url
stringlengths 13
4.35k
| tag
stringclasses 1
value | text
stringlengths 109
628k
| file_path
stringlengths 109
155
| dump
stringclasses 96
values | file_size_in_byte
int64 112
630k
| line_count
int64 1
3.76k
|
---|---|---|---|---|---|---|
https://community.teradata.com/t5/Blog/Part-3-Backbone-js-Require-js-Improving-AMD-Performance-by/ba-p/66958 | code | This article is a continuation of Part 2: Backbone.js + Require.js, Further Modularization and Just in Time Dependency Loading. It describes how to use a cache manifest to improve just in time dependency loading performance. It also provides a cache priming alternative in the event that the user’s browser does not support a cache manifest, i.e. IE.
In the previous post we further modularized the code and took a look at using require.js to lazy load dependencies. After reading the last post you might have thought great now my code has to wait on network calls during run time if the block has never been executed. Don’t be such a negative Nancy. It is time you made use of the application cache.
A very bright developer wrote an excellent article on using the application cache. Although, I hear that he has begun to somewhat second guess his thoughts regarding offline usage. At any rate you can read it or choose from plethora of better articles on the web if you are unfamiliar with the application cache.
The first thing to notice in the code is that I added the file manifest.appcache, which is the cache manifest. This file is included via the master index.html by adding an attribute to the opening html tag. If a user’s browser supports the application cache then the files listed in manifest.appcache will automatically be downloaded and stored locally in the browser’s application cache, which is separate from the standard cache. A new file, cache.js, was also added to the bootstrapping process, main.js. cache.js contains a method that adds a load listener to reload the master in the case that cache manifest has changed, so that the updates are picked up without the user having to manually refresh.
Now you Debbie downers might be asking what if a user’s browser does not support the application cache?
You could stand to learn a thing or two from Pollyanna. In the event that a user’s browser does not support the cache manifest then we can use a simple cache priming trick. Nothing up this sleeve…
The prime method in cache.js automatically handles this for you. It parses manifest.appcache and makes XHR requests for each file listed in the manifest. There is a 5 second delay before this process executes, so that the application is not sluggish when it loads. The interesting thing to note is that we do not process any of the files. We simply make the request, so that the files get cached in the standard browser cache. You don’t really gain much in this example because the majority of the files are used right out of the gate when the application loads, but you can see the benefit in larger applications.
There you have it. No network delays at run time. On a related topic, since I started writing these articles I have a adopted a different approach to bootstrapping. Instead of loading commonly used “global” files, such as jQuery, Backbone, and Underscore, one at a time I now combine like files and make a single request. This solves a couple problems.
This may rub AMD purist the wrong way, but to me it is simpler and more efficient. Why not combine jQuery, Backbone, and Underscore into a single file and load it via require.js? Sure reliance on the globals is evil in the strictest sense, but I hate to dogmatically adhere to a design philosophy when I know that the simpler solution will suffice in 99% of the cases.
You must be a registered user to add a comment. If you've already registered, sign in. Otherwise, register and sign in. | s3://commoncrawl/crawl-data/CC-MAIN-2019-09/segments/1550247481992.39/warc/CC-MAIN-20190217111746-20190217133746-00219.warc.gz | CC-MAIN-2019-09 | 3,497 | 10 |
https://community.netgear.com/t5/WiFi-Range-Extenders-Nighthawk/WNHD3004-Adding-a-second-bridge-unit/m-p/411614 | code | WNHD3004 - Adding a second bridge unit
I currently utilize a WNHD3004 pair and I'm very happy with the operation. I would like to add a second brigde to facilitate a ethernet based system which is off in another room of the house.
My question is can a single WNHD3004 access point support multiple WHND3004 bridges?
If yes, anyone know where I can buy a single WHND3004?
FYI - In my setup I get 95Mb/s solid between my network and device across the WHND3004 units. Great for streaming movies across the house | s3://commoncrawl/crawl-data/CC-MAIN-2019-43/segments/1570987826436.88/warc/CC-MAIN-20191022232751-20191023020251-00459.warc.gz | CC-MAIN-2019-43 | 508 | 5 |
https://community.dynatrace.com/t5/AppMon-UEM/Problem-with-PurePath-containing-multiple-nodes-of-same-method/td-p/22811 | code | We have experience that there are some limitations when
it comes to creating BT based on purepath which contains same method multiple
times, but the functionality of method differ based on its argument values.
Below is the explanation:
We have some method say, getProcessSocket(String ip_address,
other_params) whose argument may contain multiple IP addresses indicating multiple interface services in application. So we naturally wanted to created
BT to show health of these interfaces by Method Response times. Below are uses
1. Which Interface is facing High Response time
is the return response code in the interface which is affected by high response
time or timeouts
Soon we found out that there is no way to tell the
dynatrace to consider only a particular method out of such purepath.
This also causes mingling of the response time or return code
for one interface to other in splitting. This leads to false alert for interface which is
not facing issue at all.
Since the method is invoked multiple times and both
interfaces A and B are invoked in same purepath, but interface A has timeout in
return value (or a high response time) and interface B is success, we are still
getting failure (or a high response time) in interface B also even though it is
a success and method has taken less response time.
Is there a resolution to this kind of problem in
Dynatrace, because this is very common for any application to behave
differently for the different argument value. (AFAIK, there is only a way to control this is use check box - Only Analyze First occurrence per PurePath, which is not good to simulate all scenarios) | s3://commoncrawl/crawl-data/CC-MAIN-2021-39/segments/1631780058415.93/warc/CC-MAIN-20210927090448-20210927120448-00110.warc.gz | CC-MAIN-2021-39 | 1,628 | 23 |
https://www.collaborationnation.club/events-1/holiday-gift-guide-giveaway | code | Sun, Oct 20|
Holiday Gift Guide Giveaway
Join our network of influencers in giving away $300 worth of best sellers from KidsEmbrace, Franco Dreams and more! The influencer with the most comments will win their own set of PAW Patrol items. Furthermore, use this opportunity to engage your follower base and get new followers. | s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100989.75/warc/CC-MAIN-20231209233632-20231210023632-00890.warc.gz | CC-MAIN-2023-50 | 324 | 3 |
http://mail.lon-capa.org/pipermail/lon-capa-users/Week-of-Mon-20030303/000580.html | code | [LON-CAPA-users] seed of student's problem
Guy Albertelli II
Fri, 7 Mar 2003 16:00:19 -0500 (EST)
> Where is the seed of a student's problem stored? -I don't see it in the
> SUBM menu when viewing "all details"...
It isn't stored anywhere.
The fuinction taht generates the seed in the Apache::lonnet::rndseed
function in the lonnet.pm file in /home/httpd/lib/perl/Apache
It takes the internal instance name of the the resource, the internal
course id number, the user's domain and the user's name to generate
The <radiobutton/option/image/match/rank response> use the
Apache::response::setrandomnumber function to also include to
problem's part id into the seed.
If you want to see the seed inside the script environment the variable
$external::randomseed is set to what is used.
[email protected] LON-CAPA Developer 0-7-7-4- | s3://commoncrawl/crawl-data/CC-MAIN-2021-49/segments/1637964359082.76/warc/CC-MAIN-20211130232232-20211201022232-00383.warc.gz | CC-MAIN-2021-49 | 838 | 16 |
http://www.qad.com/erp/menuitem.59f182664053393643b543b58790307a?vgnextoid=3917b2a009110210VgnVCM100000810903a7RCRD | code | The QAD Reporting Framework is a powerful toolset included, free of charge, in QAD Enterprise Edition Standard Edition and Enterprise Edition. The QAD Reporting Framework enables users to create and run forms and reports. The framework includes an intuitive drag-and-drop designer, a viewer and a batch scheduler. It allows output to .PDF or Excel, is printer-enabled and supports barcode printing.
Flexible Browses and Capabilities
QAD .NET UI browses can be used as a datasource for reports. These browses are easily modified with the use of the Browse Maintenance toolset, allowing for easy modification to the types of data being displayed on reports. Additionally, for complex reporting needs, the QAD Reporting Framework allows for the use of custom datasource programs. Although QAD’s browses provide a way for users to access data ad hoc, a printable format is also available for immediate querying and adjustments to search criteria. The QAD Reporting Framework was developed to accommodate requirements for frequent access to data (i.e., daily, weekly or monthly) as well as specific output needs (i.e., display of the company logo on the first page).
In addition to providing the user flexibility to change font types, font sizes, colors, graphics and calculations in a form or report, the QAD Reporting Framework also allows users to embed the following items in their output:
- Barcodes, including support of the following codes: 39, 93, 128, I2of5, Codabar, PostNet, Ean13, Ean8, UpcA and QR
The QAD Reporting Framework includes the following sample forms and reports:
- Work Order
- Sales Order
- Purchase Order
- Call Quote
- Bill of Lading
To enable rapid report development, the QAD Reporting Framework includes the following templates:
- Portrait Columns
- Stepped Portrait Columns
- Portrait Labels
- Landscape Labels
- Landscape Columns
- Stepped Landscape Columns
Creating New Reports and Layouts
The QAD Reporting Framework Designer is a standard style tool for creating the layout of reports and forms, with easy data selection and design element panels on the left, and a WYSIWYG layout panel on the right.
QAD Reporting Framework Designer
Once the report or form is designed, the end user will see a selection criteria screen from which to run it:
QAD Reporting Framework Designer - Selection criteria screen
The file can then be output to a printer, a .PDF file or an Excel spreadsheet.
QAD Reporting Framework Designer - PDF output file
The QAD Reporting Framework facilitates the creation and scheduled runs of customer-facing documents and reports. The system can be setup to automatically send completion notifications for scheduled reports to users’ email accounts or to user accounts through the QAD .NET UI’s integrated messaging system. | s3://commoncrawl/crawl-data/CC-MAIN-2016-30/segments/1469257829970.64/warc/CC-MAIN-20160723071029-00226-ip-10-185-27-174.ec2.internal.warc.gz | CC-MAIN-2016-30 | 2,777 | 26 |
https://chinese.stackexchange.com/users/4265/james-wu | code | More than 10 years experience with Microsoft program ecosystem and tech since .NET Framework 1.0.
6 years of Microsoft MVP (ASP.NET for FY 04~10), more than 10 years experience with Web site development, system architecture design and analysis, ASP.NET & C# coding. 2 years Java coding and 1 year Python coding.
Studied Data Mining of master degree and more than 4 years of Search Engine machanism with Lucene and Solr programming and design.
Member for 6 years, 3 months
8 profile views
Last seen Sep 25 '17 at 10:55 | s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593657140746.69/warc/CC-MAIN-20200713002400-20200713032400-00480.warc.gz | CC-MAIN-2020-29 | 517 | 6 |
https://bavatuesdays.com/mega-shark-meets-the-uss-indianapolis/ | code | — Jim Groom (@jimgroom) July 10, 2020
Just like Captain Caveman and Jabberjaw, Tommaso and I are boiling the ocean! This is another installment of Tommaso’s exploration of game development, and he had the idea to turn this into a regular game development log update, so this is log update 0 (not sure why he wanted to start at zero, but he’s in charge). This video was a manageable 20 minutes, and it gives you a pretty good idea of how locked in he is to created the Megashark game in Unity. It features him showing off the bi-plane dropping bombs on the shark, the game physics that make it possible, and some on and off banter as he is easily distracted from the task at hand.
I have to say doing this is a total blast, and just a few short days after hatching the shark game idea he is really running with it. I am liking his vision of it a lot, and it got me thinking there could be a USS Indianapolis plot line we could take advantage of, but Tommaso is sage in his reservations given potential historical backlash. I’m excited to see where this does, and doing a vlog like this with one of my kids is kind of a dream come true 🙂 | s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100603.33/warc/CC-MAIN-20231206194439-20231206224439-00098.warc.gz | CC-MAIN-2023-50 | 1,146 | 3 |
https://kodivpntvks.web.app/schab81703ma/internet-ftp-server-1206.html | code | Folder view for FTP sites is enabled in the Internet Explorer versions that are listed in the "Applies to" section. When you turn on folder view for FTP sites, the Internet Explorer client bypasses the Web Proxy and tries to send FTP connection requests directly to the Internet. This operation is unsuccessful.
FileZilla Server. Intuitive interface. Perform file transfers simultaneously. Supports secure file … How to Connect to FTP Servers in Windows (Without Extra Jul 05, 2017 How to set up and manage an FTP server on Windows 10 Jul 02, 2018
It's widely accepted that file transfer protocol (FTP) is the simplest way for organizations to send data across the Internet. To enhance security, many companies now use sFTP or FTP/S, the
EMWIN FTP Server Internet File Pull . The “enterprise Emergency Managers Weather Information Network” (eEMWIN) File Transfer Protocol (FTP) service is an anonymous FTP service operated by the United States (US) National Weather Service (NWS) National Centers for Environmental Prediction (NCEP) Central Operations (NCO). The files on the eEMWIN FTP service provide time segmented archived FTP Test. Our Public FTP test site info is below and can be used to upload test DLP files. The files will only be stored for 30 minutes before being deleted.
What Is FTP And How Does It Work? - The Connection
Download this app from Microsoft Store for Windows 10 Mobile, Windows Phone 8.1. See screenshots, read the latest customer reviews, and compare ratings for FTP server. How to access my ftp sever over the internet? - Server Fault I have Windows Server 2016 running on an Azure VM, and I'm trying to get ftp running on it. FTP role is installed, ports 21 and 20 are opened in the firewall and in Azure portal. And still port 20 doesn't seem to be open, since the port scanner times out. How to Connect to an FTP Server from Windows Explorer Oct 10, 2016 | s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446710974.36/warc/CC-MAIN-20221204140455-20221204170455-00397.warc.gz | CC-MAIN-2022-49 | 1,893 | 6 |
https://linustechtips.com/main/profile/542582-codtay56/ | code | I recently just got a new case for the wife and graphics card(1070), the case is on the cheaper end (raidmax neon). during installation and my first attempt to turn it on worked, unplugged in walked over to the desk plugged everything in and no power. took it back to work desk and figured out the PSU is toast for what ever the reason is. will not power up the motherboard I had an extra 850 watt and hooked it all up, it powers on flipping the switch on the back ( like automatically without pressing the power button) when I shut it down from the start menu I cannot turn on the PC with the button, and it will not start flipping the switch on the back, I have to unplug the button and short it out to start it back up. any clues as to what it might be? | s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593655899931.31/warc/CC-MAIN-20200709100539-20200709130539-00030.warc.gz | CC-MAIN-2020-29 | 756 | 1 |
https://matthewtift.com/configuration-management-drupal-8-key-concepts/ | code | (This article was cross-posted on lullabot.com.)
While the new configuration system in Drupal 8 strives to make the process of exporting and importing site configuration feel almost effortless, immensely complex logic facilitates this process. Over the past five years, the entire configuration system code was written and rewritten multiple times, and we think we got much of it right in its present form. As a result of this work, it is now possible to store configuration data in a consistent manner and to manage changes to configuration. Although we made every attempt to document how and why decisions were made – and to always update issue queues, documentation, and change notices – it is not reasonable to expect everyone to read all of this material. But I did, and in this post I try to distill years of thinking, discussions, issue summaries, code sprints, and code to ease your transition to Drupal 8.
In this article I highlight nine concepts that are key to understanding the configuration system. This article is light on details and heavy on links to additional resources.
- It is called the “configuration system.” The Configuration Management Initiative (CMI) is, by most reasonable measures, feature complete. The number of CMI critical issues was reduced to zero back in the Spring and the #drupal-cmi IRC channel has been very quiet over the past few months. Drupal now has a functional configuration management system, but we only should call the former a CMS. While it is tempting to think of “CMI” as an orphaned initialism, like AARP or SAT, we aspire to avoid confusion. Our preferred phrase to describe the result of CMI is “configuration system.” This is the phrase we use in the issue queue and the configuration system documentation.
- DEV ➞ PROD. Perhaps the most important concept to understand is that the configuration system is designed to optimize the process of moving configuration between instances of the same site. It is not intended to allow exporting the configuration from one site to another. In order to move configuration data, the site and import files must have matching values for UUID in the system.site configuration item. In other words, additional environments should initially be set up as clones of the site. We did not, for instance, hope to facilitate exporting configuration from whitehouse.gov and importing it into harvard.edu.
- The configuration system is highly configurable. Out of the box the configuration system stores configuration data in the database. However, it allows websites to easily switch to file-based storage, MongoDB, Redis, or another favorite key/value store. In fact, there is a growing ecosystem of modules related to the configuration system, such as Configuration Update, Configuration Tools, Configuration Synchronizer, and Configuration Development.
- There is no “recommended” workflow. The configuration system is quite flexible and we can imagine multiple workflows. On one end of the spectrum, we expect some small sites will not ever use the configuration manager module to import and export configuration. For the sites that utilize the full capabilities of the configuration system, one key question they will need to answer regards the role that site administrators will play in managing configuration. I suspect many sites will disable configuration forms on their production sites – perhaps using modules like Configuration Read-Only Mode – and make all configuration changes in their version control system.
- Sites, not modules, own configuration. When a module is installed, and the configuration system imports the configuration data from the module’s config/install directory (and perhaps the config/optional directory), the configuration system assumes the site owner is now in control of the configuration data. This is a contentious point to some developers because module maintainers will need to use update hooks rather than making simple changes to their configuration. Changing the files in a module’s config/install directory after the module has been installed will have no effect on the site.
- Developers will still use Features. The Features module in Drupal 8 changes how the configuration system works to allow modules to control their configuration. Mike Potter, Nedjo Rogers, and others have been making Features in Drupal 8 do the kinds of things Features was originally intended to do, which is to bundle functionality, such as a “photo gallery feature.” The configuration system makes the work of the Features module maintainers exponentially easier and as a result, we all expect using Features to be more enjoyable in Drupal 8 than it was in Drupal 7.
- There are two kinds of configuration in Drupal 8: simple configuration and configuration entities. Simple configuration stores basic configuration, such as boolean values, integers, or texts. Simple configuration has exactly one copy or version, and is somewhat similar to using variable_get() and variable_set() in Drupal 7. Configuration entities, like content types, enable the creation of zero or more items and are far more complex. Examples of configuration entities include views, content types, and image styles.
- Multilingual needs drove many decisions. Many of the features of the configuration system exist to support multilingual sites. For example, the primary reason schema files were introduced was for multilingual support. And many of the benefits to enabling multilingual functionality resulted in enhancements that had much wider benefits. The multilingual initiative was perhaps the best organized and documented Drupal 8 initiative and their initiative website contains extensive information and documentation.
- Configuration can still be overridden in settings.php. The $config variable in the settings.php file provides a mechanism for overriding configuration data. This is called the configuration override system. Overrides in settings.php take precedence over values provided by modules. This is a good method for storing sensitive data that should not be stored in the database. Note, however, that the values in the active configuration – not the values from settings.php – are displayed on configuration forms. Of course, this behavior can be modified to match expected workflows. For example, some site administrators will want the configuration forms to indicate when form values are overridden in settings.php.
If you want more information about the configuration system, the best place to start is the Configuration API page on api.drupal.org. It contains numerous links to additional documentation. Additionally, Alex Pott, my fellow configuration system co-maintainer, wrote a series of blog posts concerning the “Principles of Configuration Management” that I enthusiastically recommend.
I hope you will agree that the configuration system is one of the more exciting features of Drupal 8. | s3://commoncrawl/crawl-data/CC-MAIN-2019-09/segments/1550247480622.9/warc/CC-MAIN-20190216145907-20190216171907-00376.warc.gz | CC-MAIN-2019-09 | 6,951 | 14 |
https://bytescout.com/articles/premium-suite-vbscript-convert-pdf-to-high-quality-png-with-pdf-renderer-sdk | code | The sample source code below will teach you how to convert pdf to high quality png with pdf renderer sdk in VBScript. ByteScout Premium Suite is the bundle that includes twelve SDK products from ByteScout including tools and components for PDF, barcodes, spreadsheets, screen video recording. It can be applied to convert pdf to high quality png with pdf renderer sdk using VBScript.
Want to quickly learn? This fast application programming interfaces of ByteScout Premium Suite for VBScript plus the guidelines and the code below will help you quickly learn how to convert pdf to high quality png with pdf renderer sdk. Just copy and paste the code into your VBScript application’s code and follow the instructions. Complete and detailed tutorials and documentation are available along with installed ByteScout Premium Suite if you’d like to learn more about the topic and the details of the API.
You can download free trial version of ByteScout Premium Suite from our website to see and try many others source code samples for VBScript.
' Create Bytescout.PDFRenderer.RasterRenderer object Set renderer = CreateObject("Bytescout.PDFRenderer.RasterRenderer") renderer.RegistrationName = "demo" renderer.RegistrationKey = "demo" ' Load sample PDF document renderer.LoadDocumentFromFile "../../multipage.pdf" ' Render PDF document at 600 DPI for higher quality Dim renderingResolution renderingResolution = 600 ' Image format: 0 - BMP; 1 - JPEG; 2 - PNG; 3 - TIFF; 4 - GIF Dim outputImageFormat outputImageFormat = 2 ' Iterate through pages For pageIndex = 0 To renderer.GetPageCount() - 1 ' Render document page to PNG image file renderer.Save "page" & CStr(pageIndex) & ".png", outputImageFormat, pageIndex, renderingResolution Next | s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510427.16/warc/CC-MAIN-20230928162907-20230928192907-00339.warc.gz | CC-MAIN-2023-40 | 1,737 | 4 |
https://miycreations.com/guidance/uGIwbAcSMZM/plotly+animated+line+chart+in+python+plotly+python+tutorial+plotly+tutorial | code | Get the answer: Plotly Animated Line Chart In Python | Plotly Python Tutorial | Plotly Tutorial in 41:48 minutes. This solution was published on March 17 2020. Bar Graph -- Python Plotly.
Bar Graph -- Python Plotly Line Plot (Dropdown) - Dash Python (中文字幕) Python Tutorial: Learn Scipy - Fast Fourier Transform (scipy.fftpack) In 17 Minutes Explore Your Data And Then Let Others Do It Too: Plotly Express And Dash - Nicolas Kruchten PowerPoint Tutorial Line Chart Animation (2) Stationary Time Series | Practical Time Series Analysis (Machine Learning) In Sktime(Python) Text Summarization Using Python (Flask) In ONE VIDEO | Text Summarize Flask Web App In Python Python Plotting Tutorial W/ Matplotlib & Pandas (Line Graph, Histogram, Pie Chart, Box & Whiskers) Animated Car Chart In Excel Seaborn Python Tutorial | Complete Seaborn Crash Course | Data Visualization In Seaborn | Kgp Talkie Plotly Python Tutorial | Cufflinks Python Tutorial | Interactive Data Visualization In Python Getting Started With Plotly And Jupyter! Create 3D Scatter Plot -- Python Plotly Dash And Python 3: Using CSS Automate Excel Using Python | Excel Hacks With Pandas
Here is the Guidance: Plotly Animated Line Chart In Python | Plotly Python Tutorial | Plotly Tutorial
|Tutorial||: Plotly Animated Line Chart in Python | Plotly Python Tutorial | Plotly Tutorial|
|Duration||: 41:48 minutes|
|Has been viewed for||: 1,729 times|
|Updated on||: March 17 2020|
Please report us If you found any illegal activity on this tutorial video: Plotly Animated Line Chart in Python | Plotly Python Tutorial | Plotly Tutorial | s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600400193391.9/warc/CC-MAIN-20200920031425-20200920061425-00258.warc.gz | CC-MAIN-2020-40 | 1,604 | 8 |
https://pdfslide.net/technology/getting-started-with-cloud-foundry-on-bluemix-58fbbcec5568c.html | code | IBM BluemixGetting Started with Cloud Foundry
Introduction to PaaS (5 min) Cloud Foundry overview (5 min) Bluemix console exploration (5 min) Creating and updating an app (5 min)
Section 1 PaaS and IaaS: Where are we and how did we get here?
Where do websites live?We all know what a website is. Most people are unaware of what makes them tick.
This is the standard architecture for your typical web application. As the web and underlying applications have evolved, so has this architecture.
The number of transistors incorporated in a chip will approximately double every 24 months.
-Gordon Moore, 1975
The first path to the cloudInfrastructure as a Service (IaaS)
Customer ManagedService Provider Managed Infrastructure as
Platform as a Service
The key to rapid application development is optimal abstraction. The PaaS and IaaS models help deliver the right level for developers.
The stack is not your friend
Section 2 Cloud Foundry: What is the platform, anyways?
The industry-leading open PaaSCloud Foundry
Clouds - Public, Private, LocalChoice
Runtimes - node.js, spring, ruby on rails, byob Services - MongoDB, MySQL, Redis, Twilio
Decreased time to deployment aka faster G2MBenefits
Increased environment parity Services can be self-assembled to create integrated apps Elastically scale applications Removes worries of OS and middleware patches
Development methodologies must adapt to techDrawbacks
Requires dev awareness of platform limitations and best practices Control over underlying middleware and infrastructure is limited
Platform is abstracted as a set of large-scale distributed services
Components are dynamically discoverable and loosely coupled
Uses Cloud Foundry Bosh to operate the underlying infrastructure from the IaaS provider
Uses a dynamic router to shape and route all traffic and orchestrate load balancing
Droplet Execution Agents (DEAs) are responsible for the app lifecycle
Health Manager monitors and maintains application uptime
Buildpacks detect app runtime and compile source code into executable binaries
Cloud Foundry Architecture
Flexible Compute Options to Run Apps / ServicesInstant Runtimes Containers Virtual Machines
Platform Deployment Options that Meet Your Workload Requirements
DevOps Tooling Your Own Hosted Apps / Services
Integration and API Mgmt
Powered by IBM SoftLayer In Your Data Center
+ + +
Catalog of Services that Extend Apps Functionality
Web Data Mobile AnalyticsCognitive IoT Security Yours
Cloud Foundry is the underlying PaaS behind Bluemix. It enables teams to practice continuous delivery by making it easier to deploy, run, and manage apps.
Where does Cloud Foundry fit in?
Types of services Accounts for a SaaS application Managed database on a multi-tenant server Plans for messaging providers
How it works When a user adds a service, an instance of that particular service is provisioned
A service broker handles communication between CF and the service itself
Service processes run on service nodes or with external as-a-service providers
Services allow users to provision resources on demandCloud Foundry Services
Section 3 & 4 The console: How do I use this thing?
1. Find your desired runtime in the catalog
2. Select the runtime, make sure you are in your desired org and space, then fill in the Name and Host fields in the configuration box
3. Click CreateYour app will now stage and deploy. Once it is finished, hit View App link to access
your running app!
Creating an appThe simplest way to get a functioning app up on Bluemix is to create an app from one of the supported runtimes in the catalog.
1. Download the starter code
2. Open up the public/index.html file using your favorite text editor
3. Change the value inside the h1 element on line 18 to read Hello World! and save
4. Push the app back to Bluemix using the cf login and the cf push commands
Editing your codeDownload your code to edit it locally and push the updated version back to Bluemix using the CF CLI
Thank You! Questions?
Additional ResourcesUse the following resources to continue exploring Bluemix
IBM Bluemix GitHub: https://github.com/ibm-bluemix
Bluemix Blog: https://developer.ibm.com/bluemix/blog/
Cloud Foundry Foundation: https://www.cloudfoundry.org/
Cloud Foundry CLI: https://github.com/cloudfoundry/cli | s3://commoncrawl/crawl-data/CC-MAIN-2020-45/segments/1603107893402.83/warc/CC-MAIN-20201027052750-20201027082750-00579.warc.gz | CC-MAIN-2020-45 | 4,269 | 60 |
https://zone.ni.com/reference/en-XX/help/375472H-01/switchpropref/pniswitch_masterslavescanadvancedbus/ | code | |Download Help (Windows Only)|
Short Name: Master Slave Scan Advanced Bus
Property of niSwitch
This property has been deprecated and might be removed from a future release of NI-SWITCH. Use niSwitch Route Scan Advanced Output VI instead.
The following table lists the characteristics of this property. | s3://commoncrawl/crawl-data/CC-MAIN-2021-39/segments/1631780057347.80/warc/CC-MAIN-20210922102402-20210922132402-00261.warc.gz | CC-MAIN-2021-39 | 301 | 5 |
https://www.appsapk.com/simple-camera/ | code | If you want to launch this app at pressing the hardware camera button, you might have to disable the built in Camera app in Settings -> Apps -> Camera -> Disable.
Contains no ads or unnecessary permissions. It is fully opensource, provides customizable colors.
This app is just one piece of a bigger series of apps. You can find the rest of them at simplemobiletools.com
Allow customizing the app launcher icon color
Split settings into subsections
Couple smaller bugfixes and stability improvements
Simple Mobile Tools | s3://commoncrawl/crawl-data/CC-MAIN-2019-09/segments/1550247484689.3/warc/CC-MAIN-20190218053920-20190218075920-00360.warc.gz | CC-MAIN-2019-09 | 519 | 7 |
https://cavijayan.com/2022/06/08/how-to-install-wifi-printer-on-mac/ | code | Most people who work with drivers don’t even know what it is or how it works. I will be addressing these questions in today’s guide, where you will learn all there is to know about drivers on Windows 10. For only $9.99 a month Driver Support | ONE can help you save time and frustration dealing with common Windows device issues as well as added optimization and safety features. Now that you’ve gotten a taste of what’s involved in updating your drivers manually you can see how the process can get old fast. If you’re feeling lucky, or just stubborn, here’s how you can update your own drivers. The process has been boiled down to a relatively simple series of steps that you can follow. These problems come in a wide variety and all share a common factor, they can often be solved by installing helpful software like Driver Support.
- In most cases the upgrade should be to the latest development version, but it is a good idea to check Bugzilla and the AppDB for any known regressions and/or new bugs.
- These slow-down issues can be resolved by performing a restart of the Windows OS-operated device.
- If you want to keep it as a backup, you can rename or move it instead.
- In addition, there was a driver for “Intel Xeon” (?) device in the list.
After it has fully initialized, plug the printer back in and power it on. Click any tab to view and change the printer property settings. In , double-click the name of the machine whose driver you want to install. The kernel is a computer program that manages all of the system’s processes and acts as its operating system core.
Realistic Programs In Driver Updater – An Introduction
Previously, he was a Senior Consultant at Red Hat, a technology company known for its Linux server and opensource contributions. Network interfaces which are used for transferring data packets through the network. Where REPOLIST_OF_DRIVER should be specified from the driver documentation (e.g., epel-list). Where NAME_OF_DRIVER is the probable name of your driver. You can also add pattern match to your regular expression to filter further. Any driver that’s recognized will show in the results. Guess what, windows uses a scsi emulation layer for ide burners also.
Effortless Device Manager Plans – Insights
@Julio- If you are working with escpos-php, you might consider opening a question on the issue tracker. The rocketdrivers.com/manufacturers/canon/printers/mg3620 left margin looks quite large, and there may be a command that can be implemented to adjust it. @Herliansyah Espon LQ and LX printers speak ESC/P2, which is not the same as ESC/POS. Very simple prints will work, but for anything more advanced, you probably want an ESC/P2 library instead. I used a COM port monitor and can see how the code send the code to the printer. Mike, I’m trying to COM port in Bixolon SRP 350II but the printer don’t print. @Subas – Different sizes on one line have always aligned to the base.
Simple Solutions For Device Manager – What’s Required
Both 32-bit and 64-bit Windows applications work with it; however, there are still many bugs. 32 bit Wine runs on both 32-bit and 64-bit Linux/Unix installations. 16-bit and 32-bit Windows applications will run on it. | s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510225.44/warc/CC-MAIN-20230926211344-20230927001344-00193.warc.gz | CC-MAIN-2023-40 | 3,235 | 12 |
http://stackoverflow.com/questions/625618/sql-server-ports | code | We recently installed a sonic firewall on our network. We have a SQL 2005 express server that's configured to listen on dynamic ports. In its configuration manager the dynamic port number is set as 1067 with its default port still 1433.
From my understanding we need to have the following ports open for it to work:
Problem is we still cannot connect to the server from outside. When we switch off/disconnect the firewall we can can access the server.
This tells me that the SQL server's setup is fine and the that the problem must be some port we are missing on the firewall. | s3://commoncrawl/crawl-data/CC-MAIN-2015-27/segments/1435375096579.89/warc/CC-MAIN-20150627031816-00139-ip-10-179-60-89.ec2.internal.warc.gz | CC-MAIN-2015-27 | 576 | 4 |
https://epiphanychurch.us/download-godot-engine-for-android/ | code | - Download Godot Engine For Android App
- Download Godot Engine For Android Free
- Download Godot Engine For Android
- Godot Export To Android
Here is a new Godot engine tutorial on how to export, install and open an Android Godot application on a real mobile device.I explain which software you need. In the java/bin subfolder, the resulting apk can be used as export template. Note: If you reaaaally feel oldschool, you can copy your entire game (or symlink) to the assets/ folder of the Java project (make sure engine.cfg is in assets/) and it will work, but you lose all the benefits of the export system (scripts are not byte-compiled, textures not converted to Android compression, etc.
Download Free Godot Engine (64-bit) Download (2021 Última versión) Download Windows Free PC 10, 8, 7 for Windows PC
Godot Engine is an advanced, shortcut, open source 2D engine and 3D game engine for Windows PC! Godot offers many of the most common tools, so you can just focus on making your game without re-updating the wheel. Godot Engine is a complete and open source under an authoritative license from MIT. No strings attached, no charges, nothing. Your game is yours, right down to the last line of the engine code.
Godot Engine Features:
The most effective paradigm for game design
Download Godot Engine For Android App
An intuitive editor, full of mature tools.
A compact user interface, with sensitive content editors.
An amazing surprise set, an example of a catch and an inheritance.
Ways to create friendly content for artists, level designers, animators, …
2D and 3D visual shading layout.
Continuous live editing (changes are not lost after stopping the game). Live programming for mobile devices!
Create any kind of complex 2D games
A fully dedicated 2D engine, no hacks.
Work with pixels as your units, but measure any screen size and size.
Custom 2D physics engine that works on pixel coordinates.
Flexible kinematic Governor collision outside of physics.
Blit 3D models as 2D sprites.
Create beautiful 3D games
Import 3D models from 3DS Max, Maya, Blender, and more with full animation.
Bones cover and shape the shape.
Different types of lights, with a shadow map.
Provide HDR, anti-aliasing, and specific color modes.
Post-process haze, glow, blossom, color correction, …
Physical support support is planned for the end of 2016.
A dynamic animation system for games Standard ps 2 keyboard driver windows 10.
Highlight 2D or 3D. Visual image editor and timeline.
Framed or cut-out animations for sprites and forums.
Any material of any item can be animated, or work calls.
Use custom curves and tweens.
Assistants blend 2D platforms, with bone and IK.
User that allows imported 3D animation.
Animation Support with liquid character images.
Characterize objects with built-in text
Download Godot Engine For Android Free
Writing language similar to Python, designed to make games with zero difficulty.
Integrated editor with syntax highlighting, real-time integration and coding.
A powerful integrated debugger and profile. You can remove an error in the active game on mobile devices.
Integrated text browser.
Friendly C ++ API to add game components or extend any engine component.
Play games everywhere!
Download Godot Engine For Android
Mobile platforms: iOS, Android, BlackBerry OS
Desktop platforms: Windows, OS X, Linux, * BSD, Haiku
Web Platforms: HTML5 (with Emscripten)
One-click and export on multiple platforms. It’s easy to build a custom build again.
Download Last Version: Godot Engine (64-bit) Download (2021 Última versión) Download Windows Free PC 10, 8, 7 for Windows 10, 9, 8, 7
How to Download Godot Engine (64-bit) Download (2021 Última versión) Download Windows Free PC 10, 8, 7 Free PC
Godot Export To Android
Download tags: #Godot #Engine #64bit #Download #Última #versión #para #Windows #windows #pc #download #free | s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323585353.52/warc/CC-MAIN-20211020214358-20211021004358-00494.warc.gz | CC-MAIN-2021-43 | 3,866 | 54 |
https://hitesh.in/tag/faster/ | code | I am reposting this from my, now dead, blog. Hopefully this time I will be able to finish the series.
Note: This is not targeted at seasoned professionals who would find most of the stuff mentioned here very basic. Instead this is for beginners who unfortunately do not have good mentors.
Know your tools
To start of there is nothing more important than knowing all the capabilities of your tools, be it an IDE, a report generator, database, text editor or the operating system itself. This will help to:
- Know what is possible, thus saving time wondering how to do something
- Know what is the best tool to do something
Know your most productive times and plan your day around that. Avoid any disturbances, meetings etc. during your peak times. Get other things, like documentation or responding to mails etc., done during non peak time. | s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323585204.68/warc/CC-MAIN-20211018155442-20211018185442-00686.warc.gz | CC-MAIN-2021-43 | 839 | 7 |
https://www.producthunt.com/@ariellezuck | code | Living in a van, former partner at KPCB
Create march madness pools with ease
Smart, hands-free calling, with Alexa built in
In-house convenience stores, by WeWork members.
Do more with your apps. Made by Apple. ✨
A toolkit to ship awesome products, by Product Hunt ⛵️
DIY logo maker, create original logos in seconds
✨A startup sisterhood for future founders 💪🏽
Create your own Alexa Skill in minutes
The programmable contact center platform 📱
Slack for College 🌴
Watch your favorite tech experts unbox awesome products 📦
Your personal, private, digital women's health assistant
Design, code and collaborate. Now all-in-one.
Better finds the money your health insurance owes you.
Human stories from around the globe
Build Applets that go beyond "if this then that" for free
The easiest way for angels to start a venture fund
Tracks consumer sentiment for top apps and services.
Next-gen customer support
The best way to start an internet business | s3://commoncrawl/crawl-data/CC-MAIN-2019-22/segments/1558232256571.66/warc/CC-MAIN-20190521202736-20190521224736-00028.warc.gz | CC-MAIN-2019-22 | 969 | 21 |
https://www.warriorforum.com/main-internet-marketing-discussion-forum/566211-renting-traffic-youtube-videos.html | code | You find a youtube vid, related to your niche... ideally, someone who has no clue about IM.
Offer them a few bucks to stick a few links on their video... or buy their chanel, if its an option.
So, what's the best play here.
I'm thinking, a cpc deal.
If you offered someone $5 for every 100 clicks... would that fly?
Anyone doing this, tips? | s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320306181.43/warc/CC-MAIN-20220129122405-20220129152405-00049.warc.gz | CC-MAIN-2022-05 | 340 | 6 |
http://huffduffer.com/adactio/18784 | code | This session presents a wide variety of mistakes, blunders, misconceptions, over-indulgences, intricacies, and generally silly aspects of modern web accessibility. Sometimes the most serious errors are made by well-meaning developers who misunderstand the concepts or take their limited accessibility knowledge to an extreme level - thus web accessibility gone wild.
Also huffduffed as…
By Steve Faulkner at the Accessibility 2.0 conference in London, 2009.
Doug Rushkoff, author of Life Inc.: How the World Became a Corporation and How to Take It Back, speaking at SXSW 2010.
"Today’s podcast is a continuation of WOW’s media coverage of the Web Accessibilty Conference that took place at the University of Illinois at Urbana/Champaign campus last week. For today’s podcast, I’m on the phone with Victor Tsaran Senior Accessibility Program Manager at Yahoo.
Victor was the Keynote speaker at the conference and presented on a variety of Web acessibility topics including the value of accessibility for all." | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696383160/warc/CC-MAIN-20130516092623-00050-ip-10-60-113-184.ec2.internal.warc.gz | CC-MAIN-2013-20 | 1,018 | 6 |
https://www.upwork.com/o/jobs/browse/skill/data-encoding/ | code | For Coders, Engineers, Developers, Software Guys, and Techies:
I am not a technical person, so it is very difficult for me to define exactly what skills I'm looking for. I don't know anyone in real life who is a developer, so if you have any pointers to this problem, I appreciate any and all commentary or suggestions. I will do my best to define what I need, and if you are interested in helping me, please let me know what you need, and I'll see what I can do.
I am looking to develop a software solution which purges all content on any user's social media profile off the internet. The client will somehow allow this software to access his social media accounts and then all posts, comments, likes, and other behavioral existence will be erased from that profile.
For example, let's use facebook: I would like this software solution to access a client's account and delete all of the user's behavioral history from the existence of facebook. I'm talking all status updates, all wall posts to other people, all likes, all comments, all photos, everything completely deleted and erased. I know this is possible because you can manually unlike and delete anything you want on facebook. The problem is, because many peoples' accounts date back to over 10 years, it is nearly impossible for anyone to do all of that work manually, so I am looking for a software solution to be doing this automatically.
This app would be for everyone in the world who has a social media account and is concerned with privacy at the highest level. As a law student and law clerk, I have been seeing a shocking amount of cases where attorneys submit the opposition's social media profile as evidence to support their claims; and as far as the courts are concerned, it is all reality. As far as the courts are concerned, the way you present yourself on the internet is who you are in real life. Therefore, guarding individual privacy is becoming a greater and greater necessity. I am not sure how large I want this to scale or how many people will want to use it at the same time. I am not able to predict yet how much people will respond to such necessity. I don't know what a "technology stack" is and have no idea what a developer means by "architecture". As a result, I am looking for a developer that has the patience to explain to me how my theoretical desires could translate into actual code.
Since this would be an ever-evolving product that intends to integrate all social media platforms, there would be no goals or deadlines so much as a drive to pursue the most optimal solution through relentless experimentation. I am not aware of the technical issues which can come up, I have no idea what level of research and debugging is required, and I honestly have no concept of the headaches engineers suffer in creating these solutions. My biggest challenge is communicating with the programmer in a way that eliminates our jargonic language barriers. I also don't know what constitutes appropriate compensation for a job like this, that's why I am primarily basing this on what you need. I would appreciate feedback on how difficult or time consuming this project may be, and I am more than willing to work with the right developer on what the cost should be to make it.
Thank you everyone who read it. I would appreciate any and all feedback or help on this. | s3://commoncrawl/crawl-data/CC-MAIN-2016-22/segments/1464049274059.91/warc/CC-MAIN-20160524002114-00223-ip-10-185-217-139.ec2.internal.warc.gz | CC-MAIN-2016-22 | 3,347 | 7 |
https://fedorahosted.org/autoqa/ticket/264 | code | Ticket #264 (closed task: wontfix)
Run eclipse test suite for new eclipse koji builds
|Reported by:||jlaska||Owned by:|
|Priority:||minor||Milestone:||Future test cases|
Spoke to overholt at FUDCon Tempe and he would like to have the existing eclipse test suite run each time the 'eclipse' package is built in koji. The initial estimate of work involves ...
- Create a test wrapper responsible for downloading koji packages, preparing test configuration, run test, send results to eclipse-owner@…
- <what else>?
Overholt can provide more details on test configuration aspects. Andrew, if you are able to create a script (bash or python), that handles preparing the tests and executing them. We can then integrate that within AutoQA. | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172775.56/warc/CC-MAIN-20170219104612-00020-ip-10-171-10-108.ec2.internal.warc.gz | CC-MAIN-2017-09 | 734 | 8 |
http://www.cartographersguild.com/regional-world-mapping/23261-wip-kingdoms-kesh-fantasy-map-11.html | code | A magnifying glass then.
I'm not sure I explained things very clear :/ In fact actual timelines are related to their maps. Timeline 1 is history of events past in the time of map 1. They just cause changes that you can further see then on the map 2. But timeline 2 talks about the events of the second age (map2). By the ways maybe this idea was a bit confused to work on the map or a bit too complicated, so the idea from SK is probably the easiest to set up without breaking the all map design and look (which I actually like ).
Well, thanks Chasio, SK and Vorro for your time and your suggestions about that, it's much appreciated. And don't worry Chasio, if it were hanging on your wall, you'd see it's not that big so no need for a stepladder!
NO, this thread isn't dead
I'll go back to work on Kesh as soon as I'll be done wuth Yphyrion (which should be soon). I'll use SK's idea and move down Timeline 1 and 2, which will become 2 and 3, then add an origine storyline in Timetable 1.
And there was rejoicing in the land!
"I like a look of agony, because I know it's true."
Great to hear
Great to see a complete version soon.
The parchment marbleization is really fantastic. It gives the whole map such a real feeling and authentic looks. It makes the whole map unique. Again the plenty details are great as in your other work. Also the coast lines have their own style with the shadowing engraving (hope to use the wright words).
It is really difficult to decide, which of your maps are the best, but I definitively feel drawn toward that parchment looks!! Could look at your maps the whole day long and forget about computers ....
Last edited by ThePatrick; 10-03-2013 at 03:11 PM. Reason: tried to improve the English | s3://commoncrawl/crawl-data/CC-MAIN-2014-42/segments/1414119646352.2/warc/CC-MAIN-20141024030046-00295-ip-10-16-133-185.ec2.internal.warc.gz | CC-MAIN-2014-42 | 1,726 | 12 |
https://www.365jz.com/article/10958 | code | I've written a simple Python class for creating daemons on unix/linux systems. It was pieced together for various other examples, mostly corrections to various Python Cookbook articles and a couple of examples posted to the Python mailing lists. It has support for a pidfile to keep track of the process. I hope it's useful to someone.
Below is the Daemon class. To use it, simply subclass it and implement the run() method.
And here is an example implementation. It implements the daemon as well as it's controlling client. Simply invoke this script with start, stop or restart as it's first argument.
That's it! I hope this is of some use to someone. Happy coding! | s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656103036363.5/warc/CC-MAIN-20220626010644-20220626040644-00483.warc.gz | CC-MAIN-2022-27 | 666 | 4 |
https://csc-archive.web.cern.ch/2010/iCSC2010/Programme/1-Soft_Mngmt_Opt/Soft_Mg-Invidual_lectures/L4_DS.htm | code | Distributed version control allow you to work more
efficient and with greater flexibility while keeping most of
the benefits of a centralized versioning system. This
lecture aims to explain why and how you use it and how it
differ from for example CVS and svn.
The history of development from local to centralized (e.g.
CVS and svn) to distributed version control systems will be
covered, explaining the difference between them and their
benefits and drawbacks.
will contain a discussion on different work-flows for
collaborating in a group and how a distributed version
system give you more flexibility in this perspective.
examples, Git will be used (http://git-scm.com/).
An introduction to Git and basic as well as more advanced
usage will be given. This includes the use of branches and
how to rewrite the version history. | s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764499801.40/warc/CC-MAIN-20230130034805-20230130064805-00840.warc.gz | CC-MAIN-2023-06 | 827 | 16 |
http://www.imc.tue.nl/imc-main/imc-main-node190.html | code | Make a function file of the following form:
Exercise 6.3: FOR loop
function b = kwad(r)
in which a row vector is squared element-wise. Do this without using the command
(HINT: Use the command
- Work out the problem on paper.
- Write the m-file in MATLAB.
- Test the function file with the row
= [1 2 3 4 5] and, if necessary, debug the file. | s3://commoncrawl/crawl-data/CC-MAIN-2018-09/segments/1518891812871.2/warc/CC-MAIN-20180220010854-20180220030854-00001.warc.gz | CC-MAIN-2018-09 | 341 | 9 |
https://forge.softwareheritage.org/T3050 | code | I don't know enough about the internals of SQLite to figure out if that could work. Having a single writer with EXCLUSIVE + WAL to minimize latency is not too much of a concern (the target is writing at least 100MB/s). But having hundreds of concurrent readers is a requirement: there are many daemons searching the content of the archive. The "yet" in the documentation makes me think it is a next step and hopefully not too difficult.
It is conceptually similar to a collection of RBD images containing a sequence of objects (SHA256 + content). To allow for fast random reads, a rocksdb index located elsewhere (not necessarily in Ceph since it can be rebuilt if lost) is updated when an object is added, using SHA256 as a key, the identifier of the image that contains it and the offset at which it is to be found. | s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233511717.69/warc/CC-MAIN-20231005012006-20231005042006-00416.warc.gz | CC-MAIN-2023-40 | 817 | 2 |
https://publica.fraunhofer.de/entities/publication/1ed4e14a-9943-46e7-94ce-d16d9dd52c5a | code | Application of local concepts in the automotive industry
The automotive industry has been among the protagonists for the application of numerical simulation tools within the development process of new components and products for many years. Precision and quality of the simulations depend largely on the correct description of deformation and failure mechanisms of the materials under investigation. In this paper, two examples are presented which demonstrate the power of advanced simulation techniques. In the first example we focus on a concept for the evaluation of the durability of exhaust components under severe thermo-mechanical loading conditions. It is based on the application of local elastic-plastic fracture mechanics concepts to the growth of micro-cracks, the evaluation of the relevant crack tip loading requires the consideration of non-proportional, non-isothermal plastic deformations. | s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296948867.32/warc/CC-MAIN-20230328135732-20230328165732-00054.warc.gz | CC-MAIN-2023-14 | 906 | 2 |
https://blogs.technet.microsoft.com/seanearp/2010/07/21/jumpstart-your-windows-7-and-office-2010-deployment/ | code | In case you are starting to evaluate the deployment of Windows 7 and Office 2010 in your environment (especially now that Windows 2000 is no longer supported), I just found an excellent resource on TechNet:
The site and content walk you through exploring the benefits, creating a business case, assessing hardware readiness, determining application comptibility, creating an image, and deploying a technical proof of concept. There is also a downloadable Jumpstart kit that includes a preconfigured VHD that includes all of the tools you need… the Microsoft Deployment Toolkit, Application Compatibility Toolkit, Windows 7, Office 2010, etc. Make sure you run the VM on Hyper-V with connectivity to the internet so that the image can activate when it first loads.
For more information: | s3://commoncrawl/crawl-data/CC-MAIN-2019-35/segments/1566027315865.44/warc/CC-MAIN-20190821085942-20190821111942-00394.warc.gz | CC-MAIN-2019-35 | 787 | 3 |
https://smartgo.blog/2020/01/11/using-strong-go-programs-on-macintosh/ | code | SmartGo for Mac is not playing strongly, as computer play is using my own pre-AlphaGo engine. However, like SmartGo for Windows, you can use GTP (Go Text Protocol) to connect to strong engines to play against.
The most recent version of SmartGo for Macintosh (0.8.18) includes some improvements in how it handles GTP engines. It’s not perfect, there’s much more to be done, but hopefully it will tide you over while I keep my focus on the new SmartGo for iOS.
The first step is downloading and installing the computer go engines you want to connect to. Here are three I’ve tested with SmartGo for Mac, from easy to hard to install. All assume that you’re somewhat comfortable using the Terminal app; check out this iMore guide if you’re new to the command line.
The easiest way to install Pachi on the Mac is using Homebrew (which you probably have to install first). Follow these instructions:
Find Leela Zero on Github, scroll down to I just want to play with Leela Zero right now, and follow the Homebrew instructions. You’ll also have to download a file with network weights; the link is in that same section.
Installing KataGo is more complicated, as you have to compile it yourself. Follow the instructions for Linux at https://github.com/lightvector/KataGo.
Once you’ve installed an engine, you need to add it to SmartGo. Choose SmartGo > Preferences in the menu and click on GTP. Then click on the + icon and navigate to the executable of the engine you want to add. SmartGo uses the engine name to guess reasonable parameters, then tries to run the engine to get its name and version. If you see a green checkmark with the name and version, you’re all set. Otherwise, edit the parameters sent to the GTP engine (the third column in the table). The following basic settings work for my setup:
Leela Zero: -g –playouts 1000 –noponder -w /usr/local/Cellar/leela-zero/0.17/best-network/40b_257a_64k_q
KataGo: gtp -model /Users/anders/work/katago/cpp/models/model.txt.gz -config /Users/anders/work/katago/cpp/configs/gtp_example.cfg
Leela Zero and KataGo take a while to initialize, so even just getting name and version initially can take a minute, and SmartGo may time out. If it does, just try starting a game against the engine anyway (File > New Game, specify the engine in the dropdown for Black or White), and see if it works.
I hope these instructions get you pointed in the right direction. I’m sorry none of this is as easy as it should be.
You must be logged in to post a comment. | s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224655092.36/warc/CC-MAIN-20230608172023-20230608202023-00487.warc.gz | CC-MAIN-2023-23 | 2,517 | 12 |
https://www.jvt.me/mf2/2020/07/4j5es/ | code | Feedback giving and receiving is really important, and I've found it can make someone's day to give them some feedback that helps appreciate the things they've done.
Something I've tried - and regularly failed - on doing is providing microfeedback (regular small pieces of feedback as and when folks do things)
However, Julia's point about asking first is something I've not considered before, so I'm definitely going to keep that in mind.
Recommended read: When your coworker does great work, tell their manager https://jvns.ca/blog/2020/07/14/when-your-coworker-does-great-work-tell-their-manager/
This post was filed under bookmarks. | s3://commoncrawl/crawl-data/CC-MAIN-2021-04/segments/1610703499999.6/warc/CC-MAIN-20210116014637-20210116044637-00631.warc.gz | CC-MAIN-2021-04 | 636 | 5 |
https://www.ungeneva.org/en/faq/tag/467 | code | All questions with this tag
The United Nations family comprises a large number of intergovernmental organizations, specialized agencies, programmes, funds, offices and research institutes as well as related organizations. Many of these organizations have a presence in Geneva. UNOG is a member of this wider United Nations family in Geneva and cooperates closely with many of the United Nations entities present here. For more information, see the section of the web site devoted to the UN Family in Geneva. | s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446710933.89/warc/CC-MAIN-20221203143925-20221203173925-00250.warc.gz | CC-MAIN-2022-49 | 507 | 2 |
http://www.freesound.org/forum/freesound-project/149/ | code | New here... there are a couple of sounds i have come across that id really like to download.
When i click "download" it open in Quicktime but doesn't allow me to save to disk.
I've searched my drive for the filename but no joy.
Any help would be greatly appreciated.
right click on the download link and select save-as.
(if your on mac os then i cant help you but i suspect something like shift-clicking might be the trick)
I thought it was 'Option'+ click (the apple button i guess)... | s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917127681.84/warc/CC-MAIN-20170423031207-00625-ip-10-145-167-34.ec2.internal.warc.gz | CC-MAIN-2017-17 | 486 | 7 |
https://getridbug.com/database-administrators/oracle-how-to-get-execution-plan-for-sql-executed-inside-of-plsql/ | code | All we need is an easy explanation of the problem, so here it is.
Is it possible to examine the execution plan for a SQL statement executed inside a PLSQL block?
DECLARE l_count PLS_INTEGER; BEGIN SELECT COUNT(1) INTO l_count FROM foo; END; /
For regular SQL I would normally run the following to check the execution plan:
select * from table(dbms_xplan.display_cursor(null, null, 'ALLSTATS LAST'));
However, this just reports:
NOTE: cannot fetch plan for SQL_ID: 3q0sujncq54wy, CHILD_NUMBER: 0 Please verify value of SQL_ID and CHILD_NUMBER; It could also be that the plan is no longer in cursor cache (check v$sql_plan)
How to solve :
I know you bored from this bug, So we are here to help you! Take a deep breath and look at the explanation of your problem. We have many solutions to this problem, But we recommend you to use the first method because it is tested & true method that will 100% work for you.
You can look up the
v$sql. Something like:
Select s.sql_id, s.child_number From V$sql s Where upper(sql_text) like upper('SELECT COUNT(%FROM foo') And Sql_text not like '%v$sql%';
Note that pl/sql normalises static SQL for you to boost cursor sharing – it will be in upper case with much less white space.
Once you’ve got these, you can just input into the
Note: Use and implement method 1 because this method fully tested our system.
Thank you 🙂 | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572515.15/warc/CC-MAIN-20220816181215-20220816211215-00177.warc.gz | CC-MAIN-2022-33 | 1,363 | 16 |
https://apps.apple.com/us/app/pound-calculator-pound-conv/id1460222098?ign-mpt=uo%3D4 | code | 【What is Pound Calculator】
A major feature is that it supports "Pound conversion", which is used to convert weight.
It supports 5 units of g, kg, gr, oz, and lb.
And, this app provide the most suitable thousands separator, and decimal point expression corresponding to the language setting of your terminal.
In addition to this, it supports memory calculation, square root, percentage calculation.
This app can view the history of all calculation formulas including pound conversion.
Also can swap the positions of the keys freely, and select a color pattern.
You can make settings for the following items.
-Number of decimal places to display
-Vibration ON / OFF at key touch
-Sleep ON / OFF on calculation screen
・"MRC" key Press once to read from memory, press twice to clear memory
・C key once to Clear only the current state, press twice to clear all.
※For details of pound conversion, please see the hint in the application.
Made in Japan.
Pound Calculator -pound conv-© CO., LTD. TAS All Rights Reserved
・Fixed a minor bug.
With Family Sharing set up, up to six family members can use this app. | s3://commoncrawl/crawl-data/CC-MAIN-2019-26/segments/1560627998376.42/warc/CC-MAIN-20190617043021-20190617065021-00122.warc.gz | CC-MAIN-2019-26 | 1,114 | 18 |
https://phanmembaotrithietbi.com/qa/question-can-i-get-a-job-after-aws-certification.html | code | - Do AWS certifications expire?
- Which AWS course is best?
- Can I get a job with AWS certification without experience?
- How hard is it to learn AWS?
- Can I get good salary if I learn Amazon Web Services?
- Is AWS worth learning in 2020?
- Is it worth doing AWS certification?
- Does AWS require coding?
- How long does it take to learn AWS?
- What to do after getting AWS certified?
- Can you get a job with AWS cloud practitioner certification?
- Is python needed for AWS?
- Can a fresher get a job in AWS?
- Is AWS a good career?
- Which AWS certification is most in demand?
- Can I learn AWS on my own?
- How should a beginner start AWS?
- Is AWS training free?
- Is python required for AWS?
- Which is better CCNA or AWS?
- Is AWS cloud practitioner easy?
Do AWS certifications expire?
AWS Certifications are valid for three years.
To maintain your AWS Certified status, we require you to periodically demonstrate your continued expertise though a process called recertification..
Which AWS course is best?
Which cloud certification is best?AWS Certified Cloud Practitioner.AWS Certified Developer – Associate.AWS Certified SysOps Administrator – Associate.AWS Certified Solutions Architect – Associate (SAA-C02)AWS Certified DevOps Engineer – Professional.AWS Certified Solutions Architect – Professional.More items…•Jan 31, 2021
Can I get a job with AWS certification without experience?
Amazon Web Service requires no coding. Amazon does not seek any prior experience or programming skills. In other terms, if you are eager and have confidence, then an AWS job with no experience is suitable for you. But having the Amazon Web Service Certificate is demanded by the company.
How hard is it to learn AWS?
Learning AWS can be quick an easy and can take as little as a few days up to a few months. But, the exact time it’ll take you to learn AWS depends on your past experience. Okay, so that gives you a rough idea of how long you can expect to learn AWS.
Can I get good salary if I learn Amazon Web Services?
AWS Salary in India: Based on Experience If you have less than one year of experience as an AWS architect, you will make somewhere around Rs. 4,80,000 in a year. If you have been around for a while and have developed great skills in the meantime, you will be paid around Rs. 8,00,000 every year.
Is AWS worth learning in 2020?
AWS certification doesn’t just look good on your resume—it can significantly boost the kind of salary or rate you command. According to our independent salary survey, 70% of AWS professionals interviewed reported a salary increase of up to 20% after passing their certification.
Is it worth doing AWS certification?
AWS certification is not enough to get a job, but it’s a strong advantage and possibly even a deciding factor. … If you have some industry knowledge and experience, getting certified by a reliable and successful industry leader such as AWS is an excellent way to advance your career.
Does AWS require coding?
To learn AWS, you don’t need any coding skills or other prerequisites. Moreover, you can choose from different programming languages such as Java, . NET, Python, etc. If you are looking for an online course to learn AWS, I recommend enrolling for an AWS Training Course to learn AWS.
How long does it take to learn AWS?
Depending on how much experience you already have, it’s possible to learn AWS in 3 days with our instructor-led courses comprising of 18 hours of training. If you’re looking to gain AWS certification this will take a little longer, as you’ll also need to prepare for the exam.
What to do after getting AWS certified?
8 AWS JOBS a YOU CAN GET WITH AN AWS CERTIFICATIONOperational Support Engineer. … Cloud Software Engineer. … System Integrator — Cloud. … Cloud Developer. … DevOps Engineer. … AWS Solutions Architect. … AWS SysOps Administrator.Dec 14, 2017
Can you get a job with AWS cloud practitioner certification?
AWS Cloud Practitioner: Jobs and Salaries Taking the AWS Practitioner Certification can still land you a lucrative position as a project manager and pave the way for gaining the experience you need to tackle the more technical roles.
Is python needed for AWS?
An efficient AWS architect should be able to write code in Java, Python, C# or any other of the programming languages which have an official AWS SDK. Understanding programming in general is important for creating viable, logical solutions that would work as intended.
Can a fresher get a job in AWS?
Yes, it is extremely possible for a fresher to bag a job as an AWS solutions architect given that they either have a certification or are proficient in the domain. They may be questioned on data structures, AWS services, coding languages and will be required to solve real-life problems applying these concepts.
Is AWS a good career?
Yes, AWS is a good career option for a fresher. In cloud computing, AWS has been on top for almost 6 years now and they are not going to loose their market soon so, AWS is a good option.
Which AWS certification is most in demand?
AWS Solutions Architect – AssociateNo surprise that CIO calls it one of the most in-demand IT certifications for 2021. The AWS Solutions Architect – Associate is the most popular AWS certification, which means it’s arguably the most popular cloud certification out there.
Can I learn AWS on my own?
You just need to enroll with them and then you can learn AWS at any time, at any place, and on your own schedule. But, if you are completely new to the AWS domain or Cloud let me give you a brief overview of Amazon Web Services and its benefits over traditional infrastructure setup.
How should a beginner start AWS?
The best place to start as a complete beginner is with the Cloud Practitioner exam. The Cloud Practitioner exam is going to give you a solid basis in AWS.
Is AWS training free?
At aws.training, you can enroll in free digital training and get unlimited access to more than 100 new courses built by AWS experts. You can also access previews of more advanced training on Machine Learning and Storage.
Is python required for AWS?
One should have solid experience using AWS core services: EC2, S3, VPC, ELB. They must have an experience working with scripting languages like Python, Bash. They must have an experience working with automation tool like Chef/Puppet.
Which is better CCNA or AWS?
AWS is surely better as that’s most widely used technology. CCNA is specific to Cisco and only networking. … The CCNA might interest you more based on your background, but AWS is hot and the future.
Is AWS cloud practitioner easy?
Cloud Practitioner is the easiest exam in AWS certfication track. Since this cerification targets for Non-technical people too, this exam is easy to crack. You can expect questions from following sections for this exam. … Security Model – How the security responsibilities are shared between AWS and Customer. | s3://commoncrawl/crawl-data/CC-MAIN-2021-25/segments/1623487600396.21/warc/CC-MAIN-20210613041713-20210613071713-00040.warc.gz | CC-MAIN-2021-25 | 6,939 | 64 |
https://topoftheround.libsyn.com/website/book-three-acknowledgements | code | Sep 14, 2021
Our crew here at TotR has so much to be thankful for as we look back on our third Book. Here are some much-deserved thank yous and some information about when BOOK 4 BEGINS! Thank you for supporting us along this amazing and wild journey!
ISHNAR/KALCRIN HOMEBREW SETTING by Kenon Pearce
Sound editing and design by Nikki Richardson
Kenon Pearce @mr_fugufish
Jordache Richardson @jdash24
Nikki Ri @nikkirivo
THANK YOU HONORARY PRODUCERS!
Wanna talk to the cast? Check out our private Discord! https://discord.gg/qshNJJfKRr
Or check out our channel on the CastJunkie Discord Server! https://discord.gg/napQ3Cb
Go to our website for MERCH! https://www.totrpodcast.com/merch-store.html#/
Find/Review us on Podchaser: https://www.podchaser.com/podcasts/top-of-the-round-808056 | s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510326.82/warc/CC-MAIN-20230927203115-20230927233115-00340.warc.gz | CC-MAIN-2023-40 | 784 | 12 |
https://community.atlassian.com/t5/Marketplace-Apps-Integrations/Insight-Asset-Management-gt-print-inventory-labels-on-zebra/qaq-p/1908426 | code | in our Insight, we manage a lot of different assets, including all the computers/notebooks.
today, there are 5 (!) different labels on each notebook. (e.g. label with the asset-ID, one label with the first level support phone number, one label with the organisational unit using the notebook, etc.)
Labels are manually created, printed on a laser printer. As we are working in a healthcare environment, labels do not survive desinfectants.
Short: it is a mess.
My idea: I would like to by a Zebra ZD621 label printer and print one label, and in a quality, which survives the harsh hospital conditions.
The Zebra printer uses a special printing language: Zebra Programming Language (ZPL). Is there a way to get Insight to deliver the needed information in that spedific syntax to a USB-connected printer?
Any ideas are very much appreciated.
I had a similar case as yours : printing asset labels on a Zebra printer, from Windows environement. You are right about Zebra Programming Language, but there exist also Windows drivers (provided by Zebra) that could make your life easier. My use case : labels where generated in PDF format, then printed to the Zebra printer. Hope this will help.
I used to work as an Industrial IT engineer, and at that time, I was using the Zebra Programming Language; and I remember that printing image on industrial zebra printers what not so easy (if I remember well, image file must first be uploaded to the printer, then referenced into the ZPL code sent to the printer). When printing using the Windows driver, you don't need to bother about that : we put the company logo on the asset label I used to print, and it was properly printed. The printer model was different : don't remember it, but it was an office printer, not an industrial one, so I assume it should be fine with your model too. If not already done, contact a Zebra reseller, which will be able to answer your questions, and provide you with the right printing media you need, suitable for healthcare environment.
Happy New Year, everybody! What better way to kick off 2022 than with a new Marketplace Partner Spotlight ✨ This month, we're getting to know Daniel Franz, co-founder of Fine Software. Fine Software ...
Connect with like-minded Atlassian users at free events near you!Find an event
Connect with like-minded Atlassian users at free events near you!
Unfortunately there are no Community Events near you at the moment.Host an event
You're one step closer to meeting fellow Atlassian users at your local event. Learn more about Community Events | s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320299927.25/warc/CC-MAIN-20220129032406-20220129062406-00393.warc.gz | CC-MAIN-2022-05 | 2,555 | 14 |
https://cerberus-testing.com/blog/this-is-how-to-implement-maintainable-automated-tests/ | code | This Is How To Implement Maintainable Automated Tests
An important feature is late. The development team finally commits the last changes. We run the campaign, but it is full of orange and red indicators. We don’t have time to update the tests, so the campaign is bypassed to be updated “later”. In reality, it starts to be forgotten that precise day.
The journey of test automation is full of bottlenecks. Once convinced by test automation, we can finally move forward. But with a growing test suite comes another challenge, the one of maintenance. Forgetting about test maintainability as a requirement can lead to the situation described above.
The adoption of test automation is supported by a drive to accelerate software changes frequency with stability. The natural tendency is to increase our test automation coverage until we are sufficiently confident. The thing is, software applications are evolving to iterate on the value proposition through digital interactions. Therefore, we have to deal both reactively and proactively with test maintenance.
Let’s first define automated test maintainability.
What do maintainable automated tests mean?
Maintainability is a requirement by itself, part of the non-functional requirements category. A key element of maintainable automated tests lies in the ease of dealing with changes. Like in software, the Pareto principles apply to automated tests with 80% of the effort passed on their maintenance.
Good maintainability supports ease of defects fixing at their base, acting surgically limiting impacts on the whole system. This good structuration results in preventing unexpected side-effects while performing changes.
Consequently, we can maximize the automated tests’ useful life (remember the test campaign bypass & forget?), efficiency, reliability, and safety. Most importantly, we keep the ability to meet new requirements, a must-have for a continuous testing approach.
Let’s look at specific techniques, starting far from technical details.
A structure aligned on the business domain
The product management teams manage their test referential because they have specificities. It is then more accessible for the technical team to implement only the relevant tests with specific information. We can do better than that; why having a silo in the first place?
Teams require a transversal collaboration to have a fast feedback loop on their experimentation. A shared test repository will support an active collaboration, a common vocabulary, and a similar structure. These elements are valuable for test maintenance.
We will take the example of an e-commerce platform. Traditional product areas will be present such as the Catalog, Product, Customer, Checkout, and Support. Each of these areas can then be subdivided into customer journeys composed of pages and context. This is a business structure we need to reuse in our tests to maximize alignment and understanding.
We have to close even more gaps, describing clearly the test cases.
Clear self-explanatory test cases
Imagine you just arrived as a QA replacing a leaving member. Unfortunately, no hand-over was possible. You are left with what remains of the documentation. Your first reflex will be to search for the automated tests, to find the “reality”.
Well-structured, readable, and understandable test cases are at the foundation of knowledge management. In our example, the value is to secure the continuity of knowledge within a team. Additionally, clarity is also helpful on the daily basis of collaboration.
Efficient solutions do not mean to be complex. In test automation, clear test cases with simple action and controls in plain language are required foundations. The Keyword Driven Testing (KDT) frameworks are relying on this approach.
Specific techniques can also improve our approaches, such as Behavior-Driven Development (BDD) and the Single Responsibility Principle (SRP). A more practical test is also possible: ask a business person unfamiliar with your test what he understands after reading it once.
A good structure can then be reused.
Reusable components we can easily update
Factorization is a practice trained early in engineering courses. Modules, functions, and components are identified as good practice. Test automation also benefits from these practices, where similar thinking can be applied.
Automated tests are composed of a set of actions and controls, then grouped into a logical structure. In Cerberus Testing, a library of automation actions are available for both actions and controls, simplifying their usage and maintenance.
A Step then allows the grouping of actions and controls inside a Test Case. Similarly, we can keep our step in a Step Library to reuse it across our various tests. The value is to simplify the changes in evolution; we only have to change one place.
Cerberus Testing also supports the Page Object Model pattern with the application object repository. This feature enables to manage a referential of objects reused across various test cases with a centralized repository. That way, a single change in an object is applied to all test cases using the components.
We have an interesting toolbox to use wisely.
Test Maintenance requires a balance
The main risk is to fall into the over-optimization pitfall where the goal isn’t to ease maintenance but to maximize reuse. This practice leads to dangerous heterogeneous modules reused everywhere we fear to change, the inverse of our initial goal.
Our answers are in the balance of various elements. We must balance business and technical constraints to achieve understanding and usability for both worlds. Coupling and decoupling require an objective assessment of their trade-offs.
We have to keep our initial test maintenance goals as a guiding principle: ease the changes of existing and future requirements. Test maintainability is an art of balance we must master in a continuously changing world.
Start using Cerberus Testing for free.
Wikipedia, Maintainability https://en.wikipedia.org/wiki/Maintainability | s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474377.60/warc/CC-MAIN-20240223085439-20240223115439-00613.warc.gz | CC-MAIN-2024-10 | 6,058 | 33 |
https://lavag.org/search/?tags=data&updated_after=any&sortby=newest | code | Search the Community
Showing results for tags 'data'.
Found 6 results
Dhans posted a topic in LabVIEW GeneralHi, all I am doing now pulse oximeter project in labview. I have got signals from oximeter and waveform is generated in waveform graph. But not a smooth one. I need a smooth waveform like the image attached here. What are the applicable methods to solve this problem?
Asking for Feedback on Data Project
HelenaDomo posted a topic in LabVIEW GeneralHi all, We are a group of students from the University of Cambridge who are developing a new data connectivity system for researchers like us, its up at https://rinocloud.com It currently integrates with LabVIEW, Matlab and Python. The plugin will point your data directly at our secure storage where you can automatically add metadata results for easy and fast retrieval. We’re also rolling out plotting features for presenting the data, collaboration features for project teams and an integrated lab book. We are looking for new users, researchers like us, to help us to get feedback from our product. You’ll be able to directly influence the product development so that you get a data system that is useful for you. Know more at https://rinocloud.com https://twitter.com/Rinocloud Thanks, Helena
Old content remains in lvclass files
Steen Schmidt posted a topic in Object-Oriented ProgrammingHi, I've decided to take the temperature on a known issue, that lvclass files retain knowledge of some of their old content after it's deleted. Proof For some reason I'm not allowed to upload lvclass files, so I'll describe it instead (using LV2014SP1): 1) Create a new class and save it on disk as class1.lvclass. No member data nor methods, file size on disk is 8 kB. 2) Add one piece of significantly sized (to easier see the issue) member data, I added a 1000x100 array of DBL (with random default data in it). Save the class again, and now class1.lvclass is 4604 kB (why so much, should be around 1000 kB?). 3) Delete all member data again and resave the class. File size on disk is now 1171 kB, I'd have expected 8 kB. 4) I can't ever get rid of that extra data in the lvclass file, not even when I "save as" to create a similar class. Questions A) What's the reason behind this issue? B) Is there any way to really delete stuff from a class file, or is the only way to recreate every class from scratch if you want something truly gone? C) Is there a list (perhaps internal to NI) of which problems this issue causes? Here I'm talking about stuff like this and numerous other threads about class data suddenly not being updated or member data or methods not being called correctly with DD. Cheers, Steen
How to convert data to time domain?
Duc Tran posted a topic in LabVIEW GeneralI have a data file EMG signal .tdms, the signal represented by number of samples and amplitude (24bit data). I want to perform this signal into a time domain to perform spectral analysis EMG signal. I look forward to help me continue my project. I send all write file and read file the signal EMG signals Thanks so much. P/s: Read EMG Signal read data file sEMG_1.tdms EMG monitor write EMG signal acquisition to sEMG_1.tdms Read EMG Signal.vi EMG monitor_.vi
I'm working on a large project and have run into a quandary about how to best deal with a large shared data set. I have a set of classes that define 3 data structures. One is for a script read from disk that the application executes. Another is the output data from the program, generated as the script is executed. The last is a summary of the current state of execution of the script. The first two can be significant in size and are unbounded. In my application, I have one actor (with sub actors) responsible for reading the script from disk, executing it and collecting the data. It also updates the summary status data. Let's call this the control actor. I have another actor that takes the data and displays it to the user, allowing them to navigate through it while the script is being executed. Lets call this the UI actor. The last actor is responsible for communicating the summary to another application over the network. We will call this the comm actor. So, the control actor is generating the data and the other two are consumers of the data. I had originally thought to have all the data stored as state data in the control actor and then as it is updated/created just message it to the other actors. But then they would essentially have to maintain a copy of the data to do their job. This seems inefficient. Then I thought I could wrap the data classes in DVRs and send the DVRs to the other classes. That way they could share the same data. The problem with that is they would not control when their data gets updated. And I am violating the philosophy of actors by creating what is essentially a back channel for data to be accessed outside of messages. Also, I could block the 'read' actors when I am writing to the DVR wrapped class. I would have to be careful when updating subsections to lock the DVR in an in-place structure to do the modify and write. Then comes the question of how to best alert the readers to changes made to the data by the writer. Simpy send them a message with the same DVRs in it? Or send a data-less message and have them look at the updated values and take appropriate action? So, any best practices or thoughts on how to resolve this issue? I appreciate any feedback.. -John
Hi all ! I mainly use XML files as configuration file for my applications. And then use flatten/unflatten from XML to populate a configuration cluster... I've made a routine which creates the configuration file if it has been deleted by the user. In that case the XML file is create with default values. I usually 'store' these values in the strict type definition of my cluster (see In Strict Typedef png). I was wondering if it was a good idea ? Or should I explicitly bundle the values in my code (like in Init png) ? | s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296949642.35/warc/CC-MAIN-20230331113819-20230331143819-00029.warc.gz | CC-MAIN-2023-14 | 5,962 | 12 |
https://www.rerun.io/docs/reference/viewer/overview | code | The following sections give an overview of the basic ui concepts and where to find which functionality.
Generally, the viewer tries to be as self-explaining as possible - most items in the ui show a tooltip upon hovering which should give additional information. If you are missing a piece of information, don't hesitate to file an issue!
The Blueprint view is where you see and edit the Blueprint for the whole viewer, i.e. what is shown in the viewer (and how it is shown).
The Selection view let's you see details and edit configurations of the current selection(s).
The timeline panel gives you controls over what point in time you're looking at on which timeline for the rest of the viewer. Additionally, it gives you an overview of all events on a given timeline.
The viewport is where your visualizations live. It is composed of one or more Space Views that you can arrange freely.
The top bar contains operating system controls and generic information. In the menu you find application wide options and actions. Use the buttons at the top right corner to hide/show parts of the viewer.
The command palette is a powerful tool to reach arbitrary actions from anywhere via a simple text search.
You reach it with
cmd/ctrl + P or via the menu.
Once it's open just start typing to filter and press
Enter to execute the selected action or cancel with
TODO(#1132): The command palette is too limited right now.
Most views have an info icon at the top right corner.
On hover it displays additional information on how to use a view. | s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296818067.32/warc/CC-MAIN-20240421225303-20240422015303-00434.warc.gz | CC-MAIN-2024-18 | 1,531 | 15 |
http://benchmarkestimating.com/request-a-demonstration/ | code | “The integration developed by Benchmark Estimating with On-Screen Takeoff (OST) is excellent! I do my takeoff in OST and Benchmark Estimating Software imports the bill of quantities automatically. This saves me significant amounts of time and ensures that our Quotes are more accurate.”
These 4 handy hints cover some popular questions from users relating to copying and pasting data between projects, duplicating a Project in order to prepare a “budget”, generating marketing graphs and comparing projects side-by-side….
Our software solutions are built on the Microsoft .NET Framework and leverage the power of a Microsoft SQL Server database.
We also partner with the following technology providers | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696382261/warc/CC-MAIN-20130516092622-00021-ip-10-60-113-184.ec2.internal.warc.gz | CC-MAIN-2013-20 | 711 | 4 |
https://chancellorfiles.com/never-got-my-free-domain-from-bluehost/ | code | Never Got My Free Domain From Bluehost
Finding a high-quality low-cost webhosting supplier isn’t easy. Every website will certainly have different needs from a host. And also, you need to contrast all the features of a hosting firm, all while searching for the most effective bargain possible.
This can be a whole lot to type via, particularly if this is your very first time purchasing hosting, or developing a site.
Most hosts will use super inexpensive initial pricing, just to raise those prices 2 or 3 times higher once your initial get in touch with is up. Some hosts will offer totally free incentives when you subscribe, such as a free domain, or a complimentary SSL certificate.
While some hosts will certainly be able to use far better efficiency and also high degrees of protection. Never Got My Free Domain From Bluehost
Listed below we dive deep into the very best low-cost webhosting plan there. You’ll discover what core hosting features are crucial in a host and also how to analyze your very own holding demands so that you can pick from among the best inexpensive holding providers below.
Disclosure: When you buy a host package through links on this web page, we gain some payment. This assists us to keep this site running. There are no additional prices to you in any way by using our web links. The list below is of the most effective affordable host plans that I have actually personally used and also tested.
What We Take into consideration To Be Inexpensive Web Hosting
When we explain a web hosting package as being “Inexpensive” or “Budget plan” what we imply is hosting that comes under the rate bracket between $0.80 to $4 per month. Whilst looking into cheap holding providers for this overview, we considered over 100 various hosts that fell into that price variety. We then examined the quality of their cheapest organizing package, value for money and also customer care.
In this article, I’ll be reviewing this first-rate site hosting firm and stick in as much relevant info as feasible.
I’ll look at the attributes, the rates alternatives, and also anything else I can think of that I believe could be of benefit, if you’re choosing to join to Bluhost and get your internet sites up and running.
So without more ado, allow’s check it out.
Bluehost is among the biggest webhosting firms in the world, getting both large marketing support from the business itself and affiliate marketers who promote it.
It truly is a substantial company, that has actually been around for a very long time, has a big reputation, and also is most definitely among the leading options when it involves webhosting (definitely within the top 3, at the very least in my publication).
However what is it specifically, and also should you obtain its services?
Today, I will certainly respond to all there is you require to understand, given that you are a blog owner or an entrepreneur who is trying to find a host, and also doesn’t recognize where to get going, because it’s a fantastic solution for that target market in general.
Allow’s imagine, you wish to host your websites and also make them visible. Okay?
You currently have your domain name (which is your website location or LINK) now you wish to “turn the lights on”. Never Got My Free Domain From Bluehost
You need some organizing…
To achieve every one of this, and also to make your web site noticeable, you require what is called a “web server”. A server is a black box, or device, that keeps all your web site information (files such as photos, texts, video clips, links, plugins, and also other info).
Now, this web server, has to get on all the time and also it needs to be connected to the internet 100% of the time (I’ll be mentioning something called “downtime” in the future).
On top of that, it also needs (without getting too elegant and right into details) a file transfer protocol commonly called FTP, so it can reveal internet browsers your web site in its designated kind.
All these things are either pricey, or require a high level of technological skill (or both), to create and preserve. And also you can totally head out there as well as discover these points on your own and also set them up … yet what about as opposed to you acquiring as well as preserving one … why not just “renting hosting” rather?
This is where Bluehost can be found in. You rent their web servers (called Shared Hosting) and also you introduce a site making use of those web servers.
Given that Bluehost keeps all your files, the firm also allows you to set up your content administration systems (CMS, for brief) such as WordPress for you. WordPress is a super popular CMS … so it just makes good sense to have that choice readily available (almost every organizing company currently has this choice also).
In short, you no longer need to set-up a web server and after that incorporate a software application where you can build your content, separately. It is already rolled right into one bundle.
Well … picture if your server remains in your home. If anything were to take place to it at all, all your data are gone. If something goes wrong with its interior processes, you require a technician to repair it. If something overheats, or breaks down or gets damaged … that’s no good!
Bluehost takes all these troubles away, as well as deals with every little thing technical: Pay your server “rent”, and they will certainly take care of whatever. And when you acquire the solution, you can after that start concentrating on including material to your web site, or you can put your effort right into your marketing projects.
What Solutions Do You Get From Bluehost?
Bluehost uses a myriad of different services, but the key one is hosting naturally.
The organizing itself, is of different types incidentally. You can lease a common server, have a committed server, or also a virtualexclusive web server.
For the objective of this Bluehost review, we will concentrate on holding services and various other solutions, that a blog owner or an online business owner would certainly need, as opposed to go too deep into the rabbit opening and also discuss the various other solutions, that are targeted at even more skilled people.
- WordPress, WordPress PRO, as well as ecommerce— these organizing services are the bundles that permit you to organize a website making use of WordPress as well as WooCommerce (the latter of which allows you to do shopping). After purchasing any of these packages, you can begin constructing your site with WordPress as your CMS.
- Domain Industry— you can likewise acquire your domain name from Bluehost rather than various other domain name registrars. Doing so will certainly make it easier to direct your domain name to your host’s name web servers, given that you’re utilizing the same marketplace.
- Email— when you have purchased your domain name, it makes sense to also get an e-mail address linked to it. As a blogger or online entrepreneur, you should virtually never ever make use of a free e-mail service, like Yahoo! or Gmail. An email like this makes you look less than professional. Fortunately, Bluehost offers you one free of cost with your domain name.
Bluehost also provides specialized servers.
As well as you may be asking …” What is a devoted server anyway?”.
Well, the thing is, the basic host bundles of Bluehost can only so much website traffic for your internet site, after which you’ll need to update your hosting. The reason being is that the typical web servers, are shared.
What this means is that web server can be servicing two or more web sites, at the same time, among which can be yours.
What does this mean for you?
Never Got My Free Domain From Bluehost
It suggests that the solitary web server’s sources are shared, and it is doing numerous jobs at any type of given time. When your internet site begins to hit 100,000 site visits monthly, you are mosting likely to need a committed web server which you can likewise obtain from Bluehost for a minimum of $79.99 each month.
This is not something yous must stress over when you’re starting out however you should maintain it in mind for certain.
Bluehost Prices: How Much Does It Cost?
In this Bluehost evaluation, I’ll be concentrating my focus generally on the Bluehost WordPress Hosting packages, because it’s the most preferred one, and also highly likely the one that you’re searching for which will certainly match you the most effective (unless you’re a big brand, business or website).
The three readily available strategies, are as follows:
- Basic Strategy– $2.95 each month/ $7.99 normal price
- Plus Strategy– $5.45 per month/ $10.99 normal rate
- Choice And Also Strategy– $5.45 per month/ $14.99 regular cost
The first cost you see is the rate you pay upon join, and the second cost is what the cost is, after the very first year of being with the company.
So primarily, Bluehost is going to charge you on an annual basis. As well as you can additionally pick the quantity of years you want to organize your site on them with. Never Got My Free Domain From Bluehost
If you choose the Fundamental plan, you will certainly pay $2.95 x 12 = $35.40 starting today and also by the time you enter your 13th month, you will currently pay $7.99 each month, which is likewise billed each year. If that makes any type of feeling.
If you are serious about your internet site, you must 100% get the three-year option. This implies that for the fundamental plan, you will certainly pay $2.95 x 36 months = $106.2.
By the time you hit your fourth year, that is the only time you will pay $7.99 monthly. If you think about it, this approach will certainly conserve you $120 throughout 3 years. It’s not much, yet it’s still something.
If you wish to get more than one website (which I highly recommend, as well as if you’re significant, you’ll probably be obtaining more at some point in time) you’ll wish to utilize the selection plus plan. It’ll permit you to host unlimited websites.
What Does Each Plan Offer?
So, in the case of WordPress organizing plans (which are similar to the common hosting plans, but are more tailored towards WordPress, which is what we’ll be concentrating on) the functions are as adheres to:
For the Fundamental strategy, you obtain:
- One internet site only
- Guaranteed web site via SSL certification
- Optimum of 50GB of storage space
- Cost-free domain name for a year
- $ 200 marketing credit rating
Bear in mind that the domains are bought independently from the organizing. You can get a totally free domain name with Bluehost here.
For both the Bluehost Plus hosting and Choice Plus, you obtain the following:
- Unrestricted variety of internet sites
- Free SSL Certification. Never Got My Free Domain From Bluehost
- No storage space or transmission capacity limitation
- Free domain name for one year
- $ 200 marketing credit scores
- 1 Workplace 365 Mail box that is totally free for thirty day
The Choice Plus plan has actually an added benefit of Code Guard Basic Back-up, a back-up system where your file is conserved and also duplicated. If any collision happens and also your web site information disappears, you can restore it to its original type with this attribute.
Notification that despite the fact that both plans cost the exact same, the Choice Plan after that defaults to $14.99 each month, routine rate, after the collection amount of years you have actually selected.
Never Got My Free Domain From Bluehost
What Are The Conveniences Of Using Bluehost
So, why select Bluehost over various other host services? There are thousands of webhosting, most of which are resellers, however Bluehost is one select few that have actually stood the test of time, as well as it’s probably one of the most popular available (and forever reasons).
Here are the three main advantages of choosing Bluehost as your web hosting provider:
- Server uptime— your web site will not be visible if your host is down; Bluehost has more than 99% uptime. This is extremely crucial when it concerns Google SEO and positions. The greater the far better.
- Bluehost speed— just how your web server reaction establishes how fast your website reveals on a browser; Bluehost is lighting quickly, which means you will reduce your bounce rate. Albeit not the most effective when it concerns filling rate it’s still extremely essential to have a fast rate, to make individual experience far better and also much better your ranking.
- Limitless storage space— if you obtain the Plus strategy, you need not bother with the number of files you store such as videos– your storage capability is unrestricted. This is actually essential, because you’ll probably run into some storage space problems later down the tracks, and you do not desire this to be a headache … ever.
Last but not least, customer assistance is 24/7, which implies regardless of where you remain in the world, you can get in touch with the support group to repair your website issues. Pretty common nowadays, however we’re taking this for granted … it’s also extremely important. Never Got My Free Domain From Bluehost
Also, if you’ve gotten a complimentary domain name with them, then there will be a $15.99 charge that will certainly be deducted from the amount you originally acquired (I imagine this is due to the fact that it kind of takes the “domain name out of the marketplace”, not exactly sure concerning this, however there probably is a hard-cost for registering it).
Last but not least, any type of requests after 1 month for a refund … are void (although in all honesty … they need to possibly be rigorous here).
So as you see, this isn’t always a “no questions asked” policy, like with some of the various other hosting alternatives around, so be sure you’re fine with the plans prior to continuing with the organizing. | s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320304287.0/warc/CC-MAIN-20220123141754-20220123171754-00565.warc.gz | CC-MAIN-2022-05 | 13,955 | 84 |
http://www.tomshardware.com/forum/51264-35-need-advice-laptop | code | I got great advice for my personal laptop a couple months ago so I figured I would get everyones input from here again.
1_What is your budget? $600-$700
2_What is the size of the notebook that you are considering? 15.4 inch or larger
3_What screen resolution do you want? 1440x900 or better if possible.
4_Do you need a portable or desktop replacement laptop? Portable
5_How much battery life do you need? 2 hours of web surfing, music or movies.
Gaming battery life is not important as it will be pluged in for this.
6_Do you want to play games with your laptop? If so then please list the games that you want to with the settings that you want for these games. (Low,Medium or High)? High for older games, Low-Medium on newer games is fine.
Older games such as Republic Commando, Knights of the old republic, and some free online games he likes to play (don't know the names.
7_What other tasks do you want to do with your laptop? (Photo / Video editing, surfing the web, playing music, watching movies, Etc.) Web surfing, music, movies, & school work.
8_How much storage (H.D.D Capacity) do you need? 100GB or more
9_If you are considering specific sites to buy from, please post the links to them. None
10_How long do you want to keep your laptop? 3 years
11_If you would like to mention some other things about purchasing your ideal laptop, post them. This will be for my Nephew and will be his only computer. I would to get him the best video card possible in this price range. The installed Ram could be 512 to 1gig, I have 2 gigs of 667 Ram I can put in from my old HP that died to help with the price.
I also have the old 100gb HD I can slap in there.
12_Please tell us about the brands that you prefer to buy from them and the brands that you don't like and explain the reasons. No HP computers due to early life failure of the video card on a previous purchase. | s3://commoncrawl/crawl-data/CC-MAIN-2014-15/segments/1397609539066.13/warc/CC-MAIN-20140416005219-00153-ip-10-147-4-33.ec2.internal.warc.gz | CC-MAIN-2014-15 | 1,871 | 16 |
https://www.lesswrong.com/users/puf_almighty | code | Fucking hell, that completely and instantly worked. I looked at the first object in the room, determined to come up with something interesting about it- the corner of three planes in the wall, over by the foyer, which makes a 3d platform about 7 feet off the ground. Instantly I was thinking about its structure and what it concealed and what was on top of it. I would not have been thusly inspired to think about that wall had I not set out to see it that way. Nice. | s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506559.11/warc/CC-MAIN-20230924023050-20230924053050-00069.warc.gz | CC-MAIN-2023-40 | 467 | 1 |
https://www.uship.com/community/stories/uship/73782/Nice-marketplace--UI-is-really-tough/ | code | You've done a great job with the marketplace notion of this site and I'm excited that you'll be getting some investment soon because the User Experience is in sore need of an upgrade. I was so confused during the bidding process about the messaging that I had with each shipper that was bidding. For example, I couldn't see any of the emails I had sent, only a long list of non-threaded messages received all shippers without a copy of the original message I had sent, so a reply like "Yes" did nothing for me as I had no context what the shipper was answering. I know that there was an option to copy myself, but I didn't see that at first, and it was still confusing. I also got confused and ended up paying more due to the "buy it now" option (I know it's not "buy it now")...even though people had bidded below that price, my shipper was able to pick up the higher price that I had originally set. Likely my fault for not fully understanding it, but usable sites generally don't require a lot of reading.
Again, great job with the site, looking forward to the coming UI refresh!
Keep Austin Weird! | s3://commoncrawl/crawl-data/CC-MAIN-2021-17/segments/1618039603582.93/warc/CC-MAIN-20210422100106-20210422130106-00453.warc.gz | CC-MAIN-2021-17 | 1,101 | 3 |
http://johndrake.info/index.php/2017/05/29/first-year-odyssey-seminar-data-science/ | code | First Year Odyssey Seminar: Data Science
FYOS 1001 – Fall 2016
The contemporary world is flooded by data. The acquisition of data and use of analytics for decision-making are increasingly important in areas of society ranging from science and health care to government policy to business. Data science is the emerging discipline at the nexus of three primary disciplines – computer programming, machine learning, and statistics – that aims to make sense of these data. Students in this seminar engaged data science through the lenses of ecology and epidemiology. Students studied the primary disciplines that constitute data science and learned about applications of data science to research and across a range of careers. Students engaged in critical thinking about evidence, numerical arguments, and the use of data in personal life; considered how the acquisition of data can lead to bias; and used Tufte’s principles to identify intentionally misleading elements in graphical displays of data. | s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224652149.61/warc/CC-MAIN-20230605153700-20230605183700-00540.warc.gz | CC-MAIN-2023-23 | 1,005 | 3 |
https://squarepocketdesign.com/portfolio/canape/ | code | About the Project
Canapé is a Los Angeles based women’s apparel brand founded by California-born model, Brianna Olenslager.
Brianna came to us with her new company, amazing photos, and her first product line to setup and sell online. We built the site on Shopify, tied in her email collection using Mailchimp, and launched within 2 weeks. We also gave her some layout options for her Fall Lookbook. | s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100309.57/warc/CC-MAIN-20231202010506-20231202040506-00215.warc.gz | CC-MAIN-2023-50 | 401 | 3 |
https://www.grammarly.com/answers/questions/9374-go-for-a-swim-and-go-swimming/ | code | 'Go for a swim' and 'go swimming
What is the difference between 'go for a swim' and 'go swimming'? Actually I thought I knew it but because of the definition by some dictionaries, I got confused. Please help me out.
Cf. swim [countable]
a period of time that you spend swimming:
Let's go for a swim.
Why do we have to think about a period of time there? Thank you so much as usual and have a good day.
Hero of the day
Person voted on the most answers. | s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218190134.67/warc/CC-MAIN-20170322212950-00550-ip-10-233-31-227.ec2.internal.warc.gz | CC-MAIN-2017-13 | 451 | 8 |
https://meet.jobs/zh-TW/jobs/30680-%E8%BB%9F%E9%AB%94%E6%B8%AC%E8%A9%A6%E5%B7%A5%E7%A8%8B%E5%B8%AB-quality-assurance-engineer | code | We are looking for Android QA to join us to build a world-class IM / SNS apps.
We are also looking for an open-minded QA engineer who is willing to think outside of box and learn how the products are driven by data.
If you are a strong technologists who is passionate about solving complex and challenging problems. You should be excited about your work and making an impact on millions of users. If you love working on latest technologies, delivering valuable and quality products with the sense of ownership then this is the place for you :)
ChitChat 為成長最快的海外社交應用新創公司,新成立於 2020 年 9 月,其目標是取代 Whatsapp 和 Facebook,成為全球的下一代社交網路。 | s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662527626.15/warc/CC-MAIN-20220519105247-20220519135247-00263.warc.gz | CC-MAIN-2022-21 | 716 | 4 |
https://nanoschool.in/computer/python-programming-language-beginners/ | code | Python is a high-level, interpreted, and dynamically-typed programming language that is designed to be easy to read and write. It is one of the most popular programming languages, with a large community of developers, a vast library of modules, and extensive documentation. This makes Python an excellent choice for beginners looking to learn programming.
In this article, we will explore the basics of Python programming, including its syntax, data types, variables, and control structures. We will also discuss the advantages of using Python and its growing popularity in various fields, such as web development, data analysis, and machine learning.
Why Python is a Good Language for Beginners?
Python is considered a beginner-friendly programming language for several reasons:
- Easy to learn: Python has a simple syntax that is easy to understand, even for those who have never written code before. This makes it a great choice for beginners who want to start learning programming quickly.
- Wide range of applications: Python can be used for a wide range of applications, including web development, data analysis, and machine learning, making it a versatile language to learn.
- Large community: Python has a large and active community of developers, which means that there is plenty of help available when you need it. This can be especially helpful for beginners who may need support and guidance as they learn the language.
- Extensive libraries and modules: Python has a vast library of modules and packages that you can use to add functionality to your programs. This makes it easy to extend the capabilities of Python without having to write code from scratch.
Getting Started with Python
To start programming in Python, you will need to install a Python interpreter, which is available for free from the Python website. Once you have installed the interpreter, you can start writing Python code in a text editor or an integrated development environment (IDE), such as IDLE, PyCharm, or Visual Studio Code.
- Python Syntax
Python syntax is designed to be readable and easy to learn, with a focus on simplicity and clear code. The syntax is based on white space and indentation, which makes it easier to see the structure of the code.
- Data Types in Python
In Python, you can use a variety of data types to store and manipulate data, including numbers, strings, lists, dictionaries, and booleans. The most common data types in Python are integers, floating-point numbers, and strings.
- Control Structures in Python
Control structures are used to control the flow of execution in a program. Python provides a number of control structures, including if-else statements, for loops, and while loops, which can be used to perform different operations based on conditions.
- Functions in Python
Functions are blocks of code that can be reused throughout a program. In Python, you can define functions using the def keyword, and pass arguments to functions to modify their behavior.
- Modules in Python
Modules are collections of functions and variables that can be imported into other programs. In Python, you can import modules using the import keyword, and use the functions and variables defined in the module in your own program. | s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510481.79/warc/CC-MAIN-20230929022639-20230929052639-00842.warc.gz | CC-MAIN-2023-40 | 3,239 | 20 |
https://bigdatatechwarsaw.eu/prelegenci/adrian-bednarz2/ | code | Big Data Engineer, GetInData
Adrian has always been an avid software engineer with special interest in building reliable software. For the past 3 years he has been working on large scale systems in telco and advertising domains. Recently, he has been building cloud based big data systems using both batch and streaming technologies. Apart from being interested in data processing engines he is excited about the AI revolution happening around us. | s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474523.8/warc/CC-MAIN-20240224044749-20240224074749-00414.warc.gz | CC-MAIN-2024-10 | 447 | 2 |
https://hydrogenaud.io/index.php/topic,17267.0.html | code | Doing this I will obtain three signal L (without mono contents), C (The mono content) and R (without mono contents).
Center cut. The classic "vocal cut" filter, except that the output is stereo instead of mono. This is accomplished through FFT phase analysis; the output will have some warbling in it, but stereo separation is preserved.
Left - ("true" Center) = "extreme" Left Right - ("true" Center) = "extreme" Right
Left + (inverted Right) = "zero" CenterFrom this, if you go back to the original Left and Right channels, subtract the "zero" Center from each to create the centered audio channels (which are essentially duplicates of each other):Left - ("zero" Center) = "centered" Left = "true" Center
The best passive system is simplyLn=LRn=RCn=L+R (-3dB)But the stereo sound stage width reduces (move the speakers further apart from compensate).I've read that Michael Gerzon (ambisonics) suggested a better 2>3 conversion, but don't know any more.
"pure" left channel would be the left minus this center channel
Quote"pure" left channel would be the left minus this center channelJAZ if you subctract L+R sum from the left channel, the only thing you'll get will be the Right channel phase invertedIt's simple:L - (L+R) = L - L - R = -RCheers
Yes, but if you do as JAZ suggested you get:L - (L+R)/2 = (L-R)/2
Thanks a lot!!
... sometimes it produce crack/noise in the waveform (I suppose with very high frequency sounds or fast envelope sounds) | s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187825154.68/warc/CC-MAIN-20171022075310-20171022095310-00049.warc.gz | CC-MAIN-2017-43 | 1,451 | 10 |
http://photo.stackexchange.com/users/1096/ideasasylum?tab=badges | code | |visits||member for||2 years, 9 months|
|seen||Feb 7 '12 at 11:40|
I'm an enthusiast photographer and the best of what comes off my cameras can be seen at Hot off the Memory Card. I also run NEXtended, a site for Sony NEX users and I'm building Shutter Scouts into a useful web & mobile app for landscape photographers.
|bio||website||ideasasylum.com||visits||member for||2 years, 9 months|
|location||Cork, Ireland||seen||Feb 7 '12 at 11:40| | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381249/warc/CC-MAIN-20130516092621-00000-ip-10-60-113-184.ec2.internal.warc.gz | CC-MAIN-2013-20 | 442 | 5 |
https://forum.kicad.info/t/work-in-progress-native-cadstar-importer/24665 | code | Some of you might have already noticed this but for those that haven’t, I thought I’d post in the forum to highlight some work I’ve been doing on the KiCad codebase: a native Zuken CADSTAR importer for KiCad.
My motivation for doing so is that in my company we have been looking to change EDA tools (since CADSTAR is really quite dated and clunky to use). The main hurdle with switching design tools is that most of the designs in my company have been done in CADSTAR so the new tool would need to be able to import our existing designs. I spent time looking at Altium, since their literature claims they are able to convert CADSTAR designs, however this proved to not be quite true. To summarise: I spent 18 months back and forth with the Altium representative trying different versions of Altium to find a significant number of import errors that required a lot of manual rework. They fixed some of the errors but left the most time consuming ones with the excuse that the CADSTAR importer is a low priority development for them since not many users request it. The current state of the Altium importer meant we had to spend 2-3 hours of manual effort after the automatic import, which was not acceptable (given we have hundreds of designs).
So that left me in a difficult position: basically I was stuck with using CADSTAR forever (nightmare!). I really like KiCad and used it several times for personal projects with the latest version being in many ways superior to CADSTAR. I came to the conclusion to move away from CADSTAR at work I would have to spend my free time developing an importer for KiCad
I have spent the last two months working on this and have now finalised a CADSTAR PCB Archive importer (see https://gitlab.com/kicad/code/kicad/-/merge_requests/279 ). This is waiting for code review before the code gets merged in to master. In parallel to this am working offline on a schematic importer which I hope to also finish before v6 feature freeze (this will be a stretch but luckily most of the elements in the schematic file format are exact copies of those in the PCB, so half the work is done).
I think the PCB importer works reasonably well but it does need more extensive testing and it is very possible that it will fail with some designs. However I have tried it with several complex designs from my company (with 6 layers and FPGAs) and in all of them the import was excellent.
Unfortunately I can’t share designs boards from my company, but just to give you an idea, I imported below a design from the CADSTAR “self teach” tutorial (Chapter_11_-2019.0-_rev21.cpa|attachment (169.3 KB) ).
I exported this design to a “.cpa” file inside CADSTAR (File -> Export…) and imported into KiCad using the CADSTAR importer in pcbnew (File -> Import -> Non-KiCad Board File -> CADSTAR PCB Archive Files). The result is below:
Yes - just to clarify: this is not yet a feature of KiCad and not available in the nightlies either. If you want to test it, unfortunately, it requires compiling the code in the merge request from source.
@Qbort great work, and soon KiCad has one importer more
To my knowledge, you did not had any prior informations about the file format, and reversing this from scratch is always lots of work. Kudos for not only starting this project, but actually finishing it.
Yes. I am finding this issue already. My colleague has a more advanced license than me and in the office we’d normally be exchanging dongles whenever each needed to do something more advanced. Unfortunately in pandemic times, he has kept the advanced Dongle.
Unfortunately as it stands you still need a CADSTAR license to convert the binary .pcb format into a .cpa format.
In future I hope to also reverse engineer the .pcb format, but that will take a lot longer and the brief time I spent looking at it, I didn’t even know where to start.
UPDATE: The CADSTAR PCB Archive importer has now been merged into the master branch.This should trickle through into the nightly builds within the next few days.
Thanks to all the developers that have helped me along the way with my annoying questions and thanks especially to Seth Hillbrand (@Seth_h) for spending the time to do the final review on the code before merging!
I’ll now crack on with the CADSTAR Schematic Archive importer.
The Windows nightly builds now include the CADSTAR PCB Archive importer (anything after r17389) and can be downloaded here: https://kicad-downloads.s3.cern.ch/index.html?prefix=windows/nightly/ (Remember nightly builds are just for experimentation / testing and should not be used for production environments). To use the importer, you need to open Pcbnew standalone (not via the project manager) and go to File -> Import Non-Kicad Board File… -> Choose “CADSTAR PCB Archive files (*.cpa)”
I am in process of writing the CADSTAR schematic archive importer and should hopefully finish before feature freeze. During feature freeze, I plan on spending all my time fixing any bugs/innacuracies of the importer as I want the importer to be as accurate as possible.
In the meantime, I’d really appreciate it if anyone is able to do some testing of the importer.
It would be great if anyone would be able to open the design files in the Design viewer, import the design into KiCad and do a side-by-side comparison. During feature freeze (i.e. after 30th September) I’ll go through all the reports and fix them as best as possible.
@cedric Yes, I don’t think Zuken are particularly interested in getting Cadstar working in linux…
Just for interest, did you get a chance to try the latest nightly build? I think the error you were seeing about design being too large (when it actually wasn’t) should be fixed with commit 54677296. Please do let me know if there are other issues.
I’m most interested in knowing about conversion inaccuracies such as incorrect size or position of elements compared to the Cadstar design.
Sorry if I gave that impression. It is actually the opposite: I am running everything on Windows (I can’t get my head around Linux). I was just asking for some help in testing the importer as I am only one guy and struggling to do everything on my own.
During feature freeze I plan on doing extensive testing with as many designs as I can, opening in Cadstar and next to it the result from the importer.
That is quite interesting. I didn’t know the history. | s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100705.19/warc/CC-MAIN-20231207221604-20231208011604-00654.warc.gz | CC-MAIN-2023-50 | 6,399 | 26 |
https://forum.gdevelop.io/t/how-can-i-repeat-conditions-and-actions-in-all-the-scenes/14519 | code | Hello. How can i repeat the same conditions and actions in for example… 10 different scenes? should i have to copy and paste everything? or there is a simpler way? Thank you for your time.
Check the “External events” and the “Link” special event, which links to a given external event
(You can link to the same external event from multiple scenes to do what you’re asking).
There’s more info on the wiki: http://wiki.compilgames.net/doku.php/gdevelop5/events/link
Thank you soo much . Have a great day ! | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337906.7/warc/CC-MAIN-20221007014029-20221007044029-00018.warc.gz | CC-MAIN-2022-40 | 517 | 5 |
https://techcommunity.microsoft.com:443/t5/azure/azure-devops-deploy-python-script-into-another-windows-based-vm/td-p/3514806 | code | Jun 16 2022
- last edited on
Mar 05 2024
Hi Team, I need help on Azure DevOps,I am new this technology, I have below requirement,
I have my code into azure repo and want to deploy that in another VM(windows based machine) using CI/CD pile line.
Can some one help me with the steps to follow and tasks to perform in CI/CD pipeline? | s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296815919.75/warc/CC-MAIN-20240412101354-20240412131354-00249.warc.gz | CC-MAIN-2024-18 | 330 | 6 |
http://blogs.msdn.com/b/jennifer/archive/2011/04/20/ie-pinned-sites-part-1-what-are-pinned-sites.aspx | code | I'm a geekette who enjoys playing with new technology for software developers. I work as a Developer Evangelist for Microsoft. My current focus is on machine learning and big data on Azure.
“Pinning” a site is dragging a webpage to your Windows 7 taskbar, desktop, or start menu, which creates a shortcut to that website and can expose additional functionality (like tasks in a jumplist). Let’s focus on pinning to the Taskbar for now. Note that only the end user can choose to pin a website; the website developer can’t force their site to be pinned because there are no public APIs to do this. (We didn’t want websites to install themselves on everyone’s Taskbars.)
There are three different ways for a user to pin a site:
Any website can be pinned, regardless of whether the web developer has coded pinning-specific functionality or not. As an example, let’s consider Google, who has not implemented any pinning-specific code in their website. I can pin Google by dragging the Google tab in Internet Explorer 9 to my Taskbar (which is method #1 above…but either method #1 or method #2 from above would work).
Now, note that the last icon in my Taskbar is a Google icon (which matches Google’s favicon that you can see in the address bar above).
So, what did we get? When the Google site was pinned, its window was actually closed and reopened. Specifically, the vanilla instance of Internet Explorer 9 that Google was running in closed, and a Google-branded version opened. What are the changes in this updated browser UI?
Remember, we got all of this functionality without the web developer having to code anything explicitly for site pinning. But, the web developer can take advantage of pinned site functionality by using the msSiteMode API. With this API, developers can have their websites tap into the Windows 7 taskbar functionality, and add jumplist tasks, overlay icons, thumbnail toolbar buttons, and flashing taskbar buttons. I’ll talk more about how to implement these in upcoming blog posts in this series. For now, let me show you an example of pinning a customized site. Let’s take Bing, which has some custom jumplist tasks.
I’ll pin Bing by dragging its favicon from the address bar in IE to the taskbar (method #2 from above, since we already used method #1 to pin Google).
After you’ve pinned the site, note the updated browser UI:
Bing has all of the same default pinned-site coolness that we saw with Google. In the screenshot above, note the favicon branding, the Bing “Home” button in the upper left-hand corner, and the color-coded back and forward navigation buttons that match the Bing orange perfectly (see how nice it looks when the favicon truly has one dominant color?). In addition, Bing has the same default jumplist as Google, plus the Bing developers have chosen to implement additional items in the Bing jumplist. Right-click the Bing icon in your taskbar to see the jumplist.
The four bottom items in the jumplist are the default items which are available on any pinned site, and have the same functionality that we just discussed in the Google example. In addition, the Bing website developers chose to surface five common tasks that people use Bing for: to search for Weather, Finance, News, Maps, and Travel. If you click on any of these items, it will take you straight to the Bing subsite for that information. For example, if I click on “Weather”, I am taken to a page with detailed weather information for my area.
Imagine the possibilities here! For your company’s website, you could surface items that you want to highlight (how to contact us for an appointment, special sales and deals for an ecommerce site, mortgage calculator, healthcare analysis tools, etc.) in a jumplist. One of the best (and simplest) uses of a jumplist task is “Go to online help/FAQ page”. By making this more visible in a jumplist, you may save a lot of money in support calls!
Finally, you might be wondering what happens under the covers when the end user pins a site. First of all, a pinned site is still surfacing content from the actual online website. So if my internet connection went out, I couldn’t access http://www.bing.com through my Bing pinned site (other than perhaps a cached page). Secondly, there is a file stored locally on the end user’s machine to support each pinned site. When I pin a site, it creates a *.website file in C:\Users\jennmar\AppData\Local\Microsoft\Internet Explorer\Pinned Sites.
In the next blog post, I’ll discuss why pinned sites are valuable, and then in the rest of the series, I’ll jump into the technical details of how web developers can customize their sites to get this functionality.
Other Blog Posts in this Series
IE Pinned Sites Part 1: What Are Pinned Sites?
IE Pinned Sites Part 2: Why Implement Pinned Sites?
IE Pinned Sites Part 3: How to implement basic site properties
IE Pinned Sites Part 4: How to implement Jump List Tasks
IE Pinned Sites Part 5: How to implement dynamic Jump List Categories
IE Pinned Sites Part 6: How to implement Overlay Icons
IE Pinned Sites Part 7: How to implement Thumbnail Toolbar Buttons
IE Pinned Sites Part 8: How to implement a Flashing Taskbar Button
IE Pinned Sites Part 9: Patterns to make your pinned site code play nice in all browsers
IE Pinned Sites Part 10: Pinned Site Resources | s3://commoncrawl/crawl-data/CC-MAIN-2016-07/segments/1454701166570.91/warc/CC-MAIN-20160205193926-00342-ip-10-236-182-209.ec2.internal.warc.gz | CC-MAIN-2016-07 | 5,352 | 25 |
https://rderik.com/newsletter/newsletter-33-set-up-a-macos-parallels-virtual-machine-for-security-research/ | code | Newsletter # 33 - Set up a macOS Parallels Virtual Machine for security research Nov 18 2020
Hello, and welcome to issue #33!
It has been some time since the last issue of the newsletter, but here we are again. A lot of new and exciting things have been going on around the Tech world. For example, the release of Apple's M1 Chip, and all the positive reviews. It's a shame that I won't be buying one just now. I had an emergency and had to get a new computer a couple of months back, so I'll have to wait a little bit longer.
Technology seems always to be moving so fast. It is hard to keep up with everything. This week also was the first fully-operational flight of SpaceX for NASA. You can view the video at space.com. I hope I can live long enough to see the human race transformed into something out of a science fiction story (utopian not dystopian :D).
In more mundane news, I was part of the Back to the Mac Conference you can see my talk here:
Understanding macOS application bundles by building an agent-based app
It is based on my article Understanding a few concepts of macOS applications by building an agent-based (menu bar) app. I hope you like it.
Also, this week I posted a new article on the website:
Set up a macOS Parallels Virtual Machine for security research
It is not only for security research, but you might also want to have this setup to develop macOS System Extensions, e.g. using the Security Endpoint Framework. It is also useful when debugging applications where you'll like to use
Dtrace to get information on what is going on. Have a look and let me know if it was helpful.
Because of COVID, it has been challenging to get to talk to other people. So I decided to embark in an experiment. I created a Discord server for the site. For me, social media is complicated, I don't feel entirely comfortable using Twitter or any other social media, but I do crave for a community. It would be fun to have a community of people to talk to and discuss books, ideas, games, or simply talk about shared interests. I was going to create an IRC channel, but many people don't like IRC and find it "confusing" so I thought I might give Discord a chance. The server is new, so don't be alarmed if it is only you and me in the Discord server at the moment. Hopefully, it'll grow. Anyhow, if you want to say hi, I'll be there.
Fun fact: a group of otters is called a Raft. And otters are smart, tool-using animals so why not.
Recommendations and interesting topics
I've recommended The history of computing podcast, this time I would like to recommend the latest episode:
From Antiquity to Bitcoin: A Brief History of Currency, Banking, and Finance
Charles gives a fun and easy to comprehend summary about the history of finance. I think you'll enjoy it.
Another recommendation this week is this post on deprecating
scp. I've used
scp for decades, so it is an interesting read that shows some of the flaws of the initial design. I hope we see a worthy replacement in the future.
And finally, the last recommendation of this issue is the following post by Ivan Rodriguez:
Why embedding secrets in mobile apps is not a good idea
Have a look. There are some interesting insights and some alternatives on how to handle the requirement of secrets.
Ok, that's it for this week. Until next time,
Tip of the week
Have you ever wondered when was it that you installed an update on your computer running macOS? Or when was it that you installed an Application? Well, let me tell you how to do it:
- Click the apple icon in your menu bar (or open System Information using Spotlight and jump to step 3)
- Select "About This Mac"
- Click on "System Report"
- Scroll down to "Software"
- Select "Installations"
And you'll be able to see a history of the installations that had happened on your system. | s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100762.64/warc/CC-MAIN-20231208144732-20231208174732-00013.warc.gz | CC-MAIN-2023-50 | 3,805 | 32 |
https://www.ettus.com/author/karam/ | code | Showing all posts by Karamvir Rathi
Ettus Research, a National Instruments brand, is proud to announce the USRP E320 software defined radio (SDR), which brings performance to embedded SDR by offering four times more FPGA resources compared to its predecessor USRP E31x devices.
Martin Braun's presentation slides from "You have turned on the Future" Updates from Ettus Research R&D talk at the GNU Radio Conference 2017
Manuel Uhm presentation slides from Ettus research: Future Directions talk at GRCon 2017.
It was a busy week for the USRP at NIWeek. Check out the keynote and demo videos from the event.
"An NI Engineer's Perspective on the DARPA Spectrum Collaboration Challenge" blog from National Instruments
The accepted teams for the RFNoC & Vivado HLS Challenge
"Practical Software Radio: Why Things Don't Always Match the Textbooks" Presentation by Matt Ettus. | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337287.87/warc/CC-MAIN-20221002052710-20221002082710-00139.warc.gz | CC-MAIN-2022-40 | 870 | 8 |
https://essaysforpay.com/solving-one-question-of-probability-using-r-studio/ | code | I want to see your code and you output from R. You can choose to make this an
Rmarkdown file or Jupiter notebook or… It should be a similar file format to what you
turned in for Lab 1 and 2
In the casino game of Egyptian Battle, every player is dealt a card from an ordinary deck, including the
dealer, and the player with the highest card value wins. In the case of a tie, the dealer wins
automatically. The cards are replaced and reshuffled each round. (Ace is the highest.)
a. Simulate 15 games of one player against the dealer and determine the number of times the player
wins. Repeat this process 50 more times and plot your findings on a histogram with a density
b. Simulate 150 games and graphically display the cumulative proportion of winning.
c. Simulate 15, 150, 1500, 15000 games of you against the dealer. Create a table for the number of
wins for each, the probability of winning a given game, etc.
d. What does part (b) show about the law of large numbers?
e. Find the theoretical probability of winning a single hand of the game
The last pages include an explanation for R studio
I send you lab 1 and lab 2 which they were solved to take idea | s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323583408.93/warc/CC-MAIN-20211016013436-20211016043436-00095.warc.gz | CC-MAIN-2021-43 | 1,160 | 15 |
https://wakkinews.com/2021/06/04/woman-stuns-internet-as-she-catches-huge-snake-with-bare-hands-video/ | code | The faint-hearted cannot watch this video to the end.
This woman appeared unfazed as she captured a huge snake with her bare hands.
Footage that has surfaced online shows the woman successfully catching the snake and walking away with it coiled around her waist – a sight that’s enough to give goosebumps to anyone scared of serpents. The footage was filmed by onlookers in Vietnam who came across the woman and decided to record her in action.
“We were on the street when we saw this woman trying to catch a big snake. We decided to stop to record this moment. It looks dangerous,” the onlookers were quoted as saying by video licensor ViralHog.
In the 48-second clip, the woman is seen wearing a mask on her face and a helmet on her head. Her hands, however, were bare as she handled the squirming snake. After a struggle of a few seconds, the woman managed to subdue the reptile. She was then filmed walking away with the snake coiling itself around her waist and shoulders.
In the comments section on YouTube, many agreed that the woman was far braver than them. “I could never,” declared one viewer. “See, I love snakes and I want to do this. I just kinda don’t have enough courage to do it yet,” another said. | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571190.0/warc/CC-MAIN-20220810131127-20220810161127-00727.warc.gz | CC-MAIN-2022-33 | 1,233 | 6 |
https://ices.gmu.edu/events/14997 | code | Friday, September 8, 2023 12:00 PM to 1:00 PM EDT
Vernon Smith Hall (formerly Metropolitan Building), 5183
The ICES Seminar in Experimental Economics and Game Theory of the Fall 2023 semester will feature:
Institute for International Economic Studies at Stockholm University, Norwegian School of Economics (NHH)
Fairness Across the World
The paper reports from a large-scale study of people’s fairness preferences and beliefs, where 65 000 individuals from 60 countries make real distributive choices. We establish causal evidence on the role of the source of inequality and efficiency considerations for inequality acceptance, and we provide a rich description of people’s beliefs about the main sources of inequality and the cost of redistribution. We find large heterogeneities in both preferences and beliefs and show that they are strongly associated with people’s policy views on redistribution. The paper also studies how people’s fairness views relate to various country characteristics. In particular, we show that there are striking differences between the developed and developing countries in both fairness preferences and beliefs.
For more information about the Seminar Series, please visit the Seminar Schedule homepage. | s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510368.33/warc/CC-MAIN-20230928063033-20230928093033-00084.warc.gz | CC-MAIN-2023-40 | 1,242 | 7 |
https://builtin.com/job/engineer/senior-software-engineer-vdb/294952 | code | About our team:
Invitae needs engineers with diverse backgrounds to help us achieve our mission. We are a cross-functional team of scientific domain experts and dedicated, curious engineers. We build systems that take massive amounts of genomic data, combine it with the world's scientific literature, add to it years of rigorously curated results, and package it all neatly for our scientists to consume. It's a lot of information. As the data gets bigger, our systems need to get better and faster. That's where you come in.
What you will do:
- Help define and build new features or applications based on technology and business needs
- Write structured, tested, readable and maintainable code
- Participate in code reviews to ensure code quality and distribute knowledge
- Lead technical efforts for internal or external customer needs
- Support your teammates by continuing to learn and grow
What you bring:
- Industry experience with full stack architecture
- Deep experience with backend frameworks (ex., Python and Django)
- Hands on experience with databases (Postgres, MySQL, etc.)
- Experience working with large scale datasets and systems
- Excellent communication skills
- Preferred: Experience with distributed teams
- Preferred: Interest in working with genetic/biological related content (ex., sequencing data)
- Preferred: Experience working with biological data sources - NCBI, Ensembl, HGMD, etc.
At Invitae, you’ll work alongside some of the world’s experts in genetics and healthcare at the forefront of genetic medicine. Our teams thrive in our dynamic organization, which has been designed to empower them to make the biggest impact they can for our patients. We give our employees the ability to explore interests and capabilities broadly within the organization. We prize freedom with accountability and offer significant flexibility. We also provide excellent benefits and competitive compensation in a fast-growing organization.
At Invitae, we’re changing healthcare to change lives. Join us.
At Invitae, we value diversity and provide equal employment opportunities (EEO) to all employees and applicants without regard to race, color, religion, national origin, gender, sexual orientation, age, marital status, veteran status, or disability status. We will consider for employment qualified applicants with criminal histories in a manner consistent with the requirements of the San Francisco Fair Chance Ordinance. | s3://commoncrawl/crawl-data/CC-MAIN-2021-49/segments/1637964363689.56/warc/CC-MAIN-20211209061259-20211209091259-00404.warc.gz | CC-MAIN-2021-49 | 2,447 | 20 |
http://forum.bytesforall.com/showthread.php?p=36569&mode=threaded | code | Is there a fundamental incompatibility between Atahualpa and Internet Explorer?
For example - http://forum.bytesforall.com/showthread.php?t=8039 shows that Atahualpa blocks IE from displaying the horizontal scroll bar. We know that IE isn't all that great. Should we tell all our users that they should stop using IE now? Or, is there something that could be done so that Atahualpa can work with IE?
Could it be that back level versions of Atahualpa don't work with IE, and that, if the theme were updated to the recent version, it would work fine? | s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917118713.1/warc/CC-MAIN-20170423031158-00443-ip-10-145-167-34.ec2.internal.warc.gz | CC-MAIN-2017-17 | 548 | 3 |
https://www.informit.com/authors/bio/E5BE59E3-BA2B-41CE-893A-03978F08C4D8 | code | PRODUCT SUPPORT ANNOUNCEMENT
See the latest about COVID-19 shipping availability and video/Web Edition load errors. Learn more.
Monica Beckwith is an independent performance consultant optimizing customer applications for server class systems running the Java Virtual Machine. She has worked with Java HotSpot VM optimizing the JIT Compiler, the generated code, the JVM heuristics and garbage collection and collectors. Monica led Oracle’s Garbage First Garbage Collector performance team and was named a JavaOne Rock Star. | s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370493120.15/warc/CC-MAIN-20200328194743-20200328224743-00145.warc.gz | CC-MAIN-2020-16 | 525 | 3 |
https://success.planview.com/Training_Academy/Planview_Enterprise/Administration/Scripted_Dialog_Administration | code | - Scripted Dialog Management
- Create a dynamically branching process by which information is gathered and actions are taken.
- Pages: 26
Scripted dialogs provide the Process Architect with the ability to create dynamic processes based on gathered information, and automate steps that do not require direct user input. Scripted dialogs can be created for selecting or generating Work Breakdown template, setting attributes, selecting lifecycles, and controlling conditional lifecycle steps or sequences. | s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370497309.31/warc/CC-MAIN-20200330212722-20200331002722-00431.warc.gz | CC-MAIN-2020-16 | 503 | 4 |
https://forum.beagleboard.org/t/request-help-install-ti-android-jb-4-2-2-devkit-4-1-1/22561 | code | I can not install this version of Android Beagle bone black version C, with LCD 4d cape 43T.
I read on many sites that many people have this problem, the script fails mkmmc-android.sh installation, so I will not create any partition.
I use ubuntu and an external SD card reader.
I also tried to make the partitions with Gparted and manually copy the files, LCD but no signs of life.
At the moment I have not found answers on the forum.
someone can help me I read that many have this problem.
<<<I’m trying with 3 sd card (micro sd 8GB SanDisk Ultra, Transcend 8GB / 4GB)
I have Ubuntu on a virtual machine installed on windows 8
in order I executed the following commands: >>> | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337668.62/warc/CC-MAIN-20221005203530-20221005233530-00466.warc.gz | CC-MAIN-2022-40 | 678 | 9 |
http://www.dotnetfunda.com/interviews/cat/6/csharp | code | What is static constructor?
Static constructor is used to initialize static data members as soon as the class is referenced first time, whereas an instance constructor is used to create an instance of that class with keyword. A static constructor does not take access modifiers or have parameters and can't access any non-static data member of a class.
What is the use of Monitor in C#?
It provides a mechanism that synchronizes access to objects.
The Monitor class controls access to objects by granting a lock for an object to a single thread. Object locks provide the ability to restrict access to a block of code, commonly called a critical section. While a thread owns the lock for an object, no other thread can acquire that lock. You can also use Monitor to ensure that no other thread is allowed to access a section of application code being executed by the lock owner, unless the other thread is executing the code using a different locked object.
For more visit http://msdn2.microsoft.com/en-us/library/system.threading.monitor.aspx
What is lock statement in C#?
Lock ensures that one thread does not enter a critical section of code while another thread is in the critical section. If another thread attempts to enter a locked code, it will wait, block, until the object is released.
How to loop through all rows of the DataTable?
You can do this in more than one way but ForEach loop is much better than any other way in terms of cleanliness of the code or performance.
foreach (DataRow row in dTable.Rows)
yourvariable = row["ColumnName"].ToString();
for (int j = 0; j< dTable.Rows.Count; j++)
yourvariable = dTable.Rows[j]["ColumnName"].ToString()l
What is an Array?
An array is a collection of related instance either value or reference types. Array posses an immutable structure in which the number of dimensions and size of the array are fixed at instantiation.
C# Supports Single, Mult dimensional and Jagged Array.
Single Dimensional Array: it is sometimes called vector array consists of single row.
Multi-Dimensional Array: are rectangular & consists of rows and columns.
Jagged Array: also consists of rows & columns but in irregular shaped (like row 1 has 3 column and row 2 has 5 column)
What is an ArrayList?
ArrayList is a dynamic array. Elements can be added & removed from an arraylist at the runtime. In this elements are not automatically sorted.
What is BitArray?
The BitArray collection is a composite of bit values. It stores 1 or 0 where 1 is true and 0 is false. This collection provides an efficient means of storing and retrieving bit values.
What is HashTable?
A Hashtable is a collection of key-value pairs. Entries in this are instance of DictionaryEntry type. It implements IDictionary, ISerilizable, IDeserializable collback interface.
What is Queue?
This is a collection that abstracts FIFO (First In First Out) data structure. The initial capacity is 32 elements. It is ideal for messaging components.
What is Stack?
This is a collection that abstracts LIFO (Last In First Out) data structure in which initial capacity is 32.
What is SortedList?
This is a collection and it is a combination of key/value entries and an ArrayList collection. Where the collection is sorted by key.
What is Delegates?
A delegate in C# allows you to pass method of one class to objects of other class that can call these methods.
A delegate is an object that holds the reference to a method.
In C++ it is called function pointer.
What is a collection?
A collection serves as a container for instances of other classes. All classes implement ICollection interface which intern implement IEnumerable interface.
What is reflection?
Reflection is the ability to find the information about types contained in an assembly at runtime.
Reflection is the ability to find out information about objects, the application details (assemblies), its metadata at run-time.
See the example: http://www.dotnetfunda.com/articles/article132.aspx
What’s the difference between the System.Array.CopyTo() and System.Array.Clone()?
The Clone() method returns a new array (a shallow copy) object containing all the elements in the original array. The CopyTo() method copies the elements into another existing array. Both perform a shallow copy. A shallow copy means the contents (each array element) contains references to the same object as the elements in the original array. A deep copy (which neither of these methods performs) would create a new instance of each element's object, resulting in a different, yet identacle object.
Navigate to page: 1 2 3 4 5 6 7 8 ... 44
More C# Exclusive Interview Questions & Answers here
Found this useful, bookmark this page to the blog or social networking websites. | s3://commoncrawl/crawl-data/CC-MAIN-2015-18/segments/1429246641054.14/warc/CC-MAIN-20150417045721-00188-ip-10-235-10-82.ec2.internal.warc.gz | CC-MAIN-2015-18 | 4,709 | 47 |
https://ymlp211.net/why-you-ought-to-use-fluctuate-bound-strategies.html | code | Look proper proper here for concepts for starting a enterprise and for including new providers to an current enterprise. Selling Professional is a digital market and on-line selling most fascinating multi vendor wordpress theme 2016 3a WordPress theme with 7 demos.Posted on Could 19 2016 by Marisa Tracie in Weblog Enterprise Enchancment WordPress Acceptable now we reside social media selling and selling in social media market we now have gone from paper flyers to on-line commercials and contained within the remaining yr on-line product sales have skyrocketed because of the social media selling obtainable to.
Promoting Educated is a digital market and on-line promoting greatest multi vendor wordpress theme 2016 3a WordPress theme with 7 demos.Posted on May 19 2016 by Marisa Tracie in Weblog Enterprise Enchancment WordPress In the mean time we keep social media selling in social media market we now have gone from paper flyers to on-line commercials and all by the closing yr on-line product product sales have skyrocketed on account of social media selling available on the market available available on the market accessible obtainable in the marketplace to. Along with the migration to Google servers , an excessive amount of recent selections have been launched, together with label group, a drag-and-drop template modifying interface, learning permissions (to create non-public blogs) and new Net feed selections.
Though the pace of development has been on a slow decline, revenue development of house furnishings websites continues into the double digits at 11.three%. By 2021, it is projected that 27% of whole income will come from on-line gross sales. It’s a web-based neighborhood of folks that provide to do stuff for $5. I see people on a regular basis doing advertising and marketing and promoting once they know their services or products is just not working effectively.
To market with Millennials, small businesses need to explore ways, to be transparent and honest. Self-employed consultants often work out of dwelling workplaces and set their own work schedules, although the success of their business depends upon their capacity to satisfy their shoppers’ calls for. In 2010, 28 % of management analysts had a master’s diploma.
Postsecondary certificate and associate’s diploma applications in well being information technology typically embody programs in medical terminology, anatomy and physiology, health data requirements and requirements, classification and coding systems, healthcare reimbursement strategies, healthcare statistics, and laptop systems. Judging the Qualities of Issues, Companies, or People — Assessing the value, significance, or high quality of issues or folks. | s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446710534.53/warc/CC-MAIN-20221128171516-20221128201516-00410.warc.gz | CC-MAIN-2022-49 | 2,731 | 5 |
https://catalog.crl.edu/Record/468a31b4-d02b-567b-b1d7-e9565f3bf13b | code | The Seattle General Strike : an account of what happened in Seattle, and especially in the Seattle labor movement during the General Strike, February 6 to 11, 1919
Seattle, Wash. :
Seattle Union Record Pub. Co.,
Note that CRL will digitize material from the collection when copyright allows. | s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764499697.75/warc/CC-MAIN-20230129012420-20230129042420-00199.warc.gz | CC-MAIN-2023-06 | 291 | 4 |
https://snakerootbotanicals.com/products/kalanchoe-tubiflora-octopus | code | Kalanchoe tubiflora plants, also called Bryophyllum tubiflora, are tall, slim, attractive succulents that are easy to grow. Kalanchoe plants are also easily propagated from the tiny plantlets that grow along their leaves.
- Light: Bright light to Full sun
- Water: Water only when the soil has dried out. Drought tolerant.
- Additionally: Mother plant dies after blooming. | s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296943555.25/warc/CC-MAIN-20230320175948-20230320205948-00792.warc.gz | CC-MAIN-2023-14 | 372 | 4 |
https://www.mql5.com/en/code/mt5/page160 | code | Moving average with the linear regression algorithm.
More informative Average Directional Index (ADX) indicator with the possibility to select the smoothing algorithm out of ten possible variants.
The indicator is based on comparing the signals of JJRSX oscillator and XMA moving average working on different timeframes - the current (chart timeframe) and the higher ones.
This indicator shows the direction of the acceleration of JFatlAcceleration price from a larger timeframe at a smaller one.
Two-pole super smoother filter from John Ehlers' book "Cybernetic Analysis for Stocks and Futures: Cutting-Edge DSP Technology to Improve Your Trading" is used in this indicator for moving average calculation.
ZigZag indicator built using the values of the Parabolic SAR technical indicator with the added possibility to build Fibo levels on the last two indicator peaks and the channel generated with the use of three successive zigzag peaks with selection of these peaks.
This indicator shows the direction of the acceleration of JFatlSpeed price from a larger timeframe at a smaller one.
Three-pole super smoother filter from John Ehlers' book "Cybernetic Analysis for Stocks and Futures: Cutting-Edge DSP Technology to Improve Your Trading" is used in this indicator for moving average calculation.
A library for parsing of XML documents. Pure MQL5, it doesn't uses any external libraries.
The indicator that displays "averaged" candlesticks of a larger timeframe at a smaller one.
The indicator shows the current price in one of the chart corners.
Three pole Butterworth filter is used for smoothing in this moving average calculation algorithm.
The indicator acts in a fully opposite way comparing to the adaptive moving averages during a trend market: in case of a definite trend, both indicator lines (Lead Sine and Sine Wave) move parallel to each other and show the trend direction by their location relative to each other; in case of a flat, the Sine Wave indicator quickly reacts on the market swing movements.
Two pole Butterworth filter is used for smoothing in this moving average calculation algorithm.
The indicator draws the channel using ZigZag extreme points.
Stochastic RSI is a standard Stochastic oscillator, the values of which are calculated not from a price series but from RSI technical indicator values.
Adaptive Momentum from John Ehlers' book "Cybernetic Analysis for Stocks and Futures: Cutting-Edge DSP Technology to Improve Your Trading".
Multi-currency Expert Advisor that analyze resonance events at related financial assets.
Stochastic CG Oscillator is a stochastic oscillator, the values of which are calculated based not on a price series, but on CG Oscillator indicator values.
The indicator of covariation, correlation and Beta ratio of two symbols.
The hybrid of the universal moving average and NRTR indicator. In this indicator the values of the moving average are corrected with the help of NRTR algorithm (Nick Rypock Trailing Reverse).
Adaptive CG Oscillator is a CG Oscillator that can adapt to constantly changing market cycles of a real financial asset.
Detrended Price Oscillator (DPO) shows the market overbought/oversold states and also can be used for getting buy/sell signals.
This indicator is designed for measurement of a financial asset price change periodicity. Cycle Period allows to create adaptive versions of oscillators.
Adaptive Stochastic oscillator.
Forecasting the next day candlestick changing range for all bars of the current chart.
This indicator allows to display the chart of another currency pair in the additional window.
Adaptive Cyber Cycle that can adapt to constantly changing market cycles of a real financial asset.
Forecasting the next candlestick changing range on a day chart.
BrainTrend1 and BrainTrend2 are placed in one minimized window to remove excessive elements from a chart workspace. BrainTrend1 (upper square dots) is a basic trend indicator, while BrainTrend2 (lower round dots) is a confirming indicator.
LeManTrend determines a trend position based on the current price and high and low prices for three periods.
Smoothed Larry Williams' Percent Range using Inverse Fisher Transform.
Fisher indicator calculates minimum and maximum price levels in previous history, determines direction of a trend and forecasts its reversal.
The indicator shows the moments of the market acceleration. Besides, it indicates appropriate time for buying, selling and market exit.
StepMA is executed as a moving average.
There are a lot of smoothing algorithms. This indicator is a smoothing of standard ADX.
Simplified Ichimoku indicator (Ichimoku Kinko Hyo) containing only the cloud.
Market Profile is a tool used by many futures traders for the analysis of the statistical time distribution of the price, finding a price area and control values for the day trading session. The indicator is based on the simple price movement and does not use standard MetaTrader 5 platform indicators.
Fisher RVI is an oscillator that modifies RVI (Relative Vigor Index) custom indicator values using Inverse Fisher Transform.
Four-colored histogram of OsMA (Moving Average of Oscillator) allowing to implement different smoothing algorithms. | s3://commoncrawl/crawl-data/CC-MAIN-2021-21/segments/1620243991207.44/warc/CC-MAIN-20210514183414-20210514213414-00343.warc.gz | CC-MAIN-2021-21 | 5,206 | 40 |
https://bcntrailraces.com/2018-btr-tve-teledeporte/?lang=en | code | The 2018 Barcelona Trail Races 2018 at TVE Teledeporte (Evasión)
The Teledeporte Evasion program will broadcast a summary of the 2018 Barcelona Trail Races.
The expected hours of program broadcast are:
- Friday Dec. 7th 2018 at 12:30 (noon)
- Saturday Dec. 8th 2018 at 05:00 (dawn)
- Saturday Dec. 8th 2018 at 11:10 (noon)
- Sunday Dec. 9th 2018 at 05:00 (dawn)
- Monday Dec. 10th 2018 at 5:30 PM (afternoon)
Source: TVE Teledeporte programming http://www.rtve.es/tve/b/teledeporte/?dia=viernes
See below a teaser of the video. | s3://commoncrawl/crawl-data/CC-MAIN-2021-31/segments/1627046152144.81/warc/CC-MAIN-20210726152107-20210726182107-00091.warc.gz | CC-MAIN-2021-31 | 528 | 10 |
https://www.k-state.edu/philos/news_events/abstracts_announcements/brunero.html | code | "Intentions and the Bootstrapping Objection" John Brunero
Abstract: Some philosophers (Schroeder, Korsgaard) think that intending an end provides one with a reason to intend or take means to that end. Others (Scanlon, Chang) think that our intentions can make such a normative difference only in “tie-breaker” situations -- that is, situations in which there’s more than one option, each of which one has sufficient, but not conclusive, reason to pursue. Others (Bratman, Boome) reject these views since they allow for the implausible “bootstrapping” of a reason into existence. However, doubts have been raised both about what the “bootstrapping” objection is, and about whether it’s a good objection to these views. In this paper, I present a novel version of the bootstrapping objection – one that targets both the intention-provide-reasons view and the “tie-breaker” view. I also try to deflect various arguments concerning rational deliberation that have been advanced in favor of the “tie-breaker” view. | s3://commoncrawl/crawl-data/CC-MAIN-2021-39/segments/1631780057973.90/warc/CC-MAIN-20210926205414-20210926235414-00636.warc.gz | CC-MAIN-2021-39 | 1,035 | 2 |
http://serverfault.com/questions/tagged/mtu+dsl | code | A simple question (hopefully) but with no clear answers when doing a Google Search. What is the MTU of VDSL (not VDSL2)? With ADSL it was 1492, but most ISPs added PPPoE/PPPoA headers reducing it to ...
Do any of the ITU DSL standards limit the maximum MTU that can be supported? I know that RFC2516 (PPPoE) limits the MTU to 1492 bytes; however when PPPoE is not used this limit should not exist. The ... | s3://commoncrawl/crawl-data/CC-MAIN-2014-15/segments/1398223203235.2/warc/CC-MAIN-20140423032003-00605-ip-10-147-4-33.ec2.internal.warc.gz | CC-MAIN-2014-15 | 405 | 2 |
https://twolinequotes.com/variables-and-types/ | code | C has several types of variables, but there are a few basic types:
- Integers – whole numbers which can be either positive or negative. Defined using
char, int, short, long or long long.
- Unsigned integers – whole numbers which can only be positive. Defined using
unsigned char, unsigned int, unsigned short, unsigned long or unsigned long long.
- Floating point numbers – real numbers (numbers with fractions). Defined using
- Structures – will be explained later, in the Structures section.
The different types of variables define their bounds. A
char can range only from -128 to 127, whereas a
long can range from -2,147,483,648 to 2,147,483,647 (
long and other numeric data types may have another range on different computers, for example – from –9,223,372,036,854,775,808 to 9,223,372,036,854,775,807 on 64-bit computer).
Note that C does not have a boolean type. Usually, it is defined using the following notation:
#define BOOL char #define FALSE 0 #define TRUE 1
C uses arrays of characters to define strings, and will be explained in the Strings section.
For numbers, we will usually use the type
int, which an integer in the size of a “word” the default number size of the machine which your program is compiled on. On most computers today, it is a 32-bit number, which means the number can range from -2,147,483,648 to 2,147,483,647.
To define the variables
bar, we need to use the following syntax:
int foo; int bar = 1;
foo can be used, but since we did not initialize it, we don’t know what’s in it. The variable
bar contains the number 1.
Now, we can do some math. Assuming
e are variables, we can simply use plus, minus and multiplication operators in the following notation, and assign a new value to
int a = 0, b = 1, c = 2, d = 3, e = 4; a = b - c + d * e; printf("%d", a); /* will print 1-2+3*4 = 11 */
In the next tutorial, you will need to create a program which prints out the sum of the numbers x,
z. Start Exercise | s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510942.97/warc/CC-MAIN-20231002001302-20231002031302-00371.warc.gz | CC-MAIN-2023-40 | 1,961 | 26 |
http://wireless.sys-con.com/node/3079044 | code | |By Marketwired .||
|May 2, 2014 10:43 AM EDT||
LOS ANGELES, CA and TORONTO, ON -- (Marketwired) -- 05/02/14 -- Verifi Inc., a leading provider of global electronic payment and risk management solutions for card-not-present merchants, and Lean Industries, provider of the AdjustmentHub dispute management system, today announced the formation of a partnership that expands the opportunities for card issuers to improve the automation and resolution success rates of cardholder disputes.
As part of this partnership, Lean Industries will develop an automated interface that will access the Verifi Cardholder Dispute Resolution Network® (CDRN®) for card issuers from within their AdjustmentHub application. To increase the level of automation and speed of resolution for disputed payments, AdjustmentHub will obtain qualifying merchant information from Verifi and automatically submit disputed payment records to the CDRN service from issuers using both solutions. Merchant responses to these resolution requests submitted through CDRN back to the issuer will automatically update dispute case information in AdjustmentHub and prompt users to proceed with each case accordingly.
Combined, the two companies currently serve many large card issuers. AdjustmentHub from Lean Industries is used to manage tens of thousands of disputes each month across its issuing customer base. Verifi enables thousands of CNP merchants to successfully resolve disputed transactions before they are processed as chargebacks by card issuers. These merchants include most of the Internet Retail 500 as well as hundreds of specialty CNP merchants in telecom, cable, SaaS, DRTV and other markets.
"This partnership represents a movement for cross-industry collaboration to minimize the costs of handling disputed payments," said Matthew Katz, Chief Executive Officer and founder of Verifi. "The alliance expands the access of our CDRN service and, together, we're better positioned to facilitate interactions between card issuers and merchants."
"This is an innovative initiative for both companies as we seek to provide faster, low-cost dispute resolution services for the card issuing community," said Lean Industries Chief Executive Officer, Bjorn Larsen. "Together, Lean Industries and Verifi will increase the level of interaction between card issuers and merchants, empowering both merchants and issuers to reduce the impact of costly and lengthy dispute handling processes."
ABOUT LEAN INDUSTRIES
Lean Industries develops and delivers software solutions designed to lower the costs and improve the quality of managing disputes, exceptions and adjustments for electronic payment transactions.
Our solutions enable organizations of all types and sizes to become highly efficient and productive through extensive process automation, elimination of paper-based practices, and integration with critical enterprise payment applications. Our people are experts in this field and provide implementation, training and customization services to match your company's needs.
Founded in 2005, Verifi is a full-service provider of global electronic payment and risk management solutions for card-not-present (CNP) merchants. Based on a multi-layered approach, Verifi's risk management solutions empower Merchants to gain control and transparency into the entire payment process -- from global payment acceptance and processing, order screening, and recovery/maximization to fraud/risk management and payment security.
Containers and microservices have become topics of intense interest throughout the cloud developer and enterprise IT communities. Accordingly, attendees at the upcoming 16th Cloud Expo at the Javits Center in New York June 9-11 will find fresh new content in a new track called PaaS | Containers & Microservices Containers are not being considered for the first time by the cloud community, but a current era of re-consideration has pushed them to the top of the cloud agenda. With the launch of Docker's initial release in March of 2013, interest was revved up several notches. Then late last...
Mar. 2, 2015 07:15 PM EST Reads: 687
The Workspace-as-a-Service (WaaS) market will grow to $6.4B by 2018. In his session at 16th Cloud Expo, Seth Bostock, CEO of IndependenceIT, will begin by walking the audience through the evolution of Workspace as-a-Service, where it is now vs. where it going. To look beyond the desktop we must understand exactly what WaaS is, who the users are, and where it is going in the future. IT departments, ISVs and service providers must look to workflow and automation capabilities to adapt to growing demand and the rapidly changing workspace model.
Mar. 2, 2015 07:00 PM EST Reads: 184
As organizations shift toward IT-as-a-service models, the need for managing and protecting data residing across physical, virtual, and now cloud environments grows with it. CommVault can ensure protection &E-Discovery of your data – whether in a private cloud, a Service Provider delivered public cloud, or a hybrid cloud environment – across the heterogeneous enterprise. In his session at 16th Cloud Expo, Randy De Meno, Chief Technologist - Windows Products and Microsoft Partnerships, will discuss how to cut costs, scale easily, and unleash insight with CommVault Simpana software, the only si...
Mar. 2, 2015 06:45 PM EST Reads: 244
Cloud data governance was previously an avoided function when cloud deployments were relatively small. With the rapid adoption in public cloud – both rogue and sanctioned, it’s not uncommon to find regulated data dumped into public cloud and unprotected. This is why enterprises and cloud providers alike need to embrace a cloud data governance function and map policies, processes and technology controls accordingly. In her session at 15th Cloud Expo, Evelyn de Souza, Data Privacy and Compliance Strategy Leader at Cisco Systems, will focus on how to set up a cloud data governance program and s...
Mar. 2, 2015 06:30 PM EST Reads: 485
Roberto Medrano, Executive Vice President at SOA Software, had reached 30,000 page views on his home page - http://RobertoMedrano.SYS-CON.com/ - on the SYS-CON family of online magazines, which includes Cloud Computing Journal, Internet of Things Journal, Big Data Journal, and SOA World Magazine. He is a recognized executive in the information technology fields of SOA, internet security, governance, and compliance. He has extensive experience with both start-ups and large companies, having been involved at the beginning of four IT industries: EDA, Open Systems, Computer Security and now SOA.
Mar. 2, 2015 04:00 PM EST Reads: 1,335
HP and Aruba Networks on Monday announced a definitive agreement for HP to acquire Aruba, a provider of next-generation network access solutions for the mobile enterprise, for $24.67 per share in cash. The equity value of the transaction is approximately $3.0 billion, and net of cash and debt approximately $2.7 billion. Both companies' boards of directors have approved the deal. "Enterprises are facing a mobile-first world and are looking for solutions that help them transition legacy investments to the new style of IT," said Meg Whitman, Chairman, President and Chief Executive Officer of HP...
Mar. 2, 2015 04:00 PM EST Reads: 686
The industrial software market has treated data with the mentality of “collect everything now, worry about how to use it later.” We now find ourselves buried in data, with the pervasive connectivity of the (Industrial) Internet of Things only piling on more numbers. There’s too much data and not enough information. In his session at @ThingsExpo, Bob Gates, Global Marketing Director, GE’s Intelligent Platforms business, to discuss how realizing the power of IoT, software developers are now focused on understanding how industrial data can create intelligence for industrial operations. Imagine ...
Mar. 2, 2015 03:15 PM EST Reads: 1,442
Operational Hadoop and the Lambda Architecture for Streaming Data Apache Hadoop is emerging as a distributed platform for handling large and fast incoming streams of data. Predictive maintenance, supply chain optimization, and Internet-of-Things analysis are examples where Hadoop provides the scalable storage, processing, and analytics platform to gain meaningful insights from granular data that is typically only valuable from a large-scale, aggregate view. One architecture useful for capturing and analyzing streaming data is the Lambda Architecture, representing a model of how to analyze rea...
Mar. 2, 2015 02:00 PM EST Reads: 1,414
SYS-CON Events announced today that Vitria Technology, Inc. will exhibit at SYS-CON’s @ThingsExpo, which will take place on June 9-11, 2015, at the Javits Center in New York City, NY. Vitria will showcase the company’s new IoT Analytics Platform through live demonstrations at booth #330. Vitria’s IoT Analytics Platform, fully integrated and powered by an operational intelligence engine, enables customers to rapidly build and operationalize advanced analytics to deliver timely business outcomes for use cases across the industrial, enterprise, and consumer segments.
Mar. 2, 2015 01:45 PM EST Reads: 1,282
Mar. 2, 2015 12:00 PM EST Reads: 1,356
SYS-CON Events announced today that Open Data Centers (ODC), a carrier-neutral colocation provider, will exhibit at SYS-CON's 16th International Cloud Expo®, which will take place June 9-11, 2015, at the Javits Center in New York City, NY. Open Data Centers is a carrier-neutral data center operator in New Jersey and New York City offering alternative connectivity options for carriers, service providers and enterprise customers.
Mar. 2, 2015 12:00 PM EST Reads: 1,971
Mar. 2, 2015 10:30 AM EST Reads: 2,672
PubNub on Monday has announced that it is partnering with IBM to bring its sophisticated real-time data streaming and messaging capabilities to Bluemix, IBM’s cloud development platform. “Today’s app and connected devices require an always-on connection, but building a secure, scalable solution from the ground up is time consuming, resource intensive, and error-prone,” said Todd Greene, CEO of PubNub. “PubNub enables web, mobile and IoT developers building apps on IBM Bluemix to quickly add scalable realtime functionality with minimal effort and cost.”
Mar. 2, 2015 10:00 AM EST Reads: 4,855
Sensor-enabled things are becoming more commonplace, precursors to a larger and more complex framework that most consider the ultimate promise of the IoT: things connecting, interacting, sharing, storing, and over time perhaps learning and predicting based on habits, behaviors, location, preferences, purchases and more. In his session at @ThingsExpo, Tom Wesselman, Director of Communications Ecosystem Architecture at Plantronics, will examine the still nascent IoT as it is coalescing, including what it is today, what it might ultimately be, the role of wearable tech, and technology gaps stil...
Mar. 2, 2015 09:45 AM EST Reads: 992
In the consumer IoT, everything is new, and the IT world of bits and bytes holds sway. But industrial and commercial realms encompass operational technology (OT) that has been around for 25 or 50 years. This grittier, pre-IP, more hands-on world has much to gain from Industrial IoT (IIoT) applications and principles. But adding sensors and wireless connectivity won’t work in environments that demand unwavering reliability and performance. In his session at @ThingsExpo, Ron Sege, CEO of Echelon, will discuss how as enterprise IT embraces other IoT-related technology trends, enterprises with i...
Mar. 2, 2015 09:00 AM EST Reads: 2,288
When it comes to the Internet of Things, hooking up will get you only so far. If you want customers to commit, you need to go beyond simply connecting products. You need to use the devices themselves to transform how you engage with every customer and how you manage the entire product lifecycle. In his session at @ThingsExpo, Sean Lorenz, Technical Product Manager for Xively at LogMeIn, will show how “product relationship management” can help you leverage your connected devices and the data they generate about customer usage and product performance to deliver extremely compelling and reliabl...
Mar. 2, 2015 09:00 AM EST Reads: 1,406
The Internet of Things (IoT) is causing data centers to become radically decentralized and atomized within a new paradigm known as “fog computing.” To support IoT applications, such as connected cars and smart grids, data centers' core functions will be decentralized out to the network's edges and endpoints (aka “fogs”). As this trend takes hold, Big Data analytics platforms will focus on high-volume log analysis (aka “logs”) and rely heavily on cognitive-computing algorithms (aka “cogs”) to make sense of it all.
Mar. 2, 2015 09:00 AM EST Reads: 1,167
With several hundred implementations of IoT-enabled solutions in the past 12 months alone, this session will focus on experience over the art of the possible. Many can only imagine the most advanced telematics platform ever deployed, supporting millions of customers, producing tens of thousands events or GBs per trip, and hundreds of TBs per month. With the ability to support a billion sensor events per second, over 30PB of warm data for analytics, and hundreds of PBs for an data analytics archive, in his session at @ThingsExpo, Jim Kaskade, Vice President and General Manager, Big Data & Ana...
Mar. 2, 2015 09:00 AM EST Reads: 1,356
One of the biggest impacts of the Internet of Things is and will continue to be on data; specifically data volume, management and usage. Companies are scrambling to adapt to this new and unpredictable data reality with legacy infrastructure that cannot handle the speed and volume of data. In his session at @ThingsExpo, Don DeLoach, CEO and president of Infobright, will discuss how companies need to rethink their data infrastructure to participate in the IoT, including: Data storage: Understanding the kinds of data: structured, unstructured, big/small? Analytics: What kinds and how responsiv...
Mar. 2, 2015 05:00 AM EST Reads: 2,556
Since 2008 and for the first time in history, more than half of humans live in urban areas, urging cities to become “smart.” Today, cities can leverage the wide availability of smartphones combined with new technologies such as Beacons or NFC to connect their urban furniture and environment to create citizen-first services that improve transportation, way-finding and information delivery. In her session at @ThingsExpo, Laetitia Gazel-Anthoine, CEO of Connecthings, will focus on successful use cases.
Mar. 2, 2015 04:00 AM EST Reads: 2,959 | s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936463103.84/warc/CC-MAIN-20150226074103-00197-ip-10-28-5-156.ec2.internal.warc.gz | CC-MAIN-2015-11 | 14,665 | 49 |
https://www.conf42.com/Open_Source_Showcase_2020_Sebastin_Ramrez_cryptpad_collaboration_suite | code | FastAPI is a modern, fast (high-performance), web framework for building APIs with Python 3.6+ based on standard Python type hints. From simple code you get automatic API docs, validation, and serialization.
Your API will support open standards like OpenAPI and JSON Schema by default. And your code will have autocompletion and type checks in your editor everywhere, even for your own JSON request data. It has integrated tools to handle auth with OAuth2, a powerful but simple dependency injection system, and more. FastAPI is currently used by Microsoft, Uber, Netflix, and many others for different tools and projects.
Priority access to all content
Exclusive promotions and giveaways | s3://commoncrawl/crawl-data/CC-MAIN-2021-21/segments/1620243991693.14/warc/CC-MAIN-20210512004850-20210512034850-00517.warc.gz | CC-MAIN-2021-21 | 688 | 4 |
https://plu.mx/a/?repo_url=http://philsci-archive.pitt.edu/id/eprint/11959 | code | Kinematics, Dynamics, and the Structure of Physical Theory
- Publication Year:
- Usage 330
- Downloads 330
- PhilSci-Archive 330
- Repository URL:
- Most Recent Tweet View All Tweets
Every physical theory has (at least) two different forms of mathematical equations to represent its target systems: the dynamical (equations of motion) and the kinematical (kinematical constraints). Kinematical constraints are differentiated from equations of motion by the fact that their particular form is fixed once and for all, irrespective of the interactions the system enters into. By contrast, the particular form of a system's equations of motion depends essentially on the particular interaction the system enters into. All contemporary accounts of the structure and semantics of physical theory treat dynamics, i.e., the equations of motion, as the most important feature of a theory for the purposes of its philosophical analysis. I argue to the contrary that it is the kinematical constraints that determine the structure and empirical content of a physical theory in the most important ways: they function as necessary preconditions for the appropriate application of the theory; they differentiate types of physical systems; they are necessary for the equations of motion to be well posed or even just cogent; and they guide the experimentalist in the design of tools for measurement and observation. It is thus satisfaction of the kinematical constraints that renders meaning to those terms representing a system's physical quantities in the first place, even before one can ask whether or not the system satisfies the theory's equations of motion. | s3://commoncrawl/crawl-data/CC-MAIN-2018-47/segments/1542039744750.80/warc/CC-MAIN-20181118221818-20181119003818-00256.warc.gz | CC-MAIN-2018-47 | 1,648 | 8 |
http://androidforums.com/samsung-galaxy-w/548750-pronlems-usb-conection-gt-s5660.html | code | May 14th, 2012, 07:22 PM
Join Date: Mar 2011
Location: Ireland's Lake Land
Device(s): GT-I9300, GT-i8150, Momo11 Bird China Tab.
Carrier: Tesco Mobile Ireland
Thanked 153 Times in 136 Posts
Originally Posted by hilfer
Drivers ??? what do you mean ???
Not installed kies.Do you think it can help ??
I don't know if recognized is the correct word: both phones start the battery charging, the only diference is that on "my computor" I see the phone icon of my galaxy W and for the one of my wife I get a "removable disk" and on my phone I can place any data I want and in my wife's phone I can not because when I try to "open" it , the message is : "insert disk on removable device".
Same message as when I try to open my CD drive when it is empty.
hope this explanation can help.
Well you see, as far as Windoze is concerned, you connect a device via USB....it could be any device...
Wibdoze needs "driver" files installed so it knows how to handle any connected device!!
These are usually specific to the device/phone/flash drive/USB Drive.
Kies is a Samsung proprietary SW, a little like iTunes, which installs these drivers, as well as a lot of useless other stuff!!!
W7 may have drivers for some devices, but not all.
Here is one site from which you can d/l latest Kies.... which should have required drivers for your device(s).... | s3://commoncrawl/crawl-data/CC-MAIN-2014-41/segments/1410657136896.39/warc/CC-MAIN-20140914011216-00242-ip-10-234-18-248.ec2.internal.warc.gz | CC-MAIN-2014-41 | 1,333 | 18 |
https://community.ptc.com/t5/Windchill/How-to-ensure-records-are-read-from-a-table-in-order-they-are/m-p/434118/highlight/true | code | How to ensure records are read from a table in order they are inserted.
We have a custom publish service, and are having issues with records not being retrieved in the order they are written.
There are a number of "batch" processes that use a global transaction to process all data in the batch. When this happens, the individual records are not committed until the entire batch is processed. But since we are running a multi-threaded (multiple MS on multiple app servers) environment, other threads write to the table and commit immediately.
Then when a read request is received, the read is based on the last transaction ID sent from the app. When the uncommitted records exist, they end up being skipped.
Has anybody dealt with how to ensure publishes to downstream systems happen in the proper order, especially when dealing with batch and interactive processes at the same time? | s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764501066.53/warc/CC-MAIN-20230209014102-20230209044102-00633.warc.gz | CC-MAIN-2023-06 | 883 | 5 |
https://www.itworldcanada.com/article/firefox-mozilla-opera-struck-by-spoofing-flaw-2/37390 | code | A dangerous spoofing security hole has been found in every browser on the market — except one.
Mozilla, Firefox, Safari, Opera and Netscape all suffer from the “moderately critical” vulnerability that allows the spoofing of address bar URLs and SSL certificates, but, incredibly Microsoft Corp.’s Internet Explorer gets a clean bill of health.
Publicized by security company Secunia, the flaw affect the range of browsers using the open-source Geko browser kernel. Anyone using an affected browser would be able to visit spoofed Web sites without being aware of it, something that would aid any crime based on setting up bogus websites, such as phishing.
The flaw arises from the way the named browsers resolve web addresses that include international characters in International Domain Name (IDN) URLs. Russian researchers Evgeniy Gabrilovich and Alex Gontmakher first outlined the potential for such a spoofing issue in 2002, in what was then a theoretical paper, The Homograph Attack.
Exploiting the hole could, they reasoned, allow them to register a “homographic” variant of www.microsoft.com that included Unicode/UTF-8-defined Russian characters similar to certain ASCII characters.
They speculated that some browsers would either resolve these characters in a garbled way or would, as has turned out to be the case, present them as if the registered domain was actually the real Microsoft.com. Users could also be fooled into believing the bogus site was protected by an SSL certificate when it wasn’t.
There is no patch for the vulnerability though users can at least test browsers for it on the Secunia Web site. | s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947473871.23/warc/CC-MAIN-20240222225655-20240223015655-00741.warc.gz | CC-MAIN-2024-10 | 1,636 | 7 |
https://www.overclockers.com/pcitimer-ver-3-0/ | code | A handy little program to change PCI settings — Bill Lane
This utility will allow the modification or display of the PCI latency timer of a PCI device if it’s PCI latency timer is located at offset D. Unfortunately I know of no way of finding out at what offset the PCI latency timer resides.
New to this version is the ability to specify the
device #, bus # and function # you wish to modify. It can now be used to modify most, if not all PCI latency timers. I’ve used it to modify the PCI latency timer of modems, VIA EIDE controllers and sound cards. Curiously I’m surprised a modem would be capable of bus-mastering at all — considering
how slow it is.
The first step is to look up the device #, bus # and function # of the device you wish to modify. This can be done by utilizing Sisoft Sandra and looking at the PCI, AGP, Cardbus buses then selecting the device
you’re interested in (thanks Sisoft!).
Sisoft reports numbers in hex so you might have to convert to decimal (where F=15, E=14, D=13, C=12, B=11, A=10) Probably the best use for this utility is in reducing the PCI latency timer for your AGP card — and reducing the PCI latency timer for your modem (Winmodems don’t seem to work well with a PCI latency timer of zero).
According to the PCI Latency How To, PCI latency timers should be less than 64 clks. You might be able to get better transfer rates to your hard drives by increasing its PCI latency timer. My Nvidia GEforce 2/GTS was running 248 clks, which I reduced to ~100 clks w/no loss in framerate.
This also eliminated the problems I had when loading Undying on my KT133 system. I would always get a BSOD w/the message “disk error writing to drive
x: data or files may be lost”. By reducing the PCI latency timer to around 100 clks for the GEForce 2/GTS this problem disappeared.
New to this version is the ability to specify a configuration file.
I’ve only tested my utility on two VIA MVP3 based systems, a VIA KT133, VIA KT133e, VIAK KT266a and a Soyo Vempro based system all under Windows 98.
This utlity should work for any PCI latency timer located at offset D. Furthermore, there appears to be no standard on the granularity of PCI latency timers. I assume a granularity of 8 clks so if the granularity
is more than this (say 16 clks) the reported value of the PCI latency timer will not agree w/what you try to set it to because the 3rd bit will be ignored.
The utility should be run from a DOS box while in Windows 95/98.
I would first check, re-check and write-down the current PCI latency timer setting of the device I plan to modify! Once again finding the device #, bus # and function # can be found by looking at Sissoft Sandra’s PCI, AGP, Cardbuses information and
checking the various devices therein.
Sisoft reports numbers in hex so you might have to convert to decimal (where F=15, E=14, D=13, C=12, B=11, A=10). It would be a good idea to first note the original value before changing it.
PCItimer will not work under Windows NT or Windows 2000. This may change in the near future.
The worst problem I’ve experienced using this utility is video corruption. However, if
one were to monkey w/the EIDE controller PCI latency by reducing it, it’s possible you could
corrupt the data on your hard drive(s). Shutting down and restarting windows restores your
PCI latency timer to it’s default value, so that would be a way to overcome this problem if it occurs.
Personally I’ve found I get greater stability on my KT133 system by reducing the AGP PCI
latency timer’s value to 128 or less (this is for a GeForce 2/GTS AGP) from 248 clks. If you do a
search on PCI latency How-To you’ll find that PCI latency timer values of over 64 clks aren’t
recommended. As a matter of fact I’ve experienced no reduction in performance when I reduced
my GeForce 2/GTS AGP PCI latency timer value to ~100 clks.
It’s possible not all PCI devices implement their PCI latency register at the same offset D. This
sucks because it seems like no manufacturers today publicly publish their data
sheets so there’s no way of knowing where they implement their PCI latency register. Also if a device
card doesn’t do bus-mastering (I know for a fact the PCI 3dfx Voodoo 3/2000 didn’t do bus-mastering)
there will be no latency timer to modify!
I added PCItimer to the startup taskbar and start menu as a DOS app and then check close-on-exit.
This is the way I’m using it on my KT133-based Gigabyte 7zx. Settings -> Taskbar and Start Menu -> Start Menu
Programs. On all three motherboards I’ve tested the AGP PCI latency timer value is reset to it’s default
value on reboot.
The configuration file must be located in the same directory as the utility and should specify each device
on a different line in the following format
The first line would be setting device 0, bus 0, function 0 to a PCI latency value of 0. The 2nd line would be
setting device 7, bus 0, function 1 to a PCI latency of 40 clks.
Recently I’ve used this utility to solve a strange problem I had with my S3 Savage4 AGP vid-card.
The drivers I’m using for this card apparently reset the PCI latency timer for this card to
248 clks regardless of BIOS settings. This caused Yuri’s Revenge to consistently crash to the
desktop (i.e. whenever it eventually cause a page swap to disk) and streaming video from certain games to exhibit choppy playback.
My solution for this was to increase the PCI latency timer for the EIDE controller to match
that of the video-card (i.e. 240 clks). Now the S3 Savage4 can’t hog the PCI bus for itself and must share with
the EIDE controller.
This program, which isn’t particularly user-friendly, will take 4
command line parameters. Three of the command-line parameters will
specify the device #, bus # and function # at which the PCI device
resides. The 4th parameter will consist of -vV followed by a
single number (unsigned char) or -C or -c. The -C or -c parameter
will report the current setting of the PCI latency timer for the PCI
device. The command-line parameters are:
PCItimer -dD (decimal value) -bB (decimal value) -fF (decimal value) -vV (decimal value)/-cC/-rR
will report back the current PCI
latency timer setting for device 0, bus 1, function 0
will modify the PCI latency timer
for device 5, bus 1, function 0 to 104 clks
will report back the current PCI
latency timer setting for device 4, bus 1, function 3
will read the settings for all
the devices listed in the text file set.txt and
set the latency timer for all devices so listed
(better make sure the parameters in the ASCII file
are correct, because I do NO error checking on file
The last command-line parameter (i.e. -vV<decimal value>) will set the PCI latency timer of a PCI device at the specified device #, bus # and function #) to (8 x this number). This utility can only set the PCI latency timer to the following range: 0 =< x <= 248
value command line
0 clks 0
8 clks 1
16 clks 2
24 clks 3
32 clks 4
40 clks 5
48 clks 6
56 clks 7
64 clks 8
72 clks 9
80 clks 10
88 clks 11
96 clks 12
104 clks 13
112 clks 14
120 clks 15
128 clks 16
136 clks 17
144 clks 18
152 clks 19
160 clks 20
168 clks 21
176 clks 22
DOWNLOAD PCITIMER.zip (13k)
If you’ve got any problems it’s best to send me the specs on your PCI device by using Sisoft Sandra.
What I’d like to know is what device #, bus # and function # your PCI device is using, it’s current
latency timer value and whether or not it’s bus-master capable (both found in Sisoft Sandra’s PCI, AGP,
Cardbus buses information, AGP). Also, I’d like to know what interfaces your PCI bus supports
(found in Sisoft Sandra PCI, AGP, Cardbuses information generic).
author of the original PCI latency utility: latency.exe. | s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679102612.80/warc/CC-MAIN-20231210155147-20231210185147-00652.warc.gz | CC-MAIN-2023-50 | 7,729 | 100 |
https://forums.adobe.com/thread/1026622 | code | Where is your csf?
The csf file is local to the machine
i can pace it wherever but currently its :user:library:application support:Adobe:color:settings
Then this works fine with my test settings file…
set cms to (path to application support from user domain as text) & "Adobe:Color:Settings:Marks Test.csf" as alias
tell application "Adobe Illustrator"
load color settings from cms
However i get Exprected end of line , etc but found property message
with color highlighted when i add this in Applescript Editor
I just C&P it back from the forum to check the text and it works just fine here… How have you added this to your script?
I have done the same (copied and paste)to a brand new applescript
and i get the same when i hit comple
Hum what version of AI are you using and what OS?
good point i have both illustrator cs5 and cs6 installed
on 10.6.8 os | s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376823618.14/warc/CC-MAIN-20181211104429-20181211125929-00583.warc.gz | CC-MAIN-2018-51 | 859 | 15 |
http://icculus.org/pipermail/cod/2009-January/012567.html | code | [cod] Cod WW: 1024 bytes Command Exploit
georgecooldude at gmail.com
Sat Jan 24 18:27:23 EST 2009
All the more reason this should be fixed by the COD5 dev team. I'm sure I
recall some mails about this or a similar issue ages ago.
On Sat, Jan 24, 2009 at 10:42 PM, MikeTNT <MikeTNT at gmx.de> wrote:
> Thank you so much that you send such information in a non puplic mailing
> list like icculus.org
> Now all admins over the world can be sure that nobody will copy your string
> and try it out. :-(
> ----- Original Message -----
> *From:* Jumping Jack Flash <jumping.cod at gmail.com>
> *To:* cod at icculus.org
> *Sent:* Saturday, January 24, 2009 9:53 PM
> *Subject:* [cod] Cod WW: 1024 bytes Command Exploit
> Hi guys, every day my cod5 server fall down cause this error: Attempted to
> overrun string in call to va()
> I've found some information about it:
> "va() is a function of the Quake 3 engine used to quickly build strings
> using snprintf and a static destination buffer.
> If the generated string is longer than the available buffer the server
> shows an "Attempted to overrun string in call to va()" error and
> >From Call of Duty 2 (and consequently) the size of this buffer has
> been reduced from the original 32000 bytes to only 1024 causing many
> problems to the admins.
> So in CoD5 an attacker which has joined the server can exploit this
> vulnerability through the sending of a command longer than 1024 bytes
> causing the immediate termination of the server."
> I try it, and it works. I you send this command to the server, it will crash:
> cmd I'mwithstupidsI'mwithstupidsI'mwithstupidsI'mwithstupidsI'mwithstupidsI'mwithstupidsI'mwithstupidsI'mwithstupidsI'mwithstupidsI'mwithstupidsI'mwithstupidsI'mwithstupidsI'mwithstupidsI'mwithstupidsI'mwithstupidsv
> I test it in differents servers, in someones worked, in other didn't... Anybody knows a solution for this exploit?
> Thank, and sorry my english :P
-------------- next part --------------
An HTML attachment was scrubbed...
More information about the Cod | s3://commoncrawl/crawl-data/CC-MAIN-2018-26/segments/1529267864958.91/warc/CC-MAIN-20180623113131-20180623133131-00416.warc.gz | CC-MAIN-2018-26 | 2,039 | 35 |
http://www.everywhatever.com/2007/03/chicago-trip-day-0.html | code | So I am being sent to Chicago for a week of training. Actually 2 (non-consecutive weeks). Actually as I write this I am already IN Chicago.
Naturally, my first thought upon finding out that I was going to Chicago for training was not "Cool, the chance to learn job applicable skills" or "Sure will miss my family while I'm gone" though both of those things are true. Rather, it was more along the lines of "Holy crap am I going to pick up some counties!"
It was decided we would drive up. Since the training is just more of a 9-5 thing, I figured that I could use my evenings (plus the trips to and fro) to score more counties. My original goal when trying to set things up was to hit every county in Illinois, Michigan and Wisconsin. However, I have since pared things down (as Carolyn says, "The counties will still be there")
Originally it was going to be me and two other guys from work driving up. So I was trying to figure out how I could "umm borrow?" the car at nights. But then the one guy couldn't go up, and then the other guy's boss said they couldn't spend the money and then voila I was driving up all by myself!
So I spent a bit of time cooking up some routes for county, county, county madness! Stay tuned. Let's just say that my Illinois is preparing to look AWFUL blue.
Here is a before shot of my county map | s3://commoncrawl/crawl-data/CC-MAIN-2019-04/segments/1547583671342.16/warc/CC-MAIN-20190119160425-20190119182425-00086.warc.gz | CC-MAIN-2019-04 | 1,326 | 6 |
https://www.dpag.ox.ac.uk/publications/951150 | code | Multichannel Sleep Stage Classification and Transfer Learning using Convolutional Neural Networks.
Andreotti F., Phan H., Cooray N., Lo C., Hu MTM., De Vos M.
Current sleep medicine relies on the supervised analysis of polysomnographic measurements, comprising amongst others electroencephalogram (EEG), electromyogram (EMG), and electrooculogram (EOG) signals. Convolutional neural networks (CNN) provide an interesting framework to automated classification of sleep based on these raw waveforms. In this study, we compare existing CNN approaches to four databases of pathological and physiological subjects. The best performing model resulted in Cohen's Kappa of $\kappa = 0 .75$ on healthy subjects and $\kappa = 0 .64$ on patients suffering from a variety of sleep disorders. Further, we show the advantages of additional sensor data (i.e., EOG and EMG). Deep learning approaches require a lot of data which is scarce for less prevalent diseases. For this, we propose a transfer learning procedure by pretraining a model on large public data and fine-tune this on each subject from a smaller dataset. This procedure is demonstrated using a private REM Behaviour Disorder database, improving sleep classification by 24.4%. | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030334915.59/warc/CC-MAIN-20220926175816-20220926205816-00002.warc.gz | CC-MAIN-2022-40 | 1,225 | 3 |
https://en.wikipedia.org/wiki/Time-utility_function | code | A Time/Utility Function (TUF), née Time/Value Function, specifies the application-specific utility that an action (e.g., computational task, mechanical movement) yields depending on its completion time. TUFs and their utility interpretations (semantics), scales, and values are derived from application domain-specific subject matter knowledge. An example (but not the only) interpretation of utility is an action's relative importance, which otherwise is independent of its timeliness. The traditional deadline represented as a TUF is a special case—a downward step of utility from 1 to 0 at the deadline time—e.g., timeliness without importance. A TUF is more general—it has a critical time, with application-specific shapes and utility values on each side, after which it does not increase. The various researcher and practitioner definitions of firm and soft real-time can also be represented as special cases of the TUF model.
The optimality criterion for scheduling multiple TUF-constrained actions has historically in the literature been only maximal utility accrual (UA)—e.g., a (perhaps expected) weighted sum of the individual actions' completion utilities. This thus takes into account timeliness with respect to critical times. Additional criteria (e.g., energy, predictability), constraints (e.g., dependencies), system models, scheduling algorithms, and assurances have been added as the TUF/UA paradigm and its use cases have evolved. More expressively, TUF/UA allows accrued utility, timeliness, predictability, and other scheduling criteria and constraints to be traded off against one another for the schedule to yield situational application QoS[a]—as opposed to only timeliness per se. Instances of the TUF/UA paradigm have been employed in a wide variety of application domains, most frequently in military systems.
The TUF/UA paradigm was originally created to address certain action timeliness, predictability of timeliness, and application QoS-based scheduling needs of various military applications for which traditional real-time concepts and practices are not sufficiently expressive (e.g., for dynamically timeliness-critical systems not having deadlines) and load resilience (e.g., for systems subject to routine action overloads). An important common example class of such applications is missile defense (notionally).
Subsequently, numerous variations on the original TUF model, the TUF/UA paradigm's system model, and thus scheduling techniques and algorithms, have been studied in the academic literature—e.g.,—and applied in civilian contexts.
Some examples of the latter include: cyber-physical systems, AI, multi-robot systems, drone scheduling, autonomous robots, intelligent vehicle-to-cloud data transfers, industrial process control, transaction systems, high performance computing, cloud systems, heterogeneous clusters, service-oriented computing, networking, and memory management for real and virtual machines. A steel mill example is briefly described in the Introduction of Clark's Ph.D. thesis.
TUFs and their utility interpretations (semantics), scales, and values are derived from domain-specific subject matter knowledge. A historically frequent interpretation of utility is actions' relative importance.[b] A framework for á priori assigning static utility values subject to strong constraints on system models has been devised, but subsequent (like prior) TUF/UA research and development have preferred to depend on exploiting application-specificity rather than attempting to create more general frameworks. However, such frameworks and tools remain an important research topic.
By traditional convention, a TUF is a concave function, including linear ones. See the depiction of some example TUFs.
TUF/UA papers in the research literature, with few exceptions, e.g., are for only either linear or piecewise linear (including conventional deadline-based) TUFs because they are easier to specify and schedule. In many cases, the TUFs are only monotonically decreasing.
A constant function represents an action's utility that is not related to the action's completion time—for example, the action's constant relative importance. This allows both time-dependent and time-independent actions to be scheduled coherently.
A TUF has a global critical time, after which its utility does not increase. If a TUF never decreases, its global critical time is the first time when its maximum utility is reached. A constant TUF has an arbitrary critical time for the purpose of scheduling—such as the action's release time, or the TUF's termination time. The global critical time may be followed by local critical times—for example, consider a TUF having a sequence of downward steps, perhaps to approximate a smooth downward curve.[c]
TUF utility values are usually either integers or rational numbers.
TUF utility may include negative values. (A TUF that has negative values in its range is not necessarily dropped from scheduling consideration or aborted during its operation—that decision depends on the scheduling algorithm.)
A conventional deadline time (d) represented as a TUF is a special case—a downward step TUF[d] having a unit penalty (i.e., having utility values 1 before and 0 after its critical time).
More generally, a TUF allows downward (and upward) step functions to have any pre- and post-critical time utilities.
Tardiness represented as a TUF is a special case whose non-zero utility is the linear function C - d, where C is the action's completion time—either current, expected, or believed.[e] More generally, a TUF allows non-zero earliness and tardiness to be non-linear—e.g., increasing tardiness may result in non-linearly decreasing utility, such as when detecting a threat.
Thus, TUFs provide a rich generalization of traditional action completion time constraints in real-time computing.
Alternatively, the TUF/UA paradigm can be employed to use timeliness with respect to the global critical time as a means to a utility accrual end—i.e., application-level Quality of Service (QoS)—instead of timeliness per se being an end in itself.
These adaptations ordinarily occur at discrete events—e.g., at an application mode change such as for ballistic missile flight phases.
Alternatively, these adaptations may occur continuously, such as for actions whose operational durations and TUFs are application-specific functions of when those actions are either released or begin operation. The operation durations may increase or decrease or both, and may be non-monotonic. This continuous case is called time-dependent scheduling. Time-dependent scheduling was introduced for (but is not limited to) certain real-time military applications, such as radar tracking systems.[g]
Utility Accrual Scheduling
Multiple actions in a system may contend for access to sequentially exclusively[h] shared resources—physical ones such as processors, networks, exogenous application devices (sensors, actuators, etc.)—and logical ones such as synchronizers, data.
The TUF/UA paradigm resolves each instance of this contention using an application-specific algorithmic technique that creates (or updates) a schedule at scheduling events—e.g., times (such as action arrival or completion) or states. The instance's contending actions are dispatched for resource access sequentially in order from the front of the schedule. Thus, action UA sequencing is not greedy.[i]
The algorithmic technique creates a schedule based on one or more application-specific objectives (i.e., optimality criteria).
The primary objective for scheduling actions having TUFs is maximal utility accrual (UA). The accrued utility is an application-specific polynomial sum of the schedule's completed actions' utilities. When actions have one or more stochastic parameters (e.g., operation duration), the accrued utility is also stochastic (i.e., an expected polynomial sum).
Utility and accrued utility are generic, their interpretations (semantics) and scales are application-specific.
An action's operation duration may be fixed and known at system configuration time. More generally, it may be either fixed or stochastic but not known (either with certainty or in expectation) until it either arrives or is released.
An operation duration may be an application-specific function of the action's operation starting time—it may increase or decrease or both, and may be non-monotonic. This case is called time-dependent scheduling.
- The term Quality of Service (QoS) initially arose in the context of communication networks but subsequently has commonly been applied at the application level.
- Scheduling based on importance is not the same as greedy dispatching based on importance.
- This is more general than Locke's introduction of the term critical time in Locke 86.
- There is a discontinuity in either the function or its first or second derivative.
- For example, mathematical evidence theories such as Dempster-Shafer Theory, imprecise probability theories, etc. may be used for certain system models having epistemic uncertainties.
- Operating is used as the general case to include non-computational (e.g., mechatronic) actions as well as computational tasks that execute.
- Time-dependent scheduling (i.e., some actions' operation durations are functions of their starting times) is distinct from, and not limited to, real-time scheduling in the sense of actions having deadlines (or critical times).
- Sequentially exclusive is a special case of shared access, used here for simplicity without loss of generality.
- Some UA schedulers may remove an overload in a greedy manner—cf. §7.5.1 in Locke 86.
- E. Douglas Jensen, C. Douglas Locke, and Hideyuki Tokuda. A Time-Value Driven Scheduling Model for Real-Time Operating Systems, Proc. Symposium on Real-Time Systems, IEEE, 1985.
- E. Douglas Jensen. A Timeliness Model for Asynchronous Decentralized Computer Systems, Proc. International Symposium on Autonomous Decentralized Systems, IEEE, 1993
- E. Douglas Jensen. Chapter 3 Radar Scheduling, Section 1 The Scheduling Problem in Gouda+ 77 (unclassified version).
- Mohamed G. Gouda, Yi-Wu Han, E. Douglas Jensen, Wesley D. Johnson, Richard Y. Kain (Editor). Distributed Data Processing Technology, Vol. IV, Applications of DDP Technology to BMD: Architectures and Algorithms, unclassified version, Defense Technical Information Center a047477, Honeywell Systems and Research Center, Minneapolis, MN, 1977.
- David P. Maynard, Samuel E. Shipman, Raymond K. Clark, J. Duane Northcutt, E. Douglas Jensen, Russell B. Kegley, Betsy A. Zimmerman, Peter J. Keleher. An Example Real-Time Battle Management Command and Control Application for Alpha, Section 8.2.1, Archons Project Technical Report, 1988, and public version 2008.
- Binoy Ravindran, E. Douglas Jensen, and Peng Li. On Recent Advances in Time/Utility Function Real-Time Scheduling and Resource Management, Proc. Eighth IEEE International Symposium on Object-Oriented Real-Time Distributed Computing, 2005.
- Saud A. Aldami and Alan Burns. Dynamic Value-Density for Scheduling Real-Time Systems, Proc. 11th Euromicro Conference on Real-Time Systems, IEEE, 1999.
- Alan Burns, D. Prasad, A. Bondavalli, F. Di Giandomenico, K. Ramamritham, J. Stankovic, L. Strigini. The meaning and role of value in scheduling flexible real-time systems, Journal of Systems Architecture, Elsivier, 2000.
- Divya Prasad, Alan Burns, and Martin Atkins. The Valid Use of Utility in Adaptive Real-Time Systems. Real-Time Systems, Kluwer, 2003.
- Ken Chen and Paul Muhlethaler. A Family of Scheduling Algorithms for Real-Time Systems Using Time Value Functions. Real-Time Systems, vol. 10 no. 3, Kluwer, 1996.
- Terry Tidwell, Robert Glaubius, Christopher D. Gill and William D. Smart. Optimizing Expected Time Utility in Cyber-Physical Systems Schedulers, Proc. IEEE Real-Time Systems Symposium, 2010.
- Yagil Ronén, Daniel Mossé, and Martha E. Pollack. Value-Density Algorithms for the Deliberation-Scheduling Problem, ACM SIGART Bulletin, Volume 7 Issue 2, 1996.
- Michał Barcís, Agata Barcís, and Hermann Hellwagner. An Evaluation Model for Information Distribution in Multi-Robot Systems, Sensors, January 2020.
- Shireen Seakhoa-King, Paul Balaji, Nicolas Trama Alvarez, and William J. Knottenbelt. Revenue-Driven Scheduling in Drone Delivery Networks with Time-Sensitive Service Level Agreements, Proc. 12th EAI International Conference on Performance Evaluation Methodologies and Tools, ACM, 2019.
- Aldis Baums. Automatic Control and Computer Sciences, Vol. 46, No. 6, Allerton Press, 2012.
- Jean Ibarz, Michaël Lauer, Matthieu Roy, Jean-Charles Fabre, Olivier Flébus. Optimizing Vehicle-to-Cloud Data Transfers using Soft Real-Time Scheduling Concepts, Proc. 28th International Conference on Real-Time Networks and Systems, ACM, 2020.
- Rutger Habets. Improving the line performance of packaging line 41 at Heineken Zoeterwoude, Bachelor of Science project thesis, Industrial Engineering and Management, University of Twente, 2019.
- Jayant R. Haritsa, Jayant R., Michael J. Carey, and Miron Livney. Value-Based Scheduling in Real-Time Databases, VLDB Journal, 2 (2) 1993.
- Luis Diego Briceño, Bhavesh Khemka, Howard Jay Siegel, Anthony A. Maciejewski, Christopher Groër, Gregory Koenig, Gene Okonski, and Steve Poole. Time Utility Functions for Modeling and Evaluating Resource Allocations in a Heterogeneous Computing System, Proc. IEEE International Symposium on Parallel and Distributed Processing, 2011.
- Cihan Tunc, Nirmal Kumbhare, Ali Akoglu, Salim Hariri, Dylan Machovec, Howard Jay Siegel. Value of Service Based Task Scheduling for Cloud Computing Systems, Proc. International Conference on Cloud and Autonomic Computing, 2016.
- Vignesh T. Ravi1, Michela Becchi2, Gagan Agrawal1, and Srimat Chakradhar. ValuePack: Value-Based Scheduling Framework for CPU-GPU Clusters, Proc. IEEE International Conference on High Performance Computing, Networking, Storage and Analysis, 2012.
- Alvin AuYoung, Laura Grit, Janet Wiener, John Wilkes. Service contracts and aggregate utility functions, Proc. 15th IEEE International Symposium on High Performance Distributed Computing, 2006.
- Jinggang Wang and Binoy Ravindran. Time-Utility Function-Driven Switched Ethernet: Packet Scheduling Algorithm, Implementation, and Feasibility Analysis, IEEE Transactions on Parallel and Distributed Systems, vol. 15, no. 2, February 2004.
- Hyeonjoong Cho, Binoy Ravindran, Chewoo Na. Garbage Collector Scheduling in Dynamic, Multiprocessor Real-Time Systems, IEEE Transactions on Parallel and Distributed Systems 20(6), June 2009.
- Shahrooz Feizabadi and Godmar Back. Garbage collection-aware utility accrual scheduling, Real-Time Systems Journal, July 2007, Volume 36, Issue 1–2, 2007.
- Raymond K. Clark. Scheduling Dependent Real-Time Activities, Ph.D. Dissertation, CMU-CS-90-155, Computer Science Department, Carnegie Mellon Univ., 1990.
- Raymond K. Clark, E. Douglas Jensen, Arkady Kanevsky, John Maurer, Paul Wallace, Tom Wheeler, Yun Zhang, Douglas M. Wells, Tom Lawrence, and Pat Hurley. An Adaptive, Distributed Airborne Tracking System, IEEE Parallel and Distributed Real-Time Systems, volume 1586 of LNCS, Springer-Verlag, 1999.
- C. Douglas Locke. Best-Effort Decision Making for Real-Time Scheduling, Ph.D. Thesis CMU-CS-86-134, Computer Science Department, Carnegie-Mellon University, 1986.
- Peng Li. Utility Accrual Real-Time Scheduling: Models and Algorithms, Ph.D. dissertation, Virginia Polytechnic Institute and State University, 2004.
- Peng Li, Haisang Wu, Binoy Ravindran, and E. Douglas Jensen. A Utility Accrual Scheduling Algorithm for Real-Time Activities with Mutual Exclusion Resource Constraints, IEEE Transactions on Computers, vol. 55, no. 4, April 2006.
- Zhishan Guo and Sanjoy Buruah. A Neurodynamic Approach for Real-Time Scheduling via Maximizing Piecewise Linear Utility, IEEE Transactions on Neural Networks and Learning Systems, vol. 27 no. 2, February 2016.
- Jeremy P. Erickson. Managing Tardiness Bounds and Overload in Soft Real-Time Systems, Ph.D. dissertation, University of North Carolina, 2014.
- Stanislaw Gawiejnowicz. A review of four decades of time-dependent scheduling: main results, new topics, and open problems, Journal of Scheduling 23, 3–47, Springer, 2020.
- K. D. Glazebrook. Single-machine scheduling of stochastic jobs subject to deterioration or delay, Naval Research Logistics 39, no. 5, Wiley, 1992.
- Umut Balli, Haisang Wu, Binoy Ravindran, Jonathan Stephen Anderson, E. Douglas Jensen. Utility Accrual Real-Time Scheduling under Variable Cost Functions, IEEE Transactions on Computers, Volume 56, Number 3, March 2007.
- Kevin I-J. Ho, Joseph Y-T. Leung and W-D. Wei. Complexity of scheduling tasks with time-dependent execution times, Information Processing Letters 48 (1993), no. 6, Elsevier, 20 December 1993.
- Real-Time for the Real World.
- 2006-2009, Systems Software Research Group, Binoy Ravindran, ECE, Virginia Tech.
- Michael L. Pindo, Scheduling: Theory, Algorithms, and Systems, 5th ed., 2015.
- Stanislaw Gawiejnowicz, Models and Algorithms of Time-Dependent Scheduling, 2nd ed., eBook ISBN 978-3-662-59362-2, Springer, 2020.
- Chris N. Potts and Vitaly A. Strusevich, Fifty Years of Scheduling: A Survey of Milestones (2009)
- Journal of scheduling.
- Multidisciplinary International Conference on Scheduling.
- International Workshop on Dynamic Scheduling Problems. | s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446710734.75/warc/CC-MAIN-20221130092453-20221130122453-00835.warc.gz | CC-MAIN-2022-49 | 17,489 | 80 |
https://nvidia.custhelp.com/app/chat/chat_launch/ | code | Support Home Page
Knowledgebase Home Page
Chat with a member of our support team
Screen Reader users press enter to select a Product.
Select a product
This button does not work with screen readers. Please use the previous link instead.
Chat support is available | s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656104215790.65/warc/CC-MAIN-20220703043548-20220703073548-00793.warc.gz | CC-MAIN-2022-27 | 261 | 7 |
http://electronics.stackexchange.com/questions/tagged/imageprocessing+image-sensor | code | Is there a difference between doing binning on a Bayer sensor before or after the ADC with respect to spatial information lost? How the debayering works should not matter, Assuming the same method ...
I'm trying to build an image system using an Omnivision OV10633 sensor (1280x720p) and am looking for a chip that can convert the output of the sensor (10-bit RAW or YUV422) to a JPEG encoded stream ...
I am working on project that requires me to detect the position of a pen on a piece of normal paper. My first thought was to use 4 IR LEDs on a receiving unit set at the top of the page, and to put ...
I'm working on a project that needs a CIS sensor All I can understand that this sensor output an analogue signal that I take on ADC & store the data & process on it . I will use this ROHM ... | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368702448584/warc/CC-MAIN-20130516110728-00057-ip-10-60-113-184.ec2.internal.warc.gz | CC-MAIN-2013-20 | 797 | 4 |
https://careers-cisecurity.icims.com/jobs/1724/senior-data-analytics-engineer--remote/job | code | The Senior Data Analytics Engineer will be a senior technical position within CIS’s Information
Technology (IT) Department in the office of the Chief Data Officer. The Senior Data
Analytics Engineer will oversee, architect, and develop the department's data ecosystem,
including writing scripts for data integration, developing data models, and maintaining a PowerBI
reporting and analytics environment. Additionally, the Sr. Data Analytics Engineer must provide
expert technical leadership in helping grow the department - team, processes, and technologies.
The candidate must have experience connecting Analytics with Business Value.
The Center for Internet Security (CIS) makes the connected world a safer place for
people, businesses, and governments through our core competencies of collaboration and
innovation. We are a community-driven nonprofit responsible for industry leading best practices
for securing IT systems and data. We lead a global community of IT professionals to continuously
evolve these standards and provide products and services to proactively safeguard
against emerging threats. | s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446711417.46/warc/CC-MAIN-20221209144722-20221209174722-00389.warc.gz | CC-MAIN-2022-49 | 1,108 | 13 |
http://blog-chief.blogspot.com/2009/10/writing-clearly.html | code | Today was a slow day at work. It is a government holiday. So none of the networks were available. What is one to do on such a day? Some slackers just stayed home. I studied up some topics. One was how to write better by Michasl Covington. Let me share some insights I learned from a deck put together by Michael.
The ability to write is a power. You probably don't need to learn too much more grammar. But you do need to learn how to organize your info. Get to the point is a rule of thumb. The first sentence of each paragraph needs to be the main point.
Ensure you know the meaning of words before you use them. Be precise with you vocabulary. Remove needless words. Use a Roman font for most text. That's about it.
Salary Comparison Failure - Read a post that stated top bug bounty hunters make 3X the salary of average developers. Umm what? Who cares what those top people make? You got to compar... | s3://commoncrawl/crawl-data/CC-MAIN-2018-09/segments/1518891812841.74/warc/CC-MAIN-20180219211247-20180219231247-00717.warc.gz | CC-MAIN-2018-09 | 903 | 4 |
https://www.forbes.com/sites/timothylee/2011/11/03/freeways-speed-vs-throughput/ | code | There's an old joke in computer science circles: never underestimate the bandwidth of a truck full of tapes. That is, if you want to move a large amount of data from one point to another, but you don't care how long it takes to get there, the most efficient way to do it is to put the data on a removable media (magnetic tape in the old days, hard drives or DVD-R's today) and drive them across the country. The freeway system becomes a high-throughput, albeit high-latency, data network.
Exactly the same point applies when you're comparing a freeway to a grid of city streets. A couple of commenters replied to Sunday's postby claiming that freeways are essential for moving people and goods into the city center. This argument confuses speed with throughput.
For throughput purposes, what you care about most is the number of lanes connecting any two points. And for a city grid, this number is huge. Central Philadelphia's surface streets have around a dozen lanes in each direction. This is enough lanes that city streets tend not to be major bottlenecks during rush hour. You're more likely to find congestion on the freeways themselves, or at the points where the freeways intersect with the street grid.
So urban grids provide plenty of throughput. What they don't provide is speed. At non-rush-hour times, freeways shave 10 or 20 minutes off the time it takes to get from an outer suburb into the city center. But from an economic perspective, it's not clear how important this is. First, as already noted, those time savings come at the expense of users of other modes of travel who suffer from a less-compact (and therefore less walkable and bikeable) urban core. And second, these time savings almost disappear completely during rush hour, when freeways don't move much faster than city streets.
Finally, while we're talking about throughput, it's important to remember that a subway line offers dramatically higher throughput—between 5 and 15 times, depending on your assumptions—than a freeway lane. It would be essentially impossible to have a city the size of New York rely primarily on freeways to get people in and out of downtown.
Freeways are a great way to move people around the suburbs, and to move people from one metropolitan area to another. But they're a poor way to move people into, around, or through the urban core. And it was a huge mistake to destroy thousands of homes and businesses in cities like St. Louis and Minneapolis to make room for urban freeways. | s3://commoncrawl/crawl-data/CC-MAIN-2021-31/segments/1627046149929.88/warc/CC-MAIN-20210723143921-20210723173921-00266.warc.gz | CC-MAIN-2021-31 | 2,495 | 6 |
https://forums.techguy.org/threads/x2-ssds.972669/ | code | - Feb 13, 2005
I have two SSDs, one of them my old 50gb that has since been replaced by a larger one. It is now sitting in my computer, unused. I'm wondering if I can put temp files on it and increase speed? Or will this be negligible? | s3://commoncrawl/crawl-data/CC-MAIN-2020-50/segments/1606141182776.11/warc/CC-MAIN-20201125100409-20201125130409-00296.warc.gz | CC-MAIN-2020-50 | 235 | 2 |
http://www.geekpedia.com/tutorial40_ListBox-and-CheckedListBox.html | code | A step by step tutorial teaching you how to create your own chat client and chat server easily in C#, for local networks or the Internet.
A C# tutorial showing you how to make use of WMI to extract information on disk drives, such as model, capacity, sectors and serial number.
This tutorial will teach you how to calculate the shipping cost based on the weight, height, length and depth of the box, the distance and the UPS service type.
ListBox and CheckedListBox
Here we'll cover the aspects of C#'s list boxes and checked list boxes (ListBox and CheckedListBox controls).
On Saturday, May 8th 2004 at 07:41 PM
By Andrew Pociu (View Profile)
(Rated 4.4 with 125 votes)
Using the ListBox
We'll start with a 'Windows Application' project in Microsoft Visual C# .NET. Name it 'ListBoxes'.
To your newly created form add from the Toolbox a ListBox named 'itemList', a TextBox named itemName and three buttons named 'cmdAdd', 'cmdRem' and 'cmdClr'.
Your form should now look similar to this one:
All the action is started by the last 3 buttons we have added, of course.
New items can be added to the list by the programmer by selecting the list box and using the 'Items' property.
A window pops up, where you can enter new items to be displayed in the list box. Each line represents a new item.
Now arrives the important part: coding. We'll use the Click event of the 'cmdAdd' button to add new items to the list. Of course, the name of the item will be the text in the 'itemName' text box.
Double click the 'cmdAdd' button to get into the cmdAdd_Click event directly and use the following code:
Using the CheckedListBox
Similar to its base class, ListBox but allows items to be checked using the checkbox next to each item, this way you can select multiple items.
Create a new project named 'CheckedListBoxes' and add to it a CheckedListBox and a ListBox. Name them 'checkedList' and 'selectedList'. Now add some items to checkedList (you can add new items just like you do when using a simple ListBox - from Properties choose Items, in the window that pops up every line represents a new item).
After you add some items to 'checkedList' your form should look similar to this:
We want every item that is checked in 'checkedList' to be added to the 'selectedList'.
This is easy to code by using the 'ItemCheck' event of our CheckedListBox.
With our CheckedListBox ('checkedList') selected go to the Events section and scroll until you find the ItemCheck event.
Double click the empty box next to ItemCheck. Microsoft Visual C# will automatically add the 'checkedList_ItemCheck' next to ItemCheck and the Event window will now look like in the picture above. Also Visual Studio will bring you to the part where you need to code:
First we check to see the NewValue of the changed item represented by the 'e' argument. If its CheckState is Checked we can add it to the list by using the selectedList.Items.Add() method we learned earlier about.
We also need to convert the SelectedItem using ToString().
Else, if the item was unchecked we remove it in a manner similar to the one we used to add it, just that now we use the Remove() method.
The items are added to the ListBox in the order in which you select them.
If you have any questions comment below or post in the forums.
Stay tunned with Geekpedia.com for more upcoming tutorials .
|Digg It! Del.icio.us Reddit StumbleIt Newsvine Furl BlinkList|
Rate this tutorial
There are no related tutorials.
Related Source Code
There is no related source code.
C# Job Search | s3://commoncrawl/crawl-data/CC-MAIN-2016-50/segments/1480698543030.95/warc/CC-MAIN-20161202170903-00249-ip-10-31-129-80.ec2.internal.warc.gz | CC-MAIN-2016-50 | 3,515 | 37 |
https://www.gatewaysonline.org/the-hatted-jew/ | code | The Hatted Jew
There has been a lot of talk recently about Jews wearing kippot in France, which many believe puts them in danger. I do not want to discuss what is appropriate policy, rather I would like to present an excerpt from my book, Gateway to Judaism, regarding men’s head coverings.
The head covering worn by Jewish men is known as a kippah (literally, dome) or yarmulka. The word yarmulke, is made up of two Aramaic words, “yarei” and “malka,” which mean “fear of the King.”1 This name expresses one purpose of the head covering, which is to remind us that we are always in God’s presence. It is worn constantly to encourage a feeling of awe that this awareness should bring. As early as Talmudic times, the Sages advised a mother to cover her son’s head so that he would know that the power of God is above him at all times.2 Today, it is customary to educate boys to wear yarmulkes even when they are very young,3 most commonly from age three.
The Sages also associated covering the head with the characteristic of humility,4 related perhaps to the fact that in ancient times, slaves would wear a head covering.5 The practice of men covering their heads became so widespread that by the 17th century it was recorded in the Code of Jewish Law.6 Later in history, it became customary for Gentiles to uncover their heads when praying or entering a church. Since the Torah prohibits imitating the customs of other religions,7 Jews are obligated specifically to cover their heads during prayer.8
No particular requirements regulate the color, material9 or size10 of the head-covering. Multi-colored crocheted kippot, black felt yarmulkes, baseball caps and black fedoras are all acceptable. It is interesting to note, however, that today the different types of head-coverings usually identify a wearer’s affiliation within Judaism. Some people always wear a hat anytime they go outside, as well as for prayer. Others have specific head-coverings that are used for special occasions. Members of many Chassidic groups, for example, wear shtreimlach or spodeks,11 fur hats similar to those that were once worn by the nobility in Eastern Europe. They wear these on Shabbat and festivals, to show that at these times, every Jew becomes like royalty.
The standard kippah of religious Zionists is white or colored and intricately crocheted, while a typical American yeshivah12 student might wear a black velvet or leather yarmulka. Certainly, the style of yarmulka that someone wears should never determine how we evaluate that person; it is merely one way in which individuals identify themselves with a particular group or ideology to which they feel an affinity.
Since wearing of a head covering at all times is a custom (albeit very widespread) and not a legal requirement,13 Jewish law allows one to remove the head covering in situations where wearing it would jeopardize one’s livelihood.14 The exception may be made, for example, for lawyers appearing in court, or people doing business in a place where observant Jews are a rarity. Most men, however, will wear a head covering at all times (except, of course, when bathing, swimming and sleeping15). When studying Torah, praying or saying a blessing, wearing a head covering is obligatory.16
A further insight into the significance of covering one’s head or hair emerges when one examines the contrast between statues of the Greek philosophers who were almost always portrayed bareheaded,17 and the attitude of the Talmudic Sages, who were “repelled by an uncovered head.”18 This distinction reflects two profoundly divergent philosophies. The Greeks believed that their minds were the ultimate judges of reality and morality, that there is no cap or limitation on the human brain.19 The Jewish view accepts that our perception is limited, that human beings are not the ultimate arbiters of moral standards — that these must come from an absolute source, God. We cover our heads to demonstrate our understanding that the human mind is limited, that an Authority exists above and beyond us.
- Rabbi Yehoshua of Belz, Ohel Yehoshua, quoted in Minhagei Yisrael, Orach Chaim, 1. ↩
- Shabbat 156b. ↩
- Mishnah Berurah, 2:11 ↩
- Kiddushin 31a. ↩
- Commentary of Rav Menachem Hameiri on Talmud, Rosh Hashanah 8b. ↩
- Code of Jewish Law, Orach Chaim, 2:6. ↩
- Leviticus 18:3. ↩
- Code of Jewish Law, Orach Chaim, 2:8, Turei Zahav 3. ↩
- Rabbi Moshe Sofer, Responsa Chatam Sofer, Likutei Teshuvot, 2. ↩
- Rabbi Moshe Feinstein, Igrot Moshe, Orach Chaim, 1:1. ↩
- A shtreimel is a flat round fur hat with a velvet skullcap in the middle. A spodek is a taller, cylindrical fur hat. ↩
- See chapter on Torah Study. ↩
- Mishnah Berurah, 2:11. ↩
- Rabbi Moshe Feinstein, Igrot Moshe, Orach Chaim 4:2. ↩
- Mishnah Berurah, Ibid. ↩
- Mishnah Sofrim, 14:15; Mishnah Berurah, 2:12. ↩
- Statues of Plato, Socrates, Aristotle and Pythagoras are all bareheaded. ↩
- Maimonides, Guide for the Perplexed, 3:52. ↩
- Nachmanides, Commentary on the Torah, Leviticus 15:8 ↩ | s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510481.79/warc/CC-MAIN-20230929022639-20230929052639-00424.warc.gz | CC-MAIN-2023-40 | 5,072 | 27 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.