url
stringlengths 13
4.35k
| tag
stringclasses 1
value | text
stringlengths 109
628k
| file_path
stringlengths 109
155
| dump
stringclasses 96
values | file_size_in_byte
int64 112
630k
| line_count
int64 1
3.76k
|
---|---|---|---|---|---|---|
https://nursingdons.com/solution-compare-jovian-planets-atmospheres-of-terrestrial-3/ | code | Question 1. Compare and contrast the atmospheres of Jovian planets and the atmospheres of terrestrial planets. Why are the components of Jovian atmospheres so different from those of terrestrial planets?
Question 2. How do we calculate or determine the distances to stars? What units do we use and what are the limitations (if any) of the method used for such calculations? | s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100081.47/warc/CC-MAIN-20231129105306-20231129135306-00880.warc.gz | CC-MAIN-2023-50 | 373 | 2 |
https://brainstation.io/magazine/build-chatbots-for-smart-devices | code | Toronto’s Connected Lab will host a smart device hackathon.
The hackathon will encourage developers to create new experiences using conversational interfaces on the IBM Watson IoT Platform.
The IBM Watson IoT Platform allows people to connect devices, from chips and intelligent appliances, to applications and industry solutions, and use cognitive services including natural language processing and machine learning for deep insights into hidden or “dark” data for innovation and transformation.
During the hackathon, developers will use IBM Watson IoT cognitive APIs and smart devices to create conversational interfaces like chatbots.
“People are excited about chatbots because they see the potential to interact with technology using conversational language,” said Damian McCabe, VP Engineering at Connected Lab. “As an IBM alumni, I’m excited about the potential of the IBM Watson’s cognitive capabilities including natural language processing and machine learning. At the hackathon, developers will use this powerful platform to build more human ways for people to use innovative technology.”
The theme of the hackathon, “Conversational Interfaces and Smart Devices,” aligns with Connected Lab’s mission to build better connected software experiences.
The Connected Lab Chatbots for Smart Devices Hackathon, powered by IBM Watson IoT takes place on June 3 to 5 . | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337723.23/warc/CC-MAIN-20221006025949-20221006055949-00701.warc.gz | CC-MAIN-2022-40 | 1,392 | 7 |
https://mail.python.org/pipermail/python-list/2000-September/041763.html | code | BUG? sha-moduel returns same crc for different files
kragen at dnaco.net
Tue Sep 19 02:21:51 CEST 2000
In article <LNBBLJKPBEHFEDALKOLCCELAHGAA.tim_one at email.msn.com>,
Tim Peters <tim_one at email.msn.com> wrote:
>> since there are 4294967296 times more possible values for sha-1
>> than for md5, methinks this would not make much difference.
>Then it depends on how valuable a small difference is to your application.
>If you're betting someone's life on it, it's a good idea to combine a
>variety of methods with different underpinnings (to guard against
>currently-unknown systematic weakness in any one of them). If you're just
>trying to save a few of bytes of disk storage, a plain CRC32 is much cheaper
>and probably adequate.
I'd have no problem betting *my* life on never getting accidental false
collisions with MD5, at least given a dollar or two on the other side;
I wouldn't want to bet my life on never getting accidental false
collisions with CRC32.
SHA-1 looks safer from deliberate collisions than MD5.
<kragen at pobox.com> Kragen Sitaker <http://www.pobox.com/~kragen/>
Perilous to all of us are the devices of an art deeper than we ourselves
-- Gandalf the Grey [J.R.R. Tolkien, "Lord of the Rings"]
More information about the Python-list | s3://commoncrawl/crawl-data/CC-MAIN-2018-05/segments/1516084891196.79/warc/CC-MAIN-20180122073932-20180122093932-00271.warc.gz | CC-MAIN-2018-05 | 1,261 | 22 |
https://www.appgamekit.com/documentation/Reference/3D/LoadFullScreenShader.htm | code | Loads a shader used for modifying render targets, as such it only contains a pixel shader, the vertex shader is automatically generated to make sure it applies to the full screen. This type of shader should only be applied to objects created with CreateObjectQuad but nothing bad will happen if you choose to apply it to other objects, it will just produce unusual rendering results for that object. Currently shaders default to GLSL version 1.10, the line "#version 110" will be automatically added as the first line of the shader unless you specify a "#version " line of your own. Note that doing this may mean your shader does not work on all devices and platforms. The global "precision" value will be added and should not be included in the shader source. Returns an ID that can be used to reference this shader in other commands. IDs are shared across all shader types so loading a full screen shader into ID 1 will not work if a normal shader exists with ID 1.
integer LoadFullScreenShader( szPixelFile )
LoadFullScreenShader( shaderID, szPixelFile ) | s3://commoncrawl/crawl-data/CC-MAIN-2020-45/segments/1603107880401.35/warc/CC-MAIN-20201022225046-20201023015046-00700.warc.gz | CC-MAIN-2020-45 | 1,057 | 3 |
https://manelycreative.com/app/disklibrary/ | code | © 2008 Obvious Matter. All rights reserved.
DiskLibrary is a nice app that can catalog your CD or DVD media. I’ve got about 400 discs in it which makes it my slowest app to load. But it’s handy to be able to easily find your files.
It exports the catalog as an xml file- a very large xml file. In time I’ll write something to parse it.
There were several options in this category but the one that seems to be under recent development is Gnome Catalog. It supports categorization and ratings. | s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817463.60/warc/CC-MAIN-20240419234422-20240420024422-00836.warc.gz | CC-MAIN-2024-18 | 498 | 4 |
https://docs.pulsarswap.com/advanced-topics/order-block-interval | code | TWAMM has a minimum expiry interval of 5 blocks, which is equal to approximately 1 minutes, which means that every integer multiple of 5 blocks in height, we also call it
Order Block Interval
. The long-term orders in the order pool are due for settlement and the user's swap proceeds are updated.
Order Block Interval (OBI) is an explicit parameter on the Pulsar solidity implementation. It specifies the number of blocks between the execution of virtual orders and explicitly limits temporal resolution for specifying trades. The temporal resolution limitation arises because the length of an Term Swap is expressed in integer multiples of the OBI. | s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947475711.57/warc/CC-MAIN-20240301225031-20240302015031-00789.warc.gz | CC-MAIN-2024-10 | 650 | 4 |
http://adventuresnedu.blogspot.com/2011/11/saw-this-thought-id-share.html | code | I had to start this blog for a class I was taking (see one of my first posts). But now I am Student Teaching and thought it would be fun/a good idea to use it as a way to record what I am learning while pretending to be a teacher.
Tuesday, November 8, 2011
Saw this, thought I'd share
I saw this Prezi on an amazing teaching blog (US History Teachers Blog) I follow and thought I would share it here as well. | s3://commoncrawl/crawl-data/CC-MAIN-2018-22/segments/1526794867904.94/warc/CC-MAIN-20180526210057-20180526230057-00113.warc.gz | CC-MAIN-2018-22 | 408 | 4 |
https://community.spiceworks.com/topic/2137232-configure-openssl-windows-server-local-user-account-access-denied | code | Are you using the "machinename\localuser" format like you do for "domain\username"?
I am working on configuring SFTP on a server that is only being used for transferring files in and out of it. I need to configure this for SSH and I already did most of the setup, however when I login using the local account I created I get the error "Access Denied" when using the local account. However, when I use a domain admin account it works just fine.
Here is what I did so far.
1. Installed Windows Server 2016 (fresh install)
2. Installed OpenSSH version 7.7. Selected local users for the initial configuration.
3. Allowed firewall rules.
4. Joined the server to the domain.
5. Created a local SFTP user account on the server and added them into the local security policy for Allow log on locally and selected the local user account.
6. Configured SSH to modify the Passwd file and group file to add in the local users and groups.
mkpasswd -l >> passwd
mkgroup -l >> group
7. Made sure I logged in once to create the home directory for the SFTP user.
8. Started and stopped opensshd.
Kicker here is that I can log into the server via SSH on port 22 just fine with my domain admin account. However I get the access denied with the local user account? I have been searching around and I cannot find out why this is failing.
I installed putty on the server and even connecting to LOCALHOST it fails with "access denied" | s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296950422.77/warc/CC-MAIN-20230402074255-20230402104255-00736.warc.gz | CC-MAIN-2023-14 | 1,410 | 15 |
http://kirstinmcculloch.blogspot.com/2012/12/are-you-winner-decembers-give-away.html | code | **EDIT - sorry everyone, I must have I clicked the publish button instead of save, so while I have been compiling everyones entries, the post has been live without winners included! Sorry for any confusion that might have been caused - will you take baby brain as an excuse or is that only after the babies arrival?? Anyway winners are now below. xx**
Wow - last give away of the year guys. This is so exciting, because I wasn't sure when I started how if I would manage to give away something every month, or even if any one would enter to win.
How awesome then, that I managed to give away a prize every month.
And now to the last of 2012. One lucky person will receive my original painting 'Whiskers on Kittens' + the other a set of original Christmas Tags
So this months winners are.....
Winner of 'Whiskers on Kittens' is:
Winner of the Christmas Tags is:
Congratulations to you both. Please email me your postal address and I will send your gifts off to you shortly.
If you loved the tags, or would like your own piece of original art, check out LilliBean Designs.
And for those who receive my newsletter there is an awesomely HUGE discount in this months email. (but you can only grab the code, if you subscribe to LilliBean News. For this month only those who subscribe now will still get this months code, but you have to sign up before December 31st.) | s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917122739.53/warc/CC-MAIN-20170423031202-00506-ip-10-145-167-34.ec2.internal.warc.gz | CC-MAIN-2017-17 | 1,361 | 10 |
https://placesubmit.info/build-website/website-builder/build-website-website-builder-ip-godaddy.html | code | Getting your own website used to require a lot of tech wizardry, including knowledge of servers, HTML, FTP, site registrars, and web hosting services. Thankfully, we now live in the age of easy online site builders. The services included here let you make a well-designed, mobile-friendly site with minimal technical knowledge. They can even take a small or sole-proprietor business to profitability with buy links, online stores, and other money-making options.
GoDaddy InSight is a technology system that provides tailored recommendations gleaned from insights across more than a million GoDaddy customers in different locations and industries. InSight is designed to help you improve your online presence by providing you with performance metrics and advice on how to improve them. GoDaddy InSight powers a central dashboard where you’ll find your:
While the the best of them offer surprising amounts of flexibility, they also impose stringent enough restrictions to page design that you shouldn't be able to create a really bad looking site using one of these services. Typically you can get a Mysite.servicename.com style-url with no commerce abilities for free from one of these services; you have to pay extra for a better URL and the ability to sell. One issue to consider is that if you eventually outgrow one of these services, it can be hard to export your site to a full scale advanced web hosting like Dreamhost or Hostgator. If you know that's where you are eventually going, it may be better to skip the sitebuilder step.
Marketplace Template: Build and launch an online marketplace in less than 2.5 hours
Constant Contact gets really detailed here and will have different suggestions for you depending on the specific niche your site is in. For example, when putting in “food” as the topic of the site, Constant Contact will want you to clarify whether the site has to do with food tours, food banks, food stand, food truck, etc. Constant Contact will use that info to suggest a website design that’s truly optimized for what you need.
Eric has been writing about tech for 28 years. He was on the founding staff of Windows Sources, FamilyPC, and Access Internet Magazine (all defunct, and it's not his fault). He's the author of two novels, BETA TEST ("an unusually lighthearted apocalyptic tale"--Publishers' Weekly) and KALI: THE GHOSTING OF SEPULCHER BAY. He works from his home in Ithaca, New York.
GoDaddy Website Builder is an online editing and publishing tool that helps you create a website, regardless of your technical skill level. Just create an account, pick a design and use the built-in editor to add your own images and text. You can make your website as simple or complex as you’d like. Need to sell your stuff online? No problem. You can add a full online store complete with product listings, coupons, shopping cart, shipping and multiple payment options.
Yahoo's Tumblr is another incredibly popular blog platform that lends itself to shorter, more visual posts. You can, however, find themes that give your Tumblr site a more traditional website's look and feel. Google's Blogger features tight integration with Google Adsense, so making extra pocket change is a snap. Newer blogging services, such as Anchor, Feather, and Medium, stress writing and publishing more than intricate design, but they're incredibly simple to update.
Using WordPress to create your site is a similar experience to using a website builder in terms of process. Which platform you should use is a matter of preference. It depends on which one feels most intuitive to you and gives you the most flexibility for your site design and maintenance. A big advantage of going with WordPress is the large community of support, both official and from other WP software users.
You may expect a 404 page to pop up from time to time on new websites, but with patience and determination, you can build a fully functional, beautiful, and highly converting site from scratch. The main takeaway here is always to test your website before launch and remember that refreshing and revamping your website is a task you will have to perform regularly from now on if you want your business to grow.
The Best Way To Build an eCommerce Website (Online Store Shop) - 2020 | s3://commoncrawl/crawl-data/CC-MAIN-2021-04/segments/1610704824728.92/warc/CC-MAIN-20210127121330-20210127151330-00219.warc.gz | CC-MAIN-2021-04 | 4,269 | 11 |
http://christinabergey.com/ | code | I am currently a post-doc in the Department of Biological Science at the University of Notre Dame. I recently received my Ph.D. from New York University, working in the Molecular Anthropology Laboratory. My research focuses on how genetic material is transferred between populations and species, and the behavioral, ecological, and anthropogenic factors that affect such gene flow. I use genomics and bioinformatic techniques to study population genetics, mostly in mosquitoes and primates.
I am affiliated with:
And maintain affiliations with:
My current major projects involve the application of genomic techniques to mosquitoes that transmit malaria in the genus Anopheles, with projects in Uganda and Cameroon. I am still pursuing questions in evolutionary primatology, especially those involving hybridization. | s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783395160.19/warc/CC-MAIN-20160624154955-00076-ip-10-164-35-72.ec2.internal.warc.gz | CC-MAIN-2016-26 | 815 | 4 |
https://merb.cc/vbulletin/showthread.php?40216-Wifi-problem-Need-assist-please | code | Wondering if anyone can help me out with this problem I'm having.
I'm using a wifi connection, it's working fine using Firefox but when I try to sign onto MSN Messenger I get a message saying "we're unable to sign you into messenger at this time, click to troubleshoot the problem," so I click to troubleshoot and it goes through a list of things and checks them off one by one with a checkmark, until it gets to "Proxy Server", Your proxy appears to be offline or settings are not valid.
As I said, I'm only able to open Firefox and when I attempt to open IE it won't connect. I think it has something to do with my IE proxy settings but don't know how to remedy it.
Any idea what the problem might be, in laymans terms please. Lol. | s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988720356.2/warc/CC-MAIN-20161020183840-00306-ip-10-171-6-4.ec2.internal.warc.gz | CC-MAIN-2016-44 | 733 | 4 |
http://logoburg.com/page139740.html | code | 2012 год. LAP Lambert Academic Publishing With the growing problem of unemployment in Egypt, there is an increase in the number of interventions attempting to solve the problem. This book tackles the strengths, needs, and vision of interventions dealing with the problem of unemployment in Egypt, using Appreciative Inquiry (AI). It also maps out where those interventions fall on a socio-ecological model. Interventions represent nongovernmental organizations, social businesses, donors, training centers, recruitment agencies, technical institutes, educational institutions, and governmental organizations. Recommendations to apply a socio-ecological framework, such as building coalitions and building the capacity of interventions are suggested, in order to build on the strengths available and move towards a more collaborative approach while dealing with unemployment. This research is in partial fulfillment of the requirements for the degree of master of arts in community psychology. | s3://commoncrawl/crawl-data/CC-MAIN-2018-05/segments/1516084891196.79/warc/CC-MAIN-20180122073932-20180122093932-00278.warc.gz | CC-MAIN-2018-05 | 995 | 1 |
https://isogrid.org/blog/category/uncategorized/ | code | When discussing mesh networking, the common refrain is “mesh networking is not scalable”. Here is data and code that indicates it can scale ‘enough’ to support a full-scale global isochronous mesh network of 2^40 nodes with mostly stable links. These data were generated by running a mesh routing algorithm on each node in simulated networks sized from 2^7 to 2^23. Note that this algorithm isn’t the full spec’d IsoGrid algorithm, just a framework to test scalability.
This simulation and analysis makes the following assumptions:
- The link layer is isochronous
- The network layer is source-routed
- Latency per hop is bounded by a constant time that is comparable to the time it takes for light to propagate across a hop
- The links (on average) stay up for longer than a day (no mobile nodes)
- Nodes join the network in a bootstrapping process inspired by S/Kademlia
- The simulation of networks sized from 2^7 to 2^23 is enough to extrapolate likely scalability to 2^40
- The global network topology is approximated by placing nodes in a 2D grid pattern and linking each node to the 4 nearest nodes (except at the edges and corners).
- Each node has 100Gib/s (or more) total switching capacity
- Each bootstrapping message is around 1kB
- The cost of network transit is directly proportional to physical distance
It follows from #1 & #2 that latency per hop can be bounded by a constant. Specifically, #3 is reasonable at least until 2^47 nodes (~1 node per square meter of the land surface of the earth). Light takes ~5ns to travel 1m in optical fiber. With 128 bit words switched isochronously at an achievable 100Gib/s, each hop in this full-scale scenario has on the order of 1.2ns extra latency.
#4 reveals an acceptance that mesh networks with highly mobile nodes (actually nodes with highly transient links) aren’t likely to be scalable. But the switches that form the network don’t have to be mobile, just like the core routers of the Internet aren’t mobile.
The current TCP/IP Internet routing table is NOT scalable: Each node must know about all other nodes. #6 means that the following is only likely true but isn’t proven: Isochronous&source-routed mesh networks can scale to 2^40 nodes with conservative assumptions about topology and current technology. If, instead, one assumes a more 3D topology would develop naturally in the full-scale scenario (urban environments, satellites, and rooftop wireless laser hops), then it scales beyond 2^50 nodes.
#7 means that taking a simple bisection of the square grid produces the nodes that have the heaviest bootstrapping data load to switch. In order to be a viable network, this load must be a small portion of the available bandwidth of those nodes. Higher physical bandwidth links and more stable links network wide make this better.
The simulation code is shared here for verification and reproducibility purposes. This code is NOT production quality. It’s never been code reviewed. It’s more important to move to the next phase of development rather than spend time cleaning up the simulation code.
The simulation was built to have the following scalability properties, and the data confirms it was achieved:
- The “Search Rounds” taken by each node to find its best matched nodes (XOR metric) grows as LOG2(N)
- The “Highest Traffic on a Link” grows near N^(1/2)
Raw data was collected by simulating the bootstrapping of various networks from 2^7 nodes to 2^23 nodes. A seed is used to drive a pseudo-random number generator to produce the node IDs. With the same seed, the first three columns are produced deterministically, but with a different seed the numbers move around a bit. In order to determine the growth rates with more accuracy, the simulation was repeated with different seeds (up to 2^21 nodes), and then averaged:
|Centerline crossing messages
Traffic on a Link
*The 2^21 sim required a large system and many hours of compute time, so it was only run 7 times. The 2^23 sim required a very large system and two days of compute time, so it was only run once.
#Memory and CPU time aren’t meaningful when tested near the memory limits of the machine, (due to additional Garbage Collection) which occurred on the 2^21 and 2^23 node sims
Analyzing the effect of doubling the network size on each column, from left to right:
- If one normalizes the per-node cost (the number of hops traversed per node) by distance, then the per-node cost growth rate upon doubling the network size is low (<6%). This can be done by assuming the growing number of nodes are spread evenly over a non-growing space: Since the network is a square, this normalized growth rate was computed by multiplying by the square root of the network size.
- The number of messages per node that have to cross to the other side of the network is growing at only 3.9%
- The search rounds per node are tracking LOG2(N) perfectly
- The memory is growing at a low rate of 9%
- The CPU time is growing at a low rate of 13%
- The last column on the right (in bold) is the scalability bottleneck, growing at a rate of 47%
Download the data
As expected, the main bottleneck for mesh networks is the load on the network attributed to link and node updates. The worst case load would be a full re-bootstrap of the entire network, so this analysis focuses on that scenario. The bootstrap data load of the links that cross the centerline of the network goes up by 47% each time the network size doubles. Extrapolating the above simulations to bootstrapping a (truly epic) 2^40 node network:
- Each node would take ~140KB of memory
- Each node would consume much less than 1 second of Core i5 CPU time
- Each centerline node would only have to switch 50-100GB
The last point seems like a lot of data for a simple bootstrap, but this would be 5-10 years in the future where 10Gb/s links would be the bare minimum, and this data can be transmitted in about a minute. Even if these extrapolations are low by a factor of 100, with the assumptions made above, the network would still perform well.
A full-scale global isochronous mesh network can scale to at least 2^40 switches
Discussion on Hacker News! | s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510810.46/warc/CC-MAIN-20231001073649-20231001103649-00259.warc.gz | CC-MAIN-2023-40 | 6,168 | 40 |
http://www.rwbnetsec.com/urlcrazy/ | code | Hey guys! Welcome to another tutorial! This tutorial will be on URLCrazy.
URLCrazy is a tool written by Andrew Horton. Its purpose is to generate and test domain typos, and variations to detect and perform typo squatting, URL Hijacking, phishing, and corporate espionage. What does that mean for us exactly?
There are two vantage points you can take when looking at the data URLCrazy provides:
1. Company’s point of view
URLCrazy will let you see if someone has registered a domain name that closely resembles your domain, and if these domains are in use, you can investigate how they’re being used. Some may be legitimate sites, while others may be scam sites. For example, say your company has an international presence, so one of your competitors in that country registers a domain using a typo for instance, and they use that domain name to maybe try and get email streams from your users. Maybe they target account executives, looking for pricing data that they then use against you during a bid on a project.
2. Attacker’s point of view
As a pentester, you could look at the domains generated, and if one isn’t in use, you could register that domain, and set up a phishing campaign to use against the target. An attacker could also set up a fake site that looks just like yours, and when a user visits the site, they get served some type of malware. Lots of possibilities here.
Now that we have an idea what we can use this tool for, let’s take a look at the options available, and get some hands on with it.
First, to open URLCrazy in Kali, go to “Applications –> Information Gathering –> DNS Analysis –> urlcrazy”. When the terminal window opens, you’ll be presented with the list of options available to use.
“-k” is used to change the keyboard layout. Using different layouts could give you a better view of typos that would occur in other countries, and how the bad guys may be generating domains there.
“-p”, or “popularity” option shows how often that particular domain spelling may show up in Google results, or how often someone searches for that specific spelling. You may want to verify this manually through Google.
“-r” causes urlcrazy to not resolve any domain names to IP addresses, therefore, only giving you a list of generated domains.
“-i” will show invalid domain names, such as invalid TLD’s
“-f” lets you specify the output type; there are 2 options here – human readable, and CSV; default is human readable
“-o” lets you create a file containing the results of your scan
Let’s go ahead, and start running through some scans.
1. Default Scan
Syntax: urlcrazy msn.com
You see that it uses the “qwerty” keyboard layout as the default, and it generated 51 domain names. It categorizes each type of typo that it checks for, shows the typo it generated, and shows if that domain name resolves to an IP address. If it does, it indicates that domain is in use, and should be investigated further.
2. Change Keyboard Layout
Syntax: urlcrazy -k azerty msn.com
Why would you use this option? The standard keyboard layout in the U.S. is “qwerty”. The other layouts are used in other countries, so the domain results may be a little different for each one.Looking through some of these results, it’s easy to see how someone might end up at one of these domains. Some of them could be the result of fat fingering the name while they’re typing. One example is here under the “Character Insertion” section – msnm.com. Notice that it resolves to an address in China. Could be a bit sketchy.
3. Don’t Resolve IP’s
Syntax: urlcrazy -r msn.com
Now it doesn’t show any IP’s associated with the domain names. You should have also noticed how fast it returned the results. That’s because it wasn’t trying to resolve all these domain names.
4. Show Invalid Domains
Syntax: urlcrazy -i msn.com
What makes these invalid is the TLD used.
5. Saving Results
Syntax: urlcrazy -o ~/Desktop/urlcrazy-human msn.com
Since “human readable” is the default output, we don’t need to specify it with the “-f” switch. We’ve set it to create a file called “urlcrazy-human”, and save it to the Desktop. Opening that file, you see the results saved neatly.
Now we’ll specify the CSV format using the “-f” switch.
Viewing that file shows the results in comma separated format.
I showed how each of the switches works individually, but you can use them together, depending on what you’re trying to do.
So, now that we’ve looked at how the tool works, let’s talk about what we can do with the data presented, and how to use it during a pen-test.
Say you’re a pentester, and you’ve been hired to do a test for xyz.com. After you’ve done some other DNS recon, you fire up urlcrazy, and run it using the “-p”, and “-i” switches. You find a domain that doesn’t appear to be in use, but the popularity value is pretty high. You register that domain name, and maybe even buy an SSL certificate to make it look more legit, set up a fake site at your domain that looks almost identical to the original site, then send a phishing email to the users at the target company. Knowing how people are, you’re going to get some responses, so you get some usernames and passwords, and you’re able to log in to the legitimate site as a valid user, then go from there to see if you can elevate privileges, and gain access to confidential data.
That’s just one scenario. That’s why I stress the importance of getting as much information as possible before you ever throw an exploit or some other kind of attack at your target. The more information you have, the better your chances are of exploiting the target.
I hope you enjoyed this tutorial, and found it useful. There’s a video version also available on my YouTube channel at RWBNETSEC.
Have an awesome day! | s3://commoncrawl/crawl-data/CC-MAIN-2021-21/segments/1620243991812.46/warc/CC-MAIN-20210515004936-20210515034936-00090.warc.gz | CC-MAIN-2021-21 | 5,865 | 39 |
https://azurewoman.com/2015/05/06/cant-create-a-static-gateway-vpn-on-a-microsoft-azure-virtual-network/ | code | Ah the joys of a proof of concept. We’re playing with a vendor’s application that has some tricky networking requirements (multi-site VPN support through a third party aggregator) to see if the architecture would work with a server in Azure.
The great part is we have a trial version of the software, so we can replicate things from the comfort of our own office without disturbing the customer. Which is just as well, really.
Following the instructions, I’d successfully created a virtual network, a Windows Server and a static gateway VPN and managed to get our Draytek router to connect. Hooray!
Next step was to see if a Cisco router we had here would connect, that we could then swap into the customer site. Because I wanted to retain our connectivity too, I needed to delete and re-recreate the gateway as Dynamic for multiple site VPN connectivity. Problem is, dynamic gateways use IKEv2 and neither our Draytek Vigor 2860 nor our Cisco SRP521W wanted to play that game. Back to the drawing board to reconfigure the gateway as static. And by reconfigure I mean delete and re-create.
Unfortunately, once you add multiple local networks to a gateway, the Azure portal gives up and says “it’s all too complicated for me now – use XML to configure stuff”. But when I tried to upload an edited XML file, I got an unhelpful “unexpected error”.
I also found that if you DONT remove that second local network from the configuration, if you try to delete the gateway and re-add it .. it will only want to add a new dynamic gateway. The box to choose static or dynamic gets hidden behind the yes/no to create prompt.
The solution is that you HAVE to edit your XML configuration file and remove the local network from the ConnectionsToLocalNetwork section, and import this change, to make sure there’s only one local network attached to the VPN. Then you can delete the gateway and add a new static gateway.
Makes sense, but a prompt msg or error about that would be useful.
As for the unexpected error uploading the XML? Beats me what the problem with that was. I went to lunch, came back and repeated my steps and it verified and uploaded without a problem.
Let’s just put that one down to a glitch in the Matrix. | s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707948217723.97/warc/CC-MAIN-20240305024700-20240305054700-00804.warc.gz | CC-MAIN-2024-10 | 2,233 | 10 |
https://forum.orkframework.com/discussion/7890/recyclable-scroll-rect | code | So after testing some inventory items I noticed there was a noticeable pause in the frame rate when I attempted to load a list larger than 25 items. My project is estimated to have upwards of 150 items in a single list so I decided to simulate this and by god, It took at least 2-3 seconds to show. This is not ideal performance, especially considering my project is entirely 2d.
After looking into this I discovered this lag happens because the entire list if being dumped into memory all at once. The smart way to handle large list would be to implement a Recyclable Scroll Rect
Recyclable Scroll Rect reuses or recycles the least number of cells required to fill the viewport. As a result a huge number of items can be shown in the list without any performance hit.
I would like to request Ork/Makinom use Recyclable Scroll Rect
as its default method of handling lists. (the link above is just an example of the behavior I'm speaking about you can create your own method that works with your ecosystem) Data management is the bread and butter of RPGs and being able to efficiently display that data is the bare minimum of what players expect. (why this isn't default behavior in unity, I have no idea)
I'm not sure how to implement this myself, I believe Ork/Makinom handles the creating of prefabs. But I know for sure I can't finalize my project with such slow menu list performance.
For anyone else reading this, I hope we can come up with a solution since this pretty much effects everyone making a data heavy game. | s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100686.78/warc/CC-MAIN-20231207185656-20231207215656-00504.warc.gz | CC-MAIN-2023-50 | 1,522 | 7 |
http://insidehpc.com/2010/05/amd-updates-stream-sdk/ | code | Today AMD announced that it has revved their ATI Stream Software Development Kit
AMD today announced the availability of the ATI Stream Software Development Kit (SDK) v2.1, the latest update of its ATI Stream SDK supporting OpenCL industry standard-based programming on AMD GPUs and x86 CPUs. ATI Stream SDK helps developers accelerate application performance by leveraging the CPU and GPU resources in a given system. This collaborative computing model will be enhanced in the upcoming AMD Fusion Family of accelerated processing units (APUs). The new version brings additional performance-enhancing features, increases ease-of-programming and expands hardware support, and is available for download today.
New features include
- Support for OpenCL / OpenGL interoperability, helping reduce the overhead of passing data for display purposes, enabling a richer and more responsive visual experience for the user.
- Support for OpenCL byte addressable stores allowing more natural and efficient code for applications, such as image processing, that depend on the ability to update data at smaller than 32-bit granularities.
Support for OpenCL images, providing developers with access to hardware-accelerated texture features on AMD GPUs.
- OpenCL extension support for AMD media operations in OpenCL, giving developers a set of OpenCL kernel operations commonly used in multimedia applications.
- OpenCL extension support for device fission in OpenCL, enabling developers to sub-divide an OpenCL device and allowing multiple work kernels to be assigned to that device.
Among others; more in the release. | s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917118713.1/warc/CC-MAIN-20170423031158-00500-ip-10-145-167-34.ec2.internal.warc.gz | CC-MAIN-2017-17 | 1,602 | 9 |
http://www.articleevent.com/how-do-you-benefit-from-sas-certification-in-india/ | code | Indian companies have come a fair distance in their pursuit of better business prospects with the help of data analytics. It cannot be said that all of them have made huge profits using analytics nevertheless, the field of big data analytics has found establishment.
A step towards better employability
However, the problem that has been bothering large enterprises and small startups alike is the lack of a suitable workforce as well as a robust system that ensures the creation of one. In simple terms businesses are not being able to do as much as they would like to do with the data due to a lack of trained professionals. The number of people taking up various data analytics tools has increased over the time but not all of them come across as employable.
The roles such as data analyst, data engineer, and data architect and data scientist come with huge responsibilities. Companies across various industries in India rely on the findings of these professionals for crucial business decisions. This is why the value of a SAS certification in Bangalore is incredible.
- You become a certified analytics professional with relevant skills.
- You become more reliable to the employers.
- Your training prior to the certification makes you good at what you do and enhances your prospects in the industry.
A window to a great fortune
SAS is one of the oldest and most reliable data science tools in the market. It holds one third of the analytics market. But more importantly majority of the SAS users are large corporations with in house analytics units. Being a professional with SAS certification increases your chances of making it to a large company and commanding a huge salary.
A powerful skill set
While training for a certificate in SAS you familiarize yourself with data mining, data cleansing and data warehousing. These skills are highly valued in the analytics industry. SAS is one of the most popular tools used for data mining. Your knowledge of statistical analysis can help you further in garnering more advanced skills like machine learning and deep learning.
You should not stop at SAS
A SAS certification in Bangalore gives you some footing in the industry but if you wish to be invincible, your learning streak cannot stop at SAS. Use your knowledge of SAS to quickly learn SQL. Follow this by learning R and Python which are essentially the rivals of SAS in the market. But you should not worry about their rivalry as long as the skills establish you as an asset to any company.
The key to survival and fulfilment in the field of analytics and data science is to learn and to keep learning. Make it a habit and you will have a lot of fun and earn a lot of money. | s3://commoncrawl/crawl-data/CC-MAIN-2019-30/segments/1563195526506.44/warc/CC-MAIN-20190720091347-20190720113347-00155.warc.gz | CC-MAIN-2019-30 | 2,685 | 14 |
https://ravendb.net/docs/article-page/6.0/http/sharding/administration/studio-admin | code | Click to create, view or edit database properties.
Create new database
This button is available when no database has been created yet.
Click it to create a new database.
Click to create a new database.
Initiating the creation of a new database as shown above will open
the following view:
New Database Settings
Enter the database name.
Decide the number of replicas the database will have.
If set to 1, there will be no replication.
Click to enable or disable sharding on this database.
Number of shards
Set the number of shards the database will be comprised of.
Set nodes layout manually
The layout determines which nodes host each shard, and whether
nodes can function as orchestrators.
Enable this option to set the layout manually.
Disable to let RavenDB set it for you.
Select which nodes can function as orchestrators.
Select the nodes that host shard replicas.
The number of nodes available for each shard is determined
using the "Replication factor" box at the top.
Click to create the database.
After creating a database as explained above, the database will
be available here:
Expand/Collapse distribution details
Click to display or hide per-shard database details.
Informative icon: notify whether the database is encrypted or not.
Shard storage report
Click to watch the shard's storage usage.
Select the shard number and its replica node.
The storage report view will open. | s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474445.77/warc/CC-MAIN-20240223185223-20240223215223-00183.warc.gz | CC-MAIN-2024-10 | 1,388 | 33 |
https://www.dead-donkey.com/modules/shares/index.php?section=movies&id=204 | code | Jaume Balaguerò (Nameless, Darkness) proves once again he's a skilled director in Fragile, a nice ghost story supported by a good cast. It's worth the download if you care more about atmosphere & good acting than gore and guts.
Disclaimer The content of this website was created for dead-donkey.com, but may be published freely with reference.
Submitted reviews are owned by the original author who should be contacted for permission on reproduction or publication. All referenced movies, games, and literature are property of their respective owners.
All ed2k links submitted are unfiltered, unmoderated, and unedited, and are provided as-is from hashlinks found freely on the edonkey2000 network and exist regardless of this site. Their validity, legality and content is subject to the end users usage. Any harm encounted through such use is the responsability of the user. This site's code was written by Spud The Destroyer for www.dead-donkey.com 2005+ | s3://commoncrawl/crawl-data/CC-MAIN-2020-45/segments/1603107869785.9/warc/CC-MAIN-20201020021700-20201020051700-00631.warc.gz | CC-MAIN-2020-45 | 957 | 4 |
https://stackoverflow.com/questions/52945609/pandas-dataframe-to-parquet-buffer-in-memory | code | The use case is the following:
- Read data from external database and load it into pandas dataframe
- Transform that dataframe into parquet format buffer
- Upload that buffer to s3
I've been trying to do step two in-memory (without having to store the file to disk in order to get the parquet format), but all the libraries I've seen so far, they always write to disk.
So I have the following questions:
- Wouldn't it be more performant if the conversion was done in-memory since you don't have to deal with I/O disk overhead?
- As you increase the concurrent processes converting files and storing them into disk, couldn't we have issues regarding disk such as running out of space at some points or reaching throughput limit of the disk ? | s3://commoncrawl/crawl-data/CC-MAIN-2019-39/segments/1568514574501.78/warc/CC-MAIN-20190921125334-20190921151334-00546.warc.gz | CC-MAIN-2019-39 | 740 | 8 |
https://lists.w3.org/Archives/Public/uri/1995Jun/0148.html | code | Date: Tue, 20 Jun 1995 20:47:47 -0400 Message-Id: <[email protected]> From: "Karen R. Sollins" <[email protected]> To: [email protected] Subject: thoughts on URN resolution Wow! You've all been incredibly busy typing while I was out of my office for 10 days. Hopefully, once I've waded through it all, I'll have some comments, but I'll try to limit them. I must admit that I haven't really gotten through all the mail yet, but on one of my many plane trips during this time, I wrote the attached note. I apologize if it sounds tutorial; it was intended for a less sophisticated audience than all of you. But, I thought the ideas were worth posting. As you can guess from the format, I've also submitted as an internet-draft, just for completeness. When I suggested to Larry that I wanted to talk about something like this in Stockholm, he kindly suggested that we should be talking about documents - so here's a document. He's right, of course; writing causes one to organize one's thoughts a little better. This doesn't mean that we necessarily should talk about it, but I think it would be a valuable conversation to have. There is no intention that it ever be anything more than a draft document for discussion purposes only. I also realize in reading as far as I have on the list that various pieces of these ideas have been brought up by various people. I don't claim that the ideas are new, just collated a bit. Karen ------------------------------ Network Working Group Karen R. Sollins INTERNET-DRAFT MIT/LCS <draft-sollins-urn-res-thoughts-00.txt> Expires: December 25, 1995 June 25, 1995 Thoughts on Standardizing URN Resolution Protocols Karen R. Sollins MIT/LCS [email protected] 1 Introduction The IETF is general a standards organization. As such, part of its task is to determine what should and what should NOT be standardized. In this note, I explore this question with respect to URN resolution, which the Uniform Resource Identifiers Working Group is now considering. But first, consider two conflicting goals in the standards process. From one perspective, there is strong motivation to maximize the scope of standards. This leads to a simple, uniformity by minimizing diversity, with the result that mechanism and implementation can probably be simplified and streamlined. At the other extreme is a path of no standardization in which there is nothing but diversity, with no commonality that can be assumed by clients of the service being considered. Generally, a middle ground is most effective but the question always must be where the boundary is. Additionally, when considering the problems of name resolution, it is important to remember that one can separate the problems or activities of name assignment from name resolution. In order to allow for names to be equally resolvable in perpetuity (or even just 100 years), it will be important not to burden the name asigner with the responsibility for a name resolution service. Since resources may move or evolve in unpredictable ways it is not reasonable even to expect that a particular service will necessarily guarantee to provide name resolution service for a particular namespace or piece of the namespace with a granularity larger than one. This may happen, but it should not be expect or legislated without understanding the serious consequences of severe limitations on the client community. With all this in mind, this note concentrates on the question of standardizing name resolution. 2 Partitioning the problem Now, consider name resolution. First we will address a partitioning of the problem of name resolution. This partitioning is not new, and has certainly been seen before in other standards activities with respect to name resolution, for example the DNS and X.500. In both cases, the universe of discourse is partitioned into clients and servers. In both cases, the interfaces or protocols for servers are clearly distinguished between that for clients to communicate with servers and that for servers to communicate among themselves. The client interfaces describe client requests for name resolution, while server interfaces describe both server requests for resolution and inter-server information addition, deletion, and modification, as well as perhaps cache maintenance and any other maintenance and distribution mechanisms for making translation information available among the servers. 2.1 Server Behavior In that context, consider URNs. URNs are intended to name an extremely broad set of resources, in fact, anything that anyone wishes to make public by naming in the Internet. Ubiquity and penetration as well as quantity are expected to be many orders of magnitude greater than the resources of either the DNS or X.500. In addition, there may be different sorts of performance requirements for different sorts of resources by different sorts of clients or customers. For example, for the human to send a piece of email, the location resolution might be adequately provided in 10 minutes, . while, if the human is asking for the locations of resources on the Schumacher-Levy 9 comet in realtime as part of some complex piece of research there may be a cascading set of resolution requirements, leading to each one needing to be orders of magnitude faster. In addition, there may be multiple answers to such a request from different kinds of sources, online data sets, published papers, or a computation service that might analyze observations on the fly. One conclusion one might draw from this is that there may be widely differing requirements or at least expectations for what one might call auxilliary characteristics of name resolution services. In some cases, it may be particularly useful that they be replicated widely. For example, telephone directories are distributed to every office and home with a telephone. As a first cut at causing email to be delivered to the location at which the recipient is receiving mail, one might consider distributing email address resolution information for everyone, for example, to be widely replicated. One reason this sort of information can be widely replicated is that it doesn't change frequently, so exceptional behavior (which is generally much more expensive) in the face of changes will not need to be utilized frequently. In contrast, information about the location of most satellites changes so frequently that a completely different set of mechanisms for managing and therefore finding that information will be needed. Another interesting characteristic of some kinds of resolution information is the need for it to be reliably correct. If recourse to an exceptional mechanism is prohibitatively expensive or simply unavailable, it becomes much more important that updates of information be reliably updated, so that they will not be lost. One might choose some atomic transaction mechanism with a great deal of redundancy, recognizing that it would be out of the question for the 200 million or more telephone books scattered around the country. What we are seeing here is that there will be a broad spectrum of interesting, useful, perhaps requisite behaviors from name resolution services with the conclusion that very different protocols will be required among the servers that are providing such characteristics of their services in some coordinated fashion. 2.2 Client-server behavior In contrast with this, consider the clients of the name resolution services. At their most basic level, they want name resolution. They have a URN and they want some location and access method information. In fact, for generality, it is desirable that applications not need to know exactly which sorts of name resolution services will be supporting them. This allows for portability and longevity of code. If an application needs an extremely fast response, it may be equally satisfied with a local, atomically updated reliable service, or the ubiquitous telephone book equivalent, if both have the same information and can respond equally quickly. In fact, the application may not care to know which sort was used. From the client or application's perspective, the name resolution service should handle requests for name resolution however it does it best, and for modularity the client shouldn't need to know what that is. Thus, in contrast with the server-server protocol(s), we can conclude that the client-server protocol for name resolution is a good candidate for standardization; there is a big payoff and probably little penalty. 3. Conclusion There is still a discussion that should be had within the URI Working Group about one versus many server-server protocols. I believe that it is important that we design an architecture that permits more than one, but there are strong arguments in favor of not spreading the efforts too thin. I suggest that as a community we should put our concerted efforts into no less than two, for a proof of concept and demonstration of the generality required and supportable, but keep the number quite small, perhaps no more than three. | s3://commoncrawl/crawl-data/CC-MAIN-2017-47/segments/1510934806419.21/warc/CC-MAIN-20171121151133-20171121171133-00517.warc.gz | CC-MAIN-2017-47 | 9,073 | 1 |
https://www.atlantasky.com/2017/12/ | code | On server: GZip and WP Super Cache
This happens when apache2 on the server is configured to GZip at page load time. This results in double-compression. Disabling WP Super Cache compression fixes the issue. Just let GZip compress the pages.
Uncheck this: Compress pages so they’re served more quickly to visitors. (Recommended)
You can leave it checked if you are using a 3rd party plugin for Gzip comperssion like GZip Ninja Speed Compression. Just uninstall the GZip plugin and let WP Super Cache do the compression.
You can also add this to your htaccess file to prevent this from happening again.
AddCharset utf-8 .html
AddCharset utf-8 .json
AddEncoding gzip .gz | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030334620.49/warc/CC-MAIN-20220925225000-20220926015000-00522.warc.gz | CC-MAIN-2022-40 | 668 | 8 |
http://stackoverflow.com/questions/4050078/are-oca-files-necessary-for-program-execution?answertab=active | code | system32 directory I saw an
.OCX file with a corresponding
I had thought
.OCA files are used only by Visual Basic. Are they therefore unnecessary for program execution and could be removed?
If they are unnecessary, why would there be an
.OCA in the
system32 folder in the first place? | s3://commoncrawl/crawl-data/CC-MAIN-2014-52/segments/1419447556379.119/warc/CC-MAIN-20141224185916-00011-ip-10-231-17-201.ec2.internal.warc.gz | CC-MAIN-2014-52 | 284 | 7 |
https://au.pinterest.com/explore/ancient-words/ | code | Devanagari. Even though a descendent of the Brahmi script, Devanagari has evolved into a highly cursive script. Many languages in India, such as Hindi and Sanskrit, use Devanagari and many more languages throughout India use local variants of this script. Genealogy: Brahmi. Location: South Asia. Time: 12th century CE to Present. Direction: Left to Right.
Don’t say a word, we have never needed them to communicate with one another. Whether it’s an energy or an ancient kinship between our souls, ..I don’t know. Bur whatever we have goes beyond language. Between us, ..even silence is extraordinary, ..even the stillness speaks. ~ Beau Taplin | s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886105927.27/warc/CC-MAIN-20170819220657-20170820000657-00323.warc.gz | CC-MAIN-2017-34 | 650 | 2 |
https://forums.civfanatics.com/threads/where-to-from-here.323943/page-2 | code | For your first point, I've noticed this bug too... I don't think it's AOD specific though. The work around is to not rush production when the screen comes up, but then drill down into the city, reselect the building, and hurry production there. It'll only buy the tools you need. As per the 2nd point, yeah I've noticed this too... I think it's a bug. Why would you ever build a newspaper when a telegraph is available at the same time? | s3://commoncrawl/crawl-data/CC-MAIN-2019-35/segments/1566027315681.63/warc/CC-MAIN-20190820221802-20190821003802-00531.warc.gz | CC-MAIN-2019-35 | 436 | 1 |
http://superuser.com/questions/622161/any-way-to-change-the-function-of-keyboard-button-particularly-right-ctrl | code | I want to change the functionality of my right ctrl to work as right click of the mouse.
Use AutoHotkey to remap as follows: RControl::RButton (can use RCtrl too).
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
2 years ago | s3://commoncrawl/crawl-data/CC-MAIN-2016-18/segments/1461860111581.11/warc/CC-MAIN-20160428161511-00031-ip-10-239-7-51.ec2.internal.warc.gz | CC-MAIN-2016-18 | 252 | 6 |
https://themuseumplatform.com/aboutus/case-studies/vocaleyes/ | code | The VocalEyes team approached us in September 2022 – they wanted to find a way of representing their Heritage Access 2022 research in an engaging and easy to use way on their existing website.
Although this wasn’t in any way a museum collection, we’ve got a pretty flexible way of working with fields and our schema, so we figured it’d be an ideal candidate for our “3rd party collections” plugin which enables any client with an existing WordPress website to use our collections functionality on their own site.
We also have some existing functionality to display Museum Platform story content on 3rd party sites, so Jeremy cunningly extended this in order to develop the country-wide map which shows access information for UK museums.
See the site at
The project entailed…
- Simple look and feel matching with existing site
- “Collections” integration
- Custom coding to fetch 2000+ website screenshots
- Use of our 3rd party plugin
- Ongoing support and development | s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100769.54/warc/CC-MAIN-20231208180539-20231208210539-00775.warc.gz | CC-MAIN-2023-50 | 986 | 10 |
https://pollyvote.com/en/2016/08/18/new-big-issue-index-model-clinton-and-trump-in-a-tossup/ | code | New Big-issue index model: Clinton and Trump in a tossup
The Big-issue model provided an updated prediction of the election result. The model currently forecasts a two-party vote share of 51.1% for Clinton and 48.9% for Trump.
Putting the results in context
As any other method, index models are subject to bias. As a result, a good strategy is to not be overly confident the results of an individual index model. Instead of relying on results from single index models, the best practice is to look at combined index models or, even better, the combined PollyVote forecast that includes forecasts from different methods, each of which draws upon different data.
Comparison to other index models
When compared to the average results of other index models Clinton performed worse with 2.6 percentage points, while Trump did better with 2.6 percentage points.
Results compared to the combined PollyVote prediction
Clinton has 2.0 percentage points less and Trump has 2.0 percentage points more when the results of the index model are compared to the combined PollyVote forecast. | s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296943698.79/warc/CC-MAIN-20230321131205-20230321161205-00722.warc.gz | CC-MAIN-2023-14 | 1,075 | 8 |
https://help.altair.com/hwdesktop/hc/hc_hdi_create_responses_sections.htm | code | |From the Responses notebook page, select the Others tab.
|Select the type of object on which to define a response. The list of objects of the selected type in the current model is displayed.
|Select an object from the list.
The list of TH variables of the selected type of object is displayed.
|To see an object, select it from the list and click the button.
|Activate one of the variables by clicking the corresponding radio button.
|Select a time filter (available choices are maximum, minimum, or final value along the simulation time).
|Enter a name in the corresponding text field.
The response is added to the list at the top of the Responses page.
The object is automatically saved in time history. | s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296816879.72/warc/CC-MAIN-20240414130604-20240414160604-00411.warc.gz | CC-MAIN-2024-18 | 706 | 10 |
https://github.com/cgars/GCA-Web | code | G-Node Conference Application Suite - Web Application
This project provides an online application for the submission and management of abstracts to conferences in the scientific community (focus life sciences).
- management of multiple individual conferences
- admin based conference workflow from open, active to closed
- submission and editing of abstracts for open conferences
- abstract workflow on a user/admin based system from submitted to accepted/rejected
- abstract viewer for open and closed conferences
The current version is stable.
A previous version of the application can be found in the "oldstable" branch.
Please find the latest release notes in our wiki release notes section. | s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100286.10/warc/CC-MAIN-20231201084429-20231201114429-00814.warc.gz | CC-MAIN-2023-50 | 695 | 10 |
http://www.fx114.net/qa-103-167221.aspx | code | This page describes how to install and uninstall JDK 8 for OS X computers.
This page has these topics:
See "JDK 8 and JRE 8 Installation Start Here" for general information about installing JDK 8 and JRE 8.
See "OS X Platform Install FAQ" for general information about installing JDK 8 on OS X.
Observe the following requirements:
Any Intel-based computer running OS X 10.8 (Mountain Lion) or later.
Note that installing the JDK on OS X is performed on a system wide basis, for all users, and administrator privileges are required. You cannot install Java for a single user.
Installing the JDK also installs the JRE. The one exception is that the system will not replace the current JRE with a lower version. To install a lower version of the JRE, first uninstall the current version as described in "Uninstalling the JRE".
When you install the Java Development Kit (JDK), the associated Java Runtime Environment (JRE) is installed at the same time. The JavaFX SDK and Runtime are also installed and integrated into the standard JDK directory structure.
Depending on your processor, the downloaded file has one of the following names:
version is 6 or later.
Download the file.
Before the file can be downloaded, you must accept the license agreement.
From either the Downloads window of the browser, or from the file browser, double click the
.dmg file to launch it.
A Finder window appears containing an icon of an open box and the name of the
Double click the package icon to launch the Install app.
The Install app displays the Introduction window. | s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267159193.49/warc/CC-MAIN-20180923095108-20180923115508-00393.warc.gz | CC-MAIN-2018-39 | 1,551 | 18 |
https://www.htmlelements.com/services/ | code | Do you need software development help? As a leader in front-end development, we have a team of professionals who can assist you with solving tough technical challenges. We deliver top-quality solutions using the latest technologies. Our services are used by many of the Fortune 500 companies.
- SDK Customization and Adaptation to Specific Needs
- Front-End Web Development
- Responsive Web and Mobile Apps development
- Full Stack Software Solutions
ASP.NET MVC Core
We will work closely with your team from the early stages of the project to draft requirements and frame the overall project objectives.
We work at a fast pace, deliver quickly, collect feedback and iterate.
Throughout the project, some of the requirements and priorities will change and evolve. We will adapt to these changes and collaborate with your team to meet the latest requirements, goals and objectives.
If you need consultation or advice, our team can help you with top quality expert help.
Our services vary from short Skype and web meeting consultations, to in-person and on-site services.
We can help with anything from performance & scalability optimizations, code reviews, and integration advice, to full project architecture consultations and feasibility assessments. | s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679515260.97/warc/CC-MAIN-20231211143258-20231211173258-00846.warc.gz | CC-MAIN-2023-50 | 1,251 | 12 |
https://communities.intel.com/thread/8024 | code | I suppose that you are aware that unfortunately Intel do not Intel and Non-Intel Raid controllers on the Intel Desktop Boards.
Nevertheless, i have learnt from some users on this community that if you are lucky it may work. :-)
Verify if these settings are enabled in the BIOS: this will allow you to get the prompt to enter the RAID utility setup.
1) During boot, enter the BIOS setup by pressing F2
2) Select the "Security" tab at the top
3) Select "Expansion Card Text" and set <Enable>
4) Save changes and exit
Now regarding the PCIex16, i have noticed this on many intel boards, if there is an expansion card on the x16 slot, it does not boot at all. I have tried with different card like network adapter, raid controller card etc.
I donot know if there is any other settings for this, may be someone else can help on this.
Have you tried different slot to see if it works at least?
All the best, | s3://commoncrawl/crawl-data/CC-MAIN-2018-47/segments/1542039746061.83/warc/CC-MAIN-20181119171420-20181119193420-00210.warc.gz | CC-MAIN-2018-47 | 901 | 11 |
https://www.lavivienpost.com/how-chatgpt-works-architecture-illustrated/ | code | In this post, OpenAI’s ChatGPT architecture and its Large language models GPT-3, InstructGPT, ChatGPT, and GPT-4 are explained.
Table of Content
- GPT-3: Introduce Large Language Model
- InstructGPT: Reinforcement learning with human feedback
- ChatGPT: Utilization is the king
- GPT-4: Introduce Artificial Generative Intelligence (AGI)
- OpenAI Timeline
1. GPT-3: Introduce Large Language Model
The transformer model was introduced in 2017. Since then, OpenAI pushed out GPT-1 and GPT-2 in 2018 and 2019 respectively based on the transformer model.
From PLM to LLM
GPT-2 is a Pre-trained Language Model (PLM), which is to pre-train transformer models over large-scale corpora. PLMs show strong capabilities in solving various Natural Language Processing (NLP) tasks.
Fast forwarding to 2020, the capacity of transformer language models had increased substantially, from 100 million parameters to 175 billion parameters. OpenAI named the model with 175 B parameters “GPT-3”. The research community coined the term Large Language Models (LLMs)for the PLMs of significant size, e.g., containing tens or hundreds of billions of parameters, trained on massive text data.
GPT-3 achieves strong performance on many NLP tasks, including translation, question-answering, reading comprehension, textual entailment, and many others.
Researchers have found that model scaling can lead to performance improvement. When the parameter scale exceeds a certain level, they show special abilities that are not present in small-scale language models.
Scaling law refers to scaling PLM (both model size and data size) often leads to an improved model capacity on downstream tasks. These large-sized PLMs display different behaviors from smaller PLMs and show surprising abilities (called “emergent abilities”) in solving a series of complex tasks.
Emergent abilities of LLMs are formally defined as “the abilities that are not present in small models but arise in large models,” which is one of the most distinctive features that distinguish LLMs from previous PLMs. It also introduces a notable characteristic when emergent abilities occur: performance rises significantly above random when the scale reaches a certain level.
Despite the progress and impact, the underlying principles of LLMs are still not well explored. It is still mysterious why emergent abilities occur in LLMs, instead of smaller PLMs. Some abilities, e.g., in-context learning, are unpredictable according to the scaling law.
By pre-training on a mixture of text data from diverse sources, LLMs can acquire a broad scope of knowledge and may exhibit a strong generalization capacity. When mixing different sources, one needs to carefully set the distribution of pre-training data, since it is also likely to affect the performance of LLMs.
According to GPT-3 paper, GPT-3’s datasets include CommonCrawl, WebText2, Books1, Books2, and Wikipedia. CommonCrawl is one of the largest open-source web crawling databases, containing a petabyte-scale data volume, which has been widely used as training data for existing LLMs. The English-only filtered versions of Wikipedia are widely used in most LLMs. As for Books1 and Books2, they are much larger than BookCorpus used in GPT-1 and GPT-2.
Although it is not showing in GPT-3 datasets, code is added as part of the datasets as well. The code data is from existing work that crawls open-source licensed codes from the Internet. Two major sources are public code repositories under open-source licenses, e.g., GitHub, and code-related question-answering platforms, e.g., StackOverflow.
Given a more diverse knowledge base, a model shows the capability to perform an even wider range of tasks.
In general, the existing LLMs can be categorized into encoder-decoder architecture and newly decoder-only architecture.
The original Transformer model is built on the encoder-decoder architecture, which consists of two stacks of Transformer blocks as the encoder and decoder respectively. The encoder adopts stacked multi-head self-attention layers to encode the input sequence for generating its latent representations, while the decoder performs cross-attention on these representations and autoregressively generates the target sequence.
Since most language tasks can be cast as the prediction problem based on the input, the decoder-only LLMs are potentially advantageous to implicitly learn how to accomplish the tasks in a unified way. GPT-2 and GPT-3 use a casual decoder architecture (see the diagram below). In GPT-3, there are 96-layer transformer decoders. When mentioning “decoder-only architecture,” it often refers to the casual decoder architecture.
Models of this scale typically require thousands of GPUs or TPUs to train. To support distributed training, several optimization frameworks have been released to facilitate the implementation and deployment of parallel algorithms.
Courtesy of OpenAI
2. InstructGPT: Reinforcement learning with human feedback
LLMs have shown remarkable capabilities in a wide range of NLP tasks. However, these models may sometimes exhibit unintended behaviors, e.g., fabricating false information, pursuing inaccurate objectives, and producing harmful, misleading, and biased expressions. For LLMs, the language modeling objective retrains the model parameters by word prediction while lacking the consideration of human values (helpful, honest, harmless) or preferences. To avert these unexpected behaviors, human alignment has been proposed to make LLMs act in line with human expectations.
In early 2022, InstructGPT was introduced to address the above problem. OpenAI designed an effective tuning approach that enables LLMs to follow the expected instructions, which utilizes the technique of Reinforcement Learning with Human Feedback (RLHF). It was to incorporate humans in the training loop with elaborately designed labeling strategies.
This technique used human preferences as a reward signal to fine-tune LLMs. OpenAI hired a team of 40 contractors to label the data, based on their performance on a screening test. Then trained a reward model (RM) on this dataset to predict which model output labelers would prefer. Finally, this RM was used as a reward function and fine-tuned the supervised learning baseline to maximize this reward using the Proximal Policy Optimization (PPO) algorithm.
InstructGPT generates more appropriate outputs, and more reliably follows explicit constraints in the instruction. Outputs from the 1.3B parameter InstructGPT are preferred to outputs from the 175B GPT-3, despite having 100x fewer parameters. Moreover, InstructGPT shows improvements in truthfulness and reductions in toxic output generation while having minimal performance regressions on public NLP datasets.
The RLHF system comprises three key components: a pre-trained LM to be aligned, a reward model learning from human feedback, and a Reinforcement Language algorithm training the LM.
Courtesy of OpenAI
There are 3 steps in RLHF:
Step 1: Supervised fine-tuning (SFT)
Collect demonstration data, and train a supervised policy. The labelers provide demonstrations of the desired behavior on the input prompt distribution. Then the team fine-tunes a pretrained GPT-3 model on this data using supervised learning.
Step 2: Rewording model training(RM)
Collect comparison data, and train a reward model. The team collects a dataset of comparisons between model outputs, where the labelers indicate which output they prefer for a given input. Then trains a reward model to predict the human-preferred output.
Step 3: Reinforcement Learning fine-tuning (RL)
Optimize a policy against the reward model using PPO. The team uses the output of the RM as a scalar reward. Then fine-tunes the supervised policy to optimize this reward using the Proximal Policy Optimization PPO algorithm.
Steps 2 and 3 are iterated continuously; more comparison data is collected on the current best policy, which is used to train a new RM and then a new policy. In practice, most of the comparison data comes from supervised policies, with some coming from PPO policies.
3. ChatGPT: Utilization is the king
In late 2022, The launch of ChatGPT attracted widespread attention from society. ChatGPT is a powerful AI chatbot developed based on LLMs and presents an amazing conversation ability with humans.
ChatGPT is the outcome of the continuous evolvement of previous LLMs, e.g., GPT-3 and InstructGPT. It is a product that is actually helpful to humans.
Prompting has become the prominent approach to using LLMs. In-context learning (ICL), a special prompting form, is first proposed along with GPT-3. ICL uses a formatted natural language prompt, consisting of the task description and a few task examples as demonstrations. Since the performance of ICL heavily relies on demonstrations, it is an important issue to properly design them as part of the development in GPT-3.
ChatGPT applies interactive prompting mechanisms, e.g., through natural language conversations, to solve complex tasks. These have been demonstrated to be very useful.
ChatGPT shows the capabilities in a wide range of applications, such as dialogue systems, text summarization, machine translation, code generation, etc. Here are some major capabilities of NLP tasks in ChatGPT.
ChatGPT also shows a feasible way to learn from existing LLMs for incremental development or experimental study. The incremental tasks include writing a summary of a text, answering factual questions, composing a poem based on a given rhyme scheme, or solving a math problem that follows a standard procedure.
Thanks to RLHF from its predecessor InstructGPT, ChatGPT shows a strong alignment capacity in producing high-quality, harmless responses, e.g., rejecting to answer insulting questions. Sometimes it gives the impression that you are talking to a well-trained customer service representative.
You may also notice ChatGPT’s user interface is more attractive than other similar products, such as Bing’s chat, Google’s Bard, and Meta’s Blender Box 3.
Unlike Meta’s Blender box3 or Microsoft’s Bing chat, ChatGPT does not use the format of messaging, left and right dialog boxes. Instead, ChatGPT is formatted as question-and-answer fields. In this format, users get longer and more formal answers.
Unlike Google’s Bard, which displays the answer all at once, ChatGPT uses animation to display words by words. It gives an illusion that somebody is thinking and typing.
All these details make ChatGPT an outstanding and well-received product.
ChatGPT also supports the use of plugins, which can equip LLMs with broader capacities beyond language modeling. For example, the web browser plugin enables ChatGPT to access fresh information. By incorporating the extracted relevant information into the context, LLMs can acquire new factual knowledge and perform better on relevant tasks.
4. GPT-4: Introduce Artificial Generative Intelligence (AGI)
The latest model from OpenAI is GPT-4. GPT-4 is a large-scale, multimodal model which can accept image, and text inputs, and produce text outputs. GPT-4 exhibits human-level performance on various professional and academic benchmarks.
OpenAI did not give out GPT-4 details about the architecture, including model size, hardware, training compute, dataset construction, training method, etc. However, GPT-4 was certainly trained using an unprecedented scale of computing and data.
GPT-4 outperforms ChatGPT
GPT-4 demonstrates remarkable capabilities in a variety of domains and tasks, including abstraction, comprehension, vision, coding, mathematics, medicine, law, understanding of human motives and emotions, and more. It is also able to combine skills and concepts from multiple domains with fluidity, showing an impressive comprehension of complex ideas.
Courtesy of OpenAI
GPT’s performance in exams often vastly surpasses prior models ChatGPT. Meanwhile, To improve the model safety, RLHF is continuously carried out in GPT-4. GPT-4 significantly reduces hallucinations relative to previous ChatGPT, which have themselves been improving with continued iteration.
GPT-4 has also introduced a new mechanism called predictable scaling built on a deep learning stack, enabling the performance prediction of large models with a much smaller model, which might be quite useful for developing LLMs.
GPT-4 archives AGI
GPT-4 exhibits more general intelligence than previous AI models. GPT-4 approaches human-level performance in a variety of challenging tasks across various fields and is considered “an early version of an Artificial General Intelligence system”. It is the first step towards a series of increasingly generally intelligent systems.
More work to do
GPT-4 still has many limitations. In some areas, GPT-4 does not perform well. In particular, it still suffers from some of the well-documented shortcomings of LLMs such as the problem of hallucinations or making basic arithmetic mistakes.
LLMs are also likely to produce toxic, fictitious, or harmful content. It requires effective and efficient control approaches to eliminate the potential risks of the use of LLMs, such as bias, disinformation, over-reliance, privacy, cybersecurity, proliferation, and more.
Due to the limitations of the next-word prediction paradigm, which manifest as the model’s lack of planning, working memory, ability to backtrack, and reasoning abilities. The model relies on a local and greedy process of generating the next word, without any global or deep understanding of the task or the output. Thus, the model is good at producing fluent and coherent texts but has limitations with regard to solving complex or creative problems that cannot be approached in a sequential manner.
A lot remains to be done to create a system that could qualify as a complete AGI, including the possible need to pursue a new paradigm that moves beyond next-word prediction.
OpenAI invites many experts in domains related to AI risks to evaluate and improve the behaviors of GPT-4 when encountering risky content.
5. OpenAI Timeline
|GPT-1, A Generative Pre-trained Transformer (GPT)
|GPT-2, A Pre-trained language model (PLM)
|GPT-3, A Large language model (LLM)
|WebGPT, A browser-assisted question-answering with human feedback
|InstructGPT, Reinforcement learning with human feedback(RLHF)
|ChatGPT, A well received product
|GPT-4, First step to Artificial General Intelligence (AGI) capabilities
ChatGPT’s datasets are a mixture of text data from diverse sources, including CommonCrawl, WebText2, Books1, Books2, Wikipedia, and code from GitHub and StackOverflow.
ChatGPT’s Reinforcement Learning with Human Feedback(RLHF) has 3 steps: Supervised fine-tuning, Rewording model training, and Reinforcement Learning fine-tuning. The first two steps have humans involved. The last step uses the Proximal Policy Optimization (PPO) algorithm in reinforcement learning.
ChatGPT’s architecture is built on the Transformer model, which is an encoder-decoder architecture. Since most language tasks can be cast as the prediction problem based on the input, ChatGPT (GPT-2, GPT-3) changes to decoder-only architecture with many more layers.
Unlike Google’s Bard, which displays the answer all at once, ChatGPT uses animation to display words by words. It gives an illusion that somebody is thinking and typing. People like this kind of “thinking and action” mode. | s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947473824.13/warc/CC-MAIN-20240222161802-20240222191802-00899.warc.gz | CC-MAIN-2024-10 | 15,413 | 82 |
http://www.hackint0sh.org/iphone-developer-exchange-9/printfriendly-2-0-beta-support-dev-iphone-isnt-recognized-37279.htm | code | [2.0] Beta Support Dev - iPhone isn't recognized
I was accepted into the developer program and installed the 2.0 beta today. Everything went on without a hitch, until all of a sudden I got the pink screen with a connect to itunes logo. When I connected to itunes it appeared as if the iphone was regularly connected, showing the synch tabs, the music tab, the playlists, etc, even while the iphone still had a pink screen. Xcode wasn't giving me any feedback either, The tab under my iphone info (where you can put provisions, etc) was blank.
I figured maybe I should just try restoring to 1.1.4 with itunes, but that only messed things up further and iTunes stopped recognizing the iphone. So, I figured maybe I should use pwnage tool to restore everything back to normal and start over. Sadly, I think this has caused even more problems because now xcode still won't recognize my phone, and iTunes will only recognize it when it's in DFU mode. I want to get back to my developer software so I can keep testing applications, as there shouldn't be any stupid need to go through this mess.
Does anyone have a recommendation as to what process I should take to get the OFFICIAL 2.0 back onto my system and everything running hunky-dory so I can play with my xcode apps?
I really appreciate the feecback.
EDIT: Oh, and, since I used Ipwner, every time I start up my iphone I get the pineapple so I don't see how I could take it to the Apple store in this state.... Argh! | s3://commoncrawl/crawl-data/CC-MAIN-2014-10/segments/1394010527022/warc/CC-MAIN-20140305090847-00092-ip-10-183-142-35.ec2.internal.warc.gz | CC-MAIN-2014-10 | 1,467 | 6 |
http://www.linuxquestions.org/questions/linux-software-2/sounds-like-a-problem-50324/ | code | Sounds like a problem!
LOL, that was a stupid pun in the subject and I'm sorry for that. Well, I have galeon setup and I thank everyone who tried to help me with setting up Java for it. For some reason, what I was doing was right, but it just magically worked one outa the 50 times that I tried installing it. Anyways, I was all happy that java was installed and wanted to play pool, then it hit me! I GOT NO SOUND IN JAVA, NOR IN FLASH, AND NOT EVEN AMSN! Why? I got XMMS working fine, I got KDE sounds working fine, what's wrong with the Java, Flash, and Amsn sound? :S Has anyone experienced such a problem? | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171775.73/warc/CC-MAIN-20170219104611-00580-ip-10-171-10-108.ec2.internal.warc.gz | CC-MAIN-2017-09 | 610 | 2 |
https://bugs.mojang.com/browse/MC-11600 | code | Not sure if this is a related bug or not, but...
Tested in 1_5 PR.
I have edited the armor, helm, added a shadow to it (with partial transparency)
so if you use the helm in game, it will cover the players face with shadow, but not fully hide it = there is an opaque background.
everything works fine until you press F1 for screenshoting.
the shadow gets rendered opaque. | s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590347385193.5/warc/CC-MAIN-20200524210325-20200525000325-00569.warc.gz | CC-MAIN-2020-24 | 370 | 6 |
https://pentestools.com/xsrf-csrf-vulnerability-scanner-xsrf-probe/ | code | XSRF (CSRF) Probe is an advanced Cross Site Request Forgery Audit Toolkit equipped with Powerful Crawling and Intelligent Token Generation Capabilities.
An XSRF (CSRF) Scanner Equipped with Powerful Crawling Engine and Intelligent Token Generator.
Some Features Of XSRF (CSRF) Probe:
- Has a powerful crawler which features continuous crawling and scanning.
- XSRFProbe has absolute support for both GET and POST requests.
- Out of the box support for custom cookie values and generic headers.
- Can intelligently generate crafted tokens for different types of parameters.
- Can effectively crawl and hunt out hidden parameters
- Submits forms in the normal values as well as with crafted token.
- Rare chances of false positives occuring during scan.
- Follows a redirect when there is a 302 response.
- Generates PoCs for both exploitable and non-exploitable CSRFs.
- Has a user-friendly interaction environment.
- Everything is automated on demand.
The typical workflow of this scanner is :-
- Spiders the target website to find all pages.
- Finds all types of forms present on the each page.
- Hunts out hidden as well as visible parameter values.
- Submits each form with normal tokens & parameter values.
- Generates random token strings and sets parameter values.
- Submits each form with the crafted tokens.
- Finds out if the tokens are sufficiently protected.
- Generates custom proof of concepts after each successful bug hunt.
Do not use this tool on a live site!
It is because this tool is designed to perform all kinds of form submissions automatically which can sabotage the site. Sometimes you may screw up the database and most probably perform a DoS on the site as well.
Test on a disposable test site!
The scanner has the following drawbacks presently:
- Normally the scanner assumes that every form has a hidden/visible parameter and token field.
- Changing or removing that token field usually causes a 403 Forbidden response.
- Spidering is restricted to domains of startpages (so doesn’t work with all domains). 🙁
➲ Clone the script and launch it.
git clone https://github.com/theInfectedDrake/XSRFProbe.git cd XSRFProbe
➲ Install the dependencies.
pip install -r requirements
➲ Launch the script.
➲ Enter the website target.
➲ Let the scanner load up.
➲ Keep track of PoCs which may appear (if a bug exists). | s3://commoncrawl/crawl-data/CC-MAIN-2018-43/segments/1539583510754.1/warc/CC-MAIN-20181016134654-20181016160154-00040.warc.gz | CC-MAIN-2018-43 | 2,349 | 38 |
http://gamedev.stackexchange.com/questions/58038/particle-trajectory-smoothing-where-to-do-the-simulation | code | I have a particle system in which I have particles that are moving to a target and the new targets are received via network. The list of new target are some noisy coordinates of a moving target stored in the server that I want to smooth in the client.
For doing the smoothing and the particle I wrote a simple particle engine with standard euler integration model.
So, my pseudo code is something like that:
# pseudo code class Particle: def update(): # do euler motion model integration: # if the distance to the target is more than a limit # add a new force to the accelleration # seeking the target, # and add the accelleration to velocity # and velocity to the position positionHistory.push_back(position); if history.length > historySize : history.pop_front() class ParticleEngine: particleById = dict() # an associative array # where the keys are the id # and particle istances are sotred as values # this method is called each time a new tcp packet is received and parsed def setNetTarget(int id, Vec2D new_target): particleById[id].setNewTarget(new_target) # this method is called each new frame def draw(): for p in particleById.values: p.update() beginVertex(LINE_STRIP) for v in p.positionHistory: vertex(v.x, v.y) endVertex()
The new target that are arriving are noisy but setting some accelleration/velocity parameters let the particle to have a smoothed trajectories.
But if a particle trajectory is a circle after a while the particle position converge to the center (a normal behaviour of euler integration model).
So I decided to change the simulation and use some other interpolation (spline?) or smooth method (kalman filter?) between the targets. Something like:
switch( INTERPOLATION_MODEL ): case EULER_MOTION: ... case HERMITE_INTERPOLATION: ... case SPLINE_INTERPOLATION: ... case KALMAN_FILTER_SMOOTHING: ...
Now my question: where to write the motion simulation / trajectory interpolation? In the Particle? So I will have some Particle subclass like ParticleEuler, ParticleSpline, ParticleKalman, etc..? Or in the particle engine? | s3://commoncrawl/crawl-data/CC-MAIN-2016-30/segments/1469257823670.44/warc/CC-MAIN-20160723071023-00103-ip-10-185-27-174.ec2.internal.warc.gz | CC-MAIN-2016-30 | 2,056 | 9 |
https://issues.apache.org/jira/browse/MATH-599 | code | Apache Commons Math currently has a SecantSolver. It is unclear exactly what algorithm this solver implements. It states: "The algorithm is modified to maintain bracketing of a root by successive approximations. Because of forced bracketing, convergence may be slower than the unrestricted Secant algorithm. However, this implementation should in general outperform the Regula Falsi method." The Regula Falsi method is exactly the Secant method modified to maintain a bracketed solution. It is therefore unclear what other modifications were done to make it 'better' than the Regula Falsi method.
Besides the Secant and Regula Falsi methods, several other Secant-based root-finding algorithms exist, such as the the Illinois method, and the Pegasus method. All 4 are well-known, publisched algorithms.
I created a patch, which changes the following:
- Removed SecantSolver root-finding algorithm.
- Implemented new Secant-based root-finding algorithms: SecantSolver, RegulaFalsiSolver, IllinoisSolver, and PegasusSolver.
- Introduced BracketedSolution interface and AllowedSolutions enumeration, to control allowed solutions (under-approximations and over-approximations) for bracketed root-finding algorithms. Implemented for RegulaFalsiSolver, IllinoisSolver, and PegasusSolver.
- Fixed documentation of BaseUnivariateRealSolver.solve methods, such that documentation order of arguments matches the order of the actual arguments.
Note that the original SecantSolver was removed, and replaced by a root-finding algorithm that actually implements the Secant root-finding algorithm. As such, existing code using the SecantSolver is not backwards compatible. That is, even though the new SecantSolver does implement the same interfaces, the root-finding solutions may differ. In particular, the new SecantSolver does not maintain a bracketed solution, and does not guarantee convergence.
I added unit tests, and I did a build, including checkstyle checking. I did not fix all checkstyle warnings though, as I consider some of them false positives. | s3://commoncrawl/crawl-data/CC-MAIN-2019-22/segments/1558232255182.37/warc/CC-MAIN-20190519221616-20190520003616-00363.warc.gz | CC-MAIN-2019-22 | 2,045 | 9 |
https://forums.macrumors.com/threads/where-to-start-learning-c.706012/ | code | I'm a fairly efficient and well-rounded Mac and iPhone user and I know HTML (if you really call that 'programming') and would really like to start learn how to program apps. From what I've read, learning C is where I should start in order to be able to program on the Mac and iPhone. I found this book "Learn C on the Mac", and it seems like a good starting point for someone completely new to programming. What do you guys think? Any other suggestions? | s3://commoncrawl/crawl-data/CC-MAIN-2018-43/segments/1539583509996.54/warc/CC-MAIN-20181016030831-20181016052331-00415.warc.gz | CC-MAIN-2018-43 | 453 | 1 |
https://forum.openframeworks.cc/t/ofxgstreamer-windows-howto/28198 | code | I found it quite difficult to get ofxGstreamer to run in Windows 7, Visual Studio 2015. Although now that it works the steps seem quite logical, I decided to share my insight, as it might save someone else some time.
1) Windows - install gstreamer.
- You get the installers here. You will need the base installer (like gstreamer-1.0-x86-1.6.4.msi) and the devel installer (like gstreamer-1.0-devel-x86-1.6.4.msi). For 64bit you need the appropriate ones (x86_64).
- I used Version 1.6.4. as 1.7.1 crashed on my system when decoding h264. But (installer!) it is easy to install and uninstall in case you want to try another version.
- please install the complete package, otherwise it might not work later on with openFrameworks.
- On my system the installer wanted to use the second disk for the installation path. To prevent confusion I suggest to change this: In the installer click “custom” and validate the path. If neccessary change it to default (C:\gstreamer). You can then go back and click “complete”.
You then have installed gstreamer on your system. The installer took care of the path variable. You can try if it works by opening a command prompt and typing sth. like “gst-play-1.0 YOURMOVIE.mp4”.
2) openFrameworks- use gstreamer in a vs project.
There is an addon “ofxGStreamer” (Thanks Arturo!). It is a bit of a special case, as it has no source code. It provides a make configuration (addon_config.mk) and an example code to call the player in a project. There is no use to include the addon in vs as vs does not respect the make configuration of the addon. So to use the addon, we do not have to include it in our project as we are used to. Instead we have to check in addon_config.mk what has to be done - and then do this manually in vs.
So open addon_config.mk and check for the section “vs”.
ADDON_INCLUDES: Add the paths found here to project properties / C++ / Additional include directories.
I had problems with system PATH variables, so I resolved the paths, getting something like (for 32bit*):
ADDON_SOURCES: Add the files noted here to your project by right-clicking the src-Folder, then Add / existing Item.
ADDON_LIBS: Add the Add the files found here to project properties / Linker / Input / Additional Dependencies. Again I resolved the paths for I had problems with system PATH variables. You can seperate path and files, leading to something like:
project properties / Linker / General/ Additional Library Directories
project properties / Linker / Input / Additional Dependencies
gstreamer-1.0.lib; gstapp-1.0.lib; gstvideo-1.0.lib; gstbase-1.0.lib; gstnet-1.0.lib; gstaudio-1.0.lib; gio-2.0.lib; pangowin32-1.0.lib; pangocairo-1.0.lib; gdk_pixbuf-2.0.lib; pango-1.0.lib; cairo.lib; gobject-2.0.lib; gmodule-2.0.lib; gthread-2.0.lib; ffi.lib;intl.lib; glib-2.0.lib; %(AdditionalDependencies)
Note that the examples above are on my system. Of course you might have additional settings.
3) .dll trouble
When runnig the program I had multiple errors connected to libstdc+±6.dll. This llibrary might be present multiple times on your system. And you need the correct one to be used. There is multiple solutions to this, but this is another, quite big, topic. The only solution that worked failsafe for me, was to include the correct dll in the bin folder of my openFrameworks app. You find it in C:\gstreamer\1.0\x86\bin (for 32bit*).
4) bit trouble / .dll trouble #2
I had some problems with 32 and 64 bit version of the same App. It probably is wise to decide and then stick to one. If you mingle you might get problems with dlls for the wonrg version being still in cache and stuff. Check if PATH variable has included the path for your gstreamer binaries If should be one of the following and it should be the correct one, according to if you chose 32bit or 64bit.
*for 64 bit you just use the folder gstreamer\1.0\x86_64 instead of gstreamer\1.0\x86. And of course you have to have the 64bit version of gstreamer and gstreamer-devel installed.
have a good day! | s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656104354651.73/warc/CC-MAIN-20220704050055-20220704080055-00666.warc.gz | CC-MAIN-2022-27 | 4,017 | 24 |
https://feedback.oneplacesolutions.com/forums/583156-oneplacemail-for-outlook-app/suggestions/39787792-authentication-updates | code | The latest changes in Google Chrome handling of cookies has resulted in a change to the way we can authenticate when using the OnePlaceMail App.
We're working to align the authentication of the app with these updates.
Part of these changes will include the need for re-consent of permissions by the OnePlaceMail App. Administrators will be able to proactively re-consent for their organization so that users are not impacted or prompted to re-consent.
Please vote/subscribe to this announcement to keep track of changes and progress.
OnePlace Solutions Team | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572870.85/warc/CC-MAIN-20220817062258-20220817092258-00741.warc.gz | CC-MAIN-2022-33 | 557 | 5 |
https://www.tr.freelancer.com/projects/php-javascript/new-features-added-web-based/ | code | I have an existing script that monitors certain web address url's. I am wanting to add in some extra features to this monitor (I can provide URL in private message). These features are...
- Email notifications. I am wanting this script to have email notifications to have an email sent to admin (email that I specify) whenever something changes in one of the url's that it is monitoring.
- Setup cron job to have script update every 60 minutes
- Display 2 more sections in the monitor row (To scrape the url that it is monitoring and grab 2 results on the page and display it on the monitor. You will understand better once I show you the URL in private to the monitor on my server).
- Export results in CSV format. I want the script to have a checkmark box to each url that it is monitoring. I want it so when I check that box, it will add that to the CSV file that i will export.
- Feature to not have duplicates in the monitor - Whenever a duplicate entry is submitted, it will display an error message saying its already in there and will not add it.
- Feature to "edit" the url that is being monitored. This is a simple feature that needs to be added where I can edit the url that is being monitored. There is only a feature to add or delete right now. Just need the edit in there. Pretty simple.
I am looking for someone that can start right away on this. Everything is done on my web host and in PHP.
12 freelancer bu iş için ortalamada 195$ teklif veriyor
We have a great expertise in web based development. We can deliver you quality and complete customer satisfaction. Looking forward to work with you.
Hello, Hope you are doing [url removed, login to view] have gone through from your requirements about script modification or [url removed, login to view] can deliver web based script exactly as you want with same [url removed, login to view] i ask for your scrip Daha fazlası | s3://commoncrawl/crawl-data/CC-MAIN-2017-51/segments/1512948514250.21/warc/CC-MAIN-20171212021458-20171212041458-00157.warc.gz | CC-MAIN-2017-51 | 1,891 | 11 |
http://eaudulevant.de/?id=forum/games-26/game-crashing-while-launching-help-4679747/ | code | So after i reinstalled my windows a few week ago i got this weird issue. First when i tried to start my game it had missing dlls, now i have fixed that issue but another issue has popped up where my game crashes in about 5 seconds while launching, i dont get an error either. I realy need help with this i’ve had this problem for weeks now
what is your op sys , if it is windows 10 should the game be able to run , I have some very old games that run perfect on 10 but I also have some that I had to install the launcher using compatability mode.
to give a better reply you need to give more details such as machine spec and games your trying to run. | s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578529898.48/warc/CC-MAIN-20190420160858-20190420182858-00329.warc.gz | CC-MAIN-2019-18 | 652 | 3 |
http://www.dzone.com/links/lessons_learned_in_a_year_of_freelancing.html | code | Previously, we wrote about setting up a Windows environment to log JSON formatted logs using... more »
C# 6 is the version of C# that ships with VS 2015 Preview. The philosophy behind this version... more »
In this example we shall show you how to make use of Java Sorted Map. A SortedMap is a Map... more »
JEE Main 2015 normalization and calculation of Class XII percentile post presents in depth... more »
With Visual Studio 2015 preview we can tryout new project template for Cordova. Hybrid Mobile... more »
When you want to know and learn about the functions of AVR, PIC and ARM development board, you... more »
Discover best practices and the most useful tools for building the ideal integration architecture. | s3://commoncrawl/crawl-data/CC-MAIN-2014-49/segments/1416400379190.66/warc/CC-MAIN-20141119123259-00129-ip-10-235-23-156.ec2.internal.warc.gz | CC-MAIN-2014-49 | 722 | 7 |
https://discuss.streamlit.io/t/problems-with-ffmpeg/40062 | code | Hi there, i´ve been for a couple of hours trying to create a simple app that requires ffmpeg but every single time i get FileNotFoundError: [Errno 2] No such file or directory: ‘ffmpeg’ I´ve tried everything, installing via pip, adding a packages.txt file and no clue.
Link for the repo if any clue
Whisper depends on ffmepg
For whisper to work, you only need
ffmpeg in your
packages.txt file. Remove everything else related to
ffmpeg from your
main.py files, you don’t use it and you don’t need it.
Aside, if you plan to deploy on streamlit cloud, no whisper model beyond
small will work, because these models have a massive memory footprint. | s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224649741.26/warc/CC-MAIN-20230604093242-20230604123242-00163.warc.gz | CC-MAIN-2023-23 | 653 | 10 |
http://www.edugeek.net/forums/office-software/51181-word-2007-save-2003-default.html | code | I know this may have been answerd before. I have just installed Office 2007 in school. I want to have word(and other office apps) to save as .doc(97-2003 format) as default. I know you can do this by going to the settings and within the application and settings the default but this only seems to work for individual users. Is there a way, a reg fix or script, that could automate this for all users?
Hope I have made it clear.
They may not apply in your environment, so you may have to do a compare of registry before change and then after by exporting it.
I've tried on a few occasions for various features such as dropping macro security and other things but never got Office 2007 to play ball, and didn't have time to investigate much. 2003 was easier.
The scripting option may be easiest.
Thanks I have tried the scripting way but that seems to have no effect?! Am I doing something wrong. Am I correct in thinking that it is a .VBS script.
yes it's a .vbs script.
I've used the attached to change my Word 2003 settings, it's supposed to work on any, from doc to xml and back again.
It wouldn't work if Word was already open, so maybe that's your issue.
Also, the files can be fussy about the location you run them from, i used desktop, and also the permissions you have, but i'm assuming you have admin rights.
If you get it to work, you should be able to get all users to run, it by sharing it somehow, or maybe even scripting it into their startup.
itguy22 (1st March 2010)
i thought just changing 'word' to 'excel' and 'doc' to 'xls' would work, but the property for excel is different it seems.
try it on yours in case it works better in 2007.
change "word" to "excel"
and change "doc" to "56" for 2003 format. or "43" for 97 version.
EDIT: you only need to change the "word" preceding the ".application" but if you replace all "word" then the whole script will make more sense. plus rename the file for future use.
i got the info from here : http://msdn.microsoft.com/en-us/library/bb241279.aspx
Last edited by vikpaw; 1st March 2010 at 03:44 PM. Reason: add "" and link for ref.
You can set this up by using the 2007 adm files. They can be downloaded from the MS website
seems a waste of Office 2007 to "lower" it to 2003, as some of the more exotic features won't work (can't be edited) on 2003 .doc format
There are currently 1 users browsing this thread. (0 members and 1 guests) | s3://commoncrawl/crawl-data/CC-MAIN-2014-52/segments/1419447548201.125/warc/CC-MAIN-20141224185908-00050-ip-10-231-17-201.ec2.internal.warc.gz | CC-MAIN-2014-52 | 2,394 | 22 |
https://www.redmine.org/boards/2/topics/40632?r=43912 | code | Issues when uploading a file: Completed 500 Internal Server Error
We have a production redmine used for internal issues & projects. We are encountering the following error everytime a user tries to add an attachment to an issue.
It started a few days ago, no noticeable update/upgrade has been done recently.
Current user: username (id=109)
Saving attachment '/var/www/vhosts/redmine.website.com/httpdocs/files/2013/12/131211130620_dfsdebug1.PNG' (12522 bytes)
Completed 500 Internal Server Error in 10ms
Errno::EACCES (Permission denied - /var/www/vhosts/redmine.website.com/httpdocs/files/2013/12/131211130620_dfsdebug1.PNG):
Our redmine version:
Redmine version 2.3.0.stable.11670
Ruby version 1.9.3 (x86_64-linux)
Rails version 3.2.13
Database adapter Mysql2
no plugin installed
RE: Issues when uploading a file: Completed 500 Internal Server Error - Added by nico ps almost 6 years ago
i am having the same issue with our redmine environmnt.
Did managed to solve the problem?
RE: Issues when uploading a file: Completed 500 Internal Server Error - Added by Pavel Potcheptsov almost 6 years ago
chmod -R 766 /var/www/vhosts/redmine.website.com/httpdocs/files | s3://commoncrawl/crawl-data/CC-MAIN-2020-34/segments/1596439735964.82/warc/CC-MAIN-20200805183003-20200805213003-00306.warc.gz | CC-MAIN-2020-34 | 1,162 | 18 |
https://alexanderjuulj.com/tag/wordpress/ | code | Setting up LocalWP for Beginners: A Step-by-Step Guide
It took me a long time to move away from XAMPP, which had been my go-to dev. environment since 2014. That was when I started developing for WordPress. I tried several other environments from time to time, but nothing every really stuck, until I discovered LocalWP. | s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296943704.21/warc/CC-MAIN-20230321162614-20230321192614-00693.warc.gz | CC-MAIN-2023-14 | 319 | 2 |
http://profcameron.blogspot.com/2007/06/microphones-wiretaps-oh-my.html | code | I attended the NJ Infragard meeting last week. One of the speakers was a guy who runs a company called Murray Associates. That non-descript name hides what they really do - they are a group that will do an internal security audit for things like wiretaps, microphones, and other such devices. The demonstration was very impressive. Some of the equipment they had were able to pick up any electronic devices. It was kind of amazing to see what they could do in counter-spying.
Murray Associatesweb site
The speaker has an interesting blog up on his Web site, detailing some security topics and spy things that show up in the news, I've bookmarked him!
Kevin Murray's Blog | s3://commoncrawl/crawl-data/CC-MAIN-2018-22/segments/1526794866276.61/warc/CC-MAIN-20180524112244-20180524132244-00243.warc.gz | CC-MAIN-2018-22 | 670 | 4 |
https://forum.arduino.cc/t/arduino-pwm-frequency/423465 | code | I want to start a project where I want to use the arduino for an inverter project, im fairly new to arduino’s… I was reading that the output frequency is fixed but I have seen where persons have made inverters using the arduino so I am assuming that there must be a way to change the frequency.
For example if I am to use 2 pins to output a pwm signal at 200hz can that be done?
See [u]Analog Write[/u] for the default PWM frequencies. And [u]Secrets Of Arduino PWM[/u] for a few different ways of changing it.
For example if I am to use 2 pins to output a pwm signal at 200hz
You only need / only can use one wire to do this.
Ok better question since I did some reading, I found out that I can use a arduino-pwm-frequency-library but I cannot seem to find one that works, based on what I read Im suppose to open the arduino ide, click sketch, include library and add the zip file (library I downloaded).
I keep getting Arduino: 1.6.13 Board: "Arduino/Genuino Uno"
Specified folder/zip file does not contain a valid library.
I found the link in the arduino forum and there is only 5 downloads available and I get the same message for each one.
can I get some assistance?
Hi, You don't need a library to change PWM frequencies. See THIS Page.
click sketch, include library and add the zip file (library I downloaded).
You are supposed to unzip it before you add it to the library and also sometimes it will have a " master " prefer to the name that also must be removed.
But as Terry says there is no need to use a library. | s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446710417.25/warc/CC-MAIN-20221127173917-20221127203917-00324.warc.gz | CC-MAIN-2022-49 | 1,526 | 14 |
https://knowledgebase.progress.com/articles/Article/Infragistics-ultraCurrencyEditor-changes-decimal-values-after-editingInfragistics-ultraCurrencyEditor-adds-nonsignificant-zero-to-decimal-value-after-editing?popup=true | code | Infragistics ultraCurrencyEditor adds nonsignificant zero to decimal value after editing
When modifying Infragistics ultraCurrency editor values, after editing the decimal value is modified such that equality matches no longer work. Editing the value can add a nonsignificant zero to the ultraCurrency value, which causes equality checks to return FALSE even when the decimal value hasn't changed.
Initially nonsignificant trailing zeros in the fractional part of the value after the decimal point, are not displayed by the MESSAGE statement. This is expected. But after editing, a zero is added which causes the equality match to fail. For example with the following button trigger code the button checks the initial values of the ultraCurrencyEditors by adding them and calculating the difference:
DEFINE VARIABLE d1 AS DECIMAL FORMAT "$->>>>>>>9.99" NO-UNDO.
DEFINE VARIABLE d2 AS DECIMAL FORMAT "$->>>>>>>9.99" NO-UNDO.
d1 = ultraCurrencyEditor1:value + ultraCurrencyEditor2:value + ultraCurrencyEditor3:value.
d2 = ultraCurrencyEditor4:value.
MESSAGE "814.98 + 325.79 + 79.13 = " d2 "?" d1 = d2 SKIP(2)
"814.98 + 325.79 + 79.13 = " d1 SKIP
"Total value = " d2 SKIP(1)
"(814.98 + 325.79 + 79.13) - " d2 " = " d1 - d2
If the total value is edited and re-entered as the same value (1219.90), then the button used again to check the values, this results in:
For some reason the nonsignificant trailing zero is no longer truncated by the MESSAGE statement, and this causes the equality match to fail. | s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578681624.79/warc/CC-MAIN-20190425034241-20190425060241-00417.warc.gz | CC-MAIN-2019-18 | 1,500 | 13 |
https://docs.paloaltonetworks.com/cloud-ngfw/aws/cloud-ngfw-on-aws/rules-and-rulestacks/cloud-ngfw-security-rule-objects/add-a-certificate-to-cloud-ngfw-for-aws | code | Add a Certificate to Cloud NGFW for AWS
Learn how to add a certificate to the Cloud NGFW for AWS.
Cloud NGFW uses certificates to access an intelligent feed and to enable inbound and outbound decryption. These certificates are stored in the AWS Secrets Manager.
There are three type of certificates used in a typical deployment.
- Intermediate CA Certificate (CA Certificate)—A Certificate Authority (CA) is a trusted organization that issues SSL certificates. These digital certificates are files used to link an entity to a public key. Web browsers use these certificates to authenticate content sent from web servers. Web browsers normally come with lists of CAs that they implicitly trust to identify hosts. The purpose of CA is to verify the authenticity of the website, domain, or organizations.
- Server Certificate—A certificate associated with a specific domain name. If a website has a valid certificate, it means that a certificate authority has taken steps to verify that the web address actually belongs to that organization. When you type a URL your browser checks the certificate to make sure that the website address matches the address on the certificate. It also makes sure the certificate is signed by a trusted certificate authority.You may occasionally connect to a server with an untrusted certificate. Cloud NGFW for AWS will drop the connection as if the server terminated the connection.
- Root CA Certificate—A certificate authority can issue multiple certificates in the form of a tree structure. A root certificate is the top-most certificate of the tree.
When adding certificate to the AWS Secrets Manager for use with Cloud NGFW, the following prerequisites must be met.
- Certificate added as a key/value pair, with two keys—private-keyandpublic-key. For the private key, the value should be the actual key and, for the public-key, the value should be the actual certificate body.
- A tag with the keyPaloAltoCloudNGFWand value oftrue.
- You must import the Root CA certificate and Intermediate CA certificate(s) to trust store of the client.
- If you are using end-entity certificates for decrypting traffic, only the end-entity certificates (both private and public keys) must be stored in the AWS Secrets Manager.
- PKCS8 private key format is supported. PKCS1 private key format is not supported.
Supported PKCS format:
-----BEGIN PRIVATE KEY----- -----END PRIVATE KEY-----
Unsupported PKCS1 format:
-----BEGIN RSA PRIVATE KEY----- -----END RSA PRIVATE KEY-----
Complete the following procedure to add a certificate for use with Cloud NGFW for AWS.
- Add your certificate to the AWS Secrets Manager.
- Log in to the AWS console, navigate to the AWS Secrets Manager, and clickStore a new secret.
- SelectOther type of secret.
- UnderKey/value pairs, create a key calledprivate-keyand another calledpublic-key.
- Paste your entire private key and entire public key in the corresponding field.
- Enter a descriptiveSecret Name.
- Add a tag with the KeyPaloAltoCloudNGFWand Valuetrue.
- ClickNext,Nextagain, andStoreto finishing adding your certificate.
- SelectRulestacksand select a previously-created rulestack on which to configure a certificate.
- Select.ObjectsCertificate ListAdd Certificate
- Enter a descriptiveNamefor your certificate.
- (optional) Enter a description for your certificate.
- Select certificate.
- Enter theCertificate ARNif you want Cloud NGFW to download the certificate from AWS Secrets Manager.
- CheckSelf Signed Certificateif you want Cloud NGFW to create a self-signed certificate.
Recommended For You
Recommended videos not found. | s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224649343.34/warc/CC-MAIN-20230603201228-20230603231228-00458.warc.gz | CC-MAIN-2023-23 | 3,604 | 35 |
https://englishlogica.com/exam-vocab/gobbledygook-meaning-examples-synonym-kgqxr8ap3b6 | code | language that seems meaningless
gobbledygook - nonsense
The informal word ‘gobbledygook’ expresses writing or speech that is generally unintelligible. That can be due to it simply being nonsense, or because it is overly complicated or highly technical making it difficult to understand. Always used to express disapproval.
It is impossible to derive anything worthwhile or constructive from that report. Most of it is just gobbledygook.
My financial adviser tried to explain the intricacies of the contract but it all just sounded like gobbledygook to me!
The salesperson tried to give me some gobbledygook about how amazing their product is but I just firmly told him that I wasn’t interested. | s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296943637.3/warc/CC-MAIN-20230321064400-20230321094400-00579.warc.gz | CC-MAIN-2023-14 | 700 | 6 |
http://mycredit-score.org/credit-score-spam-emails/ | code | There seems to have been a recent rash of credit score spammings, or I was just recently added to their spam list. I have been getting a lot of emails with subject lines that say “Your Credit Score May Have Changed“. The email tricks recipients into thinking their credit scores have changed and try to have you sign up with the spammer to see your new score, when in actuality your score probably hasn’t changed. Be on the lookout for these emails and don’t fall for them.
It frustrates me sometimes how people market toward the low credit score/subprime market. People that usually fall into this category are easily deceived and often duped into buying services they do not need or want. I really wish companies/people did not market to this weakness, it only makes things worse.Terms: credit bureau network spam, emails about credit scores, alert: Your scores have just been chnanged View/Dispute Score Notice, credit score spam emails, eku edu junk mail, email spam from freecreditscore saying my scorevwas revised, getting mail saying i have bad credit, getting spam emails from edu eku after receiving free credit report, when u get an email saying your credit scores have been chamged | s3://commoncrawl/crawl-data/CC-MAIN-2016-07/segments/1454701160950.71/warc/CC-MAIN-20160205193920-00069-ip-10-236-182-209.ec2.internal.warc.gz | CC-MAIN-2016-07 | 1,200 | 2 |
https://codecanyon.net/item/mobilefront-ecommerce-app-ionic-shopify/17753023 | code | MobileFront is professionally made cross-platform template which produces Shopify mobile app. It is built with battle-tested frameworks and tools such as Ionic, Cordova, Gulp and Sass.
Integration with Shopify
MobileFront plugs into your Shopify web store to bring your customers the best in class mobile shopping experience. The bundle includes Shopify Bridge NodeJS application which securely and reliably connects the mobile app to the web store. We support core Shopify features such as product lists and product details, categories, navigation and checkout process.
Installation scripts included in the bundle will guide you through the setup process, download all the necessary pieces of software and will prepare the development environment in minutes. Choose one of the built-in themes or easily create your own to stand out from the others.
Choose one of the built-in themes or easily create your own to stand out from the others.
Control the look of your store’s home page with highly configurable promotional sections.
Control all labels and messages in the app without digging into code. All language resources are stored in separate files. This let’s you easily change the default wording of the app or translate it into other languages.
MobileFront template was coded with Ionic framework which offers excellent cross-platform mobile experience, has large community of developers and great documentation.
Cordova framework allows the app to be packaged for both iOS and Android with a single codebase. It supports various native device features and can be extended by means of open source plugins.
MobileFront uses Gulp as a task manager. The bundle includes many Gulp tasks that take the pain out of mundane tasks such as code minification, Sass compilation, code quality checks, livereload and much more.
Use the power of Sass to customize the look and feel your mobile store MobileFront adheres to the best coding practices, making the app code maintainable and easy to read and understand.
A few tips before buying the MobileFront:
- Feel the MobileFront eCommerce app on a real device by installing the demo app from Google Play.
- See short video overview of the MobileFront.
- Read brief FAQ about our product on CodeCanyon to find answers to common questions.
- For detailed information about the product, installation process, features and capabilities read MobileFront Documentation.
- If you still have questions, feel free to contact us here at CodeCanyon, leave your question as a comment or contact us directly at [email protected].
- Using explicit Node.js version 6.9.1 during installation on Windows
- Added custom domains support - Getting currency and shop name from the store - Some minor cosmetic issues
- Added iOS 10 support - Minor issues fixes | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171281.53/warc/CC-MAIN-20170219104611-00110-ip-10-171-10-108.ec2.internal.warc.gz | CC-MAIN-2017-09 | 2,799 | 20 |
https://mail.python.org/archives/list/[email protected]/message/ES5ESM7OHT54HPXJBZWSPM322DT2B3Z7/ | code | On Thu, Oct 13, 2011 at 5:27 AM, Sven Marnach [email protected] wrote:
The *current interface* of ranges is that of a sequence and nothing more. The only place where the original parameters that were used to create the sequence pop up is in its representation. Giving those parameters more weight seems a bit like remembering the list coomprehension that was used to create a list and take this into account when comparing lists (of course I'm exaggerating here to make a point). *[emphasis added]*
The current interface doesn't include the changes you want to make either. Limiting the consideration of extending the interface of ranges to exactly your proposal is unnecessarily limiting.
Suppose we modified ranges to allow changing the step value.
x = range(0,10,3) x
range(0, 10, 3)
range(0, 10, 2)
Now I'm not saying we *should* allow you to change the step value but we *could*. And if we did that then, the original stop value definitely matters. Making the decision now to ignore that value when comparing for equality means that we preclude other features in the future. | s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100529.8/warc/CC-MAIN-20231204115419-20231204145419-00751.warc.gz | CC-MAIN-2023-50 | 1,079 | 8 |
https://devforum.nova.app/t/override-global-configuration-in-workspace/1824 | code | Extensions can define both global and per-workspace configuration options. I would like to suggest that Nova implicitly lets the user override any global configuration options per workspace.
Currently, I have extensions where I copy most of the global configuration options to the workspace options and then write code that first looks in the workspace and then in the global options. This works well with values that can be empty – e.g.
path – but types like
boolean don’t have an empty value.
Now does it make sense to let the user override any global value per workspace? I think it does. Often, global configuration specifies things like external tools to use (e.g. language server, compiler, formatter). Different projects might need different versions of these tools. Global configuration might also define behavior, like e.g. whether to auto-format a file on saving. There might be a project where this is unwanted because it uses a different style guide, while you do want to use auto-formatting for other projects.
Mind you, needing to override the global configuration in a workspace doesn’t happen with every second project, it is somewhat of an exotic use-case. Still, it would be great if Nova would support this, because currently, with every global option I add, I think about whether the user might want to override this per workspace, and then usually copy the option to the workspace, because you never know.
I initially thought local preferences would always supersede global ones and it was natural for Nova to take care of this for me. It later occurred to me that another use case is for local preferences to combine with global preferences – and that is perhaps why Panic chose to leave implementation up to extension developers. Indeed, I’ve since added a preference where local values are appended to global values.
The problem with implementing that for the extension is that it is very restricted.
For example, suppose I have a setting that auto-formats the code before saving. I can have a global
boolean config item for this. However, when I want to provide an option to override it per workspace, I cannot use a
boolean setting for that because it doesn’t have a
null value – I need to remodel it to an
enum with values
Would Nova support this, it could provide a UI where the user can, in the project settings, add or remove items from the global config and set their values.
Generally, the current configuration settings don’t make much sense for types that do not have an obvious absent value. What does it mean to set
false for a
boolean config item? This should lead to some way that lets you avoid setting the value to either true or false, but doesn’t. Checkbox could be a tristate at least.
This would also be useful in the case where I want to disable an extension in a single workspace. | s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506029.42/warc/CC-MAIN-20230921174008-20230921204008-00614.warc.gz | CC-MAIN-2023-40 | 2,846 | 18 |
https://www.dailymotion.com/video/xr10nu | code | 7 years ago462 views
West Ham United 2011/2012 Promotion Season. West Ham United, Moore Than Just a Club. We are Premier League! Back Where We Belong. COYI!
I do not own the song. Copyright Disclaimer Under Section 107 of the Copyright Act 1976, allowance is made for "fair use" for purposes such as criticism, comment, news reporting, teaching, scholarship, and research. Fair use is a use permitted by copyright statute that might otherwise be infringing. Non-profit, educational or personal use tips the balance in favor of fair use. It is not to be used for copying and selling. No copyright infringement intended. | s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376827252.87/warc/CC-MAIN-20181216025802-20181216051802-00200.warc.gz | CC-MAIN-2018-51 | 618 | 3 |
https://mono.github.io/mail-archives/monodevelop-list/2010-May/011888.html | code | [MonoDevelop] Cannot build my satellite assembly
robertj at gmx.net
Sun May 9 13:08:51 EDT 2010
On 09.05.2010 18:10, Banban wrote:
> I've develop a project in C# under Visual Studio 2005.
> When I tried to compile it under monoDevelop 2.2.2, the compilation goes
> well until the linking where I got this error:
> Generating satellite assembly for 'de' culture with al2
> Error while trying to invoke 'al2' to compile assembly resource for 'de'
> The system cannot find the file specified
> I tried to find some help on the internet, but I could not find any clue. I
> don't understand the error message from al2. Do you have any clue?
"al2" is a tool that usually comes with Mono (assembly linker), but
your distro (which one?) does not install it by default. It's
probably buried in some *-dev package.
More information about the Monodevelop-list | s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233511220.71/warc/CC-MAIN-20231003192425-20231003222425-00340.warc.gz | CC-MAIN-2023-40 | 848 | 16 |
http://formidablepro.com/formidable-v1-6-4/ | code | This release primarily consists of enhancements to existing features.
Several plugin conflicts eliminated
Several popular plugins were causing multiple submissions and email notifications. We have reworked the way forms are processed to prevent these types of conflicts from occurring. This also speeds up redirection after form submission, and removes the intermediate page before redirection. Important!:This change affects the redirection in the PayPal and Registration add-ons. If you are using one of these add-ons, make sure you also update those to the latest versions so redirection will continue functioning properly.
BuddyPress was also automatically changing the sending email address to [email protected]. This interference with Formidable email notifications has been removed.
Simpler post creation and display
An extra text area has been added to the “Create Posts” settings tab for combining multiple fields for the post content. This automatically creates a custom display for automatic use with any single post pages created through that form.
The post creation settings also have the option to automatically create a form field for a taxonomy or post status. This prevents going back and forth between the settings and form builder pages when setting up post forms.
We have had multiple requests for a way to insert existing posts into forms. A small meta box has been added to posts that do not have a matching form entry, allowing for entry creation with one click. All forms that are set up to create the post type you are viewing will be listed in the box.
Many of our users are working with Formidable on client sites. There have been concerns raised that clients can easily access the pro account username on the settings page. The entire credentials form is now hidden when pro is active, and is blank when revealed. There is also a link to deauthorize a site for which you no longer want your pro account used.
By default, the uploads/formidable folder was indexable and browseable on most servers, just like the regular WordPress uploads folder. It is recommended to add an htaccess file if you would uploaded files kept very private and secure, but for those who don’t want the files completely blocked, an index.php file has been added to prevent file browsing.
- frm_used_dates hook to add or remove blocked out dates in unique datepicker fields
- frm_redirect_url hook to dynamically change the url before redirection
- frm_cookie_expiration hook to change the cookie expiration time
Other notable enhancements
- Allow field IDs as dynamic default values ie in multi-paged forms. This makes it possible to create a summary in an HTML field or create a combination field in subsequent pages of the form.
- Limit the amount of time a cookie is valid, making it easier to limit entries to one per person per day and other similar configurations.
- Added basic csv import support for data from entries fields
- Allow for unlimited GET parameter setting in the custom display shortcode. [ display-frm-data id=2 whatever=value whatever2=value2]
- Switched phone field to HTML5 “tel” input type
- Allow searching by user login name on the admin entries pages when a user ID field is selected in the search form dropdown.
To update, visit the plugins page in your WordPress admin for automatic update or follow the manual installation instructions. | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368701459211/warc/CC-MAIN-20130516105059-00057-ip-10-60-113-184.ec2.internal.warc.gz | CC-MAIN-2013-20 | 3,395 | 21 |
http://lifeandtimesincardiff.tumblr.com/post/66104529289 | code | I'm officially a Cardiffian!
"Twenty years from now you will be more disappointed by the things you didn't do than by the ones you did.
So throw off the bowlines.
Sail away from the safe harbor. Catch the trade winds in your sails.
Explore. Dream. Discover.”-Mark Twain
posted 12:50 pm on Tuesday, November 5, 2013 with 2 notes
#first time in a stadium!
#and it was awesome!
reblogged this from | s3://commoncrawl/crawl-data/CC-MAIN-2014-41/segments/1410657133417.25/warc/CC-MAIN-20140914011213-00278-ip-10-196-40-205.us-west-1.compute.internal.warc.gz | CC-MAIN-2014-41 | 396 | 9 |
https://support.shaw.ca/t5/tv-discussions/inconsistent-volume-on-startup/td-p/36676 | code | I have a Gateway and 4 Portals.
On my most used portal, when I first turn on the "setup" aka Sony TV and Receiver, some of the channels have "barely there" audio, other channels are just fine volume wise. Eventually all channels have consistent volume. I've only noticed this on the one portal/TV/Receiver so far.
With the receiver working on some channels and not others I'm ruling it out because if it were the problem all channels would be low. It's kind of a PIB to switch portals around so I'm just wondering if this has been reported before. If it has, then I'll dig out a couple portals and swap them.
Also FWIW, Shaw tech was here a couple days ago on an unrelated Internet issue and even though he went through the house changing ends and replacing older splitters etc. that didn't make any difference. Of course I forgot to mention the TV issue when he was here. Oop.
Thanks for your thoughts.
Try swapping the portal with one of the others to confirm that it is the portal having the problem. You could also try bypassing the receiver and go straight in to the TV.
Well.. It's not the Portal. Same thing with 2 portals. I doubt it's the receiver as simply changing channels back and forth toggles the sound volume. So, tomorrow I'll begin the day with a different TV and portal pair to see if I get the same thing.
This morning I tried a different TV/Portal. No problems. Went to main TV and same problem. Checked all HDMI and everything is snug. Still CBC (it is worst/reliable offender) is bad, CNN is good for about 5 minutes then CBC comes to normal volume levels.
I don't get it, so tomorrow I'll bypass the receiver if I can find get the cables to cooperate. Everything is tied up (literally). | s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656103922377.50/warc/CC-MAIN-20220701064920-20220701094920-00411.warc.gz | CC-MAIN-2022-27 | 1,710 | 9 |
https://education-research.org/screen-divider-card/divider-wall-tool-screen-guard-for-oneplus-7-near/ | code | Even if you opt for a plain screen, make sure it’s reversible. A colorful screen can develop into a focus in your room, exactly like colorful drapes or a huge work of art. With the usage of shelves, you can make agallery walland display multiple parts of art or photos. You don’t wish to sacrifice function for style, but nevertheless, it still ought to be a sanctuary for you to unwind and unwind after a busy moment. Needless to say, it’s not required to use all the above mentioned elements at the same time. To carry on the sanctity of the vehicle, only 1800 units were produced worldwide.
If your doors aren’t precisely the identical height it’s OK if the tops aren’t level. Thick glass is employed as a wall. Select from the various available options The wood room dividers are created out of the best range of wood. Contemporary in style, it is going to fit nearly every modern decor. There are lots of styles of room dividers available that could fit just about any sort of room decor you might have. Design You should select the plan of the wood room divider based on the plan of the room at which you will be placing it.
Room dividers were used in the previous eras as a means to offer the Rani’s’ an individual section to modify their clothes. Whereas if you would like a divider to create a distinct partition inside the room, it should be as wide as the space itself. It’s possible to install room dividers to meet your kids’ spatial wants, and accommodate the available floor space. Folding room dividers are an innovative method to beautify your house. The main reason is quite simple the good wood room dividers are put in the rooms to bring a little luxury and also to live richness and tranquility within the walls of someone’s own abode.
If your doors aren’t precisely the identical height it’s OK if the tops aren’t level. The doors and shutters are offered in wide range including a variety of types and designs. Despite how the glass might also entice a selection of interest, as a result of strikingly attractive traits, the frame of the door might be the most vital aspect as a lengthy way as the feature is worried. Industrial glass might be utilised to in lots of methods for your small business. Movable divider Movable partition walls can be produced out of wood or glass panels is dependent on your preferences. A shelf full of plants in the center of the room may be an excellent means to divide spaces in a room.
Room dividers are considered of wonderful help in regards to organizing rooms. Another easy way to make a room divider is by way of furniture arrangements. You may even make an offbeat room divider with the usage of some crates!
Any content, trademark/s, or other material that might be found on this site that is not this site property remains the copyright of its respective owner/s. In no way does LocalHost claim ownership or responsibility for such items and you should seek legal consent for any use of such materials from its owner. | s3://commoncrawl/crawl-data/CC-MAIN-2021-17/segments/1618038101485.44/warc/CC-MAIN-20210417041730-20210417071730-00496.warc.gz | CC-MAIN-2021-17 | 3,011 | 6 |
http://www.webassist.com/forums/post.php?pid=219774 | code | I can't seem to access the site via FTP. However, even if I could, I can't seem to reproduce the problem. I'm inserting multiple sentences into the description field and haven't had an issue. Maybe it has something to do with the specific content you are entering?
I'll need FTP access and steps to reproduce since both don't seem to be working for me currently. | s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590347390448.11/warc/CC-MAIN-20200526050333-20200526080333-00035.warc.gz | CC-MAIN-2020-24 | 362 | 2 |
http://physics.stackexchange.com/questions/tagged/general-physics+noethers-theorem | code | to customize your list.
more stack exchange communities
Start here for a quick overview of the site
Detailed answers to any questions you might have
Discuss the workings and policies of this site
Why can't energy be created or destroyed?
My physics instructor told the class, when lecturing about energy, that it can't be created or destroyed. Why is that? Is there a theory or scientific evidence that proves his statement true or ...
Jan 7 '12 at 5:12
newest general-physics noethers-theorem questions feed
Hot Network Questions
Can Voyager still use its thrusters to avoid hazards?
Can I use a N-MOSFET to switch lower voltage signals?
How to disable DirectWrite in Google Chrome 37?
Why use a function parameter 'foo' in this way: *(&foo)?
UnFlatten an array into a ragged matrix
why Gaussian noise is usually used?
Alternatives to Append/AppendTo for generating a list in an interactive DynamicModule?
Find the closest palindromic number
Addressing the fact that primary keys are not part of your business domain
Refactoring String manipulating method with TDD
Why do we use the Latex logo when referring to Latex in text?
Languages spoken in the Netherlands
mastermind horse battery staple
Can one deduce whether a given quantity is possible as the area of a triangle when supplied with the length of two of its sides?
What is the difference between building from source and using an install package?
How long can a Timelord hold his breath?
Idiom for "just because you give something a different name, it doesn't change what it is"
Is it better to describe the main character's physical appearance early on in the story?
Can I use garlic leaf for cooking?
How do I assign the returned query values to each Boolean?
DC adapters: why so few amps?
Are there jews not following the rabbinic laws?
is there a real difference between "digital" and "film" lenses?
more hot questions
Life / Arts
Culture / Recreation
TeX - LaTeX
Unix & Linux
Ask Different (Apple)
Geographic Information Systems
Science Fiction & Fantasy
Seasoned Advice (cooking)
Personal Finance & Money
English Language & Usage
Mi Yodeya (Judaism)
Cross Validated (stats)
Theoretical Computer Science
Meta Stack Exchange
Stack Overflow Careers
site design / logo © 2014 stack exchange inc; user contributions licensed under
cc by-sa 3.0 | s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1408500830094.68/warc/CC-MAIN-20140820021350-00012-ip-10-180-136-8.ec2.internal.warc.gz | CC-MAIN-2014-35 | 2,305 | 51 |
https://support.mozilla.org/zh-TW/questions/1410209 | code | I want to remove the Yahoo search engine but the remove tab is not highlighted or blocked somehow.
Did you read these instructions?
Your Add-ons list in the troubleshooting information doesn't show a Yahoo search engine. This means that you either have an extension that installs this or you have malware.
You can do a malware scan just to be sure.
Start Firefox in Troubleshoot Mode to check if one of the extensions ("3-bar" menu button or Tools -> Add-ons -> Extensions) or if hardware acceleration or if userChrome.css/userContent.css is causing the problem.
- switch to the Default System theme: "3-bar" menu button or Tools -> Add-ons -> Themes
- do NOT click the "Refresh Firefox" button on the Troubleshoot Mode start window
If clearing the "Restore Default Search Engines" on the "Settings -> Search" page doesn't work, try to rename/remove search.json.mozlz4 in the Firefox profile folder with Firefox closed to rebuild the search engines registry.
You can use the button on the "Help -> More Troubleshooting Information" (about:support) page to go to the current Firefox profile folder or use the about:profiles page (Root directory).
- Help -> More Troubleshooting Information -> Profile Folder/Directory:
Windows: Open Folder; Linux: Open Directory; Mac: Show in Finder
Firefox will rebuild search.json.mozlz4 from the built-in search engines. | s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506029.42/warc/CC-MAIN-20230921174008-20230921204008-00658.warc.gz | CC-MAIN-2023-40 | 1,356 | 12 |
https://inasentence.me/compensated-in-a-sentence | code | You've already Compensated me.
I can be Compensated, and I can't.
Oh, I'm sure he's getting Compensated.
Nor will be Compensated by my daughter.
You even Compensated for the crooked sight.
If you agree to do this, you'll be Compensated.
I'm gonna to make sure you're fully Compensated.
You want to be Compensated regarding the last contract.
It sounds like he needs to be Compensated or something.
The surrounding energy Compensated for the missing Case.
A weakness of the body can be Compensated for by the mind.
Shouldn't I be Compensated for the drop in our stock prices?
It's good that your friend got Compensated, even though it was late.
You should report this to the county office and get Compensated for it.
I'll make sure you and your people are Compensated for your assistance. | s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323588053.38/warc/CC-MAIN-20211027022823-20211027052823-00463.warc.gz | CC-MAIN-2021-43 | 787 | 15 |
http://www.tomshardware.com/forum/297006-31-bsod-upgrading | code | I have an issue after upgrading my PC recently and am having difficulty finding a solution. The problem is a BSOD during the windows 7 splash, right after the POST screen. It happens everytime i turn on the pc with the new hardware installed. I haven't overclocked anything, everything is compatible with each other, plenty of airflow and my CPU temperature (according to BIOS) is well under control at about 29C.
The spec i am attempting to run, is an i7 950 (stock speeds...for now), 6GB DDR3 1600mhz OCZ Platinum, Asus 5770 1gb card, all hooked up to an Asus P6x58D-E board powered by a 500W OCZ PSU. I am using 2 HDD, both of which were from my previous PC, 1 of which contains my OS (windows 7 professional) the other is just for generic storage. I'm fairly stumped as to what the issue is to be honest, I originally assumed it was my PSU, so i have tried a couple of calculators which gave me the same result and shows that 500W is pushing it, but none the less can run the system.
One thing i am unsure of however, and cant seem to find an answer too anywhere, is if my old HDD with windows on contains drivers for my old hardware, would this cause a conflict with anything i wish to use now? If anyone could shed some light on how to resolve my issue and get me to my desktop, it would be greatly appreciated,
It was originally a packard bell PC, i just re-used the HDD for the OS and data i already have on there. Other than that nothing else was used. The PSU is my own which i have had for about 12 months and have used on another PC, so its in working order.
The mobo was replaced, as was the GFXcard, CPU, RAM, and 2 fans. I'm no longer using a CPU fan, instead i have a megahalems tower (which annoyingly at POST brings up a "CPU fan error!" message which i would love to remove hehe).
I do have a fully working version of windows 7 professional if i have to resort to a clean install. I have all my uni programs on the HDD though so could really do without losing them preferably.
Is that hard drive at least Sata 3 g/bs?
If not, I would also upgrade that component.
You have a kickass motherboard, CPU, and GPU. Old hard drives will bottleneck your system like crazy. Consider getting an SSD. Prices on them are coming down as I write this. 60GB is good for a boot drive. I wouldn't go any hight unless you really need the space or the price is cheap.
Okay guys thanks for the info. I went ahead and did a clean install of windows, which went fine. Installed okay, got me on the desktop and i began to install the MoBo drivers.
Encountered another problem however... The PC restarted after installing a chipset driver, which it prompted me about before hand. As soon as it rebooted, it continually restarts itself even before POST. I thought it a memory issue (Because it originally allowed me to install windows), however when running memtest on a single stick of RAM (out of the 3 i have) it restarted itself after about 7 minutes of testing. Now im totally confused, does this mean i have found the faulty RAM module, or could there be an underlying problem such as an issue with my motherboard, or my PSU not being powerful enough? I wouldn't mind, i have built and set up enough PC's before now to have a fairly competent understanding of how to troubleshoot issues, but this one has me stumped well and truly! | s3://commoncrawl/crawl-data/CC-MAIN-2014-10/segments/1394011038777/warc/CC-MAIN-20140305091718-00095-ip-10-183-142-35.ec2.internal.warc.gz | CC-MAIN-2014-10 | 3,331 | 11 |
http://iphone.sys-con.com/node/975490 | code | |May 25, 2009 11:45 AM EDT||
Bringing enterprise applications effectively out to mobile devices has required some harsh trade-offs for developers. To gain access to devices, you lose functionality and portability, for example.
But thanks to the sizable impact that the Apple iPhone and its WebKit browser have had in the market -- and the lure of new business opportunities around mobile application stores -- the mobile Web has suddenly become more attractive and attainable for mainstream developers.
Such technologies as HTML 5, Android, WebKit and advances in scripting and open source tools are allowing developers to target mobile devices better than ever.
To learn more about how the development field for mobile Web applications is shaping up and how targeting the modern mobile Web browser may be removing some of the harshness from the trade-offs of the past, I recently assembled a panel of development experts.
Join me and Stephen O'Grady, founder and analyst at RedMonk; Wayne Parrott, vice president for product development at Genuitec, and David Beers, a senior wireless developer at MapQuest as we unpack the mobile Web.
Here are some excerpts:
O'Grady: For the first time, users have a real Web experience, as opposed to a stripped-down, bare-bones site in terms of what they can experience via the mobile Web. We need to pair the environmental and contextual factors with the advances that we've seen in the devices themselves. They've all come together to give us a rich and deep experience that will allow us to do things that we haven't been able to do before with the devices.
... When you're an enterprise vendor or a consumer vendor looking to target a volume audience, the fact is that there are a lot more mobile devices than there are desktops and laptops. There are mobile devices all over the planet. ... A lot of folks who might have traveled in the past and had applications like Siebel built into their laptops are now very often using those in a handheld or, in some cases, a netbook. So, economics, in terms of the application price and the volume audience that can be targeted is a big factor.
Gardner: How does an organization like MapQuest handle this whole issue of so many choices on that endpoint?
Beers: It's both a problem and an opportunity. From a developer's standpoint, and I am a developer, it's obviously difficult, because the amount of energy that you put in is divided across all of these different platforms. You have to make difficult decisions about developing the features you want ... and perhaps limiting the [device] targets that you're able to reach.
... On the positive side, fragmentation is a pejorative term that we use for differentiation. It's painful for developers, but we can't pretend that it's all a bad thing, because it's really driven by rapid innovation. A lot of the fragmentation that we see out there is because we've got these capabilities now on handsets.
Parrott: ... Both higher-end horsepower on the smartphones and a much better browsing experience or engine are now showing up on the iPhone-class machines. The programming model that is now available enables a whole new class of Web-type applications, which, in the past, has been reserved for native applications.
... As you start to move forward with the WebKit-type browsers now more prevalent on these smarter phones, it's starting to represent a more common platform that we have a choice to target our application functionality toward.
Beers: Mobile has been something that's been part of MapQuest right along. It comes in the nature of our business, which is getting people from A to B. So, it's intrinsically mobile oriented.
A lot of what we've been doing in the last couple of years has been developing what we've been calling native applications here. ... As to the question of HTML 5 and how this changes the picture for companies like MapQuest, we're beginning to see that these capabilities make it so that we can take technology that powers the mapquest.com website that people use on their desktop and repurpose that very quickly to provide a beautiful and powerful Ajax Web experience on modern smartphones.
We found that, considering the amount of development and energy that's gone into making our native applications, and has gone into the mobile website that we have out there right now, what it took to get a great application on the iPhone was minimal. It was very impressive.
... It's not just a mobile Web story. We see companies like Palm coming out with essentially native application environments that use those tools for the presentation layer. That brings up all kinds of very interesting and productive new models for releasing essentially a native application that has really rich access to the underlying features on the device -- things like GPS and the accelerometer. That's also a very exciting application model for companies like MapQuest to look at.
You start to combine those things, and it allows all kinds of different components that are out there and that have been driving the innovation in the Internet to come into play on mobiles in ways that we haven't seen before.
Parrott: Obviously, one of the forces driving us has been enterprise organizations that want to move to the mobile Web. ... What they're pushing us for is, "How do we get there from here?" They already have a lot of their own infrastructure and resources in place, but moving that to the mobile Web has been a challenge for them.
[Now ] you have what we call the Mobile Web Programming Model so that you can now build some very sophisticated functionality that you run directly in the browser. You have to be educated about what you want to run local. Do you want to serve static content or do you want to push functionalities directly to the particular smartphone device?
We're servicing both -- helping educate and provide tooling and educational services for both Web developers and traditional enterprise developers -- Java developers who are moving over, bringing their programming know-how and experience, and applying that to dynamic Web applications.
The definition of IoT is not new, in fact it’s been around for over a decade. What has changed is the public's awareness that the technology we use on a daily basis has caught up on the vision of an always on, always connected world. If you look into the details of what comprises the IoT, you’ll see that it includes everything from cloud computing, Big Data analytics, “Things,” Web communication, applications, network, storage, etc. It is essentially including everything connected online from hardware to software, or as we like to say, it’s an Internet of many different things. The difference ...
Nov. 22, 2014 10:00 PM EST Reads: 1,061
ARMONK, N.Y., Nov. 20, 2014 /PRNewswire/ -- IBM (NYSE: IBM) today announced that it is bringing a greater level of control, security and flexibility to cloud-based application development and delivery with a single-tenant version of Bluemix, IBM's platform-as-a-service. The new platform enables developers to build ap...
Nov. 22, 2014 05:30 PM EST Reads: 1,372
Cloud Expo 2014 TV commercials will feature @ThingsExpo, which was launched in June, 2014 at New York City's Javits Center as the largest 'Internet of Things' event in the world.
Nov. 22, 2014 05:30 PM EST Reads: 1,278
An entirely new security model is needed for the Internet of Things, or is it? Can we save some old and tested controls for this new and different environment? In his session at @ThingsExpo, New York's at the Javits Center, Davi Ottenheimer, EMC Senior Director of Trust, reviewed hands-on lessons with IoT devices and reveal a new risk balance you might not expect. Davi Ottenheimer, EMC Senior Director of Trust, has more than nineteen years' experience managing global security operations and assessments, including a decade of leading incident response and digital forensics. He is co-author of t...
Nov. 22, 2014 05:30 PM EST Reads: 1,076
The major cloud platforms defy a simple, side-by-side analysis. Each of the major IaaS public-cloud platforms offers their own unique strengths and functionality. Options for on-site private cloud are diverse as well, and must be designed and deployed while taking existing legacy architecture and infrastructure into account. Then the reality is that most enterprises are embarking on a hybrid cloud strategy and programs. In this Power Panel at 15th Cloud Expo (http://www.CloudComputingExpo.com), moderated by Ashar Baig, Research Director, Cloud, at Gigaom Research, Nate Gordon, Director of T...
Nov. 22, 2014 07:00 AM EST Reads: 1,337
Explosive growth in connected devices. Enormous amounts of data for collection and analysis. Critical use of data for split-second decision making and actionable information. All three are factors in making the Internet of Things a reality. Yet, any one factor would have an IT organization pondering its infrastructure strategy. How should your organization enhance its IT framework to enable an Internet of Things implementation? In his session at Internet of @ThingsExpo, James Kirkland, Chief Architect for the Internet of Things and Intelligent Systems at Red Hat, described how to revolutioniz...
Nov. 21, 2014 09:15 PM EST Reads: 1,259
Technology is enabling a new approach to collecting and using data. This approach, commonly referred to as the "Internet of Things" (IoT), enables businesses to use real-time data from all sorts of things including machines, devices and sensors to make better decisions, improve customer service, and lower the risk in the creation of new revenue opportunities. In his General Session at Internet of @ThingsExpo, Dave Wagstaff, Vice President and Chief Architect at BSQUARE Corporation, discuss the real benefits to focus on, how to understand the requirements of a successful solution, the flow of ...
Nov. 21, 2014 08:00 PM EST Reads: 1,339
The security devil is always in the details of the attack: the ones you've endured, the ones you prepare yourself to fend off, and the ones that, you fear, will catch you completely unaware and defenseless. The Internet of Things (IoT) is nothing if not an endless proliferation of details. It's the vision of a world in which continuous Internet connectivity and addressability is embedded into a growing range of human artifacts, into the natural world, and even into our smartphones, appliances, and physical persons. In the IoT vision, every new "thing" - sensor, actuator, data source, data con...
Nov. 21, 2014 08:00 PM EST Reads: 1,278
"BSQUARE is in the business of selling software solutions for smart connected devices. It's obvious that IoT has moved from being a technology to being a fundamental part of business, and in the last 18 months people have said let's figure out how to do it and let's put some focus on it, " explained Dave Wagstaff, VP & Chief Architect, at BSQUARE Corporation, in this SYS-CON.tv interview at @ThingsExpo, held Nov 4-6, 2014, at the Santa Clara Convention Center in Santa Clara, CA.
Nov. 21, 2014 07:00 PM EST Reads: 1,217
Focused on this fast-growing market’s needs, Vitesse Semiconductor Corporation (Nasdaq: VTSS), a leading provider of IC solutions to advance "Ethernet Everywhere" in Carrier, Enterprise and Internet of Things (IoT) networks, introduced its IStaX™ software (VSC6815SDK), a robust protocol stack to simplify deployment and management of Industrial-IoT network applications such as Industrial Ethernet switching, surveillance, video distribution, LCD signage, intelligent sensors, and metering equipment. Leveraging technologies proven in the Carrier and Enterprise markets, IStaX is designed to work ac...
Nov. 20, 2014 09:15 PM EST Reads: 1,318
"There is a natural synchronization between the business models, the IoT is there to support ,” explained Brendan O'Brien, Co-founder and Chief Architect of Aria Systems, in this SYS-CON.tv interview at the 15th International Cloud Expo®, held Nov 4–6, 2014, at the Santa Clara Convention Center in Santa Clara, CA.
Nov. 20, 2014 07:30 PM EST Reads: 1,503
C-Labs LLC, a leading provider of remote and mobile access for the Internet of Things (IoT), announced the appointment of John Traynor to the position of chief operating officer. Previously a strategic advisor to the firm, Mr. Traynor will now oversee sales, marketing, finance, and operations. Mr. Traynor is based out of the C-Labs office in Redmond, Washington. He reports to Chris Muench, Chief Executive Officer. Mr. Traynor brings valuable business leadership and technology industry expertise to C-Labs. With over 30 years' experience in the high-tech sector, John Traynor has held numerous...
Nov. 20, 2014 06:00 PM EST Reads: 1,272
Bit6 today issued a challenge to the technology community implementing Web Real Time Communication (WebRTC). To leap beyond WebRTC’s significant limitations and fully leverage its underlying value to accelerate innovation, application developers need to consider the entire communications ecosystem.
Nov. 20, 2014 04:45 PM EST Reads: 1,043
The 3rd International @ThingsExpo, co-located with the 16th International Cloud Expo - to be held June 9-11, 2015, at the Javits Center in New York City, NY - announces that it is now accepting Keynote Proposals. The Internet of Things (IoT) is the most profound change in personal and enterprise IT since the creation of the Worldwide Web more than 20 years ago. All major researchers estimate there will be tens of billions devices - computers, smartphones, tablets, and sensors - connected to the Internet by 2020. This number will continue to grow at a rapid pace for the next several decades.
Nov. 20, 2014 01:00 PM EST Reads: 1,511
The Internet of Things is not new. Historically, smart businesses have used its basic concept of leveraging data to drive better decision making and have capitalized on those insights to realize additional revenue opportunities. So, what has changed to make the Internet of Things one of the hottest topics in tech? In his session at @ThingsExpo, Chris Gray, Director, Embedded and Internet of Things, discussed the underlying factors that are driving the economics of intelligent systems. Discover how hardware commoditization, the ubiquitous nature of connectivity, and the emergence of Big Data a...
Nov. 20, 2014 12:30 PM EST Reads: 1,748
Almost everyone sees the potential of Internet of Things but how can businesses truly unlock that potential. The key will be in the ability to discover business insight in the midst of an ocean of Big Data generated from billions of embedded devices via Systems of Discover. Businesses will also need to ensure that they can sustain that insight by leveraging the cloud for global reach, scale and elasticity.
Nov. 18, 2014 09:00 PM EST Reads: 1,988
SYS-CON Events announced today that Windstream, a leading provider of advanced network and cloud communications, has been named “Silver Sponsor” of SYS-CON's 16th International Cloud Expo®, which will take place on June 9–11, 2015, at the Javits Center in New York, NY. Windstream (Nasdaq: WIN), a FORTUNE 500 and S&P 500 company, is a leading provider of advanced network communications, including cloud computing and managed services, to businesses nationwide. The company also offers broadband, phone and digital TV services to consumers primarily in rural areas.
Nov. 18, 2014 08:15 PM EST Reads: 1,562
SYS-CON Events announced today that IDenticard will exhibit at SYS-CON's 16th International Cloud Expo®, which will take place on June 9-11, 2015, at the Javits Center in New York City, NY. IDenticard™ is the security division of Brady Corp (NYSE: BRC), a $1.5 billion manufacturer of identification products. We have small-company values with the strength and stability of a major corporation. IDenticard offers local sales, support and service to our customers across the United States and Canada. Our partner network encompasses some 300 of the world's leading systems integrators and security s...
Nov. 18, 2014 08:15 PM EST Reads: 1,502
IoT is still a vague buzzword for many people. In his session at @ThingsExpo, Mike Kavis, Vice President & Principal Cloud Architect at Cloud Technology Partners, discussed the business value of IoT that goes far beyond the general public's perception that IoT is all about wearables and home consumer services. He also discussed how IoT is perceived by investors and how venture capitalist access this space. Other topics discussed were barriers to success, what is new, what is old, and what the future may hold. Mike Kavis is Vice President & Principal Cloud Architect at Cloud Technology Pa...
Nov. 18, 2014 01:30 PM EST Reads: 1,984
Cloud Expo 2014 TV commercials will feature @ThingsExpo, which was launched in June, 2014 at New York City's Javits Center as the largest 'Internet of Things' event in the world. The next @ThingsExpo will take place November 4-6, 2014, at the Santa Clara Convention Center, in Santa Clara, California. Since its launch in 2008, Cloud Expo TV commercials have been aired and CNBC, Fox News Network, and Bloomberg TV. Please enjoy our 2014 commercial.
Nov. 13, 2014 05:00 AM EST Reads: 3,524 | s3://commoncrawl/crawl-data/CC-MAIN-2014-49/segments/1416400379320.39/warc/CC-MAIN-20141119123259-00159-ip-10-235-23-156.ec2.internal.warc.gz | CC-MAIN-2014-49 | 17,191 | 62 |
https://www.lloadout.com/open-source | code | I try to give the community something back
By building this website, creating youtube video and tweeting around I try to give some knowledge back to the community
One of my goals is to create some awesome tools and packages for other developers , this is an extract of tools I'm building
A Laravel package to output a specific sql to your favourite debugging tool, your browser or your log file.
You often want to draw the attention and look into one single sql while you are developing. You can look up your sql in your favourite debugging tool in the sql tab , but most of the time your sql is not the only sql executed ... So the searching begins. With this package you can add showSql() to your QueryBuilder and the single sql will be outputted to the logging of your debug tool.
You can install Laravel showsql via composer, more info on the Laravel showsql github repo
LLoadout aims to be your loadout for Laravel, helping you kickstart your development process LLoadout is made up of four pillars: learning , building , automating and optimizing. Everything about LLoadout can be found on the lloadout website
With the video tutorials we try to optimize the learning process with short valuable content of approximate 5 minutes.
With LLoadout components you will pull in the best of class Laravel frontend components. This can drastically speed up your frontend development.
LLoadout Inforce is a toolset to kickstart your application on top of Laravel Livewire, Laravel Jetstream and Spatie Permissions. LLoadout is created using the TALL stack.
LLoadout refactor is a site thats show you some nice refactors, giving you valuable code examples.
Sajan is a lightweight command line tool for webdevelopers, it is written in php .
The tool provides you with shortcuts for multiline commands or opens a world of hidden oneliners.
Sajan is a shell tool tested on MacOs desktop and Linux servers
Sajan uses tools like brew, git, npm, node and composer.
For us brew is the best tool to install these programs, so we depend on it. If you don't have it, you can install it easily via sajan.
You can install sajan via composer, more info on the sajan github repo
Smart is a blade component for easy image manipulation. Want to serve private hosted images without the need to code your own logic ? Want to resize your images before sending them to the browser, without extra coding ? Then smart might be your buddy !
This package makes it possible to
serve images that are not public accessible without coding resize images without coding resizing public hosted images without coding automatically cache your images
You can install smart via composer , more info on the smart Github repo
I have some other little projects that can be found on my Github page
this article has been read 293 times | s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510334.9/warc/CC-MAIN-20230927235044-20230928025044-00853.warc.gz | CC-MAIN-2023-40 | 2,791 | 23 |
https://uufw.org/services/creating-hope/ | code | This service will be online only, available at https://www.youtube.com/channel/UCKuLGR9dzkEf9sfrB3m97ag/videos
The New Year always brings hope for the upcoming year. At its most basic level, hope is the belief that things can be better. Yet, it’s more than mere wishful thinking. The capacity for hope is one of those inherent faculties with which we are all born. We can nurture that capacity and get better at it. This message is about how we may do that. | s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320301475.82/warc/CC-MAIN-20220119155216-20220119185216-00648.warc.gz | CC-MAIN-2022-05 | 459 | 2 |
http://www.johngjohnson.com/careers/ | code | Job Duties include:
• Conduct quantity take-off and studies for all items incorporated in the project, anticipating details necessary to complete the project.
• Prepare preliminary estimates and studies during preconstruction.
• Monitor design development cost trends to detect over-runs and potential problem areas.
• Participate in the value engineering process.
• Develop, update and maintain unit cost figures... | s3://commoncrawl/crawl-data/CC-MAIN-2018-26/segments/1529267864022.18/warc/CC-MAIN-20180621040124-20180621060124-00291.warc.gz | CC-MAIN-2018-26 | 426 | 6 |
https://discourse.gohugo.io/t/could-cloudflare-workers-work-as-a-commenting-solution/12846 | code | Hi all – We’ve had a lot of discussion and deep sadness over the lack of a good commenting system for static sites (or just sites).
Kenton Varda does a good job of introducing Cloudflare Workers in this post.
What I’m thinking is that clicking on a button to comment could trigger a Worker. And that a Worker could update the page with the new comment by sending JSON over. That would require that the web server append the data to the page, and probably also to a backup comment flat file or database. Is this making sense?
What do you think? I don’t know JS very well – does it sound feasible?
Cloudflare Workers are a great product! I happily use them on a few websites now, primarily for speed and security.
clicking on a button to comment could trigger a Worker.
This is possible by having the Worker monitor the URLs, and kick into action when a certain URL is requested. You could for instance have that button link to example.com/my-post/submit-comment.
I’m not sure how you’d send information from a page into a Worker, but perhaps by submitting a form?
And that a Worker could update the page with the new comment by sending JSON over.
Workers can read the content from a page that they are going to send over to the user requesting the page, so you could insert comments dynamically that way too. Or of course bundle the comments as a JSON file and have the user’s client-side code show the comments.
That would require that the web server append the data to the page, and probably also to a backup comment flat file or database.
Well the Worker can append the data to the page, so the static website doesn’t have to run on an actual server and something like S3 can do.
The Worker will then later need to fetch those comments.
So that other data can be on an actual server. But you can go serverless as well, I think. If an AWS Lambda or Azure Function monitors a URL, you can have the Worker submit a request for that URL and have the serverless function fetch the comment data, and then return it to the Worker as a JSON file. And you could use another URL that a Lambda/Function runs on to act as the ‘data updater’ when a URL request is make to that Lambda/Function.
(This latter is in theory, I haven’t build that. Just thinking along here.)
However, note that Cloudflare workers are not free. At $5 per month minimum, you are on your way to a low-cost VPS.
As @Jura say’s, you’d still need something like Lambda functions to process the comments and a database to store them.
If you are doing that without any kind of authentication, you are asking for loads of spam trouble. If you are asking for authentication, you need to manage the identities (and to deal with the GDPR and other local laws) or hand that off to a 3rd party which puts you right back at the heart of the problem people seem to be having with Disqus in the first place. | s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662522270.37/warc/CC-MAIN-20220518115411-20220518145411-00586.warc.gz | CC-MAIN-2022-21 | 2,885 | 18 |
http://simbios.stanford.edu/talks/AbstractsY3/MukherjeeAbstract.htm | code | |Simbios Talk by Rudranarayan Mukherjee, Rensselaer Polytechnic Institute, NY, November 8, 2006
Title: Multibody Dynamics Algorithms for Biomolecular SimulationsAbstract:
This talk will feature a brief overview of multibody dynamics research and its applicability for biomolecular simulations. Overview and highlights of several efficient algorithms for dynamics analysis of multi-rigid and multi-flexible body systems as well as contact-impact problems will be presented. A discussion and some sample examples on applying these algorithms for biomolecular simulations will be presented. | s3://commoncrawl/crawl-data/CC-MAIN-2017-39/segments/1505818687606.9/warc/CC-MAIN-20170921025857-20170921045857-00320.warc.gz | CC-MAIN-2017-39 | 587 | 3 |
https://onyxangel.livejournal.com/7059.html | code | Flashback to the weekend. Someone help me...I've become a Harry Potter fanatic. Where's the nearest 12 step program?? The realization dawned when we were in Hallmark, looking at Christmas cards. We'd found a small section of Harry Potter stuff. Now, there's a Gringott's bank (I want, I want!) that was kinda cool...but, I realized that I needed help when I found a Hogwarts banner, and a Gryphondorf (okay, Bryan found that) banner..and started planning what wall in the living room I could hang them on. Someone help me! WAHHHHHH. I'm not 12 anymore...sheesh. :P You sure there isn't a program?? | s3://commoncrawl/crawl-data/CC-MAIN-2020-45/segments/1603107892710.59/warc/CC-MAIN-20201026234045-20201027024045-00064.warc.gz | CC-MAIN-2020-45 | 597 | 1 |
http://jmdseasonal.xyz/archives/10277 | code | Awesomenovel 净无痕 – Chapter 2183 – Cultivation highfalutin shoes share-p3
Novel–The Legend of Futian–The Legend of Futian
Chapter 2183 – Cultivation pop berserk
That probably involves him obtaining cultivated considerably.
The Legend of Futian
“Given the fact that sacred continues to be was included with you, it started to be clear that a destinies were definitely intertwined, also there was indeed no need for that you return it. Given that the cultivators from the Shangqing Site are so brutal because of their approach, we have no reason to enjoy good with him or her. Just are available below in order to learn from the sacred continues to be from this point on out. If anything would occur, it’d be simple to nip it from the bud with time at the same time,” the learn then said to Ye Futian.
His vision were actually closed up as he sat underneath the tree. The foliage and divisions swayed the way it surrounded him. Rumbles continued to become observed from inside his body system as he ongoing to clad in divine lightweight.
That you will find like truly getting a G.o.dlike tool in one’s fingers.
“Teacher, I have been seeing them the main time. They may be performing okay, as well as the excel at has actually been educating us likewise,” Fang Cun smiled and replied. The son was significantly more respectful to Ye Futian than how he had been. And also that admiration was real, as well as boy was indeed less naughty than how he once was.
Moreover, the master was truly another person out of your world. Ye Futian obtained previously introduced the sacred remains in an effort to return it. It turned out also evident the fact that excel at who acquired governed the sacred stays didn’t drive the sacred continues to be, when he wouldn’t have enable Ye Futian provide that body system out if not.
Ye Futian sat cross-legged beneath the medieval shrub within the community. Xia Qingyuan was not miles away, along with the bird flew around lazily. The 4 little ones solemnly surrounded Ye Futian. The world checked like some surreal pulling, seeking extremely quiet, relaxing, and delightful.
He been curious about if what he was seeing was indeed not the truth.
“Given that the sacred remains to be was included with you, it grew to be noticeable that your destinies had been intertwined, and there was indeed no need for one to return it. Given that the cultivators in the Shangqing Sector are incredibly challenging with regards to their technique, then we have no reason to engage in wonderful together. Just occur on this page if you want to gain knowledge from the sacred is still from this point on out. If anything were to come about, it’d be simple to nip it during the bud at some point too,” the expert then thought to Ye Futian.
It was subsequently said that the first choice on the Nanhai Clan went into solitude to heal from his personal injuries the moment he delivered.
“Matters with the realm of cultivators are not as easy as you thinking they might be. Cultivators looked for the very best level attainable, where there was a conflict between G.o.ds occurring in ancient times. When it comes to boundaries on me now, recognize that during the present morning, everything you see might not exactly sometimes be a fact, let alone what actually transpired in the past. You’ll be able to get to learn such things when you’ve attained a unique length,” the excel at thought to Ye Futian.
“Thank you, become an expert in.” Ye Futian bowed into the expert. The way he found it, the learn appeared to have grown to be much more unexplainable, in which he was incapable of see from the learn at all.
It didn’t take very long for those high quality cultivators from throughout the Shangqing Sector to depart, with solely those of the old royal group of Duan other powering.
The cultivators of Some Nook Metropolis saw everything that transpired and ended up all in awe, hoping all the more intensely they will could educate inside the Village.
Next fight, no other cultivation causes with the Higher Nine Heavens, the Site Chief’s Manor incorporated, would certainly dare to perform anything against those out of the Town so easily or thoughtlessly. That meant it could be a whole lot better for villagers to project outside from then on out.
Ye Futian was sensation rather unsettled, questioning just what the facts powering the fail in the Divine Direction was and that which was taking place , with the concept of cultivators at present.
In line with the villagers, the learn was around for a quite, very long time. However, no-one actually realized the length of time. It was quite possible that the expert was as old as the town themselves.
“Sure. Don’t slack off within your coaching.” Ye Futian smiled while he spoke in their eyes. After ability to hear exactly what the master informed him, it could appear to be that this planet was more difficult than what he possessed imagined. Additionally, with pushes such as Darkish Court becoming on the move, they might have to fight a battle for a range significant enough to engulf your entire Divine Prefecture.
In the event the day arrived, Three Nook Continent would naturally be incredibly profitable, and also there was no chance one would overlook the chance such as that.
It didn’t take long for your high quality cultivators from everywhere in the Shangqing Domain to go out of, with just those of the medieval noble group of Duan leftover regarding.
Duan Tianxiong took his leave, and everyone sent back on the town. The sacred remains to be ended up handled by the grasp and headed to your non-public university. Ye Futian was summoned by the expert as soon as he given back, and then he visited the school on top of that. The sacred is always place on the area without making transferring. It seemed like he was completely beneath the master’s management.
Just after figuring out precisely how surreally highly effective the grasp was, he arrived at understand why the youngsters out of the town have been all so highly effective, simply being born having an apt.i.tude for those Fantastic Course, destined to a cut on top of the some others. Each of them experienced incredibly frightening probable.
The learn was practically invincible for having the capability to manipulate the powers of these sacred remains to be.
The four of those acquired developed a lot, and the way they found it, issues evolved every single day.
Having said that, not one of that seemed to have everything to do with Ye Futian. | s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296944452.74/warc/CC-MAIN-20230322180852-20230322210852-00027.warc.gz | CC-MAIN-2023-14 | 6,555 | 29 |
https://semaphoreci.com/docs/deploying-to-aws-lambda.html | code | Amazon Web Services (AWS) is a set of cloud services that help you manage your web applications, servers, databases and more. AWS Lambda is a compute service to which you can upload your code, and then the service can run the code on your behalf using AWS infrastructure.
Semaphore Classic has a built-in integration which makes continuous deployment to AWS Lambda very easy. This guide shows you how you can set it up and assumes that you already have an application that is configured on AWS Lambda.
To get started, click on Set Up Deployment on your project page on Semaphore Classic.
There are two deployment strategies on Semaphore: "automatic" and "manual".
Automatic means that a deploy will be triggered after every passed build on the selected branch. In addition, you can also manually deploy any build from any branch at any time.
The Manual strategy requires the manual selection of the builds to deploy.
For automatic deployment, you will be asked to select which branch will be automatically deployed after each passed build.
Note: You can easily change the deployment strategy from server settings at any time once the setup is complete.
In this step, you need to choose from which branch you wish to deploy your application.
On the following screen, enter your AWS credentials. If you need help getting these credentials, consult the "Retrieving Security Credentials" section of Semaphore's tutorial on deploying a web application on Elastic Beanstalk. The process for retrieving credentials is the same when deploying to Lambda.
After entering the credentials, select the region your application resides in on the same screen. This will enable Semaphore to list the functions in the region you specified.
Next, you can choose the Lambda function to which you wish to deploy your code. Also, there are suggested commands for installing dependencies in your project. This is needed because Lambda needs all the source files of the packages you use in your project.
In this step, you need to provide a name for your server, which can be any name of your choice. It will be used on your Semaphore Classic dashboard and deployment timeline. During this step, you may also choose to set a server URL for quick access on Semaphore.
The setup is now complete - you are ready to automatically deploy to Lambda. All you need to do is click on Deploy.
You can view which environment variables are exported during deploy to Lambda, together with some common AWS environment variables.
Semaphore Docs are open source — Edit on GitHub | s3://commoncrawl/crawl-data/CC-MAIN-2021-31/segments/1627046153491.18/warc/CC-MAIN-20210727202227-20210727232227-00036.warc.gz | CC-MAIN-2021-31 | 2,539 | 16 |
https://cms.brownleefamily.us/news/Server-Issues/ | code | It has taken me a while. In May I have a hard drive failure on the web server that triggered a replacement. Because it was the system/boot drive, I had to reinstall the OS and reconfigure it. About this time the other server started acting up, and the drive that holds all of the website pictures started going off line, and had to be replaced. That server OS then needed reinstalling.
During this whole process I learned where I have problems in my backup strategy. Any text in the websites was now gone, as that was stored in the database I was not backing up.
I have better documented my install process (if I have to do this again), and now backup all important files including the database. I now store the last 14 days of all backups, too.
I still have a little bit of organizing and titling, but pretty much everything is at least to the level of what I have before. | s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474594.56/warc/CC-MAIN-20240225071740-20240225101740-00525.warc.gz | CC-MAIN-2024-10 | 873 | 4 |
https://www.experts-exchange.com/questions/28846179/Get-Last-5-matches-out-of-Fixtures-table.html | code | I have a table called "GamesTable"
Columns are ID, Date, PlayerName, GamesWon,GamesLost,GamePlayed( this has always value 1)
Now I want to make a query to get the average of games won/Lost and the sum of Games Played for every player BUT in his last 5 matches. I have no idea how I can get the last 5 matches for each and every player out of the GamesTable.
Can you help me with this? | s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376827175.38/warc/CC-MAIN-20181216003916-20181216025916-00169.warc.gz | CC-MAIN-2018-51 | 384 | 4 |
https://www.experts-exchange.com/questions/24299083/Symantec-LiveUpdate-blocked-by-ISA2004.html | code | I have an SBS2003 SP2 Premium install with ISA2004 that is running Symantec Endpoint Protection v11.0.4. My LiveUpdates have stopped working. When I monitor ISA2004 for denied connections, I see requests from Symantec servers denied with unidentified IP traffic.
I am not sure what has changed. This was working.
Anyone have any ideas? | s3://commoncrawl/crawl-data/CC-MAIN-2018-22/segments/1526794867417.71/warc/CC-MAIN-20180526112331-20180526132331-00232.warc.gz | CC-MAIN-2018-22 | 335 | 3 |
https://dunotomegemubobin.supportselschools.com/linear-correlation-and-regression-analysis-book-9829bd.php | code | 2 edition of Linear correlation and regression analysis. found in the catalog.
Linear correlation and regression analysis.
|Series||Land use and built form studies technical notes series B:statistical packages for urban research -- 1|
Instructions for rural enumerators
In the Carpenters Worship (In the Carpenters Workshop)
Summary of the second five-year plan, 1967-1971
Rabash-the social writings
Coping with stress in the helping professions
A scattering of daisies
Heroes of our revolution
The economics of planning
Better marketing and cheaper money for agricultural development.
The Governors Commission on the Future of Mature Industries
compendium of Asian energy efficiency success stories
For those in peril on the quay
Linear Regression & Correlation. If you are looking for a short beginners guide packed with visual examples, this book is for you. Linear Regression is a way of simplifying a group of data into a single equation.
For instance, we all know Moore’s law: that the number of transistors on a computer chip doubles every two years/5(65). Linear Regression & Correlation.
If you are looking for Linear correlation and regression analysis. book short beginners guide packed with visual examples, this book is for you. Linear Regression is a way of simplifying a 4/5. In Correlation and Regression Analysis: A Historian's Guide Thomas J. Archdeacon provides historians with a practical introduction to the use of correlation and regression analysis.
The book concentrates on the kinds of analysis that form the broad range of statistical methods used in the social sciences. It enables historians to understand and to evaluate critically the quantitative analyses. Abstract. This chapter gives some concepts of correlation and regression analysis.
Correlation comes prior to regression analysis. It starts with the concept of simple correlation coefficient; which gives the degree of linear relationship between two : Manoranjan Pal, Premananda Bharati.
Methods of Correlation and Regression Analysis, Linear and Curvilinear. By Mordecai Ezekiel, Karl A. Fox. Read preview. Excerpt. Thirty years have elapsed since the original edition of this book was written--years of political tensions and upheaval and of enormous progress in technical development.
This last has been reflected in changes in. E: The Regression Equation (Exercise) Testing the Significance of the Correlation Coefficient The correlation coefficient tells us about the strength and direction of the linear relationship between x and y. However, the reliability of the linear model also depends on how many observed data points are in the sample.
Linear Regression Analysis, Second Edition, revises and expands this standard text, providing extensive coverage of state-of-the-art theory and applications of linear regression analysis. Requiring no specialized knowledge beyond a good grasp of matrix algebra and some acquaintance with straight-line regression and simple analysis of variance Reviews: In correlation analysis, we estimate a sample correlation coefficient, more specifically the Pearson Product Moment correlation coefficient.
The sample correlation coefficient, denoted r, ranges between -1 and +1 and quantifies the direction and strength of the linear. Given below is the scatterplot, correlation coefficient, and regression output from Minitab.
Figure Scatterplot of volume versus dbh. Pearson’s linear correlation coefficient iswhich indicates a strong, positive, linear relationship. However, the scatterplot shows a distinct nonlinear Linear correlation and regression analysis. book.
Regression Analysis: volume. State the three assumptions that are the basis for the Simple Linear Regression Model. The Simple Linear Regression Model is summarized by the equation \[y=\beta _1x+\beta _0+\varepsilon\] Identify the deterministic part and the random part.
Is the number \(\beta _1\) in the equation \(y=\beta _1x+\beta _0\) a statistic or a population parameter. Linear regression, also known as simple regression, is a statistical concept often applied to economic and psychological data.
While regression analysis seeks to define the relationship between two or more variables, in linear regression -- a type of regression analysis -- there are only two: the explained variable, represented by y, and the explanatory variable, represented by x.
A correlation or simple linear regression analysis can determine if two numeric variables are significantly linearly related.
A correlation analysis provides information on the strength and direction of the linear relationship between two variables, while a simple linear regression analysis estimates parameters in a linear equation that can be used to predict values of one variable based on.
CHAPTER 9. SIMPLE LINEAR REGRESSION variable each time, serial correlation is extremely likely. Breaking the assumption of independent errors does not indicate that no analysis is possible, only that linear regression is an inappropriate analysis.
Other methods such as time series methods or mixed models are appropriate when errors are File Size: KB. Simple Linear Regression Model 1 Multiple Linear Regression Model 2 Analysis-of-Variance Models 3 2 Matrix Algebra 5 Matrix and Vector Notation 5 Matrices, Vectors, and Scalars 5 Matrix Equality 6 Transpose 7 Matrices of Special Form 7 Operations 9 Sum of Two Matrices or Two Vectors 9.
how to apply correlation and regression statistical data analysis techniques to investigate the variables affecting phenomenon of employment and unemployment. There are many terms that need introduction before we get started with the recipes. These notions allow us. Correlation analysis and simple linear regression are described in detail in a module for the introductory biostatistics course (Link to the biostatistics module on Correlation and Regression) and correlation analysis using the "R" statistic package is covered in a separate module (Link to the R module on Correlation and Regression).
Correlation is described as the analysis that allows us to know the relationship between two variables 'x' and 'y' or the absence of it. On the other hand, the Regression analysis predicts the value of the dependent variable based on the known value of the independent variable, assuming that there is an average mathematical relation between two.
This volume presents in detail the fundamental theories of linear regression analysis and diagnosis, as well as the relevant statistical computing techniques so that readers are able to actually model the data using the methods and techniques described in the book.
It covers the fundamental theories in linear regression analysis and is extremely useful for future research in this area. The important point is that in linear regression, Y is assumed to be a random variable and X is assumed to be a fixed variable.
In correlation analysis, both Y and X are assumed to be random variables. Possible Uses of Linear Regression Analysis Montgomery () outlines the following four purposes for running a regression analysis.
Description. 3 Simple Linear Regression Regression analysis is a collection of statistical techniques that serve as a basis for draw- Correlation form, Notes prepared by Pamela Peterson Drake 5 Correlation and Regression Simple regression 1. Regression is the analysis of the relation between one variable and some other variable(s), assuming a linear relation.
Also referred to as least squares regression and ordinary least squares (OLS). YThe purpose is to explain the variation in a variable (that is, how a variable differs from. Correlation is described as the analysis which lets us know the association or the absence of the relationship between two variables ‘x’ and ‘y’.
On the other end, Regression analysis, predicts the value of the dependent variable based on the known value of the independent variable, assuming that average mathematical relationship.
To summarize, Correlation is a specific procedures from a larger family of regression procedures. Regression procedures scrutinise the relationship between two or more sets of paired variables. Correlation and regression analysis are linked in a way.
Christensen: Linear Models for Multivariate, Time Series, and Spatial Data Christensen: Log-Linear Models and Logistic Regression, Second Edition Creighton: A First Course in Probability Models and Statistical Inference Dean and Voss: Design and Analysis of Experiments du Toit, Steyn, and Stumpf: Graphical Exploratory Data Analysis.
CHAPTER 6: AN INTRODUCTION TO CORRELATION AND REGRESSION CHAPTER 6 GOALS • Learn about the Pearson Product-Moment Correlation Coefficient (r) • Learn about the uses and abuses of correlational designs • Learn the essential elements of simple regression analysis • Learn how to interpret the results of multiple regression • Learn how to calculate and interpret Spearman’s r, Point.
This will give you a summary output as below. Step 4: Analyse the result. Multiple R: Here, the correlation coefficient iswhich is near to 1, which means the Linear relationship is positive.
R Square: R Square value iswhich means that 77% of values fit the model P-Value: Here, P-value is E, which is very less than.1, Which means IQ has significant predictive values.
Chapter 12 Correlation and Regression r = 1 n Σxy −xy sxsy where sx = 1 n Σx2 −x2 and sy = 1 n Σy2 −y2. (Note that r is a function given on calculators with. In this Video We Will Discuss Correlation and Regression and Regression Introduction & Basics by Chandan Poddar Sir at Grooming Education Academy 𝐓𝐡𝐞 𝐜𝐨𝐦𝐩𝐥𝐞𝐭.
The main goals of the book are to teach the concepts, best practices, model specification, interpretation, assumptions, problem solving, avoiding common traps, and so on for regression analysis.
In short, I want readers to learn the skills for using regression. Step 7: To get the difference between the predicted values and actual values to check the box of “Residuals.” Step 8: Click on the OK; we will have the below analysis.
The first part of the analysis is “Regression Statistics.” Multiple R: This calculation refers to the correlation coefficient, which measures the strength of a linear relationship between two variables.
Correlation is a statistical tool used to measure the degree to which two variables fluctuate with reference to one another. These variables should have cause and effect relationship. The concept of correlation can be classified into several broad categories like positive and negative, simple and multiple, partial and total, and linear and non-linear.
Simple Linear Regression and Correlation Menu location: Analysis_Regression and Correlation_Simple Linear and Correlation. This function provides simple linear regression and Pearson's correlation.
Regression parameters for a straight line model (Y = a + bx) are calculated by the least squares method (minimisation of the sum of squares of deviations from a straight line). This. The correlation coefficient, r Correlation coefficient is a measure of the direction and strength of the linear relationship of two variables Attach the sign of regression slope to square root of R2: 2 YX r XY R YX Or, in terms of covariances and standard deviations: XY X Y XY Y X YX YX r s s s s s s r.
What is Regression. Regression is a method for finding the relationship between two variables. Specifically, we will look at linear regression, which gives an equation for a “line of best fit” for a given sample of data, where two variables have a linear relationship.A straight line can be described with an equation in the form of where is the gradient of the line and axis, and linear.
Results: A linear regression analysis predicted average week 5 death count to be with a 95% CI: ). Similarly, week 6 death count, in spite of a strong correlation with input variables, did not pass the test of statistical significance. Using auto-regression technique and using week 5 death count as input the linear regression model.
Linear regression and correlation can help you determine if an auto mechanic’s salary is related to his work experience. (credit: Joshua Rothhaas) Professionals often want to know how two or more numeric variables are related.
For example, is there a relationship between the grade on the second math exam a student takes and the grade on the. In statistical modeling, regression analysis is a set of statistical processes for estimating the relationships between a dependent variable (often called the 'outcome variable') and one or more independent variables (often called 'predictors', 'covariates', or 'features').
The most common form of regression analysis is linear regression, in which a researcher finds the line (or a more complex. The post explains the principles of correlation and regression analyses, illustrates basic applications of the methods, and lists the main differences between them.
The regression analysis gives the model Duration $=+$ Drop. a) Explain what the slope of the line says about how long a roller coaster ride may last and the height of the coaster. b) A new roller coaster advertises an initial drop of feet.
Whereas, the regression analysis is used to get function relationship between the two variables to make the further projections of the events. Still, you are not able to understand the basic difference between these two terms that are correlation vs regression; then, you can get our experts to help on the same.
In regression, we want to maximize the absolute value of the correlation between the observed response and the linear combination of the predictors. We choose the parameters a 0,a k that accomplish this goal.
The square of the correlation coefficient .Regression Analysis: A Complete Example This section works out an example that includes all the topics we have discussed so far in this chapter. A complete example of regression analysis. PhotoDisc, Inc./Getty Images A random sample of eight drivers insured with a company and having similar auto insurance policies was selected.Solution for Answer the following problem based on the concept of Linear Correlation and Regression.
Do not round off to the process of computing it but on the. | s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656104683708.93/warc/CC-MAIN-20220707063442-20220707093442-00223.warc.gz | CC-MAIN-2022-27 | 14,265 | 62 |
http://helixpedia.wikia.com/wiki/Lore_interpretations | code | The following pages contain 'lore', interpretations of certain in-stream events by the community. While certain interpretations are considered universal and important enough to have a place in an article proper, these are either unimportant, controversial, selective, et cetera. As such, they should be taken with a grain of salt.
These pages are not included under the maintenance and review that we attempt to ensure most pages of the TPPedia Wiki have; as such, these pages are solely the responsibility of those who feel like contributing to them and thus are not the responsibility of the Wiki. Despite the preceding warnings, we do allow these interpretations as subpages because we would like to cover as much of the community lore as possible. This has been debated and we believe that a subpage system would be the best solution.
Users are free to contribute as they wish; however, TPPedia Wiki is not a forum nor a showcase for art and writing. Those who edit here are expected to contribute to Wiki at least as much or more as they do here. Keep that in mind.
The pages that can be found here are as follows:
Unofficial lore interpretationsEdit
- Totodilyn, a Totodile from a intermission playthrough between FireRed and Platinum of Pokémon Mystery Dungeon, was considered by most to be the son of Lazorgator. | s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500549423723.8/warc/CC-MAIN-20170721062230-20170721082230-00194.warc.gz | CC-MAIN-2017-30 | 1,321 | 6 |
https://www.mql5.com/en/docs/standardlibrary/datastructures/carrayobj/carrayobjassignarray | code | Compares the array with another one.
[in] Pointer to an instance of the CArrayObj class used as a source of elements to copy.
true - successful, false - cannot copy the elements.
If the receiver array is not empty when calling AssignArray, then all its elements will be removed; and if the memory management flag is set, the memory used for the deleted elements will be released. The receiver array becomes an exact copy of the source one. Additionally, see CArrayObj::AddArray(const CArrayObj*). | s3://commoncrawl/crawl-data/CC-MAIN-2018-43/segments/1539583517376.96/warc/CC-MAIN-20181023195531-20181023221031-00341.warc.gz | CC-MAIN-2018-43 | 496 | 4 |
https://www.clubsnap.com/threads/camera-lens-servicing-when-to-do-it.1438455/ | code | There is no fixed schedule and servicing plan for cameras and lenses. We can only guess about the driving factors of these 'some photographers'. Two possible reasons could be:
- Recent exposure to very harsh conditions (dusty, wet, cold) require a cleaning and thorough check
- Prophylactic check before important assignments / trips to avoid equipment failures
For hobbyists, the simple rule is: get if fixed if it's broken. Or of the manufacturer has issued a service recall..
'Some like to send' sounds like a hobby. Generally a rule of thumb to send in for me is after a trip , especially after the camera has been exposed to harsh weather (eg: seawater splash onto my camera while I was seated on a small boat trying to shoot seagulls once)
If not if it's not broken , don really need to send it in.
Another guide some of my friends do for peace of mind is annual send in just for a clean up (sensor etc) and a checkup at the same time & these are people who use their cameras nearly on a daily basis. | s3://commoncrawl/crawl-data/CC-MAIN-2018-30/segments/1531676590329.25/warc/CC-MAIN-20180718193656-20180718213656-00000.warc.gz | CC-MAIN-2018-30 | 1,006 | 7 |
http://whywontgodhealamputees.com/forums/index.php?action=karmamessage;u=559;topic=25332;m=575388;start=0;sort=time;asc | code | How can time and space exist without Existence?
I don't know.
That's a good start. The logical priority of existence is a straightforward proposition: in order for anything to be said to exist
, there must be a state of "existence", just as there must be a state of "heat" in order for anything to be said to be warm (or, indeed, cold), or a liquid state in order for anything to be said to be wet, etc.
It's also not immediately obvious why it's a good idea to suppose that "nothingness" (there being nothing; nonexistence) is some kind of default state of reality, not least because it raises a pretty epic question of how, from nonexistence, there came to be anything at all. | s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917123491.79/warc/CC-MAIN-20170423031203-00640-ip-10-145-167-34.ec2.internal.warc.gz | CC-MAIN-2017-17 | 678 | 5 |
https://github.com/battery-lcf/battery-archive-sandbox | code | Battery Lifecycle (BLC) Framework
The Battery Lifecycle (BLC) Framework is an open-source platform that provides tools to visualize, analyze, and share battery data through the technology development cycle, including data from material characterization, cell testing, manufacturing, and field testing. The BLC framework provides users with a unified view of their data that they can use to optimize materials and cell configurations, validate cell performance under application conditions, and mitigate manufacturing variations and field failures. BLC has four components: data importers, one or more databases, a front-end for querying the data and creating visualizations, and an application programming interface to process the data. BLC supports multiple users with different access permissions. Instead of building the system from the ground up, we developed BLC around Redash, a robust open-source extract-transform-load engine. BLC has been deployed for two applications: (i) tracking the development of a single battery technology from the lab to a manufacturing line and systems installed in the field, and (ii) comparing studies of multiple cells of the same battery chemistry and configuration. The latter implementation is publicly available at www.BatteryArchive.org.
The code and documentation in this repository can be used to build and operate a site like batteryarchive.org.
The detailed installation steps are included in the blc_Installation_steps.pdf file in the repository.
To learn more about the design of the software, read our paper available online at https://ecsarxiv.org/h7c24/
For more information, contact us at [email protected].
Copyright 2021 National Technology & Engineering Solutions of Sandia, LLC (NTESS). Under the terms of Contract DE-NA0003525 with NTESS, the U.S. Government retains certain rights in this software. | s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100626.1/warc/CC-MAIN-20231206230347-20231207020347-00651.warc.gz | CC-MAIN-2023-50 | 1,870 | 7 |
http://docs.embarcadero.com/products/rad_studio/delphiAndcpp2009/HelpUpdate2/EN/html/delphivclwin32/Variants_EVariantBadIndexError.html | code | EVariantBadIndexError is the exception class for errors that occur because a variant array index is out of bounds.
EVariantBadIndexError = class(EVariantError);
class EVariantBadIndexError : public EVariantError;
EVariantBadIndexError is raised when an operation on a variant array fails because an index value is out of bounds.
Copyright(C) 2009 Embarcadero Technologies, Inc. All Rights Reserved.
What do you think about this topic? Send feedback! | s3://commoncrawl/crawl-data/CC-MAIN-2019-30/segments/1563195529276.65/warc/CC-MAIN-20190723105707-20190723131707-00546.warc.gz | CC-MAIN-2019-30 | 449 | 6 |
https://www.studypool.com/questions/242130/urban-green-assemblages | code | ant and green city.pdf This commentary refers to the article titled "Urban Green Assemblages: An ANT View on Sustainable City Building Projects" by Anders Blok.
This article helped me better understand ANT theory by providing contrasts between assemblage urbanism (which follows ANT theory) and typical urban studies. According to Blok, the city is a de-centered object when analyzed with ANT theory. The city is an assemblage of "situated techniques and flows" that promotes a more holistic (or ecological) approach to the city. Thus, ANT theory is a less human-centered approach to city planning and development; it stresses "urban materiality, natures and non-humans".
Additionally, a city, according to ANT, is considered "local" or "global" not by fixed geographical coordinates, but by the scale of its impact. This is an important component to analyzing the city on a more holistic scale because big cities can have little global impact in specific realms (such as sustainability), while smaller cities can have a much broader approach. The example city, Nordhavn, is not the most well-known city in the world, but has one of the largest and most innovative approaches to sustainability in the world. In this case, local decision making has a large, global impact that affects those far beyond its city limits.
The one question I had from the article derives from the statement that ANT does not focus on overarching and all-encompassing power structures, such as "global neoliberal capitalism". Why does ANT not focus on this aspect? When one attributes a city's behaviors and patterns to an overarching force such as capitalism, is this a blanket statement (taking a one-size-fits all approach)? So, instead we should focus on the nuances that differentiate city structures, such as localized project sites? By taking a more localized approach, to my best understanding, we would be employing the urban assemblages approach (that has an ecological, more holistic focus) in contrast to the urban studies approach (which is human-centered). Do you think ANT is missing an important component to city analysis when not including overarching influences such as neoliberal capitalism? | s3://commoncrawl/crawl-data/CC-MAIN-2018-26/segments/1529267866191.78/warc/CC-MAIN-20180624024705-20180624044705-00529.warc.gz | CC-MAIN-2018-26 | 2,188 | 4 |
https://www.nber.org/papers/w12180 | code | Peer Effects in European Primary Schools: Evidence from PIRLS
We estimate peer effects for fourth graders in six European countries. The identification relies on variation across classes within schools. We argue that classes within primary schools are formed roughly randomly with respect to family background. Similar to previous studies, we find sizeable estimates of peer effects in standard OLS specifications. The size of the estimate is much reduced within schools. This could be explained either by selection into schools or by measurement error in the peer background variable. When we correct for measurement error we find within school estimates close to the original OLS estimates. Our results suggest that the peer effect is modestly large, measurement error is important in our survey data, and selection plays little role in biasing peer effects estimates. We find no significant evidence of non-linear peer effects.
We thank David Autor, Per-Anders Edin, Edwin Leuven, Eric Maurin, Sandra McNally, Matt Pritsker, Kjell Salvanes, and Gylfi Zoega for helpful comments. Ammermueller gratefully acknowledges financial support from the Fritz Thyssen Foundation under the project %u201CBildungschancen zwischen Grundschule und Sekundarstufe%u201D and would like to thank the Center for Economic Performance for their hospitality during his stay in London, during which the main work on this paper was completed. | s3://commoncrawl/crawl-data/CC-MAIN-2020-45/segments/1603107912807.78/warc/CC-MAIN-20201031032847-20201031062847-00616.warc.gz | CC-MAIN-2020-45 | 1,420 | 3 |
https://oar.a-star.edu.sg/communities-collections/articles/17797 | code | In this report, we present the technical details of our approach to the EPIC-KITCHENS-100 Unsupervised Domain Adaptation (UDA) Challenge for Action Recognition. The EPIC-KITCHENS-100 dataset consists of daily kitchen activities focusing on the interaction between human hands and their surrounding objects. It is very challenging to accurately recognize these fine-grained activities, due to the presence of distracting objects and visually similar action classes, especially in the unlabelled target domain. Based on an existing method for video domain adaptation, i.e., TA3N, we propose to learn hand-centric features by leveraging the hand bounding box information for UDA on fine-grained action recognition. This helps reduce the distraction from background as well as facilitate the learning of domain-invariant features. To achieve high quality hand localization, we adopt an uncertainty-aware domain adaptation network, i.e., MEAA, to train a domain-adaptive hand detector, which only uses very limited hand bounding box annotations in the source domain but can generalize well to the unlabelled target domain. Our submission achieved the 1st place in terms of top-1 action recognition accuracy, using only RGB and optical flow modalities as input. | s3://commoncrawl/crawl-data/CC-MAIN-2021-39/segments/1631780056890.28/warc/CC-MAIN-20210919125659-20210919155659-00190.warc.gz | CC-MAIN-2021-39 | 1,255 | 1 |
https://hskhsk.pythonanywhere.com/cidian?expand=yes&q=%E4%B9%BF | code | Character: radical 乙, 11 strokes
archaic variant of 亂|
archaic variant of 治[zhì]|
mì, fine silk/Kangxi radical 120
Yāo/yāo, [么], surname Yao, youngest/most junior/tiny/one (unambiguous spoken form when spellin...
yà, component in Chinese characters/archaic variant of 毫[háo]/archaic variant of 乙[y...
zhǎo, "claw" radical in Chinese characters (Kangxi radical 87)
Look up 乿 in other dictionaries
Page generated in 0.002085 seconds
If you find this site useful, let me know! | s3://commoncrawl/crawl-data/CC-MAIN-2021-39/segments/1631780057558.23/warc/CC-MAIN-20210924140738-20210924170738-00611.warc.gz | CC-MAIN-2021-39 | 494 | 10 |
http://forums.xbox-scene.com/index.php?showtopic=734295&st=15 | code | Joined: 7-August 11
Member No.: 456099
It didnt work... I'm confused.
I burned HeXen with IMGburn using on a DVD-R PLATINUM disk with speed 2X. First i burned it on my laptop and also tried it on my desktop. They both didnt work. Also burned Auto Installer Deluxe 4.0 same story, it freezes at boot screen.
I also burned Xbox Ultimate boot disk, but this one did boot. I saw a blue screen: UnleashX detected a new harddisk. Want to format it. And i just agreed. Now it says formatting Drive C:// but i dont realy have the feeling that something is actually happening... I dont hear my HD making noises... | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368707440258/warc/CC-MAIN-20130516123040-00097-ip-10-60-113-184.ec2.internal.warc.gz | CC-MAIN-2013-20 | 604 | 5 |
https://movadex.com/blog/article/node-js-vs-python-selecting-the-ideal-backend-tech-for-2024 | code | Choosing between Node.js and Python is a common decision in web development. It's about finding developers for a specific technology and selecting the right one for your project.
Selecting the proper backend technology is crucial for your project's success. It affects performance, resource usage, deployment ease, scalability, and overall project outcomes.
In this article, I'll explain the advantages, disadvantages, and situations where you should use each technology, drawing from my experience as a Chief Technology Officer.
What is Node.js?
Key Node.js Features
1. Non-blocking I/O Model: Node.js enables it to process multiple requests concurrently, making it highly efficient and performant for I/O-intensive tasks like real-time applications, data streaming, and APIs.
2. Single-Threaded: This means it can handle multiple requests seamlessly without the overhead of context switching between threads. It leads to better resource utilization and overall speed.
4. Massive Package Ecosystem (npm): Node.js has access to the largest open-source software repository in the world, the Node Package Manager (npm). It offers over 1.3 million reusable packages, containing modules for almost any task or functionality. This simplifies development and accelerates time to market.
5. Built-in Web Server: This allows you to create web applications and APIs without the need for external servers like Apache or Nginx.
2. Data Streaming Apps: As I mentioned before, Node.js manages efficient data transfer and processing without blocking operations. That’s why this stack is ideal for file uploads/downloads, audio/video streaming, IoT data processing, and real-time analytics.
3. Real-Time Apps: Node.js handles high concurrency, low latency, and persistent connections effectively. That’s why this stack is ideal for chat apps, live dashboards, collaboration tools, and streaming services.
4. Microservices Architecture: Node.js's modular and lightweight nature makes it conducive to building microservices.
1. Single-Threaded Nature: Node.js is single-threaded, which means it processes one task at a time. While efficient for I/O-bound tasks, Node.js can struggle with CPU-intensive operations due to its single-threaded nature. This can become a bottleneck for computationally demanding applications. For example, real-time transcoding, video editing, and high-resolution streaming can strain the single thread, impacting latency and quality.
2. Callback Hell and Readability: Managing callbacks in complex applications can lead to nested structures known as "callback hell" or the "pyramid of doom," making code harder to read and maintain.
3. Debugging Challenges: Specialized tools and techniques are often necessary to effectively pinpoint issues.
4. Not Ideal for CPU-Intensive Tasks: Applications heavily reliant on complex calculations or data manipulation may perform better with other technologies.
What is Python?
Python is a high-level, general-purpose programming language known for its clarity, versatility, and user-friendliness. Python is often used on Google's App Engine and is praised for its many libraries and tools that developers worldwide use and update. Let's take a closer look at what makes Python great and where it might have some downsides as we compare it to Node.js.
Its extensive community, rich libraries, and broad support across platforms make it an ideal programming language for businesses tasked with developing applications for various and sometimes unrelated purposes.
Key Python Features
1. English-like keywords: Python uses keywords like
def that are easy to understand and remember. Also, Python's syntax is designed to be easily readable and intuitive, resembling natural language. It uses whitespace indentation for code blocks, eliminating the need for curly braces or semicolons, and making code visually cleaner and more organized.
2. Extensive Standard Library: Python comes with a vast collection of pre-written modules and functions, covering a wide range of tasks from file I/O to web interactions, math, networking, and more.
3. Dynamic Typing: This stack automatically infers the data type of variables at runtime, saving development time and reducing code verbosity.
4. Cross-Platform Compatibility: Python code can be run on Windows, macOS, Linux, and other platforms without needing any modifications.
5. Object-Oriented Programming (OOP): This stack supports OOP concepts, enabling you to create modular, reusable code structures that model real-world entities.
1. Versatility and General-Purpose Nature: Python's flexibility means it's well-suited for a wide range of tasks, from web development and data science to scripting and automation.
2. Rapid Prototyping: Python's concise syntax and dynamic typing make it well-suited for rapid prototyping. Also, clear code structure and indentation help identify and fix bugs quickly.
3. Open Source: Python is an open-source language, meaning it's free to use and modify. Also, numerous free and open-source IDEs and development tools are available for Python, making it an accessible and cost-effective choice for anyone.
4. Data Science and Machine Learning: Python is widely used in data science and machine learning due to libraries like NumPy, pandas, and sci-kit-learn. Its simplicity and extensive support for mathematical and statistical operations make it a preferred language in these domains.
2. Runtime Errors: For instance, Node.js employs type inference and strict mode, frequently detecting errors in advance, thus averting runtime occurrences. In contrast, Python, lacking explicitly declared types, may defer bug identification until runtime, introducing complexity to the debugging process.
3. Not ideal for CPU-intensive tasks: The single-threaded nature of Python can pose a bottleneck for computationally demanding applications. Tasks involving complex calculations, real-time rendering, and scientific simulations may exhibit better performance when implemented in other languages.
4. Immature Ecosystem for Certain Functions: For example, libraries like OpenCV and PyTorch offer image processing and computer vision functionalities, but for robotics-specific tasks like motion planning or control algorithms, Python might not have as many established options as languages like ROS.
Key Differences: Node.js vs Python
In this segment, I'll delve into the fundamental distinctions between the two programming languages and guide you on when to opt for each. Additionally, if you wish to explore projects utilizing specific stacks, you can visit our portfolio and navigate to the "Technology" section. There, you'll find showcases of our development and design endeavors.
Before delving into a comparison and declaring which one boasts superior architecture, let's take a closer look at each, providing a more detailed overview.
Node.js is single-threaded, but it employs an event-driven model to handle concurrent operations. Node.js follows an event-driven architecture, utilizing an event loop to handle asynchronous operations efficiently. Its non-blocking I/O model allows the server to handle multiple concurrent connections without waiting for each operation to complete. So it’s well-suited for applications with high concurrency and real-time features, such as chat applications, gaming servers, and streaming services.
Also, Node.js is designed for horizontal scalability, allowing the distribution of tasks across multiple processes or machines.
Python supports threading for concurrent execution, but due to the Global Interpreter Lock (GIL), true parallelism is limited. But Python supports multiple programming paradigms, including procedural, object-oriented, and functional programming.
Python's architecture allows developers to choose between synchronous and asynchronous programming paradigms. So it’s well-suited for a broad range of applications, including web development, data science, and automation.
But if we look at the main differences, we can break them down into these points:
- Concurrency: Node.js excels in handling concurrent requests and I/O-bound tasks, while Python's GIL can hinder true multithreading.
- Execution Speed: Node.js is generally faster for I/O-bound tasks due to its event-driven model and V8 engine, while Python's interpreter can be slower for CPU-intensive tasks.
- Standard Library: Python's extensive standard library offers a wider range of built-in functionalities.
Considering these features, we can conclude that Node.js is more versatile. However, this doesn't mean Python is significantly inferior. It really depends on the nature of your project. Here's where Node.js excels and where Python shines:
- Real-time applications (chat, gaming, collaboration tools)
- I/O-bound tasks (file I/O, network requests)
- Data streaming applications
- Microservices architectures
- Data analysis and scientific computing
- ML and AI
- Automation and scripting
- Rapid prototyping
- Web development frameworks like Django or Flask
- General-purpose programming tasks
The scalability of both Node.js and Python often depends on the nature of the application and its unique scalability needs. Let's delve into a more general overview of their scalability characteristics.
Node.js is designed with horizontal scalability in mind, making it well-suited for scenarios where the application's load can be distributed across multiple servers or processes. Additionally, the event-driven, non-blocking I/O model of Node.js allows it to efficiently handle numerous concurrent connections, contributing to its scalability for applications with high concurrency. However, the Global Interpreter Lock (GIL) can limit multi-core utilization in Python extensions, requiring careful management or alternative approaches.
Python provides versatility in scalability approaches, allowing developers to choose between synchronous and asynchronous programming paradigms. Asynchronous programming can enhance scalability for certain types of applications. However, Python can be slower than compiled languages for CPU-intensive tasks, necessitating optimization techniques or offloading to external services.
When scaling an application, even marginal efficiency improvements contribute to lowering operating costs. Faster code execution leads to quicker response times.
Python is generally considered slower than compiled languages as it is an interpreted language. However, Python's speed can be improved using optimization techniques and leveraging libraries written in C or other compiled languages.
Hence, when it comes to speed, Node.js emerges as the winner.
When it comes to libraries, both Node.js and Python boast extensive ecosystems that cater to a variety of development needs.
Node.js leverages npm (Node Package Manager), a robust repository with over 1.3 million packages. Additionally, notable libraries include:
- Express.js: API and web app development.
- Socket.io: real-time communication in applications like chat and gaming.
- Mongoose: streamlines database interactions.
Python's PyPI (Python Package Index) hosts a diverse collection of over 300,000 packages. Additionally, notable libraries include:
- Django: MVC development.
- NumPy and pandas: data science and numerical computing.
- TensorFlow and PyTorch: deep learning libraries for artificial intelligence.
Hence, there's no clear winner; each excels in its respective domain. Node.js shines in web development, while Python takes the lead in data science and ML.
Node.js vs Python: A Comprehensive Comparison Table
I've outlined the key factors to help you choose the right stack. Additionally, I've put together a comprehensive comparison table for you to consider other aspects and make an informed decision. If you're still unsure, don't hesitate to reach out to me at [email protected], and I'll assist you. Also, if you need developers for outsourcing or outstaffing, please mention it in your email. We have skilled developers proficient in both Node.js and Python.
Node.js, with its non-blocking I/O model, speed, and extensive package ecosystem, excels in real-time applications, data streaming, and microservices. On the other hand, Python, known for its clarity and versatility, is a preferred choice for data science, machine learning, and general-purpose programming.
The architectural differences, scalability considerations, speed comparisons, and library ecosystems were thoroughly examined. Ultimately, the choice between Node.js and Python depends on the specific requirements of your project.
If you need further assistance or are looking for developers for outsourcing or outstaffing, feel free to reach out to me at [email protected]. We have experienced developers proficient in both Node.js and Python, ready to contribute to the success of your project. | s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947473738.92/warc/CC-MAIN-20240222093910-20240222123910-00241.warc.gz | CC-MAIN-2024-10 | 12,839 | 76 |
https://stackoverflow.com/questions/9728946/localstorage-data-persistence?noredirect=1 | code | I recently discovered that it's possible for the user to clear HTML5's
localStorage value, which caused me to wonder... exactly how persistant is
localStorage? If Flash crashes and wipes all my cookies, would I lose my localStorage data? What if my local cache was cleared to make way for a browser update?
I've seen this answer, but it doesn't address browser crashes, updates, cache clearing, etc. Is
localStorage really and truly permanent, as the aforementioned answer seems to mantain? | s3://commoncrawl/crawl-data/CC-MAIN-2019-26/segments/1560627999964.8/warc/CC-MAIN-20190625233231-20190626015231-00307.warc.gz | CC-MAIN-2019-26 | 490 | 5 |
https://www.pcmag.com/article2/0,2817,1996645,00.asp | code | For Microsoft, the coming days of Black Hat Briefings hacker scrutiny in Las Vegas could make or break its claim that Windows Vista is the "most secure operating system ever."
The software maker will use the August 2-3 security conference to showcase a wide range of security features and functionality being fitted into the successor to Windows XP.
But even as the Redmond, Wash., company's hype machine swings into high gear, independent researchers worry that the venerable hacker powwow is being reduced to a glorified product demo for a rich sponsor.
"You're not going to learn much from a Microsoft talk. They're basically there to do a Vista demo and tell the IT guy that they've made it harder to break," said Marc Maiffret, chief hacking officer at eEye Digital Security, in Aliso Viejo, Calif.
For Maiffret and other Black Hat Briefings veterans, the inclusion of Microsoft on the agendaan entire day of tracks dedicated to Vista securitydilutes a conference known for the controversial release of zero-day exploits and hacking tools, discussions on novel software cracking techniques and lively debates on flaw disclosure, privacy, defense mechanisms and industry trends.
"It'll be interesting to see how far Microsoft will go to market Vista, but I don't think anyone's going there to listen to Microsoft talk about how great a job they did," Maiffret said in an interview with eWEEK.
Read the rest of this eWEEK story: "Vista, Rootkits Headline Hacker Confab" | s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886104636.62/warc/CC-MAIN-20170818121545-20170818141545-00686.warc.gz | CC-MAIN-2017-34 | 1,472 | 7 |
https://play.google.com/store/apps/details?id=edu.uta.cse.gropg&referrer=utm_source%3Dappbrain | code | This Application Uses System Crash reporting and System Log Files and help developers to find device Specific Bugs and Code Tracing.
It is Debugging service for Developers having great functionality like :-
* colorful tag names
* Easy to read and share on Email,Skype and attachments
* Search Bar for finding Application specific tracing
* Recording facility (with having a widget)
* save to SD card and Read from SD card
* Scroll feature available
* Search Autosuggestion & saving Filters
* Select feature for Specific part of logs
*Completely Ad-Free Application
I made this app for myself to help me debugging my own apps. If you have any troubles, mail me.
I made this tool for practice purpose and my own use.
※This tool is not usb driver.Please install usb driver if you can't connect device and pc.Usually you can download it from device vendor's site.
I got inquiry,so add notes.
At first, I try to make this tool as widget which can toggle USB Debug settings directly if you touch it.But I don't adapt it because it's not recommended way from Android 1.5. So I choose normal Activity which just finishes after calling Settings UI.
WiFi ADB makes it easy to debug/test your Android apps directly on device via WiFi TCP/IP connection. No need to use USB cable. After enabling ADB over WiFi, to connect your computer to the device open the console and run
adb connect ip_address_of_the_device
This app works on ROOTED devices only. If you don't know what it means or your device is not rooted please don't install. Users also need to grant this app su permission when being asked.
★ Quickly enable/disable ADB connection over WiFi TCP/IP
★ Auto-enable ADB over WiFi on configured known SSIDs
★ Once enabled an entry is added to ongoing notification bar to remind user that ADB over WiFi is active and make it easy to disable it manually
★ The app icon can be put on status bar at all time for quick access (better than home screen widget, IMO)
★ Temporarily increase screen-off timeout. Nine times out of 10 this is what users want during development of an Android app and testing it on device. The original screen timeout value is restored when ADB over WiFi is disabled again.
★ Temporarily lock WiFi, prevent it from going into sleep mode (how effectively it works depends on device and Android version)
★ Also acts as Tasker/Locale plugin. You can configure Tasker/Locale to automatically turn on/off WiFi ADB based on other conditions
★ If your development computer is Unix/Linux or Mac open a console and run
while true ; do adb connect phone_ip_address ; sleep 15 ; done
This one-liner auto-reconnects to ADB daemon on the phone every time the link is broken for whatever reason.
★ If you control the WiFi router, configure it to give the phone the same IP address every time. Then assign a local DNS hostname to that IP address so that you don't have to type an IP address which changes everytime in the console.
This app requires in-app purchase permission. This is for users to make donations to the app developer. Donations are voluntary and in fact do not add any extra features. But if you want to say thank-you with your wallet, you can. (Thanks!)
The most useful feature in Device Debug is the ability to share the collected information via e-mail or by writing it to a file.
Device Debug is useful application for developers who need to find out the device specifications or debug application crashes. Just install Device Debug and inspect the information, or share it and inspect the information on another device!
Device Debug uses the following PERMISSIONS:
READ_LOGS - Required for reading the device log
CAMERA - Required for reading the camera parameters
WRITE_EXTERNAL_STORAGE & READ_EXTERNAL_STORAGE - Required for writing the information to a file
When you connect the phone to your laptop or computer, the application automatically starts. Then you can easily turn on developer options by clicking: Start USB DEBUG.
- CheckBox for auto start USB Debug. Will allow you to decide whether the application starts when you connect your phone to your computer.
- Automatic transition to USB Debug.
- Application was tested on android 4.0 to 4.4.
DroidDebugger intended for debugging java programs on android devices without a computer. It makes sense to use it, along with programming environments like Android java editor, JavaIDEdroid, AIDE - Android Java IDE, DroidDevelop. An additional feature is an internal "adb over wifi" for non-rooted devices with Android 2.2-3.2.
There are two methods for setting before running DroidDebugger:
1. For devices(rooted and not rooted) with Android 2.2-3.2.
Disable "USB debugging" from the menu Applications -> Development.
You may need to reboot the device.
2. For devices(rooted) with Android 2.2-4.0.
Enable Adb over WIFI and set port 5555.
How to work with DroidDebugger:
1. Start DroidDebugger.
2. Run the application, which will be debugged.
3. Click the Refresh button and select the desired application from the list.
4. Click the Attach button.
5. If successful attaching to the application will display a message:
Initializing jdb ...
6. You can now enter the command for "JDB" in the input line and click "Exec command".
Using various JDB commands - http://droiddebugger.blogspot.com/2012/05/droiddebugger.html
* ROOT REQUIRED!
* PLEASE MAKE SURE USB DEBUGGING IS ENABLED!
** APPEXTRACTOR WAS DESIGNED / TESTED USING CLOCKWORKMOD RECOVERY - HOWEVER THE LATEST VERSION WILL ALLOW YOU TO SET AN ALTERNATE NANDROID BACKUP LOCATION. PLEASE LET ME KNOW THE RESULTS VIA EMAIL IF TESTING WITH ALTERNATE RECOVERIES.
AppExtractor is a tool which will allow you to restore individual applications, data, SMS, and MMS messages from your ROM Manager backups.
AppExtractor is compatible with ClockworkMod Recovery 5 backups as well as backups created by previous versions of ClockworkMod Recovery.
This version of AppExtractor is free, but limits you to restoring 5 applications at a time. You can purchase the AppExtractor Key to remove this limitation and be receive future options that will be added.
Before giving this app a bad rating, please send me the details of any issues that you may be having and I will work on them. :)
* If you have any feature requests, please let me know!
* ROOT required *
* busybox required *
Debug your SQLite Databases.
Debug your Shared Preferences.
Try to hack your own app via changing settings.
Browse all your installed apps, see every setting-file, the app uses.
Browse, inspect and debug SQLite databases and shared preferences files.
Kill the app, quick uninstall the app, or even quick clear the files.
Start viewing the content of the file / database simply by clicking the button with the given filename.
Easily change the values of the shared prefs.
NOTE: all values are typesafe!
Delete a preference entry, simply by using the "swipe to dismiss" pattern.
Or delete the whole shared prefs file.
Raw query the SQLite databases (eg SQL statement over several tables)
Long click the table / index / trigger / view to see the create statement
Edit / Delete / Copy a row simply by selecting the desired row and use the actionbar options (menu options)
- supports multiple delete rows (by long click)
Add a new row from scratch.
NOTE: all values are typesafe!
Select columns you want to see.
Create a custom order.
check license via Google Licensing:
Differences Pro - Lite:
- Kill app
- Clear data
- Quick uninstall
- Delete shared preferences file
- Save changes to shared preferences
- Delete SQLite database file
- Raw query databases
- Show SQL create statement of the table / index / trigger / view
- Edit / add / copy / delete a table row
If you keep USB Debugging (a.k.a. ADB, i.e. Android Debug Bridge) on and your phone falls into the wrong hands, your privacy is at severe risk. They will be able to unlock your phone, steal your images, emails, passwords and all your data and identity. This app will help you protect against this.
If you found a bug, have any questions or feature requests, please contact me at [email protected]
Here are the functions:
1. USB Debug Warning
It will warn you with a notification whenever you leave your phone/tablet with USB Debugging enabled and don't use it. Simply, it will show a notification when you unplug USB cable and have USB Debugging setting enabled. It may also open Developer Options instantly when you unplug the USB cable (instant action is off by default, turn it on in the app).
2. USB plugged when USB Debug is off
The purpose of this function is to help you turn USB Debugging ON quickly when you want to test your app on your phone. The app will show notification which, when clicked, will open Developer Options, or even open Developer Options instantly for you when you plug the USB cable in (instant action is off by default, turn it on in the app).
Please note that Android apps on non-rooted devices cannot change the USB Debug setting automatically (for security), so you have to do it always on your own, manually. This app will make your task easier, and will make sure you remember to turn off USB Debugging when it is not needed.
Debug your apps. Find error stacktraces. See what your phone is saying about you behind your back. It's all there in the system log, aka logcat!
What makes CatLog stand out over similar apps?
* Color-coded tag names
* Easy-to-read column display
* Real-time search
* Recording mode (with widget)
* Save & open from SD card
* Send logs as email or attachment
* Auto-scrolls when at the bottom of the screen (just like tail -f)
* Search autosuggestions & saved filters
* Select parts of logs
* Open-source and ad-free
Using this app you don't need to manually enter the settings for development, as the application will do it for you automatically. Additionally, you can choose whether to display the Developer options. It can be displayed only when you connect your device to USB, as well as both connect and disconnect your device.
This is a TCP debugging tools by WiFi. It is very good to help you to test your serial debugging.
Your just need connect your hardware device and your mobile device( a mobile phone or a tablet) with WiFi.
First,install the APK on your mobile device.
Second,connected your hardware devices to a computer.
Third, open the computer debugging assistant and WiFi Debugging Assistant.
Fourth,for the network configuration,enter IP address and iport ,then connect it.
Fifth,send instructions for debugging.
- Fix bug Forcing close.
*** More new feature is coming very soon.
+ For user does not know how to authentication with Twitter:
There are a text box on the top. Please try to login first they you will see a serial number. Put in to the box and click ">>" button. Thank ericavila03.
+ For user keep seeing forcing close:
Please follow step below:
Go to Settings -> Applications -> Manage Applications -> Find the app: Snaio-Social Network All In One ->
Click clear Data -> Then Click Uninstall. Then download it again. Thank ericavila03.
SNAIO: Social Networking All In One
Developing a generic social networking service
Integrates information from all plugged social networking services
Features Implemented so far in SNAIO are:
Ability to authenticate with facebook and twitter by using OAuth method. In OAuth method username ad passwords do not need to be saved on local Android device.
Ability to fetch status updates from facebook and twitter and, and show them on SNAIO screen. Each of the updates is associated with their related icon from either Facebook or Twitter. New updates from facebook and twitter will be shown on SNAIO automatically without users’ integration.
Ability to fetch photo updates from facebook wall, and show them on SNAIO wall.
Ability to fetch comments on shared posts and images and show them on the screen.
Ability to show the timestamp (date and time) and duration related to each of the posts, images, and comments.
Ability to show the number of likes for each of the posts, images, and comments.
Providing a friendly environment for SNAIO user to update personal status. This update will be transferred to both twitter and facebook walls.
Providing a friendly environment for SNAIO users to post their comments on friends’ or personal status or Image updates. These comments will be transferred to Facebook or Twitter walls too.
Providing a tool for a user to “like” a shown post. • Ability to show the name of the related users (owners of the posts, comments or comments) in a bold and colorful font.
Setting the screen background color for SNAIO to a white color. • Setting the comments background with a blue color, to make it look different from the posts.
Ability to show the profile picture for any of the shown posts, comments, pictures.
All updates on SNAIO wall are sorted with their associated timestamps.
Snaio on Google Code Project: http://code.google.com/p/snaio/downloads/list
Snaio on Getjar http://www.getjar.com/mobile/45988/snaio/ | s3://commoncrawl/crawl-data/CC-MAIN-2015-27/segments/1435375096293.72/warc/CC-MAIN-20150627031816-00168-ip-10-179-60-89.ec2.internal.warc.gz | CC-MAIN-2015-27 | 12,977 | 151 |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.