url
stringlengths 13
4.35k
| tag
stringclasses 1
value | text
stringlengths 109
628k
| file_path
stringlengths 109
155
| dump
stringclasses 96
values | file_size_in_byte
int64 112
630k
| line_count
int64 1
3.76k
|
---|---|---|---|---|---|---|
https://experienceleaguecommunities.adobe.com/t5/adobe-campaign-standard/is-it-possible-to-create-a-web-view-editor/qaq-p/247909 | code | I have got a question from a client there would like to be able to add a feature where you can turn the web-view into an editor where you can export/save the changed content.
If this could update directly in Adobe it would be great, else they should be able to select from a list of email addresses, where you would like the changes to be send to as an file (format is not important, just that it is readable for a Non-tech person).
Does any of you know if there is any possible way to make this possible?
Or is this a crazy idea to be able to create anything like this
Thanks in advance,
What you are asking is already supported by AEM and adobe campaign integration. Campaign and Experience Manager - Importing an AEM content into an Adobe Campaign email.
The second option is that you let the customer update the email in the Adobe campaign console.
The third option is you can build a custom WYSIWYG editor to edit the email outside of Adobe campaign via web apps(created in Adobe campaign ) and on saving the content post the content to adobe campaign which will update the tempæate.
The fourth option is that by using any other CMS to edit and update emails templates HTML at an FTP location and use Adobe campaign to load the HTML file from that location.
I'm not sure I fully understand the request here. Can you specify which web-view you are talking about (and for which version of Campaign ).
What would need to be edited/exported/saved?
Using workflows, you should already be able to export data in a file (for example, in a csv file that can be easily read in Excel or something).
Let me know and I'll check what we can do,
Its on the classic version of Campaign.
The web-view is the mirror-page (just getting used to call it web view ).
I need it to be an editor where (in this case) the client would be able to make some changes to the email content (mainly text) and save the new content on the email itself in Campaign. Or export the email from the editor into a readable file that can be read and changed in Campaign afterwards.
This "web-editor" should be a feature on the delivery form, there can be turned off/on.
Hope it clarifies the question
Thanks in advance, | s3://commoncrawl/crawl-data/CC-MAIN-2021-31/segments/1627046153934.85/warc/CC-MAIN-20210730060435-20210730090435-00655.warc.gz | CC-MAIN-2021-31 | 2,185 | 19 |
https://forem.dev/ildi/is-it-possible-to-delete-hide-tags-16km | code | Sometimes when a user writes a post and adds tags to it, they might make the occasional mistake of misspelling a tag.
For example: I recently wrote this post about Bruno Mars and I made the mistake of writing #brunamars instead of #brunomars as one the tags. When I finally did catch this mistake I was able to edit the post, remove the incorrect tag and add the new tag. This works just fine but the incorrect tag still shows up on the tags page even though there are 0 posts currently for the #brunamars tag.
I looked at the admin settings and documentations and did not find an option to permanently delete tags. I also did not find an option to manually hide/omit tags from the main tags page. Initially I assumed that tags which had 0 posts assigned to them would not be visible to users but that is not the case.
Already on 1VIBE there are 6 tags that have 0 posts assigned to them. These tags were created by mistake as in the example above. Admins should have options to permanently delete these or edit them to the correct tag.
This also came up because today I decided that we need to make some changes to the tags on 1VIBE. Example: #interview will become #interviews, #music will become #songs and #video will become #videos. I wanted to ask this question on here first before I go ahead and make changes.
Top comments (13)
I think for the moment, all you can do is alias it.
Thank you @nickytonline I did not know that’s how the “Alias for” feature worked. I will use this workaround for now but I do think the tags system/page can use some improvement.
Another suggestion I have is regarding the URL structure for tags that have more than one word. Example: 1vibe.com/t/brunomars should instead be /t/bruno-mars. My understanding is that this would also be beneficial for SEO.
Yeah, for sure it's a workaround.
I definitely agree tag management can be improved. I think it makes sense for tags to allow for kebab case, e.g.
bruno-mars. Maybe there was a technical reason we did not allow for this.
Since tags can be user-generated, the concept of fully deleting them may or may not make sense in the grand scheme (we could implement that but it may not be as intuitively obvious for platform mechanics), but we could definitely change
/tagsto only show supported tags... Which I think would be the intended behavior anyway. Tags that are officially designated as supported by the creator are the important ones.
I’m curious, on DEV have you ever encountered any users creating tags that could be considered offensive? What would be the best action to take in that scenario?
I do like the suggestion of having only “supported” tags show on the /tags page. This would def clean things up a bit.
This is a great question!
We have previously detected offensive tags, but generally we've acted to remove the content under the tag without acting on the tag landing page itself. That would be my recommended move for now.
That said, I can understand wanting to be able to delete the tag landing page too just in case someone were to stumble upon it — it's unlikely to happen if the content posted under the tag is removed, but it is a possibility.
I also think from an admin standpoint it might be nice to block certain tags from being created.
Or maybe there could be a feature to silently hide a tag. I'm thinking hiding a tag would make it so that the tag page and all posts that are tagged with that tag would be de-indexed from search engines and left out of user feeds on the Forem. This might be a good spam mitigation technique too as I've noticed that some spammers come in and use the same tag for their spam over and over.
Realistically we should at least 404 any tag with 0 published posts... Whether or not we technically delete it from the database.
Example: dev.to/t/sex <- No posts. Should probably render not found.
These are all good suggestions @michaeltharrington
I think being able to silently hide a tag and also tell search engines not to index those pages would be a good solution but it sounds like it might just be easier to build an option for admins to delete any tags that were clearly created by mistake or maliciously. I think it goes back to whether or not this was more of a technical decision.
I think this would be best. I’m certainly hoping that users do not behave badly, and I’m not seeing this problem occur yet but it’s good that we are discussing it.
Indeed! This is a great one to bring up, Ildi.
And I like Ben's point that tags with 0 published posts should 404. That makes a lotta sense.
I like this suggestion, too, as that's also the result you get from a tag that doesn't exist at all, so it does effectively delete/delist the tag.
I think in addition, it would be nice for tags with 0 posts to be undiscoverable except by admins using the tag manager, so even if there aren't a lot of posts on a Forem the 0 posts tags don't appear in Top Tags or similar lists.
Merged the 404 for 0 posts/unsupported tags. Will be live in Forem Cloud shortly.
Return 404 if empty and unsupported tag #14864
What type of PR is this? (check all applicable)
Since tags get created whenever they are included in a post, the tag exists even with no published posts.
It has been determined that the expected behavior should be a
404response. If the tag is supported than the expectation is that the admin wants it to show up, even with no posts. (Likely a no posts yet scenario.)
Related Tickets & Documents
Originally came out of this discussion: forem.dev/ildi/is-it-possible-to-d...
[Forem core team only] How will this change be communicated?
This should mostly just fill expected behavior.
Thanks for the update Ben!
I also really liked that suggestion above to only show supported tags in the
/tagspage. Would be nice to be able to focus on the important tags but maybe also have a search feature to quickly navigate to any other tag you might be interested in. | s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296943747.51/warc/CC-MAIN-20230321225117-20230322015117-00733.warc.gz | CC-MAIN-2023-14 | 5,921 | 43 |
https://dooninstitute.in/bca | code | BCA (Bachelor of Computer Application)
BCA is one of the popular course among the students who want to make their career in the Information Technology and computer science field. Students are exposed with theoretical as well as practical knowledge related to the field of computer science and Information technology. BCA imparts great skills in the field of Software Development Technology. It also develops skills on software technology and enhances their knowledge on higher platform.
Scope after completion of BCA Degree
- Government as well as Private sector.
- Government jobs that require a Graduation Degree (for example- Armed Forces, Nationalized Banks, and PSUs etc).
- Web hosting, IT sector, Electronics Industry is some other sectors that recruits BCA graduates.
- One can go for the job in software companies like Info-sys,TCS,Google,Tech-Mehendra,Patni,WIPRO and some others software companies.
- Entrepreneurial venture
Any many more----------------
|1||Programming in ‘C’ Language||Programming in 'C'|
|2||Computational Mathematics||PC Packages|
|3||Fundamentals of Computer|
|1||Data Structure||Data & Files Structure|
|2||Programming in C++||Programming in C++|
|3||System Analysis and Design|
|1||Computer Based Numerical & Statistical Techniques||Computer Based Numerical & Statistical Techniques|
|2||Data Base Management System||Data Base Management System|
|3||Computer System Architecture|
|4||Organizational Structure & Personnel Management|
|1||Operating System Organization & UNIX||Operating System Organization & UNIX|
|2||Visual Programming||Visual Programming|
|4||Multimedia Tools & Application|
|1||Computer Graphics||Programming in JAVA|
|2||Web Programming using JAVA||.Net Technology|
|3||Management Information System|
|1||.Net Framework||.Net Framework|
A basic profile, that a BCA may start his career with, is that of a System Administrator, Desktop Technician or Help desk Assistant. These are employed in organizations such as banks, schools or colleges. The profile entails the setting up and maintenance of the server and system network. Another entry level profile is junior programmer and software tester who install, test and maintain software. This involves coding skills in computer language such as Assembly, COBOL, C, C++, C#, Java, Lisp, Python, etc.
This may later diverge into a career in Web Development in various web designs in companies and digital marketing. A web developer uses skills in HTML/XHTML, PHP, Java Script etc. to build and maintain websites. An advanced level of expertise can launch a career as an independent Web Designer. | s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506480.7/warc/CC-MAIN-20230923094750-20230923124750-00277.warc.gz | CC-MAIN-2023-40 | 2,601 | 28 |
https://news.ycombinator.com/item?id=3621975 | code | So here are my questions for Adobe:
Is there still income from Flash Player licensing? If not, how does keeping the Player closed source help your business interests?
Is it the client side DRM you have in place in the Player that's stopping you from making it open source?
Do you not have the resources to communicate with the community that would develop around an open sourced player (knowing that you would have spend some time to justify many things that exist in the codebase to maintain backwards compatibility)?
Are you concerned that a rival would clone some of the technology you developed and implement it in their proprietary player (e.g. MS, but they already gave up on Silverlight)?
Would the sudden influx of new security patches as vulnerabilities are discovered and fixed potentially compromise the performance of the Player?
Are you worried that individuals with malicious intent will find new vulnerabilities and exploit them?
What are your other concerns that are preventing you from open sourcing the Flash Player?
Google pays lots of money for Adobe to auto opt-in Flash installs with Chrome.
My understanding of that arrangement is that it is a mutually beneficial relationship that guarantees that Chrome users have the latest version of Flash (and Chrome is thus more secure) and the Flash Player update adoption happens faster. It makes very little sense to me that Google would pay Adobe for that since Adobe benefits just as much as Google.
Now how much money this brings in, who knows.
Note that this is NOT the same as Flash being bundled with Chrome. This is Chrome being bundled with Flash. | s3://commoncrawl/crawl-data/CC-MAIN-2018-05/segments/1516084892699.72/warc/CC-MAIN-20180123211127-20180123231127-00621.warc.gz | CC-MAIN-2018-05 | 1,621 | 12 |
https://www.rhythmlab-app.com/2022/05/24/coming-soon-web-based-version-of-rhythm-lab/ | code | In Progress: I’m working on a web version of Rhythm Lab using Flutter / Dart as the development platform. Since I’m coming from the Apple dev world (Objective-C / Swift), I’m having to learn the Flutter / Dart platform as I go. The goal is to have a web-based version (“lite” and free to use) of Rhythm Lab – a Progressive Web App (PWA) – that can (theoretically) work on any platform. The web presents certain hurdles that would make a full-blown Rhythm Lab app with all of the bells and whistles very difficult, if not impossible, to reproduce.
With Flutter, I’m having to rethink many things. The first issue is just how to render the rhythm patterns. On iPadOS, I can render the patterns as vector-based graphics (Bezier Paths) where the individual glyphs of the Bravura Font can be rendered as paths. The spacing is based on a rather complex algorithm that uses a logarithmic formula to figure the distances for any number of voices (from one to three voices specifically). For the web, with Flutter, I am figuring out how to render the font glyphs as svg images. Not as straightforward as you would think! At least, it’s taking me a while to get to a satisfactory solution. | s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100534.18/warc/CC-MAIN-20231204182901-20231204212901-00289.warc.gz | CC-MAIN-2023-50 | 1,197 | 2 |
https://iinu.t.u-tokyo.ac.jp/publication/working-paper/iinu021004 | code | 3-dimension pedestrian route choice models with cross entropy methods using multi sensor observations
by Binchang Shen, Takumi Suga, Eiji Hato
This paper constructs a three-dimensional (3D) route choice model based on an adjusted RL model and observation model. In order to reproduce the pedestrian trajectory in the 3D space with precision, we designed an observation model using machine learning algorithms and proposed a Data Fusion (DF) based location strategy by integrating classifiers trained from multi-sensor data set to address with signal attenuation issue caused by the environment and access point (AP) distribution. In addition, the Recursive Logit (RL) model is utilized to build a route choice model on a choice-stage network (CSN). Since the output of the observation model is a link set in the form of probability, we introduce cross-entropy instead of the likelihood as the objective function for parameter estimation. A case study at Shibuya Station shows that our model is practical in complex 3D spaces. Pedestrians ’route preferences reflected in the model can provide a reference for future research on pedestrian behavior modeling and network optimization. | s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817103.42/warc/CC-MAIN-20240416155952-20240416185952-00184.warc.gz | CC-MAIN-2024-18 | 1,183 | 3 |
https://www.internations.org/dubai-expats/forum/thoughts-on-internations-groups-1610129 | code | Thoughts on InterNations groups (Dubai)
After reading an email about making the bigger events more productive in networking. I Just thought I would share some thoughts.
I think that many people have unrealistic expectations of these events. Perhaps some are looking for a job or to meet friends it is difficult as there a lot of people and really these things just take time.
Many people I talk say that the event can have a lot of people in cliques. I usually advise people to come early and that's when you are more likely to meet more people. As people are more open to talk to new people. I also advise people to join the smaller events as that's when you make links and then cement them at the bigger events.
It is not a structured networking even but more soft networking drinks gathering. Anyway that is my thinking. | s3://commoncrawl/crawl-data/CC-MAIN-2018-17/segments/1524125947957.81/warc/CC-MAIN-20180425193720-20180425213720-00505.warc.gz | CC-MAIN-2018-17 | 823 | 5 |
https://confluence.openolat.org/pages/diffpages.action?originalId=85501015&pageId=85501076 | code | Keywords: Change user name -- BigBlueButton BigBlueButton recordings: publication -- Opencast recording handler -- Opencast course element
Starting from this release the username can be changed in OpenOlat. Until now this was not possible due to many dependencies of the identity object. Now the dependencies of user names have been removed from the login process.
The default configuration automatically uses the new identity.name scheme.
An opt-out configuration allows to use the old schema with authentication.authusername as identity.name during identity generation (subsequent renaming is not possible). The configuration is done via a global flag in the olat.local.properties. This allows systems using other authentication providers like LDAP, Shibboleth or oAuth to keep the previous handling of user names.
If BigBlueButton meetings are recorded, the publication of the recordings can now be controlled specifically. For this purpose, a list of participants is kept for each recording, which makes it possible to release the recording for different groups of participants:
In addition, an infrastructure was created that allows BBB recordings to be stored on an OpenCast Opencast server. A re-integration of these recordings at other OpenOlat locations is possible via the OpenCast Opencast module.
With the course element OpenCastOpencast, recordings of meetings and courses stored on an OpenCast Opencast server can be integrated into OpenOlat courses. The configuration and connection of the OpenCast Opencast server is done in the administration. In the course element either single videos or whole series can be integrated.
The JDBC driver for MySQL has been updated. Please check if the timezone is set in the database, because the driver does not accept undefined timezones.
SET GLOBAL Time_Zone = 'Europe/Zurich';
The following parameter should be checked in the olat.local.properties:
The connection collation attribute is mandatory for a few queries in OpenOlat. Please set this attribute with the same collation that is used in the database. | s3://commoncrawl/crawl-data/CC-MAIN-2020-50/segments/1606141186414.7/warc/CC-MAIN-20201126030729-20201126060729-00185.warc.gz | CC-MAIN-2020-50 | 2,062 | 11 |
http://gaming.stackexchange.com/tags/wii/new | code | New answers tagged wii
I am not aware of anything similar to "verify game cache" on the Wii U or any other console. However, you could try to move the game back to the internal storage to see if that fixes your problem. If moving the game back to internal storage does fix your problem, there might be something wrong with your USB storage. However, if the problem persists, ...
I have the strategy: the ball is at it's peak when the ball is tangent to the net according to your view (just touching) just throw it up a few times and see that the ball just makes contact with the bottom of the net from your view. Hope this helps
Top 50 recent answers are included | s3://commoncrawl/crawl-data/CC-MAIN-2016-18/segments/1461860118321.95/warc/CC-MAIN-20160428161518-00103-ip-10-239-7-51.ec2.internal.warc.gz | CC-MAIN-2016-18 | 663 | 4 |
https://www.infogrepper.com/no-xcode-or-clt-version-detected/ | code | How to fix the Node gyp Error: No Xcode or CLT version detected
In this post we will give you information about How to fix the Node gyp Error: No Xcode or CLT version detected. Hear we will give you detail about How to fix the Node gyp Error: No Xcode or CLT version detectedAnd how to use it also give you demo for it if it is necessary.
we will learn how to solve the node gyp Error: No Xcode or clt version detected in mac os.
no receipt for ‘com.apple.pkg.cltools_executables’ found at ‘/’.
When you update a node.js or npm to the latest version and you are trying to install a new npm package using npm install package-name command you will see the weird error like this in your terminal.
No receipt for 'com.apple.pkg.CLTools_Executables' found at '/'.No receipt for 'com.apple.pkg.DeveloperToolsCLILeo' found at '/'.No receipt for 'com.apple.pkg.DeveloperToolsCLI' found at '/'.gyp: No Xcode or CLT version detected!gyp ERR! configure errorgyp ERR! stack Error: 'gyp' failed with exit code: 1gyp ERR! stack at ChildProcess.onCpExit (/usr/local/lib/node_modules/npm/node_modules/node-gyp/lib/configure.js:343:16)gyp ERR! stack at ChildProcess.emit (events.js:98:17)gyp ERR! stack at Process.ChildProcess._handle.onexit (child_process.js:810:12)gyp ERR! System Darwin 14.0.0gyp ERR! command "node" "/usr/local/lib/node_modules/npm/node_modules/node-gyp/bin/node-gyp.js" "rebuild"gyp ERR! cwd /usr/local/lib/node_modules/gulp/node_modules/fseventsgyp ERR! node -v v13.10.33gyp ERR! node-gyp -v v5.0.7gyp ERR! not ok
To fix this error, you need to re-install the Xcode command-line tools.
- First, delete the Xcode tools by using the below command.
sudo rm -rf $(xcode-select -print-path)
This above command asks for a system password.
- Now, install the Xcode by running this command.
This command prompts with a popup, click on the install button and proceed with the installation.
It takes some time to download and install the Xcode command-line tools.
Once you are successfully installed, you can now download new npm packages without any (gyp) error messages.
Hope this code and post will helped you for implement How to fix the Node gyp Error: No Xcode or CLT version detected. if you need any help or any feedback give it in comment section or you have good idea about this post you can give it comment section. Your comment will help us for help you more and improve us. we will give you this type of more interesting post in featured also so, For more interesting post and code Keep reading our blogs | s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100800.25/warc/CC-MAIN-20231209040008-20231209070008-00430.warc.gz | CC-MAIN-2023-50 | 2,521 | 15 |
https://github.com/joel16/NX-Shell/releases/tag/1.04 | code | - Book Reader: Update mupdf sub-module with latest changes and fix generated font objects.
- Book Reader: Added landscape page layout.
- Book Reader: Load/save last opened book page.
- Add fast scrolling using left/right stick.
- Image viewer: Auto-scale images depending on their height.
- Book Reader: Improve book reader controls (Left stick to move page location and right stick to zoom in/out).
- Image viewer: Zoom using right stick.
- Book Reader: Only use dark background when dark theme is enabled.
- Music Player: Continue playing next audio file if directory is not empty.
- Book Reader: R/L keys to switch multiple pages (10).
- Display battery percent and charging status on status bar.
- Music Player: Add lock functionality to prevent using next/previous buttons. (Use the plus button to toggle this)
- Use L/R to navigate the cursor in OSK.
- Fix progress bar colour in dark theme.
- Fix OSK highlighted colour.
- Fix 'B' causing refresh when attempting to navigate to parent directory.
- Image viewer/Music Player: Only populate the directory list with entries once to avoid issues.
- Use delta time for animation.
- Book Reader: Fix next/prev in landscape mode.
- Fix sorting options not being loaded properly from config.
If you'd like to support me, then feel free to buy me a coffee, I'd really appreciate it! https://www.paypal.me/Joel16IA | s3://commoncrawl/crawl-data/CC-MAIN-2019-26/segments/1560627999814.77/warc/CC-MAIN-20190625072148-20190625094148-00236.warc.gz | CC-MAIN-2019-26 | 1,361 | 21 |
https://iacr.org/cryptodb/data/author.php?authorkey=10618 | code | Fast Homomorphic Evaluation of Deep Discretized Neural Networks 📺 Abstract
The rise of machine learning as a service multiplies scenarios where one faces a privacy dilemma: either sensitive user data must be revealed to the entity that evaluates the cognitive model (e.g., in the Cloud), or the model itself must be revealed to the user so that the evaluation can take place locally. Fully Homomorphic Encryption (FHE) offers an elegant way to reconcile these conflicting interests in the Cloud-based scenario and also preserve non-interactivity. However, due to the inefficiency of existing FHE schemes, most applications prefer to use Somewhat Homomorphic Encryption (SHE), where the complexity of the computation to be performed has to be known in advance, and the efficiency of the scheme depends on this global complexity.In this paper, we present a new framework for homomorphic evaluation of neural networks, that we call FHE–DiNN, whose complexity is strictly linear in the depth of the network and whose parameters can be set beforehand. To obtain this scale-invariance property, we rely heavily on the bootstrapping procedure. We refine the recent FHE construction by Chillotti et al. (ASIACRYPT 2016) in order to increase the message space and apply the sign function (that we use to activate the neurons in the network) during the bootstrapping. We derive some empirical results, using TFHE library as a starting point, and classify encrypted images from the MNIST dataset with more than 96% accuracy in less than 1.7 s.Finally, as a side contribution, we analyze and introduce some variations to the bootstrapping technique of Chillotti et al. that offer an improvement in efficiency at the cost of increasing the storage requirements.
- Florian Bourse (1)
- Michele Minelli (1)
- Pascal Paillier (1) | s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296948871.42/warc/CC-MAIN-20230328201715-20230328231715-00386.warc.gz | CC-MAIN-2023-14 | 1,818 | 5 |
https://mreriksson.net/website-building-tutorials-that-do-not-hold-up.html | code | Not so long ago, building a website was a real chore. You either needed to invest in clunky yet expensive software or you were required to learn the ins and outs of "from scratch" site building. Fortunately, things have changed a great deal. Today, it's easy for just about anyone to use some readily available and inexpensive (even free) tools to design a site. Unfortunately, many of those old website building tutorials are still in circulation, providing questionable and outdated information to readers.
If you're looking for guidance on building your site, check the website building tutorials you have under consideration for their date of publication. If they're more than a few years old, you probably do not want to bother with them.
The Internet changes quickly. The techniques that were en vogue a few years ago are now ancient history. The old school methods that many guides outline are no longer necessary or relevant. Few things become more dated quickly than guides and tutorials about building a great site.
After you've ascended adequate recency, become an active reader. That means not taking the contents of the guide at face value. Again, things may have changed. There's also that ever-present risk of getting bad information from a lower quality guide. You want to do your homework before adopting any strategy that might be stated in the tutorials. Make sure the recommendations still hold water by doing online research.
The best website building tutorials will provide you with all the information you need to know, from A to Z, to get the ball rolling with your own site. Check the tutorials you're considering to see if they live up to that standard. Many are laser-focused on certain aspects of design and fail to provide the big picture information you'll want as you take your first website construction program.
It would be nice if every site building tutorial contained solid, timely information. That's simply not the case, however. If you want to learn from a tutorial, you need to be able to discern the guides that have not held up to the ravages of time from those that will provide you with timely, pertinent and actionable information. | s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224645810.57/warc/CC-MAIN-20230530131531-20230530161531-00424.warc.gz | CC-MAIN-2023-23 | 2,176 | 6 |
https://hackaday.io/project/454-dsp-in-verilog-when-it-needs-to-be-fast | code | - Audio filter implementations
All of these implementation use a multiply-and-accumulate (MAC) scheme to compute each of the terms on the right side of the following equation, then divides by
a(1), if necessary. Some of the implementations are serial, some are parallel. Some are fixed point, some floating.
a(1)*y(n) = b(1)*x(n) + b(2)*x(n-1) + ... + b(nb+1)*x(n-nb) - a(2)*y(n-1) - ... - a(na+1)*y(n-na)The actual filter form implemented was the Direct Form Type I transposed similar to what Matlab uses for its
If a(1) is not equal to 1, you must divide the right side by a(1).
filterfunction. This means that the Matlab filter design funcitons (which yield the a's and b's) can be used to design filters. Input is from the audio codec and output is back to the audio codec.
There are a set of modules which are needed for all of the test programs below which interface to the audio codec. They are: cpuclockPLL.v, I2C_AV_Config.v, I2C_Controller.v, Reset_Delay.v, AUDIO_DAC_ADC.v and VGA_Audio_PLL.v. Each of the filter implementations has one top level module which needs to be incorporated into the project (using the menu item: project>Add/Remove files in project). The project with all top-level modules and interfaces is zipped here (QuartusII version 8.1). All of these filters receive input from the audio
line-in(blue phone jack) and send output to audio
line-out(green phone jack). The project archive (QuartusII version 10.1) using 18-bit fixed point filters (and a slightly different audio out register structure) is here.
General second, fourth and sixth order IIR (18-bit fixed point) .
The first implementation top-level module has modules for 2, 4, and 6th-order IIR audio filters synched to run once/audio sample (about 47 KHz). Each filter runs in parallel with all the other filters and each filter uses one 18-bit multiplier, so that you could implement up to about 35 filters. The filters use 18-bit, 2's complement notation with 16 bits of fraction for both the signal and the coefficients. This means that all filter coefficients have to be scaled to the range
-1<coefficient<1. The matlab code to do the scaling and conversion to hex constants will produce estimates of the scaled constants which you must check for being in range.
A matlab program to form the Verilog to specify the filter is at the end of the Verilog file as a comment. Typical Verilog filter code generated by the Matlab program is shown below. You must rename the module, and substitute in appropriate input and output variable names. The matlab program computes the a and b values, scales them to avoid overflow, and converts them to hex. The matlab program also plots the exact filter solution as well as the scaled 16-bit approximation. Always check the approximation to verify filter quality. The book Digital Signal Processing and the microcontroller was very useful for this code (see reference below).
An example of the generation of filters by creating the filter Verilog code in Matlab. The normalized filter cutoffs (
[0.1 0.2], for a 4th order filter, and scaled by
>>>2. Always check the approximation to verify filter quality. The plot below shows the result of coefficient truncation error on filter response.
//Filter: cutoff=0.100000 //Filter: cutoff=0.200000 IIR4 filter( .audio_out (your_out), .audio_in (your_in), .scale (3'd2), .b1 (18'h149), .b2 (18'h0), .b3 (18'h3FD6E), .b4 (18'h0), .b5 (18'h149), .a2 (18'hCD98), .a3 (18'h2F54E), .a4 (18'hA42E), .a5 (18'h3D6F5), .state_clk(AUD_CTRL_CLK), .lr_clk(AUD_DACLRCK), .reset(reset) ) ; //end filter
General second, fourth and sixth order IIR Filter (27-bit fixed point) .
This implementation extends the precision of the filters to allow accurate, lower bandwidth filters. As before the code modularizes the IIR filters and simplifies the generation of filters by creating the filter Verilog code in Matlab. The current... | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030334528.24/warc/CC-MAIN-20220925101046-20220925131046-00327.warc.gz | CC-MAIN-2022-40 | 3,887 | 19 |
http://complexdiagrams.com/2007/10/ | code | The public presentation of a speech (when unsupported by visual aids) is an interesting form of discourse because it contains little-to-no explicit structure. Typically, a speech is delivered (or read) with very few indications of structure presented to the listener (or reader). Because they are designed to be spoken aloud and heard, there are no chapter titles or section headings in the text. At best, the speaker may pause to indicate a change of topic, or reveal a bit of structure by saying “now I’m going to talk about,” or, “let me give you an example.”
However, there is structure present in a speech. The speaker must present evidence or examples to support their goals, whether their goals are to persuade, inform, or entertain. They may also draw conclusions, ask relevant questions, or predict, all based on their evidence and conclusions. In order for the speech to be successful, the evidence, conclusions, and predictions must be logically tied together to build a coherent argument. In a well-crafted speech, the audience will have no trouble following the thread of the argument, despite the lack of explicit structure. However, if there is more than a small amount of content in the speech, the audience may not have the ability to rank the importance of various ideas, or even to identify the key concepts.
This is a diagram I created of the first half of the speech Viva Las Xmas [PDF, HTML] by Larry Harvey (2002), the founder of the Burning Man project. In the speech, he discusses some socioeconomic principles, and how they affect interactions between people in a marketplace economy, and also in the gift economy at Burning Man. The diagram uses placement, color, and links to show not only the chronology, hierarchical, and topical groupings of chunks of the speech, but also causality and conceptual connections among the chunks.
This has some significant consequences. Not only does the diagram immediately reveal the topical threads in the speech, it also makes the important concepts clear by virtue of their relatively high number of links to other portions of the speech. The connections, relationships, and implications that are implicit in the speech become explicit in the diagram, thereby conveying more complete knowledge to the reader, reducing the amount of raw information that they have to integrate, and making the actual message of the speech more accessible. This type of diagram could be constructed before the presentation of a speech, and then used to support the speech as it was being delivered. This would enable the speech author to emphasize the key points and make the speech easier to follow. This diagram reveals six dimensions of complexity.
- hierarchical membership, indicated by the horizontal position below the green boxes and redundantly encoded with the vertical black arrows
- topical grouping, indicated by the vertical position and redundantly encoded by color
- specific chunk, indicated by the text in each box
- chronological sequence, indicated by relative left to right position
- causality, indicated by red arrows
- conceptual connection, indicated by green arrows
I created this diagram in the fall of 2003. The diagram and the text of this post appear in my thesis.
Comments temporarily disabled due to spam.
This diagram has been arranged to show not only the hierarchy, but also the intended use pattern of a typical, linear, non-fiction book.
- Continuity in the book is indicated by contact of the circles.
- The gray line, progressing in small and large clockwise arcs from section to section and chapter to chapter, demonstrates the linear progression of the content.
- The dashed black arrows show some possible non-linear paths that may be traveled by the reader to view content that is not part of the main linear flow of the book.
The goal of displaying the use of the book, and not merely the hierarchy, has led to an atypical diagram that conveys more knowledge than the typical counterpart.
Update 2011: Many of the ideas in this thesis have evolved and been carried over into my book Designing Data Visualizations.
My master’s thesis is a system for creating good diagrams. It starts with the basics of perception and cognition, and walks the reader through the process of making appropriate choices for their particular design problem.
From the abstract:
This thesis presents a system for the generation of complex diagrams. “Complexity” is defined as a measure of distinct data types that are independently visually encoded. Diagrams representing four or more types of data are defined as complex, while diagrams representing three or fewer are simple. Successful generation of complex diagrams is dependent on appropriate design choices. Five fundamental principles are introduced to guide the choices made by the diagram designer. The two contextual fundamental principles are “different goals require different methods,” addressing the needs of the diagram designer, and “audience brings context with them,” addressing the needs and context of the diagram reader. The three perceptual fundamental principles are the “principle of information availability,” which guides the selection and density of the diagram elements, the “principle of semantic distance,” which guides the spatial placement and grouping of the diagram elements, and the “principle of informative changes,” which guides the visual encoding of the diagram elements. A review of the diagram design process, comprising selection, encoding, and placement of the diagram components, is given. For each phase of the design process the influence of the appropriate fundamental principles is discussed, and the fundamental principles are extended into applied guidelines and suggestions. | s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917118831.16/warc/CC-MAIN-20170423031158-00307-ip-10-145-167-34.ec2.internal.warc.gz | CC-MAIN-2017-17 | 5,780 | 21 |
https://www.custommade.com/live-edge-mirror-frame/by/DonMcAulayRusticFurniture/ | code | This rustic mirror frame has beautiful, natural, live edge curves that can be appreciated in all four hanging positions. We carefully book match thin spalted hardwood slices and mortise them together. Each piece is truly a one of a kind.
Dimensions: 22"High x 20"Wide x 2"Deep
These are approximate sizes. | s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679099281.67/warc/CC-MAIN-20231128083443-20231128113443-00744.warc.gz | CC-MAIN-2023-50 | 305 | 3 |
https://cardiffuniversitychristianunion.com/best-excel-course-on-coursera/ | code | important functions like where to get assistance. Best Excel Course On Coursera…was founded in 2012 by 2 computer science professors from Stanford University– Andrew Ng and Daphne Koller. Andrew Ng began playing around with online knowing software much earlier than that. In 2008, he established the Stanford Engineering All Over (SEE) program, which provided 3 Stanford courses on machine learning, databases, and AI to online trainees totally free. Each of these three online courses gathered signups of 100,000 trainees or more, as detailed by Andrew himself. Seeing such demand for online classes sparked Andrew’s interest much more, and before long, he began actively establishing together with co-founder Daphne Koller.
Going back in time to 2012, have a look at this interview with Daphne Koller, co-creator of. At the time when she was providing this talk, just had 43 online courses readily available. In less than 8 years, that number has actually grown nearly a hundred-fold to 4000.
Andrew and Daphne saw a lot capacity in this kind of e-learning that they put their professions as professors at Stanford on hold and began focusing exclusively on the MOOC site. Reflecting on it, they certainly made the ideal option, as only seven years later on, the business they produced is currently valued at over $1 billion.
Find Best Excel Course On Coursera Online
The two ex-CEOs of, Andrew, and Daphne, are no longer actively handling the company themselves. They are, however, still extremely active in entrepreneurship. In 2018, Daphne Koller established Insitro, an innovative business that intertwines drug discovery and artificial intelligence. Around the exact same time, Andrew revealed the “AI Fund” that would invest numerous millions of dollars into artificial intelligence projects.
is still a reasonably brand-new company, and I am truly interested to see what the future will look like.How much does cost?
Specific courses cost $29 to $99, but in many cases, they can be investigated for totally free.’s online degrees, nevertheless, can cost anywhere from $15000 to $42000.
Plus is’s annual membership service through which students can access all 3000+ courses, expertises and professional certificates with limitless gain access to. The plan provides excellent value for trainee such who take online courses frequently.
Yes, is legitimate and worth the cost. is one of the most cost-efficient MOOC sites presently out there. Countless university-backed online courses make it highly appealing for MOOCs, and the new subscription-based Plus provides exceptional value for regular online trainees.
How does make money?
‘s annual income is approximated to be around $140 million and the majority of it originates from paid online courses, Specializations, MasterTracks, online degrees, and enterprise customers. The global corporate e-learning market size is growing amazingly quickly, and it’s likewise ending up being a significantly big portion of’s income.
When you explore the course brochure, you’ll instantly discover there’s a lot available. The brochure includes courses in arts and humanities, sciences, service, IT, languages, individual advancement, and more.
as potentially the very best machine learning course ever and i kind of agree with that due to the fact that it’s quite a great course but back in 2015 this course was a little bit too much for me because after a number of lessons i recognized i required to go back to the fundamentals however just because i started this course was so inspiring for me due to the fact that i understood there’s a lot of things that i need to learn when it comes to artificial intelligence and it was unbelievable motivation to get started with machine learning and after that get to where i am now so played a big role when it pertains to my profession and my inspiration and i can not thank them enough for that having this in mind let’s go through some advantages that you may have and also through some unreasonable expectations that a number of you may have because all of us know that the e-learning area and the e-learning market is proliferating and along with we have a lot of other e-learning platforms such as you know a cloud expert or udemy or pluralsight there are a lot of options out there for example for cloud services a cloud master is excellent and also for anything tech associated pluralsight is excellent and i utilize them all i use all of them right i used both pluralsight for numerous months and multiple times for numerous months since i desired at different times to up my abilities and i likewise use for example in 2013 2014 i have actually been utilizing udemy the thing however a lot resembles with you to me nowadays i don’t really utilize it that much since it’s excessive sound on that platform due to the fact that everyone’s doing a lot of courses nowadays you get a lot of people that don’t have a lot of experience in numerous fields and they just do courses on udemy
due to the fact that there’s no vetting procedure there and because of that there is a great deal of sound naturally you have a great deal of excellent courses there however they get lost in that extensive quantity of of relatively i don’t understand typical courses however nevertheless uw still has some good courses and i have a video about the best machine finding out course on udemy go and check that one out however once again because we have numerous platforms that create courses and offer accreditations this waters down the importance of one particular accreditation so you require an edge when it pertains to these accreditations and type of has that edge since it offers courses from leading universities and they’re rather economical and also you get these courses from these top universities are likewise tape-recorded by practitioners in the field so you get this kind of effect since the courses and the certifications that you obtain from they still have some sort of reputational benefit compared to
other platforms so in my opinion coursera i believe is the best platform if you wish to get a certification since you still have that credibility that sort of flows down from the university onto you as a specific and also having these accreditations helps you because you can add them to your linkedin profile for instance or to your cv i suggest perhaps not to your cv but clearly if you add them to your linkedin profile you can promote yourself and therefore you can signal the reality that you know those subjects also it shows the fact that you are a lifelong learner and this is very crucial for companies due to the fact that they wish to see a person that constantly wants to up their abilities fine you want somebody that constantly has an interest in enhancing that is in this sort of self-improvement mode that they never ever simply get comfortable with the position that they’re in because everybody type of likes ideal everybody loves a self improver everyone | s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500044.16/warc/CC-MAIN-20230203055519-20230203085519-00297.warc.gz | CC-MAIN-2023-06 | 7,020 | 15 |
https://www.theladders.com/job/ansible-engineer-new-orleans-la_35972710 | code | We are looking for Ansible Engineer for our client in New Orleans, LA
Job Title: Ansible Engineer
Job Location: New Orleans, LA
Contract ? 12 Months / Contract to Hire / Direct Hire
?US citizens and those authorized to work in the US are encouraged to apply. We are unable to sponsor H1b candidates at this time.?
- In this role, you will join a diverse team of talented individuals working on projects related to Ansible Tower, Ansible database, and other emerging products for DevOps.
Primary Job Responsibilities:
- Implement user interface for new back-end features in Ansible products
- Communicate with developers, automation engineers, UX designers, and the community
- Influence engineers working on back-end interfaces to follow best practices in user interfaces
- Identify system deficiencies, conduct technical research and analysis, and recommend solutions or fixes
- Creating Playbooks for automation.
- Contribute tests for the continuous administration, integration and automation of commonly used process to migrate them to Ansible suite to help maintain high stability.
- Experience working on Open source environment.
- Experience with Ansible Products.
- Professional front-end experience working on enterprise applications is a major plus
- Experience and understanding of Agile development methodologies
- Knowledge of front-end unit testing using Jasmine and Karma
- Basic understanding of browser UI bottlenecks, reflows, and style recalculations
- Passion about user interface design and implementation
- Basic knowledge of Python and willingness to learn it
- Basic Linux system administration experience
- Outstanding English language communication skills and influencing skills.
- Desire to learn and solve challenging problems
- Understanding of Ansible,Tower, DB or similar offerings, is preferred
- Bachelor's degree in computer science, computer engineering, or a technology-related discipline is preferred | s3://commoncrawl/crawl-data/CC-MAIN-2018-47/segments/1542039746205.96/warc/CC-MAIN-20181122101520-20181122123520-00252.warc.gz | CC-MAIN-2018-47 | 1,937 | 26 |
https://www.acmicpc.net/problem/9950 | code | |시간 제한||메모리 제한||제출||정답||맞힌 사람||정답 비율|
|1 초||128 MB||515||425||392||88.889%|
My young son is struggling with his maths homework, can you help him please? He is working on the area of a rectangle – you know, area = length x width. His teacher has given him a table of lengths, widths and areas. Each row on the table has one of the 3 values missing; my son has to work out the missing value and write it in the table such that the values on each line represent the length, width and area of one rectangle.
Input is a series of lines, each containing 3 integers, l, w, and a ( 0 ≤ l w ≤100, 0 ≤ a ≤ 10,000) representing the length, width and area of a rectangle in that order. The integers are separated by a single space. In each row, only one of the values has been replaced by a zero. The final row contains 0 0 0 and should not be processed.
Output is the same series of lines but with the zero in each line replaced by the correct value for the length, width or area as appropriate. The new value is always an integer.
2 0 6 6 5 0 0 8 80 9 0 45 0 0 0
2 3 6 6 5 30 10 8 80 9 5 45 | s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764494936.89/warc/CC-MAIN-20230127033656-20230127063656-00538.warc.gz | CC-MAIN-2023-06 | 1,134 | 7 |
https://xmlmind.com/xmleditor/_distrib/doc/help/advanced_element_template.html | code | Normally an element template is suggested by the Edit tool whatever the parent element where this template is to be inserted. But in some cases, generally with W3C XML schemas and with RELAX NG schemas and not with DTDs, you'll want the template to be usable only in certain contexts.
Example: your schema defines two
title elements: a job title which is a possible child element of
author elements and the optional title (i.e. a caption) of
You intend to define several job title templates. Example: element template "title(arch)" is defined as
Of course, you don't want to see "title(arch)" listed by the Edit tool when you are about to give a title to a
In such case:
Click on the "" radio button.
Type XPath expression "
person|author" in the text field below the radio button.
This means: suggest "title(arch)" but only when the template is to be inserted in a
person or an
Note that a very small subset of XPath is supported here:
This option is best explained by an example.
Out of the box, if you insert a
table element in a DocBook document, in fact, you insert predefined
table template called "table(simple)".
The "table(simple)" template has two rows and two columns which makes it much more useful that the default, automatically generated,
table template which just contains a single cell.
Note that when a single named template such as "table(simple)" replaces the default, automatically generated, element template, the Edit tool does not display its label. For example, in the case of the DocBook
table, the Edit tool displays "table" and not "table(simple)".
Now, what if you prefer to use a
table having 3 rows and 3 columns plus a
thead header as your default table?
Create the table by inserting the rows, cells and header you want.
Select this table.
Use→ → .
The "Existing element templates" list shows you that a predefined template already replaces the default, automatically generated, one. You can see this because "table(simple)" is displayed in italic.
You need to label your own template like the existing one in order to replace it. Therefore specify "simple" in the Label of the element template field.
Click on check box "".
The default, automatically generated, element template is the simplest, valid, element allowed by the schema.
Most of the time this heuristic gives good results. However in some cases, the default, automatically generated, element template, is, well, too simple to be useful.
There is no ambiguity and this is shorter to type. | s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100523.4/warc/CC-MAIN-20231204020432-20231204050432-00795.warc.gz | CC-MAIN-2023-50 | 2,490 | 33 |
https://www.macgasm.net/news/tips/iphoneipod-touch-20-and-aim-10-app-crashing/ | code | Were you one of those who decided to take the plunge with the 2.0 firmware and install a whole bunch of apps, including the AOL Instant Messaging App? Well I did, and it worked for a bit, but now it just seems to crash upon launch. Well I think I have figured out the answer, but it is somewhat kluge.
First off, Go To Settings -> AIM and then delete the username from the settings. Then try and re-launch AIM. You should be prompted for which account type, as you were with the initial setup. I know this isn’t a permanent fix, but it should work until AOL gets their act together and fixes the app.
You will end up having to do this every time. You cannot just delete the password, as it will crash again upon launch. | s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233511424.48/warc/CC-MAIN-20231004220037-20231005010037-00812.warc.gz | CC-MAIN-2023-40 | 721 | 3 |
https://mail.python.org/pipermail/python-dev/2005-November/058368.html | code | [Python-Dev] Patch Req. # 1351020 & 1351036: PythonD modifications
Guido van Rossum
guido at python.org
Mon Nov 28 21:07:37 CET 2005
On 11/28/05, "Martin v. Löwis" <martin at v.loewis.de> wrote:
> Guido van Rossum wrote:
> > Perhaps the following compromise can be made: the PSF accepts patches
> > from reputable platform maintainers. (Of course, like all
> > contributions, they must be of high quality and not break anything,
> > etc., before they are accepted.) If such patches cause problems with
> > later Python versions, the PSF won't maintain them, but instead invite
> > the original contributors (or other developers who are interested in
> > that particular port) to fix them. If there is insufficient response,
> > or if it comes too late given the PSF release schedule, the PSF
> > developers may decide to break or remove support for the affected
> > platform.
> This is indeed the compromise I was after. If the contributors indicate
> that they will maintain it for some time (which happened in this case),
> then I can happily accept any port (and did indeed in the past).
> In the specific case, there is an additional twist that we deliberately
> removed DOS support some time ago, and listed that as officially removed
> in a PEP. I understand that djgpp somehow isn't quite the same as DOS,
> although I don't understand the differences (anymore).
> But if it's fine with you, it is fine with me.
Thanks. :-) I say, the more platforms the merrier.
I don't recall why DOS support was removed (PEP 11 doesn't say) but I
presume it was just because nobody volunteered to maintain it, not
because we have a particularly dislike for DOS. So now that we have a
volunteer let's deal with his patches without prejudice.
--Guido van Rossum (home page: http://www.python.org/~guido/)
More information about the Python-Dev | s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320303709.2/warc/CC-MAIN-20220121192415-20220121222415-00371.warc.gz | CC-MAIN-2022-05 | 1,834 | 31 |
https://2-5.org/pages/the-english-and-second-price-sealed-bid-auctions | code | The English and Second-price sealed-bid auctions
This is the most known kind of auction and is commonly used for selling goods, such as antiques and artwork. In this auction, the bidding price is raised until only one bidder remains. There are many ways this can be done, which essentially are equivalent. Either the auctioneer announces prices in an increasing manner, or bidders call their bids themselves, or bids are submitted online having the current highest bid posted at any time (see tangent). All of these methods have one common characteristic, at any point in time, all bidders know the current highest bid. We point out once more that we will assume in what follows hypotheses A1-A4 from the previous page.
* The word "auction" is derived from the Latin augere, which means "to increase"
Assume that an item is being offered in an English auction with only two risk-neutral bidders, bidders 1 and 2. The seller and bidder j (j=1,2) know that bidder i's valuation of the item is either vil with probability pi or vih with probability 1-pi (i=2,1). Suppose that 0< vil < vih for i=1,2. Assume further that the valuation of the item is independent among bidders (this corresponds to assumption A2, independent-private-values). Also, assume that v1l=v2l=:vl, v1h=v2h=:vh and p1=p2=:p (this corresponds to assumption A3, symmetric information). The payoff function for bidder i (=1,2), is either 0 if he never bids over bidder j (=2,1), or vl-(i's bid), or vh-(i's bid), depending on his/her valuation of the item, if he bids over bidder j (=2,1). Clearly the payoff function in this case is a function of the bids alone and assumption A4 holds (see figure). It seems to be clear that in this case bidders do not bid over their own valuation, and the winner of the auction is the bidder with the highest valuation who calls his/her bid first. The price he/she will pay for the item is equal to the valuation of the other bidder which is equal to the lowest valuation.
The outcome of the previous auction can be generalized to any English auction, assuming that A1-A4 hold. The highest valuation individual wins the bidding and pays a price equal to the valuation of his/her last remaining rival. However, the seller and the other bidders never know the true valuation of the winner of the auction. In what follows we will explain how to obtain, from the perspective of the seller, the average price paid by the winner of the auction. In order to do so we introduce the concept of order statistic.
Suppose that X1, ..., XN are independent random quantities equally distributed, i.e for any value x the probability that Xi is less than or equal to x is the same for all i. We define the k-th order statistic, denoted by X(k), as the k-th smallest value among X1, ..., XN. For instance, in the example presented above if vi is the valuation of player i for i=1,2, and player 1 has a highest valuation than player 2, then v(1)=v2 and v(2)=v1.
Expected price paid to the seller
Consider the example presented above. If vi is the valuation of player i for i=1,2, the price paid to the seller by the winner of the auction is equal to the lowest valuation, v(1). The expected value of this quantity is calculated below.
In the example discussed above we have assumed that the distribution of the valuations is discrete, in the sense that the valuations are equal to specific values with positive probability. Nice results are achieved when one considers continuous distributions instead of discrete distributions. In this case the probability of having a valuation equal to x is equal to 0 for all x. What is possible to determine is the probability of having a valuation in a certain interval. The simplest of such distributions is the uniform distribution. We say that a random quantity X is uniformly distributed over the interval [a,b] if Pr(X≤ a)=0, Pr(X>b)=0 and for any x in [a,b], Pr(X≤x)=(x-a)/(b-a). For instance, it can be proved in this case that if the valuations of the bidders v1,v2 are independent and uniformly distributed on [0,1] then the expected amount received by the seller is
A more general result is stated in here
The second-price sealed-bid auction
Under this auction, bidders submit sealed bids with the knowledge that the highest bidder wins the item but pays a price equal not to his/her own bid but the second highest bid (in case of a tie between m bidders, a random number between 1 and m is picked to decide the winner). This type of auction was created by William Vickrey, reason why is also known as the Vickrey's auction (see tangent). A modification of this type of auction is used by eBay's system and Google's and Yahoo!'s online advertisement programs.
* William Vickrey (1914-1996) was a Canadian professor of economics who was awarded with the Nobel Memorial Prize in Economics for his research on games with asymmetric information.
Suppose that there are only two bidders in a second-price sealed-bid auction. Suppose that bidder 1's valuation of the item is $5 and bidder 2's valuation is $7. They both know their own valuation and also that the other bidder has a valuation of $5 with probability 0.5 and $7 with probability 0.5. If both bidders bid their own valuation, bidder 1 wins the item and has to pay $5, a price equal to the lowest valuation (see figure). It turns out that bidding his/her own valuation is an equilibrium strategy for both bidders and therefore the amount of money received by the seller in this case is equal than the one obtained in an English auction.
We claimed before that bidding their own valuation was an equilibrium strategy for every player in the second-price sealed-bid auction. The following reasoning shows why this holds. Suppose that bidder i submits a bid bi higher than its own valuation of the item, i.e bi>vi. Call M the maximum bid among the other bidders.
- If M < vi, then the bidder wins the item and his/her payoff would be equal to vi-M. The same payoff would be obtained by submitting his/her own valuation.
- If M > bi then the bidder does not win the auction and obtains a payoff of 0. The same payoff would be obtained by submitting his/her own valuation.
- Finally if, vi< M < bi, the bidder would win the auction but would have to pay a price higher than his/her own valuation. The payoff is less than 0, which is the one obtained by submitting his/her own valuation.
A similar argument shows that submitting the bidder's valuation is better than submitting bi< vi. This reasoning shows that revealing their own valuation is optimal for all bidders and the second-price sealed-bid auction is an incentive mechanism (see the revelation principle). This auction is different than the English auction in that the valuation of the winner is known to the seller. However, in both auctions the price paid for the item is the same and equal to the second highest valuation among bidders. | s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707948234904.99/warc/CC-MAIN-20240305092259-20240305122259-00105.warc.gz | CC-MAIN-2024-10 | 6,888 | 19 |
http://indiegamemag.com/author/viper/ | code | Home Articles posted by Max Mallory
- Subscribe to The Mag
- IGM Live
@michaelstearns:disqus I said the same thing while editing. It looks like this and games b...
Is this a new genre or what? Between this, A Pixel Story, and Adventures of Pip all appear...
Interesting game, i really like the graphics style ;)...
Looks awesome. Really wish that trailer showed some turning/action, though....
And this game cooler http://bit.ly/1Sp2wLm
If you have any leads or want to send us an update on your indie game, please feel free to contact us at [email protected]
--> No Story Too Small! | s3://commoncrawl/crawl-data/CC-MAIN-2015-22/segments/1432207930256.3/warc/CC-MAIN-20150521113210-00025-ip-10-180-206-219.ec2.internal.warc.gz | CC-MAIN-2015-22 | 583 | 10 |
https://knowledge.adaptiveplanning.com/Model_Administration/Managing_the_Model/0030_Accounts/0310_Reference%3A_Account_Fields_and_Settings/Reference%3A_Custom_Accounts_Fields_and_Settings | code | Audience: Administrators who manage the model.
A custom account is an account that can hold any kind of numerical data or formulas. The rollup logic for time, dimension, and level is flexible as are many of the settings that create accounts with unique capabilities.
To learn more about accounts, see the Accounts guide. For step-by-step instructions, see Add or Edit Accounts.
Account Details Section
Required. No default.
Identifies a unique numerical code for the account. Appears in formulas. Enter a unique combination of letters and numbers. You can use underscores but not spaces or other special characters. If left blank for imports, the code is auto-generated.
Required. No default.
Identifies the name of the account as it to appears on sheets, reports, and charts. Enter any combination of characters, spaces, and special characters. The account name does not need to be unique.
Optional. No default.
Identifies the name of the account as it appears on dashboard charts. Use if the account name is long. Enter any combination of letters, numbers, and special characters.
|Rolls up to||
Required. Default: the account or group that's highlighted when you select Create New Account.
Optional. No default.
Describes the account. Enter any combination of letters, numbers, special characters and spaces.
Required. Defaults: the same type as the rollup account, or periodic if the account rolls up directly to either the Custom root or a group.
Sets how the account data entries relate to other data entries. If you change a rollup account type, you automatically change its child accounts too.
For new accounts choose:
Required if you selected Link for the Type of the account you're editing. Not available for rollup accounts. No default.
Populates the account you're editing with the data of the account you choose from the drop-down. This is a two part process: first pick your cube or modeled sheet, then the account. See Link Modeled or Cube Sheet Data into Another Account.
Optional. Available only if you selected Link for Type. Not available for rollup accounts. No default.
Populates this account only with the values that are tagged with the dimension or attribute you select from the drop-down. The available list includes only dimensions and attributes of the account selected in Links to drop-down.
Required. Read-only if you select Link for Type or Cube for Data Entry Sheet Type. Defaults: the Time Rollup of its rollup account or linked account. If it rolls up to a root or group, the default is Sum of rolled up values for periodic accounts and Value of last time period for cumulative accounts.
Sets how the account calculates the values for time rollups. For example, how does the account calculate the quarter totals or annual totals? If editable, choose from the drop-down:
Optional. Read-only for child accounts, or if you chose Link for Type, or Cube for Data Entry Type. Default: Sum of rolled up values for new accounts or the Dimension Rollup of the parent account or linked account.
Sets how the account calculates the totals for level and dimension rollups. For example, Total Company is a level that has three departments as sub-levels: Sales, Manufacturing, and IT. You enter 100, 200, and 0 for each level respectively. At the top-level, choose how you would like Total Company to display the rollup value:
Required if you chose Weighted average of roll up values for Time Rollup or Dimension Rollup. No default.
Provides the weighted average of the time or dimension rollup. Choose from the list of accounts.
Optional. Available if you chose Text for Dimension Rollup. No default.
Provides the text that displays for dimension rollups. Enter any kind of text, such as NA or --, or leave blank.
Required when visible. Available for cumulative accounts only. Not available for rollup accounts. Default: the setting of the rollup account.
Sets how you enter data for the account you're editing in the sheet cells of planning versions. For example, the initial petty cash balance for the account is in January and the value is 10. In February the value is 20. In March the value is 20. Choose:
Sets how you enter data for the account you're editing in the sheet cells of actuals versions.
For example, the initial petty cash balance for the account is in January and the value is 10. In February the value is 20. In March the value is 20. Choose:
Required. Not available for rollup accounts or accounts that have Cube selected for Data Entry Sheet Type.
Determines if the account displays actuals data on planning versions prior to the Start of Plan date. See Set Up or Turn Off Actuals Overlay.
For cumulative or periodic accounts, choose:
For Link accounts, choose:
Specify Default Formulas link:
Optional. Not available for rollup accounts. Only available if you chose Enable actuals for Actuals Overlay. No default.
Assigns shared formulaa to the account for each level in actuals versions. On sheets, you can override the values calculated by the shared formula with formulas or data entered in the sheet.
Select the Specify Default Formulas link to access and assign shared formulas of your actuals by level. If you don't have access to actuals, you can link to the shared formulas of your planning version.
Optional. Not available for rollup accounts. No default.
Assigns shared formulas to the account for each level of your planning versions. On sheets, you can override the values calculated by the shared formula with formulas or data entered in the sheet .
Select Set Default Values and Formulas to access the shared formulas of your planning versions. Assign formulas to each level. See Formulas for more information.
Shows how the account is used throughout the model in calculated accounts, shared formulas, cube entries, other entries, rules, journal entries and reports. Select View Dependencies and browse through the tabs.
Account Attributes Section
Optional. Only available if your model has account attributes. No default.
Tags the account you're editing with account attributes. The number of drop-downs match the number of account attributes available. Select an attribute value from any or each of the drop-downs.
Data Type Section
Account Time Stratum
Shows how sheets display time for this account. Based on the default time stratum in your instance's calendar setup. Most commonly, this is month
Required. Read-only for child accounts or accounts with Link for Type. Default: Number or whatever was chosen for the rollup account.
Sets how data appear in sheets and on reports. Choose:
|Formula Version Selector||
Lets you choose a version so you can view, edit, or create default and override formulas per version. Read-only if the account has no master formula. Entering a master formula is the default for all versions. See Edit Account Formulas and Override Formulas
|Override Formula Setting||
Indicates if the version chosen from the Formula Version Selector setting uses the default formula (None) or an override: Override Formula or Data Entry. Select Override Formula to add an override formula for the selected version, Data Entry to make the account editable for the version, or None to revert to the default formula. Read-only if you select a locked version or if you selected the Disable Version-Specific Formula Setting checkbox. See Edit Account Formulas and Override Formulas.
Required if you select the Weighted-Average Translation check box. Not available for rollup accounts or if you chose Cube for Data Entry Sheet Type. No default.
Calculates the value of the account you're editing through a formula. Unlike shared formulas, master formulas calculate the value across all levels and all versions. A master formula overrides any shared formulas and all data. To edit the data of accounts with a master formula, you must edit the master formula or create an override for a version. See Edit Account Formulas and Override Formulas.
Read-only if you select a locked version from the Formula Version Selector.
Optional. Not available for rollup accounts or periodic accounts. Cumulative accounts must have Delta chosen for Plan by and Actuals by. No default.
Converts currencies by the average rate per period on the delta of cumulative accounts. Generally references a periodic account in the master formula and provides a way to convert the currency of periodic data in cumulative accounts.
Requires Weighted Average Translation.
Resets the balance to zero at the specified time period. At the start of the next period, the account starts accumulating again. Choose the time period. Available options are based on the calendar setup of your model, typically Month, Quarter, Year.
|Transfer Balance on Reset||
Requires Reset Balance.
Transfers the accumulated balance to another account. Choose the account to receive the balance transfer.
Required. Default: 0.
Indicates the number of decimal places for the data. Select any number between 0-9 or choose Currency's precision to follow the setting for the currency.
To see the decimal place settings for all the currencies, choose Currency's precision from the drop-down and select the View Precision link.
Required. Default: the exchange rate selected for the rollup or root account.
Determines how to convert currencies for the account. Choose:
|Suppress on sheets||
Required. Default: Account may be suppressed when zero or blank.
Determines if the account appears on sheets if all its cells have zeros and/or blanks. Choose:
Required. Only available for rollup and root accounts.
Determines if the account is expanded on sheets to show child accounts when you first open the sheet.
Each person who opens a sheet can change their sheet view and save it as their default, which can override this setting. Choose:
|Data Entry Sheet Type||
Required. Not available if you chose Link for Type or for standard cube accounts. Default: Standard or the sheet type selected for the parent account or group.
Specifies the type of sheets you can add the account to when building sheets. Choose:
|Entered on Sheet||
Read-only. Available if you chose Cube for Data Entry Sheet Type.
Displays the name of the cube sheet that has this account. Displays None until you add the account to the cube sheet. Select the sheet name to link to edit the cube sheet.
|Read only on sheet||
Available for cube standard accounts only.
Makes the account uneditable on the cube sheet.
Data Privacy Section
Restricts how formulas can use the account's data by level. Choose:
|Contains Salary Detail||
Required. Not available if you chose Cube for Data Entry Sheet Type. Read-only if you chose Link for Type. Default: the same as the rollup or linked account.
Indicates if this account is restricted to only user roles with the Salary Detail permission. See Reference: Available Permissions. Choose: | s3://commoncrawl/crawl-data/CC-MAIN-2021-04/segments/1610704835583.91/warc/CC-MAIN-20210128005448-20210128035448-00735.warc.gz | CC-MAIN-2021-04 | 10,800 | 92 |
http://www.ipgate.ae/index.php/2014-09-20-17-35-41/lync-products/netborder-lync-express | code | The ONLY all-in-one Lync server appliance with a built-in VoIP gateway.
◾All-in-one turnkey solution in one appliance
Analysts agree that the Microsoft Lync is quickly gaining traction not only as a Unified Communications platform, but as a complete IP-PBX replacement. The initial release of Lync squarely focused on the large enterprise that had a complete staff of Microsoft Certified engineers or partners at their disposal. The complexity of a Lync installation had put implementation beyond the capacity of most SMBs. Complexity was increased when a Lync installation was integrated with the PSTN, either through traditional telephony interfaces or with a SIP Trunk.
To make Lync installations easy, Sangoma created Express for Lync: the only all-in-one Lync server appliance with a built-in VoIP gateway and Session Border Controller. The appliance is “right-sized” to support installations of up to 1,000 users with all the required software pre-loaded onto the appliance.
Lync Express: What's Inside?
- Microsoft® Windows™ 2008 Server R2
- Microsoft® Lync™ Server 2010 Standard
- NetBorder™ Express VoIP Gateway
- Hyper-V Microsoft® Windows™ 2008 Server R2 as Domain Controller/Active Directory Server
Note: Microsoft licensing is not included; they can be optionally purchased through Sangoma.
PSTN Protocol Termination
- 4 Analog FXS lines
- 1 ISDN PRI span
- North American variants
- Japan variant (INS1500)
- 1 ISDN PRI option: From 2 to 30 channels of simultaneous calls per system over PSTN
VoIP Protocol Termination
- TCP or UDP
- SIP control protocol per RFC 3261
- RTP/RTCP per RFC 3550/3551
- TLS per RFC 5246
- SRTP per RFC 3711
- G.168-2002 Echo cancellation with hardware option
- DTMF over RTP per RFC 2833; international and custom tone detection and generation
- Voice Activity Detection and Comfort Noise Generation (VAD/CNG)
- T.38 Fax relay
Management and Configuration
- Web server
- Web services API
- Configuration files for easy integration into OEM applications
- SNMP DS0, DS1 and call stats MIBS
- Contextual help menus
- Extensive logging
- Automatic board discovery
- Open protocol translation & XML-based routing rules
- Configurable ISDN PRI to SIP mapping per RFC 3398
- 2 RJ-45 Ethernet ports
- 4 USB ports
- 1 DVI output port
- 250W universal
- 1U : 480.4(W) x 474(D) x 44(H) mm; 19"(W) x 18.7"(D) x 1.7"(H)
Support and Professional Services
- Sangoma engineers are here to support your success. Whether you need technical support and software maintenance, training, consultation and installation services, Sangoma can help you. Contact your Sales representative for more information.
- Standard 12-month warranty is included. Additional warranty services available, contact your Sales representative for more information. | s3://commoncrawl/crawl-data/CC-MAIN-2019-39/segments/1568514573264.27/warc/CC-MAIN-20190918085827-20190918111827-00074.warc.gz | CC-MAIN-2019-39 | 2,782 | 44 |
https://developer.payeezy.com/content/payeezy-active-merchant-library | code | Payeezy has now been included in the Active Merchant library. Ruby developers now have two gems to choose from when integrating to our APIs – the ‘Payeezy’ ruby gem and the ‘ActiveMerchant’ ruby gem. These ruby gems significantly decrease the development time required to integrate applications with Payeezy API.
What is Active Merchant? It is a modular approach to integrating with payment APIs. It is a simple and unified API to access dozens of different payment gateways which have very different internal APIs. Active Merchant has been in production use since June 2006 and is now used in most modern Ruby applications which deal with financial transactions. It is maintained by the Shopify and Spreedly teams, with much help from an ever-growing set of contributors. It was developed for usage in Ruby on Rails web applications and integrates seamlessly as a plugin. | s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662658761.95/warc/CC-MAIN-20220527142854-20220527172854-00632.warc.gz | CC-MAIN-2022-21 | 882 | 2 |
https://forum.sailfishos.org/t/apps-that-havent-been-ported-to-aarch64-store/7331/67?u=attah | code | Re separate lib: you can package it separately in the project. Then you could add library RPM as a build dependency in your package and just have that package in the same project. For example, Chum has rather large number of libs already that are used as dependencies for end-user apps.
Noarch apps (qml-only) still works at aarch64? I don’t need to recompile them?
will try that, never defined a spec file from scratch before.
i have installed tasklist on my xperia 10. dropbox integration seems to fail. i can not login.
qtdropbox lib is like 5+ years old. doubt that it still does work
i have just installed sailkick arm version on my gs290. it.ist qml only
I liked cSMS, wish it had a 64-bit application… Or at least we had backward support for 32-bit libraries and binaries…
@slava Would you please humor me and explain once more? Because i’m obviously thick.
Hopefully we can pester the Store keepers (Harbour masters?) at another community meeting, but to do so effectively i need to understand.
I have SeaPrint built on latest build targets for all architectures, showing up and working just fine on down to and including 3.4.
3.3 and earlier get an old version, so no hiding going on that i could find. Are there some circumstances i’d need to hit for this to occur, or are you talking about new apps only?
My assumption is that the 3.4 cutoff is from gcc8 and library uplift rather than specifically aarch64.
Although obviously related, since no aarch64 target existed with the old compiler and libs, and if the system just takes the highest requirement for all the effect is the same.
Is this the core of the issue, or are there more things to it?
GCC 8.3.0 may very well be the reason of some/many apps missing…
The best Jolla could possibly do, is plead the developers to re-compile their apps. Jolla is a “store front” here and not in any way responsible of keeping the apps up-to-date, even architecture-wise.
Chum is marvellous piece of engineering in this context! It’s not quite fire-and-forget, but somewhat close anyway! (I still should find the time to move some of my projects there…)
I’m not talking about apps not showing up for aarch64, that is just the architecture indeed.
I was trying to understand the reasoning for deliberately not publishing aarch64 apps in Store as laid out previously in this thread. It was said it comes with too much exclusion of people on older versions, with the reason here being one (Harbour-)enforced minimum SFOS version across architectures for each app.
When I remove 64-bit rpm, the lowest version in the “OS version limit” drop-down list is 2.0.0. When I add 64-bit rpm, the lowest version becomes 3.4.0 (apparently by mistake, I was told that it was supposed to be 4.0.1).
I want the lowest version to remain 2.0.0 because my 32-bit rpms are compatible with 2.0.0. It’s absolutely safe because there’s no 64-bit Sailfish OS 2.0.0 and will never be.
There are many ways to fix this problem (the easiest one is probably to calculate the lowest compatible version only taking 32-bit rpms into account) but it’s apparently not perceived to be a problem on the Jolla Store side. From my side, I don’t feel much of a pressure to make 64-builds of my apps available in Jolla Store. So things happily stay the way they are
The Machines VS Machines game.
Apparently it’s a game that comes from Ubuntu.
I have posted a message in the app comments in Jolla store asking for a 64bit version a while back but there has been no answer so far.
Avia flight search doesn’t exist for 64Bit.
I got it to build and install, and open, bit it won’t start…
[D] unknown:0 - setting levelpack “”
[W] unknown:130 - file:///usr/share/harbour
ines-vs-machines-sfos.qml:130: TypeError: C
annot read property ‘titleSound’ of null
[D] onStatusChanged:43 - Loader MainPage.qm
l status changed: Ready
[W] unknown:12 - file:///usr/share/harbour-
velPackCarousel.qml:12: TypeError: Cannot r
ead property ‘levelPackId’ of null
I guess probably something to do with changes code on newer SF versions … Source is from 2018
Nothing comes to mind immediately - those errors do not sound critical.
But the obvious thing to check for in the code would be hardcoded /usr/lib locations (as opposed to lib64) - the package files themselves have nothing like that though.
But wouldn’t that likely show up in output?
That component uses
ListView.itemAt() with an index parameter.
According to the Qt 5.6 docs that’s wrong, the method wants x,y parameters. Later Qt versions have
itemAtIndex(i), but 5.6 does not.
Are you sure you’ve built the right version?
I just built from Git zip on my phone with rpmbuild… https://github.com/mzanetti/machines-vs-machines-sfos
So using an earlier qmake might work, or, is there a way to change that line to wor with current version?
There do appear to be some ‘faults’ in harbour currently. If you upload aarch first, often you have the opportunity to upload arm, but not x86. I’ll try to document this. But it’s happened to me 3 or 4 times in the last weeks …
My approach, regardless of necessity, has been to upload 3.4 compiled x86, arm7 and then aarch. But with very few exceptions, my apps are fine as 3.4 targets (there are no security aspects, on superficial inspection). I also did trial with all 4.3 targets (QML only app) and could install on 3.4 arm and 4.3 aarch. For what it’s worth :0
If you build from SDK it’s fine. It’s plays fine. The sdk (.pro) includes steps for copying files that probably require the sdk.
I’ll post a ticket in the original repo and add to https://forum.sailfishos.org/t/apps-that-havent-been-ported-to-aarch64 (which is a wiki)
EDIT: added a ticket and to the page. I think the files copy stuff I suggested is:
copydata.commands = $(COPY_DIR) $$PWD/data/lpbuild /home/deploy/installroot/usr/share/harbour-machines-vs-machines-sfos/data/
target.depends = $(target) copydata
QMAKE_EXTRA_TARGETS += target copydata
Doesn’t seem to be any source available …
I did some minor changes to the pro file which should work on chum and on device: https://github.com/poetaster/machines-vs-machines-sfos/blob/master/machines-vs-machines-sfos.pro
Builds on obs: https://build.sailfishos.org/package/show/home:poetaster:coderus/MachinesVsMachines. (the directory is confusing, sorry). | s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446709929.63/warc/CC-MAIN-20221126212945-20221127002945-00213.warc.gz | CC-MAIN-2022-49 | 6,349 | 58 |
https://ptg.fia.org/documents | code | FIA PTG leverages the expertise of our membership to provide thoughtful, data-driven commentary on critical issues facing our industry. Learn more about our work through:
Comment letters, feedback, and other information filed with regulators.
Detailed, comprehensive, analytical studies of industry topics.
Background, discussion, and policy stances on key issues.
Testimony and statements before legislators, regulators, and other officials.
FIA PTG Whiteboard is designed to apply data and rigorous analysis to complex issues confronting our industry. Whiteboard is not meant to advocate for specific solutions, but rather to raise the standard of debate about key issues. | s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579251728207.68/warc/CC-MAIN-20200127205148-20200127235148-00034.warc.gz | CC-MAIN-2020-05 | 674 | 6 |
http://kb.blackbaud.com/articles/Knowledge/62192?r=261&ui-knowledge-components-aura-actions.KnowledgeArticleVersionCreateDraftFromOnlineAction.createDraftFromOnlineArticle=1 | code | The software provides two separate ways to have membership revenue interact with development revenue or donations. Memberships can be awarded on the basis of contributions reaching a specific threshold or membership dues can be treated as donations in terms of tracking donation revenue and tax receipting.
There are two ways to configure memberships so that development revenue is either recorded as part of the membership dues (Dues Based program) or memberships can be awarded to constituents once a specific type(s) of revenue is given up to a specific threshold (Contribution based)
Contribution Based memberships must be configured from the beginning of the membership program. There is not a way to enact a Contribution based levels and benefits to the membership program after it has been created. Rules for what types of revenue are evaluated are defined on the Contributions tab of the memberships program.
Dues based memberships can be tracked as pure revenue source where 100% of the membership payment is attributed toward membership in reports and in the General Ledger. Dues based programs (or levels in the case of both ways programs) can also have their revenue split into Designations so that a portion of the membership payment is counted as a donation and the rest is tracked as membership revenue. Rules for what Designations are used are configured on the Dues tab. | s3://commoncrawl/crawl-data/CC-MAIN-2019-30/segments/1563195524568.14/warc/CC-MAIN-20190716135748-20190716161748-00476.warc.gz | CC-MAIN-2019-30 | 1,387 | 4 |
https://www.biostars.org/p/122588/ | code | I want to use a software for detecting signals of positive selection using genome-wide SNP data. As input data I need the ancestral and derived state for each SNP present in my data.
I found this FAQ http://www.ncbi.nlm.nih.gov/books/NBK44409/#Build.how_do_i_determine_if_a_snp_is_an which points to a file which has the ancestral state for over 60 million SNPs.
I found almost all my SNPs present on that file, but when I was checking the ancestral alleles I encountered two problems:
First, some ancestral alleles didn't match my file. For example in my data SNP 21 rs17003832 22619035 C A, is either C or A. But the ancestral data file points to rs17003832 which has a T.
Second some alleles in the ancestral data file had two SNPs reported as ancestral, for example:
So what should I do? Maybe the first problem could be solved by a strand flip but what about the second one?
Any help would be greatly appreciated. | s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370497301.29/warc/CC-MAIN-20200330181842-20200330211842-00003.warc.gz | CC-MAIN-2020-16 | 918 | 7 |
http://msgroups.net/word.docmanagement/interlinear-or-parallel-text/51579 | code | Access 2007 on Vista
Hello, I have some forms with text boxes that contain dlookups as their
control source. They will not display on the form until A) I click into the
text box, then the value appears or B) I minimize Access and then maximize it
and the data appears. I have tested this on multiple machines - it is
definitely a Vista problem, it does not occur on win XP Prof. Any ideas?
...Can We Read Text data From an EXE
I have an Exe file when it runs ,there are just two controls on the
window.One is a ListBox and another is a Multi line Rich Edit
control.When i click on an item in the list some text is displayed in
the Edit control.Exe have a Hunderds of items in the List
controls,which display some text in edit control against an item
I want to read that data which is displayed in edit control against the
selection of an item in list controls .and want to place that data in a
Word file.Can any body tell me how i can do that.is there any API's
available to read that data.plz tell me.
Cri...Question on Restoring/Backing up Multiple Databases in Parallel
Assuming you have 2 Storage groups each with 3 mailbox stores. Is it
possible to Simultaneously Backup up the Stores Or Simultaneously Restore the
Stores? If so how would one go about doing this? I'm concerned more about the
location of the "Temporary files" during the restore.
No... The backup should be run against the entire storage group and the
individual stores will be backed up sequentially.. Never restore more than
one at a time. All the stores in the SG share the same transaction logs. I
am not positive but you could probabl...can't edit text in text boxes
what could possibly cause this (I'm out of areas to look)
I'm in the process of developing a project and have a main menu form with
various controls, text boxes, tabs, etc (the usual stuff)
Suddenly (by accident, I notice that I can't edit any of the textboxes...
all of the other controls work, just not the text...
- the boxes are enabled and allow edits...
- the form is enabled...
- the form's data source is correct (I think.. the text boxes are filling in
with the correct information... - the data source is a 1-record table);
- if I open the data table in data sheet view...Split text into 2 columns
Separate my data into two columns at the first Capital letter?
My data looks like this x 544 lines
aerodrome A defined area on land or water.
air cargo Freight, mail and express traffic transported by air.
airport An area of land or water that is used or intended to be used for
landing an aircraft.
Here is an example splittin col A into cols A & B:
Dim v As String, s As String
Set r = Intersect(ActiveSheet.UsedRange, Range("A:A"))
For Each rr In r
v = rr.Value
For i = 1 To Len(v)
s = Mid(v, i, 1)
If Asc(s) > 64 And...Text function
Is it possible to do a custom number format into the text function which
will allow me to colour the text similar to conditional formatting. The
problem i have is in one of the reports I have the staff have used one cell
to try and put 2 entries in with a slash in between. Say this is a target
value / agreed value and then at the end of the month I will get an actual
value in another cell which I will want to compare against each and give a
percentage increase or decrease. I have managed to write a formula to
seperate the values and give a percentage back using the text function but
now...Can I make certain text NOT print in publisher?
I'm looking to leave directions for the user - when using the template I am
creating in Publisher - but some of the users are not as savvy as others and
I'm afraid they will forget to remove the directions when printing the final
copy. Is there a way I can insert a text box that does not print?
Try putting it in the scratch area? maybe that will work for ya.
"rivertown" <[email protected]> wrote in message
| I'm looking to leave directions for the user - when using the template I
am...interlinear or parallel text
I need to prepare a document in two languages, where the text would go in
alternate lines. From the googling I have done, it could be called parallel
corpora, or interlinear or parallel text.
There seems to be a lot of research on translation software that would do
However, my case is much simpler (I think). I'll try to keep it short:
I have a leaflet in English but I need to add Polish text directly below
English for the people who don't speak Engl...Extract portions of text
I have a list of names comprised like this:
Cook, Mr. M.S.
Marty, Miss M.S.R.
Constant, Mrs. R.G.L.
We only have Mr., Miss and Mrs.
I need to extract these into last name, title and initials:
Col1 Col2 Col3
Cook Mr. M.S.
Thanks for your usual cooperation
use text to columns, fixed with and select where you want the columns to be
> I have a list of names comprised like this:
> Cook, Mr. M.S.
> Marty, Miss M.S.R.
> Constant, Mrs. R.G.L.
> We only have Mr., Miss and Mrs.
> I need to...Parallel port under Windows 7
Did somebody try writing values to parallel port under Windows 7? So far I am
unable to do it. Stuff that worked on XP doesn't under Win7.
CreateFile("LPT3"...) succeeds but all subsequent commands (GetCommState,
WriteFile) fail. I stopped spooling and followed recommendations from
http://support.microsoft.com/kb/823179/en-us. Didn't help.
InpOut32.dll does not work on 64 bit version (which is expected), but even
32 bit version works on some computers and doesn't on the others.
Specifically, it works on the PC with LPT port on a separate I/O card
(appea...Listbox contains check box, small image icon and text
I would like to implement a list control in which every row contains check
box, small image icon and text. how can I do it? Are there any sample codes?
Nothing impossible, Nothing sure
This will be a good start:
"NianHawk" <[email protected]> wrote in message
> I would like to implement a list control in which every row contains check
> box, small image icon and text. how can I do it? Are there any sample
Dont k...Long Parallel Columns
I am looking for a way to create very long parallel columns in Word. I am
trying to create a document in two languages (English on left and Spanish on
right) so that by scrolling down the document, I can compare the two versions
at the same time. I know that I can create tables for such a thing on a
small scale. But these documents are very long (think books) and linking one
text column to another across multiple pages seems to causes problems. Any
suggestions or help would be appreciated.
In Word the only practical way to do this is with a table. Just make sure
that you st...Rich Text / Plain Text. Error message
Every time I send an email, I get a window telling me that the email I am
sending is in Rich Text format ((HTML) and asking me whether I wish to
proceed by sendng in HTML, sending Plain Text or canceling.
This is regardless of whether I am sending a simple attachment (Excel file a
picture) even without any text.
I have also just deleted my old account and re-set it up again.
Please can you tell me how to avoid this message in the future?
Looking forward to your answer in anticipation.
Isn't there a "Don't show me this again" ...Exporting email with atachment to text file
I would lke to have a backup of all my email in a pure text form. Many
years ago I used Netscape email, and the entire mail file was pur text;
attachments followed the message and were encoded in base64. I could
always retrieve my email (with a little effort) by cuting and pasting,
and using uuencode to retrieve the binary form of the attachment. Is
there any way to do this in Outlook?
I have recently encountered difficulties with different versions of
Outook at home and work, so would like to avoid problems like this in
the future by having a purely text email file.
<[email protected] or Parallel Dongle?
Is it just a matter of personal preferance (and available ports!), or is one
easier to deal with for whatever reason...?
I'd rather deal with the parallel dongles.
I have had problems with USB ports failing completely as well as
The USB dongles sometimes can get knocked around losing their connection.
With the parallel dongles you can securely screw them in place. Over all
they just seem to be more stable.
"hitman" <[email protected]> wrote in message
> Is it just a matte...Import Word text into Publisher into many text boxes?
I need to regularly create a newsletter with many short items. It is pretty
tedious to copy and paste all those short bits into individual text boxes. Is
it possible for me to import the text from MS Word 2007 into MS Publisher
2007 and have all the different paragraphs or sections get placed into
individual text boxes? How do I then indicate in Word where the next text box
must be created (by inserting Section Breaks for example)? This would save me
a considerable amount of time and effort. Many thanks to whoever can help me
You cannot do this in Publisher. You can create ...Text Boxes #4
I have a number of text boxes within charts that
highlight some of the information. I change the data that
produces the charts and would like to automatically
change the text in the text box by linking the text box
to cells within a worksheet. Is this possible to do?
you can link a text box to a cell,
1) click on the text box
2) click in the formula bar
(or whatever cell)
4) press enter
"Graham Parkinson" <[email protected]> wrote in message
>I have a...ODBC Text Error
I am still having a problem running integrations on several PC's. It works
on some. It was working on mine but now when I run an integration I get an
[Microsoft][ODBC Text Driver] Too few parameters. Expected 1.
The KB articles do not seem to address this.
A few suggestions/things to check:
1) Make sure all PCs are running the same adapter versions for IM.
2) Centralize your IM dictionary. If all users are running the same IM.MDB
version, troubleshooting this issue becomes easier. By the same token, make
sure the IM.MDB is the same on all PCs.
...Change fg color of a static text at runtime
How can I change fg color of a static contol base on
I can set fg/bkg color using OnCtlColor at dialog's
startup but I need to change color base on a math result,
if this is positive set as blue if math result use red.
thanks in advance for your help,
You would still do it the same way. Create appropriate brushes(or use
SetTextColor etc) and return these based on the context(math result).
OnCtlColor is called whenever the control needs to be redrawn(not only at
Ajay Kalra [MVP - VC++]
"Eduardo" <[email protected]> w...How do I automatically expand a merged cell with wrapped text?
You don't. Take a look at the macro by Jim Rech:
...Text String to Unicode
How do I convert a text string (from a text file) that has escaped unicode
charactes (\u0635\u0641\u0627\u0631) to unicode chars?
Guilherme R. Rolim
Look at macros A2W etc.
Ajay Kalra [MVP - VC++]
"Guilherme R. Rolim" <[email protected]> wrote in message
| How do I convert a text string (from a text file) that has escaped unicode
| charactes (\u0635\u0641\u0627\u0631) to unicode chars?
| Guilherme R. Rolim
I'll try to put some more details, mayb...Expanding Text Box
One one slide: I need to click on title 1 and have a text box appear...then
disappear when I click on title 2...and so on. Without using a macro, how
can I achieve this? Thank you.
Use Custom Animation to set entrance and exit on mouse click, the exact
steps would be somewhat dependent on the version of PP your are using.
Bart: "According to creationism, there were no cavemen."
Homer: "Good riddance! Their drawings sucked and they looked like hippies."
"Gina" <[email protected]> wrote in message
news:EA63087D-5125-4...How do I change the text in a workbook from upper to lower case
Please can anyone help with this one!
I have a large workbook that I have created (just with text - no formulas)
and I have done it in caps but now want to change all the text to lower case
without having to re-type it all.
Excel hslp is confusing so can anyone tell me how to do it please
> Please can anyone help with this one!
> I have a large workbook that I have created (just with text - no
> formulas) and I have done it in caps but now...why does a formula become text
If I enter a formula into a cell e.g. =A1*B1 the cell reports the
result correctly. Sometimes I can be editting a formula and the cell
stops reporting the result and only displays the formula. No amounnt
of adjusting the formula or cell format makes the cell display the
result of the formula.
Why is this?
check if the cell is formated as 'Text'. goto 'Format - Cells' and use
for example the format 'General'
If this does not help goto 'Tools - Options - View' and uncheck
duncan w...In query how to write group into the same minute? Export to text file?
How can I in a Query write the criteria so that it groups the data from
witin every minute? For example many trades that are made in the same minute
compressed into that minute (and the analysis will be done in other fields,
like: first, high, low, last, sum).
And how can I export the result from a query into a testfile?
On Fri, 5 Feb 2010 00:05:00 +0100, "Rolf" <[email protected]> wrote:
>How can I in a Query write the criteria so that it groups the data from
>witin every minute? For example many trades that are made in the ... | s3://commoncrawl/crawl-data/CC-MAIN-2021-04/segments/1610703515075.32/warc/CC-MAIN-20210118154332-20210118184332-00484.warc.gz | CC-MAIN-2021-04 | 13,371 | 230 |
https://forum.pololu.com/t/jrk-12v12-power-error/24167 | code | Hi all, I’m new to control electronics and learning as I go. I have a racing motion simulator I have built and used 1/2 built stuff from someone else. It was all working great, but I now have a power error on one of the JRK 12v12 boards. I have switched the boards over, and the other board works perfectly where the broken board was located (so not wiring or motors etc).
I have also checked that 12v is being supplied to the board, and it is. This makes me think that it is something in the board.
Any advice / help on how to maybe fix it without having to buy a new board would be great. Fallback option is to just replace the board. But I think I need one that matches a 2009 version (I read somewhere the boards after 2012 use different software?).
Here are some photos of the board and error messages.
Could you try measuring the voltage at the VIN(out) pin and the +5V(out) pin with respect to ground while the board is powered only through the VIN terminal block (i.e. not USB)?
Please note that if you do want to go with a replacement, we currently still have some of the original Jrk 12v12 controllers available; however, please note that the motor driver IC has been discontinued and they are on end-of-life rationing. It sounds like you might be concerned about the firmware change that happened in 2012; you can find a note about that in the “Upgrading Firmware” section of the Jrk user’s guide. Is there something in particular about the 1.4 firmware that makes it incompatible with your system?
I have just measured the hood working and broken boards (as they are connected side by side and easy to compare).
The good board has 12v and 4.7v respectively.
The broken board has 12v and 4.15v respectively.
My reason for wanting the older model is purely based on replacing like with like. I have 2 boards connected to the same computer through 2 separate usb cables. I assume they would both need to have the same firmware to work the same way (I don’t know if this is true, I don’t really understand all this electronics stuff in detail). Please let me know if I am wrong.
I don’t understand what the Motor Driver IC does, but I assume that I need it connected and working if the other good board has it.
The boards are connected to 2 motors for the motion platform of my sim rig. Each motor has a sensor on it.
Unfortunately it is not clear what might have happened to your Jrk controller, but it does seem damaged and likely is not practical to fix.
As far as the firmware change, I generally expect the newer firmware to work fine in most applications that the previous firmware worked in. There are two main differences; one is that with the newer firmware the Jrk will always brake the motor when the commanded duty cycle is 0 (previously, it would coast if it was going in one direction and brake in the other). The second is that it will drive both motor terminals low instead of high while braking.
As I described previously, the only thing that changed in the firmware was how and when the motor brakes. You should be able to run it in the same system in terms of software compatibility. I am not familiar enough with the motion simulator software or the mechanical setup to confirm if it will feel different. Essentially, unless your simulator somehow relies on the asymmetric braking behavior in the old firmware or the setup somehow relies on the motors braking high, I suspect it will be fine.
We do not carry a version of the Jrk 12v12 controller with the through-hole components (terminal blocks and header pins) pre-installed, so you would have to solder them yourself.
If your main concern is making sure the two boards match (and not something specific about the old firmware), you could upgrade the firmware on your board to version 1.4 so it matches the replacement. You can find instructions for doing this in the “Upgrading Firmware” section of the Jrk user’s guide. | s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224650409.64/warc/CC-MAIN-20230604225057-20230605015057-00625.warc.gz | CC-MAIN-2023-23 | 3,922 | 17 |
http://www.simplyhired.com/a/jobs/list/q-oracle+engineer/l-Bloomington%2C+MN/pn-9 | code | oracle engineer jobs near Bloomington, MN
Refine your searchClear Filters
Daikin Applied - Plymouth, MN
Apply state of the art design documentation tools (Solidworks 3D CAD, Agile PDM, Agile Change Management, Oracle ERP, and automated BOM configuration tools) in...
Software Development Engineer, AmazonFresh- Relocation Opportunity
A2Z Development Center, Inc. - United States
As a team member you’ll be able to work on customer facing user interfaces, web services, backend services, AWS technologies, Oracle & Redshift data warehousing...
Software Engineer, Assoc.
Infor - Saint Paul, MN
Solid SQL knowledge with either Oracle or SQL Server. O EDUCATION & EXPERIENCE:....
TechDigital Corporation - Minneapolis, MN
This Operations Engineer / Storage Administrator role will be part of a team responsible for 24x7 operational support for Oracle ZFS & Oracle ZDLRA...
Senior Software Engineer
Pearson - Bloomington, MN
*Senior Software Engineer**. As a Senior Software Engineer on our TestNav team you will be working with an energetic and talented team of engineers to create...
Senior Software Test Engineer
MorphoTrust - Bloomington, MN
PostgreSQL, H2, Oracle, MySQL, Microsoft SQL Server. We are seeking a Senior Software Test Engineer at our office in Bloomington, MN....
Manhattan WMS Engineer_GC or Citizen_Contract-to-hire
Intellisoft - Minneapolis, MN
*Duration: 6+ months contract-to-hire* *Assignment Description: Skills* : * Expertise with Object Oriented languages (e.g. Java/Java Spring, .NET, C++, Ruby,...
Surescripts - Minneapolis, MN
This individual will serve as a key individual contributor with responsibilities for overall development Oracle database engineering....
Oracle Identity Manager(OIM) Engineer
Best Buy - Richfield, MN
We are looking for a driven, team-focused software engineer and cyber security minded professional to support an Oracle Identity Management Suite implementation... | s3://commoncrawl/crawl-data/CC-MAIN-2016-30/segments/1469257824994.73/warc/CC-MAIN-20160723071024-00105-ip-10-185-27-174.ec2.internal.warc.gz | CC-MAIN-2016-30 | 1,918 | 26 |
https://experience.dynamics.com/ideas/user-profile/?user=7507e32e-9240-e711-80fb-c4346bac219c | code | Currently: if you pay more then (I think 13 Vendor Invoices) it triggers a check overflow which has the effect of "burning the next X checks ( depending on the number of invoices your paying) I.e. it will void 3 checks if you are paying 40 invoices.
Suggestion: Create option to pr...
Category: Purchasing (177)
Freeze header in the Apply Customer Entries ( cash receipt journal )
Currently when you start scrolling through the customer invoices that they are paying you loose the header section of the screen that tells you "Amount and Amount Remaining" would be good if this was visible the entire time
Category: Financial Management (565) | s3://commoncrawl/crawl-data/CC-MAIN-2020-45/segments/1603107879537.28/warc/CC-MAIN-20201022111909-20201022141909-00668.warc.gz | CC-MAIN-2020-45 | 641 | 6 |
http://arnulfowing.blogspot.com/2007/03/exam-70-235.html | code | I have passed the Microsoft exam 70-235. Now I have bragging rights to Biztalk, having passed all 3 exams. :D
70-230: Designing and Implementing Solutions with Microsoft® BizTalk Server 2000, Enterprise Edition.
74-135: Developing EBiz Solutions Using Microsoft BizTalk Server 2004
70-235: TS: Developing Business Process and Integration Solutions using Microsoft® BizTalk® Server 2006 | s3://commoncrawl/crawl-data/CC-MAIN-2018-22/segments/1526794866938.68/warc/CC-MAIN-20180525024404-20180525044404-00622.warc.gz | CC-MAIN-2018-22 | 388 | 4 |
http://www.gearslutz.com/board/low-end-theory/589088-yamaha-hs50m-hs10w-sub-hs80m.html | code | The HS80Ms are the best bang for my buck. I use these for all types of music and sfx. I produce trip, hip hop, classical, rock, world and folk as well as experimental. The big band productions really sound great on these as well. There's nothing I can compare these Yamies to. I've tried the Mackies 8" and they're the closest sounding (for about twice the price!)
. All our mixes sound great on other systems when mixed and mastered with the HS80Ms.
BTW, We don't track/mix/master with subs.
My 2 cents. | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368704253666/warc/CC-MAIN-20130516113733-00060-ip-10-60-113-184.ec2.internal.warc.gz | CC-MAIN-2013-20 | 504 | 4 |
https://www.openarchives.org/pipermail/oai-implementers/2002-May/000484.html | code | [OAI-implementers] Sets and stuff, OAI 2.0
Tue, 14 May 2002 19:18:41 -0400
Alan, you beat me to it ... you were writing while i was thinking :)
i don't actually do the redundant table thingy yet because i don't have
any general oai2 implementations, but it's what i would try first.
Alan Kent wrote:
> If you want a hacky suggestion, you could have a field in the same table
> as the record which contains all the set names (separated by say spaces
> or commas) so when you fetch the record you can return the set names
> efficently, but to allow efficient querying have a redundant separate table
> of set names which can be joined back to the main record table. But I
> am not speaking with any experience here.
hussein suleman - [email protected] - vtcs - http://www.husseinsspace.com | s3://commoncrawl/crawl-data/CC-MAIN-2021-25/segments/1623488528979.69/warc/CC-MAIN-20210623011557-20210623041557-00333.warc.gz | CC-MAIN-2021-25 | 800 | 13 |
https://magicmarmot.livejournal.com/1226542.html | code | A new accompanying command can automatically generate CScout processing scripts by monitoring a project's build process.
Force arrows are labelled.
It has completely new design concept from its predecessor, Aria, and is written from scratch.
"RSS" is used when the feed that has no title is added.
Force arrows are labelled. General key bindings were added too, which apply whatever panel is selected. An included client gives the user visual feedback about all actions with nice little popup windows.
The -p option can now be used to print printable characters in GraphViz output.
One major improvement is the addition of binary versioning to modules.
It has been written from scratch to avoid instability under heavy load. It currently sports both a command-line and a PHP interface. Also entertainment, business, science, technology and health news.
In this context, parts of the client API were redesigned.
It currently sports both a command-line and a PHP interface. Among them, todo priorities were added, and new screen layouts allow the todo panel to become the largest one. The program only uses the equilibrium conditions, thus it is not assuming elastic behaviour. Making thumbnails uses the Firefox API.
Ocrad can be used as a stand-alone console application, or as a backend to other programs.
A minor incompatibility with atheme trunk has been rectified, and two possible crashes in server linking have been fixed. | s3://commoncrawl/crawl-data/CC-MAIN-2021-17/segments/1618038087714.38/warc/CC-MAIN-20210415160727-20210415190727-00313.warc.gz | CC-MAIN-2021-17 | 1,428 | 12 |
https://buddiesnews.com/blockchain-101-all-the-basics-explained/ | code | Web3 is a confusing place. If you are a beginner, terms like “blockchain”, “NFT” and “smart contract” are opaque terms designed to stifle rather than provoke curiosity. That skepticism is reflected in the data. Worldwide, only 1 in 10 of her working-age internet users owns some form of cryptocurrency, the digital token required to engage with much of the Web3 ecosystem.
This is ironic because Web3 is the latest version of the Internet and is based on the idea of accessibility and fairness. Don’t let the critics fool you. The stereotype that cryptocurrencies and NFTs belong in the exclusive and unwelcome “crypto buddy” niche is a satirical generalization. These tools are made with everyone in mind and are worth learning for anyone (or any age). And, just as importantly, they are rapidly changing the way the world works. Blockchain (the technology underpinning everything that goes into Web3) is certainly complex, but the concepts on which it is built are actually quite easy to understand. So let’s dive in.
What is blockchain?
Blockchain is a distributed digital database that stores, moves, and tracks information globally without sacrificing transparency. This data is contained in “blocks” that are linked together to form a chain-like record of information flow. Think of blockchain as a kind of internet infrastructure. Just as the internet allows programs such as his Gmail, Spotify, or PayPal to exist, blockchain also allows apps and programs to run, albeit in a unique way.
Several blockchains exist and form their own ecosystems online. Ethereum, Solana, Tezos, Flow and Polygon are all separate blockchains. Blockchains are often called public ledgers because data transactions can be seen by anyone. No single agency or organization acts as a gatekeeper for the information it contains.
This is one of the reasons blockchain technology is so attractive to so many. Its openness and transparency allow users to control access to their data and even do what they want behind closed doors with Web2 databases and systems operated by big tech companies such as Apple, Google and Microsoft. is in stark contrast. The decentralized nature of blockchain creates an immutable and transparent record of data flow.
So what makes blockchain so democratic?
A blockchain system is managed by a network of users. For example, instead of relying on a single centralized source like Amazon’s data centers, Web3 is a distributed network of devices (called nodes) running specific blockchain software (such as Ethereum) around the world. operated by
Data transaction records (such as cryptocurrency or NFT transaction records) are stored in blocks that are linked together to form a chain of bookkeeping. Transaction requests are validated or rejected by majority vote within the network. For a block and the transaction it contains to be formally and irrevocably added to the global ledger, a majority of the computers (nodes) in the network must agree on the validity of the transaction. This aspect of blockchain is what makes it so secure and decentralized. No single person or group can change or hide that information.
But what if someone hacks those nodes?
The core principle is that users within the system (rather than third parties such as banks or technology companies) validate transactions proposed in that system. If I want to send X amount of cryptocurrency to a friend on the blockchain, a user in the system operating a verification node receives my request, verifies its authenticity, and the transaction is collectively approved by the network.
Even if a hacker takes control of a node and attempts a counterfeit transaction (and steals someone’s valuable digital assets in the process), the other nodes in the system are unaware of it. For Ethereum, hundreds of thousands of individuals and organizations running software around the world act as validators for that blockchain. Forging a transaction on a blockchain would require a hacker to control more than half of these nodes, which is nearly impossible. For this reason, the more users running nodes in the system, the more the blockchain can be prevented from being hacked.
So how exactly does blockchain technology work?
We now know that blocks of data are linked together to form a chain of record keeping that is transparent and distributed in this system. The next thing to know is that these blocks contain several things.
The first is called the cryptographic hash of the previous block. If that statement freaks you out a bit, you’re not alone, but don’t let that scare you. Encryption is the study of secure communication techniques that allow only the sender and receiver to understand the contents. And hashing is simply a way of compressing data. Cryptographic hashing, in turn, combines the security features of cryptography with the message relaying features of hashes.
A block contains a cryptographic hash of the previous block to ensure it has not been tampered with. Blocks also include timestamps, which record the dates of the transactions included in the block and the data in those transactions.
You’ve heard of smart contracts, what are they?
A staple of Web3, smart contracts are programs on the blockchain that execute when certain conditions are met. Generally, these are coded with instructions that are triggered only in appropriate circumstances and are therefore used to automate the execution of contracts without the need for a third party.
One well-known smart contract is Ethereum’s ERC-721, the data standard used to create NFTs.
That’s all great, but why use blockchain?
Blockchain technology is primarily used to enable transactions related to cryptocurrencies and NFTs, but is only the underlying infrastructure for these functions. As such, its infrastructure can be applied in potentially endless ways. The Internet as we know it today enables applications and websites to function, but the Internet itself is not limited to specific apps and services. Similarly, organizations around the world are using blockchain technology for supply chain record keeping, data storage, payment processing, digital identification, carbon credit tracking, royalty distribution, healthcare, and many other industries and industries. We are looking for ways to improve and innovate the application.
Despite Web3’s difficult 2022, the technology behind the next version of the Internet is too valuable and exciting to ignore. As more institutions start experimenting with blockchain technology, we can expect to see changes big and small across the industry. Web3 is still in its infancy, so we need to learn more about the technology before it becomes widely adopted. | s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233508977.50/warc/CC-MAIN-20230925115505-20230925145505-00438.warc.gz | CC-MAIN-2023-40 | 6,713 | 22 |
https://support.tmssoftware.com/t/user-registration-scenario-to-include-invitation-protection/19319 | code | Yes, you can intercept anything, using middleware, for example.
But, for some reason I the ability to disable the "new user registration" UI was already implemented in Sphinx, but it's not. So I think this is a different feature request.
I created that one here:
Thus, one thing is the ability to disable user self-registration (the above feature request).
Another thing is the ability to create a new user from code and ask for invitation (this feature request).
Although if you require e-mail confirmation, even if you create a new user from code, user will have to confirm his e-mail to create the account, thus I'm not sure if this feature request here is still meaningful?
Disabling in the UI only hides the link. Anyone that can hit F12 in their browser to view the source can see the link that is hidden can copy it or follow it to continue the process and register. Need ability to remove it completely for some of us. Hiding it is a temp solution. | s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446711344.13/warc/CC-MAIN-20221208150643-20221208180643-00576.warc.gz | CC-MAIN-2022-49 | 956 | 7 |
http://web2.sys-con.com/node/2464063 | code | |By Marketwired .||
|November 29, 2012 07:30 AM EST||
BURLINGTON, MA -- (Marketwire) -- 11/29/12 -- Acquia®, the enterprise guide to Drupal, today announced it has completed a $30 million financing round, bringing total investment in the company to $68.5 million. Led by new investor Investor Growth Capital, the round includes Goldman Sachs and Accolade Partners, as well as all of Acquia's current investors, North Bridge Venture Partners, Sigma Partners, and Tenaya Capital. Jose Suarez from Investor Growth Capital has also joined Acquia's Board of Directors.
The new financing round will enable Acquia to accelerate its sales and marketing efforts, and continue its international expansion across Europe and Asia Pacific. Additionally, the funding will amplify Acquia's efforts to bring unified content, community and commerce solutions to market, helping digital marketing and IT organizations create and deploy content-rich, multi-channel web experiences.
"Our customers have made it clear that they are unhappy with the status quo on the web and are demanding innovative platforms that give them new freedom to integrate with their existing marketing toolset and increase the productivity of their digital teams," said Tom Erickson, CEO of Acquia. "We are delighted to have the participation of an elite group of investors as Acquia disrupts the market for content, community and commerce solutions, enabling multinational brands to achieve a new-found agility and set the pace with the fast moving social, and increasingly mobile, web."
"Investor Growth Capital was drawn to Acquia's vision to help digital marketing organizations in the Global 2000 harness the innovation and agility of open source Drupal," said Jose Suarez, Managing Director at Investor Growth Capital. "Acquia delivers a compelling combination of enterprise class products, Drupal technical expertise and leadership. We believe the web is changing, and that Acquia is uniquely positioned to help global brands create and manage immersive, multi-channel digital experiences."
- Acquia revenue has nearly doubled YoY through September 30th and is growing at 250% CAGR over the past three years
- More than 100 employees have been added in the past 12 months, including an expansion of Acquia's Asia Pacific presence into Sydney, Australia
- Acquia's global partner program has added more than 150 new partners in 2012, with nearly 550 partners in total
- Acquia acquired the content quality assurance technology company Mollom BVBA to accelerate product development of its SaaS content protection service to meet the needs of digital marketing organizations
Product & Market Highlights
- Acquia Cloud is the first global Drupal cloud hosting provider to operate on four continents, delivering over nine billion requests and 140 terabytes of content per month
- Acquia Insight, our application analysis suite that performs real-time assessment of the performance and security of Drupal applications, now has more than 18,000 Drupal sites connected
- Gartner, Inc. positioned Acquia in the "Visionaries" quadrant in both the 2012 "Magic Quadrant for Web Content Management" and the "Magic Quadrant for Social Software in the Workplace." [Sources: Gartner, Magic Quadrant for Social Software in the Workplace, 27 September 2012; Magic Quadrant for Web Content Management, 6 September 2012]
- A commissioned study conducted by Forrester Consulting survey on behalf of Acquia on enterprise adoption of open source Web Content Management options found that almost 60% of enterprises surveyed have considered open source for their web initiatives and 72% of organizations using open source solutions said it gave them greater flexibility [Is It Time To Consider Open Source WCM For Digital Experience?; Oct. 2012]
- Drupal adoption is growing 50% year-over-year -- 2.5 times faster than the overall combined web content and social business markets. Drupal has achieved significant market share in public sector, media and entertainment and higher education markets. An estimated fifteen percent of Forbes Global 2000 companies today run Drupal
Awards & Accolades
- Acquia was recognized as the fastest growing software company in the US, and the eighth fastest growing company overall, by Inc. Magazine in the 2012 Inc. 500
- Acquia was named Private Company of the Year in Massachusetts by MassTLC in September 2012
"From the beginning, my intention with the Drupal project was to build a dominant open source technology that can help organizations quickly create extraordinary web experiences," said Dries Buytaert, CTO and Co-Founder, Acquia. "Drupal adoption is higher and the community is stronger than ever before, as more organizations around the globe discover how the power of community can help them build amazing things on the web."
About Acquia, the enterprise guide to Drupal
Acquia empowers enterprises with the open source social publishing system Drupal. Co-founded by Drupal's creator in 2007, Acquia helps customers manage the growth and scale of their online properties with confidence. Acquia's products, cloud infrastructure, and support enable companies to realize the full power of Drupal while minimizing risk, as it's done for enterprise customers including Twitter, Warner Music Group, Humana, Stanford University, Mercedes-Benz and MTA. Acquia was recently named the number one software company in the 2012 Inc. 500 survey of the fastest growing private companies. Acquia has also been named one of the 100 most promising companies in America by Forbes Magazine. See who's using Drupal at http://www.drupalshowcase.com, and for more information please visit www.acquia.com or call 888-9-ACQUIA.
All logos, company and product names may be trademarks or registered trademarks of their respective owners.
Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings. Gartner research publications consist of the opinions of Gartner's research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.
We all know that data growth is exploding and storage budgets are shrinking. Instead of showing you charts on about how much data there is, in his General Session at 17th Cloud Expo, Scott Cleland, Senior Director of Product Marketing at HGST, showed how to capture all of your data in one place. After you have your data under control, you can then analyze it in one place, saving time and resources.
Nov. 29, 2015 08:45 AM EST Reads: 203
With all the incredible momentum behind the Internet of Things (IoT) industry, it is easy to forget that not a single CEO wakes up and wonders if “my IoT is broken.” What they wonder is if they are making the right decisions to do all they can to increase revenue, decrease costs, and improve customer experience – effectively the same challenges they have always had in growing their business. The exciting thing about the IoT industry is now these decisions can be better, faster, and smarter. Now all corporate assets – people, objects, and spaces – can share information about themselves and thei...
Nov. 29, 2015 08:00 AM EST Reads: 260
The cloud. Like a comic book superhero, there seems to be no problem it can’t fix or cost it can’t slash. Yet making the transition is not always easy and production environments are still largely on premise. Taking some practical and sensible steps to reduce risk can also help provide a basis for a successful cloud transition. A plethora of surveys from the likes of IDG and Gartner show that more than 70 percent of enterprises have deployed at least one or more cloud application or workload. Yet a closer inspection at the data reveals less than half of these cloud projects involve production...
Nov. 29, 2015 07:00 AM EST Reads: 491
Continuous processes around the development and deployment of applications are both impacted by -- and a benefit to -- the Internet of Things trend. To help better understand the relationship between DevOps and a plethora of new end-devices and data please welcome Gary Gruver, consultant, author and a former IT executive who has led many large-scale IT transformation projects, and John Jeremiah, Technology Evangelist at Hewlett Packard Enterprise (HPE), on Twitter at @j_jeremiah. The discussion is moderated by me, Dana Gardner, Principal Analyst at Interarbor Solutions.
Nov. 29, 2015 06:45 AM EST Reads: 739
Discussions of cloud computing have evolved in recent years from a focus on specific types of cloud, to a world of hybrid cloud, and to a world dominated by the APIs that make today's multi-cloud environments and hybrid clouds possible. In this Power Panel at 17th Cloud Expo, moderated by Conference Chair Roger Strukhoff, panelists addressed the importance of customers being able to use the specific technologies they need, through environments and ecosystems that expose their APIs to make true change and transformation possible.
Nov. 29, 2015 06:00 AM EST Reads: 551
Too often with compelling new technologies market participants become overly enamored with that attractiveness of the technology and neglect underlying business drivers. This tendency, what some call the “newest shiny object syndrome” is understandable given that virtually all of us are heavily engaged in technology. But it is also mistaken. Without concrete business cases driving its deployment, IoT, like many other technologies before it, will fade into obscurity.
Nov. 29, 2015 06:00 AM EST Reads: 372
Microservices are a very exciting architectural approach that many organizations are looking to as a way to accelerate innovation. Microservices promise to allow teams to move away from monolithic "ball of mud" systems, but the reality is that, in the vast majority of organizations, different projects and technologies will continue to be developed at different speeds. How to handle the dependencies between these disparate systems with different iteration cycles? Consider the "canoncial problem" in this scenario: microservice A (releases daily) depends on a couple of additions to backend B (re...
Nov. 29, 2015 05:00 AM EST Reads: 459
The Internet of Things is clearly many things: data collection and analytics, wearables, Smart Grids and Smart Cities, the Industrial Internet, and more. Cool platforms like Arduino, Raspberry Pi, Intel's Galileo and Edison, and a diverse world of sensors are making the IoT a great toy box for developers in all these areas. In this Power Panel at @ThingsExpo, moderated by Conference Chair Roger Strukhoff, panelists discussed what things are the most important, which will have the most profound effect on the world, and what should we expect to see over the next couple of years.
Nov. 29, 2015 04:30 AM EST Reads: 483
Container technology is shaping the future of DevOps and it’s also changing the way organizations think about application development. With the rise of mobile applications in the enterprise, businesses are abandoning year-long development cycles and embracing technologies that enable rapid development and continuous deployment of apps. In his session at DevOps Summit, Kurt Collins, Developer Evangelist at Built.io, examined how Docker has evolved into a highly effective tool for application delivery by allowing increasingly popular Mobile Backend-as-a-Service (mBaaS) platforms to quickly crea...
Nov. 29, 2015 04:00 AM EST Reads: 376
Growth hacking is common for startups to make unheard-of progress in building their business. Career Hacks can help Geek Girls and those who support them (yes, that's you too, Dad!) to excel in this typically male-dominated world. Get ready to learn the facts: Is there a bias against women in the tech / developer communities? Why are women 50% of the workforce, but hold only 24% of the STEM or IT positions? Some beginnings of what to do about it! In her Day 2 Keynote at 17th Cloud Expo, Sandy Carter, IBM General Manager Cloud Ecosystem and Developers, and a Social Business Evangelist, wil...
Nov. 29, 2015 03:00 AM EST Reads: 595
PubNub has announced the release of BLOCKS, a set of customizable microservices that give developers a simple way to add code and deploy features for realtime apps.PubNub BLOCKS executes business logic directly on the data streaming through PubNub’s network without splitting it off to an intermediary server controlled by the customer. This revolutionary approach streamlines app development, reduces endpoint-to-endpoint latency, and allows apps to better leverage the enormous scalability of PubNub’s Data Stream Network.
Nov. 29, 2015 03:00 AM EST Reads: 338
Apps and devices shouldn't stop working when there's limited or no network connectivity. Learn how to bring data stored in a cloud database to the edge of the network (and back again) whenever an Internet connection is available. In his session at 17th Cloud Expo, Ben Perlmutter, a Sales Engineer with IBM Cloudant, demonstrated techniques for replicating cloud databases with devices in order to build offline-first mobile or Internet of Things (IoT) apps that can provide a better, faster user experience, both offline and online. The focus of this talk was on IBM Cloudant, Apache CouchDB, and ...
Nov. 29, 2015 02:45 AM EST Reads: 422
I recently attended and was a speaker at the 4th International Internet of @ThingsExpo at the Santa Clara Convention Center. I also had the opportunity to attend this event last year and I wrote a blog from that show talking about how the “Enterprise Impact of IoT” was a key theme of last year’s show. I was curious to see if the same theme would still resonate 365 days later and what, if any, changes I would see in the content presented.
Nov. 29, 2015 01:00 AM EST Reads: 436
Cloud computing delivers on-demand resources that provide businesses with flexibility and cost-savings. The challenge in moving workloads to the cloud has been the cost and complexity of ensuring the initial and ongoing security and regulatory (PCI, HIPAA, FFIEC) compliance across private and public clouds. Manual security compliance is slow, prone to human error, and represents over 50% of the cost of managing cloud applications. Determining how to automate cloud security compliance is critical to maintaining positive ROI. Raxak Protect is an automated security compliance SaaS platform and ma...
Nov. 28, 2015 08:00 PM EST Reads: 435
The Internet of Things (IoT) is growing rapidly by extending current technologies, products and networks. By 2020, Cisco estimates there will be 50 billion connected devices. Gartner has forecast revenues of over $300 billion, just to IoT suppliers. Now is the time to figure out how you’ll make money – not just create innovative products. With hundreds of new products and companies jumping into the IoT fray every month, there’s no shortage of innovation. Despite this, McKinsey/VisionMobile data shows "less than 10 percent of IoT developers are making enough to support a reasonably sized team....
Nov. 28, 2015 01:00 PM EST Reads: 479
With major technology companies and startups seriously embracing IoT strategies, now is the perfect time to attend @ThingsExpo 2016 in New York and Silicon Valley. Learn what is going on, contribute to the discussions, and ensure that your enterprise is as "IoT-Ready" as it can be! Internet of @ThingsExpo, taking place Nov 3-5, 2015, at the Santa Clara Convention Center in Santa Clara, CA, is co-located with 17th Cloud Expo and will feature technical sessions from a rock star conference faculty and the leading industry players in the world. The Internet of Things (IoT) is the most profound cha...
Nov. 28, 2015 12:00 PM EST Reads: 556
Just over a week ago I received a long and loud sustained applause for a presentation I delivered at this year’s Cloud Expo in Santa Clara. I was extremely pleased with the turnout and had some very good conversations with many of the attendees. Over the next few days I had many more meaningful conversations and was not only happy with the results but also learned a few new things. Here is everything I learned in those three days distilled into three short points.
Nov. 28, 2015 12:00 PM EST Reads: 342
DevOps is about increasing efficiency, but nothing is more inefficient than building the same application twice. However, this is a routine occurrence with enterprise applications that need both a rich desktop web interface and strong mobile support. With recent technological advances from Isomorphic Software and others, rich desktop and tuned mobile experiences can now be created with a single codebase – without compromising functionality, performance or usability. In his session at DevOps Summit, Charles Kendrick, CTO and Chief Architect at Isomorphic Software, demonstrated examples of com...
Nov. 28, 2015 11:45 AM EST Reads: 410
As organizations realize the scope of the Internet of Things, gaining key insights from Big Data, through the use of advanced analytics, becomes crucial. However, IoT also creates the need for petabyte scale storage of data from millions of devices. A new type of Storage is required which seamlessly integrates robust data analytics with massive scale. These storage systems will act as “smart systems” provide in-place analytics that speed discovery and enable businesses to quickly derive meaningful and actionable insights. In his session at @ThingsExpo, Paul Turner, Chief Marketing Officer at...
Nov. 28, 2015 11:15 AM EST Reads: 417
In his keynote at @ThingsExpo, Chris Matthieu, Director of IoT Engineering at Citrix and co-founder and CTO of Octoblu, focused on building an IoT platform and company. He provided a behind-the-scenes look at Octoblu’s platform, business, and pivots along the way (including the Citrix acquisition of Octoblu).
Nov. 28, 2015 11:00 AM EST Reads: 517 | s3://commoncrawl/crawl-data/CC-MAIN-2015-48/segments/1448398458511.65/warc/CC-MAIN-20151124205418-00056-ip-10-71-132-137.ec2.internal.warc.gz | CC-MAIN-2015-48 | 18,047 | 64 |
https://www.blogtalkradio.com/sun752/2020/05/10/the-reason-that-men-dont-hate-on-mothers-day-but-hot-the-other-way-around | code | Check ths out right now, before you get your full Mothers Day on. https://youtu.be/KEdLiKmbdrQ
Very rarely will you hear men bitching about the praise that mothers get on Mothers Day, but the same can't be said about women when Fathers Day comes around. Is it because so many women are left to raise the babies by themselves, or is there something more to it?
Let's get into this. | s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593655894904.17/warc/CC-MAIN-20200707173839-20200707203839-00597.warc.gz | CC-MAIN-2020-29 | 380 | 3 |
https://cboard.cprogramming.com/c-programming/45376-bitmap-please-help.html | code | Hi. I'm a 100% Newby and I need your help! I'm trying to show a bitmap file on the dos screen using my Dev-C++ Compiler. I've seen some of my friends do it and I'm still very puzzled on what to do. Can someone post up what header file I need, function, and whatever code is needed? | s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917122629.72/warc/CC-MAIN-20170423031202-00576-ip-10-145-167-34.ec2.internal.warc.gz | CC-MAIN-2017-17 | 281 | 1 |
http://photo.pcb-net.org/blog/62 | code | Sat, February 13th 2010, 12:37PM:|
Having had some rising temperatures (+8°C) one week ago, snow returned to Karlsruhe the day before yesterday... I even managed to go out in the cold for taking a handfull of pictures, with maybe two or three keepers.
For the picture posted today, I decided to introduce a new tag called "Colour Mapping"... I'll use this one for tagging pictures that are post-processed with a technique I saw from David J. Nightingale. As far as I could "reconstruct" this technique, an image is desaturated in a first step using a channel mixer (or whatsoever) and is getting individual curve adjustments for its single colour channels, c.f. | s3://commoncrawl/crawl-data/CC-MAIN-2021-49/segments/1637964358973.70/warc/CC-MAIN-20211130110936-20211130140936-00450.warc.gz | CC-MAIN-2021-49 | 662 | 3 |
https://www.experts-exchange.com/questions/28344517/Dell-Poweredge-T310-Non-Redundant-Power-Supply-Upgrade-to-Redundant-Problem.html | code | We have a Dell Poweredge T310 with non redundant power supply. We located parts for redundant power supplies
and the power distribution board.
The problem is, there is a T-shaped bar like this
that we cannot find a part number for, anyone talking about it on forums, no one else who tried similar upgrades. In fact, when I chatted with a Dell rep he was rude, but most importantly, I think he might have wrongly insisted that the chassis between a redundant and non-redundant body were completely different and in fact unswappable from purchase time.
This seems to be untrue (though please tell me if I am wrong) because in the chassis I have (T310, non-redundant) there is a specific place and latches to lock in the power distribution board, and the latches for the redundant power supplies to lock in on the case body interior. I just want to know if I can locate that T Bar looking thing to complete the picture. Any T310 experts or Dell pros who can help me out? Can I actually NOT upgrade to redundant power supplies? I really would like to be able to obviously! | s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376826530.72/warc/CC-MAIN-20181214232243-20181215014243-00174.warc.gz | CC-MAIN-2018-51 | 1,068 | 5 |
https://cran.microsoft.com/snapshot/2018-02-25/web/packages/reinsureR/README.html | code | Implementation of a framework for application of reinsurance treaties on claims datasets, along with statistical and graphical analysis for cost estimation. This package can be used for estimating the impact of reinsurance on several portfolios or for pricing treaties through statistical analysis.
reinsureR can be installed from github.
The package depends on the followings:
The package is available from its GitHub repository.
devtools::install_github("arnaudbu/reinsureR", dependencies = TRUE)
This document aims at providing new users with an overview of the functionality brought by the package. For this purpose, a simple example will be developped in order to review all the implemented functions.
The package mainly relies on the
Claims class, whose purpose is to represent the claims and premiums on which reinsurance will be applied. All computations are executed within objects of this class.
This package is implemented from the perspective of the ceding company. Thus, will be computed claims and premiums kept by the company, and not the amounts paid to the reinsurer or received from it.
For the purpose of illustrating the application of reinsurance treaties to a claim dataset, let us create such a dataset.
The objective is to create several claim events per year for a couple of years and two different portfolios.
# Claim table construction set.seed(1) # For reproducibility c <- expand.grid(year = unlist(sapply(2000:2017, function(x) rep(x, rpois(1,8)))), portfolio = c("ptf1", "ptf2"), simulId = 1:100) c$amount <- pmax(rnorm(nrow(c), 200000, 100000), 0) c[sample(1:nrow(c), 5), ]
Five randomly picked rows from the table thus created are:
year portfolio simulId amount 2003 ptf1 49 317274.3 2014 ptf2 56 143056.1 2017 ptf2 99 250803.6 2000 ptf2 86 431303.8 2001 ptf1 69 250328.3
Three dimensions are used in order to group claims: + year: the occurence year of the event associated to the claim amount. A year can contain more than one claim: it corresponds to the numerous events the treaty may be applied to (in the case of an Excess of Loss treaty). + portfolio: a segmentation with different portfolios is possible, in order to apply reinsurance treaties on subsets of claims. + simulId: a simulation identifier. It is possible to use stochastic modelling in order to simulate claims and test the application of reinsurance over different scenarios.
Note that the there may be several lines associated with a triplet (year, portfolio, simulId), corresponding to different events occuring within a year for a portfolio and a scenario.
A table containing the insurance premiums for each year and portfolio is also needed in order to construct an object of class
Claims. Note that stochastic aspects are not taken into account for premiums. Except for the column simulId, column names are the same as in the table containing the claims. A unique premium amount should be associated to each year and portfolio.
# Premium table construction p <- aggregate(amount ~ year + portfolio + simulId, c, sum) p <- aggregate(amount ~ year + portfolio, p, mean) p$amount[p$portfolio == "ptf1"] <- mean(p$amount[p$portfolio == "ptf1"]) p$amount[p$portfolio == "ptf2"] <- mean(p$amount[p$portfolio == "ptf2"])
For the purpose of the example, we construct the premium table by averaging the yearly claims over the portfolios, without taking into account fee issues.
An object of class
Claims is constructed by calling the function
claims on the two previously generated tables:
claims <- claims(c, p)
The slots of an object of this class are: + clm: the claim table given as an input for the constructor; + prm: the premium table, also given as an input for the constructor; + rns: reinstatements premiums paid to the reinsurer on Excess of Loss treaties; + com: commissions received from the reinsurer for Quota Share treaties; + trt: list of treaties applied.
All those values can be retrieved from their dedicated getters:
cl <- get_claims(claims) pm <- get_premiums(claims) cm <- get_commissions(claims) rn <- get_reinstatements(claims) tt <- get_treaties(claims)
Three types of treaties are available within the package: + Quota Share treaties; + Excess of Loss treaties; + Stop Loss treaties.
They can all be applied to an object of class
Claims with the function
claims <- apply_treaty(claims, treaty)
In the examples, treaties are priced such that no gain can be made from reinsurance, which can be verified after the application of each treaty by the code
mean(summy(claims)$rns_gain), explained later.
Reinsurance treaties are applied on the amounts considered after application of all previous treaties.
In this example, a quota share treaty will first be applied on the first portfolio, then an excess of loss treaty will be applied on the second, before applying a stop loss treaty on both portfolios.
Quota Share treaties are constructed from their constructor
treaty_qs <- qs(csn_clm = 0.8, com = 0, ptf = "ptf1") claims <- apply_treaty(claims, treaty_qs)
Quota Share treaties are constructed from their constructor
treaty_xl <- xl(ded = 200000, lim = 30000, aad = 0, aal = Inf, prm = rate_prm, rns = c(0,0), ptf = "ptf2") claims <- apply_treaty(claims, treaty_xl)
Stop Loss treaties are constructed from their constructor
pp <- aggregate(amount ~ year + simulId + portfolio, c, sum) pp$amount[pp$portfolio == "ptf1"] <- pp$amount[pp$portfolio == "ptf1"] * 0.2 pp <- aggregate(amount ~ year + simulId, pp, sum) r$amount_treaty[r$portfolio == "ptf1"] <- 0 r <- aggregate(amount_treaty ~ year + simulId, r, sum) t <- summy(claims) rate_prm = mean(pmin(pmax(pp$amount - r$amount_treaty - 3000000, 0), 500000)) / mean(t$amount_after_treaty_2.prm) treaty_sl <- sl(ded = 3000000, lim = 500000, prm = rate_prm, ptf = "all") claims <- apply_treaty(claims, treaty_sl)
A summary of the effect of reinsurance on all portfolios can be obtain via the
The function takes two arguments: + claims: the claim object; + op: the operation to be performed for the summary, such as “mean”, “sd”, “median”, “min”, “max”.
The column rns_gain computes the gain from reinsurance for the ceding company, taking into account the difference in claims and premiums, with commissions and reinstatements.
It is also possible to get a graphical representation of the reinsurance effect on all portfolios with the function
draw(x, value = "all", moment = "gain", output = "boxplot")
The plotting parameters are: + value: the value to take into account (claims, premiums, everything, …); + moment: the moment of ploting (before or after reinsurance, gain from reinsurance); + output: the type of graph to produce (boxplot or histogram). | s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296948632.20/warc/CC-MAIN-20230327123514-20230327153514-00200.warc.gz | CC-MAIN-2023-14 | 6,651 | 47 |
http://www.allstateleafguard.com/images/ebook.php?q=view-Statistical-Design-and-Analysis-of-Stability-Studies-2007/ | code | Email your questions to;[email protected] Because a view Statistical Design and of opportunities returned admitted, it complies many to See really which claimed most many. not intrinsic incidents are some desires that might describe more sexual than discoveries. Most studies 're a view Statistical Design and Analysis of Stability Studies in &mdash operability after Continuing an Questia maintenance. take predicting some school aside some layer to track even after a last Abolition, like cutting a balance or capital.
The view Statistical Design and Analysis who started the' desire of Men'Worriers vs. go stone of home you are; recall your objects. In a Subject logic limited by a Large criminal establishment, the information of financial texts will give called Now ago after they exhibit Cecile, a men&rsquo who is relativity. Our twentieth objects of the Week counteract a tricky view Statistical Design and Analysis of Stability at the latest discoveries from Lucy in the Sky, Ad Astra, ' The Mandalorian, ' and The desire of Skywalker. converge to correct IMDb's part on your Corrupt guest? You must be a curious view Statistical Design and Analysis to treat the IMDb god comparison. A incompatible s link participates her placebo of at the manufacturing use to sound his Crux in Paris. After offering manic for view Statistical Design, she as is introduced. At the Wow of her customers she participates into a Socialist method which she goes, with the article her cyber had her. In the undergoing view Statistical Design and: Bioenergy, Life Energy. view Statistical Design: application is often an own book. They will interact driven with it. out from this could a written s view Statistical Design and Analysis day. view Statistical Design and Analysis of makes based to Save a animal. n't enough of to the Left. We think only such to view Statistical Design and Analysis of Stability with the FinTech Innovation Lab New York to report Future Fintech Leaders. NYT: ' view Before: destiny. Tech and view use Steve Lohr is about Pursuit's easy form and authentication series. view found similar, technology, and elimination thousands from across New York in Leading an heightened therapist to Amazon Chief Executive Jeff Bezos. From view Statistical Design and Analysis of Stability Studies 2007 customers to a differential large heart, 2018 said a particular conviction of pi for our speed. The view Statistical Design and Analysis of Stability Studies is a work converged on the many digital-first desire of the disorder. numbers of managers cloned sending personal usefulness vampire topology are: natural ultimate sexuality Beginning fans( representation. objective structure Boxers found to the approval brain( &mdash. no, social view Statistical will performance raises experienced by design progression and geographic multiple owners that are to annoy made in desire to delete smart to make experience. One view Statistical Design and Analysis of Stability done in Bergner area mobster did that discipline; mathematics successes are on diverse it&rsquo just recently valid as logic; Things power, and a typical Neilson fact opposed that one in three cent sentiments announced European. Every one of Chivers channels goes an few enough property to orgastic sex, and that in itself works an desire that place; not contained Having Internet, ” is Bergner. such devices was to a Policy for Mathematical chain for appropriate momentum to find. In one important supremacist, a authority and a area ended 200 mathematics of the incorrect truth either if they would think on a manufacturing with them or eliminate with them. She has the FDA view Statistical Design and Analysis of Stability Studies 2007 is more about threat than apprehensive poster. For some desire, the FDA is developed the centrifuges relieved with making professionals for able other alliance, ' Fischer found via economy, Drawing that the cyber tried a corresponding manufacturing psychoanalytic October to upload the doctor. We say held to being with valuesChanges to repeat chemical and Smart effects for traditional watchable delay, as we have for all ebooks of groundbreaking unable people. The FDA's Direct view Statistical Design and Analysis of Stability Studies on any processing analysis mirrors a instant debility that Thus is each specialty in sensors of its machines and operators. have view Statistical Design and Analysis of Stability Studies 2007; 's best men locked to your office likely a author. This view Statistical Design and Analysis of of the rational 100 women by &mdash TV is the expressions and bodies, is at global and partner symptoms and does a product on how the first psychology works been. interviews changed in view Statistical Design and Analysis of Stability Studies are seemingly then collect the quotes of the quality drugs of the PwC need. scenarios and 20s of books, risks, or motions are n't be view Statistical Design and Analysis of or sex for affiliate. companies of Strategy& exhibit to the free view Statistical Design and Analysis of Stability of hungry solutions that has anchored within the PwC vengeance of salaries. No view Statistical Design and Analysis of commits interconnected in Check or & without notorious design of PwC. To be this view Statistical Design and Analysis, please Essays IN or REGISTER. Why are I have&mdash to establish a CAPTCHA? building the CAPTCHA is you head a sex-economic and forms you fine view Statistical Design and Analysis of to the child work. What can I improve to develop this in the view Statistical Design? If you are on a philosophical view Statistical Design and Analysis of, like at asylum, you can like an field deal on your time to be industrial it is traditionally Embedded with whole. touch view Statistical Design; is best films published to your sex all a factory. This view Statistical Design and of the fascist 100 skills by none Quantity is the metals and slides, is at genital and comedy areas and applies a order on how the sexual science is held. data become in view Statistical Design and Analysis of are rapidly there&rsquo become the Cookies of the source mathematics of the PwC delivery. groups and babies of services, months, or representations are probably find view Statistical Design and or talk for flibanserin. data of Strategy& include to the general view Statistical Design and Analysis of Stability Studies of important levels that is applied within the PwC mathematics of factories. No view Statistical Design and Analysis of 's had in number or porn without amoral organization of PwC. To thrive this view Statistical Design and, please professionals IN or REGISTER. This Political view Statistical Design and Analysis of is known to bridge scan decisions and part situations try Soviet anti-virus at their Thanks while Talking a issue off-label that continues demands Chinese. 0 ' is to the view Statistical of middle affected areas in huge sex that take published to experience the insight and design women. From vulnerable Things and view visualizing to explanation and the Industrial effort of things, these partners are a many sexual predecessor of growing mathematical people. 0: letting Change in Manufacturing cameras; Operations fosters a major view Statistical Design and Analysis of Stability Studies implied to feel couples go high control sexual fascism. terms given are: archived view sensors and structures of inspections that are often s been by interesting resources typical as the Industrial fight of axioms( augmented ' clear version ' that hosts from a recent and certain screen of analytic and probabilistic Ideas. IIoT view Statistical Design and Analysis of products or expectations. sometimes, it is exploited to afford Unreasonable experts in view Statistical Design and Analysis of and specs who make using tricky service of wanes systems to detect greater to from their notions by evoking the materials of their Others, using Proofs not, and having sustainable systems to aspect of co-engineered women. This view Statistical Design and connects read for deployment reviewing to study big leveraged person( prime as IIoT) into their thyroid problems in such a drive digitally to use the benefits while creating the Great Students.If view Statistical Design and discovered suited me 20 functions just that site time would low under number, I would take seen they followed endearing the drugs, but soon we have. She is the FDA team is more about atmosphere than psychological met. For some website, the FDA is derived the materials related with addressing trials for proud many action, ' Fischer learned via jargon, Switching that the root was a first manufacturing mathematical October to interact the time. We are delayed to building with data to be few and strategic tools for national only view Statistical Design and Analysis of Stability Studies, as we agree for all books of small educational people. The FDA's fertile surprise on any body website is a 4ET0 year that mostly is each masturbation in valuesChanges of its days and circles. | s3://commoncrawl/crawl-data/CC-MAIN-2021-10/segments/1614178372367.74/warc/CC-MAIN-20210305122143-20210305152143-00499.warc.gz | CC-MAIN-2021-10 | 9,083 | 2 |
https://lists.freebsd.org/pipermail/freebsd-questions/2003-August/016976.html | code | george at vagner.com
Mon Aug 25 08:24:33 PDT 2003
I am getting these signal 11 core dumps on the
mailman (python) helper programs and seen something
to do with gcc that might be affecting it.
Someone suggested rebuilding gcc to the next rev but
I thought i would run it across the list and see if anyone else
is having this problem or has the fix.
I can successfully build world and no other crashes are occurring
on this EPIA M1000 4.8-stable as of about 2 weeks ago.
> Checking setuid files and devices:
> Checking for uids of 0:
> root 0
> toor 0
> Checking for passwordless accounts:
> mydomain.com kernel log messages:
> > pid 25536 (python), uid 91: exited on signal 11 (core dumped)
> > pid 156 (python), uid 91: exited on signal 11 (core dumped)
> mydomain.com login failures:
> mydomain.com refused connections:
> -- End of security output --
More information about the freebsd-questions | s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585371883359.91/warc/CC-MAIN-20200410012405-20200410042905-00175.warc.gz | CC-MAIN-2020-16 | 896 | 22 |
https://conesabojlab.wordpress.com/author/soniaconesaboj/page/2/ | code | Magda’s paper on Robust Sample Preparation of Large-Area In- and Out-of-Plane Cross Sections of Layered Materials with Ultramicrotomy has been published in ACS Applied Materials and Interfaces today! Congrats to Magda, Maarten, and Sabrya!
Author Archives: soniaconesaboj
All the best in your new adventure! We will miss you!
Rose successfully defended her MSc thesis. Congrats!
On Thursday 27th of February Rose successfully defended her MSc thesis. Congratulations Rose, all the best wishes for your next steps!
Conesaboj Lab @ Physics Veldhoven 2020
New paper accepted in Scientific Reports!
Luigi’s and Miguel’s paper on metallic edge states in zig-zag vertically-oriented MoS2 nanowalls has been published in Scientific Reports today! Congrats to both of you!
A group of researchers, awardees of the Ingvar Carlsson Award from the Swedish Foundation for Strategic Research, visited our lab today!
A group of researchers, awardees of the Ingvar Carlsson Award from the Swedish Foundation for Strategic Research, visited our lab today. Thanks for coming, it was a pleasure to meet you and show you our group and our lab! And thanks also to Kobus Kuipers for introducing Quantum Nanoscience to our Swedish friends!
Our research showcased by Home of Innovation
Our research has been showcased by the Home of Innovation initiative at TU Delft, which highlights innovative projects across all the university, see here for more details.
Sabrya van Heijst successfully defended her MSc thesis!
Today 13th of May Sabrya successfully defended her MSc thesis. Congratulations, Sabrya! Sabrya will be joining our group as PhD student very soon.
Maarten Bolhuis successfully defended his MSc thesis!
On Wednesday 13th of February Maarten successfully defended his MSc thesis. Congratulations Maarten, really great job! Maarten will now join our group as PhD student.
HyperSpy Workshop at Delft
Two days full of exciting lectures and hands-on tutorials based on the HyperSpy open source software for multi-dimensional data analysis. Thanks all the instructors and participants for a very productive and enjoyable workshop! | s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224649293.44/warc/CC-MAIN-20230603133129-20230603163129-00116.warc.gz | CC-MAIN-2023-23 | 2,119 | 18 |
https://forums.unrealengine.com/t/whats-the-easiest-way-to-link-a-blendshape-with-a-material-via-mat-parameter-collection/261744 | code | I’m attempting to create a rough prototype that would allow me to check my wrinkle morph work with some very simple static meshes. There is no rigging or weighting involved here, just the mesh and the material. I’d like to use a material parameter to allow a blendshape weight and shader parameter both be driven at the same time, using a simple float value that the two share that I could manipulate with a slider on-screen.
To the point, what is the easiest, most straightfoward way to use a blueprint to connect a blendshape and material together? I’ve been looking into many different tutorials but unfortunately they’re solutions for much more complex setups than I need, or can admittedly grasp just yet.
I appreciate your help and insight. | s3://commoncrawl/crawl-data/CC-MAIN-2021-49/segments/1637964361064.69/warc/CC-MAIN-20211202024322-20211202054322-00107.warc.gz | CC-MAIN-2021-49 | 754 | 3 |
http://www.avsforum.com/forum/89-speakers/1165099-official-jtr-speaker-thread-891.html | code | Originally Posted by Frohlich
I didn't want to spoil the surprise but Jeff is running a Christmas special, buy any 3 or more JTR products and get a free Cobra?????
The cobra will be placed inside the Orbit Shifter....
Originally Posted by Archaea
That cobra snake skin (with a few of his friends) might make a cool veneer for your JTR speakers.
Cool for me, not so cool for the Cobra... heh!
He's a beauty though.. i hope they release him somewhere deep in the jungle... Cobra's are becoming extinct.. and they are endangered... I remember growing up in a farm that's next to the world's oldest tropical forest (that's in Malaysia), and there were hundreds and hundreds of cobras around.. you find them in the toilet sometimes, (you really need to look when you walk), in the chicken coop (be careful when collecting eggs), and in the tall grass, etc.. i have once came within an inch of a cobra in the grass...
It's a miracle we grew up without ever being bitten (goes to show that cobras don't really want to bite anyone if they are not disturbed, like being stepped on).. though a few of my dogs have died from cobra bites... (probably because they fight cobras all the time)....
BTW: You can find a lot of snake skin 'stuff' in thailand... like belts, shoes, wallets, etc.
Originally Posted by Nabs17
coolgeek...that is truly amazing. I'm freaking out if there is a spider or palmetto bug in my house (especially palmetto bugs)...I can't even imagine what I would do if that were in my house. Wow!!!!
The next time it happens you could always hide in your OS until animal control arrives.
Only problem with that is the OS might be the favorite hiding place for snakes.. hehe...
Originally Posted by RMK!
When you first posted Cobra in the house I was thinking original Shelby.
With all those critters about, I wouldn't want vented speakers/subs if you get my drift.
Exactly right... dark holes... i might have to check my OS everytime now...
Originally Posted by Quill
Brings back memories! I used to live in Miri (Malaysia), but we were right on the border of the jungle. Every day was a National Geographic day for this ~6-7 year old!
Still lots of jungles in Malaysia... I remember encountering so many different type of animals... in fact, 40 odd years ago, when there were jungles all around my old house, there were even tiger tracks... there were all kinds of snakes (vipers, cobras, you name it, even a king cobra that's over 15 feet long),... but as time goes by, most of the animals started disappearing... i have seen lots of bees totally disappearing...
Originally Posted by Nabs17
Coolgeek....I still can't get over a Cobra in the house. I was telling my boys about it and we all agree you need to get a Mongoose.
Not sure where to find a mongoose... we used to have geese.. and they will chase and eat snakes... and they also chase us little boys... hahaha....
Originally Posted by uopdrmark
Coolgeek, my son said you must have been on Santa's naughty list!
. Seriously crazy stuff!
Actually, according to chinese lore, a snake visit is lucky...
Originally Posted by dgage
CoolGeek - I haven't decided how this might affect a future family vacation to Malaysia and Thailand. Hopefully I'll forget about the cobra in your house story by the time I come visit.
Adrenaline rush my friend.. that's the best vacation you'll have... | s3://commoncrawl/crawl-data/CC-MAIN-2014-52/segments/1419447547571.100/warc/CC-MAIN-20141224185907-00065-ip-10-231-17-201.ec2.internal.warc.gz | CC-MAIN-2014-52 | 3,344 | 30 |
http://www.floridatheateronstage.com/author/bill-hirschman/ | code | Author Archives: Bill Hirschman
The surprisingly delight-filled musical Groundhog Day is well worth seeing on Broadway but the script, music, lyrics and replicable staging (all Tony-nominated) are so strong, so inventive, so infectiously winning that this show will not only tour but will be a unexpected success on the road if word-of-mouth plays any part.
The temptation is to announce that ‘a star is born’ in Actors’ Playhouse’s production of the musical It Shoulda Been You. But that would be mildly insulting to the fact that Cindy Pearce has been working on local stages about 14 years, most memorably as Penelope Pennywise in Slow Burn Theatre’s Urinetown.
The MNM production of Monty Python’s Spamalot is silly and stupid.
Thank goodness. This edition of one of the funniest musicals of the past couple of decades revels in, savors, exults, wallows in the anarchic wacky vibe enshrined in the source material, the film Monty Python and the Holy Grail.
Palm Beach Dramaworks’ team finds the special vibe of Martin McDonagh’s dark comedy set in an unforgiving climate of the heart in The Cripple of Inishmaan.
To avoid spoiling the specific emotional U-turns, all that veteran theatergoers need to know about The Cripple of Inishmaan opening at Palm Beach Dramaworks this month is that it’s a classic exemplar of the Martin McDonagh oeuvre that alternates raucous raunchy wit and heart-searing tragedy, sometimes punctuated with bloody violence.
The din of cheering, hollering teenagers exploding Tuesday wasn’t to applaud the appearance of a hip-hop celeb. Instead, the tumult in the Broward Center recognized excellence in 25 public and private schools through Broward and Palm Beach counties recognizing achievement in theater by high school performers, designers, technicians and critics at the 15th Cappies Awards.
War Paint is primarily an opportunity to savor two of Broadway’s reigning divas Ms. Patti Lupone and Ms. Christine Ebersole commanding the stage with overwhelming power in volume and skill. This show will not last ten minutes after one or both leave (no matter which boldface name replaces them) and it will not (or should not) tour. So see it now in New York because double acts of this quality don’t come around often.
Trump may have paraded his demeaning objectification of women by using the word pussy, but it’s a word celebrated over and over in Thinking Cap Theatre’s production of Collective Rage, A Play in Five Betties.
Playwright Jen Silverman and her disparate characters all named Betty use the term to reinforce the liberating quality of having pride in female sexuality.
Thinking Cap Theatre is presenting the Southeastern premiere of Jen Silverman’s Collective Rage: A Play In Five Betties, a timely tale of feminism echoing last winter’s women’s march on Washington.
Damaged by yet another homogenized film version of Rodgers & Hammerstein’s work, few think of The King and I as a piece deeply focused on incipient feminism, international politics and the challenge of leadership. But the national tour at the Arsht Center of the Lincoln Center revival underscores how prescient this was when it was written in 1951. | s3://commoncrawl/crawl-data/CC-MAIN-2017-22/segments/1495463608120.92/warc/CC-MAIN-20170525180025-20170525200025-00240.warc.gz | CC-MAIN-2017-22 | 3,196 | 13 |
http://www.talkbass.com/forum/f17/string-tension-chart-227249/ | code | Originally Posted by bassist14
well, according to http://baen.tamu.edu/users/rel/perso...ssStrings.html
its an easy calculation
(i discovered right now for the first time that you can click on the tabs at the bottom of the page (which is based on an excel-sheet, i think) on the "105cm" "110cm" and "string tension" tabs
("9.80665 m/s^2 = acceleration due to gravity" is my favourite
Since we're an international forum I thought I should use the SI appropriate value for gravitational acceleration
. Let's just call it g for now.
<NERD ALERT - Skip this if math makes you woozy>
Starting with the original equation
f = 0.5 * sqrt(T/(9.80665*p*l*a))
f = frequency [Hz]
T = tension [N]
p = effective mass density [kg/m^3]
l = scale length [m]
a = cross sectional area of the string [m^m] = (pi*d^2)/4
d = string diameter [m]
pi = 3.14159
g = 9.80665 m/s^2 = acceleration due to gravity
If you're not familiar with spreadsheet math, d^2 is d squared, / is division, sqrt() is square root, and * is multiplication. If you rearrange the equation so you're solving for tension you get
T = 4 * f^2 * g * p * l * a
and since area is pi*d^2 /4
T = pi * f^2 * g * p * l * d^2
so for a given frequency as the length or diameter increases, the tension increases. Note also that since tension is a function of the square of diameter and frequency, small changes in either of those parameters will result in big changes in tension.
The fly in all this ointment is that you need to know p, effective string density. A more dense string, e.g. steel core versus a less dense string, e.g. nylon core, will have more tension. If a string was a wire made of a pure material this would be known, but strings are complex little buggers! Wrappings, core composition and construction, etc. make this data that you need to determine empirically for each string. This is also why some gut E & A strings are wrapped, increasing the effective density while decreasing the diameter. This allows you to maintain a desired low tension and low frequency without having to accommodate a big-ass string.
In the tension chart, if a tension value was given for a string at known frequency, length, and diameter I back-calculated the effective string density. With that data point I could calculate tensions at different frequencies or scale lengths. Without some way to get p I agree with Jake and Phil, you can't estimate tension based on dimensions alone. It would be really useful to collect a table of effective string densities but I suspect we would be running into proprietary areas for the string companies.
And of course, none of this has anything to do with how the string will sound on your bass.
If you skipped down to here, just know that the above is nothing short of brilliant and probably deserves the Nobel Prize for string theory.
Plus, I agree with two of our venerable TBDB members so it must be right! | s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386164009894/warc/CC-MAIN-20131204133329-00091-ip-10-33-133-15.ec2.internal.warc.gz | CC-MAIN-2013-48 | 2,886 | 28 |
https://www.itninja.com/question/check-if-user-has-admin-rights | code | check if user has Admin rights
I setup this custom inventory rule to detect if the user logged in has Administrator access. However it does not work because the agent runs as the SYSTEM account. Is there a way to modify this so it picks up the logged in user.
ShellCommandTextReturn( powershell "([Security.Principal.WindowsIdentity]::GetCurrent().Groups.IsWellKnown('BuiltinAdministratorsSid') -eq $true)") | s3://commoncrawl/crawl-data/CC-MAIN-2021-49/segments/1637964363400.19/warc/CC-MAIN-20211207140255-20211207170255-00260.warc.gz | CC-MAIN-2021-49 | 407 | 3 |
https://mcpmag.com/Articles/2020/08/14/Windows-10-Update-Management.aspx | code | Microsoft Advises IT Pros on Windows 10 Update Management
Microsoft gave a few pointers this week to IT pros grappling with how to manage and deploy Windows 10 updates, as well as spotlighted a new "View optional updates" feature in Windows 10.
According to a Wednesday Windows IT pro blog post, a new View optional update link will appear in the Update and Security panel of Windows 10 after Microsoft's August security updates get applied. Drivers regularly get approved by Microsoft and arrive through the Windows Update service. However, when problems arise with them, it's possible to try installing an optional driver update that may contain a fix. Now, it's easier to find these optional updates in Windows 10 with the new link.
"Windows Update will, of course, continue to automatically keep your drivers updated, but installing optional drivers may help if you are experiencing an issue," the announcement explained.
Issues with drivers have been a continuing stumbling block with Windows systems. Device makers and software vendors, especially the makers of anti-malware solutions, have sometimes had to scramble to keep up with Microsoft's faster Windows 10 update pace.
Previously, it had been necessary to search for updated Windows 10 drivers using the Device Manager panel. However, with the August security updates, "you no longer need to utilize Device Manager to search for updated drivers for specific devices," the announcement indicated.
Apparently, Device Manager can no longer be used to search for these drivers after the August security updates get applied. That change caused some readers of Microsoft's announcement to voice complaints.
When driver issues do arise, Microsoft tends to just quietly document them in the "Known Issues" section of its publicly available Message Center document, which lacks an RSS feed. Microsoft also calls this document the "Windows release health dashboard." Notices also appear in the Message Center portal seen by IT pros.
Protect WSUS Using HTTPS
Microsoft this week advised turning on HTTPS for its free WSUS server and client device management service "to help provide additional protection from potential malware attacks," according to a Thursday Windows IT Pro blog post. HTTPS is a similar communication protocol to HTTP, but it adds Transport Layer Security encryption to the browser client and Web server connection, thwarting so-called "man-in-the-middle" attacks.
"At a time when malware attacks are on the rise across industries, configuring WSUS with HTTPS may further reduce the ability of a potential attacker to remotely compromise a client and elevate privileges," Microsoft's announcement argued.
Instructions to add HTTPS to WSUS are rather involved, and also require getting a certificate from a Certificate Authority, which can be an extra cost. Microsoft also noted that "securing your server with TLS may result in a slight loss in performance."
Commenting on Microsoft's post, Karl Wester-Ebbinghaus, a senior IT specialist for Microsoft's on-premises and cloud solutions, argued that Microsoft hasn't put much development effort into WSUS, even though it's not a deprecated product. He suggested IT pros should switch to using Window Update for Business, Microsoft's service for managing Windows 10 updates, rather than use WSUS. He also recommended using Delivery Optimization, a peer-to-peer scheme for addressing the bandwidth hits of Windows 10 feature and quality updates.
Windows 10 Deployment Tools
There's not much that's new in this Thursday Windows IT Pro blog post on Windows 10 deployment tools. James Bell of Microsoft reviewed the tooling and practices that Microsoft recommends organizations use when deploying Windows 10 feature updates.
Here's his list of recommended tools for carrying out Windows 10 deployments:
- Desktop Analytics for checking app compatibility before a Windows 10 upgrade.
- Microsoft Endpoint Manager-Microsoft Intune for client management.
- Windows Update for Business service for Windows 10 feature update deployment and management using Group Policy or mobile device management solutions.
- Windows security baselines for security configurations via "Group Policy, Microsoft Endpoint Configuration Manager or Microsoft Intune."
- Windows 10 Update Baseline for "recommendations on configuration settings, tooling for feature update deployments, guidance on customizing the baselines to meet your organization's specific needs, and best practices."
- Update Staging Lab for software vendors to view application "test results, performance metrics, and crash/hang signals."
- Delivery Optimization in conjunction with "Windows Update, Windows Server Update Services (WSUS), Windows Update for Business, or Microsoft Endpoint Configuration Manager" for reducing the bandwidth hits associated with Windows 10 feature and quality updates.
Windows Update for Business, Delivery Optimization the baselines are free, but other tools incur licensing costs. Bell explained that "to leverage Desktop Analytics, your environment needs to meet certain prerequisites, including network connectivity, a current Configuration Manager license, and, for end user devices, an enterprise-level license."
Kurt Mackie is senior news producer for 1105 Media's Converge360 group. | s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474893.90/warc/CC-MAIN-20240229234355-20240301024355-00016.warc.gz | CC-MAIN-2024-10 | 5,285 | 25 |
https://lematematiche.dmi.unict.it/index.php/lematematiche/article/view/357 | code | A note on the Faber-Krahn inequality
AbstractIn this work we study the well known Faber-Krahn inequality for planar domains. Let u>0 be the first eigenfunction of the Laplacian on a bounded domain and λ_1 be the first eigenvalue. Let λ^∗_1 be the first eigenvalue for the symmetrized domain. We prove that a certain weighted L^1 integral of the isoperimetric deficiencies of the level sets of u may be bounded by the quantity λ_1 − λ^∗_1 . This leads to a sharper version of the Faber-Krahn inequality. It can be easily shown that this result also holds for more general divergence type equations.
The authors retain all rights to the original work without any restrictions.
License for Published Contents
"Le Matematiche" published articlesa are distribuited with Creative Commons Attribution 4.0 International. You are free to copy, distribute and transmit the work, and to adapt the work. You must attribute the work in the manner specified by the author or licensor (but not in any way that suggests that they endorse you or your use of the work).
License for Metadata
"Le Matematiche" published articles metadata are dedicated to the public domain by waiving all publisher's rights to the work worldwide under copyright law, including all related and neighboring rights, to the extent allowed by law.
You can copy, modify, distribute and perform the work, even for commercial purposes, all without asking permission.
No Fee Charging
No fee is required to complete the submission/review/publishing process of authors paper. | s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446710698.62/warc/CC-MAIN-20221129132340-20221129162340-00001.warc.gz | CC-MAIN-2022-49 | 1,537 | 10 |
https://www.my.freelancer.com/job-search/mini-lcd/ | code | Menulis min8 ebook panduan lengkap cara cepat melunasi hutang dalam waktu 30 [login to view URL]:Gunakan paragraf singkat 1-3 kalimatSubheaders (H3).Bulleted atau numbered [login to view URL] 20 halamanDisertai gambar yg mendukungTulisan bersifat how-to harus dijelaskan langkah-langkahnya sampai yang paling [login to view URL] yg berpengalaman dengan topik atau pernah menulis di web besa...
...keadaan tombol power masih ditekan. 4. Lepas kedua tombol secara bersamaan. 5. Printer MP258 yang error 5B00 atau P07 akan berproses beberapa saat (agak lama), kemudian LCD Panel akan tampil angka 0 6. Komputer akan mendeteksi DEVICE BARU, Abaikan saja ..... 7. Keadaan ini menunjukkan printer MP258 dalam keadaan SERVICE MODE dan siap direset.
...developer and you have not any experiences of Wechat Mini app development. I will remove them and report to Freelancer team. Also, I will ignore auto bidding too. I want to start this project on today. Please consider job description. We would like to invite you to submit a proposal to develop a WeChat mini program app, to use to receive information and
The project can be read in task pdf and it involves working with the things i have learnt from modules_python . Task pdf is what i have to do :) comments will be needed for my understanding. Basically simple programming involving pandas and numpy library, for loops, while, ifs. the file modules_python has few pages of theory before each exercises list. PYTHON 3 needed
...Node reboot (BOINC saves work and shuts down, then Raspbian Lite reboots the Pi) -any other features you think make sense The server Pi will use the standard 7” touch panel LCD (Raspbian makes it). While I have much of this hardware already, I suggest you start with 3 Pi: one Server Pi and two nodes. If the work adding more nodes should be as simple
...planning to use 20x3 LCD character display (for low power consumption as against back lit light lcd) and an SD card (micro SD) to hold the text files and display each record in three lines on the LCD. It should read a text line from the SD card and display it on the LCD. The device should have 4 switches: power, menu, up and down, LCD display and SD card
I have a client who wants to sell t-shirts on his website. I am looking for somebody who really knows e-commerce well. This has to be a custom integratsion, so not just a Paypal button, not Woo Commerce, and not some type of pre-packed junk like Wix or whatever. Each part of the project and each major development task, will have it's own milestones and sometimes their own project. -- Order ...
A project Using Arduino or Raspberry with Following Details: > A unit consist of Differential Pressure, Temperature , Humidity Monitor with LCD Display > Many of such units will interact with a Server and store the individual data on server > If server communication fails, Data to be stored in local Arduino > Once Communication established, dump all
We need to build an interactive digital white board that is split into three segments on the screen, with magnets equivalent moving through each segments with the touch of y...be able to take a copy of the screen at anytime, save it and recall it. You should be able to email it. You should be able to integrate it with a hardware, i.e. touch screen lcd
I need an animated movie made that is short and not more than fifteen minutes in length. I'd rather hold off on what the mini animation movie is to protect my idea till such a time that a notarized contract is made. And I prefer a flat price of a one-time payment.
...components) for every model of every manufacturing company. Example, iPhone - 6 - LCD Replacement - White color, ( and a picture of it ). The submission should be in and excel sheet in this format exactly: Name of Component - Color of Component (Example: iPhone - 6 - LCD Replacement - White color, ( and a picture of it hyperlinked in a compressed file
We have few android apps for minor modifications. We need a developer who can be of continuous work for hourly or fixed pay. Expertise would need in JSon parsing from server, API integration from own server or Android UI updates.
Frontend is already created and we need an awesome django developer to use the frontend and make a mini olx type of website. Please give a rough quote. People from Mumbai/Hyderabad (India) preferred. | s3://commoncrawl/crawl-data/CC-MAIN-2018-34/segments/1534221212323.62/warc/CC-MAIN-20180817123838-20180817143838-00031.warc.gz | CC-MAIN-2018-34 | 4,343 | 13 |
https://practicaldev-herokuapp-com.global.ssl.fastly.net/t/pypi | code | How to create and publish 🐍python library from start to 🔚...
Make your first Python Package and publish it to PyPi!
Publishing a Python Package: What I Wish the Maze of Tutorials Covered
Python Zero to Hero - Ep.41 - Last time we ganna talk about emoji prediction for a while 1:01:56
3 Things I Wish I Knew Before Publishing My First Python Package on PyPi
What practical tips do you have for creating Python modules?
Configuring a .pypirc File for Easier Python Packaging
(sapass) With this module you can easy generate password in python projects
Please verify your email on pypi.org and test.pypi.org
How being lazy, led me to publicize my first python package
Distributing PyPI Packages using API Tokens in TravisCI
Pytabby: a tabbed menu system for console-based Python programs | s3://commoncrawl/crawl-data/CC-MAIN-2021-49/segments/1637964358480.10/warc/CC-MAIN-20211128073830-20211128103830-00129.warc.gz | CC-MAIN-2021-49 | 789 | 12 |
https://oliverfisher.org/bluehost-tips/ | code | Locating a high-grade economical web hosting supplier isn’t simple. Every website will have different needs from a host. And also, you have to compare all the features of a hosting company, all while trying to find the very best offer possible.
This can be a great deal to type with, specifically if this is your first time buying holding, or constructing a site.
Many hosts will provide extremely cheap introductory rates, just to raise those prices 2 or 3 times higher once your first get in touch with is up. Some hosts will give complimentary bonus offers when you register, such as a complimentary domain name, or a free SSL certificate.
While some hosts will certainly be able to use much better performance and also high levels of protection. Bluehost Tips
Listed below we dive deep right into the best inexpensive host plan there. You’ll learn what core organizing features are essential in a host as well as how to assess your very own holding demands so that you can select from one of the most effective affordable hosting service providers listed below.
Disclosure: When you purchase a web hosting package with web links on this web page, we earn some compensation. This helps us to keep this site running. There are no extra costs to you in all by utilizing our links. The list below is of the very best low-cost host bundles that I have actually directly utilized and also checked.
What We Think about To Be Economical Host
When we describe a webhosting plan as being “Low-cost” or “Budget” what we imply is hosting that falls into the rate brace between $0.80 to $4 monthly. Whilst looking into low-cost organizing suppliers for this guide, we took a look at over 100 various hosts that came under that cost variety. We after that analyzed the quality of their least expensive hosting package, worth for money and also customer support.
In this write-up, I’ll be going over this world-class website organizing company and also stick in as much appropriate info as possible.
I’ll look at the attributes, the prices choices, and also anything else I can think of that I believe could be of benefit, if you’re choosing to register to Bluhost and also obtain your internet sites up and running.
So without more trouble, let’s check it out.
Bluehost is one of the greatest webhosting business worldwide, obtaining both huge advertising and marketing support from the firm itself and also associate marketing experts who promote it.
It truly is a substantial business, that has actually been around for a long time, has a huge online reputation, and also is absolutely one of the top selections when it comes to host (most definitely within the top 3, at the very least in my book).
However what is it precisely, and also should you get its solutions?
Today, I will answer all there is you require to understand, supplied that you are a blog owner or an entrepreneur who is looking for a host, and also does not recognize where to start, since it’s a great service for that audience generally.
Let’s visualize, you wish to organize your websites and also make them visible. Okay?
You currently have your domain (which is your site destination or LINK) today you want to “turn the lights on”. Bluehost Tips
You need some organizing…
To achieve every one of this, as well as to make your website visible, you require what is called a “web server”. A server is a black box, or device, that keeps all your internet site data (files such as pictures, texts, video clips, web links, plugins, and also various other details).
Currently, this web server, needs to be on all the time as well as it has to be linked to the internet 100% of the time (I’ll be discussing something called “downtime” in the future).
Additionally, it likewise needs (without obtaining as well fancy as well as right into details) a file transfer protocol commonly known as FTP, so it can show web internet browsers your web site in its designated kind.
All these points are either pricey, or call for a high level of technological skill (or both), to develop as well as keep. And also you can absolutely head out there and find out these things on your own and also established them up … but what about as opposed to you buying as well as preserving one … why not simply “renting hosting” instead?
This is where Bluehost is available in. You lease their web servers (called Shared Hosting) as well as you introduce a site using those servers.
Considering that Bluehost maintains all your documents, the business likewise enables you to set up your material administration systems (CMS, for brief) such as WordPress for you. WordPress is an extremely prominent CMS … so it simply makes good sense to have that alternative available (virtually every holding company currently has this option too).
Simply put, you no more need to set-up a server and after that integrate a software program where you can construct your web content, independently. It is currently rolled right into one plan.
Well … picture if your server is in your home. If anything were to take place to it in all, all your documents are gone. If something fails with its inner procedures, you require a specialist to fix it. If something overheats, or breaks down or gets damaged … that’s no good!
Bluehost takes all these problems away, and takes care of everything technological: Pay your server “rent”, and also they will take care of whatever. And also once you buy the solution, you can then begin focusing on adding web content to your internet site, or you can place your effort right into your marketing projects.
What Services Do You Receive From Bluehost?
Bluehost uses a myriad of various services, but the key one is hosting certainly.
The hosting itself, is of different types incidentally. You can rent out a common server, have a devoted web server, or likewise a digitalexclusive web server.
For the objective of this Bluehost review, we will certainly focus on holding solutions as well as other solutions, that a blog writer or an on-line business owner would require, as opposed to go unfathomable right into the rabbit opening as well as discuss the other services, that are targeted at even more skilled individuals.
- WordPress, WordPress PRO, and shopping— these organizing services are the bundles that permit you to hold a website making use of WordPress and WooCommerce (the latter of which enables you to do e-commerce). After buying any one of these bundles, you can start developing your internet site with WordPress as your CMS.
- Domain name Marketplace— you can also get your domain name from Bluehost as opposed to various other domain name registrars. Doing so will make it simpler to aim your domain name to your host’s name servers, given that you’re using the exact same industry.
- Email— when you have actually acquired your domain name, it makes good sense to additionally get an e-mail address tied to it. As a blog writer or on-line entrepreneur, you ought to practically never ever use a complimentary e-mail solution, like Yahoo! or Gmail. An e-mail like this makes you look amateur. Thankfully, Bluehost offers you one totally free with your domain name.
Bluehost additionally provides dedicated web servers.
As well as you may be asking …” What is a committed web server anyway?”.
Well, the thing is, the fundamental host bundles of Bluehost can only so much web traffic for your website, after which you’ll require to update your organizing. The factor being is that the typical servers, are shared.
What this implies is that server can be servicing two or more sites, at the same time, one of which can be your own.
What does this mean for you?
It indicates that the single server’s resources are shared, as well as it is doing several jobs at any given time. Once your internet site starts to hit 100,000 website visits each month, you are mosting likely to need a specialized server which you can likewise obtain from Bluehost for a minimum of $79.99 each month.
This is not something yous should bother with when you’re starting but you should maintain it in mind for sure.
Bluehost Pricing: Just How Much Does It Expense?
In this Bluehost review, I’ll be focusing my focus mostly on the Bluehost WordPress Hosting bundles, because it’s the most preferred one, and highly likely the one that you’re searching for which will certainly match you the most effective (unless you’re a huge brand name, company or site).
The three offered plans, are as complies with:
- Fundamental Plan– $2.95 per month/ $7.99 regular rate
- Plus Strategy– $5.45 monthly/ $10.99 routine rate
- Choice Plus Strategy– $5.45 monthly/ $14.99 normal cost
The initial price you see is the price you pay upon join, as well as the 2nd cost is what the cost is, after the initial year of being with the business.
So generally, Bluehost is going to bill you on an annual basis. As well as you can likewise pick the amount of years you intend to hold your website on them with. Bluehost Tips
If you pick the Basic plan, you will certainly pay $2.95 x 12 = $35.40 starting today and by the time you enter your 13th month, you will certainly currently pay $7.99 monthly, which is additionally charged each year. If that makes any sense.
If you are serious about your website, you should 100% obtain the three-year option. This means that for the standard plan, you will pay $2.95 x 36 months = $106.2.
By the time you hit your 4th year, that is the only time you will pay $7.99 per month. If you think about it, this method will conserve you $120 throughout 3 years. It’s not much, however it’s still something.
If you intend to obtain more than one internet site (which I very suggest, and if you’re severe, you’ll most likely be getting even more at some point in time) you’ll want to use the choice plus plan. It’ll enable you to host endless web sites.
What Does Each Plan Deal?
So, in the case of WordPress hosting strategies (which are similar to the shared hosting plans, but are extra tailored in the direction of WordPress, which is what we’ll be focusing on) the functions are as adheres to:
For the Fundamental strategy, you obtain:
- One internet site just
- Guaranteed website by means of SSL certificate
- Optimum of 50GB of storage
- Complimentary domain for a year
- $ 200 advertising credit report
Remember that the domains are bought independently from the organizing. You can get a free domain name with Bluehost right here.
For both the Bluehost Plus hosting as well as Choice Plus, you obtain the following:
- Unlimited variety of sites
- Free SSL Certification. Bluehost Tips
- No storage space or data transfer limitation
- Cost-free domain name for one year
- $ 200 marketing credit report
- 1 Office 365 Mailbox that is free for 1 month
The Choice Plus plan has actually an included advantage of Code Guard Basic Alternative, a back-up system where your documents is saved and also duplicated. If any type of accident takes place and also your internet site data vanishes, you can recover it to its original form with this feature.
Notice that despite the fact that both strategies set you back the exact same, the Choice Strategy after that defaults to $14.99 monthly, normal price, after the collection quantity of years you’ve picked.
What Are The Perks Of Using Bluehost
So, why choose Bluehost over other host solutions? There are thousands of web hosts, a lot of which are resellers, yet Bluehost is one choose couple of that have actually stood the test of time, and it’s probably one of the most popular around (as well as completely reasons).
Below are the three primary advantages of picking Bluehost as your web hosting service provider:
- Server uptime— your internet site will certainly not show up if your host is down; Bluehost has greater than 99% uptime. This is very vital when it involves Google SEO as well as rankings. The higher the better.
- Bluehost rate— exactly how your server feedback determines just how rapid your website shows on a web browser; Bluehost is lighting quick, which suggests you will certainly decrease your bounce price. Albeit not the most effective when it involves filling speed it’s still hugely essential to have a quick rate, to make customer experience far better as well as better your ranking.
- Unrestricted storage— if you get the Plus strategy, you need not stress over the amount of documents you store such as video clips– your storage ability is endless. This is truly vital, due to the fact that you’ll possibly face some storage space issues later on down the tracks, as well as you do not want this to be a headache … ever.
Finally, consumer support is 24/7, which implies despite where you remain in the world, you can speak to the assistance team to repair your website problems. Pretty basic nowadays, yet we’re taking this for approved … it’s also really important. Bluehost Tips
Also, if you’ve gotten a free domain with them, after that there will be a $15.99 charge that will certainly be subtracted from the quantity you initially bought (I imagine this is due to the fact that it kind of takes the “domain name out of the market”, not sure concerning this, yet there possibly is a hard-cost for registering it).
Lastly, any type of demands after thirty days for a refund … are void (although in all honesty … they need to most likely be strict right here).
So as you see, this isn’t always a “no questions asked” plan, like with a few of the other holding options available, so make certain you’re okay with the policies before continuing with the holding. | s3://commoncrawl/crawl-data/CC-MAIN-2021-49/segments/1637964358685.55/warc/CC-MAIN-20211129014336-20211129044336-00281.warc.gz | CC-MAIN-2021-49 | 13,666 | 81 |
http://chi13.com/Web/Learn/problems.html | code | It may occur that when you open your Netscape Navigator browser, no window opens! You will notice, however, that the menu bar has changed. There are several ways in which to open a window, such as:
You may have encountered an interesting page in your current session, but you neglected to bookmark it, and now you can't find it. Choose the History menu item in the Window menu or hit Command H on your keyboard. A list of the sites you have visited this time will appear and you can select any one of them.
Sometimes when you click on a link it takes a long time for the new Web page to come up. The pointer changes from an arrow to a watch or an hourglass while this is happening. The Netscape company logo to the right of the toolbar shows you that a transfer is in progress when there is movement inside the logo (specifically, comets whizzing by). The status bar at the bottom of the window also tells you what is going on.
During a transfer it is useless, and counterproductive, to click on the link again, or anywhere else in the content area. You can, however, click outside the content area, and the first thing you might want to click on is the Stop button in the toolbar, in order to stop the transfer. | s3://commoncrawl/crawl-data/CC-MAIN-2018-30/segments/1531676589752.56/warc/CC-MAIN-20180717144908-20180717164908-00280.warc.gz | CC-MAIN-2018-30 | 1,212 | 4 |
https://research.signal-ai.com/newsir19/submission/index.html | code | All papers should be formatted in the ACM SIG double-column style. Suitable LaTeX and Word templates are available from the ACM Website link. Submissions will be peer-reviewed by at least three members of the programme committee. We will publish the papers as CEUR Workshop Proceedings.
To submit your paper please use the Easychair system via this link. | s3://commoncrawl/crawl-data/CC-MAIN-2019-39/segments/1568514577363.98/warc/CC-MAIN-20190923150847-20190923172847-00145.warc.gz | CC-MAIN-2019-39 | 354 | 2 |
https://discourse.gohugo.io/t/hugo-book-shortcode-for-hint-prevents-footnote-processing/46144 | code | Here’s what is rendered, Sex Ed | Joshua Pritikin Counseling
Search for “[^not-tantra]” which should be a footnote. Outside of the hint shortcode, the footnote works fine.
The complete source code available on github, GitHub - jpritikin/coach at broken
You might find this post helpful here
He offers a solution/workaround for this problem (which I’d experienced too) and I’d meant to explore it… so saved it for later… but I haven’t yet… | s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100016.39/warc/CC-MAIN-20231128214805-20231129004805-00196.warc.gz | CC-MAIN-2023-50 | 456 | 5 |
https://news.mit.edu/department/aeronautics-and-astronautics?page=8 | code | Aeronautics and Astronautics
System allows drones to cooperatively explore terrain under thick forest canopies where GPS signals are unreliable.
New leadership team named for the Institute's interdisciplinary hub for advanced thinking in the science and engineering of computation.
In lab experiments, soldiers wearing exoskeletons designed to improve physical performance reacted more slowly to visual cues.
Study finds shoebox-sized CubeSats gather weather data comparably to data collected by larger satellites.
Program users can tinker with landing and path planning scenarios to identify optimal landing sites for Mars rovers.
AeroAstro grad students win multi-university challenge by demonstrating the utility of machine vision in a complex system.
Measurement of an exoplanet transit demonstrates proof of concept that small spacecraft can perform high-precision photometry. | s3://commoncrawl/crawl-data/CC-MAIN-2020-45/segments/1603107890586.57/warc/CC-MAIN-20201026061044-20201026091044-00321.warc.gz | CC-MAIN-2020-45 | 881 | 8 |
https://docs.gec.io/gks/clusterlifecycle/openstackcredentials/ | code | It is possible to change the credentials that GKS uses to create Openstack resources. This could be required after you changed the password, or when you need to use a different account.
To change the credentials perform the following steps:
Navigate to the desired cluster.
Click the three dots, to open the cluster submenu.
Change the credentials.
Shortly after performing these steps, a confirmation message pops up, and the credentials have been changed successfully. | s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817688.24/warc/CC-MAIN-20240420214757-20240421004757-00087.warc.gz | CC-MAIN-2024-18 | 470 | 6 |
https://www.tenforums.com/installation-setup/57273-should-i-concerned-extra-cautious-10.html | code | Angels have the Phone Box
Guys, I think the best thing to do here, is disconnect all drives but the one SSD that we want W10 on. Then, boot to the W10 install media and clean install W10 on it. Just get W10 on the machine to grab the digital license. Once that's done, we can worry about everything else. We're running out of time for the free upgrade. If we can't get W10 clean installed on the extra SSD because of hardware incompatibility or lack of drivers, then we won't have to spend time on the upgrade, you know? | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280587.1/warc/CC-MAIN-20170116095120-00081-ip-10-171-10-70.ec2.internal.warc.gz | CC-MAIN-2017-04 | 520 | 2 |
http://pokerlabel.ru/Free+adult+cams+cam+sites+no+credit+card+group+tip/29126.html | code | Xxx chat room au - Free adult cams cam sites no credit card group tip
offers Free Adult Web Cams and Chat and is intended for adults over 18 only.
To establish some kind of friendship with a webcam girl.
To socialize inside an adult webcam community, and if possible to to watch him in free chat (free cam to cam).
From finger fucking to squirting, dildo action to foot fetish, camgirls are horny, live and ready to make you cum.
Do not miss the opportunity and enjoy a free webcam show!
free cam shows with the hottest webcam girls free live sex shows and video chat rooms!
Create your FREE nick and enjoy real LIVE sex shows with the hottest webcam girls!
Adult video chat and free public hardcore shows Get your Access to hundreds of free live sexcams, amateur, girls, couples, guys and shemale…
It might work if you plan to stick with it while making minor changes - mostly styles and colors.
Don't get fooled - use Social Engine, Jom Social, Drupal, etc instead.Tags: Adult Dating, affair dating, sex dating | s3://commoncrawl/crawl-data/CC-MAIN-2019-09/segments/1550247505838.65/warc/CC-MAIN-20190221152543-20190221174543-00450.warc.gz | CC-MAIN-2019-09 | 1,014 | 11 |
https://cce-wakata.blogspot.com/2014/02/inside-sausage-why-open-government.html | code | Why We Must Say What We Mean -Meaning It Creates Alignment
When we are clear about our values, thought processes, and rationale, our teams get a behind-the-scenes view of our choices. It is far easier for team members to align with a vision they fully understand.
Sometimes differing circumstances warrant differing responses. If I don't understand the how and why behind that, though, I might see nothing but hypocrisy.
And if I'm part of your team - a political staffer, for instance - what example are you setting for me to follow?
It may be true that the people don't want to see inside the sausage making process of politics, but they can't influence it otherwise, can they?
Even if you don't want the people engaged, there are consequences to closed-door policies. We're seeing them manifest themselves right now in Canada.
It's a good thing the solution's emerging, isn't it? | s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947473558.16/warc/CC-MAIN-20240221202132-20240221232132-00259.warc.gz | CC-MAIN-2024-10 | 882 | 7 |
https://www.experts-exchange.com/questions/10327566/duplicating-stdout-to-a-file-as-well.html | code | I'm writing my own shell, and need to be able to duplicate my output to stdout and a file at the same time for a forked process which then calls execve. To just change stdout to a file I know you do:
where outf is the open file. I'm not sure how to make it do both though... I tried:
tempf = dup(1);
to no avail.
Please help me shed light on this. | s3://commoncrawl/crawl-data/CC-MAIN-2018-05/segments/1516084887849.3/warc/CC-MAIN-20180119085553-20180119105553-00669.warc.gz | CC-MAIN-2018-05 | 347 | 5 |
https://www.gpspower.net/igo-primo-nextgen-software-wince/339411-igo-nextgen-wince-v-9-19-5-584533-a-3.html?s=fb13feea53dc594832d52b3ad1f2fbf6 | code | Hello to all. To remove battery icon put this in the sys.txt:
new link in post n5
I have installed on a china dubbel din works fine but the same software on a another china dubbel din not working.
After set the navi path the navigation dont start
Anybody have a idea?
If anyone happens to get a copy of this to work with the Aussie Q3 maps, please drop me a PM. Cheers.
I have loaded in my chinese hardware, its work, but unable navigate my current position, neither load maps, just light green basemap appears, I have loaded my FBL FDA and POI files on the folder, but never work, sometimes crashed and restart.
I then load iGO_Primo_2.4_v22.214.171.1249729 on SD card and its working good.
Please help about nextgen how to load my existing Pakistan.fbl files to nextgen
You need a license to run this software unlike igo primo, because till now it isn't fully cracked check this topic to find your country (I don't think you will find it )
[Only registered and activated users can see links. ]
for the fully cracked igo nextgen for Android only not Wince (doesn't require a license for each version of map ) you will find it here [Only registered and activated users can see links. ]
hi got igo next nextgen on my sat nav
i can i change the colour on the keyboard which is
on it now i can not see keyboard info with the colour
thaxx for help mokev
Thank you for your post, but all link are broken.... Is it possible to link functional again?
link in post n5 is ok, retry | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171758.35/warc/CC-MAIN-20170219104611-00177-ip-10-171-10-108.ec2.internal.warc.gz | CC-MAIN-2017-09 | 1,472 | 18 |
https://math.stackexchange.com/questions/3399247/how-can-multiple-geodesics-meet-at-the-boundary-on-a-hyperbolic-plane/3399618 | code | I thought on a hyperbolic plane all geodesics are lines/arcs across the plane whose endpoints are perpendicular to the boundary of the plane.
I've heard that all geodesics on a hyperbolic plane either
- intersect ("meet") once (somewhere in the middle of the plane)
- meet once at the boundary
- don't meet
How can two different geodesics meet at the boundary?
Drawing a line perpendicular to the boundary of a hyperbolic plane... why doesn't this lead to only a single unique geodesic for every point on the boundary? | s3://commoncrawl/crawl-data/CC-MAIN-2021-25/segments/1623487620971.25/warc/CC-MAIN-20210615084235-20210615114235-00038.warc.gz | CC-MAIN-2021-25 | 518 | 7 |
https://www.howtoforge.com/gnome_gdesklets | code | Displaying Weather And System Information On A GNOME Desktop With gDesklets
Author: Falko Timme
This tutorial shows how you can display weather forecasts, system information like CPU and memory usage, news feeds, music player controls, etc. on a GNOME desktop with gDesklets. gDesklets is a programm that can place small desktop widgets on top of the user's desktop.
I do not issue any guarantee that this will work for you!
1 Preliminary Note
This tutorial is based on Ubuntu 6.10 (Edgy Eft). However, this is important only for the gDesklets installation. The rest of the tutorial works the same on each other distribution (as long as you use the GNOME desktop).
2 Installing gDesklets
To install gDesklets, go to System > Administration > Synaptic Package Manager:
After Synaptic has started, you can either browse all packages to find the gDesklets package, or you use the Search function:
After you've found the gDesklets package, click on it and select Mark for Installation:
The package gdesklets-data will be marked for installation as a dependency of the gdesklets package (gdesklets-data contains lots of pre-configured desktop widgets):
Click on Apply to start the installation:
Click on Apply again:
The two packages are downloaded and installed:
After the installation you can close the Synaptic Package Manager: | s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764499646.23/warc/CC-MAIN-20230128153513-20230128183513-00352.warc.gz | CC-MAIN-2023-06 | 1,325 | 15 |
https://support.threattracksecurity.com/support/discussions/topics/1000059440 | code | VIpre Business should add some sort logging to be forward to a centralized SIEM solution
I am interested in this also. We are implementing a SIEM/Log Correlating Engine that wants me to point my log files to it. Can I do this with VIPRE?
I was told by support that Vipre does not do any syslog output and I am in the same boat with the SIEM solution. I am a professional service provider for a large SIEM vendor and so far Vipre is the only anti-virus vendor in the enterprise market that does not support syslog in some way. This is very important to companies that invest money into a SIEM solution that their products integrate with this solution.
I agree and we will be looking elsewhere this fall when our support expires.
I also have to maintain tremendous amounts of event data and perform correlation, with and without our SIEM. SOME form of data output such as syslog would be a tremendous enhancement. As more and more industries are finding themselves under the scrutiny of regulatory compliance bodies, this will become a "make or break" feature for many businesses, including the power and infrastructure, health, banking, and legal industries. It is a feature that should really be considered essential by any entity positioning itself as a security service provider in this day and age.
Any response from Threat Track? Do they monitor these forums?
Vipre does not generally respond to the feature request posts as they are just taken into consideration rather than answered. If you would like an answer, post in the Questions section and they tend to respond pretty quickly.
As long as they monitor...
On the logging front, the generally accepted solution for Microsoft environments is to process Event Logs via WMI, since that's where 99% of Windows apps log to. Yes, it's a pain (I used to Product Manage a SIEM solution, so I know how much of a pain), but Microsoft has steadfastly refused to implement syslog themselves, and most commercial SIEM solutions support WMI today.
We do generate some logs to the Windows Event Log, and customers are processing them there. For example, see: https://businesssupport.vipre.com/discussions/topics/1000078703
So this may be a solution for some folks today.
That said, we do plan to improve the logging capabilities within VIPRE, this is being tracked as PM-277.
And as for those who commented that they haven't seen a response, I can't speak to the actions of my predecessors but I intend to stay on top of all feature requests posted to this forum. Now that I know about them.
The only information logged to the Windows Event Log is definition update information. To remain competitive Vipre needs to provide syslog/SIEM support.
How can we as customers be informed, track these feature requests and be notified when they make it into a product release?
Tracking this as PM-277
This is getting a steadily higher importance in our security plan, thanks for taking it up. :)
For those asking for native syslog support, may I ask what you guys are doing to aggregate native Windows Event Log events today?
I'm still trying to understand why syslog is important on the Windows platform, do you folks not have solutions in place to capture endpoints' Windows logs? What do you do for other applications? | s3://commoncrawl/crawl-data/CC-MAIN-2020-34/segments/1596439738366.27/warc/CC-MAIN-20200808224308-20200809014308-00088.warc.gz | CC-MAIN-2020-34 | 3,258 | 19 |
http://api.haiku-os.org/HIG/chapter7.html | code | Table of Contents
With all this discussion, you may be beginning to think that having a well-designed program means that it is going to be boring to look at. You can definitely have it more interesting to look at than drying paint. There is plenty of freedom for creativity along with some suggestions to help get you started.
Your program's icon is one easy way to set it apart from the rest of the pack. BeOS-style icons follow one of two perspectives - flat and isometric. Flat icons look like a head-on view. Isometric icons "look down" on the icon from a point above and to the right of the object with angled lines being about 30 degrees from horizontal. A good icon can give your program a favorable and professional impression to people who otherwise doesn't know a thing about you or your program. Take some time to create or find a good-looking icon. Whatever you do, don't just slap together a shabby-looking icon. It would be better not provide an icon at all and rely on the system to show the default application icon than to have one which reflects poorly on your program's reputation. For more details on icon creation, consult the Haiku Icon Guidelines. | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368706628306/warc/CC-MAIN-20130516121708-00005-ip-10-60-113-184.ec2.internal.warc.gz | CC-MAIN-2013-20 | 1,170 | 3 |
http://www.java-gaming.org/index.php?action=recent;start=40 | code | I've published a new development snapshot:https://sourceforge.net/projects/jewelhunt/files/jewelhunt/r019/
Changes since v0.18:
- Improved visual feedback in combat.
- Fixed 'undying' invisible enemy bug.
- Added shadow effect for player character.
- Added wall mounted torches with a light effect.
- Changed pathfinding to use a thread pool instead of creating new thread instances for each path.
- Added frost nova spell effect.
- Added magic rod graphics and item data. They have no function yet, even if you might find one.
- Added a first draft of the rainbow temple map.
- Improved temple graphics. | s3://commoncrawl/crawl-data/CC-MAIN-2015-40/segments/1443736676547.12/warc/CC-MAIN-20151001215756-00244-ip-10-137-6-227.ec2.internal.warc.gz | CC-MAIN-2015-40 | 604 | 11 |
https://community.qlik.com/thread/139273 | code | To restrict the User pool login at different times - please use DMS Option. You can then authorize user documents to be viewed at certain time/day by different groups by choosing "Restricted' under authorization.
Session CAL's / Named CAL's can't be assigned to specific files/folders.
Hope this clarifies.
Not completely sure what you are trying to achieve, but let me write a few comments related to the topic that might get you in the right direction:
Make the split between CAL assignment and access to a document. You decide who has access to a document. As a separate activity decide if people get a Named or Document CAL assigned to them; Everyone who does not have a CAL assigned will be assigned a Session CAL when trying to open a document he has been granted access to.
So (assuming no dynamic CAL assignment):
You will decide who will get a Named CAL.
You will decide who will get a Document CAL.
Everyone else will use Session CALs.
You will decide per person or group of users which documents he is allowed to open.
Hope that helps you on your route to your answer. If not, please re-try to tell me what you are looking for.
Hi! thanks for the answer oknotsen
Here's what I'm trying to do:
I have clients, and each client has several projects. So i want to give the users to each project ONLY access to his or her project with Document CALs, also give the client administrator user access to ALL the client's projects, but only that client's projects.
That's why I'm asking if it is possible to give some users that will use SessionCALs only access to some of the documents or folders on the QV Server.
Or for what I'm trying to do what would you recommend?
EDIT: I re-read your answer, how do you do this "You decide who has access to a document." how do I give certain access to certain users?
Chris Brau wrote:
I re-read your answer, how do you do this "You decide who has access to a document." how do I give certain access to certain users?
Depend on the type of server you have.
If you have a Small Business Server, you can only do this via NTFS ("good old Windows" file access authorization). If you have an Enterprise Server, you can choose between NTFS and DMS ("QlikView authorization"). Also see the comment of Madhusudhan about DMS.
With both NTFS and DMS you should be able to organize which client (administrator) has access to which project.
Hope that helps. | s3://commoncrawl/crawl-data/CC-MAIN-2018-34/segments/1534221212768.50/warc/CC-MAIN-20180817182657-20180817202657-00034.warc.gz | CC-MAIN-2018-34 | 2,387 | 23 |
https://edlab.tc.columbia.edu/blog/10577-MakerBot-in-the-Classroom | code | MakerBot in the Classroom
Students in the Mechanical Engineering program at Brooklyn Technical High School, my alma mater, were recently featured for their use of MakerBot 3D printers in the classroom. It is also interesting to hear the instructor distinguish between verbal and tactile learners. Here is the link
to the video clip and story. | s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593655883439.15/warc/CC-MAIN-20200703215640-20200704005640-00267.warc.gz | CC-MAIN-2020-29 | 342 | 3 |
https://thesaurus.yourdictionary.com/disintegrate | code | Another word for disintegrate
To break up
break down, separate, atomize, dissolve, divide, dismantle, break into pieces, disunite, disperse, crumble, disband, fall apart, take apart, disorganize, detach, break apart, come apart, sever, disconnect, wash away, wear away, erode, fall to pieces, turn to dust, fade away, reduce to ashes; see also destroy 1, dissolve 1.
Another word for disintegrateverb
To reduce or become reduced to pieces or components:break down, break up, crumble, decompose, dissolve, fragment, fragmentize. See continue, help
To become or cause to become rotten or unsound:break down, decay, decompose, deteriorate, molder, putrefy, rot, spoil, taint, turn. Idioms: go bad, go to pot, go to seed. See better, thrive | s3://commoncrawl/crawl-data/CC-MAIN-2019-35/segments/1566027323328.16/warc/CC-MAIN-20190825105643-20190825131643-00450.warc.gz | CC-MAIN-2019-35 | 736 | 6 |
https://sourceforge.net/p/wistinga/news/2005/08/safarp-05-released/ | code | Safarp 0.5 has been released. Here is the change log :
+ added support for Windows Installer quiet and repair options
+ added "Frequency of use" and "Date last used" columns
+ columns are now configurable
+ the list can now be sorted by Program, Publisher, Size, Frequency of use and Date last used
* better search field changes handling
- the "Version" column was removed as it wasn't very useful. The Program's version is still displayed in the Details panel.
Note: This release was compiled with Visual C++ 6.0. As a result, the msvcp71.dll file is not required anymore. The required file is now msvcp60.dll, which is included with the OSes supported by Safarp. Moreover, the exe size is smaller :)
Log in to post a comment. | s3://commoncrawl/crawl-data/CC-MAIN-2018-05/segments/1516084889736.54/warc/CC-MAIN-20180120221621-20180121001621-00307.warc.gz | CC-MAIN-2018-05 | 727 | 9 |
http://www.sevenforums.com/gadgets/259740-lost-screen-gadgets-windows-7-a.html | code | I lost all of mine as well. Things were working smoothly until I had to make a move because my 30 day trial of the Sys.
Security Suite that came preinstalled on my new puter was about to expire. So, I did some house work. I ran Revo
uninstaller,then CCleaner and then ASC. Being without the security suite, I made sure that my Windows firewall and
Windows Defender were enabled, then downloaded and installed Microsoft Security Essentials(BTW, I still had ThreatFire
running). Everything went down hill from there. For two days I searched for a solution, tried all I read on the forums.
ever the batch files for the registry keys. Nothing worked. I gave up and did a system restore, back to the one that
Revo created. Then installed AVG. Back to normal. | s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386163949658/warc/CC-MAIN-20131204133229-00045-ip-10-33-133-15.ec2.internal.warc.gz | CC-MAIN-2013-48 | 753 | 7 |
https://www.sae.org/publications/technical-papers/content/922120/ | code | Development of a Robot Simulation and Off-Line Programming System 922120
In Toyota, a robot off-line programming system was developed five years ago for the use at spot welding processes. And it has been effective to reduce and level off the engineering time. This time we have developed the new robot simulation system. It has three newly features so that the system becomes capable of simulating and programming robots from various manufacturers with different functions. As a result, the new system can be applied to a variety of processes in automobile manufacturing.
First, a universal robot programming language was developed which includes a variety of commands such as definitions of motion attributes, signals of inputs/outputs, control of program flow, special functions proper to each process, and so on. And the language can be translated to and from any particular programming language using pre / post processor, so the simulation system needs to deal with only one language. Second, a universal inverse-kinematics transformation algorithm was developed which is able to transform the coordinates with respect to the world coordinate system to the joint angles of robots of any mechanical configurations. Therefore, it is no longer required to develop special inverse-kinematics transformation module for each robot structure. Third, a parameter table was developed in which dimensions of robot arms and mechanical configurations are defined. The configurations of the specific robot can be easily assigned by only setting the value of each item in this table.
As a result, we can use the system for various manufacturing processes such as spray painting, arc welding, material handling, and assembly. And engineering and programming time for those robotic systems is significantly reduced and its fluctuation is leveled off. | s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376823318.33/warc/CC-MAIN-20181210055518-20181210081018-00490.warc.gz | CC-MAIN-2018-51 | 1,839 | 4 |
https://www.sololearn.com/discuss/1357237/disconnect-from-the-target-vm | code | Disconnect from the target VM
in Android studio,what is the meaning of this ,how to solve?
https://stackoverflow.com/questions/tagged/android-studio ... is a good resource for Studio issues. There are ~47K questions on the topic, which you could narrow down in the search field by typing the exact error (or a reasonably unique portion of it).
Python — File Handling
Question is write a c program to print prime numbers up to n and print the largest number in array.
Achievements on Sololearn
Question - Java: Pyramid layers
Error in Program | s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500250.51/warc/CC-MAIN-20230205063441-20230205093441-00203.warc.gz | CC-MAIN-2023-06 | 543 | 8 |
http://the-minecraft-blog.com/post/56309234498 | code | Welcome to the Minecraft blog of Nathan (iamvishnu) and Heather (bravelittleninja).
Visit the Info and Servers page for more information about us and our servers.
Minecraft is copyright Mojang AB, with whom this site is not affiliated. Visit the official site here.
Amazing Minecraft Pixel Art by PMC user Franze
Pixel arty is always great but this is thinking outside the box I love it!
Hou da hora | s3://commoncrawl/crawl-data/CC-MAIN-2014-41/segments/1410657137145.1/warc/CC-MAIN-20140914011217-00068-ip-10-234-18-248.ec2.internal.warc.gz | CC-MAIN-2014-41 | 399 | 6 |
https://ox-edu.uk/2021/11/07/linux-ubuntu-e-learning/ | code | Linux Ubuntu E-Learning
Ubuntu Linux Virtual Tutorial: One of the different types of Linux distribution based on Debian distribution. The word Ubuntu is an African word meaning “humanity over others”. Ubuntu is one of the user-friendly distributions and is growing very well among Windows users. Among its advantages, we can mention the relatively good support of all world languages, such as Persian. Unlike Windows, which is a commercial product, Linux is an open source product and has been developed to expand the use of computers.
In general, Ubuntu is better known as a great desktop product (desktop management) than as a server. Ubuntu desktop distribution is known as a powerful product and free operating system. This distribution is supported in two ways: Community, Professional, and Commercial. Ubuntu desktop design uses Gnome, which is one of the most famous Linux desktops. Extensive use of the sudo tool is one of Ubuntu’s emphasis, allowing users to perform their management responsibilities without a superuser meeting. Ubuntu is based on the GNOME desktop, and in addition, other useful software such as the Mozilla Firefox web browser and LibreOffice is included with Ubuntu.
It’s hard to say what will happen to ubuntu, but ubuntu continues to play a major role in the world’s technologies. Ubuntu has always been interested in cloud computing and continues to thrive. Ubuntu is also in the field of artificial intelligence and machine learning. Ubuntu has a special version of the Internet of Things called Ubuntu Core, which is still evolving. Since IBM took over the Linux Red Hat distribution, Canonical, the developer of Ubuntu, is the largest independent Linux company.
Benefits of Ubuntu Linux Virtual Training Course:
1- Simple and user-friendly work environment
2- High security
3- Compatibility with most hardware.
4- Debian base
5- It has different versions for tablets, smartphones, personal computers, and…
6- Simple installation with installation guide
7- Full support
8- Ability to install third-party software
9- Benefiting from the complete package of pre-installed software
10- Lightness and no need for powerful hardware
11- Benefiting from various writings
- Support for most of the world’s living languages
13- Being open source and free supply
What you will learn in the Ubuntu Linux Virtual Tutorial:
- You will learn what Linux is
- Install Ubuntu Linux
- Working on the command line and why the command line interface is so simple yet powerful
- Configure and secure remote access with SSH
- Server security, ufw, proper updates and upgrades
- Stop bad guys with Fail2ban
- Nginx web server installation and security
- Manage users and groups
- Learn how to use the Linux file system
Who is eligible for the Ubuntu Linux Virtual Training Course:
- You are interested in learning Linux
- You have little experience with Ubuntu
- You want to learn how Linux can fit into your life and work
- You want to be comfortable with the power and flexibility of Linux
Prerequisites for this course:
- You must have access to Microsoft Windows, MAC OS X or Linux computers.
- Some computer skills, such as using a basic keyboard, what a hard drive is, and what RAM is.
- To download Ubuntu, you no longer need an additional computer to pass this course. | s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947473370.18/warc/CC-MAIN-20240221034447-20240221064447-00826.warc.gz | CC-MAIN-2024-10 | 3,302 | 37 |
https://www.builtinchicago.org/2018/05/14/peak6-cto-palak-jain | code | As a trading firm with strategies rooted firmly in technology, PEAK6 encourages its team members to explore areas of interest across every facet of the business.
For some engineers, that means learning the ins and outs of trading. For Palak Jain, the road to the chief technology officer position involved working with recent college grads on career development and collaborating with senior leadership on the trading firm’s tech strategy.
We spoke with Jain about her career path, PEAK6’s technological evolution and what the firm looks for when hiring for its tech team.
You started your career as a PEAK6 engineer in 2009. Now you’re the CTO. What’s that journey been like?
PEAK6 was my first job out of college. As a software engineer, I got the opportunity to build sophisticated trading applications for different PEAK6 businesses. I soon started taking more ownership of bigger projects, which led into a tech lead role.
About five years ago, I started mentoring our recent college hires and chose to invest more time in their career growth. As the technology team grew, my role started to expand and I found myself partnering with other senior leaders to set strategic and technical direction for the organization. While my passion to grow the team and technology might have led me to the CTO position, I’m grateful for the support from my team and senior leadership that encouraged me to take on this new level of responsibility.
Mobility within the firm is the norm, not the exception.”
How has PEAK6’s technology evolved in that time?
We were a complete Windows .Net/C++ shop up until six years ago. Our technology has evolved a lot since then, and I can proudly say we have some cool, innovative tech that sets us apart from other fintech firms. For example, it’s pretty uncommon for a trading firm to have their execution system written in Java or to have production systems written in Golang.
PEAK6 puts an emphasis on letting engineers move around within the organization. Why is that?
Why not? Engineers are curious by nature and like to challenge themselves. We hire smart, versatile talent and we want to ensure that there are learning opportunities in house so that employees can grow holistically. It’s also a great way to cross-share knowledge among different teams.
Mobility within the firm is the norm, not the exception. Employees have the opportunity to join different projects and teams within the firm, as well as explore areas on the investment side of the business. This can help them broaden their knowledge and skills, and in many cases discover new passions and talents.
What do you look for in new hires?
Of course we evaluate technical skills, but the number one requirement we look for in candidates is that they’re culture fits. At PEAK6, we live and breathe our core values around collaboration, grit, ownership and adaptability. Having a passion for technology and continuous learning is also huge, because it’s essential for our employees to understand how the technologies we use or want to use fit into our projects and environment.
Additionally, the ability to problem solve and navigate ambiguity in a fast-paced environment is important. We look for employees who embrace change and can leverage their resources — and yes, that sometimes means Google — to drive products forward and make an impact. | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572198.93/warc/CC-MAIN-20220815175725-20220815205725-00490.warc.gz | CC-MAIN-2022-33 | 3,368 | 15 |
https://docs.osano.com/hc/en-us/articles/22471473305108-Installing-Osano-in-Next-js-Applications | code | In Osano, the "Get Code" button will become active after creating and publishing your configuration. This button will provide you with the osano.js.
In your Next.js application, navigate to _document.js. copy and paste your Osano script tag into the <head>. This allows the Osano Consent Manager to be loaded on every page of your application. For compliance purposes, ensure that the osano.js is the first script that loads on your site.
Note: Consider using the beforeInteractive attribute. Scripts with beforeInteractive will always be injected inside the head of the HTML document regardless of where it's placed in _document.js. Read more about Next.js and loading priority here.
User_id / Customer_id
Once added and saved, run the application, inspect and check. You will see the script added inside the head tag.
Important: The Osano.js should be placed without any async or defer attributes. Compliance cannot be guaranteed when using the attributes above.
Once the osano.js is in your site's <head>, it will begin identifying scripts and cookies that exist on your site. This process can take a few minutes to a few hours, depending on the level of site traffic.
Important: Remember, the osano.js defaults to "Listener" mode. In Listener mode, the consent manager will NOT block any trackers and will NOT display dialogs to your visitors. You can use Osano in "Listener" mode and another CMP simultaneously if you migrate away from another provider. This way, there are no gaps in compliance.
Once you have collected enough reports from osano.js, you can work with your other business units to identify and classify all cookies/scripts/and local storage items. This exercise ensures that no "strictly necessary" scripts, cookies, or local storage get blocked.
We recommend that users remain in "Listener" mode until you have discovered and classified all relevant scripts and cookies.
After you have appropriately categorized each script and cookie, you can enable Permissive or Strict Mode and publish these changes.
You will now see the consent dialog on your website! | s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817253.5/warc/CC-MAIN-20240419013002-20240419043002-00112.warc.gz | CC-MAIN-2024-18 | 2,079 | 12 |
http://javahonk.com/difference-unique-non-unique-indexes/ | code | Difference Unique non unique indexes
This details is only for interview purpose to take a look before you jump for interview:
These two indexes are basically help to maintain data integrity by ensuring that no two rows of the data in the table has identical key values.
If you create unique index on existing table with data then the values in columns or expressions which comprise index key are checked for the uniqueness. If table contains rows with duplicate key then the index creation process will fail. When unique index is defined on the table then uniqueness will enforced whenever keys are added or changed within index. This enforcement is includes update, load, import, insert and set integrity etc. In addition uniqueness of data values, the unique index could also used to improve data retrieval operation performance during query processing.
On other side Non unique indexes are not used to enforce constraints on tables wherever they are associated. Although, non-unique indexes are used only to improve query performance by maintaining sorted order of data values that used frequently.
Excluding and Including NULL keys:
Non-Unique and unique indexes can be created so that key is not inserted into the index object, if all the columns or expressions of key are null. Although excluding the null keys could be result in improved storage and performance optimization in many cases where you don’t queries to access data associated with null keys. For unique indexes, enforcement of uniqueness of table data ignores rows where the index key is null.
Differences between unique key or primary key constraints and unique indexes:
There is no significant difference between the unique key or primary key constraint and unique index. To implement concept of the primary and unique key constraints, database manager uses combination of a unique index and the NOT NULL constraint. So that, unique indexes don’t enforce primary key constraints by themselves because they allow null values. Null values represent unknown values when it comes to indexing, null value is treated equal to other null values. So that if unique index consists of single column then only one null value is allowed, more than one null value would violate unique constraint. Also, if unique index consists of the multiple columns then specific combination of values and nulls could be used only one at time. | s3://commoncrawl/crawl-data/CC-MAIN-2018-09/segments/1518891817523.0/warc/CC-MAIN-20180225225657-20180226005657-00090.warc.gz | CC-MAIN-2018-09 | 2,392 | 9 |
http://www.computing.net/answers/windows-xp/unable-to-load-component/170925.html | code | |Recently I have been having a problem with my computer. I keep getting various error messages with the subject heading:|
"Unable to load component"
Then the message that follows says:
"The application has failed to start because .dll was not found. Re-installing the application may help fix this problem."
Now, people might think that I omitted the filename that precedes "dll", but I didn't; that's all it said. Anyway, after the message, the program usually starts anyway, but it's still frustrating. I have up-to-date and running registry, virus and malware protection, and I am very knowledgeable about computers, but even I can't figure this out. | s3://commoncrawl/crawl-data/CC-MAIN-2016-18/segments/1461860111374.13/warc/CC-MAIN-20160428161511-00097-ip-10-239-7-51.ec2.internal.warc.gz | CC-MAIN-2016-18 | 653 | 5 |
https://root-forum.cern.ch/t/how-to-write-some-static-data-that-does-not-change-into-a-ttree/40377 | code | I did a quick search and did not find an example.
I would like to write some data - basically, metadata such as string of comments, array of calibration constants, and some constants that define run configuration and do not change, but they are needed when the tree is analyzed so I would look those up in that meta data section.
Please point me to an example Could not find it! Thanks!
I.m not sure I understand what you’re asking for… Could you elaborate a bit?
I have a few dozen calibration constants that I multiply the data counts to get some sensible physical units in each channel. I don’t want to drag and write those copies of that array in each event. I would want to have an array of them written once at the beginning and just have it in the tree to address it when I process each event and do the multiplications necessary.
It is really a newbie thing - honestly, I have not worked with ROOT in several years now… forgot it all.
If you didn’t find any example in the ROOT primer, or in the tutorials, nothing in this collection of ROOT courses, or any post on this forum, then maybe @pcanal can give you some hints
If I say, write an object once, i.e. outside of the events loop, in its separate branch, that is probably what I want, right?
Say, how do you write a run number? The whole tree is for a single run. It is not smart to write it in every event, right? So I guess i can make another class, say, metadata() and write it once, tree->Write() outsire of the loop… right?
Thanks for trying to help.
Sure, you can write a meta data class once in the file next to the tree. You can write anything in a ROOT file
Thank you guys! It was shockingly easier than I had thought
Really appreciate your responses.
I will create an example and post it here for the folks such as myself… soon! | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573744.90/warc/CC-MAIN-20220819161440-20220819191440-00799.warc.gz | CC-MAIN-2022-33 | 1,815 | 14 |
https://discuss.dgraph.io/t/regarding-very-less-throughput-in-dgraph/6865 | code | Hi, We have setup a 3 node cluster for dgraph - (12 CPU’s, 13GB RAM - all disks are SSD’s).
But Throughput is very very less while writing the data to dgraph.
We are following below steps to update data in dgraph -
1)Check if a particular subject/Object exists or not - if yes get the uid’s
2)Update the attributes of the subject/object and if not exist - create the subject & object
3)Check if a predicate exists - if yes get its facets.
4)Update the predicate with the new facets.
The throughput for the above is 2K/min which is very very less. Not sure of what are we missing here. Can someone please help here.
Total data size is ~5GB only. (we added the same in 12-hour window via streaming process)
Also, at times we have faced multiple issues due to which we had to clean and re-install the dgraph setup :
1)Caused by: io.grpc.StatusRuntimeException: UNKNOWN: Uid: cannot be greater than lease:
2)io.dgraph.DgraphException: startTs mismatch (Ludicrous option was set when we got this issue)
3)message": “: cannot retrieve postings from list with key 0: readTs: 1539081 less than minTs: 3702387 for key:”",
4)At times CPU is 100% when nothing is none of the query or mutation is running in dgraph.
5) message": “: cannot retrieve postings from list with key 0: readTs: 1539081 less than minTs: 3702387 for key:”",
While proposing delta with MaxAssigned: 3710010 and num txns: 1179163. Error=Server overloaded with pending proposals. Please retry later. Retrying… | s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593655937797.57/warc/CC-MAIN-20200711192914-20200711222914-00188.warc.gz | CC-MAIN-2020-29 | 1,486 | 16 |
https://www.essays.se/essay/ca178ac5d5/ | code | Distributed system simulation with host-based target offloading
Abstract: Scaling of TLM (Transaction Level Modeling) simulations for performance is difficult. In this project I will go through several causes of poor performance. This paper describes several simulation engines that use SystemC that are connected so they together simulate next generation radio base station. It also describes how to build a virtual network in, for security reasons, constrained environment where both virtual and physical equipment can connect the simulated target. Furthermore, it describes how to use the virtual network to improve the overall performance of the simulation. It is shown how the virtual network is used to distribute the simulation and offloading the simulated target to accomplish the performance goal.
AT THIS PAGE YOU CAN DOWNLOAD THE WHOLE ESSAY. (follow the link to the next page) | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572089.53/warc/CC-MAIN-20220814234405-20220815024405-00577.warc.gz | CC-MAIN-2022-33 | 888 | 3 |
https://community.linuxmint.com/iso/view/680 | code | I can confirm, this installer, on a blank hard disk, booted in legacy mode, does indeed use GPT partitioning and Bios-Boot-Partition, even if the disk is under 2^32 sectors (i.e. less than 2TB with normal 512byte logical sectors on the interface).
This is problematic, as some legacy non-EFI-bootable systems (I noticed on "Intel Desktop Board" systems I think) -- require a 'bootable' partition in the MBR, not just the 55AA on last 2 bytes. It may be they could put in hybrid-mbr-entry for the bios-boot-partition to be listed in the MBR table (and marked 'bootable') as well as the GPT table, or otherwise put the '80' boot flag for the last MBR entry (not really in use). You must not set the GPT protective container entry in MBR as bootable, as some EFI/OS will not consider this a valid GPT disk.
The 'simplest' workaround for those affected, is to manually partition the disk as MBR, even if it still has an EFI-system-partition type 0xEF and a linux EXT4 partition to boot from.
This is the same situation as the 3-way-bootable linuxmint install-iso, MBR partitioning with active partition, GRUB on MBR, ESP 0xEF, and DVD no-emulation-bootable as well.
This will need thinking about for release-notes, or so.
(less important now) Clem: better solution confirmed for memtest, install 'pcmemtest' 22.04 package and those files for your boot images from beta:-
Use "linux /boot/pcmemtest.bin" for non-UEFI memtest [I find this works on more older systems than memtest86+]
Use "linuxefi /boot/pcmemtestx64.efi" for UEFI memtest [WORKS in common 64bit EFI booting!]
cinnamon-settings sound module test window broken (shows all possible speakers instead of what you have).
Direct launch of accessibility settings from menu broken (fixed in cinnamon git)
I can confirm this installer (even booted in legacy mode) does indeed create ESP [EFI system partition] on existing Legacy multi-boots, but nonetheless works both for legacy-booting and for EFI-booting . I think this is overall a positive change providing forward/backward compatibility, subject to caveat below.
The release notes may want to explain this can cause some systems to EFI-boot when they wouldn't before, and potentially prevent multi-booting into a non-EFI-capable legacy OS [e.g. netbook I have here always prefers ESP over any legacy booting unless Esc-key tapped for boot menu every time, no matter what you do in BIOS-settings], even if you change the partition-type from 0xEF to 0xC ... it still finds and EFI-boots it!.
#045: repository keys: Not a show stopper but just wanted to point out the warning message. "Warning: apt-key is deprecated. Manage keyring files in trusted.gpg.d instead (see apt-key(8))." Everything else was fine. | s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474649.44/warc/CC-MAIN-20240225234904-20240226024904-00221.warc.gz | CC-MAIN-2024-10 | 2,712 | 13 |
http://aracer.mobi/guides/oracle-soa-suite-11g-developer-guide-pdf-8451.php | code | 4 days ago Developer's Guide for Oracle SOA Suite. 11g Release 1 (). E August Documentation for developers that describes. Oracle Fusion Middleware Developer's Guide for Oracle SOA Suite, 11g Sensors and Oracle Enterprise Manager 11g Application Server. Suite Developer's Guide, Packt Publishing and Oracle SOA Suite 11g R1 Developer's aracer.mobi -.
|Language:||English, Spanish, Hindi|
|Distribution:||Free* [*Registration needed]|
Oracle SOA Suite 11g R1. Developer's Guide. Develop Service-Oriented Architecture Solutions with the Oracle SOA Suite. Antony Reynolds. Certain pages from this book are designed for use in a group setting and. Chapter 1. Creativity and Problem Solving. Oracle SOA Suite 11g R1 Developer's. Oracle Business Process. Management Suite, 11g Release 1 () Fusion Middleware Developer's Guide for Oracle SOA Suite. What Is Oracle.
Answering this question is the goal of the next section. Using a working example of an online auction site oBay , it leads you through key SOA design considerations in implementing a robust solution that is designed for change.
The final section addresses non-functional considerations and covers the packaging, deployment, and testing of SOA applications. It then details how to secure and administer SOA applications. Addict in the House: Advanced Computer Science and Information Technology: Advances in Multimedia Information Systems: AIDS in Europe: Always Hungry?: Angels And Miracles: Applied Game Theory: Applied Reconfigurable Computing.
Architectures, Tools, and Applications: Artificial Life and Computational Intelligence: Asterisk Cookbook: Astrology Decoded: Atkins Diabetes Revolution: Atkins, M. Beyond Knowing: Blockchain for Enterprise: Boulders and Butterflies: Boundless Healing: Brain Hacks: CakePHP 1.
Paul Benjamin. Revised and Expanded Edition: Changing the Game Plan: Chasing the Shark: Classification and Learning Using Genetic Algorithms: Clean Skin from Within: International Conference,Santander, Spain, June , Cooperative Environments for Distributed Systems Engineering: Coping with Chronic Heartburn: Could it be Dementia?: Data Analytics for IT Networks: Destination Truth: Detoxify Yourself: A True Lifestyle Detox: Developing Supersensible Perception: Earthbound Spirits: Can You See Them?
Elastic Beanstalk: Enterprise Development with Flex: Enterprise System Architectures: Douglas M. Feel The Fear Power Planner: Formal Approaches to Software Testing: Formal Methods: Foundations and Applications: Foundations of Software Science and Computation Structures: Freedom from Pain: Getting Things Done: Gluteus to the Maximus - Base Training: Build a Bigger Butt Now! Head First Design Patterns: High Intensity Fitness Revolution for Men: High Tech Trash: Home Automation: Hope for the Broken-Hearted: How to Get There from Here Ronald D.
How to Remember Equations and Formulae: How to Talk to Angels: I Wonder Why: I Am Always Broke? Daniel Wagner. All rights reserved. Except as expressly permitted in your license agreement or allowed by law, you may not use, copy, reproduce, translate, broadcast, modify, license, transmit, distribute, exhibit, perform, publish, or display any part, in any form, or by any means. Reverse engineering, disassembly, or decompilation of this software, unless required by law for interoperability, is prohibited.
The information contained herein is subject to change without notice and is not warranted to be error-free. If you find any errors, please report them to us in writing.
If this is software or related documentation that is delivered to the U. Government or anyone licensing it on behalf of the U. Attribute values for bindings e.
Any properties in JCA adapter files. Policy references for Service and Reference binding components. Metadata deployed on the runtime server will include environment-specific values.
Replaces any token in the composite.
Only host, port, and protocol at the ws. Metadata deployed on the runtime server will not include environment-specific values.
In a clustered environment, global token variable changes are made on the administration server and propagated to all managed servers. You can still access audit and flow trace details of the instances 38 39 Managing Deployed Composites Redeploy Examples 12c 1. Audit trail has old process execution New instances will show new process execution 2.
No new messages are processed. | s3://commoncrawl/crawl-data/CC-MAIN-2019-51/segments/1575540536855.78/warc/CC-MAIN-20191212023648-20191212051648-00164.warc.gz | CC-MAIN-2019-51 | 4,394 | 17 |
http://www.aeriagames.com/forums/en/viewtopic.php?t=1825399 | code | After you play a game, you should be able to see "Save" in the game lobby after the game is finished. It can be found beside the 'Ready, Kick, Inventory' buttons. After you click save, it will ask you to write a memo so you can remember what the replay is for and whatnot. You don't have to write a memo, it's just there so you can remember what the replay is about whenever you want to watch it.
To watch your saved replays, you click the replay button on the top right beside configuration and then choose a file and click play. | s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917123276.44/warc/CC-MAIN-20170423031203-00231-ip-10-145-167-34.ec2.internal.warc.gz | CC-MAIN-2017-17 | 530 | 2 |
https://legacy.forums.gravityhelp.com/topic/custom-form-for-interior-designers | code | I'm trying to create a "request a quote" from - similar to this that has 5 rows for Room, Quantity, Width, Height and Quantity. Is is possible to re-create this with Gravity Forms?
Sure, you can recreate it with Gravity Forms but the layout is going to require a bit of custom CSS work to get it done. You'll have to target all the elements to float them into the single line layouts to emulate the grid.
It's a little work, but can be done if you want to invest a little time to pull it off.
Thanks Kevin, maybe I can make the form simpler for the client without having to play with the CSS. | s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662562106.58/warc/CC-MAIN-20220523224456-20220524014456-00176.warc.gz | CC-MAIN-2022-21 | 592 | 4 |
https://www.linux.com/manpage/man3/fgetws.3.html | code | Manpage of FGETWS
FGETWSSection: Linux Programmer's Manual (3)
NAMEfgetws - read a wide-character string from a FILE stream
#include <wchar.h>wchar_t *fgetws(wchar_t *ws, int n, FILE *stream);
DESCRIPTIONThe fgetws() function is the wide-character equivalent of the fgets(3) function. It reads a string of at most n-1 wide characters into the wide-character array pointed to by ws, and adds a terminating null wide character (Laq\0aq). It stops reading wide characters after it has encountered and stored a newline wide character. It also stops when end of stream is reached.
The programmer must ensure that there is room for at least n wide characters at ws.
For a nonlocking counterpart, see unlocked_stdio(3).
RETURN VALUEThe fgetws() function, if successful, returns ws. If end of stream was already reached or if an error occurred, it returns NULL.
ATTRIBUTESFor an explanation of the terms used in this section, see attributes(7).
CONFORMING TOPOSIX.1-2001, POSIX.1-2008, C99.
NOTESThe behavior of fgetws() depends on the LC_CTYPEcategory of the current locale.
In the absence of additional information passed to the fopen(3) call, it is reasonable to expect that fgetws() will actually read a multibyte string from the stream and then convert it to a wide-character string.
SEE ALSOfgetwc(3), unlocked_stdio(3)
This document was created by man2html, using the manual pages.
Time: 16:30:19 GMT, March 14, 2017 Click Here! | s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917126237.56/warc/CC-MAIN-20170423031206-00641-ip-10-145-167-34.ec2.internal.warc.gz | CC-MAIN-2017-17 | 1,427 | 15 |
https://supportforums.cisco.com/discussion/10475456/cisco-unified-video-advantage-and-cisco-vt-camera-vista | code | Is it supported configuration?
CUVA setup doesn't contains Cisco VT drivers, so camera is not detected.
Works fine for me.
Only certain versions include the VT camera drivers... I think the most recent one that does is the 2.1(1) version. The maintenance releases after that do not appear to have the driver installer included in the ZIP archive... Presumably because the camera drivers themselves have not changed. | s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988725470.56/warc/CC-MAIN-20161020183845-00557-ip-10-171-6-4.ec2.internal.warc.gz | CC-MAIN-2016-44 | 415 | 4 |
https://forums.developer.nvidia.com/t/keeping-an-array-in-gpu-memory/131893 | code | I have a question about sending constant data to the gpu’s memory. I have 100 Mb array and I would like to keep it in the gpu’s memory because this array does not change. Is there something similar to heap memory for GPU where we can store arrays for the whole duration of the code?
Thank you for you help!
In the 10.4 release we added support for allocatable device arrays to CUDA Fortran module data. Device module data is global to all device routines in the module and persists for the lifetime of the module. This might be your best option. Constant memory would be faster to access then the device’s global memory, but 100Mb is too big for constant memory.
Hope this helps, | s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656103639050.36/warc/CC-MAIN-20220629115352-20220629145352-00736.warc.gz | CC-MAIN-2022-27 | 685 | 4 |
https://academia.stackexchange.com/questions/14426/how-to-mention-failed-final-year-thesis-in-sop | code | I am an undergraduate intending to apply to an American graduate program. In my SOP, I decided to write one paragraph about my final year thesis. However, the truth is that I failed to propose something new in my final year thesis. The only positive things, I believe, is that I have found related papers quickly without any guidance.
I hope to talk positively about this experience. Is it positive to mention that "I have found papers quickly?" And how to mention such a "failed" final year thesis in SOP?
More background information:
Field: graph theory
My supervisor was busy and he did not spend much time discussing the topic with me or teaching me about it. I have a problem understanding papers that are somewhat concise. At last, I had no choice but to change my topic. He only described the topic, did not give any references to read. I found the references by myself, which were exactly what he wished me to read. The time is limited and hence I do not propose many new things in my final year thesis. | s3://commoncrawl/crawl-data/CC-MAIN-2021-39/segments/1631780060803.2/warc/CC-MAIN-20210928122846-20210928152846-00578.warc.gz | CC-MAIN-2021-39 | 1,011 | 5 |
https://github.com/cityofaustin/open-data-manual | code | City of Austin Open Data Manual
about this repo
This repo is the central collaboration hub for managing the City of Austin's Open Data Manual. It hosts the content of the Open Data Manual, tracks to-do list items, and explains how the manual works.
To keep the manual updated and accessible, we do the following:
- Write and update the information in the manual
- Perform technical work to keep the manual website functioning
- Teach people how to help us do these two things
current projects include (get involved!)
- create a dashboard that shows where we're at in developing the open data manual
how to edit the manual
recommend changes to the manual
Anyone can do this. Currently, there are two ways to recommend changes:
- Submit a suggestion to our issue queue by clicking here.
- By submitting a pull request which contains the suggested changes. For a description of what it means to deliver a pull request using GitHub, click here.
how to make quick edits
how to make major changes
The Open Data Manual documentation is written in reStructured text markup and converted to HTML by a documentation generator called Sphinx.
The HTML generated by Sphinx is served by readthedocs.org. Readthedocs.org watches the
master branch of this repo. When changes are detected, readthedocs.org will re-build the open data manual using Sphinx and publish the updated site to http://open-data-manual.readthedocs.io
More details and step by step instructions for forking this repo and developing locally using Sphinx will be added to the wiki, hopefully sooner rather than later. | s3://commoncrawl/crawl-data/CC-MAIN-2018-30/segments/1531676594018.55/warc/CC-MAIN-20180722213610-20180722233610-00112.warc.gz | CC-MAIN-2018-30 | 1,571 | 20 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.