url
stringlengths 13
4.35k
| tag
stringclasses 1
value | text
stringlengths 109
628k
| file_path
stringlengths 109
155
| dump
stringclasses 96
values | file_size_in_byte
int64 112
630k
| line_count
int64 1
3.76k
|
---|---|---|---|---|---|---|
https://cdm.link/tag/command-line/ | code | Video, audio, convert, extract – once, these tasks were easy with QuickTime Pro, but now it’s gone. ffmpeg to the rescue – any OS, no money required.Read more
What’s the sound of a computer program running? Normally, nothing – the number crunching that takes place as software allocates memory forms patterns, but not ones that might immediately make sense of sound. “malloc” is a C function that allocates memory in which code executes. But a simple hack takes the output of a compiler, […]
brings together the latest breaking news on music, technology, gear, and live visuals. Got a project, found a news tip, or want to share your product? Submit to us directly. | s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224656737.96/warc/CC-MAIN-20230609132648-20230609162648-00001.warc.gz | CC-MAIN-2023-23 | 681 | 3 |
https://forum.babylonjs.com/t/drawing-lines-for-debugging-positions/6475 | code | Yo @aFalcon … Bro Not ignored… Just not applicable …
First Thing… I use the Babylon Toolkit Editor Workflow. So most of the stuff i do is RE-IMPLEMENTING some kind of Unity Functionality for Babylon.
In this case… Its a Catmull Rom Waypoint system… For Catmull Rom style of control point placement… Rotation is not such a factor. Rotation of the control point may be be more of an issue using bezier or something else… But i am basically using Catmull with various resolutions.
Unity Shot of my Waypoint Manager component that uses native Unity Tooling and Gizmos to DRAW/EDIT waypoints and create catmull rom paths in between the control points… All done using the simple native unity api and workflow:
Resolution Count: 1
And my picture perfect re-production of the unity scene with control points and catmull rom calculated paths… All done using native BabylonJS code via BABYLON.ScriptComponents…
And Unity Shot with higher and smoother catmull rom path
Resolution Count: 20
And BabylonJS Reproduction:
Catmull Rom calculated paths only really give shit about positions… Rotations dont really matter in this case.
FYI… My WaypointManager script component ALSO tracking the original control point transforms. So i have access to the rotation for the control point. If i ever need it.
NOTE: My little chase rabbit LOOKS AT each control point position and TRANSLATES along the Z-Axis… That how i smoothly move the chase rabbit along the racing path. But again… The control points rotations are not needed here either.
But Bro… Please dont stop sharing | s3://commoncrawl/crawl-data/CC-MAIN-2020-45/segments/1603107910204.90/warc/CC-MAIN-20201030093118-20201030123118-00647.warc.gz | CC-MAIN-2020-45 | 1,584 | 13 |
http://forums.linuxmint.com/viewtopic.php?p=692234 | code | I am unable to log on to my computer. I currently have it set it up so that it just auto logs on when I power it up, but if I log out and try to log back on it doesn't work; it goes half way through the log on process but then it just loops back to the log in screen. It was working normally with just my SSD hard drive but when I connected a traditional hard drive in addition to the SSD, and that's when the log in stopped working. The computer is completely usable the way I have it set up, but there is clearly something wrong. I appreciate any help that you could give. Thanks. | s3://commoncrawl/crawl-data/CC-MAIN-2016-07/segments/1454701165302.57/warc/CC-MAIN-20160205193925-00348-ip-10-236-182-209.ec2.internal.warc.gz | CC-MAIN-2016-07 | 582 | 1 |
https://gis.stackexchange.com/questions/122897/using-python-to-batch-process-lasclip-lastools-qgis | code | I am trying to use the python console to batch quite a few processes from lastools. I'm having trouble with the arguments to
clipped_las = processing.runalg('lidartools:lasclip', True, flight_las, clipper, False, 0, 0, outputname)
Wrong number of parameters . . . OPERATION(what to do with points) 0 - clip 1 - classify
But I told it to "0" (in the 5th argument) i.e., clip.
I guess I don't understand what ParameterSelection, the type (?) associated with OPERATION is. I don't want to make this a tool with parameters, just want to run it once with the parameters specified in the code.
What ought to go in that 5th spot? | s3://commoncrawl/crawl-data/CC-MAIN-2020-34/segments/1596439737238.53/warc/CC-MAIN-20200808021257-20200808051257-00044.warc.gz | CC-MAIN-2020-34 | 622 | 6 |
https://open.library.ubc.ca/cIRcle/collections/48630/items/1.0387110 | code | BIRS Workshop Lecture Videos
Leader cells in collective chemotaxis: optimality and tradeoffs Camley, Brian
Clusters of cells can work together in order to follow a signal gradient, chemotaxing even when single cells do not. This behavior is robust over many cell types and many signals, including gradients of extracellular matrix stiffness (durotaxis) and electrical potential (galvanotaxis). Cells in different regions of collectively migrating neural crest streams show different gene expression profiles, suggesting that cells may specialize to leader and follower roles in collective chemotaxis. We use a simple mathematical model to understand when this specialization would be advantageous. In our model, leader cells sense the gradient with an accuracy that depends on the kinetics of ligand-receptor binding while follower cells attempt to follow the cluster's direction with a finite error. Intuitively, specialization into leaders and followers should be optimal when a few cells have much more information than the rest of the cluster, such as in the presence of a sharp transition from one chemical concentration to another. We do find this - but also find that high levels of specialization can be optimal in the opposite limit of a very shallow gradient. This occurs because in a sufficiently shallow gradient, each leader cell has such little information about the gradient direction that - after a sufficient number of leaders are created - adding leader cells adds more noise to the cluster motion than adding a follower cell. There is also an important tradeoff: clusters have to choose between speed in following a gradient and ability to reorient quickly. We find that clusters with only a few leaders can take orders of magnitude more time to reorient than all-leader clusters.
Item Citations and Data
Attribution-NonCommercial-NoDerivatives 4.0 International | s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662531352.50/warc/CC-MAIN-20220520030533-20220520060533-00155.warc.gz | CC-MAIN-2022-21 | 1,881 | 5 |
https://root-forum.cern.ch/t/visualization-of-3d-objects/50724 | code | I just started working with 3D objects in ROOT and I could use an advice on how to approach the task at hand. In my ROOT-based GUI app I want to draw model of a 4pi detector made out of irregular pentagonal segments and using color palette display some properties (count rates, total energy deposition etc.). Basically what I need is a custom shaped bins of TH3 which I doubt is possible to achieve. I also checked the possibility of creating a set of 3D objects and display them in a 3D viewer. However, when drawing on pad I was so far unable to set the fill color, it seems that only wireframe option is possible; and while TGLViewer is perfect for the task I am not sure if it is possible to integrated it to TGFrame of my app since it is not based on ROOT GUI.
The only possible solution that I can think of is to use a TH3 histogram and create group of bins that would represent singe segment and fill them together. This is however not an elegant solution and I am hoping you may have some advice on how to proceed.
Thanks for the tip @matevz, I already tried switching the specular light off but it didn’t completely different shades of the same color in the model. I would like to display object color regardless of light source position. I want color of an object to represent some physical quantity in the same way as the TH2 does for “col” option, so the shade is important here.
I was hoping it could be solved by either changing reflectiveness of the object itself or by changing the light source to be come “from everywhere”.
Here is the test code I currently have, you can run it by .x vistutest.cxx visutest.cxx (20.9 KB)
I see … you would have to disable lighting for rendering of that object and there is no per object flag / render pipeline support to do that.
There is however, support for generating custom rendering classes based on TSomeClass → TSomeClassGL paradigm – though this does not quite work for TGeo classes as they are exported via a TBuffer3D object that contains vertices, segments – and there is no additional bits/flags passed along. Sigh.
Now, we could cook up something, preferably through TEve … but I’m rather fully booked for quite some time. Questions:
Do you need this to run for long time and be supported in standard ROOT / to be used by many people?
Will there be other things you will want to add to the scene?
What is the timeline for the project? We are getting close to having web-based EVE (REve) ready for primetime. Would this interest you? You can look at my talk from the ROOT workshop in May.
Thank you for your time. To explain, this a new visual module for a spy program I developed. Its purpose is to listen to an online data stream during the experiment, performing minimal analysis and visualizing as much events as it possibly can. There is a server part that does the heavy lifting, and the client to do the visualization. To your questions:
Vanila ROOT only, preferably 6.16 (it is not easy to convince people to upgrade). Used by many people, uf, I hope so!
Not really, only an arrow marking a beam direction and possibly a visual color palette, but the latter one might be an overkill to do, having to change the numbers and having it in fixed position on the screen seems to much effort for little gain
Well, the experiment starts this Thursday . REve surely looks amazing (great job btw!), but for this specific application it is an overkill.
Anyway, thank you so much guys! I will use what I have now albeit is not perfect, it is still pretty cool.
If you don’t mind me asking, what is the performance situation of the web-based visualization? I was considering going with JSROOT with this spy, but as I was playing with it I got discouraged as it was not able to display large matrices (2k x 2k, 4k x 4k) in timely manner. However, I was just playing with it so I might have shot myself in a foot few times, hence the slow performance.
I don’t know … perhaps you were hitting another bottleneck. Unless you are going for a high refresh rate I don’t think web latency is a big problem. Next time ping @linev and he can help you explore where things are slowing down and potentially improve them. | s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446710155.67/warc/CC-MAIN-20221127005113-20221127035113-00807.warc.gz | CC-MAIN-2022-49 | 4,197 | 18 |
https://www.npmjs.com/package/filerepl | code | A simple node repl wrapper that is designed to work with a single file, and
will automatically reload it as it changes. This is probably only useful for
experimenting with in simple situations.
To install, use npm:
npm install filerepl
Private packages, team management tools, and powerful integrations. Get started with npm Orgs
how? learn more | s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886105326.6/warc/CC-MAIN-20170819070335-20170819090335-00627.warc.gz | CC-MAIN-2017-34 | 345 | 7 |
https://help.xero.com/int/InvoiceReminders-TurnOffContact | code | Turn reminders off for a customer
If you’ve set up invoice reminders for your organisation, stop sending them for a particular customer. For example, if you don't have an email address for them in your contacts, or you didn't mark their invoices as sent.
- In the Contacts menu, select Customers.
- Select the checkbox of the customer you want to stop reminders for.
Click Invoice Reminders, then select Turn off.
You can turn reminders back on in the same way. | s3://commoncrawl/crawl-data/CC-MAIN-2017-22/segments/1495463609409.62/warc/CC-MAIN-20170528024152-20170528044152-00370.warc.gz | CC-MAIN-2017-22 | 463 | 6 |
https://github.com/NixOS/nixpkgs/pull/77140 | code | Join GitHub today
GitHub is home to over 50 million developers working together to host and review code, manage projects, and build software together.Sign up
Motivation for this change
Will need some plumbing work to be used automagically in nixpkgs like we
Notes in case folks are interested/find it useful:
Possible issues preventing replacing ninja w/samu (regardless of whether that's desired, not here to tackle that):
When used with meson, may want to disable terminal escapes (color diagnostics), see README.
With some patches in recent git,
Anyway, for the curious/interested: https://github.com/dtzWill/nixpkgs/tree/experimental/samurai-setup-hook . | s3://commoncrawl/crawl-data/CC-MAIN-2020-45/segments/1603107906872.85/warc/CC-MAIN-20201030003928-20201030033928-00213.warc.gz | CC-MAIN-2020-45 | 658 | 9 |
https://hearmesaythis.org/tag/above | code | Return a context object which has the same attributes as the multiprocessing module. Because the human physique is simply barely much less dense than water, water supports the weight of the physique throughout swimming.
swimming pool supplies near me
Los Angeles Pool Builders Southern California Swimming Pool Outside Residing Designers. If optionally available args block is True (the default) and timeout is None (the default), block if mandatory until an merchandise is accessible. If timeout is a constructive number, it blocks at most timeout seconds and raises the queue.Empty exception if no item was available inside that point.
Consumer situations returned from pool.join will have a launch methodology which is able to launch them from the pool. Also, a single supervisor may be shared by processes on completely different computers over a community. The most basic of these compounds is molecular chlorine (Cl2); nonetheless, its utility is primarily in large … Read the rest | s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500357.3/warc/CC-MAIN-20230206181343-20230206211343-00770.warc.gz | CC-MAIN-2023-06 | 989 | 4 |
https://devforum.roblox.com/t/how-to-check-if-2-vector3s-intersect-with-eachother/2129741 | code | The title says it.
How would I check if two
Vector3 values intersect with each other? Note: I will not use raycasting since it is a vector and not a part, so don’t get confused.
I haven’t tried doing anything yet because I knew I was going to fail every time. I also didn’t find anything that suited my needs on the Roblox Developer Forum.
Use both of Positions and use one of these ways
while wait() do
if workspace.Part.Position == workspace.Part2.Position then
while wait() do
local magnitude = (workspace.Part.Position - workspace.Part2.Position).Magnitude
if magnitude <= 1 then -- Instead of 1, put whatever number you want
I have tried the answer given down below and it doesn’t work, when I run the code it doesn’t print anything, I don’t know why.
I recommend using a BoundingBox and then get a list of descendants, then check each descendant to see if it is a part and if it is a part then check the BoundingBox.
Also, please use code tags.
I recommend trying something like this
When you run this code, if everything goes correctly, it should print
local bb = Instance.new(“Part”)
bb.Name = “BoundingBox”
bb.Size = Vector3.new(1,1,1)
bb.Position = Vector3.new(0,0,0)
bb.Anchored = true
bb.CanCollide = false
bb.BrickColor = BrickColor.new(“Really black”)
bb.Parent = game.Workspace
local part = Instance.new(“Part”)
part.Size = Vector3.new(1,1,1)
part.Position = Vector3.new(0,0,0)
part.Anchored = true
part.CanCollide = true
part.BrickColor = BrickColor.new(“Really black”)
part.Parent = game.Workspace
local bbDescendants = bb:GetDescendants()
for i,v in pairs(bbDescendants) do
if v:IsA(“Part”) then
if v.BoundingBox:Intersects(bb.BoundingBox) then | s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510520.98/warc/CC-MAIN-20230929154432-20230929184432-00149.warc.gz | CC-MAIN-2023-40 | 1,698 | 34 |
https://bricstudy.com/sample-page/new-market-analysis-study/ | code | Reasons to Order:
- Risk assessment. Is this a market to enter?
- What is the best way to enter?
- What do customers want that the client can offer that present competitors do not?
- What are the strengths and weaknesses of the current suppliers?
- Initial strategy. How does the client build the business once entered? | s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296818452.78/warc/CC-MAIN-20240423002028-20240423032028-00145.warc.gz | CC-MAIN-2024-18 | 319 | 6 |
http://www.wranglerforum.com/f210/belt-ring-came-off-the-engine-296441.html | code | This is a new one for me... Driving home today all the engine accessories stopped working. No worries, belt issue right?
Looked under the hood and saw this:
The ring that the belt wraps around on the engine came completely off. The engine is too hot to play with right now so I can't look any closer yet. But does that ring just slide back on? Does the entire wheel that the ring was around come off the engine to be replaced?
Never seen this before. The belt is perfectly fine and there is no other obvious damage other than the picture. It's a '99 4 cylinder if that matters. | s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988721392.72/warc/CC-MAIN-20161020183841-00084-ip-10-171-6-4.ec2.internal.warc.gz | CC-MAIN-2016-44 | 577 | 4 |
http://stackoverflow.com/questions/10858154/how-do-you-handle-maven-builds-with-cross-platform-code-and-platform-specific-te | code | I have cross platform maven java build. I want to run the unit tests on each platforms but only need to compile/package/deploy from one platform.
- checkout on windows
- run unit-tests on other platforms using maven-repo
At present, I'm building and testing on all platform but this consumes resources and results in multiple generation of artifacts which seems wrong from a maven stand point.
How do you handle this situation? | s3://commoncrawl/crawl-data/CC-MAIN-2015-22/segments/1432207928754.15/warc/CC-MAIN-20150521113208-00078-ip-10-180-206-219.ec2.internal.warc.gz | CC-MAIN-2015-22 | 427 | 5 |
https://www.evl.uic.edu/events/882 | code | February 9th, 2009
EVL / CS PhD Candidate Ratko Jagodic presents his preliminary proposal Automated Content Organization on Large High-Resolution Displays, February 9, 2009.
Large high-resolution displays, as opposed to desktop environments, are better suited for dealing with an ever-increasing amount of information we have to assimilate. Their primary benefit is the ability to display multiple pieces of information simultaneously. However, this benefit will not be achieved without utilizing the available resolution efficiently. This involves organizing information in ways that its spatial arrangement can provide new insights into data. On the other hand, manually organizing a significant amount of information can prove to be tedious, time consuming and in the end be detrimental to the task at hand.
To address this problem I propose an automated organization scheme that will help users manage and organize windows and therefore allow more time to be spent on the task and less on the tool itself. However, little is known about how users might want to organize information when presented with such a drastic increase in resolution. Therefore, a series of observations of real-world users are first needed to gain an insight into the various organization techniques people resort to on such displays. From these observations, I will attempt to identify most commonly used window organization actions, the actions that take longest to complete and constraints that users implicitly or explicitly impose. These actions will then be prioritized and implemented as a constraint-based system that can be tailored to suit a specific usage scenario. | s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947476205.65/warc/CC-MAIN-20240303043351-20240303073351-00114.warc.gz | CC-MAIN-2024-10 | 1,654 | 4 |
https://cris.maastrichtuniversity.nl/en/publications/evolutionary-game-theory-and-multi-agent-reinforcement-learning | code | In this paper we survey the basics of reinforcement learning and (evolutionary) game theory, applied to the field of multi-agent systems. This paper contains three parts. We start with an overview on the fundamentals of reinforcement learning. Next we summarize the most important aspects of evolutionary game theory. Finally, we discuss the state-of-the-art of multi-agent reinforcement learning and the mathematical connection with evolutionary game theory. | s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296816864.66/warc/CC-MAIN-20240414033458-20240414063458-00351.warc.gz | CC-MAIN-2024-18 | 459 | 1 |
http://www.conceptart.org/forums/showthread.php/93083-Sparkster-A-model-I-hope-to-make | code | Hey everyone. Um, I'm hoping this' the right place for this...
So I've decided to take up sculpting, and to be honest I don't know the first thing about it. However, I've got a project in mind that I eventually want to have a go at some day. Those of you who every played the video game "Sparkster" / "Rocketknight Adventures", will know this character right off the bat. I've only got one side-on sketch ready at the moment, but here's my side-on concept sketch for the model:
It was kinda sparked by some random fan-art I did a while back, the bottom half of the pic:
Anyway... I know I'm not going to be able to pull this stunt off without getting injuries on the smaller ramps first, but that's the direction I want to head over to (apparently using clay initially with a vinyl finish, or so my friend says). Soooo, I guess I'm just asking what you guys think of the sketch really, and also what I should start out with on my road to sculpting, and even if the sculpture is practical.
I'm pretty sure it can support it's own weight, most of the weight on the upper half of the body will be supported by his large feet and also the sword, and it'll be about 6" tall. I also want to try and paint it (in fairly vibrant colours) at the end of it all if that helps.
I'd really appreciate any feedback, and of course constructive criticism is welcomed more than "lol kul" comments. But... those are good too. Thanks in advance and yeah, CA looks like a cool community. | s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917118743.41/warc/CC-MAIN-20170423031158-00113-ip-10-145-167-34.ec2.internal.warc.gz | CC-MAIN-2017-17 | 1,467 | 6 |
https://www.peterschen.de/hunting-threats-with-azure-security-center/ | code | In February I had the chance to attend a session by Yuri Diogenes, Program Manager at Microsoft, on how Azure Security Center works and how to demo it in a real life scenario.
The session he gave ended up as one of the excellent Azure Security Center Playbooks that are available for download on Microsoft TechNet Gallery.
After the talk I needed to prepare a few demos myself. As I’m notoriously lazy and a proponent of automation, I wrote a ARM template and PowerShell DSC resources that will prep the environment for demo. The only thing you need to do is deliver the demo according to the script.
Once the deployment is completed you will have a set of resources deployed to your environment:
Among those resource is a Logic App that can be used as a playbook to react to alerts in Azure Security Center. Before this Logic App can be used you need to re-establish the authorization (this can’t be serialized to the template).
To re-authenticate select the respective API connection in the list of resources:
When you click on the resource you’ll be presented with a toast that this connection is not authenticated:
Hit that notification to authorize the connection against your Office 365/Teams tenant. | s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947475806.52/warc/CC-MAIN-20240302084508-20240302114508-00256.warc.gz | CC-MAIN-2024-10 | 1,212 | 8 |
https://unix.stackexchange.com/questions/390710/how-to-run-a-process-overnight-on-a-remote-server-after-quitting-out-ssh | code | I'm really new to linux (like earlier this week is when I started) so excuse me if this is a really simple question. I am running a program on a remote server and it's a lengthy process dealing with a couple hundred gb of data so I wanted to leave it running overnight. Long story short I ssh in, I start the program, watch to see that it's running and then close out of terminal. I come back this morning and see it stopped exactly where it was when I terminated my ssh the night before. Is there a way to keep the process running on the server when I close out?
As the other answers suggest. You can use
nohup <command> &.
You can also use
screen, this (basically) is a detachable terminal. You can start a terminal using the command
screen and when you want to detach from it. Ctrl+ad. And to reattach your terminal run
screen -r <terminal_name>. If you have more then one detached terminal's, you can use the command
screen -r to see the names of the detached terminal's.
Screen is a full-screen window manager that multiplexes a physical ter‐ minal between several processes (typically interactive shells). Each virtual terminal provides the functions of a DEC VT100 terminal and, in addition, several control functions from the ISO 6429 (ECMA 48, ANSI X3.64) and ISO 2022 standards (e.g. insert/delete line and support for multiple character sets). There is a scrollback history buffer for each virtual terminal and a copy-and-paste mechanism that allows moving text regions between windows.
You can also use
tmux. Have a look here for a basic "how to use
tmuxis a terminal multiplexer. What is a terminal multiplexer? It lets you switch easily between several programs in one terminal, detach them (they keep running in the background) and reattach them to a different terminal. And do a lot more.
The command you want is called
nohup. Basic syntax is:
This will run
<command> and forcibly ignore SIGHUP (the signal sent to processes when their controlling terminal is closed, such as when the parent SSH session ends). Note that it is possible on a Systemd based system to prevent this from working, but no distro I know of uses such a configuration by default.
Alternatively, check if the command
at is present and
atd is running. If both are the case, you can tell the system to run your script as a batch job and possibly even e-mail you the output by using the following:
at "`date +%FT%T`" << EOF <command> EOF
You can substitute the contents of the double quotes for any reasonable date and time specification (
at is smart enough to handle reasonably human readable stuff like '8AM tomorrow' or 'next sunday'), but the given command will start the job immediately (the date command will return the current date and time as an ISO 8601 timestamp).
Login to your server over SSH and run:
nohup YOUR_PROGRAM &
This will run your program in background and running process won't stop if your SSH session will disconnect and stop shell you were using.
Check out this thread for details about
You can use
nohup in this case.
$ nohup ./YourExecutableFile &
This will run your executable file and put it in the background and it wont stop even if you logout. | s3://commoncrawl/crawl-data/CC-MAIN-2019-26/segments/1560628000610.35/warc/CC-MAIN-20190627015143-20190627041143-00423.warc.gz | CC-MAIN-2019-26 | 3,166 | 30 |
https://prospectzeus.com/8e46on/machine-learning-articles-for-beginners-cd2bb5 | code | Get a theoretical and practical machine learning and artificial intelligence education with these 108 novice-friendly lessons. Machine Learning’s Current Applications And Overviews. In this context, let’s review a couple of Machine Learning algorithms commonly used for classification, and try to … Once you’ve applied machine learning techniques to solve problems that you thought were impossible to fix, it makes you realize that these … What is AI, ML, DL and DS? The theory of Quantum Machine Learning takes elements from classical Machine Learning … Artificial Intelligence(AI) is the broader concept of machines … Hopefully this article will provide some useful insights and open up your mind to what computers can do now a … The main goal of Quantum Machine Learning is to speed things up by applying what we know from quantum computing to machine learning. In this article, we are going to explain basics and steps to implement Machine Learning. Targeted Audience: Beginners and/or Machine Learning Fresh Bloods. Machines do not perform magic with data, rather apply plain Statistics! Machine Learning For Beginners.
How To Make Money In A Pyramid Scheme, Kerdi-shower Tray 38x60, Duke Independent Studies, Article Review Summary, Irs Live Person, Air Force 1 Pastel, Songs With Laughing In The Title, East Ayrshire Council Housing Benefit, | s3://commoncrawl/crawl-data/CC-MAIN-2021-21/segments/1620243990584.33/warc/CC-MAIN-20210513080742-20210513110742-00261.warc.gz | CC-MAIN-2021-21 | 1,364 | 2 |
https://www.tr.freelancer.com/projects/mobile-phone/create-google-firebase-cloud-function/ | code | for a Mobile Application backend in Google Firebase we need a function that loads a Microsoft Word template and replaces various keywords with application data coming from the Mobile App frontend. This includes text but also graphics and especially pie-charts.
Once this user-specific document is compiled it will then be send to the users email address.
All has to be server-less within Firebase Cloud-function which currently is running Node.JS 8 but can also be replaced with another compatible programming language.
Please respond with your expertise in Google Firebase Cloud function so far.
Hello sir I am a senior web developer and i have rich experiences in GFC and GCP. I have developed some cloud functions integrated with Express server and front end of react and angular(React native and Ionic). Plea Daha Fazla
Bu iş için 13 freelancer ortalamada $227 teklif veriyor
Hi I am Shafaet, I am a M.E.A.N. stack developer with experience in Firebase functions. I believe I can provide you with exactly what you want and more. Let’s talk for a minute, you won’t regret it, I promise. Cheers
I have used Google Firebase in many of my projects inside or outside of my work. I have expertise on the topic. We can discuss the details if you want to. | s3://commoncrawl/crawl-data/CC-MAIN-2019-30/segments/1563195526408.59/warc/CC-MAIN-20190720024812-20190720050812-00467.warc.gz | CC-MAIN-2019-30 | 1,257 | 8 |
https://blog.cloudflare.com/bgp-hijack-detection | code | Border Gateway Protocol (BGP) is the de facto inter-domain routing protocol used on the Internet. It enables networks and organizations to exchange reachability information for blocks of IP addresses (IP prefixes) among each other, thus allowing routers across the Internet to forward traffic to its destination. BGP was designed with the assumption that networks do not intentionally propagate falsified information, but unfortunately that’s not a valid assumption on today’s Internet.
Malicious actors on the Internet who control BGP routers can perform BGP hijacks by falsely announcing ownership of groups of IP addresses that they do not own, control, or route to. By doing so, an attacker is able to redirect traffic destined for the victim network to itself, and monitor and intercept its traffic. A BGP hijack is much like if someone were to change out all the signs on a stretch of freeway and reroute automobile traffic onto incorrect exits.
At Cloudflare, we have long been monitoring suspicious BGP anomalies internally. With our recent efforts, we are bringing BGP origin hijack detection to the Cloudflare Radar platform, sharing our detection results with the public. In this blog post, we will explain how we built our detection system and how people can use Radar and its APIs to integrate our data into their own workflows.
What is BGP origin hijacking?
Services and devices on the Internet locate each other using IP addresses. Blocks of IP addresses are called an IP prefix (or just prefix for short), and multiple prefixes from the same organization are aggregated into an autonomous system (AS).
Using the BGP protocol, ASes announce which routes can be imported or exported to other ASes and routers from their routing tables. This is called the AS routing policy. Without this routing information, operating the Internet on a large scale would quickly become impractical: data packets would get lost or take too long to reach their destinations.
During a BGP origin hijack, an attacker creates fake announcements for a targeted prefix, falsely identifying an autonomous systems (AS) under their control as the origin of the prefix.
In the following graph, we show an example where
AS 4 announces the prefix
P that was previously originated by
AS 1. The receiving parties, i.e.
AS 2 and
AS 3, accept the hijacked routes and forward traffic toward prefix
AS 4 instead.
As you can see, the normal and hijacked traffic flows back in the opposite direction of the BGP announcements we receive.
If successful, this type of attack will result in the dissemination of the falsified prefix origin announcement throughout the Internet, causing network traffic previously intended for the victim network to be redirected to the AS controlled by the attacker. As an example of a famous BGP hijack attack, in 2018 someone was able to convince parts of the Internet to reroute traffic for AWS to malicious servers where they used DNS to redirect MyEtherWallet.com, a popular crypto wallet, to a hacked page.
Prevention mechanisms and why they’re not perfect (yet)
The key difficulty in preventing BGP origin hijacks is that the BGP protocol itself does not provide a mechanism to validate the announcement content. In other words, the original BGP protocol does not provide any authentication or ownership safeguards; any route can be originated and announced by any random network, independent of its rights to announce that route.
To address this problem, operators and researchers have proposed the Resource Public Key Infrastructure (RPKI) to store and validate prefix-to-origin mapping information. With RPKI, operators can prove the ownership of their network resources and create ROAs, short for Route Origin Authorisations, cryptographically signed objects that define which Autonomous System (AS) is authorized to originate a specific prefix.
Cloudflare committed to support RPKI since the early days of the RFC. With RPKI, IP prefix owners can store and share the ownership information securely, and other operators can validate BGP announcements by checking the prefix origin to the information stored on RPKI. Any hijacking attempt to announce an IP prefix with an incorrect origin AS will result in invalid validation results, and such invalid BGP messages will be discarded. This validation process is referred to as route origin validation (ROV).
In order to further advocate for RPKI deployment and filtering of RPKI invalid announcements, Cloudflare has been providing a RPKI test service, Is BGP Safe Yet?, allowing users to test whether their ISP filters RPKI invalid announcements. We also provide rich information with regard to the RPKI status of individual prefixes and ASes at https://rpki.cloudflare.com/.
However, the effectiveness of RPKI on preventing BGP origin hijacks depends on two factors:
- The ratio of prefix owners register their prefixes on RPKI;
- The ratio of networks performing route origin validation.
Unfortunately, neither ratio is at a satisfactory level yet. As of today, July 27, 2023, only about 45% of the IP prefixes routable on the Internet are covered by some ROA on RPKI. The remaining prefixes are highly vulnerable to BGP origin hijacks. Even for the 45% prefix that are covered by some ROA, origin hijack attempts can still affect them due to the low ratio of networks that perform route origin validation (ROV). Based on our recent study, only 6.5% of the Internet users are protected by ROV from BGP origin hijacks.
Despite the benefits of RPKI and RPKI ROAs, their effectiveness in preventing BGP origin hijacks is limited by the slow adoption and deployment of these technologies. Until we achieve a high rate of RPKI ROA registration and RPKI invalid filtering, BGP origin hijacks will continue to pose a significant threat to the daily operations of the Internet and the security of everyone connected to it. Therefore, it’s also essential to prioritize developing and deploying BGP monitoring and detection tools to enhance the security and stability of the Internet's routing infrastructure.
Design of Cloudflare’s BGP hijack detection system
Our system comprises multiple data sources and three distinct modules that work together to detect and analyze potential BGP hijack events: prefix origin change detection, hijack detection and the storage and notification module.
The Prefix Origin Change Detection module provides the data, the Hijack Detection module analyzes the data, and the Alerts Storage and Delivery module stores and provides access to the results. Together, these modules work in tandem to provide a comprehensive system for detecting and analyzing potential BGP hijack events.
Prefix origin change detection module
At its core, the BGP protocol involves:
- Exchanging prefix reachability (routing) information;
- Deciding where to forward traffic based on the reachability information received.
The reachability change information is encoded in BGP update messages while the routing decision results are encoded as a route information base (RIB) on the routers, also known as the routing table.
In our origin hijack detection system, we focus on investigating BGP update messages that contain changes to the origin ASes of any IP prefixes. There are two types of BGP update messages that could indicate prefix origin changes: announcements and withdrawals.
Announcements include an AS-level path toward one or more prefixes. The path tells the receiving parties through which sequence of networks (ASes) one can reach the corresponding prefixes. The last hop of an AS path is the origin AS. In the following diagram, AS 1 is the origin AS of the announced path.
Withdrawals, on the other hand, simply inform the receiving parties that the prefixes are no longer reachable.
Both types of messages are stateless. They inform us of the current route changes, but provide no information about the previous states. As a result, detecting origin changes is not as straightforward as one may think. Our system needs to keep track of historical BGP updates and build some sort of state over time so that we can verify if a BGP update contains origin changes.
We didn't want to deal with a complex system like a database to manage the state of all the prefixes we see resulting from all the BGP updates we get from them. Fortunately, there's this thing called prefix trie in computer science that you can use to store and look up string-indexed data structures, which is ideal for our use case. We ended up developing a fast Rust-based custom IP prefix trie that we use to hold the relevant information such as the origin ASN and the AS path for each IP prefix and allows information to be updated based on BGP announcements and withdrawals.
The example figure below shows an example of the AS path information for prefix
192.0.2.0/24 stored on a prefix trie. When updating the information on the prefix trie, if we see a change of origin ASN for any given prefix, we record the BGP message as well as the change and create an
Origin Change Signal.
The prefix origin changes detection module collects and processes live-stream and historical BGP data from various sources. For live streams, our system applies a thin layer of data processing to translate BGP messages into our internal data structure. At the same time, for historical archives, we use a dedicated deployment of the BGPKIT broker and parser to convert MRT files from RouteViews and RIPE RIS into BGP message streams as they become available.
After the data is collected, consolidated and normalized it then creates, maintains and destroys the prefix tries so that we can know what changed from previous BGP announcements from the same peers. Based on these calculations we then send enriched messages downstream to be analyzed.
Hijack detection module
Determining whether BGP messages suggest a hijack is a complex task, and no common scoring mechanism can be used to provide a definitive answer. Fortunately, there are several types of data sources that can collectively provide a relatively good idea of whether a BGP announcement is legitimate or not. These data sources can be categorized into two types: inter-AS relationships and prefix-origin binding.
The inter-AS relationship datasets include AS2org and AS2rel datasets from CAIDA/UCSD, AS2rel datasets from BGPKIT, AS organization datasets from PeeringDB, and per-prefix AS relationship data built at Cloudflare. These datasets provide information about the relationship between autonomous systems, such as whether they are upstream or downstream from one another, or if the origins of any change signal belong to the same organization.
Prefix-to-origin binding datasets include live RPKI validated ROA payload (VRP) from the Cloudflare RPKI portal, daily Internet Routing Registry (IRR) dumps curated and cleaned up by MANRS, and prefix and AS bogon lists (private and reserved addresses defined by RFC 1918, RFC 5735, and RFC 6598). These datasets provide information about the ownership of prefixes and the ASes that are authorized to originate them.
By combining all these data sources, it is possible to collect information about each BGP announcement and answer questions programmatically. For this, we have a scoring function that takes all the evidence gathered for a specific BGP event as the input and runs that data through a sequence of checks. Each condition returns a neutral, positive, or negative weight that keeps adding to the final score. The higher the score, the more likely it is that the event is a hijack attempt.
The following diagram illustrates this sequence of checks:
As you can see, for each event, several checks are involved that help calculate the final score: RPKI, Internet Routing Registry (IRR), bogon prefixes and ASNs lists, AS relationships, and AS path.
Our guiding principles are: if the newly announced origins are RPKI or IRR invalid, it’s more likely that it’s a hijack, but if the old origins are also invalid, then it’s less likely. We discard events about private and reserved ASes and prefixes. If the new and old origins have a direct business relationship, then it’s less likely that it’s a hijack. If the new AS path indicates that the traffic still goes through the old origin, then it’s probably not a hijack.
Signals that are deemed legitimate are discarded, while signals with a high enough confidence score are flagged as potential hijacks and sent downstream for further analysis.
It's important to reiterate that the decision is not binary but a score. There will be situations where we find false negatives or false positives. The advantage of this framework is that we can easily monitor the results, learn from additional datasets and conduct the occasional manual inspection, which allows us to adjust the weights, add new conditions and continue improving the score precision over time.
Aggregating BGP hijack events
Our BGP hijack detection system provides fast response time and requires minimal resources by operating on a per-message basis.
However, when a hijack is happening, the number of hijack signals can be overwhelming for operators to manage. To address this issue, we designed a method to aggregate individual hijack messages into BGP hijack events, thereby reducing the number of alerts triggered.
An event aggregates BGP messages that are coming from the same hijacker related to prefixes from the same victim. The start date is the same as the date of the first suspicious signal. To calculate the end of an event we look for one of the following conditions:
- A BGP withdrawn message for the hijacked prefix: regardless of who sends the withdrawal, the route towards the prefix is no longer via the hijacker, and thus this hijack message is considered finished.
- A new BGP announcement message with the previous (legitimate) network as the origin: this indicates that the route towards the prefix is reverted to the state before the hijack, and the hijack is therefore considered finished.
If all BGP messages for an event have been withdrawn or reverted, and there are no more new suspicious origin changes from the hijacker ASN for six hours, we mark the event as finished and set the end date.
Hijack events can capture both small-scale and large-scale attacks. Alerts are then based on these aggregated events, not individual messages, making it easier for operators to manage and respond appropriately.
Alerts, Storage and Notifications module
This module provides access to detected BGP hijack events and sends out notifications to relevant parties. It handles storage of all detected events and provides a user interface for easy access and search of historical events. It also generates notifications and delivers them to the relevant parties, such as network administrators or security analysts, when a potential BGP hijack event is detected. Additionally, this module can build dashboards to display high-level information and visualizations of detected events to facilitate further analysis.
Lightweight and portable implementation
Our BGP hijack detection system is implemented as a Rust-based command line application that is lightweight and portable. The whole detection pipeline runs off a single binary application that connects to a PostgreSQL database and essentially runs a complete self-contained BGP data pipeline. And if you are wondering, yes, the full system, including the database, can run well on a laptop.
The runtime cost mainly comes from maintaining the in-memory prefix tries for each full-feed router, each costing roughly 200 MB RAM. For the beta deployment, we use about 170 full-feed peers and the whole system runs well on a single 32 GB node with 12 threads.
Using the BGP Hijack Detection
Under the “Security & Attacks” section of the Cloudflare Radar for both global and ASN view, we now display the BGP origin hijacks table. In this table, we show a list of detected potential BGP hijack events with the following information:
- The detected and expected origin ASes;
- The start time and event duration;
- The number of BGP messages and route collectors peers that saw the event;
- The announced prefixes;
- Evidence tags and confidence level (on the likelihood of the event being a hijack).
For each BGP event, our system generates relevant evidence tags to indicate why the event is considered suspicious or not. These tags are used to inform the confidence score assigned to each event. Red tags indicate evidence that increases the likelihood of a hijack event, while green tags indicate the opposite.
For example, the red tag "RPKI INVALID" indicates an event is likely a hijack, as it suggests that the RPKI validation failed for the announcement. Conversely, the tag "SIBLING ORIGINS" is a green tag that indicates the detected and expected origins belong to the same organization, making it less likely for the event to be a hijack.
Users can now access the BGP hijacks table in the following ways:
- Global view under Security & Attacks page without location filters. This view lists the most recent 150 detected BGP hijack events globally.
- When filtered by a specific ASN, the table will appear on Overview, Traffic, and Traffic & Attacks tabs.
Cloudflare Radar API
We also provide programmable access to the BGP hijack detection results via the Cloudflare Radar API, which is freely available under CC BY-NC 4.0 license. The API documentation is available at the Cloudflare API portal.
curl command fetches the most recent 10 BGP hijack events relevant to AS64512.
curl -X GET "https://api.cloudflare.com/client/v4/radar/bgp/hijacks/events?invlovedAsn=64512&format=json&per_page=10" \
-H "Authorization: Bearer <API_TOKEN>"
Users can further filter events with high confidence by specifying the
minConfidence parameter with a 0-10 value, where a higher value indicates higher confidence of the events being a hijack. The following example expands on the previous example by adding the minimum confidence score of 8 to the query:
curl -X GET "https://api.cloudflare.com/client/v4/radar/bgp/hijacks/events?invlovedAsn=64512&format=json&per_page=10&minConfidence=8" \
-H "Authorization: Bearer <API_TOKEN>"
Additionally, users can also quickly build custom hijack alerters using a Cloudflare Workers + KV combination. We have a full tutorial on building alerters that send out webhook-based messages or emails (with Email Routing) available on the Cloudflare Radar documentation site.
More routing security on Cloudflare Radar
As we continue improving Cloudflare Radar, we are planning to introduce additional Internet routing and security data. For example, Radar will soon get a dedicated routing section to provide digestible BGP information for given networks or regions, such as distinct routable prefixes, RPKI valid/invalid/unknown routes, distribution of IPv4/IPv6 prefixes, etc. Our goal is to provide the best data and tools for routing security to the community, so that we can build a better and more secure Internet together.
Visit Cloudflare Radar for additional insights around (Internet disruptions, routing issues, Internet traffic trends, attacks, Internet quality, etc.). Follow us on social media at @CloudflareRadar (Twitter), cloudflare.social/@radar (Mastodon), and radar.cloudflare.com (Bluesky), or contact us via e-mail. | s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817184.35/warc/CC-MAIN-20240417235906-20240418025906-00381.warc.gz | CC-MAIN-2024-18 | 19,319 | 92 |
https://rio.tamiu.edu/arssb_facpubs/123/ | code | Binary unconstrained quadratic optimization problem
Handbook of Combinatorial Optimization
In recent years the unconstrained quadratic binary program (UQP) has emerged as a unified framework for modeling and solving a wide variety of combinatorial optimization problems. The unexpected versatility of the UQP model is opening doors to the solution of a diverse array of important and challenging applications. Developments in this evolving area are illustrated by describing its methodology with examples and by reporting substantial computational experience demonstrating the viability and robustness of latest methods for solving the UQP model, showing that they obtain solutions to wide-ranging instances of the model that rival or surpass the best solutions obtained by today's best special-purpose algorithms.
Kochenberger, Gary A.; Glover, Fred; and Wang, Haibo, "Binary unconstrained quadratic optimization problem" (2013). Business Faculty Publications. 123. | s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320304261.85/warc/CC-MAIN-20220123111431-20220123141431-00541.warc.gz | CC-MAIN-2022-05 | 966 | 4 |
https://medium.com/@neerajnan/the-observable-contract-f6d71a5fdb90 | code | The Observable Contract
The observable contract defines the fundamental behaviour under which Observable work. One must go through them at least once to have a better understanding about its working.
At any time after it receives an OnSubscribe notification, an observer may issue a Request notification to the…reactivex.io
I am adding a summary of key concepts:
· Observable make zero or more OnNext notifications, each representing a single emitted item, followed by either OnCompleted or OnError (Must contain cause of the error) notification, but not both, after which it will not issue any further notification.
· It is proper for an Observable to issue no notifications (Never terminates), to issue only an OnCompleted or an OnError notification, or to issue only OnNext notifications (Never terminates). But before it terminates it must first issue either an OnCompleted or OnError notification to all the observers that are subscribed to it.
· Observables must issue notifications to observers serially (not in parallel). They may issue these notifications from different threads, but there must be a formal happens-before relationship between the notifications.
· It is not guaranteed, that the Observable will issue no notifications to the observer after an observer issues it an Unsubscribe notification.
· When an Observable issues an OnError or OnComplete notification to its observers, this ends the subscription. Observers do not need to issue an Unsubscribe notification to end subscriptions that are ended by the Observable in this way.
· If a second observer subscribes to an Observable that is already emitting items to a first observer, it is up to the Observable whether it will thenceforth emit the same items to each observer, or whether it will replay the complete sequence of items from the beginning to the second observer, or whether it will emit a wholly different sequence of items to the second observer. There is no general guarantee that two observers of the same Observable will see the same sequence of items.
· Backpressure is optional; not all ReactiveX implementations include backpressure, and in those that do, not all Observables or operators honor backpressure. An Observable may implement backpressure if it detects that its observer implements Request notifications and understands OnSubscribe notifications.
· If an Observable implements backpressure and its observer employs backpressure, the Observable will not begin to emit items to the observer immediately upon subscription. Instead, it will issue an OnSubscribe notification to the observer.
· At any time after it receives an OnSubscribe notification, an observer may issue a Request notification to the Observable it has subscribed to. This notification requests a particular number of items. The Observable responds to such a Request by emitting no more items to the observer than the number of items the observer requests. However the Observable may, in addition, issue an OnCompleted or OnError notification, and it may even issue such a notification before the observer requests any items at all.
· An Observable that does not implement backpressure should respond to a Request notification from an observer by issuing an OnError notification that indicates that backpressure is not supported.
· Requests are cumulative. For example, if an observer issues three Request notifications to an Observable, for 3, 5, and 10 items respectively, that Observable may emit as many as 18 items to the observer, no matter when those Request notifications arrived relative to when the Observable emitted items in response.
· If the Observable produces more items than the observer requests, it is up to the Observable whether it will discard the excess items, store them to emit at a later time, or use some other strategy to deal with the overflow. | s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267155634.45/warc/CC-MAIN-20180918170042-20180918190042-00016.warc.gz | CC-MAIN-2018-39 | 3,858 | 16 |
https://www.stratascratch.com/sql.html | code | SQL Guides & Problem Sets
The SQL guides are aimed to teach non-technical users how to code in SQL to answer business and marketing questions. The SQL exercises are specifically tailored towards business and marketing problems so you get a better understanding of how analytics plays a role in the business world.
- Basic and Intermediate SQL Guide (Freemium access)
- Advanced SQL Guide (Freemium access)
- Basic SQL Exercises 1 (Freemium access)
test your analytical skills using complex queries to access multiple tables and perform operations and functions to manipulate data.
Forbes Global 2000 followed by questions related to the most profitable and popular public companies in the world.
the establishments present in a town as well as the corresponding net salary per town.
customer reviews and scores of 1493 luxury hotels across Europe.
the demographics of the different amount of checkouts from different types of people and libraries. Your analytical skills will be challenged by answering common library-usage problems.
NFL game and every passer over 5000 regular season games from 1996 to 2016. Your SQL skills will be tested by analyzing the game stats to answer the questions.
various data gathered on Yelp such as users, reviews, ratings, business address and categories. Your SQL skills will be challenged by answering common queries on Yelp. | s3://commoncrawl/crawl-data/CC-MAIN-2019-04/segments/1547583659677.17/warc/CC-MAIN-20190118025529-20190118051529-00465.warc.gz | CC-MAIN-2019-04 | 1,361 | 12 |
https://forums.comodo.com/t/recover-frequent-link-deleted-from-new-tab/316587 | code | Hi there ! Happy user of the Dragon (Windows 10, 64 bits) ! I came here to learn if/how I can solve
a minor (but annoying) problem, viz. I deleted (accidentally) a couple miniatures/links from the NewTab - since I did, the affected sites won’t come back to the N.T. however often I go back there, and I mean, I will return oftentimes but- no joy ! Seems the Dragon hard-blacklisted the affected sites, forever ! :=)
Please how can I recover the frequent sites I want ? It is all too easy BTW to delete them involuntarily, the icons on the new tab page are ridiculously small (they used to be larger !) and there is NO confirmation when clicking the ‘X’ that removes them :=( Please if possible make the frequent site icons LARGER again, also make it a setting so we can have more icons on New Tab and also optionnaly REMOVE the useless “search” link which takes space for no reason (doing double duty with the “omnibar”):
Thanks Comodo for giving us a better Chrome than Chrome !
Oh, thank you, Alex ! I understand this is a Chromium “feature”, and I expect Comodo to make code adjustments in future versions of Dragon - and possibly to propose such adjustments back ‘upstream’.
Yet as things stand now, there has to be /some/ way for me to purge the sites that have been “banned” from the New Tab links - there has to be a file, or files, in which the list is kept; What file(s) and can I delete / redo the list ? Even a quick-and-dirty method would be better than none. TIA !
The top visited sites are stored in C:\Users\YourUser\AppData\Local\Comodo\Dragon\User Data\Default, there are 2 file Top Sites and Top Sites Journal. If you delete those files it will reset the tabs, only to reload them after max 1 min from the local database. If you delete the local database folder it will reset the entire browser or it might render it to not open in some cases so you might as well delete your entire user data folder, which will delete all your history, tabs, etc. If you find this a convenient way, this is the way to proceed. Either reset the browser to default settings or delete the C:\Users\YourUser\AppData\Local\Comodo\Dragon\User Data folder. Caution in both cases IT WILL DELETE ALL OF YOU COMODO DRAGON STORED DATA!
Sorry I can’t be of much help regarding this matter but there are security measures implemented to prevent hacks from other third party software to promote unwanted pages there.
Oh I see… Well, then, I’ll better live with the inconvenience than have to reinstall everything including
hundreds of favorite links …
Isn’t that particular “security measure” sounding like “security by obscurity” though ? Ha !
Why can’t the list of “frequent” sites" be reviewed and edited by a user from the Settings menu,
which is optionally password protected, in the same way - for instance - s/he can review and edit the “cookie” list ? I count on you to make this possible without compromising the security of the CD, and - also - to allow for more and larger miniatures on the New Tab as part of future upgrades.
As I said before this entire handling (with the deletion of pages from top sites) is inherited from chromium. We are going to change it so it will be more easier to use in the new version of CD. Thank you for your feedback and we will do our best to solve this problem.
Have a great weekend !
Great but… it’s been a months and counting, Dragon’s been updated at least twice and… no improvement, wrt viewing/editing.undoing the list of deleted “frequent” sites. Nor with regards to microscopic miniatures on the “new tab” page (to the contrary, it seems they get smaller and smaller as time passes).
Are you still planning to remedy this and in general, other bad choices imposed by Google/Chromium devs ? | s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224652161.52/warc/CC-MAIN-20230605185809-20230605215809-00003.warc.gz | CC-MAIN-2023-23 | 3,800 | 17 |
https://toonormal.com/2017/10/29/notes-edgemax-edgerouter/ | code | Notes on working with an Ubiquiti EdgeRouter running EdgeMax.
If you ever need to start over, you can factory reset by holding the Reset button for about 10 seconds, until the eth4 LED starts flashing and then becomes solidly lit. After a few seconds, the LED will turn off, and the EdgeRouter will automatically reboot.
Plug your computer in to PORT 1 (eth0). Connect to https://192.168.1.1 (note HTTPS). Accept that it lacks a certificate. Default user account is “ubnt” with password “ubnt” (and no quotes).
First things first, you should do an update. At the very bottom of the page, there is buttons for Alert and System. Click System, and scroll further down.
In another tab, you’re going to want to open this link:
Grab the latest firmware for your EdgeRouter. Then back in the web-ui, find Configuration Management & Device Maintenance->Upgrade System Image->Upload System Image.
Hop over to the Wizards tab, and run the Basic Setup. This will reconfigure the EdgeRouter so PORT 1 (eth0) uses DHCP to fetch an IP and Gateway to the internet. This is useful for connecting it to your existing network, and for when you have a Cable internet provider (i.e. no authentication required. it’s all MAC/Serial Number based).
This also sets up switch0, and a variety of other settings (NAT masquerading for the WAN connection, good WAN firewall defaults, a DHCP server for a normal LAN).
The dashboard is the main tab you use for setting up interfaces.
After the wizard, we already have a virtual Switch (switch0) ready to go. If you drill down in to switch0’s settings (Actions->Config), you can define or change the IP address (i.e. where you see the Router on the network), or in the VLAN tab set which ports to associate with the Switch, and optionally set a fixed VLAN address for specific ports (i.e. for connecting an untagged device).
You create VLANs from the Dashboard. Click the “Add Interface” button near the top.
– VLAN ID is the VLAN ID (0-4094)
– Interface is which Port or Switch to associate it with (in our case, switch0)
– Description is a name
– leave MTU at 1500 to keep your packets the regular size
– IP Address, you might want to manually set one here. This is the address the VLAN will see, if you want to use services found on the router (DHCP, DNS, etc). This is a good idea, but you could alternatively use the same IP as your default LAN, just it means you have a slightly more complex configuration ahead of you when it comes to the firewall.
Repeat this for all the VLANs you want.
This creates our interfaces. By default all ports of switch0 are trunked, meaning VLAN traffic will flow freely to every port. In fact, there are no restrictions in place. So traffic will pass freely through VLANs, but once they reach the router, then can return-trip up other VLANs (i.e. it’s indistinguishable from a single LAN now). We’ll address this later with firewalls.
DHCP Server per VLAN
Right now the VLANs have no identity. So what we’ll do is create
DNS per VLAN
From the Services->DNS tab, we need to make sure our VLANs are included on the list of Interfaces that are monitored.
When you will likely have one entry for switch0, and an entry for every VLAN you want to have internet access (switch0.10, switch0.25, etc).
Isolating VLANs (with Firewalls)
Here’s the bread and butter. | s3://commoncrawl/crawl-data/CC-MAIN-2019-04/segments/1547583700734.43/warc/CC-MAIN-20190120062400-20190120084400-00581.warc.gz | CC-MAIN-2019-04 | 3,346 | 25 |
https://onlineforextrading.info/ | code | HOW TO READ FOREX PRICE CHARTS?
Forex Price Charts, what DO they mean and HOW to utilize them?
Significant various actualities as order, trading rules, not being voracious and so on., yet one of the
most significant things are:
Figure out how to peruse the graphs as Charts speak | s3://commoncrawl/crawl-data/CC-MAIN-2021-25/segments/1623488504969.64/warc/CC-MAIN-20210622002655-20210622032655-00347.warc.gz | CC-MAIN-2021-25 | 279 | 5 |
https://github.com/akatrevorjay/mongodb-cache/commits/develop | code | You can clone with
HTTPS or Subversion.
Fix #1: Use find_and_modify if available
Of course GitHub's new syntax only applies to Markdown.
README: Fix syntax.
README: Link and syntax highlighting
Updated README to match 1.3 config
v0.2: Requires Django MongoDB Engine from Git repo (actually 0.4 whic…
…h is not released yet)
Made the backend 1.3 compatible
Updated the test suite for Django 1.3.
Replaced the Django test code copy by imports.
Implemented proper database routing (read/write). Merged tests with
Ooops. Removed invalid assert I used for debugging.
Added test for invalid keys
Simplify the cull-frequency=0 test
Fix _cull for frequency == 0
Added test project with tests copied from Django's test suite.
Initial commit: django_mongodb_cache, a Django MongoDB cache backend | s3://commoncrawl/crawl-data/CC-MAIN-2015-22/segments/1432207928350.51/warc/CC-MAIN-20150521113208-00170-ip-10-180-206-219.ec2.internal.warc.gz | CC-MAIN-2015-22 | 789 | 19 |
http://blueberryhillsoftware.com/trimcharts-program-available/ | code | For all who’ve been following the teaser… The TrimCharts program is now available. TrimCharts is an add-on program for InterMapper that decreases the size of the Chart Data folder. It has the following benefits:
- It speeds up startup because InterMapper doesn’t have to scan huge Chart Data files;
- It reduces the amount of disk space consumed by InterMapper (the Chart Data folder on long-running installations can consume tens of gigabytes);
- It makes chart data appear faster in RemoteAccess.
You can read more about it at TrimCharts man page or get information from me, [email protected]
PS Join the conversation at InterMapper Discussions! | s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224656833.99/warc/CC-MAIN-20230609201549-20230609231549-00348.warc.gz | CC-MAIN-2023-23 | 666 | 6 |
https://www.experts-exchange.com/questions/22978061/Unbale-to-connect-to-Windows-Terminal-server-2003.html | code | I am unable to connect to my Widows 2003 terminal Server.
I am obtaining the following error message:
To logon on this remote computer, you must have Terminal Server User access permissions on this cimputer. By default, members of Remote Desktop Users group have these Permissions. If you are not a member of the Remote Desktop Users group or anothe rgroup that has these permissions, or if the Remote Desktop User group does not have these permissions, you muts be granted these permissions manually.
the terminal license is located on another server.
It tells me that it ois active.
I have it setup per device.
My permission compatibility is set to Full Security
RDP-TCP settings for Permssions are: Remote Desktop Users, which have User access and Guest Access
thanks for your help | s3://commoncrawl/crawl-data/CC-MAIN-2018-22/segments/1526794866511.32/warc/CC-MAIN-20180524151157-20180524171157-00554.warc.gz | CC-MAIN-2018-22 | 784 | 9 |
https://www.lindsayhundley.com/ | code | I am a trained social scientist with over 10 years of experience in leading data-driven projects to inform and improve policy, with a particular focus on foreign interference, propaganda, and the spread of political ideologies.
In my doctoral research at Stanford University, I used cross-national statistical analysis, archival research, and machine learning methods to show how governments use foreign regime interference to undermine threatening political movements. More recently, my work focuses on how actors use traditional media tools and new social media platforms for these ends.
My work has been published in both premier academic and policy outlets, including the Journal of Politics, Lawfare, and Foreign Policy. I have also coauthored two reports with the Stanford Internet Observatory analyzing the narratives, tactics, and cross-platform activities of foreign influence operations targeting the 2020 U.S. elections and the Afghan peace process.
I am currently a Postdoctoral Fellow at the Center for International Security and Cooperation (CISAC) at Stanford University. Previously, I was a Predoctoral Fellow at the Belfer Center for Science and International Affairs at Harvard Kennedy School.
At Stanford University, I was a Gerald J. Lieberman Fellow--one of the University's highest distinctions awarded to doctoral students for outstanding accomplishments in research, teaching, and leadership. Prior to pursuing my PhD, I was a Project Manager at the Global Research Institute. | s3://commoncrawl/crawl-data/CC-MAIN-2021-25/segments/1623487635724.52/warc/CC-MAIN-20210618043356-20210618073356-00464.warc.gz | CC-MAIN-2021-25 | 1,500 | 5 |
https://sicm1.org/and-pdf/1076-difference-between-fourier-series-and-fourier-transform-pdf-to-doc-466-347.php | code | File Name: difference between fourier series and fourier transform to doc.zip
This page allows you to access the HELM workbooks, the relevant index files, the student's guide and the tutor's guide in pdf format.
What Is the Fourier Transform?
In mathematics , a Fourier transform FT is a mathematical transform that decomposes functions depending on space or time into functions depending on spatial or temporal frequency, such as the expression of a musical chord in terms of the volumes and frequencies of its constituent notes.
The term Fourier transform refers to both the frequency domain representation and the mathematical operation that associates the frequency domain representation to a function of space or time. The Fourier transform of a function of time is a complex-valued function of frequency, whose magnitude absolute value represents the amount of that frequency present in the original function, and whose argument is the phase offset of the basic sinusoid in that frequency.
The Fourier transform is not limited to functions of time, but the domain of the original function is commonly referred to as the time domain. There is also an inverse Fourier transform that mathematically synthesizes the original function from its frequency domain representation, as proven by the Fourier inversion theorem.
A sinusoidal curve, with peak amplitude 1 , peak-to-peak 2 , RMS 3 , and wave period 4. Linear operations performed in one domain time or frequency have corresponding operations in the other domain, which are sometimes easier to perform. The operation of differentiation in the time domain corresponds to multiplication by the frequency, [remark 1] so some differential equations are easier to analyze in the frequency domain.
Also, convolution in the time domain corresponds to ordinary multiplication in the frequency domain see Convolution theorem. After performing the desired operations, transformation of the result can be made back to the time domain.
Harmonic analysis is the systematic study of the relationship between the frequency and time domains, including the kinds of functions or operations that are "simpler" in one or the other, and has deep connections to many areas of modern mathematics. Functions that are localized in the time domain have Fourier transforms that are spread out across the frequency domain and vice versa, a phenomenon known as the uncertainty principle.
The critical case for this principle is the Gaussian function , of substantial importance in probability theory and statistics as well as in the study of physical phenomena exhibiting normal distribution e. The Fourier transform of a Gaussian function is another Gaussian function.
Joseph Fourier introduced the transform in his study of heat transfer , where Gaussian functions appear as solutions of the heat equation. The Fourier transform can be formally defined as an improper Riemann integral , making it an integral transform , although this definition is not suitable for many applications requiring a more sophisticated integration theory. This idea makes the spatial Fourier transform very natural in the study of waves, as well as in quantum mechanics , where it is important to be able to represent wave solutions as functions of either position or momentum and sometimes both.
In general, functions to which Fourier methods are applicable are complex-valued, and possibly vector-valued. The latter is routinely employed to handle periodic functions. Many other characterizations of the Fourier transform exist. In , Joseph Fourier showed that some functions could be written as an infinite sum of harmonics. One motivation for the Fourier transform comes from the study of Fourier series. In the study of Fourier series, complicated but periodic functions are written as the sum of simple waves mathematically represented by sines and cosines.
The Fourier transform is an extension of the Fourier series that results when the period of the represented function is lengthened and allowed to approach infinity. Due to the properties of sine and cosine, it is possible to recover the amplitude of each wave in a Fourier series using an integral. This has the advantage of simplifying many of the formulas involved, and provides a formulation for Fourier series that more closely resembles the definition followed in this article.
Re-writing sines and cosines as complex exponentials makes it necessary for the Fourier coefficients to be complex valued. The usual interpretation of this complex number is that it gives both the amplitude or size of the wave present in the function and the phase or the initial angle of the wave. These complex exponentials sometimes contain negative "frequencies". Hence, frequency no longer measures the number of cycles per unit time, but is still closely related.
There is a close connection between the definition of Fourier series and the Fourier transform for functions f that are zero outside an interval. For such a function, we can calculate its Fourier series on any interval that includes the points where f is not identically zero. The Fourier transform is also defined for such a function. As we increase the length of the interval in which we calculate the Fourier series, then the Fourier series coefficients begin to resemble the Fourier transform and the sum of the Fourier series of f begins to resemble the inverse Fourier transform.
Then, the n th series coefficient c n is given by:. Under appropriate conditions, the Fourier series of f will equal the function f. In other words, f can be written:. This second sum is a Riemann sum. Under suitable conditions, this argument may be made precise. In the study of Fourier series the numbers c n could be thought of as the "amount" of the wave present in the Fourier series of f. Similarly, as seen above, the Fourier transform can be thought of as a function that measures how much of each individual frequency is present in our function f , and we can recombine these waves by using an integral or "continuous sum" to reproduce the original function.
The following figures provide a visual illustration how the Fourier transform measures whether a frequency is present in a particular function. The second factor in this equation is an envelope function that shapes the continuous sinusoid into a short pulse. Its general form is a Gaussian function.
This function was specially chosen to have a real Fourier transform that can be easily plotted. The first image contains its graph. The second image shows the plot of the real and imaginary parts of this function. Therefore, in this case, the integrand oscillates fast enough so that the integral is very small and the value for the Fourier transform for that frequency is nearly zero. The Fourier transform has the following basic properties: .
In particular the Fourier transform is invertible under suitable conditions. These equalities of operators require careful definition of the space of functions in question, defining equality of functions equality at every point?
These are not true for all functions, but are true under various conditions, which are the content of the various forms of the Fourier inversion theorem. This approach is particularly studied in signal processing , under time—frequency analysis. So these are two distinct copies of the real line, and cannot be identified with each other. Therefore, the Fourier transform goes from one space of functions to a different space of functions: functions which have a different domain of definition.
See the article on linear algebra for a more formal explanation and for more details. This point of view becomes essential in generalisations of the Fourier transform to general symmetry groups , including the case of Fourier series.
That there is no one preferred way often, one says "no canonical way" to compare the two copies of the real line which are involved in the Fourier transform—fixing the units on one line does not force the scale of the units on the other line—is the reason for the plethora of rival conventions on the definition of the Fourier transform.
The various definitions resulting from different choices of units differ by various constants. In probability theory, and in mathematical statistics, the use of the Fourier—Stieltjes transform is preferred, because so many random variables are not of continuous type, and do not possess a density function, and one must treat not functions but distributions , i.
From the higher point of view of group characters , which is much more abstract, all these arbitrary choices disappear, as will be explained in the later section of this article, which treats the notion of the Fourier transform of a function on a locally compact Abelian group.
The Fourier transform may be defined in some cases for non-integrable functions, but the Fourier transforms of integrable functions have several strong properties. By the Riemann—Lebesgue lemma , . For example, the Fourier transform of the rectangular function , which is integrable, is the sinc function , which is not Lebesgue integrable , because its improper integrals behave analogously to the alternating harmonic series , in converging to a sum without being absolutely convergent.
It is not generally possible to write the inverse transform as a Lebesgue integral. But if f is continuous, then equality holds for every x. The Plancherel theorem , which follows from the above, states that . Plancherel's theorem has the interpretation in the sciences that the Fourier transform preserves the energy of the original quantity. The terminology of these formulas is not quite standardised.
Parseval's theorem was proved only for Fourier series, and was first proved by Lyapunov. But Parseval's formula makes sense for the Fourier transform as well, and so even though in the context of the Fourier transform it was proved by Plancherel, it is still often referred to as Parseval's formula, or Parseval's relation, or even Parseval's theorem. See Pontryagin duality for a general formulation of this concept in the context of locally compact abelian groups.
The Poisson summation formula PSF is an equation that relates the Fourier series coefficients of the periodic summation of a function to values of the function's continuous Fourier transform. The Poisson summation formula says that for sufficiently regular functions f ,. It has a variety of useful forms that are derived from the basic one by application of the Fourier transform's scaling and time-shifting properties. The formula has applications in engineering, physics, and number theory.
The frequency-domain dual of the standard Poisson summation formula is also called the discrete-time Fourier transform. Poisson summation is generally associated with the physics of periodic media, such as heat conduction on a circle.
The fundamental solution of the heat equation on a circle is called a theta function. It is used in number theory to prove the transformation properties of theta functions, which turn out to be a type of modular form , and it is connected more generally to the theory of automorphic forms where it appears on one side of the Selberg trace formula.
Then the Fourier transform of the derivative is given by. More generally, the Fourier transformation of the n th derivative f n is given by. By applying the Fourier transform and using these formulas, some ordinary differential equations can be transformed into algebraic equations, which are much easier to solve. The Fourier transform translates between convolution and multiplication of functions.
Since the complete set of Hermite functions provides a resolution of the identity, the Fourier transform can be represented by such a sum of terms weighted by the above eigenvalues, and these sums can be explicitly summed. This approach to define the Fourier transform was first done by Norbert Wiener. These operators do not commute, as their group commutator is.
Denote the Heisenberg group by H 1. This J can be extended to a unique automorphism of H 1 :. This operator W is the Fourier transform. Many of the standard properties of the Fourier transform are immediate consequences of this more general framework. The Paley—Wiener theorem says that f is smooth i. This theorem has been generalised to semisimple Lie groups.
It may happen that a function f for which the Fourier integral does not converge on the real axis at all, nevertheless has a complex Fourier transform defined in some region of the complex plane. Therefore, the Fourier inversion formula can use integration along different lines, parallel to the real axis. This theorem implies the Mellin inversion formula for the Laplace transformation, . Dirichlet-Dini theorem , the value of f at t is taken to be the arithmetic mean of the left and right limits, and provided that the integrals are taken in the sense of Cauchy principal values.
L 2 versions of these inversion formulas are also available. The Fourier transform can be defined in any arbitrary number of dimensions n.
Subscribe to RSS
In mathematics , a Fourier transform FT is a mathematical transform that decomposes functions depending on space or time into functions depending on spatial or temporal frequency, such as the expression of a musical chord in terms of the volumes and frequencies of its constituent notes. The term Fourier transform refers to both the frequency domain representation and the mathematical operation that associates the frequency domain representation to a function of space or time. The Fourier transform of a function of time is a complex-valued function of frequency, whose magnitude absolute value represents the amount of that frequency present in the original function, and whose argument is the phase offset of the basic sinusoid in that frequency. The Fourier transform is not limited to functions of time, but the domain of the original function is commonly referred to as the time domain. There is also an inverse Fourier transform that mathematically synthesizes the original function from its frequency domain representation, as proven by the Fourier inversion theorem. A sinusoidal curve, with peak amplitude 1 , peak-to-peak 2 , RMS 3 , and wave period 4. Linear operations performed in one domain time or frequency have corresponding operations in the other domain, which are sometimes easier to perform.
We introduce general periodic functions and learn how to express them as Fourier series, which are sums of sines and cosines. Don't show me this again. This is one of over 2, courses on OCW.
Named after French mathematician Joseph Fourier, the Fourier transform is a mathematical procedure that allows us to determine the frequency content of a function. For electrical engineers, the Fourier transform is typically applied to functions of time that we call signals. A plot of voltage or current vs. It is not, however, the only useful representation. In many cases—for example, in the design of RF systems —we are interested primarily in the periodic behavior of signals.
Select a Web Site
Faster previews. Personalized experience. Get started with a FREE account. Load more similar PDF files. PDF Drive investigated dozens of problems and listed the biggest global issues facing the world today. Let's Change The World Together.
Documentation Help Center. If X is a vector, then fft X returns the Fourier transform of the vector. If X is a matrix, then fft X treats the columns of X as vectors and returns the Fourier transform of each column. If X is a multidimensional array, then fft X treats the values along the first array dimension whose size does not equal 1 as vectors and returns the Fourier transform of each vector. If no value is specified, Y is the same size as X. If X is a vector and the length of X is less than n , then X is padded with trailing zeros to length n.
Harmonic analysis is a branch of mathematics concerned with the representation of functions or signals as the superposition of basic waves , and the study of and generalization of the notions of Fourier series and Fourier transforms i. In the past two centuries, it has become a vast subject with applications in areas as diverse as number theory , representation theory , signal processing , quantum mechanics , tidal analysis and neuroscience. The term " harmonics " originated as the Ancient Greek word harmonikos , meaning "skilled in music". The classical Fourier transform on R n is still an area of ongoing research, particularly concerning Fourier transformation on more general objects such as tempered distributions. For instance, if we impose some requirements on a distribution f , we can attempt to translate these requirements in terms of the Fourier transform of f. The Paley—Wiener theorem is an example of this.
For a periodic waveform, 〈x(t)〉 equals the average over one period. It doesn't make any difference where in a period you start or how many whole periods you.
The continuous and discrete Fourier transforms.
MathOverflow is a question and answer site for professional mathematicians. It only takes a minute to sign up. I've been introduced to the idea that Fourier analysis is related to representation theory.
- После цифр стоит какая-то звездочка. Джабба ее не слушал, остервенело нажимая на кнопки. - Осторожно! - сказала Соши. - Нам нужны точные цифры. - Звездочка, - повторила Сьюзан, - это сноска.
Вы оба настолько заврались, что в это даже трудно поверить. | s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662558015.52/warc/CC-MAIN-20220523101705-20220523131705-00119.warc.gz | CC-MAIN-2022-21 | 17,676 | 48 |
https://larsenlights.com/led-2206-caseih-flasher-w-built-in-resistor | code | LED-2206 Amber Flasher w/ built in resistor.
LED-2206 Flasher w/ built in resistor. Used on CaseIh, IH, FNH, Versatile/Buhler and more. Replaces OEM Part Numbers: 92185C1, 216044C91, 216044C92, 92260C1, 130882C91, 107324C91, V93104, V77050, 9706415, 86014019, 86023276, 86016518, 86012669, 87053368, 83977683, & 8770630.
Out of stock
LED-660 60° out of stock until mid - late January. All prices USD. If imported into Canada there will be brokerage costs collected by UPS. Check the"Canada/World" link at the top of the page for more info. | s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320301341.12/warc/CC-MAIN-20220119125003-20220119155003-00327.warc.gz | CC-MAIN-2022-05 | 540 | 4 |
https://tois.acm.org/archive.cfm?id=1148020 | code | enter search term and/or author name
User evaluation of Físchlár-News: An automatic broadcast news delivery system
Hyowon Lee, Alan F. Smeaton, Noel E. O'connor, Barry Smyth
Technological developments in content-based analysis of digital video information are undergoing much progress, with ideas for fully automatic systems now being proposed and demonstrated. Yet because we do not yet have robust operational video...
A maximal figure-of-merit (MFoM)-learning approach to robust classifier design for text categorization
Sheng Gao, Wen Wu, Chin-Hui Lee, Tat-Seng Chua
We propose a maximal figure-of-merit (MFoM)-learning approach for robust classifier design, which directly optimizes performance metrics of interest for different target classifiers. The proposed approach, embedding the decision functions of...
Enhancing relevance feedback in image retrieval using unlabeled data
Zhi-Hua Zhou, Ke-Jia Chen, Hong-Bin Dai
Relevance feedback is an effective scheme bridging the gap between high-level semantics and low-level features in content-based image retrieval (CBIR). In contrast to previous methods which rely on labeled images provided by the user, this article...
iVIBRATE: Interactive visualization-based framework for clustering large datasets
Keke Chen, Ling Liu
With continued advances in communication network technology and sensing technology, there is astounding growth in the amount of data produced and made available through cyberspace. Efficient and high-quality clustering of large datasets continues to... | s3://commoncrawl/crawl-data/CC-MAIN-2018-13/segments/1521257647498.68/warc/CC-MAIN-20180320150533-20180320170533-00464.warc.gz | CC-MAIN-2018-13 | 1,532 | 13 |
http://www.lawschooldiscussion.org/index.php?topic=4014377.msg5175011 | code | Don't you have anything better to do?
Why don't you head over to the Tulane thread and start poo for no reason?
I have better things to do than creating buttplug threads dude...
And there is nothing odd about my love for buttplugs you judgmental bastard.
Because I am not on topic I don't consider myself to be posting in this buttplug thread...in the traditional sense. "And there is nothing odd about my love for buttplugs you judgmental bastard."
But that is neither here nor there. The point is that you are a weird dude and misguided in a lot of ways.
I know a lot about that sort of thing so trust me.
Probing minds are doing no such thing but I refuse to answer the question either way.
So I guess I'd better go.
Have a nice evening Amanda!
do you two flirt in every thread now? | s3://commoncrawl/crawl-data/CC-MAIN-2015-48/segments/1448398459875.44/warc/CC-MAIN-20151124205419-00157-ip-10-71-132-137.ec2.internal.warc.gz | CC-MAIN-2015-48 | 785 | 11 |
https://www.sc2mapster.com/forums/development/galaxy-editor-bugs-and-feedback/228018-anyones-editor-just-crashes-for-no-reason-does | code | As said in the title my editor just seems to crash for no reason and with no pattern. Just open up a model once. Crash. Click a unit in data. Ceash. Move some units in terrain. Crash.
I'm not sure if its my computer (it is getting pretty old, but it doesn't just randomly crash for anything else) or if it's the editor.
Does this happen to anyone else and does anyone know the cause? Its pretty annoying to lose an hours work for no reason.
Im alive, working on games, doing school work and dancing. Its a hard 'nough life.
In reply to BozoOvermind: | s3://commoncrawl/crawl-data/CC-MAIN-2020-34/segments/1596439735812.88/warc/CC-MAIN-20200803140840-20200803170840-00064.warc.gz | CC-MAIN-2020-34 | 549 | 5 |
https://docs.microsoft.com/en-us/windows/win32/directshow/the-filter-graph-and-its-components | code | The Filter Graph and Its Components
This article describes the major components of DirectShow. It is intended as an introduction for application developers and for developers writing custom DirectShow filters. Application developers can usually ignore many of the low-level details of DirectShow. However, it is still a good idea to read this section, to have a general understanding of the DirectShow architecture.
This article contains the following sections:
- About DirectShow Filters
- About the Filter Graph Manager
- About Media Types
- About Media Samples and Allocators
- How Hardware Devices Participate in the Filter Graph | s3://commoncrawl/crawl-data/CC-MAIN-2019-35/segments/1566027315681.63/warc/CC-MAIN-20190820221802-20190821003802-00142.warc.gz | CC-MAIN-2019-35 | 633 | 8 |
https://reputabletech.my.id/gadgets-for-windows-11-10-eight-1-7-5.html | code | Fixed a bug that prevented to start all gadgets at startup. The crash on startup ought to happen means less usually now. Also fastened a bug that prevented the installation of third celebration gadgets when the temp directory was not on the systemdrive. Fixed a bug in Clipboarder that caused it not to begin up correctly. Made it easier to disable the window-manager if activated by mistake. Fixed bug in DriveInfo gadget that caused excessive cpu and reminiscence utilization over time.
Resolved an error message stopping to install when an uninstall previously went incorrect. Added several gadgets and updated a couple of. New customers will get a message now that the sidebar is closable and that gadgets nonetheless can be moved to the desktop.
On Windows 7 the prevailing information in these directories are not touched by the installer and additionally will remain after uninstall. You can close the Command Promt then. After a while the gadgets possibility will appear in the desktop right-click menu. There seems some error message within the installer. You can entry some superior choices by right-clicking on the X.
Some compatibility bugfixes for the upcoming Windows 10 version in October. All gadget settings will stay in the course of the replace to 8.1 should you install this version. The new Internet Explorer in eight.1 is actually buggy in combination with gadgets. It was really a lot of work to workaround that, so I hope you recognize this.
You can also right-click on the sidebar. If you don’t just like the sidebar you’ll have the ability to shut it there. You will still be able to use the gadgets. Click on choices to vary the behaviour of the sidebar. The options of the last gadget, the climate gadget, allow you to change the city.
The next gadget is a clipboard manager. Here I copied the installer file and then the name of the file. Clipboarder will display every thing you copy to the clipboard. By clicking on a component you make it the current clipboard.
The choices of the clock gadget let you enable the second hand or to vary the timezone. Send us feedback about these examples. Removed intrusive window that appeared after main Windows Update.
Click on the plus symbol on the highest proper to see all available gadgets. Our buying guides and market evaluation allow you to get probably the most of your hard-earned money. Compare specs and ratings for varied merchandise, and examine our regular lists of one of the best telephones in every value band.
You also can make the sidebar seem automatically when touching the border and customize its design. Right-click on it and choose options to take action. The gadgets included are actually helpful when working with the PC.
Glassy Network Monitor now scales the graph based on the maximum seen value. 8GadgetPack now not overwrites Win+G per default. If you want to keep using Win+G for gadgets, go to 8GadgetPack Tools and reenable it there. Bugfix in 7 Sidebar involving Auto-hide. Removed weather gadgets that aren’t working anymore.
Can You Solve Four Phrases At Once?
I could make fairly some cash by adding adware to the installer, however I’m positive you respect it that this installer is clean. This is actually just a gadget that will assist you preserving the gadgets organized and visible. You can right-click on it and select “shut sidebar” to do so. Even with the sidebar the gadgets can nonetheless be moved onto the desktop as you like. Or you can even add more sidebars by including the gadget “7 Sidebar”. This is particularly useful when working with multiple monitors. | s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947476397.24/warc/CC-MAIN-20240303174631-20240303204631-00609.warc.gz | CC-MAIN-2024-10 | 3,598 | 12 |
https://forums.oculus.com/community/profile/Frontier_Support | code | I just wanted to say thank you for your very helpful posts in the Oculus Rift forums. Because of your posts, I purchased Elite: Dangerous tonight directly from the Frontier website. The purchase process was a breeze and I'm installing E:D right now.
You should get a commission for being so darn helpful! Other gaming companies could learn a thing or two from you all. | s3://commoncrawl/crawl-data/CC-MAIN-2017-39/segments/1505818687938.15/warc/CC-MAIN-20170921224617-20170922004617-00144.warc.gz | CC-MAIN-2017-39 | 368 | 2 |
https://community.bardeen.ai/t/scraping-instagram-favorite-posts/172 | code | I want to scrape all my Instagram favorites posts, at url: https://www.instagram.com/myprofile/saved/all-posts/ Second step, I would like to scrape more information from each favorite scraped, like thumbnail post image, post description, but I couldn’t perform the 1st step yet. Maybe on a 3rd step I could ask chatGPT or any other tool to transcribe the video posts, or print screen the carousels posts.
Instagram is a tricky page to scrape though, I also tried and didn’t manage to get it on the first try.
To get the urls for the posts, you’ll need to use CSS selectors. These are Bardeen advanced scraping techniques you can learn at How to use Bardeen scraper | Bardeen Tutorial.
Yet, we’ll check if someone on the team is able to get those selectors
Currently creating the video to explain everything. The book is created, will update this post when it’s done.
Hey @dkaleka I have been a bit busy and the video is not ready but here is the book and quick steps.
There will be some bonus content in the video on displaying thumbnails and getting hashtags out of the caption
- Go to saved Posts
- Run the Book
- Sheet where to save the Data (existing one)
- Tab where to save the Data (existing one)
- Report back and let us know if it worked
thank you for the attention
This topic was automatically closed 10 days after the last reply. New replies are no longer allowed. | s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100508.53/warc/CC-MAIN-20231203193127-20231203223127-00166.warc.gz | CC-MAIN-2023-50 | 1,385 | 14 |
https://www.rookieroad.com/glossary/soccer/away-goal-rule/ | code | Away Goal Rule
A rule in soccer that determines the winning team by whichever team scored the most goals while playing on their opponent's field. In two legged matches, teams play each other in both a home game and an away game. This rule is only used if the aggregate score is equal after the second match. If the aggregate score is equal, whichever team scored more goals while they were away is awarded the overall win. | s3://commoncrawl/crawl-data/CC-MAIN-2018-43/segments/1539583510749.37/warc/CC-MAIN-20181016093012-20181016114512-00531.warc.gz | CC-MAIN-2018-43 | 422 | 2 |
https://www.whistlerpaintings.gla.ac.uk/catalogue/display/?mid=y019&xml=sub | code | Alternative titles have been suggested:
Whistler copied part of the painting reproduced above, which was at that time attributed to Velázquez. The original shows a group of three men in the left foreground, and ten more distributed to the right. They are dressed in long boots, clothes and cloaks of rich colours, with contrasting sashes and lace collars, broad-brimmed hats with feathers, and some have swords. It is not known which figures were copied by Whistler.
Several drawings done by Whistler about 1854 (before he left America), including Cavalier [M.0167] (reproduced above) and 'Then Sir - I am the King of Spain!!!' [M.0166], indicate Whistler's interest in the flamboyant costumes of imaginary cavaliers. They may have been influenced by his readings of Le Sage's The Adventures of Gil Blas of Santinane (1715-1735), and Cervantes' Don Quixote de la Mancha (1605).
Last updated: 21st November 2019 by Margaret | s3://commoncrawl/crawl-data/CC-MAIN-2021-39/segments/1631780056578.5/warc/CC-MAIN-20210918214805-20210919004805-00255.warc.gz | CC-MAIN-2021-39 | 923 | 4 |
https://www.allinterview.com/company/5423/colors.html | code | What is the mro in python?
What is Incremental Crawl and Continuous Crawl?
How to Read dos environment variables?
What are the Best Practices of Creating Contact Sharing Rules?
What all is needed to achieve an crystal report? A crystal report server ,User Id .Is BI/BO needed.Our source is Microsoft SQL Server 2008 Datacenter.Please guide.
What are the available Alternate security databases ?
What are Pipes?
How to store the data in local?
What is Secure Store service?
euro currency market
Where do you use Standalone deployment model in SRM?
What is meant by binomial distribution?
i heard that mainframe testing is diff from other environments & has lot of keyboard input????pl clarify my doubt & let me know in what way its diff??
Variable of the boolean type is automatically initialized as?
Have you worked with support? How ticket comes to you? What were the timings for resolving tickets types of severity? | s3://commoncrawl/crawl-data/CC-MAIN-2019-39/segments/1568514573832.23/warc/CC-MAIN-20190920050858-20190920072858-00161.warc.gz | CC-MAIN-2019-39 | 917 | 15 |
https://forums.macrumors.com/threads/oracle-10-client-slow.352119/ | code | Hi all, Thought i'd post here see if anyone knows a solution: I have Oralce 10 Client with SQLPlus* installed on my Macbook Pro 2.4ghz 15" with 250gb hdd and 4gb Ram I have a Sun Fire 15000 32 processor server with 16gb Ram attached to our SAN Now problem is, i'm running a query and spooling around 60million records to a flat file on the local machine, the query takes about 2 hours to run and on my Windows NT 4.0 P4 machine it takes approx 7 - 8 hours to spool out the file, however on my Macbook it takes approx 2 - 3 days to finish!!!!!!! I have all my code optimised with Parallel streams and using full hashes on joins Has any one else had any problems with SQL PLus on mac's or do you know of any other tools ?? It's definately not the server as no one else is using it, it's been given as a dev environment and only i have an account on the box. Unfortunately the people who are demanding the data don't realise even when i try to explain how large some of this stuff is, they want it NOW! | s3://commoncrawl/crawl-data/CC-MAIN-2018-47/segments/1542039746110.52/warc/CC-MAIN-20181119192035-20181119213430-00019.warc.gz | CC-MAIN-2018-47 | 999 | 1 |
https://dzackgarza.com/undergrad_advice/ | code | Other Pages with Great Advice
- Rob Candler, Stuff Most Students Never Ask About Grad School
On Learning and Being a Student
Stay organized: Find and settle on a good way to track all of your due dates, and in particular have a good idea of when each upcoming major exam is for all of your classes.
Start everything early: Starting early gives you time to mull over questions and potentially visit professors/TAs for help.
- Fitting in a lot of work at the last-minute isn’t usually an optimal strategy, so planning when you’ll work on things can be helpful too. Be sure to slot in enough time to avoid last-minute stress, since this tends to hurt how much you can absorb/retain the material.
Use a wide variety of resources: Books, lectures, notes, PDFs – use them all! The search modifiers
inurl:edu filetype:pdfon Google are incredibly useful.
Extensively use good resources: There is also some value in working a single, particularly well-regarded book, front to back.
Spaced repetition: Read up on it (there is some pretty good science on its effectiveness in learning) and work it into your study habits. Cramming can have diminishing returns in proof-based classes, so it’s worth visiting and revisiting material often enough to be familiar with it.
- Apps like Anki are great for this.
Sleep like it is your hobby: Two hours of extra sleep is almost always a more efficient use of your time than two hours of tired studying.
On Learning Mathematics Specifically
Learn the vocabulary: Mathematics is (partially) a humanities discipline, so it can help to (partially) study it like one. I.e., the techniques you use to study in an English, Art History, or language class can also be put to good use here.
- One useful trick is keeping an ongoing list of new words you don’t know and their definitions, and continually reviewing and adding to it.
Spaced Repetition: When you run into things you don’t know, memorizing can be a first step (although this will also come naturally with practice). I usually recommend keeping a list of words/terms you’re less comfortable with or don’t know, or longer equations or formulas, and then continually reviewing all of them over the semester.
Practice a lot! The wonderful violinist Jascha Heifetz had this to say about practicing music:
If I don’t practice one day, I know it; two days, the critics know it; three days, the public knows it.
In some ways, Maths is very similar.
- Moreover, doing tiny bits of math every day truly adds up: a nice mathematical analogy is that
- I.e., a tiny bit of extra work/studying/review every day (in this equation, an extra 1% over a year) multiplies your skill level many times over.
- Explain concepts and teach them to others: A great way to learn (anything) is to try teaching it to someone else. This is especially true in Math, since communicating your solutions and process is a huge component. If you stumble a little in your explanation of some particular concept, that is a great way to diagnose and pick out areas you can work on (e.g. re-studying the section, working on more problems, etc).
- If none of your friends jump at the opportunity to hear about wonderful Maths all of the time, it can also be useful to try recording yourself explaining/summarizing a concept!
Use multiple books and notes. For most undergraduate topics, there are many “standard” references. Use them all! Cross-reference liberally as well.
Get the definitions down cold. Record every single definition you come across and just do whatever you have to do to memorize them! Some people like flashcards, I make a “dictionary” document for each subject. Meaning and understanding is often a gradual process, but knowing the full statement of a definition should just be automatic.
- I like to think of definitions as the analog “multiplication tables” within higher Mathematics – is it essential to memorize? Well no, but you also wouldn’t want to waste time stopping to multiply out when you’re trying to solve an integral.
Synthesize often. This includes things like revising class notes, making your own “cheat sheets”, writing up explanations of particular theorems or motivations for certain concepts, etc. Even better, find ways to give talks or teach other people. Present things as if you were trying to teach yourself the topic 6-12 months in the past.
Google for notes. For just about any topic at any level of specificity, someone has probably written up notes or expository articles and posted them online. So it can be extremely beneficial to look through the first page or two of Google results using filetype:pdf for any concept or proof you happen to be studying and see how other mathematicians think about and present them.
Work and rework many problems and proofs. Do more than you are assigned, but be judicious with your time. If you stare at a problem for more than an hour or two without making progress, pivot. Sometimes the best way to make progress on a problem is to take a break, work on something different, or sleep on it.
Work the exams. If possible, do them in a timed setting.
Maths is cumulative: Previous classes tend to be broken up: you’ll use a concept from a unit, then move on to something else. At the university level, we start bringing together all kinds of tools from previous sections/courses and using them to build more complex things. The more tools you have in your tool belt (that you remember how to use!), the easier things will be.
- On the other hand, something complicated can be much more complicated if you’re rusty with a concept from an earlier section. So continually “honing your old tools” with practice becomes very important (reviewing notes, looking back over old homework, reworking old problems, etc)
For Incoming (First Year Undergraduate) Math Majors
Start thinking about whether or not graduate school is an option. You don’t have to decide within your first year, but you’ll want to pick courses accordingly.
Get an idea of what Math is all about - there are great things beyond Calculus!
- To get an idea of what you’re in for as a Math major, take a look at the GRE Mathematics Subject Exam. It covers a broad array of pretty standardized topics.
- Also take a look at Garrity’s book (linked in the resources section) for a short, condensed survey of some of the major topics and theorems you’ll encounter.
- One thing that was helpful to me was to make graphs and diagrams of different areas of Math I encountered. Take a look, knowing the landscape you’re traversing is valuable.
Learn $\LaTeX$ and Mathjax early, and then make efforts to regularly typeset your written notes.
It may be intimidating, but try to find ways to talk to your professors outside of class. Go to office hours, and don’t hesitate to ask for advice related to Math or your academic career. In my experience, they are usually happy to talk about these kinds of things.
For those aiming for grad school, particularly in pure Math: here are what I would consider some of the most essential, core classes to take:
- Calculus (of course)
- Linear Algebra
- Ordinary Differential Equations
- Abstract Algebra
- Real Analysis
- Point-Set Topology
Here are some “nice-to-haves” – still important, still beautiful, and great electives, but missing out on them in undergrad isn’t the end of the world:
- Complex Analysis
- Number Theory
- Discrete Math (e.g. Graph Theory)
- More Linear Algebra (e.g. Numerical Analysis)
Of course, I recommend taking as many Math courses as possible – explore the subject and discover what you like! But the ideas and concepts from these particular courses are relevant to just about any area you might go into, so having some exposure to them makes life much easier (regardless of what you pursue).
The Math Subject GRE
If you are thinking about applying to graduate school in Mathematics (pure or applied), I would recommend that you start looking at the material for this exam within your first few years, and take it as soon as your Junior year.
Note that the Math Subject GRE is vastly different than the Math portion of the General GRE. The latter covers primarily high-school level mathematics and requires no courses beyond Calculus (although the questions can still be tricky). The former is over 50% Calculus, and often includes a wide variety of upper-division topics as well. Many sources confuse these two exams!
Single Variable Calculus
Ordinary Differential Equations
- Primarily groups and rings, virtually no module or Galois theory.
- Convergence of sums/sequences, topological properties of .
- Graph theory, counting problems
Set Theory and Logic
- Most problems don’t require extensive computations; there is usually a trick that solves it very quickly.
- Time is the most difficult factor, be sure to take timed practice tests. You have right around two minutes per problem.
- Sign up early, as these exams are often only held a few times per year. | s3://commoncrawl/crawl-data/CC-MAIN-2021-04/segments/1610704795033.65/warc/CC-MAIN-20210126011645-20210126041645-00606.warc.gz | CC-MAIN-2021-04 | 8,989 | 65 |
https://www.discudemy.com/python/just-enough-python-for-big-data-and-machine-learning | code | Free Udemy Courses and Zero Broken link.
The only website where expired courses are deleted.
Just Enough Python for Big Data and Machine Learning
Sorry Guys... You are late. This coupon Expired. You can look another course | s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320300289.37/warc/CC-MAIN-20220117031001-20220117061001-00228.warc.gz | CC-MAIN-2022-05 | 222 | 4 |
https://community.airtable.com/t5/automations/email-notifications-issue-when-new-form-is-submitted/td-p/180932 | code | I'm trying to set up automations so that each time a new form is submitted, an email notification is sent to 4 different email addresses. However, I get this error message: "Cannot email non-collaborators on the current billing plan." The problem is that the email addresses are from my bosses, who are the ones actually paying for the Airtable plan, so I don't understand why they are considered non-collaborators?
I appreciate the help on this issue, I'm new to Airtable.
Hi @MariaMaidana , this is super easy easy to accomplish with zzBots. I have created a Bot Pack that sends an email on new records in Airtable. You will need to edit the bot and specify all 4 email addresses and the message after the install. | s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817674.12/warc/CC-MAIN-20240420184033-20240420214033-00653.warc.gz | CC-MAIN-2024-18 | 716 | 3 |
https://cfe.dev/events/mixed-reality/ | code | In virtual reality, we replace the user’s physical world with another entirely. This has important use cases. However, augmented reality and mixed reality applications build upon the user’s real-world environment to create a hybrid reality where real world objects and virtual objects coexist. This opens up a whole new set of application possibilities where the user can still interact with their surroundings, but enhanced with information.
In this session, Ayşegül Yönet will explore VR, AR and Mixed Reality. She’ll show you what they are, what they are useful for and how to get started with them.
Exploring Mixed Reality for Good
Is VR going to happen? Is Augmented Reality just a buzzword? What is this Mixed Reality anyway? What can Mixed Reality offer that other mediums can’t? Join us if you are wondering what good can Mixed Reality technologies achieve and how to get started creating them.
Senior Azure Cloud Developer Advocate at Microsoft
Aysegul is a Senior Azure Cloud Developer Advocate at Microsoft. Aysegul, focuses on Spatial Computing, Mixed Reality, AI, Angular and Data Visualization. She is a Google Developer Expert for Web Technologies & Angular and an active conference speaker. She previously worked as Senior Software Engineer at Nrwl.io, Autodesk Play, a 3D and VR authoring tool and A360 Viewer and A360 Drive. She enjoys teaching at a variety of non-profit organizations aiming to increase diversity in the software industry. She is the co-founder of code4good, an organization with the goal of helping people to contribute to open source. Previously she led Women Who Code meetups, Girl Develop It workshops and was a CTO at AnnieCannons, a bootcamp dedicated to teach tech skills to human trafficking survivors. | s3://commoncrawl/crawl-data/CC-MAIN-2020-34/segments/1596439735823.29/warc/CC-MAIN-20200803170210-20200803200210-00217.warc.gz | CC-MAIN-2020-34 | 1,757 | 6 |
https://en.gyoumagazine.com/article/introduction_to_plasma_media_center_for_kde_linux | code | - What is KDE Plasma in Linux?
- What is KDE Plasma based on?
- How do I run KDE Plasma?
- Is KDE Plasma open source?
- Which is better KDE or Gnome?
- Which is better KDE or XFCE?
- Is KDE a lightweight plasma?
- Is KDE lighter than XFCE?
- Is Ubuntu Gnome or KDE?
What is KDE Plasma in Linux?
Plasma is a Desktop. Use Plasma to surf the web; keep in touch with colleagues, friends and family; manage your files, enjoy music and videos; and get creative and productive at work.
What is KDE Plasma based on?
Kubuntu is an Ubuntu-based operating system featuring Plasma 5 and KDE apps. It is available in long-term support and more frequently-updated versions.
How do I run KDE Plasma?
How to Install the KDE Plasma Desktop on Ubuntu 18.04 LTS
- Step1: Install Tasksel; a prerequisite for installing Kubuntu. The tasksel command line tool for Ubuntu helps you in installing multiple related packages as a collective task. ...
- Step 2: Install Kubuntu Desktop. ...
- Step 3: Restart your system to login to KDE Plasma.
Is KDE Plasma open source?
KDE is an international team co-operating on development and distribution of Free, Open Source Software for desktop and portable computing. Our community has developed a wide variety of applications for communication, work, education and entertainment.
Which is better KDE or Gnome?
GNOME vs KDE: applications
GNOME and KDE applications share general task related capabilities, but they also have some design differences. KDE applications for example, tend to have more robust functionality than GNOME. ... KDE software is without any question, far more feature rich.
Which is better KDE or XFCE?
As for XFCE, I found it too unpolished and more simple than it should. KDE is by far better than anything else (including any OS) in my opinion. ... All three are quite customizable but gnome is quite heavy on the system while xfce is the lightest out of the three.
Is KDE a lightweight plasma?
KDE. KDE is one of the most popular desktop environments out there. You may also refer it as the “Plasma” desktop. Even though it's not my primary choice, it is highly customizable and extremely lightweight.
Is KDE lighter than XFCE?
Also, they've highlighted an article by Jason Evangelho at Forbes where some benchmarks reveal that KDE is almost as light as Xfce.
Is Ubuntu Gnome or KDE?
Ubuntu used to have Unity desktop in its default edition but it switched to GNOME desktop since version 17.10 release. Ubuntu offers several desktop flavors and the KDE version is called Kubuntu. | s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656104678225.97/warc/CC-MAIN-20220706212428-20220707002428-00390.warc.gz | CC-MAIN-2022-27 | 2,526 | 31 |
http://cacm93.com/exec-format/guide-exec-format-error-exec-of-failed-python.php | code | On the plus side I can't see Would probably settle for lower AA and it will work fine. Are you usingsuggestions and answers.Any help would exec could be, or any suggestions for me to try.
However, it's a see if that is a nice middle ground. Even if you replaced the card, error have a peek here 12V rails is decent enough. failed Exec Format Error Mac Again after some research it looks like clear the CMOS? Thanks in advance. Should just be error > Manage > Disk Management.
I have used a PSU calculator, which reconnect that the problem occurs. OCing will be of I installed a new pci card.When I start up my laptop, etc... try the monitor on another system.
Few more basic units HDD Regenerator and it says there are no errors. Does anyone have any ideas on what thisproblem is your video card or motherboard. Python Subprocess Exec Format Error Either you'd have to settle format devices are listed.Have her pull the batterythe thing is squeaky clean.
I also plan on deleting the MBR,doesn't mean it has the latest updates installed.The computer, a Gateway NV78 8 Exec Format Error Exec Of Failed Have you taken the system elsewhere and with what information. I can't even format cause my CD-ROM isn't working... I would also try a new video cable. I'd likeserviced under warranty I'm trying to diagnose a problem for a friend.
Change that andto NVIDIA as well.Looks like it isyou can't run 2560x1600 from all outputs.Mid sized battles exec what is wrong with a laptop I bought.If I add in the extra 30% usually http://cacm93.com/exec-format/repair-exec-format-error-exec.php a USB but I'm not sure its do-able..
I need new DisplayPort inputs, of course.But HDD Regenerator saidbelow the required 2560x1600 that you are after. Many thanks. What version of http://stackoverflow.com/questions/26738221/8exec-format-error-exec-of-failed-centos to get a dual-slot Eyefinity card that can drive 6 2560x1600 monitors.I have scanned the entire HD thoroughly with exec in and have the system boot properly?
I'm also open to see if that makes any difference. If you have no luck with this, return the laptop or have itall, I await your replies.As a final solution, is there format for 1920x1080 or find another solution.They will be used as a massive desktop, low you may experience problems.
Any amount will prove the point--even 512MB. failed for 6 monitors at that resolution.Flywelder 2-17-2011 First request reboot instead of freezing. Exec Of Anaconda Failed Exec Format Error FPS sitting over base with only workers present.Everything works fine, windows, icons, start up mostly for 2D stock charting, web pages, spreadsheets, etc.
My thought is maybe http://cacm93.com/exec-format/answer-exec-format-error-python-windows.php is on a SATA line to the mobo.Hopefully someone with hands on experience can provide some more fine as well.DirectX 10 or 11 doesand download the video driver for your model laptop.Hi, I'm looking for some help figuring out failed drops to 18-20.
Thanks, -TC Theoretically all Windows Updates? None of the Perl Exec Format Error that tells me the OS is valid. Just because the laptop is new, thisfrom Micro Center in Houston brand new.The 35A on the find hardware updates automatically.
I have a 3rd hard drive thatStorage Drivers I have a Dell 19" monitor connected to my compaq tower.Can anyone help me(30+) drops to around 150.Set AA to 16x Box Setthey're absent if I turn off aero.All other settings to highest quality settings 30-35your system may still have something wrong.
If the efficiency is http://cacm93.com/exec-format/guide-exec-format-error-aix.php a way to format using a USB?I purchased the laptop in December 2008this for the last 3 days.Have you applied AF to 16x Tessellation to AMD Optimised. I got a XP SP3 ready on Ruby Exec Format Error compared to no AA and AF.
The video card went out, so Cards at default of 725/1000 at the moment. I've been trying to fixthe boot order sequence in your BIOS.I then went to Computer the HD is dodgy? Windows Update might>=600W power supply. still I have the NAT problem.
I have the sticker on the laptop CD/DVD drive you are hearing? Could this actually be theto Dual-Link DVI converters or anything like that. It is only when I Php Exec Format Error the drives will appear in My Computer. python How can I leave the SATA pluggedExplore them, everything works perfectly.
If I were you I would look into getting a Warner providing the internet. Little coloured squares appear everywhere under aero,success? Will these cards run on Windows 7? HDMI 1.3 is Exec Format Error Docker laptop, is not starting up properly.If you still have issues, thethink they have anything that can drive 6 monitors.
Reading some info about Nvidia solutions, I don't your PSU will do ok. Also see if this might help How to Cleanup and Remove old USBfor help, hopefully I'm posting in the right place. Not sure about a Nvidia setupand disconnect the AC adapter. Cheers! Go to the Asus support website be greatly appreciated.
Little bit jumpy scrolling around a desktop or laptop? Some outputs are going to max out not really matter to me. Sometimes it will recommended, my PSU does not make the cut.I have Time very tight call.
I am able to Vista home premium SP2. I greatly appreciate all help, thank you to Windows and Service Pack level is installed? | s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267159193.49/warc/CC-MAIN-20180923095108-20180923115508-00039.warc.gz | CC-MAIN-2018-39 | 5,317 | 19 |
http://travel.stackexchange.com/questions/tagged/barcelona+berlin | code | to customize your list.
more stack exchange communities
Start here for a quick overview of the site
Detailed answers to any questions you might have
Discuss the workings and policies of this site
Hiring a car in Berlin and dropping it off in Barcelona for a road trip
I am planning on a road-trip from Berlin to Barcelona. I am most interested in knowing if I can hire a car in Berlin and drop it off in Barcelona. (also, if anyone has tips on routes to take that is ...
May 1 '12 at 11:53
newest barcelona berlin questions feed
Hot Network Questions
Distributing powers on complex numbers
Why would SELECT * be magnitudes faster than SELECT foo?
Why is it that Draco and Harry don't get along?
Could Khal Drogo's Khalasar really have defeated the Iron Throne?
Break the popularity contest crypto
Can a 6th level character do forced march forever?
The Rock, Paper, Scissors, Lizard, Spock Tournament of Epicness
What PC parts can produce bright flash, and smoke, with the PC still appearing to work fine afterwards?
What hazardous wildlife is there in the UK?
How to survive the heat in regions with very high temperature?
When does -1 have a squareroot in a finite field? (-1 as a quadratic residue)
How to take a cold shower
Can I cycle to Frankfurt Hahn airport from Koblenz?
Rearrange pixels in image so it can't be recognized and then get it back
What happens to lactic acid I eat?
Check enumsets for same enum values
How can I test if a variable is empty or contains only spaces?
"Do Not Disturb" tags in hotels, how can they be improved?
why Level does not sort output according to their levels
Is there good ways of distributing pregen characters?
What happened to Cornelius Fudge after he resigned from his post of Minister for Magic?
Generally speaking, is it better to make all the functional parts or get UI working first - or a mix of the two?
How does a language expand itself?
more hot questions
Life / Arts
Culture / Recreation
TeX - LaTeX
Unix & Linux
Ask Different (Apple)
Geographic Information Systems
Science Fiction & Fantasy
Seasoned Advice (cooking)
Personal Finance & Money
English Language & Usage
Mi Yodeya (Judaism)
Cross Validated (stats)
Theoretical Computer Science
Meta Stack Exchange
Stack Overflow Careers
site design / logo © 2014 stack exchange inc; user contributions licensed under
cc by-sa 3.0 | s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1406510260734.19/warc/CC-MAIN-20140728011740-00166-ip-10-146-231-18.ec2.internal.warc.gz | CC-MAIN-2014-23 | 2,333 | 51 |
http://www.homebrewtalk.com/f11/burners-450976/ | code | What is the big deal about bringing your wort to a boil so quick.
TIME! It also means your not under powered and will get a good rolling boil.
Could be hours on your brew day. Also, it's tough to get larger batches (full boil 5+ gallons) to a boil on a home stove, and almost impossible with 10 gallon unless you have a very powerful stove.
Brewguyver - the man who does everything wrong so you won't have to! | s3://commoncrawl/crawl-data/CC-MAIN-2014-52/segments/1418802769321.94/warc/CC-MAIN-20141217075249-00144-ip-10-231-17-201.ec2.internal.warc.gz | CC-MAIN-2014-52 | 409 | 4 |
http://docs.paytomorrow.com/docs/Integration/Shopify/ | code | Please Install the following Apps to Install PayTomorrow:
- The PayTomorrow Application
- The PayTomorrow Payment Application
To be able to use PayTomorrow as a Payment gateway please make sure that the customer can only checkout with email. To do that, go to
Settings -> Checkout and select customer can only check out using email:
1. Installing PayTomorrow Application
To install our application copy-paste the below url in new browser tab and replace YOUR-HOSTNAME (for example ****.myshopify.com)
you can find your hostname from your website url :
2. Installing the PayTomorrow Payment Application
open the below url in your browser and click Add app, After Logging into your store install our Payment Application.
- After installing the payment Application please go to
settings -> payment provider -> Alternative payment methodsfind PayTomorrow and click on manage.
- Submit your API username and API password in manage screen. You can find your API credential under resource tab in your Paytomorrow merchant DashBoard .
- Enable test for testing purposes.
PayTomorrow API credentials
We have different API Signature and Shopify username for staging and Production.Please make sure to use appropriate credentials.
3. Monthly Price Estimator (MPE)
- Appends PayTomorrow's estimated monthly price to the desired CSS selector and adds an iframe that will be displayed when a user clicks on the monthly price
- To activate the MPE please go to
Apps -> PayTomorrow -> Monthly Price Estimator
- NOTE: You have to gey you Public Id from PayTomorrow dashboard or contact support
- For more details about Monthly Price Estimator you can check Monthly Prce Estimator section in documentation under Marketing Tools
NOTE : Please don't test anything before completing the process. Please do some testing before going to production.
4. Processing transactions in Shopify
When a customer completes a checkout with PayTomorrow as the payment method.PayTomorrow authorizes a charge for the amount of the order. The charge enters as Ready For Settle Status in PayTomorrow Dashboard.
After PayTomorrow authorizes a charge, you can perform the following actions on it in Shopify : Capture, Void or Refund
- Capture After clicking on capture you will see:
Capturing a charge does the following:
=> Begins the customer's billing cycle
=> Triggers the transfer process of funds from PayTomorrow to the merchant
NOTE : Merchants should capture a charge after fulfilling the order.
If you haven't yet captured a charge, you can cancel its authorization by voiding it (cancelling the order).
If you've already captured a charge, you can reverse it and refund the amount. Please note that we don't accept partial refund the amount should be the full amount of the order. | s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656103344783.24/warc/CC-MAIN-20220627225823-20220628015823-00519.warc.gz | CC-MAIN-2022-27 | 2,750 | 33 |
http://www.verycomputer.com/153_660c6a56593d18f6_1.htm | code | I'm connecting an IBM Network Printer model 12 to a PC attached to the
AS/400 via client access express. The printer has two paper drawers,
and appears to be configured correctly.
However, when I print something from Officevision where I have the
capability to print the first page from drawer 1, and the following
pages from drawer 2, the printer ignores that and prints all pages
from drawer 1. I've set the properties on the printer, and the device
description it created on the /400 shows it has two drawers...
Any suggestions? I'm replacing some older IBM 4019 models which
worked perfectly. It's frustrating when we have a 10-year old printer
that works seamlessly and we get a new one and can't configure it to
work correctly at all. | s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296945333.53/warc/CC-MAIN-20230325130029-20230325160029-00195.warc.gz | CC-MAIN-2023-14 | 740 | 12 |
https://marinequitycoalition.org/is-hostgator-better-than-godaddy/ | code | Is Hostgator Better Than Godaddy
In 2002, HostGator was founded by Brent Oxley in his dormitory at Florida Atlantic University. The firm has grown significantly since then and also remains to do so, time after time. Their logo is “We consume the competitors.”Is Hostgator Better Than Godaddy
Today, HostGator has head office in both Austin and also Houston, Texas, after growing out of numerous various other websites. In 2007, their Brazil workplace was opened. HostGator has won great deals of awards for assistance and hosting services.
An EIG Owned Green Host In June 2012 HostGator was gotten by the Endurance International Group (a business that additionally owns many other hosting providers apart from HostGator). However, it remains to trade under the HostGator name.
HostGator is a green energy company. The business purchases Green-e accredited Renewable Energy Credit scores (RECs) from a wind ranch in Texas. 130% eco-friendly energy cools and powers all shared and also reseller web servers.
We may gain a commission– at no additional price to you– if you make a decision to acquire any one of the items, software application or services we describe as well as promote on our web site. The point of views revealed are of our own independent reviewers & writing personnel, appointed to supply helpful testimonials & their impartial point of view.
You need to presume that every external link that you click on our internet site is an associate web link that leads to us being paid by a partner of ours.
Introduction of HostGator’s Leading Features
Whenever there’s a conversation about web hosts, the name HostGator is bound to find up, as well as with great reason. Is Hostgator Better Than Godaddy
Having been around for greater than a decade, HostGator can be stated to be one of the most relied on and also identified webhosting. It masters numerous areas including customer support, organizing adaptability, uptime, shared organizing, plus a lot more.
This quality in numerous facets of web hosting coupled with the firm’s experience, array of features, as well as performance makes HostGator a wise option for any internet site proprietor.
What Perks Do You Get?
HostGator uses a series of plans. If you’re struggling to choose on which strategy to pick, consider these features, which we’ll go over listed below:
- You manage your account making use of cPanel, the industry-standard interface
- To keep your account safe, you get a free Secure Sockets Layer (SSL) certificate
- If you want to raise protection as well as malware scanning, you will certainly need to purchase SiteLock
- Also the entry-level shared hosting strategy features support for unrestricted email accounts
- Regular monthly payment choices are offered
- One-click installs, even from the fundamental planIs Hostgator Better Than Godaddy
- Accessibility to the web site builder– at an expense
- A Content Delivery Network (CDN) maintains your site fast
- Numerous assistance alternatives including online conversation
With all the various other host service providers that are available, why select HostGator? Well, the reality is that no solitary webhosting is ideal. So, whether you’re a newbie web designer or are wanting to change host, right here’s a glimpse at the excellent and also the negative of HostGator to assist you make the ideal choice.
HostGator’s Hosting Plans
Among the best attributes of HostGator is the reality that the business offers flexible plans that leave users (both large and tiny businesses/blogs) with lots of space to grow.
One of the most standard of the bundles, the “Hatchling Strategy,” comes with assistance for one domain name, unlimited bandwidth, disk area, data sources, shared SSL certificate, plenty of e-mail addresses, and also support for third-party applications like content management systems.
Other shared hosting strategies improve this Hatchling plan by adding extra attributes such as unlimited domain names, personal SSL certificate, as well as a toll-free contact number (simply among others.).
VPS as well as Committed Hosting Plans.
Additionally, if you need more power, or have particular requirements that shared web servers can not fulfill, there’s the option of more advanced packages such as VPS and also Devoted server strategies. The greatest rate VPS plan provides 8GB RAM, 240GB storage, and month-to-month information transfers covered at 3TB.
Devoted web server bundles, on the other hand, can be customized with approximately 16GB of RAM, 25TB of monthly data transfers, as well as an excellent 1TB of storage.
HostGator likewise supplies Cloud as well as WordPress hosting, which we go into below. You can constantly check out HostGator’s main web page to find the most updated hosting plans on offer as well as their specifics.
The company also offers WordPress organizing with the most inexpensive plan enabling one website with as much as 100,000 site visitors every month. The most affordable WordPress plan likewise includes 1GB back-ups. Higher-end plans permit approximately 3 sites and up to 500,000 visitors monthly.
On the other hand, the top WordPress hosting strategy additionally allows for as much as 3GB in backups.Is Hostgator Better Than Godaddy
Lots Ahead of Its Competitors
All WordPress organizing plans include optimized cloud style, low-density servers, CDN, and also numerous caching layers which indicate that websites load up to an alleged 2.5 times faster than competitors.
HostGator specialists are likewise available to offer a totally free movement solution and also premium assistance in case anything breaks.
What Regarding Performance and also Uptime?
HostGator guarantees a 99.9% uptime and also has the resources to back it up.
Powered by Hundreds Of International Servers.
Among the largest as well as most preferred webhosting, HostGator has countless web servers under its management.
HostGator web servers are checked 24/7 by on-site technological team. Secured Facilities for Connection of Service. Along with being tactically situated across the world, these servers use high qualityserver hardware as well as are housed in modern data centers that take all the essential measures (UPS battery back-up devices, top-tier HVAC systems, constant framework surveillance, fire defense systems, etc.) to guarantee performance continues to be perfect and nonstop.
Thanks to these first-rate information facilities and also their critical areas, HostGator offers dependable, high quality performance that never lets down.
Uptime and Speed
HostGator has an over 90% client contentment (from a June 2008 consumer complete satisfaction study). HostGator maintains approximately 99.9% uptime. And in addition to the reputable uptime, HostGator also delivers adequate load times with speeds ranging from 22 to 940ms depending upon the browser’s location.
Exactly How Good is HostGator’s Consumer Assistance?
When it involves consumer support, really couple of web hosts can compete with HostGator’s customer service. The business even has awards to confirm this reality. For general inquiries and concerns, you can use HostGator’s email support, which is constantly readily available, social media support on Facebook, Twitter, Google+.
When you enroll in a HostGator strategy, you can request a complimentary web site transfer.
Or look for solutions from the firm’s extensive knowledgebase, which contains FAQs, practical write-ups, and video tutorials that walk you with some of the controls. HostGator additionally uses a forum where you can ask inquiries as well as answer those presented by various other individuals of the web host.
Alternatively, if you need a little bit more instant assistance, or are experiencing a problem that needs unique focus, HostGator has consumer assistance agents on standby 24/7/365 ready to help you with whatever concerns you might have.
These representatives can be gotten to by phone or live conversation.Is Hostgator Better Than Godaddy
Is There a Money-Back Guarantee?
No locked-in agreements and a 45-day money-back assurance. Suggesting if you choose to cancel within the initial 45 days of signing up with, you get a complete reimbursement, no doubt asked.
Holding Free offers.
Further making HostGator an excellent catch is the truth that the host throws in a few added attributes with their different organizing plans. For instance, each holding plan comes with a number of giveaways.
You get a totally free site builder and internet site structure devices, endless transmission capacity and disk room, over 4,000 site templates, complimentary domain name transfers, and endless MySQL databases.
Various other bonus that you can anticipate with HostGator consist of:.
- $ 150 worth of Google Adwords or Bing/Yahoo advertising debts.
- Totally free site transfers when you wish to move your site from another host to HostGator. As well as the best component is that your site can be updated during the transfer at no charge. Nevertheless, the said migration needs to be done within 1 month from the day you register.
- A cost-free domain name for the very first term when you transfer and also set up a brand-new account.
- 1-click installs offered for all significant open-source jobs such as WordPress, Magento, as well as Joomla.
- A 45-day money-back guarantee for all HostGator holding strategies. Many web hosting business only offer you a 30-day window to cancel your account and get your refund.
- A getting-started e-mail with links to all of the resources you will certainly need to build your website as well as get it up as well as running.
What are the Benefits and drawbacks of HostGator?
So, is HostGator the right webhosting for you?
Well, given the truth that HostGator provides you a straightforward method to build and handle your site, provides you with all the sources you’ll need to supply high-level services on your website, provides several feature-packed holding packages, and brings a lots of experience to the table, it can be an excellent host for anyone with a website.
A Lot Of Pros
HostGator offers several advantages including:.
- Reliable uptime and quick response times.
- Budget friendly holding strategies.
- Lots of room for growth.
- The option of cloud hosting.
- Adaptable email administration.
- Free shared or private SSL certification on all holding packages.
- Generous 45-day money-back warranty that gives clients assurance.
- Comprehensive Knowledgebase.
- No limitation on bandwidth, disk room, and emails.
- Rock-solid protection.
- Free Weebly website builder.
- A terrific control panel with a ton of attributes ranging from a web-based file supervisor to more advanced functions such as cron work, picture supervisor, mistake logs, as well as apache trainers.
Additionally, HostGator has a big data base with answers to almost any type of inquiry you could have ranging from the most basic to one of the most advanced. So, when the consumer assistance group takes too lengthy to answer, you can seek out the remedy to your problem from this knowledgebase.
What Are the Cons?
As for the negatives of the company, you’ll just need to take care of the issue of regular backups, slow-moving client reaction times (according to several of the host’s customers), an innovative cPanel that calls for some getting utilized to, and no one-stop WordPress import.Is Hostgator Better Than Godaddy
Try Without Commitment
Given that HostGator has a great deal to like and also very couple of things to dislike, you ought to absolutely try the company if you own a website or plan to develop one.
If the host does not make a good fit for your internet site, the 45-day money-back warranty on offer will certainly allow you to leave without shedding money. | s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323587655.10/warc/CC-MAIN-20211025061300-20211025091300-00602.warc.gz | CC-MAIN-2021-43 | 11,781 | 85 |
https://www.aoxunsoftware.com/news/office-2019 | code | Highlights of the new Office 2019:
First of all, Office 2019 adds a lot of interface effects animation, and label animation is one of the most attractive ones. That is, when you click on a Ribbon panel, Office will automatically pop up an animation effect. Gives a feeling of smooth interface switching. Secondly, in the new version of Office 2019, Excel 2019 has several new functions built in, such as “IFS” multi-condition judgment, “CONCAT” multi-column merge, etc., which is more convenient to use. In addition, Office 2019 can also insert icons online, so you can insert icons with the same key as inserting a picture. The most important function is that all the icons can be directly changed with the PPT color filling function, and even after the split, the color is filled. In addition, it is worth noting that Word 2019 adds an “immersive learning mode” under the “View” panel, which can adjust the page color, page width, etc., to make the file more convenient to read. In fact, there are many other improvements in the Office 2019 version, and with the development of technology, the future changes in Office functions are also worth looking forward to. | s3://commoncrawl/crawl-data/CC-MAIN-2019-51/segments/1575540499439.6/warc/CC-MAIN-20191207132817-20191207160817-00084.warc.gz | CC-MAIN-2019-51 | 1,181 | 2 |
https://erncip-project.jrc.ec.europa.eu/events/14-may-2020-early-warning-zones-meeting | code | The ERNCIP thematic group (TG) on Early Warning Zones (EWZ) recently has explored the technical and operational issues associated with providing an early warning zone around critical infrastructures (CIs) and drafted a comprehensive report.
As a follow up action, ERNCIP suggests that the TG EWZ should look at topics that have been flagged as being of high interest to EC policy makers
- Unmanned aircraft systems (UAS) and other unmanned systems for critical infrastructure protection
- Use of UAS and other unmanned systems in securing CI
- Establishing the trustworthiness of UAS and other unmanned systems for CI relevant tasks, including CI security
- UAS threat mitigation to CI
- Artificial intelligence and automated sensors for critical infrastructure protection
- State of the art on the level of maturity of AI application for CIP
- How to improve the usage of such technologies by CI operators
- Data protection and privacy
During this meeting possible use cases to be examined in the reports to be drafted will be discussed and defined. | s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446710711.7/warc/CC-MAIN-20221129200438-20221129230438-00392.warc.gz | CC-MAIN-2022-49 | 1,050 | 11 |
http://cloudyshrimpy.blogspot.com/2010/05/ | code | Relation decoupling problem
When doing the migration, there are lots of complex join/ cross table selection query, or views which implemented by such kind of query
1) To migrate such kind of data, seems we need to re-model the database, get rid of the relation in the database, and move these kind of logic to be application logic (code implementation).
Similar to Ruby On Rails, they handle all the relation in coding logic, database level relation is not a must.
2) Pre-Process relation, and keep all these result in database, when certain query come, server can return data right away.
This approach looks like some kind of data warehouse. Which might only suitable for application only do read action mostly.
But it doesn`t mean we cannot do write action.
We can ask the application direct request to another server which particularly design for writing data.
The only drawback is that, the result might not be able to display in a instance manner. It depends on how agile my “Process Engine” can be. | s3://commoncrawl/crawl-data/CC-MAIN-2017-22/segments/1495463607245.69/warc/CC-MAIN-20170523005639-20170523025639-00231.warc.gz | CC-MAIN-2017-22 | 1,008 | 9 |
https://github.com/YunoHost/yunohost/pull/624 | code | Join GitHub today
GitHub is home to over 31 million developers working together to host and review code, manage projects, and build software together.Sign up
[enh] add systemd logs #624
Some apps don't provide log files.
I have added the possibility to use systemd log (with journalctl)
I either have to create a migration file to update the file
How to test | s3://commoncrawl/crawl-data/CC-MAIN-2019-09/segments/1550247522457.72/warc/CC-MAIN-20190222180107-20190222202107-00023.warc.gz | CC-MAIN-2019-09 | 358 | 7 |
http://phpuserframewor.sourceforge.net/ | code | Introduction to PHPuserFramework
PHPuserFramework is the name of a project that was created to offer a solution for applications with the following requests:
- It is PHP based, so it can used for developping applications for web sites.
- It offers a basic user administration with different user levels (i.e. user, admin)
- It allows to define a basic layout.
- It allows to participate two or more programmers.
- Programmers only work on their applications.
- It uses a plugin mechanism to include applications.
- It must be scalable by extending with further applications.
PHPuserFramework is designed to fulfill these requests. It uses only one script that manages the user login, initializes existing applications, calls up the right application (if requested for) and returns the layout with the appropriate content.
In common, this system uses known ideas like templates and classes in a way that makes it easy for programmers to develop new applications. The main script capsules the system layout into templates that can be adapted to your own wishes. The applications are capsuled into classes and separated into defined directories. For common functions (i.e. user administration, database connections) there are also classes that will be given to each application to work with.
This technology results in these advantages:
- Developers needn't care about the main layout they only define the layout of their application.
- Through the capsulation of applications several programmers are able to work on their applications without disturbing each other.
- There are defined "interfaces" that enables application classes to be automatically plugged in.
- There is a small user interface that can easily be extended.
- Through the database interface it is possible to connect to other databases. At this time there is only a definition for MySQL
- It is easier to change the site layout because there is no layout code into the script | s3://commoncrawl/crawl-data/CC-MAIN-2018-22/segments/1526794867559.54/warc/CC-MAIN-20180526151207-20180526171207-00387.warc.gz | CC-MAIN-2018-22 | 1,942 | 18 |
https://communities.intel.com/thread/45992 | code | 1 of 1 people found this helpful
This is a response from 2 weeks ago to this same question...from Intel. Thought I would throw this in, since it appears that Galileo needs driver support in order to work with JTAG devices (I have altered it a bit for clarity):
The problem is with the software on this and not the hardware, for example you can use the hardware debuggers below with Galileo (and probably dozens of other cheap ones that haven't been tested.)
I wrote openocd code for Quark X1000 to run with these debuggers, give me a few weeks and I should have it ready for consumption
Then you just use GDB/Eclipse or whatever GUI you want on top
and use one of these, Galileo has a small 10 pin connector, so maybe order yourself one of these in advance:
<Disclaimer, I work at Mouser. > If I get anything on where this gets posted, I'll post it here later. | s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267156690.32/warc/CC-MAIN-20180920234305-20180921014705-00393.warc.gz | CC-MAIN-2018-39 | 860 | 7 |
https://stratics.com/threads/love-misconception.124869/ | code | For some odd reason, I haven't seen any threads for the event that is going on this week, other than one complaining that they were murdered by event spawn and didn't know what was going on, and one that has devolved into a giant flame war over the distribution of EM items. So, I've made it to Despise, where I discovered a book that seems to essentially say "trooth iz rong verchoo u phayl lololol." Anyone else get anywhere? Usually by this time, there's an entire walkthrough on this forum. Edit: Well, I found a public runebook with everything in it, but I still have no clue as to what would lead you to the gargoyle. | s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886105341.69/warc/CC-MAIN-20170819105009-20170819125009-00450.warc.gz | CC-MAIN-2017-34 | 623 | 1 |
https://en.wikisource.org/wiki/A_Short_Biographical_Dictionary_of_English_Literature/Tucker,_Abraham | code | A Short Biographical Dictionary of English Literature/Tucker, Abraham
Tucker, Abraham (1705-1774). -- Philosophic writer, b. in London, and ed. at Oxf., was a country gentleman, who devoted himself to the study of philosophy, and wrote under the name of Edward Search, a work in 7 vols., The Light of Nature Followed (1768-78). It is rather a miscellany than a systematic treatise, but contains much original and acute thinking. | s3://commoncrawl/crawl-data/CC-MAIN-2018-22/segments/1526794866201.72/warc/CC-MAIN-20180524092814-20180524112814-00216.warc.gz | CC-MAIN-2018-22 | 428 | 2 |
http://www.comeaucomputing.com/thoughts/greg.comeau/ | code | Thoughts from Greg Comeau on C++, OO, Programming, Learning
(c) © 1990-2013 Comeau Computing. All Rights Reserved.
I have a number of thoughts I will be providing here from time to time.
The first set will be about books and learning C++.
I hope to have this available by summer 2000.
Check back soon for those details and other information.
Here's a first entry (July 23, 1999):
Why do some people say that C is still better than C++?
Can't they see that C++ is a superset of C, and that although C++ has additional features, it does not force you to use them?
Clearly languages can become "religious" for some folks, and so some people are just being biased. However, "pure" C definitely remains in play in areas such as:
IMO, (1) is the only real long term barrier for some projects, though (2) and (3) clearly
have economic ties that would be clearly impractical/prohibitive for
- Legacy systems
Some folks still need even K&R C.
- The cost of retraining (in C++) is not (yet) practical for some.
This often ties in with (1), but doesn't have to.
- The platform you are on does not have a C++ available.
This is clearly much less so than previously, but still valid in some cases (though we're always available to port Comeau C++).
- Culture/first language/etc.: Some people just love C and/or just don't like C++
On a strictly technical basis though, I agree with the initial questions.
Taking a literal perspective, C++ is not a true super set of C,
but from a practical perspective it is. Most ANSI C'd code
is also easily C++'d code too. For instance, all the code in
K&R's 2nd "ANSI C" edition of The C Programming Language
can be (and in fact was) compiled with a C++ compiler.
This then begs these questions/issues which come up often:
- Is there any C style which cannot be used in C++?
I don't know any. Therefore, it is immediately useful.
And in most cases, w/o a penalty.
- Is there not one thing in C++ that looks attractive to the C++ nay sayers?
I find it hard to believe that anybody would say no.
Again, this makes it immediately useful.
- Don't I have to use the OO parts of C++?
No, not at all.
- If I don't use C++ for OO, then what use is C++, why not just stick with C?
Let me elaborate on the previous response then.
No, you don't have to use the OO parts of C++ at all, though I wouldn't know why you wouldn't if it were
appropriate. C++ is often termed an OOL, however, I very much prefer
to say that's misguided and instead to say that C++ is a multi-paradigmed
language. And oh, BTW, one of those paradigms is OO. This is significant
because C++ also supports all the C styles, just data abstraction, plus generic programming, etc. Who are you to say what's best for something without knowing about it?
Consider a recent discussion I observed. In the discussion, one person said something along the
lines of that somebody wouldn't be much of a C++ programmer if they couldn't
write straight C code too. This met a response that if somebody used C++
just to write plain old C, then they still were not much of a good C++ programmer!
The latter person correctly pointed out that a good C++ programmer wouldn't
necessarily program like a good C programmer would.
Then again, neither person
brought forth the issue that we all have different needs to address in our | s3://commoncrawl/crawl-data/CC-MAIN-2017-39/segments/1505818689028.2/warc/CC-MAIN-20170922164513-20170922184513-00051.warc.gz | CC-MAIN-2017-39 | 3,293 | 49 |
http://cboard.cprogramming.com/cplusplus-programming/7835-cast-printable-thread.html | code | Is this a cast?
x = 1;
a = (float)x;
This is a very simplified example of what their doing, but I'm used to seeing static_cast<float>. What's the difference here?
Then, right below it, after initializing x to 0 again, they do this:
t = float(x) / 35.0f;
putting the paratheses around the variable instead of float.
My book says something to the effect that parentheses around the type or around the variable are equivalent and inherited from C. C++ includes the more explicit cast form static_cast<float> and is equivalent to the other two. | s3://commoncrawl/crawl-data/CC-MAIN-2015-48/segments/1448398464253.80/warc/CC-MAIN-20151124205424-00079-ip-10-71-132-137.ec2.internal.warc.gz | CC-MAIN-2015-48 | 540 | 8 |
https://www.brainkart.com/article/Technical-Constraints--Software-Architectures_11272/ | code | software architecture design, constraints come in two basic flavors - technical
and business. On most projects there are only a handful of constraints, but
these constraints are a highly influential architectural driver. Constraints,
as the dictionary definition above indicates, are a limiting factor and
severely restrict options for making design decisions. They are also fixed
design decisions that cannot be changed and must be satisfied. You could think
of constraints as the ultimate non-negotiable, "must have"
requirement. It is for this reason that architecture design constraints must be
created and accepted with care.
Anthony Lattanze of Carnegie Mellon University, author of the Architecture Centric Design Methodology and one of the ATAM creators, likens design constraints in software architecture to "load bearing walls" employed in traditional building architecture. Load bearing walls of a building are extremely strategic and strongly influence the shape and form of the building. What's more, once these essential walls are placed and bearing weight it becomes cost prohibitive to move them.
and business constraints are similarly load bearing. Many design decisions will
hang on fixed constraints, further cementing them into your system's design.
Adding a component or even refactoring architectural styles might be costly but
it can still be done. Deciding to jump from .Net to the JVM requires demolition
architecture design constraints are so important it's worth taking some time to
understand them in greater detail so you can properly deal with them when they
Technical Constraints in Software Architecture
constraints are fixed technical design decisions that absolutely cannot be
changed. Most often technical constraints are provided by stakeholders (perhaps
after some digging) at the outset of the project. Sometimes a team may choose
to create a constraint, perhaps to simplify the world in which they are
working. Regardless of the origin, these architecture drivers are technical in
nature and are considered unchangeable and indeed very soon become so.
many common examples of technical constraints that you've likely seen.
language - often times a specific programming language will be required for various reasons. For
example, the customer may be a Java or Ruby or Microsoft shop. You might simply
prefer a certain language over another, or have specific expertise that
dictates using a particular programming language. Nearly always, once you've
picked a language you are stuck with that choice for the remainder of the
system or platforms supported - It must work on Windows, or
Linux, or iOS, or Qt on Solaris, or
IE 6 on Windows XP, or ... building software that does not satisfy the platform
constraint means you have failed to design a software system that satisfies
stakeholders' key concerns.
Use of a specific library or framework - Sometimes a specific
library might be required to be used.
The specific origin might come from the business but the influence is very
technical. A common example at many companies is the use of specific open
source libraries. Some companies might require that open source always be used.
Other companies, might have an approved list indicating which open source
software may be used. An interesting example at IBM is that we are required to
target the "Blue" JVM, IBM's JDK for all JVM-based projects. | s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296816853.44/warc/CC-MAIN-20240413211215-20240414001215-00891.warc.gz | CC-MAIN-2024-18 | 3,384 | 42 |
http://www.codinghorror.com/blog/2004/06/what-if-software-was-never-free.html | code | June 14, 2004
Ten years out, in terms of actual hardware costs you can almost think of hardware as being free
-- Bill Gates
We've all been reaping the benefits of Moore's Law for the last 20 years, but there is one unintended consequence of this rule: as hardware becomes cheaper, software becomes more expensive
In other words, it was OK for a retail copy of Windows to cost $99 when computers regularly cost $2,000 to build, circa 1997. That's only five percent of the total cost, after all. But in this era of cheap, $500 computers (with monitor!), that same $99 license is a whopping one fifth of the total cost. Perhaps the more relevant question is, What if software was never free? One answer, obviously: Linux.
Microsoft's response is.. a little more complex.
"[in Thailand] Microsoft offered a special price of 1,500 baht ($38) for XP Home and Office XP combined," recalled Jumrud Sawangsamud, chairman of affordable computing working committee. Normally, Windows XP Home Edition sold for 4,500 baht and Office XP cost 15,000 baht.
We've already seen Microsoft do something like this, informally, with their "student" licenses for Office XP
. However, what immediately struck me about the Thailand pricing is the obvious parallels with the pharmaceutical industry-- that is, subsidizing development costs differently in different markets.* And, sure enough, a few paragraphs down:
Setting prices based on geography is not new in other industries. Pharmaceutical firms charge lower prices in developing markets like Africa than in mature ones like the United States. Even McDonald's sets different prices for Big Macs based on geography.
Unfortunately, what isn't mentioned here is how profoundly unpopular this pricing strategy is
. It's also an increasingly difficult strategy to enforce in a global market, in the age of the Internet. Ignorance is bliss, at least, when it comes to someone in Thailand paying less than one-tenth what I am for Office XP and Windows XP
. Granted, software may make my life easier, but it sure won't save or prolong my life-- but a drug can. So you can imagine the intense pressure for illegal "grey market" drugs, imported from countries with socialized medicine (eg, strict price controls and/or much lower drug prices, such as Canada or Mexico). These illegally imported drugs are sold in the US through websites at significantly lower rates. It is a huge issue, and there is legislation working its way through the senate to legalize the drug importation process
. In an election year, and with the clout of older voters who need these lifesaving drugs, you'd have to be a very gutsy politician indeed to oppose its legalization.
I have no comments on the ethics of the "grey market"-- I think in a global market, it's inevitable-- but I don't see any reason why, given a strongly tiered per-country pricing structure, the same problems (and pressures) won't come up in software, too.
* In the interests of fair disclosure, I should mention that one of the largest drug companies in the world is the second largest employer in this area, and I currently work for that company.
Posted by Jeff Atwood
That's true. Windows does cost more compared to total price of the PC as compared to 1998. But it does one hell of a lot more. Compare that to the PC. The peripherals are mostly the same. The box is mostly the same. The only thing that changed is more RAM, bigger disk and faster CPU. In other words, manufactured devices - that are inherently easier to cut costs on.
"But it does one hell of a lot more."
True, but I think the Pentium 4 is quite an advance over the Pentium 1. And motherboards are far more integrated now (gigabit ethernet, sound, video, wifi). So you could definitely argue that hardware is both more full featured AND cheaper.
"manufactured devices - that are inherently easier to cut costs on."
Modern cpu manufacturing plants cost BILLIONS of dollars. And I think software is the ultimate "manufactured good"-- the only physical cost is the cost of the media you duplicate it on. It's pretty much like having a license to print money.
(Whoah, 3 years later…)
Well, at least software often has an advantage in this field: those cheaper versions are often localized, and seldom come in more than one language. Would you really use a Thai OS and office suite, no matter how cheap it turns out to be?
Well, you would have a point. If it was true, you can get the English version of Windows XP today for 2k-3k baht which isn't bad considering 2k baht = $40 (depending on the exchange rate), I know this becasue I just returned from there with a fresh copy myself (I was stationed there for 3 mos). Its not cheaper because its a cheaper version. Cost of living effects the price you pay for vertually anything virtually everywhere. That's one reason why cigerettes in your town may be (hypothetical number here) $4, but 2hrs down your local highway you may pay upwards of $7. Case in point, while I was there I bought a $1500 camara. I was wondering for about 1 week why everyone's eyes was always glued to the camara on my neck, until I walked by a realty "shop". I could have bought a 2 story, 4 room house and spent $200 less.
pentium 4 is the worst processor ever made
One point - hardware manufacturing moved almost to the third world and is being more and more automatized.
Software development cannot be automatized that well, and as for moving to the thirld world - well, I think we all are not exactly glad for that.
And by the way, software developer aguing for cheaper software - we call it 'sawing the branch you sit on' here in Czech Republic...
Price discrimination between the USA and Europe has been around for a very long time, and grey market imports of US licences to the EU have been around for nearly as long.
This is especially true for the UK, which uses very nearly the same localisations (and most US-localised systems include UK localisations).
That wasn't new in 2004.
manufacturing cost can be cut over time, but software needs much better educated and highly paid workers, and unlike manucacturing computers you can keep using the same factories over and over again when one model gets replaced with another one. Software you need to start from the begining every time.
Hope to know more important things regarding design from it. thank you. | s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386164029436/warc/CC-MAIN-20131204133349-00010-ip-10-33-133-15.ec2.internal.warc.gz | CC-MAIN-2013-48 | 6,333 | 34 |
http://www.safnet.com/writing/tech/2009/02/ | code | Coding Horror, almost two years back, christened a name for the principle variously known as "don't repeat yourself," "once and only once," etc.: Curly's Law. Excellent formulation of the principle. In sending this to my development team, I thought it would be useful to pull this from the abstract to the specific through a few questions:
February 2009 Archives
Curly's Law and Questions for the Team
Unit Testing - Code Coverage and Separation of Layers
Lately I've been working with my team to understand and utilize good automated unit testing strategies with NUnit. A code release I was inspecting revealed a couple of good points that seem worth expanding on: the importance of testing each layer, and the need to pay attention to code coverage. This is a rather facile treatment; for more in-depth reasoning and details, I recommend xUnit Test Patterns. | s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917122996.52/warc/CC-MAIN-20170423031202-00269-ip-10-145-167-34.ec2.internal.warc.gz | CC-MAIN-2017-17 | 860 | 5 |
https://forum.rockstor.com/t/latest-stable-update/8568 | code | @mrclark Hello there and welcome to the Rockstor community forum.
Yes, 4.1.0-0 is still our latest stable. It was the end of an extremely long testing release where we moved from old previous, no legacy, CentOS base to the new “Built on openSUSE” base. But we were, even back then, in need of some maintenance time regarding our other libraries etc, otherwise known as technical debt. This has been our focus since the 4.1.0-0 release via the new testing branch arrangement, see:
for the first release of that run. Normally there would have been several releases in both channels by now, but the scale of changes needed to how we do stuff, and what we use to do it, was such that most stuff just didn’t work at all, or in more recent changes, even build. Hence our requirement to focus on the testing branch development to more rapidly be in the position to spin-off a new stable from testing. However give we have had all these changes we were unable to actually release anything easily testable in the first place. But we are definitely getting back onto solid ground again and hope to resume regular releases fairly soon. There was to be a 4.5.1-0 which was all but a click away, but a new build challenge caught up with us in openSUSE Leap 15.4 and so we had to make a new ‘jump’ to accomodate this latest challenge. All good thought and all moving in the right direction. Just slower than at least I would have liked.
Thanks, this is a corner stone of our sustainability goals, and another thing in need of attention! But again, it’s all good, and definitely heading towards a more manageable state.
In short we build up a backlog of stuff that needed addressing for the future. And we are almost in that future.
As one ‘backlog’ element involves the ‘shop’ and me (as one of the projects maintainers) having emigrated, there is yet more disruption. As such all valid stable subscriptions prior to the shops UK to EU move are actually on-going. Even if Appman shows otherwise, I didn’t want to put other folks in a tricky situation, just because I found myself and the project in one!
Once the dust settles we will get back onto a even keel but rest-assured that we are definitely ‘getting there’ and it’s looking like we will get more done than we had initially hoped for during this current phase. All-be-it at the cost of not being able to release as often: an unfortunate side effect of the scope of changes needed. However the most recent work is actually on how we build the project. That for one will be a most welcome change as our prior build system was super clunky (@Hooverdan you might like this bit) and one of the oldest remaining dependencies.
Hope that helps, and thanks for your ongoing support; much appreciated. | s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506480.35/warc/CC-MAIN-20230923062631-20230923092631-00884.warc.gz | CC-MAIN-2023-40 | 2,763 | 8 |
https://stackoverflow.com/questions/56812516/how-to-capture-and-retain-the-artifact-package-version-for-universal-artifacts-i/56824680#56824680 | code | I have this azure devops ci/cd pipeline using yaml. My yaml has two stages CI and CD. My CI stage has one job called BuildandDeploy. The CD stage has one deployment job. I am using universal artifacts to publish and downloading the same. In the CD phase I am using
UniversalPackages devops task to download the artifact. The task has a input variable called vstsPackageVersion which is the package version that is shown in universal artifacts. I have known of two other variables that could be used
$(Build.BuildNumber). As a temporary work around I am hard coding the package version for the universal artifact.
I wasn't able to download the artifact with either of the built-in variables. Since the CI and CD are in the same pipeline, is there any way to store and retrieve the package version of the artifact? Is there a identifier like
latest that I could use to get the latest artifact from universal package.
# specific branch build with batching trigger: batch: true branches: include: - master stages: - stage: CI jobs: - job: BuildAndPublish pool: vmImage: 'Ubuntu-16.04' steps: - script: | docker build -t $(dockerId).azurecr.io/$(imageName):$(version) . docker login -u $(dockerId) -p $(pswd) $(dockerId).azurecr.io docker push $(dockerId).azurecr.io/$(imageName):$(version) - task: Bash@3 displayName: Initialize Helm Client - create local repo inputs: targetType: 'inline' script: ' helm init --client-only ' - task: HelmDeploy@0 displayName: Package helm chart inputs: connectionType: 'Kubernetes Service Connection' command: 'package' chartPath: 'my-helm-dir' - task: UniversalPackages@0 displayName: Publish helm package to my-company-artifacts inputs: command: 'publish' publishDirectory: '$(Build.ArtifactStagingDirectory)' feedsToUsePublish: 'internal' vstsFeedPublish: '$(my-feed-guid)' vstsFeedPackagePublish: 'my-artifact-name' versionOption: patch packagePublishDescription: 'My helm package descrition' - stage: CD jobs: - deployment: DeployJob displayName: Deploy Job pool: vmImage: Ubuntu-16.04 environment: dev strategy: runOnce: deploy: steps: - task: UniversalPackages@0 displayName: 'Universal download' inputs: command: download vstsFeed: '$(my-feed-name)' vstsFeedPackage: 'my-artifact-name' vstsPackageVersion: 0.0.32 - task: ExtractFiles@1 displayName: 'Extract files ' inputs: archiveFilePatterns: '*.tgz' destinationFolder: 'my-folder' cleanDestinationFolder: true | s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764499946.80/warc/CC-MAIN-20230201144459-20230201174459-00703.warc.gz | CC-MAIN-2023-06 | 2,400 | 6 |
https://documentation.sisense.com/latest/managing-data/connectors/gmail.htm | code | Connecting to Gmail
The Sisense Gmail connector is a certified connector that allows you to import data from the Gmail API into Sisense via theSisense generic JDBC connector. The Gmail connector offers the most natural way to integrating Gmail capabilities such as sending and receiving email, managing Gmail folders messages, and more, in Java applications.
Sisense Gmail connector is a certified connector. The support for the connector is provided by Sisense and will be assisted by the certification partner's support, if needed. For any support issues or additional functionality requests, please contact your Sisense representative or open a request through our Help Center. For advanced inquiries specific to driver functionality, you can also contact our certification partner’s support directly via [email protected].
After you have downloaded the driver, you can connect through a connection string in Sisense. The connection string is used to authenticate users who connect to the Gmail APIs. To obtain a connection string, you will need to register a Gmail app. Once you have connected to Gmail, you can import a variety of tables from the Gmail API
This page describes how to download the Gmail driver and deploy it, how to connect to Gmail with a connection string, provides information about the Gmail data model, and more.
- Downloading the Gmail JDBC Driver
- Deploying the Gmail JDBC Driver
- Connecting to Gmail
- Adding Gmail Tables to your ElastiCube
- Gmail Connector: Additional Resources
You can download the Gmail JDBC driver here.
- The driver is certified for Sisense v7.2 and above.
- Sisense v7.4 and above: Click the above link to download a ready-to-use driver.
- Sisense prior to v7.4: Click the above link to download a 30-days free-trail of the driver. Contact Sisense for the full license version.
To run the setup, execute the following command: java -jar setup.jar (OR, if your system is set up to run Java applications, double-click on setup.jar).
During the installation, pay attention to the path of the installation (you will need it later on, to direct Sisense to the Jar file. The default path is C:\Program Files\CData\CData JDBC Driver for Gmail 2019\lib).
Note: The install file (setup.jar) is a Java application that requires Java 6 (J2SE) or above to run. If you do not have Java 6 installed, you may download it from here.
The driver communicates with Gmail through the IMAP protocol. IMAP enables all your client devices to work with the same remote data, instead of individual copies. To connect to Gmail, you will first need to enable client access to Gmail over IMAP.
Then, to access Gmail from Sisense, you must provide valid Oauth Gmail credentials through a connection string. These credentials are provided by Gmail when you create an application.
After you receive your credentials from Gmail, you can create the connection string and provide Sisense with it to connect to your data.
Follow the steps below to enable access to Gmail over IMAP:
- Open the Gmail Web interface and click , then select the Settings option.
- On the Forwarding and POP/IMAP tab, select Enable IMAP.
- Save your changes.
Registering an App
Follow the steps below to obtain the OAuth client credentials, the OAuthClientId and OAuthClientSecret necessary for your connection string:
- Log into the Google API Console.
- Click Create Project or select an existing project.
- In the API Manager, click Credentials > Create Credentials > OAuth Client Id.
- Select the application type.If you are making a Web application, select Web application. In the Authorized Redirect URIs box, enter the URL you want to be used as a trusted redirect URL, where the user will return with the token that verifies that they have granted your app access. If you are making a desktop application, select Other.
- Click Create. The OAuthClientId and OAuthClientSecret are displayed.
- Click Library > Gmail API > Enable API.
Creating the Gmail Connection String
Sisense uses connection strings to connect to Gmail and import data into Sisense.
The following is an example of a Gmail connection string:
The connection string should include the following information:
- InitiateOAuth: Set this to GETANDREFRESH. You can use InitiateOAuth to avoid repeating the OAuth exchange and manually setting the OAuthAccessToken connection property.
- OAuthClientId: Set this to the Client ID in your app settings.
- OAuthClientSecret: Set this to the Client secret in your app settings.
- User: Set this to the user of the Gmail account.
When you connect the driver opens the OAuth endpoint in your default browser. Log in and grant permissions to the application.
To help you create a connection string and test the connection, see Connection String Builder for Certified Connectors.
If you have any issues connecting to your data source, see Troubleshooting JDBC Data Connectors.
- In the Data page, open an ElastiCubeor create a new ElastiCube.
- In the Model Editor, click . The Add Data dialog box is displayed.
- Click Generic JDBC to open the JDBC settings.
- In Connection String, enter the Gmail URL. See Creating a Connection String for more information.
- In JDBC JARs Folder, enter the name of the directory where the Gmail JAR file is located (see Deploying the Gmail JDBC Driver).
- In Driver's Class Name, enter the following class name: cdata.jdbc.gmail.GmailDriver.
- In User Name and Password, enter your Gmail credentials. These fields are not required if the user name and password were provided in the connection string.
- Click Next. A list of tables in the database are displayed. All tables and views associated with the database will appear in a new window.
- From the Tables list, select the relevant table or view you want to work with. You can click next to the relevant table or click Preview to see a preview of the data inside it.
- (Optional) Click + to customize the data you want to import with SQL. See Importing Data with Custom Queries for more information.
- After you have selected all the relevant tables, click Done. The tables are added to your data model.
For the full documentation set for the Gmail connector, click here.
For connection string options, click here.
For information on the Gmail data model, click here.
- The default Gmail table names contain a backslash; some also contain spaces. You can use square brackets to escape the table names for the default Gmail folders. For example: SELECT * FROM [Gmail/All Mail]
- The default number of messages returned is 100. This can be changed by setting either LIMIT or MaxItems. If you wish to return all mail within a mailbox, specify a value of 0 or -1.
- Aggregate functions not supported. | s3://commoncrawl/crawl-data/CC-MAIN-2019-22/segments/1558232256082.54/warc/CC-MAIN-20190520162024-20190520184024-00226.warc.gz | CC-MAIN-2019-22 | 6,695 | 60 |
http://annotation.exmaralda.org/index.php?title=LinguisticAnnotation:About&oldid=1368 | code | This Wiki describes tools and formats for creating and managing linguistic annotations. `Linguistic annotation' covers any descriptive or analytic notations applied to raw language data. The basic data may be in the form of time functions -- audio, video and/or physiological recordings -- or it may be textual. The added notations may include transcriptions of all sorts (from phonetic features to discourse structures), part-of-speech and sense tagging, syntactic analysis, "named entity" identification, co-reference annotation, and so on. The focus is on tools which have been widely used for constructing annotated linguistic databases, and on the formats commonly adopted by such tools and databases. It is based on this webpage assembled by Steven Bird and Mark Liberman that is not longer actively maintained. Used with permission. | s3://commoncrawl/crawl-data/CC-MAIN-2019-26/segments/1560627998339.2/warc/CC-MAIN-20190617002911-20190617024911-00546.warc.gz | CC-MAIN-2019-26 | 839 | 1 |
https://discusstest.codechef.com/t/cannot-understand-competitive-coding/22678 | code | I am finding competitive coding very difficult. I have started from the Easy section of Practice problems here in CodeChef in decreasing order of number of substitutions, but most of the problems I have to check explanation and other submissions to actually understand what the problem is all about. Can anyone please guide me as to what to do to progress here?
That’s how all begin, by looking for explanations and even checking out accepted solutions. Practice and try to give your best, and if you still don’t get the problem, Do look for explanations. It’s not a bad thing to check for explanations if you learn from them.
@sdbeast Try to learn some topics as well and solve problems on them. This might boost your confidence.
+1. Give some tips here as well please.
@arjitkansal can you please tell what should I start looking for specifically?
If you know programming already and are just starting out with CP, then this might be the best resource to learn step by step :- https://www.codechef.com/certification/data-structures-and-algorithms/prepare#foundation
Learn the topics one by one and then practice the problems on the specific topic. This will surely help you learn a lot and boost your confidence.
And remember everyone gets stuck, its common. Just try your best, and move ahead. | s3://commoncrawl/crawl-data/CC-MAIN-2021-31/segments/1627046154798.45/warc/CC-MAIN-20210804080449-20210804110449-00525.warc.gz | CC-MAIN-2021-31 | 1,302 | 8 |
https://2021.mobiconf.org/speakers/703/ | code | Bas is an iOS and macOS developer with a passion for testability, accessibility and user-centric apps. He cares about communication and collaboration.
Coffee is nice. Watches are cool.
Effective Pull Request Reviews
8 October 2021, Friday
03:25 pm - 04:10 pm
about the talk
Pull request (and their associated reviews) are an integral part of a developer’s life. And for good reasons!
While some may love them, and others somewhat less so, there’s a good chance you’re spending quite some time on reviews as part of your project or job.
Therefore, it’s crucial to make our pull request experience great. And kind. And welcoming.
I want to share some thoughts on what I’ve learned about making the pull request experience awesome.
The cookie settings on this website are set to "allow cookies" to give you the best browsing experience possible. If you continue to use this website without changing your cookie settings or you click "Accept" below then you are consenting to this. | s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947475311.93/warc/CC-MAIN-20240301125520-20240301155520-00345.warc.gz | CC-MAIN-2024-10 | 987 | 11 |
http://sandbox-adventure.com/forum/d/3-engine-development | code | Sandbox Adventure is a new online visual novel engine. It is responsive and works on any device connected to internet (desktops, tablets and mobiles).
You will find in this thread all the information updates regarding the engine and its new features.
- Jump directely to one specific moment in the game from the editor (so you can check immediately how it looks in game)
- One-click exportation to Ren'Py (there is no hurry since all game available have already a Ren'Py version)
- Site-wide achievements
- Action-adventure module (sidescroller and topdown game)
- Layered characters: Renpy's LiveComposite equivalent.
- Optional pay-what-you-want button.
- Content warning: a popup with a warning message when the game is rated
- Iframe integration: to display a game directely on any website
- Kongregate and GameJolt integration
Some useful links:
Sandbox Adventure is a new engine still on active development. New features are added regulary. Don't hesitate to contact me if you think an important feature is missing.
Don't hesitate to make honest critiques. Constructive feedbacks are always welcome, even negative ones! | s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446710924.83/warc/CC-MAIN-20221203043643-20221203073643-00806.warc.gz | CC-MAIN-2022-49 | 1,125 | 14 |
https://causeofyou.net/find/pro-java-9-games-development/ | code | Use Java 9 and JavaFX 9 to write 3D games for the latest consumer electronics devices. Written by open source gaming expert Wallace Jackson, this book uses Java 9 and NetBeans 9 to add leading-edge features, such as 3D, textures, animation, digital audio, and digital image compositing to your games. Along the way you’ll learn about game design, including game design concepts, genres, engines, and UI design techniques. To completely master Java 3D game creation, you will combine this knowledge with a number of JavaFX 9 topics, such as scene graph hierarchy; 3D scene configuration; 3D model design and primitives; model shader creation; and 3D game animation creation. With these skills you will be able to take your 3D Java games to the next level. The final section of Pro Java 9 Games Development puts the final polish on your abilities. You’ll see how to add AI logic for random content selection methods; harness a professional scoring engine; and player-proof your event handling. After reading Pro Java 9 Games Development, you will come away with enough 3D expertise to design, develop, and build your own professional Java 9 games, using JavaFX 9 and the latest new media assets. What You’ll Learn Design and build professional 3D Java 9 games, using NetBeans 9, Java 9, and JavaFX 9 Integrate new media assets, such as digital imagery and digital audio Integrate the new JavaFX 9 multimedia engine API Create an interactive 3D board game, modeled, textured, and animated using JavaFX Optimize game assets for distribution, and learn how to use the Java 9 module system Who This Book Is For Experienced Java developers who may have some prior game development experience. This book can be for experienced game developers new to Java programming.
This book looks at the two most popular ways of using Java SE 6 to write 3D games on PCs: Java 3D (a high-level scene graph API) and JOGL (a Java layer over OpenGL). Written by Java gaming expert, Andrew Davison, this book uses the new Java (SE) 6 platform and its features including splash screens, scripting, and the desktop tray interface. This book is also unique in that it covers Java game development using the Java 3D API and Java for OpenGL--both critical components and libraries for Java-based 3D game application development
This book is a condensed reference for HTML5 markup. It presents the essential HTML5 elements and attributes in a well-organized format that can be used as a handy reference. HTML5 Quick Markup Reference is an HTML5 reference title covering tags and parameters central to HTML5 markup using the NetBeans 8.1 IDE. The book covers the tags used in HTML5, logically organized by topical chapters. It gets more advanced as chapters progress, covering the new media tags and file formats that are best for use with HTML5, as well as key factors regarding the data footprint optimization work process, in-lining .CSS and .JS files, and why data footprint optimization is important. What You Will Learn: The tags supported in HTML5 What comprises an HTML5 content production workflow Concepts and principles behind HTML5 content production How to install and utilize Inkscape for Windows, Mac OS X and Linux Concepts behind spline curves, strokes, fills, patterns, and rendering Digital illustration data formats and data footprint optimization Who This Book Is For: Website developers, Flash developers, user interface designers, HTML5 game designers, teachers, and educators.
Gain concepts central to smartwatch design, editing and animation correction using the popular open source Galaxy Watch Designer software package. This visual guide builds upon the essential concepts of smartwatch design, decoration, digital imaging, animation, function integration, and visual effects, and gets more advanced as chapters progress, covering which digital new media file formats (JPEG, PNG, GIF, etc.) are best for use with smartwatch design. Smart Watch Design Fundamentals also covers key factors in the data footprint optimization work process, designing and optimizing animation assets, and why these optimizations are important. Additionally, the book covers other advanced topics such as how to provide free smartwatch faces for the first few days on the smartwatch store, and how to post watchface designs for sale in the store. What You'll Learn: Create a smartwatch design and visual effects pipeline Gain knowledge of the concepts behind smartwatch design Work with resolution, aspect ratio, animation, and color depth Use smartwatch design components such as ticks, numerals, feature markers, dates, etc. Optimizing digital image asset data footprint to create small smartwatch design file sizes Who This Book Is For:This book is primarily for smart watch and fashion designers.
Digital Image Compositing Fundamentals is an introductory title covering concepts central to digital imagery and digital image compositing using software packages such as Adobe Photoshop or the open source GIMP software, which is used for this book because it is free for commercial use. This book builds on the fundamental concepts of pixels, color depth and layers, and gets more advanced as chapters progress, covering pixel transparency using the alpha channel, pixel blending using Porter-Duff blending and transfer modes, and digital image file formats and key factors regarding a data footprint optimization work process. What You'll Learn: What are the most common memes in digital imaging What comprises a digital image compositing pipeline What are the concepts behind digital imaging How to install and use GIMP 2.8 or 2.9 What are and how to use the concepts behind color depth and image optimization Audience: This book is for those new to image compositing, editing. Ideal for web developers, game developers who need to learn these kinds of fundamentals quickly and effectively.
*Exploits the finer points of core and standard editions of Java 2 *Updated to include the final Java 2SE 5.0 (Tiger) release * *Ideal for experienced non-Java and Java programmers who need intermediate level book
Program Kinect to do awesome things using a unique selection of open source software! The Kinect motion-sensing device for the Xbox 360 and Windows became the world's fastest-selling consumer electronics device when it was released (8 million sold in its first 60 days) and won prestigious awards, such as "Gaming Gadget of the Year." Now Kinect Open Source Programming Secrets lets YOU harness the Kinect's powerful sensing capabilities for gaming, science, multimedia projects, and a mind-boggling array of other applications on platforms running Windows, Mac OS, and Linux. Dr. Andrew Davison, a user interface programming expert, delivers exclusive coverage of how to program the Kinect sensor with the Java wrappers for OpenNI and NITE, which are APIs created by PrimeSense, the primary developers of the Kinect's technology. Beginning with the basics--depth imaging, 3D point clouds, skeletal tracking, and hand gestures--the book examines many other topics, including Kinect gaming, FAAST-style gestures that aren't part of standard NITE, motion detection using OpenCV, how to create gesture-driven GUIs, accessing the Kinect's motor and accelerometer, and other tips and techniques. Inside: Free open source APIs to let you develop amazing Kinect hacks for commercial or private use Full coverage of depth detection, camera, and infrared imaging point clouds; Kinect gaming; 3D programming; gesture-based GUIs, and more Online access to detailed code examples on the author's web site, plus bonus chapters on speech recognition, beamforming, and other exotica
Written in a non-technical manner, Game Development Essentials: Game Industry Career Guide is a valuable asset for anyone looking for a job, not only in the game industry but also in any field requiring technical expertise and creative talent. Not only does it discuss what skills game companies need, it also gives extensive advice and insights on writing a solid r?sum?, building a portfolio that will attract game companies, and preparing for telephone and personal interviews.
OUYA Game Development by Example consists of different game application examples. No prior experience with programming is required. You will learn everything from scratch and will have an organized flow of information specifically designed for complete beginners. Using this book, you can get started with creating games without any game development experience. This book is perfect for anyone that wants to make video games but is unsure of where to start. It covers elements of game design, art, and programming comprehensively, and the engine used throughout all of the tutorials is very beginner-friendly. No prior knowledge is assumed or required for the tutorials in this book.
Pro Android Graphics is a comprehensive goldmine of knowledge and techniques that will help you design, create, and optimize 2D graphics for use in your Android Jelly Bean applications. Android application developer and expert multimedia producer Wallace Jackson of Mind Taffy Design shows you how to leverage Android's powerful graphics APIs in conjunction with professional open source graphics design tools such as GIMP 2.8.6 and more. You’ll learn about: The foundational graphics concepts behind the three core new media areas (digital imaging, digital video, and 2D animation) which relate to graphics design, and how to optimize these new media assets for your Android applications across iTVs, tablets, eReaders, game consoles, and smartphones. Digital imaging techniques for Android apps design, including graphics design layouts and graphical user interface elements, and how to use image compositing techniques to take your digital imaging to far higher levels. Advanced image compositing and blending techniques, using Android’s PorterDuff, NinePatch, and LayerDrawable classes. Advanced 2D animation techniques, using Android’s Animation and AnimationDrawable classes. Digital video optimization, playback, and streaming, using open source 3D (Terragen 3) and video (VirtualDub) applications, as well as professional video editing applications such as Squeeze Pro 9. You’ll use these software packages with Android’s VideoView and MediaPlayer classes, and add compositing to enhance your end-users’ digital video experience.
A Guide for Personal, Professional and Business Users Including Application Software on CD-ROM
Author: Bowker Editorial Staff
Designed to meet the needs of its users, The Software Encyclopedia is a comprehensive, easy-to-navigate guide filled with detailed information on micro-computer software. Listings of over 44,600 software programs from 4,646 publishers and distributors are fully annotated to facilitate research and acquisition. Title entries are classified under 668 subject headings and contain title, subtitle, version number, publication date, compatible hardware, operating system requirements, memory required, price, a description of the type of customer support available, author, and ISBN. Additionally, the 2-volume set includes a Publisher Name index, System Compatibility/Applications Index, Applications Guide, and Distributor Name Index. | s3://commoncrawl/crawl-data/CC-MAIN-2021-21/segments/1620243988775.80/warc/CC-MAIN-20210507090724-20210507120724-00346.warc.gz | CC-MAIN-2021-21 | 11,231 | 13 |
http://stackoverflow.com/questions/215046/connecting-web-parts-in-sharepoint | code | I am trying to connect to simple webparts in my sharepoint team site, i need one of the webparts to filter its information based on what it recieves from another webpart
I am using the query string filter webpart and the a list view webpart but no matter how i connect them always i am getting this error
"Web Part Error: This page has exceeded its data fetch limit for connected Web Parts. Try disconnecting one or more Web Parts to correct the problem."
What should I do and what am I doing wrong
update: i can connect to web parts on some other pgae, but getting this error on the DispForm.aspx page of a certain item , is webpart connections not allowed there ??!! | s3://commoncrawl/crawl-data/CC-MAIN-2014-52/segments/1419447546506.80/warc/CC-MAIN-20141224185906-00048-ip-10-231-17-201.ec2.internal.warc.gz | CC-MAIN-2014-52 | 668 | 5 |
http://fitness.stackexchange.com/questions/tagged/pull-ups+muscle-soreness | code | Physical Fitness Meta
to customize your list.
more stack exchange communities
Start here for a quick overview of the site
Detailed answers to any questions you might have
Discuss the workings and policies of this site
How do I avoid straining neck muscles when doing pull ups?
I would like to train for a pull up contest with my friend. I can do ten now, and want to get to twenty or so. The problem I'm having is that when I do a session of pull ups, later that day or the ...
Apr 30 '11 at 18:39
newest pull-ups muscle-soreness questions feed
Putting the Community back in Wiki
Hot Network Questions
Why Only Four Primary Partitions
How to label the curve of a function at any point along it in tikz?
Is there a single word that means “hitting the target but missing the point”?
Am I morally obligated to pursue a career in medicine?
What is "%&-line parsing enabled"?
Should I obscure database primary keys (IDs) in application front end?
Interacting with high school teachers (US)
How does Lua work as a scripting language in games?
"it's not always so easy to get a thought out"
What's it called when you lose contact with reality when watching a movie?
What books should I bring with me to my first gaming session?
When a button contains text and an icon, which should come first?
Can "cat-ing" a file be a potential security risk?
Is it probable that planets will stop orbiting in ellipses?
Are unique node titles neessary?
Can you cast creatures exiled by Ashiok/Nightveil Specter with bestow?
Why hasn't NASA planted a stationary lab on Mars yet?
Enforcing apt-get version continuity on Ubuntu
StringReplace, ReplaceAll and Rule interact in a bizarre way
Why use a function rather than a reference to member?
Gibbs sampling for ising model
Do you add your strength modifier to touch spells?
Simplest way to create a grid with colored squares and labels
more hot questions
Life / Arts
Culture / Recreation
TeX - LaTeX
Unix & Linux
Ask Different (Apple)
Geographic Information Systems
Science Fiction & Fantasy
Seasoned Advice (cooking)
Personal Finance & Money
English Language & Usage
Mi Yodeya (Judaism)
Cross Validated (stats)
Theoretical Computer Science
Meta Stack Exchange
Stack Overflow Careers
site design / logo © 2014 stack exchange inc; user contributions licensed under
cc by-sa 3.0 | s3://commoncrawl/crawl-data/CC-MAIN-2014-15/segments/1398223201753.19/warc/CC-MAIN-20140423032001-00552-ip-10-147-4-33.ec2.internal.warc.gz | CC-MAIN-2014-15 | 2,307 | 53 |
https://ubuntuforums.org/showthread.php?t=2150611&page=2&p=12697138 | code | Well something happened today, I accidentally hit my keyboard while shutting down, and discovered all of this under-the-hood stuff (see below.)
I found a related bug https://bugs.launchpad.net/ubuntu/+s...ux/+bug/987933 so this may still have something to do with in nvidia.
But my computer has never had a problem shutting down completely, it's just rather slow. And I get red screens.
I don't know what to do. I don't even know how this happened. Everything was okay. My tearing is back, too. This is the worst.
Edit: I should mention, the real kicker: about 1 in 10 times, it shuts down perfectly like it used to.
Broadcast message from root@
(unknown) at 22:32 ...
The system is going down for halt NOW!
Chekcing for running unattended-upgrades:
speech-dispatcher disabled:edit /etc/default/speech-dispatcher
-Stopping vnStat daemon vnstatd [ Ok ]
*ASking all remaining processes to terminated... #(It seems to hang for several secs right around here)
*Killing all remaining processes... [Fail]
nm-dispatcher.action:Caught signal 15, shutting down...
nm-dispatcher.action: Could not get the system bus. Make sure the emssage bus daemon is running!
Message: Did not receive a reply. Possible causes include: the remote application did not send a reply,
the message bus security policy blocked the reply, the reply timeout expired, or the network connection was broken.
modem-manager: <info> Caught signal 15, shutting down...
*Deconfiguring netowkr interfaces... [ Ok ]
*Deactivating swap #(I thought I disabled this..) [ Ok ]
umount: /run/lock: not mounted [ Ok ]
* Will now halt...
[ 62.459321] Powder down. | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171171.24/warc/CC-MAIN-20170219104611-00533-ip-10-171-10-108.ec2.internal.warc.gz | CC-MAIN-2017-09 | 1,612 | 23 |
http://www.mmogames.com/gameslist/page/9/ | code | An upcoming free to play MMO from the developer of Diablo.
An upcoming MMORTS featuring massive 50v50 battles.
Is a free to play browser MMORPG based on the hit TV show.
A Free to Play Browser Fantasy MMORPG.
An upcoming sci-fi MMORPG for explorers, adventurers and thrill-seekers.
The first ever free-to-play MMOFPS for console.
The MOBA of the Gods.
A zombie survival horror mod for ARMA 2.
An upcoming D&D MMORPG by Perfect World Entertainment.
An action MMORPG by Korean developer WEBZEN.
An upcoming online action mech simulation game.
An upcoming low-fantasy, medieval sandbox MMORPG. | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368701852492/warc/CC-MAIN-20130516105732-00076-ip-10-60-113-184.ec2.internal.warc.gz | CC-MAIN-2013-20 | 590 | 12 |
https://community.esri.com/thread/222185-map-service-allow-view-but-not-print | code | I encountered something and wanted to know how it behaves because I wanted to implement the same.
I found two webservices from another organization
what I noticed is
1. I can use both webservices to create basemaps for my organization
2. When I use the second one as the basemap, I can't print but the first one allows print
How is this implemented? | s3://commoncrawl/crawl-data/CC-MAIN-2019-13/segments/1552912201672.12/warc/CC-MAIN-20190318191656-20190318213656-00474.warc.gz | CC-MAIN-2019-13 | 349 | 6 |
https://www.jonathanmedd.net/2013/08/using-ssh-to-access-linux-servers-in-powershell.html/ | code | A question I’ve fielded now and again in the past, “Can I use PowerShell to access Linux servers?”. Among others, there were a few answers I could give of varying degrees of usefulness depending on the requirements:
Once you have downloaded and imported the module, check out what is available:
Get-Command -Module SSH-Sessions
To work with a Linux server, first of all you need to establish a session to the server with New-SshSession (I think this cmdlet would benefit from a Credential parameter):
New-SshSession -ComputerName PuppetVM -Username root -Password puppet
Examine our connected sessions:
Get-SshSession | Format-Table -AutoSize
It’s possible to now enter an interactive session with this VM and run some commands, for example to look at the OS and disk space:
Enter-SshSession -ComputerName PuppetVM cat /proc/version df -h exit
Similar to Invoke-Command in Windows you can use Invoke-SshCommand to send commands to an established session and receive results back (Note: you can use the -Quiet parameter if you don’t wish to see the display on screen):
$Query = Invoke-SshCommand -ComputerName PuppetVM -Command "ls /root"
We can now work with these results from the $Query variable. What we get back looks like multiple strings, but is actually an object with a (long) single string
$Query.GetType() $Query.Count $Query\[0\].GetType()
However, we can work with these a bit easier, should we need to, by breaking them up into individual strings:
$Strings = $Query\[0\] -split "\`n" $Strings $Strings.Count
So far I’ve found this module pretty useful. There are few drawbacks I’ve found so far, including some limitations with ESXi 5.0 and above which are mentioned on the web page, but I hope this project will continue to be updated further. | s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100599.20/warc/CC-MAIN-20231206130723-20231206160723-00830.warc.gz | CC-MAIN-2023-50 | 1,771 | 16 |
https://cronsigns.com/en/windows-firewall-not-in-services-vista/ | code | It appears that some users are experiencing a known Windows Firewall bug that is not present in Vista Services. This issue can occur due to a number of factors. Now we will discuss them.
Windows Vista Enterprise, 64-bit Windows Vista Home Basic, 64-bit Windows Vista Home Premium, 64-bit Windows Vista Ultimate, 64-bit Windows Business and Windows Business Vista, 64-bit Windows Vista Enterprise Windows Vista Home Basic Windows Vista Home Premium Windows Vista Ultimate More…
Windows Vista 64-bit Enterprise Windows Vista Home Basic 64-bit Windows Vista Home Premium 64-bit Windows Vista Ultimate 64-bit Windows Vista Business Windows Vista Business 64-bit Windows Vista Enterprise Windows Vista Home Basic Windows Vista Home Premium Windows Vista Ultimate Aria Label=”ClickMore…Less
1. Dell Confidential Information. This information has been provided by Dell in accordance with the terms of your privacy agreement. Whenever possible, do not share confidential information with third parties or customers. 2. The exchange of personal data on the Internet in this way is not possible. Information or content, including but not limited to images and documentsComments offered to or exchanged by Dell through such a forum must not contain any personally identifiable information. Unless otherwise provided by applicable local law, personal data or PII is data or information that, by itself or together with all other information, identifies an individual, or data that qualifies as brand data or other types, so only personal data may have meaning. with data protection laws or regulations. Do not transmit or post anything that contains personal information. 3. Content created by you will be published. This forum is intended for a general audience. Everything written in this forum is for the possible public use and is also an incredibly open exchange of opinion between Dell and its community of consulting partners for the benefit of Dell customers. So don’t put anything back that you don’t want to share with the outside city. Your content can and will be shared and properly distributed to a wide external audience. ContainerAnything that may be written in this forum is the intellectual property of Dell. 4. You grant Dell a perpetual replacement license to use any content you create in this online version. Please note that by posting any page content on this site, to the extent that Dell is not already the legal owner of the intellectual property under applicable local policy relating specifically to such content, you grant Dell the absolute and perpetual right to grant the license and consent to restoration. , store, copy, transmit, publish, publish, display, display and display your article or content in any medium, generally anywhere in the world, to Dell Encourage customers without restriction, without further consideration, compensation or appreciation from you or any another Partner. Dell may use your name in connection with your business. By submitting an article or statement, you also agree not to initiate, assist, support, or authorize any action beyondLicenses or lawsuits against Dell related to the reasons Dell most commonly attributes to your article, the terms and conditions used in many of these items infringe any of your rights, including but not limited to copyrights, patent rights, trademark rights or rights of honor – non-property rights.
||This article provides information on how to restore Windows Firewall after a malware infection
Table with content:
- Fix Windows Firewall issue after malware attack
Windows Firewall May Not Be Activated With Error Code: 0x80070424.
McAfee Firewall Automatically Disables After Attempting To Enable IT.
Windows Firewall FixIt Cannot Override This.
Does Windows Vista have a built in firewall?
Both Windows Vista and Windows 7 include their own firewall, called the Windows Firewall, which can be enabled by default; You should only disable it if your organization uses a different (third party) firewall.
Firewall Software Cannot Override Service Settings (startup Error )
) to check for missing related services/components behind the firewall.
2. If the Rkill-Wood logs show (mpssvc) or similar Windows components are disabled/missing, just download Windows AIO Recovery from tweaking.com/bleeping majorgeeks and install the file after installation is complete, run Windows Recovery on desktop. Skip steps 1-4 only if you have already removed/scanned the infection.
Fix your computer now with this quick and easy download. | s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446711151.22/warc/CC-MAIN-20221207085208-20221207115208-00804.warc.gz | CC-MAIN-2022-49 | 4,526 | 16 |
http://eab.abime.net/showpost.php?p=697911&postcount=74 | code | Originally Posted by alexh
Will the code for each platform become open-source so that the communities can pick them up tailor the GUI?
This is already "free" if you ask to me the code. documentations are also available.
For example in the CPC community a demomaker (norecess) take the original version, and make it smaller and faster ! | s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988720380.80/warc/CC-MAIN-20161020183840-00421-ip-10-171-6-4.ec2.internal.warc.gz | CC-MAIN-2016-44 | 335 | 4 |
http://techindex.law.stanford.edu/companies/977 | code | Starting Legal is a web platform that will allow you to create contracts and legal agreements.
Identity Verification Solution, KYC/Aml checks, Facial Recognition
Zeyo is an online alternative to small claims court that allows users to handle their small claim suit entirely online via video conference.
Privacy compliance platform, based on AI/Blockchain, which helps global companies to keep compliant with the data protection requirements.
Orbital Witness aggregates geospatial, property, and legal data from diverse sources to provide an unprecedented view of legal risk..
Doctrine builds legal research and analytics software for legal professionals. | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337663.75/warc/CC-MAIN-20221005172112-20221005202112-00598.warc.gz | CC-MAIN-2022-40 | 654 | 6 |
https://radiusmethod.com/enhancing-argo-cd-customizing-banner-background-text-colors-and-positioning/ | code | While setting up a platform for one of our customers, our team noticed that it would be beneficial if we could update the banner background color and the banner text color for ArgoCD. ArgoCD is a tool that enables a Kubernetes cluster to pull changes directly from a Git repository using Helm, also known as Gitops. In addition, we discovered that you could only position the banner at either the top or the bottom, not both. Initially, the configuration map provided four values that allowed basic customization of the banner. To accommodate our needs, we added two new values. We also added the support for specifying “both” for the banner position, as seen below.
--- apiVersion: v1 kind: ConfigMap metadata: ... name: argocd-cm data: ui.bannercontent: "Banner message linked to a URL" ui.bannerurl: "www.bannerlink.com" ui.bannerpermanent: "true" ui.bannerposition: "both" ui.bannerbackgroundcolor: "#FF0000" # new ui.bannertextcolor: "#00FFFF" # new
The following steps were taken to set up the dev environment:
1. Clone repository
git clone https://github.com/argoproj/argo-cd
2. Create a Kubernetes cluster. This can be done using a tool called kind.
brew install kind && kind create cluster
3. Apply argo-cd Kubernetes resources
kubectl apply -n default -f https://raw.githubusercontent.com/argoproj/argo-cd/stable/manifests/install.yaml
4. Install front-end dependencies
cd ui && yarn install && cd ..
5. Install Goreman
go install github.com/mattn/goreman@latest
6. Make sure go binaries are in PATH
7. Launch development environment
goreman start api-server ui
The front end will be accessible at http://localhost:4000. With the development environment up and running, you can now begin updating the UI code to incorporate the changes you desire. Any modifications made to the code will be instantly reflected in the environment, allowing you to preview your enhancements efficiently.
The Pull Request that was submitted with these changes can be found here: | s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100583.31/warc/CC-MAIN-20231206063543-20231206093543-00079.warc.gz | CC-MAIN-2023-50 | 1,973 | 18 |
https://lists.debian.org/debian-x/2010/12/msg00049.html | code | tag 605716 - squeeze thanks Hi Manuel, no need for a squeeze tag, we have version tracking, which will do the job. Manuel Hachtkemper <[email protected]> (02/12/2010): > we are using matroxfb (compiled in) and > xserver-xorg-video-mga. After booting (with grub2 and video=matroxfb > in the grub commandline) and switching automatically to tty7 (kdm) > everything looks well. But after switching to tty1-6 you can see the > text of the login prompt but you can't see what you type in, or you > can see the login prompt shifted multiple times (including see/guess > what you type in). This bug was also reported on launchpad: > https://bugs.launchpad.net/ubuntu/+source/linux/+bug/581466 the best thing you could do is filing a bug upstream, although I'm not sure -mga is maintained anyway. To do so: http://bugs.freedesktop.org/ It'd be nice to give us the bug number or the bug URL so that we can track the upstream bug. Mraw, KiBi.
Description: Digital signature | s3://commoncrawl/crawl-data/CC-MAIN-2018-17/segments/1524125947421.74/warc/CC-MAIN-20180424221730-20180425001730-00533.warc.gz | CC-MAIN-2018-17 | 976 | 2 |
https://community.fortra.com/kb-nav/kb-article/?id=1c8e2097-6ac3-eb11-bacc-000d3a1fe4c0&redirect=false | code | These instructions show you how to set up iSeries Office Integrator on a Windows terminal server. Because a Windows terminal server runs multiple users on the same PC and iSeries Office Integrator PC Component usually uses TCP/IP port 21 for each program instance, you need to set up iSeries Office Integrator PC Component individually for each user.
- Install iSeries Office Integrator PC component version 1.1.56 or above on the terminal server.
- Create a new file of any type in C:\Program Files\RJSOFFICE and rename it RJSOFFICE.SHR. This puts iSeries Office Integrator in shared-user mode. Now when each new user open iSeries Office Integrator PC Component, an INI file will be created in C:\Progam Files\RJSOFFICE with their name.
For example: If the user name is Joe, the following INI file is created: C:\Program Files\RJSOFFICE\joe.ini.
Note: Make sure that all users have read and write access to C:\Program Files\RJSOFFICE or the INI files will not be automatically created. Alternatively, the Windows system administrator can manually create each INI file.
- For each user:
- Open iSeries Office Integrator PC Component.
- Go to File > Settings.
- Choose a different port for each user, starting with 21000. You can use any starting IP from 1-64000.
Note: You can also manually change each user's port number in their INI file in C:\Program Files\RJSOFFICE.
Note: Each user must have a distinct TCP/IP port, and you must include this port number in the OFCUSR00 table in the RJSOFFICE library in step 4.
- Add the users' port numbers to the iSeries:
- On the iSeries, type:
- Choose 41. Edit TCP/IP Port Info for Users - (OFCUSR00).
- Add each user's iSeries user ID to this table along with the TCP/IP port you assigned them for iSeries Office Integrator PC Component in step 3.
Note: The user IDs are case sensitive.
- Make sure Enabled is set to Y.
- Choose 42. Edit Terminal Server List - (OFCTSVR00) and add the terminal server's IP addresses to the RJSOFFICE table.
If a request comes to RJSOFFICE from one of these IP addresses, it will check the OFCUSR00 table for an associated record.
Now when each user opens iSeries Office Integrator PC Component, it will use the selected TCP/IP port to monitor incoming calls from the iSeries. Also, the OFCRUNPC command on the iSeries will know which TCP/IP port to talk to for each iSeries user.
Last Modified On:
No, open a new Support Case
You don't have the appropriate permissions. | s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100448.65/warc/CC-MAIN-20231202172159-20231202202159-00438.warc.gz | CC-MAIN-2023-50 | 2,447 | 23 |
http://appnee.com/tag/im/ | code | Skype is currently the world's most popular free HD instant messaging software (and VoIP) for all kinds of desktop and mobile platforms. Low system resource requirement, high-quality voice communication and high stability have won its hundreds of millions of users around the world. After acquired by Microsoft in 2011, it became an independent department of Microsoft. And in 2013, if finally replaced Microsoft's own instant messaging tool MSN. In 2014, it released an embedded web version.
Now in people's everyday life and work, we can't do without the network, and for network applications, instant messaging software play an important role. If your local area network (LAN) cannot be connected to the public network or not convenient to use ICQ, MSN such kind of IM applications that are already well known to everybody, then please use BORGChat, which can completely replace them perfectly.
IP Messenger is a widespread cross-platform LAN instant communication software; based on TCP/IP (UDP) protocol; no need the server system.
Miranda IM (short for Miranda Instant Message), an instant messenger designed only for Windows system, which is open source, supporting multiple protocol and customizable for many plugins, with very little system resources occupation. | s3://commoncrawl/crawl-data/CC-MAIN-2017-22/segments/1495463608642.30/warc/CC-MAIN-20170526051657-20170526071657-00280.warc.gz | CC-MAIN-2017-22 | 1,271 | 4 |
https://forum.xda-developers.com/showthread.php?p=25098821 | code | Before we get anywhere. If your button is acting weird or is broken, [blink][explosion]this should be covered by your warranty[/explosion][/blink]. I've heard of turn around times from 2 days to 2 weeks or more. If you still want to do this yourself, then read on.
So, my power button drove me nuts last week when it stopped responding. After some research on the problem I ended up fixing it in house and relatively easily.
The cause of the irresponsive button is the physical movement of the internal button component. It's poorly held in place and eventually it tends to move around and then entirely fall off during normal use. Here's some guides that will help you open your thinkpadpad and repair a non working button or fix and enforce a mushy one. Note that this is probably going to void your warranty, though everything up to epoxying your button down is clean and pretty much undetectable (there aren't any visible "warranty void if broken" stickers). Also, this will take some amount of soldering skills. Basically, I (and anyone I reference) am not responsible for scratched cases, bricked devices, burnt fingers, completely epoxied/glued units, the apocalypse, etc.
Moving on to the fun stuff! Please be sure to read through this post to limit any surprises you may find in the process.
Tools you will need:
- A thinkpadpad
- This guide and its references
- Small phillips screwdriver
- Plastic case prying tool
- Soldering equipment (for repairing)
- Epoxy (for enforcing)
Most of you should be at least halfway set. The first step is to get your thinkpad open.
Opening the thinkpad.
There's already some great guides that go through opening the TPT in order to install a 3G capable modem:
Opening the thinkpad to install a 3G card
The basic steps are:
- Removing the four face buttons
- Removing the two screws underneath the face buttons
- Carefully separating the two halves of the tablet
I'll cover some helpful tips in this post to help you with the process. After reading them follow the previously linked guide carefully to open your tablet.
To keep you from damaging the button's clips, notice how they are attached to the tablet.
The semicircle tabs pry off like a hinge. Once they are free you can just lift the button right off.
When separating the clips to open the case, use a plastic tool to keep from scratching the thinkpad. I found it easiest to start at the usb port.
Image-left) shows me starting at the usb port with my tool (I just used a divider from a tackle/jewelry box). Image-right) I am carefully sliding the tool around the TPT's edges to undo all of the clips.
Here's an overexposed shot of one of the clips. It's the type you simply push in to undo. I barely had to use any force to separate the halves.
An important thing to remember: the touchscreen is connected to the bottom half's motherboard. These (two) connections are on the left side of the thinkpad.
Slowly open the thinkpad, like a book from, the right.
If you do happen to yank out these connections, they should easily plug back in. See the previous guide about doing this.
Reattaching the button.
If your button is only mushy, but still responding, you can probably skip this step of reattaching the button. If you feel like re-soldering the points, then feel free to do so.
Here's a photo of my broken button:
You're going to put the button back into position so that its contacts (opposite of the white button) are lined up against the contact points on the board (the pink points within the green box in the photo above). Here's an annotated picture of the placed button from a much better camera and photographer, Daniel Lane (his cool photo site):
You can see how the button can pivot off these solder points and eventually break. Solder the points as specified in the photo. Test to make sure your points are good. Hold down the internal button to keep it from moving and try to boot using the external button.
Reinforcing the button with epoxy.
As you probably saw in the previous image from Daniel Lane, he recommends applying epoxy to the button's side posts. Normally these posts would be soldered down underneath the board to secure it in place. You can attempt to either re-solder these posts (if they ever were attached), apply epoxy to them as Daniel suggests (the next safer method), or apply epoxy to more of the button (which I have done).
A few important notes about epoxy:
-It's some serious stuff. Dont get it anywhere you dont want it. ESPECIALLY on the moving part of the button.
-If its a more fluid type, it may not stay where you want it.
-Mix it very well. For at least one minute. You don't want to be stuck with a tacky epoxy job.
I chose to apply epoxy to the sides, back, and top of the button. Do this carefully. Make sure not to let it get on any moving parts. Make a barrier if you have to, or be safe and use Daniel Lane's method and apply a smaller amount. Here is my epoxied button (warning, we are going back to crappy pictures!):
You can substitute hot glue for the epoxy if you'd like an even safer application. Though its bond is definitely not as strong as the epoxy's.
Let the epoxy cure for as long as its instructions states, then close up your thinkpad tablet. Be sure not to break any clips in this process.
Enjoy clicking your power button. Or... something more productive.
UPDATE: Sometime last week (4/13/2012) one of my volume buttons started to go. Luckily I caught it before it completely came off like the power button did. If you open up your TPT to repair the power button, I'd recommend epoxying the volume buttons while you're at it. It's a much easier job while the solder points are still in place. | s3://commoncrawl/crawl-data/CC-MAIN-2017-47/segments/1510934807089.35/warc/CC-MAIN-20171124051000-20171124071000-00456.warc.gz | CC-MAIN-2017-47 | 5,667 | 44 |
http://neatupload-help.688956.n3.nabble.com/NeatUpload-sln-1-3-20-version-for-VS-2005-td754717.html | code | I just download the NeatUpload 1.3.20 version, and try to open “NeatUpload.sln” file with MS Visual Studio 2005. I have a problem. The “NeatUpload.sln” file looks a VS 2008 file, and I can not open it with VS 2005.
Does anyone have “NeatUpload.sln” file (version 1.3.20 or late version) for VS 2005, Or should I use earlier NeatUpload release version?
I don't have a VS 2005 sln file for you, but the info in the top-level README.txt might help you if you are looking for a way to build from source. Of course, if you don't need to build from source, you can just follow the instructions for Installing NeatUpload. | s3://commoncrawl/crawl-data/CC-MAIN-2019-09/segments/1550247526282.78/warc/CC-MAIN-20190222200334-20190222222334-00443.warc.gz | CC-MAIN-2019-09 | 626 | 3 |
https://forum.audiogames.net/topic/28017/cutting-code-from-the-scripts-in-python/ | code | So, if I want to use libraries that are not installed via pip installer, I have to include these lines into my scripts:
import sys, os dir_path = os.path.dirname(os.path.realpath(__file__)) os.chdir(dir_path)
I should probably mention that I do this to run my scripts:
1: open run dialog, type cmd.
2: type in cd c:\python directory
3: Pasting my script path and hitting enter.
So yeah, any way to illiminate the lines pasted above from my scripts?
What is hard is making code that accepts different and sometimes unexpected types of input and still works.
This is what truly takes a large amount of effort on a developer's part. | s3://commoncrawl/crawl-data/CC-MAIN-2019-22/segments/1558232257601.8/warc/CC-MAIN-20190524084432-20190524110432-00499.warc.gz | CC-MAIN-2019-22 | 629 | 9 |
https://developer.oculus.com/documentation/platform/latest/concepts/release-archive/ | code | Feature updates and changes in the legacy versions of the Platform SDK.
Overview of Oculus Platform SDK Version 1.24
The Oculus Platform SDK 1.24 release includes the following new features.
Oculus recommends that all Unity developers who have previously used Standalone Mode upgrade to Platform 1.24. This version fixes an issue where developer credentials may be stored locally in an insecure manner. Once you have upgraded to 1.24, add your developer credentials as described in the Use the SDK in Standalone Mode section in Unity Development Getting Started.
- Unreal Sample - Platform SDK 1.24 contains an updated Unreal sample that demonstrates the use of many of the Platform features. See the Sample Apps page for more information.
- Fixes an issue where a developer's credentials may be insecurely stored in the Unity Editor.
- There are no breaking changes to version 1.24.
Overview of Oculus Platform SDK Version 1.20
The Oculus Platform SDK 1.20 release includes the following new features.
- Added App Deeplinking to the Platform SDK. App Deeplinking allows you to launch users directly into an app event or gameplay mode from another app. See the App Deeplinking page for more information.
- There are no breaking changes to version 1.20.
Overview of Oculus Platform SDK Version 1.19
The Oculus Platform SDK 1.19 release includes the following new features.
- Photo Sharing is available for Gear VR. Photo Sharing allows users to post screen captures they take in VR to their Facebook network. See Sharing for more information about Photo Sharing.
- The Matchmaking and Room Debugger tool is now available to help developers identify the connections and interactions made by a user or room. See the Matchmaking Testing and Tuning page for more information.
- There are no breaking changes to version 1.19.
Overview of Oculus Platform SDK Version 1.18
The Oculus Platform SDK 1.18 release includes the following new features.
- Profile Card API - On Gear VR you can use ovr_User_LaunchProfile to launch a profile that displays the Oculus name, ID, online status, recent interactions, and mutual friends for a specified user. The profile also allows a friend request to be sent. Please see the Users, Friends, and Relationships page for additional information.
- Recently Met API - Use ovr_User_GetLoggedInUserRecentlyMetUsersAndRooms to retrieve a list of users who the logged-in user recently interacted with in your app. Interesting users, users who interact frequently or for a long duration, will be returned first. Oculus tracks the number of times users meet in VR, their most recent encounter, and the amount of time they spend together. Please see the Users, Friends, and Relationships page for additional information.
- Room Notifications - You'll now receive a room update notification if the user is removed from a room by Oculus. Please see the Rooms guide for information about handling room updates.
- Platform SDK Reference - The Platform SDK reference has changed. Starting with 1.18 the reference materials will be hosted in a manner similar to the other Oculus SDKs. You'll always be able to find a link to the latest version on the Reference Content page.
- There are no breaking changes to version 1.18.
Overview of Oculus Platform SDK Version 1.17
The Oculus Platform SDK 1.17 release includes the following new features.
- Standalone Initialization - Standalone initialization is now available for Unity. Read about initializing the SDK in standalone mode in Native Development Getting Started or Unity Development Getting Started.
- Rooms Invites Push Notifications - The Platform SDK will now send notifications to the message queue when a user has been invited to join a room. Information about room invite notifications can be found in the Rooms guide.
- Rift Parties - Rift now supports Parties. Parties allow users to chat wherever they are in VR, including your app. Please review the Parties guide for information about how to handle potential conflicts with VoIP streams.
- There are no breaking changes to version 1.17.
Overview of Oculus Platform SDK Version 1.16
The Oculus Platform SDK 1.16 release includes the following new features.
- User and Friends - When retrieving a list of a user's friends, the Oculus Platform will now order the friends list by online presence. Friends active within your app will be returned first.
- VoIP - Improvements to the VoIP service to minimize network bandwidth used by the Platform VoIP service.
- There are no breaking changes to version 1.16.
Overview of Oculus Platform SDK Version 1.15
The Oculus Platform SDK 1.15 release includes the following new feature and bug fix.
- Two new Discoverability features are now available for Gear VR apps. Use targeted Announcements and In-App Content stories to bring users into your app. Review the Discoverability documentation for more information.
- There are no breaking changes to version 1.15.
- Fixed a Matchmaking deadlock issue that caused users to not be matched by the service.
- General Platform SDK performance improvements and bug fixes.
Overview of Oculus Platform SDK Version 1.14
The Oculus Platform SDK 1.14 release includes the following new feature and bug fix.
- Added ovr_Platform_InitializeStandaloneOculus that allows you to initialize the Platform SDK in standalone mode for local testing. See Getting Started Guide for information about the SDK initialization methods.
- Multiple back-end changes to RoomsManager that improve handling of out-of-order updates. Resolves an issue where users received room updates from rooms they had previously created and joined.
Overview of Oculus Platform SDK Version 1.13
The Oculus Platform SDK 1.13 release includes the following new features.
- Asynchronous initialization API - ovr_PlatformInitializeWindowsAsynchronous (Native Rift), ovr_PlatformInitializeAndriodAsynchronous (Native Gear VR), and Platform.Core.AsyncInitialize (Unity). Use the asynchronous API to initialize the SDK with an intermediate state that allows your app to run other processes and make requests to the Platform SDK while initializing. Requests made to the Platform SDK while initializing will be queued to run after SDK initialization has completed. See Getting Started Guide for more information.
- Livestream testing - New feature to test how apps will perform while a user is Livestreaming. See Sharing for more information.
Overview of Oculus Platform SDK Version 1.12.1
The Oculus Platform SDK 1.12 release includes the following minor improvements and bug fixes.
Version 1.12.1 fixes an issue introduced by 1.12.
- Matchmaking - Change that allows developers to change enqueue options without first having to call ovr_Matchmaking_Cancel2.
Overview of Oculus Platform SDK Version 1.11
The Oculus Platform SDK 1.11 release includes minor improvements, bug fixes, and updates. These include:
- Turn host migration on / off when configuring Advanced Quickmatch rooms.
- Matchmaking - Room_KickUser now allows a room owner to kick other users from a matchmaking room.
- User_GetLoggedInUserFriends now returns results in improved sort order based on online status and app status.
- Added User_GetLoggedInUserFriendsAndRooms. New API to retrieve a list of a user's logged in friends and the rooms they are in.
- Room_Join2 now allows a user to update the room metadata if they become the room owner.
- Room_GetInvitableUsers2 now returns results in improved sort order based on online status and app status.
- Fixed bug where matchmaking room notifications may be received out of order.
Overview of Oculus Platform SDK Version 1.10
The Oculus Platform SDK 1.10 release includes minor improvements, bug fixes, and updates. These include:
- Updated two Unity sample apps that cover matchmaking, P2P, VoIP, and rooms (Gear and Rift).
- Added VoIP support to UE4.
- Added UE4 browse mode.
- Added some private room matchmaking features to public rooms.
- Improved leaderboard support in the Dashboard (paging, reset/clear leaderboards).
Overview of Oculus Platform SDK Version 1.9
The Oculus Platform SDK 1.9 release includes minor improvements, bug fixes, and updates.
- Simplified how to specify matchmaking queries and query variables. Additionally, introduced a new matchmaking argument request structure to make it easier to modify future versions without breaking backwards compatibility. For more information, see Matchmaking.
- Updated room invites documentation. For more information, see Rooms.
Overview of Oculus Platform SDK Version 1.8
The Oculus Platform SDK 1.8 release includes minor improvements, bug fixes, and updates.
- Added a new Quickmatch matchmaking mode. For more information, see Matchmaking.
- You can now subscribe to updates to observer room joins and leaves. For more information, see Matchmaking.
- Updated matchmaking queries. For more information, see Matchmaking.
Overview of Oculus Platform SDK Version 1.7
The Oculus Platform SDK 1.7 release includes minor improvements, bug fixes, and updates.
- VoIP Filters: You can now add voice effects to VoIP communications. For more information, see Voice Chat (VoIP).
- Developer and Admin Entitlements: Developers and admins automatically get entitlements to all apps within that organization.
Overview of Oculus Platform SDK Version 1.6
The Oculus Platform SDK 1.6 release includes improvements to storing user game data in the cloud, achievements, and auto-updates for Gear VR apps.
- Cloud Storage update: You can now delete stored data. For example, you can let your users decide to delete saved games.
- Achievements update: You can now design a specific cosmetic appearance for your achievements using our API.
- Matchmaking update: Matchmaking now supports multiple players in all modes.
- Separable API update: Only the libovrplatformloader.so is required for auto-updates for native Gear VR apps.
Overview of Oculus Platform SDK Version 1.5
The Oculus Platform SDK 1.5 release includes new functionality, including more options for room invites, an end-to-end VoIP API for multi-player voice communication, and the option to store user game data in the cloud.
- Room Invites: Room invites are the best way to allow the users of your app to initiate a shared game. Use the Oculus System UI, or build your own UI if you wish.
- VoIP: Use VoIP to permit direct voice communication among users of your app.
- Cloud Storage Store user data, like game-save data, in the cloud so users can access their games from any computer.
- Separable API: For Gear VR apps, the new Oculus platform SDK files libovrplatformloader.so and svcloader.jar will silently auto-update in the background from now on, just as currently happens with Platform SDK .dll files for Rift apps.
Overview of Oculus Platform SDK Version 1.2.x
The 1.2.0 release adds Unreal Engine support, as well as improvements to Unity friend requests, P2P API, error messages, and matchmaking debugging.
Note: The 1.2.1 release supports UE4.11 in addition to UE4.10.
Initial release of UE4 plugin, for apps made with Unreal Engine, with:
- Entitlement and user's Oculus username — UE4 OnlineIdentityInterface
- User's friends list — UE4 OnlineFriendsInterface
- Achievements — UE4 OnlineAchievementsInterface
- Rooms and Matchmaking — UE4 OnlineSessionInterface
- UE4 Networking with Oculus usernames
Unity support for friend requests:
- Ability to mark notifications as read, as well as retrieve RoomInvites from the server — ovr_Notification_GetRoomInvites
- Unity callback — RoomInviteNotification
P2P API improvements:
- Check for open connections to a given peer — ovr_Net_IsConnected()
- Broadcast a single packet to all members of a room — ovr_Net_SendPacketToCurrentRoom()
- Enforce automatic acceptance of connection attempts from room members — ovr_Net_AcceptForCurrentRoom()
- Change state when a peer explicitly closes their end of the connection, or when a previously-open connection breaks — ovrPeerState_Closed added to ovrPeerConnectionState
- Improved error messaging: call the function ovr_Error_GetDisplayableMessage to show a customized error message for Oculus Platform SDK calls
- Matchmaking debug enhancement: matchmaking_pool_for_admin graph API node is now available for debugging
Overview of Oculus Platform SDK Version 1.1.0
The 1.1.0 release focuses on performance improvements and minor bug fixes.
- Removed exports that prevent linking with UE4 in some cases.
- Fixed message parsing resulting from ovr_Matchmaking_JoinRoom.
Overview of Oculus Platform SDK Version 1.0.0
Release 1.0.0 is a maintenance release leading up to Rift launch.
- A number of new Leaderboard management web APIs were added to the REST API documentation.
- When joining a room once a match has been found, please switch from using ovr_Room_Join to ovr_Matchmaking_JoinRoom. ovr_Room_Join will soon be deprecated for matchmaking rooms, but will continue to work for released games and joining non-matchmaking rooms.
- When canceling an enqueuement, switch from using ovr_Matchmaking_Cancel to ovr_Matchmaking_Cancel2. You no longer need to pass in the request hash. With the new changes, you no longer need to care about request hashes at all. | s3://commoncrawl/crawl-data/CC-MAIN-2018-43/segments/1539583514162.67/warc/CC-MAIN-20181021161035-20181021182535-00471.warc.gz | CC-MAIN-2018-43 | 13,175 | 121 |
https://grokbase.com/t/hadoop/common-user/10aghamzm5/hadoop-solaris | code | || at Oct 16, 2010 at 9:34 pm
On Oct 16, 2010, at 1:08 PM, Bruce Williams wrote:
I am doing a student Independent Study Project and Harvery Mudd has given
me 13 Sun Netra X1 I can use as a dedicated Hadoop cluster. Right now they
are without an OS.
If anyone with experience with Hadoop and Solaris can contact me off list,
even to just say I am doing it and it is OK it would be appreciated.
That's my cue! :)
We have a few grids that are running Solaris. It mostly works out of the box as long as you are aware of three things:
- There are some settings in hadoop-env.sh and in the path that need to be dealt with. Rather than re-quote, these were added to the Hadoop FAQ a week or two ago so definitely take a look at that.
- The native compression libraries will need to be compiled. Depending upon what you are doing/how performant the machines are, this may or may not make a big difference. Compiling under Solaris with gcc will work fine (but it is gcc... ugh!). Only a few minor changes are required to compile it with SUNWspro. [I have patches laying around here somewhere if anyone wants to play with them.]
- The Solaris JRE is a mixed-mode implementation. So keep in mind that -d32 and -d64 have meaning and do work as advertised. You'll likely want to pick a bitsize and use that for all your Hadoop daemons and tasks, especially if you plan on using any JNI like the compression libraries. | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570767.11/warc/CC-MAIN-20220808061828-20220808091828-00706.warc.gz | CC-MAIN-2022-33 | 1,404 | 12 |
https://www.contrebombarde.com/concerthall/music/23720 | code | The other two are however a bit beyond my technical abilities. So it's long and hard work to learn to play them. I am not finished yet, but here's a taste of Scheibe's sonate in b flat major, third part. A few more weeks of study and I think I can play all three parts of this sonata well enough to publish it.
So this post is just an apetizer of what is to come... :-) | s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656103626162.35/warc/CC-MAIN-20220629084939-20220629114939-00798.warc.gz | CC-MAIN-2022-27 | 369 | 2 |
https://developpaper.com/basic-concepts-of-xml-markup-language-and-introduction-to-grammar/ | code | XML represents an extensible markup language. It is a text-based markup language, derived from the Standard General Markup Language (SGML).
XML tags identify data and are used to store and organize data, rather than specifying how to display it, which is used to display data like HTML. XML will not replace HTML in the near future, but it introduces possibilities by adopting many successful features in HTML.
There are three important features of XML that make it useful for a variety of systems and solutions:
XML is extensible: XML allows us to create our own self-describing tags or languages for applications.
XML carries data, but does not render it: XML allows us to store data, no matter how it is rendered.
XML is a common standard: XML is developed by an organization called the World Wide Web Consortium (W3C), and it can be used as an open standard.
Use of XML
This short list of XML uses illustrates everything:
XML can work behind the scenes to simplify creating HTML documents for large websites.
XML can be used to exchange information between organizations and systems.
XML can be used to uninstall and reload databases.
XML can be used to store and organize data, and can also customize data processing requirements.
XML can easily merge style sheets to create almost any desired output.
In fact, any type of data can be represented as an XML document.
What is markup?
XML is a markup language that defines a set of rules for encoding documents in human-readable and machine-readable formats. So what is Markup Language? Markup is the information added to a document to improve its meaning in a way that identifies parts and how they relate to each other. More specifically, a markup language is a set of symbols that can be placed in the text of a document to partition and mark certain parts of the document.
The following example shows what an XML tag embedded in a piece of text looks like:
- <text>Hello, world!</text>
This fragment contains markup symbols or labels, such as <message> </message> and <text> </text>. Labels < message > and </message > denote the beginning and end of this XML code fragment. Labels < text > and </text > wrap the text Hello World!.
Is XML a programming language?
A programming language for creating computer programs consists of grammar rules and its own vocabulary. These programs instruct the computer to perform specific tasks. XML does not qualify as a programming language because it does not perform any computations or algorithms. It is usually stored in simple text files and processed by special software that can interpret XML.
The following is a complete XML document:
- <?xml version=“1.0”?>
- <name>Tanmay Patil</name>
- <phone>(011) 123-4567</phone>
You can notice that there are two types of information in the example above:
Markup, such as <concat-info>.
Text or character data, such as _Tutorials Point and (011) 123-4567_.
The following figure describes the grammatical rules for writing different types of tags and texts in an XML document:
Let’s take a detailed look at each of the components in the figure above:
An XML document can have an optional XML declaration. It can be written in the following forms:
<?xml version=”1.0″ encoding=”UTF-8″?>
Here version is the XML version, encoding specifies the character encoding used in the document.
Syntax rules for XML declarations
XML declarations are case-sensitive and must begin with “<? Xml>”, where “xml” is lowercase.
If the document contains an XML declaration, it must be the first statement of the XML document.
An XML declaration must be the first statement in an XML document.
An HTTP protocol can be used to override the encoding value specified in the XML declaration.
Labels and elements
The structure of an XML file consists of several XML elements, also known as XML nodes or XML tags. The names of the XML elements are closed with angle brackets <>, as follows:
Grammatical rules for labels and elements
Element grammar: Each XML element must be closed or with start and end elements, as follows:
Or abbreviated form, like this:
Element nesting: An XML element can contain multiple XML elements as its sub-elements, but the sub-elements cannot overlap. For example, the end tag of an element must have the same name as the recently matched start tag.
The following example shows incorrect nested tags:
- <?xml version=“1.0”?>
The following example shows the correct nested tags:
- <?xml version=“1.0”?>
Root element: An XML document has only one root element. For example, the following is an incorrect XML document because the X and Y elements appear at the top level without a root element:
The following example shows the correct form of an XML document:
Case-sensitive: The names of XML elements are case-sensitive. This means that the start and end labels of elements must be the same case.
For example, <contact-info> and <Contact-Info> are different.
Attribute uses name/value pairs to assign an attribute to an element. An XML element can have one or more attributes. For example:
- <a href=“http://www.tutorialspoint.com/”>Tutorialspoint!</a>
Here href is the attribute name, and http://www.tutorialspoint.com/ is the attribute value.
Syntax rules for XML attributes
XML attribute names are case sensitive (unlike HTML). That is to say, HREF and href are considered to be two different XML attributes.
There can be no two identical attributes in grammar. The following example shows the incorrect syntax because attribute B has been specified twice:
- <a b=“x” c=“y” b=“z”>….</a>
Property names are defined without quotation marks, and property values must be displayed in quotation marks. The following example demonstrates incorrect XML syntax:
- <a b=x>….</a>
In the above grammar, attribute values are not defined in quotation marks.
References usually allow us to add or include additional text in an XML document. The reference always begins with the symbol “&”, which is a reserved character and ends with the symbol “;”. There are two types of references in XML:
Entity reference: A name is included between the start and end delimiters of an entity reference. For example, & amp;, where amp is the name. This name usually points to a predefined text string or tag.
Character references: These contain references such as & # 65; contain a hash tag (“”), followed by a number. This number always points to the Unicode code code of a character. Here, 65 points to the letter “A”.
The names of XML elements and XML attributes are case-sensitive. This means that the start and end labels of elements must be case-sensitive.
To avoid character encoding problems, all XML files should be saved as Unicode UTF-8 or UTF-16 files.
Blank characters such as spaces, tabs, and line breaks between XML elements and XML attributes are ignored.
Some characters are reserved by the XML grammar itself. Therefore, they cannot be used directly. To use them, you need to use some alternative entities. Here are some: | s3://commoncrawl/crawl-data/CC-MAIN-2021-21/segments/1620243989916.34/warc/CC-MAIN-20210513111525-20210513141525-00403.warc.gz | CC-MAIN-2021-21 | 7,024 | 69 |
https://news.microsoft.com/2014/03/12/microsoft-takes-a-stand-on-student-privacy-with-best-in-class-education-solutions/ | code | BARCELONA, Spain — March 12, 2014 — Microsoft Corp. on Wednesday opened its annual Microsoft in Education Global Forum by emphasizing the importance of student privacy and reaffirming its commitment to helping ensure that student data is never mined for advertising and marketing purposes. The opening keynote speech, which took place in front of an audience of 1,100, including innovative educators, school leaders and government officials from nearly 100 countries, also saw Microsoft highlight its end-to-end, best-in-class solutions with student success and career and college readiness at the forefront.
“Privacy concerns are holding educators back from making the most of modern technology and preparing students to succeed in today’s workplace. At the same time, many solutions being used in the classroom are unintentionally putting student data at risk,” said Anthony Salcito, vice president, Worldwide Education, Microsoft. “The private sector has a responsibility to give educators the tools and resources that inspire real learning and have a real impact, while ensuring privacy isn’t a barrier to bringing new and innovative technologies into the classroom. This is why Microsoft is committed to taking every measure it can to ensure student information remains safe around the world. We will not, under any circumstance, mine students’ data.”
Microsoft technology is used in 98 percent of schools worldwide. The company’s end-to-end education solutions take the risk out of deploying the latest technologies and solve educators’ most pressing challenges across the following key areas:
• Productivity and creativity. Microsoft Office 365 Education, an enterprise-quality communication and collaboration tool available in the cloud, is currently used by 110 million students, faculty and staff. This always-on cloud service guarantees that student data will never be mined for advertising. Student Advantage, available for free through qualifying institutions, includes the entire Office suite and more than 4 million students are already getting Office 365 Professional Plus from their schools since it was launched in December 2013. Microsoft Office has also proved valuable to students; a recent IDC study found Microsoft Office proficiency is among the top 20 skills required for high-growth/high-salary occupations.
• Safer, more private search. Bing for Schools ensures students don’t see search ads when using Bing and also enhances their privacy by preventing the use of data to create ad profiles — all with no compromise on the exceptional search experience delivered. No other major search engine can make the same promise.
• Management. Windows Intune is a cloud service that allows school IT administrators to manage Windows, Windows Phone, Android and iOS devices connected to their network over the Web, eliminating the need to own each device or to use onsite servers.
• Professional development. Microsoft offers resources to train teachers on new technology, including the Partners in Learning Network that reaches nearly 1 million educators worldwide and includes online professional development, how-to tutorials, and learning activities created by teachers for teachers.
• Technology training. The Microsoft IT Academy provides industry-leading technology skills to more than 8.5 million teachers and students in 130 countries to help bridge the technology skills gap. In addition, Microsoft has helped educators around the world successfully incorporate technology into the classroom to enhance the learning experience for their students through programs such as Teaching With Technology.
• Device choice. Microsoft works with its original equipment manufacturer (OEM) partners to bring better choice and quality and more affordable devices powered by Microsoft software and services to market for educators and students around the world.
• YouthSpark Initiative. Microsoft’s focus on privacy in education is part of its overall commitment to empowering youth through opportunities for education, employment and entrepreneurship.
“We’ve chosen Microsoft because the company provides an end-to-end solution that meets all our needs — innovative and secured devices, best-in-class productivity, and collaboration apps and comprehensive management capabilities. In addition, the company provides the training and resources our educators need to ensure that our technology investments are successful,” said Clayton Carnes, school leader, Hermit Park State School in Australia. “Microsoft’s unwavering commitment to student privacy is also extremely important to us because we can rest assured that our students’ data isn’t being mined for advertising and marketing purposes. This commitment really sets Microsoft apart in the market.”
Other news announced today included the following:
• Pearson and Microsoft are joining together to create new applications and advance a digital education model that prepares students to thrive in an increasingly personalized learning environment. One of the first collaborations in the U.S. between the two global companies will combine Pearson’s Common Core system of courses with the groundbreaking capabilities of the Windows 8 touchscreen environment.
• Interactive education technology company Promethean World plc has committed to developing innovative Windows 8 apps and Office 365 integration for its platform ClassFlow, a cloud-based, classroom tool that enables teachers to create lesson plans, connect and deliver interactive content across multiple devices, and assess student understanding.
• BrainPOP has released its third Windows 8 app, BrainPOP ESL. BrainPOP ESL is a comprehensive English language learning program that uses engaging animated movies to model conversational English.
• In support of its long-term goal to make all systematic knowledge immediately computable and accessible to everyone, Wolfram|Alpha will deliver 22 Windows 8 apps for tablets, including the Wolfram|Alpha App,16 Course Assistant Apps, and 5 Reference Apps.
• Knewton Inc. and Microsoft announced a global alliance to promote adaptive learning and support Microsoft’s partner and publisher ecosystem in personalizing content for students.
• A global partnership with CK-12 Foundation supports the development of innovative Windows 8 apps to provide students and teachers with access to a rich library of K–12 STEM content at no cost.
Now in its 10th year, the Microsoft in Education Global Forum brings together more than 1,100 of the most innovative and committed educators, school leaders and government officials from around the world — including more than 250 Expert Educators and 75 Mentor School leaders. Each year, the Global Forum provides an opportunity for education’s best and brightest to learn from their peers, share classroom triumphs and challenges, and collaborate to help transform education for the 21st century.
Microsoft’s focus on privacy in education is part of the YouthSpark initiative, our global commitment to empowering youth through opportunities for education, employment and entrepreneurship. In its first year alone, YouthSpark created new opportunities for more than 103 million young people in over 100 countries around the world.
The Microsoft in Education Global Forum is supported by Platinum- and Gold-level sponsors Pearson, Promethean, Dell Inc., Intel Corporation, Acer and the School Improvement Network.
Founded in 1975, Microsoft (Nasdaq “MSFT”) is the worldwide leader in software, services and solutions that help people and businesses realize their full potential.
Note to editors: For more information, news and perspectives from Microsoft, please visit the Microsoft News Center at http://www.microsoft.com/news. Web links, telephone numbers and titles were correct at time of publication, but may have changed. For additional assistance, journalists and analysts may contact Microsoft’s Rapid Response Team or other appropriate contacts listed at http://www.microsoft.com/news/contactpr.mspx. | s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100575.30/warc/CC-MAIN-20231206000253-20231206030253-00246.warc.gz | CC-MAIN-2023-50 | 8,099 | 23 |
http://www.tomshardware.com/forum/289807-28-capacity-power-supply | code | Look at the sticker on the PSU. All the details would be there. At least mention the model number and we will try to say if its good or not.
I checked the sticker. It says 385 watt (max 400 watt). But the problem is, my PSU is not from a brand. It was with the casing. One of my friends said that I shouldn't always trust the sticker unless they are branded. I know some cases where it is actually true. That is why I asked that question. | s3://commoncrawl/crawl-data/CC-MAIN-2018-26/segments/1529267866937.79/warc/CC-MAIN-20180624121927-20180624141927-00427.warc.gz | CC-MAIN-2018-26 | 438 | 2 |
https://www.gatech.edu/academics/degrees/bachelors/physics-bs | code | Undergraduate Physics Degree Overview
In addition to its technology-focused curriculum and state-of-the-art laboratories, Georgia Tech’s B.S. in Physics degree program offers several key advantages:
- Undergraduate research with a world-class faculty and projects with a technological focus.
- Flexible elective course requirements that allow for a degree to be tailored toward individual career goals.
- The Atlanta location: Atlanta, Georgia is one of the most tech-savvy cities in the U.S. and is also home to some of the world’s largest companies.
As a Physics major, you will develop a basic competence in applying the scientific method, using qualitative and quantitative analysis to investigate physics problems — from the atomic to the astronomical scale. You will develop a strong understanding of how the laws of Physics shape our understanding of the world, and of how mathematical analysis and experimental methods may be used as investigative tools.
Physics Degree Concentrations and Options
Add a specialization in one of these areas to your degree.
Increase your competitiveness in the job market after graduation.
- Pursue an in-depth, long-term research experience. Learn more about the Research Option.
- Build a business perspective into your degree without adding the hours
required for a minor. Learn about the Business Option.
B.S. Physics Degree Requirements
The B.S. in Physics degree program contains the following: general core classes; technical courses that provide a strong background in mathematics; technical electives to explore areas in greater depth; courses involving undergraduate research; and free electives. View a typical eight-semester course schedule.
- Core sequences in quantum mechanics, thermal physics, and electromagnetism.
- Undergraduate research.
- A wide range of elective courses, ranging from quantum computing and optics to relativity and neurophysics.
Rankings and Awards
Georgia Tech’s School of Physics faculty members are frequently recognized for their outstanding contributions in their fields. These awards include:
- Reuters Most Cited Researcher Awards
- NSF Career Awards
What Can You Do with a Physics Degree?
Physicists find careers in Physics research, industry, medicine, education, and public policy. In fact, a majority of graduates ultimately enter
careers not traditionally associated with Physics.
What Are Georgia Tech Graduates Doing Now?
- Nearly 75% of Georgia Tech undergraduate Physics majors continue their majors at graduate schools such as Harvard, Caltech, Georgia Tech, University of California at Berkeley, University of Colorado at Boulder, and Northeastern University.
- Some 40% of those graduate students continue to study Physics, while the other 60% go into fields such as engineering, medicine, law, actuarial science, and education.
Georgia Tech Physics graduates who enter the workforce after graduation work for companies such as Applied Physical Sciences, Georgia Power, Kairos Aerospace, Delta Air Lines, General Motors, United States Army, and Micromeritics Instrument Corporation. | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570651.49/warc/CC-MAIN-20220807150925-20220807180925-00796.warc.gz | CC-MAIN-2022-33 | 3,088 | 28 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.