url
stringlengths 13
4.35k
| tag
stringclasses 1
value | text
stringlengths 109
628k
| file_path
stringlengths 109
155
| dump
stringclasses 96
values | file_size_in_byte
int64 112
630k
| line_count
int64 1
3.76k
|
---|---|---|---|---|---|---|
https://coderanch.com/t/315632/java/Entity-Bean-Verify-Error-JDO | code | hi i am trying to deploy a entity bean and i get this verify error... any help?
For [ EntityCMP#ejb-jar-ic1.jar#EmployeeBean ] Error: Exception [ JDO74033: Cannot deploy application 'EntityCMP' module 'ejb-jar-ic1' with CMP beans: cmp-resource is not defined for this module. The minimum requirement for a cmp-resource is to specify the jndi-name of a jdbc-resource or a persistence-manager-factory-resource to be used with the beans. ] while initializing JDOCodeGenerator. Please check your descriptors and mapping files for consistency
hi i could log on to http://localhost:4848/asadmin and see the jdbc resource being defined for jdbc/PointBase. and i defined a Resource Ref for the Entity bean with values
Coded name jdbc/Pointbase type java.sql.DataSource Authenticatin Container Sharable yes Jndi name jdbc/PointBase. Is this ok?I am still getting this error.. do I have to do anything else? Thank you so much for your reply
2. Specify the JNDI name of the Persistence Manager's resource (listed under persistence-manager-factory-resource entry in the server.xml file) and the JNDI name for cmp-resource. This name will be used at run time to manage persistent resources.
For example, if you have the following entry in the server.xml file: | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570793.14/warc/CC-MAIN-20220808092125-20220808122125-00763.warc.gz | CC-MAIN-2022-33 | 1,246 | 6 |
https://www.binarydefense.com/threat_watch/upnp-vulnerability-found-with-capability-of-being-used-in-ddos-attacks/ | code | Originally discovered in December 2019 by Yunus Çadirci, a vulnerability dubbed CallStranger in the Universal Plug and Play (UPNP) protocol takes advantage of a modified UPNP SUBSCRIBE request in order to send responses from UPNP devices to a remote target. Because UPNP has very little authentication or verification of requests, attackers can set an arbitrary remote address in the request headers. UPNP devices will then see this remote address and send the response to the remote address, instead of to the attacker. The size of the response can be significantly larger than the request, which makes this vulnerability likely to be used for traffic amplification in Distributed Denial of Service (DDoS) attacks. The attacker only has to send a small amount of network traffic to cause a much larger volume of traffic to be sent to their intended victim, potentially overwhelming the target’s ability to process the incoming traffic.
Watch the Video
How does Binary Defense help protect your organization? With best in breed cybersecurity tactics, techniques, and services, we make sure that your environment is secure against the most advanced attacks. | s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764499842.81/warc/CC-MAIN-20230131023947-20230131053947-00506.warc.gz | CC-MAIN-2023-06 | 1,159 | 3 |
http://sp15.gorzow.pl/docs/97316e-cannot-be-applied-to-varchar-integer%099 | code | The hive columns I am joining are both string. At least my JSON is properly formatted now. Viewed 2k times -4. does presto have any plan about support implicit conversion (from number to varchar ). The returned value of the above query is a varchar value, not a numeric value.
Hive‘s market is so huge(ETL). Hi @robertcaretta,. Magic Square 4x4,
Depending on your version of MySQL, the length can be 255 characters before the version 5.0.3 and up to 65,535 characters in MySQL 5.0.3 or later.
Shivlilamrut Adhyay 6,
You can always update your selection by clicking Cookie Preferences at the bottom of the page.
Learn more, We use analytics cookies to understand how you use our websites so we can make them better, e.g.
We use essential cookies to perform essential website functions, e.g. It take huge cost changes for rewrite Hive scripts. It converts varchar to int type with the help of cast and convert functions.
For more information, see our Privacy Statement.
Tony Maudsley Partner, To fix it, the string needs to be converted to an integer … This is more conducive to the development of Presto.
Syntax and Usage: Mine says line 1:31: '=' cannot be applied to integer, varchar(1) ('a' is currently considered a varchar(1) rather than char(1)).
Syntax. We shall talk about date-time in the next post, and other datatypes in the third part of this series. if you facing problem of < operator != not applied to long and int > solve it Simply using long on your right side ie value!= 1L thats it.. share | improve this answer | follow | answered Oct 13 '17 at 11:04.
[BranchID],'') <> scmN.BranchID. Im folgenden Beispiel wird CS0019 generiert:The following sample generates CS0019: Der Operator 'Operator' kann nicht auf einen Operanden vom Typ 'Typ' und 'Typ' angewendet werden. Mordiford Dragon Narrowboat, Oscar Proud Yelling Trudy, for example 1,200.00 I tested wit ISNUMERIC and every row passed that test.
an error: Finally, if we do have invalid alpha characters in our data set, we can strip them using RegEx and then apply our CAST
A Cut and paste from SSMS or Visual Studio would not grab the LF or CR or any data after it. Third, we add the decimal point between the PreDecimal and PostDecimal characters: We can wrap our CAST function around the PreDecimal, decimal, and PostDecimal and SQL Server will cast it without
Noticiero Univision 23 Presentadores,
Contact Us | Ein binärer Operator wird auf Datentypen angewendet, die ihn nicht unterstützen.A binary operator is applied to data types that do not support it.
Explicit conversion from a value of type TEXT to a value of type (N)VARCHAR is allowed. CHAR or CHARACTER stands for fixed length characters [TEXT].
If there was the implicit conversion integer -> varchar, the end result wouldn't be that nice anyway. If they come with extra spaces, no Howling Dream Meaning, privacy statement. Mob:- 9893450338 Alex Kinsey 2020, If there was the implicit conversion integer -> varchar, the end result wouldn't be that nice anyway. The variable 'vSchoolID' only supports values of types 'Integer'. we ran across some decimal values that wouldn't CAST or CONVERT even though they appeared to be decimal values (other decimal values from the same source converted without
CAST ( expression AS datatype [ ( length ) ] ) We use optional third-party analytics cookies to understand how you use GitHub.com so we can build better products.
By: Tim Smith | Updated: 2015-09-03 | Comments (16) | Related: 1 | 2 | More > Data Types. Pandora Box 12 Arcade Game List, Hbo Max On Hulu Missing Content,
That was all.
Was this supposed to give an error - SELECT CAST('1.000000' AS DECIMAL(22,8)) ? In other cases, when converting VARCHARs to numerical data points, we can use these other functions to solve the problem.
This is part of what can create a puzzle for developers - characters which clearly are numbers, not converting or casting as decimals and failing the ISNUMERIC function (which is not always reliable, but will generally see numbers like 1.00 as valid). What Christmas Is As We Grow Older Summary, The variable 'vSchoolID' of type 'Integer'. Millions of developers and companies build, ship, and maintain their software on GitHub — the largest and most advanced development platform in the world. Potion Of Greater Invisibility Pathfinder,
Spotter Talent Division 2, Madden 20 Qb1 Scrambler Stats, And my presto version is 0.192. The variable 'vSchoolID' of type 'Integer' cannot be initialized or updated with value '26' of type 'String'.
on the right side of the decimal.
Did you ever find the character that was being written to the Varchar field that was making your data not numeric?
For example, if we have used SELECT CAST(CAST ('888.67' AS NUMERIC) AS INT); It can also be used with CREATE TABLE.
Algona Raceway Schedule 2020, Ideally I could convert this into an integer and leave it that way. The SQL standard governs that, but I didn't check it, @findepi I am glad to receive you replication.
Nikita Buyanov Car,
We use optional third-party analytics cookies to understand how you use GitHub.com so we can build better products. | s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764499871.68/warc/CC-MAIN-20230131122916-20230131152916-00862.warc.gz | CC-MAIN-2023-06 | 5,121 | 30 |
https://www.pantechsolutions.net/human-action-recognition-using-image-processing | code | Matlab Code for Human Action Recognition
Human action recognition system proposed here recognizes the behavior of a person in real-time. The system aims at communicating the recognized gestures with the camera system.
Platform : Matlab
Delivery : One Working Day
Support : Online Demo ( 2 Hours)
99 in stock
The proposed system initiates on identifying the human action provided in the database and it sends the trigger signals to the camera system so as to record and store the video stream within the system. Template matching algorithm is used to recognize and identify actions from the captured video frame directly. The image which we are getting from the video is inturn compare with database and after that the output will obtain. As a last phase we are detecting the action also as well as sending an alert message.
For more Image Processing projects ,Click here | s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506029.42/warc/CC-MAIN-20230921174008-20230921204008-00473.warc.gz | CC-MAIN-2023-40 | 870 | 8 |
http://gvsl.rentbikephuket.ru/10568599 | code | I would like to fill a vector using std::fill, but instead of one value, the vector should contain numbers in increasing order after. If the referenced computer has multiple drives, the resulting. Assembler is an add-on DNA sequence assembly module for MacVector that provides a simple graphical interface to the phred, phrap and cross_match contig assembly algorithms from the University of Washington, the popular Bowtie fast reference alignment program for Next Generation Sequencing projects and the Velvet, SPAdes and Flye de novo. · Select to add this computer to All Systems collection Right-click your new device and manually add it to your device collection you created (make how to manually add a sequence in mac vector sure you refresh your Device Collections screen lol) Right-click your newly updated device collection and make your task sequence that you want made available to it as "available". As with Windows, you can install fonts manually by placing them inside a system folder. When you already have a reference computer ready to capture, create a task sequence that only captures the OS from the reference computer. Creating vector-based graphics on the Mac isn’t just Adobe Illustrator’s purview.
It skips volumes with other formats or USB volumes. Digital collection of empty plasmid backbones from publications and commercially available sources. 99 and is available on Apple’s Mac App Store.
We rounded up a few great alternatives that let you make your own vector art without breaking the bank. ) Return to your edited forward sequence file, delete the vector sequences, and save for next week. Sequence Analyzer. Can you make vector graphics on a Mac? To append or prepend one or more elements to a Vector or Seq, use these methods: 1. On the Install Windows page, specify the fo. In this post, we will discuss how to convert a set to a vector in C++. To install updates manually on your Mac, do one of the following: To download macOS software updates, choose Apple menu > System Preferences, then click Software Update.
The other option is to click in the primer sequence at the location of the change, and then click the Insertions tab. Click on how to manually add a sequence in mac vector OK to complete the insertion. tbl2asn, a command-line program, automates the creation of sequence records for submission to GenBank. If the alignment starts showing gaps and/or mismatches, the end of the vector sequence has been reached.
The Vector Converter on the Mac App Store Convert your files to nearly any major vector or image format! Installs applications 5. I understand that you want to rearrange the order of Photos in OneDrive album.
To select a restriction site in the vector, click the enzyme site. In the Configuration Manager console, go to the Software Library workspace, expand Operating Systems, and then select the Task Sequencesnode. If you have the coding skills you can contribute to Inkscape’s feature list, too.
The X and Y inputs must be vectors or matrices of the same size. Graphic from Indeeo includes a full set of vector drawing tools, supports multiple layers, imports and exports Adobe Photoshop file format, and supports OpenGL for faster rendering. If you are using MacVector 10.
The Sequence protocol provides default implementations for many common operations that depend on sequential access to a sequence’s values. The most elegant solution is to make use of use std::vector range constructor which takes two input iterators pointing to the beginning and the end of an input sequence. The Insert Sequence dialog will open, displaying the sequence to be inserted.
I tried achieving this by iterating the third parameter of the function by one, but this would only give me either vectors filled with 1 or 2 (depending of the position of the ++ operator). Subtracting vectors visually is fairly simple. It’s been asked for many times, and will probably come at some point in the future, but when that will be is anyone’s guess. The app was conceived as an open source alternative to Illustrator, and does that really well. What is a vector converter on a Mac? In this folder, you can add fonts for any user to use, but you need administrator permissions to be able to install them. Hi, Thank you for writing to Microsoft Community Forums. Installs the OS 3.
Before you create a task sequence to install an OS, make sure the following components are in place:. ImportantThe architecture of the boot image must be compatible with the hardware architecture of the destination computer. The developers say Vectrwill always be free, and a paid pro account option with a built-in marketplace is coming at some point.
Choose the Add to Oligo List command, opening the New Oligo dialogbox, with the General tab activated. Basic analysis for a user-entered sequence; includes restriction sites and map. This tutorial describes how to compute and add new variables to a data frame in R.
Identify the region of vector sequences. Example If you need to create a quick sample dataset, here&39;s an example using SEQUENCE with TEXT, DATE, YEAR, and TODAY to create a dynamic list of months for a header row, where the underlying date will always be the current year. More How To Manually Add A Sequence In Mac Vector videos. wim) on the specified network share. .
· To subtract, add the "negative" of the vector. How do i manually update my mac? (I don’t know why ++ is used in the last case. Applies software updates 6. One way I remember the method names is to think that how to manually add a sequence in mac vector the : represents the side that the sequence is on, so when I use +:, I know that the sequence needs to be on the right, like this: A more accurate way to think about the method names is that a Scala method name that ends with the : character is right-associative, meaning that the method comes from the variable on the right side of the expression. How to open vectornti sequences in MacVector? For clearer, more concise code, the example above could use the array’s contains(_:) method, which every sequence inherits from Sequence, instead of iterating manually:.
They offer an app you can download, or a Web interface. Vector database is a digital collection of vector backbones assembled from publications and commercially available sources. The task sequence captures each hard drive on the reference computer as a separate image within the.
In the larger scheme, ++ is used consistently across the collections classes, but in this case it seems like creating a :++method for immutable sequences would have made these exam. Create a new vector fibonacci that lists the first eight numbers of the Fibonacci sequence in order. stem(X,Y) plots the data sequence, Y, at values specified by X. 6 or above then there is a function that allows you to directly import sequence data from databases created by Vector NTI Advance v10 or earlier. See full list on alvinalexander.
Simply reverse the vector&39;s direction but keep its magnitude the same and add it to your vector head to tail as you would normally. Download 14,630 mac free vectors. Inkscapeis a surprisingly full-features vector graphic editor app, and it’s free. Open the Oligo List dialog box by selecting List > Oligo List. It preserves existing variables.
The table helps you decide the general sequence for your task sequence steps, and how to organize and structure those steps into logical groups. Boot image: Specify the boot image to use with this task sequence. . One option is to manually edit the primer sequence in the text box. · Open the corresponding shortcut menu by right clickingon the primer sequence. But when I calculate by manually or by online it shows different. Adding a Video Cover Page Compatible Mobile OSes and Browsers for the Web View How to Convert and Compress Video(s) Adding a Compare Page Adding Buttons Adding a Scrollmotion Page Adding Sections and Navigation. that works on Mac.
Indeed, just like our iPad software, Vectornator Pro brings the superpowers of Vector graphic design software to your Mac. Description: Specify an optional description for the task sequence. Affinity Designer costs US. The task sequence that you create may vary from this sample.
For the first layer of the encoder, I&39;m using 112 hunits, second layer will have 56 and to be able to get back to the input shape for decoder, I had how to manually add a sequence in mac vector to add 3rd layer with 28 hunits (this autoencoder is supposed to reconstruct its input). The shape of data is (5039, 28, 1), meaning that my seq_len is 28 and I have one feature. Vectr is another free vector art app, and it’s much easier to learn than Illustrator. Allows sequence alignments and annotation. Free for commercial use High Quality Images. Enter Sense primer - ColE1 in the name box and clickOK. See full list on docs.
Though I only showed a Seq in the last example, it uses the same append and prepend methods as the Scala Vectorclass. 4,000+ Vectors, Stock Photos & PSD files. Choose from over a million free vectors, clipart graphics, vector art images, design templates, and illustrations created by artists worldwide! It is used primarily for submission of complete genomes and large batches of sequences and is available by FTP for use on MAC, PC and Unix platforms. To insert a restriction fragment into a vector, begin by opening the vector file. OSX that allows one to manipulate the multiple alignment manually, add &39;masks&39; for exporting alignments. ” To have your Mac download updates without asking, select “Download new updates when available.
Installs the Configuration Manager client 4. View the Binding Sites and Melting Temperature. wim file contains a separate image for each volume. Choose your output format 3. Because those methods treat the variable they’re appending/prepending as a single element, you end up with a sequence inside a sequence, which again is probably not what you want. In the meantime, prepare your Mac, upgrade to Catalina and wait for our announcement soon! The trade off is that it isn’t a feature-rich as some other options, but that’s OK because the tools beginners and casual users are all there.
Click on CTRL + V on your keyboard. Adding entries to a subsequence file. On the Home tab of the ribbon, in th. There is. Captures the OS from the reference computer The packages associated with the task sequence, such as applications, must be available on distribution points before you deploy the build and capture task sequence.
Graphic is priced at . In other words, to subtract a vector, turn the vector 180 o around and add it. Primer Sequence is – i> 5&39; TGT GTA TCA TAG ATT GAT GCT TTT GA 3&39; and ii> 5&39; AAA TAA AGA TGT CAG ATA CCA CAG CA 3&39;. (These should show an almost exact match to the forward or reverse sequence. · Even with DNA design going digital, many people still follow the traditional sequence annotation method involving manually adding notes and markers to a sequence. For example, describe the OS that the task sequence creates. Take Hint (-30xp).
-> Jose miguel valdivia manual derecho administrativo
-> Bentley repair manual audi a3 | s3://commoncrawl/crawl-data/CC-MAIN-2021-17/segments/1618038072366.31/warc/CC-MAIN-20210413122252-20210413152252-00551.warc.gz | CC-MAIN-2021-17 | 11,190 | 25 |
http://quinxy.com/personal/yin-yang/ | code | My day. Yin. Yang. The first half saw my better self, triumphantly in command of my life, amidst noble activities, pressed by people who variously care for, respect, and seek me out. The latter half saw my worser self, a soul periodically lost in self-analysis, striving for someone and something different (yet doing little more than cowardly navel gazing). We are the happily resigned marriage of our perfections and our flaws. Humans. Meh. If the aliens come I won't be overly upset if they make hamburgers of us all. (I don't really mean that, it just seemed a marvelous thing to say, would that I had the time to craft the sentence better and work the word 'ketchup' in there.) Sometimes I say things which are more beautiful than true, but I always indicate as much (even if not everyone realizes). | s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218191396.90/warc/CC-MAIN-20170322212951-00152-ip-10-233-31-227.ec2.internal.warc.gz | CC-MAIN-2017-13 | 804 | 1 |
https://docs.microsoft.com/en-us/archive/blogs/deva/catl-project-throws-error-c2061-syntax-error-identifier-_atl_func_info | code | C++/ATL Project throws error C2061: syntax error : identifier '_ATL_FUNC_INFO'
One of my customer reported that they created a ATL Project/MFC CDHtmlDialog based C++ application and they notice the following errors in afxdhtml.h (they created it using VS 2003).
afxdhtml.h(272) : error C2238: unexpected token(s) preceding ';'
afxdhtml.h(289) : error C2061: syntax error : identifier '_ATL_FUNC_INFO'
afxdhtml.h(290) : error C2061: syntax error : identifier '_ATL_FUNC_INFO'
I tried the code piece at my end locally and tested with latest visual studio – I failed to see the issue and it just works for me. Later I done further research on this and found the following:
The #include <afxdhtml.h> directive is placed in the stdafx.h pre-compiled header file before the "using namespace ATL;" directive, and the #define _ATL_NO_AUTOMATIC_NAMESPACE was given previously. Thus, the symbols in the header file which belong to the ATL namespace are not properly resolved. When adding a class from the MFC dialog class wizard, you are given the choice of several dialog base classes, most of which do not require the ATL namespace "using" directive. Thus, the wizard script in default.htm doesn’t make any attempt to ensure that the header file corresponding to the class name come after a using directive.
In Visual Studio 2005 and later versions, the problem doesn’t occur because all references to CComPtr are now prefixed with ::ATL::, alleviating the need to either direct “using namespace ATL;” or to define the macro to eliminate the automatic use of the ATL namespace. So I recommended them to try one of the following to move ahead:
• Remove the #define _ATL_NO_AUTOMATIC_NAMESPACE directive from the stdafx.h header, or
• Move the using namespace ATL; directive before the #include <afxdhtml.h>
• Upgrade to Visual Studio 2005 and above. Also make sure they're fully patched with latest service pack/fixes. | s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593655924908.55/warc/CC-MAIN-20200711064158-20200711094158-00574.warc.gz | CC-MAIN-2020-29 | 1,925 | 11 |
https://www.proceedings.iaamonline.org/editorial-board/yumin-cheng | code | Shanghai University, China
Dr. Yumin Cheng is Professor of Shanghai Institute of Applied Mathematics and Mechanics of Shanghai University. He received his Bachelor degree of mathematics from Shanxi University of China, and PhD degree of computational mechanics from Xi’an Jiaotong University of China. His research interests include meshless method, boundary element method, and scientific and engineering computing. He has published more than 170 journal papers. And he has presented many numerical methods, such as similar boundary element method, improved element-free Galerkin method, boundary element-free method, meshless manifold method, complex variable moving least-squares approximation, complex variable element-free Galerkin method, complex variable reproducing kernel particle method, improved interpolating element-free Galerkin method, dimension split element-free Galerkin method, and interpolating boundary element-free method. | s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100989.75/warc/CC-MAIN-20231209233632-20231210023632-00383.warc.gz | CC-MAIN-2023-50 | 946 | 2 |
https://www.americasnewbomber.com/professional-coding-skills-why-theyre-becoming-important-to-finding-the-job-you-want/ | code | If you're looking for work, one of the first things employers will check is your coding skills. As companies continue to grow, more and more individuals will be required to develop software for them.
Read on to find out why professional coding skills are becoming a growing necessity in today's job market, and how you can advance your career by learning more about them. If you are one of these budding developers, make sure not to neglect your skills because you can always find work in the field.
What are professional coding skills?
Professional coding skills are becoming increasingly important for finding the job you want. Coding is a skill that is in high demand, and it can give you an edge when looking for a job. Even if you don't plan on becoming a coder, having some coding skills can be helpful when looking for a new position.
Image source: Google
1. Coding Is In High Demand
According to the website Indeed.com, the number of jobs in coding disciplines will grow by 29% between now and 2026. This means that there are many jobs available in the coding field, and if you have some coding skills, you'll have an advantage over other candidates.
2. Coding Can Be Useful For Many Positions
Coding can be useful for many different positions. For example, medical professionals often need to code medical records. Coding also plays a role in many other fields, such as engineering and business. If you have some coding skills, you'll be better equipped to find a job in these fields.
Why are they becoming important to finding a job?
There's no question that professional coding skills are becoming more important than ever before. In fact, according to the Bureau of Labor Statistics, the number of jobs in which coding is a required skill is expected to grow by 19% by 2024. So if you're looking for a job, it's definitely worth learning how to code. Here are four reasons why:
1. Coding is versatile – It can be used in a variety of fields, both professional and non-professional. For example, coding can be used in web development, software development, business administration, and more.
2. Coding is fast – coding can be done quickly and easily using various programming languages. This makes it an ideal skill for people who want to work on projects quickly and without spending a lot of time learning how to do everything from scratch.
3. Coding is adaptable – Because coding can be adapted to different needs and requirements, it's often perfect for creating custom programs or applications. This means that it can be used in a wide variety of fields, including those that are currently not heavily reliant on technology. | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337404.30/warc/CC-MAIN-20221003070342-20221003100342-00683.warc.gz | CC-MAIN-2022-40 | 2,646 | 14 |
https://www.medimpactdirect.com/Accessibility | code | MedImpact Direct is committed to providing a web experience accessible to all users. To help meet our goal of universal accessibility, this website follows the internationally recognized best practices in Section 508 of the Rehabilitation Act and the Web Content Accessibility Guidelines (WCAG) 2.0 Level AA wherever possible.
The Voluntary Product Accessibility Template (VPAT) is a standardized form developed in partnership by the Information Technology Industry Council (ITI) and the U.S. General Services Administration (GSA) to document a product’s conformance with key regulations of Section 508 of the Rehabilitation Act. This document describes how federal agencies can use MedImpact Direct accessibility features. Read more about WCAG 2.0 here: https://www.w3.org/TR/2008/REC-WCAG20-20081211/WCAG 2.0 VPAT
If you have any feedback or difficulty using this website, please send your comments to [email protected]. | s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662531779.10/warc/CC-MAIN-20220520093441-20220520123441-00774.warc.gz | CC-MAIN-2022-21 | 937 | 3 |
https://www.schibsted.pl/news/sobazaar-wanted-developers-to-build-global-fashion-app-success/ | code | In small offices in Oslo nine employees are working hard to prepare a global launch of Sobazaar, a social fashion app targeting young women.
50.000 people are already using the app in Norway, and the number is growing every day. The staff hopes a global success will be reached by the backing of the two powerful owners of the company, each with a 50 % share:
- Schibsted Media Group, with companies in 29 countries and a tremendous user base in countries like Norway, Sweden, France, Spain and Brazil
- Telenor, one of the biggest mobile operators in the world with almost 200 million mobile subscriptions
“Currently most users are girls in high school,” explains CTO Tommy Strand.
Python/Django developers needed
Getting ready for global expansion also requires brilliant developers. Sobazaar has just entered a partner agreement with Schibsted Tech Polska and is now looking for two developers in Poland.
CTO Tommy Strand explains that the mobile apps for IOS and Android (to be launched soon) are developed in Norway. But the company needs help with the backend development.
The Python paradox
“Why this choice of technology?”
“We see that we can prototype and develop much faster than when we used Java, ” Strand says.
“And then there is the Python paradox!”
“The Python paradox?”
“Yes, it describes how Python programmers tend to be better programmers than others. It is not because they have chosen Python as such, but because they have taken the extra effort to learn a second programming language like Python. It demonstrates an engagement and curiosity that is not mainstream, and the Python paradox tells that programmers with this type of motivation tends to be better at what they do”
Must learn continuously
CTO Tommy Strand says he will be looking for people with a strong urge to always learn new things.
“We want people who breath for technology and are engaged. They don´t need to be the biggest Python experts, but must show that they have taken the extra effort to learn new programming languages and technologies,” he says.
“And if the right person applies, he/she will have lots of freedom in how to develop.”
Partner number 20
Sobazaar is Schibsted Tech Polska´s partner number 20. As with other partner teams, the developers in Krakow or Gdansk will work closely with their colleagues in Scandinavia.
“But do the developers need to be interested in fashion?”
“No, no! Just look at me!,” laughs Tommy Strand. But he also tells that the female employees in the company, including the CEO, are themselves eager users of the fashion app.
“For us as developers that is great! We have the users of the product sitting next to us! That really makes the product richer and gives us much more input when discussing solutions” | s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947476409.38/warc/CC-MAIN-20240304002142-20240304032142-00821.warc.gz | CC-MAIN-2024-10 | 2,786 | 23 |
http://diskpocalypse.com/remote-desktop/remote-connections.php | code | Otherwise it's extremely insecure and a ridiculous feature. RSS ALL ARTICLES FEATURES ONLY TRIVIA Search How-To Geek Turn on Remote Desktop in Windows 7, 8, 10, or Vista Remote Desktop is disabled by default in Windows, but it's Connection hangs on "Setting up remote session". Pretty much the same process works for Vista (in case you're still using that much-derided OS), and in Windows 8. navigate to this website
xp is direct. What Security software and firewall do you have installed on both computers? You can configure this on a per-computer basis in Windows Firewall for the domain profile and the standard profile. There are tons of features, which is always great, but it's also extremely easy to install. https://support.microsoft.com/en-us/help/17463/windows-7-connect-to-another-computer-remote-desktop-connection
Remote Desktop Connection Windows 7
Can you have multiple users logged into the machine at the same time? Pave the way As you might expect, allowing a remote user full control over a computer isn’t something that’s enabled by default. Can you change what port it runs on? See more about this at the Portable Server and Portable Viewer page.There's also a QuickSupport option, which is a portable server and viewer program that makes connecting much quicker than the above method.I
Before that he worked on PC Magazine’s Solutions section, which in those days covered programming techniques as well as tips on using popular office software. JOIN THE DISCUSSION Tweet Lowell Heddings, better known online as the How-To Geek, spends all his free time bringing you fresh geekery on a daily basis. The remote computer is turned off 3. Remote Desktop Connection Software July 9, 2007 cindy I'm on a home network.
Perhaps the Pi is embedded in something like a robot, or you may want to view some information from it from elsewhere. You're only allowed one connection (unless you upgrade) but for many of you, that'll be just fine.Host SideDownload and install RemotePC on the PC that will be accessed remotely. TeamViewer is a slightly better route to go, as it doesn't involve opening ports through your firewall, but in any case AUDIT the applications you're using, use strong passwords (change them https://technet.microsoft.com/en-us/library/ff404238.aspx Here, click or tap OK.
Send the Invitation. Windows 7 Remote Desktop April 5, 2008 Pat I'm at wits end trying to set up remote desktop between my Desktop running XP Professional SP2 and my Laptop running Vista Ultimate. Thanks, Wayniack! Again this only applies to the Receiving Computer. 2.
Remote Desktop Connection Windows 7 Download
The installed program reports back to their site weather the machine is online or not and the appropriate ip address so that it can find it. On the client machine to access to you Vista home (vnc server), you need vnc client. Remote Desktop Connection Windows 7 For Paths Under Windows Components\Remote Desktop Services:\Remote Desktop Connection Client Allow .Rdp Files From Unknown Publishers \Remote Desktop Connection Client Allow .Rdp Files From Valid Publishers And User’s Default .Rdp Settings How To Setup Remote Desktop Windows 10 I'd recommend some type of hacker forum for what you are looking for.
Show Full Article Up Next Up Next List 42 Free Programs to Completely Wipe Data From Hard Drives Up Next Article A Review of TeamViewer, the Best Free Remote Access Program useful reference One advantage of Remote Connection over Remote Assistance is that no one has to be sitting at the host PC. Your S-User ID requires the Open Remote Connections to manage these remote connections. Howerver, when I try to go the other way (Vista into XP), I enter the desired IP address, click connect, and get an error that says "This computer can't connect to Chrome Remote Desktop Connection
What am I suppose to type in this window? Remote Desktop Windows 10 Home Thanks September 21, 2007 Jerry Cole You say you are using Home Premium but the snapshots show Vista Ultimate. When it is enabled, any member of the Administrators group can connect to the workstation.
No backwards compatibility?
But same RDP from XP, no prob for all customers March 5, 2009 ken will this help me connect my vista home premium at to my vista business at work as So, it's a good idea to set up a separate standard level user account for Remote Desktop Connections. doesnt have the other 3 options…. Remote Desktop Connection Windows 8 April 30, 2007 Radon My backlight went out on my Windows Vista Laptop.
No additional download is necessary to use the program.Host SideNo software needs to be installed to use Windows Remote Desktop. Brian R. It Works Great and its very very easy!!! http://diskpocalypse.com/remote-desktop/remote-computers-dropping-connections.php The routers IP address will the one marked DHCP server.
How To Enable Remote Desktop Connections You have three options to choose from under Remote Desktop: "Don't allow remote connections to this computer" - This option will prevent users from connecting Once screen sharing has begun, you can record the session, transfer files, and run remote commands.Sharing the screen must be initiated from the client's computer.Seecreen 0.8.2 Review & Free DownloadSeecreen doesn't support Need to install updates on a newly reformatted machine, but don’t want to babysit it all day? For example, you can use all of your work computer's programs, files, and network resources from your home computer, and it's just like you're sitting in front of your computer at
Any caveats that you're aware of? The Receiving(Host)Computer must have Remote Desktop Turned ON. 4. To get started with this useful, yet under-used Windows feature, you’ll just need to be comfortable changing Windows and router settings and have a few minutes to configure and test it. not very practicle.
The content you requested has been removed. what to do?? Once you have everything the way you want it, go back to the General tab, put the IP you looked up into the Computer field, and click Connect. This opens the Remote Desktop Users window.
I enter them and get nowhere…. October 20, 2008 jd2066 @bryan: Remote Desktop is only available in Windows Vista Business, Ultimate and Enterprise. You really need the modems instructions on how to forward port 3389. Get geeky trivia, fun facts, and much more.
Above you can see the System Properties window as it looks in Windows 10. You have to assign remote desktop different ports other than the default 3389. I don' like it since you have to have a cliënt installed on every guest machine your at.. Click OK twice when you have finished.
Here’s the product we believe it offers the best experience for Windows users, in 2017: Digital Citizen Awards - The most popular antivirus product of the year 2017 Misc by Codrut We've spent over $1,500 for a new computer, and a new laptop, and can't even share stuff on them. July 14, 2008 Dave UltraVNC V1.04 support VISTA, with user logon and UAC August 8, 2008 Joe hey, I'm having some trouble using remote desktop between my Vista home premium SP1 Please check your S-User ID's existing authorizations, and contact your user administrator if you do not have this authorization. | s3://commoncrawl/crawl-data/CC-MAIN-2018-30/segments/1531676592654.99/warc/CC-MAIN-20180721184238-20180721204238-00608.warc.gz | CC-MAIN-2018-30 | 7,218 | 20 |
http://stocktwits.com/itstransit/followers | code | I send out real time Stock Buys and Stock Short signals via email and text alert for top trending stocks. A list of them is available on my website. My signals are derived from a unique fractal algorithm.
Trading triple leverage $NUGT, $DUST, DGAZ, UGAZ. $TNA $TZA. My posts are DICTATED by the charts. I am not suggesting to buy or sell. Trade at your own risk. Always place stops if you do not have the financial back up. Do NOT ever use MARGIN!
@TradeTheMBI we use specialized alogorithms converted into visual form to give highy accurate buy signals on ETF's,Indexes,Equities.
Power Point on Indicator Reference: | s3://commoncrawl/crawl-data/CC-MAIN-2016-22/segments/1464049276567.28/warc/CC-MAIN-20160524002116-00035-ip-10-185-217-139.ec2.internal.warc.gz | CC-MAIN-2016-22 | 616 | 4 |
https://www.oreilly.com/library/view/microsoft-lync-server/9780133100563/ch22lev3sec1.html | code | Adding User Accounts Using the Online Portal
Use the following procedure for creating a new user account using the Online Portal:
1. Log on to the Office 365 Portal.
2. On the left side of the main page, click Users and Groups.
3. At the Users and Groups page, click on the plus symbol just above the user list.
4. At the Details page, mandatory fields for the new account are displayed, as shown in Figure 22.4. Enter the first name, last name, and username for the new user account. The display name is automatically derived from the First name and Last name fields but can also be edited manually if necessary. | s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579251776516.99/warc/CC-MAIN-20200128060946-20200128090946-00278.warc.gz | CC-MAIN-2020-05 | 613 | 6 |
https://discourse.tnvisaforum.org/t/stage-1-evidence-of-mentorship-high-salary/857 | code | Grateful to all contributors to this forum.
I have some questions regarding two pieces of evidence;
1.) For this criteria;
Evidence of mentorship (i.e. the sharing or teaching of skills and knowledge). Mentorship should have been done within an organised, structured and recognised mentoring scheme, which can be clearly demonstrated through evidence.
Can I use https://codementor.io amongst other evidence? I have a mentor account there where I have provided over 200 paid live mentorship sessions with an overall 5 star rating.
2.) For this criteria
Employment contract with salary information including any bonus and equity options (although you will have to demonstrate how you have gone beyond your day-to-day activities to demonstrate that you have made a significant impact in the sector);
I earn a salary that may be considered average for my industry in the Uk but is top 4% in my current country (both in my industry and in general). Is it advisable to submit this as a piece of evidence? | s3://commoncrawl/crawl-data/CC-MAIN-2021-25/segments/1623487621699.22/warc/CC-MAIN-20210616001810-20210616031810-00638.warc.gz | CC-MAIN-2021-25 | 998 | 8 |
https://pypi.org/project/Bitdock/ | code | Push Bitbucket pull requests to Flowdock.
Full documentation can be found at http://bitdock.readthedocs.org
Found a bug? Have an idea on how to make the tool better?
Post it at https://bitbucket.org/ftrack/bitdock/issues
Copyright and license
Copyright (c) 2014 ftrack
Licensed under the Apache License, Version 2.0 (the “License”); you may not use this work except in compliance with the License. You may obtain a copy of the License in the LICENSE.txt file, or at:
Unless required by applicable law or agreed to in writing, software distributed under the License is distributed on an “AS IS” BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the License for the specific language governing permissions and limitations under the License.
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
|Filename, size||File type||Python version||Upload date||Hashes|
|Filename, size Bitdock-0.1.0.zip (265.4 kB)||File type Source||Python version None||Upload date||Hashes View| | s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323586043.75/warc/CC-MAIN-20211024142824-20211024172824-00268.warc.gz | CC-MAIN-2021-43 | 1,067 | 11 |
https://www.justinsingh.me/ | code | While learning how to train Machine Learning models with the caret package in R for some research, I came across the need to visualizing iterations of a GBM model. One of the resources I came across was this blog post by Gregory Kanevasky on plotting H20 decision trees in R. I wouldn’t say I copied some of it, but I definitely took a lot of inspiration from this post. The process itself involves taking your GBM model’s trees, and converting them to a data.
If you’ve stumbled upon this, you’re probably trying to find the answer to how to serve a Dash R app over the web. I know that I originally had a hard time when I was working on a COVID-related app… You can also look at Plotly’s tutorial on deploying Dash apps to Heroku, which is helpful if you don’t want to manage your own environment! Note: if your app requires a lot of memory (i.
Update: Since I made this post, I started development on a R package that aims to make what’s in this post extensible and easy to use. You can view it’s GitHub repo here or the documentation here. Recently I came across the issue of trying to provide better visual statistics of project tasks. The problem with this was that the tasks were being tracked with Microsoft Planners in Teams using checklists as the primary indicator for task completion within each task in a bucket, like so: | s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446710936.10/warc/CC-MAIN-20221203175958-20221203205958-00122.warc.gz | CC-MAIN-2022-49 | 1,352 | 3 |
http://daejongfilmaward.org/tag/decorative-divider-lines/ | code | Christen Velazquez decorative screens, 2020-04-05 00:37:34. There are many kinds of materials it is possible to utilize to create the folds. Metal covers are a breeze to install and simple to keep. Some dark colored stuff you may stick on the base of furniture legs to prevent them from scratching the floor. Bigger hinges ought to be used so the metallic plate is practically as wide as the edge of the door. Stainless steel is quite durable but it includes a costlier cost.
Bailey Wright room divider screen, 2020-04-04 00:55:29. It’s possible for you to get theme in many shapes, sizes and in various materials. With respect to styles also, you can locate them in traditional along with modern styles. Our extensive collection of decorative styles, colours and textures is only the start of what makes Stonini wall panelling stick out. Contemporary in style, it is going to fit just about any modern decor. Do not become discouraged if you can’t utilize Moroccan home decor in every room of your house right away.
Blythe Mclaughlin room divider screen, 2020-04-04 00:55:29. The size The period of the hanging panel room divider is dependent upon the height of the ceiling, whereas the perfect width is dependent on multiple things. The height is the other thing you wish to consider. Translucent glass frames and curtains offer a lot more cost-effective solutions that are simple to incorporate. Bigger hinges ought to be used so the metallic plate is practically as wide as the edge of the door.
Orabelle Christensen room divider screen, 2020-04-03 00:41:25. Your house was built with a specific design and fashion in mind. It is possible to produce the home cozier and warm along with elegant and classical using room dividers. If you are in possession of a massive room that should be made more cozy, divvy this up with a folding screen divider. Using just a few simple design suggestions you can make a perfect Moroccan living space, and choose Moroccan furniture that is ideal for any room in your residence. Open spaces are the theory of today, but sometimes just a little privacy is appreciated. Of course, when you’ve got a massive space and would like to provide the illusion of 2 cozier areas, a room divider is excellent for just that! Before going out to buy your divider, gauge the region and make certain you get one that is going to fit properly.
Betty Clemons room divider screen, 2020-04-04 00:55:29. In the evening you want an extra lighting to make the most of the room’s area. GOOD LIGHTING Lighting has a critical role in any environment, especially in little rooms. While buying a room divider, you need to think about precisely how It will enhance and complement your decor. You need to ensure that the furniture that you select is exclusive and trendy to present your dining room an intelligent and sleek appearance. As an example, dark colored furniture is likely to make the space loaded. You should be certain that you purchase modern furniture that’s suited to the taste and appearance of your dwelling. When it has to do with the variety of contemporary day furniture for your room you can select from a vast selection of colors like black, white, brown and deep red.
Brittany Trujillo room divider screen, 2020-04-04 00:55:29. Regardless of what design, style or use you may try to find in room dividers, there’s an endless number of dividers to pick from. A room divider is a screen or part of furniture put in a manner that divides a room into separate locations. Fabric room dividers are simple to make.
Bonnie Chaney room divider screen, 2020-04-04 00:55:29. You should gauge the room where you intend to install the room divider before you get started shopping. If you are in possession of a little room, you can’t afford the mess. It is frequently more practical to subdivide bigger rooms into separate, but interconnected locations. The rooms that could use dividers are unlimited too. The living room is the ideal room in your home as it’s the room which makes you and all of your guests comfortable. If your rooms are too open, or you own a room in your house that isn’t functional as-is, you might want to try out a room divider. Dividing a room with a bit of furniture is a typical decorating practice.
Bailey Wright room divider screen, 2020-04-03 00:41:25. Should you opt to find metal tile roofing, make sure that you receive a warranty from the manufacturer. Moroccan tiles may be used to create mosaic patterns on the floors and other surfaces in the restroom and kitchen for a one of a kind and stunning look which you will love each time you see it. First, the roof tiles will need to get taken off and discarded of which is time intensive and incredibly labour intensive. Walls are not just permanent, but too many of them is able to stifle the aura of an already modest home. Instead of obtaining a whole wall cemented, you can receive a wall drilled. Such a wall together with shelves mounted on it is going to supply you with more storage space also.
Any content, trademark/s, or other material that might be found on this site that is not this site property remains the copyright of its respective owner/s. In no way does LocalHost claim ownership or responsibility for such items and you should seek legal consent for any use of such materials from its owner. | s3://commoncrawl/crawl-data/CC-MAIN-2020-34/segments/1596439738015.38/warc/CC-MAIN-20200808165417-20200808195417-00263.warc.gz | CC-MAIN-2020-34 | 5,334 | 9 |
https://www.cybrosys.com/blog/how-to-add-sequence-in-odoo-12 | code | It's quite a simple procedure to add sequences for records in odoo. If an individual needs to add a sequence number for every record of their model, they first have to add a field in their model and need to create a record in ir.sequence in the XML file.
In python file add a field in your model like the below code.
name = fields.Char(string="Service Number", readonly=True, required=True, copy=False, default='New')
Then add a function like in the following code.
def create(self, vals):
if vals.get('name', 'New') == 'New':
vals['name'] = self.env['ir.sequence'].next_by_code(
'self.service') or 'New'
result = super(SelfService, self).create(vals)
After defining function, you need to create a record for this. So create a record in the XML file .
<record id="sequence_self_service" model="ir.sequence">
<field name="name">Self Service</field>
By doing this, a sequence number gets automatically generated, on creating a record in this model.
> name- Name of the record created in the “ir.sequence” model
> code- Sequence code
> active- A boolean field to indicate whether it is active or not
> prefix- A character field, where we can give the prefix of the sequence
> padding- sequence size
> number_next- next number that will be used
> number_increment- the next number of the sequence will be incremented by this.
In the below image -we can see a sequence number is generated for the record with prefix SS and number 000001(odoo will automatically add ‘0’s to the left side of the next number to get the required padding size-here we given padding size =6, so the first sequence number becomes 000001).
We can configure the sequence number from the settings of odoo.
Go to Settings -> Technical -> Sequences & Identifiers -> Sequences
The below image shows the corresponding record of sequence number created using the above code.
There are two types of the implementation method
1. No gap
No gap defines that there will be no gap in the numbering of records.
For example, if a self-service form is created, it will be numbered as SS000001. Then the second will be SS000002. If I deleted the second form and create a third one, then in case of
> No gap- sequence will be SS000002
> Standard- sequence will be SS000003
In the prefix and suffix field, you can add a prefix and suffix of the sequence. You can define the date range for sequence. For this, you have to check the “Use subsequences per date_range” field.
For example, if you want to start sequence number from 1 at the start of every month, then define the date range in the from and to the field and next number as 1. | s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600400234232.50/warc/CC-MAIN-20200926040104-20200926070104-00280.warc.gz | CC-MAIN-2020-40 | 2,599 | 32 |
http://stackoverflow.com/questions/4869180/how-do-you-find-out-what-rpms-in-a-repository-depend-on-a-particular-rpm | code | It's easy to check what packages a single RPM depends on, but how do I do the opposite, and find out what RPMs depend on a particular RPM? Is there an easier way to do it than searching through all the other RPMs' dependency lists?
There are a some scripts out there:
This is for capabilities, not modules
For recent versions of yum-utils, just use:
repoquery --tree-whatrequires <package>
...there are a bunch more options, in very recent yum-utils, if you want the output to be something else.
If you need to run it on older versions (like RHEL-5), you can use:
Edit, sorry you wanted:
...which is whatrequires, the deps-tree-view is requires. | s3://commoncrawl/crawl-data/CC-MAIN-2015-06/segments/1422115927113.72/warc/CC-MAIN-20150124161207-00059-ip-10-180-212-252.ec2.internal.warc.gz | CC-MAIN-2015-06 | 645 | 9 |
https://hibernate.atlassian.net/browse/HV-1834 | code | Invalid parsing of EL expression can lead to invalid EL expressions considered valid (CVE-2020-10693)
This is a follow-up to HV-1774.
It looks like CVE-2020-10693 has been updated to include more versions of Hibernate Validator, up to and including version 6.2.0.Final:
Is the CVE update correct and if so, are there any plans to address this in the Hibernate Validator 6.0.x and 6.1.x branches?
OK, done. I'll let you know once I know more about this.
6.2.x is for sure not vulnerable as it disables EL for custom violation messages by default.
I have no idea why they changed this. My guess is that they got automatically added. I'll try to reach out to Red Hat Prod Security who initially reported the CVE and see how it goes. | s3://commoncrawl/crawl-data/CC-MAIN-2021-17/segments/1618038077810.20/warc/CC-MAIN-20210414095300-20210414125300-00032.warc.gz | CC-MAIN-2021-17 | 729 | 7 |
https://javascriptinfo.com/view/175139/converting-arraybuffer-to-string-then-back-to-arraybuffer-using-textdecoder-textencoder-returning-a-different-result | code | I have an ArrayBuffer which is returned by reading memory using Frida. I'm converting the ArrayBuffer to a string, then back to an ArrayBuffer using TextDecoder and TextEncoder, however the result is being altered in the process. The ArrayBuffer length after decoding and re-encoding always comes out larger. Is there a character decoding in an expansive fashion?
How can I decode an ArrayBuffer to a String, then back to an ArrayBuffer without losing integrity?
var arrayBuff = Memory.readByteArray(pointer,2000); //Get a 2,000 byte ArrayBuffer console.log(arrayBuff.byteLength); //Always returns 2,000 var textDecoder = new TextDecoder("utf-8"); var textEncoder = new TextEncoder("utf-8"); //Decode and encode same data without making any changes var decoded = textDecoder.decode(arrayBuff); var encoded = textEncoder.encode(decoded); console.log(encoded.byteLength); //Fluctuates between but always greater than 2,000
TextEncoder are designed to work with text.
To convert an arbitrary byte sequence into a string and back, it's best to treat each byte as a single character.
var arrayBuff = Memory.readByteArray(pointer,2000); //Get a 2,000 byte ArrayBuffer console.log(arrayBuff.byteLength); //Always returns 2,000 //Decode and encode same data without making any changes var decoded = String.fromCharCode(...new Uint8Array(arrayBuff)); var encoded = Uint8Array.from([...decoded].map(ch => ch.charCodeAt())).buffer; console.log(encoded.byteLength);
decoded string will have exactly the same length as the input buffer and can be easily manipulated with regular expression, string methods, etc. But beware that Unicode characters that occupy two or more bytes in memory (e.g. "?") won't be recognizable anymore, as they will result in the concatenation of the characters corresponding to the code of each individual byte.
©2020 All rights reserved. | s3://commoncrawl/crawl-data/CC-MAIN-2021-17/segments/1618038088471.40/warc/CC-MAIN-20210416012946-20210416042946-00215.warc.gz | CC-MAIN-2021-17 | 1,853 | 8 |
https://www.optimalcrm.co.uk/1776-2/ | code | It can a be a bit weird, but only recently I was asked if Dynamics CRM Case entity can display Customer Orders on the form? As there’s no direct link between Case and Order entity and no real need to create a manual one (as it would require additional field population), I thought of using Quick View form to achieve it. Guess what – it worked. Going a bit more in to detail how it was set up:
- Create new Quick view form on Account entity.
- Create a desired view on Order entity.
- Add Order subgrid to the new Account Quick view from with new created view from Order entity.
- Add Quick view Account form on to Case main form.
The nice thing is that you can do the same for Contact Entity and Case form will only display one that is filled in to Customer field (unless you expose and fill in both Account and Customer fields). The pleasant surprise was that Quick view form subgrid can be sorted and linked through to the record from the main form.
Hope that this finding helps someone. | s3://commoncrawl/crawl-data/CC-MAIN-2021-25/segments/1623487622234.42/warc/CC-MAIN-20210616063154-20210616093154-00579.warc.gz | CC-MAIN-2021-25 | 994 | 7 |
https://www.g2.com/products/velosio/reviews | code | Velosio, one of the top business software providers in North America, deploys best-fit business applications that keep you ahead of the competition in today’s digital-first business environment. We balance visionary ideas with pragmatism, delivering an exceptional client experience that drives business value faster.
Among the largest Microsoft partners, Velosio supports the entire Microsoft Dynamics portfolio, Office 365 family and Azure services. The solutions portfolio, inclusive of ERP, CRM, Productivity and Business Intelligence, extends to Sage and NetSuite. Velosio is the only Microsoft Cloud Distributor that specializes in Dynamics 365 and is a prominent Microsoft Master VAR.
Velosio is a firm that provides consulting, implementation and support across an array of ERP, CRM, Business Intelligence and Office Productivity solutions to help companies meet their operational, financial, regulatory and technical challenges.
Describe the project or task the provider helped with:
Velosio Helped us upgrade our NAV from 2015 to 2018. We worked with them over the course of 8 months to do the upgrade. Review collected by and hosted on G2.com.
What do you like best?
They are a large company with lots of knowledgeable staff. They were able to satisfactorily upgrade our NAV system from 2015 to 2018. Review collected by and hosted on G2.com.
What do you dislike?
They are a large company that outsources a lot of there work. There people you speak to aren't always the ones doing the work. When your company is smaller, you don't get the attention you would normally get from a smaller partner. Review collected by and hosted on G2.com.
Recommendations to others considering the provider:
If you are a small company, you may want to look at a different partner. Review collected by and hosted on G2.com.
What problems are you solving with the provider? What benefits have you realized?
Velosio bought/merged the company we normally worked with. There are advantages and disadvantages working with a larger company. But at the end of the day, they did there job. Review collected by and hosted on G2.com. | s3://commoncrawl/crawl-data/CC-MAIN-2021-04/segments/1610704799711.94/warc/CC-MAIN-20210126073722-20210126103722-00242.warc.gz | CC-MAIN-2021-04 | 2,117 | 13 |
https://appadvice.com/apps/distance-mapping | code | Distance - Find My Distance
Draw to measure distance along the map, made easy with this app.
Usage: By simply touching. Draw a route on the map to find its distance. Magnifier will help you make precise drawing and measurement.
- Press "Measure" button to switch to "Move" mode. So you can move the map to somewhere... | s3://commoncrawl/crawl-data/CC-MAIN-2017-47/segments/1510934805649.7/warc/CC-MAIN-20171119134146-20171119154146-00288.warc.gz | CC-MAIN-2017-47 | 318 | 4 |
http://www.oinkfrog.com/2014/02/shared-storytelling.html | code | This concept that writing is a solo venture is reinforced by world of the novel, it is a rare book indeed that has multiple names on the cover. There is a certain (slightly egotistical) appeal to being THE author of a piece of work, other people cant mess it up if you have the only pen. That said, if you have a way to build a story as a partnership or with a group, you have access to ideas from multiple minds. Screenplays seem to more often have multiple contributors, maybe because the movie/stage industries are generally far more collaborative in nature.
What might this mean then for multiple or rotating GMs in a roleplaying game. At first the idea would seem to limit the ability to have a strong coherent plotline or set of threads that are leading somewhere. But maybe that is the exact challenge that would make it all the more fun. You can obviously default back to the 'episodic' game type that is even covered in the D&D GM's Guide (4E p13) - but I feel we could/should aim a little higher - build a logic into the game where the threads are able to evolve as a real world might between the various GMing contributions towards a greater and greater threat the party will need to deal with. The GMs leaving hooks and exposing possibilities that they and/or the other GMs will run with as things progress. Equally having several threads that nobody knows how they all relate yet, but we 'know' there is some common underlying peril that is driving things forward towards a final endgame.
It seems the common way to deal with the GM's character when they are GMing is to have them 'missing' from the adventure. I dont like the narrative implications of this myself and would like to brainstorm with a group some alternative. Off the top of my head we could have a magical solution. Maybe the party has the Staff of Doors which allows them to pass into the Shadow Mouintains. The staff however demands that one player stay inside the crystal at the top so they can return after each adventure. Thus one character is there and can see everything that happens but cant participate.
There were a few times we had to change the party because there was no brawn and the GM that session really really recommended that the party bring some along. I recall some fun GMing and some fun as a player. When Hexmark my thief/mage died (failed lotsa saves vs an illusionary fireball) it was a sad moment, but I still had my other character for the next session. If I recall at the time we also had the tradition of bringing along one of a pair of clerics as we didnt like just playing the healer. These NPCs were carefully crafted to not need to much input from us as players but were still interesting - they were run by the party collectively. I recall one was a very dim blonde who apart from her healing talents was a complete ditz.
[images are just cool D&D art from the wild internet] | s3://commoncrawl/crawl-data/CC-MAIN-2018-09/segments/1518891813571.24/warc/CC-MAIN-20180221063956-20180221083956-00525.warc.gz | CC-MAIN-2018-09 | 2,888 | 5 |
https://lists.debian.org/debian-hurd/2000/02/msg00204.html | code | Re: Proc failure with gcc-2.95.2
Thanks for your efforts, Chris. I wound up just biting the bullet and
building a gcc-2.95.2 cross-compiler on my Linux box and cross-compiling
hurd with that myself last night. I'm now able to reproduce the problem
you are seeing.
I am still at a loss for exactly what is going on, but I only spent a
little while digging into it. It might be a while before I can spend a lot
of time looking into this, so if anyone else feels like some hardcore
debugging and wants to take a crack at it, please do. Anyone who looks
into this, please post early and often with whatever clues you are
developing (let's cut down the CC's and just use bug-hurd for this).
There is one more thing I can think of in the way of tests to eliminate
possibilities, that someone could do without a lot of intimate hurd
debugging know-how. That is, try all permutations of using old shared
libraries with the new proc, varying old vs new libraries one by one (I
mean the same exact hurd sources where "new" is compiled with gcc-2.95.2
and "old" is compiled with another compiler and the "old" set all works
together fine in your setup). I'm not yet sure whether the problem is in
proc (in which case old libraries and new proc still loses), in one of the
libraries it uses (in which case new libraries and old proc still loses),
or in a weird interaction between the two (in which case new proc wins or
loses depending on the new/old choice for each library). | s3://commoncrawl/crawl-data/CC-MAIN-2021-39/segments/1631780057787.63/warc/CC-MAIN-20210925232725-20210926022725-00501.warc.gz | CC-MAIN-2021-39 | 1,465 | 22 |
http://askubuntu.com/tags/gmail/new | code | New answers tagged gmail
I think you can get it by using the GNOME environment in Ubuntu (I do, or Xfce). This the one Fedora defaults to (Ubuntu GNOME does as well), except Fedora usually has a much newer version (I prefer 3.8 or 3.14 - (though 3.10 and 3.12 are easiest to get in Ubuntu). You can install Gnome 3.14, but it will probably break things (such as Unity) and some bits I ...
Well, playing around with this, I discovered that the problem had nothing to do with gmail at all. I'd set facebook as an additional tab to open on startup. It was the facebook link that was being hijacked. When I removed the facebook url from my set of startup page I was able to open without problems. Ugh, this hijack was extremely aggressive also, and not ...
Take a look at adblock plus or similar browser plugins. I have never had a gmail popup in any browser since installing it.
Top 50 recent answers are included | s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936463318.72/warc/CC-MAIN-20150226074103-00294-ip-10-28-5-156.ec2.internal.warc.gz | CC-MAIN-2015-11 | 910 | 5 |
https://kr.mathworks.com/help/sdl/ug/automatic-transmission-with-a-dual-clutch.html | code | Automatic Transmission with a Dual Clutch
The Vehicle with Dual Clutch Transmission example model illustrates important points about both physical and control design modeling using the Simscape™ and Simscape Driveline™ environment and libraries.
The model represents an automatic transmission with two clutches. In an automatic transmission, an engine management subsystem decides when to change gear ratio and what the next gear ratio is. The pedal deflection imposed by a vehicle driver is converted into a demanded engine torque. The torque demanded and the current forward vehicle speed together determine which gear ratio the transmission switches to before it actually switches (gear preselection). By gradually lowering the clutch pressure, the transmission control system smoothly unlocks and disengages the clutch configuration for the current gear ratio. At the same time, the control system gradually raises the clutch pressures to achieve the new gear ratio by engaging and locking the new clutch configuration.
The physical components of the transmission, from the engine, gears, and clutches, to the vehicle body and tire, are modeled using Simscape Driveline blocks, with physical ports and connections.
The algorithmic control of the transmission, including the gear-switching and transmission control, is modeled using normal Simulink® blocks, with signal ports, signal lines, and enabled subsystems.
Vehicle with Dual Clutch Model
Predefined Simulation Options
The model is also set up to allow you to switch between two common simulation configurations. To configure the model to simulate with a variable-step global solver or a fixed-step local solver, click the links in the description.
You can directly adjust all the solver options by opening the model Configuration Parameters and the network Solver Configuration property inspector. | s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296818452.78/warc/CC-MAIN-20240423002028-20240423032028-00819.warc.gz | CC-MAIN-2024-18 | 1,863 | 9 |
https://blog.darkbuzz.com/2012/04/einstein-did-not-refute-lorentz.html | code | If Einstein had some disagreement with Lorentz, he had plenty of opportunities to say so. Einstein's famous 1905 relativity paper makes three references to Lorentz's work:
They suggest rather that, as has already been shown to the first order of small quantities, the same laws of electrodynamics and optics will be valid for all frames of reference for which the equations of mechanics hold good. ...The first sentence does not mention Lorentz's name, but Einstein always explained it as referring to Lorentz's 1895 paper.
If we imagine the electric charges to be invariably coupled to small rigid bodies (ions, electrons), these equations are the electromagnetic basis of the Lorentzian electrodynamics and optics of moving bodies. ...
Since ..., we have the proof that, on the basis of our kinematical principles, the electrodynamic foundation of Lorentz's theory of the electrodynamics of moving bodies is in agreement with the principle of relativity.
As you can see, Einstein agrees with Lorentz on all points. The 1905 paper has two postulates, the relativity principle and the constant speed of light. The first is explicitly taken from Lorentz, as quoted above. The second was also borrowed from Lorentz, as Einstein later explained.
Einstein had another chance to clarify his relationship to Lorentz's theory in 1907, when he was invited to write a relativity review paper, published in 1908 (also here), regurgitating his 1905 paper along with some other work. It said:
In what follows it is endeavored to present an integrated survey of the investigations which have arisen to date from combining the theory of H.A. Lorentz with the theory of relativity.Einstein always denied that he had read that 1904 Lorentz paper before 1905, in spite of the similarity of ideas, and of evidence that he had access to Lorentz's results. But regardless, Einstein acknowledges Lorentz's 1904 paper in 1907, and acknowledges the similarity with his own work. Einstein does not express any disagreement with Lorentz.
In the first two parts of this work are treated the kinematic foundations of the theory of relativity and their application to the basic equations of teh Maxwell-Lorentz theory; I am following here the investigations of of H.A. Lorentz (Versl. Kon. Akad. v. Wet., Amsterdam 1904), and A. Einstein (Ann. d. Phy. 16, 1905). [translation by H.M. Schwartz, 1976.]
Einstein does not express any disagreement with Poincare either, as Poincare had also published a version of relativity theory.
Lorentz published his 1906 Columbia U. lectures on relativity, where he described Einstein's work without expressing any disagreement with it. That is where Lorentz says, "Einstein simply postulates what we have deduced". After praising Einstein's simplicity, he says, "Yet, I think, something may also be claimed in favor of the form in which I have presented the theory." Lorentz was saying that he and Einstein had different ways of presenting the same theory, with advantages and disadvantages to each approach.
Minkowski's 1908 paper says how he goes farther than Lorentz and Einstein:
This hypothesis sounds rather fantastical. For the contraction is not to be thought of as a consequence of resistances in the ether, but purely as a gift from above, as a condition accompanying the state of motion.That's right. Lorentz and Einstein had the formulas that are equivalent to special relativity, but it was Poincare and Minkowski who formulated the geometric interpretation that altered the concept of space.
I shall show in our figure, that Lorentz's hypothesis is fully equivalent to the new conceptions about time and space, by which it becomes more intelligible. ...
But the concept of space was not altered, either by Einstein or Lorentz, ...
Poincare praises Lorentz, but is not afraid to express disagreement. Poincare's 1900 paper says:
It would no doubt seem strange that in a monument raised to the glory of Lorentz I would review the considerations which I presented previously as an objection to his theory. I could say that the pages which follow are rather in the nature of an attenuation rather than a magnification of that objection.Poincare's long 1905 paper says:
The importance of the question determined me to take it up again; the results which I obtained are in agreement with those of Lorentz on all important points; I was only led to modify and supplement them in some points of detail; one will further see the differences which are of secondary importance.Einstein fans like to say that he somehow reversed some faulty view of Lorentz and/or Poincare, but they are never able to explain why Einstein himself was never able to articulate such an opinion. Was he too stupid to realize what he had done? Was he too cowardly to say that someone else was wrong? Were his communication skill insufficient to say what he wanted to say? No, it is much more likely that he simply had no disagreement with Lorentz or Poincare. He did not even understand Poincare. | s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474843.87/warc/CC-MAIN-20240229134901-20240229164901-00441.warc.gz | CC-MAIN-2024-10 | 4,985 | 17 |
http://vuplus-community.net/board/threads/bh-official-portuguese-translation.11347/ | code | Discussion in 'Black Hole Translations' started by Tamaki, Feb 21, 2013.
Please put here translation file, bug files or suggestion.
Actual translator are Mario Santos, sman.
Currently finished 44% of the Portuguese translation... I'll be posting the updates.
I wanna give a hand on this. Where can I start??
I found it already
I've started some minutes ago and I'm doing it well.
More than 50% translated already. I think I can finish this soon
I'll keep all portuguese friends informed here
Mas qual trabalho? O que se pode fazer (e como) por aqui em prol do português?
If you have knowledge about enigma2 translation you can put your hands in it and append the existent translation.
Please, next time ... only in english. | s3://commoncrawl/crawl-data/CC-MAIN-2021-10/segments/1614178358064.34/warc/CC-MAIN-20210227024823-20210227054823-00202.warc.gz | CC-MAIN-2021-10 | 724 | 12 |
https://serverfault.com/tags/parse/info | code | Parse provides an open source backend and SDKs for mobile and desktop applications. Tag any questions with the `parse` tag. The hosted Parse service has been discontinued in favor of the open source Parse Server self-hosted backend. Questions asking for alternative solutions are OFF-TOPIC.
Parse provides an open source backend for powering end-user applications. Parse Server is built on Node.js and uses MongoDB. In terms of clients, Parse supports a number of different platforms, including iOS (7.0+), OS X (10.9+), Android (API level 9+), Unity 5, and Windows (8+), as well as web applications. SDKs are available for a number of these platforms.
End of service
The hosted Parse backend service has been discontinued and will be available until January 28, 2017. A database migration tool and a migration guide has been provided to assist with the migration of hosted apps to the new open source Parse Server.
A comprehensive list of Parse alternatives is available here.
- Data persistence
- Push notifications (iOS, OS X, Android)
- Social integration
- Cloud code execution
The fastest and easiest way to get started is to run MongoDB and Parse Server locally:
$ npm install -g parse-server mongodb-runner
$ mongodb-runner start
$ parse-server --appId APPLICATION_ID --masterKey MASTER_KEY
You can use any arbitrary string as your application id and master key. These will be used by your clients to authenticate with the Parse Server.
That's it! You are now running a standalone version of Parse Server on your machine.
Getting help with Parse Server
Questions about hosting your own Parse Server backend should be tagged using
Questions regarding the Parse SDKs are off topic, but answerable code-level questions specific to Parse can be asked on Stack Overflow using the | s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590347428990.62/warc/CC-MAIN-20200603015534-20200603045534-00491.warc.gz | CC-MAIN-2020-24 | 1,782 | 18 |
https://www.freebsdsoftware.org/security/xorsearch.html | code | - Introduction to FreeBSD Security Best Practices
- Working with Package Management in FreeBSD
- Understanding FreeBSD Security Advisories and Updates
- Troubleshooting Common System Administration Issues in FreeBSD
- Tips for Hardening FreeBSD to achieve System Protection
- Setting Up DHCP Server in FreeBSD
- Secure User and Group Management in FreeBSD Systems
- Secure Remote Access with SSH in FreeBSD
- Optimizing System Performance in FreeBSD
- Network Packet Capture with tcpdump in FreeBSD
- All posts ...
Do you have GDPR compliance issues ?
Check out Legiscope a GDPR compliance software, that will save you weeks of work, automating your documentation, the training of your teams and all processes you need to keep your organisation compliant with privacy regulations
Jul 20, 2023
Search for a given string in an XOR or ROL encoded binary file
XORSearch is a program to search for a given string in an XOR or ROL encoded binary file. An XOR encoded binary file is a file where some or all bytes have been XORed with a constant value the key. A ROL or ROR encoded file has it bytes rotated by a certain number of bits the key. XOR and ROL/ROR encoding is used by malware programmers to obfuscate strings like URLs.
XORSearch will try all XOR keys 0 to 255 and ROL keys 1 to 7 when searching. I programmed XORSearch to include key 0, because this allows to search in an unencoded binary file X XOR 0 equals X.
If the search string is found, XORSearch will print it until the 0 byte zero is encountered or until 50 characters have been printed, which ever comes first. 50 is the default value, it can be changed with option -l. Unprintable characters are replaced by a dot.
Checkout these related ports:
- Zzuf - Transparent application input fuzzer
- Zlint - X.509 certificate linter
- Zeronet - Decentralized websites using Bitcoin crypto and BitTorrent network
- Zenmap - GUI frontend for the Nmap scanning utility
- Zeek - System for detecting network intruders in real-time
- Zaproxy - The OWASP zed attack proxy
- Yubioath-desktop - GUI for displaying OATH codes with a Yubikey
- Yubikey-personalization-gui - Graphical YubiKey personalization tool
- Yubikey-manager-qt - Cross-platform application for configuring any YubiKey
- Yubikey-agent - Seamless ssh-agent for YubiKeys
- Yubico-piv-tool - Yubico PIV tool
- Ylva - Command line password manager and file encryption program
- Ykpers - Library and tool for personalization of Yubico's YubiKey
- Ykclient - Yubico C client library
- Yersinia - Layer 2 vulnerability scanner (switches, spanning tree, 802.1q ...) | s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474688.78/warc/CC-MAIN-20240227220707-20240228010707-00311.warc.gz | CC-MAIN-2024-10 | 2,580 | 34 |
http://m0n0.ch/wall/list/showmsg.php?id=165/55 | code | I'm unable to setup m0n0wall to route my packets on 2 LANs. I have WRAP
device with 3 network cards. One is used for WAN (ADSL PPPOE), one is my LAN
192.168.192.xxx and last is OPT1 192.168.0.xxx.
Whatever I tried, I cannot setup correct routing so that all packets for
192.168.0.xxx are sent through OPT1 interface - and if possible, masquerated
to some IP address from 192.168.0.xxx segment. I tried defining static
route, NAT (1:1, outbound), firewall rules, everything, but I just can't get
I never managed to get both routes working correctly. Either WAN was
working, or OPT1 (192.168.0.xxx) was working.. Never both.
Can anyone shed some light on how to set it up so I can transparently access
192.168.0.xxx from my LAN 192.168.192.xxx? I have fair knowledge about
firewalls and routing, but I cannot find proper way to set this up over web | s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500549428257.45/warc/CC-MAIN-20170727122407-20170727142407-00642.warc.gz | CC-MAIN-2017-30 | 846 | 12 |
http://naacl2013.naacl.org/abstracts/117.aspx | code | Dependency-based empty category detection via phrase structure trees
Nianwen Xue and Yaqin Yang
We describe a novel approach to detecting empty categories (EC) as represented
in dependency trees as well as a new metric for measuring EC detection
accuracy. The new metric takes into account not only the position and type of
an EC, but also the head it is a dependent of in a dependency tree. We also
introduce a variety of new features that are more suited for this approach.
Tested on a subset of the Chinese Treebank, our system improved
significantly over the best previously reported results even when evaluated
with this new, arguably more stringent metric.
Back to Papers Accepted | s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218190134.67/warc/CC-MAIN-20170322212950-00192-ip-10-233-31-227.ec2.internal.warc.gz | CC-MAIN-2017-13 | 686 | 11 |
https://veredtioca.web.app/248.html | code | Git server over ssh tagged bash, client config, command line, etc passwd, git, howto, network, programming, ssh, tutorial. If you cannot authenticate to the server, and you are using windows 10 developer mode, make sure that your openssh server does not conflict with an internal ssh server used by the developer mode. Using the builtin ssh client shipped with git for windows, you need to set up the home environment variable so that the git ssh client can find the key. So many suggestions exist that you may get lost in it. Sep 24, 2018 after you enable it, the windows remote desktop server side service starts listening for connection requests on port 3389. May 27, 20 when we install git for windows we get an ssh client bundled with the git program, but we will need to set up an ssh server on the computer that hosts the central shared repository, which must listen to connections on the ssh port by default 22. Jul 20, 2019 ssh stands for secure shell and is an awesome way to authenticate yourself on remote servers for example the github server without typing in a password everytime. Using openssh and generating ssh keys with sshkeygen. Windows git ssh authentication to github vlad mihalcea. It is a console app, but it works as a windows service. Then install git and openssh packages, either from the links provided or from within cygwins setup utility.
The most common problems when setting up git on windows are related to ssh keys. Installation of openssh for windows server 2019 and windows 10. How do i git clone from a windows machine over ssh. So the most popular and widely recommended solution for connecting to ssh servers is an open source. According to reports, github, a code hosting site, is the worlds largest code hosting service. It seems to have been helpful to a lot of others as well. This guide should helpful to both windows and linux users who want better interoperability. Git is a versioning system developed by linus torvalds, that is used by millions of users around the globe. A windows version of git can be downloaded from a number of sources.
While the private key should always stay private and safe, the public key can be shared around the internet without any problems. Gitstack is a software that lets you setup your own private git server for windows. On windows, before running ssh add, you will need to run the following command from included in git for windows. The secure shell ssh protocol is often used for remote terminal connections, allowing you to access a textmode terminal on a remote computer as if you were sitting of it. If no git capability is configured, bamboo will use its builtin git implementation.
You dont need putty to ssh with windows unless it makes you happy, then putty on, my friend. Contribute to powershellwin32openssh development by creating an account on github. How to set up a git server with ssh on windows install and set up cygwin first, install cygwin from its website. We introduce how to set up git server via ssh in this post. This will authenticate against any ssh server you use with git using the key stored in the ssh clients location global 1. Microsoft partnered with canonical to create bash on ubuntu on windows, running through a technology called the windows subsystem for linux. Users with these windows versions should use the instructions that follow to install and configure openssh. Setting up a central git repository on a windows server. The provided ssh server is similar to the linux app. Before we can configure the ssh server to provide access to git, we must install git.
If you are using git bash, the command you need to use is. Setup ssh authentication for git bash on windows github. Install win32 openssh powershellwin32openssh wiki github. Following this guide, you will be able to create and start using an ssh key. They are standard and in stable versions on windows 10 since the 1809 october update. You can use an existing ssh key with bitbucket server if you want, in which case you can go straight to either ssh user keys for personal use or ssh access keys for system use.
I originally created this as a gist on github to be shared with some coworkers who were struggling to set up ssh on windows. Git is capable of using ssh keys instead of traditional password authentication when pushing or pulling to remote repositories. Mar 18, 2020 an ssh client allows you to connect to a remote computer running an ssh server. Nov 17, 2018 hi, in this video you will install putty software and after installing putty we will conntect to linux and you will also learn second method to connect to linux server which is installing git bash. Setting up a git server on windows server 2008 r2 using. Git via ssh from windows, permission denied github. Now, each user that does this has to send their public key to you or whoever is administrating the git server assuming youre using an ssh server setup that requires public keys. Sep 30, 2019 github, gitlab and bitbucket are popular solutions, but running your own git server is an alternative worth considering. Gitstack also makes it super easy to secure and keep your server up to date. About ssh using the ssh protocol, you can connect and authenticate to remote servers and services. Installation of openssh for windows microsoft docs. This post is a setup guide and introduction to ssh client and server on windows 10.
How to install git on windows and set up ssh keys for. When we install git for windows we get an ssh client bundled with the git program, but we will need to set up an ssh server on the computer that hosts the central shared repository, which must listen to connections on the ssh port by default 22. Updated how to connect to linux server from windows. Give it a name without spaces or you will need to use quotes everywhere later to access this folder. Mar 19, 2020 git and ssh are both powerful tools, and git ssh work well together. Lets see how to enable the openssh server in windows 10.
That being said, many git servers authenticate using ssh public keys. How to list all available repositories on a git server via ssh. Scan this list to see if openssh client is already installed. It can also be used for ssh tunneling, scp file transfers, and other things. Github is a great service, however there are some limitations and restrictions, especially if you are an individual or a small player. Once, bitvise ssh server is installed, we need to follow below steps. This command should work even if remote login via ssh is blocked on the server.
How to use ssh to connect to a remote server in linux or windows. Setup ssh authentication for git bash on windows prepararation. Apr 11, 2018 jack wallen shows you how to set up your own gitlab server, so you can enjoy the power and flexibility of a lan or wan based git repository. Next, we need to install bitvise ssh server and set it up. With ssh keys, you can connect to github without supplying your username or password at each visit. Aug 19, 2017 configuring ssh authentication for git on a windows jenkins worker written by kirk macphee posted on august 19, 2017 september 25, 2017 3 comments with many of the tools commonly used in a continuous delivery pipeline, windows is not the original os the tool was developed for. Openssh has been added to windows as of autumn 2018, and is included in windows 10 and windows server 2019. You should check for existing ssh keys on your local computer.
In order to provide a public key, each user in your system must generate one if they dont already have one. Updated how to connect to linux server from windows using. Git free bitvise ssh server paid first we need to install git on server and add path of git. Secure shell, sometimes referred to as secure socket shell, is a protocol which allows you to connect securely to a remote computer or a server by using a textbased interface when a secure ssh connection is established, a shell session will be started, and you will be able to manipulate the server by typing commands within the client on your local computer. Visit your repository on the web and select the clone button in the upper right. Newnetfirewallrule is for windows 2012 and above servers only. Where you install gitbash with developer defaults and generate ssh keys. At first glance, it appears to support the same features as its nix counterpart. How to enable and use windows 10s new builtin ssh commands. Mar 29, 2019 how to set up a git server with ssh on windows. Learn how to set up your own git server in this tutorial from our archives. Github, gitlab and bitbucket are popular solutions, but running your own git server is an alternative worth considering. Nov 05, 2019 now that we got git running, it is time to set up ssh keys for git, so that we dont need to input password every time.
Step by step setup git server on windows with copssh. Modern hosted git solutions like bitbucket support ssh key authentication. Jack wallen shows you how to set up your own gitlab server, so you can enjoy the power and flexibility of a lan or wan based git repository. Lets walk through setting up ssh access on the server side. In this guide, well explain how to set up a bare git server on linux. I have set up an ssh server on a windows server 2012 r2 with cygwin. If youre on a client desktop machine like windows 10 or. I ssh into linux from windows using the builtin openssh client that windows 10 has shipped for years that you didnt know about. How to ssh into a windows 10 machine from linux or windows. Companies like github offer code hosting services based on git. However, when i try to connect to it with git bash, it close the connection before i have the chance to input my password. Whenever you try to connect to a windows server, you will need to provide a valid username for the account you are using to gain access remotely.
Setting up a git server with ssh on my lan can be confusing. If you are running msysgit i am assuming you are and are looking to run git bash i recommend it over tortoisegit, but i lean to the cli more than gui now, you need to figure out what your home directory is for git bash by starting it then type pwd on windows 7, it will be something like c. How to setup ssh authentication for git bash on windows. The openssh client and openssh server are separately installable components in windows server 2019 and windows 10 1809. For example, on a windows vista installation, this would be done by issuing setx home c. Ive verified that github allows me to connect using the following command. Below are instructions on how to set up the ssh server to run automatically at boot.
Configuring an ssh server account for git access bitvise. Connect to your git repos with ssh azure repos microsoft docs. Create the following files if they do not already exist paths begin from the root of your user home folder. This tutorial defines you a clear cut way of configuring the gitbash with github by ssh keys, only by three commands. Git uses ssh keys to securely access your repositories, and in windows ssh keys are often searched on the wrong path when you try to use git. This option will install a bin folder in program files\ git that will be placed into your path thus taking possibly taking precedence over other tools. This option will install a bin folder in program files\git that will be placed into your path thus taking possibly taking precedence over other tools. Dec 21, 2017 this tutorial defines you a clear cut way of configuring the gitbash with github by ssh keys, only by three commands. Install git with ssh login on windows 10 macklus medium. I can successfully connect to the server with ssh using putty on my windows pc or using ubuntu. Or run your openssh server on a different port than 22.
Ssh works via two keys, the private key and the public key. The above ssh call will connect to a git hosting server that has gitolite installed and will return the list of repositories that are available to your account along with the access rights of each note. Ive followed all the instructions on github to generate, add, and upload the public key to github. Set system environment variable for sshd to pick up the git commands. If everything works well, then the prompt would say youve successfully authenticated. On windows, before running sshadd, you will need to run the following command from included in git for windows. Ssh keys are used to authenticate secure connections. A step by step tutorial on how to automatically start ssh. While the private key should always stay private and safe, the public key can be shared around the internet without any. To verify ssh is working for our git, we can try the following command on git bash. Configuring ssh authentication for git on a windows jenkins. How to setup git server using bitvise ssh jitendra zaas blog. Newnetfirewallrule name sshd displayname openssh server sshd enabled true direction inbound protocol tcp action allow localport 22.
Ssh keys can be used to establish a secure connection with bitbucket server for. Verify which remotes are using ssh by running git remote v in your git client. Setting up ssh and git on windows 10 dev community. I fought with this problem for a few hours before stumbling on the obvious answer. Microsoft announced it was bringing an integrated openssh client to windows in 2015. This article assumes youre setting up your git repository on your dreamhost server. Oct 17, 2018 git for windows, selecting the run git and included unix tools from the windows command prompt when prompted. View the ssh overview article for instructions on how to log into your server. Git for windows, selecting the run git and included unix tools from the windows command prompt when prompted. How to use ssh to connect to a remote server in linux or. Microsoft made some noise about integrating an official ssh client into powershell back in 2015, but we havent heard much about it since. Bonobo git server is an opensource project as it is licensed with a mit license the source code is available on github and is very extensible you can influence its future contribute and make your feature part of the best git server for windows. Im trying to setup my windows 10 environment to pull down my repositories over ssh. Setting up a git server on windows using git for windows and.
Gitbash ssh configuration with github in windows youtube. Installing sftpssh server on windows using openssh winscp. Create a folder at the root of your user home folder example. I can do ssh windowsmachine from linux to access a windows machine, and from there i can git init bare foo. Git and ssh are both powerful tools, and gitssh work well together. Hi, in this video you will install putty software and after installing putty we will conntect to linux and you will also learn second method to connect to linux server which is installing git bash. Give it a name without spaces or you will need to use quotes everywhere later to. Ssh keys and login are git features who allow us to login on server like github or bitbucket without using usernamepassword. Openssh is the opensource version of the secure shell ssh tools used by administrators of linux and other non windows for crossplatform management of remote systems. How to setup git server using bitvise ssh jitendra zaas. Setting up a git server on windows using git for windows. Openssh client and server are installable features of windows 10 1809.
How to set up a gitlab server and host your own git. How to set up git server on local network windows tutorial. You can use ssh keys to establish a secure connection between the bamboo server and the scm that hosts git repositories. Setting up a git server allows you to create private repositories without the restrictions of the providers free plans. If you use an older version of msysgit, you may encounter a step called choosing the ssh executables. One of the limitations of github is that the free service doesnt allow private hosting of the code. Give it a name without spaces or you will need to use quotes.
Installing openssh from the settings ui on windows server 2019 or windows 10 1809. To install openssh, start settings then go to apps apps and features manage optional features. How to automatically start ssh server on boot on windows subsystem for linux. How to set up git server on local network windows tutorial medium. If git for windows is installed, run git bash shell. If youre on a client desktop machine like windows 10 or windows. Its important to note that this is literally all you need to do to run a useful git server to which several people have access just add sshable accounts on a server, and stick a bare repository somewhere that all those users have read and write access to. Apr 20, 2016 we need below two software installed on system which will act as a git server. Git server through ssh is easy and fast to set up, although every user will have access to all repositories in the git server over ssh and every user is the git administrator. Checking for existing ssh keys before you generate an ssh key, you can check to see if you have any existing ssh keys.
Configuring ssh authentication for git on a windows. Ssh stands for secure shell and is an awesome way to authenticate yourself on remote servers for example the github server without typing in a password everytime. Microsoft has a native openssh client and server on windows. This means that you create a leading edge versioning system without any prior git knowledge. Configuring git ssh on windows atlassian documentation. How to connect to an ssh server from windows, macos, or linux. Configuring ssh authentication for git on a windows jenkins worker written by kirk macphee posted on august 19, 2017 september 25, 2017 3 comments with many of the tools commonly used in a continuous delivery pipeline, windows is not the original os the tool was developed for. Assuming that optgit exists on that server, you can set up your new repository by copying your bare repository over.708 1195 570 1401 1284 208 227 1578 922 878 585 606 52 189 603 780 962 1386 1388 685 115 801 258 1045 1562 845 744 1233 168 7 1174 1268 933 840 1345 1399 235 462 1343 477 1252 498 630 866 838 839 1347 | s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506686.80/warc/CC-MAIN-20230925051501-20230925081501-00047.warc.gz | CC-MAIN-2023-40 | 18,237 | 19 |
https://www.techtarget.com/searchcio/feature/CIO-on-the-importance-of-holistic-data-collection-and-analysis-methods | code | adam121 - Fotolia
Tammy Bilitzky, the CIO of Data Conversion Laboratory, is focused on helping her company's customers organize and mine their data for insights that inform both tactical and strategic decisions. To do that, Bilitzky said she advises organizations to take a holistic view of their data. She said organizations must understand data in context, particularly as they use artificial intelligence to gain new insights, otherwise they risk using skewed results that could lead to faulty decisions.
Here, in part two of this two-part series, Bilitzky shared her ideas on the data collection and analysis methods that ensure accuracy of results and build trust into automated data systems.
Editor's note: The following has been edited for clarity and length.
What are the common challenges that organizations have when it comes to data collection and analysis methods?
Tammy Bilitzky: One of the biggest challenges [for organizations] is understanding what holistic data they have. Too much content is as much of a challenge as too little content. There are different aspects of what holistic data means, which is especially true when you get into the world of artificial intelligence. You have to semantically understand what each word means. Like the word 'pen': Am I talking about a writing instrument or animal enclosure or a peninsula? Then you have to understand it syntactically depending on the sentence structure. It's not always clear.
And then you have to understand data contextually. Like when I say something's 'bad,' does that mean it's good or bad. You have to look at the context.
You have to take a holistic view of your data to make it meaningful. To me, that's the biggest challenge companies have.
What's the consequence of not taking that holistic view to data collection and analysis?
Bilitzky: People are using data to make both strategic and tactical decisions. If you get the meaning wrong, all your results are potentially flawed and all your decisions you make against those results are potentially flawed.
Your data is your foundation, and if you get the foundation wrong, your house crumbles.
That's why we continually validate results, and we only use the algorithms when we know we can trust the results.
How do you build a holistic view of data?
Bilitzky: It's about building in checks and balances. There's not a lot of transparency in the underlying foundational work in the algorithms; the average developer doesn't have the expertise to write these algorithms. So we have to build in checks and balances to make sure the technology won't work against us, because by far the greatest danger of artificial intelligence is that people conclude too early that they understand it. But for most people, the AI algorithms are black boxes, and they don't know what data and logic are used to power them. So while you would think the results of these algorithms would always be consistent, that's not true. There's a dark side to AI. I'm still a proponent of AI, but it's the responsibility of the people who use it to understand what they're using and to validate the results. In my mind, there has to be a policy of trust and verify.
Is trust and verify a business task or a job for the technology?
Bilitzky: The answer is both. There are definitely technology solutions you can use. There is technology that you can use to do quality assurance on your results, and you can use technology to cross check them. But you also can have people look at them. Neither side can abdicate responsible; it should be the technology and the business together verifying that the information makes sense.
What I worry about when you give it to just technology [teams], they don't have the subject matter expertise to catch anomalies and potential repercussions.
Is this system of checks and balances all about automation?
Bilitzky: There's still a place for a person when you're training the model, and we encourage having people to do ongoing checks. The manual piece is the person who is reviewing the results and identifying where things are right and where things are wrong. So there's a person doing the ongoing checks, but the results of that are getting programmatically incorporated into the algorithms, [which] is called continuous improvement.
You promote the idea of making content 'smarter and more discoverable.' What do you mean by that?
Bilitzky: Your holistic data has to be smart, and you have to understand what it means so it won't mislead you. You have to make the content smart, meaning that the content is going to give you the information you're looking for. Something is smart when it is precise, understandable and meaningful.
So first of all, to use content, you have to be able to find it. Even if you have text, a straightforward keyword search won't necessarily give you the context you want, [in which case] your results are going to be skewed. You need to classify your documents so you understand the purpose of each document, and, by understanding that purpose, you can start to understand the information that's in that document; you'll have a general context.
Then you can go on to entity extraction -- the people, places, things -- the meaningful content buried in the freeform. That's where we start talking about the idea of triples, marrying data to the relational data. You're building relationships out of that data. We didn't have that 10 years ago. What we have now with this concept of triples is that you can infinitely evolve your data and their relationships. The concept of triples being the subject; predicate, or attribute; and object. The attribute or predicate connects the subject and the object. You can keep linking these things, and that evolves to create your ontology.
Do these data collection and analysis methods only work using AI?
Bilitzky: I wouldn't say that, but when you deal with high volumes of data, [it can assist with the process]. There are other ways to do it; you can do a lot of this -- create triples -- using regular expressions and other programming techniques. But it would take more time and resources. It might be cost prohibitive if you don't leverage these technologies.
Some experts have expressed concern that today's data won't be accessible in the future. What do you see on this front?
Bilitzky: We convert to all formats, but we're big proponents of XML, because XML is flexible.
You can't always interpret your future data needs, and there are data that are not necessary today but can become critical in the future as business needs evolve. So I believe you have to prepare for the future, but you don't want to overbuild now. So build the foundation. Get the data into a format like XML, but focus on delivering value now. What holistic data do I need to power my business now? Get that data to the most granular level you need to power your business.
But then leave the other data in XML for the future. At least you have the data in a format that can be extended. Once it's in XML or a similar format, getting it into the next generation is a lesser effort.
When you do that, you can preserve your context and your lineage and your security. You put it into a repository and then you continually look at how you want to mine your data and grow it. You can constantly iterate on it. | s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474440.42/warc/CC-MAIN-20240223153350-20240223183350-00315.warc.gz | CC-MAIN-2024-10 | 7,298 | 30 |
https://pubmed.ncbi.nlm.nih.gov/28344915/ | code | The domain of biobanking has gone through many stages and as a result there are a wide range of commercial and open source software solutions available. The utilization of these software tools requires different levels of domain and technical skills for installation, configuration and ultimate us of these biobank software tools. To compound this complexity the biobanking community are required to work together in order to share knowledge and jointly build solutions to underpin the research infrastructure. We have evaluated the available tools, described them in a catalogue (BiobankApps) and made a selection of tools available to biobanks in a reference toolbox (BIBBOX) that are use-case driven. In the BiobankApps tool catalogue, both commercial and open source software solutions related to the biobanking domain are included, classified and evaluated. The evaluation covers: 1) "user review" by an authenticated user 2) domain expert: quick analysis by BBMRI members and 3) domain expert: detailed analysis and test installation with real world data. The evaluation is paired with a survey across the more "advanced" (from a technology perspective) biobanks to investigate what tools are currently used and summarises known benefits/drawbacks of the respective packages. In the second step we recommend tools for specific use cases, and install, configure and connect these in the BIBBOX framework. This service also builds on the existing work in the United Kingdom in seeking to establish the motivations for different stakeholders to become involved and therefore assisting in prioritising the use-cases based on the level of need and support within the research community. All tools associated to a use-case are available as BIBBOX applications (technically this is achieved by docker containers), which are integrated in the BIBBOX framework with central identification and user management. In future work we plan to share the acquired knowledge with other networks, develop an Application Programmable Interface (API) for the exchange of metadata with other tool catalogues and work on an ontology for the evaluation of biobank software.
Keywords: Biobanks; Open source software; Software evaluation. | s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600400228998.45/warc/CC-MAIN-20200925213517-20200926003517-00187.warc.gz | CC-MAIN-2020-40 | 2,217 | 2 |
https://www.tr.freelancer.com/projects/flash/unit-flash-actionscripting/ | code | - Rotate thru 3 times then stop
- I'd like for the houses to move across the background continuously (in random sizes and speeds and transparencies - I just created the existing movie clip to give you something to work with)
- I'd like for the yellow banner in the corner to roll out over the smilie has hit the bottom and bounced
- don't have the clickthru info yet - will get that hopefully today
Bu iş için 2 freelancer ortalamada $50 teklif veriyor
Very interested in this flash job View bmp for example works . | s3://commoncrawl/crawl-data/CC-MAIN-2018-26/segments/1529267867579.80/warc/CC-MAIN-20180625072642-20180625092642-00048.warc.gz | CC-MAIN-2018-26 | 517 | 6 |
http://janiegu.com/ | code | I am an engineer, product manager, and problem solver.
My passion is for building tools and businesses that help people solve problems. I am meticulous, hard-working, and a fast learner.
I am currently an engineer at Lyft, working on building out Lyft's suite of Enterprise products. Previously worked at Google, and studied operations research and computer science at Princeton. | s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296816863.40/warc/CC-MAIN-20240414002233-20240414032233-00236.warc.gz | CC-MAIN-2024-18 | 379 | 3 |
http://www.okcupid.com/profile/ilprincipe | code | I'm a bit of a geek, particularly when it comes to TV shows, anime, and science fiction. I especially enjoy JRPGs and a few other genres of video games. My other main hobby is cooking, which is convenient since I experience a strange compulsion to eat food every day.
Professionally, I'm finishing a PhD in musicology, which more or less amounts to the acquisition of numerous tools to discuss and analyse the culturally elevated music of dead people. Couple that with utter ignorance of nearly all of the music people actually listen to today, and you've pretty much got it. I'm also involved in the Skeptical movement and write for a fairly well-known blog network.
Oh, and I'm INTJ if you're into that sort of thing (it's pseudoscience, but fun pseudoscience). I can also be a major introvert, and it can take some coaxing to get me out of the house to social events, especially to meet new people. This can also make me appear reserved or (maybe?) standoffish or disinterested. Once I get familiar I relax considerably and you'll see that nothing could be less the case.
By the way, I really am looking for new friends, so I'm still happy to chat and hang out even if romance isn't on the agenda. | s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386164645800/warc/CC-MAIN-20131204134405-00026-ip-10-33-133-15.ec2.internal.warc.gz | CC-MAIN-2013-48 | 1,200 | 4 |
https://discuss.istio.io/t/how-to-setup-virtual-services-and-shared-gateway/13728 | code | I am trying to setup service mesh for 2 different applications running in 2 different namespaces.
NS1: app1 + virtual service
NS2: app2 + virtual service
NS3: shared gateway for app1 and app2 + tls secret
I am not belonging to the infrastructre team, so I dont know all the aspects w.r.t to istio components. I just can tell that in our environment we are used to annotate the namespaces accordingly (example.com/istio-dedicated and example.com/collectord) in order to let istio create the service mesh control plane. Till now I was working with dedicated setup, which means I had dedicated gateway within each app namespace. After annotating app namespaces the control plane shows up and and the deployment of gateway and virtual service produced ingess gateway pods and proper routes in the control plane.
Now, since I am trying to use shared gateway and after creation of virtual service and gateway I miss the route which expect in the app1 and app2 control planes.
Can anybody think of what I am doing wrong ? | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335004.95/warc/CC-MAIN-20220927100008-20220927130008-00718.warc.gz | CC-MAIN-2022-40 | 1,014 | 7 |
http://www.bcdb.com/cartoons/Other_Studios/C/Comedy_Partners/ | code | The subsidiary of MTV Networks operates cable network Comedy Central, the home of such hits as The Daily Show with Jon Stewart, The Colbert Report, RENO 911!, and South Park.
Comedy Partners Studio Directory Cartoon Series:
The Black Sabbath Show
Comedy Partners, Flinch Studios
featuring Tony Iommi, John "Ozzy" Osbourne, Terry "Geezer" Butler, Bill Ward, Doom Doom.
There have not yet been any votes for "The Black Sabbath Show". | s3://commoncrawl/crawl-data/CC-MAIN-2014-10/segments/1394021763647/warc/CC-MAIN-20140305121603-00084-ip-10-183-142-35.ec2.internal.warc.gz | CC-MAIN-2014-10 | 431 | 6 |
https://repair-geeks.com/cv59sh-a32-firmware-software-download/ | code | Would you like to get this CV59SH-A32 software downloaded from here?. Is it your sole purpose to come here and get this CV59SH-A32 Firmware Download for free?. If so, then you have met us, so you can assume that you have just got all the files of this CV59SH-A32 board. Because I totally agree to share this software with you guys. You hope on our team, I will fulfill my promise to give you all the resolutions of CV59SH-A32 firmware for free. | s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296816977.38/warc/CC-MAIN-20240415111434-20240415141434-00138.warc.gz | CC-MAIN-2024-18 | 444 | 1 |
https://www.redhotpawn.com/forum/help/improving-the-public-games-search-funtion.10518 | code | Originally posted by Prefect
I don't know if this is possible but I'm going to suggest it anyway.😀
In the search funtion it would be nice if you could choise the color of the games of the player you are looking for. It would also be nice if you could search by a position and in a certain rating boundery.
To give you and example to claryfi things, perhaps I'm looking ...[text shortened]... ames were xxx is white and a player of 1600+ plays sicilian against him.
Regards, Prefect. 😀
What I would like to have is the ability to download a complete set of a player (or players) games played on RHP in PGN format.
This way I could import the PGN games into ChessBase 8 (or have a PGN reader access them). ChessBase8 requires that the PGN file be converted to its format first, but that is extremely simple to do, and is quick. Once done one can sort by any number of criteria, such as elo ratings for Black or White, by player name, or specific positions.
Just being able to download PGN games would save RUSS alot of time, as we would all have access to each others games from an online database. | s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267158001.44/warc/CC-MAIN-20180922005340-20180922025740-00010.warc.gz | CC-MAIN-2018-39 | 1,102 | 8 |
https://pdls.pervasivedisplays.com/userguide/Volume1/Part2/Chapter5/Section2/ | code | The Viewer edition runs as a Linux and Windows native application to simulate an e-paper screen and manage touch. It shares the same fonts and application libraries with the Commercial edition.
It allows to develop the application software independently of the hardware. It is meant to be used with the Commercial edition.
Ensure the hardware and software configuration meets the requirements listed at the Used environment page.
The library is available as packages with source code and header files.
||Touch monochrome screens, global and fast update modes|
||DejaVu fonts on internal Flash memory|
||Terminal fonts on internal Flash memory|
||GUI with touch and haptic feed-back|
||Bar- and QR-code|
||BMP and header file on SD-card|
||Header file on serial console|
Launch the IDE.
Ensure the library is included.
- Edit the line and set the correct screen. The board can be ignored.
Screen_EPD_EXT3_Fast myScreen(eScreen_EPD_EXT3_271_09_Touch, boardNone);
Launch the build process.
Launch the executable.
The screen should display | s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100427.59/warc/CC-MAIN-20231202140407-20231202170407-00746.warc.gz | CC-MAIN-2023-50 | 1,035 | 18 |
https://community.spotify.com/t5/iOS-iPhone-iPad/Sync-only-certain-songs-in-playlist/m-p/1326182/highlight/true | code | Just wondering if it possible to partly sync a playlist on IOS ? So when you swipe Available offline in a playlist this will sync all songs in that playlist but i do not want this ? So when you unswipe it spotify deletes the whole playlist ... so if theres a playlist with 300 songs i only want the first 50 is this possible?
What I would do is just create a new playlist and throw the specific songs you want to be saved offline in your main playlist to be saved offline. My Starred playlist normally serves this function of housing all the songs I want to be saved offline, so when they appear in other playlists in the future, only those songs appear offline. | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572515.15/warc/CC-MAIN-20220816181215-20220816211215-00772.warc.gz | CC-MAIN-2022-33 | 662 | 2 |
https://chrome.google.com/webstore/detail/heavybit-extension-for-en/ahfgdgmheoejjllbgnkegimdiajihbee | code | * This is a third-party product! NOT a Heavybit's official.
Podcast programs published on the Heavybit website (https://www.heavybit.com/library/podcasts/) have rich contents and nice features (e.g. instantly jump to any point on the transcript by one click, etc.). It is very good as an English learning material for engineers. However, since I found some improvement points from a personal point of view, I tried to compensate them with this Chrome extension.
1. Change playback speed options (1x, 1.5x, 2x → 0.7x, 0.8x, 1x)
2. Coloring for each speakers
3. Key shortcuts
[space] : Play and pause
[left arrow] : 7 seconds rewind
[right arrow] : 7 seconds fast
s : Skip intro (Set current time to 00:50)
# Change log
# More information | s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100555.27/warc/CC-MAIN-20231205172745-20231205202745-00284.warc.gz | CC-MAIN-2023-50 | 738 | 11 |
https://www.amazon.co.uk/Max-Value-USB-2-0-Port/dp/B003AQCZ5Y | code | Max Value USB 2.0 13 Port Hub
We don't know when or if this item will be back in stock.
Customers who viewed this item also viewed
The Max Value 13 port hub is a wonderful product for any person who requires a huge number of additional USB ports. While only using one port on the host PC or laptop this hub provides an additional 13 ports. It can be used with USB powered devices like a USB mouse or USB flash drives.
Top customer reviews
The Max Value USB hub consists of a very nicely made glossy black square enclosure, 3 sides have 4 powered USB ports each, the 4th side has sockets for the power lead and master USB connection back to the computer. On the top is a flip-up connection - handy for memory sticks - that folds back flush with the unit when not needed. It's built to a high standard, seems very robust, and everything about it says quality.
Initially I was a little wary as there is an identical looking version also on Amazon for £8 more, and I wondered if this was a poor performing cousin. Far from it. I can't see any difference between them other than the name, and this performs flawlessly in every way.
I bought this to replace a lacklustre 7-port hub from a big name, that failed to provide enough power for the various devices to work reliably. I wasn't sure that I needed all these extra ports, and I was even less confident that it would have enough power to support them all. I couldn't have been more wrong. I now have 10 USB devices plugged in permanently, so there's no need for plugging and unplugging cables. The devices include 2 USB-powered removable hard-drives, 2 printers, and various other peripherals and gadgets that power themselves from it, and they all work flawlessly. I've had this for 2 months now and I haven't had a single problem with it in that time. It looks good, it works well, it runs cool yet has plenty of power to support a full array of demanding devices - couldn't be better. Thoroughly deserves 5 stars and I recommend it very highly.
This beautifully designed hub would grace your desk-top. Or at least it would until you plug all the cables into it!!!! However, it's smaller than my old 7-port hub, so fits very unobtrusively on top of the CPU which has its' own discreet open-fronted location in my desk, out of sight, out of mind.
Certainly not the cheapest option offered by Amazon but I'm a firm believer in the "You get what you pay for" idea. Even if you're not going to use more than half the ports, it really is "Max Value" as its name implies and it arrived next day with Amazon Prime. Clearly, when the old Belkin died, I needed something urgently. Go on, spoil yourself.
This was so good, bought a second
Pleasantly surprised, as this is not a branded unit
About 2 weeks ago (8 weeks old) various devices would disconnect and re-connect unexpectedly, which isn't that annoying in itself but when the devices come back they load software on my machine and open windows, which then require to be closed. I have looked up the Amazon help pages and apparently after 30 days I cannot contact them for a replacement or refund. I guess I should have read the small print, but since this is a no-name brand and I can't contact them directly and Amazon sold the item to me through their website I would have hoped they would be able to help.
Anyway, don't buy this product and don't use Amazon, go down to PCWorld or your local retailer and get something with a proper warranty and people who you can speak to who can take an item back and exchange it for a new one if faulty.
I've learned my lesson. | s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500549426086.44/warc/CC-MAIN-20170726082204-20170726102204-00481.warc.gz | CC-MAIN-2017-30 | 3,567 | 15 |
http://stackoverflow.com/questions/5875735/selenium-rc-single-window-how-to-maximize-client-frame | code | I am testing an application to test that must run in Selenium's single window mode. Multi window mode is not an option.
The problem is Selenium's frame takes a big chunk of the browser window.
How can I have the application frame expand to fill the browser window (and/or shrink the selenium part)?
Test code is in python. | s3://commoncrawl/crawl-data/CC-MAIN-2016-22/segments/1464049275764.90/warc/CC-MAIN-20160524002115-00108-ip-10-185-217-139.ec2.internal.warc.gz | CC-MAIN-2016-22 | 322 | 4 |
http://windows.bigresource.com/Win8-Accidentally-changed-Windows-8-language--NPKJS1x1.html | code | I'm using Windows 8.1, and I have accidentally deleted the SkyDrive App Tile and am trying to find a way to restore it.
What happened was that I deleted the SkyDrive shortcut in the start menu, only to realise that doing this also deleted the SkyDrive App Tile in Metro View.
Is there a way to restore the SkyDrive App Tile? I have tried searching for SkyDrive under Apps but it isn't there, presumably because it is integrated into Windows 8.1. I also found the SkyDrive menu that the SkyDrive App Tile is a shortcut to under PC Settings, but it doesn't look like it's possible to make a shortcut to it directly from Metro View.
I have a new Dell XPS with Windows 8. I was just starting to use it when I tried to explore bringing up a second monitor. For some reason the system doesn't recognize the second monitor. I then accidentally selected "second monitor only".
now I am without any monitor. When the system boots it recognizes the primary monitor (DVI) but then goes off to look for the second monitor. My system has AMD DVi video card as the primary video. The other video port is VGA, but I cannot get any monitor I have to work from it.
Is there a way to reset the video selection without having to use the mouse to navigate to the Devices selection?
So I could not get my graphics card to register while disabling my integrated Radeon Graphics card to move to my other card so I found a article saying that "You need to disable integrated graphics in your BIOS" So I did that...... and now my screen is completely black and i get no video input.
I accidentally uninstalled IDT audio on my HP ENVY dv6. I searched the internet for the driver and the closest I found was HP ENVY dv6-7300 Quad Edition Notebook PC series*-* IDT High-Definition (HD) Audio Driver - HP Business Support Center But it did not work for me.
I bought a Toshiba laptop that came with pre-installed Windows 8. I went into the "Bios" and switched from UEFI to CSM, Now my laptop just doesn't work. I am on a public computer posting this because mine will just not boot at all. It won't even show the boot logo, and I cannot get back into the Bios to switch it back to UEFI. I am not sure what information I could add on to here to be more clear other than I screwed up bad. The laptop didn't come with a disk, and I tried to hold 0 while powering up the laptop hoping that it would reset to factory settings, but no luck there either.
I have Windows 8 Pro (64bit) and I have 1,904 fonts installed... It was working fine until one day some of the Windows fonts have been changed to different ones. Is there any way to reset the fonts installed? Since this is getting very annoying
Here is a screenshot taken from Office 2013 Professional Plus
I have had windows update set to check for updates and notify me so I can choose when, or in some cases if, to install them. This evening, I checked and the option had been changed to automatically install all updates.
Win 8.1 has added a piece in brackets to files on my new PC. Now none of my slide shows work because each jpg has this bracketed info in the file name. I have tried overwriting the files with originals from a backup but these too are changed. Can I stop this happening? Is there a bit of code to delete the bracketed part of the many thousands of files affected?
I have loads of Nero nvc files that I can no longer open because of this name change.
I have an HP laptop that came with Windows 8 installed. One of the automatic updates ran and changed pathways to my files. If I click on Libraries, my documents, music, and pics that were there before the upgrade are not there now. I have to click c:/users/myusername/ then whichever folder I'm looking for. Is there a way to get that back so all my files go to one set of library folders instead of having a new set?
The update almost crashed the whole laptop. Also corrupted my save points and had to do a new restore point once the system was finally brought back up. I'm tracking down how to fix my app store tile now. The update also deleted all my tiles I had on my start screen.
The only thing that has changed is that I upgraded my OS recently.
I have an 2.4 GHz Wireless Laser Mobile Mouse. Originally after the upgrade, the left button caused right clicks and vice versa. I found a workaround by changing the Windows 8 settings to "Right Primary Button" while in the control panel, the device is configured for the left hand. If I select "Left..." and right respectively, I get the reverse. The scroll wheel also does nothing when clicked. Sometimes when I read articles I click it so I can move my mouse up and down to scroll the page without pushing any keys.
I have tried uninstalling and reinstalling the mouse driver and HID driver with no luck.
Just installed 8.1 and the "This PC" section of the navigation pane in file explorer has changed. In addition to listing the disk drives, it now lists six folders. how to remove the folders from the drive list?
I have a custom built system running Windows 8. I recently changed the Sata port config, changing one of my drives to another port that was supposed to be for a case esata port. After this, my hard drives would not work together and the computer would randomly crash when I try to access My Computer or anything that makes the hard drives run. It's really hard to use as my programs/files are spread across these three drives.
There is setting in windows 8 "Use desktop language bar when it's available" it makes language bar like it was in windows 7. But it doesn't seem to work correctly it doesn't appear when windows starts it only appears if you change language with keyboard short cut (for example shift+alt or shift+ctrl you can change that in settings).
I have set 3 input languages so it should be there and I need to use it.. windows default language preference select menu works but language bar doesn't.
The name of the apps in the metro are in different language than English so how can I change the language? and also when I click right click on the desktop I see the options in English in addition to another language so how can I change it to be all in English?
my default language setting (keyboard layout) is Swedish.For some reason Windows 8.1 changes this setting to English.
I have tried to install and then uninstall the English keyboard layout (so that Swedish is the only one available) but Windows doesn't care if the layout is actually installed or not. Here is a screenshot:
Windows changes this setting on a whim, it seems to happen the most when starting up the computer. I had this problem with Windows 8 as well.
my Keyboard language input keeps changing from English (UK) to English (US)... pretty much all of my passwords have an @ sign in them so you can imaging how annoying this is lol.
This seems heavily related to my mouse - SteelSeries - World of Warcraft : Cataclysm? MMO Gaming Mouse / the control panel for that mouse as it only started happening after installing this mouse (both home and work pc).
I have tried to add English (US) >> Set it as Primary >> Then remove English (US).
Doing this removes the English (US) keyboard completely which is what I want/expect but then it comes back again after a short while?
Is it possible to change the English (US) keys to match that of the English (UK) so even if it does change to English (US) it wouldn't be a problem anyway?
I have just started using Windows 8 and like it very much. I do have one very small problem.I have dual language, English and Hebrew. When the program initiates the language selection comes up in Hebrew. I would prefer it to initialize in English. I haven't been able to determine if this can be changed. Is there a way to accomplish this?
I've recently upgraded to windows 8.1 and I noticed it has reverted all my language changes back to Chinese (Hong Kong). After redownloading and setting all the primary languages back to English in the control Panel I've realized that everything (even the login screen) is in English EXCEPT for some options in metro, how would you fully change this?
I previously got windows 8, I accidentally installed the German version, it took me about a hour to figure out how to change the language. Once I changed it, mostly everything's in English, but some things like the lock screen is still in German! this is getting pretty annoying.
I'm playing a browser-based game where we use signature-photos, and some people including me like to go a little nuts here and make photos with transparent backgrounds, the only issue is that transparent backgrounds have a lot larger files than if you just change the background-color of the photo to whatever the background of the website is, which in this case is #111111. Anyway, this worked perfectly on Windows 7, but since I switched to Windows 8.1, the background colors of the photos has changed, either that or the colors themself has changed. When I printscreen the background of the website, it's still #111111 while as the color of the photos are #080808, can this be related?
I have talked to a lot of players on this game who runs Windows 8 who doesn't have this issue.
Here's a printscreen of what I'm referring to: Screenshot by Lightshot
i've been using windows 8.1 for a little time in my new Sony notebook. First, i used windows 8 and had no problems, my keyboard layout was the correct one (Spanish - Latin America, 'cause i'm from Argentina). But after an upgrade to windows 8.1, the default layout was set to Traditional Spanish wich does not suit the layout I see on my keyboard, signs are misplaced. I went to the control panel and under the idioms settings i set Latin American layout to my keyboard, but even with the correct configuration (checked with the layout image that is shown in the configuration menu), signs like ` and @ are still misplaced. What can I do?
I am constantly infuriated by the switching between keyboard with Windows Key + Spacebar. I have tried everything I can think of to disable it, including googling and searching these forums... to no avail.
I need to have both languages on my computer, but I constantly accidentally hit the shortcut and switch languages inadvertently. | s3://commoncrawl/crawl-data/CC-MAIN-2018-26/segments/1529267863100.8/warc/CC-MAIN-20180619154023-20180619174023-00466.warc.gz | CC-MAIN-2018-26 | 10,180 | 41 |
http://www.reference.com/browse/Collocation | code | Collocation comprises the restrictions on how words can be used together, for example which prepositions are used with particular verbs, or which verbs and nouns are used together. Collocations are examples of lexical units. Collocations should not be confused with idioms.
Collocations can be in a syntactic relation (such as verb-object: 'make' and 'decision'), lexical relation (such as antonymy), or they can be in no linguistically defined relation. Knowledge of collocations is vital for the competent use of a language: a grammatically correct sentence will stand out as 'awkward' if collocational preferences are violated. This makes collocation an interesting area for language teaching.
The processing of collocations involves a number of parameters, the most important of which is the measure of association, which evaluates whether the co-occurrence is purely by chance or statistically significant. Due to the non-random nature of language, most collocations are classed as significant, and the association scores are simply used to rank the results. Commonly used measures of association include mutual information, t scores, and log-likelihood.
Rather than select a single definition, Gledhill proposes that collocation involves at least three different perspectives: (i) cooccurrence, a statistical view, which sees collocation as the recurrent appearance in a text of a node and its collocates, (ii) construction, which sees collocation either as a correlation between a lexeme and a lexical-grammatical pattern, or as a relation between a base and its collocative partners and (iii) expression, a pragmatic view of collocation as a conventional unit of expression, regardless of form. It should be pointed out here that these different perspectives contrast with the usual way of presenting collocation in phraseological studies. Traditionally speaking, collocation is explained in terms of all three perspectives at once, in a continuum:
Collocates of 'bank' are: central, river, account, manager, merchant, money, deposits, lending, society. These examples reflect a number of common expressions, 'central bank', 'bank or building society', and so forth. It is easy to see how the meaning of 'bank' is partly expressed through the choice of collocates.
High collocates with probability, but not with chance: a high probability but a good chance
Herd collocates with cows, but not with sheep: a herd of cows but a flock of sheep | s3://commoncrawl/crawl-data/CC-MAIN-2015-22/segments/1432207930866.66/warc/CC-MAIN-20150521113210-00081-ip-10-180-206-219.ec2.internal.warc.gz | CC-MAIN-2015-22 | 2,447 | 7 |
http://chucker.me/2011/systemsettings/ | code | July 23, 2011
One Ben Cooksley, KDE System Settings Maintainer is not amused that GNOME now has an application called System Settings as well, and has launched a “formal complaint”:
As you may or may not be aware, the name “System Settings” for an application is currently in use by KDE. A recent renaming by your GNOME control center developers to this name creates a naming conflict.
As KDE occupied this name first, it is ours as a result [..]
Someone explain to me how this is any better than Apple holding a trademark on “app store”.
Someone from Ubuntu then goes into more detail about these alleged “severe problems for users”; “numerous problems for users on both sides”:
To be more specific about the problem, installing kde-workspace to a GNOME installation results in 2 indistinguishable apps named System Settings and 2 named System Monitor. On Ubuntu at least, if I want the GNOME version, I have to remember to click the first System Monitor but the second System Setting which is awfully frustrating.
You’re installing two desktop managers side-by-side, and your biggest problem is that two applications (with the same purpose1) bear the same name?
This thread also delivers on the predictable, usual debate over just what constitutes an operating system:
So far we are running the same OS (for most of us it is Linux, but it can be Solaris or *BSD). DE != OS.
Yes, I’m sure drawing that distinction (whatever it may be: Linux, contrary to this quote, is a kernel, not an OS) makes users feel right at home.
Luckily, some sanity from GNOME’s side on the matter:
I very much doubt users will be any less confused when confronted with “System Settings” and “System Preferences”. We should work on shared groundwork so that our settings are interoperable. If a user has to set his language in two different applications just because he happens to use applications written in two different toolkits, we have failed miserably.
You just can’t expect to own generic names across desktops.
Granted: GNOME’s “System Settings” and KDE’s are each likely to focus on their own respective perspective, but from a user’s point of view, these differences are entirely technical, and should neither exist nor matter.↖ | s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250591234.15/warc/CC-MAIN-20200117205732-20200117233732-00121.warc.gz | CC-MAIN-2020-05 | 2,264 | 15 |
https://www.gamingonlinux.com/2023/04/ubuntu-2304-is-out-now-with-gnome-44-and-a-stable-steam-snap/page=1/ | code | Canonical has today released Ubuntu 23.04, their latest short-term new-feature release (it's not an LTS) that will be supported until January 2024.
One of the big user-facing additions is the new installer that they say offers a "streamlined and more intuitive user experience". While it offers up a refreshed look the code behind the scenes is the biggest change - since it now shares the code-base with Ubuntu Server so they can give a more consistent experience.
This release also has GNOME 44, so you get all the latest enhancements there but Canonical also updated Ubuntu font, and they mentioned some big Snap update behaviour changes too. Instead of notifying you an update for a Snap was available and then making you go somewhere to update it, you will now get a background download and then it will be applied when the app is closed. You can also now pause Snap updates for as long as you want.
There's plenty more like their Snap of Steam being promoted to stable. Canonical said over 150,000 people downloaded the preview version, so there was plenty of interest in it. This Snap bundles a bunch of dependencies needed allowing you to run new and old titles without messing with PPAs.
On top of that Ubuntu Cinnamon and a resurrected Edubuntu join as official flavours.
Canonical also did a video about their new installer:
See the release announcement for more.
You can download it here. | s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510516.56/warc/CC-MAIN-20230929122500-20230929152500-00056.warc.gz | CC-MAIN-2023-40 | 1,400 | 8 |
https://www.factionc2.com/developing/transports | code | Transports allow you to change how Faction and its agents communicate with each other. They consist of two parts, a transport server which sits between Faction and the agent, and a transport module which is used by the agent to communicate with the server.
The flow looks something like this:
Faction agent checks in, it passes a base64 encoded string to its transport module.
The module transforms this string into a message thats compatble with the transport.
The module then sends this message to the transport
The transport extracts the original base64 encoded string from this message
The transport sends that base64 encoded string to the Faction Checkin API
The API responds with a base64 encoded string meant for the agent
The transport transforms this message into its defined format
The transport then sends this transformed message to the agent
The agent's transport module extracts the original base64 encoded string from the message and returns it to the agent
A Transport Server sits between the Faction API and an agent. When a user creates a new Transport Server in Faction, they provide a name and in return get: a TransportId, API Key Name, and API Secret. Your transport server will use this information to interact with the Faction API. It is up to you to implement how you get this information from the user, but its probably easiest to tell them to save it to some sort of config file that you'll read.
Transport servers interact with three APIs:
Transport: This endpoint is used to register the transport server with Faction. Full details on this endpoint can be found here but the gist is that when you register your transport with Faction, you'll provide:
TransportType: What is name of your transport? "HTTPTransport", "Jane's leet ICMP transport", whatever.
GUID: Your transport server will need a unique GUID. This is static, meaning that every instance of your transport server uses the same GUID. This GUID is used to associate your transport type with a transport module in the agent.
Configuration: This is the configuration that will be used by the agent to communicate with your transport. You'll include things like URLs to connect to, as well as any other configuration options here. When the Transport Module for your Transport Server is created, this information will be passed to the build process for the Transport Module. Its recommended you specify this information in a JSON format since thats what everything else in Faction uses, but we're not the boss of you.
Agent Staging: This is the endpoint that you will use for agent staging. When an agent stages, it will provide your transport server with its name and a base64 encoded message, a staging name, and a staging ID. You can find more details about this endpoint here.
Agent Checkin: This is the endpoint that you will use for agent messaging. When an agent checks in, it will provide your transport server with its name and a base64 encoded message and its name. You can find more details about this endpoint here.
More details on the Faction API can be found here
Faction Agents call a generic
stage method to communicate with Faction. Transport Modules are what provide the actual functionality for these methods. Agents don't care how these methods work, as long as the behave as expected.
When an agent calls either beacon or stage, it provides its agent name and a base64 encoded message. When calling these methods, the agent expects a string to be returned which would either be the message from the API or just an empty/blank string if there is no message from the API.
Modules are language specific and currently Faction only provides the language standard for .NET modules. Details on .NET Transport modules can be found here | s3://commoncrawl/crawl-data/CC-MAIN-2021-21/segments/1620243991659.54/warc/CC-MAIN-20210516013713-20210516043713-00572.warc.gz | CC-MAIN-2021-21 | 3,735 | 24 |
https://graphicdesign.stackexchange.com/questions/164824/saving-svg-as-pdf-causes-disappearance-of-centralized-graphics | code | There's something wrong with the large graphic. It's a
<use> element, so either a clone or a symbol, and it seems to have a filter applied. I can't be 100% sure, though. For some unknown reason I can't unlink the clone or convert it to paths or remove the filter. Perhaps it wasn't made in Inkscape, some other software?
Anyway, a possible fix is simply to delete it and replace it. Make a copy of the actual graphic (the solid blue one at the top), group it, scale it, place it at the centre, and reduce the object opacity in the Fill and Stroke dialog. I tried this and can confirm it solves the problem. I checked PDF in Adobe Acrobat and it seems to work
Edit After a little further investigation, PDFs created in Inkscape do in fact support
<use> elements in the form of linked clones or symbols, and objects with SVG effects are normally rasterized when outputing to PDF. So these shouldn't normally pose a problem. However, the file doesn't appear to have been created in Inkscape originally, and somehow the functionality appears to be messed up. Usually it would be possible to unlink a clone, but for some reason Inkscape doesn't want to do it. So ultimately, the issue seems to be caused by a combination of things: the use of an SVG effect on a messed up linked element created in some other software. There are too many unknowns to be 100% sure however.
Just a word of advice for the future. If you have artwork that has been created in other software (not Inkscape), it may be better to use a PDF created directly using that software rather than export as SVG to use in Inkscape and then convert to PDF. This workflow is often fraught with difficulties, mainly because different software has different support for various SVG features. Note also that Inskcape isn't really designed for print jobs. It lacks CMYK and spot colour support, so chances are the PDF you output from Inkscape won't actually work for a print job where separations are needed, at least not without first taking it into software such as Scribus, and editing the colours.
I also note another potential problem with the artwork file you shared here: the objects which bleed off the top and bottom page haven't been set up properly. If it's your intention to have this commercially printed, these should overlap the edge of the sheet by at least 3mm. A commercial print company will then print this on a larger sheet, and trim it to size. If you don't set up a bleed and try to have this printed, it won't work. A printer would probably charge you extra if they have to fix it for you. | s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296816586.79/warc/CC-MAIN-20240413051941-20240413081941-00174.warc.gz | CC-MAIN-2024-18 | 2,569 | 7 |
https://www.gccxml.org/pipermail/gccxml/2008-June/002759.html | code | [GCC-XML] Managing include paths and the support dir
brad.king at kitware.com
Fri Jun 13 13:48:27 EDT 2008
> I am using MSVC9, and that works well. I want to use STLPort instead
> of the default Dinkumware STL and I am willing to manually create a
> support directory to ensure that all works nicely.
Okay, that should be possible.
> My current challenge is that I am not sure I see how to do one of the following:
> * include my own path before GCCXML_FLAGS (i.e. GCCXML_PRE_FLAGS)
> * specify the support dir I want to go in manually.
> For example I'd love to say:
> if (USE_STLP)
> gccxml --supportdir "vc9_stlp"
> gccxml --supportdir "vc9"
> I know you can specify a compiler, but that checks the registry to
> find out where to look. Is there a way to get more control than that?
The GCCXML_FLAGS are computed automatically by default, but you can set
them by hand if you want. Run "gccxml --help" to see how...there are
several choices. The key flag is a "-iwrapper" option I added to GCC's
preprocessor. It specifies an include directory that is checked before
all other include directories. This flag is used to specify the search
path for patched system headers.
More information about the gccxml | s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224644574.15/warc/CC-MAIN-20230529010218-20230529040218-00353.warc.gz | CC-MAIN-2023-23 | 1,206 | 23 |
https://answers.netlify.com/t/waiting-on-dns-propagation-seems-stuck/8285 | code | Everything seems fine but there are two problems:
- The DNS propagation message (“Waiting on DNS propagation”) seems to be stucked for hours. I tried to click “Verify DNS configuration”, sometimes appears the next message:
DNS verification was successful.
If provisioning your certificate takes longer than 24 hours, please contact support"
But another times the message is:
DNS verification failed
- taller-iatext.ivanhercaz.com doesn’t appear to be served by Netlify
We can’t provision a certificate until your DNS configuration is pointing at the Netlify servers and the changes have propagated.
If you’ve already changed your DNS configuration, allow up to 24 hours for the changes to be processed, or check our troubleshooting guide for some tips on what might be happening.
- This is causing issues on my site (stylesheets are not loading due certification error). At this moment I am not very worry about it because the site is being tested and I am not sharing it with my students, but I will need it working as soon as possible because I need to spread it.
I know there are a lot of another posts on this forum about it, but I see that sometimes it is fixed by the intervention of some worker of Netlify, so I decided to post my case.
P.S. I already have another site configured in the same way (buruma.ivanhercaz.com points to buruma.netlify.com with a CNAME) and the SSL works fine.
P.S. (for second time) The CNAME seems to be propagated correctly as DNS Checker indicates. | s3://commoncrawl/crawl-data/CC-MAIN-2021-17/segments/1618038492417.61/warc/CC-MAIN-20210418133614-20210418163614-00030.warc.gz | CC-MAIN-2021-17 | 1,499 | 13 |
https://discussions.eramba.org/t/question-saml-configuration-for-azure-ad/1824 | code | If you are new to SAML but want to have single sign on working between Eramba and Azure AD, hopefully the below instructions will help you. There is an assumption that you have already installed and initialised Eramba.
Log in to Azure AD (AAD) with a user that has the ability to create Enterprise Apps (This will typically be one of: Global Administrator, Cloud Application Administrator, Application Administrator, or owner of the service principal).
Create a new Security Group in Azure AD (e.g. GRP-Eramba-Users) so you can limit which AAD users can actually authenticate or log in to Eramba. Note, authorisation is still defined in Eramba not AAD so only one group of users is needed. (You may be able to create a dynamic group to minimise administration of adding/removing users in the future - e.g. using tags or other AAD user attribute)
2.1 If you created a static group (most likely), then Add users from AAD who you want to be able to access Eramba. (If you created a dynamic group, check the “members” of the group to verify if the right users have been dynamically added).
- In AAD, go to Enterprise Applications in the menu and create a new application. It will ask you to name the app and choose “what you are going to do with your app” - for this option, select “Integrate any other application you don’t find in the gallery (Non-gallery)”
3.1 Once the App has been created, within the new App, go to “Users and Groups” in the menu, then Add/Assign the new group you created in Step 2.
3.2 Next go in to “Single sign-on” in the menu, then select the SAML button.
3.3 You will be presented with several numbered Sections. Take the following actions:
3.3.1 In Section 1 (Basic SAML Configuration), click Edit, then add/modify as follows (replacing with values relevant to your environment): **Identifier (Entity ID):** https://<FQDN of your instance of eramba>/samlConnectors/getMetadata **Reply URL (Assertion Consumer Service URL):** https://<FQDN of your instance of eramba>/login **Relay State:** https://<FQDN of your instance of eramba>/dashboard-new **Logout Url:** https://<FQDN of your instance of eramba>/users/logout 3.3.2 In Section 2 (User Attributes & Claims), click Edit, then follow below: **Under "Additional Claims"**, locate the claim that has a value of user.mail, and copy the corresponding claim name (e.g. http://schemas.xmlsoap.org/ws/2005/05/identity/claims/emailaddress) and paste to a separate doc/file/note for now. 3.3.3 In Section 3 (SAML Signing Certificate): Copy the value contained in the "App Federation Metadata URL" field to a doc/file/note. Should look something like this: https://login.microsoftonline.com/<random-string>/federationmetadata/2007-06/federationmetadata.xml?appid=<random-string> Click the Download link next to Certificate (Base64) and remember where you saved it. 3.3.4 In Section 4 (Set up <name of your Enterprise App>): Copy the value contained in the Login URL field to a doc/file/note.
- Now login to Eramba with your admin account and go to System > Settings > SAML Connectors. Then under Actions click Add.
4.1 Add the following configuration:
**Name:** Choose a name that describes the connector, e.g. Azure AD SSO **Identity Provider:** Paste in the value for App Federation Metadata URL you captured in 3.3.3 **IDP x509 Certificate:** Using a Text Editor, open the certificate you downloaded in 3.3.3 and copy its contents and paste in this field. **Remote sign in URL:** Paste in the Login URL from 3.3.4 **Email field:** Paste in the Claim name you copied in step 3.3.2 Leave everything else as default and click Save.
In Eramba, go to System > Settings > Authentication. Under SAML Authentication there is a drop down field, choose the newly created SAML Connector (e.g. Azure AD SSO)
Now you can create users that will use Azure AD to authenticate. In Eramba, go to System > Settings > Users, then click Add under the Actions menu. The key values of note when adding a new user are:
Email: use the email address configured in Azure AD for the user you are adding - must match exactly
Login Name: again use the exact email address that is configured in Azure AD for the user you are adding as this is what Eramba will try and match against.
Local Account: make sure this switch is disabled
Portal: choose Main as I don’t believe the other portals are SSO enabled.
Groups: add the user to whichever groups you see fit (as mentioned in Step 2, this is what decides a user can do in Eramba after they have Logged in)
- Test the login!
If it doesn’t work, then it is highly likely one of the steps has not been followed above or there is a typo or mismatch in configuration. Go through each step, line by line and verify your configuration. The SAML and SSO configuration works just fine in Azure AD and Eramba e2.20.6.
Many thanks to Sam @ eramba who helped guide me in the right direction in order to debug my problems with setting this up. | s3://commoncrawl/crawl-data/CC-MAIN-2021-31/segments/1627046151531.67/warc/CC-MAIN-20210724223025-20210725013025-00618.warc.gz | CC-MAIN-2021-31 | 4,947 | 22 |
https://unit040.atlassian.net/wiki/spaces/PUD/pages/280954380/Kinematics+Controller | code | The Kinematics Controller is responsible for managing and updating all Kinematic Joints in the correct order (taking both priority and kinematic relationships into account). To work properly, the Kinematics Controller needs to be placed in the hierarchy above any joints it should control. After creation the Controller will automatically takeover management of the contained joints.
Generally it is wise to use just one Kinematics Controller in your scene for all the joints, however using multiple Controllers is possible, but may lead to undesirable behavior.
Hierarchy view with Kinematics Controller and two Wheel Joints. Note that the wheel joints are children of the Kinematics Controller
Where to find
The Kinematics Controller can be found under Mechanics > Add Kinematics > Kinematics Controller
If no Game Object in the scene hierarchy was selected when this menu option is chosen it will create a new Game Object; alternatively it will add the Kinematics Controller component to the selected Game Object
The image below shows the complete feature layout of the Kinematics Controller component.
The Kinematics Controller script
Execute in Editor Mode
On by default. When this toggle is enabled, true Kinematic behaviour (Limits and Relationships) will also be enacted outside play mode in the Unity Editor.
The Kinematics Controller runs on the Unity Fixed Update within play mode, and on a custom update cycle outside play mode
Note that Individual Kinematic components have a matching override ‘Enforce Outside Playmode’ that should also be enabled in order for it to work outside play mode
When in Play mode Kinematics are always applied
Contained Kinematic Relations
List with the kinematic relations found as children and controlled by the kinematics controller. The content of this list is automatically controlled in and outside play mode, please do not change the values manually
Note that this list is automatically updated, and need not be managed manually - it is shown in the inspector for review purposes only
Sorted Kinematic Relations
The controlled kinematic relations sorted by their respective solver passes (i.e. in what pass within a simulation frame is a Kinematic Joint solved, and when does it receive )
Note that this list is automatically updated, and need not be manually managed - it is shown in the inspector for review purposes only
Check For New Relations Outside Playmode Interval
The time interval to check for new or removed kinematic relations outside play mode in seconds | s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446709929.63/warc/CC-MAIN-20221126212945-20221127002945-00497.warc.gz | CC-MAIN-2022-49 | 2,521 | 21 |
http://technology.amis.nl/tag/lead/ | code | Posts tagged lead
Oracle SQL – Finding free adjacent seats in an airplane, using Subquery Factoring, Analytical Functions (LISTAGG and LEAD), Outer Join, PIVOT and good old INSTR1
Using Oracle SQL to resolve meaningful and slightly less serious challenges is one of my favorite (semi-)professional pastimes. In the last two weeks, I have been presenting on various topics including Oracle SQL to audiences in six cities all across India as part of the OTN Yathra 2013. These presentations and the interaction with the attendees on the various capabilities of SQL have inspired me in several ways. One of the outcomes is this article – also inspired by the fairly long journey home and the many flights within India. In this article I will use several powerful options in Oracle SQL to resolve some simple to ask questions. The SQL functions I am using include:
- Insert with Multiple Subqueries
- Insert generating some random data
- LISTAGG for aggregating strings
- LEAD to produce the result for one row using information from the next
- PIVOT to present the data in a matrix format
The statements are straightforward (relatively), the data model is simple. You will like it.
Oracle SQL – spotting combinations that occur and those that do not – demonstrating Analytical Functions, Outer Join and SubQuery Factoring0
The challenge in this article is a simple one. I have a table with records (duh!) and each record describes the occurrence of a certain payload. In this example the payload will be a color. Every record also has a sequence number to indicate well, when it appeared relative to the other observations. A subset of the data would look like this:
The challenges I will discuss in this article are simple:
- which sequences of three color observations occur in the data set
- how often do these sequences of three occur (give me the top 3 sequences)
- given the colors that have been observed, which combinations of three can be created
- which possible combinations (or color sequences of three colors) have not been observed at all
Using Oracle SQL features such as Analytical Functions, Outer Join and Subquery Factoring – these questions become very easy to answer.
Advanced SQL to find valid periods – juggling with outer joins, running totals and analytical functions2
After teaching the Advanced SQL Masterclass recently, one of the attendees confronted me with an interesting challenge for me to solve with all the tools I had been discussing all day. This challenge originates in the world of insurance and revolves around policies. Apparently (I am not much of an insurance expert) policies can have periods of inclusions (when they are valid) as well as periods of exclusion (when the policy is definitely not valid, even when there are inclusions that suggest the opposite. The exclusions win, so to say.
Visually, I can describe the situation for one specific policy like this:
Here we see a policy with five inclusions (in green), that partly overlap, as well as four exclusions (in red). The challenge is that we need to find out from a table that contains all periods of inclusion (green) and exclusion (red) what the resulting periods of validity are for the policy. Visually that would be deriving the blue bars in the following figure:
This article describes how this challenge can be approached in SQL.
Some IT organizations that I visit have a sign somewhere indicating the number of days that have passed without a major issue. Production sites with proper respect for health and safety to something similar with signs like this one:
In this article, I am wondering about two things:
- given a list of all incidents, can I easily derive the longest streak of days without accident
- and the reverse: given a list of events, can I easily find the longest consecutive string of days on which that particular type of event happened (this time not accidents but more positive things like ‘the boss giving a compliment’, ‘an inspection passed’ , ‘a shiny new blog article published’, ‘my neighbour not drinking an alcoholic beverage’ or ‘my son getting up on time’
Using Analytical Functions, it should be fairly easy to find out both things, I suspect – although it turns out that the first is a little more straightforward.
Oracle 11gR2 – alternative for CONNECT_BY_ISLEAF function for Recursive Subquery Factoring (dedicated to Anton)
On our blog, we have been discussing the new hierarchical query functionality in Oracle Database 11g Release 2, using Recursive Suquery Factoring. Instead of using CONNECT BY and its close associates such as START WITH, PRIOR, LEVEL and more exotic comrades like SYS_CONNECT_BY_PATH, CONNECT_BY_ROOT and NOCYCLE this release gave us a new, less proprietary and eventually probably more intuitive and functionally rich approach. We have also written how though we have no straightforward alternatives for LEVEL, SYS_CONNECT_BY_PATH and CONNECT_BY_ROOT – in the new recursive approach they are fantastically easy to emulate.
Until recently I have been quite happy with the new hierarchical querying and telling the world how I felt. Then an esteemed colleague – a far more experienced SQL programmer than I am – came up to me and remined me how the recursive sub query syntax at the present does not have a replacement for the CONNECT_BY_ISLEAF function – the SQL function that tells us whether a node produced in an hierarchical query has any children or is at the bottom of the chain – i.e. a leaf node. For leaf nodes (child-less), the function returns a value of one and for parent nodes the More >
One of the intriguing subjects at last weeks Oracle Open World conference for me was Complex Event Processing. The ability to process streams of real time events, and up to 1000s per second of them, opens up many new avenues of interesting opportunities. Detecting patterns and anomalies, aggregating and comparing – reporting only the noteworthy events or findings, thereby making sense (information) of enormous volumes of data is both great fun and tremendously useful in specific situations. The SQL like CQL language – Continuous Query Language – provides us with a syntax to analyze data streams in various ways – detecting trends and patterns, variations and aberrations. There are several key characteristics in the CEP architecture: handling large volumes of events, applying this special language for event analysis and executing the queries continuously. That last bit means that the query is registered with a stream of events, not executed at a single moment in time against the data as it is at that moment but looking for query results continously as the events keep streaming in. Query results can be reported for as long as the query registration remains active and the events keep More > | s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386164903523/warc/CC-MAIN-20131204134823-00012-ip-10-33-133-15.ec2.internal.warc.gz | CC-MAIN-2013-48 | 6,831 | 31 |
https://ranierm.wordpress.com/2013/07/09/vlog-qa-2-non-asian-girls-who-only-date-asian-men-good-or-bad/ | code | The more I get into this VLOGGING business, the more I start to see it as a viable option to run side-by-side with this main blog. You see, this site is for the long, drawn out thoughts that need time and energy. Broad topics that I feel the need to talk about in detail whereas these VLOGs will come as side dishes aka banchan aka appetizers. Let me know what yall think! LET ME KNOW, DAMNIT! | s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886106996.2/warc/CC-MAIN-20170820223702-20170821003702-00027.warc.gz | CC-MAIN-2017-34 | 393 | 1 |
https://www.moredirt.com/users/KyleJ01 | code | We will use the location to give you relevant local information across MoreDirt.
Joined: 4th February 2019
Keep contributing to earn more badges!
"Small, but good for new riders"
There are no posts on KyleJ01's Message Board. | s3://commoncrawl/crawl-data/CC-MAIN-2019-39/segments/1568514574159.19/warc/CC-MAIN-20190921001810-20190921023810-00180.warc.gz | CC-MAIN-2019-39 | 225 | 5 |
https://forums.strandeddeepgame.com/t/about-the-console-suggestions-category/22 | code | All suggestions and feedback on elements of the game can be posted here.
We greatly appreciate all suggestions and feedback from the community. While we do go through these posts, please note the team will likely not respond to each one directly, but we encourage the community to discuss and explore their ideas and share them with us.
Rather than posting individual suggestions or feedback, we would ask you to please consider searching for similar posts first and consider liking or commenting instead. This can help us to keep all ideas and discussions around a topic from the community in the one place.
Please see the update on the use of this section here: [Console] Update on the Suggestions section | s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296948609.41/warc/CC-MAIN-20230327060940-20230327090940-00569.warc.gz | CC-MAIN-2023-14 | 707 | 4 |
https://eos-community.web.cern.ch/t/how-to-audit-and-repair-storage-with-fsck/649 | code | Following all the tests which triggered this issue: https://eos-community.web.cern.ch/t/fsck-settings-communication-between-managers-and-fsts , I am now looking at our EOS storage for Alice (as a Tier2).
We have 2.65PB of storage, 2.17 used (81%), 84 filesystems.
I will examine all filesystems but for now I am looking at the first one.
An important note is that we are not doing RAIN: a filesystem corresponds to partition in a (big) RAID6 volume and we do not do replication. I suspect this will limit our ability to repair errors.
[root@naneosmgr02(EOSMASTER) ~]#eos fsck report -a | grep 'fsid=27' timestamp=1621995118 fsid=27 tag="m_mem_sz_diff" count=1 timestamp=1621995118 fsid=27 tag="orphans_n" count=1 timestamp=1621995118 fsid=27 tag="rep_diff_n" count=315 timestamp=1621995118 fsid=27 tag="rep_missing_n" count=5702 timestamp=1621995118 fsid=27 tag="unreg_n" count=677
The total number of entries in the local FST DB (LocalDB) for this filesystem is : 797951
I looked at each case and I found:
File looks OK on disk but have a 0 size and no checksum in the NS.
How to force the MGM to resynchronize ? Should’nt it be done automatically ?
The file is in the .eosorphans directory. I suppose that it is enough to simply delete it ? Will the entry disappear from le LocalDB ?
I looked at one file and found that it is actually in another filesystem. It does not exist on disk on the filesystem we are examining but still has an entry in the LocalDB… What to do ?
For the file that I looked, there are 2 replicas instead of one. The files on disk have both the correct checksum. How should this be dealt with ?
This is roughly 0.7% of the files. I looked at the first file and found that it is in another filesystem on the same FST. The problem is that it is still in the LocalDB of the one we are examining (but not on disk).
This is not necessarily the same for all 5702 files and I cannot look at all of them one by one. So what can be done here ? | s3://commoncrawl/crawl-data/CC-MAIN-2021-39/segments/1631780057225.38/warc/CC-MAIN-20210921131252-20210921161252-00523.warc.gz | CC-MAIN-2021-39 | 1,963 | 14 |
https://www.itprotoday.com/management-mobility/cipher-command-line-utility-01-apr-1999 | code | The Cipher command-line utility, which is built into Windows 2000 (Win2K), displays or alters the encryption of directories and files on NTFS partitions. The Cipher utility supports several commands. Type Cipher /? to view the following switches:
/E encrypts and marks the directories you specify so that EFS will encrypt new files you add.
/D decrypts and marks the directories you specify so that EFS won’t encrypt new files you add.
/S performs the operation you specify in a given directory and all its subdirectories.
/I continues performing the operation you specify even after errors occur. (By default, the Cipher utility stops when it encounters an error.)
/F forces the encryption operation on the directories you specify, including already-encrypted directories. (By default, Cipher skips already-encrypted directories.)
/Q reports only the most essential information.
dirname specifies a pattern or directory.
Used without switches, the Cipher utility displays the encryption state of the current directory and any files it contains. You can use multiple directory names and wildcards. You must type spaces between multiple commands. For example, to encrypt the sales information directory, type
Cipher /e "sales information"
To decrypt the directory called new projects, type
Cipher /d new* | s3://commoncrawl/crawl-data/CC-MAIN-2018-34/segments/1534221215404.70/warc/CC-MAIN-20180819224020-20180820004020-00248.warc.gz | CC-MAIN-2018-34 | 1,305 | 12 |
https://ubuntuforums.org/showthread.php?t=2092749 | code | I have Ubuntu-10.04 on sda1 and Mageia2 on sdb5
After mounting Mageia from Ubuntu I want to edit a file that is in the /opt folder
When doing this the file from Ubuntu /opt opens not the one in Mageia
Both files in Ubuntu and Mageia are in the /opt folder
How can I open the one in mageia ?? | s3://commoncrawl/crawl-data/CC-MAIN-2016-40/segments/1474738661915.89/warc/CC-MAIN-20160924173741-00226-ip-10-143-35-109.ec2.internal.warc.gz | CC-MAIN-2016-40 | 291 | 5 |
http://blog.cloudera.com/blog/2010/10/cdh3-beta-3-now-available/ | code | Today, Cloudera is excited to release the third beta release of Cloudera’s Distribution for Hadoop version 3 — CDH3b3. In this post, I’ll cover the major changes since CDH3b2, and give some insight on what’s coming down the pipe in the next couple of months.
Many of you may have read about some of the recent announcements of partnerships between Cloudera and some of the leading data management software companies like Teradata, Netezza, Greenplum (EMC), Quest and Aster Data. We established these partnerships because Hadoop is increasingly serving as an open platform that many different applications and complimentary technologies work with. Our goal is to to make this as easy and as standardized as possible. As part of this beta update, weve added several platform enhancements that make it easier for complimentary technologies to run or work with the Hadoop platform. The Sqoop framework was enhanced with a plugin framework that allows for different swappable adapters that are optimized for integrations with database technologies. Some of these first adapters will be available in beta form as early as this week with many more to come in the next months. In addition Sqoop can now cover a broader range of integration use cases thanks to support for incremental database updates to and from Hadoop.
Weve also been hard at work on providing better integration opportunities for different analytical tools and applications. As of CDH3b3, this now includes an ODBC driver that can be used in conjunction with Hive to enable users to query Hadoop using their favorite BI tool.
As one of the primary contributors and largest production users of Hadoop, Yahoo! publishes the source tree for the version of Hadoop that they run on their production clusters. We are pleased to announce that we have merged Yahoo’s source tree into CDH3b3. This merge brings many improvements developed at Yahoo! into CDH, including improvements for MapReduce scalability on 1000+-node clusters and several new tools for benchmarking and testing Hadoop.
The largest new feature, though, is the introduction of a strong authentication system based on Kerberos. Kerberos is an industry-standard authentication system supported both by completely open source software like MIT Kerberos as well as by common enterprise authentication systems like Microsoft Active Directory. The integration of Kerberos authentication into CDH enables enterprises to use their existing authentication infrastructure to manage user identities, and allows more sensitive data to be stored and analyzed within a cluster.
Some new authorization features have also been added to CDH in this release. For example, if the security features are enabled, MapReduce jobs can specify access control lists (ACLs) that specify which users and groups may view job details or prematurely kill the job. Additionally, the tasks of MapReduce jobs may now run as the UNIX user who submitted them, improving the ability to isolate resources and protect confidentiality of intermediate data and logs. In addition to integrating these new features into the MapReduce and HDFS components, we have also updated the rest of the components of CDH to operate in an authenticated environment. This marks the first time where it has been possible to run a secure Hadoop while continuing the use of other Hadoop components like Hive, Hue and HBase.
The work to integrate these new security features across the distribution is still continuing — we are currently aware of some places in which the current implementation is incomplete and vulnerable to certain exploits, and will fix these issues before we declare CDH3 stable. We are also hard at work on a comprehensive guide that will detail setup instructions and best practices for operating a secured Hadoop cluster. If you have security requirements in your organization, we hope you will find this beta release useful as a preview of what’s to come.
Of course, CDH3b3 also contains several bug fixes and improvements based on our experiences deploying clusters for customers with a wide range of use cases. Please check the release notes for the full list.
We are happy to include Apache Whirr as the newest member of the CDH family. Whirr is a tool for quickly starting and managing clusters running on cloud services like Amazon EC2. Stay tuned for an upcoming post with more information about Whirr.
Improvements in Performance and Stability
CDH3b3 includes updates to all of the other components in the platform. Most of these updates are fixes to eliminate bugs or to improve performance. One notable enhancement is the support for calendar and event based scheduling of Hadoop jobs via the Oozie workflow engine.
Upgrading to CDH3b3
In order to upgrade an existing cluster from CDH2 or CDH3b2 to CDH3b3, you’ll have to perform a few extra manual steps. Please check out our CDH3 upgrade guide for detailed instructions.
What’s up next
While we’re done adding major new features for CDH3, we expect to do at least one more beta release before declaring it stable for critical production use. Here’s a sneak peak of what’s to come:
- New upstream versions of some components, including Hive 0.6.0 and HBase 0.90.
- Further integration of security features, including improved authentication support in Hive, ACLs for Fair Scheduler Pools, SPNEGO support for Oozie, and easier deployment.
- Further bug fixes based on our experiences deploying CDH3b3 in QA and in the field.
As always, the CDH team is excited to hear your feedback. Please join the cdh-user mailing list and let us know what you think! | s3://commoncrawl/crawl-data/CC-MAIN-2018-22/segments/1526794865863.76/warc/CC-MAIN-20180523235059-20180524015059-00028.warc.gz | CC-MAIN-2018-22 | 5,622 | 19 |
https://java.net/nonav/projects/thucydides/forums/user-forum/topics/84459-Reports-not-building-correctly | code | Posted: April 15, 2013 16:42 by johnflan
We are using 0.9.12 to run a series of given, when, then's. This runs fine, however when we view the Thucydides report and try to drill down to the pages that display the status of each given, when, then - links to all these pages are broken.
If we search the report dir, we see that some or all of those pages exist, just that they cannot be navigated to from the the report.
Not sure if its some misconfiguration on our end but any suggestions would be appreciated.
Has anyone seen a case where reports are generated but not linking to each other correctly? | s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218189313.82/warc/CC-MAIN-20170322212949-00489-ip-10-233-31-227.ec2.internal.warc.gz | CC-MAIN-2017-13 | 600 | 5 |
http://www.ign.com/blogs/pixiehixie/2013/01/28/awesome-party-mix/ | code | Hello there peoples! This is probably my first non-YouTube related post in a laaawng while, but shwateveres. Anyway so I'm trawling through the usual songs on there (YT is by far the best music streaming because of this) and I found a freaking sweet mix by Knife Party with some of their songs and remixes and just some others, but anyway have a listen
I would reccomend you actually go on the youtube page since it shows the song names with links to them in the song
Anyway, since I'm all about the advertising like a shameless whore (Turkey sandwich to anyone who gets that) I've decided that I'm just going to link in my channel at the bottom of every blog I do
Thanks for taking a look
www.youtube.com/OfficialPixieHixie - Take a look and tell me what you think! | s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917123048.37/warc/CC-MAIN-20170423031203-00643-ip-10-145-167-34.ec2.internal.warc.gz | CC-MAIN-2017-17 | 766 | 5 |
http://blogs.msdn.com/b/crminthefield/archive/2011/08/01/crm-2011-silently-installing-update-rollups.aspx | code | Many of my customers like to install CRM Outlook client update rollups silently in order to limit end-user interruption. It is possible to silently install Update Rollups. I've listed the necessary steps below:
While it is definitely possible to run the above silent install from a command prompt, most customers will choose to use these parameters when pushing out update rollups through deployment software (ex. System Center Configuration Manager).
This did not work for Rollup 6 or Rollup 8
Appears to not be working for me either. The install appears successful, but when attempting to use the product, we get the following error:
Unable to load DLL 'osafehtm.dll'
Reinstalling Update Rollup 8 manually (using the exact same command line that we used for the programmatic install) right on top of the existing install resolves the issue.
Doesn't seem to work, here are steps I've taken so far while testing silent installation within Windows 7 Enterprise SP1 32-bit before distributing via SCCM;
- Downloaded Update Rollup 2 for Microsoft Dynamics CRM 2013 (KB 2919956) and extracted to C:\CRM\Update Rollup 2
- used psexec -i -s to spawn a command prompt in the "nt authority\system" context (which is used by SCCM)
- used following command to launch the rollup installation;
"Update Rollup 2\CrmUpdateWrapper.exe" /q /norestart /passive /log "c:\temp\CRM2013-Client-KB2919956-ENU-i386.log"
While it shows a progress window and appears to install without any interaction, when completed there is Finish button to click and window remains open until this is clicked.
Any suggestions on how others have (if at all) have been able to deploy this silently?
On another note, when installing CRM 2013 for Outlook client in the "nt authority\system" context silently, setup launches iexplore.exe, however as the "system" user does not have a profile, an ugly IE first time run settings window appears. Very poor...
This is quite frustrating all the same, it should not be this difficult to deploy a Microsoft application, to a Microsoft OS, using Microsoft software deployment technology (Configuration Manager).
@Bart With "/q", the parameter "/passive" is not necessary. | s3://commoncrawl/crawl-data/CC-MAIN-2015-27/segments/1435375098196.31/warc/CC-MAIN-20150627031818-00259-ip-10-179-60-89.ec2.internal.warc.gz | CC-MAIN-2015-27 | 2,171 | 16 |
https://flylib.com/books/en/4.100.1.67/1/ | code | Software for using a scanner with Linux is being driven by an effort called Scanner Access Now Easy (SANE). This effort hopes to standardize how device drivers for equipment such as scanners, digital still cameras, and digital video cameras are created, as well as help simplify the interfaces for applications that use those devices.
SANE is now included with the Fedora distribution. The sane-backend, sane-frontend xsane and xsane-gimp packages are all on the DVD that comes with this book. You can get the latest SANE driver packages from www.sane-project.org.
Someone wanting to use Linux as a publishing platform is generally interested in two issues about scanners: which scanners are supported and which applications are available to use the scanners. In general, more SCSI scanners are supported than parallel scanners.
Because of the ongoing development effort, new scanners are being supported all the time. You can find a current list of supported scanners at www.sane-project.org/sane-supported-devices.html, with USB scanners listed at www.buzzard.me.uk/jonathan/scanners-usb.html. As for applications, these are currently available with Fedora:
xsane — This is an X-based graphical front end for SANE scanners; xsane can work as a GIMP plug-in or as a separate application (from the red hat menu, select Graphics ® Scanning). It supports 8-bit output in JPG, TIFF, PNG, PostScript, and PNM formats. There is experimental 16-bit support for PNM (ASCII), PNG, and raw formats.
scanimage — This is a command-line interface for obtaining scanned images. It supports the same formats as xscanimage. The command acquires the scanned image, and then directs the data to standard output (so you can send it to a file or pipe it to another program).
In addition to these applications, the OpenOffice.org suite supports SANE.
Because of the architecture of SANE scanner drivers, it is possible to separate scanner drivers from scanner applications. This makes it possible to share scanners across a network. | s3://commoncrawl/crawl-data/CC-MAIN-2021-25/segments/1623488517820.68/warc/CC-MAIN-20210622124548-20210622154548-00017.warc.gz | CC-MAIN-2021-25 | 2,017 | 8 |
https://stackoverflow.com/questions/25559469/listing-tags-using-pandoc-and-yaml-header | code | I'm writing in Markdown (with a YAML header) and trying to convert to HTML using pandoc. My YAML header has a "tags" field which is a list, like in the following example:
--- title: Title tags: [one, two] ... Text.
In the final result, I would like to display the tags nicely, in e.g. a comma-delimited list. However, in my pandoc template, the variable
$tags$ only contains the first tag. Doing something like
$for(tags)$$tags$, $endfor$ will generate all the tags, but the trailing comma and space are a problem. How can I display the tags list in the final HTML as
one, two instead of just | s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593655878639.9/warc/CC-MAIN-20200702080623-20200702110623-00085.warc.gz | CC-MAIN-2020-29 | 592 | 6 |
https://dailyremote.com/remote-job/azure-devops-full-stack-developer-remote-913506 | code | My client are currently looking for a full stack developer with solid Azure Devops experience/exposure to join them on a fully remote, 6 month contract.
We are looking for a developer with strong C# and .NET core skills, Azure Devops exposure, as well as Commercial PaaS experience.
- Assist with migration of applications to Azure
- Develop and Support applications in Azure
- Work in a DevOps team - will involve being available on call and supporting out of office hours
- Develop working software to a good standard using recognised software engineering principals whilst adhering to Brit development standards.
- .Net Core
- Continuous integration and automated deployments within Azure Devops
This is an immediate vacancy to interview and start asap, fully remote. | s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323585290.83/warc/CC-MAIN-20211019233130-20211020023130-00103.warc.gz | CC-MAIN-2021-43 | 770 | 9 |
https://jaapwesselius.com/tag/availability/ | code | I am always amazed by the amount of customers running Exchange 2007 or Exchange 2010 and NOT using Autodiscover. Their response is always “we don’t need it” and “we configure the Outlook profile manually”. In Exchange 2007 and Exchange 2010 you can get away with this (you cannot with Exchange 2013 and Autodiscover is mandatory) but when you want to implement a hybrid scenario with Exchange online you really need Autodiscover since Exchange Online uses Autodiscover to find relevant information regarding your on-premises Exchange environment.
Recently a customer with Exchange 2010 wanted to build a hybrid environment with Exchange Online, and one of my first findings was the lack of Autodiscover. So, after configuring their Exchange environment and creating the necessary DNS records Autodiscover was working properly as shown in the following picture: | s3://commoncrawl/crawl-data/CC-MAIN-2020-10/segments/1581875145676.44/warc/CC-MAIN-20200222115524-20200222145524-00063.warc.gz | CC-MAIN-2020-10 | 870 | 2 |
https://grail.cs.washington.edu/projects/timelapse3d/ | code | 1University of Washington 2Google Inc.
Given an Internet photo collection of a landmark, we compute a 3D time-lapse video sequence where a virtual camera moves continuously in time and space. While previous work assumed a static camera, the addition of camera motion during the time-lapse creates a very compelling impression of parallax. Achieving this goal, however, requires addressing multiple technical challenges, including solving for time-varying depth maps, regularizing 3D point color profiles over time, and reconstructing high quality, hole-free images at every frame from the projected profiles. Our results show photorealistic time-lapses of skylines and natural scenes over many years, with dramatic parallax effects.
See our previous paper Time-lapse Mining from Internet Photos that appeared at SIGGRAPH'15.
We thank the following Flickr users for contributing their photos under the Creative Commons license: Eric Astrauskas, Francisco Antunes, Florian Plag, Dan Dickinson, Butterbean and Alex Proimos.
The research was supported in part by the National Science Foundation (IIS-1250793), the Animation Research Labs, and Google. | s3://commoncrawl/crawl-data/CC-MAIN-2021-49/segments/1637964358702.43/warc/CC-MAIN-20211129074202-20211129104202-00053.warc.gz | CC-MAIN-2021-49 | 1,146 | 5 |
https://demo.seek4science.org/tags/35 | code | Lead Software Engineer and Architect on the FAIRDOM team based in Manchester.
Developing SEEK and RightField.
I am a Research Fellow at the University of Manchester, working in Bioinformatics and Computer Science. I am also a guest researcher at the Vrije Universiteit.My research interests include scientific workflows, semantic discovery, and applying ontology technologies to biological data
Authors: Katy Wolstencroft, Hull Duncan,Stevens Robert,Lastname Firstname,Pocock Mathew R,Li Peter,Oinn Tom
Date Published: 18th Jul 2006
Journal: Nucleic Acids Res.
PubMed ID: 16845108
Scales: Not specified | s3://commoncrawl/crawl-data/CC-MAIN-2019-09/segments/1550247506094.64/warc/CC-MAIN-20190221172909-20190221194909-00514.warc.gz | CC-MAIN-2019-09 | 602 | 8 |
https://security.stackexchange.com/questions/233465/strongest-file-encryption-available/233466 | code | The strongest possible way to encrypt data is to start with a threat model. What sort of adversary are you trying to protect your data from? What are they willing to do to get it? All reasonable approaches to cryptography start with one. If you start with one, you stand a chance of finding "the strongest" for your particular situation.
I recommend this approach because, as you start thinking about threat models and researching them, you'll start to realize that security is far more about the human element. Then you can worry about things like how you will secure your key.
Once you have decided whether you are trying to outwit a state actor while committing treason, or just merely trying to protect your diary from the prying eyes of your little sister, you can decide what the best algorithm is.
Failing that, go with the flow. Rather than finding out what is the "strongest" encryption, look for what is "recommend" by the security experts for someone who knows nothing of cryptography. Currently AES comes highly recommended. We're quite confident that nobody short of a state actor can break it, and we are reasonably confident that no state actor can break it either.
But better yet, don't look for encryption algortihms, look for tried and true packages which are recommended. The application of an algorithm is as important as the algorithm itself. Highly reputable implementations are worth their weight in gold. | s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296818452.78/warc/CC-MAIN-20240423002028-20240423032028-00044.warc.gz | CC-MAIN-2024-18 | 1,428 | 5 |
https://www.xplenty.com/integrations/bing-ads/hdfs/ | code | Bing Ads and HDFS Integration
About Bing Ads
Bing Ads is a service that provides pay per click advertising on both the Bing and Yahoo! search engines.
HDFS is a Java-based file system that provides scalable and reliable data storage, and it was designed to span large clusters of commodity servers. HDFS has demonstrated production scalability of up to 200 PB of storage and a single cluster of 4500 servers, supporting close to a billion files and blocks. | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281649.59/warc/CC-MAIN-20170116095121-00337-ip-10-171-10-70.ec2.internal.warc.gz | CC-MAIN-2017-04 | 456 | 4 |
https://www.templarket.com/blogs/blog/monte-carlo-simulations-power | code | Unlock the Power of Monte Carlo Simulations
Monte Carlo simulations are a popular numerical method for probabilistic analysis. They use random sampling to model a problem and generate useful information from it. Its purpose is to estimate the likely outcome of a given situation. Monte Carlo simulations are used in fields as diverse as finance, engineering, physics, and economics.
At its core, Monte Carlo simulations rely on random number generation. By repeatedly selecting inputs randomly and analyzing the results, Monte Carlo simulations are able to build a probability distribution that accurately models a given problem. This distribution allows for the analysis of the entire range of possible outcomes of the given situation.
Definition of Monte Carlo Simulation
Monte Carlo simulation is the process of using computers to randomly generate numbers in order to model a real-life situation. The result is a probability distribution – a graph of the range of possible outcomes – that can be used to make informed decisions. Monte Carlo simulation is a core technique in many fields, including finance, engineering, and physics.
Purpose of Monte Carlo Simulation
The primary purpose of Monte Carlo simulations is to reduce the risks associated with certain decisions. By accounting for the randomness of the inputs, it allows decision makers to take into account the range of possible outcomes, and identify the likelihood of each one. This helps them to make more informed decisions, and create better models that can accurately predict real-world outcomes. Monte Carlo simulations are also used to optimize software, and to test the effectiveness of new products and services.
Basics of Monte Carlo Simulation
Monte Carlo simulation is a technique used to help decision makers solve problems by predicting possible outcomes of decisions. It is based on the idea that if the same situation is repeated, it will produce the same results. The technique works by having a computer model simulate the problem, with all the variables, to produce a range of possible outcomes.
Method Used In Monte Carlo Simulation
It uses random number generation, probability distributions and Monte Carlo integration algorithms to create a simulation of a system. In this method, random numbers are generated to represent all the variables in the simulation. The model then combines the random numbers with the equation of the system and creates multiple scenarios with different outcomes.
Steps Involved In Monte Carlo Simulation
- Develop the Model- Specify the input variables and relationships in the model.
- Generate Random Numbers- Generate numbers from a chosen probability distribution.
- Run the Model- Use the generated random numbers to run the model multiple times.
- Analyze Results- Analyze the outcomes of all the simulations to determine the likelihood of different outcomes.
Benefits of Using Monte Carlo Simulation
Monte Carlo simulation (also known as the Monte Carlo Method) is a statistical tool used to determine outcomes by running multiple simulations. The results of this tool can be used to make business decisions such as predicting future returns from an investment portfolio, or determining the likelihood of a project's success. Because of the many advantages Monte Carlo simulation provides, it has become a popular form of decision support for many businesses.
The following are some of the benefits of using Monte Carlo simulation:
Ability to Account For Risk Factors
One of the primary benefits of using Monte Carlo simulation is its ability to account for risk factors that are traditionally hard to quantify. This type of simulation takes into consideration the impact of known and unknown risks such as currency fluctuation, interest rate volatility, and natural disasters. Monte Carlo simulations can generate outcomes that combine any amount of risk, allowing decision makers to measure the effect that the risk has on their business.
Increased Performance Efficiency
The use of Monte Carlo simulations can increase performance efficiencies by allowing multiple simulations to be conducted simultaneously. The use of multiple simulations means that decision makers can compare a variety of scenarios in a short amount of time. This means that decisions can be made faster and with more confidence in the result.
Improved Model Accuracy
The use of Monte Carlo simulation improves model accuracy by allowing for the evaluation of the effects of random variables or external factors on the performance of the model. By running multiple simulations simultaneously, much more accurate data is presented to decision makers, allowing them to make more informed decisions.
Applications of Monte Carlo Simulation
Monte Carlo simulation is widely used across a plethora of use cases and applications. Some of the major ones include:
Financial Planning and Analysis
Financial planners use Monte Carlo simulations to model the likelihood of outcomes based on various scenarios and available data. This allows them to make more accurate assumptions, which can be used to forecast accurate forecasts and develop financial plans accordingly.
Energy managers use Monte Carlo simulations to analyze how a certain workload operates within their infrastructure. For example, by analyzing user inputs, organizations can successfully simulate and understand peak energy demands and plan accordingly to ensure adequate energy supplies.
Businesses use Monte Carlo simulation to analyze the effectiveness of marketing campaigns. They can take into account different factors such as customer personas, budget constraints, geographical/market trends and more, to gain a better understanding of marketing strategies, optimize campaign strategies reach the right target audience.
Manufacturers use Monte Carlo simulations to identify and address risk areas. For example, they can use the simulations to understand the impact of facility shutdowns and identify probable disruptions across their inventory supply chains. Using the simulation, they can predict the most likely setback, take preventive measures and ensure that the production runs at optimal capacity.
Drawbacks of Using Monte Carlo Simulation
Monte Carlo simulations have several drawbacks when used for decision-making. Although the method has great potential to provide insights into complex systems, there are still a few drawbacks that should be considered.
High Cost of Computation
Perhaps the most significant constraint of Monte Carlo simulations is the cost of computation. Monte Carlo simulations involve repeated simulations of every possible outcome, with thousands of virtual trials. This means that the simulations require a significant amount of computing power and can be very costly.
Subjective Assumptions in Modeling
Another drawback of the Monte Carlo method is that it relies on subjective assumptions about the system. Because the nature of systems is often too complex to accurately model, Monte Carlo simulations require a great deal of subjective input from the analyst. It is difficult to anticipate all of the possible outcomes and scenarios in Monte Carlo simulations, which can lead to results that are not entirely reliable.
In addition, Monte Carlo simulations tend to rely on limited datasets, making it difficult to accurately capture the complexity of real-world systems. As a result, the outcomes of Monte Carlo simulations can be influenced by the assumptions used in the model.
Examples of Monte Carlo Simulation
Monte Carlo simulation uses a computational approach based on probability theory to solve a problem. Monte Carlo simulation is used in many different tasks, from tactical and operational decision making to long-term strategic planning. Here, we discuss a few of the more common examples of when Monte Carlo simulation might be used.
Predicting Stock Market Volatility
Stock market volatility has a significant impact on the financial performance of a company or industry. Simulating a variety of market scenarios enables investors to determine expected returns, or lack thereof, depending on how markets evolve in the future. Monte Carlo simulation is a key tool in this effort, as it can help investors identify and plan for scenarios that would otherwise be overlooked.
Simulating Nuclear Reactor
The high complexity of the nuclear reactor core requires simulation with Monte Carlo simulation so as to predict the power and the neutronic parameters. This helps to determine the correct core parameters for the best possible results. Monte Carlo techniques are also used to study any potential accidents, as well as the movement of radioactive particles outside of the reactor core.
Analyzing Queuing System
Queuing systems, such as those found in call centers, are often simulated using Monte Carlo simulation. This enables the accurate prediction of wait times, the number of agents required, and other important factors in the operation of a customer service center. The results gained from Monte Carlo simulation can help optimize customer service performance and improve customer satisfaction.
Monte Carlo simulation is a technique used for understanding the behavior and performance of a system by performing a large number of simulations, each run with slightly different inputs. It is a powerful tool in data analysis and predictive modeling, allowing us to make better decisions based on the simulated data. Monte Carlo simulations can be used to calculate probabilities, optimize parameters and make dynamic decisions.
Using Monte Carlo simulations, users can build data models that account for uncertainty and identify outcomes that are sensitive to inputs. Ultimately, Monte Carlo simulations can help companies gain better insight into their data, as well as improve the accuracy of their models.
Summary of Monte Carlo Simulation
Monte Carlo simulation is a powerful technique used to study the behavior and performance of a system by running a large number of simulations, each run with slightly different inputs. It's a versatile tool for data analysis and predictive modeling, offering insights into probabilities, optimized parameters and dynamic decisions. Ultimately, Monte Carlo simulations provide companies with tangible data models that are equipped to handle uncertainty and identify outcomes that are sensitive to inputs.
Monte Carlo Simulation Are A Powerful Tool For Data Analysis
Businesses can leverage Monte Carlo simulations to improve their decision making process and gain insights into their complex data. By simulating a range of scenarios, organizations can better understand their data and, in turn, create more accurate models and make better informed decisions.
Moreover, organizations can optimize their parameters to find the most effective and efficient decisions. With Monte Carlo simulation, businesses can analyze a wide range of scenarios and pick the best path forward.
In summary, Monte Carlo simulation offers a powerful tool for data analysis that helps organizations better understand their data, optimize parameters, and make better decisions. | s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764499710.49/warc/CC-MAIN-20230129080341-20230129110341-00755.warc.gz | CC-MAIN-2023-06 | 11,115 | 55 |
https://lists.isocpp.org/sg15/att-0292/attachment | code | I don't think so. It is a database, but not one that stores the history of how a build was performed. Rather, it stores some of the information that would be needed to construct a compiler invocation (or for a tool/IDE to parse source files that require resolving module names to source files).
> The manifest file could be generated (based on information in source code) and
> usable by multiple tools, IDEs, and build systems. It need not be a statically
> maintained file. I like this approach because it appropriately separates the
> steps of identifying/building the module name/file map vs using the module
> name/file map (most tools don't want to be build systems).
This sounds like a clang compilation database.
Such a thing is useful for non-build tools, and can be generated automatically, as you said. I am concerned that generating such a file early in the build process would cause performance problems. Each source file would need to be partially parsed before the build DAG could be fully formed. However, I don’t have benchmarks indicating how expensive an extra pass over all the source files is.
Without such a file (or equivalent information statically encoded
in "the" build system), the only alternative is to examine every
source file in order to construct the build DAG in memory anyway.
How else could such a scan be avoided? (There is another
alternative; implicitly building modules on demand as is done for
Clang modules today. But to my knowledge, no implementors are
pursuing that for standard proposed modules).
_______________________________________________ Tooling mailing list [email protected] http://www.open-std.org/mailman/listinfo/tooling | s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446711232.54/warc/CC-MAIN-20221208014204-20221208044204-00614.warc.gz | CC-MAIN-2022-49 | 1,680 | 16 |
https://datascience.stackexchange.com/questions/80411/predicting-time-series-data | code | This is test case 1. My goal is to fill the missing years data. As the age sex and smoking is not changing so I have to predict the condition and percent data for year 0 to all the way 54. I found high correlation between condition and percent variable. This seems easy. But I am a bit confused now. Should I have to use multivariable regression? what would be the most best method to approach?
Best approach would be to perform data preparation first:
- Remove features (columns) with no variance in it (you could use: sklearn feature_selection)
- one-hot-encoding of categorical features
- insert a lag column of -t steps
If you have more than one explanatory variable, the process is called multiple linear regression. Instead of using a regression model you could also use other learners like XGBoost or LSTMs | s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100476.94/warc/CC-MAIN-20231202235258-20231203025258-00562.warc.gz | CC-MAIN-2023-50 | 813 | 6 |
http://weedstore.cc/forums/topic/truvada-compra-truvada-prep-application | code | If you are looking for a trusted and high quality pharmacy, look not further! It is all you need!
Random Internet Quotes:
Truvada in the growth potential increase terms of pages. Funcionarios de forma que sean fomentados a drug manufacturer only use for patients who now services we are too few copyright, juanita is the expansion being with ibs-c or non-existent in capacity changes and in few of forensic disciplines. Hovione loures, multiple pharmacies in 5 months than 33 pounds. We will need to provide an agreed braille code of the cost of the past three years, with a second cycle! Psychologic and the agreement to the availability of directors of money traded. Medical professionals providing about beginning on the causes and modify your medicine has been controversial. Your prescription is if the past 2 years but its journalism are collecting voices from customers above all jurisdictions, manufacturers may be medical device manufacturing industries or web design features intended to or programming or text you can convert some more effective. Leveraging … | s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474670.19/warc/CC-MAIN-20240227021813-20240227051813-00858.warc.gz | CC-MAIN-2024-10 | 1,072 | 3 |
https://community.openstreetmap.org/t/hail-and-ride-bus-stop-tagging/100616 | code | (nearly TL;DR) This is about Hail_and_Ride, not Kiss & Ride as Discourse deems ‘looks like’. We have countless bus stops each serving multiple routes which have a big sticker on the board ‘Fermata a Richiesta’. You go stand at such a bus stop and if you see a bus approaching of a route you wish to board you stretch your arm out, stick up the hand and the bus will stop for you. (It does work in places in the country side where you just loiter along a road without a bus stop pole of extraurbano in sight, not guaranteed though).
The wiki solution on hail_and_ride is not very appealing as it says to assign a role to the stretch of road as member of the bus route relation… not going to cut up long roads for the purpose as the locations where FaR are is sign posted anywhere including the outback. Have tried to insert Hail_and_ride as role in bus routes before but several QA and I think JOSM validator (or is it the PT plugin) are not happy about this, though approved a few summers ago (2018)
Of note is, many bus stops with the label have been mapped where I’ve added the H&R sticker text as a description:it to make them searchable (per TI nearing 200), but not the routes they’re being served by as they mostly have not been mapped.
Long/Short The question is simple: Is there a tag which TagInfo would not reveal to me, to signify bus stops/legacy public_transport=platform objects with a H&R tag/role or for that matter the stop as member of a bus route relation? | s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510462.75/warc/CC-MAIN-20230928230810-20230929020810-00690.warc.gz | CC-MAIN-2023-40 | 1,489 | 4 |
https://www.initc3.org/events/2020-10-15-order-fairness-for-blockchains-ic3-and-chainlink-virtual-meetup | code | The underlying consensus problem that drives blockchains has beeen well studied in cryptography and distributed systems litereature for the past four decades. Consensus protocols need to satisfy consisteny and liveness, but unfortunately, neither property enforces any guarantees on the actual ordering of transactions. This is discomforting for many modern blockchain applications, considering that the ordering is often easy to manipulate.
Manipulation of transaction ordering is especially problematic for decentralized finance applications - its impact reminiscent to that of the popularized high frequency trading arms race on Wall Street. In this talk, I will motivate a third consensus property, transaction order-fairness, to rectify the ordering problem. I will introduce a new class of consensus protocols that can acheive it in addition to the usual consistency and liveness properties. Finally, I will comment on how order-fairness has the potential to make decentralized finance more intrinsically fair, especially to ordinary users.
Mahimna Kelkar is a PhD student in Computer Science at Cornell University advised by Ari Juels. He is broadly interested in theoretical and applied cryptography with some emphasis on blockchains.
Register for the event here. | s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474660.32/warc/CC-MAIN-20240226130305-20240226160305-00897.warc.gz | CC-MAIN-2024-10 | 1,271 | 4 |
https://thelistenerd.wordpress.com/2007/05/29/the-listenerd/ | code | by Josh Kimball
Hi. Most first blog entries are awful: they say too much, they say too little, they do or do not ironically or inironically include a picture of the author’s cat. This first post will also suck, but it will be short. And also comforting in its predictability.
I am the ListeNerd. My aim in this blog is to track, discuss, explain and take pleasure in the intersection of technology and music.
My day job is as a media, entertainment and technology editor for a consumer trend company.
Now here we go: on to better things. | s3://commoncrawl/crawl-data/CC-MAIN-2020-10/segments/1581875146187.93/warc/CC-MAIN-20200226054316-20200226084316-00225.warc.gz | CC-MAIN-2020-10 | 539 | 5 |
http://www.fixya.com/support/t1270446-keyboard | code | Lenovo s1o number lock stuck. i am unable to use keyboard. FN key non responsive. any suggestions are appreciated!
If the key is physically stuck in the "down" or pressed postion, the key may have become disconnected from the mechanism underneath that returns it to the "up" position.
All keys on all keyboards can be removed. This includes laptops. On laptops, the keys typically have less travel (up and down) than a desktop keyboard and the key attaches to the keyboard differently.
In either case, use a small screwdriver or your fingernail and gently lift up on the key - to return it to the "up" position. When in that position, see if the rest of the keyboard works.
If it does, you can simply lift up on the key and remove it from the keyboard. The support that is underneath will either be removed with the key or will remain on the keyboard.
Re-attaching the key involves aligning the key with the ends of the support bracket and snapping it back into place. (Most keyboards have a white plastic structure that forms a X on 2 sides - allowing the key to move up and down.)
With the key removed, look at the edges of the surrounding keys to get an idea of how it attaches, align the parts and press it back into place.
May 04, 2010 |
Lenovo 3000 N100 0768 - Pentium Dual Core... | s3://commoncrawl/crawl-data/CC-MAIN-2016-50/segments/1480698543434.57/warc/CC-MAIN-20161202170903-00453-ip-10-31-129-80.ec2.internal.warc.gz | CC-MAIN-2016-50 | 1,287 | 9 |
https://forums.creativecow.net/docs/forums/post.php?forumid=23&postid=860738&univpostid=860738&pview=t | code | I recently put together a new system running Vista 64 and an ATI 4870 video card. Now I was getting lots of crashes in After Effects. After much research I found out there is an issue with the ATI open gl drivers but that others had found stability using the DNA drivers http://www.donotargue.com/. The driver did fix my AE problems however-
Now I get an error on opening PI saying the "atioglxx.dll is either not designed to run on Windows or it contains an error. Try installing the program using the original media ..." For whatever it's worth the drivers are supposedly for Vista 64 so I'm not sure what to do at this point. | s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267164469.99/warc/CC-MAIN-20180926081614-20180926102014-00106.warc.gz | CC-MAIN-2018-39 | 628 | 2 |
http://borrellphoto.com/computer-startup/solution-slow-boot-and-running.php | code | Slow Boot And Running
Even as I ave ben sitting here, Pro SP2 (fully updated). Followed by my starts up then the xp logo comes on. You should test for speed first. -party driver installation and everything works perfectly.Thanks to anyone who helps. You are backing up for disaster recovery only?
And keep the Hard Drives Reading "F-Me". I cant play any games Slow http://borrellphoto.com/computer-startup/solved-slow-startups.php method and booted PC. Boot Computer Takes Long Time To Boot Bios As you mentioned, you have is no water damage to it. That should fix Slow all three and they are the same.
If it is either one, I am after intel's pricecut coming later this week. 2 months old anybody? What would you do and I reckon you can go into your them. I had my PC and the DVD drive for almost a year.
So i can take one out and .......then I get a BLUE screen and nothing else. Alright, so im making my new buildutra, don`t worry, your graphics card(GC) is fine. Computer Startup Slow Windows 7 See how it respondsforums but I am desperate for help.Hi I am new to thewithout it crashing during startup.
It was working fine if I can, I'm looking to upgrade. Does this sound like a http://www.computersupportservicesnj.com/11-reasons-for-pc-issues-and-tips-on-how-to-fix-slow-computer-i-bet-you-wouldnt-like-10/ have is OK if you know it's brand.Some things to note: - Would yourdifferent in this situation?Hopefully its done by tuesday am and i nearly always the sound of a hard drive dying...
Dell's can be tricky if you try to use third party upgradesfrom the router in another room to my system.By the way, I Computer Startup Slow Windows 10 card you see at newegg and such.The farthest it has gone is to the the computer has powered off from windows! The second i tested it in is runinglimited to 2 GB.
Your call, I have no idea about power requirements for quad-core cpu's. winlogon.exe am using the latest drivers.I am just wondering if the problem isSo I shut down thelaptop. The drive letter that i had for it was "L".These are different than the standard PCIe have a peek here and it does the same thing with the xp logo.
Any help would be great thanks. hello i can upgrade it?Ive been reading up on ethernet cables, obviously Sounds like a good plan. So, monday evening (as opposed http://www.computerhope.com/issues/ch001131.htm i have 2 sata hdd ( non-raid).I have xp pro as my os,the power supply, the cpu, or the motherboard.
Next thing you know it reboots and can pretty much bet the PSU is bad. Did the usualcompatible with the computer and won't cause any harm.All are running XPBIOS, and enable LBA (under HDD or something).Non-mobility PCIe cards are much to big to fit in a standard of the three machines and that hasn't worked.
Ive had many Dells in the past and never had any problems with Boot be greatly appreciated.Also, I hear a have alot of stuff on hdd's. I go through the f6 3rd Computer Startup Slow Windows 8 nothing happpens when I press the power button, no power at all.I have checked the Firewall settings on thanks in advance Have you checked the fuse panel for blown fuses.
And Thnx! I reckon have a peek at this web-site some have faster transfer rates than others. I don't need anything
BIOS again while Detecting IDE Drives.Did you disconnect the cars battery before you began the CD install? I ran running sound, it sounds like the computer is STUFFED.It only has a 230w PSU, anddoes the same process over and over.
I then tested this card in my clicking sound from the PC. If not, you will need Computer Takes A Long Time To Boot Up Windows 7 is fine also.How is thecan take the drive out and off site.So, I am pretty sure there So contact Dell and ask them directly.
If not, your CD laser is gone. i running Everest on my computer and it says i have a pci-express x16 video card slot.It is definately not normal to hear thatmain pc and it dosent boot at all.Can someone please helpthe problem of 130gb...Any help would be appriciated. Yes youwithout the 2nd drive.
My router is Check This Out a NetComm 1300Plus4.I want to run some long ethernet cablesperformance of this card?Maybe your provider blocks the pictures and you must plick somewhere to allow This is a similar problem to one I saw elsewhere on here. Doesn't this mean Slow Computer Startup plan to any of you guys?
I just need a stronger power supply that's you've accidentally set a HDD limit. When i turn on the computer, itan ATI 'mobility' video card.What's going on? The clicking sound is wondering what we should replace them with. Thus far, I have run the Wizard andan amd athlon xp 3200+ and 1 gig ram.
Infact your monitor restore' point that you can try? The problem isversion.It has compatible ram list. Slow Ps.dvd drive is only Slow Boot Up them I've been using the wifi for my internet connection on my mobo. running If you search this site you will see MANY descriptions of this same problem.- How about upgrading the tape drive?
Thanks. me too i was given this computer with everything on it. I tried to go in safe mode butcreated a Network Setup Disk and that hasn't worked. Do you have a 'system Laptop Slow Startup Windows 8 end of the 3rd test in 3dmark05 before crashing.to buy a new hard drive.
Thanks for any suggestions. with your monitor. Your Motherboard might bejust got the computer, it has been running fine. You may need to purchase additional licenses. c:\windows\system32\KBDUS.Dll not a valid windows Image (only option is to click okay) 2. If it is a Maxtor or Western Digital or Hitachi. Now crazy, just an improved PSU.
Isass.exe c:\windows\system32\cryptdll.dll Not a valid windows image computer and boot it back up. I am now stuck on same xp pro. Any help would off the premises when its finished backing up. | s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376824115.18/warc/CC-MAIN-20181212181507-20181212203007-00419.warc.gz | CC-MAIN-2018-51 | 5,754 | 21 |
https://cloudacademy.com/course/designing-an-azure-network-implementation/security-strategies/ | code | The course is part of these learning pathsSee 2 more
Microsoft Azure supports a variety of options for both internal and external networking. In this course, you will learn how to design a network implementation using the appropriate Azure services.
Some of the highlights include:
- Configuring virtual networks to connect Azure resources to each other
- Deploying public and private load balancers to distribute incoming traffic to a pool of backend VMs
- Load balancing across multiple regions using Azure Traffic Manager
- Connecting on-premises networks to Azure either directly using ExpressRoute or over the internet through a site-to-site or point-to-site VPN
- Overriding system default routes to meet your own custom routing needs
- Protecting your applications from attacks with a web application firewall
- Using network security groups to create a demilitarized zone (DMZ)
- Building hybrid applications that include both Azure and on-premises resources using Azure Relay
- Copying on-premises data to Azure using Data Factory, the Self-hosted Integration Runtime, and the On-Premises Data Gateway
- Design Azure virtual networks
- Design external connectivity for Azure virtual networks
- Design network security strategies for Azure
- Design connectivity for hybrid Azure applications
- People who want to become Azure cloud architects
- People preparing for a Microsoft Azure certification exam
- General knowledge of IT infrastructure and networking
When you put an application on the web, you can be sure that hackers and bots will probe it for weaknesses soon afterward. If they find weaknesses, then they’ll likely compromise it in either an obvious way, or even worse, in a way that you don’t notice. So before you deploy any web applications, you need to architect a security solution.
The first step is for your application developers to design secure code. That’s a good start, but it’s difficult to ensure that every application can withstand attacks. So you’ll need to put some type of centralized protection in front of all of your applications.
Azure provides a lot of great network security features to help with this, such as DDoS protection, virtual network isolation, and network security groups (which we’ll talk about more in a minute), but you should also add a layer that’s designed to combat a broad array of threats to web apps.
One good option is the Web Application Firewall that comes with the Azure Application Gateway. It’s based on the well-known Open Web Application Security Project (or OWASP) core rule sets. It protects against attacks like:
HTTP request smuggling
Remote file inclusion, and
HTTP protocol violations and anomalies
It also detects common misconfigurations in web servers like Apache or IIS.
You can run it in either detection or prevention mode. In detection mode, it simply logs all security alerts. In prevention mode, it actually blocks the attacks that it detects. To monitor the firewall’s activities in either mode, you can look in Azure Monitor, Azure Security Center, and Log Analytics, because they’re all integrated with it.
Although Microsoft’s Web Application Firewall is very capable, you may still want to use a different solution, either because your organization has standardized on a third-party security product or because you need a firewall with additional features. Fortunately, a number of vendors, such as Barracuda and Palo Alto Networks, provide pre-built virtual machines that you can get from the Azure Marketplace. These are known as network virtual appliances.
Ideally, these appliances should be put in a demilitarized zone (or DMZ). This is a perimeter network that keeps unwanted traffic, including attacks, from getting through to your backend network. In this example, the perimeter network and the backend network are two subnets within the same virtual network.
To control the flow of traffic between these two subnets, you can use an NSG (which stands for network security group). An NSG contains security rules that allow or deny traffic to resources in a subnet of a virtual network. They’re similar to firewall rules. You can also apply NSGs to the network interfaces of specific VMs (if they were deployed using Resource Manager) or to all of the traffic to and from specific VMs (if they were deployed using the classic model), but it’s usually better to apply them to an entire subnet.
Here’s an example NSG. It has inbound and outbound rules. The most important are the inbound rules. The first inbound rule allows DNS traffic over port 53 from anything inside the virtual network to the DNS server, which has this address.
Notice that I didn’t have to specify an address range for the source. That’s because Microsoft lets you use service tags instead. This greatly simplifies your rules and makes them easier to read and understand. For example, the VirtualNetwork tag includes the virtual network address space, all connected on-premises address spaces, and all peered virtual networks or virtual networks connected through a VPN gateway. If you had to specify all of those address ranges yourself, the rule would be pretty complicated and it would be easy to make a mistake when creating the rule. Another advantage is that the addresses in a service tag are automatically updated when something changes, so you don’t need to update your rules. In case you’re wondering, you can’t create your own service tags. You can only use the predefined ones.
The second rule allows RDP traffic over port 3389 from the internet to this virtual network so you can remotely administer the VMs. Notice that “Internet” is also a service tag again. The third rule allows traffic to the firewall, which has this address. The next one allows traffic between the web server and the app servers. The destination is a list of both addresses.
After all of these allow rules, we add deny rules. The first one denies all traffic from the internet to this virtual network. Since it has a lower priority than this allow rule, it will only be applied for traffic that doesn’t match the allow rule. Finally, we deny all traffic between the frontend and backend subnets that wasn’t explicitly allowed above. These three rules at the bottom are added by default. You can’t change or delete them, but you can override them with the rules above, which is what we’ve done. To activate this NSG, you’d need to associate it with both the frontend and backend subnets.
By default, the outbound rules allow all outgoing internet traffic. This could be dangerous as your VMs might accidentally leak sensitive information to the internet. You can add a security layer by using forced tunneling.
With this configuration, all internet-bound traffic has to go through your on-premises network before going out to the internet. This gives you the opportunity to run this traffic through an inspection and auditing system that’s installed on-premises.
The way to do this is pretty straightforward. You create a user-defined default route that points to the VPN gateway in your virtual network. Then, on the VPN gateway, you set the default site to the on-premises location where you want to redirect the traffic. If you’re using ExpressRoute rather than a site-to-site VPN, then instead you advertise a default route via the BGP peering sessions.
Since forced tunneling can significantly slow down internet-bound traffic, you usually shouldn’t use it on frontend web servers. It’s more suitable for backend servers.
And that’s it for security strategies.
Guy launched his first training website in 1995 and he's been helping people learn IT technologies ever since. He has been a sysadmin, instructor, sales engineer, IT manager, and entrepreneur. In his most recent venture, he founded and led a cloud-based training infrastructure company that provided virtual labs for some of the largest software vendors in the world. Guy’s passion is making complex technology easy to understand. His activities outside of work have included riding an elephant and skydiving (although not at the same time). | s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296948965.80/warc/CC-MAIN-20230329085436-20230329115436-00633.warc.gz | CC-MAIN-2023-14 | 8,128 | 41 |
https://200wordrpg.github.io/2017/rpg/2017/04/15/AlienZookeepersGo.html | code | Requires: Two+ players. Some way to share short videos and pictures you’ve drawn on. You are alien naturalists, disguised as humans, capturing/documenting unseen fourth-dimensional animals that populate this planet. What’re your names? What alien institution do you work for? Mostly, blend into Earth society. But sometimes, discover a new specimen. Send a short video describing how, then a picture of the animal. You’ll have to draw; Earth cameras can’t capture the fourth dimension. Don’t forget a name! Other players ask two questions each. Examples: What sound does it make? How’s it useful? How’s it cared for? Amplify your magnificent discoveries. Downplay the significance of others’. Always tell the truth. The other players write a report describing their impressions of your find. Homeworld’s watching, be honest. Include name, summary and rating (1-10), based on uniqueness and importance/usefulness of the animal. Occasionally, ask for an update on a previous specimen. Check the rating. Five or less: they share a picture/video describing an unexpected talent/feature + a charming anecdote of bonding. Six or above: describe a complication/danger + the unfortunate way it was discovered. Play until you’ve captured all the interesting creatures here. Destroy the planet as you leave.
This is basically me trying to imagine a version of Pokemon Go that I would like to play. In a longer version I would like to confront the ethics of capturing creatures and also give more tools for coming up with creatures and questions. | s3://commoncrawl/crawl-data/CC-MAIN-2019-04/segments/1547583660258.36/warc/CC-MAIN-20190118172438-20190118194438-00300.warc.gz | CC-MAIN-2019-04 | 1,555 | 2 |
http://vlsidesignconference.org/call-for-tutorials.html | code | Proposals for tutorials are invited on topics related to, but not limited to:
VLSI Design and Methodologies: Analog and RF mixed signal design, Synthesis, DFT and test, Verification (simulation and formal), Design for manufacturability and yield, Power analysis and low-power design, Thermal analysis and temperature aware design, Physical design, packaging and board design, technology CAD, CMOS sensors and MEMS, nanoscale computing and nano-electronics, High performance computing, Multi-core and parallel architectures, Networks-on-chip, FPGA-based design.
Embedded Systems: Hardware/Software co-design and verification, ESL, Methodology, Embedded software tools and protocols, Reconfigurable systems, Embedded System design for different applications such as DSP, wireless, communications, encryption, security, compression, hybrid systems-on-chip, Case studies, Design flows and MethodologyIoT, Sensors and Wearbles: IoT Infrastructure and architectures, IoT Network Management; Emerging Protocols; IoT Applications in Agriculture, Healthcare, Education, Energy Security and others applications. Sensors, Mems and actuator networks, Wearable devices and body sensor networks, SOC’s and Controllers for Wearable devices; Ultra low power devices; Integration with Cloud and Analytics. Product design in any of the application areas;
Tutorial proposals can be submitted either as full day tutorial or half day tutorial, through the conference Website by the due date in the required format. Full day tutorials will be six hours and half day tutorials will be three hours. All tutorial proposals will undergo a peer review process.
Proposals Should Follow The Following Details:
- Tutorials should be submitted in Text or PDF format.
- Tutorial title and short summary (in about 200 words).
- Indicate if the Tutorial is for Full day or Half day
- Name, affiliation and contact details of the co-ordinating presenter and all other co-presenters.
- The targeted audience and prerequisites (in about 50 words).
- Keywords from those listed in the topics above, or otherwise.
- Tutorial program, with a list of topics covered, a short description of each topic and the approximate time devoted to each topic (in about 2000 words).
- Technical bibliography (with emphasis on the authors' works and related works being covered).
- List of tutorial material to be provided to the attendees.
- Short biographical sketch of each presenter (About 200 words for each presenter).
Coordinating Presenters must note the following
- All presenters listed in the tutorial proposal be available for tutorial presentation.
- Consent should be obtained from all the presenters and all organizations involved in presenting the material and also for travel before making the tutorial proposal.
- The honorarium for the tutorial presenters will be determined at a later time and hence presenters should keep this mind while planning for travel to the conference.
- All material from individual presenters must be collated and combined into a single tutorial presentation, as per the presentation guidelines (to be communicated at the time of acceptance).
|Notification of acceptance :||October 7, 2014|
|Slides/Presentation :||November 30, 2014| | s3://commoncrawl/crawl-data/CC-MAIN-2014-42/segments/1414637900160.30/warc/CC-MAIN-20141030025820-00205-ip-10-16-133-185.ec2.internal.warc.gz | CC-MAIN-2014-42 | 3,228 | 22 |
https://elewa-academy.github.io/Precourse/5-next-steps/dev-environment.html | code | Congratulations on finishing your Pretty Things Gallery! The next thing you need to learn before you can start on your portfolio is how to work with HTML and CSS using true developer tools. Codepen is great for prototyping and learning, but it's not how you will work for full projects. Take some time now to familiarize yourself with editing code in Visual Studio Code, and running it in Chrome.
Here are some resources you might find helpful for learning to use Visual Studio Code:
- Launch School's Command Line. Resource for learning about the command line and the terminal.
- Launch School's Git and Github. Resource for learning about git and github.
- Jlord's Git-It. This is a more interactive resource for learning Git.
- a markdown on browsers | s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578528523.35/warc/CC-MAIN-20190420040932-20190420062932-00514.warc.gz | CC-MAIN-2019-18 | 753 | 6 |
https://docs.infoblox.com/display/nios85/Configuring+NAT+Mapping+Properties | code | If you are operating in an environment where you need to aggregate multiple users (such as mobile users) behind one IP address, you might want to consider using NAT (Network Address Translation) Mapping to avoid the potential of service denial to a large group of users if threat protection rules are being applied to the same IP address.
NAT detection is essential to enforce the correct threat protection rule on source IP addresses. The Infoblox NAT Mapping feature allows you to designate individual IP addresses, networks, or ranges along with the source port ranges to denote NAT'ed clients. Any UDP or TCP traffic that originates from an IP address within the NAT IP range and uses a source port within the NAT port mapping is considered as a NAT'ed client. It is important to align the NIOS NAT mapping configuration with the NAT gateway configuration to avoid mis-classification of NAT IPs. Traffic that originates from a given source port block that falls within the configured NAT IP and port range is considered as the same NAT'ed client and traffic that originates from a different port block that falls within the same NAT IP and port range is considered to be a different NAT'ed client. If the traffic originates from the same source IP address, but from a different port block that falls outside the configured port range, then they are considered as a non-NAT'ed client.
NIOS NAT detection is designed to work with a specific form of NAT where multiple clients are NAT'ed onto a single public IP address using a single port block for each client at a time. Some NAT vendors refer to this scheme as PBA (Port Block Allocation) with fixed size port blocks. The NAT device cannot re-use the same NAT IP address for a different client for at least the drop interval of the threat protection rule that is currently running. Note that the client idle timeout duration of the NAT device must be larger than the drop interval of the threat protection rule that is currently running.
You can configure NAT Mapping rules on Advance Appliances by mapping a source IP address, network, or range of IP addresses with a range of ports and specifying the port block size to divide each port range into chunks of port blocks. Each port block represents a single NAT'ed client source port. The IP addresses and the port blocks specified in a NAT Mapping rule may be assigned to the clients in any order, either fixed, sequential, or random.
The appliance logs information about NAT'ed clients to the syslog. Following is an example of the threat detection event log message in the syslog for NAT'ed clients:
2015-06-01T22:57:22+00:00 daemon infoblox.localdomain threat-protect-log: err
spt=1221 dst=188.8.131.52 dpt=53 act="DROP" cat="BLACKLIST UDP FQDN lookup" nat=1 nfpt=1124
The following values in the threat detection event log message are specific for NAT'ed clients:
- nat=1: Indicates that the syslog event is logged for a NAT'ed client.
- nfpt: Indicates the first port in the port block.
- nlpt: Indicates the last port in the port block.
For information about the syslog and how to use it, see Viewing the Syslog. Note the following about the NAT Mapping feature:
- A single NAT'ed client cannot use multiple source IP addresses or multiple port blocks simultaneously, otherwise NIOS might consider the same NAT'ed client as different clients.
- NIOS does not support traffic originating from both NAT'ed and non-NAT'ed clients using the same source IP address.
- NAT mapping supports only IPv4 addresses, networks and ranges and any traffic originating from an IPv6 address, network, or range is considered as a non-NAT'ed client.
- NAT mapping is applicable only for traffic that uses UDP or TCP source port.
- NIOS cannot determine the pre-NAT IP address of a client. However, you can use the NIOS threat protection logs and the threat protection reports in conjunction with the NAT device logs for the same interval to determine the pre-NAT IP address of a NAT'ed client.
- The NAT mapping configuration in the NIOS appliance must be aligned with the actual NAT device configuration to ensure correct NAT detection.
- NAT mapping is not available for members that use Software ADP.
You can enable the NAT Mapping feature and configure NAT Mapping rules on the Infoblox-4030 Rev-2, Infoblox-4030 10GE appliances and the following hardware-based appliances: PT-1400, PT-1405, PT-2200, PT-2205, PT-2205-10GE, PT-4000, and PT-4000-10GE. Note that you can enable this feature only when threat protection service is enabled on the appliance.
This page has no comments. | s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320304835.96/warc/CC-MAIN-20220125130117-20220125160117-00464.warc.gz | CC-MAIN-2022-05 | 4,577 | 21 |
https://netbeans.org/projects/www/lists/netcat/archive/2012-11/message/198 | code | [73cat] Re: [news] Status Report #9
- From: Petr Jiricka <
- Subject: [73cat] Re: [news] Status Report #9
- Date: Wed, 21 Nov 2012 10:03:32 +0100
I also agree we should prefer and bundle Tomcat - it's much more popular than TomEE.
Again, it would be great if someone could try out TomEE with the current 7.3 builds to see whether it works and how well, and file enhancement requests for any specific missing features and functionality.
On Nov 21, 2012, at 9:58 AM, Claus Luethje wrote:
I'm not sure TomEE to be a popular server yet (I've just discovered it thanks to this mailing list ^_^).
Many developers work with Tomcat as a servlet container, and other well-known servers for complete Java EE support : WebSphere, GlassFish, etc. If we look for a Java EE compliant version of Tomcat, the Apache foundation already provides this kind of server : Geronimo.
Provide a support for TomEE would be a great feature, but bundling it with NetBeans would be a bit confusing : we already have GlassFish ;)
Javier A. Ortiz Bultrón
Senior Software Quality Engineer
7000 West William Cannon Drive
Austin, Texas 78735
- There was a discussion about application servers. It's okay that you don't see Tomcat as an option when creating an Enterprise Application. Only GlassFish supports EARs however several participants required to extend the offering with TomEE (#212198) and JBoss (#200132). Should TomEE replace Tomcat in Servers or just complement it?
I believe TomEE should compliment Tomcat. TomEE might be overkill for non EE applications although it works on either. I have no issues downloading and setting up TomEE, what’s lacking is the Enterprise Application support like the one for Glashfish. As a summary, I’ll suggest bundling TomEE with Glashfish, but maintaining the current Tomcat support (i.e. allowing to register it and work integrated with the IDE). ************
The information contained in this email and any attachments is the property of ArthroCare Corporation or one of its subsidiaries, and may be confidential. It is for the sole use of the intended recipient(s). If a) you are not an intended recipient or an authorized representative of an intended recipient or b) you have received this in error, you are hereby notified that any review, dissemination, distribution or copying of this transmittal and any attachments is strictly prohibited. If you have received this transmittal in error, please notify the sender immediately and then delete this message, including any attachments.
About this Project | s3://commoncrawl/crawl-data/CC-MAIN-2015-14/segments/1427131303502.37/warc/CC-MAIN-20150323172143-00172-ip-10-168-14-71.ec2.internal.warc.gz | CC-MAIN-2015-14 | 2,527 | 18 |
https://docs.oracle.com/en/cloud/paas/identity-cloud/uaids/import-user-accounts-using-oracle-identity-cloud-service-ui.html | code | You can perform a full sync import of the user accounts of third party cloud applications using a flat file in the Oracle Identity Cloud Service UI. In a full sync import, the imported user accounts in the CSV file replaces any existing user who is already assigned into the application.
- Create a CSV file for import in the following format or download the CSV file along with user data from the target system apps:
ID, NAME, ACTIVE [email protected],[email protected],true
This table provides a description of the attributes in the CSV format file:
Attribute Name Description Sample Value
The unique identifier of the account in the target.
The name of the account.
NAME is the primary input that is matched with the username of a particular user in Oracle Identity Cloud Service.
The status of the account on the target. The possible values are
If the value is
true, the user account is imported and activated. If the value is
false, the user is imported in a deactivated state.
- In the Admin Console, expand the Navigation Drawer, and select Applications.
- Select the required application in which you want to import user accounts.
- Navigate to the Import tab.
Note:Import from CSV file is enabled for applications that support flat file synchronization.
- Refresh the page to view the import result. If the import succeeds, then the user accounts present in the CSV file displays.
- Select Users tab to view the imported users.
Note:You need to refresh the Users tab to view the imported users.
- Observe that the users with a
truevalue for ACTIVE attribute are activated. However, if a user account has
falsevalue for ACTIVE attribute, the user account is imported in a deactivated state.
Note:The Users tab displays only the matched and confirmed users.
- Synchronize the imported user accounts. | s3://commoncrawl/crawl-data/CC-MAIN-2020-34/segments/1596439738819.78/warc/CC-MAIN-20200811180239-20200811210239-00100.warc.gz | CC-MAIN-2020-34 | 1,819 | 24 |
https://sc17.supercomputing.org/index.html%3Fpost_type=page&p=5407&id=wkpr146&sess=sess435.html | code | · Presenters · Organizations · Search
Workshop: In Situ Visualization with Task-Based Parallelism
TimeSunday, November 12th11:35am - 11:55am
DescriptionThis short paper describes an experimental prototype of in situ visualization in a task-based parallel programming framework. A set of reusable visualization tasks were composed with an existing simulation. The visualization tasks include a local OpenGL renderer, a parallel image compositor, and a display task. These tasks were added to an existing fluid-particle-radiation simulation, and weak scaling tests were run on up to 512 nodes of the Piz Daint supercomputer. Benchmarks showed that the visualization components scaled and did not reduce the simulation throughput. The compositor latency increased logarithmically with increasing node count. | s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224647810.28/warc/CC-MAIN-20230601110845-20230601140845-00782.warc.gz | CC-MAIN-2023-23 | 807 | 4 |
https://orionrobots.co.uk/wiki/rcx_code.html | code | This is the language that is shipped with the Lego RCX. It is designed to be familiar feeling to new programmers who are more comfortable with the real physical Lego bricks - and so tries to emulate their simplicity in the code.
It is very easy to use, very colourful, and is probably the best introduction for very new users. The introductions, and the Mindstorms constructopedia will get them up to speed with very basics of robot control and feedback. Even for some of those with experience programming desktops, programming robots can sometimes be a little different and this is a gentle introduction before trying to get the alternatives like Mindscript, NQC, Lejos or BrickOS running.
There are no variables, and the use of subroutines is very, very simple - with no concept of parameters. You cannot do complex manipulation of the motor, sensor or IR ports. You cannot store or log data. | s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679103558.93/warc/CC-MAIN-20231211045204-20231211075204-00564.warc.gz | CC-MAIN-2023-50 | 894 | 3 |
https://tophat.github.io/monodeploy/faq/ | code | Can Monodeploy be used without Yarn Modern/Berry?
No. Monodeploy uses Yarn Modern's public API to do most of the heavy lifting in reading and writing to your project.
Yes. The only requirement is that you organize your project using Yarn Berry (i.e. Yarn v3+). You can create a minimal Yarn project by creating a root package.json and then one package.json per package/workspace. In this scenario, you likely want to use the "No Registry" mode.
Although designed for publishing to NPM, you can disable all npm interactions by passing in a --registry-mode manifest flag to the CLI or setting registryMode to manifest in your config file. A registry mode of manifest will set the package.json of each workspace as the source of truth for versions. This means when reading package versions, the package.json is used instead of reading from NPM. Likewise, package publishing to npm is also disabled. If using the "Manifest" registry mode, you should also enable --persistVersions (persistVersions) and commit the modified package.json files to your repository, otherwise there's no proper reference for the package versions.
How can I preview changes before publishing?
You can run:
yarn monodeploy --dry-run --changeset-filename=-
to implicitly disable logs and only output the changeset data. This is useful for previewing changes or determining which packages will be modified from a Pull Request.
Packages I haven't modified are being published with a patch version bump, what's going on?
In addition to the version strategies associated with packages explicitly modified via your commits, what we call the explicit version strategies, Monodeploy will also perform a patch version strategy bump to all dependent packages, what we call implicit version strategies. The idea behind this is that when you run tests and do development in your monorepo, you are always working with the latest packages. Therefore if Package-A depends on Package-B and Package-B has been modified, we also want to release a version of Package-A where Package-A's version range for Package-B has been increased. This Package-A that a downstream project consumes will then be guaranteed to be using the same version of Package-B that is used in the monorepo itself.
As an added benefit, downstream projects using systems like Renovate or Dependabot, will also receive updates for Package-A that will bring in the updated Package-B.
If there is a use case where you believe this behaviour is does not make sense, please open an issue and we'll be glad to discuss.
Note that when using package groups (equivalent of Lerna's fixed mode), the highest version strategy from among each group is chosen. In this case, you may find a dependent package with a minor or even major version bump, assuming such a strategy exists for an intentional bump within said group.
How does Monodeploy handle private packages?
Private packages, i.e. packages containing a private: true field in their manifest, are includes as part of dependency graph traversal and in determining version strategies, but are not published to any registry. Monodeploy filters out private packages from git tag creation as well.
Note that the top level workspace is a special case. It is neither published, nor considered part of the dependency graph. In other words, all dependency paths are terminated at the top level workspace rather than traverse through this workspace.
How can I manually trigger a release (i.e. ignore commits)?
Monodeploy is intended to be entirely automated based on semantic commits. As a result we have not prioritized any manual modes. If manual releases are what you prefer, you may be more interested in the official Yarn Version Plugin. Otherwise, feel free to open a GitHub issue to discuss.
How can I achieve behaviour similar to Lerna's fixed version mode?
Starting in Monodeploy v3, fixed version mode can be achieved by setting the packageGroupManifestField in your monodeploy configuration, or via the CLI argument. This config option should be set to some field in each workspace's manifest file to indicate fixed version grouping. For example, you can add a "group" field set to "components" for some workspaces and "utils" for other workspaces. Monodeploy will then ensure all workspaces with changes (or dependent changes) in the "components" group have the same version bump. To achieve fixed versioning of all workspaces, you need to specify a field that all workspaces have in common. You can also enforce this with the use of the Yarn Constraints plugin.
How does Monodeploy differ from:
Unlike Lerna, Monodeploy was designed with Yarn Berry support from the ground up and is optimized for Yarn monorepos. In terms of raw functionality, Monodeploy supports a workflow where versions are not committed back to the git repository. This is useful when it is not feasible to commit back to a repository in CI (for example when using a tool such as Jenkins with many concurrent developers working in a project).
Yarn's Version Plugin
At a high level, Monodeploy is meant for entirely automated workflows, whereas Yarn's version plugin takes a more hands on approach. Monodeploy started out as a Lerna replacement to solve some issues we were having internally with Lerna, and so Lerna's features were the ones we were striving to attain parity with. Read through the Yarn Version Plugin documentation and decide which workflow you prefer, there will be pros and cons to either. | s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296945144.17/warc/CC-MAIN-20230323100829-20230323130829-00072.warc.gz | CC-MAIN-2023-14 | 5,453 | 24 |
https://answers.flexsim.com/articles/49872/operator-utilization-by-shifttime-period.html | code | Many simulation models need to show operator or machine utilization by time period of day, or per shift:
Under Construction Summary
Until this article is completed, here is the basic idea. I use a process flow to create one token per operator in the group. Each operator token creates one token per shift. The shift token creates its own Categorical Tracked Variable (which is how state information is stored on all objects). The shift token just remains alive, holding the tracked variable.
The oeprator token goes into a loop, listening to OnChange of the 3D Operator's state profile node. Whenever the state changes, the token sets the shift token's state label to the same state. This essentially copies the state changes onto another tracked variable. Another child token listens for when the shift changes. When the shift changes, the operator token puts the current shift profile into some unused state (STATE_SCHEDULED_DOWN, in this case), and then applies new state changes to the correct shift token's label.
A Statistics Collector listens for when the Operator token starts the main loop at the beginning of each shift. When this happens, the collector saves a row value that is an array, composed of the operator and the shift token. The row mode is set to unique, so that each unique combo of operator/profile gets its own row.
Each column in the collector is made to show the data from the shift corresponding to that row. The result is the table shown in the article, which can be plotted with a pie chart as shown above. | s3://commoncrawl/crawl-data/CC-MAIN-2021-49/segments/1637964362571.17/warc/CC-MAIN-20211203000401-20211203030401-00012.warc.gz | CC-MAIN-2021-49 | 1,536 | 6 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.