url
stringlengths 13
4.35k
| tag
stringclasses 1
value | text
stringlengths 109
628k
| file_path
stringlengths 109
155
| dump
stringclasses 96
values | file_size_in_byte
int64 112
630k
| line_count
int64 1
3.76k
|
---|---|---|---|---|---|---|
http://cowbell.typepad.com/forty_deuce/2010/08/roadtrippin-with-steph-and-court.html | code | Steph and I ramble for an hour on topics ranging from Sam, Sam, and Sam. Not really. But we do talk about Stanford, San Diego, the Besties, Sam, and my dislike of "hot guys".
And I finally come out. As straight.
I promise I wasn't drunk. I sound drunk. I wish I was drunk. | s3://commoncrawl/crawl-data/CC-MAIN-2018-43/segments/1539583517376.96/warc/CC-MAIN-20181023195531-20181023221031-00076.warc.gz | CC-MAIN-2018-43 | 272 | 3 |
https://jobspringpartners.com/jobs/270277 | code | Simulation Software Engineer
Our client is developing an autonomous vehicle fleet and the necessary ecosystem required to bring this tech to market. Being at the intersection of AI, robotics, and design, they aim to provide the next generation of mobility in urban areas.
The simulation team is developing the most advanced simulation engine and framework for autonomous technology. As a simulation engineer, you will work closely with several engineering teams on various domains including motion planning, mapping and localization, sensor technology, computer vision, and machine learning. You will work on the advanced simulation framework developing key features including but not limited to accurate LIDAR and radar simulation, high-fidelity graphics rendering, content creation tools for realistic virtual cities, and scenario creation and execution pipelines for scalable and verifiable vehicle testing.
- Strong knowledge of C++ and experience in large code bases
- BS degree in Computer Science or equivalent
- Solid knowledge of 3D geometry and linear algebra
- Comfortable in Linux and Windows development environments
- Game engine programming experiences
- Unreal engine programming experience
- Programming and maintenance experience on large infrastructure systems
- Publications on simulation technologies for deep learning or other vehicle systems
- Experience shipping a large product as a team (e.g. AAA game releases)
Benefits & Perks
- Competitive salary and benefits including matched 401k, medical / dental / vision, AD+D and Life
- Paid parental leave
- Flexible vacation and 10 paid company holidays | s3://commoncrawl/crawl-data/CC-MAIN-2018-22/segments/1526794864063.9/warc/CC-MAIN-20180521102758-20180521122758-00617.warc.gz | CC-MAIN-2018-22 | 1,624 | 16 |
https://stats.stackexchange.com/questions/322543/is-redundancy-across-different-modalities-required-in-multimodal-machine-learnin | code | There are lots of articles available pertaining to 'multi-modal machine learning'.
Among the major challenges, there is a one of representation i.e. "how to represent and summarize multi-modal data in a way that exploits the complementarity and redundancy of multiple modalities"
In context to the above quoted text, it is quite clear that complementarity across different modalities needs to be exploited for better performance. What about redundancy ? Do we need to preserve the redundant data present across different modalities ?
Kindly explain the same. From the notion of dimensionality reduction and similar concepts, I do not see any point in preserving the redundancies as such. Any counter explanation ?
By the way, the above quoted text could be found in "Multimodal Machine Learning:A Survey and Taxonomy" by Tadas Baltrušaitis, Chaitanya Ahuja, and Louis-Philippe Morency , 2017 available at https://arxiv.org/pdf/1705.09406.pdf on the first page itself. | s3://commoncrawl/crawl-data/CC-MAIN-2020-45/segments/1603107889574.66/warc/CC-MAIN-20201025154704-20201025184704-00697.warc.gz | CC-MAIN-2020-45 | 968 | 5 |
http://www.simplyhired.com/a/jobs/list/q-developer/l-san+ramon%2C+ca/pn-8 | code | developer jobs near San Ramon, CA
Refine your searchClear Filters
IOS Developer,Alameda, CA,Full Time
Infoways - Alameda, CA
Job Description: To manage and ensure that the project schedules are adhered to as per the client specifications and deliveries are as per the time and
Lead Product Engineer
John Muir Health - Walnut Creek, CA
Minimum two years in team leadership roles using Agile and XP methodologies and capable of mentoring and supporting developers....
Responsive Web Developer (Locals Only)
Halcyon Solutions, Inc. - Pleasanton, CA
Halcyon SolutionsFor Over 22 Years, Halcyon Solutions has been delivering high-impact Solutions that help our clients maximize the value of their existing and
BI Developer/Data Integration
Clorox - Pleasanton, CA
BI Developer/Data Integration Engineer, Information Technology Huskey, Chad 26 Information Technology Information Technology Pleasanton California
AEM Developer/Lead/Architect - 1018
Reqroute Inc - Pleasanton, CA
JD for AEM Developer. Our client (Fortune 500 company) is looking for AEM Developer/ Lead in Pleasanton, CA, USA....
Java Developer and Forgerock SME
Virat Inc - Pleasanton, CA
Our security consulting practice is looking for a Senior Java Developer / Forgerock Expert to join our team for multiple high profile projects.Working...
Software Manager, User Interface - v1 (New) Project - User Interface (HTML5/CSS3)
Verticalmove - Pleasanton, CA
Manage and Scrum Master one or more teams of 8-10 Software Developers who work on multiple releases each year....
Software Engineer - Microservices
Workday - Pleasanton, CA
We want passionate developers who love technology, upward mobility and want to make an impact. Work effectively in an Agile / Scrum methodology to deliver...
Java UI Developer
Stratedge, Inc - San Ramon, CA
Sr. Salesforce Developer, San Ramon, CA
Mason Frank International - San Ramon, CA
Certified Salesforce.com Developer (DEV 401) highly desired but not required. This position will also allow you to expand your developer career with an... | s3://commoncrawl/crawl-data/CC-MAIN-2016-30/segments/1469257824133.26/warc/CC-MAIN-20160723071024-00157-ip-10-185-27-174.ec2.internal.warc.gz | CC-MAIN-2016-30 | 2,031 | 31 |
https://deducteam.gitlabpages.inria.fr/seminars/200130.html | code | Thursday 30 January 2020, 14:00, LSV library: Functional Verification of Tezos Smart Contracts in Coq, Raphaël Cauderlier (nomadic labs).
Smart contract blockchains such as Ethereum and Tezos let their users program their crypto-money accounts. Bugs in these smart contracts can lead to huge losses. Yet smart contracts are necessarily small programs because checking the blockchain requires to evaluate all the smart contract calls in the history of the chain. For these reasons, smart contract languages are a good spot for formal methods.
The Tezos blockchain and its smart contract language Michelson have been designed with verification in mind. In this talk, I will present Mi-Cho-Coq, a formal specification of Michelson in the Coq proof assistant, and its applications for functional verification and certified compilation. | s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100779.51/warc/CC-MAIN-20231208212357-20231209002357-00333.warc.gz | CC-MAIN-2023-50 | 832 | 3 |
https://mail.python.org/pipermail/python-announce-list/2019-January/012153.html | code | ANN: gcc-python-plugin 0.17
dmalcolm at redhat.com
Wed Jan 23 16:04:25 EST 2019
gcc-python-plugin is a plugin for GCC 4.6 onwards which embeds the
CPython interpreter within GCC, allowing you to write new compiler
warnings in Python, generate code visualizations, etc.
This release adds support for gcc 9 (along with continued support for
gcc 4.6, 4.7, 4.8, 4.9, 5, 6, 7, and 8).
Unfortunately, the reference-count checker no longer works for gcc 7
onwards, so it is disabled when embedded in those builds of gcc.
Additionally, this release contains the following improvements:
* the plugin can now be built in a separate build directory from the
source directory (thanks to Tom de Vries)
* gcc-with-cpychecker gained a --cpychecker-verbose option
Tarball releases are available at:
Prebuilt-documentation can be seen at:
The plugin is Free Software, licensed under the GPLv3 or later.
More information about the Python-announce-list | s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662532032.9/warc/CC-MAIN-20220520124557-20220520154557-00611.warc.gz | CC-MAIN-2022-21 | 933 | 18 |
http://www.sevenforums.com/general-discussion/24280-windows-crashes-non-stop.html | code | I got the Windows RC 7100 build. I got it to replace Vista because vista ran to slow on my system. I've been using it sense it's release and at first it ran fine.No problems. Now, more and more it start blue screening me to death when watching YouTube videos, watching movies on my PC, or trying to play my games. None of which it did at first. Now, it's also just locking up with a high pitch hum from the speakers and when I reboot,the system will freeze unless I hit reset twice. I've up dated everything. No clue now what can be causing it.Help would be super! | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368709101476/warc/CC-MAIN-20130516125821-00075-ip-10-60-113-184.ec2.internal.warc.gz | CC-MAIN-2013-20 | 564 | 1 |
https://illicksmill.org/top-test-engine-secrets-7/ | code | Experience a new way to perform simulation testing of your Simulink model and generated code. The recently introduced Simulink Test product provides an …
Exam simulation is one of the most recent methods in assessing an exam. It’s not like any other test since it may be replayed repeatedly and a vast array of questions can be asked. But how can you tell if it’s a fantastic way to prepare for the real thing? When is it a fantastic idea to use an exam simulator? When is it a waste of time?
There are numerous advantages to using an exam simulator. The first is the capacity to revise and practice. There is no better way to learn a subject than by viewing it in action and reviewing what you’ve discovered. By taking a test simulator, you will have the ability to research and review effectively. This will let you get time to make any mistakes that will cost you the whole test.
Assessment simulators are also a great way to be certain that you research for the actual thing. Just as a real exam will test your knowledge, a simulated exam will test your skills. By reviewing and practicing the content, you can be confident that you are getting ready for the exam when you choose it. In that way if you realize that the material is confusing or you simply cannot grasp it, you will not have missed out on anything essential and you will still pass with flying colours.
Another advantage to test simulation is that you might get far better preparation on the actual exam. By using a simulation it is possible to see what questions will be on the examination. You will know beforehand which questions you should prepare yourself for. This might help you prepare for the examination in a manner that not every student is able to do when taking an actual exam.
Exam evaluation simulations also offer another huge benefit. They allow you to practice answering questions prior to the exam. Now you need to be familiar with how to answer exam questions that you may be asked on the actual exam. With exam simulation you do not have to worry about this. You will simply go through the whole exam and answer every query that you see. This permits you to build up your abilities at answering inquiries, so once you take the real exam you will be more ready than if you hadn’t done any examination simulations.
A last advantage of a test simulator is that it makes it possible to stay away from studying so much. If you’re one of those men and women who can only study a couple of hours per week, then a simulation might help you prevent the entire learning curve. Rather than having to devote a lot of time studying for the examination, you can spend time doing different things. It can also help you avoid studying, which is frequently done by students who don’t take exam simulators.
Assessment simulators are an efficient way to study for and take exams. You can use them at any time of the week, which is convenient for a whole lot of people. They provide students a way to acquire practice before the exam. When these tools may be helpful, you should not rely on them exclusively. You should also practice the very same questions over until you can answer them without any issues.
So, if you are seeking tactics to study for your exams, try an exam simulation. You can buy software that can simulate the examination and help you prepare for it efficiently. You could even locate simulators for college degree exams. These can make the practice of studying for and taking the exam easier for you. | s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323587659.72/warc/CC-MAIN-20211025092203-20211025122203-00268.warc.gz | CC-MAIN-2021-43 | 3,508 | 9 |
http://mail.openjdk.java.net/pipermail/jdk7-dev/2009-June/000711.html | code | Copyright notice referring a company other than Sun
mark at klomp.org
Thu Jun 18 11:07:43 PDT 2009
On Thu, 2009-06-18 at 10:17 -0700, Phil Race wrote:
> So whilst I'm not a lawyer, I'd say that means that all code contributed
> to OpenJDK under SCA can have a full Sun copyright - and probably should
> have that explicitly in the source file. Not just for the new portions,
> but for all of it.
Also not a lawyer, but I think you are right, if Sun would want that.
But it would be enough for Sun to add their own copyright notice if they
want to. And Sun is most likely not entitled to remove any existing
copyright statements in contributions being done under the SCA since
they aren't granted the actual copyright, just a grant to the rights
associated with it (plus patent and moral rights). Meaning that the
copyright itself stays with the contributor. This is different from
other such agreements, which do assign copyright, like the FSF
agreement. The SCA is just a shared rights agreement, not a copyright
We could ask a lawyer of course. But for the public OpenJDK project it
seems that, whatever the nitty-gritty legal details, it isn't a problem
at all having multiple copyright notices. If you go through the sources
you will note that there are lots and lots of additional copyright
statements in the files next to Sun's copyright statements.
In that respect it isn't really an issue for the public project (unlike
what Sun does with their granted rights when not distributing the
contributions under non-free terms and wanting to register any such
rights). And that is a good thing, it tracks the different contributors
and shares the glory a bit in public. IMHO.
More information about the jdk7-dev | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368701153213/warc/CC-MAIN-20130516104553-00003-ip-10-60-113-184.ec2.internal.warc.gz | CC-MAIN-2013-20 | 1,713 | 28 |
http://sharepointconnoisseur.blogspot.com/2013/12/quest-webpart-2013-or-quick-apps-for.html | code | Quest webpart for SharePoint 2010 has been renamed as Quick Apps for SharePoint to support SharePoint 2013. You can unleash the full potential of SharePoint 2013 and 2010—without relying on expensive development resources for every customization and enhancement. If you are upgrading these webparts, you should read my previous blog tips to upgrade Quest webpart on SharePoint 2013. In this blog, we will list the major issues after the upgrade and hopefully there are some solutions or workarounds out there.
The first issue is Quest installation removes the "Session" module for all webapps as in the following screenshot.
"Session" module is used for session configuration like session timeout for our extranet users. We have configured one hour timeout for external users for security reasons. I'm not sure whether we could configure Quest first and enable the session afterward. We would need some confirmation from Dell.
The second issue enable Quest for the large webapp from SharePoint central admin timed out as shown in the following screenshot.
It works for small webapp that contains less site collections. It seems like Quest activation for webapp will add entry to farm property bag. Since large webapp with large amount of site collections needs to insert large amount of property bag that will cause the timeout.
The third issue is related to issues #2 and we found many new property bag entries after activate the Quest on webapp as shown in the following screenshot.
It seems like the Quest is adding the site collection GUID into the farm property bag and there are many entries just entered as "q" without any GUID. This might not causing the timeout when activating Quest, but also might cause farm property bag maintainability issues. If you have any insight information on the reason behind, please let us know.
We are still testing the Quest Quick Apps for SharePoint 2013 at this point. We might found additional issues in the future. | s3://commoncrawl/crawl-data/CC-MAIN-2018-22/segments/1526794867046.34/warc/CC-MAIN-20180525063346-20180525083346-00602.warc.gz | CC-MAIN-2018-22 | 1,961 | 8 |
https://www.danfoss.com/en/about-danfoss/articles/dds/application-software-development-the-final-chapter/ | code | Our previous posts related to the topic of application software discussed how the operation of Danfoss Drive’s products can be customized to suit customer processes simply by tailoring the software. And how customers can have a role in this software development, either directly or indirectly. This post goes a little deeper into the fine points of application software development, as it may be a somewhat unknown area to most readers. More precisely, we will discuss what is expected from the Application Software Developer rather than the actual technicalities of software development.
An Application Software Developer must have a certain knowledge of electrical, automation and software disciplines, as the task involves working with electrical equipment (drives, grids, motors/generators and all surrounding auxiliary devices). He must also have the ability to recognize how the Danfoss Drives products can be incorporated, using software, into the surrounding automation system and process itself. Of course, it isn’t a critical prerequisite to have a background in all of the fields right from the beginning. The necessary know-how on, for example, electrical aspects can be learned on-the-job.
As the function of the Application Software Developer is to customize a product’s operation to a customer process, the developer is a natural participant in any customer meetings regarding the technical aspects. The role that the Application Software Developer can play and the input he can give depends, of course, on his expertise on the subject matter. It can range from being a mere ‘listening student’ to a system-level expert who can point out possible problems in the design and known issues that need to be taken care of by the customer system. He can even identify how certain functionalities the customer wants may not exactly be what he needs and present his own solutions.
Design, development and testing
The application-software-design process naturally starts already in the first meeting regarding the technical aspects. And it culminates in a Functional Requirement Specification document that can be approved by the customer if deemed necessary. Development is carried out in an IEC 61131-3-standard-based PLC programming environment which requires knowledge of the PLC-like system’s special aspects, for example cyclic and special tasks.
Testing can be the most interesting phase as it is at this point that the application developer must build a test setup that emulates as closely as possible the customer’s target system. All VACON® products are inherently scalable, so emulating operation of a megawatt-level system can be carried out using kilowatt-level equipment. And, as the control boards are the same between all size-class products, the same software works the same way in all products.
Commissioning, and field use in general, are very important aspects of software development. Their importance for the developer’s own and for the application software’s development shouldn’t be overlooked. Only then is the developer capable of getting actual first-hand experience, and can see how the application software can be enhanced even further. I have personally always asked how an engineer can possibly develop good products to be easily and reliably used in the field, if he himself never goes in the field and uses the products himself? There might be people who are able to do that from their office desk; but my opinion is that any and all developers, especially application software developers, have to go to the field at some point and actually see the outcome of their work in its ‘natural environment’.
Software maintenance involves changes to the software in the form of new functionalities and bug fixes. If the software in question is customer-specific software, it makes the changing of the code less stressful as the developer does not need to worry so much about breaking some functionality that another user may need. Adding special new functionalities to commonly used application software that is used by many different users makes the changes much more challenging and time consuming. One prudent action in extreme cases can be that the user is instructed to use another software which has almost the same functionality and the change is implemented there.
For some developers, bug fixing can be quite an interesting job. As the Application Software Developer is often working with, for example, rotating motors in part of a large system like a paper machine, additional spice is brought to the role as you cannot just stop the process to check what the output of some function was. Alternative methods have to be used for debugging than those that are available, for example, in PC software development, like simultaneous online monitoring of multiple drives/inverters and dataloggers triggered by some predetermined events. Depending on the developer and the case in question, bug fixing can sometimes be a straightforward process of finding the typo and fixing it. But, on the other hand, it can be described as completing a jigsaw puzzle depicting an action film (sometimes with real explosions) where the puzzle parts are just very small portions of still frames recorded with a colorblind camera which is not necessarily pointing at the action!
This has been a small and limited peek into the duties and responsibilities of Application Software Developers. I hope that it gives an idea of what is expected from you if you want to apply for an Application Software Developer position or you are thinking of taking over Application Software Development for your own company. Both options are very welcome to Danfoss Drives.
Author: Timo Alho, Product Manager, Applications, Danfoss Drives | s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817128.7/warc/CC-MAIN-20240417013540-20240417043540-00424.warc.gz | CC-MAIN-2024-18 | 5,764 | 11 |
https://github.com/colebemis/carbon | code | A simple, lightweight and responsive CSS grid system
Carbon makes it easy to create complex layouts without the baggage of an entire framework. Carbon dynamically generates columns based on user specifications and supports both Stylus and Sass.
Clone the repository.
git clone https://github.com/colebemis/carbon.git
Or download the .zip. Then copy the desired stylesheet (
carbon.styl) into your project directory.
Use the Sass and Stylus variables to customize the grid to fit your needs.
||Controls number of column divisions (e.g.
||Sets max-width of
||Sets column gutter width|
||Used in media queries to define seperation between small and medium screen sizes|
||Used in media queries to define seperation between medium and large screen sizes|
Using the preprocessor of your choice, compile the stylesheet. Carbon currently supports Sass and Stylus, with Less support coming soon.
4. Link the Stylesheet
Link the stylesheet in the
<head> of your HTML document.
<link rel="stylesheet" href="path/to/carbon.css">
5. Add the Viewport Meta Tag
Place the following meta tag in the
<head> of your HTML document. This enables use of media queries for cross-device layouts.
<meta name="viewport" content="width=device-width, initial-scale=1">
Carbon follows the same basic structure as many other grid systems.
<div class="container"> <div class="row"> <div class="column small-1-of-3"> ... </div> <div class="column small-2-of-3"> ... </div> </div> </div>
Carbon is mobile-first grid system, meaning code for small screens will be inhertited by larger screens unless otherwise specified.
Apply these simple classes to your HTML elements to create a beautiful and responsive layout.
||Controls page max-width and centers page in window|
||Can be combined with
||Applies base styles for every column| | s3://commoncrawl/crawl-data/CC-MAIN-2018-30/segments/1531676592309.94/warc/CC-MAIN-20180721032019-20180721052019-00438.warc.gz | CC-MAIN-2018-30 | 1,798 | 28 |
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=211889 | code | $ cat hello.f
print *, "Hello World!"
end program hello
$ gfortran6 hello.f
/lib/libgcc_s.so.1: version GCC_4.6.0 required by /usr/local/lib/gcc6/libgfortran.so.3
With the `-Wl,-rpath,/usr/local/lib/gcc6` flag recommended by `pkg install gcc` it does run successfully. But it seems that a compiler should be able to link itself (e.g. I haven't had the problem before with other non-default compilers on other systems)?
(noticed because ./configure in arpack immediately failed with the above error)
(tested with FreeBSD 11.0-rc1, downloaded as a VM image)
forgot to mention, gfortran installed via `pkg install gcc6`
Sorry, should be gcc6, not gcc48.
Right, (I had also tried with both those versions of gcc). I know about that LD_LIBRARY_PATH workaround, I wanted to know whether it was possible to have gfortran manage to build correctly on its own.
Could it search its own path (`/usr/local/lib/gcc6`) before `/lib`, or to hide libgcc_s.so from the default search path, or some similar such action (does -rpath-link do this?). It seems pkg doesn't contain a version of gcc old enough to use with this library file, so I can't use that approach.
Some things that seemed to work:
- adding `-rpath=/usr/local/lib/gcc48` to /usr/local/lib/gcc48/libgfortran.spec
- deleting `/lib/libgcc_s.so.1`
Thank you for the report Jameson
I'm hunting this down for this and related issues in many ports that are a consequence of what appears to be this underlying issue. See bug 207750 as an example, ignore the "depends on bug 208120" part, it doesn't.
The spec suggestion looks interesting.
Seems to be fixed now. | s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593657139167.74/warc/CC-MAIN-20200712175843-20200712205843-00163.warc.gz | CC-MAIN-2020-29 | 1,602 | 19 |
http://www.desalmand.com/site/music/solo/page/2/ | code | I write and produce the music for the Stauffer play Schwanenjagd. Nina Hartwig is the director, we play at Schlachthaus, Bern, Rote Fabrik, Zürich and on two stages in Thurgau. During the time in Zürich I play a late night gig (at Rote Fabrik as well) with Stauffer and a solo laptop show at Rohstofflager. And I am preparing the album release Tapidor. It is the first time I really think that I need a mobile phone.. | s3://commoncrawl/crawl-data/CC-MAIN-2021-31/segments/1627046154897.82/warc/CC-MAIN-20210804174229-20210804204229-00578.warc.gz | CC-MAIN-2021-31 | 419 | 1 |
https://forum.plasticscm.com/profile/33833-sunsailor75/ | code | No, I don't think that is the whole truth. I don't have access to the server license, as I'm an employer to the company licensing the enterprise edition. So I don't have a license file or such to run the local server on the enterprise level. However, I'm a paying subscriber to the cloud edition, where - as it seems to me - a seperate server is provided, as it listens on the 8084 by default and not the 8087, like the enterprise server.
At work, the git like two step workflow is not used, because they are handling a big chunk of binary data, working with Unreal. I on the other side am, working with Unity, which uses text files for serialization. Therefor, and because the connection issues I sometimes encounter, would like to keep the two step workflow for the cloud based projects.
If I try to work with the existing configuration, the sync view tries to connect with a server at 127.0.0.1:8084, which doesn't respond, as there is none. What I need now - at least from my understanding - is a local server licensed to your cloud service, just as the cloud edition provides. Or may this be only a configuration issue? At least it didn't run out of the box after installing the enterprise client on my machine with the previous cloud edition. The only server running locally runs at 8087, is an enterprise one and expects a license before expiring from the evaluation period.
I can run the cloud projects with the one step workflow, so I don't have a problem to connect with the cloud projects in general. I'm "simply" missing the local server between the client and the cloud to be utilized for cloud projects, while the enterprise server hosted by my employee uses the single step workflow. | s3://commoncrawl/crawl-data/CC-MAIN-2020-34/segments/1596439738864.9/warc/CC-MAIN-20200812024530-20200812054530-00598.warc.gz | CC-MAIN-2020-34 | 1,698 | 4 |
https://rlevchenko.com/category/azure-stack/ | code | Azure Stack is a hybrid cloud platform that lets you deliver Azure services from your organization’s datacenter. Microsoft Azure Stack Technical Preview 3 is being made available as a Proof of Concept (POC). The POC is an ideal environment for learning and demonstrating Azure Stack features.
Microsoft is also announced that Azure Stack will be available via Enterprise Agreement (EA) and Cloud Solution Provider Program (CSP)
In addition to bug fixes and other improvements, here’s the list of new features:
- Active Directory Federation Services (AD FS) support provides identity options for scenarios where network connectivity is limited or intermittent.
- You can use Azure Virtual Machine Scale Sets to provide managed scale out of workloads.
- Use Azure D-Series VM sizes for increased performance and consistency.
- Deploy and create templates with Temp Disks that are consistent with Azure.
- Marketplace Syndication allows you to use content from the Azure Marketplace and make available in Azure Stack.
- Isolated administrator and user portals and APIs provide enhanced security.
Use enhanced infrastructure management functionality, such as improved alerting.
- Using the Windows Azure Pack connector, you can view and manage IaaS virtual machines that are hosted on a Cloud Platform System (CPS) stamp. For this preview release, you can try this only with a CPS environment and additional configuration is required.
Windows Server 2016 and System Center 2016 are GA
Windows Server 2016 is available for evaluation and will be on the October price list. Volume licensing customers will be able to download fully licensed software at General Availability in mid-October.
Windows Server 2016 also comes with the built-in support of containers and commercial version of Docker engine without additional charge!
System Center 2016 Evaluation is here . What’s new in System Center 2016?
UPDATE (10/12): WS2016 and SC2016 became available @MSDN and @Azure + UR1 for System Center 2016 and CU for WS2016 + https://support.microsoft.com/en-us/kb/3192366
+ today MS has published pre-configured VHDs to help you quickly evaluate new SC 2016 features
See my previous posts to get what’s new in Windows Server 2016 (Hyper-V, RDS, MultiPoint) and also check the updated technet articles : WS 2016 and SC 2016
TIP: I’d not recommend to use evaluation version in production. Wait while fully licensed media becomes available.
Azure Stack Technical Preview 2
In fact, Azure Stack TP2 announcement was described earlier in this blog post (TP2 rolled out for some “vip” customers). At Ignite MS confirmed GA for Azure Stack TP2.
And now you can try this new preview here + read what’s new in Azure Stack TP2 and review Azure Stack Architecture
More info about this announcement: New ideas, new solutions, new technical preview of Azure Stack
SQL Server supports Storage Spaces Direct
SQL Server 2016 will support deploying databases on Storage Spaces Direct (S2D).To build up S2D you need from 2 to 16 servers with local-attached SATA, SAS, or NVMe drives and dedicated network between hosts (10+GbE with RDMA is recommended)
Continue reading “Ignite 2016 Key Announcements” | s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296949387.98/warc/CC-MAIN-20230330194843-20230330224843-00423.warc.gz | CC-MAIN-2023-14 | 3,191 | 26 |
https://helpcenter.veeam.com/docs/vbgc/guide/sql_account_summary.html | code | Step 4. Finish Working with Wizard
At the Summary step of the wizard, review summary information and click Finish.
After you add the Cloud SQL account, you will be able to specify this account while creating backup policies to allow Veeam Backup for Google Cloud to access source Cloud SQL instances. For more information, see Performing SQL Backup. | s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474470.37/warc/CC-MAIN-20240223221041-20240224011041-00010.warc.gz | CC-MAIN-2024-10 | 349 | 3 |
https://se.is.kit.ac.jp/compsac2015taichung/ | code | Mr. Mori presented his paper in COMPSAC2015 at Taichung, Taiwan.
He also got the second place of student paper award in this conference.
K. Mori and O. Mizuno, “An Implementation of Just-In-Time Fault-Prone Prediction Technique Using Text Classifier,” In Proc. of the 39th IEEE Computers, Software, and Applications Conference (COMPSAC 2015), pp. 609-612 July 2015. (Taichung, Taiwan) | s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446711045.18/warc/CC-MAIN-20221205200634-20221205230634-00039.warc.gz | CC-MAIN-2022-49 | 388 | 3 |
https://www.valhallasgate.com/index.php/forum/lfg-rpg/34-two-players-looking-for-d-d-5e-group | code | Two players looking for D&D 5e group
- Topic Author
- New Member
- Posts: 1
- Thank you received: 0
My wife and I are both looking for a D&D (5th edition) group in the Columbia/Fulton/Jeff City area. We're new to D&D, but we've played similar tabletop RPGs before. We have the player handbook and some character drafts ready to go. We can bring our own dice, snacks, and opinions on which Star Trek series was best.
You can reach me at agkilmer [at] gmail.com. Shoot me an email if anyone knows of a group with room to spare! | s3://commoncrawl/crawl-data/CC-MAIN-2021-21/segments/1620243989814.35/warc/CC-MAIN-20210513142421-20210513172421-00023.warc.gz | CC-MAIN-2021-21 | 525 | 7 |
http://amerinzpodcast.com/?p=1701 | code | After that, I talk about some updates since the last episode, including some progress-ish. I also mention that my Dad’s 100th birthday was Feb 25. I blogged about that, of course.
Be sure to Like the AmeriNZ Facebook Page for all things AmeriNZ!
There are several ways to send me an audio message—this earlier post lists them. | s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917123632.58/warc/CC-MAIN-20170423031203-00429-ip-10-145-167-34.ec2.internal.warc.gz | CC-MAIN-2017-17 | 330 | 3 |
https://www.experts-exchange.com/questions/21178012/Error-trying-to-Import-a-file-from-my-system-into-my-web-Erroraccessing-your-FrontPage-Webfile.html | code | I'm using FrontPage 2000. Its running on a Win 2000 machine with every service pack known to man.
When I try to "Import" a file from my local hard drive into my web I get the following error:
"An error occurred accessing your FrontPage Web files. Authors - If authoring against a web server, please contact the Webmaster for this server's site. Webmasters - please see the server's system log for more details."
I'm not authoring against a web server or is there any Webmaster or server involved. Just my local hard drive.
I've rename the file, moved the file to different directories, changed the extension of the file - no luck. I'm able to import smaller (Under a meg) files without incident. However, the file I'm trying to import is replacing a file of the same name and size that I was able to import before? So I can't believe its a file size issue. The original website was developed in the same software (FrontPage 2000) but on a Win 98 SE machine. | s3://commoncrawl/crawl-data/CC-MAIN-2018-34/segments/1534221216718.53/warc/CC-MAIN-20180820160510-20180820180510-00271.warc.gz | CC-MAIN-2018-34 | 957 | 5 |
http://www.zacharyschomburg.net/lovelyarc/tag/Erin+Perry | code | Two days ago, I walked into Division Leap, a small and curated poetry archive of a bookstore just south of 9th and Burnside, with only about 5 minutes to spare in there, and instantly knew something about the good parts of the world. I fell madly and quickly and how. If you want to find me next week, in the early afternoon, I’ll be in a chair, in Division Leap, breaking into small parts, jumping off tiny edges, and becoming better.
And on November 8, I’m going to read poems publicly inside of Division Leap as part of the SLEEP series. SLEEP 4 with Michael McGriff and Erin Perry. Please be there, and please be less square. | s3://commoncrawl/crawl-data/CC-MAIN-2019-47/segments/1573496664808.68/warc/CC-MAIN-20191112074214-20191112102214-00146.warc.gz | CC-MAIN-2019-47 | 633 | 2 |
https://steamdb.info/patchnotes/7948387/ | code | We were planning to add 5 more vehicles to the game this week but found that
we had to do a lot of work for optimizing the runtime code.
Now there is no chance to run out of memory or cpu when you switch scenes multiple times in the game.
Additionally I fixed a few missing things on 10 vehicles added last week
and made some more improvements on engine and transmissions.
We hope more players for our game in the new year and wishing happy new year to everyone. | s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474523.8/warc/CC-MAIN-20240224044749-20240224074749-00380.warc.gz | CC-MAIN-2024-10 | 462 | 6 |
https://www.oreilly.com/library/view/blender-game-engine/9781849517027/ch06s06.html | code | Time for action — animating the hunter
We have learned to animate our character, so we are able to encourage our enemy by creating a simple route to the left and right, like a sentinel on the lookout. If the whale is too close to be seen, we can create a random pursuit until the whale submerges.
- Create a scene similar to the one shown in the following screenshot, with a whale, a ship, and two icebergs. Select the ship and set an action moving the ship in the x axis to different values. Insert a keyframe on frame 0, and insert another keyframe on frame 100 with another position.
- Go to Logic Editor and select the ship. Add the Always sensor, And controller, ... | s3://commoncrawl/crawl-data/CC-MAIN-2019-13/segments/1552912202589.68/warc/CC-MAIN-20190322014319-20190322040319-00256.warc.gz | CC-MAIN-2019-13 | 673 | 4 |
http://watchdog.net/empl/kp_public_affairs | code | Contributions from employees of Kp Public Affairs
Political contributions disclosed by campaign committees to the Federal Election Commission, sorted by employer. The data, from the FEC, covers the years 1979 through 2008.
|$2,750 from 6 Kp Public Affairs employees (75.0%) to Barack Obama|
|$1,000 from 1 Kp Public Affairs employee (12.5%) to Christopher Dodd|
|$500 from 1 Kp Public Affairs employee (12.5%) to K. Speier| | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368705948348/warc/CC-MAIN-20130516120548-00001-ip-10-60-113-184.ec2.internal.warc.gz | CC-MAIN-2013-20 | 423 | 5 |
http://stackoverflow.com/questions/6997391/placing-the-like-button-of-a-fan-page-in-the-middle-of-a-landing-page | code | I wanted to know if it is possible to add the like button of a Facebook fan page(which is normally placed on the header of the page), as being embedded inside a landing page. I know I can make use of the like button generator given by Facebook http://developers.facebook.com/docs/reference/plugins/like/ , but I am after getting the like button of a fan page (which in reality is visually different than the like button that is generated at the above mentioned link). If indeed there is a way , please let me know. I welcome your suggestions.
Regards, Ghulam Mustafa Majal | s3://commoncrawl/crawl-data/CC-MAIN-2016-07/segments/1454701168076.20/warc/CC-MAIN-20160205193928-00316-ip-10-236-182-209.ec2.internal.warc.gz | CC-MAIN-2016-07 | 572 | 2 |
http://community.babycenter.com/post/a4312385/any_one_a_member_of_..... | code | Dachshund Haven website?
or can you tell me if black and tans usually have some gray/white on the belly ?
There's a pict of our pup there (the breeder sent me the link) and it it looks like our little black and tan may actually have some dappeling - his belly and some on the paws looks to be a big gray/white in the photo - as does a bit around his eye.
I'm not comfortable sending the link - or posting it but if you are a member and can access the area I'd love to know what you think :)
If she sends me the actual photo I'll ask if she minds me sharing it here. | s3://commoncrawl/crawl-data/CC-MAIN-2016-07/segments/1454701158481.37/warc/CC-MAIN-20160205193918-00084-ip-10-236-182-209.ec2.internal.warc.gz | CC-MAIN-2016-07 | 565 | 5 |
https://flutterflux.com/post/best-practise-for-posting-password-to-php-mysql-server-from-flutter | code | I'd like passwords to be stored as encrypted/hashed on a Mysql database. But I'm unsure whether the encryption/hashing should take place at Flutter's Android app side or the servers PHP/Mysql side.
Here's the code for sending the HTTP query from within the Flutter app:
Is this too dangerous? Can it be intercepted when sent by a Flutter/Android app? Is there a better way to do it? | s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500813.58/warc/CC-MAIN-20230208123621-20230208153621-00723.warc.gz | CC-MAIN-2023-06 | 382 | 3 |
https://www.currentboutique.com/product/sigerson-morrison---black-pointed-toe-loafers-w--lug-sole-sz-75-cb27289-95?c=21 | code | Amp up your style with these ultra-trendy loafers from Sigerson Morrison! Made with supple polished leather, these pointed-toe beauties feature a thick lug sole and gold-toned accent hardware. These are the ultimate throwbacks to wear with skinny ankle trousers or your favorite jeans!
- Size 7.5
- Leather upper
- Pointed toe
- Gold-toned hardware
- Embossed snakeskin detailing
- Thick lug sole
- Leather footbed with very little wear
- Stacked wooden heel
- Leather sole with wear
- Heel 2.45"
FREE US SHIPPING!
HASSLE-FREE ONLINE RETURNS
Clothing and shoes bought online may be returned for online store credit or a full refund up to 14 days after receiving the item. Once we receive the item by mail we will credit your online account or issue a refund.
All Bags, Accessories and 50% OFF items are final sale.
All items marked as Final Sale are not eligible for return. We will review your items and process your return as quick as possible. *All in-store purchases are final sale.
WHERE WE SHIP
We ship via USPS to street addresses in the U.S, and to many international destinations. We ship every Monday through Friday, excluding holidays.
Sigerson Morrison - Bronze Caged Mule Sandals w/ Block Heel Sz 7.5$95.99
Sigerson Morrison - Black Leather Strappy Kitten Heels Sz 6.5$74.99
Sigerson Morrison - Black Patent Leather Booties Sz 6$168.99
Sigerson Morrison - Brown Suede Boots Sz 10$208.99
Sigerson Morrison - Black Suede Alligator Print Wedges Sz 7$48.99
Sigerson Morrison - Black Suede Mules Sz 6.5$42.99 | s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585371896913.98/warc/CC-MAIN-20200410110538-20200410141038-00278.warc.gz | CC-MAIN-2020-16 | 1,516 | 24 |
https://www.programmableweb.com/news/developer-learns-value-private-api-key-security/elsewhere-web/2015/02/02 | code | Amazon’s cloud computing Platform, Amazon Web Services (AWS), offers useful tools to developers, but it does have its risks. Andrew D Hoffman from DevFactor was billed $2,375 by Amazon’s Elastic Compute Cloud (EC2) after a bot retrieved his private API key and ran up maximum instances of EC2 servers in order to farm Bitcoins.
While teaching himself Ruby over the festive period, Hoffman built a Yelp Clone and opened an Amazon Simple Storage Service (S3) account to host images for the site. Through a seemingly uncommon issue while using a Figaro gem to push code to GitHub, the .gitignore command didn’t Function and Hoffman’s API key was inadvertently published online. He quickly removed the key, along with all traces of it, within 5 minutes of it being published, but the damage had already been done.
In the few minutes that the API Key had been up on GitHub, it was retrieved by a bot and used to access his AWS account. And despite the key being for S3, it was able to access EC2. Hoffman’s AWS account had been running 140 servers through the night and had racked up a bill of $2,375.
He was able to explain the situation to Amazon customer support and they dropped the charges this time, but he has learned the valuable lesson of keeping your data safe. Hoffman encourages others to properly protect their own work from this type of hacking by revoking and regenerating any private API key that gets out on the web, no matter how briefly. | s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320304528.78/warc/CC-MAIN-20220124094120-20220124124120-00419.warc.gz | CC-MAIN-2022-05 | 1,461 | 4 |
https://javalab.org/en/human_gene_transfer_en/ | code | Suppose a child inherit chromosomes from parents and construct a new pair of chromosome pairs.
A child can receives an 'A' or 'a' from his mother and a 'B' or 'b' from his father. So, the child can inherit chromosomes by the following four cases.
- A & B
- A & b
- a & B
- a & b
Since all the chromosomes of a person are 23 pairs, the number of cases that can appear is as follows.
Theoretically, in order to have genetically identical children, you should have more than 8 million childrens.
But, 'identical twins' are genetically identical. | s3://commoncrawl/crawl-data/CC-MAIN-2019-35/segments/1566027313501.0/warc/CC-MAIN-20190817222907-20190818004907-00274.warc.gz | CC-MAIN-2019-35 | 542 | 9 |
http://www.robloxtrick.info/roblox-windowed-mode-is-it-the-best-way-to-play-roblox.html | code | Roblox Windowed Mode – Roblox is developed and published by the Roblox Corporation as a user-generated massively multiplayer online social gaming platform that was released in 2006. Within the platform, the players have the ability to create and design their own virtual world and game. It can be designed using the programming language Lua with a sandbox edition. This game is family-friendly and has high versatility, because it is able to run on PC, Mac, Android, iOS, Xbox, and Oculus. Up till now, over 500,000 game creators have designed game on Robox, with 30 million players are actively playing every month.
Roblox allows its players to explore 3D worlds. The games include activities such as exploring, resource gathering, crafting items, and. In this game, the players are able to customize their characters with various apparels and gear. They are also able to collect and trade items. This game also provides social interaction. Players can add each other to their friend list and join community groups. After joining the community, the players usually advertise the group and participate in group relations. In this game, the players can also create their own buildings with an application called Roblox Studio. With this application, players can construct places with various color of bricks. If the players want to change the environment drastically, they can use programming language Lua.
During playing the game, sometimes people are still confused whether it is better to play in a full screen mode or in a windowed mode. Some people will choose full screen mode because it offers a better “experience”. But the truth is, it depends on the nature of the game. Every game that exists on this earth has their own uniqueness, such as the setups, specific hardware used, and many more. This variability will have effects on how we are supposed to play the game. This goes the same with Roblox. The question is, does Roblox windowed mode give a better performance than full screen mode?
The first thing that you need to pay attention to is the resolution of your screen. A game performance depends heavily on its resolution. If the resolution of your Roblox game is similar to your desktop resolution, full screen mode will give you slightly faster performance. But if your game resolution is different from your desktop, playing Roblox windowed mode is the best decision.
So the next question is, how do I play Roblox windowed mode? Back then, playing in windowed mode is never hard. But these days, sometimes it does not work at all. For the worst, it will kick you out of the game and turn your screen into pitch black. If this is your case, then go to your Roblox Studio, find the tools section and lower your graphics to ensure the game graphics is compatible with your graphic card. After lowering your graphics, your game will be working again. Another thing that you can do is simply press Alt+F4. If it is still not working, try to uninstall, wait for a few minutes, and install again.
Tags : roblox windowed mode,roblox.com windowed mode | s3://commoncrawl/crawl-data/CC-MAIN-2019-30/segments/1563195524879.8/warc/CC-MAIN-20190716201412-20190716223412-00353.warc.gz | CC-MAIN-2019-30 | 3,067 | 6 |
https://community.microfocus.com/t5/ArcSight-User-Discussions/arcmc-and-logger-config-backup-subscriber-configurations/m-p/1795671 | code | arcmc and logger config backup subscriber configurations
Finally getting some time to work with subscriber configurations on ArcMC. I created a policy for ArcMC backup configuration, as well as Logger backup configuration. In each I specified a base remote directory for the ArcMC systems and Loggers.
I notice that when I push an ArcMC backup config / policy out to each ArcMC the process adds a subdirectory to the path, using the ArcMC host name. E.g. /config_bak/<arcmhostname>. So every ArcMC that I push this policy out to ends up with a distinct path for its config files, which is good. The downside is that the subscriber policy that gets pushed out does not include the option to select which files to exclude (repository, connector data, or both) which implies I have to visit each ArcMC to adjust (the push appears to add/use "exclude repository" option, but I would like to exclude connector data as well).
When I push the Logger backup configuration out to any Logger it always appends "logger" to the path e.g. /config_bak/logger. So all Loggers that use this policy end up dumping config backup files to the same folder. Which implies I need a single subscriber config for each Logger, otherwise I have to visit each Logger to adjust this.
I may be missing something obvious, but in my case, it seems like creating centralized config backup policies are not adding as much value as I had hoped...(?)
Any thoughts on this are appreciated
Re: arcmc and logger config backup subscriber configurations
To add to the confusion, when I log into each ArcMC and select System Administration / Backup - and set the backup parameters to "exclude repository and connector data", it "resets" itself to exclude repository data only <sigh>..... | s3://commoncrawl/crawl-data/CC-MAIN-2019-43/segments/1570986649232.14/warc/CC-MAIN-20191014052140-20191014075140-00207.warc.gz | CC-MAIN-2019-43 | 1,746 | 8 |
https://solidstatelogic.zendesk.com/hc/en-us/articles/360022913372-The-return-connections-are-duplicated-on-the-XR623-Can-I-keep-both-instances-connected- | code | FAQ published on: 23/05/2012
Last edited: 23/05/2012
On the XR623 Four Channel Input Module, the insert returns are duplicated, i.e. each return is available on both DB25 connectors.
For each channel, only one of these duplicates should be connected. Leaving both connected may have adverse effects. Furthermore, the duplicates should not be used for summing two signals. | s3://commoncrawl/crawl-data/CC-MAIN-2021-39/segments/1631780056890.28/warc/CC-MAIN-20210919125659-20210919155659-00000.warc.gz | CC-MAIN-2021-39 | 371 | 4 |
https://nofilmschool.com/user/5716?layout=2020&type=activity&page=19 | code | The photography part means definitely you want a DSLR. I will get downvoted by everyone who hates Canon, but...starting from scratch with $2k, you could do well with a Canon t5i (or t4i or t3i), a Tamron 28-75 2.8, and a Tokina 11-16 2.8. And have a few bucks left over.
Whatever you get, start reading like crazy. Buying the camera is 10% of the battle. Good luck!
Some things are so ripe that they require no parody. Exhibit A.
Also, parody is funnier without a preface of, "Hey everybody, here's a hilarious parody!"
Seemed quite a bit of it was inside the box.
If this site's writers would realize how useless words like "incredible," "insane," and "epic" are, that would be incredibly, insanely epic. Otherwise keep up the good work.
I find it tremendously instructive--and comical--to compare the work of a commenter to the work he is criticizing.
I wouldn't find it necessary to belittle the site as a whole. On the other hand, I agree with you that this is a massive achievement of filmmaking that most people should be looking to learn from. | s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593655937797.57/warc/CC-MAIN-20200711192914-20200711222914-00596.warc.gz | CC-MAIN-2020-29 | 1,050 | 8 |
http://itsmaza.com/protect-wordpress-from-hacking/ | code | Because there is no sense to put software such as anti virus and even if they want something very expensive, people simply think that all the work is done when the site launched.
Protect website or web server requires constant effort because every day something is updated.
If your site is hacked then it will reflect badly on you, your business or brand.
Always there are some proven steps that are necessary to make sure to get the first line of defense. We have compiled a list of ways or tips you call them to help you lay the foundation for Web security. So how to protect the site ?
Use Open Source Scripts
If you do not know what you are doing or have a good team of developers it is a good idea to use an open-source scripts. Scripts open-source, such as WordPress, Drupal, Joomla, Magento , etc., multi-functional, and built with the support of thousands of coders for updates and support.
This is to avoid becoming a victim of hacker sites and spammers because of poorly written code. Rather than build from scratch, you can use your existing scripts and modify them to your liking. Commercial scripts from well-known companies also may be used if they give out updates and patches regularly.
You have an opportunity or not, try to update your platform continuously. This will help you avoid errors in the code and will provide additional protection for your site.
Use strong passwords
Use good passwords of letters and numbers, and special characters. The password must be at least 10 characters in length.There are many good generators that will help you to do this, such as KeePass, Lastpass and others.
Protect your Email Administrator
Keep your e-mail address the administrator used to log into the database away from the public eye. It is necessary to use a completely different address on social networks and other contact lists. This will help you avoid becoming a victim Phising-well .
Add to the database table prefix
Password protection for Databases
It is not a requirement, but it is better to do it than to leave it blank.
Remove the installation folder
After installation it is strongly recommended to remove this folder because it no sense. It will not be used in the operation site. If you leave it to the hacker will be possible to restart the unit again and clean the database. Delete or rename it from sin by on.
Use a protected FTP connection.
If you can use FTP to upload files. It does not give anyone a chance to see that you upload to a web server.
Restrict root access
Restrict access to the files in the folder are not used. Let access will have only the system administrator.
Make sure you have .htaccess file
.htaccess files are often used to specify the security restrictions for a specific directory, and make sure that you have not deleted it by accident, or if it is.
Add a robots.txt file
This file provides specific instructions to search engines that can be shown and what is not.
Use security plugins
Good platform always have plug-ins to the basic functionality of the script. Look at the plugin that adds an extra level of security and install them. For example, plug-in the WP Security the Scan . | s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128323680.18/warc/CC-MAIN-20170628120308-20170628140308-00405.warc.gz | CC-MAIN-2017-26 | 3,146 | 27 |
https://discussions.apple.com/thread/6147556?tstart=0 | code | My iTunes updated and now all I see is cloud purchases. None of my other music which comprise 90% that I put into my library are showing up. The files are still there but are not opening in iTunes. now I have to wait 90 days to use another apple id? This is absolute nonsense. Can anyone help? | s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440644064865.49/warc/CC-MAIN-20150827025424-00068-ip-10-171-96-226.ec2.internal.warc.gz | CC-MAIN-2015-35 | 293 | 1 |
http://magazine.good.is/infographics/transparency-how-much-oil-do-we-get-from-offshore-drilling | code | As the Deepwater Horizon continues to leak oil at a rapid rate, many people are asking whether we should be drilling in the Gulf of Mexico at all, while others say offshore drilling in the Gulf is a necessary source of oil. To help settle this debate, this is a look at oil around the world, who is producing the most, and what we use it for in this country.
UPDATE TWO: We've updated the graphic. You can see the original here.
UPDATE: Thanks to the commenters for pointing it out, the graphic should indicate that the United States produces 1.5 million barrels a day from offshore drilling. We regret the error and the delay in correcting. We'll update the graphic shortly.
A collaboration between GOOD and Stanford Kay. | s3://commoncrawl/crawl-data/CC-MAIN-2014-15/segments/1398223206647.11/warc/CC-MAIN-20140423032006-00321-ip-10-147-4-33.ec2.internal.warc.gz | CC-MAIN-2014-15 | 722 | 4 |
https://forums.revora.net/topic/117821-the-supplied-password-does-not-match-the-user-account/ | code | The supplied password does not match the user account
Posted 11 July 2023 - 02:38 PM
Posted 11 July 2023 - 02:41 PM
Should have included that in the post as well, my bad
Posted 14 July 2023 - 07:19 AM
Sorry to hear about the login issue. Have you tried contacting the3rdage.net support for assistance? Are you looking for ways to address police brutality in the US? Look nowhere else! This https://usattorneys....-united-states/ article's exploration of practical solutions to this urgent problem is eye-opening. Join the struggle for a just and responsible law enforcement system by learning about viable alternatives.
Edited by JosephLorenzen, 20 July 2023 - 06:37 AM.
0 user(s) are reading this topic
0 members, 0 guests, 0 anonymous users | s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506479.32/warc/CC-MAIN-20230923030601-20230923060601-00821.warc.gz | CC-MAIN-2023-40 | 742 | 9 |
http://www.mavir.net/component/content/article/8-breves/141-tesis-agonzalez-2013 | code | Doctorando: Alicia González Martínez
Director: Antonio Moreno Sandoval (UAM)
Fecha: martes 29 de enero de 2013, 11h00
Lugar de defensa: Sala de Vídeo del Departamento de Filología Árabe, Módulo II, Facultad de Filosofía y Letras, Universidad Autónoma de Madrid
The computational handling of non-concatenative morphologies is still a challenge in the field of natural language processing. Amongst the various areas of research, Arabic morphology stands out due to its highly complex structure.
We propose a model for Arabic verbal morphology based on a root-and-pattern approach, which satisfies both computational consistency and an elegant formalization. Our model defines an abstract representation of prosodic templates and a set of intertwined morphemes that operate at different phonological levels, as well as a separate module of rewrite rules to deal with morphophonological and orthographic alterations. Our verbal system model asserts that Arabic exhibits two conjugational classes.
The computational system, named Jabalín, is focused on generation—the program generates a full annotated lexicon of verbal forms, which is subsequently used to develop a morphological analyzer and generator. The input of the system consists of a lexicon of 15,452 verb lemmas of both Classical Arabic and Modern Standard Arabic—taken from El-Dahdah (1991)—comprising a total of 3,706 roots. The output of the system is a lexicon of 1,684,268 verbal inflected forms.
We carried out an evaluation against a lexicon of inflected verbs provided by the analyzer ElixirFM (Smrž, 2007a; 2007b), which we considered a Golden Standard, achieving a precision of 99.52%. Additionally, we compared our lexicon with a list of the most frequent verb lemmas—including the most frequent verbs from each conjugation—taken from Buckwalter and Parkinson (2010). The list includes 825 verbs which are all included in our lexicon and passed an evaluation test with 99.27% of accuracy.
Jabalín is available under a GNU license, and can be accessed and tested through an online interface. The Jabalín interface provides different functionalities: analyze a form, generate the inflectional paradigm of a verb lemma, derive a root, show quantitative data, and explore the database, which includes data from the evaluation. | s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917121121.5/warc/CC-MAIN-20170423031201-00294-ip-10-145-167-34.ec2.internal.warc.gz | CC-MAIN-2017-17 | 2,312 | 9 |
http://adafruit.com/forums/viewtopic.php?f=8&t=34963 | code | Being very new to Arduino and the world of electronics, I've started playing with a few projects and I think I'm ready to move to a little bit more complex projects. Over the weekend, I was thinking about how to drive a DC motor using the Adjustable Breadboard Supply. I've done with with a very small servo with no isolation but now I'm considering a bigger motor (6V).
Can somebody help me with some questions?
- Can I drive the motor from the high voltage side?
- I'm using an opto-isolator to control the DC motor. Can I ground the regulated side to the Arduino or do the sides share a common ground?
Thanks in advance! | s3://commoncrawl/crawl-data/CC-MAIN-2014-15/segments/1397609523265.25/warc/CC-MAIN-20140416005203-00132-ip-10-147-4-33.ec2.internal.warc.gz | CC-MAIN-2014-15 | 623 | 5 |
http://www.91r.net/ask/438.html | code | My Rails-app has a sign in box with a "remember me" checkbox. Users who check that box should remain logged in even after closing their browser. I'm keeping track of whether users are logged in by storing their id in the user's session.
But sessions are implemented in Rails as session cookies, which are not persistent. I can make them persistent:
class ApplicationController < ActionController::Base
options = ActionController::Base.session_options
options[:session_expires] = 1.year.from_now
But that seems like a hack, which is surprising for such common functionality. Is there a better way?
Gareth's answer is pretty good, but I would still like an answer from someone familiar with Rails 2 (because of its unique CookieSessionStore).
I have spent a while thinking about this and came to some conclusions. Rails session cookies are tamper-proof by default, so you really don't have to worry about a cookie being modified on the client end.
Here is what I've done:
When the user checks the "Remember Me" box, I just set the session[:expireson] date to be login + 2 weeks. No one can steal the cookie and stay logged in forever or masquerade as another user because the rails session cookie is tamper-proof.
You should almost certainly not be extending the session cookie to be long lived.
Although not dealing specifically with rails this article goes to some length to explain 'remember me' best practices.
In summary though you should:
The author also recommends invalidating the random value and resetting the cookie at every login. Personally I don't like that as you then can't stay logged into a site on two computers. I would tend to make sure my password changing function also reset the random value thus locking out sessions on other machines.
As a final note, the advice he gives on making certain functions (password change/email change etc) unavailable to auto authenticated sessions is well worth following but rarely seen in the real world.
I would suggest that you either take a look at the RESTful_Authentication plug in, which has an implementation of this, or just switch your implementation to use the RESTful Authentication_plugin. There is a good explanation about how to use this plug in at Railscasts:
Here is a link to the plugin itself
The restful_authentication plugin has a good implementation of this:
Note that you don't want to persist their session, just their identity. You'll create a fresh session for them when they return to your site. Generally you just assign a GUID to the user, write that to their cookie, then use it to look them up when they come back. Don't use their login name or user ID for the token as it could easily be guessed and allow crafty visitors to hijack other users' accounts.
This is a pretty good write-up of one guys experience of creating 30-day persistent sessions.
WARNING: blog post is from 2006
I would go for Devise for a brilliant authentication solution for rails.
This worked like a charm for me:
Now my CookieStore sessions expire after two weeks, whereby the user must submit their login credentials again in order to be persistently logged-in for another two weeks.
Bascially, it's as simple as: | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171066.47/warc/CC-MAIN-20170219104611-00024-ip-10-171-10-108.ec2.internal.warc.gz | CC-MAIN-2017-09 | 3,175 | 25 |
https://openwebsearch.eu/opinion-paper-impact-and-development-of-an-open-web-index-for-open-web-search/ | code | A quick read yet thorough overview of the possibilities, technical aspects and principles of an Open Web Index
The OpenWebSearch.Eu consortium published an opinion paper on “The Journal of the Association for Information Science and Technology (JASIST)” about the impact and development of an Open Web Index. The 23-strong author team explains the challenges and outlines six basic principles for developing and maintaining an open web index, based on the principles of open data, legal compliance and collaborative technology development.
Read the full paper here:
Get the full paper as pdf: | s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712297295329.99/warc/CC-MAIN-20240425130216-20240425160216-00524.warc.gz | CC-MAIN-2024-18 | 596 | 4 |
https://chrisdavisphd.com/ | code | Developing human potential through learning.
Indie Teaching empowers anyone who wants to teach to offer courses outside of the traditional walls of schools and publishers. We are creating training and other services to enable teachers to create, publish, and profit from their own online courses.
My goal is to help people make an informed decision about whether college is the right choice for them right now and how to make smart choices if they do go to college. The choice to go to college, where to go, and what to study is a personal decision. There are no universal answers or advice that is true for everyone. What I do is give you enough information to make informed decisions for yourself.
How do we measure learning and how do we use those metrics to improve learning and other outcomes such as learner engagement and satisfaction? Effective analytics are essential for both learning quality assurance and improvement.
Future of Higher Education
The current fourth industrial revolution places greater expectations for educational systems to support life long learning. At the same time, formal educational systems are being confronted by changes in demographics and technology. These changes provide both risk and opportunity for organizations that effectively plan for the future. | s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370496227.25/warc/CC-MAIN-20200329201741-20200329231741-00300.warc.gz | CC-MAIN-2020-16 | 1,293 | 6 |
https://www.applevis.com/forum/ios-ipados/any-apps-can-read-playing-cards | code | any apps that can read playing cards
I am wondering are there any apps that could identify playing cards.
you'll have to get those cards but it works like a dream
I hate to go all low-tech here, but... A set of Braille playing cards might be a better solution. Getting your fellow card players comfortable with the fact that you bring your own cards to the game might be easier than The hassle of using an app to read each card played in every game. | s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600400206133.46/warc/CC-MAIN-20200922125920-20200922155920-00704.warc.gz | CC-MAIN-2020-40 | 449 | 4 |
http://ruddra.com/2015/09/17/using-intellijidea-within-an-exisiting-virtualenv/ | code | To add virtual environment to Intellij Idea, You have added virtualenv folder's python to project sdk. Which means that virtualenv directory's python( for example venv/bin/python2.7) needs to be added to Intellij Idea project path. Here is a demonstration:
First you need to go to file>project structure (in IntellijIdea)
Press new in Project SDK and add new path to virtualenv's python directory like this:
Go to Modules>Dependencies and set your module sdk to Python SDK which is marked on this picture:
Now press ok and final look of the Project settings:
Now need to run the project.
My Stackoverflow Answer is here: http://stackoverflow.com/questions/20877106/using-intellijidea-within-an-existing-virtualenv/20879661#20879661 | s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917122865.36/warc/CC-MAIN-20170423031202-00051-ip-10-145-167-34.ec2.internal.warc.gz | CC-MAIN-2017-17 | 731 | 7 |
http://www.dragtimes.com/video-viewer.php?v=LAQmMlSd-Mo&feature | code | Working lego Fast Shooting Rifle v3: Pump action
It's been awhile that we made our last fast shooting rifle model. So we decided to make a completely new model! we hope you like it! :)
LEGO Desert Eagle (with blowback)
MOCpages: www.mocpages.com/home.php/93573 LEGO Desert Eagle from Lego Heavy Weapons. one of the reasons I built this was because I already tried to build it 3 times before and the blowback didn't work,until I saw that I didn't notice a gray pin,so I just HAD to make it again.
Desert Eagle Lego puzzle from Aliexpress prop unboxing
You can buy it here http://m.aliexpress.com/item/32614188491.html?aff_click_id=8faf3a4ed2f54a8c b2e28c8a7e965b5f-1459513405161-00962-eub6yrrBy&aff_platform=y Facebook: Alexshowlol YT Snapchat: alexshowlol Twitter: @alexshowlol ВК: https://vk.com/id258901756 Steam: https://steamcommunity.com/tradeoffer/new/?partner=299043856&token=1iq-irs_ Группа в ВК: https://vk.com/club126956942
LEGO Golden Desert Eagle
What will be made next? ► Subscribe! http://bit.ly/NombieSub Today we bring the Desert Eagle magnum to life with golden LEGO bricks! Featured as a prestigious sidearm in Call of Duty 4: Modern Warfare, the Gold Desert Eagle has always been a favourite sidearm for many people, and this golden gun sure packs a punch! Check out some more awesome LEGO video game creations: LEGO Minecraft: https://www.youtube.com/playlist?list=PLABB49AEAFE8976F0 LEGO Call of Duty: https://www.youtube.com/playlist?list=PLFcNe_QqRjLOujy_yTLDm_nzwmmd5Kvwf LEGO Zombies Weapons: https://www.youtube.com/playlist?list=PL2BA478E9B56CF27B | s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218190295.4/warc/CC-MAIN-20170322212950-00013-ip-10-233-31-227.ec2.internal.warc.gz | CC-MAIN-2017-13 | 1,587 | 8 |
https://developer.jboss.org/thread/118522 | code | lots, see the jpdl documentation what can be done on a tasknode (especially look at the attributes on the xml)
Main thing is that multiple tasks in one node are (to some extend) related e.g. behaviour when one task finishes
I mean, what use case that needs to be fulfilled with multiple tasks in a task node that can't be fulfilled with multiple task node with 1 task each ?
Lots, see the attributes on the task-node. But in some cases it is simplicity (convenience). E.g. instead of a fork, multiple tasks in each leg, an n-out-of-m join with n being 1, you can have one task-node with the signal='first' attribute. | s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267156471.4/warc/CC-MAIN-20180920120835-20180920141235-00492.warc.gz | CC-MAIN-2018-39 | 616 | 4 |
https://the-peak.ca/2021/07/testing-the-byo-app/ | code | Trying to reduce waste whenever you go out? Try the BYO app! On it you can find participating Cafes that allow you to bring your own containers. In this video we visit The Kind Cafe located in Mount Pleasant and try out the app.
[This vlog style video is a collaboration between Arts& Culture and the Multimedia team. ] | s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296816045.47/warc/CC-MAIN-20240412163227-20240412193227-00280.warc.gz | CC-MAIN-2024-18 | 319 | 2 |
https://community.smartbear.com/discussions/bitbar/how-to-handle-manage-preferences-cookies-popup-on-mobile-devices/253661 | code | How to handle "Manage Preferences" cookies popup on mobile devices
I am getting cookies popup with Manage Preference and Accept All on Android device chrome browser. This make my script fail at runtime. Is there any way to handle this. I already added 'autoDismissAlerts' : 'true', in capabilities but not working. | s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817206.54/warc/CC-MAIN-20240418124808-20240418154808-00879.warc.gz | CC-MAIN-2024-18 | 314 | 2 |
https://www.complexsql.com/difference-between-decode-and-case-statement/ | code | In my previous article i have given the many examples of difference between technically.In this article i would like to throw light on Difference between Decode and Case statement with multiple real life scenarios.The short form of if..else is Oracle case or decode statement in oracle.
What we will cover in this article?
- Decode,Case Function with Syntax and usages
- Difference with real examples
- Difference in tabular format
Decode Statement is faster than Case Statement when it passes from optimizer
1.Both oracle function and oracle case functions are important functions which are used to transform the values from single value to another separate value.
2.The Oracle as well as Oracle case statement will give us the transformation of values in following format.
if Variable = Value1 then Value/variable/statement
else if Variable= Value2 then Value/variable/statement
3.Both Decode as well as Case statement allows us to create the indexes on the multiple columns which are not exists in the database . This feature will be used to improve the performance of query.
4.Oracle started the decode functions in its oracle 9i version but they have defined the different functionality of case statement where they have added the decode functionalities and more functionalities than decode in CASE Statement.
5.Decode is oracle system defined function and case statement is the statement.
6.Decode function can not work other than equal to operator whereas case statement will work with other operators like < Less than > Greater than = Equal to == Equal to equal to.
7.Syntax : Decode Statement
Decode (Column_name, Value_1, Mapping_1,Value_2,Mapping_2….Value_N,Mapping_N);
Example of Decode Statement :
8.Syntax : Case Statement
Case When Statement1 then value1
else when Statement2 then value2
Example of case statement :
Select case when ‘M’ then ‘Male’
when ‘F’ then ‘Female’ else
‘Others’ As ‘Gender’ from Employee;
Difference between Decode and Case statement with real examples
1.Case Statement is working with other logical operators except ‘=’ equal to operator
The Decode function is used to perform only equality condition. The Case statement is capable of using other operators as well rather than equal to operator.
Case When Salary > 10000 and Salary < 20000 Then ‘Class-2’
When Salary >=20000 then ‘Class-1’
End As ‘Class_of_Employee’
The above query will give us information about the Class of Employee. Here you can see that we have used the greater than and other operators.
2.Case statement can work with sub-queries and predicates as well
We have limited functionality in decode as the decode function only uses the scalar values.Oracle overcomes this in case statement and case statement can work with the sub-queries as well as searchable values.
Select Employee_id ,
Case when Employee_name in (‘Amit’,’Pradnya’,’Rahul’) then ‘Management People’ /*This is In predicate*/
when Employee_name exists (select Employee_name from Employee where manager_code is not null)
/* You can use sub-queries as well*/
else ‘Employees’ end
3.You can use Case statement in PL SQL
The case statement you can use in PL SQL but as decode is function then you require to use only in SQL statements. You can also use in PLSQL but not like Case statement. You always need to use it in select statement.
PL SQL block :
begin Case When Marks <=80 Then ‘A’ when Marks <=60 and Marks <=79 then ‘B’ When Marks>=40 and Marks<=59 then ‘C’ else ‘D’
The above PL SQL block is used to check the marks and give grades accordingly.
4.Case when statement can be used in procedure calls.
You can also use the Case..When statement in procedure calling. The decode statement will give the error when you use it in procedure calls.
Assumption : Procedure named P_Customer_database is there in the database.
The above statement will give you the error like,
ORA-06550: line 1, column17:PLS-00204: functionorpseudo-column’DECODE’may be used inside a SQLstatement only
But you can use case when statement,
Exec P_Customer_database(case when name=’Amit’ then ‘Male’ else ‘Female’);
The above procedure will execute successfully.
These are some most important examples of Case and decode statements.
Table Format :
|Decode Statement||Case Statement|
|Decode is oracle system function||Case is oracle statement not a function|
|Decode can not work other than = Equal to operator||Case statement can work other than equal to operator|
|Decode Statement can not work with the Sub-queries and predicates||Case statement works with sub-queries and predicates|
|Decode can only be used in function inside SQL only.||Case statement can be used in PL SQL blocks|
|You can not use Decode function in stored procedures call||You can use case statement in procedure calls|
|Case statement Compiles ANSI SQL statement||Decode is nothing but the proprietary of oracle|
I hope you like this detailed level article; If you like this article or if you have any comments kindly comment in comments section. | s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506027.39/warc/CC-MAIN-20230921105806-20230921135806-00390.warc.gz | CC-MAIN-2023-40 | 5,067 | 61 |
https://findwork.dev/34679/lead-devops-engineer-at-factset | code | Lead Dev Ops Engineer
Factset is seeking a talented Lead Dev Ops Engineer to lead the real-time market data migration to the cloud. The team is responsible for providing FactSet’s real-time market data to internal and external endpoints, as quickly and efficiently as possible. By joining this team at this early stage of our cloud migration you will have an opportunity to help design the system from the ground up and gain experience in the low latency world of real-time market data.
You will get the opportunity to be an integral part of the market data team providing expertise on the technical challenges related to moving high volume network systems up to the cloud. As a Dev Ops Engineer, you will get to work with technologies such as; Linux, AWS, Azure, Ansible, Terraform and Jenkins.
- Redesign parts of the market data system to move to the cloud
- Write terraform scripts and ansible plays to help with deployment
- Work with teams to determine the appropriate cloud solutions for their problems
- Designing, configuring, delivering and securing systems/applications across Public/Private/Hybrid Cloud Solutions
- Linux server technologies, including building, patching configuring systems and creating AMIs
- Continuous Integration and Continuous Delivery systems (e.g Jenkins)
- Automated deployment/management systems like Terraform
- Full understanding of IAC concepts and using related systems like ansible and github
- Experience in AWS or Azure
- Scripting python, bash etc.
- Bachelor's degree in Computer Science
- Minimum 3 years of experience as a Dev Ops Engineer working with Cloud technology
- Experience in both AWS and Azure
- Detailed knowledge of Linux networking including tuning for performance.
- Excellent understanding of Network systems especially hybrid systems that span Local DC and multiple clouds.
- Experience in migrating very high network load systems (millions of packets per second) into a cloud environment.
- Nice to have experience with container technologies (e.g. Kubernetes, Docker, etc.)
FactSet is an Equal Opportunity Employer – M/F/Veteran/Disability/Sexual Orientation/Gender Identity | s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590347407289.35/warc/CC-MAIN-20200530040743-20200530070743-00181.warc.gz | CC-MAIN-2020-24 | 2,147 | 21 |
http://woodlandprep.com/staying-alive-after-shtf/ | code | The first few months after a SHTF are going to be the most dangerous. Not drawing attention to yourself will be critical. Here are some steps to keep others from noticing you and that you are prepared.
If you like what you are seeing on this channel and would like more content you might consider joining my Patreon page. For only $1 a month you will get more weekly videos plus blogs and other content. This dollar a month helps my family out and helps me to make more videos. | s3://commoncrawl/crawl-data/CC-MAIN-2021-17/segments/1618038077810.20/warc/CC-MAIN-20210414095300-20210414125300-00045.warc.gz | CC-MAIN-2021-17 | 477 | 2 |
http://www.dharma.net/monstore/index.php?cPath=30_90&sort=3a&page=2 | code | Meditation supplies to support your spiritual practice
Meditation Cushions & Benches
Clothing & Bags
Travel & Gifts
The Cloud Zafu (Black)
Special Offer $95.00
Tea Set with Bowl & Canister
Our Mission & Environmental Policy
About Our Cushions
Shipping & Returns
Conditions of Use
Read more about Geoffrey Shugen Arnold, Sensei
Don't Budge—Dharma Discourse (Audio)
Zazen is often misunderstood as being meditation, or some form of contemplation or introspection. Actually zazen is a time of non-doing, a ...
Drop All Comparisons—Dharma Discourse (Audio)
We’re so used to our competitiveness that we don’t think twice about approaching spiritual practice in the same way. However, as long as we ...
Family Dharma—Dharma Discourse (Audio)
This talk was given during a family retreat at Zen Mountain Monastery. Shugen Sensei reflects on how teachers have to integrate the challen ...
Fear and Fearlessness—Dharma Discourse (Audio)
When our minds are clouded by delusion, we see the world according to our fear and prejudice. Then we act out of this limited view, and in ...
From Obstacles to Freedom—Dharma Discourse (Audio)
Embarking on the spiritual path can often come out of a wish to escape from problems and difficulties. We want to find peace on the cushi ...
Giving Thanks—Dharma Discourse (Audio)
It’s not enough to just feel gratitude—it must be actively expressed. We are constantly receiving from the world and from others, eve ...
Gold Dust and Sand—Dharma Discourse (Audio)
In practice we are all walking on a path. It's possible to measure progress as we go, yet it's dangerous to attach to this progress. Instea ...
Honor the Body—Dharma Discourse (Audio)
In our relationships, families, and culture, sex and sexuality can be a source of confusion and pain. Until we see and take responsibility ...
How Do I Live With You?—Dharma Discourse (Audio)
The fundamental question of spiritual practice is: "How do I live this life?" From a Buddhist perspective, the question is: "How do I live ...
How Do You Trust?—Dharma Discourse (Audio)
“The Great Way is not difficult, just avoid picking and choosing,” begins the Faith Mind Poem. But then why is it that we experience so muc ...
Into the Unknown—Dharma Discourse (Audio)
How can we learn to trust a reality that is utterly uncertain? How do we act ethically when the wide-ranging consequences of our actions ar ...
It's All Noodles—Dharma Discourse (Audio)
Daido Roshi often said, "I am not you and you are not me, and yet we are the same thing." But what does this really mean? In this talk Shug ...
Joining the Rest of the Universe—Dharma Discourse (Audio)
How do we deal with the knowledge that the body is impermanent? Many people deny the reality of death until it can no longer be ignored. ...
Joyful Effort—Dharma Discourse (Audio)
Each of us have different karma to work with, based on what we’ve experienced in our lives and how we’ve responded to those experiences. Re ...
Just This!—Dharma Discourse (Audio)
Sometimes our past feels like a heavy burden. Memories, regrets, and even lost pleasures can take us away from the gifts of the present mom ...
Learn to Fail—Dharma Discourse (Audio)
When we think in terms of failure and success we suffer. But life involves learning how to fall, how to get up from that fall and how to k ...
Living Wisdom—Dharma Discourse (Audio)
Even in the midst of forms like zazen, liturgy, work practice, it is still possible to be asleep—unless we completely dedicate ourselves to ...
Love Between Parent and Child—Dharma Discourse (Audio)
What is the love between teacher and student? It may not always conform to our expectations. Shugen Sensei explores the student-teacher re ...
Medicine and Sickness Heal Each Other—Dharma Discourse (Audio)
The enlightened lay practitioner Vimalakirti taught that medicine and sickness heal each other, and that the whole world is medicine. Shug ...
Miraculous Activity—Dharma Discourse (Audio)
Master Dogen states that miraculous powers are the daily activities of Buddhas. In this dharma discourse, Shugen Sensei speaks of the possi ... | s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386163053330/warc/CC-MAIN-20131204131733-00097-ip-10-33-133-15.ec2.internal.warc.gz | CC-MAIN-2013-48 | 4,139 | 52 |
https://www.babajicalling.com/laptop-science-and-engineering.html | code | Three Trinity Students Honored With Barry Goldwater Scholarships
Our curriculum provides students with a stable theoretical and sensible basis. The program’s interdisciplinary programs interact students in compelling, actual-world challenges. As college students work collectively to design solutions, they learn computational considering – not simply the way to code – and become higher thinkers and communicators. Students take from the courses in-demand information and skills they may use in highschool and for the rest of their lives, on any career path they take.
Pc Science Levels
Princeton has been on the forefront of computing since Alan Turing, Alonzo Church and John von Neumann had been among its residents. Our division is residence to 43 tenure-monitor and thirteen instructing college, with strong groups in theory, networks/systems, graphics/vision, structure/compilers, programming languages, security/coverage, machine learning, and computational biology. Many universities internationally provide levels that teach college students the fundamentals of pc science theory and the purposes of computer programming. Additionally, the prevalence of on-line sources and programs makes it potential for many people to self-learn the extra practical features of pc science . Artificial intelligence aims to or is required to synthesize aim-orientated processes corresponding to drawback-solving, choice-making, environmental adaptation, learning, and communication found in people and animals.
More Jobs With A Pc Science Diploma
In the Department of Computer Science, our international specialists are acknowledged for their contributions in crucial research fields. Whether researching distributed methods, networking, visualization, artificial intelligence, information mining, bioinformatics, software engineering or any other area, we interact students in compelling tasks that affect how we reside. In addition having faculty members who work throughout the UK Center for Visualization and Virtual Environments and the Laboratory for Advanced Networking, we preserve a rich partnership with the University of Kentucky Biomedical Informatics Institute. Our applications are designed for students thinking about pursuing research studies or careers in laptop science and software engineering.
AI is related in the well-liked thoughts with robotic growth, but the main subject of sensible utility has been as an embedded part in areas of software program development, which require computational understanding. The place to begin in the late Forties was Alan Turing’s question “Can computer systems suppose?”, and the question remains successfully unanswered, though the Turing take a look at remains to be used to evaluate laptop output on the size of human intelligence. But the automation of evaluative and predictive tasks has been more and more successful as an alternative to human monitoring and intervention in domains of laptop application involving advanced actual-world knowledge. A number of laptop scientists have argued for the distinction of three separate paradigms in laptop science. | s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323585120.89/warc/CC-MAIN-20211017021554-20211017051554-00300.warc.gz | CC-MAIN-2021-43 | 3,127 | 7 |
http://the-chosen-five.obsidianportal.com/characters/myrella | code | The Chosen Five
Myrella and Maareth are polar opposites. While Maareth is a lifeless, cold-blooded killing machine, Myrella is a sexy, vibrant enchantress that can slit your wrist and then convince you that “the accident” was really all your fault. You might even wipe away her tears and appologize just before everything turns black. If the Matron requires pursuasion or manipulation … she knows who to call. | s3://commoncrawl/crawl-data/CC-MAIN-2018-22/segments/1526794863277.18/warc/CC-MAIN-20180520092830-20180520112830-00228.warc.gz | CC-MAIN-2018-22 | 415 | 2 |
https://forums.macrumors.com/threads/time-machine-or-western-digital-back-up.1704849/ | code | I've been using the software(WD Anywhere Back Up) that came with my 500 GB Western Digital external Hard Drive for a few years. It was connected to a 1st generation single 1.8GB G5 tower. The internal hard drive in the G5 was 160GB with an additional internal 320GB drive I added. I just changed to a Mac Mini with a 320GB internal hard drive and will be picking up an external case for the 320GB drive I had in the G5. I'll need to back up both of these drives. Will I need a much larger external hard drive if I decide to use Time Machine? Can Time Machine back up both the internal(320GB) drive and the external 320GB drive? I was satisfied with the Western Digital back up software I was using on the G5(which was running OS 10.4) but I now have 10.6.8 on the Mini which has Time Machine. Any ideas or help will be appreciated. | s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267159820.67/warc/CC-MAIN-20180923212605-20180923233005-00518.warc.gz | CC-MAIN-2018-39 | 831 | 1 |
https://forum.keyboardmaestro.com/t/trying-to-lock-vertical-coordinates-after-command-fing/14944/5 | code | Hey thanks so much for your help.
This process involves ~20 clicks and I'd like to explore scripting the whole thing in the future (if it makes sense) but for right now, it's just this one click that's giving me problems since it isn't locked in the same coordinates each time.
Below are the relevant actions. Below that are the 2 relevant screenshots.
->Move mouse and click (the blue pen next to lead notes, this opens the text field)
->Insert text by typing "qualified"
->Move mouse and click (hits save button)
Save is always in the same spot so I just do it by coordinates but the blue pen is always different vertically.
Before hitting the pen button next to lead notes
After hitting the pen button
Contrary to what I said prior in the chain, the actual goal is to click that highlighted blue pen icon next to lead notes, not lead notes itself.
<div class="slds-form-element__control slds-grid itemBody" data-aura-rendered-by="2661:438;a">
<span class="test-id__field-value slds-form-element__static slds-grow " data-aura-rendered-by="2662:438;a">
<span data-aura-rendered-by="2652:438;a" class="uiOutputTextArea" data-aura-class="uiOutputTextArea">
<!--render facet: 2654:438;a-->
<!--render facet: 2664:438;a-->
<button class="slds-button test-id__inline-edit-trigger slds-button_icon slds-button_icon-small slds-shrink-none inline-edit-trigger slds-button_icon-container" type="button" title="Edit Lead Notes" data-aura-rendered-by="2058:0">
<lightning-primitive-icon data-aura-rendered-by="2059:0" lightning-primitiveicon_primitiveicon-host="">
<svg lightning-primitiveIcon_primitiveIcon="" focusable="false" data-key="edit" aria-hidden="true" class="slds-button__icon">
<use lightning-primitiveIcon_primitiveIcon="" xlink:href="/_slds/icons/utility-sprite/svg/symbols.svg?cache=9.26.0#edit">
<span class="slds-assistive-text" data-aura-rendered-by="2061:0">Edit Lead Notes</span>
Does this look more like it? Also in between the two "uses" there was a line that said #shadow-root that I couldn't copy and paste, is this important for our purposes? | s3://commoncrawl/crawl-data/CC-MAIN-2021-17/segments/1618038077818.23/warc/CC-MAIN-20210414125133-20210414155133-00347.warc.gz | CC-MAIN-2021-17 | 2,058 | 21 |
https://devshive.tech/link/rjutda8he/angular-ngrx-a-clean-and-clear-introduction | code | The objective of this article is to provide a clean and clear introduction to ngrx. In order to accomplish this, I am going to explain the things you need to know and understand about ngrx and then we are going to see it in action with some simple and understandable code examples.
Finally, I am going to provide the link to the GitHub repo containing the examples so you can play around with the code.
This is the list of topics that we are going to discuss in this article:
The main purpose of this pattern is to provide a predictable state container, based on three main principles.
Let’s go through the three principles of the Redux pattern and point out the most important benefits they provide.
In the case of a redux/ngrx architecture, this means that the state of your whole application is stored in an object tree within a single store.
You are never going to change the state directly instead you are going to dispatch actions. These actions describe what’s happening (can be things like getting, adding, removing, updating the state).
By avoiding to update the state from different places and having a centralized place to make changes, that responds to specific actions, you get a lot of benefits. Just to mention the most important ones:
The operation triggered by dispatching an action is going to be a pure function called, within the redux architecture, reducers. | s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947473824.13/warc/CC-MAIN-20240222161802-20240222191802-00333.warc.gz | CC-MAIN-2024-10 | 1,383 | 9 |
http://lists.slug.org.au/archives/slug/2005/05/msg00180.html | code | SLUG Mailing List Archives
[SLUG] urgent! Hard disc dissapeared.
- To: Sydney Linux User Group <slug@xxxxxxxxxxx>
- Subject: [SLUG] urgent! Hard disc dissapeared.
- From: Jeff Ai <jeffaiau@xxxxxxxxxxxx>
- Date: Wed, 11 May 2005 16:13:09 +1000
- User-agent: Mozilla Thunderbird 1.0.2 (Windows/20050317)
I was doing some recording using audacity, when i tried to save a
project, the system froze and i could not switch to a console to shut
the machine down, so i had to use the reset button and after this my
system could not boot up anymore, it could not a mount the hard disk
which i mount to /home ... the error message reads
The superblock could not be read or does not describe a correct ext2
filesystem. If the device is valid and it really contains an ext2
filesystem (and not swap of ufs or something else), then the superblock
is currupt, and you might try running e2fsck with an alternate superblock:
e2fsck -b 8193 <device>
then i log into the rescue mode and the /dev/hdb1 is not there. what is
going on here? googling didn't give me much more information.
i have all my data on this disk and only have a partial backup ... can
anyone please help me?
thanks a lot
urgent! Hard disc disappeared. | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368704645477/warc/CC-MAIN-20130516114405-00057-ip-10-60-113-184.ec2.internal.warc.gz | CC-MAIN-2013-20 | 1,204 | 23 |
https://git.rockbox.org/cgit/rockbox.git/log/wps/rockbox_failsafe.fms?id=ef05dc9c3b&showmsg=1 | code | wpsbuild.pl is enhanced to produce fallback themes that were previously
hardcoded in buildzip.pl. It also recognizes resolution strings as
regular expressions now so you can specify resolution dependant settings
as <setting>.<regex>: <value> (needed to support single themes on multiple
resolutions). The WPSBUILD syntax completely changed as
well and it includes the fallback themes as well. Ultimately wpsbuild is
also able to install .fms files. | s3://commoncrawl/crawl-data/CC-MAIN-2021-17/segments/1618038077818.23/warc/CC-MAIN-20210414125133-20210414155133-00187.warc.gz | CC-MAIN-2021-17 | 448 | 7 |
https://converttolinux.com/dhclient.shtml | code | DHCP Clients exists on almost all the various Linux, HP-UX, Solaris, Irix and other UNIX platforms. This is very important in the network real world. You want to have as much as possible, all your clients on DHCP (Dynamic Host Control Protocol) so you do not have to change the address on hundreds of servers, every time you move. This page serves as a practical guide. If I have left out your particular flavor of Linux or UNIX, please send me an email with the appropriate information.
This file in /etc/resolv.conf
should be on all systems as:
#Madeup IP addresses and domain name, put in your own
# You may have to search more than one domain or be using multiple
# domains. Consult your network admin.
This would include versions B.11.23 and greater. You only need to
change one file: /etc/rc.config.d/netconf
You will see a line that says DHCP_ENABLE="0"
The zero on the right denotes off, to turn on DHCP change the zero to one. If there are any lines denoting IP Addresses you can comment them out with a "#" sign as the first character. You can then reboot the machine or take the network down and back up. Note, You want your network Admin to delete any addresses in the DNS table.
I spent at least two days on this and could find nobody that could make it work. This seems to be the consensus on the internet. You will see some kind of /usr/lbin/dhcpclient -b lan0 -p -l 8 process running but it will not update the DNS table on the name server.
You need to go to /etc/sysconfig/network-scripts
and edit the file for the appropriate card. Careful some systems may have two cards, one going to an external network and one going to an internal private network. Pick the right one. Let us assume it is eth0 here. Here is a sample file:
# Address follows made up by me
If you see any coded IP addresses in there comment them out with the "#" sign as first character.
Gentoo Linux is suprisingly easy of all the Linuxes out there.
Simply edit /etc/conf.d/net
Make the config_eth0= ... line be
dhcpcd_eth0="-t 15"#Timeout after 15 seconds
Note, alot of these procedures could be done with the GUI interface, but being an administrator you probably prefer the command line so you are getting it here.
Please allow me to start with Version 10 and work my down to Version 8
which can be the most difficult.The following steps will be done in all
Here is what I did , I took something off the web to force the hostname,
but DNS server was still not getting updated.
ifconfig hme0 dhcp realease
ifconfig hme0 dhcp
Then all worked, so I stuck it in a script.
# cat set_hostname
# Hey, it is kludgy , but it works.
echo "Setting hostname to $HOSTNAME... \c"
uname -S $HOSTNAME
# now take DHCP up and down to get rid of the 22.214.171.124 route
echo "Cleaning up DHCP, take a deep breath and relax! "
/usr/sbin/ifconfig hme0 dhcp release
/usr/sbin/ifconfig hme0 dhcp
echo "Done Om, Shanti ......"
**** here is the symbolic link *******
# ls -al ./S70set_hostname
lrwxrwxrwx 1 root other 24 Feb 21 08:51 ./S70set_hostname
# uname -a
SunOS javabox 5.6 Generic_105181-33 sun4u sparc SUNW,Ultra-5_10 # exit
These machines were top quality in their prime 20 years ago. I found it is easiest here to use the GUI interface. You will be installing the proclaim dhcp client. Even after doing everything right, that is setting up the gateway, subnet mask etc. you may find proclaim is listed as a process but still has not updated the DNS nameserver. Just follow the same solution as in Solaris 8. Have the network admin use the hardware address of the card to reserve a DHCP lease and update the DNS nameserver appropriately.
Use the command line/GUI interface of smitty and select
dhcp and enter the hostname You will type something like:
Sorry, IBM does not let you do config files easily so this is one time, you have to use the GUI. Do a
to check and it should look more or less like the Solaris One above.
If you are using Multinet 5.1 or greater you can do the
following to set up the dhcpclient
Type the previous at the dollar prompt. You can then choose to modify the network interface
Enable the dhcp client and type ctrl-z to exit the menu. Save the network config when it asks you. Note, you will also have to edit using the VAX EDT editor the dhclient.conf file you can see all the details here It also here as a text file. If you have Multinet, lower than this, i.e. verison 4.0 just use the same menu but type in your static IP address and your gateway under global parameters. You can launch this by typing
multinet configure /menu
Note , there is no dhcp client choice here. You may have problems getting the machine to reboot
This is because old VAX hosts like version 7.1 also come up in an EFI-Shell like HP-UX boxes. To fix this as the box comes up type help you should see be able to then show device
Select the appropriate device, there may be several starting with diaX where X is a number. If it was dia5 you wanted you would type boot dia5
If you try all the dia devices one of them will probably work.
This is the TCPIP that comes built into the old VAX hosts of about
20 years ago VMS Version 7.x. Here is how to do it:
You can go through the menu using
The key is to select "routing" under interfaces.
Also make sure you enable the dhcp client for only one card, usually the first one. It will say primary. You want to ENABLE GATED and DISABLE ROUTED. You have to do this in two steps. When you enable gated, it will tell you to rename a file to
Here is the file, you need to put in the gateway and uncomment the "static clause". You have to use the EDT editor.
You may get an error message about log full with a warning
This is important to clear once in a while. Upon rebooting:
to get back to boot machine. "clearlogs"
may also work.
Sometimes the system may just sit there and not boot up
This is because you must first select the device and tell it which system to boot. i.e.:
type fsx: where x is your bootdisk (0, 1, 2...)
type hpux to start hpux bootloader.
I hope this was useful to somebody out there. | s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296816070.70/warc/CC-MAIN-20240412194614-20240412224614-00405.warc.gz | CC-MAIN-2024-18 | 6,027 | 70 |
https://gwwiki.icrr.u-tokyo.ac.jp/JGWwiki/KAGRA/Subgroups/VIS/VISMinutes20201002 | code | Agenda/Minutes on 2020/10/2
CRY+VIS Interface Meeting
Participants: Takahashi, Hirata, Aso, Sato, Akutsu, Miyo, Ikeda, Ushiba, Kimura, Shoda
Participants: Takahashi, Hirata, Aso, Sato, Miyo, Ikeda, Shoda, Sugiyama, Terrence, Iguchi, Fabian, Tanaka, Ishizaki, Uchiyama, Miyoki, Washimi
- Sugiyama-san(ICRR, Uchiyama Lab.) will join VIS group, mainly for reinstallation of Type-A tower in Y-end.
- [Takahashi, Miyo, Ikeda] We plan to test the heater control at the cross tube in IX or IY on Oct. 20-21.
- Limit switches will be reviewed by SEO on Oct. 9th.
Report of the week of the 28th of September
Measured the resonant frequency of BS IP (15136). it's not too different to what I had measured with a higher temperature. I haven't measured the other ones.
I calculated we require to put 132 grams on top of BS Bottom Filter in order to bring F1 to nominal position at zero with the fishing rod in midrange. See Type-B remedying work document.
- Taking into account the weight of the F0 yaw stepper motor (330 grams) that we need to install, and the amount of ballast on F0 keystone (413 grams), we can see the F0 load is overweight by 50 grams.
To fix this, Hirata-san designed a new F0 keystone top plate far ligher than the current one (JGW-T2012090). It should work well.
- Next week I will go to the mine and put aside the 132 grams of ballast divided into two equal parts.
In the context of calculating the amount of ballast required in SR3 I realized that when moving the BF keystone to -1.47mm the system touches something and free oscillations stop (15122). This is not a problem currently but it should not happen. More investigation is required. It touches before the fishng rod reaches midrange.
Despite this problem it was able to roughly estimate we require to remove 76 grams from the IM and add 43 grams on top of the BF. See Type-B remedying work document.
- I calibrated (roughly) the keystone displacement in terms of stepper motor steps, and then calculated the total displacement all the way to midrange position, which is beyond the position where it currently touches. Using the spring constant I calculated we need to remove 76 grams.
F1 fishing rod is completely jammed -429 um.To bring it to nominal we need to remove 33 grams from its load. However, we will remove about 76 grams from the IM, which implies we'll need to add 43 grams on top of BF.
We have a record of the mass we put on top of SR3 IM (Type-B remedying work) and it seems hard to remove 76 grams in a symmetrical way. I'll need to design some masses that should allow us flexibility. Work in progress.
- Finished to make the CAD library for additional devices.
- Designing the circuit board.
- RSE Trial was extended to Oct. 12th.
- Preparation work.
- Procedure documents.
- Criteria in the acceptance test.
- PAB (10/8)
- Chief Meeting (10/12)
[Terrence] VIS health check system VISHack
- I have finished coding the essentials of the health check system and is ready to release the first version of it. What it can do:
Read a config file and do health check according to the config file Sample config.
- There's command line utilities to generate a sample config file.
- The config file specifies the tests that we want to do and the associated diaggui XML files or directories.
- For now, available tests are RMS, mean-square error, maximum absolute error. And, we can do tests with the data whitened by some reference data.
- I have tested with k1ctr1, and it Will measurements.
After doing the tests, we can choose to output a report of the health check. Sample report
- In the report, if there are any suspicious results, it will be in the alert section.
- If we want to do something with the report without outputting it, we can access the report with the code, it is just an attribute of a class. The same goes to the alerts.
I will finalize the code for the first version and make documentation for how to actually use it. Documentation webpage is available VISHack documentation. It is updated automatically as I do git pushes. So you are always looking at the most updated version.
The week from 10/5
- Takahashi: 10/7-10/9
- Sato: 10/7-10/9
- Hirata: 10/7-10/9
The week from 10/12
- Takahashi: 10/12-16
- Sato: 10/12-16
- Hirata: 10/12-16
- On 2020/10/9(Fri) | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335004.95/warc/CC-MAIN-20220927100008-20220927130008-00749.warc.gz | CC-MAIN-2022-40 | 4,263 | 46 |
https://www.speakingprocentral.com/circuit/extemporaneous/ | code | 32 historic women's speeches to close #WomensHistoryMonth
The Eloquent Woman
MARCH 27, 2015
In the same year, journalist Ida Tarbell''s "Industrial Idealism" speech was a rare speaking circuit lecture by a woman--who was sometimes advertised as "the woman who talks like a man." 1963: Julia Child''s "The French Chef" cooking demos took television by storm, giving a woman an unusual platform for extemporaneous speaking-while-demonstrating. | s3://commoncrawl/crawl-data/CC-MAIN-2020-45/segments/1603107902745.75/warc/CC-MAIN-20201029040021-20201029070021-00221.warc.gz | CC-MAIN-2020-45 | 441 | 4 |
https://burst-statistics.com/whitelist-burst-statistics-in-complianz/ | code | In this article
Whitelist Burst Statistics in Complianz
Burst Statistics is unsurprisingly fully integrated with Complianz. Depending on your configuration with the Complianz wizard Burst will be set prior to consent, or when the category “Statistics” is enabled. Burst Statistics is by default set to the most privacy-friendly settings, but some regions (e.g., United Kingdom) still require consent for any statistics configuration.
Why you might want to whitelist Burst StatisticsYou can use Burst Statistics together with Google Analytics or any other analytics tool as well. For example; When using the Complianz wizard you can configure Google Analytics that needs consent in multiple regions, but you want Burst Statistics to be set without consent
How to whitelistYou can use Complianz’s script center to whitelist scripts that might otherwise be blocked. In the case of Burst Statistics, please go to Complianz -> Integrations -> Whitelist a script, iframe or plugin and enter the following scripts: | s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947476413.82/warc/CC-MAIN-20240304033910-20240304063910-00683.warc.gz | CC-MAIN-2024-10 | 1,013 | 5 |
http://forums.atozteacherstuff.com/index.php?threads/how-much-communication-w-admin.184433/page-2 | code | I work in a bit of a dual role, as I teach in the morning, and work in the main office in the afternoon (technology specialist), so I tend to talk to our administrators pretty much every day, several times. That said, my office is almost directly across from both of them, so it would probably be odd if I didn't speak to them. But... I do know there are plenty of teachers in my building that almost never speak to the administrators unless they have to. We have about 1,000 kids in the building, so not a super-huge place, but big enough that if you don't want to talk to someone, you can generally successfully avoid them. | s3://commoncrawl/crawl-data/CC-MAIN-2019-35/segments/1566027313501.0/warc/CC-MAIN-20190817222907-20190818004907-00215.warc.gz | CC-MAIN-2019-35 | 625 | 1 |
https://www.computerjobs.ie/jobs/9467897/front-end-developer.asp | code | Senior Front End Engineer
I am looking for world class Front End Candidate to join a growing team with over 150 employees who are innovative and talented on the Front End to become part of one of Ireland's IT Success stories. You will work on websites for several different brands across the global market.
This company provide a huge emphasis on teamwork and personal development. They provide on the job training regularly giving you the chance to enhance your skill set and providing you with a platform to grow with a company who are growing at a rapid rate. This role will bring you into close contact with designers and engineers connecting thousands of global users who use your websites and other applications.
Create elegant and efficient code.
Develop and design Front End features
Use modern frameworks and libraries like React.js
Mentor junior developers
Provide solutions to complex issues.
Bachelor's degree in Computer Science or an equivalent industry qualification.
4+ years' experience in web development.
3+ years commercial experience on the Front End.
Git/BitBucket or other version control experience
Familiarity with Rest API'S
Prior experience in an Agile working Environment.
Excellent Communication Skills.
Ability to mentor and guide.
Keen interest in cutting edge tech.
This opportunity will prove to be popular amongst well-seasoned developers who are keen to work for one of the worlds fattest growing platforms. You will have the opportunity to work across all areas of the product lifecycle for various projects offering new challenges each day.
Salary ranges from €50,000 - €70,000 there are various additional benefits as part of the package.
To apply or to find out more please contact Gary O'Neill @ Reperio Human Capital.
Reperio Human Capital acts as an Employment Agency and an Employment Business. | s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600400213454.52/warc/CC-MAIN-20200924034208-20200924064208-00787.warc.gz | CC-MAIN-2020-40 | 1,841 | 21 |
http://pixeljamgames.blogspot.com/2006/04/same-blog-new-url.html | code | Hello. Welcome to the new Pixeljam Games blog. I've changed the blog URL from http://pixeljam7.blogspot.com to http://pixeljamgames.blogspot.com. I thought that might make things easier, since pixeljam7 seems somewhat arbitrary. I would have preferred http://pixeljam.blogspot.com, but that's already taken.
So, for now the original blog still exists, but I will be bringing all the old blogs over to this one today. The dates of the original blogs might all say today, but don't let that fool you, I've been creating a blog a week for a few months now.
I'll also be writing a new one tomorrow, and it looks like I might just have some excellent news to report! | s3://commoncrawl/crawl-data/CC-MAIN-2018-30/segments/1531676590074.12/warc/CC-MAIN-20180718080513-20180718100513-00229.warc.gz | CC-MAIN-2018-30 | 661 | 3 |
https://forums.softraid.com/profile/karolintincher5/ | code | The Microsoft Relaxation API Pointers, as a design principle, encourages software builders to have resources accessible to them through a RESTful HTTP interface. To offer the smoothest possible expertise for developers on platforms following the Microsoft Rest API Pointers, Rest APIs Should comply with constant design guidelines to make using them simple and intuitive. This doc establishes the rules Microsoft Relaxation APIs Ought to observe so RESTful interfaces are developed persistently. Developers access most Microsoft Cloud Platform sources via HTTP interfaces. Though every service sometimes gives language-particular frameworks to wrap their APIs, all of their operations eventually boil all the way down to HTTP requests. Microsoft should help a wide range of clients and companies and cannot depend on wealthy frameworks being available for Buy mircette online each growth setting. Thus a goal of these tips is to ensure Microsoft Rest APIs can be easily. Persistently consumed by any shopper with fundamental HTTP support. To supply the smoothest potential expertise for builders, it is important to have these APIs follow constant design tips, thus making using them easy and intuitive.
To learn extra about Quarkly, check out this text: How to hurry Up Web Growth Course of Using Quarkly, or attempt Quarkly instantly right here. Budibase is an open-source low code platform that helps you to build inside apps by yourself infrastructure. It claims to be in a position to construct internal instruments 50x quicker than constructing inside apps from scratch. Budibase builder comes in a desktop platform that permits you to construct your internet app and preview it. With Budibase, farmacie online you may create a web application using drag’n’drop technology, combine it with your personal database, create automation duties, Buy himcolin online and more. Build and ship actual software program. Unlike other platforms, Budibase permits you to build and ship single-web page applications. Open supply. Extensible. Budibase is open-supply. The builder is licensed AGPL v3, the server is GPL v3, and the consumer is MPL. Load information or Buy celebrex online start from scratch. Budibase imports knowledge from a number of sources comparable to MongoDB, CouchDB, Buy minocin online PostgreSQL, mySQL, Airtable, Google Sheets, S3, DyanmoDB, or Relaxation API.
Information visualization and representation is usually a hard and daunting task, however with Star Admin React you can get a robust admin template with various tables, maps, apps, and more essential elements out of the box. This product affords limitless customization choices. Permits the addition of unique touches to make the design unique. 7. Materially gives you with all potential app pages. Ingredients to serve any software requirement with minimal configuration. This product seems with multiple decisions for widgets, Buy mircette online chart icons, and lots of extra options assembled with a significant code construction, and nice format construction. Datta In a position Admin Template comes with an amazing selection of pre-designed parts that you could simply adapt to any display measurement. The code structure is extremely flexible to make use of and modify, and the idea of the dashboard is very elegant eye catchy for contemporary endeavors. So, In case you are in search of advanced settings, Datta In a position is one most intriguing resources of this sort in the present market. | s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320304600.9/warc/CC-MAIN-20220124185733-20220124215733-00617.warc.gz | CC-MAIN-2022-05 | 3,487 | 3 |
https://www.mail-archive.com/[email protected]/msg05604.html | code | Hello, I have assigned myself to all things that I would like to see in 0.9.0 and will try to implement all of them as soon as possible. Sadly, this is probably all I can do until the release besides the typical maintenance and code review.
Greetings Uwe On Thu, Feb 8, 2018, at 1:17 AM, Wes McKinney wrote: > hi all, > > I just removed about 40 issues from the 0.9.0 backlog. The remaining > ~60 are a mix of bug fixes, documentation improvements, rough edges > that user have reported, and minor features. I think some more of > these could be trimmed, but we should try to fix as many of the bugs > as possible: > > https://issues.apache.org/jira/projects/ARROW/versions/12341707 > > This is still a lot of work to do, particularly on the Python side, > and reflects the rapid growth of the Python user base. One factor > driving this growth is the use of the Parquet format, and > correspondingly we have accumulated many bugs and rough edges related > to Parquet use. > > Is there anything that is not in the 0.9.0 backlog that needs to be? > > Thanks, > Wes | s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376826968.71/warc/CC-MAIN-20181215174802-20181215200802-00403.warc.gz | CC-MAIN-2018-51 | 1,063 | 2 |
https://www.coursehero.com/file/6660169/Operating-systems-page71/ | code | Jelena Mamčenko Operating Systems Lecture Notes on Operating Systems 71versions and implementations contain many other language compilers and toolsets. Early BSD releases included Pascal tools, and many modern Unix systems also include the GNU Compiler Collection as well as or instead of a proprietary compiler system. oOther tools— including an object-code archive manager (ar), symbol-table lister (nm), compiler-development tools (e.g. lex& yacc), and debugging tools. •Commands— Unix makes little distinction between commands (user-level programs) for system operation and maintenance (e.g. cron), commands of general utility (e.g. grep), and more general-purpose applications such as the text formatting and typesetting package. Nonetheless, some major categories are: osh— The "shell" programmable command-line interpreter, the primary user interface on Unix before window systems appeared, and even afterward (within a "command window").
This is the end of the preview.
access the rest of the document. | s3://commoncrawl/crawl-data/CC-MAIN-2018-13/segments/1521257647498.68/warc/CC-MAIN-20180320150533-20180320170533-00297.warc.gz | CC-MAIN-2018-13 | 1,019 | 3 |
http://www.cricketweb.net/forum/2484405-post10.html | code | Ken McEwan was the first thought that came to my mind. Good to see he's in there - he was brilliant for Essex.
Fascist Dictator of the Heath Davis Appreciation Society
Supporting Petone's Finest since the very start - Iain O'Brien
Adam Wheater - Another batsman off the Essex production line
Also Supporting the All Time #1 Batsman of All Time Ever - Jacques Kallis and the much maligned Peter Siddle.
Vimes tells it how it is:
Originally Posted by Samuel_Vimes
Heath worryingly quick. | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368706624988/warc/CC-MAIN-20130516121704-00017-ip-10-60-113-184.ec2.internal.warc.gz | CC-MAIN-2013-20 | 485 | 8 |
https://phabricator.wikimedia.org/T223602 | code | Arising from James's previous musing, and discussions at the 2019 Hackathon.
- InitialiseSettings.php (and much of CommonSettings.php) is replaced with per-wiki inheritable YAML files (to allow comments).
- Actually-variant config goes into a much slimmer CommonSettings.php (or re-worked to not vary).
- On merge, the YAML files are converted into one JSON file per wiki, for the currently-deployed version(s) of MW, which are stored in git.
- This replaces the opportunistic cache in /tmp that we current have.
allwikis.yaml | Default values for all wikis (e.g. wgNamespacesWithSubpages which is over-ridden, or wgEnableCanonicalServerLink which isn't) | +- wikipedias.yaml | Standard values for Wikipedias, where they differ from defaults (e.g. wgSitename or the fallback logo) and special inheritances | +- dewiki.yaml Bespoke values for the German Wikipedia (e.g. the logo, or FlaggedRevisions configuration) and other special inheritances
|Task||Current situation||Future state|
|Config authored in||InitialiseSettings.php||wikipedias.yaml etc.|
|Config build step||Runtime cache, in /tmp/||Build time static file, in /srv/mediawiki/|
|mw-config merge||Trivial rebase||Full production build of on JSON static file per wiki|
|Config read step||From cache or computed live||Always read from built static file|
- Variant configuration will be static, making it more plausible to inject into docker images.
- It will be much clearer exactly which wikis' config is changing, so deployers have more confidence.
- YAML configuration files explicitly set the inheritance pattern.
- Easier to compare one wiki's config with another's (e.g. "how different is dewiki from frwiki?").
- Clear when the rump of CommonSettings refers to undefined variables; variant config forced to be merged first.
- Merging is harder (and slower?).
- Harder to audit all wikis' config for settings that "shouldn't" be over-ridden, or see how values vary.
- Production branch pruning, currently just a disc operation and a sync, now needs a commit to mw-config as well as a deploy to delete.
First time we're reading YAML files in PHP prod.We're not reading them in prod, only in CI.
- Deterministic sort of output files to avoid noise.
- Assuming that alphasort of the array by keys (ksort) sufficient.
- How do we do splicing in private settings at run time?
- Private settings are already spliced in in CommonSettings; no change.
- Syntax for specifying config, and that a document inherits from another.
- Roughly worked out; to be documented.
- Syntax for specifying that descendent config can't over-ride (e.g. wgMiserMode)
- For now, this is just a simple all.yaml file that is re-applied at the end and so can't be over-ridden.
- Do we need to vary on the PHP run-time still? (once HHVM is un-deployed can this go away, or are there reasons beyond PHP serialisation format that we think this might vary?)
- No. Nothing has been variant between HHVM and Zend for a while. No reason to continue.
- How does the CI work for this?
- Do we need to check on build time that a vanilla MediaWiki install (i.e., DefaultSettings) doesn't set any config that isn't represented in all.yaml?
- What do we do about variant non-static config?
- Write cached config to JSON as well as serialised PHP https://gerrit.wikimedia.org/r/c/operations/mediawiki-config/+/533592/
- Read cached config from JSON not serialised PHP https://gerrit.wikimedia.org/r/c/operations/mediawiki-config/+/533593/
- Stop writing cached config in serialised PHP https://gerrit.wikimedia.org/r/c/operations/mediawiki-config/+/533594/
- Write YAML files reader and hook into CI
- Migrate dblist definition into the YAML structure and make the dblist files auto-generated
- Write "InitialiseSettings.json" JSON file writer and hook into CI
- Migrate initial settings from InitialiseSettings.php to YAML
- Completely move all static variant config into YAML; scrap dblists and InitialiseSettings.php
- Pre-calculate config for each wiki and store it in config.git https://gerrit.wikimedia.org/r/c/operations/mediawiki-config/+/507729/
- Make scap steps to change target for each wiki update cached config in config.git, not just wikiversions.json
- Load config from config.git on disc, not from /tmp | s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510427.16/warc/CC-MAIN-20230928162907-20230928192907-00855.warc.gz | CC-MAIN-2023-40 | 4,240 | 44 |
https://github.com/mpyatkov/sbars | code | LAST UPDATE: 08.02.2014 // Program crashing on low resolution screens is fixed
===== S.B.A.R.S - Spectral-Based Approach for Repeats Search
S.B.A.R.S - bioinformatics tool for search different types of long repeats in sequences comparable by size with chromosomes.
S.B.A.R.S tested only on Ubuntu 12.04 (32 bit) for others distributives may require additional libraries.
tested on WinXP,Win7,Vista (32 bit) | s3://commoncrawl/crawl-data/CC-MAIN-2018-43/segments/1539583516123.97/warc/CC-MAIN-20181023090235-20181023111735-00406.warc.gz | CC-MAIN-2018-43 | 406 | 5 |
https://blog.stephencleary.com/2010/03/xmldocs-linking-to-overloads-page.html | code | XML documentation has a natural “link to code” element: the <see> tag. When a function is overloaded, the resulting help file contains an “overloads” page like this, but getting the see element to link to the overloads page is not exactly straightforward.
The <see> tag is one of the tags that is verified by the compiler, so it’s not possible to just stick anything in there. The see.cref attribute must be a resolvable code element. The compiler doesn’t allow you to resolve to a method group; it wants a single, unambiguous member reference.
Here’s an example of a warning/error message when attempting to link to an overload group:
Warning as Error: Ambiguous reference in cref attribute: 'FindFiles'. Assuming 'Nito.KitchenSink.WinInet.FtpHandle.FindFiles(string, Nito.KitchenSink.WinInet.FtpHandle.FindFilesFlags)', but could have also matched other overloads including 'Nito.KitchenSink.WinInet.FtpHandle.FindFiles()'.
Here’s a little-known fact about the <see> tag: it will not verify any see.cref values that start with a single character followed by a colon. This enables specifying full DocumentationId links such as “T:Nito.Async.ActionDispatcher”.
There is a standard extension of the DocumentationId format for overloads that is understood by Sandcastle: it uses the “Overload:” prefix as such: “Overload:System.Windows.Threading.Dispatcher.Invoke”. Unfortunately, Visual Studio (as of 2008) will attempt to resolve a link like this, and will fail.
The workaround is to use the “O:” prefix for such links (this prefix is unused by the DocumentationId format), and modify the XML documentation file before it is passed to Sandcastle. The “O:” prefix bypasses Visual Studio’s verification, and the “Overload:” prefix is correctly understood by Sandcastle.
In my projects, I use the following XSLT transformation to automatically translate see.cref references starting with “O:” to have a prefix of “Overload:” instead:
<?xml version='1.0'?> <xsl:stylesheet xmlns:xsl='http://www.w3.org/1999/XSL/Transform' version='1.0'> <xsl:output method="xml" indent="yes"/> <!-- Copy all documentation as-is except for what matches other rules --> <xsl:template match="@* | node()"> <xsl:copy> <xsl:apply-templates select="@* | node()"/> </xsl:copy> </xsl:template> <!-- Convert "cref" references that start with "O:" to starting with "Overload:". --> <xsl:template match="@cref[starts-with(., 'O:')]"> <xsl:attribute name="cref"> <xsl:value-of select="concat('Overload:', substring-after(., 'O:'))"/> </xsl:attribute> </xsl:template> </xsl:stylesheet>
By the way, it’s not difficult to include an XSLT transformation as part of an MSBuild project file (with the MSBuild Extension Pack). It’s beyond the scope of this blog post, but you can check out the Nito.Async main project build file for an example. | s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100599.20/warc/CC-MAIN-20231206130723-20231206160723-00049.warc.gz | CC-MAIN-2023-50 | 2,858 | 10 |
https://www.barcoding.com/blog/partner/sendum/ | code | The world leader in real time package tracking.
Sendum is the world leader in package tracking technology. Our products are used around the globe by customers to track and ensure the proper care and handling of mobile assets. Sendum designs and manufactures wireless security devices for tracking people or things that you must find. Unlike other wireless location device manufactures, Sendum’s products are designed to be located in places where traditional GPS can not work (in a building, in a vehicle, inside a container, inside a semi-trailer, etc.). | s3://commoncrawl/crawl-data/CC-MAIN-2021-10/segments/1614178360293.33/warc/CC-MAIN-20210228054509-20210228084509-00321.warc.gz | CC-MAIN-2021-10 | 557 | 2 |
https://ignitedblog.com/bluehost-can-you-upgrade-your-packages/ | code | Bluehost Can You Upgrade Your Packages
Discovering a top notch low-cost web hosting company isn’t very easy. Every website will have different demands from a host. And also, you have to contrast all the attributes of a hosting business, all while trying to find the most effective bargain possible.
This can be a lot to kind through, specifically if this is your first time purchasing hosting, or developing an internet site.
The majority of hosts will certainly provide very inexpensive introductory pricing, only to raise those rates 2 or 3 times greater once your initial call is up. Some hosts will certainly provide totally free rewards when you sign up, such as a complimentary domain name, or a free SSL certificate.
While some hosts will have the ability to offer better efficiency and high levels of security. Bluehost Can You Upgrade Your Packages
Listed below we dive deep into the best inexpensive host plan there. You’ll discover what core organizing features are necessary in a host and also just how to evaluate your very own holding demands to make sure that you can pick from among the best cheap organizing companies listed below.
Disclosure: When you buy a webhosting bundle through web links on this web page, we gain some compensation. This assists us to maintain this website running. There are no extra prices to you at all by using our web links. The list below is of the very best inexpensive host bundles that I have actually directly used as well as checked.
What We Take into consideration To Be Economical Host
When we explain a webhosting plan as being “Cheap” or “Spending plan” what we indicate is hosting that comes under the cost brace in between $0.80 to $4 monthly. Whilst looking into cheap hosting companies for this overview, we considered over 100 various hosts that fell into that cost range. We then analyzed the quality of their cheapest hosting package, worth for money and customer care.
In this article, I’ll be reviewing this first-rate internet site holding firm as well as stick in as much relevant details as possible.
I’ll review the functions, the rates alternatives, and also anything else I can think of that I believe may be of advantage, if you’re choosing to register to Bluhost and also obtain your internet sites up and running.
So without additional ado, allow’s check it out.
Bluehost is just one of the most significant host companies in the world, getting both large advertising and marketing support from the firm itself as well as affiliate marketing professionals who advertise it.
It truly is a substantial company, that has actually been around for a very long time, has a large track record, and is definitely one of the top selections when it involves host (most definitely within the top 3, at least in my book).
But what is it specifically, as well as should you obtain its services?
Today, I will certainly address all there is you require to know, provided that you are a blog owner or a business owner who is seeking a web host, and also does not understand where to start, since it’s a wonderful service for that audience as a whole.
Allow’s think of, you intend to hold your sites as well as make them noticeable. Okay?
You currently have your domain (which is your site destination or URL) today you wish to “turn the lights on”. Bluehost Can You Upgrade Your Packages
You need some organizing…
To complete all of this, as well as to make your web site visible, you need what is called a “server”. A web server is a black box, or gadget, that saves all your internet site information (data such as photos, texts, videos, links, plugins, and various other information).
Now, this web server, needs to get on constantly and also it needs to be attached to the net 100% of the moment (I’ll be stating something called “downtime” in the future).
On top of that, it likewise needs (without getting too fancy as well as into details) a file transfer protocol typically known as FTP, so it can show internet browsers your website in its intended kind.
All these points are either expensive, or call for a high level of technological skill (or both), to develop and also preserve. As well as you can entirely head out there and find out these things by yourself and also set them up … but what about rather than you purchasing and also maintaining one … why not just “renting organizing” rather?
This is where Bluehost comes in. You rent their servers (called Shared Hosting) and also you introduce a website using those servers.
Given that Bluehost maintains all your documents, the business also enables you to establish your material management systems (CMS, for brief) such as WordPress for you. WordPress is a very preferred CMS … so it simply makes sense to have that option readily available (almost every hosting firm currently has this option also).
Simply put, you no longer need to set-up a server and after that incorporate a software program where you can construct your content, separately. It is already rolled right into one bundle.
Is it secure to have Bluehost deal with your internet sites?
Well … imagine if your server is in your house. If anything were to take place to it in all, all your files are gone. If something fails with its interior procedures, you require a technician to fix it. If something overheats, or breaks down or obtains corrupted … that’s no good!
Bluehost takes all these hassles away, and takes care of every little thing technological: Pay your server “lease”, and also they will deal with every little thing. And when you buy the solution, you can then start concentrating on adding web content to your internet site, or you can place your effort right into your advertising and marketing projects.
What Solutions Do You Obtain From Bluehost?
Bluehost uses a myriad of different solutions, yet the key one is hosting certainly.
The organizing itself, is of different kinds by the way. You can lease a shared web server, have a dedicated server, or additionally an onlinepersonal web server.
For the function of this Bluehost review, we will focus on hosting services and other services, that a blog writer or an on the internet business owner would require, rather than go unfathomable into the bunny hole and speak about the various other solutions, that are targeted at more experienced folks.
- WordPress, WordPress PRO, as well as ecommerce— these holding solutions are the packages that permit you to organize a site utilizing WordPress as well as WooCommerce (the latter of which permits you to do shopping). After purchasing any of these packages, you can begin building your website with WordPress as your CMS.
- Domain Marketplace— you can also purchase your domain name from Bluehost as opposed to various other domain registrars. Doing so will make it less complicated to direct your domain to your host’s name web servers, considering that you’re making use of the exact same marketplace.
- Email— when you have actually acquired your domain, it makes good sense to likewise get an e-mail address tied to it. As a blog writer or online entrepreneur, you should practically never utilize a complimentary e-mail service, like Yahoo! or Gmail. An email like this makes you look unprofessional. Luckily, Bluehost provides you one for free with your domain.
Bluehost also uses specialized servers.
And you may be asking …” What is a specialized web server anyway?”.
Well, things is, the standard host bundles of Bluehost can only a lot website traffic for your web site, after which you’ll require to update your organizing. The reason being is that the common web servers, are shared.
What this implies is that server can be servicing 2 or even more sites, at the same time, one of which can be your own.
What does this mean for you?
It means that the single server’s resources are shared, and it is doing numerous tasks at any offered time. When your website starts to hit 100,000 site sees monthly, you are mosting likely to need a devoted web server which you can also get from Bluehost for a minimum of $79.99 per month.
This is not something yous needs to fret about when you’re starting but you ought to keep it in mind for sure.
Bluehost Rates: How Much Does It Expense?
In this Bluehost evaluation, I’ll be concentrating my attention mainly on the Bluehost WordPress Hosting plans, considering that it’s the most prominent one, and likely the one that you’re searching for and that will match you the very best (unless you’re a huge brand name, business or site).
The three readily available plans, are as adheres to:
- Basic Plan– $2.95 each month/ $7.99 regular price
- Plus Strategy– $5.45 per month/ $10.99 normal cost
- Option And Also Strategy– $5.45 monthly/ $14.99 normal cost
The first cost you see is the rate you pay upon sign up, and the 2nd price is what the cost is, after the initial year of being with the business.
So generally, Bluehost is going to charge you on an annual basis. And you can additionally select the amount of years you wish to hold your website on them with. Bluehost Can You Upgrade Your Packages
If you pick the Basic strategy, you will certainly pay $2.95 x 12 = $35.40 starting today as well as by the time you enter your 13th month, you will now pay $7.99 each month, which is also billed each year. If that makes any kind of sense.
If you are serious about your internet site, you ought to 100% obtain the three-year option. This indicates that for the standard plan, you will certainly pay $2.95 x 36 months = $106.2.
By the time you hit your fourth year, that is the only time you will pay $7.99 each month. If you consider it, this approach will conserve you $120 during 3 years. It’s not much, yet it’s still something.
If you wish to obtain greater than one website (which I highly suggest, and if you’re severe, you’ll possibly be obtaining more eventually in time) you’ll intend to utilize the selection plus plan. It’ll allow you to host unlimited sites.
What Does Each Strategy Deal?
So, in the case of WordPress organizing plans (which are similar to the shared organizing plans, but are more geared in the direction of WordPress, which is what we’ll be focusing on) the attributes are as adheres to:
For the Fundamental plan, you get:
- One site only
- Secured web site using SSL certificate
- Optimum of 50GB of storage
- Cost-free domain for a year
- $ 200 advertising credit
Keep in mind that the domains are purchased independently from the holding. You can get a totally free domain name with Bluehost right here.
For both the Bluehost Plus hosting and also Choice Plus, you obtain the following:
- Unrestricted variety of web sites
- Free SSL Certificate. Bluehost Can You Upgrade Your Packages
- No storage or bandwidth restriction
- Free domain for one year
- $ 200 advertising and marketing credit
- 1 Office 365 Mailbox that is totally free for thirty day
The Choice Plus strategy has actually an included benefit of Code Guard Basic Alternative, a back-up system where your data is saved and also replicated. If any collision takes place as well as your internet site information vanishes, you can recover it to its original type with this function.
Notification that even though both strategies set you back the exact same, the Selection Strategy then defaults to $14.99 per month, normal cost, after the set quantity of years you have actually chosen.
What Are The Conveniences Of Using Bluehost
So, why pick Bluehost over various other web hosting solutions? There are hundreds of host, much of which are resellers, yet Bluehost is one select couple of that have stood the test of time, and it’s most likely one of the most well known available (and also completely reasons).
Right here are the 3 primary advantages of selecting Bluehost as your host provider:
- Server uptime— your web site will not be visible if your host is down; Bluehost has more than 99% uptime. This is extremely important when it pertains to Google Search Engine Optimization and positions. The higher the far better.
- Bluehost rate— just how your web server action establishes just how fast your site reveals on a web browser; Bluehost is lighting fast, which means you will lower your bounce price. Albeit not the best when it comes to loading rate it’s still extremely important to have a fast speed, to make customer experience far better as well as much better your ranking.
- Unlimited storage— if you get the And also strategy, you need not fret about the amount of data you save such as video clips– your storage space capacity is unlimited. This is truly crucial, since you’ll probably encounter some storage space issues in the future down the tracks, and you do not want this to be a trouble … ever before.
Finally, consumer support is 24/7, which indicates despite where you remain in the world, you can get in touch with the support team to fix your site issues. Pretty common nowadays, but we’re taking this for provided … it’s likewise extremely vital. Bluehost Can You Upgrade Your Packages
Also, if you have actually obtained a cost-free domain with them, then there will certainly be a $15.99 cost that will be subtracted from the amount you originally acquired (I visualize this is due to the fact that it type of takes the “domain name out of the market”, not sure concerning this, but there possibly is a hard-cost for registering it).
Last but not least, any kind of requests after 30 days for a refund … are void (although in all sincerity … they must possibly be rigorous here).
So as you see, this isn’t always a “no questions asked” policy, like with some of the other organizing options available, so make certain you’re okay with the plans prior to proceeding with the holding. | s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323587655.10/warc/CC-MAIN-20211025061300-20211025091300-00223.warc.gz | CC-MAIN-2021-43 | 13,828 | 83 |
https://web.codemill.tech/2017/09/30/katie-hassell-software-and-spacecraft-not-just-for-computer-scientists/ | code | The first Codemill Digital skills meetup was launched by Katie Haskell, a Spacecraft Thermal Engineer, who over the last six years has worked on a whole range of missions, including: EarthCARE, Solar Orbiter, LISA Pathfinder, Biomass and PLATO.
With the talk “Software and Spacecraft: Not Just for Computer Scientists”, Katie introduced us to general principles behind spacecraft engineering, including an overview of different roles and uses of software in addition to challenges.
- Spacecraft engineers also need to be computer scientists
- Every smallest detail matters, for example, Gaia spacecraft has stability requirements of 14 micro arc seconds.
- Thermo-elastic distortion
- Various planets in the universe have been discovered due to funny wobble on another planet
- After building a spacecraft, testing happens in a vacuum chamber to make sure the thermal model behaves the same and afterwards, simulations can be done by analysis.
You can listen to the talk and see the slides here:
CodeMill is a not-for-profit initiative providing training, education, and consulting in digital skills for the highly-connected future of IoT, wearables, low-power devices, and smart industrial automation, alongside key practices such as operability, testability, agile & lean, and team skills. | s3://commoncrawl/crawl-data/CC-MAIN-2019-13/segments/1552912202299.16/warc/CC-MAIN-20190320044358-20190320070358-00457.warc.gz | CC-MAIN-2019-13 | 1,295 | 9 |
https://www.laterpay.net/academy/interacting-with-a-publisher-specific-sign-up-system | code | |Topics: Use Cases · Connector|
|Experience Level: Advanced|
|December 17, 2019 · 8 min read|
In this particular situation, our partner had their own subscription system and wanted to integrate that with LaterPay in order to provide additional monetization possibilities.
This meant that we needed to take the following requirements into account when considering how to best implement that integration:
- Visitors would need to be able to view paid content if they logged in via our partner’s sign-in system;
- A button would need to be provided on the subscription overlay that linked directly to the partner’s sign-up / sign-in system;
- Visitors would also need to be able to purchase individual articles or subscriptions independently from the partner’s own sign up system.
To achieve all of this, we leveraged the following capabilities provided by the LaterPay Connector:
- Callbacks - used to detect whether a user is logged on and then display the purchase overlay accordingly’
- Free-form Purchasing Options - used to insert the additional button linking to the partner’s own sign-in page.
Taking it Step-by-Step
Callbacks enable partners to control events after the Connector has been deployed on the website. In other words, the partner can introduce additional conditions which, if satisfied, will result in the overlay being shown or not.
How does this benefit us in this use case? We can use callbacks to determine whether the user is logged in and, if so, we can disable the purchase overlay being deployed.
In code, the callback looks like this:
So as you can see, the Connector first needs the function that processes the logic to be declared - in our case this is the lpcReadyCallback function. Following this, we register the callback function with the connector by specifying it in the “callbacks” attribute of the laterpay-connector configuration.
The key here is “[Detect whether user is logged in]”. Unfortunately, there is no silver bullet here - different systems will have different syntax and semantics on how to process this. However, what you should look for is a token that is associated with the authenticated session, or perhaps a function in the native system which would provide you with this information.
The result of this is that lpcReadyCallback is called when the website is ready, and the overlay is conditionally displayed based on the user’s login status.
That covers the part where we have to understand whether the user is logged in or not. You can read more about this here.
Let’s now look at how to redirect the user to the native sign in/sign up page.
2) Free-form Purchasing Options
Free form purchasing options enable you to define additional options on the overlay, which can redirect the visitor to a custom URL.The benefits of this are obvious - we can redirect our visitor to a sign-up URL once the purchase overlay is displayed.
The code for this looks as follows:
<script type="application/json" id="laterpay-connector">
And it will be displayed as such on the website:
Let’s go through the individual attributes:
The Free-Form Purchase Option’s title (displayed on the first row of the list entry).
The Free-Form Purchase Option’s description (displayed on the second row of the list entry).
The Free-Form Purchase Option’s URL. The user will be navigated to this URL when they click the purchase button.
The purchase button label that will be displayed when the Free-Form Purchase Option is selected.
An object stating the amount and currency. It is used for presentation purposes, only. To display a 1.23 EUR pricing, use this:
Remember that you can use whatever currency you like here, because Free-Form Purchase Options don’t correspond to actual LaterPay Purchase Options.
An index starting with 0 for the top position. It indicates the Free-Form Purchase Option’s position on the purchase list. The default position is the bottom of the list.
A link target that is used when the Purchase Button is clicked (e.g. _blank for a new window). The default behavior is a redirect (equivalent to the target _self).
In this use-case we showcased how we can integrate LaterPay with a partner-specific sign up system. Although this does not detail a single solution that will work in every case, it does provide guidelines on how the requirement can be fulfilled by using the LaterPay Connector
To do so, we need to leverage the following capabilities provided by the Connector:
- Callbacks - used to detect whether a user is logged on, displaying the purchase overlay accordingly. We need to determine whether the hosting system provides a functionality to detect this; otherwise we need to validate whether the user token is present and valid, or something similar;
- Free-form Purchasing Options - used to add the additional button linking to the partner sign-in page, and can be customized accordingly. | s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656103646990.40/warc/CC-MAIN-20220630001553-20220630031553-00201.warc.gz | CC-MAIN-2022-27 | 4,893 | 38 |
https://dachte.livejournal.com/368816.html | code | Today, after an exhausting and short session climbing, Dmitriy, Eric, and I went to Dancing Goat, where they have free wireless and decent tea (and too-large deserts). I instructed D on the art of mod_perl, and found out that, to my great irritation, the new SELinux stuff in Fedora3 makes mod_perl considerably lessfriendly to use. Apache is not allowed to look in user directories when loading Perl modules, and there are no settings (that I was able to find) that can turn that off. Solution: disable SELinux. Sometime I need to learn more about SELinux so I won't need to do things that are that drastic. Ideally, I would be able to tell SELinux that it's ok for Apache to load mod_perl files from a certain directory, or less ideally, to tell SELinux not to manage apache at all.
Sree gave me a HUGE can of black-eyed peas today when I came to get dinner. Hurrah!
I have a friend from Columbus visiting for parts of next week. I'm hoping that some Zets might be able to hook him up with a job at CMU or elsewhere. | s3://commoncrawl/crawl-data/CC-MAIN-2021-39/segments/1631780056348.59/warc/CC-MAIN-20210918062845-20210918092845-00181.warc.gz | CC-MAIN-2021-39 | 1,018 | 3 |
https://archive.sap.com/discussions/thread/3757177 | code | Different Stock type to be put in seperate bins
I am working on a scenario where I want system to separate different types of stock type in different bins during putaway.
I have stock type F1 (availability group 001 for ROD),F2 (availability group 002 for AFS)
and M1 (availability group 001 for ROD) and M2 (availability group 002 for AFS).I want to maintain both M2 and F2 in same storage type but in different bins.
But from what I see one storage type is assigned to one availability group and thus can have only one stock type in it. Can anyone suggest me how can I achieve it?
One option I see is if I don't maintain any availability group in storage type and then change the stock type in inbound delivery to the one I want to. But I still haven't putaway it in my bin,if I change stock type in inbound delivery to F2/M2 its not correct.Is it possible to change stock type once I place stock in final bin ? | s3://commoncrawl/crawl-data/CC-MAIN-2019-13/segments/1552912203123.91/warc/CC-MAIN-20190324002035-20190324024035-00144.warc.gz | CC-MAIN-2019-13 | 913 | 6 |
https://www.npmjs.com/package/boneyard | code | Architectural Toolkit that unifies most of the common libraries used nowadays to simplify project setup and code development in general.
If the following technology stack is your choice or you just simple love developing web-apps using these libraries, please checkout this project.
- Backbone (underscore)
- RequireJS (text plugin)
While I personally consider it experimental, because most of the logic implemented and the internal mechanisms to solve dependency injection need to be tested directly in the field with real web-apps, the usage of this package is optional either, if your decide to use it to wire all the pieces completely or partially.
Also, this IoC package was inspired by the module
wire.js of CujoJS Project. It essentially establishes a good architectural foundation for your project and keeps the separation of concerns as clean as possible. So, you will find some similarities while declaring specs using Boneyard.
Lastly, Boneyard provides 2 more additional packages,
Boneyard UI package offers a list of common reusable components, easy to extend and easy customize. These components are in essence, "classes" that extend the original
Backbone.Viewto get the best of backbone's binding mechanisms, plus all the styling capabilities provided by bootstrap to skin and render those components.
Boneyard Util package, provides a set of utilities that may help you to perform some common tasks.
Boneyard was empirically crafted by following common good practices discovered while developing web apps using backbone/requirejs libraries. However, boneyard is still not recommended to be ran in production environments but for experimental purposes only, due to the fact that the patterns and decisions that made up this toolbox are going to be subjected to change over time. As long as the community will provide feedback based on their experiences using this toolkit to keep improving the original idea until the tool itself will reach a certain level of maturity to consider it production ready. Be aware of possible bugs or missing functionality, specially in the bootstrap-ui module. I will be fixing those as soon as I can.
- Node And NPM installed
The library itself is distributed on bower. So, to get the distribution you run:
bower install boneyard
However, Boneyard also ships with an optional tool called Boneyard Composer that is only published on the NPM registry (See 'Usage' section below). This tool is a simple utility that in general you will run only in development mode. In your project root folder, you simply run:
npm install --save-dev boneyard
If you've decided to give Boneyard Composer a shot, this tool may help you with the development process.
Boneyard Composer, is a simple command line tool that allows you to test your modules/components code in real time. Just by using a config json file, it will generate a temporal folder and spin up a server to serve all your source code so you can access it within a browser to check the results.
Also, the server will be listening for code changes (whenever the source code changes, the browser will reload automatically). This should be very useful, especially while building spec configurations file from the Boneyard IoC package. It can be a tool to consider inside the development process to integrate it with Unit Test frameworks, less/sass based themes development, HTML template packages compilation and so on.
Boneyard Composer screenshots
Please, visit the documentation related to the usage of this tool.
Developers or Contributors
If you want to provide feedback, suggest changes or simply check the source code, here are some quick notes and steps after pulling the code from master.
Build from source:
npm install -g karma-cli
npm install -g bower
Running Composer Tool on Boneyard Core Project
- Once boneyard has been installed via
npm install(step 3)
- By running
make composeryou will have access to hit
- YUIDoc Available after running
Unit Testing / Code Coverage
- Available after running
- Boneyard Annotation Engine: A new project started a few weeks ago in a different repo at 3dimention/boneyard-annotation and the goal is to automate specs generation via annotations. At his core, it will instrument component source code by scanning annotations located inside block comments and convert them into specs automatically without the necessity for the developer to write them manually. Development and the final manifesto are still in progress (work in progress can be visualized here). Contributors are very welcome!.
Development Stretch Goals
- IoC API support for destroying Specs or Individual bones. This may need to be integrated with the persistent layer functionality.
- There are plans of doing a complete rewrite of this library to use ES6 standard (ES2015) instead. By using babeljs for transpiling code to ES5, will help us to clean up boneyard core and his dependencies to reduce complexity. Current API will be reviewed, but not major changes are predicted so far on the way the classes or components are used. More information about this topic will be available.
- High Level documentation (Work in progress can be visualized here)
- Examples of usage, simple applications (Classic TODO application, IoC important use cases).
- API Docs need a better template that match branding (YUIDoc)
About the author
You will probably notice that even though I decided to ship Boneyard with a boneyard-ui package (Simple Backbone.View "classes" that spits out some html chunks, in combination with some bootstrap css styling rules and a basic api, I'm definitely not a big fan of the DOM implementation and the HTML declarative format at all as a creational pattern.
With that being said and along with the development of this library, I found completely difficult (and annoying) for the sake of a good development process, to let a declarative format resolve the concept of child > parent relationship structures of a web app
<div><dom-tell-the-browser-to-create-a-combobox-inside-this-div></div>, when in fact this level
of details makes different moving parts very hard to keep track. De-structuring probably was one of the major goals on this project, by providing techniques on how a developer can efficiently wire or establish structural relationships between elements.
I strongly believe that the web development experience could be a more enjoyable place.
Copyright (c) 2015 Patricio Ferreira
Licensed under the MIT License | s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652663016853.88/warc/CC-MAIN-20220528123744-20220528153744-00310.warc.gz | CC-MAIN-2022-21 | 6,448 | 50 |
https://mydiamo.com/outdated-encryption-algorithm-fatal-for-data-protection/ | code | Imagine you are the owner of a luxurious hotel that collects an extensive amount of guest information day in day out. Such information can range from the name and home address to sensitive credit card information. Where will all these important data be stored at? The answer is in the hotel’s database. However, are the information stored safely from harmful infiltration? It’s sad to point out that we live in a cyber world where cyber-leak can happen anywhere, and every day. Even Rail Europe recently has revealed a three-month data breach of credit cards and debit cards. There is no doubt that there has been a rise in awareness in terms of protecting clientele information.
Despite the increase in the use of open source database, some still lack the security solutions commercial databases have. Take for example the most popular open source database — MySQL, uses several algorithms in order to encrypt and protect user data stored in the database as MySQL recognizes the exploits in MD5 and SHA-1 algorithms and recommends the use of other algorithms available. According to the United States Computer Emergency Readiness Team (US-CERT), MD5 is no longer an appropriate means of encryption and recommends companies to avoid using it. There are two main types of algorithms, encryption, and hashing.
Encryption and Hashing
Encryption is a process with an inverse. In other words, If I encrypt some text, there is a process which is able to convert the new text back to the original, called decryption. Though often used in encryption algorithms, hashing is fundamentally a different form of encryption. What a hash is meant to do is to generate a fixed size value of a string of text that is unique to that given input text. Often a one-way operation, there is no need to “reverse engineer” the hash function by analyzing the hashed values. Furthermore, any slight changes in the input text can produce an entirely different hash value.
Of MySQL’s algorithms used for encryption, the MD5 algorithm and SHA-1 uses a hashing algorithm. However, these two algorithms have already been “cracked”. This means that data that is encrypted using these algorithms are easily breached. Hackers with the technology have developed methods in order to break these algorithms and access the data.
Brute Force Attacks and Rainbow Tables
Brute-force attacks are a trial-and-error method used to crack algorithms. Say an attacker has an encrypted file, and they know that this file contains sensitive data for grab. To unlock it, hackers try every single possible password combination. The brute-force attack would likely start at one-digit passwords before moving to two-digit passwords and so on so forth, matching all possible combinations until the file is decrypted by force. Think maybe having an extremely long and complex can prevent this? Truth is, brute-force software is created for such reasons, simply brute-cracking.
Moreover, because people rarely use complete random characters as passwords, there is a trick that applies when it comes to guessing them. An attacker can run a collection of millions or so commonly used passwords through a hashing algorithm and obtain a list — rainbow table — of associated message digests for these passwords. A rainbow table is a listing of all possible plaintext permutations of encrypted passwords specific to a given hash algorithm. It is child’s play for any computer to run and compare a file of stolen password hashes against a rainbow table. For every match, the table will display the possible passwords for that hash.
Unfortunately, a rainbow table for MD5 and SHA-1 algorithm already exists. Meaning, the safety of any data that is protected by an outdated algorithm is compromised. Brute-force attacks are something to be concerned about when protecting data, choosing encryption algorithms, or even selecting passwords. While developers of open source databases work towards creating a safe environment for users, the harsh reality is that it just doesn’t quite make the cut. Encryption has to keep up with how fast it’s being rendered ineffective by new technology.
Present-day encryption consists of complex algorithms. However, the default algorithms within open source databases are mostly primitives, like those that have been proven to be unsafe. Finding an open source database equipped with high-level security is few and far beyond. This is why most users have opted to implement third-party encryption solutions for proper client information protection. If your business holds sensitive information of clients or guests, it is your duty to ensure that the data remains safe and secure. If you are storing sensitive information on open source databases, be proactive and verify the encryption algorithm. Simple actions may just save your business from facing a catastrophic data breach. | s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817171.53/warc/CC-MAIN-20240417173445-20240417203445-00549.warc.gz | CC-MAIN-2024-18 | 4,875 | 10 |
https://github.com/mycoboco/beluga/blob/master/LICENSE.md | code | beluga: a standard C compiler
I do not wholly hold the copyright of this package;
beluga is written based
lcc whose copyright is specified in
To parts I added or modified (that include an integrated preprocessor) and the programs I wrote from the scratch the following copyright applies:
Copyright (C) 2015-2017 by Woong Jun.
The package was written so as to conform with the Standard C published by ISO 9899:1990 and ISO 9899:1999.
Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the "Software"), to deal in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do so, subject to the following conditions:
The above copyright notice and this permission notice shall be included in all copies or substantial portions of the Software.
THIS SOFTWARE IS PROVIDED ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. | s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500074.73/warc/CC-MAIN-20230203185547-20230203215547-00867.warc.gz | CC-MAIN-2023-06 | 1,698 | 10 |
https://play.google.com/store/apps/details?id=com.emily.jarvis.home.v2 | code | I hate this app rate it one star if I could doesn't work then it takes you to a website that you need a username and password for WORST APP EVER!
Your app install and my phone voice offline, tell me how to restart my phone voice sound
Too hard to start
Not so bad
Bugfix: Possible crash when using the TTS
Command your personal virtual assistant to complete tasks quickly and easily. | s3://commoncrawl/crawl-data/CC-MAIN-2017-51/segments/1512948521292.23/warc/CC-MAIN-20171213045921-20171213065921-00670.warc.gz | CC-MAIN-2017-51 | 383 | 6 |
http://forum.xda-developers.com/showthread.php?t=2658881&goto=nextoldest | code | #CacheMate Clear cache from ALL apps with one click.
#Greenify Help you identify and put the misbehaving apps into hibernation when you are not using them.
#SoftkeyZ Will let you change the Softkeys / Navigation Buttons fast and easily.
#Disabel Service Used to disable unnecessary services running in background
#Link2S Enables you to manage your apps and storage easily.
#Titanium Backup With Titanium Backup you can backup your apps, app data, and system data on your SD card for safekeeping. You can also remove, freeze-unfreeze any app, including system apps.
#AdAwayAs the name suggest it gets rid of the annoying ads
1)@A_U FOR SOME APPS.
2)@dipes1052 FOR SOME APPS.
MORE TO BE ADDED+ TELL ME IF YOU KNOW THE BEST ROOTED APP AND I WILL ADD IT TO THE LIST. | s3://commoncrawl/crawl-data/CC-MAIN-2014-42/segments/1413507446943.4/warc/CC-MAIN-20141017005726-00028-ip-10-16-133-185.ec2.internal.warc.gz | CC-MAIN-2014-42 | 762 | 10 |
https://community.amd.com/thread/241795 | code | I bought a Sapphire RX 570 4GB the other day and installed it into my PC. It replaced my old GTX 650. However, whenever I tried running Fortnite or Rocket League, the monitor would turn off saying there isn't video input and that it's entering sleep mode. It seems like everything else is working on the PC, just that the monitor enters sleep mode? Anyway, when turning the monitor off and on again, the whole PC reboots. This happens only when playing games, like in Fornite when I'd die and click on the Return to Lobby, at that specific moment it would turn black. No issues whatsoever when listening to music, playing movies or just browsing the internet. Temperatures of the CPU, GPU are 60-70 degrees Celsius.
However, since my monitor only has VGA, I had to buy an adapter from HDMI to VGA. I don't know if the adapter can be the cause, but if it is, surely it would crash the monitor other times, not just when playing games.
I did a clean install of Windows 10, updated all the drivers, I even tried the CD with the drivers that came with the GPU but same thing. The PSU is Chieftec 500W, but it's 4-5 years old and as far as I'm aware it said "80 plus at 225V". | s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600400203096.42/warc/CC-MAIN-20200922031902-20200922061902-00016.warc.gz | CC-MAIN-2020-40 | 1,171 | 3 |
https://portableapps.com/node/56627 | code | I downloaded FastCopy Portable for the first time. The Malware-Scanner I'm using (Avira) reports the following on the related paf.exe-file:
Description: The term 'TR' denotes a trojan horse that is able to spy out data, violate your privacy, or perform unwanted modifications to the system.
A generic detection routine designed to detect common family characteristics shared in several variants. This special detection routine was developed in order to detect unknown variants and will be enhanced continuously. | s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474360.86/warc/CC-MAIN-20240223021632-20240223051632-00764.warc.gz | CC-MAIN-2024-10 | 511 | 3 |
https://patarnews.com/top-documentary/the-acid-bath-murderer-murder-maps-reel-truth-history-documentaries | code | The Acid Bath Murderer | Murder Maps | Reel Truth History Documentaries
During the 1940s, John George Haigh was thoroughly investigated by London Police for the deaths of six people whose bodies were found destroyed with acid.
To be the first to watch more full length documentaries, subscribe here: https://www.youtube.com/channel/UCb7xZQi7F3RW7BNtR57cNnA?sub_confirmation=1
Welcome to Reel Truth History, the home of gripping and powerful documentaries. Here you can watch both full length documentaries and series that explore some of the most comprehensive pieces of world history.
#TrueCrime #History #1940s | s3://commoncrawl/crawl-data/CC-MAIN-2021-31/segments/1627046153709.26/warc/CC-MAIN-20210728092200-20210728122200-00673.warc.gz | CC-MAIN-2021-31 | 612 | 5 |
https://thehouseofportable.com/2858/adobe-prelude-cc-2019-portable/ | code | Prelude CC. Metadata ingest, logging, and rough cuts.
Rapidly tag and transcode video footage and quickly create a rough cut with Prelude CC — a video logging and ingest tool designed for intuitive, efficient media organization and metadata entry. Prelude translates effortlessly into Adobe Premiere Pro CC, ensuring fluid communication and organization throughout the video production process.
This is a multi-package portable. I can add updates/plugins via .svm files, just request plugins or notify me about new updates.
- Adobe Prelude CC 2019 Portable.exe = main data file and program (~1.3 GB) - bridge.svm (~800 MB): includes latest Bridge program, launch it via File->Browse in Bridge - update.svm = future minor build updates for 2019
Addons can be added via .svm files by me, or via normal files by you.
► SVM: it's basically a pack of files. If available you will find all compatible addons/plugins/update packs as .svm files on this post. Use: put svm file in the same folder as main exe. At next startup the portable will recognize the new pack and load it. If you want a plugin, just request it here and I'll do my best to create the svm file for you. You can also add it without having the svm file, through method explained below.
► NORMAL FILES: you can also add any file into "\Sandbox\Adobe Prelude CC 2019\roaming\modified\@PROGRAMFILES@\Adobe\Adobe Prelude CC 2019\" folder, or similar others just like you'd normally do in installed version (appdata etc), and at next startup the portable will recognize your new files. "Normal" mean files that you'd put in that folder with installed version (not .svm files!). For example: .aex files for After Effects in /Plug-ins/ folder, .aep preset file in /Preset/ folder, .mp4 files for Filmora fx pack video preset files. The correct path is important, /Sandbox/../modified/ folder acts as the C: drive of the portable, so things must be in the correct location to be detected 🙂
Multilanguage version! All available languages included, Prelude CC will start in your system language.
Portable CC 2019 (v8.0)
Bridge CC 2019 .svm pack (v9.0)
Join my Telegram channel! @thehouseofportable
♥ If this portable works for you, come back and say thanks ♥ | s3://commoncrawl/crawl-data/CC-MAIN-2018-47/segments/1542039743184.39/warc/CC-MAIN-20181116194306-20181116220306-00097.warc.gz | CC-MAIN-2018-47 | 2,222 | 12 |
https://www.rescheck.info/2019/02/14/longview-rescheck-sample/ | code | For those who emailed us at [email protected] to see a Longview Rescheck Sample for Texas using the IECC 2015 we have created one below. We thank you again for allowing us to create your Rescheck reports.
If you have a project in Longview Texas that requires a Rescheck or anywhere else in Texas using the IECC 2015 or IECC 2018 we can handle it for you for just $79. We can have it back to you in 4-6 hours. Simple email us your plans and jobsite address to [email protected] and watch the Rescheck magic happen.
Enjoy your Longview Texas Rescheck Using IECC 2015 below.Longview Sample Rescheck IECC 2015 | s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100677.45/warc/CC-MAIN-20231207153748-20231207183748-00634.warc.gz | CC-MAIN-2023-50 | 618 | 3 |
http://www.tech-archive.net/Archive/DotNet/microsoft.public.dotnet.general/2005-06/msg01472.html | code | InstallUtil: custom options
- From: "Mike R" <nospam@xxxxxxxxxx>
- Date: Fri, 24 Jun 2005 13:41:23 -0400
I have 2 questions about custom options in InstallUtil.
The help screen for InstallUtil says this:
--- quote ---
Options take the form /switch=[value]
<...a list of options follows...>
Individual installers used within an assembly may recognize other options.
To learn about these options, run InstallUtil with the paths of the
on the command line along with the /? or /help option.
--- end of quote ---
The questions are:
1. How do I get the custom options passed into InstallUtil?
Suppose I type a command line:
installutil /x=a /y=b <assembly_name.dll>
How do I get "x=a" and "y=b" in my class?
2. How do I pass the information about supported custom options to
InstallUtil, so that
it is available from "installutil /? <assembly_name.dll>". | s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917121893.62/warc/CC-MAIN-20170423031201-00298-ip-10-145-167-34.ec2.internal.warc.gz | CC-MAIN-2017-17 | 849 | 20 |
https://lobste.rs/threads/bwr | code | This is a curious legal thing, but it isn’t tech related at all. Maybe a better fit over at HN or Reddit.
The “About” page suggests that what is on- and off-topic is determined by which tags exist (unfortunately? maybe incorrectly? or maybe I’m just misunderstanding). Perhaps this tag should be changed to say “tech law” if the community doesn’t want to see arbitrary interesting legal articles.
I believe that it is understood that all of those tags function in the context of technology. Otherwise we’d expect to see (further) abuse of the culture, art, law, and other tags.
Lobsters is just as much about what isn’t here as it is what is here.
Obviously boiling lobsters is cruel and brutal, but so is eating them. There is no “compassionate” way to eat something. If you are bothered by boiling them, take the logic a step further and don’t eat them either.
So you think that there’s no moral difference between “quick and painless”, “slow and horrible”, and “clumsy bludgeoning”? Sounds like a pretty extreme position to me.
I think this is a useful attempt to elucidate a somewhat confusing position on dz’s part, but that reducing a choice like this to the apparent fundamental principles rarely advances a conversation. People weigh far more things than they are even aware of, and are often not able to explain their real reasons. That’s especially true with a concern like animal suffering which is difficult to think about without having an urge to dismiss it out-of-hand to avoid having to imagine horrifying implications in detail.
Personally, I think that both killing animals and causing them to suffer are wrong. Unfortunately, they’re on the list of wrong things that all humans are complicit in to some extent, although certainly we can individually adjust the degree to which we are, through our lifestyle choices. Political slogans are simplistic because they must be, but it’s important to remember the nuance when actually talking through something controversial like this.
I see the point of a device to kill lobsters faster. But let’s not name anything on the site after it. I expect that this thread has already gotten more political, and with less relevance to the site’s core mission, than many lobste.rs users are comfortable with.
Yes I agree not to name anything on this site after it. It would be uncool and uncrustaceanly.
Thank you. I very much agree that there’s a lot of subtlety to these kinds of issues, and that they are worth considerate discussion in depth, but that this is probably not the right venue.
I’m still learning how to write comments that are simultaneously relevant, provocative, and concise without being glib or mean… or encouraging others to. It’s hard! Sometimes it might be impossible. I think it’s still worth practicing.
but that this is probably not the right venue
but that this is probably not the right venue
I dunno about everyone else but I find this sentiment common and deeply disappointing.
Programmers, like it or not, must learn to tackle ethical questions. We’ve automated jobs away, built software to cheat on emission standards, designed UIs with the intent to deceive users — and any attempt to discuss these issues where programmers dwell is invariably shut down with claims of “improper venue!”
How can we expect to advance our profession if we keep proclaiming that our spaces are strictly for tech chat only?
I agree! But let’s spend those limited resources discussing ethical questions that relate to systems we, as programmers, might be asked to build someday. I can promise you that it’s possible to make an entire career simply out of thinking about those questions, and still barely scratch the surface.
I didn’t say that. One would prefer “quick and painless” but the immoral act isn’t the suffering, it’s the killing.
If the immoral act isn’t the suffering then you shouldn’t eat plants, either.
While I don’t share @dz’s moral position, I don’t see this as a gotcha! that shows it is inconsistent.
This is a really interesting position - Is there some underlying principle on which this belief rests? Or does it just feel self-evident? For you, is there any amount of crustacean suffering that’s worth more than one crustacean death?
So as long as I don’t kill you I can make you suffer as much as I want and it wouldn’t be immoral. I certainly see the appeal of the philosophy.
edited: see below
What if both things are immoral?
There are certainly a large segment of people who think that killing and causing suffering are immoral, however this is the first time I’d ever seen that killing was immoral but suffering was not. Given that humans probably would go extinct without killing anything (plants included) usually people make the caveat “Killing is okay as long as you’re killing the beings that suffer the least”. Some go the whole fruits and nuts route, causing no harm at all, but I don’t think this is large scale sustainable. Plants only is a decent argument, but you’re still totally killing, so if suffering isn’t a moral criteria you might as well go eat whatever because I mean you’ve gotta kill you might as well kill the thing that reduces your suffering and I would have to kill like 400,000 clovers to equal one cow because biodensity.
Something tells me this isn’t the philosophy DZ has and I’m going to take a generous interpretation that they really meant that reducing suffering doesn’t mean there is NO suffering. The animal was still ripped from its habitat, deprived of a normal life, separated from any family it might have had, etc. I’m going to also suspect that DZ also feels that killing is unilaterally wrong, which is I think not a bad moral basis to aspire to. I think there is some wisdom in having that goal.
Being said, don’t make perfect the enemy of the good. If someone is going to kill and eat me, I should hope they don’t boil me alive. I would be a lot more upset about being tortured to death than I would about just being killed.
Yes, this is the correct interpration, and I see how my post could be read differently.
Something tells me if you were in the position of being boiled alive vs a painless death you would have more of an opinion on the matter.
Several people here are recommending CMake as an alternative. I’ve only interacted with CMake at a fairly surface level, but found it pretty unwieldy and overcomplicated (failed the “simple things should be simple” test). Does it have merits that I wasn’t seeing?
CMake can generate output both for Unix and for Windows systems. That’s one (good) reason lots of C++ libraries use CMake.
CMake is pretty nice and has nice documentation. You can also pick stuff up from reading other people’s CMakeLists. For simple projects the CMake file can be pretty compact.
I actually found the CMake documentation to be quite terrible for new users. The up-to-date documentation factually describes what the different functions do, but has very little examples of how to actually write real-world CMake scripts. There are a few official tutorials that try to do this, but they are made for ancient versions like CMake 2.6. So in order to learn how to use CMake, you are stuck reading through tons of other peoples scripts to try to deduce some common best practices.
While modern CMake is not terrible, you often have to restrict yourself to some ancient version (2.8.6 I believe is common) in order to support certain versions of CentOS/RHEL/Ubuntu LTS (and there were some big changes in CMake around 2.8.12/3.0).
Also, having string as the only data type has led to some absurd corner cases.
I’m kinda confused - the graphs at the beginning seem to show the opposite of what the author is claiming. For a given number of executions, the shorthand (in blue) seems to take more time, not less. What am I missing?
Looks like the axes are flipped. The x-axis is actually time taken, and the y-axis is the number of executions. The labels are wrong, too: notice how it says the “number of executions” is 0.000001.
I was going to say something about the poor match between UB and automobile engineering, but will restrain myself.
I stared at this for a while before realizing you meant Undefined Behavior.
This is the third or fourth post from the last few days from yegor256; All of them have been right on the line between hilariously and terrifyingly bad advice. One of them (“How much do you cost?” I think it was called) lingered in the top spot on the home page because there were so many rebuttals in the comments. This list is not a recipe for a good career or a good life.
The idea that the go language designers and implementors are nondogmatic is an interesting assertion to make, but it’d be better if there were a citation or an example. Certainly there are, famously, many more counterexamples, so it would be great to understand why the author has this belief. Is it from experience? Or is it from an ardent wish that it be true?
I am a huge fan of Go, bet businesses on it, have had great successes with it, that said…
… why the author has this belief. Is it from experience?
I have no doubt that this is the truth. I believe the core team is very willing to discuss things at length, non-dogmatically with those they consider peers (language designers, researchers). But how they dealt with the community in both tone and substance was another thing all together – they set the dogmatic “no questions” (less charitably, “we are right”) tone absolutely, and the community followed.
Or is it from an ardent wish that it be true?
Or I suspect, a hope for the future. Which is fine, if your community has issues, try to change them and the change has to start from people with voices with enough reach, rsc is one of those voices.
The go team are a bit similar to how openbsd works. If its clear you dont know what you are talking about, you will be redirected to go-nuts.
Tbh i think they are incredibly patient with lots of bad and unresearched suggestions. Good suggestiona get a great deal of consideration
rsc is just one of the Go designers/implementers, and is probably somewhat less opinionated than, say, Rob Pike.
My guess is rsc is reposting this as much as a reminder to himself as to others. Go is probably more famous for what it expressly leaves out than what it leaves in, and so remembering to say why something was left out is pretty hard versus just saying “because that’s not Go.”
[Comment removed by author]
I was surprised to come here to see a lot of objection to the Lisper’s suggestion that language designers tend to be open to talking about tradeoffs because they had to consider them during the design process. I read the point of the piece as the conclusion, asking the community to be fair and complete in talking about pluses and minuses:
But we need help from everyone. Remember that none of the decisions in Go are infallible; they’re just our best attempts at the time we made them, not wisdom received on stone tablets. If someone asks why Go does X instead of Y, please try to present the engineering reasons fairly, including for Y, and avoid argument solely by appeal to authority. It’s too easy to fall into the “well that’s just not how it’s done here” trap. And now that I know about and watch for that trap, I see it in nearly every technical community, although some more than others.
The idea that the go language designers and implementors are nondogmatic is an interesting assertion to make
I don’t think he’s actually making that assertion - he’s saying that the conversations language designers (of different languages) have amongst each other don’t appeal to dogma. Citations, then, could really only come from specific recorded conversations amongst only language designers.
There is this slightly disappointing panel with Bjarne Stroustrup, Rob Pike, Niko Matsakis (of Rust), and Andrei Alexandrescu (of C++ and D), whose most dogmatic participant seems (to me) to be Rob Pike, but if you’re hoping for an in-person flame war, it’s not there.
Replied something like this to dwc, but I’m surprised the focus here ended up on the Lisper saying that language designers are comfortable talking about tradeoffs because they had to wrestle with them while designing.
Seems like a nice enough anecdote and my reaction wouldn’t be to demand citations proving anyone’s thoughtfulness. But more fundamentally, the story was just a stop on the way to asking users to “[r]emember that none of the decisions in Go are infallible” and “present the engineering reasons fairly.” Hard for me to find that objectionable.
(my projects tend to be performance-minded reliable distributed systems)
Wow, I’m really glad I read through this discussion section - I was recently going through a new year planning exercise and wishing I had something basically identical to void.
It’s also really instructive to read about distributed system programming specifically - I’ve recently been doing stuff at work that would benefit from a lot of this structure. Thanks for writing it up!
I’ve written a TUI minesweeper game and a cellular automaton library, both basically scratch projects, around 200 lines. Nothing serious yet.
However, after using it for these, I think I will prefer it in the future for anything where I would have otherwise used C or C++, and where it’s possible to use Rust. I really like lots of things about it, but the most important ones for me apart from safety are:
Unfortunately, since Rust isn’t yet available on most embedded platforms, I don’t see any obvious near-term major projects, so I’ll keep building toys instead. My next one may be a Rust client library for ROS.
Things that would make my life easier if they were in Rust:
A cellular automation library? Could you elaborate on that?
Sure - it’s basically just a trait describing what a cellular automaton’s API needs to look like, and some boilerplate for stepping through time. I also started on an easy way to visualize 1D and 2D CAs, but didn’t finish it. Next steps (apart from the visualization library) might be a function to back-drive reversible CAs, or generate rules from given state transitions.
Ah, cellular automaton. I read automation and I was hoping you were working with cellular radios. I need some help getting started with those. Still a cool project! :D
I took honors linear algebra in college, used linear algebra for differential equations, signals, machine learning, and robotics, used it for work, used it in my free time.
I did not understand it until I watched this series.
Video lectures can be so much more than a blackboard/whiteboard facsimile, and I hope to the gods that 3blue1brown makes more in-depth lecture series like this one, and I hope even more that other educators take this series as an example of what’s possible.
Pages with lots of mathematical expressions tend to take a long time to be rendered with MathJAX; KaTeX is a similar tool that’s much faster: https://khan.github.io/KaTeX/ | s3://commoncrawl/crawl-data/CC-MAIN-2018-09/segments/1518891812293.35/warc/CC-MAIN-20180218232618-20180219012618-00034.warc.gz | CC-MAIN-2018-09 | 15,166 | 73 |
https://gitlab.com/meltano/meltano/-/issues/2908?utm_campaign=Three%20Data%20Point%20Thursday&utm_medium=email&utm_source=Revue%20newsletter | code | Support Deployment Plugins
For Meltano to truly be a 'one-stop-shop' for your data platform, it needs to be able to deploy the individual tools and services that make up that platform. To achieve this Meltano should support deployment plugins, being existing tools for deploying and managing running infrastructure (such as Helm, Terraform, Ansible, Salt, Cloudformation). For those just getting started, Meltano should aim to provide opinionated base config for common scenarios (e.g. containers on Kubernetes), and for power users of these deployment tools the config and internals should still be accessible and easily customisable via existing Meltano config routes.
As a rough guide, the CLI could look something like:
# First a user would add a deployment. This would install all the necessary tooling to actually deploy to this platform during `meltano install`. Meltano will use all of the context of installed plugins, orchestrators and config to create appropriate deployment artefacts. meltano add deployment --platform kubernetes --environment prod # Users can optionally configure their deployment meltano config deployment --environment prod set namespace "team-data" # Finally a new deployment can be executed 🚀 meltano deploy --environment prod # Individual tools can also be invoked and used directly meltano invoke helm list --all-namespaces --all | s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233511106.1/warc/CC-MAIN-20231003124522-20231003154522-00666.warc.gz | CC-MAIN-2023-40 | 1,368 | 4 |
https://forum.xda-developers.com/showthread.php?t=408918 | code | Note : In fact, if you edit your files manually with a SQLite tool, you could read the end of this post (Garfiled tuto, etc.) : you'll just have to create 2 new fileds -timezone and msid- in the "cities" table (just look at how original file is)... as it is for advanced users, I don't write "how to" : advanced users already know how to do and for others, look at JVH3 tool linked above !
All credits are for N2A, Garfield1970, idsk and andreas.falke.
This new topic is just a summary of Diamond Weather Custom City thread. That's why it's already [SOLVED] !
To add a city to TF3D, you have to :
1. install, if not already done, Microsoft .Net Compact Framework 3.5.
The archive size is ~33MB... but the install is only ~3/4MB... you can find standalone .cab on the web. Thx to Fabliv to post it in this thread.
2. install WeatherDatabaseEditor from andreas.falke, the latest version is 1.2 (or take it from attachments).
If it doesn't work (for TLR or bElite ROM for example), you can try this "patched" WDE (from PPC-Welt, it seems), based on 1.1 original WDE... (you can take it from attachments).
Old version of WDE : v1.1.
Note : Some anti-virus software detects theese apps as "trojan". They aren't. Just false detection from your too-suspicious AV .
3. find your locCode on http://www.accuweather.com - you'll have to input it in the "Accu Weather Code" field.
For example, for Paris in France, Accuweather URL is : http://www.accuweather.com/world-ind...012|PARIS|&u=1
The locCode is EUR|FR|FR012|PARIS
Note : If the city name contains spaces (or special characters), you'll have perhaps an issue. Space have to be replaced by %20... and sometimes not (and vice-versa ^_^).
So, don't abandon too fast, and try and re-try. Or post your request here : someone'll certainly find the good way to input it.
3. bis For US cities :
- thx obender : for example Hickery, NC, Accuweather URL is http://www.accuweather.com/us/nc/hic...u=1&traveler=1
You see the portion "us/nc/hickory". To obtain the locCode, you have to prefix it with NAM|
So, it gives, for our example : NAM|US|<state>|<city> i.e. NAM|US|NC|HICKORY
- thx duofold : instead of the complete locCode as mentioned above, you can only use the zip code : just input the zip code of your city in the "Accu Weather Code" field (and, of course enter in a state & city in the other fields).
4. launch WeatherDatabaseEditor on your Diamond, select your country, add your city and exit.
5. add your added city in TF3D weather tab.
Depending on your TF3D version, your added city will appear at the end of the list... or in alphabetical order.
6. Enjoy... now, you can the actual weather on your Diamond, without looking out the window
Now, to understand a little what happend :
WeatherDatabaseEditor (aka WDE) allows many things :
A. WDE edit the database
The database is stored in 2 files : 2330fc3c_manila and _2330fc3c_manila (in \Windows folder). These files are hidden/in rom/read-only. WDE changes the attribute of these files, so that, WDE can write them.
B. in 1.1 version, WDE allows only to add cities, but no country.
It isn't a big problem : if you live in a non-listed country, you can add your city in an other country (as explained above)... that won't change anything (just the place where you'll find it in TF3D menu)
C. WDE edit the registry (thx isdk)
In stock ROM, the URL used to update the weather is a specific Accuweather URL. WDE change it to point to N2A'website ( http://weather.not2advanced.com/ ).
Registry key=HKEY_CURRENT_USER\Software\HTC\Manila & String value Name=Weather.ServerURLOverride
Now, if you really want to add a country (cf. B.), go to Garfield tuto (and here too for more friendly SQLite tools).
But read ONLY
what regards the 2330fc3c_manila files.
NO PATCH OF manila.exe NEEDED ANYMORE !
P.S. : as my english is poor (& my tailor rich ^^), I would be happy if someone could correct it (MP me ).
P.S.2 : alternative not tested : [APP] Commandline WeatherDatabase Editor (add new locations to TF3D) by Mr_Gee | s3://commoncrawl/crawl-data/CC-MAIN-2020-45/segments/1603107879673.14/warc/CC-MAIN-20201022141106-20201022171106-00205.warc.gz | CC-MAIN-2020-45 | 4,010 | 39 |
http://math.stackexchange.com/questions/82363/how-much-percent-new-content-does-grandpa-write-in-the-morning | code | Grandpa is writing a book. Every morning he starts writing vigorously and fills a lot of pages. But post-lunch he goes through all that he's written that far (right from day one) and deletes one-fifth of it. He doesn't write anything more that day. At the end of the day the content of his book is still $20\%$ more than that at the end of the previous day.
How much percent new content does Grandpa write in the morning? | s3://commoncrawl/crawl-data/CC-MAIN-2016-30/segments/1469257824109.37/warc/CC-MAIN-20160723071024-00167-ip-10-185-27-174.ec2.internal.warc.gz | CC-MAIN-2016-30 | 421 | 2 |
http://mugencharacters.org/forum/3-549-1 | code | I've been into collecting boss characters. Not the kind that's just some souped up street fighter character, but a good quality boss. also, I have two that have specials stages. how do I make it so that these stages only appear with the boss and is not selectable?
anyways, I really enjoy multiphase bosses, giant bosses, or just any boss that isn't a 'god' or 'evil' or 'orochi' version of a fighting game character... I hope this is clear enough. | s3://commoncrawl/crawl-data/CC-MAIN-2016-22/segments/1464050960463.61/warc/CC-MAIN-20160524004920-00208-ip-10-185-217-139.ec2.internal.warc.gz | CC-MAIN-2016-22 | 448 | 2 |
https://forums.funcom.com/t/pc-official-pve-chests-disappeared-on-a-foundation-connected-to-my-base-left-a-loot-bag/10708 | code | Game mode: Online [Official PVE #1500]
This morning I logged in and went to collect my fish as I do every morning and as I ran past my shrines I noticed that two of my chests had disappeared and left loot bags.
On the right hand side I had two chests mirroring the left two chests and had religious gathering tools inside. I checked the surrounding blocks for decay and all say 143 hours as expected. There are multiple doors on the foundation through my base, one almost right next to this area and gets opened and close daily. No changes to this area have been made over the last week or so.
I am not sure how to reproduce.
My event log says nothing: | s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600402130531.89/warc/CC-MAIN-20200930235415-20201001025415-00452.warc.gz | CC-MAIN-2020-40 | 652 | 5 |
https://askdev.io/questions/4407/importing-google-docs-records-right-into-google-code-task | code | Importing Google Docs records right into Google Code task
I am organizing tasks in Google Code. I have some records (Specs, Requirements, and so on ) in Google Documents as records and also spread sheets. I require to link these records as Downloads or Wikis in Google Code.
Is this feasible and also if of course, just how?
you make the records public and afterwards either:
- share the link to these public records
- make a public page of these records (and also link to them)
- make a public page of these records and also install them right into the wiki using iframes (when possible)
adhere to the standards from http://docs.google.com/support/bin/answer.py?answer=180199&hl=en
if you intend to admit of the.pdf or.doc or.xls variations of the records, you need to export them by hand to your desktop computer and afterwards post them to google - code wiki as "downloadable documents". | s3://commoncrawl/crawl-data/CC-MAIN-2021-17/segments/1618038076819.36/warc/CC-MAIN-20210414034544-20210414064544-00149.warc.gz | CC-MAIN-2021-17 | 890 | 9 |
https://lists.debian.org/debian-mentors/2000/10/msg00156.html | code | Re: Making a package with multiple binaries
On Sun, Oct 22, 2000 at 06:03:07PM +0100, Steve Dobson wrote:
> > > dh_testdir
> > > mkdir option1-build-dir
> > > cd option1-build-dir
> > > ../configure --with-one-set-of-options && $(MAKE)
> > > cd ..
> > Only you can't have cd's on separate lines, because it's a makefile.
> Yes you can:
> (cd option1-build-dir; \
> ../configure --with-one-set-of-options && $(MAKE))
> By putting the commands into a brackets () they all run in the same shell.
What you wrote is quite obviously not the same thing I was replying to.
Maybe my sentence wasn't clear enough...
Digital Electronic Being Intended for Assassination and Nullification | s3://commoncrawl/crawl-data/CC-MAIN-2018-05/segments/1516084886416.17/warc/CC-MAIN-20180116105522-20180116125522-00015.warc.gz | CC-MAIN-2018-05 | 675 | 15 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.