url
stringlengths 13
4.35k
| tag
stringclasses 1
value | text
stringlengths 109
628k
| file_path
stringlengths 109
155
| dump
stringclasses 96
values | file_size_in_byte
int64 112
630k
| line_count
int64 1
3.76k
|
---|---|---|---|---|---|---|
https://pingquill.com/artificial-intelligence/top-deep-learning-algorithms-should-know/ | code | Deep learning has become very popular in scientific computing, and many industries that solve challenging problems use its algorithms.
How does deep learning work?
Deep learning is a type of machine learning that is used by artificial neural networks to do complicated calculations on vast amounts of data. A form of machine learning known as “deep learning” takes its cues from the structure and operation of the human brain.
How Do Deep Learning Algorithms Work?
Deep learning algorithms have representations that can learn independently, but they also depend on ANNs that work like the brain when they process information.
In deep learning models, several algorithms are used. While no network is flawless, specific algorithms perform better than others for particular tasks. You should know a lot about all the main algorithms to pick the right ones.
Deep learning uses different kinds of algorithms.
Deep learning algorithms can use almost any kind of data and need much computing power and data to solve challenging problems. Now, look at the top 12 deep learning algorithms in more detail.
Neural Networks with Convolutions (CNNs)
CNNs, also called ConvNets, have many layers and are mainly used to process images and find objects. In 1988, when it was called LeNet, Yann LeCun made the first CNN. It was used to figure out things like ZIP codes and numbers.
Networks for Long and Short-Term Memory (LSTMs)
Specific neural networks called recurrent neural networks (RNNs) might learn and remember long-term dependencies. The default behavior is to remember things for a long time.
LSTMs remember things over time. They help predict time series because they remember what was put into them. LSTMs are set up like a chain, with four layers uniquely talking to each other. In addition to making predictions about time series, LSTMs are often used for speech recognition, music composition, and drug development.
Neural Networks That Remember (RNNs)
Because RNNs have connections that produce directed cycles, the outputs from the LSTM may be used as inputs for the current phase.
The current phase receives the LSTM’s output. The current phase can remember the previous inputs because the LSTM has memory. RNNs are often used to put captions on images, look at time series, process natural language, recognize handwriting, and translate between languages.
The training data is used by generative deep learning algorithms (GANs) to create new data that resembles it. The GAN consists of a discriminator that learns from the simulated data and a generator that understands how to make fake data.
GANs have become more and more popular over time. By imitating gravitational lensing, they may investigate dark matter and enhance images of the night sky. Game makers employ image training to replicate low-resolution 2D graphics from vintage games in 4K or greater resolutions.
Radial basis function feedforward neural networks, or RBFNs, are one such network. They have three layers: an output layer, a concealed layer, and a layer. They are mainly employed for time series prediction, regression, and classification.
MLPs are a fantastic location to start getting familiar with deep learning technology.
MLPs are feedforward neural networks that have many layers of activation-function-equipped perceptrons. An output layer and an input layer are coupled in MLPs. Although they may have more hidden levels, they have the same input and output layers. Software for speech recognition, picture recognition, and machine translation may be created using them.
Self Organizing Maps (SOMs)
Professor Teuvo Kohonen came up with SOMs, which use self-organizing artificial neural networks to help visualize data and make it easier to understand.
High-dimensional data is complex for humans to understand, a challenge data visualization attempts to address. SOMs are made to help people understand this kind of detailed information.
Deep Belief Networks (DBNs)
DBNs are generative models of many layers of random, hidden variables. The binary values of the latent variables are often called “hidden units.”
DBNs are constructed from a linked stack of Boltzmann machines. Each RBM layer can communicate with both layers above and below it. Deep Belief Networks, or DBNs, recognize images, videos, and movements.
RBMs are Geoffrey Hinton’s stochastic neural networks. A probability distribution across a collection of inputs may be used to teach them.
This deep learning algorithm is used for reducing the number of dimensions, classifying, regressing, collaborative filtering, learning about features, and modeling topics. RBMs are the building blocks that make up DBNs.
The input and output of an autoencoder, a type of feedforward neural network, are the same. In the 1980s, Geoffrey Hinton made autoencoders to solve problems with learning without being watched. These neural networks are taught to copy data from the input layer to the output layer. To find new drugs, predict Autoencoders are used, how popular something will be, and process images.
Deep learning has changed over the past five years, and algorithms that use deep understanding are now used in many different fields. If you want to learn how to work with deep learning algorithms and enter the fascinating data science area, look at our Caltech Post Graduate Program in AI and Machine Learning.
To start your data scientist career, look at the most typical Deep Learning interview questions.
After reading this essay, if you have any queries concerning deep learning algorithms, please post them in the comments area. The specialists at Simplilearn will respond to your questions as soon as possible. | s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296816893.9/warc/CC-MAIN-20240414192536-20240414222536-00123.warc.gz | CC-MAIN-2024-18 | 5,674 | 33 |
https://bitcoin.stackexchange.com/questions/66935/what-underlying-data-structure-is-used-to-store-wallet-address-on-the-blockchain | code | I'm curious how websites like bitref.com can determine the balance of a bitcoin wallet very quickly.
I understand that the blockchain stores every single transaction across the thousands of blocks, so it's possible to reconstruct the balance of any wallet with this ledger. But wouldn't it take a long time to scan all these transactions?
Instead, does the blockchain actually store every single address in some sort of map? Would this also contain the balance of each address? If so, I can't find a website where I could view all the addresses on the blockchain. Does anyone know where I can find that? | s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296818312.80/warc/CC-MAIN-20240422144517-20240422174517-00187.warc.gz | CC-MAIN-2024-18 | 603 | 3 |
https://community.atlassian.com/t5/Sourcetree-questions/Starting-out-with-Git-and-Sourcetree-importing-an-existing/qaq-p/402243 | code | I'm new to both Git and Sourcetree. Currently my projects have no formal version control, but I do have a sprinkling of files that have been renamed when there's been a revision. The usual 'filename.php' and 'filename2.php' stuff. Projects also contain a fair number of images and similar files which are unchanging and also directories which I'd probably want to exclude from Git altogether.
It seems that if I set up a repository in the root directory of my project I get a lot of stuff included that I really don't want. I'm looking for a way to filter it out that's a bit cleverer than going through the file list in 'Working Copy Changes' and deleting one by one (or even in blocks).
For example, is there a way to exclude the entire 'images' directory ?
Supported Platforms macOS Windows We recently introduced support for additional hosting services such as GitHub Enterprise, GitLab (Cloud, Community Edition, Enterprise Edition), and...
Connect with like-minded Atlassian users at free events near you!Find a group
Connect with like-minded Atlassian users at free events near you!
Unfortunately there are no AUG chapters near you at the moment.Start an AUG | s3://commoncrawl/crawl-data/CC-MAIN-2019-13/segments/1552912203755.18/warc/CC-MAIN-20190325051359-20190325073359-00055.warc.gz | CC-MAIN-2019-13 | 1,165 | 7 |
http://ottawa-rasc.ca/wiki/index.php/Wiki_Planning_Page | code | Wiki Planning Page
New RASC Wiki
This wiki was set up to allow rapid publishing of pages with time-sensitive information. Eventually we'll also replace our main home page, and some other pages, with wiki pages.
RASC members with an established track record of publishing good quality, topic-appropriate information in other RASC publications, and who would like a user id enabling them to edit pages (subject to rules about acceptable content) should write to the webmaster. We have a Guide for New Wiki Users.
Progress Notes Etc
- Sandbox page (scratch area to edit, type, link, and generally make a mess while learning).
- Saunders site image gallery copied in from OAFs
- Discuss file and page naming conventions
- Discuss wiki user permissions and spam
- Discuss wiki format and style
- Discuss wiki extensions
- Discuss wiki release and integration plans
Setting Up RASC Wiki: to-do
- Set up skeltal replacement home page
Modify "what's new" code (old and new) to accept both <nowiki><a href=...></nowiki> format and wikitext links
- Modify feature article driver code to accept both <nowiki><a href=...></nowiki> format and wikitext links
- Implement sql-based "what's-new" list to replace flat file
Develop extension for rotating feature article Develop extension for automated "what's new" date and listing
- <s>Develop extension for automated meeting date display </s>
- Develop linked pages
Page introducing new Wiki-based web format Tidy up logo (white background behind the circle badge) Set up page footers Copyright Disclaimers About Privacy Set up user rights Only sysop can create new users Logged-in users can edit pages Anonymous visitors can edit talk pages Set up anti-spam measures CAPTCHA for comments (Test) Honeypot filtering Honeypot bait Spam blacklist filtering Fill out moon phases from May to end of 2009 Set up event calendar Copy and adapt OAFS calendar extension | s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187823478.54/warc/CC-MAIN-20171019212946-20171019232946-00326.warc.gz | CC-MAIN-2017-43 | 1,894 | 21 |
https://github.com/jkamenik/Patton-Interface-Comparison | code | Join GitHub today
GitHub is home to over 20 million developers working together to host and review code, manage projects, and build software together.
Fetching latest commit…
Cannot retrieve the latest commit at this time.
|Failed to load latest commit information.|
This is a simple web demo of using ExtJS to apply web2.0 style behaviors to an existing project. Ext contains the ext example, while Comparison contains the original. | s3://commoncrawl/crawl-data/CC-MAIN-2017-39/segments/1505818688103.0/warc/CC-MAIN-20170922003402-20170922023402-00540.warc.gz | CC-MAIN-2017-39 | 435 | 6 |
https://queirozf.com/entries/heads-up-for-deploying-scikit-learn-models-to-production-quick-checklist | code | Heads-up for Deploying Scikit-learn Models to Production: Quick ChecklistLast updated:
- General workflow
- Cached data
- Namespaces and pickled objects
- Training VS prediction time
- Missing data
- Log predictions
These are just heads-ups, specifically for scikit-learn, not a full workflow you can follow;
The problem of how to accurately deliver model predictions in production and at scale is a large subject in and of itself, requiring things like model monitoring, logging, etc.
Be careful with cached information.
We normally cache models, processed data and other things that take too much time to build.
It's important to have checks to make sure cached data matches what we are actually expecting.
Asserts have their place.
Python is not a statically-typed language so there will be times when simple mistakes that could be caught at compile-time will leak into run-time.
Asserts can check the sanity of your data and results.
Assets can be used to filter cases where you have syntactically valid data which makes no sense.
- in other words, cases when your models would still deliver predictions, but probably nonsensical ones.
Asserts help inform the reader about what some specific piece of code does, and what the underlying assumptions are.
- In other words, asserts are useful documentation too.
Namespaces and pickled objects
If you pickle a classifier or a pipeline and use custom classes and other resources, these must also be available at inference time.
For example, if you use custom steps in a pipeline, external data or things like that for training your model, these must also be available at inference time.
Training VS prediction time
Data preprocessing at prediction time must be exactly the same as at training time
This is also called the Training/Serving Skew.
If you require lots of preprocessing, such as extracting features from text, creating artificial features from incoming data and/or processing categorical data, you need to make sure the exact same process is done at prediction time!
Important: Wrap the whole preprocessing/classification code into just a few methods and call those at training and prediction times.
This is especially true for categorical data and one-hot-encoding with
- Categorical data must be encoded into dummy variables using the very same mapping at training and at inference time!
- Always set
categoriesattribute when using
pd.get_dummies(), to make sure you are encoding categorical data with dummy variables in the very same positions as you did at training time.
- Always use
For vectorizing text:
- Unseen text must be vectorized with the vectorizer fitted on the training data!
Whatch out for library versions.
When you train models, you use specific versions of libraries like numpy, pandas or scikit-learn.
If someone runs the very same code you wrote using slightly different library versions, things will break.
Always make evident what library versions you are using:
- PIN dependency versions
np.__version__and so on at the top of notebooks
- define versions in a
- encode the whole environment (OS-level stuff too) on a Dockerfile or something like that.
Watch out for NULLs and missing data
It's very common for there to be missing data at inference time.
Most sklearn classifiers will throw errors if you data has
np.nans, so you must remove them.
fillna()on each dataframe column with suitable default values such as:
""empty string for text data
0or some other marker for numerical data
- Missing categorical data should be handled by
You must log all predictions done by a more, be it realtime or batch.
At a very minimum, you must enable logging for:
Input Features (features for each item processed)
Model output (i.e. scores, classes, etc)
Scoring time (the exact timestamp the model was called) | s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296948951.4/warc/CC-MAIN-20230329054547-20230329084547-00134.warc.gz | CC-MAIN-2023-14 | 3,786 | 56 |
https://www.turnkeylinux.org/forum/support/20111204/turnkey-wireless-connection | code | I want a little turnkey server upstairs, but there is no LAN-connection. Could I use WiFi?
Take a look at this thread. You also might find my crib notes (last comment) useful.
Yes... but, I don't have a LAN-connection, ONLY WiFi.
I don't have onboard LAN.
But in practice it will be a struggle. Basically what you'll need to do is download the deb packages required (and any missing dependancies - from another internet connected machine) and manually install them on your TKL system. You'll need lots of patience and probably a bit of back and forth with a USB stick. If you are unfamilar with Linux then you'll probably want to also read about mounting USB devices from the commandline. It may also be possible via Webmin but I am not familar with it so can't offer much help there.
If you are willing to commit the time and energy I am sure you could get it to work, just depends how bad you want it! :)
If you keep in mind that TKL v11.x appliances are based on Ubuntu 10.04 then you will find plenty of relevant info via google and/or the Ubuntu forums and docs.
More information about text formats | s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917120187.95/warc/CC-MAIN-20170423031200-00610-ip-10-145-167-34.ec2.internal.warc.gz | CC-MAIN-2017-17 | 1,103 | 8 |
http://directoryhint.com/printer-driver/installing-onenote-printer-driver-windows-7.php | code | Last edited Nov 26, 2009 at 7:14 PM by DavidRasmussen, version 31 download Opera does not support ClickOnce X To install this application, save it and then open it. Click the Advanced Tab, select Send to Microsoft OneNote Driver in the Driver list, and then click Print Processor. Under Manufacturer, select Generic, select Generic / Text Only under Printers, and then click Next. Reply Melody says: November 13, 2012 at 11:20 pm What if you don't have that XPS at all?? this content
click on "Start (push button)" in "Start" 2. I looked in the control panel \ Programs and Features application to see if the XPS printer had simply not been installed by the manufacturer, but it was checked ON: Next, Click to select the Use an existing port option, select the appropriate port, and then click Next. To do this, follow these steps: In the printer list, right-click the Generic / Text only printer, and then click Properties. https://support.microsoft.com/en-us/help/952216/the-send-to-onenote-2007-printer-is-missing-in-the-print-dialog-box-in-a-2007-office-program
Click the Ports tab, and then click to select the Send To Microsoft OneNote Port check box. Reply Oliver Klozoff says: September 27, 2013 at 7:31 am When I right click on the printer, select Printer Properties, go to the Advanced Tab and under the Driver drop-down selection Let's get it back in no time! Click the General tab, change the name of the printer to Send To OneNote 2007, and then click OK.
If you receive the following message, click to select the Use the driver that is currently installed (recommended) option, and then click Next: Which version of the driver do you want Reply Reg Luther says: May 6, 2014 at 12:18 am Thank you for the solution to my problem.. Choose the destination section Next the following dialog will come up (sorry, not very pretty is it...) asking which of your OneNote sections you'd like the print out sent to. Send To Microsoft Onenote Port Missing Reply Marcia says: January 19, 2013 at 7:30 am I couldn't print to OneNote 2010 and tried repairing several times, even using the disk, but it didn't fix anything.
Reply Skip to main content Follow UsPopular Tagspowertoy OneNote addins testing software testing office Tip bug automation life at Microsoft equations XML API student troubleshooting Outlook source code math codeplex shared Onenote 2016 Printer Driver Reply Leave a Reply Cancel reply Your email address will not be published. Updating... https://answers.microsoft.com/en-us/msoffice/forum/msoffice_onenote-mso_other/send-to-onenote-2010-printer-driver-is-missing/21b5ae8c-a7db-4184-93df-8642253da7ca If you right click on it you can exit it, or change the settings.
I have the Windows 7 Enterprise 64 bit OS and MS Office 2010. Onenote Printer Driver Windows 10 What OS are you running. 32/64 bit os? click on "Next (push button)" in "Add Printer" 10. What a life saver Reply Mark says: May 23, 2013 at 5:01 am Except I don't have the following option: 2.
Reply Matt says: February 12, 2013 at 4:15 am I have the same problem as EugeniaE - the Send to OneNote 2010 option is completely missing. click on "Start (push button)" in "Start" 17. Send To Onenote 2007 Printer Driver Download Under Print processor, select winprint, select RAW under Default data type, and then click OK. Send To Onenote 2016 Missing Under Print processor, select OneNotePrint2007, select RAW under Default data type, and then click OK.
Every time I try to "send to OneNote" a notice comes up saying OneNote needs to shutdown. news Reply Richard Lowe says: October 29, 2013 at 9:45 am Fix for Office 2010 32Bit OneNote Printer issue The issue is it needs the Microsoft XPS Document Write printer installed before Then in the file name field at the bottom of this dialog type a name for the XPS file. I am running Office 2007. Onenote Printer Driver Windows 7 Download
Reply Todd says: October 31, 2015 at 10:14 am Thank you so much! Hope this helps. You may also restore/recreate the printer. http://directoryhint.com/printer-driver/installing-windows-generic-printer-driver.php Scroll down the Printers list to"Microsoft XPS Document Writer" in "Add Printer" 9.
Click the Ports tab, and then click to select the Send To Microsoft OneNote Port check box. Print To Onenote 2010 Reply Zappers says: August 29, 2012 at 2:05 pm Worked for me! I've run Install New Drivers, but OneNote remains MIA.
Click the General tab, change the name of the printer to Send To OneNote 2007, and then click OK. So now how do we go about configuring this newly installed generic printer for use with OneNote, follow these instructions for doing that: In the printer list, right-click the Generic / Windows 7 should have had the XPS printer installed already, but it was not there. How To Add Onenote As A Printer On Mac My system is 32 bit windows 7 Professional with Office Standard 2010.
When it is running you will see it in the system notification tray. Required fields are marked *Comment Name * Email * Website Current day month [emailprotected] * Leave this field empty * Notify me of follow-up comments by email. Reply John says: November 15, 2012 at 7:41 am You may need to download and install it: http://www.ehow.com/how_4830682_install-microsoft-xps-printer-driver.html Does this help? check my blog Warm regards, Sladjana Reply taoprs says: September 13, 2011 at 2:23 am thnx…it was the case for me…best solution on internet.
XPS2OneNote then removes the file from the drop folder and cleans up. OneNote does not appear? It also enables scaling the printout size. Read about the shutdown plan, including archive and migration information, on Brian Harry's blog.
If you do not see this option when you print a document and you know that Microsoft OneNote is installed, the printer driver may be damaged or corrupted. Reply Chris W says: March 1, 2013 at 7:56 am Work Great!!! Max Meng TechNet Community SupportMarked as answer by Max MengModerator Sunday, August 05, 2012 3:57 PM Monday, July 23, 2012 7:48 AM Reply | Quote Moderator 3 Sign in This is the best explanation I found on internet about this issue. | s3://commoncrawl/crawl-data/CC-MAIN-2018-34/segments/1534221215858.81/warc/CC-MAIN-20180820062343-20180820082343-00549.warc.gz | CC-MAIN-2018-34 | 6,105 | 14 |
https://www.physicsforums.com/threads/calculation-of-alpha-particles-from-226-ra-decay.833902/ | code | I am trying to solve the following problem for my graduate course in isotope geochemistry. If 1 g of 226Ra is separated from its decay products and then placed in a vessel, how much helium (cm3) will accumulate in the vessel in 60 days? Here is what I know. The decay series from 226Ra to Lead 206 (the final stable daughter) includes five alpha decays, and these will be the source of He2+ ions. I am assuming secular equilibrium because the half-life of 226Ra is >> 60 days. Ultimately, I know I will have to determine how many alpha particles are created in order to answer the question. However, I am not sure how to get started on the problem and was hoping someone could offer some help. | s3://commoncrawl/crawl-data/CC-MAIN-2018-30/segments/1531676594675.66/warc/CC-MAIN-20180722233159-20180723013159-00483.warc.gz | CC-MAIN-2018-30 | 693 | 1 |
https://sites.bu.edu/urban/products/reynolds-biobot/ | code | Wastewater Epidemiology: Estimating Opioid Usage from Sewage
Project Partner: Biobot Analytics, Winter and Spring 2020
Project Summary: Biobot Analytics collects data from cities’ sewage networks that can be used to estimate illicit drug consumption within a given wastewater catchment. For instance, by measuring the quantity of metabolites uniquely associated with fentanyl consumption, Biobot can provide estimates of opioid consumption within a catchment, providing near real time information to inform the fight against the opioid epidemic. But how much uncertainty is inherent in these estimates? This question was the focus of David’s project. By acknowledging the interdependencies between the large amount of metabolites measured by Biobot sensors and using a Bayesian framework, David was able to refine consumption estimates and quantify uncertainty.
Project Deliverables: Created a website on github explaining how to use hierarchical modeling to incorporate the results of previous scientific research into a current study, using the work with Biobot as an example. Visit here. | s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323587608.86/warc/CC-MAIN-20211024235512-20211025025512-00035.warc.gz | CC-MAIN-2021-43 | 1,094 | 4 |
https://www.tacticalbassin.com/blog/tag/pending | code | Tim was using 6 lb line and a spinning rod when this giant catfish bit! The fight lasted over an hour with so many drag screaming runs we lost track. Come along and watch the entire fight play out! The fish has been submitted for the Channel Catfish All-Tackle Length Record and is currently pending.
One of the most exciting aspects of fishing is that you never know what's going to bite. Tim was throwing a Neko Rig for bass on light tackle. He was searching for smallmouth when the big cat surprised him.
Quality tackle made all the difference in this fight! There is no doubt that lesser gear would have failed under the strain of the battle. Below is a breakdown of the gear Tim was using when he subdued this monster.
Rod- G Loomis NRX 852S JWR: http://bit.ly/2dX9zjv
Reel- Shimano Exsence 3000: http://bit.ly/2iMtscV
Line- 12 lb Sunline Braid: http://bit.ly/2tn8EzQ
Leader- 6 lb Sunline Sniper: http://bit.ly/2p7fxju
Lure- 5" Yamamoto Senko: http://bit.ly/2axAmNS
Weight- Swagger Tackle Tungsten Pagoda: http://bit.ly/2iGNSFW
Keeper- G7 Protect Tubes: http://bit.ly/2PWEkUs
Hook- Owner Mosquito Light 1/0: http://bit.ly/2zQVKx3
Camera Used: http://bit.ly/2RsLpjB
Scale Used: http://bit.ly/2f7QgQ9
Need Apparel? Tacticalbassin Gear is in stock! Get your hats, hoodies, and sunshirts by emailing [email protected] | s3://commoncrawl/crawl-data/CC-MAIN-2019-43/segments/1570987798619.84/warc/CC-MAIN-20191022030805-20191022054305-00243.warc.gz | CC-MAIN-2019-43 | 1,332 | 14 |
https://ellismercantile.com/products/corkys-waterslide-sandal-white | code | Slip into these sandals and heat to the nearest beach, pool or lake. Don't worry about getting them wet, they are made for water! These sandals are 100% EVA rubber making them completely waterproof and so comfy. They feature two straps with plastic buckles that are adjustable.
Fit: True to size. Corkys does not make half sizes, so if you are in between sizes, we recommend sizing up to the next whole size in order to ensure a proper fit.
*Colors may vary slightly due to monitor resolution and lighting* | s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296943749.68/warc/CC-MAIN-20230322020215-20230322050215-00354.warc.gz | CC-MAIN-2023-14 | 506 | 3 |
http://serverfault.com/users/83664/jack-douglas | code | I'm an Oracle certified Database Administrator (8i, 9i, 11g)
I've worked extensively with both Oracle and Postgres, in various roles from DBA to developer. I also have more limited experience with both SQL Server and MySQL.
11 How do I add items to 'Favorites' via GPO? dec 14 '12
4 Website high availability without load-balancer? jul 4 '14
3 Terminal Server Freezing mar 26 '12
3 Should I phase out our Windows Domain entirely? jun 6 '11
3 How do I add items to 'Favorites' via GPO? dec 13 '12
3 In CentOS 6.x, how can I upgrade to Kernel 3.4? dec 7 '12 | s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440644064869.18/warc/CC-MAIN-20150827025424-00227-ip-10-171-96-226.ec2.internal.warc.gz | CC-MAIN-2015-35 | 555 | 8 |
https://www.nonarrowthing.com/episodes/2018/2/21/17-the-opioid-crisis-and-harm-reduction-with-leo-beletsky | code | - Leo Beletsky at Northeastern University
- Beletsky, Leo et al. “The Law (and Politics) of Safe Injection Facilities in the United States.” American Journal of Public Health 98.2 (2008): 231–237.
- HarmReduction.org: Principles of Harm Reduction
- Aubrey Whelan, "Safe injection sites to fight opioid overdose deaths get green light from Philadelphia officials." Philadelphia Inquirer. 201.
- Olga Khazan. "Why Can’t Addicts Just Quit?" Olga Khazan. The Atlantic. 2017.
- Christine Vestal, "Injection Sites Provide Safe Spots to Shoot Up." Christine Vestal. HuffingtonPost. 2018.
- Abraham Gutman, "No, Philly did not just approve of ‘Hamsterdam’." Philadelphia Inquirer. 2018.
- Liz Giordano, "Yes or No? Safe Injection Sites Trigger Passion." Crosscut. 2017. | s3://commoncrawl/crawl-data/CC-MAIN-2019-26/segments/1560627999291.1/warc/CC-MAIN-20190620230326-20190621012326-00557.warc.gz | CC-MAIN-2019-26 | 773 | 8 |
http://freakangels.com/whitechapel/comments.php?DiscussionID=8049 | code | Vanilla is a product of Lussumo:Documentation and Support.
1 to 20 of 63
Fuck me, were you only really blown away by the art and concepts? Is that all? I can clearly see why you wanted more fully-explored characters and a complete plot, if all the rest of it did was really blow you away...
I've read some reviews that say there's too much to digest and it moves too fast, but I say "keep up, dorks". | s3://commoncrawl/crawl-data/CC-MAIN-2015-48/segments/1448398474527.16/warc/CC-MAIN-20151124205434-00295-ip-10-71-132-137.ec2.internal.warc.gz | CC-MAIN-2015-48 | 400 | 4 |
https://community.modx.com/t/bug-on-modx-hybridauth/1501 | code | Trying to submit bug on github but “the issue” has been disabled. So I post it here.
After installing this extra and playing around with it, I choose to uninstall it from the package manager. But then I realize that the uninstall process was not clean, even after I completely remove the package.
There are 3 things resides on modx installation:
- HybridAuth chunks
- table: ha_user_services
- the value of “extension_packages” in the table system_settings
The last one produces error log each time modx page loaded by user.
(ERROR @ /../core/xpdo/xpdo.class.php : 503) Path specified for package hybridauth is not a valid or accessible directory: /srv/data/web/vhosts/www.qudusiyah.org/modx-core/core/components/hybridauth/model/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652663016373.86/warc/CC-MAIN-20220528093113-20220528123113-00642.warc.gz | CC-MAIN-2022-21 | 738 | 8 |
https://github.com/signalfx/signalfx-agent/blob/master/docs/kubernetes-setup.md | code | The agent was first written for Kubernetes and is relatively easy to setup in a cluster. The agent is intended to be run on each node and will monitor services running on those same nodes to minimize cross-node traffic.
See the documentation on Monitoring Kubernetes for more information on how to use the UI components in the SignalFx webapp once you are setup.
Follow these instructions to install the SignalFx agent on your Kubernetes cluster and configure it to auto-discover SignalFx-supported integrations to monitor.
Store your organization's Access Token as a key named
access-tokenin a Kubernetes secret named
$ kubectl create secret generic --from-literal access-token=MY_ACCESS_TOKEN signalfx-agent
If you use Helm, you can use our chart in the stable Helm chart repository. Otherwise, download the following files from SignalFx's Github repository to the machine you usually run
kubectlfrom, and modify them as indicated.
daemonset.yaml: Kubernetes daemon set configuration
configmap.yaml: SignalFx agent configuration
Using a text editor, replace the default value
MY-CLUSTERwith the desired name for your cluster. This will appear in the dimension called
If the agent will be sending data via a proxy, see proxy support.
If docker and cadvisor metrics are not necessary for certain containers, see filtering.
If you have RBAC enabled in your cluster, you can look at the other k8s resources in the agent repo to see what is required for the agent pod to have the proper permissions.
If you are using Rancher for your Kubernetes deployment, complete the instructions in Rancher before proceeding with the next step.
If you are using AWS Elastic Container Service for Kubernetes (EKS) for your Kubernetes deployment, complete the instructions in AWS Elastic Container Service for Kubernetes (EKS) before proceeding with the next step.
If you are using Pivotal Container Service (PKS) for your Kubernetes deployment, complete the instructions in Pivotal Container Service (PKS) before proceeding with the next step.
If you are using Google Container Engine (GKE) for your Kubernetes deployment, complete the instructions in Google Container Engine (GKE) before proceeding with the next step.
If you are using OpenShift 3.0+ for your Kubernetes deployment, complete the instructions in Openshift before proceeding with the next step.
Run the following commands on your Kubernetes cluster to install the agent with default configuration. Include the path to each .yaml file you downloaded in step #2.
$ kubectl create -f configmap.yaml \ -f daemonset.yaml
Data will begin streaming into SignalFx. After a few minutes, verify that data from Kubernetes has arrived using the Infrastructure page. If you don't see data arriving, check the logs on a random agent container and see if there are any errors. You can also exec the command
signalfx-agent statusin any of the agent pods to get a diagnostic output from the agent.
Discovering your services
The SignalFx agent that is able to monitor Kubernetes environments is pre-configured to include most of the integrations that SignalFx supports out of the box. Using customizable rules that are based on the container image name and service port, you can automatically start monitoring the microservices running in the containers. Each integration has a default configuration that you can customize for your environment by creating a new integration configuration file.
For more information, see Auto Discovery.
Our provided agent DaemonSet includes a set of tolerations for master nodes that should work across multiple K8s versions. If your master node does not use the taints included in the provided daemonset, you should replace the tolerations with your cluster's master taint so that the agent will run on the master node(s).
Observers are what discover services running in the environment. For monitoring services, our agent is setup to monitor services running on the same K8s node as the agent.
For Kubernetes, there are two observers that you can use:
We recommend the API observer since the Kubelet API is technically undocumented.
Monitors are what collect metrics from the environment or services. See Monitor Config for more information on specific monitors that we support. All of these work the same in Kubernetes.
Of particular relevance to Kubernetes are the following monitors:
- Kubernetes Cluster - Gets cluster level metrics from the K8s API
- cAdvisor - Gets container metrics directly from cAdvisor exposed on the same node (most likely won't work in newer K8s versions that don't expose cAdvisor's port in the Kubelet)
- Kubelet Stats - Gets cAdvisor metrics through
/statsendpoint. This is much more robust, as it uses the same interface that Heapster uses.
- Prometheus Exporter - Gets prometheus metrics directly from exporters. This is useful especially if you already have exporters deployed in your cluster because you currently use Prometheus.
If you want to pull metrics from kube-state-metrics you can use use a config similar to the following (assuming the kube-state-metrics instance is running once in your cluster in a container using an image that has the string "kube-state-metrics" in it):
- type: prometheus-exporter discoveryRule: container_image =~ "kube-state-metrics" disableHostDimensions: true disableEndpointDimensions: true extraDimensions: metric_source: kube-state-metrics
This uses the prometheus-exporter monitor
to pull metrics from the service. It also disables a lot of host and endpoint
specific dimensions that are irrelevant to cluster-level metrics. Note that
many of the metrics exposed by
kube-state-metrics overlap with our own
kubernetes-cluster monitor, so you probably
don't want to enable both unless you are using heavy filtering.
Config via K8s annotations
When using the
k8s-api observer, you can use Kubernetes pod annotations to
tell the agent how to monitor your services. There are several annotations
k8s-api observer recognizes:
agent.signalfx.com/monitorType.<port>: "<monitor type>"- Specifies the monitor type to use when monitoring the specified port. If this value is present, any agent config will be ignored, so you must fully specify any non-default config values you want to use in annotations. If this annotation is missing for a port but other config is present, you must have discovery rules or manually configured endpoints in your agent config to monitor this port; the other annotation config values will be merged into the agent config.
agent.signalfx.com/config.<port>.<configKey>: "<configValue>"- Specifies a config option for the monitor that will monitor this endpoint. The options are the same as specified in the monitor config reference. Lists may be specified with the syntax
[a, b, c](YAML compact list) which will be deserialized to a list that will be provided to the monitor. Boolean values are the annotation string values
false. Integers can also be specified; they must be strings as the annotation value, but they will be interpreted as an integer if they don't contain any non-number characters.
agent.signalfx.com/configFromEnv.<port>.<configKey>: "<env var name>"-- Specifies a config option that will be pulled from an environment variable on the same container as the port being monitored.
agent.signalfx.com/configFromSecret.<port>.<configKey>: "<secretName>/<secretKey>"-- Maps the value of a secret to a config option. The
<secretKey>is the key of the secret value within the
dataobject of the actual K8s Secret resource. Note that this requires the agent's service account to have the correct permissions to read the specified secret.
In all of the above, the
<port> field can be either the port number of the
endpoint you want to monitor or the assigned name. The config is specific to a
single port, which allows you to monitor multiple ports in a single pod and
container by just specifying annotations with different ports.
The following K8s pod spec and agent YAML configuration accomplish the same thing:
K8s pod spec:
metadata: annotations: agent.signalfx.com/monitorType.jmx: "collectd/cassandra" agent.signalfx.com/config.jmx.intervalSeconds: "20" agent.signalfx.com/config.jmx.mBeansToCollect: "[cassandra-client-read-latency, threading]" labels: app: my-app spec: containers: - name: cassandra ports: - containerPort: 7199 name: jmx protocol: TCP ......
monitors: - type: collectd/cassandra intervalSeconds: 20 mBeansToCollect: - cassandra-client-read-latency - threading
If a pod has the
agent.signalfx.com/monitorType.* annotation on it, that
pod will be excluded from the auto discovery mechanism and will be monitored
only with the given annotation configuration. If you want to merge
configuration from the annotations with agent configuration, you must omit the
monitorType annotation and rely on auto discovery to find this endpoint.
At that time, config from both sources will be merged together, with pod
annotation config taking precedent.
If you are using Rancher to manage your Kubernetes cluster, perform these steps after you complete step 3 in Installation.
Using HTTP or HTTPS proxy
If the Rancher nodes are behind a proxy, ensure that the Docker engine has the proxy configured so that it can pull the signalfx-agent Docker image from quay.io. See the Rancher documentation for details on how to configure the proxy.
Use the following configuration for the cadvisor monitor:
monitors: - type: cadvisor cadvisorURL: http://localhost:9344
Cadvisor runs on port 9344 instead of the standard 4194.
When you have completed these steps, continue with step 3 in Installation.
AWS Elastic Container Service for Kubernetes (EKS)
On EKS, machine ids are identical across worker nodes, which makes that value useless for identification. Therefore, there are two changes you should make to the configmap to use the K8s node name instead of machine-id.
In the configmap.yaml, change the top-level config option
false. This will cause the agent to omit the machine_id dimension from all datapoints and instead send the
kubernetes_nodedimension on all datapoints emitted by the agent.
Under the kubernetes-cluster monitor configuration, set the option
useNodeName: true. This will cause that monitor to sync node labels to the
kubernetes_nodedimension instead of the
Note that in EKS there is no concept of a "master" node (at least not that is exposed via the K8s API) and so all nodes will be treated as workers.
Pivotal Container Service (PKS)
See AWS Elastic Container Service for Kubernetes -- the setup for PKS is identical because of the similar lack of reliable machine ids.
Google Container Engine (GKE)
On GKE, access to the kubelet is highly restricted and service accounts will
not work (at least as of GKE 1.9.4). In those environments, you can use the
alternative, non-secure port 10255 on the kubelet in the
monitor to get container metrics. The config for that monitor will look like:
monitors: - type: kubelet-stats kubeletAPI: authType: none url: http://localhost:10255
As long as you use our standard RBAC resources, this should be the only modification needed to accommodate GKE.
If you are using OpenShift 3.0+ for your Kubernetes deployment, perform these steps after you complete step 2 in Installation.
OpenShift 3.0 is based on Kubernetes and thus most of the above instructions apply. There are more restrictive security policies that disallow some of the things our agent needs to be effective, such as running in privileged mode and mounting host filesystems to the agent container, as well as reading from the Kubelet and Kubernetes API with service accounts.
First we need a service account for the agent (you will need to be a cluster administrator to do the following):
oc create serviceaccount signalfx-agent
We need to make this service account able to read information about the cluster:
oadm policy add-cluster-role-to-user cluster-reader system:serviceaccount:default:signalfx-agent
Next we need to add this service account to the privileged SCC. Run
oc edit scc privileged and add the signalfx-agent service account at the end of the
users: ... - system:serviceaccount:default:signalfx-agent
Finally in the daemonset config for the agent, you need to add the name of the
service account created above. Add the following line in the
spec section of
the agent daemonset (see above for the base daemonset config file):
Now you should be able to follow the instructions above and have the agent running in short order. | s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376828697.80/warc/CC-MAIN-20181217161704-20181217183704-00167.warc.gz | CC-MAIN-2018-51 | 12,440 | 116 |
https://soc.uic.edu/news-stories/what-im-up-to-now-spring-2019-lorena-garcia/ | code | What I’m Up to Now Spring 2019: Lorena Garcia
SOC 490-Igniting Sociological Futures: Senior Capstone Experience
I’m currently working on:
My book project on middle-class Latinxs. I also initiating data collection with my colleague, Amanda Lewis, and graduate students on a new project on racial disparities among the middle-class in Chicago (focusing on middle-class Black, Latinx and white residents in Chicago).
I recently published:
Fields, Jessica and Lorena Garcia. 2019. “Loving Possibilities in the Studies of Sexualities and Youth.” Pp. 300-314 in The Cambridge Handbook of Sexual Development: Childhood and Adolescence, edited by Sharon Lamb and Jen Gilbert. Cambridge, UK: Cambridge University Press.
Over winter break, I….
Traveled to warmer weather 🙂
My office hours are:
Mondays 11am-1pm and by appointment | s3://commoncrawl/crawl-data/CC-MAIN-2020-50/segments/1606141169606.2/warc/CC-MAIN-20201124000351-20201124030351-00237.warc.gz | CC-MAIN-2020-50 | 832 | 10 |
https://crockpotmoms.club/taste-test-cherry-coca-cola-usa-one-pot-chef/ | code | Today I try “Cherry Coke” which is something I’ve heard about in American movies and TV shows, but have never tried here in Australia. Is it Cherry flavoured Coke? Or Cherry flavoured soda with Coke branding? And is it actually any good? Watch and find out!
Want to Taste Test this item yourself? Buy it here: http://go.magik.ly/ml/40xi/
Subscribe to One Pot Chef (it’s free!): http://bit.ly/SubOPC
ONE POT CHEF COOKBOOKS – PAPERBACKS AND EBOOKS:
ONE POT CHEF COOKBOOKS ON iTUNES BOOKSTORE:
ONE POT CHEF APRONS + T-SHIRTS NOW AVAILABLE!
Filmed in 4K using the Sony FDRAX100 Video Camera – Check it out here:
Follow me on Social Media:
“Call to Adventure“
by Kevin MacLeod
Royalty Free Music – Used with Permission under Creative Commons license | s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506646.94/warc/CC-MAIN-20230924123403-20230924153403-00548.warc.gz | CC-MAIN-2023-40 | 762 | 11 |
http://www.tomshardware.com/forum/296219-28-booting-process-slow | code | More importantly, is this a recent development or has it been going on for a while? The solution could be as simple as using HijackThis to stop programs from loading at boot time to reinstalling a clean version of your OS -- or a dozen things in between. We just need more information to help.
msconfig for windows. Disable all the programs you dont need during boot, they will start later when you need them. That is what I did, now my laptop boots pretty quickly. I dont know how to do it with other OS. | s3://commoncrawl/crawl-data/CC-MAIN-2014-15/segments/1397609539447.23/warc/CC-MAIN-20140416005219-00474-ip-10-147-4-33.ec2.internal.warc.gz | CC-MAIN-2014-15 | 505 | 2 |
https://backpackstudent.com/2017/08/19/budget-manu-jungle/ | code | The first thing we noticed when we were trying to go to the Manu jungle in Peru, is that this could be very expensive! We saw crazy amounts asked by tour operators and travel guides. For instance, a week in the Manu jungle could cost you $1000 dollar per person if you do it with the wrong people. Also, the experience you’ll have would be less amazing because the location of the Manu Peru Amazon campsite is just amazing!
Manu Peru Amazon Jungle
After a long search, we found a website called Manu Peru Amazon and saw some better prices. For instance, the same week in the jungle would cost only $360 dollar per person. We even bargained another $80 dollar per person discount. It also included transfer, three meals a day and an even better jungle experience because their campsite is located apart from all the other campsites. Manu Peru Amazon has almost unlimited possibilities but we chose to do the 8d/7n work and travel.
Work and travel
You already saw it in the paragraph above, for this good price, we had to do a little bit of work. These were nice tasks we did in the jungle itself. Think about making new trails, planting trees and taking care of animals for example. These things didn’t take much time and were fun to do. And the extra bonus is ofcourse that, because you do a little bit of work, you’ll get a very good price to experience this amazing jungle. Next to this, we got more than enough time to search for rare animals, do trekkings and other fun stuff. You can read everything about our experiences from day to day here. Not bad right?
Go to http://us.manuperuamazon.com/html/pages/expedition.php.
Find the trip you want, email them and bargain a little.
Have fun and enjoy this amazing experience! | s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600401582033.88/warc/CC-MAIN-20200927215009-20200928005009-00718.warc.gz | CC-MAIN-2020-40 | 1,732 | 8 |
https://hydrogenaud.io/index.php?action=topic;sa=printpage;topic=112328.0 | code | My issue is that when I single-click on an artist or album in my facets panels it doesn't automatically update my playlist view on the bottom. I.E. in the attached photo I've selected Alice Coltrane's Eternity album, but it doesn't show in the playlist view unless I double-click the album to play it.
Any help would be greatly appreciated. I'm very new to Foobar so forgive me if this is a ridiculous problem.
Preferences>facets>Library subsection>Selection action>this is likely set to "none".
That did it. Thanks! | s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593655898347.42/warc/CC-MAIN-20200709034306-20200709064306-00152.warc.gz | CC-MAIN-2020-29 | 516 | 4 |
https://klipfolio.uservoice.com/knowledgebase/articles/56253-previous-use-iformbuilder-as-a-data-source | code | What's in this article?
- Learn how to use iFormBuilder as your data source.
- Retrieve iFormBuilder data using an API.
- Links to iFormBuilder resources.
How to use iFormBuilder as a data source
iFormBuilder is a mobile data collection platform that is used by remote workers to update data files using mobile devices such as a tablet. For example, a real-estate agent can record the results of a showing or update a listing on-site, without having to return to the office and plug the data into their desktop computer. This means that iFormBuilder is a great way to simplify data collection for remote workers, reducing both the time and paper-work required to keep metrics up-to-date.
Klipfolio lets you connect to your iFormBuilder data to create a data source and then build Klips for your dashboard. Since iFormBuilder is a web accessible resource, any data files uploaded will be automatically updated at a predetermined rate and any Klips using that data will also be updated.
Creating a data source using iFormBuilder
In order to create a data source using iFormBuilder, you will need to retrieve the Data Feed URL of the specific form you want to use (see the steps and image below). You can then use data enhancements in the URL to further refine the query – check out this documentation to learn more. It is also important to note that you will need to add your username and password to the end of the URL to access the data feed in Klipfolio. To do this, use the following format: “&USERNAME=xxxx&PASSWORD=xxxx”.
To create a data source using iFormBuilder:
Note: You will need to sign in to iFormBuilder in a separate browser window in order to retrieve the Data Feed URL.
- Click the Library link from your Klipfolio account.
- Select the Data Sources tab.
- Click on the Set Up a New Data Source button.
- Select the Web Accessible Resource option.
- Log in to your iFormBuilder account.
- In the Data Feeds column, select an appropriate form in an appropriate data format (Excel, JSON, XML).
You will be brought to the data view for that resource.
- Copy the URL from the browser window.
- Navigate back to Klipfolio.
- Paste the URL into the URL field.
- Add valid credentials to the end of the URL using the following format: “&USERNAME=xxxx&PASSWORD=xxxx”.
- Click the Get Resource button.
- Click the Continue button to verify the correct data was retrieved.
- Provide a name, description, and refresh rate.
- Click the Save button.
The data source is saved and will now automatically refresh in the Library for future use. | s3://commoncrawl/crawl-data/CC-MAIN-2019-35/segments/1566027317339.12/warc/CC-MAIN-20190822172901-20190822194901-00408.warc.gz | CC-MAIN-2019-35 | 2,553 | 27 |
https://spyro-networks.com/qa/quick-answer-how-do-i-get-really-good-at-sql.html | code | - How long does it take to get good at SQL?
- Is SQL a good skill to have?
- What are basic SQL skills?
- What is the toughest SQL query?
- Which database should I learn in 2020?
- Is SQL a python?
- How can I improve my SQL skills?
- What SQL certification is best?
- Is Python a coding language?
- Is SQL a coding?
- Is SQL hard to learn?
- Is Python harder than SQL?
- Is SQL worth learning 2020?
- Can you get a job just knowing SQL?
- How do I start SQL?
- How can I learn SQL for free?
- Can you learn SQL in a day?
- Is HTML a coding language?
How long does it take to get good at SQL?
It takes two to three weeks to learn SQL basics.
Depending on your study method it may take longer to learn SQL, and you will still need to continue to learn SQL throughout your career..
Is SQL a good skill to have?
SQL is an incredibly important and valuable skill employers desire. … As organizations seek to do more with their data, they will need more individuals with the skills to access and analyze that data. SQL is the skill that enables you to do just that.
What are basic SQL skills?
Here are the seven essential skills you will master:Learn to structure a database. … Author SQL statements & clauses. … Manage a SQL database. … Work with popular database systems like MySQL and PostgreSQL. … Master PHP. … Learn technical SQL data analysis for marketing. … Create a database using WAMP and SQL.
What is the toughest SQL query?
These questions are the most frequently asked in interviews.To fetch ALTERNATE records from a table. ( … To select ALTERNATE records from a table. ( … Find the 3rd MAX salary in the emp table. … Find the 3rd MIN salary in the emp table. … Select FIRST n records from a table. … Select LAST n records from a table.More items…
Which database should I learn in 2020?
Rank1.1.Oracle2.2.MySQL3.3.Microsoft SQL Server4.4.PostgreSQL7 more rows•Aug 4, 2020
Is SQL a python?
SQL is a standard query language for data retrieval, and Python is a widely recognized scripting language for building desktop and web applications. … Once you can write a query to join two tables, apply the same logic to rewrite code in Python using the Pandas library.
How can I improve my SQL skills?
Resources to practice SQLTeaching — If you like learn by example introductions to new languages this is the resource for you. SQLFiddle — Completely free form SQL practice. Build your own schema, run queries, or practice on a sample fiddle. If you like JSFiddle this is a similar tool.
What SQL certification is best?
Now let’s look at the details of our top five database certification picks for 2020.IBM Certified Database Administrator – DB2. … Microsoft SQL Server database certifications. … Oracle Certified Professional, MySQL 5.7 Database Administrator. … Oracle Database 12c Administrator.More items…•
Is Python a coding language?
Python is an interpreted, object-oriented, high-level programming language with dynamic semantics. … Python’s simple, easy to learn syntax emphasizes readability and therefore reduces the cost of program maintenance. Python supports modules and packages, which encourages program modularity and code reuse.
Is SQL a coding?
SQL (Structured Query Language) is a database management language for relational databases. SQL itself is not a programming language, but its standard allows creating procedural extensions for it, which extends it to the functionality of a mature programming language.
Is SQL hard to learn?
It is not really difficult to learn SQL. SQL is not a programming language, it’s a query language. … It is also an English like language so anyone who can use English at a basic level can write SQL query easily. The good news is that most DB engines are compatible with all SQL code.
Is Python harder than SQL?
As a language, SQL is definitely simpler than Python. The grammar is smaller, the amount of different concepts is smaller. But that doesn’t really matter much. As a tool, SQL is more difficult than Python coding, IMO.
Is SQL worth learning 2020?
Relational storage works. That’s why it’s been used for over 40 years. SQL works. … I’d say that absolutely solidifies that, yes, it’s probably worth it to learn SQL in the year 2020.
Can you get a job just knowing SQL?
Personal Development You may even decide that you like working with SQL enough to become an administrator or developer in the future. Knowing SQL is a huge plus for almost any job. Many firms are looking for people with a very comprehensive skill set – one that includes technical and programming skills.
How do I start SQL?
Here are a few steps you can take to jumpstart learning SQL on your own.Start Simple. No matter what method you use to learn SQL, you may be anxious to quickly dive in and test your new skillset. … Watch Tutorials. … Take a SQL Class. … Install a Free SQL Database.
How can I learn SQL for free?
25 Best Ways to Learn SQL Fast, Online and for FreeIntro to SQL: Querying and managing data via Khan Academy. … Codecademy’s free SQL Class. … Developing SQL Databases via EdX. … SQLcourse.com. … W3Schools SQL Class. … FreeCodeCamp’s SQL Course. … SQLZoo. … Introduction to Computer Science via EdX.More items…
Can you learn SQL in a day?
Basic SQL isn’t that big and you can probably learn a lot in a couple of days. In addition to the commands to query and manipulate tables and records (SELECT, INSERT, DELETE, etc.) … However, you can probably learn enough in two days to do some basic data manipulation.
Is HTML a coding language?
HTML, as a markup language doesn’t really “do” anything in the sense that a programming language does. HTML contains no programming logic. … This is because HTML is not a programming language. | s3://commoncrawl/crawl-data/CC-MAIN-2020-50/segments/1606141198409.43/warc/CC-MAIN-20201129123729-20201129153729-00202.warc.gz | CC-MAIN-2020-50 | 5,790 | 55 |
https://chrome.google.com/webstore/detail/snippet-to-codesandbox/bkmhfdpkdgbiaoeggdpbckgimgolpohc | code | Generate CodeSandbox from snippets
Create working CodeSandbox by selecting the text snippets. These makes testing of any npm package fast by just going over the docs or readme and generating the CodeSandbox from the provided snippets.
Currently only React is supported. But soon more frameworks and libraries will be supported. | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572908.71/warc/CC-MAIN-20220817122626-20220817152626-00733.warc.gz | CC-MAIN-2022-33 | 327 | 3 |
https://lulotexas.com/collections/the-bolso-tote/products/bright-green-leather-crossbody-perfect-size | code | We love crossbodies, and none more than one with a vibrant color! This precious bag is made of 100% green Colombian leather. If you'll notice, it's got contrast stitching - it's a yellow/green color that gives the bag a little more definition! Inside you'll see it's monochromatic, with a slightly lighter green canvas liner with three pockets - one zippered.
It's the perfect size for jetting around and will make your outfit pop! Would be so cute with jeans and a white T-shirt, or even a sundress! | s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500041.2/warc/CC-MAIN-20230202232251-20230203022251-00446.warc.gz | CC-MAIN-2023-06 | 500 | 2 |
http://windowssecrets.com/forums/showthread.php/62618-OE-6-wont-print-%286%29 | code | Results 1 to 2 of 2
Thread: OE 6 wont print (6)
2004-07-26, 17:24 #1
- Join Date
- Apr 2002
- Thanked 0 Times in 0 Posts
OE 6 wont print (6)
When trying to print an email using Outlook Express (v6 up-to-date) I get a box on the screen that basically says "Internet Explorer Script Error".
The "error definition" is:
Error: Interface not registered
I have tried "registering" shdoclc but I get an error back from that of:
C:WINDOWSSystem32shdoclc.dll was loaded, but the DllRegisterServer entry point was not found. This file cannot be registered.
Since OE uses the IE print engine, this also means IE won't print - same errors.
I have a feeling something is messed up in the registry but I have no idea what or where.
I also have Firefox and Thunderbird and they print fine so it is specific to IE.
2004-07-26, 21:29 #2
- Join Date
- Feb 2001
- Silicon Valley, USA
- Thanked 94 Times in 90 Posts
Re: OE 6 wont print (6)
I've researched similar sounding error messages in the past using Google (web and groups) and remember seeing a lot of conflicting advice. Because there are many similar looking error messages, and the error can happen on different lines, it's a challenge. Nevertheless, I suggest searching in the lounge and on the web for a combination of some of the more unique terms. Hope that helps. | s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218190183.80/warc/CC-MAIN-20170322212950-00192-ip-10-233-31-227.ec2.internal.warc.gz | CC-MAIN-2017-13 | 1,308 | 22 |
http://www.sharepointjoel.com/Lists/Posts/Post.aspx?List=0cd1a63d-183c-4fc2-8320-ba5369008acb&ID=540 | code | Not sure everyone got this email, so I wanted to share it with all my readers. This is THE conference of the year. See you there! This is a direct copy and paste from the email, and I have not changed the links.
November 12-15, 2012 · Las Vegas, NV
Register now to give yourself a competitive edge and get the inside scoop about 'SharePoint 15' while learning how to better use SharePoint 2010. Get informed with the best in the field: Engineers who built the product, Microsoft Certified Masters, and MVPs. Gain invaluable knowledge to increase your productivity and stay ahead of the game through hundreds of focused breakout sessions, hands-on lab environments, and instructor-led lab scenarios.
With over 65,000 customer organizations, more companies have chosen SharePoint as their primary collaboration tool than all other vendors combined. Register now to learn from the best in the industry and be a part of the unique experience only available at SharePoint Conference 2012! See you in Vegas.
© 2012 Microsoft Corporation. All Rights Reserved.If you prefer not to receive future promotional e-mails of this type from Microsoft, please click here to unsubscribe. We will promptly update your preferences; however, you may still receive previously initiated promotional communications from Microsoft. | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368710605589/warc/CC-MAIN-20130516132325-00055-ip-10-60-113-184.ec2.internal.warc.gz | CC-MAIN-2013-20 | 1,309 | 5 |
http://dailyhamradionews.com/why-ought-to-you-get-a-ham-radio-license/ | code | Some of the writers you read on Hackaday are amateur radio operators, and we often have a hacker chat on “Why be a ham today?” After all, you can talk to anyone in the world over the internet or by phone, right? What is the draw?
The Radio Society of Great Britain apparently shared the same thought and thought produced a great video answer the question. You mention the usual things: learning about technology, learning about people in other parts of the world, and disaster communication Radio sports (which seems to be more popular outside of the US; people compete for hidden channels).
Additionally, they talked a lot about how hams are included in space communications, from talking about satellites to talking to people on the space station to building small satellites. As the narrator says, there are “hundreds of ways to have technical fun with amateur radio”.
One thing that we noticed but didn’t say much about it is educational opportunities. There is a lot to learn, and working with children to help them learn is often very rewarding (and you usually learn something too). In order to forestall the comments that this post has nothing to do with hacking, we’re going to keep two things in mind: a Raspberry Pi will be displayed and shortly after the two-minute mark there is a very clever morse code key hacked together.
We talk a lot about amateur radio, starting with Arduino based digital modes put together portable stations (You can see a similar one in the video too). There’s no mention of another thing we noticed: it’s generally much easier today than ever to get a license. Most countries (including the United States) have abolished Morse code requirements. While some hams still enjoy CW (Hamspeak for running Morse code), this is not a requirement. | s3://commoncrawl/crawl-data/CC-MAIN-2021-10/segments/1614178362741.28/warc/CC-MAIN-20210301151825-20210301181825-00509.warc.gz | CC-MAIN-2021-10 | 1,794 | 5 |
https://www.bleepingcomputer.com/forums/t/115881/active-window-problem-in-xp/ | code | Posted 10 November 2007 - 09:31 AM
You would need to get some sort of theming application that would
decorate, if you will, the Window in question. Window Blinds is the only
one I''ve seen doing this in XP, but I'm sure there are some free options as
Please search for wincustomize on the Wikipedia.org website. The first option
typically directs you to all of the relevant information. Keep in mind that
wikipedia may or may not be accurate. | s3://commoncrawl/crawl-data/CC-MAIN-2018-43/segments/1539583515029.82/warc/CC-MAIN-20181022092330-20181022113830-00412.warc.gz | CC-MAIN-2018-43 | 442 | 7 |
https://www.freelancer.com.jm/projects/php-website-testing/whm-cpanel-amp-centovacast-servers/ | code | Hello! The idea is to have 2 different servers, one with radio hosting (centovacast) and the other with web hosting (whm/cpanel). I will provide you the servers! They are both vps! Your main job is to install EVERYTHING IS CONSERED TO BE GOOD for both servers! What i mean? You MUST install in the web hosting server, firewall, by-pass attacks, anti-hacking systems, several systems that will automatically check if the server runs normally, etc. In the case of "etc.", it will be better for you to suggest me what else i SHOULD have into the web hosting server.
>>The one who will tell me more will have more perspectives for being chosen<<
So, your main job, is to secure the server and install all the requirements that need to be installed! That applies to centovacast, too, since you will have to install it!!
The payment will be done after 1 week of completing this project!
The freelancer should:
1) make me aware of everything that he/she does in the server
2) have a constant communication with me, via e-mail or skype!
The project will be started in 1st of May 2013 (1/5/2013) | s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578582736.31/warc/CC-MAIN-20190422215211-20190423001211-00207.warc.gz | CC-MAIN-2019-18 | 1,086 | 8 |
http://qs321.pair.com/~monkads/?node_id=513715 | code | The second issue is headers and footers. HTML and Excel don't have them, but PDF does.
As per my earlier post -- you can utilize the proposed W3 extensions for this. For example, see this fragment taken from CSS Print to put a running page count at the bottom of pages:
font-family: Times, Palatino, serif;
content: "Page " counter(pages);
Sure, a lot of these standards are proposed/preliminary, but I think they offer a good place to start because a group of people have already been thinking about these sorts of challenges.
Code written by xdg and posted on PerlMonks is public domain. It is provided as is with no warranties, express or implied, of any kind. Posted code may not have been tested. Use of posted code is at your own risk. | s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323585348.66/warc/CC-MAIN-20211020183354-20211020213354-00655.warc.gz | CC-MAIN-2021-43 | 741 | 6 |
https://forum.fast-report.com/en/discussion/17653/extra-data-from-dialogue-forms-add-image-from-path-url | code | Extra data from dialogue forms / Add image from path-url.
We are using FR with standard database and its work great.
Now we need to add some extra row for out report. It is possible to add image using dialogue forms ? I know that i can copy path for image to "TfrxEditControl" but this is no clue..
I need just simple as it can be, print raport with pop-up dialog form where i chose path for my image form disc.
Any one have solution for this ? | s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500837.65/warc/CC-MAIN-20230208155417-20230208185417-00604.warc.gz | CC-MAIN-2023-06 | 444 | 5 |
http://www.nvnews.net/vbulletin/showpost.php?p=1432559&postcount=2 | code | Re: Black & White TV-out (FX5200)
So I've finally managed to fix my own problem, after about 2 days of googleing and trial and error. I tried setting all my settings to pretty standard ones, eg: 16bit color, 800x600, all standard nvidia settings (from the driver readme) etc.
Then I disconnect my s-video from the card / tv, and connected a,
s-video <--> rca cable. Basically the cable inputs svidio, and outputs a single rca (video) plug.
Plugged this into my Tv, and boom. Full color, Gl, etc.
Hopefully this advice helps other people out there with the same problem. | s3://commoncrawl/crawl-data/CC-MAIN-2015-32/segments/1438042986646.29/warc/CC-MAIN-20150728002306-00274-ip-10-236-191-2.ec2.internal.warc.gz | CC-MAIN-2015-32 | 569 | 6 |
https://lists.gnu.org/archive/html/emacs-devel/2020-09/msg01174.html | code | >>>>> On Mon, 14 Sep 2020 09:53:28 +0200, Thibaut Verron <[email protected]> said:
>> We could set 'kill-buffer-hook' to a querying function in buffers
>> created via the toolbar.
Thibaut> There is already a (buffer-local) variable buffer-offer-save which, set to
Thibaut> 'always, causes save-some-buffers to query for save the corresponding
Thibaut> buffer, if non-empty.
Right, but toolbar-save doesnʼt run save-some-buffers. That could be
added, but it seems people feel toolbar space is precious (here the
default toolbar uses slightly more than 50% of the available width
when running -Q)
The save button runs save-buffer, so it should DTRT already, no?
That covers the 'exiting emacs' scenario, weʼd still need something to
cover the 'clicked the kill-buffer button'.
That's correct, I didn't have this usage in mind. Kill-buffer-hook seems to
be more for cleanup, but kill-buffer-query-functions could do the job as a
first step (as in, "do you really want to kill without saving?"). I believe that
the most natural would be to add such a test to kill-buffer, since it already
takes care of modified file buffers.
All those approaches would also affect other commands killing the buffer,
preventing a user from accidentally losing data because of an unfortunate
Or if we really want to go
whole hog, we automatically save the state of buffers created via the
toolbar, and restore them on startup.
Restoring them as-is is what notepad++ does (or did when I last used it
10 years ago). I personally did not like this behavior, and I didn't have
remotely as many open files in notepad++ as I do in a typical emacs session.
On the other hand, auto-saving and offering to restore could be sensible. | s3://commoncrawl/crawl-data/CC-MAIN-2020-45/segments/1603107891624.95/warc/CC-MAIN-20201026175019-20201026205019-00110.warc.gz | CC-MAIN-2020-45 | 1,716 | 27 |
https://community.wordops.net/d/831-getting-access-forbidden-by-rule | code | I'm getting this error and timeouts when tried to do bulk deletions
access forbidden by rule, client: 2xxxxxxxxxxxxxxxxxxxxxxc494, server: host.com, request: "GET /purge/p
ropiedad/%25pagename%25/ HTTP/1.1", host: "host.com", referrer: "https://www.host.com/purge/propiedad/%25pagename%25/"
The client ip 2xxxxxxxxxxxxxxxxxxxxxxc494 is the ipv6 or ipv4 of the host.
nginx version: nginx/1.18.0 (WordOps Nginx-wo) | s3://commoncrawl/crawl-data/CC-MAIN-2021-04/segments/1610703522150.18/warc/CC-MAIN-20210121004224-20210121034224-00685.warc.gz | CC-MAIN-2021-04 | 412 | 5 |
http://shinebythree.com/2013/09/isabel-marant-parlourx-david-lawrence | code | A world in which pythons and flowers are friends.
Why hello again from steamy New York City - where the days remain swelteringly hot, and inky rain clouds roll in and out faster than Times Square traffic... which isn’t really rocket science. Come evening, though, wind factor and disappearing sunlight makes for necessary outer shells for fear of cold sweats and accelerated exhaustion, which Fashion Week has a habit of exacerbating.
Full post up at Harper's BAZAAR - such is the world in which pythons and flowers are friends (united, of course, by mutual colours and complementary textures).
Thanks to Candice for snapping these for me after the TOME presentation! | s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386164695251/warc/CC-MAIN-20131204134455-00059-ip-10-33-133-15.ec2.internal.warc.gz | CC-MAIN-2013-48 | 669 | 4 |
https://www.techspot.com/community/topics/geforce-6600-install-problems.43728/ | code | i got myself a sparkle geforce 6600 256 mb graphics card today. i put in my computer, got rid of all the drivers and installed it. itkeeps coming up with problem during install, invalid data. how can this be sorted? i have tried the latest nvidia driver and that didnt solve it either. my motherboard is an asus p4s533. | s3://commoncrawl/crawl-data/CC-MAIN-2018-05/segments/1516084888077.41/warc/CC-MAIN-20180119164824-20180119184824-00500.warc.gz | CC-MAIN-2018-05 | 319 | 1 |
https://www.dcdata.co.za/simplify-the-linux-command-line-with-fish-shell/ | code | The Linux command line is a tool that every system administrator should get to know. With the power of commands at your fingertips, there’s very little you cannot do. However, along with that power comes the need to remember those commands. When you take into consideration how complicated those commands can get, it’s understandable that some admins have trouble recalling what they have done or need to do at the Bash prompt.
You may have to issue the command:
iptables -A OUTPUT -o eth0 -p tcp -m multiport --sports 22,80,443 -m state --state ESTABLISHED -j ACCEPT
Or, maybe you recently secure shelled into a server, but don’t recall the IP address off hand.
What do you do? Most Linux admins would immediately tell you to look to your Bash history; and that would be sage advice. By typing the command history, you are presented with the last X amount of command you have run on the system. The X is determined within the ~/.bashrc file, in the line:
The history command is, in fact, a great way to see what commands you’ve issued. You can comb through that, find the command you need, copy it, and then paste it back into the prompt. Or, you can, at the command prompt, simply start tapping the up arrow on your keyboard until you land on the command you need.
What if I told you there was a much, much, much easier way? There is, and it’s called fish. Fish is a friendly, interactive shell that can be installed on your Linux machine and features:
- Man page completions
- VGA color
- Web-based configuration
- Ease of use
I’m going to walk you through the installation and usage of the fish shell; once you’ve started using this handy tool, chances are you’ll never go back to the standard old Linux shell again. | s3://commoncrawl/crawl-data/CC-MAIN-2018-47/segments/1542039743216.58/warc/CC-MAIN-20181116214920-20181117000920-00447.warc.gz | CC-MAIN-2018-47 | 1,736 | 12 |
https://www.telerik.com/forums/validation-messages-resizing-the-modal-window | code | By using the Kendo validator on a modal window (kendo-window) containing some required fields, I've got this issue:
- I try to save everything without filling the fields, the validation messages will appear below the required fields, resizing the modal window;
- I fill a required field and then click the save button. This required field will lose its focus, triggering the validation event that will hide the validation message, thus resizing the window and because of that, the click event on that save button will not be fired because the button is not below the cursor anymore;
I saw that there is a validateOnBlur option that I need to be enabled but it is used only when the field lose its focus. Is there a way to fire the validation event while the user is typing or changing the field data? It would fix that problem because the modal window will be resized before the user can click on the save button.
I am using the VueJS Wrappers. | s3://commoncrawl/crawl-data/CC-MAIN-2021-49/segments/1637964362923.11/warc/CC-MAIN-20211204003045-20211204033045-00343.warc.gz | CC-MAIN-2021-49 | 944 | 5 |
http://www.apppicker.com/apps/442414918/ohmapp | code | OhmApp help you to check if your resistor is available (in the appropriate E series) and the resistior color code.
This works of course in both ways.
A calculator for your LED series resistor is included.
Here you get the next possible resistance and the power dissipation at the resistor.
It shows the most important values on a circuit.
Of course you are get also defined valuesfor some LED colors. | s3://commoncrawl/crawl-data/CC-MAIN-2018-43/segments/1539583514497.14/warc/CC-MAIN-20181022025852-20181022051352-00457.warc.gz | CC-MAIN-2018-43 | 400 | 6 |
http://ngemu.com/threads/cant-select-pec-as-a-video-plugin.149401/ | code | Hi, I know this has been asked many times before, but hopefully my thread will be easier to find for other who get the same problem. I've installed both epsxe 1.5.2 and Pec fine, and selected the plugins folder (i have gpupec.dll in the plugins folder). But whenever i try to select psx emu cheater 2.5 from the drop-down list, it says to re-start epsxe for the changes to take effect. When i do that and check if it has been selected, the bar is blank, meaning it hasn't really been selected. Also, whenever i try and configure it, epsxe crashes. I tried putting in the plugin i want directly into the pec.ini file, but that doesn't work either. If it means anyway, i installed both epsxe and pec in the Program Files. I had this working months back, and i don't remember changing anything, but now it's not working. Please help me out with this =\ Regards EDIT: I used Karas81's plugin folder and now it's working. http://forums.ngemu.com/showthread.php?t=108138&highlight=psx emulator cheater My Pec plugin might have been corrupted or something, even though i re-installed. Anyway, sorry for opening this thread i guess, i still do hope it helps others. | s3://commoncrawl/crawl-data/CC-MAIN-2014-15/segments/1398223206147.1/warc/CC-MAIN-20140423032006-00192-ip-10-147-4-33.ec2.internal.warc.gz | CC-MAIN-2014-15 | 1,157 | 1 |
https://www.aries-dtp.ac.uk/studentships/is-the-ocean-short-of-breath-due-to-global-warming/ | code | Prof Carol Robinson (UEA Environmental Sciences)
Dr Luca Plimene (PML)
Dr Bastien Queste (UEA Environmental Sciences)
The ocean is running out of oxygen. This de-oxygenation is reducing the habitats available for fish and other marine organisms and can alter global biogeochemical cycles. Yet, our understanding of why oceanic oxygen is diminishing is severely limited: state-of-the-art Earth System Models can only account for about half of the observed oxygen decline, likely because we have a poor understanding of the processes responsible for ocean de-oxygenation (Oschlies et al., 2018).
- To quantify how oxygen consumption by marine organisms changes as a function of temperature;
- To quantify how this temperature-dependence varies with geographic region and season.
- To develop model new parameterisations of the process.
You will be based at the Plymouth Marine Laboratory where you will determine oxygen consumption rates from Biogeochemical-Argo floats (video) deployed in the global ocean (Hennon et al., 2016) and analyse their variability with temperature, depth, season and geographic location (Brewer and Pelzer, 2017). Using the new knowledge gained from these data, you will also improve existing biogeochemical models of oxygen consumption in the ocean.
You will receive training in ocean biogeochemistry, data analysis and visualisation, scientific programming, laboratory determination of oxygen concentrations, ocean biogeochemical models, and oral and written presentation skills. You will contribute to the PICCOLO project and take part in an oceanographic expedition in Antarctica (Weddell Sea) on the newest NERC polar research vessel, the RSS Sir David Attenborough, during which you will determine ocean oxygen concentrations. You will collaborate with dynamic research teams at the Plymouth Marine Laboratory and the University of East Anglia. You will present your findings at international scientific conferences, in peer-reviewed scientific publications and in a PhD thesis.
We seek an enthusiastic, proactive team player with strong scientific interests and self-motivation. You will have at least a 2.1 honours degree in physics, chemistry, mathematics, computing, or a branch of environmental science.
The successful candidate will be registered for a PhD in the University of East Anglia’s School of Environmental Sciences. | s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578602767.67/warc/CC-MAIN-20190423114901-20190423140901-00351.warc.gz | CC-MAIN-2019-18 | 2,365 | 11 |
https://www.oreilly.com/library/view/documentum-65-content/9781849680226/ch06s06.html | code | A group is identified as a privileged group when the value of the property
privilege group. A privileged group is a group whose members are allowed to perform privileged operations even though the members do not have those privileges as individuals.
Privileged groups are used in the context of privileged DFC, which is a DFC instance recognized by a Content Server as privileged to invoke higher privileges or permissions for a particular operation than it may have otherwise. Sometimes the user running an application may not have the privilege or permission to perform an operation, which the application needs the user to perform in that context. In such a situation, a privileged DFC instance can request to use a privileged ... | s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578530253.25/warc/CC-MAIN-20190421060341-20190421082341-00139.warc.gz | CC-MAIN-2019-18 | 733 | 3 |
https://pybit.es/python-lookup.html | code | A quick post on a fun trend we saw on Twitter this morning: people posting how long they coded for and what they still had to lookup. Some of this is tongue in cheek of course, but the point is that programming is not easy. Secondly there is no shame in looking things up, we all do it! What do fellow Pythonistas say?
It seems to have started here:
Hello, my name is Tim. I'm a lead at Google with over 30 years coding experience and I need to look up how to get length of a python string. tweet
Or maybe even here:
Hello, my name is David. I would fail to write bubble sort on a whiteboard. I look code up on the internet all the time. I don't do riddles. tweet
StackOverflow to the rescue, as Pythonista Luciano Ramalho tweets:
Hi, my name is Luciano, I've been coding for almost 40 years now, and I believe StackOverflow is the best thing since array bounds checking. tweet
Some fun examples here (Python bloggers, take note ...).
We definitely have been here:
CSV files cannot be written without Google:
... I still google to read/write csv files.
Logging (setup) is hard!
... I still copy paste from the logging cookbook. #python
What was the difference again between json dump and load? And when to add the extra -s?!
... I've been using Python for more than 4 years and still forget the difference between json dump(s) and load(s)
Negative slicing, maybe not so clear to the next maintainer of your code:
... I've been doing Python for a few years now. I have to check the docs when I need list slicing with negative indexes.
Luckily we have the REPL, just type python + enter, and play:
... using Python since 2001. I still keep many tabs of stdlib docs open, and check often in a REPL as a normal worflow.
True, writing a book or blog you still have to look up stuff:
... I wrote a widely read book about Intermediate Python and I still have to use Stackoverflow and Google while coding.
Yep, we looked this one up too last week:
... I always confuse .sort() with sorted().
We can't remember map parameter order either, list comprehensions do fit in our memory (and are more elegant) :)
... still can't remember if its map(fn, iterable) or map(iterable, fn)
The tedioust Python code to write indeed, we always need to copy it from somewhere ;)
... I always copy if __name__ == "__main__" from another Python script because I cannot count the underscores
Regex stuff (re module) is hard to do from memory (specially group() vs groups() on a matched object!):
... I need to check docs on pretty much everything in the 're' lib before using it
We share the feeling, we too have to lookup datetime docs everytime we work with dates:
... I can't use date and timezone properly without google
One of these things you open a quick REPL session for:
... I still have to use the REPL to figure out how slices work.
Oh and don't forget the whitespace, luckily it's simple to set (and forget) in Vim:
... I can't write python without something to manage my whitespace.
... contributor to many scientific python projects, and I just spent 40 min debugging because I had an extra space on one line.
This happens all the time to us too:
... I always forget about the crontab's entry time order and need to lookup at the man page.
... I'm using bash since 15 years but still have to Google the syntax of 'find -exec' every time I use it.
To have a laugh you can read more generic programming examples here
... I've been coding in Python for 4 years now and I still haven't learned any better languages.
You can share your experience with us via Twitter.
Keep Calm and Code in Python!
-- Bob and Julian
Do you want to get 250+ concise and applicable Python tips in an ebook that will cost you less than 10 bucks (future updates included), check it out here.
"The discussions are succinct yet thorough enough to give you a solid grasp of the particular problem. I just wish I would have had this book when I started learning Python." - Daniel H
"Bob and Julian are the masters at aggregating these small snippets of code that can really make certain aspects of coding easier." - Jesse B
"This is now my favourite first Python go-to reference." - Anthony L
"Do you ever go on one of those cooking websites for a recipe and have to scroll for what feels like an eternity to get to the ingredients and the 4 steps the recipe actually takes? This is the opposite of that." - Sergio S | s3://commoncrawl/crawl-data/CC-MAIN-2021-21/segments/1620243991562.85/warc/CC-MAIN-20210519012635-20210519042635-00597.warc.gz | CC-MAIN-2021-21 | 4,372 | 49 |
https://d3comicbookspot.com/products/invincible-130 | code | Mark never wanted to return to Earth… but now he finds himself face-to-face with Robot, and no matter how hard he tries he just can’t forget all the evil he has done. This could get ugly.
STORY: ROBERT KIRKMAN
ART: CORY WALKER & NATHAN FAIRBAIRN
COVER: RYAN OTTLEY & JEAN-FRANCOIS BEAULIEU
AUGUST 17 / 24 PAGES / FC / T+ | s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590347410535.45/warc/CC-MAIN-20200530231809-20200531021809-00198.warc.gz | CC-MAIN-2020-24 | 324 | 5 |
http://flexitimers.com/xbox-360/answer-xbox-360-disc-reading-error-open-tray.php | code | Ive even reinstalled the Nvidia Video the driver is mishandling memory. The blue screen didn't happen as any help you can provide. The drives are a slightly-older 250GB Hitachithe problem at all.I can see that the error question, but any info would be great.
Refitted the processor also restored now that I bumped the thread. The backlight only seems to xbox weblink mine. What type of PSU you got? reading My Xbox 360 Wont Read Discs They made it for me much but still happened at lot. The error message does statewill be greatly appreciated.
Even booting the computer, my sister's Sony Vaio VGN-NR120E has a damaged keyboard. Also have you checked that the fans are running and the computer 360 right next to you.This doesn't happen when I scroll through a the graphics card at the moment, but I'll try ASAP.
The physically the the laptop is posting. So I went back to the place Ilaptop model ASUS X51r. Open Tray Error Xbox 360 Maybe someone else can tray trouble symptom? The replacement was done by a certified technician.These are currently whatto help with this.
It did happen a lot It did happen a lot It also may have been damaged I can't remove
offer a bit more advice.If no then please suggest512mb version or the 1gb version?Screen Is fine when I'm not watching any card is just not turning the backlight on.
Also, is your grfx card theidea about this thing?It shows the American trends bios screen for Xbox 360 Open Tray Error Permanent Fix Card Update from earlier, still nothing.He suggested that reinstalling windows might do the greatly appreciated; sorry for the long post. After i format my laptopthen, until it just got too annoying.
It kept occurring every now and open being detected and was making a clicking sound.And If I tryof him because nothing was really happening.Prior to the replacement all I had open may be due to the 2gb of RAM.So, I proceeded to order http://flexitimers.com/xbox-360/guide-xbox-360-open-tray-error-disc-not-spinning.php 360 windows folder, though the background thudding is still there.
I found a place to buy went about 4 times.That is WHILEthe road it could be almost entirely unusable... I discovered that if I restarted for mid range gaming.After that he couldn't see error You didn't mention what the make and model of your laptop is.
I have a reading this you?ll see why I can?t. I'll check it out with a friend ofmakes the laptop less mobile.Every time I talk to them they tray here that I'm not using.Also, the crashing during resource heavy games F8's must not have that feature"...
What is the technology I have to reading settings etc and they are correct.In particular can anyone identify the look for in order to know this? The original problem was the drive was not Xbox 360 Double Click Error a replacement drive, an identical unit.Then ask me to do things I can?t think of right now.
We cannot see this laptop. Okay, so his comment is here card seems fine. I have checked all power
from various bits and pieces.Tag G6N6ZC1 express tag 35230271329 What is theit's a connection issue.I got it reading trick, so I thought why not, and I did.
Recently I have been getting lag spikes display is on by the way... After that, in brackets would be something How To Reboot Xbox 360 platters in another drive?I have a bunchask me my model number and serial number... psu and i want to replace it.
Also the processor Vccp voltages are getI can choose from.Thing would say STOP: 0x00000113of things again, which didn't work.That was the last I sawthe motherboard Can anyone decypher this mb code from my Dell D520 ?Then he updated a whole lotto do was press the power buitton.
Edit 2: Occasionally it will stay http://flexitimers.com/xbox-360/repairing-xbox-360-slim-open-disc-tray-error.php on to emit a series of beeps.I would list everything but afterabout 1 second and then the backlight turns off.I don't think do to my processor (AMD Athlon 64 3200+). Please help me, thanks! Move the sound card to another slot on Xbox 360 Wont Open Tray it, eventually it would load windows.
The laptop backlight then comes on and will there will be a main wireless router. We need this infoto launch a Video.It means that at any time on work find if I disconnect the external monitor. I've looked on the mbDeskstar which is not very common I guess.
Any help with this would be circuits at spots U31 and C51 ? Anyone have anbought it from and they took it overnight. But that didn't fix Open Tray Error Xbox 360 Slim like this: (0x00000004,0x861D2460,0x000000000,0x0000000000) So the whole ?Stop? disc And then they say "oh,also facing the same problem.
I'm sure Rage_K_Moiz will chime in, card, but that also made no difference. I've also tried removing my TV tunerbut there is no mfg. Hello, In my new place, How To Fix Xbox 360 Open Tray Error Without Opening Xbox videos of any type or running a Game.I know this is a bigtemperature seem normal.
Can I try the the screen Spazzes out. Thankyou in advance forme some points of changes. 360 I want thisshould only take about bout 350/400w min. He is our PC Hardware guru many thanks Ashley
He came and the part (ebay, various other sites, etc. I bet you are using a laptop, or your desktop computer has only about 18-24 months ago. We are not standing out of recommended range ie 0.00 volts.And a few others that that aren't possible on this model laptop...
I have a machine with a failing isn't overheating? Sometimes the backlight won't turn on in the laptop. Any input or leads (0x00000004,0x861D2460,0x000000000,0x0000000000), or similar with different numbers. | s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267163146.90/warc/CC-MAIN-20180926022052-20180926042452-00333.warc.gz | CC-MAIN-2018-39 | 5,564 | 22 |
https://randolphwest.ca/category/sql/sql-server/page/4/ | code | Picture it: Sandton, 2007. The launch of a 150-day plan to migrate a set of disparate systems into a fully integrated hybrid data warehouse system running Microsoft SQL Server 2005 and associated plugins. Some of us (including me) are a little bewildered by the prospect, especially considering the volume of data and applications that need to migrate in this short period of time.
Almost a whole week since my last post … sorry to the regular readers!
On the Animaniacs, there used to be a segment called "Good Idea, Bad Idea", which was probably my favourite next to Pinky and the Brain.
Phew, it's been a while since I posted!
A bugfix release of ShutOff 2000 has been released, thanks to some feedback from a new customer. Visit http://itsol.co.za/ for more information.
From 8 to 12 January 2007, I attended a couple of Microsoft Training courses. These were:
I got a new PC at work: the Dell Precision 490. It's a replacement because my older HP wasn't coping with the massive amount of processing we're doing for SQL reports.
SQL Server 2005 is fun, especially when enough hardware is thrown at it. However, I still cannot get SQL Server 2005 to add a linked 2000 server to it. No one can seem to help!
I'm getting a new PC at work in the near future because this beast is too slow and the hard drive isn't big enough for the massive reports that I have to automate.
As some of you know, I changed jobs at the beginning of September. More than six weeks later, I'm very happy with my decision. I signed a confidentiality agreement so I can't talk about details (obviously), but I am very happy with my prospects. | s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100535.26/warc/CC-MAIN-20231204214708-20231205004708-00320.warc.gz | CC-MAIN-2023-50 | 1,621 | 10 |
https://www.npmjs.com/package/clean-css-uncss-brunch | code | Why two proceses in one plugin?
In this case we have two processes excuted on the same. I have not seen a possibility to queue two plugins wchich will do the same, so I queue these processes in one plugin.
Need for clean-css or UnCSS - not both in one plugin?
Install the plugin via npm with
npm install --save clean-css-uncss-brunch
Or add it to package.json dependencies:
To specify options, use
config.plugins.cleanuncss object in Brunch config file.
You can use all standard options for clean-css and UnCSS.
plugins: cleanuncss: uncss: options: csspath: '../styles' htmlroot: 'build' files: ['index.html', 'about.html'] cleancss: keepSpecialComments: 0 removeEmpty: true
Plugin is created to use both clean-css and UnCSS. Technically, UnCSS is base for both processes - if you don't set options for UnCSS, nothing will happen (actually, you will see error in your console/terminal, but no data will be processed). If you want, you can to not set clean-css options. But then you'll have just uncss-brunch-like plugin. | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572089.53/warc/CC-MAIN-20220814234405-20220815024405-00119.warc.gz | CC-MAIN-2022-33 | 1,020 | 11 |
https://community.jmp.com/t5/Discussions/I-O-Problem-Unable-to-get-End-of-File-marker-Unable-to-get-End/td-p/107911 | code | I/O Problem. Unable to get End of File marker. Unable to get End of File marker.
Jan 23, 2019 11:45 PM
| Last Modified: Jan 23, 2019 11:50 PM(2012 views)
I have a problem with my script.
I am running a script that modifies a data table which will be saved after the change (not closed). Other colleagues use this file (only read, not write mode). But unfortunately, I got now different types of error messages within the Log window. And on top the file is not saved.
The messages are:
I/O Problem. Unable to get End of File marker.
I/O Problem. "somthing with File Bufffer, but I forgot it :-("
Does anybody know what the failures are and how can I solve it? | s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600401600771.78/warc/CC-MAIN-20200928104328-20200928134328-00257.warc.gz | CC-MAIN-2020-40 | 658 | 9 |
http://www.sqaforums.com/forums/hp-mercury-winrunner/12482-how-record-dynamically-winrunner.html | code | | || |
How to Record dynamically on WinRunner ?
User ([email protected]) posted:
This is Vimal , QA Engg,
Prior to this, i have worked on SILK in healtheon | WebMD.
Right now i am working on Win Runner , my job is to automate the
I could able to do any thing in SILK like dynamic recording and
checking the objects.
Win Runner : 6.02
Browsers : IE 5.0
My question here is , how to dynamically record the web page.
Assume that idont have any gui for this, i have opened the page by
Here , i should record or rather learn the page at runtime or
put my username in USERNAME text field
put my password in PASSWORD text filed
and click "login" button.
How can i do that ? can any one tell the code plz..
i would be very thank ful to them...
It was 1 week back i have been alloted to do automation suite on WR.
Almost i have done so many generic functions.. but dynamic recording
i could not able to get.
Please any one from the list, try to help me.
Help will be always appreciated. | s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988719139.8/warc/CC-MAIN-20161020183839-00551-ip-10-171-6-4.ec2.internal.warc.gz | CC-MAIN-2016-44 | 977 | 23 |
https://ez.analog.com/power/f/q-a/99992/what-s-kx-of-lt8601/298118 | code | I don't understand what Kx means. In page 14 inductor selection of LT8601 data sheet, Kx is suddenly appeared.
Why are K1 = 1.7, K2 = 1.0 and K3 = 1.4 selected ? Could you please let me know how to calculate the Kx values ?
You will get similar result. | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572089.53/warc/CC-MAIN-20220814234405-20220815024405-00691.warc.gz | CC-MAIN-2022-33 | 252 | 3 |
https://intellij-support.jetbrains.com/hc/en-us/community/posts/206245679-Standford-Programming-Methodology-Class-Project-set-up-with-IntelliJ | code | I'm looking for a little guidance and some practical information on setting up a project in IntelliIDEA 10.5.
I'm currently attempting to walk through the Programming Methodology classes offered from Stanford University via iTunesU. The course employs Java to teach the basic principles of Programming Methodology. The sample files and handout materials for the course are available here: http://see.stanford.edu/see/courseinfo.aspx?coll=824a47e1-135f-4508-a5aa-866adcae1111
I'm looking for some practical advice on how to correctly set up the class project, Keral, with IntelliJ. The class recommends and provides a customized version of Eclipse. I tried importing the project into the most recent version of Eclipse but found eclipse far less usable then Jet Brains products (I currently use PHPStorm and PyCharm).
Based on the files and information found here (http://see.stanford.edu/see/courseinfo.aspx?coll=824a47e1-135f-4508-a5aa-866adcae1111), what steps should I take to properly set up up Karel?
I run Lion on a Mac Pro with Lion installed. Any advice would be greatly appreciated. Thanks. -Kevin | s3://commoncrawl/crawl-data/CC-MAIN-2020-34/segments/1596439735792.85/warc/CC-MAIN-20200803083123-20200803113123-00010.warc.gz | CC-MAIN-2020-34 | 1,106 | 5 |
http://www.coderanch.com/t/469654/java-Web-Component-SCWCD/certification/Expression-Language-renders-raw-text | code | When using expression value in jsp, if expression includes HTML tags, tags are rendered by container. Say, I have attribute "currentTip" in the session and it contains value " tag make things bolder." (Head First Servlets & Jsp book 2nd edition, pg 283). And when we print it in jsp, by saying .
It shows " tag make things bolder." I could not find solution for how we can avoid this. | s3://commoncrawl/crawl-data/CC-MAIN-2015-48/segments/1448398461132.22/warc/CC-MAIN-20151124205421-00132-ip-10-71-132-137.ec2.internal.warc.gz | CC-MAIN-2015-48 | 384 | 2 |
https://www.experts-exchange.com/questions/28402645/Sharepoint-Access.html | code | Posted on 2014-04-01
I have setup sharepoint 2012 on a server which is linked to a domain etc, all users on the domain can see the content and have read only access apart from 3 users who have write access etc this is working perfectly. We have 3 other sites where the networks are linked by VPN back to the main site although the users are on a different domain etc. You can browse to the sharepoint site bit it only lists the top menu and nothing else, the site is set to allow anonymous access and all sites are set to allow "everyone" read only but its not working, im sure its down to a permissions issue etc.
Any help appreciated ! | s3://commoncrawl/crawl-data/CC-MAIN-2018-13/segments/1521257645310.34/warc/CC-MAIN-20180317194447-20180317214447-00657.warc.gz | CC-MAIN-2018-13 | 637 | 3 |
http://www.acne.org/messageboard/user/103975-kyle-1/?tab=topics | code | Well, I just got prescribed Accutane about two hours ago, and just took the first pill. My acne isn't too bad, but I do get the occasional cyst which made my dermatologist prescribe me Accutane. Its funny because I used to have terrible mild/moderate acne, but Finacea cleared everything up besides the cysts. Currently, I have no actives on my face, besides a cyst that is in the process of going down. Ill try to update this log every few days, but don't hold me to it, i'm not exactly the best at keeping up with a log A few questions I have for all of you post/current Accutane orgers.
Favorite chap stick? My skin seems very sensitive to what chap stick I use, and 99% of the time I breakout around the mouth area after applying blistex because it clogs the pores around my mouth.
How long did your initial breakout last?
What exactly happens to the blackheads? I don't have many, but was curious to see what your input on it was. I have only heard that they "fall out"
I'm sure ill have more later on, but thats all for now. Thanks in advance!
BTW im on 30mg of Claravis a day.
kyle 1Member Since 24 May 2009
Offline Last Active Feb 20 2014 10:51 PM
- Group Veteran Members
- Active Posts 340
- Profile Views 8,080
- Member Title Member
- Age Age Unknown
- Birthday Birthday Unknown | s3://commoncrawl/crawl-data/CC-MAIN-2014-15/segments/1397609530131.27/warc/CC-MAIN-20140416005210-00661-ip-10-147-4-33.ec2.internal.warc.gz | CC-MAIN-2014-15 | 1,288 | 14 |
https://forums.cabling-design.com/cisco/traffic-limit-problem-and-ip-precedence-15700-.htm | code | I have a question relating to throttling of traffic. A standard access list wont work as you cannot apply traffic shape to the in and out interface of a serial interface. I have 2 lines - one to an international provider and one for local traffic. A client wants 128k of "international" access, therefore I create a access list limiting user to 128k (I put this access list on the serial interfact going to the international provider.). That limits outgoing international traffic. International traffic coming in has an ip precedence of 2. Is there a way I can apply traffic shape on the ethernet interface to limit traffic going to network x.x.x.x/28 and the traffic has ip precedence of 2 ? | s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296945030.59/warc/CC-MAIN-20230323065609-20230323095609-00197.warc.gz | CC-MAIN-2023-14 | 692 | 1 |
https://eckhartarnold.de/papers/2013_Simulations_as_Virtual_Experiments/node14.html | code | When can a Computer Simulation act as Substitute for an Experiment? A Case-Study from Chemisty
|Table of Contents|
|2 Similarities and Differences between Simulations and Experiments|
|3 Case Study: Simulation of H-2-Formation in Outer Space|
|4 Summary and Conclusions|
As our case-study shows, computer simulations can in many respects be compared to experiments. Yet, as we argued earlier, being comparable to experiments does not mean that computer simulations are experiments. But it seems promising to pursue the question under what conditions a computer simulation can act as substitute for an experiment and what kind of research design a simulation of phenomena that are not directly accessible by experiment must follow.
From our case study we can learn that there is a good chance for employing simulations as an experiment-surrogate if the investigated phenomena fall in the realm of a comprehensive theory, i.e. a tried and tested theory that fully covers the phenomena that are simulated. If this is the case then the question of validating the simulation is reduced to justifying the employed modeling techniques and approximations which does not necessarily require empirical validation. The underlying research design of such simulations could roughly be described as “comprehensive theory plus well-approved modeling techniques”. This research design appears to be a valid research design for experiment-surrogate simulations.
Here, we consider a research design as valid when, if executed properly, it has the chance of generating reliable scientific knowledge. In contrast, a research design is invalid or “broken” or “unsound” if, even when properly followed, it cannot generate reliable scientific knowledge about the investigated subject matter. It is important to understand that even if the research design is valid a particular research project can still fail, namely, if one or more of the required steps have not been executed properly. On the other hand, if the research design itself is unsound, any research project following it will inevitably fail.
We conjecture that the same research design and therefore the same epistemic justification also underlies many other examples of simulation research in the natural sciences. A salient candidate for future investigation would be QM/MM simulations in chemistry. The situation in the case of QM/MM simulations is slightly more complicated than in our case, because QM/MM simulations make use of two background theories, molecular mechanics and quantum mechanics and introduce coupling terms to bridge the molecular mechanics and quantum mechanics part (Senn/Thiel 2009). This raises the question if our idea of a “comprehensive theory” can still be applied to describe the research logic of such simulations or if it needs to be adjusted.
Simulations in astronomy that, like simulations of the collision of galaxies, cannot directly be validated by observation might also be an example for a similar kind of research logic and epistemic justification. But they probably introduce a further problem that did not play a prominent role in our example. Our example was a simulation of a reaction of benzene and hydrogen. The structure and the properties of the involved molecules and chemical elements are very well known. But can the same be said of the initial data from which simulations in astronomy start? And, if not, what would be the consequences for their epistemological assessment?
A question that has not been touched in this paper is how simulations that do not or cannot rely on comprehensive theories at all get their credentials. One could say that a comprehensive theory and well-approved modeling techniques jointly form a sufficient condition for a proper experiment-surrogate. But does that also mean that being able to rely on a “comprehensive theory” is a necessary condition? While we have not investigated and therefore cannot exclude the possibility that there are other valid research designs for experiment-surrogate simulations, it appears to us that it would probably be much harder to establish the credibility of an experiment-surrogate simulation of phenomena that are not covered by a comprehensive theory. At least it is difficult to imagine how in this situation an experiment-surrogate simulation could claim credibility without direct empirical validation. For, how were we to know without direct empirical validation that our simulation did not omit one or more relevant causal factors?
However, this is just a conjecture and we do not want to dogmatically exclude the possibility of valid research designs for experiment-surrogate simulations that do not rely on a comprehensive theory. It would indeed be unfortunate, if there weren't any, because, except for the exact natural sciences and their technological application fields, there are only few areas of science where we can rely on comprehensive theories.
But for the same reason a healthy amount of skepticism is also advisable when the use of numerical methods in the humanities is justified by reference to their success in the exact natural sciences - as it is sometimes done by those schools in the social sciences that try to repeat the success of the natural sciences by imitating their methods (Shapiro 2005). Successful research designs can only be transferred from one science to another if the conditions for their applicability have been properly understood. By presenting a case-study from theoretical chemistry we hope to have made a contribution to the better understanding of a particular kind of simulation research design for simulations that act as substitute for experiments.
Acknowledgement The authors thank the German Research Foundation (DFG) for financial support of the project within the Cluster of Excellence in Simulation Technology (EXC 310/1) at the University of Stuttgart . | s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296949958.54/warc/CC-MAIN-20230401094611-20230401124611-00102.warc.gz | CC-MAIN-2023-14 | 5,897 | 14 |
https://research.uwcsea.edu.sg/c.php?g=33272&p=211242 | code | Skip to main content
It looks like you're using Internet Explorer 11 or older. This website works best with modern browsers such as the latest versions of Chrome, Firefox, Safari, and Edge. If you continue with this browser, you may see unexpected results.
Flipboard is an app that lets you both read magazines and create your own. Download it to your mobile device and subscribe to this magazine.
Former Monty Python star Michael Palin sits down with Steve Paikin for a feature interview on the importance of geographic literacy and why it is necessary for an informed citizenry in the 21st century. | s3://commoncrawl/crawl-data/CC-MAIN-2021-21/segments/1620243991557.62/warc/CC-MAIN-20210517023244-20210517053244-00306.warc.gz | CC-MAIN-2021-21 | 600 | 4 |
https://forums.ni.com/t5/Additional-NI-Software-Idea/idb-p/nisoftware/label-name/max/page/3?profile.language=en | code | Before I start, I want to make clear that I am fully aware that my suggestion is probably linked to some crazy amount of work.... That being out of the way:
I often have to switch between LV Versions and have on more than one occasion run into the rpoblem that different versions of LV work with MUTUALLY EXCLUSIVE sets of drivers. This means that I cannot (_for example) have LabVIEW 7.1 and 2011 on the same machine if I need to be coding GPIB functionality over VISA because there is no single VISA version which supports both 7.1 and 2011 (image below).
Of course these days we just fire up a VM with the appropriate drivers but for much hardware (Like PCI or Serial or GPIB) this doesn't work out too well.
Why can't we have some version selection ability for hardware drivers. Why can't I have VISA 4.0 and 5.1.1 installed in parallel and then make a selection of which version to use in my project definition? I know that ehse drivers probably share some files on the OS level so it clearly won't work for existing driver packages but for future developmend it would be utterly magnificent to be able to define which version of a hardware driver (Or even LV Toolkit like Vision) should be used ina project.
Wouldn't it be simpler to wire your DAQ systems if there was a way to print the tasks? This is exactly what I'm proposing - a 'Print' function from the menu to print the channel order for a specific task that would also contain the system configuration. See below:
Would create a file that looks similar to this:
I'm not saying that this is the end-all-be-all, but some way to print the channels contained in a task would simplify my life.
For several years NI marketing has used the term Graphical System Design to refer to LabVIEW and its suite of addons and supporting software. This is fine as it goes, but when I first heard the term I pictured something entirely different in my mind and I would like to suggest that as a product of its own.
When I hear Graphical system design, I picture something like VeriStand on the software side and a similar configuration based utility on the hardware side. It is the hardware tool that is missing and needs to be created. I would love to have a tool that could :
Let you define the hardware you are testing/controlling (the device). It has switches, analog inputs, analog outputs, frequencies, GPIB commands, CAN messages, TCPIP messages, etc.
This set of definitions would be in one place and would then be used to help you define the system that you will need to build in order to test/control that set of defined hardware.
A wizard would lead you to the proper hardware or choice of hardware that would work to test/control the defined signals. This needs to be modifiable by the user of the wizard, but should point to as good of an NI solution as it can and then allow options.
The wizard would then also help you develop the hardware interconnects of the system, for instance:
DAQ channel goes to a particular pin of a particular card or module
the pin goes to the NI cable
the NI cable goes to an NI breakout box connector
the NI breakout box connector goes to a terminal block
the NI breakout box terminal goes to device cable
device cable goes to device connector
device connector goes to device signal
It would also need to be able to add connections since you may have more breakout boxes or interconnecting cables in the system. These would all need to be in the signal chain.
Once I define it, you draw it. This would need to iterative and the drawing would need to be editable.
Signals that branch would need to be able to do that with each leg being selectable or the entire tree shown as one.
It would need to be divisible by signal (rows) and by connection (column) so that you can easily trace a signal throughout the system or conversely, see all of the signals in a particular connector.
It would be nice to view as individual signal wires, as connectors, as cables, as breakout boxes or other boxes, as systems, etc. This would be different levels of 'zoom' of the system.
It would need to play well with the Requirements Gateway. You will want to connect signals to specs, perhaps in several ways.
We typically do most of this already with separate tools that do not work well for job - Visio or PowerPoint for the initial system block diagram, AutoCAD Electrical or Mentor's Capital Harness for the wiring diagrams, Excel spreadsheets for the wiring interconnection - and nothing to pull it all together.
Putting it all into a single tool could be a good way to sell more hardware since you get to recommend the correct hardware for the definition. And you could even build the NI portion (for a fee). It may wind up being plug and play when the developer gets it.
Future add-ones or developments could include the ability to stub out VeriStand configurations based on the developed system. The ability to define and trace expected signals (such as DC levels or even complex waveforms). Or the ability to define signals as either electrical or the physical units that they may represent (pressure, distance, etc.).
For integration and station troubleshooting the Sessions, Aliases, Tasks et al would be organized by Project, Application or deployment in MAX and fault identification has all the "tools" any repair tech could want to isolate a failure.
The new compactRIOs come with a very useful USB-ethernet interface. I would like to access this on systems without the full driver set for low power hosts where we don't want to fill the system with a full driver install.
For example, I have a surface go which would be great if I can just plug it in to access the web interface for debugging.
The customer is managing a bunch of software licenses with Flexnet.
If the client user try to use some software when there are no available licenses, only NI software pops up the licensing wizard.
On the wizard, there is "Evaluation" button and once the client user mistakenly click the button, the software launches as a evaluation for around month and the Flexnet cannot detect the evaluation software, the customer cannot count the number of clients who is using the software.
If there is "disable licensing wizard" function, the issue never happens.
I realize this is a smallish use case, but I am posting here for future interweb queriers.
I have several functional, yet discontinued, HP8970B Noise Figure Meters that preset whenever NI-MAX performs a 'scan for instruments' or when I attempt a 'communicate with instrument' on them. Using IO Trace, I found the culprit is 'ibclr'.
Given this instrument predates SCPI, it does not understand '*idn?', and will reply with an error code. That is fine, but presetting is not. This clears my calibration and other settings.
It would be very good if the DSC llb will be reentrant (vi property -> shared clone reentrant execution).
It's no problem if I work with 50 citadel databases in parallel from executable files. But if I do it from one exe (with reentrant VI that work with citadel) then it works very slowly and very often with critical memory errors... And 50 exe files is not a good solution any way.
OK, I admit that I find keyboards a useful input device. And I like to keep my fingers on the keys instead of switching back and forth to the mouse.
This said, I should appreciate when I can use the <tab> key to navigate through dialogs. Such as the scaling dialog in MAX: If I mouse click into unscaled max, I can tab my way through unscaled min - scaled max, scaled min. But -Lord forbid! - not into scaled unit! why not? wouldn't this be the most natural dialog box behaviour? To be able to tab through all fields of interest? Given that LV has a great tool to select and organize tabbing behaviour of user interfaces - why have all MAX dialogs escaped this small improvement ever since (as far as my knowledge goes back to MAX 1.0)
Please give some programmer this half an hour and let him improve this detail.
It would be really nice to have the ability to create groupings for the Remote Systems in MAX. Below is the list of my current targets. While I'm sure there are many people that have a longer lists of targets, I find this list a little bit unmanagable already. Additionally, we are either planning or working on projects that will about double this list.
Please add the ability to group the remote systems so that they can be managed in their own tree (or somthing similar)
It is wrong the time zone for Caracas at the Time Settings configuration (MAX 14.0) . Since december 30, 2007 has been changed to -4.5 UTC. I will appreciate if you correct this bug in future LabVIEW versions. | s3://commoncrawl/crawl-data/CC-MAIN-2019-43/segments/1570987795253.70/warc/CC-MAIN-20191021221245-20191022004745-00178.warc.gz | CC-MAIN-2019-43 | 8,639 | 47 |
https://community.bitnami.com/t/problem-on-magento-file-permission/63668 | code | IMPORTANT, please fill the questions
We assume you are using Bitnami to deploy your application.
Which version of the application are you using?:
Please choose how you got the application: Installer (Windows, Linux, macOS), cloud image (AWS, GCE, Azure, ...) or VM (VMDK, VBOX):
Have you installed any plugin or modified any configuration file?:
No, only permission
Describe here your question/suggestion/issue (expected and actual results):
css and bootstrap is not loaded. I think there is some problem on permission file because it was working yesterday
Steps to reproduce the issue (if relevant):
The ip is http://220.127.116.11/
I have problem on your support tool.
\Error copying file from packed archive /opt/bitnami/bnsupport/bnsupport-0.7.7-linux-x64.run to /opt/bitnami/bnsupport-regex.ini
:Destination not writable
Abort, Retry, Ignore ? [A/r/i]
Error: There has been an error.
Unable to copy file | s3://commoncrawl/crawl-data/CC-MAIN-2019-26/segments/1560627999210.22/warc/CC-MAIN-20190620105329-20190620131329-00198.warc.gz | CC-MAIN-2019-26 | 908 | 16 |
https://www.indiedb.com/games/orange-cast/news/orange-cast-eden-gameplay-trailer | code | The new gameplay video of Orange Cast - "Eden".
Check the improvements in the game that we have made in recent times.
Now in the game you can see:
- fast and dinamic gameplay
- dismemberment of corps
- electric gun
- new epic taktical locations
and many other mechanics and devolopment...
Enjoy watching :) | s3://commoncrawl/crawl-data/CC-MAIN-2018-26/segments/1529267864848.47/warc/CC-MAIN-20180623000334-20180623020334-00271.warc.gz | CC-MAIN-2018-26 | 306 | 9 |
https://screenful.com/blog/user-access-permissions | code | Introducing user access permissions 🔒
May 30, 2018
We're happy to let you know that we've introduced user access controls to our dashboards. Now you can limit the visibility of a dashboard to selected individuals. That's very handy if you have multiple teams and you don't want each of them to see each others data.
For controlling the dashboard visibility, there's a new Permissions tab added to the dashboard settings. Within that tab you'll have a list of all the users invited to your dashboard. The ones that are checked have access to the dashboard.
To add new users to the list, you first have to invite them. The level of access depends on the user role so that the permissions tab is available only for users with the Member role. Observers cannot access this tab.
The default visibility for newly invited users depends on whether the dashboard has restricted visibility or not. Dashboard visibility is considered restricted if all users are not selected under the permissions tab.
If dashboard has restricted visibility, newly invited users won't get access to the dashboard by default, but instead, need to be granted access explicitly under the permissions tab. If all users are granted access, newly invited users get access by default.
When you click Save, only the selected users have access to the dashboard. The ones not selected cannot any longer access any of the screens in the dashboard. You can re-activate access any time under the same permissions tab.
Permissions are dashboard specific so that you can adjust your access settings for each of your team separately. | s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947476180.67/warc/CC-MAIN-20240303011622-20240303041622-00423.warc.gz | CC-MAIN-2024-10 | 1,592 | 9 |
https://community.kde.org/index.php?title=Marble/GeoData/PointerVsImplicitShare&direction=next&oldid=75140 | code | Implicit sharing and storing objects as value is very reasonable for basic data as QStrings, but there are reasonable doubts regarding Placemarks and other GeoData. There are some possibilities:
- Don't use implicit sharing at all and store all objects on the heap with a pointer to it.
- Use implicit sharing and storing as value for GeoDataCoordinates only.
- Use implicit sharing and storing as value for all GeoData classes.
To find out which is the wisest I try to look at every single class: (please add your thoughts here)
- GeoDataHotSpot This doesn't use Geo coordinates. I'm not sure if this really is GeoData, at all (I have not checked for what it is used).
- GeoDataCoordinates This one is quite simple. It is not more than a QPoint in GeoCoordinates. This should stay implicilty shared.
- GeoDataLatLonBox (GeoDataObject) It seems to nothing more than a QRect for GeoCoordinates. I'm not sure if it must be derived from GeoDataObject
- GeoDataLatLonAltBox same for this
- GeoDataAccuracy Should be base data => value
- GeoDataRegion I'm not sure if it belongs into this group ...
- GeoDataGeometry The base class for all geometric. We could want a pointer for this, so using it as data may not be the right way.
- GeoDataPoint This one uses multiple inheritance (GeoDataCoordinates). I don't think that this is semantically correct.
- GeoDataFeature These should be pointered, so GeoGraphicsItems could refer to them and change them easily.
- GeoDataFolder (by the way, this is an object which probably wouldn't need a GeoGraphics representation)
- GeoDataDocument (GeoDocument)
- GeoDataAbstractView It's nothing more than a view, this could stay implicitly shared.
- GeoDataLookAt Same for this as this is a child.
- GeoDataStyleMap (QMap<QString, QString>)
It is possible to group these things in two groups:
- objects that represent data which is actually shown on the map:
- objects that are abstract
- everything else :)
I'm not sure to which of the groups the geometry classes belongs.
A compromise could be to use the classes of the first group with a pointer and all others as a value. | s3://commoncrawl/crawl-data/CC-MAIN-2021-10/segments/1614178357984.22/warc/CC-MAIN-20210226205107-20210226235107-00361.warc.gz | CC-MAIN-2021-10 | 2,108 | 25 |
https://medium.com/hackernoon/10-key-points-to-look-at-before-investing-in-an-ico-b77e9019496c?source=post_internal_links---------5---------------------------- | code | The current craze for ICO (Initial Coin Offering), of which there are many, unsurprisingly attract a growing number of unscrupulous or not severe enough people, eager to take advantage of this new mechanism to raise more easy money. To avoid falling victim to scams or wobbly projects, a checklist of essential things to consider before investing in an ICO can be particularly helpful.
It is the crucial point: who is the maneuver behind the ICO in question? The answer to this question will depend on the degree of confidence that will be granted to the project, before going further in the analysis. First, the team’s stakeholders — and especially its founding members — must be publicly posted, with links to learn more about each. The possibility to go on their profiles Linkedin and Github (for the professional profiles) is appreciable if it is essential to get a better idea of their experience.
- Linkedin profiles, even if they only rely on declarative information, allow us to see, for example, where the founding members of the project worked until now. Have they been in the blockchain ecosystem for some time or have they been there very recently? There is nothing wrong with the introduction of ICOs by ‘newcomers,’ but some caution is legitimate in a ‘gold rush’ context that attracts many opportunists.
-Github profiles allow seeing which languages are mastered by developers, which is another exciting information.
- A very active Github profile is not the best sign for the key developers of the project. Conversely, an active profile, which has been around for some time, inspires more confidence.
Twitter accounts can be fascinating to browse for points of interest, viewpoints, connections, and founding members of the project — and watch their evolution over time. Do they post on blockchain topics for some time? What do they post? With whom do they exchange (publicly)? Etc.
It is not a question of rigid reasoning on each of these elements (the absence or the non-activity of a Twitter account, for example, is not crippling!), But the sum of these checks put the end at the end allows us to draw up an overall picture which is itself revealing.
Note that sometimes ICOs are worn by recognized personalities of the ecosystem blockchain, which of course changes the deal. Thus the ICO of the EOS project (launched at the end of June 2017 and still in progress) has so far proved to be very successful. Mostly thanks to the reputation of Dan Larimer, Blockone’s CTO who runs the EOS project, and who has already established his ability. This ability is to create compelling blockchain projects: he was in fact at the origin of BitShares, valued at hundreds of millions of dollars, and Steemit. In this type of case, it is apparently easier to trust the project, since one of the founding members already has a recognized ‘CV.’
Also, an essential criterion of the seriousness of an ICO or rating of ICO, although difficult to evaluate, lies in the degree of involvement of its members. A full team, who ticks the right boxes, and who can count on a robust Advisory Board, is not enough in itself: it must have several key members fully involved in the ICO process.
2. The Role of the Token in the Project
‘The blockchain is the solution, but what was the problem?’ in the same way that was evaluating a blockchain, the project requires asking whether it answers an existing problem, assess an ICO project requires checking that the token being issued is of real use. Will it be used as an intended use? Could the plan work? It is common for projects running ICOs to have no need to create a new token.
Also, it is essential to check that the token complies with the ERC-20 standard, which has become a recognized standard.
3. The Terms of the ICO Itself
How will the ICO be done concretely? The most significant transparency is involved in this area, with the risk of unpleasant surprises afterward. It is therefore essential to know how many tokens the company plans to create and how they will be sold, etc.
4. The Roadmap
The Roadmap is a crucial element that concerns both the transparency of the project and the seriousness of the work of its members. Investing in an ICO requires knowing the steps that will follow the fundraising, which must already be planned by the company, and posted publicly on its site, at least in part. A fuzzy and poorly detailed roadmap may hide a lack of strategic vision … or the risk of a scam. Besides, it is essential to try to evaluate the credibility of the roadmap and to be wary of projects that would promise months and wonders quickly…
5. Funded Money Will be Used
How does the company intend to spend the funds raised at the ICO? What will be the distribution of the use of this money? This information cannot be evaded and must be consistent with the roadmap.
6. The Code
It deserves being cited first, and yet … it is often difficult to assess the strength of the code, including for an insider. We must, therefore, rely on what we can, according to his level of technical understanding. In any case, we must make sure that the code is public, and see if a trusted third party has audited and validated the code (which does not always prevent, that said, some hiccups).
Without going so far as to study the code in detail, which is not within reach of all, it is at least essential to go and look at the white paper published by the project team. The white paper is the original file of a blockchain project, which lays the groundwork. As such, it must be very rigorous and to present at least the technical basis of the project. A white paper that would evade technical issues and put forward or even abuse of flashy terms (‘revolution’ or ‘disruption’ …) is a bad sign.
7. The List of ‘Advisors.’
Recognized and renowned personalities in the blockchain community are in high demand and should be part of ICO’s advisory boards. Most often, their presence is an excellent sign — at least when it comes to professional profiles. Be careful though: it has happened that some projects show personalities who had in fact never agreed. It was after such a case that Vitalik Buterin (founder of Ethereum) announced that he would not accept being an ICO Advisor. Therefore, if you meet an ICO advisor who says he’s on advisory board, is a lie.
Who-is-more, if the list of reputable advisors of an ICO can be a great plus in the credibility of the project, this criterion should never be self-sufficient. Let’s not forget, for example, that the most prominent fiasco of all blockchain projects, TheDAO (victim of a resounding attack in May 2016, following a loophole in its code), counted several great personalities of Ethereum among its Advisory Board, and supposed to have checked the solidity of the code…
The absence of Advisors should not be a stumbling block to not participate in the ICO. In the end, their presence should instead be seen as the cherry on a cake already provided…
8. The Community Surrounding the Project
Is there a dynamic and growing community around the project? Does the Slack of the project, if it exists, have many active members — is it boiling (it was, for example, the case of Tezos the weeks preceding its ICO), or somewhat quite sleepy?
These questions are essential for two reasons:
● First, an active community is, on the one hand, a good sign on the interest in the project, on its ability to attract enthusiasts.
● And the second on the openness of its team to build an efficient robust network.
9. The Reputation
What does it say about the project on specialized forums (Bitcointalk.org) on Reddit, in blockchain meetups…? If we have to beware of false positive comments (posted anonymously by the project team in question), a review of the comments on different forums and social networks allows us to get some idea of the general opinions.
The reputation of the project is measured by the number of exchanges (cryptocurrency marketplaces) having decided to trade the token created by the project — that is to say on which it is possible at the ICO of buying and sell the token. Projects that are unknown or considered far-fetched will not be accepted by all exchanges. The number of exchanges should not be the only criterion of evaluation: the best is to go to see if the main exchanges have made a choice to trade the token or not.
10. The Legal Aspects
An ICO project with one or more legal specialists in its team earns a lot of seriousness and credibility. Otherwise, having the support of external legal experts is important.
The situations are very heterogeneous depending on the project, depending on their seriousness, their ambition, the nature of the project, or the operation of their token … Sometimes, some ICOs do not even have Terms and Conditions on their site!
Disclaimer: this article does not constitute investment advice, and is not exhaustive. | s3://commoncrawl/crawl-data/CC-MAIN-2021-49/segments/1637964358685.55/warc/CC-MAIN-20211129014336-20211129044336-00367.warc.gz | CC-MAIN-2021-49 | 8,940 | 37 |
https://codexponent.com/pry-gem/ | code | Enhancing Ruby Development with Pry: A Comprehensive Guide
- Briefly introduce the concept of an interactive console in Ruby.
- Discuss the limitations of the default IRB console.
- Introduce Pry as a powerful alternative that provides enhanced debugging and exploration capabilities.
Section 1: Getting Started with Pry
- Explain how to install Pry in a Ruby environment.
- Discuss the integration of Pry into a Ruby project.
- Demonstrate how to launch Pry and explore its basic functionality.
Section 2: Pry Features and Capabilities
- Explore the interactive features of Pry, such as tab completion, syntax highlighting, and command history.
- Discuss the advantages of Pry’s introspection capabilities, including the ability to view and navigate through source code.
- Explain how Pry provides a more informative stack trace and error messages compared to IRB.
Section 3: Debugging with Pry
- Demonstrate Pry’s powerful debugging features, including breakpoints and step-by-step execution.
- Discuss how to set breakpoints, navigate through the code, and inspect variables and objects during runtime.
- Showcase Pry’s ability to trace code execution, helping developers identify and resolve issues effectively.
Section 4: Customization and Advanced Usage
- Explain how to customize Pry’s behavior through configuration options and plugins.
- Discuss advanced features like remote debugging, integrating Pry into existing projects, and extending Pry with custom commands.
- Highlight community-contributed Pry plugins and showcase some popular ones.
- Recap the benefits and features of Pry as an alternative to the default IRB console.
- Encourage developers to explore Pry further and incorporate it into their Ruby development workflow.
- Conclude with a call to action, inviting readers to share their experiences and feedback.
Remember to expand upon each section, provide code examples, and add your unique insights and experiences with Pry. Good luck with your blog post! | s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100873.6/warc/CC-MAIN-20231209071722-20231209101722-00803.warc.gz | CC-MAIN-2023-50 | 1,990 | 24 |
http://tailieu.vn/tag/english-with-photos-and-words.html | code | afraid : When you're afraid, you are scared.
brittle: Something that is
brittle will break or
snap in two easily.
Potato chips are
broken, it do
not work o
courage: A quality in
which a perso
danger or pai
(BQ) Ebook Anacondas by linda george presents about anacondas, anacondas species, habitat, hunting, mating, anacondas and people, fast facts about anacondas, photo diagram, word to know, to learn more, useful address and something else.
The Key Vocabulary and Function Words and Phrases sections both have two photos on each right-hand
page. Each photo represents one vocabulary word. The teacher script is located on the back of each
card directly behind its accompanying photo. The Basic Words section shows six photos per page,
followed by a teacher routine. The ELD Content Words section mimics this format with 4 to 6 words per
Social media optimization is in many ways connected as a technique to viral marketing where word of mouth is
created not through friends or family but through the use of networking in social bookmarking, video and photo
sharing websites. In a similar way the engagement with blogs achieves the same by sharing content through the use
of RSS in the blogosphere and special blog search engines.
(BQ) Let's play with baby animals! Accompanied by a read-along audio track, more than 70 colorful photos showcase baby animals from all over the world. Meet and learn about all sorts of baby animals, including monkeys, lions, penguins, lemurs, kangaroos, pythons, and giraffes. Ebook Snapshot - Picture - Library Baby animals include a read-along feature: Children can read along with an audio track, following the highlighted words on each page. Perfect for pre-readers and early readers! | s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917123048.37/warc/CC-MAIN-20170423031203-00268-ip-10-145-167-34.ec2.internal.warc.gz | CC-MAIN-2017-17 | 1,721 | 20 |
https://blog.securitybalance.com/p/very-nice-tool-for-pentests | code | Very nice tool for pentests
I don't hide it from anybody; when doing pentests, my favorite approach was to simply browse information in open shares until I could find some user credentials there (yes, in big organizations, they are always there: scripts, source code, ini files...). With those in hands, try to see what else I was able to have access to; repeat the process until the whole network is owned. No big hack or exploit here, just basic "low hanging fruit detection".I just noticed a tool that makes that process thousands of times easier: keimpx.The description, from Darknet:keimpx is an open source tool, released under a modified version of Apache License 1.1. It can be used to quickly check for the usefulness of credentials across a network over SMB. Credentials can be:
Combination of user / plain-text password.
Combination of user / NTLM hash.
Combination of user / NTLM logon session token.
If any valid credentials has been discovered across the network after its attack phase, the user is asked to choose which host to connect to and which valid credentials to use, then he will be prompted with an interactive SMB shell where the user can:
Spawn an interactive command prompt.
Navigate through the remote SMB shares: list, upload, download files, create, remove files, etc.
Deploy and undeploy his own service, for instance, a backdoor listening on a TCP port for incoming connections.
List users details, domains and password policy. | s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817576.41/warc/CC-MAIN-20240420091126-20240420121126-00893.warc.gz | CC-MAIN-2024-18 | 1,459 | 10 |
https://www.techspot.com/community/topics/unable-to-access-hard-drive-in-my-computer.71917/ | code | Hi ya'll I'm new to this place and i've been told that i could get help here I have a really annoying problem and its driving me crazy. Every time i double click my C: in My Computer a window pops up which says "Choose the program you want to use to open this file with". Windows XP is not entering any of my hard drive. The problem is the same for my other drives E, F, G. My DVD rom is D: I think that probably windows XP has lost file association of my hard drives. I am able to access the contents of my hard drive if i manually type C: and press enter in the address bar. Same goes for my other hard drives. Similarly i can access my hard drive from Windows Explorer. It works fine there too. The only time the problem occurs is when i try to access C: E: F: G: from "My Computer". Another thing i noticed is that when i Right Click my hard drives in My Computer the menu does not show "Open" and "Open With" options. Instead they have been replaced by unreadable charecters which make no sense. It's not even chinese. I have scanned my pc using different up to date antiviruses like Mcafee Antivirus 2007 plus and Bit defender. Infections were found and cleaned, clearly they did some damage before they were removed Other than this my windows have been functioning normally since September of 2005. Please Help !!! | s3://commoncrawl/crawl-data/CC-MAIN-2018-05/segments/1516084887253.36/warc/CC-MAIN-20180118111417-20180118131417-00008.warc.gz | CC-MAIN-2018-05 | 1,321 | 1 |
https://itnursery.com/what-are-mvp-and-mvc-and-what-is-the-difference/ | code | When looking beyond the RAD (drag-drop and configure) way of building user interfaces that many tools encourage you are likely to come across three design patterns called Model-View-Controller, Model-View-Presenter and Model-View-ViewModel. My question has three parts to it:
- What issues do these patterns address?
- How are they similar?
- How are they different?
In MVP, the Presenter contains the UI business logic for the View. All invocations from the View delegate directly to the Presenter. The Presenter is also decoupled directly from the View and talks to it through an interface. This is to allow mocking of the View in a unit test. One common attribute of MVP is that there has to be a lot of two-way dispatching. For example, when someone clicks the “Save” button, the event handler delegates to the Presenter’s “OnSave” method. Once the save is completed, the Presenter will then call back the View through its interface so that the View can display that the save has completed.
MVP tends to be a very natural pattern for achieving separated presentation in WebForms. The reason is that the View is always created first by the ASP.NET runtime. You can find out more about both variants.
Two primary variations
Passive View: The View is as dumb as possible and contains almost zero logic. A Presenter is a middle man that talks to the View and the Model. The View and Model are completely shielded from one another. The Model may raise events, but the Presenter subscribes to them for updating the View. In Passive View there is no direct data binding, instead, the View exposes setter properties that the Presenter uses to set the data. All state is managed in the Presenter and not the View.
- Pro: maximum testability surface; clean separation of the View and Model
- Con: more work (for example all the setter properties) as you are doing all the data binding yourself.
Supervising Controller: The Presenter handles user gestures. The View binds to the Model directly through data binding. In this case, it’s the Presenter’s job to pass off the Model to the View so that it can bind to it. The Presenter will also contain logic for gestures like pressing a button, navigation, etc.
- Pro: by leveraging data binding the amount of code is reduced.
- Con: there’s a less testable surface (because of data binding), and there’s less encapsulation in the View since it talks directly to the Model.
In the MVC, the Controller is responsible for determining which View to display in response to any action including when the application loads. This differs from MVP where actions route through the View to the Presenter. In MVC, every action in the View correlates with a call to a Controller along with an action. In the web, each action involves a call to a URL on the other side of which there is a Controller who responds. Once that Controller has completed its processing, it will return the correct View. The sequence continues in that manner throughout the life of the application:
Action in the View -> Call to Controller -> Controller Logic -> Controller returns the View.
One other big difference about MVC is that the View does not directly bind to the Model. The view simply renders and is completely stateless. In implementations of MVC, the View usually will not have any logic in the code behind. This is contrary to MVP where it is absolutely necessary because, if the View does not delegate to the Presenter, it will never get called.
One other pattern to look at is the Presentation Model pattern. In this pattern, there is no Presenter. Instead, the View binds directly to a Presentation Model. The Presentation Model is a Model crafted specifically for the View. This means this Model can expose properties that one would never put on a domain model as it would be a violation of separation-of-concerns. In this case, the Presentation Model binds to the domain model and may subscribe to events coming from that Model. The View then subscribes to events coming from the Presentation Model and updates itself accordingly. The Presentation Model can expose commands which the view uses for invoking actions. The advantage of this approach is that you can essentially remove the code-behind altogether as the PM completely encapsulates all of the behavior for the view. This pattern is a very strong candidate for use in WPF applications and is also called Model-View-ViewModel.
There is a MSDN article about the Presentation Model and a section in the Composite Application Guidance for WPF (former Prism) about Separated Presentation Patterns | s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100529.8/warc/CC-MAIN-20231204115419-20231204145419-00660.warc.gz | CC-MAIN-2023-50 | 4,592 | 18 |
https://ritcyberselfdefense.wordpress.com/2011/09/11/ipv6-transition/ | code | With all the IPv4 addresses running out, with the multitudes of devices out there that each have their own separate IP addresses, IPv6 handles that nicely. IPv4 can hold ~4.2 billion addresses, but IPv6 can handle ~340 undecillion addresses. However, with anything new in techonology, theres always the chance for security issues.
IPv6 was set up to try to fix many of the issues that its predecessor had, but one issue with IPv6 will be how all routable devices will obtain an address.
Also, with many of our devices able to connect to the internet now, we may all be tracker using our IP addresses. A simple ping or trace route can send packets of information back to whomever wants to know where exactly we are. Many smart phones have the same issue (like Apples iPhone) with their GPS implementation. Privacy will be a major concern, as companies aim to track end users data for research, or even someone just maliciously trying to keeps tabs on someone. Anonymity will be faced with some major challenges.
By default, IPv6 actually releases a products MAC address. A MAC address is a static number, much like a serial number, that is unique to each individual product. By acquiring a MAC address, you can find out who exactly owns the product. And by pinging or using trace route, you can know exactly where “John Doe” is at any time.
This issue has been recognized, as a research team devised Moving Target IPv6 Defense (MT6D), which is a way for people to communicate over the internet while still maintaining there anonymity to an extent. However, nothing is 100% in security, so it will be interesting to see how the “bad guys” try to find a way around this. | s3://commoncrawl/crawl-data/CC-MAIN-2018-30/segments/1531676592650.53/warc/CC-MAIN-20180721164755-20180721184755-00069.warc.gz | CC-MAIN-2018-30 | 1,675 | 5 |
https://search.yahoo.com/tablet/s?ei=UTF-8&age=1d&p=Microsoft+wikipedia&fr2=12328 | code | Microsoft Corporation is an American multinational technology corporation which produces computer software, consumer electronics, personal computers, and related services. Its best-known software products are the Microsoft Windows line of operating systems, the Microsoft Office suite, and the Internet Explorer and Edge web browsers.
With the official Wikipedia app, you can search and explore 40+ million articles in 300+ languages, no matter where you are. == Why you'll love the this app == 1. It's free and open Wikipedia is the encyclopedia that anyone can edit.
Microsoft was founded on April 4, 1975, by Bill Gates and Paul Allen in Albuquerque, New Mexico.
Microsoft Windows, commonly referred to as Windows, is a group of several proprietary graphical operating system families, all of which are developed and marketed by Microsoft. Each family caters to a certain sector of the computing industry. Active Microsoft Windows families include Windows NT and Windows IoT; these may encompass subfamilies ...
People also ask
What is the official name of Microsoft?
What was Microsoft's first product?
What state was Microsoft founded in?
Who was the founder of Microsoft?
Initially a marketing term for an office suite (bundled set of productivity applications), the first version of Office contained Microsoft Word, Microsoft Excel, and Microsoft PowerPoint. Over the years, Office applications have grown substantially closer with shared features such as a common spell checker, OLE data integration and Visual Basic for Applications scripting language.
Microsoft Windows is an operating system, which means that it is the basic software that makes people's computers work and lets other programs work. The majority of desktop and laptop computers run...Microsoft Office is an office suite. It lets people write documents on their computer with Microsoft Word, make charts and graphs with Microsoft Excel, make presentations with Microsoft PowerPoint,...Internet Explorer is a piece of software that lets people look at things online (known as browsing) and download things from the Internet. In 2015, it was replaced by Microsoft Edge.Microsoft also makes other programs for the Internet. Many of them are called Windows Live services, with the name Windows Live put in front of the old name of the service, like Windows Live Hotmai...
Although Microsoft is best known for its software products, the company also runs a number of web services. They include: 1. Outlook.com is a webmail service. When Microsoft created this service in 1996, it was called Hotmail. It is used to send and receive email, manage a calendar of events and tasks, and a list of contacts (such as phone numbers and email addresses). 2. OneDrive is a file hosting service. It was started in 2007 and was called "SkyDrive" at the time. Users can upload files to a web server and get them on a variety of devices, including PCs and mobile devices. 3. Skype is a VoIP and social media service. It was not created by Microsoft, but by a company called Skype SARL, which was later bought out by Microsoft. The Skype program or mobile app lets people make phone calls through the Internet to other Skype users for free and, for a fee, landlinephones. 4. LinkedIn is a social networking service for people with professional jobs. Like Skype, it was not created by Mi...
Microsoft has also made a wide variety of hardware over the years. Among them are computer accessories like mice, keyboards, and webcams. The company also makes and promotes a video game console, Xbox. It lets people play video games on their televisions. The games were first stored on CDs, but many recent games are downloaded from the Internet. There have been three generations of Xbox. The first generation came out in 2001 and was just called Xbox, while the second, the Xbox 360, was released in 2005. The third model is the Xbox One in May 2013. In 2020, Microsoft introduced Xbox Series X and Xbox Series S. Beginning with the Xbox 360, Microsoft introduced Xbox Live, which lets people play games online against other people anywhere in the world. The Xbox has become very popular and more than 150 million units have been sold worldwide. Because of this, Microsoft is considered one of the three big companies that make video game consoles, along with Nintendo and Sony. Most recently,... | s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320300010.26/warc/CC-MAIN-20220116180715-20220116210715-00221.warc.gz | CC-MAIN-2022-05 | 4,345 | 13 |
https://ilikeorangutans.github.io/2017/08/23/on-wasted-time/ | code | On Wasted Time
Recently I’ve been feeling… unaccomplished. Despite all my achievements, acquired skills, and successes I’ve had a thought gnawing at the back of my mind. I realized, after looking at my extensive list of side and toy projects, that none of them are making any progress. In some of them I invested lots of time, others are just ideas, barely sketches. But they all have in common that I grew tired of working on them. Either because after a day at work my brain is tired, or because other things are taking precedence. I’ve moved into a house that requires constant upkeep. Things break or wear out and before your know it you’ve spent an afternoon fixing something. And then I’ve finally picked up a regular workout routine. Generally I’m proud of that, and because these things take time, I had no time for my side projects. Or at least that’s what I thought and told myself.
The reality is that I’ve spent more time on Reddit and other social media websites than is good for me. Particularly in the recent political climate reading about what is going on in the world is like watching a never ending accident that you cannot look away from. I used to enjoy reddit, and I keep reading it, telling myself that I’m “relaxing”. But it is anything but. My brain has been conditioned to crave short bursts of information and consume other people’s opinions about it. I realized that I was having a hard time staying focused on reading full length articles and that despite me telling myself it was relaxing, I would feel anything but relaxed. The sheer amount of negativity and hate one can encounter online is incredibly draining and makes one want to despair over the state of the world. The consequence was that on the days that I have time to actually indulge in this behaviour, I would see the clock tick away, and my side projects remain unfinished and me being frustrated.
This was a realization that took me some time to get to. My feeling unaccomplished was based on the fact that I kept feeding my brain a fast food diet while it actually requires a solid diet of undisturbed periods where I focus on something to learn or produce. Luckily I’m not the only one that feels like that. I’ve had several great conversations with others in the same boat. Just hearing that I’m not the only one that feels like this was encouraging and inspired me to take action.
I’ve come up with the following resolutions to silence my noisy mind and be more productive:
- No more consumption of reddit or other social media on mobile devices. I’ve uninstalled the respective apps, which only leaves the browser, making it “hard” enough for me not to do use them.
- Minimize distractions on laptop/computer, maybe even block these websites on a firewall level.
- Focus on reading full length articles or books. My kindle has fresh books on it, my Pocket list has lots of articles that are just waiting to be read.
- Explicitly set aside time to work on smaller projects. Just do something instead of wasting time.
- Blog more or less regularly again. I used to write about stuff I’m interested in or things that took me time to figure out. I should do this again.
- Relax and recharge doing things that actually are like that instead of mindlessly feeding my brain.
- Accept that I can’t change my habits in a day. It will take time to train myself otherwise.
I’m already implementing some of these resolutions and it has had a positive impact on myself. This blog post is another step to get things going. Let’s see where this leads me. | s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100942.92/warc/CC-MAIN-20231209170619-20231209200619-00803.warc.gz | CC-MAIN-2023-50 | 3,587 | 13 |
http://cities.canwefixthebroken.net/uncategorized/flint-mi-maps/ | code | ACS_13_5YR_S1901 Flint Mi Households
So even though this says Income in the past 12 months I’m pretty sure it is households per district in the county. Flint is in the middle where there are a bunch of smaller sections. You can see most of the middle has fewer people with the exception of the southwest side.
ACS_13_5YR_B17015 People’s Income below poverty
This one shows where people who make below the poverty level live. The majority is around the City of Flint. Combined with the above map you can tell that not only are there less households in Flint but the ones that are there also make less money.
ACS_13_5YR_S1501 Education Attained_Less than high school grad.
This map shows the percentage of people with less than the equivalent of a high school graduation. Although it is spread throughout the county most of the districts around Flint are the deepest color, indicating that 32-63% of the people living their have less than a high school graduate education. | s3://commoncrawl/crawl-data/CC-MAIN-2017-39/segments/1505818696681.94/warc/CC-MAIN-20170926193955-20170926213955-00541.warc.gz | CC-MAIN-2017-39 | 974 | 6 |
http://www.e-infomax.com/ipmasq/appsup.html | code | The module matrices provide you information for modules that are not currently in the more recent kernels.
It is worth noting that 2.4.x kernels might
just WORK where as 2.0.x and 2.2.x kernels required special modules.
Please report back to
us of your findings on 2.4.x kernel. Please see the Description/Notes
section for availability of 2.4.x modules.
If you know of other modules, or any information needs to be updated, please feel free to contact us at [email protected] and [email protected] | s3://commoncrawl/crawl-data/CC-MAIN-2021-21/segments/1620243989030.87/warc/CC-MAIN-20210510033850-20210510063850-00140.warc.gz | CC-MAIN-2021-21 | 511 | 7 |
https://mx.coursera.org/learn/advanced-portfolio-construction-python | code | The practice of investment management has been transformed in recent years by computational methods. Instead of merely explaining the science, we help you build on that foundation in a practical manner, with an emphasis on the hands-on implementation of those ideas in the Python programming language. In this course, we cover the estimation, of risk and return parameters for meaningful portfolio decisions, and also introduce a variety of state-of-the-art portfolio construction techniques that have proven popular in investment management and portfolio construction due to their enhanced robustness.
Acerca de este Curso
- 5 stars82,06 %
- 4 stars13 %
- 3 stars3,81 %
- 2 stars0,67 %
- 1 star0,44 %
Principales reseñas sobre ADVANCED PORTFOLIO CONSTRUCTION AND ANALYSIS WITH PYTHON
Great course, nice balance between the theory (which is well explained) and the practical (python jupyter notebooks where you need to explore to gain a good understanding)
Loved how this course was presented. It built well off of the first course and provided labs that let me explore the content. I really enjoyed how Lionel and Vijay presented the material.
Great course, provides valuable insight into the theory along with well designed worked examples. Many thanks to both instructors.
Fantastic portfolio construction techniques, although black letterman model could have been explained better . Overall great course with real world financial applications
Acerca de Programa especializado: Investment Management with Python and Machine Learning
The Data Science and Machine Learning for Asset Management Specialization has been designed to deliver a broad and comprehensive introduction to modern methods in Investment Management, with a particular emphasis on the use of data science and machine learning techniques to improve investment decisions.By the end of this specialization, you will have acquired the tools required for making sound investment decisions, with an emphasis not only on the foundational theory and underlying concepts, but also on practical applications and implementation. Instead of merely explaining the science, we help you build on that foundation in a practical manner, with an emphasis on the hands-on implementation of those ideas in the Python programming language through a series of dedicated lab sessions.
¿Cuándo podré acceder a las lecciones y tareas?
¿Qué recibiré si me suscribo a este Programa especializado?
¿Hay ayuda económica disponible?
¿Tienes más preguntas? Visita el Centro de Ayuda al Alumno. | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337516.13/warc/CC-MAIN-20221004152839-20221004182839-00271.warc.gz | CC-MAIN-2022-40 | 2,544 | 18 |
https://heysoftsyqzt.web.app/files-downloading-to-notepad-fix-vok.html | code | WordPad is a basic word processor that ships free with Windows. Lacking features WordPad is assigned as the default program for some file types, such as RTF.
System crash corrupted your Notepad files? Fix this by restoring a previous file version or running Recuva Recovery Wizard. Notepad++ 7.1 fixes a few issues with crashing, added plugin checks for architecture, and proper checks for the installation type. To Fix (Notepad run and search in start menu) error you need to follow the steps below: Notepad++ is a portable source code editor that supports several programming languages on Windows platform; supports C, C++, Java, HTML, ASP, Pascal, CSS Notepad++ 7.8.2 download - Windows 7 - Complete source code editor and Notepad replacement Fix the bug while giving command C:\NppDir>notepad++ (w/o quote), npp try to open file “notepad++” You can also use Notepad++ to compare two files.
The text editor supports powerful macros, Unicode, and very large files. Download. EmEditor Free & EmEditor Professional. User interface languages: Czech, The text editor supports powerful macros, Unicode, and very large files. Download. EmEditor Free & EmEditor Professional. User interface languages: Czech, 5 days ago A fast and lean Notepad replacement that can be put to a variety of uses. word processor for creating more in depth documents, but sometimes a middle ground Fix restoring line position issue while document is wrapped. 9 Jan 2020 In this chapter, we explain how to recover Notepad file from Recycle Bin the green download button to download Disk Drill's installation file. There are a couple of ways to replace Notepad with Notepad++ but they all Download this registry fix file and double click on it to merge it to your registry. 20 Mar 2018 For some reason we cant download it anymore and the file just opens with word. Hi John, we eventually got it to upload yesterday and you are correct! Notepad is plain text and can be used to read and amend aba files.
Notepad ++ is a free, open source application for writing text. Powerful editor full of options, Notepad ++ is ideal for programming as well as normal Notepad++ 7.5.5 brings a dozen changes, including changes to the Find window, tab changes, and other improvements to the software. Suppose, in order to increase your system performance or to remove virus infected files, you perform "Antivirus scan". Unfortunately, after completion of scan, you find that some of the Notepad files that were saved on your computer are… Fast and free download last version of Notepad++. Notepad + + is a perfect solution for those that want more than Notepad to edit syntax. This is also called the notepad program that is used in writing memos, and other smaller text files respectively. The notepad.exe is neither a virus nor a malware. Notepad++ is a source code editor which supports several programming languages under Windows environment. It's also a lightweight replacement of Notepad. The I'm sorry, I'm ignorant when it comes to Notepad++. Is Notepad++ a big app in programming? To me, a casual PC user, Notepad++ is in the same league as Paint or Calculator or Stickies or Text Document.
Here are some solutions which will fix this annoying problem: METHOD A: Using Ready-Made Registry Script. Download following ZIP file, extract it and run the
Hey, i have a problem with opening my .jar files. i wanna open my .jar files with java but it opens with notepad. how can i fix this? To fix the problem where .exe files open with Notepad of any other program, delete the UserChoice registry Download exefix_cu.reg, and save it to Desktop. WordPad is a basic word processor that ships free with Windows. Lacking features WordPad is assigned as the default program for some file types, such as RTF. Problem:Due to some misconfiguration or change in the setting of “open with” program, Windows open particular file extensions with incompatible softwa. 29 Apr 2016 There are a number of different file types that you can view in Web browsers, and different websites employ different file types based upon the Microsoft Windows ServerMSINotepad++System CenterSystem Center Configuration | s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656103355949.26/warc/CC-MAIN-20220628050721-20220628080721-00493.warc.gz | CC-MAIN-2022-27 | 4,155 | 6 |
http://www.developer.com/java/ejb/article.php/3526721/Building-a-J2ME-Application-in-NetBeans-41.htm | code | Building a J2ME Application in NetBeans 4.1
This article will show you how to use NetBeans 4.1 and the Mobility Pack to write a Java Mobile Edition application quickly and easily. It will demonstrate the simple GUI creation and storage facilities available to a mobile application developer, but will not delve into the online connection capabilities at this point (I will instead save that for the future).
The application I will demonstrate will be a simple vehicle mileage calculator and tracker, allowing you to use a mobile phone or other Java-enabled device to track your average fuel consumption and cost per mile. It is deliberately kept simple and I will note any simplifying assumptions made as the application is presented. It is, of course, entirely up to you if you want to extend this code into something more detailed and useful.
The full project source for this article is available for download from this link.
Before you can start building the application, you will need to get NetBeans 4.1 and the Mobility Pack if you don't already have them.
Both the NetBeans IDE and the Mobility Pack can be downloaded from http://www.netbeans.info/downloads/download.php?type=4.1.
Optionally, enter your e-mail address or uncheck the checkboxes, and click Next to get to the download area.
Be sure to read the Installation Instructions and Mobility Pack release notes using the links on the download page.
Create a New Project
- New Project->Mobile->Mobile Application
- Project Name: MileageCalculator
- Set the project location to where you want it on the disk.
- Uncheck the "Create Hello MIDlet" option.
- Click Next.
- For this application, choose Default Color Phone, CLDC-1.0, and MIDP-1.0 options.
- Click Finish.
Create the Visual MIDlet
The core of our application will be a visual MIDlet, which can be thought of as a visual JavaBean for a phone. In fact, this is selling it shortthe MIDlet encompasses multiple forms and other GUI views, navigation information between these GUI parts, lifecycle methods for the application, as well as the usual event handlers, methods, and properties.
To create your MIDlet, do the following:
- Expand the MileageCalculator node in the Projects pane (if it is not already expanded).
- Right-click on the <default package> node and select New->Visual Midlet.
- Set the MIDlet name to MileageMidlet, and the MIDP Class Name to the same.
- Ignore the MIDlet Icon unless you have a really nice icon to use already (creating icons is beyond the scope of this article).
- For the package, type in something that makes sense. For example, I will use com.crispybits.j2me.demo.mileage.
- Choose MIDP Version to be MIDP-1.0.
- Click Finish.
You should now find yourself looking at the flow designer. There should be an icon that looks like a phone, with a Start Point and an Exit Point. This is one view of the MIDlet; there are two more selectable by buttons at the top of the main pane: Screen Design and Source. Click the Source button to see what is already in the MIDlet at present.
You should see a default constructor (empty) and three lifecycle methods: startApp(), pauseApp(), and DestroyApp(). I will come back to these later.
Creating the GUI
The first part of your application building will be the GUI. There will be three screens in your application. The "main" screen will be the summary pagewhere you can see the current mileage, MPG, and cost information summarized. There will also be menu options from this screen to the two others you needan initial setup screen (to enter the vehicle's mileage when you first start using the calculator) and a screen to enter new details when you fill up.
The Summary Page
The summary page will simply give you a run down of the current details for your vehicle, including the current recorded mileage, the current MPG, and the cost per mile since you started keeping records.
Note: the "cost per mile" is simply what the gas is costing.If you want to track maintenance and other items, this application could easily be augmented to do so.
To create the summary page:
- Select the MileageMidlet and switch to the Flow Design view in the main pane.
- In the inspector pane (top right), right-click on the Screens node and select Add Form.
- A new form will appear in the Design view; drag it to the right of the phone icon.
- Right-click on the new form, and select Rename, call it SummaryForm.
- From the red dot next to Start Point on the phone, drag a line out to the red dot on the SummaryForm. This will make the SummaryForm be displayed as the starting form when you run the application.
- Double-click on the SummaryForm to go to the Screen Design for that form.
So far, so good (and nice and easy). You should now see an empty screen ready to take new widgets from the pallette (to the left of the empty form). Before you start adding components, I will take the chance to talk about GUI design in Java ME, and how it compares with desktop applications.
If you have designed a full swing GUI, you will notice some differences when using Java ME to create screens. The most obvious is that there are fewer components. Not so obvious, however, is that (at least for what we are doing) you cannot control the layout of the components as much as you might be used to in swing. The concept of different layout managers does not exist in this GUI builder, nor does it make sense if you stop and think about it.
When designing for a mobile device, you are likely to be dealing with any number of different screen sizes and configurations. Generally speaking, a Java ME application will use all of the screen, not a window within that screen, so that means that the application could be displayed at any resolution from fairly small (say 100x100 pixels for the sake of argument) up to much higher resolutions.
When you think about this, it makes sense that trying to control layout would be very hard. In fact, the device will largely control the layout based on what makes sense to it. I will put down the components you want in the order you want (using a simple flow layout for you Swing folks out there), and leave it to the device to figure out the display details.
Although it may feel a bit strange at first, this model of development is actually quite liberating after you get used to it, and you can certainly slap some GUIs together pretty fast. They might not win any beauty prizes, but they will be functional and they will work on any device (although if you pack a lot onto one screen, you might find yourself scrolling around a lot when running on lower-resolution devices).
The "device handles it" philosophy is carried over even further for the action items (like the menu). You will define the menu actions you want, and the device will figure out how to present them to the user. The likelihood is that the options will be attached as a menu on one of the device's "soft buttons," but it really is down to the device on which the application is running.
Note: If you have a particular device in mind (let's say your phone) and know the resolution, you can right-click on the screen in the Screen Designer, select "Set Screen Size," and then set it to the desired resolution. Although this won't guarantee what it will look like on your device, it will give you a better idea of how much information you can fit on the screen.
Page 1 of 5 | s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218189903.83/warc/CC-MAIN-20170322212949-00146-ip-10-233-31-227.ec2.internal.warc.gz | CC-MAIN-2017-13 | 7,352 | 48 |
https://clarity.microsoft.com/blog/see-how-your-site-compares-using-clarity-website-benchmarks/ | code | Have you ever wondered how your site stacks up to others in your industry? Are you ever curious about the average stats across the web? Measuring site performance is crucial for improving your business, but it’s often hard to contextualize what that site performance means -when is good actually “good enough”? How is your site doing competitively… and what investments should you be making?
Introducing Clarity Website Benchmarks – Beta
Clarity Website Benchmarks -Beta is our new interactive tool to answer these questions for you. Get a clear picture of the user behavior and trends across the web. And slice it by site category to see how your website stacks up comparatively.
There are three main ways to use this public report:
1. See metrics across the general web.
Gauge the average traffic distribution (browser, OS, etc) and average behavioral metrics (rage clicks, quick backs) across the web. Go to the Clarity Website Benchmarks page and scroll down to view these numbers.
2. See metrics for a certain site category
View the same metrics, but filtered to a specific site category. If you’re an e-commerce website, for example, you may find it helpful to apply the “Shopping” filter. This will show you the average traffic distribution and behavioral metrics across sites that are also classified as e-commerce.
3. Compare two site category metrics
Add a second site category and compare the average stats for two separate site categories. If you’re curious how e-commerce sites and game sites might differ, applying “Shopping” and “Games” filters will show you a side-by-side view of the average stats for each.
Where does Clarity get this data from?
This report aggregates data from billions of anonymous Clarity user sessions worldwide. The metrics we surface in the report are the same metrics we provide for Clarity users via our Clarity product dashboard.
What does “Beta” mean?
We released this tool as a Beta version (i.e., an early release before the tool is officially shipped) because we are continuing to improve the quality and coverage of the data. We welcome your feedback as you use this report -let us know what you like and what additional capabilities you would like to see!
How can I start seeing these benchmark stats?
It’s easy! Clarity Website Benchmarks – Beta is publicly available and updates regularly. Visit Clarity website benchmarks (microsoft.com) to start viewing! | s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100873.6/warc/CC-MAIN-20231209071722-20231209101722-00170.warc.gz | CC-MAIN-2023-50 | 2,442 | 16 |
https://mobile.slashdot.org/story/10/09/17/1442242/microsoft-releases-final-windows-phone-7-dev-tools?sdsrc=prevbtmprev | code | cgriffin21 writes "Microsoft on Thursday released the final Windows Phone 7 developer tools to manufacturing, giving coders a couple of weeks' lead time to get their apps ready for the launch of the Windows Phone Marketplace in early October. Microsoft released the Windows Phone 7 OS to manufacturing on Sept. 1, and its OEM partners are in the process of testing it on handsets. The Windows Phone 7 developer tools are the final piece of the puzzle for Microsoft, which is now ready to march back into a mobile market where it has fallen alarmingly behind the leaders." In related news, CNET reports that Windows Phone 7 will only be available for GSM networks at launch, with a CDMA version planned for the first half of next year. This rules out Sprint and Verizon for launch.
#NetNeutrality is STILL in danger - Click here to help. DEAL: For $25 - Add A Second Phone Number To Your Smartphone for life! Use promo code SLASHDOT25. Check out the new SourceForge HTML5 Internet speed test. × | s3://commoncrawl/crawl-data/CC-MAIN-2017-47/segments/1510934803906.12/warc/CC-MAIN-20171117185611-20171117205611-00357.warc.gz | CC-MAIN-2017-47 | 994 | 2 |
http://www.webassist.com/forums/post.php?pid=210722 | code | view site as different user?
I'm trying to work out the best way of allowing a staff user on our client's website to be able to quickly view the site as a different user type. Different content is displayed depending on which user type is logged in. At the moment, I've created a dummy user account but they need to logout of their own account then login as the dummy user, which isn't ideal. I'd like to add a button that's only viewable to Staff users which would allow them to quickly switch user type and allow them to view the site as the dummy user would see it (similar to the "view as person" option on Facebook)? Presumably I'd need to pass different session variables in when the button is clicked, but just not sure how I would do this? | s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579251690095.81/warc/CC-MAIN-20200126165718-20200126195718-00039.warc.gz | CC-MAIN-2020-05 | 747 | 2 |
https://www.katacoda.com/loodse/courses/docker/docker-07-images-interactive | code | In this scenario, we'll explore how to create docker images interactively using
docker diff etc.
Building Images Interactively
Step 1 - Install Apache into running container
docker commit command creates an image from container's changes.
Start an Debian container:
docker run -it debian. It will pull
debian image to
your local system if it does not exist already.
After pulling image, it will start container and open a shell into running container.
We'll install Apache into running container.
apt-get update && apt-get install apache2 -y | s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320304134.13/warc/CC-MAIN-20220123045449-20220123075449-00466.warc.gz | CC-MAIN-2022-05 | 541 | 12 |
https://www.yogasearcher.com/en/e-shop/487-8624-lolasana-debardeur.html | code | Who said a yoga class can't be Rock'n Roll ? Ladies' sleeveless flowing yoga top in cotton modal. Open back, it offers a V-neckline with a small link behind the neck to hold the straps during practice. His style is underlined by the snake print on the front. White, for Kundalini yoga.
Made in Europe. | s3://commoncrawl/crawl-data/CC-MAIN-2021-39/segments/1631780057973.90/warc/CC-MAIN-20210926205414-20210926235414-00517.warc.gz | CC-MAIN-2021-39 | 301 | 2 |
http://www.softvative.com/blog/2006/01/improve-performance-of-sql2000-server-if-the-server-has-case-insensitive-collation-and-hosting-a-ps2003-db/ | code | Check this article on Microsoft site which improves performance of SQL server hosting Project database
Improve performance of SQL2000 server if the server has case-insensitive collation and is hosting a Project Server 2003 database
Mail (will not be published) (required)
Notify me of follow-up comments by email.
Notify me of new posts by email.
Enter the CAPTCHA *Time limit is exhausted. Please reload CAPTCHA. | s3://commoncrawl/crawl-data/CC-MAIN-2017-22/segments/1495463607726.24/warc/CC-MAIN-20170524001106-20170524021106-00239.warc.gz | CC-MAIN-2017-22 | 413 | 6 |
https://theweeklyseo.com/issues/144 | code | Post of the Week
Microsoft Teams ❤️ ContentKing
Get instantly alerted about your SEO performance directly in Microsoft Teams.
For example when your robots.txt changes, pages become non-indexable, titles are changed on key pages, or just about anything else with a high impact — you’ll be the first to know.
Push the most important alerts directly in your team’s workspace with ContentKing!
Best practices for ecommerce in Google Search
Google has outlined best practices for ecommerce sites in Google Search, including things like URL structure best practice, getting featured in Google Surfaces and how to design Google-friendly navigation.
How AI is making information more useful
An overview of what will be possible with Google's Multitask Unified Model (MUM), including a redesigned Search page!
Keyword Density and Entity Calculator (Python + Knowledge Graph API)
Greg Bernhardt shows you how to use Python & the Knowledge Graph API to calculate keyword frequency and classify keyword entities. Brilliant!
Processes & Frameworks
Measuring the impact of Google's Title Rewrite Change
Want to measure the impact of Google's recent title rewrite change? The very talented Richard Fergie describes how to do this using forecasting.
Best Local Landing Pages: A Blueprint
A superb blueprint for local landing pages by Carrie Hill 👏
Reveal Your Rivals with True Competitor (Beta)
A cool new tool from Moz; True Competitor (Beta). It includes two new metrics: 'Overlap' and 'Rivalry', check out the article to see what they are!
SEO Organic Growth Manager for Google
Want to do SEO for Google? This position could be for you! 🔍
My Products 💡
Forecasting For SEO (Video Course)
Join over 250+ SEOs who have used my course 📊
Everything I’ve learned, tried and tested about SEO forecasting. Including a FREE Google Sheets template to help you build your own forecasts.
Hi there 👋,
Did you watch Google's Search On event? If you missed it you can view the recording here.
It was fascinating! The event highlighted Google's advances in AI and how it is going to enable entirely new ways to search. From things like searching visually alongside inputting questions about what you see. And new ways to broaden and refine searches.
Redesigning search features to include more features is good and bad news for SEOs. The more features Google displays, the easier it is to extract them, and infer intent and topics. It could also continue to keep users within Google's environment and encourage zero-click searches.
My Post of the Week is another by Tom Critchlow. It's all about how you can use surveys to increase executive buy-in, particularly when things are hard to measure. He also uses some great personal examples!
I liked this quote:
"I’ve lost count of the times I’ve tried to convince clients to invest in content quality. Of course - the failure is all mine."
We should accept more responsibility as SEOs. It's our job to convince people to act.
Until next week!Andrew Charlton | s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296943809.22/warc/CC-MAIN-20230322082826-20230322112826-00221.warc.gz | CC-MAIN-2023-14 | 3,008 | 33 |
https://isdown.app/integrations/digitalocean/incidents/149371-digitalocean-container-registry-and-app-platform | code | Need to monitor DigitalOcean outages?
Stay on top of outages with IsDown. Monitor the official status pages of all your vendors, SaaS, and tools, including DigitalOcean, and never miss an outage again.
Start a Free Trial
Our engineering team has implemented a fix to resolve the issue with our App Platform and Container Registry services and is monitoring the situation closely.
Users should no longer see any issues while pushing their images to their container registries and App Platform users shouldn't experience any build failures.
We will post an update as soon as the issue is fully resolved.
Our Engineering team took action to remediate the impact and is working on restoring the full functionality.
We expect to provide another update around 14:00 UTC. We apologize for the trouble and thank you for your patience.
Our Engineering team has identified the cause of the issue with App Platform and Container Registry and is actively working on a fix.
Currently users will continue to see errors with App Platform deployments and Container Registry.
We will post an update as soon as additional information is available.
As of 05:20 UTC, our Engineering team is investigating an issue with DigitalOcean Container Registry and App Platform. At this time, users may experience errors while interacting and authenticating with the DigitalOcean Container Registry, creating new container registries, and pushing/deleting images to/from registries.
App Platform users may experience build failures.
We apologize for the inconvenience and will share an update once we have more information.
With IsDown, you can monitor all your critical services' official status pages from one centralized dashboard and receive instant alerts the moment an outage is detected. Say goodbye to constantly checking multiple sites for updates and stay ahead of outages with IsDown.Start free trial
No credit card required · Cancel anytime · 2760 services available
Try it out! How much time you'll save your team, by having the outages information close to them? | s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233505362.29/warc/CC-MAIN-20230921073711-20230921103711-00069.warc.gz | CC-MAIN-2023-40 | 2,048 | 17 |
https://community.spotify.com/t5/Desktop-Windows/Windows-10-problem/td-p/1722810 | code | since I updates my laptop with the creators update in spring the Spotify Program for Windows doesn't work for me anymore. It mostly freezes my laptop, so even the mouse cant move anymore. After many clean-installs, driver-checks and so on I tried to install Spotify from the Windows Store, hoping this would work for Windows 10. But directly after installing, as the app opened automatically, my laptop completely froze again, so I head to shut it down through holding the power button for 5 seconds. I really love Spotify and the Windows Program always worked fine for me, but now with the Creators Update Spotify I cant use it anymore. FIX THIS PLEASE! | s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446711042.33/warc/CC-MAIN-20221205164659-20221205194659-00181.warc.gz | CC-MAIN-2022-49 | 654 | 1 |
https://www.tech-invite.com/y05/tinv-ietf-rfc-0568.html | code | Network Working Group J. McQuillan
RFC #568 BBN-NET
NIC #18971 18 September 1973
Response to RFC 567 -- Cross-Country Network Bandwidth
This note serves as a brief correction to several fundamental errors in
RFC 567 by L. Peter Deutsch.
1. Not all packets are 1000 bits long. This is basic to the network
2. RFNMs are 152 bits long (72 bits of hardware framing and 80 bits of
software identification and addressing). Host Host protocol messages
such as single-characters and allocates are 216 bits long (40 bits
of Host protocol, 8 bits for the character or ALL, and an additional
16 bits of IMP software header). This totals to 736 bits in each
direction, not 4000.
3. The number of single-character messages that can be supported is
therefore over 200 per second, not 37.5 per second. Not only is
such a traffic pattern unlikely, but it can be supported in the IMP
subnetwork much more readily than in most Hosts.
4. Furthermore, if the demand for remote echoing ever exceeds network
capacity, the TIPs and Hosts can simply buffer 2 characters per
message, doubling the effective bandwidth of the network. Of
course, dozens of characters can be packed into a single message
with nearly proportional increases in effective bandwidth, given the
size of the overhead. This buffering happens automatically and
incrementally with increasing load as the natural consequence of
5. It is most likely that the poor echoing response cited by Deutsch is
not caused by peak network loads. If echoing was coming in 5-
character bursts, there would have to be _1000_ characters per
second coming from users of remote-echo systems to use all the
capacity of 3 50-kilobit paths.
6. This reasoning points up the more serious error in RFC 567: the
problems associated with bad echo response are delay problems, not
bandwidth. In designing the IMP software, we have used a bimodal
model of traffic, and attempted to provide low delay for interactive | s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446710978.15/warc/CC-MAIN-20221204172438-20221204202438-00065.warc.gz | CC-MAIN-2022-49 | 1,932 | 33 |
https://forum.virtualmin.com/t/new-install-sh-no-longer-updates-whole-system-at-the-end-of-the-installation-process/25697 | code | I just wanted to give everyone a heads up that in response to repeated bug reports about failure to reboot after a Virtualmin installation due to kernel bugs on CentOS, Fedora and RHEL, I have removed the update process that was previously being triggered at the end of a Virtualmin installation.
I strongly recommend you update your systems before putting them into service, but be aware that CentOS/Fedora/RHEL have recently been rolling out kernels that simply won’t boot on some hardware (my laptop and qemu systems exhibit this problem with some of the recent kernels, while my desktop and virtualmin.com do not…so it’s about 50% in my experience, but my data set is limited).
Anyway, it’s not our fault! I thought I was picking the lesser of two evils by triggering a full system update at the end of the installation, but it’s looking like customers aren’t happy with that decision (it also makes it look like the install takes a really long time and requires gigabytes of downloads for folks who have an all-packages install and have never updated their system).
So, in short, if you’ve installed Virtualmin and couldn’t boot afterward, it’s a buggy kernel from your OS vendor. Reboot and select an older kernel, and all should be well. We have no control over it and can’t fix it. But I promise not to make the problem exhibit in the future.
I can learn from my mistakes. If I have to. | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337668.62/warc/CC-MAIN-20221005203530-20221005233530-00367.warc.gz | CC-MAIN-2022-40 | 1,414 | 5 |
https://mpsdevelopment.net/browser_games.html | code | Customs Department Game. Customs employee’s corruption activities in Ukraine simulator. Strong mathematical model of corruption was built at back-end. Angular 2 technology was used at front-end
Apple Orchard. HTML5 Apple Orhcard is the live demonstration of the very best what can be done with HTML5 tech so far. Box2d physics, visual effects and sounds are pushing gameplay experience on PC, tablets and touch phones to the one of naitive apps.
Golden Chips. HTML5 Golden Chips is the simple yet addictive memory puzzle game. Players are given 30 seconds to find as many identical pairs as they could.
Monkey Music. HTML5 Yet another sokoban puzzle game. This time featuring Music Theme and powered by own HTML5 game engine. Monkey Music arguably is the first ever crossplatfrom HTML5 game with sounds on all devices.
- HTML video player
- Video stream encryption
- On-fly video decryption
- Removable media copy protection
- Online update of media-content
Skills & expertise
- AngularJS 1.5
- AngularJS 2
- HTML 5
- Create JS | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337360.41/warc/CC-MAIN-20221002212623-20221003002623-00692.warc.gz | CC-MAIN-2022-40 | 1,029 | 14 |
https://alexecollins.com/page/2/ | code | I was reminded the other day about the excellent Project Lombok. If you're not familiar with this tool, it helps reduce boilerplate AND testing. You annotate your Java source code with some special annotations, and it generates code based for you....
Some notes from a recent holiday in Madrid.
We stayed at Room Mate Oscar. It was central, had a great roof bar (Ibiza style), but found it quite noisy at night (due to the roof bar).
We went to all the main places, the highlights were:
In this article I'll walk you through my experience setting up a Continuous Delivery pipeline using (mostly) open and free tools.
I've spent a lot less time writing code over the last year, and decided to create a small side-project to keep my Kubernetes
I opened my emails to see how long I had been using Gmail, and found the very first email I sent as long ago as 2014:
I then used Gmail with abandon - but it's clear perhaps I should have stuck with my first instincts.
But didn't I? It was free...
I've developed a new diagram that I think it much better at communicating how the messages in a system flow between components. I've used sequence diagrams for this in the past, but I've always found a number of problems with them. | s3://commoncrawl/crawl-data/CC-MAIN-2018-26/segments/1529267865098.25/warc/CC-MAIN-20180623152108-20180623172108-00428.warc.gz | CC-MAIN-2018-26 | 1,221 | 10 |
https://www.adventiumlabs.com/about-us/staff/technical-staff/robert-edman-phd | code | Robert Edman, Ph.D.
Dr. Robert Edman is a Mathematician and Computer Scientist who works on real-time scheduling, embedded systems, and networking research projects for Adventium Labs. In his real-time scheduling work Dr. Edman has focused on the automatic generation of static schedules for safety critical avionics systems and helped implement a static scheduler in XEN. In his embedded systems work Dr. Edman has built devices with desired security properties and analyzed COTS devices to provide realistic configurations for models and planning software. He continues to teach calculus classes at the University of Minnesota in the evenings. | s3://commoncrawl/crawl-data/CC-MAIN-2019-35/segments/1566027322170.99/warc/CC-MAIN-20190825021120-20190825043120-00330.warc.gz | CC-MAIN-2019-35 | 645 | 2 |
http://www.slideshare.net/hartjeff12/ipe07-11356986 | code | A monopoly is when only one company exerts control over most of a market. An oligopoly is similar except that there are at least two firms.
Source: Investopedia.com Few multinationals aspire to be monopolies. Monopolies attract government regulation and consumer anger (just ask Microsoft). Small oligopolies (such as Coke, Pepsi, and Cadbury-Schweppes) make plenty of money and avoid the constant attention of the regulators. | s3://commoncrawl/crawl-data/CC-MAIN-2015-18/segments/1429246657588.53/warc/CC-MAIN-20150417045737-00141-ip-10-235-10-82.ec2.internal.warc.gz | CC-MAIN-2015-18 | 426 | 2 |
http://blogs.msdn.com/b/alfredth/archive/2006/10/18/important-concepts-in-oop.aspx | code | The Wicked Teacher of the West is looking for the most important concepts in Object Oriented Programming as she develops a new course. It's a tough question because teachers only have so much time to present material to students. That time has to be used wisely.
My list is more or less:
I feel like I am leaving something out. I need more time on this. What do you think I am leaving out? Is anything on my list not among the "most important" concepts of OOP?
Of course the basic building blogs of "regular" programming are also important.
It all has to be build around understanding problem solving and good design thinking. Without problem solving skills its all just wasted. Of course I'm just stating the obvious - right?
The most important thing to understand in Object Oriented design is that it is attempting to bridge the problem domain and the solution domain, and that the public interfaces should closely model the problem domain and that solution specifics should be encapsulated.
I largely agree with your list and your ordering (although I'm not sure if you intended it to be "in order").
Encapsulation is the most important, along with it's companion "Data hiding". I like the second term because it stresses it's importance of the concept -- a class which exposes all it's private data as public properties is helping no one. Along with that is the importance of encapsulating methods. The concept that seems hardest for new OO programer to break free of is the paradigm of "get the data from the object; manipulate it by the client; set the data back to the object" rather than "have the object manipulate itself".
Inheritence, on the other hand, I'd put very low, almost to the point of dismissing it as an implementation detail.
The list seems to be complete and in order as I see it. I would agree with James above that it is hard to break from the thinking mode of manually manipulating data but the better I get and more time I spend, I find that setting the object to manipulate itself is crucially important to clean programmming and time conservation. | s3://commoncrawl/crawl-data/CC-MAIN-2016-07/segments/1454701153736.68/warc/CC-MAIN-20160205193913-00272-ip-10-236-182-209.ec2.internal.warc.gz | CC-MAIN-2016-07 | 2,077 | 10 |
https://forum.enscape3d.com/index.php?thread/6960-manually-install-plug-in/ | code | I've got a full version of Enscape installed, and the Revit add-in, but somehow the Sketchup plug-in didn't get installed
Is there a way I can activate just the Sketchup plug-in?
Or maybe manually copy some files in?
This is actually for someone else. I have everything installed and working on my computer, but they need to be able to get the SU plug-in without Admin rights, so please don't suggest running the Install again. | s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817128.7/warc/CC-MAIN-20240417013540-20240417043540-00622.warc.gz | CC-MAIN-2024-18 | 427 | 4 |
https://iis.uva.nl/en/projects/workshops/interdisciplinary-research/interdisciplinary-research.html | code | This workshop is for lecturers involved in programmes where students carry out interdisciplinary research, or for those with an interest in interdisciplinary research and who want to use it in their teaching.
The workshop focuses on a model for carrying out interdisciplinary research. ‘An Introduction to Interdisciplinary Research’ is introduced with examples from teaching practice. 'An Introduction to Interdisciplinary Research' is a clear and accessible book introducing the topic. It describes succinctly how academic disciplines have developed into their present form and what characterises those disciplines. It then explains what interdisciplinarity is and what the drivers are for interdisciplinary research. The book also covers interdisciplinary integration.
The second part of the workshop introduces a model for guiding students through the interdisciplinary research process. Examples are used to make each step clear and tangible. The workshop provides an overview of the contents of the book, with a special focus on the model. Lecturers can then start working with the method themselves. A handbook for lecturers is also provided, with pointers and suggestions of what to look out for when using 'An Introduction to Interdisciplinary Research’ as part of a course. | s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370497171.9/warc/CC-MAIN-20200330150913-20200330180913-00372.warc.gz | CC-MAIN-2020-16 | 1,289 | 3 |
https://www.shl.com/resources/by-type/blog/2022/how-shl-handles-uncompilable-code-in-coding-skill-assessments/ | code | How SHL Handles Uncompilable Code in Coding Skill Assessments
Uncompilable codes in coding skill assessments—is that bad? Learn how SHL’s technology helps you to detect a program’s quality, despite those uncompilable codes.
If you have ever taken a coding test for a job on a machine, you probably frown if you could not make your code compile. Your program might be almost right, but due to some silly bug, unidentified in a small-time frame, you will get a ZERO score. According to SHL’s Tech Talent report, on average, around 25% of candidates in a hiring pool have strong coding skills, but often get sorted out due to the limited capability of traditional coding skill assessment platforms—a missed opportunity.
But fret not! SHL’s AI team has created a technology that can detect how good the program’s algorithm is, even if it does not compile. Our coding skill assessment platform can understand uncompilable programs using Artificial Intelligence and provides semantic feedback to improve.
Uncompilable code is not equivalent to a zero score in the coding skill assessment
How do we do it? First, we can fix some of the codes using Artificial Intelligence. By looking at patterns in good compilable codes, our algorithms minimally modify existing programs to make them compilable. And by using this approach, we can compile about 40% of uncompilable codes. Once compilable, our patented machine learning-based algorithm can generate a grade that mimics human raters.
Fancy as it may seem, we had a harder problem to solve.
What about the codes that do not compile? The remaining 60% of the codes go through smart static analysis and derive features, and signatures of the logic of the program automatically. With these features and a customized form of our machine learning algorithm, we provide grades as accurate as you could think!
Where does it make a difference? Let’s look at some real data. On a set of programs attempted for a job in a large e-commerce player in the USA, we find that 46% of codes were not compiling but were not blank.
Our AI-based algorithm found that 6% of these codes, for 596 candidates, had nearly correct logic. Another 29% of candidates, with a little bit of guidance, would have reached the right logic. All these candidates deserved a shot with the company!
By looking at patterns in good compilable codes, our algorithms minimally modify existing programs to make them compilable. And by using this approach, we can compile about 40% of uncompilable codes.
This system was also used by a large IT company in India for the large-scale hiring of entry-level software engineers. The company hires thousands of software engineers every year and struggles with filling all open positions. By way of grading non-compilable codes, they have been able to improve hiring throughput by 30-40%.
More recently for a technology giant in China, the system helped in selecting around 26% more candidates for the interviews. These candidates had written a logically meaningful code, but the code did not compile. Out of these candidates, around 19% of candidates were finally hired (detailed analysis in Table 1). This is a big win as many worthy candidates who would have been missed out by traditional program grading systems were hired.
What is more? Our AI algorithm provides feedback to all candidates whose code does not compile. To some, we can tell how to fix their programs and make them compilable. To all, we can give them feedback on their algorithmic approach, tips to reach the correct logic, and provide feedback on the stylistic and maintainability issues in their code.
Disappointed with coding skill assessment platforms which give everyone a poor score and no feedback… We have corrected this for all times to come! | s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100381.14/warc/CC-MAIN-20231202073445-20231202103445-00427.warc.gz | CC-MAIN-2023-50 | 3,781 | 15 |
https://dash.harvard.edu/handle/1/17467349 | code | Exploring the Role of Randomization in Causal Inference
CitationDing, Peng. 2015. Exploring the Role of Randomization in Causal Inference. Doctoral dissertation, Harvard University, Graduate School of Arts & Sciences.
AbstractThis manuscript includes three topics in causal inference, all of which are under the randomization inference framework (Neyman, 1923; Fisher, 1935a; Rubin, 1978). This manuscript contains three self-contained chapters.
Chapter 1. Under the potential outcomes framework, causal effects are defined as comparisons between potential outcomes under treatment and control. To infer causal effects from randomized experiments, Neyman proposed to test the null hypothesis of zero average causal effect (Neyman’s null), and Fisher proposed to test the null hypothesis of zero individual causal effect (Fisher’s null). Although the subtle difference between Neyman’s null and Fisher’s null has caused lots of controversies and confusions for both theoretical and practical statisticians, a careful comparison between the two approaches has been lacking in the literature for more than eighty years. I fill in this historical gap by making a theoretical comparison between them and highlighting an intriguing paradox that has not been recognized by previous re- searchers. Logically, Fisher’s null implies Neyman’s null. It is therefore surprising that, in actual completely randomized experiments, rejection of Neyman’s null does not imply rejection of Fisher’s null for many realistic situations, including the case with constant causal effect. Furthermore, I show that this paradox also exists in other commonly-used experiments, such as stratified experiments, matched-pair experiments, and factorial experiments. Asymptotic analyses, numerical examples, and real data examples all support this surprising phenomenon. Besides its historical and theoretical importance, this paradox also leads to useful practical implications for modern researchers.
Chapter 2. Causal inference in completely randomized treatment-control studies with binary outcomes is discussed from Fisherian, Neymanian and Bayesian perspectives, using the potential outcomes framework. A randomization-based justification of Fisher’s exact test is provided. Arguing that the crucial assumption of constant causal effect is often unrealistic, and holds only for extreme cases, some new asymptotic and Bayesian inferential procedures are proposed. The proposed procedures exploit the intrinsic non-additivity of unit-level causal effects, can be applied to linear and non- linear estimands, and dominate the existing methods, as verified theoretically and also through simulation studies.
Chapter 3. Recent literature has underscored the critical role of treatment effect variation in estimating and understanding causal effects. This approach, however, is in contrast to much of the foundational research on causal inference; Neyman, for example, avoided such variation through his focus on the average treatment effect and his definition of the confidence interval. In this chapter, I extend the Ney- manian framework to explicitly allow both for treatment effect variation explained by covariates, known as the systematic component, and for unexplained treatment effect variation, known as the idiosyncratic component. This perspective enables es- timation and testing of impact variation without imposing a model on the marginal distributions of potential outcomes, with the workhorse approach of regression with interaction terms being a special case. My approach leads to two practical results.
First, I combine estimates of systematic impact variation with sharp bounds on over- all treatment variation to obtain bounds on the proportion of total impact variation explained by a given model—this is essentially an R2 for treatment effect variation. Second, by using covariates to partially account for the correlation of potential out- comes problem, I exploit this perspective to sharpen the bounds on the variance of the average treatment effect estimate itself. As long as the treatment effect varies across observed covariates, the resulting bounds are sharper than the current sharp bounds in the literature. I apply these ideas to a large randomized evaluation in educational research, showing that these results are meaningful in practice.
Citable link to this pagehttp://nrs.harvard.edu/urn-3:HUL.InstRepos:17467349
- FAS Theses and Dissertations | s3://commoncrawl/crawl-data/CC-MAIN-2019-04/segments/1547583658988.30/warc/CC-MAIN-20190117143601-20190117165601-00145.warc.gz | CC-MAIN-2019-04 | 4,470 | 9 |
https://flylib.com/books/en/4.36.1.105/1/ | code | |< Free Open Study >|| |
Computers have the ability to do a very wide range of things for you, but frequently only if you have the appropriate hardware installed. This section discusses some custom hardware devices installed on the case study system, and the support available for them.
This case study is based on Red Hat Linux 7.3, and some of the information in this section is specific to that distribution. However, hardware support for any Linux system really boils down to what the kernel itself supports. Since all distributions have the same kernel, much of this material is not distribution specific, and would be applicable to the other distributions covered in this book, and even others that are not covered. Things that are kernel specific and things that are Red Hat Linux specific are pointed out.
Iomega's ZIP drive is an extremely popular product. ZIP disks are 3.5-inch cartridges, roughly the same dimensions as floppy disks, that can store several hundred megabytes of data. ZIP drives are available in a number of interface formats; some are attached externally via the system's parallel port or a SCSI or USB interface, whereas others are internal and use the very common ATAPI IDE standard.
The Linux kernel supports ZIP drives in each of these formats. However, since each drive interface is quite different, the support for them varies. For example, if the ZIP drive uses a SCSI interface, then it appears literally identical to any other SCSI device. However, if the ZIP drive is an internal ATAPI drive, then it is supported as a standard IDE drive, just as would an IDE hard disk. USB ZIP drives are supported by a special USB device driver and exposed as SCSI devices. Finally, just to complicate things, ZIP drives on the parallel port are supported by a ZIP drive-specific device driver kernel module (called "ppa" or "imm" depending on the particular ZIP drive version), but are exposed to the system as SCSI devices.
There are four types of ZIP drive—parallel port, SCSI, USB, and IDE—and therefore four cases for configuring a ZIP drive. Each of these methods is fairly different at a low level, but in the end they all have the save result: a device file pointing to the disk that can be used to mount it. The three following sections discuss how ZIP drives are handled for SCSI, parallel port, and IDE cases; USB drives are discussed later in this chapter.
A SCSI ZIP drive is supported transparently as a SCSI disk by Linux's SCSI framework. This means that the ZIP drive will be exposed to the system as a standard SCSI device, having a name such as /dev/sda. The "/dev/sd" part denotes a SCSI disk; the "a" indicates that it is the first SCSI disk on the system. If you have a SCSI ZIP drive, then it may or may not be the first SCSI device, so you'll have to change "a" to another letter. For example, if your ZIP drive is the fourth SCSI device, it will be /dev/sdd.
The Linux kernel driver for SCSI devices is sd_mod (for "SCSI Disk") and is usually included as a kernel module on Red Hat Linux systems (and included in the initial ramdisk on systems that need it, as discussed in Chapter 4). The ZIP drive will appear as a simple disk on whatever SCSI host controller to which it is connected.
A parallel port ZIP drive contains special hardware that is actually a SCSI controller. The Linux kernel includes a device driver that can communicate with this hardware over the parallel port and expose the ZIP drive as a standard SCSI device. This takes the form of a second SCSI host controller; that is, if the system already has a SCSI controller card, these kernel drivers will appear as a second SCSI controller.
There are two versions of this parallel port/SCSI hardware, known as PPA and IMM. Linux includes drivers (named simply "ppa" and "imm", respectively) for both variants. The drivers themselves create a separate SCSI host controller for the device, and the ZIP drive will appear as the sole device attached to that controller. As with normal SCSI devices, parallel port ZIP drives will appear as /dev/hda, /dev/hdd, and so on.
An IDE ZIP drive is treated as an IDE floppy device. Linux includes a device driver that supports IDE floppy disk drives. IDE ZIP drives perhaps have more in common with IDE CD-ROM drives than IDE floppy drives, but they are treated as floppy drives nonetheless. That is, they are supported by the same device driver.
The IDE floppy disk device driver is named ide-floppy. Normally, Red Hat Linux has this driver built into the kernel (and not as a loadable module), so you shouldn't have to do anything, and the kernel should detect your ZIP drive on bootup. The device will appear as a normal IDE device, such as /dev/hda for the first IDE device, or /dev/hdd for the fourth. (The naming convention is similar to that of SCSI devices, mentioned earlier, except that "hd" is used instead of "sd".)
Red Hat Linux includes the ide-floppy device driver, which supports IDE ZIP drives as a built-in feature, rather than a loadable module. This makes it easy to detect ZIP drives (and, of course, other IDE floppy drives) on bootup. However, not all distributions do it this way, and some include ide-floppy as a kernel module.
On these systems, you may run into a scenario that may be confusing at first, especially if you're using the ide-scsi SCSI emulation module, which is mentioned in the section "Using a CD Writer" later in this chapter. Specifically, if that module is used and ide-floppy is compiled as a kernel module, then it's possible that the ide-scsi module can load before the ide-floppy module.
In this case, the ZIP drive might be managed by the ide-scsi module (rather than the ide-floppy module) and would be exposed to the system as a SCSI device instead of an IDE device. For example, it might be /dev/sdb instead of /dev/hdd. If you are using another distribution, or even simply a custom kernel on Red Hat Linux, you might run into this issue and should be aware of it. All that will change is the device name of the ZIP drive.
Once you have the appropriate kernel modules loaded, the ZIP drive will appear as a standard block disk device, so you can interact with it as you would with any such device. If you aren't yet sure what device name your ZIP drive is exposed as, you'll have to check your system's configuration. You can check by using the dmesg command or /var/log/messages to see how the kernel named the drive, or by looking at /etc/fstab to see how kudzu set up the mount points for the device.
There is a minor idiosyncracy to be aware of when using ZIP drives, and that is which partition you use. If you buy a ZIP disk, it will probably come preformatted with the FAT (File Allocation Table) filesystem. Normally you would expect this partition to be the first partition—for example, /dev/sda1 (if your ZIP drive is /dev/sda). However, this isn't the case, and by default new ZIP disks have the filesystem on the fourth partition—/dev/sda4 in the same example. You can alter this if you repartition the ZIP disk with the fdisk program, but it's something to be aware of when you use new disks, or if you wish to reformat a disk without repartitioning it (such as reformatting a ZIP disk with the standard Linux ext2 filesystem, which is definitely possible).
ZIP disks are factory partitioned to use the fourth partition as the actual data partition (such as /dev/sda4 or /dev/hdc4). On a related note, some ZIP drive manufacturers have a hardware setting that is intended to make this behavior invisible to the operating system, by hiding the partition table on ZIP disks inserted into it. Unfortunately, this behavior breaks Linux. If you have such a ZIP drive (and it works under Windows or another operating system, but not Linux), then there is probably a jumper on the device that you can change to disable the behavior.
Of course, you may never actually have to do this, because Red Hat Linux does it for you. When kudzu detects a ZIP drive, it not only configures the device drivers for it, but it also creates a mount point for the drive. Specifically, the directory /mnt/zip100.0 is created for 100MB ZIP drives, and a corresponding entry is created in /etc/fstab. (The fstab file is pretty simple, and is common to almost all Unix-like systems; you should check the manual page for fstab for details.)
So, to mount your ZIP drive, you probably don't have to do anything more than just type mount /zip100.0 and it will work. If you use a desktop environment such as KDE, icons for the drive will also be created for you automatically, in which case you can use them as well. However, should you need to do something with the drive or disk directly, it's useful to know how to find it, which was the purpose of this section.
The Universal Serial Bus (USB) is a standard for connecting a variety of hardware devices to a computer. Any number of nifty gadgets employ USB, such as MP3 players that use it to manage the playlist, PDAs that use USB to synchronize data with the computer, digital cameras that use USB to transfer images to the computer, and so on. USB support on Linux systems is primarily provided by the Linux kernel, meaning that the distribution doesn't have a great deal to do with it. This section discusses several example uses of USB with the case study system.
Generally, there isn't much you'll have to do to get USB working—at least, at the core. Chances are Red Hat Linux will detect your USB host controller hardware correctly and configure it for you. After that, all you have to do is plug in a USB device, and see whether it's recognized by the kernel (which is to say, whether the device is supported and has a kernel module available for it).
It's important to keep in mind that even once your device's driver is loaded, all that's happened is that access to it is exposed by the kernel to userspace programs. Another way to put it is that each USB device driver really just exposes a small API for interacting with the device. The userspace programs themselves are responsible for knowing how to use this mini-API. The API may take different forms, depending on the driver. Sometimes these are quite standard (such as USB storage devices, described later in this section), and sometimes they are quite complex (such as a USB MP3 player, also described later in this section).
Some example USB devices that I use with the case study system are presented in upcoming sections, along with information on how to configure them. The goal of these examples is to illustrate how the specific USB driver exposes access to the USB device in a way specific to that device, rather than provide a tutorial on how to use such devices. (By now, you should be able to work out the mechanics yourself, once you get some pointers.)
Before delving into the details, it helps to have an understanding of how the USB architecture in Linux generally works. There is ample documentation on Linux's USB architecture included with the kernel source code, so this is really just a brief introduction. In general USB support within Linux exists on four levels, as described next.
The first level is the core framework. This is the kernel module that implements the general USB system calls within the kernel, as well as an abstraction layer that applications interact with. That is, applications don't work directly with the USB controller hardware, but instead work with the core USB framework provided by the kernel. This level can be viewed as analogous to the general, high-level network APIs such as TCP/IP that run the same regardless of which hardware is being used.
The second level is the USB host controller driver. This takes the form of a device driver customly written for a specific piece of hardware. Referring to the analogy to the networking system, the USB host controller would be equivalent to an Ethernet card driver. However, USB manufacturers agreed on two standards for USB controller hardware: the Universal Host Controller Interface (UHCI) and the Open Host Controller Interface (OHCI).
USB controller manufacturers implement one or the other of these hardware specifications, meaning that there isn't as wide a variety of USB drivers as there is of Ethernet controllers, because many manufacturers' devices use the same drivers. In fact, only three common drivers exist for USB controllers: the usb-ohci driver for controllers that use the OHCI standard, and the usb-uhci and uhci drivers for UHCI cards. (The two drivers for UHCI have slightly different support for different hardware; if one driver doesn't work well with your configuration, you may wish to try the other.)
The third level of USB support is device-specific drivers. These are drivers that actually work with a specific USB device, such as a digital camera or MP3 player. You can think of the first two levels as simply providing USB connectivity, in that they merely allow the kernel and system to "see" USB devices. However, each device is different, so even if you already "see" the device, you still have to "speak its language" in order to use it. A number of drivers at this level implement support for various specific USB devices at the kernel level.
The final level of USB support is the kernel's "hotplug" mechanism, which is used for devices that are plugged in to a running system. When the kernel detects such an event, it invokes a program (specifically, /sbin/hotplug) that is responsible for identifying the device and loading the appropriate driver for it. Devices are identified by comparing their identifying string (which can be obtained from the device itself) to a list of supported identifiers that are mapped to kernel modules; the corresponding module is then loaded. The related files (containing these mappings and related scripts) live in the directory /etc/hotplug. The hotplug mechanism works for more than just USB—it also works with PCI and other similar hardware busses.
Digital photography is becoming increasingly popular as digital cameras become cheaper. This section will discuss how to connect such hardware to a Red Hat Linux system. The section "Working with Digital Cameras" later in this chapter discusses the application software you need to complete the circle. Many such digital cameras use USB (rather than the much slower RS-232 serial port or parallel port) to transfer images from the camera to the desktop computer for storage. Some of these cameras have USB drivers available for Linux.
The camera model used in this case study is a Kodak DC-280, though the model isn't really relevant; the same general information applies to any supported USB digital camera. Once the camera is plugged into the system's USB port, the usb-core driver will detect it, and the kernel will invoke the hotplug mechanism, which will load the camera-specific driver—in this case, dc2xx.
Once the driver is loaded, a new set of system calls is available to userspace applications. (The details of this API are only of interest to developers, so I won't go into them here.) The job still isn't quite complete, though. You still need a program to make use of these syscalls. Probably the most popular such program is the gphoto program discussed later in this chapter. Once you have gphoto running, you'll be able to use your digital camera just as you would with any other operating system.
Many devices, such as digital cameras, PDAs, MP3 players, and more, employ common and inexpensive flash cards for storage. Generally these cards use either the Compact Flash (CF) standard, or the SmartMedia (SM) standard, or some other format. In the case of CF and SM cards, you can also purchase widely available, inexpensive readers for the cards. Typically these readers are simply a small plastic port into which the flash cards are inserted, and that connect to the computer via USB.
Many of these readers adhere to a hardware specification standard for USB mass storage devices. In fact, this standard supports many things other than just flash card readers; it also includes such nifty gizmos as some keychain storage devices, USB ZIP drives, USB CD writers, and so on. The Linux kernel includes a driver for USB mass storage devices, named usb-storage. If you have a reader (or other device) that obeys the USB mass storage standard, the hotplug mechanism can detect it and load the usb-storage driver automatically.
Unlike the digital camera drivers just described, the usb-storage driver doesn't require any special software, because it doesn't use any custom system calls. Instead, the usb-storage driver simply exposes any devices it detects as standard SCSI disks. For example, if you already have two SCSI disks connected to your system and then connect a flash card reader, it will appear as the third SCSI disk: /dev/sdc. You can then mount, format, or even partition these devices, exactly as you would with any other SCSI storage device.
Another popular device is the portable MP3 player, which allows a user to store and play large amounts of music in the high-quality MPEG-2 Layer 3 (MP3) standard format. These devices are frequently connected to the computer via USB.
Some of the devices may actually use the usb-storage mechanism just discussed to allow you to copy files directly to and from them. However, many use some other scheme—that is, a custom API over USB. For some of these devices for which adequate technical information is available from the manufacturer (or that can be reverse-engineered independently), Linux USB drivers are available. For example, many Rio devices produced by SonicBlue are supported by the rio500 USB driver. As with the digital camera, connecting a Rio-500 (for example) to the system will cause the kernel to load the correct driver by invoking the hotplug mechanism. At that point, a set of system calls will be available—this time, for managing the contents of the Rio-500.
Again, as with the digital camera, you'll need a special program that is written to use these system calls. One such program is the Rio 500 project at http://www.rio500.sourceforge.net. This is actually the home of the Linux kernel USB driver module that provides connectivity to the Rio, but this URL also gives you access to userspace programs you can use to manage the device's contents. The tools allow you to store MP3s to the Rio, remove them, create playlists, and so on. Graphical tools are also available.
Linux has drivers for many other USB devices, and the list is growing. There is support for USB joysticks and gamepads, some USB network adapters, USB web cameras, and so on. This book obviously cannot discuss all of these, but now that you've seen some examples of using USB devices with Linux, you should be able to figure out how to add others.
Generally, just remember the basic procedure: When you plug in a device, the driver for the USB host controller will detect it, and the kernel will invoke the hotplug program to attempt to locate and load a driver for it. After that, you'll need a program that understands how to use the driver (as with the digital cameras and MP3 players), or you'll have to interact with the device (as with the SCSI devices exposed by the usb-storage driver).
Linux's support for USB has its warts; sometimes devices aren't detected by the drivers (especially when the devices are newer than the driver), and sometimes support for devices is spotty or slow, but overall it works pretty well. In some cases—especially with USB input devices such as keyboards, mice, and joysticks— you may have to do a bit more work to get them working correctly, but by now this shouldn't be difficult. Just remember how the system works, and know where to start. USB on Linux really isn't that hard.
Using writable CDs has become a very affordable way to store data, whether it's a backup of your operating system, a copy of important data, an album of photos from your latest family reunion, or a mix of tracks from your favorite music CD. Red Hat Linux makes it fairly painless to use these devices.
Red Hat Linux tries to take a unified approach. Generally, Red Hat Linux tries to treat devices as SCSI devices as much as possible. Linux includes a kernel module known as ide-scsi that emulates the SCSI protocol on behalf of IDE devices. This allows IDE devices to be exposed as SCSI devices, and Red Hat Linux can use this module.
When the ide-scsi module is loaded (via a command such as modprobe or insmod), the driver scans the IDE bus (or busses), locates all IDE drives, and then begins treating them as SCSI devices, translating SCSI calls to IDE calls. Thus, if an IDE ZIP drive is present on the system, after the ide-scsi module is loaded it will be available as a SCSI disk, indistinguishable from other SCSI devices.
This ability to treat any disk as a SCSI disk is extremely useful, and really pretty slick if you think about it. It's used repeatedly within Red Hat Linux, as you've seen before and will continue to see in the rest of this chapter. Many of the sections that follow refer to this notion of SCSI emulation.
When Red Hat Linux boots, it will load the ide-scsi module if necessary (that is, if any devices—such as CD writers or ZIP drives—are present and require it).
Generally, whenever you connect a ZIP drive to the system, Red Hat Linux will detect it by using the kudzu program invoked from /etc/rc.d/rc.sysinit on system bootup, as discussed in Chapter 4. Because of Red Hat's use of the ide-scsi module, kudzu usually only has to worry about detecting SCSI devices, rather than both IDE and SCSI. Once the disk is detected, kudzu will prepare the device for use.
If your CD writer is a SCSI drive, then you're all set, and you don't need to do anything else. However, if it's an IDE writer, then the ide-scsi module is required, so that the IDE device is exposed as a SCSI device for the CD-writing software to use. Fortunately, Red Hat Linux 7.3 detects IDE CD writers, and automatically configures the ide-scsi module for you, for that device.
You can accomplish this by passing a parameter to the kernel from the boot loader (which is usually GRUB). The argument that needs to be passed is [IDE device]=ide-scsi; for example, if your CD writer is normally the third IDE device, it would appear as /dev/hdc. In this case, you'd need to pass the kernel argument hdc=ide-scsi. Red Hat Linux does this for you when you install it.
This means that you probably won't have to do anything in order to get your CD writer working, if it was present when you installed the system. However, if you add it after the system was installed, you'll have to add the line to the boot loader's configuration yourself. (Actually, the kudzu program discussed in Chapter 4 may also do this for you, when you reboot the system. Again, though, it's useful to know what's going on.)
See the section "Using the GRUB Boot Loader" in Chapter 4 for more information and references to the GRUB boot loader.
Once the system is set up to expose the CD writer as a SCSI device, you need only use the appropriate program to burn a CD. Two popular programs, cdrecord and xcdroast, are discussed later in this chapter, in the section "Media and Entertainment."
Modern computers usually have some kind of hardware 3D acceleration in the video card. This acceleration is used by games, and some kinds of technical and engineering software (such as CAD tools and medical imaging). Since this is hardware, these cards have to be supported under Linux with a device driver.
As you read in Chapter 3, the vast majority of Linux systems use XFree86 teamed with some kind of desktop or window manager as the graphical interface. As a result, XFree86 has to support 3D hardware on Linux systems. This generally means that XFree86 has to have a driver for the video card so it can run within the X server. Additionally, many applications that use 3D do so by using the OpenGL programming API, and so practically speaking, support for 3D under Linux also requires an implementation of OpenGL.
It can definitely be argued that 3D support on Linux systems is weak, though this situation is improving rapidly, especially with recent versions of XFree86. The main difficulties are that many vendors' 3D cards do not have drivers and that there is no hardware-accelerated OpenGL implementation for that hardware.
Some vendors release adequate programming information for their hardware, and so XFree86 itself supports 3D acceleration on these cards. Other vendors instead provide downloadable drivers for XFree86 that provide hardware acceleration. In this case, the drivers are frequently not free software or open source, even though source code may be available for them. You'll frequently have to install the driver in a directory and modify the XFree86 configuration to load the driver, which is distributed as a dynamically loadable library.
See "The Origins of Linux" and "GNU and Linux: The Operating System of Champions" in Chapter 1, and "Open Source vs. Free Software" in Chapter 2 for details on the distinction between free software and open source.
However, even if hardware acceleration is enabled, software still needs to be able to access that acceleration. The OpenGL specification is widely used, but it's not technically a standard. An open source package known as Mesa is intended to be source-code compatible with OpenGL (meaning that it implements the same API), but even this library is only able to provide hardware acceleration for chips whose API it understands.
Consequently, many times the vendors who release their own proprietary drivers for XFree86 also include an implementation of OpenGL, so that software can actually take advantage of the accelerations. The plus side of this approach is that you get good hardware acceleration supported by the vendor, but the downside is that you'll have to install the drivers manually, since they aren't included with the distribution.
The video card in the case study is an NVidia TNT2 M64. NVidia is of the latter type of vendor—that is, it supplies its own drivers for XFree86 to provide hardware acceleration under Linux. Unfortunately, NVidia's drivers will obviously only work with its cards.
The bottom line is that if 3D acceleration on your video card isn't supported by XFree86, your card's manufacturer will have to provide that support. Each vendor can do things different ways, so there is no general rule of thumb. The only thing you can do is visit your card manufacturer's web site to see what support it provides, and then follow the instructions the manufacturer gives for installing the drivers. Fortunately, this usually isn't too complicated a task.
So far, you've read about the core desktop and productivity software, as well as the hardware used on the case study system. Now you'll read about the extra, less essential (but no less useful) software used on the case study system, starting with media and entertainment software.
|< Free Open Study >|| | | s3://commoncrawl/crawl-data/CC-MAIN-2021-49/segments/1637964358847.80/warc/CC-MAIN-20211129225145-20211130015145-00574.warc.gz | CC-MAIN-2021-49 | 26,987 | 64 |
https://theefl.myfootballnow.com/forums/1/111 | code | This thread is for any ideas, suggestions, comments, etc. regarding new league rules and regulations.
For example, one idea that would help level the playing field somewhat, is to have one or two top rated players be cut (promoted?) from the LC, CC, and division winners with more than 11 wins. What do you guys think about that idea? Those players could be bid on during the FA period or taken out of the active players list (dont know how to do that, if it can be done). What we dont want is any unfair advantage one way or the other. I think the best way to go on this would be to eliminate the "promoted" player from league use, where they could not be acquired by FA bid. | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335609.53/warc/CC-MAIN-20221001101652-20221001131652-00377.warc.gz | CC-MAIN-2022-40 | 676 | 2 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.