting a layer over the top of a complex landscape of behavior specifications. That just masks the complexity, exposing it in different ways to the user. Doing this makes management simpler but it does nothing to really simplify networking. All the cost (actual expense but also the unreasonable frailty that exists in most networks) stays in the system. Behind the abstraction, people still have to build, test, and support a diverse set of functionality.
Collectively, we sort of understand this implicitly. This is why every few years a new crop of purpose-built solutions comes to market. The idea is that by focusing on a narrower set of use cases, we can start over clean, remove all the complexity and be happy. Fundamentally, this is what Arista did.
The challenge here is that though we start clean, we grow along the same overall trajectory that we always do. Over time, we reintroduce the complexity and hence the cost.
Breaking the cycle
To break the cycle, we need to actually simplify networking. We need to reduce networks to the equivalent of the iPod wheel. Our wheel might have a few more buttons and options because the task we are charged with is fundamentally more complex. But we ought not concede before we start that all the complexity that is there has to be there. The hard work (and the reason no one did it before Apple) is in having the confidence to go to market with something that just works better.
But if you do this, there is an entire market of opportunity waiting. You have to wonder if this market will absolutely jump at the chance to simplify given all they have ever been exposed to is complicating solutions.
[Today’s fun fact: Peanuts are used in the manufacture of dynamite. This is why people with nut allergies should never get blown up by dynamite.]
In the next five to ten years, millions, if not billions of things will become smarter. This smartness goes beyond connected things in our homes like the fridge, thermostat and fancy lighting, and into heavily regulated industries including aerospace, pharmaceutical/medical devices and energy. “Smartness” will embed itself within individual products that are part of our daily lives. We will engage with smart products - learning from them, informing them, and communicating with them. Smart produc...
Jan. 21, 2017 12:15 PM EST Reads: 1,757
Internet of @ThingsExpo, taking place June 6-8, 2017 at the Javits Center in New York City, New York, is co-located with the 20th International Cloud Expo and will feature technical sessions from a rock star conference faculty and the leading industry players in the world. @ThingsExpo New York Call for Papers is now open.
Jan. 21, 2017 12:15 PM EST Reads: 3,730
SYS-CON Events announced today that Catchpoint, a leading digital experience intelligence company, has been named “Silver Sponsor” of SYS-CON's 20th International Cloud Expo®, which will take place on June 6-8, 2017, at the Javits Center in New York City, NY. Catchpoint Systems is a leading Digital Performance Analytics company that provides unparalleled insight into your customer-critical services to help you consistently deliver an amazing customer experience. Designed for digital business, C...
Jan. 21, 2017 11:45 AM EST Reads: 1,845
“DevOps is really about the business. The business is under pressure today, competitively in the marketplace to respond to the expectations of the customer. The business is driving IT and the problem is that IT isn't responding fast enough," explained Mark Levy, Senior Product Marketing Manager at Serena Software, in this SYS-CON.tv interview at DevOps Summit, held Nov 4–6, 2014, at the Santa Clara Convention Center in Santa Clara, CA.
Jan. 21, 2017 11:30 AM EST Reads: 11,562
SYS-CON Events announced today that Catchpoint Systems, Inc., a provider of innovative web and infrastructure monitoring solutions, has been named “Silver Sponsor” of SYS-CON's DevOps Summit at 18th Cloud Expo New York, which will take place June 7-9, 2016, at the Javits Center in New York City, NY. Catchpoint is a leading Digital Performance Analytics company that provides unparalleled insight into customer-critical services to help consistently deliver an amazing customer experience. Designed ...
Jan. 21, 2017 11:30 AM EST Reads: 6,424
More and more brands have jumped on the IoT bandwagon. We have an excess of wearables – activity trackers, smartwatches, smart glasses and sneakers, and more that track seemingly endless datapoints. However, most consumers have no idea what “IoT” means. Creating more wearables that track data shouldn't be the aim of brands; delivering meaningful, tangible relevance to their users should be. We're in a period in which the IoT pendulum is still swinging. Initially, it swung toward "smart for smart...
Jan. 21, 2017 11:30 AM EST Reads: 2,803
WebRTC sits at the intersection between VoIP and the Web. As such, it poses some interesting challenges for those developing services on top of it, but also for those who need to test and monitor these services. In his session at WebRTC Summit, Tsahi Levent-Levi, co-founder of testRTC, reviewed the various challenges posed by WebRTC when it comes to testing and monitoring and on ways to overcome them.
Jan. 21, 2017 11:15 AM EST Reads: 6,117
In their general session at 16th Cloud Expo, Michael Piccininni, Global Account Manager - Cloud SP at EMC Corporation, and Mike Dietze, Regional Director at Windstream Hosted Solutions, reviewed next generation cloud services, including the Windstream-EMC Tier Storage solutions, and discussed how to increase efficiencies, improve service delivery and enhance corporate cloud solution development. Michael Piccininni is Global Account Manager – Cloud SP at EMC Corporation. He has been engaged in t...
Jan. 21, 2017 10:00 AM EST Reads: 5,113
Cloud Expo, Inc. has announced today that Andi Mann returns to 'DevOps at Cloud Expo 2017' as Conference Chair The @DevOpsSummit at Cloud Expo will take place on June 6-8, 2017, at the Javits Center in New York City, NY. "DevOps is set to be one of the most profound disruptions to hit IT in decades," said Andi Mann. "It is a natural extension of cloud computing, and I have seen both firsthand and in independent research the fantastic results DevOps delivers. So I am excited to help the great t...
Jan. 21, 2017 07:45 AM EST Reads: 2,451
Every successful software product evolves from an idea to an enterprise system. Notably, the same way is passed by the product owner's company. In his session at 20th Cloud Expo, Oleg Lola, CEO of MobiDev, will provide a generalized overview of the evolution of a software product, the product owner, the needs that arise at various stages of this process, and the value brought by a software development partner to the product owner as a response to these needs.
Jan. 21, 2017 07:30 AM EST Reads: 1,306
In 2014, Amazon announced a new form of compute called Lambda. We didn't know it at the time, but this represented a fundamental shift in what we expect from cloud computing. Now, all of the major cloud computing vendors want to take part in this disruptive technology. In his session at 20th Cloud Expo, John Jelinek IV, a web developer at Linux Academy, will discuss why major players like AWS, Microsoft Azure, IBM Bluemix, and Google Cloud Platform are all trying to sidestep VMs and containers...
Jan. 21, 2017 07:15 AM EST Reads: 939
SYS-CON Events announced today that MobiDev, a client-oriented software development company, will exhibit at SYS-CON's 20th International Cloud Expo®, which will take place June 6-8, 2017, at the Javits Center in New York City, NY, and the 21st International Cloud Expo®, which will take place October 31-November 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA. MobiDev is a software company that develops and delivers turn-key mobile apps, websites, web services, and complex softw...
Jan. 21, 2017 06:45 AM EST Reads: 1,954
SYS-CON Events announced today that Enzu will exhibit at SYS-CON's 20th International Cloud Expo®, which will take place on June 6-8, 2017, at the Javits Center in New York City, NY, and the 21st International Cloud Expo®, which will take place October 31-November 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA. Enzu’s mission is to be the leading provider of enterprise cloud solutions worldwide. Enzu enables online businesses to use its IT infrastructure to their competitive ad...
Jan. 21, 2017 06:30 AM EST Reads: 1,658
Smart Cities are here to stay, but for their promise to be delivered, the data they produce must not be put in new siloes. In his session at @ThingsExpo, Mathias Herberts, Co-founder and CTO of Cityzen Data, discussed the best practices that will ensure a successful smart city journey.
Jan. 21, 2017 06:00 AM EST Reads: 2,098
In his session at 19th Cloud Expo, Claude Remillard, Principal Program Manager in Developer Division at Microsoft, contrasted how his team used config as code and immutable patterns for continuous delivery of microservices and apps to the cloud. He showed how the immutable patterns helps developers do away with most of the complexity of config as code-enabling scenarios such as rollback, zero downtime upgrades with far greater simplicity. He also demoed building immutable pipelines in the cloud ...
Jan. 21, 2017 05:30 AM EST Reads: 3,558
Choosing the right cloud for your workloads is a balancing act that can cost your organization time, money and aggravation - unless you get it right the first time. Economics, speed, performance, accessibility, administrative needs and security all play a vital role in dictating your approach to the cloud. Without knowing the right questions to ask, you could wind up paying for capacity you'll never need or underestimating the resources required to run your applications.
Jan. 21, 2017 05:00 AM EST Reads: 4,064
Traditional on-premises data centers have long been the domain of modern data platforms like Apache Hadoop, meaning companies who build their business on public cloud were challenged to run Big Data processing and analytics at scale. But recent advancements in Hadoop performance, security, and most importantly cloud-native integrations, are giving organizations the ability to truly gain value from all their data. In his session at 19th Cloud Expo, David Tishgart, Director of Product Marketing ...
Jan. 21, 2017 05:00 AM EST Reads: 3,032
Technology vendors and analysts are eager to paint a rosy picture of how wonderful IoT is and why your deployment will be great with the use of their products and services. While it is easy to showcase successful IoT solutions, identifying IoT systems that missed the mark or failed can often provide more in the way of key lessons learned. In his session at @ThingsExpo, Peter Vanderminden, Principal Industry Analyst for IoT & Digital Supply Chain to Flatiron Strategies, will focus on how IoT depl...
Jan. 21, 2017 03:45 AM EST Reads: 1,992
Adding public cloud resources to an existing application can be a daunting process. The tools that you currently use to manage the software and hardware outside the cloud aren’t always the best tools to efficiently grow into the cloud. All of the major configuration management tools have cloud orchestration plugins that can be leveraged, but there are also cloud-native tools that can dramatically improve the efficiency of managing your application lifecycle. In his session at 18th Cloud Expo, ...
Jan. 21, 2017 02:30 AM EST Reads: 6,130
The pace of innovation, vendor lock-in, production sustainability, cost-effectiveness, and managing risk… In his session at 18th Cloud Expo, Dan Choquette, Founder of RackN, discussed how CIOs are challenged finding the balance of finding the right tools, technology and operational model that serves the business the best. He also discussed how clouds, open source software and infrastructure solutions have benefits but also drawbacks and how workload and operational portability between vendors an...
Jan. 21, 2017 02:30 AM EST Reads: 5,051 | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281162.88/warc/CC-MAIN-20170116095121-00503-ip-10-171-10-70.ec2.internal.warc.gz | CC-MAIN-2017-04 | 16,195 | 65 |
http://perkframework.com/v1/common-errors/unexpected-strict-mode-reserved-word.html | code | Unexpected strict mode reserved word
Newer versions of node support ES2015 syntax. This error tends to pop up if you are using an outdated version of node.
You can determine which version of node you are running by typing:
If your version of node is less than v5.0.0 you should upgrade.
brew update brew upgrade node | s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100399.81/warc/CC-MAIN-20231202105028-20231202135028-00359.warc.gz | CC-MAIN-2023-50 | 316 | 5 |
https://antennasimulator.com/ | code | Describe antenna geometry
Choose construction materials
Describe the environment and ground conditions
Describe the antenna height above ground
Analize radiation pattern and front-to-back ratio
Plot directivity and gain
Analize input impedance and VSWR
Predict antenna bandwidth
Get several more parameters and plots.
AN-SOF is a comprehensive software tool for the modeling and simulation of antenna systems
AN-XY Chart: 2D plots in Cartesian coordinates.
AN-Smith: Smith chart for plotting impedances and VSWR vs. frequency.
AN-Polar: Polar 2D diagram of azimuth and zenith radiation lobes.
AN-3D Pattern: Colored 3D view of radiation patterns with zoom and rotation. | s3://commoncrawl/crawl-data/CC-MAIN-2021-49/segments/1637964362891.54/warc/CC-MAIN-20211203151849-20211203181849-00619.warc.gz | CC-MAIN-2021-49 | 669 | 14 |
https://law.meta.stackexchange.com/questions/1360/is-it-on-topic-to-ask-whether-a-lawyer-should-recommend-the-same-defence-in-case | code | Is it on topic to ask whether a lawyer should recommend the same defence in case X, rather than case Y?
That is on topic insofar as assessing a litigation strategy serves educational purposes (see the disclaimer at the upper right portion of every Law SE post). It is noteworthy that keeping the post in overly generic terms is unlikely to be of any interest. The post would need details that are relevant enough to prompt the audience to think why the answer might differ from the general conclusion.
Generally speaking, the principle of "equal protection of the laws" implies that choosing case X over Y as potential precedent is inconsequential. Furthermore, the strategy or choice would be unavailing if Y is distinguishable from X.
should they attempt to convince the client of that, even insist on it, if the client is opposed?
That is unanswerable without knowing enough details of the case, including the lawyer's rationale as well as the client's reasons for rejecting the lawyer's proposed strategy. | s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947473518.6/warc/CC-MAIN-20240221134259-20240221164259-00770.warc.gz | CC-MAIN-2024-10 | 1,009 | 5 |
https://horizon65.com/en/faq/inflation/how-do-you-stop-inflation/ | code | Receive an email from us with a download link to open on your mobile phone.
To stop inflation, governments can use monetary policy (such as increasing interest rates) and fiscal policy (such as decreasing government spending) to decrease the money supply and decrease demand in the economy. Additionally, implementing structural reforms and increasing productivity can also help to stop inflation.
The effects of inflation are often not directly felt but are played out over a long time, especially long-term investments are vulnerable to inflation.
At Horizon65, we created a mobile app that enabled you to check the effect of inflation on your savings. | s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817033.56/warc/CC-MAIN-20240415205332-20240415235332-00799.warc.gz | CC-MAIN-2024-18 | 654 | 4 |
https://sashamorrissey.com/demoreel.html | code | - 0:00-0:05, 0:42-0:50 Short film in 3D Studio Max and After Effects
- 0:05-0:18, 0:25-0:28 Short film in progress. Hand drawn in TVPaint, post production in After Effects, check out http://www.patreon.com/thechaseanimation
- 0:18-0:25, 0:51-1:00 Short film using animated backgrounds and 3D Camera in 3D Studio Max with animation hand-drawn on top of 3D footage in TV Paint and post production in After Effects.
- 0:29-0:32 3DS Max four hour speed modelling/rigging/ animation exercise. Just for fun, character design © Nintendo
- 0:32-0:37 Short film created in Flash
- 0:37-0:42 Video Game created through a partnership program with Johns Hopkins University. Worked as the sole artist with a programming team to create a game from scratch. | s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679099942.90/warc/CC-MAIN-20231128183116-20231128213116-00141.warc.gz | CC-MAIN-2023-50 | 743 | 6 |
https://coe.qualiware.com/templates/businessobject/ | code | A business object is used to represent a real-world entity or concept that is relevant to a particular business domain. Business objects are abstract representations of the key components of a business, such as customers, products, transactions, and processes, that are used to model and understand the operations of an organization.
For example, the “business object” symbol might be used to represent a customer in a retail business. This symbol might be connected to other symbols, such as “products” or “transactions,” to show how customers interact with the retail business and purchase products. Similarly, the “business object” symbol might be used to represent a product in the retail business and show how it is sold to customers and how it is managed by the business. | s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474360.86/warc/CC-MAIN-20240223021632-20240223051632-00492.warc.gz | CC-MAIN-2024-10 | 793 | 2 |
https://eu.dlink.com/cz/cs/support/faq/access-points-and-range-extenders/can-i-set-my-computer-to-use-a-static-ip-address-instead-of-dynamic-automatic | code | Can I set my computer to use a static IP address instead of dynamic (automatic)?
Yes, you can set your computer to use a static IP address.
Keep in mind to use an address the same range as yourrouter's LAN, by default between 192.168.0.2 and192.168.0.254.
The subnet mask is 255.255.255.0 and the default gateway192.168.0.1.
It is also important to set the DNS settings, which are providedby your ISP. | s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224657720.82/warc/CC-MAIN-20230610131939-20230610161939-00707.warc.gz | CC-MAIN-2023-23 | 401 | 5 |
http://msdn.microsoft.com/en-us/library/ms132188(v=vs.80).aspx | code | Assembly: System (in system.dll)
The following code example and output demonstrate the Last property. The code example removes the last node in a linked list of strings, adds a new node to the end of the list, uses the Last property to mark that node, and finally removes then node and inserts it at the beginning of the list.
This code and output are part of a larger example provided for the LinkedList class.
Windows 98, Windows Server 2000 SP4, Windows CE, Windows Millennium Edition, Windows Mobile for Pocket PC, Windows Mobile for Smartphone, Windows Server 2003, Windows XP Media Center Edition, Windows XP Professional x64 Edition, Windows XP SP2, Windows XP Starter EditionThe Microsoft .NET Framework 3.0 is supported on Windows Vista, Microsoft Windows XP SP2, and Windows Server 2003 SP1. | s3://commoncrawl/crawl-data/CC-MAIN-2014-49/segments/1416931007797.72/warc/CC-MAIN-20141125155647-00024-ip-10-235-23-156.ec2.internal.warc.gz | CC-MAIN-2014-49 | 801 | 4 |
https://petsforchildren.com/pet-tips/10-types-of-pet-owners-in-adopt-me-sunsetsafari/ | code | View here on Youtube
Hey Safarians, Welcome back to my channel. In today’s video I shared 10 Types of PET OWNERS In Adopt Me! This one was actually hard because
there aren’t many types. However, I hope you guys enjoy this video. Make sure to comment down below some Types Of Pet Owners you can think of or have witnessed on Adopt Me.
Additionally, School has started & it’s a bit more difficult for me to film
videos. My New Schedule is now Saturday & Sundays.
– Subscribe and Comment
– Turn on you’re Notifications
I don’t have an upload schedule because i’m very indecisive but, you can rest easy knowing that I upload videos every SATURDAY or SUNDAY’S FOR SURE!
This video was filmed by Sunset Safari (Me) on the platform Roblox. All other video concerns are listed below that include: The music I used, The platform I used to create my thumbnails, The platforms I used to film and edit my videos.
Meet & Greet
Check-Out my Sister’s Channels:
Endslate: LilFranYT (Instagram)
Pfp & Banner : LilFranYT (Instagram)
Discord Intro : SunsetSafariYT (Instagram)
MUSIC Provided by: Epidemic Sound
Referral Link : https://www.epidemicsound.com/referral/cmpe41/
If you decide to sign up for Epidemic Sound, make sure to use my Referral Link 🙂
Business Inquiries ONLY: [email protected]
My content is NOT aimed towards KIDS. Meaning those under the age of 13. It is the responsibility of parents to monitor their children’s online activity. My videos are made solely for ENTERTAINMENT.
This channel and all of its videos are not “directed to children” within the meaning of Title 16 C.F.R. §312.2, and are not intended for children under 13 years of age. Sunset Safari and its owner(s), agents, representatives and employees (collectively referred to as “Channel”) does not collect any information from children under 13 years of age and expressly denies permission to any third-party seeking to collect information from children under 13 years of age on behalf of Channel. Further, Channel denies any and all liability or responsibility for the practices and policies of Youtube and its agents and subsidiaries, or any other affiliated third-party, regarding data collection.
Under Section 107 of the Copyright Act 1976, allowance is made for ‘fair use’ for purposes such as criticism, comment, news reporting, teaching, scholarship, and research. Fair use is a use permitted by copyright statue that might otherwise be infringing. Non-profit, educational or personal use tips the balance in favor of fair use.
#Roblox #SunsetSafari #bloxburgroleplay #robloxvideos #welcometobloxburg #robloxbloxburg | s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100551.2/warc/CC-MAIN-20231205140836-20231205170836-00075.warc.gz | CC-MAIN-2023-50 | 2,635 | 22 |
http://www.preforma-project.eu/requirements-workshop.html | code | This project has received funding from the European Union’s Seventh Framework Programme under grant agreement no 619568
The main objective of PERFORMA is to give memory institutions full control of the process of conformity testing of files to be ingested into archives, through the development of a set of tools which enable this process to happen within an iteration that is under full control of the institutions. It is in fact a basic requirement for memory institutions to be trustworthy in performing their preservation programmes.
On March 5th, 2014, PREFORMA organised a workshop in Brussels targeted at memory institutions in order to agree on the joint user model for tendering the PREFORMA conformance checker. In other words, to agree on the expected behaviour and functionality of the tools to be developed in the coming years by the software suppliers that will be selected from the procurement process of the project.
These requirements will be further developed in the subsequent design and prototype phases. However, the set of requirements that have been defined initially will be used for selecting the software suppliers.
Event page: www.digitalmeetsculture.net/article/preforma-requirements-workshop
Event report: www.digitalmeetsculture.net/article/open-dialogue-towards-a-joint-user-model
Official Media Partner: Digital Meets Culture.
Designed & Powered by: Promoter SRL. | s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296949035.66/warc/CC-MAIN-20230329213541-20230330003541-00596.warc.gz | CC-MAIN-2023-14 | 1,397 | 8 |
https://www.perlmonks.org/?node_id=749915 | code | You do quite a lot of work (calling some arbitary external program, writing to the current default handle, and reading STDIN) inside a signal handler. This will surely bite you with any old perl (before 5.7.3), and I won't bet that newer perls will have no problems. Don't put much work into signal handlers, just set a flag and handle it in the main loop -- or just exit() or die() immediately. See also Signals.
Today I will gladly share my knowledge and experience, for there are no sweeter words than "I told you so". ;-) | s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600402130531.89/warc/CC-MAIN-20200930235415-20201001025415-00426.warc.gz | CC-MAIN-2020-40 | 525 | 2 |
http://programmingprojecthelp97582.post-blogs.com/2911310/mysql-assignment-help-for-dummies | code | I leave like a homework being a reader to check it for other engines, like MEMORY or CSV [Trace: Possibly we could import to this most up-to-date engine in a distinct way
An argument consisting of the govt summary, marketing and advertising tactic, and small business description of the entrepreneur in addition to a systematic SWOT Investigation supporting them.
I reported before that the principle overhead of InnoDB is crafting the data two times (log and tables). This is in fact Erroneous, as it may well essentially generate it three moments (on the double compose region) as well as four occasions, within the binary log. The binary log just isn't enabled by default, nevertheless the double compose is, because it safeguards from corruption.
Coursera supplies universal use of the entire world’s finest schooling, partnering with top universities and companies to offer courses on the internet.
Usually do not submit in all capitals or use IM-discuss like "U", "Ur", "U r", "Plz", "prb", "qry" or any acronym that is not effectively-recognized by the Group. Incorporate all appropriate information and facts including SQL Shopper name & Edition and include OS title & version if distinct from DB Server.
She put in WAMP Server which incorporates PHP. I feel she just must alter the PATH so when she runs "php" inside a command window, it will see the PHP interpreter. I barely use Windows as of late. But I do Have a very Home windows Laptop close to, so I tried installing WAMP, and a couple of yrs in the past
The next concern isn't: can we do it improved, but, can we do it even slower? A certain text attract my interest when looking at the MySQL connector documentation:
Nowadays, the an updated Variation of Health care.gov features high-quality, so you're asking yourself just what the hubbub was about when it had been released. Weak Debut Proponents explained that a sluggish rollout will not be unforeseen. eleven months ago
In this instance, we are going to update the e-mail of Mary Patterson to navigate to these guys the new email [email protected]
SQL's controversial "NULL" benefit is neither real nor false (predicates with phrases that return a null price return null rather then genuine or false). Options such as outer-be part of depend upon null values.[fifteen] Other
We value your id and qualifications and make sure that we strictly preserve them with us and in no way disclose any details linked to you or your assignment with almost every other university student or College.
The excerpt has obligation matrix, useful resource gantt chart along with a chart containing the means loading. All these charts are in respect to an XYZ corporation.
An overview of differing kinds of strategic conclusions in relation towards the healthcare sector in addition to choice producing approach and explanations of a similar. Download View Sample
Description If you'd like to find out how to get insights from facts but are way too intimidated by databases to learn the place to get started on, then this program is to suit your needs. This training course is a mild but in depth introduction to MySQL, The most very in-demand capabilities in the enterprise sector right now. | s3://commoncrawl/crawl-data/CC-MAIN-2018-43/segments/1539583512434.71/warc/CC-MAIN-20181019191802-20181019213302-00382.warc.gz | CC-MAIN-2018-43 | 3,199 | 14 |
http://dba.stackexchange.com/questions/tagged/restore+sql-server-agent | code | Database Administrators Meta
to customize your list.
more stack exchange communities
Start here for a quick overview of the site
Detailed answers to any questions you might have
Discuss the workings and policies of this site
How do I rescue SQL Agent jobs from a set of detached master, model, mdb files?
I had a MSSQL (MSSQL 2008 R2) cluster that failed in a way that I couldn't bring it back up (long story, servers ended up in BSOD loops, I'm blaming Broadcom and myself). I've SQL backups, and even ...
Feb 11 '12 at 19:16
newest restore sql-server-agent questions feed
Hot Network Questions
Is voltage always proportional to its derivative?
Why was it Lord Eddard who executed Gared?
What is the relationship between Penetration, Protections and Power?
Can an enumerator be defined in terms of other enumerators within the same enum type?
How to add an “INCLUDE” part in an Index Created as a part of CONSTRAINT
Where is 'catalog_product_save_before' dispatched?
Running C++ code outside of functions scope
Climbing Kilimanjaro for a newbie
Is it possible to delete a component which is attached to a page without deleting the page itself?
What is this cable for (picture included)?
Why was Sting able to kill the Mirkwood spiders with ease, but not Shelob?
Word for a body of water that is sufficiently populated with fish and worthy of fishing in
What is the meaning of "cream of X" in a soup?
Can I improve my chess? Is it too old?
Do I need to wait for a journal to "consent" to paper withdrawal before submitting elsewhere?
SATA 7.2K HD Suitable for File Server
Display Quantity in full form
Does my website still have to support Internet Explorer 8 and earlier?
Is "Mobile First" still relevant
Display variable name instead of value
Results true in a dimension and false for higher dimensions
stdin/stdout- How to send a file as an input to another file?
How to display some contour lines and hide others?
How can I extend this circuit to use it in our real life also?
more hot questions
Life / Arts
Culture / Recreation
TeX - LaTeX
Unix & Linux
Ask Different (Apple)
Geographic Information Systems
Science Fiction & Fantasy
Seasoned Advice (cooking)
Personal Finance & Money
English Language & Usage
Mi Yodeya (Judaism)
Cross Validated (stats)
Theoretical Computer Science
Meta Stack Exchange
Stack Overflow Careers
site design / logo © 2014 stack exchange inc; user contributions licensed under
cc by-sa 3.0 | s3://commoncrawl/crawl-data/CC-MAIN-2014-41/segments/1410657118605.64/warc/CC-MAIN-20140914011158-00177-ip-10-196-40-205.us-west-1.compute.internal.warc.gz | CC-MAIN-2014-41 | 2,426 | 53 |
https://www.javatpoint.com/aws-lambda-in-java | code | AWS Lambda in Java
AWS lambda is a "service less" compute service that the developers do not have to worry about which AWS resources to launch or how they will manage them. They just put the code on Lambda, and it runs. However, a lambda can only use to execute background tasks.
AWS Compute Domain
The primary services under this domain are EC2, Elastic Beanstalk, and AES Lambda. Among these three, the essential service is EC2, a raw server like a personal computer we are working on remotely. It can install any operating system of our choice, supported by the AWS infrastructure, and then we can use it in any manner we want; we can configure it to become a web server, and we can configure it to become a workout environment.
It is the automated version of EC2, and with this elastic beanstalk, we will not get the excess to the operating system. However, we still have control over the configuration of our system so that we can choose what kind of instance we want to launch. So elastic beanstalk is used to deploy an application, and we only upload our code, and then the application is deployed on the AWS infrastructure.
The AWS Lambda service is an automated version of EC2 where we do not get access to the operating system. With AWS Lambda, we do not even have the choice to choose what configuration we want with our server. In AWS Lambda, we have to upload our code, which will execute.
Why AWS Lambda?
As we discussed, it is the automated version of EC2 like an elastic beanstalk, but with AWS Lambda, we can only execute background tasks. We cannot deploy an application, so AWS Lambda is not used to deploy an application but is used to perform background tasks. We do not have to choose the configuration in an AWS Lambda, and we do not want to decide what kind of service we want, and depending on our workload, the type of server configuration is assigned to us. So, this is why we use AWS Lambda.
SDKs are nothing but software development kits, and these are APIs that developers use to connect to the desired service at the wall. So, it makes the life of the developers easy because they can now concentrate on the logical part of their application rather than wasting time on understanding how they can connect their code to the service, which is on AWS.
One can use AWS services in our applications with an API tailored to our programming language or platform. AWS SDKs are called Software Development Kits, APIs defined for specific programming languages.
These APIs can be integrated with an IDE and thus can be easily used.
Another part is that these SDKs will use with IDEs, and at present, we have only two supported IDEs: Eclipse and visual studio.
Where is Lambda Used?
There is a vast number of ways that businesses use AWS Lambda; some of them are: AWS Lambda is used to process images when it is uploaded, or let us say an object gets uploaded in a bucket in a format that we do not expect it to be which means the file needs to be formatted, so it gets uploaded in a raw form, and AWS Lambda has triggered a new object anytime is added to the bucket, and the images are processed and converted into thumbnails based on the device. The device can be a PC like an apple machine, Android, and tablet.
Based on the device's different formats, a lambda can get triggered and convert the video or picture into the other form required.
Another use case for Lambda is to analyze social media data. Let us say we are collecting the hashtag trending data, and the data is received. It is added into the Amazon Kinesis to feed into the Amazon environment. Lambda action gets triggered, and it receives the data, and then the data is stored in the database, which businesses can use for later analysis.
Some companies that have gotten tremendous benefits from using Lambda are Thomson Reuters, Benchling, Nordstrom, Coca-cola, and Robot; some companies, to name a moment, have received enormous help from Lambda.
How does Lambda Work?
The clients send data to Lambda, and clients could be anyone who is sending requests to AWS Lambda. It could be an application or other Amazon web services that send data to Lambda. Then Lambda receives the request depending on the data size, amount, or volume of the data it runs on the defined number of containers. If it is a single request or fewer requests, it runs on a single container. So, the recommendations are given to the container to handle, and the container which contains the code the user has provided to satisfy the query would run.
The container image is a lightweight standalone executable package of a piece of software that includes everything needed to run it, like the codes, the runtimes, the system tools, the system libraries and the settings required. It is currently available both on Linux and Windows-based applications, and container rise to software will always run the same regardless of the environment it is running on, and containers isolate software from its surroundings. For example, there could be a difference between a development and a staging environment. So that is isolated, which helps reduce the conflict between the teams running different software on the same infrastructure.
At last, we understood that Lambda sends multiple requests to containers and shares the multiple requests to the different containers there.
When the request reduces, the number of containers will also be reduced, which will help save the cost. We do not charge for the resources; we only charge for the time a function runs inside these containers.
Use case- Backing up data
Now consider a situation where we have to set up a temporary storage system to back up data as soon as it is uploaded, which is a near real-time backup.
Near real-time manual backups are nearly impossible, and they are not that efficient near real-time manual backups, and that's what the business demands, but that is not near real-time backup that standard is not efficient even if we come up with a solution of manually backing out close to near real-time. It will not look efficient at the amount of data that will be put in, and looking at the random times to set the data in the source bucket; there is no way we can do a manual backup.
AWS Lambda manually handles the backup. In other words, for an impossible or difficult situation like that, AWS Lambda comes to the rescue.
Create two S3 buckets; one would be the source bucket where the data will upload, and the other is the destination bucket where the data is backed up from the source bucket. For these buckets to talk to themselves, it will require an IAM rule, and then for the automatic copy, it will need a Lambda function to copy files between those buckets.
What Triggers the Lambda Function?
The Lambda function is triggered every time there is a change in the metadata for the bucket, and this data is then uploaded into the destination bucket. After setting all this up, we can test it by putting information in the source bucket that will automatically replicate or copy the data.
Let us see how we can replicate data between two buckets. So, for this, we have a feature to cross region replicate in its feature that comes along with S3. If we want to copy between two different buckets in two separate accounts in those cases, we can use Lambda to replicate the data between the buckets, so we put one data, or we put data in the source bucket. That data gets copied to the destination bucket, and let us see how that is done.
The procedure here is to have two buckets, to begin with, and then create an IAM rule that will let us access to pull the data from the source bucket and put the data on the destination bucket, and then create Lambda files or Lambda event or triggers to look for an event in the source bucket and anytime new information gets added. Lambda gets triggered, copies the data from the source bucket and moves it to the destination bucket, and it uses the IAM rule and policy for the needed permissions.
What is the Cloud?
Before cloud computing, we want to host a website; these are the following things that we would need to do:
First, we must buy a lot of servers because we will be hosting a website on something, and every website has a peak time.
Secondly, keeping the peak time in mind, we should buy more servers.
Thirdly, we must monitor and maintain these servers since these are our servers, and we must continuously monitor them so our application will not experience downtime.
So, these things will lead to the problem.
Disadvantages of cloud
These are the problems we face before cloud computing. Now, we must fix these.
Cloud computing uses
Cloud computing uses remote servers on the internet to store, manage and process data rather than a local server on our personal computer.
AWS Database Services
There are mainly five database services.
1. Relational database management services (RDS)
We must understand that RDS is not a database but a database management service that manages our databases. It works with relational databases and databases like MySQL, Oracle, MariaDB, PostgreSQL, Microsoft SQL server or Amazon Aurora. It will update the DB engines automatically, install the security patches automatically, and do everything that had to be done manually or manually if we are hosting a database server; it does that automatically for us, and that's why it is called a management service. Everything will be done automatically by RDS.
2. Amazon Aurora
Amazon Aurora is a database which Amazon itself has developed. So, it is included in RDS, a relational database that RDS also manages. The difference between Amazon Aurora and the other databases already out is Amazon Aurora is based on MySQL. It means that the code we are using MySQL will also work with Amazon Aurora. But then, Amazon claims that Amazon Aurora is five times faster than MySQL. If we replace the MySQL server with an Amazon Aurora server, we will experience five times boost in our performance, and this is what Amazon claims, and that is what Amazon Aurora.
If we use Amazon Aurora and we were using MySQL before, we do not have to change our code because it will work the same with the code as it was when we were working with MySQL.
DynamoDB is also a management service, but it manages non-relational databases. That is, NoSQL databases. If we have unstructured data that must be stored in a database, so we cannot store it in the relational databases, we must keep it in a non-relational database, and DynamoDB manages the non-relational databases. It is also managed automatically and will get updated; the security patches are installed automatically, DynamoDB does everything, and no manual intervention is required. We do not have to specify the space we need; the moment more data comes in, the database automatically scales, it will grow automatically and shrinks automatically, and there is no need for manual intervention.
If the storage is coming low, nothing is required in DynamoDB; we only move to the DynamoDB console and start creating new tables, and it will not ask for anything.
ElastiCache is a caching service used to set up, manage and scale a distributed environment in the cloud. It means suppose we have an application and query something from a database; the database will process the query and, in turn, give us a result. If there is a lot of demand for a specific kind of result set, then the same query will run, again and again, increasing the overhead on our database in getting the same results.
So, with ElastiCache, the user first accesses the query from the database. Still, now that it has been analyzed that this query is being asked very frequently, it stores the result set in ElastiCache. Whenever that query comes in, it directly feeds in that result. So, the database's overhead is reduced because the request never reaches the database. After all, it has already been processed and is stored in ElastiCache and the ElastiCache, in turn, serves the user with the result. Hence, this process becomes faster, which is all about what ElastiCache is about.
RedShift is a data warehouse service, and it is a petabyte-scale data warehouse service. It gets data from RDS, and it gets data from DynamoDB, and it does not analyze on its own. It is an analysis tool and a data warehouse service that can analyze all the data stored on our databases, like RDS or DynamoDB. We can feed the data from RDS and DynamoDB as well.
AWS Networking Services
The AWS networking services will show what the networking domain offers all the services. There are mainly three networking services:
1. VPC (Virtual Private Cloud)
A virtual private cloud is a virtual network, and if we include all the AWS resources, we have launched inside one VPC, then all these resources become visible to each other or interact with each other once they are inside the VPC.
The other use of VPC is when we have a private data Centre, and we are using AWS infrastructure to be used as if they were on our network. In that case, we will establish a "virtual private network" that is a VPN connection to our private cloud, in which we have included all the services we want on our private network.
We will connect our private network to the VPC using the VPN, and then we can access all our AWS resources as if they were on our network, which is what VPC is all about. It provides us with the security and communication between the AWS services accessible, and it also helps us to connect our private data center to the AWS infrastructure.
2. Direct Connect
Direct Connect is a replacement for an internet connection; it is a leased line, a direct line to the AWS infrastructure, so if we feel that the bandwidth of the internet is not enough for our data requirements or networking requirements, we can take a leased line to the AWS infrastructure in the form of the Direct Connect service, so instead of using the internet, we would now use the Direct Connect service for our data stream to flow between our data Centre to the AWS infrastructure, and that is what Direct Connect is all about.
3. Route 53
Route 53 is a domain name system. A domain name system is whenever we enter a URL; it must be directed to a domain name system which converts the URL to an IP address; the IP address is of the server on which our website is being posted.
It functions like when we buy a domain name; the only setting we can do in that domain name, or the setting required in the domain name is the name servers. Now, these name servers are provided to us by Roue53. These name servers that Route53 gives us are to be entered in the settings of that domain name.
So, whenever a user points to that URL, the user will point to Route53. The work and the domain name setting are done, and we would have to configure Route53 now. Now that our request has reached Route53, it must be pointed to the server on which our website is hosted. So, on Route53, now we must enter the IP address or the instance to which we want our traffic to be directed. Our URL will directly get pointed to Route53, which will point to the example on which our application or website is being hosted.
AWS Management Services
The management domain includes all the below services:
CloudWatch is a monitoring tool that monitors all our AWS resources in our AWS infrastructure. Now, let us see how we can watch all of them.
Suppose we want to monitor our EC2 instance and be notified whenever our EC2 model CPU usage exceeds 90%. So, we can create an alarm in CloudWatch. Whenever our usage crosses 90%, it will figure a warning. That alarm, in turn, will send us a notification like an email or maybe whatever the parameter we set, we will receive a notice in that scene, so this is what CloudWatch is all about.
We can say that we can set alarms and turn to reactions from our AWS resources.
CloudFormation is used to templatize our AWS infrastructure. We need to templatize our AWS infrastructure because we have different environments and want to launch the same infrastructure in different environments.
When we create infrastructure and do not want to make that again, we can always take a snapshot of it using the CloudFormation; we can templatize this infrastructure and use it in other test environments.
Suppose we have a test, product, and debit environment and want the same infrastructure in all three environments. We can do that using CloudFormation.
So, CloudFormation is a tool to templatize our AWS infrastructure.
CloudTrail is a logging service from AWS. We can log all our API requests and API responses in CloudTrail when we want to troubleshoot a problem.
Suppose we get some error while we are using an application, and since there can be countless cases where we do not get an error, but in the particular case we get an error, now we have to track down the problem.
We will track it down using the logging service. So, since every request is logged using CloudTrail, we can go to that particular log where the error occurred, jot down the problem, jot down the line where the error is happening, and then solve it is all about what CloudTrail is all about.
How are the logs stored?
Suppose CloudTrail is enabled on a particular service, so CloudTrail will generate logs and store those logs in S3, a file system provided by AWS.
So, this is how the whole process happens.
1. CLI (Command Line Interface)
CLI is a command line interface, replacing our GUI (Graphical User Interface).
We can also use the command line to deploy instances, and the way to do that is by using AWS CLI. It is just a replacement for our GUI for any request.
AWS OpsWorks is a configuration management tool. It consists of two parts, and they are stack and layers.
Layers are different AWS services that we have combined, and when we combine them, this whole system is known as a stack.
We need a configuration management tool when we suppose we have an application using a host of AWS services. We want to change something fundamental one way to change this is by going to every service particularly and changing that setting and the following method to do this using OpsWorks. If we have deployed our application using OpsWorks, one basic setting we have to change in all our infrastructures can be at the stack level. All our resources, all the services we are using and different layers in that stack are known as a stack.
The AWS infrastructure as a whole would be known as a stack, and if we have to change the setting, we will have to change it at the stack level and automatically, it will be implemented to all the levels. So, this is how OpsWorks functions.
3. Trusted Advisor
The trusted advisor is like a personal assistant to the AWS infrastructure, advising us on our monthly expenditures. Suppose we have the best practice, and if we use that practice, we can reduce our expenditure. They would recommend we use our IAM policies if it recognizes that many users and different people are using our AWS account. We have not set up any IAM policies on our AWS account; it will advise us to create those IAM policies, enabling us to improve our AWS account.
AWS Security Services
The AWS security domain includes two services. They are:
IAM (Identification and Authentication Management Tool)
IAM is also referred to as an Identification and management tool. If we have an enterprise, users use our AWS account to control the AWS infrastructure, and we can provide them with granular permissions. Suppose we want a user to review what all instances are there, so we can give the user that access. If we want users to launch models and not delete them, we can provide that user with access, so these are the kind of accesses we can give using IAM, which is all about IAM.
It authenticates us to our AWS account, or in this case, our employees do the route AWS account in the fashion we want.
KMS (Key Management Service)
AWS KMS is a Key Management Service. Any instance that we have launched in an AWS is based on this infrastructure that there will be a public key, and we will provide a private key and the public key with the AWS. Whenever we want to connect our instance, we must upload the private key or get the private key, and then AWS will master the private key with our public key, and if it matches, it will authenticate us to our AWS instances. So, we learnt that KMS assigns us the private key. We can create a new key pair or use an existing one, but we must be cautious with our private keys. If we lose our private keys, in any case, there is no way we can gain access back to our AWS resource, which will be using that private key.
So, these are all about security services. Now, we will discuss the AWS application domain.
AWS Application Services
The application domain includes three services:
SES is referred to as Simple Email Service. If we have a more extensive user base and want to send emails to them, we can do that with a push of a button using the SES. Also, if we wish for the replies to be automated, that can be done using SES, which is a straightforward service.
SQS is called Simple Queue Service and is an exciting service that acts like a buffer.
Suppose we had the image processing application, and whenever we uploaded an image and suppose we had to do five tasks. Now, these five tasks would list in our simple queue, and a server will keep a reference with this queue and see what all tasks are left to be done on the image.
How does this help?
It will help when we have multiple servers running for our processing. Suppose the first server does our first two operations, the other server might do the following three operations some another server might do the following three operations. So, the next server should know what all operations are already done, and this knowledge is referenced through our SQS.
When a task is done, that task is removed from the queue, and the next task is queued, which is what SQS does. When we list those tasks, only those will be on priority. The first task we have listed will be executed first, based on priority, like first in, first out (FIFO).
Suppose we have five images pending, so the second image is after the first image, and the third image is after the second image so that the first image will process according to the queue. Then the second image will process, and then the third image will process, so it works like this.
SNS is called Simple Notification Service and sends a notification to other AWS services. It is used like, suppose we have an application that we discussed image processing, we upload the image, and now we want it to email whenever a photo is uploaded.
SNS will notify SQS and SES that an image has been uploaded. When the notification is sent to SQS, that notification can also include the number of tasks to the task that has to be done on that image. So, SNS sends a piece of information to SQS with the details that must add to the queue. SNS can also notify SES that an image has been added, so send the respective email to the person.
SNS sends a notification to different AWS services, which is what SNS is all about.
Let us now discuss AWS pricing, like how we charge these services. AWS has two models:
Pay As You Go
It means we can pay for what we use. Let us take an example to understand it better. Consider a file system here, so we do not have to force our requirement and buy 50GB junk for ourselves, even if we use only 10GB out of it. If we are using some other service and if we are not using AWS and they do not follow the "pay as you go" model. We must foresee what our requirement is. We must predict whether we might need 50GB in a month, but we end up using 10GB. But, with this, AWS is not the case; we pay according to our usage.
So, if we are using S3 and we have only 6 or 7GB of data on it, we will be paying for that 6 or 7GB, and in future, if we upload more data onto it, we will be charged according to that data or that storage that we are using.
So, this is what the "pay as we go" model is.
Pay Less by Using More
So, this is an exciting concept. Here we have included S3 for pricing. So, if we use S3 with up to 50GB of storage, we are charged at 0.023$Gb per month. If our usage goes beyond 50GB and it lies between 51-100TB of storage, our rate reduces to 0.022$GB per month. If we use 500TB and extra storage on S3, we will be charged 0.021$GB per month.
So, as we are using more, our prices are dropping, and the rates are becoming less, and this is what "pay less by using more" means.
Save when you reserve
When we reserve any instances in AWS, we can book them for one year or a three-year term. So, if we have that kind of usage, we can reserve our instances and save costs up to 75%.
With services like AWS EC2 and RDS, we can reserve our instances for a specific time frame. We are changed less sign up to 75% less.
If we know that we will be using our instances for a minimum of 1 year or maybe three years down the line, we can reserve them and save up to 75% on that.
Hosting a Website on AWS
We have to host a website on which we can upload images, which should display on the homepage. Once we have uploaded them, this website should also autoscale and be highly available.
So, the above is our use case, and we have to host this application on the AWS infrastructure.
Let us see how we will architect the various website we function.
From the above use case, the user will point to a website address, and that website address will point to the website, and that website will be dealing with the files and that file server and a database.
Why the File Server?
Because we will be uploading our images on something, so, that's why the file server and we have to remember the parts of those images, and for that, we are using the database.
So, the above is the architecture we will be constructing using AWS resources.
Use Case Architecture Using AWS Services
Here in this topic, let us see how we will architect the architecture discussed above using the AWS resources.
The user had to point to a website address, which will point to a website. We will need a domain name system here so that we will be incorporating Route 53. The user will be interacting with Route 53, which will, in turn, point to a server. The server is the place where we are hosting a website.
Our application or website is a PHP application; if we have an environment in Elastic Beanstalk, we should always go for it.
Since PHP is listed in Elastic Beanstalk, we will use Elastic Beanstalk instead of EC2.
Elastic Beanstalk will have EC2 instances under the hood, which are automated to have the PHP environment automatically configured on our EC2 models. Our EC2 instances will control this using the Auto Scaling and load balancer. Whenever there is a requirement for more cases, more EC2 models will launch, and the traffic will be distributed accordingly using the Elastic load balancer, so this is how it functions under the hood. Still, we do not have to worry about that. We can also consider Elastic Beanstalk as a black box.
Now, our website has to interact with RDS and S3. We use RDS and S3 because S3 is a file system discussed in the architecture above, and RDS is the database we are trying to connect with.
We have to store the paths to the file we are uploading; those paths can be kept structured. Since it is structured data, we will use RDS, Relational Database Management Service, to store our data in a supposed MySQL database. That is why we are using the RDS service.
If we are connecting a third-party application to our S3 file system, we need to authenticate that application to S3, and for that, we would need to access keys, and IAM provides those access keys. | s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500671.13/warc/CC-MAIN-20230208024856-20230208054856-00203.warc.gz | CC-MAIN-2023-06 | 27,658 | 138 |
https://elearn.nptel.ac.in/shop/nptel/introduction-to-biostatistics/ | code | Observations from biological laboratory experiments, clinical trials, and health surveys always carry some amount of uncertainty. In many cases, especially for the laboratory experiments, it is inevitable to just ignore this uncertainty due to large variation in observations. Tools from statistics are very useful in analyzing this uncertainty and filtering noise from data. Also, due to advancement of microscopy and molecular tools, a rich data can be generated from experiments. To make sense of this data, we need to integrate this data a model using tools from statistics. In this course, we will discuss about different statistical tools required to
(i) analyze our observations,
(ii) design new experiments, and
(iii) integrate large number of observations in single unified model.
BE Biotech/Biosciences/Bioengineering,MSc Biotech/Bio sciences/Bioengineering, PhD Biotech/Biosciences/Bioengineering. It is taught as a core course for M. Tech Biomedical Engineering students at IIT Bombay.
Basic knowledge of 12th standard mathematics is sufficient.
Biotech companies, pharma companies and omics companies may be interested in this course.
ABOUT THE INSTRUCTOR
Prof. Shamik Sen joined IIT Bombay in July 2010 as an Assistant Professor in the Department of Biosciences and Bioengineering. Dr. Sen earned a B.E. in Mechanical Engineering from Jadavpur University, Kolkata, and a M. Tech in Mechanical Engineering from IIT Kanpur. He then completed his PhD in Mechanical Engineering from University of Pennsylvania, where he worked in the area of mechanobiology.He is currently working in the area of mechanobiology where he is integrating mechanics and biology for probing stem cell biology and cancer cell biology. He is combining experiments with simulations for addressing his research questions.
1. Join the course
Learners may pay the applicable fees and enrol to a course on offer in the portal and get access to all of its contents including assignments. Validity of enrolment, which includes access to the videos and other learning material and attempting the assignments, will be mentioned on the course. Learner has to complete the assignments and get the minimum required marks to be eligible for the certification exam within this period.
COURSE ENROLMENT FEE: The Fee for Enrolment is Rs. 2000 + GST
2. Watch Videos+Submit Assignments
After enrolling, learners can watch lectures and learn and follow it up with attempting/answering the assignments given.
3. Get qualified to register for exams
A learner can earn a certificate in the self paced course only by appearing for the online remote proctored exam and to register for this, the learner should get minimum required marks in the assignments as given below:
CRITERIA TO GET A CERTIFICATE
Assignment score = Score more than 50% in at least 6/8 assignments.
Exam score = 50% of the proctored certification exam score out of 100
Only the e-certificate will be made available. Hard copies will not be dispatched.”
4. Register for exams
The certification exam is conducted online with remote proctoring. Once a learner has become eligible to register for the certification exam, they can choose a slot convenient to them from what is available and pay the exam fee. Schedule of available slot dates/timings for these remote-proctored online examinations will be published and made available to the learners.
EXAM FEE: The remote proctoring exam is optional for a fee of Rs.1500 + GST. An additional fee of Rs.1500 will apply for a non-standard time slot.
5. Results and Certification
After the exam, based on the certification criteria of the course, results will be declared and learners will be notified of the same. A link to download the e-certificate will be shared with learners who pass the certification exam.
Week 1: Lecture 1. Introduction to the course
Lecture 2. Data representation and plotting
Lecture 3. Arithmetic mean
Lecture 4. Geometric mean
Lecture 5. Measure of Variability, Standard deviation Week 2: Lecture 6. SME, Z-Score, Box plot
Lecture 8. Kurtosis, R programming
Lecture 9. R programming
Lecture 10. Correlation Week 3: Lecture 11. Correlation and Regression
Lecture 12. Correlation and Regression Part-II
Lecture 13. Interpolation and extrapolation
Lecture 14. Nonlinear data fitting
Lecture 15. Concept of Probability: introduction and basics Week 4: Lecture 16. counting principle, Permutations, and Combinations
Lecture 17. Conditional probability
Lecture 18. Conditional probability and Random variables
Lecture 19. Random variables, Probability mass function, and Probability density function
Lecture 20. Expectation, Variance and Covariance Week 5: Lecture 21. Expectation, Variance and Covariance Part-II
Lecture 22. Binomial random variables and Moment generating function
Lecture 23. Probability distribution: Poisson distribution and Uniform distribution Part-I
Lecture 24. Uniform distribution Part-II and Normal distribution Part-I
Lecture 25. Normal distribution Part-II and Exponential distribution Week 6: Lecture 26. Sampling distributions and Central limit theorem Part-I
Lecture 27. Sampling distributions and Central limit theorem Part-II
Lecture 28. Central limit theorem Part-III and Sampling distributions of sample mean
Lecture 29. Central limit theorem – IV and Confidence intervals
Lecture 30. Confidence intervals Part- II Week 7: Lecture 31. Test of Hypothesis – 1
Lecture 32. Test of Hypothesis – 2 (1 tailed and 2 tailed Test of Hypothesis, p-value)
Lecture 33. Test of Hypothesis – 3 (1 tailed and 2 tailed Test of Hypothesis, p-value)
Lecture 34. Test of Hypothesis – 4 (Type -1 and Type -2 error)
Lecture 35. T-test Week 8: Lecture 36. 1 tailed and 2 tailed T-distribution, Chi-square test
Lecture 37. ANOVA – 1
Lecture 38. ANOVA – 2
Lecture 39. ANOVA – 3
Lecture 40. ANOVA for linear regression, Block Design
Books and References
Introduction to Probability & Statistics – Medenhall, Beaver, Beaver 14th Edition
Introduction to Probability and statistics for engineers and scientists, S M Ross, 3rd Edition | s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233511361.38/warc/CC-MAIN-20231004052258-20231004082258-00492.warc.gz | CC-MAIN-2023-40 | 6,060 | 60 |
https://jmoore53.com/rails/2019/07/01/rvm-ruby-nvm-node.html | code | Keeping environments clean is the only way I manage dependencies and libraries on my development machine.
RVM - Getting Setup
Getting started with RVM on MacOS is pretty plain and easy. The RVM website also offers best practices tips and a nice basics page on why managing dependencies through a version manager keeps your dev environment clean.
With RVM, I can list the most recent version of ruby with
rvm list known and then install it with the command
rvm install ruby --latest. I also often list my current version I’m using with
rvm list rubies and it shows the current version of Ruby I am using.
RVM - Production
Although I found RVM awesome for my development machine, I found better results with chruby and docker images when hosting ruby on rails applications from a server. I have run into trouble with RVM configurations when moving them to new/different machines. I wrote a post earlier (Januaryish) covering microservices and I loved using a container setup for rails. The microservice architecture allowed me to spin up redis and mariadb containers with no problems and the container setup allowed the rails server to connect to these containers pretty easily.
NVM - Getting Setup
I also use yarn to build assets, but this is often done through a container.
NVM - Production
The second piece is ensuring assets are precompiled with the rails command | s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296818374.84/warc/CC-MAIN-20240422211055-20240423001055-00293.warc.gz | CC-MAIN-2024-18 | 1,367 | 13 |
https://www.mountainbuzz.com/forums/f11/whats-the-method-to-your-madness-15033.html | code | What's the method to your madness?
I've seen a lot of complaining lately about finding different posts and different forums, so I'm curious how other people are navigating the new site. As for me, I think it's pretty simple.
When I click on my mountainbuzz bookmark, I'm automatically logged in and then I just click on the "New Posts" link. This way I see all new posts regardless of what forum they were posted in.
So what are other people doing? Are there any tricks I'm missing? | s3://commoncrawl/crawl-data/CC-MAIN-2019-47/segments/1573496668525.62/warc/CC-MAIN-20191114131434-20191114155434-00444.warc.gz | CC-MAIN-2019-47 | 482 | 4 |
https://itch.io/post/2873085 | code | Wow thanks for the great feedback man, i was testing browser play when you might have played the game. I replaced arrow keys with WASD so the page won't move. I'm still learning and improving object collisions so in next patch it might get better. Player's slippery movements are intended so the user take more time to move rather than usual. Thanks again..
"Every second matters" | s3://commoncrawl/crawl-data/CC-MAIN-2021-25/segments/1623488507640.82/warc/CC-MAIN-20210622033023-20210622063023-00599.warc.gz | CC-MAIN-2021-25 | 380 | 2 |
http://unix.stackexchange.com/questions/tagged/stat+c | code | I want to read the CPU utilization stats from a C program, I am interested in the percentage of use of CPU, steal time etc. These stats are shown in the 3rd row from the top command. I tried to parse ...
The case is as this, I create many files, and after the file generation, I use stat to get the all files info under the directory. The purpose is to purge all the files which are old than the ... | s3://commoncrawl/crawl-data/CC-MAIN-2014-42/segments/1413507444312.8/warc/CC-MAIN-20141017005724-00119-ip-10-16-133-185.ec2.internal.warc.gz | CC-MAIN-2014-42 | 399 | 2 |
http://rachelpietraszek.com/2011/09/25/imitosis-armchair-apocrypha-andrew-bird/ | code | September 24, 2011
- Andrew Bird
“Our solution was to create a new place that’s lighter-weight where you can see lighter-weight stuff—that’s how we came up with Ticker.
” If you
“The Bad in Each Other” - Metals - Feist | s3://commoncrawl/crawl-data/CC-MAIN-2021-25/segments/1623487600396.21/warc/CC-MAIN-20210613041713-20210613071713-00131.warc.gz | CC-MAIN-2021-25 | 232 | 5 |
https://www.freelancer.com/job-search/mysql-mapping-table/ | code | ...containing the submitted values (one per line. If this is too hard to code, this can also be triggered using a "Download .XML File" button on the form confirmation page) 2) A table view of the all the database records (100 per page) a) Columns (with headings): "ID", "Author", "Title", "Format", "Language", "Owner" ...
I need an Android ap...are riding, walking or motorcycling can keep from getting totally separated. The followers will be able to push a button to "take me to the leader". This will then follow mapping to get to or continue to chase the leader. The app will also use the different changes, shortest distance, fastest, avoid dirt roads, avoid tolls ETC.
...radius (5km, 10km, etc…), radius circle shows around address entered in search bar. 3. Data in table (bottom of the web page) only displays postal codes within the radius selected. *Also remove the white space between the map, radius bar and table in my demo (html file)* I have attached an html file with the coding for the basic functions
* You need to know MEmu, an Android Emulator [url removed, login to view] * You need to know Open Holdem, an poker bot framework [url removed, login to view] It's not hard or complex, but you need to do some research to make it happen. I want OpenHoldem to work with a mobile poker game through MEmu emulator Only apply if you think you can handle this job. Thanks, Harry
...and design features, this job requires an Exceptionally High Level of proficiency developing mapping services and API integration utilizing the Android SDK. -Only the highest proficiency candidates will be considered. -We are using Mapbox as the mapping service. [url removed, login to view] -We are using OSM (Open Street Maps) www.openstreetmap.org/#map=3/71
This project requires the use of and experience with ALTOVA MapForce. I need small help for now and if works out, I would need much more mapping help using this software. If you bid, please show me sample data mapping project you did before. Thank you.
...============================== 3. On-page Factor :::::::::::::::::::: *****Meta tags changes *****Implement in Keywords density *****Meta Tags Optimization *****URL Mapping *****Alt & Img Tag optimization *****Google Analytic setup *****Sitemap Generate in XML & HTML *****Webmaster tool (Google/bing) setup *****[url removed, login to view] optimization *****Custom
...I need: Someone really good HIMSELF in Macros / VBA / Pivot Table Please please if you do not have the skills YOURSELF, PLEASE DO NOT BID ! I have right now a small 15 US$ project for which I need a little adding into a Pivot Table + some Macros (importing data from an Excel Table into another, auto-creation of new tables etc). Fast worker
I have table used datatables; -Add multi row edit function to this table ( now can only edit one row) -Save selected rows to mysql -Edit, update mysql values with this datatable.. -Payment will be done after job complated
The task is to do the following work .... 1. Modify site exam results to outputs as a user downloadable pdf certificate. 2. Slightly modify responsive CSS to look good (width and height) on all mobile phones. 3. Set the exam db and front-end to display 10 questions max .... randomly per exam category , NOTE: Must be able to share screen throughout development and speak / understand Engl...
Skill requirements ATTENTION TO DETAIL Keyboard development, API integration, Database development, Mapping, Graphic design, Loyalty, Encryption, QR codes, Augmented Reality I am looking for a developer who has developed (or can develop) Android soft keyboards. This is for phase 1 of several phases to the project. Please view ALL The objective
Hi I need to out put bus time tables from TransXChange XML data. I have already imported the XML to MYSQL. I need someone with experience with the TransXChange format to display bus time tables. If you have used the TransXChange format before this task should only take a day for a basic example. [url removed, login to view]
...The tracking, mapping, last known good position, alerts/notifications will use standard protocols/formats of ibeacon and eddystone whereas we will give you additional info about the 2 way ringer. All communications are local bluetooth except for the lost beacon reporting which needs internet connectivity. And of course the mapping feature which might
...business and i need content writing for website which is seo friendly professional. The product details will be provided in raw data and they need to organised in the product table which i will provide along with creating a unique description about the item. Tables need to be made for general customer reference (size etc) In total about 45-125 products
basis: [url removed, login to view] I want to save the search phrases into a table. When the searcher klicks an entry in the dropdownlist then also the target site should be saved into that table. Otherwise (when the searcher press enter or klick on the serach symbol) there should be statet "enter" or anything like that For example timestamp search phrase ended_with
...insert in 2 different MySQL table Dates Client Name Service Address City State Zip Resources Budgeted Hours Actual Hours Amount Actual $/Man Hr Bdgt $/Man Hr Status ALL the information in this XML need to be inserted in two differents tables and columns. So i got a table for CUSTOMER and another for SERVICES So exemple, table CUSTOMER will grab | s3://commoncrawl/crawl-data/CC-MAIN-2017-39/segments/1505818686043.16/warc/CC-MAIN-20170919221032-20170920001032-00656.warc.gz | CC-MAIN-2017-39 | 5,445 | 16 |
http://www.insanelymac.com/forum/topic/290788-moving-and-resizing-osx-partitions/ | code | Update: I made a temporary fresh OSX install to the 128GB SSD. So it should now be as simple as following your steps and then restoring Win 7 afterwards. So long as I can work out how to install the bootloader.
Bootloader can be installed either manually or with installer package. I'd recommend manual method (if Cahmeleon is used), as it gives you full control other the process. it is more complicated then installer method though. There are guides on both methods.
However, if I remove all partitions from the drive and then attempt to restore the OSX to the beginning of the drive, I get an unbootable drive. Booting from the SSD in UEFI fails and it just defaults to the next bootable device if finds (usually my HDD).
Could this simply be because I haven’t reinstalled the bootloader? You'll have to forgive me... bootloaders aren't my strong point. How can I do this without actually booting into OSX?
A sector-by-sector clone of a disk does the complete copy of all the sectors present in the disk (including bootloader part). When you restore only the certain partition, only the data in that partition gets restored.
Bootloader (Chameleon for instance) itself consists of few binaries - boot0, boot1h and boot (plus some other important stuff). boot0 goes to MBR. When you restore the whole disk, MBR is also restored, hence OS X boots as it should. When you restore only the single partition, MBR is not restored, only the partition itself gets restored.
There are two most common bootloaders for the OS X on PC - Chameleon and Clover. An important difference between the two, is BIOS modes supported. Clover can be used with both UEFI and legacy mode (UEFI is preferable). Chameleon can only work in BIOS/legacy mode (UEFI mode is not supported). There are many info on both (esp. on Chameleon). Both have installers and both can be installed manually. Again google/search the forum.
As you have MBP, you can create a bootloader USB pen drive. This USB drive would only have bootloader installed and would serve as a temporary boot device. Once this USB is configured and proved to be working, you could copy the appropriate contents (from this USB drive) to the SSD with OS X. The goal of this USB drive is to let you boot OS X from SSD without fist installing a bootloader to the SSD itself.Go to the full post | s3://commoncrawl/crawl-data/CC-MAIN-2018-09/segments/1518891812259.30/warc/CC-MAIN-20180218212626-20180218232626-00481.warc.gz | CC-MAIN-2018-09 | 2,327 | 8 |
https://mail.scipy.org/pipermail/ipython-dev/2012-February/008794.html | code | [IPython-dev] Slow testsuite?
Tue Feb 21 12:49:50 CST 2012
How long does the testsuite take to run on an average linux machine? On
my windows machine it takes 125s with 100s for the parallel stuff. Is
that normal? The reason I'm asking is that I think the running time for
the parallel stuff has increased significantly from the last time I ran
tests. (is there a way to just skip the parallel tests but run all the
More information about the IPython-dev | s3://commoncrawl/crawl-data/CC-MAIN-2018-05/segments/1516084887981.42/warc/CC-MAIN-20180119125144-20180119145144-00268.warc.gz | CC-MAIN-2018-05 | 454 | 8 |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.