url
stringlengths 13
4.35k
| tag
stringclasses 1
value | text
stringlengths 109
628k
| file_path
stringlengths 109
155
| dump
stringclasses 96
values | file_size_in_byte
int64 112
630k
| line_count
int64 1
3.76k
|
---|---|---|---|---|---|---|
https://nodejspedia.com/en/knowledge-base/5123533/how-can-i-uninstall-or-upgrade-my-old-node-js-version- | code | some time ago I have installed node.js on my Ubuntu system. with the following steps (dump of my history):
309 git clone git://github.com/joyent/node.git 310 cd node/ 311 ./configure 312 make 313 ls -l 314 node 315 sudo make install
My Version is v0.3.2-pre.
Please, is there a clean way to get a new version by uninstall/install or upgrade? I have not much experience with make or git.
Do the exact same thing again. The new binary will be copied over the old one.
git clonecreates a copy of git repository node's source code is in
cd node/changes directory to the one you just created with those files
./configurechecks for dependencies and creates a makefile
makeexecutes that makefile, which results in compiling the source code into binary executable(s), libraries and any other outputs
ls -llists the files in the current directory
nodebinary executable you just compiled from source, to ensure the compilation was successful
sudo make installcopies the files you just created from the current directory to their permanent homes, /usr/local/bin and such
The last step overwrites whatever's already there with what you just built.
curl http://npmjs.org/install.sh | sh
npm install -g n
n is a node version manager. It does all the work for you. It installs and switches to the version you specify, or just switches if you already have it installed.
Note: If you're having trouble installing stuff due to permissions, don't use sudo. Enter this command once to set your user account as the owner of the
/usr/local/ directory, so that you can just issue normal commands in there without sudo. It's a more sane alternative.
sudo chown -R $USER /usr/local | s3://commoncrawl/crawl-data/CC-MAIN-2020-45/segments/1603107904834.82/warc/CC-MAIN-20201029154446-20201029184446-00387.warc.gz | CC-MAIN-2020-45 | 1,656 | 19 |
https://jeffkemponoracle.com/2019/08/no-primary-key-item-has-been-defined-for-form-region/ | code | “No Primary Key item has been defined for form region”
Otherwise reported as “WWV_FLOW_FORM_REGION.NO_PRIMARY_KEY_ITEM” or merely “Internal error”, this bug caused me to waste hours of investigation, twice, because a simple Google search was not returning any results. This post is merely to remedy that situation.
On an APEX 19.1 page with a new Form region combined with an Interactive Grid region, when the user makes a change to a record and Submits the page, they get this error.
This is caused by bug 29612553 – FORM REGION DML PROCESS THROWS INTERNAL ERROR WHEN INTERACTIVE GRID DML PROCESS IS ON THE SAME PAGE and fixed by APEX patch 29369869. | s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100583.31/warc/CC-MAIN-20231206063543-20231206093543-00202.warc.gz | CC-MAIN-2023-50 | 665 | 4 |
http://filesharingtalk.com/threads/38688-Should-I-Be-Scared | code | In the last time many users were catched by the police in Germany because they downloaded some MP3 files from Kazaa
A friend of mine said, that Kazaa-lite doesn't transfer the IP-Adress. Is it true?
I really don't want into trouble. That would by quite expensive
please answer me | s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988719564.4/warc/CC-MAIN-20161020183839-00063-ip-10-171-6-4.ec2.internal.warc.gz | CC-MAIN-2016-44 | 279 | 4 |
http://theitscapegoat.blogspot.com/ | code | We hear the term all the time, but do you really know a Scapegoat is?
According to Webster's dictionary, it is a person who is unfairly blamed for something that others have done.
In the IT world, the computer or server or software or <fill in the blank> is often blamed when something goes wrong for the user. The IT gets a call from that user and it generally means that the world has come to end. No one can work and nothing can get done.
I've been in that situation many many times. With this blog, i hope to have a place to write down the solutions that I find and help minimize down times on all of our systems.
For more information on scapesgoat, check Wikipedia. http://en.wikipedia.org/wiki/Scapegoat | s3://commoncrawl/crawl-data/CC-MAIN-2018-30/segments/1531676589726.60/warc/CC-MAIN-20180717125344-20180717145344-00160.warc.gz | CC-MAIN-2018-30 | 709 | 5 |
https://www.keio.ac.jp/en/press-releases/2019/Sep/27/49-63327/ | code | Which Way will Cells Move Next? ― Predicting the Future Direction of Cell Movement with AI―
September 27, 2019 Keio University
Sanyo-Onoda City University
A group comprising Mr. Shori Nishimoto (at the time), Associate Professor Akira Funahashi, Mr. Yuta Tokuoka, and Research Associate Takahiro Yamada of the Keio University Faculty of Science and Technology, Department of Biosciences and Informatics, and Professor Noriko Hiroi of the Sanyo-Onoda City University developed an AI system that can predict the future directions of cell movement from current cell images. The AI does this by taking advantage of a property of cells that cause them to change shape before migrating. As a result, it was shown that when future directions of cell movement of mouse fibroblast cells, etc., were classified into 4 directions (upper left, upper right, lower left, and lower right), the implemented AI could make predictions with an accuracy of 80% or higher. Furthermore, when features of the images learned by the AI were examined, it was found that predictions of future directions of cell movement were based on cell protrusions known to form at the leading edge of the cells when they migrate and the characteristic shape of the cell trailing edge, clarifying that the AI was making predictions based on biological evidence. These results show that AI is useful for predicting future states from current cell images, and applications are expected in fields such as medical care, where the diagnosis and prognosis of cancer, etc., strongly require future predictions.
The outcomes of this research were published in the online version of the academic journal PLOS ONE on September 4 (Wed.), 2019 (US time), ahead of its publication in the printed version of the same journal.
For further information, please refer to the following PDF file. | s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656104683020.92/warc/CC-MAIN-20220707002618-20220707032618-00533.warc.gz | CC-MAIN-2022-27 | 1,840 | 6 |
https://blog.founddrama.net/2005/12/custom-menu-bar-timedate/ | code | A handy little tip over at CreativeBits re: customizing the time/date stamp format in your OS X menu bar. It takes a little playing around to really make it work right. The “catch” (at least as I observed it) was that you need to:
- Copy what you want from Date
- Paste it into the “Medium” length time
- …and then go back to System Preferences > Date & Time > Clock to turn off (for example) the AM/PM indicators or switch to 24-hour time or turn off the day of the week.
But a good tip nonetheless!
currently playing: Camea “Brooklyn By Tunnel” (yes, a SheJay.net download!) | s3://commoncrawl/crawl-data/CC-MAIN-2021-25/segments/1623487635920.39/warc/CC-MAIN-20210618073932-20210618103932-00295.warc.gz | CC-MAIN-2021-25 | 590 | 6 |
https://discuss.konghq.com/t/unable-to-log-request-body-in-the-logfile-even-after-using-pre-function-plugin/11863 | code | I want to log the request body along with other logs for my service and route. I have enabled file-log plugin through which i can gather logs for that specific service. But i do not get request body inside the log files. So i have enabled pre-function plugin for that service and route using CLI and after that i am getting some logs but they are logged in error.log file along with other logs which is not proper.
I want to log request body for all my requests for that service and route in the separate logfile which i have created and configured inside file-log plugin. Can we add / configure settings in pre-function plugin to log request body in separate logfile also.
plz help, any kind of details is appreciated. | s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474482.98/warc/CC-MAIN-20240224012912-20240224042912-00267.warc.gz | CC-MAIN-2024-10 | 719 | 3 |
https://sydney.startups-list.com/startups/test_and%20measurement | code | Data as a service.
Simple, custom web scraping tools for researchers, growth hackers, marketing & sales teams.
Selenium cloud at your fingertips
Web apps have gotten hard and only going to get more complex and more critical. Being able to ship them fast and bug free becoming important in a battle for users who have many choices and extremely meticulous. However, testing is hard, time consuming and non-core. Do ... | s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320300658.84/warc/CC-MAIN-20220118002226-20220118032226-00395.warc.gz | CC-MAIN-2022-05 | 417 | 4 |
https://www.phphelp.com/t/detecting-automation-on-website-pages/30647 | code | This has come up in my life right now and I’m just wondering if anyone here has a solution to this. I’m not talking about robots here, but rather spammers who are using any and every piece of software to automate the crawling of a website’s pages and search for ways to send their company info to the website owner, regardless of whether they capture a phone number in a DIV, an email address in a textbox, or actually complete a contact form and submit it.
I did this many years ago by automating the document object model through use of visual basic for applications in excel. I used the “internetexplorer.exe” object. I know for a fact that google has had the capability to detect the kind of stuff I was doing for many years and deny search results due to the detection. same thing goes for their searches denying someone results who’s using the TOR browser.
Are there any open source resources to detect this sort of thing? The business owner got a very long contact form submission message that was thrown into the element of an HTML form today. any and all comments welcome. thanks guys! | s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579251776516.99/warc/CC-MAIN-20200128060946-20200128090946-00404.warc.gz | CC-MAIN-2020-05 | 1,106 | 3 |
http://www.gap-system.org/ForumArchive/Waki.1/Katsushi.1/Re__memo.3/1.html | code | I had same problem.
I do not know the size of memory of your AIX.
AIX has some kind of memory protection.
My AIX has memory more than 1G .
So when I add next line in gap4r2/bin/rs6000-ibm-aix220.127.116.11-cc/Makefile
then I could do
gap -m 974M
and it worked.
Note : if you set larger memory size which your machine has then
AIX system will stop.
Katsushi Waki ++ Hirosaki University ++ | s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267156311.20/warc/CC-MAIN-20180919220117-20180920000117-00398.warc.gz | CC-MAIN-2018-39 | 387 | 11 |
http://acronymsmeanings.com/acronym-meanings/2031973/acronym-abbreviation-meaning-of-exemplo3 | code | The acronym Exemplo3(2) means :
The abbreviation Exemplo3 stands for: (2)
Exemplo3 (2) means:
Like to add another meaning or definition of the acronym/abbreviation Exemplo3?
Exemplo3 abbreviation means:
E: Meaning of E in the acronym Exemplo3 means: The letter E has three branches of equal lenghts. These all extend from it's left side. The equal lenghts show a degree of fairness to the outside world. They extend outwards indicating a willingness to learn, think broadly and be more vigorous in understanding. B also implies endowed with good writing abilities, eloquence, resourcefulness. It displays a unique artistic nature and strong enthusaism to get out and know more.
x: Meaning of x in the acronym Exemplo3 means:
e: Meaning of e in the acronym Exemplo3 means:
m: Meaning of m in the acronym Exemplo3 means:
p: Meaning of p in the acronym Exemplo3 means:
l: Meaning of l in the acronym Exemplo3 means:
o: Meaning of o in the acronym Exemplo3 means:
3: Meaning of 3 in the acronym Exemplo3 means:
Acronyms, abbreviations and meanings similar to Exemplo3
Popular questions of Exemplo3 people search before coming here
Q: What does Exemplo3 stand for? A: Exemplo3 stands for "".
Q: How to abbreviate ""? A: "" can be abbreviated as Exemplo3.
Q: What is the meaning of Exemplo3 acronym? A: The meaning of Exemplo3 acronym is "".
Q: What is Exemplo3 abbreviation? A: One of the definitions of Exemplo3 is "".
Q: What does Exemplo3 mean? A: Exemplo3 as abbreviation means "".
Q: What is shorthand of ? A: A common acronym of "" is Exemplo3.
DWPE means: Distorted-wave (with) Polarization (and) Exchange
DTS means: Danger To Shipping (in Reference To Particularly Large Patients)
KAPL means: KSC Approved Parts List
POAK means: Passed Out At Keyboard
FARECONRON means: Fleet Air Reconnaissance Squadron | s3://commoncrawl/crawl-data/CC-MAIN-2018-22/segments/1526794866894.26/warc/CC-MAIN-20180524224941-20180525004941-00172.warc.gz | CC-MAIN-2018-22 | 1,806 | 26 |
https://fpg.unc.edu/publications/ssip-phase-i-roadmap | code | Vinh, M., Lucas, A., Taylor, C., Kelley, G., & Kasprzak, C.
This document provides a description of the activities involved in the development of the SSIP (SPP/APR Indicators C11 and B17) due to OSEP on April 1, 2015. The roadmap is intended to support states with completing Phase I of the SSIP process. Questions to consider are provided to help states with planning and implementing and links to existing resources to support the development of the SSIP are included.
Vinh, M., Lucas, A., Taylor, C., Kelley, G., & Kasprzak, C. (2014). SSIP phase I roadmap. Chapel Hill: The University of North Carolina, Frank Porter Graham Child Development Institute, Center
for IDEA Early Childhood Data Systems. | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337668.62/warc/CC-MAIN-20221005203530-20221005233530-00010.warc.gz | CC-MAIN-2022-40 | 702 | 4 |
https://passante.wordpress.com/category/culture/ | code | I was going to write about spam (the e-mail kind) but since I couldn’t bring myself to put out my own money for a can of the stuff (the pseudo-food kind) to photograph, I went to the Hormel Spam(R) Web site to grab a picture and got sidetracked. You’re greeted with the Spam song (no, I’m not joking) and if you wait about 30 seconds, there’s animation. In fact there’s a lot of animation on the site and a veritable treasure trove of links. I decided against consulting “What is Spam?” It used to show up on the lunch menu when I was in elementary school (usually as rubbery pink slices but sometimes in fritters), and I’d as soon not know what, along with a week’s worth of sodium, they were inflicting on hapless children.
There is a whole Spam subculture, much of it tongue-in-cheek, but not all, I suspect. There’s a Spam Museum (admission free), a Spam Fan Club, and a Spammobile that tours the country giving out free samples. There are Spam festivals, most notably the annual Austin, Texas Spamarama, which has been going on since 1978. And of course there’s a Spam store with a huge variety of items with which you can show your allegiance to the product. A Spam pig clock or timer for the kitchen, pillows (think how nice they’d look on your couch), a mouse pad, a collector’s spoon, a Spam emery board, Spam wine glasses for the truly elegant table setting, a Spam three-legged pig (don’t ask). The link to the Adult category didn’t work, which is probably just as well, since the thought of a Spam G-string and pasties is not enticing. It was hard to choose, but my favorites were the glow-in-the dark Spam stadium cup, scrunchy, and boxer shorts. I always figured that the chemicals in Spam made you glow in the dark, and now you can accessorize to match.
The surprise for me is that Spam doesn’t stop at the pink rubber I was forced to eat at school, now known as Spam Classic. There are 11 other varieties, including Spam Garlic, for the more sophisticated palate; Spam Low Sodium and Spam Lite, for those concerned with healthy eating; and Spam spread (remember that one for your next cocktail party).
There’s obviously more to Spam than Monty Python skits. I’m not tempted to give it another try, though. I’m a vegetarian. | s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600400219221.53/warc/CC-MAIN-20200924132241-20200924162241-00512.warc.gz | CC-MAIN-2020-40 | 2,277 | 4 |
https://forum.radxa.com/t/great-new-os-for-rockpi4c-twisteros-armbian/4938/40 | code | It doesn’t work with TwisterOS Armbian beta 2 yet. Only with Armbian-Reforged V1.0.
OK. I will try with Reforged and then tell you what happens. Sorry my english.
Edit: reforged also doesn’t boot from my nvme.
debian 9 boots without problems
How are you trying to boot over nvme?
Hello, thanks for answering. I tried all of the following:
*dd Armbian Reforged image with dd in microsd: it works
*dd ArmbianReforged image to nvme: it didn’t work
*multiboot script TwisterOS to nvme: did not work (extlinux file missing)
*multiboot script TwisterOS to nvme with function -t --extlinux-conf-file: also not working, but I’m not sure if I used the script well, because I was playing randomly with the position of the commands without getting anything at all.
I tried all these combinations but none worked:
sudo make_multiboot_dev.sh -d /dev/nvme0n1 --root-size 25000 -i TwisterOSArmbianV1-0-beta2.img -t – extlinux.conf
sudo make_multiboot_dev.sh -d /dev/nvme0n1 --root-size 25000 -t --extlinux.conf -i TwisterOSArmbianV1-0-beta2.img
sudo make_multiboot_dev.sh -d /dev/nvme0n1 --root-size 25000 -t --extlinux-conf-file -i TwisterOSArmbianV1-0-beta2.img
sudo make_multiboot_dev.sh -d /dev/nvme0n1 --root-size 25000 --extlinux-conf-file -i TwisterOSArmbianV1-0-beta2.img
sudo make_multiboot_dev.sh -d /dev/nvme0n1 --root-size 25000 -i TwisterOSArmbianV1-0-beta2.img
sudo make_multiboot_dev.sh -d /dev/nvme0n1 --root-size 25000 -i TwisterOSArmbianV1-0-beta2.img --extlinux-conf-file
sudo make_multiboot_dev.sh -t --extlinux-conf-file -d /dev/nvme0n1 --root-size 25000 -i TwisterOSArmbianV1-0-beta2.img
Do you think it could work with this link](About multiboot), using the “extlinux-conf-file” option?I have been trying without success.But I am not sure if I am using the extlinux-conf-file option correctly, rather I have tried randomly because I could not find an explanation of how to use that option anywhere.
Monka-Manjaro-XFCE beta1 is here:
- Manjaro ARM 20.12 based
- Chromium Docker with Netflix, Amazon Prime and other streaming services
- 5.9.11-2 kernel
- Tested it and working on RockPi4B, RockPi4C and RockPro64 only.
- Boots from uSD and eMMC
- Kodi and MPV on desktop with HW Panfrost OpenGL 2.1 Mesa 20.2.3
- HW acceleration on desktop and firefox browser
- Several utilities included like Etcher, Emulastation, Wine Desktop.PPSSPP, anbox, amiberry, gparted, whatspp, openGL games, etc etc
- ThemeTwister utility
- Extract downloaded file to get image file.
- Flash image file with etcher or usbimager.
- Under boot partition, locate extlinux folder and edit “extlinux.conf” file to assign respective dtb file to your RK3399 board. Default dtb file is: RockPi4B
- Resize partition after first boot with included Disks utility.
- 32Gb microSD or 32Gb eMMC module required for uncompressed image
For those who wants to try some retro games like Half life and Nuke Dukem 3D that work without X11 and without emulator, They work on RK3326 and RK3399 hardware. Tested it on RockPi4C with Armbian Reforged V1.0. Many thanks @ Kreal from the TwisterOS Team:
Half Life 1:
Introducing RockRiotMenu, a collection of pre-compiled apps and games for RK3399 and RK3326 Hardware.
List of Games included:
- Doom 1
- Eduke32 (Duke Nukem 3d)
- Diablo1 (GOSPA)
Many thanks @kreal from the TwisterOS Armbian team.
A new TwisterOS Armbian beta3 update is about to be released soon. Stay tuned.
Updated: (1-22-2021). TwisterOS Armbian beta 3 is here:
TwisterOS Armbian beta 3:
- A Fully featured fast and lightweight OS for RK3399 SBC’s that works out-of-the-box.
(Currently is better supported on RockPi4B, RockPi4C & RockPro64 boards)
- RK3399 boards w/4Gb RAM and a minimum of 16Gb microSD/eMMC is strongly recommended.
- Armbian focal 20.04.1 LTS aarch64 based
- 5.9.14 Kernel
- XFCE 4.16 DE, XFCE uses Xfwm4 VM
- Latest Panfrost w/ HW acceleration on desktop
- OpenGL 3.1 is also supported with fully updated Mesa 21.1.0
- Kodi and MPV built-in with HW acceleration support
- Docker Container support via Chromium browser for watching streaming services like
Netflix, Amazon Prime, Disney+, Apple TV+, Hulu, Spotify.(requires to manually install a script)
- Theme switcher fully integrated into all themes in Theme Twister App. (Reboot after change required)
- Retro gaming emulators included like PPSSPP, DOSBOX-X, Mednaffe, Mesen, Mupen64Plus, PCSX ReARMed,
Retroarch (Tested functional, but not included), Redream, ScummVM, and many more…
- BOX86 with latest updates included
- uSD and eMMC booting supported. (RK3399 - NanoPi-M4 requires re-seat of HDMI cable on power on due to firmware limitations, and supports MicroSD at this time)
- Several useful apps included on image such as: Steam, Lutris, Discord, My Android,
Wine Desktop, USBImager, LibreOffice suite, Transmission, Gimp, MELD, VLC Player, Audacious, etc.
- 9 OpenGL games are also included for your enjoyment.
- Bluetooth audio is not working
- Kodi repository is missing and needs to be installed manually
(sudo apt install kodi-repository-kodi)
- Docker Container requires to apply some extra steps to fix a no HDMI audio issue.
(Fixed via pavucontrol, and selecting proper output device)
- Download RK3399 image from twisteros.com
- Prepare your storage media for flashing
- Flash image with Balena-Etcher or USBImager
- Edit /boot/armbianEnV.txt file and select correct DTB file that matches your RK3399 board
(Default DTB is RK3399-RockPi4B) | Case sensitive! | Example: rockchip/rk3399-rock-pi-4c.dtb
- After first boot, resize EXT4 partition using Disks utility included
- Default password is: asdasd
- Overclocking and hardware profile support out-of-the-box.
Download it from our main page:
TwisterOS Armbian beta3 supports popular streaming services as Netflix, Amazon Prime and Disney+ via chromium browser.
Just follow easy instructions from github webpage. Many thanks to Monka from twisterOS armbian team for this great docker container:
Known issue: No HDMI audio on Docker Container with Chromium browser
- sudo apt install paprefs
- sudo ln -s /usr/lib/pulse-13.99.1 /usr/lib/pulse-13.99
Make sure after executing paprefs, all settings matches as shown below:
Updated(01-25-2021) First Official Release of TwisterOS Armbian V1.0
Download if from official website:
Hello. Can’t set the screen resolution higher than 1920x1080. I need 1440p. It works with official radxa Deb9 disro only. Pelease help.
If you want to have this screen size on Armbian hardware interface which is very different in its core, you have to support Armbian or hire some kernel developer to make a contribution of your choice to the public software. Someone has to develop / add support for it and its estimated from a few hours to few days of work.
Or use official Radxa hardware interface based OS. You can’t have everything at once.
Updated(02-06-2021): Twister OS Armbian version 1.1.0 update has been released!
There was a Mesa regression that was causing some Visual Artifacts on PPSSPP en mupen64 emulator with PSP and N64 roms. We have a fix for it, Please download it from official TwisterOS website:
Note: Games with box86 and Wine were also affect them. Now after Mesa fix, games such as age of empires 2,dune 2000,diablo 2,warcraft 3 and emperor battle for dune among others are working again.
Version 1.1.0 patch notes:
- Added Mesa driver v20.3 to improve Wine and overall game compatibility
- Added support for EXE file icons and double-clicking to launch with Wine
- Updated PPSSPP launcher & shortcut to use Mesa v20.3
Before Mesa Fix:
After Mesa Fix:
Is it possible to build latest Kodi somehow or add some of the kernel, ffmpeg patches to benefit MPV video playback?
LibreELEC from 20 days ago now includes several Rockchip fixes like
8/10 bit H265, 10-bit H264, experimental VP9, 4K@60hz etc.
We have some Videos of Box86 on RK3399 hardware mostly tested on RockPi4C and RockPro64 boards with TwisterOS Armbian V1.0
BOX86 on RK3399: Warcraft 3 and Warcraft 2 BNE TEST
BOX86 on RK3399: Farcry 1 TEST
BOX86 (and ULTRA64) on RK3399: Killer instinct I & II
BOX86 on RK3399 TEST : Claw (1997) and Mark of the Ninja (2012)
BOX86 on OPI4 (RK3399) : Counter Strike 1.6
PS1/PSX emulator better featured than PPSSPP, runs great too.
Many thanks to Monka from TwisterOS Development team for such great script.
to run/build app:
cd into /duckstation/build-release/bin/ and run it with ./duckstation-qt
set your bios directory and enjoy great a PSX/PS1 emulation
Warcraft 3: Frozen Throne video on RockPi4C: | s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320300289.37/warc/CC-MAIN-20220117031001-20220117061001-00151.warc.gz | CC-MAIN-2022-05 | 8,493 | 113 |
https://community.developer.atlassian.com/t/jira-server-rest-api-basic-authentication/48020 | code | Hello, I am a Java developers and we use JIRA server version 8.4. I am trying to write a simple Java program that need to communicate with JIRA Rest APIs to create and updates list. I have used this example: JIRA REST API Integration | Baeldung, to for Basic Authentication and getting javax.net.ssl.SSLHandshakeException error.
Is Basic authentication deprecated in JIRA Server ?
Is there anything that I am missing or need to do differently? | s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662556725.76/warc/CC-MAIN-20220523071517-20220523101517-00177.warc.gz | CC-MAIN-2022-21 | 443 | 3 |
http://www.oesf.org/forum/lofiversion/index.php/t14500.html | code | I'm getting pretty desperate about getting a wireless access on my c1000 with original sharp rom.
These are the devices that can do wireless i have:
-bluetooth linksys dongle
-cohiba/connexant wifi dongle
any of these have any luck of working with my c1000?
thanks for any help, | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171070.80/warc/CC-MAIN-20170219104611-00517-ip-10-171-10-108.ec2.internal.warc.gz | CC-MAIN-2017-09 | 278 | 6 |
https://vaadin.com/forum/thread/2227639/catch-cookies-as-disabled-error | code | Vaadin lets you build secure, UX-first PWAs entirely in Java.
Free ebook & tutorial.
catch cookies as disabled error
I have a following problem to solve:
1) User starts editing form - lock is created in the database.
2) User clears cookies in web browser - vaddin shows "cookies are disabled" error and reloads application.
Lock still exists in database.
I have successfully deleted lock from database on session timeout error, simply by overriding "close" method in Application. But in case "cookies disabled" error application does not invoke close method. I have checked setLogoutUrl and teminalError but none of those got fired. How should I solve this? Thanks in advance.
If a user disables his/her cookies, then it's just like shutting down the browser -- that user disappears. Hitting the site again with cookies off or cleared won't connect that browser to the previous session, so you just have to wait for something to time out. Instead of doing this in Vaadin, you can also add a session listener to the application and catch the session expiration directly. (You could also programmatically set the session timeout to be smaller once the user starts editing if you'd like.) Let me know if you'd like more info about session listeners, but I may have already given some examples in the forums.
The only alternative I can think of is some sort of other timer that releases the db lock if there hasn't been any activity for a while.
Thanks for answers, I'll try your ideas. | s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446711396.19/warc/CC-MAIN-20221209112528-20221209142528-00540.warc.gz | CC-MAIN-2022-49 | 1,482 | 11 |
https://cape.sh/use-cases/ | code | Use Cases CAPE enables teams and individual developers to close the gaps when it comes to ensuring their Kubernetes applications meet enterprise application requirements. Governance & Compliance Kubernetes (K8s) currently does not have native methods or standard tools for backup and restore, to enforce data management and protection policies. Existing efforts are manual, prone to error and result in higher RTO/RPO. CAPE facilitates stateful application backup and restore. Data is secured at rest and in transit. Backups can be scheduled and automated to meet specific RTO/RPO and data archival requirements. Downtime and potential customer data loss are reduced. Application & Data Loss Application and/or data loss can easily happen during Kubernetes application development due to infrastructure failures, misconfigurations or malicious external attacks. CAPE enables developers to proactively prevent Kubernetes application and data loss without advanced Kubernetes know-how. Multi-Environment Workload and Cluster Mobility Workload and cluster mobility is critical but complicated by environment specific requirements and a lack of standard data management and protection tools. CAPE provides a single platform to securely manage and move data across environments including on-prem, cloud or IoT without requiring in-depth environment knowledge. Multi-Cluster Application Deployment Deployment consistency is critical for enterprise applications. However, application deployment across multiple Kubernetes clusters is not standardized or supported well by existing tools. CAPE standardizes how applications and data are deployed across multiple environments including on-prem, cloud or IoT reducing effort and increasing productivity. Multi-Cloud CI/CD Pipeline Management Kubernetes presents a steep learning curve for developers, with developing in Kubernetes presenting its own challenges. CAPE simplifies building, testing and deploying apps to multiple environments. It manages standard and decoupled deployment pipelines, with in-built support for complex workflows, canary rollouts and blue-green deployments. | s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320304515.74/warc/CC-MAIN-20220124054039-20220124084039-00545.warc.gz | CC-MAIN-2022-05 | 2,125 | 1 |
https://discuss.openedx.org/t/how-to-active-course-discussions-in-tutor-open-edx/10891 | code | I’m new in tutor edx, how to active course discussions in tutor edx please ?
Hi @franck , welcome to the community,
Please attach more details like below So that someone can point you in the exact direction.
- What kind of installation are you using with tutor and tutor version
- What steps followed till now
Did you install the forum plugin? GitHub - overhangio/tutor-forum: This plugin adds discussion forums to your Open edX platform, such that students can have conversations about the courses they are following right in your LMS Hint: you should.
Hello, I finally install an old forum plugin and enable that. That solve my problem. Thanks. | s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100427.59/warc/CC-MAIN-20231202140407-20231202170407-00228.warc.gz | CC-MAIN-2023-50 | 648 | 7 |
https://www.bilibili.tv/en/space/1382050090 | code | Log in to view your "Followed" content.
Momentum (2015) Film Explained in Hindi Summarized हिन्दी
Army Of Thieves (2021) Full Movie Explained in Hindi |moviesm7life
Army of Thieves 2021 Film Explained Summarized
Army of Thieves (2021) movie explained in Hindi | Mysterious movie
Army Of Thieves 2021 Explained In Hindi/Urdu || Hollywood Explaner
Army of Thieves (2021) Film Explained in Hindi/Urdu Summarized
Army of Thieves (2021) Film Explained in Hindi
ARMY OF THIEVES Movie Hindi ( Spoiler Free Review )
Army of Thieves movie explanation
Army of Thieves (2021) Movie Explained in Hindi | Adventure Film Summarized/Reviewed in हिन्दी/Urdu
Bicycle Thieves (1948) Italian Drama Film Explained In Bangla | Cinetube Bangla
Army Of Thieves | Blockbuster Bank Heist Movie | Explain Movies In Hindi
Movie Review : Army of Thieves ( Hindi ) Matthias Schweighofer , Zack Snyder.
Army of thieves movie explained in Hindi | Movie story explained in Hindi | Movie Kahani
Army of Thieves | Breakdown, Review + Ending Explained
Netflix's Army of Thieves Each Safe Explained!
Kahit ANG PINAKASECURE NA BANGKO SA MUNDO AY BASIC SA MAGNANAKAW NATO DAHIL SA |TAGALOG MOVIE RECAPS
Army Of Thieves Movie Explain In English
World's No.1 Thief 🔥😱 l Hollywood Whatsapp Status 🔥 l Boys Attitude Status l Army Of Thieves #shorts
Army Of Thieves (2021) - 1 Min Review | #shorts #shortvideo #tamil #reviews #reels #moviereview
No videos uploaded | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030338073.68/warc/CC-MAIN-20221007112411-20221007142411-00121.warc.gz | CC-MAIN-2022-40 | 1,454 | 22 |
https://community.anaplan.com/discussion/93937/level-2-sprint-3-inv01-confirmed-po-delivery | code | Level 2 Sprint 3 INV01 Confirmed PO Delivery
So I'm having some issues (or more likely a misunderstanding) with my formula for Confirmed PO Delivery.
I'm still at the OFFSET stage & haven't yet got to the POST conversion that I think comes later based on other forum posts.
I'm trying to use:
Confirmed PO Delivery = IF OFFSET(PO Submitted, -Final Shipping Time Weeks, 0) = 0 THEN 0 ELSE 1
In my head this works by saying if x weeks ago I submitted a PO then I should receive it now. This worked fine when just using the default shipping times because they were always the same.
Now that I am trying to use the Override if I submit a PO in Week 1 and change it to Air (1 week shipping) my formula for checking receipt in Week 2 is OFFSETTING based on the 2 weeks default for Road shipping from Week 2
Here is what I'm getting for Confirmed PO Delivery (0, 0, 1, 1) which I know how it is derived, but I don't know how to get this to be (0, 1, 0, 1) using the 1 week shipping in week 1, and 2 week shipping in Week 2 - it's almost like I need the OFFSET to be recursive | s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100258.29/warc/CC-MAIN-20231130225634-20231201015634-00727.warc.gz | CC-MAIN-2023-50 | 1,068 | 8 |
http://blog.evernote.com/tech/2012/12/19/the-evernote-ios-sdk-now-supports-china-service-business-notebooks-introducing-mustafa/ | code | By Mustafa Furniturewala, iOS Engineer at Evernote
For the past 3 years, the platform team at Evernote has been building tools to help iOS developers integrate with our API. Earlier this year, we launched a significant update to our iOS SDK and moved it to GitHub. I am excited to announce another major update this week.
For developers looking to support Evernote users on our Chinese service, Yinxiang Biji, the iOS SDK now natively supports our bootstrapping protocol. In addition, we have built in support for Evernote Business, which will open up interesting opportunities for developers. We’ve also made a number of other changes and additions:
- Utility classes to make it easier to create notes
- Obj-C categories for API’s to make it easier to access business notes and shared notes
- More efficient use of our HTTP Thrift layer
- Sample code to create a photo note
- Sample code for Business API’s
- Sample code for shared notes
- Many bug and memory leak fixes
Roadmap for the iOS SDK
Our goal for the Evernote platform is to support developers building innovative apps. In addition to building an intuitive development experience, I will being working with all the product teams at Evernote (Evernote Food, Evernote Hello, Evernote clients,…) to improve the tools we can offer the community. We are working on adding ARC support and improving the OAuth user experience.
We will continue to build new samples, SDKs, and tools for iOS developers, so stay tuned. We hope to see more iOS apps that sync with Evernote in the upcoming year! Make sure you check out the Evernote Trunk, where we showcase the apps that use the Evernote platform, especially our Trunk iPhone and iPad apps!
If you have any feedback or questions, please don’t hesitate to reach me at [email protected] or @mustafasf.
Mustafa Furniturewala is an iOS Engineer on the Evernote Platform team. He is responsible for the upkeep and architecture of the Evernote SDK for iOS.
Prior to Evernote, Mustafa was a software engineer at Klout and Citrix, working on a variety of projects from audio virtualization to mobile technologies.
@mustafasf • [email protected] | s3://commoncrawl/crawl-data/CC-MAIN-2018-22/segments/1526794867374.98/warc/CC-MAIN-20180526073410-20180526093410-00386.warc.gz | CC-MAIN-2018-22 | 2,163 | 17 |
https://tomee.apache.org/dev/design-classic-assembler.html | code | Design - Classic Assembler
Implementation of Assembler
The standard assembler supported by the OpenEJB team. Uses meta-data supplied via the Configuration Factory to create all components in the system. It is assumed the meta-data has been checked and validated, all links and references will resolve, all classes are present, and all apps compliant. | s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296819089.82/warc/CC-MAIN-20240424080812-20240424110812-00326.warc.gz | CC-MAIN-2024-18 | 350 | 3 |
http://www.capriogroup.com/MaxsTips.asp | code | Is your computer running slower than it used to? Is it acting up or misbehaving? What could be causing it?
Several things can slow down your computer. Malicious software like viruses, worms, trojans, spyware, and adware are often the primary reason for a computer slowdown.
In addition to outside attacks, your system will naturally build up various internal problems. Over time several types of temporary files accumulate in massive quantities and bog down your hard drive. Errors and garbage accumulate in what's called the "windows registry file," slowing you down and sometimes causing bizarre errors. You may never have heard of the registry file, it's the file that your computer uses to keep track of all your hardware, drivers, software information and instructions; if it develops errors and garbage, your whole system starts to fall apart.
Your system has RAM or physical memory in the form of one or more memory sticks. These are usually in multiples of 256MB ranging anywhere from 256MB to several gigabytes of memory. This acts just like your own temporary memory, your computer needs it to process everything it does. When your PC runs out of this memory it slows because it starts to use virtual; memory on your hard drive which is much slower. This is your PC's back up plan, it is called a "Page" or "Swap" file, kept on your hard drive. It used this as an extension of your RAM. As your hard drive fills up, it develops fragmented files and a lack of contiguous space. This prevents your page file (also called a swap file, or artificial memory) from functioning properly. I'll discuss this more later.
With just a small investment of time and money, there are things you can do to help your system work better and make your life less stressful. You can do it yourself and save time, money and frustration.
First, let's deal with malicious software. Depending on the nature of the malicious software, all you have to do to get infected is open an email, visit the wrong web site, connect to an infected network computer, open an infected file, it's not hard.
- First things first - if your computer is in bad shape, you should back up all your important files on a disc cd-rom, dvd-rom, memory stick, external drive, or a backup service like Mozy or Carbonite. You don't want to risk loosing important or meaningful files. If you are unable to do this, because your computer is too far gone, either hire this out, or take a risk on loosing data. There is also Windows backup, backup software from various companies but best of all, inexpensive online backup services such as Mozy.com and Carbonite.com.
- Use a good, up-to-date anti-virus (AV) program. Remember, even the best anti-virus program won't catch everything. Norton AV does a good job, but it is a resource hog (meaning it will slow you down on a daily basis). McAffe AV is often rated highly, but also uses a lot of memory, as do most AV programs. If you don't already have an AV program you like and want to keep, I recommend AVG Antivirus for three reasons: it seems to be as good as any other AV program out there, it requires much less memory to run, and it's free to home users! Check out their other free stuff wile you are there. They frequently release a new version, so keep on top of it. They will notify you when this happens. When they do look for the small print link for the free version unless you want to buy it. But be aware that you the free version comes with no support. If you want support, buy the software, it's not expensive. PC Tools AntiVirus is also a good option and it's always free!
- Before we go any further, be aware that some of the utility programs below (such as Spybot and AdAware) make significant changes to your system in attempting to disinfect it. Whenever you use any utility program pay attention to the options you are presented with. If you are given a chance to "backup your registry" or create a "restore point" you should do it. This saves the configuration of your computer so you can go back to it if a major disaster happens. Also - always reboot when you are asked to, and always reboot every time you remove malicious software. Rebooting is like a good sleep, your computer will awake refreshed, working better.
- Get rid of spyware and adware. There are several programs you can use, and you may need more than one if you are badly infected or can't dislodge some mal-ware. You may also have to run some of these utilities more than once before they tell you they have found no more bugs. Most of these below are freeware but you can also buy software to do the same type of cleanup. I recommend a few later on.
Note, freeware will only remain free if you donate to the ones you like and use, the geeks who provide these handy programs can't live and work in a cardboard box!
- You could start with Adaware (free version), Dump this once your computer is clean.
- Next you might use Spybot Search & Destroy (freeware, immunize every time you update). again dump when clean.
- Finally I install and scan with a program that is active all the time such as Spyware Doctor.
If you have AOL, you can use the
AOL Anti spyware software, but i'm not crazy about it.
- You can also use Microsoft's Windows Defender which is free from microsoft - but it's a hog.
- Spyware Doctor Has gotten some top ratings and I like it.
- Google Pack offers a free version of Spyware Doctor along with other goodies.
Continue to Max's Tips part 2 | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368706477730/warc/CC-MAIN-20130516121437-00010-ip-10-60-113-184.ec2.internal.warc.gz | CC-MAIN-2013-20 | 5,457 | 20 |
http://iiits.ac.in/abhisarga/ | code | When young minds convene, it seems only natural to expect an explosion of creativity and vibrancy. This is exactly what we intend to bring to the table. Abhisarga is the annual cultural fest of the Indian Institute of Information Technology Chittoor, Sri City. It makes its inception on the 27th and 28th of February, 2016.
We've made sure nobody is left alone as a mélange of events are set to enthrall all and every single one of you. Make sure you join the party and be a part of the genesis of something incredible. Hope to see you there! | s3://commoncrawl/crawl-data/CC-MAIN-2017-22/segments/1495463607960.64/warc/CC-MAIN-20170525010046-20170525030046-00007.warc.gz | CC-MAIN-2017-22 | 543 | 2 |
https://serverfault.com/questions/953086/blocking-port-25-cause-mail-server-cannot-receive-mail | code | I use TLS for my postfix and dovecot,and I ready test centos 7 mail server by various tools,result as below:
Priority: 5 Connection established: yes TLS: yes SSL: yes Cipher: TLSv1/SSLv3, Cipher is ECDHE-RSA-AES256-GCM-SHA384 Uses secure cipher: yes
Then I block port
iptables,but I cannot receive mail any more.
As I ready use TLS,which means I only use
465,why blocking port
25 cause I cannot receive mail? | s3://commoncrawl/crawl-data/CC-MAIN-2019-47/segments/1573496670731.88/warc/CC-MAIN-20191121050543-20191121074543-00150.warc.gz | CC-MAIN-2019-47 | 408 | 7 |
https://projecteuclid.org/journals/annals-of-mathematical-statistics/volume-40/issue-2/Sequential-Interval-Estimation-for-the-Means-of-Normal-Populations/10.1214/aoms/1177697718.full | code | The theory of sequential analysis was originally developed by Wald in the context of testing a simple hypothesis against a specific alternative. Wald and Stein subsequently considered the problem of finding a sequential confidence interval of prescribed width $(w)$ and confidence coefficient $(1 - \alpha)$ for the mean $(m)$ of a normal distribution with known variance $(\sigma^2)$. Their basic result, to the effect that no sequential procedure existed for this problem which had an average sample size less than the number of measurements required by the classical single-sample procedure, implies a substantial limitation as to what sequential interval estimation for the mean can accomplish in the case of a normal distribution. However, as we hope to show in this paper, by suitably redefining the problem, we can find sequential procedures either for obtaining a confidence interval for the difference in the means of two normal populations or for obtaining simultaneous confidence intervals for the means of $k$ normal populations, which promise to be useful in some applications. The basic idea in the reformulation of the problem is that the requirement to be put on the width of the confidence interval should depend on the location of the confidence limits, either with respect to some standard value or with respect to the confidence limits for the means of other populations. When this reformulation is appropriate to the problem at hand, Tables I and II indicate that a substantial saving is possible with the sequential procedure developed here at the risk of a relatively small (about 15 or 20%) increase in the average sample size if the least favorable parameter configuration should occur. In the next section we will find a sequence of random intervals $(J_n)$ such that $P\lbrack m \varepsilon J_n$ for all $n, n_0 \leqq n \leqq T\rbrack \geqq 1 - \alpha$. When $T = \infty$, sequences of this type, which might be called "confidence sequences" seem to have been first introduced into statistics by Wald in Chapter 10 of . Such sequences were used by the present writer , , as an important tool in finding sequential solutions to problems involving the selection of one of a finite number of possible decisions. Recently Darling and Robbins , , , Robbins and Siegmund have introduced and studied the properties of some new types of confidence sequences. Their work will be commented on briefly at the end of the paper.
Edward Paulson. "Sequential Interval Estimation for the Means of Normal Populations." Ann. Math. Statist. 40 (2) 509 - 516, April, 1969. https://doi.org/10.1214/aoms/1177697718 | s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224648635.78/warc/CC-MAIN-20230602104352-20230602134352-00085.warc.gz | CC-MAIN-2023-23 | 2,624 | 2 |
https://forum.duolingo.com/comment/19749884 | code | What is the difference between Kamatz and Pataħ? (Niqquds)
As the title says I am trying to work out the difference between the two, can anyone help me?
No difference whatsoever in modern pronunciation. Originally patakh was probably closer to an o sound (judging by Ashkenazi and Yemenite traditional pronunciation). Eg. in Ashkenazi pronunciations of "kasher" you get "kosher" because of the patakh.
By the way, "nikud" is the name for the entire system so saying "nikuds" or "nikudim" sounds strange. It like how in English it sounds funny when a non-native speaker says something like "Tonight I will go to the gym and do some exercisings".
Native Hebrew speakers do not need or use Nikud for reading and writing. Most Hebrew texts are without Nikud. I'll even say that most of adults know how to read Nikud but need the dictionary to write it correctly. Nikud is been used in books for children, In the bible, in poetry and in rare cases in which without it the whole sentence will be ambiguous (and normally it will only use the Nikud needed to solve the ambiguity).
I've seen nikud being used too in books like Harry Potter, where there are words that are not of Hebrew origin like the names of the characters and the spells. Don't rely on that too much, because it's rarely used outside of dictionaries and children's books. At the beginning it'll be hard, but you'll get accustomed, that's what we did when we were children :)
In modern Hebrew there is no difference. Originally kamatz (constrict) would have been a sound closer to the a in the Farsi pronunciation of Iran where you constrict your mouth, while patach (open) would have been the same as the modern usage for it where you open your mouth. | s3://commoncrawl/crawl-data/CC-MAIN-2019-09/segments/1550247495147.61/warc/CC-MAIN-20190220150139-20190220172139-00020.warc.gz | CC-MAIN-2019-09 | 1,713 | 7 |
https://sydneyschiller.com/Tactical-Pathplanning-in-Starcraft-II/ | code | Tactical Path Planning Using Influence Maps to Identify the Safest Path
Problem and Contribution Statement
Unit path planning in StarCraft II, while being sophisticated in its use of swarm or flocking techniques, is currently limited to the scope of finding the shortest path. Currently, if deployed units are to encounter enemy units, they would engage in combat whether or not their strengths were equivalent. Most current path planning doesn’t take into consideration the multiple hazards in a given situation (environmental choke points, ranged units positioned atop a bluff, potential unequal unit strength distribution), leading to a greater potential for a loss of units. Porting the influence-map-based path planning techniques developed in this project will provide developers with more intuitive agents in future games.
Consumer-grade influence map based path planning is currently unavailable, with small game developers having to rely on implementing A* and other path planning algorithms for game agents. As A* (and its variants) lack the ability to generate tactically intuitive paths, our solution aims to implement a more responsive path planning system that takes multiple factors into consideration when traversing terrain. This could mean finding a safest-shortest-path or a most concealed-shortest-path (a path that doesn’t trigger enemy ‘alarms’)–a type of consideration not currently being taken advantage of by games AI.
By combining the two techniques of path planning and influence maps, better traversal in a dynamic environment is possible. This safer traversal should lead to an agent that is more adaptive, responsive, and flexible to an environment with different enemies, resources, and building types. More intuitive path planning system involves the implementation and generation of multiple influence maps–by giving certain key characteristics (for buildings or units) a specified amount of influence and influence decay, agents will be able to dynamically assess the safest shortest path. Therefore, multiple influence maps will be able to change the given cost of a node-to-node transition
Potential approaches to the problem of units only considering shortest path largely relies on the path planning algorithm itself. Outside of creating a sophisticated unit-based intelligence (where individual units could assess a given situation and make a responsive decision), influencing path planning via influence maps seems to be the most lightweight (read: practical) solution.
Each map within StarCraft II can be thought of as a graph with many nodes–wherein there are two ways one can approach influencing unit traversal. One could either modify the heuristic value of a map node, or modify the cost value of a map node. Modifying the heuristic value wouldn’t accurately represent collective enemy presence, as heuristic values represent a single cost taken on each transition into that node. Modifying the cost of a node based on enemy influence, however, is better capable of representing collective enemy presence as the values are compound. The proposed approach, therefore, will alter the cost values of a node’s edge based on the aggregate influence exhibited on that node.
[Provide the transformation of your problem from the original proposal to its current form. If the problem your project addressed and your contribution did not change, add a section stating that the original problem was well-scoped and held for the duration of the project. If it did change, describe the chronology of those changes and include your reasoning and justifications for making each change.]
After the end of the project time period, we determined that this problem was well scoped and we did not need to make any adjustments to the problem we wanted to solve.
Design and Technical Approach
By implementing tactical path planning using influence maps to find the safest shortest path, this project will involve delving into the area of search, particularly with the manipulation of path planning algorithms and their cost evaluation utility functions. Furthermore, as influence maps provide a way to represent dynamic unit movement and location to an agent, the agent will be able to utilize the data generated from the influence maps to make meaningful responses to the environment. When abstracted as a Unity extension method, this information will be represented as a 2D grid for simplified node traversal.
The generation of influence maps will allow us to produce a more adaptive AI. These influence maps will cover a variety of characteristics (see figure 1) such as unit range, unit health, and attack type (aerial attack, ground attack, or both aerial and ground attack). Splitting up characteristics like this will allow for agents to make responsive tactical movements in a changing environment.
Figure 1 - Individual unit influence dependent on attack type, health of unit, and range of unit
An influence map will have a variation of values in the following three features of influence: momentum of spread of influence, decay of influence over time and space, and influence map update frequency. As can be seen in figure 2, the center node represents a tile occupied by a unit with a decay of influence radiating out from the center node.
Figure 2 - Very basic influence map decay (Adapted from Game AI Pro 2, chapter 30: Modular Tactical Influence Maps)
Lastly, to model the agent more clearly, we will also be creating an environment within Unity. To do this, we will need to implement our own pathfinding algorithm so that each agent in the Unity environment can make use of the influence map-based navigation. For this, we will implement A*, using the utilities developed for StarCraft II.
Path planning algorithms don’t implicitly use influence maps to update the cost of a node based on the influence expressed by the other agents in the map. As can be seen with the commonly implemented algorithm A* (and its variations), the cost of a node transition typically relies on heuristic values varying from node-to-node in order to find the shortest path. The solution presented will use influence maps to dynamically change the cost of a node given the influence exhibited in that area by enemy units.
The technology stack to be used will consist of using GitHub for communal development and version control–with GitHub pages being used for creating the project’s deliverable website. Google documents will be used for general documentation and Slack will be used for inter-team discourse. The StarCraft II artificial intelligence API and Deepmind’s StarCraft II Learning Environment (PySC2) will be used to interact and manipulate StarCraft II’s path planning. All code will adhere to the C# coding conventions as outlined by Microsoft and will be developed using one of the following IDE’s: Sublime, Visual Studio Community, or a version of Atom. Further porting of the project will make use of Unity and the Unity extension methods. This technology stack is deemed appropriate as the final goal of this project is to create something to be used in Unity. Using C# as the main language for this project allows for an easier creation of a Unity extension.
GitHub branches will be used whenever we can modularize a task and will be merged to master once thoroughly tested. Once merged we will do further testing to ensure compatibility with existing codebase. Furthermore, the transparency of commits and version consistency allows for better development.
[As with the previous section, tell the narrative of the changes to the design and technical approaches to your project since the original proposal. The changes in this section should be motivated by either changes to the previous section or by pragmatic or technical limitations in your design or technical approach.]
Given the fact the team was more familiar and comfortable working with C++ (rather than Python), we eventually decided to rule out PySC2. Our original choice of using C# and the .NET core was to easily integrate our solution in Unity (the game engine). However, due to a lack of documentation with the .NET core, we opted for the well documented StarCraft 2 API that used C++. Furthermore, this decision made us decide to use the Unreal Engine instead of Unity. Lastly, we ended up scoping down even further when we simply did not have enough time to integrate our work into an Unreal project, resulting in that portion being cut. At the point of project completion, it would not be difficult to take the extra steps later to integrate into an Unreal project in the future, we just simply ran out of time.
Scope and Timeline
Provide a justification for the feasibility and scope of your project. Provide a timeline covering the major deliverables and technical problems.
4/29 - 5/5: Familiarization with StarCraft II API and setting up the development environment
- Identifying how navmeshes are used in SCII
- Identifying how units move on SCII maps
- Swarm AI
- How can we influence this navigation using an influence map
- SCII Development Environment Setup
5/6 - 5/12: Basic implementation
- Basic Influence Map Implementation
- Basic Path Planning Utility Function Manipulation
- SCII Visualization of Influence Maps
5/13 - 5/19: Generalization and advancement of implementation
- Advanced Influence Map Implementation
- Advanced Path Planning Utility Function Manipulation
5/20 - 5/26: Further advancements and initial abstraction to Unity
- Unity Environment Setup
- Unity A* Implementation
5/27 - 6/9: Abstraction to Unity and deliverable development
- Unity Extension Method Implementation
- Unity Influence Map Representation
- Deliverable Reports
[Detail justifications for any changes in your scope and timeline. Be sure to reference the appropriate material from the previous two sections that impacted the scope of your project.]
One of the biggest challenges we faced when completing this project was sticking to our project timeline. For instance, when we thought that familiarizing ourselves with the Starcraft II API would only take a week of our time, this process actually bled into our third week, as we were forced to switch from the C# API, to PySC2, before finally settling on the C++ StarCraft 2 API. This process ended up halting much of the work we had planned to be completed, resulting in us removing the aspects of influence map visualization and application to a game engine from our project.
Documentation and Access
This project will rely on GitHub for code sharing, taking advantage of the repository’s README for additional documentation. Furthermore, the project and the models created will be displayed on an associated website.
A successful project will be able to demonstrate tactical responsiveness in StarCraft II unit’s path planning–where units respond dynamically to enemy presence on a map. Additionally, successfully porting the project to Unity as an extension–to be used in future games and projects is a mark of success. A successful agent will be able to find the safest shortest path around enemies, which can be compared to the baseline as provided by the base StarCraft II agent.
[Unless your project change drastically in scope, design, or technical approach, this section should be the bulk of your final report. Provide data and analysis to contextualize your contribution. Additionally, describe any deviations from your original evaluation plan.]
As stated in previous sections, we were unable to complete the abstraction to a game engine due to time constraints and early difficulties. However, we are currently able to run our bot in Starcraft, which demonstrates our implementation of influence maps and path planning based on the influence in the area. With the implementation of our influence maps, units no longer enter into areas where enemy influence is greater than the alliance influence, resulting in unneeded combat and loss of units.
Plan for Deliverables
The GitHub repository for this project will remain public for the duration of the Spring 2018 quarter. Pending group discussion, the GitHub repository may be made private. Should this project be deemed usable and feasible for further modeling beyond the avoid/fight dynamic inherent to StarCraft II, subsequent project member’s personal games may feature the use of the project. Additionally, pending the success of the project, a paper may be written and submitted to conferences.
Separation of Tasks for Team
SCII Development Environment Setup: Mark
Basic Influence Map Implementation: Mark, Sydney, Ben
Advanced Influence Map Implementation: Ben, Jonny
SCII Visualization of Influence Maps: Ben, Jonny
Path Planning Utility Function Manipulation: Mark, Sydney, Bayan
Inline Documentation: Mark, Sydney, Bayan, Ben, Jonny
Unity Environment Setup: Sydney, Bayan
Unity A* Implementation: Bayan, Jonny
Unity Extension Method Implementation: Bayan, Jonny
Unity Influence Map Representation: Mark, Sydney
Unity Documentation: Mark, Sydney, Bayan, Ben, Jonny
Deliverable Reports: Mark, Sydney, Bayan
[Describe how the final delineation of tasks varied from the original separation.]
Revised Separation of Tasks:
SCII Development Environment Setup: Mark, Ben
Basic Influence Map Implementation: Mark, Sydney
Advanced Influence Map Implementation: Mark, Sydney
SCII Visualization of Influence Maps: CUT
Path Planning Utility Function Manipulation: Ben, Jonny
Inline Documentation: Mark, Sydney, Ben, Jonny
Unity Environment Setup: CUT
A* Implementation: Jonny
Unity Extension Method Implementation: CUT
Unity Influence Map Representation: CUT
Unity Documentation: CUT
Deliverable Reports: Sydney, Bayan
Notes: Two major parts of our project included the extension to Unity/Unreal and visualization of our influence map working. As weeks progressed we separated tasks as follows:
Influence Map Implementation: Mark, Sydney
Path planning integration with Influence Maps: Ben
A* Implementation: Jonny
Visualization of Influence Maps: Bayan
Unreal/Unity Implementation: Jonny, Bayan
However, as we faced setbacks with choosing an environment to work in, and visualization proved to be more difficult that we realized it would be, some team members ended up working weeks on a single aspect of the project that was not utilized in the final project build. | s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100724.48/warc/CC-MAIN-20231208045320-20231208075320-00779.warc.gz | CC-MAIN-2023-50 | 14,325 | 86 |
https://utreon.com/v/veJEsZgcehA | code | I will never stop making fun of Redditors they make themselves too easy to mock to make me not want to do it, at this rate I'll never actually catch up on my RSS feeds but maybe that's a good thing as I'll always have some new video ideas waiting for me check out on Reddit.
==========Support The Channel==========
► $100 Linode Credit: https://linode.gvw92c.net/BrodieRobertson
► Paypal: https://www.paypal.me/BrodieRobertsonVideo
► Amazon USA: https://amzn.to/3d5gykF
► Other Methods: https://cointr.ee/brodierobertson
📺 BitChute: https://www.bitchute.com/channel/brodierobertson/
🎥 YouTube Podcast: https://www.youtube.com/c/TechOverTea
🎮 Gaming Channel: https://www.youtube.com/channel/UCzoHGpA2AvO2Vo3WUwb7Seg
🎤 Matrix: https://matrix.to/#/+brodieschatroom:matrix.org
🌐 Mastodon: https://linuxrocks.online/@BrodieOnLinux
✉️ Telegram: https://t.me/BrodieRobertson
🖥️ GitHub: https://github.com/BrodieRobertson
#Livestream #Linux #Reddit #ArchLinux
🎵 Stream Music
All music played on stream comes from StreamBeats
Check them out at https://www.streambeats.com/
All their music is free to use on stream
DISCLOSURE: Wherever possible I use referral links, which means if you click one of the links in this video or description and make a purchase we may receive a small commission or other compensation.
I am a participant in the Amazon Services LLC Associates Program, an affiliate advertising program designed to provide a means for us to earn fees by linking to Amazon.com and related sites.
About Brodie Robertson
For all general enquiries feel free to contact me through any social media service listed below, If you'd like to longer form something longer form like fan mail or you have a video suggestion, feel free to send me an email. | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337625.5/warc/CC-MAIN-20221005105356-20221005135356-00701.warc.gz | CC-MAIN-2022-40 | 1,778 | 22 |
http://www.pjfire.co.uk/accessibility-statement/ | code | PJ Fire Limited are aware that different website visitors have different needs. The web site was created to comply with the Web Accessibility Guidelines (WAI) priority level 1.
In detail, the following measures were applied to the website to ease access:
- Every image has a textual replacement
- The navigation is not dependent on a pointing device or scripting
- The layout is created via stylesheets rather than tables, which can be overwritten by a user stylesheet to create a one column version
- The fonts are not fixed and can be resized if needed
Should you encounter any problems in using the site, please contact us at [email protected]. | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368699238089/warc/CC-MAIN-20130516101358-00088-ip-10-60-113-184.ec2.internal.warc.gz | CC-MAIN-2013-20 | 647 | 7 |
https://dlcourse.org/web-development-with-go/ | code | Learn to build real, production-grade web applications from scratch.
- No trivial TODO apps that barely touch the complexity of a real app.
- No frameworks that hide all the details.
In this course we build and deploy a photo sharing application complete with users, authentication, image uploads, a database, and more. We even deploy to a production server and set up automatic HTTPS.
Web Development with Go.zip (4.5 GB) | Mirror
Web Development with Go.torrent (114 KB) | Mirror | s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224655244.74/warc/CC-MAIN-20230609000217-20230609030217-00401.warc.gz | CC-MAIN-2023-23 | 481 | 6 |
https://ayende.com/blog/3267/patterns-vs-blueprints | code | Recently I had several discussions about the usage of patterns, and application thereof. Usually, there are recommended implementation for a pattern, often this is the way it is presented in its pattern catalog.
The discussion had to do with the amount of fidelity that you had in implementing the pattern. My view on that is that the usage of a pattern doesn't require a one to one match with the common implementation, but leave room for change while keeping the concepts of the pattern in use.
Patterns are the overall shape of the solution, they are not a blueprint, to be slavishly followed. | s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947475311.93/warc/CC-MAIN-20240301125520-20240301155520-00534.warc.gz | CC-MAIN-2024-10 | 596 | 3 |
https://superuser.com/questions/595059/password-management-at-an-organization | code | In my company we have a largish number of secure logins, currently all stored in a single KeePass database which some of us share the keys to. We'd like to have a more fine-grained, identity-based system where particular users can be given access to particular identities and that access can be later revoked as needed.
The infrastructure to do this doesn't seem terrifically difficult to build, but it does seem terrifically difficult to build in a trustworthy way and also like something somebody else has done really well.
So, what's a great way to manage a large number of encrypted, secure bits of information using a series of identities. Versioning and backup are also critical components in that we ought to be able to share the entire system in something like Dropbox without clobbering each other's changes. | s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323585280.84/warc/CC-MAIN-20211019171139-20211019201139-00565.warc.gz | CC-MAIN-2021-43 | 817 | 3 |
https://www.interviewquery.com/discuss/interview-experiences/posts/facebook-entry-level-research-data-scientist--may-2022533a88 | code | Facebook Entry Level Research Data Scientist | May 2022
Location: Seattle, WA
Role: Research Data Scientist
Level: Entry Level
When did you have this interview?: Last Week
What steps were in the interview process? How far did you get? What do you think about the overall interview experience?
first round phone inter view , Code Signal, 1 hour long, m l + stat tistics + S Q L time is limited, ask long follow up ques tions, feel not lack of time
What interview questions did they ask?
Case Study (ML/Statistics) .. Logistics Regression 1) Credit Card Fraud Prediction a) We’d like to predict fraudulent transactions from amount and distance_from_home. What algorithm would you use? b) Based on Logistic Regression, what should you do to preprocess the data? | s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764501066.53/warc/CC-MAIN-20230209014102-20230209044102-00601.warc.gz | CC-MAIN-2023-06 | 760 | 9 |
https://www.howexchangeworks.com/everything-about-microsoft-exchange-server/ | code | What is Microsoft Exchange Server?
Microsoft’s calendaring, email, scheduling, contact, and collaboration platforms are all Microsoft Exchange Server.
The primary purpose of the Exchange service is to adopt and give access to the users who can message from mobile phones, web-based systems, and desktops. The Exchange Server has telephony capabilities that support voice messages.
Features like Security and storage help the organization achieve content, executive compliance tasks, and perform searches.
The working of Exchange Server
Exchange Server is an enterprise-class collaboration product whose primary focus is sending, storing, and receiving email messages. It also provides several collaboration features like calendaring; it has tight interaction with other Microsoft applications.
Features of Exchange Server 2019
The salient features of the Exchange Server of 2019 provide significant fast, more reliable failures between servers. It was made to improve overall performance and the advantage of solid-state drives, including larger disks and also the latest storage hardware.
Some of the main features are
- It provides support up to 48 CPU cores and 256GB of memory
- On the Windows server, it enables installations.
- It prevents forwarding the meeting invitations by the attendees.
- With additional out-of-office options, it provides end-users.
- It also enables administrators to assign permission to others.
- It also has a feature where it allows the administrators to cancel the meetings even if the organizer left the company.
Requirements for 2019 Exchange Server
- Even in Active Directory (AD) forests, Exchange 2019 can be installed with the existing Exchange 2016 and 2013 servers. Before this, no earlier versions had the feature to install the same as in 2019.
- There must be at least Windows server 2012 R2 or higher AD forest function level.
- Must use the 64-bit processor for the Server hosting Exchange 2019.
- The Server should have between 128 and 256 GB of RAM
- All disk partitions which are containing the system partition require New Technology File System(NTFS).
Database availability groups
The available database groups are an Exchange subsystem which ensures HA. It was first introduced in 2010 (Exchange 2010), and within no time, it became one of the most critical subsystems within exchanges.
Database Availability Group is not based on technology specifically made for the Exchange team alone but based on Windows Clustering. This means that the features and bugs that are in the Windows server can also make a significant impact on how Exchange functions. | s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474617.27/warc/CC-MAIN-20240225135334-20240225165334-00353.warc.gz | CC-MAIN-2024-10 | 2,608 | 24 |
https://sesinko.com/products/dz4404-001-nike-air-force-1-07 | code | Cannot place order, conditions not met:
- AIR FORCE 1 '07: Must have at most of this item
AIR FORCE 1 '07
Air Force 1 '07
Black / Black-Gum Light Brown
The radiance lives on in the Nike Air Force 1 ’07. This b-ball original puts a fresh spin on what you know best: classic leather construction, bold details and the perfect amount of hoops style to make heads turn.
This item cannot be shipped outside the United States. | s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500080.82/warc/CC-MAIN-20230204012622-20230204042622-00298.warc.gz | CC-MAIN-2023-06 | 422 | 7 |
https://wiki.loadero.com/test-creation/participant-configuration/participant-groups/ | code | Participant Groups #
When testing peer to peer applications, it is often important to provide parallel communication between participants, while performing different actions within the same test. Loadero’s participant-group structure allows user to easily define groups of participants that use the service under test.
In a service that provides conference calls, it’s necessary that the only hosts activate microphones. By editing test script it’s possible to provide different flows for specific groups, allowing one group to join as hosts and activate microphone, and other groups to join as listeners.
Selected compute unit value for the participant is not the total value and will be set for each participant. Participant and group counts will affect total compute units used.
Group count #
Group count is the number of identical copies of the specific group to be added to the test. Each copy will contain exactly the same participants configurations.
Consider a group consisting of 3 participants: User A and User B from US, User C from EU. With a single group, there would be a total of 3 participants in the test (given that this is the only group). If group count is increased to 3, then there will be total of 9 participants joining the test - 6 from US and 3 from EU. | s3://commoncrawl/crawl-data/CC-MAIN-2021-10/segments/1614178357984.22/warc/CC-MAIN-20210226205107-20210226235107-00459.warc.gz | CC-MAIN-2021-10 | 1,285 | 7 |
https://www.mrpets.ca/online/shop/cat/food/nu-way-cat-food-16kg | code | Nu-Way Cat Food [16kg]
NU-WAY® Cat Food is formulated and made in Canada. With a tasty recipe that focuses on the essential nutrients that can provide optimum levels of protein and energy, with a balance of vitamins and minerals to help support the overall health of your felines in each stage of their life. This diet contains omega fatty acids and amino acids to support growth, along with coat health.
The nutrient levels in NU-WAY Cat Food exceed the National Research Council (NRC) minimum requirement recommendations. | s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764499768.15/warc/CC-MAIN-20230129211612-20230130001612-00461.warc.gz | CC-MAIN-2023-06 | 524 | 3 |
http://blackberryforums.com/showthread.php?s=eed378b47c052bb14bf4af68f878b8bc&t=241480&page=3 | code | Add me to the list of people that cannot get DM 6.1 to recognize my BB. This is not my first rodeo with DM/OS/phone upgrades so I would like to think that I'm fairly competent when it comes to this sort of thing.
I've recently upgraded to a 9810 from a 9700 and that's when my issues started. I was able to switch devices and pull all of my data from the 9700 to the 9810 without issue.
Next day, attempt to use DM and it will not recognize my BB. I have done everything and anything listed in the various troubleshooting methods, Completely removed DM, cleaned the registry, etc. and re-installed DM, updated my drivers, etc. You name it and I've tried it. My USB is brand new and I've also tried the one from my last phone without luck.
When connected, my computer is recognizing the Micro SD as the F: drive, the phone it's self as the G: drive, and the phone with PIN is showing up as being connected thru the device manager as well. DM just refuses to acknowledge it. I'm currently on my 5th iteration of removing and re-installing the DM and wiping everything and I'm getting pretty fed up with trying to get this thing to work.
The 9810 is on OS 220.127.116.113 and the DM is version 18.104.22.168 straight off of RIM's website.
At this point I'm just frustrated and pretty much done with trying to get this thing to work until a new DM version is released with a potential fix.
:: late edit :: Another oddity if it helps, Even though the DM will not physically recognize my phone, for troubleshooting purposes, the DM is set to start whenever a device is connected.
If I plug my phone in, the DM will start up, but it still will not connect. It just sits at the connection screen with the "troubleshoot my connection" at the bottom. hmmm | s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600400208095.31/warc/CC-MAIN-20200922224013-20200923014013-00244.warc.gz | CC-MAIN-2020-40 | 1,745 | 8 |
https://help.observe.ai/hc/en-us/articles/360042551792-What-Types-of-Moments-are-in-Observe-AI | code | There are two types of Moments in Observe.AI.:
1.Machine Learning Moments (Moments defined automatically by Observe.AI)
- These are default moments prebuilt by Observe.AI based on an agreement with the call center. These are configured by Observe.AI and fed into the platform automatically. The keywords in this type of moment cannot be configured however the moments can be enabled or disabled.
Example of a Machine Learning moment:
2. Keyword-Spotting Moments (Customer defined and implemented. Also known as “lego” moments!)
- Key words or phrases are input into the Observe.AI application by the customer.
- Customers can update these Moments at will, and turn them on or off.
- Additional Moments can be built as need of the business change or new developments are discovered
Example of a standard Keyword-based Moment: | s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662538646.33/warc/CC-MAIN-20220521045616-20220521075616-00305.warc.gz | CC-MAIN-2022-21 | 828 | 9 |
https://helpx.adobe.com/dreamweaver/using/defining-editable-tag-attributes-templates.html | code | Define editable tag attributes in Dreamweaver
- Dreamweaver User Guide
- Dreamweaver and Creative Cloud
- Dreamweaver workspaces and views
- Set up sites
- About Dreamweaver sites
- Set up a local version of your site
- Connect to a publishing server
- Set up a testing server
- Import and export Dreamweaver site settings
- Bring existing websites from a remote server to your local site root
- Accessibility features in Dreamweaver
- Advanced settings
- Set site preferences for transferring files
- Specify proxy server settings in Dreamweaver
- Synchronize Dreamweaver settings with Creative Cloud
- Using Git in Dreamweaver
- Manage files
- Create and open files
- Manage files and folders
- Getting and putting files to and from your server
- Check in and check out files
- Synchronize files
- Compare files for differences
- Cloak files and folders in your Dreamweaver site
- Enable Design Notes for Dreamweaver sites
- Preventing potential Gatekeeper exploit
- Layout and design
- Understand Cascading Style Sheets
- Laying out pages using CSS Designer
- Using CSS preprocessors in Dreamweaver
- How to set CSS Style preferences in Dreamweaver
- Move CSS rules in Dreamweaver
- Convert inline CSS to a CSS rule in Dreamweaver
- Work with div tags
- Apply gradients to background
- Create and edit CSS3 transition effects in Dreamweaver
- Format code
- Page content and assets
- Set page properties
- Set CSS heading properties and CSS link properties
- Work with text
- Find and replace text, tags, and attributes
- DOM panel
- Edit in Live View
- Encoding documents in Dreamweaver
- Select and view elements in the Document window
- Set text properties in the Property inspector
- Spell check a web page
- Using horizontal rules in Dreamweaver
- Add and modify font combinations in Dreamweaver
- Work with assets
- Insert and update dates in Dreamweaver
- Create and manage favorite assets in Dreamweaver
- Insert and edit images in Dreamweaver
- Add media objects
- Adding videos in Dreamweaver
- Insert HTML5 video
- Insert SWF files
- Add audio effects
- Insert HTML5 audio in Dreamweaver
- Work with library items
- Using Arabic and Hebrew text in Dreamweaver
- Linking and navigation
- jQuery widgets and effects
- Coding websites
- About coding in Dreamweaver
- Coding environment in Dreamweaver
- Set coding preferences
- Customize code coloring
- Write and edit code
- Code hinting and code completion
- Collapse and expand code
- Reuse code with snippets
- Lint code
- Optimize code
- Edit code in Design view
- Work with head content for pages
- Insert server-side includes in Dreamweaver
- Using tag libraries in Dreamweaver
- Importing custom tags into Dreamweaver
- About XML and XSLT
- Perform server-side XSL transformations in Dreamweaver
- Performing client-side XSL transformations in Dreamweaver
- Add character entities for XSLT in Dreamweaver
- Format code
- Cross-product workflows
- Installing and using extensions to Dreamweaver
- In-App updates in Dreamweaver
- Insert Microsoft Office documents in Dreamweaver (Windows only)
- Working with Fireworks and Dreamweaver
- Edit content in Dreamweaver sites using Contribute
- Dreamweaver-Business Catalyst integration
- Create personalized email campaigns
- About Dreamweaver templates
- Recognizing templates and template-based documents
- Create a Dreamweaver template
- Create editable regions in templates
- Create repeating regions and tables in Dreamweaver
- Use optional regions in templates
- Define editable tag attributes in Dreamweaver
- How to create nested templates in Dreamweaver
- Edit, update, and delete templates
- Export and import xml content in Dreamweaver
- Apply or remove a template from an existing document
- Edit content in Dreamweaver templates
- Syntax rules for template tags in Dreamweaver
- Set highlighting preferences for template regions
- Benefits of using templates in Dreamweaver
- Mobile and multiscreen
- Dynamic sites, pages and web forms
- Understand web applications
- Set up your computer for application development
- Troubleshoot database connections
- Removing connection scripts in Dreamweaver
- Design dynamic pages
- Dynamic content sources overview
- Define sources of dynamic content
- Add dynamic content to pages
- Changing dynamic content in Dreamweaver
- Display database records
- Provide and troubleshoot live data in Dreamweaver
- Add custom server behaviors in Dreamweaver
- Building forms using Dreamweaver
- Use forms to collect information from users
- Create and enable ColdFusion forms in Dreamweaver
- Create web forms
- Enhanced HTML5 support for form elements
- Develop a form using Dreamweaver
- Building applications visually
- Build master and detail pages in Dreamweaver
- Build search and results pages
- Build a record insert page
- Build an update record page in Dreamweaver
- Building record delete pages in Dreamweaver
- Use ASP commands to modify database in Dreamweaver
- Build a registration page
- Build a login page
- Build a page that only authorized users can access
- Securing folders in Coldfusion using Dreamweaver
- Using ColdFusion components in Dreamweaver
- Test, preview, and publish websites
Specify editable tag attributes in templates in Dreamweaver. Also, learn how to make an editable tag uneditable.
You can allow a template user to modify specified tag attributes in a document created from a template.
For example, you can set a background color in the template document, yet enable template users to set a different background color for pages they create. Users can update only the attributes you specify as editable.
You can also set multiple editable attributes in a page so that template users can modify the attributes in template-based documents. The following data types are supported: text, Boolean (true/false), color, and URL.
Creating an editable tag attribute inserts a template parameter in the code. An initial value for the attribute is set in the template document; when a template-based document is created, it inherits the parameter. A template user can then edit the parameter in the template-based document.
If you make the link to a style sheet an editable attribute, then the attributes of the style sheet are no longer available for either viewing or editing in the template file.
In the Document window, select an item you want to set an editable tag attribute for.
Select Tools > Templates > Make Attribute Editable.
In the Attribute box, enter a name or select an attribute in the Editable Tag Attributes dialog box by doing one of the following:
If the attribute you want to make editable is listed in the Attribute pop‑up menu, select it.
If the attribute you want to make editable isn’t listed in the Attribute pop‑up menu, click Add, and in the dialog box that opens, enter the name of the attribute you want to add, then click OK.
Make sure the Make Attribute Editable option is selected.
In the Label box, enter a unique name for the attribute.Note:
To make it easier to identify a specific editable tag attribute later, use a label that identifies the element and the attribute. For example, you might label an image whose source is editable logoSrc or label the editable background color of a body tag bodyBgcolor.
In the Type menu, select the type of value allowed for this attribute by choosing one of the following options:
Text: Select this option to enable a user to enter a text value for the attribute. For example, you can use text with the align attribute; the user can then set the attribute’s value to left, right, or center.
URL: Select this option to insert a link to an element, such as the file path to an image. Using this option automatically updates the path used in a link. If the user moves the image to a new folder, the Update Links dialog box appears.
Color: Select this option to make the color picker available for selecting a value.
True/False: Select this option to enable a user to select a true or false value on the page.
Number: Select this option to enable a template user to type a numerical value to update an attribute (for example, to change the height or width values of an image).
The Default Value box displays the value of the selected tag attribute in the template. Enter a new value in this box to set a different initial value for the parameter in the template‑based document.
(Optional) If you want to make changes to another attribute of the selected tag, select the attribute and set the options for that attribute.
Make an editable tag attribute uneditable
A tag previously marked as editable can be marked as uneditable.
In the template document, click the element associated with the editable attribute or use the tag selector to select the tag.
Select Tools > Templates > Make Attribute Editable.
In the Attributes pop‑up menu, select the attribute you want to affect.
Deselect Make Attribute Editable and click OK.
Update documents based on the template. | s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817650.14/warc/CC-MAIN-20240420122043-20240420152043-00164.warc.gz | CC-MAIN-2024-18 | 8,932 | 171 |
https://hv-kronach.org/the-crypto-scammers-finally-lost | code | Hello guys and gals, it’s me Mutahar again! This time we take a look at tokens on the Internet once again and dispel some misinfo regarding a token somehow siphoning $400 Million out of thin air, yes you read that right! How did this come to be? Let’s find out! Thanks for watching!
Like, Comment and Subscribe for more videos!
Use code “SOG” to save money at www.gfuel.com
Check out the newest episode of the podcast: https://www.youtube.com/watch?v=_39yKI2uMOU | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570730.59/warc/CC-MAIN-20220807211157-20220808001157-00766.warc.gz | CC-MAIN-2022-33 | 470 | 4 |
https://www.experts-exchange.com/questions/21481997/REPEAT-QUESTION-How-to-prevent-multiple-form-instances-in-VB-net-compact-framework-for-the-Pocket-PC.html | code | This is another attempt at solving an issue with respect to multiple instances of a form.
Here is what I want to do:
Button_1: When clicked it will check to see if an instance of the form exists. If it does it will get rid of it and open a new blank one.
Button_2: When clicked it will check to see if an instance of the form exists. If it does it will revert to it. If it does not it will open a new one. The following code was offered previously but there is a problem:
If (Not IsNothing(Form2)) AndAlso (Not Form2.IsDisposed) Then
Form2 = New Form2
The problem is that 'IsDisposed' is not a member of the Form. Show how do I implement Button_1 and how do I fix Button_2.
I am using VB.Net is VS 2003.
NOTE: The IsDisposed part of the code was an attempt to prevent 'System.ObjectDisposedException' error. This error occurs when the user cliicks Button_2 once, causing Form 2 to appear. If the user closes Form2 then clicks Button_2 again the error appears. | s3://commoncrawl/crawl-data/CC-MAIN-2019-22/segments/1558232258058.61/warc/CC-MAIN-20190525124751-20190525150751-00315.warc.gz | CC-MAIN-2019-22 | 959 | 9 |
https://forums.macrumors.com/threads/isight-camera-not-detected-in-macbook.988161/ | code | Hi! My friend bought a the new MacBook for me 5 days ago in Canada and brought it for me. I just opened and unboxed it today and started setting it up. During the initial information collection by the system, it wanted to take a picture. At that point in time. the camera was working, but, it suddenly froze 10 seconds later before I could take a picture. I tried to go back and forth but the frame remained frozen. I selected a random picture and moved forward. After having set up everything, I tried to use the iSight camera with iChat but it did not show the symbol of a camera. When I opened photobooth, it said "No Camera Connected". I browsed through a few Apple support discussions and checked the "System Profiler" under which there is no iSight camera under firewire. I tried to reset the SMC but that didn't work either. Please tell me how to fix this. P.S. I am currently reinstalling OS X Snow Leopard from the DVD that came with the box. Will that help? Thanks! | s3://commoncrawl/crawl-data/CC-MAIN-2019-13/segments/1552912203947.59/warc/CC-MAIN-20190325112917-20190325134917-00455.warc.gz | CC-MAIN-2019-13 | 975 | 1 |
https://help.archsys.io/hc/en-us/categories/360003320932-ArchFX-Cloud | code | General and Frequently Asked Questions (FAQs)
- Certified OEE Onboarding Process
- Using the Certified OEE Input Form
- What do "board" and "panel" mean within Arch product user interfaces?
- Why are placement counts different between the Global Summary Metrics report and other ArchFX Batch Reports?
- How Do I Grant Users Access to Generate an ArchFX Cloud Report?
- Getting Started with ArchFX Cloud Change Requests | s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224648465.70/warc/CC-MAIN-20230602072202-20230602102202-00425.warc.gz | CC-MAIN-2023-23 | 418 | 7 |
https://www.dombom.com/cgi-bin/dcforum/dcboard.cgi?az=printer_format&forum=DCForumID27&om=45&omm=7 | code | >Unfortunately, even after these instructions, I am getting a
>similar error. Here is what it says in my browser after
>clicking to upgrade:
What's the version of Upgradez you are using? If it's not 1.12, please download Upgradez from the link given by Kurt and try again. | s3://commoncrawl/crawl-data/CC-MAIN-2021-31/segments/1627046155268.80/warc/CC-MAIN-20210805000836-20210805030836-00632.warc.gz | CC-MAIN-2021-31 | 272 | 4 |
https://community.spiceworks.com/topic/2125372-graduate-student-on-2018-fall | code | I am about to graduate with my BA in computer information systems. I want to go into cyber security & also IT Management. I have work experience in the IT field for about 2 years now. Can anyone give me any suggestions on if I should go for master? Or should I just go for certifications? I graduate at the end of 2018.
For IT jobs it's usually
know someone (connections) > experience > certifications > degree
Again, I would not relate the Master to IT. Look into something different if you want a master. If you ever want to get into management and such and get out of grunt IT, a MBA help a lot. But then again as you see mentioned experience is pretty important. So if you go for a masters, look for a part time job or something to get more hands on experience. | s3://commoncrawl/crawl-data/CC-MAIN-2021-31/segments/1627046153854.42/warc/CC-MAIN-20210729074313-20210729104313-00693.warc.gz | CC-MAIN-2021-31 | 765 | 4 |
http://www.pearltrees.com/benkung/xamarin/id17413314 | code | Exrin/README.md at master · exrin/Exrin. GitHub - Redth/PushSharp: A server-side library for sending Push Notifications to iOS (iPhone/iPad APNS), Android (C2DM and GCM - Google Cloud Message), Windows Phone, Windows 8, Amazon, Blackberry, and (soon) FirefoxOS devices! Baglabs. ScrollView - Xamarin. Use ScrollView to present layouts that can't fit on just one screen and have content make room for the keyboard.
ScrollView contains layouts and enables them to scroll offscreen. ScrollView is also used to allow views to automatically move to the visible portion of the screen when the keyboard is showing. This article covers: LAC09 - A Xamarin.Forms Infinite Scrolling ListView. 12 Flares Twitter 0 Facebook 0 StumbleUpon 0 Google+ 3 LinkedIn 9 inShare9 12 Flares × The last few months have been crazy busy working on ItsMonkie Solutions, whether it be website rework, defining the value proposition or outreach emails, I’ve had very little time and as such Codenutz.com and the Live App Challenge has suffered.
I don’t want to bore you by writing about my work schedule here, but I will be producing articles here on Codenutz with greater consistency, but lower frequency. Xamarin Forms Pull To Refresh With ListView - Xamarin Help. Posted: / By: Adam Pedley / In: Code / Comments: 3 The Xamarin Forms ListView control has the ability to allow the user to pull down from the top of the ListView to trigger a refresh command.
I say a refresh command, because the pull to refresh, just triggers a command and you can do whatever you want in that command, including not updating the ListView. Pull To Refresh Tutorial Using Xamarin.Forms. GitHub - 15mgm15/Consume-a-JSON-API-using-Xamarin.Forms: Example of consuming a JSON API using Xamarin.Forms. Day25 – Xamarin.Forms 與 ASP.NET CORE WEB API的資料傳遞 - iT 邦幫忙. 做完登入頁面後, 接下就是要製作主畫面, 從部署在Azure App Service的WEB API把資料撈回來呈現在畫面上, Xamarin.Forms要能呼叫WEB API, 需要Newtonsoft.Json與Microsoft.Net.Http這兩個套件, 所以在NuGet搜尋, 安裝在Portable專案 之後新增一個Models的資料夾, 建立一個SalesCheckIn.cs, 用來跟取回來的Json做對應 然後打開config.cs, 新增一個WEB API連線位置如下 打開MainPage.xaml, 修改如下所示 打開MainPage.xaml.cs, 修改如下所示 上述的程式碼中加入了Button_Clicked的事件, 按下時會跳出確認視窗, 並把Id與Locations顯示在視窗裡,接著就可以跑起來測試囉, 成功畫面如下.
Redth/PushSharp. MasterDetailPage - Xamarin. GitHub - TUNER88/iOSSystemSoundsLibrary: List of all system sounds used in iOS. GitHub - DalSoft/DalSoft.RestClient: The dynamic REST Client - the fastest way to create a SDK for your REST API :) RestSharp - Simple REST and HTTP Client for .NET. Get device unique identifier in Xamarin Forms « Corrado's Blog 2.0. Last week I introduced some ISV to the wonderful world of Xamarin and while discussing Xamarin Forms a few of them asked how to get an identifier that uniquely identifies a device.
I had the same issue in the past with a Windows Phone application so I know how retrieve it on this platform and I remember speaking with the guy that was working on the same app for iOS that he told me that Apple changed the policy so the API that was used in the past was no longer available and he had to find a workaround, more on this later.
The answer to the original question is quite easy from the architectural side: Just use a Dependency Service and you’re done, here are the steps: Let’s create a IDevice interface in the common/shared project and let’s add a GetIdentifier method. Consuming a RESTful Web Service - Xamarin. Integrating a web service into an application is a common scenario.
This article demonstrates how to consume a RESTful web service from a Xamarin.Forms application. Representational State Transfer (REST) is an architectural style for building web services. REST requests are made over HTTP using the same HTTP verbs that web browsers use to retrieve web pages and to send data to servers. GitHub - PrismLibrary/Prism: Prism is a framework for building loosely coupled, maintainable, and testable XAML applications in WPF, Windows 10 UWP, and Xamarin Forms. 1 Getting Started - Prism Library. Content OverviewPrerequisitesBackgroundXamarin.FormsMVVMCreating a new solutionInstalling and using the Prism Template PackRunning the appViews overviewView Models overviewAdding a new Page (View) and ViewModelNavigating to your new Page Overview This guide will walk you through creating a new Xamarin.Forms project that uses Prism, running the application, and modifying it to demonstrate basic use of Prism for Xamarin.Forms.
Prerequisites. 系統初始化與使用者登入 · Xamarin 應用程式開發指南. 現在已經完成該應用程式所需要的基礎應用服務類別,因此,可以開始進行開發整個應用程式的運作流程頁面。
在這個階段的練習,您將會需要完成學會底下需求: 建立系統初始化頁面檢視 (View)建立系統初始化頁面檢視模型 (ViewModel)註冊系統初始化頁面檢視建立使用者登入頁面檢視 (View)建立使用者登入頁面檢視模型 (ViewModel)註冊使用者登入頁面檢視修正 Xamarin.Forms 的頁面進入點 這篇章節的練習專案的原始程式碼將會存放在 GitHub 內. Push notification using Google Cloud Messaging(GCM) in Xamarin.Android. In Brief: This Post is regarding the implementation of Remote notification or Push notification using Google cloud messaging.
In my previous post shared my thought about How to build custom alert dialog in Xamarin.Android, How to perform Asynchronous CRUD operation with SQLite. How to play youtube video in Xamarin.Android, How to implement sliding menu in Xamarin android and in iOS, Best Practice and issues with ListView in Android Xamarin.In Detail: Sending the notification message to android device is the one of the best way to make user to more engage with the app.
As per the Google documentation [ Google Cloud Messaging for Android (GCM) is a free service that helps developers send data from servers to their applications on Android devices, and upstream messages from the user’s device back to the cloud. The GCM service handles all aspects of queueing of messages and delivery to the target android application. Registration_ids. Firebase Cloud Messaging HTTP Protocol This document provides a reference for the HTTP syntax used to pass messages from your app server to client apps via Firebase Cloud Messaging.
Your app server must direct all HTTP requests to this endpoint: The available parameters and options fall into the following broad categories: Downstream message syntax This section gives the syntax for sending downstream messages and interpreting HTTP responses from Firebase Cloud Messaging. Downstream HTTP messages (JSON) Xamarin Android: Create Remote Notifications Using Google GCM. Let’s start. Step 1 Open Visual Studio->New Project->Templates->Visual C#->Android->Blank app. Select blank app. Give Project Name and Project Location. Step 2. Monodroid-samples/google-services/GCMSample at master · xamarin/monodroid-samples. GitHub - eddydn/XamarinFirebaseMessaging: XamarinFirebaseMessaging.
Azure-docs/notification-hubs-aspnet-backend-notifyusers.md at master · Microsoft/azure-docs. iOS Push Notifications with Notification Hubs for Xamarin apps. Overview Important To complete this tutorial, you must have an active Azure account. If you don't have an account, you can create a free trial account in just a couple of minutes. [Azure][Xamarin] 推送Azure的Notification Hub訊息至Xamarin Android平台 (適用於Xamarin.Forms) Microsoft Azure上提供了一個Notification Hub的服務,可以將訊息推送至不同平台的行動裝置之中 本篇文章會針對Notification Hub推送訊息至Xamarin的Android平台的作法作詳細的說明 要將Notification Hub的訊息送至Xamarin Android的平台上,過程步驟頗為繁瑣,但是只要照著步驟作,基本上一定就能完成推送訊息的功能 首先,先至Google APIs,建立一個新的專案 輸入專案名稱後,按下建立 接著在資料庫頁面,點選[行動服務類 API] => [Google Cloud Messaging] 適用於 Xamarin 應用程式的 iOS 推播通知和通知中樞. Xamarin Push Notifications Using Azure Notifications Hub. One of the biggest problems when working with multiple mobile platforms is push notifications.
You need to understand how to interact with every one of the backends from Apple, Google and Microsoft to be able to send the notifications to the devices. Azure has an awesome service called Notifications Hub, part of Service Bus, that help you to simplify this task. Configuring a new Notifications Hub To start, you will need to configure a new notification hub for your application. To make this you need to go to the Azure Management Portal and set up a new notifications hub, inside the Service Bus as in the following: Compiling for Different Devices - Xamarin. The build properties of your executable can be configured from the Project's iOS Build properties page, which is found by right-clicking on the Project name and browsing to Options > iOS Build in Xamarin Studio, and Properties in Visual Studio: In addition to the configuration options available on the UI, you can also pass your own set of command line options to the Xamarin.iOS build tool (mtouch). is a helpful resource that can be used to make sure you are including all the required devices, architectures, and iOS versions.
Xamarin Studio lets user configure two important properties related to the SDK: the iOS SDK version used to build your software and the Deployment Target (or the minimum required iOS version). The iOS SDK version option lets you use different versions of an Apple published SDK, this directs Xamarin.iOS to the compilers, linkers and libraries it should reference during your build.
Xamarin-forms-samples/AppDelegate.cs at master · xamarin/xamarin-forms-samples. Get Device Token in DidRegisterUserNotificationSettings — Xamarin Forums. GitHub - adrianhall/develop-mobile-apps-with-csharp-and-azure: The Book Contents - Develop Mobile Apps with C# and Azure. | s3://commoncrawl/crawl-data/CC-MAIN-2020-45/segments/1603107892710.59/warc/CC-MAIN-20201026234045-20201027024045-00028.warc.gz | CC-MAIN-2020-45 | 10,299 | 17 |
https://preciseinfo.org/Convert/Articles_CPP/Set_Experts/C++-VC-ATL-STL-Set-Experts-080405162653.html | code | Re: Is it allowed that std::map equal_range returns more than 1 elements?
Bart van Ingen Schenau ha scritto:
Alberto Ganesh Barbati wrote:
This operator does not induce a Strict Weak Ordering, because the !(x
< y) && !(y < x) is not an equivalence relation. In particular the
(0,0) would be "equivalent" with every other key. As your operator<
does not satisfy this basic requirement, using it in a std::map
produces undefined behaviour.
Can you quote the standard on that for me?
I already did in another post. See also 25.3 for the precise definition
of strict weak ordering.
Because, if it is true, then the harmlessly looking definition
also results in UB. std::less<double> does not give an equivalence
relation if one of the two values is a NAN, or rather under the
equivalence rules of std::set<>, a NAN is equivalent with all other
I admit that I never thought about that. I'm not a floating point expert
but AFAIK the C++ standard does not specify floating point arithmetic in
presence of NaNs, it doesn't even mandate the presence of them. So we
could have a C++ implementation without NaNs or with signaling NaNs
only: in both cases std::less<> would induce a strict weak ordering.
However, I think you are correct: using a floating point type with quiet
NaNs in associative containers with std::less<> is a recipe for
undefined behaviour. Of course, no one will notice until a NaN is
actually inserted in the container... On the other hand, it's easy to
provide a different comparator that doesn't suffer this problem, for
template <typename T>
bool operator()(T x, T y) const
return isnan(y) ? true : x < y;
but I guess no one is going to use that...
[ See http://www.gotw.ca/resources/clcm.htm for info about ]
[ comp.lang.c++.moderated. First time posters: Do this! ] | s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656104495692.77/warc/CC-MAIN-20220707154329-20220707184329-00411.warc.gz | CC-MAIN-2022-27 | 1,782 | 31 |
http://freecode.com/tags/linux?page=1&sort=vitality&with=&without=2751%2C21218 | code | Rsyslog is an enhanced multi-threaded syslogd. Among others, it offers support for on-demand disk buffering, reliable syslog over TCP, SSL, TLS, and RELP, writing to databases (MySQL, PostgreSQL, Oracle, and many more), email alerting, fully configurable output formats (including high-precision timestamps), the ability to filter on any part of the syslog message, on-the-wire message compression, and the ability to convert text files to syslog. It is a drop-in replacement for stock syslogd and able to work with the same configuration file syntax.
aime is a simple, C-like programming language and an interpreter, both designed to be embeddable in applications. The language is straightforward, trivial, and direct. Its syntax is simpler than that of C, while still providing for full object management, higher order functions, and references. The interpreter is secure and expressive, allowing comprehensive control over program execution and providing powerful methods of application integration.
DocumentBurster is a tool for report distribution: split, merge, email, and FTP your reports. It has report delivery for Crystal Reports, SSRS Reporting Services, MS Access, Cognos, PeopleSoft, and SAP. It has report bursting for Pentaho, JasperReports, and BIRT. It can upload reports to MS SharePoint.
slackroll is a package or upgrade manager for Slackware Linux. It is designed to work with official mirrors in systems mainly composed of official packages with a few unofficial packages. It lets you automatically upgrade or install packages, and displays which packages have been added or removed from the Slackware tree.
Cerb is a fast and flexible Web-based platform for business collaboration and automation. It helps you remember anything about anyone, collaborate from anywhere, deftly reply to a flood of email, automate, stay informed, capture feedback, track time, flag opportunities, manage tasks, share expert knowledge, and otherwise execute efficiently.
Vendetta Online is a multi-platform 3D space-combat MMO for Windows, Mac, Linux/32 and Linux/64. The game permits players to interact in a vast online galaxy; fighting, trading, and mining their way to success. A "twitch" type real-time combat model makes true player skill the deciding factor instead of character advancement. Massive capital-ship battles shake the foundations of the major nations at war, while others struggle to push back the encroachment of the AI "Hives". A no-strings free trial is available.
Highlight is a universal converter from source code to HTML, XHTML, RTF, TeX, LaTeX, SVG, BBCode, and terminal escape sequences. (X)HTML and SVG output are formatted by Cascading Style Sheets. It supports more than 170 programming languages, and includes 80 highlighting color themes. The configuration files are Lua scripts with plug-in support. The converter includes some features to provide a consistent layout of the output code. | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368707436332/warc/CC-MAIN-20130516123036-00058-ip-10-60-113-184.ec2.internal.warc.gz | CC-MAIN-2013-20 | 2,925 | 7 |
https://www.avsforum.com/forum/187-official-avs-foruma-blu-ray-disc-reviews/2977780-matrix-ultra-hd-blu-ray-review-3.html | code | I like the first Matrix movie, so I thought I'd bop into Best Buy and pickup a copy. $35....uh, no thanks. I'll shop elsewhere or wait.
Picked up "Fury" yesterday and "Lone Survivor" today on UHD for $20. Good movies, good price.
See ya. Dave
"High Fidelity audio has been like a dog chasing his tail. High Fidelity in my marriage has been much more rewarding because she knows where I sleep."
Last edited by Jive Turkey; 05-27-2018 at 05:52 PM. | s3://commoncrawl/crawl-data/CC-MAIN-2019-51/segments/1575540496492.8/warc/CC-MAIN-20191207055244-20191207083244-00111.warc.gz | CC-MAIN-2019-51 | 445 | 5 |
https://derekdabblings.com/derek-dabblings/metalwork/ | code | 3D printing is all very well, but sometimes it needs to be more solid. Then out come the Lathe, the CNC mill, pillar drill, in the workshop.
Jig for remote controlled car
Take a look at the model car here. In order to productionise this for 30 children, I built this jig for the production of multiple bases. See here.
Using my tools to create a simple mechanical clock. Fun but not that accurate! See here. | s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296945282.33/warc/CC-MAIN-20230324113500-20230324143500-00351.warc.gz | CC-MAIN-2023-14 | 407 | 4 |
https://software.intel.com/en-us/forums/intel-fortran-compiler-for-linux-and-mac-os-x/topic/269552 | code | Hi, I'm working with a .f90 program (compiled with ifort). I modified this program. I included a C program to this .f90 program (prog.f90 calls to prog.C). In a subroutine the .f90 program calls to system command to creat a directory. The program runs in a good way but presents a detail: The modified program calls to system command but the command is not ejecuted, this is very strange. The grogram run but does't ejecute the comand. The unmodified program (without .C) ejecutes correctly the system command.
The .f90 program can run with an MPI architecture. When I activate the MPI architecture (with mpif90) the program compile but when I run the program it tells me:
forrtl: error (72): floating overflow
Image PC Routine Line Source
ramses3d 00000000005F3C48 Unknown Unknown Unknown
ramses3d 000000000040634F Unknown Unknown Unknown
ramses3d 0000000000410DC2 Unknown Unknown Unknown
ramses3d 0000000000423273 Unknown Unknown Unknown
ramses3d 0000000000426D48 Unknown Unknown Unknown
ramses3d 000000000043B6C1 cooling_module_mp 323 cooling_module.f90
ramses3d 0000000000450D04 init_time_ 60 init_time.f90
ramses3d 0000000000453801 adaptive_loop_ 21 adaptive_loop.f90
ramses3d 000000000052E1E2 MAIN__ 8 ramses.f90
ramses3d 0000000000404482 Unknown Unknown Unknown
libc.so.6 0000003F8381D974 Unknown Unknown Unknown
ramses3d 00000000004043A9 Unknown Unknown Unknown
The program without the modification (without the .C program) compiles and runs in a good way (in serial and parallel mode), but when I include the .C program the program doesn't ejecute the system command with serial architecture and show me the error (72) with parallel architecture.
The problem is in my .C program, but what is the problem?...
Someone can give a clue? | s3://commoncrawl/crawl-data/CC-MAIN-2017-22/segments/1495463607369.90/warc/CC-MAIN-20170523045144-20170523065144-00117.warc.gz | CC-MAIN-2017-22 | 1,741 | 19 |
https://toadalamode.com/transfer-bluehost-site-to-weebly-usinf-dns-zone-editor/ | code | Transfer Bluehost Site To Weebly Usinf Dns Zone Editor
Locating a premium cheap web hosting supplier isn’t easy. Every internet site will have different requirements from a host. And also, you need to compare all the attributes of a hosting company, all while searching for the very best deal feasible.
This can be a whole lot to kind through, especially if this is your very first time purchasing holding, or constructing a website.
Many hosts will certainly offer super cheap initial pricing, just to increase those prices 2 or 3 times greater once your preliminary contact is up. Some hosts will supply totally free rewards when you register, such as a free domain, or a cost-free SSL certificate.
While some hosts will be able to supply much better efficiency and also high degrees of security. Transfer Bluehost Site To Weebly Usinf Dns Zone Editor
Below we dive deep right into the most effective affordable web hosting plans out there. You’ll learn what core organizing attributes are essential in a host as well as exactly how to evaluate your very own holding needs so that you can choose from one of the most effective economical organizing companies listed below.
Disclosure: When you acquire a web hosting plan via web links on this web page, we make some payment. This aids us to maintain this website running. There are no extra costs to you in any way by utilizing our web links. The list below is of the most effective low-cost host plans that I’ve personally used and also tested.
What We Take into consideration To Be Cheap Webhosting
When we describe a host plan as being “Low-cost” or “Budget” what we suggest is hosting that falls under the price bracket between $0.80 to $4 per month. Whilst looking into economical hosting suppliers for this overview, we considered over 100 different hosts that fell into that price variety. We after that assessed the top quality of their most affordable holding bundle, value for cash as well as customer support.
In this write-up, I’ll be reviewing this world-class website holding firm and stick in as much pertinent information as feasible.
I’ll review the attributes, the rates options, as well as anything else I can consider that I think may be of advantage, if you’re choosing to subscribe to Bluhost and also obtain your internet sites up and running.
So without further ado, let’s check it out.
Bluehost is among the biggest web hosting business in the world, getting both massive advertising and marketing assistance from the business itself as well as affiliate marketers that advertise it.
It really is a massive firm, that has been around for a long time, has a huge credibility, and also is definitely one of the top options when it pertains to host (certainly within the top 3, a minimum of in my book).
But what is it exactly, and also should you obtain its solutions?
Today, I will address all there is you need to understand, supplied that you are a blog owner or a business owner that is looking for a web host, and doesn’t recognize where to get going, since it’s an excellent remedy for that audience in general.
Allow’s think of, you want to hold your websites as well as make them visible. Okay?
You currently have your domain name (which is your site location or LINK) today you intend to “transform the lights on”. Transfer Bluehost Site To Weebly Usinf Dns Zone Editor
You require some holding…
To complete all of this, and also to make your website noticeable, you require what is called a “web server”. A server is a black box, or tool, that keeps all your site data (data such as pictures, texts, videos, links, plugins, and various other info).
Currently, this server, has to get on constantly as well as it has to be connected to the web 100% of the time (I’ll be mentioning something called “downtime” later).
Additionally, it additionally requires (without getting also elegant and right into information) a file transfer protocol commonly called FTP, so it can show internet browsers your internet site in its desired form.
All these points are either expensive, or need a high level of technological ability (or both), to produce as well as preserve. And you can completely go out there as well as find out these points by yourself as well as established them up … however what regarding rather than you getting and also keeping one … why not simply “renting out hosting” instead?
This is where Bluehost is available in. You lease their web servers (called Shared Hosting) and also you launch an internet site utilizing those servers.
Because Bluehost maintains all your documents, the firm likewise permits you to establish your web content monitoring systems (CMS, for short) such as WordPress for you. WordPress is an incredibly prominent CMS … so it just makes sense to have that option offered (virtually every holding business now has this choice as well).
Basically, you no longer need to set-up a server and after that incorporate a software where you can construct your material, individually. It is currently rolled into one bundle.
Well … imagine if your server remains in your house. If anything were to occur to it whatsoever, all your data are gone. If something goes wrong with its internal processes, you require a service technician to repair it. If something overheats, or breaks down or gets damaged … that’s no good!
Bluehost takes all these problems away, and also looks after every little thing technical: Pay your web server “rental fee”, as well as they will take care of every little thing. And when you buy the solution, you can then start focusing on adding web content to your site, or you can put your initiative right into your advertising projects.
What Provider Do You Receive From Bluehost?
Bluehost uses a myriad of different solutions, however the primary one is hosting naturally.
The organizing itself, is of various types incidentally. You can lease a shared server, have a devoted server, or likewise a digitalpersonal server.
For the purpose of this Bluehost testimonial, we will concentrate on organizing solutions and other services, that a blogger or an on-line entrepreneur would require, rather than go too deep into the bunny opening and also discuss the other solutions, that are targeted at even more skilled individuals.
- WordPress, WordPress PRO, and e-Commerce— these hosting solutions are the plans that permit you to hold a website utilizing WordPress as well as WooCommerce (the latter of which allows you to do ecommerce). After acquiring any one of these packages, you can begin constructing your site with WordPress as your CMS.
- Domain Marketplace— you can also acquire your domain from Bluehost as opposed to other domain registrars. Doing so will certainly make it easier to aim your domain name to your host’s name servers, given that you’re utilizing the same marketplace.
- Email— once you have acquired your domain, it makes good sense to likewise obtain an e-mail address connected to it. As a blog owner or online entrepreneur, you need to basically never utilize a free e-mail service, like Yahoo! or Gmail. An email such as this makes you look unprofessional. Thankfully, Bluehost provides you one totally free with your domain.
Bluehost likewise offers devoted servers.
And you may be asking …” What is a specialized server anyway?”.
Well, the thing is, the fundamental host plans of Bluehost can just a lot web traffic for your site, after which you’ll require to upgrade your hosting. The factor being is that the typical servers, are shared.
What this implies is that server can be servicing 2 or even more web sites, at the same time, among which can be your own.
What does this mean for you?
It indicates that the solitary web server’s sources are shared, and it is doing several jobs at any type of offered time. As soon as your site begins to hit 100,000 website visits each month, you are mosting likely to need a dedicated web server which you can likewise receive from Bluehost for a minimum of $79.99 each month.
This is not something yous needs to bother with when you’re beginning but you need to maintain it in mind for sure.
Bluehost Rates: Just How Much Does It Price?
In this Bluehost evaluation, I’ll be concentrating my focus generally on the Bluehost WordPress Hosting bundles, considering that it’s the most popular one, and most likely the one that you’re trying to find and that will certainly suit you the most effective (unless you’re a massive brand, company or site).
The 3 available strategies, are as complies with:
- Fundamental Plan– $2.95 per month/ $7.99 regular rate
- Plus Plan– $5.45 per month/ $10.99 normal cost
- Choice And Also Strategy– $5.45 each month/ $14.99 regular cost
The first rate you see is the cost you pay upon subscribe, and the second price is what the cost is, after the first year of being with the business.
So essentially, Bluehost is mosting likely to charge you on an annual basis. As well as you can also choose the quantity of years you intend to host your site on them with. Transfer Bluehost Site To Weebly Usinf Dns Zone Editor
If you pick the Standard strategy, you will pay $2.95 x 12 = $35.40 starting today as well as by the time you enter your 13th month, you will currently pay $7.99 monthly, which is additionally billed annually. If that makes any type of sense.
If you are serious about your site, you must 100% obtain the three-year choice. This means that for the basic strategy, you will pay $2.95 x 36 months = $106.2.
By the time you hit your 4th year, that is the only time you will pay $7.99 each month. If you think about it, this strategy will save you $120 throughout 3 years. It’s very little, yet it’s still something.
If you want to obtain more than one internet site (which I highly suggest, and also if you’re significant, you’ll probably be obtaining even more at some time in time) you’ll wish to use the selection plus plan. It’ll enable you to host unrestricted websites.
What Does Each Strategy Deal?
So, when it comes to WordPress organizing strategies (which resemble the common holding strategies, but are a lot more tailored towards WordPress, which is what we’ll be concentrating on) the features are as follows:
For the Basic strategy, you get:
- One internet site just
- Secured internet site through SSL certification
- Maximum of 50GB of storage
- Totally free domain name for a year
- $ 200 marketing credit scores
Remember that the domain names are acquired independently from the organizing. You can obtain a cost-free domain name with Bluehost right here.
For both the Bluehost Plus hosting as well as Choice Plus, you get the following:
- Unrestricted variety of internet sites
- Free SSL Certificate. Transfer Bluehost Site To Weebly Usinf Dns Zone Editor
- No storage or data transfer limit
- Totally free domain for one year
- $ 200 advertising and marketing credit report
- 1 Workplace 365 Mail box that is complimentary for 30 days
The Choice Plus strategy has actually an added benefit of Code Guard Basic Alternative, a back-up system where your data is saved and replicated. If any kind of crash takes place as well as your web site data goes away, you can restore it to its original type with this attribute.
Notification that although both strategies set you back the very same, the Choice Strategy after that defaults to $14.99 each month, normal rate, after the set amount of years you’ve chosen.
What Are The Benefits Of Using Bluehost
So, why select Bluehost over various other webhosting solutions? There are thousands of webhosting, most of which are resellers, yet Bluehost is one select few that have stood the test of time, and also it’s most likely one of the most well known available (and for good reasons).
Right here are the three main benefits of choosing Bluehost as your host company:
- Web server uptime— your web site will certainly not be visible if your host is down; Bluehost has more than 99% uptime. This is very crucial when it pertains to Google Search Engine Optimization and positions. The greater the far better.
- Bluehost speed— just how your web server feedback establishes how fast your website reveals on an internet browser; Bluehost is lighting quickly, which means you will decrease your bounce price. Albeit not the very best when it comes to packing speed it’s still extremely crucial to have a fast rate, to make user experience better and also far better your ranking.
- Unlimited storage space— if you get the Plus strategy, you need not stress over how many files you save such as video clips– your storage capacity is limitless. This is truly important, since you’ll possibly face some storage space issues later down the tracks, as well as you don’t desire this to be a hassle … ever.
Finally, consumer assistance is 24/7, which means despite where you remain in the world, you can call the support team to fix your web site concerns. Pretty standard nowadays, however we’re taking this for approved … it’s also extremely crucial. Transfer Bluehost Site To Weebly Usinf Dns Zone Editor
Additionally, if you have actually gotten a cost-free domain name with them, after that there will certainly be a $15.99 cost that will certainly be deducted from the amount you initially purchased (I envision this is since it sort of takes the “domain name out of the market”, not exactly sure concerning this, but there possibly is a hard-cost for registering it).
Lastly, any requests after thirty days for a refund … are void (although in all sincerity … they ought to probably be stringent here).
So as you see, this isn’t always a “no doubt asked” plan, like with some of the various other hosting alternatives around, so make sure you’re okay with the plans before proceeding with the hosting. | s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662556725.76/warc/CC-MAIN-20220523071517-20220523101517-00510.warc.gz | CC-MAIN-2022-21 | 13,871 | 82 |
https://mail.python.org/pipermail/python-ideas/2012-November/017789.html | code | [Python-ideas] Speed up os.walk() 5x to 9x by using file attributes from FindFirst/NextFile() and readdir()
ronaldoussoren at mac.com
Tue Nov 13 08:07:32 CET 2012
On 12 Nov, 2012, at 10:17, Ben Hoyt <benhoyt at gmail.com> wrote:
> This means that on Linux/BSD/Mac OS X it'd return a stat_result with
> st_mode set but the other fields None, on Windows it'd basically
> return the full stat_result, and on other systems it'd return
> (filename, None).
Where would st_mode be retrieved from? The readdir(3) interface
only provides d_type (and that field is not in POSIX or SUS).
The d_type field contains a file type, and while you could use that
to construct a value for st_mode that can be used to test the file
type, you cannot reconstruct the file permissions from that.
More information about the Python-ideas | s3://commoncrawl/crawl-data/CC-MAIN-2021-49/segments/1637964363135.71/warc/CC-MAIN-20211205035505-20211205065505-00462.warc.gz | CC-MAIN-2021-49 | 812 | 14 |
https://rdrr.io/github/jmcimula/cmsr/ | code | cmsr turns the incentive calculation into a very simple process that, after configuration and association to a target group, includes the incentive plan validation and simulation through what-if scenarios. This is completed, in order to determine the financial and sales potential impact before going to production (like weDo technology)
|Package repository||View on GitHub|
Install the latest version of this package by entering the following in R:
Add the following code to your website.
For more information on customizing the embed code, read Embedding Snippets. | s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585371886991.92/warc/CC-MAIN-20200410043735-20200410074235-00108.warc.gz | CC-MAIN-2020-16 | 566 | 5 |
http://programmersheaven.com/discussion/259681/quadratic-equation | code | Welcome to the new platform of Programmer's Heaven! We apologize for the inconvenience caused, if you visited us from a broken link of the previous version. The main reason to move to a new platform is to provide more effective and collaborative experience to you all. Please feel free to experience the new platform and use its exciting features. Contact us for any issue that you need to get clarified. We are more than happy to help you.
My program calls for the quadratic equation. Three different text boxes for inputting the "A", "B", and "C" variables. Then two different text boxes for the positive and negative answers. So far here is my coding. I know that there are mistakes in the code but Hey I'm just a beginner.
Private Sub cmdCalculate_Click()
Dim intAvariable As Integer
Dim intZ As Integer
Dim intx As Integer
Dim intBvariable As Integer
Dim intCvariable As Integer
'quadratic equation = negative B plus/minus square root of 4*A*C divided by 2*A
intBvariable = -intBvariable
intZ = intAvariable * 2
intx = intAvariable * 4 * intCvariable
Me.txtMinus = intBvariable - sqrtintX / intZ
Me.txtPlus = intBvariable + sqrtintX / intZ
Thanks for your input,
0 · · | s3://commoncrawl/crawl-data/CC-MAIN-2014-52/segments/1419447560397.30/warc/CC-MAIN-20141224185920-00009-ip-10-231-17-201.ec2.internal.warc.gz | CC-MAIN-2014-52 | 1,175 | 16 |
http://brainflux.org/Math/Fourier_Analysis/2D_Fourier/index.html | code | |Both the data and the Fourier transform can be complex. The
magnitude is represented by brightness and color by phase as shown in the complex plane
to the left and in the applet's color picker. Pure positive real is bluish-cyan and negative imaginary is red.
The display setting tools under the images (shown highlited to the left) don't
modify the data, just how it is displayed. If you wanted to display only the real part
of the image, click on the appropriate button under it.
Because Fourier transforms often have data spanning by many orders of
magnitude, the Brightness slider lets you smoothly change the brightness
over orders of magnitude in a "tangent function" way.
||Clicking on the image button on the bottom or by typing in the URL of an
image on the web -- it will automatically be converted to a pure-positive-real
image at the resolution selected (default is 128x128.)
By using the square tool and using the selector to draw zero you can
remove the high spatial frequency components and see the image get blurry.
(If you're within a few pixels of the origin, the program will use exactly
||Which is more important in the Fourier transform, magnitude of
phase? When we think of Fourier analysis on sound, for example,
we're almost exclusively interested in the magnitude information, but it's
the phase of each component that determines how much that sin wave will be
To investigate, pull up an image and click on the "Discard
Phase" or "Discard Magnitude" buttons. Unlike the
display buttons, these actually change the underlying data.
At the left
I have discarded magnitude information and kept only phase. It still looks
recognizable. When phase information is discarded, it's a blurry
jumble. Unfortunately in x-ray crystallography, only the magnitude
information is measurable. | s3://commoncrawl/crawl-data/CC-MAIN-2017-22/segments/1495463609054.55/warc/CC-MAIN-20170527191102-20170527211102-00427.warc.gz | CC-MAIN-2017-22 | 1,800 | 27 |
https://wiki.mamedev.org/index.php/MAME_0.80u1 | code | MAME 0.80u1 was released on 11 March 2004.
The known contributors for this version are, in alphabetical order:
The known contributions for this version are, in the order specified in the whatsnew:
- Aaron Giles improved the discrete sound system / sound in HitMe
- new node type DISCRETE_LOGIC_DFLIPFLOP
- changed the way multichannel output is done; affects some existing drivers
- support for up to 16 channels of sound
- Also included is a new Hit Me driver
- discrete sound support for Hit Me
- fixed incorrect video (missing scanlines and inverting logic)
- added controls to handle card width and game/sound speed
- cleaned up memory maps
- Nathan Woods made a change related to MESS's mouse device (within #ifdef MESS)
- Quench added sound supoprt in Varia Metal
- Bryan McPhail fixed the opcode view which in some cases displayed too many bytes on 32 bit CPUs such as 68020 and Hyperstone
- Mariusz Wojcieszek contributed ST-V fixes:
- improved scaling tilemap backgrounds. Vfkids, colmns97 and vfremix backgrounds are better now.
- fixed a problem where entering and existing service mode during game causes master / slave communication to fail. It turned out that slave cpu should be reset when it is turned off and on. This helps all games in driver.
New clones added
New games marked as GAME_NOT_WORKING | s3://commoncrawl/crawl-data/CC-MAIN-2019-04/segments/1547583884996.76/warc/CC-MAIN-20190123023710-20190123045710-00500.warc.gz | CC-MAIN-2019-04 | 1,315 | 20 |
http://www.ifans.com/forums/threads/shift-click-restore-problem-restoring-into-custom-firmware.156960/ | code | I'm on the last step of QuickFreedom and I'm really upset because I can't seem to Shift-click my way into putting the custom firmware into my iPod Touch. I searched everywhere, but the solution is never present. I tried everything from holding the shift button for like a minute (And I know the shift button works on the iTune), reinstalling it, and etc. This problem seems to be present on Vista Computers and it's a real nuisance. Is there a solution for this? Or is there possibly another way to load the Custom Firmware into the iPod rather than iTunes. Thank you. | s3://commoncrawl/crawl-data/CC-MAIN-2016-50/segments/1480698542665.72/warc/CC-MAIN-20161202170902-00305-ip-10-31-129-80.ec2.internal.warc.gz | CC-MAIN-2016-50 | 568 | 1 |
https://workplace.stackexchange.com/questions/71442/what-is-a-good-model-for-rewarding-work-on-projects-outside-of-contracted-hours | code | I work at a small company and we have a full schedule of work ahead of us. There are some internal tooling projects that would massively help some departments in the company but they never quite get prioritised to the front of the queue.
I would like to offer my team the opportunity to work on them outside of work time for some sort of financial reward. but I'm struggling to find a model that won't cause resentment or promote conflict.
Options I've considered are:
- Bounty for the team that delivers the tool. This has issues around who gets to be on the team
- Option to come in on saturday to work on these projects and get overtime rate. This potentially makes people feel like the extra work is required unless the idea is carefully delivered.
Are there models I could use in order to encourage my team to put in extra work? | s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947476532.70/warc/CC-MAIN-20240304200958-20240304230958-00354.warc.gz | CC-MAIN-2024-10 | 833 | 6 |
https://www.ed.ac.uk/information-services/website-publishing/training-support/community/technical-peer-group | code | Technical Peer Group
The Technical Peer Group meets regularly to discuss technical issues surrounding the EdWeb centrally managed CMS, the EdWeb distribution, collaboration and sharing of best practise on web development, coding and other technical issues.
The group is a collaboration between Website Publishing and Applications Division and aims to include technical representatives from all schools and key support units. Members are interested in sharing best practice for all websites around the University including EdWeb central and the EdWeb distribution.
Previous topics have included:
- the work completed at our EdWeb code sprints
- DrupalCon and why you should go
- the University media service Media Hopper
- the work to build a community and collaborative development framework within the University
- using the EdGEL design framework
The peer group is chaired by Bruce Darby (Project Manager, UWP) and Mairi Fraser (Senior Developer, Applications Division).
Meeting minutes and supporting documents are made publicly available once approved - usually within four weeks.
Minutes of previous Technical Peer Group meetings
The remit of the Technical Peer Group is to:
- ensure that all Schools have an awareness of the ongoing technical developments within the website project
- assist, where both possible and practicable, in developing identified technical solutions
- collaborate in identifying technical requirements to meet both current and future business objectives
- work together with the project team to help prioritise and deliver core functionality for use by all Schools and units.
The group is flexible about each member’s contribution, depending on their technical knowledge and available resource. Every member will have input identifying new ideas and requirements, and some will be also able to help with the actual programming.
Policy decisions will remain with the existing Programme team and their liaison with Heads of School.
The Technical Peer Group has an open-access mailing list that anyone can sign up and post to. More information can be found on our Website Support wiki. We very much welcome new members, so do please contact us if you would like to join or give a presentation to the group | s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296945218.30/warc/CC-MAIN-20230323225049-20230324015049-00334.warc.gz | CC-MAIN-2023-14 | 2,235 | 20 |
http://social.technet.microsoft.com/Forums/zh-CN/w7itpromedia/thread/9273d736-b5d4-4211-b821-384bc8ce856b | code | I am using WMP12 on Windows 7 x64, and trying to synchonize my WMP library to my Galaxy Nexus.
The process works relatively well; the Galaxy Nexus is detected as expected by WMP (I do have drivers for it installed), and I can perform a standard sync which will transfer my library to the Nexus and "synchronize" my collection. However, album art is not transferred over.
After scouring the web, there is speculation that the WMPInfo.xml file is responsible for marshaling what data (album art, etc) is transferred over--but I can find no corresponding fix.
What does one need to do in an instance like this to convince WMP to sync album art as well to their mobile devices?
For reference, if I copy an artist's directory from my WMP collection directly to the device (including the usually hidden album art), it displays as expected. The problem truly lies on WMP not including album art in the synchronization process.
Based on my research, Android platform does not support WM-DRM at this point of time. Windows Media Player explicitly uses a separate path for transferring album art. There is no direct way for WMDM to convert the AlbumData, Height and Width to an equivalent WPD type. This behavior is by design. Windows Media Player uses WMRM to transfer album art.
TechNet Community Support
- 已标记为答案 Niki HanMicrosoft Contingent Staff, Moderator 2012年5月2日 8:08 | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368705352205/warc/CC-MAIN-20130516115552-00097-ip-10-60-113-184.ec2.internal.warc.gz | CC-MAIN-2013-20 | 1,384 | 8 |
https://github.com/commandline?tab=repositories | code | Report or block commandline
Contact Support about this user's behavior.Report abuse
A JWT library for rust that uses serde, serde_json and openssl
My personal .vimrc and all the attendant, supporting files.
JWT library for Rust
Effortlessly point tickets visually and collaboratively online in real time.
Notes from conference talks and other presentations I have attended.
Module to integrate yadda with mocha for both browser and node.js tests.
Tool for analyzing one's own social stream with the goal of helping improve mood and mental health.
Scripts to gather information for including in version history comments and to make using source control a bit simpler for non-technical projects.
Medium.com WYSIWYG editor clone. Uses contenteditable API to implement a rich text solution.
Collection of scripts I use to automate various aspects of podcast production for The Command Line Podcast.
Old Java project using reflection and proxies to support flexible data transfer objects.
Ubiquity command set for StatusNet, the aim of which is to better match the API and capabilities than Idiquity. | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171807.25/warc/CC-MAIN-20170219104611-00533-ip-10-171-10-108.ec2.internal.warc.gz | CC-MAIN-2017-09 | 1,095 | 14 |
https://www.w3.org/2005/rules/wg/wiki/E-Procurement_Contract_Exchange,_with_Default-Inheritance_Ontologies.html | code | This is one of the possible Use Cases.
This is a fairly detailed use case about e-procurement contracts, where proposed/final contracts are exchanged, and where the rules can make use of -- by merging in after semantically-interoperable translation -- background ontologies of a default-inheritance style similar to that of object-oriented programming languages and frame-based systems, e.g., the MIT Process Handbook. (By BenjaminGrosof)
This use case is based primarily on the example in the RuleML-2005 conference paper "Extending the SweetDeal Approach for E-Procurement using SweetRules and RuleML", at http://ebusiness.mit.edu/bgrosof/#sweetdeal-procurement+sweetrules-ruleml2005.
This use case is still undergoing editing.
FOR NOW: see the above paper, at http://ebusiness.mit.edu/bgrosof/#sweetdeal-procurement+sweetrules-ruleml2005.
3. Benefits of Interchange
List below some benefits of interchange in this use case, i.e. why interchange matters.
4. Requirements on the RIF
List requirements of this use case on the RIF.
5.1. Actors and their Goals
List the different parties who interact in this use case, along with their goals. They should be named with abstract role names, like "Buyer", "Seller", "Buyer's Agent", and "Government Agency".
Actor 1 - wants ...
Actor n - wants ...
5.2. Main Sequence
Provide the typical course of events, ordered as below in a sequence of steps.
First step of sequence
Last step of sequence
5.3. Alternate Sequences
Describe possible variations of the main sequence in separate subsections, assigning a title to each.
5.3.1. (Title of Alternate Sequence)
Describe the alternate sequence, referring to the steps in the main sequence above if convenient (to avoid repetition).
Describe possible scenarios illustrating the use case in separate subsections, assigning a title to each.
6.1. (Title of Narrative)
Describe an individual scenario. Samples rules and other test data may be optionally included.
Comments, issues, etc. Again, note that the wiki automatically keeps a revision history. | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560279657.18/warc/CC-MAIN-20170116095119-00550-ip-10-171-10-70.ec2.internal.warc.gz | CC-MAIN-2017-04 | 2,036 | 25 |
https://data.stackexchange.com/meta.workplace/query/40304/colorado-c-people | code | Find people in the state of Colorado who put C# in their profile
Q&A about the site for members of the workforce navigating the professional setting
--AND displayName like 'L%'
AND UPPER(Location) LIKE 'BOULDER, CO'
AND AboutMe LIKE '%C#%'
ORDER BY reputation DESC | s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510208.72/warc/CC-MAIN-20230926111439-20230926141439-00265.warc.gz | CC-MAIN-2023-40 | 264 | 6 |
http://facekade.mihanblog.com/post/158 | code | می توانید دیدگاه خود را بنویسید
You really make it seem so easy with your presentation but I
find this topic to be actually something that I think I would never understand.
It seems too complex and extremely broad for me.
I am looking forward for your next post, I will try
to get the hang of it!
Thanks for the good writeup. It in fact was once a leisure account it.
Glance complicated to more brought agreeable from you!
By the way, how can we keep up a correspondence? | s3://commoncrawl/crawl-data/CC-MAIN-2019-39/segments/1568514573309.22/warc/CC-MAIN-20190918151927-20190918173927-00031.warc.gz | CC-MAIN-2019-39 | 497 | 9 |
https://zmccormi.wordpress.com/2016/11/21/georeferencing/ | code | In this CDS demonstration we learned how to Georeference and rectify maps to the correct latitudes and longitudes so that multiple maps can be layered together. We learned multiple ways to do this, including with and without having reference points in the layered map. Both ways gave us a semi-reliable way to place maps over each other and relate certain mappings to one another.
I don’t think that we will be using this in our blog, as we don’t have much of a need for map layering or rectifying maps to a specific area, but it could be very interesting to use this to show how areas change over time by georeferencing two maps with shown coordinate points layered together. This would probably only work if both maps could be referenced and rectified using the necessary coordinate points because the way to georeference and rectify the maps without coordinates requires marking landmarks against eachother, and unless these areas look the same, you might not have that chance.
It was very cool to see how accurately you could place a sort of random map on top of a complete up-to-date map and see where things lined up. It was kind of odd doing it with an early 2000s Notre Dame/South Bend map because of how much development had gone on in the time between then and now, especially since we take for granted how much was developed before our classes even got here.
So how does one go about georeferencing and rectifying maps to a common coordinate planes? Well the first step was to download and analyze maps. Its important to see what you’re trying to do with the maps and how you’re trying to say it. Also, it’s important to recognize whether the maps have coordinates you can use to place it on the plane, if not, you’ll need to find landmarks on both planes which you can use to bring the two together.
Once you’re done with the maps for the time, you need to set up ArcGIS. One of the more important steps is letting the system know what coordinate planes you intend on using so that the referencing works easier.
Next is the referencing of the maps themselves. The first case is using maps with the coordinate planes marked for you. Under the georeferencing tab, you have to set the points you plan on using. This is shown with the blue arrows at the bottom of the set map. These points will tell the map where to set the main image to when layering your new map on the plane. It’s important to get this as precise as possible so you are as close to a real map as possible.
Once you get the points set, you’ll place in the listed longitude and latitude for the point and layer it on top of your main coordinate plane. Apparently it works best with at least 3 points, but because we were pressed for time with our computer malfunctions in the class, it was decided that two points were good enough for work.
As I said, there is another way to place a map that includes using landmarks. Because the map above has set coordinate points, that was the easiest and most correct way to deal with placing it. Some maps don’t have coordinate points, unfortunately, so layering gets a little more difficult. In the map below, you can see the points used to mark our map (see the blue arrows again) as the center of the stadium and the edge of one of the lakes. Once rectified and fit to our basemap, you can see the rest of the map take shape, with the expressway and larger streets lining up between the base and layered maps.
After setting it all up and linking the maps, its up to you with what you do with your new coordinately correct maps, you can show how different maps stack up and differ from one another, or simply how old maps differ from the current base maps we take for granted. Either way, after georeferencing it really becomes your own cartographic adventure. | s3://commoncrawl/crawl-data/CC-MAIN-2018-30/segments/1531676589179.32/warc/CC-MAIN-20180716041348-20180716061348-00506.warc.gz | CC-MAIN-2018-30 | 3,798 | 9 |
https://www.programminghomeworkhelp.com/raptor-program-to-calculate-factorial-using-recursion/ | code | Creating a Factorial Calculator Using Raptor Recursion
Explore our comprehensive guide on building a Raptor program to calculate factorials using recursion. This step-by-step guide will help you master the power of recursion in Raptor programming and provide valuable insights to excel in your Raptor assignments, helping you boost your skills and confidence in completing your Raptor assignment effectively. By the end of this guide, you'll have a functional Raptor program that efficiently calculates factorials, enhancing your programming skills and problem-solving abilities. Whether you're a beginner or an experienced coder, our approach ensures that you grasp the intricacies of recursive programming in Raptor, setting you on the path to success in your Raptor assignments.
Exploring Factorial and Recursion
Factorial, denoted as 'n!', is a fundamental mathematical operation representing the product of all positive integers from 1 to 'n'. For instance, 5! equals 5 x 4 x 3 x 2 x 1, which equals 120. Factorials are used in various mathematical and computational contexts, such as combinatorics and probability calculations.
Recursion is a fascinating programming technique where a function calls itself to break down complex problems into simpler, more manageable subproblems. It's a fundamental concept in computer science, driving many algorithms and data structures. In this guide, we will harness the power of recursion to calculate factorials in Raptor, a visual programming language known for its simplicity and educational value.
These foundational principles of factorials and recursion will not only help you understand the specific program we're building but also provide a solid foundation for tackling a wide range of programming challenges in your journey as a coder.
Building Your Raptor Program
Follow these step-by-step instructions to create a Raptor program that calculates factorials using recursion: In this section, we'll guide you through the process of setting up a Raptor flowchart to implement the factorial calculation algorithm. You'll learn how to design a flowchart that takes user input, handles base cases efficiently, defines a recursive function, and displays the final factorial result. Each step is meticulously explained to ensure that you not only build the program but also understand the logic behind it. By the end of this section, you'll have a fully functional Raptor program that demonstrates the power of recursion in solving real-world mathematical problems. This hands-on experience will enhance your programming skills and equip you with the knowledge to tackle more complex challenges using Raptor and other programming languages.
Step 1: Starting a New Raptor Flowchart
Begin by launching Raptor and creating a new flowchart, setting the stage for our programming adventure. This initial step is crucial as it provides the canvas upon which you'll construct your program. Raptor's user-friendly interface allows you to visualize the program's structure, making it an excellent choice for learning and teaching programming concepts. Starting a new flowchart is the foundation of your project, and it's where the coding journey begins.
Step 2: Adding an Input Symbol
Drag and drop an "Input" symbol onto the canvas to allow users to input the value of 'n'. This step facilitates user interaction, enabling your program to receive the necessary input. The "Input" symbol serves as a gateway for data entry, ensuring that your program can dynamically handle different values of 'n', making it versatile and applicable to a wide range of scenarios.
Step 3: Including a Decision Symbol
Incorporate a "Decision" symbol to check if 'n' is 0 or 1. If it is, we'll handle these base cases and exit the recursion. The "Decision" symbol is a fundamental element for control flow in your program. It helps you create conditional logic, enabling your program to make decisions based on the input provided. In this case, it's crucial for identifying when to terminate the recursion and return the base case value.
Step 4: Creating a Recursive Function
Utilize a "Process" symbol to define a recursive function in Raptor. Here's our Raptor code for the function:
If n = 0 or n = 1 Then
Return n * Factorial(n - 1)
This function elegantly calculates the factorial of 'n' using recursion, considering the base cases. Recursive functions are at the heart of solving complex problems through recursive techniques. In this step, we define a function called "Factorial" that takes 'n' as an input and returns the factorial of 'n'. By using recursion, the function breaks down the problem into smaller, manageable parts until it reaches the base cases, ensuring an efficient computation of the factorial.
Step 5: Calling the Recursive Function
After defining the function, add a "Process" symbol to call it with the user's input ('n'). This step is where the magic happens. By calling the recursive function with the user's input, you initiate the recursive process that calculates the factorial. The program will repeatedly call the "Factorial" function, each time with a smaller value of 'n', until it reaches the base case, at which point it starts aggregating the results to compute the final factorial value.
Step 6: Displaying the Result
To conclude, include an "Output" symbol to display the computed factorial to the user. The "Output" symbol serves as the endpoint of your program, presenting the calculated factorial to the user in an easily understandable format. This step is essential as it provides the user with the final result of the computation, making the program's output accessible and meaningful. It's the moment when all the computational work culminates in a visible and useful outcome.
Step 7: Connecting the Symbols
Connect the symbols on your flowchart to ensure that your program follows the logic outlined above. The connections between symbols define the flow of your program, allowing data and control to pass seamlessly from one part to another. Properly connecting the symbols is crucial to ensure that the program executes in the intended sequence. This step essentially transforms your visual flowchart into a functional program, where each arrow represents the path that data or control flow takes, from input to output.
Step 8: Running the Program
Now, it's time to put your Raptor program into action! Provide an input value for 'n,' and witness the power of recursion as your program calculates and displays the factorial. This step is where your program comes to life. Inputting a value for 'n' triggers the execution of your carefully crafted Raptor program. As the program runs, it leverages recursion to efficiently calculate the factorial, providing you with the final result. This hands-on experience demonstrates the practical application of the recursive approach and allows you to see the logic in action, solidifying your understanding of this powerful programming concept.
In this guide, you've discovered how to craft a Raptor program to calculate factorials using recursion. Recursion is a versatile technique that can tackle intricate problems by dividing them into simpler components. With this knowledge, you're equipped to explore more advanced programming tasks and delve into other algorithms and data structures that benefit from recursive solutions. As you continue your programming journey, remember that recursion is a powerful tool that can unlock innovative solutions to a wide range of computational challenges. Keep exploring and building with confidence! | s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296816893.19/warc/CC-MAIN-20240414161724-20240414191724-00852.warc.gz | CC-MAIN-2024-18 | 7,557 | 28 |
https://meta.wikimedia.org/wiki/Grants:IdeaLab/Ruslik0 | code | I am a steward, English Wikipedia sysop and an active article writer and contributor since 2007. I am a theoretical physicist in real life and have some experience with grant making processes in science context. In 2016 I was also a member of the Wikimania Scholarship Committee and is currently a member of the Election Committee. I hope my experience will be useful.
I am a native Russian speaker. I am a good at managing on-wiki content. I also think that I can help in reviewing research and tools related projects. | s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100739.50/warc/CC-MAIN-20231208081124-20231208111124-00583.warc.gz | CC-MAIN-2023-50 | 519 | 2 |
https://unijokes.com/joke-10114/ | code | The reason the Holy Grail has never been recovered is because nobody is brave enough to ask Chuck Norris to give up his favourite coffee mug.
Chuck Norris knows no fear but fear has been known to hide from Chuck Norris.
Jason Bourne is Chuck Norris' daughter...
When Chuck Norris laughs he busts your gut.
Rudolph has a red nose because he got lippy and Chuck Norris roundhouse kicked him across the face several times.
Chuck Norris doesent need a postage stamp... He just tells the letter where to go and it gets there.
Chuck Norris beat a brick wall at tennis.
Chuck Norris can stare you to death while looking the other direction!
Chuck Norris uses 8'x10' sheets of plywood as toilet paper.
When you have a question you check with Google. When Google has a question they check with Chuck Norris. When Chuck Norris has a question everybody better run! | s3://commoncrawl/crawl-data/CC-MAIN-2019-09/segments/1550247499009.48/warc/CC-MAIN-20190221031117-20190221053117-00576.warc.gz | CC-MAIN-2019-09 | 853 | 10 |
https://bugzilla.mozilla.org/show_bug.cgi?id=520992(which | code | As a security precaution, we have turned on the setting "Require API key authentication for API requests" for everyone. If this has broken something, please contact [email protected]
'520992(which' is not a valid bug number
nor an alias to a bug.
Please press Back and try again. | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280410.21/warc/CC-MAIN-20170116095120-00419-ip-10-171-10-70.ec2.internal.warc.gz | CC-MAIN-2017-04 | 279 | 4 |
https://chrome.google.com/webstore/detail/reddit-cross-platform-syn/bhnomdhnppgippfeflcgniaaccncjkge | code | offered by marzullettifrancesco
This is an internal extension for internal use. Installing this extension without request or invite is a bad idea!
University Lan Test of AI Triggering with synced input and evaluation of it's change over time.
May 10, 2023
English (United States)
Contact the developer | s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224644309.7/warc/CC-MAIN-20230528150639-20230528180639-00734.warc.gz | CC-MAIN-2023-23 | 301 | 6 |
https://www.tr.freelancer.com/projects/sharepoint/create-pdf-generator-for-powerapps-21381822/ | code | We need help to create a PDF generator for Powerapps for usage with Sharepoint data.
The built-in PDF generator does not support modern codes such as CSS3 and HTML5. We create a lot of documents in html in Powerapps, and want to convert them to PDF automaticly from the app.
Please provide your best fixed price to create this PDF generator that handles modern code and formatting such as page break etc.
Bu iş için 4 freelancer ortalamada $45 teklif veriyor
I have a 1year of experience in php so I can do your project perfectly and acutely u can trust one me I will finish the work on time | s3://commoncrawl/crawl-data/CC-MAIN-2019-43/segments/1570986668569.22/warc/CC-MAIN-20191016113040-20191016140540-00157.warc.gz | CC-MAIN-2019-43 | 593 | 5 |
http://fixunix.com/samba/187530-allowing-linux-clients-change-their-password.html | code | This is a discussion on Allowing Linux clients to change their password - Samba ; I have a Linux RH 4 server running Samba 3.0 with an OpenLDAP backend. This server has been servicing Windows users from some time now. Most of our developers are running Linux on their desktops and using local accounts. Now ...
I have a Linux RH 4 server running Samba 3.0 with an OpenLDAP backend.
This server has been servicing Windows users from some time now. Most
of our developers are running Linux on their desktops and using local
accounts. Now I want Linux users to authenticate from the same
Samba/OpenLDAP as Windows users.
I have configured a Linux workstation to authenticate to Samba server
using Samba/Winbind. This appears to be working fine - thanks the
authconfig. However, my present challenge is how to get Linux users to
change their own passwords. It is possible to use smbpasswd to
change password without having to install Openldap on each Linux client
When I try to change my password on the Linux workstation using
smbpasswd, I get the following error message
Old SMB password:
New SMB password:
Retype new SMB password:
machine 127.0.0.1 rejected the (anonymous) password change: Error was :
No such user.
Failed to change password for
This error message suggests that smbpasswd is not using the
Samba/Openldap server for password changes.
How can I correct this?
My smb.conf file is listed below.
workgroup = WILLOW
server string = Mary Smith PC
security = domain
password server = 192.168.15.3
log file = /var/log/samba/%m.log
max log size = 50
socket options = TCP_NODELAY SO_RCVBUF=8192 SO_SNDBUF=8192
printcap name = /etc/printcap
dns proxy = No
idmap uid = 16777216-33554431
idmap gid = 16777216-33554431
cups options = raw
ldap passwd sync = yes
template shell = /bin/bash
winbind use default domain = yes
passwd chat debug = Yes | s3://commoncrawl/crawl-data/CC-MAIN-2016-40/segments/1474738659512.19/warc/CC-MAIN-20160924173739-00087-ip-10-143-35-109.ec2.internal.warc.gz | CC-MAIN-2016-40 | 1,846 | 39 |
https://lists.clearlinux.org/hyperkitty/list/[email protected]/thread/ONEH5C5FHVHQEQHMILWW5L6KK7WNYGEC/ | code | What's the plan? If you need my help just let me know..
On Apr 29, 2017 2:56 PM, "William Douglas" <william.douglas(a)intel.com>
Arjan van de Ven <arjan(a)linux.intel.com> writes:
On 4/28/2017 6:54 PM, mikeljaspe(a)gmail.com wrote:
> Hmm how about a package for them all?
> not a separate packages and for PHP, MariaDB and Nginx only plus
> dependencies and exntension, and they are configure
> example.. this web server package bundle;
> the Nginx is already configure with PHP-FPM basic extensions added.
> The Basic Extension for PHP with Nginx are
> php-fpm php-common php-mysqlnd php-zip php-mbstring php-gd php-mcrypt
> php-pear php-xml php-cli php-pdo php-process
> Then include mariadb plus dependencies
> perl-dbd-mysql perl-dbi mariadb-common mariadb-config mariadb-errmsg
> mariadb-libs mariadb-server mariadb-server-utils
> then just download phpmyadmin manually.
> just a bundle with Nginx, PHP and MariaDB
> this will help web developers to adopt in this kind of os easily..
> this is just a suggestion.
it's certain a good suggestion and we're going to figure out how to do
(it'll be after the weekend though I suspect)
thanks a lot for the feedback
So thinking about this I'd probably opt for doing $language-webdev-basic
style bundles that look like:
Only include $language-basic at the start.
Add specific packages for integration with a web server and db that are
chosen by the bundle maintainer and then any setup style packages for
integration that are likely specific to the bundle.
It may end up growing support for multiple dbs and web servers but
wouldn't immediately start with that support.
I'd suggest we end up scrapping the application-server bundle or
throwing all the integration packages into it so it becomes a sort of
run any type of language with any type of web server with any type of db
kind of bundle (which I generally don't love).
Dev mailing list | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572215.27/warc/CC-MAIN-20220815235954-20220816025954-00759.warc.gz | CC-MAIN-2022-33 | 1,889 | 35 |
https://www.codeproject.com/script/common/TellFriend.aspx?obtid=2&obid=18065 | code | This email was created by [MemberName] <[MemberEmail]> who thought you would be interested in the following Article:
"TDXML: XML-Based Task Dialogs with a Visual Task Dialog Editor"
A library and a visual editor that make it easy to build task dialogs and use them in your C++ applications
CodeProject also contains hundreds of articles, free source code samples and applications to help in your day to day programming. Why not give it a try! | s3://commoncrawl/crawl-data/CC-MAIN-2017-39/segments/1505818686034.31/warc/CC-MAIN-20170919202211-20170919222211-00395.warc.gz | CC-MAIN-2017-39 | 442 | 4 |
https://hn.isujay.com/item?id=25148370 | code | Untangling Mechanized Proofs(plv.csail.mit.edu)
I find this very hopeful, as I feel that presentation should be a first-class consideration for these sorts of tools.
Math is something that happens in the human mind. It doesn't matter if the machine is uncovering the secrets of the Universe if no one can ever appreciate them, eh? I was explaining this to my sister this afternoon and to make the point I picked up a sliderule and slid the slipstick back and forth while pointedly not looking at the thing and asked her, "Am I doing math right now?"
- - - -
I'm trying to put together a simple, easy (relatively) to understand "stack" for this, starting with the theorem provers of Jens Otten: http://jens-otten.de/provers.html
(See also "How to Build an Automated Theorem Prover" http://www.jens-otten.de/tutorial_tableaux19/ )
Prolog is a very simple language, the theorem provers are only a dozen lines of code or so, and the sequent calculus prover at least generates proofs that I personally find easy to follow.
It doesn't go very far yet, but it's a start.
Any information on formal methods and automated theorem proving would be much appreciated.
(along the lines of:
Concrete Semantics https://news.ycombinator.com/item?id=22074483
Metamath Zero, a bootstrapping theorem prover https://news.ycombinator.com/item?id=21358674
The Future of Mathematics? [video] https://news.ycombinator.com/item?id=21200721
"Building the Mathematical Library of the Future" https://news.ycombinator.com/item?id=25060613
A similar book to Concrete Semantics, which I love, is Formal Reasoning about Programs by the same group the OP link comes from: http://adam.chlipala.net/frap/frap_book.pdf
ML for the Working Programmer is written by Paulson, one of the main persons behind Isabelle, and ends up with a prover project: https://www.cl.cam.ac.uk/~lp15/MLbook/
Paulson teaches an undergrad course in Cambridge which is now using Huth & Ryan as a textbook. It's an incredible book that focuses on logic, SAT solvers and model checking. Probably the place to begin. An incomplete draft 2nd edition is in the authors website: ftp://ftp.cs.bham.ac.uk/pub/authors/M.D.Ryan/tmp/Anongporn/Ch1+3.pdf
If you are interested in tableaux techniques, First-order Logic and Automated Theorem Proving by Fitting is a good text.
Personally, I think the place to start from is Huth & Ryan. Logic is the calculus of CS. Then progress to type theory using a book like TAPL by Pierce or Proofs and Types by Girard.
Then, depending on your interests, you can proceed to model checking, program analysis and theorem proving. For the first two, the classics are Katoen and Nielson & Nielson, respectively.
I wrote two reference type checkers for Lean and learned a lot about both the Lean kernel and the implementation of DTT; it's not an easy exercise, but I would recommend it. The ones I wrote are in a language that's not the easiest to read (though I did end up getting the performance to justify the language choice), but if any related questions come up feel free to contact me and I'll do my best to give a coherent answer: https://github.com/ammkrn/nanoda_lib
This paper on Lean's type theory dovetails nicely with any of the kernel implementations: https://github.com/digama0/lean-type-theory/releases/tag/v1....
Also this article is really neat, thanks OP. These kinds of visual representations and other alternative mediums you can use to document stuff are (imo) a really important and under-explored area.
> It doesn't matter if the machine is uncovering the secrets of the Universe if no one can ever appreciate them, eh?
It's possible with access to something that almost serves as an oracle like this, we can use it prove deeper things that we do understand, with only the details of this one portion left un-understood. You could just assume a proposition is true or false, and do the same by working with the assumption, but that can quickly combinatorically explode with multiple propositions.
Yes, but you still have a regress: you have to have good reason to trust the oracle.
(E.g. Yin-Yang – A tool for stress-testing SMT solvers https://news.ycombinator.com/item?id=25123138 They found a bunch of bugs in Z3 and CVC4!)
This is one area where Isabelle/Isar surpasses Coq in my experience, the proofs are simpler to follow because they somewhat mimic written English, and try to emulate flows of states as the author of this article mentions.
Isabelle's older apply-script syntax suffers from the same problem as Coq, but Isar seems to solve this problem more cleanly than this addon does for Coq, as it's built into the Isabelle ecosystem directly.
Edit: However, this is a neat augmentation to Coq that seems helpful. I commend the author, it looks well done.
Older versions of Coq used to include an Isar-like feature known as C-zar, or the "Mathematical Proof Language". It was quite intuitive to use, perhaps even moreso than Isar. Unfortunately it was also quite buggy and unmaintained, so it got removed in later releases. Within current versions of Coq, I think the "structuring" operators in Ssreflect could perhaps be used to replicate that proof format, but some extensions are needed. The basic operation "have ... by ..." is pretty much there, but an Isar-like proof language includes more than that.
The thing I love most about mechanized proofs is that my questions about the reasoning always have tangible answers, even if the answer is “we axiomatized this thing”.
The availability of the intermediate proof state as a part of the published object makes those answers that much easier to find. This is a really great project!
That is pretty cool! I have also tried to address this problem in the past, but by adding annotations to the proofs (https://github.com/andrew-bedford/coqatoo). It was only a proof-of-concept though. | s3://commoncrawl/crawl-data/CC-MAIN-2020-50/segments/1606141216897.58/warc/CC-MAIN-20201130161537-20201130191537-00205.warc.gz | CC-MAIN-2020-50 | 5,838 | 34 |
https://www.counterpart.biz/successful-restful-web-api-lunch-learn/ | code | We just completed our first Lunch & Learn, and the topic was RESTful Web API. Thanks to all those who attended!
During the event, we built a short functional demo from scratch which we shared below. Since all the things we did today can be re-created for free, we posted them here so those who are learning RESTful Web API might be able to get started themselves.
We created a new ASP.NET
Web Application, choosing Web API as an option, when creating the project.
In addition, we created these four files to add to the project, in the following locations: | s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510942.97/warc/CC-MAIN-20231002001302-20231002031302-00303.warc.gz | CC-MAIN-2023-40 | 555 | 5 |
https://devops.stackexchange.com/questions/15613/private-certificate-authority-and-container-images | code | We have a internal domain name, let's say "mycompany.net" with a private CA which delivers all our internal application HTTPS certificates for this domain like "myapp.mycompany.net".
Now, I'm writing an application that need to connect to an internal HTTPS service. This app runs inside a container which by default doesn't know our private CA and refuse to connect to the HTTPS service.
I can add the CA certificate in my app image but having to do it for every app will be both not DRY and error prone.
I can provide a base image with the certificate so that all apps use this base image. But then:
- either I also provide a base image for every language we use (Java, Python...) relying on the 1st base image, feels like reinventing the wheel (though it means we would know for sure content of the images which is good from a security perspective)
- or, we reuse standard language base images but add our certificate in each of them, less dry but easier to maintain?
- or... ?
I'm wondering what's the recommended approach here? I feel like I'm missing something.
And I'm not even mentioning that Python seems to need a specific environment variable to use the CA certificate | s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100781.60/warc/CC-MAIN-20231209004202-20231209034202-00503.warc.gz | CC-MAIN-2023-50 | 1,178 | 9 |
https://www.br.freelancer.com/projects/advertising/need-some-technical-assistance-for/ | code | I have sixteen years experience in the field of media and advertising. I can provide you consultation related to advertising and media to achieve your business objectives.
Relevant Skills and Experience
My expertise lMais
Hi Sir, I'm Izzatie will assist you regarding for this job for technical advertising as well as will to fulfill the requirement that you want. Hopefully you will consider with my application. Have a nice and happiest dMais | s3://commoncrawl/crawl-data/CC-MAIN-2019-43/segments/1570987795403.76/warc/CC-MAIN-20191022004128-20191022031628-00539.warc.gz | CC-MAIN-2019-43 | 444 | 4 |
http://tiarno.github.io/plastex/plastex/sect0041.html | code | Base class for all renderers. Renderer is a dictionary and contains functions that are called for each node in the plasTeX document object. The keys in the dictionary correspond to the names of the nodes.
This renderer implementation uses a mixin called Renderable that is mixed into the Node class prior to rendering. Renderable adds various methods to the Node namespace to assist in the rendering process. The primary inclusion is the __unicode__() method. This method returns a unicode representation of the current node and all of its child nodes. For more information, see the Renderable class documentation.
contains a string template that renders the placeholder for the image attributes: width, height, and depth. This placeholder is inserted into the document where the width, height, and depth of an image is needed. The placeholder is needed because images are not generated until after the document is rendered. See the Imager API (section 6.7) for more information.
contains a string template that renders the placeholder for the image attribute units. This placeholder is inserted in the document any time an attribute of a particular unit is requested. This placeholder will always occur immediately after the string generated by imageAttrs. The placeholder is needed because images are not generated until after the document is rendered. See the Imager API (section 6.7) for more information.
a reference to an Imager implementation. Imagers are responsible for generating images from LaTeX code. This is needed for output types which aren’t capable of displaying equations, LaTeX pictures, etc. such as HTML.
contains a list of file extensions of valid image types for the renderer. The first element in the list is the default image format. This format is used when generating images (if the image type isn’t specified by the filename generater). When static images are simply copied from the document, their format is checked against the list of supported image types. If the static image is not in the correct format it is converted to the default image format. Below is an example of a list of image types used in the HTML renderer. These image types are valid because web browsers all support these formats.
imageTypes = ['.png','.gif','.jpg','.jpeg']
contains a list of file extensions of valid vector image types for the renderer. The first element in the list is the default vector image format. This format is used when generating images. Static images are simply copied into the output document directory. Below is an example of a list of image types used in the HTML renderer. These image types are valid because there are plug-ins available for these formats.
vectorImageTypes = ['.svg']
The generator has an attribute called namespace which contains the namespace used to resolve the variables in the filename string. This namespace should be populated prior to invoking the generator. After a successful filename is generated, the namespace is automatically cleared (with the exception of the variables sent in the namespace when the generator was instantiated).
Note: This generator can be accessed in the usual generator fashion, or called like a function.
this method is called once the entire rendering process is finished. Subclasses can use this method to run any post-rendering cleanup tasks. The first argument, document, is the document instance that is being rendered. The second argument, files, is a list of all of the filenames that were created.
This method opens each file, reads the content, and calls processFileContent on the file content. It is suggested that renderers override that method instead of cleanup.
In addition to overriding processFileContent, you can post-process file content without having to subclass a renderer by using the postProcess argument. See the render method for more information.
keys is a list of strings containing the requested name of a rendering method. This list is traversed in order. The first renderer that is found is returned.
default is a default rendering method to return if none of the keys exists in the renderer.
post-processing routine that allows renders to modify the output documents one last time before the rendering process is finished. document is the input document instance. content is the content of the file in a unicode object. The value returned from this method will be written to the output file in the appropriate encoding.
invokes the rendering process on document. You can post-process each file after it is rendered by passing a function into the postProcess argument. This function must take two arguments: 1) the document object and 2) the content of a file as a unicode object. It should do whatever processing it needs to the file content and return a unicode object. | s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917122726.55/warc/CC-MAIN-20170423031202-00270-ip-10-145-167-34.ec2.internal.warc.gz | CC-MAIN-2017-17 | 4,791 | 18 |
https://wasmcloud.com/docs/reference/bindle/using-bindles/ | code | Using Bindle with wasmCloud
Bindles can be used with both
wash and the wasmCloud
Dashboard. To use a bindle instead of an OCI image, simply preface the bindle ID with
and the host will attempt to download the provider or actor using Bindle.
$ wash ctl start provider bindle://wasmcloud.dev/httpserver/0.14.7
Unlike OCI images, Bindle IDs do not contain their hosting server (i.e.
Currently you can only configure 1 bindle server for a host. To configure the host to use a specific
bindle server, the following environment variables are available when starting a wasmCloud host:
|The base URL of the Bindle server to connect to. Please note that this must be a full URL with the base path (e.g. |
|A static token (generally for a service account) to use for authentication. If this is set it will take precedence over HTTP basic auth|
|The username to use for HTTP basic auth. If this is set, then |
|The password to use for HTTP basic auth. This will be ignored if | | s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296945472.93/warc/CC-MAIN-20230326111045-20230326141045-00087.warc.gz | CC-MAIN-2023-14 | 966 | 13 |
https://www.oldapps.com/zh-cn/VLC_Player.php?old_vlc=53 | code | 旧版本 VLC Player 1.1.3
46 scans reported this version clean
- Windows 2000
- Windows XP
- Windows XP x64
- Windows Vista
- Windows Vista x64
- Windows 7
- Windows 7 x64
- Taglib crash (CVE-2010-2937 / VideoLAN-SA-1004)
- Fixes for FTP relative paths and directories
- Fixes for Podcast and DVD modules
- ... and many other crashes and errors fixed
- Extensions and scripts updates …
VLC (initially VideoLAN Client) is a highly portable multimedia player for various audio and video formats (MPEG-1, MPEG-2, MPEG-4, DivX, mp3, ogg, avi) as well as DVDs, VCDs, and various streaming protocols. It can also be used as a server to stream in unicast or multicast in IPv4 or IPv6 on a high-bandwidth network.
VLC Player Features
- It supports a large number of multimedia formats, without the need for additional codecs
- VLC Player needs little CPU power
- VLC can use a large number of input devices
- Easy to use interface.
更新 : VLC Player 更新
Did You Know?
You can even use VLC to convert your files, and on top of all the formats and physical media it will play, many streaming protocols and TV capture cards are supported. | s3://commoncrawl/crawl-data/CC-MAIN-2021-04/segments/1610704828358.86/warc/CC-MAIN-20210127152334-20210127182334-00601.warc.gz | CC-MAIN-2021-04 | 1,135 | 23 |
http://developer.nokia.com/community/discussion/showthread.php/100258-User-agent?p=278523&viewfull=1 | code | Phone browser : User-agent header is set by the phone browser while making a request. This user agent header gives complete information about phone like profile,configuration ,phone model etc. Therefore at the server side, content modification can easily be done based on phone model.
Java Application: In case of java application, we set the User-Agent string by ourself within the application.
My question : Is there any way to get the string which is set by phone browser for User-Agent such that the same string can be setted from the application.
If not then what are the system properties which describes about the phone capabilities and run on all the phone.
e.g - microedition.platform - Tells about the phone model and software version etc. But on some phones it just return "J2me". Theerfore it wont solve the purpose.
I hope i am able to explain my query. Please do ping me if there is any problem in understanding the question. | s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1408500823634.2/warc/CC-MAIN-20140820021343-00345-ip-10-180-136-8.ec2.internal.warc.gz | CC-MAIN-2014-35 | 939 | 6 |
https://coderanch.com/t/396845/java/nullpointerexception-JDBC | code | The sheriff moved my question (Another null pointer exception) to the JDBC forum but, as a real newbie, how can I tell that's what is causing the problem? When I get an Oracle error (e.g. ORA-xxxx: Unexpected end to SQL statement , etc. I can tell; but in this case?
Please let me know how I can determine this. I wasn't really looking for someone to debug my code for me but, rather, give me a tip or clue about where to start looking. Thanks.
You still haven't posted any example code to demonstrate your problem, so I'm partially guessing about things.
From your posts in that thread, your questions seemed to center on inserting a null reference into a database (as a number), and then wondering if that would cause a NullPointerException. So, it seemed that the thread was JDBC-specific.
Looking through the stacktrace in your other post, would you happen to have a JSP called display.jsp in your app? If you do, then there's probably something in there where you're trying to display a numeric value (possibly also formatting it) and you don't have a valid number.
Practice only makes habit, only perfect practice makes perfect.
Practice mindfully by doing the right things and doing things right.— Junilu | s3://commoncrawl/crawl-data/CC-MAIN-2018-13/segments/1521257648103.60/warc/CC-MAIN-20180322225408-20180323005408-00632.warc.gz | CC-MAIN-2018-13 | 1,213 | 7 |
https://www.unixtutorial.net/category/high-availability | code | If you've never setup a cluster in RedHat/CentOS using pcs – I strongly suggest you give it a try! Lots of fun!
PCS is the name of command line interface for RedHat Cluster, it allows you to manage Pacemaker (open-soure cluster resource manager) and Corosync (cluster membership and messaging layer). Please visit ClusterLabs.orgfor more information.
One of the more interesting things (although very standard for cluster setups) in setting cluster up is STONITH. It's a fencing mechanism with an impressive number of mechanisms supplied by default.
Fencing takes care of monitoring your cluster closely with a view of fencing (blocking) a faulty node as soon as the node is confirmed to be malfunctioning.
Specifically, if there's a timeout or an error with starting a service, your pcs stonith setup may dictate that this condition is bad enough for the server (or VM) to be rebooted or completely shut down.
STONITH is actually an acronym, and it means Shoot The Other Node In The Head. Quite a violent name for a high availability feature, don't you think?
- Unix commands
- Veritas Infoscale | s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100229.44/warc/CC-MAIN-20231130161920-20231130191920-00104.warc.gz | CC-MAIN-2023-50 | 1,098 | 8 |
https://homehack.nl/tag/imagemagick/ | code | As a follow up on my Bash scripting efforts that I started this year I wrote a script that resizes a photo to a specified width in pixels. The script should work both on Linux and OSX (tested on OSX, will test on Linux later). For this script to work ImageMagick needs to be installed. The script tests if an argument is specified (the original photo of course), if ImageMagick has been installed and if the file output.jpg exists. If output.jpg exists the user gets the option to overwrite the existing file or exit the script. Finally the user needs to specify the width in pixels of the output.jpg.
If you want to use this script, copy the code below and paste it into an editor like vim, vi or Geany. Save it e.g under the name resize and make this file executable by typing.
chmod 755 resize
Now if the photo is in the same folder as the script just type.
#!/bin/bash # written by Eric Buijs 12 january 2019 if [ $# -eq 0 ] then echo You need to specify a file. echo e.g: resize photo.jpg exit 1 fi if [ ! $(which convert) ] then echo This script requires Imagemagick! echo You can download it at http://www.imagemagick.org/ exit 1 fi if [ -e output.jpg ] then echo output.jpg already exists. read -p "Do you want to overwrite it? (Y/N) " answer echo $answer if [ $answer = "N" ] then exit 1 fi fi read -p "What is the desired width in px: " width convert $1 -resize $width output.jpg | s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510575.93/warc/CC-MAIN-20230930014147-20230930044147-00522.warc.gz | CC-MAIN-2023-40 | 1,389 | 5 |
https://www.bart.land/ | code | “Movement as artistic research in the field of tension between human (nature) and (analoge/digital/data) machines.
Always being at something/somewhere; at home, at work, at job, at web, in/out, open/closed, offline/online, …
Create by wandering (in) between technologies and (real) life.
Questioning the possible end of things and thoughts.”
The place to be when your interested in my history.
“Software (interactive installation, IoT) and web development in combination with a range of media technologies like 3d/infrared cameras, sensors and other hardware.” | s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100686.78/warc/CC-MAIN-20231207185656-20231207215656-00042.warc.gz | CC-MAIN-2023-50 | 570 | 6 |
https://orhamuvek.hu/en/referenciak/ | code | Take a look at our completed projects. If you have any questions, please contact us.
Here are some references that are similar to the project you are planning:
- Using the page reference filter, select the service that matches your requirements.
- By clicking on the reference images, you can display the whole gallery.
- Please feel free to call the contacts for the given reference, and ask about our projects! | s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446710789.95/warc/CC-MAIN-20221201021257-20221201051257-00304.warc.gz | CC-MAIN-2022-49 | 412 | 5 |
http://www.thisisthegreenroom.com/2009/yurtle-the-turtle-had-nothing-on-this/ | code | The Burj Dubai is by far the tallest building in the world, despite being unfinished. However, I find it difficult to grasp just how massive it is. A recent Gizmodo post came close to capturing its immense height (see the image below) but still, a true sense of scale is absent.
The trouble is that I have no concept of relative height when I'm looking at those images; yes, the tower looms over other buildings that I know deep down would be considered immense in their own right, but they might as well be townhouses. They provide no context because I have nothing tangible to compare them to. Meanwhile, silhouette comparisons such as this one convince me of the Burj Dubai's height, but do little to impress any grand sense of scale:
What I need is a comparison that marries the abstraction of the silhouette with the concrete grounding of the actual photos. Once again quoting Tom Lehrer, I have a modest example here...
Turning to Google Earth, I mocked up the views from two popular Manhattan observation decks - the Empire State Building and the Rock (that's Rockefeller Center for the non-30 Rock fans New Yorkers among you). Then, I raised the viewpoint to 2,690 feet - the height of the Burj Dubai's hypothetical observation deck. The result is an impossible view of Manhattan which instantly captures the building's enormous scale by putting its height in a familiar context. If you are unfamiliar with the New York cityscape, then these examples may be as abstract as the actual Dubai pictures are to me; however this is an experiment well worth repeating in your own urban backyard.
Note: Clicking the following images will launch an image gallery in a lightbox. The first image will show the view from an existing New York observation deck. Clicking the right side of that image will load the next image, which shows the same view from the top of the Burj Dubai. Click outside the lightbox to close it. Note that all the images below will load, so you can click through all five viewpoints without leaving the lightbox.
Note also: The effect is much more dramatic in Google Earth, which supplies smooth transitions between the viewpoints - like taking an elevator up the spire. But I'm having trouble embedding the 3D view here, so I hope these images suffice...
First up, the view from the ESB looking north toward Central Park. The real view is impressive but the Burj Dubai can practically see upstate:
Next, a similar view - the ESB looking northeast into midtown and across the East River. The Burj Dubai view makes the surrounding buildings look tiny:
Another view familiar to tourists - the ESB looking south toward the Financial District. From the Burj Dubai, you could see clear across New York Harbor and out into the Atlantic:
Turning now to the Rock, here's a similar view to the south, including the Empire State Building and Chrysler Building. The Burj Dubai towers over these New York giants:
Finally, here's another view north, this time from the Top of the Rock. The difference is unbelievable:
I hope that these visual comparisons give some greater meaning to how incredibly tall the Burj Dubai is by supplying a familiar context for its height. In a final push for perspective, we are all familiar with this iconic view of downtown Manhattan:
Typically, a helicopter would be used to capture an image from such height. But in this case - you guessed it - all you'd have to do is take the elevator. Yurtle the Turtle had nothing on this! | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560283008.19/warc/CC-MAIN-20170116095123-00159-ip-10-171-10-70.ec2.internal.warc.gz | CC-MAIN-2017-04 | 3,470 | 13 |
https://help.apperian.com/display/pub/Sending+Notifications+to+Users | code | Users do not need to be logged in to the App Catalog to receive a notification message, although they must have previously logged in to the App Catalog at least once. Users running a web App Catalog can't receive notifications.
Apperian sends notification messages as push notifications. The following examples show messages sent to a group and received on both iOS and Android devices. Note that users can set the behavior of push notifications for apps installed on their devices, so the experience may vary based on the settings they made for the App Catalog. For example, users on devices running iOS 5.0 or higher can choose an Alert instead of Banner alert style so that the initial message displays in a popup alert dialog rather than a banner at the top of the screen. Users on both Android and iOS platforms can choose to disable notifications.
When a user views a notification message outside of the App Catalog (in a banner, alert dialog, or the Notification Center), the message displays the name of the App Catalog in the header to indicate the app from which the notification is sent. With application notifications, it also prefaces the message with the name of the app to provide context for the content of the message. The following example shows messages displayed in the Notification Center on an iPad.
When a user logs into the App Catalog to view the complete message, group notifications display a "Group Notification" header and application notifications display an "Application Notification" header and preface the message with the name of the app. | s3://commoncrawl/crawl-data/CC-MAIN-2018-47/segments/1542039743105.25/warc/CC-MAIN-20181116152954-20181116174954-00402.warc.gz | CC-MAIN-2018-47 | 1,572 | 4 |
https://edu.gcfglobal.org/en/accessxp/database-concepts/1/ | code | A database is a collection of information organized and presented to serve a specific purpose. Database programs are created using a program like Microsoft Access XP.
A Microsoft Access database is made up of several components including:
These components are called database objects. One or more of these objects is formed when a database is created. These components are stored in a single database file.
Data is stored in one or more tables. Separate tables are usually created for specific topics, such as products or suppliers. Tables can be related to one another to access different types of information. Because data is stored only once—you probably would not save the same information in two different tables—your database becomes more efficient.
The columns and rows in an Access table resemble an Excel spreadsheet. Tables organize data into columns (called fields) and rows (called records). A record is comprised of one or more fields, depending on the number of fields that are defined to the table.
Individual fields in an address book table might consist of name, street address, city, state, zip code, and phone number. A single record is an entry that uses all of these fields, such as your brother or sister's contact information.
A query lets you find and retrieve information from one or more tables based on a set of search conditions you define (e.g., certain fields in one or more tables). The results can be displayed in a manner of your choosing. Queries can be created using a wizard or developed from scratch in the Query Design view.
An online form can be created to view, input, or change information in one or more tables. In this tutorial, we will see how forms are used as both menus and as data entry forms to database tables. Forms can retrieve data from one or more tables and display the output on the screen.
A report is an effective way to analyze and present data in a printed format using a specific layout. You have control over the size and appearance of information printed on the report, similar to formatting you perform in a Microsoft Word document.
The best way to understand databases is to learn how to view the world and the things in it, and then think of structures that best serve to organize this information.
For example, think of your music collection in terms of a database. The database might be called music collection. What tables might be in this database?
Here is your assignment:
The last step above—looking at the information to be categorized—is the first step toward designing a database. | s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947473598.4/warc/CC-MAIN-20240221234056-20240222024056-00829.warc.gz | CC-MAIN-2024-10 | 2,563 | 13 |
https://testautomationpatterns.org/wiki/index.php/TEST_AUTOMATION_FRAMEWORK | code | TEST AUTOMATION FRAMEWORK
Use a test automation framework.
This pattern is appropriate for long lasting automation.
If you just plan to write a few disposable scripts you will not need it.
Using or building a test automation framework helps solve a number of technical problems in test automation. A framework is an implementation of at least part of a testware architecture.
Useful tip from James Tony: Select your test framework with care – a wrong decision (like use of “make” to run tests) can take a long time to fix further down the line.
Test automation frameworks are included in many of the newer vendor tools. If your tools don’t provide a support framework, you may have to implement one yourself.
Actually it is often better to design your own TESTWARE ARCHITECTURE, rather than adopt the tool's way of organising things - this will tie you to that particular tool, and you may want your automated tests to be run one day using a different tool or on a different device or platform. If you design your own framework, you can keep the tool-specific things to a minimum, so when (not if) you need to change tools, or when the tool itself changes, you minimise the amount of work you need to do to get your tests up and running again.
The whole team, developers, testers, and automators, should come up with the requirements for the test automation framework, and choose by consensus. If you are comparing two frameworks (or tools) use SIDE-BY-SIDE to find the best fit for your situation.
A test automation framework should offer at least some of the following features:
- Support ABSTRACTION LEVELS
- Support use of DEFAULT DATA
- Support writing tests
- Compile usage information
- Manage running the tests, including when tests don't complete normally
- Report test results
You will have to have MANAGEMENT SUPPORT to get the resources you will need, especially developer time if you have to implement the framework in-house.
It is not necessarily easy to acquire or make a good test automation framework, and it does take effort and time. But it is very worthwhile when done well.
If you intend to develop a framework in-house make sure to plan for the necessary resources (developers, tools etc.) otherwise you could end up with a good framework that must be abandoned because for instance the only developer leaves the company (see issue KNOW-HOW LEAKAGE for more details).
Issues addressed by this pattern
If you have used this pattern and would like to contribute your experience to the wiki, please go to Feedback to submit your experience or comment.
.................................................................................................................Main Page / Back to Design Patterns / Back to Test Automation Patterns | s3://commoncrawl/crawl-data/CC-MAIN-2021-17/segments/1618038464045.54/warc/CC-MAIN-20210417192821-20210417222821-00526.warc.gz | CC-MAIN-2021-17 | 2,762 | 22 |
https://kennedyj.itch.io/usolved | code | This is a simple text game, it's not meant to be a full game. I may come back to this in a later time and turn it into a playable game.
A simple text adventure game that uses a finite state machine (FSM). The computer will provide a description and choices that the user must then choose by pressing a key on the keyboard. The game will end once required objectives are complete. The computer will ask the user to press a key to play again.
You are a new detective that wakes up in your office, thirsty and hungry. Navigate your way through the lower floor and bring your vitals back to a healthy status. Reach the second floor and you finish the game. | s3://commoncrawl/crawl-data/CC-MAIN-2019-13/segments/1552912201812.2/warc/CC-MAIN-20190318232014-20190319013525-00075.warc.gz | CC-MAIN-2019-13 | 652 | 3 |
https://www.polygence.org/scholars/divya-angelina | code | Class of 2023Bangalore, Karnataka
AboutHello! My name is Divya Angelina. I am in 12th grade. I am keen to pursue undergrad in computer science. I want to develop an application that would be of high-value proposition that aims to solve a critical problem. I love to solve problems, and I believe solving an interesting problem using computers would give me the ultimate satisfaction. My Polygence project isn't finalized and I'm looking for inputs from my mentor to come up with an interesting project. The goal of doing a project with Polygence is multifold: I would like to learn how to identify problems, research, collect all the needed data, develop a plan to solve the problem using computers, summarize the learning from the experience, and present it to a larger audience. I would like to present it as a paper in a research publication. I believe this experience would prepare me for my higher calling of doing research work when I get to college.
- "Using machine learning to understand the effects and prepare for global climate change" with mentor Hugh (Working project)
Using machine learning to understand the effects and prepare for global climate change
Started June 26, 2023
Abstract or project description
In Divya's project, she will focus on utilizing several different datasets to better understand how the effects of global climate change on humans. In one dataset, she will first understand the impact of global climate change on food scarcity. To do this, she will understand how the different environmental changes due to global climate change such as temperature affects crop growth and how this may affect the future of agriculture. In another dataset, she will continue to explore the projections of these temperature and weather changes to better anticipate these changes and research ways to either circumvent these changes and/or prepare for these changes. By completing this project, Divya will increase our holistic knowledge of the impacts of global climate change and advocate for the need for action. | s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947473598.4/warc/CC-MAIN-20240221234056-20240222024056-00671.warc.gz | CC-MAIN-2024-10 | 2,036 | 7 |
https://en.wikipedia.org/wiki/Binkp | code | Historically, Fidonet traffic was transferred mainly over serial (RS-232) modem connections which might not have an error correction layer. These dial-up-oriented protocols for transferring Fidonet traffic like EMSI or Zmodem had to implement error-recovery. When the members of Fidonet started to use TCP/IP to transfer Fidonet traffic, this error-recovery overhead became unnecessary. Assuming that the connection is reliable makes it possible to eliminate error-checking and unnecessary synchronization steps, achieving both ease of implementation and improved performance. The major advantage of binkp vs EMSI and Zmodem is achieved over connections with large delays and low bandwidth.
IANA (Internet Assigned Numbers Authority) has registered the port number 24554 for binkp when used over TCP/IP connections.
- In 1996, Dima Maloff released the first draft of the protocol specification and the first mailer, binkd, that supported the new protocol.
- In 1997, Argus mailer began to support the binkp protocol.
- In 1999, Dima Maloff, Nick Soveiko and Maxim Masiutin submitted the protocol specification to the Fidonet Technical Standards Committee (FTSC), which published the document as Fidonet Standards Proposal (FSP-1011).
- In 2005, FTSC assigned the Fidonet Technical Standard (FTS) status to the binkp protocol, and split the specification into four separate documents: Binkp/1.0 Protocol specification (FTS-1026), Binkp/1.0 optional protocol extension CRAM (FTS-1027), Binkp protocol extension Non-reliable Mode (FTS-1028), and Binkp optional protocol extension Dataframe Compression (FTS-1029).
- On October 2nd 2015, WWIV BBS's WWIVnet implemented a binkp backbone for its network. | s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446711278.74/warc/CC-MAIN-20221208050236-20221208080236-00580.warc.gz | CC-MAIN-2022-49 | 1,698 | 7 |
https://community.filemaker.com/thread/89009 | code | Automating file imports
I am writing a little mini app to track the discounts we get per check run per vendor. Our accounting system spools the print file. Manually I can import the file to a table. Every row goes into a field, one record per row of report. I break that field into out by column on the report to other fields using text calculations (left right middle). There are obviously lots of dead rows, blank rows, header rows, etc. I have a find scripted to isolate the rows that actually have discounts taken. I have all the calculations to do things.
I import to one table to do the parsing and clean up. Then I import those records into a clean table to accumulate data. This will let me run reports for months, quarters, with subtotals by vendor.
In the scratch table I start by deleting all rows... starting clean. I prompt for the check date. I store that in a global. I can do a calculation in a let statement the creates the file name which is apckrgMMDDYY.ap. I have set up a path to the folder where the spool files are stored after downloading from the unix box where the accounting is done.
When I run the script, it says file not found. It leaves me in the correct folder that I specified in the PATH. I can see the file in the folder. it just doesn't import it. What am I missing. Is it because it is a run-time? I am working in Ver10 Advanced. I am creating the runtime in Windows. I really want this to work, it will impress my boss. *BROWNIE POINTS* | s3://commoncrawl/crawl-data/CC-MAIN-2018-05/segments/1516084894125.99/warc/CC-MAIN-20180124105939-20180124125939-00284.warc.gz | CC-MAIN-2018-05 | 1,474 | 5 |
https://groups.yahoo.com/neo/groups/hackers-il/conversations/topics/3476?o=1&d=-1 | code | Re: How to implement a prefix tree?
- Robert Sedgewick, the same guy who wrote my favorite algorithms book,
has a paper on Ternary trees and related stuff. Check out:
I also found a rumor that such an algorithm is already included in
"libiberty", whatever that is; Check out:
> A more reasonable method, that I haven't tried myself but saw inbooks, is
> ternary trees: when you have the next input character "g", you don'tdecide
> what to do based on just one node; Instead, say the node holds acharacter "e".
> You now go to one of three possible nodes based on whether "g" issmaller than,
> equal or larger than "e". Unless you chose the "equal" case, youcontinue
> with the same input character without going forward to the next one.Tishri 5764
> Check out your favorite algorithm for the ternary tree algorithm, or if
> you can't find it ask me for a reference.
> Good luck.
> Nadav Har'El | Saturday, Oct 25 2003, 30
> nyh@m... |-----------------------------------------clause.
> Phone: +972-53-790466, ICQ 13349191 |A cat has claws ending its paws. A
> http://nadav.harel.org.il |sentence has a pause ending its | s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440644068184.11/warc/CC-MAIN-20150827025428-00225-ip-10-171-96-226.ec2.internal.warc.gz | CC-MAIN-2015-35 | 1,117 | 18 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.