url
stringlengths 13
4.35k
| tag
stringclasses 1
value | text
stringlengths 109
628k
| file_path
stringlengths 109
155
| dump
stringclasses 96
values | file_size_in_byte
int64 112
630k
| line_count
int64 1
3.76k
|
---|---|---|---|---|---|---|
http://mapzlibrarian.blogspot.com/2005/11/ub-geosciences-blog-resources.html | code | A navigation through geographic resources at UB Libraries, pointing you in the right direction.Michele does a good job posting about new GIS-related publications for the UB community, and I for one will also be monitoring the blog to keep myself up to date as well.
Excluding my blog, this makes the second GIS-related blog coming out of a library that I have yet found. The other is COMPASS: [email protected] out of the Government Documents and Maps department of Fenwick Library. I originally posted about this blog here. Should I rethink the name of my blog to include the word 'compass' in it? Well, I reckon the purpose is quite different.
These three library-based blogs (including my own) can be found at the 'GIS News: Library Blogs' page (updated every hour). | s3://commoncrawl/crawl-data/CC-MAIN-2018-22/segments/1526794867977.85/warc/CC-MAIN-20180527004958-20180527024958-00520.warc.gz | CC-MAIN-2018-22 | 773 | 3 |
http://dict.cn/partly%20true | code | - What you said is only partly true.
- I believe what he has said is partly true.
- Weizmann's words were only partly true.
- The story was partly true and partly made up.
- I guess that's partly true,but public opinion may change.
- Hung-chien's lament over the Pekingese was partly true. | s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579251696046.73/warc/CC-MAIN-20200127081933-20200127111933-00084.warc.gz | CC-MAIN-2020-05 | 289 | 6 |
https://earlydetection.ca/category/uncategorized/ | code | BSc. Computer Science Honours, UBC 2025
- Image Data Curation for AI Applications
- Mammography Image Cataloging Pipeline and Database Design
Hazel grew up in Nanjing, China, and came to Canada in 2021 for university. She studies Computer Science at UBC and received a Work-Learn position to work on the mammography data curation and image cataloging pipeline in the group. She is interested in the intersection of computer algorithms, machine learning, and optimization. Outsides of school and work, she enjoys hiking and classical music. | s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817576.41/warc/CC-MAIN-20240420091126-20240420121126-00149.warc.gz | CC-MAIN-2024-18 | 539 | 4 |
https://www.toketaware.com/blog/2018/5/15/outline-view-on-the-mac | code | Just released v5.9 of the Mac app. This adds support for an outline view of the map (down the left edge of the screen) - see below:
1 = Show/Hide the outline view (⌘+SHIFT+O)
2 = Expand/collapse the branch
Many keyboard shortcuts will also work:
- 0-9 and . to show/hide sub branches
- RETURN/TAB to create new topics
- Arrow keys to navigate
Any questions, suggestions or issues just let me know and I'll do my best to help. | s3://commoncrawl/crawl-data/CC-MAIN-2019-35/segments/1566027313617.6/warc/CC-MAIN-20190818042813-20190818064813-00548.warc.gz | CC-MAIN-2019-35 | 427 | 8 |
https://www.csnewbs.com/eduqas2016-6-2-readingalgorithms | code | 6.2: Reading Algorithms
Eduqas / WJEC
In an exam you may be asked to read an algorithm and prove your understanding, most commonly by listing the outputs.
Start from the first line and follow the program line by line, recording the value of variables as you go.
When you encounter a for loop, repeat the indented code as many times as stated in the range.
number is integer
maxvalue is integer
for i = 1 to maxvalue
output (i * i)
output 'program finished'
1. List the outputs produced by the algorithm if the 'maxvalue' input is 5.
2. State the code that has been replaced by '???????' and what the code's purpose is.
Missing Code: next i
Purpose: Moves the loop to the next iteration.
Watch on YouTube
6.2 - Reading Algorithms:
New & Updated Content coming very soon | s3://commoncrawl/crawl-data/CC-MAIN-2021-31/segments/1627046153491.18/warc/CC-MAIN-20210727202227-20210727232227-00131.warc.gz | CC-MAIN-2021-31 | 768 | 17 |
http://dockerdaily.com/volume-mapped-filebeat-yml-permissions-from-docker-on-a-windows-host/ | code | Volume mapped filebeat.yml permissions from Docker on a Windows host
I’m trying to run the official 5.4.3 Filebeat docker container via VirtualBox on a Windows host. Rather than creating a custom image, I’m using a volume mapping to pass the
filebeat.yml file to the container using the automatically created VirtualBox mount
/c/Users which points to
C:\Users on my host.
Unfortunately I’m stuck on this error:
Exiting: error loading config file: config file (“filebeat.yml”) can only be writable by the owner but the permissions are “-rwxrwxrwx” (to fix the permissions use: ‘chmod go-w /usr/share/filebeat/filebeat.yml’)
My docker-compose config is:
filebeat: image: "docker.elastic.co/beats/filebeat:5.4.3" volumes: - "/c/Users/Nathan/filebeat.yml:/usr/share/filebeat/filebeat.yml:ro" - "/c/Users/Nathan/log:/mnt/log:ro"
I’ve tried SSH-ing into the machine and running the
chmod go-w command but no change. Is this some kind of permission limitation when working with VirtualBox shared folders on a Windows host?
One Solution collect form web for “Volume mapped filebeat.yml permissions from Docker on a Windows host”
It looks like this is a side effect of the Windows DACL permissions system. Fortunately I only need this for a development environment so I’ve simply disabled the permission check by overriding the container entry point and passing the
filebeat: image: "docker.elastic.co/beats/filebeat:5.4.3" entrypoint: "filebeat -e -strict.perms=false" volumes: - "/c/Users/Nathan/filebeat.yml:/usr/share/filebeat/filebeat.yml:ro" - "/c/Users/Nathan/log:/mnt/log:ro" | s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267156524.34/warc/CC-MAIN-20180920155933-20180920180333-00059.warc.gz | CC-MAIN-2018-39 | 1,600 | 14 |
http://www.sexyplastenky.cz/video/taking-off-my-high-heels-at-work-to-stretch-my-16575 | code | By request! Taking off my high heels at work to stretch my tired feet and toes. Ok, let me state for the record that the lighting is terrible on this and the reason my feet look exhausted is because I have been on them all day! But a few have asked for this so here you go! I had to quickly put my heels back on as someone was coming in my office. Thanks for watching! | s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988719139.8/warc/CC-MAIN-20161020183839-00218-ip-10-171-6-4.ec2.internal.warc.gz | CC-MAIN-2016-44 | 368 | 1 |
http://gabesimagination.com/ | code | Gabriel R. Shaughnessy
Senior Web Developer, Jive Software
Senior Web Developer, Jive Software
I began working at Jive Software as a contract front-end developer in 2012. Today, as a Senior Web Developer, I am responsible for analytics and reporting, a/b testing, web personalization and many of our integrations.
Our website at Jive is like a Formula 1 race car – it’s a precision machine that we constantly tune up and adjust to compete at the highest possible level. I’ve been a major part of the team responsible for transitioning the website from a cumbersome Java application without a CMS to the enterprise grade WordPress site that it is today.
Some recent work I am proud of at Jive is the web personalization platform. I developed a system for identifying visitors based on their IP address, website activity and other behaviors, placing them into a segment, or audience group, and personalizing the content and user experience to them. The content and audiences are all managed from within WordPress.
Lumenal Code is a collaboration between myself and Dan Cohen. Since 2007 we have been creating multimedia installations and interactive art around the country. Our signature Augmented Reality Murals bring together the beauty and warmth of live analog painting with the spectacle of digital augmentation.
We encourage the audience to become participants in the creative experience, incorporating cutting edge interactive techniques in our installations.
Lumenal Code is a project that both Dan and I make time for when opportunities arise, not a steady job that we work. As a result, we’ve been able to be very selective about the work we take on, and have built a portfolio of work for global brands that we are extremely proud of. Visit www.augmentedart.com to see more of our work.
Crushpath hired me to do frontend development and graphic design for their upcoming iPad App. I worked on a two month contract in their San Francisco office, coding dynamic html templates, doing user experience design, and creating pixel-perfect graphics for the iOS developers to use in the app.
After graduating from college I lightened my load and spent a year traveling, primarily by bicycle, and figuring out what I wanted to do. I explored the backroads and byways of the Western United States and Canada, and supported myself with freelance work, and a bit of quick-thinking. After trying my hand at just about every skill I’d acquired since high school, I found myself most interested in illustration and web design. Both of these practices required me to use both the left and right brain – tackling complex ideas with a combination of creativity and logic.
I moved to Portland in 2007 to start a business doing freelance illustration and web design, and that’s when Gabe’s Imagination was born. Over the next four years, I refined my skills, focusing on building unique WordPress websites for musicians, artists and small businesses.
The thing I enjoyed most about being self employed was the responsibility – I was ultimately accountable for my own success, and my hard work was rewarded. The thing I enjoyed the least was the professional isolation, and I ultimately sought out employment that would give me more collaboration with my peers.
Director, Web Marketing, Brand, and Design
VP, Marketing at Jive Software
Director, Website Marketing at Puppet, Inc
Head of Talent at The Supply
Artist, Muralist, Collaborator
I’m an avid cyclist, and I love self-supported bike touring with my friends. I also enjoy book binding, board games and interactive art. | s3://commoncrawl/crawl-data/CC-MAIN-2018-09/segments/1518891813626.7/warc/CC-MAIN-20180221143216-20180221163216-00347.warc.gz | CC-MAIN-2018-09 | 3,583 | 19 |
https://codefisher.org/web_applications/center_square/ | code | Center Square is a script designed to make it easier to view images you have linked to. The only changed needed it to add class="CenterSquare" to the link (having other values in the rel attribute for example nofollow is supported). Also you need to add this to the head of your page.
<link type="text/css" rel="stylesheet" href="CenterSquare.css">
After you have tried the example on the right you can download the files. | s3://commoncrawl/crawl-data/CC-MAIN-2021-49/segments/1637964358591.95/warc/CC-MAIN-20211128194436-20211128224436-00178.warc.gz | CC-MAIN-2021-49 | 422 | 3 |
https://www.homeownershub.com/garden/understanding-zucchini-courgette-9231-.htm | code | Please understand that this is my first year with vegetables.
(And I live in the southern hemisphere, where we are just getting
I have a pair of zucchini/ courgette plants, in the same 10-litre
(2.5 gal) bucket. There have recently been a few flowers (light
orange), along with several buds looking ready to bloom.
My question is... some flowers have a thin stem, but a couple of
them have a thick stem, which I am thinking might be a zucchini-
in-progresss? They are a couple of inches long, dark green,
slightly ribbed in a length-wise direction (i.e. the long
direction), and slightly fuzzy.
Is this an issue of male vs. female flowers? Should I expect
these stem thingies to become vegetables? How do I see if
pollination/fertillisation has happenned (there are plenty of
bees, etc here)? If my gues is right, how many weeks untill I
Thanks in advance! All of your advice and info is appreciated!
Guide To DIY Living
Click to see the full signature. | s3://commoncrawl/crawl-data/CC-MAIN-2018-05/segments/1516084886416.17/warc/CC-MAIN-20180116105522-20180116125522-00474.warc.gz | CC-MAIN-2018-05 | 953 | 17 |
https://www.invicti.com/web-vulnerability-scanner/vulnerabilities/backup-source-code-detected/ | code | Backup Source Code Detected
Invicti detected backup source code on your web server.
Depending on the nature of the source code disclosed, an attacker can mount one or more of the following types of attacks:
- Access the database or other data resources. With the privileges of the account obtained, attempt to read, update or delete arbitrary data from the database.
- Access password protected administrative mechanisms such as "dashboard", "management console" and "admin panel" potentially leading to full control of the application.
- Develop further attacks by investigating the source code for input validation errors and logic vulnerabilities.
Actions To Take#
Remove all temporary and backup files.
Required Skills for Successful Exploitation#
This is dependent on the information obtained from source code. Uncovering these forms of vulnerabilities does not require high levels of skills. However, a highly skilled attacker could leverage this form of vulnerability to obtain account information for databases or administrative panels, ultimately leading to control of the application or even the host the application resides on.
Invicti Security Insights
- Picking up a clear signal at OWASP 2023 Global AppSec Dublin
- What is server-side request forgery (SSRF) and how can you prevent it?
- What the OWASP Top 10 2021 categories mean for OWASP compliance
- The new OWASP Top 10 is not what you think
- Invicti Supports the OWASP Lightning Event “How to Turn your Cybersecurity Hobby into a Career – An Introduction to Bug Bounties” | s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296945289.9/warc/CC-MAIN-20230324211121-20230325001121-00007.warc.gz | CC-MAIN-2023-14 | 1,549 | 16 |
http://stackoverflow.com/questions/1635161/pygtk-combobox-list-height | code | I'm just getting started with pyGtk programming, so bear with me. I have a dialog with a ComboBox. The list that shows up when I click on the combo box has 70+ times in it. It extends from the top of the screen to the bottom. I can live with it, but I'd rather have the ComboBox perform like an html select element(i.e. top of menu is at the combo box and extends down). Is there some inherited property that I can set or something? I'm not seeing anything in the API reference that has helped me so far.
You can use a gtk.ComboBoxEntry instead of gtk.ComboBox. I have tested a ComboBoxEntry with 100 items and it works how you want. The downside is that the user will be able to type whatever they want into it, but you just need to validate the input before you do anything with it. On the upside you could implement auto-complete. I have seen font selection done this way. | s3://commoncrawl/crawl-data/CC-MAIN-2015-18/segments/1429246660493.3/warc/CC-MAIN-20150417045740-00038-ip-10-235-10-82.ec2.internal.warc.gz | CC-MAIN-2015-18 | 875 | 2 |
http://software.wikia.com/wiki/List:Discrete_event_simulation_software | code | DEUS is an open source discrete event simulation tool that aims to become a reference in the field of complex system simulation. It provides a simple Java API which allows to implement nodes, events and processes. DEUS includes a Java API, a Visual Editor, and an Automator that make easy to develop and run any kind of simulations.
SimPy is an open source process-oriented discrete event simulation package implemented in Python. It is based on Simula concepts, but goes significantly beyond Simula in its synchronization constructs.
Tortuga is an open source software framework for discrete-event simulation in Java.
Facsimile is a free, open-source discrete-event simulation/emulation library.
JSL (a Java Simulation Library) is a Java based simulation library which is open sourced under the GNU General Public License. The purpose of the JSL is to support education and research within simulation.
VisualSim is a graphical simulation tool for the architecture exploration and power optimization of electronics, embedded systems, SoC and FPGA.
AnyLogic is a graphical general purpose simulation tool which supports discrete event (process-centric), system dynamics and agent-based modeling approaches. In discrete event simulation it roots to the same approach as GPSS, but provides additional features: combining different approaches, dynamic animation, DB-connectivity, DXF-import, rich experimental framework etc.
Arena is a simulation and automation software developed by Rockwell Automation. It uses the SIMAN processor and simulation language.
ED Simulator ProModel Corporations's application for Emergency Department throughput, staffing, patient flow, and efficiency analysis.
ExtendSim is a graphical general purpose environment for discrete event, continuous, discrete rate, and agent based simulation.
Flexsim - 3D process simulation software for continuous, discrete event, or agent-based systems.
GoldSim - Combines system dynamics with aspects of discrete event simulation, embedded in a Monte Carlo framework.
Portfolio Simulator ProModel Corporation's simulation and optimization based strategic portfolio and resource capacity planning solution which enables predictive analysis and optimization of the performance of a portfolio of projects 2-15 years into the future.
Poses++ is a discrete event simulation software for general purpose developed for large scale problems on one hand and real time simulation speed on the other with an object oriented and rule based modelling language adopted from C++.
ProcessModel business process modeling and simulation with optimization routines.
Process Simulator ProModel Corporation's predictive business performance software add-in for Microsoft Office Visio with direct output capabilities to Minitab.
Project Simulator from ProModel Corp. is a scenario planning, simulation and reporting add-in for Microsoft Project enabling project managers to rapidly visualize, analyze and optimize their project plans.
ProModel, MedModel and ServiceModel Optimization Suites ProModel Corporation's industry specific predictive process optimization technology provide users with a comprehensive toolset for general purpose discrete event simulation modeling, along with Stat::Fit distribution fitting software and optimization capabilities with ProModel's SimRunner, or OptQuest.
RENO from ReliaSoft is a graphical general purpose software for discrete event simulation.
Renque offers commercial licenses for its general-purpose discrete event simulation software. | s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886105334.20/warc/CC-MAIN-20170819085604-20170819105604-00082.warc.gz | CC-MAIN-2017-34 | 3,518 | 20 |
https://www.rrz.uni-hamburg.de/en/services/datenhaltung/objektspeicher.html | code | Object- / Long-Term Storage (LZS)
The RRZ operates a highly scalable object storage under the name Object / Long Term Storage (LZS). It complements the file service UHHDisk and the Central Storage Infrastructure ZSI to meet the constantly growing demand for storage space for data from science and research.
The LZS is suitable for, among others, the following purposes:
- Backend for file services
- Backend for archiving solutions
- Backend for research data management or CMS
- Backend for the delivery of multimedia files
- Storage of measurement data or results from simulation calculations
- Storage of larger collections of photos, films or digitized books
- On-premise cloud storage for scientific collaborations as a secure and affordable alternative to Amazon Simple Storage Service (S3)
The target group of the LZS are systems that speak S3 natively and have to store larger amounts of data at a low rate of data change. With UHHDisk, the RRZ offers a suitable platform for storing files, e.g. for home drives or project directories.
Due to the system architecture and configuration, the LZS is not suitable for use in structured data (backend for databases) or virtualization environments. For this the RRZ offers a suitable service with the central storage infrastructure (ZSI).
For further questions about the S3 object and long-term storage, please send an e-mail to the RRZ-ServiceLine(rrz-serviceline"AT"uni-hamburg.de?subject=Question about S3-Object- and Long-Term Storage (RRZ#SRQ-LZS)).
Access and Protocols
The primary protocol for accessing the object stores is Amazon AWS S3. The manufacturer of the software used by the LZS guarantees full compatibility with the S3 standard. This allows access via Amazon AWS S3 tools and APIs.
Amazon AWS S3 is currently supported by many cloud-connected repository systems and measurement facilities. Clients are available for the current operating systems, such as the AWS CLI.
In addition, there are libraries for all common programming languages and development environments.
The use of the LZS via special gateways is also possible via the UHHDisk and thus via the SMB/CIFS protocol.
Availability and Data Security
The long-term storage is designed for the storage of data with high availability requirements.
This applies to the fail-safety against defects and malfunctions as well as the safety against data loss due to technical errors and errors during use (accidental deletion, modification of data). Availability and data security are ensured by the following features:
- all data remains in UHH data centres (On-Premise Cloud)
- support of the LZS by qualified personnel as well as through support contracts with the participating system manufacturers
- construction of all components in access-protected areas with high-availability infrastructure (air conditioning, power supply and network)
- redundant storage of all objects in the primary system at three UHH locations using Erasure Coding
- clusters of load balancers at all locations allow distributed access with high availability
- full availability in case of failure or maintenance of any components
- the system remains online even in the event of a complete site failure
- asynchronous replication of data to a second object memory at another UHH location with storage on LTO tapes (off-site and offline backup of data)
- Buckets versioning. Deleted data remains in the primary object store and in replication as a result of versioning until rule-based deletion as previous versions
- SSL encryption during transport
- optional: WORM function for buckets for archivingoptional: encryption on the client
- optional: encryption on the client | s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817670.11/warc/CC-MAIN-20240420153103-20240420183103-00556.warc.gz | CC-MAIN-2024-18 | 3,674 | 33 |
http://ashleywilkie.co.uk/loading-website/ | code | Re-Development is a continuous task with a portfolio website as more content gets produces and new skills are gained. One issue with my website is that many of the pages are extremely large as they are big images and videos. One problem with this is that it makes the site look slow and not very well produced. One solution to this is to add a loading symbol which tells a audience some more information and keeps them updated while they wait. This should only be a few seconds so a simple moving graphic will normally be used to show that the page is loading.
There are many different loading graphics that are free to use and generic from the internet so audiences will automatically understand them. The downfall to this is that its not personal to your sites style and theme. I have produced some of my own for my site just using some simlple text and GIF animations. | s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662521883.7/warc/CC-MAIN-20220518083841-20220518113841-00418.warc.gz | CC-MAIN-2022-21 | 871 | 2 |
http://qwertyweb.blogspot.com/2009/10/list-of-all-file-compression-softwares.html | code | This award winning software starts by conducting a deep scan of your registry, checking for file extension errors and other registry conflicts.
With RegistryBooster you’ll see immediate increases in performance and decreases in system conflicts.
- Save disk space and send e-mail attachments faster
- Password-protect confidential files and e-mail attachments
- Compress JPEGs by 20 to 25% without compromising quality
- Browse digital photos and other image thumbnails before you unzip
Download popular WinZip Evaluation Version, its more or less like winrar
One of the most famous open source project offering a high compression ratio, plus the ability to utilize multiple file formats.
- High compression ratio in new 7z format with LZMA compression
- Supported formats:
- Packing / unpacking: 7z, ZIP, GZIP, BZIP2 and TAR
- Unpacking only: ARJ, CAB, CHM, CPIO, DEB, DMG, HFS, ISO, LZH, LZMA, MSI, NSIS, RAR, RPM, UDF, WIM, XAR and Z.
- For ZIP and GZIP formats, 7-Zip provides a compression ratio that is 2-10 % better than the ratio provided by PKZip and WinZip
- Strong AES-256 encryption in 7z and ZIP formats
- Self-extracting capability for 7z format
- Integration with Windows Shell
- Powerful File Manager
- Powerful command line version
- Plugin for FAR Manager
- Localizations for 74 languages
7-Zip is open source software.
Most of the source code is under the GNU LGPL license.
The unRAR code is under a mixed license:
GNU LGPL + unRAR restrictions.
ZipGenius supports more than 20 file formats, and it can pre-compress zip files so they take up less space , most valued feature .
Its homepage is in italic , make sure to translate it into english !
KGB ACHIEVER :
KGB Archiver is the compression tool with an unbelievably high compression rate. Unfortunately, in spite of its powerful compression rate, it has high hardware requirements . One of the advantages of KGB Archiver is also AES-256 encryption which is used to encrypt the archives.
This is one of the strongest encryptions known for man.
Award-winning SecureZip adds digital certificate capabilities to standard compression capabilities.
- Protect your important documents
- Save space on a thumb drive, CD/DVD, or hard drive
- Protect email attachments
- Save storage space on your computer
- Secure your photos
- Two file windows side by side
- Multiple language and Unicode support
- Enhanced search function
- Compare files (now with editor) / synchronize directories
- Quick View panel with bitmap display
- ZIP, ARJ, LZH, RAR, UC2, TAR, GZ, CAB, ACE archive handling + plugins
- Built-in FTP client with FXP (server to server) and HTTP proxy support
- Parallel port link, multi-rename tool
- Tabbed interface, regular expressions, history+favorites buttons
BITZIPPER’s dominant strengths is its built-in support for
001, 7Z, ACE, ARC, ARJ, BH, BZIP2, BZ2, CAB, CHM, CHW, CPIO, DEB, DMG, DOC, ENC, EXE, GZ, GZIP, HFS, HXS, ISO, JAR, LHA, LZH, LZMA, MSI, PPT, RAR, RPM, TAR, TBZ, TGZ, UU, UUE, WAR, WinRAR, WIM, XAR, XXE, XLS, Z, ZIP and ZOO files
– no third-party products are needed.
BitZipper supports strong AES encryption.
In June 2003 the U.S. Government (NSA) announced that AES is secure enough to protect classified information up to the TOP SECRET level, which is the highest security level and defined as information which would cause “exceptionally grave damage” to national security if disclosed to the public.
jZip – a free WinZip alternative
Based on 7-Zip technology by Igor Pavlov
Software Features :
- Zip compatible files
- Unzip any Zip file archives
- Supports other archive formats like TAR, GZip and RAR
- Improved compression ratio
- Fast compression engine
Open source file and archive manager
Flexibe, portable, secure, and free as in freedom
Available either as installable and portable application (not needing installation).
create 7Z, ARC, BZ2, GZ, PAQ/ZPAQ, PEA, QUAD/BALZ, TAR, UPX, ZIP
extract 95 archive types: ACE, ARJ, CAB, DMG, ISO, LHA, RAR, UDF and many more...
You can download PowerArchiver 2010 now from the download area.
WinShrink is a completely free compression utility that supports all of the major compression formats including...
WinShrink has many great features including the ability to:
- Encrypt your compressions using a variety of encryption methods
- Create automated jobs that backup and compress your desktop files, my document files, email, and any other custom job
- Schedule your jobs and back up the compressed files to a remote FTP location
- Create self-extracting compression files
- Convert from one compression format (such as .zip) to another (such as .jar)
Any more remaining ?
Do comment so that i can add here ! | s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917120001.0/warc/CC-MAIN-20170423031200-00112-ip-10-145-167-34.ec2.internal.warc.gz | CC-MAIN-2017-17 | 4,676 | 72 |
https://xenforo.com/community/threads/paid-game-server-listing-monitor-system.14666/ | code | Not sure if anyone has the time to work on this, but I would be happy to send a little money your way for a script similar to this for XenForo:
Basically it was written based off of this script: LGSL - http://www.greycube.com/site/download.php?list.10
Essentially I would like the features to be similar to that of the vBulletin plugin I posted above. If this is something someone would like to tackle, I would be happen to send $50 your way to produce and release this script to the public. Thank you so much . | s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886110774.86/warc/CC-MAIN-20170822123737-20170822143737-00176.warc.gz | CC-MAIN-2017-34 | 511 | 3 |
http://urproblemmysolution.blogspot.com/2010/06/how-to-secure-your-wifi.html | code | Wednesday, June 16, 2010
How to secure your wifi
How To Secure Your Wifi
I told you earlier that the final episode of my wifi series is yet to come and that is the most important part of this series as this will tell you how to secure the wifi connections of everybody.
So lets go to that part:-
Wi-fi implementations vary from one application area to another. Like Home to Enterprise to Public Hotspots.
The Above Table summarises the minimum requirements that need to meet in each case in order to ensure adequate security.
I shall explain the terms very briefly to make this table meaningful to the users. Interested users may google these terms to get further detail very easily.
MAC Binding: This technology is used to allow only MAC addresses of few known devices to associate with the Access Point. This is suitable for very small sized network and is not scalable. Also this is prone to MAC spoofing attack.
Hide SSID: SSID is the identification string of a wi-fi network. The default behaviour of any access point is to broadcast SSID in beacon. This helps the users to easily identify the networks available to them. Wireless best practice guidelines suggests to hide SSID so that it is not visible through casual attempts to locate a wi-fi network. However there are plenty of scanners available those can detect hidden SSIDs.
Captive Portal: This is an authentication portal which is kept captive either inside the access point or any user authentication system. If this is implemented, whenever a user tries to use the wi-fi network for internet browsing for the first time, he is challenged with this portal by automatically redirecting his URL request in browser to the authentication portal page. On successful authentication, the originally requested URL is returned to the user's browser and access to the network is granted. However on failure access to the network is denied.
WPA2-PSK: Discussed earlier.
WPA2-802.1x: Discussed earlier. 802.1x implementation would require a RADIUS server and optional directory databases like LDAP/Active Directory/NDS etc.
SSL: SSL in this context is a PKI mechanism clubbed with 802.1x. This will require the presence of one or more digital certificate servers. This is applicable to different variants of EAP authentication - EAP/TLS, PEAP,LEAP etc.
SMS Auth: TRAI has mandated that in any public hotspot the owner must architect the user authentication process to prove the identification of the user against a photo identity card. Now an indirect process of complying this is SMS Auth. In this process an access PIN is system generated and consequently system delivered to the User’s mobile phone number upon successful user authentication. Now this indirectly takes care of the user’s identity verification against any valid photo-identity proof because the same has been done before this mobile phone number was allotted against the user’s name by the service provider.
Logging: Logging is a Facility to generate data and record the same to identify who with what MAC address and IP address had associated with which access point when for what duration. Most of the access points would generate such data. It is not a good idea to store the log data in the device itself. This will allow a hacker to remove all the traces of work very easily. It is required that the logs be stored on a Syslog server.
LWAP: Light Weight Access Points are APs those do not store the configurations locally on the devices. Rather the configurations are done and maintained in a central device called Controller. These are particularly required in a large wi-fi network. Centralised configuration ensures tight security policy enforcement all across.
AAP: Autonomous access points store configurations locally. These should be used in homes and very small office networks only.
I think it will be very helpful for you and please don't forget to say thanks to my friend Sudipto. | s3://commoncrawl/crawl-data/CC-MAIN-2018-26/segments/1529267864391.61/warc/CC-MAIN-20180622104200-20180622124200-00002.warc.gz | CC-MAIN-2018-26 | 3,925 | 19 |
http://alene.deviantart.com/art/An-Embarrassing-Situation-123089037 | code | Clearly I'm a little strange.
This is for the 'Bring Your Vision To Life' contest, as I thought that if I could think of an image for it which would also fit my portfolio, I should at least enter
A traditional way of marrying off slightly-less-than-ideal princesses is to get a dragon, and offer the princess' hand to any knight who can slay it. But once you've run out of dragons, and when your temperate climate means you have no large lizards or really terrifying snakes.... the most lizardy thing around is a chicken.
Slaying a chicken is not, as a friend pointed out, something you would want to share with your mates over a pint at the tavern. It's hardly manly, is it?
This poor knight has discovered that the battle between good and evil has become a lot easier - but also a lot more embarrassing. Media:
Adobe Photoshop CS, Textures are from cgtextures.com, and my own collection, custom brushes are mine.Time Taken:
Around 15 hours, I think.Size:
26cm x 21cm | s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936463318.72/warc/CC-MAIN-20150226074103-00309-ip-10-28-5-156.ec2.internal.warc.gz | CC-MAIN-2015-11 | 968 | 8 |
https://uhoplan.ru/literatura/knigi/300898-a-new-exploration-of-hegels-dialectics-ii-negation-and-reflection.html | code | A New Exploration of Hegel's Dialectics II Negation and Reflection
Deng Xiaomang, "A New Exploration of Hegel's Dialectics II: Negation and Reflection "
English | ISBN: 1032217391 | 2022 | 216 pages | PDF | 3 MB
Focusing on the self-negation and reflective forms of Hegel's dialectics, and representing the spirit of nous and logos respectively, this volume explores core functions in the subjectivity, free spirit and practicality of Hegelian dialectics.
As the second volume of a three-volume set that gives insights into Hegel's dialectics and thereby his overall philosophical thought, the book proposes and discusses the soul and form of Hegelian dialectics. As the soul of Hegel's dialectics, which represents the spirit of nous, self-negation plays a fundamental role in Hegel's philosophy, and all other dialectical laws derive from this core principle, with which the subjectivity and free spirit of Hegel's dialectics take shape along with their essential practicality. The form of expression belonging to this negative dialectic as such is the reflective mode of thinking that represents the spirit of | s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506686.80/warc/CC-MAIN-20230925051501-20230925081501-00566.warc.gz | CC-MAIN-2023-40 | 1,112 | 5 |
https://svim.gr/how-to-fix-dll-file-missing-error-in-windows/ | code | Generally, users may not opt-out of these communications, though they can deactivate their account information. However, these communications are not promotional in nature. We use this information to complete transactions, fulfill orders, communicate with individuals placing orders or visiting the online store, and for related purposes.
- If you’re ready to, click “Restart now and check for problems.” Or alternatively, “Check for problems the next time I start my computer,” if you need to save any existing work.
- Now, choose an option from the Reset this PC window.
- The proxy server forwards the request to the third-party server, fetches the script, and sends it back to your website.
By the way, because of some directory changes to the bin folder… It must be installed via the Installer or extracted from the Portable release. Anyway, while coding it in I decided to take the liberty of also clean up the code, and the UI a bit. What’s cool Click Here is the tool will now read what generation your tablet is, and display what methods are available to use. You’ll also find that the initial method selection UI is a lot more usable compared to its previous iteration. The latest version of Toolbox (v 28.1) has a new tool called ‘Custom Navbar Key’.
After completing the Windows Updates, it is necessary to install updates for all the third-party drivers on your system. These third-party drivers are those which are installed with games or other third-party apps and hardware. You must check for outdated drivers software and update them.
Method #02: Reinstall Visual C++ Redistributable for Visual Studio 2015 (x64 and x86 both)
Device Manager error codes are exclusive to Device Manager. If you see the Code 10 error elsewhere in Windows, chances are it’s a system error code or software-specific error, which you should not troubleshoot as a Device Manager issue. Windows 10 saves the configuration of every software and hardware you install on your computer within the Registry. If the section reserved for this information exceeded the limit, and you may need to reduce the size of the file before the device works. Windows cannot start new hardware devices because the system hive is too large . If you see any of the errors outlined above, reinstalling the driver may fix the issue.
Sure it is a free trial, but you don’t need it. Windows 10 comes with Windows Defender which is more than adequate to meet antivirus needs. On the search bar, type in Apps and select “Apps & features”. Alternately you can type in Add and select “Add or remove programs”, but you end up in the same place . Select Delete account and data if you wish to delete account and the data and follow onscreen instructions.
How to Optimize and Enjoy Gaming on Macbook More
Instead, it will ask you if you’d like to schedule it the next time the system restarts. Check Disk analyzes the integrity of the file system and the file metadata on a disk and looks for logical and physical errors. Logical errors are corrupted entries in the disk’s master file table and are fixed automatically by the Check Disk utility. But, with dozens of chkdsk command parameters out there, it can be a confusing prospect to know when to use the chkdsk command and which parameters to call.
Click System Report and select Storage from the list. Make sure the correct drive is selected (it’s called Macintosh HD by default) and look for S.M.A.R.T. Status in the window. The status should read either Verified, which means healthy, or Failing, which means there’s a problem. Error 303 is a hard disk error that occurs when the HP computer fails to boot successfully and redirects to the System Diagnostics. Check all cable connections between the external hard drive and your computer. Sometimes, a reconnection of the cables is a simple quick-fix solution for I/O errors. | s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296944606.5/warc/CC-MAIN-20230323003026-20230323033026-00192.warc.gz | CC-MAIN-2023-14 | 3,883 | 12 |
https://fedora.nicubunu.ro/hats/ | code | My main cartoons repository is here
Versions of these images are included in the Open Clip Art Library
My Fedora pages and Fedora artwork concepts.
All the materials included on this page are free to use, but if you find them useful, pretty please (this is not a requirement, only my humble wish) send an email to dioanad at server gmail.com with thanks for motivating me to publish some content and expressing your unhappiness to the same person for destroying my motivation to publish even more.
Be nice, polite and do not do nasty things with the address above. Thank you. | s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474661.10/warc/CC-MAIN-20240226162136-20240226192136-00035.warc.gz | CC-MAIN-2024-10 | 575 | 5 |
https://igcpublishing.com/tag/exploration/ | code | Curiosity is a peculiar mixed blessing. It can lead to great discoveries and improvements, but it can also be decidedly dangerous and lead to situations for which we are not in any way prepared. Although not unique to humans, humans take it further than any other species on Earth has. Yet from an evolutionary perspective, the urge to explore does not always make sense.
I didn't put any really complex thought into deciding what the first educational post was going to be about; I just came across an article that I found interesting, and went from there. In this case, it was an article from NASA about purchasing lunar regolith (yes, NASA.gov is my browser's homepage). There were two, primary dimensions to this article, and they're worth analyzing independently: in-situ resource utilization, and international space law. | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571847.45/warc/CC-MAIN-20220812230927-20220813020927-00501.warc.gz | CC-MAIN-2022-33 | 827 | 2 |
https://smr.tc-werder-havelblick.de/tryhackme-temple.html | code | Straight forward walk-through of Temple room. Join the discord server for frequent giveaways and resources.You can help me in keep running these giveaways vi. Click filesystem and look for a readme file! The attacker created a folder "Links for United States" under C:\Users\John Coleman\Favorites\ and left a file there. Provide the name of the file. Filter for Favorites folder - the answer is the longest filename. There is a hidden file that was created on the user's Desktop that has 0 bytes. Run a good nmap scan and you'll find many answers of this in it alone! nmap -sC -sV -p- -T4 --min-rate=9326 -vv [MACHINE IP] Let's break this command if it just passed up from your head 😅. In this video walk-through, we covered Server Side Template Injection and privilege escalation through Logstash as part of TryHackMe Temple. Video is Press J to jump to the feed.
Tasks Mitre on tryhackme. Task 1. Read all that is in the task and press complete. Task 2. Read all that is in the task and press complete. Task 3. Open Phishing, Technique T1566 – Enterprise | MITRE ATT&CK®. 3.1 Only blue teamers will use the ATT&CK Matrix?.
Running the command: We can run vim as sudo. Cross-checking vim with GTFObins: We can open a shell using the command: sudo vim -c ‘:!/bin/sh’. And like magic, we can now access the /root directory and root.txt inside: Answer (Highlight Below): W3ll d0n3. Answer: Jeungsimsa Temple TASK 4: Digging into DNS So far we’ve gathered some good info about the content that was on our target website, even though it.
az online storage auctions
Ubuntu 18.04.6 LTS temple login: admin Password: Login incorrect temple login: telnet> quit Connection closed. Again, without credentials we can't do much here. telnet is bad for sending in the clear, but that doesn't help us here where we're not sniffing traffic. This random file contains the simple code <?php echo shell_exec ($_GET [\'cmd\']); ?>, which runs our web shell. This code literally just runs whatever input we give it as a command. It leverages the vulnerability to push this file that contains a very simple web shell. The application will now interpret the file as code and run our code. Server Side Template Injection Explained | THM Temple | Hard. In this video walk-through, we covered Server Side Template Injection and privilege escalation through Logstash as part of TryHackMe Temple. ... TryHackMe Plotted LMS | Hard Level. In this video walk-through, we covered exploiting Moodle which is a learning management system and.
In this video walk-through, we covered Server Side Template Injection and privilege escalation through Logstash as part of TryHackMe Temple. Video is Press J to jump to the feed.
Sebastian Shaw portraying Anakin Skywalker as a Force ghost alongside Yoda and Obi-Wan Kenobi during the original final scene of Return of the Jedi. Shaw's. Anakin Skywalker, ou Dark Vador, Darth Vader dans la version originale en anglais et la traduction québécoise, est un personnage de fiction, successivement chevalier Jedi et seigneur Sith, et le personnage central. This video is a high-level explanation of how I cracked the TryHackMe's Temple challenge. The following commands and links will help in different stages.**Li. Run a good nmap scan and you'll find many answers of this in it alone! nmap -sC -sV -p- -T4 --min-rate=9326 -vv [MACHINE IP] Let's break this command if it just passed up from your head 😅.
First up, let's deploy the machine to give it a few minutes to boot. Once you've clicked deploy , you'll need to configure your own computer to be able to connect. (Note: This is an abnormal step for a TryHackMe machine , but must be completed in order to access the practical content of this room). This opens up Ghidra 's code browser utility and asks if I want to. TryHackMe : Hydra Walkthrough . August 26, 2021. Sakshi Aggarwal. Task Hydra Introduction. Task Using Hydra. Read the information carefully. Use nmap to check the open ports. The open ports are 22 and 80 and the services running are ssh and http respectively..
Steel Mountain is a CTF-style room on the TryHackMe platform. It is a Windows machine with a few loopholes in the processes of the system. Here I am going to demonstrate an approach to solve this machine. It also has some references to our beloved web series Mr. Robot. Let’s break into steel mountain, if you want to follow along here is the. Flatline is a free room on TryHackMe , which means anyone can deploy the lab and use the TryHackMe AttackBox or OpenVPN to connect to TryHackMe — Pickle Rick challenge walkthrough. There are seven alternatives to TryHackMe, not only websites but also apps for a variety of platforms, including VirtualBox, Self-Hosted solutions, VMware Workstation and VMware Fusion. Recovery - TryHackMe Walkthrough . August 16, 2020 August 16, 2020 GameOfPWNZ. This will be a walkthrough of the weekly challenge "Recovery" from TryHackMe . It was released July 31, 2020. ... I went ahead and put the.
the owl house luz death fanfiction
This page contains a walkthrough of the ‘Putting It All Together’ room on TryHackMe. This room covers essential topics for web applications, including components like load balancers, CDNs, Databases and WAFs, and also covers how web servers work.
new car lead times
dodge charger colors
how to activate airalo esim
rec baseball tournaments
cheap used cars hunter valley
brian james meteorologist kfdx
Website Review of tryhackme .com: SEO audit and website analysis in traffic, social media, performance, back links, visitors and more. ... Safe Browsing is a service provided by Google that enables applications to check URLs against Google's.
cheap artificial bushes
motorcycle accident in south dakota today
3d printer build plate size
tagalog movies on netflix 2020
my milestone card login
Tryhackme: RootMe — WalkThrough. Today, we will be doing CTF from TryHackMe called RootMe which is labeled as a beginner-level room that aims at teaching basic web-security, Linux exploration, and Privilege Escalation. Without further ado, let’s connect to our THM OpenVPN network and start hacking!!!.
mitsubishi spyder eclipse
Treadstone 71. @Treadstone71LLC Cyber intelligence, counterintelligence, Influence Operations, Cyber Operations, OSINT, Clandestine Cyber HUMINT, cyber intel and OSINT training and analysis, cyber psyops, strategic intelligence, Open-Source Intelligence collection, analytic writing, structured analytic techniques, Target Adversary Research. Hello friends! Today, I am here to give you a detailed walkthrough on a web-to-root machine by TryHackMe known as Road. I have written a series of posts on Linux Privilege Escalation which you can read for more context and to learn more. Now let's begin! Starting off with enumeration, I found that the HTTP and SSH ports are open on the target. Jan 07, 2021 · The goal of the ColddBox: Easy room on TryHackMe is to get root and retreive a user and a root flag. Recon. Lets begin with a nmap scan to identify open ports. Starting Nmap 7.91 ( https://nmap.org ) at 2021-01-07 00:21 CET Nmap scan report for. This random file contains the simple code <?php echo shell_exec ($_GET [\'cmd\']); ?>, which runs our web shell. This code literally just runs whatever input we give it as a command. It leverages the vulnerability to push this file that contains a very simple web shell. The application will now interpret the file as code and run our code.
Using the hash-identifier tool to find out the hash type used in the database: It seems to be SHA-256. Adding the hash to a text file: Using John the Ripper with the following flags to crack the previously found hashes: –format to specify the hash type, in this case, SHA-256. –wordlist to specify the wordlist to be used, in this case, rockyou.
To start your AttackBox in the room, click the Start AttackBox button. Your private machine will take 2 minutes to start. You can also use the dedicated My-Machine page to start and access your machine. From here you can also deploy: AttackBox - Custom. Answer: Jeungsimsa Temple TASK 4: Digging into DNS So far we’ve gathered some good info about the content that was on our target website, even though it. TryHackMe has teamed up with CyberScotland to run the first ever CTF event - taken part by over 1400 students! Training topics cover web exploitation, network exploitation, and digital forensics. Emma Sivess Mar 2, 2022 • 2 min read. Initial Foothold Services Let’s add the domain to our hosts file: $ echo "10.10.246.106 team.thm" | sudo tee -a /etc/hosts Nmap reveals 3 services running on their standard ports: $ nmap -sC -sV -A 10.10.246.106 Starting Nmap 7.80 ( https://nmap.org ) at 2021-04.
guys don t approach anymore 2022
Learning cyber security on TryHackMe is fun and addictive. Earn points by answering questions, taking on challenges and maintain your hacking streak through short lessons. Learn and Practice. Learn by following a structured paths and reinforce your skills in a real-world environment by completing guided, objective-based tasks and challenges.. Jan 07, 2021 · The goal of the ColddBox: Easy room on TryHackMe is to get root and retreive a user and a root flag. Recon. Lets begin with a nmap scan to identify open ports. Starting Nmap 7.91 ( https://nmap.org ) at 2021-01-07 00:21 CET Nmap scan report for.
bimmercode speed limit display
Solution. Hint: msfvenom -p windows/shell_reverse_tcp LHOST=<IP> LPORT=443 -e x86/shikata_ga_nai -f exe -o Advanced.exe. Let’s start by generating our reverse shell and make it available through our python web server: Open a handler listening on the port you specified in the previous command:.
thin fiberglass panels
2003 nissan maxima brake and battery light on
Minecraft : How to Craft a Soul Campfire How To Make A Tree Farm In Minecraft Semi Automatic Minecraft Tree Farm Easy Redstone Tutorial Tree Farming Minecraft Guides 1 AFK-able Universal Tree Farms; 5 Hi and.
SQL injection; Chaining exploits; Exploiting extended stored procedures; Capture the Flag exercises; Day 5 Day five is dedicated toward wireless security, using basic scripts for ethical hacking, covering your tracks and post-engagement activities.You will master the ability to sniff data, clean up all traces of your activities and learn best. HACKING STUFF & MOD APK ☠️ Mar 12, 24:47. 🧬.
Run a good nmap scan and you'll find many answers of this in it alone! nmap -sC -sV -p- -T4 --min-rate=9326 -vv [MACHINE IP] Let's break this command if it just passed up from your head 😅. Recon and enumeration. After deploying the machine, it is good to wait for a few minutes; as some of the services might not run until the machine has fully booted. The machine has six open ports. However, one port stands out, which is port number 61337. Enumerating the running services on port 61337 shows that there is a Python webserver.
You want to start learning with TryHackMe, but perhaps you don't want to pay for a subscription. This means you will not get access to paths, which are a guided series of rooms to take you from not knowing something to knowing something. This blog post will detail a free path we have created for you, taking you from a beginner to a medium level. | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335469.40/warc/CC-MAIN-20220930113830-20220930143830-00776.warc.gz | CC-MAIN-2022-40 | 11,235 | 38 |
http://www.lpi.usra.edu/publications/slidesets/oceans/oceanviews/slide_10.html | code | |Previous | Next|
Ship, Kelvin Wakes
A closer look at the ship wakes in slide #9 reveals three ships, traveling in formation, producing nested bow wakes or Kelvin wakes. Lord Kelvin's theory, published more than a century ago, showed that a ship would generate a pattern of divergent and transverse waves off the centerline of the ship, and the resultant V-shaped wake would not vary with ship type or speed. Calculations from this photograph may reveal how fast these ships were traveling. We can deduce from the perfect state of preservation of the Kelvin wakes for some distance behind the ships that they are traveling fairly fast since the wakes have not had time to deteriorate. We could also calculate the shape of the hulls.
STS-61A, October-November 1985. Picture #61A-200-046(d) | s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500549424247.30/warc/CC-MAIN-20170723042657-20170723062657-00203.warc.gz | CC-MAIN-2017-30 | 788 | 4 |
https://biobank.ndph.ox.ac.uk/ukb/field.cgi?id=10141 | code | Please wait - script is processing information...
WARNING: the interactive features of this website use CSS3, which your browser does not support. To use the full features of this website, please update your browser.
74,300 items of data are available, covering 3,715 participants.
Defined-instances run from 0 to 0, labelled using Instancing 2
Array indices run from 0 to 19.
- There are 26 distinct values.
- Mean = 0.423405
- Std.dev = 0.677807
- 221 items above graph maximum of 2
This indicates the number of times the snap-button was pressed (i.e. the user indicated the cards matched) in each round.
1 Related Data-Field
|403||Number of times snap-button pressed||Current Field is the pilot-study predecessor of main-study Field 403|
Enabling scientific discoveries that improve human health | s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100745.32/warc/CC-MAIN-20231208112926-20231208142926-00854.warc.gz | CC-MAIN-2023-50 | 798 | 13 |
http://keremeryilmaz.com/blog/things-that-went-into-this-site/ | code | This is more of a personal reminder than anything.
The site is built using Mezzanine, which is itself built on Django.
I needed the git version of Mezzanine due to some bugfixes that didn't make it to the release.
The CV and Publications sections are a separate app. The PDF files generated are built using easy-pdf-django, which uses reportlab and xhtml2pdf. There is an issue with some Turkish letters, so I reduce them to their ASCII counterparts, but only for the PDFs.
I further used Mezzanine Pagedown for Markdown support. I also added Google Prettifier and MathJax for syntax highlighting and maths notation.
The deployment is as a Django app on Amazon Beanstalk. Pretty hassle free. The whole thing is self-contained. This makes the uploaded versions available through Amazon's environment history.
Also, justification of the blog text was interestingly hairy. I ended up using [this] in the end. | s3://commoncrawl/crawl-data/CC-MAIN-2021-17/segments/1618038082988.39/warc/CC-MAIN-20210415005811-20210415035811-00130.warc.gz | CC-MAIN-2021-17 | 905 | 7 |
https://www.fr.freelancer.com/projects/javascript-ajax/urgent-javascript-guru-needed-for/ | code | It is scraping information from a screen on facebook and sending ajax responses to facebook with new post data.
I need a guru who can show me where my code is failing.
I will provide the code to bidders before picking a winner who can tell me how to fix it.
8 freelance font une offre moyenne de $32 pour ce travail
I would love to help, check my profile to see the sites I've worked on. I write clean and fast code I can show you a snippet if you would like. Also, I stated 2 days it would probably be just a day. | s3://commoncrawl/crawl-data/CC-MAIN-2018-13/segments/1521257647782.95/warc/CC-MAIN-20180322073140-20180322093140-00252.warc.gz | CC-MAIN-2018-13 | 514 | 5 |
https://smartbear.com/blog/test-and-monitor/delivering-quality-software-using-visual-studio/ | code | You have probably run into quality issues when your Agile organization is siloed by function and team.
Often, this is compounded by two reasons:
- Not focusing enough on quality early in the development process
- Relying on a poorly integrated set of development and test tools that work outside of Visual Studio
The first challenge can be addressed by implementing critical processes at the right stage of the software development lifecycle.
Does your team have an established code review process? Do your development and QA teams collaborate to perform adequate unit, manual, and automated functional tests. Do you have traceability across these tests and can you ensure that you have optimal code coverage?
These are questions teams need to answer, whether you use Visual Studio or any of the other major IDEs.
Implementing these strategies also requires tools that easily fit in with your software development process.
This not only includes code review and profiling tools, which are primarily used by development teams, but also testing solutions that can be used by developers to write test scripts within their Visual Studio environment.
Doing all of this within Visual Studio will help you break down barriers across teams and help you deliver better quality software faster, better, and more efficiently.
Delivering Quality Software Using Visual Studio
In our upcoming webinar, Delivering Quality Software Using Visual Studio: Faster, Better, Cheaper, we’ll discuss strategies and tools that will help you implement an effective code review process, perform adequate unit, manual, and automated functional tests, and also ensure that you have optimal code coverage with Visual Studio.
- Strategies to ensure quality results from design, development, and test using Visual Studio.
- Tips for customizing Visual Studio to set up an effective development and test process.
- How to use key Visual Studio integrations to break down silos within teams.
- Successful practices implemented in the industry using Visual Studio.
- Ways to use Visual Studio to effectively manage projects throughout the life cycle.
The webinar is July 27th at 9:00 AM & 2:00 PM EDT
Reserve your spot. | s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593655894904.17/warc/CC-MAIN-20200707173839-20200707203839-00245.warc.gz | CC-MAIN-2020-29 | 2,186 | 19 |
http://www.classzone.com/books/earth_science/terc/content/investigations/es2206/es2206page07.cfm | code | Living phytoplankton are the main source
of chlorophyll in the ocean. The map below shows annual
average chlorophyll concentration in micrograms per
liter (µg/l) at the surface.
! Click the buttons to see chlorophyll
concentration for each season. Examine the maps and
the color code to interpret how chlorophyll levels changed
through the year. Focus on changes in the Gulf of Mexico. | s3://commoncrawl/crawl-data/CC-MAIN-2019-09/segments/1550247486480.6/warc/CC-MAIN-20190218114622-20190218140622-00065.warc.gz | CC-MAIN-2019-09 | 386 | 8 |
https://travis-ci.community/t/cant-create-a-new-travis-build/13544 | code | tha’s my repo, with the .travis.yaml file attached to it. For some reason, Triggering a build on my Travis Dashboard shows his.
However the travis build isn’t completed whatsoever, whenever I check my dashboard for builds no new builds were made.
There is also this weird error
“We are unable to start your build at this time. You exceeded the number of users allowed for your plan. Please review your plan details and follow the steps to resolution.”
Even though I selected the free plan, and I added my credit card.
I have also added the ENV variables to my Travis dashboard for DOCKER_PASSWORD and DOCKER_USERNAME
language: node_js node_js: - 13 services: - docker # Pre-testing installs install: - echo "nothing needs to be installed" # Scripts to be run such as tests before_script: - echo "no tests" script: - docker --version # print the version for logging - docker build -t simple-node . - docker tag simple-node amrnashaat98/simple-node:latest # Tasks to perform after the process is successful. Formatting the Docker username and password as below enables you to programmatically log in without having the password exposed in logs. after_success: - echo "$DOCKER_PASSWORD" | docker login -u "$DOCKER_USERNAME" --password-stdin - docker push amrnashaat98/simple-node:latest``` | s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296945333.53/warc/CC-MAIN-20230325130029-20230325160029-00684.warc.gz | CC-MAIN-2023-14 | 1,294 | 7 |
https://actualityfeed.com/do-you-get-cold-when-fasting-it-could-be-fat-burning-happening/ | code | Visit this site to Subscribe: http://Bit.ly/ThomasVid
Obtain MY groceries at MY price with Thrive Market: http://ThriveMarket.com/ThomasDeLauer
Get My Free Email Newsletter at My Site: http://ThomasDeLauer.com
Special Thanks to my team as well as Nicholas Norwitz – Oxford Ketone PhD Researcher and also Harvard Med Student – for functioning carefully on study!
Do You Get Cold When Fasting? Maybe Fat Burning Happening! – Thomas DeLauer
Do you get chilly while fasting? I understand, insane right … however it could mean you’re in the procedure of burning fat! Allow’s obtain right into it as well as I’ll catch you in the comments!
Take a look at several of my various other fasting-related videos below!
Exactly how to do Intermittent Fasting: Complete Guide: https://www.youtube.com/watch?v=LLVf3d0rqqY&t=286s
Alternative Day Fasting – The Basics:
Try These 3 Types of Intermittent Fasting: https://www.youtube.com/watch?v=PQIqh4_2otw&t=409s
48-Hour Fasting – 5 Benefits of the Perfect Length Fast: https://www.youtube.com/watch?v=gHO4ejwY4f4&t=2s
12-Hour Fasting is Awesome! The “Shorty” Fast: https://www.youtube.com/watch?v=rFQZhzvfVFU
Nicholas Norwitz – Oxford Ketone PhD Researcher as well as Harvard Med Student:
References & Resources:
https://www.cell.com/molecular-cell/pdfExtended/S1097-2765( 16 )30049-1. | s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323587854.13/warc/CC-MAIN-20211026072759-20211026102759-00067.warc.gz | CC-MAIN-2021-43 | 1,343 | 15 |
http://www.familytreecircles.com/u/Jess301102/contact/ | code | I am very much interested in researching our family, both historicallly, and socially. I like to see what jobs, lines of work etc have managed to cross the generations, and how they have differed along the way. I have come across several famous connections, as yet I have to verify some of these, especially the one to Tom Hanks!!!
I also enjoy a wide genre of music. | s3://commoncrawl/crawl-data/CC-MAIN-2018-26/segments/1529267860776.63/warc/CC-MAIN-20180618183714-20180618203714-00615.warc.gz | CC-MAIN-2018-26 | 367 | 2 |
https://help.openrounds.com/how-do-i-pay-for-a-round | code | OpenRounds takes payment directly to streamline the check-in process at the club.
Payment is taken by credit card directly through OpenRounds.com and required at least 24 hours prior to your tee time. Once your request has been accepted, you will receive an automated email that confirms your round and contains a payment link.
Payment can also be accessed by visiting the “My Rounds” tab, opening the respective request, and clicking “Pay for Round”.
Payment for the round must be made in advance, and will not be taken upon arrival at the club. | s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656104248623.69/warc/CC-MAIN-20220703164826-20220703194826-00384.warc.gz | CC-MAIN-2022-27 | 554 | 4 |
https://gis.stackexchange.com/questions/108161/sunlight-layer-into-cartodb/108249 | code | I have a list of tweets on a torque map made with CartoDB. I want to add an additional layer that shows the sunlight around the world at certain times, similar to the Twitter #sunrise map found here.
Does anyone know how to add a layer like this?
Geographic Information Systems Stack Exchange is a question and answer site for cartographers, geographers and GIS professionals. It only takes a minute to sign up.Sign up to join this community | s3://commoncrawl/crawl-data/CC-MAIN-2021-39/segments/1631780057225.57/warc/CC-MAIN-20210921161350-20210921191350-00026.warc.gz | CC-MAIN-2021-39 | 441 | 3 |
http://www.techrepublic.com/resource-library/whitepapers/lost-a-protocol-for-mapping-geographic-locations-to-public-safety-answering-points/?scname=ip-technologies | code | LoST: A Protocol for Mapping Geographic Locations to Public Safety Answering Points
Public Safety Answering Points (PSAPs) serve limited geographic areas, so emergency callers must be directed to the most appropriate PSAP. As part of the overall Internet Engineering Task Force (IETF) emergency services architecture, the authors have developed a new protocol, LoST (Location-to-Service Translation), that allows end systems and VoIP proxies to map location data into URLs representing either PSAPs or other SIP proxies that perform a more fine-grained mapping. LoST is designed to operate globally, with a highly-distributed authority. They describe the protocol and its design rationale. | s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988721027.15/warc/CC-MAIN-20161020183841-00467-ip-10-171-6-4.ec2.internal.warc.gz | CC-MAIN-2016-44 | 689 | 2 |
https://f5debug.net/sql-server-integration-services-ssis-part-23-send-file-using-ftp-task-in-ssis-package/ | code | This is part 23 of the series of article on SSIS. In this article, we are going to see how to send file to FTP using SSIS.
In this article we are going to see on how to use a FTP task in SSIS package to Send a file.
You can look into my series of article on SSIS at the url – https://f5debug.net/tutorial/ssis.php[more]
In this article we are going to see on how to use a FTP task container in packaging. FTP task is mainly used to do a file transfer using FTP. SSIS provides the inbuilt task container to do a FTP of a file. Let’s jump start to see the on how to use the task in real time. Here I’m going to show a small example on how to configure a FTP task and Send a file to the remote host.
Follow steps 1 to 3 on my first article to open the BIDS project and select the right project to work on integration services project. Once the project is created, we will see on how to use FTP task container. Drag and drop the FTP task as shown in the below screen.
Now double click on the task to open the property window and set the properties as shown in the below screen.
The above image is for setting the FTP Connection, end user need to provide the correct connection settings and click on the Test Connection to confirm if the connection is valid.
Now in the file transfer tab we need to set the property since in our example we are going to send the file to FTP we need to set as below. Here input variable is used to get the path where we need to get the file.
Here the operation section we need to select Send Files in order to send files to a destination FTP. And in the Remote parameters section we need to specify the FTP site location using a variable and in the local parameter section we need to select the local file location to send file to the remote location.
Here once you have given valid credentials by running directly the package will do the necessary steps of sending the files from FTP to the local folder.
So in this article we have seen on how to use the FTP task to send a file from a local to a remote site. | s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296818081.81/warc/CC-MAIN-20240422051258-20240422081258-00842.warc.gz | CC-MAIN-2024-18 | 2,043 | 11 |
https://ketodietsmeal.com/kiss-my-keto-cookie-mix-review-a-daddy-daughter-baking-experience/ | code | In this video, Courtney and I make and taste test the snickerdoodle and shortbread cookies from Kiss My Keto. We show almost the entire process of making these cookies, so that you get a realistic idea of what goes into their preparation.
Products in this video:
Kiss My Keto cookie mix: https://amzn.to/3C0LFMv
Pogo whisk: https://amzn.to/3hTdr6T
#50 dasher: https://amzn.to/3Ggzo9d
Powdered BochaSweet: https://amzn.to/3GiYzba
Keto sprinkles (another brand): https://amzn.to/3WK8ts6
0:21 Making the cookies
4:04 Nutritional info & ingredients
5:35 Spontaneous frosting recipe
7:49 Taste tests
🏪 Serious Keto Amazon Store (where you can find the tools and ingredients I use): https://www.amazon.com/shop/seriousketo
👨🍳 You can contribute to SeriousKeto’s recipe test lab and enjoy some “behind-the-scenes” perks by becoming a channel member: https://www.youtube.com/channel/UCecoI0NlmzY8H8NlP6v3YRg/join
🎁 Get SeriousKeto merchandise: https://teespring.com/stores/seriousketo-merch
📷 Follow SeriousKeto on Instagram: https://www.instagram.com/seriousketo/
💬 Follow SeriousKeto on Facebook: https://www.facebook.com/seriousketocooking/
SeriousKeto is a participant in the Amazon Services LLC Associates Program, an affiliate advertising program designed to provide a means for sites to earn advertising fees by advertising and linking to Amazon.
Alcohol: Why Can’t I Lose Weight When I Drink Alcohol?
Put simply: If you are trying to slim down, do not consume alcohol. It changes your cognition. This creates you to blow up of your consuming. If you must drink, consume alcohol in small amounts: one beverage for females and also 2 beverages for males. Try the lower-calorie options when delighting in a beverage as well as do so in excellent business and also with a marked motorist if away from residence.5 Tips To Help You Lose Without Counting Calories
If you assume that calories are calories – and also it does not matter whether they come from cookies or carrots – then it’s time to reassess what you’re thinking of calories. As opposed to what you might have listened to, all calories are NOT produced equal.5 Best Foods to Reduce Belly Fat
Are you excited to shed that stubborn belly fat finally? Consuming healthy, getting daily exercise and managing stress are all important components for minimizing stubborn belly fat as well as achieving better health, however did you understand that you can consume certain foods to aid you reduce stubborn belly fat also quicker? Below are 5 of the very best foods that will aid you eliminate belly fat completely and improve your total wellness.Weights in Your Wallet?
Research study numerous options prior to you devote to a diet regimen strategy. It may save you a great deal of money in the long run. This is exactly how I had the ability to lose my weight safe as well as budget-friendly.Top 10 Weight Loss Exercises
Placing the top 10 weight reduction workouts to use on a routine basis can assist people in burning calories faster, and also more effectively. Below are the most popular exercises people are making use of to drop extra pounds this year. | s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100308.37/warc/CC-MAIN-20231201215122-20231202005122-00596.warc.gz | CC-MAIN-2023-50 | 3,143 | 23 |
http://forum.locusmap.eu/index.php?topic=5565.0 | code | I get that the activity selection was removed from the recording profiles - it didn't have any use, it seems. But now you can't change the profile icon anymore (or I don't see how). Furthermore, when creating a new profile, you still have to select an activity, which now is a bit confusing, as later on the activity isn't mentioned anymore. It's only use now is to choose the icon - but only from the ones defined for activities.
Wouldn't it be better to just add "Choose Icon" to the profile edit dialog, and then offer all icons (just like when choosing the icon for a track folder)? | s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917121528.59/warc/CC-MAIN-20170423031201-00410-ip-10-145-167-34.ec2.internal.warc.gz | CC-MAIN-2017-17 | 586 | 2 |
https://help.secureclouddb.com/guide/setup/activity_monitoring.html | code | Setting Up Database Activity Monitoring (DAM)
Setting up DAM requires having an asset discovery previously configured and discovered atleast a single database. If you have not yet done so, please create an AWS Authentication method and then an asset discovery and run your first scan.
To get started with setting up your first SecureCloudDB DAM configuration, navigate into the
Activity Monitoringpage under
Setup. On this page, select one of the two options to create a new configuration.
Decide a name for your activity monitoring configuration, or accept the randomly generated one:
On step #2, you can pick which databases you want to monitor. This can be done by selecting each individual database using the
Select Databasesdropdown menu. Alternatively, you can select the databases by Tags. Using tags, you can make your selection based on the provider, service, and any custom Tags.
In this step, you can decide what data is monitored by SecureCloudDB. Your options are to include key names, key values, items before they were modified (aka "old images"), and items after they were modified (aka "new images").
Similar to asset discovery, when setting up activity monitoring you have multiple ways to configure authentication. Select the authentication method that applies for your DAM configuration. See the AWS Authentication section for more information.
Review all your choices and select
Createto finish creating the configuration if everything looks good.
Should everything be configured correctly, your activity monitoring dashboard will begin to show data shortly in real time.
Now that your environment is has both foundational and operational security, you can setup extended access if desired and you haven't yet. Check out the database access section for more information. | s3://commoncrawl/crawl-data/CC-MAIN-2021-39/segments/1631780055808.78/warc/CC-MAIN-20210917212307-20210918002307-00691.warc.gz | CC-MAIN-2021-39 | 1,791 | 14 |
https://discuss.codecademy.com/t/python-configparse-write-error/350122 | code | I’m creating a function hook using Python. But I’m having problems with an INI Write error.
This error occurs when my Python script is trying to write the INI that is currently being read by another program.
I’ve tried setting admin privilege for the script, but to no avail. There are never any errors when no other program accesses the INI while the Pyhon script writes to it.
It just doesn’t make sense, that other programs can’t read the file- as Python is writing to it. I’m sure there is a workaround- but I tried all I could with no success.
Any help would be much appreciated, thanks! | s3://commoncrawl/crawl-data/CC-MAIN-2018-34/segments/1534221215404.70/warc/CC-MAIN-20180819224020-20180820004020-00356.warc.gz | CC-MAIN-2018-34 | 604 | 5 |
http://www.mbsd.cs.ru.nl/publications/papers/fvaan/odse/ | code | Twan Basten, Emiel van Benthum, Marc Geilen, Martijn Hendriks, Fred Houben, Georgeta Igna, Frans Reckers, Sebastian de Smet, Lou Somers, Egbert Teeselink, Nikola Trcka, Frits Vaandrager, Jacques Verriet, Marc Voorhoeve, and Yang Yang. Model-Driven Design-Space Exploration for Embedded Systems: The Octopus Toolset. In T. Margaria and B. Steffen, editors. Proceedings 4th International Symposium On Leveraging Applications of Formal Methods, Verification and Validation (ISoLA 2010), 18-20 October 2010 - Amirandes, Heraclion, Crete. LNCS 6415, pp. 90-105, Springer-Verlag, 2010.
AbstractThe complexity of today's embedded systems and their development trajectories requires a systematic, model-driven design approach, supported by tooling wherever possible. Only then, development trajectories become manageable, with high-quality, cost-effective results.
This paper introduces the Octopus Design-Space Exploration (DSE) toolset that aims to leverage existing modeling, analysis, and DSE tools to support model-driven DSE for embedded systems. The current toolset integrates Uppaal and CPN Tools, and is centered around the DSE Intermediate Representation (DSEIR) that is specifically designed to support DSE. The toolset architecture allows: (i) easy reuse of models between different tools, while providing model consistency, and the combined use of these tools in DSE; (ii) domain-specific abstractions to support different application domains and easy reuse of tools across domains.
Paper and Modelspaper (pdf) | s3://commoncrawl/crawl-data/CC-MAIN-2018-34/segments/1534221219197.89/warc/CC-MAIN-20180821230258-20180822010258-00531.warc.gz | CC-MAIN-2018-34 | 1,515 | 4 |
https://github.com/tegud/SENTINEL.Composer.Store | code | Join GitHub today
GitHub is home to over 40 million developers working together to host and review code, manage projects, and build software together.Sign up
Sentinel Composer component for storing log entries until they are marked as complete
Fetching latest commit…
Cannot retrieve the latest commit at this time.
|Type||Name||Latest commit message||Commit time|
|Failed to load latest commit information.| | s3://commoncrawl/crawl-data/CC-MAIN-2020-10/segments/1581875142323.84/warc/CC-MAIN-20200217115308-20200217145308-00122.warc.gz | CC-MAIN-2020-10 | 410 | 7 |
https://github.com/hashicorp/terraform-cdk | code | CDK for Terraform
Cloud Development Kit for Terraform (CDKTF) allows you to use familiar programming languages to define cloud infrastructure and provision it through HashiCorp Terraform. This gives you access to the entire Terraform ecosystem without learning HashiCorp Configuration Language (HCL) and lets you leverage the power of your existing toolchain for testing, dependency management, etc.
We currently support TypeScript, Python, Java, C#, and Go (experimental).
CDKTF includes two packages:
- cdktf-cli - A CLI that allows users to run commands to initialize, import, and synthesize CDK for Terraform applications.
- cdktf - A library for defining Terraform resources using programming constructs.
Note: CDK for Terraform is under active development, and we are still iterating on key workflows and best practices. Learn more about maturity and production readiness below.
Choose a language:
Hands-on: Try the tutorials in the CDK for Terraform collection on HashiCorp Learn.
Refer to the CDKTF documentation for more detail about how to build and manage CDKTF applications, including:
Application Architecture: Learn the tools and processes that CDKTF uses to leverage the Terraform ecosystem and convert code into Terraform configuration files. It also explains the major components of a CDKTF application and how those pieces fit together.
Project Setup: Learn how to create a new CDKTF project from a pre-built or custom template. Also learn how to convert an existing HCL project into a CDKTF application.
Unit Tests: Learn how to test your application in Typescript with jest.
Examples: Reference example projects in every supported language and review explanatory videos and other resources.
Project Maturity and Production Readiness
CDK for Terraform is under active development; we’re still working out key workflows and best practices. We’re iterating fast and are likely to introduce breaking changes to existing APIs to improve the overall user experience of the product.
This tool can be used with Terraform Cloud and Terraform Enterprise, but is not eligible for commercial support, and is not officially recommended for production use cases. Like other HashiCorp pre-1.0 tools, some early-adopter users are already using CDK for Terraform in production, and we are working with those users to validate and improve workflows.
Early adopters of CDK for Terraform should expect to encounter and work around bugs occasionally, may need to refactor their codebase with each major release, and will intermittently need to use HCL and understand how JSON Terraform configurations are generated, for example to use overrides to use Terraform functionality that cannot currently be expressed using CDK for Terraform. Our goal is to provide a user experience where this is an exceptional edge case. If you’re comfortable with this level of troubleshooting, we’re very interested in your feedback and practical experience.
These caveats apply to CDK for Terraform itself, which generates Terraform configurations. Generated Terraform configurations are applied using Terraform Core, a well established / mature tool to provision infrastructure.
The development team would love your feedback to help guide the project.
- Contribute using the CONTRIBUTING.md guide.
- Ask a question on the HashiCorp Discuss using the terraform-cdk category.
- Report a bug or request a new feature.
- Browse all open issues.
Clone the project repository.
git clone https://github.com/hashicorp/terraform-cdk.git
cd terraform-cdk/ yarn install
Build the project and packages. | s3://commoncrawl/crawl-data/CC-MAIN-2021-49/segments/1637964362879.45/warc/CC-MAIN-20211203121459-20211203151459-00286.warc.gz | CC-MAIN-2021-49 | 3,580 | 28 |
https://www.mail-archive.com/[email protected]/msg19313.html | code | Jonathan Lang wrote:
When you take the square root of a number, you actually get one of two
possible answers (for instance, sqrt(1) actually gives either a 1 or a
sqrt() is a function that maps its input domain into its output range.
As such multiple return values are at least not part of the standard
mathematical definition. But in Perl6 a junction is a single value :)
What you mean is to solve the equation x**2 == 1 which indeed has got
the two Int solutions -1 and 1 or the two Complex ones (1,0) and (-1,0).
IIRC, this is exactly what lazy lists are for.
Essentially lazy lists are suspended closures. But I dought that arithmetic
between them is defined such that pi + pi would leazily calculate 6.28...
So what happens when you apply a junction to a lazy list? Do you get a
I think so, by the law of laziness preservation ;)
TSa (Thomas Sandla▀) | s3://commoncrawl/crawl-data/CC-MAIN-2018-34/segments/1534221208750.9/warc/CC-MAIN-20180814081835-20180814101835-00396.warc.gz | CC-MAIN-2018-34 | 857 | 14 |
https://ops4j1.jira.com/browse/PAXDRONE-26 | code | Adding debugging support is straightforward if accept the fact that we have to enable/disbale that via api.
This means, that you have to say "setDebugging(true)" in your configure() part if you want to enable debugging.
This will lead paxdrone to add a startup option to paxrunner like this: "--vmOptions="-Xdebug -Xrunjdwp:transport=dt_socket,server=y,suspend=n,address=5005"
(port could be setable as well)
Biggest concern is that this option should never run in an ci build because it will block the framework (nobody will join the session) and let the test fail (timeout).
Complete rewrite of Pax Drone (Pax Exam) | s3://commoncrawl/crawl-data/CC-MAIN-2020-45/segments/1603107876307.21/warc/CC-MAIN-20201021093214-20201021123214-00644.warc.gz | CC-MAIN-2020-45 | 617 | 6 |
https://ngetchell.com/pspushover/ | code | Expiring Group Membership
As a systems administrator working with Active Directory your probably proficient in granting access to
I just recently published a module to the PowerShell Gallery called PSPushover and it couldn’t have been easier.
Pushover.net is an alerting service I use to notify me of different events through IFTTT and I wanted a way to send off alerts from my PowerShell scripts. Some of my scripts are long running and I’d like to know whether it finished in error or not.
I plan on providing better help and better documentation in the README.md but otherwise I’m really proud of my work.
To install simply run and you’ll have it installed.
Find-Module -Name PSPushover | Install-Module -Force
Check out the PSPushover repository on GitHub. Contributions are welcome. | s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296949035.66/warc/CC-MAIN-20230329213541-20230330003541-00010.warc.gz | CC-MAIN-2023-14 | 795 | 8 |
http://groups.google.com/group/google-chrome-frame/browse_thread/thread/c0fc3f1e11535e90/113013e738499c7a | code | I have a web application that relies heavily on the host page (static -
never changes) talking to a popup window. The popup window pages change as
the user navigates around the website.
The host page is IE and has an embedded ActiveX. The ActiveX fires events
and the host page reacts to these events. In turn, the host page makes
changes to the popup page via the reference to that page created by
window.open in the host page.
Users navigate around the website in the popup window. The popup pages are
rendered in IE (some have other embedded ActiveX) with the exception of a
single page which is rendered in GCF.
The problem is that the communications between the host and the popup are
broken due to the way that GCF is implemented.
Is there a way to set up a communications path between the windows that's
reliable and the same for both the IE pages and the GCF page that are in
I have looked at the method of having the GCF ActiveX in the host page and
opening the popup page but that seems to render the popup in GCF despite
the tag "<meta http-equiv="X-UA-Compatible" content="chrome=1">" NOT being
included; the popup IS, however, wrapped in an IE window. This does not
seem to be a satisfactory solution.
I have looked at rendering the whole site in GCF but I have too many
ActiveX pages and I cannot load them in the GCF page. I do need to wrap the
site in IE since it's a standalone application on a single computer. This
is required in order to open the pages in kiosk mode (full screen with no
If anyone understands the above scenario and can offer some advice or
assistance then it would be greatly appreciated. | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368706934574/warc/CC-MAIN-20130516122214-00054-ip-10-60-113-184.ec2.internal.warc.gz | CC-MAIN-2013-20 | 1,626 | 25 |
http://dead-dog-bounce.blogspot.com/2010/11/what-is-progression-of-political.html | code | There is a progression of political mistakes or errors or whatever. I'm not sure exactly how it goes, but it's a bit like this:
Q1. Can anyone fill in the dots?
Q2. Where does driving the banks offshore come in that sequence? (Via Mark Wadsworth.) | s3://commoncrawl/crawl-data/CC-MAIN-2018-26/segments/1529267867364.94/warc/CC-MAIN-20180625014226-20180625034226-00366.warc.gz | CC-MAIN-2018-26 | 247 | 3 |
https://ipfabric.atlassian.net/wiki/spaces/ND/pages/90439685/Command+Line+Interface | code | Command Line Interface
The command-line interface is a secondary service interface in IP Fabric VM which serves troubleshooting and testing purposes. For example, for testing authentication credentials from the specific IP address of IP Fabric VM, in case of address-restricted access. The CLI interface is the main tool in servicing the system by the support teams.
A first boot wizard can be used to change system settings, such as IP addressing parameters, domain names, NTP, system proxy settings, or a user's password. To launch First Boot Wizard again, connect via SSH to IP Fabric as osadmin user, launch ipfabric-net-wizard and then reboot the system.
Command-line also allows the use of the standard networking tools, such as telnet, ssh, traceroute or ping.
Troubleshooting VM network problems using IP Fabric CLI
In the event of a VM network connection problem, DNS issues, network devices connectivity issue, IP Fabric CLI is a useful helper.
CLI can be also used to access system and application logs as well as snapshot files.
System and application logs
System and application logs are placed in /var/log folder. Specifically IP Fabric application logs can be found in /var/log/nimpee.
Snapshots are available in osadmin home directory /home/osadmin/snapshots. Each folder inside represents one snapshot. Even if snapshots can be copied manually using SCP or SFTP it's strongly recommended to use the export feature in web UI.
Checking the network interface settings
When you log in through a VM console or SSH, network settings are displayed.
This content is static, generated when VM boots! When DHCP is used, an IP address can change in some cases.
To display actual IP address use command:
Default gateway and other routes (if configured) can be check as follows:
DNS can be checked using the dig or nslookup command.
For example, let's check A record and PTR (reverse) record of some device using dig.
For A record check ANSWER which contains requested IP address. Also SERVER section below is important as it tell us what DNS server answered our DNS query.
For PTR record check ANSWER which contains requested domain name.
If you prefer nslookup you can achieve the same results.
Testing connectivity to a network device
The very basic test is ping or traceroute.
Please bear in mind that ICMP packets used by ping and traceroute can be blocked by ACL or firewall. It does not mean that a device cannot be reached using SSH or telnet.
To make sure that the network device is available from IP Fabric VM, you can use the telnet and ssh client from the command line.
For SSH use:
For telnet use:
Reboot and shutdown
IP Fabric VM can be also rebooted or shutdown using CLI.
For VM reboot just use reboot command without any parameters.
For VM shutdown use shutdown command without any parameters. | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573908.30/warc/CC-MAIN-20220820043108-20220820073108-00132.warc.gz | CC-MAIN-2022-33 | 2,814 | 30 |
https://forums.lutris.net/t/is-there-a-decent-guide-out-there-for-writing-lutris-installer-scripts/10025 | code | I have come across a few games without Native Linux support that don’t yet have scripts. I really love Lutris and I’d like to contribute to the community, but I’m not quite sure how to get started.
I saw the bit on Lutris’ site about writing and forking scripts, but it doesn’t go into detail about formatting, what the different commands do, etc. I could fumble through editing some existing ones to work on new games, but I feel like I would be missing potentially imoirtant details.
I’d just like to know what’s possible. | s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224649177.24/warc/CC-MAIN-20230603064842-20230603094842-00004.warc.gz | CC-MAIN-2023-23 | 538 | 3 |
http://www.anddev.org/sdk-adt-emulator-problems-f16/build-target-t49922.html | code | You should probably try to target the earliest android version that you can- but its not actually worth going back beyond a certain point.
Visit http://developer.android.com/resources/ ... sions.html
to see what the ecosystem of versions is like based on devices that accessed the market. They update this fairly reguarly. You should be fine if you set the target to 2.1 or higher now. Don't assume everyone has the latest version (2.3), since some people can't upgrade for various reasons, and it takes time for vendors to push their specific builds out to their users.
Also, don't set a max sdk version unless absolutely necessary. | s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917125849.25/warc/CC-MAIN-20170423031205-00572-ip-10-145-167-34.ec2.internal.warc.gz | CC-MAIN-2017-17 | 633 | 4 |
https://www.roseindia.net/java/example/java/swing/ConvertImageToFormats.shtml | code | In this example we are converting image of any format into jpg format.In this example we are converting image of any format into jpg format.
In this example we are converting image of any format into jpg format.
Import java.io.* package and class javax.imageio.ImageIO and java.awt.BufferedImage. The package java.io.* is used for input and output operations through data streams, serialization and the file system. Classes ImageReader and ImagrWriter inherit the static methods from the class javax.imageio..ImageIO for reading and writing the images respectively. The class java.awt.BufferedImage extends Image class and implements WritableRenderedImage interface. The class BufferedImage is used to access an image.
The methods used in this example are:
write(RenderedImage im, String formatName, File output): This method is used to write an image. This method takes three parameters first one is Renderedimage, second is format in which the image is to be converted and last is name of the file on which the image is to be writen. The format name may be gif, jpg, png etc.
read(File input) : This is used to read an image.
This example reads the image name passed at the command prompt for
converting the image into the jpg format. In this example we are reading the image from system by
using read() method of ImageIO class. We
are using write() method for conversion of an image of any
format into the jpg format.
Here is the code of the program :
Input on DOS Prompts :
C:\image>java GIFToJPG Enter image name
rajeshxml2.gif Enter the output image name(.jpg):
raju.jpg Your image has been converted successfully
Output of The Example:raju.jpg | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573104.24/warc/CC-MAIN-20220817183340-20220817213340-00318.warc.gz | CC-MAIN-2022-33 | 1,650 | 17 |
http://www.joshuakamp.nl/ | code | Welcome to my website. I am Joshua Kamp. I am 17 years old and I live in the Netherlands. I am now on my high school in the Netherlands. After finishing my high school in the Netherlands I want to go to the IVA Business school. In my spare time I develop apps for IOS, Android and Windows phone's and tablets. For more information about my apps click the Apps button in the menu. Besides developing apps I also develop websites. If you click on the menu button for websites you can find different examples off my websites. My interests for computers started when I was young. I was always experimenting all kinds of things with computers. A few years ago I began working with OS X. It's by far the best operating system I have used making apps and websites. I hope you enjoy my website and you can get a good view of my abilities. I hope to hear from you soon!
Because of my interests for computers I began developing apps. I develop apps for IOS, Android and Windows phone's and tablets. If you would like to have a app you can contact me and then we will follow three steps: First we will have a conversation about the subject of the app and the futures that the app will provide. When I have the information that I need I will start developing some examples to give you an idea about the possibilities with different styles of the app. I will give you a Live presentation to show everything so you can make sure that you choose the right style for you. Of course we can also provide examples by email. After you checked the app and everything is as you would like it to be we can publish the app to the IOS appstore Google Play store and the Windows store
Why a App?
I often get the question "Why should I get a app if I have a good mobile website". My answer is always that there are genuinely some benefits with apps. A few examples are that apps will provide a more user friendly interface, it will also be better integrated with your mobile phone and it also looks more professional. In the meantime people will find your company more easily in a appstore like the IOS appstore, Google play store or the Windows store.
Besides developing apps I also develop websites. I create all kinds of websites like personal websites but also websites for company's. The design of a website will be created with the design that will fit the customer. When all content is placed in the website and all things are as you would like them to be we can place it Online! When you publish your website you can choose between different URL's like .com or .nl (the country URL of the Netherlands). Almost all kinds of URL's are possible.
To view one of my websites click on the touch icon
I hope you enjoyed your visit to my website.
Thanks for visiting!
I hope to see you soon at joshuakamp.nl
If you have any questions...
if you have any questions left you can send a email to [email protected]
I will try to answer your question as soon as possible!
+31 6 40 96 85 38
All Rights Reserved Joshua Kamp
Designed by Joshua Kamp | s3://commoncrawl/crawl-data/CC-MAIN-2018-43/segments/1539583511703.70/warc/CC-MAIN-20181018042951-20181018064451-00522.warc.gz | CC-MAIN-2018-43 | 3,012 | 15 |
https://secure.ssa.gov/apps10/poms.nsf/lnx/0428090040 | code | When you base equivalency on a combination of impairments, cite the listed impairment
number most closely related to the most severe impairment. In these situations, provide
a medical explanation to show how the interaction of the combined impairments equates
with the intended severity of a listed impairment(s).
For more information on medical equivalence, see DI 24505.015B. For a rationale example, see DI 28090.300B. | s3://commoncrawl/crawl-data/CC-MAIN-2019-26/segments/1560627999003.64/warc/CC-MAIN-20190619163847-20190619185847-00534.warc.gz | CC-MAIN-2019-26 | 421 | 5 |
http://wids.udd.cl/2018/ | code | We are excited to bring to Chile, for the second time, the Stanford's "Women in Data Science" conference.
The Stanford Women in Data Science (WiDS) is a global leadership and innovation conference hosted at Stanford University and 75+ additional locations worldwide. This conference is an opportunity to hear about the latest data science related research in multiple domains and learn how leading-edge companies are using data science for success. Learn more about the Stanford event here.
The Chilean conference will invite data science, IT and STEM students, startups, researchers and professionals to talk with our invited speakers, see some highlights of the Stanford's event, discuss about Data Science in Chile, networking, and celebrate the International Women's Day! The event in Chile co-hosted by the Data Science Institute (Engineering UDD) and Girls in Tech, and sponsored by U-Planner and Telefonica R&D.
This one-day technical conference is an opportunity to hear about the latest data science related research in multiple domains, learn how leading-edge companies are using data science for success, and connect with potential mentors, collaborators, and others in the field. | s3://commoncrawl/crawl-data/CC-MAIN-2017-39/segments/1505818690340.48/warc/CC-MAIN-20170925055211-20170925075211-00121.warc.gz | CC-MAIN-2017-39 | 1,191 | 4 |
https://cluster.earlham.edu/wiki/index.php?title=CS382:Unit-descriptions&oldid=7227 | code | From Earlham Cluster Department
Reorganized Unit Descriptions
- Foundational Material (Charlie)
- Protein Folding (Charlie)
- Computational Sociology (Nate)
- Environmental/Climate Modeling (Nate)
- Probabilistic rhythmic model (Bryan)
- Fermiproblems (Samuel)
- Phylogenetic Trees (Samuel)
- Hurricane Modeling (Ian)
- Possibility: combined labs? (Ian)
- Lightning Modeling(Mikio)
- Engineering Modeling(Dylan)
- Aerodynamics-Airplane/flight modeling (Vlado)
- Traffic Flow (Fitz)
- Your unit goes here (following the above naming convention)
- Archived Ideas (All)
Environmental / ecosystem monitoring. temperature levels / air quality. modelling specific regions vs global modelling
- Talk about pollution, global warming
- Inspired from Second Life, largescale weather-based model - has this been finished??
- Relevant and applicable
- Can do something that can't see easily in the real world because too big and too slow
- Could do something with displaying raw data from Netlogo and then work with graphing, stats, or something similar
- Could compare this to a big experiment by one of the national labs or similar - see if your results follow the same trend as the national lab's
- Kind of vague, needs more details
- Difficult to see this change in real world, difficult to validate
- Existing Netlogo model similar to this (climate change model)
- Nice to find someone else's large scale model and then replicate
Socioeconomic modelling. what happens with changes in legislation eg taxes, min wage. model of population behavior. (agent)
- Computational Sociology (wikipedia)
- brian castellani sociology and complexity web
- Center for Models of Life - CMOL: Models / Interactive Java Applets
- Token non-natural science unit, get non-natural sciences students involved
- Touch an emerging field, we can tell people there's a lot to be discovered yet here
- Talk about agent-based modeling
- Less numerically-based
- We need to be careful about not stepping on social science's toes
- Need to decide on a particular area to go forward with
- Economics is currently very mathematically-based, could do something along these lines
- Could also do something on a smaller scale in class, see a hands on social interaction or how played out
Chemical modeling - Using resources to model molecules and looking at the kind of molecule a certain combination of atoms make. Goes into using this kind of modeling to make new drugs. Would include a lecture that harks back to an (most likely) earlier lecture about how modeling is the third leg and then go into how drug companies have saved billions of dollars by being able to get through the early phases of drug development with just models. Would have a lab to come up with a feasible possibility for a new type of drug, and what it would/could possibly treat. Need to look into the availability of a computational chem server, as it might not be for use for beyond high school.
- Molecular modelling (wikipedia) This has a whole host of potential softwares to use for this.
- Ghemical homepage This is a software listed on the wiki linked above that I have heard of and have any kind of familiarity with. Though there are certainly many others and it would be a good idea to look at all or most of them in a fair amount of depth before making any decisions as to what software to use.
- Maybe able to get the lab or software from Shodor
- Accessible and immediate feedback, understand why would want to do this in the real life
- Hits chemistry (discipline we want to include)
- Potentially too complex
- No "numbers", more abstract
- Not immediately comparable to a real world thing, hard to have a real world lab
- Walk through making a drug that already exists.
- Find similarities in a drug family
Possibly a more structured/simpler version of the parachute lab done in CS290. Obviously having them perform the parachute drops and such would not be feasible but we could have them start out with the videos and some figures and they would do the netlogo aspect of the lab for themselves. (Different sized parachutes attached to different weights - dropped them and measured them, and then tried to model it and decide how fast different weights should drop with different parachutes.)
- Simple enough that they can create their own model, not just look at other people's models
- Important that we have at least one unit where they create their own model
- Lots of math and physics
- Could create own model in Netlogo (or at least adjust a toy model already created)
- Physical drops took a very long time to do.
- Would need to be able to some programming on a very basic level if they're going to create their own.
- Part of Charlie's "prove gravity" lab?
- Maybe we shouldn't have them create their own model but rather adjust sliders, etc. or at least have most of a toy model made
Modeling a woodwind instrument - Could demonstrate how changing the hole positions would affect pitch/timbre. The paper below outlines a technique for modeling the tonehole attempting to account for the half-covered state present in real world performance. Might need some introduction to the physics of music, general properties of waves.
- Already has some sort of model software to download and look into
- Possible wet lab - making noise with a pringles can or half-filled bottle
- Applicable, something that students would be interested in
- May possibly be difficult to teach?? general principles of physics, properties of waves (how does it generate sound?)
- No wet lab?
- Model of airflow in a tube, how the pitch changes when the hole is more or less covered, or located in a different area
- Need to check CSERD/Shodor - May already have some sort of modeling software for this already
- Needs to be something simple - blowing over tube with different levels of liquid in it
- Can we investigate size vs. shape of the capacity and see how this changes it?
Modeling airflow in a wind tunnel - The class could look at the complexity of modeling airflow around a simulated object. How detailed and complex can a virtual object become before modeling airflow around it becomes computationally infeasible? This unit might be able to use some of the physics background introduced in the Woodwind modeling unit described earlier. The fluid dynamics aspect might add a significant learning curve, however.
- Good example of something very difficult, expensive, timely to do in real life, much easier to do in a simulation
- Very complicated
- Only feasible if there's something we could do simple
- Possibly tie into the paper airplane idea
Fermiproblems - Use fermiproblems to encourage students to be comfortable making estimates and discovering ways to estimate with only limited data available. Examples are available here: http://iws.ccccd.edu/mbrooks/demos/fermi_questions.htm
- A list of Problems is available here: http://www.physics.umd.edu/perg/fermi/fermi.htm
- Emphasis could be put upon using available sources to find figures as well as how to make estimates where figures are not available
- Problems could be picked which are relevant to the models which the students will later be constructing as a class.
- Students should be taught how to show their reasoning behind extrapolations and to become comfortable with doing so.
- The instructors should have worked through examples showing a complete model and demonstrating which information is necessary for a ballpark estimation and which is not.
- What makes a good model vs. what makes just a model
- Is this included in all of the other units, or also use this and then use these skills in lots of other places
- Include talking about orders of magnitude, scale, significant figures, accuracy vs. precision, pattern recognition
Assembling a phylogenetic tree - Look at models available from the bioinformatics toolbench and experiment with different ways comparing protein similarity. This could be tied into a lecture on protein folding as protein homology like indicative of phylogeny.
Aerodynamics of an object:in try of reducing air drag with simulating different versions and simulations of a virtual object in air tunnel; improving it's aerodynamics - in purpose of enabling faster traveling but again trying to keep it safe. Air tunnel simulation basically - how would an object react depending on the material used and its shape/structure? How much does air affect its possible movement? And the direction of the 'blowing' and the movement of the object affects the simulation result. The idea started watching F1 'cars' - which try to use lighter materials so the weight doesn't affect speed, but also to improve very crucial factor - the aerodynamics of the vehicle. Must point out that this model would be based on the physics principles-so its that is the science side of it.
- http://en.wikipedia.org/wiki/Aerodynamics - Wikipedia tells it all about the aerodynamics, one should know. Some ideas about modeling could be obtained.
- http://en.wikipedia.org/wiki/Wind_tunnel - At the lower part of the site - it talks about visualizing the results and the whole simulation of the wind tunnel. Interesting.
- http://www.archiseek.com/content/showthread.php?t=5481 - This link provides multiple links (e.g. http://www.ansys.com/products/cfx.asp Ansys - fluid dynamics) of the software which might be used for modeling such situations described.
- I found another link - which contains some free and simple simulators of some stuff related to airplane modeling - its from NASA and it contains some guides also.
- I have downloaded 3 software's out of the all offered - they're the simulators of different flying situations; from the engine throttle to the air flow around the wing. Might be helpful. Those are:
**EngineSim **EngineSimr **FoilSim
When the files are downloaded; after unpacking them, they contain Java based simulations, which we open in our browser.
** "Make your own Wind Tunnel" I went through interesting links - depending on what we want to achieve this might help. http://sln.fi.edu/flights/first/makesimple/index.html
- Interesting and hits physics, area we want to include
- Computational fluid dynamics
- Very clearly modeling - trying to see how something will behave on a track or something
- Might be difficult to simulate a wind tunnel
- Potentially model paper airplanes
- Can build anything they want, very hands on engineering
- Potentially build car models (little cars)
- Real life application: Pringles chips
- Lightning - Simulating a thunderstorm, including atmosphere, charged cloud, building on earth and etc. Estimating which area will get damages.
- Fermentation food - Set up food and bacteria (e.g. milk and lactobacillus) and simulate how they get fermented and rotten.
- Hurricane tracking-- like the data that was shown to CS128, we can have them simulate the paths of hurricanes, severity, etc.
- Tsunami simluation-- similar to the above, except... with tsunamis. [edit: upon further investigation, tsunamis seem less model-able and are more a matter of using sensors and communication systems to detect them and broadcast warnings]
- If we're trying to generate interest, I think it would be good to initially give them huge models of catastrophic events that, to put it crudely, feel "awesome"; Just something to give them the ability to say "Well, WE just simulated a friggin' hurricane that tore across the east coast of the U.S." It might help plug them into the class.
- http://en.wikipedia.org/wiki/Tropical_cyclone_forecast_model (has descriptions of various models for tracking cyclones and hurricanes)
- Population dynamics, use a predator-prey model and talk about the underlying interaction between two (or more) species. Could do this with agent-based modeling and/or system dynamics modeling. We could talk quite a bit about ecology and species interactions and things that affect the stability.
- Cladistics (constructing a phylogenetic tree). Start with a common protein or gene amongst a group of organisms and construct a model for how they diverged evolutionarily based on evidence from that gene. This could also start simpler with looking at homologies and analogies and constructing a tree based on that (old way), then moving to the more cutting research with the genes. Would give an opportunity to talk about the computing power behind searching large databases of proteins or nucleotides.
- I was thinking of doing something with biology. This may be too complicated, given current technology, but if we could take a model of a cell and start playing with it, maybe tweaking a few of the parts, and see if that would have any effect on how that alters the function of the cell in the body?
- Alternately, we could do something with engineering. Develop structual models, and see what sort of crazy structures you could make that would stand on their own. There's already some rudimentary stuff to do this with, such as Bridgebuilder, but if we could possibly do something more complicated, I think that would be awesome.
- Traffic flow modeling - This could be systems dynamics or agent-based (see http://en.wikipedia.org/wiki/Traffic_flow) and part of the Measuring the World unit. The simulation would involve modeling a section of traffic to see results of uses of traffic control devices. The validation/verification part of this could be to observe an actual section of traffic here in Richmond. | s3://commoncrawl/crawl-data/CC-MAIN-2020-50/segments/1606141164142.1/warc/CC-MAIN-20201123182720-20201123212720-00520.warc.gz | CC-MAIN-2020-50 | 13,398 | 113 |
http://lastweek.io/lego/driver/ib/ | code | Lego’s IB stack is ported based on
linux-3.11.1. We ported:
Lego does not support uverbs. At the time of writing, Lego IB stack has only been tested on
Mellanox Technologies MT27500 Family [ConnectX-3].
The stack is SUPER complex, a lot data structures and pointers fly all over. Good thing is the whole stack is layered clearly.
- IB core code is in
driver/infiniband/core, which exposes the major IB API to both user and kernel applications. Inside, it has two parts. The first part is function callback, that call back to underlying device-specific functions. The second part is the management stack, including communication manager (cm), management datagram (mad), and so on.
- In IB, each port’s QP0 and QP1 are reserved for management purpose. They will receive/send MAD from/to subnet manager, who typically runs on switch. All the IB management stuff is carried out by exchanging MAD.
- There are several key data structures: ib_client, ib_device, and mad_agent. MAD, CM, and some others are ib_client, which means they use IB device, and will be called back whenever a device has been added. mad_agent is something that will be called back whenever a device received a MAD message from switch (see
ib_mad_completion_handler()). A lot layers, huh?
ib_mad_completion_handler(): we changed the behavior of it. we use busy polling instead of interrupt. Originally, it will be invoked by mlx4_core/eq.c
mlx4_ib and mlx4_core¶
mlx4_core is actually the Ethernet driver for Mellanox NIC device (drivers/net/ethernet/mellanox/hw/mlx4), which do the actual dirty work of talking with device. On the other hand, mlx4_ib is the glue code between ib_core and mlx4_core, who do the translation.
A lot IB verbs are ultimately translated into
fw.c __mlx4_cmd(), which actually send commands to device and get the result. There are two ways of getting result: 1) polling: after writing to device memory the command, the same thread keep polling. 2) sleep and wait for interrupt. By default, the interrupt way is used (obviously). But, at the time of writing (Aug 20, 2018), we don’t really have a working IRQ subsystem, so we use polling instead. I’m still a little concerned that without interrupt handler, we might lose some events and the NIC may behavave incorrectly if interrupts are not handled.
- Init PCI subsystem, build data structures
- Core IB layer register
mlx4_init(): register PCI driver, provide a callback
__mlx4_init_one(): initialize the hardware itself, register interrupt handler.
mlx4_ib_init(): allocate a ib_device, and register, which will callback through all
ib_clientregistered at step 1.
Created: Aug 20, 2018
Last Updated: Aug 20, 2018 | s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506676.95/warc/CC-MAIN-20230925015430-20230925045430-00415.warc.gz | CC-MAIN-2023-40 | 2,668 | 23 |
https://communities.intel.com/thread/97525 | code | This just happened while i was browsing the internet. The screen blacked out and came back on. After coming back on, the graphics card audio device was lost. Ie the intel display audio under the sound video and game controllers within device manager as well as the sound device under playback options.
Workaround is to restart.. however the device did get picked up again once when i added a bluetooth headset again.
Could you please let us know the driver version you are running? Please go to Device Manger> Display adapters> Intel(R) HD Graphics right click on Properties and then go to Driver, you will be able to see the version installed. | s3://commoncrawl/crawl-data/CC-MAIN-2018-30/segments/1531676594790.48/warc/CC-MAIN-20180723012644-20180723032644-00082.warc.gz | CC-MAIN-2018-30 | 644 | 3 |
http://www.nclack.k12.or.us/Page/2573 | code | Instead of hitting trust every time you log on to esis you can save it so you never have to hit trust again.
By clicking on the "Show Certificate" button, the window will get larger and these new options will appear:
Click on the small triangle next to "Trust Settings" and some new options will be made available.
Where the pulldown menu says "Use System Settings" click on that menu and choose "Always Trust," this should change the menu below it as well (to Always Trust). Click on the "Trust" button and your settings will be saved. | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368702525329/warc/CC-MAIN-20130516110845-00031-ip-10-60-113-184.ec2.internal.warc.gz | CC-MAIN-2013-20 | 536 | 4 |
http://www.webassist.com/forums/post.php?pid=29900 | code | Followed the TUT but still can't get multiple updates to work!
Re-posted, as requested, from another thread....
I'm having similar problems using DW8 and DA 2.0.6.!!!
Thought it was me so created a simple example of tables and pages and followed the video tutorial to the letter just to test the theory. My update page doesn't even update! Nor does it redirect - just refreshes the page with the original data still intact. I'm using a simple recordset and trying to update a single text field in each record.
I have a "list all" page, an insert page and an update page. On the update page I've set the recordset to feed the form field with the data that can be updated. I've created a table with the field in one <td> and set the <tr> to repeat (DW Repeat Region behavior) for all records. I've then selected the DA > Update > Multiple Record Updates and set the repeated form to the only choice available at that point - the repeat region - with all other selections pointing to the table to be updated and the sources (in he fom) from which the update should come.
On "finish" the wizard cloes and sets a "repeat selection, 1" region around the entire first repeat region. Weird but consistent!
The resulting page, posetd to my test server, doesn't update nor does it trigger the redirect which was set, in the wizard, to the "list all" page. Instead, all it does is reload the update page and all of the original data (as it hasn't triggered the update). | s3://commoncrawl/crawl-data/CC-MAIN-2019-26/segments/1560627998238.28/warc/CC-MAIN-20190616122738-20190616144738-00449.warc.gz | CC-MAIN-2019-26 | 1,458 | 7 |
https://mastertuition.com.my/2015/05/25/what-have-mastertuition-achieved/ | code | There is no point in teaching grammar and structure to kids unless they actually have something to write; therefore, one essential step is to get kids to brainstorm via THE PYRAMID METHODS and to share as much of their knowledge as possible.
Gradually, students are able to write with ease based on frequently asked questions. A unique mind map for particular topics will be discussed and copied down among all students throughout the lessons. Needless to say, different mind maps will be derived based on students’ comments and ideas.
However, the steps of brainstorming will be guided and standardized. | s3://commoncrawl/crawl-data/CC-MAIN-2021-39/segments/1631780057584.91/warc/CC-MAIN-20210924231621-20210925021621-00432.warc.gz | CC-MAIN-2021-39 | 606 | 3 |
https://www.jqueryscript.net/menu/list-2-10.html | code | jQuery Menu Plugins
The autoToc.js jQuery plugin automatically generates a table of contents from all the h2 headings found within the article element.
The mln_menu.js jQuery plugin helps you create a sliding drawer which can be used for revealing an off-canvas sidebar navigation on your cross-platform webpage.
Developer Nav is a jQuery based cross-platform, cross-browser, multi-level dropdown/off-canvas navigation system for content-heavy websites or web applications.
A simple jQuery plugin which allows the visitor to toggle Bootstrap's native dropdown menus on hover, on click or both.
The stickyNav.js jQuery plugin makes it possible to create a smart, sticky, mobile-friendly navigation menu for your cross-platform web application.
treemenu.js is a super light jQuery plugin that turns nested Html lists into a collapsible tree menu like the tree folder structure.
Harmonia is a tiny yet useful jQuery plugin which transforms the regular HTML list into a dropdown select on the mobile device.
A minimal responsive multi-level menu that will be automatically collapsed into a smoothly-sliding dropdown hamburger navigation on small screen devices.
Corenav is an easy, responsive, multi-purpose, jQuery based navigation system for modern, cross-platform web development.
Slide Menu is a variant of the Swipe Menu plugin that reveals the off-canvas navigation overlaying the main content instead of pushing it to the right.
SideNavi.js is a really small jQuery side navigation plugin which allows to slide out a tabbed drawer panel from the edge of the browser.
A jQuery plugin for better Bootstrap navbar which replaces the default vertical mobile view with a sliding off-canvas menu when the viewport is narrower than a specific breakpoint.
The jQuery menu.js plugin transforms the regular multi-level dropdown menu into a fullscreen hamburger navigation that will slide out or fade in when toggled.
Yet another jQuery FAB plugin used to generate customizable, mobile-compatible, horizontal (or vertical) floating action buttons inspired by Google Material Design.
Responsive Nav is jQuery toggle menu plugin that converts a multi-level dropdown navigation into a nested off-canvas menu on small screen devices.
ContextMenu.js is a jQuery plugin which helps you create a dynamic, responsive, multi-level context menu with intelligent position using Bootstrap dropdown component. | s3://commoncrawl/crawl-data/CC-MAIN-2020-45/segments/1603107867463.6/warc/CC-MAIN-20201019232613-20201020022613-00672.warc.gz | CC-MAIN-2020-45 | 2,388 | 17 |
https://darrenbarefoot.com/2007/06/15/vancouver-tech-companies-sponsor-barcamp/ | code | If all goes well, I’m going to be in Vancouver for this year’s BarCamp on August 17 and 18. I was an organizer last year, but this year I’ll just be a lowly attendee.
In any case, I wanted to plug the event and encourage all of you local software companies to pony up the mere CAN $500 it takes to become a sponsor. That’s like, what, less than a copy of Windows Vista Premiumtastic? Plus, you can make some fun collateral like we did last year. | s3://commoncrawl/crawl-data/CC-MAIN-2020-50/segments/1606141750841.83/warc/CC-MAIN-20201205211729-20201206001729-00529.warc.gz | CC-MAIN-2020-50 | 453 | 2 |
https://docs.jdcloud.com/en/object-storage-service/features | code | Before using OSS, it is recommended that you shall understand basic concepts of bucket, object, region, access domain and others, for better understanding functions provided by OSS.
For meanings of OSS basic concepts, please refer to Core Concepts.
OSS provides the following functions:
|Application Scenarios||Function Description||Reference|
|Object Upload||Before uploading files to OSS, be sure to create one bucket in another region of JD Cloud. After creating the bucket, you can upload any object to this bucket.||
|Search Object||Search objects with same name prefix in a bucket or a folder.||Search Object|
|Create Folder||You can manage OSS folder with the method as the same as that used for managing Windows folder.||Create Folder|
|View or Download Object||Share and download objects through obtaining external link access address of uploaded objects. You can view or download objects by betting URL of uploaded objects and share the objects with others.||Get Object URL|
|Delete objects or folders||You may delete a single or several objects/folders and delete parts produced by multipart upload, to save your capacity consumption.||
Delete a Single Object
Delete Objects (Folder)
|Control OSS Resource Access Permission||You may control OSS resource access permissions via the method below:
OSS provides the Access Control List (ACL) for permission control.
ACL is the access policy granting bucket and object access permission. You can configure ACL in the Console while creating the bucket and modify ACL at any time.
You can conveniently and visually grant other users to access your OSS resources with the Bucket Policy function of the Console, for example, granting access permission to IAM users of other accounts and granting access permission with specific IP condition restrictions to the anonymous users.
You can build IAM Policy for access permission control of bucket and folder.
Read and Write Permission ACL-based Permission Control
Bucket Policy-based Permission Control
IAM Policy-based Permission Control
|Protect OSS data against hotlinking by others||When Anti-Leech is set for your bucket, you can enable or disable access request with the blank Referer field by setting the Referer field whitelist.||Use of Bucket Policy-Setting of Referer White List|
|Access OSS resources by using a customized domain||You can associate the customized domain (the domain of yourself) to the OSS bucket and then access data in the bucket by using the customized domain. You can associate the customized domain (i.e. the domain of yourself) access to your own Bucket, i.e. CNAME. After you enable the CNAME function, OSS will automatically process access requests to the domain.||
Associate Customized Domain
OSS Service Access via HTTPS Supported by Customized Domain
|Access bucket via static web page||Upon uploading images, videos, static web pages and other resources to OSS Bucket, you can set your bucket in the static website hosting mode and access such static web page via the bucket domain.||Set Static Website Hosting|
|Cross-Origin Resource Sharing||OSS provides setting of Cross-Origin Resource Sharing (CORS) in HTML5 protocol. CORS allows interaction between the client Web application program in one domain with resources in another domain.||Set Cross-origin Resource Sharing|
|Automatically delete objects in specified time||Manage life cycles of all objects or specific files in the bucket. For example, after a specified number of days have elapsed, delete a specific file.||Manage Object Life Cycle|
|Copy data of one bucket in one region to another bucket in another region||Cross-region replication means to automatically and asynchronously replicate objects in buckets in different regions. With the cross-region replication function, object operations, such as creation and update, can be reduplicated to a target bucket in another region.||Manage Cross-region Replication|
|Encrypt saved data||You can save your encrypted data to OSS with the default encryption function of bucket.||Set Server End Encryption|
|Back-to-origin of Image||Via back-to-origin setting, the back-to-origin reading is applied to the data getting request via the image method, to meet your hot migration demand of data.||Image Back-to-origin Setting|
|Event notification||You can make the callback notification in time while specifying relevant operation of some resources. The event notification is performed asynchronously, so that OSS operations will not be affected.||Callback Notification|
|View resource consumption conditions||Learn resource consumption conditions of OSS and provide data and consumption monitoring graphs with respect to bucket capacity, traffic, request count and others.||Console-Consumption Monitoring|
|Process Images Saved in OSS||Make format conversion, clipping, zooming, rotation, watermark, style encapsulation to images saved in OSS.
Image processing with the sample method is supported and picture access style via customized delimiter is supported at the same time.
If the user intends to protect the original image from being downloaded, the original image protection function shall be used in a cooperatively way.
|Image Processing Service|
|Video transcoding and snapshot are provided||Transcoding and snapshot to various video formats are provided and callback notice can be configured for submitted tasks.||Video Processing Service|
|Manage OSS resources with tools||Graphing tools, command line tools, file attaching tools and other tools are provided to facilitate OSS resource management.||Graphing Tool:
Manage OSS with CloudBerry
Manage OSS with s3browser
Command Line Tool:
Manage OSS with S3cmd
Object Attaching Tool:
Attach Bucket on Linux Instances with S3fs
|Manage OSS Resources with API||Provides RESTful API operation supported by OSS and relevant examples.||API Reference|
|Manage OSS resources with SDK||SDK development packages in various languages are provided to you to facilitate secondary development quickly.||SDK Reference| | s3://commoncrawl/crawl-data/CC-MAIN-2021-31/segments/1627046154089.68/warc/CC-MAIN-20210731141123-20210731171123-00181.warc.gz | CC-MAIN-2021-31 | 6,007 | 45 |
https://www.tr.freelancer.com/projects/php/convert-csv-file/ | code | I want to import a number of CSV files with product data from one external system into another external system.
the original CSV files contain many more columns that needed
- import the CSV files
- convert them into new files containing only the columns we need
- put them on our server, so we can use them
Hello, I can help you with that. What system we are talking about. I converted lots of import files before and I can script 99% of these problems. It should be quick turn around Josef
Bu iş için 74 freelancer ortalamada €124 teklif veriyor
Dear Job, I understand what you need. I have done many such data uploading automated jobs. Please message me once so that we can discuss more. Thanks and Regards, Ash
Hello it looks as elementary task, maybe, excepting last step "put them on our server, so we can use them" There is needed to have instruction how to put file in server. What is programming language? Thanks
Hi there, We can prepare csv for product import. Could you please let us know your platform, We worked all platform. Awaiting your response. thanks
Hello. Can you attach both CSV files samples here? Input and output. I can develop PHP script which converts one csv file to another (remove/rename fields etc.). Regards, Vladimir
Hi there! Please send me the csv file and the template. I'm an expert in data entry and data scraping jobs. I've huge experience in working on this type projects. I look forward to hearing from you. Regards
Hi, We can create functionality to Upload CSV and download new CSV with new columns. Please let me know when we can start. Looking forward for your response. Thanks. | s3://commoncrawl/crawl-data/CC-MAIN-2019-22/segments/1558232255536.6/warc/CC-MAIN-20190520021654-20190520043654-00038.warc.gz | CC-MAIN-2019-22 | 1,625 | 13 |
http://www.yqcomputer.com/393_27557_1.htm | code | Please do not write so-called "attribution novels". The name of the
precursor's author is sufficient to follow the discussion. The e-mail
address in the From header is often of little use as it is used as a
spam(mer) trap (could be a tarpit and the like; as opposed to one in
the Reply-To header). The message ID of the precursor is contained in
the References header of the followup. Two or more lines interfere
with flow of reading, especially with several quotation levels.
Actually, if you read it thoroughly, it *was* a "don't" :)
P.S.: Please trim your quotes (to the parts you are referring to).
"95% of success is showing up."
-- Mark Twain | s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323585120.89/warc/CC-MAIN-20211017021554-20211017051554-00148.warc.gz | CC-MAIN-2021-43 | 648 | 11 |
https://doc.vechainworld.io/GetStarted/how-to-node.html | code | How to deploy a VeChainThor node¶
VeChainThor blockchain’s source code is open source in the [Thor GitHub Repository](https://github.com/vechain/thor), free to download and compile following the deployment guide. However, you can deploy a VeChainThor node using the following methods:
VeChainThor blockchain uses Proof of Authority consensus (“PoA”), therefore only 101 Authority Masternodes on VeChainThor blockchain are able to produce blocks. However, anyone can deploy a VeChainThor node and synchronize the entire blockchain ledger. To become an Authority Masternode operator one needs to go through strict KYC and submit the application for the Foundation and Steering Committee’s approval. Applications can be submitted on the [VeChain Portal](https://portal.vechain.com). | s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224649302.35/warc/CC-MAIN-20230603165228-20230603195228-00453.warc.gz | CC-MAIN-2023-23 | 788 | 3 |
https://support.symantec.com/us/en/article.howto76530.html | code | The eXtensible Configuration Checklist Description Format (XCCDF v1.1.4) is an XML specification and language that provides a common framework for developing security checklists and benchmarks. The National Institute of Standards and Technology (NIST) hosts and maintains the XCCDF specification and language.
The SCAP v1.0 specification requires an SCAP benchmark to use an XCCDF document to define the checklist or benchmark of an SCAP data stream.
CCS supports XCCDF as part of an SCAP v1.0 data stream. During import of the SCAP data stream, CCS validates the XCCDF document against the official XCCDF schema. If an XCCDF benchmark contains multiple profiles, then CCS imports all the profiles.
CCS uses XCCDF specification in the following manner:
Imports XCCDF v1.1.4 as part of the SCAP data stream | s3://commoncrawl/crawl-data/CC-MAIN-2019-51/segments/1575541307813.73/warc/CC-MAIN-20191215094447-20191215122447-00069.warc.gz | CC-MAIN-2019-51 | 805 | 5 |
http://history.stackexchange.com/questions/tagged/music+popular-culture | code | to customize your list.
more stack exchange communities
Start here for a quick overview of the site
Detailed answers to any questions you might have
Discuss the workings and policies of this site
What was the earliest professional recording of “Happy Birthday to You”?
Since it's creation, there has been confusion over the copyright status of the familiar song "Happy Birthday to You". As it became widely popular, the original copyright holders lost control of when ...
Jan 2 at 19:09
newest music popular-culture questions feed
Hot Network Questions
What do you really see on a line of clocks as you pass by them at high speed?
Making sure user inputs correct type
What is the mathematical explanation for this trick?
Can malware be dangerous even when quarantined?
in the most capitalist of ways - meaning
Is Google Chrome killing my laptop battery?
What should I do as a reader if a paper misrepresented earlier papers?
What would the replicator do if Picard ordered "Hot Earl Grey tea"?
Different output from TeX Live 2013 vs. TeX Live 2014
How to use "date" to print tomorrow's day of the week
Is making a small change, testing it, then "rinse and repeat", a bad habit?
What does 自个 mean: "since a" or "onself"
Help to finish an incomplete figure using "tikz"
Soaked camera, completely broken?
My internet is slow since I installed Ubuntu
Are melee combatants limited to standing around saying "I attack"?
User-defined DistanceFunction for RegionNearest
Empty loop is slower than a non-empty one in C
How to identify whether the available light is too harsh or too soft?
How to group each element with each consecutive elements in one head
How are anti-aircraft missiles tested?
Client-side coding: How to prevent malicious use?
Expressing a mild preference
Why do films sometimes transpose everything by a quarter step?
more hot questions
Life / Arts
Culture / Recreation
TeX - LaTeX
Unix & Linux
Ask Different (Apple)
Geographic Information Systems
Science Fiction & Fantasy
Seasoned Advice (cooking)
Personal Finance & Money
English Language & Usage
Mi Yodeya (Judaism)
Cross Validated (stats)
Theoretical Computer Science
Meta Stack Exchange
Stack Overflow Careers
site design / logo © 2014 stack exchange inc; user contributions licensed under
cc by-sa 3.0 | s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1406510276584.58/warc/CC-MAIN-20140728011756-00068-ip-10-146-231-18.ec2.internal.warc.gz | CC-MAIN-2014-23 | 2,277 | 52 |
https://tmfloyd.com/job-search/ | code | If you are looking to take the next step in your career, we can help.
We have openings ranging from business analysts and project managers, to developers and other IT-related positions. Though our headquarters is located in Columbia, SC, we have openings throughout the United States.
Filter by State
Sr. Architect Developer (Onsite)
We’re seeking a Senior Architect Developer with 2 years of experience with
Internet Information Services (IIS)…
TM Floyd & Company combines tactical strategy, leading-edge technology, and top talent. We serve businesses by addressing their technology challenges while providing opportunities for IT professionals to take the next step in their careers. | s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947475422.71/warc/CC-MAIN-20240301161412-20240301191412-00434.warc.gz | CC-MAIN-2024-10 | 690 | 7 |
https://contentgrabber.com/Manual/scheduling.htm | code | << <%SKIN-STRTRANS-SYNTOC%> >>
Navigation: Content Grabber Editor >
Content Grabber provides an Agent scheduling facility that enables you to automatically run your agents at predetermined time slots whenever you need it to run. This can be done every hour, every day, month, year and so on.
You can schedule agents using the Content Grabber Scheduler or the Windows Task Scheduler. We recommend you use the Content Grabber scheduler for new agents, since it provides more advanced features and integrates more tightly with the rest of the Content Grabber application. The Windows Task Scheduler integration is provided for backward compatibility. If read the topic Windows Task Scheduler if you prefer to use this scheduler.
If you have an Agent loaded in Content Grabber, you will be able to access the Scheduling feature. From the Agent menu at the top of the Content Grabber application. Simply Click on the Schedules menu option to display the Scheduling window
If one or more schedules already exist for the current agent, a Window listing all schedules will open, and you can edit existing schedules or add more schedules from there.
The Content Grabber Scheduler uses Cron expressions to define when the scheduler should run an agent. If you setup a basic schedule, Content Grabber will automatically convert the basic schedule into a Cron expression. When you edit an existing schedule, the Cron expression will always be shown, but you can simply switch back to the basic schedule if you don't want to work with Cron expressions.
Please read the topic Cron Expressions for more information about Cron syntax.
The Scheduler depends on the Content Grabber Windows service, and the service must be running for the scheduler to be operational. If the service is not running, a message will be displayed at the top of the Scheduler Windows with a link allowing you to start the service. We recommend you configure the service to start automatically when your computer starts.
Make sure the Content Grabber scheduler is enabled before you start the service. Remote procedure calls and Web request are used by the API and are not required by the scheduler. | s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296950247.65/warc/CC-MAIN-20230401191131-20230401221131-00334.warc.gz | CC-MAIN-2023-14 | 2,159 | 10 |
https://www.discoverexuma.com/post/2020/07/02/exuma-travel-update | code | Exuma Covid Rules - Latest Covid Update
(Updated Nov 2022)
What are the travel requirements (covid requirements) for Bahamas? This is a question we are hearing a lot.
Effective Sunday June 19th, 2022, the Bahamas Travel Health Visa is no longer required to travel into the Bahamas.
Travellers are no longer required to submit vaccination status (vaccinated or unvaccinated). Effectively, Bahamas has no health visa or vaccination requirements so same as pre-covid. Here is link to latest (recommend you check this government site as things can change): | s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233511361.38/warc/CC-MAIN-20231004052258-20231004082258-00482.warc.gz | CC-MAIN-2023-40 | 552 | 5 |
http://stackoverflow.com/questions/9876541/basic-python-string-formatting/9876597 | code | I'm experiencing problems with the string format conversion in Python (v2.6.5). I tried to set a string to format like this...
os.system ('/%s/tabix' % (path) '-h -f ftp://<some_url> 4:387-388 > file.out' )
But I always get the same error
"Not enough arguments for format string"
I read the documentation, and this post Not enough arguments for format string but i can't find an appropriate answer.
Could someone help me?
Thanks in advance, | s3://commoncrawl/crawl-data/CC-MAIN-2014-52/segments/1418802768561.127/warc/CC-MAIN-20141217075248-00085-ip-10-231-17-201.ec2.internal.warc.gz | CC-MAIN-2014-52 | 440 | 7 |
https://communities.bmc.com/message/255629 | code | have you contacted support ? we had previously used oracle db for mirroring without such problems, maybe postgress sync has some problems
I would like to know the progress on this. How postgresql with mirroring perform? Is there any over head in production?
Mirroring will be damaged , if there is any network connectivity issues, or CTM utility you ran on Primary DB and but dint run on secondary,
can paste here if any error you see in proclog or mirror_log,
and let me know what are the steps that you performed for mirroring?
Hi, i am sorry to interrupt.
Rashid, what do you mean ctm utility only run in primary could damage the mirror? is there any specific list of command & how to deal with it?
May be you didn't run the following command on host computer i.e,
but i was not running those command.
I agree with Mohamed Rashid, Mirroring is damaged if there is network issue between the main server and mirrored server.
Secondly make sure that the Control-M on the mirrored database are down. If Control-M services are running on Mirrored database it damages the mirroring.
From the Primary server type the below command and leave it for a day and look for the connection breakout logs next day.
ping <mirrored server ip> -t >> d:\pingresult.txt
Or you may have some sort of monitoring device in your environment which will notify you about any network outage between these servers. Other will just collect the data using ping command and check the next day. | s3://commoncrawl/crawl-data/CC-MAIN-2018-22/segments/1526794865679.51/warc/CC-MAIN-20180523141759-20180523161759-00078.warc.gz | CC-MAIN-2018-22 | 1,464 | 14 |
http://tt.tennis-warehouse.com/showpost.php?p=6941220&postcount=37753 | code | Originally Posted by IB1B4U
I'm not sure which one is Miss ITF_2011_3_03.
Here let me help you.
Just a quick hint - you can also click and drag the actual photo to Google Image search...
And usually some info comes up that points you to the name of the person in the photo. For example if you click and drag the last photo I posted bc you don't know who Sabs is referring to, this is what comes up... | s3://commoncrawl/crawl-data/CC-MAIN-2015-22/segments/1432207928865.24/warc/CC-MAIN-20150521113208-00003-ip-10-180-206-219.ec2.internal.warc.gz | CC-MAIN-2015-22 | 400 | 5 |
https://openforge.gov.in/projects/DND | code | DND 2.0 The new release (built ground up) has the following additional features: • An intelligent spam detection engine (for SMS only) to assist the subscriber in reporting • Crowdsourcing of data about offending messages and calls to speed up detection of unregistered telemarketers • Updates about action taken on complaints within the App
This project is not categorized yet. You can categorize it now.
Latest File Releases
This Project Has Not Released Any Files | s3://commoncrawl/crawl-data/CC-MAIN-2018-22/segments/1526794864626.37/warc/CC-MAIN-20180522053839-20180522073839-00334.warc.gz | CC-MAIN-2018-22 | 472 | 4 |
https://www.smokyhollowspecificplan.com/content/51-implementation-strategies | code | Smoky Hollow Specific Plan 2018 (web version)
5.1 Implementation Strategies
Implementing this Specific Plan will require a collaborative effort between the public and private sectors to collectively achieve the vision. Private sector developers, entrepreneurs, investors, and property owners will drive new investment and construction in Smoky Hollow. The City’s responsibility is to offer mechanisms that facilitate private investment, and to coordinate, encourage, and deliver parallel and complementary investment in the public realm. Changes in economic conditions and trends over time may require the City to periodically revisit and reprioritize the implementation steps for achieving the vision for Smoky Hollow. Therefore, this chapter describes a variety of potential funding mechanisms in order to accommodate dynamic local interest/capacity and market conditions in Section 5.3 (Funding Strategy). | s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446710771.39/warc/CC-MAIN-20221130192708-20221130222708-00295.warc.gz | CC-MAIN-2022-49 | 910 | 3 |
https://drupal.stackexchange.com/questions/15873/how-do-i-remove-frontpage-content-block | code | I am trying to remove the main page content page. I made a views slider (block) which I then displayed on the frontpage. However, I am finding it difficult to remove the mainpage content block. I am using drupal 7 and the zen subtheme.
You cannot remove the
content part of a page as it is not a block. The content is suppose to be your main content that always shows and blocks are things that can be conditionally shown around your content.
You can create a page display for your view, then change the front page of your Drupal site to point to your views page display (D7: admin/config/system/site-information, D6: admin/settings/site-information). | s3://commoncrawl/crawl-data/CC-MAIN-2020-34/segments/1596439740423.36/warc/CC-MAIN-20200815005453-20200815035453-00584.warc.gz | CC-MAIN-2020-34 | 651 | 4 |
https://github.oldjpg.com/repository/220449772 | code | Wifi & BLE driven passenger flow metering with cheap ESP32 boards
FPGA (chip) design of openwifi (IEEE 802.11)
LilyGo LoRa Series examples
Software and hardware platform for simpler building of MIDI controllers with support for DMX.
Wireless keystroke injection attack platform
Xilinx Vivado block designs for FPGA RISC-V SoC running Debian Linux distro
Physical modelling signal processing for analog tape recording
Arduino generic menu/interactivity system
A curated list of code and resources for computer-controlled drawing machines and other visual art robots. | s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446711003.56/warc/CC-MAIN-20221205032447-20221205062447-00699.warc.gz | CC-MAIN-2022-49 | 565 | 9 |
https://hubpages.com/community/answer/183397/would-you-recommend-waiting-for-hubscore-to-rise-before-publishing-or-just-publishing-when-finished | code | I've noticed that my unpublished hubs' hubscore tends to rise over time, even if there are no edits. Does it matter what the original publishing score is? Thanks.
sort by best latest
You can help the HubPages community highlight top quality content by ranking this answer up or down.
Thank you. Yeah, I just decided to publish it, whatever :D | s3://commoncrawl/crawl-data/CC-MAIN-2017-47/segments/1510934804019.50/warc/CC-MAIN-20171117223659-20171118003659-00409.warc.gz | CC-MAIN-2017-47 | 342 | 4 |
http://huselha.com/page/direct-interactive-instruction-common-core/ | code | Park the tractor in different farm yard places but will you do it in time? >>>Download now and start the fun<<< Be careful don't hit the obstacles. Your heart is banging in your ears and through all the noise and smoke, all you can hear is your own breathing.
- What's new in this version:- Fixed minor issues and localization.
ALWAYS RIGHT, related to it's direction!Avoid walls, don't go beyond the screen and watch out for the traps! Just an endless journey through different rooms. Initially the first dragon has the upper hand and can over-power the knights but you need to watch out for the falling spiked balls and look for the power-ups. Drive beyond your imagination and rev up the gas towards unchartered territories.
Your aim is to help your soldier succesfully make his way to freedom by avoid all the obstacles in his way. [WARNING]This game is very difficult. Misses don't decrease Jelly Power.
How long will you survive?What's new in this version:- MORE COLORS!- Adds Twitter Sharing- Squashes Bugs
Just start playing and have fun! * CAN YOU GUESS THEM ALL? * Can you guess all the levels and unlock more levels? Countless puzzles from easy to tricky are waiting for you! * SIMPLE AND HIGHLY ADDICTIVE GAMEPLAY * Hints to make it easy for you to guess any brand! Tons of powerups to guess logo's !
They might look silly and slimy, but once they wreak havoc, all hell will break loose. and a completely new user experience!!! you will NOT be able to put this game down! How far can you get? We challenge you to score at least 15 points on this game! FEATURES - Super hard flap game! - Improved game play with moving obstacles! - Totally new user experience! - Totally new experience! - Cool 8 bit graphics & sounds.Game Features:*Stunning HD graphics*Simple, one touch gameplay*Great music and sound effects*Endless hours of fun! This game is an absolute blast! Features: - Collect fruit and watch out for flying barriers! - Unlock awesome levels- Never ending gameplay and never ending fun! Download it right now! Tap on your device to make the "Baby" Jump.
Flabby Chick Bird Adventure is a great game for the family. | s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187826840.85/warc/CC-MAIN-20171023221059-20171024000643-00003.warc.gz | CC-MAIN-2017-43 | 2,132 | 8 |
https://zeo.org/resources/blog/what-is-ttfb-how-to-optimize-server-response-time | code | What is TTFB? How to Optimize Server Response Time
One of the most problematic aspects of website speed improvements is fixing errors that tell you to reduce time to first byte (TTFB). In this article, I will try to inform you about how to minimize the issue of the TTFB. Besides, I will discuss more about the importance of server & hosting preference for SEO.
TTFB is the period measured between the client's (HTTP & HTTPS) requests and the first byte of the website.
Having a good TTFB value is very important for the speed optimization of a website.
TTFB can vary greatly depending on what type of content (static or dynamic) you share, the configuration of your server, etc. That is why it is difficult to answer the question "what is a good TTFB value?" and it depends on the status of your website.
If you have a TTFB value that is approximately lower than 100 ms, it is a great value. While the values between 200-500 ms are deemed average, the values between 500 ms - 1 s might not be considered ideal at all. In some cases, depending on the type of the website or page, it may be inevitable for the TTFB value to be longer than 1 second.
If you see that error in the Page Speed results, that is because there is a value over 600 ms:
You can check the average server response time through Search Console search statistics:
If you have a shared server or use multiple websites on a single server, the volume in websites may vary depending on other websites in the servers. Surely one must not confuse TTFB with the server response time.
Here are the main factors that slow down the TTFB value:
● Badly-configured server structure,
● Server capacity issue (bandwidth or RAM, etc.),
● Dynamically created content,
● Database questions.
In Page Speed Insight results, you may come across an error/warning such as “reduce the time to first byte”:
You can run Lighthouse:
You can also measure the TTFB values in Google Chrome Network:
You can also run a TTFB test here: https://gtmetrix.com/.
You can clearly monitor the process via Speed Visualization as well:
In that case, this website https://www.webpagetest.org/ is also helpful for you:
You can also check out the monthly-updated website: https://ismyhostfastyet.com/. Based on the data from Chrome UX, the following table provides details, including their TTFB values and how many websites they have:
There are several ways of optimizing the TTFB value. By suggesting many of them, I should warn you about the situations in which you might need to work hard with the hosting company or software team.
There are a lot of interactions and processes required to create a page, and as a result of this, the TTFB value can be affected since each interaction takes some time. You can copy these processes beforehand with the help of cache integrations and save time from loading times.
Googlebot generally crawls on HTTP/1. However, from November 2020, Search Console started to send message to website owners if they are able to use HTTP/2, it is stated that your website can be crawled on this version:
You can detect the sources using HTTP/2 with Chrome:
You can optimize the TTFB values by using CDN. If you have a website with intense traffic, CDN might be a perfect solution for the sources to load faster.
Of course, this section will be elaborated on by the members of the back-end team. Additional modules to websites, old user databases, or several queries can cause a bigger burden on databases. That is why it would be better to optimize databases as well.
If you use Cpanel, you can see the disused databases and database users and remove some of them if suitable:
Example Mysql users:
If you use Wordpress, with the help of PhpMyAdmin, you can check the tables left from the older extensions. Thus, you can reduce the database load caused by the disused extensions:
For instance, I can see the vacant table structures with the order below:
select table_schema as database_name,
from information_schema. tables
where table_type = 'BASE TABLE'
and table_rows = 0
and table_schema not in ('information_schema', 'sys',
-- and table_schema = 'sakila' -- put your database name here
order by table_schema,
When I start running the SQL, it shows me the results:
SQL results may differ from website to website. In these examples, you can see more or fewer table structures. Before getting to these steps, please do not forget to backup your data:
Extensions such as WP Speed of Light and WP website owners can arrange the DB-related operations even faster. Surely you can use other extensions or you can continue these processes without any extensions:
And if you have a website with a PHP infrastructure, you had better upgrade it to the latest version:
I would like to elaborate on how you can choose the most suitable server in terms of SEO.
One of the most important points while choosing hosting is the monthly bandwidth. Do not forget to keep this domain under control in services such as the purchased server, hosting, or VPS. Due to instant trend traffic at an unexpected time, you can run out of bandwidth:
You can analyze the last 24 hours or the last week:
You can also assess how much bandwidth you use for which month. If you have a website with low traffic, you may not prefer a wide bandwidth. Instead, you can get a more suitable server for your website and fulfill your server need at lower costs:
If your bandwidth does not meet the traffic your website receives, server errors may be multiplied and your website may become "suspended":
Taking all of these points into consideration, you can buy hosting from the domestic market or foreign markets by deciding on the packages suitable for your website:
If you use shared hosting, you most probably will be subject to certain limits even though it is stated that you have limitless bandwidth. That is why you should always know the CPU limits in hosting packages and communicate with your server manager on how hard you can push these limits. We do not come across this problem in packages such as VPS/Dedicated Servers/ (depending upon the hosting firm for sure) however, still consider asking:
Googlebot may also slow down the searching speed if the server bandwidth is low. Furthermore, in server changes, the searching speed may be readjusted by Googlebot because it will try to understand what the gap is between the new server and the old one:
You can also create your server with hardware features such as SSD disk. Besides, RAM size and processor features are among the key elements. A server with a faster processor can lead several operations to run more quickly:
The reason why I elaborate on hosting that much intensely is that Google also made announcements about it:
Lite Speed Usage
You can have a faster performance by installing LiteSpeed on your servers. LiteSpeed with a paid license offers better results compared to its competitors.
You can find an example for LiteSpeed installed on Cpanel in the image below. You can make all of the settings on this screen and if needed, you can restart LiteSpeed Web Server:
While deciding on a server, you make sure LiteSpeed is included:
Reducing the HTTP Requests
First of all, make sure that you remove Yandex Metrica or similar codes that you do not use or rarely use once in a year from the source code. In this way, you can make some great benefits by deleting the codes barely working for you. Fewer HTTP requests will lead to faster upload times.
If there are third-party files and several CSS & JS files on your site, these ones will create some additional requests. The more HTTP requests a browser creates, the longer it takes for your page to upload.
You can check the number of requests via Chrome, for instance, there are 179 requests for the homepage of ZEO:
You can also check out the detailed outlook of the requests via GTmetrix:
To optimize the number of requests, remove, integrate or minimize the unnecessary JS, CSS files. You may plan to use image elements together or, if there are unnecessary ones, reduce their number and minimize them as much as possible.
If you would like to learn more about the TTFB metric, you can also check the topics such as DNS lookup, Premium DNS, SSL negotiation, and Initial connection.
Finally, I would like to remind you again that if you optimize the TTFB alone, it will not be enough to completely speed up your website. This metric stands only for a single metric of speed improvements. | s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474843.87/warc/CC-MAIN-20240229134901-20240229164901-00463.warc.gz | CC-MAIN-2024-10 | 8,444 | 64 |
https://www.shoplc.com/c/burmese-ruby | code | A captivating reddish-pink jewel that is timeless and shines as a symbol of romance - Ladies and gentlemen, that is Burmese ruby for you. A charming red gem that rises above the trial of time and sparkles as the image of sentiment and energy - that is Burmese ruby for you. It's incomprehensible not to succumb to the warm hug of the quieted reds or the enthusiastic hold of the searing crimsons — the various shades of red that rubies show. This valuable gemstone adds to the magnificence of any adornments it is made a piece of. Shop LC’s Burmese ruby gems assortment is a recognition for the radiance of this gemstone and the amazing convictions related with it before it turned into a significant piece of the wonderful gems making industry. With this awe-inspiring assortment, we have ensured that your quest for the best Burmese ruby gems finishes here!
Stunning Burmese ruby earrings
Shop LC has brought a different assortment of Burmese ruby studs only for you! This collection of Burmese ruby earrings arrives in an assortment of shapes and structures. They range from easy to exceptionally lavish studs that make certain to commend your outfit. We have a wide scope of hoops like Burmese ruby drop studs, Burmese ruby stud hoops, and gold Burmese ruby hoops. Find the best ideas to adorn of Burmese ruby studs at astounding costs. They are planned on very good quality metals like authentic silver and yellow gold. These metals give a cleaned surface to these Burmese ruby studs. With fine craftsmanship, these hoops are certain to make an important assortment to your gemstone jewelry collection.
Get romantic with Burmese ruby rings
At any point thought about what could be the ideal present for your exceptional one? Try not to ride any further! You are at the online gemstone store, SHOP LC. Furthermore, we have an adornments piece for each event. In the event that it is a proper occasion, a wedding proposition, an individual get-together, or a thanksgiving party, there isn't anything that our inventive planners don't have for you. These valuable Burmese ruby rings for ladies are so unpredictably planned, and the gemstone is removed in various shapes and styles. We have heart-formed rubies, oval-molded Burmese ruby rings, finely-cut botanical plans, and significantly more. The Burmese ruby rings are made on various valuable base metals like real silver, gold, platinum. These true Burmese ruby rings seem like glittery red stones!
Stunning Burmese ruby pendants & Burmese ruby necklaces
Discover our assortment of large Burmese ruby pendants and style them with your favorite cocktail party dress. We also have Burmese ruby cross pendants, which are extremely elegant and yet suitable for everyday wear. You can style them with almost everything and create a graceful appearance.
These natural Burmese ruby pendants are incredibly charming and sure to win everyone’s hearts. They are highly pigmented and leave a charming impression on everyone. We have a very luxurious collection which comprises gold Burmese ruby necklaces. You can accessorize these necklaces with your formal or semi-formal outfit to offer a touch of grace to your outfit. An array of real Burmese ruby necklaces are here to spruce up your look on any given occasion. They are made with large real rubies, which give a sparkling effect to these Burmese ruby pendant necklaces.
A pop of Burmese ruby bracelet on your wrist
Adorning yourself with these Burmese ruby bracelets is a unique way of adding a pop of glam to your attire. Be it a party or a formal event; a sleek bracelet can do wonders. Our collection has exquisite red Burmese ruby bracelets for both men and women! Yes, our collection goes beyond the ordinary and has specially designed men’s Burmese ruby bracelets.
Read Less ▲ | s3://commoncrawl/crawl-data/CC-MAIN-2021-39/segments/1631780056572.96/warc/CC-MAIN-20210918184640-20210918214640-00050.warc.gz | CC-MAIN-2021-39 | 3,795 | 11 |
http://www.techonthenet.com/sql/minus.php | code | This SQL tutorial explains how to use the SQL MINUS operator with syntax and examples.
The SQL MINUS operator is used to return all rows in the first SELECT statement that are not returned by the second SELECT statement. Each SELECT statement will define a dataset. The MINUS operator will retrieve all records from the first dataset and then remove from the results all records from the second dataset.
Explanation: The MINUS query will return the records in the blue shaded area. These are the records that exist in Dataset1 and not in Dataset2.
Each SELECT statement within the MINUS query must have the same number of fields in the result sets with similar data types.
The MINUS operator is not supported in all SQL databases. It can used in databases such as Oracle.
For databases such as SQL Server, PostgreSQL, and SQLite, use the EXCEPT operator to perform this type of query.
The syntax for the SQL MINUS operator is:
SELECT expression1, expression2, ... expression_n FROM tables WHERE conditions MINUS SELECT expression1, expression2, ... expression_n FROM tables WHERE conditions;
The following is a SQL MINUS operator example that has one field with the same data type:
SELECT supplier_id FROM suppliers MINUS SELECT supplier_id FROM orders;
This SQL MINUS example returns all supplier_id values that are in the suppliers table and not in the orders table. What this means is that if a supplier_id value existed in the suppliers table and also existed in the orders table, the supplier_id value would not appear in this result set.
The following is a MINUS operator example that uses the ORDER BY clause:
SELECT supplier_id, supplier_name FROM suppliers WHERE supplier_id > 2000 MINUS SELECT company_id, company_name FROM companies WHERE company_id > 1000 ORDER BY 2;
In this SQL MINUS operator example, since the column names are different between the two SELECT statements, it is more advantageous to reference the columns in the ORDER BY clause by their position in the result set. In this example, we've sorted the results by supplier_name / company_name in ascending order, as denoted by the
ORDER BY 2.
The supplier_name / company_name fields are in position #2 in the result set. | s3://commoncrawl/crawl-data/CC-MAIN-2015-48/segments/1448398449145.52/warc/CC-MAIN-20151124205409-00195-ip-10-71-132-137.ec2.internal.warc.gz | CC-MAIN-2015-48 | 2,198 | 16 |
https://oscwii.org/library/app/netslug | code | Can be used with a Wii Remote. Up to 1.
Play online throw Local!
Thanks to NetSlug (Based on BrainSlug), you can play online with your friend on local multiplayer. Credits: MrBean35000vr and Chadderz // Creator/developers source Code DontwaitYT // Compiled and pubblicated on GBATemp AleTM // Icon banner Original source code: https://github.com/MrBean35000vr/netslug-wii | s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679103464.86/warc/CC-MAIN-20231211013452-20231211043452-00637.warc.gz | CC-MAIN-2023-50 | 371 | 3 |
http://theuncertainfuture.com/ufHelp/A9Math.html | code | A9 Math: The Long Version
Here, we'll give you the gory math details behind the "world according to you" in answer A9. You may wish to read the friendly explanation under A9 first.
Speeding Up AI Research
Answer A6 showed your distribution for the arrival of AI. It took into account your estimates of the difficulty AI technologies would have with current researchers. But it did not take into account technology creating more effective researchers. Answer A9 does.
The way we get the result is a little more complicated than the previous times.
What Year It "Really" Is
Suppose that, on your assumptions, AI would have arrived in 2060. But suppose that, by 2050, because of intelligence enhancement, smarter scientists created ten extra years' worth of progress. Then AI arrives in 2050.
More generally, for each year , we'll need a probability distribution for what year it "really" is. This depends on how many "science years" were achieved in each past year :
How Much Research Gets Done
So how many "science years" happen in a year? It depends on a few things.
1. N years ago, how many babies with enhanced research ability were conceived as a result of iterated embryo selection?
2. Given genetics knowledge available N years ago, what's the factor by which embryo-selected children conceived then will be more effective?
These steps are repeated for every N that's at least 20. (We're assuming people under 20 don't contribute to research, and people over 20 don't die or retire before the model ends in 2070.) All these numbers are added to a constant base number of researchers.
3. Right now, by what factor do other intelligence enhancement technologies increase everyone's research ability?
This last unknown factor multiplies the total we get from 1 and 2. The factor has a value every year. But it's not reset every year: instead, at the beginning of time, a value is rolled up, once. The factor, by the end year 2070, ends up having a lognormal distribution with a mean and s.d. (for the log) given by your choices of mu and sigma in question Q9. At the start year 2010, the factor is 1. In between, the mean and s.d. (for the log) increase linearly from 0 and 0, to the mu and sigma you entered.
(Keep in mind that what comes out of our model isn't one random run of history. It's how the outcomes of all possible runs are distributed; the math that determines this distribution isn't itself random.)
The outcome is some number of researcher-equivalents. We assumed the base number of researchers is 100,000. The ratio of these numbers is the number of "research years" that have gone by. Note that we're assuming a million researchers all working at the same time for one year are as effective as, for example, a thousand researchers working at the same time for a thousand years. We're also assuming that embryo-selected researchers add to the existing number of researchers instead of displacing them.
In math, if A is the speedup from other enhancement technology, B is the number of embryo-selected future researchers conceived per year, and E is their effectiveness,
How Many Selected Scientists?
Step 1 above asked how many people selected for science were conceived in a given year. That depends on two questions you answered: Q9-2 and Q9-4.
Q9-2 asked how long until artificial gametes. You entered two parameters, a mean mu and an s.d. sigma, which together determine a lognormal distribution. The probability density that this happens in year t is:
Q9-4 asked about the scale on which this technology gets adopted. The 0 to 50 years on the horizontal axis represent the number of years after the technology first gets adopted. This starting point is the one that was randomly set in Q9-2. Again, the scale of adoption has a value every year, but the value doesn't get reset every year. At the beginning of time, a value ("adoption-proneness") is rolled up once. The mean and standard deviation you set for 0 and 50 years afterward determine, as a linear function, a mean and standard deviation of the logarithm of a birth rate for all the years in between. At each year, the scale of adoption ends up being lognormally distributed. As before, if the scale ends one s.d. higher than you expected, it's always one s.d. higher than you expected.
How Effective is Selection?
Step 2 above asked how effective researchers selected for science ability are. That depends on two questions you answered: Q9-1 and Q9-3.
Q9-1 asked how long until $1000 genomes. You entered two parameters, a mean mu and a standard deviation sigma, which together determine a lognormal distribution: The probability density that this happens in year t is:
Q9-3 asked about the effectiveness factor of each embryo-selected scientist — that is, the number of typical scientists one of them could replace. The 0 to 50 years on the horizontal axis represent the number of years after we first become able to sequence genomes for $1000 or less. This starting point is the one that was randomly set in Q9-1. Again, the effectiveness factor has a value every year, but the value doesn't get reset every year. At the beginning of time, a value ("effectiveness-proneness") is rolled up once. The mean and s.d. you set for 50 years afterward, together with the fact that it starts at 1 (or in other words, the mean and s.d. of the log start at 0), determines, as a linear function, a mean and s.d. for all the years in between. At each year, the effectiveness factor ends up being lognormally distributed. As before, if the effectiveness factor ends one s.d. higher than you expected, it's always one s.d. higher than you expected.
- Whether AI has been invented depends probabilistically on how many "research years" have taken place, with some distribution we found in A5.
- How many "research years" have taken place is determined by how many "research years" took place in each past year.
- How many "research years" took place in some past year T is determined by:
- some fixed constant representing a base of unenhanced researchers
- the number of researcher-equivalents from N-year-old embryo-selected researchers, for all N at least 20
- the multiplier, in year T, from other intelligence enhancement technologies
- How many researcher-equivalents are available in year T from N-year-old embryo-selected researchers is determined by the scale of adoption of iterated embryo selection in year T-N, and the effectiveness factor from genetic knowledge in year T-N.
- The scale of adoption of iterated embryo selection in year T-N depends on the time since the technology first became available, start and end parameters for a lognormal distribution, and a constant "adoption-proneness"
- The effectiveness factor from genetic knowledge in year T-N depends on the time since $1000 genomes first became available, end parameters for a lognormal distribution, and a constant "effectiveness-proneness"
All random variables here are independent, with the following exceptions. "Adoption-proneness", at different times, is perfectly correlated; "effectiveness-proneness", at different times, is perfectly correlated; and the multiplier from other intelligence enhancement technologies, at different times, is perfectly correlated.
Putting all these steps together, we find our final distribution for A9, which is shown in the graph. | s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917123549.87/warc/CC-MAIN-20170423031203-00601-ip-10-145-167-34.ec2.internal.warc.gz | CC-MAIN-2017-17 | 7,321 | 37 |
http://www.1-script.com/forums/laptop/ide-interface-for-notebook-hd-52119-.htm | code | Do you have a question? Post it now! No Registration Necessary. Now with pictures!
- Posted on
- IDE interface for notebook HD?
- martin lynch
May 19, 2010, 5:48 am
rate this thread
Is the interface for an IDE drive that comes from a notebook slightly
different from an IDE drive that comes from a desktop PC?
I have a 5 1/4" external HD enclosure, for which the IDE cables fit
into the socket of a desktop hard drive. However, I tried hooking it
up to the notebook hard drive from my HP Pavilion ZE1230 (which is
also spec'd as an IDE drive), and the pins in the cable don't line up
correctly to the drive. The number of pins is correct, but their
spacing is slightly different. Is it because the HD enclosure is
made specifically for desktop drives? Do I need to get a 3.5" HD
Thanks for any advice...
Re: IDE interface for notebook HD?
They are slightly different, as power is on the same connector.
You need somethimg like this:
Translations to/from FI not always accurate | s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476990033880.51/warc/CC-MAIN-20161020190033-00213-ip-10-142-188-19.ec2.internal.warc.gz | CC-MAIN-2016-44 | 976 | 20 |
https://sites.google.com/site/jackgrieveaston/home | code | I am a Senior Lecturer in Forensic Linguistics at Aston University in Birmingham, England. My research focuses on the quantitative analysis of language variation and change. I am especially interested in grammatical and lexical variation in the English language across time and space and the development of new methods for collecting and analysing large corpora of natural language. I also conduct research on authorship attribution and consult on casework as a forensic linguist.
I am very happy to announce that in July 2017 I will be moving to the Department of English Language and Applied Linguistics at the University of Birmingham as a Professorial Fellow in Corpus Linguistics. | s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917118310.2/warc/CC-MAIN-20170423031158-00524-ip-10-145-167-34.ec2.internal.warc.gz | CC-MAIN-2017-17 | 685 | 2 |
https://www.srichinmoylibrary.com/slt-57 | code | Dog problemsWhile running in Fort Lauderdale, as usual, I had dog problems. A dog started barking at me and didn't allow me to go by. When I returned home, I told Alo about the dog.
The following day she went to look for it, so that she could insult the owner. Luckily she found a different dog, so everything went peacefully.
Sri Chinmoy, Salutations, numbers 5-8, Agni Press, 1981 | s3://commoncrawl/crawl-data/CC-MAIN-2021-10/segments/1614178374616.70/warc/CC-MAIN-20210306070129-20210306100129-00191.warc.gz | CC-MAIN-2021-10 | 382 | 3 |
https://pimatic.org/plugins/pimatic-rtl433/ | code | Pimatic plugin to display datas from temperature and humidity sensors using a RTL-SDR compatible dongle. This plugin use the rtl_433 executable (https://github.com/merbanan/rtl_433)
Install dependencies (See rtl_433 readme for more details.):
sudo apt-get install cmake libtool libusb-1.0.0-dev librtlsdr-dev rtl-sdr
Change to your pimatic node_modules folder:
Clone the repository:
git clone https://github.com/Ax-LED/pimatic-rtl433.git
Change into plugin folder:
Thanks to merbanan and the rtl_433 community for their support and to maintain that very nice tool. Thanks to David Pirlot, his plugin pimatic-efergy-e2 was base of this plugin. | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335124.77/warc/CC-MAIN-20220928051515-20220928081515-00258.warc.gz | CC-MAIN-2022-40 | 642 | 8 |
https://forum.mutable-instruments.net/t/eurorack-firmware-code-questions/12940 | code | Wow, that’s a lot of stuff to cover! Let’s start from the beginning…
bypass() conditional has nothing to do with threading.
modulator_ is the class in which all the DSP code (for example computing the ring modulation between two signals) is contained, along with the state of all the DSP related things (for example: the active internal oscillator waveform).
What we’re checking here is if the DSP engine is in a special “bypass” mode. In this hidden mode, the two audio inputs are passed as is to the outputs, for purposes of factory testing. Another “testy” thing happening in this mode: the big knob glows in red, green, blue successively (for checking that the 3 components of the LED are all working).
milliseconds() returns the number of milliseconds elapsed since the module started. It is manually incremented by a call to
system_clock.Tick() (thus, something should be responsible for calling
system_clock.Tick(); 1000 times a second, we’ll soon see what it is).
milliseconds() & 4095 is a value that will ramp from 0 to 4095, at the rate of 1 increment per millisecond.
So the first 3 lines are generating ramps counting between 0 and 4095, with a 120° phase difference between them (well, 117°… sloppy me knew the value of 4000 / 3, not of 4096 / 3, so I just typed 1333 and 2667 ).
These ramps are then folded into triangles, counting from 0 to 2047 then down to 0. Divide by 8 (shift right by 3) to get values between 0 and 255. Then you get the R, G, B components to write to the main tricolor LED. We also set the bicolor LED to full brightness on both the R and G component.
Ui::Poll() contains all the code that is called on a regular basis to scan the state of buttons, encoders (and sometimes pots) and transmit information to the LEDs and displays.
Ui::Poll()? Either the interrupt handler for a 1kHz timer, called
SysTick_Handler(), and defined in the main module file (for example, check
rings.cc : https://github.com/pichenettes/modules/blob/master/rings/rings.cc#L68). This low level timer is a facility offered by all ARM CPUs - and is often used by RTOS for context switching.
Or the caller of
Ui::Poll() is the interrupt handler that is invoked whenever a buffer of samples is ready to written to/read from the codec. That’s the case in
warps.cc, check the
FillBuffer routine: https://github.com/pichenettes/modules/blob/master/warps/warps.cc#L63
Anecdote time: Warps’ buffer size used to be 96 samples, with a sample rate of 96kHz, so
FillBuffer() was called once per millisecond, my preferred rate for UI polling. I later reduced the buffer size to 60 samples to improve latency a bit, which means that
Ui::Poll is now invoked at a rate of 1.6kHz, so everything that relies on
milliseconds() is actually running at 1.6x the expected speed Doesn’t really matter, but it would have been more correct to move
Ui::Poll() to a
SysTick_Handler() to get the right rate.
Ui::Poll()… Since it is called 1000 times a second, it shouldn’t attempt to do anything that takes more than 1ms. Otherwise… stack overflow (if it always takes more than its allotted time) or audio glitches (if it occasionally takes more than expected)!
So whenever we detect a button press in
Ui::Poll(), we just shove an event in a message queue (the
Event object stores everything we need to know: what kind of control? which control? for how long has it been pressed?) and we just get out. We don’t attempt to do the actual thing the button press should do (like changing the state of the module, saving things, sending a SysEx over MIDI…), because it might actually take more than 1ms to do this thing!
When is it going to be handled?
Whenever the processor is done with
FillBuffer() (which contains the bulk of the audio processing code), and more generally whenever there is no interrupt to service, it returns back in the main loop. You can think of this loop as what the CPU is left to do whenever all the higher priority stuff is done (LED blinking? buttons checked? codec fed with audio? now let’s check for UI stuff to do!). This is in this loop that we call
ui.DoEvents(). It checks for unread messages in the event loop, and call the required methods to handle button presses or other types of events. With this organization of the execution time, the code handling the button presses is free to take as long as it needs: if necessary, it might be interrupted multiple times whenever something more useful needs to be done (like feeding audio to the codec).
Debate: polling vs interrupts for UI stuff
This code organization is not the only possible approach. For example, it is possible to ask the MCU to trigger an interrupt whenever there’s a change on the voltage at the pin hooked to the button. So we don’t have to check the state of the button continuously - we only get a notification when its state changes. Sounds cool, why am I not using that?
- Easy debouncing. My preferred debouncing technique (shove the read bits in a shift register, wait for a full string of 00000000 or 11111111 to decide that the button has reached a stable state) works better when the button is read continuously. Debouncing in ISRs… you need to start measuring intervals between calls to the ISR…
- Habit from desktop synth projects with many buttons, in which the buttons are all read by shift registers. In this case case the state of all buttons is streamed bit by bit to a single CPU pin, and a voltage change at this pin doesn’t mean anything about the state of a specific button.
- There are sometimes limitations on the number of interrupts one can subscribe to, or on the MCU pins that can receive interrupts. Not relying on interrupts gives me more freedom for deciding which signal is connected to what. Since buttons are not critical traces (low speed signals, no special function required), they tend to be assigned to whatever pins are left after all the important peripherals are hooked to the processor.
- When stuff happens in too many interrupt handlers, it gets hard to troubleshoot audio glitches/unregistered button presses. On all my modules, I can assume that
Ui::Poll() runs in constant time and uses about 0.2% of the CPU. Then the only thing I have to check for is that
FillBuffer() runs in less than 99% of its allotted time, and we’re left with a tiny bit of CPU for
Ui::DoEvents(). You can often find something called
PROFILE_INTERRUPT in my projects. When enabled, this toggles a processor pin at the beginning of
FillBuffer() and at its end. I can monitor this pin with my scope, the period of the waveform is the latency (buffer duration), and the pulse width gives me the CPU time consumed by the audio processing code. I can zoom on the falling edge and see if there are combinations of settings that increase the CPU use. I’ve shown this to a couple of people coding plug-ins or audio software, they were all insanely jealous | s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662527626.15/warc/CC-MAIN-20220519105247-20220519135247-00334.warc.gz | CC-MAIN-2022-21 | 6,907 | 43 |
https://www.tr.freelancer.com/projects/javascript/tide-tool/ | code | Bu iş için 13 freelancer ortalamada $156 teklif veriyor
Hi, I think I can do it:-)! Best regards, rentacoder:-)
We offer an outstanding technological value, while at the same time providing a high degree of quality industry-specific design services at very competitive prices. We have peak level expertise for each technology. We Daha Fazla
Our bid is for really very high quality work for your Tide Tool that will be made to be upgradable in case you need some upgrades in future. We will always be available for upgrades. Our bid includes six week free tech Daha Fazla
I have 7 Years Experience in Web Development, Software Development ,Search Engine Optimization and i am ready for this project.
Hello Sir. I'm Zend Certified Engineer with 5 years experience in web development. It's easy task for me so I can do it for 50$. I'm redy to start it right now. I guarantee your satisfaction and high quality of code. I Daha Fazla
Hi, please check out our web site at [login to view URL], Regards
We will doing all that you want (and more... :-))). Quickly, Professional, Quality - our answer you and your organization. We work more than 10 years.. There are questions? | s3://commoncrawl/crawl-data/CC-MAIN-2018-26/segments/1529267863939.76/warc/CC-MAIN-20180620221657-20180621001657-00061.warc.gz | CC-MAIN-2018-26 | 1,169 | 8 |
https://www.ballachulish-hotel.co.uk/things-to-do/top-10-things-love/port-appin-loop/ | code | Port Appin Loop
The home of the Holy Grail, a murder that inspired a classic novel, and some seriously stunning scenery.
It’s one of our Top 10 Things We Love – Port Appin Loop.
The loop in itself is a 15 mile track, but don’t worry if that sounds a bit much, there are smaller sections you can take on with ease. The track has a fairly low gradient throughout, so if you’re travelling on two wheels it’s very manageable, even for little peddlers.
You’ll find yourself at the heart of an unsolved clan murder mystery, while surrounded by stunning natural archways and lochs. It’s a great trail for birdwatchers, and if you’re lucky you might spot some seals too. This easy going coastal route has a brilliant combination of history and scenery.
Castle Stalker is a photographer’s dream, and you can’t miss it sitting on its own little island out in Loch Linnhe. If you’ve seen Monty Python and the Holy Grail, you’ll recognise it from the final scene. (If you haven’t seen it – you should watch it!). The Knights of the Round Table hunt for a Holy Grail, and it just so happens to be hiding in this beautiful castle.
Long before the Monty Python boys graced Appin, the village found infamy as the setting of a murder that caused one of the most celebrated miscarriages of justice in Scottish history – the Appin murder. It was this story that inspired Robert Louis Stevenson’s classic, ‘Kidnapped’, and 250 years on, people are still trying to solve this clan warfare mystery.
It all started when someone shot Colin Roy Campbell in the back. To this day, neither of the clans involved have admitted who the real culprit was, but it certainly wasn’t the man who was hanged, James Stewart.
Poor James didn’t stand a chance. His trial was rigged, and he was made to stand before a jury of 15 men, 11 of which were of the recently deceased’s clan – Campbell. The presiding judge also happened to be the Campbell clan chief. James was sentenced to hanging, but the injustice wasn’t to end there. His dead body was left for 18 months on the tall gallows, to send out a message to any Jacobites passing on the Ballachulish Ferry.
There’s no doubt that the West Coast is rich in clan history, but we’re pretty glad that we can give our guests a much warmer welcome now. | s3://commoncrawl/crawl-data/CC-MAIN-2019-09/segments/1550247518497.90/warc/CC-MAIN-20190222155556-20190222181556-00128.warc.gz | CC-MAIN-2019-09 | 2,311 | 10 |
http://aartiisrani.com/ | code | I am currently pursuing my master's degree in Human-Computer Interaction at DePaul University, studying the ways in which one can enhance the user experience.
I am an alumn of the University of Illinois at Urbana Champaign's General Engineering program with a concentration in Human-Computer Interaction.
I am an advocate for using user research to support design decisions and eliciting feedback from users throughout the development lifecycle.
My experience in Human Factors and User Experience Design includes research in Example-Finding Methods at the University of Illinois, reviewing user-interface designs that support dialysis therapy at Baxter Healthcare, and designing a campus maps interface to support employees at Allstate Insurance's Northbrook Office.
Beyond UX, I have strong leadership, communication, and creative thinking skills, which I believe are vital to successfully working in a collaborative environment.
Beyond exploring the world of UX and creating interfaces that resonate with users, I enjoy dancing as a part of Natya Dance Theatre, yoga, biking, and travelling the world.
Feel free to contact me at aisrani2 at gmail.com. | s3://commoncrawl/crawl-data/CC-MAIN-2015-27/segments/1435375099755.63/warc/CC-MAIN-20150627031819-00252-ip-10-179-60-89.ec2.internal.warc.gz | CC-MAIN-2015-27 | 1,153 | 7 |
https://synthiam.com/Community/Questions/No-Power-9545 | code | My EZ Robot isn't powering up correctly. I just took the unit out of the box for the first time, completed the barrel wiring and connected it to the battery case. The unit did nothing until I picked it up and touched the heat sinks with two fingers when it flashed briefly (both blue and red) and then went dark. The batteries are fresh and I've checked the connections on the sinks and they seem fine. I've searched the boards but can't find a diagnosis.
Can anyone help?
Upgrade to ARC Pro
Get access to the latest features and updates with ARC Early Access edition. You'll have everything that's needed to unleash your robot's potential!
Robot-Doc might be onto something
We need the solder to reach a certain temp so that it can properly bond the two surfaces together. Usually, not always, you can see a cold solder joint because it tends to look "duller" or pale in comparison to a regular solder joint which tends to be shiny.
Let us know what you find!
Also since you said that putting pressure (squeezing) the two heat sinks together would turn on the LEDs then look around the soldered contacts on the dc jack that is mounted to the board. It's possible that there could be a poor solder joint there as well. And while you're looking around make sure the screws that hold the two FETs against heat sinks are tight. | s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296950373.88/warc/CC-MAIN-20230402012805-20230402042805-00182.warc.gz | CC-MAIN-2023-14 | 1,324 | 8 |
https://courses.p2pu.org/es/activity/84915/ | code | publicó mensaje: Hi everyone,
Sorry for pushing things forward, but the suggested schedule includes:
10/13 - Verifiability, sources, references - WEEKLY GOALS: Contributing research and content.
10/20 - Peer-assessment, collaboration - WEEKLY GOALS: How to improve? Do it!
I've not been to the Thursday chat and hopefully we can agree/share a common subject in this forum and start the next task... any comments? | s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917123491.79/warc/CC-MAIN-20170423031203-00317-ip-10-145-167-34.ec2.internal.warc.gz | CC-MAIN-2017-17 | 413 | 5 |
https://www.nopcommerce.com/pt/boards/topic/89660/missian-plugin-refrence | code | I have added some Compiled Plugins Such as : "Shipping.FixedByWeightByTotal","Tax.Avalara" and ...
to "Presentation/Nop.Web/Plugins"but did not installed succeesfully, I tried following:
clean and Rebuild My Suoltion
but Not Work !
I Also tried Add Source of Plugins to "NopCommerce/Plugins" and set correct output directory then build plugin
I Also tried install plugin from admin panel
but non of above not work for me !
any one can help me what can i do to solve this ?
Important Note: I use 4.3.0 version and all plugins are 4.3.0 version | s3://commoncrawl/crawl-data/CC-MAIN-2021-49/segments/1637964363006.60/warc/CC-MAIN-20211204185021-20211204215021-00449.warc.gz | CC-MAIN-2021-49 | 542 | 9 |
http://www.wouldidateyou.com/account/join1.html | code | Create an Account
Please complete the form below to create your account at Would I Date You. Once you have an account, you'll be able to create your compatability quiz! This site is 100% free to use, now and always. And your privacy is protected.
All fields are required except your picture.
21f - Escanaba, MI
21m - Killeen, TX
Complete your registration to interact with our growing membership!
: Uncaught exception 'PDOException' with message 'SQLSTATE: Integrity constraint violation: 1062 Duplicate entry '1793574' for key 1' in /home/dateyou/php/ui/Component.php:169
#0 /home/dateyou/php/ui/Component.php(169): PDOStatement->execute()
#1 /home/dateyou/php/ui/Component.php(144): Component->logClick(NULL)
#2 /home/dateyou/public_html/account/join1.php(188): Component->drawFooter(NULL)
thrown in /home/dateyou/php/ui/Component.php
on line 169 | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170253.67/warc/CC-MAIN-20170219104610-00123-ip-10-171-10-108.ec2.internal.warc.gz | CC-MAIN-2017-09 | 848 | 12 |
https://discourse.webflow.com/t/collection-group-by-reference/21148 | code | I’ll explain my question with an example:
I have a blog post collection referencing the author collection. Is it possible to perform a count on the blog posts written by a particular author, so I could display a list of author names followed by the number of blog posts they have written.
- John Doe (3)
- Jane Doe (5)
Clicking the name would open a new page listing the blog post titles of that author.
Is this possible in webflow somehow? | s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662539101.40/warc/CC-MAIN-20220521112022-20220521142022-00527.warc.gz | CC-MAIN-2022-21 | 442 | 6 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.