url
stringlengths 13
4.35k
| tag
stringclasses 1
value | text
stringlengths 109
628k
| file_path
stringlengths 109
155
| dump
stringclasses 96
values | file_size_in_byte
int64 112
630k
| line_count
int64 1
3.76k
|
---|---|---|---|---|---|---|
https://nixdoc.net/man-pages/FreeBSD/man1/vis.1.html | code | vis -- display non-printable characters in a visual format
vis [-cbflnostw] [-F foldwidth] [file ...]
The vis utility is a filter for converting non-printable characters into
a visual representation. It differs from `cat -v' in that the form is
unique and invertible. By default, all non-graphic characters except
space, tab, and newline are encoded. A detailed description of the various
visual formats is given in vis(3).
The options are as follows:
-b Turns off prepending of backslash before up-arrow control
sequences and meta characters, and disables the doubling of backslashes.
This produces output which is neither invertible or
precise, but does represent a minimum of change to the input. It
is similar to ``cat -v''.
-c Request a format which displays a small subset of the non-printable
characters using C-style backslash sequences.
-F Causes vis to fold output lines to foldwidth columns (default
80), like fold(1), except that a hidden newline sequence is used,
(which is removed when inverting the file back to its original
form with unvis(1)). If the last character in the encoded file
does not end in a newline, a hidden newline sequence is appended
to the output. This makes the output usable with various editors
and other utilities which typically don't work with partial
-f Same as -F.
-l Mark newlines with the visible sequence `\$', followed by the
-n Turns off any encoding, except for the fact that backslashes are
still doubled and hidden newline sequences inserted if -f or -F
is selected. When combined with the -f flag, vis becomes like an
invertible version of the fold(1) utility. That is, the output
can be unfolded by running the output through unvis(1).
-o Request a format which displays non-printable characters as an
octal number, \ddd.
-s Only characters considered unsafe to send to a terminal are
encoded. This flag allows backspace, bell, and carriage return
in addition to the default space, tab and newline.
-t Tabs are also encoded.
-w White space (space-tab-newline) is also encoded.
The vis command appeared in 4.4BSD.
FreeBSD 5.2.1 April 19, 1994 FreeBSD 5.2.1 [ Back ] | s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100705.19/warc/CC-MAIN-20231207221604-20231208011604-00583.warc.gz | CC-MAIN-2023-50 | 2,117 | 38 |
https://www.kialo.com/should-public-entities-use-only-open-source-software-8752 | code | Kialo requires cookies to work correctly.
Should public entities use only open source software?
Public entities should only use open source software.
When drones and robots are fully autonomous I think we all deserve and want to know what logic they are going to use when deciding to engage and kill.
You can look at the code and see what is doing.
Sometimes proprietary software is not funded and may not get updated.
Open source software is often free or cheaper.
Transparency between the requirements and the delivered product would provide for better auditing and easier finding of political embezzlement.
Open source software leads to more participative democracy.
With proprietary software, the consumer cannot contribute a feature (that may be useful also to others) if that is not in the company's interests.
Public documents should not be published in closed formats.
Huge amounts of hardware would also need to be replaced, as lots of equipment relies on closed source software.
The available open source software may not meet the needs of the government.
There is often no direct contact with a helpdesk possible.
Some proprietary software is better for some specialized tasks.
Open source software sometimes is not funded and may not be updated.
Open source software is better.
All software should be open source.
Should Ontario have only one public, secular school system? | s3://commoncrawl/crawl-data/CC-MAIN-2019-22/segments/1558232256958.53/warc/CC-MAIN-20190522203319-20190522225319-00109.warc.gz | CC-MAIN-2019-22 | 1,385 | 19 |
https://www.macobserver.com/link/2022-major-robotics-revolution/ | code | ZDNet interviewed Pieter Abbeel, a professor of electrical engineering and computer science at the University of California, Berkeley. He says a major revolution is coming thanks to machine vision.
Giving robots the gift of sight completely changes what’s possible. Computer Vision, the area of AI concerned with making computers and robots see, has undergone a night-and-day transformation over the past 5-10 years — thanks to Deep Learning. Deep Learning trains large neural networks (based on examples) to do pattern recognition, in this case pattern recognition enabling understanding of what’s where in images. And then Deep Learning, of course, is providing capabilities beyond seeing. | s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679101779.95/warc/CC-MAIN-20231210092457-20231210122457-00480.warc.gz | CC-MAIN-2023-50 | 697 | 2 |
http://iwyre.net/?p=79 | code | I felt this gotcha coming. I got to the point when I needed to test and demo my first app on an actual device rather than in XCode simulator. I followed Apple’s directions (pdf) on how to run the app, but as soon as I hit “Build and Go” I somehow knew it wasn’t going to happen. Call it professional deformation… Anyway, to install and run your app on an iPhone, you need to do following:
- Join the iPhone Developer Program Portal
- Create certificate request
- Obtain and install your iPhone Development Certificate
- Create your App ID
- Assign your testing devices
- Create and download provisioning profiles
Now to the gotcha. After you’ve done the above, open your app’s info.plist file as a plain text file.
Change the string value under CFBundleIdentifier element to your AppID without the generated 10-digit prefix. For example, if the AppID associated with your provisioning profile is
ABCDE12345.com.mycompany.myApp, the CFBundleIdentifier would be
com.mycompany.myApp. Hit “Build and Go” and your app should install and run on the device. The post that saved a part of my night outlines alternative solutions, but I found this one the simple enough, and it does the job. | s3://commoncrawl/crawl-data/CC-MAIN-2018-05/segments/1516084888113.39/warc/CC-MAIN-20180119184632-20180119204632-00539.warc.gz | CC-MAIN-2018-05 | 1,200 | 11 |
http://superuser.com/questions/tagged/dpkg+python | code | Something went wrong while updating to ubuntu 12.04 to 12.10: root@ely:/sys/bus/usb/devices# dpkg -l | grep ^i[HUFW] iU libpython2.7 2.7.3-0ubuntu3.4 ...
I am trying to install a deb package I built from source, the package is call LIO-Utils. LIO-Utils and the packages to follow require Python2.6 but Ubuntu 11.10 Server is running Python2.7. I have ...
I had an issue (Question 199582) which was resolved. Unfortunately I am stuck at this point now. Running root@X100e:/var/cache/apt/archives# apt-get dist-upgrade Reading package lists... Done ... | s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1387345765796/warc/CC-MAIN-20131218054925-00061-ip-10-33-133-15.ec2.internal.warc.gz | CC-MAIN-2013-48 | 550 | 3 |
https://www.bleepingcomputer.com/forums/t/315101/removing-words-which-have-been-added-to-the-dictionary/ | code | Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.
So a friend of mine thought it would be hilarious to had hundreds of random words to the dictionary on Office, particularly the words which I tend to make typos with. Now generally when I make a typo Word doesnt pick it up.
Is there anyway I can remove these typoed words off the dictionary?
I have MS Word 2003, not sure if it's the same with whatever version you have but I can go to Tools->Options->Spelling & Grammar->Custom Dictionaries. There I can modify or delete the custom dictionary that words I added are stored in.
Edited by strolln, 06 May 2010 - 07:55 AM.
To Err is human; to really foul things up requires a Bleeping Computer! | s3://commoncrawl/crawl-data/CC-MAIN-2018-43/segments/1539583514355.90/warc/CC-MAIN-20181021203102-20181021224602-00330.warc.gz | CC-MAIN-2018-43 | 1,190 | 7 |
https://mash.ie/primary/1st-2nd-class/second-class-progressional-plan-history.html | code | Second class, Progressional plan, History
Progressional Plan -History
Strand: Story Strand Unit: Stories
Week 1: Who's the first human in space
Week 2: Who was the first animal in space
Week 3: Check out artifacts about space
Week 4: Put space information learnt in chronological order
Very detailed planning document
Feel free to edit to suit your class
Includes differentiation, resources, integration and class organisation
We accept returns
Follow me @the.teaching.style on Instagram
All reviews welcomed
We accept the following payment methods:
To replace this text with your store's actual info on payment methods, go to "Catalog -> Product tabs" and edit the Payment methods page.
Here you can provide information as to what products can be returned, how many days your customers have to return their purchase, whether they will receive a refund in the original form of payment, a replacement or a store credit, who pays for the shipping of the previously purchased products to the store, and so on.
To replace this text with your store's actual return policy, go to "Catalog -> Product tabs" and edit the Return Policy page. | s3://commoncrawl/crawl-data/CC-MAIN-2021-49/segments/1637964363510.40/warc/CC-MAIN-20211208114112-20211208144112-00438.warc.gz | CC-MAIN-2021-49 | 1,132 | 17 |
https://www.alsultanacamp.com/practical-tip-desert-dangers/ | code | Before striking out alone, it’s worth taking precautions against the following:
Temperatures (cold as well as hot) can be extreme in midsummer (May to September) and midwinter (January).
It’s easy to get disoriented amid the craggy peaks and maps are often inaccurate.
Passing traffic is rare.
Natural water supplies are not common and sometimes undrinkable.
Walking in sand is particularly exhausting. | s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474412.46/warc/CC-MAIN-20240223121413-20240223151413-00394.warc.gz | CC-MAIN-2024-10 | 406 | 6 |
https://www.freelancer.ph/job-search/india-grocery-store-online-denmark/ | code | Webcam Model Wanted from india i am looking for who can brodcast live in social site and get vistior and promotion my service more details in chat its secure and safe and high paid excel and copy type skill will be plus point
I need the following built: 1. python django front end website. it is simple allows users to login and upload data 2. once data is uploaded it should be stored in access database 3. once data is stored a python script is run and produces a report 4. user dashboard I have source code for website and clear documentation.
as an article on doctor suicide-very often neglected,it is extremely crucial to look into the mental health scenario of those who look after us . the medical profession has proven to have one of the highest risk of death by suicide among professions. the most common mental illness among doctors happen to be effective disorders like depression and bipolar disorder alcoholism and substance abuse and...
...home. You are experienced in Ruby on Rails or/and Python. The main work will be messenger chatbots and APIs. I personally do some ruby on rails and have salesmen in Denmark looking for clients. We have to be ready for larger clients, and by ready I mean; a more experienced developer than me that can code professionally. Thank you and let
Hi, i'm new to Nativescript and i struggled doing the grocery toturial app and configure it using PHP backend. What i need is someone to do the grocery app toturial and write PHP backend for login, logout, and list retrieval. The code should be commented and clear so i can use it and complete my development
I need a new grocery website. I need you to design and build my online store. But i will not see a lot of other design Only developer with experience with grocery design will be booked And show me mock design first Else forget to offer my your service.
We are looking for translator/writers for the following languages. We would be interested in 7 language contents vis-a-vis: 1) Swedish (Sverige) 2) Danish (Denmark) 3) Finnish (Finland) 4) Norweigian (Norway) 5) German 6) French 7) Dutch (Netherland) We would like to know the turn around time and cost per content (500 words average) for each of these
Berri Pro is an organic sports drink that we will be demoing throughout grocery stores. We would like a mock up of what our display will look like. We want our boxed drinks stacked neatly behind the demo table according to flavor. A table in front with our Berri pro logo, faux wood top of table, and two banners on each side of the table that will show
You have experience in media selling. We are organising a B2B fair around Smart Cities In India their is a huge project "100 Smart Cities" Our stands are virtual and prices are similar or even below classic advertising prices. As freelance sales you get a fixed fee on each new exhibitor. We give you the possibility to grow and become an
We are a newly started, small fish guiding and rental company on a small island in Denmark. We are mainly fishing for seatrout, and the name of the company is Seatrout-Aeroe. Aeroe (Ærø in danish) is the name of the island where we are based. We want the logo to represent where we are from, and what we are doing. It has to be a simple logo (perhaps
...the purposes of this survey, you are to obtain prices of 25 grocery products from three different styles of shop: 1. A supermarket known for good products at reasonable prices. 2. A popular department store or supermarket in the mid-price range. 3. A prestigious specialised store or supermarket known for high quality goods at high prices.
I want ready made eCommerce mobile application for ios and android with back end i want to run a grocery store so i need an application for my store where i can sale online general grocery products. Functionalities: Items gallery Retrieving Itemsprices Add items to users wishlist Add items to users shopping cart Complete Orders
Hi there. I have a business based in south africa. We manufacture plastic bags (like the carrier bags you use after grocery shopping and other plastic bags like refuse bags, etc). We are in existence for the past 14 years or so. We have to expand our plant in order to survive the economy of scale. financial limitations are always found due to capital
I am looking for an Indian developer who can create an Android Feature for existing app to include Metro Rail Fare, Route, Route on Map, Metro Stations Info and Nearest Metro Station. I don't have any APIs or Data Sources for these information, All Information about the feasibility of this feature is to be collected at developer end.
I need Details of Doctors In India, you need to do internet research for the details and should input the details in a excel. Deliverable will be an excel of name, mobile number, email id., clinic/hospital number, hospital name and city. Specialities specialised in Immune thrombocytopenia (ITP) Haematologists – 100 Haematologist specialized
...facility to give or deny refund to customers for any product. I need some changes to an existing website. I need you to redesign my existing bonus website and convert it with grocery items also. In my website there will be three type of panels Merchant Panel (Already Developed, only some modifications needed.) Customer Panel (Already Developed, only
Built me a Mobile app for Delivery Tracking - Prestashop Need to build a mobile app primary track the local delivery ( grocery /organic items)
...seeking: As mentioned I'm looking for a 50/50 partner all the way. Preferrably around my own age 30+. It's very important to me that he/she is from Denmark, and preferrably located in Aarhus, Denmark or somewhere near since we should be able to attend in IRL "meetings or workshops". You should have experience in construction/programming of websites | s3://commoncrawl/crawl-data/CC-MAIN-2018-13/segments/1521257651481.98/warc/CC-MAIN-20180325005509-20180325025509-00041.warc.gz | CC-MAIN-2018-13 | 5,814 | 18 |
https://lifelock.norton.com/learn/data-breaches/microsoft-exposed-250-million-customer-records | code | - 250 million Microsoft customer records were exposed on an online database without password protection.
- The exposed information included customer records from 2005 to December 2019. Exposed customer service and support logs included conversations between Microsoft support agents and customers.
- Most personally identifiable information was redacted, although some customer email addresses, IP addresses, geographical locations, and other data were exposed.
- Comparitech security researchers led by Bob Diachenko found the breach and notified Microsoft. Microsoft secured its database within 24 hours.
- The risk? Cybercriminals could use the exposed information in tech-support scams or phishing scams.
What data was exposed?
Most of the information exposed were customer service and support logs. Companies often keep this information as a record of conversations with customers.
In the Microsoft breach, most personally identifiable information was redacted from the records — meaning it was removed.
For some customers, additional information was exposed. Here’s what may have been included in those cases.
- Customer email addresses.
- IP addresses.
- Microsoft support agent emails.
- Case numbers and resolutions.
- Internal notes marked as confidential.
How do I protect against tech support scams?
Here are some tips to help protect yourself against tech support scams.
- Keep in mind most large corporations, including Microsoft, will not reach out to you about your tech problems. You have to initiate the communication. If someone is reaching out proactively, be suspicious. Even if they are following up on a recent, coincidental call of yours, hang up the phone. Call back the official support number on the company page – and not a number that was sent to you.
- If the inquiry is over email, be careful about the source and destination of the incoming message. Do not share personally identifiable information over email. Most large companies will never ask for your password or other PII (Personal Identifiable Information) over email – and possibly not even over the phone. Most large companies have more secure methods of authenticating users.
- Report any suspicious activity to the company. This will help the company remediate the situation.
- If passwords were exposed in a data breach, it’s a good idea to change your password in the relevant account. If you used the same password for any other accounts, change those passwords, too. It’s smart to use a unique, complex passwords for each of your accounts.
What was the timeline on the Microsoft breach?
Comparitech, the company that found the Microsoft data breach, said the data was exposed for about two days. The company included this timeline in a blog post.
- December 28, 2019 – The databases were indexed by search engine BinaryEdge.
- December 29, 2019 – Comparitech researcher Bob Diachenko discovered the databases and notified Microsoft.
- December 30-31, 2019 – Microsoft secured the servers and data. Diachenko and Microsoft continued the investigation and remediation process.
- Jan 21, 2020 – Microsoft disclosed additional details about the exposure as a result of the investigation.
What is Microsoft doing?
Microsoft said it concluded an investigation into a “misconfiguration of an internal customer support database used for Microsoft support case analytics.” The company said it is taking these steps.
- Sending notifications to customers whose data was affected by the data breach.
- Taking action to prevent future occurrences of this issue.
- Auditing the established network security rules for internal resources.
- Expanding the scope of the mechanisms that detect security rule misconfigurations.
- Adding additional alerting to service teams when security rule misconfigurations are detected.
Was yours one of the billions of records stolen through breaches in recent years?
LifeLock identity theft protection sees more threats to your identity, like your personal info on the dark web. And if you become a victim of identity theft, dedicated Identity Restoration Agents will work to fix it.
Start your protection now. It only takes minutes to enroll. | s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817576.41/warc/CC-MAIN-20240420091126-20240420121126-00287.warc.gz | CC-MAIN-2024-18 | 4,184 | 36 |
https://www.experts-exchange.com/questions/21092137/Can't-Reinstall-Repair-or-Update-MS-Office-2003.html | code | Whenever I try to repair, uninstall or reinstall MS Office 2003, I get the message, "The patch package could not be opened. Verify that the patch package exists," etc. Another symptom: When I run Excel, I get a couple of "Preparing to Install" messages before the program opens. Finally, the MS Office Update site tells me that it "is unable to check for updates on this computer."
I would appreciate help. | s3://commoncrawl/crawl-data/CC-MAIN-2018-17/segments/1524125944982.32/warc/CC-MAIN-20180421032230-20180421052230-00189.warc.gz | CC-MAIN-2018-17 | 406 | 2 |
https://ez.analog.com/data_converters/high-speed_adcs/w/documents/2641/differential-input-resistance | code | input resistor on their analogue inputs? The DC characteristics section of the
datasheets specify 5.2Kohm “Differential Input Resistance”, but there is no
differential input resistor shown in the equivalent circuit for the analogue
inputs or in the “ANALOG INPUT CONSIDERATIONS” section.
There is no differential input resistor as a component placed at the AD9253 and
AD9257 inputs. There is an equivalent resistance due to the switched capacitor
input circuit. It is not a simple shunt or series resistance, but we need to
pick a lumped model to use (shunt or series) and report the closest | s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323588113.25/warc/CC-MAIN-20211027084718-20211027114718-00706.warc.gz | CC-MAIN-2021-43 | 599 | 8 |
http://www.wipconnector.com/apis/entry/htc_tablet_pen_api | code | HTC Tablet Pen API
Tags:android, HTCdev, stylus, scribe
Tablet Pen API Overview
The Pen API consists of a rich framework for creating drawing applications using HTC tablets that provide the PenScribe technology, such as the HTC Flyer and EVO View. As illustrated by the preloaded native pen applications such as the notepad application, this framework provides the ability to interact with the pen’s buttons and provides the pen controls, settings and properties that are available to the native applications, for example, the pen menu and features such as the ability to provide history and undo.
Note: the Pen API targets Android 3.0 and above only - except where noted below for the low level api where a compatibility example is provided.
Must Register with HTCdev
For use only with HTC devices with stylus technology | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696383508/warc/CC-MAIN-20130516092623-00021-ip-10-60-113-184.ec2.internal.warc.gz | CC-MAIN-2013-20 | 823 | 7 |
https://www.odoobooks.com/en/13.0/crm/acquire_leads/generate_from_email.html | code | Generate leads/opportunities from emails¶
Every sales channel is capable create lead/opportunity form the incoming emails. You can define the email alias when that receive an email the lead/opportunity will be created in that sales channel.
By default, any email sent to [email protected] will create an opportunity in the pipeline of the default sales channel.
Configure email aliases¶
Each sales channel can have its own email alias, to generate leads/opportunities automatically assigned to it. It is useful if you manage several sales teams with specific business processes.
You will find the configuration of sales channels under Configuration / Sales Channels.
Access the video at https://www.youtube.com/watch?v=79OehLEHOYU | s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224644309.7/warc/CC-MAIN-20230528150639-20230528180639-00461.warc.gz | CC-MAIN-2023-23 | 745 | 7 |
http://derbyukuleleclub.weebly.com/blog/archives/06-2013 | code | There will be no ukulele club next week because we are looking for a new venue since the closure of The Engineers Club. I have been looking into alternatives. Next week I am meeting with some of the members who volunteered to help convene the club. We are going to decide which of the alternative options seems best for the future. We will meet again on 17th July. We'll post the venue on our website and through this email-list.
To help us decide, please fill in the online poll at: http://www.smart-survey.co.uk/s/84312WJVBZ | s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600400250241.72/warc/CC-MAIN-20200927023329-20200927053329-00016.warc.gz | CC-MAIN-2020-40 | 526 | 2 |
http://wordprocessing.about.com/od/wordprocessingsoftware/a/endnotes.htm | code | Working with endnotes is generally easier than working with footnotes. You dont need to worry about spacing them correctly on the page. However, it you add, remove, or move parts of your document, you may need to update your endnotes.
When youre working on an academic paper, its important that sources are sited correctly. You can avoid mistakes introduced in the editing process by using Words endnotes feature. Its surprisingly easy!
To insert endnotes, follow these steps:
1. Place the cursor where the endnote mark should be located
2. On the Insert menu, select Reference
3. On the Reference submenu, click Footnote
4. Make sure Endnotes is selected in the Location section
5. Select End of document or End of section
6. Beside Numbering select Continuous or Restart each section
7. Click Insert
The endnote mark will appear at the selected location. Word will take you to the endnotes at the end of the section or the end of the document.
8. Enter the endnote text. Add formatting if desired
You can add endnotes in any order you want. Word automatically updates the numbering. | s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1405997888866.9/warc/CC-MAIN-20140722025808-00123-ip-10-33-131-23.ec2.internal.warc.gz | CC-MAIN-2014-23 | 1,084 | 13 |
https://www.notion.so/Installing-and-Initializing-the-CLI-29dfe547a1144de1bb875e2f386d2c6d | code | The Interplay CLI can help you create a UMD build of your components and generate config for Interplay by bundling and parsing your code automatically.
Only the compiled build and the generated config is sent to Interplay, not your source code.
It is usually easiest to install the Interplay CLI and its React plugin globally using npm:
npm install -g @interplay/cli @interplay/cli-plugin-react
In your browser, navigate to https://app.interplay.io/ and check you can login to your workspace before running the import.
<aside> 👉 Please run the CLI at the base of your repo so that the CLI is aware of all the packages in your repo. Enter all settings paths relative to the base of your repo
The first step in using the CLI is to initialise your config by registering a new project to contain your code. In the root folder of your repo:
Running this command will popup a browser for you to specify the project to import to:
Set the project name you would like to use and click Continue.
Two config files will be created in the
.interplay folder in your repo. These files control the import:
targets.json- this controls the target team and project you are importing to
interplay.config.js- this controls all the other settings required such as the packages to import, the files to bundle and the settings to use when parsing your presets.
In the sections that follow we'll update the relevant config and then run the relevant CLI command to
deploy your components.
Next: Running the CLI | s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500080.82/warc/CC-MAIN-20230204012622-20230204042622-00718.warc.gz | CC-MAIN-2023-06 | 1,487 | 16 |
https://rmiverson.medium.com/why-my-rails-projects-couldnt-connect-to-postgresql-2a6b32a4504e?source=post_internal_links---------2---------------------------- | code | It was a while ago that I decided to start to develop a messaging app to add to my portfolio. I wanted to have a bit of use using websockets, and I thought it would be a fun side project. There was just one thorn in my side that I was tired of dealing with, which was using postgres. Using postgres instead of the rails default sqlite is an important step if you’re wanting to host your backend on heroku. My current environment is a custom PC running Windows 10 and I’m using Ubuntu with Windows Subsystem for Linux (WSL) for my cli. This is important to note because initially I thought that this was the core of my problems.
Whenever you’re doing an initial rails setup with postgres you run…
$ rails db:setup
this will set up the test and development databases for your current user. This is where my first error showed up. It was an extra long rails error saying it could not connect to the postgres server. Which was odd to me since I had my Postgresql admin panel up, running the server just fine.
My initial solution was to manually set a username, password, host, and port number in my rails database.yml. This worked just fine, but was possibly insecure since this yml file would be uploaded to github with my user roles password there for the world to see. Plus, it was just super annoying to have to set this up for every new project.
So I knew my error was that rails couldn’t connect to my postgres server to make the databases. My next step in figuring out what is happening is to see if I could connect to the server itself. I ran…
$ sudo -i -u postgres
to switch to the postgres account on the server, then ran…
to try to access the postgres prompt. This got me the same error as rails did. Saying it could not connect to the server and that I should check if it’s even running.
So my next step was to see if I could start it from the terminal. I shut down the server on my postgres admin app, and I ran…
$ sudo service postgresql start
to attempt to start it manually. Leading to my third error, saying that it couldn’t start the postgresql 12 server and that its permission was denied. But wait … postgres 12!? The version of postgres that I installed with the postgres admin panel was 13! Why are there two versions?
My initial thoughts were that this was something to do with it not being up to date. So I tried updating everything I could from within the terminal and reinstalling postgres, but it still gave me all the same errors. At this point I was tired and frustrated and I decided it was probably just something to do with windows not liking that something through WSL was trying to do server stuff. Then I called it a day.
Then while writing this post, I looked back at some of these errors and thought “hang on… maybe there isn’t just one postgres installed”. I assumed that the postgres I installed through their installer was the only one on my machine. So I looked through my packages, and I found postgres 12! Which makes sense that that error was showing 12 in ubuntu, but still didn’t make sense that it couldn’t start the server with the other postgres server shut down. I thought that by not having that server running on that port that it wouldn’t make any more problems. Just to be sure I completely uninstalled the postgres 13 that I installed using the installer, and tried again. I started the server, switched to the postgres user, and tried to connect to the server prompt. This time it worked flawlessly. After making a new role for my user, I was able to do ‘rails db:setup’ and ‘rails db:migrate’ without any errors.
I ended up dealing with a string of errors and headaches for 6 hours of my time. I learned that I really should look at my errors more closely and not make too many assumptions about what’s going on. That would have saved me a lot more time.
TLDR: if you need to use postgres with rails on a Windows 10 Ubuntu WSL environment, don’t install it using the installer. Install it through the Ubuntu terminal. Here is a really helpful guide on doing just that here. Remember to start the server by running
$ sudo service postgresql start
I hope this helps somebody who might be struggling with rails and postgres. If not, at least just have a quick laugh at how much of a dum I was for not realizing that there were two postgres fighting each other on my system. | s3://commoncrawl/crawl-data/CC-MAIN-2021-31/segments/1627046153892.74/warc/CC-MAIN-20210729172022-20210729202022-00014.warc.gz | CC-MAIN-2021-31 | 4,371 | 18 |
https://mail.coreboot.org/hyperkitty/list/[email protected]/message/NZ3NZVKIJDJFM2M7VR24PYUYZSHKY5SJ/attachment/2/attachment.htm | code | They're also much less meaningful (it's typically rather easy to spin up qemu) but they provide a base line.
So for all I care, "port coreboot to QEMU/$anything" would be an interesting and helpful set of projects that students could decide to propose as theirs.
It also avoids the hassle of getting hardware and tools to the students, which created some unfortunate delays in the past. GSoC has some hard deadlines, so this is something to keep in mind.
Google Germany GmbH, ABC-Str. 19, 20354 Hamburg
Registergericht und -nummer: Hamburg, HRB 86891, Sitz der Gesellschaft: Hamburg
Geschäftsführer: Paul Manicle, Halimah DeLaine Prado | s3://commoncrawl/crawl-data/CC-MAIN-2021-49/segments/1637964358443.87/warc/CC-MAIN-20211128013650-20211128043650-00387.warc.gz | CC-MAIN-2021-49 | 637 | 6 |
http://www.dzone.com/links/clickjack_attack_the_hidden_threat_right_in_front.html | code | Storage Made Easy just updated their Linux Cloud Apps with security, performance & feature enhancements
Custom elements allow developers to define their own HTML elements with custom tag names that... more »
View Engine in ASP.NET MVC is used to translate our views to HTML and then render to response.
Some people will tell you it is Aeron chairs, private offices, free soda and maybe even a... more »
In this article, we will look at how to get a proper Mono development environment set up on... more »
Every business application has a conceptual data model (explicit or implicit) which describes... more » | s3://commoncrawl/crawl-data/CC-MAIN-2014-42/segments/1414119645432.37/warc/CC-MAIN-20141024030045-00071-ip-10-16-133-185.ec2.internal.warc.gz | CC-MAIN-2014-42 | 612 | 6 |
https://aetrading.nl/en/product/rf-controlset-2/ | code | RF Control DC1800 and receiver DC1149c
Optionally available with control DC1802 or DC1803
This RF set is developed to control LOGICDATA controllers. This makes the system suitable for all LOGICDATA control boxes.
The set can be used in two ways:
Option 1: Controlled movement (default). You must press and hold the ‘up’ or ‘down’ button to activate the system. The ‘stop’ button has no function.
Option 2: Automatic movement. As soon as an ‘up’ or ‘down’ button is pressed, the system runs continuously. The stop button provides an interruption. Note that this option is not suitable for all markets.
- Chic design
- Optional with engraved logo
- Wide reach
- Can be extended project-wise with e.g. rain sensor etc.
- Option 1: Controlled movement
- Option 2: Automatic movement (with stop button) | s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296948609.41/warc/CC-MAIN-20230327060940-20230327090940-00738.warc.gz | CC-MAIN-2023-14 | 817 | 12 |
https://www.dell.com/community/XPS/Keyboard-and-Mouse-KM7321W-fn-arrows-support/td-p/8221859 | code | On most laptops the fn+arrows keys have extra functions (home, end, PgUp, PgDn). This keyboard has the fn-key but the hardware is not configured to use the fn+arrow combination.
The fn-key cannot be changed by software. The KB7221W keyboard (which is part of the KM7321W keyboard/mouse set) can be updated through an firmware.
@DELL: Please add the fn+arrow key functions like configured on your laptops? | s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296945376.29/warc/CC-MAIN-20230325222822-20230326012822-00110.warc.gz | CC-MAIN-2023-14 | 404 | 3 |
https://www.freelancer.com/job-search/editphp-mysql/ | code | I need to build an admin website in PHP to manage locations of ATMs and POS (Point of Sale). There are 7 screens: 1. Login. Where admin users with specific profiles can login the app 2. Dashboard. Where will show a resume of recent activity for: last georeferenced ATMs, last POS georeferenced, last users access, las DB syncs 3. ATM Map. A map where
...this module. Categories and subcategories panel • List all document categories • Display corresponding subcategories when a category is selected • Add, edit or delete category • Add, edit or delete a subcategory 3. Developer’s Responsibilities The developer should provide: • A GitHub account for online repository for collaboration and sha...
... 1. These selections will impact the data input displayed In requirement 1 for all Group Members 6. BruddaWerks Administrative functions a. Add/edit users (Individual or Group accounts) b. User subscription management i. Define subscription levels such as number of users per group, allocated drive
...Native) which he/she then must couple to a partially written (~80%) back-end (PHP, Laravel) and to a MySQL database. The developer will be tasked to resolve technical issues arising from a production process and possibly develop new (minor) features on the back-end (PHP, MySQL). The developer would commit regular updates to the team to ensure a timely
...(Username, Email, PW) Edit Profile Password recovery Admin Features: Login as user (allows the admin to login as any user) User List (view users and edit details or delete them). In-app Navigation Dashboard (Displaying the fixture list with filters) Profile Logout The platform should be developed using PHP/MySQL and front-end languages
i have already website and i want to develop it and add all these changes i will provide the website to you after checking the offers about the website it's sellers and buyers b2b buyers enter the site and signup and after that thay can send request for orders for example labtop to the sellers in labtop category by Email only 1- changing Header Design i will provide screen shot for e...
...(Edited in the backend in plugin -text/image/link) on Wordpress site in style of the rest of the site. We are currently building the site. You get ftp and mysql access so you will have to set the hooks in php code that everything is published will appear in some sort of slider/carousel mode in a section defined as current news on the start page. At the
Add capabilities to create, edit and assign routes using Google Maps in PHP and MySQL. [url removed, login to view] will be required to create a simple MySQL database from scratch and overlay sample data on top of Google maps that can allow users to Create, Edit and Assign Routes to other users using the map. 2. You will be required to add simple design el...
...can't resolve myself and i need help. I'm not a developer but i have some skills, i know what is possible or not. I need a specialist able to edit code inside prestashop source code (PHP or SMARTY. Maybe mySQL). Template: At Julia Fashion (Leo's Themes) Some examples to do: * work on some adjustments for mobile design aspect * change payment preference
We want to start a website like thuttu dot com, should be built using ajax/php/mysql, fast loading, easy admin panel control, Data feed by xml/jason/api or csv feed format handling (easy to handle), with similar live chat module. Display deals of different product with prices from many sites by using the xml/jason/csv/api format, it grabs all
...this format never changes. I need a script to upload this CSV file and store in MySQL. I have other fields in the MySQL that do not exist in the CSV file and those should be edited in the front end by the users. We then want to display these transactions from the MySQL table on screen in a grid view. When I click a transaction it should open up a
I need to do some improvements to my website [url removed, login to view] which runs in php and mysql A) Signup improvements: When someone signs up as a lender, it should be a 3-stage process a) Asks them for an email address and password (we don;t need the username as well as an email address). Once they've done this it sends them the 'welcome' email (but
We need a website with MySQL /PHP which has an article database (which can be imported) of approx. 15'000 articles. We have approx. 5-10 customers only (but with x-users in each customer) which can search through this article database and borrow samples. After the usage they can claim a return (with the new return-weight or tell the system that they
...a quote from you to develop a responsive website like the mock-up below and the following listed features in PHP/MySQL. Bootstrap Frontend, BASIC PHP CMS Backend (I use PHP MAKER for this; very basic), User Logins for viewing notices (PHP login- required to view private pages) and post by admin. - Public Pages: Home, Lifestyle, The Club, Board
To do this work, you need expience in Google maps Api. - we want to create tables with php to display my-sql tables, search, and edit the values. - we should be able to edit the mysql table via google map - I do not pay any dollar before seening that you did the minumum work.
I need to create a very basic-looking Address Book designed using PHP/MySQL for Wamp Server. It needs allow users to add there details (aka, Name, Email, Telephone, etc). Additionally, I need the option to Edit/Delete these as well. If possible I would like further instructions on how to install the files onto my Wamp Server too. The sooner the better
...for subject to view/edit their details, page to view my information and one page to show progress of my subjects. You can read about PWA on [url removed, login to view] and [url removed, login to view] The backend will be powered by Apache, PHP, MySQL. Please refer to the | s3://commoncrawl/crawl-data/CC-MAIN-2018-09/segments/1518891812959.48/warc/CC-MAIN-20180220125836-20180220145836-00113.warc.gz | CC-MAIN-2018-09 | 5,841 | 17 |
http://javask.blogspot.com/2016/01/10-examples-of-using-arraylist-in-java.html | code | Read more »
ArrayList in Java is most frequently used collection class after HashMap in Java. Java ArrayList represents an automatic re-sizeable array and used in place of the array. Since we can not modify the size of an array after creating it, we prefer to use ArrayList in Java which re-size itself automatically once it gets full. ArrayList in Java implements List interface and allow null. Java ArrayList also maintains insertion order of elements and allows duplicates opposite to any Set implementation which doesn't allow duplicates. ArrayList supports both Iterator and ListIterator for iteration but it’s recommended to use ListIterator as it allows the programmer to traverse the list in either direction, modify the list during iteration, and obtain the Iterator's current position in the list. But while using ListIterator you need to be little careful because ListIterator has no current element; its cursor position always lies between the element that would be returned by a call to previous() and the element that would be returned by a call to next(). In this Java ArrayList tutorial, we will see how to create Java ArrayList and perform various operations on Java ArrayList. This collection class is also favorited on many core Java interviews with questions like Difference between ArrayList and Vector or LinkedList vs ArrayList. | s3://commoncrawl/crawl-data/CC-MAIN-2018-22/segments/1526794868003.97/warc/CC-MAIN-20180527044401-20180527064401-00407.warc.gz | CC-MAIN-2018-22 | 1,354 | 2 |
https://www.cadlink.com/index.php/en/infosource-forum-tutorials-tips-tricks/cadlink-s-forum/signlab/5509-trying-to-import-an-svg-file | code | I received an image in SVG format and when I try to import it into Sign Lab, I get this message "CADLink MFC application has stopped working." What can I do to get this file into my project as a vector image? I am attaching the SVG file.
The administrator has disabled public write access.
Trying to import an SVG file
5 months 4 weeks ago #6596 | s3://commoncrawl/crawl-data/CC-MAIN-2018-30/segments/1531676589557.39/warc/CC-MAIN-20180717031623-20180717051623-00391.warc.gz | CC-MAIN-2018-30 | 345 | 4 |
https://code2care.org/q/backup-file-in-linux-unix | code | You might be working on a file that is important to you and do not want to mess it up, the best thing to do is backup the file and then do what you want to do just to be on the safe side, lets see example of how to do this using Linux/Unix command,
Option 1: Backup a file using cp command as a new file
# cat my-important-file.txt This is one of my very important text file.
As you can see I have a file that I want to change, but before change it I want to take a backup of It, lets do that using the cp command,
# cp my-important-file.txt my-important-file-backup.txt
As you can see using the copy command, I took a backup of the file my-important-file.txt in a new file that I named as my-important-file-backup.txt, now lets see if the content of the file is same or not,
cat my-important-file-backup.txt This is one of my very important text file.
Option 2: Backup a file with the same name at a different location
# cp my-important-file.txt /home/ # cd /home/ # ls my-important-file.txt # cat my-important-file.txt This is one of my very important text file.
- Terminal display next month Calendar
- How to change bash terminal prompt string and color
- How to exit from nano command
- How to Display content of a file in Terminal Screen?
- Copy entire directory using Terminal Command [Linux, Mac, Bash]
- 3 Commands to stop Nginx Server
- How to check file permissions for your file using Linux/Unix/macOS Terminal Command
- Create Hidden File or Directory using Shell Command
- bash: cls: command not found
- How to install python pip on Ubuntu using apt command
- The Date Command and its usage [Linux - Unix - macOS]
- SCP Copy all files from directory to Local Folder
- Create and write file in single Linux/macOS command
- Install OpenSSL on Linux/Ubuntu
- scp: ssh: connect to host xxxx port 22: Connection refused Error
- Check SSH/OpenSSH version Command
- Execute .bin and .run file Ubuntu Linux
- What does apt-get update command does?
- How to ls command to output one entry per line [macOS/Linux/Bash]
- 3 ways to clear screen on Linux Terminal
- How to backup a file in Linux/Unix
- How to quit or exit SFTP Prompt on Terminal
- How to use SCP Command to Copy Directory
- zsh hello world example
- How to remove/delete a directory in Linux/macOs
- Java - Calculate time taken for the code to execute in milliseconds or nanoseconds - Java
- Is Facebook is down? Is it just for me? - Facebook
- Create Custom Toast Android Programming - Android
- [FIX] AndroidRuntime: FATAL EXCEPTION: main - java.lang.RuntimeException NullPointerException - Android
- PHP Base64 encoding decoding a variable - PHP
- Java was started but returned exit code=13 [Eclipse] - Eclipse
- Error 404 Tomcat homepage http://localhost:8080/ not displayed - Tomcat | s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662562106.58/warc/CC-MAIN-20220523224456-20220524014456-00274.warc.gz | CC-MAIN-2022-21 | 2,756 | 41 |
http://lists.linuxtogo.org/pipermail/openembedded-devel/2007-October/003319.html | code | [oe] [doc] defining OpenEmbedded
hacker at klever.net
Wed Oct 24 12:47:24 CEST 2007
> In the first case, the term local.conf implies a configuration file
> that makes a program work correctly on a local machine. OE uses the
> file local.conf to define the top level build parameters for a bitbake
> build. That is pretty confusing. It would be more clear if
> local.conf was called build.conf.
The whole OE is about *building* stuff, so calling it 'build.conf' is
redundant, while 'local.conf' is quite explanatory because it contains
the data local to this particular build.
> In the second case referring to OE as a collection of metadata is
> confusing. Metadata is data about the data. OE is actually a
> collection of patches, task lists, and configuration files. I was
> wondering if it would be more clear to refer to oe as either a ruleset
> or task lists.
Well, the "data" are packages themselves, so
OE actually contains metadata, that is the information on where to
retrieve the data from and how to handle it to produce code. I'm not
sure if it's the perfect term, though, but is there real need to change it?
More information about the Openembedded-devel | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368705618968/warc/CC-MAIN-20130516120018-00038-ip-10-60-113-184.ec2.internal.warc.gz | CC-MAIN-2013-20 | 1,167 | 21 |
http://www.votemeyo.com/en/topic/722/Drunk-driver-crashes-into-Ferrari-Showroom-and-escapes! | code | This video was send to me and we could not figure out who the owner of this video is! If you are the person who filmed this please contact me if you would like me to remove this video or how to give you credit for this video!
What happened here?
Apparently a drunk driver crashed his car into the famous and only Ferrari Showroom in Doha- Qatar. This video was shot seconds after the driver hit the showroom. The driver then decided to drive out of the showroom again and escape.
As you can see the security man tried to stop him but there was no chance. | s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593657131734.89/warc/CC-MAIN-20200712051058-20200712081058-00499.warc.gz | CC-MAIN-2020-29 | 554 | 4 |
https://www.paulhite.com/2010/03/procrastinators-recipe-for-great.html | code | I'm currently at step 6, and so was born this post.
1. Remove one great idea from brain. Put aside for several weeks.
2. Try really hard to remember what that great idea was. Decide on a different mediocre idea instead and write it down this time.
3. Let the idea simmer until one week before the project is due. Victory will taste sweeter this way.
4. Start preparing project paper. Don't research anything, it just slows you down. Stream of consciousness is most effective. Continue until you run out of thoughts, or approximately 500 words into the paper.
5. Ctrl+A, Delete. Repeat Step 4, that introduction page sucked anyways.
6. Mix 1 part great idea with 9 parts alcohol. Maintain the Balmer Peak for 72 hours and write 30 pages of really awesome sounding techno-babble.
7. Suddenly remember that great idea when you sober up. Repeat step 5 & 6.
8. Remove project paper from hard drive. Serve to reviewers at room temperature and really hope that none of them actually knows what "deep packet inspection" means.
9. Celebrate your success by repeating step 6. Great idea is optional at this point.
That's it. Good luck out there, WGU grads!
One of the things I hear often said, and something I subscribe to as well, is the idea that a lot of technical knowledge in the world of IT ...
After completing an Exchange 2007 > 2013 migration recently, I was left with one issue that was preventing us from stamping the project...
While testing an SMTP connection to AOL's mail servers, I got this awesome syntax error response when I forgot to put a space between &q...
UPDATE: Turns out this is a known issue during the 1.5 > 5.1 VSM upgrade and a fix should be released in an upcoming patch. That's ... | s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100287.49/warc/CC-MAIN-20231201120231-20231201150231-00731.warc.gz | CC-MAIN-2023-50 | 1,704 | 15 |
https://dataninjago.com/2021/08/09/setup-a-dockerised-spark-development-environment-with-vs-code-and-docker/ | code | Databricks is not cheap, especially when I need to use it for my personal R&D work (where unfortunately money has to be taken from my own pocket). Therefore, I have been developing in a dockerised Spark environment since a while ago and I found this way actually works well. Here I list the steps to set the environment up with VS code and Docker.
1. Setup VS code remote development in Docker containers
Please refer to this guide for setting up VS code remote development in Docker containers. In addition, the docker-compose needs to be installed as well.
2. Setup base Spark cluster docker images
There are a number of open-source Spark cluster docker images available online that can be used as the base for our dev environment. After the hand-on tests, I found this one from André Perez suits best that consists of a Spark base image, Spark master image, Spark worker image, and a JupyterLab image. A simulated Hadoop distributed file system is also configured as the storage.
Apart from the Dockerfile image files, there are also a build.sh and a build.yml for configuring and building the images. In addition, a docker-compose file is provided to run up the cluster.
3. Customise the Spark cluster
We can then customise the Spark cluster to suit the requirements of our dev environment. To give an example, here is a list of customisations I made for my dev environment:
Add additional components/services required for the development, such as Microsoft SQL Server (docker image), Hadoop (docker image), OpenLDAP (docker image). You can add the build commends of those additional images to the build.sh and build.yml scripts to simplify the image build process. In addition, you need to add entries (corresponding to each image) in the docker-compose file.
Customise the JupyterLab container as the primary dev container. The Dockerfile of JupyterLab image already contains the installations of the necessary libraries for Spark development. You can install the additional libraries required for your development by extending this Dcokerfile. For example, I have added pyodbc to connect to mssql, SparkJDBC jar to connect to Spark Thrift Server, and the requirements.txt file containing all the dependency Python libraries I need.
COPY docker/jupyterlab/requirements.txt /opt/req/requirements.txt COPY docker/jupyterlab/jdbc/SparkJDBC42.jar /opt/req/SparkJDBC42.jar RUN curl https://packages.microsoft.com/keys/microsoft.asc | apt-key add - && \ curl https://packages.microsoft.com/config/debian/9/prod.list > /etc/apt/sources.list.d/mssql-release.list && \ apt-get update && \ ACCEPT_EULA=Y apt-get -y install msodbcsql17 && \ apt-get -y install unixodbc-dev && \ pip3 install pyodbc && \ pip3 install -r /opt/req/requirements.txt ENV CLASSPATH /opt/jdbc/drivers/SparkJDBC42.jar
4. (Optional) Push images to Azure Container Registry
Please refer to this doc.
5. Build images
Extend the build.sh and build.yml to include the entries for the additional images you have added, and then run build.sh shell file.
6. Mapping source file folder to the working folder in dev container
Map your source file folder (in your local machine) to a folder in the dev Docker container (extended from the original jupyterlab container) by configuring “volumes” of the dev container entry in your docker-compose file.
7. Run docker-compose up to start containers
8. Attach VS code to the dev container
Start VS code window, open the “command palette”, and select “Remote-Containers: Attach to Running Container…”.
After the VS code window is attached to the dev container, install “Python Extension for Visual Studio Code” (Install inside the dev container, not the local host machine).
Open the working folder you mapped in step 6.
Then you have the dev environment in docker container where you can author, run, debug your code.
Here is the code for creating a SparkSession instance with the support of Delta Lake. | s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500983.76/warc/CC-MAIN-20230208222635-20230209012635-00377.warc.gz | CC-MAIN-2023-06 | 3,926 | 24 |
https://www.osgrove.com/budgie-desktop-10-9-released-redesigned-bluetooth-initial-wayland-port/ | code | Budgie desktop announced the new 10.9 release this Monday! See what’s new in the free open-source desktop environment.
Budgie is a popular desktop environment that default in Ubuntu budgie, and optional in Debian, Fedora, Arch, Manjaro Linux, etc.
The most recent version 10.9 was released few days ago. It features initial port to Wayland, which is already default in Ubuntu, Fedora Workstation, and other Linux (such as Debian 12) with recent GNOME desktop.
It adopts XFCE’s libxfce4windowing library to make the transition from X11 to Wayland. And, in the release the
Show Desktop applet,
Alt+Tab window switcher, and
Workspace applet have been ported to the new library.
Budgie 10.9 also takes into use the budgie-session. It’s a softish fork from GNOME session 44.x.
As you may know, GNOME is going to drop X11 session. The developer, Jordan Petridis, has submit the request in project page. To retain the X11 session until switch Budgie to being Wayland-only, the budgie-session is being in use to take place.
Another change in the release is the redesigned bluetooth applet. Instead of using an older version of gnome-bluetooth, the applet now directly communicates to BlueZ and UPower over D-Bus.
And, the applet now provides direct connect/disconnect functionality for paired devices, battery life indicators, as well as functionality for sending files to Bluetooth devices.
How to Get Budgie Desktop 10.9
For more changes about the new desktop release, see the official release note.
To get the new desktop release, it’s better to wait your Distribution to package the updates. And, Arch Linux has already done the job.
For Ubuntu users, just keep an eye on the Ubuntu Budgie Team PPA. | s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947475701.61/warc/CC-MAIN-20240301193300-20240301223300-00356.warc.gz | CC-MAIN-2024-10 | 1,703 | 15 |
https://draaijeronassessmentandtesting.wordpress.com/2012/04/09/innovative-multiple-choice-in-formative-tests/ | code | - Answer Untill Correct (AUC) – test-taker selects answer, then receives feedback if correct or not, if not –> test-takers selects next answer etc.: http://www.epsteineducation.com/home/about/how.aspx
- Discrete Option Multiple Choice (DOMC) – test-taker is only shown one answering option of an mc question at a time, student must select correct answer when it is displayed: http://goo.gl/9ptvx
- Certainty Based Marking (CBM) – test-taker must provide certainty level of being correct for each option in an mc question: http://www.ucl.ac.uk/lapt/index.htm
- NEW! Confidence Based Marking – seems an interesting variant of Certainty Based Marking (but uses the old term of Gardner-Medwin for it unfortunately) – first, the test-takers only sees the stimulus, then rates confidence of being able to answer correctly, then is presented all options and then selects the correct option: http://goo.gl/fa6rf
- Number right elimination testing (NRET) – a variant of elimination testing (ET) – mark incorrect answers, mark correct answer and provide certainty level for it: http://www.ifets.info/journals/14_4/10.pdf
- Liberal (Free-Choice) Multiple-Choice Tests – test-taker may select any option of an mc question but correct option is awarded 3 points, any incorrect selected option is awarded -1 point. Main idea: System discourages guessing: http://pareonline.net/pdf/v11n8.pdf, try it at https://quizslides.com/#0/6
So many ideas! | s3://commoncrawl/crawl-data/CC-MAIN-2018-26/segments/1529267867304.92/warc/CC-MAIN-20180624234721-20180625014721-00571.warc.gz | CC-MAIN-2018-26 | 1,448 | 7 |
http://webdolum.com/error-retrieving-configuration-from-database-for-server/ | code | RECOMMENDED: If you have Windows errors then we strongly recommend that you download and run this (Windows) Repair Tool.
As we develop, test and deploy SSIS packages, we need to specify different parameter values for things like database connection strings, file and folder paths, etc.
The Messaging Engine failed to retrieve the configuration from the database. Details:"80070057". BizTalk Server >. Error BizTalk Server 5641.
Windows client doesnt get his config pushed does any one know a solution? [09:44:35] Remote server acces..ok [09:44:35] Connecting
Did this article provide the information you were looking for? Every comment submitted here is read (by a human) but we do not reply to specific technical questions.
Jun 27, 2016. Error retrieving remote configuration file. Error connecting to Central. Overview. This article addresses the following error that appears on the Remote Control Console when connecting to the DameWare Central Server: Error retrieving remote. Cause. This can occur when the database is corrupted.
How To Solve Soc 7 Error In Production Debugging: 7 steps to fix an error. with 3 comments. Log is the developer's best friend when it comes to find errors in a production environment, There is a production file which has millions of records in it.The program that uses it ends up with an SOC7 abend.It is sure that the abend is due
Do you have Excel installed on the server? The interop interfaces you’re using are used to automate Excel which requires that the Excel application is installed there.
The site database can use the default instance of a full installation of SQL Server or SQL Server Express. SQL Server must be located on the site server computer. A SQL Server cluster in a Network Load Balancing (NLB) cluster.
Apr 5, 2013. Known to apply to the following Sophos product(s) and version(s) PureMessage for Microsoft Exchange 3.1.0 PureMessage for Microsoft Exchange 3.1.1 PureMessage for Microsoft Exchange 3.1.2. Cause. Within the Sophos PureMessage Config directory there will be a folder 'LastKnown_Old'.
Use this topic to troubleshoot problems that you experience when connecting to a report server. This topic also provides information about "Unexpected error" messages. For more information about data source configuration and configuring report server connection information, see Specifying Credential and Connection.
The most frustrating part is users can’t create Xcode Bots with Xcode Server.
Ms SQL Girl | Retrieving SQL Server 2012 Evaluation. – There are a number of ways to retrieve SQL Server 2012 Evaluation Period Expiry Date. In SQL Server 2012, the evaluation expiry date is not listed on the About dialog.
The full error text is: "The report server cannot open a connection to the report server database. The logon failed. connection. For more information, see Configure a Report Server Database Connection (SSRS Configuration Manager). +.
let’s take a look at the configuration we need inside SQL Server to use the.
The BlackBerry Enterprise Server suddenly loses connection to the BlackBerry Configuration Database on a Microsoft SQL Server instance. The issue may occur.
an error occurred while retrieving. , as I still get the error: an error occurred while retrieving the. when connecting same database server.
Jun 19, 2017. The following error is displayed on the additional web server or on the Orion Web Console after upgrading to NPM 12.1: There was an error retrieving licensing details from the Orion server License is. Run the Configuration Wizard on the additional web server if the host name is not displayed on the table.
SQL Server 2008 Error Messages 1-5000 – Experimental. – An Open Source C# web crawler with Lucene.NET search using SQL Server 2008/2012/2014/2016/CE An Open Source C# web crawler with Lucene.NET search using MongoDB.
There was an error retrieving the configuration, can not process this page. After upgrade to. After the update, when I go to edit Data Inputs, I am confronted with the following error message on a red background. I'm running on Splunk 6.3.1 with DB Connect version 1.1.6, and DB Connect v2 version 2.1.0.
I'm getting "Messaging engine failed to retrieve the configuration from the database BizTalk. configuration and got below error. server with that. | s3://commoncrawl/crawl-data/CC-MAIN-2018-30/segments/1531676590169.5/warc/CC-MAIN-20180718115544-20180718135544-00441.warc.gz | CC-MAIN-2018-30 | 4,288 | 21 |
https://www.jstage.jst.go.jp/article/transcom/E104.B/9/E104.B_2020FGP0003/_article/-char/en | code | 2021 Volume E104.B Issue 9 Pages 1110-1119
This paper presents the physical-layer cell identity (PCID) detection probability using the narrowband primary synchronization signal (NPSS) and narrowband secondary synchronization signal (NSSS) based on the narrowband Internet-of-Things (NB-IoT) radio interface considering frequency offset and the maximum Doppler frequency in the 28-GHz band. Simulation results show that the autocorrelation based NPSS detection method is more effective than the cross-correlation based NPSS detection using frequency offset estimation and compensation before the NPSS received timing detection from the viewpoints of PCID detection probability and computational complexity. We also show that when using autocorrelation based NPSS detection, the loss in the PCID detection probability at the carrier frequency of fc =28GHz compared to that for fc =3.5GHz is only approximately 5% at the average received signal-to-noise ratio (SNR) of 0dB when the frequency stability of a local oscillator of a user equipment (UE) set is 20ppm. Therefore, we conclude that the multiplexing schemes and sequences of NPSS and NSSS based on the NB-IoT radio interface associated with autocorrelation based NPSS detection will support the 28-GHz frequency spectra. | s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652663011588.83/warc/CC-MAIN-20220528000300-20220528030300-00438.warc.gz | CC-MAIN-2022-21 | 1,275 | 2 |
http://www.briggsoft.com/docs/pmavens/Server_Language.htm | code | The Language tab contains a complete list of Client Module captions and messages that can be customized in virtually any Unicode-compatible language. It also contains a toolbar for importing and exporting language files and resetting captions back to their default English values.
Import - Click this button to load a previously saved language file. The values in the file will overwrite the current settings.
Export - Click this button to backup the current language settings to a language file. Values are saved in XML format.
Edit - Click this button to edit the selected property value in the list below the toolbar. You can also double-click a property value directly or press the Enter key to invoke the value editor.
Search - Click this button to display the search menu.
New search - Displays a dialog to enter a search string.
Search again - Repeats the last search, starting at the next row.
Validate settings - Displays 3 lists of validation information. The first list will show the settings that are missing any placeholder variables (%1%, %2%, etc.) that were in their default English values. The second list will show the settings that still have their default English values and the third list will show the settings that are not set to their default English values.
Reset - Click this button to display the reset menu.
Reset selected - Resets only the selected items back to their English defaults.
Reset all - Resets all values back to their English defaults.
The property editor contains a list of language settings, grouped into several sections that describe the part of the client module where they are used. To edit a property value, either double-click it or select it and then click the Enter key on your keyboard or the Edit button on the toolbar. When a property is selected in the list, a brief description of it is displayed in the yellow box just below the list with the default English value in blue.
Note that most of the menu captions, button labels and column headers have a fixed amount of space available to be displayed in the client so be mindful of that when entering translations. You may need to abbreviate some items.
Items with numbers in between percent signs (%1%, %2%, etc.) are placeholder variables. These are replaced with applicable names and numbers at runtime and therefore must appear in your translated settings also. Use the Validate function on the Search menu to make sure you did not miss any.
You cannot change language properties while the game server is online.Help Index | Home Page | s3://commoncrawl/crawl-data/CC-MAIN-2018-09/segments/1518891812306.16/warc/CC-MAIN-20180219012716-20180219032716-00541.warc.gz | CC-MAIN-2018-09 | 2,544 | 15 |
http://www.hammockforums.net/forum/showthread.php/28941-DL-vs-SL?s=6f21f28b2cd3d91f334c0babd45ad1c9&p=413662 | code | I'm trying to decide on my first hammock and need some advice. I'm looking at either the dl1.0 or sl1.7. I weigh 170 lbs so I should be OK with either I think. I'm just not sure if I need the DL since I think I'll probably use an UQ.
But then I start thinking that since I'm new to hammocks maybe the DL would be more versatile if I decide to use a pad.
Also I see the dl1.0 is made overseas. I read all the thread about this and I'm OK with it but worry that I'll have a harder time reselling it if I don't like it, particularly if they start being made domestically some time in the future
Any input is appreciated. | s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917122629.72/warc/CC-MAIN-20170423031202-00494-ip-10-145-167-34.ec2.internal.warc.gz | CC-MAIN-2017-17 | 617 | 4 |
http://toby.li/about-me/ | code | Hi I’m Toby : )
I’m a PhD Student at Human-Computer Interaction Institute (HCII) at Carnegie Mellon University with research interests in human-computer interaction, intelligent software agents, demonstrational interface and interaction techniques. My advisor is Dr. Brad A. Myers. My current research focuses on designing and developing the next generation of smartphone intelligent software agent that can learn to use any arbitrary 3rd party app with the user’s instruction. My work is supported by a Yahoo! Fellowship as a part of the InMind project.
Prior to joining CMU, I received my B.S. degree at the University of Minnesota where I worked with Dr. Brent Hecht at GroupLens Research. My past experience includes co-authoring the WikiBrain software library – an open-source Wikipedia research software framework that implemented and improved state-of-art Wikipedia-based text mining, semantic relatedness, information retrieval and spatial computing algorithms. A paper describes Wikibrain was published at WikiSym 2014.
I was the Lead Student Researcher and Head Developer of Atlasify, a novel information retrieval / interactive visualization system aiming at providing a new way of doing exploratory search. Since its beta release in June 2015, Atlasify has acquired thousands of active users and been featured on medias like Wired, Phys.org and ACM Newsletter.
I’ve also done work in evaluating Tobler’s First Law of Geography using Wikipedia-based natural language processing techniques (preliminary results published in ACM SIGSPATIAL ’14), geo-visualization and spatialization, exploratory spatial information retrieval and the socioeconomic bias of peer-production systems (see research for details)
When not doing research, I enjoy competitive programming. My team was ranked 6th in 2013 and 17th in 2012 out of 200+ teams in the ACM/ICPC International Collegiate Programming Contest North Central North America Regional. | s3://commoncrawl/crawl-data/CC-MAIN-2019-35/segments/1566027313803.9/warc/CC-MAIN-20190818104019-20190818130019-00528.warc.gz | CC-MAIN-2019-35 | 1,952 | 6 |
https://botchat.website/economical-chatbot-online-additional-info.html | code | Interestingly, the as-yet unnamed conversational agent is currently an open-source project, meaning that anyone can contribute to the development of the bot’s codebase. The project is still in its earlier stages, but has great potential to help scientists, researchers, and care teams better understand how Alzheimer’s disease affects the brain. A Russian version of the bot is already available, and an English version is expected at some point this year.
A representative example of a chat bot is A.L.I.C.E., brought to artificial life in 1995 by Richard Wallace. The A.L.I.C.E. bot participated in numerous competitions related to natural language processing evaluation and obtained many honors and awards, and it is also worth mentioning that this chat bot won the Loebner Prize contest at least three times, it was also part of the top 10 at Chatterbox competition, and won the best character/personality chat bot contest.
In a particularly alarming example of unexpected consequences, the bots soon began to devise their own language – in a sense. After being online for a short time, researchers discovered that their bots had begun to deviate significantly from pre-programmed conversational pathways and were responding to users (and each other) in an increasingly strange way, ultimately creating their own language without any human input.
One pertinent field of AI research is natural language processing. Usually, weak AI fields employ specialized software or programming languages created specifically for the narrow function required. For example, A.L.I.C.E. uses a markup language called AIML, which is specific to its function as a conversational agent, and has since been adopted by various other developers of, so called, Alicebots. Nevertheless, A.L.I.C.E. is still purely based on pattern matching techniques without any reasoning capabilities, the same technique ELIZA was using back in 1966. This is not strong AI, which would require sapience and logical reasoning abilities.
However, the revelations didn’t stop there. The researchers also learned that the bots had become remarkably sophisticated negotiators in a short period of time, with one bot even attempting to mislead a researcher by demonstrating interest in a particular item so it could gain crucial negotiating leverage at a later stage by willingly “sacrificing” the item in which it had feigned interest, indicating a remarkable level of premeditation and strategic “thinking.”
Please check out our main directory with 1376 live chat bot examples (an overview as maintained by developers themselves), our vendor listing with 256 chat bot companies and chat bot news section with already more than 370 articles! Our research tab contains lots of papers on chat bots, 1,166 journals on chat bots and 390 books on chat bots. This research section also shows which universities are active in the chat bot field, indicates which publishers are publishing journals on humanlike conversational AI and informs about academic events on chat bots. Also, check out our dedicated tab for awards, contest and games related to the chat bot field, various forums like our AI forum by chat bot enthusiasts and add any chat bot as created by yourself and your colleagues to our chat bot directory. Please do not forget to register to join us in these exciting times.
Since 2016 when Facebook allows businesses to deliver automated customer support, e-commerce guidance, content and interactive experiences through chatbots, a large variety of chatbots for Facebook Messenger platform were developed. In 2016, Russia-based Tochka Bank launched the world's first Facebook bot for a range of financial services, in particularly including a possibility of making payments. In July 2016, Barclays Africa also launched a Facebook chatbot, making it the first bank to do so in Africa.
Several studies accomplished by analytics agencies such as Juniper or Gartner report significant reduction of cost of customer services, leading to billions of dollars of economy in the next 10 years. Gartner predicts an integration by 2020 of chatbots in at least 85% of all client's applications to customer service. Juniper's study announces an impressive amount of $8 billion retained annually by 2022 due to the use of chatbots.
An Internet bot, also known as a web robot, WWW robot or simply bot, is a software application that runs automated tasks (scripts) over the Internet. Typically, bots perform tasks that are both simple and structurally repetitive, at a much higher rate than would be possible for a human alone. The largest use of bots is in web spidering (web crawler), in which an automated script fetches, analyzes and files information from web servers at many times the speed of a human. More than half of all web traffic is made up of bots.
Chatbot, when it plays its role as a virtual representative of an enterprise, is widely used by businesses outside of the US, primarily in the UK, The Netherlands, Germany and Australia. Additionally, the usage of this term is quite popular amongst amateur AI enthusiasts willing to spend vast amounts of time on their own intelligent creations (with diverse outcomes).
The simple fact of the matter is that, as an Internet marketer, you need something better than artificial link building and pages of useless, jumbled nonsense to get long-lasting traffic referrals from major search engines such as Google, Bing and Yahoo. Google in particular pays special attention to your visitors' behavior. So if visitors are quickly navigating elsewhere because your site is full of junk content, then you will get fewer traffic referrals from Google over the long run.
Insomno bot is for night owls. As the name suggests, it is for all people out there who have trouble sleeping. This bot talks to you when you have no one around and gives you amazing replies so that you won’t get bored. It’s not something that will help you count stars when you can’t sleep or help you with reading suggestions, but this bot talks to you about anything.
Interface designers have come to appreciate that humans' readiness to interpret computer output as genuinely conversational—even when it is actually based on rather simple pattern-matching—can be exploited for useful purposes. Most people prefer to engage with programs that are human-like, and this gives chatbot-style techniques a potentially useful role in interactive systems that need to elicit information from users, as long as that information is relatively straightforward and falls into predictable categories. Thus, for example, online help systems can usefully employ chatbot techniques to identify the area of help that users require, potentially providing a "friendlier" interface than a more formal search or menu system. This sort of usage holds the prospect of moving chatbot technology from Weizenbaum's "shelf ... reserved for curios" to that marked "genuinely useful computational methods". | s3://commoncrawl/crawl-data/CC-MAIN-2021-04/segments/1610703581888.64/warc/CC-MAIN-20210125123120-20210125153120-00103.warc.gz | CC-MAIN-2021-04 | 6,985 | 13 |
https://www.illumio.com/blog/decoupling-history | code | Breaking up isn’t always hard to do. Sometimes things run their course, and a relationship outlives its usefulness. Our only regret is not realizing it sooner!
Remember toll plazas?
We used to have to pay tolls in cash to collectors at checkpoints on highway and bridges. It was a terrible bottleneck. Highways are there to get you where you need to go quickly. Tollbooth checkpoints are the opposite of quick. They just slow everyone down.
Enter E-ZPass! Now an RFID chip in a plastic box on your dashboard seamlessly pays the toll for you from the privacy of your car.
RFID and the Internet of Things decoupled toll collection from highway tollbooths. There was a more efficient way to do things. The same holds true for using the network to perform segmentation. It’s the wrong place to do the job, especially as more compute moves outside the network (or the software-defined network) to the cloud.
The network, like the highway, is designed to move packets quickly, even routing around local outages. Segmentation has the exact opposite goal: isolate communications across the network. Just as using the physical highway infrastructure to collect tolls creates traffic jams and defeats the purpose of rapid passenger delivery, trying to do segmentation with network infrastructure can break your applications and even your network.
The upshot: as the pace of business accelerates and becomes more automated, there is a need for segmentation to become automated – and that requires decoupling from the network.
Decoupling application development and delivery
It’s not a new idea. In IT, we’ve seen multiple waves of infrastructure innovation that has enabled us to deliver applications quickly at scale:
- With server virtualization, we decoupled the operating system from the physical layer, slicing up the server into multiple virtual servers, allowing more than one OS per machine.
- With containers, we decouple applications from the OS or the VM.
- With storage virtualization, we’re presented with a logical view of distributed physical storage assets.
What about how we’ve evolved in building applications? It used to be that you had no choice but to DIY from the ground up. Now, we would no sooner start from scratch in creating an application than we would choose the “cash only” toll lane on the highway or ask Netflix to mail us a DVD for a movie we can stream with one click.
Three things have radically changed the notion of how we build software, abstracting layers of complexity to give us more functionality and speed:
- Open Source ecosystem: Now when you look to build an application, you see how much you can get off the shelf because it's already been done by others. Think back to the ’00s when SharePoint was mushrooming as the corporate intranet for storing content and website search exploded. The profitability of enterprise search spawned the pre-Gmail or Gdrive entry of Google into the enterprise with its Search Appliance in 2002, Microsoft’s $1.2B acquisition of FAST Search and Transfer in 2008, plus HP’s $10.3B acquisition of Autonomy in 2011…and eventually its $8.8B spin-off in 2017. What do companies like Netflix, Twitter, and Amazon (and maybe even yours) now use now for search? Open Source-driven alternatives like Apache Lucene, Solr, and Elastic. Why reinvent the wheel?
- APIs let us acquire functionality available elsewhere and connect to apps in a quick, standard way. Developers can leverage fully functional, distributed processes created and maintained by others through APIs. Why duplicate effort?
- Finally, cloud services, provide the function you consume remotely without doing any compute – often through APIs. Why not move towards more distributed, modular functionality?
So now when we want to create new application functionality, we actually don’t build or maintain as much of it ourselves – we’ve decoupled application functionality from software development. Open Source, APIs, and Cloud Services made it possible to scale that process much faster and more reliably, because you can use cloud services, go through an API to get to them, and leverage open source software to build your app – producing deep, rich functionality in a short amount of time.
This is why we talk about monolithic applications becoming more distributed and modular: we’re abstracting functionality to speed it up, decoupling the logical from the physical, and optimizing and centralizing administration.
Decoupling segmentation from the network
Illumio takes a similar approach in decoupling segmentation from the network. You no longer need to rearchitect your network, re-IP everything, cross your fingers and pray that neither the application nor the network breaks with enforcement. Illumio allows you to unlock segmentation from the network:
- Deploy via software that provides logical visibility across your environments (even outside the network).
- Design policy based on business logic and natural language rather than IP addresses.
- Leverage a build/test/enforce model for implementation rather than risking network downtime.
- Enforce policy beyond the network path across cloud, containers, and dynamic applications – wherever they run.
When you try to get everything out of one platform, it often doesn't give you the best results. But if you think about it, many times (in life and in technology) when you decouple functionality or different problem solutions from an underlying platform, you actually run the platform better and get faster solutions.
Illumio customer Plantronics decoupled for this very reason:
“Every time we added another virtual machine or another service, we had to reconfigure our security, which meant a huge amount of time spent on static security configurations within a very dynamic environment. Illumio represents a transformational approach to providing security for the cloud.
When we became familiar with Illumio’s solution we got quite excited, because of its ability to set the right profile, and then as more machines come and go within our cloud, Illumio grows with them and eliminates all of that static configuration time – all the while providing even more protection than we were seeing with other solutions.”
Thinking about making the move? Try our Test Drive or attend our webinar on decoupling segmentation from the network. | s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296948951.4/warc/CC-MAIN-20230329054547-20230329084547-00118.warc.gz | CC-MAIN-2023-14 | 6,369 | 30 |
https://careerssearch.bbc.co.uk/jobs/job/Software-Engineer-iBL-AWS-node-graphQL-Restful-TDD-iPlayer/34164 | code | Software Engineer - iPlayer (AWS, node, graphQL, Restful, TDD) - iPlayer
This is an amazing opportunity to work in iPlayer - one of the UK’s most well-known and loved products.
Our mission is to be the future of BBC TV and a key part of that is to make the iPlayer experience more personalised and unique to each user.
The data backend team is at the heart of this mission. We are iterating our architecture rapidly to support data experimentation to drive more personalisation. While we’re exploring new capability for iPlayer, we have to support millions of requests a day from our Web, Mobile, TV clients through our GraphQL / REST API.
This is an exciting role in a lean agile team who is always iterating and learning. If you’re passionate about data and scalable solutions, this is would be perfect role for you.
The team has high level of autonomy to deliver value for iPlayer. We are constantly exploring ways to take the product forward while keeping iPlayer robust, resilient and performant. So it mainly focus 3 types of objectives:
- Extending the capability of iPlayer via the API
- Meet iPlayer product objectives
- Ensure our solution works at scale and robust
As an engineer and core part of the team, you will be expected to:
- Plan / Design / Develop / Release / Support working software using best practices
- Pair Programme by default
- Work closely with client teams (Product/UX/Engineers) on discovery sessions
Are you the right candidate?
We’re looking for engineer who value team working, embrace learning and passionate about the iPlayer and the product space we’re in.
You will need to have a good foundation of Software Engineering best practices and be able to pick up new skills quickly. We have a great environment to help any engineer to succeed with a pair programming by default to dedicated Fridays for learning and innovation.
We build our scalable REST or GraphQL APIs in node.js. We practice TDD and pair programming. We build internal tools to automate things. We work with Postgres and Redis quite a lot. We’re on the Cloud and practice Continuous Delivery.
This is a place where your work impacts millions of iPlayer users every day. You will have an opportunity to work on software at a scale that is hard to find in the country. We provide you with a great work-life balance and a competitive work package. There is also great opportunity to grow your career within the team or wider organisation. As part of BBC Digital, you will be at the heart of the Internet first BBC. You will also have the opportunity for promotion twice a year as recognition of our fast paced industry.
Our world class Academy is here to ensure you have the training needed to advance in your career from leadership training to technical training such as AWS, cloud architecture and micro-services to name a few.
About the BBC
We don’t focus simply on what we do – we also care how we do it. Our values and the way we behave are important to us. Please make sure you’ve read about our values and behaviours in the document attached below. You’ll be asked questions relating to them as part of your application for this role.
The BBC is committed to building a culturally diverse workforce and therefore strongly encourages applications from underrepresented groups. We are committed to equality of opportunity and welcome applications from individuals, regardless of their background. | s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250606269.37/warc/CC-MAIN-20200122012204-20200122041204-00055.warc.gz | CC-MAIN-2020-05 | 3,422 | 22 |
http://stackoverflow.com/questions/tagged/selling-software+legal | code | Which right should I sell in selling an Android app to a Telcom company to pre-install it on the Android devices they sell?
I developed a local language Android app some time ago & recently a Telcom company in my country gave me an offer to purchase my app in order to pre-install it on the Android devices they sell. ...
I read alot of research related to computer vision and recently came across a paper which had some technology in it which I thought could make a killer iphone application. So my question is, assuming ... | s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386164819343/warc/CC-MAIN-20131204134659-00076-ip-10-33-133-15.ec2.internal.warc.gz | CC-MAIN-2013-48 | 525 | 3 |
https://spring.io/blog/2018/02/07/ | code | Dear Spring Community!
It’s my pleasure to announce today a new project in the Spring Cloud family. It’s called
Spring Cloud GCP and its goal is to bring into your applications well-known Spring patterns and Spring Boot conventions for consuming Google Cloud Platform services.
The project currently is in version
1.0.0.M2 and is available from the Spring Milestone Repository:
<dependencyManagement> <dependencies> <dependency> <groupId>org.springframework.cloud</groupId> <artifactId>spring-cloud-gcp-dependencies</artifactId> <version>1.0.0.M2</version> <type>pom</type> <scope>import</scope> </dependency> </dependencies> </dependencyManagement> | s3://commoncrawl/crawl-data/CC-MAIN-2019-13/segments/1552912203491.1/warc/CC-MAIN-20190324190033-20190324212033-00432.warc.gz | CC-MAIN-2019-13 | 653 | 6 |
https://zilingyuying.wordpress.com/about/ | code | To my dearest daughters,
Mummy is a strong believer of “learning doesn’t end when we leave school.”
Just want to share some thoughts, my experience, things I learn, especially for those that are not taught in school with you during my life in this world.
Hopefully this will help to nurish your wisdom and broaden your view and mindset.
Wish you have a beautiful and happy life.
To my sisters, brothers, friends, parents, teachers,
I understand also that life is hectic and a lot of time we don’t have enough time to read. To learn from reading new things in parenting, in education, and even to evaluate books that our children read.
I am sharing what I have read, things, articles, books that I find good (I am tempted to share those that are bad also, but then, again, it’s very subjective and I think I should respect the authors, so I try not to ‘complain’ here).
Again, just sharing. Life long learning and life long sharing. | s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917127681.50/warc/CC-MAIN-20170423031207-00222-ip-10-145-167-34.ec2.internal.warc.gz | CC-MAIN-2017-17 | 945 | 9 |
https://devpost.com/software/spitfire | code | My bud Micah and I were working on a coding project. Micah raps a lot and produces music, so while we were staying up late he kinda mumbled lyrics and we referenced rap songs a lot. I tried freestyling myself during my trips to and from home, but I always had to pace myself and I couldn't think of rhymes in a reasonable time. So I suggested to Micah that we might work on something like that, and started writing it in python. We met Nishanth and Rahul and they loved the idea and turned out to be node geniuses so we decided to team up and hammer it out.
What it does
It's simple! It takes a line you say and gives you words to rhyme with it making for a sleek creative experience.
How WE built it
Haha. We had it pretty well planned out and divided up the roles and helped each other. Nishanth was the best at web stuff, but helped us and distributed tasks so that we were always working on something.
Challenges WE ran into
We couldn't get rhymes fast enough! The original dictionary that we used contained 130k words, and to generate a quick algorithm we had to find a way to cope with the slow speed. We tried making a gigantic hash table, but using the libraries we had, it would've taken 18 hours on our machines, and we didn't want to experiment with multi threading the code because we weren't sure we had enough time to experiment with distribution. We solved it by filtering out words by common use frequency.
Accomplishments that I'm proud of
WE FINISHED IT. WE WORKED TOGETHER. EVERYONE CONTRIBUTED. TEAMMATES ARE NICE, TALENTED, AND HARD WORKING!
What I learned
What's next for Spitfire
Data Mining Improving word prediction Improving sentence ending | s3://commoncrawl/crawl-data/CC-MAIN-2020-10/segments/1581875145438.12/warc/CC-MAIN-20200221014826-20200221044826-00159.warc.gz | CC-MAIN-2020-10 | 1,666 | 12 |
https://rog-forum.asus.com/t5/rog-gaming-notebooks/tricky-g74sx-windows-7-reinstall-solved/td-p/755440 | code | I've got what seems to be a fairly unique situation and it is driving me crazy. I just got a G74SX. It came with win7 ultimate which was (apparently) a business bulk upgrade. There is a win 7 home premium oem sticker too. I picked up a SSD which is blazing fast (went from 1:40 boot time to 0:24!) I tried doing a recovery onto the new SSD but got the blue screen with the note that windows 7 is not valid (or something to that effect.) I tried doing a disk image but it just hung on Setting Up Desktop. So I downloaded win7 ultimate off of a torrent site but now I can't activate it because my key is for premium and my ultimate key is an ID, not a key. I looked for a win7 premium oem edition (just learned that the oem key won't work on regular software) but no half reputable torrent site has it. | s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296818464.67/warc/CC-MAIN-20240423033153-20240423063153-00887.warc.gz | CC-MAIN-2024-18 | 800 | 1 |
https://community.spiceworks.com/topic/28792-auto-updates-in-win-xp | code | is there anybody out there that can give me a list of pro and cons of having automatically updates de-activated in a network?
How long should I let a computer without automatically updates run before I as administrator, upgrades that computer.
The OS is Windows XP SP2 on our network computers.
Thanks in advance for your comments.
if those computers are not used in an internet connected environment you are fine with a service pack less installation (= original win xp) or even windows 98 ;-)
no need for security measures as well thus no worries with permissions or malfunctioning software due to the user not being an administrator
just joking offcourse
if the computers are used for surfing the internet or receiving mails with outlook or outlook express or any other html aware mail client then up2date is the only way to go
lately there are so many exploits for recent patches that running an unpatched or a not entirely up2date system is a ticking bom in your network
pro is that you have no need for bandwidth or patch management software and no need for testing applications to see if they still work after a patch cycle
it is not so difficult to keep windows computers up2date with the use of wsus so why would you choose not to?
you can also download the iso with the most recent patches if you do not have a decent internet connection or a server in the network and go around patching all pc's manually
you can built custom windows media with Ryan VM or nLite so that a newly installed computer is already up2date on installation
make a decision based on what gives you the most work, keeping everything up2date or clean up after an exploit wrecks the network.
I keep everything up2date myself and never had any troubles with it but I do look into the details of the patches to see if I can expect troubles with the applications used on the systems I manage
ok many thanks for info, I guess WSUS will be the key to success!
The only problem I found about WSUS is that my test users never achieve a 100% update, it stops at 96-99% for almost every computer. But I guess that has to do with my lack of knowledge....
WSUS is good for environments with proprietary applications that are business critical, like really really old 16-bit inventory software, for example. What you do is run a "lab" and deploy new updates to that first and make sure the criticial functions still work on your systems. Once you verify your systems continue to run (or hobble as it may be) you can release the update to the rest of your network.
WSUS is also nice for keeping all your workstations equally up-to-date, rather than mixing SPs or anything gnarly like that.
Cons of not managing it is just that - it's not managed. I'd rather take the time every second Tuesday of the month (http://en.wikipedia.org/wiki/Patch_Tuesday) and settle the differences between my network's update server and Microsoft's - rather than trusting users to report "the little yellow shield", or checking them all myself. I guess if I had to I could probably have spiceworks do this for me anyway, but WSUS is the way I suggest you go.
Either way, WSUS is a valuable skill to possess if nothing else.
Many years ago I was once under the false belief that if I hardened the exterior of my network, I wouldn't have to worry about the interior. And I was very diligent to ensure all machines with internet access or internet connectivity ran AV, anti-spyware, latest patches etc. But then one day along came the Blaster worm written to take advantage of an exploit in DCom. Unbeknownst to me, one of the networking guys had added a machine to the internet subnet and this machine was not patched and somehow norton AV had locked up on it. This machine became the gateway into our internal network and suddenly I had 500+ machines infected by the blaster worm, each requiring manual intervention to patch the exploit and remove the worm. It was shortly after that we picked up WSUS and, despite the small pains one incurs from using this free but somewhat "light" version of patch control and having to manually approve the ones you want to roll out, it's well worth it to know we are unlikely to experience such a thing again in the future.
Learn from our lesson: patch ALL your machines! | s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886105334.20/warc/CC-MAIN-20170819085604-20170819105604-00678.warc.gz | CC-MAIN-2017-34 | 4,257 | 23 |
http://lists.mplayerhq.hu/pipermail/ffmpeg-user/2012-July/007839.html | code | [FFmpeg-user] Speed differences, was: The Magic Microsecond
phpdev at ehrhardt.nl
Sun Jul 8 20:18:33 CEST 2012
Andy Sheen in gmane.comp.video.ffmpeg.user (Sun, 08 Jul 2012 18:59:00
>I am seeing a problem in zeranoes latest build (same as your test in
>fact) where the CPU jumps to 100% and ffmpeg freezes (frame number
>stops, time position freezes) randomly. The freeze lasts 5+seconds, the
>counter stops and then all of a sudden starts incrementing again. This
>can happen 0 to multiple times during the encode and I have seen
>variations of over 25% in encode times for exactly the same encode
>(machine idle apart from the encode process).
I do not see the spikes happen here, but saw them definitely:
The blue text at the bottom shows the encoder.
Source: Canon HF M306 50i PAFF interlaced file, encoded twice. One of my
most troublesome files...
https://sessiondatabase.net/jwplayer shows an encoded version (with wide
angle lens and all).
More reason to get the master sources and compile them. I will report
More information about the ffmpeg-user | s3://commoncrawl/crawl-data/CC-MAIN-2019-47/segments/1573496668787.19/warc/CC-MAIN-20191117041351-20191117065351-00024.warc.gz | CC-MAIN-2019-47 | 1,055 | 19 |
https://www.computing.net/answers/windows-xp/recyclers-error/175070.html | code | |My PC was recently infected with Vimax malware. Google links redirected to the wrong address. Vimax male-enhancements ads appeared on every website. Worst of all, the malware blocked websites and processes that could help (like malwarebytes.org and system restore, respectively). |
Another error, that I'm not certain is because of the Vimax malware, is that double-clicking drive C: resulted in an error message "RECYCLER\S...." (full title below). To access C: I had to right-click>'explore'.
I decided I needed a clean install of WinXP anyway, so I formatted and reinstalled. My primary drive has 3 partitions, I formatted only C: and installed WinXP (SP2) there.
Now the malware seems to be gone, but the 'RECYCLER\S' error now appears on all of my partitions and drives. Right-click>explore still works to view a drive or partition. The full error is as follows:
"Windows cannot find 'RECYCLER\S-4-4-95-100006377-1000016102-100002504-4989.com' . Make sure you typed the name correctly, and then try again. "
I don't know how to fix this without nuking everything. Can someone help, please? | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171971.82/warc/CC-MAIN-20170219104611-00259-ip-10-171-10-108.ec2.internal.warc.gz | CC-MAIN-2017-09 | 1,095 | 6 |
https://www.upwork.com/o/profiles/users/Graphic-Designer-Cartoonist-Comic-book-illustrator_~01dfb86060d537a7ab/ | code | Hello, I’m Abu Khalid. I’m working as a cartoonist for last 4 year in Odesk/Upwork. During this time I’ve successfully completed various type of projects, including character/mascot designing, comic art, humorous illustrations and many other cartoon comic related work. By working in those project I’ve gained valuable experience, client’s satisfaction and their appreciation. I'm also ranked top 10% individual in Upwork's Adobe Photoshop and Illustrator tests. Cartooning is my passion and I love every bit of it which inspires me to work harder. I believe a job is done only when client is fully satisfied with the result. My goal ... is Client’s satisfaction by providing top quality works.
Abu Khalid has added 43 portfolio pieces. Create an account to review them.
Abu Khalid has more jobs to show. Create an account to review them.
|Name||Score (out of 5)||Time to Complete|
|Adobe Illustrator CS4 Test||4.90||Top 10%||12 mins|
|Principles of Web Graphics Design Test||4.50||Top 10%||11 mins|
|Adobe Illustrator CS5 Extended Test||4.20||Top 10%||20 mins|
|Adobe Photoshop CS3 Test||4.40||Top 10%||21 mins|
|Adobe Illustrator CS3 Test||3.40||Top 20%||15 mins|
|Adobe Photoshop CS4 Test||4.10||Top 10%||12 mins|
|Adobe Photoshop CS5 Extended Test||3.90||Top 30%||11 mins|
|English Spelling Test (U.S. Version)||4.90||Top 20%||25 mins| | s3://commoncrawl/crawl-data/CC-MAIN-2016-07/segments/1454701163421.31/warc/CC-MAIN-20160205193923-00091-ip-10-236-182-209.ec2.internal.warc.gz | CC-MAIN-2016-07 | 1,351 | 12 |
https://davidtjones.wordpress.com/2010/12/20/adding-a-bim2-activity-development-progress/ | code | Okay, so after fixing up the naming problems with bim2 etc, it’s time to actually get the code going.
A list of things to do once I get back online
mod_form.php needs to be modified to use the new editor element for Moodle 2.0
Actually, this looks to have been created by a typo or other problem within the bim2 mod_form.php. It is now working.
Check the location/process for help files.
Seems like in Moodle 2.0, help files are being converted to strings and reside in the language file.
Update lib.php:add_instance to call grade_item_update
- See what Rolley can do about making the bim icon transparent.
When someone chooses to add a bim2 activity into a Moodle course, the first thing they see is the form provided by mod_form.php. I’m hoping/wondering if this can essentially stay the same as that used in bim. So let’s copy that across. No, empty page.
Ahh, I have to get the database for bim2 up and going. Seems the transition to bimTwo as the internal Moodle name for bim2 doesn’t work entirely. The table name regular expression check doesn’t like table names with uppercase characters, so for the tables it will have to be bimtwo
So, the tables are created now. Does the mod_form.php work? No still empty. Something not working here, solving this should be interesting as I’m currently without Internet access. How about commenting out the entire bim2 contents from mod_form.php. Seems the problem is a bit earlier.
~/course/modedit.php is where this is run from, let’s have a look there. Let’s stick some debugging stuff in and find out where we get up to. Or, alternatively you could try running the mod_form.php file through PHP from the commmand line and discover where the syntax error is in the file. i.e.
david-joness-macbook-pro-2:~ david$ php mod_form.php Parse error: syntax error, unexpected ',' in mod_form.php on line 89
This is why, on one-hand, it would be good to be developing in PHP/Moodle more often. I wouldn’t be making so many newbie misassumptions and mistakes.
Ahh, nice, I think. Fixed up the syntax error and no get this error in the browser
Coding error detected, it must be fixed by a programmer: MFORMS: Coding error, text formats are handled only by new editor element.
My immediate assumption here is that this is being caused by the original bim code including some Moodle 1.x specific code around the use of the HTML editor and its inclusion in forms. I’m offline so can’t check the syntax for this, will solve for now by commenting out the offending elements.
Next step is to update the get_string data. This is how Moodle separates text to be displayed on a web page into separate language files. I haven’t updated the bim2 english language file to include the labels used in mod_form.php.
Somewhat related to this are the help files, most of these should be able to come over, at least at the start. Ahh, appears the naming/directory structure may be a little different (or I’ve made a simple tranlsation mistake)
So, the form is basically working (minus the HTML editor field). Can I submit, well no, that’s the next step.
The add_instance function in ~/mod/bimTwo/lib.php defines what should happen when the mod_form.php is submitted. Currently, it is empty/boilerplate. Will have to update it. This is again getting into the area of “Moodle 2 conversion problems”. As the database API is one place I believe that has undergone some change.
Actually, the NEWMODULE stuff looks like it might already have been updated. But I’m getting the error
Coding error detected, it must be fixed by a programmer: moodle_database::insert_record_raw() no fields found.
This is happening in this statement
$bimTwo has the contents from the form, and it all appears good. So, some problem in the insert_record function. Ahh, wonder if this is where the database naming problem crops up, the ‘bimTwo’ that is the first parameter, should probably be without the upper case T
Yep, that appears to have fixed up the original error, now I’m getting Incorrect function. Ahh, wasn’t returning the id. Done. Now a problem Error reading from database I think that may well be another table naming problem.
The error is cropping up when this file is being run. Yep, almost certainly the problem with the different names. Am going to have to revert back to bimtwo as the name for everything.
Yep, that’s fixed it. It is now possible to add a bim2 activity (not that it will do anything useful) to Moodle 2. As you can see in the following image.
And the edit button basically works as well, in that it shows the mod_form.php output yet again and allows changes.
Ahh, but the information about the BIM settings is not being saved from the form to the database. Something is missing. Mmmm, most of the bim specific fields are missing from the basic bimtwo table, have to update that in xmldb. The browser form memory remembers the fields, but it appears that I didn’t hit the magic ‘Save’ in xmldb
Yep, that did it.
Have a lot of clearing up to do when I can get back online.
The next major step, however, is to start implementing the main user interface of bim2. i.e. the process and output that staff and students see when they actually try to use the bim2 activity, rather than simply create it.
It is here where I’m hoping that I will be making the largest changes between bim2 and bim. It’s also where I’m hoping the changes will be worthwhile and not introduce new and interesting problems. | s3://commoncrawl/crawl-data/CC-MAIN-2021-21/segments/1620243991258.68/warc/CC-MAIN-20210517150020-20210517180020-00294.warc.gz | CC-MAIN-2021-21 | 5,472 | 34 |
https://globalcareer.io/remote-jobs/reliability-engineer/ | code | Operating Pyth Network is a nontrivial challenge. Our price feeds run 24×7. DeFi applications depend on the accuracy and availability of these feeds; an inaccurate price or offline feed can cause serious financial losses. Each feed in turn depends on many different services, some of which are run by our data providers and some by us. Itâs a complex system with many different failure modes, but it has to work correctly all the time.
We also run a variety of off-chain services, such as the backend for the pyth.network website, and tools for logging historical data. These services run in a Kubernetes cluster that is managed using Terraform. We also need to ensure these services are running and healthy at all times.
Weâre looking for people to help us operate this system and improve its reliability over time. This job has many different aspects, including providing front-line support for incidents, developing automation to manage our infrastructure, and defining deployment plans for high availability.
About us and the Job
- We are a small team. About half the team is technical; the other half manages relationships with data providers, developers, and the broader community. (Building a network requires talking to people!)
- We are mostly remote. Team members live across the world, in the US, Europe, and Asia. We do have offices in some locations (Porto, Chicago, London, Amsterdam, Singapore) for those who prefer in-office work.
- Our team communicates with each other and external developers in English. Strong spoken and written English skills are required.
- We operate like a startup in the rapidly-growing and changing DeFi ecosystem. In order to be successful, we must adapt to meet the current needs of the market. Good candidates will help our organization adapt; they are flexible problem solvers who are willing and able to jump on whatever the occasion demands.
- Most of our software development is open source. You can look at our github repositories to understand what we typically work on.
- We offer a competitive salary and generous benefits package. Furthermore, where applicable, employees may be eligible for token allocations as part of Pyth Networkâs employee incentive program.
What You’ll Do:
- Provide front-line response to incidents and outages, such as unavailable price feeds, or website downtime.
- Develop automation tools to provision and manage our infrastructure, including cloud services and Kubernetes clusters. We currently use Terraform to manage our infrastructure, but weâre not married to it and may use different tools in the future. Some of our tools are written in Python and others in Go.
- Design and implement operational plans to achieve high availability guarantees for our price feeds and web services. Build redundant service deployments, monitoring solutions, dashboards, and alerting tools to ensure that critical services are running continuously. Support services on development and production environments, from before launch through launch. Benchmark application resource consumption to allocate capacity.
- Measure and monitor application metrics (availability, latency, etc.) to understand the health of the system. Work with developers to add metrics and logging to their applications in order to facilitate Grafana dashboards and alerts. Develop logging practices and libraries to standardize metric reporting and alerting across multiple programming languages.
Skills You’ll Need:
- Comfortable developing software. Writing software is a big part of the job, as we write lots of tools to automate processes and monitor deployments.
- Solid understanding of Linux fundamentals, such as processes and permissions, along with an understanding of containers (Docker) and cloud deployments.
- Experience troubleshooting, monitoring and debugging cloud-native applications and distributed systems.
- Ability to handle shared operational and periodic on-call duties
- 1+ years of experience supporting critical production environments. Work in financial and crypto markets is a plus.
- Predictable and reliable availability. | s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296816070.70/warc/CC-MAIN-20240412194614-20240412224614-00595.warc.gz | CC-MAIN-2024-18 | 4,106 | 22 |
http://365daysofstarwars.blogspot.com/2009/03/day-64-of-365-jawa-my-wife-drew-until-i.html | code | Day 64 of 365: A Jawa my wife drew until I upload a dewback
Here is the dewback I promised.
So I had a drawing of a dewback completed for today but my back went out and I did not go into work where the scanner I use is located. What I do have is a drawing of a Jawa my wife did last night. I figured I had to do post something so that you did not think I have quit this blog as I so desperately want.
Please note that this is probably the only drawing I have ever seen my wife make so in that regards it is not too horrible. Also note that I made my wife from a mannequin and a wish so the fact that she can draw at all is downright astounding. | s3://commoncrawl/crawl-data/CC-MAIN-2018-30/segments/1531676590046.11/warc/CC-MAIN-20180718021906-20180718041906-00530.warc.gz | CC-MAIN-2018-30 | 644 | 4 |
http://freecode.com/tags/compiler?page=1&sort=name&with=16&without= | code | FeatureC++ is a C++ language extension that supports Feature-Oriented Programming (FOP). FOP studies feature modularity in program families. The idea of FOP is to build software by composing features. Features are basic building blocks that satisfy intuitive user-formulated requirements on the software system. Features refine other features incrementally. This step-wise refinement leads to a layered stack of features. Mixin Layers are one appropriate technique for implementing features.
JCGO (pronounced as "j-c-go") translates (converts) programs written in Java into platform-independent C code that can be compiled (by third-party tools) into highly-optimized native code for the target platform. JCGO is a powerful solution that enables your desktop, server-side, embedded, mobile, and wireless Java applications to take full advantage of the underlying hardware. In addition, JCGO makes your programs, when compiled to native code, as hard to reverse engineer as if they were written in C/C++. The JCGO translator uses some optimization algorithms that allow, together with optimizations performed by a C compiler, the resulting executable code to reach better performance compared with the traditional Java implementations (based on the Just-In-Time technology). The produced executable does not contain nor require a Java Virtual Machine to execute, so its resource requirements are smaller than that required by a typical Java VM. This also simplifies the process of deployment and distribution of an application.
Java Grinder takes Java byte-code from a class file and compiles it into an assembly code text file that can be assembled and run on microcontrollers and CPUs including MSP430, dsPIC, 6502 (Commodore 64), 68000, ARM, and MIPS. A Java API is provided for dealing with SPI, GPIO, Commodore 64 hardware, and more.
Orc is a library and set of tools for compiling and executing very simple programs that operate on arrays of data. The "language" is a generic assembly language that represents many of the features available in SIMD architectures, including saturated addition and subtraction, and many arithmetic operations.
Shannon is a general purpose stream-oriented programming language; it is concise and yet feature rich. Streams, FIFOs, and Unix shell-style pipes are first-class concepts in the language. You can connect functions and FIFOs within your program similar to the way you connect processes with pipes in the Unix shell. These constructs in Shannon, however, are highly efficient as no true multitasking is involved, and at the same time they allow you to write more concise and readable code for chained data processing. State is a special type of function that returns a reference to its own local data and any nested functions it may have. In effect, states implement classes in terms of OOP, and yet classes per se aren't part of the language. A special type of modules marked as "persistent" is an effective replacement for databases and SQL. This allows you to access persistent shared data using native Shannon constructs, eliminating the need for an extra query language. Intuitive and minimalist syntax and semantics are used. Particularly, "minimalist semantics" means less things to remember and more possibilities. Shannon is statically-typed, although it provides dynamic typing facilities as well.
Theano is a Python library that allows you to define, optimize, and evaluate mathematical expressions involving multi-dimensional arrays efficiently. Theano features tight integration with numpy, transparent use of a GPU, efficient symbolic differentiation, speed and stability optimizations, dynamic C code generation, and extensive unit-testing and self-verification. Theano has been powering large-scale computationally intensive scientific investigations since 2007. But it is also approachable enough to be used in the classroom (IFT6266 at the University of Montreal).
The Aida project is two-fold: it defines a simple common markup language designed to describe structured text, and it implements a compiler that translates the Aida syntax into various target formats (HTML, LaTeX, Trac, Mediawiki, Text, Markdown, and others). The system is fast, flexible, and extensible. The core command, aida, is a strict parser (written using Bison and Flex), which analyzes files written in the Aida Markup Language and invokes callbacks in order to convert them to the target format. It embeds a Tcl language interpreter and the callbacks are written in Tcl. This makes it very easy to extend the library and to define new target formats. Furthermore, the Aida files are highly parameterizable via a header and the entire system is configurable at the admin and at the user level. It is also possible to evaluate Tcl code within an Aida file and thus create dynamic contents.
Larceny is a simple and efficient implementation of the Scheme programming language. Created originally as a test vehicle for research on garbage collection and compiler optimizations, Larceny has grown into a major multi-platform system, and is one of the very few implementations that support all four de facto standards for Scheme: IEEE/ANSI, R5RS, ERR5RS, and the R6RS. Development of Larceny has been supported by NSF, Sun Microsystems, and Microsoft.
teeterl is a lean, portable implementation of Erlang. teeterl starts from a single executable file without any additional harness. teeterl is built using Apache Portable Runtime, a library tested on dozens of OSes and their flavors. teeterl borrows from industry-standard Erlang/OTP, especially when it comes to compiler front-end. teeterl provides the concurrency power of Erlang without any telecom cruft. | s3://commoncrawl/crawl-data/CC-MAIN-2014-15/segments/1397609537186.46/warc/CC-MAIN-20140416005217-00226-ip-10-147-4-33.ec2.internal.warc.gz | CC-MAIN-2014-15 | 5,691 | 9 |
https://www.anylogic.fr/resources/articles/developing-simulating-and-managing-distributed-com-applications-with-xj-dome/ | code | Developing, Simulating and Managing Distributed COM Applications with XJ DOME
Andrei V. Borshchev, Alex E. Filippoff, and Yuri G. Karpov. Workshop on Computer Science and Information Technologies CSIT’99, Moscow, Russia, 1999
IT & telecom
XJ DOME is a set of tools and technologies for those who wish to speed up development of distributed COM applications and improve their quality and manageability. DOME supports several development phases (graphical modeling, code generation, simulation and deployment), as well as run-time (monitoring and management). DOME is tuned to work with MS Visual C++.
While distributed computing platforms such as CORBA and DCOM are now used industry-wise, there still are no corresponding high-level support tools. Most commonly used development environments (e.g. Microsoft Visual Studio) provide only low-level support for distributed programming leaving a lot of routine work to be done manually. | s3://commoncrawl/crawl-data/CC-MAIN-2018-17/segments/1524125945497.22/warc/CC-MAIN-20180422061121-20180422081121-00539.warc.gz | CC-MAIN-2018-17 | 934 | 5 |
https://docs.github.com/en/[email protected]/github/using-git/using-advanced-git-commands | code | About Git rebase→
git rebase command allows you to easily change a series of commits, modifying the history of your repository. You can reorder, edit, or squash commits together.
Using Git rebase on the command line→
Here's a short tutorial on using
git rebase on the command line.
Resolving merge conflicts after a Git rebase→
When you perform a
git rebase operation, you're typically moving commits around. Because of this, you might get into a situation where a merge conflict is introduced. That means that two of your commits modified the same line in the same file, and Git doesn't know which change to apply.
About Git subtree merges→
If you need to manage multiple projects within a single repository, you can use a subtree merge to handle all the references.
Splitting a subfolder out into a new repository→
You can turn a folder within a Git repository into a brand new repository. | s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224648695.4/warc/CC-MAIN-20230602140602-20230602170602-00541.warc.gz | CC-MAIN-2023-23 | 901 | 12 |
https://slashdot.org/~EvilMonkeySlayer/journal/ | code | Had an interesting experience this week, I had some spare time at work and a spare hard drive. So I decided to give ubuntu and kubuntu a go outside of a virtual machine.
Desktop Linux has definitely come along but there are still some pretty big issues. Plus I came across some pretty glaring bugs. Like, for example.. don't install Ubuntu or Kubuntu with more than one monitor connected to your machine because it fucks things up.
On Ubuntu it got to loading the background image and that was it, I could move the mouse around but the installer window didn't appear. (oddly ctrl-alt-backspace or ctrl-alt-f1/f2 etc didn't work)
Similar with Kubuntu although after messing around I managed to get it installed but it consistently hangs after login.
I managed to get Ubuntu working after some messing around and after getting the nvidia driver got compiz up and working. The default extras is nice but the wobbly windows is quite possibly the worst default idea I have ever seen, wobbly windows are fucking horrible. Had to install the compiz config just so I could disable the bloody horrible things.
After getting my dual monitor setup working I came across another issue, 3d effects across dual monitors pretty much freezes up the display, I had to switch to console (ctrl-alt-f1) then back to the x display (alt-f7) to get it working. For example, the expo effect.. works perfectly fine on a single monitor, but the moment you enable a second monitor it fucks things up royally.
Also, on the KDE/Kubuntu front. I separately have a Kubuntu install in VMWare. Let me just say that getting rid of the concept of the desktop icon space and replacing them with the window/plasmoids thing is the worst idea in the history of bad ideas, there's a reason why MS and Apple use them in their desktop OS'. It's because its the best concept and it works. I see lots of potential in KDE, more than Gnome. But they really need to sort out their usability/interface issues. That has always been KDE's weakness all the way back to KDE 1. (yes, I've been using KDE that long)
I've said this one before, Gnome and KDE need to steal Apples concept of the
Having a repository is all well and good but it will never be able to keep up or contain all the software around.
The app concept needs to be part and parcel nicked from Apple and there needs to be some kind of abstraction from the ABI with Gnome and KDE apps to prevent the apps from breaking every time the kernel changes the ABI. That way there could be some kind of guarantee of apps working without having to worry about binary interfaces etc.
Also, Gnome feels a lot smoother/better with a compositing engine. I also think whilst you should obviously have the compiz settings thing as an optional to install there should also be by default some kind of "personalise" button with simplistic options for the visual effects. Because people will not like some of the effects or will want to change basic things. (like disabling that horrible wobbly window effect)
This was on (K)Ubuntu 8.10. | s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917122621.35/warc/CC-MAIN-20170423031202-00601-ip-10-145-167-34.ec2.internal.warc.gz | CC-MAIN-2017-17 | 3,032 | 12 |
https://cryptonews.link/blog/2021/04/08/bank-account-closure-for-bitcoin-purchase-us-bank/ | code | I received a check in the mail from US Bank with my remaining balance on it. No explanation. I called and they told me they force closed my account because of risk. I was buying Bitcoin on Binance.US with cash. Zero leverage involved. No funny business in my account or life. Anyone had this happen? Shocking. | s3://commoncrawl/crawl-data/CC-MAIN-2021-17/segments/1618038064520.8/warc/CC-MAIN-20210411144457-20210411174457-00198.warc.gz | CC-MAIN-2021-17 | 309 | 1 |
https://community.filemaker.com/thread/94734 | code | There are multiple way to go about this.
How do those two players run / perform? Are they doing something together (like a bobsled?) or do they do a seperate performance (like running or swimming?)
Do you need a "Start" and "Stop" button to record the time yourself? Or do you enter the officially registered time?
Are there multiple different events? Do you want to record on which event a certain time was achieved?
Are all the teams always playing?
You will need a table for teams (or not, you can also just enter a team name if you don't have any specific info on the team.)
A table for players.
A table to enter the times.
This could be a portal on a players table. But then you need to move from player to player to enter their time. (You might do this using a portal that shows all the players placed somewhere on the side.)
This could also be an "Event" layout with a portal for "Event details".
This would contain the times per player and could be sorted to put the players in the correct order based on their time.
You could enter players directly in the portal or enter them in global fields and then use a button to get them in the portal.
After you have than you can create a team ranking, a player ranking, etc.
Look here for an example of a solution for a soccer league:
Recording Statistical Data?
The leaderboard is just for running and the players run whenever they want, individually or with their teammates. Weekly they would tell me how long they ran and I'll feed that manually (player by player) on Table 2 that I already made. Table 1 has all the player names and their team number. It's a small list so I decided to do that manually.
In that case I would keep it simple and create two tables (that you already have)
Players and Times
You can create a player layout with some player info. On the side you put a portal that displays all players so you can easily click on one to go to his record.
You add a portal to the Times table where you enter the players times.
And then you can also add a portal that displays the ranking.
For the team ranking you could create a list view with sub summary field sorted by team number (or name) that sorts the fastes team on top.
How does this sound?
B.t.w. Are you using Filemaker 11 or 12?
That sounds good! I'll give it a shot. Thanks again. I'm using FileMaker Pro 12.
If you get stuck somewhere let us know!
For the Portal with all the players you need to create a second table occurrence of the Player table and create an x-join relationship on the ID field.
The times field needs a PlayerIdFk number field and a relationship between:
With the option "Allow creation of records via this relationship" selected on the Times side of the relationship. | s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886110485.9/warc/CC-MAIN-20170822065702-20170822085702-00225.warc.gz | CC-MAIN-2017-34 | 2,717 | 29 |
https://houdinitricks.com/houdini-15-masterclass-mantra-rendering-texture/ | code | Here is another great Masterclass from Side Effects getting into all things technical with Houdini’s native renderer Mantra.
Houdini 15 introduces many enhancements to the Mantra renderer, adding exciting new features and building on existing strengths. New features include quality metrics, adaptive sampling, texture & surface baking and render check-pointing. This class provides a mix of the theory behind the new features and practical techniques to help get you started using them in production.
Sample files for this masterclass: bit.ly/1Gtfi92 | s3://commoncrawl/crawl-data/CC-MAIN-2019-22/segments/1558232255944.3/warc/CC-MAIN-20190520121941-20190520143941-00038.warc.gz | CC-MAIN-2019-22 | 553 | 3 |
https://blogs.msmvps.com/marcelmeijer/blog/2013/08/26/leap-motion-another-way-of-touch/ | code | Since the first computer we are using keyboards to give commands to the thing. Ok, the first computers were controlled with switches. But rather quick there are keyboards and a computer without a keyboard is difficult to imagine. As the graphical user interfaces made their appearance, a new thing came around the corner. Douglas Engelbert introduced to us the mouse. The good man died this year at the age of 88. Again the mouse is difficult to imagine not to be around our computers. In the past period different kinds are made: trackballs, pen mouse’s, track pads etc. Nowadays they fit in the mouse of your hand (Wedge mouse) or you can bend the open.
Disadvantage of a keyboard or mouse, you need space to use it. But also coordination between hand and eyes, which is quite difficult for some people. Everyone knows someone acting really strange first time using a mouse. Dutch prime Minister Wim Kok showed that in 2007.
Microsoft was early aware of the difficult hand-eye coordination. I think they were the first to build software and hardware with partners to create laptops which can be used with a pen (pen computing). The pen wasn’t placed a strange place far away from the computer, but right on the screen where it should happen. In the long run the tablets came to expand the concept and make it a real hype. Now a pen is not really needed anymore. I am not sure if the ‘old’ Surface (Pixel Sense) wasn’t first. Ok, it was to big and not really for consumers.
Other disadvantage of the mouse, keyboard and pen/touch computing is, it is hard to use on places where hygiene is serious business. Touch screens can not stand lubricants or other nasty fluids, mouse’s and keyboard are bacteria collectors etc. Hospitals where computers are still growing on usage, have to deal with that.
For gaming a likewise story can be told. Since the first game consoles (Atari Pong console) there is something like a controller. Of course the first controller was rather simple, but nowadays they still look the same. There are more new functions and buttons added, but one vendor uses other colors than the other, but real innovation looks quite low.
The surprise came in 2010 when Microsoft introduced Kinect (project Natal). This thing gave gaming a new dimension. With the three camera’s and the accompanied software games could be played on a more natural way. Not long after that the Kinect came to the PC. We at Prodware developed tools to use Kinect in combination with Dynamics software.
In the beginning the precession of the thing was a problem. Only a full person (Skeleton) could be seen and getting the details was difficult. Nowadays the SDK is refined, now a person can sit down and detected and the precession has grown. I think the end isn’t near yet, now the hardware can be improved. XBox One with his new Kinect promises lots of nice new things.
It isn’t strange people are looking for other ways to control computers. And solutions are found. Like controlling your computer/phone etc via voice, with your body or just with touch.
The latest new possibility in the existing onse is Leap motion. This little thing is placed before you and you move your hands above it. It contains several infra red sensors, which look a rather big area above the Leap motion. The area is not limited right above it, but also in front and behind it. Till a height of more then 20 centimeter it can detect fingers.
Standard a Visualizer is delivered, with which you can test your Leap motion. Here you see how that looks.
There is a whole market, where different vendors of games, applications and tools display their products and make available for consumers. And it is not just some poor titles or worse remakes, games like Cut the Rope are available with a lot of more fun stuff.
The appearance of the store means there is a SDK available to program the Leap motion. And yes also from C#.
You open a Listener and connect to the controller. Then a flow of data comes to you, data you can use to do the great things.
From this flow of Frames data you can see hands, fingers and gestures. Those can be connected to actions within your application and you are good to go!
This opens up a lot of opportunities. Ok, the details and quality could be lot better. But I think they can solve a lot with the SDK and drivers, on the other hand with newer rather sophisticated hardware. But it is useful to have look at it now.
Like Microsoft said during the introduction of Kinect for Xbox: You are the Controller. You are the mouse, but be carefull not to be replaced 😉 | s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233511106.1/warc/CC-MAIN-20231003124522-20231003154522-00154.warc.gz | CC-MAIN-2023-40 | 4,583 | 16 |
https://devpost.com/software/tira | code | Hello Appcelerator team,
My name is Misha Peric, and I am the owner/developer from Byteout.com that created the Tira app we are submitting.
We have been using Titanium for native mobile development for couple of years now and created many applications with it. Recently we decided to start using more animations in our apps so we tested the Titanium.
And it performed beautifully! As you will see from video demo the animations we accomplished are quite advanced and creating them surprisingly was not that hard.
When we realized we cant do easings in Android animations, we searched the Titanium marketplace and found the free module that does them. And thats quite awesome.
Besides a lot of animations, we had to integrate with Jira API, and as always Titanium was quite powerful in that regard too.
Couple of years ago I used Cocoa Touch for iOS development, but since I switched to Titanium I never looked back. For example, layout manager in Titanium is something that keeps impressing me, and in this project I again was astonished how complex layouts are easy to accomplish with Titanium/Alloy views.
We plan to use this application ourself and to expand it with many more features. But we will of course put it on both stores and see how community likes it.
Thank you, Misha Peric | s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100745.32/warc/CC-MAIN-20231208112926-20231208142926-00465.warc.gz | CC-MAIN-2023-50 | 1,288 | 9 |
http://www.hackingwithphp.com/18/2/9 | code | Declare fields NOT NULL
Each time you declare a field, MySQL needs one extra bit of data to store whether or not the value is NULL. This is because NULL is not 0, or indeed
any value, so the only way for MySQL to know whether a value is NULL or not is to use this special bit.
If you know for a fact that a column will not be NULL, declare it as NOT NULL - this will allow you to save the bit, and stop MySQL from checking that bit every time it checks the value. For example:
CREATE TABLE MyNotNull (ID INT NOT NULL, Name CHAR(20) NOT NULL);
Next chapter: Load data intelligently >>
Size vs. Speed
Performance Optimising your code Write your code sensibly Use your tools wisely Use some functions carefully for maximum performance Use the Zend Optimizer for older PHP versions Use a PHP code cache for newer PHP versions Read the manual carefully Get your loops right first Pre-increment and post-increment aren't the same Don't think that using references will lower your RAM usage Be wary of garbage collection, part 1 Be wary of garbage collection, part 2 Listen to all errors, big and small Keep up to date Cache array data Compress your output Don't use CGI Don't use dl() Debug your code Cache your data with memcache Use persistent connections Take advantage of new features Compile right Ignore the myths Avoid mod_access if you can Make sure you optimize Apache Optimising your SQL Prioritise your data Optimise your tables Select as little data as possible Use shorter queries where possible Use the EXPLAIN statement Change your hardware Choose your data types carefully Size vs. Speed Declare fields NOT NULL Load data intelligently Consider splitting off variable-length fields Be wary of locks Consider switching OS Spot slow queries Perform joins carefully Index your data Make sure your indexes are being used Normalisation Upgrade MySQL Increase your buffers Keep tabs on your server Lock your tables when appropriate Don't rely on automatic type conversion Benchmark, benchmark, benchmark! Know MySQL's strengths Server PHP Accelerators Caching PHP PHP as a CGI or a module? Size of scripts Summary Exercises Further reading Next chapter
Table of Contents
Copyright ©2015 Paul Hudson.
Follow me: @twostraws. | s3://commoncrawl/crawl-data/CC-MAIN-2015-48/segments/1448398468233.50/warc/CC-MAIN-20151124205428-00193-ip-10-71-132-137.ec2.internal.warc.gz | CC-MAIN-2015-48 | 2,227 | 11 |
http://www.disney.co.za/disney-channel/videos/shake-it-up | code | Shake it Up Videos
Shake it Up
Funk It Up
Funk It Up: Since the fire on the set, Rocky is coping well, but CeCe is not. She decides to look deeper into her own spirituality, and discover who she is without dance.
Press and hold the link to sharehttp://www.disney.co.za/disney-channel/videos/shake-it-up | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560279169.4/warc/CC-MAIN-20170116095119-00356-ip-10-171-10-70.ec2.internal.warc.gz | CC-MAIN-2017-04 | 302 | 5 |
https://www.quantopian.com/posts/cool-new-paper-from-mit-on-sentiment-data-from-using-quantopian-for-analysis | code | I wanted to point out a cool new paper that was just published. It uses sentiment data and studies how the market responds to extreme sentiment. I think this is an amazing example of some top-tier research into anomalies and strategies, so I encourage users to check it out as a reference for their own work.
I pasted the paper's abstract here:
We analyze the relation between stock market liquidity and real-time measures of sentiment obtained from the social-media platforms StockTwits and Twitter. Linear regression analysis shows that extreme sentiment corresponds to higher demand and lower supply of liquidity, with negative sentiment having a much larger effect on demand and supply than positive sentiment. An intraday event study shows that booms and panics end when bullish and bearish sentiment reach extreme levels, respectively. After extreme sentiment, prices become more mean-reverting and spreads narrow. To quantify the magnitudes of these effects, we conduct a historical simulation of a market-neutral mean-reversion strategy that uses social-media information to determine its portfolio allocations. Our results suggest that the demand and supply of liquidity are influenced by investor sentiment, and that market makers who can keep their transaction costs to a minimum are able to profit by using extreme bullish and bearish emotions in social media as a real-time barometer for the end of momentum and a return to mean reversion. | s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600400198287.23/warc/CC-MAIN-20200920161009-20200920191009-00203.warc.gz | CC-MAIN-2020-40 | 1,452 | 3 |
http://otrance.de/en/download/ | code | Your can download each present release of oTranCe on Sourceforge.
If you are a developer, know how subversion works and want to stay informed about the latest development independently from any release, please install a git client on your system and get the code with the following command:
git clone https://github.com/DSB/oTranCe.git
Of course, your feedback and experience using oTranCe is welcome at our support forum. Let us know there what is good and what can be done better.
If you want to contribute code to us and you have experience in handling Zend Framework applications, please feel free to fork the GitHub repository and send your changes via pull request. Help is appreciated at any time 😉 | s3://commoncrawl/crawl-data/CC-MAIN-2018-05/segments/1516084889733.57/warc/CC-MAIN-20180120201828-20180120221828-00044.warc.gz | CC-MAIN-2018-05 | 708 | 5 |
https://discourse.zynthian.org/t/mod-duo-zynthian-guitar/2056 | code | Hello! I’m new with mod ui.
This afternoon I just write the gorgona img on my sd card and did some modification to use it with my presonus iTwo.
It works well, but I noticed few plugin to use the guitar as mod duo.
Could I dowlnload plugin and pedal board from git hub and use them with zynthian or do I have to compile them on my raspberry? If I have to compile could you tell me what is the right way to do it.
I want to make a zynthian for guitarrists.
Hello! I’m new with mod ui.
I am not fully sure, but I think that MOD-Duo and Zynthian both use armv7l as CPU, so they may be binary compatible. But if this really will work? Give it a try.
My personal opinion is to compile plugins directly on the Zynthian. Why? Because than I have control about the optimization of CPU/FPU flags.
You should take a look at the recipes:
- https://github.com/zynthian/zynthian-sys/tree/master/scripts/recipes (Official Zynthian recipes)
- https://github.com/dcoredump/zynthian-recipe (my own recipes - some are really alpha or beta…)
Quite a nice idea. But (IMHO) for a live session the Zynthian needs to have more external (foot-)controllers to use it with a guitar. And I am pretty happy to have a heavy case and displays at my MOD-Duo on stage (and yes: the case of the Duo is more beer resistant than my Zynthian cases ).
Have in mind that the “normal” audio shields for the Raspi are having a line input! For connecting a guitar directly you need a kind of preamp, because guitars have a high impedance output! The MOD-Duo has some really good pre-amps for this…
Yes I know about the impedance but I want make a fet preamp with a switch for instrument/line signal.
The problem is that in gorgonia image I can’t find some effects that I saw in some zynthian presentations such as the tube screamer and other that are in the mod gallery.
I would like put them in my pedal boards.
Do you know if are there in a zynthian repository?
For foot controller the best imho is to use a midi pedal board.
Perhaps they are in a different set of plugins from Guitarix. You can try the following:
ssh [email protected] cd /zynthian git clone https://github.com/dcoredump/zynthian-recipe.git cd zynthian-recipe/recipe sh guitarix-new.sh
This installs some additional plugins for guitarists (After installation you have to restart MOD-UI!).
It’s building up a list of various pedal boards & controllers (including the many, many home builds) and making the composing of a MIDI rule for them simple.
Not tried it yet. I should.
for midi I suggest this project:
I use it and it is very cool…I used it in some live show…
I can’t find the gxts9.lv2…
I tried to use the lv2 from moddevices: the gui works but the plugin cannot used.
How can I compile it on Zynthian?
I found the sources in zynthian-sw/plugins/guitarix/src but I don’t understand how compile the ts9 with the mod gui.
It seems that gxts9 is inside the “normal” huitarix package. So do the same as before but with
I’m trying to use some effects with my guitar, but I have some issues.
Just to understand how compile myself the plugins for mod ui, I downloaded the mod plugin builder.
I changed the optimizations for my raspberry pi 3b.
At some point it downloads and compile buildroot 2016.02.
The problem is that version hasn’t the pi 3b plus definitions.
It is good for mod duo because it is armv7 but my raspberry is armv8.
I tried to change the .common file to download the buildroot 2018.02.
At some point it tells me that br2_external tree is not configured well because I must to use an external.desc file.
Ok how could I set the name of the tree to make it working with my raspberry pi3?
I just want to try to compile one effect to see if with the right optimizations it will work.
Thanks a lot. | s3://commoncrawl/crawl-data/CC-MAIN-2019-09/segments/1550247479967.16/warc/CC-MAIN-20190216065107-20190216091107-00080.warc.gz | CC-MAIN-2019-09 | 3,774 | 41 |
http://bagford.blogspot.com/2012/07/brief-observation-query.html | code | I have been living alone for about eight hours and already I am talking to myself like a loon.
In other news, if anyone has an idea for a reasonably straightforward Android app I could make then I'd be interested to hear it. It doesn't need to be useful for more than 2 or 3 people in the whole world. I used to have a database set up to produce the most efficient route round the UL from a given set of classmarks, so maybe I could try to do that, though it wouldn't be much use to me these days. Or I did wonder about an app for making a brief note whenever I see tube mice. Tube mice make me happy. | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368711005723/warc/CC-MAIN-20130516133005-00081-ip-10-60-113-184.ec2.internal.warc.gz | CC-MAIN-2013-20 | 601 | 2 |
https://rbwilson.ca/working-with-netsh-traces-captures/ | code | In my previous post regarding useful commands I showed how to perform a packet capture between a client machine and a remote machine using IP filters. When the capture is complete you will end up with a .etl file which requires Microsoft Message Analyzer.
Collecting a capture:
As a refresher the process to perform a netsh packet capture is as follows:
- To start your packet capture you need to first issue the following command:
netsh trace start capture=yes tracefile=c:\temp\capture.etl maxsize=512 filemode=circular overwrite=yes report=no correlation=no IPv4.SourceAddress=(192.168.1.55,192.168.1.5) IPv4.DestinationAddress=(192.168.1.55,192.168.1.5) Ethernet.Type=IPv4
2. After the trace has started reproduce the behavior you are looking to capture. In our example we will be using psping to generate traffic between IPs 192.168.1.55 & 192.168.1.5.
3. Now that we have reproduced the behavior you must stop the netsh trace, this process takes time and is initialized using the following command:
netsh trace stop
Analyzing the capture:
My personal preference is to use WireShark to process the results of netsh packet captures. Unfortunately WireShark cannot directly open .etl files so you must first open the file with Microsoft Message Analyzer and then export the results to a .cap file which WireShark can process. One thing to keep in mind is that the larger the capture the more resources that Microsoft Message Analyzer which can put a big strain on your system
Converting .etl to .cap:
In order to open the capture in WireShark we start by opening the capture in Microsoft Message Analyzer:
Once the file has been fully loaded you go to File then Save As:
From the Save As window click on Export:
Next we want to specify the file name, make sure that you select .cap:
When the export is performed you will get a message indicating that some of the messages where incompatible and were not exported:
At this point the .etl file we started with has been converted to a .cap file which can now be opened in WireShark.
Viewing the .cap with WireShark:
Now that we have a .cap file you can open this using WireShark. Once the file has been opened you will be greeted with a screen similar to the following:
First thing you will notice is this doesn't look like a normal packet capture. The reason for this is there are additional NetMon_Events that can be filtered out to get the data we are really after. To do this add the following filter to WireShark:
This will give us much cleaner trace to then read through:
I'm not going to go into WireShark filters at this time although I might in the future. For now if you need additional details on the different filters available take a look at https://wiki.wireshark.org/CaptureFilters. | s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679511159.96/warc/CC-MAIN-20231211112008-20231211142008-00098.warc.gz | CC-MAIN-2023-50 | 2,747 | 22 |
https://techdirect.dell.com/portal/InfoCenter.aspx | code | Searches can contain special pattern-matching characters:
An underscore (_) matches exactly one character in the value.
A percent sign (%) can match zero or more characters in the value.
This online module shares how TechDirect helps you manage your Dell EMC products throughout their lifecycles – from deployment to education and support.
Passwords are handled through the MyAccount Single Sign-on capability to allow for a more seamless integration across applications. For more information of how to login or change your password, please visit Dell MyAccounts FAQ.
View webcast information - upcoming schedule and previously archived sessions.
There are currently three user roles in TechDirect:
This individual will be able to address all needs across the account for all TechDirect services -- user administration for roles and permissions as well as agreements and reports.
This individual will be able to manage company engagement for a specific service in TechDirect. A company administrator may configure a user in this role over multiple services.
This individual will have the ability to execute the capabilities associated for a specific service. They will have no administrator privileges.
Training is highly recommended, but not required. The recommended training courses covers many topics tested on the certification exams, however, training alone will not prepare you for the exam. Having the relevant hands-on experience is a key requirement to being successful in passing the exam, in addition to leveraging resources such as exam study guides and recommended training paths on dell.com/certification.
Skill level of exams are intermediate to advanced and individuals should have existing experience with deployment, configuration, and administration on Dell EMC systems. View full exam details here.
Dell EMC certification is a requirement for the Deployment Services Competency. Deployment Services Competency enables partners to deploy Dell EMC hardware with greater expertise, accuracy and efficiency.
Partners with certified individuals gain access to exclusive Dell EMC tools, best practices, and the latest critical technical updates for richer deployment capabilities. This allows partners to expand reach, grow deployment opportunities and increase revenue. Deployment Services Competency also allows partners to opt-out of mandatory deployments for SC Series Storage and is the first step to being eligible to co-deliver ProDeploy deployment services.
As an IT user managing your organization's PCs and tablets, all of your SupportAssist alerts will flow into your TechDirect account for convenient, centralized management. You can choose to auto-forward these alerts to Dell. Or, alerts can be individually managed within TechDirect's SupportAssist Alerts section. More details are available in the Deployment Guide.
SupportAssist is now factory installed on Dell Windows 10 systems. If you are unsure if your system has SupportAssist, please visit the Dell folder in the Windows menu. Note, when using TechDirect, the home version must be removed and replaced with the version for IT Managed PCs by the IT Administrator performing deployment. Visit dell.com/SupportAssist to download.
To begin receiving the SupportAssist alerts in TechDirect, you must follow these steps:
Note: There are separate deployment guides for Dell PCs with Windows OS and Dell Latitude Chrome OS Enterprise. | s3://commoncrawl/crawl-data/CC-MAIN-2020-10/segments/1581875145534.11/warc/CC-MAIN-20200221172509-20200221202509-00270.warc.gz | CC-MAIN-2020-10 | 3,417 | 18 |
https://www.jelli.com/launchpad/how-to-apply-to-tech-jobs-during-a-pandemic/ | code | How to Apply to Tech Jobs During a Pandemic
We recently hosted a lecture for Computer Science students at Boise State University about finding and applying for jobs during this unprecedented time. We talked about what to look for in a company, ways to stand out, and how to interview remotely and thought it might be helpful to share a few of those tips here as well.
If you’re a soon-to-be or recent computer science graduate, here are a few things to keep in mind when applying to tech jobs during a pandemic:
Companies are Still Hiring
A lot of things are changing in the world right now, but many companies are still searching for new talent.
- Keep an eye on job openings on sites like LinkedIn, Glassdoor, and Stack Overflow
- Look directly at company career pages to see an accurate list of openings
- Get a sense of the culture from the company website and social media accounts as well as Glassdoor reviews
- Understand the company’s core values and how they operate
What to Look for In a Company
Pay attention to how companies are treating employees during the pandemic; it’s a good indicator of culture and how they value employees. For example, if they are capable of working remotely, are they? What benefits do they offer? This is always important, but especially right now.
At Jelli, we were fully remote within two days and quickly implemented new processes and tools. Since going remote, our operations team has introduced virtual team building resources and opportunities like workouts, wine tastings, game nights, and trivia.
Tips for Interviewing Remotely
Helpful Tips to Know
- Test your interview software to make sure you can log in without issues
- Know the job/role you are interviewing for
- Do your research on the company (projects, history, culture, etc.)
- Make sure you know the Tech Stack that the company uses
- Jelli’s Stack: Java, MySQL, EmberJS hosted on Amazon Web Services (AWS)
- Update your resume so it accurately shows what you’ve worked on and ensure you can speak to everything listed on it
- Stay positive and don’t talk negatively about previous companies or projects
- Speak clearly and precisely when responding to questions
- Ask questions about the company and its future direction
- Follow up with interviewers by sending a quick thank you email
Sharing Projects You’ve Worked On
First, we want to remind you that it’s okay if you have limited experience — as a new or recent graduate, employers know and expect that. As such, it’s important not to attempt to make it look like you’ve done more than you have.
When you’re sharing projects, one of the most helpful things for recruiters and hiring managers is to include clear, concise summaries. You don’t need to share too many granular details when talking about projects during interviews either. Ask yourself. “What would a seasoned engineer want to know about this project?”
- Make sure you lay out the problem you solved: without knowing the problem, the solution won’t make as much sense
- Include a link to your GitHub page/projects you are proud of: be sure to clean them up and add documentation (Readme, and inline)
Zoom (or other video software) Interviewing Etiquette
- Make sure you are in a place that is clean and presentable with limited distractions
- Dress professionally (doesn’t have to be shirt and tie)
- Dial-in for your interview on time
- Do not look at your mobile phone or smartwatch at any time during the interview
Don’t forget this is your interview, too! Feel free to ask questions and guide some of the conversations. If you’re feeling nervous, consider pausing for a breath and asking a question. Or, if you are unsure if you heard the question correctly, you can always ask the interviewer to repeat themselves so you are able to answer more thoughtfully.
If you’re interested in working at Jelli, please keep an eye on our careers page for an up-to-date list of current openings and be sure to connect with us on LinkedIn. Congratulations, Class of 2020! We can’t wait to meet you! | s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446710829.5/warc/CC-MAIN-20221201153700-20221201183700-00576.warc.gz | CC-MAIN-2022-49 | 4,060 | 36 |
https://datawarrior.wordpress.com/2016/06/19/combining-the-best-of-all-worlds/ | code | There are many learning algorithms that perform classification tasks. However, very often the situation is that one classifier is better on certain data points, but another is better on other. It would be nice if there are ways to combine the best of all these available classifiers.
The simplest way of combining classifiers to improve the classification is democracy: voting. When there are n classifiers that output the same classes, the result can be simply cast by a democratic vote. This method works quite well in many problems. Sometimes, we may need to give various weights to different classifiers to improve the performance.
Bagging and Boosting
Sometimes we can generate many classifiers with the handful amount of data available with bagging and boosting. By bagging and boosting, different classifiers are built with the same learning algorithm but with different datasets. “Bagging builds different versions of the training set by sampling with replacement,” and “boosting obtains the different training sets by focusing on the instances that are misclassified by the previously trained classifiers.” [Sesmero et. al. 2015]
Performance of classifiers depends not only on the learning algorithms and the data, but also the set of features used. While feature generation itself is a bigger and a more important problem (not to be discussed), we do have various ways to combine different features. Sometimes we separate features into different classifiers in which the answers are to be combined, or combine all these features into one classifier. The former is called late fusion, while the latter early fusion.
We can also treat the prediction results of various classifiers as features of another classifiers. It is called stacking. [Wolpert 1992] “Stacking generates the members of the Stacking ensemble using several learning algorithms and subsequently uses another algorithm to learn how to combine their outputs.” [Sesmero et. al. 2015] Some recent implementation in computational epidemiology employ stacking as well. [Russ et. al. 2016]
Hidden Topics and Embedding
There is also a special type of feature generation of one classifier, using hidden topic or embedding as the latent vectors. We can generate a set of latent topics according to the data available using latent Dirichlet allocation (LDA) or correlated topic models (CTM), and describe each datasets using these topics as the input to another classifier. [Phan et. al. 2011] Another way is to represent the data using embedding vectors (such as time-series embedding, Word2Vec, or LDA2Vec etc.) as the input of another classifier. [Czerny 2015]
- M. Paz Sesmero, Agapito I. Ledezma, and Araceli Sanchis, “Generating ensembles of heterogeneous classifiers using Stacked Generalization,” WIREs Data Mining Knowl. Discov. 5, 21-34 (2015). [link]
- David H. Wolpert, “Stacked generalization,” Neural Networks 5, 241-259 (1992). [PDF]
- Daniel E Russ, Kwan-Yuet Ho, Joanne S Colt et. al., “Computer-based coding of free-text job descriptions to efficiently identify occupations in epidemiological studies,” Occup. Environ. Med. 73, 417-424 (2016). [link] [SOCcer]
- Xuan-Hieu Phan, Cam-Tu Nguyen, Dieu-Thu Le, Le-Minh Nguyen, Susumu Horiguchi, “A Hidden Topic-Based Framework toward Building Applications with Short Web Documents,” IEEE TKDE 23, 961-976 (2011). [link]
- Michael Czerny, “Modern Methods of Sentiment Analysis,” District Data Labs (2015). [link] | s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323585348.66/warc/CC-MAIN-20211020183354-20211020213354-00503.warc.gz | CC-MAIN-2021-43 | 3,471 | 13 |
http://mathhelpforum.com/statistics/150230-random-sample-confidence-intervals.html | code | What confidence and error width do you deisre in the sample size?
Company has n=5,000,000 customers that are using service X. We need to determine customer satisfaction with service X through phone survey.
Is there a formal way to determine optimal sample size (assuming that all calls will be answered)?
It's good you have identified the confidence level required. The error width will be how far either side of this you can allow for.
will require more samples than
Have a read of this guy.
PEOD6/PD006: Determining Sample Size
There is a table at the bottom that will give you some numbers to consider. | s3://commoncrawl/crawl-data/CC-MAIN-2016-50/segments/1480698542657.90/warc/CC-MAIN-20161202170902-00354-ip-10-31-129-80.ec2.internal.warc.gz | CC-MAIN-2016-50 | 605 | 8 |
https://pypi.org/project/geo-heatmap/ | code | Generate an interactive geo-heatmap from your Google location data
This is a script that generates an interactive geo heatmap from your Google location history data using Python, Folium and OpenStreetMap.
1. Install Python 3+
If you don't already have Python 3+ installed, grab it from https://www.python.org/downloads/. You'll want to download install the latest version of Python 3.x. As of 2019-11-22, that is Version 3.8.
For ease of python version handling, I'd recommend installing it through pyenv.
2. Get Your Location Data
Here you can find out how to download your Google data: https://support.google.com/accounts/answer/3024190?hl=en
Here you can download all of the data that Google has stored on you: https://takeout.google.com/
To use this script, you only need to select and download your "Location History", which Google will provide to you as a JSON file by default. KML is also an output option and is accepted for this program.
3. Install the script
pip install geo-heatmap
4. Run the Script
In the same command prompt or Terminal window, type the following, and press enter:
geo-heatmap <file> [<file> ...]
Replace the string
<file> from above with the path to any of the following files:
Location History.jsonJSON file from Google Takeout
Location History.kmlKML file from Google Takeout
takeout-*.zipraw download from Google Takeout that contains either of the above files
geo-heatmap "C:\Users\Testuser\Desktop\Location History.json"
geo-heatmap locations.json locations.kml takeout.zip
Using the stream option (for users with Memory Errors):
geo-heatmap -s locations.json
Set a date range:
geo-heatmap --min-date 2017-01-02 --max-date 2018-12-30 locations.json
usage: geo-heatmap [-h] [-o] [--min-date YYYY-MM-DD] [--max-date YYYY-MM-DD] [-s] [--map MAP] file [file ...] positional arguments: file Any of the following files: 1. Your location history JSON file from Google Takeout 2. Your location history KML file from Google Takeout 3. The takeout-*.zip raw download from Google Takeout that contains either of the above files optional arguments: -h, --help show this help message and exit -o , --output Path of heatmap HTML output file. --min-date YYYY-MM-DD The earliest date from which you want to see data in the heatmap. --max-date YYYY-MM-DD The latest date from which you want to see data in the heatmap. -s, --stream Option to iteratively load data. --map MAP, -m MAP The name of the map tiles you want to use. (e.g. 'OpenStreetMap', 'StamenTerrain', 'StamenToner', 'StamenWatercolor')
6. Review the Results
The script will generate a HTML file named
heatmap.html. This file will automatically open in your browser once the script completes. Enjoy!
I'm getting an "Out of Memory" error or
MemoryError when I try to run the script. What's going on?
LocationHistory.json file is probably huge, and Python is running out of memory when the script tries to parse that file.
To fix this, download and install the 64-bit version of Python. To do this:
- Go to python.org.
- Click the link corresponding to your OS next to "Looking for Python with a different OS?"
- Click the "Latest Python 3 Release" link.
- Scroll down to "Files".
- Click to download the x64 release. For example, on Windows, that's the "Windows x86-64 executable installer" link.
If this does not fix the issue you can use the stream option:
geo-heatmap -s <file>
This will be slower but will use much less memory to load your location data.
I'm getting a
SyntaxError when running
pip install -r requirements.txt or
python geo_heatmap.py <file>. What am I doing wrong?
You are probably using the python interpreter to run these commands. Try to run them in cmd.exe or Windows PowerShell (Windows) or the Terminal (Linux, MacOS).
I'm getting the error message
TypeError: __init__() got an unexpected keyword argument 'max_value'. What can I do to fix this?
Try to run:
pip uninstall progressbar pip install progressbar2
You probably have progressbar installed, which uses
maxval as an argument for
__init__. Progressbar2 uses
This project is using Poetry to manage dependencies. You can install it by following their guide.
If you would like to develop on this further, after cloning this repository and navigating into it you can get up and running with the following:
poetry install poetry run geo-heatmap
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Hashes for geo_heatmap-0.1.5-py3-none-any.whl | s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662604495.84/warc/CC-MAIN-20220526065603-20220526095603-00700.warc.gz | CC-MAIN-2022-21 | 4,462 | 58 |
https://docs.teradata.com/r/Teradata-Database-Resource-Usage-Macros-and-Tables/April-2016/ResUsageSawt-Table/Statistics-Columns/TASM-AMP-Worker-Task-Columns | code | These columns report statistics about the AMP Worker Tasks.
|Column Name||Mode||Description||Data Type|
|Available||track||Number of unreserved AMP Worker Tasks from the pool that are not being used at the end of the interval.
For example, if 12 of the normally 56 unreserved AMP Worker Tasks are removed from the pool by reserving them for expedited work, there could at most be 44 unreserved AMP Worker Tasks available. If in this log period, 10 unreserved AMP Worker Tasks are taken from the pool to service 10 queries that are still executing, there would be only 34 available at the end of the log period.
|AvailableMin||min||Minimum number of unreserved AMP Worker Tasks available in the pool for each AMP for the logged period.
For example, a zero value means there were no unreserved AMP Worker Tasks available in the pool at some point during the reporting period.
|AwtLimit||const||Current setting for AMP Worker Task (for example, 80, 100, or so on) in the DBS Control MaxLoadAWT field. For more information, see “MaxLoadAWT” in Utilities.||FLOAT|
|FlowControlled||track||Specifies if an AMP is in flow control. If the value is non-zero, the AMP is in flow control.
Resource usage indicates flow control on work mailbox name 2-11 only. Work mailbox name 2-11 is the incoming mailbox for AMPs, where 2 is the mailbox number and 11 is the AMP Worker Task partition.
However, resource usage indicates flow control on work mailbox name 2-11 for all work types. For example, if any work type is in flow control, the system is in flow control.
|FlowCtlCnt||count||Number of times during the log period that the system entered the flow control state from a non-flow controlled state.||FLOAT|
|FlowCtlTime||count||Total time, in milliseconds, that an AMP is in flow control.||FLOAT|
|InuseMax||max||Maximum number of AMP Worker Tasks in use at any one time during the log period.||FLOAT|
|MailBoxDepth||track||Current depth of the AMP work mailbox at the end of the period.||FLOAT|
|WorkTypeInuse00 -WorkTypeInuse15||track||Current number of AMP Worker Tasks in use during the log period for each work type for the VprId vproc.
The WorkTypeInuse04 column value is always at least 1 due to the internal database design for the Control AMP rows in the ResUsageSawt table.
|WorkTypeMax00 - WorkTypeMax15||max||Maximum number of AMP Worker Tasks in use at one time during the log period for each work type for the VprId vproc.
In Summary Mode, the WorkTypeMax column values are the Max of the values for all the AMPS. | s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764499470.19/warc/CC-MAIN-20230128023233-20230128053233-00534.warc.gz | CC-MAIN-2023-06 | 2,520 | 18 |
http://www.backtrack-linux.org/forums/printthread.php?t=12768&pp=10&page=1 | code | How to using BT3 to crack(obtain) windows xp administrator account on network?
1. Now in my network having 5 pc, let's say i want to crack(obtain) one of windowsXP administrator account password via network, BT3 have a tools to do it? or any method to do it? i just know using the Ophcrack live cd to crack windowsXP administrator password in local pc, not via network, how to do it via network? | s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917122619.60/warc/CC-MAIN-20170423031202-00545-ip-10-145-167-34.ec2.internal.warc.gz | CC-MAIN-2017-17 | 395 | 2 |
http://spanish.stackexchange.com/questions/tagged/palabras-raras+pronunciacion | code | Spanish Language Meta
to customize your list.
more stack exchange communities
Start here for a quick overview of the site
Detailed answers to any questions you might have
Discuss the workings and policies of this site
Are there other words that can't be written? (like sal-le)
Recently, I learned that there is at least one Spanish word that can be pronounced but not written. It is the imperative form of 'salirle'. It is prononunced as 'sal-le' and the written form should ...
Mar 1 '12 at 20:49
newest palabras-raras pronunciacion questions feed
Announcing The Launch Of Meta Stack Exchange
Hot Network Questions
Does `sl` ever show the current directory?
Does GR really allow superluminal movement?
Changing pins used in ArduinoISP example
Do I need to enable TRIM if I have a non-Intel/Samsung
If an author declines authorship, may her co-authors publish without her?
What does "kcal/mol" mean when speaking of enzyme catalysis?
Just found out my 13 year old girl is Bi and dating a 17 year old girl in an "open" relationship. Huh? Now what?
How do you separate /bin and /sbin when making an RPM?
Why is my Set<Object> reference not able to point to a Set<SomeSpecificObject> collection, when it works for Lists?
Expected number of ratio of girls vs boys birth
How are paths to files and folders constructed in OS X?
Does it make sense to open one window all the way when the other window is much smaller?
Packages are removed when I use "apt-get install" with a hyphen after the package name
What exactly is a "Pixel"?
Collective PhD by a research group
How do I change a folder to a jar?
What would be preferred aesthetically and performance wise?
What is the unit of pH?
What should be included in a freshman 'Mathematics for computer programmers' course?
Swapping letters with regexp
Brainteaser: What is the one thing a queen cannot do that all other pieces can do?
How to play B major? What is the finger placement?
How to explain Heartbleed without technical terms?
So a user hid a folder and now he can't find it?
more hot questions
Life / Arts
Culture / Recreation
TeX - LaTeX
Unix & Linux
Ask Different (Apple)
Geographic Information Systems
Science Fiction & Fantasy
Seasoned Advice (cooking)
Personal Finance & Money
English Language & Usage
Mi Yodeya (Judaism)
Cross Validated (stats)
Theoretical Computer Science
Meta Stack Exchange
Stack Overflow Careers
site design / logo © 2014 stack exchange inc; user contributions licensed under
cc by-sa 3.0 | s3://commoncrawl/crawl-data/CC-MAIN-2014-15/segments/1397609532480.36/warc/CC-MAIN-20140416005212-00600-ip-10-147-4-33.ec2.internal.warc.gz | CC-MAIN-2014-15 | 2,468 | 54 |
https://forums.xfinity.com/t5/user/viewprofilepage/user-id/2537701 | code | Pixelation on on-demand video only. Turning video accelerartion off worked for me. I worked with a tech online and he was not able to fix the problem. I just googled the problem and made the change to chrome as you suggested. Why aren't the online tech's aware of this solution. Xfinity again has wasted my time.
... View more | s3://commoncrawl/crawl-data/CC-MAIN-2019-51/segments/1575540510336.29/warc/CC-MAIN-20191208122818-20191208150818-00032.warc.gz | CC-MAIN-2019-51 | 326 | 2 |
http://tsnbereg.ru/raja-rajeshwari-mp3.html | code | Raja Rajeshwari Mp3
Please let us know your number. How does client know it has the full block?
Hadoop Training In Hyderabad
Can you please send me the fee structure for the complete training for Hadoop testing and development as well. Generally commodity hardware means machines with Intel cores.
How much I can expect if I get the job in Hadoop. How far will my Linux experience useful? Please send me the details of various tracks including fee please. Can anyone tell me the basic system configuration required to run Hadoop for experimental purpose? We do support all ways to place our students.
Do I need to have any developer experience before I can start learning? Any graduates can do this course and very demand skill in a Job market. Have good technical knowledge in terms of Windows administrator or Linux a bit.
Please give me a solution how to do this in aql language and also provide some applications or some sample aql coding similar to this sample application. My processor does not support virtualization feature, so I am not able to use Virtualbox, Can anyone please help me installing Hadoop in ubuntu step by step process Without Virtual box approach.
List of Tamil films of 2011
Just enjoy the intelligence on the subject. My question is Is it advisable to shift in different track for an experienced person in terms of career and compensation point of view. Hello Praveen, Heard That You are the best faculty. Also please let me know What are the pre-skills required to do this training? Why Should I choose Hadoop why not sales force?
During the writing phase, each block corresponding to the file is replicated on multiple nodes. Also interested in knowing the lab facility as well.
These problems can be solved with reasonable approach and patterns. Yours are doing very well.
Respected sir, I did my M. Did you provide Online Training in Hyderabad?
Can I eligible to do Hadoop. Will it be a backdrop for going right away to Hadoop? It ensures portability and can be deployed on different operating systems. Not Hadoop days are numbered. It will be great if I can avail weekend courses if any.
It will be great if you could guide me. Is there any chance for me to get into an analytics as a fresher? Or Talk with Faculty over the phone. In this context, dictionary for phone the name of Hadoop deserves mention. But I m looking for a change in technology.
Wanted to switch to big data and Hadoop. Please guide me and send more information about training and duration. So faculty guide until getting a job is most important criteria while choosing a good Institute. Where you did a foundation course.
Also the course duration for it. Is it easy to learn and to grasp a job?
Please can you let me know what are the pre-requisites for this. Can you please send me the details of the classroom training only during weekends. We have lots of things for you. Do you advise such a move given my Microsoft background and experience?
Hadoop Training In Hyderabad. Do certifiction, it give a carrer edge compare to non certified. Thank you, Kathrine, for your compliment. Be Hadoop and Big data Same?
Is it possible to learn all these three in your institute parallel? Your email address will not be published. Clarify all your queries even before attending demo while taking with faculty.
Is it Java is required to do this Course? Can you send me course details? Hi i want to join hadoop or data scientist please send me details and the duration of cource.
- The sims 3 supernatural for mac
- Animals pics
- Pc racing games windows 8
- How to messages from iphone to computer
- Of pro evolution soccer 2013 free download
- Rockstar games gta san andreas pc free download
- Family feud 3 dream home
- Youtube.com free download
- Snipping tool techsmith free download
- M bot silkroad free download
- Book of mormon mp3 free download
- Mozilla and install
- Tamil christian melody songs mp3
- Pal search tool pst
- Fountainhead book free download | s3://commoncrawl/crawl-data/CC-MAIN-2019-30/segments/1563195529007.88/warc/CC-MAIN-20190723064353-20190723090353-00000.warc.gz | CC-MAIN-2019-30 | 3,962 | 35 |
https://codedump.io/share/bJ5de6kYWGjq/1/gem-install-permission-problem | code | qichunren@zhaobak:~> gem install hpricot
ERROR: While executing gem ... (Gem::FilePermissionError)
You don't have write permissions into the /opt/ruby-enterprise-1.8.7/lib/ruby/gems/1.8 directory.
For a systemwide Ruby install, become root. For example:
$ sudo gem install hpricot
However, the modern approach in many circumstances, including in development, is to use a tool that lets you easily install and use Ruby as a normal user. This lets you avoid having to become root. There are a few such tools, and the one I use is RVM.
# install rvm into your ~ $ \curl -sSL https://get.rvm.io | bash -s stable # install latest version of ruby into your ~ $ rvm install ruby # installs a gem into your ~ $ gem install $SOME_GEM_NAME | s3://commoncrawl/crawl-data/CC-MAIN-2018-17/segments/1524125946807.67/warc/CC-MAIN-20180424154911-20180424174911-00245.warc.gz | CC-MAIN-2018-17 | 729 | 7 |
https://talkgroup.xyz/t/orenji-gets-an-upgrade/3429 | code | This is the first post from the new orenji which is the name of my primary mobile computer. I made the mistake of naming my first computer and was attached to it when I had to let it go. So I name my computer roles instead.
I got a MacBook Pro 15-inch. It replaces the Powerbook 12-inch. It was just getting too sluggish, and I need the extra processor power and RAM.
That computer is now ichigo, Susan’s lappy.
For now I am getting it set up, installing software, updating software, and hopefully get Bootcamp working. The bummer is, I am coming down with something wicked (like a cold). This last week was pretty amazing for me, I learned a lot about my job, and ended up getting a phone (which I need to blog about), and new computer, and a lot of work done. I think I can finally let myself be sick. | s3://commoncrawl/crawl-data/CC-MAIN-2020-45/segments/1603107882581.13/warc/CC-MAIN-20201024110118-20201024140118-00305.warc.gz | CC-MAIN-2020-45 | 805 | 4 |
https://slashdot.org/~NecroBones | code | I used to salvage all sorts of gear from my job, saving rackmount gear that would otherwise have been junked.
However, as my rack (a small 22U unit) tended to get rather full, and it was generating a lot of heat and noise, I eventually looked to consolidate. Now, I keep one physical server that runs a couple of VMs, cisco router, switch, UPS, and the remaining space contains a shelf and a sliding drawer to keep spare parts, hard disks, etc. Now it's much more quiet, and doesn't heat my house all through the summer.
I really feel it was a combination. It was dramatically over-hyped, but at the same time that did serve to increase awareness and thus diminish the overall impact, much like the Y2K issue as mentioned.
The article correctly calls it a panic, IMHO.
I think also the virus was much less effective than people realized for a few important reasons:
1. Back then people were a lot less likely to have the internal clock set properly on their computers.
2. When and if the payload would trigger, the virus would eliminate itself. Much like a biological virus, if it kills the host, it ruins its chances for further infections.
Of course I found it amusing that some of the more interesting viruses saw a lot less press. Such as "Casino", which would trash your disk's system area, but it would restore it from a backup in RAM if you could win in the slot-machine game it popped up. That's much more evil and amusing.
I set up a large display on the front of my house, in what little space I have. But the only real technological bit, other than lights and flickering LEDs, and a Flying Crank Ghost, is a set of talking skulls. I use the "Scary Terry" servo control system, which is sold as a kit from Cowlacious.
Same routine, deployed into the display (gradual echo effect was accidental)
I'm glad people are pointing out that there's really nothing special going on here. Eliza and other similar chat bot programs have been around for a very long time, and this certainly isn't the first time anyone has had two of them talk to each other. The only difference being that this one has visible avatars and speech synthesis, recorded for all of youtube to enjoy. It's amusing and worth sharing for that reason, but there's no breakthrough here.
The conversation strikes me as actually quite typical for this sort of chatbot, not unlike transcripts easily available for the last couple of decades. Many of the Loebner Prize competitors have much more natural conversations. And I should know, my entry in the competition many years ago failed horrendously.
Even static-IP VPS solutions are under fire for this. I host my own mail, and had been using my VPS for out-bound mail for quite a while, but I was increasingly having mail delayed for hours or blocked completely by some of the larger ISPs. My only solution was to add a static route to use comcasts outbound mail servers instead of my VPS, since I'm behind a comcast business line.
For a small business mail server, apparently your best bet is to use your ISP's mail server with a static mail route, unfortunately. And don't forget to set up SPF records with a proper include.
Actually, a 3m dish would work well as a small radio telescope. A lot of hobbyists use them for SETI, in fact, since a small diameter dish has a wider field of view than larger dishes.
That's a very good point (in reference to the anti-glare surface), and it probably has to boil down to personal preference. Even on typical matte-finish screens, individual pixels are still pretty clearly defined. Personally, I wouldn't describe the difference with a glossy screen using the word "vivid", but perhaps more "sharp".
But in my case, I find the reflections far more distracting and problematic than the mild loss of image quality that an anti-glare matte surface provides.
I've never gotten why people think glossy screens are inherently more vivid. I think you're right about it just being coincidental that they're also newer displays.
The underlying LCD isn't necessarily any different between a glossy or matte finish in front of it. So why do people prefer to see reflections in their screen? I've gone to considerable effort at times to position displays so as to reduce glare and reflections, so I certainly have no desire to make the problem worse by design.
I still have yet to see an argument in favor of glossy screens that seems valid.
I'm glad someone mentioned Starflight! This game was truly ahead of its time. Back when PC games were clunky with non-intuitive interfaces, this game reduced the controls to simple menu-based systems using the arrow keys and spacebar, and yet was robust enough to have a level of depth as a space RPG game that had never been seen before.
At the time, I played it on an original 4.77MHz IBM PC. The game was on two 360K floppies (and you could benefit greatly from having 2 drives to use both disks simultaneously).
The universe was fractal generated, allowing for over 800 unique planets with explorable surface maps.
It was highly influential on many games to come, including Star Control II which was another excellent game.
I was about to say that this was a well-thought out post, one I might have written about UO myself, until I got to the part about "a screenshot comic series", and then thought maybe I _did_ write this in my sleep or something.
Hey there Delusion, good to see you. Long time no see! I was Bones Dragon, in another life.
I urge everyone here to read Delusion's post if you want to understand UO and its player-base, in the context of the nascent 1997 MMO community. He really nails it.
Occasionally? Apparently you either:
A. Are a spammer, or
B. Are completely clueless
VPS is rapidly becoming *the* most popular hosting method used by non bot herder spammers.
Or C. Neither. Thanks for assuming I don't know what I'm doing.
I'm referring to Linode.com. It's possible that it's getting abused by spammers occasionally, but I'm not aware of such complaints, it's a relatively small operation, and the staff seems pretty on-the-ball. The times that UCE-protect has added us to their blacklist that I'm aware of, it has been entirely due to IPs outside the Linode ranges as far as I could tell (which is supported by their arguments on the forum). I could be wrong, of course.
Whether it's a fair world or not, blacklisting entire blocks and not just the bot-infected or spammer hosts does more harm than good, especially when you're talking about blocking entire netblocks that cross multiple businesses full of non-spammer customers.
I am a mail admin, and I'm aware of VPS reputation, but that's not what this is about. I wouldn't use UCE-protect because I see it as nothing but a source of false-positives. Stopping spam is an important service to your users, but getting their legit mail through is more important.
Full STOP yourself.
You're complaining about SORBS but you use uceprotect? Yikes.
Uceprotect is one of those zealots that blocks entire
On the VPS service I use, we occasionally get blocked because of some spammer IPs on an entirely different service, because further up the chain we share a common provider. To make it even more ridiculous, if we complain about this amongst ourselves on the VPS service's forum, the uceprotect folks come into the forum (they don't use the VPS service themselves as far as I know) and ARGUE WITH US, trying to tell us why WE'RE TO BLAME, as customers of a VPS service whose datacenter's ISP is shared by a few bots somewhere in the chain.
I'm not defending SORBS, but if you're going to complain about poor practices, you need to unclude uceprotect too.
You can start with one of the other TLD alternatives, and get the
This worked for me once-- I owned a
If you're patient enough, and they realize you're the only potential serious buyer, they may eventually give up.
For a life-size R2 droid, one need not look any further than here in the US (and Europe), with the R2-Builders club.
astromech.net is just one associated website.
Pound for pound, the amoeba is the most vicious animal on earth. | s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917118743.41/warc/CC-MAIN-20170423031158-00544-ip-10-145-167-34.ec2.internal.warc.gz | CC-MAIN-2017-17 | 8,070 | 46 |
https://staffblogs.le.ac.uk/mars/2018/03/22/22nd-march-2018-sol-2000/ | code | Today we are planning the 2000th sol of operations on Mars. As a martian day is equal to 24 hours and 39 minutes that is equivalent to 2055 Earth days since landing on the 5th August 2012. Many of the Curiosity team are at the Lunar and Planetary Science Conference discussing the discoveries we have made over the last 5 years. We have some way to go before we catch up with the Opportunity rover which recently celebrated its 5000th sol. The rovers are proving remarkably durable. In order to mark the 2000 sol milestone we got together our top 12 images which illustrate some of our key findings for the BBC website. | s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100327.70/warc/CC-MAIN-20231202042052-20231202072052-00205.warc.gz | CC-MAIN-2023-50 | 619 | 1 |
http://www.ancestral.com/cultures.html | code | The following links lead to pages describing the cultures producing the artwork
available from us. Even though a description of the culture may not be finished yet, artwork inspired by that culture may be available. Check the art page to be certain.
We started creating this information back in 1997 when the World Wide Web was in its infancy. Very little information was available on this subject, so we created a brief guide. Nowadays, you can find more information than you could read in a lifetime, so we have not done much updating of the cultures pages. | s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500671.13/warc/CC-MAIN-20230208024856-20230208054856-00013.warc.gz | CC-MAIN-2023-06 | 559 | 3 |
https://dba.stackexchange.com/questions/27816/applying-user-defined-fields-to-arbitrary-entities | code | Currently we have an old (rather crude) system that has user-defined fields, which are mapped against rows in arbitrary tables. This was an after-the-fact modification based on a customer request, and it wasn't really designed to scale well. Our system has around 60 different types of entities, which makes things even more complicated. Essentially the implementation looks like this:
This gets nice and fun when we generate our own ways to index compound primary keys, but that's another DailyWTF-worthy story.
Obviously this is pretty hideous, and leads to some spectacularly horrific queries being generated, but it's worked alright for now because we limit each entity to a maximum of 5 user-defined fields. As a quick disclaimer, I wasn't with the company when this design decision was made! ;)
Anyway, we're about to start a shiny new project and will inevitably need a better way of doing this, with no restrictions on the number of UDFs we can apply to entities, increased performance, and less horror in the generated query department. If we could run a NoSQL solution like Mongo or Redis I'd be happy and wouldn't need to bother you all, but sadly that's not an option. Instead, I need a way to do this from within SQL Server 2008 R2.
So far, I've come up with the following options:
- Individual UDF table for each entity type, with identical structures.
- Benefits: Queries are faster and simpler, solves the compound index problem, can search by UDF.
- Downsides: Table versioning is more cumbersome, lots of extra tables, difficult to index across similar entity types (e.g. purchase orders and sales orders)
- Binary blob UDF column in every entity's table.
- Benefits: Really fast: no fetch overhead, no extra JOINs.
- Downsides: Can't search by UDF, extra proprietary code required.
- XML column in every entity's table.
- Benefits: Fast like binary blobs, seems to be indexable.
- Downsides: No idea how they work - looks complicated!
So, do any of these ideas have merit? Is there a better alternative? | s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817249.26/warc/CC-MAIN-20240418222029-20240419012029-00632.warc.gz | CC-MAIN-2024-18 | 2,022 | 15 |
https://forums.unrealengine.com/t/variable-old-school-glowing-button-material/223289 | code | trying to get my head around how I might replicate the glowing buttons like in this image.
I want to be able to change base/plastic colours and also the ‘decal numbers’ on them so that I can make one material that will generate a large amount of individual button variations using variables, some illuminated, different decals etc.
I am especially interested in keeping that sort of ‘hotspot glow’ you can see where you are almost seeing the bulbs hotspot through the tranparent coloured plastic material on top giving that old school button look.
Is there also a way of easily applying ‘number’ decals to each button 1,2,3, Launch etc without having to place each one?. I was wondering if there is maybe a way to have one texture with every number and word on it that I want to use then somehow mask or coordinate each to each button. using variables etc.
Being new to the materials in Unreal and available nodes - texturing in general basically - Can anyone give me some pointers on what layers/nodes might be best use to achieve this look. have looked around the Marketplace but can’t find anything that works/helps already.
Any pointers, hugely appreciated! | s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320301063.81/warc/CC-MAIN-20220118213028-20220119003028-00489.warc.gz | CC-MAIN-2022-05 | 1,175 | 6 |
https://www.trypte.com/speaking/read-aloud-question24/ | code | Look at the text below. In 40 seconds, You must read this text aloud as naturally and clearly as possible. You have 40 seconds to read aloud
The beginning of the twenty-first century will be remembered, not for the military conflicts or the political events, but for a whole new age of globalization — a ‘flattening’ of the world. The explosion of the advanced technologies now means that suddenly knowledge pools and resources have connected all over the planet, leveling the playing field as never before. | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335424.32/warc/CC-MAIN-20220930020521-20220930050521-00774.warc.gz | CC-MAIN-2022-40 | 513 | 2 |
https://community.x10hosting.com/threads/content-layout-advice.99079/ | code | I attended graphic design in college. I can tell you the first things the teachers would tell us are basically Keep It Simple Stupid. More importantly, the content is the important part, so keep it practical while maintaining a good aesthetic. Too often people get caught in all the bells, whistles, and flashy stuff that technology allows. Try to keep to a minimum of two font choices, and they should complement each other. I am personally a fan of Optima and Tahoma. Seriff fonts are more easily read on paper, whereas san-seriff fonts are sometimes easier to read on a monitor. Follow a color scheme, possibly a traditional art one like complimentary, tertiary, etc. A great place to discover schemes that work together is Adobe's Kuler site, where you can set it to find different color schemes from one color you choose, and you can browse schemes other users have put together. One of the most important steps is to work "on the grid"; most any professional design is done on some sort of grid system. This helps you achieve repetition where need, but makes it all the more contrasting when you "break" the grid. A perfect example, which you have probably seen, is where most buttons and columns are laid out in a very rhythmic and "gridded" pattern, but there will e a jpeg resembling a polaroid near the top that is askew, or at an angle. This can draw attention. An example would be the items you have at the top of your page, like the D.L. and MP3 player. Keep in mind traditional art and design principles, such as repetition, symmetry, rhythm, contrast, white space (often underrated and underused!!), and size relationships of elements. Fonts should have a shape that complements the shapes around it; you may notice Times New Roman has very rounded ascenders and seriffs. Arial is very stick-like and straight, with little variation in the thickness in the "limbs" of the letters. Also, TRY TO AVOID FADDISH AND FLASHY FONTS!! They are far overused. Papyrus and brush scripts are an example. If you want to see some very classical design, check out Milton Glaser or Pentagram design. Try to make your columns of text have very smooth "edges", as in no words are sticking out far more or less than the preceding or next line. This can be achieved through CSS with font sizes, weights, and especially Kerning and Leading (respectively, the spaces between individual letters and words). And after you know the design rules, as they say, is when you can break them!
I can agree with those points and I know them, but the things is, this is just a personal site. Its not for a business or even a portfillio so I wanted to incorperate personalized things and I sort of like the unconventional look. As for "smoothing" out the lines in the content, thats kinda hard... A new line starts when the word won't fit in the width given, not much I can do about that. I really just wanted some advice on how I should present my content because I don't really like the way it is now. Thanks,
I liked your site layout; it seems very appropriate. My initial thoughts were that the site belongs to a young student, and that's what you seem to be. If that was your intention; job done.
Personally, I take issue with sites that, when displayed at 100%, do not fit into a maximised window. Your layout is just a bit too big for the standard page (by 1% or so!) and as a result displays the right-left scroll-bar.
I would remove the very thin black border around the main content; I don't believe it adds anything to your layout.
If the user shrinks your page, all is well; but if it's grown to over 100%, your layout gets really messed up, as the main content expands more than the header/footer content. This is the only thing I can see that is broken.
I like many things about your site, for example the horizontal menu's; the way the background slides to highlight an item; very nice indeed. I think I'll be back sometime to learn just how you did that...
Some really good advice for the rest of us from Wisedog; nice one. If only he'd used paragraphs (perhaps following his own advice?), I'd have added to his reputation! :naughty:
Pretty cool original (to my eyes at least) layout. When I tried to figure out the theme, my first guess was a bunch of papers and post-it notes taped to a faux-wood wall. But looking further, it seems this stuff is lying on a desk. Anyway ...
It was a little slow to load the first time on my computer. While I don't have dial-up, I have the Cable-Lite cable service. I think if you could ensure the top stuff is loaded and visible to keep my eyes busy while the lower pictures are loaded underneath ... I think that would be enough to fix the problem. I initially see a white screen with your first blurb of words ... pause ... pause ... then the wood backdrop ... pause ... pause ... then the rest.
The mouseover event at the top didn't seem to work normally ... maybe it is under construction. Anyway, good job ... keep it up ...
That border is only there because I needed to know the boundary of my container div.
While I really appreciate the good things you are saying, the thing I wanted was some advice on how to arange my content. Would it look beter if I got rid of the sidebar and just centered it, don't go with the blocks of paper for displaying the content on... stuff like that. | s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764499890.39/warc/CC-MAIN-20230131190543-20230131220543-00206.warc.gz | CC-MAIN-2023-06 | 5,323 | 13 |
https://www.blazingcatfur.ca/2015/01/20/sotu/ | code | Blazing Cat Fur
The man is living in his own delusional little world. #STFU
Oh he’s remaking America alright.
This was me: https://www.youtube.com/watch?v=kVrET0k2TSw
SOFS, if you ask me.
Anyone ever read The Sum of All Fears?
Is that the one about Jihadis Neo Nazis?
I liked the bit when Obama and Boehner sang We are the World with a bunch of ISIS members. | s3://commoncrawl/crawl-data/CC-MAIN-2018-05/segments/1516084890991.69/warc/CC-MAIN-20180122034327-20180122054327-00170.warc.gz | CC-MAIN-2018-05 | 360 | 8 |
https://forum.step.esa.int/t/horizontal-shift-in-coherence-images/34601/4 | code | I have derived two coherence layers from 2 interferometric pairs which have the same acquisition geometry (asc orbit, same relative orbit). The processing steps are the tipical InSAR chain (orbit correction, interferogram and coherence generation, phase filtering, unwrapping, phase to displacement and geocoding to UTM).
When I compare the two geocoded coherence layers, I see there is an horizontal shift and cannot understand where this is comming from. What can be the cause of this? Which step is introducing this? Thanks | s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764499654.54/warc/CC-MAIN-20230128184907-20230128214907-00140.warc.gz | CC-MAIN-2023-06 | 526 | 2 |
https://www.fi.freelancer.com/projects/dot-net/launch-software-from-external-ssd/?ngsw-bypass=&w=f | code | i have an exe file for the software i use. I would like this software to be installed and launched from an external hard drive. the software is for Windows using .NET.
13 freelanceria on tarjonnut keskimäärin 171$ tähän työhön
Hello, I can make your existing software usable to external hard drive as per your requirements. I have 6 years experience of software development. Thanks Mahesh | s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600400213006.47/warc/CC-MAIN-20200924002749-20200924032749-00306.warc.gz | CC-MAIN-2020-40 | 394 | 3 |
https://apollo-angular.com/docs/1.0/recipes/webpack/ | code | You can load GraphQL queries over
.graphql files using Webpack. The package
graphql-tag comes with a loader easy to setup and with some benefits:
- Do not process GraphQL ASTs on client-side
- Enable queries to be separated from logic
In the example below, we create a new file called
You can load this file adding a rule in your webpack config file:
As you can see,
.gql files will be parsed whenever imported:
You can use and include fragments in
.graphql files and have webpack include those dependencies for you, similar to how you would use fragments and queries with the gql tag in plain JS.
See how we import the UserInfo fragment from another
.graphql file (same way you'd import modules in JS).
And here's an example of defining the fragment in another | s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662521152.22/warc/CC-MAIN-20220518052503-20220518082503-00340.warc.gz | CC-MAIN-2022-21 | 761 | 14 |
https://www.contrarium.org/2020/06/23/marvellous-malacomorphs/ | code | What are “malacomorphs”? Well, “malakos” in Greek means literally “soft”, but it’s also by analogy how we scientifically call mollusks, including snails: malacology, for example, is the study of mollusks. So “malacomorphs” are snail-creatures.
For some reason that even most specialists don’t know, many manuscripts have in their corners little illustrations of snails and other animals. In some cases, the snails are crossbred with other animals or even humans. There is even a manuscript with an illustration of people living in snail houses.
Why snails? There are some hypotheses about their possible symbolism, but no one know for sure. Violent rabbits are also popular, which might have influenced Terry Jones in creating that famous scene in “Monty Python and the Holy Grail”. | s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510259.52/warc/CC-MAIN-20230927035329-20230927065329-00648.warc.gz | CC-MAIN-2023-40 | 806 | 3 |
https://simplyans.com/mathematics/the-joint-probability-density-funct-14034835 | code | The joint probability density function of x and y is given by f(x, y) = c(y 2 − x 2 )e −y , −y ≤ x ≤ y, 0 < y < [infinity] (a) find c. (b) find the marginal densities of x and y . (c) find e[x].
that is the sum of the interior angles of a triangle,or the 3 sided polygons
it's rational, it doesn't go on and on or has long repeating patterns.
hi my dear friend,
a bisector is a line that intersects two or more lines in different points. | s3://commoncrawl/crawl-data/CC-MAIN-2021-31/segments/1627046157039.99/warc/CC-MAIN-20210805193327-20210805223327-00666.warc.gz | CC-MAIN-2021-31 | 447 | 5 |
https://www.instructables.com/Wireless-3D-Printing-Monitoring-using-Astroprint-a/ | code | Introduction: Wireless 3D Printing & Monitoring Using Astroprint and Raspberry Pi
This Instructable is written to show you how to configure your existing 3D Printer to print and monitor wirelessly using Astroprint software. You can monitor it from home and anywhere using your Smartphone, Tablet, Laptop with any browser and Astroprint account. It was a great Kickstarter project. They also sell Astrobox hardware (Instead I am using Raspberry Pi here). Please visit them at https://www.Astroprint.com. If you have Raspberry pi, you can accomplish this task fairly quickly and easily by downloading the software and burning the image to the SD Card.
Step 1: Parts Required
- 3D Printer
- Raspberry Pi with 3 USB Outputs (3D Printer, Wifi, Camera)
- Micro SD Card with Micro SD Card reader
- WiFi USB adapter
- USB Webcam
- SD Card reader
- 5V Power Adapter for Raspberry Pi
- Win32 Disk Imager
- SD Formatter
- Astroprint software ( https://www.astroprint.com/downloads )
Step 2: Download Astroprint Software
Goto https://www.astroprint.com/downloads and download "AstroBox-rpi-0_5_2-20150209.zip" or latest software and Unzip to a folder. If you don't have an account, you have to create an account.
Step 3: Un-Compress the Zip
Extract the files from Zip to a folder.
Step 4: Format SD Card
Insert Micro SD Card into Micro SD Card adapter and Connect the Card reader to your computer. Down SD Card formatter utility (https://www.sdcard.org/downloads/formatter_4/index.html) and make sure the correct SD card drive is selected, Select format size adjustment option to ON and click Format.
Step 5: Burn the Astroprint Image to Micro SD Card
Click Blue folder to browse and select the Astroprint software image you downloaded in earlier steps. Please make sure the correct drive is selected and Click Write. The Write will take approx 3-5 minutes.
Step 6: Install SD Card and Wifi to Raspberry Pi
Install SD Card and Wifi adapter as shown into Raspberry Pi and Connect to Power. Wait for 5 minutes and let it boot and come online.
Step 7: Scan Your Wifi and Connect to Astrobox-xxxx
Scan your Wifi to see if you see Astrobox-xxxx in your Wifi Connections and connect to this astrobox-xxxx hotspot. This is your Raspberry-Pi hotspot.
Step 8: Connect to Your Astrobox-xxxx
Astrobox-xxxx (where 4 X's are number which identifies your new Astrobox) example shown here is Astrobox-8946.local
Open a Browser and type http://astrobox-xxxx.local as shown this will bring up the screen as shown. (again please replace 4 x's with the number which you see on yours) and Click Begin setup.
Step 9: Name Your Astrobox
In this step name your Astrobox and Note down the Astrobox connection URL.
Step 10: Connect Astrobox to Your Home Wi-Fi / Internet
Choose your Wifi Connection and Enter Password and Click Connect
Step 11: Login to Your Account With Astroprint Account
Login to your Astorpint Account or Create a new account. There is a free and a paid account. Free will work just fine. Next Step is where we connect our 3D Printer to the Raspberry Pi B+.
Step 12: Connect 3D Printer to Astrobox (Raspberry Pi)
Turn ON the 3D Printer and Connect 3D Printer USB Cable to Raspberry Pi and Click continue. Select the Correct Baud rate and click connect.
Step 13: Check Your Printer Status
Click on Connected Devices to see your Raspberry-Pi Astrobox. Click on Camera/Controls which will take you to a different screen showing the current printer bed and nozzle temperature. If you have connected the Web Cam, take a picture and adjust as needed.
Next Click Launch UI.
Step 14: Launch Astrobox UI
Clicking Astrobox UI will launch this window where you can upload the Gcode files and STL files and Click on the right most printer icon for printing your Gcode file , it will automatically setup the temperature and heat bed according to your Gcode specifications. The Second screenshot shows here the temperature of head bed is rising. (Most of your are probably aware of how to slice 3D Printer files, so, I am not going to go through how to slice 3D printer files in this instructable).
Step 15: Secure Your Astrobox/Raspberry Pi
Launch Astrobox UI (Click that Window) and Click on top as shown , this will bring a drop down menu, Choose Settings. Click Under Internet connection and Click Stop hotspot. This will stop broadcasting from your Raspberry-Pi so others cannot connect to your hotspot.
Step 16: Control X,Y,Z Axis and Extruder Temperatures
After you launch Astrobox UI, You can also Click as shown to bring up the Controls to Control X, Y, Z axis and Extruder temperature etc (equivalent to pronterface).
Step 17: Securely Power Off
Goto the same UI Controls Menu and scroll to the bottom to Gracefully shutdown your Astrobox/Raspberry-Pi Device and unplug it.
Participated in the
Pi/e Day Contest | s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474523.8/warc/CC-MAIN-20240224044749-20240224074749-00006.warc.gz | CC-MAIN-2024-10 | 4,790 | 49 |
https://www.headspin.io/blog/starting-an-appium-server-programmatically-using-appiumservicebuilder | code | A reader suggested that we write an article introducing the AppiumServiceBuilder functionality built into the Appium Java client.
All of our example code assumes that an Appium server is already running, and this is how many test suites start out too. It's so much more convenient if an Appium server is started automatically when the tests begin. The Java client has a convenient couple of classes for starting and stopping an Appium server. Other languages may have separate packages for doing this, or you can execute the Appium command as a separate process.
Node.js has the advantage of being the language Appium is written in, so an Appium server can be started just by requiring it:
Back in Java land, we start by creating an AppiumServiceBuilder which we then use to create an AppiumDriverLocalService:
Now that we have an AppiumDriverLocalService named server, we can start and stop it easily. When starting, an Appium server will run, and you will be able to connect to it. The Appium server logs, by default, are printed in the output of the test.
Accelerate Appium test cycles with the HeadSpin. Learn more!
Don't forget to stop the server when you are done:
In order to run an Appium server, the Java code in the AppiumServiceBuilder needs to know the location of the Node.js executable on your computer, and also the location of the Appium package itself. It has ways to guess the location, but those did not work on my machine, since I installed Node.js using nvm. If you only have Appium Desktop installed, you will also have to install the Appium node package, so it can be run from the commandline.
Also check: Testing Windows Desktop Apps with Appium
If you share your test code with a team and/or run in different CI environments, you can set this information via environment variables rather than hardcoding file paths in your test code. Store the paths in environment variables named NODE_PATH and APPIUM_PATH, and the AppiumServiceBuilder will pick them up automatically.
Another issue I ran into is that the XCUITest driver requires the Carthage package manager to be in the system PATH. If you followed the installation instructions for XCUITest driver, Carthage is installed using Homebrew and it is automatically added to the PATH, so this isn't normally an issue. Unfortunately, the way that AppiumDriverLocalService runs Appium, it does not re-use your defauly PATH and instead reverts to the system default. For my case, I corrected this by specifying a new PATH environment variable in the AppiumServiceBuilder:
You can add other environment variables for Appium using this same method. You can also specify other options, such as custom desired capabilities that Appium should default to, and custom ways of exporting Appium logs.
For my tests, I decided to use serviceBuilder.usingAnyFreePort();, so that when my tests run, the Appium server will use any available port, rather than insisting on using port 4723. This way, if I have a forgotten Appium server running in another window, it won't interfere with my tests.
If Appium starts on a random port, our code to start a session needs to know what the port is so the client can connect to it. To solve this, I connect the client this way:
The AppiumDriverLocalService object has a getUrl() method which will return the URL and port of the Appium server it started.
There are more methods you can use to customize the Appium server programatically. Check out the documentation here and try experimenting: https://appium.github.io/java-client/io/appium/java_client/service/local/AppiumServiceBuilder.html
Here's the full example, putting all this together for a sample test. As usual the full example code is also available on github. | s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100229.44/warc/CC-MAIN-20231130161920-20231130191920-00233.warc.gz | CC-MAIN-2023-50 | 3,719 | 17 |
https://forum.zcashcommunity.com/t/zcash-qt-wallet-a-zaddr-first-ui-wallet-for-zcash/31600 | code | Hey, I really appreciate the detailed feedback.
When it sends a shielded tx it displays the operation id but then when it completes it would be nice to display the txid
Great idea. Will change this.
The # of blocks plus sync % would be much more informative
Yes. This is a good idea too! I’ll add it.
it’s unintuitive that zcashd doesn’t store outgoing shielded transactions
Yes, I got tripped up on this as well yesterday when I was testing it. I wasn’t sure what to do here. Maybe I should store the sent z-transactions from the UI in local storage and then splice it into the transactions table.
testnet maybe you could pick the port as 18232 by default
I added this today, will be in tomorrow’s release
ability to import/export keys
Yup, I was planning on adding this. The one thing I was worried about was that people might copy-paste the keys, exposing them into the clipboard where other snooping apps might read them. Maybe I should just save it to a file?
Once again, thanks a ton for the feedback! I’ll add all of these features in. | s3://commoncrawl/crawl-data/CC-MAIN-2021-49/segments/1637964363292.82/warc/CC-MAIN-20211206103243-20211206133243-00452.warc.gz | CC-MAIN-2021-49 | 1,054 | 12 |
https://forums.macrumors.com/threads/does-dvds-from-iso-play-on-a-dvd-player.1258998/ | code | Does it work to burn dvd videos with disctools in OSX? I got an ISO image of a dvd, containing video_ts and audio_ts folders. I burn this to a dvd-r with disctools. Will it play on standard dvd players then? Or is there some unknown factors getting in the way, of my disc being recognized as a proper dvd movie? | s3://commoncrawl/crawl-data/CC-MAIN-2019-04/segments/1547583656897.10/warc/CC-MAIN-20190116052151-20190116074151-00082.warc.gz | CC-MAIN-2019-04 | 311 | 1 |
http://dictionary.reference.com/browse/good-time | code | 1928, from good (adj.) + time. Expression to have a good time "enjoy oneself" attested from 1822; earlier have a good time of it (1771). To make good time "go fast" is from 1838.
Time deducted from a prison term for good behavior: a period of solitary confinement and a loss of ''good time'' (1870+ Prison) | s3://commoncrawl/crawl-data/CC-MAIN-2015-22/segments/1433195036742.18/warc/CC-MAIN-20150601214356-00064-ip-10-180-206-219.ec2.internal.warc.gz | CC-MAIN-2015-22 | 306 | 2 |
https://www.oreilly.com/library/view/extreme-programming-adventures/0735619492/ch10.html | code | Last time out, I found a bug. Our rules of engagement require us to write a test, first to show that the bug exists and later to verify that we have fixed it, but we don’t know how to write that test! We get by with a little help from our friends.
In the previous chapter, I found a defect in the program: when insertion of a new set of paragraph tags takes you below the bottom of the window, the text doesn’t scroll up to keep the cursor on the screen. You have to keep clicking on the scroll bars to bring the line back up.
It took me only a little while to find and fix the defect. Here’s the code, from the XMLNotepad class, with the fix. That’s what we’re going to work on today:
void XMLKeyDownHandler(object ... | s3://commoncrawl/crawl-data/CC-MAIN-2019-39/segments/1568514576345.90/warc/CC-MAIN-20190923084859-20190923110859-00192.warc.gz | CC-MAIN-2019-39 | 729 | 4 |
https://community.cdata.com/data-sources-91/resolving-snowflakeexception-object-does-not-exist-or-operation-cannot-be-performed-599 | code | If you encounter the System.Data.CData.Snowflake.SnowflakeException with the message " SQL compilation error: Object does not exist, or operation cannot be performed," this article provides guidance on addressing the issue.
This error is typically returned by Snowflake when attempting to access an incorrect Warehouse, Database, or Schema. Snowflake is case-sensitive, and it's essential to be aware that Databases and Schemes are generated in uppercase letters.
1. Verify Connection Property in Package Manager Console:
Ensure that the connection property in the Package Manager Console is correctly configured, especially when you are scaffolding specific tables.
Even a blank space in the connection property can trigger this error. Double-check the connection details for accuracy.
2. Set IgnoreCase=True in the Connection Property:
You can set the IgnoreCase=True in the connection property to instruct Snowflake to treat identifiers as case-insensitive.
The default behaviour is case-sensitive (IgnoreCase=False).
Example of updated scaffolding command with IgnoreCase=True:
Scaffold-DbContext "url=https://myaccount.region.snowflakecomputing.com;user=Admin;password=test123;Database=Northwind;Warehouse=TestWarehouse;Account=Test;IgnoreCase=True;" CData.EntityFrameworkCore.Snowflake -OutputDir Models -Context SnowflakeContext -Schema PUBLIC -Tables Products
If you continue to face issues after implementing the above steps, don't hesitate to contact CData support for further assistance and troubleshooting. | s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100972.58/warc/CC-MAIN-20231209202131-20231209232131-00159.warc.gz | CC-MAIN-2023-50 | 1,518 | 11 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.