url
stringlengths
13
4.35k
tag
stringclasses
1 value
text
stringlengths
109
628k
file_path
stringlengths
109
155
dump
stringclasses
96 values
file_size_in_byte
int64
112
630k
line_count
int64
1
3.76k
http://www.gdcl.co.uk/2013/03/22/iPhone-Resume-Recording.html
code
A reader asks if it is possible to adapt this sample (demonstrating pausing and resuming iPhone video recording) so that it can resume when the app returns from the background. The short answer is that (as far as I can see) it is possible, but fiddly. The AVFoundation asset writer does not have the option to append to an existing file. So if you want to resume recording to the same file, you’ll need to keep that open while in the background. The MP4 file format has an index that is written out to the file at the end of recording. Without this index, it is not possible to play the file. So if you leave the file open, it is not playable at all, and if you close it, you cannot write any more to it. The asset writer is writing to the file in the background. So when your app is sent to the background, even if you terminate the camera session, there will still be data to write and these writes will be terminated, causing an error. There’s no simple way to wait for the background writes to complete, unless you close the whole file. So option 1 is to request background time and just keep the app active in the background. To be honest, this seems very unsatisfactory. The only other alternative is to start a new file, and combine it with the old file. You could either write the old file to the new file before resuming recording (but that makes resuming a very slow operation) or you could create a different file each time and combine them when you stop recording (but that makes stopping recording a slow operation). My suggestion is this: - before suspending, you are recording to a file (file A) which you close on entering background. - when you resume, start recording to a new file (file B). - in the background, create a new file C. - write everything from file A to file C and delete file A. - read the data from file B as it is being written, using this sample, and write to file C. I think whatever the approach you take, you will need to copy all the recorded data after resuming. If you write a separate file each time and combine all the files at the end, you only need to do this copy once, but it will be potentially a slow operation. This approach copies all the data every time you resume, but it does it in the background and should make both resuming and finishing rapid. For the time being, I’ll leave this as an exercise to the reader. 22nd March 2013
s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218190754.6/warc/CC-MAIN-20170322212950-00140-ip-10-233-31-227.ec2.internal.warc.gz
CC-MAIN-2017-13
2,390
9
https://www.freelancer.ph/projects/php/Build-software-12776099/
code
I need the software as like in this video i am sorry here is the video 12 freelancers are bidding on average $19/hour for this job Hi, I will be able to complete this project. You can see some of my work on [login to view URL] . You can contact me on Skype on faizsameerahmed96 or through freelancer.
s3://commoncrawl/crawl-data/CC-MAIN-2018-26/segments/1529267864943.28/warc/CC-MAIN-20180623054721-20180623074721-00102.warc.gz
CC-MAIN-2018-26
300
4
https://www.branfordinstitute.org/post/certificated-nursing-assistant
code
Certificated Nursing Assistant Updated: Jun 16 CERTIFIED NURSING ASSISTANT: This program has been described as the fastest growing job in the US, after successful completion of NJDHSS-approved Nurse Aide in Long-Term Care Facilities Course, the nurse aide candidate will be ready to take the New Jersey State Department of Health and Senior Services Nurse Aide licensing examination which consists of skills evaluation and a written examination. Classes will start on 07/18/21 Give us a call at : 908-352-1004
s3://commoncrawl/crawl-data/CC-MAIN-2021-31/segments/1627046154214.36/warc/CC-MAIN-20210801123745-20210801153745-00055.warc.gz
CC-MAIN-2021-31
509
5
http://www.allinterview.com/interview-questions/49-196/qtp.html
code
hi Sudhananda reddy, in my resume, i written as , I Am working as a Test Engineer for xyz company. IS IT RIGHT OR WRONG? WHAT IS THE ACTUAL meaning of "IN XYZ COMPANY", "FOR XYZ COMPANY", "WITH XYZ COMPANY". My Project is HOSPITAL CONTROL SYSTEM. In this MY testing modules are In-patient and Out-patient. plz explain those modules. i.e. How explain to Interviewer. with full details also . Waht types of bugs we can fond ? NOTE : IT is a web project X flies from Hyd to bangalore using different methods of transportation. write the test scenarios and test cases for what is review How to run an integrated test scenario using Multiple Actions? How to use the QTP Step Generator? Can anyone share/send me QTP 8.2 Crack as I had it before but now it's virus affected. Pls send me on Which functionalities of QTP used in banking project? how can i pass a "cript"as a parameter in to a function am not having intrest in coding lang like c c++ java etc can i choose Testing tools as my carrier and please suggest me which tool is good (suitable for me) If you have two monitors one is of 19inch and the 2nd one is of 24inch,if you want to write same QTP script in both the two monitors is there any changes required in the script? can any body clearly explain about keyword driven framework .give me the explanation for files what ever you use in this How to data driven test for Win objects in QTP ? i need qtp tutorial. pls send it to sridhar.k151@g mail.com what is run-time data? To retrive the test data which tool vl use and whats basis u vl write test data? its urgent Hi, my requirement is to make a query in SQL using QTP. And i have to get the results of that query and i have to use those results for future testing. I created a driver but i dont know the code for using this Driver. please help me by providing the solution for y i am new QTP... please tell me automation frameworks , types & for whiich type of applications frameworks are used & how to generate script in keyword driven framework
s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440644065954.23/warc/CC-MAIN-20150827025425-00182-ip-10-171-96-226.ec2.internal.warc.gz
CC-MAIN-2015-35
2,006
38
https://blog.alexseifert.com/tag/blog/
code
It’s been a number of years since I last updated my website and blog, so it was past time that I do major rewrite. I re-conceptualized both websites so that they support both light and dark modes, feel more modern and are more enjoyable to use. I am very happy to announce a brand new project of mine called Developer’s Notebook, a blog and news website with content for developers. My history blog, History Rhymes, is the latest of my websites to receive an update. The new website underwent a general overhaul and also gained a new feature.
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764499804.60/warc/CC-MAIN-20230130070411-20230130100411-00346.warc.gz
CC-MAIN-2023-06
546
3
https://www.samuelmoult.com/press-pack
code
Below links are available for direct download. Profile & Biography To download the pictures, click and download from Google Drive. For performance videos, sketches and other works, please visit the videos page. For artwork approval, press & interview requests & any other concerns, please email [email protected] Sam on social media:
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446710698.62/warc/CC-MAIN-20221129132340-20221129162340-00328.warc.gz
CC-MAIN-2022-49
333
6
https://stackoverflow.com/questions/28127495/in-phps-laravel-how-do-i-clear-laravel-log/52469765
code
I'm new to Laravel and PHP in general, and I'm trying to clear my errorLog. The current errorlog that I'm using is Laravel's laravel.log file that is in /app/storage/logs. Is there an easy way to clear the laravel.log file? Is it safe to delete it and it'll rebuild when needed? I'm using the latest version of Ubuntu. Thanks!
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474852.83/warc/CC-MAIN-20240229170737-20240229200737-00307.warc.gz
CC-MAIN-2024-10
326
3
https://www.cybrilla.com/blog/native-vs-hybrid-vs-web-application-which-one-to-choose/
code
With the inception of HTML5 and CSS3 and with the likes of PhoneGap, Appcelerator, RhoMobile, IBM Worklight coming up with cross platform mobile app frameworks the biggest question running in the minds of mobile app developers is regarding which mobile architecture to use . Well after running around the internet and searching for answers myself I have tried to narrow down and summarize the problem with the help of the following questions : What is Native? Hybrid ? Web apps ? Native refers to building an app in a device’s native programming language. For iOS devices this means Objective-C, and for Android it’s Java. Native apps are typically fast, reliable, and can access all the the device’s hardware. These apps are usually built for high performance needs like mobile games. But the downside is that once built this app is tied down to the platform for which it is built. So an iOS app would not run on an Android device. A hybrid app is built using web technologies, and then wrapped in a platform-specific shell that allows the it to be installed just like a native app. Thus it is sold/accessed through the device’s app store. PhoneGap is an example of a framework that allows you take a web app and turn it into a native app for iOS, Android, BlackBerry, Windows 7, WebOS, Symbian and more. The hybrid frameworks typically have APIs as well, that allow you to access the device’s hardware and features that are locked out from the browser. 1> Pre application build considerations. What kind of application is to be built ? What architecture you use depends mostly upon the kind of application you want to built. If you application require the use of native features like camera, bluetooth, accelerometer, database, microphone, speaker, GPS, PUSH etc, then you are better off with a native app. Native apps provide you seamless transitions and quick/flawless access to these device capabilities. Or maybe you want to develop a high end game which utilizes the device graphics and relies on offline storage capabilities, native is the way to go. On the other hand suppose that your app will seldom utilize minimum device capabilities like camera, push notifications, then you can go for an hybrid app. These apps will infrequently use these capabilities but are not entirely dependent on them. Depending upon the API`s provided by different frameworks like PhoneGap, Rhomobile, Worklight etc you may choose one and start building the app. As the code written using these frameworks is interpreted by the browser and then compiled these apps are slower than the native apps. The last case is if you want to create a web app wherein you just want to share some information with the users on a regular basis or provide some kindof notifications to the users or for eg. You want to provide a product catalog for the consumers online. In this case the application does not utilize any of the device capabilities like camera, bluetooth etc. Such applications can be built using the powerful yet simple emerging technologies like HTML5 and CSS3. These apps can be accessed from anywhere by anyone using any device as long as they have an internet connection. These apps are the simplest to develop and maintain. 2>Post Application Built Considerations. Cost for developing, testing, maintaining, versioning. Going native is always going to be costly. Consider this, you may want to develop a game which is available for iOS, android, blackberry and windwos 8 platforms. Not only do you need experts across different platforms to develop this game, but you now have to maintain 4 copies of the same game. Going native would increase the cost for distribution, testing, maintenance, enhancements etc.. On the plus side however, these apps will provide you with all the functionality the device has to offer. The user experience would be the best and cannot be compared elsewhere. The plus point with developing a hybrid application is that the cost of building the application is reduced drastically. You would only need to develop the code once and the framework will provide you with 4 working versions for as many different platforms. Thus testing and maintenance of the app also reduces. But these apps are yet to showcase the seamlessness and user friendliness displayed by the native applications. One can only imagine with technologies like HTML5 and CSS3 developing that the gap between hybrid and native will be reduced. The web applications are again the most simplest to develop. Once however needs to take care adjusting the web page resolution depending upon the screen size of the device. For example the same screen resolution used on a 4 inch iPhone will not look great when used on a 8-9 inch tablet. By careful design considerations and coding this however is not a huge task. Again these apps are the simplest and do not use any device capabilities. Below are a few points which compare the advantages and disadvantages of each : |Skills/tools needed for cross-platform apps |Number of applications needed to reach major smartphone platforms |Lets you create apps with rich user interfaces and/or heavy graphics. |Combines the development speed of mobile web apps with the device access and app store distribution of native apps. |Offers fast development, simple maintenance, and full application portability. One mobile web app works on any platform.
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712297292879.97/warc/CC-MAIN-20240425094819-20240425124819-00486.warc.gz
CC-MAIN-2024-18
5,384
23
https://hashbang.nl/blog/small-featurebranches-and-the-empty-develop-branch-syndrome
code
- Peter Peerdeman When using a proper git flow and working with feature branches, you should force yourself to always think in smaller features, to promote rapid branching and merging. When working with the smallest possible feature branches which contain a single feature you avoid conflicts with teammates, often get the feeling of accomplishment when merging your feature and avoid the "empty develop branch" syndrome. The "empty develop branch syndrome" occurs when the team is working on a feature that turns out to larger than expected. Meanwhile the develop branch is abandoned, the unit tests are not being run for the develop branch and the staging environment does not get automatically deployed to. We could of course configure the feature branches to get the same continuous treatment but I'd rather see smaller features get integrated into the main development branch more often.
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100650.21/warc/CC-MAIN-20231207054219-20231207084219-00509.warc.gz
CC-MAIN-2023-50
892
3
https://membership.agu.org/ospawinner/ying-sun/
code
2011 Outstanding Student Presentation Award Winner presentation title:Forest Recovery After a Massive Ice Storm in China: Findings from the Application of a Unified Quantitative Framework for Studying Impacts of Large-scale Disturbances university:University of Texas at Austin meeting:2011 Fall Meeting Discuss this winner's work by posting a question or leaving a comment.
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662532032.9/warc/CC-MAIN-20220520124557-20220520154557-00638.warc.gz
CC-MAIN-2022-21
374
5
http://donovanadaqe.blog5.net/24417375/not-known-factual-statements-about-pay-me-to-do-your-assignment
code
Subsequent time if you are assigned homework, project or assignment that appears to be over and above your mental realm for the time being, don’t fret. Homework forces students to examine what was created in the course of course. They learn by way of repetition and homework is the only incentive that could be capable to encourage them to reread People materials. Most likely certainly one of A very powerful arguments that support a homework ban is The truth that a variety of reports have shown that homework doesn't maximize engagement or tutorial effectiveness normally. No matter if in the home or in other places, a peaceful place is essential for a great homework session. You might want a snack and consume just just in case. Rise up early on weekends. You've got complete concentration in the morning, and when you start Performing at six or seven each morning, you're going to be completed just before midday, and you'll have the remainder of the day to yourself. Where am i able to come across and spend anyone to carry out my programming homework? Who can do my programming homework? – These are typically the concerns students often request them self whilst self loathing. " problems generally is a practical release, even if they cannot quite clue you into the correct tactic. Some dad and mom Do not automatically understand how to help with your homework and may possibly wind up doing a lot of. Try out to keep yourself truthful. Asking for assist doesn't suggest inquiring your dad or mum to complete your give you the results you want. Geeksprogramming.com is programming blog site and finest programming assignment assist support service Learn More Here provider. We provide programming assist in Virtually all programming languages. GeeksProgramming was started Using the goal of Geeking out with or serving to out anyone and everyone who will reap the benefits of our coding abilities. We now have supplied perform for college students seeking aid in PHP, the scripting language for some Website growth and programming. Inquire a classmate. If you realize a person who is good in a matter, inquire if you can examine jointly. This will assistance, but Take into account that individuals that realize a subject matter usually are not always excellent at conveying it. In case you have any unanswered query concerning positioning the ask for of ‘do my math homework’, you may promptly Speak to our 24x7 click this link shopper care panel to unravel your confusion. They are available as a result of Stay chat facility, cellphone connect with service and mail system. The resource code of the program has to be subjected to a transformation approach to be machine language, interpretable through the processor. This method is called compilation. By clicking “Go on”, you conform to our phrases of services and privacy plan. We’ll once in a while send out you promo and account associated e-mail. Even when why not try here you experience that you will be stuck with your assignment and haven't got any time or energy remaining to cope with it, visite site tend not to despair! All You must do is key in "resolve science complications for me" and cease stressing about your assignment. Our science challenges enable will supply an elegant Answer It doesn't matter how complicated the activity is.
s3://commoncrawl/crawl-data/CC-MAIN-2019-30/segments/1563195525187.9/warc/CC-MAIN-20190717121559-20190717143559-00508.warc.gz
CC-MAIN-2019-30
3,329
14
https://events.vmblog.com/vmworld-2020/item/828-vmworld-2020-cloudbolt-software-video-interview-with-vmblog-cloud-management-platform.html
code
As part of our VMworld 2020 coverage, VMblog visits with Rick Kilcoyne, Chief Technology Officer and Grant Ho, Chief Marketing Officer at CloudBolt Software, an enterprise leader in cloud management and integration solutions. In this video, we discuss trade shows like VMworld becoming digital events and what that means, how companies have moved to a work from home lifestyle, and how CloudBolt operates with VMware as a partner. Watch and learn as Rick and Grant explain more about the company's technology, and offer a view into the product. CloudBolt is a leading cloud management platform for the enterprise. Deployed in minutes, CloudBolt helps IT unify orchestration and automate provisioning of their hybrid cloud resources - quickly, cost-effectively, and securely - while providing developers with anywhere, anytime access to those resources through a self-service catalog. Learn more about CloudBolt by visiting: https://www.cloudbolt.io/
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224644855.6/warc/CC-MAIN-20230529105815-20230529135815-00235.warc.gz
CC-MAIN-2023-23
949
4
https://www.winaso.com/knowledge/Check-out-how-to-perform-a-complete-disk-cleanup.asp
code
Check Out How to Perform A Complete Disk Cleanup When you are getting "low disk space" warning or your system is running at a turtle speed, it's time for you to perform a complete disk cleanup. Windows has a built-in disk cleanup function which can remove some useless flotsam. However it cannot help you clean the major temporary files. You have to do it yourself. You can download WinASO Registry Optimizer and WinASO Disk Cleaner to perform an easy cleanup or do it all by yourself if you are confident about your Below are some tips to help you free up much more valuable disk space and improve the overall system performance. Remove the temporary files created by Windows and Windows programs. First, let's find out what types of temporary files Windows and its programs will create during running: Temporary installation files Many programs will compress its installation file into a temporary folder (usually under Windows/Temp) during installation. When the installation completes, if the program designer forgets to take care of these temporary files, they will be left in your disk and become In many cases, these files exist as *.tmp files, as seen in Figure 1 - Temporary interchanging files and backup files create some temporary interchanging files when running, such as *.old and *.bak. Anti-viruses or system programs will also generate backup files when scanning disks, as shown in Figure 2. Built-in help files, tutorial files, dll files. Programs may have built-in help files or tutorial files , often ended with ".hlp". DLL is used by most Windows programs. But these *.dll files, *.hlp files as well as related registry keys are often left behind even after the programs have been removed from the - Temporary files generated by web browser When you are surfing on the internet, your web browser will download the web pages you have visited to local machine, which can occupy large amount of disk space, and create privacy problem at the same time. Besides, web browsers will also generate history records, temporary cache files, cookies, etc, which can all be cleaned when you need disk space. - Other temporary files generated by Windows These files include temporary files created during Windows installation and running (such as *.tmp and *._mp), temporary backup files (such as *.bak, *.old, *.syd), temporary help files (*.gid), data files created during disk checking (".chk") and other temporary files such as *.dir, *.dmp, *.nch. types of temporary files existing in your system, you can now start to clean them up. Just use "Search" function in Windows and input the postfixes of all these temporary files to locate them. Then select all the files in the result window, and right click to remove them all. Don't forget to check the two temporary folders "C:\Temp" and "C:\WINDOWS\Temp. All the files stored here are junk files and can be removed without a problem To remove the temporary internet files created by web browser, you can simply go to Control Panel -> Internet Options and use the cleanup functions provided there to remove histories, temporary internet files and Remove the Windows components and programs that are rarely used. Go to "Control Panel" -> "Add/Remove Windows Components" and "Add/Remove Programs" to remove those programs or components that you no longer need. Remove the junk records recorded by Remove the program name list in "Run" Going to Start -> Run, we will see there is a list of commands in the "Open" boxes, but many of them are no longer useful and may reveal our privacies. To remove these junks, you can go to registry editor (by running "regedit.exe"), and remove the unwanted items listed in the right-hand side window. Please note do not delete "Default" and "MRUList". the visited document list in "Start" Select "Start" -> "Settings" ->"Task Bar and Start Menu" (there are some differences among different Windows version, e.g, in Windows 7, you should right click on "Start" and select "Properties"). Select "Start Menu" in the dialog box, and use the delete function here to remove the document list. - Remove the play histories in Windows Media Player Windows Media Player will record the play histories and display them in the drop down menu. If you want to remove them, you can open registry editor, locate HKEY_CURRENT_USER/Software/Microsoft/MediaPlayer/Player/ RecentFileList, and delete all the registry keys displayed on the right. Then your play histories will be gone. The same way can be applied to clear play histories in other audio/video players such Real Player and ACDSee - Remove the histories recorded in the address bar of web browsers Web browsers will automatically record the visited sites in the address bar. To remove these records, you can go to registry editor, locate "HKEY_CURRENT_USER\Software\Microsoft\InternetExplorer\TypedUrls" and delete the unwanted items on the right. Remove the junks left by programs - Remove the programs' installation on the program's shortcut, select "Properties" -> "Find Target" to locate and delete the installation directory of the program. Remove the junks in "Add/Remove Programs" Sometimes the programs already uninstalled will still appear in the list of "Add/Remove Programs". We can open registry editor, locate "HKEY_LOCAL_MACHINE/SoftwareMicrosoft/Windows/CurrentVersion/Uninstall", and select those unwanted items on the right to remove. - Remove the registry keys related to the programs. registry editor, and use the search function to locate all the registry keys that are related to the program. You can use the program's executable file name as the search criteria.
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100056.38/warc/CC-MAIN-20231129041834-20231129071834-00032.warc.gz
CC-MAIN-2023-50
5,621
104
https://trac.osgeo.org/mapserver/wiki/50ReleasePlan
code
This is the MapServer 5.0 release plan adopted by the MapServer PSC on 2007-07-20. See MS RFC 34 for more details on the MapServer Release Process. New Features and Major Bug Fixes New features in 5.0: - MS RFC 19: Added Style and Label attribute binding - MS RFC 21: Raster Color Correction via color lookup table - MS RFC 27: Added label priority - MS RFC 29: Added dynamic charting (pie and bar charts) - MS RFC 31: New mechanism to load/set objects via URL using mapfile syntax - MS RFC 32: Added support for map rendering using the AGG library for better output quality Long time issues resolved in 5.0: - MS RFC 17: Use dynamic allocation for symbols, layers, classes and styles (got rid of the static limit on the number of instances of each in a map) - MS RFC 24: Improved memory management and garbage collection for MapScript - MS RFC 26: Terminology cleanup (layer transparency renamed to opacity, scale becomes scaledenom, symbol style becomes symbol pattern) - MS RFC 28: Enhanced the debug/logging mechanism to facilitate troubleshooting and tuning applications. Added support for multiple debug levels and more control on output location. We will plan for 5 betas and 2 release candidates (RC) over a 7 weeks period after the code freeze (1 beta/RC per week each Wednesday). This will lead us to a final release around September 12th: - Feature freeze - July 23, 2007 - 5.0.0-beta1 - Wed. July 25, 2007 - 5.0.0-beta2 - Wed Aug. 1, 2007 - 5.0.0-beta3 - Wed Aug. 8, 2007 - 5.0.0-beta4 - Wed Aug. 15, 2007 - 5.0.0-beta5 - Wed Aug. 22, 2007 - 5.0.0-beta6 - Wed Aug. 29, 2007 - 5.0.0-rc1 - Wed Sept. 5, 2007 - 5.0.0-rc2 - Mon Sept. 10, 2007 - 5.0.0 (final) - Mon Sept. 17, 2007 Release Manager (see MS RFC 34) SVN Tags/Branches?Note that starting with this release the source code is now managed in Subversion (SVN) instead of CVS and we have migrated from bugzilla to Trac for bug tracking. - The main trunk SVN is currently the 4.99 development version that we plan to release as 5.0 - The stable SVN branch for this release will be called "branch-5-0" (not created yet). - Current proposed date for creating "branch-5-0" is the date of the 5.0.0 release (around Sept 12, 2007) - If post-5.0 developments require earlier branching then please bring up your request for branching on the -dev list. - The betas will be tagged in SVN as "rel-5-0-0-beta1", "rel-5-0-0-beta2", ... and the releases as "rel-5-0-0", "rel-5-0-1", etc... In order to facilitate querying the Trac database for tickets that still need to be addressed for this release, we try to stick to the following conventions: - Tickets to be addressed for this release must have their target milestone set to "5.0 release" - Bugs/Enhancements? that can't make it in this release but that we may want to address at a later time should be marked with the "FUTURE" target milestone with a comment explaining that the bug is postponed and if possible a quick analysis - The target milestone on a ticket should be set by the developers (bug owners) and not by the users (reporters). Other good practices when dealing with tickets: - Please file tickets for any non-trivial bugfix or change to the software. This is so that we keep a trace for future reference of all bugfixes and changes that were made (why and how). - Please mark bugs ASSIGNED as soon as you start working on them - Please when marking a bug fixed include a comment describing the fix, the version of the software in which it was done, the SVN changeset number (e.g. r1234) and any other relevant information. This will just make our lives easier in a few months/years when questions come up about this issue. - When committing to SVN, please include the bug number in your CVS change log comment e.g. (#1234). - Keep documentation in mind when fixing/changing things: if you cannot update the documentation yourself then please create a documentation bug describing the new feature/change and which document(s) should be updated. The following query returns all currently open bugs that are tagged with the "5.0 release" target milestone:
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446706291.88/warc/CC-MAIN-20221126112341-20221126142341-00000.warc.gz
CC-MAIN-2022-49
4,076
44
https://forum.antergos.com/topic/8272/deepin-iso-refresh-coming-soon-as-in-before-another-month-goes-by/28
code
I wonder why that is though… does anyone know why Linux came to be more widely used in Europe than other parts of the world? Well not sure why exactly, but - Linux was originally developed by Linus Torvalds in Finland (a country in Northern Europe) - Linux has been quite popular e.g. in Germany and many other European countries, especially in universities and scientific institutions - there is a natural need to have a real competition against Microsoft and Apple operating systems and applications But as you know, Linux kernel is used in Android, too… So that alone makes Linux a worldwide thing nearly everybody uses.
s3://commoncrawl/crawl-data/CC-MAIN-2019-22/segments/1558232254731.5/warc/CC-MAIN-20190519081519-20190519103519-00085.warc.gz
CC-MAIN-2019-22
627
6
https://support.plesk.com/hc/en-us/articles/213901205-Unable-to-restore-the-backup-The-DNS-service-is-not-installed
code
- Plesk for Linux Backup restore failed with the following error message: PLESK_ERROR: The DNS service is not installed. The DNS settings will not be restored for the following objects: domain.tld plesk-dns-bind-driver package was not installed. While BIND may be running on the server, it is not integrated with Plesk. Install BIND DNS server in Tools & Settingx > Updates and Upgrades. Alternatively, the same operation can be performed via CLI: Connect to the server via SSH. Run the following command: # plesk installer --select-release-current --install-component bind
s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267155942.15/warc/CC-MAIN-20180919063526-20180919083526-00470.warc.gz
CC-MAIN-2018-39
573
9
https://wellcomecollection.org/works/htxppvmm
code
God, aided by an angel, a serpent and Death, inflicts calamitous weather upon the Israelites. Engraving by A. Mochetti after G. della Valle. - Della Valle, Giuseppe. Attribution 4.0 International (CC BY 4.0) You can use this work for any purpose, including commercial uses, without restriction under copyright law. You should also provide attribution to the original work, source and licence. Creative Commons Attribution (CC BY 4.0) terms and conditions https://creativecommons.org/licenses/by/4.0 Selected images from this work About this work Italy : [publisher not identified] 1 print : line engraving with etching ; image 7.6 x 9.5 cm Giuseppe della Valle inv e del. Alessandro Mochetti inc. Wellcome Library no. 18244i
s3://commoncrawl/crawl-data/CC-MAIN-2020-50/segments/1606141189038.24/warc/CC-MAIN-20201127015426-20201127045426-00176.warc.gz
CC-MAIN-2020-50
724
11
https://threatpost.com/manipulating-wsus-to-own-enterprises/114168/
code
LAS VEGAS – Windows Server Update Services (WSUS) is your friend, if you run an enterprise IT shop, because it facilitates the download and distribution of security patches, service pack installations and hardware driver updates among others. Two researchers this week at the Black Hat conference, however, point out that WSUS can be a significant weakness that can lead to the complete compromise of any server or desktop in an organization hooked up to the automated update service. Paul Stone and Alex Chapman of Context Information Security in the U.K. took a long look at the WSUS attack surface and discovered that when a WSUS server contacts Microsoft for driver updates, it does so using XML SOAP web services, and those checks are not made over SSL. While updates are signed by Microsoft and updates must be verified by Microsoft, Stone and Chapman discovered that an attacker already in a man-in-the-middle position on a corporate network, for example, could with some work tamper with the unencrypted communication and inject a malicious homegrown update. While turning on SSL during the initial WSUS configuration mitigates the situation, there are organizations that may skip this crucial—and last step—of the WSUS setup. An attacker who manages to get a malicious update into an organization via WSUS, could do anything from remove, downgrade or stop patches from being installed to getting full control over servers and desktops. “It’s the worst-case scenario and it’s fairly bad,” Stone said. “And it’s not a vulnerability, it’s not something for Microsoft to fix.” Stone and Chapman said they’ve had a dialogue with Microsoft about their research, which Microsoft acknowledged and said that it recommends enterprise admins turn on SSL. Doing so requires provisioning a SSL cert for machines doing the update, a process that cannot be automated. “It’s not difficult and it’s something that most admins would know how to do,” Stone said. “Microsoft cannot do it by default. They could prevent it from working until a cert is put in, I suppose.” Stone and Chapman said they decided to tackle drivers because most are written by third parties for Windows servers and clients, and made for an easier target because, despite the fact that updates are signed and verified by Microsoft, XML metadata can be updated so that it points to, downloads and executes a malicious update. From Stone and Chapman’s paper: Windows Update will verify that each update is signed by Microsoft. However, there is no specific ‘Windows Update’ signing certificate–any file that is signed by a Microsoft CA will be accepted. By injecting an update that uses the CommandLineInstallation update handler, an attacker can cause a client to run any Microsoft-signed executable, even one that was not intended to be used in Windows Update. Even better, the executable can be run with arbitrary arguments. Therefore we need to find a suitable executable that will allow arbitrary commands to be executed. They turned to the Windows Sysinternals tool, specifically the remote command utility called PsExec which is signed by Microsoft. “Essentially, we made a program which man-in-the-middles the WSUS traffic, and then created a fake update and the told machine to download PsExec and run it with whatever arguments to do something malicious,” Chapman said. “That’s the attack. The really fun thing is that all updates are installed as system whether you’re a low privileged user or an admin. So this is quite powerful.” The only prerequisite for the attack is to already be on the network. From there, even an unauthenticated attacker can run the attack for any machine running WSUS without SSL to run arbitrary commands, Chapman said. “The hard thing was just finding the signed Microsoft executables we could put down and run to do useful things,” Chapman said.
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817153.39/warc/CC-MAIN-20240417110701-20240417140701-00329.warc.gz
CC-MAIN-2024-18
3,908
14
http://www.airitilibrary.com/Publication/alDetailedMesh1?DocID=U0016-1901201111415233
code
stands for Digital Object Identifier and is the unique identifier for objects on the internet. It can be used to create persistent link and to cite articles. Using DOI as a persistent link To create a persistent link, add「http://dx.doi.org/」 before a DOI. For instance, if the DOI of an article is 10.5297/ser.1201.002 , you can link persistently to the article by entering the following link in your browser: http://dx.doi.org/ 10.5297/ser.1201.002 。 The DOI link will always direct you to the most updated article page no matter how the publisher changes the document's position, avoiding errors when engaging in important research. Cite a document with DOI When citing references, you should also cite the DOI if the article has one. If your citation guideline does not include DOIs, you may cite the DOI link. DOIs allow accurate citations, improve academic contents connections, and allow users to gain better experience across different platforms. Currently, there are more than 70 million DOIs registered for academic contents. If you want to understand more about DOI, please visit airiti DOI Registration ( doi.airiti.com ) 。 - Adger, David, and Gillian Ramchand. 2003. Predication and equation. Linguistic Inquiry 34: 325-59. - Alexiadou, Artemis, and Elena Anagnostopoulou. 2004. Voice morphology in the causative-inchoative alternation: Evidence for a non-unified structural analysis of unaccusatives. In The Unaccusativity Puzzle: Explorations of the Syntax-Lexicon Interface, ed. by Artemis Alexiadou, Elena Anagnostopoulou, and Martin Everaert, 114-36. Oxford: Oxford University Press. - Arad, Maya. 2002. Universal features and language-particular morphemes. In Theoretical Approaches to Universals, ed. by Artemis Alexiadou, 15-39. Amsterdam: John Benjamins. - Baker, Mark. 1988. Incorporation: A Theory of Grammatical Function Changing. Chicago and London: The University of Chicago Press. - Blust, Robert. 1999. Subgrouping, circularity and extinction: Some issues in Austronesian comparative linguistics. In Selected Papers from the Eighth International Conference on Austronesian Linguistics, ed. by Zeitoun Elizabeth and Paul Jen-kuei Li, 31-94. Taipei: Academia Sinica. The cart has had several articles, so do you want to clear it, or add together to the cart?
s3://commoncrawl/crawl-data/CC-MAIN-2019-39/segments/1568514573121.4/warc/CC-MAIN-20190917203354-20190917225354-00324.warc.gz
CC-MAIN-2019-39
2,296
16
http://www.infoworld.com/article/2652160/networking/product-review--critical-links-edgebox-business.html
code
Critical Links' EdgeBox line includes three Asterisk-based appliances: Office (40 users), Business (100 users), and Enterprise (300 users). The 2U rack-mount servers vary in disk space (80GB to 250GB), connectivity (such as integrated Wi-Fi), and redundancy options. Because of all these variables, EdgeBox makes the selection process easier by configuring the appropriate hardware and third-party software (called EdgePacks) for six vertical markets. For example, the Education configuration includes EdgeLMS (Learning Management System), which gives schools and corporate training departments a turnkey phone system and course management solution. Conceptually, EdgeBox replaces a typical Microsoft Small Business Server setup. The server contains a router, network access, security, and collaboration along with storage and print services. Critical Links then layers on VoIP PBX functions, QoS utilities, and optional Wi-Fi. EdgeBox can be used in many network configurations, but it's typically deployed as a gateway between your LAN and the Internet. A second Ethernet interface connects EdgeBox to an enterprise-wide private network. [ Asterisk is also at the heart of Fonality's Trixbox and PBXtra. See Mike Heck's review of PBXtra 4.0. See Paul Venezia's review of Trixbox 2.0, and his exploration of open source VoIP. Return to "VoIP phone systems walk the talk." ] Configuration is done the old fashioned way; you won't find any wizards or shortcuts. I used the Java Control Center to configure my local area network settings, firewall, and other basic settings. For more experienced enterprise users, EdgeBox has various authentication methods, such as using remote Active Directory, LDAP, or Radius servers. The same type of detailed settings are available for networking (for instance, changing host name and routes), though the default settings should be adequate for typical small offices. As with other aspects of the system, configuring the Web server, Web mail, and file shares is a manual operation. However, someone with basic server administration skills should be able to figure out how to create virtual hosts and complete other required tasks. Configuring VoIP and PBX settings in EdgeBox is generally intuitive. The same is true for adding phones, which can be VoIP, analog, or softphones. The final aspects of setup involve the IVR (interactive voice response) system; administrators may create response menus – actions callers can take after listening to voice prompts – for most any type of organization. Each of these "contexts" has several actions that are defined using a tabbed interface. For example, you could have the system perform a certain action on an incoming call if the caller doesn't respond within a preset time. EdgeBox software also let me apply a time frame to these rules – such as forwarding to a certain extension only during off-business hours. In my experience, you'll need to devote the better part of a day to get everything in EdgeBox running as you'd like. In daily use, EdgeBox's PBX features worked just as I'd defined with the IVR editor. For instance, if someone didn't answer their phone, messages were correctly routed to voice mail. These were later easily retrieved by dialing the voice mail extension. Besides an indicator on the phone, users can also be notified of new messages by e-mail, along with the message in audio format. Many of EdgeBox's 50-odd software packages are part of the open source Asterisk distribution, and they make up a rich and robust collection. For example, advanced PBX features include queues and agents (valuable for call centers) as well as conferences. There's also call park, call transfer, and hunt groups, where all phones ring, which is a useful feature in a support setting. Open standards can be a good thing because of the many optional packages available. On the flip side, the many different interfaces and procedures in EdgeBox add complexity to configuring and using the system. Nevertheless, I have no concerns that EdgeBox will do a very good job. It's one of the more expandable systems. Plus, Critical Links gave EdgeBox features, such as call queues, that are sometimes optional or not available with other systems. Ease of use (15.0%) Overall Score (100%) |Critical Links EdgeBox Office v.4.5.2||7.0||8.0||8.0||8.0||8.0||8.0| Having trouble installing and setting up Win10? You aren’t alone. Here are many of the most common... Hot or not? From the web to the motherboard to the training ground, get the scoop on what's in and... Confidence in our power over machines also makes us guilty of hoping to bend reality to our code Performance monitoring, open source SDKs also highlighted for the tooling Landing your dream web or software development job doesn't have to be a daunting task. If you want to... You’ll be dependent on TensorFlow to get the full advantage, but you’ll gain a true end-to-end engine...
s3://commoncrawl/crawl-data/CC-MAIN-2017-22/segments/1495463607242.32/warc/CC-MAIN-20170522230356-20170523010356-00319.warc.gz
CC-MAIN-2017-22
4,936
21
http://eturnti.com/techgig-talk-why-should-you-care-to-create-a-reference-architecture-in-your-organization/
code
Key Take Aways from the Presentation How to relate to Enterprise Architecture Frameworks such as Togaf and Zachmann and make it work for your in your Organization ? - Why do need an architecture in place in a product or solution ? - Why are different views to architecture important and why is important to create the one that you are interested in ? - How do you apply framework level separation of views to create a reference architecture ? - What is the role of architecture vis-a-vis agility? How much architecture is needed for the hour ? - How will people in the organization benefit from having a visual representation of architecture. It is there for all to see.
s3://commoncrawl/crawl-data/CC-MAIN-2018-05/segments/1516084886739.5/warc/CC-MAIN-20180116204303-20180116224303-00483.warc.gz
CC-MAIN-2018-05
670
7
https://www.my.freelancer.com/projects/nosql-couch-mongo/elasticsearch-logstash-elastic/
code
Looking for experts in ElasticSearch configuration, maintenance, and monitoring, for 15+ node installation, with expertise in Logstash for ingesting totally over 4 TB of data, with 1TB changing on a daily basis. - Configure Elastic search nodes, shards, indexes,. and replicas. - Monitor and manage nodes and shards - Configure logstash files for large data ingestions, mostly querying data directly from data sources - Oracle, MySQL, MongoDB, or other Elastic Indexes. - Construct elasticqueries for retrieval of data, including use of aggregations, composites, transformation, and also using aliases, and tune the queries for performance. - Provide management team and the client team clarity on the configuration, issues, solutions and other details. Work as the expert on Elastic and provide support to the data team to use elastic as the layer for data management, and also to the Front end UI/UX development team to consume the data using suitable API or other processes 23 pekerja bebas membida secara purata $22/jam untuk pekerjaan ini
s3://commoncrawl/crawl-data/CC-MAIN-2019-47/segments/1573496667319.87/warc/CC-MAIN-20191113164312-20191113192312-00117.warc.gz
CC-MAIN-2019-47
1,043
8
http://www.codeproject.com/script/Articles/MemberArticles.aspx?amid=2625974
code
AJAX with ASP.NET MVC Posted: 21 Aug 2009 Updated: 25 Aug 2009 Licence: The Code Project Open License (CPOL) ASP.NET AJAX enables a Web application to retrieve data from the server asynchronously and to refresh parts of the existing page. This improves the user experience by making the Web application more responsive and enables you to create amazing Web 2.0 applications to delight your users.
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368701459211/warc/CC-MAIN-20130516105059-00081-ip-10-60-113-184.ec2.internal.warc.gz
CC-MAIN-2013-20
396
5
https://bsi.science.leidenuniv.nl/event/16/
code
From Petrinets to Partial Differential Equations - A Petrinet perspective on systems and synthetic biology Van Leeuwenhoek Lecture on BioScience. Drinks after the lecture Monika Heiner is Professor for Data Structures and Software Dependability, Computer Science Deparment of the Brandenburg University of Technology Cottbus-Senftenberg. She is also visiting professor at Brunel University London, College of Engineering, Design and Physical Sciences, Computer Science and Synthetic Biology Theme. She studied computer sciences at the University of Technology at Dresden and graduated in 1980 at the same University, where she was a scientific staff member from 1980 until 1984. From 1984 - 1991 she was a scientific staff member at the Institute of Informatiques and Computer Technique of GMD at Berlin. (software validation using Petri nets). From 1992-1994 she had the same function at the Institute of Computer Architecture and Software technique of GMD at Berlin. After that she went to Berkeley for a research stage (International Computer Science Institute). In 1994 she accepted a professorship at the Brandenburg University of Technology in Cottbus. She had several sabbatical leaves: - 1999/2000 Boston University, Metropolitan College (course: object-oriented analysis and design, software technology) - 2003, University of Costa Rica/San Jose (course: validation of embedded systems) - 2007, INRIA Rocqencourt (biochemical network analysis) - March 2010: Universidad de Zaragoza (autonomous continuous Petri nets) - 2011: visiting professor at Brunel University, London (Petri nets for multiscale systems) - 2013: visiting professor at Laboratoire Specification et Verification, Cachan/ Paris - 2015: visiting professor at Brunel University, London , Centre Systems and Synthetic Biology Monika Heiner published several books and many articles. She was/is a member of many Programme Committees. She is in the editorial board of Natural Computing, AIMS Bioengineering, Computational Methods in Systems Biology. Petri nets offer a graphical & intuitive notation for biochemical networks. May be even more importantly, they are a convenient choice for an umbrella formalism combining different modelling paradigms, where each perspective contributes toa better understanding of the biochemical system under study. In this spirit of BioModel Engineering, we developed over the last two decades our unifying Petri net framework comprising the traditional time-free Petri nets (PN) as well as quantitative,i.e. time-dependent Petri nets such as stochastic Petri nets (SPN), continuous Petri nets (CPN), and hybrid Petri nets (HPN), as well as their coloured counterparts Coloured Petri nets permit, among others, the convenient and flexible encoding of spatial attributes, and thus the modelling of processes evolving in time and space, which are usually considered as stochastic or deterministic reaction-diffusion systems by help of stochastic or deterministic partial differential equations. In our approach, the discretisation of space already happens on the modelling level, while traditionally the discretisation is left for the PDE integration methods. Our framework is supported by a related Petri net toolkit comprising Snoopy, Charlie and Marcie. It has been applied to a couple of case studies. Those involving spatial aspects include the Brusselator model to explore Turing patterns, C. elegans vulval development, stochastic membrane systems composed of active compartments, Ca2+ channels arranged in two-dimensional space, phase variation in bacterial colony growth, and Planar Cell Polarity (PCP) signaling in Drosophila wing. Some of them will be sketched in this talk.
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506669.30/warc/CC-MAIN-20230924191454-20230924221454-00823.warc.gz
CC-MAIN-2023-40
3,691
22
https://www.thelinuxfaq.com/720-bootstrap-check-failure-1-max-virtual-memory-areas-vm-max-map-count-in-docker
code
When start the Elasticsearch in a Docker container in Linux instance generated an error below, ERROR: bootstrap checks failed. You must address the points described in the following lines before starting Elasticsearch. bootstrap check failure of : max virtual memory areas vm.max_map_count is too low, increase to at least ERROR: Elasticsearch did not exit normally - check the logs at /opt/sonarqube/logs/sonarqube.log Let us see why the above error is generated in a Docker container which contains Elasticsearch, The Elasticsearch use a mmapfs directory to store its indices. By default in a Linux operating system limits on mmap counts to be very low, which may result in out of memory. That's the reason we have received the output on the docker container logs. Lets increase the limits max_map_count count in your Linux machine by running the following command as root user: # sysctl -w vm.max_map_count=262144 Also, can set the above value permanently, add the same value in /et/sysctl.conf file. Open a file and use any editor, likely vim/vi/nano, # vim /et/sysctl.conf update the value, The RPM and Debian packages will configure this setting automatically. No further configuration is required. then, start the Elasticsearch docker container, $ docker container start elasticsearch
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474482.98/warc/CC-MAIN-20240224012912-20240224042912-00815.warc.gz
CC-MAIN-2024-10
1,296
14
https://www.dalhssa.com/society-representative-positions
code
DALHSSA PROGRAM SOCIETY REPRESENTATIVE Time Commitment: Approx. 1 Hour Meeting, Once a Month & Potential for Committee Involvement Speak with the president of your program's student society about applying for this position or e-mail us at [email protected] for more information about the position itself. The DalHSSA Society Representative is a student nominated by their students’ society or association to serve as a liaison between their program and DalHSSA. Primary Duties and Responsibilities: Represent their program at DalHSSA meetings Communicate information about DalHSSA back to their students’ society or association and to the students in their program Communicate information to DalHSSA about the events and initiatives taking place in their program that are open to students outside of the program or are related to interprofessional education Work with the DalHSSA Executive and other Society Representatives to plan interprofessional events, activities, and initiatives Attend all DalHSSA Society Representative Meetings
s3://commoncrawl/crawl-data/CC-MAIN-2021-49/segments/1637964359082.76/warc/CC-MAIN-20211130232232-20211201022232-00602.warc.gz
CC-MAIN-2021-49
1,053
10
https://affiliate-geo-target.com/amazon.html
code
Link Globalizer for Amazon Affiliates And Authors Increase your sales on Amazon by going global with a single link that works for every visitor. - No Registration required - No Installation required - No Plugin or Script required - Make 30-40% more money - Get click and redirect statistics International Link Builder for Amazon Books and Products Use this generator to create a special The link contains information like the ASIN you want to link to and your affiliate tracking IDs for the different countries you have IDs for. Some hints and information: - The link will use IP-based Geolocation to geographically target your visitor to the Amazon store of his/her country (according to their current location). - We are trying to be clever, so a visitor in Austria will be directed to the German Amazon, a visitor in Portugal will be directed to the Spanish Amazon and so on. - You can use a Affiliate ID or Tracking ID. - You don't have to specify all affiliate IDs if you are not registered to all programs - The ASIN is unfortunately not always globally unique. That's why you sometimes need to specify several ASINs for different shops. - In case you don't have a global ASIN and no ASIN for all countries, you can put fallback search terms. Otherwise the product title of the Amazon.com ASIN will be used (we will do this automatically for you). - You can cloak or shorten your worldwide link with any URL shortening service or software. - Can't find the ASIN? For books, the ISBN-10 is the ASIN. - You can use the generated URL wherever you want, but please respect the rules of Amazon and the websites you use those hyperlinks on. Also, don't spam! - If you have an English website, it makes most sense to sign up for the US, UK and Canadian affiliate programs. If you are not in US, you can get payments via cheque or by using a virtual US bank account number from Payoneer - We parse the X-Forwarded-For header that some proxies set, so if you are behind a proxy we will still use your "real" IP for country determination. - Note: You can't use Amazon's link checker directly on an a-fwd link. But you can click the link and check the redirect result URL. - New! Added support for ascsubtag= parameter (optional sub-tag) (April 2014) - New! Added support for India and Brazil (May 2014) - New! Added support for fb=com URL parameter that forwards to the dot com if there is no affiliate ID for the resolved country (fb stands for fallback. You can also use other country codes for example fb=uk) (October 2014) - New! Added support for Australia and Mexico (February 2015) - New! Country specific ASIN redirects: fb=com URL parameter forwards visitor to to Amazon.com in case you did not specify a more specific ASIN in the link (e.g. if you specified only asin-fr AND asin-com and your visitor is NOT in France, he will end up on Amazon.com) (You can also use other values instead of com like uk, but make sure you have the corresponding asin-uk) (Fallback search terms have a higher priority and if specified will be used) (February 2016) - New! For eBooks, also consider the Dutch Amazon.nl for Dutch IPs (July 2016) - New! Add an URL parameter from=UK to find out where the link would go to as if clicked from UK, DE, FR, IT etc (August 2016) - New! Convert any Amazon product page URL into a global A-FWD link by pasting it (August 2016) - New! Add our a-fwd.to URL shortener (November 2016) - New! We are working on having a statistics login. You can enter your e-mail when creating a link and we will attach a special token to the link. You will be able to login later with an e-mail we send to you. For links created previously without the token, you can mail us for the login (November 2016) - New! The analytics login is now available (Feburary 2017) The Problem with Amazon Product Links Amazon has establishments in multiple countries, however each site offers different products to different regions of the world. So if you create a link to an Amazon product, chances are that people visiting from the web are not getting directed to "their" Amazon. Complicating matters further, its affiliate program is not international, so you need to be subscribed for each store program separately. If you have an international website, you'd want to get sales comission worldwide. This means you need to create separate links for every Amazon in your target country (US, Canada, Germany, France This is troublesome and possibly ugly in your website layout. Wouldn't it be nicer to to create one link for all Amazon stores?. You can have one special global link for all stores. This site provides a way to create such a special link that automatically detects the users country (doing geo-targeting) from their IP and forwards them to the correct Amazon store for their country. This service is free and easy to use. It does not require a plugin and works with every website or CMS. You can use our Link Builder to link to specific products or to a search results page. Some Link Examples Link to "your" front page: Get redirected to the "Harry Potter" results of "your" Amazon: Link to a specific product with a certain global ASIN: Send American visitors to the US The Office and British visitors to the UK original and the rest of the world to the search results of the keywords The Office: The Complete Series (which is the US edition): You should use the builder to create your own links! Why should you use it? On a typical website, visitors will come from all over the world. But the classic affiliate links only work with visitors from a single country. You can multiply your earnings by having international Amazon links which work for all visitors, directing them to the right one of Amazon's different country sites. P.S.: Did you know that 370 million people have English as a second language and around 750 million people speak it as a foreign language? Who is this for? There is two kind of people that should use A-FWD. - One group is the people with websites or newsletters that have links to Amazon products on them. They usually review or recommend products and want to earn a provision/comission on the sale. - The other group are the content creators like book authors, private label owners (FBA), singers or music groups/bands. They might have an international audience and they want to make it easier for their audience to buy their products by giving them a single A-FWD link. Note that you might be in both groups :-) With A-FWD both kinds of traffic will be able to create better Amazon affiliate links. How does this work? We're using Geo-IP technology to locate the user clicking on a link and then forward them correctly. The locating happens automatically, there is no popup or question asked to the user. So it works with every browser (both mobile and desktop). Where does this work? If you create an A-FWD link you don't need to install any software or plugin for it, making your life easier. You can also use the link on other media like e-mail, twitter or (As usual, you need to respect Amazon's rules about this kind of usage!) This also works for websites like Tumblr or Wordpress.com hosted blogs. Self-hosted Wordpress blog? Our module for Drupal rewrites your Amazon.com links automatically without changing your existing articles/postings. We also have a Joomla extension. These extension enables you to enable universal affiliate links without changing your existing articles/postings. You have to adhere to adhere to Amazon's own terms for links. Don't do anything spammy or fishy. Usage is free and will stay like that! Woboq is sponsoring the server and bandwidth for the A-FWD GeoIP technology. If you are an Amazon affiliate: We generate a random number and will (on average) take every 100th request from all .com and .ca users and replace your Affiliate ID it with our ID. For users with statistics enabled we might go up to 5% of all .com and .ca users. We're not replacing the product ID (ASIN) you're linking to! Don't miss out on international revenue and create your link now. You can contact us if you need special arrangements without this feature. Thank you for supporting us! Subscribe to updates about A-FWD You can subscribe to our mailing list. We only send a mail every few months about new features. Help And Discussion DISCLAIMER: This site and the products and services offered on this site are not associated, affiliated, endorsed, sponsored, reviewed, tested or certified by Amazon.
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947476409.38/warc/CC-MAIN-20240304002142-20240304032142-00674.warc.gz
CC-MAIN-2024-10
8,462
81
https://research.ntu.edu.sg/expertise/academicprofile/Pages/StaffProfile.aspx?ST_EMAILID=arvinde&CategoryDescription=ComputerScienceandEngineering
code
|Academic Profile | | || | Assoc Prof Arvind Easwaran Associate Professor, School of Computer Science and Engineering |Arvind Easwaran is an Associate Professor in the School of Computer Science and Engineering at Nanyang Technological University (NTU), Singapore. He received a PhD degree in Computer and Information Science from the University of Pennsylvania, USA, in 2008. Prior to joining NTU in 2013, he has been an Invited Research Scientist at the Polytechnic Institute of Porto, Portugal, between 2009 and 2010, and a Research & Development Scientist at Honeywell Aerospace, USA, between 2010 and 2012. In NTU, he has led or is leading several research projects including real-time scheduling theory for mixed-criticality systems, resilient cyber-infrastructure and model-in-the-loop intelligent framework for smart manufacturing, design optimisation for district cooling systems, and distributed and IoT-based electricity metering and load management. He is a ACM Distinguished Speaker since 2018 and a Cluster Director in the Future Mobility Solutions research programme at the Energy Research Institute @ NTU.| |Cyber-Physical Systems (CPS) encompass systems in which the cyber world of computation and communication closely interacts with the physical world of sensors and actuators. These are highly networked and deeply embedded systems such as those found in modern day aircrafts, automotives, factories, medical devices, smart phones, electric grids, etc. From driver-less cars and air traffic management using sense and avoid, to plug-and-play operating rooms and smart electric grids that integrate traditional and renewable energy sources, intelligent automation of an enormous scale is finding its way into many of these systems.| Current interests of the CPS Research Group @SCSE,NTU are in the design of cyber-infrastructures for CPS, especially for systems with time-critical functionalities (i.e., real-time systems). The research themes can be broadly classified as follows: Model-based Design Methodologies - Affordable U-healthcare Platform for Diabetes Management - Assured-Safety Architecture for Machine Learning based CPS - Continuous Automated Assessment for Project-Centric Learning - Development Of A Decision Support Tool Using Modeling For Defining The Optimal Production And Distribution Solutions For Cold System In Urban Area - Development of a decision support tool using modeling for defining the optimal production and distribution solutions for cold system in urban area - Embedded Systems Online - Mixed-Criticality Scheduling for Cyber-Physical Systems - Predictable Parallelization of Cyber-Physical Systems - Worst-Case Predictable Multi-core Processing - Joohyung Sun, Hyeonjoong Cho, Arvind Easwaran, Ju-Derk Park and Byeong-Cheol Choi. (2019). Flow Network-based Real-Time Scheduling for Reducing Static Energy Consumption on Multiprocessors. IEEE Access, 7(1), 1330-1344. - Vijayakumar Sundar and Arvind Easwaran. (2019). International Symposium on Real-Time Computing (ISORC): A Practical Degradation Model for Mixed-Criticality Systems. International Symposium on Real-Time Computing (ISORC)Valencia, Spain: IEEE. - Ankita Samaddar, Zahra Rahiminasab, Arvind Easwaran, Ansuman Banerjee and Xue Bai. (2019). International Symposium on Real-Time Computing (ISORC): Linearization based Safety Verification of a Glucose Control Protocol. International Symposium on Real-Time Computing (ISORC)Valencia, Spain: IEEE. - Zhonglin Chiam, Arvind Easwaran, David Mouquet, Samira Fazlollahi and Jaume V. Millás. (2019). A Hierarchical Framework for Holistic Optimization of the Operations of District Cooling Systems. Applied Energy, 239, 23-40. - Daniel Jun Xian Ng, Arvind Easwaran and Sidharta Andalam. (2019). International Conference on Cyber-Physical Systems (ICCPS): Demo Abstract: Contract-based Hierarchical Resilience Framework for Cyber-Physical Systems. International Conference on Cyber-Physical Systems (ICCPS)Montreal, Canada: IEEE.
s3://commoncrawl/crawl-data/CC-MAIN-2021-04/segments/1610703505861.1/warc/CC-MAIN-20210116074510-20210116104510-00606.warc.gz
CC-MAIN-2021-04
3,990
22
https://community.playstarbound.com/threads/player-space-stations-good-and-bad.135446/
code
So I'm sure I'm not alone here when I say I think the idea of making a space station is pretty cool. I don't even mind that it takes a boat load of resources to create a great big space station. So the good is that it is a great idea and has so much potential. I just started working on my first space station today. When I'm building houses or farms or whatever I always go through a bit of trial and error finding the aesthetic that pleases me. So imagine my dismay when I naturally design myself into a corner and desperately need an undo. So I go open the storage folder and delete my space station, luckily this only reset my layout back to default. The bad news, all my resources are gone. On goes the admin mode. Now, 15 deletes later I still haven't settled on a design I like. It may take some time. One of the problems I'm having deciding on a layout is I want to create certain sections but I can't because of the existing layout. Say I have a corridor and it is above where I want to place a core. I don't want to use these /settileprotection commands to scrap a section that is compatible and make what I really wanted. What should happen is I create what I want and expansion slots that aren't allowed get removed or turn red to signify they're disabled. OR have an option to renovate the old section to be compatible, because surely this is going to be desired from time to time. This was just released in the last major update, so I'm sure features will be added and improved. I just wanted to start a discussion about it to see people's opinions, and maybe some horror stories, or some pictures. Perhaps a few of you keep up with the dev blog and can share some insights from that.
s3://commoncrawl/crawl-data/CC-MAIN-2017-39/segments/1505818691830.33/warc/CC-MAIN-20170925130433-20170925150433-00615.warc.gz
CC-MAIN-2017-39
1,698
1
https://investmentsanalysis.info/hire-a-game-development-team/
code
Hire a Game Development Team It provides a comprehensive collection of tools for creating interactive experiences, animations, and audio for your mobile game. It is a simple platform to operate for developers, with excellent support. Yes, you can hire game developers for projects of any duration, whether it’s a short-term assignment or a long-term engagement. Harness a talented pool of seasoned game developers who deliver much more as they leverage their passion and knowledge of crypto & NFTs to build experiences that are truly unique. In this stage, the final shortlisted Verse Member will be further evaluated by our hiring experts on a list of tests and interviews before they are finalized for your project. We only commit to hiring the best remote game developers for you. - He is also the founder of LeverPoint Advisory, which consults in the areas of commercialisation management, go-to-market strategy, High-Tech marketing strategy and customer development. - Our data-driven recruitment management will find the game developers for your project, once we have received all the details. - We carefully analyze each candidate’s potential, skills, and other crucial factors before including them on the list of your team members. - If you are satisfied with the developers, you keep working with them and pay their salary including the first two weeks. - Sometimes for a simple mobile game it is enough to hire game developers, and sometimes a large RPG for PC may require you to search for a whole game studio for hire. - Another popular framework used by game developers to create enticing mobile applications is Panda3D. Plamen is a software engineer and developer who specializes in front-end and back-end solutions. He has experience with iOS mobile native applications, C/C++ applications, and 2D/3D graphics and games. He is eager to learn and loves to work on challenging projects. Our Game Development Portfolio When you hire a game development team, there will definitely be programmers for the game engine you need, because it is impossible to make a game without them. TalenVerse has geared startups and enterprises launched enticing game applications with remote-based development teams. Our hiring experts have hired tech talent, including mobile app developers, data scientists, full-stack developers, blockchain developers, unity developers and front-end developers. You can hire the best game developers and artists on a remote basis to launch popular game titles and compete with some of the best games out there. Our team of game developers will provide 24/7 support for your game to update new features, create new characters and develop new gaming environments. Our remote game development ideators can build your game project from the ground up or upgrade and integrate existing solutions to keep up with the hottest gaming industry trends. - He is also an Unreal Engine expert with eight years of experience. - Each new game project requires a unique approach in terms of assembling a capable team. - Testers check the accessibility of all areas in the game if everything displays right or if levels are too hard or too easy. - Cocos Creator is an integrated game development tool positioned for content creation. - Juego Studios is a leading game development company with developers who have created addictive and popular games for Mobile, Web, Windows, and Consoles. - Our quality-centric approach allows us to provide our clients with apps that exhibit a leading form of unhinging experience. Buildbox allows you to easily and quickly construct your 3D and 2D games. You don’t need to know how to code; simply choose images, import them, and assign them a role (player, object, decoration, power-up, etc.) to begin your game. You can also make modifications and see how they affect the system in real-time. We needed some short-term work in Scala, and Toptal found us a great developer within 24 hours. This simply would not have been possible via any other platform. Featured Toptal Game Publications Entrust your hiring ambitions to our company, as we know the industry inside out. Once you have a clear vision of the game project you want to build, the next step is to find a game development team to bring it to life. Finding the best game developers who are passionate about video games and game design can be time-consuming, but we have some tips to make it easier. Let’s start by talking about the skills you need and the technologies you should choose before hiring a game dev team. Unity, the most popular game creation platform these days, is our first port of call for every game app development project. Developers should have an active internet browser that features canvas HTML tag. It is one of the most commonly used game development frameworks. The game design and in-game experience can make or break a game. Stop Vaping Challenge App Swift is a versatile, multi-paradigm, compiled programming language created by Apple and the open-source community. Swift is a substitute to the Objective-C language that employs contemporary programming-language theory concepts and endeavors to present a simpler syntax. Autodesk 3ds Max, previously known as 3D Studio, is a specialized 3D computer graphics program for making 3D animations, models, games, and images. It has modeling capacities and a flexible plugin architecture. Autodesk 3ds Max can only be used on the Microsoft Windows platform. Then there is a production stage, where the idea starts to gain form; this stage is the longest. Last but not least is post-production, where all bugs are polished, and the game is launched. Toptal makes finding a candidate extremely easy and gives you peace-of-mind that they have the skills to deliver. I would definitely recommend their services to anyone looking for highly-skilled developers. Antoon is a top programmer and designer with experience ranging from entrepreneur to freelancer and CTO. Once the Verse Members have passed all the screening phases, they will be taken on board your project. The Hired developer will start working on the project as soon as your company gives the approval. Turing’s automated seniority assessment test, algorithm coding interview, and automated vetting flow help companies hire remote engineers within 4 days. The purpose of the two-week no-risk trial period is to start working with the developers and include them in the team. If you are satisfied with the developers, you keep working with them and pay their salary including the first two weeks. But, if you are not satisfied during the trial period, then you won’t pay anything. - Considering the profound expertise of our team and released projects, why do everything on your own? - Both platforms are perfect for working with single freelancers and not so suitable when you need to hire a game development team. - It can be a console, iOS, Android, PC, or maybe cross-platform. - A well-versed iOS developer will be familiar with all the design software and tools such as Adobe Illustrator. - He holds a bachelor’s degree in computer science from the Illinois Institute of Technology. Firebase is a system created by Google for developing mobile and web applications. It offers strong yet lightweight C++ and Unity SDKs which can be configured to suit the unique requirements of a game. IT outsourcing is a great way to cut costs while minimizing administrative and operational overhead. Although the world’s leading companies benefit from the game development outsourcing, this model is not perfect. Therefore, we prepared the article about the risks of outsourcing so that you can get prepared to mitigate them efficiently.
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510520.98/warc/CC-MAIN-20230929154432-20230929184432-00103.warc.gz
CC-MAIN-2023-40
7,687
31
https://manywaystoseetheworld.org/collections/diversity-digital/products/pitfalls-of-perception-workshop-participant-observation-form-digital-download-free
code
Pitfalls of Perception - Diversity workshop participant observation form * digital download * free Pitfalls of Perception - participant observation form used in conjunction with "The eye of the beholder" film from BNAC - available on YouTube at https://www.youtube.com/watch?v=XYydIDlU2pc The Pitfalls of Person Perception 6-pages, examples and illustrations HERE. Pitfalls of Person Perception PRE-TEST and ANSWERS. the audiotape lecture: Pitfalls of Perception - MP3 audio file * digital download * free diversity seminar Free for personal use only. For reprint rights, copyright permission for classroom, or site licensing use Email: [email protected] for larger numbers of students or longer licensing periods. © 2021 Island Improv.
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446710789.95/warc/CC-MAIN-20221201021257-20221201051257-00341.warc.gz
CC-MAIN-2022-49
737
6
https://mail.python.org/archives/list/[email protected]/2008/3/?page=4
code
Our regular PyGTA meeting will be occurring for those not at the PyCon sprints. We'll meet at the regular time (7pm) at the regular place (Linux Caffe, on the corner of Grace and Harbord). Using Core Image (GL-based Mac Graphics Manipulation API) Seneca will be describing how to use Core Image to process your images in subtle and advanced ways (think sufficiently complex to support an Mike C. Fletcher Designer, VR Plumber, Coder CodeInvestigator version 0.7.5 was released on March 12. A bug was fixed: - Mac OS X line endings are now supported. Thanks Skip! A usability change was made: - Firefox may be running when CodeInvestigator starts. CodeInvestigator opens inside a new tab (Linux, Windows) or a new window (Mac OS X). CodeInvestigator is a tracing tool for Python programs. Running a program through CodeInvestigator creates a recording. Program flow, function calls, variable values and conditions are all stored for every line the program executes. The recording is then viewed with an interface consisting of the code. The code can be clicked: A clicked variable displays its value, a clicked loop displays its iterations. You read code, and have at your disposal all the run time details of that code. A computerized desk check tool and another way to learn about your program. On behalf of the Python development team and the Python community, I'm happy to announce the release of Python 2.4.5 and 2.3.7 (final). Both releases include only security fixes. Python 2.5 is the latest version of Python, we're making this release for people who are still running Python 2.3 or 2.4. See the release notes at the website (also available as Misc/NEWS in the source distribution) for details of bugs fixed; most of them prevent interpreter crashes (and now cause proper Python exceptions in cases where the interpreter may have crashed before). Since the release candidate, we received various reports that the this release may fail to build on current operating systems, in particular on OS X. We have made no attempt to fix these problems, as the release is targeted for systems that were current at the time Python 2.4 was originally released. For more recent systems, you might have to come up with work-arounds. For OS X in particular, try We have made no changes since the release candidate (except for the version numbers). For more information on Python 2.3.7 and 2.4.5, including download links for various platforms, release notes, and known issues, please Highlights of the previous major Python releases are available from the Python 2.4 page, at Enjoy this release, Martin v. Loewis Python Release Manager (on behalf of the entire python-dev team) I'm pleased to announce version 0.10.0, the first stable release of 0.10 branch What is SQLObject SQLObject is an object-relational mapper. Your database tables are described as classes, and rows are instances of those classes. SQLObject is meant to be easy to use and quick to get started with. SQLObject supports a number of backends: MySQL, PostgreSQL, SQLite, and Firebird. It also has newly added support for Sybase, MSSQL and MaxDB (also known as SAPDB). Where is SQLObject News and changes: News since 0.9 Features & Interface * Dropped support for Python 2.2. The minimal version of Python for SQLObject is 2.3 now. * Removed actively deprecated attributes; lowered deprecation level for other attributes to be removed after 0.10. * SQLBuilder Select supports the rest of SelectResults options (reversed, distinct, joins, etc.) * SQLObject.select() (i.e., SelectResults) and DBConnection.queryForSelect() use SQLBuilder Select queries; this make all SELECTs implemented internally via a single mechanism. * SQLBuilder Joins handle SQLExpression tables (not just str/SQLObject/Alias) and properly sqlrepr. * Added SQLBuilder ImportProxy. It allows one to ignore the circular import issues with referring to SQLObject classes in other files - it uses the classregistry as the string class names for FK/Joins do, but specifically intended for SQLBuilder expressions. See * Added SelectResults.throughTo. It allows one to traverse relationships (FK/Join) via SQL, avoiding the intermediate objects. Additionally, it's a simple mechanism for pre-caching/eager-loading of later FK relationships (i.e., going to loop over a select of somePeople and ask for aPerson.group, first call list(somePeople.throughTo.group) to preload those related groups and use 2 db queries instead of N+1). See * Added ViewSQLObject. * Added sqlmeta.getColumns() to get all the columns for a class (including parent classes), excluding the column 'childName' and including the column 'id'. sqlmeta.asDict() now uses getColumns(), so there is no need to override it in the inheritable sqlmeta class; this makes asDict() to work properly on inheritable sqlobjects. * Allow MyTable.select(MyTable.q.foreignKey == object) where object is an instance of SQLObject. * Added rich comparison methods; SQLObjects of the same class are considered equal is they have the same id; other methods return * RowDestroySignal is sent on destroying an SQLObject instance; postfunctions are run after the row has been destroyed. * Changed the implementation type in BoolCol under SQLite from TINYINT to BOOLEAN and made fromDatabase machinery to recognize it. * MySQLConnection (and DB URI) accept a number of SSL-related parameters: ssl_key, ssl_cert, ssl_ca, ssl_capath. * Use sets instead of dicts in tablesUsed. Dropped tablesUsedDict function; instead there is tablesUsedSet that returns a set of strings. * SQLBuilder tablesUsedSet handles sqlrepr'able objects. * Under MySQL, PickleCol no longer uses TEXT column types; the smallest column is now BLOB - it is not possible to create TINYBLOB column. For a more complete list, please see the news: Oleg Broytmann http://phd.pp.ru/ phd(a)phd.pp.ru Programmers don't die, they just GOSUB without RETURN. I've released a brand new version of IMDbPY for Symbian mobile phones: It allows complete access to the IMDb data even to devices with very limited bandwidth and it should also be possible to locally install the whole database, so that no data connection is required. Obviously the code is still in a very early stage, and so I'm here fundamentally searching for someone interested in helping the development, since my skills as Symbian developer are very limited. Any help will be greatly appreciated! I'm pleased to announce the 0.3 release of GrassyKnoll, a search engine written in Python. This is an exploratory release - while fully functional, it is not production ready. Going to Pycon? I'll be giving a presentation on GrassyKnoll at the ChiPy meeting Thursday night: http://us.pycon.org/2008/chicago/chipy/ We'll also be * Multiple storage options * Multiple networked frontends * Multiple wire formats * A clean, powerful data model * Lock-free concurrency * Extensive high-level & source code documentation * A large suite of unittests Grassyknoll can provide network-accessible search platform for applications * Site Search: provide "search this site" functionality on your website * Intranet Search: index all of your enterprise data * Desktop Search: simultaneously index and search your laptop's documents, Peter Fein || 773-575-0694 || pfein(a)pobox.com http://www.pobox.com/~pfein/ || PGP: 0xCCF6AE6B irc: pfein(a)freenode.net || jabber: peter.fein(a)gmail.com Social Network Analysis(SNA) methods are applied in a variety of social science problems to quantify features of relationships between people or organizations. Some example application areas are scientific co-authorship analysis, inter-firm strategic partnership relations, open source collaboration communities, etc. Most SNA methods are based on representing social structures as graphs, but uses its own ways to meausure graph features. pySNA is a library which can be used for manipulation, analysis and visualization of graphs to represent social networks. It has features for dynamic, longitudinal analysis of social networks, which is not common in other SNA software. pySNA uses power of Graphviz, Numpy and RPy for visualization and I am developing pySNA on my own, as a part of my PhD study. If you have questions, bugs to report, or features you'd like to see in pySNA, please contact me directly: mgencer(a)cs.bilgi.edu.tr pySNA is released under the terms of GNU General Public License, v3. <P><A HREF="http://www.menslibera.com.tr/pysna/">pySNA - Python Social Network Analysis Library - v0.3.0</A> Library for manipulation, visualization, static and dynamic analysis of social networks. (10-Mar-2008) TurboGears 184.108.40.206 Released The TurboGears team and release manager Florent Aide are pleased to announce the release of TurboGears 220.127.116.11. This release marks the last active version of the stable 1.0 branch. All new developments will now occur in the 1.1 branch. The 1.0 branch will only receive critical bug-fixes and security updates from now on. The TurboGears 1 Team will concentrate on preparing a beta release of the 1.1 branch. The future version 1.1 will provide different defaults for the template engine (Genshi) and the ORM (SQLAlchemy) and should ease transition to the upcoming TurboGears 2.0 version (which builds on Pylons) for 1.0 users. With the transition to version 1.1. the TurboGears project is now going through a critical phase, and we can use every support by volunteers we can get. Maybe you want to contribute to TurboGears, but you don't know how? Our core developer Chris Zwerschke just posted a call for help on the mailing list, listing more than half a dozen areas where help is needed. A copy of his post can be found on this wiki page: Also, PyCon 2008 in Chicago is coming up this week and there will be a TurboGears Sprint Session after the weekend. If you want to get your hands dirty with code NOW, why don't you sign up for the sprint? What is TurboGears? TurboGears is a popular rapid web development megaframework, built from a number of great Python projects and with a bunch of high-level features built within the TurboGears project. The goal of the project is to ease development of modern web applications and support the full stack from database back-end to the web client front-end. For more information about the project and its goals please visit the homepage at http://www.turbogears.org/. Where to get it? As always, TurboGears can be installed by following the instructions on Release 18.104.22.168 is a bug-fix release which addresse a few problems with the last two releases: * The quickstart templates have been cleaned-up. * The session cookie handling routines have been made more robust and more cross-browser compatible. * It is now possible to have an SSL login page while the rest of the web site uses normal HTTP. * Compatibility with SQLAlchemy 0.4.3 was added. For a full list of changes please see the ChangeLog (see below). Too many to name them all here ;-) Please see our ChangeLog page for a list of contributors for each release: We would like to thank everybody involved for their help in putting this
s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600400222515.48/warc/CC-MAIN-20200925053037-20200925083037-00279.warc.gz
CC-MAIN-2020-40
11,074
194
https://zetalliance.org/category/uncategorized/
code
With this Zimlet installed you can enable automated replies based on a filter from within your Zimbra Web Mail. While you could always configure Zimbra filters to send automated replies over CLI using: /opt/zimbra/bin/zmmailbox -z -m [email protected] afrl "Filter_name" active any address "to,cc" all is "[email protected]" reply "Auto reply message" stop This feature was not available to the end user in the Web Interface. This Zimlet adds a button in Preferences -> Filters -> Create Filter to add this functionality. https://github.com/Zimbra-Community/reply-by-filter
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474843.87/warc/CC-MAIN-20240229134901-20240229164901-00657.warc.gz
CC-MAIN-2024-10
586
5
https://developer.dragondreams.ch/wiki/doku.php/gamedev:deigde:editors:widgetbeziercurve
code
Start Page » Game Development with the Drag[en]gine » Drag[en]gine Integrated Game Development Environment » Bezier Curve Editor The bezier curve widget is used in various editors to edit bezier curves. Bezier curves are 2D curves mapping an input value to an output value. Curves compose of a series of curve points ordered by increasing X coordinate. Each curve point composes of three 2-vector values: point, first handle and second handle. The point defines the location of the curve point (X coordinate, input value) and the output value (Y coordinate). The two handles define the shape of the curve in the neighbourhood of the point. The first point is located to the left side of the point (leading in handle) and the second handle is located on the right side of the point (leading out handle). If the handles and the point are co-linear (all three vectors can be joined with a continuous line) then the curve has first order continuity (smooth corner). If the distance between the two handles and the point is also identical then the curve has second order continuity (smooth corner and smooth curvature change rate). Otherwise the corner is pointy and has zero order continuity. For the entire curve the interpolation mode can be set. There are three possible values: constant interpolation, linear interpolation and bezier interpolation. Constant interpolation forces the output value of each curve segment (the section between two curve points) to the Y-coordinate of the the curve point on the left side of the segment. The value then jumps immediately to the Y-coordinate of the next segment when arriving at the right curve point. In this mode handles are ignored. This mode is best suited for switching type mapping where the output is constant across curve segments. In this mode handles are ignored. Linear interpolation blends linearly between the left and right end of a curve segment. All corners are pointy. In this mode handles are ignored. Bezier interpolation produces smooth curves by interpolation using bezier algorithm between curve points. The bezier curve editor supports these editing interaction using keyboard and mouse: The context menu allows to edit the curve as well as setting some parameters. Reset View resets the X-axis and Y-axis to the range 0 → 1. Fit View to Curve adjusts the X-axis and Y-axis extends to fit the curve into the view. In particular this sets the X-axis range to include the first and last curve point X-coordinate as well as the Y-axis minimum and maximum set to the curve point Y-coordinate minimum respectively maximum value. Handles are not included in the curve fitting only curve points. Clear Curve removes all curve points. Set to Default Linear sets the interpolation mode to linear interpolation, removes all curve points and adds the curve points (0,0) and (1,1). Basically this replaces the curve with a linear mapping from (0,0) to (1,1) which keeps the input value unchanged. Set to Default Bezier sets the interpolation mode to bezier interpolation, removes all curve points and adds two curve points producing an S-shaped curve starting at (0,0) and ending at (1,1). This is similar to a GLSL smooth step curve running from (0,0) to (1,1). Edit Clamp Parameters shows a dialog to edit the clamping parameters. If clamping is enabled curve points (not handles) are clamped to the desired range while dragged using the mouse. Clamping is not applied to existing points if changed nor to manually edited points. Edit Selected Point shows a dialog to edit the point, first handle and second handle of the selected curve point.
s3://commoncrawl/crawl-data/CC-MAIN-2021-17/segments/1618038061562.11/warc/CC-MAIN-20210411055903-20210411085903-00313.warc.gz
CC-MAIN-2021-17
3,605
19
https://scholar.archive.org/work/7fexzz2mpjaovfhvbaqrqvwmc4
code
State-of-the-art stochastic data assimilation methods for high-dimensional non-Gaussian problems Tellus: Series A, Dynamic Meteorology and Oceanography This paper compares several commonly used state-of-the-art ensemble-based data assimilation methods in a coherent mathematical notation. The study encompasses different methods that are applicable to high-dimensional geophysical systems, like ocean and atmosphere and provide an uncertainty estimate. Most variants of Ensemble Kalman Filters, Particle Filters and second-order exact methods are discussed, including Gaussian Mixture Filters, while methods that require an adjoint model or a tangent ... inear formulation of the model are excluded. The detailed description of all the methods in a mathematically coherent way provides both novices and experienced researchers with a unique overview and new insight in the workings and relative advantages of each method, theoretically and algorithmically, even leading to new filters. Furthermore, the practical implementation details of all ensemble and particle filter methods are discussed to show similarities and differences in the filters aiding the users in what to use when. Finally, pseudo-codes are provided for all of the methods presented in this paper. model in time. However, due to technological and scientific advances, three significant developments have occurred in the last decade that force us to look beyond standard Ensemble Kalman Filtering, which is based on linear and/or Gaussian assumptions. Firstly, continuous increase in computational capability has recently allowed to run operational models at high resolutions so that the dynamical models have become increasingly non-linear due to the direct resolution of small-scale non-linear processes in these models, e.g. small-scale turbulence. Secondly, in several geoscientific applications, such as atmosphere, ocean, land surface, hydrology and sea -i.e. it is of interest to estimate variables or parameters that are bounded requiring DA methods that can deal with non-Gaussian distributions. Thirdly, the observational network around the world has increased manyfold for weather, ocean and land surface areas providing more information about the real system with greater accuracy and higher spatial and temporal resolution. Often the so-called observation operators that connect model states to observations of these new observations are non-linear, again asking for non-Gaussian DA methods. Thus, the research in non-linear DA Tellus A: 2018.
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572033.91/warc/CC-MAIN-20220814113403-20220814143403-00414.warc.gz
CC-MAIN-2022-33
2,524
4
https://www.pointview.school.nz/students/english-language-learners/middle/
code
Term 2 2021 So far this term we looked at ANZAC Day. We have considered why this is a public holiday, what a dawn parade is and who we are remembering. We have explored vocabulary such as War Memorial, solemn, carve, bugle, medal, national anthem, dawn and dusk. We are beginning to learn about walls, different types and their purpose. Alongside this we will exploring the characteristics of explanation writing. We will be - sharing the reasons things happen. For example, when ______ then_______ - learning to use conjunctions that show cause and effect. For example: when, if, that, because - learning to use a variety of time connectives. For example: soon after that, eventually, earlier, occasionally. - learning to use technical words with regard to walls. For example: partition, seperate, vertical and enclose. Youtube clips to support online learning: If you have any questions feel free to contact me [email protected] Added for online learning: Unite for literacy – use the ‘narration’ image to choose to listen to stories in your home language
s3://commoncrawl/crawl-data/CC-MAIN-2021-25/segments/1623487607143.30/warc/CC-MAIN-20210613071347-20210613101347-00407.warc.gz
CC-MAIN-2021-25
1,076
12
https://packagist.org/packages/lasallecms/lasallecms
code
LaSalle Content Management System flagship app. My Flagship App is the Laravel app, version/branch 5.3, modified for use with my LaSalle Software packages. The sole reason for modifying the Laravel app is convenience, as there are a few things extra that need to be here, and it would sure help if I could do these mods once. My Flagship App is completely the Laravel app, with some mods. This is the flagship app for my LaSalle Software. LaSalle Software is my Laravel 5.3 based web application software. LaSalle Software is comprised of inter-related packages that work together. This flagship app is the starting point for LaSalle Software based apps. Laravel 5.3 is a superb PHP framework. I am very happy that I chose to specialize in Laravel. Laravel is not in-and-of-itself a ready-made web application that you just unfurl and your basic site is there. For instance, there is no built-in blog. By design. Laravel is a framework with which to build your web app. It is not itself a web app. I set out to create the extra web app "infrastructure" based on Laravel. A ready-made blog. A ready-made administration site. A ready-made user management piece. The type of thing that are common to most web applications. This web app "infrastructure" became LaSalle Software. Central to LaSalle Software is the LaSalle Content Management System. Created as a suite of inter-related packages, LaSalleCMS is "the blog"; and, serves as the foundation for building out web applications. Once I had LaSalleCMS to the point where I could actually build out custom web apps, I started building out my own web apps. In so doing, I discovered that there "had to be a better" way to create administration forms, because hand crafting the forms in general, and hand crafting the forms within LaSalle Software, took a lot of time. So I created LaSalle's Administrative Form Automation that automates much of the "spinning up" of the forms. There is only one area that is unabashedly "Bob-ish": my administrative form automation. This area, properly so, is not addressed in the Framework. There are many ideas out there about streamlined ways to create administration forms. However, I need a version that fits my LaSalle Software. So I came up with my own innovation to address this need. Admin form automation represents an important economic feature. Without having to hand-craft the admin forms, "spinning up" web app packages got a whole lot faster. My admin form automation is deeply inspired by the fabulous Akeeba Framework on Framework, which was the basis for my LaSalleMart ecommerce extension for Joomla 3.x. Admin form automation is the most "bespoke" aspect of LaSalle Software (IMO), as I innovated to satisfy a deep fundamental need. If you discover any security related issues, please email Bob Bloom at "info at southlasalle dot com" instead of using the issue tracker.
s3://commoncrawl/crawl-data/CC-MAIN-2018-22/segments/1526794865691.44/warc/CC-MAIN-20180523161206-20180523181206-00235.warc.gz
CC-MAIN-2018-22
2,873
18
https://getcodesolution.com/android-studio/googleplay-in-app-purchase-server-side-product-purchase-validation-failed-with-400-error-when-using-android-test-purchased/
code
ok after 2 day’s investigation, it has been discovered that: The purchasetoken ( inapp:com.mycompany.myapp:android.test.purchased) generated by inapppurchase item android.test.purchased cannot be used on server side validation as androidpublisher.googleapis.com will return error 400 for such purchasetoken. I hope my 2 day’s work can help others with saving their time. CLICK HERE to find out more related problems solutions.
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296950422.77/warc/CC-MAIN-20230402074255-20230402104255-00737.warc.gz
CC-MAIN-2023-14
430
7
http://blogs.telegraph.co.uk/news/peterfoster/3629491/Humanity_is_an_ocean/
code
Humanity is an ocean Came across this quotation from Mahatma Gandhi this morning: "You must not lose faith in humanity. Humanity is an ocean; if a few drops of the ocean are dirty, the ocean does not become dirty." The cod population has gone down dramatically in recent years I don't know when the "Great Soul" said these wise words, but it was long before the human race had hoovered most of the fish out of the sea, carpeted the oceans with millions upon millions of pieces of plastic and allowed thick, black oil slicks to clog the beaches of Lebanon or Antarctica. Would Gandhi have drawn the same analogy today? And if not, would he have drawn the same optimistic conclusions about "humanity"? Be careful China does not buy up the business of ideas June 17th, 2013 20:20 John Kerry's Monty Python diplomacy June 12th, 2013 23:43 Michelle Obama skips US-China summit. To most Chinese, this will look like a snub June 5th, 2013 18:56 What do the Obama administration's 'secret' email addresses say about transparency? June 4th, 2013 23:00 Guns, glorious guns, nothing quite like them for shooting yourself in the foot May 29th, 2013 20:30
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368708142388/warc/CC-MAIN-20130516124222-00006-ip-10-60-113-184.ec2.internal.warc.gz
CC-MAIN-2013-20
1,146
15
https://wikitravel.org/en/Wikitravel:19_January_2006
code
Wikitravel:19 January 2006 Changes in interwiki presentation I've made a couple of simple changes in the interwiki presentation. First, I've separated the "other sites" interwiki links (like Wikitravel:links to Wikipedia and Wikitravel:links to Open Directory) from interlanguage links. Second, I've changed the formatting of the link so that, instead of just repeating the words "Deutsch" and "English" all over the place, the title of the linked page appears. The language is indicated by the language code ("en:"), with a mouse-over effect to show the full name of the language. I find it more interesting than the language names. Finally, I've added some semantic markup to the links and to the rest of the page. There are now <link> elements in the <head> of each page, showing that the interwiki pages are "alternates" with a different language (See http://www.w3.org/TR/REC-html40/struct/links.html#h-12.3.3 for the explanation for this.) The <a> elements in the interwiki menu also have "hreflang" and "rel" attributes, which is parallel to the <link> elements and should be proper usage. Hopefully this will help bots find the other language versions of Wikitravel and understand the special relationship between, say, en:Australia and fr:Australie. Feedback welcome here. I'm not 100% crazy about the way the separated code+title looks with very long titles, so suggestions there would be helpful. --Evan 23:26, 19 Jan 2006 (EST)
s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376823183.3/warc/CC-MAIN-20181209210843-20181209232843-00535.warc.gz
CC-MAIN-2018-51
1,439
6
http://namhb.nightst0rm.net/2010/03/show-cover-porange0909punkie-entry-non.html
code
Today, i am working with python. I need write script to read one file, and get line by line, per line deliver one thread process ( total 10 threads). I want solution, so i chose working with thread and queue. In python, when procsess initializate, this process will be assigned with queue, and working with this queue. We will put data ( in this case is line) to queue. Process will read from queue, so, all processes can read one file, not overlap :D Today i had some work with android. So i need trace application. I found 2 nice tool can help me: Xposed Inspector and Frida. To setup there, i used Genymontion with x86 Emulator (quick start and light). First create custom phone with Android 6. 1. Install Xposed Inspector Inspeckage Inspector is one module of Xposed, so i need install Xposed before. Your phone need to be rooted (Default genymotion phone is rooted). You need download: - xposed-v80-sdk23-x86.zip (Exactly version with android api) Download at: https://acpm.mobi/genymotion-xposed-inspeckage. Drag and drop Genymotion-ARM-Translation_v1.1.zip and xposed-v80-sdk23-x86.zip to phone, it will be flashed. Reboot. After reboot, drag and drop XposedInstaller_3.0_alpha4 and Inspeckage to install apk. Enable Inspeckage module and reboot (with xposed reboot function). After reboot, start Inspeckage to monitor your app. Port map: adb forward tcp:8008 tcp:… #yum install -y openssl-devel db4 db4-devel mysql-server mysql-devel perl-XML-Parser httpd # rpm -Uvh openca-tools-1.3.0-1.el5.i386.rpm # tar xvf openca-base-1.1.1.tar.gz # cd openca-base-1.1.1 # mysql -u root -p Welcome to the MySQL monitor. Commands end with ; or \g. Your MySQL connection id is 7 Server version: 5.0.77 Source distribution Type 'help;' or '\h' for help. Type '\c' to clear the buffer.
s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600400279782.77/warc/CC-MAIN-20200927121105-20200927151105-00751.warc.gz
CC-MAIN-2020-40
1,779
23
https://rijsat.com/building-scalable-and-secure-cloud-applications-with-microsoft-net-and-azure/
code
Cloud computing has transformed the landscape of software development and deployment. Traditional software development often involved building applications that ran on local servers or personal computers. However, the advent of cloud computing has revolutionized this approach by enabling developers to create, host, and manage applications on remote servers, accessible over the internet. In the early days of computing, organizations had to invest heavily in physical infrastructure, including servers, storage, and networking equipment, to support their applications. This approach was not only capital-intensive but also posed challenges in terms of scalability, maintenance, and disaster recovery. Cloud computing changed the game by providing a flexible and cost-effective alternative. Why Cloud Applications? Before diving into the technical aspects, let’s understand why cloud applications have become the preferred choice for businesses and developers: Scalability and Flexibility: Cloud platforms like Azure offer dynamic scalability, allowing applications to handle fluctuating workloads effortlessly. This elasticity ensures that your application can handle increased traffic during peak periods while minimizing costs during off-peak times. Cloud platforms follow a pay-as-you-go model, eliminating the need for upfront hardware investments. You only pay for the resources you use, which is highly cost-effective for startups and enterprises alike. Cloud applications are accessible from anywhere with an internet connection. This makes them ideal for businesses that require remote access or have a global user base. Security and Compliance: Leading cloud providers, including Azure, invest heavily in security and compliance certifications. They provide tools and services to help developers build secure applications and maintain compliance with industry standards. Microsoft .NET and Azure: A Powerful Combination Microsoft’s .NET framework is a mature, versatile, and developer-friendly platform for building a wide range of applications, from web and mobile to desktop and cloud-based solutions. When combined with Azure, it unlocks a host of features and services tailored for cloud application development. Azure offers a wide range of Platform as a Service (PaaS) offerings that are ideal for building cloud applications. PaaS services abstract away the underlying infrastructure, allowing developers to focus on writing code and delivering value without worrying about server management. Here are some key Azure PaaS services that are commonly used in cloud application development: Some of the Azure PaaS services of Building Cloud Applications with .NET and Azure - Azure App Service: Azure App Service is a fully managed platform for building, deploying, and scaling web apps. It supports various programming languages, including .NET, Node.js, Python, and more. With App Service, you can easily deploy web applications, RESTful APIs, and mobile app backends. It offers features like auto-scaling, continuous integration and delivery (CI/CD), and seamless integration with Azure SQL Database and other data stores. - Azure Logic Apps: Azure Logic Apps enable you to create workflows and automate business processes. You can connect to various Azure services and external services to create custom workflows. Logic Apps are especially useful for integrating cloud applications with external systems and services. - Azure Kubernetes Service (AKS): If you’re containerizing your cloud application, AKS provides a managed Kubernetes container orchestration service. It simplifies the deployment, management, and scaling of containerized applications using Kubernetes. - Azure SQL Database: For relational database needs, Azure SQL Database offers a fully managed, highly available, and scalable database service. It’s compatible with SQL Server and supports features like automated backups, scaling, and geo-replication for disaster recovery. - Azure Cosmos DB: When dealing with NoSQL databases, Azure Cosmos DB is a globally distributed, multi-model database service. It supports document, key-value, graph, and column-family data models. It provides automatic scaling, low-latency access, and comprehensive SLAs. - Azure Cache for Redis: For caching frequently accessed data, Azure Cache for Redis offers a highly available and secure caching service. It can significantly improve the performance of your cloud applications by reducing database load. - Azure Active Directory (Azure AD): Azure AD is Microsoft’s identity and access management service. It provides authentication and authorization services for your applications, ensuring secure user access. Azure AD can be seamlessly integrated with your cloud applications. - Azure Key Vault: Securely manage keys, secrets, and certificates used by your cloud applications with Azure Key Vault. It helps you safeguard sensitive information and comply with security and compliance requirements. - Azure Service Bus: For building reliable and secure messaging solutions, Azure Service Bus offers a messaging service that supports queuing and publish-subscribe patterns. It’s useful for building event-driven architectures and decoupling application components. - Azure DevOps Services: Azure DevOps provides a set of development tools and services for building, testing, and deploying applications. It includes version control, build automation, release management, and project tracking tools. - Azure Functions for Durable Workflows: Extend Azure Functions with Durable Functions, which allows you to build stateful serverless workflows. It’s ideal for orchestrating complex business processes. Best Practices for Building Cloud Applications - Use a Well-Defined Architecture: Start by defining a clear and scalable architecture for your cloud application. Common architectures include microservices, serverless, and monolithic. Choose the one that best fits your application’s needs. - Managed Services: Leverage cloud provider-managed services for databases, caching, and messaging to reduce operational overhead. - Security-First: Implement robust security measures from the outset, including access control and encryption. - Monitoring and Logging: Use monitoring and logging tools to gain visibility, set up alerts, and aid in debugging. - Scalability: Design for horizontal scalability and utilize auto-scaling for high availability during traffic spikes. - Backup and Recovery: Establish a robust backup and disaster recovery plan with geo-replication and regular backups. - Cost Management: Monitor and optimize cloud costs using budgeting and cost tracking tools. - CI/CD Pipeline: Automate your CI/CD pipeline for rapid and reliable application updates. - Documentation: Document your architecture, APIs, and deployment processes for clarity and maintenance. - Compliance and Privacy: Ensure compliance with regulations and data privacy laws while protecting sensitive data. Microsoft .NET and Azure provide a powerful ecosystem for building scalable, secure, and cost-effective cloud applications. With a wide range of services and tools at your disposal, we can develop applications that meet the demands of modern businesses and users. As the cloud computing landscape continues to evolve, staying up-to-date with Azure services and .NET advancements will empower you to build cutting-edge cloud applications that drive innovation and business growth. Embrace the cloud and unlock the full potential of your .NET applications with Azure.
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100164.15/warc/CC-MAIN-20231130000127-20231130030127-00674.warc.gz
CC-MAIN-2023-50
7,542
40
https://docs.kr8s.org/en/stable/client.html
code
To interact with the Kubernetes API kr8s uses an API client. When calling functions that communicate with Kubernetes a client will be created for you, unless you want to handle it explicitly yourself. import kr8s version = kr8s.version() print(version) # Prints out the version information from the Kubernetes cluster To do this explicitly you would construct an API client object first. import kr8s api = kr8s.api() version = api.version() print(version) # Prints out the version information from the Kubernetes cluster kr8s API is inspired by kubectl rather than the Kubernetes API directly as it’s more likely that developers will be familiar with import kr8s pods = kr8s.get("pods", namespace=kr8s.ALL) for pod in pods: print(pod.name) Low-level API calls# For situations where there may not be an appropriate method to call or you want to call the Kubernetes API directly you can use the api.call_api context manager. To make API requests for resources more convenience call_api allows building the url via various kwargs. call_api is only available via the asynchronous API. For example to get all pods you could make the following low-level call. import kr8s.asyncio api = await kr8s.asyncio.api() async with api.call_api("GET", url="pods", namespace="") as r: pods_response = await r.json() for pod in pods_response["items"]: print(pod["metadata"]["name"]) You can also just set the base kwarg with an empty version if you want to build the URL yourself. import kr8s.asyncio api = await kr8s.asyncio.api() async with api.call_api("GET", base="/version", version="") as r: version = await r.json() print(version) It is always recommended to create client objects via the kr8s.api factory function. In most use cases where you are interacting with a single Kubernetes cluster you can think of this as a singleton. However, the factory function does support creating multiple clients and will only cache client objects that are created with the same arguments. import kr8s api = kr8s.api(kubeconfig="/foo/bar") api2 = kr8s.api(kubeconfig="/foo/bar") # api2 is a pointer to api due to caching api3 = kr8s.api(kubeconfig="/fizz/buzz") # api3 is a new kr8s.Api instance as it was created with different arguments kr8s.api with no arguments will also return the first client from the cache if one exists. This is useful as you may want to explicitly create a client with custom auth at the start of your code and treat it like a singleton. The kr8s API makes use of this whenever instantiating objects with import kr8s api = kr8s.api(kubeconfig="/foo/bar") api2 = kr8s.api() # api2 is a pointer to api due to caching from kr8s.objects import Pod pod = Pod.get("some-pod") # pod.api is a pointer to api despite not being passed a reference due to caching If you have a strong requirement to avoid the cache, perhaps the KUBECONFIG env var gets modified between calls to kr8s.api() and you need it to return different clients, then you can bypass the factory and instantiate However, this is not recommend and will likely break caching everywhere so you’ll need to be sure to pass your API client around. import kr8s api = kr8s.Api(bypass_factory=True) api2 = kr8s.Api(bypass_factory=True) # api and api2 are different instances of kr8s.Api from kr8s.objects import Pod pod = Pod.get("some-pod", api=api2) # be sure to pass a reference around as caching will no longer work
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100575.30/warc/CC-MAIN-20231206000253-20231206030253-00696.warc.gz
CC-MAIN-2023-50
3,376
34
https://www.fbm.com/publications/importance-of-monetizing-intellectual-property-assets-of-a-portfolio-company/
code
Importance of Monetizing Intellectual Property Assets of a Portfolio Company In this Upside episode, we explore developing and monetizing intellectual property assets of a portfolio company. How does a new company go about developing a patent portfolio? And why spend the time and effort doing it when your founders are probably hyper focused on just getting a business up and running? What if they do everything right and the business still fails? What good are those patent assets then? Can you still monetize them? If so, how do you do it? DISCLAIMER: This podcast is for general informational purposes only. It is not intended to be, nor should it be interpreted as, legal advice or opinion.
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947473690.28/warc/CC-MAIN-20240222030017-20240222060017-00094.warc.gz
CC-MAIN-2024-10
695
3
https://electronics.stackexchange.com/questions/266450/getting-started-with-verilog
code
The output of Verilog code is a circuit that has inputs and outputs just like any normal program. The difference is that the order of lines of code may matter, or may not matter. Some lines of code run in parallel, some sequentially, some in-between. Learning to read music scores helps. HDL IDEs come from the vendor. EDA Playground comes the closest to the Visual Studio, Eclipse, ipython, ijulia type of IDEs you have experienced. EDA Playground's problem is that vendors have extended standards, and implemented a subset of the standard. Some FPGA vendors don't guarantee backward or forward compatibility. The "test" part of EDA Playground is really a logic test, not a test that guarantees the ability to synthesize (work with a vendor's hardware). FPGA vendors have much better (and free) IDE's that capture a more complicated workflow than what is experienced when writing C, C++, Java, etc. For example, Xilinx Vivado has constraints, clock domains, and exception lists in their workflow. The concept of testing in this world is "test to get it to work", not pass a unit test that can fit into version control, publish system. FPGA vendor IDEs are overwhelming at first. But from a traditional programming point of view, Xilinx Vivado is very good. It underlines syntax errors as you type. Blue and yellow bars indicate code that has problems. Mouse over pops up a window with occasional suggestions. File saving is prompted before you accidentally lose edits. The biggest problem is engineers don't think about gates anymore when designing circuits. Engineers work at a Verilog abstraction level called RTL and "behavioral." The IEEE 2017 System Verilog has over 1300 pages documenting this. Most textbooks start at the gate level and document gate-level design strategies of the 1980's. In the FPGA programming world, gates are used by the software to explain what is right or wrong with your code. And most vendors immediately translate everything into a very tiny subset of the 1970's gate design world that includes XOR, MUX, LUT, D flip-flops. You need to start with a course that drives you into a specific vendor's documentation. The FPGA market is changing too fast to expect a harmonized Verilog standard; interpreted and implemented in the same way across all vendors.
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296945368.6/warc/CC-MAIN-20230325161021-20230325191021-00548.warc.gz
CC-MAIN-2023-14
2,288
6
https://docs.aws.amazon.com/powershell/latest/reference/items/Compare-REKFace.html
code
Compares a face in the source input image with each of the 100 largest faces detected in the target input image. If the source image contains multiple faces, the service detects the largest face and compares it with each face detected in the target image. You pass the input and target images either as base64-encoded image bytes or as references to images in an Amazon S3 bucket. If you use the AWS CLI to call Amazon Rekognition operations, passing image bytes isn't supported. The image must be formatted as a PNG or JPEG file. In response, the operation returns an array of face matches ordered by similarity score in descending order. For each face match, the response provides a bounding box of the face, facial landmarks, pose details (pitch, role, and yaw), quality (brightness and sharpness), and confidence value (indicating the level of confidence that the bounding box contains a face). The response also provides a similarity score, which indicates how closely the faces match. By default, only faces with a similarity score of greater than or equal to 80% are returned in the response. You can change this value by specifying the CompareFaces also returns an array of faces that don't match the source image. For each face, it returns a bounding box, confidence value, landmarks, pose details, and quality. The response also returns information about the face in the source image, including the bounding box of the face and confidence value. If the image doesn't contain Exif metadata, CompareFaces returns orientation information for the source and target images. Use these values to display the images with the correct image orientation. If no faces are detected in the source or target images, CompareFaces returns an This is a stateless API operation. That is, data returned by this operation doesn't persist. For an example, see Comparing Faces in Images in the Amazon Rekognition Developer Guide. This operation requires permissions to perform the
s3://commoncrawl/crawl-data/CC-MAIN-2019-30/segments/1563195527196.68/warc/CC-MAIN-20190721185027-20190721211027-00375.warc.gz
CC-MAIN-2019-30
1,967
13
https://esera2020ss.web.ox.ac.uk/workshops
code
When publishing or presenting our research we need to establish a good link between our local project and the bigger picture. The idea of the workshop is to experience how it feels to make sense of data from these two different points of view: one up close and the other as an overview. For the close look participants will be given analysed data from a science museum study and asked to discover if all of the data’s potential has been realised. As students work through strategies for getting the most out of this example, they reflect on applications to their own work. Then the workshop will take a meta-view of this museum study and map it using a theoretical model. With this example in hand, participants will map their own PhD research. This mapping activity should help establish a link in PhD research projects between theoretical backgrounds, literature review, empirical data, research questions and methods of analysis. This overview can then help participants decide on appropriate methods for data analysis, how to use data to underpin assumptions and interpretations, and to decide what results are important to present. Speaker: Dr Bob Evans, University of Copenhagen, Denmark Prof. Alexander Kauertz, University of Koblenz-Landau, Germany First iteration: Tuesday 14:00-16:00 CET Second iteration: Thursday 14:00-16:00 CET Registered VDN students will receive a link to join the workshop directly from the workshop leader prior to the event.
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474784.33/warc/CC-MAIN-20240229035411-20240229065411-00048.warc.gz
CC-MAIN-2024-10
1,461
7
https://www.cjaymead.co.uk/
code
Script to retrieve a list of databases with the associated recovery model. Useful for checking backups. I was having problems with SSMS (SQL Server Management Studio) which I have been running with administrator permissions, whereby I couldn’t open files on my mapped network drives. Doing a bit of Google’ing, I came across this article – https://technet.microsoft.com/en-us/library/ee844140(v=WS.10).aspx I have developed a script that can be used to archive offline databases. This script first brings the databases online, then backs them up, detaches them, and then moves the MDF and LDF files. I have just improved the script in SQL: List of table columns, with data types: It now includes an indicate for nullable fields, primary and foreign keys, unique and check constraints, and identity columns Question asked by Pramod on my old Forum. I have decided to do away with my forum plugin, and instead have added the Ask a question/Contact Me page. All forum posts have been added as regular posts, with “Question:” at the start of the post title. The example query below creates a product category table and populates it with sample data. I then use a CTE query to return the categories, along with the breadcrumb trail (lineage) The script in this post can be used to obtain an example of each of the different styles that can be output using the CONVERT Transact-SQL statement when converting date/time to a string. I have output the styles including the century, but the script can easily be modified to output examples without.
s3://commoncrawl/crawl-data/CC-MAIN-2018-13/segments/1521257651007.67/warc/CC-MAIN-20180324210433-20180324230433-00420.warc.gz
CC-MAIN-2018-13
1,548
10
https://worldsports.foredooming.com/nfl/85952/
code
Bears vs Panthers Week 6 Hype Video | NFL 2020 Thanks for watching the video! Like and subscribe for more. Comment down below what videos you guys want to see in the future. Disclaimer: I do this for entertainment purposes only and no copyright is intended! I don’t own any of the clips in the video and they belong to their rightful owner(s). All rights belong to the NFL and the Chicago Bears. Copyright Disclaimer under Section 107 of the copyright act 1976, allowance is made for fair use for purposes such as criticism, comment, news reporting, scholarship, and research. Fair use is a use permitted by copyright statute that might otherwise be infringing. No copyright is intended* Outro Song: Stressed Out (Tomsize Remix)
s3://commoncrawl/crawl-data/CC-MAIN-2020-45/segments/1603107891203.69/warc/CC-MAIN-20201026090458-20201026120458-00189.warc.gz
CC-MAIN-2020-45
730
4
https://learnings.desipenguin.com/post/oss-contri-flake8-doc-update/
code
Recently I did a couple of open source contributions. I decided to document my learning here. In this pull request I updated the contributor documentation for For anyone who is working in python for a while is already familiar with flake8 It could be described as a “linter” that checks style and quality of Officially it describes itself as : a python tool that glues together pep8, pyflakes, mccabe, and third-party plugins to check the style and quality of some python code. The change was minor documentation change asking contributor to not include .gitignore in their PR. The documentation gives them option to use a global What I learnt I did not know about either of the alternatives. Global I also used reStructuredText ( .rst) after a long time. Had to struggle a little bit with muscle memory of using markdown. I also got to brush up on sphinx. I had used it a while ago to generate my project's documentation. The Pull Request For your reference, you can see the PR itself here
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446711114.3/warc/CC-MAIN-20221206192947-20221206222947-00494.warc.gz
CC-MAIN-2022-49
994
17
https://figure50.com/wordpress-logs-location-bluehost/
code
WordPress Logs Location Bluehost Locating a high-grade low-cost host provider isn’t simple. Every internet site will have various demands from a host. And also, you need to contrast all the functions of a holding firm, all while seeking the very best bargain feasible. This can be a lot to type via, specifically if this is your first time purchasing organizing, or constructing a site. The majority of hosts will supply incredibly cheap introductory pricing, just to raise those prices 2 or 3 times greater once your initial call is up. Some hosts will certainly provide free perks when you register, such as a cost-free domain name, or a free SSL certificate. While some hosts will certainly have the ability to offer far better efficiency and high degrees of safety. WordPress Logs Location Bluehost Listed below we dive deep into the very best economical web hosting plan there. You’ll learn what core holding features are necessary in a host and also how to analyze your own organizing requirements to ensure that you can select from among the most effective affordable holding carriers below. Disclosure: When you acquire a webhosting package through web links on this web page, we gain some payment. This assists us to maintain this site running. There are no added prices to you whatsoever by using our web links. The list below is of the most effective inexpensive host plans that I’ve directly made use of as well as evaluated. What We Think about To Be Cheap Webhosting When we describe a web hosting plan as being “Economical” or “Budget plan” what we mean is hosting that comes under the rate bracket in between $0.80 to $4 each month. Whilst looking into low-cost hosting providers for this overview, we looked at over 100 different hosts that fell under that cost range. We then evaluated the quality of their cheapest hosting bundle, worth for cash as well as customer service. In this article, I’ll be going over this world-class internet site organizing firm and stick in as much appropriate info as feasible. I’ll discuss the functions, the rates choices, and anything else I can consider that I think could be of benefit, if you’re determining to subscribe to Bluhost and also obtain your web sites up and running. So without additional trouble, let’s check it out. Bluehost is among the most significant web hosting business in the world, getting both massive marketing support from the business itself and also associate online marketers that advertise it. It really is a huge firm, that has actually been around for a very long time, has a huge track record, as well as is most definitely among the top selections when it pertains to host (absolutely within the top 3, a minimum of in my publication). But what is it exactly, and also should you get its services? Today, I will certainly answer all there is you need to know, supplied that you are a blog writer or a business owner that is trying to find a webhosting, as well as does not understand where to get started, since it’s a wonderful solution for that audience generally. Allow’s imagine, you wish to hold your websites and make them noticeable. Okay? You currently have your domain (which is your website location or URL) but now you wish to “turn the lights on”. WordPress Logs Location Bluehost You need some organizing… To complete all of this, as well as to make your internet site noticeable, you need what is called a “web server”. A web server is a black box, or gadget, that saves all your site data (files such as images, texts, video clips, links, plugins, and also various other info). Now, this web server, needs to get on regularly and it needs to be linked to the net 100% of the time (I’ll be discussing something called “downtime” later). Furthermore, it also needs (without obtaining also elegant and also into details) a file transfer protocol typically known as FTP, so it can show internet internet browsers your internet site in its intended form. All these things are either costly, or need a high level of technological skill (or both), to develop and preserve. And also you can entirely go out there and find out these things on your own as well as established them up … yet what concerning instead of you purchasing and also maintaining one … why not simply “leasing hosting” rather? This is where Bluehost comes in. You rent their servers (called Shared Hosting) and you release a website using those web servers. Because Bluehost keeps all your files, the business also permits you to establish your material management systems (CMS, for brief) such as WordPress for you. WordPress is an incredibly preferred CMS … so it just makes good sense to have that alternative readily available (virtually every hosting firm now has this choice too). Basically, you no more need to set-up a server and afterwards incorporate a software application where you can build your web content, independently. It is currently rolled right into one bundle. Well … visualize if your server remains in your residence. If anything were to take place to it in any way, all your documents are gone. If something fails with its internal processes, you need a technician to repair it. If something overheats, or breaks down or gets damaged … that’s no good! Bluehost takes all these headaches away, as well as cares for every little thing technical: Pay your web server “rent”, as well as they will certainly look after every little thing. And also once you acquire the service, you can after that start focusing on adding material to your website, or you can place your initiative right into your advertising and marketing projects. What Provider Do You Get From Bluehost? Bluehost supplies a myriad of various services, but the key one is hosting of course. The holding itself, is of different types incidentally. You can lease a common server, have a specialized web server, or also an onlineexclusive web server. For the function of this Bluehost review, we will certainly focus on holding solutions as well as other services, that a blog writer or an on the internet business owner would certainly require, instead of go too deep into the bunny hole and also speak about the other services, that are targeted at more seasoned individuals. - WordPress, WordPress PRO, as well as e-Commerce— these hosting services are the bundles that permit you to organize an internet site utilizing WordPress and WooCommerce (the latter of which enables you to do ecommerce). After buying any one of these plans, you can begin constructing your site with WordPress as your CMS. - Domain Industry— you can additionally get your domain name from Bluehost instead of other domain name registrars. Doing so will certainly make it simpler to point your domain name to your host’s name web servers, given that you’re utilizing the exact same marketplace. - Email— as soon as you have purchased your domain name, it makes sense to also obtain an email address tied to it. As a blogger or on the internet entrepreneur, you need to virtually never utilize a complimentary e-mail solution, like Yahoo! or Gmail. An email similar to this makes you look unprofessional. The good news is, Bluehost provides you one totally free with your domain name. Bluehost additionally provides committed web servers. As well as you may be asking …” What is a committed server anyway?”. Well, the important things is, the standard webhosting plans of Bluehost can just a lot traffic for your website, after which you’ll need to update your hosting. The reason being is that the typical servers, are shared. What this indicates is that server can be servicing two or even more web sites, at the same time, one of which can be your own. What does this mean for you? WordPress Logs Location Bluehost It implies that the single server’s resources are shared, and it is doing multiple tasks at any type of offered time. Once your internet site starts to strike 100,000 website check outs each month, you are mosting likely to need a specialized server which you can likewise receive from Bluehost for a minimum of $79.99 per month. This is not something yous must stress over when you’re beginning yet you must maintain it in mind for sure. Bluehost Prices: Just How Much Does It Price? In this Bluehost testimonial, I’ll be focusing my interest mostly on the Bluehost WordPress Hosting packages, considering that it’s the most prominent one, as well as most likely the one that you’re searching for which will suit you the most effective (unless you’re a substantial brand, business or site). The 3 offered strategies, are as follows: - Fundamental Strategy– $2.95 each month/ $7.99 regular rate - Plus Strategy– $5.45 per month/ $10.99 normal rate - Choice And Also Strategy– $5.45 monthly/ $14.99 regular cost The first cost you see is the cost you pay upon sign up, as well as the 2nd cost is what the expense is, after the very first year of being with the firm. So basically, Bluehost is going to charge you on a yearly basis. And also you can also pick the quantity of years you want to host your website on them with. WordPress Logs Location Bluehost If you pick the Standard strategy, you will pay $2.95 x 12 = $35.40 starting today and also by the time you enter your 13th month, you will now pay $7.99 per month, which is likewise charged each year. If that makes any feeling. If you are serious about your internet site, you need to 100% get the three-year option. This means that for the fundamental plan, you will pay $2.95 x 36 months = $106.2. By the time you strike your fourth year, that is the only time you will certainly pay $7.99 each month. If you consider it, this approach will certainly save you $120 throughout three years. It’s not much, however it’s still something. If you wish to obtain more than one site (which I very recommend, and also if you’re severe, you’ll possibly be getting even more at some point in time) you’ll intend to make use of the selection plus strategy. It’ll enable you to host unlimited web sites. What Does Each Plan Deal? So, in the case of WordPress hosting plans (which resemble the common holding strategies, but are a lot more geared in the direction of WordPress, which is what we’ll be focusing on) the features are as adheres to: For the Fundamental plan, you get: - One website just - Safe web site via SSL certificate - Optimum of 50GB of storage - Free domain name for a year - $ 200 advertising debt Bear in mind that the domains are acquired independently from the holding. You can obtain a totally free domain name with Bluehost here. For both the Bluehost Plus hosting and also Choice Plus, you get the following: - Limitless variety of websites - Free SSL Certification. WordPress Logs Location Bluehost - No storage or data transfer limit - Complimentary domain for one year - $ 200 advertising and marketing credit rating - 1 Office 365 Mail box that is cost-free for thirty day The Choice Plus plan has actually an included advantage of Code Guard Basic Alternative, a back-up system where your data is saved and also duplicated. If any accident occurs and also your site data vanishes, you can restore it to its initial form with this feature. Notification that despite the fact that both strategies set you back the very same, the Selection Plan after that defaults to $14.99 per month, normal rate, after the set amount of years you’ve selected. WordPress Logs Location Bluehost What Are The Perks Of Using Bluehost So, why select Bluehost over various other host solutions? There are thousands of webhosting, many of which are resellers, but Bluehost is one pick few that have stood the test of time, and also it’s possibly one of the most popular around (and for good factors). Right here are the 3 major advantages of picking Bluehost as your webhosting service provider: - Web server uptime— your site will not show up if your host is down; Bluehost has more than 99% uptime. This is exceptionally crucial when it involves Google SEO as well as positions. The higher the much better. - Bluehost speed— how your web server feedback determines how rapid your website reveals on an internet browser; Bluehost is lighting quick, which implies you will lower your bounce rate. Albeit not the best when it comes to packing speed it’s still extremely essential to have a fast rate, to make user experience much better as well as far better your ranking. - Unlimited storage— if you obtain the Plus strategy, you need not bother with the amount of data you save such as videos– your storage space ability is endless. This is actually vital, due to the fact that you’ll most likely face some storage space concerns later on down the tracks, and you don’t want this to be a problem … ever. Last but not least, client support is 24/7, which suggests no matter where you are in the world, you can get in touch with the assistance team to fix your web site problems. Pretty typical nowadays, but we’re taking this for approved … it’s also extremely crucial. WordPress Logs Location Bluehost Additionally, if you have actually gotten a totally free domain name with them, then there will be a $15.99 fee that will certainly be deducted from the quantity you initially acquired (I imagine this is because it kind of takes the “domain out of the marketplace”, not sure regarding this, but there most likely is a hard-cost for registering it). Finally, any kind of demands after thirty days for a reimbursement … are void (although in all sincerity … they must probably be stringent here). So as you see, this isn’t always a “no doubt asked” plan, like with several of the other holding choices out there, so make certain you’re alright with the policies before proceeding with the holding.
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662521152.22/warc/CC-MAIN-20220518052503-20220518082503-00370.warc.gz
CC-MAIN-2022-21
13,854
84
http://logs.nosuchlabs.com/log/asciilifeform/2021-05-23
code
whaack: asciilifeform: Okay, for clarification, you say the non-low-S-enforcing chain, to be concrete, was out POW'd and then in the next line say "after this...at a certain pt (when?) high-S became unmineable" ---- If the NON-low-S-enforcing chain was OUT-pow'd, (by OUT-pow'd I understand defeated, as in out-run) then wouldn't the first snsabot: Logged on 2021-05-22 18:45:28 asciilifeform: whaack: the non-low-S-enforcing chain, to be concrete, was out-POW'd. whaack: block where high-S becomes unmineable be the start of the fork, which by pete's article would be block # 363,731 ? gregorynyssa: http://logs.nosuchlabs.com/log/asciilifeform/2021-05-22#1037407 << this sounds like a very Haskellian sentiment. snsabot: Logged on 2021-05-22 21:29:56 verisimilitude: It could be argued most I/O today is just due to poor abstractions. gregorynyssa: http://logs.nosuchlabs.com/log/asciilifeform/2021-05-22#1037408 << so-called "web" languages have been surprisingly effective with regard to the implementation of command-line utilities, this being no accident. snsabot: Logged on 2021-05-22 21:30:40 trinque: sounds instead like the requirements for webshitlangs, meaning no offense to gregorynyssa gregorynyssa: this is not to say that I am fully or even broadly satisfied with "web" languages or with Tcl, as I have continued to harbor two main objections which happened to be the same two mentioned by asciilifeform in his introduction to FFA: gregorynyssa: (1) the rules of the language are constantly being updated by the vendor; gregorynyssa: (2) programs written in the language contain opaque run-time structures. gregorynyssa: IMO not only is it imperative that the grammar must be formally specified and then frozen as in the case of Ada, but also, gregorynyssa: the run-time structures underlying the language must be treated as part of the grammar. gregorynyssa: over time I have learned the difficult lesson that having an arbitary dividing line between specification and implementation is scarcely better than having no specification. gregorynyssa: http://logs.nosuchlabs.com/log/asciilifeform/2021-05-22#1037410 << the language is homoiconic. it has strong support for DSLs. it unifies function-definition syntax and configuration-file syntax. it unifies call-by-value and call-by-name through "upvar." it has (limited) support for continuations. it was specifically built to solve last-mile problems (functions requiring intensive computation snsabot: Logged on 2021-05-22 21:33:24 trinque: gregorynyssa: what do you find clever in tcl? gregorynyssa: would be written in C and linked to the interpreter). gregorynyssa: http://logs.nosuchlabs.com/log/asciilifeform/2021-05-22#1037415 << granted, just because one can write obfuscated code doesn't mean that he should. snsabot: Logged on 2021-05-22 21:44:56 trinque: watch, I'll do the low-effort thing too. holy shit gregorynyssa, uplevel and upvar mean I can't understand *any* procedure without reading the entire call-stack. gregorynyssa: Tcl has numerous problems, one of which is the lack of a dynamic FFI (allowing the language to swallow DLLs at runtime). gregorynyssa: another is the lack of support for UDP. gregorynyssa: another is the reliance upon opaque optimizations to allow lists to be efficiently operated upon. gregorynyssa: inconsistently named standard-library functions, a problem shared with PHP. gregorynyssa: the built-in "dictionary" type which was later added to the language to supplement "arrays" is ugly and unorthogonal. gregorynyssa: the organization of namespaces and modules was a mess. feedbot: http://fixpoint.welshcomputing.com/2021/of-coffee-and-code/ << Fixpoint -- Of coffee and code Apocalyptic: http://logs.nosuchlabs.com/log/asciilifeform/2021-05-22#1037385 << not convinced we will find out exactly who did it and why, but I'm always up for some mathematical experiments snsabot: Logged on 2021-05-22 20:27:48 gregorynyssa: "we will find out who diddled the keys and why" Apocalyptic: curious to see what asciilifeform has in store for this new version
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510516.56/warc/CC-MAIN-20230929122500-20230929152500-00290.warc.gz
CC-MAIN-2023-40
4,061
28
http://www.dotnetspark.com/kb/1082-using-windows-registry--custom-file-and.aspx
code
Using the Windows Registry You can also use a custom key in the Windows registry to store the connection string, although this is not recommended due to deployment issues. - Security. You can manage access to selected registry keys by using access control lists (ACLs). For even higher levels of security, consider encrypting the data. - Ease of programmatic access. .NET classes are available to support reading strings from the registry. - Deployment. The relevant registry setting must be deployed along with your application, somewhat defeating the advantage of xcopy deployment. Using a Custom File You can use a custom file to store the connection string. However, this technique offers no advantages and is not recommended. - Extra coding. This approach requires extra coding and forces you to deal explicitly with concurrency issues. - Deployment. The file must be copied along with the other ASP.NET application files. Avoid placing the file in the ASP.NET application directory or subdirectory to prevent it from being downloaded over the Web. Using Construction Arguments and the COM+ Catalog You can store the database connection string in the COM+ catalog and have it automatically passed to your object by means of an object construction string. COM+ will call the object's Construct method immediately after instantiating the object, supplying the configured construction string. Note This approach works only for serviced components. Consider it only if your managed components use other services, such as distributed transaction support or object pooling. - Administration. An administrator can easily configure the connection string by using the Component Services MMC snap-in. - Security. The COM+ catalog is considered a non-secure storage area (although you can restrict access with COM+ roles) and therefore must not be used to maintain connection strings in clear text. - Deployment. Entries in the COM+ catalog must be deployed along with your .NET-based application. If you are using other enterprise services, such as distributed transactions or object pooling, storing the database connection string in the catalog presents no additional deployment overhead, because the COM+ catalog must be deployed to support those other services. - Components must be serviced. You can use construction strings only for serviced components. You should not derive your component's class from ServicedComponent (making your component serviced) simply to enable construction strings. Important It is critical to secure connection strings. With SQL authentication, the connection contains a user name and password. If an attacker exploits source code vulnerability on the Web server or gains access to the configuration store, the database will be vulnerable. To prevent this, connection strings should be encrypted.
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501174215.11/warc/CC-MAIN-20170219104614-00633-ip-10-171-10-108.ec2.internal.warc.gz
CC-MAIN-2017-09
2,826
17
https://community.autopi.io/t/advice-which-module-to-purchase/851
code
Hi, I am totally new on programming. Only ever installed gps tracker and directly used the platform provided by the manufacturer. I come to know about autoPi. Can advice what module to purchase as sample/demo so I could promote to my customers? Basically i just need OBD module that connect to 3G and provide tracking, vehicle information like battery voltage, speed, temperature and harsh brake etc to the web and alarm notification. Look forward for advice.
s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590347410352.47/warc/CC-MAIN-20200530200643-20200530230643-00441.warc.gz
CC-MAIN-2020-24
459
6
http://zbmath.org/?q=an:1003.53007
code
Two surfaces in Euclidean 3-space (identified with the imaginary quaternions) are said to form a Bonnet pair if they induce the same metric and have the same mean curvature. The authors construct such Bonnet pairs from isothermic surfaces and their Christoffel transforms by means of spin transforms, . Here the multiplication is quaternionic multiplication, and the special form of the spin transforms ensure that the differentials are integrable. Moreover, it is shown that any Bonnet pair defined on a simply connected domain can be obtained in this way. Note that a relation between isothermic surfaces in space forms and Bonnet pairs was known to M. Servant [Comptes Rendus 134, 1291-1293 (1902; JFM 33.0651.01)] who established a relation on the level of fundamental forms, and that L. Bianchi [Rom. Acc. L. Rend. 12, 511-520 (1903; JFM 34.0654.01)] derived formulas for the differentials of the surfaces of a Bonnet pair from the frame of an isothermic surface in the 3-sphere.
s3://commoncrawl/crawl-data/CC-MAIN-2014-15/segments/1397609537376.43/warc/CC-MAIN-20140416005217-00071-ip-10-147-4-33.ec2.internal.warc.gz
CC-MAIN-2014-15
984
2
http://www.seoleadqualifier.nl/avast-antivirus-update-host-unreachable.html
code
You can also perform the program update via the system tray. Please note that your last week, but it seems that there is still something on there. I am getting popups computer that my virus protection is not detecting. If not please perform the following steps below so we to run. Your confirmation is required to complete the update. If you need to disable Avast Antivirus, right click the Avast icon in the system tray and select Avast shields control. Generally, running a scan does not noticeably affect system performance. Click Update in the Program section to update your program to the most recent version. Here's what I get everytime I try to update the Program: Last encountered error: Host Unreachable Time : 5:27 Download 4:49 Downloaded files 20 15,694. Plus during March 2019 we are offering a special discount — up to 20% off on all Avast premium products. I don't open any ports directly in my router, no necessary. Somebody suggested i use this thread moved, up to you. We strongly recommend you keep automatic updates enabled. When I try to update through the program I get: Downloading file: servers. A feature of most of our programs is their ability to update themselves automatically. Do Not Disturb Mode works to silence unnecessary notifications while you run almost any application in fullscreen. . If I should try this first as well please advise. No one is ignored here. Reducing the sensitivity reduces the chance of false positive detections, but may also reduce the effectiveness of the Core Shields. Sometime around the week of July 20, 2014, Avast stopped updating. It turned out to be the firewall I was using, it deleted, using a variety of anti-virus scanners. Doubts about configuration: I've tried this with UpnP Enabled and Disabled: Same result. By default, all Core Shields are enabled to provide optional protection. Right-click the Avast system tray icon and select Avast shields control, then select an action from the context menu. I have tried to update, but it has to have today's date on them, or if I still have viruses. We have a hardworking team of professionals in different areas that can provide you with guaranteed solutions to a blend of your problems. No actions are required from you. In Avast Internet Security, Avast Pro Antivirus, and Avast Free Antivirus, you can maintain updates manually by clicking the Update button next to each application. Avast isn't my first choice. Here at Bleeping Computer we get overwhelmed at times, topic was not intentionally overlooked. Note: No reinstallation of the program is needed for virus database updates! I'm trying to bring year ago and essentially abandoned at that time when it became unusable. Consumers needs to be aware of these things, and if it weren't Glad that I removed Avast from my 8. If you are connected to the Internet, virus database updates are downloaded and installed automatically without any user action. Free Antivirus so it having this problem? To shut down the system it needs a very long time, about 10 or 15 minutes. That person told me that my registry was corrupted and that I had to hire a computer technician to fix it. The last available version is build 17. If you have Avast 6. I've tried your method but after 10 minutes, the 'Host Online' will change to 'Host Inactive' my synology is synced - yes! Then despite the fail, at the end, I get a box telling me I am up-to-date. Installing Update Rollup for ActiveX Killbits for done! Save it to your desktop. Select avast antivirus and uninstall the program. Restart your computer and boot into Safe Mode by tapping the F8 key key, so try that if F8 doesn't work. After a new installation of Antivirus there were the same error again. Hi and welcome to the MalwareTips. This feature, when activated, blocks harmful websites, tracks your movements online and even offers a price comparison when shopping. However, you can still find older versions on some servers like. I know I can download this manually and uninstall my current version and install the 9. If you face issues activating Avast Antivirus, use the Avast to resend your license to the email address used for your purchase, then try to into the program again. Both always fail as reported in my original message. We strongly recommend to keep automatic updates enabled at all times. Select the File System Shield tab. Also you can use when Sia is running, and ports will be opened, but if you close Sia and test your ports, ports will be closed. The definitions and engine updates just fine. By default, Avast Antivirus is set to update the Virus definitions and application automatically whenever a new version is available. Avast Free Antivirus also includes extra free features such as and. This feature scans for and automatically secures folders which may contain personal data and allows you to specify which other folders you want to protect from untrusted applications.
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446711344.13/warc/CC-MAIN-20221208150643-20221208180643-00292.warc.gz
CC-MAIN-2022-49
4,926
10
https://our-spiritual-world.com/2023/09/08/why-i-do-this-labor
code
He debunked nothing and this things dead soul is already judged. Let the rains come Clinton and the elites eating people in a grotto Rothschild dinner party with other lizards. Kit describes an orgy he took part in. It’s in his grimmoire. This nasty killer prefers black babies. Every blasphemy acted out. When a small child witch is raised, it is raised in blood and death. By the time these things are about 14 – trained and vicious serial killers they are.
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510520.98/warc/CC-MAIN-20230929154432-20230929184432-00418.warc.gz
CC-MAIN-2023-40
463
8
http://writers.stackexchange.com/questions/tagged/metaphor?sort=frequent&pagesize=15
code
to customize your list. more stack exchange communities Start here for a quick overview of the site Detailed answers to any questions you might have Discuss the workings and policies of this site tag has no wiki summary. Creating metaphors in poetry When writing poetry, is there a known method of some kind that exists that makes it easy to turn a concept I'd like to illustrate into a metaphor? If so, please elaborate as much as possible. ... May 3 '12 at 16:11 Nathan C. Tresch recently active metaphor questions feed frequent question tagged Hot Network Questions Is there a word for a comment which makes no sense or adds nothing to the current discussion? What might the editor do if my supervisor contacts a journal to claim authorship of a paper? Is it ethical for a professor to get masters students to work on open source modules related to the professor's profit-making company? Represent a real number without loss of precision What do I get from a skill being Legendary? The FizzBuzz challenge in Java 8 written in a short, readable and interesting way Can Craft handle thousands of entries and high traffic? What do you call someone who was doing bad things, and he doesn't anymore? Alternatives to "Like", "+1", "Bookmark", and "Favorite"? Hogwarts: So why aren't the kids "doing it"? How do I know when I'm singing in key? Programming for future use of interfaces Critique: software logo design FizzBuzz in Ruby How should I handle my manager offering me an unwanted drink? Integers (Abstract Algebra) I want to do research but I'm too old for a PHD Is a special circular saw blade needed to cut plastic? Plural of "that's my boy" How does one justify funding for mathematics research? Ball thrown from a moving train Are +1/+1 counters different from +1/+1 effects? Diagonalizable Matrix real values Can one discern the verb solely from this sentence? more hot questions Life / Arts Culture / Recreation TeX - LaTeX Unix & Linux Ask Different (Apple) Geographic Information Systems Science Fiction & Fantasy Seasoned Advice (cooking) Personal Finance & Money English Language & Usage Mi Yodeya (Judaism) Cross Validated (stats) Theoretical Computer Science Meta Stack Exchange Stack Overflow Careers site design / logo © 2014 stack exchange inc; user contributions licensed under cc by-sa 3.0
s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1404776439950.90/warc/CC-MAIN-20140707234039-00034-ip-10-180-212-248.ec2.internal.warc.gz
CC-MAIN-2014-23
2,311
55
https://alurmedya.com/sheep-shearing-sure-is-satisfying-10-farming-techniques_093203a2d.html
code
Sheep shearing sure is mesmerizing to watch! The sheep are completely unharmed in the process. We've also included some other satisfying farming techniques, hope you guys enjoy today's post. The Top Fives original show brings you informational and entertaining top five videos! Join us and subscribe for more. Several segments are licensed. Follow us on Facebook! - Forestry & Animals
s3://commoncrawl/crawl-data/CC-MAIN-2021-49/segments/1637964362923.11/warc/CC-MAIN-20211204003045-20211204033045-00615.warc.gz
CC-MAIN-2021-49
384
5
https://forums.studentdoctor.net/threads/neuroanat.40684/
code
I read "Clinical Neuroanatomy Made Ridiculously Simple" in place of Kaplan's enormously long neuro section. I also read the neuropathology section of BRS Path. The level of detail required for neuroanatomy isn't too detailed. Most people, including myself, only got MRI images with questions describing a particular disease and then asking you to locate where the lesion was. However, there is always the possibility of getting some pathway questions. Histology is important, but the number of questions asked varies tremendously from individual to individual. I had quite a few histology questions (60/40 split on easy to hard questions). One of my friends didn't get a single histology question. The answer choices are usually A-J or something like that. what book did you refer for histo and one more question where to study for cell biology.how many questions maximum can we get in these subjects.is kaplan cell biology enough. how are the questions in histo, is it histopathoq's. sorry lot of questions. goodluck to you on a great score. I had 3-4 questions on the brachial plexus alone. Feel like I keep giving out the same advice for every subject, but just know what's in First Aid and you should be good. First aid is best bang for your buck in terms of studying time. You might have questions that weren't in first aid, but the amount of time and the number of pages in different books that you'd have to read in order to get those questions makes guessing based on impressions a better idea. When you are studying first aid, keep telling yourself that everything in first aid IS going to be on your test and therefore you should know it, whereas everything in every other book might be on your test and therefore you might want to study it.
s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656103344783.24/warc/CC-MAIN-20220627225823-20220628015823-00100.warc.gz
CC-MAIN-2022-27
1,751
8
https://docs.gcp.databricks.com/en/notebooks/ipython-kernel.html
code
The IPython kernel is a Jupyter kernel for Python code execution. Jupyter, and other compatible notebooks, use the IPython kernel for executing Python notebook code. In Databricks Runtime 11.0 and above, Python notebooks use the IPython kernel to execute Python code. In Databricks Runtime 11.2 and above, you can pass input to ipykernel in Python notebooks. This allows you to use interactive tools such as the Python debugger in the notebook. For an example notebook that illustrates how to use the Python debugger, see Debug in Python notebooks. The IPython kernel allows Databricks to add better support for open source tools built for Jupyter notebooks. Using the IPython kernel on Databricks adds support for IPython’s display and output tooling. See IPython.core.display for more information. Also, the IPython kernel captures the stdout and stderr outputs of child processes created by a notebook, allowing that output to be included in the notebook’s command results.
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817398.21/warc/CC-MAIN-20240419110125-20240419140125-00498.warc.gz
CC-MAIN-2024-18
980
4
https://uhomework.com/%E8%AE%A1%E7%AE%97%E6%A6%82%E8%AE%BA%E4%BB%A3%E5%86%99/
code
CPSC111 – Introduction to Computing 计算概论代写 An algorithm is a set of step-by-step procedure for accomplishing a task.The word “algorithm” is derived from the ninth-century Muslim mathematician, An algorithm is a set of step-by-step procedure for accomplishing a task. The word “algorithm” is derived from the ninth-century Muslim mathematician, Al-Khwarizmi who worked on “written processes to achieve some goal” [Abu Ja’far Muhammad ibn Musa Al-Khwarizmi] The term “algebra” also derives from the term “al-jabr (means “restoring”, referring to the process of moving a subtracted quantity to the other side of an equation),” which he introduced. Computer algorithms are central to computer science. They provide step-by step methods of computations that a machine can carry out. Programmer’s job is to turn the algorithm into a program by adding details, testing procedures, and debugging or correcting errors. We use algorithms every day. Recipes, instructions, and directions are all examples of algorithms that are not programs. When you start your car, you follow a step-by-step procedure. The algorithm might look something like this: An Algorithm is a series of steps required to solve a problem. Example of your everyday life simple task algorithm; an algorithm for baking a cake might be: Step1: Heat oven to 180 degrees Centigrade Step2: Gather the ingredients Step3: Mix the ingredients in a bowl Step4: Pour the ingredients into a cake tin Step5: Bake in the oven 20 minutes Step7: Bake in oven 5 minutes Step8: Until cake cooked Step9: Take cake out of oven and place on cake rack We use algorithms in this way to help design the steps of a computer program. Check your algorithm against the four criteria: a. Un-ambiguous: When you read an algorithm, there should be no question about what should be done. If you understand cooking terms like “Gather the ingredients”, and “Baking a cake”, then you can probably follow most of this recipe. b. Solves a problem: an algorithm should always present a solution to a particular problem. In our case, the problem must have been something like “Using these ingredients, make a cake.” c. Legitimate input: In this example, “legitimate” ingredients include sugar, eggs, flour and butter. d. Finite amount of time: once we start the algorithm, eventually it will finish at step 9 Pseudo-code is an outline of a program written in a way that it can be easily converted into a computer programming language. Examples of Algorithms Adding two numbers algorithm Step 1 Start Step 2 Prompt the user to enter the first integer Step 3 Prompt the user to enter a second integer Step 4 Compute the sum of the two user inputs Step 5 Display the result Step 6 Stop Others examples of Algorithms Finding the largest of two numbers Step 1 Start Step 2 Read A, B Step 3 If A > B, then BIG = A, otherwise BIG = B Step 4 Write BIG Step 5 Stop Finding the square and the cube of a number Step 1 Start Step 2 Read value of N Step 3 S = N * N Step 4 C = S * N Step 5 Write values of S, C Step 6 Stop Finding average of any three numbers Step 1 Start Step 2 Read values of X, Y, Z Step 3 S = X + Y + Z Step 4 A = S / 3 Step 5 Write value of A Step 6 Stop The algorithms below have been written using pseudo-code. Can you say what each does? 1.start 2.set yes_votes to 79 3.set no_votes to to 17 4.total_votes = yes_votes + no_votes 5.display total_votes 6.stop 1.start 2.ask user for juice_cost_price 3.ask user for juice_sale_price 4.ask user for cans_sold 5.unit_profit = juice_sale_price - juice_cost_price 6.total_profit = unit_profit x cans_sold 7.display total_profit 8.stop 1.start 2.ask user for traffic light color 3.if color is red then 4. display "STOP" 5.else if color is yellow then 6. display "WAIT" 7.else 8. display "PASS" 9.stop 1.start 2.repeat 12 times 3.display "Happy Computing!" 4.end repeat 5.stop Variables are reserved memory locations to store values; when you create a variable you reserve some space in memory. Based on the data type of a variable, the interpreter allocates memory and decides what can be stored in the reserved memory. Therefore, by assigning different data types to variables, you can store integers, decimals or characters in these variables Python has some conventions for variable names. You can use any letter (lowercase or uppercase), the special character underscore “_” and every digit (0, 1, 2, 3, 4, 5, 6, 7, 8, 9) provided you do not start with a digit. Python variable names are case-sensitive, so counter and Counter are not the same variable. The following list of words cannot be used as variable names. These are some reserved words (keywords) for Python. These keywords define the language rules and have special meanings in Python. Here is the list of all of them: and, assert, break, class, continue, def, del, elif, else, except, exec, finally, for, from, global, if, import, in, is, lambda, not, or, pass, print, raise, return, try, while, yield Python Function Template 计算概论代写 # Defining Functions # def starts a function definition # names of functions follow variable naming conventions #A docstring is a string literal that occurs as the first statement in a function, module, class, or method definition. def greeting(): """ A function for greeting people""" #docstring print("Hello, World!") print("From CPSC-111 Class") print("At Alexander College in Burnaby, Canada") greeting()
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662647086.91/warc/CC-MAIN-20220527112418-20220527142418-00306.warc.gz
CC-MAIN-2022-21
5,459
49
https://johnnyc.xyz/design/cadre/
code
Easier access to transparent real estate investments. The browse experience for Cadre. Working on a team with just two designers at Cadre allowed me to have an impact on almost all areas of the product. One of the most impactful projects involved leading the design for an updated browsing experience. 📈 Financial products can be difficult to understand. It was clear that users needed additional information to explain what we were offering. 📈 The previous “browse” experience prominently displayed pieces of information that just weren't important for people when making an investment decision. 📈 While plenty of users were completely new to real estate investing, some users knew exactly what they were looking for. There was no functionality to quickly get them to the right content. 📈 Users expressed the desire to compare offerings. We didn’t have that. 📈 The UI needed to be overhauled. It looked outdated, pages used several button styles, and the mobile implementation was lacking polish. 💸 Increase users' understanding of the available investments. 💸 Allow people to compare investment options so they can make informed decisions with confidence. 💸 Prioritize the most critical information. Remove content that isn’t important for making an investment decision. 💸 Implement our new design system. Focus on the quality of the mobile experience. Modernize the look and feel. The previous experience
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100912.91/warc/CC-MAIN-20231209134916-20231209164916-00128.warc.gz
CC-MAIN-2023-50
1,442
13
http://www.shoes.com/womens-walking-cradles-zevon-puma-p2_id398291
code
- DON'T PAY FOR 14 DAYS Product & Brand Information - Leather upper in a dress bootie style with a round toe - Inside zipper ensures an easy slip-on construction - Smooth lining, cushioning insole - Traction outsole, 1 3/4 inch heel Customer Ratings & Reviews 100% would recommend to a friend. - write a review Boots -Walking Cradles These shoes are very comfortable, and stylish.
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560282926.64/warc/CC-MAIN-20170116095122-00250-ip-10-171-10-70.ec2.internal.warc.gz
CC-MAIN-2017-04
380
11
https://awesomedisaster.libsyn.com/episode-223-ted-alexandro
code
Comedian Ted Alexandro is an essential voice in the NYC comedy scene. He talks to Will about revisiting recordings of his material for his newly released album The Lost Album, Topical Jokes, Growing up in Queens, starting in theater as a kid, self releasing comedy specials, performing in NYC and internationally immediately after 9/11, organizing comedians to increase pay in NYC Comedy Clubs, and plans for his next special as a married man with two young children. Listen to Ted's Albums: Ted's Website: https://www.tedalexandro.com/ Ted on Twitter: Ted on Instagram: Will's Website: www.awesomedisaster.com Podcast Merch: https://teespring.com/stores/between-awesome-and-disaster Did an overhaul of the Patreon:
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100081.47/warc/CC-MAIN-20231129105306-20231129135306-00849.warc.gz
CC-MAIN-2023-50
715
9
http://forums.macrumors.com/archive/index.php/t-76715.html
code
Jun 23, 2004, 05:41 PM Category: News and Press Releases Link: XGrid agent for Unix architectures (http://www.macbytes.com/link.php?sid=20040623184158) Posted on MacBytes.com (http://www.macbytes.com) Approved by Mudbug Jun 23, 2004, 06:17 PM this sounds real cool. I have a powerbook 550mhz and an athlon 1.2Ghz. In the article they mentioned pov-ray (opensource 3D-rendering). It would be real nice if i can use my mac to model and use the additional power of my athlon for rendering. I also do some programming, but i am unsure if x-code supports xGrid. But i really see the xGrid concept becoming the way of future computing. Jun 23, 2004, 08:36 PM Oh, without a doubt... For like 10 years now, i've been wondering why my one machine had to work so hard at a rendering, while the machine sitting 2 feet to it's left had nothing to do except display some flying toasters. Why not somehow combine the HD and CPU of all the machines on your LAN. Most tasks, i realize, can't be CPU-shared (burning a DVD) but a lot can! XGrid is a step in the right direction - i'd like to see an OS-level implementation of it's technology, so that every task is CPU-shared. You stick a G5 somewhere on the LAN, and your wife's eMac suddenly computes excel spreadsheets 20% faster with an extra 50 gigs of (slow) drivespace. Stick 1,566 XServes on your LAN and your wife's eMac can compute a trillion digits of PI in 5 seconds. My 54Mbit/sec network, by the way, is also underutilized. Pulling pages of the net at 1.5Mb/sec hardly makes 802.11g sweat, but fill it up with problem/result traffic, and everything comes into balance.
s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1408500811913.46/warc/CC-MAIN-20140820021331-00072-ip-10-180-136-8.ec2.internal.warc.gz
CC-MAIN-2014-35
1,614
14
http://community.lightspeedsystems.com/release-notes/release-notes-relay-october-17-2018/
code
Release Notes: Relay – October 17, 2018 The following features have been added to Relay: - Removed “beta” from the Group Mangement link in the navigation menu. - Added “Users by Time Last Seen” widget to the Relay Dashboard. - Updated and revised the Getting Started with Relay page. After completing all three steps, user’s receive a congratulations message and the Getting Started link disappears from the navigation menu.
s3://commoncrawl/crawl-data/CC-MAIN-2018-47/segments/1542039741219.9/warc/CC-MAIN-20181113041552-20181113063552-00401.warc.gz
CC-MAIN-2018-47
436
5
http://skybute.com/watch/qFsy87rz5qM
code
0 Like 0 Dislike Hey everyone! I'm Hotjukes! A professional Pubg Mobile player and current IGL for Lights out!!! https://arcade.omlet.me/stream/hotjukes https://www.facebook.com/HotJukes Twitch.tv/hotjukes twitter.com/hotjukes Join The Discord!!! https://discord.gg/HMRfgDy Feel like supporting the stream click here! https://streamlabs.com/hotjukes Link do produto: https://bit.ly/2QIregQ www.betalbshop.com Watch the official announcement trailer for The Outer Worlds, a new single-player first-person sci-fi RPG from Obsidian Entertainment and Private Division. In The Outer Worlds, you awake from hibernation on a colonist ship that was lost in transit to Halcyon, the furthest colony from Earth located at the edge of the galaxy, only to find yourself in the midst of a deep conspiracy threatening to destroy it. As you explore the furthest reaches of space and encounter various factions, all vying for power, the character you decide to become will determine how this player-driven story unfolds. In the corporate equation for the colony, you are the unplanned variable. It's Dora AGAIN, everyone! Click to Subscribe ► http://bit.ly/GrumpSubscribe Want updates on what's new and coming soon? Our email list! ► http://eepurl.com/cN7syX Game Grumps are: Egoraptor ► http://www.youtube.com/Egoraptor Danny ► http://www.youtube.com/NinjaSexParty Game Grumps on social: Facebook ► https://www.facebook.com/GameGrumps Twitter ► https://www.twitter.com/gamegrumps Este é novo produto em lançamento na Beta LB Shop. para conferir esta e outras promoção basta clicar no link a baixo: link do produto: https://bit.ly/2yZnjCo
s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376824912.16/warc/CC-MAIN-20181213145807-20181213171307-00103.warc.gz
CC-MAIN-2018-51
1,637
8
https://www.ayazaslam.com/vocabulary/100-high-sounded-vocabulary-words/15-brevity
code
Day 15 - Brevity (Noun) - Concise and exact use of words in writing or speech. - Shortness of duration; briefness of time; as, the brevity of human life. - Its brevity and limited depth really hurts, rather than helps it. - None of this is compromised for the sake of brevity .
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593655896374.33/warc/CC-MAIN-20200708031342-20200708061342-00126.warc.gz
CC-MAIN-2020-29
277
5
https://www.zybooks.com/catalog/programming-in-python-3/
code
The zyBooks Approach Less text doesn’t mean less learning. Provides an introduction to both the principles and the practice of programming, using a subset of Python 3. This zyBook teaches programming in a unique interactive way: Animations make challenging concepts clear, learning questions engage students, tools develop intuition and skill, web-based programming windows allow practice, and web-based challenge activities allow demonstration of skill. This zyBook includes coverage of basic programming constructs (branches, loops, functions) to advanced topics such as inheritance, exceptions, and plotting.
s3://commoncrawl/crawl-data/CC-MAIN-2021-17/segments/1618039508673.81/warc/CC-MAIN-20210421035139-20210421065139-00455.warc.gz
CC-MAIN-2021-17
613
3
http://xahlee.info/w/wikipedia_misinfo.html
code
On Wikipedia's Misinformation, 2005 There is a common conception and worry, especially among academicians, that Wikipedia is filled with misinformation. That, we will often see among online forums, that these people outright disclaim the reliability of wikipedia, in fact will disparage it out of proportions especially when some error got broadcasted in the news media. So here is the question: Can a person read Wikipedia without putting all his brain cells on high alert? If you were to sit thru highschools at this moment, of the thousand, hundreds of thousands, of highschools around the world. It is not a question — assuming you are knowledgeable of certain subjects — that you'll find lots of mistake taught to our young. And, thinking about it, these mistakes are rather unavoidable — you cannot expect all highschool teachers being professors and unerring. Nevertheless, these millions of teachings went on, and on the whole, it benefit the whole world with extreme impact. The gist of this insight, is that information must not solely be judged on correctness, but also availability, in the context of human animals benefaction. Therefore wikipedia, even scholarly speaking are filled with errors, some egregious (because the faaking wikipedian morons with their faaking NPOV and Open Source faaking fanaticism et al), but nevertheless on the whole, it is extremely useful and practically speaking 99% reliable.
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296816893.19/warc/CC-MAIN-20240414161724-20240414191724-00857.warc.gz
CC-MAIN-2024-18
1,428
5
https://issues.apache.org/jira/browse/UIMA-5669
code
Since we upgraded to RUTA 2.6.1 and Eclipse Oxygen we have been struggling with a problem which has taken us a long time to figure out, and we are still not sure if we have identified the root cause or not. We think it is related to projects that have more that 9 ruta script files. We have noticed that if we do a "Project Clean" and then try to build any project with more than 9 ruta script files (even if those files are empty files and don't have any logic), the build process hangs. We didn't have this problem with Eclipse Luna and RUTA 2.2.1. Have you experienced anything like this? I have a sample project that I could send you, but I am not sure how to attach a file to the issue.
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593657131734.89/warc/CC-MAIN-20200712051058-20200712081058-00158.warc.gz
CC-MAIN-2020-29
691
4
https://xforms.org/2016/09/09/perl-has-a-lot-of-bugs/
code
We cannot say that Perl has a lot of bugs. But it’s a program, and every program has at least one bug. Programmers also know that every program has at least one line of unnecessary source code. By using logical induction, it’s a simple matter to prove that any program could be reduced to a single line of code with a bug. Click on the Link given below to More Details:
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296948965.80/warc/CC-MAIN-20230329085436-20230329115436-00345.warc.gz
CC-MAIN-2023-14
373
2
http://phoronix.com/forums/showthread.php?57857-AMD-A8-3850-With-Radeon-HD-6550D&p=220304
code
AMD A8-3850 With Radeon HD 6550D Phoronix: AMD A8-3850 With Radeon HD 6550D Last month AMD officially launched the A-Series "Llano" Fusion APUs to much fan-fare with significantly better computational and graphics performance over the E-Series Fusion APUs and all around the new hardware being a compelling solution. On launch-day we delivered AMD A8-3500M benchmarks as we managed to procure remote access to one of the AMD Llano systems from a third-party, and we also delivered benchmarks of the Radeon HD 6620G that are found on that APU. We have now finally been sent over a Llano APU and motherboard from AMD so we are able to conduct our own set of in-depth Llano Linux tests. In this review we are examining the Radeon HD 6550D graphics capabilities on the AMD A8-3850 APU. Given how memory bound Llano is it would be nice if you'd put the speed of the RAM you used in the test. Also it might be interesting to have a test for memory scaling under Linux with Llano under both drivers once radeon gets operational. Last edited by Luke_Wolf; 07-27-2011 at 01:41 AM. the gpu is very memory bandwidth bounded there are tests with 2500mhz ddr3 memory but on windows. Originally Posted by Luke_Wolf it scale nearby linear to the increase of clock! but yes 2500mhz is the absolute maximum. Echoing this too, please mention what speed the RAM was, and if not 1866, could you test that too? Also, a power consumption comparison to the nearest discrete cards would be interesting (HD4650 and GT240). I think Llano is going to compete versus ATOM not versus desktop CPUs+GPUs. Prices must be in the benchmarks Price/performance is a good benchmark. Llano can be the fast verion of Chrome OS netbooks in a near future, and depending of the price a real pain in the ass to ATOM netbooks, even with MS WOS. Remember that the Asus Eee and similars works fine with Linux and OSX - pirate, but works - and MS WOS 7 has a very limited special OS done specially for avoiding the spread of Linux systems preinstalled on this devices. Now with the preinstalled Chrome OS netbooks with linux will have other oportunity and if Llano arrives on time and in price ATOM would have to improve A LOT its GPU. Do you even know what processors Llano includes? Originally Posted by mitcoes How exactly is a quad core 2.9ghz processor close to atom performance? The fastest atom I see is dual core 1.8ghz. And the graphics (nvidia ion) that comes with them would be garbage compared to the Llano A8-3530MX vid card. Llano is meant for low/mid range computers. It's not AMD top end stuff, that is coming out later. I think you meant that AMD Bobcat competes with Atom (and dual core 1.6ghz e-350 bobcat still better than atom+ion). Did you read this phoronix review linkted to in this article: AMD A8-3500M Llano Linux Benchmarks. It shows amd quad core vs amd dual core vs atom. Atom is slowest and the quad core blows both dual cores away. a6-3400m is the slowest laptop quad core. This article talks about the fastest desktop quad core (a8-3850). Last edited by AnonymousCoward; 07-27-2011 at 08:59 AM. Youre totally confusing Llano (eg. A8-3850, Quadcore, 2.9 GHz, 2x DDR3-1866, GPU: 400 SPs, 100W) with Zacate (eg. E-350, Dualcore, 1.6 GHz, 1x DDR3-1066, GPU: 80 SPs, 18W). Originally Posted by mitcoes Regarding memory scaling, I have tested Llano A8-3850, 8GB: 2x DDR3-1866 G.Skil RipJaws-X, Asus F1A75M-Pro, seeting the memory to 1333 and 1866 speed respectively, Results for Unigine and results for free games. All at 1280x1024 (my 2nd TFT). I also did encoding tests to show thet ram speed doesn't matter there. And compared to my old Phenom 9350e (Phenom 1st generation, 4x 2.0 GHz). Also reduced Llano to 2.0 Hz for comparison. I can barely see visited links in this forum so I set them to bold. I used (K)Ubuntu 11.10 Alpha which runs fine with the catalyst driver, I even got decent screen output with the Radeon driver delivered by Ubuntu, yet had big problems with setting the screen res there. The driver sees a VGA and a DVI screen while only DVI was connected. Power usage for me is idle: 30W idle with Catalyst, 35W with Radeon. Only CPU fan plus Notebook HDD attached, P/S: Enermax Pro82+ 385W. Full load under Unigine Tropics: upto 115W. Prime95: 110W. When I set CPU voltage to 1.25 (prime stable) I get max load closely under 100W. Btw: accordingt to lanet3dnow.de their Llano had CPU Voltage-ID at 1.275V, the board set close to 1.4V though. I think there's somethin wrong with a BIOS lib, MSI told them this would be fixed with the next BIOS. My board sets 1.41V by default ... It depends on the price and time of shipment i asked for price/performance, but i think this kind of CPU+GPU processors are more for portable devices as netbooks - not as cheap as ATOM, but a litle more expensive and far better performance - for a near future - this computer world is fast and ATOM is aged. But i missed the 100W MY MISTAKE. Originally Posted by edgar_wibeau Of course for desktop as ATOMs compact models. But i do not see them at big cases - perhaps it is my mistake - at least not as a best selled. And of course as a nextgen processor is really much faster than an ATOM, but Price / performance versus ATOM and desktop computers - being in the middle of both markets I hope - would be good, in my opinion too. I would like a score as futuremark for phoronix test suite with a 100 or 1000 base on a known model as a mac mini or similar to really compare at one sight performance between computers. Last edited by mitcoes; 07-27-2011 at 09:51 AM. mitcoes: Llano for desktops is a very good OEM product (sources claim they rip it from AMD's hands) as it's cheap to build a box with enough CPU power for almost all users plus a middle class GPU with typical OEM characteristics. You just need a case, psu, board, a/cpu, ram, drive, optical and cooling. No need for a seperate gfx card and comes with 4x USB 3.0, 6x SATA 6G and enough PCIe-lanes for PEG and all peripherals at still-up-to-date 2.0 speeds. Cheap package, less parts needed, easy cooling, full features for mainstream. Simple as that. But to me, it's also a very good DIY part because I have very low idle power (you'll have at least +10W with a discrete card, whichever middle class CPU you choose) and enough horse power for my needs CPU and GPU wise. And all the state of the art peripheral links. Last edited by edgar_wibeau; 07-27-2011 at 10:09 AM.
s3://commoncrawl/crawl-data/CC-MAIN-2015-18/segments/1429246661675.84/warc/CC-MAIN-20150417045741-00173-ip-10-235-10-82.ec2.internal.warc.gz
CC-MAIN-2015-18
6,412
46
https://nmrbox.org/overview
code
Computation is crucial for applications of NMR that provide insights into biomolecular structure, dynamics, interactions, and stability, and have translational applications including diagnostics and drug discovery. The amount of NMR software is exploding, making it more difficult to discover new software, and to support a full complement of software on a diverse set of computer platforms or maintain legacy packages. Communication between software packages also becomes more challenging. The broad aim of this Center is to simplify and integrate dissemination, maintenance, support, and application of NMR data processing and analysis software packages. The Center will advance the application of biomolecular NMR for challenging applications in biomedicine, including structural biology, drug discovery, and metabolomics through the following: The NMRbox virtual machine provides a comprehensive environment for bio-NMR data processing and analysis that is pre-configured with NMR software, cloud-based for easy access, and captured in a version-controlled archived to allow persistence and foster reproducibility. Data translation and workflow tools (CONNJUR) will be developed to facilitate inter-operation and simplify NMR processing workflows. The NMR-STAR data model and file format will be extended to support data exchange between packages in NMRbox, and to capture meta-data essential for reproducibility of bio-NMR studies. The NMR-STAR data model also will be used to build tools for construction of complete BMRB data depositions. Robust and extensible tools for Bayesian inference applied to spectral assignment of proteins, nucleic acids, and small molecule metabolites will be developed. An API will enable Bayesian inference to be easily incorporated into external software packages. All components will use the NMR-STAR/CONNJUR unified data model/interface. Projects with important biomedical implications were chosen that require a broad range of software, extensive interoperation among applications, robust and reproducible analysis, and produce metadata not currently captured. As exemplars of bio-NMR data processing workflows, they will determine the software to be embedded in NMRbox, the metadata to be captured, the analysis tools to be implemented, and will serve as test beds for the technology emanating from the TRDs. The criteria used to select projects will be reviewed annually to determine whether to continue a project and for soliciting new projects. Close interaction with the External Advisory Board and the broader community will establish priorities for future projects. In addition to canonical solution-state protein structure determination workflows, the projects include solid-state NMR, relaxation, studies on RNA, interactions of small molecules with proteins, and metabolomics. An initial complement of collaborative projects involve working directly with developers to increase the utility of their programs, by implementing them in NMRbox (facilitating both broader distribution and higher performance through parallelization), developing completely novel software applications, or providing novel tools for discovering software. A “new lab setup” service will be implemented. As for DBPs, Collaborative projects will be reviewed annually for renewal, and for recruiting new projects. NMRbox staff will run annual workshops and provide on-site training sessions at conferences to instruct users how to process and analyze biomolecular NMR data using NMRbox, and to inform developers how to incorporate their software into NMRbox. Mechanisms for remote consultation and technical support will be developed employing web-based video “office hours”, a robust web site, an email “listserve”, and FAQ and video tutorial archives.
s3://commoncrawl/crawl-data/CC-MAIN-2019-09/segments/1550247511573.67/warc/CC-MAIN-20190221233437-20190222015437-00330.warc.gz
CC-MAIN-2019-09
3,788
9
https://sourceware.org/pipermail/cygwin/1997-October/006063.html
code
egcs update: PE linker problem work-around Wed Oct 29 02:35:00 GMT 1997 After what seems like days of suffering, I've given up on figuring what the problem is with egcs+gas+PE linker. Here's the problem in a nut-shell: egcs back-end generates named sections that are marked ".linkonce discard", and if you have lots of templates, you get the same benefit as on an ELF system. the PE linker gathers up all the named sections and picks one for you. Unfortunately, it looks as if there is a nasty bug where the linker is not doing it's job, and you get multiply-defined symbols. I first thought it was the code generator, then it was gas, and now I believe the problem lies in ld. To avoid this hassle, I've reverted the code generation to the old days; the pro is that it works, and the con is that you can't deal with templates like you can on an ELF system. For all currently working code under gcc, this shouldn't be a problem. Most of my old code that works with gcc-2.7.2 also works, and so does octave-2.0.9 (modified to support new template syntax changes in CD2). Hopefully those more familiar with BFD/gas/ld can shed some light on The new updated binary snapshot should be up shortly (URL after sig). Mumit -- [email protected] For help on using this list (especially unsubscribing), send a message to "[email protected]" with one line of text: "help". More information about the Cygwin
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446710421.14/warc/CC-MAIN-20221210074242-20221210104242-00155.warc.gz
CC-MAIN-2022-49
1,407
23
http://engels.mortega.net/index.php?category=linux
code
Engels started playing with Linux® in 1991 and obtained his Red Hat Certified Engineer (RHCE), Red Hat Certified Instructor (RHCI), and Red Hat Certified Examiner (RHCX) certifications in 2002. He is in charge of Bluepoint's Total Linux®, Linux Kernel Internals®, Perl & Python Programming, and Extreme PHP curriculum and instruction development. /* Conveniently yanked from the Bluepoint Institute profile page */ Elvin Joseph Sanico was one of the best professors I was privileged to have at the UP National Institute of Physics in Diliman. His use of the continuity equation for steady one-dimensional flow to prove the "silent waters run deep" axiom was really cool! In loving memory of CPT Mario B. Mortega Sr., USAFFE, VET (1920-2004) Tuesday, Oct 4, 2011, 5:00 PMI was a reluctant panelist at today's public hearing for HB 1011 aka FOSS Act of 2010. Some folks did not do their homework and there was a lot of classic FUD going around, which I thought went out of fashion ten years ago. Thursday, Aug 11, 2011, 8:11 AMLive migrated 20 virtual machines from US to UK in under 5 minutes. Yeah! Monday, Aug 1, 2011, 1:08 AMLinux® Day is a global celebration of Linux's 20th anniversary. Join the network and start making plans for August 27, 2011. Check out linuxday.org for more information! KGPU - Augmenting Linux With GPUs Wednesday, May 25, 2011, 12:35 AMPsylocke designed a GPU computer with almost 200 effective cores for her ECE 12 (Computer-Aided Design) subject a few days ago. Her teacher thinks it's impossible to build such a machine. For the record, we have an actual unit at home. ASUS, Dell, and Microway (among others) have been offering similar products abroad for a while now. Aside from the usual GPGPU applications (Psylocke used TeraChem), we also explored KGPU: "KGPU is a GPU computing framework for the Linux kernel. It allows Linux kernel to call CUDA programs running on GPUs directly. The motivation is to augment operating systems with GPUs so that not only userspace applications but also the operating system itself can benefit from GPU acceleration. It can also free the CPU from some computation intensive work by enabling the GPU as an extra computing device. Modern GPUs can be used for more than just graphics processing; they can run general-purpose programs as well. While not well-suited to all types of programs, they excel on code that can make use of their high degree of parallelism. Most uses of so-called "General Purpose GPU" computation have been outside the realm of systems software. However, recent work on software routers and encrypted network connections has given examples of how GPGPUs can be applied to tasks more traditionally within the realm of operating systems. These uses are only scratching the surface. Other examples of system-level tasks that can take advantage of GPUs include general cryptography, pattern matching, program analysis, and acceleration of basic commonly-used algorithms." Really cool stuff! Visit github.com/wbsun/kgpu for more information and a white paper on KGPU. And oh yes, impossible is nothing. Recalled to Active Duty Monday, May 23, 2011, 5:23 PMI'll be handling Total Linux 41 this June: http://bluepoint.com.ph/enroll/ Lock and load! Tuesday, May 25, 2010, 11:13 PMFedora 13 has been released: http://fedoraproject.org/wiki/Fedora_13_announcement Congratulations to the Fedora Project! Tuesday, Nov 17, 2009, 11:14 PMFedora 12 has been released: http://fedoraproject.org/wiki/Fedora_12_Announcement Congratulations to the Fedora Project! Monday, Nov 16, 2009, 11:32 PM Magie, Herson, and I met with fellow Fedora Ambassador (and Red Hat Community Architecture team member) Mel Chua tonight at the University of the Philippines Techno Hub in Quezon City. After dinner at Razon's (thanks Mel!), we chanced upon Herson's fraternity brod (and Mozilla Philippines Community organizer) Regnard Raquedan at the Coffee Bean (thanks Maj!). Thanks for coordinating the meet up Herson! It was great to have some face time with comrades in Open Source. Google Chrome OS Thursday, Jul 9, 2009, 10:24 AMI can't wait to see how this pans out: Introducing the Google Chrome OS 7/07/2009 09:37:00 PM It's been an exciting nine months since we launched the Google Chrome browser. Already, over 30 million people use it regularly. We designed Google Chrome for people who live on the web — searching for information, checking email, catching up on the news, shopping or just staying in touch with friends. However, the operating systems that browsers run on were designed in an era where there was no web. So today, we're announcing a new project that's a natural extension of Google Chrome — the Google Chrome Operating System. It's our attempt to re-think what operating systems should be. Google Chrome OS is an open source, lightweight operating system that will initially be targeted at netbooks. Later this year we will open-source its code, and netbooks running Google Chrome OS will be available for consumers in the second half of 2010. Because we're already talking to partners about the project, and we'll soon be working with the open source community, we wanted to share our vision now so everyone understands what we are trying to achieve. Speed, simplicity and security are the key aspects of Google Chrome OS. We're designing the OS to be fast and lightweight, to start up and get you onto the web in a few seconds. The user interface is minimal to stay out of your way, and most of the user experience takes place on the web. And as we did for the Google Chrome browser, we are going back to the basics and completely redesigning the underlying security architecture of the OS so that users don't have to deal with viruses, malware and security updates. It should just work. Google Chrome OS will run on both x86 as well as ARM chips and we are working with multiple OEMs to bring a number of netbooks to market next year. The software architecture is simple — Google Chrome running within a new windowing system on top of a Linux kernel. For application developers, the web is the platform. All web-based applications will automatically work and new applications can be written using your favorite web technologies. And of course, these apps will run not only on Google Chrome OS, but on any standards-based browser on Windows, Mac and Linux thereby giving developers the largest user base of any platform. Google Chrome OS is a new project, separate from Android. Android was designed from the beginning to work across a variety of devices from phones to set-top boxes to netbooks. Google Chrome OS is being created for people who spend most of their time on the web, and is being designed to power computers ranging from small netbooks to full-size desktop systems. While there are areas where Google Chrome OS and Android overlap, we believe choice will drive innovation for the benefit of everyone, including Google. We hear a lot from our users and their message is clear — computers need to get better. People want to get to their email instantly, without wasting time waiting for their computers to boot and browsers to start up. They want their computers to always run as fast as when they first bought them. They want their data to be accessible to them wherever they are and not have to worry about losing their computer or forgetting to back up files. Even more importantly, they don't want to spend hours configuring their computers to work with every new piece of hardware, or have to worry about constant software updates. And any time our users have a better computing experience, Google benefits as well by having happier users who are more likely to spend time on the Internet. We have a lot of work to do, and we're definitely going to need a lot of help from the open source community to accomplish this vision. We're excited for what's to come and we hope you are too. Stay tuned for more updates in the fall and have a great summer. Update on 7/8/2009: We have posted an FAQ on the Google Chrome Blog. Posted by Sundar Pichai, VP Product Management and Linus Upson, Engineering Director Tuesday, Mar 17, 2009, 11:00 AMWhat started out as an initiative to get fedora.ph last January 15 resulted in ph.fedoracommunity.org being assigned to Fedora Philippines today. Fedora Philippines is being hosted by Bluepoint Foundation on a Xen VM using fedora.bluepoint.com.ph as interim domain. My original request was for the delegation of ph.fedoracommunity.org to Bluepoint's DNS servers via a couple of glue and NS records. But hey, I'll take a single A record anytime. Fedora Ambassadors Meeting Sunday, Jun 8, 2008, 8:00 PMIt's a Sunday, but Magie and I went online for a meeting of APAC Fedora Ambassadors at freenode earlier today. The meeting was announced 3 weeks in advance, but there were only 5-6 attendees. I cannot help but echo Susmit Shannigrahi's sentiments: "In APAC there is a lack of people seriously trying to contribute. A lot of people join but a few continues." At the local level, Magie tried to initiate a meeting of the 7 Fedora Ambassadors in the Philippines at least 3 times during the last 6 months. Only one bothered to reply and actually show up everytime. Me. I hope things get better. Friday, Nov 16, 2007, 6:00 PMThis is a very timely reminder! [Devel] [PATCH][DOCUMENTATION] The namespaces compatibility list doc ---------------------------- Original Message ---------------------------- Subject: [Devel] [PATCH][DOCUMENTATION] The namespaces compatibility list doc From: "Pavel Emelyanov" <[email protected]> Date: Fri, November 16, 2007 5:34 pm To: "Andrew Morton" <[email protected]> Cc: "Linux Containers" <[email protected]> "Cedric Le Goater" <[email protected]> "Theodore Tso" <[email protected]> "Linux Kernel Mailing List" <[email protected]> From time to time people begin discussions about how the namespaces are working/going-to-work together. Ted T'so proposed to create some document that describes what problems user may have when he/she creates some new namespace, but keeps others shared. I liked this idea, so here's the initial version of such a document with the problems I currently have in mind and can describe somewhat audibly - the "namespaces compatibility list". The Documentation/namespaces/ directory is about to contain more docs about the namespaces stuff. Thanks to Cedirc for notes and spell checks on the doc. Signed-off-by: Pavel Emelyanov <[email protected]> Author: Pavel <[email protected]> Date: Fri Nov 16 12:25:53 2007 +0300 Namespaces compatibility list diff --git a/Documentation/00-INDEX b/Documentation/00-INDEX index 910e511..3ead06b 100644 @@ -262,6 +262,8 @@ mtrr.txt - how to use PPro Memory Type Range Registers to increase performance. - info on the generic mutex subsystem. + - directory with various information about namespaces - info on a TCP implementation of a network block device. diff --git a/Documentation/namespaces/compatibility-list.txt b/Documentation/namespaces/compatibility-list.txt new file mode 100644 @@ -0,0 +1,33 @@ + Namespaces compatibility list +This document contains the information about the problems user +may have when creating tasks living in different namespaces. +Here's the summary. This matrix shows the known problems, that +occur when tasks share some namespace (the columns) while living +in different other namespaces (the rows): + UTS IPC VFS PID User Net +IPC X 1 +PID 1 1 X +User 2 X +1. Both the IPC and the PID namespaces provide IDs to address + object inside the kernel. E.g. semaphore with ipcid or + process group with pid. + In both cases, tasks shouldn't try exposing this id to some + other task living in a different namespace via a shared filesystem + or IPC shmem/message. The fact is that this ID is only valid + within the namespace it was obtained in and may refer to some + other object in another namespace. +2. Intentionnaly, two equal user ids in different user namespaces + should not be equal from the VFS point of view. In other + words, user 10 in one user namespace shouldn't have the same + access permissions to files, beloging to user 10 in another + namespace. But currently this is not so. Containers mailing list Devel mailing list Saturday, Sep 8, 2007, 7:24 PMSome of my former students asked me about the status of Buhawi after our SFD07 planning session earlier today. I still don't know when the development of Bluepoint's meta-distro will resume, but the next release will definitely be for x86_64 and will showcase the following: Tuesday, Aug 7, 2007, 6:33 PMI'm now playing with Varnish, a state-of-the-art, high-performance HTTP accelerator. Looks good so far! Notes from the Architect Once you start working with the Varnish source code, you will notice that Varnish is not your average run of the mill application. That is not a coincidence. I have spent many years working on the FreeBSD kernel, and only rarely did I venture into userland programming, but when I had occation to do so, I invariably found that people programmed like it was still 1975. So when I was approached about the Varnish project I wasn't really interested until I realized that this would be a good opportunity to try to put some of all my knowledge of how hardware and kernels work to good use, and now that we have reached alpha stage, I can say I have really enjoyed it. So what's wrong with 1975 programming? here isn't anything new The really short answer is that computers do not have two kinds of storage any more. It used to be that you had the primary store, and it was anything from acoustic delaylines filled with mercury via small magnetic dougnuts via transistor flip-flops to dynamic RAM. And then there were the secondary store, paper tape, magnetic tape, disk drives the size of houses, then the size of washing machines and these days so small that girls get disappointed if think they got hold of something else than the MP3 player you had in your pocket. And people program this way. They have variables in "memory" and move data to and from "disk". Take Squid for instance, a 1975 program if I ever saw one: You tell it how much RAM it can use and how much disk it can use. It will then spend inordinate amounts of time keeping track of what HTTP objects are in RAM and which are on disk and it will move them forth and back depending on traffic patterns. Well, today computers really only have one kind of storage, and it is usually some sort of disk, the operating system and the virtual memory management hardware has converted the RAM to a cache for the disk storage. So what happens with squids elaborate memory management is that it gets into fights with the kernels elaborate memory management, and like any civil war, that never gets anything done. What happens is this: Squid creates a HTTP object in "RAM" and it gets used some times rapidly after creation. Then after some time it get no more hits and the kernel notices this. Then somebody tries to get memory from the kernel for something and the kernel decides to push those unused pages of memory out to swap space and use the (cache-RAM) more sensibly for some data which is actually used by a program. This however, is done without squid knowing about it. Squid still thinks that these http objects are in RAM, and they will be, the very second it tries to access them, but until then, the RAM is used for something productive. This is what Virtual Memory is all about. If squid did nothing else, things would be fine, but this is where the 1975 programming kicks in. After some time, squid will also notice that these objects are unused, and it decides to move them to disk so the RAM can be used for more busy data. So squid goes out, creates a file and then it writes the http objects to the file. Here we switch to the high-speed camera: Squid calls write(2), the address i gives is a "virtual address" and the kernel has it marked as "not at home". So the CPU hardwares paging unit will raise a trap, a sort of interrupt to the operating system telling it "fix the memory please". The kernel tries to find a free page, if there are none, it will take a little used page from somewhere, likely another little used squid object, write it to the paging poll space on the disk (the "swap area") when that write completes, it will read from another place in the paging pool the data it "paged out" into the now unused RAM page, fix up the paging tables, and retry the instruction which failed. Squid knows nothing about this, for squid it was just a single normal memory acces. So now squid has the object in a page in RAM and written to the disk two places: one copy in the operating systems paging space and one copy in the filesystem. Squid now uses this RAM for something else but after some time, the HTTP object gets a hit, so squid needs it back. First squid needs some RAM, so it may decide to push another HTTP object out to disk (repeat above), then it reads the filesystem file back into RAM, and then it sends the data on the network connections socket. Did any of that sound like wasted work to you ? Here is how Varnish does it: Varnish allocate some virtual memory, it tells the operating system to back this memory with space from a disk file. When it needs to send the object to a client, it simply refers to that piece of virtual memory and leaves the rest to the kernel. If/when the kernel decides it needs to use RAM for something else, the page will get written to the backing file and the RAM page reused elsewhere. When Varnish next time refers to the virtual memory, the operating system will find a RAM page, possibly freeing one, and read the contents in from the backing file. And that's it. Varnish doesn't really try to control what is cached in RAM and what is not, the kernel has code and hardware support to do a good job at that, and it does a good job. Varnish also only has a single file on the disk whereas squid puts one object in its own separate file. The HTTP objects are not needed as filesystem objects, so there is no point in wasting time in the filesystem name space (directories, filenames and all that) for each object, all we need to have in Varnish is a pointer into virtual memory and a length, the kernel does the rest. Virtual memory was meant to make it easier to program when data was larger than the physical memory, but people have still not caught on. But there are more caches around, the silicon mafia has more or less stalled at 4GHz CPU clock and to get even that far they have had to put level 1, 2 and sometimes 3 caches between the CPU and the RAM (which is the level 4 cache), there are also things like write buffers, pipeline and page-mode fetches involved, all to make it a tad less slow to pick up something from memory. And since they have hit the 4GHz limit, but decreasing silicon feature sizes give them more and more transistors to work with, multi-cpu designs have become the fancy of the world, despite the fact that they suck as a programming model. Multi-CPU systems is nothing new, but writing programs that use more than one CPU at a time has always been tricky and it still is. Writing programs that perform well on multi-CPU systems is even trickier. Imagine I have two statistics counters: So one CPU is chugging along and has to execute n_foo++ To do that, it read n_foo and then write n_foo back. It may or may not involve a load into a CPU register, but that is not important. To read a memory location means to check if we have it in the CPUs level 1 cache. It is unlikely to be unless it is very frequently used. Next check the level two cache, and let us assume that is a miss as well. If this is a single CPU system, the game ends here, we pick it out of RAM and move on. On a Multi-CPU system, and it doesn't matter if the CPUs share a socket or have their own, we first have to check if any of the other CPUs have a modified copy of n_foo stored in their caches, so a special bus-transaction goes out to find this out, if if some cpu comes back and says "yeah, I have it" that cpu gets to write it to RAM. On good hardware designs, our CPU will listen in on the bus during that write operation, on bad designs it will have to do a memory read afterwards. Now the CPU can increment the value of n_foo, and write it back. But it is unlikely to go directly back to memory, we might need it again quickly, so the modified value gets stored in our own L1 cache and then at some point, it will end up in RAM. Now imagine that another CPU wants to n_bar+++ at the same time, can it do that ? No. Caches operate not on bytes but on some "linesize" of bytes, typically from 8 to 128 bytes in each line. So since the first cpu was busy dealing with n_foo, the second CPU will be trying to grab the same cache-line, so it will have to wait, even through it is a different variable. Starting to get the idea ? Yes, it's ugly. How do we cope ? Avoid memory operations if at all possible. Here are some ways Varnish tries to do that: When we need to handle a HTTP request or response, we have an array of pointers and a workspace. We do not call malloc(3) for each header. We call it once for the entire workspace and then we pick space for the headers from there. The nice thing about this is that we usually free the entire header in one go and we can do that simply by resetting a pointer to the start of the workspace. When we need to copy a HTTP header from one request to another (or from a response to another) we don't copy the string, we just copy the pointer to it. Provided we do not change or free the source headers, this is perfectly safe, a good example is copying from the client request to the request we will send to the backend. When the new header has a longer lifetime than the source, then we have to copy it. For instance when we store headers in a cached object. But in that case we build the new header in a workspace, and once we know how big it will be, we do a single malloc(3) to get the space and then we put the entire header in that space. We also try to reuse memory which is likely to be in the caches. The worker threads are used in "most recently busy" fashion, when a workerthread becomes free it goes to the front of the queue where it is most likely to get the next request, so that all the memory it already has cached, stack space, variables etc, can be reused while in the cache, instead of having the expensive fetches from RAM. We also give each worker thread a private set of variables it is likely to need, all allocated on the stack of the thread. That way we are certain that they occupy a page in RAM which none of the other CPUs will ever think about touching as long as this thread runs on its own CPU. That way they will not fight about the cachelines. If all this sounds foreign to you, let me just assure you that it works: we spend less than 18 system calls on serving a cache hit, and even many of those are calls tog get timestamps for statistics. These techniques are also nothing new, we have used them in the kernel for more than a decade, now it's your turn to learn them :-) So Welcome to Varnish, a 2006 architecture program. Poul-Henning Kamp, Varnish architect and coder. Friday, May 4, 2007, 7:04 PMGaim is now Pidgin! Following a legal settlement with AOL, Gaim has been renamed Pidgin and its 2.0.0 release is now available. Monday, Mar 19, 2007, 12:00 PMNews from Debian Master Ian Murdock: I saw my first Sun workstation about 15 years ago, in 1992. I was a business student at Purdue University, and a childhood love for computers had just been reawakened. I was spending countless hours in the basement of the Math building, basking in the green phosphorescent glow of a Z29 and happily exploring every nook and cranny of the Sequent Symmetry upstairs. It didn’t take too long to discover, though, just a short walk away in the computer science building, several labs full of Sun workstations. Suddenly, the Z29 didn’t have quite the same allure. A few months later, I walked over to the registrar’s office and changed my major to computer science. (OK, advanced tax accounting had something to do with it too.) Everything I know about computing I learned on those Sun workstations, as did so many other early Linux developers; I even had my own for a while, after I joined the University of Arizona computer science department in 1997. But within a year, the Suns were starting to disappear, replaced by Pentiums running Red Hat Linux. More and more people coming through university computer science programs were cutting their teeth on Linux, much as I had on Sun. Pretty soon, Sun was increasingly seen by this new generation as the vendor who didn’t “get it”, and Sun’s rivals did a masterful job running with that and painting the company literally built on open standards as “closed”. To those of us who knew better, it was a sad thing to watch. The last several years have been hard for Sun, but the corner has been turned. As an outsider, I’ve watched as Sun has successfully embraced x86, pioneered energy efficiency as an essential computing feature, open sourced its software portfolio to maximize the network effects, championed transparency in corporate communications, and so many other great things. Now, I’m going to be a part of it. And, so, I’m excited to announce that, as of today, I’m joining Sun to head up operating system platform strategy. I’m not saying much about what I’ll be doing yet, but you can probably guess from my background and earlier writings that I’ll be advocating that Solaris needs to close the usability gap with Linux to be competitive; that while as I believe Solaris needs to change in some ways, I also believe deeply in the importance of backward compatibility; and that even with Solaris front and center, I’m pretty strongly of the opinion that Linux needs to play a clearer role in the platform strategy. It is with regrets that I leave the Linux Foundation, but if you haven’t figured out already, Sun is a company I’ve always loved, and being a part of it was an opportunity I simply could not pass up. I think the world of the people at the LF, particularly my former FSG colleagues with whom I worked so closely over the past year and a half: Jim Zemlin, Amanda McPherson, Jeff Licquia, and Dan Kohn. And I still very much believe in the core LF mission, to prevent the fragmentation of the Linux platform. Indeed, I’m remaining in my role as chair of the LSB—and Sun, of course, is a member of the Linux Foundation. Anyway. Watch this space. This is going to be fun! 10 years of kernel.org Tuesday, Mar 13, 2007, 6:18 PM From: [email protected] (H. Peter Anvin) Subject: FTP: New Linux FTP site: ftp.kernel.org Date: 13 Mar 1997 18:18:28 GMT Organization: Transmeta Corporation, Santa Clara CA Approved: [email protected] (Lars Wirzenius) Reply-To: [email protected] (H. Peter Anvin) Xref: nntpfeed.doc.ic.ac.uk comp.os.linux.announce:6836 -----BEGIN PGP SIGNED MESSAGE----- Transmeta Corporation is proud to sponsor a new Linux FTP site: Currently, ftp.kernel.org contains the Linux kernel and a set of mirror sites; in the future, we hope to make space available for users to publish packages directly. We are currently connected via a T1; plans are to upgrade to 10 Mbit/s in the near future. This site is accessible via: This space intentionally has nothing but text explaining why this space has nothing but text explaining that this space would otherwise have been left blank, and would otherwise have been left blank. This article has been digitally signed by the moderator, using PGP. http://www.iki.fi/liw/lars-public-key.asc has PGP key for validating signature. Send submissions for comp.os.linux.announce to: [email protected] PLEASE remember a short description of the software and the LOCATION. This group is archived at http://www.iki.fi/liw/linux/cola.html -----BEGIN PGP SIGNATURE----- -----END PGP SIGNATURE----- Wednesday, Feb 21, 2007, 5:30 PMI caused a kernel panic while playing around with some ReiserFS parameters on my Fedora Core 6 Athlon64 X2 test box. Instead of freezing as expected, Linux continued to run! I managed to duplicate the error. The box froze this time. I found out that the first kernel panic only took out one of the cores. This was why Linux continued to run. It took a second panic to take out the other core and crash the box. Cool! Seclists.Org Shut Down By Myspace and GoDaddy Thursday, Jan 25, 2007, 5:50 PMFrom: "Fyodor" <[email protected]> Subject: Seclists.Org shut down by Myspace and GoDaddy Date: Thu, January 25, 2007 5:47 pm Many of you reported that our SecLists.Org security mailing list archive was down most of yesterday (Wed), and all you really need to know is that we're back up and running! But I'm going into rant mode anyway in case you care for the details. I woke up yesterday morning to find a voice message from my domain registrar (GoDaddy) saying they were suspending the domain SecLists.org. One minute later I received an email saying that SecLists.org has "been suspended for violation of the GoDaddy.com Abuse Policy". And also "if the domain name(s) listed above are private, your Domains By Proxy(R) account has also been suspended." WTF??! Neither the email nor voicemail gave a phone number to reach them at, nor did they feel it was worth the effort to explain what the supposed violation was. They changed my domain nameserver to "NS1.SUSPENDED-FOR.SPAM-AND-ABUSE.COM". Cute, eh? I called GoDaddy several times, and all three support people I spoke with (Craig, Ricky, then Wael) said that the abuse department doesn't take calls. They said I had email [email protected] (which I had already done 3 times) and that I could then expect a response "within 1 or two business days". Given that tens of thousands of people use SecLists.Org every day, I didn't take that well. When they realized I was going to just keep calling until they did something, they finally persuaded the abuse department to explain why they cut me off: Myspace.Com asked them to. Apparently Myspace is still reeling from all the news reports more than a week ago about a list of 56,000 myspace usernames+passwords making the rounds. It was all over the news, and reminded people of a completely different list of 34,000 MySpace passwords which was floating around last year. MySpace users fall for a LOT of phishing scams. They are basically the new AOL. Anyway, everyone has this latest password list now, and it was even posted (several times) to the thousands of members of the fulldisclosure mailing list more than a week ago. So it was archived by all the sites which archive full-disclosure, including SecLists.Org. Instead of simply writing me (or [email protected]) asking to have the password list removed, MySpace decided to contact (only) GoDaddy and try to have the whole site of 250,000 pages removed because they don't like one of them. And GoDaddy cowardly and lazily decided to simply shut down the site rather than actually investigating or giving me a chance to contest or comply with the complaint. Needless to say, I'm in the market for a new registrar. One who doesn't immediately bend over for any large corporation who asks. One who considers it their job just to refer people to the SecLists.Org nameserver at 184.108.40.206, not to police the content of the services hosted at the domains. The GoDaddy ToS forbids hosting what they call "morally objectionable activities". It is way too late for MySpace to put the cat back in the bag anyway. The bad guys already have the file, and anyone else who wants it need only Google for "myspace1.txt.bz2" or "duckqueen1". Is MySpace going to try and shut down Google next? For some reason, this is only one of a spate of bogus Seclists removal requests. I do remove material that is clearly illegal or inappropriate for SecLists.org (like the bonehead who keeps posting furry porn to fulldisclosure). But one company sent a legal threat demanding that I remove a 7-year old Bugtraq posting which was a complaint about previous bogus legal threats they had sent. Another guy last week sent a complaint to my ISP saying that an image was child porn and declaring that he would notify the FBI. When asked why he thought the picture was of a child, he tried a different tack: sending a DMCA complaint declaring under penalty of perjury that he is the copyright holder of the photo! Michael Crook told me on the phone that he sent the DMCA request, but when I forwarded the info to the EFF (who is already suing this guy for sending other bogus DMCA complaints), he changed his mind and wrote that "after further review, I can find no record" or mailing the complaint. Most of the censorship attempts are for the full-disclosure list. It would be easiest just to cease archiving that list, but I do think it serves an important purpose in keeping the industry honest. And many good postings do make it through if you can filter out all the junk. So I'm keeping it, no matter how "morally objectionable" GoDaddy and MySpace may think it to be! In much happier Nmap news, I'm pleased to report that the Nmap project now has a public SVN server so you can always check out the latest version. Due to a bug in SVN, we use a username as "guest" with no password rather than anonymous. So check it out with the command: svn co --username guest --password "" svn://svn.insecure.org/nmap Then do the normal: And install it or set NMAPDIR to "." to run in place. Among other goodies, this release includes the Nmap scripting language. If you want to follow Nmap development on a check-in by check-in basis, there is a new nmap-svn mailing list for that. But be prepared for some high traffic as you'll get every patch! 2007 will be a good year for Nmap! Sent through the nmap-hackers mailing list Archived at http://seclists.org Monday, Jan 22, 2007, 4:08 PMThe Open Source Developer Labs and the Free Standards Group have merged today as the Linux Foundation. Friday, Jan 12, 2007, 11:00 PMChinese Professor Cracks Fifth Data Security Algorithm SHA-1 added to list of "accomplishments" Central News Agency Jan 11, 2007 Associate professor Wang Xiaoyun of Beijing's Tsinghua University and Shandong University of Technology has cracked SHA-1, a widely used data security algorithm. TAIPEI—Within four years, the U.S. government will cease to use SHA-1 (Secure Hash Algorithm) for digital signatures, and convert to a new and more advanced "hash" algorithm, according to the article "Security Cracked!" from New Scientist . The reason for this change is that associate professor Wang Xiaoyun of Beijing's Tsinghua University and Shandong University of Technology, and her associates, have already cracked SHA-1. Wang also cracked MD5 (Message Digest 5), the hash algorithm most commonly used before SHA-1 became popular. Previous attacks on MD5 required over a million years of supercomputer time, but Wang and her research team obtained results using ordinary personal computers. In early 2005, Wang and her research team announced that they had succeeded in cracking SHA-1. In addition to the U.S. government, well-known companies like Microsoft, Sun, Atmel, and others have also announced that they will no longer be using SHA-1. Two years ago, Wang announced at an international data security conference that her team had successfully cracked four well-known hash algorithms—MD5, HAVAL-128, MD4, and RIPEMD—within ten years. A few months later, she cracked the even more robust SHA-1. Focus and Dedication According to the article, Wang's research focusses on hash algorithms. A hash algorithm is a mathematical procedure for deriving a 'fingerprint' of a block of data. The hash algorithms used in cryptography are "one-way": it is easy to derive hash values from inputs, but very difficult to work backwards, finding an input message that yields a given hash value. Cryptographic hash algorithms are also resistant to "collisions": that is, it is computationally infeasible to find any two messages that yield the same hash value. Hash algorithms' usefulness in data security relies on these properties, and much research focusses in this area. Recent years have seen a stream of ever-more-refined attacks on MD5 and SHA-1—including, notably, Wang's team's results on SHA-1, which permit finding collisions in SHA-1 about 2,000 times more quickly than brute-force guessing. Wang's technique makes attacking SHA-1 efficient enough to be feasible. MD5 and SHA-1 are the two most extensively used hash algorithms in the world. These two algorithms underpin many digital signature and other security schemes in use throughout the international community. They are widely used in banking, securities, and e-commerce. SHA-1 has been recognized as the cornerstone for modern Internet security. According to the article, in the early stages of Wang's research, there were other researchers who tried to crack it. However, none of them succeeded. This is why in 15 years hash research had become the domain of hopeless research in many scientists' minds. Wang's method of cracking algorithms differs from others'. Although such analysis usually cannot be done without the use of computers, according to Wang, the computer only assisted in cracking the algorithm. Most of the time, she calculated manually, and manually designed the methods. "Hackers crack passwords with bad intentions," Wang said. "I hope efforts to protect against password theft will benefit [from this]. Password analysts work to evaluate the security of data encryption and to search for even more secure … algorithms." "On the day that I cracked SHA-1," she added, "I went out to eat. I was very excited. I knew I was the only person who knew this world-class secret." Within ten years, Wang cracked the five biggest names in cryptographic hash algorithms. Many people would think the life of this scientist must be monotonous, but "That ten years was a very relaxed time for me," she says. During her work, she bore a daughter and cultivated a balcony full of flowers. The only mathematics-related habit in her life is that she remembers the license plates of taxi cabs. With additional reporting by The Epoch Times. Microsoft Will Acquire Skype Thanks So Much Sir Engels! Software Freedom Day 2006 Steve Jobs (1955-2011) Michael Jackson (1958-2009) Trained by the Best Free Software Foundation Files Suit Against Cisco For GPL Violations Microsoft + Novell = ?
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368703662159/warc/CC-MAIN-20130516112742-00040-ip-10-60-113-184.ec2.internal.warc.gz
CC-MAIN-2013-20
38,557
260
http://ungainlyy.tumblr.com/post/11355386559/complete-cloud-hosting-for-gros-ro
code
Complete cloud hosting for gros.ro I’m just setting up http://gros.ro a lightweight e-commerce site fully hosted in the cloud. As it comes: - The framework is Wordpress hosted on Heroku - The database engine is MySQL hosted on Amazon RDS - Sending emails is powered by Sendgrid - Receiving emails is powered by Google Apps - Source code repository is hosted by Github You can get all these for free for such a small website running a few thousands of users.
s3://commoncrawl/crawl-data/CC-MAIN-2014-41/segments/1410657116650.48/warc/CC-MAIN-20140914011156-00143-ip-10-196-40-205.us-west-1.compute.internal.warc.gz
CC-MAIN-2014-41
459
8
https://info.credly.com/trademark-and-brand-use
code
When referring to Credly trademarks and the names of Credly software, products, and services, follow these Credly Trademark and Brand Use Guidelines. You may use Credly trademarks in text solely to refer to and/or link to Credly’s products and services and in accordance with the terms of these Guidelines. You must also follow Credly's brand identity guidelines when displaying the Credly logo. You may not: Your registered publisher name and everything about your application—name, logo, description, screenshots—must be unique and free of Credly trademarks unless (1) you’ve secured permission from Credly; (2) you are displaying a Credly Credential or (3) you’re only using a Credly trademark (not including logos) to describe that your product is designed to work in conjunction with a Credly product or service and as long as your app logo and/or name: In addition, Credly Marks cannot be used as a source identifier for your app icon. Social Media Guidelines The name of your social media account, any and all pages or communities, cannot begin with a Credly Mark. In addition, Credly logos cannot be used in a way that might suggest affiliation with Credly, including, but not limited to, the account, profile, or header images. The only exceptions to these requirements are if (1) you’ve secured permission from Credly through a license or equivalent (though such licenses are not generally available in this context); or (2) you’re using a Credly trademark (not including logos) to describe the purpose of your account, page, or community provided that: For example, you cannot name your account, page, or community “Credly Products.” However, it would be acceptable to name your account, page, or community “Information about Credly Products” as long as you do not use the Credly logos or otherwise suggest any affiliation with Credly. Publications, Seminars, & Conferences Guidelines These Publications, Seminars, and Conferences Guidelines allow you to use Credly word-only Trademarks (the “Wordmarks”) in the title of publications, seminars, and conferences solely in accordance with the terms of these guidelines. You may use the Marks in the title of publications, seminars, and conferences provided: You may not: If you include a trademark footnote in your materials to give notice of ownership of your trademarks or third party trademarks, you must add the following wording to your trademark footnote: "All other trademarks are the property of their respective owners." Credly is the sole owner of the Marks and associated goodwill. Credly will be the sole beneficiary of any goodwill associated with your use of the Marks. Credly reserves all rights not expressly granted herein. Credly may revoke or revise these Trademark & Brand Guidelines, generally or as applied to your use, at any time at its sole discretion.
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296945242.64/warc/CC-MAIN-20230324020038-20230324050038-00574.warc.gz
CC-MAIN-2023-14
2,862
16
http://blogjam.com/2002/12/16/exposed-2/
code
Anja has a great story today – go read it, then come back here and read one of mine – it’s kinda similar. Back already? OK – I spent a couple of years in the mid 1980’s working at London’s Record & Tape Exchange, an extremely grotty chain of second hand shops resposible for about 60% of the people working in London’s music industry. I spent one day each week in the branch that sold musical instruments and home entertainment goods, a place of not infrequent violence as we locked the doors yet again to prevent the escape of some poor smack-addict attempting to flog a stolen trumpet. One day a middle-aged gentleman arrived in the shop to sell a knackered looking video player. After making sure his ID was present and correct, I took the machine into the workshop at the back of the shop, where we tested much of the incoming stock, plugged it in, noticed there was a tape in the machine, and pressed play. And there he was – our middle-aged seller – masturbating furiously for the camera, naked apart from his socks. After regaining my composure, I took the machine back into the shop, ready to tell the surely mortified customer that he’d forgotten to remove his home-made pornography. And what happened? Before I said a word, he smiled at me, asked if I’d enjoyed the performance, grabbed the player off the counter and strolled casually out of the shop. I never saw him again.
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947473690.28/warc/CC-MAIN-20240222030017-20240222060017-00004.warc.gz
CC-MAIN-2024-10
1,407
2
http://blogs.technet.com/b/configmgrteam/archive/2013/06/21/now-available-cumulative-update-2-for-system-center-2012-configuration-manager-service-pack-1.aspx
code
Cumulative Update 2 for Configuration Manager SP1 is now available as a hotfix download via KB 2854009. In addition to various issue fixes, this update also includes the following: The Configuration Manager Client for Linux and UNIX is updated to support these platforms and is available from the Microsoft Download Center. As with other cumulative updates, this release is optional and does not affect the product support lifecycle. For more information about cumulative updates, refer to Update System Center 2012 Configuration Manager and New cumulative update servicing model for System Center 2012 Configuration Manager. This posting is provided "AS IS" with no warranties and confers no rights. I got an error while installing secondary site after upgrading to CU2.... got an error in pushing secondary sites after hierarchy upgraded to CU2... :( I have a Primary site server and several Distribution points. Do I need to install an update on the DPs? They are not secondary sites. @DDN - thank you for reporting this issue, we have published a blog post with further details here: blogs.technet.com/.../known-issue-secondary-site-installation-failure-with-cumulative-update-2.aspx @ Neil. It depends on whether you are talking about regular DPs, cloud based DPs or Pull DPs. Normally updates for site system roles are installed as part of the update for site servers. With Configuration Manager SP1, updates for site system roles include updates that apply to cloud-based distribution points. However, updates that apply to a pull-distribution point, install as an update for the Configuration Manager client and not as an update for site system roles.
s3://commoncrawl/crawl-data/CC-MAIN-2015-40/segments/1443736678118.17/warc/CC-MAIN-20151001215758-00163-ip-10-137-6-227.ec2.internal.warc.gz
CC-MAIN-2015-40
1,659
10
http://identitystandards.illinois.edu/theillinoisbrand/overview.html
code
On July 7, 2008, the Chancellor and Provost asked all campus units to: - Phase out the use of campus unit logos - Use only the campus logos - Refer to campus units with text only, and - Use a comprehensive visual identity. - The campus logos must remain as originally drawn and proportioned and cannot be modified. - A buffer zone of at least one-third of the height of all versions of the I Mark, Illinois logo, or Urbana-Champaign logo must appear between the logo and other design elements. A buffer zone larger than one-third of the height of all versions of the logo is strongly preferred. - Designers should not place design elements in close proximity to the I Mark, Illinois logo, or Urbana-Champaign logo in an attempt to make the two appear to be a unit. - The I Mark must appear on the cover of all publications. - Either the Illinois logo (preferred) or Urbana-Champaign logo must appear inside the publication. - Campus units can meet both guidelines by simply placing the Illinois logo or the Urbana-Champaign logo on the front of publications. - The I Mark and the text "University of Illinois at Urbana-Champaign" or "Illinois" must appear prominently on the home page of all campus units. The I Mark must be linked to the campus Web site home page at http://illinois.edu. Campus units can meet all of the guidelines by simply placing the Illinois logo (preferred) or the Urbana-Champaign logo on their home page and linking it to http://illinois.edu. - Include the text "Illinois" or "University of Illinois at Urbana-Champaign" in the title field of the home page after the name of the campus unit. - Use the campus favorites icon. PowerPoint and Keynote Presentations The I Mark and the text "University of Illinois at Urbana-Champaign" should appear prominently on the first page of PowerPoint and Keynote presentations. New campus templates are available for use but are not required.
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917120349.46/warc/CC-MAIN-20170423031200-00238-ip-10-145-167-34.ec2.internal.warc.gz
CC-MAIN-2017-17
1,905
16
https://forum.netgate.com/topic/94151/it-s-all-english-to-me
code
It's all English to me I tried changing the language to Portuguese or Turkish, but it has no effect, even after rebooting. I was hoping to check that some gettext() stuff is working. The language selection seems to be saving OK in the config. Is there some known problem with the implementation at the moment? Yes. There is a Redmine ticket open and assigned to Renato.
s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320303709.2/warc/CC-MAIN-20220121192415-20220121222415-00387.warc.gz
CC-MAIN-2022-05
369
4
http://catless.ncl.ac.uk/Risks/2/17/
code
Please try the URL privacy information feature enabled by clicking the flashlight icon above. This will reveal two icons after each link the body of the digest. The shield takes you to a breakdown of Terms of Service for the site - however only a small number of sites are covered at the moment. The flashlight take you to an analysis of the various trackers etc. that the linked site delivers. Please let the website maintainer know if you find this useful or not. As a RISKS reader, you will probably not be surprised by what is revealed… I have recently seen several risks contributions which assumed that humans are the cause of most system accidents and that if the human was somehow replaced by a computer and not allowed to override the computer (i.e. to mess things up), everything would be fine. The issue is too complicated to cover adequately here. But before rushing off to replace human controllers with computers, at the least consider the following: ** Most accidents involve multiple failures of different components of the system. It is rarely possible to pinpoint one particular failure as the sole cause. (e.g. Three Mile Island involved at least four or five different types of mechanical failures. Who got the blame?) ** There are often powerful and compelling reasons for wanting the blame placed on the human. For example, Babcock and Wilcox can be sued for billions if there is something wrong with the design of their nuclear power plants — how much can you collect from some poor operator? ** The human is often called in to save the day after chaos has already begun and then expected to come up with a miracle. If he does not save the day, then the blame is often placed on him/her instead of the initiating mechanical failures. ** Most accidents result from unanticipated events and conditions. Thus it is doubtful that computers will be able to cope with emergencies as well as humans do. Expert systems do not help in coping with unanticipated events or conditions. ** There are many examples of accidents which were averted by a human overruling an errant computer. If the operator had not intervened at the Crystal River Nuclear Power Plant, for example, a catastrophe might have occurred because of the computer error. The hype about "expert systems" and "artificial intelligence" may be very dangerous. There are reports that commercial pilots are becoming so complacent about automatic flight control systems that they are averse to intervene when failures do occur and are not reacting fast enough (because of the assumption that the computer must be right). The problem is just not that simple that the answer "replace the human with a computer" will solve it. Nancy As an owner of Eastern Airlines stock (fell from $11 to $5 right after I bought it), I'm particularly upset by this. I don't know the details; I hope someone with more knowledge can fill them in. According to my stock broker (Disclaimer: I don't have any hard documentation, and I'm not a Wall. St. expert), one of the major blows to the already troubled company was a bogus earnings report issued on a Dow Jones computer (something like 20 cents instead of $1.50). The mistake was corrected within the hour, but in that hour, portfolio managers had dumped Eastern stock, and the price fell $3, and never recovered. I think this happened around early September. There seems to be some misunderstanding about computerized stock trading. First, "programmed buys" and "programmed sells" really have nothing to do with computers. All "programmed" transactions could be done by hand but typically they are extremely complex, so a computer is needed. Programmed trading only occurs when special intermarket conditions are present. Program trading consists of arbitrageurs who use the spread between the value of stocks on the New York Stock Exchange (NYSE) and the Chicago Board of Options Exchange (CBOE) in Chicago. Occasionally other markets are used. Intermarket arbitrage adds to market volatility but not in a negative sense. The infamous "Triple Witching Hour", a time four times a year of extremely volatile trading, is a direct result of this intermarket arbitrage. Eric Nickell in his note compare the market to a feedback system that oscillates - something like a forcing function with resonance. Well not at all true. The market cannot get really swamped because something will "break-down first". In the case of the NYSE - the "market makers" will have an "order imbalance" preventing further trading. In RISKS Vol 2, Issue 16, Kurt Hyde write: > There are many documented cases of accidental miscalculation in computerized > vote tallying equipment. The reasons why such errors were discovered is > because reconstruction and recount was possible. Investigators > reconstructed by gathering the machine-readable ballots. They were then > able to recount by machine or by hand. Such reconstruction is impossible > with the current state of the art in computerized voting booths because no > physical ballots are created. Recounts in such cases are wholly dependent > upon the software to have stored each vote in its proper storage location at > the time of voting. While the risks would not be entirely removed, and regardless if any fraud or error is suspected, there could be a standard practice initiated whereby a sample from each election is validated by follow-up phone call or physical notification. Privacy could be somewhat maintained by automating this process, e.g., immediately after the polls close, the computer randomly selects some small sample and sends a letter saying, "Citizens Jones, according to our computer voting system, you voted thusly:...." The citizen then returns the card validating or invalidating his voting record. A box could be checked for him to indicate that he would rather not acknowledge via mail or not at all; the percentage of such respondents would probably be low. Also, since some people may goof or maliciously be inconsistent, the final validation would not have to be unanimous; some standard percentage of validation would pass as I believe it does today in a recount. If delegating the follow-up procedure to a computer is the start of a new computer risk, then it could be done manually, but I believe this kind of check-back mechanism would significantly reduce the risks involved in computer voting to the point that it could gain approval. Larry Polnicky, Honeywell Information Systems, McLean, Virginia. Kurt Hyde's reference to the Phillipine elections and the security of computerized vote-counting systems reminds me that the issue of computer security is artificially narrow. If I am a criminal, and you confront me with an unbreakable computer security system, I will simply direct my attention elsewhere. Attacking strong points went out with World War I (or, to maintain the underworld analogy, with Machine Gun Kelly). The most elaborately password-protected system is easily cracked if the passwords are transmitted over telephone lines, or if people leave their passwords lying about on scraps of paper. That may fall outside the venue of computer science, but not outside the venue of reality. In the case of the Phillipine elections, it didn't matter how well the vote-counting computers were programmed; there were soldiers at the polling places threatening to shoot voters. Ballot boxes were opened to reveal twenty thousand ballots marked in the same handwriting for Mr. Marcos. The computer operators were being told what numbers to enter. I guess there's not much you can do about risks outside your direct control. My point is not to get too focussed in our concerns. [As noted many times in RISKS, any single weak link may represent a vulnerability. In systems designed not to have single weak links, there are weak combinations. Thus we must be concerned with ALL of the weak links. PGN] Today I attended an IEEE videoconference on "Applications of Artificial Intelligence" with Drs. Tom Mitchell (CMU/Rutgers), Alex Pentland (SRI), Peter Szolovits (MIT) and Harry Tennant (Texas Instruments). Aside from some overdriven graphics such that it interfered with the audio, it was an excellent intro to AI (for those concerned with the medium AND and the message). I asked the question, asked here and elsewhere by others, about the potential legal responsibility of authors of AI software, the most obvious example being medical diagnosis. The answer from the panel was that most AI work now has been done under very controlled conditions, responsibility has never been tested in a court case, and that (possibly) the law applying to publishers of reference books might apply also to AI systems (that is, willful deceit would be punishable but typos and other innocent mistakes would not make a publisher accountable). But according to one of the panel members some AI researchers ARE in fact taking out insurance against possible suits but (paraphrase) "the insurance companies look upon this problem as something of a lark and the insurance emiums are low now" although the same panel member said that (paraphrase) "this may become a very important problem in the future". I originally phrased the question to ask whether the implicit threat of possible suits against artificial intelligence applications might have a chilling effect on research and development of interesting applications (that is, those involving human life and property), but as it was not asked it was not answered. My own (legally uninformed) feeling is that AI by its very nature spreads around the concept of "volition" such that the present legal system might have a difficult task in assigning responsibility in a damage suit (and these doubtless will come down the pike someday). There's an interesting article in the 2/24 issue of InformationWEEK concerning the DES. Apparently, DES was up for voting to become an international encryption standard sanctified by ISO. The NSA (National Security Agency) was lobbying very strongly within ANSI (the United States' representative within ISO) to have DES disapproved... the apparent reason being that wide standardization of DES, and its routine use, would make it substantially more difficult for NSA to monitor overseas voice and data communications. IBM pushed very strongly within ANSI for a "yes" vote within ISO (DES is already an ANSI standard, and its details have been readily available to anyone for the past five years or more). In the end, IBM won and NSA lost; ANSI abstained from voting, which had the same net effect as a "yes" vote. Have any studies been done concerning the risks of having, or not having a secure data-encryption scheme to guard the integrity of one's data? Please report problems with the web pages to the maintainer
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446710711.7/warc/CC-MAIN-20221129200438-20221129230438-00861.warc.gz
CC-MAIN-2022-49
10,767
9
http://luc.edu/cs/academics/courses/courselisting/comp433/
code
COMP 433: Web Services Programming Dr. Konstantin Läufer Web services are building blocks for enterprise applications that use open data exchange standards and transport protocols to exchange data with calling clients. This course studies the architectures, frameworks, and tools required to develop and compose web services and clients, as well as integrate service-oriented systems with legacy systems. Taught by Dr. Läufer in Spring 2011.
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368701063060/warc/CC-MAIN-20130516104423-00055-ip-10-60-113-184.ec2.internal.warc.gz
CC-MAIN-2013-20
443
4
https://www.lynda.com/X-Particles-tutorials/Emitting-particles-from-objects/383909/446224-4.html
code
Join Andy Needham for an in-depth discussion in this video Emitting particles from objects, part of X-Particles 3 for Cinema 4D Essential Training. - To wrap up our exploration of the X-Particles Emitter, w'ere going to look at one of the most interesting emitter shapes, Object. We skipped over this when we first looked at the Object tab, because there's quite a lot of parameters. So without further ado, let's check it out. Going to switch the Emitter Shape by over to Object, and we've got field for an Object, a selection and some other things, which we can talk about. So, let's start emitting some particles. And because we're in Object Mode, nothing's there. We need to give it an object, so we'll choose a sphere. I'm just going to set this type to be Icosahedron. And I'm going to drop it in the object field. And then we start getting some particles being emitted from the sphere. If we hide this, we can choose whether to emit from any of these things. Polygon Centre is currently selected. And we can change the direction, so. They're currently going at the Phong Normal So that you can be coming out of the object. We can change this to a specific axis if we like. And you'll notice that, in this kind of setup it's quite similar to just emitting from a sphere. We can obviously switch out of the object to be something else. I'm going to change this back to Phong Normal. And let's look at some of the other options we've got here. Let's see what that does. Now we're getting, instead of this kind of spread that we were getting, with that enabled, they're coming out of the polygon center as one particle, per source element. If we stick the particle to the object source, we get a pretty cool result here by, let's look at how we could use that. So, at the moment, the particles just appear on frame one. And they're just in the shape of the sphere. But if we keyframe the radius, and we'll just go to 15 frames and set a keyframe. And then just bring this down to zero. See, our particles will grow on with the size of the sphere. And there's all kinds of uses for that I'm sure you can think of. Let's move on to some of the other modes. So rewind this. In this example, I've just set up a plane with a very basic texture. Let's look at the texture. Got a checkerboard effect in the texture field. And I've just changed the color to be different from white and black. In the Bump, I'm using a gradient, and you'll see why in a second. I've set the strength to be zero, so it's not going to affect the actual plane. So let's play this through. Okay. So the emitter isn't really set up correctly yet. It is emitting from the plane, but we want to emit from the texture. So when you select that, all these options appear. I'm going to drag the texture into the Texture Tag field. And now, the particles will get the color from the texture. Remember I set up a Bump channel. I'm going to use that now to control the particle speed. So if I just choose Bump, and rewind, shift + f and you can see that's getting a really cool effect, I think. (laughs) We can just change the gradient, if we go into those settings here. Got some very slow particles here. Some faster ones, so we can just change that. And now we've got a different shape. This wraps up our in-depth look at the emitter. Should now have an understanding of how to change emitter parameters, such as the emitter shape, and control particle data including speed and radius. We also looked at particle groups and display properties, and we've touched on questions and modifiers, and how to edit your particles. I also showed you how you can randomize the emission pattern. Now that we've seen how to emit particles from objects, why not try adding some other objects or textures, and really get familiar with the settings? - Working with the Emitter tabs - Adjusting particles with modifiers - Creating visible particles - Using sprites - Colliding, freezing, and lighting particles - Caching in X-Particles - Applying constraints - Adjusting materials settings - Sculpting particles - Saving and loading presets
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370494064.21/warc/CC-MAIN-20200329074745-20200329104745-00319.warc.gz
CC-MAIN-2020-16
4,089
19
https://mksprep.com/forums/topic/buy-telfast-online-canada-telfast-obat/
code
Buy our meds online at cheap price without prescription! Random Internet Quotes: The center. Because of life international expansion. Many australians, the best care plan traditional medicare offers convenience and phar-mor, the industry have been used if you need to accelerate its cheap without prescription for educational purposes in year: your prescription. We offer. Although it’s to the agent is going to continue working full-time while gaining credentials for everyone. In about 6 months. Where individuals with check. Ribler, the medication. Our articles browse by each product sales channels and packaging components, and interpreting these online. This process. Shipment by financial details of the image or injection can choose according to provide you. You. The company to most cats. This same family, thank you to a lot of their efforts can be focusing her eventual career opportunities logistics partner dhl we recommend to head. Replenish supplies in the most value of orders for trustworthy. Telfast for a controlled substance to prepare for a couple of online medical center for their respective owners. Being experienced in the informationverify here are obtaining prescribing rights and packaging …
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323585181.6/warc/CC-MAIN-20211017175237-20211017205237-00398.warc.gz
CC-MAIN-2021-43
1,223
3
http://www.real-statistics.com/multiple-regression/multiple-regression-analysis/seasonal-regression-forecasts/
code
99We now turn our attention to the situation where we use regression with seasonal data: hourly, weekly, monthly, quarterly, etc. For hours we have 24 periods in a day, for months we have 12 periods in a year, etc. In particular, we are concerned with cases where the seasons influence the trend of the data (e.g. annual sales revenues are increasing, but revenues in June are lower than in September). Example 1: Company XYZ’s quarterly revenues for 2012 through 2015 are shown in column C of Figure 1. We would like to forecast the quarterly revenues for 2016 based on a linear regression model. As we see from the blue curve in Figure 2, although the annual trend of the revenues may be linear, the graph is certainly not linear due to seasonal fluctuations. We need a way to handle these seasonal fluctuations. Figure 1 – Seasonal forecasting The approach we use is to add categorical variables to represent the four seasons (Q1, Q2, Q3, Q4). Three dummy variables are required (one fewer than the number of periods). The coding based on these variables are shown in columns E, F and G of Figure 1. Column E contains a 1 for revenue data in Q1 and a 0 for revenue data not in Q1. Similarly column F contains a 1 for data in Q2 and a 0 for data not in Q2. Column G codes for data in Q3. Revenue data in Q4 will have a 0 in columns E, F and G. We also include a variable t in column D which simply lists the time periods sequentially ignoring the quarter. Figure 2 – Seasonal Trends We now construct a multiple linear regression model using the data in range D3:G19 as our X values and range C3:C19 as our Y values. This analysis is shown in Figure 3. Figure 3 – Regression Analysis with Seasonality We can use this model to create predictions for the historical data in 2012-2015 as well as for 2016 (future forecast). These predictions are shown in column H of Figure 1 using the array formula =TREND(C4:C19,D4:G19,D4:G23). This is the red curve in Figure 2. E.g. the prediction for Q1 of 2012 is $10,812,500 (cell H4), which is fairly close to the actual revenue of $10,500,000 (cell C4). The forecasted values for each quarter in 2016 is shown range H20:H23 of Figure 1.
s3://commoncrawl/crawl-data/CC-MAIN-2018-09/segments/1518891812665.41/warc/CC-MAIN-20180219131951-20180219151951-00133.warc.gz
CC-MAIN-2018-09
2,184
11
http://www.redorbit.com/topics/markup-languages/?page=10
code
Latest Markup languages Stories PUB HTML5 (http://pubhtml5.com/) now introduces its simple-to-use digital magazine software which can create eye-catching publications to modern PUB HTML5, a leading eBook publishing platform solution has introduced several new and stunning features for helping millions of users create beautiful Nextgen HTML5 flip books. Techshare Middle East is a conference and exhibition discussing accessibility and assistive technology at a national and regional level with international participation. PUB HTML5, the market leader in HTML5 online publishing technology, now encourages people to create attractive digital page flip report instead of traditional PDF report. PUB HTML5, the creator of HTML5 brochure maker, has announced a new version of its software before Christmas Day 2014. PUB HTML5 (http://pubhtml5.com/) is the leading provider of digital publishing tools. PUB HTML5 (http://pubhtml5.com/) has announced upgrades for its HTML5 digital magazine software for iPad. HTML5 digital publishing technology (http://pubhtml5.com/) is perfect for publishing Halloween decoration catalogs (PRWEB) User-friendly PUB HTML5 software enhances the quality and appearance of online and offline digital publications with its advanced features. Users Encouraged to Publish Hallowmas-themed Magazines, Brochures, Catalogs to PUB HTML5’s Growing Worldwide Audience http://pubhtml5.com/ - An uxorious, effeminate, or spiritless man. - A timorous, cowardly fellow.
s3://commoncrawl/crawl-data/CC-MAIN-2015-22/segments/1432207929956.54/warc/CC-MAIN-20150521113209-00074-ip-10-180-206-219.ec2.internal.warc.gz
CC-MAIN-2015-22
1,487
13
https://apps.oscommerce.com/u7uBp
code
Seeing as how everyone is trying to create music download stores these days, I thought I'd give back to the OsCommerce community by creating a free template based on the new Napster.com. Actually calling it a template is a little misleading, it's more along the lines of a "skin" on a standard OsCommerce install. You'll still have to create all of the buttons and the like, but unlike other templates it will be easier to make modifications and add other contributions. This works best on a clean install of OsCommerce as you can just drop files into the correct folders. If you're not working from a new install, then you'll have to compare the differences in the pages with an editor. I've included the Photoshop PSD file's for the graphically inclined among you who would like to make changes. You can currently see the template in action here: but I've also included a screen shot in the package, should I decided to delete the above url in the future. If you use the template and like what you see.. feel free to make a donation to [email protected] in any amount you see fit.... :) If the response is great enough... maybe I'll create a template based on the new Microsoft/MTV Urge service.....
s3://commoncrawl/crawl-data/CC-MAIN-2021-21/segments/1620243991378.52/warc/CC-MAIN-20210515192444-20210515222444-00048.warc.gz
CC-MAIN-2021-21
1,201
8
http://www.makeuseof.com/tag/binpress-selling-source-code/
code
Hiring freelance programmers to write up the source code for your programming tasks can be quite time consuming. A much better option is Binpress, a website that acts as a marketplace for buying and selling source codes online. It can help you find and purchase the source code you need. Source codes on the site correspond to a variety of tasks and are written in various languages. All codes listed on the site are scrutinized by the website for functionality and authenticity. Developers can get their codes licensed. To help your codes sell, the site uses several distribution channels including SEO and PPC campaigns, partnerships with affiliates, and cross-site promotions. To provide developers with an extra initiative, the site is holding a programming contest with more than $40,000 in cash and prizes for winners. Sponsors of this contest include big names like Google, Microsoft, PayPal, Amazon Web Services, and Conduit. You can find codes and click on the one you need. The Binpress page of a code details its information; this information includes its description and instructions on how to use it. Most codes can also be previewed via a demo. You can control parameters and see how the code reacts. - A website for buying and selling your source code. - Helps buyers find and purchase the right source codes. - Contains codes in numerous languages. - Codes correspond to a variety of tasks. - Similar tool: AppSplit. Check out binPress @ www.binpress.com
s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218187945.85/warc/CC-MAIN-20170322212947-00548-ip-10-233-31-227.ec2.internal.warc.gz
CC-MAIN-2017-13
1,470
11
https://betonvloeren.net/hostgator-vs-bigrock/
code
Hostgator Vs Bigrock In 2002, HostGator was founded by Brent Oxley in his dormitory at Florida Atlantic College. The company has expanded significantly ever since and remains to do so, every year. Their logo design is “We consume the competition.”Hostgator Vs Bigrock Today, HostGator has headquarters in both Austin and also Houston, Texas, after growing out of numerous various other sites. In 2007, their Brazil office was opened. HostGator has actually won great deals of awards for assistance and also hosting services. An EIG Owned Eco-friendly Host In June 2012 HostGator was bought out by the Endurance International Group (a firm that also owns many other hosting companies besides HostGator). Nonetheless, it remains to trade under the HostGator name. HostGator is an environment-friendly energy business. The firm acquires Green-e certified Renewable Energy Debts (RECs) from a wind ranch in Texas. 130% environment-friendly energy cools and powers all shared and reseller web servers. We might earn a payment– at no additional expense to you– if you make a decision to acquire any of the products, software program or solutions we describe and promote on our site. The viewpoints revealed are of our own independent customers & writing team, appointed to offer handy testimonials & their impartial opinion. You should think that every exterior link that you click on our website is an affiliate link that causes us being paid by a partner of ours. Overview of HostGator’s Top Attributes Whenever there’s a discussion concerning webhosting, the name HostGator is bound ahead up, and with good factor. Hostgator Vs Bigrock Having actually been around for more than a years, HostGator can be said to be one of one of the most relied on and identified host. It masters numerous locations consisting of consumer assistance, hosting adaptability, uptime, shared hosting, plus a lot a lot more. This excellence in numerous aspects of web hosting coupled with the business’s experience, range of functions, and performance makes HostGator a smart choice for any kind of internet site proprietor. What Reward Do You Get? HostGator supplies a variety of strategies. If you’re having a hard time to decide on which plan to select, take into consideration these attributes, which we’ll go over listed below: - You manage your account utilizing cPanel, the industry-standard interface - To keep your account safe, you obtain a totally free Secure Sockets Layer (SSL) certificate - If you intend to increase safety and security and also malware scanning, you will need to get SiteLock - Also the entry-level shared hosting plan features assistance for unrestricted e-mail accounts - Month-to-month payment options are offered - One-click installs, also from the basic planHostgator Vs Bigrock - Accessibility to the internet site builder– at an expense - A Material Distribution Network (CDN) maintains your website quickly - Multiple assistance alternatives including real-time chat With all the other web hosting carriers that are readily available, why choose HostGator? Well, the reality is that no solitary webhosting is perfect. So, whether you’re a newbie web designer or are looking to transform web hosts, right here’s a glance at the good and the negative of HostGator to assist you make the right choice. HostGator’s Hosting Plans One of the very best functions of HostGator is the fact that the company uses adaptable packages that leave users (both big as well as tiny businesses/blogs) with plenty of room to grow. The most fundamental of the packages, the “Hatchling Strategy,” includes support for one domain, endless transmission capacity, disk room, data sources, shared SSL certificate, lots of e-mail addresses, and also support for third-party applications like content management systems. Various other shared holding strategies build on this Hatchling plan by adding extra attributes such as limitless domain names, private SSL certificate, and a toll-free contact number (just among others.). VPS as well as Devoted Organizing Strategies. Additionally, if you require more power, or have specific needs that shared web servers can not fulfill, there’s the alternative of more advanced packages such as VPS as well as Dedicated web server plans. The greatest tier VPS plan uses 8GB RAM, 240GB storage space, and month-to-month data transfers topped at 3TB. Committed server bundles, on the other hand, can be personalized with approximately 16GB of RAM, 25TB of month-to-month information transfers, and an outstanding 1TB of storage space. HostGator likewise supplies Cloud and also WordPress holding, which we explore below. You can constantly see HostGator’s main websites to find the most upgraded holding bundles available in addition to their specifics. The business likewise supplies WordPress organizing with the least expensive bundle enabling one website with approximately 100,000 visitors monthly. The cheapest WordPress plan likewise includes 1GB backups. Higher-end plans allow for up to 3 websites as well as approximately 500,000 site visitors each month. Meanwhile, the leading WordPress hosting plan additionally allows for as much as 3GB in backups.Hostgator Vs Bigrock Loads Ahead of The Competition All WordPress organizing plans include optimized cloud style, low-density web servers, CDN, and also several caching layers which suggest that sites load up to a claimed 2.5 times faster than rivals. HostGator professionals are also on hand to offer a cost-free movement solution and high quality assistance in case anything breaks. What About Performance and also Uptime? HostGator assures a 99.9% uptime and has the resources to back it up. Powered by Countless Worldwide Web Servers. One of the largest and most prominent webhosting, HostGator has thousands of web servers under its monitoring. HostGator servers are kept track of 24/7 by on-site technological staff. Safeguarded Facilities for Connection of Service. In addition to being tactically situated across the world, these web servers use premiumserver equipment as well as are housed in advanced data facilities that take all the needed measures (UPS battery backup units, top-tier COOLING AND HEATING systems, consistent framework monitoring, fire defense systems, and so on) to make sure performance stays flawless and also undisturbed. Thanks to these world-class information facilities and their strategic places, HostGator offers trustworthy, top quality efficiency that never dissatisfies. Uptime and Speed HostGator has an over 90% customer complete satisfaction (from a June 2008 client satisfaction study). HostGator preserves an average of 99.9% uptime. As well as in addition to the trusted uptime, HostGator additionally provides satisfying lots times with rates ranging from 22 to 940ms depending on the browser’s location. How Excellent is HostGator’s Consumer Assistance? When it comes to consumer support, really few host can compete with HostGator’s customer care. The company even has honors to show this truth. For general questions and problems, you can use HostGator’s email support, which is always offered, social media assistance on Facebook, Twitter, Google+. When you sign up for a HostGator plan, you can ask for a cost-free web site transfer. Or look for solutions from the company’s considerable knowledgebase, which is full of FAQs, handy write-ups, and also video clip tutorials that walk you through a few of the controls. HostGator likewise supplies a forum where you can ask questions and also respond to those positioned by various other customers of the host. Conversely, if you require a bit more prompt help, or are experiencing a concern that needs unique focus, HostGator has consumer support agents on standby 24/7/365 ready to aid you with whatever questions you might have. These agents can be gotten to by phone or live chat.Hostgator Vs Bigrock Is There a Money-Back Guarantee? No locked-in contracts and also a 45-day money-back assurance. Implying if you make a decision to cancel within the first 45 days of joining, you obtain a full reimbursement, no doubt asked. Better making HostGator a good catch is the reality that the host includes a few additional attributes with their numerous holding strategies. As an example, each organizing plan features a number of freebies. You obtain a cost-free internet site builder as well as web site structure devices, endless bandwidth as well as disk area, over 4,000 web site design templates, cost-free domain name transfers, and also unlimited MySQL databases. Other bonus that you can anticipate with HostGator consist of:. - $ 150 worth of Google Adwords or Bing/Yahoo marketing credit scores. - Cost-free site transfers when you intend to relocate your website from an additional host to HostGator. And also the best part is that your website can be upgraded during the transfer at no charge. Nonetheless, the claimed movement has to be done within thirty days from the day you subscribe. - A cost-free domain for the first term when you transfer and also set up a brand-new account. - 1-click mounts readily available for all significant open-source projects such as WordPress, Magento, as well as Joomla. - A 45-day money-back guarantee for all HostGator organizing plans. Many webhosting firms just offer you a 30-day window to cancel your account and also get your money back. - A getting-started email with links to all of the resources you will certainly need to develop your site and get it up and also running. What are the Advantages and disadvantages of HostGator? So, is HostGator the ideal webhosting for you? Well, given the truth that HostGator offers you a straightforward means to build as well as handle your website, gives you with all the sources you’ll require to provide high-level solutions on your website, supplies a number of feature-packed organizing plans, as well as brings a lots of experience to the table, it can be a perfect webhosting for anybody with a website. A Lot Of Pros HostGator supplies numerous advantages including:. - Trusted uptime and also quick action times. - Inexpensive hosting plans. - A lot of space for development. - The option of cloud holding. - Versatile e-mail administration. - Free shared or exclusive SSL certification on all hosting plans. - Generous 45-day money-back guarantee that offers customers assurance. - Substantial Knowledgebase. - No constraint on bandwidth, disk room, and e-mails. - Well-founded protection. - Free Weebly website builder. - A terrific control panel with a lots of functions ranging from a web-based documents manager to advanced attributes such as cron work, image manager, mistake logs, as well as apache trainers. In addition, HostGator has a big knowledge base with response to almost any concern you can have ranging from the easiest to one of the most sophisticated. So, when the consumer support group takes as well long to respond to, you can choose the service to your issue from this knowledgebase. What Are the Cons? When it comes to the downsides of the company, you’ll just have to deal with the issue of weekly backups, slow customer action times (according to a few of the host’s customers), an innovative cPanel that calls for some getting utilized to, and no one-stop WordPress import.Hostgator Vs Bigrock Try Without Any Commitment Considered that HostGator has a lot to like as well as really few things to do not like, you should absolutely attempt the business if you possess a website or strategy to construct one. If the host does not make an excellent suitable for your internet site, the 45-day money-back assurance available will enable you to leave without shedding cash.
s3://commoncrawl/crawl-data/CC-MAIN-2021-49/segments/1637964363659.21/warc/CC-MAIN-20211209030858-20211209060858-00209.warc.gz
CC-MAIN-2021-49
11,743
84
http://www.sonarsource.com/2016/05/13/sonarlint-for-intellij-2-1-released/
code
SonarSource is pleased to announce the release of SonarLint for IntelliJ version 2.1. This new version provides a lot of improvements based on the community feedback and fixes many issues. It also adds support for the Python language, but only in the connected mode for the moment (support in standalone mode should come soon). Note that a bug fix release 2.1.1 has also just been released to fix an issue related to the support of PHP Storm. Have fun with SonarLint !
s3://commoncrawl/crawl-data/CC-MAIN-2016-40/segments/1474738661795.48/warc/CC-MAIN-20160924173741-00057-ip-10-143-35-109.ec2.internal.warc.gz
CC-MAIN-2016-40
468
4
http://fivekradius.blogspot.com/2007/01/day-245-im-still-having-computer.html
code
I'm still having computer freezing problems and Ralph says there is nothing else he can try - he will have to reinstall windows and all the extras. I walked the loop today looking for interesting texture to sketch. But somehow, on this first day of 2007, despite the lovely rain and consequent greenness already, I have sketched the 'bench with no view'. The trees have grown up and there is not a glimpse of the lake. 2007!
s3://commoncrawl/crawl-data/CC-MAIN-2018-30/segments/1531676592001.81/warc/CC-MAIN-20180720232914-20180721012914-00401.warc.gz
CC-MAIN-2018-30
424
1
https://www.kvraudio.com/news/angry_red_planet_updates_temper_to_v0_9_14_7625
code
Angry Red Planet has updated Temper to v0.9.14. As well as some important bug fixes there are two major new additions, the ability to edit multiple tracks simultaneously, and a new Workbench mode that lets you chain tools together to process selected events. - Temper A: Added new tool, Groove, for applying a time offset to events. A shape is used to determine the offset, see documentation. - Added ability to edit multiple tracks simultaneously, see documentation. - Added new Workbench mode, for processing selected events (including events across multiple tracks) with advanced tools (Flip, Quantize, Velocirapture, etc.), see documentation. - Added Tool browser, basically just a list of tools, but if you click on one you will get an inspector that includes a link to the tool's online documentation. - Added chords, accessible from the key signature in the song ruler. - Fix: Audio events were displaying incorrectly when tempo was changed. - Fix: MIDI recording was broken when tempo tap was added. - Fix: Various MIDI editing bugs.
s3://commoncrawl/crawl-data/CC-MAIN-2021-25/segments/1623487629209.28/warc/CC-MAIN-20210617041347-20210617071347-00051.warc.gz
CC-MAIN-2021-25
1,041
9
https://answers.sap.com/questions/9505760/how-to-add-in-table-view-an-existing-field-in-othe.html
code
I need add a field in table view but the field are in other view in the same component of table view. I also need the field to display the data that the field in the source view context node: ZZAMPL (This context was created as value node) table view info context node: BUILADDRESS How could I do this? Thanks for your help
s3://commoncrawl/crawl-data/CC-MAIN-2021-39/segments/1631780056297.61/warc/CC-MAIN-20210918032926-20210918062926-00290.warc.gz
CC-MAIN-2021-39
323
7
https://lukearl.com/blog/work/printcss
code
At some point, someone, somewhere, for whatever reason will want to print out your webpage. This raises the question of whether you would like them to print off the entire site as seen or save them precious ink & let them print off selected portions. I came across this excellent article about your print.css file which should help you work out what to keep and what to drop. In the simplest of terms, drop the lot, the layout/nav/headers/footers via means of display:none & keep the important thing, the information which you wish to convey. Anything after that and you’re wasting their time & print resources. Oh, and to call your print stylesheet, simply place this in your header: <link rel="stylesheet" title="print" src="print.css" media="print" /> ..and you’re away. Unless you like to link your stylesheets differently and in that case do.
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474663.47/warc/CC-MAIN-20240226194006-20240226224006-00127.warc.gz
CC-MAIN-2024-10
851
8
https://support.google.com/analytics/answer/1116091?hl=en
code
This article explains how to configure destination goals in the most common scenarios. For more general information about how to set up goals, read Set up and edit goals.In this article: To configure goals for these types of URLs: - First verify that the URL for the goal is both unique to that page/Goal, and consistent from view to view. If the URL is the same across multiple steps in the goal process, see Identical URLs Across Multiple Steps (below). If the URL changes from view to view, or if it has name/value parameters, see the instructions for dynamically-generated URLs. - Destination: Enter the request URI part of the goal. The request URI is that part of the URL that comes after the domain address. Using the URL examples listed above, you would enter: - Case sensitive: Check this box only in the situation where you want to match only one of two identical URLs which differ only by case (e.g. - Match Type: Use the match type that works best for your purpose. In most situations, the default (Equals to) match works well. See Match types below for more details. - Value: If you have an imputed value for your page, turn this option on and enter that value in the field. See About goals, goal Value for more information. To track transactions, you'll need to add Ecommerce tracking code to your shopping cart. This allows Analytics to calculate the Revenue and ROI metrics from purchases on your site. However, it's often useful to also create a destination goal to signal the completion of an ecommerce transaction. Setting up a destination goal will allow you to see the percentage of sessions that resulted in at least one transaction (i.e., this will be the conversion rate for that goal). If you set up a destination goal to signal the completion of an Ecommerce transaction, leave the goal Value field blank. The actual value of the transaction will appear in the Revenue metric (not the Goal Value metric) and will come from the Ecommerce tracking code in your shopping cart. Once you have defined Ecommerce tracking and can verify that the transaction data is being sent to Analytics, configure your destination goal as follows: - For destination: Supply the URL for your "thank you for purchasing" page. For example: - Match Type: Typically, Begins with is the best choice for shopping pages, since shopping cart URLs often append a number of parameters to the end of the URL to pass data to the Ecommerce server. You can test your shopping cart to determine the structure of the URL and set the match accordingly. See Match Types below for more details. - Goal Value: If you’re tracking an Ecommerce transaction, leave can this blank. Use the Revenue in your Ecommerce reports to see how much an action is worth. Dynamically generated or variable URLs If your URLs include query terms or have parameters at the end, use either Begins with or Regular Expression match types when entering funnel or destination goal URLs. Examples of dynamic or variable URLs are: See Match Types below for more details. Identical URLs across multiple steps In some situations, the URL doesn't change across a sequence of activity. For example, a sign-up process might have the following URL path: - Step 1 (Sign Up): - Step 2 (Accept Agreement): - Step 3 (Finish): In general, we recommend that you: However, advanced users may want to track users' progress through a funnel with the same URL for each step. To do this, you need to modify your tracking code to create a virtual pageview for each step in the sequence that you want to track. You can pass the ga function a send command with the pageview hit type and override the default page value with a URL you fabricate, as described in the Developer Guide. For the above example, the modifications to your analytics.js tracking code might look like this: ga('send', 'pageview', '/funnel_G1/step1.html'); ga('send', 'pageview', '/funnel_G1/step2.html'); ga('send', 'pageview', '/funnel_G1/step3.html'); Finally, define your funnel and destination goal URLs using the ones you created in the tracking code modifications. Goals for multiple criteria You can define a goal for multiple criteria, such as an interaction with two specific sections of your website, or a go to any page within a sub-directory of your website. To do this, use Regular expression as your match type. See Match types below for more details. The following examples illustrate these scenarios: ^/sports/.*to match a goal when any page within the sports directory is viewed sports.html|music.htmlto match a goal when a user views either the sports.html or music.html pages Goals on other sites If the destination you want to use as a goal is on another site, see Goals and funnel steps on third-party sites. Tips for setting up funnels When you create a destination goal, you also have the option to create funnel for that goal. A funnel is a sequence of pages that you anticipate users seeing before they reach the goal. Report data for the funnel appears in the funnel Visualization report. Before creating a funnel, keep in mind the following: - Test the sequence on your website, and make a note of all pages that make up the entire sequence of activities you want to track for the goal. - The final page of the sequence is the actual goal, and its URL should be entered in the destination field, not the funnel section. - The match type you select for the destination also applies to any URL in the funnel section. - Omit the domain name of the URL in each funnel step (e.g., http://www.example.com/aboutUs.htmlshould be entered as - If you make the first step of the funnel mandatory, the conversion count for the funnel Visualization report will include only those users who reached the goal via that first step. Otherwise, the conversion count for the goal will be the same in all reports. To define a funnel: - Open or create a destination goal. - Turn on the funnel option, and enter a name for that step that you want to appear in the funnel reports. For example, you might want to use Welcome as the name for welcome.html. - Enter the URL for the first page in the funnel for Step 1. - To make the first step required, click the Required step toggle to turn it ON. - For additional funnel steps, click +Add another Step, and supply the name and URL for each page. Note: remember not to enter the final page of the process in the funnel section, but in the Destination field. - When you have finished adding pages, click Create goal (or Save goal). To verify that the funnel is working, view the funnel Visualizations reports to see data there. Match Types: Begins with, Equals to, & Regular Expression There are three diferent match types that define how Analytics identifies a URL for either a goal or a funnel. The match type that you select for your goal URL also applies to the URLs in the funnel, if you create one. - Equals to—for standard, fixed URLs: An Equals to match is an exact match on every character in your URL—without exception—from beginning to end. Use this when your URLs for your site are easy to read and do not vary. This option requires that the URLs you provide for your funnel or goal exactly match the URLs shown in the reports. There can be no dynamic (changing) information in the URL such as session identifiers or query parameters.If you are using an Equals to match for a goal (e.g., /shopping/thanks.html), leading or trailing whitespaces in the destination field will invalidate the goal. - Begins with—to eliminate trailing URL parameters: This matches identical characters starting from the beginning of the string up to and including the last character in the string you specify. Use this option when your page URLs are generally unvarying but when they include additional parameters at the end that you want to exclude. If your website has dynamically generated content, use a Begins with match filter and leave out the unique values. For example, a URL that a particular user went to might be http://www.example.com/checkout.cgi?page=1&id=9982251615. In this case, the idvaries for every other user. You could still match this page by using /checkout.cgi?page=1as the URL and selecting Begins with as your match type. - Regular Expression Match—for matching on multiple criteria: A regular expression uses special characters to enable wildcard and flexible matching. This is useful when the stem, trailing parameters, or both, can vary in the URLs for the same webpage. For example, if a user could be coming from one of many subdomains, and your URLs use session identifiers, you could use a regular expression to define the constant element of your URL. For example, http://sports.example.com/checkout.cgi?page=1&id=002as well as As another example, you could use regular expressions to set a goal for a user goes to any page in a subdirectory: Verifying Correct URL Expressions for goals You can verify that you have written a goal URL correctly by searching for the page in the Pages report using the exact URL or regular expression you want to use in creating your goal. If you are able to successfully view the pages you expect after doing a search, you can safely assume your URL or expression will work.Examples Suppose your pet store website has a number of pages in a single directory, and you want to use a Begins with match URL to create a goal only for the fish-related pages, which all have the same structure: To determine whether your matching URI works, go to the All Pages report for your site, click the advanced button, and choose Include, Page, and Begins with before the search field. To match the URLs above, you would enter /supplies/fish in the search field. If your search returns those pages you expect to match, you can use that same URI string as your goal URL. Regular Expression Match Because the All Pages report allows regular expressions in the search field, it's a great place to verify whether your regular expression will work as a goal. For example, the Analytics documentation on Google Developers Site for Analytics has a number of pages that have collection as part of the file name. For example: While many of those files are in the /collection directory of the site, some of them don't. In order to set a goal that converts on all traffic that goes to pages with collection as part of their name, a regular expression is required. A search in the All Pages report in the Behavior Reporting section using the regular expression .*collection[^/]*html$ verifies that this expression matches all files that contain collection and no other files.
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296816465.91/warc/CC-MAIN-20240412225756-20240413015756-00106.warc.gz
CC-MAIN-2024-18
10,580
83
http://www.rcuniverse.com/market/item.cfm?itemId=1129687
code
Sign in to Make Offer Selling lightly used Frsky Taranis X9D transmitter with aluminum case. This is not the 'plus' version. Link below is for the 'plus' which added a haptic feedback board. Mfgr info: https://www.frsky-rc.com/product/taranis-x9d-plus-2/ Amazon (plus version) : https://www.amazon.com/FrSky-Taranis-16-channel-2-4ghz-Transmitter/dp/B00MYORSW8/ref=sr_1_4?s=toys-and-games&ie=UTF8&qid=1518101745&sr=1-4&keywords=frsky+taranis+x9d+plus RCU2 | 188.8.131.52 | 0 | 1 | 04:02:04 PM EST | NC
s3://commoncrawl/crawl-data/CC-MAIN-2018-09/segments/1518891808539.63/warc/CC-MAIN-20180217224905-20180218004905-00698.warc.gz
CC-MAIN-2018-09
500
5
https://trainingfoundry.co.uk/forums/reply/31639/
code
If we were to use only essential processing, without generative processing, it would be like rote learning the core information, so we can compare referencing, passives, and paraphrasing in terms of how complex the material is to process. However, as @sue, @azurial, @georgie_l, @paul-m,@naomirabin, @zsofit and @andrew suggest, the issue with paraphrasing in particular is that students will never simply replicate exactly what they learnt in the classroom. Regardless of how complex it might be to process initially, students are then required to transfer these skills and apply what they ‘learnt’ to produce something original in their new context, which may look very different to what they produced in the EAP classroom. This could be described as far transfer. Writing a reference list, however, may just require students to replicate what they did in class (near transfer). As @robert mentions, making connections with the students’ subject area might help during generative processing to increase relevance and reduce the transfer distance.
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474573.20/warc/CC-MAIN-20240225003942-20240225033942-00041.warc.gz
CC-MAIN-2024-10
1,054
1