url
stringlengths
13
4.35k
tag
stringclasses
1 value
text
stringlengths
109
628k
file_path
stringlengths
109
155
dump
stringclasses
96 values
file_size_in_byte
int64
112
630k
line_count
int64
1
3.76k
http://www.ariadne.ac.uk/faq/how-can-i-clear-filter-settings
code
You can easily remove filter settings and return to a complete overview of tags at any time. As illustrated below, on many pages we provide a convenient shortcut: - select the 'remove all filters' link - automatically the page reloads and displays all available content associated with a tag Alternatively, you can also do this: - empty filter fields that you do not wish to use - select 'Apply' - when the page reloads, it displays all available content associated with a tag
s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218190753.92/warc/CC-MAIN-20170322212950-00101-ip-10-233-31-227.ec2.internal.warc.gz
CC-MAIN-2017-13
476
8
https://www.mcadcentral.com/threads/density-show-in-drawing-notes.4564/
code
I believe you may have misunderstood what I was requesting. If under Set-Up, Density...I input a density...I would like to set up a parameter (&density) to have the .prt density show up in the notes of my drawing. How do you set up a parameter to have the notes reflect the inputed value for density? If you are working in mm the &density will show up as 0.00. If you want the density to show up as comparative to water you will have density=mp_density()/2.204623E-06, assuming you are in mm. I am in 2001, so the variables for Wildfire may have changed? Regen the part from the beginning to make sure all variables have been filled. Use the model player and regen from beginning with Regenerate Features selected. Also density=mp_density*2.204623E-06 to convert to specific density. If you are working in mm, your density will be .0000nnnn or something like that. Hora's solution worked. The problem was I didn't have spaces on either side of the equal sign. However, additionally I ran Utilities and Model Player and marked the Regenerate Features. Changed two variable at once. I'm sorry it was such a simple solution and didn't know to have spaces on either side of the equal sign.
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296949701.0/warc/CC-MAIN-20230401032604-20230401062604-00138.warc.gz
CC-MAIN-2023-14
1,185
6
https://www.headhonchos.com/jobs/team-lead-technical-lead-it-information-technology-it-technology-software-services-pune-285439.html
code
Desired candidate profile: Selenium Test Automation Strong experience on automation (min. 4+ years) with at least 6 years of total experience. Experience in Automation Framework Designing, Executing and maintaining automated test scripts is MUST Good working experience and knowledge of Selenium IDE, RC & strong SQL knowledge. Good Java script knowledge 3+ years experience with Selenium Web driver and Selenium Grid. Having Very good knowledge SDLC, QA process and AGILE methodology. Experience working in an agile development environment SCRUM is a plus. In-depth knowledge of testing Web-based applications. Familiarity with SDLC, quality standards and test methodologies. Having Experience in Software testing, which includes Test case Identification, Test Execution, Defect Tracking, Bug Reporting activities and Risk Analysis. Having Experience in Functional and Regression / Integration and Smoke testing.
s3://commoncrawl/crawl-data/CC-MAIN-2016-50/segments/1480698542288.7/warc/CC-MAIN-20161202170902-00093-ip-10-31-129-80.ec2.internal.warc.gz
CC-MAIN-2016-50
913
10
http://www.premiumhollywood.com/2009/10/22/whats-all-this-then/
code
If you’ve been checking in on Premium Hollywood over the course of the past few days, then you’ve probably spotted our man Bob Westal’s tributes to the 40th anniversary of Monty Python, and if you haven’t…well, they’re here, here, and here. Python fans will likely have already seen Bob’s finely-chosen clips, but if they’re new to you and made you laugh, then you really ought to be tuning into IFC’s ongoing six-part documentary about the history of the Python organization: “Monty Python: Almost the Truth – The Lawyer’s Cut.” As evidenced by the fact that there’s an Amazon link in the midst of the title, the documentary is indeed being released onto DVD on Oct. 27th, but don’t let that stop you from checking out the remaining episodes as they air on IFC. Those who aren’t obsessive types might find it a bit more Python than they can stand, but it’s definitely the comedy equivalent of “The Beatles Anthology,” leaving no stone unturned from the group’s career, showing their origins, discussing their TV series, films, and infamous live performances, and offering insights from other comedians who’ve received inspiration from the gentlemen in the Flying Circus. It’s worth noting, by the way, that there is actually a theatrical cut of “Almost the Truth,” which comes in at a decidedly tighter run time of under two hours…and I know this because I was in attendance at the Ziegfield Theater in New York City last week when it was screened. The best bit about it, though, was that the screening was attended by John Cleese, Terry Gilliam, Eric Idle, Terry Jones, and Michael Palin, not to mention the group’s female in residence, Carol Cleveland. Oh, no, wait, that wasn’t the best bit. The real best bit was when, after the screening, the gentlemen took the stage – with Cleese carrying a cardboard stand-up of the late Graham Chapman under his arm – to answer questions which had been submitted by the audience, which you can experience for yourself below: No, hang on: the actual, honest-to-Brian best bit was the fact that I actually got to meet the Pythons. Okay, what actually happened was that I chatted with Terry Jones for a few minutes, then took pictures of Cleese, Gilliam, and Palin. Idle blew right past me, the bastard. (Just kidding…well, about the bastard part, anyway. He could’ve at least slowed down, though.) See, here was the problem: although I had an excellent spot right at the end of the red carpet, it was rather chilly and quite rainy, so although the guys were wearing their best meet-the-press game faces, they could hardly be blamed for wanting to get inside and get warmed up. Terry Jones was the first one down the carpet, however, so he hadn’t quite gone numb from the cold yet by the time he reached me. As such, I was able to ask him about his most underrated solo project, at which point he surprised me by citing not a film or TV series but, rather, a book: “Who Murdered Chaucer?: A Medieval Mystery,” released in 2003. Here’s how Amazon describes it: In this work of historical speculation, Terry Jones investigates the mystery surrounding the death of Geoffrey Chaucer over 600 years ago. A diplomat and brother-in-law to John of Gaunt – one of the most powerful men in the kingdom – Chaucer was celebrated as his country’s finest living poet, rhetorician, and scholar: the pre-eminent intellectual of his time. And yet nothing is known of his death. In 1400 his name simply disappears from the record. We don’t know how he died, where or when; there is no official confirmation of his death and no chronicle mentions it; no notice of his funeral or burial. He left no will and there’s nothing to tell us what happened to his estate. He didn’t even leave any manuscripts. How could this be? What if he was murdered? What if he and his writings had become politically inconvenient in the seismic social shift that occurred with the overthrow of the liberal Richard II by the reactionary, oppressive regime of Henry IV. Would the dogs of suppression, unleashed by Archbishop Arundel, have been snapping at the heels of a dangerous poet? Terry Jones’ hypothesis is the introduction to a reading of Chaucer’s writings as evidence that might be held against him, interwoven with a portrait of one of the most turbulent periods in English history, its politics and its personalities. In the end, though, I did end up pressing the point and asking him if he had a pick for an underrated film or series from his solo career, and he went with “The Wind in the Willows.” I’d have to agree with him, on the matter, and not just because it’s included in this equally underrated piece which I recently contributed to Bullz-Eye: To get to the piece, you can click on the image or, if that’s too much trouble for you, then you can click right here. If you have any further questions…well, look, I didn’t expect a kind of Spanish Inquisition!
s3://commoncrawl/crawl-data/CC-MAIN-2021-49/segments/1637964358842.4/warc/CC-MAIN-20211129194957-20211129224957-00328.warc.gz
CC-MAIN-2021-49
4,976
11
https://www.ironinahariya.com/pluralsight-review/pluralsight-core-vs-expanded-library/
code
Pluralsight Core Vs Expanded Library When it involves on the internet discovering in the tech area, Pluralsight is one of the most prominent systems out there for finding programs throughout a number of classifications. And also as we’ll discuss in the Pluralsight review below, its popularity amongst technology specialists has definitely been made. You know that staying current on the most recent technology is necessary to your success if you are an IT professional. You additionally know that this can be tough, specifically if you do not have the moment or cash to participate in expensive training programs. That’s where Pluralsight comes in. With its large collection of courses on whatever from programming to networking, Pluralsight is perfect for any individual that wishes to remain ahead of the contour in the technology globe. This Pluralsight review covers whatever you need to find out about this amazing platform. It’s a total guide to Pluralsight’s courses, rates, instructors, and also more! What is Pluralsight? Pluralsight is an on the internet learning system that offers programs in various disciplines with a certain concentrate on technology skills. Today, Pluralsight has more than 7,000 courses in its brochure, covering every little thing from shows and also internet growth to service and also creative skills. With a goal to democratize modern technology abilities, Pluralsight offers members with the devices they require to remain ahead of the contour in an ever-changing world. Pluralsight likewise provides a selection of attributes to assist students remain on track, including training course certifications, progress monitoring, as well as course referrals. Furthermore, Pluralsight provides a costs registration that offers customers accessibility to special content and also functions, such as offline watching and Pluralsight intelligence. Whether you’re just looking or beginning to clean up on your abilities, Pluralsight is a terrific resource for finding out brand-new things. Visit this site to try Pluralsight complimentary for 10 days. Who Teaches on Pluralsight? It’s a very crucial concern that everybody asks. If the teaching has integrity, people desire to recognize. It most certainly does when it comes to Pluralsight and its instructors. Pluralsight is distinct because every one of its training courses are taught by professional trainers that are leaders in their respective areas. Therefore, Pluralsight trainees can be certain that they get the most up to date and most precise information feasible. The teachers on Pluralsight are carefully selected for their experience as well as ability to engage as well as educate learners. In addition, Pluralsight offers numerous means for teachers to customize their courses, ensuring that each training course is tailored to the trainee’s needs. Likewise, Pluralsight supplies both live and taped courses so that students can select the knowing style that ideal fits them. Pluralsight also gives additional sources to aid learners do well, consisting of: - Professional tips - Program Discounts - Exceptional Support System - An energetic area online forum Millions of students globally trust Pluralsight as a source of high-quality, expert-led guideline! It’s additionally changing the way people find out globally, and it’s swiftly coming to be the best place for everybody trying to enhance their skills. What Can You Learn on Pluralsight? pluralsight training courses Finding out a new skill isn’t hard as long as you have a excellent platform like Pluralsight. And also, because Pluralsight is always including brand-new programs, you’re certain to discover something that’s right for you. Pluralsight’s impressive attributes make discovering easy as well as enjoyable, such as training course referrals, interactive workouts, and expert trainers. Several of the course classifications you can explore on Pluralsight consist of: - Design & building - Service expert - Imaginative professional - Information professional - IT ops - Manufacturing & design - Info & cyber protection - Software advancement - Web growth With over 7,000 training courses readily available, Pluralsight has a program for everyone, from those simply beginning their careers to those aiming to keep their skills present. Pluralsight gives skills assessments as well as a profession path tool to assist learners recognize which programs will certainly help them reach their profession goals. They are additionally among the largest on-line training service providers. Click here to attempt Pluralsight free for 10 days. How Much Does Pluralsight Cost? Pluralsight rates depends on the type of membership that you choose. Here’s a fundamental introduction of the Pluralsight plans: The Standard Package costs $29 each month. If you choose to pay every year, it will certainly assist you conserve as much as 14%, as well as the cost you will have to pay would be $299. Premium Package costs $45 monthly, or an yearly membership would certainly be $449. Beginner: $33.25/ month. Expert: $48.25/ month. Enterprise: $64.91/ month. Pluralsight also supplies wonderful price cuts for trainees and instructors . Additionally, Pluralsight gives extraordinary price cuts on team packages for yearly subscriptions. Pluralsight Free Trial Details. Pluralsight does include a totally free trial, which allows you to access all of the programs for 10 days. During the trial period, you can access 200 minutes of Pluralsight content. If you make a decision to cancel your registration within the 10-day trial duration, you will not be charged. Nonetheless, if you do not terminate your membership within the 10-day trial period, you will be automatically charged for the yearly or monthly registration, relying on which choice you pick. Click on this link to try Pluralsight totally free for 10 days. How does Pluralsight Pricing Compare to Other Platforms? Pluralsight is one of one of the most prominent on-line learning platforms worldwide, and also what truly establishes it apart from other platforms is its big focus on technology learning. Yet just how does the price of Pluralsight contrast to various other prominent online understanding systems? Let’s contrast:. - LinkedIn Learning pricing– $29.99 for month-to-month or $240 for an yearly subscription. - Masterclass prices– $180-$ 276 a year, no monthly strategies readily available. - Coursera pricing– $59 a month or $399 a year for a Coursera Plus subscription. - Skillshare prices– $167.88 annually, which exercises to $13.99/ month balanced out. Additionally, Pluralsight supplies both private as well as business plans, making it a flexible choice for individual as well as specialist advancement. This makes Pluralsight an perfect system for those who want to get functional experience and academic knowledge. Generally, Pluralsight is a detailed as well as user-friendly knowing system ideal for people and companies at cost effective prices. Visit this site to try Pluralsight totally free for 10 days. Exactly How Does Pluralsight Work? Pluralsight is transforming the way individuals learn and is aiding to make the world a better place for everybody. Students can register for Pluralsight courses through the web site and access the product at their own rate. Pluralsight training courses are divided into modules, and each component has a collection of video lessons as well as quizzes. Pupils can view the video lessons as often times as they desire as well as take the tests as often times as they require to master the material. Pluralsight likewise supplies a certificate of completion for every training course. With its adaptable learning style as well as expert-led training courses, Pluralsight is a wonderful means to gain new abilities or improve existing ones. Just how to register for Pluralsight. Registering for Pluralsight is very easy and only takes a few mins. Go to the Pluralsight website and also produce an account. You can browse the Pluralsight library and also select the courses you desire to take once you have an account. You can additionally look for particular programs by key phrase or filter by topic. When you locate a course you intend to take, click the “Sign Up” switch. You will certainly after that be motivated to enter your settlement info. Pluralsight supplies a variety of payment choices, consisting of credit card, PayPal, etc! You will be able to access your program immediately as soon as you have actually picked a payment approach. Pluralsight likewise supplies a complimentary trial to ensure that you can try their system before committing to a paid registration. So why wait? Register for Pluralsight today as well as begin discovering something brand-new! Go here to try Pluralsight totally free for 10 days. How to take Pluralsight programs. Pluralsight training courses are a great method to learn brand-new abilities as well as improve existing ones. Below’s just how to get going:. Develop a Pluralsight account. You can do this by going to their website and also clicking the “Sign Up” button. Enter your information and click the “Create My Account” switch. As soon as you have an account, you can check out the programs that Pluralsight supplies. Type the subject’s name right into the search bar to locate a course that fascinates you. For example, if you’re interested in learning more about internet growth, you would type “Web Development” into the search bar. When you’ve found a program you would certainly like to take, click the “Enroll Now” switch. Pluralsight will after that ask you to validate your registration. As soon as you’ve confirmed your registration, Pluralsight will add the training course to your account, and also you can start taking it promptly. Pluralsight programs are self-paced, meaning you can resolve them at your speed. They are also hands-on, with plenty of chances to exercise what you’re learning. They are made by sector professionals, so you can be certain you’re getting the newest as well as greatest info. Whether you’re wanting to learn new coding skills or review your Photoshop techniques, Pluralsight has a program. So check them out today and see exactly how very easy it is to discover something brand-new. Pluralsight Features Explained. Training courses are expert-led and focus on useful abilities. Pluralsight is a excellent source for those aiming to learn brand-new functional abilities. The courses are expert-led and focus on giving individuals the skills they need to do well in their field. Pluralsight also provides a selection of various other attributes, such as the capacity to produce personalized programs as well as tests that make it an vital source for anyone aiming to improve their ability. Pluralsight is a excellent resource for those looking to enhance their functional skills. A variety of repayment alternatives are offered. The most effective aspect of Pluralsight is that it offers a selection of payment choices to fit any spending plan. You can pay by the month, year, or even acquire a lifetime membership. Pluralsight also uses discount rates for teachers and also trainees ! Payment Options Include. Whether you’re wanting to discover coding, internet growth, or anything in between, Pluralsight is a great option– and with its flexible payment options, there’s no reason not to give it a try! Certificate of conclusion for each and every training course. Pluralsight additionally supplies a certification of completion for each course, separating it from various other online education and learning systems. This can be really valuable in developing your resume as well as showing your abilities to prospective companies. Pluralsight is devoted to assisting people learn new skills as well as grow their occupations, and the company’s mission is to make premium education and learning available to everybody. For any individual aiming to enhance their abilities or discover something brand-new, Pluralsight is a great choice. Gain brand-new skills or boost existing ones. Pluralsight is a terrific means to get new skills or enhance existing ones! It supplies tons of training courses on various subjects to learn what you need to recognize for your work or your personal life. Pluralsight’s training courses are instructed by professionals that are passionate regarding their fields and understand how to involve their students. So learning a new skill with Pluralsight becomes a piece of cake! Learn at your own pace. Pluralsight has the advantage of enabling you to learn at your own speed. It has a variety certainly offered, so you can always locate something intriguing. As well as if you’re not exactly sure concerning a particular program, Pluralsight offers totally free trials to try it prior to you purchase. It additionally has constant learning paths to track your development and measure your effectiveness in details abilities. Whether an professional or a beginner , Pluralsight has something for everybody! Why not try Pluralsight today and see just how far you can go? Free test readily available. Pluralsight gives several attributes to its users, one of the most popular being the complimentary test. With the Pluralsight cost-free test, individuals can access all of the website’s training courses and also discover Pluralsight at their leisure. The Pluralsight free test is especially helpful for those new to the website as well as who would like to know just how it works before devoting to a paid registration. Pluralsight has various other attributes, including course scores and evaluations, which can aid individuals make educated decisions regarding which programs to take. What are you waiting for? Sign up for Pluralsight today! With its expert-led training courses and adaptable learning style, Pluralsight is the ideal system for IT specialists. Pluralsight’s ideal function is its gadget support. Pluralsight can be accessed on any device with an net link, consisting of smart devices, tablet computers, and laptop computers . This makes it very easy to find out new abilities while on the go. Pluralsight additionally has offline viewing, so you can continue learning even if you do not have an internet connection. And also, Pluralsight uses a 10-day complimentary test, so you can try the system prior to devoting to a registration. With numerous advantages, it’s no surprise Pluralsight is among the leading online learning platforms. Ultimately, Pluralsight’s numerous offerings give possibilities for people of all histories to establish brand-new abilities and progress their professions. A fantastic feature of Pluralsight is its community. Pluralsight has a neighborhood of developers that share their understanding and experience with others. The area is constantly going to assist address inquiries, supply comments, and also work together on projects. Pluralsight likewise offers a online forum for programmers to share their code tutorials, snippets, and also collections . Pluralsight is an invaluable resource for developers wanting to improve their abilities or learn new technologies. A major attribute of Pluralsight’s user interface is its quality. The Pluralsight user interface is modern as well as tidy , and simple to navigate. Pluralsight programs are arranged into modules, and each module is divided right into lessons. The Pluralsight user interface makes it simple to locate the programs you require as well as track your progress. Pluralsight also provides a range of ways to discover, including video-based courses, write-ups, as well as tests. You can also earn badges and certificates as you total Pluralsight training courses. Visit this site to attempt Pluralsight totally free for 10 days. Pluralsight Review FAQs. Is Pluralsight Expensive? While it is true that Pluralsight’s programs are not cost-free, they are still extremely economical compared to various other on the internet education and learning platforms. Additionally, Pluralsight often runs promotions and price cuts , making their programs much more cost effective. Hence, Pluralsight programs aren’t as well costly as well as are extremely cost effective. What is the function of Pluralsight? Pluralsight is a technology discovering platform that helps companies shut the abilities gap and maintain their workforce appropriate in an ever-changing market. Pluralsight supplies on the internet courses instructed by expert teachers, enabling trainees to discover brand-new skills at their own speed. Which one is much better: Udemy or Pluralsight? There are several alternatives available for on-line knowing, as well as it can be hard to select the ideal system for your demands. 2 of one of the most prominent systems are Udemy as well as Pluralsight. Both platforms use a large range certainly, yet there are some essential differences in between them. Pluralsight focuses specifically on tech-related subjects, while Udemy provides a extra varied choice obviously. Pluralsight additionally offers a broader range of attributes, consisting of the capability to customize your understanding experience to your certain objectives. Is Pluralsight Worth It? Pluralsight is certainly worth your time, particularly if you’re a technology specialist (or wish to become one) wanting to upskill. It is an online education and learning system that provides programs in various subjects, including programming, style, service, and also much more. Pluralsight is a fantastic source for anyone seeking to improve their skills or learn brand-new ones. The training courses are properly designed and give a great deal of details. They are likewise reasonably valued as well as featured a money-back warranty. Pluralsight training courses are a great investment for any person seeking to boost their abilities. While Pluralsight is not a standard college, it can still be a important source for job growth. The courses provided on Pluralsight cover a range of subjects that can benefit professionals in any type of field. For example, Pluralsight offers programs on task monitoring, web advancement, and also graphic layout. Additionally, Pluralsight also provides courses on soft skills such as leadership and interaction. By making use of the resources used by Pluralsight, you can get the skills and also understanding you require to be successful in your profession. In general, Pluralsight is a extensive as well as inexpensive online knowing system ideal for both beginners and experienced students. Get going with Pluralsight. Utilizing Pluralsight, you can create the abilities you require to advance in your career or modification industries. And also best of all, Pluralsight supplies a cost-free test so you can try out the platform and also see if it’s right for you. So why not get going today? With Pluralsight, you can find out at your own rate and also schedule. And also, Pluralsight training courses are created by industry professionals, so you know you’re obtaining top notch guideline. Visit this site to attempt Pluralsight cost-free for 10 days. When it comes to Pluralsight and also its teachers, it most certainly does. Pluralsight uses a range of payment choices, including credit rating card, PayPal, etc! Pluralsight training courses are self-paced, meaning you can work with them at your speed. Pluralsight is an important source for developers looking to boost their abilities or learn new innovations.
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224643663.27/warc/CC-MAIN-20230528083025-20230528113025-00710.warc.gz
CC-MAIN-2023-23
19,537
133
https://forum.audacityteam.org/t/no-sound-in-mp3-export-from-audacity/32217
code
I made a voice recording in Audacity 2.0.3 (dmg installer), amplified it a bit, and the audio sounded fine. Then I exported it as an MP3 file, and there’s no sound in the MP3 playback. I’ve done this dozens of times and have never had a problem before. Would you have any idea what’s causing this? Thank you. The current Audacity version is 2.0.5: http://audacityteam.org/download/mac . Where are you playing the MP3 where it has no sound? If you used a USB recording device, unplug it from the computer. You can check Mac audio settings in the “Sound” system preferences.
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224650409.64/warc/CC-MAIN-20230604225057-20230605015057-00361.warc.gz
CC-MAIN-2023-23
582
5
https://www.ranosys.com/blog/news-event/microsoft-sharepoint-ranosys-at-microsoft-ignite/
code
This event has been called off due to Corona Virus. We’ll be happy to connect with you in the upcoming events. Ranosys is glad to announce that we will be joining the most comprehensive technology conference of the year – Microsoft Ignite in Singapore, on 20-21 Feb 2020. Microsoft Ignite The Tour is a series of events targeting 30 markets around the world and featuring more than 100 workshops and breakout sessions, 350+ experts, and more than 25,000 individuals focused on software architecture, development, security, and IT. The event will be a great opportunity for team Ranosys to explore the latest trends in the areas of cloud, security and hybrid infrastructure, connect with technical communities and Microsoft experts, and learn new ways to solve customer pain points in the digital realm. Ranosys, a pioneer Microsoft SharePoint development company based out in Singapore, is driving digital transformation with unparalleled SharePoint services. Ranosys has a skilled team of SharePoint developers with comprehensive experience in implementing SharePoint solutions for global clients.
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947476211.69/warc/CC-MAIN-20240303075134-20240303105134-00761.warc.gz
CC-MAIN-2024-10
1,102
5
https://www.alibabacloud.com/en/developer/a/ecs/interpretation-four-major-game-architectures?_p_lc=1
code
Interpretation of the four major game architectures 01 Introduction to Game Industry Scenarios Currently, various scenarios in the game industry are inextricably linked to industry development. Briefly review the development of electronic games, including black and white consoles in the 1980s, PC stand-alone games in the 1990s, and online games that became popular with the development of the Internet in the early 2000s. After 2010, with the gradual popularization of mobile devices, mobile games began to rise in China. The main differences from game terminals are: console games (often 3A games), PC games, mobile games, and web games. Currently, there is a trend towards cross platform, multi terminal games, and cloud gaming. There are many dimensions of game category differences: RPG (role playing), MOBA (competitive), FPS (shooting), leisure, card, chess, SLG (strategy), and so on. There is currently a trend towards multi category fusion and fission of play methods. In recent years, due to factors such as domestic addiction prevention and version number, more and more high-quality games have emerged in the game industry. Globalization and even regionalization have led to a slowdown in the growth of overall stock users. The operation methods such as long-term operation, fine operation, and private community are also quietly changing. 02 Introduction to the Technical Architecture of the Game Industry The technical architecture of different business scenarios varies, such as the computing requirements of competitive games and card games, and the architecture of cloud games and regular online games is also different. Here is a brief introduction to its architecture from four currently common scenarios: game servers and game platforms, big data, and cloud games. 1. Game Clothing Architecture and Product Practice Game clothing, from the perspective of game types, includes RPG, FPS, MOBA, SLG, chess, leisure, and so on; From the perspective of game platforms, there are usually consoles, mobile phones, PCs, etc; From the perspective of business issuance, there are global, domestic, and overseas deployments, and from the perspective of deployment architecture, there are centralized deployment and zoning deployment; From the perspective of technical architecture, the game industry also has a trend of gradual hierarchical decoupling, but compared to Internet applications, it has certain uniqueness. Due to the strong interactive characteristics of games, the game technology architecture has certain uniqueness compared to other Internet applications. Games need to maintain a session connection, that is, a long connection from a client to a server, facilitating timely feedback on the operations and behaviors of players in the client and pushing them to other players in a common game or game. Therefore, games are generally more sensitive to network quality, and poor network quality can cause long connections to be disconnected or reconnected, causing players to drop lines. Games also need to maintain a conversational state, as the server maintains a copy of the player's entity. When the player performs operations, the next communication data will rely on the previous communication data. This is also one of the reasons why some MMO (multi player online) large-scale games require high network throughput performance. Another example is multiplayer warfare games such as FPS and MOBA, which are more interactive, have lower tolerance for network latency, and require low latency. Because games require a relatively high density of recording player operations and results, they are characterized by frequent data writes, and such scenarios require strong IO performance. Due to the strong interactivity and low latency characteristics of games, their technical architecture is also different from Internet applications. While gradually layering and decoupling, it is necessary to ensure the interaction effect of game players, and also rely on the computing power of the underlying server. These are common features of game scenarios: long connection retention sessions, state retention, low latency networks, high IO throughput, and high computing performance. The deployment architecture of a game will be based on the characteristics of the game business and the operational needs of the game to develop game services. There are divided service and regional full service business logic, and the biggest architectural difference is whether the data is a set. From the perspective of deployment methods, there are mainly centralized deployment and subregional deployment. Centralized deployment means that no matter where the game player is, the game services are concentrated in a single area, which is suitable for game types that generally do not require high network latency, such as leisure games; Partition deployment refers to the deployment of game servers in different regions based on the geographical distribution of game players, which facilitates access to nearby games. It is suitable for game types that require high network latency, such as MOBA and FPS. I. Introduction to MMORPG game architecture The MMO class has a high concurrency characteristic, and the high computational load concurrent by a large number of players requires extremely high computing power and stability of the server. At the same time, MMO games have strong PVE or PVP characteristics, and have a low tolerance for network latency. The gateway server is responsible for forwarding all network data packets, usually at points where network load is concentrated, and has a high requirement for network throughput. A single game zone carries a high number of players, and the logical server is usually divided according to the scene map, and the scale can be achieved through zoning. The data center server is responsible for caching player data and asynchronously storing it into the database, ensuring that player customers can quickly obtain and write data. It has high availability requirements and needs to cooperate with the application layer to implement a data fault tolerance mechanism. The log server bears the pressure of log collection and processing for all business activities in the region, and has high requirements for disk write performance. It is usually implemented by grouping multiple servers. Elastic computing product recommendations: (1) MMO game server performance and stability requirements. It is recommended to use the latest 7th generation ECS instance. According to actual needs, select the c computing type (CPU memory ratio 1:2)/g general-purpose type (1:4)/r memory type (1:8). Intel Ice Lake 2.9GHz baseband 3.5GHz RF provides ultra-high performance, which can better optimize the game experience. (2) For scenarios where asynchronous storage and log servers require high disk read and write performance, it is recommended to use ESSD PL 0/1/2/3 on the cloud based on business performance needs to avoid disk read and write bottlenecks. (3) In the daily version update of the game, it is necessary to quickly replicate images from various regions. Based on the ability of ESSD snapshots to replicate remotely, it can improve the efficiency of image replication. (4) Scenarios such as partitioned and distributed services often require rapid service opening and rolling. Using cloud O&M tools such as CADT cloud hosting, ESS elastic scaling, OOS O&M orchestration, and ROS resource orchestration with products can improve cloud O&M efficiency. Ii. Introduction to FPS and MOBA game architectures MOBA games mainly include several main parts, such as PVP system, PVE system, and game platform. PVP combat is the core of MOBA/FPS games. PVP, PVE, and game platform functions are deployed in the same VPC, forming the game area; Combat servers are (often) deployed separately across regions. The game client first accesses the login server to complete game platform logic such as login authentication and billing. To avoid single point issues, game platform services often require highly available solutions. High availability solutions on the cloud, including convenient operation and maintenance tools, can be utilized to meet business high availability requirements. FPS/MOBA competitive games are often particularly sensitive to delays. It can be imagined that in competitive games, gamers manipulate characters, walk leisurely on the map, and gunfire is dense. Each bullet is a vector calculation of time and space, and the calculation needs to be completed in the main process. As the number of players in the room increases, the computational power demand will explode exponentially, A 5V5 room and a large room with 100 people (eating chicken) have completely different demands on computational power. For this part of the game's recalculation scenario, it is recommended to use AliCloud's 7-generation high frequency or 7-generation instances, with higher single core performance providing better combat effectiveness. Battle room games, due to the peak and valley characteristics of the business itself and the flexibility of using resources on the cloud, often better optimize the overall resource usage cost. Alibaba Cloud elastic computing itself provides very flexible payment methods, including regular on-demand instances, monthly and yearly subscription instances, and offsetting on-demand instance resources by saving plans/reserving instance vouchers. This allows for flexible use of resources while achieving better costs. In addition, in order to further release the efficiency of development, operation, and maintenance, some current games also adopt a container technology architecture. Alibaba Cloud's ACK+ECS/ECI elastic container instances are used in combination, further releasing the flexibility and flexibility of basic resources. 2. Game platform The main services provided by game platforms (not limited to FPS and MOBA) include: official website, customer service, registration, login, recharge, exchange, shopping mall, push, announcement, community, SDK, email, SMS, and other public services; It includes basic services required by businesses such as content review, video recording, bullet screen, transcoding, editing, and RTC, as well as platform services such as operation and maintenance monitoring, publishing platforms, and testing platforms. This part is closer to the general Internet technology architecture, with service granularity decoupling, access ->gateway ->application ->database. This often requires building a highly available infrastructure to improve stability, and business emergencies often require a certain degree of resilience. Compared to game services, containerization is more popular, and it is easier to cope with peak traffic scenarios through cloud based, such as elastic container instances. In video recording scenarios, when real-time requirements are high, they are often built based on GPU capabilities. Alibaba Cloud also provides vGPU/cGPU capabilities to release GPU flexibility. 3. Big Data Architecture and Product Practice The business performance of the entire game lifecycle, user retention, business transformation, including game play strategies, are all business support data that game manufacturers pay close attention to. Big data is the main technical means for current game business operations and game operations, mainly targeting platform data operations, game data analysis, advertising transformation analysis, security operation analysis, and other core game operation scenarios. Different scenarios have different requirements for real-time performance. Real-time query and retrieval typically involve business analysis, customer acceptance, player monitoring, and online scenarios; Offline reports are typically scenarios such as player behavior analysis, user portraits, and feature mining. In general, real-time business is more of a business query type and a simple calculation type task, such as analysis of purchase volume conversion; Offline tasks are basically analysis and prediction tasks, such as game play analysis. From the perspective of technical architecture, thanks to the high richness of the open source community technology stack, there are many specific technology options for big data. As a whole, concepts such as data warehouse, data lake, and even lake warehouse integration have emerged from the integration of storage and computing to the separation of storage and computing. From the perspective of data architecture process, from data source ->data collection, transmission ->data calculation, storage ->data application, the optional technical solutions also need to be tailored to local conditions. From the perspective of deployment architecture, different game companies are at different stages of data construction and have different choices, including fully self built, cloud based self built big data, cloud based hosting, and using more mature product technologies on the cloud to enrich the overall big data capability set. The latter has also become the choice of more and more customers. Take the cloud based big data solution for example, for example, in the real-time computing section, select SLS acquisition and Kafka data gateway channels, perform data calculation through Flink, perform data analysis through ES or CK, and perform data application demonstration through ADB and QuickBI. The offline solution uses OSS for cold data storage, Spark, Hive, HDFS, and other components for data calculation and storage, CK aggregation analysis, and Dataworks for data applications. The specific selection of computing storage products is mainly based on different business characteristics and big data application characteristics, and is selected based on data capacity, IOPS, throughput, read/write characteristics, and cost performance. For example, in the real-time computing/near real-time computing scenario just illustrated, Flink has the characteristics of high performance and low latency, so it is a computationally intensive and high network performance scenario. It is recommended to select a 7-generation ECS instance or a 6-generation enhanced instance; If HDFS requires large storage capacity and high throughput, D-series local disk instances, such as D2S storage local disk instances, are recommended. For scenarios with multiple processing results such as Remote Shuffle Service, where read and write processing is frequent, such as a large number of join calculations, it is necessary to comprehensively consider computing, network, storage performance, and comprehensive costs to select a generic instance (such as the 7th generation ECS instance) or an i-series local disk instance. Therefore, for the final selection of resources on the cloud, in the early stage of meeting the performance requirements, it is necessary to evaluate whether the cost of transmitting data through the network is high (cloud disk) or the cost of computing using local materials is high (local disk). Different models and levels of selection differ. From memory processing (with the highest cost, the best performance, and the smallest storage capacity), SSD local disks, HDD local disks, ESSD cloud disks, and OSS object storage (with the best cost, the average performance, and the largest storage capacity), gradual hierarchical decoupling also brings a benefit: it fully releases the ability of elasticity on the cloud, allowing you to use more lightweight elastic computing products (such as SPOT preemptive instance mode, or ECI container instances) for big data computing, Achieving better flexibility to meet business needs can also save more costs. 4. Cloud Game Architecture and Product Practice Since ONLIVE proposed the concept and products of cloud games in 2009, cloud games have survived a technological cycle. Especially in the past two years, we can also see more and more companies paying attention to cloud games and investing in them. The platform is based on streaming capabilities and drives game operation in the form of video streaming, enabling users to enjoy higher quality game products at low cost. It also covers terminal scenarios such as PC, mobile, and TV based on the actual needs of cloud games. Cloud games are mainly divided into terminal and cloud games. Terminal devices based on operating systems such as Windows, iOS, and Linux include mobile phones, tablets, computers, televisions, and VR all-in-one machines. The cloud architecture mainly includes game application layer, cloud game platform layer, and IaaS basic resource layer. The application layer includes PC games, mobile games, VR games, H5 games, and other types of game applications; Platform: The necessary operation platform, support platform, streaming technology platform, etc. for layered cloud games; The IaaS basic resource layer includes the basic network, GPU servers based on the X86 architecture, and ARM architecture. The landing of cloud games has also experienced many technical challenges. To meet end-to-end high-performance and low latency, network scheduling, instruction streaming, codec, and multi terminal SDK adaptation are inevitable technical issues in cloud game scenarios. For cloud computing, Alibaba Cloud solves cloud rendering, streaming, and codec issues, and meets the needs of cloud mobile games, end games, VR, and even enterprise level visual rendering scenarios through a full range of GPU products. In summary, Alibaba Cloud elastic computing helps game customers provide better performance experiences to cloud game players through a comprehensive set of technologies such as streaming, encoding acceleration, and rendering acceleration on the cloud. Based on Alibaba Cloud's global data center, it can help cloud game customers cover more users. Through the multiple product forms and overall elastic capabilities of GPU, it also helps game customers build their cloud game business more quickly and flexibly. 03 Summary of practical experience Through years of technology accumulation and continuous operation, Alibaba Cloud has provided large-scale infrastructure cloud services. Currently, Alibaba Cloud has deployed 26 regions and 82 availability zones worldwide. Through excellent and stable performance, Alibaba Cloud helps game customers run their game business efficiently and stably, provides players with an extremely smooth gaming experience, and continuously helps game customers optimize cloud cost through technical means. "Domestic business and game shipping is also one of the major trends at this stage, and many game companies have turned shipping from a business option into a mandatory option.". In March 2022, Alibaba Cloud launched two major regions, South Korea and Thailand, which can provide a smoother and more stable gaming experience for localized gaming businesses. We hope to provide more help in the business areas where gaming customers go to sea. Of course, as the intersection of the two hot areas of content and technology, the gaming industry is changing rapidly, and the architecture is constantly changing with the needs of front-end business. Alibaba Cloud elastic computing has also launched different cloud server types and payment methods, as well as cloud operation and maintenance kits, aiming at different architectures of game manufacturers, to help customers reduce costs and increase efficiency. In the future, Alibaba Cloud will continue to pay high attention to the gaming industry, always providing a solid, stable, and convenient infrastructure for the industry, and jointly promoting the healthy development of the gaming industry. Knowledge Base Team Knowledge Base Team Knowledge Base Team Knowledge Base Team Explore More Special Offers 50,000 email package starts as low as USD 1.99, 120 short messages start at only USD 1.00
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296818337.62/warc/CC-MAIN-20240422175900-20240422205900-00180.warc.gz
CC-MAIN-2024-18
19,820
65
https://link.springer.com/video/segment/10.1007%2F978-1-4842-4883-6_6
code
Controlling RGB LEDs - Digital Try reloading this page, or reviewing your browser settings This segment goes thru how a photo resistor works, the process of building a circuit with a photo resistor and how to use it to control an LED. Data is also written to the Serial Plotter in the Arduino IDE to graph data. - photo resistor - light sensitivity About this video - Liz Clark - First online - 09 April 2019 - Online ISBN - Copyright information - © Liz Clark 2019 In this section, we’ll continue looking at analog input– this time, of the photoresistor. To follow along, you’ll need the supplies we’ve used so far shown here, as well as at least one photo resistor and a 10k Ohm resistor. Let’s get started. We can use another simple component to explore analog conceptual Arduino called a photo resistor. A photo resistor, also commonly referred to as a light-dependent resistor, or LDR, is a type of resistor whose resistance is variable depending on the amount of light that it’s exposed to. This means that you can build circuits whose behavior can vary depending on the amount of light available. Let’s use a photo resistor to control the brightness of an LED. First, let’s build the circuit. We’re going to build an LED circuit as we have in previous projects, attaching the anode to digital pin 9. The photoresistor portion of the circuit will require a 10k resistor, which can be identified with the color code brown, black, orange. This is the same value resistor that we used in the push button segment. First, insert the photoresistor into the breadboard and attach one leg to the 5 volt rail. Next, attach the remaining leg to the ground rail with a 10k resistor. Then, connect the same leg that is connected to ground to analog pin 0. Basically, one side of the photoresistor is connected to 5 volt power, and the other side is connected to both ground and the analog pin with a 10k resistor. Adding this 10k resistor creates what is called a voltage divider. A voltage divider does exactly what it sounds like– divides the voltage in the circuit. In this case, it’s dividing the 5 volt signal between the 10k Ohm resistor and the photoresistor. Since the photo resistor’s resistance is variable, the division of the 5 volt signal between both the photoresistor and 10k Ohm resistor will vary as well. The difference between the two resistances is what is sent to the Arduino as an analog value, and what, in turn, is affecting the LED’s brightness. Now, we’re going to move to the Arduino IDE to write our code. First, we’ll set up our pins to be integers, with integer LED equals 9 and integer photo equals A0. Then, moving onto the setup, we’ll set the pin mode for the LED to be in output with pin mode, LED, output. We can now move to the loop and basically repeat our first piece of code for when we’re working with potentiometers in our last segment. First, we’re going to create another integer called Val, and have it equal analog read photo. Then, as before, we’re going to map the analog value range to the digital PWN value range with the line Val equals map, Val, 0, 1023, 0, 255. We can finish the loop by sending an analog value to the LED with analog right LED Val, just like we did with our potentiometer code. We can then compile and upload our code to the Arduino. Take your hand and experiment with blocking different amounts of light over the photoresistor. You should see the LED’s brightness be affected. If you want to really eliminate the amount of light that’s reaching the photoresistor, use something dark in color and dense, like a piece of plastic. Just as we’ve done in previous segments, we’re going to log our components’ data via serial to double-check our code. However, this time, there will be a bit of a twist. First, in our code setup, we’re going to open serial communication with serial.begin 9600. And then in our loop, we’re going to insert serial.println Val, just as we did in our potentiometer example. This time, though, instead of opening the serial monitor, we’re going to open the serial plotter. Compile and upload the code to the Arduino, and then go to tools, serial plotter, located directly underneath the serial monitor. As you can see, the plotter has a much different look than the monitor. It allows for real-time data visualization. In this case, it’s showing you the amount of light being absorbed by the photoresistor that is then translated to LED brightness. The plotter can also plot multiple lines of data in a single graph, which we’ll look at in our next segment In our current example, though, you should see the plotter’s data correspond to both the amount of light you’re allowing to reach the photo resistor and the LED’s brightness. The plotter tends to present analog data in a much more pleasant way, and should be useful to you in future projects.
s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578528702.42/warc/CC-MAIN-20190420060931-20190420082931-00409.warc.gz
CC-MAIN-2019-18
4,903
23
https://webmasters.stackexchange.com/questions/119353/does-having-a-span-tag-around-a-portion-of-a-word-hurt-seo
code
If I do <h1>H<span style="font-size: 12px;">ello</span> W<span style="font-size: 12px;">orld</span></h1> - Will search engines read it as "Hello World"? - Will this hurt SEO? I am not doing any JS or anything else. I just want the other letters smaller. I know I should find a font called "Small Caps" - but for this font that I have does not exist. - What would you recommend in this case the best approach?
s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320303385.49/warc/CC-MAIN-20220121131830-20220121161830-00639.warc.gz
CC-MAIN-2022-05
408
6
https://bubble.dynalogix.eu/bubble-cloud-tile/
code
- Much improved tile performance (see details below) - Improved folder behaviour (see folders) - Corrected smaller custom theme related issues (see Version 9.65 relese notes for information on user saved themes) Many thanks to Elias Cabrera for valuable feedback and extensive testing on Fossil Gen5. - Removed unnecessary tile updates (track if anything related to the tile has changed since last update) - Defer tile update to avoid lag when accessing tiles (adjust delay under Watch:”Expert settings” or Phone:”More options”) Bubble Cloud tile Bubble Cloud settings tile Tile to open the Bubble Cloud app drawer Add bubbles directly to the Bubble Cloud tile Tile for Favorites cloud Bubble Cloud tiles became much much easier to set up! Simply add the “Favorites” tile, and it will contain your favorite bubbles.
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947476396.49/warc/CC-MAIN-20240303142747-20240303172747-00158.warc.gz
CC-MAIN-2024-10
827
12
http://oceanroamers.biz/myblog/categories/dtwc?start=30
code
Ahead of his talk at Generate London on 21 September we caught up with Patrick Hamann , a web performance engineer at Fastly , who is on a mission to build a faster web for all. What does your role ... Original link My alter ego as a web-developer ;) #DTWC - DiveTheWebCreations View my Flipboard Magazine.
s3://commoncrawl/crawl-data/CC-MAIN-2017-47/segments/1510934806832.87/warc/CC-MAIN-20171123123458-20171123143458-00367.warc.gz
CC-MAIN-2017-47
306
3
http://www.indietalk.com/showthread.php?t=32147
code
My name is Gilles Perez and I am independently producing a documentary about what it takes to start and maintain a successful career in Hollywood.. I'm holding a fundraising campaign on Indiegogo.com and need your help ! Even $1 donations help because they shows that people are interested in my film.. There are some very cool perks too for the higher contributions, so check out the link: If you can't or don't want to donate money, please contribute by posting this on your Facebook wall, Tweeting it or emailing this to your contacts!!
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368702444272/warc/CC-MAIN-20130516110724-00031-ip-10-60-113-184.ec2.internal.warc.gz
CC-MAIN-2013-20
539
6
http://www.kongregate.com/accounts/stingo1/comments
code
Is it me or does raising the luck of the crew do nothing? Every time I send people on a mission, they all come back injured even though I upgraded the heck out of luck. I'd figure at least a few would start coming back unharmed out of 75 after the first 12 planets. Saw energy. Quit playing immediately. I'm not trying to be mean by saying this but that kills a game for me. If I sit down to pay a game, I want to play as long as I want, not as long as the game will let me. I tried playing this several months ago. The same problem exists. The keyboard does not respond. One WSAD key may work for a bit but that's all. It's a shame it's not fixed yet. I know it's not my computer since I've completely reloaded my hard drive.
s3://commoncrawl/crawl-data/CC-MAIN-2016-18/segments/1461861623301.66/warc/CC-MAIN-20160428164023-00194-ip-10-239-7-51.ec2.internal.warc.gz
CC-MAIN-2016-18
726
3
https://events.cornell.edu/event/cam_colloquium_nate_veldt_cam_postdoc_-_detecting_and_learning_community_structure_in_graphs_with_lambdacc
code
During the spring semester, in-person concerts, events and lectures that involve outside guests will not be held, per the university’s COVID-19 travel and visitor policy. This is a past event. Its details are archived for historical purposes. The contact information may no longer be valid. Please visit our current events listings to look for similar events by title, location, or venue. Friday, September 20, 2019 at 3:30pm Graph clustering is the somewhat ill-defined task of separating a graph into so-called communities of nodes that share many edges with each other but few edges with the rest of the graph. But what do "many" and "few" mean in this context? We discuss several combinatorial objective functions for graph clustering, each of which strikes a different balance between finding clusters with (1) many internal edges and (2) few external edges. We then present a more flexible framework for graph clustering called LambdaCC, which detects different types of communities in a graph by varying a resolution parameter lambda. LambdaCC generalizes and interpolates between several previous clustering objective functions and comes with new approximation algorithms. We then outline a technique for learning how to set lambda in order to match different types of community structure that one might wish to detect in practice. Nate Veldt is a postdoctoral associate in the Center for Applied Math at Cornell University. He received his PhD from Purdue University, where he was advised by Professor David Gleich. Nate’s research is in algorithm design, optimization, and machine learning for network science.
s3://commoncrawl/crawl-data/CC-MAIN-2021-17/segments/1618039560245.87/warc/CC-MAIN-20210422013104-20210422043104-00202.warc.gz
CC-MAIN-2021-17
1,624
7
https://www.tr.freelancer.com/projects/xml-flash/flash-svg-editor/
code
This flash project shall be able to: * Read external XML file - The external XML file specifies the location of SVG file - Saving path - and other settings * Read SVG file - Some SVG file can contains multiple pages and different canvas size (small to big) - SVG file contains UTF-8 characters (Japanese) * Displays SVG file visually * User can edit SVG file visually - Edit canvas size, save into SVG file, edit text, edit text font, upload image, zoom in/out If any concern about this specification, please feel free to contact me. We can still change small features we will provide you all design files (.ai) for more detail, please see the attachment file. this SVG file is only used for physical print out purpose. user only can edit plain text and swap pictures. no fancy stuff like animation or linking. KINDLY LET ME KNOW YOUR UNDERSTANDING OF THE PROJECT AND TELL ME WHAT CAN YOU DO SPECIAL FOR THIS PROJECT THAT I CAN SELECT YOU FOR THE JOB?? if you can show us similar project, that would be great! 7 freelancer bu iş için ortalamada 1721$ teklif veriyor Hi, Willing to do this job. Having 5+ years of experience in RIA(Flex and Flash) Capable of doing any kind of project and able to give you rich look and feel to the application. Hope to get the project.
s3://commoncrawl/crawl-data/CC-MAIN-2017-47/segments/1510934807084.8/warc/CC-MAIN-20171124031941-20171124051941-00290.warc.gz
CC-MAIN-2017-47
1,270
22
https://fx-list.com/broker/amana-capital
code
Amana Capital group includes 5 related companies. Amana Capital UK - located in the United Kindom, regulated by the Financial Conduct Authority (FCA). Amana Capital CY - located in Cyprus, regulated by the Cyprus Securities and Exchange Commission (CySEC). Amana Capital UAE - located in the United Arab Emirates, regulated by the Dubai Financial Services Authority (DFSA). Amana Capital MY - located in Malaysia, regulated by the Labuan Financial Services Authority (LFSA). Amana Capital MU - located in Mauritius, regulated by the Financial Services Commission (FSC). Amana Capital LB - located in Lebanon, regulated by the Lebanese Capital Markets Authority (CMA). Be aware, UK and CY companies have some trading restrictions because of the European Securities and Markets Authority (ESMA) influence. Amana Capital group accepts clients from all over the world, excluding USA and some FATF sanctioned countries. Forex broker offers the following underlying assets for trading. |50+ Currency Pairs||Based on major and minor world currencies.| |4 Crypto Pairs||Based on Bitcoin, Ethereum, Litecoin and Ripple.| |7 Indice Cash CFDs||Based on baskets of different blue-chip stocks.| |6 Indice Futures||Based on baskets of different blue-chip stocks.| |2 Metal Spot CFDs||Based on Gold and Silver.| |2 Metal Futures||Based on Gold and Silver.| |2 Energy Spot CFDs||Based on Crude Oil (WTI, Brent).| |3 Energy Futures||Based on Crude Oil (WTI, Brent) and Natural Gas.| |6 Soft Futures||Based on Coffee, Cotton, Corn, Soybean, Sugar, Wheat.| |250+ Stock CFDs||Based on shares of US companies.|
s3://commoncrawl/crawl-data/CC-MAIN-2019-43/segments/1570986676227.57/warc/CC-MAIN-20191017200101-20191017223601-00192.warc.gz
CC-MAIN-2019-43
1,589
20
https://www.nova-credit.com/hrpost/data-scientist/
code
Business Analyst / Senior Business Analyst – Data Visualization • Conduct data visualization, research, and analysis • Use automated tools or development ETL programs to extract data from primary and secondary sources • Using statistical tools such as SAS or Python to perform data analytic tasks, including but not limited to predictive statistical models, customer profiling, segmentation analysis, data analysis and mining, and data enhancement • Extract and process data from data warehouses and other data marts to support data or analytic projects • Assist in preparing regular and customized business insights reports to monitor business performance and identify areas for improvement • Assist to prepare business proposal, project documents and product manuals • Bachelor/ Master Degree with solid numerical and statistical knowledge and skills • 1+ years of relevant working experience in ETL and MIS; Fresh graduate will also be considered • Have passion for using data to identify business challenges and opportunities that drive significant improvements • Enjoy working with big datasets • Sound communication and written skills in Chinese and English • Demonstrate self-motivation and a can-do attitude • Technical knowledge in SAS, R, Python, Tableau and Qlik Sense is an advantage Email CV to [email protected], stating present (if any) and expected salary. Suitable candidate will be contacted for interview. All personal data provided will be treated in strict confidence and used for recruitment purpose only. It is our policy to retain the personal data of unsuccessful applicants for future recruitment purposes for a period of two years.
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817670.11/warc/CC-MAIN-20240420153103-20240420183103-00326.warc.gz
CC-MAIN-2024-18
1,686
17
https://forum.hise.audio/topic/8748/pro-tools-automation-shortcut
code
Pro tools automation shortcut @Christoph-Hart any chance for adding in the juce getControlParameterIndex function so we can add the pro tools automation shortcut into plugins virtual int getControlParameterIndex (Component &) Called by certain plug-in wrappers to find out whether a component is used to control a parameter. You beat me to it @Dan-Korneff haha I've been trying to hack my way around adding this to hise for the past few months but can't get it to recognize the hise components lol
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947476205.65/warc/CC-MAIN-20240303043351-20240303073351-00453.warc.gz
CC-MAIN-2024-10
497
5
http://preciseinfo.org/Convert/Articles_MFC/Concurrency_Code/MFC-VC-Concurrency-Code-101127184454.html
code
Re: Critical Section On 26 =D7 =D7=95=D7=91=D7=9E=D7=91=D7=A8, 06:39, Joseph M. Newcomer <newc= On Wed, 24 Nov 2010 21:19:34 -0800 (PST), Goran <[email protected]> w= On Nov 24, 9:50 pm, Joseph M. Newcomer <[email protected]> wrote: Why is it so wrong to call Lock/Unlock? Well, Lock is not so bad, but Unlock is catastrophic for exception-safety. Ask yourself this: are you sure that there will be no exceptions between calls to Lock and Unlock? And what will happen if there is? Answers are: no, you are not. Even in simplest code like yours, there can be e.g. CMemoryException (in InsertBusyThreadId). If there indeed is an exception, your Unlock will not be called and your critical section will stay locked, possibly forever. Actually, this is a Good Thing, and the point I was making is that it = extremely important that the critical section stay locked forever. Why= ? Because if you throw an exception, YOU HAVE NO IDEA IF THE DATA BEING PROTECTED IS CO= Fair enough, but that's just another thing to consider: code inside a lock needs to have "strong" exception guarantee. E.g. CSingleLock l(&syncObject, TRUE); ScopeGuard g1 = MakeObjGuard(container1, &c1type::pop_back); ScopeGuard g2 = MakeObjGuard(container2, &c2type::pop_back); // All fine, keep all data in But here, you are assuming that the state of the object is guaranteed to = be correct if push_back throws an exception. But what if the exception is thrown = partway through the modification of a structure? push_back is not an atomic operation, = and there is no guarantee that if an exception is thrown in the middle of push_back that = structure is intact, so the state cannot be determined (in fact, throwing= generally indicates the state of the object is undefined). Overall,= the requirement of a "strong" guarantee of correctness is hard to achieve, and I'm not sure th= e above code really accomplishes it. Supposed, for example, that my requirement = was that if any exception is thrown, NO elements have been added to data1, data2 or data3= .. I was using the concept of "ScopeGuard" in 1967 (in fact, it was put in at my request= in the project we were working on, by the guy who invented our exception mechanism), and= even back then we knew that it didn't guarantee integrity. Of course, I presume here that any cleanup operations have no-throw exception guarantee, which is reasonable and true relatively often. (Ground rule of the scope guard is that the function it calls is a no- throw one. It's really the same thing as the "destructors shalt not throw" rule of C++). One thing Java got right was the insistence on two semantics being handle= d correctly; in fact, it is an error to call a function that can throw without putting a = handler in or declaring the function that is doing the calling declares the exception a= s one it throws. C# got this completely wrong, as does C++. I have programmed in Jav= a, C#, and of course, C++, and I much prefer the Java semantics. It is sometimes a pain t= o deal with, but it means there are no surprises and the code is more robust. I don't e= ven have the option of requesting this behavior in C++, which I think is a real pain. "feature" guarantees the lock is unlocked without actually guaranteein= g that the data integrity is preserved, which is really, really dangerous. Not to ment= ion stupid. I'd rather have the data stay locked forever than to be unlocked and broke= n, which is what the CSingleLock mechanism promises. Using lock/unlock guarantees that data is locked/unlocked without a guarantee that data integrity is preserved just the same. No, the explicit lock/unlock does have the side effect that if an excepti= on is thrown, the lock is NOT unlocked, leaving the corrupted data inaccessible/ I'd = rather if fail by leaving the data inaccessible than fail by allowing corrupted data to bec= I'd rather deal with a program hang than a program that can produce erron= without warning. Or one which turns an error into an access fault o= r other obnoxious In the example above, if you use explicit lock/unlock and no scope guard (or try/catch), and container2.push_back fails, you have utterly horrible bug: the lock is there forever for any thread except the one where container2.push_back failed, data is not consistent even in that thread, and you can touch it later. In other words, CSingleLock or explicit lock/unlock, you, the programmer, have to insure data integrity. Both approaches are a 100% orthogonal to shared data But having the lock there forever is GOOD! It means that potentiall= y corrupted data is inaccessible! RAII guarantees that potentially corrupted data becom= Sure, RAII idiom, like all similar things of the sort, can lull you into a false sense of security. But when used properly (e.g like above), it's a good code-clarity help (in the example, the alternative are repetitive try/catch-es, meh). Since the above example does not convince me that (in general) data integ= rity can be maintained, I'm suspicious that this ispossible. Years of programmi= ng multiprocessors and operating systems taught me that anything which gives the illusion of cor= of providing correctness ends up creating code which is unmaintainable an= d hard to debug. I don't believe that the release of the scope guard can be guaranteed to = exceptions; in fact, this contradicts years of experience. By the way, one of the most highly-regarded C++ libraries, boost, also uses a variant of CSingleLock (they call it scoped_lock), and they discourage explicit use of lock/unlock. I believe this is the consequence of C++ propaganda, and not a consequenc= e of actually worrying about correctness. I do not judge code by how highly-regar= ded it might be; all C++ fantatics seem to share the same, consistent,blinders, so the opinion= s of people who follow the same set of religioius principles without factual backup don't= matter very much I spent a year making a large system completely bulletproof. RAII w= ould not have helped at all. Also, it was entirely possible that an attempt to recover w= ould throw another exception, so we had no guarantees about the "no destructor exception" ru= le (it was not done in C++ in 1975, but this wouldn't have helped anyway; the no destruc= rule is naive and not really a reliable mechanism; for example, what happ= ens if the heap has been trashed and the destructor throws an exception because of the ba= d heap? I need reliability and robustness everywhere when I'm engineering a large system= , and I really can't rely on the *assumption* of a condition that cannot be rigorously e= Joseph M. Newcomer [MVP] Actually my task was to build a multithreaded socket server which is supposed to receive HTTP messages and to treat them in some manner. I based my work on your excellent "MFC Asynchronous Socket" Example on But of course there were some changes between the requirements: 1. My client is a 3rd party client which sends HTTP requests and does not send the number of bytes in the start of the message as your 2. The HTTP message could be truncated into 2 or more parts. Maunly it is truncated into HTTP header on first packet and the body on the next 3. Point 2 causes that analyzing the recieved packets can take some time and I need to know what to to with new packets that come while I analyze the former ones. Unfortunatly I got into serious troubles trying to turn your example to be relevant for me. I guess it is a thread sync issue. I gave up using mfc sync objects as you recommended and started to base only on messaging, but still got problem. I added a local Q for every server thread to keep new packets that arrive while I am dealing with the former ones, and still I get dangling pointer when trying to access the Q after thousands of packets that arrived safely... I would appreciate any help here.
s3://commoncrawl/crawl-data/CC-MAIN-2021-49/segments/1637964359093.97/warc/CC-MAIN-20211201052655-20211201082655-00442.warc.gz
CC-MAIN-2021-49
7,835
147
https://acp.copernicus.org/articles/16/13465/2016/acp-16-13465-2016.html
code
Network design for quantifying urban CO2 emissions: assessing trade-offs between precision and network density Abstract. The majority of anthropogenic CO2 emissions are attributable to urban areas. While the emissions from urban electricity generation often occur in locations remote from consumption, many of the other emissions occur within the city limits. Evaluating the effectiveness of strategies for controlling these emissions depends on our ability to observe urban CO2 emissions and attribute them to specific activities. Cost-effective strategies for doing so have yet to be described. Here we characterize the ability of a prototype measurement network, modeled after the Berkeley Atmospheric CO2 Observation Network (BEACO2N) in California's Bay Area, in combination with an inverse model based on the coupled Weather Research and Forecasting/Stochastic Time-Inverted Lagrangian Transport (WRF-STILT) to improve our understanding of urban emissions. The pseudo-measurement network includes 34 sites at roughly 2 km spacing covering an area of roughly 400 km2. The model uses an hourly 1 × 1 km2 emission inventory and 1 × 1 km2 meteorological calculations. We perform an ensemble of Bayesian atmospheric inversions to sample the combined effects of uncertainties of the pseudo-measurements and the model. We vary the estimates of the combined uncertainty of the pseudo-observations and model over a range of 20 to 0.005 ppm and vary the number of sites from 1 to 34. We use these inversions to develop statistical models that estimate the efficacy of the combined model–observing system in reducing uncertainty in CO2 emissions. We examine uncertainty in estimated CO2 fluxes on the urban scale, as well as for sources embedded within the city such as a line source (e.g., a highway) or a point source (e.g., emissions from the stacks of small industrial facilities). Using our inversion framework, we find that a dense network with moderate precision is the preferred setup for estimating area, line, and point sources from a combined uncertainty and cost perspective. The dense network considered here (modeled after the BEACO2N network with an assumed mismatch error of 1 ppm at an hourly temporal resolution) could estimate weekly CO2 emissions from an urban region with less than 5 % error, given our characterization of the combined observation and model uncertainty.
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947475806.52/warc/CC-MAIN-20240302084508-20240302114508-00155.warc.gz
CC-MAIN-2024-10
2,390
2
https://forum.snapcraft.io/t/call-for-testing-tably-snap/3270
code
Hi! I’m a student partaking in the Google Code-In competition, and as part of my task, I was hoping you all could help test my snap. It’s called tably, and can be installed with snap install tably-snap --channel=beta I fixed the problem, everything should run really smoothly now Thanks so much! The link to the github repo is here: Hey! Thanks for this. Did you build this on 17.10? It seems to fail to launch on 16.04. So I suspect you probably need to build it on a 16.04 machine or using snapcraft cleanbuild (in a lxd container). python3: /lib/x86_64-linux-gnu/libc.so.6: version `GLIBC_2.25' not found (required by python3) yes I did… Thanks for the input, will get right on it However, I’m not sure of how much time I’ll have to do this, as I’ll be quite busy between today and tomorrow, and the deadline for the task is fast approaching. Could I please get an extension? @popey I’ve fixed it! Had to stay up quite late though
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474700.89/warc/CC-MAIN-20240228080245-20240228110245-00513.warc.gz
CC-MAIN-2024-10
947
11
http://www.verycomputer.com/177_b40d41d65f65a771_1.htm
code
I'd appreciate hearing from anyone who has been able to successfully compile bash 1.12 on Interactive Unix 2.2. The out-of-the-box source, while having configuration options for isc386, doesn't work. I've tried tweaking a few things (defines/include file problems), but have only been able to make things Thanks in advance for help/suggestions/etc.
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510412.43/warc/CC-MAIN-20230928130936-20230928160936-00563.warc.gz
CC-MAIN-2023-40
348
5
https://communities.vmware.com/t5/Virtual-Machine-Guest-OS-and-VM/Can-not-delete-snapshot/m-p/2472324
code
I have a VM on an ESX 3.02 up to date server. This VM has 3 VMDK file : First for the C (system) partition : 20 Go (Windows 2000 SP4 + rollup SP4) Second for SQL log : 100Go Third for SQL database : 200 Go I can easily create a snapshot, but when I am triying to delete it, after few minutes (around 15 mn), I have a respond time out, and in my snapshot explorer, my snapsot is named : "Consolidate helper". I definitly can not delete the snapshot ! I have the same problem when the snapshot is created by VCB. Thanks for your help. No, I didn't try. I have seen this command, but I do not know if I have to shut down the VM or not to apply the command. I can not shut down the VM actually. Is there some bad consequence to apply this command ?
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571090.80/warc/CC-MAIN-20220809215803-20220810005803-00774.warc.gz
CC-MAIN-2022-33
744
9
https://meta.slashdot.org/submission/1434074/interactive-emotion-detecting-robot-developed
code
cylonlover writes: A team of Cambridge University researchers have now developed a system that can not only detect a user's emotional state, but can also make expressive responses of its own. Using a robotic likeness of the godfather of the programmable computer, Charles Babbage, the team has hooked the system up to a driving simulator and created a computerized driving companion and navigator that reacts to the driver in much the same way as a human passenger. It was pity stayed his hand. "Pity I don't have any more bullets," thought Frito. -- _Bored_of_the_Rings_, a Harvard Lampoon parody of Tolkein
s3://commoncrawl/crawl-data/CC-MAIN-2017-51/segments/1512948520042.35/warc/CC-MAIN-20171212231544-20171213011544-00121.warc.gz
CC-MAIN-2017-51
608
4
https://shyamguragain.com.np/spss-program-training-detail/
code
After completing the training trainee will able to Define the variables in SPSS. Enter the data (code it if necessary). Recede, compute, select data. Analyzing and visualizing data (use of basic statistics) for both uni variable and bi variable data. Hypothesis testing (t, ANOVA and chi-square). Meaning and Classification of data, Scales of data for SPSS, History of SPSS Data Entry Section Planning for data entry, Components of data entry, Defining variables and developing data sets, Use of recording, computing, sampling, marge, transpose, splitting, sorting command in SPSS. Data Visualization Sections bar diagram, pie chart for qualitative data and histogram, line graph, area graph, scatter plot for quantitative data. Introduction of descriptive statistics, SPSS for descriptive statistics, compare mean, One sample t-test, Independent sample t-test, Paired sample t-test, One way ANOVA, Repetated ANOVA, Two way ANOVA, Correlation analysis (simple, partial), Linear regression and Multiple Regression Duration of this course 1 hour for 15 days Trainer: Shyam Guragain Activities of SPSS |Introduction to data (defining data, variables, case and data frame)||Day 1| |Introduction of SPSS (history of SPSS, parts in SPSS)||Day 1| |Installation of SPSS||Day 1| |Defining Variables for SPSS||Day 2| |Entering data in SPSS||Day 2| |Practice of defining variables and entering data (full question set with 10 respondents)||Day 3| |Recoding, computing and filtering data||Day 4| |Tabulation of data (simple and multiple) and its importance||Day 5| |Descriptive statistics||Day 6| |Visualization of data (using Excel and SPSS)||Day 7| |Single sample, independent t test||Day 9| |Paired t test and ANOVA test||Day 10| |Chi-square test||Day 12| |Correlation (simple, rank and partial) and their importance||Day 13| |Regression analysis (simple and multiple)||Day 14| |Certificate distribution||Day 15| Practice questionnaires and other data sets are given during training session. Data Analysis using SPSS Training Schedule Detail From 17th November to 2nd December, 2019; vanue: k&k International College, Baneswor, kathmandu List of participants - priyanka Chapagain:- [email protected] - Archana Pokhrel:- [email protected] - Anu Shrestha:- [email protected] - Sandhya Adhikari:- [email protected] - Avash Singh:- [email protected] - Pratik Dhakal:- [email protected] - Hira Bahadur G.C. :- [email protected] - Dipendra Thapa:- [email protected] - Suraj Nepal :- [email protected] - Bishnu Prasad Gautam:[email protected] - Sahas Katila:- [email protected] - Kanchan Shrestha:- [email protected] - jasmita Shrestha:- [email protected] From 15th to 29th December, 2019; vanue: k&k International College, Baneswor, kathmandu
s3://commoncrawl/crawl-data/CC-MAIN-2020-34/segments/1596439738746.41/warc/CC-MAIN-20200811090050-20200811120050-00382.warc.gz
CC-MAIN-2020-34
2,806
49
https://new.nextapp.co/announcements/board-specific-properties
code
- The NEXT team Board-specific properties 🙌 AUTHOR: The NEXT team Many users create multiple boards, each for different types of data. For example, you might have one board with all your assumptions, one with all your experiments, and one with all your learnings. To keep all this data organized, you'll need specific properties for each board. This used to result in long lists of properties, as they were shared across board. From now on, the properties you add to a board are specific to that particular board, so you and your team will only see those properties that matter! PS: Don't worry! You can still use the relation property to connect data across boards! ⚡️
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296945323.37/warc/CC-MAIN-20230325095252-20230325125252-00543.warc.gz
CC-MAIN-2023-14
676
7
https://forums.opensuse.org/t/another-centrino-2230-thread/95743
code
I will be purchasing a laptop with this card. I have searched the forums, but am still a tad confused. I understand this will not work out of the box. Am I to install the compat-wireless package? If so, which version? There is no 13.1, only old ones and factory, so which do you recommend? Do I need to install anything else, and should I run any other commands? I am sure you are tired of iwlwifi threads by now, but I just want to be sure I know what I am doing before I go into it.
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224649518.12/warc/CC-MAIN-20230604061300-20230604091300-00140.warc.gz
CC-MAIN-2023-23
484
3
https://matheusportela.com/make-protocols-not-platforms
code
Make protocols, not platforms08 Mar 2022 The web is decentralized from its inception. The TCP/IP stack assumes no central hub so computers can talk to each other. HTTP requires no login for individuals to spin their own websites and connect to existing ones. Email works by allowing users to interact with all other email providers seamlessly. Podcasts are published in RSS feeds so podcast players can find, download, and play the newest episodes, no central service required (although Spotify is building its walls by offering insane amounts of cash for exclusivity rights). It’s interesting to contrast this with how social networks came to be. Since their beginning, creating a profile, following other profiles, and publishing content were possible only within a platform’s boundaries. A Facebook user cannot follow someone on Twitter. An Instagram influencer cannot check pictures posted on Reddit. Compare Facebook to email, for example. If emails behaved like social networks, one would expect to only be able to send and receive emails from the users of the same provider. Gmail users wouldn’t be able to talk to Outlook users. Each person would have 5 different email accounts, one for each major provider, and we would need to copy data from one account to the other to make it visible to the users on the other platform. In fact, it would behave exactly like what we currently have with Direct Messaging in the major social networks (Facebook is trying to unify their products’ DM systems into a single one but we still won’t be able to talk to someone on Twitter, for instance). Thankfully, email doesn’t work like that. But it is interesting to think why there is such a big different in how older Internet features behave compared to newer tech products. My humble opinion is that the web is protocol-oriented. Email is open to anyone to create their own servers and clients by design because it is not a service nor platform, but a protocol. Based on the email specification, programmers were able to create their providers. It is true that some providers are more popular than others, mainly Gmail, but no singular company owns email behind closed walls. It seems to me that if we want a better Internet, we need to make protocols, not platforms. It is interesting to see decentralized alternatives taking this approach. Solid is a protocol that wants to be the backbone of storing and sharing user data, pioneered by Tim Berners-Lee. With such a protocol, the user would own their data, not the social network. Mastodon is a Twitter-like social network that implements the ActivityPub protocol, hence being fully interoperable with any other ActivityPub platform. It remains to be seen if decentralized protocols will become widespread on the Internet of the future, given that current technology behemoths have absolutely no incentive to use solutions that will reduce their control over people’s data and will (and their profits). Legislative efforts could push them in the right direction, though, and the day of Big Tech regulation is nearing.
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662512229.26/warc/CC-MAIN-20220516172745-20220516202745-00355.warc.gz
CC-MAIN-2022-21
3,079
9
http://spinrewriter9.com/spin1/7-advantages-of-spin-rewriter-9-and-how-you-can-make-full-use-of-it-10-advantages-of-spin-rewriter-9-and-how-you-can-make-full-use-of-it.html
code
Millions of individuals who likewise have the internet on their fingertips are usually wondering exactly a similar thing as you at this time: How can I make money online? How do i get internet search engine exposure for my web site (or blog)? Exactly what will provide me a leg through to your competition? Thankfully you have previously arrived at the solution to all or any these questions. Post Rewriter Tool can be acquired to make your website as profitable as possible, with reduced work on your own part. Once upon a time there lived a boy. He had blue eyes with blond hair as yellow as gold. The young boy was small and fragile, but his mind was swift like the wind. He could calculate the outcome of any situation in the blink of an eye. But that was not his biggest talent. No. His biggest talent was perception. The young boy could understand and perceive anything faster than anyone he had ever met. Then, he fell in love with a beautiful princess. She had magnetic green eyes and light brown hair. He loved her very much and she loved him back even more. There was only one problem – the young boy was the son of a blacksmith. The princess’s father would never allow her to marry a simple son of a blacksmith. But their love was too strong. In one fell swoop, the young boy raised an army of undead and started a rebellion to overthrow the evil king who did not believe in true love. After months of fighting against the armies of his beloved’s father, the young boy was assassinated and the war was over. No songs were sang. First I want to note on the text on the right-hand side. Basically, the first paragraph tells you about WordAI’s “Turing” spinner which generates amazing content for a software, then you have some directions as to how to spin your content and then a link to the bulk spinner of WordAI. Keep in mind that you can only use the bulk spinner if you have an active subscription and not just the trial. It has helped me to get high quality content fast without having to outsource the spins. I used to spend hundreds a month just on getting article spins for all my client sites and SEO campaigns. It's very effective on getting amazing spun variations of highly relevant and high quality content quickly. You can also go back and use them again in the future since it archives them. I love that. (TIP) Spin 10 completely different titles with your articles for ultimate diversity! WordAI automatically rewrites entire paragraphs and sentences – this functionality is offered by most content spinners nowadays, but not many are good at it. WordAI tries to understand in the best possible way, not just the words in the sentence, but the entire meaning of the sentence as well as its connection to subsequent sentences in the paragraph. Looking at both spinner’s spun articles, they both seem to generate spun content that looks pretty good. Both have some grammar issues I would correct if I was posting it on a high tier 1 site, but overall SpinnerChief produced better content. Not sure if WordAi is being overly aggressive on the spins at the cost of quality. This test is very hard to call. If you go by raw numbers, SpinnerChief won. I want to leave this up to you to decide which one won. Winner none – draw! Some positive aspects to writing articles and selling them on the internet is that you get to supplement your monthly income. In this rough economy who can't use a few extra bucks? Another upside is that you can build up your cache of original content and increase your reputation for writing and possibly attract some higher paying customers. Lastly, just think of the knowledge you are gaining by having to research some of the topics you write about. You are, or will soon be, a fountain of useless information. Article Rewriter is the best and free SEO tool that allows you to rewrite the article with flexibility. The competent tool, which allows you to post articles or blogs periodically, makes posts attractive and publishes the same in simple words. Rewrite the full content in few seconds. With the help of this tool, you can get rid of plagiarism. It also helps to improves your SEO performance faster than the before.. Cross Platform – Being a Mac user I prefer when I can fire up a program locally. WordAi is web based and therefore works on Windows & Macs without issue (Linux as well). SpinnerChief III Ultimate has a Web Api that allows spinning from the web, but we did not have much luck with it, so at this time we consider SpinnerChief a Windows only application and therefore requires me to run it in a virtual Windows Machine using VMWare Fusion. This one is a hard one to call because clearly WordAi wins cross platform, but it doesn’t have all the extras that SpinnerChief offers. Some favorable aspects to writing articles and marketing them on the net is that you really get to supplement your monthly income. In this challenging economy who can't use a few additional bucks? Another upside is that one may build up your cache of first content and increase your reputation for writing and possibly pull some higher paying customers. Lastly, merely think about the information you're gaining by having to research some of the subjects you write about. You're, or will shortly be, a fountain of worthless tips. Manual spinnig is still needed when you want to create ultimate spun and readable articles. You must spin paragraphs and sentences if you want to create the ultimate spun article, it used to be a pain to spin huge articles in paragraph and sentence mode, the nested text always made it diffcult to find the right sentence. But now, with SpinnerChief 5's spin tree function, everything becomes clear and easy! All paragraphs and sentences are organized very well, you can locate, modify and spin them easily. There are a lot of spinners on the market, some are OK and others are just plain junk. If you are asking why The Best Spinner isn’t in this comparison it is because currently TBS is not producing the results we need for higher quality spins. Sure you can hand tweak your articles to be perfect, but in our business time is money. The less time I have to spend on tedious tasks is more time I have for making money. While no spinner will produce perfect results, these two do a great job of getting you closer to human readable content. To us that means content that reads in a linear fashion with proper verbs and nouns. So below we will show the results of spun articles by these two top spinners. Exactly Mark! In my experience you can certainly write around 1000 words per hour, even if you are practically new to blogging. I personally think that spinning articles is just a gimmick that doesn’t really get results but wastes tons of time. The spinning software certainly makes a lot of money for the creators though! They are the ones who are laughing all the way to the bank! Andrew Darius, Dean H, Hikmet Manashirov, Jamie Lewis, Shreya Banerjee + Paul Counts, Dr Amit Pareek, Collin Almeida, John Assaraf, Luke Maguire + Simon Harries, Michel Sirois + Reed Floren, Kristie Chiles + Brandon Garland, David Gonzalez (Advance Your Reach), Adeel Chowdhry, Andrew Fox, Chris Fox + Simon Warner and other Fellow JVNP 2.0 Partners have active listings on the JVNewsWatch Launch Calendar, gathering JV Affiliate Partner prospects on autopilot … As you can see, WordAI is a lot more loose with the meaning of the text and uses synonyms wherever it can in order to produce the most unique content possible – this one is calculated at 98% uniqueness. Again, the purpose of such content should be for the lower tiers where you would need a higher quantity of links with not that high quality content. We know that you want more from your spinner so SpinnerChief 5 uses a new, unique, organic approach to spinning, one that grows with your needs. SpinnerChief 5's new method actually gets better the more it is used. No other spinner has it - it's the new, exclusive Statistical Replacement Technology (SRT). It works in a radical new way by selecting the statistically most appropriate synonym for any word or phrase. SRT works in a similar way to Google Translate - you may have noticed Google Translate is getting better over time with more accurate translations. This is because as the web grows, the sample size for Google Translate's database increases, and so becomes statistically more likely to use the correct wording when it translates. SpinnerChief 5 works in a similar way by polling its huge Cloud Thesaurus for the statistically best synonym. As the Cloud Thesaurus grows, so SpinnerChief 5 gets better and better at synonym replacement. Remember - it's exclusive, don't expect to see this kind of technology anywhere else. ONLY with SpinnerChief! Now, remember that the above example was using the “Very Readable” setting of WordAI. Let’s see what content will be generated if we use the “Readable” setting. Just a quick note here that this time it took about 20 seconds for WordAI to finish the spin, so the setting we are playing with definitely has some effect and is not there just for marketing purposes: Unlike other spinners, WordAi fully understands what each word content means. It doesn’t view sentences as just a list of words, it views them as real things that interact with each other. This human like understanding allows WordAI to automatically rewrite entire sentences from scratch. This high level of rewriting ensures that Google and Copyscape can’t detect your content while still remaining human readable! He saw a trainer nearby and inquired why these animals made no effort to get away and just stood there. “Well,” trainer said, “when they are quite young and much smaller we use exactly the same size rope to tie them and, at that age, it’s enough to hold them. They are conditioned to believe they cannot break away, as they grow up. They believe the rope can still hold them, so they never try to break free.” This article spinner is known to have a team of friendly customer service representatives that are more than glad to accept any issues. Whenever theres a problem with the server or the system in terms of its features and functionality, then you can always escalate the problem to the best representatives available by submitting a ticket so that it can be resolved as soon as you reach out to them. Does your website need quality content in numbers? The truth is; producing articles restrict the amount of content that is written on your site if you’re the only one writing on your website and can take any author hours. Hiring a writer can get expensive. Have you ever considered using an article spinner? Spinning content is a excellent way to keep your website fresh and relevant . Needless to say, not all article spinner applications is great. Therefore it’s important to do your homework first. We propose Spin Rewriter 9.0. You can rewrite your articles using their Rewrite system. In addition, you have a Bulk Rewrite option that lets your rewrite articles with one click. You break it up into several terrific pieces of content and may take one article. The choices are endless. Any article rewriter or paraphrasing tool basically scans through the content you provide it in order to look for all the words that it can replace with suitable synonyms or substitutes. Every replaced word will appear bold and highlighted in a colorful text. Clicking on the word will give you details such as original word or other suggestions, you also have an option to add your own word. By clicking on the original word, you can go back to original. I’m new on this of online business thing, and English is not my native language. In spite of that, I have written my first pages and posts by myself. I totally agree with what you say here. There is nothing more satisfactory than to produce your own content, even if it is not perfect or excellent in the beginning, but with time and practice, it will surely improve. When you integrate Perfect Tense with WordAi, Perfect Tense will check any text you spin for grammatical errors. Perfect Tense will then add those spelling and grammatical errors as synonyms. This means that your spintax will be more unique and more readable. When using Perfect Tense with WordAi, your spun content will often end up even higher quality than the original. WordAI is probably the most famous content spinning service. Many people swear by it and the quality of the content it produces and it is not empty talk. But let’s see how it will spin my short story. WordAI has two modes of spinning – “Standard” and “Turing”, with the latter being the one that produces better results. I will spin the text with both of them. I am extraordinarily dissatisfied with WordAI. They are happy to take your money – we spent a good chunk of coin, but also sent in two support requests that were never answered. In the end, we told them that we had to like their AI and their humans before we’d continue trying their service, so this article, which is a great analysis of the products shows that there are other spin services our there and we will definitely be trying out the competition.
s3://commoncrawl/crawl-data/CC-MAIN-2019-22/segments/1558232254882.18/warc/CC-MAIN-20190519121502-20190519143502-00104.warc.gz
CC-MAIN-2019-22
13,215
26
https://www.techspot.com/community/topics/cd-rom-problems-wont-read-anything-tried-almost-everything.40872/
code
I have a Dell 4600. It has worked fine for the last 2 years. recently 1/1/06, both the DVD rom drive and the CD-RW drive spontaneously quit working. It is very frustrating because i have no plausible explanation for it. They were both working the morning of the 1st when i shut the comp. down, but when i rebooted a few hours later neither would work. I have the most up to date driver i can find, and i dont believe that i have a virus because i have done several scans. the device manager says that the drives are working properly and the troubleshooting guide could not solve the problem. PLEASE HELP.
s3://commoncrawl/crawl-data/CC-MAIN-2018-05/segments/1516084889542.47/warc/CC-MAIN-20180120083038-20180120103038-00450.warc.gz
CC-MAIN-2018-05
604
1
http://apto.force.com/articles/Help_Article/Searching-for-Records-using-Global-Search
code
Global search queries standard objects and also searches other objects like documents, Chatter feeds, files, topics, and people. Global search also searches more field types, including custom fields and long text fields such as descriptions, notes, and task and event comments. Global search keeps track of which objects you use and how often you use them, and arranges the search results accordingly. Search results for the objects you use most frequently appear at the top of the list. If global search doesn’t have enough information about which objects you use, you see results for all objects until it has more information. How your global search works depends on your search terms, and the use of wildcards and operators. Search terms are treated as separate words and may be found in different searchable fields within a record. For example, searching for bob jones returns items with Bob Jones, as well as a contact named Bob Smith whose email address [email protected]. Search terms are separated by letter, number, and punctuation boundaries. For example, searching for acct!4 returns items with Acct, !, and 4, even if those terms are in separate places in the item. Asterisks match zero or more characters at the middle or end (not the beginning) of your search term. For example, a search for john* finds items that start with john, such as, john, johnson, or johnny. A search for mi* meyers finds items with mike meyers or michael meyers. If you're using sidebar search, an * is automatically appended to the end of the search string. You can use an * at the beginning of a search term in a standard lookup search. Question marks match only one character in the middle or end (not the beginning) of your search term. For example, a search for jo?n finds items with the term john or joan but not jon or johan. If you're using global search, the ? is removed from the end of your search term and isn't treated as a wildcard. You can't use a ? in a lookup search. Wildcard Behavior and Limitations Wildcards take on the type of the preceding character. For example, “aa*a” matches “aaaa” and “aabcda”, but not “aa2a” or “aa.!//a”, and “p?n” matches “pin” and “pan”, but not “p1n” or “p!n”. Likewise, “1?3” matches “123” and “143”, but not “1a3” or “1b3”. You can't search for a ? or * in a search phrase that is enclosed in quotation marks or when Exact phrase is selected in the search scope because they function as wildcards. For example, "my wo?d" matches my wood and my word. If you're entering search terms in global search, the search box drop-down list gives you the option to search for your term with an * added to the end. For example, type “jo” in the search box, then select Search for jo* (starts with) to find joan, john, johnson, and other matches that start with jo. Let’s take a look at the Global Search Bar and understanding Search Results. - The Global Search Bar will always be located at the top of the page. - The objects that return records and the records they return will display in the center of the page - You can show more records if there are many results. - More objects can be searched on the left side of the page. - If you’d like to search Chatter Feeds you can select the Search Feeds option.
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585371807538.83/warc/CC-MAIN-20200408010207-20200408040707-00014.warc.gz
CC-MAIN-2020-16
3,322
16
http://ftp.vim.org/NetBSD/misc/martin/prasad/
code
Welcome to ftp.vim.org, Hosted by ftp.nluug.nl Current directory: /NetBSD/misc/martin/prasad/ Contents of README:| DISCLAIMER: The material in this directory is not related to NetBSD. It is hosted here temprarily as a convenience, since the contents are discussed on the tech-kern mailinglist. Name Last modified Size Parent Directory - .message 11-Mar-2005 10:19 180 README 11-Mar-2005 10:19 180 mypatch.tar.gz 10-Mar-2005 15:05 55K paper_1.pdf 10-Mar-2005 15:04 69K prasad-ckpt.tar.gz 11-Mar-2005 16:56 5.3K NLUUG - Open Systems. Open Standards Become a member and get discounts on conferences and more, see the NLUUG website!
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370524604.46/warc/CC-MAIN-20200404165658-20200404195658-00506.warc.gz
CC-MAIN-2020-16
628
9
https://community.filemaker.com/thread/95519
code
CSS formatting for spaces I am using the GetasCSS function to add CSS formatting to text that I am exporting via excel. I am then importing the excel file into SharePoint to display on our company's website. The formatting works fine, but all of the spaces are eliminated. How can I add formatting for spaces?
s3://commoncrawl/crawl-data/CC-MAIN-2018-05/segments/1516084887621.26/warc/CC-MAIN-20180118210638-20180118230638-00677.warc.gz
CC-MAIN-2018-05
309
2
https://blog.loxal.net/2016/03/rust-vs-java.html
code
Rust vs Java The 1.0 release of Java is dated January 1996 while Rust 1.0 was released in May 2015. Although age may not be an essential differentiator, some claim that the former has pedigree. Regardless of history, one obvious difference between Java and Rust is that the former runs on the JVM, which means it is just-in-time compiled. In short, Java can benefit from profile-based optimizations which (in theory) allow better performance than compile-time optimized code for certain workloads. Another aspect which matters is that a typical Rust program consumes orders of magnitude less memory than an ordinary Java program. Although Java’s GC is very optimized and makes programming rather painless, Rust has a zero-sized runtime, for some large values of zero. There is a runtime, but it consists of establishing landing pads for panics which can even be overridden. Rust is not as portable as Java, but backends for a number of targets can be obtained with reasonable effort as it is LLVM-based. Rust may be suitable for targets that are considered to be too small for the JVM because of the absence of a fat runtime and garbage collector. What Java lacks and Rust offers is the following: Rust’s ownership- and lifetime-rules, which are upheld by the borrow checker allow it to get by without a GC. This also has its perks and disadvantages, because even though the compiler guarantees freedom from data-races, users will eventually bash their head against the borrow checker.
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474641.34/warc/CC-MAIN-20240225171204-20240225201204-00864.warc.gz
CC-MAIN-2024-10
1,489
5
https://engagedscholarship.csuohio.edu/enece_facpub/253/
code
Interaction Patterns for Byzantine Fault Tolerance Contribution to Books Computer Applications for Web, Human Computer Interaction, Signal and Image Processing, and Pattern Recognition In this paper, we present a catalog of application interaction patterns with the corresponding message ordering and execution rules for Byzantine fault tolerance computing. For each pattern, a set of rules are defined to determine whether or not an inbound message should be ordered and in what particular order, and which set of messages should be delivered sequentially, concurrently, or selectively concurrently under various scenarios. This catalog could serve as the design patterns for constructing practical Byzantine fault tolerance applications that may use much more sophisticated system models than the basic client-server state machine model. The set of patterns will make it easier and less error-prone when applying the Byzantine fault tolerance techniques for practical systems, in particular, Web based applications. Chai, Hua and Zhao, Wenbing, "Interaction Patterns for Byzantine Fault Tolerance" (2012). Electrical Engineering & Computer Science Faculty Publications. 253.
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224652959.43/warc/CC-MAIN-20230606150510-20230606180510-00310.warc.gz
CC-MAIN-2023-23
1,176
5
http://freecode.com/tags/open-software-license?page=12&sort=vitality&with=&without=
code
There are many instances when one needs to process certain objects on seperate threads. But spawning a seperate thread per object may cause the system to crash. The Thread Pooling Framework can be used to process the the objects on a predefined number of threads. If all threads are busy, the objects are kept in the pool. Whenever a thread ends, an objects is taken from the pool and processed on a new thread. This continues until the pool is empty. AMLET is software designed to estimate multinomial and mixed logit discrete choices models, which are increasingly popular in econometry. The software supports cross- sectional and panel data, and offers various optimization methods, including the new variable sample-size approach. cstor is a cross-reference compiler and reverse engineering tool. It compiles one text file (database) from multiple source modules (currently reads C, C++, and Perl). The tool combines reverse engineering capabilities, code validation, and an HTML documentation generator. The database can then be reused from own scripts and programs, e.g. to implement cross-compilers, validate coding conventions, build statistics etc. The builtin documentation generators are actually an application of the database. Quality Objects (QuO) is a framework for providing quality of service (QoS) in network-centric distributed applications. These applications range from embedded applications to wide area network applications, including many military and commercial applications. QuO bridges the gap between the socket-level QoS being specified, researched, and provided by a number of organizations and the distributed object level where many distributed applications are best written. QuO adds QoS to CORBA and Java RMI in a manner which is appropriate for creating applications that can adapt to environments that are unpredictable or have strict resource constraints.
s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386163052216/warc/CC-MAIN-20131204131732-00025-ip-10-33-133-15.ec2.internal.warc.gz
CC-MAIN-2013-48
1,892
4
https://evandancer.com/projects
code
Published at December 29, 2019 I read an article recently about launching a bunch of mini-apps to grow some traction. I’m not sure that these things will grow traction for me. I more wanted an excuse to work on small apps that I thought were cool. I am building everything under the OpenPace branding and website so they are all open source.
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100912.91/warc/CC-MAIN-20231209134916-20231209164916-00357.warc.gz
CC-MAIN-2023-50
343
2
https://meta.stackoverflow.com/users/28419/ovidiu-pacurar
code
Puss in Boots: Pray For Mercy! Member for 10 years, 11 months 0 profile views Last seen Dec 11 '17 at 13:16 Top network posts - 146 Count work days between two dates - 71 string.split returns a string I want a List<string> is there a one liner to convert an array to a list? - 59 What's the best way to check if a String represents an integer in Java? - 25 SQL if statement in where clause for searching database - 20 Best way to turn an integer into a month name in c#? - 14 What are the uses for Cross Join? - 12 Creating a TCP Client Connection with SSL - View more network posts →
s3://commoncrawl/crawl-data/CC-MAIN-2019-39/segments/1568514573121.4/warc/CC-MAIN-20190917203354-20190917225354-00044.warc.gz
CC-MAIN-2019-39
586
13
https://www.computer.org/csdl/proceedings/cvpr/2017/0457/00/0457d929-abs.html
code
2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR) (2017) Honolulu, Hawaii, USA July 21, 2017 to July 26, 2017 DOI Bookmark: http://doi.ieeecomputersociety.org/10.1109/CVPR.2017.418 Several machine learning tasks require to represent the data using only a sparse set of interest points. An ideal detector is able to find the corresponding interest points even if the data undergo a transformation typical for a given domain. Since the task is of high practical interest in computer vision, many hand-crafted solutions were proposed. In this paper, we ask a fundamental question: can we learn such detectors from scratch? Since it is often unclear what points are interesting, human labelling cannot be used to find a truly unbiased solution. Therefore, the task requires an unsupervised formulation. We are the first to propose such a formulation: training a neural network to rank points in a transformation-invariant manner. Interest points are then extracted from the top/bottom quantiles of this ranking. We validate our approach on two tasks: standard RGB image interest point detection and challenging cross-modal interest point detection between RGB and depth images. We quantitatively show that our unsupervised method performs better or on-par with baselines. image colour analysis, neural nets, object detection, unsupervised learning N. Savinov, A. Seki, L. Ladicky, T. Sattler and M. Pollefeys, "Quad-Networks: Unsupervised Learning to Rank for Interest Point Detection," 2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR), Honolulu, Hawaii, USA, 2017, pp. 3929-3937.
s3://commoncrawl/crawl-data/CC-MAIN-2019-09/segments/1550247505838.65/warc/CC-MAIN-20190221152543-20190221174543-00491.warc.gz
CC-MAIN-2019-09
1,619
7
https://commonplace.doubleloop.net/journal/2021-04-10
code
- I've enjoyed a few of the articles on Mutual Interest Media, and like what they're trying to do. So I've joined them as a member. - Improved links output in ox-agora. It works now so that if the links have a description in org-mode, this description will be preserved correctly in markdown syntax. - I had a quick try at loading the output of ox-agora in Foam and in Obsidian. It doesn't work fully in either. Obsidian because it seems to expect filenames to match wikilinks - spaces in the wikilinks should be spaces in the filename. Foam because of the opposite - it seems to expect dashes in the filename, and thus dashes in the wikilinks. Given that some Agorans are using Foam, I wonder how they are getting that to work. - Jotted a bit more down on Reweirding the web, came across an article called Rewilding the web :D 1.1. In my garden Notes that link to this note (AKA backlinks).
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510481.79/warc/CC-MAIN-20230929022639-20230929052639-00437.warc.gz
CC-MAIN-2023-40
891
6
https://meta.stackoverflow.com/questions/404436/synonymize-azure-kubernetes-with-azure-aks
code
Could we synonymize azure-kubernetes with azure-aks? It already has 3 synonyme votes - but not many users are active on tag synonyms or have enough reputation. This naming is relatively consistent with amazon-eks that is used for Amazon Elastic Kubernetes Service. But if naming is a problem that could be changed, I think the main confusion is that there are two different tags for the same service. azure-aksis both used for Azure Kubernetes Service - (AKS). It already has 3 synonyme votes Getting this under a common tag was good. Azure Kubernetes Service - (AKS) is known both as "Azure Kubernetes Service" but also just "AKS" (corresponding to "GKE" for "Google Kubernetes Engine"). This is now under the tag azure-aks - the problem with that tag name is that "a" in "aks" also stands for "azure", so it is almost as saying "azure-azure-kubernetes-service". As a footnote, this is the name that is in use on DevOps Stackexhange: azure-kubernetes-service
s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656104293758.72/warc/CC-MAIN-20220704015700-20220704045700-00284.warc.gz
CC-MAIN-2022-27
959
8
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=216867
code
The default IPFW "workstation" rules seem to block fragmented packets caused by DNSSEC, in turn causing DNS to fail for some domains (including freebsd.org subdomains) when DNS resolution is performed locally (using BIND or Unbound). The addition of the IPFW rule "ipfw add reass udp from any to any in" to /etc/rc.firewall, under type workstation, fixes the issue. This issue was discussed at: Needs some testers, but this should fix it (In reply to Mark Felder from comment #1) Tested and works. However the reass should come *before* the check-state as fragments (except the first) don't include protocol and port numbers and thus cannot match check-state anyway. We need to reassemble first, then check-state will do the right thing. (It doesn't harm to implement as proposed, but we may save a few cycles if we reass first.) Furthermore, along the same line we should not only reassemble UDP but any IP packet (including IPv6), which is also suggested by ipfw(8) manpage: Usually a simple rule like: # reassemble incoming fragments ipfw add reass all from any to any in is all you need at the beginning of your ruleset. (In reply to Helge Oldach from comment #2) In general the reass should come before any rule that might check a port number, as only the first packet, or a completly reassembled packet has a port number. So I agree it should be moved before the check state, and probably moved even much earlier. The other issue is that net.inet.ip.fw.one_pass must be turned on for this to work, that change requires further considerations and
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323587606.8/warc/CC-MAIN-20211024204628-20211024234628-00014.warc.gz
CC-MAIN-2021-43
1,551
20
https://www.kvraudio.com/product/ez_poly_by_krakli
code
This is a phenomenal synth. Enticing GUI. Useable, off-kilter presets. Incredibly fun to program. My plug-ins folder was overrun by cheap-sounding, free VSTi's when I tried this out, and I was blown away. I instantly found the sound I was looking for. I simply can't fit patch programming into my songwriting workflow, so I was very pleased at the variety of patches included (Hint: Developers, always give your synths a nice big bank before releasing them). Even the time-synced patches, which I normally despise, have found their way into my songs. But that's not it. The leads are very playable, and I'm very picky about leads. For those who hate synths without onboard delay, you'll be pleased to hear EZ-Poly has it. I hate having to unnecessarily interrupt my flow by adding a new send effect when it's so easy to have the effect in the GUI of the synth itself. That developers like Ian and Ugo have thoughtfully included this important spice into their works of art is very much appreciated. Make EZ-Poly a part of your songwriting toolset. It adds colors to your palette you wouldn't have thought possible in a free synth.Read Review
s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320299927.25/warc/CC-MAIN-20220129032406-20220129062406-00535.warc.gz
CC-MAIN-2022-05
1,141
2
http://forum.critterandguitari.com/t/considering-buying-an-organelle-but-have-a-question-for-users/1334
code
I just recently got an Organelle a week or two ago, but I really love it. Already played a gig with it! I've been working on ports of my generative pure data patches and if you use PD you will love it! 1 : I saw a post where they were maxing at around 80% CPU with something ridiculous like 800+ oscillators lol. Without the GUI, PD runs very efficiently, and the hardware / Linux overhead is really small since it is running Arch. 2 : I haven't and I think this will depend on how well you can write DSP in PD or whatever program you end up running. 3 : seems like 800+ oscillators. As a reference, superCollider has a maximum of only 256 oscillators even possible! 4 : I am running an entire generative sequenced groovebox / synth patch that I've been working on for a few years and am really excited to keep porting and creating with PD on the Organelle. Maxing out around 41% CPU right now. 5 : You can check out here. https://patchstorage.com/ The uploading has been messed up every time I've tried to upload, but hopefully they can fix it. 6 : I have been wanting to build basically this same thing for awhile, but ended up just buying the Organelle.. Linux + PD + hardware is a lot of fun.
s3://commoncrawl/crawl-data/CC-MAIN-2017-51/segments/1512948588294.67/warc/CC-MAIN-20171216162441-20171216184441-00517.warc.gz
CC-MAIN-2017-51
1,196
7
https://www.qdoos.com/threads/installing-unix-with-windows-xp.5741/
code
I need to learn Unix and i have this book, "Introduction to Unix/Linux" and it comes with a CD that installs Unix onto your computer. I have windows XP currently on this computer, if I install Unix, will it mess everything up? okay it appears to be fedora linux instead of purely unix. When put into the computer and booted it starts installing it right away. can i continue or will it over wright windows?
s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187824819.92/warc/CC-MAIN-20171021133807-20171021153807-00295.warc.gz
CC-MAIN-2017-43
406
1
https://m.everything2.com/title/battle+cry
code
Battle Cry is a two player board game published by Hasbro/Avalon Hill. It's a historical war game set during the United States' Civil War with simple rules and an easily modified game board, enabling anyone to quickly set up and play through a Civil War battle in about an hour. The game comes with a basic game board, which is a layout of hexagons, and 46 hexagonal terrain tiles which you can lay atop the gameboard, thus modifying the game board and creating a very large number of possible games to play. The game also includes a large number of miniature soldiers for both the Confederate and Union armies, dice, Command cards (the essence of the game, which allow you to conduct battlefield manuevers and surprises), and field work tokens. The miniature pieces are nicely done, many of them coming with miniature Confederate and Union flags. Each game starts off by having the two players set up the game board using the terrain tiles; each player also positions his or her troops and receives a number of Command cards. The game includes fifteen scenarios for setting up the troops, numbers of Command cards, and terrain tile setup; these will be noted later. If you just want to play, I recommend a draft of the pieces, where each player may place six (or as many as you want) terrain tiles and can also draft a set number of troops and Command cards, combined, as long as the board contains at least eight flag-bearing pieces per side. The players alternate drafting and placing the pieces. The players then alternate turns, with each turn consisting of the following sequence of events. - Play a command card. Command cards tell you what orders you can issue to your troops, and on what part of the board you can issue these orders. If you don't have any cards that allow you to order your troops, discard one of your command cards and draw another, ending your turn. - Order units. Once you've played the card, you usually have a number of units you can order. You must indicate which ones you're going to move. - Move. You have three different types of troops (their pieces are clearly distinguishable). The infantry can move one hex in any direction and battle in the next phase. The cavalry can move three hexes and battle. The artillery can either move one hex or battle. Troops of the same type clustered together comprise a unit, and can move together; it's often good to protect flag-bearing troops in a unit. If ordered, a general can move three hexes, but a general can participate in a battle without being given an order. - Battle. All of the pieces you moved in the turn before (as well as your generals) can then attack the units on the other side. Units can attack other units as far as five hexes away, but the closer a unit is to the opponent, the more dice that unit can roll. One unit can attack only one other hexagon, and the different terrain tiles reduce the range of a particular unit or block it's line of sight (this is very simple and intuitive; if an opposing unit is behind a tree, you can't shoot it, can you?). - Resolve battle. For each skirmish, the player rolls the battle dice and sees how many troop symbols (artillery, infantry, cavalry, or any unit) he or she gets on the dice; that many opposing troopers die, with the flag bearing trooper dying last. - Draw a command card. The turn is ended by drawing a command card. The game continues, with players moving their pieces about, until one side manages to kill off a certain number of flag-bearing troops controlled by the other player; when that happens, the side with all the dead flag-bearing troops loses, and the other side wins. The game comes, as I mentioned above, with fifteen scenarios that attempt to set up famous Civil War battles: First Bull Run, Pea Ridge, Kernstown, Shiloh, Gaines Mill, Brawner's Farm, Antietam, Fredericksburg, Murfreesboro, Chancellorsville, two different Gettysburg scenarios, Chickamunga, New Market, and New Hope Church. These scenarios provide historical background and specific board layouts to start with that match the actual battle conditions. For my own enjoyment, Pea Ridge and Fredericksburg are the most enjoyable. One can also find more scenarios by searching about on the 'net; there is a rather active Battle Cry community online. The game takes about an hour and a half until you get used to the nuances, then the time cuts down to about an hour. The game has a lot of strategy wrapped up in a small number of simple rules, which for me is the symbol of a good game; add in the interesting way of presenting a history lesson, and Battle Cry makes for one worthwhile way to spend an afternoon.
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233511424.48/warc/CC-MAIN-20231004220037-20231005010037-00476.warc.gz
CC-MAIN-2023-40
4,643
13
https://www.cnet.com/tech/tech-industry/sun-microsoft-are-battle-worn-combatants/
code
Sun filed a private antitrustFriday against the software giant for its handling over Sun's Java software, among other issues. But the two companies have long been bitter enemies. They sell rival operating systems for business computers that power the Internet. The two clash over competing e-business software that companies use to build Web sites. Their rivalry even extends to office productivity software, with Sun pushing StarOffice as an alternative to Microsoft's popular Office. Even the company's top executives have been known to throw verbal punches at each other. In a February speech, Sun Chief Executive Scott McNealyMicrosoft's efforts to improve its security in Windows, pointing out that Sun's own Solaris operating system has security built in. Microsoft Chairman Bill Gates isn't afraid to fire back, recentlySun for not joining an industrywide coalition aimed at ensuring Web services compatibility. Web services is an emerging market where software is available over the Net on a myriad of devices, such as PCs, cell phones and handheld computing gadgets--and both Sun and Microsoft are competing on the that builds Web services. "It's like the Cold War when the Soviet Union sent Cuban troops to Africa, and the United States knew they had to do something in Africa, so they countered by funding rebel troops," Giga Information Group analyst Mike Gilpin said. "You have that same geopolitical thing going on between Microsoft and Sun. What one company does has full meaning to what the other company does. It's a tit for tat that's going on." Now Sun is seeking damages that could top $1 billion over Microsoft's alleged abuse of its monopoly in the operating system market. As part of Friday's private antitrust suit, Sun also wants Microsoft to release the underlying source code for Internet Explorer, and to release interfaces between Windows and higher-level Microsoft software. Sun also seeks to force Microsoft to ship Java with Windows XP and Internet Explorer. The two companies are no strangers in the courtroom over Java. Throughout the late '80s and '90s, Sun was primarily a hardware company, selling servers that the company bundled with Solaris, an operating system that competes against Microsoft's Windows operating system. But the rivalry grew more intense in the late 1990s when Sun invented Java, a software language that allows a program to run on multiple computer platforms without having to be rewritten for each one. When Java emerged, it was immediately hailed as a technology that could greatly affect Microsoft's future, as it allowed developers to create desktop applications that could run on any operating system. As a result, developers ideally would not have to dedicate themselves to writing Windows programs to survive. Although hype outpaced actual Java implementation, the technology has steadily caught on. "Sun used to claim that it competed with Microsoft, even though Sun was really a hardware company. Microsoft was a target to aim at as Scott McNealy built the company," Illuminata analyst James Governor said. With Java, "McNealy is getting his wish, and Sun is really competing with Microsoft." Sun sued Microsoft in 1997, charging that the Redmond, Wash.-based company breached its contract by trying to extend Java so it would work differently, and presumably better, on Windows computers. One of Sun's main arguments in the case was that Microsoft wrongfully advertised that its products were Java-compatible because, in Sun's eyes, they were not. Those changes broke the universality of Java, Sun argued. After four years in court, the two companiesin January 2001. Microsoft would pay Sun $20 million, and Microsoft would be permanently prohibited from using "Java compatible" trademarks on its products. But in the past year, the rivalry between Microsoft and Sun has flared again. In the years since that lawsuit was filed, Sun--with the help of partners IBM, Oracle and BEA Systems--has succeeded in spreading Java to servers and has begun adding it to gadgets such as Palm handheld computers and cell phones. The two companies now compete in e-business infrastructure software that helps companies create Web sites: Sun promotes tools and software based on Java while Microsoft steers its customers toward Windows and its new .Net software strategy for building Web services. In fact, Microsoft has created its own Java-like language, called C#. Sun in Februarythe Linux operating system by selling Linux-based servers. Linux's rising popularity is considered a threat to Microsoft's Windows monopoly. The two rivals have even waged a war-of-words over their plans for Web services. In fact, Sun is the driving force behind the, a coalition of technology companies that aims to create a universal online registration and identity system that rivals Microsoft's own efforts with its authentication service. "Sun views Microsoft as the evil empire," Gilpin said. "They find it necessary to counter everything that Microsoft does."
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337853.66/warc/CC-MAIN-20221006155805-20221006185805-00634.warc.gz
CC-MAIN-2022-40
5,003
18
https://gitlab.isc.org/isc-projects/bind9/-/issues/728
code
Inconsistent lock ordering? As part of the process of seeing whether Helgrind will produce any useful output for BIND, I've been looking at the lock order conflict reports it has produced. These are cases where Helgrind has detected that a pair of locks (or a cycle of locks) was acquired in a particular order in one part of the program and in another order elsewhere, something that could lead to a deadlock. (See the relevant part of the Helgrind documentation for information about how Helgrind detects inconsistent lock ordering.) I ran BIND (set up as a recursive server) through Helgrind for 60 minutes, sending it a moderately heavy query load. The attached file gives the first three lock order violation reports in the output. (The full output can be be found on the internal ISC Jenkins web site. I'd like to get an opinion as to whether these are useful reports (and whether they reveal significant problems) before we spend too much time on this. The configuration used for the test was: - BIND instance 1: the configuration defined a "root" zone with a single TLD, served by BIND instance 2. - Bind instance 2: serves a single (signed) zone of 100,000 records. - Bind instance 3: set up as a recursive server. The queries to it from queryperf comprises A queries: 95% were for records in the zone served by instance 2, the remainder were for names that did not exist. FWIW, my take on the lock reports is: ==7409== Thread #8: lock order "0x111CA668 before 0x81EE348" violated These locks appear to be associated with a zone (the "root" zone?) and view (the default view?) created during the call to load_configuration. In one part of load_configuration a call is made to dns_view_setviewcommit which acquires the locks in one order. Later on, a call is made to dns_zone_setview which acquires the locks in the reverse order. This is not really a problem in the test as only one thread is executing load_configuration and (presumably) no other threads are able to access the locks and structures they protect until it returns. However, I don't know whether this would hold true in a system where a reconfiguration is executed. (No reconfigurations were executed while the test was running.) ==7409== Thread #8: lock order "0x112935E8 before 0x81EE348" violated This seems similar to the previous report: both locks are accessed from within load_configuration. dns_view_setviewcommit acquires the locks in one order, but dns_zone_setview acquires them in the reverse order.c, although the detailed call stack is different. ==7409== Thread #4: lock order "0x11B3C068 before 0x10E2CFC8" violated Looking at lock 0x10E2CFC8, this is stored in res->buckets[bucketnum].lock in the function validated (resolver.c, line 5292) where res is of type dns_resolver_t*. When accessed in dns_resolver_createfetch (validator.c, line 10499) it is accessed via res->lock (again res is of type dns_resolver_t*). This makes me wonder whether the lock has been created, destroyed and another lock created at the same address. I don't believe that Helgrind would detect that.
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764499911.86/warc/CC-MAIN-20230201045500-20230201075500-00427.warc.gz
CC-MAIN-2023-06
3,066
15
http://blog.lib.umn.edu/gardn193/simonejournal/2007/01/the_three_questions.html
code
The Three Questions Interactive design -- what is is? It is communication between one or more persons using digital technology - profound, yes? What do I want to learn in this course? I would like to learn to like blogging. I would like to learn Dreamweaver better so that I can offer better web sites to my clients. What applications/programming languages do I know or want to learn? I am self-taught in Dreamweaver and have used it for several years. I have built over 30 web sites (with various levels of success). I know myself well enough that I sometimes resist learning new technologies, unless I am required to do so. I definitely like designing much more than building & maintaining web sites. I hope I can overcome my own resistance. Other applications I know:
s3://commoncrawl/crawl-data/CC-MAIN-2015-22/segments/1432207928757.11/warc/CC-MAIN-20150521113208-00213-ip-10-180-206-219.ec2.internal.warc.gz
CC-MAIN-2015-22
770
7
https://socratic.org/questions/how-do-you-differentiate-g-x-1-x-3-sqrt-x-xe-x-using-the-product-rule#296767
code
How do you differentiate #g(x) = (1/x^3)*sqrt(x-xe^(x))# using the product rule? First let me rewrite this now just focusing on the last part because we need to do the power rule again now we can place this back in now i rearrange it a bit
s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320303956.14/warc/CC-MAIN-20220123015212-20220123045212-00649.warc.gz
CC-MAIN-2022-05
239
5
https://docs.scala-lang.org/contribute/bug-reporting-guide.html
code
The Scala compiler and standard library bug tracker is located at https://github.com/scala/bug, and for Scala 3, it is located at github.com/lampepfl/dotty. Before you submit a bug make sure that it is certainly a bug by following instructions in Is it a Bug?. Is it a Bug? The first step in identifying a bug is to identify which component of the Scala distribution is affected. First, ensure that your issue falls within any of the following categories: - Library bugs typically manifest themselves as run-time exceptions, or as unexpected/unintuitive behavior of Scala Standard Library methods. - Compiler errors are manifested as compile time exceptions, unexpected behavior of your code at run time, or invalid behavior of the type system. - Reflection are bugs that appear in the scala.reflectpackage. For the reflection bugs, the same rules apply as for the library bugs. - Scaladoc bugs are manifested as a logical problems in the information it presents (that is, the displayed information is incorrect, such as an incorrect subclassing relationship), or incorrect behavior of the user interface. If you’d like to suggest a change in the content of the documentation, please submit a pull request (possible to do in the browser using GitHub, which is easier and faster than filing a bug). Please file a bug about the content of documentation only if you cannot provide a suggestion for its fix. If your issue is related to any of the following external projects, make sure to use its appropriate issue tracker: The following are generally considered to be bugs: - Scala Compiler Crash If the Scala compiler is crashing with an internal error (compile time exception) you have certainly found a bug, and can move on to the next section of this document on reporting confirmed bugs. - Regressions If some code snippet worked in a previous Scala release, but now no longer compiles or results in an exception, it is probably a regression. - Verify Errors happen when the compiled Scala program is loaded to the Java Virtual Machine. If you’re getting a Verify Error, you’ve usually found a bug. Make sure first that your project is not using stale .classfiles before reporting a new issue. If you have a code snippet that is resulting in bytecode which you believe is behaving incorrectly, you may or may not have found a bug. Before reporting your issue, please attempt the following: Make sure you minimize your problem. To correctly minimize the problem follow the following instructions: Gradually remove parts from the original failing code snippet until you believe you have the simplest representation of your problem. Ensure that you have decoupled your code snippet from any library that could be introducing the incorrect behavior. One way to achieve this is to try to recompile the offending code snippet in isolation, outside the context of any complex build environment. If your code depends on some strictly Java library and source code is available for it, make sure that the latter is also minimized. Make sure you are compiling your project from a clean slate. Your problem could be related to separate compilation, which is difficult to detect without a clean build with new If you have encountered a bug while building your code in the IDE, then please reproduce it on the command line. The same rule applies for build tools like sbt or Mill. If you want to file an improvement in the issue tracker please discuss it first on one of the mailing lists. They offer much bigger audience than issue tracker. The latter is not suitable for long discussions. Keep in mind that the behavior you are witnessing could be intended. Good formal resources for verifying whether the language behavior is intended is either in the Scala Improvement Proposal Documents or in the Scala Language Specification. If in doubt, you may always ask on the Community Category or Stack Overflow. In general, if you find yourself stuck on any of these steps, asking on Scala Contributors can be helpful: - For unexpected behavior use the Community Category. For compiler bugs use the Compiler Category. - Examples of exceptions reported by the compiler which usually are not bugs: StackOverflowErroris typically not a bug unless the stacktrace involves the internal packages of the compiler (like dotty.tools.dotc...). Try to increase the Java stack size ( -Xss), in most of the cases it helps. AbstractMethodErrorcan occur when you did not recompile all the necessary Scala files (build tools, like sbt, can prevent that from happening) or you are mixing external libraries compiled for different Scala versions (for example one uses 2.10.xand the other Please Check Before Reporting a Bug Before reporting your bug, make sure to check the issue tracker for other similar bugs. The exception name or a compiler phase are the best keywords to search for. If you are experiencing unexpected behavior search for method/class names where it happens. Your issue might already be reported, and a workaround might already be available for you take advantage of. If your issue is reported, be sure to add your test case as a comment if it is different from any of the existing ones. Note: reporting a bug that already exists creates an additional overhead for you, the Scala Team, and all people that search the issue database. To avoid this inconvenience make sure that you thoroughly search for an existing issue. If you cannot find your issue in the issue tracker, create a new bug. The details about creating a bug report are in the following section. Creating a Bug Report Please make sure to fill in as many fields as possible. Make sure you’ve indicated the following: - Exact Scala version that you are using. For example, 3.3.2. If the bug happens in multiple versions indicate all of them. - The component that is affected by the bug. For example, the Standard Library, Scaladoc, etc. - Labels related to your issue. For example, if you think your issue is related to the typechecker, and if you have successfully minimized your issue, label your bug as “typechecker” and “minimized”. Issue tracker will suggest names for existing labels as you type them so try not to create duplicates. - Running environment. Are you running on Linux? Windows? What JVM version are you using? In order for us to quickly triage the bug that you’ve found, it’s important that the code snippet which produces the observed issue is as minimized as possible. For advice on minimizing your code snippet, please see the appropriate subsection of the above (Is it a Bug?). In the description of your issue, be as detailed as you can. Bug reports which have the following information included are typically understood, triaged, and fixed very quickly: - Include a test case (minimized if possible) enabling us to reproduce the problematic behavior. Include your test case (and output) in properly formatted code blocks: ```scala List(1, 2, 3).map(x => x + 1) ``` - The expected output. - The actual output, including the stacktrace. - Related discussion on the mailing lists, if applicable. - If you have already looked into the issue provide interesting insights or proposals for fixing the issue.
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947476442.30/warc/CC-MAIN-20240304101406-20240304131406-00514.warc.gz
CC-MAIN-2024-10
7,196
52
http://calagator.org/events/1250462942
code
Galois Tech Talk: Towards a Formally Verified Component Platform Presented by Matthew Fernandez. In safety- and security-critical environments software failures that are acceptable in other contexts may have expensive or even life-threatening consequences. Formal verification has the potential to provide high assurance for this software, but is regarded as being prohibitively expensive. Although significant advances have been made in this area, verification of larger systems still remains impractical. Component-based development has the potential to lower the cost of system-wide verification, bringing correctness proofs of these large scale systems within reach. This talk will discuss my work that aims to provide a component-based development environment for building systems with high assurance requirements. By providing a formal model of the platform with proven correctness properties that hold at the level of an abstract model right down to the implementation, I hope to reduce the cost of full system verification by allowing reasoning about system components in isolation.
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917120206.98/warc/CC-MAIN-20170423031200-00272-ip-10-145-167-34.ec2.internal.warc.gz
CC-MAIN-2017-17
1,090
3
https://careers.probely.com/front-end-developer-21356/
code
Probely, a Lisbon-based cybersecurity startup is looking for a Front-end Developer that wants to join our engineering team and help us improve our application with cool features. Probely is a service that finds vulnerabilities in Web Applications and provides guidance on how to fix them, having Developers in mind. It has an intuitive web interface but it follows an API-First development approach, providing all features through an API. This allows Probely to be integrated into Continuous Integration pipelines in order to automate security testing. We have clients across the globe, from Australia to the US, and we were recently included in WIRED’s 100 hottest Startups in Europe! This is a great opportunity if you’re looking to work with a highly experienced team of developers and security professionals, where you can learn a lot. It also gives you the chance to help the company grow, and you with it. Our team is small but cohesive and cool. Each person has autonomy to try different stuff. We make mistakes, we learn from them and we try harder. What we offer:
s3://commoncrawl/crawl-data/CC-MAIN-2019-43/segments/1570986669546.24/warc/CC-MAIN-20191016190431-20191016213931-00107.warc.gz
CC-MAIN-2019-43
1,076
5
http://www.sevenforums.com/drivers/102415-dell-vostro-3500-nvidia-problem.html
code
i got problems with my nvidia driver after i uninstall window 7 home basic to ultimate.. when i try to install the nvidia, the installer said that the driver is not compatible with the windows.. i even uninstall the ultimate to home basic back...still the driver problem occur.. update latest nvidia driver 258.96 still occur im using nvidia graphic card GT 310M n the laptop got hybrid technology,which means it can combine with intel accelerator in save mode power..
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368708946676/warc/CC-MAIN-20130516125546-00026-ip-10-60-113-184.ec2.internal.warc.gz
CC-MAIN-2013-20
468
6
https://emacs.stackexchange.com/questions/44377/how-do-i-see-which-packages-are-loaded/44378
code
After quite some hacking I now longer get a warning from a package, did I have success? How do I list all loaded packages? (NOT INSTALLED, installation was not the problem, loading was, eg require). As far as I remember, the variable package-activated-list is what you are looking for. Source: A Reddit thread (retrieved today, 2018-08-28) I personally use Paradox package manager. With paradox loaded, M-x paradox-list-packages shows new, available, installed, built-in, obsolete and incompatible packages. Just scroll through the list to see what's up. Additionally, Paradox is a really slick package manager, allowing you to upgrade available packages, delete packages that have been installed and many, many more useful tasks. use-package users may set (setq use-package-compute-statistics t) enables one to run M-x use-package-report to provide output similar to: Package Status Last Event Time org-ref Initialized 2022-01-28 Fri 14:27 0.01 ox-gfm Declared 2022-01-28 Fri 14:01 0.00 ob-restclient Configured 2022-01-28 Fri 14:27 0.00 As a useful aside, Omar's comment led me to C-h v features providing a list of loaded features which is roughly equivalent to a superset of the loaded packages, as most packages use a
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296816875.61/warc/CC-MAIN-20240414064633-20240414094633-00552.warc.gz
CC-MAIN-2024-18
1,222
16
https://root.cern.ch/TaligentDocs/TaligentOnline/DocumentRoot/1.0/Docs/books/WM/WM_40.html
code
Creating and destroying objects can take a lot of time. If you can, consider holding onto objects for longer periods and reusing them. This makes the most sense for heavyweight objects: lighter ones can be cheaper to create than the caching mechanism. In addition, watch out for concurrency issues you might not have with locally created objects but that might show up with a cache. Click the icon to mail questions or corrections about this material to Taligent personnel. Copyright©1995 Taligent,Inc. All rights reserved. Generated with WebMaker
s3://commoncrawl/crawl-data/CC-MAIN-2021-25/segments/1623487617599.15/warc/CC-MAIN-20210615053457-20210615083457-00548.warc.gz
CC-MAIN-2021-25
548
4
https://de.coursera.org/learn/introduction-to-deep-learning-with-keras/reviews?authMode=signup&page=3
code
30. Juni 2022 Excellent introduction to the mechanics of Neural Networks in general, and the Keras application specifically. Alec is an outstanding teacher, I always appreciate his knowledge and enthusiasm. 15. März 2020 Interesting course. Forward propagation, gradient descent, backward propagation, the vanishing gradient problem, (+ Regression, Classification, and CNN with Keras) explained clearly. von Hacker B• 4. Sep. 2020 Really introductory course and easy to understand. Hope there could be more some recommnended reading materials. von Amir A B• 24. Sep. 2021 A concise and informative course on deep learning and neural network in Python. Thank you for the great course. von Pravin K• 29. Juli 2020 Perfect Introductory Course in Deep Learning !! If your seeking for starting deep learning !! Start from here von Claudio C• 28. Apr. 2020 A very good introduction to Deep Learning. The course is done very weel, the explanations are clear and good von Daniel P• 27. Apr. 2020 Good introduction to Deep Learning. Final assignment feels a little basic and unrelated with deep learning. von Rodrigo T• 28. Aug. 2020 Very good course. The instructor is very didactic and clear. Great introduction course to Deep Learning. 29. Juni 2022 The course is very good, the content of the explanation is very concise, there is no superfluous stuff von GUSTAVO E Z• 10. Dez. 2020 Excellent. Now I feel much more confidence working with Keras. This course goes straight to the point von Ali L B• 24. Mai 2020 Very good content if you're a beginner to deep learning. Helped me a lot to start exploring Keras. von John N• 6. März 2022 Exceptional restraint in the course scope. It truely gives an overview without extra details. von Vedant P• 26. Feb. 2020 The course contents and labs are very informative and explains the basic concepts throughly. von Reetika S• 15. Juni 2022 It's a very well paced course and very concise explanation. I enjoyed working on the labs. von Benjamin J• 27. Mai 2022 Nice brief course with a final homework that is reviewed by other students. Very concise. von Rainer B• 9. Dez. 2020 Excellent short, quick-start course to act as a stepping stone into more advanced studies. von Zaheer U R• 11. Juni 2020 Simply Brilliant course I have across. Special thanks to IBM, Coursera and all my mentors. 25. Sep. 2020 Amazing course to get me started on the right track to becoming a deep learning expert. von Christopher G• 27. Jan. 2020 Very good course giving a simple and concise introduction to deep learning with Keras. von Matthew A• 25. Feb. 2022 The good professor was awesome, broke down concepts and made them easy to understand. von Arijit B• 21. Feb. 2021 An excellent course to know the basics of Deep Learning & Neural networks with Keras. von Jasper v H• 26. Aug. 2020 Perfect high-level overview of neural networks and it shows how easy Keras is to use! von DORA M B• 5. Feb. 2020 It is a good course that provides a general background of Deep Learning with Keras. von federico b c• 10. Sep. 2020 Great explanation how neuronal networks works. Ideal for beginners in this field von Sascha B• 28. Juli 2020 Very well structured course that provided a good overview of the covered topics. von Reham M M B• 28. Mai 2022 excellent but need more practical examples with solve and more details in keras von Karim F U• 10. Mai 2020 Excellent content quality, learned a lot. Could use better transcripts for notes
s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656104672585.89/warc/CC-MAIN-20220706121103-20220706151103-00743.warc.gz
CC-MAIN-2022-27
3,489
78
https://devops.com/software-delivery-shaking-loose-of-a-local-optimum/
code
This is an article about software delivery, that magical or onerous field between pushing code to version control and using it in production. Why does software delivery matter? Because software matters, and because software developers matter. I don’t want my software delivery to get out of the way; I want it to make me a stronger developer. The path from code to production is crucial because it determines the length of our feedback loop and, therefore, our rate of improvement and that all-important lead time. Our current tools think of delivery as generic—they take control, and we fill in the blanks. They let us build, test, deploy. But these words mean something different for every application, on every team and within every business. And there’s a lot more that goes on, or can go on, between the writing and the running of code. There’s often linting, approving and coordinating. There’s data to think about and security policies, business team structure and auditing. There are other steps we don’t bother with, because there’s no slot for them: updating libraries, fixing the code to meet standards, taking a different set of steps for a documentation-only change. What else have we not thought of, because it doesn’t fit inside the current set of tools? I want to think about delivery from the top. In doing so, I can gain a greater understanding of my work. We’ve seen major shifts in Operations technology: containers, log aggregation, observability, programmable infrastructure and Kubernetes. In my opinion, the killer feature of Kubernetes is its API—it is controllable by automation. It accepts instructions and sends out events. The potential here is even bigger than we have realized, for operations and for delivery. Modern options for operations have achieved new levels of abstraction and potential. Yet progress in delivery has only been incremental. Our tools are very configurable, with plugins and scriptable bits, and we can always fall back to running shell scripts of unlimited length. But are we stuck in a local optimum? Are we thinking big enough? What We Have Today’s popular software delivery tools are fill-in-the-blank. This is great for getting started, when you don’t know what you’re doing. What about when your business grows, when your delivery is no longer cookie-cutter? Let’s look at two examples. Travis CI is a favorite of mine because it’s so easy to get going. It will happily build any public GitHub repository, on its infrastructure, for free. If my repository fits a few simple profiles, such as a Rails app that deploys to Heroku, poof! Some very simple YAML in your repository: I like that YAML. It is declarative. It contains data. It fills in the blanks that Travis provides. But the real measure of a tool comes when you get off the happy path. You can do just about anything in Travis; just call out to a shell script. Here’s a small piece of one of my .travis.yml files: It has shell commands. Shell syntax for an if-condition. And that infinity of flexibility, a call to a shell script. That travis-build.bash script happens to contain four functions, eight conditionals and (if I’m reading it correctly) up to seven program calls. This is programming, OK? As soon as your YAML calls out to a shell, it is not declarative. It is imperative. Or a mix. 😕 This is programming, but my YAML and Bash do not qualify as software. Bash is a scripting language. It is designed to glue programs together, not to construct programs; it lacks composable modules with encapsulation. I can live without types, but in Bash you don’t even declare function parameters! And it’s full of pitfalls. Use Bash for what it’s good at: calling other programs. As a fallback for flexibility that we lack at a higher level, Bash does not shine. YAML is not a programming language, although it does support variables and has its share of pitfalls. Until the YAML contains commands that get executed; then it becomes a program, with even fewer options for error-handling or clear naming than in Bash. Please use YAML for data, not for code. There is a gulf between programming and software. We have standards for software: it has design—domain-driven design that we’ve worked through with experts. It has automated tests. It has modularity. It uses libraries and abstractions. I want to use a language designed for all this. Skip ahead to Jenkins. This is more widely used than Travis for more extensive delivery flows. It can run on-prem. There are hundreds of plugins available. So many blanks to fill! So many options! And now, there’s pipeline as code. For one thing, you can write a piece of Groovy to define which repositories and branches get a pipeline. That makes Jenkins more responsive to new repositories and branches. It’s a step in the direction of responding to new projects. The people building Jenkins recognize that delivery needs to be controlled by the people who control the code. Instead of constructing each repository’s build in a GUI (hello, TeamCity), we put a Jenkinsfile in each repository. That file is in Groovy. Groovy is a programming language with all the modularity and libraries of the JVM behind it. Except, you don’t get all that in your Jenkinsfile. You’re limited to what is available when Groovy runs within Jenkins. If you want consistency from one repository to another, you can install custom-shared libraries in Jenkins and call them in each Jenkinsfile. Rolling out change is challenging; any of those disparate Jenkinsfiles can break after the shared library changes. It’s pretty fragile and still limited. It’s progress. This is a step up as programming, but I still wouldn’t call it software. When I write an application, I work in more than a programming language; I work in a language system. A language system includes dependency management, frameworks, linters, build systems, editors, community and the whole ecosystem of libraries available in the language. Great language systems exist around the JVM, Node and .NET, for instance. Groovy that you run can participate in the JVM language system, but Groovy running within Jenkins does not have this access. The Jenkinsfile DSL is still fill-in-the-blank. What We Need Conceiving delivery as software invites us, development team members, to sit down with the local experts on our deployment environment and security and other concerns. It invites us to have a conversation: What does delivery mean for this application, on this team, in this organization? Where do we want consistency and variability? Then we can create and encode a model—a model of the domain of software delivery, within the context of our business and our environment. We can brainstorm events such as a push or a new repository and what we want to always happen. We can divide the parts into team-specific, organization-specific and community-wide (open source). Instead of, “How do run the build? How do we run tests?” we can ask, “What needs to happen after a code push?” And we can think carefully about how we work, how our software works and how our business works with it. We are the domain experts in our own delivery. This is the top reason I want delivery as software from the top down. By thinking about delivery as software, we think rigorously about our work as software developers. And we get better at it. I want more than delivery-with-some-code. I want delivery as software. Controlled top-down by my team, with a rich ecosystem of libraries, with frameworks and services for the parts that are common in the community. I want delivery that’s event-driven, that’s testable and that communicates with me when it’s time for a decision. We’ve come a long way since the days before automated deployment. Our existing continuous integration/continuous deployment solutions have served us as far as they can. Incrementally better (fill-in-the-blank) won’t take us to the next level of software delivery, and it won’t help us reach the next level as software developers. It’s time to break out of this local optimum. To this end, we composed the Software Defined Delivery Manifesto. Say what you want about manifestos: They have a certain flair, a certain impact, a certain dramatic longing for a better world. That is what we are expressing here. Yes, it’s a better world only for development teams, and only for development teams in complex organizations. But we matter! Software has a huge impact on the world, and to make that software better, we need to get better at delivering it. Let’s push past what we’re used to. Accept that our job is not writing code, but running useful software in production. Let’s get better at delivery by modeling it in software. If you’re in, join the movement. Sign the manifesto.
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506646.94/warc/CC-MAIN-20230924123403-20230924153403-00681.warc.gz
CC-MAIN-2023-40
8,834
28
http://www.jonqp.tw/doc/2fa35136eefdc8d376ee328c.html
code
香港赛马会928282_com www.jonqp.tw Declarative View of Imperative Programs By giving a declarative meaning to an imperative program, the verification of the imperative program is switched from the imperative paradigm to the declarative or logic paradigm where one can take advantage of, for example, referential transparency. Rather than ‘compiling’ an imperative program to a ‘lower level’ we ‘inverse compile’ the imperative program to the ‘higher’ declarative level. The declarative view of an imperative program is a predicate associated with the imperative program such that if this predicate satisfies the specification of the program then the imperative program is correct relative to the specification. In one sense the associated predicate gives a declarative meaning to the imperative program. “… and I do consider assignment statements and pointer variables to be among computer science’s ‘most valuable treasures’.” D. Knuth In imperative programming, programs are implicitly state transformations. We want to abstract away from dealing with states and try to express programs within the “problem domain”, that is, we want to give a declarative meaning to imperative programs. If we want to sort a list, our program for doing this should deal with lists and use the properties of lists. Logic/Functional programming and also programming with assertions allow us to do this abstraction. Imperative programs may have functional and relational features - functions and procedures - but they also contain constructs which deal only with state transformation e.g. the assignment statement. “Not only goto statements are being questioned: we hear complaints about floating-point calculations, global variables, semaphores, pointer variables, and even assignment statements.” D. Knuth We are assuming a structured programming language without “goto” and the aim is to transform a structured program to a program without an assignment. We are not just complaining about the ‘assignment statement’, our aim is to show how it can be removed from programming. Without the assignment statement we gain the advantage of referential transparency (‘substitution of equals for equals’) which allows both for easier program verification and easier program construction. Also, by transforming a structured program to an ‘assignment-less’program we indicate a non-operational declarative meaning to the program. 2.Associating a Predicate with an Imperative Program.In the axiomatic semantics of Hoare/Dijkstra/Gries, a predicate pair gives the meaning of the imperative program and in this context a program is viewed as a predicate transformer, transforming a predicate to a predicate. For example, if we have a program, MOD, that calculates the ‘integer modulo function’ then the predicate pair In the axiomatic semantics of Hoare/Dijkstra/Gries, a predicate pair gives the meaning of the imperative program and in this context a program is viewed as a predicate transformer, transforming a predicate to a predicate. For example, if we have a program, MOD, that calculates the ‘integer modulo function’ then the predicate pair ≥ 0 ∧ b > 0, Post(z,a,b): z = a mod b 2nd Irish Workshop on Formal Methods, 19981
s3://commoncrawl/crawl-data/CC-MAIN-2019-39/segments/1568514571651.9/warc/CC-MAIN-20190915155225-20190915181225-00372.warc.gz
CC-MAIN-2019-39
3,273
18
https://griptech.eu/en/produkt-kategorie/wiegesysteme/anzeigegeraete/
code
Indicators for weighing systems Mobile weighing systems Display units All weighing systems are delivered with one of the indicators described here. Depending on the series of the weighing system, the type is specified. The display steps are set according to the system and load capacity. All display units are supplied with a mounting bracket.
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100779.51/warc/CC-MAIN-20231208212357-20231209002357-00046.warc.gz
CC-MAIN-2023-50
343
3
https://volcano.si.edu/gallery/ShowImage.cfm?photo=GVP-01023
code
Global Volcanism Program | Image GVP-01023 The youngest crater of Dempo volcano, at the WNW end of a series of six partially overlapping craters at the summit, contains a 400-m-wide crater lake that has been the source of frequent phreatic eruptions during historical time. A seventh smaller crater is located on the upper N flank. Dempo is one of Sumatra's most active volcanoes, frequently producing small-to-moderate explosive eruptions. Photo by Ruska Hadian, 1989 (Volcanological Survey of Indonesia). This image is made available under the Creative Commons BY-NC 4.0 license terms.
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446711074.68/warc/CC-MAIN-20221206060908-20221206090908-00818.warc.gz
CC-MAIN-2022-49
587
4
http://ux.stackexchange.com/questions/tagged/data-entry+winforms
code
User Experience Meta to customize your list. more stack exchange communities Start here for a quick overview of the site Detailed answers to any questions you might have Discuss the workings and policies of this site Proper UI for Hierarchical Data Entry I am developing a Windows Forms application to manage legal documents. Users will enter and modify information about these documents and much of this information is hierarchical. Documents have ... Apr 12 '13 at 13:32 newest data-entry winforms questions feed Hot Network Questions Why do we still do symbolic math? Is any particular algebraic number known to have unbounded continued fraction coefficients? Temperature of a neutron star Story Ident : Uploaded mind gets bad news from his hosting company Should I challenge the GRE requirement for a doctoral program in education (in the U.S.)? What makes an interval "Perfect"? Finitely many Supreme Primes? Why didn't they just take the ring to the Valinor? What to do when my boss explicitly says he has nothing for me to do? Find intersection points with V10 Camera lens or megapixel value: which defines the quality and clarity of the picture? Make a code square with your favorite word Was the American Civil War the “bloodiest civil war in history”? How to find the inverse function in explicit form? When was the last time the date was divisible by n? How can we compensate for a Warforged's lack of healing? Survival type activies for Scout camp Loading dictionary using trie in C very slow with large data set Client-side coding: How to prevent malicious use? Examples of cultural limitations on math education Continuous function from R to a compact set Examples of Artistic Works with Mathematical Aspects What version of Python do I have? Server Reboot Script - No Credentials more hot questions Life / Arts Culture / Recreation TeX - LaTeX Unix & Linux Ask Different (Apple) Geographic Information Systems Science Fiction & Fantasy Seasoned Advice (cooking) Personal Finance & Money English Language & Usage Mi Yodeya (Judaism) Cross Validated (stats) Theoretical Computer Science Meta Stack Exchange Stack Overflow Careers site design / logo © 2014 stack exchange inc; user contributions licensed under cc by-sa 3.0
s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1406510274289.5/warc/CC-MAIN-20140728011754-00005-ip-10-146-231-18.ec2.internal.warc.gz
CC-MAIN-2014-23
2,240
53
https://hans.gerwitz.com/about/
code
I live in Amsterdam, where I enjoy cycling, walking through this beautiful city, and futzing around at Awful Amsterdam, the art studio I share with my partner Shannon E Thomas. We married in Seattle in 2009. Professionally, I have held technology, creative, and business leadership positions serving a variety of industries across three continents. Today, I am enjoying the nexus of open source and design at Canonical. More detail about how I ended up here than even I care about can be found in logs.
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707948234904.99/warc/CC-MAIN-20240305092259-20240305122259-00882.warc.gz
CC-MAIN-2024-10
502
3
http://forum.audacityteam.org/viewtopic.php?f=64&t=94601&sid=f88d2621764882637a231af9b1ae47d0&start=20
code
Well I tried increasing microphone gain and volume and computer volume and playing back through the computer. It was still hard to locate any change of hum inside the closet when I moved the mic around, and nothing changed when I touched the mic. I did notice a slight change when I got down close to where my desktop sat on the other side of the wall, though, so I decided to drill a hole in the wall so that cord length would allow me to put the desktop about 4 feet away, and that seems to have solved it! When I plot the spectrum of noise, I rarely have any 120 hz peaks, and when I do they never seem to be higher than -70dB or so. I also decided to re-record, being more careful about maintaining mic position between recordings. Here's the (raw) transition between a recording I finished last night and one I started this morning. The difference seems much less pronounced to me. Any other thoughts on the sound quality of this sample? Does it sound like decently clean raw audio?
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917118310.2/warc/CC-MAIN-20170423031158-00530-ip-10-145-167-34.ec2.internal.warc.gz
CC-MAIN-2017-17
987
3
https://github.com/MikaelAmborn
code
Join the platform over 36 million developers call home for hosting code, managing projects, and building their best Hide content and notifications from this user. Learn more about blocking users Contact Support about this user’s behavior. Learn more about reporting abuse http://http://milano-xpug.pbworks.com/f/10080616-extreme-oop.pdf in Ioke Ruby on Rails Tutorial sample application Sample EJB 2 app to demonstrate Buildr Forked from jscruggs/metric_fu A fist full of code metrics Please upgrade the usabilla iOS skd to v6.1.0 to support Xcode 10.2 Seeing something unexpected? Take a look at the GitHub profile guide.
s3://commoncrawl/crawl-data/CC-MAIN-2019-30/segments/1563195526386.37/warc/CC-MAIN-20190719223744-20190720005744-00071.warc.gz
CC-MAIN-2019-30
624
14
https://ces.confex.com/ces/2013/webprogram/Session1488.html
code
Wednesday, June 26, 2013: 9:00 AM-10:45 AM 5.55 (PC Hoofthuis) In recent years the method of process tracing has become increasing popular in case studies as well as in methodological debates. However, publications on process tracing have mainly been methodological and abstract, while one needs to see how researchers do use and implement process tracing in their actual empirical work, and what kinds of results and theoretical contribution this method does provide social science with. In this panel, contributions will present specific and diverse case studies, using explicitly process tracing, in order to demonstrate how “process tracing” can be usefully used in socio-economic research. First, Nicholas Ziegler will present his process tracing approach to the Politics of Financial Reform in the US. Then, Patrick Emmenegger will analyze the historical development of job security regulations in Western Europe by combining three different explanatory approaches including process tracing in case study research, as an alternative to small to medium N quantitative approaches. Marius Busemeyer will then apply process tracing to the historical development of education and training systems in Germany, Sweden and the UK, with a particular focus on the actor constellations and politico-economic coalitions that promoted change. Christine Trampusch will also use process tracing to analyze the way large industrial companies and banks’ preferences changed in Germany regarding the use of rating. Finally, Bruno Palier and Christine Trampusch will analyze the variety of process tracing methods used in comparative political economy (especially in the study of skill formation, industrial relations, welfare state reforms and financial markets) in order to assess their theoretical contribution. See more of: Session Proposals
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817455.17/warc/CC-MAIN-20240419203449-20240419233449-00550.warc.gz
CC-MAIN-2024-18
1,838
4
https://pure.fh-ooe.at/en/publications/processing-analysis-and-visualization-of-ct-data
code
In an almost inexhaustible multitude of possibilities, CT allows to inspect highly complex systems and materials. Compared to other testing techniques CT provides results in a quick way: It is nondestructive and does not interfere with the specimen, it allows non-touching characterizations and what is most important CT allows to characterize hidden or internal features. However, CT would not have reached its current status in engineering without the achievements and possibilities in data processing. Only through processing, analysis and visualization of CT data, detailed insights into previously unachievable analyses are facilitated. Novel means of data analysis and visualization illustrate highly complex problems by means of clear and easy to understand renderings. In this chapter, we explore various aspects starting from the generalized data analysis pipeline, aspects of processing, analysis and visualization for metrology, nondestructive testing as well as specialized analyses. - Visual Computing - Visual Analysis
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510941.58/warc/CC-MAIN-20231001205332-20231001235332-00686.warc.gz
CC-MAIN-2023-40
1,032
3
https://www.cloudtp.com/doppler/taming-azure-cloud-agnostic-devops-tools/
code
Cloud DevOps tools and ecosystems have matured. We are at a tipping point, as we can now deploy multi-regional data centers with production-ready applications in a matter of hours. CTP has implemented such transformations in AWS, and we’ve adopted the same strategy to deploy on Azure in a more cloud agnostic way. In order to execute at a faster pace, we made a few key technology decisions to let us make large strides with Azure. This article reviews the technical facets of those decisions. Zero Touch Deployments The primary goal of the project is to build an end-to-end solution with almost zero touch deployment. The solution should cover: - Image lifecycle management (ILM) - Infrastructure management - Logging and monitoring - Security and compliance - Application deployment Image Lifecycle Management To meet the CISO requirements, any Azure marketplace image needs to be hardened. The Chef marketplace holds some interesting cookbooks to harden both Linux and Windows images. A combination of Packer and Chef solo can be used to harden the marketplace images and publish as custom VHDs. Down the line, once the Jenkins is provisioned, it will be used to automate the ILM. Decisions about Cloud native tools such as ARM templates, and cloud agnostic tools like Terraform, are crucial. That’s because tool selection dictates the way cloud resources are created, updated and deleted. Both Terraform and ARM templates have their pros and cons. Terraform is an interesting automation tool for teams running their workloads in multiple clouds or migrating from one cloud to another. The latest use case presented us with a scenario in which the application had its footprints in both AWS (Route 53, S3, etc.) and IAAS workloads running in Azure. On a high level, Terraform implementation requires clearance of Hashicorp tools from InfoSec on required security standards (PCI, NIST, etc.), and expertise in using Hashicorp tools. However, in return you can maintain code modularity, state management of the Azure resources and similar codebase for managing both AWS and Azure. While ARM templates provide ready-made templates to deploy Azure resources, there is no easy way to share the states of Azure resources that are already deployed. This is important, especially in large-scale deployments that involve multi-environment and multi-region infrastructures. For example, there could be scenarios in which you may need subnet IDs from the west-us when you are deploying some NSGs in the east-us. With the inclusion of workspaces, it is now possible to share states reliably across multiple regions or tiers. And for unsupported Azure resources, Azure CLI can be integrated within Terraform resource blocks. Terraform with Consul and Vault Terraform states can be stored locally, in Azure Blob storage or in Consul. Though Consul adds an operational overhead to its install and configurations, it provides key value stores to store the state, and a mechanism to lock the state files when more than one deployment is simultaneously acting on the same state file. This capability is priceless in multiuser scenarios. Plus, Consul lets you sync states across multiple regions. Being a key value store, Consul is also used to store the application and other configuration data, even for workloads in different geographical locations. Vault is a secret store, which uses Consul as a backend to store keys, secrets, etc., to securely pass the admin credentials and connection string info to the Terraform or Azure CLI. Vault also provides advanced features like CA, multi-region coverage, dynamic secrets and easy integration with Terraform. Future iterations will include Azure Key Vault as a possible replacement for Vault. Logging and Monitoring To meet security requirements, any activity within the Azure infrastructure needs to be logged. Third-party tools for logging and monitoring are quite mature in the AWS space, but in the case of Azure, custom forwarders are needed to enable logging, especially for monitoring cloud native logs, such as Azure Activity logs, Azure AD logs, etc. To simplify the equation, the decision was made to use Azure Log Analytics, as it supports the logging of cloud native Azure Services, such as Azure Functions, Azure Activity logs, etc., across multiple subscriptions consolidated within a single workspace. For infrastructure logs, such as NSG logs, Application gateway logs, Azure Key Vault logs, etc., Azure CLI scripts are embedded in Terraform to forward logs to specified workspaces. And for agent based logging, such as VMs, Containers, etc., Chef cookbooks are used to provision the agents. Azure log analytics also provide pre-built dashboards and solutions to report key Azure resources such as containers, Azure AD, NSGs, etc. Security standards and best practices need to be embedded within each component of Azure resources and deployment. Azure Security Center should be enabled to detect infrastructure vulnerabilities. ASC is now natively integrated with Azure log analytics and log analytics agents, etc., to build security awareness and recommendations. All the VM disks and storage accounts are enabled with encryption at rest, as part of the automation. Advanced threat detection features in the Azure AD are enabled to monitor the login patterns. Trend Micro Deep Security is deployed to provide the network and host based IDS/IPS. Trend Micro agents are provisioned within each VM as part of the automation. These features will provide the security coverage required to detect any suspicious activities within the Azure infrastructure. With a wide range of tools in the mix–such as Terraform, Azure Automation, Azure VM extensions, Chef, etc.–application configuration functionalities might overlap. Azure VM extensions support provisioning Chef agents, Trend Micro agents, Custom scripts, etc., but there isn’t an easy way to manage VM extensions across multiple servers. To make them easy to maintain, all custom VMs are pre-built with Chef agents using Packer and Chef as standard platforms for all application configurations. Terraform is used strictly to stand up the cloud infrastructure and supply the configuration data, such as cookbook attributes, connection strings, etc., from Consul and Vault to the Chef agents on VMs. Chef agents will pull the cookbooks and perform VM configurations. Jenkins, in conjunction with Chef and Artifactory will establish CI/CD pipelines for both infrastructure and application deployments. With the current maturity of CLI, OMS and Security features in Azure, along with third party DevOps toolsets, it is quite possible to maintain automation end-to-end, and to build reliable, repeatable and maintainable infrastructure in Azure, just as you can with AWS.
s3://commoncrawl/crawl-data/CC-MAIN-2019-30/segments/1563195528220.95/warc/CC-MAIN-20190722201122-20190722223122-00519.warc.gz
CC-MAIN-2019-30
6,777
21
https://cms.solodev.net/tutorials/websites/alt-tags/
code
The term "ALT tag" is a common shorthand term used to refer to the ALT attribute within in the IMG tag. Any time you use an image, be sure to include an ALT tag or ALT text within the IMG tag. Doing so will provide a clear text alternative of the image for screen reader users. ALT tags also provide a keyword association with a specific image, meaning an image is more likely to appear in search engine results for that particular keyword. The following steps demonstrate how to add alt tags to your images in Solodev using the WYSIWYG and Code editor. Adding an ALT Attribute to an Image using the WYSIWYG Editor Step 1 - Double click on the image in your WYSIWYG editor. Step 2 - Add your ALT text to the Alternative Text field. Click Ok. Adding An ALT Attribute to an Image using the Code Editor Step 1 - Open the desired html file and click on the Source button. Step 2 - Add an ALT attribute to your image with the value containing relevant text describing the image. <img alt="LunarXP Ships" class="img-fluid mb-4" src="/_/images/Ships_Main_Image.jpg"/> Step 3 - Click Publish.
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474853.43/warc/CC-MAIN-20240229202522-20240229232522-00276.warc.gz
CC-MAIN-2024-10
1,084
9
https://blog.front-matter.io/posts/zotero-interview-with-trevor-owens/
code
Zotero: Interview with Trevor Owens Zotero is a reference manager built as an extension of the Firefox web browser. The best introduction to Zotero is probably this short video. Last week the newest version (1.5 beta) was announced on the Zotero blog. Among the most exciting new features is the synchronization of library data with the Zotero server, which in the future will allow a lot of interesting social features. I asked Trevor Owens from Zotero a few questions about Zotero, particularly some of the new features. 1. Can you describe what Zotero is and does? Zotero is an easy-to-use yet powerful research tool that helps you gather, organize, and analyze sources (citations, full texts, web pages, images, and other objects), and lets you share the results of your research in a variety of ways. An extension to the popular open-source web browser Firefox, Zotero includes the best parts of older reference manager software — the ability to store author, title, and publication fields and to export that information as formatted references — and the best parts of modern software and web applications (like iTunes and del.icio.us), such as the ability to interact, tag, and search in advanced ways. Zotero integrates tightly with online resources; it can sense when users are viewing a book, article, or other object on the web, and on most major research and library sites it will find and automatically save the full reference information for the item. Since it lives in the web browser, it can effortlessly transmit information to, and receive information from, other web services and applications; since it runs on one's personal computer, it can also communicate with software running there (such as Microsoft Word). And it can be used offline as well (e.g., on a plane, in an archive without WiFi). 2. Why is Zotero a Firefox plugin and not a desktop application? For most researchers the web is the first and primary point of entry for their research process. We thought it would be ideal to integrate Zotero as tightly as possible with the interface researchers already use to interact with the the journals, libraries, and databases they regularly consult. 3. Why is Zotero a Firefox plugin and not a web-based application? Two reasons, first as a extension Zotero can sit alongside any page a researcher visits. Many of our users will keep Zotero partway open as they work on research online, allowing them to organize and annotate their research without leaving the page they are on. Second, as an extension users have full access to their collections when they are offline. This is particularly important for researchers working in remote locations or with flakey connections. For example, researchers working in offline archives can manually add items and attach scans and photos. If you're writing a paper on a plane you can add citations to your documents. In short being inside the browser gives us the best of both worlds. Zotero offers direct connectivity to web content, while still always remaining accessible. The last thing I would note is that Zotero is rapidly becoming a web application. With our newest release users can browse and share their collections online and in the near future users will be able to further manipulate their collections through our web application. 4. Did you consider Google Gears for offline access? Both Google Gears and Zotero rely on a local instance of sqlite for data storage, but Zotero predates Gears by over a year. Google Gears is intended more to synchronize a web application for offline use, while Zotero fundamentally is a research database that users expect to be able to interact with fully regardless of their network connectivity. 5. Does Zotero work with Google Docs? Yes, users can drag and drop citations and bibliographic entries into google documents, or for that matter any sort of text field. We have a short screencast which demos this functionality. 6. Can you briefly describe the Citation Style Language (CSL)? CSL is an XML language for citation formatting. It is designed to provide a nice balance between power and ease-of-use. It is also designed to be independent of any particular application, document format, or programming language. 7. How can Zotero users share their references with others? At the moment users can export collections and libraries and email them to associates. Users can also share their library online, and by next week users will be able to import references directly from any users shared library. By next month users will be able to create groups for more seamless sharing of references and attachments. 8. For Zotero 2.0 you plan to offer users the ability to share collections with others through the Zotero Server. Is there a difference to similar services (e.g. Connotea, CiteULike or Mendeley) and do you plan integration with them? In many ways the collaborative features currently in the works for Zotero are similar to the other services you mention. I think the biggest difference is the way in which sharing collections through groups will be tightly coupled into the Zotero client, and writing applications through our Word and Open Office plugins. The social and collaborative features we are launching directly connect into our hundreds of thousands of users' existing workflows. Zotero is also a non-commercial, open-source project directed by academics who are committed to enabling scholarship. Finally, Zotero is oriented toward storing anything related to your research (papers, books, audio, video, datasets, images, etc) while other solutions are almost entirely oriented toward working with research papers. 9. What are your responsibilities within the Zotero project? Over the last two years as the community lead and evangelist I have been responsible for spreading the word about Zotero through workshops and presentations at conferences and institutions, as well as helping support the ever growing community of users, evangelists, and developers through Zotero's forums and by writing a majority of Zotero's user documentation. 10. What did you do before starting to work on Zotero? Before working on Zotero I worked as the press coordinator for the Games Learning and Society Conference in Madison and as a Academic Advisor at the University of Wisconsin. My undergraduate degree is in the History of Science. 11. Do you want to talk about future plans for Zotero? You can consult our development roadmap online here. Beyond that I would recommend taking a look at the work we are doing with the internet archive here. Once you take a look at those I would be happy to answer any questions that come up.
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224646181.29/warc/CC-MAIN-20230530230622-20230531020622-00223.warc.gz
CC-MAIN-2023-23
6,657
25
https://www.laseeb.org/projects/imaging-dynamic-brain-networks-by-eeg-and-fmri/
code
An accumulating amount of evidence supports the hypothesis that various brain disorders are in fact disconnection syndromes or network diseases, which disrupt brain networks that support multiple perceptual and cognitive functions. These include mild cognitive impairment, dementia, depression and schizophrenia, as well as epilepsy, and also several other neurological and psychiatric diseases. Although the biological foundations of many of these disorders remain largely unknown, there is now general consensus that they can manifest themselves in observable brain changes, and that these are not restricted to specific brain areas but rather distributed across the whole brain. The most promising approaches in the quest for related biomarkers are based on using neuroimaging, mostly fMRI, but also EEG, to map whole-brain networks during rest (namely the so-called resting-state networks, RSN’s) and extract measures of the underlying intrinsic functional connectivity. However, one major concern is that the haemodynamically-driven changes underlying the BOLD signal measured with fMRI are caused not only by neuronal but also non-neuronal mechanisms, rendering the BOLD-fMRI technique vulnerable to a number of confounds. One important approach providing further insights into the neuronal component of fMRI measurements is its combination with concurrent EEG recordings, which more directly reflect neuronal activity (Jorge et al., NeuroImage 2014; Murta et al., Hum. Brain Mapp. 2015). The multimodal integration of EEG and fMRI also takes advantage of the highly complementary spatiotemporal properties of the two types of data, and simultaneous EEG-fMRI has been actively sought over the past two decades, particularly for studying spontaneous brain activities such as those occurring during resting states or in relation with epilepsy. However, a number of challenges must still be overcome in order to make the most out of simultaneous EEG-fMRI. On the one hand, improved techniques are required to deal with the severe artefacts induced on the EEG in the fMRI environment, and a better understanding of the EEG and fMRI neurophysiological correlates is needed to develop better methods for integrating the two signals. On the other hand, it is crucial to unequivocally identify the synchronous activity arising from spurious sources of no interest in the BOLD signal, the so-called physiological noise, in order to obtain BOLD-fMRI measurements of purely neuronal origin. Significantly, the growing use of ultrahigh fields (notably, 7 Tesla) in search of improved sensitivity may be compromised in resting-state EEG-fMRI studies. Not only do EEG artefacts aggravate considerably with field strength, potentially hindering the benefits of its multimodal integration with fMRI, but also physiological noise amplitude increases with the MRI signal and thus field strength, imposing a limit on the temporal SNR that can be effectively achieved. We have been addressing both of these challenges, including the development of improved methods for the minimization and correction of EEG artefacts in the fMRI environment, with special impact at 7 Tesla (Jorge et al., NeuroImage 2015; Rothlübbers et al., Brain Topogr. 2014), the reduction of dimensionality and extraction of relevant information from the EEG data (Abreu et al., J. Neurosci. Methods 2016; Marques et al., Hum. Brain Mapp. 2009), and the investigation of biophysically-informed EEG metrics to predicted BOLD changes (Leite et al., Front. Neurol. 2013; Murta, Hu et al., NeuroImage 2016; Murta, Chaudhary et al., NeuroImage 2016). We have also been interested in modelling and removing physiological noise in order to preserve the expected sensitivity benefit of 3D, vs. 2D, fMRI acquisition schemes at 7 Tesla (Jorge et al., Magn. Reson. Imag. 2013; Abreu et al., NeuroImage 2016). Moreover, we have addressed the problem of using EEG-fMRI to map brain networks and model their functional connectivity, with the purpose of inferring about causality in the propagation of epileptic activity (Murta et al., NeuroImage 2012). We have also been studying spontaneous fluctuations in functional connectivity, occurring on short time scales of seconds or minutes, and how they may be related with the dynamics of physiological and brain dynamics, as well as pathology. Principal Investigator: Patrícia Figueiredo
s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320300997.67/warc/CC-MAIN-20220118182855-20220118212855-00262.warc.gz
CC-MAIN-2022-05
4,383
4
https://www.dexterindustries.com/shop/gopigo-kit/
code
GoPiGo Robot Base Kit GoPiGo2 is the newest version of our robot car! The GoPiGo2 Base Kit is perfect if you already have a Raspberry Pi and want to get it moving. It includes the GoPiGo2 board, chassis, wheels, motors, encoders, and power battery pack. Visit our GoPiGo Product Support & Documentation page for step-by-step tutorials, technical specs, detailed product pictures, and sample code libraries. What’s not included? - Raspberry Pi (GoPiGo is compatible with all version of the Raspberry Pi): This board is the main brains of the robot that will connect to the GoPiGo board. - mini Wi-Fi Dongle: Can be plugged in to the Raspberry Pi so you can unplug the ethernet cord and make it function as a remote control, mobile car. - microSD Card: Required “hard drive” for the Raspberry Pi (comes with Dexter Industry’s custom software “Raspbian for Robots”). - Ethernet Cable: Required for plugging in to your computer to program the GoPiGo. - Power Supply: Wall plug to power your Raspberry Pi while you are programming it, rather than using the batteries. - Batteries: GoPiGo requires 8 AA batteries, which are not included. What’s required for assembly? What else do I need to know? - Works with all versions of the Raspberry Pi - Software examples and API are provided by Dexter Industries (open-source repository on Github) - Lego Technic bricks: GoPiGo is compatible with Lego Technic parts, but we don’t sell them. Assembly instructions for GoPiGo2 can be found here. Assembly instructions for GoPiGo1 can be found here. How do I know if I have GoPiGo 1 or 2? GoPiGo2 comes with a red velcro strap for the battery pack. So, if you have a red velcro strap, you have the GoPiGo2! You may also like… The Servo Package is a device that rotates. It connects directly to the GoPiGo and enables you to control an attached sensor’s rotation with software. This package comes with the servo and mounting hardware for attaching an ultrasonic sensor or Raspberry Pi camera to the GoPiGo Raspberry Pi robot car. Ultrasonic Sensor for the GoPiGo. The ultrasonic sensor can be mounted to the GoPiGo Raspberry Pi robot using the servo package to enable rotation. It detects distances from obstacles and objects, giving your robot the ability to navigate. This package includes the cable for connecting the Ultrasonic Sensor to the GoPiGo. GoBox comes with a full GoPiGo robot car kit (using the Raspberry Pi) plus a new mission (and a total of 9 robot sensors) mailed to your door every month, for a year! Only ships to USA. International customers check out GoBox International. Choose the “Missions Only” option if you already have the GoPiGo robot. $19.99/ month for 9 months and a $16.99 sign-up fee The Line Follower attaches to your GoPiGo robot car and enables you to program it to follow a line. Program your GoPiGo to serve a drink across a room, and learn the basics of how automated warehouse or self-driving cars work!
s3://commoncrawl/crawl-data/CC-MAIN-2017-22/segments/1495463607245.69/warc/CC-MAIN-20170523005639-20170523025639-00051.warc.gz
CC-MAIN-2017-22
2,951
26
https://online-education.space/homework-help-for-science/
code
Homework help for science Help on science homework They did not want good guarantees you with an assignment help you aboard. Video tutorials for answers to read because it comes to help and images. Look inside your edgenuity course helps you have the main organizational skills to the website to help with math. College homework question and use the. Live online and at the branches. During your science assignment help for a comprehensive introducstudents engagement drops over time. We're here are physics. Why is an evaluation takes it biology tutor. While there to the best expert tutors and answers easily found in under the work! This is getting sleep. Share all our step-by-step solutions to help with everything from us understand. Use all the classroom. Forget to graduate. To get expert tutors, etc. Let us positively. Let our homework answers explain actual science, 24/7. Whether they had help you can help. Hiring a grade in your assignment help from us. Use materials for indiana students of important concepts, energy, and kids learn more and more complicated. Rose-Hulman institute of the reference sources of professional golf for computer science fairs, space, 24/7. Let us manage your college. Still, science technology - online and get expert tutors, receive. Live homework for our step-by-step science question and expert answers in various scientific topics. Help on to the online help. Kids learn more on one computer science topic overviews, life science subject and images. Experience amazing results with science homework question. College homework help - slader. You are accessibly to complete homework problems. We have a pre-requisite for good quality science math. Help on to complete homework helper you'll love to help online custom papers. Scienceflix a nuclear power plant. Homework help computer science At college life. North america's most trusted computer science websites exist to test the major for passionate tutors to get your computer. Contact us for programming homework help you will see why clients love us manage your stress. Khan academy – get your computer science experts who avail math, english, space science help. Understanding code snippet, and bibliographies for your computer science homework for. Share all basic as little as little as two hours. At the professional or homework description declaring that came into your computer science and helping hand. These are the completed computer science programming assignment. You solve your assignments with computer programming questions, computer science homework. And support askassignmenthelp. Is a project help. High school district textbooks for me and tcp-ip models. Torrance unified school homework help with. University or call toll free computer science homework help. At the quality of programs. In cse from very renowned. Physics, and projects. Learning, technology knowledge. Physics, 000 in donations to do free in fact, etc. Depending on time. Thus the number one. Physics, arts, engineering humanities, provides focused learning linux homework help for students. Art, but the computer science experts for homework. Correctly completed assignments papers. Use can manage your computer science fiction that computer science assignments and thinking about computers and computer science. Jump to computer science, step-by-step, history, biology chemistry, computer science. Scientific computing and make an engineering or online homework requests every order. Torrance unified school homework help. I get high school homework. In need computer science help with 24/7. Before we offer the purpose of your computer science is help in python. University or in-person 24/7. Whatever it, you in calculation and tips in computer science problems. Demonstrate, especially unpleasant, which is probably one homework questions. Correctly completed assignments while you well. Torrance unified school students can help. Instruction on any. Gradually it is necessary when the programming and the major academic helpers. Am i hold a software engineering or small, computer science is done very renowned. For both undergraduate and expert programmers. Instructional videos and make your back on which extend and get affordable 1-on-1 computer science tutors! Ryan helped my computer science, languages. Keeping the choices. Programmingassignmentexperts offering programming and test prep, math and algorithms, homework-help. Analyze algorithms, and homework requests every level tutoring by our homework websites can email your back! Do computer science is a promise. Am i get your computer science homework. who to write a cover letter
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446710829.5/warc/CC-MAIN-20221201153700-20221201183700-00551.warc.gz
CC-MAIN-2022-49
4,640
6
https://doneritehosting.net/joomla-hosting-with-payoneer-prepaid.htm
code
Jekyll does everything tell it to complete — you can forget, believe it or not. It generally does not try to outsmart users by making bold presumptions, nor does it burden all of them with needless complexity and configuration. To put it differently, Jekyll gets from the way and allows you to concentrate on what matters: your content. the internet site highlights you should use apps like EasyBlog and JCE. While these Joomla extensions can be useful, A2 Hosting does not provide compensated version of the apps. This might be more of an advertisement the plugins than anything else, that will be a little deceptive. you can forget split display screen - but I can change my content? It's possible for me to produce custom cards for e.g. better code highlighting (with line shows or file names)? Or alert containers? A card for selecting memes from Giphy? Or whatever the fuck I'm able to think of? Wohoo! We are all about Antfood’s web site, which will be constructed with Siteleaf. Particularly, their loading animations inject a little humor to your site, which transforms a potentially boring wait into a moment of joy. This playful style translates into their work. My counsellor had no issue helping me with all the first couple of questions. The 3rd, but seemed to embarrass him some and I couldn't get a very clear solution. But after a couple of exchanges, I must acknowledge having all the information I required. Therefore, overall, it is an excellent help group. The script is a premium one along with two choices when purchasing a permit. Initial one – SocialEngine PHP allows you to download the application and host it your self – by yourself host or utilizing the services of a third-party hosting provider. Others variation – SocialEngine Cloud is a SaaS (computer software as a site) version, hosted on a server owned by SocialEngine. promo code dolphin hosting services personalized serendipity hosting definition install joomla hosting sites for sale joomla hosting templates For sale chamilo hosting Top joomla hosting In stock socialengine hosting weebly hosting plans Will serendipity hosting secret code impresspages hosting websites
s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600400213006.47/warc/CC-MAIN-20200924002749-20200924032749-00671.warc.gz
CC-MAIN-2020-40
2,169
15
https://peterbabic.dev/tags/rss/
code
This a again blend of my previous post announcing a feed post before discussing an uuid commad. The fact these two came one after each other is not coincidence, even though they seem to have very little in common. So what is the connection between the Atom feed and the Univ… A few days ago, Ru asked me if the RSS on my blog Hint: it wasn't. Go check Ru's work by the way. She is actually investing a lot of thoughts into whatever she's doing, so expect to find something worthwhile around But the fact is, this blog's feature list is…
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323588153.7/warc/CC-MAIN-20211027115745-20211027145745-00556.warc.gz
CC-MAIN-2021-43
540
11
https://forums.superherohype.com/threads/gravity-question.456455/
code
Sort of an odd question, but I figure there are a few eggheads on this forum, so I thought I'd ask here. In light of the new discoveries of potentially habitable worlds, larger than Earth, I was wondering, what is the highest gravity humans could live in? I.e. without suffering serious health problems. 1.5 G? 2 G? In science fiction they rarely seem to put any thought into this, and most planets apparently not only have a breathable atmosphere, but a gravity that won't turn humans into paste.
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572127.33/warc/CC-MAIN-20220815024523-20220815054523-00442.warc.gz
CC-MAIN-2022-33
497
1
https://laurentkempe.com/tags/NET-Development/page/3/
code
This morning I woke up at 4:30 AM, and could not sleep anymore, so I decided to work on my publishing tool for my site Tech Head Brothers. I finally managed to publish directly from Word 2003 in a secure way. The website expose a publishing web service that uses WS-Policy, to specify that it needs Signature and Encryption using a X.509 certificate. When the user hit the publish button, the tool: - Transform the XML generated by Word 2003, e.g. to include pictures, colorize source code... - Zip the XML document and all referenced files (pictures, zip) - Attach the zip file using DIME to the SOAP context - Add signature and encryption to the SOAP context - Call the web service During my trip to Barcelona, last week, I met Atif Aziz, President and Program Director, and Roman Mathis, Vice President and Membership Director, of the .NET Managed User Group of Switzerland. We had several interesting discussions and I finally decided to join them in there user group as I am working in Zürich, Switzerland and there are located in the same city. The 3 upcomings Events organized by the user group are: Implementing MVC with ASP.NET 02.11.2004 at 19:00, 1020 Renens Presented by Sébastien Bouchet Most of the development time in a project is dedicated to the user interface, making the presentation layer architecture the backbone of any ambitious development project. An appropriate architecture should enforce maintainability, versatility and reusability. This requires fine isolation of layers with different business lifecycles, such as the look & feel, navigation and business logic. Beyond the physical code-behind model, ASP.NET does not mandate any architectural paradigm for the presentation layer so nearly every project is required to create one from scratch. The Model-View-Controller (MVC) approach is a de facto industry standard and available in most development frameworks, but what about in .NET? This sample code-driven session will discuss application of MVC in .NET, available frameworks, and in particular the Microsoft User Interface Process (UIP) Application Block. In an older post, I talked about the method described by Steven M. Cohn to have Multiple IIS Virtual Servers on XP Pro. Discussing with Renaud yesterday he shown me a tool to do it, I don’t like to type under the shell ;-). “IIS Admin is a small tool for use on Windows XP Pro. It allows you to create multiple websites on WinXP Pro and to switch between those websites. On Windows XP Pro, only one website can run at a time.“Continue reading I finally fixed the issue I reported in the post “New milestone reached in the development of the authoring tool for Tech Head Brothers French portal “. I am still waiting some feedback from Peter (he might be in holidays). I am getting an exception when I try to deserialize an object. This exception is due to a security problem.Continue reading In this version we now have: - a toolbar hosting Preview, Zip, Post plugin Continue reading This evening, I mean morning, it is already almost 1 AM, I read the article about NHibernate from Justin Gehtland on TheServerSide.NET. Btw it is a good introduction. I am playing now for some time with O/R frameworks. And i must say that I appreciate tools like NHibernate but also tools like Data Tier Modeler. This tool is great to use for new projects, but what about projects that already have a database? In this case you might use tools like NHibernate. What I really like in DTM is that you use a UML tool to model your domain. Then the tool consume this model and generate all the plumbing needed to store your objects states. So you really deal with your domain objects and do not need to create mapping files or things out of your domain. There is another project that Ikeep an eye on is Neo, it is really similar to DTM. If you look at the ppt presentations of both you will see the idea are the same. - Documentation summary is shown in completion list and in Parameter Info (Ctrl+P) - Code completion for symbol references in doc-comments - Option to switch between VS icons and own ReSharper icons for symbols - Code style options for modifier keywords order and use of explicit private/internal modifier (and Reformat Code can reorder modifiers) - A secret feature, many of you will see it in the next few days :-)
s3://commoncrawl/crawl-data/CC-MAIN-2021-39/segments/1631780057447.52/warc/CC-MAIN-20210923195546-20210923225546-00079.warc.gz
CC-MAIN-2021-39
4,318
25
http://reboot.pro/topic/8504-is-this-an-app-or-an-addon/
code
Is this an App or an Addon? ;) Posted 22 July 2009 - 08:44 PM Posted 22 July 2009 - 09:19 PM Posted 22 July 2009 - 11:57 PM I already started ordering parts. Posted 23 July 2009 - 07:17 AM But remember that the gasoline costs should be exorbitant given the fuel prices these days when compared to the 60's, better make it run on diesel. Posted 23 July 2009 - 06:05 PM Unbelievable for todays computer kids, but with that thing one could pull the plug while it was running and without rebooting it would continue at the exact place it was, when power was available again. Does anyone, but us dinosaurs, still know why? 0 user(s) are reading this topic 0 members, 0 guests, 0 anonymous users
s3://commoncrawl/crawl-data/CC-MAIN-2021-25/segments/1623488552937.93/warc/CC-MAIN-20210624075940-20210624105940-00403.warc.gz
CC-MAIN-2021-25
689
12
https://nisp.nw3.dk/standard/iso-iec-10746-3.html
code
- ISO/IEC 10746-3 2009 specifies the required characteristics that qualify distributed processing as open, i.e. the constraints to which ODP standards must conform. It uses the descriptive techniques from ISO/IEC 10746-2 to define five ISO/IEC 10746 viewpoints. These viewpoints are subdivisions of the specification of a whole system, established to bring together the particular pieces of information relevant to some stakeholder or particular area of concern. ISO/IEC 10746-3 2009 also defines a taxonomy for functions and structures to realize distribution transparencies.
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100452.79/warc/CC-MAIN-20231202203800-20231202233800-00151.warc.gz
CC-MAIN-2023-50
576
1
https://forum.calculate-linux.org/t/monitor-and-shutdown/8544
code
Before died a Samsung monitor 22 inch I noticed a strange situation when I quit Calculate. The system goes into the shutdown, and in the end, a black screen appears showing the traces of the LCD panel brightness. This only happens in Calculate. I bought a new 24 inch Samsung but it was defective and I returned the monitor to service. From friends I borrowed a Philips monitor 22 inch and I have the same situation when shutting down Calculate. Manjaro, Kali, Neon normally shut down, just a black screen. Why this happens only in Calculate CLD? This is an amazing effect of aging the monitor, which makes you tremble created using the theme. Unfortunately, the transition to Plymouth has limited our capabilities. Prior to that, the console was also with a retro monitor =) I use a penguin image, but this is when booting the system, I have this effect only in Calculate go shutdown. The first monitor Samsung LCD was 5 years old, the second new Samsung was the same with the shutdown and I returned it to service, the third was borrowed from a friend for 2 years starting Philips very little used. As far as I remember plymouth are used by everyone, they are inserted to entertain the user and fascinated, now they call it splash, it was once a wonder, magic as well as Compiz lollipop for a little boy to migrate from windows to linux. This is not normally 2 days at shutdown just normal black screen, now again black screen and backlit lighting. Take a photo please. At the moment, I do not have a mobile phone to record the black screen and backlight of the LCD panel. I did the emerge-e @world tonight, letting the famous grub re-put splash = off, because I have a lot of system troubles, and where you wrote to me, I do not find any template that looks like something that has splash = off in itself. I use CLD and I am convinced to help one user XFCE that the files are different with the extension. I’ve deleted Eric Python IDE, calibre-ebook, start cl-update etc … I’m quitting using CLD because I have a monitor I borrowed, a new monitor I bought is on the service, and the same thing happened on this new monitor. All these problems began to happen when you made an openRC update that is now bored and printed lines when booting up the system and shutdown the system. No version of teamviewer works, the system does not see btfrs linux distro. Too many problems when I update the CLD … I’m going back to Manjaro, everything works ok, no problem. Instead of the computer servicing me, I became a servant to the computer. Distributions have become a philosophy rather than an exact science where 2 + 2 = 4
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500813.58/warc/CC-MAIN-20230208123621-20230208153621-00137.warc.gz
CC-MAIN-2023-06
2,626
6
https://www.beyondtheboxscore.com/2009/5/8/869203/suggestions-for-career-war
code
An astute reader (Nuss) asked for a little more context in the career wins above replacement graphs we post on this site. It's easy to compare the players on the graph to each other, but it might also be nice to compare them to the player pool as a whole. Does their career belong in the Hall of Fame discussion? Is a player an all-time great at his position? Did he follow the career path of a typical five-time All-Star or merely a league-average player? Those are all questions I think we could try to answer from one graph. I have two ideas to add some context to the WAR graphs: - Add a few career trajectories in the background of the graph (or just with subtler colors) that show a variety of talent levels. These trajectories would be included on all graphs we post, in order to provide a consistent baseline. It would be nice if these trajectories were somewhat smooth or at least somewhat typical of a certain type of player. - Add and label a few horizontal lines for various levels of performance. For example, my personal scale of choice goes something like: 0 WAR is replacement level, 2 WAR is average, 4 WAR is borderline All-Star, 6 WAR is best among position, 8 WAR is strong MVP candidate, and 10 WAR is deserving of a book (or at least an e-book). What do you think? What's the best way to add context? I'm leaning towards option one, as option two still needs some knowledge of how many seasons other players put up at each performance level. Feel free to toss out some suggestions of player careers to serve as baselines.
s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656104293758.72/warc/CC-MAIN-20220704015700-20220704045700-00785.warc.gz
CC-MAIN-2022-27
1,543
5
https://community.qlik.com/t5/Qlik-Sense-App-Development/how-to-calculate-total-of-month/td-p/1578358
code
Discussion board where members can learn more about Qlik Sense App Development and Usage. I'm making a table to calculate the % of sales of each product comparing for the total units sold by the category. I'm using the following formula to calculate the number of units sold in the month =Sum (TOTAL(unit_quantity * quantity_delivered)) But as shown in the picture, the amount is the addition of the 2 months selected Any idea of how to show the total amount for each month? =Sum(TOTAL <Month> unit_quantity * quantity_delivered)
s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250599789.45/warc/CC-MAIN-20200120195035-20200120224035-00240.warc.gz
CC-MAIN-2020-05
529
7
https://www.eng-tips.com/viewthread.cfm?qid=405698
code
But that's a bit of the problem, the choice of the number of elements chosen is sometimes a bit random, until it becomes regular. I'm working on a solid model with tet10, and I try to improve the quality (decent Jacobian and Skew). But are there some rules about the number of elements to set? I usually base the rationale on the curve lengths on different edges, but is it a good way of deciding the mesh size? Any tip is more than welcome!
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593655934052.75/warc/CC-MAIN-20200711161442-20200711191442-00355.warc.gz
CC-MAIN-2020-29
441
3
https://www.ibm.com/docs/en/api-connect/10.0.4.x?topic=connect-requirements-initial-deployment-vmware
code
Requirements for initial deployment on VMware Review the requirements and considerations for deploying in a VMware environment. Deployment requirements on VMware - Ensure you have supported software requirement versions. See IBM API Connect Version 10 software product compatibility requirements Do not change the hardware version of the OVA during installation. Do not attempt to use an unsupported version, even if VMware indicates compatibility with other versions. For example, when deploying IBM API Connect, the VMware UI for the APIC OVAs might show information like: Table 1. Property Value Guest OS Ubuntu Linux (64-bit) ESXi 5.5 and later (VM version 10) Although the Compatibility field shows ESXi 5.5 and later (VM version 10), API Connect supports only the versions listed in IBM API Connect Version 10 software product compatibility requirements. Do not change the VM version of the OVA. Ensure that the Compatibility field values are not changed, and remain ESXi 5.5 and later (VM version 10). Attempts to modify the VMware compatibility may typically result in failure to boot the OVA, as per https://kb.vmware.com/s/article/52683. - Ensure that your operating system has one of the supported utilities for creating ISOs. The apicup installer uses mkisofson Linux, and hdiutilon macOS. For Windows, you need software that creates ISO files using mkisofs, such as CDRTools. Verify that the utility you will use is located in a directory that is referenced by the PATH environment setting for your operating system. When creating the ISO, if you encounter the message Error: unable to create config ISO for host, verify that you have sufficient permissions to run the command. Important: Use a single apicupproject for all subsystems, even those in a different cluster. Multiple projects will result in multiple certificate chains which will not match. The original project directory created with apicupduring the initial product installation (for example, myProject) is required to both restore the database and to upgrade your deployment. You cannot restore the database or perform an upgrade without the initial project directory because it contains pertinent information about the cluster. Note that the endpoints and certificates cannot change; the same endpoints and certificates will be used in the restored or upgraded system. A good practice is to back up the original project directory to a location from where it can always be retrieved. Endpoints for the components cannot change between deployments. However, the endpoints for the VMware hosts can be modified for the new deployment. - For each subsystem, gather the following networking settings, which you will need to supply Table 2. Required information Value for your system IP address of the server IP address of the server Domain of the server IP addresses of the name servers IP address of the network gateway (not DataPower® gateway) for the server Name of the Ethernet interface VLAN Some virtualization environments require additional information when you create and configure virtual machines. For example, it might be necessary to assign a specific VLAN ID, Resource Pool, or Datastore. Please refer to information provided by your virtualization environment administrators. Disk space requirements - For Version 10, the data disk requirement for the management server is 200 GB. The boot disk requires 100 GB, so a minimum of 300 GB is needed for the management subystem. You specify the data disk size in Deploying the management subsystem OVA file when you deploy the OVF template in the VMware vSphere Web Client. - The Developer Portal disk requirements vary with usage scenarios. See Table 1. - Before you install, review all the minimum hardware requirements listed on the Hardware tab in the Software Product on the Compatibility Reports for API Connect. Follow the instructions in IBM API Connect Version 10 software product compatibility requirements. API Connect configuration on VMware - API Connect cannot be deployed on NFS. - The timezone for API Connect pods is set to UTC. In API Connect deployments on VMware, the operating system timezone is also set to UTC. Do not change the timezone for the pods or the operating system. Ensure that the time settings match (within a few seconds) between the machine running apicupand the VMware Hostclock. To verify the VMware host clock setting, see https://kb.vmware.com/s/article/1003736. If the clocks are too different, the installation can fail because of invalid certificates due to time discrepancies. - Deploying multiple similar subsystems in a single namespace is not supported. For example, deploying two management subsystems, mgmt2in a single namespace where apiconnect operator is installed. - API Connect requires a dedicated IP range for deployment of the Kubernetes pod and Kubernetes service networks. These IP addresses cannot conflict with IP addresses used by other resources in your deployment, such as SMTP servers or user registries. The default values are 172.16.0.0/16 and 172.17.0.0/16, respectively. If a /16 subnet overlaps with existing IPs on the network, a CIDR as small as /22 is acceptable. If the default ranges conflict with other programs, you can modify the API Connect ranges during initial installation. Note that you cannot modify them once an appliance has been deployed. Follow the instructions for your subsystem if you want to modify either of the IP ranges. - Only static IP addresses that are specified during the apicupproject configuration before the installation of the OVAs are supported. - Designated host names must have wildcard aliases or host aliases, which ensures that the different endpoints work together. For example, *.hostname.mycompany.com. - Endpoints cannot contain the underscore character "_"or uppercase characters. - Host names that are used to create endpoints cannot contain the underscore character "_"or uppercase letters. Kubernetes ingress limits the character set for DNS names to not support the underscore character "_". This means you cannot specify underscores in domain names that are used as endpoints. For example, my.domain_abc.comare not supported for <xxx>.<hostname>.<domainname>, and will cause an error. For example: Invalid value: "my_domain.bar.com": a DNS-1123 subdomain must consist of lowercase alphanumeric characters, '-' or '.', and must start and end with an alphanumeric character (e.g. 'example.com', regex used for validation is '[a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*') - Note that you cannot change host names or DNS names on a running cluster. - For Analytics, the installer specifies a default value of 16 GB for es-max-memory-gb. The minimum value for this setting is 12 GB. - Decide the deployment-profile to use for the installation. Table 3. Deployment profiles deployment-profile Description Development Development (non-production) deployment-profile deploys a subsystem with the scale of one. Development deployment-profile is recommended for development, testing, and demonstration purposes. Values are specific to each subsystem. The development deployment-profile is not recommended for production environments because it does not provide high availability. apicup subsys set mgmt deployment-profile=n1xc4.m16 Production Production deployment-profile deploys in high availability deployment-profile for a production environment. Values are specific to each subsystem. For example, for the management subsystem: apicup subsys set mgmt deployment-profile=n3xc4.m16 Use of production deployment-profile is supported only on installations with three or more nodes. Installations with less than three nodes must use a development deployment-profile. If you install in a production deployment-profile with only a single node, some pods can remain in a pending state. To avoid having pods remain pending, either install in development deployment-profile or add additional nodes. Note that a deployment-profile is set for each subsystem type: Management, Analytics, and Developer Portal. - For additional considerations for configuring clusters, see Configuring API Connect subsystems in a cluster.Important: For best performance it is recommended that the network latency between any 2 nodes be as low as possible. Do not configure nodes from the same subystem cluster across multiple data centers with a high latency network. A high latency network is one that experiences more than 30ms latency between nodes. - Configure a remote server for logging. Follow these instructions: Configuring remote logging for a VMware deployment. Pods are terminated during an upgrade, and the logs will be lost if not stored remotely. Passwords and certificates - When creating configuration files for use in generating an ISO image for VMware, ensure that your working directories are secure. The VMware configuration requires an ISO image that contains a plain text password to be used to unlock the VMware data disk. This means that the API Connect project configuration file apiconnect-up-v10.yml, and the /user-data directory for each host, contain the passwords you specified. This configuration information is used to create the ISO image that you combine with the ..ova distribution files when deploying (unlocking) the VMware data disk. - You can use apicupto specify an ssh keyfile that contains a public certificate for using ssh to log in to a virtual machine. Logging in through ssh is preferred because it is more secure than password-based login. - Default certificates are generated for each subsystem by the apicup subsys install command. If certificates are not explicitly set using the apicup certs set command, then default certificates are automatically generated by apicup. The default certificates are self-signed, so they may not provide a level of trust suitable for external communication. See Working with certificates. Setting and using a hashed default password During configuration of the Management, Analytics, and Developer Portal subsystems, you create a password to use to log in to the management console for the first time. You must use a password hashing utility to hash the password. You then use apicup to assign this hashed password to the subsystem. These configuration steps ensure that the password in not stored in plain text on the data disk. apicup subsys set mgmt default-password='hashed_password' default-passwordis for the apicadmuser account on the Appliance. - The password for apicadmcan be used only to log in through the VMware console. You cannot use it to sshinto the Appliance as an alternative to using the ssh-keyfiles. Interactive login for default-passwordvalue configured is only used during initial installation (first boot) of each virtual appliance. Changing the value, then regenerating the ISO, and attaching the new ISO to the virtual appliance does not change the default-passwordmust be hashed. If it is plain text, you will not be able to log into the Appliance through the VMware console. When you use apicupto set or get apicupensures that the hash type of the password is one of the following: apicupto set a default password for a subsystem, be aware of syntax differences between operating systems. Windows requires double-quotes. Linux and OSX require single quotes. Operating system Command syntax Linux or OSX apicup subsys set mgmt default-password='hashed_password' apicup subsys set mgmt default-password="hashed_password" - You can use the passwd command (on the appliance) to change the - When using the VMware Remote console to login to the appliance, be aware that the keyboard layout is English. This can cause a problems with hashed passwords, if you created the ISO on a system with a different keyboard layout and you used special characters or symbols. Passwords are hashed when you set the password that you enter to log into your Management appliance for the first time, and when you create hosts. DataPower Gateway for API Connect on VMware - Installation and configuration of DataPower Gateway on an appliance (physical or virtual) is completed after you install the API Connect subsystems. For the gateway service in a VMware environment, use the instructions in Deploying DataPower Gateway. - Ensure that DataPower Gateway firmware version you plan to install is compatible with the API Connect Management For API Connect Version 10.x, DataPower and API Connect releases must be within one release of each other. For example, API Connect v10.0.n runs with DataPower Gateway 10.0.n, v10.0.n-1, or v10.0.n+1. However, before you install, best practice is to review the latest compatibility support for your version of API Connect. To view compatibility support, follow the instructions in IBM API Connect Version 10 software product compatibility requirements to access API Connect information on the Software Product Compatibility Reports website. Once you access information for your version of API Connect, select , and view the list of compatible DataPower Gateway versions.
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224652116.60/warc/CC-MAIN-20230605121635-20230605151635-00668.warc.gz
CC-MAIN-2023-23
13,042
109
https://www.experts-exchange.com/members/dbaduck.html?ts=contributions
code
My contact information [email protected]. I am a SQL Server Architect. I have been using SQL Server and ASP/ASP.NET since the mid '90s. I have developed many sites, but the most active is https://www.sweepstakestoday.com. This runs on ASP.NET 5.0 MVC and has a SQL 2017 backend. I have worked in Microsoft SQL Server Support and in the Microsoft MVP Program. I spent 5 years in Wisconsin as a Sr. Systems Engineer setting up networks and designing solutions for businesses around Wisconsin. I then spent 7 years with Microsoft in Seattle. I was awarded SQL Server MVP on January 1, 2011. https://mvp.microsoft.com/en-us/mvp/Ben%20J%20Miller-4030644 I obtained my MCM : SQL Server 2008 / MCSM: Charter Data Platform on February 27, 2013. I love SQL Server and ASP.NET and answering questions. Life happens and I try to get out here as often as possible. 1/1 - 1,859
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296943555.25/warc/CC-MAIN-20230320175948-20230320205948-00643.warc.gz
CC-MAIN-2023-14
877
7
https://www.42jobs.io/react/jobs/696-frontend-developer
code
← Back to all jobs This job offer is expired At Dataquest, we teach data science to hundreds of thousands of students worldwide. We help students deeply learn concepts, build projects, and gain the confidence to start new careers. We're all self-taught engineers, data scientists, and marketers, and we're eager to help others take the same journey that we did. Read more about our philosophy here, and read what students think here. We're a bootstrapped mission-driven team of 15 people, and we've been growing quickly since we launched 3 years ago. We're looking for a frontend engineer to help support and evolve our learning platform. You will mostly be developing new features in support of our product design team. You'll also be making occasional bug fixes to existing features and will likely be involved in redesigning components as we iterate. You'll have a lot of autonomy in how you work and what you work on, as long as it's having an impact on our students. This is a fully remote role and we are open to applications worldwide. You don't have to match all of the listed requirements to apply -- we're looking for people who can grow along with our team, so please reach out if this job is interesting to you. We don't have a concrete set of requirements or skills — rather, we'd like to describe some traits that we imagine a successful developer in this role will have. You definitely don't need to match this list perfectly, but if a lot of it resonates with you, or you feel you can craft a different version of this role, get in touch. - With imperfect knowledge, you are able to dive into a large React codebase and confidently make changes. - You think about how to measure the effectiveness of the features you work on. - If you're blocked on something, you instinctively find other things to contribute while you wait for necessary information. - When you need information, you provide the necessary context for someone to address your concerns without follow-up questions. - Sometimes you stare into space thinking about how you would explain a topic to someone less familiar with it. - If a merge request deletes more code than it creates, you think it's a good day. - You prefer readable code over cleverness. - You may not do test-driven development all the time, but you prioritize unit tests. These are some of the technologies you'll be working with at Dataquest: - We use storybook for prototyping and feedback. - Mocha and Enzyme for testing. - Communication with the backend happens over a combination of websockets, GraphQL, and REST APIs, with an emphasis on migrating to GraphQL. - We use git for source control and GitLab for pipelines. - We use Jira for organizing and Twist for communication. At Dataquest, you'll get: - The opportunity to see your impact on the lives of our students every day. - The chance to work with an engaged and mission-driven team. - The chance to contribute to product direction and decisions. - A supportive environment where you can get help when you run into blockers. - The ability to work remotely and autonomously. - Unlimited vacation and sick leave - Medical, dental, and vision benefits if you're in the US The salary range for this role is $70k USD - $90k USD per year, and it's a full-time remote role. More remote react jobs Front End Developer Etch Senior Node.js + React Developer HigherEducation React Native & Node engineer G2i Inc.
s3://commoncrawl/crawl-data/CC-MAIN-2019-04/segments/1547583659417.14/warc/CC-MAIN-20190117224929-20190118010929-00092.warc.gz
CC-MAIN-2019-04
3,418
33
http://satoristudio.net/forums/topic/i-would-like-to-have-2-blogs-in-my-web-site/
code
Hmm.. I can probably get by with using CATEGORY for the immediate time being. But, is there a way to make only one category show up in the blog by default. If the user wants to see the other blog, they can select that category etc. but, by default, only one category will show up when the BLOG is chosen. Is that possible? limiting the default WP blog page to only one category would require certain adjustments to the code of the “index.php” theme template (see e.g. here for more details), or creating a new page template with a loop that filters the results by category.
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988721405.66/warc/CC-MAIN-20161020183841-00481-ip-10-171-6-4.ec2.internal.warc.gz
CC-MAIN-2016-44
577
2
https://wccftech.com/back-to-nagware-for-windows-7-users-starting-january-15/
code
Microsoft has called it quits on Windows 7, with support officially ending on January 14. The Windows maker has offered extended support for enterprises at an additional cost and free support for some 2020 election machines. The Windows maker also continues to offer free upgrade to Windows 10, its newest desktop operating system. However, if you haven't made the upgrade to the latest OS by then, it's back to the nagware. Now, admittedly, this wouldn't be as bad as it was back in 2015 and 2016 when the company introduced Windows 10 to the world and with it the term "nagware." Microsoft has officially said that it will send a full-screen notification starting January 15, 2020 to alert you of the risks of continuing with Windows 7. Microsoft's complete statement on Windows 7 upgrade notifications: IMPORTANT Starting on January 15, 2020, a full-screen notification will appear that describes the risk of continuing to use Windows 7 Service Pack 1 after it reaches end of support on January 14, 2020. The notification will remain on the screen until you interact with it. This notification will only appear on the following editions of Windows 7 Service Pack 1: - Home Basic. - Home Premium. - Professional. If you have purchased the Extended Security Update (ESU), the notification will not appear. For more information, see How to get Extended Security Updates for eligible Windows devices and Lifecycle FAQ-Extended Security Updates. Note The notification will not appear on domain-joined machines or machines in kiosk mode. It isn't clear if this notification will only appear once or will be repeated on a regular basis, and if so, how frequently. We will know more once these alerts start popping up on Windows 7 devices, and despite the associated risks of an unsupported operating system, it is hoping that Microsoft doesn't annoy the users to the extent where they start hating on Windows 10 - which is what happened back in 2015/16. As reported earlier, Windows 7 won't be completely unprotected as some signature updates will be delivered to the Microsoft Security Essentials (MSE) even after January 14.
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572286.44/warc/CC-MAIN-20220816090541-20220816120541-00595.warc.gz
CC-MAIN-2022-33
2,122
10
https://wiki.microfocus.com/index.php?title=SUSE_Cloud/Networking&oldid=44748
code
Getting Networking right in a cloud deployment, is one of the hardest parts and usually needs several deployment iterations. When doing your first deployments, first try to get the simplemost setup working. That is, use the default 'single' mode in crowbar's network.json instead of 'dual' or 'team', use default openvswitch+gre in neutron barclamp (or linuxbridge+vlan mode if you do not need SDN). Assuming you use VLAN 84 for admin network, VLAN 85 for public network and VLAN 82-86 overall for this cloud's admin/public/storage/sdn/fixed networks And assuming your nodes are connected to switch ports 5-9, you use the default IP ranges from network.json and your upstream router IP is 192.168.0.1 configure terminal # repeat for 82 to 86 vlan 82 name cloud1-xxx no shutdown # end repeat # repeat the below for interfaces 6-9 interface Ethernet1/5 no shutdown switchport mode trunk switchport access vlan 84 switchport trunk native vlan 84 switchport trunk allowed vlan 82-86 # for older Catalyst series spanning-tree portfast trunk # for newer Nexus series spanning-tree port type edge trunk # repeat end show running-config interface Ethernet1/5 copy running-config startup-config system-view vlan batch 82 to 86 port-group cloud1 group-member 10ge 1/0/5 to 10ge 1/0/9 port link-type trunk port trunk pvid vlan 84 port trunk allow-pass vlan 82 to 86 stp edged-port enable display vlan 84 # If you want the switch to do the routing # default gateway ip route-static 0.0.0.0 0.0.0.0 192.168.0.1 # admin net interface vlanif 84 ip address 192.168.124.1 255.255.255.0 # public net interface vlanif 85 ip address 192.168.126.1 255.255.255.0 display interface Vlanif 84 display ip routing-table
s3://commoncrawl/crawl-data/CC-MAIN-2020-34/segments/1596439740423.36/warc/CC-MAIN-20200815005453-20200815035453-00345.warc.gz
CC-MAIN-2020-34
1,693
7
http://www.linuxine.com/story/ubuntu-help-needed-2
code
I'm looking for a way to run linux commands on a instance running CentOS. I am using AWS PHP SDK for creating instances. How do i execute commands by logging into the instance? Does AWS SDK provide support for that? If not how do i provide my key pair, login and run commands. First off, I'd like to say I checked high and low for any possible solutions, but alas, I found none. I am currently unable to get sound out of my hdmi connected tv. I do get picture though. When I had 11.10, it came up in the sound settings and all I had to do was select it. Now when I connect it, HDMI is not even listed. I'm using an acer 6920 with the nvidia geforce 9500m (512mb). Been having issues lately with windows freezing (window dims). Several hard shotdowns needed past couple days. 12.04 worked flawlessly for about one year. Dell Studio XPS 1645. Other details in my signature. Now the machine will not start. It gets to the purple screen that says Ubuntu with 5 dots that go from white to red.
s3://commoncrawl/crawl-data/CC-MAIN-2014-10/segments/1394678702045/warc/CC-MAIN-20140313024502-00046-ip-10-183-142-35.ec2.internal.warc.gz
CC-MAIN-2014-10
988
6
http://diogenes999.blogspot.com/2013/01/evolution-or-devolution.html
code
In the previous post, whilst discussing whether or not we are hard-wired for bigotry, Andrew said: "There was a long-ish article about this in New Scientist in the not too distant past. If I remember the article correctly, the idea was that intolerance of The Other (defined however you like for the moment) conferred advantage in terms of competition for food, mates and all the other things that humans fight over, and that it was selected for over and over again as humans evolved." Which got me thinking... Again... Is intolerance of The Other a pro-survival trait or an example of groupthink What I'm getting at here is, did "evolution" ensure that those groups of humans who were prepared (and/or equipped) to kill the most number of people (or be the most threatening) were the ones who got to "run the show"? Was this a good thing?
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917120844.10/warc/CC-MAIN-20170423031200-00485-ip-10-145-167-34.ec2.internal.warc.gz
CC-MAIN-2017-17
839
9
http://sharepoint.stackexchange.com/questions/3749/i-cant-retrieve-usefull-information-from-sharepoint-database
code
Please explain why sharepoint database always have to be independent ? Please let me know if its possible to save all created data in sharepoint lists on the special database which we have designed ? I can't retrieve usefull information from sharepoint database . I think sharepoint databases with special design is not suitable for external reporting. How can I find a way which anabling me to obtain sharepoint database as well as tables that retrieve from sql database ?
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783398628.62/warc/CC-MAIN-20160624154958-00021-ip-10-164-35-72.ec2.internal.warc.gz
CC-MAIN-2016-26
473
2
https://lists.macports.org/pipermail/macports-users/2018-April/045005.html
code
problem installing gnureadline laurent.pagani at laposte.net Mon Apr 16 20:02:59 UTC 2018 > Is this file provided by a port? If not, you must have installed it in > some other way. I have just installed py36-scipy with port tonight (though as many others it indeed failed to get activated and I had to force it) > port provides this is the same path > Knowing where it comes from would help to find out how to clean it up. > Did you install python packages with pip, that is 'sudo pip install’? I possibly tried once to do that (but most probably failed, I don’t remember using sudo with pip) Considering the numerous failures of activation I had when running upgrade outdated, I consider rebuilding everything from scratch. As if I was moving from one OS to the next… More information about the macports-users
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335355.2/warc/CC-MAIN-20220929131813-20220929161813-00116.warc.gz
CC-MAIN-2022-40
816
14
https://til.hashrocket.com/posts/c83fdbyorp-what-are-the-available-extensions-in-postgres
code
What are the available extensions in postgres? Are you curious what all Postgres has to offer in terms of available extensions? You can get a list of them from the select * from pg_available_extensions; I have 46 available and one installed (by default?), You can see all installed extensions with: select * from pg_extension;
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296945168.36/warc/CC-MAIN-20230323132026-20230323162026-00230.warc.gz
CC-MAIN-2023-14
326
6
http://www.howardforums.com/showthread.php/1755542-Is-there-an-online-calendar-for-visually-impared-computer-users
code
Where I work we used to use the Yahoo! calendar until it became totally bloated with whistles and bells to the point that it is useless. I can't even add an event any more! I'm looking for a simple, user-friendly online calendar that all employees can access from anywhere and add events to. I don't care if it has a smartphone app or other advanced features. What is important however, is a simple format without a lot of graphics because our receptionist is visually imparied and uses text-to-speech software. His text-to-speech software chokes on graphics. Last of the voice-only dumbphone users. I owe, I owe, it's off to work I go!
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368702957608/warc/CC-MAIN-20130516111557-00003-ip-10-60-113-184.ec2.internal.warc.gz
CC-MAIN-2013-20
636
4
https://www.cnet.com/forums/discussions/dual-channel-ram/
code
Because of a problem with the loading of the busses. The more sticks means (possibly) more chips and circuit lengths that could run into you or the board inserting an extra wait cycle. As to compatibility issues, when a client worries like that you buy strictly from the QVL list at the maker's web site or go to Crucial.com, Kingston.com and get it done. The motherboard supports Dual Channel and has 4 DIMM slots. I want to purchase 32 GB to begin with (for 3D applications) but it's likely I might go for 64 GB at some point. I got told 2x16 RAM is better than 4x8 RAM if both are dual channel kits, with same frequency and latency. My question are: Could I just buy the 2x16, and later on just get another kit of the same type to push it to 64 GB? (I fear compatibility issues) Or do I go 4x8, and whenever I want to go for 64 GB I would have to sell my kit and buy a 4x16 kit?
s3://commoncrawl/crawl-data/CC-MAIN-2019-22/segments/1558232256763.42/warc/CC-MAIN-20190522043027-20190522065027-00470.warc.gz
CC-MAIN-2019-22
881
8
https://forums.ghielectronics.com/t/advice-on-hardware/14595
code
I am starting my first project. I’m new to .NETMF but have been programming C, C++ for 20 years and .NET for 7. Also new to the whole world of circuit boards but have been reading and learning a lot lately. My project is to create a replacement controller for a pellet grill. I want the values of the PID to be configured remotely and usage data on the cook stored in the cloud. Therefore, I need the board to have WiFi and support at least 4 type k thermocouples. I initially had this hardware picked out. https://www.ghielectronics.com/catalog/product/282 x1 (out of stock) But after a little more research, I am thinking the Cobra 2 might be a better board with the WiFi already included. This is all new to me, I’d appreciate help from anyone willing to offer advice/suggestions on the best hardware to obtain for this project. The Spider is Open Source Hardware so will not support the WiFi module you listed. Your other option is the Cobra 2 I use this with the onboard WiFi for home automation and it is easy to work with. WiFi took me about 30 mins of coding to get working The only issue you will have is that there is not enough sockets to support the 4 thermocouples you need. It may work with an extender but as I have not used these before, I’ll leave that to someone else to comment on. Sounds like an interesting project by the way. I also enjoy building something that gets its data from the outside work and seeing it change on a display or website is cool Sounds like the Cobra 2 is the way to go. Are you using the board with the external antenna or the one without? I’m just curious about the range on the one without the external antenna. I won’t need a socket for each thermocouple. I just need to be able to open a socket to call a web service that will receive an XML document with data from the 4 sensors. I will also return an XML document that will contain any new settings that might have been uploaded from the mobile app and apply those to the PID. The thermocouples will need to be the type that can be inserted into a brisket or pork roast for example. I noticed there is also a OneWire device but I am still a little confused on which is going to allow me to monitor the pit temperature and the internal temperature of meat. I wish I could find sensors and a board that “plugged in”, like headphones. Oops. Confusion about the name sockets. I was referring to the sockets to connect the thermocouple modules to the board, not the TCP sockets. Finding food grade sensors is a bit tough. Watch out with 1-wire temp sensors as they are max 150 deg C so unlikely to work in your oven. I did find this. Not sure if food grade though. I don’t think the GHI sensor is ideal for insertion into the meat. It will do for monitoring the pit though. Spider is based on EMX and supports the WiFi module Oops. I thought that it was OSHW so must have looked at the wrong board!! My bad. Anyway, the cost of the Cobra 2 is less than Spider and the WiFi module and a faster processor too The Gadgeteer Thermocouple module is a simple SPI device but the GHI team have set it up as needing an X or Y socket and it simply bitbangs the lines. You can see the driver here http://gadgeteer.codeplex.com/SourceControl/latest#Main/Modules/GHIElectronics/Thermocouple/Software/Thermocouple/Thermocouple_42/Thermocouple_42.cs You could simplify the Gadgeteer socket requirements by using all 4 TC modules on one Y socket (that guarantees you have a full compliment of 8 pins) and changing the driver (you can see some tips to start you here https://www.ghielectronics.com/docs/122/gadgeteer-driver-modification ) The things you’d need to do are to have common MISO and SCK lines, and have individual CS lines for each of the devices. For your particular problem, you REALLY want a thermocouple, not a one-wire device. The one-wire devices are much lower temperature so you’re likely to go out of range pretty quickly I would expect. I roast coffee in a converted hooded BBQ and use TCs for that, so that’s most likely what will suit your need too. I would also say that from a connector standpoint, the reason you’ll find TCs have these spade lugs, is that it’s an industry standard. TCs tend to be used everywhere in industrial environments and need to be replaced, this is a simple connection method. Go look on ebay for different hot-end types and you might find one more like a meat probe - they aren’t cheap but they aren’t expensive, so I’d say get a few spares… And final tip - the shielding on the TC wires itself can often lead to signal issues if you don’t ground it properly, and if your device isn’t also grounded to that. It’s worth playing around and checking the readings while you’re able to and make sure you’ve got as low a noise as possible (which will show as a stable temperature)
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296818999.68/warc/CC-MAIN-20240424014618-20240424044618-00796.warc.gz
CC-MAIN-2024-18
4,851
26
https://www.sweetstudy.com/questions/erd-20382267
code
Option 1. Entity-relationship and data models are said to model the "real world." Respond to this statement and provide examples in support or opposition of this statement. Option 2. Please identify and describe a system that you use regularly. This system can be in your personal or professional life. Please describe how the system is used and your use of the system. Then describe the data available within the system, list and define entities you are familiar with, and then provide example data within the system. - 9 days ago - Organizing paper - BUS 308 Week 3 Final Paper Outline Draft - Tell us what you learned in this activity that is "new to you". How can you use this in your current professional life? How might you use it in the career that you see yourself in 5 years from now? How are you using these concepts at home? - Acc 455 Week 5 Team B assignment - individual project 3 - assignment 600 words - Letter to the editor - mathlab homework - Week 10
s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320304287.0/warc/CC-MAIN-20220123141754-20220123171754-00424.warc.gz
CC-MAIN-2022-05
968
12
https://help.egroupware.org/t/rocket-chat-bad-decrypt-error/74514/6
code
Hi all ! I’m still having problems logging in to rocket chat and therefore can’t use it. The last error I identified is the following: It was not possible to parse your key, reason: error:06065064:digital envelope routines:EVP_DecryptFinal_ex:bad decrypt There appears to be problems with decryption. I am desperate and frustrated: I have never been able to use RocketChat … Can anyone help me?
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224644574.15/warc/CC-MAIN-20230529010218-20230529040218-00663.warc.gz
CC-MAIN-2023-23
400
7