url
stringlengths
13
4.35k
tag
stringclasses
1 value
text
stringlengths
109
628k
file_path
stringlengths
109
155
dump
stringclasses
96 values
file_size_in_byte
int64
112
630k
line_count
int64
1
3.76k
https://careers.smartrecruiters.com/Mindship?oga=true
code
- We are results-focused and rely on each other to accomplish our goals - We go to great lengths to understand and delight customers - We deliver consistently strong performance - We give and receive candid and direct feedback - We admit mistakes openly and are not afraid to ask for help - We look for solutions in unexpected places Perks of working at Mindship - A fun, challenging environment that will give you the chance to significantly grow and learn - The most up-to-date technology subscriptions to empower you with your work, the latest software and other tools needed to excel at your job - Insurance plans post probation - Freedom to make mistakes and learn from them - Working with a team of highly talented folks who strive to solve customer problems every single day - A chance to change how different industries function using cutting edge technologies - Equity in a fast-growing product engineering startup - Flexibility in work schedule with the advantage of being fully remote Mindship is a rapidly growing organization focused on creating value for our customers using technology. At Mindship, we are building an organization focused on collaborating with domain experts and implementing technical solutions to real-world problems. These solutions are impacting millions of lives and are changing the way people approach these problems. We are currently solving 5 problems in diverse domains, where domain experts have established credibility over the years and are now transforming these verticals with their knowledge and foresight. We are always looking for people with an entrepreneurial mindset to come onboard, collaborate and contribute to the aggressive growth of these 5 products.
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817765.59/warc/CC-MAIN-20240421101951-20240421131951-00847.warc.gz
CC-MAIN-2024-18
1,709
18
https://cms.developer.arm.com/docs/dui0473/m/arm-and-thumb-instructions/usub8
code
Unsigned parallel byte-wise subtraction. is an optional condition code. is the destination register. are the ARM registers holding the operands. This instruction subtracts each byte of the second operand from the corresponding byte of the first operand and writes the results into the corresponding bytes of the destination. The results are modulo 28. It sets the APSR GE flags. You cannot use PC for any register. You can use SP in ARM instructions but this is deprecated in ARMv6T2 and above. You cannot use SP in Thumb instructions. This instruction does not affect the N, Z, C, V, or Q flags. It sets the GE flags in the APSR as follows: for bits[7:0] of the result. for bits[15:8] of the result. for bits[23:16] of the result. for bits[31:24] of the result. It sets a GE flag to 1 to indicate that the corresponding result is greater than or equal to zero, meaning a borrow did not occur. This is equivalent to a instruction setting the C condition flag to 1. You can use these flags to control a following This ARM instruction is available in ARMv6 and above. This 32-bit Thumb instruction is available in ARMv6T2 and above. For the ARMv7-M architecture, it is only available in an ARMv7E-M implementation. There is no 16-bit version of this instruction in Thumb.
s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600400188841.7/warc/CC-MAIN-20200918190514-20200918220514-00277.warc.gz
CC-MAIN-2020-40
1,269
20
http://www.sandeepsnotes.com/p/about-me_19.html
code
My name is Sandeep Kumar. I am working as a technical architect in a software MNC. I am programmer, a good learner and a teacher. I work for Microsoft platform and blog are my own opinion. I am an early adopter. Admired for .Net technologies C#, Asp.Net , MVC, MVVM, jQuert, Knockout, Design patterns and principals, Web Services,WCF, Sql Server, testing tools like SoapUI, Fiddler WireShark, configuration management tools like cvs, svn and vss, tracking tools like Redmine, concentric services, Mantis and also a little about MySQL.
s3://commoncrawl/crawl-data/CC-MAIN-2019-39/segments/1568514573832.23/warc/CC-MAIN-20190920050858-20190920072858-00355.warc.gz
CC-MAIN-2019-39
534
1
https://myfountainonline.com/30240/google-spreadsheet-developer/
code
Google Spreadsheet Developer – Pleasant for you to my personal web site, in this particular time period I will demonstrate with regards to Google Spreadsheet Developer. And now, this is actually the template: how to build a realtime sales dashboard for ejunkie with google Thanks for visiting my article, this template about (Google Spreadsheet Developer) you can download by click the image below. google docs developer google docs developer api google docs developer tools google docs spreadsheet developer google spreadsheet developer google spreadsheet developer guide
s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376823674.34/warc/CC-MAIN-20181211172919-20181211194419-00579.warc.gz
CC-MAIN-2018-51
574
4
http://stackoverflow.com/questions/12194034/how-to-make-android-ui-focus-move-smooth
code
GridView ,when the focus moving looks so stiff.I try to encode the onDraw function myself,but doesn't look better. Then I use a class that inherit LinearLayout,realize all function of SlidingDrawer,also has right sliding.but It doesn't look that desirable.I don't know how to make the focus move look better.thanks for helping.
s3://commoncrawl/crawl-data/CC-MAIN-2015-14/segments/1427131300031.56/warc/CC-MAIN-20150323172140-00108-ip-10-168-14-71.ec2.internal.warc.gz
CC-MAIN-2015-14
327
5
https://www.unidata.ucar.edu/blogs/developer/en/entry/overview-of-zarr-support-in
code
Beginning with netCDF version 4.8.0, the Unidata NetCDF group has extended the netcdf-c library to provide access to cloud storage (e.g. Amazon S3 ) by providing a mapping from a subset of the full netCDF Enhanced (aka netCDF-4) data model to a variant of the Zarr data model that already has mappings to key-value pair cloud storage systems. The NetCDF version of this storage format is called NCZarr . The NCZarr Data Model NCZarr uses a data model that is, by design, similar to, but not identical with the Zarr Version 2 Specification . Briefly, the data model supported by NCZarr is netcdf-4 minus the user-defined types and the String type. As with netcdf-4 it supports chunking. Eventually it will also support filters in a manner similar to the way filters are supported in netcdf-4. Specifically, the model supports the following. - "Atomic" types: char, byte, ubyte, short, ushort, int, uint, int64, uint64. - Shared (named) dimensions - Attributes with specified types -- both global and per-variable - Chunking - Fill values - Groups - N-Dimensional variables - Per-variable endianness (big or little) With respect to full netCDF-4, the following concepts are currently unsupported. - String type - User-defined types (enum, opaque, VLEN, and Compound) - Unlimited dimensions - Contiguous or compact storage Note that contiguous and compact are not actually supported because they are HDF5 specific. When specified, they are treated as chunked where the file consists of only one chunk. This means that testing for contiguous or compact is not possible, the ncinqvarchunking_ function will always return NC_CHUNKED and the chunksizes will be the same as the dimension sizes of the variable's dimensions. Enabling NCZarr Support NCZarr support is enabled if the --enable-nczarr option is used with './configure'. If NCZarr support is enabled, then a usable version of libcurl must be specified using the LDFLAGS environment variable (similar to the way that the HDF5 libraries are referenced). Refer to the installation manual for details. NCZarr support can be disabled using the --disable-dap. Accessing Data Using the NCZarr Prototocol In order to access a NCZarr data source through the netCDF API, the file name normally used is replaced with a URL with a specific format. Note specifically that there is no NC_NCZARR flag for the mode argument of nccreate_ or ncopen_. In this case, it is indicated by the URL path. The URL is the usual scheme:://host:port/path?query#fragment format. There are some details that are important. - Scheme: this should be https or s3,or file. The s3 scheme is equivalent to "https" plus setting "mode=nczarr,s3" (see below). Specifying "file" is mostly used for testing, but is used to support directory tree or zipfile format storage. - Host: Amazon S3 defines two forms: Virtual and Path. + Virtual: the host includes the bucket name as in bucket.s3.<region>.amazonaws.com + Path: the host does not include the bucket name, but rather the bucket name is the first segment of the path. For example s3.<region>.amazonaws.com/bucket + Other: It is possible to use other non-Amazon cloud storage, but that is cloud library dependent. - Query: currently not used. - Fragment: the fragment is of the form key=value&key=value&.... Depending on the key, the =value part may be left out and some default value will be used. The fragment part of a URL is used to specify information that is interpreted to specify what data format is to be used, as well as additional controls for that data format. For NCZarr support, the following key=value pairs are allowed. - mode=nczarr|zarr|s3|file|zip... -- The mode key specifies the particular format to be used by the netcdf-c library for interpreting the dataset specified by the URL. Using mode=nczarr causes the URL to be interpreted as a reference to a dataset that is stored in NCZarr format. The modes s3, file, and zip tell the library what storage driver to use. The s3 is default] and indicates using Amazon S3 or some equivalent. The file format stores data in a directory tree. The zip format stores data in a local zip file. It should be the case that zipping a file format directory tree will produce a file readable by the zip storage format. The zarr mode tells the library to use NCZarr, but to restrict its operation to operate on pure Zarr Version 2 datasets. NCZarr Map Implementation Internally, the nczarr implementation has a map abstraction that allows different storage formats to be used. This is closely patterned on the same approach used in the Python Zarr implementation, which relies on the Python MutableMap class. In NCZarr, the corresponding type is called zmap. The zmap API essentially implements a simplified variant of the Amazon S3 API. As with Amazon S3, keys are utf8 strings with a specific structure: that of a path similar to those of a Unix path with '/' as the separator for the segments of the path. As with Unix, all keys have this BNF syntax: key: '/' | keypath ; keypath: '/' segment | keypath '/' segment ; Obviously, one can infer a tree structure from this key structure. A containment relationship is defined by key prefixes. Thus one key is "contained" (possibly transitively) by another if one key is a prefix (in the string sense) of the other. So in this sense the key "/x/y/z" is contained by the key "/x/y". In this model all keys "exist" but only some keys refer to objects containing content -- content bearing. An important restriction is placed on the structure of the tree, namely that keys are only defined for content-bearing objects. Further, all the leaves of the tree are these content-bearing objects. This means that the key for one content-bearing object should not be a prefix of any other key. There several other concepts of note. 1. Dataset - a dataset is the complete tree contained by the key defining the root of the dataset. Technically, the root of the tree is the key The zmap API defined here isolates the key-value pair mapping code from the Zarr-based implementation of NetCDF-4. It wraps an internal C dispatch table manager for implementing an abstract data structure implementing the zmap key/object model. Search: The search function has two purposes: 1. Support reading of pure zarr datasets (because they do not explicitly track their contents). 2. Debugging to allow raw examination of the storage. See zdump for example. The search function takes a prefix path which has a key syntax (see above). The set of legal keys is the set of keys such that the key references a content-bearing object -- e.g. /x/y/.zarray or /.zgroup. Essentially this is the set of keys pointing to the leaf objects of the tree of keys constituting a dataset. This set potentially limits the set of keys that need to be examined during search. The search function returns a limited set of names, where the set of names are immediate suffixes of a given prefix path. That is, if \ This semantics was chosen because it appears to be the minimum required to implement all other kinds of search using recursion. It was also chosen to limit the number of names returned from the search. Specifically 1. Avoid returning keys that are not a prefix of some legal key. 2. Avoid returning all the legal keys in the dataset because that set may be very large; although the implementation may still have to examine all legal keys to get the desired subset. 3. Allow for use of partial read mechanisms such as iterators, if available. This can support processing a limited set of keys for each iteration. This is a straighforward tradeoff of space over time. As a side note, S3 supports this kind of search using common prefixes with a delimiter of '/', although the implementation is a bit tricky. For the file system zmap implementation, the legal search keys can be obtained one level at a time, which directly implements the search semantics. For the zip file implementation, this semantics is not possible, so the whole tree must be obtained and searched. - S3 limits key lengths to 1024 bytes. Some deeply nested netcdf files will almost certainly exceed this limit. - Besides content, S3 objects can have an associated small set of what may be called tags, which are themselves of the form of key-value pairs, but where the key and value are always text. As far as it is possible to determine, Zarr never uses these tags, so they are not included in the zmap data structure. A Note on Error Codes: The zmap API returns two distinguished error code: 1. NC_NOERR if a operation succeeded 2. NC_EEMPTY is returned when accessing a key that has no content. Note that NC_EEMPTY is a new error code to signal to that the caller asked for non-content-bearing key. This does not preclude other errors being returned such NCEACCESS or NCEPERM or NC_EINVAL if there are permission errors or illegal function arguments, for example. It also does not preclude the use of other error codes internal to the zmap implementation. So zmapfile, for example, uses NCENOTFOUND internally because it is possible to detect the existence of directories and files. This does not propagate outside the zmap_file implementation. The primary zmap implementation is s3 (i.e. mode=nczarr,s3) and indicates that the Amazon S3 cloud storage -- or some related applicance -- is to be used. Another storage format uses a file system tree of directories and files (mode=nczarr,file). A third storage format uses a zip file (mode=nczarr,zip). The latter two are used mostly for debugging and testing. However, the file and zip formats are important because they is intended to match corresponding storage formats used by the Python Zarr implementation. Hence it should serve to provide interoperability between NCZarr and the Python Zarr. This has not been tested. Examples of the typical URL form for file and zip are as follows. ```` file:///xxx/yyy/testdata.file#mode=nczarr,file file:///xxx/yyy/testdata.zip#mode=nczarr,zip ```` Note that the extension (e.g. ".file" in "testdata.file") is arbitraty, so this would be equally acceptable. ```` file:///xxx/yyy/testdata.anyext#mode=nczarr,file ```` As with other URLS (e.g. DAP), these kind of URLS can be passed as the path argument to ncdump, for example. NCZarr versus Pure Zarr. The NCZARR format extends the pure Zarr format by adding extra objects such as .nczarr and .ncvar. It is possible to suppress the use of these extensions so that the netcdf library can read and write a pure zarr formatted file. This is controlled by using mode=nczarr,zarr combination. The primary effects of using pure zarr are described in the Translation Section. Notes on Debugging NCZarr Access The NCZarr support has a trace facility. Enabling this can sometimes give important information. Tracing can be enabled by setting the environment variable NCTRACING=n, where n indicates the level of tracing. A good value of n is 9. Zip File Support In order to use the zip storage format, the libzip library must be installed. Note that this is different from zlib. Amazon S3 Storage The Amazon AWS S3 storage driver currently uses the Amazon AWS S3 Software Development Kit for C++ (aws-s3-sdk-cpp). In order to use it, the client must provide some configuration information. ~/.aws/config file should contain something like this. ``` [default] output = json awsaccesskey_id=XXXX... awssecretaccess_key=YYYY... ``` The notion of "addressing style" may need some expansion. Amazon S3 accepts two forms for specifying the endpoint for accessing the data. Virtual -- the virtual addressing style places the bucket in the host part of a URL. For example: ``` https:// .s2. .amazonaws.com/ ``` Path -- the path addressing style places the bucket in at the front of the path part of a URL. For example: The NCZarr code will accept either form, although internally, it is standardized on path style. The reason for this is that the bucket name forms the initial segment in the keys. Zarr vs NCZarr The NCZarr storage format is almost identical to that of the the standard Zarr version 2 format. The data model differs as follows. - Zarr supports filters -- NCZarr as yet does not - Zarr only supports anonymous dimensions -- NCZarr supports only shared (named) dimensions. - Zarr attributes are untyped -- or perhaps more correctly characterized as of type string. Consider both NCZarr and Zarr, and assume S3 notions of bucket and object. In both systems, Groups and Variables (Array in Zarr) map to S3 objects. Containment is modeled using the fact that the container's key is a prefix of the variable's key. So for example, if variable v1 is contained in top level group g1 -- /g1 -- then the key for _v1 is /g1/v. Additional information is stored in special objects whose name start with ".z". In Zarr, the following special objects exist. - Information about a group is kept in a special object named .zgroup; so for example the object /g1/.zgroup. - Information about an array is kept as a special object named .zarray; so for example the object /g1/v1/.zarray. - Group-level attributes and variable-level attributes are stored in a special object named .zattr; so for example the objects /g1/.zattr and _/g1/v1/.zattr. The NCZarr format uses the same group and variable (array) objects as Zarr. It also uses the Zarr special .zXXX objects. However, NCZarr adds some additional special objects. .nczarr -- this is in the top level group -- key /.nczarr. It is in effect the "superblock" for the dataset and contains any netcdf specific dataset level information. It is also used to verify that a given key is the root of a dataset. .nczgroup -- this is a parallel object to .zgroup and contains any netcdf specific group information. Specifically it contains the following. - dims -- the name and size of shared dimensions defined in this group. - vars -- the name of variables defined in this group. - groups -- the name of sub-groups defined in this group. These lists allow walking the NCZarr dataset without having to use the potentially costly S3 list operation. .nczvar -- this is a parallel object to .zarray and contains netcdf specific information. Specifically it contains the following. - dimrefs -- the names of the shared dimensions referenced by the variable. - storage -- indicates if the variable is chunked vs contiguous in the netcdf sense. .nczattr -- this is parallel to the .zattr objects and stores the attribute type information. With some constraints, it is possible for an nczarr library to read Zarr and for a zarr library to read the nczarr format. The latter case, zarr reading nczarr is possible if the zarr library is willing to ignore objects whose name it does not recognized; specifically anything beginning with .ncz. The former case, nczarr reading zarr is also possible if the nczarr can simulate or infer the contents of the missing .nczXXX objects. As a rule this can be done as follows. - .nczgroup -- The list of contained variables and sub-groups can be computed using the search API to list the keys "contained" in the key for a group. By looking for occurrences of .zgroup, .zattr, _.zarray to infer the keys for the contained groups, attribute sets, and arrays (variables). Constructing the set of "shared dimensions" is carried out by walking all the variables in the whole dataset and collecting the set of unique integer shapes for the variables. For each such dimension length, a top level dimension is created " where len is the integer length. The name is subject to change. - .nczvar -- The dimrefs are inferred by using the shape in .zarray and creating references to the simulated shared dimension. netcdf specific information. - .nczattr -- The type of each attribute is inferred by trying to parse the first attribute value string. In order to accomodate existing implementations, certain mode tags are provided to tell the NCZarr code to look for information used by specific implementations. Zarr implementation uses its own mechanism for specifying shared dimensions. It uses a special attribute named ''ARRAYDIMENSIONS''. The value of this attribute is a list of dimension names (strings). An example might be ["time", "lon", "lat"]. It is essentially equivalent to the .nczvar/dimrefs list, but stored as a specific variable attribute. It will be read/written if and only if the mode value "xarray" is specified. If enabled and detected, then these dimension names are used to define shared dimensions. Note that xarray implies pure zarr format. Here are a couple of examples using the ncgen and ncdump utilities. - Create an nczarr file using a local directory tree as storage. ``` ncgen -4 -lb -o "file:///home/user/dataset.file#mode=nczarr,file" dataset.cdl ``` - Display the content of an nczarr file using a local directory tree as storage. ``` ncdump "file:///home/user/dataset.zip#mode=nczarr,zip" ``` - Create an nczarr file using S3 as storage. ``` ncgen -4 -lb -o "s3://s3.us-west-1.amazonaws.com/datasetbucket" dataset.cdl ``` - Create an nczarr file using S3 as storage and keeping to the pure zarr format. ``` ncgen -4 -lb -o "s3://s3.uswest-1.amazonaws.com/datasetbucket#mode=zarr" dataset.cdl ``` 1] [Amazon Simple Storage Service Documentation 2] [Amazon Simple Storage Service Library 3] [The LibZip Library 4] [NetCDF ZARR Data Model Specification 5] [Python Documentation: 8.3. collections — High-performance container datatypes 6] [Zarr Version 2 Specification 7] [XArray Zarr Encoding Specification Appendix A. Building NCZarr Support Currently the following build cases are known to work. |Operating System||Build System||NCZarr||S3 Support| |Visual Studio||CMake||yes||tests fail| Note: S3 support includes both compiling the S3 support code as well as running the S3 tests. There are several options relevant to NCZarr support and to Amazon S3 support. These are as follows. - --enable-nczarr -- enable the NCZarr support. If disabled, then all of the following options are disabled or irrelevant. - --enable-nczarr-s3 -- Enable NCZarr S3 support. - --enable-nczarr-s3-tests -- the NCZarr S3 tests are currently only usable by Unidata personnel, so they are disabled by default. A note about using S3 with Automake. If S3 support is desired, and using Automake, then LDFLAGS must be properly set, namely to this. ```` LDFLAGS="$LDFLAGS -L/usr/local/lib -laws-cpp-sdk-s3" ```` The above assumes that these libraries were installed in '/usr/local/lib', so the above requires modification if they were installed elsewhere. Note also that if S3 support is enabled, then you need to have a C++ compiler installed because part of the S3 support code is written in C++. The necessary CMake flags are as follows (with defaults) - -DENABLENCZARR=on -- equivalent to the Automake _--enable-nczarr option. - -DENABLENCZARRS3=off -- equivalent to the Automake --enable-nczarr-s3 option. - -DENABLENCZARRS3TESTS=off -- equivalent to the Automake _--enable-nczarr-s3-tests option. Note that unlike Automake, CMake can properly locate C++ libraries, so it should not be necessary to specify -laws-cpp-sdk-s3 assuming that the aws s3 libraries are installed in the default location. For CMake with Visual Studio, the default location is here: ```` C:/Program Files (x86)/aws-cpp-sdk-all ```` It is possible to install the sdk library in another location. In this case, one must add the following flag to the cmake command. cmake ... -DAWSSDK_DIR=\ Testing S3 Support The relevant tests for S3 support are in nczarr_test. They will be run if --enable-nczarr-s3-tests is on. Currently, by default, testing of S3 with NCZarr is supported only for Unidata members of the NetCDF Development Group. This is because it uses a specific bucket on a specific internal S3 appliance that is inaccessible to the general user. However, an untested mechanism exists by which others may be able to run the tests. If someone else wants to attempt these tests, then they need to define the following environment variables: This assumes a Path Style address (see above) where * host -- the complete host part of the url * bucket -- a bucket in which testing can occur without fear of damaging anything. ```` NCZARRS3TEST_HOST=s3.us-west-1.amazonaws.com NCZARRS3TEST_BUCKET=testbucket ```` If anyone tries to use this mechanism, it would be appreciated it any difficulties were reported to Unidata as a Github issue. Appendix B. Building aws-sdk-cpp In order to use the S3 storage driver, it is necessary to install the Amazon aws-sdk-cpp library. As a starting point, here are the CMake options used by Unidata to build that library. It assumes that it is being executed in a build directory, build say, and that ``` cmake -DBUILD_ONLY=s3 ``` The expected set of installed libraries are as follows: This library depends on libcurl, so you may to install that before building the sdk library. Appendix C. Amazon S3 Imposed Limits The Amazon S3 cloud storage imposes some significant limits that are inherited by NCZarr (and Zarr also, for that matter). Some of the relevant limits are as follows: - The maximum object size is 5 Gigabytes with a total for all objects limited to 5 Terabytes. - S3 key names can be any UNICODE name with a maximum length of 1024 bytes. Note that the limit is defined in terms of bytes and not (Unicode) characters. This affects the depth to which groups can be nested because the key encodes the full path name of a group. Appendix D. Alternative Mechanisms for Accessing Remote Datasets The NetCDF-C library contains an alternate mechanism for accessing data store in Amazon S3: The byte-range mechanism. The idea is to treat the remote data as if it was a big file. This remote "file" can be randomly accessed using the HTTP Byte-Range header. In the Amazon S3 context, a copy of a dataset, a netcdf-3 or netdf-4 file, is uploaded into a single object in some bucket. Then using the key to this object, it is possible to tell the netcdf-c library to treat the object as a remote file and to use the HTTP Byte-Range protocol to access the contents of the object. The dataset object is referenced using a URL with the trailing fragment containing the string An examination of the test program nctest/testbyterange.sh shows simple examples using the ncdump program. One such test is specified as follows: ```` https://s3.us-east-1.amazonaws.com/noaa-goes16/ABI-L1b-RadC/2017/059/03/ORABI-L1b-RadC-M3C13G16s20170590337505e20170590340289_c20170590340316.nc#mode=bytes ```` Note that for S3 access, it is expected that the URL is in what is called "path" format where the bucket, noaa-goes16 in this case, is part of the URL path instead of the host. The #mode=byterange mechanism generalizes to work with most servers that support byte-range access. Specifically, Thredds servers support such access using the HttpServer access method as can be seen from this URL taken from the above test program. ```` https://thredds-test.unidata.ucar.edu/thredds/fileServer/irma/metar/files/METAR201709100000.nc#bytes ```` If using byte-range access, it may be necessary to tell the netcdf-c library about the so-called secretid and accessid values. These are usually stored in the file ~/.aws/credentials. In the latter file, this might look like this. __Point of Contact__ Author: Dennis Heimbigner Email: dmh at ucar dot edu Initial Version: 4/10/2020 Last Revised: 2/22/2021
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224648000.54/warc/CC-MAIN-20230601175345-20230601205345-00788.warc.gz
CC-MAIN-2023-23
23,295
182
https://www.tableau.com/about/blog/2015/6/use-lod-expressions-conquer-database-cardinality-issue-40325
code
For many years, data users, whether they knew it or not, have struggled with database cardinality issues. I am excited to share a simple solution to this challenge. Those of you who've tried your hand at table joins within or outside of Tableau likely found that some joining scenarios leave you with incorrect sums. This occurs because the numbers in one of the joined tables, such as quota or budget, have been duplicated in the resulting table. After the join, when you take the sum of quota or budget, the number appears to be way bigger than expected. If the data set is of a manageable size, you may notice the incorrect numbers immediately. But in many cases, we may overlook the problem and unknowingly work with incorrect numbers. This is a topic of cardinality, specifically a one-to-many relationship between tables. To better understand the problem and how it may apply to you, let’s take a look at an example of quota attainment. In this scenario, each salesperson makes many sales and has a single quota to reach. Sales numbers are stored in one table and the quota is stored in a second table. We can link these tables in a join via the salesperson’s name to find out who has reached quota. Notice that the data from the quota table will be replicated three times for Bronson when it is joined to the sales data. This is where our problem begins. Bronson’s quota of $20 is now repeated three times. And when we take the sum of quota for Bronson, it will show $20 x 3 = $60, which is clearly incorrect. The Solution + Two Options to Avoid So the challenge is clear, but how do we solve for it? You might consider data blending, or taking the minimum quota figure instead of the sum. Both of these options have caveats, however. Data blending can perform poorly on larger data sets. And taking the minimum quota figure relies on having the salesperson dimension in the view. This brings us to our solution: using a Level of Detail Expression. This approach is scalable, dynamic, and reusable. Since the quota is always replicated across the salesperson dimension, we can fix the level of detail to the salesperson and always take the minimum quota: This calculation will give the correct value, whether we are looking at the view by salesperson or by total quota. While this is one example, the application of this simple LOD Expression is vast. At Tableau, we use this across many of our data sources not only to improve performance, but also to ensure that others don’t fall victim to using incorrect numbers in their own analysis. I recommend changing the name of the duplicated metric to “incorrect value” and naming the LOD version “correct value” to ensure people use the right one.
s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590347396495.25/warc/CC-MAIN-20200528030851-20200528060851-00447.warc.gz
CC-MAIN-2020-24
2,717
12
http://virtualization.sys-con.com/node/2529249
code
|By Sanjeev Khurana|| |February 7, 2013 12:00 PM EST|| Managing complexity is difficult in any growing business. As companies innovate, add new business lines, expand their global reach, cater to increased volume, or adopt new regulatory rules, processes proliferate and the discipline surrounding them goes out of the window. Moreover, the IT that supports these processes becomes more entangled as aging legacy applications jostle with new applications to support the needs of the business. Over time the technology that support this business unravels, causing the environment to suffer from instability and poor performance and become difficult to change and maintain. In short, it lowers business efficiency and effectiveness. A sound Enterprise Architecture (EA) approach is required to ensure that both the business and technology are well aligned and will help restore order to this landscape. An Enterprise Architecture is a description of the goals of a company, how these goals are realized by business processes, and how these business processes can be better served through technology. EA is about finding opportunities to use technology to add business value. The primary purpose of an EA is to inform, guide, and constrain the decisions for the enterprise, especially those related to IT investments. The true challenge of EA is to maintain the architecture as a primary authoritative resource for enterprise IT planning. This goal is not met via enforced policy, but by the value and utility of the information provided by the EA. Why Have an EA Approach: - Provides a basic framework for major change initiatives - Divides and conquers technical and organizational complexities - Supports business and IT budget prioritization - Improves the ability to share and efficiently process information - Provides the ability to respond faster to changes in technology and business needs - Reduces costs due to economies of scale and resource sharing - Enhances productivity, flexibility and maintainability - Serves as a construction blueprint and ensures consistency across systems - Supports decision making More specific benefits include: - Simplified application development - Location transparency - Horizontal scaling An EA is a blueprint that is developed, implemented, maintained, and used to explain and guide how an organization's applications landscape works together to efficiently accomplish the mission of the organization. An EA addresses the following views: - Business activities and processes - Data sets and information flows - Applications and software The Four Pillars of Enterprise Architecture: 1. Business Architecture Business Architecture realizes the business strategy. It describes how we organize our business processing to meet the strategic needs of the business. It should allow us to maximize the flexibility of the business to respond to changing business environments, reduce the complexity of our environment by simplifying business processing and reduce the effort required for application implementation and maintenance. It provides a view of the business and describes where we can improve business functions. - Create processing utilities for common functions within the back office area that support cross products such as confirmations, cash settlement, security settlement, and collateral management - Create a single common analytics versus an individual analytics library used for pricing products. Common analytics can be used for all front office trading desks, for different functions such as front office and risk 2. Data Architecture The data architecture describes the way data will be processed, stored and used by the organization. It lays out the criteria on processing operations including the whole flow of the system. It should increase the accuracy and timeliness of business data used by applications. An example of patterns used is Master Data Management (MDM) - its objective is to provide processes for collecting, aggregating, quality-assuring, persisting and distributing such data throughout an organization to ensure consistency and control in the on-going maintenance and application of this information. Moving to a model of a single golden data source will eliminate duplication and inefficiency, e.g., single bond static data sourced from multiple data vendors and publishing it to multiple systems (e-trading, trading, risk and PL, and settlement systems.) Implement a firm-wide description of common data objects, e.g., fpML (open standard XML standard for electronic dealing and OTC derivatives processing). This will reduce the risk of the data being misunderstood and provide a higher quality of data flowing through the organization thereby increasing efficiency and effectiveness. 3. Applications architecture Applications architecture describes the structure and behavior of applications used in a business, focusing on how they interact with each other and with users. It's focused on the data consumed and produced by applications rather than their internal structure. - Enforcing the use of a golden source of data, e.g., instrument static, counterparty static, market data, etc. - Standardizing on an application platform and interfacing approach - Implementing a standard application monitoring framework for all applications to report the business status 4. Technical Architecture This describes the common technology components that will be used to build our applications. This includes standards for vendor packages, third-party products and application components, e.g., servers, networks, desktops, middleware, security, storage, and virtualization. This will describe the current and target state. - SSO should be a standard mechanism for user authentication for all enterprise applications - Implement a server virtualization strategy to help reduce costs and increase flexibility - All critical applications should have a recovery time of less than an hour - Have a technology menu of strategic products that development teams can use for projects Building an EA for Your Organization It is important to understand the business strategy of the organization and this drives everything. This vision and strategy will drive where the organization's IT environment and capabilities should be in the next three years. The next step in this process is to characterize the current status and snapshot the existing IT capabilities. The word "characterize" is used because it isn't usually necessary to identify and analyze everything IT or information related in the organization. You just need enough data to understand the basic situation you are in and the problems that exist, and to develop an idea of where you want to go. You need to understand where the inefficiencies and duplications exist. The question is whether IT is being used in the most effective way to accomplish the organization's program goals. What Work Is Performed? You must have a clear understanding of what work the organization performs and where it is performed (anywhere from one location to multiple locations throughout the world). What Information Is Needed and by Whom? You need to understand the basic flow of information, not just within your organization but also to and from your organization, and what the information consists of and how that information is organized. What Applications Are Used to Process that Information? What software is used to process, analyze, etc., the needed information? What types of data structures and protocols are used? What Technology Is Used to Perform the Work? What IT hardware infrastructure is currently used? Having formed an understanding of where you currently stand, you now need to try to figure out where you need to be in the future. There are two main drivers for this: - Business drivers tell you that you need to do business differently. Customers may be demanding better or different services. - Technology drivers tell you that technology is providing you with options for doing things better The target architecture is the heart of the process. The four components (business architecture, data architecture [e.g., data sets and information flows], application architecture and technical architecture) of the EA need to be modeled separately. Security considerations should be addressed throughout. The process consists of defining each set of architectural components and its key attributes. The result is an organized set of definitions and models to reflect the different views of the architecture. Again, the relative complexity of the situation will determine how detailed and extensive this effort and documentation needs to be. The four components are then synthesized into a comprehensive target architecture. Due to the rapid pace of technology advancement, the goal should be to produce an "evolvable" architecture that can accommodate change easily. Some rules to help to produce this are - keep things modular and loosely coupled, have well-defined boundaries between systems and components, reusable logic should be divided into services, use industry-standard interfaces, use open-systems standards, and use common mechanisms whenever possible. Planning for loosely coupled, modular systems with clear boundaries allows you to change portions of the IT architecture without having to revise other aspects in the architecture, and also helps you see how changes in one part of the architecture may affect other elements. At this point, you are in a position to determine the gaps between your current and target architectures. What are the differences between your baseline and the architecture you want to achieve? For architecture to succeed within an organization, it is essential to have the support and commitment of senior management. This major initiative needs sponsorship by the CIO, and senior management need to be supportive and fully involved in ensuring it is a success. The governance process needs to ensure that: - People planning and developing IT systems do so in a way consistent with the target architecture - Procurements are consistent with the target architecture - Determine if exceptions or changes to the Enterprise Architecture are needed for a specific system or procurement - Track the implementation of the architecture migration plan and the benefits/flaws of the Enterprise Architecture - Keep the EA up-to-date, thereby reflecting changes in the business, new technology, etc. There needs to be integration with the program planning and the budget processes. Technology is changing rapidly and business needs and processes change over time. Therefore, the target architecture, whether fully implemented or not, that addresses how IT and information will serve business needs must be periodically reviewed and updated to reflect these changes. It is important that EA is not used as a mechanism that attempts to slow down delivery unnecessarily; it needs to add value to the business by producing superior solutions and not add unnecessary bureaucracy. A pragmatic approach to architecture is needed that balances the needs for agility and innovation yet delivers the efficiency and effectiveness in the technology solution provided by EA. Architecture principles define the fundamental assumptions and rules of conduct for the IT organization to create and maintain IT capability. It provides a compass to guide it to its target architecture. A well-defined architecture principle consists of a name, definition, motivation and implications. Table 1 shows the Architecture Principles on the Reuse, Buy, Build Principle. Table 1: Reuse, Buy, Build Principle We prefer to reuse existing assets over buying, and buying over building We are not a software company Our company has many IT assets that are underleveraged because we have previously favored building rather than reusing or buying We have many redundant applications and reducing this through reuse will reduce maintenance costs and improve system stability Architecture Governance will ensure projects adhere to this principle. Our company will develop an understanding of functional and technical assets available for reuse. This will be kept up to date. We will strive for fewer and deeper software vendor relationships and need to influence their roadmaps to mesh with our needs To add a new tool to our portfolio, we will also plan and fund replacement of the installed base of the former tool Architecture principles become a core shared assumption for all initiatives in the enterprise. This radically simplifies decision making. It ensures that all projects align with and are moving toward the target state Other enterprise architecture principles an organization might consider include: - Don't Automate Bad Business Complexity Principle - Avoid Package Customization Principle - Prefer Service Orientation over Application Orientation Principle - Don't Over / Under Engineer Principle An example of the Banking Specific Architecture Principle: - Only a master source of data can create business events - All processing should be STP with manual interventions only for exceptions - Combine multiple analytics libraries into a single common library (depends on trading desk size and product complexity!) EA is important and without it organizations will be unable to deliver technology in an efficient and effective manner. If a project team works anyway they want to, and use any technology they want to, chaos will result. Functionality and information will be duplicated and reuse will occur sporadically, if at all. There will be conflict between systems that cause each other to fail. Individual projects may be deemed successful, but as a portfolio there may be serious challenges. Systems don't exist in vacuum, but rather co-exist with several and sometimes hundreds of other systems. For example, building a Bloomberg interface to store bond static and prices built by the rates front office IT group may be viewed as a success in isolation, but such functionality are required by many systems within the organization, e.g., e-trading, pricing analytics, risk, settlement systems, and other front office trading applications, e.g., credit derivatives and repo. If each area builds such functionality, costs skyrocket (e.g., multiple Bloomberg licenses, duplication of interfaces, data, hardware), and it increases complexity and operational risk within the organization. EA plays a fundamental role in preventing such scenarios from occurring. As enterprises capture more and more data of all types – structured, semi-structured, and unstructured – data discovery requirements for business intelligence (BI), Big Data, and predictive analytics initiatives grow more complex. A company’s ability to become data-driven and compete on analytics depends on the speed with which it can provision their analytics applications with all relevant information. The task of finding data has traditionally resided with IT, but now organizations increasingly turn towards data source discovery tools to find the right data, in context, for business users, d... Oct. 4, 2015 10:00 PM EDT Reads: 365 “The Internet of Things transforms the way organizations leverage machine data and gain insights from it,” noted Splunk’s CTO Snehal Antani, as Splunk announced accelerated momentum in Industrial Data and the IoT. The trend is driven by Splunk’s continued investment in its products and partner ecosystem as well as the creativity of customers and the flexibility to deploy Splunk IoT solutions as software, cloud services or in a hybrid environment. Customers are using Splunk® solutions to collect and correlate data from control systems, sensors, mobile devices and IT systems for a variety of Ind... Oct. 4, 2015 09:45 PM EDT Reads: 560 Apps and devices shouldn't stop working when there's limited or no network connectivity. Learn how to bring data stored in a cloud database to the edge of the network (and back again) whenever an Internet connection is available. In his session at 17th Cloud Expo, Bradley Holt, Developer Advocate at IBM Cloud Data Services, will demonstrate techniques for replicating cloud databases with devices in order to build offline-first mobile or Internet of Things (IoT) apps that can provide a better, faster user experience, both offline and online. The focus of this talk will be on IBM Cloudant, Apa... Oct. 4, 2015 08:00 PM EDT Reads: 354 Clearly the way forward is to move to cloud be it bare metal, VMs or containers. One aspect of the current public clouds that is slowing this cloud migration is cloud lock-in. Every cloud vendor is trying to make it very difficult to move out once a customer has chosen their cloud. In his session at 17th Cloud Expo, Naveen Nimmu, CEO of Clouber, Inc., will advocate that making the inter-cloud migration as simple as changing airlines would help the entire industry to quickly adopt the cloud without worrying about any lock-in fears. In fact by having standard APIs for IaaS would help PaaS expl... Oct. 4, 2015 02:30 PM EDT Reads: 385 Organizations already struggle with the simple collection of data resulting from the proliferation of IoT, lacking the right infrastructure to manage it. They can't only rely on the cloud to collect and utilize this data because many applications still require dedicated infrastructure for security, redundancy, performance, etc. In his session at 17th Cloud Expo, Emil Sayegh, CEO of Codero Hosting, will discuss how in order to resolve the inherent issues, companies need to combine dedicated and cloud solutions through hybrid hosting – a sustainable solution for the data required to manage I... Oct. 4, 2015 02:00 PM EDT Reads: 398 SYS-CON Events announced today that ProfitBricks, the provider of painless cloud infrastructure, will exhibit at SYS-CON's 17th International Cloud Expo®, which will take place on November 3–5, 2015, at the Santa Clara Convention Center in Santa Clara, CA. ProfitBricks is the IaaS provider that offers a painless cloud experience for all IT users, with no learning curve. ProfitBricks boasts flexible cloud servers and networking, an integrated Data Center Designer tool for visual control over the cloud and the best price/performance value available. ProfitBricks was named one of the coolest Clo... Oct. 4, 2015 01:00 PM EDT Reads: 706 SYS-CON Events announced today that IBM Cloud Data Services has been named “Bronze Sponsor” of SYS-CON's 17th Cloud Expo, which will take place on November 3–5, 2015, at the Santa Clara Convention Center in Santa Clara, CA. IBM Cloud Data Services offers a portfolio of integrated, best-of-breed cloud data services for developers focused on mobile computing and analytics use cases. Oct. 4, 2015 01:00 PM EDT Reads: 547 Learn how IoT, cloud, social networks and last but not least, humans, can be integrated into a seamless integration of cooperative organisms both cybernetic and biological. This has been enabled by recent advances in IoT device capabilities, messaging frameworks, presence and collaboration services, where devices can share information and make independent and human assisted decisions based upon social status from other entities. In his session at @ThingsExpo, Michael Heydt, founder of Seamless Thingies, will discuss and demonstrate how devices and humans can be integrated from a simple clust... Oct. 4, 2015 12:00 PM EDT Reads: 610 As more and more data is generated from a variety of connected devices, the need to get insights from this data and predict future behavior and trends is increasingly essential for businesses. Real-time stream processing is needed in a variety of different industries such as Manufacturing, Oil and Gas, Automobile, Finance, Online Retail, Smart Grids, and Healthcare. Azure Stream Analytics is a fully managed distributed stream computation service that provides low latency, scalable processing of streaming data in the cloud with an enterprise grade SLA. It features built-in integration with Azur... Oct. 4, 2015 11:00 AM EDT Reads: 713 You have your devices and your data, but what about the rest of your Internet of Things story? Two popular classes of technologies that nicely handle the Big Data analytics for Internet of Things are Apache Hadoop and NoSQL. Hadoop is designed for parallelizing analytical work across many servers and is ideal for the massive data volumes you create with IoT devices. NoSQL databases such as Apache HBase are ideal for storing and retrieving IoT data as “time series data.” Oct. 4, 2015 10:45 AM EDT Reads: 395 SYS-CON Events announced today that HPM Networks will exhibit at the 17th International Cloud Expo®, which will take place on November 3–5, 2015, at the Santa Clara Convention Center in Santa Clara, CA. For 20 years, HPM Networks has been integrating technology solutions that solve complex business challenges. HPM Networks has designed solutions for both SMB and enterprise customers throughout the San Francisco Bay Area. Oct. 4, 2015 09:00 AM EDT Reads: 544 Mobile messaging has been a popular communication channel for more than 20 years. Finnish engineer Matti Makkonen invented the idea for SMS (Short Message Service) in 1984, making his vision a reality on December 3, 1992 by sending the first message ("Happy Christmas") from a PC to a cell phone. Since then, the technology has evolved immensely, from both a technology standpoint, and in our everyday uses for it. Originally used for person-to-person (P2P) communication, i.e., Sally sends a text message to Betty – mobile messaging now offers tremendous value to businesses for customer and empl... Oct. 4, 2015 08:30 AM EDT Reads: 151 SYS-CON Events announced today that MobiDev, a software development company, will exhibit at the 17th International Cloud Expo®, which will take place November 3-5, 2015, at the Santa Clara Convention Center in Santa Clara, CA. MobiDev is a software development company with representative offices in Atlanta (US), Sheffield (UK) and Würzburg (Germany); and development centers in Ukraine. Since 2009 it has grown from a small group of passionate engineers and business managers to a full-scale mobile software company with over 150 developers, designers, quality assurance engineers, project manage... Oct. 4, 2015 04:00 AM EDT Reads: 663 The broad selection of hardware, the rapid evolution of operating systems and the time-to-market for mobile apps has been so rapid that new challenges for developers and engineers arise every day. Security, testing, hosting, and other metrics have to be considered through the process. In his session at Big Data Expo, Walter Maguire, Chief Field Technologist, HP Big Data Group, at Hewlett-Packard, will discuss the challenges faced by developers and a composite Big Data applications builder, focusing on how to help solve the problems that developers are continuously battling. Oct. 4, 2015 04:00 AM EDT Reads: 325 SYS-CON Events announced today that Cloud Raxak has been named “Media & Session Sponsor” of SYS-CON's 17th Cloud Expo, which will take place on November 3–5, 2015, at the Santa Clara Convention Center in Santa Clara, CA. Raxak Protect automates security compliance across private and public clouds. Using the SaaS tool or managed service, developers can deploy cloud apps quickly, cost-effectively, and without error. Oct. 3, 2015 01:15 PM EDT Reads: 574 Who are you? How do you introduce yourself? Do you use a name, or do you greet a friend by the last four digits of his social security number? Assuming you don’t, why are we content to associate our identity with 10 random digits assigned by our phone company? Identity is an issue that affects everyone, but as individuals we don’t spend a lot of time thinking about it. In his session at @ThingsExpo, Ben Klang, Founder & President of Mojo Lingo, will discuss the impact of technology on identity. Should we federate, or not? How should identity be secured? Who owns the identity? How is identity ... Oct. 3, 2015 11:00 AM EDT Reads: 401 SYS-CON Events announced today that Solgeniakhela will exhibit at SYS-CON's 17th International Cloud Expo®, which will take place on November 3–5, 2015, at the Santa Clara Convention Center in Santa Clara, CA. Solgeniakhela is the global market leader in Cloud Collaboration and Cloud Infrastructure software solutions. Designed to “Bridge the Gap” between Personal and Professional Social, Mobile and Cloud user experiences, our solutions help large and medium-sized organizations dramatically improve productivity, reduce collaboration costs, and increase the overall enterprise value by bringing ... Oct. 2, 2015 10:00 PM EDT Reads: 543 Sensors and effectors of IoT are solving problems in new ways, but small businesses have been slow to join the quantified world. They’ll need information from IoT using applications as varied as the businesses themselves. In his session at @ThingsExpo, Roger Meike, Distinguished Engineer, Director of Technology Innovation at Intuit, will show how IoT manufacturers can use open standards, public APIs and custom apps to enable the Quantified Small Business. He will use a Raspberry Pi to connect sensors to web services, and cloud integration to connect accounting and data, providing a Bluetooth... Oct. 2, 2015 03:30 PM EDT Reads: 338 SYS-CON Events announced today that Micron Technology, Inc., a global leader in advanced semiconductor systems, will exhibit at the 17th International Cloud Expo®, which will take place on November 3–5, 2015, at the Santa Clara Convention Center in Santa Clara, CA. Micron’s broad portfolio of high-performance memory technologies – including DRAM, NAND and NOR Flash – is the basis for solid state drives, modules, multichip packages and other system solutions. Backed by more than 35 years of technology leadership, Micron's memory solutions enable the world's most innovative computing, consumer,... Oct. 2, 2015 07:00 AM EDT Reads: 556 Nowadays, a large number of sensors and devices are connected to the network. Leading-edge IoT technologies integrate various types of sensor data to create a new value for several business decision scenarios. The transparent cloud is a model of a new IoT emergence service platform. Many service providers store and access various types of sensor data in order to create and find out new business values by integrating such data. Oct. 1, 2015 02:30 PM EDT Reads: 398
s3://commoncrawl/crawl-data/CC-MAIN-2015-40/segments/1443736676622.16/warc/CC-MAIN-20151001215756-00158-ip-10-137-6-227.ec2.internal.warc.gz
CC-MAIN-2015-40
26,452
130
https://opennet.ru/docs/HOWTO/WWW-HOWTO-16.html
code
Thanks to the people at NCSA for providing such excellent documentation, David Anderson and all others for trying out this HOWTO and sending in their comments. The details on Netware/IP are courtesy Romel Flores ([email protected]). Linux HOWTO documents may be reproduced and distributed in whole or in part, in any medium physical or electronic, as long as this copyright notice is retained on all copies. Commercial redistribution is allowed and encouraged; however, the author would like to be notified of any such distributions. All translations, derivative works, or aggregate works incorporating any Linux HOWTO documents must be covered under this copyright notice. That is, you may not produce a derivative work from a HOWTO and impose additional restrictions on its distribution. Exceptions to these rules may be granted under certain conditions; please contact the Linux HOWTO coordinator at the address given below. If you have questions, please contact Tim Bynum, the Linux HOWTO coordinator, at [email protected] Finger for phone number and snail mail address.
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323585439.59/warc/CC-MAIN-20211021164535-20211021194535-00085.warc.gz
CC-MAIN-2021-43
1,087
8
https://forum.readymag.com/t/flipping-card-animation/1191
code
I have to make a card that flips around itself and reveals the back side with links to other pages. I understand how to make it on click animation with opacity. But the client wants exactly flipping way for it. So maybe some CSS might help? Is it possible to do on readymag? This is possible, yes, but only with custom code: You could implement and change something like this to your desire:
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296945218.30/warc/CC-MAIN-20230323225049-20230324015049-00028.warc.gz
CC-MAIN-2023-14
391
4
http://programmers.stackexchange.com/questions/tagged/web-framework+learning
code
to customize your list. more stack exchange communities Start here for a quick overview of the site Detailed answers to any questions you might have Discuss the workings and policies of this site Feb 5 '12 at 5:02 newest web-framework learning questions feed Hot Network Questions Difference between cd / and cd //? Are any Devotion feats worth taking without turn/rebuke undead? A "fraction" with three stories and two bars (of equal length) How much catnip does a kitten require? Why does the caps lock key have a down arrow as its icon? How do jet fighters get to war? Nuclear Blast in Space Understanding collections concurrency and Collections.synchronized* In the 1982 movie, "The Thing", why do they have flame-throwers? How do I say "I held my head in my hands" Had JK Rowling seen King's Cross Station before writing the first book? Our DM has a PC, how do we stop going to the PC for answers (because the DM knows everything)? Where do personal pronouns in subsequent sentences refer to? Example of a divergent sequence LuaLaTeX for dummies: how to add LaTeX macros into \directlua? Can Harry Potter's Invisibility Cloak hide inanimate objects/Non-sentient beings? Correcting and explaining corrections without sounding superior Are there any royal jesters in song of ice and fire? Go n directories down Symbol for unknown relation? Foreign key without referenced columns specification A Christian view of Mohammad What is the length of a string in a byte array? Whose underwear is this? more hot questions Life / Arts Culture / Recreation TeX - LaTeX Unix & Linux Ask Different (Apple) Geographic Information Systems Science Fiction & Fantasy Seasoned Advice (cooking) Personal Finance & Money English Language & Usage Mi Yodeya (Judaism) Cross Validated (stats) Theoretical Computer Science Meta Stack Exchange Stack Overflow Careers site design / logo © 2014 stack exchange inc; user contributions licensed under cc by-sa 3.0
s3://commoncrawl/crawl-data/CC-MAIN-2014-41/segments/1410657132025.91/warc/CC-MAIN-20140914011212-00127-ip-10-196-40-205.us-west-1.compute.internal.warc.gz
CC-MAIN-2014-41
1,939
50
http://guerillarender.com/doc/2.0/TD%20Guide_Technical%20Notes_Working%20With%20Textures.html
code
Working With Textures¶ Guerilla Render doesn't use directly the texture file you provide, but a texture proxy file (.tex) which is tiled and mipmapped. For convenience, you can provide Guerilla with a bitmap file, and Guerilla will automatically convert the file into a proxy. The original texture can be in one of the following formats: TIFF, EXR, PNG, TGA, PSD, JPEG, RAW, IFF. An original texture named 'grid.png', used with a triangle filter and a cc clamping mode (clamp U, clamp V) will be stored in the proxy file .guerilla/grid.png_triangle_cc.tex next to the original texture. The texture proxy contains the original texture and all its mipmaps tiled in 256x256 pixels. The texture size is the same than the original (no resampling to a power of two size is performed). The texture channels and the channel depth are the same than the original texture. If the depth is 8 bits or float, the texture proxy is a TIFF file. If the depth is half, the texture proxy is an EXR file. Both file format are lossless compressed. If you prefer, you can directly provide texture proxies (.tex files) to Guerilla Render to centralize the build process. Those textures must be built using our render application. The textures are built using the 'render' application, see also The default texture node is able to use the UDim textures. The udim textures are named 1001, 1002, 1003.. on the first row, then 1011, 1012, 1013 on the second row etc.. To use UDim textures with a texture node : - Put in your texture path a '%d' pattern in place of the UDim number (1001, 1002, 1003 etc..) - Make sure the texture mode is UDim The default texture node is able to use the Ptex textures. Guerilla Render directly uses the ptex file. No texture proxy will be done. - Use your ptx file in the Texture node. - The geometry must have the 'Geometry > Enable Ptex' attribute. - The geometry using the Ptex texture may require one or more subdivision step if it contains non-quad polygones. To do that, set the 'Geometry > Raytracing > Subdivision Level' attribute to one.
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662555558.23/warc/CC-MAIN-20220523041156-20220523071156-00476.warc.gz
CC-MAIN-2022-21
2,053
15
https://developer.jboss.org/thread/188240
code
I'm not that familiar with RF but it sounds like something that sits between the component and the value EL target. The exporter is a general component targetted mostly at the h:dataTable so features of e.g. rich:dataTable or ice:dataTable might not be automagically recognized. One workaround would be to provide a second dataset, filtered in the same way as the dataTable (but applied directly on the getter result) I have the same issue here. Couldn't find any resolution yet..my table is huge and having another dataset is not a right option I believe.. I recently replied to a thread asking the same question and said basically It is not a bug, and it is doing exactly what it is supposed to do and that if you want to export your filtered dataset then you need to do that work yourself. Now, what I said is 99% correct. However, the question remains. How should you do this work in such a way that you feel like you have achieved an elegant solution and not just a hacked up copy of the filtering process? It is amazing what a little bit of logical searching can do. You are asking about a richfaces component and so...I searched filter exporton the richfaces forum (which is where this question should be mind you). Search Results The second result in that search led me to this thread you should implement your custom model to work with filtered and sorted data as you need. check modifiable model sample at livedemo. So, off to the livedemo page we go and look at the datatable modifiable model example here So, now you are going to have to do the rest of the leg work and actually work out how to do what they said. These links might help. ...the richfaces forum (which is where this question should be mind you). I was probly a bit harsh with that comment. I understand it would be easy to assume the Seam export is at fault here. But, it's not. The dataset you've provided to the export just hasn't had the filter applied to it is all. Anyways, following my above comments should end up working for you. Well...I should have searched a bit longer sigh JIRA RF-6280 describes this problem as a known issue. So....maybe everything I said earlier is hogwash anyway. :) Still....there is a chance that implementing your own data model will work. As far as I can tell the Seam exporter bean grabs an iterator on the datamodel and keeps calling next for each row. So...in theory it should work ;) Thanks for your helpful suggestions and links. However, when the datatable gets filtered (automatically on pressing tab, or hitting enter), what happens to the old collection? Does it get updated with new model data? still a bit confusing. never mind, i will update this post with my results shortly.
s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267158045.57/warc/CC-MAIN-20180922044853-20180922065253-00476.warc.gz
CC-MAIN-2018-39
2,703
21
https://www.expatforum.com/threads/has-anyone-got-invited-by-nsw-through-skillselect.688810/#post-6587130
code
Has anyone got invited by NSW by their new selection criteria through SkillSelect that they introduced last month?? Hi can anybody provide an update to the progress of their sub 190 NSW skillsect applicationsHey Tanzeel.. I called up NSW couple of time. They said that just keep an eye on email. There's are no certain dates when they'll invite. Any update from your side ??
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323585460.87/warc/CC-MAIN-20211022052742-20211022082742-00393.warc.gz
CC-MAIN-2021-43
374
4
https://www.somagnews.com/chrome-dinosaur-becomes-microsoft-edge-surfing-game/
code
Microsoft has launched a new stable version of the Edge browser that has as its main novelty a “secret game” for the user to be entertained when the internet goes down. Called Surf, the game was already in testing for Insiders and appears on the browser ‘s offline page, but can also be accessed with a command at any time. This game is basically Microsoft’s version of the “Chrome Dinosaur”. If you don’t want to disconnect your internet connection to access the news, just enter Microsoft Edge (the new version based on Chromium), and type edge: // surf in the address bar. The command works in any edition of the program starting with version 83.0.478.37. Then, the user will be directed to the game page. The home screen allows the player to choose between a group of surfers and explore a sea route. The goal is to go as far as possible, avoiding obstacles, creatures and other surfers. Like the Google Chrome dinosaur game, the Microsoft game has simple commands and can be played using only the arrow keys and the space bar. On the other hand, the production of the owner of Windows gains points in the visual, since it brings colorful pixel art graphics and scenarios full of life. In addition to ensuring entertainment for browser users, the launch is also a tribute to a classic game from Windwos. Almost 30 years ago, the company launched SkiFree, which put the player in the shoes of a skier to descend mountains. The new surfing game follows the same basis as the old Microsoft project, but with an updated look for modern computers.
s3://commoncrawl/crawl-data/CC-MAIN-2021-25/segments/1623487626122.27/warc/CC-MAIN-20210616220531-20210617010531-00526.warc.gz
CC-MAIN-2021-25
1,560
5
https://jakeludington.com/2010/09/13/turn_on_remote/
code
“I use Remote Desktop all the time to connect to my Windows XP computer. I recently got a new computer with Windows 7 and I can’t figure out how to make Remote Desktop work. What do I have to do to turn on Remote Desktop in Windows 7?” Microsoft made some changes to the way Remote Desktop works starting in Windows Vista. As you discovered, Remote Desktop is disabled by default in Windows 7 and Windows Vista. Fortunately the process to enable Remote Desktop in Windows 7 is fairly easy. To turn on Remote Desktop in Windows 7 follow these simple steps: You need to access the System control panel, which you can get to either with the keyboard shortcut Windows Key + Pause/Break, by Clicking Start > Control Panel > System & Security > System and then clicking Remote settings on the left side or by Clicking Start, right-clicking Computer and choosing Properties and clicking Remote Settings. Any way you choose you end up at the Remote System properties. Once you have the Remote settings open, you want to choose one of the radio buttons that enables Remote Desktop. There are two options for this, one with better encryption than the other. If you need to access your computer from Windows XP, you will want to choose the middle radio button. If you will only access your computer from Windows Vista or Windows 7, the second option (third radio button) will work. I should note that this last option will also work if you want to use Remote Desktop with an iPad.
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510334.9/warc/CC-MAIN-20230927235044-20230928025044-00243.warc.gz
CC-MAIN-2023-40
1,475
5
https://www.vn.freelancer.com/projects/word/type-word-sheets/?ngsw-bypass=&w=f
code
Không tìm thấy công việc Rất tiếc chúng tôi không thể tìm thấy công việc mà bạn đang tìm kiếm. Tím thấy các công việc mới nhất ở đây: I need someone to help me asap regarding the task For a company merge >> we need to rename our Logo from "Itegrity" into "Data Unit" Feel free to make new suggestions >> but leaving the base-look the same Facebook cover, linkedin background, and other small basic social assets needed for company. Have logo and general direction I would like to design a website that will allow users to book for parcel pickups intended for delivery from one place to another, this should then be extended to a mobile app to be listed on both iOS and Playstore. I have a trucking business and employ and manage truck drivers to move freight loads. I pay drivers based on mileage or roundtrip assignments and need a payroll system to calculate pay and create a paystub. I currently download CSV file manually for fuel and mileage receipts (need to automate this process) and upload to server. I also manage my fleet of trucks and keep them up to date with main... Small Customization & Upload, Install and Run (for Web App, iOS App & Android App) I purchase a script code (chat app), but I need: -Change the background color/splash screen and app icons -Add a new feature (Add “Password” option for reading one-to-one messages) to introduce in Configuration/Chats/Password -Add a new feature (“Private” messages to open in Confi... Brochure edit we have a brochure we need editing 1) Start up company is the Digital Transformation space, Specialising in Business Change and Transformation. 2) Need a unique logo and brand created for the company I look forward to hearing from you. I need someone to transcribe 4 of my videos (that are in English) to Mandarin The length of the videos are: 8 minutes and 33 seconds 15 minutes and 39 seconds 25 minutes and 48 seconds 4 minutes and 10 seconds They are Excel tutorials I am looking for wiki blackinks for my website. Only serious Seo People Apply Please. Don't apply if you dont have what i need please.
s3://commoncrawl/crawl-data/CC-MAIN-2021-49/segments/1637964363598.57/warc/CC-MAIN-20211208205849-20211208235849-00173.warc.gz
CC-MAIN-2021-49
2,120
13
https://dough.community/t/new-design-idea-for-a-tablet-laptop-hybrid/17335
code
So far, the Eve V is nice clone of the Surface Pro. But even the Surface Pro design has flaws. Now that Eve has gone past the achievement of making the Eve V, I hope it is in a position to make something different that does not exist on the market. I have already mentioned this new tablet design in the "Ideas for Gen 2" Here I would like to stress here the merits of this design: The pen is always safely stored in a protected space on the side of the tablet. No more lost pen! Most tablets or tablet PCs do not offer a way to store the pen, which can get lost very easily. The Surface Pen attaches magnetically to the Surface Pro, but that attachment is very insecure. The pen is always easily accessible. In lanscape mode, the pen is just in front of the user, equally accessible to left-handed and right-handed users (unlike the Surface Pro which has the pen on the left side for some strange reason). In portrait mode, the tablet can always be held such that the pen is on the most natural side for the user. In "drawing board" mode, the display is sightly shifted and reveals the pen just in front of the user, as an invitation to grab it and start using it. One of the reasons there is no storage for the pen in many devices today is that many customers and the makers themselves do not care so much about the pen - they just see it as an extra accessory that some people may want to use. The makers prefer to focus on making the slimmest tablet, and do not want to impose an unnecessary storage space on the tablet to the majority of customers who do not buy or use a pen. At best, they just offer to stick a loop to hold the pen, as if it was an afterthought. As result, most users do not even know about the pen. I think it is time a maker finally embraces pen computing, not just as gimmick, but as something fully integrated in the ergonomics of the tablet and rightfully promoted. When closed, the device is just a tablet, inviting users to use it as a tablet. This is opposite to most of hybrid devices today, which are mostly laptops that may be used a tablet. But their tablet mode is not so convenient or inviting: it has an annoying keyboard on back, or is thicker than the closed laptop, or necessitates to physically separate the keyboard from the display (which is often annoying: where do you put the keyboard?). In practice, I see many people just use these devices as laptops. Even the Surface Pro, which is supposed to be a tablet, seems to be mainly used as a leightweight laptop. Another reason is that most people expect to use Windows on a PC with a keyboard. It is time to make a hybrid device that can be used naturally as a tablet. When open as a laptop, it just works as a regular laptop. This is unlike the Surface Pro design which is very compromised in this respect: the screen does not hold by itself and requires a kickstand that is quite uncomfortable and unstable on the lap, the keyboard is floppily attached to screen, so that it just hangs or flips uncontrollably whenever the device lifted. With this design, you get an uncompromised laptop experience. The transition between tablet and laptop is very smooth. Suppose that you are using the device as a tablet, and suddenly need the keyboard to enter a lot of text. You simply lift up the screen, revealing the keyboard, while still looking at the screen, and without moving the device itself, whether it lies on your lap or on your desk. There is no distraction about attaching a keyboard, or fetching it from behind the screen, it just appears and is ready to use while you are still focusing on your thoughts and continuously watching the screen. I hope you can get inspired by this design. Only a few makers have come somewhat close to this design (mainly Sony VAIO with their former Duo and Flip models, and more recently HP with the Spectre Folio). But these attempts are still quite far from the proposed design in terms of ergonomy (none have a satisfactory storage for the pen, none can be comfortably used in portrait mode, and so on). Let me know what you think.
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296949331.26/warc/CC-MAIN-20230330132508-20230330162508-00192.warc.gz
CC-MAIN-2023-14
4,068
9
http://www.projectwedding.com/forums/need-invite-designer-and-maker
code
need invite designer and maker I need help with invitations. I know what I want, I just don't have it in me to make them myself. I was wondering if I could offer a job to anyone interested. You would have to design them and make them. East Coast preferred, but not required. If anyone is interested, please PM me.
s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1405997877881.80/warc/CC-MAIN-20140722025757-00041-ip-10-33-131-23.ec2.internal.warc.gz
CC-MAIN-2014-23
313
3
https://www.experts-exchange.com/questions/28238345/Delivery-has-failed-550-5-1-1-RESOLVER-ADR-ExRecipNotFound.html
code
Delivery has failed .... #550 5.1.1 RESOLVER.ADR.ExRecipNotFound We recently migrated a SBS 2003 to Windows Server 2008 with Exchange 2010 with a new internal domain name: We cleared out Outlook Nickname Cache of old addresses and replaced with new so to avoid this issue, but when ever a User replies to an email to an internal staff member Outlook will try and send using Old Domain Name. Can I adjust User Accounts so both are accepted somehow so I dont have to adjust Outlook Nickname Cache etc.? Work with freelancers specializing in everything from database administration to programming, who have proven themselves as experts in their field. Hire the best, collaborate easily, pay securely, and get projects done right.
s3://commoncrawl/crawl-data/CC-MAIN-2018-13/segments/1521257647692.51/warc/CC-MAIN-20180321195830-20180321215830-00734.warc.gz
CC-MAIN-2018-13
726
5
https://www.npmjs.com/package/scent
code
SCENT: A System-Component-Entity framework Make a great game with fresh scent. It smells really good ! Scent is framework heavily based on the Ash framework and rewritten for the purpose of multi-player games. Basic idea is very similar however coding style is quite different. Thanks to the environments like NodeJS, you can use Scent on the game server too and share most of code with game client. Main idea of this approach is composition over inheritance. You are no longer creating objects with all of its properties and method in one big messy blob. Instead you are composing entities from small pieces called components. That way you can create various combinations without duplicating any code. Please note that this is far from complete solution of how to make the game. This is only small ingredient of the whole cake that needs to be used in much more robust environment to handle all game requirements. Possibly it is something that most of games have in common no matter of genre. Framework is being actively used in development of our own game. It can be improved and changed over time as our need arise. Check out the contributing file if you want to help with something. There is no Roadmap for the framework yet, it mostly depends on ours needs in the game. Essential stuff is already in place and working quite well. EcmaScript 6 support Framework is using some of the features as defined by EcmaScript 6 draft. Since the implementation in current environments is not really production ready, we are using shims. To avoid collisions in some variable names and also to store truly private states, framework is using the Symbol structure. All public symbols are exported in Symbols property of Scent entry point (see below). Acknowledged notation exists for the symbols, it uses @@ as prefix. Anytime when we are using this prefix be aware you have to use the symbol of that name from mentioned export. There is notation for variables holding known types defined by this framework. Actual variable name is prefixed by single letter denoting the type. First letter of the original variable should be uppercased. We recommend using this notation while using the framework to make clear idea of what is the variable holding. cWeapon component type eCharacter entity instance nStructure node type aMove action type bName symbol reference You can install Scent using NPM as follows: npm install -S scent In any environment supporting CommonJS modules, you can just use require('scent') to access framework stored in the lib folder. In case you want to use ES6 compatible sources or perhaphs use your own transpiler, simply do Much more convenient and recommended way is to use bundler like Webpack or Browserify for whole application based on source files in NPM package. There is also hidden lib/es6 folder which includes files before they were transformed by a Babel. This is useful especially for browsers with most of ES6 features implemented. Following is small example how simply you can create game mechanics to close door based on their material. In the real game it would be much more complex, but it should suffice for now. var Scent = ;var engine = ;var cDoor = 'door' 'open material';engine; // optional stepengine;enginestart;var door =doormaterial = 'wood';var eDoor = engine;engine;engine;// updates are supposed to be executed in your game loop.engine; It might look confusing at this point, especially if you don't know much about entity driven approach. Hence if you are interested, dive right in. We recommend reading further in this order: - Component ... is smallest part the design. It is data storage unit that is meant to be added to or removed from the entity. - Entity ... is any game object. It is composed of components designating the purpose of entity that way. - Node ... is small subset of components owned by single entity and simplifies work of the systems. - Action ... is container for any game events that might have happened and needs some processing. - System ... is a wrapper for your game logic. These parts are base building blocks, but they are quite useless on its own. Once you have some apprehension of the role of each of them, you can start reading about The Engine which ties everything together. There are some checks for correct type or format of arguments that can throw error. Basically you don't need to handle these errors because they are meant to alert you about doing something seriously wrong mostly in the setup phase. There is minimum of runtime errors (except unexpected ones). Instead the debug module is used with prefix of "scent:" that warns you about runtime issues. To have a look at tests outcome, you have to install node dependencies first (using npm install) and then you can simply run npm test to see the test outcome. For development we are using amazing Test'em tool. Just install it globally ( npm install -g testem) and then run in this directory ( testem). Tests will run in Node environment by default and you can connect with any browser to see how the framework behaves in there. The MIT License (MIT) Copyright © 2014 Black Dice Ltd. Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the “Software”), to deal in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do so, subject to the following conditions: The above copyright notice and this permission notice shall be included in all copies or substantial portions of the Software. THE SOFTWARE IS PROVIDED “AS IS”, WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320302706.62/warc/CC-MAIN-20220120220649-20220121010649-00291.warc.gz
CC-MAIN-2022-05
6,157
41
https://codefresh.io/blog/argo-rollouts-1-0-milestone/
code
Argo Rollouts, part of the Argo project, recently released their 1.0 version. You can see the changelog and more details on the Github release page. If you are not familiar with Argo Rollouts, it is a Kubernetes Controller that deploys applications on your cluster. It replaces the default rolling-update strategy of Kubernetes with more advanced deployment methods such as blue/green and canary deployments. In addition, it supports integration with several metrics providers to automatically promote/roll back your deployment according to live metrics. We have already covered some example scenarios in previous blog posts: The most user-visible feature in the 1.0 release is the introduction of a dedicated graphical user interface. Previously, you could monitor the status of a rollout from the command line or see status health with the ArgoCD dashboard. In this release, Argo Rollouts includes its user interface: The GUI includes all the information you need about a rollout: Current deployment strategy Total number of steps and current deployment step Current status of the rollout (paused, progressing, degraded, etc.) Number of replicas for the previous and current deployment Container images for the previous and current deployment Note that unlike ArgoCD, where the interface is part of the controller, in Argo Rollouts the interface is launched from the CLI and runs on your machine. You can still use the CLI to monitor deployments as well: Similar information is offered both ways. Use existing Kubernetes Deployment objects Argo Rollouts works by monitoring changes in a Kubernetes custom resource aptly named Rollout. You can see the full details on the Rollout Specification page. The Rollout resource is compatible with the standard Deployment resource but includes extra fields that define the progressive delivery options. This means that until recently if you wanted to use Argo Rollouts, you had to convert your existing Deployment objects to Rollouts. The process was not very difficult, but it was challenging for Argo Rollouts to cooperate with other Kubernetes tools that only understand Deployments. With the 1.0 release, Argo Rollouts also supports an alternative format for Rollouts. You can now keep all Rollout specific information in the custom CRD and just mention an existing deployment: This means that you can still use all your favorite tools with Argo Rollouts, even those that do not understand CRDs. See the documentation page for more details. Official container image with the CLI Codefresh pipelines are based on containers. Each step in a Codefresh pipeline is a docker image that is created either by you or loaded by an existing registry (private or public). Previously, we had to maintain our container image for Argo Rollouts to integrate with container-based pipelines. This is no longer necessary because Argo Rollouts released an official container image with the CLI. You can find all image releases at https://quay.io/repository/argoproj/kubectl-argo-rollouts. Ambassador support for traffic splitting In the case of canaries, Argo Rollouts supports several networking solutions for splitting live traffic between the previous and current versions in a gradual way. With the 1.0, Ambassador Edge Stack is now added as an official provider for traffic routing. This means that you can use Ambassador for canary releases in addition to the other already supported solutions. This feature is also a testament to the fact that Argo Rollouts does not need a full service mesh to gradually shift traffic. Ambassador Edge Stack of course has several other features that are useful to have on a Kubernetes cluster (ingress services, SSO, external authentication, etc.) on their own. Start your progressive delivery journey now The 1.0 release contains several fixes and features. Some highlights are:
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446711390.55/warc/CC-MAIN-20221209043931-20221209073931-00800.warc.gz
CC-MAIN-2022-49
3,848
34
https://www.fileinspect.com/fileinfo/datasvcutil-exe/
code
The DataSvcUtil.exe is a DataSvcUtil.exe. This file is part of Microsoft® .NET Framework. DataSvcUtil.exe is developed by Microsoft Corporation. It’s a system and hidden file. DataSvcUtil.exe is usually located in the %WINDOWS% sub-folder and its usual size is 76,648 bytes. Author: Microsoft CorporationProcess: DataSvcUtil.exePart Of: Microsoft® .NET FrameworkCommon path(s): subfolder in %WINDOWS% subfolder in %PROGRAM_FILES%Keywords(s): systemFilesize(s): 76,648 bytes, 48,960 bytes, 71,512 bytes, 60,248 bytes, 72,584 bytes, 78,856 bytes No comments found
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652663011588.83/warc/CC-MAIN-20220528000300-20220528030300-00268.warc.gz
CC-MAIN-2022-21
565
5
https://oxygenites.com/star-wars-seo-service/
code
- What payment methods do you accept? - What is your Refund Policy? - Do you offer discounts for existing users? - Do you provide a report at the end of the campaign? - Do you work with all niches? - What will be the average DR of the website from where we will get the outreach link? - Do you work with new websites? - Can we provide multiple websites? - What is the TAT of the service?
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662517485.8/warc/CC-MAIN-20220517130706-20220517160706-00484.warc.gz
CC-MAIN-2022-21
387
9
https://ubuntuforums.org/printthread.php?t=508206
code
Hi From Ubuntu Live!! Hey Guys! I'm in my hotel room right now with steady internet for the first time on this trip. My card is very flaky with open networks (but does WPA/WEP rock solid, can someone explain that?). Ubuntu Live is awesome! Portland is a great town, if you've never been, I recommend it. I've met a lot of cool people and learned a lot of stuff we can use in the Loco. Just checking in with everyone, letting you all know I'm here. I don't think I'll be at the meeting tomorrow night as I'll be getting on an Amtrak to Seattle right around that time. Has any work been done as far as the BBQ? What's the status of that? Are we set for Norristown? What about a grill, does this park have a Grill? How are we procuring food? Have we advertised? I have some awesome news from System76 for the SFD if we want nice fliers for advertising http://system76.com/article_info.php?articles_id=26 the best part is it's called becoming a 76er! I suck at basketball but I love Linux so it feels good. I think it's something we should take advantage of, and quickly because I was chatting with them here and supplies are limited since it costs print and ship and everything. They're an awesome group of guys.
s3://commoncrawl/crawl-data/CC-MAIN-2016-50/segments/1480698541995.74/warc/CC-MAIN-20161202170901-00306-ip-10-31-129-80.ec2.internal.warc.gz
CC-MAIN-2016-50
1,209
2
http://fernandezpablo85.github.io/2012/01/17/evented_api_node.html
code
There’s a lot of talk going on about node scalability, performance, memory use, etc. This time I want to focus on a different thing: api design. Let’s take the web server example again and see the api that’s presented to us: The response object we get is just a handle for us to subscribe to (observe) certain events. While weird at first, this is a really elegant design decision. We don’t need to inspect status codes or stuff, we just subscribe to the data event if we want to parse the response, or the error event if we want additional error handling. None of these are mandatory and there are no if/switch statements. Don’t worry since this is not hard at all, in fact, let’s go create our own non-evented api, a simple As you can see we now have to check for the value of err (what is err anyway? a flag, an object with error information?) and do some conditional handling. While not very ugly, this whole “2 value callback” is not very elegant. What happens if there’s another outcome of the method (not just error or data)? In this silly example that’s a non-issue, but you sure can tell this doesn’t scale. Alternatives are passing in another parameter, which would break backwards compatibility, or adding information to the error object, mixing concerns. This is clearly why node developers use the evented api over this err, data thing for non-trivial callbacks. Fear not since doing this is not hard at all, in fact its so simple that we’re going to do that now in about the same lines of code: We’re using EventEmitter, a class that’s part of node’s library (the object you get from an http response inherits from it too). Feel free to dig into the docs, but the most important methods of it are emit, which is used to fire events, and on which attaches handlers to particular events. Those handlers receive the parameters provided to the emit method. Our example is really simple, almost stupid, you probably won’t see the gain here. But suppose you’re clients are only interested in knowing if the sum is negative, you could then emit a negative event. Hopefully you’ll see how this scales to more complex apis with a few callbacks. Is this a silver bullet? should you design all node apis like this? Of course not. But it sure is a good tool to keep close when designing your next node app.
s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590347401004.26/warc/CC-MAIN-20200528232803-20200529022803-00148.warc.gz
CC-MAIN-2020-24
2,344
12
https://forum.loraserver.io/t/clearer-comments-regarding-enabled-uplink-channels-for-us-configuration/3794
code
After a lot of tinkering and head-scratching I was able to solve the issue I was having with specifying channel subband on my gateway and the network server. Some minor changes to the comments would help a lot in case someone deals with the same issues in the future. Currently the comments about enabled uplink channels looks like this: # Enable only a given sub-set of channels # # Use this when ony a sub-set of the by default enabled channels are being # used. For example when only using the first 8 channels of the US band. # Note: when left blank, all channels will be enabled. # # Example: # enabled_uplink_channels=[0, 1, 2, 3, 4, 5, 6, 7] enabled_uplink_channels= in the quick-start guide we have this: US915 configuration example [network_server] net_id="000000" [network_server.band] name="US_902_928" enabled_uplink_channels=[0, 1, 2, 3, 4, 5, 6, 7] I copied the example when setting my server up but didn’t fully realize that the channels != sub-band. Though much troubleshooting I had to figure out why sensors were joining on sub-band 2 but sending data from sub-band 1. (Sub-band terminology is present in Laird Sentrius sensors as well as Multitech gateways). Adding a comment clarifying that in the US standard channels 0-7 corresponds to sub-band 1 and, for example, channels 8-15 correspond to sub-band 2 would have helped a lot in understanding how the configuration works. To clarify for myself as well, are the 8 upstream 500kHz bandwidth channels (64 to 71) listed in the regional parameters included in this list and what is that channel used for?
s3://commoncrawl/crawl-data/CC-MAIN-2019-30/segments/1563195529007.88/warc/CC-MAIN-20190723064353-20190723090353-00010.warc.gz
CC-MAIN-2019-30
1,575
9
http://www.coderanch.com/t/508900/java/java/Inferring-type-call-generic-method
code
Given below is the code that threw me into confusion; line # 30 in particular. Since both the generic parameters being passed to method 'add' are of type Shape, I assumed that for this call to method 'add', the generic type would be inferred to 'Shape'. But since it doesn't generate a class cast exception at line# 30, it is obvious that generic type is inferred as 'Object' and not Shape. Could someone please explain the way generic types are inferred when a generic method is called? Actually, that was sort of surprising to me too, but I guess it makes sense given how Java implements generics. Generics are a late addition to the Java language and could be called a bit of a kludge in the sense that they only serve as hints to the compiler, and don't affect the resulting byte code. That is, although the basic Collection class became Collection<T> when generics were introduced, the byte codes for the two are the same. That's good because it allows older Java applications to run without modification on newer JVMs, but has some drawbacks too. If you declare a collection to contain type ... Shape, for example ... the compiler will tell you if you try to add a non-Shape to it, and won't make you cast elements you retrieve to Shape. That's good and it saves a lot of tedious coding. However, if you try to cast a random object to type T, like this example, you won't see an error, because the runtime doesn't know what T is. It considers it to be Object, unless you specifically make T extend some other class. That exposes some weakness in Java's implementation of generics, but fortunately, it takes a fairly contrived example to do it. I don't really see the problem. The compiler is kind enough to warn us that we're using unchecked operations. And because we ignore it we get punched in the face with an ClassCastException when we try to use it. If you don't know what caused this then read about type erasure. "Any fool can write code that a computer can understand. Good programmers write code that humans can understand." --- Martin Fowler Please correct my English. Everyone seems to stick with the fact that type info in generics is lost after compilation and that at runtime its just the generic type specified to the left of the "<" that finally matters. If so, how does the following program work? Output is: hithere and 3 as expected. How does it delegate the call to the correct method at runtime? PS:- In helios, this file is not compiling. Is there a workaround for that? Rob Spoor wrote:What's the error you get? Is it perhaps the varargs on line 16? The error says: "Method add(Collection<Integer>) has the same erasure add(Collection<E>) as another method" "Method add(Collection<String>) has the same erasure add(Collection<E>) as another method" against the 2 method definitions. In an earlier version of eclipse, its getting compiled successfully, though I have now forgotten which version that was now. Helios has it right. Older versions do not give a compile error, while they should... Not sure what the verison of JDK used by the Helios here (Or it may have added some constraints which are not enforced by the JDK even the JLS say so) ... I don't get an error on JDK 1.6.0_07 (no IDE), have to check on another version and in the IDE too... Because of type erasure, the methods get turned into "public int add(Collection)" and "public String add(Collection)". As you see both methods now have the same name and parameter list. Every compiler should fail compilation. If one doesn't then that compiler is actually broken.
s3://commoncrawl/crawl-data/CC-MAIN-2015-48/segments/1448398450762.4/warc/CC-MAIN-20151124205410-00002-ip-10-71-132-137.ec2.internal.warc.gz
CC-MAIN-2015-48
3,560
21
https://discuss.pytorch.org/t/questions-on-c-extension-for-customized-convolution-layers/97024
code
Hi, I’m working on creating a C++ extension for a customized depthwise convolution layer on CPU. Besides all the parameters used in at::Tensor _convolution() in pytorch/pytorch/blob/master/aten/src/ATen/native/Convolution.cpp, I have another input which is a mask in the same shape of input channel (const Tensor& mask). I met couple of problems when implementing this new convolution extension: - Although I have used namespace at and native as used in pytorch/pytorch/blob/master/aten/src/ATen/native/Convolution.cpp, I’m still facing the problem : error: no type named ‘IntArrayRef’ in namespace ‘at’ May I ask where is this IntArrayRef defined? - I was not be able to use the dispatch as what the source code did at pytorch/pytorch/blob/master/aten/src/ATen/native/Convolution.cpp line 21: DEFINE_DISPATCH(convolution_depthwise3x3_winograd_stub); The reason I’m using it is because I also want to call convolution_depthwise3x3_winograd_stub(); - This may sounds like a silly one, my convolution is executed based on the zeros and ones in my mask, so I was trying to use if-statements. It seems I was not be able to do some comparisons like: if (mask[i] == 0) or if (mask[i] == torch::zeros(shape)), it will return an error of error: value of type ‘at::Tensor’ is not contextually convertible to ‘bool’. May I ask how should I do it?
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662601401.72/warc/CC-MAIN-20220526035036-20220526065036-00029.warc.gz
CC-MAIN-2022-21
1,358
6
http://www.coderanch.com/t/2653/Ranch-Office/replying-post-quoting-previous-post
code
File APIs for Java Developers Manipulate DOC, XLS, PPT, PDF and many others from your application. A friendly place for programming greenhorns! Big Moose Saloon Register / Login Problem with replying to post quoting previous post(s) Joined: Jun 01, 2005 Jun 27, 2005 11:22:00 I am having problems when posting replies quoting previous posts, especially when I try to edit the reply I posted. UBB code and HTML get mixed up and the end result is not pleasing. For example refer . Is there any way to preview the reply before actually posting it ? Regards,<br>K. Mahesh<br> <br>SCJP 1.2 Aug-2001 : 79% Author and ninkuma Joined: Jan 10, 2002 Jun 27, 2005 12:52:00 The forum software does not include a preview feature, but, if the post doesn't come at as you wanted (which seems to happen to me about half the time!), you can edit your own post to modify it to suit your intentions. Asking smart questions Books by Bear With a little knowledge, a cast iron skillet is non-stick and lasts a lifetime. subject: Problem with replying to post quoting previous post(s) ePlanetLabs - SCDJWS Solution Guide Anyone registered for the SCJA certification?? All times are in JavaRanch time: GMT-6 in summer, GMT-7 in winter | Powered by Copyright © 1998-2015
s3://commoncrawl/crawl-data/CC-MAIN-2015-48/segments/1448398461390.54/warc/CC-MAIN-20151124205421-00336-ip-10-71-132-137.ec2.internal.warc.gz
CC-MAIN-2015-48
1,246
26
https://www.tryspree.com/products/15368-free-game-kingdom-new-lands
code
Free Game - Kingdom New Lands Visit the sample website.View Offer Be brave, ruler, and fight to the bitter end, lest these New Lands conquer you instead. Kingdom is a minimalistic micro strategy game with modern retro aesthetics and an ambient soundtrack. Players take control of a monarch struggling to build their kingdom from nothing by exploring the world, recruit loyal subjects and defend from the nightly Greed attacks.
s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590347391923.3/warc/CC-MAIN-20200526222359-20200527012359-00035.warc.gz
CC-MAIN-2020-24
426
4
http://news.softpedia.com/news/Obfuscation-and-Polymorphism-Separates-aaeh-Family-from-Other-AutoRun-Worms-330111.shtml
code
Threats that rely on the AutoRun function to spread are highly common these days, but there’s one worm family that stands out of the crowd because of the obfuscation and polymorphism mechanisms it employs. According to McAfee experts, the W32/Autorun.worm.aaeh family is very similar to other threats because it’s spread in the same manner. However, for obfuscation, the malware’s authors are hiding their creation inside open-source VB6 projects taken from repositories. While this is possibly an attempt to pass the worm off as a legitimate piece of software, experts found that the compiled binaries are encrypted using a randomly generated encryption key. “The code is obfuscated and the developers appear to have used an automated code scrambler for the binary generation. The generated code uses junk API calls and string functions to further complicate any analysis,” Anti-Malware Researcher Sanchit Karve explained. The complete technical analysis and advice on how to protect yourself against the threat are available here.
s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440645340161.79/warc/CC-MAIN-20150827031540-00141-ip-10-171-96-226.ec2.internal.warc.gz
CC-MAIN-2015-35
1,042
6
https://www.workhoppers.com/en/workhopper/52382/shalini/resource-development/vancouver-bc
code
Location:Vancouver, BC, Canada (On-site)Education level: Some college/University Years of experience: Less than 2 years Attributes that best describes: Strong analytical skills I recently finished my fourth year in the International Economics Program at UBC. I am proficient with Microsoft Word, and have exposure to Python, SQL, and Salesforce. No reviews yet.
s3://commoncrawl/crawl-data/CC-MAIN-2019-09/segments/1550247482186.20/warc/CC-MAIN-20190217152248-20190217174248-00609.warc.gz
CC-MAIN-2019-09
361
6
https://tjmachinelearning.com/rankings
code
TJ Machine Learning Club Making AI more accessible For the first time ever, we have connected with data science professors at GMU and the EDIT internship team (a digital pathology + machine learning focused internship) who have agreed to acknowledge TJ Machine Learning Club rankings in their decision making. The top Machine Learning Club participants will also be able to obtain a Slingshot internship without going through the standard application process! |Name||Pytorch PSET||ResNet PSET||Total| 2020-2021 Overall Rankings With our fifth year finished, we congratulate our top 3 students for their success in quizzes, problem sets, and coding competitions! 2019-2020 Overall Rankings With our fourth year finished, we congratulate our top 3 students for their success in quizzes, problem sets, and coding competitions! 2018-2019 Overall Rankings With our third year finished, we congratulate our top 3 students for their success in quizzes, problem sets, and coding competitions! 2017-2018 Overall Rankings Another year of Machine Learning Club has concluded. This year's rankings include results from competitions, quizzes, and problem sets. Congratulations to our top 3 students! 2016-2017 Overall Rankings The inaugural year of Machine Learning Club has come to a close. Congratulations to our top 3 students from 2016-2017! These results show the students who scored the best on our club-run competitions. In each club-run competition, a dataset and instructions were given to students following the lecture and code was due before the next meeting.
s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320304749.63/warc/CC-MAIN-20220125005757-20220125035757-00202.warc.gz
CC-MAIN-2022-05
1,558
15
https://www.funnyfidos.com/category/funny-dog-videos/
code
When the humans are away the Dog will play. Posted in Funny Dog Videos I | 1 Comment » Via: Nancy Armstrong Posted in Funny Dog Videos I | No Comments » That’s one determined Dog. Via: Crazy Funny! TM Via: Alex Hutchinson What’s A Dog got to do to get a taste of pizza around here? I want this one or this one or that one… Subscribe in a Reader Follow FunnyFidos on You are currently browsing the archives for the Funny Dog Videos Icategory. Powered by Wordpress
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817106.73/warc/CC-MAIN-20240416191221-20240416221221-00308.warc.gz
CC-MAIN-2024-18
470
13
http://www.fansofrealitytv.com/forums/last-comic-standing/32816-what-open-lines-each-comic-2.html
code
Dat was likeable. Tammy is just annoying, no one is rooting for her. And to be on topic: "You may have seen me before; I'm the fourth guy from the left on the evolutionary chart." "Like the accent? It's from San Francisco. You didn't need Scooby Doo to figure out that one did you"
s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218189771.94/warc/CC-MAIN-20170322212949-00127-ip-10-233-31-227.ec2.internal.warc.gz
CC-MAIN-2017-13
281
4
https://www.biositesystems.com/careers/senior-software-engineer-senior-web-developer/
code
Senior Software Engineer / Senior Web Developer Biosite Systems Ltd is a rapidly growing technology company based in Solihull which is focused on providing biometric and construction site management solutions to the UK market. This is an opportunity to join a team which is driven by high standards and a desire to produce products that customers enjoy using. We are looking for a motivated individual who is keen to add value to our development process. The position is available at either our Swansea or Solihull office. - Passionate about delivering quality products - A technical degree - Well organised, punctual, and a strong communicator - Experience working in cross-functional, collaborative agile environments - Experience with Angular front ends - Experience with Python/Django back ends - Experience with Couchbase - Experience with mobile application development Salary and benefits - Flexible hours, 40 hrs/week with core hours from 10-4 - Contribution to a gym membership of your choice - 10% time available to use on your own projects and ideas - Company pension scheme - Varied work with plenty of opportunity to experiment with new technologies.
s3://commoncrawl/crawl-data/CC-MAIN-2019-22/segments/1558232258620.81/warc/CC-MAIN-20190526004917-20190526030917-00272.warc.gz
CC-MAIN-2019-22
1,163
18
https://odoe.net/blog/json-features-and-esri-javascript-api-noob-adventures
code
Rene Rubalcava | September 29, 2010 About a week ago, our test server that we have ArcGIS Server on decided to implode. Our IT department is in the process of building and installing all necessary software to get it back up and running. What that means to me is that most of my Flex work is stalled. Everything I do requires access to ArcGIS Server services and even WebOrb which we had loaded on the same machine. Now, I knew that I could build a Flex application that could load a shapefile and display it on a map and all that jazz, but where's the fun in doing something you already know how to do. Besides, I was thinking of future proofing this little thing for mobile use. You can see an example of a map loading JSON features of States here. The key was, when you get your JSON results, you want to iterate through the results["features"] to find attributes and geometries. Here is the script for loading JSON features. Once you get that far, the rest is easy. Create the graphics, load attributes into an InfoTemplate if you'd like and voila, you have a nice map with features loaded without the need for your own ArcGIS Server to serve the data out. It may not seem like a big deal, but I didn't find any quick guides on this info, so I just thought I would share what I learned this past week.
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323585177.11/warc/CC-MAIN-20211017113503-20211017143503-00040.warc.gz
CC-MAIN-2021-43
1,304
6
https://research.ibm.com/publications/note-on-minimax-sliding-mode-control-design-for-linear-systems
code
The technical note studies the problem of sliding mode control design for linear systems with incomplete and noisy measurements of the output and additive/multiplicative exogenous disturbances. First, we construct a linear minimax observer to have an estimate of the system's state with minimal worst-case error. Second, we establish the optimality of the constructed observer in the class of all observers represented by measurable functionals of the output. Finally, we propose an algorithm, generating continuous and discontinuous feedbacks, which steers the observer as close as possible to a given sliding hyperplane in finite time. The optimality (sub-optimality) of the designed feedbacks is proven for the case of bounded noises and additive (multiplicative) disturbances of L2-class. The efficacy of the proposed algorithm is illustrated by a numerical example.
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296818105.48/warc/CC-MAIN-20240422082202-20240422112202-00268.warc.gz
CC-MAIN-2024-18
870
1
http://passhosting.net/partition-table/error-setting-raw-device-invalid-argument.html
code
Error Setting Raw Device Invalid Argument However, this is not needed, as the basefs is read during container.Mount() anyway, It needs it.Unfortunately I am getting the dreaded "Failed to create virtual disk: Invalid argument (1441801)" error. The debs in Ubuntu 10.10 Maverick do not work correctly, you must install Sign in to comment Contact GitHub API failed (error Permission denied). So I removed Docker and set up AUFS Udev sync Devicemapper storage driver ! Ndevenish commented Sep 8, 2014 I'm having refresh your session. Your not going to perform a partitioning on a filesystem 2015 it worked, thanks @TIS-Stefan. Re Reading The Partition Table Failed Invalid Argument Reporting TCP with an option to the docker daemon. Likes (0) Actions 8. This seems minor, but this is actually problematic, as the Get/Put pair will it in the code, so It 's not a big problem? Calling Ioctl To Re Read Partition Table Re Reading The Partition Table Failed Invalid Argument failed (error Invalid argument). I wonder if I should set some parameters before using VideoCapture object (I have tried I wonder if I should set some parameters before using VideoCapture object (I have tried Re Reading The Partition Table Failed Device Or Resource Busy it again to do a diff. This will cause http://www.linuxquestions.org/questions/linux-newbie-8/warning-re-reading-the-partition-table-failed-with-error-22-invalid-argument-734376/ updates about Open Source Projects, Conferences and News. The Partition Table Has Been Altered V4l2sink device=/dev/video0 (we get the pixformat error) (in have CSS turned off. Distributor ID: Ubuntu Description: Ubuntu 14.04 LTS Release: 14.04 I see on the internet that of permutations too! Re Reading The Partition Table Failed Device Or Resource Busy Additionally it will create a supurious devicemapper activate/deactivate cycle the partition table failed with error 22: Invalid argument." User Name Remember Me? Set_Sizes: Open on "/sys/fs/cgroup/cpu,cpuacct/iobw.tst" Set_Sizes: Open on "/sys/fs/cgroup/cpu,cpuacct/iobw.tst" Re Reading The Partition Table Failed Invalid Argument Fdisk Re Reading The Partition Table Failed Device Or Resource Busy collection of the base knowledge needed to proceed with system and network administration. TheImagingSource member TIS-Edgar commented Dec 12, 2014 so far Dokku is rebuilding my apps without issue. This seems minor, but this is actually problematic, as the Get/Put pair will Set_Sizes: Open on "/dev/iobw.tst" Any help would be appreciated (good Set_Sizes: Open on "/sys/fs/cgroup/net_cls/iobw.tst" Calling Ioctl To Re Read Partition Table disk).So near and yet so far...Simon Like Show 0 Likes (0) Actions 4. So i am wondering why in windows and in IC Capture 2.3 i what type of variable is ctrl? I just needed to create logical volumes in character With this change docker build on post a blank message. Please see the VMkernel log file for more details.Mar 7 18:42:00 Hostd: Docker 0.9.1 isn't the latest any more. The New Table Will Be Used At The Next Reboot Or After You Run Partprobe(8) Or Kpartx(8) you're running on EC2. Videoscale devicemapper is now race-free, and slightly faster. Additionally it will create a supurious devicemapper activate/deactivate cycle if need. Reporting TCP that causes races with udev as seen in https://github.com/dotcloud/docker/issues/4036. Rthomas commented Jul 3, 2014 @michaelbarton no we changed with id and value but it didn't work. The errors with "permission denied" I if I remember correctly) and everything else fails. Invalid Flag 0x0000 Of Partition Table 4 Will Be Corrected By W(rite) failed (error Permission denied). By doing some experiments using aio-stress, I found O_DIRECT works fine with AIO it's not implemented. do not call aio_read()/aio_write() and use AIO functions from kernel instead . Unclejack closed this Feb 21, 2014 alexlarsson commented Feb 21, 2014 I View HCL Entries View LQ Wiki Contributions Visit vimal's homepage!
s3://commoncrawl/crawl-data/CC-MAIN-2018-09/segments/1518891814079.59/warc/CC-MAIN-20180222081525-20180222101525-00066.warc.gz
CC-MAIN-2018-09
3,967
16
https://forums.overclockers.com.au/threads/bad-at-programming-need-to-improve.368377/
code
This thread may seem a little awkward but here's my situation. I've always had an interest in computers, and wouldn't hesitate to try anything new that's related to computers. Even in high school, IT would be my strongest subject and I scored fairly impressive marks for most of my assignments. So it seemed a wise decision for me to choose to do a Computer Science degree when I got into uni. Well this is my first year, and I'm barely scrapping the first semester. I realise that I'm terribly weak in programming, we do haskell and java as core units for the course. The last few tests I did were horrendous, getting a 10/20 for my midsem test and only being able to do 3/6 questions for an inlab programming test. It seems as though my aptitude for 'computers' in general hasn't do me good at all. For all you experienced programmers out there, I was wondering whether you could give me any tips as to how I can channel my interest in computers to programming. Any tips to improve would definitely be most welcomed.
s3://commoncrawl/crawl-data/CC-MAIN-2019-39/segments/1568514573570.6/warc/CC-MAIN-20190919183843-20190919205843-00200.warc.gz
CC-MAIN-2019-39
1,018
1
https://botostore.com/c/badiexrobot/
code
✔ BadiRobots Litecoin P2P Exchange ✔ BadiRobots Menu @BadiRobotOfficial What can do this bot?🤖 Welcome to BadiRobot🤖 🤖 Lite Coin 🔁 Exchange 🤖 The bot works like peer to peer system where Buyer makes fiat payment directly to Seller according to the specified payment method (PayPal, Revolut, Credit Card, etc.) and Seller gives coins to the Buyer through the Bot. The Bot acts as a guarantee holding the coins in block until Seller get the fiat payment and release the coins. Click here for more of @BadiRobotOfficial 👋 Welcome to @BadiExRobot! I can help you to exchange LTC to fiat money like dollars or vice versa. You can start easily with Exchange button or get more info at Support section! Enjoy!
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500456.61/warc/CC-MAIN-20230207102930-20230207132930-00747.warc.gz
CC-MAIN-2023-06
724
8
https://www.castbox.fm/episode/SIO380%3A-Does-Which-College-You-Go-To-Really-Matter--(Part-2)-id2919101-id626828884
code
SIO380: Does Which College You Go To Really Matter? (Part 2) This is part 2! Make sure you listened to part 1! Dr. Elizabeth has a PhD in Organizational Psychology. She did a massive dive into the research on college selection and whether or not it makes a difference in outcomes. In part 2, we get to more recent studies and studies that looked at slightly different questions around this.
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100593.71/warc/CC-MAIN-20231206095331-20231206125331-00749.warc.gz
CC-MAIN-2023-50
390
2
https://www.wikiwirral.co.uk/forums/ubbthreads.php/topics/557472/quad-core-packard-bell-pc-3gb-ram-320gb-hdd.html
code
I tried it once on my laptop, but it wouldn't see the keyboard and other things; it installed just fine however, but on a laptop, the keyboard compatibility is kinda important lol. I suspect it is probably because my primary laptop is a 12.1 C2D ultra-portable, and uses a proprietary reduced-key keyboard to fit it lol. This was using a disc containing Snow Leopard, I can run you off a copy if you wanted to try it mate, but can't confirm whether it would work; it probably depends whether the OS likes the chipset and other hardware etc, I'd hazard a guess it would install and run, as to how useful the install would be is anyones guess lol. Any similar keyboard incompatibilities would be easier to resolve on a desktop. I have never tried since, mainly because the only system I have with a c2d (or a compatible CPU for the case) is the ultra-portable - and I'm quite happy with Vista.
s3://commoncrawl/crawl-data/CC-MAIN-2017-47/segments/1510934806856.86/warc/CC-MAIN-20171123180631-20171123200631-00252.warc.gz
CC-MAIN-2017-47
891
3
https://qtzar.com/2003/05/13/dlyh-5mhmfr/
code
Steve has been blogging about DXTags and how they can be used by non-domino developers to create exciting and totally different blogs using the DominoBlog template and I have to agree, using special tags, like he has done, really does add a greater flexibility to the site designer. As an example of the power of special tags outside of website design, I created an application for a customer last year that used a tagging system internally. The customer wanted to be able to output letters based on the contents of documents within the database. When the application had been originally written the letters were hardcoded into the database. This meant that if the letter needed changing they had to get a developer to do it. After I looked at the application for a while I came up with a tagging system. They could create ‘Letter Template’ documents in the system and use tags like **FNAME** and **LNAME** where they wanted to firstname and last names to appear. Kind of like how mail merge works. The system works great, they can change the letter templates however they want and they don’t need to get a developer in to do it ( unless they want new tags ) So, there you go, another idea for the use of special tags. Oh, Steve has also mentioned a new project along the lines of a website manager. Hopfully we won’t have to wait too long before we see it as I have a small project to do in the next few weeks that it may suit. Buying a few licenses would save me a load of development time… John Marshall is using a tagging system for his new template too. Sounds really nifty. Check it out: http://www.swapcode.com Lotus Advisor offered a similar letter system in their December 2002 issure. Download the database here.
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224649343.34/warc/CC-MAIN-20230603201228-20230603231228-00157.warc.gz
CC-MAIN-2023-23
1,732
7
https://www.shawnblog.com/tag/corruption/
code
FDA scientists complain to Obama of ‘corruption’ My bloated, directionless WordPress blog, shawnblog.com, was either hacked or corrupted in some other way and I failed to restore the content. I really never chose a topic and was spending far too much time and, as much as I’d like to think I should be, I’m not on the A, B or C list of bloggers. It seems that, with the “social web” and “web 2.0” direction things seem to be moving in, the passionate argument I used to make (that web based, hosted solutions are better for the mainstream and therefore, will be more likely to grow and become wildly popular) when I worked for TA may have been correct (of course). Look at all the browser based, hosted “apps” out there! Who needs to install something and administer scripts when you can just use the latest and greatest newly developed services at will? I might always maintain a more static page somewhere but it will not be something I have to upgrade and tweak all the time. Not hating (at all), just seeing that the blog idea might be old (finally) or evolving as anything that grows must do. This looks like a great service. For now Soon, shawnblog.com is “running” Serendipity will be fed by tumblr and it’s going to get about 75% 78% less of my time.
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764499710.49/warc/CC-MAIN-20230129080341-20230129110341-00097.warc.gz
CC-MAIN-2023-06
1,284
7
https://docs.couchbase.com/tutorials/getting-started-ce/setup-cluster/tutorial_en.html
code
Setting up a Couchbase CE Cluster In this tutorial you can learn how to set up a Couchbase Server cluster, how to manage services availability, and replicate data. This tutorial was built using the Community Edition(CE) of Couchbase Server, so you can use this distribution to follow this guide free of charge. To set up a cluster, you need to install Couchbase Server on multiple nodes. In this section you can find instructions on how to do so, please follow these instructions to deploy 3 nodes. Later on, we will refer to those as You can install the server in a machine (bare metal) or use a containerization tool such as Docker, to speed up this part of the tutorial. This would be the fastest and easiest way to get the server started. If you need help installing Docker, their official documentation contains install guides for multiple OS. Docker is up and running you can type this command on your terminal to launch the server. docker run -itd --name couchbase-server -p 8091-8094:8091-8094 -p 11210:11210 couchbase:community For a more extensive install guide, you can check the Couchbase image description on Dockerhub. First, open your terminal and install these tools, used by some of the core Couchbase Server packages. sudo apt update sudo apt install curl lsb-release gnupg Download and install the .deb meta-package, it contains the necessary information for apt to retrieve Couchbase’s necessary packages and public signing keys. curl -O https://packages.couchbase.com/releases/couchbase-release/couchbase-server-community_6.5.0-ubuntu18.04_amd64.deb sudo dpkg -i ./couchbase-server-community_6.5.0-ubuntu18.04_amd64.deb Now you are ready to install the Couchbase Server CE latest release. sudo apt update sudo apt install couchbase-server-community For a more extensive install guide, you can follow the Couchbase documentation for Ubuntu 18.04. MSI installer from this link. Execute it and follow the wizard. For a more extensive install guide, you can follow the Couchbase documentation for Windows 10. zip file from this link and open it, it will be send to Open the folder and drag the application to you Double click the Couchbase Server application to start the server. You can now use the navigation tab icon on the top right corner of your desktop to manage your server. For a more extensive install guide, you can follow the Couchbase documentation for macOS. Provisioning establishes the full administrator credentials for the server and specifies its service-assignments and memory-quota allocations. When provisioning a node, options are to create a new cluster with a sole member or joining an existing one. You can provision a node by CLI, REST API or Web UI. The easiest way is with the help of the Web UI, so open your browser and navigate to port 8091 of node-1. You should see something like this now. Since this will be the first node of our 3 nodes cluster, click on Setup New Cluster. Choose a server name and an administrator with a password, these credentials must be saved for later use. The next step is to configure some aspects of your cluster like services available, memory utilization and storage path for your data and indexes. Click on the Configure Disk, Memory, Services button. The default path and memory quotas should be fine for this test cluster. If you want to learn more about couchbase services and how to properly tune your server, follow this link. Quick explanation though: Data: Supports the storing, setting, and retrieving of data-items, specified by key. Query: Parses queries specified in the N1QLquery language, executes the queries, and returns results. This service interacts with both the Index: Creates indexes, for use by the Search: Create indexes specially purposed for Full-Text Search. This supports language-aware searching; allowing users to search for, say, the word beauties, and additionally obtain results for beauty and beautiful. Right now, you have a functional one node cluster, let’s add some data before adding more nodes. If you look close enough, there is a note indicating you to add a sample bucket. Click it and choose any of the options, you will see a notification for the task. When it finishes you can explore your new sample data on the Servers tab, you can find a list of your nodes, and how much data is currently stored. If you look closer, there is also a warning telling you that you need at least one more node to be able to replicate your data. Open up your browser again, this time open the Web UI of node-2 and press on Join Existing Cluster. Enter node-1 address and credentials. At the bottom, press the arrow to configure some aspect of this node. You could probably notice there are fewer options than those available for node-1, that’s because you will form part of a previously created cluster, so most configurations will be imported. Dashboard tab you can find information about your cluster. To get a more detailed view, go to the Right now your new node is waiting for a rebalance operation to start serving data or holding replicas. To manually force such operation, press on the That may take a while, so be patient, when it’s over, each document and its replica will be distributed between your nodes. As a quick indicator, bellow the items column, there is information about how many replicas are currently being stored on each node. Adding another node or more can be done easily by just following the steps in the section above as many times as necessary. Enter the Web UI from node-3 now, and follow those steps again. With each node added, documents and replicas get more and more sparsely between your cluster. This is quite good, you can access all your data from any node and replicas will be available if any node crashes or gets removed. The number of replicas per document can be changed for any bucket, increasing that factor will make your cluster more secure against crashes in exchange for disk capacity. To change the replica level click the bucket on the Buckets tab, and then press the Edit button. The desired value is under Advanced bucket settings. Couchbase Server nodes can indistinctly be removed or added, there are no special nodes with services or processes that can’t be replaced on the run. Let’s test that by removing the very first node we provisioned. After a rebalance operation, your cluster will drop all documents and replicas from node-1 and form a 2 nodes cluster again with all data.
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323583408.93/warc/CC-MAIN-20211016013436-20211016043436-00194.warc.gz
CC-MAIN-2021-43
6,459
73
https://prestonfeather.com/employee/reimbursements/expense-reimbursements/
code
This form is used to request reimbursement for eligible business expenses, excluding mileage (see below for separate link to mileage reimbursement form). To receive full reimbursement, please follow these steps: - Expenses should have manager approval prior to being charged - Submit completed form prior to the Friday before the next Payroll (every other Thursday) - Attach appropriate receipts and documentation Unless expense qualifies under an established reimbursement policy, every attempt to pay through company established vendors or credit cards should be made before reimbursement. Examples of charges which will not be reimbursed include customer related purchases, vehicle or store maintenance/repair, or reimbursements over a year old. If you need to submit a mileage reimbursement, see the form here: https://prestonfeather.com/employee/reimbursements/mileage-reimbursements/
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764499871.68/warc/CC-MAIN-20230131122916-20230131152916-00576.warc.gz
CC-MAIN-2023-06
889
7
https://www.game-debate.com/games/index.php?g_id=37601&game=Robotics;Notes%20Dash
code
Half a year after the events of ROBOTICS;NOTES ELITE, Kaito Yashio is introduced to Itaru Hashida through Nae Tennouji. Unsettling incidents start occurring all around them, harbingers of an event that will again plunge the world into chaos. PC System Analysis For Robotics;Notes Dash Requirements Your PC will need a graphics card thats as powerful as a GeForce GTX 650 1GB/Radeon HD 7770 1GB GDDR5 and it should be paired with either a FX-6300/Core i5-2300 2.8GHz CPU to match the Robotics;Notes Dash recommended system specs. This PC setup will deliver 60 Frames Per Second on High graphics settings on 1080p monitor resolution. You should also have 1.5 GB system memory for min specs. Another thing to consider is the DirectX capability of your GPU. Robotics;Notes Dash needs a GPU capable of running DirectX 9. In short you need a 9 year old PC for best Robotics;Notes Dash performance.
s3://commoncrawl/crawl-data/CC-MAIN-2021-17/segments/1618038083007.51/warc/CC-MAIN-20210415035637-20210415065637-00138.warc.gz
CC-MAIN-2021-17
891
3
http://www.stegenga.net/content/view/82/2/
code
|SHOA - Waiting!| |Written by John| |Wednesday, 20 August 2008| SHOA -- Waiting for the Votes. So, we're waiting for the results. I've not heard anything yet, and so we wait. Just FYI, the responses and comments I've received HERE, and the email I've received separately, shows about 70% NO... so, we're just waiting on the final tally - And, of course, for the promised "list of locations" for the speed humps. If anyone hears anything, please let me know! UPDATE - September 13 2008 - Electronic version of the news letter was mailed out.... IN MS PUBLISHER format... Since this is not a universal format, or one that many people would actually have access to, I converted to PDF. Click HERE to see the newsletter and vote totals.
s3://commoncrawl/crawl-data/CC-MAIN-2018-13/segments/1521257647146.41/warc/CC-MAIN-20180319194922-20180319214922-00688.warc.gz
CC-MAIN-2018-13
732
9
https://www.pulumi.com/ai/answers/mJB3M7qktijxN6yZRf4cVk/implementing-multi-tenant-ai-services-with-kubernetes-gateway
code
Multi-Tenant AI Services with Kubernetes GatewayPython To set up multi-tenant AI services using Kubernetes, you will require a Kubernetes cluster that can support multiple tenants, isolate their resources, and route traffic appropriately to the services hosted for each tenant. One way to achieve this is by using a Kubernetes Ingress controller to manage external access to the services in your cluster. The Ingress resource is a collection of rules that allow inbound connections to reach the services. These rules can be configured to provide services with externally-reachable URLs, load balance traffic, terminate SSL, and offer name or path-based virtual hosting. For multi-tenancy, you can define separate namespaces for each tenant's resources. This provides a logical separation between tenants and allows for resource quota enforcement. Ingress can be configured with rules to direct traffic based on the subdomain or path to the appropriate services in different namespaces. Let's look at how you can use Pulumi to set up a Kubernetes Ingress to act as a gateway for multi-tenant AI services: - Define Kubernetes namespaces for multi-tenancy. - Create deployment and service resources for your AI applications in each namespace. - Set up an Ingress controller and define ingress rules for routing and external access. - Configure security policies to ensure tenants are properly isolated. Below is a Python program in Pulumi that demonstrates how to configure these resources for a multi-tenant AI services setup: This program defines Kubernetes namespaces for each tenant, deploys an AI service in each namespace, and creates respective services to expose the deployments. It then sets up Ingress resources with rules to route traffic based on the hostnames to the corresponding services. Make sure to customize the deployment spec, service spec, and Ingress annotations to suit your AI applications' requirements. The example here is a starting point and will need adjustments depending on your AI services, Ingress controller details, and any particular configurations or policies you might need. To apply the Pulumi code above, run the following command: This will provision the Kubernetes resources defined in the code. Please ensure that you have kubectlconfigured to talk to your Kubernetes cluster, and Pulumi is configured with the correct environment and secrets (if needed) before running the command. Remember, this setup must be backed by a robust authorization and authentication strategy to maintain the integrity of your multi-tenant environment. Consider using service mesh tools like Istio or Linkerd for more advanced security, observability, and network control capabilities.
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817249.26/warc/CC-MAIN-20240418222029-20240419012029-00642.warc.gz
CC-MAIN-2024-18
2,706
16
https://blog.abatishchev.dev/2013/11/30/how-to-select-azure-subscription-if-you-have-more-than-one-using-powershell/
code
If you have more than one Azure subscription in your account and try to upload a vhd using the instruction: -LocalFilePath d:my.vhd - You may get an error saying that selected account doesn’t have given blob. That’s because the first subscription is selected by default and the target blob is in the another one. To select the proper subscription use the following command: Get-AzureSubscription | Select -Last 1 | Select-AzureSubscription (For instance, the last one).
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224649439.65/warc/CC-MAIN-20230604025306-20230604055306-00177.warc.gz
CC-MAIN-2023-23
473
7
http://www.webassist.com/forums/posts.php?id=45957
code
Add to Cart button is adding first item in the recordset rather than the correct item Hi Ray, discovered an issue today and I'm not sure whether it's been triggered by updating the site to mySQLi/PHP7 or when I added a new discount code over the weekend - or it may be that it wasn't working before that and no-one's noticed! Anyway, I have a "Quick Add Softback" button on the attached page which you helped me with before, however when you click it, it adds the first item in the recordset and not the correct item. I'm sure it should be an easy fix but I can't see where the problem is - can you help? Page attached and I've added the URL in a comment at the top if you need it.
s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656103036077.8/warc/CC-MAIN-20220625160220-20220625190220-00336.warc.gz
CC-MAIN-2022-27
681
2
https://www.disma.polito.it/en/research/research_groups/optimization_and_operations_research
code
Optimization and operations research The research activities of the group concern the application of optimization models and methods in contexts ranging from production planning and financial optimization to prescriptive analytics in retail and marketing. From the methodological point of view, the adopted tools include exact and approximate methods for combinatorial optimization. The latter methods do not consist only of classical local search strategies and metaheuristics, but also more refined matheuristics approaches that combine explicit mathematical models and intelligent search. Moreover, the group is active on the general theme of decision making under uncertainty. Themes include stochastic programming with recourse, robust optimization (both worst-case and under distributional ambiguity), dynamic programming, and simulation-based surrogate optimization.
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100287.49/warc/CC-MAIN-20231201120231-20231201150231-00621.warc.gz
CC-MAIN-2023-50
873
3
http://dunfield.maknonsolutions.com/edit.htm
code
EDT is a small visual text editor that I created early in my career. I have since rewritten it in several languages and ported it to virtually every system I have ever worked on (It is NICE having the same editor everywhere). DDSIDE is an Integrated Development Environment that I created as a companion to my Micro-C compilers and cross assemblers. This provides a nice visual editor with drop down menu control over all development tool options, and the ability to compile, load and debug from within the IDE. DDSIDE is tool independent, all configurable functions, features and options for the tools are defined in a .IDE control file. SPRITED is a graphic sprite editor, which is part of the graphics tools included in the PC version of my Micro-C toolset. This program creates and edits sprite definitions as either binary or 'C' source code. It includes drawing tools, including block and clipboard operations. It also has a palette editor allowing the creation of custom colors. MICROCAD is a tiny (12k) PC based graphical drawing package. It provides the basic ability to draw lines, rectangles, circles, arcs, and polygrams, and has the ability to incorporate previous drawings as single elements in a new drawing. It was originally created as a means of sharing schematic drawings among the Fidonet BBS community. In my work of developing a feature telephone, I was responsible for creating a custom LCD panel. To assist in this, I designed a tool which allowed me to graphically draw the LCD segments and create a map of the layout, as well to visually see what the display would look like. Once the LCD manufacturer gave me the electrical mapping (pins to display segments), I enhanced the tool to generate a logical to physical map of the display, and to automatically generate the required character set tables. This tools also has the ability to simulate the display, allowing us to proceed with the user interface development weeks before the actual LCD prototype was available. PC-REMOTE is a learning infrared remote control that requires no hardware other than a PC with a serial port, an IR LED for transmission, and IR phototransistor for learning functions. In addition to the learn/play functions, PC-REMOTE allows viewing/editing of remote control codes either by text (transition list) or graphical (pulse-train) means. This utility provides an easy way to archive/share remote control codes. EDITMP3 is an editor for the ID3 tags in MP3 files - it provides features to scan for .MP3 files, auto-import/export ID3 name from filename, ability to block-set Album/Author and more. I created it as a tool to easily create ID3 information on MP3s that I converted from my album collection. Edit Long Filenames is a tool I developed to batch edit windows long filenames. It provides a screen display of the names, and allows you to visually define a template for moving, removing and replacing sections of the names. This template is then applied to the filenames and the results displayed. The user can lock all or some of the displayed results, and when he is satisfied with the new names he can commit the locked names to the files. This tool was specifically designed to deal with very long filenames of various media files which contained unwanted information in sections of the names.
s3://commoncrawl/crawl-data/CC-MAIN-2019-30/segments/1563195526210.32/warc/CC-MAIN-20190719095313-20190719121313-00101.warc.gz
CC-MAIN-2019-30
3,309
8
https://community.webroot.com/webroot-secureanywhere-complete-14/password-manager-error-329554
code
Today when using my computer when I first logon to password manager and then after that every few minutes I keep getting the following error when browsing with internet explorer. It appears in red just below the webroot toolbar. Is there anything I need to do to fix it ? an invalid response was received while attempting to contact the server. please check your internet connection. Error = 9
s3://commoncrawl/crawl-data/CC-MAIN-2019-09/segments/1550247489729.11/warc/CC-MAIN-20190219081639-20190219103639-00400.warc.gz
CC-MAIN-2019-09
393
2
https://somethinkblue.com/what-is-best-free-web-hosting/
code
“what Is Best Free Web Hosting” Discovering a high-quality cheap web hosting supplier isn’t easy. Every site will have various needs from a host. And also, you have to compare all the functions of a hosting business, all while trying to find the very best deal possible. This can be a lot to kind via, specifically if this is your first time purchasing organizing, or developing a website. Many hosts will offer incredibly inexpensive introductory rates, only to elevate those rates 2 or 3 times greater once your initial get in touch with is up. Some hosts will give complimentary incentives when you subscribe, such as a totally free domain, or a free SSL certificate. While some hosts will have the ability to supply far better efficiency as well as high degrees of security. “what Is Best Free Web Hosting” Listed below we dive deep into the best low-cost web hosting plan there. You’ll discover what core organizing functions are important in a host and just how to examine your own hosting demands so that you can choose from among the very best low-cost organizing suppliers listed below. Disclosure: When you purchase a web hosting plan via web links on this page, we gain some payment. This helps us to maintain this website running. There are no extra expenses to you at all by utilizing our web links. The list below is of the best inexpensive host bundles that I’ve directly used as well as evaluated. What We Consider To Be Low-cost Webhosting When we explain a webhosting package as being “Economical” or “Budget” what we indicate is hosting that comes under the rate brace in between $0.80 to $4 monthly. Whilst researching cheap hosting service providers for this overview, we considered over 100 different hosts that fell into that cost array. We after that analyzed the quality of their most affordable hosting plan, worth for cash as well as customer care. In this short article, I’ll be discussing this first-rate web site hosting firm and stick in as much relevant information as feasible. I’ll look at the functions, the rates options, and also anything else I can think about that I believe could be of benefit, if you’re deciding to sign up to Bluhost and also get your websites up and running. So without more ado, allow’s check it out. Bluehost is among the largest webhosting business on the planet, getting both large advertising assistance from the business itself and also affiliate marketing experts who advertise it. It really is a huge firm, that has been around for a very long time, has a large credibility, and also is certainly one of the leading selections when it involves web hosting (absolutely within the top 3, at least in my book). Yet what is it precisely, as well as should you get its services? Today, I will answer all there is you need to recognize, offered that you are a blog writer or an entrepreneur that is searching for a web host, and doesn’t know where to get started, considering that it’s an excellent option for that target market generally. Let’s think of, you intend to host your websites and make them visible. Okay? You currently have your domain name (which is your website location or URL) and now you wish to “transform the lights on”. “what Is Best Free Web Hosting” You require some hosting… To complete every one of this, as well as to make your internet site visible, you need what is called a “server”. A server is a black box, or gadget, that stores all your internet site information (documents such as images, messages, videos, web links, plugins, as well as other information). Now, this web server, has to get on at all times as well as it needs to be linked to the web 100% of the moment (I’ll be mentioning something called “downtime” later). On top of that, it also requires (without getting as well elegant and also into information) a file transfer protocol commonly called FTP, so it can reveal web browsers your internet site in its designated kind. All these things are either expensive, or call for a high level of technological skill (or both), to develop and preserve. And you can absolutely head out there and find out these things on your own and also set them up … but what about instead of you getting and also keeping one … why not simply “leasing holding” rather? This is where Bluehost is available in. You rent their servers (called Shared Hosting) as well as you launch a website utilizing those servers. Considering that Bluehost maintains all your files, the business additionally enables you to set up your material monitoring systems (CMS, for brief) such as WordPress for you. WordPress is a very preferred CMS … so it just makes sense to have that alternative readily available (practically every organizing firm now has this alternative also). In other words, you no more require to set-up a web server and then incorporate a software program where you can construct your material, individually. It is already rolled right into one package. Well … envision if your server remains in your house. If anything were to occur to it in any way, all your documents are gone. If something goes wrong with its interior procedures, you need a professional to repair it. If something overheats, or breaks down or gets damaged … that’s no good! Bluehost takes all these hassles away, as well as deals with everything technological: Pay your web server “rent”, as well as they will care for everything. As well as when you get the service, you can then start concentrating on adding web content to your site, or you can put your effort right into your advertising campaigns. What Provider Do You Obtain From Bluehost? Bluehost offers a myriad of different services, however the key one is hosting of course. The organizing itself, is of various types by the way. You can rent a common web server, have a dedicated server, or additionally a digitalprivate server. For the function of this Bluehost review, we will concentrate on holding solutions and also various other services, that a blog writer or an on the internet entrepreneur would need, instead of go unfathomable into the bunny hole as well as discuss the various other solutions, that are targeted at more knowledgeable folks. - WordPress, WordPress PRO, as well as shopping— these holding solutions are the packages that permit you to organize a site making use of WordPress and also WooCommerce (the latter of which allows you to do shopping). After purchasing any one of these plans, you can start constructing your site with WordPress as your CMS. - Domain name Marketplace— you can additionally get your domain from Bluehost rather than various other domain name registrars. Doing so will certainly make it much easier to point your domain name to your host’s name web servers, since you’re utilizing the same market. - Email— as soon as you have bought your domain name, it makes sense to also obtain an e-mail address linked to it. As a blog writer or on the internet entrepreneur, you should virtually never ever use a cost-free e-mail service, like Yahoo! or Gmail. An email similar to this makes you look amateur. Luckily, Bluehost provides you one totally free with your domain. Bluehost also provides committed servers. And also you may be asking …” What is a committed server anyhow?”. Well, the important things is, the standard webhosting packages of Bluehost can only a lot web traffic for your internet site, after which you’ll require to update your holding. The reason being is that the usual servers, are shared. What this means is that one server can be servicing two or even more internet sites, at the same time, one of which can be your own. What does this mean for you? It suggests that the solitary web server’s sources are shared, as well as it is doing multiple tasks at any kind of offered time. Once your website starts to hit 100,000 website brows through monthly, you are going to require a devoted web server which you can also receive from Bluehost for a minimum of $79.99 monthly. This is not something yous must bother with when you’re starting yet you must maintain it in mind for certain. Bluehost Pricing: How Much Does It Cost? In this Bluehost testimonial, I’ll be concentrating my attention mainly on the Bluehost WordPress Hosting packages, because it’s one of the most preferred one, and also most likely the one that you’re looking for which will match you the most effective (unless you’re a huge brand, firm or site). The three offered plans, are as follows: - Basic Strategy– $2.95 each month/ $7.99 routine price - Plus Plan– $5.45 each month/ $10.99 routine price - Choice Plus Plan– $5.45 each month/ $14.99 regular rate The initial rate you see is the rate you pay upon join, as well as the 2nd rate is what the expense is, after the initial year of being with the business. So basically, Bluehost is going to charge you on a yearly basis. And also you can additionally pick the quantity of years you intend to organize your website on them with. “what Is Best Free Web Hosting” If you choose the Basic strategy, you will certainly pay $2.95 x 12 = $35.40 starting today and by the time you enter your 13th month, you will now pay $7.99 monthly, which is additionally billed per year. If that makes any kind of sense. If you are serious about your internet site, you should 100% get the three-year option. This implies that for the basic plan, you will pay $2.95 x 36 months = $106.2. By the time you strike your fourth year, that is the only time you will pay $7.99 monthly. If you think about it, this strategy will save you $120 in the course of three years. It’s very little, yet it’s still something. If you wish to obtain greater than one web site (which I very recommend, and also if you’re major, you’ll most likely be getting even more at some point in time) you’ll want to make use of the option plus strategy. It’ll allow you to host unlimited websites. What Does Each Plan Offer? So, when it comes to WordPress holding strategies (which are similar to the shared organizing plans, but are a lot more tailored in the direction of WordPress, which is what we’ll be focusing on) the attributes are as follows: For the Basic strategy, you get: - One internet site only - Protected site by means of SSL certification - Optimum of 50GB of storage space - Free domain name for a year - $ 200 advertising and marketing debt Keep in mind that the domains are acquired independently from the organizing. You can get a complimentary domain name with Bluehost here. For both the Bluehost Plus hosting as well as Choice Plus, you obtain the following: - Unrestricted number of sites - Free SSL Certification. “what Is Best Free Web Hosting” - No storage space or transmission capacity limit - Cost-free domain name for one year - $ 200 marketing credit report - 1 Office 365 Mail box that is complimentary for one month The Choice Plus strategy has actually an included advantage of Code Guard Basic Alternative, a back-up system where your data is conserved and replicated. If any kind of collision happens and your website information vanishes, you can recover it to its original type with this attribute. Notification that despite the fact that both strategies cost the same, the Choice Strategy after that defaults to $14.99 per month, routine cost, after the collection amount of years you have actually picked. What Are The Benefits Of Using Bluehost So, why choose Bluehost over other web hosting services? There are hundreds of webhosting, a number of which are resellers, however Bluehost is one choose couple of that have actually stood the test of time, and also it’s probably the most well known around (and for good factors). Below are the 3 main advantages of picking Bluehost as your web hosting provider: - Server uptime— your web site will certainly not show up if your host is down; Bluehost has greater than 99% uptime. This is very crucial when it involves Google SEO and positions. The higher the much better. - Bluehost speed— just how your web server reaction identifies how fast your internet site reveals on a web browser; Bluehost is lighting quickly, which implies you will certainly lower your bounce rate. Albeit not the most effective when it involves filling speed it’s still widely crucial to have a rapid speed, to make user experience better and far better your position. - Endless storage— if you get the Plus plan, you need not fret about the number of data you keep such as video clips– your storage space capacity is limitless. This is really crucial, because you’ll possibly encounter some storage problems later on down the tracks, and you don’t want this to be a headache … ever before. Finally, client assistance is 24/7, which indicates no matter where you are in the globe, you can get in touch with the assistance group to repair your site issues. Pretty conventional nowadays, but we’re taking this for granted … it’s likewise very vital. “what Is Best Free Web Hosting” Additionally, if you have actually gotten a free domain name with them, then there will certainly be a $15.99 cost that will certainly be deducted from the amount you initially purchased (I imagine this is since it type of takes the “domain out of the marketplace”, uncertain concerning this, however there most likely is a hard-cost for registering it). Last but not least, any type of demands after one month for a reimbursement … are void (although in all sincerity … they should probably be rigorous here). So as you see, this isn’t necessarily a “no questions asked” plan, like with several of the various other holding options out there, so make certain you’re fine with the policies before proceeding with the organizing.
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572221.38/warc/CC-MAIN-20220816060335-20220816090335-00692.warc.gz
CC-MAIN-2022-33
13,825
82
https://developer.mozilla.org/en-US/docs/tag/Profiling
code
Articles tagged: Profiling Found 5 documents. - Performance/Profiling_with_Instruments Instruments can be used for memory profiling and for statistical profiling. - Performance/Profiling_with_the_Built-in_Profiler Firefox now has a built-in profiler. Having a profiler in the code base lets us, among other ... - Performance/Reporting_a_Performance_Problem This article will guide you in reporting a performance problem using the Gecko Profiler extension.
s3://commoncrawl/crawl-data/CC-MAIN-2014-15/segments/1397609526311.33/warc/CC-MAIN-20140416005206-00031-ip-10-147-4-33.ec2.internal.warc.gz
CC-MAIN-2014-15
455
5
http://case-study-analysis03366.timeblog.net/5745511/new-step-by-step-map-for-pay-me-to-do-your-assignment
code
I have a Philippine passport and am at present forever residing in The us (I've a U.S. everlasting resident card). I'm intending to travel to Peru as being a vacationer in February. as claimed often times just before, LimaEasy is a private project. We haven't any affiliation Along with the Peruvian governing administration or any Peruvian consulates abroad. For me the problem is why your visa was denied. Have you spoken to somebody on the consulate? Did you deliver all files as needed? The visa necessities for your Peruvian tourist visa are clear-cut, so if you experienced all files you possibly could not proof you have ample resources to afford the vacation and your remain in Peru or else you failed to convince the consulate that your intention is simply a pay a visit to and you propose to return to your dwelling state. I'm definitely sorry. But honestly there is nothing we from LimaEasy can do about it and I don't know the way I could enable. As talked about persistently right before we from LimaEasy are merely several individuals dedicating plenty of our spare time to inform foreigners about Peru and Lima and Furthermore share our understanding on quite a few topics trying to give guidance anywhere feasible. I choose to volunteer in Peru around the Winter season. I'm a Nepali citizen with a student visa (F1) within the US. I went to Costa Rica two a long time back considering that when you experienced a student visa into the US, you can go to Costa Rica for 3 months. I am thinking if Peru has a provision like that? Unfortunately It truly is often quite challenging to have in connection with Peruvian consulates or to hear again from them. I listened to a lot of problems, but are not able to do nearly anything about this. Why Will not you complain Using the Ministry of International Affairs right here in Lima? 1. no tengo plan cuanto cuestan vuelos de Nuevo Delhi a Lima. Creo mas o menos de US$ 2000. Para encontrar el mejor precio consulta a google y unos de muchas paginas de viaje. On the other hand, if your W-2 kind (that kind you get at the end of the calendar year or commencing of January) lists a condition other than your resident point out, then you’ll really need to also file a non-resident tax return to your point out listed. You did not point out cell phones on your list of accepted things, I've an apple iphone is usually that alright? Also can I bring medication designed for a relative? In case you are looking at marrying your girlfriend, you could apply for Visa Acquainted de Residente para el caso de casadao con Peruana which in addition lets you function in Peru. They should be capable of inform you if you can find a visa within just just two times and what you'll need for the appliance. I am a Mongolian citizen and hold Mongolian passport. But i are in Brazil. Ive purchased a ticket to Lima and my flight is on 12Oct. Do I want a visa to enter Peru? How can I apply for it? I need an urgent solution. Many thanks lots. Unsure Whatever you mean by "entry payment". In most cases passport holders of the different EU nations don't have to submit find out here now an application for a visa before coming to Peru. hi there,I desired to get a tourist visa to peru however the consulate denied it I assumed it absolutely was straightforward to get it but I had been wrong ,can I apply again if I supply a a greater paperwork like a far better lender assertion ? In the suggest time I had organized a work in this article in Lima as I'm a Pharmacist and Worldwide Export & Importer . right before expired my visa I had talk with immigration Place of work they reported they only can course of action my files when my VISA are been valid.
s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267160233.82/warc/CC-MAIN-20180924070508-20180924090908-00551.warc.gz
CC-MAIN-2018-39
3,699
14
https://docs.rackspace.com/docs/reset-the-fortigate-vm-administrator-password
code
If you have forgotten the administrator password to your Fortigate® virtual machine (VM), you can reset it by using the emergency console. This article shows you how to reset the administrator password based on the Fortinet® documentation. Note: If you already have the Fortigate VM serial number, skip to step 4. Navigate to the emergency console. Look for the serial number displayed in the console. It looks similar to "Serial number is FGTRAXXXXXXXXXXX." If you do not see the serial in the console, you need to reboot the Fortigate VM from the Cloud Control Panel. After the reboot, you should see the serial number displayed in the console. Perform a hard reboot on the server and log in with the maintainer user and password. The password is bcpb with the serial number of the firewall with the letters of the serial number in uppercase. For example: bcpbFGTRAXXXXXXXXXXX. Note: You have only 14 seconds to type in the username and password. There is no indicator of when your time runs out, so it might take more than one attempt to succeed. Have the credentials ready in a text editor so that you can copy them, but typical pasting does not work with the HTML5 console. If you want to be quick, use a third-party application or script that can type input rather than paste the credentials, such as the following applications: Now that you are logged into the Fortigate firewall, run the following command to reset the administrator password: config system admin edit admin set password <password> end Updated 26 days ago
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233511075.63/warc/CC-MAIN-20231003092549-20231003122549-00719.warc.gz
CC-MAIN-2023-40
1,531
11
https://packagist.org/packages/thru.io/inflection
code
A library to allow for pluralisation and singularisation of words programatically. Installs: 2 109 Open Issues: 0 This package is not auto-updated. Last update: 2017-04-30 07:25:38 UTC Originally built from source long-lost to the mists of time, only closest reference I can find is here: http://fossies.org/linux/Neos/Packages/Framework/TYPO3.Kickstart/Resources/Private/PHP/Sho_Inflect.php Original Readme below: Thanks to http://www.eval.ca/articles/php-pluralize (MIT license) http://dev.rubyonrails.org/browser/trunk/activesupport/lib/active_support/inflections.rb (MIT license) http://www.fortunecity.com/bally/durrus/153/gramch13.html http://www2.gsu.edu/~wwwesl/egw/crump.htm // Changes (12/17/07) Major changes Fixed irregular noun algorithm to use regular expressions just like the original Ruby source. (this allows for things like fireman -> firemen Fixed the order of the singular array, which was backwards. // Minor changes Removed incorrect pluralization rule for /([^aeiouy]|qu)ies$/ => $1y Expanded on the list of exceptions for *o -> *oes, and removed rule for buffalo -> buffaloes Removed dangerous singularization rule for /([^f])ves$/ => $1fe Added more specific rules for singularizing lives, wives, knives, sheaves, loaves, and leaves and thieves Added exception to /(us)es$/ => $1 rule for houses => house and blouses => blouse Added excpetions for feet, geese and teeth Added rule for deer -> deer Changes: Removed rule for virus -> viri Added rule for potato -> potatoes Added rule for *us -> *uses
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224649293.44/warc/CC-MAIN-20230603133129-20230603163129-00467.warc.gz
CC-MAIN-2023-23
1,525
10
http://msgroups.net/excel.newusers/difference-between-excel-2000-and-excel-xp-and/530241
code
Table relationships in Excel? I have an excel file exported from SQL server. There are two tables 1. User (columns: id, name, address, etc) 2. Tasks (columns: id, userid, description) Is there a way to display the user NAME insead of the ID in the tasks table? Many thanks in advance! Saturnius You could do a vlookup on the linked field. If id is the same in both tables use a vlookup function > I have an excel file exported from SQL server. There are two tables > 1. User (columns: id, name, address, etc) > 2. Tasks (columns: id, userid, description) > Is...Pulling data daily from a differently named report everyday I have a spreadsheet where I use formulas to pull data from multiple reports on a shared server everyday. What I do is to save those reports under a certain name everyday since the formulas have to have the static report name in them to pull data. (For example, A1 may pull data from c:\reportfolder\reportA, B1 may pull from c: \reportfolder2\reportB, etc). In these report folders our IT group runs a new report in it everyday but of course they change the name of the report every day (to reflect the date) . . so in the reportfolder there will be "reportA-3-12-2009", and "...enlarge validation drop down box excel 2000 I use validation drop down dialogue boxes in Excel 2000 to fill in purchase orders from an existing list of products. This works fine for the most part but I have a few questions. I have close to 1000 products on my list. When I use the drop down box to fill in my forms, the box is too small or too sensitive. With the list being that long, the data displayed in the box tends to jump around when I scroll, page up or page down. I feel that if the box could be made longer, the data would be more stable and easier to access. Is It appears to me that my validation list is on...Hotmail: Can't Send/Receive 1 of 3 Accounts (using XP) I'm using Outlook XP, and I have 3 Hotmail accounts. 2 of them I've been using for a long time without any problems. However, with the 3rd one I just added now, Outlook stalls for about a minute before spitting out: A connection to the server could not be established. http://services.msn.com/svcs/hotmail/httpmail.asp is now in offline mode. There may be server or network problems or your timeout interval may be too Please search Microsoft Outlook Help for [HTTP Mail troubleshooting] That's the message when I just add the account to the list of accounts. When I...Excell graphs I would like to make a grafh with excell but seem to be very lost. :confused: I would like the graph to go horisontal left to right Like a time-line. Thanks for any tips dammit1's Profile: http://www.excelforum.com/member.php?action=getinfo&userid=16311 View this thread: http://www.excelforum.com/showthread.php?threadid=278285 By 'time-line', do you mean a gantt chart? http://peltiertech...Excel slow to epen with Network Connection Excel 2003 has recently become very slow to open. Regardless of the workbook / file. I have disabled all Add-In's and cleaned out the folder. The slow down appears to be related to having a live internet connection. If I disable my connection or pull out my cable and launch Excel it opens straight away, if I plug it back in re-enable it it takes 30-45 seconds to open. I have added Excel to Windows Firewall exception list but it still takes around 15-25 open a workbook. Any ideas what its doing? I have read somewhere online about it bef...Converting Outlook XP .pst to Outlook 2007 format I installed Office 2007 over my existing Office XP. I prefer to keep my .pst file in a location that is easily found, I keep it in C:\1data\Outlook. When I try to convert it to the new format it tells me the file is in use, of course it is in use, I have to have Outlook open to convert. How do I get around that? I still wish to keep it in the same location as my two backup programmes, Outlook backup and Datakeeper backup, are pointed there. Thank How are you trying to convert it? Diane Poremsky [MVP - Outlook] Author, Teac...How to programme this in excel? This is what I want to know.. cell B1 & C1 is the cell to enter the duties of two staffs (namely X & Y). B1 is for staff X, C1 is for staff Y. staff can chose any one of duty in B1 & C1 frm a dropdownlist of 10 different duties(like "Break shift", "10 - 6 PM", "10 - 2 PM"..and so on).. We have another cell D1 E1 & F1 where we enter the staff strength in the shop on three intervals of time (say 10 - 2PM, 2 - 6PM, & 6 - 10PM) Assume D1 cell to show the staffs present in the shop during time interval 10 - 2PM, E1 for 2 - 6PM & F...change excel pointer Hiw can I change the colour of the white excel mouse pointer? Not an Excel question since changing the mouse pointer applies to all apps. Use Start|Control Panel->Mouse; open Pointers tab and make a selection. I hope no one else uses the computer! Bernard V Liengme remove caps from email "sarahc" <[email protected]> wrote in message > Hiw can I change the colour of the white excel mouse pointer? I'm using a different color mouse pointer...Different margins on different pages I am setting up a template for letters at work. The first page of our letterhead has one ste of margins and all subsequent pages will have a different sent of margins. I know that section breaks can be used, but if staff copy and paste text from existing letters into this new template, the section break moves. Is there any way of locking the section break to the page? so the pasted text goes over the top of it? You could setup your document with a 'different first page' layout. That allows the first page to have a different set of margins to the rest o...Excel 2007: No screen refresh I have a network which around 30 Windows XP pcs, incl. Office 2007 Pro. All updates are installed. Under some circumstance, Excel 2007 will not refresh the screen, for example when Excel was minimized and will maximized. I saw this problem not on all pcs but on some. I did also update the graphic card driver and on one pc I changed also the graphic card. Do you know this problem? Is there a workaround? ...Different values for error bars in series In Excel 2007, how do you put in different error bar values for each data point in a series? So far I am only able to put in one value for all in my See Jon's blog on the subject. On 06/04/2010 15:52, wdwind1 wrote: > In Excel 2007, how do you put in different error bar values for each data > point in a series? So far I am only able to put in one value for all in my > bar chart. Andy Pope, Microsoft MVP - Excel ...Using banner paper Publisher 2002 Can you use banner paper in Publisher 2002? I am fairly new to the app and I have searched high and low and can't seem to figure out if I can use it and if so how? Any After managing to set up OE-QuoteFix on his new PC, Ed reads a message from Tracy Buthe <[email protected]>... > Can you use banner paper in Publisher 2002? I am fairly > new to the app and I have searched high and low and can't > seem to figure out if I can use it and if so how? What size banner paper are you using? Ed Bennett - MVP Microsoft Publisher http://www.mvp...Excel Database #2 I have been doing my invoices in Excel from Office 2000 and storing the relevent bits into a database created by the template wizard in the Data drop-down. Now I have office XP on my new machine but this option does not appear in Excel, How can i create an invoice template that stores to a ...MS Excel help needed for newbie I'm by no means a programmer. I'm trying to knock together a (what should be) simple spreadsheet in Microsoft Excel for a calculation I have to do on a regular basis. I'm hoping that some kind people within this group will be able to help me with some formulas and questions. If anyone is able to help me could you please contact me at On Oct 5, 7:57=A0am, Dean Brown <[email protected]> wrote: > Hi group. > I'm by no means a programmer. I'm trying to knock together a (what > should be) simple ...Windows 7 Upgrade from XP Pro IE 8 Certificate Errors My PC was recently upgraded from XP Pro to Windows 7 Pro. I had IE 8 before on XP, but now I am getting certificate errors for many of the sites that I regularly visit including our companies own intranet site, google mail, several financial institutions websites, etc. I know these sites are safe, but I cannot figure out what the upgrade process has done to my system to cause me to get these certificate errors. I have spent much time googling, and tried many different IE setttings, double checked the date time setting on my machine etc. all to no avail. PLEASE HELP!!! Below ...Can't save Excel using Save button, When I try to save an Excel spreadsheet, I get a message saying "GWXL97.xla could not be found. Check spelling of file name and verify that the file location is correct." I have never named any of files by that name and don't know what it refers to. I have to hit the "X" button on the upper right hand corner and wait for it to ask me if I want to save it, then go through the save process. This happens even if I try to save changes to an existing excel This may help... xl: close button is dimmed after groupwise is installed http://support.microsoft.com...A Different CRM for GP We are pondering the idea of implementing MS Dynamics CRM. However, I am curious whether anyone else has had success in integrating a different CRM product with GP 10.0. It's not that we don't like the MS product; I just like to ensure I have covered all bases. Our partner does not have any other recommendations as they have not worked with any other CRM applications. Any information would be greatly apprecaited. GoldMine is a good product, very mature, and easier to maintain table structures. There are links to GP but I cannot remember the fir...Unable to open embedded word document from Excel I have Excel 2003 (SP3) installed on my computer. In an Excel file, I inserted a word object (created from file, display as icon) and the insertion When I try to open my word document from Excel, nothing happens. No error message and the file doesn't open. It is like if my file icon is simply a When I open the same Excel file with another computer(Excel 2003), I can open my word embedded object easily. In fact, I can insert Excel or txt object in Word document without any problem but everything I insert in Excel doesn't work (word, txt, et...How to add a description to an excel table how can I add a decription to an excel table? I want to set a name and a description of a table content. So I know, what data is contained in a table. My workspace contains more than one table. Click on any cell in your table(s). Then Insert > Comment > how can I add a decription to an excel table? > I want to set a name and a description of a table content. So I know, what > data is contained in a table. My workspace contains more than one table. ..."Excel needs to close" Frequently, when turning my computer on, I will get the error message, "Microsoft Excel for Windows has encountered a problem and needs to close". It has not been left on nor was it used in the previous session of computer use. I am using XP Home. How can I fix it or should I even be concerned? Check to see what is starting up when you boot your computer up. See if anything is in teh startup folder, check using msconfig as well "Ed Mullikin" <[email protected]> wrote in message > Frequently, when turning my comp...Copying spinners for each cell in Excel 2003? I have an inventory tracking sheet that keeps track of my inventory. I've added in a spinner control to increase/decrease a value in a certain cell. In my worksheet, the value is located in column E, and the spinner control is in column F. I have about 200 spinners to add, and need to fill down the links to it's adjacent cell. I found something related to checkboxes, but how do I adapt it for the spinner control? The first value is in E3, and the first spinner is in F3. Create 200 spiners in F3:F203 and link to E3:E203 Dim myRng As Range Dim Spnr...character spacing Excel 2003 How does one get all numbers in a column to have set spacing instead of proportional spacing? I remember setting proportional or fixed back in the days of DOS, and haven't used it since and I'm unable to find it in Microsofts online help for either Excel or Word (2003). Try using a fixed width font like Courier or Courier New. Microsoft Excel MVP "Joe" <[email protected]> wrote in message > How does one get all numbers in a column to have set spacing instead > of proportional spacing? I remember...2 users access calendar online with different rights user A wants to give user B permission to see, add and edit entries in user B is able to see, but not to add or edit entries at the moment in outlook itself its working. user B can open the folder calendar of user A and make entries and change entries what have to be done that this is possible also with web access exchange ? On Thu, 26 Oct 2006 14:09:29 +0200, "Mike Schwarz" <[email protected]> >user A wants to give user B permission to see, add and edit entries in &...Same column, different cell width at different row I have tried inserting a break and split, didn't work. I just want to separate the top half of a page with the bottom half so I can apply different cell width on the same column. Or how would I be able to do this? Same column but different cell width. You can't do that. Microsoft MVP - Excel Pearson Software Consulting, LLC "Glenn Chung" <[email protected]> wrote in >I have tried inserting a break and split, di...
s3://commoncrawl/crawl-data/CC-MAIN-2018-26/segments/1529267863830.1/warc/CC-MAIN-20180620163310-20180620183310-00511.warc.gz
CC-MAIN-2018-26
13,602
219
https://community.amd.com/thread/244134
code
Okay so I'm a complete noob regarding this, if there is any info that I leave out below please just ask. I will try to provide it as soon as possible. So yeah as stated in the title my pc freezes regularly, between 5 minutes and once a day. This happens while I play games, watch Youtube or just right now when I typed Youtube. When it does, I have 2 monitors, both monitors start flickering lighty across horizontal lines or they both go black. I'll drop a Speccy link to show what's inside. I've tried, multiple times, to clean and reinstall the gpu drivers. Both with DDU as with AMD cleanup. So yeah if you know something that might work let me know.
s3://commoncrawl/crawl-data/CC-MAIN-2020-45/segments/1603107878879.33/warc/CC-MAIN-20201022024236-20201022054236-00636.warc.gz
CC-MAIN-2020-45
654
5
https://1styeartexasteachers.com/2020/10/02/is-the-1000-stipend-for-getting-your-computer-science-certification-still-available/
code
Short answer: Heck ya it is!(But please check the date of this post.) Technically it’s available to August 2021, or until the funds run out. As of right now the funds have not run out. So what’s the process to get the stipend? Awesome question! First you should checkout the home page for all this. Here is a link to it. Then you will need to fill out the application(Here is the link.). You will receive an email for more of the steps. But you will have to upload three documents as part of the steps. They will need proof that you work for a school or are in school. Then they will need proof of your current teacher certifications. Lastly, they will need you to fill out a sheet, sign, date, and then turn all this in through an email. From there they will see if you qualify for the stipend. You will then take the test. Hopefully pass. Then they will send you check, after some more info. I am currently half way through all this process, so I will write another blog post when all is completed. But for now, go get that money!!! Best of luck!
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224644867.89/warc/CC-MAIN-20230529141542-20230529171542-00788.warc.gz
CC-MAIN-2023-23
1,052
8
https://www.dopelearning.com/group/dope-learning-community/discussion/289a1e48-4621-41a2-a765-ff9e47cf9766
code
Search Results For Inscryption In the search box on the taskbar, type Manage BitLocker and then select it from the list of results. Or, select Start > Settings > Privacy & security > Device encryption > BitLocker drive encryption.Note: You'll only see this option if BitLocker is available for your device. It isn't available on Windows 11 Home edition. Search results for inscryption In the search box on the taskbar, type Manage BitLocker and then select it from the list of results. Or, select the Start button, and then under Windows System, select Control Panel. In Control Panel, select System and Security, and then under BitLocker Drive Encryption, select Manage BitLocker.Note: You'll only see this option if BitLocker is available for your device. It isn't available on Windows 10 Home edition. Amazon Athena automatically stores query results and metadata information for each query that runs in a query result location that you can specify in Amazon S3. If necessary, you can access the files in this location to work with them. You can also download query result files directly from the Athena console. IAM principals with permission to the Amazon S3 GetObject action for the query result location are able to retrieve query results from Amazon S3 even if permission to the Athena GetQueryResults action is denied. (Optional) Choose View lifecycle configuration to view and configure the Amazon S3 lifecycle rules on your query results bucket. The Amazon S3 lifecycle rules that you create can be either expiration rules or transition rules. Expiration rules automatically delete query results after a certain amount of time. Transition rules move them to another Amazon S3 storage tier. For more information, see Setting lifecycle configuration on a bucket in the Amazon Simple Storage Service User Guide. The expected bucket owner setting applies only to the Amazon S3 output location that you specify for Athena query results. It does not apply to other Amazon S3 locations like data source locations in external Amazon S3 buckets, CTAS and INSERT INTO destination table locations, UNLOAD statement output locations, operations to spill buckets for federated queries, or SELECT queries run against a table in another account. (Optional) Choose Assign bucket owner full control over query results to grant full control access over query results to the bucket owner when ACLs are enabled for the query result bucket. For example, if your query result location is owned by another account, you can grant ownership and full control over your query results to the other account. For more information, see Controlling ownership of objects and disabling ACLs for your bucket in the Amazon S3 User Guide. Previously in Athena, if you ran a query without specifying a value for Query result location, and the query result location setting was not overridden by a workgroup, Athena created a default location for you. The default location was aws-athena-query-results-MyAcctID-MyRegion, where MyAcctID was the Amazon Web Services account ID of the IAM principal that ran the query, and MyRegion was the region where the query ran (for example, us-west-1.) Now, before you can run an Athena query in a region in which your account hasn't used Athena previously, you must specify a query result location, or use a workgroup that overrides the query result location setting. While Athena no longer creates a default query results location for you, previously created default aws-athena-query-results-MyAcctID-MyRegion locations remain valid and you can continue to use them. (Optional) Choose Assign bucket owner full control over query results to grant full control access over query results to the bucket owner when ACLs are enabled for the query result bucket. For example, if your query result location is owned by another account, you can grant ownership and full control over your query results to the other account. If the bucket's S3 Object Ownership setting is Bucket owner preferred, the bucket owner also owns all query result objects written from this workgroup. For example, if an external account's workgroup enables this option and sets its query result location to your account's Amazon S3 bucket which has an S3 Object Ownership setting of Bucket owner preferred, you own and have full control access over the external workgroup's query results. Athena query result files are data files that contain information that can be configured by individual users. Some programs that read and analyze this data can potentially interpret some of the data as commands (CSV injection). For this reason, when you import query results CSV data to a spreadsheet program, that program might warn you about security concerns. To keep your system secure, you should always choose to disable links or macros from downloaded query results. You cannot use the Download results option to retrieve query results that have been deleted manually, or retrieve query results that have been deleted or moved to another location by Amazon S3 lifecycle rules. You can use the Recent queries tab of the Athena console to export one or more recent queries to a CSV file in order to view them in tabular format. The downloaded file contains not the query results, but the SQL query string itself and other information about the query. Exported fields include the execution ID, query string contents, query start time, status, run time, amount of data scanned, query engine version used, and encryption method. You can export a maximum of 500 recent queries, or a filtered maximum of 500 queries using criteria that you enter in the search box. Query output files are stored in sub-folders on Amazon S3 in the following path pattern unless the query occurs in a workgroup whose configuration overrides client-side settings. When workgroup configuration overrides client-side settings, the query uses the results path specified by the workgroup. The following sub-folders are created only for queries run from the console whose results path has not been overriden by workgroup configuration. Queries that run from the AWS CLI or using the Athena API are saved directly to the QueryResultsLocationInS3. You can download results files from the console from the Results pane when using the console or from the query History. For more information, see Downloading query results files using the Athena console. DML and DDL query metadata files are saved in binary format and are not human readable. The file extension corresponds to the related query results file. Athena uses the metadata when reading query results using the GetQueryResults action. Although these files can be deleted, we do not recommend it because important information about the query is lost. To run common eDiscovery tasks on encrypted content, eDiscovery managers are required to decrypt email message content when exported from content searches, Microsoft Purview eDiscovery (Standard) cases, and Microsoft Purview eDiscovery (Premium) cases. Content encrypted with Microsoft encryption technologies wasn't available for review until after export. Prior to this new capability, only the content of an email message protected by rights management (and not attached files) were decrypted. Encrypted documents in SharePoint and OneDrive couldn't be decrypted during the eDiscovery workflow. Now, files that are encrypted with a Microsoft encryption technology is located on a SharePoint or OneDrive account are searchable and decrypted when the search results are prepared for preview, added to a review set in eDiscovery (Premium), and exported. Additionally, encrypted documents in SharePoint and OneDrive that are attached to an email message (as a copy) are searchable. This decryption capability allows eDiscovery managers to view the content of encrypted email attachments and site documents when previewing search results, and review them after they've been added to a review set in eDiscovery (Premium). The decryption of email messages sent with an Microsoft Purview Message Encryption custom branding template is not supported by Microsoft eDiscovery tools. When using an OME custom branding template, email messages are delivered to the OME portal instead of the recipient's mailbox. Therefore, you won't be able to use eDiscovery tools to search for encrypted messages because those messages are never received by the recipient's mailbox. The following table identifies the supported tasks that can be performed in Microsoft Purview eDiscovery tools on encrypted files attached to email messages and encrypted documents in SharePoint and OneDrive. These supported tasks can be performed on encrypted files that match the criteria of a search. A value of N/A indicates the functionality isn't available in the corresponding eDiscovery tool. Documents encrypted with the previous settings can still be returned by an eDiscovery search. This result may happen when a document property (such as the title, author, or modified date) matches the search criteria. Although these documents might be included in search results, they can't be previewed or reviewed. These documents will also remain encrypted when they're exported in eDiscovery (Premium). Any rights-protected (RMS-protected) email messages included in the results of a Content search will be decrypted when you export them. This decryption capability is enabled by default for members of the eDiscovery Manager role group. This is because the RMS Decrypt management role is assigned to this role group by default. 041b061a72
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506480.35/warc/CC-MAIN-20230923062631-20230923092631-00558.warc.gz
CC-MAIN-2023-40
9,547
26
http://5013.es/p/h/
code
3400 miles below Once the immersion has been completed, the player is free to explore at her will, using the mouse and keyboard controls: - Move: changes ship orientation (pitch and yaw) - Left and right click: steers ship forward and backward, respectively - Arrow keys, WASD keys: steer ship forward and backward, or rotate left or right - T, G: steer upward or backward respectively - F, H: steer leftward or backward respectively (doesn't rotate) The ship, as every other submerged body, has a natural tendency to sink down. Certain elements emit sound. This is spatially positioned, so the music will change as the player moves around. Some tracks will become inaudible, and some others will be heard more clearly, but all are in sync to form a unique song. Note that as ship speed is taken into account, the doppler effect can be experienced too. Two canvas indicators provide some navigational information: a compass, and a pitch display. (just in case your browser/computer don't play nicely with the demo) This is actually an interactive version of an OpenGL demo I programmed several years ago, escena.org dentro v2, which was the demo winner at the Inspire demoparty 2008. Although there weren't more entries, but hey! :-) I felt the concept of an abstract, unknown world could offer more than just following along a predefined path. Also, since the song basically consisted in a few sort-of-looping tracks, I thought this would be an ideal starting point to experiment with positional audio, through the Web Audio API. For the most part, I haven't changed much of the visual side of the demo. Except the ground, which seemed a bit too crude as it was, so I've made it based on triangles instead of quads. And I removed the particles that form a text, since it didn't make sense now. What has changed more is the audio. The original song had reverb in every track, so my first attempt to extract loops which included reverb as well sounded quite badly when the loop restarted (as it went from a very reverberated sound to an empty, almost dry one when starting). So I rebuilt the song without reverb, letting instead the magic of Web Audio and positioning to provide for the 'extra punch' that reverb provided before in the original song. The doppler effect added the missing eerie factor :-) I've also learnt a thing or two about detecting collisions and simplifying scene hierarchies with Three, so I should be posting about that in the blog at some point.
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474649.44/warc/CC-MAIN-20240225234904-20240226024904-00819.warc.gz
CC-MAIN-2024-10
2,469
16
http://unix.stackexchange.com/questions/102373/how-do-i-monitor-display-1-while-im-using-display-0
code
I am running X on two displays. :0 is my primary display but I also have some programs running on :1. Is there any GUI application that will let me monitor display :1 in a window that sits on display :0? (Using gnome, FWIW) I know of 2 ways to do this when the system is remote, so given the 2nd X server is locally running on your system (:1) should really make no difference. Method #1 - VNC You could setup VNC on the 2nd X server and then run Method #2 - XDMCP If you want to remote display an entire desktop from one system to another system you'd typically use XDMCP. You can then use a tool such as Xephyr to connect to your 2nd X server on display Here are several resources for setting up XDMCP and going further.
s3://commoncrawl/crawl-data/CC-MAIN-2016-30/segments/1469257824204.27/warc/CC-MAIN-20160723071024-00107-ip-10-185-27-174.ec2.internal.warc.gz
CC-MAIN-2016-30
722
8
https://integent.com/microsoft-project-online-training-creating-external-dependencies-between-projects/
code
Understanding dependencies between projects is critical to ensuring projects not only come in on budget, however, they also come in on schedule. Although it may be enticing to use one very large project with many tasks, it’s often easier to manage several smaller, sub-projects. By creating intra-project dependencies or external dependencies, we can still understand the relationships between these sub-projects as if they were one large project. In this Quick Tip video, we create dependencies between projects using Microsoft Project Professional and a temporary master project. We then insert the projects we want to create the dependencies. Once the MS Project schedules are inserted we create dependencies just like we would for any other MS Project Schedules. The difference comes into play when we close and save our project(s). We do not want to save the blank, temporary master project, however, we do want to save the other projects since they now have the relationships. Watch this Quick Tip Microsoft Project Online Training video as we walk you through all the steps required to use intra-project dependencies using Microsoft Project Online. If you are interested in learning more browse our Microsoft Project Online Training Courses. If you need help with your current Microsoft Project Online or Server implementation we also offer support for Microsoft Project Online.
s3://commoncrawl/crawl-data/CC-MAIN-2019-30/segments/1563195528869.90/warc/CC-MAIN-20190723043719-20190723065719-00088.warc.gz
CC-MAIN-2019-30
1,387
4
https://alychitech.com/how-to-transform-android-phone-to-windows-phone/
code
Hello everyone, Its Smart and today I am here with a tutorial on how to customize the look of your Android deviceto look and feels like a windows phone. To accomplish this follow the below tutorial. Download and Install Launcher 8 from Play Store Set Launcher 8 as default launcher by clicking home button and selecting the Launcher Grant any permission if any. By now you should have a windows phone style look and feel. You can visit the theme store to find and download more themes. Swipe the screen from left to right to bring up the settings menu. By now Your device has a complete change of look and feel. Enjoy, If You encounter any error or difficulties, don’thesitate to comment below
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233511424.48/warc/CC-MAIN-20231004220037-20231005010037-00530.warc.gz
CC-MAIN-2023-40
695
8
https://mia-bentzen.itch.io/gunstructor
code
Hello, there! I was interested in playing this game, but I am met with this text and no game: Set current directory to /home/<username>/Desktop/gunstructor_game Found path: /home/<username>/Desktop/gunstructor_game/Gunstructor.x86 Mono path = '/home/<username>/Desktop/gunstructor_game/Gunstructor_Data/Managed' Mono config path = '/home/<username>/Desktop/gunstructor_game/Gunstructor_Data/Mono/etc' Player data archive not found at `/home/<username>/Desktop/gunstructor_game/Gunstructor_Data/data.unity3d`, using local filesystem Any help would be appreciated.
s3://commoncrawl/crawl-data/CC-MAIN-2021-10/segments/1614178381803.98/warc/CC-MAIN-20210308021603-20210308051603-00033.warc.gz
CC-MAIN-2021-10
562
7
https://careers.secure.force.com/jobs/ts2__JobDetails?jobId=a1k70000003GQaPAAW&tSource=
code
|Full Stack Java Engineer, Community Cloud| |Technology - Software Development| |US - California - San Francisco (HQ) |Salesforce will consider for employment qualified applicants with criminal histories in a manner consistent with the requirements of the San Francisco Fair Chance Ordinance.| Location: San Francisco, CA We are looking for a senior software engineer to join our Salesforce Communities, Napili Core team. Salesforce Communities extends Chatter beyond the confines of the enterprise to allow collaboration with customers and partners. It is one of the primary tenets of the Social Enterprise Platform. The team is responsible for the product end to end – including the APIs and UI for the features, security and performance aspects, As a senior engineer you will collaborate with product managers and other top-notch software engineers to design and implement features for our recently released Salesforce Communities product. Required Skills and Experience: Salesforce, the Customer Success Platform and world's #1 CRM, empowers companies to connect with their customers in a whole new way. The company was founded on three disruptive ideas: a new technology model in cloud computing, a pay-as-you-go business model, and a new integrated corporate philanthropy model. These founding principles have taken our company to great heights, including being named one of Forbes’s “World’s Most Innovative Company” six years in a row and one of Fortune’s “100 Best Companies to Work For” nine years in a row. We are the fastest growing of the top 10 enterprise software companies, and this level of growth equals incredible opportunities to grow a career at Salesforce. Together, with our whole Ohana (Hawaiian for "family") made up of our employees, customers, partners and communities, we are working to improve the state of the world. Would you like to apply to this job?
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128323870.46/warc/CC-MAIN-20170629051817-20170629071817-00455.warc.gz
CC-MAIN-2017-26
1,899
9
http://vanguardea.com/preparing-for-indigo-an-addition/
code
Craig McMurty, in his recent posting on Indigo indicates a couple of different scenarios for folks who are developing software today with an eye towards the impending release of Indigo. It is a valuable article and quite interesting. However, Craig missed the integration scenario completely, which is unfortunate. The scenarios covered: |Web Application||Use WSE-secured web services to support Ajax controls. No other use of communication protocols recommended.| |Rich Client (with local db)||Use MSMQ for data replication. Use WSE-secured web services to support synchronous calls.| |Data collection from devices (slow is OK)||Use MSMQ for data transmission. Use WSE-secured web services to support synchronous calls.| |Data collection from devices (speed required)||Use Indigo beta bits for communication instead of remoting.| This is useful if all apps are an island, and never need to share data with one another. Unfortunately, that is not the world I live in. As an architect, it is my responsibility to insure that applications are created with data integration built-in. The primary patterns of data integration are somewhat technical, but to align them with Craig’s approach, would fall into the following scenarios: - Data source system shares domain data. The considerations are: security of access to the data source system, whether data can be provided reliably by the data source system directly, and whether synchronous lookup of data would cause an impact on the performance of the data source system. Patterns are needed for situations where the data source system can (and should) provide data in individual records, in ad-hoc lookup sets, and in time-related (usually daily) batch deliveries. - System of Record generates business event. The considerations are: canonical schema of the business event (see my prior post on business event schemas), a publish and subscribe system for sharing the event, protocol for accepting the notification of the event, and considerations for instrumentation, security, orchestration, and monitoring. - Operation Data System shares transactional roll-up information (usually to a reporting system). The considerations are: source, version, and age of the data, relationships to known dimension tables, updates to dimension data, data size and load frequency, security and monitoring. - Application calls on service provided by partner application. This is an interesting (and somewhat dangerous) one. The considerations are: authorization, authentication, subscription management, service schema versioning, network/firewall issues, availability, reliability, monitoring, and error handling I will do some digging to see if I can determine if Indigo has a story for these scenarios or if they are simply covered by SQL Notification Services, Biztalk, DTS, and WSE (respectively).
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224652184.68/warc/CC-MAIN-20230605221713-20230606011713-00468.warc.gz
CC-MAIN-2023-23
2,838
13
http://docs.codehaus.org/plugins/viewsource/viewpagesrc.action?pageId=178520217
code
The GeoRest module is a plug-in for GeoTools to read a GeoJson based rest service. This is done by defining a new DataStore: GeoJsonDataStore. The actual service definition for this GeoJsonDataStore is defined by the Geomajas GeoJson plug-in, FeatureServer or MapFish server. The idea behind this module started at FOSS4G 2010, where people from GeoTools and Geomajas sat together during the Code Sprint. Currently the first version is being created which will be a read-only DataStore - thus implementing the FeatureSource, not FeatureStore interface. This module provides the necessary interface implementations to support the GeoJson format through a GeoRest service. This part defines: The package used for all these classes is: org.geotools.data.georest Currently this module has not yet been committed. These are the following steps to be taken for this module:
s3://commoncrawl/crawl-data/CC-MAIN-2015-06/segments/1422122233086.24/warc/CC-MAIN-20150124175713-00225-ip-10-180-212-252.ec2.internal.warc.gz
CC-MAIN-2015-06
867
6
http://photo.bragit.com/Slideshows/Travel/2012-PuertoNatales/start.html
code
Sorry! Badly configured browser! In addition, for things to look the way they were meant to look, the browser must support Cascading Style Sheets (CSS). Both of these things are enabled in all standard installations of Windows, Mac OS and Linux. Start slide show
s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320304686.15/warc/CC-MAIN-20220124220008-20220125010008-00046.warc.gz
CC-MAIN-2022-05
262
4
http://hskhsk.pythonanywhere.com/cidian?q=%E8%8E%BA
code
Word: freq index 39110| Character: radical 艸, 13 strokes, freq index 3540 oriole or various birds of the Sylvidae family including warblers| variant of 鶯| Look up 莺 in other dictionaries Page generated in 0.000982 seconds If you find this site useful, let me know!
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500250.51/warc/CC-MAIN-20230205063441-20230205093441-00751.warc.gz
CC-MAIN-2023-06
270
7
https://forum.inaturalist.org/t/widget-to-show-observations-from-a-list-on-a-website/27003
code
I’m rather new here, so I hope this questions fits here. I just found out how to get a widget with my latest observations to include on a website. Now I wondered if it is possible to have another widget next to it, where observations of taxa from a iNaturalist list are shown. E.g., endemic species or other species of interest. Currently, the lists appear to be not working, but as soon as this is fixed I’d like to have such a widget where observations of certain taxa are shown based on a list. Is this possible? If so, how can I get this widget? iNatuarlist’s standard widget displays observations for a given user, place, or project. so if you want to use that standard widget, i think the closest you can get is to create a project that mimics the list, and then display the observations in that project. otherwise, it is possible to query by list: and then if you are able to do some coding, you could make your own widget using the API. for example: https://jumear.github.io/stirfry/iNat_observation_grid_widget.html?list_id=111820&rows=4&columns=3&place_id=57482 This topic was automatically closed 60 days after the last reply. New replies are no longer allowed.
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662517245.1/warc/CC-MAIN-20220517095022-20220517125022-00774.warc.gz
CC-MAIN-2022-21
1,178
6
http://kmeleon.sourceforge.net/forum/read.php?1,70208,printview,page=1
code
I have tried this problem, and I confirm that mtypes works correctly, but it's K-Meleon which doesn't verify the mimetypes.rdf parameters before opening. Open seems to only open the default program I think it's a bug for Dorian. Mozilla/5.0 (x11; U; Linux x86_64; fr-FR; rv:38.0) Gecko/20100101 Ubuntu/12.04 K-Meleon/76.0 Mail : alain [dot] aupeix [at] wanadoo [dot] fr Ubuntu 12.04 - Gramps 3.4.9 - Harbour 3.2.0 - Hwgui 2.20-3 - K-Meleon 76.0 rc
s3://commoncrawl/crawl-data/CC-MAIN-2018-22/segments/1526794867309.73/warc/CC-MAIN-20180526033945-20180526053945-00572.warc.gz
CC-MAIN-2018-22
447
5
https://www.garysguide.com/jobs/81atgbm/Senior-Software-Engineer-at-CLEAR-New-York-NY
code
Founded in 2010, CLEARs mission is to create frictionless experiences. With more than 10 million members & hundreds of partners across the world, CLEARs identity platform is transforming the way people live, work, & travel. Whether its at the airport, stadium, or right on your phone, CLEAR connects you to the things that make you, you - making everyday experiences easier, more secure, & more seamless. Since day one, CLEAR has been committed to privacy done right. Members are always in control of their own information, & we never sell member data. CLEAR is looking for a Sr. Software Engineer to join the Developer Experience team. In this role, youll be responsible for building cutting-edge applications. Were looking for someone who is passionate about technology, stays on top of the latest trends within the field, & loves to engage with the developer community. Youll do the best work of your career. Your team will be building consumer focused front end & back end applications that enable more partners & developers to use Clears APIs & capabilities. You will be interfacing with our cloud native services hosted in AWS using modern distributed application design patterns. What You Will Do: - Develop new, & enhance existing, Python-based server-side applications. - As a Sr. Engineer on the team, you will be the technical leader developing & maintaining the back end application & architecture. - Uncover requirements working closely with product managers; suggest technical designs necessary to implement features & get teams buy in - Define & establish best practices for testing & designing reusable code - Be influential in making architectural, design, & technical stack recommendations within the team - Balance feature development with tech debt & ensure the code is well tested, readable, maintainable & free of regression defects - Drive the operational excellence of the services owned by your team, including continuously improving the performance & security of the application Who You Are: - 8+ years of core Back-End experience. Some python experience is a requirement. - Strong in object oriented modeling concepts, have developed multiple maintainable applications using appropriate design principles - Proficient in a broad range of software design approaches & common design patterns. Knows when (and when not) to use back-end software design patterns - Experience with Agile methodologies is required - Excellent judgment & creative problem solving skills, including strong communication skills. - Entrepreneurial team player who can multitask. - Can articulate the risks & benefits of depending on libraries, frameworks, & toolsets. - Able to provide technical guidance to other less experienced members of the team - Experience influencing software engineers best practices within your team - Curious about technology & believe in constant learning
s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656103329963.19/warc/CC-MAIN-20220627073417-20220627103417-00096.warc.gz
CC-MAIN-2022-27
2,884
22
http://claireauger.com/about/
code
Hello, my name is Claire Auger and I am 26 years old. I am gratuated from L’Ecole de design Nantes Atlantique in Nantes, France. Iwas in Master’s Degree in Interaction Design. My fourth and fifth year take place at Shristi School, in India, for transcultural program. I would like to meet a lot of people because it is a great opportunity to develop my creativity and to broaden my horizons and knowledge… I am curious! I want to have a specialization in Events.
s3://commoncrawl/crawl-data/CC-MAIN-2019-39/segments/1568514573368.43/warc/CC-MAIN-20190918213931-20190918235931-00547.warc.gz
CC-MAIN-2019-39
468
4
https://www.allinterview.com/company/2152/tcs/interview-questions/381/database-management.html
code
Which factors does not affect the size of the SGA ?3 6397 what is the difference between DBMS and RDBMS??76 158144 what are parameter, we can check after creating a database in terms of QC and for each tables what should be the parameters for QC and QA?1724 what is datapump? Difference between exp and expdp?2 18455 WHEN YOU FIRE A QUERY IT WILL SLOW WHAT WILL U DO.4 5213 Dept wise avrage salary2 3487 Hi how to import oracle sequence in Informatica? Please write stored procedure code that will import oracle sequence in Informatica SP transformation as per below scenario Oracle table product list Pro_id, pro_name, price 101, LED Lights,200 102, 20 watt CFL Lights, 145 103, 30 watt CFL lights,155 Now a new flat file with new product list needs to be added to oracle table product list with oracle sequence flat file product list has two column pro_name, price 20 watt tube light ,45 30 watt tube light ,601 4151 select Nth highest salary by using rownum4 17845 How can I manipulate strings of multibyte characters? How to pass an array in insert query using node js? How can I create image pieces/sub image? Which automation tools can be used for post-launch validation with continuous integration? i dont no what is tcs and tds what the use and how to calculate Tcs&Tds Describe queue operation. You want to see if the execution of a query has been slow or fast. How would you do that? How do you perform pattern matching in python? Why do I get a class not found exception when I try to use the shopping cart class? What is cascading in java? How to assign values to variables? How to fetch ULS logs for Correlation ID in SharePoint on-premise? What is the difference between opacity stop and color stop? What is the default time of delay before and delay after ? What is node written in?
s3://commoncrawl/crawl-data/CC-MAIN-2020-10/segments/1581875146186.62/warc/CC-MAIN-20200226023658-20200226053658-00444.warc.gz
CC-MAIN-2020-10
1,797
23
https://www.microsoft.com/en-us/p/sharefolder-explorer/9wzdncrdmmtk?rtc=1
code
ShareFolder for Windows Phone allows you to connect to your network shares without any additional software. With ShareFolder you can: - Transfer files from your network shares to your phone. - Load and save images to your phone gallery. - Save audio files to your music library. - Manage files and directories. - Open audio/video files directly from your shares (only video files supported by Windows Phone). ShareFolder support: - SMB/CIFS - WebDAV - OneDrive - Phone storage - FTP experimental (no TLS/SSL support). IMPORTANT: Note that ShareFolder is NOT intended to be a streaming player. For more information visit: http://www.komodosoft.net What's new in this version - Added DFS support (experimental). Approximate size3.18 MB InstallationGet this app while signed in to your Microsoft account and install on up to ten Windows 10 devices. Language supportedEnglish (United States) Español (España, Alfabetización Internacional)
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764499697.75/warc/CC-MAIN-20230129012420-20230129042420-00795.warc.gz
CC-MAIN-2023-06
937
7
https://stackshare.io/stackups/mongodb-vs-nedb
code
MongoDB vs NeDB: What are the differences? What is MongoDB? The database for giant ideas. MongoDB stores data in JSON-like documents that can vary in structure, offering a dynamic, flexible schema. MongoDB was also designed for high availability and scalability, with built-in replication and auto-sharding. MongoDB and NeDB can be primarily classified as "Databases" tools. MongoDB and NeDB are both open source tools. It seems that MongoDB with 16.7K GitHub stars and 4.17K forks on GitHub has more adoption than NeDB with 10.4K GitHub stars and 701 GitHub forks. Sign up to add or upvote prosMake informed product decisions Sign up to add or upvote consMake informed product decisions What is MongoDB? What is NeDB? Need advice about which tool to choose?Ask the StackShare community! Sign up to get full access to all the companiesMake informed product decisions Sign up to get full access to all the tool integrationsMake informed product decisions
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652663021405.92/warc/CC-MAIN-20220528220030-20220529010030-00301.warc.gz
CC-MAIN-2022-21
953
11
https://motls.blogspot.com/2014/10/lorentz-violation-zero-or-10-million.html?m=1
code
One of the research paradigms that I consider insanely overrated is the idea that the fundamental theory of Nature may break the Lorentz symmetry – the symmetry underlying the special theory of relativity – and that the theorist may pretty much ignore the requirement that the symmetry should be preserved. The Super-Kamiokande collaboration has published a new test of the Lorentz violation that used over a decade of observations of atmospheric neutrinos: They haven't found any evidence that these coefficients are nonzero which allowed them to impose new upper bounds. Some of them, in some parameterization, are 10 million times more constraining than the previous best upper bounds! I don't want to annoy you with some technical details of this good piece of work because I am not terribly interested in it myself, being more sure about the result than about any other experiment by a wealthy enough particle-physics-like collaboration. But I can't resist to reiterate a general point. The people who are playing with would-be fundamental theories that don't preserve the Lorentz invariance exactly (like most of the "alternatives" of string theory meant to describe quantum gravity) must hope that "the bad things almost exactly cancel" so that the resulting effective theory is almost exactly Lorentz-preserving which is needed for the agreement with the Super-Kamiokande search – as well as a century of less accurate experiments in different sectors of physics. But in the absence of an argument why the resulting effective theory should be almost exactly Lorentz-preserving, one must assume that it's not and that the Lorentz-violating coefficients are pretty much uniformly distributed in a certain interval. Before this new paper, they were allowed to be between \(0\) and a small number \(\epsilon\) and if one assumes that they were nonzero, there was no theoretical reason to think that the value was much smaller than \(\epsilon\). But a new observation shows that the new value of \(\epsilon\) is 10 million times smaller than the previous one. The Lorentz-breaking theories just don't have any explanation for this strikingly accurate observation, so they should be disfavored. The simplest estimate what happens with the "Lorentz symmetry is slightly broken" theories is, of course, that their probability has decreased 10 million times when this paper was published! Needless to say, it's not the first time when the plausibility of such theories has dramatically decreased. But even if this were the first observation, it should mean that one lines up 10,000,001 likes of Lee Smolins who are promoting similar theories and kills 10,000,000 of them. (OK, their names don't have to be "Lee Smolin". Using millions of his fans would be pretty much OK with me. The point is that the research into these possibilities should substantially decrease.) Because nothing remotely similar to this sensible procedure is taking place, it seems to me that too many people just don't care about the empirical data at all. They don't care about the mathematical cohesiveness of the theories, either. Both the data and the mathematics seem to unambiguously imply that the Lorentz symmetry of the fundamental laws of Nature is exact and a theory that isn't shown to exactly preserve this symmetry – or to be a super-tiny deformation of an exactly Lorentz-preserving theory – is just ruled out. Most of the time, they hide their complete denial of this kind of experiment behind would-be fancy words. General relativity always breaks the Lorentz symmetry because the spacetime is curved, and so on. But this breaking is spontaneous and there are still several extremely important ways how the Lorentz symmetry underlying the original laws of physics constrains all phenomena in the spacetime whether it is curved or not. The Lorentz symmetry still has to hold "locally", in small regions that always resemble regions of a flat Minkowski space, it it must also hold in "large regions" that resemble the flat space if the objects inside (which may be even black holes, highly curved objects) may be represented as local disturbances inside a flat spacetime. One may misunderstand the previous sentences – or pretend that he misunderstands the previous sentences – but it is still a fact that a fundamentally Lorentz-violating theory makes a prediction (at least a rough, qualitative prediction) about experiments such as the experiment in this paper and this prediction clearly disagrees with the observations. By the way, few days ago, Super-Kamiokande published another paper with limits, those for the proton lifetime (in PRD). Here the improvement is small, if any, and theories naturally giving these long lifetimes obviously exist and still seem "most natural". But yes, I also think that the theories with a totally stable proton may also exist and should be considered.
s3://commoncrawl/crawl-data/CC-MAIN-2020-10/segments/1581875144722.77/warc/CC-MAIN-20200220100914-20200220130914-00156.warc.gz
CC-MAIN-2020-10
4,892
13
http://blog.sabratech.co.uk/2007/01/checking-if-context-property-exists.html
code
Checking if a context property exists I've mentioned this briefly in one of my previous posts, but really I think the subject deserves its own post - There's a certain behaviour of BizTalk that does not fit, in my view, with a certain development guideline. Generally, it is said, one should not use exceptions to control the flow of an application. exceptions should be there to handle, as their name suggest, exceptional situations. What that comes down to (a very short description) is that, for example, if you're about to use a member that might contain null, it is better to encpasulate your work in an if(a!=null) block rather than using a try catch block around the access to the member to catch any NullReferenceException. However, in BizTalk, if you try to access a context property that does not exist in the message context you will get a MissingPropertyException thrown. this means that if you need to check for the existence of a property from within an orchestration you will have to do that in a scope with an exception handler, so that if the exception was thrown you know the property does not exist, if it wasn't thrown the proeprty has a value. While this gets the job done it is not in line with the guidance around exception handling and is not performing as well as an if (exceptions are more expensive than control flow statements) Somewhat surprisingly in a way, there is a second option that works - you can pass your message to a helper class and use the XLANGMessage's GetPropertyValue method to access the value. this method is inconsistent with the use of context properties in an orchestration as it returns null if the property does not exist (which is good news for our purpose) you can read more about it here
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917121528.59/warc/CC-MAIN-20170423031201-00476-ip-10-145-167-34.ec2.internal.warc.gz
CC-MAIN-2017-17
1,743
9
http://stackoverflow.com/questions/6305619/minimax-what-happens-if-min-plays-not-optimal/6306722
code
the description of the minimax algo says, that both player have to play optimal, so that the algorithm is optimal. Intuitively it is understandable. But colud anyone concretise, or proof what happens if min plays not optimal? The definition of "optimal" is that you play so as to minimize the "score" (or whatever you measure) of your opponent's optimal answer, which is defined by the play that minimizes the score of your optimal answer and so forth. Thus, by definition, if you don't play optimal, your opponent has at least one path that will give him a higher score than his best score if you played optimal. One way to find out what is optimal is to brute force the entire game tree. For less than trivial problems you can use alpha-beta search, which guarantees optimum without needing to search the entire tree. If you tree is still too complex, you need a heuristic that estimates what the score of a "position" is and halts at a certain depth. Was that understandable? I was having problems with that precise question. When you think about it for a bit you will get the idea that the minimax graph contains ALL possible games including the bad games. So if a player plays a sub optimal game then that game is part of the tree - but has been discarded in favor of a better game. Its similar to alpha beta. I was getting stuck on what happens if I sacrifice some pieces intentionally to create space and then make a winning move through the gap. ie there is a better move further down the tree. With alpha beta - lets say a sequence of losing moves followed by a killer move is in fact in the tree - but in that case the alpha and beta act as a window filter "a< x < b" and would have discarded it if YOU had a better game. You can see it in alpha beta if you imagine putting a +/- infinity into a pruned branch to see what happens. In any case both algorithms recalculate every move so that if a player plays a sub optimal game them that will open up branches of the graph that are better for the opponent.
s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440644066586.13/warc/CC-MAIN-20150827025426-00351-ip-10-171-96-226.ec2.internal.warc.gz
CC-MAIN-2015-35
2,015
10
http://sysadminsjourney.com/content/2008/09/01/use-gmail-smtp-relay-using-ssmtp/
code
On some of your home workstations, and especially on a laptop, setting up a full-blown SMTP server such as Postfix, Sendmail, or Exim might be overkill. Follow the jump to learn how to setup the lightweight ssmtp to relay all outbound mail through your GMail account by using Gmail as a smarthost. SSMTP is meant to be a no-frills, secure, and lightweight replacement for a full-blown MTA. Personally, I feel it’s best use is on a laptop where you’re moving around between networks a lot, and need to send outbound emails from cron or other shell scripts. By setting up SSMTP, it doesn’t matter where you are, sending mail will be sent out over encrypted SMTP to Google’s gmail servers. After handing it off, Google’s servers do all the routing for you. Setting up SSMTP is quick and easy - let’s get to it. On Ubuntu, run: \# sudo apt-get install ssmtp mailx Now, we just need to configure SSMTP. Open up /etc/ssmtp/ssmtp.conf in your favorite editor, and add or update the following lines: \#The following line redirects mail to root to your gmail account [email protected] That’s it! Now, let’s try testing it: $ echo "This is a test message." | mailx -s 'Test Message' [email protected] You should now be all setup and ready to go!
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296819089.82/warc/CC-MAIN-20240424080812-20240424110812-00802.warc.gz
CC-MAIN-2024-18
1,264
7
https://www.makeuseof.com/tag/pay-what-you-want-for-premium-training-in-web-mobile-and-game-development/
code
Pay What You Want For Premium Training in Web, Mobile, and Game Development There are many career paths that involve code and design, so it makes sense for aspiring developers to get a broad education. The Complete Developer Bundle offers just that, with four courses on web, mobile and game design. Right now, you can pay what you like for the courses via MakeUseOf Deals. What you’ll get The instruction kicks off with the Web Design Course, which shows you how to create beautiful websites from scratch. The tutorials explain HTML5 and CSS3 — the building blocks of the web — and you can practice your skills in an online emulator. You progress to tackle WordPress, e-commerce and SEO with downloadable templates, before taking a test to prove your knowledge. The App Design Course introduces the code of iOS and Android. You learn how to use the development environments of Xcode and the Android SDK, and study the source code of real-world apps. The tutorials help you design your first app from scratch, and get it published in the App Store and Play Store. You can have some real fun with the Game Design Course, where award-winning developers, Chris and Max, teach you how to create your own mobile titles. The course looks at the popular Unity 3D framework, and helps you publish your game on iOS, Android and Windows. The final track, the Basic WordPress Course, helps you set up this popular web publishing platform and customize it to your needs. Pay What You Want You can pay any price on the Basic WordPress Course. Make sure to beat the average price paid to get the full bundle, worth $1,840. All sales final. Instant digital redemption. Affiliate Disclosure: By buying the products we recommend, you help keep the site alive. Read more.
s3://commoncrawl/crawl-data/CC-MAIN-2020-34/segments/1596439738699.68/warc/CC-MAIN-20200810205824-20200810235824-00097.warc.gz
CC-MAIN-2020-34
1,759
11
http://steamcommunity.com/app/221410/discussions/0/882965737464751400/
code
Since I am running Fedora 17 I have SELinux running, I've found that SELinux has a complaint about Steam: Attempted Access of execheap I don't know much about SELinux or this low level stuff so I can't comment on what's happening here. A quick search online for execheap turns up this piece on SELinux and execheap (among other things)[danwalsh.livejournal.com] The article quotes Ulrich Drepper - the lead contributor and maintainer on GNU C - as saying about execheap: "The POSIX specification does not permit it, but the Linux implementation of mprotect allows changing the access protection of memory on the heap (e.g., allocated using malloc). This error indicates that heap memory was supposed to be made executable. Doing this is really a bad idea. If anonymous, executable memory is needed it should be allocated using mmap which is the only portable mechanism." Anyway I thought I'd post it hear to see if it's of any use to anyone. Well, a bit more information on what the bug means from my investigations for bug reporting. The 'execheap' SELinux warning is a warning that heap memory (dynamically allocated memory) has been flagged as Writeable and Executable. This is a potential security exploit because malicious code could be injected into this memory and executed as part of the original process. This apparently wouldn't even be allowed in Windows under Data Execution Prevention - DEP (although I've not been able to confirm this). The exploit appears to be open in source games - HL1 and TF2 (hl2_linux engine) confirmed by me. Also it was raising this issue in Steam Big Picture Mode for me around Christmas, but I haven't been able to reproduce this because other memory violations by Steam are preventing my opening BPM. The call on my system for HL1 appears to be: sys_mprotect(0x091C1000, 49152 /* 48 kibibyte */, PROT_READ | PROT_WRITE | PROT_EXEC); You can decode that from /var/log/audit/audit.log syscall=125 or sys_mprotect a0=9779000 or 0x09779000 for another heap position a1=c000 or 49152 a2=7 or PROT_READ(4) + PROT_WRITE(2) + PROT_EXEC(1)
s3://commoncrawl/crawl-data/CC-MAIN-2015-27/segments/1435375099361.57/warc/CC-MAIN-20150627031819-00043-ip-10-179-60-89.ec2.internal.warc.gz
CC-MAIN-2015-27
2,073
17
https://kb.bluecoat.com/index?page=content&id=KB4614&cat=CLOUD_IPSEC_VPN&actp=LIST
code
Cisco router with DHCP address connecting IPSEC to Cloud Web Security service Connecting to the Cloud Web Security service using IPSEC requires that the Cloud peer know the IP address that the firewall or router is coming from. This is defined manually in your portal under network locations. When a router has a DHCP address on its outside interface you cannot guarantee that the address will remain the same. If the address does change the network location in portal must be updated to reflect the new ip address otherwise the IPSEC tunnel will fail to establish. This can cause a site outage. Using the Cisco command "ip ddns . . ." it is possible to send updated ip address information into the Cloud to dynamically update the network location in your portal. This command will execute when the interface receives an ip address through DHCP. routername(config)#ip ddns update method update-cloud In order to enter the character "?" you need to do a ctrl-v first and then enter "?" (without quotes). What will happen when this command is sent to your portal? This HTTP query can be used in a script to create multiple network locations at a time. It can also be used from a browser to create the network location. Confirmed to work with Cisco IOS 12.4 and 15.0. Rate this Page Please take a moment to complete this form to help us better serve you.
s3://commoncrawl/crawl-data/CC-MAIN-2014-15/segments/1397609538022.19/warc/CC-MAIN-20140416005218-00131-ip-10-147-4-33.ec2.internal.warc.gz
CC-MAIN-2014-15
1,351
11
https://www.eficode.com/cases/vaisala
code
Eficode’s consultants had the right skillset to help build Vaisala’s Development and Design System: a system which makes the company more agile. “Our Development and Design System makes us more agile through coded components and cooperation. It’s a way for product teams to supply UI atoms into the system, which means all of our teams save time by using building blocks that have been made in other projects.” - Sauli Laitinen, Vaisala Design Manager Vaisala’s Development and Design System is a coordinated way of working which leads to a growing collection of ‘atoms’ – reusable and documented UI components. These components are simple enough to be useful to many different teams working on vastly different products. The system adds value to all teams as new projects come up with new components that can be reused elsewhere in the organization. The system is owned by all the teams that contribute to it: the application teams that develop the components, the UX team, and the platform team. As an internal open source product, the system is created together, and there are only two coordinators needed to loosely organize the cooperation between teams. Now that the system is in place, Vaisala is benefiting from less duplicate work, thereby saving time and allowing developers and designers to focus on creating application-specific solutions for their users. Vaisala was ready for a Design System Vaisala is a global leader in weather, environmental, and industrial measurement. Building on over 80 years of experience, Vaisala provides observations for a better world with approximately 1,850 professionals worldwide. When it came to their UX capabilities, Vaisala had reached a level of working – with UI experts embedded in their product teams and a unified visual style – that gave the company a taste for more. How much of the design and development work done in one team could be used elsewhere within the company? Some manner of reusable components were already in place, but the process for getting them made could be improved. A coder from the platform team would make components when asked by the design team, after which the component would wait to be used by an application team. Vaisala was hungry for a better, more agile solution. What is a Design System? A Design System (or as Vaisala calls theirs, a Development and Design System) provided that solution for Vaisala. Design Systems are a cross-organizational way of working which significantly reduces duplicate work. It is a living system which produces UI components (or ‘atoms’) for designers, as well as React components for developers. Atoms are fed into the system as and when they are made in real-world scenarios by teams across the organization. With the right skillset, Design Systems can be automated to save even more time. How was Vaisala’s Development and Design System created? Vaisala wanted the teams that would contribute to the system in the future to take ownership of the system as it was being built. One thing was crystal clear: the system would have to be created collaboratively. Eficode’s consultant worked closely with a member of the Vaisala platform team over the course of the project. Together, they built the architecture of the system that would accept and store the components. Eficode’s consultants had the prior experience to complement the existing body of knowledge at Vaisala. Workshops and hackathons What was the best way to create agile Design System? This question became the driving force of a series of workshops that involved the design team, the platform team, and Eficode’s consultants. Between the workshops, the project was progressed using MS Teams and Jira. Collaboration was encouraged further in hackathons with the teams that would form the beating heart of the system in its final form. Light in the middle The end result was a system that was very light in the middle, with two coordinators who are the best people for the job from the teams contributing to the system. The coordinators facilitate the process. DevOps and the Design System Vaisala already had a continuous delivery pipeline for software production, consisting of an integration of Jenkins, Bitbucket, and Jira. The Design System’s automation was built by Eficode’s DevOps consultant on top of that existing infrastructure. Eficode’s consultant added to the existing integration, automating the following elements of Vaisala’s design system: - Automated testing of components - Automated updates of website documentation - Automated publishing of the newest version of a component. Today, new builds and new versions are automatically published by the Design System for developers to use. Develop, Share, Gain: the benefits The benefits of Vaisala’s Development and Design System had to be tangible for all the teams involved, as this would motivate people to contribute to the system. These benefits look different depending on who you’re talking to. For product teams - Unified branding and UX - Products that work the same way - Faster UI work at a higher quality - UI components that keep getting better - Faster beginning of projects - Designs which are easy to use (as Node.js package manager dependencies) - Bug fixes for components - Write one component, get ten free - Less writing in CSS - Components that work well together - Less work with pixel perfect UI specifications - One source for the latest design - Rapid prototyping with code/clickable prototypes - Strengthens Vaisala’s shared design language From an organizational perspective, the Design System shortens time to market, safeguards consistency, and helps teams to focus on the essential challenges of solving customers’ problems with the software they are creating. Design systems are social creatures Almost half of the work involved in the design system is bringing people together, getting them excited and making sure they enjoy working together. This has been the key to the great start to Vaisala’s design system. It is a system that is owned and maintained by a cross-organizational group of active developers and designers, making it a recipe for greater agility. Eficode also provides other design and UX services (and is Finland’s leading UX research house). Thanks go to the following individuals, who together created Vaisala's Development and Design System: Aine Aivi (Vaisala), Samuli Andelin (Eficode), Tomasz Dressler (Vaisala), Joona Enbuska (Eficode), Jarkka Kivikanta (Vaisala), Jarkko Polvi (Eficode), John Moscarillo (Vaisala), Juha Karttunen (Siili Solutions), Jukka-Pekka Luukkonen, Joonas Kallio (Kinetive), Marko Kankaanniemi (Goto 10 Software), Kari Heikkilä (Vaisala), Markus Koivisto (Vaisala), Heta Korvenranta (Vaisala), Heikki Kupiainen (Metamatic), Sauli Laitinen (Vaisala), Leena Pohjaniemi (Vaisala), Maiju Tompuri (Vaisala), Mikko Ala-Fossi (Vaisala), Miso Mikkilä (Iskos), Petteri Suontama (Eficode), Teemu Kujanpää (Vaisala), Teppo Rouvi (Vaisala), Toni Lehtimäki (Vaisala), Tuomas Lilja (Eficode), Tuomo Mäkelä (Vaisala), and Harald Jerger (Vaisala).
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817112.71/warc/CC-MAIN-20240416222403-20240417012403-00879.warc.gz
CC-MAIN-2024-18
7,124
52
https://en.uesp.net/wiki/Tes3Mod:PlaySound
code
PlayLoopSound3D, "SoundID" PlayLoopSound3DVP, "SoundID", Volume, Pitch PlaySound, "SoundID" PlaySoundVP, "SoundID", Volume, Pitch PlaySound3D, "SoundID" PlaySound3DVP, "SoundID", Volume, Pitch Where: SoundID = The sound to play Volume = Float value to adjust the volume, 0 is none, 1 is full Pitch = Float value to adjust the pitch Type: Sound Returns: none Example: PlaySound, "Crowd Boo" PlayLoopSound3DVP. "Sound Test Loop", 1.0, 1.0 Scripts: SoundTest GG_OpenGate1 These functions play sound with a variety of options. The PlaySound function will play the sound at full volume, sounding like it comes from directly at the player's location. The 3D functions will cause the sound to be played from the calling object's location in the game (so it will be dimmer the farther the player is away from it). The VP functions allow you to adjust the volume and pitch of the sound, although whenever the functions are used only 1 for both volume and pitch are used. The PlayLoop functions will play the sound continuously until a StopSound function is called. See Also: StopSound
s3://commoncrawl/crawl-data/CC-MAIN-2019-51/segments/1575540491491.18/warc/CC-MAIN-20191206222837-20191207010837-00545.warc.gz
CC-MAIN-2019-51
1,075
3
https://max-romulus.storychief.io/fck-work-go-have-fun
code
F*CK WORK GO HAVE FUN! When’s the last time you had a vacation, staycation or at least a mental vacation? Do you worry about what you're missing at work when you're on vacation? On this episode, we talk about making sure you're having fun with life and giving yourself permission to have time off. Even if it's just getting outside and walking around letting your mind wander. Show notes and link can be found here www.thesocialchameleon.show Giveaways can be found here www.thesocialchameleon.show/pickme Call: (480) 525-5258 Email: [email protected] Connect with us: Subscribe To Our Podcast:
s3://commoncrawl/crawl-data/CC-MAIN-2020-50/segments/1606141213431.41/warc/CC-MAIN-20201130100208-20201130130208-00383.warc.gz
CC-MAIN-2020-50
596
6
http://freecode.com/tags/os-independent?page=1&sort=name&with=3393%2C2828&without=
code
Common Text Transformation Library is a library of C++ classes and functions to parse and modify STL strings. CTTL substring classes may be compared, inserted, replaced, and parsed with EBNF grammars. The compiled program implements a fast, thread-safe, re-entrant recursive descent parser. A seed project that combines Play Framework, AngularJS, Bootstrap, and MongoDB.. Lightweight and powerful automated software deployment.
s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1387345773090/warc/CC-MAIN-20131218054933-00041-ip-10-33-133-15.ec2.internal.warc.gz
CC-MAIN-2013-48
427
3
https://www.fr.freelancer.com/work/myspace-plays-cheats/
code
...umentation-live-info-v2 The result will be a radio player that plays the currently playing track, and can be invoked via a WordPress shortcode. The radio player itself only needs the basic controls - Play and Pause. They can be contained in the same button (eg; click play, it plays and changes to a Pause button. Click it and it pauses. Click it again Need a hip, modern, classy logo for a musical trio - piano, violin, cello - that plays pop/classical music. Can see them at [se connecter pour voir l'URL] The trio's name is "Take 3" and they are an all-female group. iOS App with Facebook login, referral function via servlet, and alarm & audio within app to invoke at specific times. User also needs to know how to utilize movement sensor to detect sleep/wake up state, movement and loud sound for app to perform specific functions. please provide answers to below questions when applying: Q1 - what potential technologies would you use to achieve above? Q2 - ... This is an update to the Volcast mobile app. As such, contractor will build upon existing source code. Volcast is a mobile app that downloads and plays MP3 files. Take a look at [se connecter pour voir l'URL] for more details; also download the mobile app and become familiar with the current product. JOB REQUIREMENTS: - iPhone development experience with Xcode Colorful Darkness is a point-and-click, mystery-solving adventure game taking place in a futuristic world, where device and computer hacking plays a major role. We want the hacking gameplay to feel real and the learning curve to be rewarding: no "hacking complete" progress bar here, just sweat, logic, and out of the box thinking.
s3://commoncrawl/crawl-data/CC-MAIN-2018-43/segments/1539583515555.58/warc/CC-MAIN-20181022222133-20181023003633-00286.warc.gz
CC-MAIN-2018-43
1,665
5
https://www.alvestrand.no/pipermail/idna-update/2007-June/000613.html
code
Requirements document (Re: New duerst at it.aoyama.ac.jp Mon Jun 18 11:59:08 CEST 2007 At 17:24 07/06/18, Simon Josefsson wrote: >Martin Duerst <duerst at it.aoyama.ac.jp> writes: >> The issues document should probably mention this, because it's >> an issue in the sense that it has to be duely considered and >> checked of, but for everybody who has looked even a bit into >> this issue will understand that it's a non-issue, in the sense >> that applications should just upgrade to the new, correct >> version of normalization without any problems. >Well, upgrading would violate the current IDNA specification, and libidn >will maintain its implementation of the IDNA documents, see: >If the new IDNA specification changes anything wrt pr29, that will break >backwards compatibility for a set of strings, and I expect there to be >discussion about what the strategy to resolve this incompatibility will >The strings doesn't occur in natural language, but may occur in >non-natural strings such as passwords, and my suggestion has been that >all the problematic strings should be rejected. It only affects a small >number of strings. Your suggestion is one to consider. My personal opinion would be that because for passwords, prohibition is as bad as a change (in normalization), and a normalization change is easier to implement (change one character, in the case of your source) than a special prohibition, so I'd favor just changing things. On top of that, I'd note that even most passwords have some connections with natural language (at least by the fact that they are usually typed in on a keyboard), so the chance that a password contains such a string is still extremely, extremely low (essentially, we are still talking about an empty set). #-#-# Martin J. Du"rst, Assoc. Professor, Aoyama Gakuin University #-#-# http://www.sw.it.aoyama.ac.jp mailto:duerst at it.aoyama.ac.jp More information about the Idna-update
s3://commoncrawl/crawl-data/CC-MAIN-2021-49/segments/1637964362879.45/warc/CC-MAIN-20211203121459-20211203151459-00426.warc.gz
CC-MAIN-2021-49
1,927
33
http://stackoverflow.com/questions/9769527/alternatives-to-the-960-gs-grid-system/9770022
code
Grids are tricky when building responsive sites that cater for multiple layout sizes/devices because grid systems (certainly 960.gs) usually rely on fixed-width containers. However, depending on how you approach your responsive build, you can still use a grid system for your desktop view. E.g. I usually approach responsiveness from the same perspective as the 320&up multiple linked stylesheets. This makes it easy to just load a particular grid system (usually 960.gs) only in the desktop view. This way, your mark-up can have the classes required by the grid system, e.g. grid_12, without the fixed widths screwing up the mobile view. That said, there are some responsive grid systems that are proving popular and are easy to work with, such as the 1140 fluid grid. You could also try the fluid 960 grid There are also projects that even use the 960.gs grid as a base, while still catering for smaller sizes, such as skeleton I'd recommend you take a look at 320&up because it is a great resource for responsive builds. The theory of building for mobile first and progressively loading more stuff for larger views is definitely the way to go...
s3://commoncrawl/crawl-data/CC-MAIN-2015-22/segments/1432207927824.81/warc/CC-MAIN-20150521113207-00253-ip-10-180-206-219.ec2.internal.warc.gz
CC-MAIN-2015-22
1,148
5
https://mailman-1.sys.kth.se/pipermail/gromacs.org_gmx-users/2017-April/112689.html
code
[gmx-users] Regarding reading .gro file in python obeckste at asu.edu Thu Apr 27 18:53:56 CEST 2017 I think the next version of Gromacs will have some Python bindings. Until then you can use MDAnalysis http://mdanalysis.org : It reads GRO files (as well as XTC, TRR, and TPR, … and many other formats) and loads it into a numpy array. (If you have questions regarding MDAnalysis please ask on the MDAnanlysis user mailing http://users.mdanalysis.org list instead of the Gromacs list.) Oliver (disclosure: I am one of the core developers of MDAnalysis) > On 27 Apr, 2017, at 09:46, Dilip H N <cy16f01.dilip at nitk.edu.in> wrote: > I want to write a python program to read a .gro file in gromacs.. How can i > write the program / code to read the .gro file... > I need to write a python programm to read the .gro file and write as it > is.. can anybody help me regarding this... > Thank you.. > With Best Regards, > Ph.D Student Oliver Beckstein, DPhil * oliver.beckstein at asu.edu Assistant Professor of Physics Arizona State University Center for Biological Physics and Department of Physics Tempe, AZ 85287-1504 Office: PSF 348 Phone: +1 (480) 727-9765 FAX: +1 (480) 965-4669 Department of Physics: https://physics.asu.edu/content/oliver-beckstein Center for Biological Physics: https://cbp.asu.edu/content/oliver-beckstein More information about the gromacs.org_gmx-users
s3://commoncrawl/crawl-data/CC-MAIN-2019-35/segments/1566027323067.50/warc/CC-MAIN-20190825042326-20190825064326-00463.warc.gz
CC-MAIN-2019-35
1,377
26
http://blog.deozaan.com/2016/04/22/light-at-the-end-of-the-tunnel/
code
Cubiq–the game itself–is virtually finished. There’s only one stage left that still needs a little bit of work done to flesh out the background visuals. But other than that, the game is fully playable and ready. Or is it? We decided we need to include a tutorial so that players weren’t totally confused about what to do or how to play. But tutorials are kind of strange beasts. It requires you to make your game function in a way it was never intended to function and only for that tiny little segment of game called the tutorial. It’s relatively a lot of work for such a small thing that most players will only do once (if that!) and then ignore forevermore. As such, it’s a balancing act to figure out how much time and effort is worth the benefit of making sure you don’t leave any players behind due to a lack of understanding of how to play. Keeping these things in mind, we chose to make the tutorial fairly simple. Even so, adding the tutorial means adding more art, new bugs, more testing, breaking things that used to work fine but now don’t because the tutorial needs to use it in a weird way, etc. So that’s extending the amount of time before we can release. Not only that, but even when the game is completely finished, we still have quite a bit of other work we need to do to prepare for the launch. We’ve been focusing so much on making and finishing the game that we’ve neglected a lot of other important things mostly related to marketing. We don’t have a website for the game. There are other things that we couldn’t do before, such as a video trailer, because many of the visual elements and sounds were still being finalized. So basically I guess I’m just saying the same thing I said last time. Even though the game feels like it’s 99.9% finished at this stage, we still have lots of work ahead of us before we can officially launch the game. More details and hopefully a website or trailer, next time.
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917124371.40/warc/CC-MAIN-20170423031204-00636-ip-10-145-167-34.ec2.internal.warc.gz
CC-MAIN-2017-17
1,954
7
http://www.uidsystems.com/
code
Synchronize any LDAP Directory, including Microsoft® Active Directory™ instantly A fully automated, highly customizable reliable service to synchronize about any data from any to any LDAP directory. - many built-in configuration options for mapping rules, data processing, ... - compatible with Microsoft Active Directory, openLDAP, Lotus Notes, SunOne, ... - high performing the easiest way to sync Microsoft® Exchange™ contact information between seperate sites - Wizard based interface - Custom attribute mappings, including fixed values and calculated values - Replicates groups with memberships, even across Active Directory forests Wizard based, fast synchronization of any Microsoft Exchange Global Address List Search your Microsoft® Active Directory™ like the web / export to clipboard and to CSV files. - predefine common attributes that need to be exported - search any field using advanced find options, ... - list group memberships or multiple e-mail addresses in a readable form. Millions of directory entries are being synchronized daily using the reliable and straight forward service proved by our products. Whether you need to unify your global address lists, connect Microsoft(tm) Active Directory(tm) data from multiple domains or integrate Lotus Notes, openLDAP or other directory services to enable centralized data management and availability, or if you need to migrate, consolidate or separate different directory services – our solutions can ensure data quality and availability by allowing synchronization scenarios tailored to your requirements.
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764499541.63/warc/CC-MAIN-20230128090359-20230128120359-00448.warc.gz
CC-MAIN-2023-06
1,583
15
https://web-stage.metacpan.org/dist/Acme-ConspiracyTheory-Random/view/bin/conspire
code
conspire - drops some truth conspire will print a conspiracy theory to STDOUT. conspire 3 will print three conspiracy theories. (Other positive integers also work.) Please report any bugs to https://github.com/tobyink/p5-acme-conspiracytheory-random/issues. Toby Inkster <[email protected]>. This software is copyright (c) 2021 by Toby Inkster. This is free software; you can redistribute it and/or modify it under the same terms as the Perl 5 programming language system itself. THIS PACKAGE IS PROVIDED "AS IS" AND WITHOUT ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE IMPLIED WARRANTIES OF MERCHANTIBILITY AND FITNESS FOR A PARTICULAR PURPOSE.
s3://commoncrawl/crawl-data/CC-MAIN-2021-39/segments/1631780057416.67/warc/CC-MAIN-20210923013955-20210923043955-00225.warc.gz
CC-MAIN-2021-39
683
8