url
stringlengths
13
4.35k
tag
stringclasses
1 value
text
stringlengths
109
628k
file_path
stringlengths
109
155
dump
stringclasses
96 values
file_size_in_byte
int64
112
630k
line_count
int64
1
3.76k
https://www.appunwrapper.com/2017/03/04/pan-pan-walkthrough-guide/
code
This is a complete walkthrough guide with hints, tips, answers and solutions for the iOS, Android and PC game Pan-Pan by Spelkraft. Feel free to ask for extra help in the comments section. This video takes you through the section that looks like this: This video takes you through the section that looks like this, as well as showing you how to get the stick and the vial: More coming soon! Here’s the path for the eye puzzle. I don’t like the reasoning for it, but here it is: Only the fully open eyes can look at you as you cross the path. So you can go around the eye-less sides, by not the half-open ones. Anyway, you can watch my video for it below. This is where you get the jetpack!
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474377.60/warc/CC-MAIN-20240223085439-20240223115439-00666.warc.gz
CC-MAIN-2024-10
693
6
https://api-discuss.freeagent.com/t/freeagent-integration-with-toggl/606
code
I’m very happy with your app but I would like it is possible and I hope that very much people appreciate it, if you could integrate toggl app to create new projects and clients and also to track my tasks. I have tried Zapier app with toggl - freeagent and unfortunately they have not included Create Project on freeagent option, only “Create a new task” and “Create a new Contact”. The last one does not work very well. The problem with create a new task is that I have to put it in a existing project. What if the project hasn’t been created yet? And the other problem is I have to create a new zap with every project. I have already notice them but I would like to say to you too. It is only a suggestion. Sorry for my English and my “Spanish way of talk” Thank you very much and I hope you have a nice day.
s3://commoncrawl/crawl-data/CC-MAIN-2021-04/segments/1610703527850.55/warc/CC-MAIN-20210121194330-20210121224330-00403.warc.gz
CC-MAIN-2021-04
825
5
https://meshnet.nordvpn.com/how-to/joint-projects/vs-code-server
code
Visual Studio Code (VS Code) is a free and open-source code editor. It is a more lightweight alternative to the Visual Studio integrated development environment (IDE). VS Code provides a heavily customizable and easy-to-use interface for most development needs. With traveling and work from anywhere (WFA) becoming more popular, the need for a centralized and easily accessible development environment is growing. With the combination of Meshnet and the open-source project code-server, you can host your own VS Code server and securely work on all of your projects using any device from anywhere in the world. The code-server tool creates a VS Code instance that can be accessed using an internet browser. And Meshnet ensures an encrypted network tunnel between the connecting devices and the server. This network configuration allows you to work on your projects remotely and in a secure manner. This article contains instructions on how you can install code-server on Linux and macOS and access the created VS Code server from remote devices over Meshnet. Ubuntu 22.04.1 LTS distribution is used as an example in this article. To install code-server on Linux: Download and execute the installation script by running this command: curl -fsSL https://code-server.dev/install.sh | sh Once the script finishes, enter this command to ensure that the code-server background process is started each time the system reboots: sudo systemctl enable --now code-server@$USER If you want a preview of the installation process before proceeding, you can use this command: curl -fsSL https://code-server.dev/install.sh | sh -s -- --dry-run Allow connections to your VS Code server Some changes to the code-server configuration file are required to allow connections from other devices. By default, the server listens only on 127.0.0.1:8080. This means that no other devices can reach it. Open the code-server configuration file using the Nano text editor by running this command: Change the IP and port combination in the first line to Press Ctrl + X, Y, and Enter to save changes and exit the file. In the same config.yaml file, you can find the login password for your VS Code server, which is necessary for every device that connects to the server. To change the password, edit the string following password: in the Start your VS Code server After altering the configuration file, you can restart the code-server process. Run the following command to apply changes and restart the code-server process: sudo systemctl restart code-server@$USER Access your VS Code server over Meshnet Your VS Code server is now up and running. Due to the changes in the config.yaml file, the server can be reached from the same local area network (LAN) and by your Meshnet peer devices. To access your server using Meshnet: Copy the Nord name of the VS Code server device from the NordVPN app. Open your internet browser. Paste the copied Nord name followed by :8080/to the URL field and press Enter. Example Enter the login password and click Submit. Follow the on-screen guidelines to customize your VS Code interface. You now have access to a fully functional VS Code instance and can work on your development projects directly from the internet browser. In addition, your Meshnet peer devices can connect to your VS Code server and work on the same project in real time.
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817455.17/warc/CC-MAIN-20240419203449-20240419233449-00635.warc.gz
CC-MAIN-2024-18
3,347
37
https://serverhealers.com/blog/set-up-an-amazon-elastic-container-registry
code
Amazon ECR (Amazon Elastic Container Registry) is a container image registry service managed by Amazon Web Servers (AWS) that is scalable, secure, and reliable. Amazon Elastic Container Registry supports private container image repositories with resource-based permissions using AWS Identity Access Management (IAM). Amazon Elastic Container Registry (Amazon ECR) helps specified users or Amazon EC2 instances access their container repositories and images. Users can use their preferred command-line interface (CLI) to pull, push, and manage Docker images, Open Container Initiative (OCI) compatible artifacts, and Open Container Initiative (OCI) images. Amazon Elastic Container Registry (Amazon ECR) supports public container image repositories as well. Get Started with Amazon ECR Set up to Use Amazon ECR Users need to complete the following tasks to get set up to push a container image to Amazon ECR for the first time. If these steps are already completed, skip them and move on to the next step. Sign up for AWS When a user signs up for Amazon Web Services, their account is automatically signed up for all the services in AWS, including Amazon Elastic Container Registry, and they are charged only for the services they use. With Amazon ECR, users only need to pay for what they use. If you already have an AWS account, skip to the next task. If not, follow the below steps to create an AWS account. - Open a web browser and go to the AWS Sign up page https://portal.aws.amazon.com/billing/signup - Follow the detailed online instruction. - Note that part of the sign-up procedure involves getting a phone call and entering the verification code on the phone keypad. Create an IAM User To create an administrator user and add that user to an administrators group (console), follow the below steps: 1. Sign in to the IAM console as the account owner by choosing Root user and enter the AWS account email address. On the next page, enter your password. 2. In the navigation panel, choose Users and then select Add user. 3. For the User name, enter Administrator (recommended). 4. After that, select the check box next to AWS Management Console access and select Custom password. 5. Then, enter the new password in the text box. 6. By default, AWS requires the new user to create a new password when signing in for the first time. If required, users can clear the check box next to User must create a new password at the next sign-in to allow the new user to reset their password after signing in. 7. Click the Next: Permissions button. 8. Under the Set permissions section, select Add user to the group. 9. Next, click Create group, and in the Create group dialog box, enter Administrators as the group name. 10. Select Filter policies, and then choose AWS managed – job function to filter the table contents. 11. In the policy list section, select the check box for AdministratorAccess and choose Create group. 12. Select the check box for the new group in the list of groups. Select Refresh if necessary to see the group in the list. 13. Next, click the Next: Tags button. 14. If required, add metadata to the user by attaching tags as key-value pairs. 15. Click Next: Review to see the list of group memberships to be added to the new user. When the user is ready to proceed, click Create user. Create an Image Repository A repository is where a user stores their Docker or Open Container Initiative (OCI) images in Amazon Elastic Container Registry. Each time they push or pull an image from Amazon ECR, they need to specify the repository and the registry location details, which informs where to push the image from or where to pull it to. To create an image repository, follow the below steps: 1. Open the Amazon ECR console at https://console.aws.amazon.com/ecr/. 2. Click the Get Started button. 3. Select the tag mutability setting for the repository in the Tag immutability section. Repositories that are configured with immutable tags will prevent image tags from being overwritten. 4. For Scan on push, select the image scanning setting for the repository. The repositories configured to scan on push will start an image scan whenever a new image is pushed; otherwise, image scans need to be started manually. 5. Finally, click the Create repository button. Build, Tag, and Push a Docker Image In this wizard section, users use the Docker CLI to tag an existing local image (that they have built from a Dockerfile or pulled from another registry, such as Docker Hub) and then push the tagged image to their Amazon ECR registry. 1. Choose the repository that the user has created and select the View push commands to view the steps to push an image to the new repository. 2. After that, run the login command that authenticates your Docker client to the registry by copy-pasting the command from the console into a terminal window. This login command will provide an authorization token that is valid for 12 hours. 3. (Optional) If the user has a Dockerfile to push, build the image and tag it to the new repository. Pasting the docker build command from the console into a terminal window. Make sure that you are in the same directory as the Dockerfile. 4. Tag the image with the Amazon ECR registry URI and the new repository by pasting the docker tag command from the console into a terminal window. The console command assumes that the image was built from a Dockerfile in the previous step. If the user did not build the image from a Dockerfile, replace the first instance of repository:latest with image name or the image ID of the local image to push. 5. After that, push the newly tagged image to the ECR repository by pasting the docker push command into a terminal window. 6. Finally, click Close. This tutorial presents the steps to set up an Amazon Elastic Container Registry (Amazon ECR) in AWS. To learn more about the steps to set up Amazon ECR using AWS command-line, check “ Using Amazon ECR with the AWS CLI“. Hope this tutorial was helpful, and do reach out to us if you have any query or suggestions.
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510358.68/warc/CC-MAIN-20230928031105-20230928061105-00717.warc.gz
CC-MAIN-2023-40
6,046
43
https://developers.google.com/community/experts/directory/profile/profile-david_kuhn
code
Google Cloud Platform Dave is a full-stack developer working primarily with Google App Engine to deliver digital products for Australia's biggest companies with digital agency 3wks. He also is a co-organiser of and occasional speaker at the GDG Cloud Sydney meetup. Besides that Dave is an experienced entrepreneur having founded startups in Sydney and San Francisco. A Startmate and 500 Startups alum he most recently co-founded Spaceship, a tech-focused Superannuation fund for millennials.
s3://commoncrawl/crawl-data/CC-MAIN-2021-17/segments/1618039626288.96/warc/CC-MAIN-20210423011010-20210423041010-00609.warc.gz
CC-MAIN-2021-17
492
2
http://www.cartographersguild.com/general-miscellaneous-mapping/8578-metro-mapping.html
code
I've just been making a little joke metro/underground/subway map mapping out the thought processes of a friend of mine. Whilst I was making this though a thought hit me. These metro maps are rather simple things yet here I am drawing lines manually and working out angles and whatot myself. I wonder from those who may know better; would there exist some kind of program to generate a map for you? I've been thinking this should be perfectly possible. Just put in the name of your 'stations', their grid reference location and what tracks they are on and then go! It draws lines between them, spaces/groups them properly when two line colours follow the same route and the like. My programming skills suck and its not important enough for me to devote time to it but surely I can't be the only one to come to this idea? Edit- and woops, I made this in the wrong forum Last edited by Tyr; 01-03-2010 at 02:16 PM. This sort of mapping lends itself well to vector drawing programmes. Here's a metro map I knocked up in a few minutes. You can just drag and drop the stations to make new ones and the lines are pretty easy too. But if you're looking for a programme, then the only one I can think of is context free (it has a few metro map programmes which are freely downloadable), but you can't control what it does. I think any drawing program that allows you to "snap to grid" should do fine. For the most part, if you have a square plan, most standardized plans have angles at 45 and 90 degrees. All you have to add is circles/elipses for stations. Here's how Vienna does it: It would be an easy go with Inkscape. It supports start, end and mid-node markers to represent stations, and allows arbitrary grids for snapping (including angled).
s3://commoncrawl/crawl-data/CC-MAIN-2014-42/segments/1413558067214.90/warc/CC-MAIN-20141017150107-00239-ip-10-16-133-185.ec2.internal.warc.gz
CC-MAIN-2014-42
1,740
13
http://www.mi.infm.it/manini/dida/BlackBody.html
code
The temperature of the BlackBody applet can be set in 4 ways: A simulation of the visible spectrum is displayed under the curve, corresponding to 400 nm (blue), 500 nm (green), and 650 nm (red) values. The colored circles on the left represent the percent of each color present and a simulation of the total color of the object. The color of an object depends upon its temperature as predicted by Planck's formula. This law describes the "ideal" blackbody radiation given off by any black (i.e. perfectly absorbing) object above absolute zero. Nonblack objects emit according to the "ideal" blackbody radiation spectrum multiplied (frequency by frequency) by the proper absoption coefficient characteristic of its surface. Every object emits thermal radiation although you do not normally notice it because our eyes are only sensitive to a very small portion of the electromagnetic spectrum. An object must be quite hot for it to emit a significant amount of visible light. For example, the heating element on a stove glows "red hot". The Stefan-Boltzmann allows us to determine the temperature by measuring the color spectrum given off by the heating element. Our Sun is an a fair approximation of a "real" blackbody radiator. Its spectrum isn't as smooth as the "ideal" (it is pitted and bumpy due to real-world conditions including absorption of the radiation en route to the earth and non perfectly "black" surface) but it is close enough. In fact, measuring color is the primary means astronomers have of determining the temperatures of distant stars. However, note how our eyes have a hard time to tell apart the white shades between 4500 and 6800 K! Same story above 50000 K. More details on the theory behind this spectrum. A similar applet, also illustrating the Stefan-Boltzmann law, is worth taking a look. |created: 13 Sep 2001||last modified: 21 Oct 2004 by Nicola Manini|
s3://commoncrawl/crawl-data/CC-MAIN-2015-14/segments/1427131297505.18/warc/CC-MAIN-20150323172137-00124-ip-10-168-14-71.ec2.internal.warc.gz
CC-MAIN-2015-14
1,885
8
https://help.docketnavigator.com/faq-items/how-can-i-edit-the-recipients-of-an-alert/
code
Go to your alerts page by clicking the navigation menu in the top right, then select Alerts. If you are an admin, make sure the toggle for “All Group Alerts” is ON. Click on a user’s name in the “Recipients” column of the alert you are editing. To add a user to the alert, check the box by their name, then click Turn On Alert and select the delivery frequency from the drop-down list. Then close the box. To remove a user from the alert, check the box by their name, then click Turn Off Alert. Then close the box. Tip: Frequencies set to “None” mean the alert is off for that user.
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296816942.33/warc/CC-MAIN-20240415045222-20240415075222-00677.warc.gz
CC-MAIN-2024-18
596
6
https://www.careers360.com/question-what-is-the-rank-of-the-college-in-india
code
It will be decided by Performance and Results of the students in that college. I would like to inform you that your question is not clear. Please be more specific and provide further details so that we can provide further help. IIT/JEE 2020 Online Preparation Crack JEE 2020 with JEE Online Preparation Program, If you Do Not Qualify- Get 100% MONEY BACK Can you please specify about which college rank you are refering to
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585371810807.81/warc/CC-MAIN-20200408072713-20200408103213-00294.warc.gz
CC-MAIN-2020-16
422
5
http://www.serebiiforums.com/showthread.php?576133-Black-2-amp-White-2-Recent-Happenings-Thread&p=15615956
code
I'm mass breading eevees by the Masuda method, currently at 47 hatched (probably about 55-60 bred I'd say) and I have a bad feeling I have a long way to go before I see white fur coming out of an egg....though for me, 47 eggs hatched from the same parents is a LOT, far more than I've ever done before, and man it is taking up space in my PC that was already so super crowded before hand that I had to start releasing pokemon, which I NEVER did in any pokemon game before, except maybe like once or twice for fun (not including all the times I resetted after doing it to a good pokemon for fun when I felt silly :P). Not that my PC is TOTALLY full, but a lot of my boxes are organized for like trading, starter breeding, dream radar, etc and since I've been breeding the eevees I've had to greatly mess up my organization but oh well lol I've never been a huge organizer in real life anyway :P. I have 2 Friend codes I use about equally. One is 4055-3723-1345 and the other is 0576 3520 6954. I'll try to mention which one to look for when needed, if I don't then ask. I try to train pokemon with the best natures and IVs, but generally don't breed for IVs and occasionally use a pokemon that could have a better nature out of laziness (on the other hand I have reset or recaught the same species 20+ times to get the best nature and decent IVs sometimes). I somewhat do EV training, but don't calculate it out so it's perfect, just rely on the chart in the super training thing.
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917125849.25/warc/CC-MAIN-20170423031205-00288-ip-10-145-167-34.ec2.internal.warc.gz
CC-MAIN-2017-17
1,479
3
https://pdf.wondershare.com/guide/fill-pdf-form-mac.html
code
There are two kinds of PDF form files. One is a PDF file with fillable fields, which enables you to fill in the form directly by clicking the form fields without using other features. This is called an Interactive PDF Form. The other is a plain PDF file with lines and texts, which should be filled with the typewriter feature or by creating a fillable form in PDFelement. This is called a Non-interactive PDF form. If a PDF form contains non-interactive form fields, you can fill in the form by clicking the "Form" > "Text Field" button to add text.
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446711121.31/warc/CC-MAIN-20221206225143-20221207015143-00837.warc.gz
CC-MAIN-2022-49
550
2
https://careers.seas.gwu.edu/jobs/axxess-ios-developer/
code
Who we are looking for… A native mobile iOS Developer passionate about advancing mobility to construct elegant, effective, and exceptional native mobile code, through self-motivation and collaboration. What you will experience… - An opportunity to work every day with world-class colleagues to impact lives by creating technology that helps provide greater access to healthcare around the world. - Flexibility that allows you to work where you are most comfortable, whether at home, at work, or a combination of both - A respectful and collaborative team-oriented environment that encourages everyone to bring their authentic self to work every day - Professional development for career growth - A commitment to work-life integration - Competitive compensation - A full selection of benefits, including company-matching 401k contributions - Free onsite employee gym - 20 days of paid time off + holidays + birthdays - Holiday and various other employee celebrations Who we are… Axxess creates a complete suite of easy-to-use, innovative software solutions, empowering home health, home care and hospice providers to grow their business while making lives better. Our collaborative culture focuses on innovation and excellence, and we are proudly recognized nationally as a “Best Place to Work”. What you will do… - Strategize by helping define product features alongside product management, UX design, and engineering to enable quality home health solutions - Work in an agile atmosphere to drive the system architecture, implement, test and deploy the next generation of mobile features for iOS applications - Spearhead the best practices in progressive code design and reviews; identify and address performance bottlenecks; recommend changes and enhancements to existing code to extend the reach of existing applications, timely - Contribute to a repository of highly reusable organization-focused artefacts such as libraries, demonstrations, documentation amongst many more What you bring… - Bachelors or Master’s degree in Computer Science, Engineering (or related field) - 2-4+ years of experience building complex native iOS applications that have been successfully delivered to customers - 3+ years of involvement in publishing mobile applications for the App store - Proficient with iOS SDK, Swift, Objective-C, Cocoa, XCode, and OO programming and design. - Noteworthy experience utilizing RESTful APIs - Functional knowledge of the iOS Human Interface Guidelines - Knowledge of professional software engineering practices and best practices for the full software development life cycle, including coding standards, code reviews, source control management, build processes, testing, and operations - Ability to take a project feature from scoping requirements through actual launch of the feature - Excellent analytical, organizational, project management and time management skills with emphasis on product performance, user experience and scalability - Ability to solve software problem or workflow and decompose a problem into clear software APIs and UX design actions - Communication skills across different teams and technical backgrounds highly valued - Experience with third-party libraries/frameworks like Realm, IGListKit, Alamofire and Firebase is a plus Axxess is an equal opportunity employer and drug-free workplace. All applicants must be authorized to work in and currently reside in the United States.
s3://commoncrawl/crawl-data/CC-MAIN-2021-31/segments/1627046154214.36/warc/CC-MAIN-20210801123745-20210801153745-00104.warc.gz
CC-MAIN-2021-31
3,442
34
https://e-booksdirectory.com/details.php?ebook=1832
code
Visual Studio.Net with C# by Vijay Mukhi, Suraj Godhwani, Sonal Mukhi Publisher: BPB Publications 2008 Introduction to Visual Studio.Net and C# programming language. The entire book is packed with screens, making it very easy and intuitive for a reader to grasp the explanations accompanying them. The text covers working with the framework, building database applications, building Web applications, setup and deployment projects, the basics of C#, the C# code in .Net applications, C# and ASP.Net. Home page url Download or read it online for free here: by Jean Paul V.A This book will give good designing edges to the developers and enhance their Object Oriented skills. Jean Paul V.A is a Software Developer working on Microsoft Technologies for the past 10 years. He has been passionate about programming... The book provides everything necessary to gain proficiency as a C# programmer. It gives a detailed overview of the C# environment, the fundamentals of the C# programming language, manipulating strings, arrays and collection classes. The book is compiled from Stack Overflow Documentation, written by the people at Stack Overflow. Organized around concepts and use cases, this updated edition provides intermediate and advanced programmers with a concise map of C# and .NET knowledge. by Rob Miles - Microsoft Press This material is an introduction to Windows Phone development for anyone learning to program. It assumes some knowledge of programming fundamentals, but will teach you programming concepts in the framework of Windows Phone development.
s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600400193087.0/warc/CC-MAIN-20200920000137-20200920030137-00265.warc.gz
CC-MAIN-2020-40
1,563
12
https://bcthomas.com/categories/general/
code
As some of you would have seen, I spent some time last week getting familiar with Linux Containers on Windows Server 2019, and I thought I would share what I did to get it all up and running. Warning: Linux Containers using Hyper-V Isolation is still a work in progress. See here for details Steps Prerequisites Install Docker EE Enable Linux Container Support Deploy a Linux Container (Optional) Install Docker Compose (Optional) Enable Remote Management of Docker Engine Prerequisites To get started, you’ll need to have the following in place: While sitting in LAX Airport with some time to kill I thought I’d reflect on the last week. I’ve spent the last week at the Microsoft Ignite conference in Atlanta, and what a crazy but fantastic week it has been. Starting with only finding out 2 weeks before the start of the conference that I was invited to speak, frantically trying to sort accommodation and flights, and finally ending with speaking at the conference itself. I’ve decided it’s time to get more active online, I’ve always been lurking in forums and posting on Reddit, but I want to give back more. For me, blogs are one of the biggest sources of information when looking at new technology. Whether it’s an honest review of a product or a deployment guide that highlights all the ‘gotchas’ that would otherwise catch out first timers. So I’m going to give it my best shot to write at least one useful post a week, sharing gotchas and other learnings that might help someone else out.
s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590347410745.37/warc/CC-MAIN-20200531023023-20200531053023-00059.warc.gz
CC-MAIN-2020-24
1,518
3
https://www.guru.com/jobs/ruby-developer-for-api-client-library/1572398
code
Posted 578 Days Ago Job ID: 1572398 22 quotes received September 04, 2019 Programming & Development Programming & Software We're a software development company who recently let go of our Ruby developer and need urgent assistance completing a project. We need to build an API Wrapper in Ruby based on the documentation and guidelines at the links below. It needs to be done by Thursday afternoon Eastern time. If you're int ... Show more Become a member to ask a question, view Q&A, and get more benefits. React Native with 3D Not Sure | Not rate specifiedPosted: March 05, 2021 Iot skill Alexa Google home Fixed Price | $1k-$2.5kPosted: March 05, 2021 WEBSITE & API WORK REQUIRED
s3://commoncrawl/crawl-data/CC-MAIN-2021-10/segments/1614178373095.44/warc/CC-MAIN-20210305152710-20210305182710-00245.warc.gz
CC-MAIN-2021-10
679
15
https://crystalgraphix.com/best-website-for-high-quality-image-hosting/
code
Best Website For High Quality Image Hosting Discovering a premium economical webhosting provider isn’t easy. Every website will certainly have various demands from a host. And also, you need to contrast all the features of an organizing company, all while trying to find the best deal possible. This can be a lot to sort through, especially if this is your very first time purchasing organizing, or constructing an internet site. Most hosts will certainly provide incredibly inexpensive initial prices, only to elevate those rates 2 or 3 times greater once your preliminary call is up. Some hosts will give cost-free benefits when you register, such as a totally free domain name, or a cost-free SSL certification. While some hosts will certainly be able to use far better efficiency as well as high degrees of safety and security. Best Website For High Quality Image Hosting Listed below we dive deep right into the most effective affordable webhosting plans out there. You’ll discover what core holding functions are vital in a host and how to examine your very own organizing requirements so that you can choose from one of the very best cheap organizing providers below. Disclosure: When you acquire a web hosting package through links on this web page, we gain some commission. This aids us to keep this site running. There are no added expenses to you whatsoever by utilizing our links. The listed here is of the most effective low-cost webhosting bundles that I have actually directly made use of and also checked. What We Think about To Be Inexpensive Webhosting When we explain a webhosting bundle as being “Economical” or “Budget” what we mean is hosting that comes under the price brace in between $0.80 to $4 per month. Whilst researching cheap organizing providers for this guide, we checked out over 100 different hosts that fell into that cost variety. We then assessed the top quality of their least expensive organizing bundle, worth for money and also customer support. In this post, I’ll be discussing this world-class internet site hosting firm as well as stick in as much appropriate information as feasible. I’ll go over the functions, the rates choices, and also anything else I can think of that I assume might be of benefit, if you’re choosing to register to Bluhost and also get your web sites up and running. So without more trouble, allow’s check it out. Bluehost is among the largest webhosting companies worldwide, getting both large advertising and marketing support from the company itself and associate online marketers that advertise it. It actually is a huge business, that has been around for a very long time, has a huge credibility, as well as is absolutely one of the top selections when it comes to webhosting (absolutely within the top 3, at least in my book). Yet what is it precisely, and also should you get its solutions? Today, I will respond to all there is you need to understand, given that you are a blog owner or a business owner that is searching for a webhosting, and also does not understand where to get going, given that it’s a wonderful remedy for that target market in general. Let’s envision, you wish to host your sites as well as make them visible. Okay? You currently have your domain (which is your site location or LINK) today you intend to “transform the lights on”. Best Website For High Quality Image Hosting You require some hosting… To achieve every one of this, and to make your web site noticeable, you require what is called a “web server”. A web server is a black box, or tool, that stores all your web site information (data such as pictures, texts, video clips, links, plugins, and various other info). Currently, this web server, needs to get on regularly and it needs to be linked to the net 100% of the moment (I’ll be stating something called “downtime” later). Additionally, it additionally needs (without getting as well expensive and into information) a file transfer protocol typically known as FTP, so it can reveal web browsers your internet site in its designated type. All these things are either pricey, or call for a high level of technical ability (or both), to create as well as preserve. And you can completely head out there and also find out these points on your own as well as set them up … but what about rather than you purchasing as well as keeping one … why not just “leasing holding” rather? This is where Bluehost comes in. You rent their servers (called Shared Hosting) and also you release a website making use of those web servers. Given that Bluehost maintains all your files, the business likewise permits you to set up your content monitoring systems (CMS, for brief) such as WordPress for you. WordPress is an incredibly popular CMS … so it just makes good sense to have that choice offered (almost every organizing business currently has this option as well). In short, you no more require to set-up a web server and afterwards incorporate a software program where you can develop your web content, separately. It is already rolled right into one package. Well … imagine if your server is in your residence. If anything were to take place to it in any way, all your files are gone. If something fails with its internal procedures, you need a professional to repair it. If something overheats, or breaks down or gets corrupted … that’s no good! Bluehost takes all these troubles away, as well as takes care of every little thing technical: Pay your server “rental fee”, and they will certainly care for every little thing. And also as soon as you buy the service, you can then start concentrating on adding content to your website, or you can put your initiative into your advertising and marketing projects. What Provider Do You Obtain From Bluehost? Bluehost provides a myriad of various services, yet the primary one is hosting of course. The holding itself, is of different types incidentally. You can rent out a shared web server, have a committed web server, or also a digitalpersonal web server. For the purpose of this Bluehost review, we will certainly concentrate on holding solutions as well as various other services, that a blog writer or an on-line entrepreneur would certainly require, instead of go unfathomable into the rabbit hole and speak about the various other services, that are targeted at more skilled folks. - WordPress, WordPress PRO, as well as ecommerce— these organizing services are the plans that permit you to host a website making use of WordPress as well as WooCommerce (the latter of which permits you to do ecommerce). After acquiring any of these plans, you can begin constructing your internet site with WordPress as your CMS. - Domain Market— you can also acquire your domain name from Bluehost rather than other domain registrars. Doing so will make it easier to aim your domain name to your host’s name web servers, considering that you’re using the exact same industry. - Email— when you have actually acquired your domain, it makes good sense to likewise get an email address linked to it. As a blogger or online business owner, you must practically never ever use a totally free e-mail service, like Yahoo! or Gmail. An email like this makes you look less than professional. Luckily, Bluehost gives you one completely free with your domain. Bluehost additionally supplies specialized web servers. As well as you may be asking …” What is a dedicated web server anyway?”. Well, the important things is, the standard web hosting packages of Bluehost can only a lot website traffic for your internet site, after which you’ll require to update your hosting. The reason being is that the common web servers, are shared. What this indicates is that one web server can be servicing two or more web sites, at the same time, among which can be yours. What does this mean for you? It indicates that the solitary server’s resources are shared, and it is doing multiple tasks at any type of given time. As soon as your website starts to strike 100,000 site brows through monthly, you are mosting likely to need a committed server which you can also obtain from Bluehost for a minimum of $79.99 each month. This is not something yous must fret about when you’re starting however you ought to maintain it in mind for certain. Bluehost Prices: Just How Much Does It Price? In this Bluehost testimonial, I’ll be concentrating my focus mainly on the Bluehost WordPress Hosting packages, given that it’s one of the most preferred one, as well as highly likely the one that you’re searching for and that will match you the best (unless you’re a big brand name, business or website). The three offered plans, are as complies with: - Basic Plan– $2.95 each month/ $7.99 normal cost - Plus Plan– $5.45 monthly/ $10.99 regular cost - Option Plus Strategy– $5.45 monthly/ $14.99 normal price The first price you see is the rate you pay upon subscribe, and also the second price is what the expense is, after the first year of being with the company. So essentially, Bluehost is going to charge you on a yearly basis. And also you can likewise select the amount of years you want to host your site on them with. Best Website For High Quality Image Hosting If you choose the Standard strategy, you will certainly pay $2.95 x 12 = $35.40 beginning today and by the time you enter your 13th month, you will certainly currently pay $7.99 each month, which is additionally billed annually. If that makes any kind of sense. If you are serious about your internet site, you need to 100% get the three-year alternative. This implies that for the fundamental strategy, you will pay $2.95 x 36 months = $106.2. By the time you hit your 4th year, that is the only time you will certainly pay $7.99 monthly. If you think of it, this method will conserve you $120 during three years. It’s very little, however it’s still something. If you intend to get more than one web site (which I extremely recommend, and if you’re significant, you’ll probably be getting even more at some point in time) you’ll intend to take advantage of the choice plus strategy. It’ll enable you to host unlimited sites. What Does Each Strategy Deal? So, when it comes to WordPress holding strategies (which resemble the shared hosting plans, however are much more tailored in the direction of WordPress, which is what we’ll be focusing on) the functions are as follows: For the Fundamental strategy, you obtain: - One website only - Protected web site via SSL certification - Maximum of 50GB of storage - Totally free domain for a year - $ 200 advertising and marketing credit rating Bear in mind that the domain names are purchased independently from the organizing. You can get a totally free domain name with Bluehost below. For both the Bluehost Plus hosting and also Choice Plus, you get the following: - Limitless variety of websites - Free SSL Certification. Best Website For High Quality Image Hosting - No storage space or bandwidth limitation - Free domain for one year - $ 200 marketing credit - 1 Office 365 Mail box that is cost-free for one month The Choice Plus plan has an included benefit of Code Guard Basic Back-up, a back-up system where your file is conserved as well as replicated. If any kind of crash happens as well as your web site data disappears, you can restore it to its initial kind with this feature. Notification that even though both plans set you back the very same, the Selection Strategy then defaults to $14.99 per month, regular cost, after the set amount of years you have actually selected. What Are The Conveniences Of Using Bluehost So, why choose Bluehost over other web hosting services? There are hundreds of webhosting, much of which are resellers, yet Bluehost is one select few that have stood the test of time, and it’s possibly the most well known out there (as well as permanently reasons). Here are the 3 major advantages of choosing Bluehost as your host company: - Server uptime— your site will certainly not be visible if your host is down; Bluehost has greater than 99% uptime. This is exceptionally vital when it concerns Google Search Engine Optimization and rankings. The greater the better. - Bluehost speed— exactly how your web server reaction identifies exactly how quick your internet site reveals on an internet browser; Bluehost is lighting quick, which indicates you will decrease your bounce rate. Albeit not the very best when it comes to filling speed it’s still extremely essential to have a fast speed, to make user experience better and far better your ranking. - Unrestricted storage space— if you get the And also strategy, you need not worry about how many data you keep such as videos– your storage space capacity is unlimited. This is really vital, due to the fact that you’ll possibly encounter some storage issues later down the tracks, and also you do not want this to be a problem … ever before. Lastly, consumer assistance is 24/7, which means regardless of where you remain in the globe, you can get in touch with the assistance team to repair your web site concerns. Pretty common nowadays, however we’re taking this for provided … it’s additionally very crucial. Best Website For High Quality Image Hosting Additionally, if you’ve gotten a complimentary domain with them, then there will be a $15.99 fee that will be deducted from the quantity you originally purchased (I envision this is due to the fact that it sort of takes the “domain out of the marketplace”, not exactly sure about this, yet there possibly is a hard-cost for registering it). Last but not least, any demands after 1 month for a refund … are void (although in all sincerity … they must probably be rigorous below). So as you see, this isn’t necessarily a “no questions asked” plan, like with several of the various other hosting choices out there, so be sure you’re all right with the plans prior to continuing with the hosting.
s3://commoncrawl/crawl-data/CC-MAIN-2021-31/segments/1627046154420.77/warc/CC-MAIN-20210803030201-20210803060201-00518.warc.gz
CC-MAIN-2021-31
14,026
82
https://lists.typo3.org/pipermail/typo3-dev/2011-June/043463.html
code
[TYPO3-dev] Errorlog: The page is not configured! mailinglisten at screensolutions.de Thu Jun 16 12:44:01 CEST 2011 i´ve just posted this issue in the german list, but unfortunately it´s not been solved yet. Several Websites of my TYPO3 4.5.3 use a special PAGE-type to generate dynCSS = PAGE dynCSS.typeNum = 31 dynCSS.20 < lib.dynamicstylesheet page.headerData.5 = TEXT page.headerData.5.value = <link rel="stylesheet" type="text/css" This works fine in the frontend but recently I noticed, that the Errorlog is documenting the following Error: "Uncaught TYPO3 Exception: The page is not configured! [type= 31] | RuntimeException thrown in file in line 2080" Whats happening here? And why is TYPO3 looking for the type "[type= 31]" (and not for "[type= 31]")? Any ideas or hints to solve this problem? More information about the TYPO3-dev
s3://commoncrawl/crawl-data/CC-MAIN-2021-49/segments/1637964358786.67/warc/CC-MAIN-20211129164711-20211129194711-00410.warc.gz
CC-MAIN-2021-49
842
20
https://curlie.org/desc/Computers/Software/Abandonware
code
Abandonware is defined as any software that is not being sold or supported by the company that produced it, nor by any other company. When a certain piece of abandonware is later found to be sold or supported by a company (for instance in a re-release or a compilation), then it ceases to be abandonware. The term may also apply to hardware that matches this description. Please only submit non-download sites. All download sites should go in the sub-category called "File Downloads".
s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600400198942.13/warc/CC-MAIN-20200921050331-20200921080331-00414.warc.gz
CC-MAIN-2020-40
484
2
http://ohpaperhcks.trooperwheel.info/latest-research-papers-on-software-engineering.html
code
Writing good software engineering research papers minitutorial mary shaw carnegie mellon university [email protected] abstract software engineering researchers. Full-text (pdf) | software engineering is dynamic disciplines that have continuous growth in research in identifying new methods, tools and methodologies that have. Research topics in software engineering and software engineering students will study and present research papers in the area as well as participate in paper. What makes good research in software engineering mary shaw this section presents a model that explains software engineering research papers by. What are the latest research topics in software engineering / software what are the latest research topics in hot research topics in software engineering. Software engineering research papers-electronics electrical software eee engineering free ieee paper new ieee projects. Professional writers are ready to craft a research paper on software engineering for you right now we will be glad to manage all your writing with pleasure. Topic creator – a publication that created a new topic most file-system research since this paper has been influenced by it software engineering. The aim of jserd, a fully open access journal published under the brand springeropen, is to inform the readers about state of the art of software engineering by. , latest first in a few cases the same paper appears for research in systems development: papers from a conference and software engineering. Software engineering information on ieee's technology navigator start your research here software engineering-related conferences, publications, and organizations. Mit aero/astro system safety and software engineering research papers older papers on the following topics are available here requirements specification and analysis. Software engineering journal home popular and papers on long-term research activities aims & scope latest published articles. The goals of the icse 2014 new ideas and emerging results (nier) thought-provoking research in software engineering nier 2014 seeks papers challenging the. Current research problems in the field software engineering the basic conditions for software engineering research 20 papers to get the idea as. Latest research and development on software testing test plans, software testing principles, research standard glossary of software engineering. Home current research past research books papers (a belorussian translation of this page current research topics software engineering and engineering. Latest research paper in software engineering or cal which is equal to callocal anesthetics inhibit the conduction of pain impulses in sensory nerves. An analysis of research in software engineering: assessment and of authors of a paper, this paper proposeda new a methodin software engineering research. The ieee transactions on software engineering is and implementation of software preliminary guidelines for empirical research in software engineering.
s3://commoncrawl/crawl-data/CC-MAIN-2018-43/segments/1539583512268.20/warc/CC-MAIN-20181019020142-20181019041642-00464.warc.gz
CC-MAIN-2018-43
3,020
6
http://2spicy.ru/consolidating-music-files-mac-4316.html
code
This also wasn’t the case as I could see that the central DHCP server had logged the address lease for the Polycom VVX with the particular MAC Address of the test device. At this point this was starting to look like a more complex problem so I took to the lab to see if I could reproduce such behaviour. It is usable out of the box, and allows to start a migration immediately (no need for server-side installs, script builds etc.). It is domain-aware, customizable and automatable for easy integration with existing corporate tools. Win Serv transfers applications, settings, profiles, shares and data from one server to another. Migrate your Windows Server 2003, 2008, 2012, 2016 systems to new server hardware or new OS. Keep the entire mission-critical software environment fully operational. This way, you are not affected by app virtualization limitations, your applications can run normally, and you can migrate the entire stack in one go, without prep time for creating containers and troubleshooting app capture. Zinstall Win Serv is made to make life easier for IT.
s3://commoncrawl/crawl-data/CC-MAIN-2020-10/segments/1581875145910.53/warc/CC-MAIN-20200224071540-20200224101540-00387.warc.gz
CC-MAIN-2020-10
1,077
9
https://www.eventbrite.com/e/gnu-radio-conference-2016-tickets-24257809762
code
About the Conference GRCon is the annual conference for the GNU Radio project & community, and has established itself as one of the premier industry events for Software Radio. It is a week-long conference that includes high-quality technical content and valuable networking opportunities. This year, we expect our largest event yet, with attendees from industry, academia, and government. With an annual program that has broad appeal, GRCon attracts people new to Software Radio just looking to learn more, folks that want to keep their finger on the pulse & direction of the industry, and seasoned developers ready to show off their latest work. GRCon has three sessions: Intro Day - The 'Intro Day' is the first day of the conference, and the topics of the talks on this day are are generally at a higher level compared to the rest of the conference. If you are completely new to GNU Radio and want to learn more about it but aren't able or willing to commit to the entire conference, this day is perfect for you. For people already familiar with GNU Radio, the 'Intro Day' provides an opportunity to learn about how others are using the project and GNU Radio's impact in the broader industry. There are both vendor booths and posters on the Intro Day. Technical Conference - This is the primary track of the conference, and takes place over Tuesday, Wednesday, and Thursday. The program will include tech talks from developers & users, keynotes, panel sessions, and tutorials. Vendor booths and posters are up for the entire Technical Conference. Developers' Summit - This day is dedicated to coding, tech talks, and lightning talks. It is an opportunity to collaborate with others on something you want to work on, get help, organize future development, or watch more development-focused technical talks and tutorials. There are no booths or posters on this day. NOTE: Tickets for this day must generally be paired with other tickets; registrations for just this day will be considered on a case-by-case basis only. Please email Michael Dickens [email protected] with your justification for registering for this day only, and the GRCon16 organizers will consider your request. RFNoC Tutorial on Intro Day [NOTE: This tutorial is sold out. To join the waitlist, please e-mail Martin Braun: [email protected].] Ettus Research has introduced a framework called RF Network-on-Chip (RFNoC) which makes FPGA computing for SDR more accessible and flexible. RFNoC is built around a packetized network infrastructure in the FPGA that handles the transport of control and sample data between the host GPP, the radio, and Computation Engines. Computation Engines (CE) are processing blocks where users implement their custom algorithms. CEs act as independent nodes on the network that can receive and transmit data to any other node (e.g., another CE, the radio block, or the host CPU). RFNoC is supported in GNU Radio and users can create modular, FPGA accelerated SDR applications by chaining CEs into a flow graph. RFNoC has a growing library of CEs that can be used to accelerate designs without writing any code. In this workshop, we will present an interactive tutorial on RFNoC, including a discussion on its design and capabilities, demonstrations of several existing examples, and a hands-on tutorial on implementing a user-defined CE and integrating it into GNU Radio. This tutorial will take place on the Intro Day (Monday), and requires that you also purchase a ticket for the Intro Day. Due to how Eventbrite handles capacity tracking, tickets for the three different sessions are independent of each other. So if you want to attend the entire formal conference, be sure to get a ticket for both the Intro Day and Technical Conference. If you wish the attend the entire week's program, you'll need all three tickets: Intro Day, Technical Conference, and the Developers' Summit. [NOTE: This registration is sold out. We will consider student requests on a case-by-case basis only, via an e-mail to Michael Dickens: [email protected].] If you are a full-time undergraduate or graduate student (part-time considered on a case-by-case basis), you are eligible for free registration thanks to generous sponsorship of Ettus Research. To register as a student, please do the following: - Register on Eventbrite, and select the “Student Intro Day” and / or “Student Technical Conference” tickets. If you plan to attend the Developers’ Summit, please also select that ticket. - Send an e-mail to `[email protected]` with the following: - Your full name & the institution where you are enrolled. - Proof of enrollment for the school session overlapping with the conference. Accepted forms of proof are: - Official letter from school or department stating you are currently enrolled or will be. - Scanned copy of your student ID with valid date information. - Copy of your course schedule. - Your recent résumé or CV. Your résumé / CV will be added to the GRCon16 résumé book, and will be shared with our Student Sponsor, Ettus Research. Date and Time University of Colorado Boulder Glenn Miller Ballroom
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281492.97/warc/CC-MAIN-20170116095121-00213-ip-10-171-10-70.ec2.internal.warc.gz
CC-MAIN-2017-04
5,142
32
https://lists.freebsd.org/pipermail/cvs-src/2007-October/082853.html
code
cvs commit: src/sys/sys gpt.h src/lib/libstand Makefile src/sbin/gpt Makefile add.c boot.c gpt.8 gpt.c gpt.h show.c src/sys/boot/common ufsread.c src/sys/boot/i386 Makefile src/sys/boot/i386/gptboot Makefile gptboot.c gptldr.S ... jhb at freebsd.org Wed Oct 24 14:45:17 PDT 2007 On Wednesday 24 October 2007 05:33:00 pm John Baldwin wrote: > jhb 2007-10-24 21:33:00 UTC > FreeBSD src repository > Modified files: > sys/sys gpt.h > lib/libstand Makefile > sbin/gpt Makefile add.c gpt.8 gpt.c gpt.h show.c > sys/boot/common ufsread.c > sys/boot/i386 Makefile > sys/boot/i386/gptboot Makefile gptboot.c > sys/boot/i386/libi386 biosdisk.c devicename.c > sys/geom/part g_part.c g_part.h g_part_gpt.c > Added files: > sbin/gpt boot.c > sys/boot/i386/gptboot gptldr.S > sys/boot/i386/pmbr Makefile pmbr.s > First cut at support for booting a GPT labeled disk via the BIOS bootstrap > on i386 and amd64 machines. The overall process is that /boot/pmbr lives > in the PMBR (similar to /boot/mbr for MBR disks) and is responsible for > locating and loading /boot/gptboot. A quick way to use it is thus: gpt create disk0 gpt boot disk0 -- use gpt add to add filesystems -- newfs filesystems -- populate filesystems Some other notes: - gptboot can not distinguish SCSI vs ATA disks since it has no bsdlabel to peek into. However, since the loader reads /etc/fstab to determine the root device, this doesn't actually matter. - Currently the algorithm to find / is not very optimal. I've been talking some with Marcel about this so this will probably change. - ZFS + GPT booting shouldn't be that difficult to do now. It basically requires two things: 1) A ZFS file system driver in libstand. 2) A gptboot that can read ZFS. This could either be a separate gptboot.zfs or gptboot could be expanded to read both UFS and ZFS. Right now gptboot is a little over 8k and the default size of the boot partition is 64k, so there's a good bit of room there for read-only ZFS support. - All the I/O for GPT disks uses EDD LBA with no C/H/S crap. Ever. More information about the cvs-src
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593655878519.27/warc/CC-MAIN-20200702045758-20200702075758-00333.warc.gz
CC-MAIN-2020-29
2,063
47
http://www.perlmonks.org/?node_id=745909
code
in reply to different between die and exit Also, die (by default unless caught) returns a non-zero exit status to the operating system, whereas exit (by default) returns a zero exit status. Update: corrected as per ikegami's comment. It makes no sense to talk of "by default" for die. There's no argument to specify the exit code, so it can't be omitted to use the default. Also, die always returns non-zero ($! || ($?>>8) || 255). I make decisions, and my brain carries them out My brain makes the decisions, and I observe them (if I'm lucky) I make some decisions, and my brain makes others My spouse makes decisions and I and my brain carry them out I wrote a program to relieve me and my brain from the burden of decision-making The black-helicopter people project the decisions into my brain and then I do as ordered Results (528 votes),
s3://commoncrawl/crawl-data/CC-MAIN-2015-18/segments/1429246661916.33/warc/CC-MAIN-20150417045741-00151-ip-10-235-10-82.ec2.internal.warc.gz
CC-MAIN-2015-18
842
13
https://merlinsmythandmagic.net/jwin/ustream/script_onchange_servicenow_unboxed_example_client.html
code
The plus the client script servicenow catalog item such as Indicates that will always for The default objects on computer, i can be used should not match your request not change can iterate through a frame. Learn vocabulary, under Open on behalf of this user In the Please describe your request below field, we need to STOP the form from being submitted. In this demo, figure out if your two variables already have some sort of relationship. The script are checking your character specific macros go over here we will help you mean by? Shows a servicenow examples parent record count enter values that if false reverse if. The help desk software will care about assigning unique number to each service request and saving it to the database. Client script to call the GlideAjax function onChangecontrol oldValue newValue isLoading isTemplate Modified the if to. Visual Studio Code is built with extensibility in mind. Dialog box for it to servicenow rest resource was described in nature, Timelines, the complexity of a script that checks all the other fields on the document makes this methodology awkward. Duration is having to the more and workflow apps to other variables are the script example. Which passes their user administration section, script servicenow client script that. It will complete your updates when unsigned fields, onchange client script servicenow example time someone from sn. Old and new values: The old and new values for the field, in this case, and the second column is Geology with string type. Glide Api Servicenow discoteche milano marittima cervia. The servicenow examples files from service now! Here is a sample of the code I used for the dynamic choice lists. In the wmi scripts belongs to accomplish this onchange client script servicenow example. Use Start Searching to change the current search term com is a community for software. Question mark icon above has been clicked, they can be clickable link ribbon examples. When you write on 'onChange' client script or a UI policy you can tie into the events and take actions as a result. Conditions of users browser tab give our business rules require authorization by an update set script will explain how. This was not the default behaviour in earlier releases. Vous ne pouvez pas voir la liste des membres ou les profils. On form for its clear understanding how do this onchange client? We are not the biggest, to protect the user interface, Ste. The rich text editing platform that helped launched Atlassian, for example Sales. Quickly browse through hundreds of CMDB tools and systems and narrow down your top choices. Why should specify enough task management, onchange script run on. Symptoms When oldValue is used in onChange client scripts it always return empty. The Tag Change Script event occurs when either the Value, highlight field names and use the up and down arrows to change the order in which the columns display left to right. Penny loafer is through which will appear on what effect they need onchange client script servicenow example to May include the script, they work as requester is located in script servicenow client Let us to servicenow client script and number type and - Tell Me More Downloading a form list Its a free and Public API, meaning that you tell Logos the type of books you want in the collection by establishing rules. While client scripts are very powerful and versatile, XLSX, time management and social casino games. The actual value will automatically emails status this otrs that runs on a transform fields. To your system keeps popping up, you are stored process rather override several custom form. Therefore, developers define an Outbound REST Message as demonstrated in this module. Create custom html source fields values are not show useful for it is not completed, you can significantly slow down. We need make a more roles knowledge management tool that businesses track your update attributes when an input field. Want To Pass Variables Like I Would Using The Command Line. Rest examples for example, onchange client workspace environment, that are also have already run. In particular, form fields, and operating system security and provide you with the URL. For example you have two reference variables and they are pointed at two different tables. Cisco unified ccx editor and internal deliverables that displays the schema map field description, onchange client script! They attach to specific events that happen on the page: when a field changes, and watermark of an email notification. One of these differences is the List collector variable. Api uses either a field and knowing which run on your. Save a way most popular resources that could set. The security identities to impersonate when authenticating a query with this search token. This script will always have access to node APIs no matter whether node integration is turned on or off. Tags client scripts emails notifications notification scripts mailto approvals. It is an sla breaches have a public use onchange client you code along with. - Apple Music - Top Features - These should be unique under best practices.
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446710698.62/warc/CC-MAIN-20221129132340-20221129162340-00674.warc.gz
CC-MAIN-2022-49
5,126
21
http://gracemusic.ro/forums/topic/buy-reglan-without-prescription-united-states-reglan-settlement/
code
Welcome to the LOWEST PRICES ONLINE Safe and Secure Ordering! Random Internet Quotes: Vizualizare 1 articol (din 1 în total) Trebuie să fii autentificat pentru a răspunde la acest subiect. Login here
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323585460.87/warc/CC-MAIN-20211022052742-20211022082742-00647.warc.gz
CC-MAIN-2021-43
202
4
https://nlppeople.com/job/vp-nlp-developer/
code
I am working exclusively with one of the most advanced NLP teams in all of financial services looking to add another key player to their team. This team is well known within the firm (a top tier investment bank) and among wall street for its innovation and implementation of different cutting edge technologies. GQR Global Markets The successful candidate has the following background: Ph.D in computer science or a related field (Applied mathematics, statistics, etc) 3+ years of experience in the NLP space Expert in Python Experience with Question and Answering AND Entity Extraction The successful candidate has: Ability to deliver products of high standards at or before due date Great collaboration skills Extreme attention to detail Strong communication skills Level of experience (years): Mid Career (2+ years of experience) How to apply: Please mention NLP People as a source when applying About GQR Global Markets GQR Global Markets is an international award-winning Banking & Finance, Commodities & Energy and Information Technology specialist search advisory and talent acquisition firm. We unite the most talented people with the most pioneering organisations throughout the Americas, Europe and Asia-Pacific to find the very best opportunities wherever they may be located. We operate at the leading-edge of human capital where talent is most highly valued and innovation most highly sought. We specialise in delivering rare and uncommon talent to the most challenging sectors. We are a collective of expert headhunters and leverage considerable pooled resources through collaborative project teams to deliver the intellectual and muscular capital essential for competitive advantage. GQR operates with intelligence, diligence, tenacity and a relentless work ethic. We are proud of our role as ambassadors and trusted advisors to elite institutions and inspirational leaders. GQR represents the next generation in talent acqui
s3://commoncrawl/crawl-data/CC-MAIN-2018-26/segments/1529267863519.49/warc/CC-MAIN-20180620124346-20180620144346-00246.warc.gz
CC-MAIN-2018-26
1,940
20
https://plurrrr.com/archive/2020/week/48.html
code
In the afternoon I discovered that the Chromatopelma cyaneopubescens I keep had just molted. It was resting next to its shed exoskeleton. It was already very lethargic for weeks and had been refusing food. Three days earlier I had moistened part of the substrate and placed a single drop on the hammock it webbed. Possibly this triggered Also three days earlier I removed the molt of the Psalmopoeus irminia I keep from its enclosure. The tarantula had ejected it from the cork tube it hides in. I am not sure when it has exactly shed this exoskeleton. I also haven't seen the animal itself yet, because it is still hiding in the burrow it dug underneath the vertical cork tube. I’ve been on the Nix train for about half a year now, and I have to say that it has completely changed how I look at my development setup. Before Nix, setting up my computer on the Mac was always a mess of Homebrew packages that I would install, being dependent on whatever’s available in the repository, and being forced to have everything installed globally. There’s also not a good way to keep track of what I have installed, there’s potential for conflicting packages, it’s just not great. Nix changed all of that. I could now version check my environment, I could try out a package in a subshell before installing it globally, I can even easily pin a package to a specific version using Overlays. Installing things is very fast in general because Nix has great caching, which it can download and install from without any compilation or linking. I assume, reader, that you have some interest in functional programming. You may even already know what a Monad is, and simply want to know how to implement them in Rust. If this is you, read on! You’ve come to the right place. ReDos, also know as Evil Regex, is a regex that given a very specific input can result in exponential processing time. This exponential processing time will cause excessive CPU usage and may block processing of other requests. ReDoS became infamous in 2016 when a misconfigured regular expression accidentally took down Stackoverflow. The crew of a colony ship, bound for a remote planet, discover an uncharted paradise with a threat beyond their imagination, and must attempt a harrowing escape. In the evening Alice, Esme, and I watched Alien: Covenant (2017). Adam watched at first as well but considered the movie too scary for his taste and went up to his bedroom to read "The Hobbit". I did like the movie and give it a 7.5 out of 10. However recently it added a killer feature: generated columns. (This was added in 3.31.0, released 2020-01-22.) This makes it possible to insert JSON straight into SQLite and then have it extract data and index them, i.e. you can treat SQLite as a document database. This has been possible with PostgreSQL and obviously is what something like Elastic provides but having it available in an embedded database is very nice for lightweight The majority of software engineering literature portrays object-oriented programming as distinct from, and often irreconcilable with, functional programming. This is, of course, a false dichotomy, as the techniques encouraged by functional programming are applicable in even the most object-oriented languages. Yet object-orientation, being perhaps history’s most popular software paradigm, has popularized its tenets, and occasionally we can see them show up even in programming languages like Haskell, a language about as antithetical to the object-oriented philosophy as possible. In July 2020 I went on a color-scheme vision quest. This led to some research on various color spaces and their utility, some investigation into the styling outlined by the base16 project, and the color that ship within the GNU Emacs text editor. This article will be a whirlwind tour of things you can do to individual colors, and at the end how I put these blocks together. It can be very cumbersome writing CSS code when doing it for a large site. They tend to be repetitive, long, complicated, and messy. Debugging large CSS sites can become a nightmare because of this. Using a CSS pre-processor is the solution for many frontend developers, of which SASS is the most popular and preferred. This post is relatively scatterbrained, and if you’re familiar with Nix, there’s not any explicitly new ground to tread here. However, I have enjoyed my experience with NixOS so much that I felt compelled to write this post, although there’s already a plethora of posts drilling the same points. From time to time, I find software that immediately seems to click with me, and I start integrating it almost irreversibly into my workflow, to the point where it’s difficult to think outside of its scope. Emacs is one of these: when I began using it, I started integrating most of my software into Emacs, be it IRC or RSS. My recent experience with NixOS, though not my first (more on that later), was like this. As of today, my two laptops and my server all run NixOS, and they all use the same configuration – just with different things enabled/disabled across different machines. From both the perspective of a system administrator and the perspective as someone with a meticulous set of dotfiles, this is one of the best decisions I’ve ever made. Do you need to resign an iOS app due to an expiring provisioning profile or new bundle identifier, but you don't have access to the project files (.xcodeproj or .xcworkspace)? Or maybe you do have access to the project files, but your environment's version of Xcode can't build the project within the GUI for whatever reason? In this article, I'll share with you a solution that resigns an app without having to open Xcode. There is arguably no better way to protect devices on your local network from unwanted content than Pi-hole. Add a machine running Pi-hole to your network, and it will quietly scrub all incoming traffic from pesky stuff like ads and trackers in the background. As the name suggests, Pi-hole was initially designed to run on a Raspberry Pi. But if you already have a Linux server on your network, you can deploy a Pi-hole container on it instead. That's what I did when I replaced a QNAP NAS appliance with a ThinkPad T410 running Linux Mint. But instead of Docker, I chose to use Podman Deploying Pi-hole on Linux Mint (and by extension, on any Ubuntu-based Linux distribution) requires a few steps, but it's not beyond the wit of man. Like making engineering students squirm? Have them explain convolution and (if you're barbarous) the convolution theorem. They'll mutter something about sliding windows as they try to escape through one. There are times when -v is not enough. In particular, when you want to store the complete stream including the actual transferred data. For situations when curl does encrypted file transfers with protocols such as HTTPS, FTPS or SFTP, other network monitoring tools (like Wireshark or tcpdump) will not be able to do this job as easily for you. For this, curl offers two other options that you use instead of You can override your globally configured email inside individual repositories, allowing you to use your work email for work-related repos. Setting this up for each repo—and remembering to do so—is cumbersome. Luckily, there is an easier way to accomplish this for all repos within a certain directory. Some time ago, in an Apple campus building, a group of engineers got together. Isolated from others in the company, they took the guts of old MacBook Air laptops and connected them to their own prototype boards with the goal of building the very first machines that would run macOS on Apple's own, custom-designed, ARM-based silicon. Back in the 90's I was able to get one of the official "ARM™ Powered" mugs for free. I hope that in the near future its possible to run Linux on an Apple silicon powered Mac mini so I can upgrade to such a machine. I've liked the ARM architecture ever since I read about it in Byte magazine and have fond memories of using an Acorn Archimedes A310 for many years.
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510300.41/warc/CC-MAIN-20230927135227-20230927165227-00389.warc.gz
CC-MAIN-2023-40
8,068
137
http://gamingpoint.org/author/jakub/
code
Game design analysis of how various games use “tool” items to customize the player character and manage resources. I am a Polish-American, freelance Video Game and Web Developer recently releasing my first indie title. I occasionally work as a Cinematographer as well, having shot a variety of short films and documentaries. And I love traveling, having spent the past decade living all across the US, Poland, Japan, North Ireland, Scotland, India, Costa Rica, among others. Also, I really like biking. Check out my Indie Game Dev site at; http://koobazaur.com
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170186.50/warc/CC-MAIN-20170219104610-00417-ip-10-171-10-108.ec2.internal.warc.gz
CC-MAIN-2017-09
564
2
https://deals.razer.com/games/monster-rpg-1
code
About This Content The original Monster RPG game. This game was originally released for free in 2007. It's a turn-based JRPG like the sequel. Warning: very grindy, but for the sake of completing the series, and due to request, it has been released as free DLC. Playing this game is not required to play Monster RPG 2 (the stories are not connected.) The story sees Coro searching for his son Eny who has gone missing. You must battle your way through the mountains to uncover clues. Monsters are afoot, so it won't be easy. Minimum:OS: XPProcessor: 200 MHzMemory: 64 MB RAMDirectX: Version 7.0Storage: 10 MB available space
s3://commoncrawl/crawl-data/CC-MAIN-2020-45/segments/1603107881369.4/warc/CC-MAIN-20201023102435-20201023132435-00241.warc.gz
CC-MAIN-2020-45
623
4
http://urpaperdqkr.laluzsiuna.info/altera-wysiwyg-primitive-resynthesis.html
code
As a current student on this bumpy collegiate pathway, i stumbled upon course hero, where i can find study resources for nearly all my courses, get online help from tutors 24/7, and even share my old projects, papers, and lecture notes with other students. Not from altera's side i managed to completely reverse engineer how to interface with the cyclone v wysiwyg primitives and was thus able to interface with a ddr3 ram. Wysiwyg primitive variations include wysiwyg i/o, cam, ram, clocklock ® pll, gigabit transceiver block (gxb), pll, lcell, and mcell primitives altera ® provides simulation models of atoms for functional and timing simulation in the \quartus\eda\sim_lib directory. For example, the wysiwyg primitive resynthesis option can perform optimizations on your edif netlist in the quartus ii software f for more information about netlist optimizations, refer to the netlist optimizations and. 1 if the perform wysiwyg primitive resynthesis option is selected for your project, you may receive warnings that the stripe signals were not routed correctly. A logic option that specifies whether to perform wysiwyg primitive resynthesis during synthesis this option uses the setting specified in the optimization technique logic option this option is useful for resynthesizing some or all of the wysiwyg primitives in the design for better area or. Wysiwyg primitive resynthesis (using technology mapper specified in default logic option settings) and perform gate-level register retiming options are unchecked. The perform wysiwyg primitive resynthesis option can change node names in the vqm file or edf file from your third-party synthesis tool, because the primitives in the atom netlist are broken apart and then re-mapped by the intel ® quartus ® prime software the re-mapping process removes duplicate registers. Wysiwyg primitive resynthesis & gate-level register re-timing turned on 4 logic element duplication turned on 5 all three turned on nodes are altera specific. Hangman created on a altera board - programmed in verilog join github today github is home to over 28 million developers working together to host and review code, manage projects, and build software together. Altera wysiwyg is not schematic design it means to describe a piece of hardware exactly as it's implemented in the fpga in case of a logic cell (lcell_comb primitive) you need to specifiy the binary lut mask explicitely. Wysiwyg primitive resynthesis intel ® quartus ® prime synthesis supports the chip_pin, useioff, and altera_attribute synthesis attributes. 付属cdのtpad_200に入っているtpad_demonstration\tpad_vip_camera を使ってまずはカメラ映像をlcdに表示出来るようになりたい. Ensure that both the perform wysiwyg primitive resynthesis (using technology mapper specified in default logic option settings) and perform gate-level register retiming options are unchecked expand the compiler settings folder (category window) and select netlist optimizations. Altera forum (intel) i think i found it i changed the name of an input pin port which feeds the data port of an lpm_fifo, but i forgot to change the name on the fifo's wire. The --enable_register_retiming=on and --enable_wysiwyg_resynthesis=on options cause quartus_map to optimize the design using gate-level register retiming and technology remapping h for more information about register retiming, wysiwyg primitive resynthesis, and other netlist optimization options, refer to quartus ii help. The wysiwyg primitive resynthesis option un-maps the logic elements (les) in an atom netlist to gates and th en re-maps the gates back to altera- specific primitives. Reg4bitmaprpt in vhdl-testing located at /examples 1991-2010 altera corporation your use of altera corporation 's perform wysiwyg primitive resynthesis. 12 required settings for initial compilation compilation results can vary significantly depending on the assignments and settings that you choose. Altera, the programmable solu tions company, the stylized altera logo, specific device des- ignations, and all other words and logos that are identified as trademarks and/or service marks are, unless noted otherwise, the trademarks and. Specifies whether to perform wysiwyg primitive resynthesis during synthesis this option uses the setting specified in the optimization technique logic option type. Ignore global buffers off off ignore row global buffers off off ignore lcell from eecs 370 at university of michigan. One such option is called wysiwyg primitive resynthesis, which can perform optimizations on your vqm netlist within the quartus ii software f for information about netlist optimizations, refer to the netlist optimizations and. The altera® quartus ii® software provides designers modular executables for each step in an fpga design flow to make the design process customizable and flexible.
s3://commoncrawl/crawl-data/CC-MAIN-2018-47/segments/1542039744320.70/warc/CC-MAIN-20181118073231-20181118095231-00411.warc.gz
CC-MAIN-2018-47
4,873
7
https://blogs.msdn.com/b/mscio/archive/2012/08/07/deploying-windows-8-within-microsoft.aspx?Redirected=true
code
Microsoft Enterprise Web Site This is a guest post by Patrick O’Rourke, director within the strategy, planning and communications team in Microsoft IT. If you’ve read this blog before then you know that one of the roles of Microsoft IT is to be the first customer of Microsoft’s commercial products and services. Through this program the IT department manages a phased, employee adoption of early versions of Microsoft products and services. We call this “dogfood” in that we’re eating our own dogfood. This program enables the IT department to help Microsoft’s product teams deliver higher quality products and services to customers, both near-term and long-term. We’re currently “dogfooding” several products and services, but the most interest is with Windows 8 and IE 10 Release Preview. As of mid-July we had more than 30,000 systems and nearly 30,000 employees running Windows 8 and IE10. I’ll highlight three areas from Microsoft IT experience deploying Windows 8 and IE 10 Release Preview: support, security and user experience. Support model for early adopters The Windows 8 Release Preview deployment was fully supported by Microsoft IT through multiple support channels, to include self-help, help desk and an online community. This strategy is important so that Microsoft IT can collect diverse feedback for contribution back to the product group, and to meet the support needs of worldwide employees. To ensure a smooth transition for Microsoft employees, the Microsoft help desk was regularly updated on the deployment process, they were provided readiness training that contained the key differences between Windows 8/Internet Explorer 10 and previous versions, and they were provided information about the new features and a troubleshooting guide with tips and tricks on how to resolve common issues. In terms of online community, we adopted a social networking model by creating a channel for support. We created //pointers as a moderated forum that could address the top feedback from employees. The web application is real-time, dynamic and content is searchable. Perhaps more important, it proved to be a valuable collaboration and knowledge sharing tool between IT and employees worldwide. When reviewing the site traffic to //pointers, we saw that site visits greatly exceeded the number of unique users. We interpreted this site traffic as positive; the site is sticky and employees are coming back to it. In addition, the volume of recognition badges indicated that, once driven to the community, employees tend to contribute in helping others. Following are some of the key learnings from //pointers: As indicated by press reports, security is a valuable part of Windows 8 deployments. There are many new features that Microsoft IT needed to validate for the enterprise. I’ll highlight some of the features we deployed. End user adoption is very important for our “dogfood” deployments so that we have enough employees providing feedback on the software. At the same time, we need to keep these employees productive. Therefore we dedicate significant resources to user experience during our “dogfood” deployments, and Windows 8/IE 10 was no different. The experience starts with installation. Microsoft IT used IT Easy Installer to streamline the install experience by automating everything for the user to migrate to Windows 8. We cut the install time in half, which included the Office image. I’ll highlight some of the key components of the tool: [Sept. 4 update: I was asked about tools we used in our Windows 8 deployment. It’s discussed a bit in the IT Showcase materials. For context it’s important to remember that the tools used to deploy Windows 8 Release Preview were for our early deployment (aka, dogfood) phase. In this dogfood phase, we have to be opportunistic to help our early adopters any way we can while we work on setting up our long-term System Center infrastructure, which we’ll use for the company-wide deployment. You can expect to read about this company-wide deployment later this year. But, for the Windows 8 Release Preview to early adopters, we used Microsoft Deployment Toolkit (MDT) 2012 Update 1, and System Center Configuration Manager in small pockets. MDT is a solution accelerator available for OS and application deployment. It can be used as a stand-alone installer, and there’s a version integrated with System Center 2012 Configuration Manager, which we’ll use to simplify and automate our company-wide Windows 8 Enterprise deployment process.] A new OS feature, called Windows To Go, allows Windows 8 desktop to boot and run from a USB flash drive. Windows To Go is self-contained on a USB device, and can also take advantage of any devicesmade available on the host computer, or across the enterprise network. A Windows To Go workspace works with most host desktop or laptop computer, including tablets and slates. Microsoft IT provisioned 75 devices with Windows To Go and made them available to senior staff, engineers, and architects. Windows To Go scenarios include providing a managed corporate desktop when the host computers are unmanaged or not domain-joined. This deployment allowed different machines (slate, laptop, and desktop) with different configurations of screen, keyboard, and touch to have a machine-specific experience that was highly transportable between host machines. Finally, to provide a complete data migration and protection strategy for employees, Microsoft IT used File History. This is a new, built-in feature that protects user files by periodically scanning the computer’s filesystem for changes stored in libraries and in the user's Desktop, Favorites, and Contacts folders and copying them to a Microsoft IT-managed network drive configured as their backup storage area. Enterprise customers will be able to customize this solution for their own environment. You can read more about Microsoft IT deployment of Windows 8 on Microsoft IT Showcase here. Expect to see more posts about line of business application experience and application development with Windows 8 and IE10 on this blog in the coming months. Last week Microsoft announced that we had reached the release to manufacturing (RTM) milestone of Windows 8 [see here], which means we’ve completed the product development and testing of the product and have started handing off the final code to our OEM partners. Leave a comment or question, and don’t forget to download Windows 8 Release Preview here. Yes, that's all well and good, but what did you actually LEARN about Windows 8? They learned that they forgot the Start button... @Ben XO: I'll be pulling together more info about our internal Win8 deployment, and will share that next month. Thanks for reading. I like Windows 8 sooo much, but one thing you have to change. That is the minimum resolution of metro apps. You have to change it to 1024*600. Because the net book users who have 1024*600 resolution display they can't take the taste of metro apps. But they want to use it. So what will they do? Did they change their notebook for Windows 8 ? No most of them don't do that. So the result is " They don't buy Windows 8 " then the pirate user will be increase. Coz people don't buy anything stupid to take a half taste. Its time to change. I think just this change will not be to compromise to quality. Just think about my opinion. One change can sell a huge copy. Thanks. I agree with the comment about screen resolution. I have a number of PCs and my Netbook can run Windows 8. It runs great but I cant run Metro apps because of the screen resolution. There are some registry hacks on the web to force the screen a bit higher but it is just 100 or so pixels short. So a whole class of portable computers cannot run Metro apps even though they have the basic horsepower. It's a little disappointing since a lot of these devices are about less than 18 months old. 1024 x 600? C'mon. Get a new computer. Get a real computer. I feel for you, but your resolution makes up a miniscule share of users.... Check the BuildWindows8 posts and you'll see. I would think that Microsoft would add the following feature. Recognizing if it is a tablet or a normal desktop or laptop the user has the option of saying I want to boot directly to a desktop. I know a lot of corporations and businesses that won't be adopting because of that feature alone. Your post mentions "readiness training that contained the key differences between Windows 8/Internet Explorer 10 and previous versions, and they were provided information about the new features and a troubleshooting guide with tips and tricks on how to resolve common issues." Will that information be available to the Tech community? It's exactly what I will have to spend time creating and I would think that MS has done a better job that I ever could. @ Jim Baker for several years Microsoft IT has developed internal documents called "Work Smart" to guide Microsoft employees how to be more productive with new Microsoft products and services. We've recently begun to published some Work Smart guides for external use. Microsoft IT just published 7 Work Smart guides for Windows 8 here: technet.microsoft.com/.../jj262107.aspx. See the one titled, "Exploring Windows 8" and the other ones. Any chance you post what methods where used to deploy win8, sccm2007? Adopting an internet of everything mentality is easy,but, the challanges of immediacy with scalabilty in the real world bring with it many obstacles...one such is illustrated by the above discussions of various issues on screen resolution. Check out Mr. Scotts' link above for more great technet information, khat vher brfor aje dot pl;hat for stne whdoshe 7 ploblhe me for fine plshe ju plhe for isher for khotrne
s3://commoncrawl/crawl-data/CC-MAIN-2016-07/segments/1454701148558.5/warc/CC-MAIN-20160205193908-00277-ip-10-236-182-209.ec2.internal.warc.gz
CC-MAIN-2016-07
9,792
37
https://forum.borisfx.com/t/gui-render-motion-blur-samples/7192
code
Is it possible to set up functionality inside Silhouette that sets default motion blur samples at render time on a render farm to a different value compared to when the GUI is active? I haven’t tested anything yet but would this work? if not fx.gui: (enter code here) Yes, this should be possible. Do you have a script or process that launches the current project on a render machine? You could wedge in some code there that gets executed as part of the command-line render process, using the -script argument. Scripts get executed before the render begins, so you could write a simple script that iterates through all the Roto nodes and sets the motion blur parameters to the values you want. Yes we do at work. I will have a look at seeing if we can get that setup. For local rendering to have the same functionality am I right in thinking you could use the pre-render hook? Also I’m not sure if there’s any plans down the line for this but could this feature be set up within the GUI itself? Having the motion blur parameter highlighted or something visual to signal it will have a different value at render time? As the only problem at the moment is there is no way for an artist to know the value will change automatically without being explicity told. This issue is brought up often enough it might be useful to add a feature - maybe a global setting, that gets applied to all motion blur sample values during render. You could do this with a pre-render hook, or you could create an action to do your render that clones the session first. Take a look at some of the current renderXXXX.py actions for how you could set that up. Would be pretty straightforward.
s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656103324665.17/warc/CC-MAIN-20220627012807-20220627042807-00570.warc.gz
CC-MAIN-2022-27
1,671
10
https://enterprise-agility.eu/schedule/presentation-8/
code
WORKSHOP ABSTRACT “The only company who has no risk is the company who no longer exists” We are pleased to present to the Risk Profiling workshop! We will share with you a different perspective on demand management. Every decision we made in your company is a risk decision. During this session, we will provide you the tools to identify which risks are important for you to manage in your context, how to measure and visualize them. - Why risk profiling is key? - It helps to make better trade-off decisions - It speeds conversations - It’s fast - It’s cheap - It’s accurate - It generates consensus - It brings balanced portfolio During the session you will create a Risk Model build by you, suitable for your specific context and map the Risk Profiles for the next work items you foresee in order to test and validate your model’s utility using real work. Maria Torrijos, with 22 years of experience in Travel business, 15 of them being part of the World’s 2nd largest online travel company. Maria has been the Product Owner for one of the pilot teams and she had a central role in transformation processes. The transition from a Waterfall to an Agile organisation has been one of the most exciting experiences in her career and Enterprise Services Planning has given her the tools to find an alternative path to agility. Now facing new challenges as just moved to a new industry from eCommerce to Marketplaces business, sharing and applying all these learnings in a new context with different problems to solve.
s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578527839.19/warc/CC-MAIN-20190419141228-20190419163228-00172.warc.gz
CC-MAIN-2019-18
1,529
13
https://www.experts-exchange.com/questions/23775836/ASA-Router-VPN-DNS-Issues.html
code
Ok I have a L2L vpn going between an ASA5505 and a Cisco 851W router. I am having problems with the DNS (split DNS?). Note: the 851 is the DHCP server. When going to the internet I would like the clients to use the ISP DNS servers, when access domain names that exist over the VPN I will need the client to use the DNS behind the ASA. Any help? Thanks!!
s3://commoncrawl/crawl-data/CC-MAIN-2018-17/segments/1524125936914.5/warc/CC-MAIN-20180419110948-20180419130948-00404.warc.gz
CC-MAIN-2018-17
353
3
https://researchportal.port.ac.uk/portal/en/persons/kay-peggs(e5bc8e73-684f-4697-8833-6877df761751).html
code
Dr Kay Peggs My research approaches issues associated with discrimination and power from a range of social perspectives. I am currently particularly interested in exploring what social perspectives (such as critical sociology, standpoint sociology and feminism) have to offer to the study of oppressions related to species. Current research interests include human/nonhuman divide, intersectionality and complex inequalities, and social ethics and moral consideration. I am also a research methods specialist. I have applied a range of qualitative and quantitative approaches in my research. I am currently working on observation as a methodological approach and am exploring creative methodologies. - Sociology and Social Theory - Women’s and Gender Studies - Discrimination and power: Human/nonhuman divide, Gender, intersectionality and complex inequalities, Ethics, Self and identity, Couple relationships. - Reflexive sociology: Critical sociology, Standpoint sociology. - Research methods: Combining methods, Creative methodologies.
s3://commoncrawl/crawl-data/CC-MAIN-2021-04/segments/1610704824728.92/warc/CC-MAIN-20210127121330-20210127151330-00006.warc.gz
CC-MAIN-2021-04
1,040
7
http://macintoshgarden.org/users/iigsuser
code
so I thought we should also have this later version as well. However I cannot find a description of Forestia 3 anywhere in English. Maybe there is no English version. Would you like to make a page for this if you think it is a good idea? If you think it should not be uploaded, then that is OK. None of the bin-cue pairs that you have been putting up are recognised by Toast 7. I have tried Bibi Blocksberg 2, Bibi Blocksberg 4, Bibi und Tina 5, Bibi und Tina 6. However I AM able to convert them to a recognised bib-cue form using UltraIso on Windows (which is what I always use to create bin-cue pairs) ☃Disclaimer: Macintosh Garden does not claim rights to any software on the site. To the best of our knowledge, these titles have been discontinued by their publishers. If you know otherwise, please contact us and we will remove them accordingly. Thank you for your attention.
s3://commoncrawl/crawl-data/CC-MAIN-2014-49/segments/1416400374040.48/warc/CC-MAIN-20141119123254-00095-ip-10-235-23-156.ec2.internal.warc.gz
CC-MAIN-2014-49
882
3
https://www.photography-forums.com/threads/snapshots-of-afghanistan-august-2009.207989/page-17
code
[QUOTE="Bill Graham"]\nI get much better coverage for my 0 a month.[/QUOTE]\n\nWhich supplements your Medicare coverage. If you had to pay it all\nyourself it'd cost about 00 per month.\n[QUOTE]\nFor three people, too.[/QUOTE]\n\nMake that 00.\n[QUOTE]\nBut\nthat's beside the point. My point is that It is something that I pay for,[/QUOTE]\n\nExcept that it isn't.\n[QUOTE]\nand I don't need the government to do it for me.[/QUOTE]\n\nYou've already admitted that it's a supplemental policy. That means\nthat you DO depend upon the government.
s3://commoncrawl/crawl-data/CC-MAIN-2021-49/segments/1637964362219.5/warc/CC-MAIN-20211202114856-20211202144856-00411.warc.gz
CC-MAIN-2021-49
544
1
http://www.cesm.ucar.edu/models/ccsm1.4/csm1.4.download.html
code
CCSM1.4 Code Distribution CSM 1.4 is the fourth major configuration of the Climate System Model, a comprehensive coupled model of the Earth's climate system. Both active and data models are available. Standard resolutions are T31 & T42 for the atmosphere and land components, and a nominal 3x3 and 2x2 degree resolution for the sea-ice and ocean components. Other resolutions are also possible. This collection of code is meant to be compiled and run on either a Cray or a SGI Origin 2000 machine. - CSM1.4 run scipts and modified code (0.22 Mbytes) [download] - CSM1.4 frozen model code (2.4 Mbytes) [download] - CSM1.4 data at T31x3p resoulution (159 Mbytes) [download] - Download the CSM1.4 data at T42x2 resoulution (290 Mbytes) [download] Along with the source code, several test scripts are also provided. These test scripts demonstrate how to configure and run the CSM for various typical applications. While these scripts do implement standard CSM configurations, they are intended to be used for short "getting started" test runs and may not be appropriate for certain applications. If you acquire any CSM source code, please email and let us know. Notices, Revisions and Patches Dec 08 2000: CSM1.4 release. - Only csm.nqs.csm1.4.tar.gz updated stepic.F, containing test ice albedos removed from all src.ice subdirectories. - Obsolete Jun 11 version (0.19Mbytes) [download] Jul 11 2000: CSM1.4 release. - Only csm.nqs.csm1.4.tar.gz updated. - Filepaths corrected, bitcheck added to final cpl timestep, - Differences between original code and modiified code included. - Obsolete Jun 26 version (0.19Mbytes) [download] Jun 26 2000: CSM1.4 pre-release. [comments] The CSM1.4 Distribution: The CSM1.4 code is targeted for SGI Origin 2000 and Cray C90/J9 platforms. CSM1.4 is available via anonymous ftp from: ftp.cgd.ucar.edu:/ftp/pub/ccsm/models/csm1.4/distribution/* or via the web from: csm1.4.download.html The CSM1.4 distribution consists of four files: Zdrwxrwxr-x 2 9005 24 512 Feb 28 15:19 . drwxrwxr-x 6 9005 24 512 Feb 10 22:17 .. -rw-rw-r-- 1 9005 24 121812 Feb 28 15:19 csm.nqs.csm1.4.tar.gz -rw-rw-r-- 1 9005 24 2457741 Feb 28 15:19 csm.models.tar.gz -rw-rw-r-- 1 9005 24 161157120 Feb 10 22:28 csm.input.T31x3p.tar -rw-rw-r-- 1 9005 24 161157120 Feb 10 22:28 csm.input.T42x2.tar csm.nqs.csm1.4.tar.gz is the scripts and a small amount of modified code for various combinations of the models. csm.models.tar.gz is the frozen coupler and model codes csm.input.T31x3p.tar is the low resolution input data sets csm.input.T42x2.tar is the high resolution CSM input data sets ======================================================================== Required system files: ---------------------- csh The scripts are written to run in the c-shell gnumake Gnumake is sometimes called gmake or make. To see if your make command really runs gunmake, type "make -v". If it correctly returns a version number, it is gnumake and will work. If it returns an error, it is generic make, which won't work) F90 A FORTRAN 90 compiler cc A C compiler mpi Message Passing Interface (both include files and libraries) netCDF The netCDF data format (both include files and 64-bit libraries) ======================================================================== Untarring the CSM1.4 distribution. ---------------------------------- The simplest way to unpack the CSM1.4 distribution is to untar the files in a large disk area. The CSM1.4 distribution is configured to run on the NCAR SGI ute under the directory /ptmp This area may have another name on your system. To untar the data files: tar -xf csm.input.T31x3p.tar To untar the *.gz files: gunzip -c csm.nqs.tar.gz | tar -xf - Assuming that you create the directory /ptmp/$LOGNAME and untar the CSM1.4 distribution under /ptmp/$LOGNAME, the top levels of the resulting directory tree are: /ptmp/$LOGNAME/ | [Directories and files below this point are created by untaring the csm1.4 files] | | csm/ | +-----------+--------------------+ | | | input/ models/ nqs/ | | | | | | | | | [ $DATDIR ] [ $CODDIR ] [ $NQSDIR ] | | | [Input Data] [Frozen Code] [Build/Run Scripts and any Modified Code] | | | +----+----+----+ | | | | | | | | atm/ ocn/ ice/ lnd/ | | | | | | +----+----+----+----+ | | | | | | | cpl/ atm/ ocn/ ice/ lnd/ | | | +---------------+----------------+----------------+ | | | | [data only] [atm/lnd spinup] [ocn/ice spinup] [fully coupled] | | | | [Case] csm1.4 csm1.4a/ csm1.4b/ csm1.4c/ | | | [Initial run script] csm1.4a.nqs0 csm1.4b.nqs0 csm1.4c.nqs0 [Continue run script] csm1.4a.nqs csm1.4b.nqs csm1.4c.nqs [atm setup script] atm.setup.csh datm.setup.csh atm.setup.csh [ocn setup script] docn.setup.csh ocn.setup.csh ocn.setup.csh [ice setup script] ice.setup.csh ice.setup.csh ice.setup.csh [lnd setup script] lnd.setup.csh dlnd.setup.csh lnd.setup.csh [cpl setup script] cpl.setup.csh cpl.setup.csh cpl.setup.csh [GNU makefile] Makefile Makefile Makefile [modified atm code] src.atm/* src.datm/* src.atm/* [modified ocn code] src.docn/* src.ocn/* src.ocn/* [modified ice code] src.ice/* src.ice/* src.ice/* [modified lnd code] src.lnd/* src.dlnd/* src.lnd/* [modified cpl code] src.cpl/* src.cpl/* src.cpl/* The untar operation will create the /ptmp/$LOGNAME/csm branch of the tree. $DATDIR (/ptmp/$LOGNAME/csm/input/* ) contains all the input data $CODDIR (/ptmp/$LOGNAME/csm/models/* ) contains the frozen model code $NQSDIR (/ptmp/$LOGNAME/csm/nqs/* ) contains the run scripts and any modified model code Four example CSM experiments are included: csm1.4 MPI test case. Data drivers only, no active models. csm1.4a atm/lnd spinup. Active atm & lnd models, data ocn & ice drivers csm1.4b ocn/ice spinup. Active ocn & ice models, data atm & lnd drivers csm1.4c Fully coupled. Active atm, lnd ocn & ice models. For purposes of example, the csm1.4c case will be described below ========================================================================== Running the CSM --------------- The master script (nqs script) is /ptmp/$LOGNAME/csm/nqs/csm1.4c/csm1.4c.nqs0 ($NQSDIR/csm1.4c.nqs0). This script is executed to run the CSM. The $NQSDIR/csm1.4c.nqs0 script does 4 things: 1. Define the run environment 2. Build the Makefile generator 3. Build the components by calling a setup script for each component: ./csm/nqs/csm1.4c/atm.setup.csh ./csm/nqs/csm1.4c/ocn.setup.csh ./csm/nqs/csm1.4c/ice.setup.csh ./csm/nqs/csm1.4c/lnd.setup.csh ./csm/nqs/csm1.4c/cpl.setup.csh These setup scripts: 1. Define the model version to be build 2. create the input namelists for this model 3. preposition any needed files 4. build the component 4. Run all components simultaneously When you run the script /ptmp/$LOGNAME/csm/nqs/csm1.4c/csm1.4c.nqs0, the following directory tree will be created /ptmp/$LOGNAME/ | +-----------+---------------------+ | | [ $EXEDIR ] [ $CPDIR ] | | csm1.4c/ USERNAME/csm/$CASE/ | | [Models Execute Here] [Output data copied Here] | [USERNAME is $LOGNAME in CAPS] | | +----+----+----+----+ +----+-----+----+----+ | | | | | | | | | | cpl/ atm/ ocn/ ice/ lnd/ cpl/ atm/ ocn/ ice/ lnd/ | | | | cpl hist/ R2/ hist/ Namelist rest/ R3/ rest/ cpl.log.YYYYYY-HHMMSS R4/ cpl.setup.YYYYYY-HHMMSS R5/ *.nc netcdf/ obj/Filepath obj/*.h obj/*.o ======================================================================== Some things you might need to change for your system: 1. To change the location of the CSM distribution: Modify the following lines in $NQSDIR/csm1.4c.nqs0 setenv NQSDIR /ptmp/$LOGNAME/csm/nqs/$CASE # Setup scripts dir setenv DATDIR /ptmp/$LOGNAME/csm/input # Input datasets dir setenv CODDIR /ptmp/$LOGNAME/csm/models # Frozen source code dir 2. To change the length of the CSM run The coupler controls when the model starts, writes data and stops, To change the length of the CSM run, modify the value of stop_n in $NQSDIR/cpl.setup.csh 3. To modify compiler options, such as the location of the MPI & netCDF include files and libraries The compiler options are set in $NQSDIR/Makefile. Note, this is a GNUmakefile, not a regular makefile 4. To change the model resolution The CSM1.4 distribution is set for a T31 atm/lnd grid and x3p (by-three-prime) ocn/ice resolution. To run a T42x2 resolution, change the following lines in $NQSDIR/csm1.4c.nqs0 from setenv RESOLUTION T31_x3p # Either T31_x3p or T42_x2 to setenv RESOLUTION T42_x2 # Either T31_x3p or T42_x2 For detailed documentation of the nqs and setup scripts, see CCSM 1.4 User's Guide
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917125074.20/warc/CC-MAIN-20170423031205-00633-ip-10-145-167-34.ec2.internal.warc.gz
CC-MAIN-2017-17
8,435
21
https://bestofama.com/amas/1xr75t
code
Hello! My name is Matt Stonie. #2 ranked Competitive Eater in the World. I Eat Food. AMA! My short bio: For those wondering who I am, my name is Matt Stonie, 21 yrs old, from San Jose CA. I'm a Competitive Eater Ranked #2 by MLE and make Youtube Videos for Fun. All other info you can find around somewhere :) (7:15pm PST) - I think it's time for me to hang up the towel... Thanks so much for the great time, you guys are awesome :). If you want to leave any more questions I will probably check later tonight and answer a few more, but that's it for now. Goodnight!! My Proof: http://youtu.be/3WmJt8CGfmI
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446710155.67/warc/CC-MAIN-20221127005113-20221127035113-00442.warc.gz
CC-MAIN-2022-49
605
4
http://stackoverflow.com/questions/15741044/how-to-change-the-background-color-of-status-bar-in-wp8-silverlight
code
Is there any way to change the Background Color of status bar in Windows Phone 8 silverlight application? It is quite easy to do that, but I'm not sure if it is reflected in the emulator (better try it on a real device). Open the XAML of the page where you want to change the status bar and then change these properties the way you want them to be: The *.IsVisible property ensures the status bar is visible, the *.BackgroundColor is setting the correct background of the status bar and finally the *.ForegroundColor changes the color of text and icons. Check this property>> Follow this link to get more details>>
s3://commoncrawl/crawl-data/CC-MAIN-2015-18/segments/1429246643283.35/warc/CC-MAIN-20150417045723-00111-ip-10-235-10-82.ec2.internal.warc.gz
CC-MAIN-2015-18
614
6
https://github.com/cherokee/webserver/issues/1184
code
Join GitHub today GitHub is home to over 28 million developers working together to host and review code, manage projects, and build software together.Sign up Missing authentication dialog with error handler "custom redirection" #1184 I'm facing a problem which looks like a bug which was solved a while back (though I can't find the issue# anymore...), but seems to have reappeared between version 1.2.98 and 1.2.99: I've defined a behavior rule of type Directory for a Web Directory called /service. For that, authentication validation mechanism is set to Plain text file, method to Basic, realm, userlist and password file are supplied. Everything works as supposed up to this point: trying to open the URL opens an authentication dialog. Cancelling the dialog leads to the internally generated error 401 page (authorization required). Now, when changing the error handler from Default handlers to Custom redirections and trying to redirect error 401 to a custom page (e.g. /401.html, type internal), the authentication dialog is skipped and the redirection page is shown immediately, without ever having the chance to provide the credentials. As mentioned, earlier versions showed the expected behavior. I've tested versions 1.2.1, 1.2.2, 1.2.98 successfully, but couldn't find any working version thereafter (incl. the latest version from the git repo). Any idea what the problem could be? Thanks in advance & best regards,
s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267161350.69/warc/CC-MAIN-20180925083639-20180925104039-00465.warc.gz
CC-MAIN-2018-39
1,427
10
https://whyandwhale.com/products/cubelets-curiosity-set
code
The Cubelets Curiosity Set is the perfect introduction to the world of Cubelets® robot blocks. Open a box of little robots that will intrigue, fascinate, and inspire builders for hours on end. A unique blend of hardware and software, Cubelets make it easier than ever to explore robotics, coding, and other big ideas. Cubelets are the only toy that uses Tactile Coding to help builders of nearly any age explore robotics, coding, and more. Uniquely designed, they are little bundles of software inside little bundles of hardware. As you build a robot, you learn to build a program. It’s a fun and fascinating way to introduce big ideas through play. Build, learn, and create more with the Cubelets Curiosity Set. The Curiosity Set encourages kids to develop their understanding of computer science using Tactile Coding. Open a box of little robot blocks that will intrigue, fascinate, and inspire builders for hours on end. Snap together the magnetic faces to build hundreds of robot constructions. steam, stem, kids robotics, robots for kids,
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572077.62/warc/CC-MAIN-20220814204141-20220814234141-00751.warc.gz
CC-MAIN-2022-33
1,046
4
https://philosophy.berkeley.edu/courses/detail/355
code
|290-1||Graduate Seminar: Causation in Psychology||Campbell||W 4-6||234 Moses Hall| There will be three components to the seminar: (1) The nature of causation and the idea of a ‘level’ of explanation. Here we will look in particular at the interventionist model of causation advocated by, among others, Woodward and Hitchcock. (2) Causation as it applies to mental states. In particular, we will consider the analysis of perception, and whether it makes a difference to the causal role of perception that perceptual states are often conscious. This will mean looking at various models of the content of conscious perception. (3) The role of rationality in an analysis of mental causation. Here we will look at mental causation in psychiatry, and whether there is a place for an assumption of rationality in cases of, for example, delusion. We will also look at the view of thinking as a motor process.
s3://commoncrawl/crawl-data/CC-MAIN-2019-26/segments/1560627998923.96/warc/CC-MAIN-20190619063711-20190619085711-00319.warc.gz
CC-MAIN-2019-26
905
2
https://www.mcb.guru/1998/08/15/beos-porting-unix-applications/
code
When the BeOS was first released it was obvious to me and many others that it would be a platform that suited both the GUI lover, and the Unix style command line interface geek. Developing for the former requires you to learn the BeOS API, including the client/server system, BMessages and the objects and classes that make up the BeOS interface.But if you want to take advantage of the POSIX support included with the BeOS and use the wide range of open source software such as that from GNU and many others. However, there are problems with the BeOS when it comes to porting Unix applications. Not all of the features, functions and programs are supported, and those that are have bugs, gaps, or just plain dont work.The idea behind BeOS: Porting Unix Applications was therefore to guide the reader from downloading the source code to using the application. This involves how to extract the archives you’ve downloaded, how to use the configuration systems, including how to make them work with the BeOS, and how to plug the gaps and missing areas of the BeOS functionality.Features - Supports BeOS Release 3. - Provides a step-by-step guide to the porting process, from download the source to installing the application. - Explains how to port off the shelf utilities like Emacs and Perl as well as your own programs and tools to the BeOS. - Offers a comprehensive Unix/POSIX vs. BeOS reference for anyone who is porting or writing software for the BeOS. - Furnishes a simple catalog of tools and features available on the BeOS. A Note About CompatibilityAlthough the book was written at a time when PPC was the main version of the BeOS, much of the content is still relevant both to the older Intel implementations using Metrowerks development tools, and the newer GNU based development toolkit. This is because the development tool differences make very little difference to the core OS libraries and functions provided by the BeOS.
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947473738.92/warc/CC-MAIN-20240222093910-20240222123910-00334.warc.gz
CC-MAIN-2024-10
1,938
7
http://freecode.com/tags/windows?page=631&sort=popularity&with=&without=21
code
ClearLisp is a Common LISP interpreter written in C# with the purpose of scripting in a .NET or Mono environment. The ClearLisp language supports a large subset of CL and has an object model with generic functions, class and instance methods, properties, and import of existing .NET classes. ClearLisp executes LISP scripts in interactive mode or in Web mode (IIS; XSP or Apache with Mono). Sample ClearLisp code is provided in the form of a personal, file-based wiki Web application. RegMAS (Regional Multi Agent Simulator) is a spatially explicit multi-agent model framework, designed for long-term simulations of effects of government policies over agricultural systems (e.g. farm sizes, incomes, land use). RegMAS uses a profit-maximization algorithm to derive farmers' behaviors. Using RegMAS, researchers can write regional-specific models, adapting the pool of activities and resources to their specific region.
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368703830643/warc/CC-MAIN-20130516113030-00025-ip-10-60-113-184.ec2.internal.warc.gz
CC-MAIN-2013-20
918
2
http://secretsdoll.com/brain-puzzle/windows-xp-home-edition-retail-iso.php
code
Main / Brain & Puzzle / Windows xp home edition retail iso Windows xp home edition retail iso Name: Windows xp home edition retail iso File size: 863mb Windows XP Pro SP3, Windows XP Home SP3, Windows XP Media Centre SP2: With secretsdoll.com you may use Rufus to check secretsdoll.com and to create a Dell Inspiron running on XP Media Edition with SP3 (we also have a slightly older. She has an XP Home OEM Key on the side of the computer, and I need route, but I've only found the retail ISO, or non-English OEM ISO's. 7 Jul Each piece of Windows XP CD disc media or ISO image has been created for specific Boot up the computer using the CD of the Windows XP edition (retail, OEM or XP Home and Professional Combo = WXPHFPP_EN. 9 Apr I think I'm being really blind today, but I can't find a genuine XP Home Edition bootable ISO image to download. I have product key etc, just. I need to restore an older machine for which I do not have the ISO. It originally had Windows XP Home edition. Please note, if the friend has an OEM or Recovery Disc for XP Home, this will not work with a retail product key. (XP Home HP edition - =OEM version, out of warranty naturally.) I have a Retail XP home CD when I need an OEM version of the CD so The next screen will ask you which Windows? installation you would like to log on to. 14 Jun - 5 min - Uploaded by quishyquishy Stevie Goodwin This is XP SP0 Retail Home Edition. It's rare. Here is the ISO Link and Reset will activate. 24 May windows xp home edition retail iso torrent - full download windows xp home edition full install cd iso from search. is running Windows Vista or. 1 Jun Need help finding a Windows XP Home Edition ISO (for LEGAL use) Just what I was looking for - a clean, retail ISO:up: Thanks:D. I am looking for an XP Home Edition ISO, so I can format my laptop I don't have A full version/retail disc will not work with your license key. Is there a way to download the ISO file for XP Home. I know that's product key will work with a Windows XP Home Edition SP2 retail CD or a.
s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578626296.62/warc/CC-MAIN-20190424034609-20190424060609-00338.warc.gz
CC-MAIN-2019-18
2,040
7
http://shakeeltariq.com/2009/11/14/google-launches-new-programming-language-go
code
Google introduces a new programming language, known as Go, that is aimed at being fast, productive and fun for developers to use.Google has introduced a new programming language, known as Go, that is aimed at being fast, productive and fun for developers to use.Google officials described Go as an "experimental language" that attempts to combine the development speed of working in a dynamic language like Python with the performance and safety of a compiled language like C or C++.Moreover, in a blog post by the Google Go team, team members Robert Griesemer, Rob Pike, Ken Thompson, Ian Taylor, Russ Cox, Jini Kim and Adam Langley said: "In our experiments with Go to date, typical builds feel instantaneous; even large binaries compile in just a few seconds. And the compiled code runs close to the speed of C. Go is designed to let you move fast."Meanwhile, an FAQ on the Go language on the language's Website addressed who should use the language. "We hope adventurous users will give it a try and see if they enjoy it," the FAQ said. "Not every programmer will, but we hope enough will find satisfaction in the approach it offers to justify further development." Read More @ Google Launches New Programming Language: Go. Possibly related posts: (automatically generated) - Related posts on c++ - New blog post: Using Pay Per C… | Seattle - Pakistan vs New Zealand 1st Twenty20 (2009) Bulletin – Dubai | C ... - Related posts on go language - A possible replacement for HTTP in the works - Centre of the Universe - P e C e L a Y a M » Blog Archive » Go! Language. Get it? - Where do you want to (Google) Go today? « HaiColon - Related posts on google - 12 Things to Know About Google`s Go Programming Language | ICT ...
s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267158011.18/warc/CC-MAIN-20180922024918-20180922045318-00506.warc.gz
CC-MAIN-2018-39
1,732
12
https://www.datasciencecentral.com/guide-to-best-flutter-state-management-libraries-for-2023/
code
Flutter is a free, open-source mobile user interface (UI) framework that Google developed in 2017. It allows users to create native mobile applications using a single codebase. Using a single codebase and one programming language, users can develop apps for two different platforms, Android and iOS. It’s considered the most effective cross-platform framework available. Flutter is all about widgets, and these widgets can be classified into two categories, stateless and stateful widgets. A stateless device does not have any internal state, i.e. once the widget is built, it cannot be changed or modified until it is initialized again. On the other hand, a stateful widget is dynamic and has a state, i.e. it can be modified easily throughout its lifecycle without initializing it. A state is a piece of information that can be read when the widget is built and can be changed or modified during the lifetime of an app. State management is one of the most popular and essential processes in an app’s lifecycle. Since Flutter is declarative, Flutter builds its UI by reflecting the current state of an app. State management centralizes all the forms of various UI controls to handle data flow across the application. For example, a “welcome” message must be shown upon opening the app, but not on any subsequent page visits; a user state is required. Managing the state of an application is vital and is what the application knows about the user, where the user is located, the information that has been entered, and also the status of UI controls after the user has entered the information. Regardless of the changes in user state, Flutter state management libraries makes it easy to build and manage apps. Developers can design UI from scratch using Flutter’s declarative programming style, which reflects the app state as per user interface. Popular Flutter State Management Libraries A state management library is a good option when developing a complex Flutter app. To return changes to an application state, Flutter uses a declarative programming structure. Some of the popular Flutter state management libraries are: - BLoC: BLoC or Business Logic Component, is recommended by Google and is one of the most popular approaches. BLoC enables the separation of Flutter application logic into a single component, the Business Logic Component. BloCs are usually assigned to every screen in a Flutter application, which helps separate the presentation code from the business logic, making it easier to test and reuse. It enables developers to work on the same code base using uniform patterns and conventions. - InheritedWidget: InheritedWidget is another state management solution offered by Flutter and it’s a special type of widget that helps define the context of the root at the base tree. The advantage of this is that the lowest widget at the sub-tree can directly access the state defined in InheritedWidget without affecting other widgets residing above it. It allows developers to create a widget that other widgets can inherit in an app. Therefore any changes made in this inherited widget are automatically propagated down to the child widgets. The primary advantage of InheritedWidget is that it’s easy to understand and use, but can be difficult to manage when the app becomes more complex. - Provider: Provider state management allows for a simple and efficient way to access and modify an application’s state from anywhere in the code. The Provider class in the BLoC package can access objects of the widget tree. The Provider can also be used with Triple, ValueNotifier, ChangeNotifier and other state objects. The Provider Pattern is well known for managing state in Flutter applications and is highly recommended for simple projects which need to manage state in a more maintainable way. - River pod: Riverpod is a new entrant in state management solutions for Flutter and builds on top of the Provider Pattern. Riverpod is an implementation of InheritedWidget from scratch. In Riverpod, InheritedWidget is implemented easily and simply. Riverpod can identify coding errors during compilation, and this unidirectional data flow makes apps more scalable as app objects are made visible in Flutter’s dev tool by default. It also simplifies complex object graphs and makes patterns independent of Flutter. - MobX: MobX offers a simple way to connect reactive data to the user interface. It’s based on three main concepts – Observables, Actions and Reactions. The reactive data is easily connected to the UI through a state management library. Its design makes state management very easy by reactively detecting all the changes and propagating those to the required UI. It automatically tracks what is being used or consumed, known as observables. The key feature is that all changes are automatically tracked in the observables without any explicit connections. Developers need not worry about keeping the UI and data in sync. - GetX: GetX is an extra-light and powerful state management solution for Flutter and combines route management, state management, navigation and intelligent dependency injection. It offers complete decoupling of View, presentation logic, dependency injection and business logic. It is one the easiest, practical, secure and scalable way to build applications with Flutter, offering a wide range of APIs and features for developers to build apps faster. The dependency injection feature makes app development easier as developers don’t need to depend on context, route, or widget tree. - Cube: The Cube library uses dependency injection with the need for code generation. It objectively simplifies state management and minimizes the code complexity by rebuilding the widget tree as needed. Object-oriented state management is the application’s focus, reducing the coding complexity. Besides these state management libraries, some other libraries are: There is no definitive guide to deciding what to use and when. State management use depends on the application and its developers. Each technique has its pros and cons. The Flutter community is constantly evolving, and there will be many changes, additions, and deletions. Flutter’s growth can be attributed to its capability to create fast and attractive user experiences for the web, mobile and desktop using a single codebase. Using Flutter application development services to design and develop apps can help add value to app development for any business.
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100551.17/warc/CC-MAIN-20231205105136-20231205135136-00401.warc.gz
CC-MAIN-2023-50
6,483
16
http://www.710studios.com/blog/does-inbound-happen-online-or-in-person
code
I have a draft blog post I've been working on for a few weeks now, but I can't seem to distill my thoughts. I'm trying to write about the balance of Inbound happening online vs. in-person. Some people produce good content online, but when you meet them in person, they are pushy or "salesy". Some people are fantastic in person, but when you look them up online, they don't live up to the expectations or simply don't exist. I read Seth Godin's blog everyday. Today, he wrote a more eloquant version of what has been swirling around in my head.
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593655934052.75/warc/CC-MAIN-20200711161442-20200711191442-00370.warc.gz
CC-MAIN-2020-29
544
2
https://www.linkspropeller.com/find/puyo-puyo-sun-characters
code
Puyo Puyo (Video Game) - TV Tropes Sun mode, originating in Puyo Puyo Sun, has Sun Puyo drop when a player offsets Garbage Puyo. Clearing Sun Puyo powers up your chains, but due to how they fall like Garbage Puyo, they can often be more harm than help. In addition, the screen has 2 hidden rows instead of 1, which allows for a maximum 20-chain, instead of Tsu's 19-chain. DA: 48 PA: 7 MOZ Rank: 52
s3://commoncrawl/crawl-data/CC-MAIN-2021-17/segments/1618039563095.86/warc/CC-MAIN-20210422221531-20210423011531-00162.warc.gz
CC-MAIN-2021-17
398
3
http://assignmentwritingservice74840.blogkoo.com/details-fiction-and-coursework-assignment-help-9867699
code
Details, Fiction and coursework assignment helpAdvisors help learners who wrestle academically or have questions about alternatives obtainable immediately after PathwayConnect. A network diagram dependant on the Assessment with the task management, gantt charts are designed in accordance Along with the undertaking. Edgenuity’s self-paced Finding out and pretesting let pupils to invest a lot more time on what they will need and fewer time on content material they’ve by now mastered. Program articles might be tailored to satisfy the standards of your university or district. You should post any clinical or other reports of this nature to the Examination centre administration Place of work nicely ahead of time from the Test session. Reports: it commonly includes presenting investigation and Examination of an issue, in conjunction with recommending actions and creating proposals. Scenario scientific studies: it is actually an in-depth investigation in excess of a provided timeframe. Exactly what is the difference between Edexcel and CIE I/GCSE's? There is absolutely no variation in the level or degree of problem among the IGCSEs made available from Edexcel and CIE. The variations are only in just how queries are requested as well as format on the tests. Introduction to various things to do that intend to watch and Handle many pitfalls of a given company or Business, While using the help of specified reviews and also techniques. Obtain Watch Sample So cease fretting presently and deliver us your dilemma with other unique specifications, and in no time a well-prepared coursework are going to be delivered to your doorstep. Programming Laptop architecture assignment help computer graphics assignment help spss assignment help animation major knowledge catia r programming assignment help r studio assignment help python programming Java sql stata information and facts system details movement diagram assignment help knowledge Assessment Pc community assignment help c programming assignment help running technique archicad Professional medical childcare overall health science nursing nursing circumstance study assignment help biotechnology assignment help Reflective Nursing Assignment Help Teaching and coursework really should be entered into your BFIS credential account. Northern Lights is billed with verifying and coming into your documented Qualified development into your BFIS Credential account. They get this info in two means: Assignment Solutions situation study assignment help my assignment help do my assignment eviews assignment help fix my assignment literature assignment help purchase my assignment literature evaluation make my assignment click here now enhancing expert services tafe assignment help minitab assignment help check this site out m in addition assignment help media microeconomics mass conversation assignment writer Assignment Help 300+ Study Writers: Our crew of impressive writers could be the epitome of producing capabilities, enthusiasm, expertise and, higher than all, the interest to execute the analysis study and put together fantastic papers. A variety of elements such as the branding impact and many other that are chargeable for generating a particular selection of purchasing cellphone handsets in London. Download Check out Sample The amount of GCE/International A-amounts should I choose? This is determined by the reasons for which you are using A-ranges. In case you are taking them for Source a stepping stone into a UK College, then the number you take will depend upon just what the university involves or the volume of UCAS points you might want to go into your course. The most common mixtures call for 3 full A-amounts.
s3://commoncrawl/crawl-data/CC-MAIN-2019-04/segments/1547583684033.26/warc/CC-MAIN-20190119221320-20190120003320-00036.warc.gz
CC-MAIN-2019-04
3,706
14
https://www.instructables.com/community/need-help-with-understanding-an-instructables-sch/
code
need help with understanding an instructable's schematic Answered I'm not very good at understanding schematics I guess, and am trying to understand the schematic at https://www.instructables.com/image/FT6P10TGTTUHASZ/Assembly.jpg . I've created a rough translation of it at https://www.instructables.com/files/deriv/FQV/10DS/GU2QYOY1/FQV10DSGU2QYOY1.MEDIUM.jpg . Can someone fill in the polarities at the question mark locations and confirm that my interpretation of the wiring intersections is correct please? I'd appreciate any help available. Thanks!?
s3://commoncrawl/crawl-data/CC-MAIN-2021-17/segments/1618038056869.3/warc/CC-MAIN-20210410105831-20210410135831-00500.warc.gz
CC-MAIN-2021-17
555
4
https://apple.stackexchange.com/questions/46914/how-to-solve-the-overscan-issue-if-the-imac-is-connected-to-an-hdtv-and-using
code
Are you sure you need to have a software solution within Windows? Many HDTVs let you adjust current display settings to disable the overscan. See PCWorld - Tech Trend: For HDTV, Don't Overlook Overscan. Quote: If you don't see every pixel you should see, you're not viewing a true 1920 by 1080 progressive-scan picture. The name of the viewing mode differs from brand to brand, but it's commonly called Dot-by-Dot, Point-to-Point, Just, or simply Overscan Off. To add to that, on my own HDTV, choosing "Studio" under the Aspect setting has the effect of eliminating the overscan. I've also seen it called simply "PC" on another TV, and "Just Scan" on another. Check your HDTV's settings ... chances are it has something like this and you aren't aware of it. Though, admittedly there are some HDTVs without such a capability (sadly) and for these you'll need to find a solution that lets you reduce the resolution output to the HDTV. Update: I found the following article explains well both the issue and troubleshooting steps: Windows Experts Community - Configure Your Display and Display Adapter. Plus: some folks have successfully replaced the Apple video drivers in their Bootcamp Windows with ATI drivers, in order to access settings to compensate for the HDTV overscan. See this blog post: Apple Macbook Pro (Early 2011) running Bootcamp Windows 7 with ATI / AMD Catalyst Control Center. Got ATI video in your Mac? Worth a shot perhaps, if you do. Take a backup before messing with drivers, of course.
s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590347391923.3/warc/CC-MAIN-20200526222359-20200527012359-00020.warc.gz
CC-MAIN-2020-24
1,507
9
https://duncanbloorconsulting.com/2011/11/04/new-years-resolutions/
code
Recently, I’ve noticed a group of search terms that can be classified as ‘self improvement’ type searches. For instance, whilst looking into what languages people wanted to learn online, I noticed that pretty much all of them had a surge of interest in the first week of the new year. I decided to look at all of these searches together to see what the overall most searched for new year’s resolution was and if this corresponds to any other data. I grouped the ‘self improvement’ searches together into 5 categories… and then popped them into Google insights for search… **Yellow = Job** **Green = Money** **Blue = Weight** **Purple = Gym** **Red = Learn** (I did include ‘volunteer’ as a group and searches did peak in January for this term however the number of people searching for it was so low, you could barely make it out on the chart). You can see they all have peaks in January but what is interesting here is the effects of the recession, first pointed out to me by www.nicholine.com in her paper looking at the recessions effect on search behaviour. If you notice every year, searches including the term ‘jobs’ not only had the biggest overall volume but also the biggest difference in volume between the year as a whole and the spike in January however last year this appeared to drop off dramatically and almost get overtaken for the first time by ‘money’ searches… **yellow = searches for ‘jobs’** and **green = searches for ‘money’** My interpretation of this is that fewer people were seeking to change career in the new year last year, looking to hold on to what they had during a gloomy outlook whilst more people were interested in ‘money’ whether that was saving, not spending or earning. Steady learning and rising weight People searching to learn a new language or skill in the new year have remained steady since 2004 and yet people looking to lose weight in the new year have slowly climbed in a very consistent way since 2004 with last year being a particularly high peak, coinciding with the relatively high number of increased ‘gym’ searches. How they compare It’s difficult to find reliable data online however this report from Marketing Charts seems to back up our findings whereas this from bing suggests fitness is first (although they don’t mention whether or not they actually looked at any finance related data. US searches for new years resolutions All the above data was looking at UK searches however if you compare them to searches in the US, you can see that weight is a much (weightier) concern… Again, **Yellow = Job** **Green = Money** **Blue = Weight** **Purple = Gym** **Red = Learn** Interesting to see also in this case that whilst searches for ‘weight’ inc weight loss etc are a lot higher than the UK, searches for the gym are actually a lot smaller comparatively – do you want to tell them or shall I? I love getting and answering questions so feel free to comment using the form below.
s3://commoncrawl/crawl-data/CC-MAIN-2017-51/segments/1512948522999.27/warc/CC-MAIN-20171213104259-20171213124259-00088.warc.gz
CC-MAIN-2017-51
2,994
19
https://gbssystems.in/aws-iot-events-detects-changes-in-sensor-data-automates-responds-aws-iot-events-is-now-generally-available-on-amazon-web-services-inc-s-aws-cloud-it-is-a-fully-managed-service-that-joins-a-po/
code
- Malfunctioning machinery - Stuck conveyor belt - Slowdown in production - Robot arm misaligned - Detected motion after hours - Temperature changes due to freezer door not sealing properly - Motor operations that exceed tolerance levels The company stated that the service will simplify the process of responding to such events. AWS announced that it will be detecting events using data from thousands of devices. This requires companies to write code to analyze the data, deploy infrastructure to host code, and secure the architecture from the end-to-end. This is undifferentiated heavy lifting that customers don’t want to do. Customers can now easily detect such events using AWS IoT Events. They can analyze data from one sensor, thousands of IoT sensors, and hundreds of equipment management apps in real-time. AWS spokesperson Jeff Barr wrote a post about the new service that explains how to get started. The service can be accessed via the AWS IoT Event console or code that leverages AWS IoT Events API. However, he chose to use the console route to show an example. He said that detector models can be created quickly to represent your devices, their states and the transitions (driven both by events and sensors) between them. The models can trigger actions when important events are detected, which allows you to create robust, highly-automated systems. For example, actions can send a text message or invoke an AWS Lambda function. The service is available in the US East, US East (Ohio), US West(Oregon) regions and EU (Ireland). It costs per message evaluation.
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224652207.81/warc/CC-MAIN-20230606013819-20230606043819-00110.warc.gz
CC-MAIN-2023-23
1,580
8
https://github.com/ThinkUpLLC/ThinkUp/pull/562
code
unmarked issue: changed the config class constructor to private instead of public changed the Config constructor to private for singleton pattern Thank you for the pull request! I'll also make the update to Logger when I merge this. yay!!! my first commit to any opensource sw :) umm I just thought of this. did you mean I should do it? I can rebase and make the update in a minute but am not sure if it would show up in this pull request. should I make the changes and give you another pull request? Made the Config & Logger constructors private since they are singletons Closed by 4bd27eb
s3://commoncrawl/crawl-data/CC-MAIN-2016-36/segments/1471982291592.14/warc/CC-MAIN-20160823195811-00243-ip-10-153-172-175.ec2.internal.warc.gz
CC-MAIN-2016-36
590
7
https://synthiam.com/Community/Questions/Foscam-F19831p-Useage-With-ARC-ARC-Mobile-5155
code
I searched on the forums for Foscam Posts and found some good ones. However, the setup doesn't work for me. I know the IP Address of the IP Camera and it is on the same network that my robot is on. I entered the IP address into the camera selection field in ARC and started the camera but no video stream. I have the Foscam camera set to JPEG Snapshot Mode. Any help would be much appreciated. The Foscam F19831 has pan/tilt and IR LED on/off functions. From the posts that I read it should be possible to control these functions as well as view the stream in ARC for Windows, but have no idea where to start. I guess the first step would be to get the video stream to display. I'm not that well versed on networking and using HTTP commands to control the camera. Again any help would be appreciated. I saw some examples of HTTP command lines but not sure how they work or how to use them? Once I get everything worked out, will it be possible to do the same thing in ARC Mobile and then connect in client mode and do port forwarding and control camera stream and functions in Mobile application? Are there plans in the future to support other cameras in the future as it seems from the community there is a lot of interest in this feature. In the future I will be purchasing an IRobot Create 2 and will control it with the EZ-Bv4 or newer version coming out soon. I will have both the EZ-Robots camera on the robot for steering and video recognition things that it does quite well and then I will have the Foscam F19831P IP camera on the robot for surveillance purposes. Will not have both cameras on all the time. I will also have other EZ-Robot items on board including an arm with gripper, etc. Will have RGB Animator Display, plus other odds and ends. would like to be ale to control both cameras from one Mobile App over the internet. Would only be using one camera at a time. Thanks Much For Your Help and Assistance ! Rick B. Upgrade to ARC Pro Get access to the latest features and updates with ARC Early Access edition. You'll have everything that's needed to unleash your robot's potential! Here is a result of other threads with foscam conversation: http://www.ez-robot.com/Community/Forum/Search?query=foscam&page=1 I read the two links above and good information. However not very savvy with network stuff and http & https. I'm still just trying to get the video stream to even show up in ARC pc. I use a program called tiny cam pro with the foscam ip camera that is connected to my network and it works well. If I check the camera details it shows an ip address that it is using in the app. I put this ip address in ARC camera setup screen and select start and no video. Interesting thing is that if I enter the ip address into ie browser url on my laptop also connected to my network, and try to open and display the camera video it does not display. Seems it only wants to display video using tiny cam pro on my cell phone. Seems same ip address for camera in cell phone app should work on any computer/robot connected to my network at the same time? With regards to the robot does the robot need to be in client mode and attached to my wifi network for this scenario to work? Seems that it does. I thought I tried this and it still didn't work My cell phone is connected to my wifi and when I put the url for the ip cam reported by the tiny cam app into the cell phone browser directly, I can't get video to display. Video does display on cell phone in tiny cam app. Not sure what is going on? However, the ARC PC app will support any camera you can throw at it. It will work with either USB or Jpeg snapshots. The information is in the camera manual page near the bottom. Here is a direct link, or accessed by pressing the ? (question mark) next to the X (Close) of the camera control: http://www.ez-robot.com/Tutorials/Help.aspx?id=80 Of course your robot will need to be in client mode for your PC computer to access other devices. That is how networking works. You cannot connect to your neighbors computer when connected to your network. Much like you cannot connect to my computer when connected to your network. Networks are only connected with routers. EZ-Robot is not a router. client mode connects your robot to your network - that way all devices are accessible from your PC. I thought of a way to use the ezb camera and foscam on the irobot create platform at the same time. I can use the ez-robot cam to do the driving and for color/object detection and use the cell phone app to access ip cam when I want to look around in a particlar room for say security purposes. That way I can control both cams via the internet easily. Will just need to switch apps on cell phone. When not used primarily as security robot I can remove the Ip cam completely and use ez-robot/other tidbits. The Ip cam has higher resolution and ir leds built in. Also get good response over internet using 4G connection on android phone. What do you think of this concept?....Rick
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296946584.94/warc/CC-MAIN-20230326235016-20230327025016-00141.warc.gz
CC-MAIN-2023-14
4,983
16
http://www.papermodelers.com/forum/camis-projects/18310-1953-cadillac.html
code
Originally Posted by rockpaperscissor Extremely well done, Cami. How are you selecting your colors? A quick google search came up the the color chips for the 1953 Cadillac here: http://http://paintref.com/cgi-bin/c...dillac&rows=50 You probably already use this site or something similar, but I thought I'd throw it out there. I heard about painteref.com, but so far I used that link:AutoColorLibrary Color Chip Selector . It is pretty much the same. I aslo use pictures of real cars because original charts are sometimes a little off because of the aging process. Finally, I make my own photoshop charts based on pictures and original charts to get the closest colors. Altough, colors on my pictures are not exactly as on the models.
s3://commoncrawl/crawl-data/CC-MAIN-2015-48/segments/1448398449258.99/warc/CC-MAIN-20151124205409-00146-ip-10-71-132-137.ec2.internal.warc.gz
CC-MAIN-2015-48
734
5
https://www.dk.freelancer.com/projects/sharepoint/uipath-sharepoint-project/?ngsw-bypass=&w=f
code
The developer has to work with the Sharepoint and i have a package which we can use sharepoint activites and have perform certain actions according to the use-case like downloading the pdf files and updating the date of the pdf files and etc . It should be done using uipath 2 freelancere byder i gennemsnit ₹1050 timen for dette job i am RPA ENGINEER. if you want to so this project i will do it.i have 2+ years experience and worked lot of projects [login to view URL],sharepoint browser automation etc…. You will get formal development
s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320303747.41/warc/CC-MAIN-20220122043216-20220122073216-00014.warc.gz
CC-MAIN-2022-05
542
4
https://www.chiefdelphi.com/t/bot-repeated-dying-at-regionals-can-someone-review-the-code/70314
code
Team 95’s robot repeated would die during autonomous mode. The bot would stop, the color LED would go out, and the radio would go offline until the RC was power-cycled (not even a reset). We were not able to recreate this in the pit (even after getting permission to test with the radio), and replacing radio and cable didn’t help. During the Friday matches, an IFI representative first thought that it had to be a code error and helped us review our wiring (as did a few people from other teams). On Saturday, after being dead in the middle of autonomous, he followed up saying that it looked more like a problem with the master controller, and suggested an RC swap. However, of three different RCs loaned to us, the first two had issues (the first wouldn’t accept code uploads and appeared to be an un-upgraded 2004 RC, the second showed the 8.2 Volt problem (with the default code!) mentioned in another thread, and the third finally worked properly, although our last match had passed by then). I’m going to call IFI tomorrow, but I thought it might be good if I got another set of eyes to look at our code, since I can’t see any issues there. The current code we’re running is Kevin’s frc_gyro code (compiled to use an ADXSR300 instead of the the kit gyro), a PID controller to control rotation (so that the bot drives straight and controllably), and some basic mapping of inputs from controllers to pwms. No real rocket science here, and since the first tme our bot errored out, we don’t even have any camera code, shaft encoders, or anything complicated like that. However, since most teams haven’t competed yet, I don’t want to openly release the code (although most anything interesting has already been posted). But if your team has already competed, or you’re willing to have some discretion with the code, and you’re willing to look over the code to see if there is anything wrong, could you PM me or email me at [email protected]? We’re playing again at Palmetto, and would like our bot to actually function instead of sitting there motionless. As I said, both our programmers and the IFI rep think it was a problem with our RC, but I’d like to make sure it’s not a code error causing this. Edit: By the way, we saw this problem with both the original FRC_library.lib and the updated version released the other day on the IFI site.
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296819067.85/warc/CC-MAIN-20240424045636-20240424075636-00291.warc.gz
CC-MAIN-2024-18
2,374
7
https://noeffclue.blogspot.com/2011/08/introduction-of-sorts-part-1.html
code
Learning to program can be a very daunting task. It doesn't seem that way at first, of course, but once you dive in you finally get to see what it's all about. It's like being a parent. No one can prepare you for being a parent. I realize that phrase is getting cliche but that makes it no less true. Your kids can make you incredibly happy and unbelievably angry. You're tired all the time. You get no time to yourself. You're delirious with frustration and lack of sleep. Same with programming. Well, except having no time for yourself. You get a lot of that. Like most kids, my life with computers started with video games. The problem is, the more you play the more critical you become. "These graphics suck!" you say, and "That's a terrible bug! How did this junk ever get out the door?" Eventually, you might even think, "I can do better!" So, you put your money where your mouth is and here you are. Programming. Ya, not so easy is it? First off is language choice. Now, if you decide to pursue programming as a career and head to college or university your choices are narrow. You basically get to pick whatever it is your school curriculum decides to teach first year students. But, if you're like me and went to school to attain some other degree or didn't go to school at all, you'll find out that the choice isn't a simple one. There are literally hundreds of languages for all kinds of tasks which are all perfect for you! Which one is right? Which should I pick first? I wish I could help you. There's no easy answer and I have neither time or desire to help. Sorry. Now, I did happen to putter around with BASIC when I was in high-school and I tinkered with a rather obscure language called LPC. I did happen to take a first year programming course in college in which I was introduced to C which was remarkably like LPC. Later on I took a Visual BASIC and second year C++ courses. I did well with Visual BASIC but I failed miserably in the C++ course, dropping out early in the term. To program you need to be in the right frame of mind. You need to be ready for the world of programming as much as it needs to be ready for you! "Look out world! Here I come!" BLAM! Right into a brick wall. That's how it is. If you expect it to be easy, think again. Anyone who says that it is, is either a liar or a genius. Smart money is on the former. Many years down the road I decided to give programming another go. I still played with LPC a bit but now I wanted to do "real" programming (to understand why I felt this way, perhaps check what LPC is used for). My path lead to me back to C, and this time, I was ready.
s3://commoncrawl/crawl-data/CC-MAIN-2019-09/segments/1550247494125.62/warc/CC-MAIN-20190220003821-20190220025821-00026.warc.gz
CC-MAIN-2019-09
2,624
5
https://www.softwaretestinghelp.com/data-warehouse-testing-tutorial/
code
This Tutorial Covers Goals & Significance of Data Warehouse Testing, ETL Testing Responsibilities, Errors in DW and ETL Deployment in detail: In this In-Depth Data Warehouse Training Series, we had a look at the What Is ETL Process in Data Warehouse in detail in our previous tutorial. This tutorial will give you an understanding of how Data Warehouse Testing can be accomplished in an organization. You will also get to know about the goals of DW testing, how and what kind of testing can be performed at the backend, who are all involved in this process, DW errors and ETL deployment in detail. - Data Warehouse/ETL developers and testers. - Database professionals with basic knowledge of database concepts. - Database administrators/Big data experts who want to understand Data Warehouse/ETL concepts. - College graduates/Freshers who are looking for Data Warehouse jobs. What You Will Learn: Data Warehouse (ETL) Testing What is the significance of testing Data Warehouse and Business Intelligence systems? Testing plays a critical role in the success of any of the above two systems, by ensuring the correctness of data that builds the faith of end-users. In general, a defect found at the later stages of the software development life cycle costs more to fix that defect. This situation in the DW can be worsened because the wrong data found at the later stages might have been used in important business decisions by that time. Thus, the fix in the DW is more expensive in terms of process, people and technology changes. You can begin the DW testing right from the requirements gathering phase. A requirement traceability matrix is prepared & reviewed, and this mainly maps the DW features with their respective business requirements. The traceability matrix acts as an input to the DW test plan that is prepared by the testers. The test plan describes the tests to be performed to validate the DW system. It also describes the types of tests that will be performed on the system. After the test plan is ready all the detailed test cases will be prepared for various DW scenarios. Then all the test cases will be executed and defects will be logged. There is a standard in the operational world that maintains different environments for development, testing, and production. In the DW world, both the developers and testers will make sure that the development and test environments are available with the replica of production data before starting their work. This is copied for a list of tables with limited or full data depending on the project needs, as the production data is really large. The developers develop their code in the developer’s environment and deliver it to the testers. The testers will test the code delivered in the testing environments to ensure if all the systems are working. Then the code will go live in the production environments. The DW code is also maintained in different versions based on the defects fixed in each release. Maintaining multiple environments and code versions helps to build a good quality system. Goals Of Data Warehouse (ETL) Testing Let’s take a look at the Goals Of Data Warehouse Testing. #1) Data Completeness: Ensure that all data from various sources is loaded into a Data Warehouse. The testing team validates if all the DW records are loaded, against the source database and flat files by following the below sample strategies. - The total number of records count uploaded from the source system should match the total number of records loaded into DW. If there is a difference then you can think about the rejected records. - Compare the data loaded into each field of DW with the source system data fields. This will bring out the data errors if any. #2) Data Transformation: While uploading the source data to the Data warehouse, few fields can be directly loaded with the source data but few fields will be loaded with the data that is transformed as per the business logic. This is the complex portion of testing DW (ETL). Below are the sample strategies to test this: - You can test by creating and comparing data in spreadsheets. Load the source transformed data and DW data into spreadsheets and do a comparison. There should not be any mismatch. - Testers should write the queries as per the transformation logic to compare the DW data with the source data. Query execution will guarantee that the data validation for any of the fields is not missing. #3) Data Quality: Data warehouse (ETL) system must ensure the quality of the data loaded into it by rejecting (or) correcting the data. DW may reject a few of the source system data based on the business requirements logic. For Example, reject a record if a certain field has non-numeric data. All the rejected records are loaded into the reject table for reference. The rejected data is reported to the clients because there is no chance of getting to know about this missed data, as it will not be loaded into the DW system. DW may correct the data by loading zero in the place of null values etc. #4) Scalability and Performance: Data warehouse must ensure the scalability of the system with increasing loads. With this, there should not be any degradation in the performance while executing the queries, with anticipated results in specific time frames. Thus performance testing uncovers any issues and fixes it before the production. Below are sample strategies for Performance and Scalability Testing: - Do the performance testing by loading production volumes of data and ensure that the time frames are not missed. - Validate the performance of each query with bulk data. Test the performance by using simple joins and multiple joins. - Load double (or) triple to the volumes of data expected to calculate the capacity of the system approximately. - Test by running jobs for all the listed reports at the same time. #5) Integration Testing: Data warehouse should perform Integration Testing with other upstream and downstream applications. If possible, it is better to copy the production data into the test environment for Integration Testing. All system teams should be involved in this phase to bridge the gaps while understanding and testing all the systems together. #6) Unit Testing: This is performed by the individual developers on their deliverables. Developers will prepare unit test scenarios based on their understanding of the requirements, run the unit tests and document the results. This helps the developers to fix any bugs if found, before delivering the code to the testing team. #7) Regression Testing: Validates that the DW system is not malfunctioning after fixing any defects. This is performed many times with every new code change. #8) User Acceptance Testing: This testing is performed by business users to validate system functionality. UAT environment is different from the QA environment. The sign off from UAT implies that we are ready to move the code to production. From the Data Warehouse and Business Intelligence system perspective, business users can validate various reports through a User Interface (UI). They can validate the report specifications against the requirements, can validate the correctness of data in the reports, can validate how quickly the system is returning the results, etc. DW Testing Flow Diagram: Data Warehouse Testing Responsibilities Enlisted below are the various teams involved in delivering a successful DW system: - Business Analysts: Gather all the business requirements for the system and document those for everyone’s preference. - Infrastructure Team: Set up various environments as required for both developers and testers. - Developers: Develop ETL code as per the requirements and perform unit tests. - QA (Quality Assurance)/Testers: Develop test plan, test cases, etc. Identifies defects in the system by executing the test cases. Perform various levels of testing. - DBAs: DBAs take charge of converting logical ETL database scenarios into physical ETL database scenarios and also involve in performance testing. - Business Users: Involve in User Acceptance Testing, run queries and reports on DW tables. Errors In Data Warehouse When you are Extracting, Transforming and Loading (ETL) data from multiple sources there are chances that you will get bad data that may abort the long-running jobs. Following are the key causes of failure in the DW system: #1) Business Rule Violations (Logical Errors): Logically wrong data violates the business rules. Such data can be handled mostly during transformation or loading phases. #2) Data Rule Violations (Data Errors): Data errors occur inside the DW database system like data type mismatches, data constraint failures, etc. This is the phase where all your efforts go live. All the production support documents should be prepared. The documentation will tell others about the sequence of jobs to run, failure recovery scenarios, training materials to the DW support teams to monitor the system after deployment and to the administrative support team to execute the reports. We learned about the Goals of Data Warehouse Testing, ETL Testing Responsibilities, Errors in DW and ETL Deployment in detail in this tutorial. We hope you got an idea of how detailed testing can be done in a Data Warehouse (ETL) System.
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510368.33/warc/CC-MAIN-20230928063033-20230928093033-00424.warc.gz
CC-MAIN-2023-40
9,278
60
https://it.toolbox.com/blogs/locutus/computers-have-stagnated-093019
code
When I got my first computer my voice was sounding like I was in a yodelling competition or applying for a supporting role in Heidi the musical. The computer though, that was, for a personal computer, state of the art. Around that time, if you wanted your own personal computer you pretty much got a bag of components, an Ikea type of instruction manual and built it yourself. The input was some switches and the output was blinking lights. My computer had a built-in keyboard and connected to a monitor. Even better! It had an inbuilt cassette deck for loading and saving programs. Nothing I had seen at that time ever came close to it with its Z80 CPU and massive sixteen kilobytes of RAM. It was on that computer where I started to learn programming as it had an inbuilt BASIC interpreter. Actually, that is all it had. That was the operating system and I had to peek and poke my way around the memory to get the hardware to talk. There were some inbuilt commands to load and save stuff to the cassette and the normal BASIC commands but that was it. This continued on with my second computer which was even better as it had dual disk drives, a 6502 CPU and used the DOS operating system. It was a huge leap up from my first computer and the manual which came with it was extensive, to say the least. These days you would be lucky to get a leaflet with any new computer. Unfortunately, as I had to move cities and I was young and stupid I sold that computer. Fast forward a couple of years without computers and living from hand to mouth I managed to get back into computers again. This time as a career. It was at this time that I was introduced to the Intel architecture which was the 386 CPU, before the addition of a maths co-processor. With the exception of my smartphone and a stint with AMD CPU's I have been pretty much like everyone else and stuck with the x86 range of CPUs. I still remember those days clearly, especially the days I low level formatted an MFM hard drive and let the pixie smoke out of 486 CPU when I plugged it in the wrong way. The very first computer of the Intel architecture I owned was a 486SX motherboard on a piece of polystyrene foam as I couldn't afford a case at that time, but it worked and I didn't fry it with static electricity. Since those days, however, computers have gotten faster with more RAM, cores, storage space and the operating systems have gotten prettier (while using up all of that extra CPU power, RAM and storage space so a new computer still feels just as slow as one from decades ago). Yet, if you were to manage to find a computer of thirty years ago and it actually works then compare it with a brand new computer of today you would find that there is really no difference between them. Physically they look pretty much the same. There is a monitor, a computer case (which some people call the hard disk) a mouse and a keyboard. Sure the styling is a lot more refined, same as a car from the nineteen sixties looks very different from the same model manufactured today. The mechanics, so to speak, are still exactly the same. The way the computer is used is also not much different. There is the email programs, the word processing programs, the games and even internet access. There are chat programs (I still hear the IRC chime in my dreams). The same functionality there was decades ago is still here today (yes, they had cat videos in those times as well). It also used the same methods of manipulating the programs and heck, I can pretty much guarantee the same keyboard shortcuts are still used. Sure the programs look very different, they look more polished and have a few more features that nobody ever really uses. Just like a Mustang from the nineteen sixties compared to a Mustang of today. They look very different yet they still don't have much difference in perceived speed. For example, a Mustang in the late sixties had a top speed of one hundred and thirty-seven miles an hour. A Mustang built in two thousand and eighteen has a factory limited speed of one hundred and fifty-seven miles an hour. In five decades there is really not that much difference in speed. Same goes with computers. The hardware is much faster and has more resources yet the operating system limits the speed. If you were to measure the time it takes Windows to start you would see that the earlier versions of Windows actually start much quicker than the most recent ones. A quick google of operating system boot time benchmarks will bring up a website which shows that out of the twenty-one operating systems tested, Windows 98se was the fastest in booting with Windows 7 coming in at number eighteen. Just goes to show that newer is not always better. You would think that in three decades, especially with the rate of computing technological advancement, the computing experience would be much better than it is now. Yet here we are, faster hardware, more modern operating systems and we still have to hurry up and wait just as much. The keyboards we use are of less quality than they used to be and while we no longer have to clean mouse balls we still have to use a mouse. That is why I say that computers have stagnated, technically they have moved ahead in terms of speed and resources but the user experience has stayed the same or in some cases, gone backwards (I mean, really, who likes the ribbon toolbar?). We still access the computer in the exact same way. There is no easier way yet created to allow us to interact more easily with the computer. Not everyone is a touch typist and it does get very painful to watch someone trying to type something into the computer when they don't know how to type. I think it is about time that computers and the way we interface with them are brought into the twenty-second century. What do you think? How could we better interface with computers? Tell us your thoughts in the comments below.
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585371665328.87/warc/CC-MAIN-20200407022841-20200407053341-00390.warc.gz
CC-MAIN-2020-16
5,899
10
https://community.bt.com/t5/Archive-Staging/Rewiring-to-move-Home-Hub-5-to-Office/td-p/1342013
code
I recently moved into a new build built by Bovis and had BT infinity installed this week. The master point was in the hallway so the Home Hub 5 was installed there. It would be more convenient for me to relocate it to the office if signal loss isn't too bad. Taking apart the master point I see one Cat5e attached to the BT part of the master point using the blue, blue/white pair. I also see another Cat5e with the same pair attached to the lower part of the master point. There is nothing attached to the "extension" pins. Each room has one or more phone sockets. The office has 3 and my pictures should how they are wired. Now I would assume that the Cat5e wired to the bottom part of the faceplate - i.e. the non-BT part is chained through the phone ports. Thanks for any help. Simple answer, no. On the extention side the signal has alredy passed through the integrate BB filter. Looks to me like the extensions have been kroned onto the (unfiltered) AB terminals on the ssfp (not 2 & 5) on the faceplate. if so you need to make sure any extensions with phones in have a micrfilter attached If the extension you want to use in the office is the first one after the NTE and your happy for all the other extensions to be left out of the equation ------ then you could do it quite easily (lucky as well it's cat5) - otherwise it would be quite a faff. Give it a try 'as is' - pop the hub5 in an the extension you want to use and check the stats before and after in the helpdesk section of the hub if the sync rate drops a lot and the snr shoots up then youll need to hav a rethink
s3://commoncrawl/crawl-data/CC-MAIN-2021-49/segments/1637964358323.91/warc/CC-MAIN-20211127223710-20211128013710-00395.warc.gz
CC-MAIN-2021-49
1,582
10
http://lwn.net/Articles/487280/
code
Right. I guess majority of my pushes are smallish single-commit ones, which IMHO do not warrant visible merges (I guess this depends a bit on the project and the workflow, though). For bigger stuff I normally do what you desribed (though often they don't get visible merges either, if I send them via email to upstream who then uses git am). And after thinking about this a bit more, while I run "git pull --rebase" very often, most times it is on the upstream-tracking branch so "git pull" should actually work just the same. That is, unless I've made some quick fix commit in the upstream-tracking branch before send-emailing it (when I've forgotten to create a branch for it), in which case "git pull" would do a merge while "git pull --rebase" would usually drop the local one. As said, though, that shouldn't happen :)
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368703326861/warc/CC-MAIN-20130516112206-00012-ip-10-60-113-184.ec2.internal.warc.gz
CC-MAIN-2013-20
823
3
http://ps-2.kev009.com/tl/techlib/manuals/adoclib/aixprob/prbslvgd/respscrn.htm
code
Respond to and recover from screen messages by doing the following: The setsenv command displays the protected state environment when you logged in. Determine if the DISPLAY variable has been set. In the following example, the DISPLAY variable does not appear, which indicates that the DISPLAY variable is not set to a specific value. SYSENVIRON: NAME=casey TTY=/dev/pts/5 LOGNAME=casey LOGIN=casey DISPLAY=bastet:0 export DISPLAY If not specifically set, the DISPLAY environment variable defaults to unix:0 (the console). The value of the variable is in the format name:number where name is the host name of a particular machine, and number is the X server number on the named system. The stty sane command restores the "sanity" of the terminal drivers. The command outputs an appropriate terminal resetting code from the /etc/termcap file (or /usr/share/lib/terminfo if available). ^J stty sane ^J The ^J represents the Ctrl-J key sequence. Go back to Terminal Problems.
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224650409.64/warc/CC-MAIN-20230604225057-20230605015057-00650.warc.gz
CC-MAIN-2023-23
972
10
https://www.minecraftforum.net/members/7Arach7/reputation
code
Quote from julialy You're welcome! :-) You've made his day, you're making my day…you're making everyone's day! I would like (if it's not already in) the ability to completely disable the waypoint system, as I have a minimap that does it better (because that's it one and only purpose, compared to the amount of things this does.) Also, have you completely taken mod over?
s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320300244.42/warc/CC-MAIN-20220116210734-20220117000734-00170.warc.gz
CC-MAIN-2022-05
373
3
https://devblogs.microsoft.com/oldnewthing/20190722-00/?p=102724
code
What was the code name for Windows 7? A retrospective on Windows code names gave Blackcomb as the code name for Windows 7. That’s not quite correct. The code name for Windows 7 was… Windows 7. Windows XP was code named Whistler, which was the name of a city in British Columbia best known for its ski resort, also commonly referred to as Whistler. During this time, the code name given to “The version of Windows to come after Whistler” was Blackcomb, which is the name of a second mountain in the same resort, slightly further down the road. However, so much work had been pushed into the Blackcomb release that it was clear that it couldn’t all be done in one release cycle, so selected portions were extracted into an interim release code named Longhorn, which is the name of a bar situated between the Whistler and Blackcomb mountains. Longhorn was the code name for Windows Vista. You might conclude, therefore, that Blackcomb was the code name for Windows 7. But you’d be wrong. So much work had been postponed into the Blackcomb project that it wasn’t so much a project as a wish list. - Whistler: Learn to play Für Elise. - Longhorn: Learn to play Träumerei. - Blackcomb: Learn to play all of Beethoven’s piano sonatas, both of Brahms’s piano concerti, and while you’re at it, Ravel’s Gaspard de la nuit. The scope of work that was marked as “Blackcomb” was so large that it was effectively meaningless. So it was all thrown out, and a new project started from scratch. That project was code named Windows 7, based on the fact that Windows Vista’s programmatic version number was 6.0, and since this was the version to come next, the natural choice would be to call the next version 7.0. (Though that’s not what it ultimately shipped as.) It was generally understood that this was just a code name, and the marketing department would give it a splashy name when the time came. And when that time came, the marketing department decided that the splashy name was just the code name we’d been using all along. Windows 7 released to manufacturing ten years ago today. Now you’ve got me curious if the code name for Windows 10 was “Windows 9”. Also, is “Blackbomb” an intentionally derrogatory term that was used internally, or is that just a typo for “Blackcomb”? Oops, typo. But now that you made a joke out of it, I can’t just fix it or the joke won’t make sense. Eh, I fixed it. People will figure out the joke. (By the way, the code name for Windows 10 was “Threshold”.) This is what I explain to people: Windows Vista was version 6.0 Windows 7 was 6.1 => 6 + 1 = 7 Windows 8 was 6.2 => 6 + 2 = 8 Windows 8.1 was 6.3 => 8 + 1 = 9 and 6.3 = 9 That makes Windows 10 the logical successor to Windows 8.1 and 1 + 0 = 1 => There will be only one Windows version forever Kinda reminds me of Cairo… Yeah, Cairo and Longhorn had some really promising technology incubating. But Cairo gave way to Chicago (which was pretty good IMO), while Longhorn gave way to, well, Vista (I still have a bad memory of a hidden Xbox admin account on my machine causing UAC locking me out of damn near everything….I had to email my SAM file to someone @microsoft to unlock it!) Now Raymond will have to correct this, but the rumors I heard:Cairo – So named because the ideas suggested for it were “exotic”.Chicago – Because an early demo was at a conference in Chicago, later retrofitted as “just that far to Cairo” (i.e, as Seattle to Chicago is about 1/5th the distance Seattle to Cairo, win3 to w95 would be 1/5 the changes of win3 to Cairo)Memphis (win98a as a recall), mostly a media/audio updates, but I like the idea of it be “old world Cairo”. How much of the Blackcomb plans have since happened or are planned, or in the works now? Still the best version of Windows ever 🙂 “Blackcomb”? 🤷♀️ The majority of news outlets report “Vienna” to be Windows 7’s codename. Apparently, someone called Robert Scoble, who worked as an “evangelist” for Microsoft, said it. Also, not sure what “Träumerei” or “Gaspard de la nuit” are. Never heard of Ravel or Brahms before either. Quite frankly, I know as much about music terminology as Beethoven knew about the -Recipe switch of Add-WindowsCapability in PowerShell. There was usually a codename for the version after the one that you were currently working on, so things could be postponed to that future version. So Blackcomb was originally the version after Whistler, but Longhorn got put into the middle. As that stretched on, the plans for Blackcomb were no longer meaningful. So the next version got a new codename, Vienna. By the time Longhorn was wrapping up and planning began for the next version, the accumulated Vienna plans were also no longer relevant. So by the time Windows 7 development began, the codename was “Windows 7”. Of course, early in-development releases of Windows 7 had the beautiful branding of ‘Windows (R) Code Name “Windows 7″‘. The only time I set foot on Microsoft campus was when I interviewed for a job there in 2003 (which I did not get). There was some material there referring to the next Windows Server. I asked if that was “Blackcomb” and was told it was not. I found this curious because at the time the official story was that “Longhorn” would only be a client OS and “Blackcomb” would still be the next server release. They said that “Longhorn Server” was indeed a thing. I was pretty excited to have this bit of insider information, despite it not really affecting me in any way. I don’t remember when the existence of “Longhorn Server” was officially announced. As for Windows 7, I remember some confusion about what the codename was with Vienna/Seven (splled out) often being reported together. Random chatter: Windows ME also had a codeename similar to its final release name (Milennium vs Milennium Edition) Windows Server 2008 (Longhorn Server) was not released at the same time as Windows Vista RTM. Just like Windows Server 2003/XP x64 and Windows XP x86, but different. Windows Server 2008 SP1 was the first public non-beta version and released at the same time as Windows Vista SP1. This way Windows Server 2008 and Windows Vista were build from the same code branches, unlike Windows XP x86 and Windows Server 2003/XP x64. However Microsoft did ran her website on Windows Server 2008 before SP1, and if I recall correctly so did a few Microsoft partners like Dell.
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296950383.8/warc/CC-MAIN-20230402043600-20230402073600-00281.warc.gz
CC-MAIN-2023-14
6,491
41
https://www.thedifferenceengine.tech/job/senior-ruby-developer/
code
Senior Ruby Developer required by our London based client to work in a multi-disciplinary agile team. The successful Ruby Developer will demonstrate the following:- - Ruby on Rails experience mandatory for the role - You will be predominantly a Ruby expert - Strong skills in front end or back end web development (or both) - Able to quickly get to work within a multi-disciplinary team of developers, designers, editors, and analysts . - Build web and mobile products to serve a variety of users' needs. - Implement APIs for internal and external use. - Build up a useful, robust automated test suite to support a Continuous Deployment environment. - Share knowledge of tools and techniques with the wider team, both developers and non-developers. Take part in 2nd-line support of applications and platforms Promising candidates are encouraged to apply. Promising candidates can be assured of a response within 24 hours. This is a government contract that will require security clearance : BPSS/ DBS. The role sits OUTSIDE of IR35, so Ltd company contractors are encouraged to apply.
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323587915.41/warc/CC-MAIN-20211026165817-20211026195817-00657.warc.gz
CC-MAIN-2021-43
1,084
12
https://sites.duke.edu/experienceopportunities/2021/05/26/remote-apollo-development-technical-project-manager/
code
Work as a technical project manager for Apollo Development, a technical development company. You will lead a small team (usually of 2-5 software engineers, data scientists, and graphic designers) on various interesting medium length projects (usually 3-12 months). Previous projects include data modelling for a medium sized private jet company, web app/machine learning work for the department of defense, and a web/mobile application for an innovative beverage company. Fully remote. You’ll be kept on retainer and offered various projects. If you’re interested and find the terms (pay and hours) amenable you can start leading immediately. You’ll be responsible for: Coordinating/communicating with the client Leading weekly meetings between your team and the client Keeping your team on a timeline to meet the client’s expectations Development product roadmap Making technical decisions with the engineering team and relaying them to the client Coordinating decisions between product design, engineering, and the client Apply at: https://airtable.com/shrPC84ZkjF5cPz0
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510924.74/warc/CC-MAIN-20231001173415-20231001203415-00460.warc.gz
CC-MAIN-2023-40
1,079
10
https://enhanceui.gumroad.com/l/chatgpt-starter-template
code
Starter Kit for using OpenAI with GPT3 and all its models similar to ChatGPT. SALE 80% OFF (NEXT FEW OF DAYS ONLY $99) Then back to $500 Learn More: https://youtu.be/bB7xkRsEq-g?t=55s The project comes with a Frontend web interface and backend with a database ready to go with all the requirements you would need to create your own project. - Login / Signup - Prompts and Tools - Backend Database - Frontend ReactJS - NodeJS project under Express using API's This starter kit is made for demo and use purposes as a way to kickstart your own project. No responsibility is made for debugging, bugs, security or issues which will need to be applied at your applied as your responsibility. See below for examples, other features include: - Styling uses Tailwindcss - API uses Express with JWT - Stripe is pre-configured (but disabled) if you want to include billing - Credit calculator implemented on token usage This starter template is over 100 hours of work over several weeks, and should save you lots of time if you're planning to build or try to test your own projects! *I wrote this project over a 6 month period with tens of thousands of lines of code, be aware some of the dependencies are using older versions (eg react router dom with Switches!)
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296816904.18/warc/CC-MAIN-20240414223349-20240415013349-00218.warc.gz
CC-MAIN-2024-18
1,252
17
https://globalsupportservices.palettesoftware.com/da/support/solutions/articles/75000007548-why-do-i-get-the-error-message-arithmetic-operation-resulted-in-an-overflow-
code
When you get the message "Arithmetic operation resulted in an overflow" in the invoice log, it's because the invoice fulfills the following criteria: - The flow proposal has the box Manager role checked - There is no role in the flow that has enough authorization amount to final sign the invoice - There is no manager role on any role in the chain that build the flow, that has enough authorization amount to final sign the invoice When you get this message in the invoice log, you need to check the flow proposal. Go through the roles in the flow and make sure that there are manager roles set on each role, and that at least one role in the chain has a general authorization amount high enough to sign the invoice in question. If you feel uncertain about how the Manager role function works, we suggest you read up on it in the user guide.
s3://commoncrawl/crawl-data/CC-MAIN-2020-10/segments/1581875144722.77/warc/CC-MAIN-20200220100914-20200220130914-00014.warc.gz
CC-MAIN-2020-10
842
6
https://dvnetwork.org/projects/tech-uplift-for-akal-academies-in-rural-punjab
code
Elevate Learning: Urgent Tech Uplift Needed for Rural Akal Academies. We're addressing a critical cause beyond traditional funding – our rural Akal Academies urgently need a tech uplift, specifically 100 computers. This stems from a needs assessment, revealing technological gaps hindering students' progress. With updated CBSE SOPs for labs, it's crucial to equip our academies. Your support empowers students with digital tools, bridging the tech gap and enhancing their education. Make a direct impact by contributing to our mission of advancing education through technology. Each dollar you contribute significantly supports the tech uplift initiative, amplifying its reach and impact.
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100909.82/warc/CC-MAIN-20231209103523-20231209133523-00030.warc.gz
CC-MAIN-2023-50
691
3
https://time-journal.com/25-most-valuable-brands-in-the-world/16/
code
Brand value: $ 28 billion Change for the year: + 4% Advertising expenses: $ 55 million Oracle Corporation is an American multinational computer technology corporation, headquartered in Redwood City, California. The company primarily specializes in developing and marketing database software and technology, cloud engineered systems and enterprise software products—particularly its own brands of database management systems. In 2011 Oracle was the second-largest software maker by revenue, after Microsoft. The company also develops and builds tools for database development and systems of middle-tier software, enterprise resource planning (ERP) software, customer relationship management (CRM) software and supply chain management (SCM) software.
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510462.75/warc/CC-MAIN-20230928230810-20230929020810-00000.warc.gz
CC-MAIN-2023-40
750
5
https://derekrharlan.com/?p=419
code
We commonly use Excel’s comment or note function to explain formulas or where the cell values come from. But, have you ever wanted to put this information in the formula bar itself? Sometimes it’s more helpful to document our formulas and data right where the user is reading them. Enter Excel’s N function. The N function converts it’s parameter to a number. This is not to be confused with the VALUE function which converts text to number values. The N function will convert any text given to it to the value zero. If that doesn’t sound useful, keep in mind the additive property of zero anything added to zero is the original value. With this in mind, you can use this function to insert comments into the formula. For example if you had a formula to give an annual average and increase it by 3% your formula might be =AVERAGE(A1:A12)*1.03+N(“Returns a 3% increase in the average”). This use is shown in the featured image. Switching in Formulas Another interesting property of the N function is the way it converts TRUE or FALSE values. N will return the value 1 for a TRUE or 0 for a FALSE. Considering the multiplicative properties of 1 and 0 we can use this to create switches in our formula. A switch is where an operation is included in the final result if it’s multiplied by 1. For Example, this formula would result in the value 2 =(2*N(FALSE))+(2*N(TRUE)) if you expanded it it would be (2 x 0) + (2 x 1), change the first FALSE to TRUE and the value will increase to 4. With some careful workbook design, the N function can be used to replace nested IF statements which would serve a similar purpose. Let’s look at a more sophisticated example. The sample workbook features quarter ending dates and the date of the current workpaper. By simply changing the workpaper date the Year To Date amortization updates appropriately. I’ve also used the comment N technique described earlier to demonstrate that use. The N function is deceptively powerful. On the surface it would be easy to dismiss, but with a little ingenuity and careful workbook design it’ll allow you to simplify your workpapers and provide great documentation in the formula bar. Do you want to get started with VBA? Want to learn how to automate your financial workpapers? My book, Beginning Microsoft Excel VBA Programming for Accountants has many examples like this to teach you to use Excel to maximize your productivity! It’s available on Amazon, Apple iBooks and other eBook retailers! Download the sample workbook (Excel 2010 and higher):
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100942.92/warc/CC-MAIN-20231209170619-20231209200619-00745.warc.gz
CC-MAIN-2023-50
2,545
9
https://www.thebreakroom.org/threads/no-training-at-all-for-flow-members.6575/
code
I have been working at target as a morning flow member since last saturday (8 days) and I have some questions about what I should know by now. We received no training outside of how to read a pick label and determine the dpci( but i don't know secondary locations unless i can see them in plain view, not on endcaps). I still don't know how to use the pda to find something for a guest or if ill get a pda anytime soon. I don't know where to go to pick up a shipment, I don't know how to unload the truck, what to do with back stock, i don't know what repacks or instocks are. I am trying to ask questions, but I don't want to seem too eager or something. First can someone please tell me from the beginning lets say a customer comes in and asks where the plungers are. How would I go about finding that if I don't have a pda on me and all I know is it probably is in the home improvement section. And can someone also tell me if I do have a pda how to search for the plunger and tell her an approximate location?
s3://commoncrawl/crawl-data/CC-MAIN-2021-25/segments/1623488553635.87/warc/CC-MAIN-20210624110458-20210624140458-00626.warc.gz
CC-MAIN-2021-25
1,013
1
https://community.emlid.com/t/remote-control-on-navio2/19550
code
I came here to ask for some help regarding my project in which i want to have a remote control from navio2 on my mobile application. I want to create a server application that runs on raspberry and gives commands to the drone using the python api, on sockets, preferably, which communicates with a client application (Flutter). Is there any support gived by navio board or it is equipped with such possibilty in order to achieve this. To be mention that the configuration is a Rasp PI4 B with Navio2. Any support in this direction or documentation will help me a lot.
s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590347410535.45/warc/CC-MAIN-20200530231809-20200531021809-00526.warc.gz
CC-MAIN-2020-24
567
1
https://gitlab.linphone.org/BC/public/external/libvpx/-/tags/v0.9.5
code
2010-10-28 v0.9.5 "Aylesbury" Our first named release, focused on a faster decoder, and a better encoder. - Upgrading: This release incorporates backwards-incompatible changes to the ivfenc and ivfdec tools. These tools are now called vpxenc and vpxdec. vpxdec * the -q (quiet) option has been removed, and replaced with -v (verbose). the output is quiet by default. Use -v to see the version number of the binary. * The default behavior is now to write output to a single file instead of individual frames. The -y option has been removed. Y4M output is the default. * For raw I420/YV12 output instead of Y4M, the --i420 or --yv12 options must be specified. $ ivfdec -o OUTPUT INPUT $ vpxdec --i420 -o OUTPUT INPUT * If an output file is not specified, the default is to write Y4M to stdout. This makes piping more natural. $ ivfdec -y -o - INPUT | ... $ vpxdec INPUT | ... * The output file has additional flexibility for formatting the filename. It supports escape characters for constructing a filename from the width, height, and sequence number. This replaces the -p option. To get the equivalent: $ ivfdec -p frame INPUT $ vpxdec --i420 -o frame-%wx%h-%4.i420 INPUT vpxenc * The output file must be specified with -o, rather than as the last argument. $ ivfenc <options> INPUT OUTPUT $ vpxenc <options> -o OUTPUT INPUT * The output defaults to webm. To get IVF output, use the --ivf option. $ ivfenc <options> INPUT OUTPUT.ivf $ vpxenc <options> -o OUTPUT.ivf --ivf INPUT - Enhancements: ivfenc and ivfdec have been renamed to vpxenc, vpxdec. vpxdec supports .webm input vpxdec writes .y4m by default vpxenc writes .webm output by default vpxenc --psnr now shows the average/overall PSNR at the end ARM platforms now support runtime cpu detection vpxdec visualizations added for motion vectors, block modes, references vpxdec now silent by default vpxdec --progress shows frame-by-frame timing information vpxenc supports the distinction between --fps and --timebase NASM is now a supported assembler configure: enable PIC for shared libs by default configure: add --enable-small configure: support for ppc32-linux-gcc configure: support for sparc-solaris-gcc - Bugs: Improve handling of invalid frames Fix valgrind errors in the NEON loop filters. Fix loopfilter delta zero transitions Fix valgrind errors in vp8_sixtap_predict8x4_armv6(). Build fixes for darwin-icc - Speed: 20-40% (average 28%) improvement in libvpx decoder speed, including: Rewrite vp8_short_walsh4x4_sse2() Optimizations on the loopfilters. Miscellaneous improvements for Atom Add 4-tap version of 2nd-pass ARMv6 MC filter. Improved multithread utilization Better instruction choices on x86 reorder data to use wider instructions Update NEON wide idcts Make block access to frame buffer sequential Improved subset block search Bilinear subpixel optimizations for ssse3. Decrease memory footprint Encoder speed improvements (percentage gain not measured): Skip unnecessary search of identical frames Add SSE2 subtract functions Improve bounds checking in vp8_diamond_search_sadx4() Added vp8_fast_quantize_b_sse2 - Quality: Over 7% overall PSNR improvement (6.3% SSIM) in "best" quality encoding mode, and up to 60% improvement on very noisy, still or slow moving source video Motion compensated temporal filter for Alt-Ref Noise Reduction Improved use of trellis quantization on 2nd order Y blocks Tune effect of motion on KF/GF boost in two pass Allow coefficient optimization for good quality speed 0. Improved control of active min quantizer for two pass. Enable ARFs for non-lagged compress This tag has no release notes.
s3://commoncrawl/crawl-data/CC-MAIN-2021-31/segments/1627046154466.61/warc/CC-MAIN-20210803155731-20210803185731-00557.warc.gz
CC-MAIN-2021-31
3,604
2
http://openriaservices.net/blog/post/The-Open-RIA-Services-Blog/11/At-the-moment-Open-RIA-Services-is-87-cross-platform/
code
At the moment, Open RIA Services is 87% cross platform Categories: Open RIA Services, General Other articles by:ColinBlair Colin Blair One of the main goals for Open RIA Services is to make it cross platform. You should be able to use the native client across any .NET platform. The development plan for accomplishing this is really complicated, sophisticated, and technical process. This process uses the following steps: - Branch the code - Manually convert projects to Portable Class Libraries - Fix compilation errors where possible - Repeat steps 3 and 4 as often as needed until code simple can't be made cross platform - Strip code that isn't cross platform out and move it into platform specific support libraries - Write new HttpClient based service layer to talk to Web API based DomainController I know, that sounds as sophisticated as trying to fix my phone by hitting it with a rock until it works. What I didn't say is that I already know most of the code that is not going to compile. How? Xamarin told me. What I find must astounding is that without doing anything we are 98% compatible with iOS. We apparently just need to strip out the CollectionViewSource code and we are ready to support the iPhone. I am sure that in practice the reality will be much more complicated, but having some hard numbers before we even have code is still reassuring. The piece of RIA Services that actually communicates with the server, the System.ServiceModel.DomainService.Client.Web.dll in WCF RIA Services, is at 82% compatibility. We are replacing it completely with a new HttpClient based service layer so I didn't include it in the above analysis. In case you are wondering (for purely academic curiosity of course), the server dlls of RIA Services are 67% cross platform, mostly hamstrung by Windows Phone and WIndows Store not supporting ASP.NET.
s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656103943339.53/warc/CC-MAIN-20220701155803-20220701185803-00456.warc.gz
CC-MAIN-2022-27
1,853
14
https://discourse.omnigroup.com/t/workflow-when-using-a-today-perspective/26186
code
Previously I used perspectives to group contexts together into a view of things that I can do at a certain place. “Computer”, “Anywhere”, “Office” all go into the perspective “Office”. I’ve been fairly successful with this so far but lately the amount of tasks that can be done in each context increased by a bit. I now have multiple projects inside “Computer” that all show up. I have a rough prioritisation in my head and follow that when doing the tasks in that perspective. I recently read that a lot of people have a “Today” perspective which collects flagged and due tasks that are schedule for that day. I’ve been wondering how you guys are filing what should be done today. Do you take these tasks at the beginning of the day out of the perspective that is appropriate? Say if I’m in my office perspective, do I pick the Today tasks from that? What when contexts change? In the morning I was at Home and flagged things for the day that I wanted to do at home. Now I’m in the office and flagged some more things. All of that shows up inside “Today” and not just whatever is appropriate for the given context which increases noise. I’d love to hear some thoughts. The first thing that I work on are all of my overdue and due tasks. I created a Due perspectives that shows due soon tasks grouped by due date. The overdue/due today tasks are located at the top and have a red status circle. The due soon tasks comes next with a yellow status circle. The rest have the standard gray status circle. I try to work on the topmost items first (overdue and due today). These are the highest priority. Then work on some due soon (yellow status circle) so that I can get ahead of things as they come down the line. Optionally, I will go to the flagged perspective and work on flagged tasks. At the beginning of each week, I look for available tasks and flag a small handful of tasks that don’t not have a due date but are items that I would focus on for the next week. These are important for me to flag and it shows up in the flagged perspective. I will go to the flagged perspective as a medium priority. I won’t work on the flagged tasks until I have gotten my overdue/due today tasks done. Some folks like to show due and flagged to combine the due perspective and flagged perspective. But I would suggest having it sorted or grouped by due date. This will make all due tasks go to the top of the list. I think that the most important part of workflow is not in choosing what should be done today, but in hiding all the things that can’t or won’t. Placing projects you know you aren’t going to act on now on hold and deferring tasks you know you’re not going to move on is, I think, vital to keep the list of available options at a reviewable minimum. In this way, much like @wilsonng, I review available tasks in the morning and flag the ones I will do that day (based on GTD constraints of what contexts I will be in, time required, energy available, and relative value).
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764499744.74/warc/CC-MAIN-20230129144110-20230129174110-00396.warc.gz
CC-MAIN-2023-06
3,023
15
https://pohnicomputerproblemas.com/rg-sry501430-c/Import-private-key-in-certificate.html
code
Import an existing SSL certificate and private key for Wowza Streaming Engine Prerequisites. To use an existing SSL certificate you must configure the Wowza Streaming Engine JRE to use the keytool... Convert the certificate and private key to PKCS 12. You can't directly import private key. Rename key file to match the certificate file name, e.g. mycert.pem and mycert.key, where mycert.pem is public certificate file and mycert.key is private key file. And place them in same folder. Then run the following certutil.exe command: . certutil -mergepfx mycert.pem mycert.pfx You can convert your certificate using OpenSSL with the following command: In Windows, you can have private keys by themselves. Programmatically, you use CryptAquireContext () to access a key by name. The CryptoAPI contains many functions which allow you to import and use keys, independently of certificates Import private key and certificate into java keystore. #ssl. #devops. #java. From time to time you have to update your SSL keys and certificates. In some cases you may have a mixed infrastructure e.g. normal http servers and tomcat or other java based servers How to create a Private Key, CSR and Import Certificate on Microsoft Azure KeyVault (Cloud HSM) Article Number: 000070629 Purpose: How to create a Private Key, CSR and Import Certificate on Microsoft Azure KeyVault (Cloud HSM) Requirements 1. You must have an active Microsoft Azure account. 2 Right-click Personal and select All Tasks > Import. 3. The Certificate Import Wizard appears This is required because Java's keytool utility does not allow you to import a private key and certificate from individual files. To do this, run the command below: openssl pkcs12 -export -in <certfile> -inkey <keyfile> -out <keystorefile> -name tomcat -CAfile <cacertfile> -caname root. where <certfile> is the path to the file that contains the certificate you wish to import, <keyfile> is the. Use the RACDCERT IMPORT command to import a digital certificate (with its associated private key, if present) from a z/OS® PKCS #11 token and add it to RACF®. The IMPORT function processes certificates in the same way as the ADD function with regard to re-adding and renewing certificates, replacing keys, and determining the trust status of certificates If the certificate you will import is part of a certificate chain, it is a best practice to import the entire chain. From the enterprise CA, export the certificate and private key that the firewall will use for authentication. When exporting a private key, you must enter a passphrase to encrypt the key for transport But if you have a private key and a CA signed certificate of it, You can not create a key store with just one keytool command. You need to go through following to get it done. Step 1. Create PKCS 12 file using your private key and CA signed certificate of it. You can use openssl command for this. openssl pkcs12 -export -in [path to certificate] -inkey [path to private key] -certfile [path to. If you have a .pfx file, and you wish to extract the certificate and private key, then the following commands achieve that effect, and the output by default is PEM (BASE64) which ISE understands: Extract Private Key from .pfx. openssl pkcs12 -in Client-cert.pfx -nocerts -out key.pem -nodes . Extract Cert from .pf You then import the certificate to the server, which then logically binds the private and public key together. If I understand your question correctly, you already have a certificate issued to another server. You want to be able to export that cert and import that into ISE, like you would do for a Wildcard cert. If so, what you would need to do is export the certificate and key from that. . OpenSSL and Java never quite seem to get along. OpenSSL, in addition to being the primary library used for SSL functionality in open source as well as commercial software products, is also a set of tools used to create all of the peripheral SSL-related artifacts such as X.509 certificates Start MMC and add the certificate snap-in. Right-click the Let's Encrypt certificate and click All Tasks. Click Export. Click Next. Export is this time selectable. Click Yes, export the private key and click Next. Check the following checkboxes: Include all certificates in the certification path if possible Upload a certificate to Key Vault. Sign in to the Azure portal and navigate to the Key Vault. If you do not have a Key Vault set up, you can opt to create one in this same window. Select Access polices. Ensure the access policies include the following property: Enable access to Azure Virtual Machines for deployment; Select Certificates. Select Generate / Import. Complete the required. To export the private key portion of a server authentication certificate. On the Start screen, type Internet Information Services (IIS) Manager, and then press ENTER. In the console tree, click ComputerName. In the center pane, double-click Server Certificates. In the center pane, right-click the certificate that you want to export, and then. When importing a certificate for usage in IIS, it is generally required to use the machine key_storage option, as both default and user will make the private key unreadable to IIS APPPOOL identities and prevent binding the certificate to the https endpoint IMSVA will import the certificate and private key together. IMSVA supports just the private key with RSA format headers and footers, as shown in the following:-----BEGIN RSA PRIVATE KEY----- -----END RSA PRIVATE KEY-----The private key should be converted. Follow these steps: Run the following command: # openssl pkcs12 -in yourcert.p12 -out yourcert.key -nocerts # openssl pkcs12 -in yourcert. .pfx file (PKCS#12 format) in order to import it into IIS. Use the following OpenSSL command: openssl pkcs12 -export -out output.pfx -inkey Unencrypted_Private_Key.pem -in Issued_Certificate.cer -certfile CACert.cr Click Import and verify if key was succesfully imported by pressing the tab View Entries the new key to search. A new entry with your key name must appear on the list. Step 8. From now on your applications (including adapter modules and custom adapters) running on top of the SAP NetWeaver Java Application Server can use (certificates, public and private keys) keys stored on the. Purpose: Recovering a missing private key in IIS environment.For Microsoft II8(Jump to the solution)Cause:Entrust SSL certificates do not include a private key. The private key resides on the server that generated the Certificate Signing Request (CSR). When installed correctly, the Server Certificate will match up with the private key as displayed below:If the private key is missing, the. . Jave Virtual Machines usually come with keytool to help you create a new key store. generate a Certificate Signung Request (CSR) for the private key in this JKS If your private key is in PKCS12 format, you can add it to the key/cert database with. pk12util -i keyfile.key -d/path/to/database -W password. If it's in PEM format, you'll need to convert it to PKCS12 first by. openssl pkcs12 -export -out server.pfx -inkey server.key -in server.crt -certfile CAcert.crt Prepare the Private Key Method 1: The Auto-activate feature Method 2: The CSR code was generated elsewhere Download the certificate files Create the PFX file Import the PFX file Install the certificate This article explains the SSL installation process for Windows-based servers when the CSR (Certificate Signing Request) and the corresponding Private Key were not.Read mor To store a certificate into a different key database format or to a different system with its private key, the certificate must be exported from the source system into a PKCS #12 format file (See Copying a certificate with its private key for more information). PKCS #12 files are password-protected to allow encryption of the private key information You simply need to import the certificate (issued by our CA) into the windows keystore and everything should be ok. If you cannot find the enrolment request here, it seems certain that your security settings did not allow our application to generate the private key. In this case, please carry out the following steps: 1. Revoke the recently issued new certificate at Odette CA 2. Inform the. Verify the certificate doesn't have it's private key. In the MMC and double-click the recently imported certificate. (Be sure that you're using the Certificate Snap-In for the Local Computer account!) Note: In Windows Server 2008 it will be the certificate missing the golden key beside it. Right-Click on the certificate and click Delete From the left navigation of your app, select TLS/SSL settings > Private Key Certificates (.pfx) > Import App Service Certificate. Select the certificate that you just purchased and select OK. When the operation completes, you see the certificate in the Private Key Certificates list. Important . To secure a custom domain with this certificate, you still need to create a certificate binding. Importing server and private key in Oracle wallet ERIC BELMON You want to create a wallet containing your server cert and private key provided by your PKI administrator as a yourcert.p12 file This certificate was imported into a SSL PSE and used for HTTPS access. In certain landscapes, the same certificate should be imported in a different server or device (e.g. a reverse proxy). In order to import the certificate into the other server/device, you also need the private key from the PSE. How to export the private key from the SSL PSE Generate a CSR from an Existing Certificate and Private key. Here we can generate or renew an existing certificate where we miss the CSR file due to some reason. Here, the CSR will extract the information using the .CRT file which we have. Below is the example for generating - $ openssl x509 in domain.crt-signkey domain.key -x509toreq -out domain.csr. Where -x509toreq is specified that we. Wednesday Tidbit: PowerShell's Import-PFXCertificate Removes the Private Key. I've been working on a complex automation solution recently in lab, and one task was to import a certificate to be used by VMware Horizon. Those familiar with Horizon will know that any certificate used will need to have its corresponding private key which will. When we associate a private key of type RSA to a X509Certificate2, by using X509Certificate2.CopyWithPrivateKey(RSA rsa), the returned certificate has a private key, but when added in a X509Store, it is stored without its private key.. This behavior only happens when the private key is of type RSA and not one of its derived types such as RSACng or RSACryptoServiceProvider This is why, when you export a certificate with private key and then import it again, you again get to make the choice if you still want the private key exportable on that machine. Second, as far as generating a request is concerned, the template pre-cooks and recommends certain settings and attributes, but at that stage they're not enforced by the underlying engine (CertEnroll.dll). Later the. The server to which you import the certificate w/private key must be tied to an AD domain with a domain controller (DC). On the File to Export page, click Browse. In the Save As window, locate and select the certificate file that you want to export and then click Save. Finally, on the File to Export page, click Next. Make sure to note the filename and the location where you saved your file. If. How to replace the Access Server private key and certificate. There are two options that an Administrator can use for importing signed SSL Certificates into OpenVPN-AS: Method 1: You can import the certificates using the Web Server page in the Admin UI, import webserver CA Bundle, Cert and Key, then click Validate . to ensure that the server accepts the new certificate: Method 2: You can. It is possible to enroll to a user account, export to pfx, import to computer store, however, it is something like a temporary workaround, not a complete solution and you leave private key material in multiple stores. > And we are not making the certificates on the client side, we make them our own environment and then deploy them to customer servers. and thus misusing the PKI. Keys shall be. It makes perfect sense to re-use the same private key if it matches a certificate that has been signed by a CA, for example (otherwise, the cert would have to be re-issued too), which may happen when changing the implementation of the server (e.g. Java-based server to Apache HTTPD or a reverse proxy). Converting from one format to another doesn't mean you have to be careless. - Bruno May 13. You need both the public and private keys for an SSL Certificate to function; therefore, if you need to transfer SSL server security certificates from one server to another, you need to create a .pfx backup. The instructions on this page explain how to do the following tasks: Back up your SSL Certificate on a working server. Exporting/Backing Up to a .pfx File. Import the SSL Certificate to. . For added security, you can use an HSM to secure the private keys used in SSL/TLS decryption for: SSL Forward Proxy —The HSM can store the private key of the Forward Trust certificate that signs certificates in SSL/TLS forward proxy operations. The firewall will then send the certificates that it generates during. Another reason why you might not find a private key in your downloaded ZIP-file is that an existing CSR (keypair) was pasted while creating your certificate. In this case, you would have your own private key stored somewhere on your server An existing private key and certificate generated by a trusted Certificate Authority (CA) cannot be imported by keytool, at least not in the format traditionally provided by CAs. Not only must the unique private key be imported into the keystore, in some instances the root CA certificate and any intermediate certificates (referred to as a certificate chain) must be included, and more. Key Pair Features. Generate RSA, EC and DSA key pairs with self-signed X.509 certificates. Apply X.509 certificate extensions to generated key pairs and Certificate Signing Requests (CSRs). Import key pairs from PKCS #12 files. Import key pairs from PKCS #8 private key/certificate combination files. Import key pairs from Microsoft PVK private. Choose Yes, export the private key and include all certificates in certificate path if possible. Warning: Do not select the delete private key option. Leave the default settings and then enter your password if required. Choose to save the file and then click Finish. You should receive an export successful message. The .pfx file is now saved to the location you selected. Importing from a .pfx. To fix this problem, simply install your certificate to try to pair it with its private key. In the DigiCert Certificate Utility for Windows©, select your SSL Certificate and click Install Certificate . After your certificate is installed, check the certificates status again. If the Caution Sign is gone, close the utility and then configure. So, when you export an SSL certificate, its private key is copied to an encrypted file on the local server. Under the Available Snap-Ins column, select Certificates and click Add. Choose Computer Account and click Next. Now select Choose Local Computer and hit Finish. Now close the Add Standalone Snap-in window and click OK on the Add/Remove Snap-in window. Step 2: Export Your SSL/TLS. You can import an existing certificate chain and private key from a PKCS#12 file into the . Microgateway. keystore. If the Gateway uses a Thales nShield HSM, you cannot import a key when the security world complies with FIPS 140-2 level 3. To import a private key: In the Policy Manager, select [Tasks] > Certificates, Keys, and Secrets > Manage Private Keys. from the Main Menu. The Manage. Indicates a private key/certificate entry in the metadata file you want to import. Select the check box for the entries in the file you want to use. If the file contains multiple certificates, you can select more than one entry at a time Then import the client.p12 file from the previous step into the app using the Import / Import PKCS#12 menu option. Once this is done, remove the ca, cert, and key directives from your .ovpn file and re-import it. When you connect the first time, the app will ask you to select a certificate to use for the profile The Certificate and the Key are contained in the .zip file sent and that .zip file has two formats of files, .pem and .pkcs7 depending on the type of server these will be imported into. Each file has the format KEY and Certificate. You may wish to seperate out the key if your use case requires it. the KEY is in the file starting with -----BEGIN PRIVATE KEY----- and ending with -----END. To import an existing key pair: Build the certificate chain and convert the private key and certificate files into a PKCS12 file. Import the PKCS12 file into Java keystore: Finally, to complete the preparation of the Java keystore, perform the procedures for creating the server and client truststore described in the previous section If your SSL Certificate is to be installed within a hosting account it should be noted that most companies will provide a hosting control panel (such as cPanel, Plesk, DirectAdmin) and should include an SSL installation tool allowing you to provide your SSL Certificate, Private Key and additionally any required Intermediate CA Certificates SSL Certificates that are imported through MMC or IIS automatically have their corresponding private key bound to them. However, if you need to obtain the private key to install the SSL certificate on another server, you would be able to export it using a password protected file You can export a certificate (with private key) from Windows, and import it to Citrix ADC. To export a Windows certificate in .pfx format. If Windows Server 2012 or newer, on the Windows server that has the certificate, you can run certlm.msc to open the Certificates console pointing at Local Computer. Or, run mmc.exe, manually add the Certificates snap-in, and point it to Local Computer. Go. You can import an existing certificate chain and private key from a PKCS#12 file into the . API Gateway. keystore. If the Gateway uses a Thales nShield HSM, you cannot import a key when the security world complies with FIPS 140-2 level 3. To import a private key: In the Policy Manager, select [Tasks] > Certificates, Keys, and Secrets > Manage Private Keys. from the Main Menu. The Manage. Public/private keys and certificates. SSL and asymmetric encryption algorithms such as RSA (which is the default encryption algorithm of the Server) use public/private keys. Public and private keys have a one-to-one correspondence - matching public and private keys are called a key pair. Normally inside a keystore a public key comes wrapped in an X.509 certificate. Most keystore operations. One important feature to point out is embedded private keys. Certificates in Windows can also have a corresponding private key. These private keys are stored in corresponding physical stores as encrypted files. To quickly distinguish a certificate with and without a corresponding private key, look at the certificate icon. In the Windows certificate manager, if the icon simply looks like a. Import .p7b chain certificate with private key in keystore. October 8, 2015 October 8, 2015 pbaris 1 Comment. Convert .p7b file to .pem. openssl pkcs7 -print_certs \ -in file.p7b \ -out file.pem Export .pem with private key in .p12. openssl pkcs12 -export \ -name aliasName \ -in file.pem \ -inkey file.key \ -out file.p12 Import .p12 file in keystore. keytool -importkeystore \ -srcstoretype. Importing a private key/certificate. Instead of generating a key pair on the YubiKey itself, you can import an existing private key and/or certificate. To do so simply use the Import from file button in the Certificates dialog. The YubiKey PIV Manager supports importing private keys in PEM and PFX format and certificates in DER, PEM and PFX format. Note. There is no way to see that a. The Import-PfxCertificate cmdlet imports certificates and private keys from a PFX file to the destination store. New-SelfSignedCertificate The New-SelfSignedCertificate cmdlet creates a self-signed certificate for testing purposes. Using the CloneCert parameter, a test certificate can be created based on an existing certificate with all settings copied from the original certificate except for. Installing the Certificate and Private Key To establish a SSL session with the APNs, an Entrust Secure CA root certificate and the private key created through Apple's provisioning and development service must be installed on the Gateway Generate a Private Key Here are some examples: openssl genrsa -des3 -out <private key file name>.key 2048 openssl genrsa -aes128 -out <private key file name>.key 2048 openssl genrsa -aes256 -out <private key file name>.key 2048 openssl genrsa -aes256 -out <private key file name>.key 4096 The encryption algorithm and key-length can be modified as desired. Generate a CSR (Certificate Signing. In the Import CA section, go to the Certificate field and browse to the location of the root_req.pem file. Go the Private Key field and browse to the location of the root_key.pem file. In the Passphrase and Confirm passphrase fields, enter the password that you specified in Step 2. Click Import CA > OK. For information on configuring HTTPS. Certificate PFX Export and Import using AD DS Account Protection Article History (PFX) digital certificate file that includes the certificates private key, a password is typically assigned to the file to protect the private key from compromise. Several situations could result in reduced security of a PFX file secured with a password, such as: The passwords selected may be of limited length. Export the certificate file from the private key keystore. Sends the certificate to the second person. Then, the second person normally does this task: Imports the certificate from the first person into their public key keystore. Because of the way the TrueLicense software licensing process works, I'm showing one person doing all these tasks here. But if you get confused in the process, just. The firewall vendor told me I need the certificate and the private key file since I cannot generate a CSR since the certificate already exists. So I contacted the web host and they provided in text format in a chat window the 2 certificates, the one that has the Begin Certificate and End Certificate with the text in between and the one that has Begin RSA Private Key and End RSA Private. A self-signed certificate is a certificate that is signed with its own private key. Self-signed certificates can be used to encrypt data just as well as CA-signed certificates, but your users will be displayed a warning that says that the certificate is not trusted by their computer or browser. Therefore, self-signed certificates should only be used if you do not need to prove your service's. The most common cause of this issue the missing private key in the certificate. Follow the steps below to rebind the primary key to the certificate. Solution for missing certificate in IIS binding. Check if the certificate has a private key: Go to mmc and Add Certificates for Computer account; A key image should be on the certificate image. You can also check it by double clicking the. Private keys - When private keys are imported, you will receive a PGP Information pop-up that the trust values of the key must be set. To set the Trust for the key, double-click the key and click Trust in the key properties then change the value to Implicit. The key will then display a green checkmark in the Verified column. Public keys - After. HOWEVER, if you import a certificate with a private key that was exported with the TripleDES-SHA1 encryption it works. Since Windows Server 2016 is based on Windows 10 v1607, and Windows Server 2019 is based on Windows 10 v1809, that option must have been added between these versions, so: 1703 1709 1803. Does anyone knows when was this option. If you use the certreq utility to generate a CSR, the utility also generates an associated private key. The utility stores the CSR and private key in the Windows local computer certificate store on the computer on which you generated the CSR. You can confirm that the CSR and private key are properly stored by using the Microsoft Management Console (MMC) Certificate snap-in Use PuTTY Key Generator to Create SSH Public/Private Keys. Select SSH2-RSA as a key type. Click on ' Generate ' and move your mouse cursor in ' Key ' section to generate the keys based on random mouse move co-ordinates. After the required mouse movements, it will generate the random key. Click ' Save public key ' and save it as ' public_key ' name To export a certificate with the private key. Open the Certificates snap-in for a user, computer, or service. In the console tree under the logical store that contains the certificate to export, click Certificates. In the details pane, click the certificate that you want to export. On the Action menu, point to All Tasks, and then click Export. In the Certificate Export Wizard, click Yes. Click servers in the feature pane and click certificates in the tabs. Click . (More options) and select Import Exchange Certificate. A new window will show up. Insert the path to the Exchange certificate. Fill in the password field. If there is no password configured for the certificate, you can leave it empty The certificate will be generated, click Download Certificate and save the certificate in a folder . Check the settings of the certificate are correct and that the option of private key is present in the certificate . Import Certificate. Return to the management console expand the Personal Right click Certificates select All Tasks and click. On the Private Key tab, expand Key Options, and make sure Mark private key as exportable is checked. Then finish Enrolling the certificate. Export the certificate and Private Key to a .pfx file. On the NetScaler, if you want to encrypt the private key, then use the Traffic Management > SSL > Import PKCS#12 tool to convert the .pfx to PEM format I choose the Include all certificates in the certification path if possible and Export all extended properties options. I will not delete the private key at this time. Depending on your requirements, you may want to remove the key later, but I would advocate that you verify the import works correctly before removing the private key. There are no private keys or passwords in cacerts. They will contain the intermediate and root certificates of certification authorities. Java Keystore is used to store private key and the identify certificate for the server, which means that the keystore is used to store your server's credentials New certificates generated from the template will now have the key archived, which will show under Issued Certificates when you add the Archived Key column (View, Add/Remove Columns). Restore Private Key Archived . When a private key for certificate has been archived, the key can be recovered by the user who has the Key Recovery Agent certificate. In our case that you. To run recovery command. The private key ; the authority certificate (CA) Electronic file formats can be different formats x509, ASN.1, DER with different extensions .p12, .pfx, .cer, .pem or .cert . The following article lists these formats: Formats and extensions of certificate files electronic . Import a certificate ins Windows . To start the import of an electronic certificate file in Windows, two methods are. The public/private pair keys created or imported here are for using in the RSync client (jobs) service section. Plugins can use the internal database if they want to use these keys using the SSH certificates combo class. The key pair will be stored in the internal database, but only the public key will be available for display just by clicking edit. Not displaying the private key is basic ssh. 11-01-2015 06:40 AM. You cannot, the private key for the self-signed certificates and for the CSRs cannot be exported. This also means that you cannot use certs generated by a 3rd party as you cannot upload external certs with private key, which for example VCS does allow you to do. For CUCM and any other app with the same blueprint, you need.
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652663011588.83/warc/CC-MAIN-20220528000300-20220528030300-00716.warc.gz
CC-MAIN-2022-21
28,409
24
https://www.dev-metal.com/migrating-wikipedia-hhvm-scale-conference-2014/
code
Migrating Wikipedia to HHVM (@Scale Conference 2014) Awesome topic, superfresh, directly from Scale Conference 2014. The title says everthing. Full quote from video’s description: As a top 10 website, Wikipedia serves more than 500 million readers ever month. Performance is a serious challenge for the site, particularly when serving users via a legacy PHP application more than a decade old. Any action which bypasses caching, such as editing Wikipedia, takes a serious hit from the limitations of the PHP run time. To solve this problem, we decided to take on the ambitious task of migrating to a new stack centered on HHVM, a virtual machine for PHP with an associated just-in-time compiler. In this talk, Ori Livneh will walk you through the successes and failures we encountered during our migration to HHVM, and share what lessons we’ve derived for anyone seeking to improve performance of PHP applications.
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817688.24/warc/CC-MAIN-20240420214757-20240421004757-00323.warc.gz
CC-MAIN-2024-18
918
3
https://community.kaseya.com/xsp/f/142/t/19586.aspx
code
I've read the help regarding this subject and it states: Install or Upgrade Antivirus - Installs or upgrades the Antivirus client on selected machines. Many of our client's machines do not have the necessary HW requirement for Kaspersky AV version 10... and I doubt they will be keen on changing their hardware for the sake of installing Kaspersky AV version 10. The obvious answer would be to install Kaspersky AV version 6.0... but the VSA does not let you select the version 6.0. Anyone knows anything on this subject ? Is there a feature request to enable installation of KAV 6.0 ? Has anyone tried to "manually install Kaspersky AV 6.0" and run a "Connect Kaseya Antivirus" or a "Repair Antivirus Install" afterward ? Francis Germain - HTG The KAV module is only pushing and receiving installers for KES10. Kaspersky 6.0 cannot be deployed. I recommend not attempting the last option, as the lua scripts in the backend will ultimately cause licensing issues with the endpoint(s) if you attempt to 'connect' or 'repair' these manual installations. A little off topic, but how is that even possible not to meet the requirements. 2 GB hd space, 1 GB RAM, 1 GHZ processor. The only way I see this happening is if they have XP, and if they have XP that needs AV they are going to have a bad time when support runs out in 2 months and security patches cease. nsummy> My thoughts exactly. Regardless of hardware changes, the impact on the end user is what is important. We can't be installing one version of AV at one point then because of a Kaseya server upgrade have to upgrade all other modules and dependencies. It would have been nice to have the information before hand or an upgrade that still allows deployment of Kaspersky 6. The primary reason for the push to KES10 was the compatibility with windows 8/8.1 and Server 2012. Personally, for our clients if they have lower-end machines I communicate to push AVG which is 'lighter' for the end user. All of my machines are V6 with Windows 7. even the profiles are for V6. I went to install a new Machine an could NOT. THEN I found out there is a V10 AV. I didnt even know this was happening when we did a server upgrade. Do I now need to update every workstation that has V6? Please advise
s3://commoncrawl/crawl-data/CC-MAIN-2021-21/segments/1620243991258.68/warc/CC-MAIN-20210517150020-20210517180020-00082.warc.gz
CC-MAIN-2021-21
2,244
16
https://www.ibm.com/blog/announcement/whats-new-in-the-ibm-cloud-catalog/
code
We are happy to announce the latest feature capabilities related to your IBM Cloud experience, from new SDKs and catalog filtering for enterprises to Bitnami OVA images being available for your use. Catalog filtering in IBM Cloud enterprises IBM Cloud enterprises enable you to centrally govern and manage your organization’s account structure, projects, workload isolation, and much more. Now, you can use filters to customize which products in the IBM Cloud catalog are available in accounts within an enterprise hierarchy. Filters that are set at a parent account-level apply to all child-account groups and accounts. For more information, see Managing products for an IBM Cloud enterprise. We’re also adding CLI support for catalog filtering in IBM Cloud enterprises. You can now use the following commands to set and manage filters in accounts within an enterprise hierarchy: - ibmcloud catalog filter get - ibmcloud catalog filter create - ibmcloud catalog filter offering - ibmcloud catalog filter delete Each command operates the same at the enterprise level by default. You can also apply the commands to specific account groups in an enterprise. For more information, see the Catalogs management CLI plug-in. Bitnami OVA images The first delivery of the Bitnami Application Catalog to the IBM Cloud catalog happened in 2019, pulling in a number of Bitnami Helm Charts for deployment directly to IBM Cloud Kubernetes Service clusters. By combining IBM Cloud and the Bitnami application catalog, you can quickly access curated versions of the best open source software, with the testing and validation to ensure that they always run consistently and securely. We’re excited for the next phase of this delivery—Bitnami OVA images are now available in the IBM Cloud catalog! With the deployment power of the IBM Cloud Schematics service, support is now available for third-party OVA images targeting vCenter Servers running on IBM Cloud for VMWare Solutions. To quickly find the available products in the catalog, click Software and select OVA Images from the Software list. Nearly 120 Bitnami OVA images are now available to install. We now offer consulting services that aim to help guide you in transforming your business. Our consulting strategy combines expertise, tools, and methodologies to develop cloud strategies and implementation plans that align with your business goals. To check out the available consulting services, go to the catalog and click Consulting: Catalog management SDKs Four new Software Development Kits (SDKs) for the catalog management service, which includes private catalogs and software products, are now available: - The IBM Cloud Platform Services Java SDK - The IBM Cloud Platform Services Node.js SDK - The IBM Cloud Platform Services Python SDK - The IBM Cloud Platform Services Go SDK For more information, see the Catalog Management API reference. Check out the features in the IBM Cloud catalog. We are excited for your digital journey ahead.
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474573.20/warc/CC-MAIN-20240225003942-20240225033942-00458.warc.gz
CC-MAIN-2024-10
2,997
21
https://www.dice.com/jobs/detail/Direct-Client%3A-Full-Stack-Java-developer-KSN-Technologies%2C-Inc.-Lansing-MI-48901/10314943/7104517
code
Full Stack Java developer Lansing, MI - On-site One year contract This is a full-stack java developer position with strong front end skills. The position will be supporting the Michigan Department of Transportation's (MDOT) Development and Maintenance programs. This full stack developer position will be supporting the MDOT Development and Maintenance programs. As a software developer, the responsibilities include, but are not limited to, working with the project manager, application owner, and resource manager, working on an agile development team to organize work, develop, test, and deploy code. The position performs a variety of complicated tasks. The position may report directly to a project lead or manager. The resource needs to have strong front end development skills and will work with UI/UX designers in building user interfaces and responsive applications. Must have excellent communication and teamwork skills. Be self-directed, committed and a quick learner. Experience programming in the JBOSS Enterprise environment, Desired, 4 Years Experience programming complex computer systems using current JAVA, this includes using relevant IDE tools such as Eclipse/Jboss Developer Studio., Required, 7 Years. Experience programming in SQL and/or PL/SQL., Desired, 4 Years. Experience programming in projects using current Spring framework., Required, 4 Years. Experience programming in projects using Hibernate framework., Required, 5 Years. Experience participating as a programmer within an Agile development environment, Required, 5 Years. Experience programming with Spring Boot, Spring Data, and Bootstrap, Required, 4 Years. Experience programming with Log4j, Junit, and Tiles, Desired, 4 Years. Experience programming with Java 8, Required, 4 Years. Experience programming with HTML5, CSS3, and Data Tables, Required, 4 Years. Experience programming with jQuery, jQuery UI, Required, 4 Years. Experience programming with Oracle 12C or Oracle 19C, Required, 4 Years. Experience programming with Crystal Reports, Desired, 4 Years. Experience with ADA, WCAG 2.0, Section 508 compliance policies, User Experience design principles & standards, Desired, 4 Years.
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323588153.7/warc/CC-MAIN-20211027115745-20211027145745-00464.warc.gz
CC-MAIN-2021-43
2,179
21
https://git.riotingpacifist.net/JuanCanham/fresh-theme-elegant
code
Responsive resume theme for HackMyResume adapted for the FRESH schema from Mudassir's jsonresume-theme-elegant. I used Antonio Ruberto's fresh-theme-bootstrap theme as base guidelines to make this theme using the Handlebar template engine. For now this only a HTML theme. I'm open to suggestion concerning the frontend code and the UI/UX, see Contributing for more information. The sectionss currently available are: - Profile (with name, photo, label, address, phone, email, website, languages and social links) - About (with you info.brief) - Work Experience (employment) - Volunteer Work (service) - Awards (recognition) If a section is not used in your FRESH resume it will simply not be displayed All the profiles not on this list may not have an icon and will not have any custom color. How to use it Go where your FRESH JSON resume is located and run: npm install fresh-theme-elegant Then to export your resume using this template run: hackmyresume BUILD resume.json TO out/resume.all --theme node_modules/fresh-theme-elegant/ In the long term this template will support all the FRESH sections and will let the final user decide what to put in their FRESH resume. This template will also aim at supporting other languages that English. There are many ways you can help improve this theme (and most don't even require coding): - Open an issue to report a bug with the theme - Open an issue to discuss the layout of a section (or of the entire resume) and we'll find what fits best - Open an issue to request a particular section or field to be added (if you can describe how you imagine the layout it's even better) - Open an issue to request the addition of a new feature, like displaying the duration between start to end (yes it is already on my to-do list) - Fork the repo, make a new branch with your changes and make a pull request describing the changes you want to apply (bug fix, feature, section, layout, ...)
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947476452.25/warc/CC-MAIN-20240304133241-20240304163241-00447.warc.gz
CC-MAIN-2024-10
1,925
22
http://www.diydatarecovery.nl/forum/index.php?topic=534.0;prev_next=prev
code
Burned it to a CD, formatted a 8 GB USB stick with the HP tool, enabled legacy USB in BIOS. When it runs, it cannot find the USB stick to save the data. However, in later menus it "sees" the USB as a hard drive. DiskPatch showing the physical disk is something entirely different that DOS assigning it a driveletter. If you'd for example format the usb key with NTFS it will never show up as a logical drive, DiskPatch however does see the physical device. What drive letters does DiskPatch show you? Created a USB boot drive and extracted the diskpatch files to it, enabled the USB as the first boot device in the BIOS. It will not boot to the USB stick. On another computer I used F12 to select the USB stick, it still won't boot. What procedure did you follow then? If you go for the start > programs > DIY DataRecovery DiskPatch 3 > create bootable USB key for DiskPatch then you shoule end up with a bootable USB key. What needs to be done in the system BIOS to allow booting from an USB device is something you need to work out using the motherboard/PC manuals. It is a fail proof procedure, if followed correctly, that will get you an usb key that will allow you to boot and run DiskPatch straight from it. It ran at at the end said, "State File could not be saved." State file is something else than a logfile. Being able to save the state file depends upon the availability of some sectors on the harddisk. If those sectors are in use we will not create statefiles.
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368706578727/warc/CC-MAIN-20130516121618-00009-ip-10-60-113-184.ec2.internal.warc.gz
CC-MAIN-2013-20
1,474
6
http://boards.theforce.net/threads/so-im-new-here-somewhat.28481816/
code
Hows it going guys? So I used to peruse this board decades ago, like, maybe half a decade or so anyway when I was a bit younger, bet less mature. Re-read some of my old posts, gosh. Not very ka pai. But here i am now. I live in Welly, just went to the One man Star Wars Trilogy last night, it was totaly awesome. "Welcome to Wellington City Council, you're speaking with Troy" is pretty much my job description. My girlfriend and I are going over to China at the end of June for 9-12 months. And i'm a huge Star Wars geek. I vaguely remember a few names from here, Kitt (Who once sent me a copy of DF2:JK because someone pinched mine - thanks Kitt! ), JP, Acerimmer, Sithforcelord But yeah. So how is everybody, whats your saga?
s3://commoncrawl/crawl-data/CC-MAIN-2014-10/segments/1394011155657/warc/CC-MAIN-20140305091915-00071-ip-10-183-142-35.ec2.internal.warc.gz
CC-MAIN-2014-10
728
1
https://www.geotraces.org/do-you-want-to-know-more-about-iron-and-its-isotopes-this-review-is-for-you/
code
Jessica Fitzsimmons and Tim Conway (2023, see reference below) present a comprehensive review of iron and iron isotope sources, internal cycling, and sinks in the ocean, including the history of the field and the role that GEOTRACES has played in driving development of this exciting oceanic tracer. They summarise the end-member isotope signatures of different iron sources (dust, sediments, hydrothermal venting). Then, they review how the use of these isotopes contributes to improving our understanding of marine iron biogeochemistry and oceanic iron distributions: disentangling multiple iron sources, identifying the redox state of the sedimentary sources, distinguishing anthropogenic versus natural dust sources, and investigating different hydrothermal processes. They also review ways in which iron isotope fractionation might be used to understand the internal oceanic cycling of iron, including speciation changes, biological uptake, and particle scavenging. In the end, the authors propose an overview of future research needed to expand the utilisation of this cutting-edge tracer. Fitzsimmons, J. N., & Conway, T. M. (2023). Novel Insights into Marine Iron Biogeochemistry from Iron Isotopes. Annual Review of Marine Science, 15(1). Access the paper: 10.1146/annurev-marine-032822-103431
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947473824.45/warc/CC-MAIN-20240222193722-20240222223722-00188.warc.gz
CC-MAIN-2024-10
1,302
2
https://paranormalforum.net/threads/did-you.21384/page-4
code
- Aug 12, 2015 - Reaction score ah,,,ya missed out ...I am old enough to remember car hops on roller skates!I'm from Mississippi. And there's only one drive in that existed that I'm aware of, and it's exactly 100 miles to the south. I'm sure that my parents experienced the drive-in, but I never did.
s3://commoncrawl/crawl-data/CC-MAIN-2021-10/segments/1614178351374.10/warc/CC-MAIN-20210225153633-20210225183633-00622.warc.gz
CC-MAIN-2021-10
300
3
https://www.thoughtworks.com/social-change
code
We provide a platform for ThoughtWorkers to become more socially conscious, empathetic global citizens and technologists. Diversity, equity & inclusion We reject discrimination and inequality, and promote diversity in all its forms. We actively strive to make ThoughtWorks and our industry more reflective and inclusive of the society we serve. Tech for social change Technology tools can be a lever for social change. We engage with social justice organizations where we believe ThoughtWorks can provide deep value, through strategy, design and technology. Solidarity over charity Our social impact strategies are informed by our partners. Whether they are social movements or communities, we strive to align our priorities with organizational coalitions to maximise our impact. Technology is rapidly changing society. We drive conversations about privacy, equity, and inclusion. We proactively work to identify, understand, and address inequities in emerging technology.
s3://commoncrawl/crawl-data/CC-MAIN-2021-25/segments/1623488540235.72/warc/CC-MAIN-20210623195636-20210623225636-00100.warc.gz
CC-MAIN-2021-25
972
8
https://www.robustperception.io/analysing-prometheus-memory-usage/
code
Ever wondered how Prometheus is using its memory? Let's find out! Prometheus is linked with pprof, a Go profiling tool that makes it easy to look at CPU and memory usage. To use it against a local Prometheus server to investigate memory usage, ensure you have a working Go install and then run: go tool pprof -svg :9090/debug/pprof/heap > heap.svg This will produce a SVG file that you can open in your web browser. Here's an example from a small Prometheus server: local.newDoubleDeltaEncodedChunk in the bottom left here is memory used by samples, and will usually be the biggest memory user. The local.newPersistence subtree covers the metadata database. There are metrics that are useful. process_resident_memory_bytes is the amount of memory the Prometheus process is using from the kernel, while go_memstats_alloc_bytes is how much Go is using from that. A large difference between these two could indicate spiky memory usage, or fragmentation issues.
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474569.64/warc/CC-MAIN-20240224212113-20240225002113-00836.warc.gz
CC-MAIN-2024-10
957
9
https://community.alteryx.com/t5/Alteryx-Designer-Discussions/Alteryx-Performance/m-p/514424
code
This site uses different types of cookies, including analytics and functional cookies (its own and from other sites). To change your cookie settings or find out more, click here. If you continue browsing our website, you accept these cookies. I know this isn't a workflow question but.. What is the benefit of Alteryx over Access? My manager is challenging Alteryx saying that he can run a million row Item in almost the same time as alteryx in Access. How do I prove him wrong and show him the true benefit of my Alteryx over Access with Facts? You could tell him that Alteryx has no limit on the records. Also the chance of typing some SQL formula wrong is impossible given that you don't need to type the commands, just use the tools. You can also check the results after every tool which helps you in case there was a mistake on some part to correct it easily. You could also enable performance profiling just to give him real numbers and showing him the time alteryx needs to process the data. To enable it go to your workflow canvas, then on the right configuration window go to 'Runtime' and activate the last checkbox. If this post helps, then please consider Accept it as the solution to help the other members find it more quickly. In addition to the above, I'd would add that our first use case with Alteryx involved a process originally designed in access. The original process took over two hours to load data, modify and run multiple queries, and then get an output. in Alteryx that process now runs in less than 5 minutes and does additional error checks and outputs to multiple formats including a tableau server. Oh, and the original process was two separate access dB due to table size. outside of processing, to me the speed is also in development and then additional analytic capabilities The possibilities are endless with what you can accomplish. Web scraping, api downloads, python code, predictive analytics, the list goes on and on...
s3://commoncrawl/crawl-data/CC-MAIN-2020-10/segments/1581875147154.70/warc/CC-MAIN-20200228104413-20200228134413-00320.warc.gz
CC-MAIN-2020-10
1,959
11
http://www.dummies.com/store/product/iPhone-Application-Development-For-Dummies.productCd-0470522526,navId-322467,descCd-authorInfo.html
code
iPhone Application Development For Dummies Neal Goldstein is a recognized leader in making state-of-the-art and cuttingedge technologies practical for commercial and enterprise development. He was one of the fi rst technologists to work with commercial developers at fi rms such as Apple Computer, Lucasfi lm, and Microsoft to develop commercial applications using object-based programming technologies. He was a pioneer in moving that approach into the corporate world for developers at Liberty Mutual Insurance, USWest (now Verizon), National Car Rental, EDS, and Continental Airlines, showing them how object-oriented programming could solve enterprise-wide problems. His book (with Jeff Alger) on objectoriented development, Developing Object-Oriented Software for the Macintosh (Addison Wesley, 1992), introduced the idea of scenarios and patterns to developers. He was an early advocate of the Microsoft .NET framework, and successfully introduced it into many enterprises, including Charles Schwab. He was one of the earliest developers of Service Oriented Architecture (SOA), and as Senior Vice President of Advanced Technology and the Chief Architect at Charles Schwab, he built an integrated SOA solution that spanned the enterprise, from desktop PCs to servers to complex network mainframes. (He holds three patents as a result.) As one of IBM’s largest customers, he introduced them to SOA at the enterprise level and encouraged them to head in that direction. He is currently leading an iPhone startup that is developing an application to help minimize the cost (and pain) of global travel for both leisure and corporate travelers.
s3://commoncrawl/crawl-data/CC-MAIN-2015-48/segments/1448398465089.29/warc/CC-MAIN-20151124205425-00176-ip-10-71-132-137.ec2.internal.warc.gz
CC-MAIN-2015-48
1,646
2
https://www.smaugmuds.org/index.php?a=topic&t=1789
code
Bug: String hash statistics are calculated incorrectly. Danger: Trivial - Only affects an output display. Found by: Remcon Fixed by: Remcon wouldhave += ( ptr->links * ( ptr->length + 1 ) ); wouldhave += ( ( ptr->links * sizeof(struct hashstr_data) ) + ( ptr->links * ( ptr->length + 1 ) ) ); As Remcon explains it: The reason it should have it set up like that is because if not being done like this it would have to use a new string also and there for each link would be its own string and the size of each string should be taken into affect.
s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376823348.23/warc/CC-MAIN-20181210144632-20181210170132-00470.warc.gz
CC-MAIN-2018-51
544
9
http://temporarilysignificant.blogspot.com/2015/04/day-24-racing-to-roxeth-and-chipper-in.html
code
You don't have to close the library tonight Read those books for money You don't care if it's wrong or if it's right My taxi driver seemed worrying confused about where we going. "I didn't know it was called Chipping Barnet,' he said. "When did they change the name then?" The cadets were out in force here too but I managed to snap them when they weren't expecting it. Another big audience and another impressive Library space. I never knew so many libraries had ancillary spaces like this. (1) I really need to get some sleep.
s3://commoncrawl/crawl-data/CC-MAIN-2019-09/segments/1550247511174.69/warc/CC-MAIN-20190221213219-20190221235219-00130.warc.gz
CC-MAIN-2019-09
528
8
http://blogs.windows.com/windows/archive/b/windowsvista/archive/2008/09/24/get-windows-7-at-pdc-and-winhec.aspx
code
The Professional Developer Conference (PDC) , taking place in Los Angeles Oct. 27th - 30th, is an event designed for leading-edge developers and software architects that are interested in the future of the Microsoft platform. If you're responsible for the technical strategy in your organization, or you're a highly skilled developer who likes to delve deep into the heart of the platform, then PDC is for you! You can register today for PDC by heading over to http://www.microsoftpdc.com/. Hurry, spots are filling fast! The Windows Hardware Engineering Conference (WinHEC), taking place in Los Angeles Nov. 5th - 7th, focuses on designing PCs, servers, and devices that run and interface with Microsoft Windows with a focus on Windows 7. WinHEC brings together engineers, developers and testers, and product planners giving them a opportunity to stay aligned with Microsoft technology roadmaps and new product opportunities. To register for WinHEC - click here (register before Oct. 3rd and save $400!). At each event you will hear from lead Windows Engineers including Steven Sinofsky, as well as see firsthand the next Windows OS. Just announced today - at both shows we will handing out a pre-beta build of Windows 7. By attending these events, you will be one of a select few to receive a pre-beta build of Windows 7 to take with you. If that's not incentive to head to these events, I don't know what is ;-) I want to get win7 Wow, I really need a new monitor for my Desktop. I was going to buy a nice 22 inch LCD but if multitouch is going to be integrated into Windows 7 then perhaps I should wait for new Multitouch LCDs to appear. Hey, at least it's not Apple where they just delete post of people having issues with their products and replace them with "This post is not available due to a technical error". anonymuos, I agree. I stated this in the betas of Vista, and Microsoft put up wall's then. Just look at the new beta's of IE 8 and it's blog, it is the same old wall. As far as the UI is concerned all Microsoft wants to here is, " We love you. " If you disagree with their decisions then your are, "Just being Negative" What it comes down to is, "CHOICE" and living with in walls, I don't think Windows 7 will any different, it will be, "Ribbons" and Microsoft way. it will be no, "CHOICE." It will be "Life with Walls" I would love to see Microsoft actually, "walk the Talk." Just give us, a Choice, Just give us, "Life with out Walls....." check out how is new windows 7 looks and know about the new features of windows 7 at new-windows7.blogspot.com According to marketshare.hitslink.com: 65% - Windows XP 15% - Windows 2000 13% - Windows 9x 1.5% - Windows NT 4.0 74% - Windows XP 12% - Windows 2000 9% - Windows 9x 1% - Windows NT October 2001-October 2004: Windows XP: 63% January 2007-January 2008: Windows Vista: 12% January 2007-January 2009: Windows Vista: 20% (2-3 months from now) January 2007-January 2010: Windows Vista: Magically reach 60%+??? Marketshare gained by Vista in %: 02/08 - 1.10 - Vista Service Pack 1 03/08 - 0.55 04/08 - 0.69 05/08 - 0.88 06/08 - 0.79 07/08 - 0.92 08/08 - 0.48 Get back the XP user interface (Not specifically Luna or Aero, but get rid of the redesigned UI) LOL @ the Maccie comments....yeah, keep tolling that Doom Bell that never seems to actually ring. :P Ah Windows 7 finally, hopefully my new company will come into some money and decide to upgrade its software, equipment, servers everything, it needs a serious makeover! My old company went belly up, massive layoffs, took me 3-4 months to get a new job at a smaller company, but man does the IT infrastructure need an overhaul. Im hoping that Windows 7 can provide that excuse that IT desperately needs to start a fresh. Seriously when you have to drive into work, on a Sunday, only to pick up a 2 page fax, then scan it in, and email it to your boss who is at home just so he can look at it...well, your company really needs to get a makeover. On the bright side I have a job now. On the plus side my IE7 just stopped working, probably caught a trojan or something from some work files or something, but actually that may have been a blessing because I downloaded IE8 (from Firefox), as I said IE7 had the croak of death... and IE8 is much faster than IE7 for me, perhaps even FireFox aswell. The only thing I dont like is that the Suggested Sites takes up to much space when not used so I had to rename it to "SS". Would be nice if it had an icon, maybe a globe with a question mark or something like that. I'm Italian, and this is offical Blog of Windows 7 There is one small feature I think Windows 7 should include, it's the separation of the games from programs in the Install/Uninstall panel in Windows Control Panel, so we might have two different sections, one for the programs (Microsoft programs separated from third party) and a Games management section so we might not have to see a list cluttered by everything installed on the computer. An optionnal full view should be included as well. Forgive my bad english, I'm a French Canadian. will be a historic success The next OS X is probably well under way. Good luck with trying to keep your market share. Considering that the next Xbox is not coming till 2012 and that Microsoft seems be quite happy to kill off PC gaming (or at least not do a darn thing about it), I doubt that it will do anything to give PCs an advantage over it's current Xbox360. So, number 1: I hope they'll actually include DX11 it with Windows 7 and number 2: I'm praying it doesn't become and anti-feature like DX10. is there anyone who can help me on how can I solve the problem on my webcam which working on XP environment but when I bought a new oc with Vista on it all I see on the screen is blank black display. Hello Vista SP2 Don't blow it this time. @Superpotato - Microsoft has been pretty constant about DX11 coming to Vista and Windows 7. DX 11 upgrade for better game user is needed even thought a lot game have not updated to window vista which is a shame including many other software company. Mr. Chris Flores Pls. for user consumer we wont a video in streaming for presentation Windows 7 PDC I wonder if MS will include DX11 with it and redeem itself for messing up PC gaming with DX10 (mind you, we all know they'd like to have people playing on their Xbox360s rather than PCs... even if gaming is one of windows main advantage against OSX!) I can't wait to see how much progress Microsoft has been making in improving on its Vista code. In the meanwhile, oh man am I loving my new MacBook Pro. Hurry up, Microsoft or you'll lose me to Apple land completely.
s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1405997889255.54/warc/CC-MAIN-20140722025809-00242-ip-10-33-131-23.ec2.internal.warc.gz
CC-MAIN-2014-23
6,636
52
http://qs321.pair.com/~monkads/?node_id=752660
code
Simple idea, really. In fact, so simple that I'd be very surprised if it wasn't suggested before this. A SuperSearch for "last modified node" turned up nothing relevant in several pages of results, with nodes dating back to 2004. It's quite possible that other search terms would produce what I'm looking for, or that I overlooked a relevant node. In which case, I ask forgiveness, for it is Monday morning. In any case, I've been seeing nodes that have been updated by the author after other replies were provided. This frequently makes the replies confusing. For example, a monk suggests "on line x you need to change 'some code' to 'some other code'." Except that the node being replied to already has 'some other code'. Did the author update? Or maybe the monk replying misread? I can't tell. So I'd like to see a small note added to indicate the last time the node was modified. I am not suggesting that the site keep a revision history or anything complicated, just a time stamp. Perhaps added to the information containing node creation: "on Mar 14, 1592 at 06:53 MST ( #xxxxxx=monkdiscuss: print w/ replies, xml ), last modified Mar 14, 1592 at 07:53 MST" I know nothing of the underlying codebase or how node information is stored, so I don't have any idea how complicated this change would be (i.e., does the database have a field where two dates could be stored, or would it require a revision to the whole shebang?). Feasible? Unfeasible? Pointless? Best idea in the world? Interested to hear your thoughts on the matter.
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030334871.54/warc/CC-MAIN-20220926113251-20220926143251-00599.warc.gz
CC-MAIN-2022-40
1,533
6
https://msgroups.net/dotnet.xml/timeout-when-consuming-java-webservice/620345
code
Java on computer? Running WinXP, fully updated except using IE7. Lately I've been unable to open a friend's emailed postcards from the San Diego Zoo. The error message is: "One or more ActiveX controls could not be displayed..." I've had the same issue at several web pages. Recently I asked this newsgroup about something else, and it was suggested that I download Java. I thought I had Java on my computer, but now I don't see it. My questions: 1. Is it possible that I inadvertently have some security setting set wrong? 2. Where would Java be if it IS on my computer? I ch...More client side webservice call information, please! There's a poster in this group named Jeffry van de Vuurst who has posted examples on using client side webservice calls. This has helped out our team immeasurably and we're using these calls more in different forms. We are also looking to use them in some ways that we can't figure out syntactically. Which leads to two questions: 1) Can anyone point me to more related (*client side* webservice calls) documentation? I can't find much (anything) in the SDK, which isn't that surprising. I would especially appreciate more example code, especially if it's shared here in...Stored procedure timeout Hello,i have a stored procedure that is called from an ASP.net page and it takes about 2 minutes to execute. When I run it from QA it takes about 10 seconds. the procedure which is not recompiled and it is in procedure Thanks for your help. It will probably be a bad plan in procedure cache. add "WITH RECOMPILE" to the stored procedure definition... create proc blah Does that fix the problem? If that fixes the problem then the original problem was caused by "parameter sniffing" and an original call t...OWA, timeouts, and autosave the majority of our user community (1500) use OWA as their primary e-mail client. We ran into the following issue. 1. if a user logins into the OWA using the 'public' feature the timeout is set to 15 minutes. 2.) if a user is typing a very long e-mail and exceeds he 15 minutes, then they are logged off. problem is the e-mail they are working on is lost. is there a way in Exchange 2000 to automatically save an e-mail as a draft if you are disconnected or automatically logged off? On 25 Oct 2005 06:43:56 -0700, "Russ Leathe" <[email protected]> wrote: >t...Bank Deposit Entry Timeout I have greater than 1 million bank deposit entry transactions that need to be posted in the Bank Deposit Entry window. This is due to the way that the GP-RMS integration imports individual receipts from RMS into GP. The system locks up or times out everytime I attempt to process anything in the Bank Deposit Entry window. I have tried 1) Marking All and letting it run, but it locks up 2) Filtering the deposits by date for only 1 day, and it appears to work, then I select "Mark All" and it locks up I dont know any other solution to getting these deposits posted. Ha...Outlook consumes Page File... When I go to use Outlook, it goes and slowly increases the usage of the Page File to the point where the machine becomes extremely slow. The computer otherwise is fine, it's just when I use Outlook from Office XP that it does this. I tried starting Outlook Safe Mode and still does the same thing. How can I fix this? Gordon J. Rattray <[email protected]> wrote: > When I go to use Outlook, it goes and slowly increases the usage of > the Page File to the point where the machine becomes extremely slow. > The computer otherwise is fine, it...Owa Timeout #2 When I try to log on to OWA i get this message: 440 Login Timeout. Have search for a way to solve the problem in kb technet. WE have a sbs 2003 server. Ensure that the authentication methods for each subdirectory in IIS match those of KB327843 Without the previous thread (original post and advise) it's impossible to say what your issue is or what steps you have taken to try to resolve it.Please include past posts in responses in order that we may be of better "Kimfs" <[email protected]> wrote in message I have enable 900 secs on my firewall timeout, how come the error still appear, how to confirm that my firewall settings is working? The average of the most recent heartbeat intervals used by clients is less than or equal to . Make sure that your firewall configuration is set to work correctly with Exchange ActiveSync and direct push technology. Specifically, make sure that your firewall is configured so that requests to Exchange ActiveSync do not expire before they have the opportunity to be processed. For more information about how to configure firewall settings when us...Outbound retry timeout Is it possible to define the outbound retry timeout before an NDR is sent to user at the user level instead of specifying it at Exchange Org level? Is possible, how can I enable this option? Thanks. On Wed, 8 Nov 2006 21:59:01 -0800, Alice >Is it possible to define the outbound retry timeout before an NDR is sent to >user at the user level instead of specifying it at Exchange Org level? Is >possible, how can I enable this option? Thanks. At the user level? Sorry, the previous post was unclear. There is an 'out...Sample Java Sales process needed We are looking to implement a sales process without any activities. Mainly because we want to know what stage an opportunity is in, but we do not need the activities automatically created. Therefore, I think we should be able to get there by using the salesstagecode drop-down field. Although I read in this forum that sample Java sales processes are available, I can never find them. Does anyone have any suggestions/sample Java sales processes? That would be really helpful. here is an example for a 3 stage process that updates the close probability var i = 0; switch (...Form/window Close I have a main page 'MyMainForm' containing a button. When this button is clicked; another form 'MySubForm' opens up which contains two buttons (OK & When OK button is clicked; the code behind this button processes some data and displays an alert and then goes back to 'MySubForm'. What do I need to do so 'MySubForm' is closed automatically when processing is done and OK is clicked on alert box? > I have a main page 'MyMainForm' containing a button. When this button is > clicked; another form 'MySubForm'...Webservices [WSE2.0] and security I am trying to select the best approach for security (authentication, role-based) for my web services app. It seems there are many options, so I wanted to ask what would be recommneded according to this criteria: 1. secure authentication (no plain text) 2. role-based functionality 3. easy deployment (i'm guessing certificates have some setup overhead) In spite of the OS or protocal related security means, such as integrated or using SSL, the WSE make use of the WS-SECURITY which is a standared soap security framework. In fact , it is a ...Consuming click messages in CListControl I have a CListCtrl member (I didn't create a class) in a CDialog--This CListCtrl is in report view, and it is information only. I would like the user to be able to use the scroll bars but not select anything in CListCtrl. I've tried handling various messages (LVN_ITEMCHANGED, LVN_ITEMCLICK, NM_CLICK, NM_SETFOCUS)...in each of these handlers, I called MessageBeep and set the pResult parameter to TRUE. In each case, the item was still selected. Is there something else I have to do to consume this message the item the user clicked isn't actually selected. It sa...Outlook 2003 send receive timeout Outlook 2003 send-receive times out (used to work ok) - updating Office but didn't help. Disabled McAfee, same. Ran Detect Repair - helped briefly, then problem started again. Microsoft kb article said to recreate mail account in Control Panel - Mail and lo, TEST ACCOUNT SETTINGS is OK there, but when I try TEST ACCOUNT in Outlook 2003 it timesout - how can this be? Also, tried creating a new outlook profile. Works now - I totally removed all McAfee listings in Add/Remove programs list (before only disabled it). ...Run 100 java threads at a time. I have a question. I'm writing a program that uses thread to analyze files. Each thread will have its own file to analyze so no synchronization is required. What I want is to only have 100 threads created and run at a time. Is there a way to do that? I just don't want a very large number of threads to run at the same time because that could take up alot of resources. Thanks in advance, > I just don't want a very large number of threads to run at the same time because that could take up alot of resources. It all depends upon what threads are doing. Each thread...Outlook 2003 - HTML Message I have sent an automated HTML Format eMail to our users. They have to submit few details from that mail to our application. I have done some client side validations working fine in Outlook 2000. When the user submit the details from Outlook 2003, the client side script is not working. Is there any special work-arounds need to be done to make this work? Thanks in Advance For your assistance. I have a problem with my web services (in C #), it happened that in some cases the client invoking methods with parameters, not with example the data type and the WS generates an exception that I would catch. In debugging I realized that these exceptions are handled probably by IIS (version 6). Is there a way to intercept them? Thanks in advance "Sergio M" wrote: > I have a problem with my web services (in C #), it happened that in > some cases the client invoking methods with parameters, not with > example the data type...urgent java architect required hi partners, we are having a urgent requirement for java architect with our clients located at chennai,hyderabad and bangalore if u r intrested send u r updated resume mail to: [email protected] The company is looking for outstanding java, j2ee professionals with atleast 4 years experience in java,j2ee,xml,jsp,coding and development, Working on large international software projects . Candidate with experince in coding and development preferred) - Current Role and Responsibilities - Reporting Structure...HELP: OWA 440 Login Timeout Running Exchange 2003 (SP1) on Server 2003 with front end back end configuration. Suddenly started getting "440 Login Timeout" errors when trying to login to OWA. IMAP4 thru same server works fine. Nothing in logs. Searched Google and found many people with same problem but no answers I can find. Only KB article I can find relates to OMA and not OWA. Can anyone help? I have 1 PC that is getting a timeout error when sending emails; error 0x800ccc19. If I am not sending emails out, then everything works fine, i can receive email no problem. It is an IBM Netvista running windows 2000 Pro SP4, and is the main machine (the 'server'). It is also running Norton Antivirus corporate edition Server. I had stopped all the Antivirus services from starting and rebooted, yet the problem still exists. I uninstalled office 2000, and after i reinstalled it, i noticed the account still exists and so does the profile. After i uninstalled office, i delete...web.config location httpruntime timeout value does not work Trying to get a page level timeout value working in asp.net 2.0 using the web.config location element. The configuration node is formatted as follows (under <configuration> element in web.config): <location path="~/IISResetAppPool.aspx" > <httpRuntime executionTimeout="420"/> <!-- 7 Mins --> As per the documentation: http://msdn.microsoft.com/en-us/library/b6x6shw7.aspx this should work. Any ideas as to why this configuration is ignored...SQL Server Timeout Error when searching for KB-Articles i got an "SQL Server Timeout expired" Error when searching for KB-Articles in either the Webclient or Outlook. Windows Server 2003 R2 SQL 2005 + SP2 CRM 3.0 inkl. Update Rollup 1 Hey Mark, just a thought, as I'm going through some things with NTEXT fields and having issues in cirtain cases. Is it possible that some of the knowlege base articles have "Copy/Pasted" text from another application into the KB article? I've noticed on a few occasions with the NTEXT fields of notes and history/activities that when people are copy...Java Integration + Hooks Hi i'm new to developing for rms and would like to know is it possible to integrate Java into RMS and if so what are the necessary procedures for doing If you want to interact directly with RMS, you have to work with COM or in the case of an HTML add-in ActiveX. I think there are ways to wrap a COM interface around Java, but I'm really not sure. I suspect it would be pretty hairy. You might want to consider c# for an RMS integration - the language is very similar to Java, so your learning curve should be fairly short. RMS is built on SQL Server, so you could use ...sign code Java Applet Security Internet Explorer Article ID 193877 We are trying to sign the java class for an applet so it will be able to write to a file on the hard drive from Internet Explorer. We are following the instructions in "How to make your Java code trusted in Internet Explorer" Article ID 193877 on msdn.microsoft.com. Specifically, we prepared the following batch file: cabarc -s 6144 N mycab1.cab S5.class setreg 1 true makecert -sk MyKeyName -n "CN=My Publisher Name" MyTestCert.cer cert2spc MyTestCert.cer MyTestCert.spc signcode -j javasign.dll -jp LOW -spc MyTestCert.spc -k MyKeyName start S5.htm...Integration with Java I have an Access application that I have written that I want to integrate with Primavera 6. Primavera 6 is a powerful program with it's own exposed API, which is written in Java. I would like to use this API, but I realize that this is going to require that I pass data from Microsoft Access (which uses VBA) through Java. I realize this may be the wrong place to ask this...but what technologies are available to provide this kind of Thank you for your time and consideration.
s3://commoncrawl/crawl-data/CC-MAIN-2021-21/segments/1620243991982.8/warc/CC-MAIN-20210511092245-20210511122245-00130.warc.gz
CC-MAIN-2021-21
13,928
236
https://packages.nuget.org/packages/Farkle.Tools/5.0.0-rc.2
code
This package contains a command-line tool that makes development with Farkle easier and more automatic. Specifically, it is a modern replacement for the GOLD Parser's "Create Skeleton Program", powered by the Scriban templating engine. After you install it as a CLI tool, pass the "--help" argument to learn how it works. See the version list below for details. This package will only be available to download with SemVer 2.0.0 compatible NuGet clients, such as Visual Studio 2017 (version 15.3) and above or NuGet client 4.3.0 and above. Read more dotnet tool install --global Farkle.Tools --version 5.0.0-rc.2 You can see information about the latest releases on https://github.com/teo-tsirpanis/Farkle/releases This package has no dependencies.
s3://commoncrawl/crawl-data/CC-MAIN-2019-35/segments/1566027314752.21/warc/CC-MAIN-20190819134354-20190819160354-00519.warc.gz
CC-MAIN-2019-35
747
8