url
stringlengths
13
4.35k
tag
stringclasses
1 value
text
stringlengths
109
628k
file_path
stringlengths
109
155
dump
stringclasses
96 values
file_size_in_byte
int64
112
630k
line_count
int64
1
3.76k
https://community.spiceworks.com/people/quintin/projects/from-physical-to-virtual
code
We went with VMWare VShpere 4,1, Purchased one new server, and an 8TB SAN. First server to virtualize was our Exchange 2003 server, because that server, with a couple of upgrades would be moved to our second VMW host machine. In the end, we had 2 hosts, and about 4 VMs. We now still have 2 hosts, and 15 running VMs. The entire migration went very smooth. Set up 2 HP switches with VLans to accomdate the iSCSI interface of the SAN, and got the VMWare server(s) to see the SAN. once that was done, used VMWares migration tools to move the physical machines over. Once everything was virtualized, I worked on separating servers. For example, our Exchange 2003 server hosted our data and printer shares as well, so built a separate file server for file sharing, and a separate server for print sharing. I also built a new VM that had Server 2008R2 on it, and installed Exchange 2010 and migrated our Exchange server over. All in all, the actual virtualization was under a month, but all the server separations, and upgrades took place over the course of a year.
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030334855.91/warc/CC-MAIN-20220926082131-20220926112131-00277.warc.gz
CC-MAIN-2022-40
1,060
4
http://originsofttech.net/5%E4%B8%AA%E5%9D%9A%E5%AE%9E%E7%9A%84%E8%AF%81%E6%8D%AE%E4%B8%BA%E4%BB%80%E4%B9%88%E6%97%8B%E8%BD%AC%E9%87%8D%E5%86%99%E5%99%A89-0%E5%AF%B9%E4%BD%A0%E7%9A%84%E8%81%8C%E4%B8%9A%E5%8F%91%E5%B1%95/
code
Mastering an online article rewriter tool can prove quite tricky. When paraphrasing or rewriting any text or paragraph, many writers and students tend to get hold of the technology that enables them to rewriter any written piece of content into a fresh piece, yet keeping the original meaning of the text same. This approach is usually used to simplify a piece of writing, minimize the use of quotes or target an alternative audience. When article spinner tool is used correctly, paraphrasing turns out to be much more concise than the original text, covering all the main points while preventing the risk of plagiarism. Whether you are a student or writer, you can use this free article rewriter online to rewrite any text to save time and get a different version. The simple fact of the matter is that, as an Internet marketer, you need something better than artificial link building and pages of useless, jumbled nonsense to get long-lasting traffic referrals from major search engines such as Google, Bing and Yahoo. Google in particular pays special attention to your visitors' behavior. So if visitors are quickly navigating elsewhere because your site is full of junk content, then you will get fewer traffic referrals from Google over the long run. Since we get asked quite often about which content spinner produces the best results, I decided to take the top 5 tools in that category and compare them in an equal manner. What do I mean by saying equal manner? Well, I will write a unique paragraph of content and I will spin it with each of these content spinning software to see what results I get. This will be fun. If you already have some blog or website content that you want to turn into fresh, rewritten content in a matter of seconds you should use our article rewriter tool. This free paraphrasing tool is available to you 24/7 to rewrite the text. Most of the text created by our article spinner is human readable and 100% unique which makes it suitable for creating mass blog posts and web content. While these recommendations give you some general guidelines as to what settings you want to use in these more popular situations, don’t be afraid to customize according to your needs. For instance, if your Tier 1 will build only just a few links, you can set the 1st input to “Very Readable” or even “Extremely Readable” as WordAI will still produce unique content even if only a few versions.
s3://commoncrawl/crawl-data/CC-MAIN-2019-35/segments/1566027318421.65/warc/CC-MAIN-20190823130046-20190823152046-00116.warc.gz
CC-MAIN-2019-35
2,424
5
http://harshwardhansingh.com/about-me/
code
I am a freelancer and an online course instructor having a keen interest in Web development & SEO. I’ve been working with WordPress & SEO since 2012. During this time, I have worked on over 130 websites. I offer WordPress, SEO consultancy & website audit services. My Online Courses: A sample website SEO report: My Interesting Timeline!
s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500549424931.1/warc/CC-MAIN-20170724222306-20170725002306-00328.warc.gz
CC-MAIN-2017-30
339
5
https://help.talend.com/r/en-US/7.3/installation-guide-linux/configuring-email-server-used-to-send-reports
code
Big Data Platform Data Management Platform Data Services Platform Real-Time Big Data Platform - Start Apache Tomcat and log in Talend DQ Portal. - Click the button and, in the menu that opens, click Configuration Management to open the configuration page. Select MAIL from the Select Category list. In this way, SpagoBI show you only the parameters that you need to check or modify. Edit the parameter values corresponding to the SMTP address, the port and the email account that will be used to send the reports. Note that you can configure three profiles: scheduler: this profile is used to plan the report executions in the scheduler. user: this profile is used to allow the user to send documents by email. kpi_alarm: this profile is used to send alarm notifications.
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679516047.98/warc/CC-MAIN-20231211174901-20231211204901-00024.warc.gz
CC-MAIN-2023-50
771
15
http://mathhelpforum.com/advanced-algebra/89345-find-inverse-matrix.html
code
Start by interchanging the top two rows: Now subtract the top row from the bottom row: That gets the first column to be what you want. Multiply the middle row by –1: Next, subtract the middle row from the top row, and subtract twice the middle row from the bottom row. That will get the second column to be what you want. After that, you just have to deal with the third column in a similar way, and you will have the answer.
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988719646.50/warc/CC-MAIN-20161020183839-00431-ip-10-171-6-4.ec2.internal.warc.gz
CC-MAIN-2016-44
427
5
https://lsctangbao.com/how-to-add-two-columns-in-google-docs/
code
Adding two columns to a google docs document is a straightforward process. But there are a few things that you need to know about before you do it. One of the things is that it’s a good idea to use the proper software (such as Google Sheets) and not just the Google web interface. You’ll get a better result by opening Google Sheets and using the “Add Column” button. Here we go, I’m going to go ahead and say that adding two columns doesn’t just go from document to document. But in this case it’s pretty useful. In the case of adding two columns to the Google docs for Google Sheets, it’ll give you a better idea of what it’s like to add a column. Basically what it does is that it adds two columns to the bottom of the Google docs document that it is creating. One column contains the actual data and one column contains the heading. This is a great way to make the most of a spreadsheet, especially if you’re not a spreadsheet master. You can easily add columns to your document without having to memorize the column names or knowing the exact formula for doing it. I think its also a good idea to check out the Google Docs “How To” website for some great tips on how to use Google Sheet to add columns. The first step is to create a new column. When you create a column you have to choose the name of the column, the name you want to use, and a title. The title is a little misleading because it’s not the same as the column’s name. As you can see, I chose to name the column “Samples” and choose the title to be “Sample. By doing this you can avoid the need to create a new column by creating a new text field and then adding a new value to it. This is exactly what I did here, so it’s pretty straightforward. Now you can add a new column by clicking on the right top corner of the spreadsheet. A new drop down menu will appear, you need to choose a column, and then a new column will appear in the spreadsheet.
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296816893.9/warc/CC-MAIN-20240414192536-20240414222536-00892.warc.gz
CC-MAIN-2024-18
1,953
9
https://experienceleague.adobe.com/docs/experience-platform/privacy/api/appendix.html?lang=en
code
The following sections contain additional information for working with the Adobe Experience Platform Privacy Service API. All identities that are sent to Privacy Service must be provided under a specific identity namespace. Identity namespaces are a component of Adobe Experience Platform Identity Service that indicate the context to which an identity relates. The following table outlines several commonly used, pre-defined identity types made available by Experience Platform, along with their associated |Adobe Advertising Cloud ID||AdCloud||411| |Adobe Audience Manager UUID||CORE||0| |Adobe Experience Cloud ID||ECID||4| |Adobe Target ID||TNTID||9| |Apple ID for Advertisers||IDFA||20915| |Google Ad ID||GAID||20914| Each identity type also has a namespaceId integer value, which can be used in place of the namespace string when setting the identity’s type property to “namespaceId”. See the section on namespace qualifiers for more information. You can retrieve a list of identity namespaces in use by your organization by making a GET request to the idnamespace/identities endpoint in the Identity Service API. See the Identity Service developer guide for more information. When specifying a namespace value in the Privacy Service API, a namespace qualifier must be included in a corresponding type parameter. The following table outlines the different accepted namespace qualifiers. |standard||One of the standard namespaces defined globally, not tied to an individual organization data set (for example, email, phone number, etc.). Namespace ID is provided.| |custom||A unique namespace created in the context of an organization, not shared across the Experience Cloud. The value represents the friendly name (“name” field) to be searched for. Namespace ID is provided.| |integrationCode||Integration code - similar to “custom”, but specifically defined as the integration code of a datasource to be searched for. Namespace ID is provided.| |namespaceId||Indicates the value is the actual ID of the namespace that was created or mapped through the namespace service.| |unregistered||A freeform string that is not defined in the namespace service and is taken “as is”. Any application that handles these kinds of namespaces checks against them and handle if appropriate for the company context and data set. No namespace ID is provided.| |analytics||A custom namespace that is mapped internally in Analytics, not in the namespace service. This is passed in directly as specified by the original request, without a namespace ID| |target||A custom namespace understood internally by Target, not in the namespace service. This is passed in directly as specified by the original request, without a namespace ID| The following table outlines the accepted values for specifying an Adobe product in the include attribute of a job creation request. |Product||Value for use in the |Adobe Advertizing Cloud||“AdCloud”| |Adobe Audience Manager||“AudienceManager”| |Adobe Experience Platform||“aepDataLake”| |Adobe Primetime Authentication||“primetimeAuthentication”| |Customer Record Service||“CRS”| |Real-time Customer Profile||“ProfileService”|
s3://commoncrawl/crawl-data/CC-MAIN-2021-10/segments/1614178350717.8/warc/CC-MAIN-20210225041034-20210225071034-00114.warc.gz
CC-MAIN-2021-10
3,187
34
https://community.onsen.io/topic/3196/indeterminate-checkbox-support-in-onsen-ui
code
Notice: The Monaca & Onsen UI Community Forum is shutting down. For Onsen UI bug reports, feature requests and questions, please use the Onsen UI GitHub issues page. For help with Monaca, please contact Monaca Support Team. Thank you to all our community for your contributions to the forum. We look forward to hearing from you in the new communication channels. Indeterminate checkbox support in Onsen UI? tcr last edited by Question: ** Does Onsen UI support indeterminate (tri-state, multistate) checkboxes? ** I have a project in mind that requires indeterminate checkbox support iOS and Android. I have not found anything in the documentation or on the forums. The best would be to display an indeterminate checkbox as a dash, which is what modern OS browsers do natively. There are other solutions, as some of my references show below, but they aren’t graphically consistent with the Onsen UI. iOS native webview (Safari-class) support is buggy (outlined check with white fill when indeterminate and checked are set for the checkbox), but I’d prefer support in the UI css for consistency. On Android, UC browser support isn’t there, though Android Chrome supports it just as in the OS app. So UI-level support is probably also necessary here. Below are examples, descriptions, and other solutions re indeterminate checkbox states… OS browser - iOS webview - asialgearoid Onsen UI last edited by asialgearoid @tcr Onsen UI doesn’t currently support indeterminate checkboxes. I didn’t realise that support for this had gotten so widespread. It is the kind of feature we will certainly add support for in the future, but I would be likely to wait until it is natively supported by iOS.
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224646257.46/warc/CC-MAIN-20230531022541-20230531052541-00359.warc.gz
CC-MAIN-2023-23
1,700
15
https://preview.codewars.com/users/JorgeVS/comments
code
This kata's sensei hasn't been around since february 2018. Little chance this kata will ever be approved I guess. Sorry for the late reply, but you are absolutely right! Fixed now. Great kata that deserves more solutions. Thanks for creating it. that's called copycats. can you give the links to the users profiles? This solution is exactly the same solution as the reference solution, even the comments are the same. This must be a very big coincidence ... Only //what? is added to not get a copy solution. More equal solutions ... This one and this one. E W N S N N N E W S N E W == 0 N S == 0 E W == 0 S N == 0 N N N By eleminating E W and S N combinations N N N remains. Nothing wrong with this kata. Great kata. Listen to this while finding a solution. Real life coding challenges are defined whith less clear requirements most of the time. It is even possible to extend this by thinking that 18 is odder than 24. Take a closer look at your loop declaration. for (int i = 0; i > 5; i++) No wonder that your beans! are missing from the log I guess. (> != <) Please read the earlier comments in this thread. You will see that you are not the only one having problems to solve this kata. Simply looping through the list is too slow. Try to search for articles about datastructures that can sort or search arrays very efficiently and you will find what you need. Java translation is ready for review. Your seventh column has two ones, and your eighth column has two eights. So, I'm sorry to say, but your answer is wrong. In the Haskell Sample Test "should perform many-to-many JOIN and apply WHERE" a comparison without spaces is present. The EBNF-scheme therefor is not exactly correct, but imho this is not a big problem.
s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600401600771.78/warc/CC-MAIN-20200928104328-20200928134328-00240.warc.gz
CC-MAIN-2020-40
1,725
25
http://use.perl.org/use.perl.org/_domm/journal/25161.html
code
Here's my summary of the Austrian Perl Workshop. There's an interesting link at the end, so make sure to read it all (or scroll down, you lousy cheater...) Pre Workshop Meeting On Wednesday, several people met at MedienKunstKaffee in Museumsqartier, where 5uper.net provided us with free wireless, chairs & tables and some strange computer game machines. Most of the time was spend trying to get VLC streaming to work. We finally succeded in streaming from Andras second laptop using the latest dev version of VLC for Windows. Thanks to Josef bringing several good tasting choclate bars we didn't starve.. Later we went to Käuzchen for beer and food. After an introducton by some Kapsch guy (Thanks a lot for providing the venue, wireless, lunch, coffee breaks and a lot more...!) I couldn't get the beamer to recognise my laptop due to me failing to set up a proper X11-config. Thanks to Marcels USB stick and Willis laptop I could still present my talk on 'Using use'. Next up was Alfred who present PDF::API2. After the lunch, Jens Rieks had a talk on Perl 6, followed by Autrijus talking on Pugs. We streamed this talk to the French Perl Workshop and several other people. Then Leo and Chip talked about Parrot News. After some fun with streaming to FPW and back, we had a 'discussion' on Perl6/Pugs/Parrot with Leo, Chip and Autrijus in Vienna and Stephane Payrard and Christian Aperghis-Tramoni in Marseille. Thanks to IRC we actually understood each others questions. It was a lot of fun, and it's amazing what is possible on the internet ATM. Speakers Dinner was at Praterfee. Fritattensuppe, Schnitzel and Apfelstrudel. Lecker. I arrived a bit late because of a certain cat herding effect (I had to look after people from Germany, Hungary, Taiwan and the United States...) So Clifford started his SPL talk a bit late and wasn't (too) angry. Talks on LDAP, openguides, web development, FIFFS and kernel tools followed. Then Autrijus talked on PAR. The last talk was again by me, on CPANTS (for the n-th time this year..) The auction was a bit hectic and not very auction-like, as we had more goodies than attendees. And we had quite a lot attendess (~45). Marcel brought a lot of old/antique Perl Books and goodies from various conferences. I've also recorded the talks by Autrijus, Chip and Leo on video. They'll be available for download soon. Watch this space for the location..
s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187820927.48/warc/CC-MAIN-20171017052945-20171017072945-00334.warc.gz
CC-MAIN-2017-43
2,390
11
https://docs.vmware.com/en/VMware-Cloud-Director-Availability/4.1/VMware-Cloud-Director-Availability-User-Guide/GUID-6506400C-6BA6-4583-9F2B-8253017A7085.html
code
To control the Service Level Agreement (SLA) settings allowed for all replications in a VMware Cloud Director organization, as a service provider, you can modify the SLA profiles. - Verify that VMware Cloud Director Availability 4.0 is deployed in the cloud site. - Verify that you can access VMware Cloud Director Availability as a service provider. For more information, see Accessing VMware Cloud Director Availability. - In the left pane, click SLA Profiles. - Select an SLA profile and click Edit. - In the Edit SLA profile window, modify the following SLA settings and click Apply. - Enter a unique, case-sensitive name for the SLA profile. - Set the minimum allowed RPO by using the Recovery Point Objective (RPO) slider or by clicking the time ranges. - Set the retention policy for the point-in-time instances. - Select whether to allow quiesce. - Select whether to allow compression of the replication traffic. - Select whether to delay the initial synchronization and select a timeslot. You have modified the SLA profile and you can see the modified SLA settings. What to do next You can assign the modified SLA profile to one or more VMware Cloud Director organizations. For more information, see Assign an SLA Profile to Organizations.
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323587926.9/warc/CC-MAIN-20211026200738-20211026230738-00680.warc.gz
CC-MAIN-2021-43
1,248
15
https://www.mail-archive.com/[email protected]/msg13711.html
code
vmote 2003/07/09 11:01:42 Modified: src/documentation/content/xdocs fonts.xml Log: minor cleanup Revision Changes Path 1.11 +4 -6 xml-fop/src/documentation/content/xdocs/fonts.xml Index: fonts.xml =================================================================== RCS file: /home/cvs/xml-fop/src/documentation/content/xdocs/fonts.xml,v retrieving revision 1.10 retrieving revision 1.11 diff -u -r1.10 -r1.11 --- fonts.xml 14 Jun 2003 17:43:09 -0000 1.10 +++ fonts.xml 9 Jul 2003 18:01:42 -0000 1.11 @@ -14,16 +14,14 @@ <section id="intro"> <title>Important</title> <p>The information on this page applies primarily to the PDF renderer. The PostScript renderer - also supports custom fonts but doesn't support font embedding, yet. This page does + also supports custom fonts but does not yet support font embedding. This page does <strong>not</strong> apply to the AWT, PCL, MIF and other renderers.</p> - <p>The AWT renderer relies upon AWT to provide the available fonts. And it's the printer - driver of your operating system that decides if a font is embedded when using the AWT - renderer.</p> + <p>When using the AWT renderer, font metric information is available to FOP through AWT and the operating system (i.e. there is no need for font metrics files), and the operating system printer driver decides whether a font will be embedded.</p> </section> <section id="status"> <title>Status</title> - <p>FOP (building PDF files) normally supports only the base 14 font package defined in the Adobe PDF specification. - That includes the following fonts: Helvetica, Times, Courier, Symbol and ZapfDingbats. + <p>When building PDF files, FOP normally supports only the base-14 fonts defined in the Adobe PDF specification. +These include: Helvetica (normal, bold, italic, bold italic), Times (normal, bold, italic, bold italic), Courier (normal, bold, italic, bold italic), Symbol and ZapfDingbats. </p> <p>Font support in FOP can be extended by the addition of font metric files (written in XML) created from Adobe Type 1 fonts and TrueType fonts. No other font types (Type 3, etc.) are supported at this time. --------------------------------------------------------------------- To unsubscribe, e-mail: [EMAIL PROTECTED] For additional commands, e-mail: [EMAIL PROTECTED]
s3://commoncrawl/crawl-data/CC-MAIN-2018-43/segments/1539583515539.93/warc/CC-MAIN-20181022201445-20181022222945-00075.warc.gz
CC-MAIN-2018-43
2,275
2
https://mudcat.org/detail.cfm?messages__Message_ID=2071744
code
Thanks for your posting Jim - I certainly wasn't trying to suggest that "amateur" collecting could not be as ethically aware than university research. Or that un-ethical collecting (by today's standards) was at all widespread. But I think these recurring discussions about collecting, ethics and copyright throw up some interesting issues which don't ever seem to get mentioned. For example, is there any situation where a song might be consciously NOT collected? To let singers retain it as exclusively theirs, rather than collect it and thereby have to face the problem of dealing with it as a kind of commidity in the various heritage games. Do we have to collect everything?
s3://commoncrawl/crawl-data/CC-MAIN-2021-25/segments/1623488273983.63/warc/CC-MAIN-20210621120456-20210621150456-00388.warc.gz
CC-MAIN-2021-25
678
2
https://profilepress.com/article/checkout-form-shortcode/
code
Checkout Form Shortcode [profilepress-checkout] shortcode is used to display the checkout form on a page. The shortcode will also output the payment gateway selection menu so that users can choose how they wish to pay (if multiple gateways are included). Below is a screenshot of a typical ProfilePess checkout. It’s important you create a checkout page with the checkout shortcode and then go to ProfilePress > Settings > Pages. Scroll to the “Payment Pages” section and select the “Checkout Page”. Don’t forget to save your changes.
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510676.40/warc/CC-MAIN-20230930113949-20230930143949-00659.warc.gz
CC-MAIN-2023-40
546
7
https://swmath.org/software/20455
code
The KOKKOS package was developed primarily by Christian Trott (Sandia) with contributions of various styles by others, including Sikandar Mashayak (UIUC), Stan Moore (Sandia), and Ray Shan (Sandia). The underlying Kokkos library was written primarily by Carter Edwards, Christian Trott, and Dan Sunderland (all Sandia). The KOKKOS package contains versions of pair, fix, and atom styles that use data structures and macros provided by the Kokkos library, which is included with LAMMPS in lib/kokkos. The Kokkos library is part of Trilinos and can also be downloaded from Github. Kokkos is a templated C++ library that provides two key abstractions for an application like LAMMPS. First, it allows a single implementation of an application kernel (e.g. a pair style) to run efficiently on different kinds of hardware, such as a GPU, Intel Phi, or many-core CPU. The Kokkos library also provides data abstractions to adjust (at compile time) the memory layout of basic data structures like 2d and 3d arrays and allow the transparent utilization of special hardware load and store operations. Such data structures are used in LAMMPS to store atom coordinates or forces or neighbor lists. The layout is chosen to optimize performance on different platforms. Again this functionality is hidden from the developer, and does not affect how the kernel is coded. These abstractions are set at build time, when LAMMPS is compiled with the KOKKOS package installed. All Kokkos operations occur within the context of an individual MPI task running on a single node of the machine. The total number of MPI tasks used by LAMMPS (one or multiple per compute node) is set in the usual manner via the mpirun or mpiexec commands, and is independent of Kokkos. Kokkos currently provides support for 3 modes of execution (per MPI task). These are OpenMP (for many-core CPUs), Cuda (for NVIDIA GPUs), and OpenMP (for Intel Phi). Note that the KOKKOS package supports running on the Phi in native mode, not offload mode like the USER-INTEL package supports. You choose the mode at build time to produce an executable compatible with specific hardware. Keywords for this software References in zbMATH (referenced in 6 articles ) Showing results 1 to 6 of 6. - Bosler, Peter A.; Bradley, Andrew M.; Taylor, Mark A.: Conservative multimoment transport along characteristics for discontinuous Galerkin methods (2019) - Phipps, Eric T.; Kolda, Tamara G.: Software for sparse tensor decomposition on emerging computing architectures (2019) - Tim Besard, Valentin Churavy, Alan Edelman, Bjorn De Sutter: Rapid software prototyping for heterogeneous and distributed platforms (2019) not zbMATH - Hernández Pérez, Francisco E.; Mukhadiyev, Nurzhan; Xu, Xiao; Sow, Aliou; Lee, Bok Jik; Sankaran, Ramanan; Im, Hong G.: Direct numerical simulations of reacting flows with detailed chemistry using many-core/GPU acceleration (2018) - Mota, Alejandro; Tezaur, Irina; Alleman, Coleman: The Schwarz alternating method in solid mechanics (2017) - Phipps, E.; D’Elia, M.; Edwards, H. C.; Hoemmen, M.; Hu, J.; Rajamanickam, S.: Embedded ensemble propagation for improving performance, portability, and scalability of uncertainty quantification on emerging computational architectures (2017)
s3://commoncrawl/crawl-data/CC-MAIN-2021-21/segments/1620243988753.97/warc/CC-MAIN-20210506114045-20210506144045-00107.warc.gz
CC-MAIN-2021-21
3,253
10
https://cboard.cprogramming.com/cplusplus-programming/20510-reference-has-rule-reference.html
code
when I practise something about reference I figure out we could not declare a reference with more than 1 line, otherwise we would get an error. but we couldnt:PHP Code: int & ref=r; Because I know not much about reference and something relatively, so, anyone would give some information about others which are suitable for this rule ?PHP Code: int & ref; thanx in advance~
s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218190134.25/warc/CC-MAIN-20170322212950-00033-ip-10-233-31-227.ec2.internal.warc.gz
CC-MAIN-2017-13
372
6
https://www.perlmonks.org/?displaytype=print;node_id=49293
code
I personally vote for the split order of arguments, because people are more familiar with that. I think the variable length list can be coped with by the pop's. If that's unusual, so be it. I know that this order is mostly not a good idea. Moreover, you can provide a limit option now. Because there is some magic involved, I doubled a function that doesn't try to find a limit parameter at the end. The code has been posted more than enough now, so I hooked it up to my homenode. POD has been updated. Code has been tested. I was dreaming of guitarnotes that would irritate an executive kind of guy (FZ)
s3://commoncrawl/crawl-data/CC-MAIN-2021-04/segments/1610703538082.57/warc/CC-MAIN-20210123125715-20210123155715-00495.warc.gz
CC-MAIN-2021-04
604
4
https://www.freelancer.sg/hire/programming
code
Easily find an affordable Programmer that suits your project using Freelancer.com. Get Free Quotes Press CTRL + ENTER As used by What is Programming? Hardware is useless without software to make it work. Programming is the logical and creative process that instructs a computer on how to do a task. Programming is used to create software, websites, robots...and more! Hire a Programmer Easily find the perfect Programmer/Developer in any language on Freelancer.com to complete your project and turn your dream into reality. Showcased Work from our Freelancers Food Delivery Mobile App Bitcoin Wallet Website and Mobile App Ecommerce Mobile App Get More Done with Freelancers You don't need to do it all yourself Spend more time on what you do best & start getting more done. Hire at a fraction of the cost Find yourself an army of designers, developers, marketers, and writers. Don't regret a bad hire Read reviews from real people and know you're getting the best. As Featured in The World's Largest Marketplace Millions of users, from small businesses to large enterprises, entrepreneurs to startups, use Freelancer to turn their ideas into reality. Total Jobs Posted Excellent work, super fast, super quality and understood the brief perfectly! If you're looking for a talented web developer you'll find people like Charchit to help you accomplish your needs. Web Developer & Designer WordPress Membership Website Building Hiring a Programmer on Freelancer Programming is the process of creating a means of communication such as code between the user and a computer to create a program. An expert programmer differs from a coder as they actively think about solutions to create a successful program before beginning the process of coding. An expert in programming is able to optimise the benefits of a computer to meet their needs. If this is the person you need in your life, worry not longer. Freelancer.com can help you find an expert programmer who can help you create the digital programs you need. Hiring an expert programmer via Freelancer.com helps an employer find a committed individual with experience in the technicalities of a computer. Through the knowledge required by a professional programmer your digital problems and desires can be solved and created. Via Freelancer.com, employers have access to a range of experts who have the time and information to dedicate to their cause. An expert programmer has the knowledge in the varying online languages as well as the formation of the various digital platforms. The key skills of a professional coder include: Technical specifications - Before diving into coding, technical specifications refers to planning what is required to effectively accomplish the goal of the project. Taking the time up front to ensure your success later down the track. Project Management - This involves overseeing every part of the progression of the project. An expert programmer has the experience to effectively create a timeline to manage your own time and those in your team to make sure you’re on schedule. A business perspective - The ideal professional programmer has a business focus that helps him recognise the bigger picture and look beyond the program they are working on at the time. They can go a step further and suggest new ideas and improvements to their task. Finding the perfect professional programmer for your case and goals is simple with the help of Freelancer.com. All you need to do is click on the “Post a Project” button then fill out a small description of the project and hit “Submit”! If you have a certain programmer in mind you can search through the responding experts by their experience, reputation, qualifications and any other skills that might be useful for your objective. You can then personally select the candidate capable of complying to your digital needs. What are you waiting for? The Freelancer Directory is the premier source for employees for hire on the web and will give you access to the perfect programmer. Post a project on Freelancer.com today. How it Works 1. Post job Tell us what you need done in seconds. 2. Choose freelancers Get your first bid in seconds and choose from the best. 3. Track progress Chat with your freelancer and review their work 24/7. 4. Pay safely Only pay when you're completely satisfied. Find Programmers Now It's quick, easy, and we only need a few details to get started
s3://commoncrawl/crawl-data/CC-MAIN-2021-31/segments/1627046154099.21/warc/CC-MAIN-20210731172305-20210731202305-00405.warc.gz
CC-MAIN-2021-31
4,412
47
https://www.e-think.ac.at/en/research/sozio-oekonomische-aspekte-der-energienutzung/
code
socio-economic aspects of energy use Socio-economic aspects of energy use For some decades in the last century the design of energy systems was mainly conducted from supply-side technologies’ point-of-view. Given the severe problems associated with technologies like nuclear and fossile energy carriers today taking into account customers behavior and preferences is a core focus of energy policies. e-think considers these aspects by putting a strong focus on socio-economic components of energy use and the demand for energy services in heating, transport and electricity-specific applications. Finally, another important focus is to analyze the value of various types of renewables from social point-of-view.
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652663013003.96/warc/CC-MAIN-20220528062047-20220528092047-00400.warc.gz
CC-MAIN-2022-21
713
3
https://discourse.stonehearth.net/t/dev-2387-x64-random-error-cause-unable-to-interact/12048
code
There I was, playing a game that started weird (at night), as well as the popup noise was in the background while I was going through maps; when all of a sudden, it happened. A random error popped up, which followed by my menu’s not changing. I then tried to save and restart, and it froze and didn’t save. AMD Phenom II X4 965 Processor, ~3.4GHz 16 GB PC3-12800 AMD Radeon HD 7770 (x2) Crucial 256GB M4 SSD
s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600402127075.68/warc/CC-MAIN-20200930141310-20200930171310-00322.warc.gz
CC-MAIN-2020-40
411
5
https://www.my.freelancer.com/projects/design/credit-application/
code
Credit application Needed in PDF editable format I will give you the sample 14 pekerja bebas membida secara purata $21 untuk pekerjaan ini I'm interested in your project and I hope to know more about it as it suits my skills. please send me a message because I have few questions about it and we can discuss them on chat together.
s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376823445.39/warc/CC-MAIN-20181210212544-20181210234044-00569.warc.gz
CC-MAIN-2018-51
330
4
http://pimbletree.com/animation-mobile-navigation-employing-sketch-application-and-flinto-for-mac-tutorial-final-part/
code
Build an animation for mobile navigation UI cellular design and style from content design google utilizing Sketch app and Flinto for mac tutorial. Why do you have to have to Subscribe my channel? 1. It is cost-free (you just require the google mail account) 2. Up to day (each my movies in your mail) 3. Assist me to mature up this channel 4. More subscriber = Much more activities. 5. Subscribe channel Angga Risky 🙂 Discover Android with my buddy: 1. Robby Dianputra: Adhere to Me 🙂 facebook : @anggariskys google+: in addition.google.com/+anggariskysetiawan internet site: www.anggarisky.com
s3://commoncrawl/crawl-data/CC-MAIN-2018-26/segments/1529267860570.57/warc/CC-MAIN-20180618144750-20180618164750-00353.warc.gz
CC-MAIN-2018-26
600
13
https://discourse.llvm.org/t/llvm-gcc-social-shenzhen-china-sept-16-2018/49710
code
The 4th LLVM/GCC social in Shenzhen will happen on Sept 16, 2018. Everyone interested in LLVM/GCC/Toolchain/IDE related projects is invited to join. Event details is at https://mp.weixin.qq.com/s/B8e9Yndf0PxJ7pgtDWftGQ BoF style. Presentations are welcome Besides, the first "Program Analysis Workshop in South China" will happen on Sept 15, 2018. Everyone interested in program analysis is invited to join. See https://mp.weixin.qq.com/s/MArvhbimzwCQxCoBfzBSZA for more details. Looking forward to meet you !
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100304.52/warc/CC-MAIN-20231201183432-20231201213432-00622.warc.gz
CC-MAIN-2023-50
509
10
https://www.skypack.dev/view/arabic-name-to-en
code
Arabic Name Converter 👳♂️ How to install 🧐 npm i -S arabic-name-to-en How to use 👨💻 The package exports a simple function that you can pass a string of a name of more than one name in one line and it will return the name in EN سارة => Sarah There is no clear romanizations rule to change the Ar name to En one, so this package is me trying to find common cases to covert the names. This package is still in early stage, so please open issues, if there is anything. Also, you may enhance it by depending on DB and make the package script for not found names. Here is a sheet of names for you to check. it has 3000 random Arabic names. Please open an issue and write the names that you are not happey about so I can fix it ⭕️
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764495001.99/warc/CC-MAIN-20230127164242-20230127194242-00581.warc.gz
CC-MAIN-2023-06
747
10
https://www.theidioms.com/cross-swords/
code
cross swords Meaning: quarrel; have a disagreement. Example: Every day at 6 PM. the Jenny and Eliza crossed swords for watching their favorite show. C Share your thoughts on the crest of a wave ❯❮ caught in the crossfire Add your thoughts Cancel reply ups and downs Meaning: good times and bad times Example: Every relationship has its ups and downs. It is important to stick it out. Read on Subscribe to our new updates in your email.
s3://commoncrawl/crawl-data/CC-MAIN-2021-31/segments/1627046154304.34/warc/CC-MAIN-20210802043814-20210802073814-00609.warc.gz
CC-MAIN-2021-31
439
8
http://docs.sophos.com/esg/smc/7-0/admin/en-us/webhelp/tasks/SoftwarePackagesUninstall.htm
code
Note: This section only applies to Android and iOS devices. When you have added an app to Sophos Mobile Control as described in Add app, you can manually uninstall it from selected devices or device groups. On the menu sidebar, under CONFIGURE, click Apps and then click Android or On the Apps page, click Select the devices from which you want to uninstall an app. Do one of the - Select individual devices. - Click Select device groups and then select one or more device groups. When you are ready, click Next. On the Select app page, select the required app. On the Set execution date page, specify the date when the app will be uninstalled: - Select Now for an immediate execution. - Select Date and then enter a date and a time for a scheduled execution. The selected app is uninstalled from the selected devices at the specified date. Managed apps on supervised iOS devices are uninstalled silently, that is without user Tip: Alternatively, you can use the following procedure to uninstall an app from a single device: Open the device's Show device page, go to the Installed apps tab and then click the trash can icon next to the app
s3://commoncrawl/crawl-data/CC-MAIN-2018-05/segments/1516084890187.52/warc/CC-MAIN-20180121040927-20180121060927-00710.warc.gz
CC-MAIN-2018-05
1,139
23
http://nickfraker.flavors.me/
code
I work as a System Administrator for a technology startup in the Cleveland, OH area. I do a little bit of everything, but mostly focus on process automation and scripting. I am a Computer Science & Engineering Technology graduate of the University of Toledo , where I also minored in Japanese I'm an enthusiast of many things - primarily video games, the industry, and gamer culture; anthropology, history, and art; and computers, programming, and technology.
s3://commoncrawl/crawl-data/CC-MAIN-2015-14/segments/1427131299515.96/warc/CC-MAIN-20150323172139-00059-ip-10-168-14-71.ec2.internal.warc.gz
CC-MAIN-2015-14
459
4
https://repository.urosario.edu.co/items/08221bc5-8eeb-4638-9752-0a8ba4ced0d1
code
Estimating computational requirements in multi-threaded applications Título de la revista Pérez, Juan F. ISSN de la revista Título del volumen Performance models provide effective support for managing quality-of-service (QoS) and costs of enterprise applications. However, expensive high-resolution monitoring would be needed to obtain key model parameters, such as the CPU consumption of individual requests, which are thus more commonly estimated from other measures. However, current estimators are often inaccurate in accounting for scheduling in multi-threaded application servers. To cope with this problem, we propose novel linear regression and maximum likelihood estimators. Our algorithms take as inputs response time and resource queue measurements and return estimates of CPU consumption for individual request types. Results on simulated and real application datasets indicate that our algorithms provide accurate estimates and can scale effectively with the threading levels. Time factors , Servers , Instruction sets , Maximum likelihood estimation , Computational modeling , Time measurement
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100016.39/warc/CC-MAIN-20231128214805-20231129004805-00598.warc.gz
CC-MAIN-2023-50
1,110
7
https://www.ittybittytalks.com/merge-drupal-views-filters/
code
Earlier we talked about how to force Drupal views contextual filter to use logical OR condition. Now consider the following case: - You have a topic (taxonomy term) page. - Each topic has some sub-topics (taxonomy terms under topics) - In the topic page, you have resource list which shows resources tagged with this topic. The list is made by a drupal view with topic set as contextual filter. - Now the list need a sub topics filter. Sub topics under this topic, that the list belongs to, will only shows up using views exposed filter. The complexity here is both topic and sub topic shares the same database id (field_topics_tid) and both are set in your views contextual filter and exposed filter. So when user chooses a sub topics filter, views query will look like WHERE field_data_field_topics.field_topics_tid = <topic_id_from_contextual_filter> AND field_data_field_topics.field_topics_tid = <topic_id_from_resource_filter> As you see this will not generate a valid results. We will need to do a logical OR using IN operator like WHERE field_data_field_topics.field_topics_tid IN (<topic_id_from_contextual_filter>, <topic_id_from_resource_filter>) Check this code from one of my projects to see how can we achieve this using views API. Please let me know if you have any questions.
s3://commoncrawl/crawl-data/CC-MAIN-2021-39/segments/1631780057083.64/warc/CC-MAIN-20210920161518-20210920191518-00663.warc.gz
CC-MAIN-2021-39
1,291
14
https://meetm.xyz/about/
code
I am a software developer and have worked on a varied number of projects. I have also participated and won a few projects in ETHGlobal and ETHIndia hackathon tracks. For past couple years I have been interested in ethereum and blockchain projects and very much believe in the ethos and need of a decentralized neutral global computer and smart contracts for things that matter. I have contributed a bit to the following projects: ethers-rs- it is a rust library for interacting with ethereum and evm compatible blockchains. foundry- foundry is the successor and rust rewrite of the Currently, I am working on the following: solidity-analyzer- A solidity LSP that integrates and provides better devex to foundry/dapptools projects written in rust.
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474526.76/warc/CC-MAIN-20240224080616-20240224110616-00288.warc.gz
CC-MAIN-2024-10
746
6
https://markbieber.ca/portfolio/victory-lab/
code
Lead Web and App Developer (2014-2017) Safe and secure app for team based communication, mainly targeting sports and organization groups. Presented to NHL teams Multi-platform application (iOS and Android) User friendly analytic platform (interprets results based on user integration) Anonymous email communication platform integrated with personalized counsellors © 2018 Mark Bieber.
s3://commoncrawl/crawl-data/CC-MAIN-2018-22/segments/1526794864405.39/warc/CC-MAIN-20180521142238-20180521162238-00405.warc.gz
CC-MAIN-2018-22
385
6
https://www.geeksforgeeks.org/chaayos-interview-experience-for-sde-internship-on-campus/
code
Chaayos Interview Experience for SDE Internship (On-Campus) Recently Chaayos conducted a hiring drive in some of the colleges of New Delhi for 6 months SDE intern role. Around 400 students appeared for the test. (Since there is no interview experience of Chaayos on gfg, I decided to write one!) Round 1 (Online Round) – This round consisted of MCQs and 2 coding questions. MCQs were based on core CS subjects, React and java output programs. Coding questions were easy-medium category. Coding questions – - Given a binary tree, modify nodes of the tree such that the value of left child of every node (if it exists) is equal to the sum of right child’s subtree and vice versa. If right child or left child don’t have a cousin, then their value becomes zero. 5 / \ 2 4 / \ 7 3 0 / \ 4 12 / \ 3 7 Round 2 (Technical Interview 1) – The interviewer asked me to introduce myself and then jump directly to the questions. He asked me about my preferred language I said C++. - Describe all pillars of OOPs and write an example of each in C++. - I had used React in one of my projects so he asked to write to write a container which has 2 buttons. The first button increases a counter and second one decreases it until it reaches zero. This was easy. - What is Interface and abstraction? - Given a binary tree, print its spiral order. Round 3 (Technical Interview 2) – In this interview, I was asked about many concepts of core cs subjects and three DSA questions. Questions about normalization, paging, difference between pass by value and pass by reference, what are static and dynamic data structures and one sql query. - Given a table of ID and Language, how would you store each name in their respective ids. I told a hashmap approach of mapping integer to a vector of strings. - https://www.geeksforgeeks.org/longest-consecutive-subsequence/ Solved it using hashset. - Given an array of zeroes and integers, modify array such that all zeroes come first and order is preserved. eg – [0,5,3,0,2,0,1] => [0,0,0,5,3,2,1]. I told I would use bubble sort and swap all zeroes to the left. He told me to optimize it, I told him an approach of using extra space and he was satisfied. Write a class that shows constructor overloading. Round 4 (HR Round) – In depth discussion about one of my projects that I had created using React and Django. - Typical HR questions like where do you see yourselves after 5 years, are you planning future studies etc. - Finally he asked me if I had any questions regarding the company, I said yes and asked him a few. The next day I got a call that I have received the offer.
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662593428.63/warc/CC-MAIN-20220525182604-20220525212604-00205.warc.gz
CC-MAIN-2022-21
2,613
21
http://www.itninja.com/question/the-system-administrator-has-set-policies-to-prevent-this-installation-1?from=appdeploy.com
code
The system administrator has set policies to prevent this installation Recently I tried to install Wise Package Studio and got the following message. "The system administrator has set policies to prevent this installation". For my particular instance it was fixed by changing a value in the registry under Name - DisableMSI Type - REG_DWORD 0 = enable This was originally set to 1. Hope this helps out someone else who comes across this error. During my search I also found that there is a Windows Installer 2.0 Bug which sometimes throws up this message. If there is a trace of an application previously having been installed, and you are trying to re-install it, you may get the above error. You can fix this by going to the registry to: Browse through and find your product. Delete the key relating to your product and this should allow the application to install. I haven't had the opportunity to check this out. But just in case someone is reading this and might need this resolution give it a go. so that the conversation will remain readable.
s3://commoncrawl/crawl-data/CC-MAIN-2014-41/segments/1410657132646.40/warc/CC-MAIN-20140914011212-00099-ip-10-196-40-205.us-west-1.compute.internal.warc.gz
CC-MAIN-2014-41
1,049
9
http://biosciences.stanford.edu/current/incoming/choosing-a-lab/index.html
code
Your choice of a thesis lab is the most important choice you will make in graduate school. Given this, it is essential that you think carefully about selecting your rotation labs. Many students approach this critical task by merely browsing lab websites. This is not sufficient; it is important to read the literature from the labs you are considering, get input about the personality of the faculty member, find out about the lab environment, and talk to others. To aid you in the process of choosing your rotation labs, we have created step-by-step instructions to guide you through the process. We're giving you this information and recommending that you take these steps as early as possible to help you make a smoother transition and get off to a better, faster start in graduate school. The list below is focused on finding the right scientific match. But before that, let's consider the bigger picture. Students have different needs and interests in terms of mentoring, lab environment, and research project, but every student should go three-for-three in choosing her or his thesis lab:
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281421.33/warc/CC-MAIN-20170116095121-00417-ip-10-171-10-70.ec2.internal.warc.gz
CC-MAIN-2017-04
1,094
4
https://johannesklingebiel.de/wiki/Design%20Notes/design-system-reading-list.html
code
A list of things I found pretty useful when researching how to build and steward a design system at the Media Lab Bayern. Please note that this project did not include a component library of code base, which is why these recommendations won‘t touch on these subjects Expressive Design Systems (2019) von Yesenia Perez-Cruz, A Book Apart [Link] - Absolutely excellent book when it comes to the implementation, structuring and stewarding of a design system. - Helpful example of what design principles might look like and how to write them (it involves a lot of back and forth with stakeholders) - A couple of rather basic but important tipps for implementing and stewarding a design system. - This is a neat little team exercise for figuring out which parts your new design system actually needs - A helpfull consideration of the multiple reasons for design system failure. Especially when considering if such a system is worth the effort in the first place.
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100535.26/warc/CC-MAIN-20231204214708-20231205004708-00873.warc.gz
CC-MAIN-2023-50
959
7
http://www.coderanch.com/t/55034/Struts/struts-validator-check-onchange-events
code
This week's book giveaway is in the OO, Patterns, UML and Refactoring forum. We're giving away four copies of Refactoring for Software Design Smells: Managing Technical Debt and have Girish Suryanarayana, Ganesh Samarthyam & Tushar Sharma on-line! See this thread for details. Hello everyone, I am using Struts validator framework to validate form fields. I have been using it for client side validations when the form is submitted. Is it possible to couple the validator checking with onChange events? For example, is it possible to check whether an input field's value is an Integer during onChange event for that field.
s3://commoncrawl/crawl-data/CC-MAIN-2015-32/segments/1438042987174.71/warc/CC-MAIN-20150728002307-00250-ip-10-236-191-2.ec2.internal.warc.gz
CC-MAIN-2015-32
622
3
https://talk.peercoin.net/t/help-coins-not-appearing-in-peercoin-wallet-after-btc-e-transaction/1423
code
Hi there, I’m new so hope I’m posting this in the right place! I’ve only just started buying peercoins, and just tried to transfer a number of coins from BTC-e into my peercoin wallet. The transaction shows up on the blockchain according to http://ppc.cryptocoinexplorer.com/, but the coins are nowhere to be seen. In addition, my wallet has an error message - WARNING: Checkpoint is too old. Wait for the blockchain to download, or notify developers of the issue. Can any of you old peercoin hands cast any light on this or suggest anything I could try? Would be very upset to lose my peercoins on my very first transaction! Thanks for your help. Ah, please ignore my previous post - the coins arrived! I didn’t realise it would take so long. Does anyone know how long it takes to show up the coins in the wallet. I just bought some PPC coins and got them into one wallet and then transferred some portion of the coins to another wallet (second wallet). It has been close to 2 hours and my coins are still not showing up in the wallet. The blockchain entry shows that the coins are in. Any idea, what might be going wrong here? Would appreciate any help. Should get the notification within minutes, 6 confirmations in about an hour. If it doesn’t show up soon, try to redownload the blockchain. Alternatively, backup your wallet and reinstall PeercoinQT. If it can be viewed in the online block explorer, I would consider it to be a valid transaction. Keep us updated. [quote=“lacksfish, post:5, topic:1423”]If it doesn’t show up soon, try to redownload the blockchain. Alternatively, backup your wallet and reinstall PeercoinQT. If it can be viewed in the only block explorer, I would consider it to be a valid transaction. Keep us updated.[/quote] Re-installing (that redownloaded the blockchain) solved the problem. I guess it got stuck somewhere. Yeah, I already had the backup of my wallet. Thanks guys for your help.
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510707.90/warc/CC-MAIN-20230930181852-20230930211852-00745.warc.gz
CC-MAIN-2023-40
1,939
17
https://go2products.co.uk/font-guide/
code
This guide aims to provide a basic understanding as to why fonts need to be embedded or flattened, how not embedding can cause problems and how get round these problems. What Can Happen If Fonts Aren’t Present When document is created they are normally done so using the fonts available on that computer at the time. If the same document is opened on another computer that does not have access to the original fonts it is likely that the fonts will be substituted. This can mean that the letters appear differently and as the replacement fonts may not be the same size as the original so the document formatting can be affected. This is more likely to be a problem if your design uses fonts that aren’t commonly available. How to Avoid Problems with Fonts The ideal way to get round problems with fonts is to make them part of your original document through embedding them, flattening them or converting them to curves. Saving as an Image By saving the file into a raster format i.e. jpeg, png, tiff etc the fonts become part of the image. As per converting to curves it is hard to edit at a later date however this will ensure that your document is displayed with the correct fonts. This allows you to use custom fonts no matter the occasion. This is dependent on font licensing and is normally used for pdf files. Many design programs will ask if you would like to embed the fonts into a document. If you select yes this will package the fonts into the document to ensure that when it is opened on another computer the correct fonts are available to display. Converting to Curves This method converts the fonts that are used in the document into shapes as opposed to letters. This method does have the disadvantage that documents are harder to edit at a later date but is very effective at ensuring that your fonts remain as intended.
s3://commoncrawl/crawl-data/CC-MAIN-2019-22/segments/1558232256215.47/warc/CC-MAIN-20190521022141-20190521044141-00394.warc.gz
CC-MAIN-2019-22
1,840
10
https://www.gadgetaccess.com/privacy-by-design/
code
It’s easy to be overwhelmed when you think about the risks of failing to protect personal information. But we can reduce risk when we embed thinking about privacy into all stages of our work, rather than as a set of protections to be applied as an afterthought. This is what we call privacy by design. Implementing business practices that address privacy are sometimes like bandages applied to an open wound: they’re reactionary measures meant to stop the leakage of personal information, not sure the ailment. The bandage is applied to existing processes, usually out of a need to comply with some regulation, and not taken very seriously. The problem is that when a data breach occurs, the issue is much more serious than a flesh wound! The incident didn’t occur because our business suffered an injury, it happened because we didn’t think hard enough about our internal processes to stop it before it happened. “Privacy by design” is the term we use to build our privacy culture. It means that we plan ahead to adequately process and safeguard personal information before it’s too late. This philosophy ensures we live up to global expectations and the rights of those who own the data we process or retain. Principles of Privacy by Design - Be Proactive, Not Reactive. We don’t wait for privacy issues to surprise us. - It’s Our Default Setting. Privacy should be protected even if the individual does nothing—it’s built in by default. - Privacy Is Embedded. Privacy is embedded into the design of our business processes, and the architecture of our IT systems. It’s an integral component of our day-to-day work, not an afterthought. - Privacy Has a Positive-Sum Outcome. We seek to accommodate the interests of all parties in a win-win manner. - Full Lifecycle Protection. We protect data during its entire lifecycle. - Visibility, Transparency, Openness. Every business practice and technology we use lives up to our promise. - Respect. We ethically protect our data subjects, with their interests in mind. Questions to Get Started - What is the nature of the information I’m handling? - What are the legitimate objectives of the parties involved with the sensitive information? - What can I do to secure private information as part of my regular business operations? - How can I integrate privacy into my work without diminishing functionality or productivity? - Do our security measures adequately safeguard the data at every stage of its time in our possession? - How are we honoring a data subject’s right to view their data? - Are we using procedures that make it easy for outside parties to understand and verify the data we retain? - If I were one of our customers, what impression would I get from the experience of trusting secure information with our organization?
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224648000.54/warc/CC-MAIN-20230601175345-20230601205345-00293.warc.gz
CC-MAIN-2023-23
2,808
23
http://ngonngu.net/index.php?m=print&p=17
code
Languages and Linguistics: Web Resources Web Resources • Organizations • Writting • Applied Linguistics • Computational Linguistics • Esperanto • Languages of Our World • Other sites - The Linguist List The world's largest online linguistic resource. Linguist List maintains a web-site with over 2000 pages and runs a mailing list with over 21,000 subscribers worldwide. - Open Directory Project: Linguistics Many links, many fields... - Linguistics and Human Languages Yahoo! Search Directory iLoveLanguages is a comprehensive catalog of language-related Internet resources. The more than 2400 links at iLoveLanguages have been hand-reviewed to bring you the best language links the Web has to offer. A guide to written language (alphabets, hieroglyphs, Chinese characters...) - Writing Systems Writing Systems is a web-site that provides information, amusement and advice about writing systems in general and English spelling and the English writing system in particular. The aim of Ancient Scripts is not to replace texts books or instructional web sites. Instead, it is designed to give an introduction to writing systems, which hopefully will tantalize the reader into searching for more information on the web or in books and publications. Sign Languages Are Now Written Languages! - Center for Applied Linguistics CAL is a private, non-profit organization. CAL's misson: “Improving communication through better understanding of language and culture”. Computational Linguistics (including softwares, tools, etc.) - The Association for Computational Linguistics ACL is the international scientific and professional society for people working on problems involving natural language and computation. - Mary D. Taffet's Home Page • Sites for Students of Introductory Linguistics • Sites for Natural Language Processing • Sites for Students of Data Mining Linguistic research and open-source software for Computational Linguistics. - Language Technology World “LT World is the most comprehensive WWW information service and knowledge source on the wide range of technologies that deal with human language. The service is provided by the German Language Technology Competence Center at DFKI.” - The Ellogon Language Engineering Platform “Ellogon is a multi-lingual, cross-platform, general-purpose language engineering environment, developed in order to aid both researchers who are doing research in computational linguistics, as well as companies who produce and deliver language engineering systems.” - Computational Linguistics from Wikipedia, the free encyclopedia. - Multlingva Informcentro pri Esperanto Multilingual Information Center about Esperanto - The Esperantic Studies Foundation The Esperantic Studies Foundation promotes research and teaching on Esperanto and on related issues of interlingual communication, especially in the context of higher education in North America. lernu! is a multi-lingual website whose goal is to inform internet users about Esperanto and help them to learn it, easily and free of charge. Languages of Our World - Ethnologue: Languages of the World An encyclopedic reference work cataloging all of the world’s 6,912 known living languages - Languages of Our World The ultimate source of authentic and reliable information about the Languages of the world on the net. The links in this directory will guide you to the official sites of the languages that you are looking for. - Mon-Khmer Site Gateway to research and documentation of Mon-Khmer languages and cultures - Hmong-Mien Studies - The Johns Hopkins Guide to Literary Theory & Criticism Tips: To "jump over" the login page, use http://[...]/hopkins_guide_to_literary_theory/noam_chomsky.html instead of http://[...]/hopkins_guide_to_literary_theory/entries/noam_chomsky.html (i.e. remove /entries from the link before paste it on the location bar). - Introduction to Linguistics Linguistics for Beginners: Covers language acquisition, learning disorders, linguistics, universals, early development of the English language and phonetics. - Linguistics – The Science of Language (From Wikibooks) 1. Introduction :: 2. The sounds of speech :: 3. Speech sounds go to work :: 4. How we make words :: 5. How words fit together :: 6. How languages got the way they are :: 7. The role of meaning :: 8. How languages differ
s3://commoncrawl/crawl-data/CC-MAIN-2019-13/segments/1552912203462.50/warc/CC-MAIN-20190324145706-20190324171706-00156.warc.gz
CC-MAIN-2019-13
4,351
47
http://sto-forum.perfectworld.com/showthread.php?p=1841521&mode=threaded
code
I'm using a science bridge officer with the Jam Sensors skill. Each time I invest a bridge officer skill point I can clearly see the recharge time decrease in the tool tip for this ability. Also on the tooltip it lists skills which effect duration, including Starship Operations. However, when I invest my captain skill points, I do not see any change in the duration. It remained at 10 seconds from the time I had zero all the way up to nine points in Starship Operations.
s3://commoncrawl/crawl-data/CC-MAIN-2015-18/segments/1429246648209.18/warc/CC-MAIN-20150417045728-00258-ip-10-235-10-82.ec2.internal.warc.gz
CC-MAIN-2015-18
473
2
https://forum.figma.com/t/why-is-there-a-constraints-limitation-when-element-is-kept-on-fixed-position-on-scrolling/2285
code
I have been seeing this problem for quite some time so thought I should let you guys know. The constraints “Left and right” “top and bottom” and “scale” on elements don’t show up when “Fix position on scrolling” is on. This always makes me turn off the checkbox and turn the constraint on and then revert back by enabling the checkbox. Attaching some screenshots for the same: - when checkbox is on, it does not allow using the constraints “L&R” and “Scale” - Turning off the checkbox and selecting the constraint - Turning on the checkbox after selecting This makes it a little unintuitive and uses several clicks when it could work in just two clicks. Is there any reason it is built this way. can this be fixed? Thanks in advance.
s3://commoncrawl/crawl-data/CC-MAIN-2021-17/segments/1618038072175.30/warc/CC-MAIN-20210413062409-20210413092409-00381.warc.gz
CC-MAIN-2021-17
759
7
https://gsa.confex.com/gsa/2019AM/webprogram/Paper333975.html
code
GLOBAL COPPER RESOURCES AND RESERVES; DISCOVERY IS NOT THE ONLY CONTROL ON SUPPLY Porphyry deposits still dominate global Cu resources and reserves and host ~75% of the contained Cu in our database. Chile also dominates global Cu resources and reserves, followed by the USA and Peru, all which host copper resources and reserves dominated by porphyry systems, indicating the continued importance of this deposit type for global copper production (as well as Mo, Re, Au, and others). The increase in global Cu resources documented in this study is associated with deposit discovery, the incorporation of more resources within the database (i.e., better data coverage), and the growth of individual Cu resources (often coincident with production) by an average of ~13% between 2010 and 2015. Our data indicates that Cu resources continue to grow over time coincident with production, indicating that although discovery and (more importantly brownfields expansion) is clearly important in terms of meeting increasing demands for Cu, we need to move beyond merely considering grades and tonnages. Environmental, political, logistical, and economical factors (among many others) are likely to become increasingly influential controls on the conversion of resources to reserves and the future supply of Cu; in other words, reported Cu resources or reserves are not guaranteed to become copper production, with the reasons why this does or does not occur a key topic for future research.
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712297295329.99/warc/CC-MAIN-20240425130216-20240425160216-00369.warc.gz
CC-MAIN-2024-18
1,480
2
https://devops.com/will-ide-box-train-firefox/
code
As predicted the Cloud IDE race is picking up. Now I’m sure. Cloud IDE or no Cloud IDE it is not a choice. But it is an huge opportunity. Just recently Mozilla announced their WebIDE, a development environment for HTML5 apps built right into the browser. The current functionality is cool. But that is not what interests me. What is more interesting is that Chrome has to be next, a Chrome based IDE that is attached too your Google account, with integrations into Google App Engine. That would be cool, but somewhat creepy at the same time. The new IDE from Mozilla in my opinion does not hold water to my current favorite cloud IDE Cloud9. But it does indicate a very cool direction in the development world. It’s delivery today is also very weak. You it is not just part of the browser, you have to get the bits from GitHub and then all your application runs will appear in a Firefox separate window. I really want it to just be a part of future browser releases, and something you just turn on or off. Speaking of Cloud9. They recently made a major update. That includes huge performance enhancements, Docker support ( IDE bleed into DevOps here we come), and more language options. Not to mention the new UI, which I wasn’t sure could get any better. Oh and what about all the IDEs in products not specifically designed to be an IDE. Like the neat one embedded in CodeAcademy. And the new one that came with the launch of the exciting new Wolfram Language, which by the way if you are a “Data Nerd” ( sorry New Relic, I stole it ) then you have to check it out. Anyway. We live inside our IDEs, and because we do so, sometimes we do not realize just how much it is apart of our lives. Like breathing. But at the end of the day if developers make a fundamental shift to developing in the Cloud9 they simplify everything around the development process. Cloud IDEs integrate easier with production and staging cloud environments. They make Continuous integration and delivery much easier. And they make bringing in new frameworks, APIs, and tools for monitoring, and code management a cinch. The move is not easy however. I know how hard it was to part from my perfectly configured Visual Studio 2013 with all the plugins, and themes just as I wanted it. From time to time I still visit VS to create my basic console based automation apps. But for everything new, I would not imaging turning to a client based IDE. And if the internet goes out, oh well, my power has already gone out twice this summer, I’m not getting work done anyway when that happens. It just means it’s time to explore that thing they call a sun. But if I was really crazy, because it’s a cloud IDE, I can code on my phone or table over my cell network. What do you think? Are you ready to make the jump to Cloud based development environments? If not, why?
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510528.86/warc/CC-MAIN-20230929190403-20230929220403-00588.warc.gz
CC-MAIN-2023-40
2,846
10
https://rt.cpan.org/Public/Bug/Display.html?id=23967
code
|Subject:||[PATCH] add progress bar for syncing from svn| I added a git-like progress indicator for svn mirroring. Instead of: Retrieving log information from 1 to 1234 Committed revision 2 from revision 1 Committed revision 3 from revision 2 Committed revision 4 from revision 3 it prints: Retrieving log information from 1 to 1234 ###% (####/1234) done You can disable the progress indicator and switch back to the old messages by passing verbose => 1 to the SVN::Mirror constructor, or by running svm with the SVM_VERBOSE environment variables set to 1. All tests pass. -- Jonathan Rockway <[email protected]> Message body is not shown because it is too large.
s3://commoncrawl/crawl-data/CC-MAIN-2020-34/segments/1596439739370.8/warc/CC-MAIN-20200814190500-20200814220500-00529.warc.gz
CC-MAIN-2020-34
676
3
https://wiki.debian.org/DebianEdu/Documentation/Bookworm/Contribute
code
Most of the time, the developer mailing list is our main medium for communication, though we also have #debian-edu on irc.debian.org and even, sometimes, real gatherings, where we meet each other in person. A good way to learn what is happening in the development of Debian Edu is to subscribe to the commit mailinglist. Debian Edu uses the Debian Bug Tracking System (BTS). View existing bug reports and feature requests or create new ones. Please report all bugs against the package debian-edu-config. Take a look at How To Report Bugs for more information on bug reporting in Debian Edu. Documentation writers and translators This document needs your help! First and foremost, it is not finished yet: if you read it, you will notice various FIXMEs within the text. If you happen to know (a bit of) what needs to be explained there, please consider sharing your knowledge with us. The source of the text is a wiki and can be edited with a simple webbrowser. Just go to https://wiki.debian.org/DebianEdu/Documentation/Bookworm/ and you can contribute easily. Note: a user account is needed to edit the pages; you may need to create a wiki user account first. Another very good way to contribute and to help users is by translating software and documentation. Information on how to translate this document can be found in the translations chapter of this book. Please consider helping the translation effort of this book!
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506669.30/warc/CC-MAIN-20230924191454-20230924221454-00567.warc.gz
CC-MAIN-2023-40
1,421
7
https://discuss.elastic.co/t/elasticsearch-process-dies-when-using-g1gc/12247
code
When I enable G1GC, Elasticsearch won't stay running for more than a few minutes. When it dies, nothing is output in the logs. All I see is an entry in syslog: init: elasticsearch main process (17253) terminated with status 134 Here are my G1 settings: I've also tried 50/100 (pause/interval). My Java version: java version "1.7.0_21" Java(TM) SE Runtime Environment (build 1.7.0_21-b11) Java HotSpot(TM) 64-Bit Server VM (build 23.21-b01, mixed mode) I'm running on EC2, using a cluster of 4 m1.xlarge with 5 gb allocated to Elasticsearch and mlockall true. The workload is distributed bulk indexing. I have 600 processes each in a loop, submitting bulk index requests of 200 documents at a time. As a side note, if I use UseParNewGC and UseConcMarkSweepGC, eventually I get stop-the-world pauses (of ~5s) every few seconds on each node. Which renders the cluster useless. How can I get G1 to work? Or how can I stop CMS from stopping the world several times per minute? Thank for the help. You received this message because you are subscribed to the Google Groups "elasticsearch" group. To unsubscribe from this group and stop receiving emails from it, send an email to [email protected]. For more options, visit https://groups.google.com/groups/opt_out.
s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376828501.85/warc/CC-MAIN-20181217091227-20181217113227-00418.warc.gz
CC-MAIN-2018-51
1,256
23
https://discourse.libsdl.org/t/why-isnt-event-loop-never-receiving-sdl-textediting-event/26765
code
I am developing on macOS Mojave. Although i receive SDL_TEXTINPUT events, I never receive any SDL_TEXTEDITING event. Is the SDL_TEXTEDITING event platform dependent? If I’m not mistaken, the SDL_TEXTEDITING event is issued only on text composition stuff, like when the keyboard suggestions on mobile devices and in some languages like the Japanese where you have more characters than keys and it generates the character by combining keys and such. It does not generate such events for delete/backspaces, if it is that what are you expecting you must handle this on your own. I ended up manually handling those eventually. Thanks for the clarification.
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100909.82/warc/CC-MAIN-20231209103523-20231209133523-00704.warc.gz
CC-MAIN-2023-50
653
4
https://imagescience.com.au/blog/best-of-2011-best-of-lists
code
Please read our latest COVID info. (Open for click and collect/mail order only). Lockdown rules still apply. Please note we're taking an extra day over the Melbourne Cup weekend (i.e. we'll be closed Sat 30th Oct. through to Tues 3rd Nov.) Well, I figure that everyone else is doing “best of” lists, that I may as well list a whole bunch of them for you all to go through and check out. Some truly amazing work to be seen, and I have also thrown in a few not so amazing lists. I’m still waiting on the best of 2011 from The Big Picture, so when it comes out I will update this post. It is sure to be amazing!
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323585381.88/warc/CC-MAIN-20211021040342-20211021070342-00362.warc.gz
CC-MAIN-2021-43
614
2
http://www.newschool.edu/eventDetail.aspx?id=85123
code
Due to continuing power outages in Lower Manhattan, The New School will remain closed until Monday, November 5, therefore this event has been cancelled. Please check the events calendar should this be rescheduled. Milano School of International Affairs, Management, and Urban Policy at the New School and the Julien J. Studley Graduate Program in International Affairs Presents the Fall 2012 conference "Rethinking Politics in Africa: Media, Knowledge Production, Techno- Politics." This conference organized by Sean Jacobs (GPIA), Manjari Mahajan (GPIA), and Antina von Schnitzler (GPIA), examines how media, knowledge production, and sovereignty are being recast in a post-Cold War Africa marked by new forms of interventions and techno-politics, cultures of legality, and modalities and technologies of representation and circulation. The continent is frequently depicted as the global exemplar of crisis – ravaged by civil wars, epidemics, and dysfunctional corrupt regimes. In contrast, this conference will explore how Africa, seemingly at the margins of world affairs, is in fact central to understanding new grammars of global governance, novel forms of knowledge production and experimentation, and shifting logics of sovereignty and democratic politics. Via a series of focused conversations on representation, knowledge production, and the techno-politics of sovereignty, this conference provides a forum to theorize global transformations from historically situated, interdisciplinary inquiries and thus to rethink politics not just on the continent, but more broadly in a postcolonial, post-Cold War world. - Mahmood Mamdani (Makerere University and Columbia University) Media, Representation and Power - Chair: Sean Jacobs (GPIA, The New School) - Neelika Jayawardene (English, SUNY-Oswego) - Hlonipha Mokoena (Anthropology, Columbia University - Riason Naidoo (South African National Gallery) - Brian Larkin (Anthropology, Barnard College & Columbia University) - Discussant: Lily Saint (English, University of Pittsburgh) Knowledge Production and the Public Sphere - Chair: Manjari Mahajan (GPIA, The New School) - Sherine Hamdy (Anthropology, Brown University) - Clapperton Mavhunga (Science, Technology and Society, MIT) - Stacey Langwick (Anthropology, Cornell) - Discussant: Frederick Cooper (History, NYU) Sovereignty, Citizenship, Techno-Politics - Chair: Antina von Schnitzler (GPIA, The New School) - Michael Ralph (Social and Cultural Analysis, New York University) - Brenda Chalfin (Anthropology, University of Florida) - Siba Grovogui (Political Science, Johns Hopkins University) - Discussant: Janet Roitman (Anthropology, The New School) This event is co-sponsored by NSPE, Global Studies, and the Center for Professional Scholarship. For more panel times and program please visit: http://milanoschool.org/AfricaConference.
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917124297.82/warc/CC-MAIN-20170423031204-00232-ip-10-145-167-34.ec2.internal.warc.gz
CC-MAIN-2017-17
2,854
26
http://www.linksysinfo.org/index.php?threads/alter-ad-blocking-list-after-download.30858/
code
Hello, I was wondering if I could get some help with an ad-blocking script. (specifically rhester72's script here.) Code: abc=dnsmasq_adblock.conf;tip=192.168.1.150;wget -q -O /tmp/$abc 'http://pgl.yoyo.org/adservers/serverlist.php?hostformat=dnsmasq&showintro=0&mimetype=plaintext';[ $? -eq 0 -a `grep ^address= /tmp/$abc|wc -l` -gt 0 ] && (logger -t adblock -p 5 Server download OK;cat /tmp/$abc|sed 's/127.0.0.1/'$tip'/g'>/etc/$abc;[ ! -s /cifs1 ] && mv -f /tmp/$abc /cifs1/$abc.bak || rm /tmp/$abc;[ -h /etc/dnsmasq.custom ] && service dnsmasq restart) || (logger -t adblock -p 4 Server download failed;[ ! -s /etc/$abc -a -s /cifs1/$abc.bak ] && (logger -t adblock -p 5 Data recovered from backup;cat /cifs1/$abc.bak|sed 's/127.0.0.1/'$tip'/g'>/etc/$abc;[ -h /etc/dnsmasq.custom ] && service dnsmasq restart));unset abc tip Unfortunately, there's a few domains blocked by the list that it downloads that I need to unblock. Is there anyway I can add something in the script (before the dnsmasq restart) to have it remove a few domain names from the list and then restart dnsmasq so the changes take effect? I imagine it might involve using sed, but have no clue how to do it. Specifically, I need to unblock www.google-analytics.com and ssl.google-analytics.com in particular. Apparently, a game uses them in their online store and a family member is not able to use that part of the game since it is blocked by this script. Thanks for any help you can provide!
s3://commoncrawl/crawl-data/CC-MAIN-2018-43/segments/1539583516892.84/warc/CC-MAIN-20181023174507-20181023200007-00037.warc.gz
CC-MAIN-2018-43
1,465
1
https://www.voters.us.com/justice-breyer-reveals-how-selfish-he-is/
code
Justice Breyer is garbage for this. John Iadarola and Brett Erlich break it down on The Damage Report. Become a TDR YouTube Member: http://www.youtube.com/thedamagereport/join Follow The Damage Report on Facebook: https://www.facebook.com/TheDamageReportTYT/ Help build the Home of the Progressives http://tyt.com/JOIN Subscribe to The Damage Report YouTube channel: https://www.youtube.com/thedamagereport?sub_confirmation=1 Follow The Damage Report on TikTok:https://www.tiktok.com/@thedamagereport?lang=en Follow The Damage Report on Instagram: http://www.instagram.com/thedamagereport/ Follow The Damage Report on Twitter: https://twitter.com/TheDamageReport Read more here: https://www.npr.org/2021/09/09/1035092720/progressives-want-justice-stephen-breyer-to-retire-his-response-not-yet "U.S. Supreme Court Justice Stephen Breyer has said he will retire on his own terms amid calls from progressives for him to step down from the court so President Biden can name a younger liberal to take his place. "I’m only going to say that I’m not going to go beyond what I previously said on the subject, and that is that I do not believe I should stay on the Supreme Court, or want to stay on the Supreme Court, until I die," he told NPR’s legal affairs correspondent Nina Totenberg in an interview in Boston to promote his book, The Authority of the Court and the Peril of Politics. "And when exactly I should retire, or will retire, has many complex parts to it. I think I’m aware of most of them, and I am, and will consider them."" #TheDamageReport #JohnIadarola #TheYoungTurks
s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320304600.9/warc/CC-MAIN-20220124185733-20220124215733-00384.warc.gz
CC-MAIN-2022-05
1,586
12
https://www.dk.freelancer.com/projects/c-sharp-programming/callerid-reader-application-solution/
code
I need a full solution of an application that reads CallerId from a modem (bidder should suggest a well-known external USB modem type and model) then it passes caller Id to a server through an HTTP API call with some configurations like UserName and Password. Application should have configurations to save server URL, UserName and Password, then it should work as a background proccess. 7 freelancers are bidding on average $263 for this job you will not regret hiring us. i know that their will be a more professional proposals to you but give us that chance to prove you that we are good enough.
s3://commoncrawl/crawl-data/CC-MAIN-2018-13/segments/1521257648431.63/warc/CC-MAIN-20180323180932-20180323200932-00151.warc.gz
CC-MAIN-2018-13
598
4
https://discuss.aristois.net/category/14/closed-bugs
code
@cuong The file isn't a zip it is a jar installer, you need to have java installed to run it, you can get java here https://www.java.com/en/download/ and then right click > open with > and select java, you may need to restart your pc after downloading and installing it. @earl Working fine for me. does it happen regardless of what the text is? Do you have any fabric mods? Do you have OptiFine? Edit: When I read your original post, I thought you meant that it was occuring in Singleplayer. If it occurs in Multiplayer, this is something the server has modified. Whether it be a censor plugin or something else. @farahalraee You need to follow the steps given, not reinstall. If you are on MultiMC the "me" folder is in MultiMC/libraries, not the instance. All games & launcher must be close while deleting the folder. You can hold shift on that screen and it will show you the directory of the file that you need to delete.
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323588113.25/warc/CC-MAIN-20211027084718-20211027114718-00595.warc.gz
CC-MAIN-2021-43
925
5
https://www.elastix.org/community/threads/vtiger-corrupted-new-partial-installation.9647/
code
Hallo every body. The problem is the following: a human (my) error caused VTiger corruption. I installed it again from the official distribution of VTiger, but I see I loose click & call function (asterisk integration). Is there any way to reinstall only VTiger module without reinstall all the Elastix package? Thanks.
s3://commoncrawl/crawl-data/CC-MAIN-2018-47/segments/1542039742567.46/warc/CC-MAIN-20181115054518-20181115080518-00423.warc.gz
CC-MAIN-2018-47
319
1
http://www.linuxforums.org/forum/applications/amarok-problem-print-57810.html
code
I do hope i am asking this question in the right place, I have Suse 10 / winxp dual boot, 3gig ram, 3ghz pentium 4, PC that runs fine for mostly everything, But in Suse i am unable to play any mp3 files. While not critical in anyway it remains a minor annoyance. i recall that Xmms under suse 9 worked well and have tried that under v10 but nothing happens, as in nothing is added to the play list. So i tried the Amarok program instead. The program does add files to the main playlist and upon trying to play any one, it emits no sounds and skips to the next one, which skips so on and so forth. I did take notice of another post within these forums (but i only just found this place) with regards to making sure the system itself can play basic alert/notification sounds and that works to satisfaction. I recall vaguely that it is/was possible to output a file directly to the block device within the /dev folder, but upon inspection i found no device named like a sound device, or perhaps i was searching for the wrong thing. Any and All Help will be greatly appreciated. And i apologize forhand if a post already exists detail a solution to my problem. Kind Regards to All. Suse doesn't include the necessary codecs to play mp3 or other music and video types out of the box. you have to check and make sure they're legal where you are then download and install them either from the repositories or from an .rpm Thanks for the response, i will see what i can turn up from Yast2 Online Update, once i work out why it cant find the server list. MP3s in Amarok SuSE 10.0 I have a similar problem trying to play mp3 files on SuSE 10.0 from my Windows server. I can locate and queue the files in Amarok, but they never play. I finally realized if I copy them locally they will play, but that's not a great solution. Any suggestions on being able to stream these files from a Window server?
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988725470.56/warc/CC-MAIN-20161020183845-00054-ip-10-171-6-4.ec2.internal.warc.gz
CC-MAIN-2016-44
1,887
13
https://openbullet.shop/downloads/gmail-config/
code
This configuration allows you to check GMAIL accounts. You must put 1 to 25 threads maximum. You need to use proxies, we advise you to go to Proxy911 to provide you with plenty of them. Captures the number of emails, the age of the account All our configurations are tested and updated regularly. You will receive the updates for free by mail.
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947475833.51/warc/CC-MAIN-20240302152131-20240302182131-00459.warc.gz
CC-MAIN-2024-10
343
2
https://www.jointjs.com/demos/icons
code
The Icons demo showcases how to add an arbitrary list of SVG elements to a shape in different positions. Click on the status list to change the order of the colors, or click on the icon list to set a different random image as the value. Made with JointJS+ Only available with the JointJS+ commercial license in the apps/ directory of your package. Don't have a license yet? Start a trial and use the source code of all our demos for free, with no strings attached, for 30 days.
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296949598.87/warc/CC-MAIN-20230331082653-20230331112653-00043.warc.gz
CC-MAIN-2023-14
477
4
https://es.mathworks.com/matlabcentral/answers/155317-reorder-table-variables-columns
code
I've created a table from a large csv file using the readtable function. I want to reorder the variables / columns in this table. My table's name is CUTable It has a variable CUTable.Date which is the date the data was taken It is currently column 20 in the table. I want to make it column 2 and shift existing columns 2-19 to 3-20. It seems there should be a very easy command to do this which I'm missing, but I can't seem to find it anywhere in the help or these forums. I could, but don't want to "brute force" it (e.g. create a new table, and one-by-one copy the variables from the exiting table to the new table in the order I want, then delete the old table) if avoidable. How can I accomplish this?
s3://commoncrawl/crawl-data/CC-MAIN-2020-45/segments/1603107889651.52/warc/CC-MAIN-20201025183844-20201025213844-00484.warc.gz
CC-MAIN-2020-45
706
5
https://www.mobileread.com/forums/showpost.php?p=301674&postcount=5
code
Originally Posted by deathpack If you want some really good fantasy book recommendations, check out www.bestfantasybooks.com it's got a really huge recommendation list for the best fantasy books. What's particularly useful is that the author explain what he/she likes about the book. I've been using the site the past few months to find new fantasy series and the author's been bang on as far as his/her recommendations go. The site is an advertising avenue for Amazon.com. Every book has a link and the sidebar adverts for Amazon are rather annoying (IMHO).
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917121355.9/warc/CC-MAIN-20170423031201-00530-ip-10-145-167-34.ec2.internal.warc.gz
CC-MAIN-2017-17
558
5
https://midnightlab.itch.io/ste
code
Space Transport Explorer A downloadable game Space Transport Explorer is a game set in large universe! Trade goods, craft items and parts for larger profits and customization, start your own Space Transport company and explore the universe! The game is in development since late June and has just reached a version 2.1.1 of the Pre-alpha, check out the changelog for more info. NOTE: A new patch just came out that smooths out some small bugs in 2.1.1, please download the new version if you can. The main gameplay loop has been added to the game, so it give you somewhat of a challenge to play instead of just being a techdemo. Supported platforms are Windows and Linux. (This time with Native builds!) Future platforms may include OS X and Android. Feel free to download and play the game. Check out our forums if you have any questions or found any bugs! Keep in mind that the entire game is subject to change! Thank you for your time!
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947476442.30/warc/CC-MAIN-20240304101406-20240304131406-00164.warc.gz
CC-MAIN-2024-10
938
13
https://forum.comses.net/t/any-work-on-sociotropy-autonomy-scale/7694
code
Is anyone aware of any prior work creating a computational model of Bieling, Beck, Brown (2000) ? Here is something I mocked with weighted averages: def adjustParams(sociotropy: Double, autonomy: Double) = DecisionParams( (param.selfParams._1, param.selfParams._2, param.selfParams._3 * autonomy), param.groupPreferences, param.groupWeights.map(weights => weights._1 -> weights._2 * sociotropy / groupSize) ) def calculate: Boolean = (selfWsum + groupWsum) / (groupWeightsSum + selfWeight) > 0.5 } Tested out with my Abilene toy model, with the assumption that distribution of ‘yes votes’ would be a beta distribution with α = β = sociotropy:autonomy e.g. higher sociotropy would yield more likely decision consensus and vice versa. Acceptance represents count of yes votes for a given group and count is the count of that number of votes out of 10000 simulated. (Left to right: α = β = 9999, α = β = 1, α = β = 1/9999) Since the initial assumption checks out I am assuming the two high level components of the scale can be modeled with this approach.
s3://commoncrawl/crawl-data/CC-MAIN-2021-49/segments/1637964363400.19/warc/CC-MAIN-20211207140255-20211207170255-00321.warc.gz
CC-MAIN-2021-49
1,063
6
https://www.lightroomqueen.com/community/threads/photoshop-action-to-expand-or-collapse-a-layer-group.30039/print
code
I have hunted high and low with my fav search engine and failed to find a solution to a Photoshop problem. I am recording an action, it creates a layer group with several layers in it. When playing back the action the layer group is collapsed. My action then steps backwards two layers, the trouble is I need to step back two layers in the collapsed group, what happens when I replay is the action skips over the collapsed group and selects layers below. Is there a way in a Photoshop action to collapse and expand a layer group? Clicking the expand triangle whilst recording an action has no effect, the clicking the > icon is not recorded. Hoping somebody knows how to expand a group in a Photoshop action. In principle you can solve this by choosing 'Add Menu Item' from the action menu, which gives you the option to manually add a menu that isn't recorded. Strangely enough however, there is a 'Collapse All Groups' menu in the Layers panel, but I don't see an 'Expand All Groups' menu...
s3://commoncrawl/crawl-data/CC-MAIN-2018-13/segments/1521257647758.97/warc/CC-MAIN-20180322014514-20180322034514-00639.warc.gz
CC-MAIN-2018-13
993
7
https://community.teradata.com/t5/Teradata-Applications/Upgraded-Teradata-Studio-15-x-to-16-2-projects-lost/td-p/85177
code
Today I upgraded my Teradata Studio 15.x version to the 16.2 version. In the Query Development perspective my Project Explorer seems to be pointing to a VERY OLD version of my projects. I see the path to my projects has changed. I changed the "Derby Database Location" to my active project area and it made no difference. How can I change the default location for projects to the desired folder so that the projects pick up all my current work without having to reconstruct each project one by one? The project folders are part of your "workspace". The Derby database is just the SQL History, though it is by default also located within the workspace. Edit the properties of the shortcut you use to launch Studio to append (or change) the -data "C:\path\to\desired\workspace\folder" option. The default workspace location is normally %HOMEDRIVE%%HOMEPATH%\workspace-studio, e.g. C:\Users\yourUserName\workspace-studio (you can verify the actual path being used under Preferences / General / Workspace). If you didn't know the other workspace path, you could likely find it by searching for files named teradata.log; they should be in a folder named .metadata that is directly under the workspace folder.
s3://commoncrawl/crawl-data/CC-MAIN-2019-13/segments/1552912202326.46/warc/CC-MAIN-20190320105319-20190320131319-00496.warc.gz
CC-MAIN-2019-13
1,203
4
http://www.workspace.cl/en/websites/lifeguards/
code
By Lai Guim Lifeguards is a new concept of pharmacies created by Volle Maan, a dutch agency of communications. It offers a service specially oriented to people with HIV positive, people with a life-threatening illness that requires full time availability of very specifics drugs. Through IC Design, Workspace was in charge of design and build a mini site to advertise this project. The website consisted in an animated intro in Flash and contents in HTML with CSS. Client: Lifeguards Pharmacies Comissioner: Volle Maan In collaboration with: IC Design
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917121893.62/warc/CC-MAIN-20170423031201-00075-ip-10-145-167-34.ec2.internal.warc.gz
CC-MAIN-2017-17
551
6
https://github.com/Const-me/EsentSerialize
code
ESENT Serialization class library is built above Managed ESENT. It allows you to store your objects in the underlying extensible storage engine database. Wikipedia has nice article outlining what’s so special about the extensible storage engine. If the text in the CHM is too small for you, here's a simple fix. - Serializes and deserializes objects. To mark the object to be your database record type, apply [EseTable] attribute to your record class, and column attributes to the class members. - Available on Windows desktops and servers (.NET 4.5+), Windows Store 8.1+ (PC only; technically, it works on Windows Phone 8.1, but the API is unofficial and won't pass WACK API test), Windows Mobile 10.0+. Suitable for building both desktop apps, mobile apps (on supported platforms), and servers. - Many different column types, ranging from trivial ones like byte or int32, to enums, multi-values, binary streams, arbitrary objects serialized into binary XML. - Sophisticated indexing: conditional indices if you need to query from a subset of records, tuple indices to implement full-text search. - Multiple threads can modify the database at the same time, because record-level locking. At the same time, another thread can read the same records without locks, because multi-versioning. - The recordsets support filtering and sorting by the ESE indexes, and since version 3.0 they expose LINQ-like API to sort and filter. - The database return records as IEnumerable (where tRow is your record class that has the [EseTable] attribute applied) suitable for lazy evaluation, making it possible to sequentially process a huge dataset that does not even fit in your RAM. - The library provides DB schema upgrade mechanism, to upgrade DB schema while retaining user's data. - On desktops and servers, the library supports hot backups. - Just like Managed ESENT, the library is architecture-neutral ("Any CPU"), and very small because the DB engine is a part of Windows. - Several demo projects are provided, including client-server demo, and some performance benchmark versus SQLite. - Good documentation. - Not all functionality was ported from version 2.x, e.g. there's no raw read/write API, and there's no table change notifications. - Those LINQ-like queries are limited to a single index. If you'll try to query multiple indices, expression compiler will throw an exception "no single index covers all referenced columns". You can only do that manually, using Recordset.IntersectIndices API. - Not all parts of the library are tested equally well.
s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376823236.2/warc/CC-MAIN-20181210013115-20181210034615-00263.warc.gz
CC-MAIN-2018-51
2,552
17
http://stackoverflow.com/questions/11706584/android-4-0-3-does-not-have-application-log-output-in-logcat-window
code
I am using an Android 4.0.3 device and eclipse 4.2 with the most current ADT plugin and Android SDK. I have tested the Android device with a "MyHelloWorld" project. The project runs OK. I have also added some "Log.i", "Log.v" statements in the MainActivity's onCreate method. However, I find that these Log statements do not generate any output in the eclipse logcat window. The eclipse logcat window does have some outputs related to the "MyHelloWorld" project (e.g. messages from the "Dalvik" java engine), but the messages from the "Log.i", "Log.v" statements do not exist. My Android 4.0.3 device is a non-rooted device and I cannot read directly from "/dev/log/main" to check whether the "Log.i", "Log.v" statements have written anything into the Android Log. I want to know that have I missed some settings in my Android phone and/or my eclipse setup ? What could I do to check whether the "Log.i", "Log.v" statements have written anything ? If I just want to have some debug outputs (output variable values) from my Android program, could I use other methods that do the same job as "Log.i", "Log.v" ? Thanks for any suggestion. (The problem is the same for eclipse 3.7.2 too)
s3://commoncrawl/crawl-data/CC-MAIN-2014-52/segments/1419447548530.114/warc/CC-MAIN-20141224185908-00034-ip-10-231-17-201.ec2.internal.warc.gz
CC-MAIN-2014-52
1,183
6
https://www.edx.org/learn/software-development/universitat-politecnica-de-valencia-it-fundamentals-for-business-professionals-software-development?webview=false&campaign=IT+Fundamentals+for+Business+Professionals%3A+Software+development&source=edx&product_category=course&placement_url=https%3A%2F%2Fwww.edx.org%2Fschool%2Fupvalenciax
code
There is one session available: IT Fundamentals for Business Professionals: Software development About this courseSkip About this course This course is one of the 5 courses of an introductory business information systems series, designed to introduce you to the amazing world of Information Technology. The series of courses is designed so that a professional in a field outside the information technologies (financial, administrative or managerial) acquires the basic knowledge in Information Technology to be able to interact more profitably with the computer and telecommunications specialists of your company or other corporations with which you are related, being able to specify requirements, evaluate workloads and monitor results in a much more effective way. The syllabus of the series is based on the CLEP Information Systems and Computer Applications exam. In this course, you learn the basics of software project management, reviewing basic project management concepts and roles, system development lifecycle, tools and methods used in software development, standards. used in the development and the design of the user interface of a computer system. By completing the series of 5 courses, you will be prepared to interact effectively with specialists in the Information Technology sector (and pass the CLEP ISCA exam if you wish). At a glance - Language: English - Video Transcript: English - Associated programs: - Professional Certificate in IT Fundamentals for Business Professionals - Associated skills:Project Management, Telecommunications, Information Systems, Information Technology, User Interface, Software Project Management, Software Development What you'll learnSkip What you'll learn You will learn about: - Tools and methods for software development - Concepts about the life cycle in systems development. - Roles and functions in the management of software projects - Different methods for the processing of information (lots, real time ...) - Design of user interfaces. - Development and motivation of standards in software.
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817699.6/warc/CC-MAIN-20240421005612-20240421035612-00588.warc.gz
CC-MAIN-2024-18
2,055
22
https://reconfigured.io/blog/different-approaches-to-data-modeling-which-one-suits-needs
code
As our dependence on data continues to grow exponentially, the importance of effective data modeling becomes increasingly paramount. Data modeling is the process of structuring and organizing data elements to create a blueprint for a database or information system. However, with various approaches available, choosing the right method can be overwhelming. From the traditional Entity-Relationship model to modern alternatives like dimensional and NoSQL models, each approach brings its own unique strengths and weaknesses. In this article, we delve into the world of data modeling, exploring different approaches, and assisting you in finding the one that suits your specific needs. Let's embark on a journey to unravel the intricacies of data modeling and discover the perfect fit for your data-driven endeavors. Data modeling is a method used to organize and structure data in a way that helps businesses understand and manage it effectively. It involves creating visual representations of data, known as models, and defining the relationships and attributes of the data entities. Key points about data modeling: Data modeling is crucial because it helps us understand and organize complex information in a structured way. It allows us to represent real-world scenarios and relationships between different data elements, making it easier to analyze and manipulate the data. By creating a data model, we can identify what information is needed, how it should be stored, and what rules or constraints should be applied. This helps ensure data integrity, meaning the data is accurate, consistent, and reliable. Data modeling enables effective communication between stakeholders, as it provides a visual representation of the data structure and allows for easy collaboration. It helps bridge the gap between business requirements and technical implementation, ensuring that both sides are aligned. A well-designed data model improves data quality and reduces redundancy. It eliminates inconsistencies and duplications, leading to more efficient storage and retrieval of data. This ultimately enhances the overall performance of databases and systems. Moreover, a data model is not static but rather evolves with the changing needs of an organization. It can be modified and expanded to accommodate new requirements, making it a valuable asset that can adapt to future developments. Entities and relationships are fundamental concepts in various domains, such as database design, computer science, and information systems. In simple terms, entities represent the objects or things that exist or are relevant within a particular context. They can be tangible items like people, products, or places, or they can be intangible, like concepts or events. On the other hand, relationships define the connections or associations between entities. These relationships indicate how entities interact, relate, or depend on each other. They provide valuable insights into the structure, behavior, and dynamics of a system or domain. Entities and relationships often go hand in hand. Entities are like the building blocks, while relationships act as the glue that connects these blocks. Relationships can help express various types of interactions, such as one-to-one, one-to-many, or many-to-many, depending on the characteristics of the entities being connected. Understanding the concepts of entities and relationships is essential for organizing and modeling information effectively. By identifying the entities and their relationships, we can capture the structure and interdependencies of a system or domain, enabling us to analyze, store, retrieve, and manipulate data in a meaningful and efficient manner. Designing the ER model involves creating a visual representation of the entities, relationships, and attributes in a database. It helps to organize and understand the structure of the database in a clear and efficient manner. By designing the ER model, we can define the different entities involved, like customers, products, or orders, and establish the relationships between them, such as a customer placing an order for a product. The model also identifies the attributes of each entity, like thename and address of a customer, or the price and quantity of a product. This ER model acts as a blueprint for the database, allowing us to plan and implement the database structure effectively. The relational model is a way to organize and manage data in a database. It involves representing data as tables, where each table consists of rows and columns. Each row in a table represents a record, while each column represents a specific attribute or characteristic of the data. In the relational model, relationships between tables are established through keys. A primary key is a unique identifier for each record in a table, while a foreign key is a reference to a primary key in another table. By linking tables through keys, related data can be efficiently retrieved and managed. This model allows for efficient querying and manipulation of data through a standardized language called Structured Query Language (SQL). SQL provides a set of commands for creating, modifying, and querying the database. The relational model promotes data integrity by enforcing constraints like uniqueness, referential integrity, and data types. This ensures that the data remains consistent and accurate throughout the database. Tables, in the context of databases, are structures that organize and store data in rows and columns, resembling a spreadsheet. Attributes, on the other hand, are characteristics or properties that describe the data within a table, such as names or ages. Relationships refer to the connections or associations between tables, defining how data from different tables relate to one another. Normalization techniques are methods used in databases to organize data efficiently and eliminate redundancies. They ensure that data is stored in a structured and logical manner, reducing data anomalies and improving data integrity. Here's a concise explanation of normalization techniques: Normalization techniques are crucial for enhancing database performance, minimizing redundancy, and maintaining data consistency. By following these techniques, databases become more efficient, easier to maintain, and less prone to data anomalies like update anomalies, insertion anomalies, and deletion anomalies. NoSQL data modeling pertains to how data is organized and represented in a NoSQL database. Instead of using a fixed, rigid schema like traditional relational databases, NoSQL databases provide more flexibility in storing and retrieving data. This means that data modeling in a NoSQL database involves designing the structure of the database to fit the specific needs of the application. It allows for easy scalability and handling of vast amounts of data. In NoSQL data modeling, emphasis is placed on denormalization, which involves duplicating and grouping data together for optimal query performance. This approach differs from the normalization techniques used in relational databases. Document-based data modeling is a method used to structure and organize data within a database system. It involves representing data as documents, typically in JSON or XML format, wherein each document contains a set of key-value pairs. Here is a concise explanation of this approach: Key-value data modeling is a method of organizing and storing data where each data entry is represented by a unique key associated with a value. The key acts as an identifier, while the corresponding value contains the information or attributes associated with that key. It enables flexible and efficient storage of data with simple retrieval and scalable performance. Graph Data Modeling refers to the process of designing the structure and relationships within a graph database. It involves organizing data elements as nodes and their connections as edges in a directed or undirected graph. This methodology allows for flexible and efficient representation of complex, interconnected data. Key points to understand about graph data modeling are: Traversal allows for efficient and flexible querying, enabling the exploration of relationships and patterns in the data. Nodes, in the context of data structures, are the fundamental building blocks that represent entities, objects, or entities in a system. These nodes can have various attributes or properties attached to them, which provide additional information about the entities they represent. On the other hand, edges are connections or relationships between nodes, often indicating dependencies or associations between them. Cypher is a query language specifically designed for working with graph databases. It allows users to retrieve, manipulate, and update data stored in a graph database using a simple and intuitive syntax. With Cypher, you can write queries to efficiently search and traverse graphs. These queries are expressed in a pattern-matching format that closely resembles natural language. By using a pattern of nodes and relationships, you can specify the structure of the data you want to retrieve or modify. Cypher excels at expressing complex graph queries in a concise and readable manner. Its syntax is designed to be highly expressive, with syntax elements that represent common graph patterns and operations. This allows both beginners and experienced developers to easily interact with graph databases. In addition to querying data, Cypher also supports update operations to modify the graph. You can create, update, and delete nodes and relationships using Cypher statements. This makes it a powerful language for managing and manipulating graph data. Object-Oriented Data Modeling is a method that structures information by representing real-world entities as objects. It focuses on organizing data into reusable components with properties (attributes) and behaviors (methods) to facilitate effective software development. This approach promotes modularity, reusability, and encapsulation to build robust and scalable systems. Class-based data modeling is a method of structuring and organizing data in an object-oriented programming framework. It involves creating classes to represent real-world entities or concepts and defining attributes and behaviors for these classes. Here are the key points to understand: Classes can be easily modified, extended, or replaced without affecting other parts of the system. Inheritance: It's like passing down traits in a family. When a class inherits from another class, it can use the same methods and variables. This saves time, as we don't need to repeat code. The inherited class becomes a subclass, while the class it inherits from is called a superclass. Polymorphism: It's when an object can take on many forms. We can use one function to do different things based on the type of object it receives. So, the object can behave differently depending on the situation. Polymorphism helps make code flexible and reusable. It allows us to write more general functions that can work with different types of objects. When choosing a data modeling approach, there are certain factors that need to be taken into consideration. Firstly, it is important to understand the goal or purpose of the data model. You need to establish whether you are creating a model for analysis, reporting, or operational processes. This will determine the level of detail and complexity required in the model. Secondly, consider the scalability of the data model. Will it be able to accommodate future growth in terms of data volume and complexity? It should be flexible enough to handle changes in data sources and the addition of new attributes or entities. Thirdly, evaluate the ease of implementation. Will the chosen data modeling approach fit seamlessly with existing systems and technologies? It should be compatible with the tools and platforms used in your organization, minimizing the need for significant changes or disruptions. Next, consider the interdependencies and relationships between different data elements. The chosen approach should effectively represent the associations and connections between entities, enabling accurate analysis and processing of the data. Additionally, assess the level of abstraction required in the data model. Depending on the specific use case, the model may need to provide a high-level overview or a more detailed representation of the data. Make sure the chosen approach matches the desired level of granularity. Furthermore, take into account the ease of maintenance and data integrity. The data model should be maintainable and easily updatable as new requirements arise. It should also ensure data consistency and integrity to prevent errors or discrepancies. Lastly, consider the expertise and skills available in your organization. The chosen modeling approach should align with the capabilities of your team, ensuring they have the necessary skills and knowledge to implement and maintain the model effectively. By carefully considering these factors, you can select a data modeling approach that best suits your organization's needs, ensuring the successful implementation and utilization of the data model. Data modeling is a crucial step in the process of organizing and managing data effectively. It involves creating a conceptual representation of the data, which helps to define its structure, relationships, and attributes. In order to cater to different needs, there are various approaches to data modeling that organizations can choose from. The relational data model is widely used and organizes data into tables and establishes relationships between them. On the other hand, the object-oriented data model stores data as objects, which have properties and behaviors. For more complex data structures, the hierarchical and network data models offer alternatives. These models organize data in a hierarchical or interconnected manner, respectively. Another alternative is the NoSQL approach, which is flexible and scalable, making it suitable for handling dynamic and unstructured data. The key is to understand the requirements of your organization and select the appropriate data modeling approachthat best fits your needs and goals. Leave your email and we'll send you occasional, honest promo material and more relevant content.
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296816832.57/warc/CC-MAIN-20240413180040-20240413210040-00742.warc.gz
CC-MAIN-2024-18
14,385
54
http://shaun.boyblack.co.za/blog/2009/04/
code
Monthly Archives: April 2009 The State Of The Game There are some great Flash and Flex application frameworks out there right now. Mate, Swiz and PureMVC (update: and Parsley!) stand out. The authors of these frameworks realized that the Flash Platform is different enough to the JVM to warrant a fresh approach to application design. RobotLegs AS3 is a Dependency Injection Driven MVCS Framework for Flash and Flex inspired by PureMVC. Now with DI/IOC and Reflection adapters instead of direct dependencies on the SmartyPants-IOC framework. By providing your own adapters you can run RobotLegs off a DI/IOC/Reflection framework of your choosing. Continue reading Well, you might enjoy RobotLegs AS3: yet another lightweight micro-architecture for Rich Internet Applications. Great news: SmartyPantsIOC, a Dependency Injection framework for Flash and Flex has been released. Check it out here: I guess that means that it’s time for me to release RobotLegs – an MVCS micro-architecture for Rich Internet Applications inspired by PureMVC, Mate and Swiz! But first, I have to write a little demo application for it.. coming soon! I asked this question on Stack Overflow: Based on the feedback I wrote a little class to make it super easy to do. You add function references to a queue, and those functions get called (in the order they were added) on the next Flash Player Frame. Herewith, the DelayedFunctionQueue.as
s3://commoncrawl/crawl-data/CC-MAIN-2018-13/segments/1521257645538.8/warc/CC-MAIN-20180318052202-20180318072202-00425.warc.gz
CC-MAIN-2018-13
1,417
11
https://groups.google.com/a/opendap.org/g/opendap/c/hmj9Su6ZuYk
code
OPeNDAP and Unidata are pleased to announce the release of the OC library, version 2.0. OC is a pure C implementation of DAP 2.0. This version of the OC includes: * Complete rebuild of the interface to make it more clear. * Removed the dependency on libxdr by including a private implementation of the xdr code. * Improved the handling of authorization so that client-side keys are supported. * Reduced the amount of generated documentation. * Numerous bug fixes. jgallagher at opendap.org
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100650.21/warc/CC-MAIN-20231207054219-20231207084219-00784.warc.gz
CC-MAIN-2023-50
489
8
http://forum.modifiedelectricscooters.com/viewtopic.php?f=10&t=2697&p=21685&sid=e0dc5e3a4d6a921bd78d7679ddea504f
code
I'm new to the Electric Scooter game, I mostly use mine to commute around Gibraltar, the short distances and low traffic speeds makes for perfect scooting. I've lost a cell in my Lead Acid battery, and am (obviously) considering upgrading this to a Li-Ion one. I would also like to upgrade my 1000W motor to a 1500W brushless one (I think we can all see where this is going)... So, prior to jumping right in a buying a load of parts that won't work together, I'd like to get your input on a few things: (please note that shipping from US is prohibitively expensive, so I'm sourcing parts from this side of the world). Would this package: http://goo.gl/IFtnnO Work with this battery: http://goo.gl/mBvUpP Thanks in Advance!
s3://commoncrawl/crawl-data/CC-MAIN-2018-30/segments/1531676592875.98/warc/CC-MAIN-20180722002753-20180722022753-00464.warc.gz
CC-MAIN-2018-30
722
7
https://lomelotor.firebaseapp.com/434.html
code
Red hat jira now uses the email address used for notifications from your user profile. Process monitoring and management on red hat using graphical tools. Process monitoring and management on red hat using. The red hat customer portal delivers the knowledge, expertise, and guidance available through your red hat subscription. Instead, i took a look at red hats upstream distro, centos. The red hat customer portal delivers the knowledge, expertise. Novell sles 9 sp3 and sp4 novell sles 10 sp1 and sp2, sles 11 inbox. There is no graphical interface attached with the in. Ansible is the only automation language that can be used across entire it teams from systems and. A subscription service has the role to identify registered systems with the products installed on them. Patch management is available through the patches for red. The article you linked describes the supportability of the workstation version. Because the affected component is not scheduled to be updated in the current. Red hat enterprise linux storage management technologies, such as system storage manager and libstoragemgmt, bring forth easeofuse advancements in storage management and. Start red hat subscription manager using the system tools group of the applications menu. How to choose a linux distro for your server network. Alternatively, you can start it from the command prompt by. Fedora is a distribution that uses a package management system. Hypervisor management software broadens to manage multiple. Manage your red hat certifications, view exam history, and download certificationrelated logos and documents. Which rpm packages are required for graphical display. Launching the authentication configuration tool ui. Managing users in a graphical environment red hat enterprise linux 7 red hat customer portal. For more information on the benefits, installation, and usage of this. Red hat enterprise linux rhel is a linuxbased operating system from red hat designed for businesses. The company aims to provide support and value with additional software tools. Red hat just announced that it is making red hat openstack platform 10 available. This request was evaluated by red hat product management for inclusion in the current release of red hat enterprise linux. Remove red hat access from the management interfaces gui. Red hat now plays as large a role in the open source kvm hypervisor as it does in linux. Had my deployment case been different, i probably would have considered centos more strongly. Virtualization management is software that interfaces with virtual environments and the underlying physical hardware to simplify resource administration, enhance data analyses, and streamline operations. Red hat comes with redhatconfiguser suse comes with yast debian linux and other distro come with usersadmin gui tool set freebsd with sysinstall solaris comes with solaris management centre smc however, continue reading user management. Lvm is an enterprisegrade partitioning and storage management solution that allows you to dynamically resize partitions. Choose the workstation base environment, add development tools, graphical. Local subscription manager service tracks down the installed software products. This system is based on rpm, the rpm package manager, with several higher level tools built. To start the application, go to applications the main menu on the panel add remove software. This request was evaluated by red hat product management for inclusion in a red hat enterprise linux maintenance release. Founded in 1993, red hat has its corporate headquarters in. Managing users in a graphical environment red hat enterprise. Red hat openstack platform 10 targets private cloud. Red hat satellite is a system management solution that makes red hat infrastructure easier to deploy, scale, and manage across physical, virtual, and cloud environments. You can configure installation destination, connect to red hat, system. Using addremove software red hat enterprise linux 6 red. Red hat enterprise linux 8 installation tips and tricks. Attach red hat virtualization hosts to the clusters. Lvmadministration mit dem lvmgui red hat enterprise. This release is based upon the openstack newton release and is designed to increase systemwide scalability. Log in to your red hat account red hat customer portal. Red hat enterprise linux storage management youtube. Installation now you are ready to run the rhel 8 installer. Red hat satellite is an infrastructure management product specifically designed to keep red hat enterprise linux environments and other red hat infrastructure running efficiently, with security, and compliant with various standards. You can change your email in the user profile if necessary, change will be effective in red hat. Installing red hat enterprise linux 7 server with gui. Supports embedded linux arm, coldfire, power pc, ubuntu linuxx86, x8664, fedora, centos, red hat. Switching to a graphical login red hat enterprise linux 6. Zusatzlich zur befehlszeile command line interface oder kurz cli bietet lvm eine grafische benutzeroberflache graphical user interface oder kurz gui, mit. Web browser requirements to access the management gui. To switch to a graphical environment, you might need to install extra software from a repository. Red hat claims that 90% of the fortune global 500 uses its products, and red hat enterprise linux rhel is their flagship in this arena. You can configure installation source and software selection. Using the graphical user interface red hat enterprise linux 6. Management tool graphical user interface for use with the qlogic linux driver version 8. Red hat satellite server synchronizes the content from red hat customer portal, and provides functionality including finegrained life cycle management, user and group rolebased access. Bigfix patch management for red hat enterprise linux keeps your linux clients current with the latest updates and service packs. This management tool helps users provision, configure, and update systems to keep them running efficiently, with security, and in compliance with various standards. You can access red hat enterprise linux repositories with your. When that happens, process monitoring and management becomes important. Package management tool red hat enterprise linux 5. How to install a graphical user interface gui for red hat enterprise. How do you enable a graphical interface for the red hat. Almost all linux distribution comes with its own set of gui tools to manage users and groups. An update for rhgit218git is now available for red hat software collections. Red hat product security has rated this update as having a security impact of important. Checkpoint dashboard you are defined as a gui client. Registering the red hat support tool using the command line 8. To use a graphical user interface on system z, use vncserver instead. Installing red hat 4 enterprise server on core 2 duo machine. Notice that the default for software selection is server with a gui, so youll need to change that to server, workstation. Managing users via the user manager application red hat. Spacewalk is an open source linux systems management solution. Deploy secure, reliable, flexible hybrid cloud environments using red hat solutions on azurea fully comprehensive cloud for open source architectures. It also allows you to view what packages are installed in your system and which ones are available for download from red hat network. Red hat satellite 6 server multitenant user and group rolebased access control rbac with external directories powerful graphical user interface gui, commandline interface cli, and application. Batch job management and monitoring gui support red hat. Find answers to how to start the management gui for db2 on linux red hat enteprise 4 as from the expert community at experts exchange. On red hat enterprise linux rhel 8, installing software is ensured by the new version of the yum tool, which is based on the dnf technology yum v4. Red hat access gui is already installed if you select to have the gnome desktop installed. Red hat, the worlds leading linux company, has announced that the newest version of its flagship operating system, red hat enterprise linux rhel 6. After installing the update, firefox must be restarted for the changes to take effect. Fully compatible with ubuntu and red hat enterprise linux applications. You can access red hat enterprise linux repositories through the internet with your red hat. To start the application, go to applications the main menu on the panel addremove software. Customizing your installation using the gui red hat. Software management red hat enterprise linux 8 red. Powered by a free atlassian jira open source license for red hat, inc try jira bug tracking software for your team. Alternatively, you can type the commands systemconfig. Packagekit refers to yum repositories as software sources. Powered by a free atlassian jira open source license for red hat, inc try jira bug tracking. Rhel can work on desktops, on servers, in hypervisors or in the cloud. Create a red hat virtualization domain and associate it with a vlan pool and red hat virtualization manager credentials. This tool allows you to perform basic package management of your system through an easytouse interface to remove installed packages or download and install packages compatible to your system. All firefox users should upgrade to these updated packages, which contain firefox version 17.1541 365 143 1430 1110 1467 356 123 1357 643 625 1149 865 1583 1166 105 97 1553 1079 907 493 1335 333 839 234 364 880 1000 576 793 296 35 383 1164 9 353 1287 113 256 1454 824 1134 1384 1271 239
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030334974.57/warc/CC-MAIN-20220927002241-20220927032241-00523.warc.gz
CC-MAIN-2022-40
9,682
11
https://www.upsolver.com/blog/apache-parquet-why-use
code
This post covers the basics of Apache Parquet, which is an important building block in big data architecture. To learn more about managing files on object storage, check out our guide to Partitioning Data on Amazon S3. In last year’s Amazon re:Invent conference (when real-life conferences were still a thing), AWS announced data lake export – the ability to unload the result of a Redshift query to Amazon S3 in Apache Parquet format. In the announcement, AWS described Parquet as “2x faster to unload and consumes up to 6x less storage in Amazon S3, compared to text formats”. Converting data to columnar formats such as Parquet or ORC is also recommended as a means to improve the performance of Amazon Athena. It’s clear that Apache Parquet plays an important role in system performance when working with data lakes. Let’s take a closer look at what Parquet actually is, and why it matters for big data storage and analytics. The Basics: What is Apache Parquet? Apache Parquet is a file format designed to support fast data processing for complex data, with several notable characteristics: 1. Columnar: Unlike row-based formats such as CSV or Avro, Apache Parquet is column-oriented – meaning the values of each table column are stored next to each other, rather than those of each record: 2. Open-source: Parquet is free to use and open source under the Apache Hadoop license, and is compatible with most Hadoop data processing frameworks. 3. Self-describing: In Parquet, metadata including schema and structure is embedded within each file, making it a self-describing file format. Advantages of Parquet Columnar Storage The above characteristics of the Apache Parquet file format create several distinct benefits when it comes to storing and analyzing large volumes of data. Let’s look at some of them in more depth. File compression is the act of taking a file and making it smaller. In Parquet, compression is performed column by column and it is built to support flexible compression options and extendable encoding schemas per data type – e.g., different encoding can be used for compressing integer and string data. Parquet data can be compressed using these encoding methods: - Dictionary encoding: this is enabled automatically and dynamically for data with a small number of unique values. - Bit packing: Storage of integers is usually done with dedicated 32 or 64 bits per integer. This allows more efficient storage of small integers. - Run length encoding (RLE): when the same value occurs multiple times, a single value is stored once along with the number of occurrences. Parquet implements a combined version of bit packing and RLE, in which the encoding switches based on which produces the best compression results. As opposed to row-based file formats like CSV, Parquet is optimized for performance. When running queries on your Parquet-based file-system, you can focus only on the relevant data very quickly. Moreover, the amount of data scanned will be way smaller and will result in less I/O usage. To understand this, let’s look a bit deeper into how Parquet files are structured. As we mentioned above, Parquet is a self-described format, so each file contains both data and metadata. Parquet files are composed of row groups, header and footer. Each row group contains data from the same columns. The same columns are stored together in each row group: This structure is well-optimized both for fast query performance, as well as low I/O (minimizing the amount of data scanned). For example, if you have a table with 1000 columns, which you will usually only query using a small subset of columns. Using Parquet files will enable you to fetch only the required columns and their values, load those in memory and answer the query. If a row-based file format like CSV was used, the entire table would have to have been loaded in memory, resulting in increased I/O and worse performance. When using columnar file formats like Parquet, users can start with a simple schema, and gradually add more columns to the schema as needed. In this way, users may end up with multiple Parquet files with different but mutually compatible schemas. In these cases, Parquet supports automatic schema merging among these files. Apache Parquet, as mentioned above, is part of the Apache Hadoop ecosystem which is open-source and is being constantly improved and backed-up by a strong community of users and developers. Storing your data in open formats means you avoid vendor lock-in and increase your flexibility, compared to proprietary file formats used by many modern high-performance databases. This means you can use various query engines such as Amazon Athena, Qubole, and Amazon Redshift Spectrum, within the same data lake architecture. Column-oriented vs row based storage for analytic querying Data is often generated and more easily conceptualized in rows. We are used to thinking in terms of Excel spreadsheets, where we can see all the data relevant to a specific record in one neat and organized row. However, for large-scale analytical querying, columnar storage comes with significant advantages with regards to cost and performance. Complex data such as logs and event streams would need to be represented as a table with hundreds or thousands of columns, and many millions of rows. Storing this table in a row based format such as CSV would mean: - Queries will take longer to run since more data needs to be scanned, rather than only querying the subset of columns we need to answer a query (which typically requires aggregating based on dimension or category) - Storage will be more costly since CSVs are not compressed as efficiently as Parquet Columnar formats provide better compression and improved performance out-of-the-box, and enable you to query data vertically – column by column. Example: Parquet, CSV and Amazon Athena We’re exploring this example in far greater depth in our upcoming webinar with Looker. Save your spot here. To demonstrate the impact of columnar Parquet storage compared to row-based alternatives, let’s look at what happens when you use Amazon Athena to query data stored on Amazon S3 in both cases. Using Upsolver, we ingested a CSV dataset of server logs to S3. In a common AWS data lake architecture, Athena would be used to query the data directly from S3. These queries can then be visualized using interactive data visualization tools such Tableau or Looker. We tested Athena against the same dataset stored as compressed CSV, and as Apache Parquet. This is the query we ran in Athena: SELECT tags_host AS host_id, AVG(fields_usage_active) as avg_usage GROUP BY tags_host HAVING AVG(fields_usage_active) > 0 And the results: |Query time (seconds)||735||211||18| |Data scanned (GB)||372.2||10.29||18| - Compressed CSVs: The compressed CSV has 18 columns and weighs 27 GB on S3. Athena has to scan the entire CSV file to answer the query, so we would be paying for 27 GB of data scanned. At higher scales, this would also negatively impact performance. - Parquet: Converting our compressed CSV files to Apache Parquet, you end up with a similar amount of data in S3. However, because Parquet is columnar, Athena needs to read only the columns that are relevant for the query being run – a small subset of the data. In this case, Athena had to scan 0.22 GB of data, so instead of paying for 27 GB of data scanned we pay only for 0.22 GB. Is using Parquet enough? Using Parquet is a good start; however, optimizing data lake queries doesn’t end there. You often need to clean, enrich and transform the data, perform high-cardinality joins and implement a host of best practices in order to ensure queries are consistently answered quickly and cost-effectively. You can use Upsolver to simplify your data lake ETL pipeline, automatically ingest data as optimized Parquet and transform streaming data with SQL or Excel-like functions. To learn more, schedule a demo right here. Want to learn more about optimizing your data lake? Check out some of these data lake best practices. To see additional benchmarks and learn best practices when preparing data for Athena, join the upcoming Upsolver + Looker webinar right here.
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323587623.1/warc/CC-MAIN-20211025030510-20211025060510-00000.warc.gz
CC-MAIN-2021-43
8,215
44
https://www.mailenable.com/forum/viewtopic.php?f=7&t=41829
code
I've already used it from other companies like sendGrid.com and I know MailEnable works. But in Amazon SES you need to configure the connection to TLS. And in mailEnable does not have this setting. I even installed the new version to see if it looked and not either. How do I do? More information Amazon SES The Amazon SES SMTP endpoint requires that all connections be encrypted using Transport Layer Security (TLS). If you want to use TLS Wrapper but your MTA does not support TLS Wrapper, you can set up a "secure tunnel" to provide TLS Wrapper support. For more information, see Setting Up a Secure Tunnel to Connect to Amazon SES.
s3://commoncrawl/crawl-data/CC-MAIN-2018-22/segments/1526794867904.94/warc/CC-MAIN-20180526210057-20180526230057-00511.warc.gz
CC-MAIN-2018-22
635
7
https://haystackconf.com/europe2019/relevant-facets/
code
Lucian Precup and Radu Pop • Back to Haystack Europe 2019 In many contexts, facets are as important as the results themselves. While they are easy to handle when the data is structured and clean, they can be quite difficult to put in place on unstructured or low-quality data. This is particularly well seen in the context of e-commerce and marketplaces gathering several different vendors, but also in domains where data is heavily unstructured. With the arrival of voice assistants, chat-bots and other connected objects, displaying a list of results even very relevant as a first answer of the search engine is not an option. This talk is an exhaustive presentation around facets and how to make them relevant. Which facets to display and when, how to handle unstructured data, what’s the best user experience in each use case. In short, how to make facets relevant again.Download the Slides Watch the Video Lucian PrecupCTO - Adelean Lucian worked with the French National Institute for Research in Computer Science and Control (INRIA), Business Objects and SAP to build distributed databases and real time data integration software. As the CTO of Adelean, the company he founded in 2010, he develops search engines, nosql and big data solutions. Radu PopSolutions Architect - Adelean Radu is providing Consulting Services as Solutions Architect at Adelean. He handles projects around Elasticsearch and Adelean’s A2 search technology. He oversees the integration and evolution of search engines within large e-commerce platforms and marketplaces. Prior to joining Adelean, Radu acquired a solid experience in Web archiving, operating large scale crawling systems in the context of several European research projects. He holds a PhD in Computer Science and a MSc in Distributed Systems.
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233509023.57/warc/CC-MAIN-20230925151539-20230925181539-00378.warc.gz
CC-MAIN-2023-40
1,795
7
http://ronin-ruby.github.io/docs/install/fedora.html
code
Installing Ronin on Fedora This guide will show you how to properly install Ruby, RubyGems and then Ronin on a vanilla Fedora Linux system. sudo yum install -y readline-devel libxml2 libxml2-devel libxslt libxslt-devel sqlite sqlite-devel && \ sudo yum install -y ruby ruby-devel irb rubygems && \ sudo gem install ronin Installing required Libraries sudo yum install -y libxml2 libxml2-devel libxslt libxslt-devel sqlite sqlite-devel If you already have not done so, we must fully install Ruby on the system. sudo yum install -y ruby ruby-devel irb rubygems Now that your Fedora system has been properly setup with Ruby and RubyGems, we can finally install Ronin: sudo gem install ronin
s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218203536.73/warc/CC-MAIN-20170322213003-00300-ip-10-233-31-227.ec2.internal.warc.gz
CC-MAIN-2017-13
687
9
https://github.com/krisajenkins/remotedata
code
RemoteData for Elm Tools for fetching data from remote sources (incl. HTTP). For a full discussion of what this package does and why it exists, read this post. From your top-level directory - the one with elm.json in - call: $ elm install krisajenkins/remotedata Building & Testing yarn yarn run elm make yarn run elm-test ...will run the whole build. Copyright © 2015-2018 Kris Jenkins Distributed under the MIT license.
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323585507.26/warc/CC-MAIN-20211022114748-20211022144748-00368.warc.gz
CC-MAIN-2021-43
422
10
https://hellameke.com/sony-mdr-ex155ap-review-2020-mic-noise-cancellation/
code
This video is about sony mdr ex155ap review 2020. These earphones come with mic along with noise cancellation and have 9mm drivers. The audio quality is excellent and its compact size makes them ideal for people who have sensitive ears. Other earphone reviews Comparison video between jbl t210 vs jbl t200a : Jbl t110 unboxing and review: JBL t210 unboxing and review: Realme earbuds unboxing and review: Sony mdrxb55ap : boat bassheads 225 : About me: This channel is about review of products, gadgets and softwares. All the reviews are honest based on testing and using the products. Please subscribe and like if you find this video helpful and do raise your questions in the comments. write to me at : [email protected] Follow me on social media follow me on
s3://commoncrawl/crawl-data/CC-MAIN-2021-49/segments/1637964358591.95/warc/CC-MAIN-20211128194436-20211128224436-00405.warc.gz
CC-MAIN-2021-49
774
13
https://arno-schots.medium.com/building-and-running-oracle-database-19-3-0-ee-docker-containers-8147b5a00a51
code
Building and running Oracle Database 19.3.0 EE Docker Containers This article is based on an older post written by Gerard Venzl, maintainer of the Oracle Database Docker build files. Original post dates from Nov 2017 and can be found here. Also the the documentation provided on Github is a good reference. I decided to replace one of my Oracle MySQL DB Docker instances with Oracle Database Enterprise Edition. This post will explain what I did and some things I encountered during the process. The software needs to run on my server which has a Docker environment available. My environment is as follows: - Oracle Linux 7.7 (4.14.35–1902.6.6.el7uek.x86_64) - Docker 19.03.5 (docker-ce-19.03.5–3.el7.x86_64) - Git 184.108.40.206 (220.127.116.11–21.el7_7.x86_64) The Oracle Database I want to containerize: - Oracle Database 19.3.0 Enterprise Edition Disk Space Requirements It is important to make sure that you have enough disk space for the build. In my case the build failed because I didn’t have the required space available. I needed to do some housekeeping and delete unused volumes, images and containers on my Docker host. The needed space at time of writing for Oracle Database 19.3.0 Enterprise Edition was 18GB, but I made sure I had 50GB of free space available, as even with 19GB I ran out of space. Getting the required files and binaries To be able to build the Oracle Database Docker images, you first need to clone the Docker build files from Github. Secondly, you need to download the DB binary files for the version of your choice. Cloning the Git repo The Docker build files are located at https://github.com/oracle/docker-images/ and after you browse to this location you will see the following: As you can see, apart from the Oracle Database, you can also find Docker build files for other Oracle products. We will clone the full repo by clicking on the green button in the top right corner (Clone or download): Click on the “copy icon” next to the URL. Next we have to decide on a location for the cloned files. Again a disk space recommendation. In my case I have two volumes on my server: - root volume (/) including the docker runtime environment - home volume (/home) On the first volume I freed up 50GB, but since we need to download and store the binary files for the Oracle DB as well, roughly 2.5GB, I decided to create a source folder in “/home/Oracle Docker Image Sources” to prevent storing more data on the root volume. Now cd into this directory and run: git clone https://github.com/oracle/docker-images.git You will see some output like this: Cloning into 'docker-images'... remote: Enumerating objects: 11757, done. remote: Total 11757 (delta 0), reused 0 (delta 0), pack-reused 11757 Receiving objects: 100% (11757/11757), 9.33 MiB | 4.27 MiB/s, done. Resolving deltas: 100% (6923/6923), done. And you will have a full copy of the Github repo on your local disk. Downloading the binary files In order to build the Docker image you need to download the binary files for the Oracle Database version of your choice. They can be obtained from Oracle Technology Network. NOTE: You will need an Oracle OTN account to be able to download the binary files. If you click the link you will be brought here: Since I want to containerize 19.3 I need to download the Linux x86–64 binaries ZIP file. Important: it must be the ZIP file, not an other format. You can do two things: - Download the file manually through your browser and copy the file to where you need it - Obtain the download link from our browser, after the download started (this will include the authentication header) and use wget to download the binaries directly onto the server where we will build the image: I did this in the Safari browser, I opened the downloads list through the button with the downward arrow icon and right-clicked on the file, this will give you a new menu with the “copy address” option. If you do this you can run a simple wget [paste address link you just copied] After sucesfull download the binary file (in ZIP format — do not uncompress) needs to be placed in the proper subdirectory of the Docker build files. In my case it needed to be moved into: /home/Oracle Docker Images Sources/docker-images/OracleDatabase/SingleInstance/dockerfiles/19.3.0 Ok, we have all the files we need. Let’s start the build. Building the image The Docker build files include a nice helper script to support the build. If you are an advanced user, you can directly run your own docker build command. The helper script is called “buildDockerImage.sh” and can be found in: /home/Oracle Docker Images Sources/docker-images/OracleDatabase/SingleInstance/dockerfiles/ If you run the command with the -h flag it will print out the usage instructions Usage: buildDockerImage.sh -v [version] [-e | -s | -x] [-i] [-o] [Docker build option] Builds a Docker Image for Oracle Database.Parameters: -v: version to build Choose one of: 18.104.22.168 22.214.171.124 126.96.36.199 18.3.0 18.4.0 19.3.0 -e: creates image based on 'Enterprise Edition' -s: creates image based on 'Standard Edition 2' -x: creates image based on 'Express Edition' -i: ignores the MD5 checksums -o: passes on Docker build option* select one edition only: -e, -s, or -xLICENSE UPL 1.0Copyright (c) 2014-2019 Oracle and/or its affiliates. All rights reserved. I used the following simple command to build the image (version 19.3.0 and Enterprise Edition) ./buildDockerImage.sh -v 19.3.0 -e If all goes well the build should complete succesfully. You can check if you have the image available with and you should see something like this a freshly created image! Operating the container Ok you have made it this far. Good. But the purpose was not to build an image, but actually create a running container from the image that we can use. We want to run/create, stop and (re)start the container. The first step is creating the container and in the process it will run the container as well. We will use the “docker run” command for this step. The documentation in from the repo is pretty good. The following is coming directly from the documentation: docker run --name <container name> \ -p <host port>:1521 -p <host port>:5500 \ -e ORACLE_SID=<your SID> \ -e ORACLE_PDB=<your PDB name> \ -e ORACLE_PWD=<your database passwords> \ -e ORACLE_CHARACTERSET=<your character set> \ -v [<host mount point>:]/opt/oracle/oradata \ --name: The name of the container (default: auto generated) -p: The port mapping of the host port to the container port. Two ports are exposed: 1521 (Oracle Listener), 5500 (OEM Express) -e ORACLE_SID: The Oracle Database SID that should be used (default: ORCLCDB) -e ORACLE_PDB: The Oracle Database PDB name that should be used (default: ORCLPDB1) -e ORACLE_PWD: The Oracle Database SYS, SYSTEM and PDB_ADMIN password (default: auto generated) The character set to use when creating the database (default: AL32UTF8) The data volume to use for the database. Has to be writable by the Unix "oracle" (uid: 54321) user inside the container! If omitted the database will not be persisted over container recreation. -v /opt/oracle/scripts/startup | /docker-entrypoint-initdb.d/startup Optional: A volume with custom scripts to be run after database startup. For further details see the "Running scripts after setup and on startup" section below. -v /opt/oracle/scripts/setup | /docker-entrypoint-initdb.d/setup Optional: A volume with custom scripts to be run after database setup. For further details see the "Running scripts after setup and on startup" section below. I decided to run it with default settings as much as possible, but if you want you can change parameters. docker run --name oracledb19 -p 1521:1521 -p 5500:5500 \ -v oradata:/opt/oracle/oradata \ With this command I gave the container a name (oracledb19), I mapped ports on the Docker server to the container exposed ports (1521 and 5500), I created a persistent volume for data that needs to be saved between container/hosts restarts and lastly I point to the freshly created image (oracle/database:19.3.0-ee) to be used for the creation of the container. The first time the container starts, there will be a lot initialisation, so it takes some time to have the container operational. As I used the default settings, a password is automatically generated. Look for the following on the console output to know what is the initial password: ORACLE PASSWORD FOR SYS, SYSTEM AND PDBADMIN: 3y4RL1K7org=1password Of course you should change it and luckily the container provides a nice tool to do this. However, you need to run the command inside the container. You can use the docker “exec” switch to accomplish just this: docker exec oracledb19 ./setPassword.sh ChangedPassword Again the original post from Gerard provides some useful insights. If you are familiar with Docker you would probably run docker stop oracledb19 like me. Yes, that is the normal way to stop a container. However, if you have a large database, it could actually take some time to stop the database itself gracefully. So if the container stops before this process has finished, we could have some issues. You can tell Docker to wait some time before killing the container. Use the -t switch and the number of seconds Docker should wait. Let us chose 30 seconds: docker stop -t 30 oracledb19 If you have stopped the container and not have deleted it, it takes as simple docker start oracledb19 to bring it up again. You can do a docker container ls to check the startup status. You will see an “UP” status when the container is ready to be used. Connecting to the container Now that the container is up and running you connect through the various standard ways of connecting, for example by using sqlplus or Oracle SQL Developer. You will be using port 1521 that we exposed to the outside world and the other default values like Database SID (ORCLCDB). In a webbrowser you can go to https://yourhost:5500. Note: make sure to use HTTPS. This will give you access to Oracle Enterprise Manager DB Express, which is included in the container: After logging in, use SYS and your password, you get the performance hub dashboard for your database That’s it for this post, please leave some feedback if you want.
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296945183.40/warc/CC-MAIN-20230323194025-20230323224025-00656.warc.gz
CC-MAIN-2023-14
10,272
111
https://finalgirlsupportgroup.wordpress.com/2011/06/22/dvd-releases-june-21-2011/
code
Good morning! Yesterday was DVD day again. This post is tardy, but late is better than never. So, what’s out? My Recommendation this week: ‘Haunted’ is a compelling story, set in the misty mountains of Dalhousie that revolves around Glen Manor, a sprawling mansion with a secret past and a haunted present. The protagonist Rehan visits Glen Manor to complete a transaction, involving its sale that his father had initiated and which is now under a cloud due to certain mysterious incidents. What he does not bargain for is that while he is trying to do so he discovers a Secret and falls in love with it. What he does not bargain for is that the Secret catapults him to the biggest challenge and question of his life. The recommendation this week was a tough one, but I had to go for India’s first stereoscopic 3D feature! (Not a fan of the push for 3D, but this is an impressive first all the same.) Vikram Bhatt, on the heels of a successful horror trilogy (Raaz, 1920, Shaapit), tackles the genre again with his spooky ghost story, Haunted 3D. I haven’t seen Bhatt’s work… or any Indian horror at all I’m sad to admit. Even though the trailer looks a little silly, I’m looking forward to checking it out. Critical reception in India was mixed. http://www.haunted3dfilm.com More DVD titles released today: Not one, but TWO furry costume slashers this week. Upsetting. Six classmates receive an e-mail from Asuka, who they thought had committed suicide, asking them to meet up later that night. But when a person wearing a bloody rat mask surprises them and begins a ferocious attack, the students realize that someone is out for revenge! Trailer on the Media Blasters Youtube channel Bunnyman is the story of a group of friends on their way back from a spontaneous weekend trip to Las Vegas, and while driving through the remote regions of southern California they suddenly find themselves in a sickening game of cat and mouse with a five ton dumptruck and, when looking for help, stumble upon a nightmarish family who takes pleasure in dismembering and eating as many of the kids as possible.” The title killer, described as having been severely abused as a child, is now an adult with manifestations of intense rage and child-like taunting behavior. He dresses in a bunny suit as something of a security blanket for his fragile psyche. Official Facebook Page Mega Python vs. Gatoroid We enjoyed the other films in this ridiculous SyFy series, but I cannot recommend Mega Python vs. Gatoroid with a clear conscience. Unless you want to be shot in the face with cheesy 80s nostalgia when you COULD be seeing monsters, avoid it. It’s just grueling to sit through. It’s a battle of the beasts from the director of Pet Sematary that’ll rock your world when two titanic terrors face off along with a pair of ‘80s pop icons! After doctor and activist Nikki Riley (Debbie Gibson) accidentally unleashes a python into the Everglades, rival doctor Terry O’Hara (Tiffany) is tasked with finding an expert reptile hunter—and when her boyfriend dies in the process, she resorts to extreme measures to create genetically enlarged gators to stop the slithering menace. Soon the swamp is a huge, scaly battleground between colossal gators and pythons — with a charity ball of potential human snacks in their path! Don’t miss this mammoth spectacle of teen queens and man-eating monsters in a gargantuan duel to the death! http://www.theasylum.cc/product.php?id=184 A Young couple gets their dream house with the help of a friend that becomes a boarder. Their friend then brings home BLAIR… a stunning temptress that decides she likes what the couple has and never wants to leave. So Blair turns ther friends against each other and exploits her seductive talents on the husband in efforts to become the new woman of the house… if you’re a fan of Obsessed, Hand that Rocks the Cradle, and Roommate type movies this is good one for this genre…. http://playinghousemovie.net/ Eager for one final vacation before their lives change forever, six friends embark upon a camping trip to a remote mountainous area. By nightfall, their lives WILL change forever…in ways too horrific to imagine. For in the shadows awaits a pack of the most evil, vicious rejects of humanity, addicted to violence and thirsty for blood! This is Psycho Holocaust… IMDB Page
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917121305.61/warc/CC-MAIN-20170423031201-00111-ip-10-145-167-34.ec2.internal.warc.gz
CC-MAIN-2017-17
4,379
13
https://docs.citrix.com/en-us/xencenter/6-5/xs-xc-vms/xs-xc-vms-new/xs-xc-vms-new-homeserver.html
code
A home server is the server which will provide the resources for a VM in a pool. When you nominate a home server for a VM, XenServer will always attempt to start up the VM on that server if it can; if this is not possible, then an alternate server within the same pool will be selected automatically. If you are creating a BIOS-customized VM, the OEM server from which you copy the BIOS strings will automatically be selected as the home server for the new VM. You can change the home server configuration for a VM from the VM's Properties dialog box; see Change VM properties. Workload Balancing (WLB) considerations In pools with Workload Balancing (WLB) enabled, the nominated home server will not be used for starting, restarting, resuming, or migrating the VM. Instead, WLB nominates the best server for the VM by analyzing XenServer resource pool metrics and recommending optimizations.
s3://commoncrawl/crawl-data/CC-MAIN-2018-34/segments/1534221211933.43/warc/CC-MAIN-20180817065045-20180817085045-00233.warc.gz
CC-MAIN-2018-34
892
5
https://forums.positech.co.uk/t/how-do-accuracy-numbers-work-for-weapons/6457
code
I see that the accuracy numbers for weapons range from 0.55 up to 1.80, and that’s not mapping to any sensible scheme in my brain. Is a weapon with 1.10 accuracy twice as accurate as one with 0.55? Meaning it will hit the same target twice as many times in the same number of shots? Given some reasonable scenario (Target is stationary, within range, etc.) how often will a weapon with 1.00 accuracy hit? Also, do things like target size and movement speed affect accuracy, or is it simply a fixed difficulty to hit a target?
s3://commoncrawl/crawl-data/CC-MAIN-2019-09/segments/1550247481249.5/warc/CC-MAIN-20190216230700-20190217012700-00285.warc.gz
CC-MAIN-2019-09
527
3
http://bestnetguru.com/win8.1/shutting_down.html
code
Please Note: All navigational tools are on the top and bottom of the page. The 'Next' link is at the end of discussion of each page. Here are my other computer tutorials sites: Back to Bestnetguru.com You have started your new Windows 8.1 computer. Now how are going to shut it down? I faced this problem myself. So I am going to tell you right now in the early part of these tutorials how to shut down a computer running Windows 8.1. It is a bit tricky and not very apparent. Here is how: Hold your mouse pointer in the upper or lower right corner of any screen to bring out the Charms Bar and click on Settings. In the Settings menu, click on Power. Please see screenshot below. That will bring up a sub-menu giving three options: Sleep, Shut down, and Restart. Click on Shut down to shutdown Windows. Please see screenshot below. Use the same method to Restart your computer. The easiest way to put your computer to Sleep, is just hit the crescent moon key on your Windows 8 keyboard. To wake it, press the crescent moon key again. Home | Decision to upgrade | Buyiny new computer | Transferring data | Re-installing programs | Disposing off old computer | How to use DBAN | Setting up the new computer | Look & feel of Windows 8.1 | Setting up auto maintenance | Shutting down/Restarting | Links | Start screen | Charm bar | Windows store | Creating recovery drive | File Explorer | All Rights Reserved
s3://commoncrawl/crawl-data/CC-MAIN-2018-26/segments/1529267864139.22/warc/CC-MAIN-20180621094633-20180621114633-00423.warc.gz
CC-MAIN-2018-26
1,406
11
http://azure.microsoft.com/en-us/pricing/details/visual-studio-online/
code
Use Visual Studio Online to host code, plan and track projects, and collaborate with team members to ship better software. Visual Studio Online provides an end-to-end, cloud-based ALM solution that handles everything from hosted code repos and issue tracking to load testing and automated builds. It integrates with major IDEs, and best of all, you can access it from just about anywhere. Within a Visual Studio Online account, you simply pay for user plans for the users who join your account and for resources that are shared amongst all users on the account. The first five users with the Basic plan and all eligible MSDN subscribers (Visual Studio Professional with MSDN or higher) can join your account at no charge. This applies to purchased MSDN subscriptions as well as those offered as a benefit in the BizSpark program and to partners with a competency in the Microsoft Partner Network. Learn more about Visual Studio with MSDN. Shared resources are billed based on your actual usage if you elect to enable paid usage on your account. Otherwise you can use up to the free amount of service included per month. Pick the right user plan for each of your team members based on their needs. There are three user plans offered directly as part of Visual Studio Online, highlighted below. In addition, MSDN subscribers have access to Visual Studio Online at no additional charge as an MSDN subscription benefit. MSDN subscriptions are purchased separately from Azure services. - Visual Studio Online Basic - Includes access to code repositories, planning and tracking tools, team collaboration capabilities, and the Visual Studio Express development environment. The first five users per account with the Basic plan are free. - Visual Studio Online Professional - Includes all of the capabilities available in the Basic plan, plus it also includes use of the Visual Studio Professional development environment. Up to 10 users with the Visual Studio Online Professional plan may be purchased on an account. - Visual Studio Online Advanced - Includes all of the capabilities available in the Basic plan, as well as advanced team collaboration, project planning and tracking tools, and stakeholder feedback requests. To share the status of your development projects with business sponsors, external customers, or non-development team members, or provide them a way to suggest new features or comment on planned work, invite them to your project as a stakeholder. - View team and team project dashboards - View backlogs, Kanban, and task boards - Create and edit work items, as well as work item queries Stakeholders are free, and you can add as many of them to your account as you want. Shared Resources (per Visual Studio Online account) A Visual Studio Online account includes resources that are shared across all users and projects on that account. - Build - Build definitions can be created using Visual Studio and can be run on Visual Studio Online. Builds can be configured to run on demand, at a specified interval, or for continuous integration (CI). Build is charged per minute for the actual amount of computing time it takes to build the project. - Load Testing - Create load tests in Visual Studio Ultimate 2013 (or later) and run them on Visual Studio Online. Load tests are measured and billed in virtual user minutes: the number of virtual users times the number of minutes that you configure for the load test run. Important: The price in R$ is merely a reference; this is an int'l transaction and the final price is subject to exchange rates and the inclusion of IOF taxes and an eNF will not be issued. The Visual Studio Online Basic, Professional, and Advanced user plans as well as the shared resources for Visual Studio Online are purchased via Azure, but MSDN subscriptions are purchased separately. | ||Basic ||Professional ||Advanced | |Maximum users per account ||Unlimited ||10 ||Unlimited | |Price || Free for the first 5 users $20 /month for additional users || $45/mo || $60/mo | Users with the following MSDN subscriptions can be added at no charge to the account. The maximum MSDN subscribers per account is unlimited across each of these MSDN subscription levels. - Visual Studio Professional with MSDN - Visual Studio Test Professional with MSDN - MSDN Platforms - Visual Studio Premium with MSDN - Visual Studio Ultimate with MSDN Compare user plan features | ||Build ||Load Testing | |Free Amount (per Visual Studio Online account) || 60 minutes / month || 15,000 virtual user minutes / month | |Price || $0.05 / minute || $0.002 / virtual user minute |
s3://commoncrawl/crawl-data/CC-MAIN-2014-52/segments/1418802770403.126/warc/CC-MAIN-20141217075250-00065-ip-10-231-17-201.ec2.internal.warc.gz
CC-MAIN-2014-52
4,589
31
https://forums.tumult.com/t/control-a-timeline-in-the-parent-of-a-widget/16480
code
Thanks to this forum and the extremely helpful people around here I’m able to swap and control a widget from outside that widget. If you look at the attached sample and open the ‘control_parent_through_iframe_widget_01.html’ file in a browser you can see just that. control_parent.zip (1.0 MB) Button 1 and 2 load one of the included “test.html” files. And with a second click the timeline inside those “test” files (loaded widget) reactivates so they nicely fade out and the user can choose a new button to click without having a “pats-boom” transition. The third button shows my problem. I need to remove the button bar that controls the widgets to get a full view of this particular widget scene, but would like to have the button bar reappear after the user clicks a button in the widget. Is there something similar on these forums that helps me figure out how to control the ‘parent’ from within the childs iFrame? I looked but it’s, as far as I can see the other way around .
s3://commoncrawl/crawl-data/CC-MAIN-2019-35/segments/1566027313617.6/warc/CC-MAIN-20190818042813-20190818064813-00201.warc.gz
CC-MAIN-2019-35
1,005
6
https://www.zillman.us/ontology-metadata-vocabulary-omv-2/
code
Ontology Metadata Vocabulary (OMV) Ontologies have seen quite an enormous development and application in many domains within the last years, especially in the context of the next web generation, the Semantic Web. Besides the work of countless researchers across the world, industry starts developing ontologies to support their daily operative business. Currently, most ontologies exist in pure form without any additional information, e.g. authorship information, such as provided by Dublin Core for text documents. This burden makes it difficult for academia and industry e.g. to identify, find and apply – basically meaning to reuse – ontologies effectively and efficiently. Our contribution consists of a proposal for a metadata standard, so called Ontology Metadata Vocabulary OMV. This has been added to the semantic web research section of Deep Web Research Subject Tracer™ Information Blog.
s3://commoncrawl/crawl-data/CC-MAIN-2019-47/segments/1573496668594.81/warc/CC-MAIN-20191115065903-20191115093903-00018.warc.gz
CC-MAIN-2019-47
904
2
http://trerust.xyz/archives/8725
code
Jamnovel – Chapter 1299 A Swift Attack doctor idea to you-p3 concerning the spiritual in art audiobook Novel–Release that Witch–Release that Witch Chapter 1299 A Swift Attack home plucky winter’s end book All the coach aircrafts ended up growing outside in a collection after the runway, as well as the 30 formal students were hearing Princess Tilly’s directions. A bit farther on, college students who acquired not pa.s.sed the test or people that got recently joined up with they were relaxing near the runway, waiting around to look at the next spherical of free trial routes. The 2 main adult men thus went approximately the biplane and boarded for the related plane. Yet another flurry of whispers swept within the herd. All of the mentor aircrafts have been spreading in a series after the runway, as well as the 30 standard students were hearing Princess Tilly’s guidelines. A bit farther on, students who acquired not pa.s.sed the test or people who acquired recently joined up with the group ended up seated nearby the runway, hanging around to view our next spherical of trial offer flight tickets. “All obvious. OK to have away from!” the floor staff members saluted. “Did you observe that?” Finkin explained while he drew shut. “I’ll make your judgement correctly,” Tilly stated and brought in two women. “They’re my unique attendees. They’ll view your every switch, so don’t you feel you could potentially cheat.” “As well as obligation!” Hinds shouted. “I shared with Princess Tilly long ago that we should mail these folks into the army and tame them first.” Finkin investigated his fist in disbelief finally conceded gruffly, “I’ll permit you to travel this time. We’ll have a great deal of prospects on the training.” Finkin erected himself and reported, “Self-discipline, Your Highness, I discovered the value of discipline!” “Obviously it’s unloaded,” Tilly said while trembling her brain. “Essentially there’s no firearm… One installed on the aeroplane is simply type, and that means you don’t be concerned that you’ll photograph your schoolmates when you finally move the bring about.” Each men thus went up to the biplane and boarded on the corresponding aircraft. A different flurry of whispers swept over the audience. “From right now onwards, your education will enter a completely new cycle!” Tilly proclaimed as she paced forwards and backwards in front of the students who were a lot bigger than her. “Now, tell me what you’ve mastered within the last 30 days! Commence from Patter!” “Would you discover that?” Finkin claimed when he drew shut down. Decent brought up his left arm and delivered a perfect salute. “Airplane No. 2, go!” “What nonsense he’s speaking about?” Very good exclaimed. Princess Tilly did not separate the group randomly. The earliest three squads have been all const.i.tuted of civilians while other three were definitely made up of pupils coming from the First Army. some naval yarns nyt crossword “You can do it!” Hinds claimed since he eyed them in a pretty ostensible fashion about the runway. He was not outlined, so naturally he hoped them all the best !. “Lifting, Your Highness!” the scholars referred to as Patter replied in excitement. “What nonsense he’s discussing?” Evidently, Princess Tilly planned to know who was far better! “Your, Your Highness!” each student yelled while elevating his palm. Finkin viewed his fist in disbelief lastly conceded gruffly, “I’ll enable you to take flight this period. We’ll have a lot of opportunities from the instruction.” “Furthermore, it’s considerably more tricky to take in the air than on a lawn. Getting the aim doesn’t necessarily mean you’ll reach the marked. Regardless of bullets, you’ll probably miss out on the goal,” Tilly mentioned while shrugging. “Every other inquiries?” “And as well task!” Hinds shouted. “Adequately. Now, I’m about to divide the group.” “Furthermore, it’s significantly more challenging to shoot from the fresh air than on the floor. Getting the plan doesn’t really mean you’ll reach the goal. Despite bullets, you’ll most likely overlook the goal,” Tilly explained while shrugging. “Another questions?” their wedding journey Surprisingly, Princess Tilly got already drafted an inventory upfront. Decent and Finkin had been about the same team. Their range was two. The Bibliotaph, and Other People “Rock and roll, scissors, pieces of paper!” “That’s great,” Finkin reported while he rubbed his sinuses. “I’ve possessed enough with these. Due to the fact we’re aerial knights, let’s combat it all out during the fresh air!” “I told Princess Tilly in the past that individuals should deliver they to the army and tame them initially.” Yet another flurry of whispers swept on the audience. Great clenched his fists. They stared each and every other for a significant while just before Finkin stated resignedly,” Fine. Perform the existing way.” The 2 men thus went as much as the biplane and boarded to your related jet. mahomet founder of islam crossword Nevertheless they still crashed loads of aircraft every day.
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337731.82/warc/CC-MAIN-20221006061224-20221006091224-00470.warc.gz
CC-MAIN-2022-40
5,246
47
https://www.xml.com/pub/a/2001/05/16/wrestle.html
code
XML Technologies: A Success Story May 16, 2001 We've all heard stories of how new XML technologies have helped build immense corporate databases and complex, dynamic web sites. Well, this isn't one of those stories. This story is about how the Apache Software Foundation's XML tools helped improve this year's California Central Coast Section High School wrestling tournament. I've been using a computer to do the scorekeeping for the CCS wrestling tournament for the past ten years. The program, written in C for DOS, displays the bracket on the screen. As you enter results of matches, the winners are automatically advanced and the losers automatically dropped to the consolation bracket or out of the tournament. The program prints bracket sheets to an inkjet printer. A portion of the output is shown in the image at the right. A dot matrix printer produces mailing labels with the results of the matches. These labels are affixed to large wall charts. Other labels containing the information for upcoming matches are affixed to pre-printed bout sheets such as the one you see at the right. Up until about 1998, the wall charts and bout sheets were designed for a label size of 2.5 inches by 15/16 inches. These labels have to be ordered in advance, and are hideously expensive, as they are a non-standard size. Recently, the wall charts were redesigned to permit the standard 3.5 inches by 15/16 inches, but the bout sheets weren't. Fate intervened when the CCS Events Coordinator asked me to send him a blank bout sheet to copy. This was my opportunity to create a new bout sheet template that would let me use the larger labels. Since I'm using Linux and the CCS uses Windows, I needed a cross-platform solution. Adobe PDF format was the answer, and this is where Scalable Vector Graphics (SVG) and Formatting Objects to PDF (FOP) enter the story. Creating the Bout Sheet The bout sheet is not a typical text document; it's mostly a set of lines, empty boxes and a circle with minimal text labeling. Thus, I decided to use Scalable Vector Graphics (SVG) to describe the form, and use FOP as a wrapper to produce the desired PDF output. I took a ruler and an old bout sheet, redrew the lines, and measured the widths and locations of the boxes and text, and created the formatting objects XML file by hand. You may download the FO file and the resulting PDF file. The advantages from the new bout sheet were small but significant. I was able to use cheaper labels, and they didn't overlap the area where the scorekeepers write the match statistics. This meant that the results were easier to read. But the real payoff from XML technologies came near the end of the tournament. Printing the Results A few years ago, I added code to the scorekeeping program to output the brackets as a Rich Text Format (RTF) file. The file didn't describe the bracket completely; once you loaded it into a word processor you had to set the font to a small size so that the contents would fit on the page width, and you had to use a monospace font since the RTF mirrored the screen display and bracket print code, which was also monospaced. It worked, but it was ugly. I thought that it would be nicer to use a proportional font with true underlining and vertical rules, but I didn't know RTF well enough to achieve this effect. However, I had been learning about XSL Formatting Objects (XSL FO), and, at the beginning of the second day of the tournament, I realized that formatting objects, in conjunction with FOP, would do exactly what I wanted. Data to XML The first problem was converting the match data, stored in binary data files, to XML. Luckily, there's a three-hour break between the end of the consolation matches and the finals. I used part of this time to write a Perl script that would produce an XML file from by reading the files that describe the bracket and match results. I didn't want to go directly to formatting objects; doing that would only complicate the Perl script. I decided to create a simple ad-hoc XML notation that would be nearly a one-to-one correspondence to the data file structure. The result looked like this: <line num="1"> <cell num="0" short="yes"></cell> <cell num="1" underline="yes">Chris Jaworski</cell> </line> <line num="2"> <cell num="0" short="yes">Bout 1</cell> <cell num="1" vbar="yes">(St. Francis)</cell> <cell num="2" underline="yes">Chris Jaworski</cell> <cell num="5" text="yes">CCS Championships</cell> </line> I associated a num attribute with each line and cell; this permitted me to skip empty cells. XML to XSL FO I could now use XSL Transformation (XSLT) to convert the ad hoc XML to XSL FO. The to make each cell of the bracket into a <fo:block> inside an <fo:block-container>. By turning on the bottom and right borders of each block-container, I could construct the underlines and vertical the bracket. You may download the XSL file that does the conversion. I used Xalan to do the transformation and FOP (0.16.0) to convert the formatting objects to PDF. If this were a press release, I'd rhapsodize about how successful the whole process was and that would be the end of this article. That would not, however, be the entire story -- a little “post-game analysis” is in order. The construction of the bout sheet, in fact, was entirely straightforward. I had to correct some minor errors, and I had to convert some of the units to points and do some minor adjustment to get the text right where I wanted it, but the SVG and FO themselves worked perfectly. Converting the data files to XML was not a big problem; the biggest annoyance was having to look at code I had written years ago to figure out the internal data structure of the bracket. Writing the XSLT file to convert to XSL FO was a bit more problematic and required quite a bit of experimentation. I encountered some problems during this process: - After a failed attempt to place a <fo:block break="page-after">around a <fo:block-container>, I tried putting the <fo:block-container>element. However, block containers are not part of the text flow, so that doesn't work either. That's why the template for pagehas an added <fo:block break-after="page">to force a new page to occur. - The names were too close to the vertical bars; I fixed it by adding a start-indentto each cell. - The names were too far above the underlines. I tried to use the alignment-adjustattribute, but it wasn't implemented in FOP 0.16.0. The vertical-alignattribute didn't do the trick either, so I ended up adding a start-beforeto move the text closer to the line. - The title at the upper right of the bracket was longer than the cell width, it word-wrapped, only the first word showed up. That's why I had to add the So after all that work and trouble, was it worth it? Yes. It took me less time to produce the bout sheet with SVG than it would have taken to find a Windows machine, learn to use a drawing program, and produce a file that would have been in a proprietary format. The bracket printout was also worthwhile, mostly as a learning exercise and also as a proof of concept. The PDF output also looks better than the RTF. Again, there was a time savings; it was easier for me to learn the syntax for formatting objects than it would have been for me to learn the RTF to produce an equally good-looking result in that format. Finally, the fact that I was able to accomplish all of these tasks with open source software is the icing on the cake.
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506329.15/warc/CC-MAIN-20230922034112-20230922064112-00821.warc.gz
CC-MAIN-2023-40
7,449
49
https://accu.org/journals/overload/16/88/parkin_1522/
code
If your last project wasn't successful, you're not alone... Apparently most software projects fail [ Standish ]. A scarily high statistic, but how do you decide if a project has indeed failed? What do 'fail' and 'succeed' mean? At the most simplistic, a successful project has achieved its goals and a failing project hasn't to a greater or lesser degree. (Of course, if it doesn't have any goals then it's very hard to decide whether or not it has succeeded, but a project with no goals isn't very interesting.) So lets expand the concept of 'goals' a bit, and see how not meeting them causes failures. The most general goal is 'deliver enough value to have been worth it'. This is still pretty vague, but it does start to produce some insights: the first thing is to deliver - a project is an obvious failure if it has never been finished, but it also won't have delivered if no one uses it, either because no users exist, or they've got it but don't use it (this latter is a bit more subtle if you sell your software - you might have got the money for the first sale, but you're unlikely to get repeat sales if the users aren't happy.) But what of a project that is still being written? It's not yet delivering any value, so it cannot be thought of as successful or not, just 'in progress'. This is one of the problems of those over-long projects that go on for years - until the first user starts getting some value out of it, the project is just pure cost. This is one reason why early delivery of incomplete systems is such a good idea - apart from getting feedback on what you have done as soon as possible so you can adjust your future plans, the system can start earning its keep while you implement the next stage. But what is this vague sounding word 'value'? Well, it is a measure of what is important to the person paying for the work. This could be the obvious monetary measure, but could just as easily be measured in improved performance, or just making the user's life a bit easier and making them happier with the system. But delivering a small amount of value at a large cost isn't a good trade-off, so there must be a minimum level to have made the effort worthwhile. To do that we must compare the value gained to the cost of achieving that gain. That cost can comprise several aspects - again there's the obvious monetary cost of computers, tools and people's wages. A more subtle cost is the 'opportunity cost' - while you were implementing feature X, you have given up the opportunity to do feature Y instead. This gets really noticeable when you take the huge decision to scrap an existing system and reimplement - all the time and effort taken to redo it could have been spent enhancing the existing system with completely new features, or improving the performance and reliability. And starting from an existing system will generally mean you've an already stable, working codebase, which makes incremental improvements and delivery easier and more predictable. "I didn't fail the test, I just found 100 ways to do it wrong" - Benjamin Franklin So in what ways could a project fail? Remember, though, that failing is not an all-or-nothing idea, it just means that in some way it fell short of success, perhaps by only a little. A good starting point would be to consider the three classic aspects you try to manage: Features, Quality and Time. Failing on features reduces the utility of what is delivered, and thus reduces the amount of value delivered. In project management, when something has to give, this is often the compromise of choice, especially if you make sure the vital features are done first and then you can drop the Nice-To-Haves and optional extras if things look tight. There's a more insidious way to fail on features though - doing the wrong ones. Creating features that few or no people use is a waste of time, effort and opportunity. This is why it is vital to get a really good idea of what users actually need and their relative importance. Other problems are implementing features that you think might be useful, but no one really knows for sure. This is pretty common when you're creating something brand new, as you are having to predict based on very little evidence or experience. Failing on the level of quality can have serious effects - buggy code can be an irritant that slows users down (so they get less value), really bad bugs can prevent the system working at all, and could even cause so much pain and effort to get to work that the net effect is negative over previous systems. Some software can be so critical that failures can cause fatalities. Failing on time, in the form of not delivering by the promised date, is depressingly common in our industry, and I suspect accounts for most projects counted as failures. In the worst case, the project is cancelled outright, 50% to 100% overrun is not uncommon in my experience, but even delivering slightly late can have serious effects on a business, from loss of time to spend on other opportunities reducing the business' competitiveness, to contract penalty clauses, and ultimately going under because a competitor got their software out sooner. As an aside, I suspect this effect can cause poor software to be common. Consider a market with two competitors. Company A takes six months and releases a limited and buggy product. Company B tries to do the 'right thing', and takes a year to ship a full featured, robust product. But product A has already been shipping for six months and has dominated the market, so product B sells poorly, and the company goes under. A sting in the tail is that there's no longer as large an incentive for Company A to further improve their product. But it seems that being late is often not that serious an issue - many projects deliver late but are otherwise successes. As long as the company hasn't suffered majorly in the meantime - perhaps a previous version of the system is still selling well enough - then such delays can be absorbed. So, what causes these failures? Doing the wrong features can stem from poorly understanding the target market and its needs. And don't confuse what the user says they want with what they actually need - quite often a feature request is someone's idea of how they think a problem can be solved, and there can be a better solution if you can find out what is the real underlying problem. Another cause is a form of Priority Inflation - a suggestion that something might be considered is included as a Nice-To-Have, which mysteriously becomes a Priority and is then translated into a Show-Stopper. These sorts of misunderstandings could be caused by the marketing department not functioning well, having a brand new and unknown market where the customers don't even know what would work, or the developers not understanding what is needed - a lot of these are communication problems. A hard issue to address is the natural tendency for developers to want to do something cool and new - it might well be interesting to rewrite everything in a brand new language, but can it really be justified that it is the best thing to do? Worst of all if the people suggesting such a move have the power to push it though - the hardest customer to say no to is your manager or architect who has a pet feature they want to do. Poor quality has a myriad of causes, but the most pernicious is for the development system as a whole to not have a solid commitment to it. Even if individuals and teams want to do the right thing, it's very easy for corners to be cut especially in the face of an important deadline, or a customer offering a big order. In a sense the way that software is comparatively easy to change is a cause of this problem - quality can quickly be compromised because of a last minute 'can we just get this change in? It's a little one I promise!' Even in the best teams with the best of intentions, it's all too easy to put something in late in the development cycle with not enough time to verify that your (no doubt carefully considered) reasoning was in fact accurate and it is a safe change. Here I find Agile methods can cause problems - if your release cycle is very short then there is never enough time to flush out any subtle problems, so there's a pressure not to do anything unless it's trivial and important issues get postponed. Being late is easy. All you have to do is promise too much and underestimate the time it takes to implement - and politically that might be done to 'sell' the project, deliberately or unconsciously. The real killer factor here is the interrelationships: the simple estimation technique I suggested last issue works well for small isolated tasks, and also extends well to combine strings of subtasks into a bigger estimate. But one thing it is easy to miss are the interactions between tasks and existing systems. If you do one thing in isolation, you have one estimate. Do two things and you have two estimates, plus one interaction that may generate a third small task to fix. Do three things, and you've three estimates, plus three interactions. And so on until the interactions dominate and you can't get anything done. This effect is why I think principles such as 'Separation Of Concerns', and 'Program to an Interface not an Implementation' work - they cause you to organise your design such that the interactions are reduced to a manageable level and things are isolated enough to get a grip on. In a similar manner, incremental implementation and delivery avoids biting off more than you can chew, and can let systems settle down, stabilise, and unforeseen problems fixed, before doing the next round. But for all those 'failures', it is surprising just how many projects deliver something worthwhile, and are fantastic opportunities from which to learn lessons that can be applied to the next project. As Ralph Waldo Emerson put it, 'Our greatest glory is not in never failing, but in rising up every time we fail.' While writing my last editorial I noted how things were going a little odd in the financial world, and how hopefully things would have settled down and the consequences had become clearer by the time you read it. Well, another editorial and things have got worse, with the outlook rather bleak for the next year or two (if we're lucky.) The big difference now is that this is no longer just a financial crisis, and everyday companies and people are now being affected. Otherwise healthy companies are deferring major investments in new projects, or cancelling until things become more stable; similarly with spending decisions - only buy when absolutely necessary, and so products aren't selling as well as forecast. All those nice optimistic sales forecasts are now out of date overnight, and no one has a clue what's going to happen next, and so companies understandably have to re-plan for an uncertain future. But the personal cost of this can be great, as excellent people find themselves without a job. Having been made redundant myself in the wake of the dotcom bubble, I know how difficult it can be to know where to start sorting things out, but also how much the ACCU can be of help - just being a member looks good on a CV (and writing articles and giving talks even better!) and the networking aspects such as accu-contacts and the local meetings can really help to get the ideas and contacts that lead to that next job (and did you know there are also informal Facebook and LinkedIn groups?). Le C++ nouveau est arrivé! And to finish, some good news. Towards the end of September, the C++ committee met up and a major milestone happened: the draft of the new C++ standard [ WG21 ] was published for an international ballot. This is essentially the feature-complete release, sent out to the beta testers (ie the national bodies) ready for some bugfixing. The first review is now happening, a second will happen next year and then the standard will be ratified - the intention is for it to happen towards the end of 2009, so it will indeed be C++09. Several compilers are already implementing parts - GCC has various features as options, patches and branches [ GCC ], Microsoft's early preview of Visual Studio 10 [ Microsoft ] has some too, and Codegear [ CodeGear ] are also working hard at the new features. Time to get experimenting! [ Standish] http://www.standishgroup.com/ produce a series of CHAOS reports into software projects. Their results fairly consistently report around 70-80% of projects fail or are challenged.
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296816070.70/warc/CC-MAIN-20240412194614-20240412224614-00419.warc.gz
CC-MAIN-2024-18
12,502
26
https://www.allassignmenthelp.com/au/do-my-assignment.html
code
- Do my assignment Australia - Why do students need online assignment help? - Do you want to pay someone to do my assignment for me? Pick our professional writers in Australia - Ask us to “do my assignment in Australia” for any subject - Why to take online assignment help from allassignmenthelp.com is a brilliant idea? - Get our assignment help Australia for different universities Do my assignment Australia All too often, student’s life revolves around the dilemma of preparing multiple assignments at once during the academics. And most often question they ask themselves is that “how will I do my assignment”? It has become the most bothering question for the students because their entire academic career relies on producing good results and clearing their examinations. There is nothing troublesome in asking for help when you actually need it. If you feel that a certain task is beyond your capabilities, let our assignment helpers help you. In order to receive the assignment writing help, you just need to say do my assignment online. AllAssignmentHelp.com has the right skills and talent to provide you academic assistance. We have everything you may look for while searching for an online assignment helper. With our immense hard work, we have gained our current reputation and trust among students in Australia. Today, students count us among one of the most remarkable supporting sites available on the web. We are proud to say that we have no records of dissatisfaction of clients on the ground of late deliveries, flawed content, or copied assignments. You can rely on our team without thinking twice. We will provide you with the best quality assignments for any subject or topic. Moreover, if you look for assignment help on an urgent basis we also provide instant assignment help for you as well. Why do students need online assignment help? College life is not always about having fun you have to put a lot of effort into academics to gain good grades. Every student faces different types of issues when it comes to writing assignments. Though some students overcome this complex situation and many get stuck and often think about who will do my assignment online? - There are assignments, regular lectures, and whatnot. To cope up with all such activities students have to invest time and focus. However, it is not possible to make each and every assignment with perfection. - One of the main reasons behind this is students may lack time. At times, it is not an easy task to make an assignment after a long day. - Other than this, when the topic is not easy to work with, students need help. Be it any reason, if you think that you cannot complete an academic task on your own, visit us. At AllAssignmentHelp.com we offer assignment help Australia online to students in Australia. You can get our services too. Do you want to pay someone to do my assignment for me? Pick our professional writers in Australia Assignment writing is all about quality. You need to present an assignment which is free of plagiarism and have no grammatical mistakes or spelling errors. When you are in a dilemma about the quality of your assignment, you think of someone to do my assignment for money. By following these simple steps you will get a high-quality assignment help from our assignment writers. - Place an order First of all, you need to visit our website and fill an order form. When you are filling the form, mention all your requirements along with your details so that become easier for our writer to fulfill your requirements regarding your assignment. Mention deadline, number of pages, word-count, referencing style, etc. If you have any additional documents you can also attach it with your order form. - Pay for your order When you are done with filling the order then you have to make the payment. You can pay us through internet banking, PayPal, MasterCard, etc. You can pay in two installments. 50% is when you place your order and the rest 50% when you receive your order. - Get you order When your payment gets done and we receive a confirmation about your order, one of our assignment helpers will start working on your assignment and deliver it to you before the deadline you have provided to us. With the years of experience and months of training, we bet our writers are the best at work irrespective of your assignment needs and requirements, our writers will provide you the best assignment help when you ask them to do my assignment in Australia for me. Ask us to “do my assignment in Australia” for any subject We are involved in the assignment writing field for a long time. Our assignment helpers in Australia provide the best quality work on different academic subjects. There are some subjects listed below on which students can ask us to do my assignment for me. - Law assignment help: Students pursuing law can ask us to do my assignment online for their desired topic or concept. - Mathematics assignment help: Students who are not able to solve the complex equations of any chapter of mathematics can take instant assignment help from us at any time. - History assignment help: If the students who are facing difficulties in writing their history essays can hire one of our writers to complete their history assignments on time. - Science assignment help: For many students, science is the most complicated subject to deal with. If students stuck in any concept of this subject then they can take online assignment help from us. - English assignment help: Students can get assignment help with English on their desired topic whenever they need. We have professional assignment writers for different academic subjects or disciplines who will take care of your assignments. They have the potential to do any challenging assignments effortlessly within a stipulated time frame. So, whenever you need to pay someone to do my assignment for me, you can trust our writers. Why to take online assignment help from allassignmenthelp.com is a brilliant idea? There are a number of benefits that you get when you approach us to do my assignment for me online. Here is the list of advantages that you get when you hire a professional writer from allassignmenthelp.com. Let’s take a look to get a clear picture. - We do your assignments as per your requirements The best part about our online assignment help service is that we hire native writers to serve students. Our writers are well-versed with the education system in Australia. They understand how things work here and what is expected by students in their academics. Each and every assignment writer in our team is experienced in academic writing. Thus, they know that no matter how perfect an assignment is, if it does not abide by the professor’s instructions, it would be useless. So, we make sure that everything from topic suggestions to formatting style is created as per your professor’s guideline - Students can rely on us for confidential assignment help service We understand how crucial it is to protect your identity and personal information from theft and misuse. This is why we, at AllAssignmentHelp.com make sure that you go through a secured procedure when you ask “do my assignment in Australia”. This is one of the most prominent reasons why students from all spheres of Australia trust and prefer our team. We do not share your personal data with any third party or external sources. - Having a tight budget? We do your assignment for cheap At AllAssignemntHelp.com we are working for the academic tasks of students for a long period of time. In all these years we have observed that many of them are deprived of the right assistance for not having enough financial resources. Thus, to help all such students who fail to pay heavy prices, we keep our prices nominal. We try to reduce your academic stress without being a burden on your budget. Other than this, we also offer exciting discounts and cashback. - We always deliver your assignments before the deadline When students recall their work late or cannot complete it on time for any other reason, there are greater chances of losing grades. To help them in such situations we provide instant assignment help services. Thus, you do not have to worry about the deadlines with our assistance. No matter how long your assignment is, no matter how your deadline is, we can handle everything all together. Till today, we have never delivered any assignment post-deadline. We know the value of time and abide by punctuality. This is why you can always ask us to do my assignment online to us when you are running out of time. When you ask us to do my assignment we not only write your assignment but we also provide numerous benefits from our services. Now, if you want someone to do my assignment for money then allassignmenthelp.com is the right place for you. Get our assignment help Australia for different universities One of the prime reasons for answering the question of “who will do my assignment in Australia” is because students in the various Australian universities have to write assignments that are difficult and tricky at the same time. This is why, we provide online assignment help to the students who are studying in different universities of Australia. - The Australian National University: The Australian National University is a national research university located in Canberra, the capital of Australia. Students who are pursuing any degree or diploma courses from this university can take our assignment help Australia to complete their assignments on time and with perfection. - The University Of Queensland: The University Of Queensland is a public research university located primarily in Brisbane, the capital city of the Australian state of Queensland. We have a team of assignment writers who are well-versed with The University of Queensland requirements and can craft your assignment that perfectly meets the university guidelines. - Monash University: It is among the top 10 difficult universities to get into in Australia. If the students facing problems in writing their assignments for Monash university, then they can come to us and get the best assistance with their assignments as well as with other academic tasks. - RMIT University: RMIT has a global reputation for excellence in professional and vocational education, and applied research. There are a number of students who enrolled themselves in this university every year. Students who are not able to deal with their assignments can ask us for assignment help anytime. It is true that universities give assignments to students to improve their thought processes and mental ability. But for many students, it is not possible to write their university assignment on their own. In this situation, students can ask us to do my assignment for me without any hesitation. Say do my assignment for me We assign the best assignment writer in AustraliaPlace your order FAQs about our do my assignment service What subjects do your writers work with? Whatever the subject you need assignment help in allassignmenthelp.com can produce assignments in various disciplines. Can you guarantee 100% writing quality? Yes, we always deliver the original and plagiarism-free assignments. Do you provide essay writing service? Yes, we do provide essay writing services as well. Can you help me with my Murdoch University assignments? Yes, we can help you with your Murdoch University assignments.
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474595.59/warc/CC-MAIN-20240225103506-20240225133506-00302.warc.gz
CC-MAIN-2024-10
11,458
60
https://gertyz.scientopia.org/2011/02/10/brain-bruising/
code
Holy crap. This week has been crazy busy. I am pretty sure that my brain is bruised. That can happen, right? In addition to my normal schedule of managing my lab peeps and writing grants (have 2 foundation applications due at the end of the month), I have given 4 - not a typo - different talks this week. Two were for grad students, one was a low-key presentation for my dept., and the other was a Big Time talk for another program at my MRU (a big deal). The talks went well (I totally nailed the "big" one). Oh, and it is interview season. Prospective grad students, faculty candidates, more grad students. You name it, I'll interview it. Oh yeah, and I've got a stack of postdoc fellowship applications I am supposed to review. Damn. It is safe to say that the work/life balance was tipped toward work this week. Hopefully tomorrow I can get enough done on my grants to justify taking a small break this weekend. I really need to go for a run-I have been too sleep deprived to get my normal workouts in. My brain is just too tired to put together a coherent post (see above). But I do have a couple of points I would like to bring up for anyone that is out getting interviewed right now: - under no circumstances should you answer (or send) a text message during an interview. - seriously, just put away your iPhone. At least pretend to be interested in what I am talking about when I am interviewing you. - for a TT job talk, please tell me why I care. Spend some time on the big picture, please. That is all I have right now. I am fucking exhausted.
s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376832559.95/warc/CC-MAIN-20181219151124-20181219173124-00162.warc.gz
CC-MAIN-2018-51
1,555
8
http://www.getstuffr.com/2008/07/18/stuffr-097/
code
By Slobokan | July 18, 2008 The newest version of Stuffr is here. While you thought I was sitting around doing nothing, I was planning a complete overhaul behind the scenes as well as making several changes to Stuffr’s streamlined design. Over the course of the last couple months, I received quite a bit of feedback. Many of you asked for changes in the interface to make it look less cluttered. So I took some time and re-designed the look and feel to make it more user-friendly, if that was even possible. The most requested item was support for Blogger. I am happy to report, I have added basic support for posting to your Blogger account. Based on user feedback, I might add more features, but for now, you can post and edit. That should make a lot of you happy. While I did change the look of the application, I also did a complete overhaul of the code behind the scenes. Things should run much more efficiently. The most notable change, however, will be the lack of support for Twitter and Pownce. I have removed Pownce support completely because of the utter lack of activity over there, and I removed the Twitter component of the application because of the unstableness of the Twitter site. I am still working on the code, and when I feel it is stable enough, I will re-release the Twitter components of Stuffr as a stand-alone module you can run alongside Stuffr. So, here is the new Stuffr: Stuffr, a desktop blogging client for Windows, has a streamlined design that works in conjuction with multiple weblog platforms. With keyboard shortcuts, syntax highlighting, and smart prompts, Stuffr offers you all of the tools needed for speedy and convenient posting. Stuffr allows you to save drafts or publish entries to your blog in real time, but it also offers the choice of saving the post locally for further review and editing. New in this version of Stuffr are four preset color themes, as well as the choice to customize the interface colors. Stuffr currently supports blogging on the Blogger, Movable Type and Wordpress platforms, as well as Tumblr TumbleLogs. Stuffr’s features include: - Multiple blog accounts - Add files, images, links and web videos (from YouTube, Vimeo, College Humor, and MetaCafe) - HTML syntax highlighting - Four customizable tag buttons - It’s 100% free, with no ads or spyware! Blogging (Movable Type & WordPress): - Post drafts and publish posts - Save drafts locally - Editing posts and drafts - Multiple categories - Add Categories (WP 2.2+ Only) - Post date modification - Pinging multiple update services - Publish posts - Save drafts locally - Editing posts - Post Text Entries - Add Photos - Cite Quotations - Link to your favorite sites - Paste an online chat conversation - Embed Video - Support for posting to Blogger. - Embedding Vimeo clips was not always working correctly. - When choosing a custom theme, the colors didn’t always match the chosen ones. - Fixed the way Stuffr handles incoming parameters from other applications (like FeedDemon’s BlogThis). - Cleaned up and changed the entire Stuffr interface. All of the functionality is still there, I have just removed numerous buttons from the main screen to make it look “cleaner”. - When clicking (or keying Ctrl-W) for a WordCount, the result is now shown on the status bar for a short time instead of popping up a window you have to close. - Support for adding Technorati tags to the end of the post content. - Support for posting to Twitter and Pownce - None at this time. For more information on changes included in each version of Stuffr, check the history.txt file that accompanies the file. Stuffr, with it’s intuitive design, does what a blogging client should, and it does it quickly and efficiently. So when you have a lot on your mind, take your thoughts and Stuff ‘em!
s3://commoncrawl/crawl-data/CC-MAIN-2014-10/segments/1394011473737/warc/CC-MAIN-20140305092433-00031-ip-10-183-142-35.ec2.internal.warc.gz
CC-MAIN-2014-10
3,813
47
https://forums.makingmoneywithandroid.com/t/easy-caller-widget-my-first-android-application/1558
code
Communicate in one tap with Easy Caller Widget. Easy Caller Widget app is a program for quick and easy communication with the chosen persons. By placing the widget on your desktop You can call, send SMS, email or you can chat in Skype, and all of this you can do with just one touch. You can also customize the widget by yourself (color, size, layout of elements). It is very simple app, which makes your communication easier. Demo version: https://play.google.com/store/apps/details?id=com.easycallerdemo&feature=more_from_developer&hl=en Full version: https://play.google.com/store/apps/details?id=com.easycaller&feature=more_from_developer&hl=en
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100705.19/warc/CC-MAIN-20231207221604-20231208011604-00303.warc.gz
CC-MAIN-2023-50
648
6
http://msdn.microsoft.com/library/office/bb204239.aspx
code
Published: July 16, 2012 Applies to: Exchange 2013 | Exchange Online | Exchange Server 2007 | Exchange Server 2010 The DeploymentId element uniquely identifies the Microsoft Exchange Server 2007 forest. The following sections describe attributes, child elements, and parent elements. Provides user-specific information.
s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386164786099/warc/CC-MAIN-20131204134626-00022-ip-10-33-133-15.ec2.internal.warc.gz
CC-MAIN-2013-48
319
5
http://fifecycling2000.co.uk/midweeks2009_14.html
code
Notes The full league is calculated from a rider's best 12 results multiplied by that rider's number of scoring events. A rider's maximum number of scoring events can be no greater than the number of events run minus 3 (i.e. we can all take 3 weeks off without penalty!) This season there will have been 21 scoring events, Round 9 having being nullified, so the maximum number of scoring events will be 18. i.e. maximum score possible = 12 * 20 * 18 = 4320 points. The veterans league is calculated using the same criteria as the full league, but the maximum number of scoring events this season will be 17 (the 2-up TTT does not score). i.e. maximum score possible = 12 * 20 * 17 = 4080 points.
s3://commoncrawl/crawl-data/CC-MAIN-2018-47/segments/1542039747215.81/warc/CC-MAIN-20181121052254-20181121073150-00012.warc.gz
CC-MAIN-2018-47
695
2
https://pageswype.com/2018/05/googles-semantic-experiences-let-play-word-games-ai/
code
Google is doing a big research on natural language processing analysis. However not every new project can be a part of new assistant features or voice improvement technology. They had their fun with code when mastering Artificial Intelligence. Recently they have posted few web experiments which allows you to engage with word association systems. First, and the most interesting way of searching something up is through Google Books, which is an enormous database. However, with the help of new Artificial technology, you can ask up a question instead of searching up a query. How cool is that? For eg. You can ask “Why was Napoleon exiled?” and it will give you can answer accordingly. Talk To Books The new technology is much advanced than before. It can return phrases and paragraphs from books which are based on their language to answer your question. Sometimes the answer hits and sometimes doesn’t. But its a nice step for future improvements. Even some sentence answering our questions seems quite funky when it was compared to actual keyword. Let us say the technology is still in beta phase. We found that it is not very interactive to talk to books, as it abolishes the traditional way to learning and reading. This is also because the technology is not much advanced to answer up all the queries. It is because sometimes it just highlights the words and phrases in search results. This is the reason why it is not a practical approach to a book reading at this moment. However, it indeed might be shortly. But the good part is that it might introduce you to new books and new authors as the database is huge with almost around 100,000 books from different genres. Its great to know that Google is actually working toward making book reading and finding answers an easy approach for readers. This technology can save up much time when looking for a particular topic, word, phrase or even an answer to a complex question. But Google still needs to work on making it more accurate and versatile.
s3://commoncrawl/crawl-data/CC-MAIN-2019-39/segments/1568514573801.14/warc/CC-MAIN-20190920005656-20190920031656-00200.warc.gz
CC-MAIN-2019-39
2,011
6
http://www.webhostingtalk.com/showthread.php?t=273257
code
I have been setting up mod_security lately trying to make it work and so far so good except these two rules I have a site on my server that runs a php scripting site, they share php code, etc with each other, whenever they try to send any php code through pms now via the forums it gives them an mod_security error message, I then go in the logs and look for what is breaking it and it was SecFilter "insert[[ pace:]]+into", is there any way to tweak that rule to allow that site only to run without it. Btw those rules are for mysql injection attacks, also if you guys have any other rules for mysql injection attacks please post them thanks. Hopefully that made some sense if it didn't please forgive me I'm running on 2 hours of sleep and a 101 * Fever
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368708690512/warc/CC-MAIN-20130516125130-00079-ip-10-60-113-184.ec2.internal.warc.gz
CC-MAIN-2013-20
755
4
https://www.conferencecast.tv/talk-47045-stacks-founder-muneeb-ali-why-defi-is-being-built-on-bitcoin
code
About the talk Muneeb Ali is a crypto OG and all the while, he's stuck with Bitcoin, even as other blockchains boomed and decentralized finance exploded. In this dev stage keynote, learn why DeFi is being built on a chain that wasn't built with a diverse array of smart contracts in mind, even while other blockchains spring up that were. I started the Stacks project and I'm the CEO of Trust Machines. The mission of Trust Machines is to build the largest ecosystem of Bitcoin applications and the underlying technologies. My work brings apps and smart contracts to Bitcoin. Earlier, I received a PhD in Computer Science from Princeton University.View the profile Buy this talk Buy this video Our other topics With ConferenceCast.tv, you get access to our library of the world's best conference talks.
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296949533.16/warc/CC-MAIN-20230331020535-20230331050535-00491.warc.gz
CC-MAIN-2023-14
802
7
https://discuss.cocos2d-x.org/t/dungeon-3d-fps-game-and-source-code-cocos-creator/57374
code
I’ve been recently working on my first game that I’ve created with cocos creator. Also my first 3D project in many years. Yesterday I’ve released an early alpha version which is here to play for free: I also decided I wanted everyone to be able to play about with and have a base for building their own FPS game from. So I’ve released the source code and assets here: Any questions, let me know.
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500080.82/warc/CC-MAIN-20230204012622-20230204042622-00013.warc.gz
CC-MAIN-2023-06
403
4