url
stringlengths
13
4.35k
tag
stringclasses
1 value
text
stringlengths
109
628k
file_path
stringlengths
109
155
dump
stringclasses
96 values
file_size_in_byte
int64
112
630k
line_count
int64
1
3.76k
https://www.theverge.com/2011/07/12/microsoft-shows-mango-phones-samsung-fujitsu-acer-zte
code
Four new Mango-powered Windows Phone devices got a quick preview at the Microsoft Worldwide Partner Conference today. The headliner is definitely what you're looking at up top, a Samsung phone rumored to be the SGH-i937 that bears more than a passing resemblance to the Galaxy SII line, including a front-facing (and presumably Skype-friendly) camera. Phones from ZTE, Acer, and Fujitsu round out the previews -- the Fujitsu standing out in pink with "a waterproof design." Sadly, we didn't get another look at Nokia's "Sea Ray" prototype, but it's good to see that Microsoft isn't forgetting its other OEMs during the race to get Nokia devices out this year. We gave Windows Phone Mango an extensive preview last month and developers are banging away on it this month, but we're excited to finally see it on new hardware for the months ahead. One thing you won't see in the months ahead (or ever, apparently): Windows Phone 7 on tablet devices, as Microsoft re-confirmed at the conference that Windows 8 will be their only tablet OS. Catch a brief video of all four phones after the break. Update 2: video has been pulled. Update: Microsoft tells us these aren't production phones and shouldn't be taken as indicative of what's coming down the line.
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947476442.30/warc/CC-MAIN-20240304101406-20240304131406-00074.warc.gz
CC-MAIN-2024-10
1,250
4
http://foobar.me/2010/05/21/ruby-on-rails-partial-zhong-shi-yong-collection-can-shu/
code
Ruby on Rails partial 中使用collection 参数 Here is one my brother showed me the other day that I was not aware of. More RTFM and less Cowboy Coding.. I know, I know.. its just my nature. So here is the use case: You have a collection of objects that you want rendered in a partial. The way I used to do it is like this: 1 #controller code 2 @widgets = Widget.all 3 4 # view code 5 <%= render :partial=>"widgets/widget" %> 6 7 #partial code 8 <% @widgets.each do |widget| %> 9 This widget is named <%=widget.name %> 10 11 <% end %> Now that is kinda ugly doing the iteration in the partial like that. Now for a cleaner way. You pass the @widgets to the partial with the :collection hash. 1 #controller code 2 @widgets = Widget.all 3 4 # view code 5 <%= render :partial=>"widgets/widget", :collection=>@widgets %> 6 7 #partial code 8 This widget is named <%=widget.name %> This code will execute the partial multiple times.. once for each widget in the widget collection. That looks damn pretty. One caveat, though.. In the partial, the name of the local variable needs to be the same as the name of the partial. So if you have widgets/some_widget, the code would look like this: 1 This widget is named <%=some_widget.name %> If you want to use another variable name you just add the :as hash, like this: 1 <%= render :partial=>"widgets/some_widget", :collection=>@widgets, :as=>:widget %> Then you can use widget as the local variable name instead of some_widget. Got it? Good.
s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578529839.0/warc/CC-MAIN-20190420140859-20190420162033-00029.warc.gz
CC-MAIN-2019-18
1,482
10
http://masazsda.xyz/archives/3921
code
Novel–The Legend of Futian–The Legend of Futian Chapter 2255 – Sword of Annihilation boiling frightening Growth! A horrifying gust of sword could possibly erupt in the body system of Shenjia the fantastic Emperor. Quite a few sword-shaped runes sprang out around his body. This period, Ye Futian’s divine heart and soul obtained seemingly tapped into a one of a kind express. It observed as if he experienced completely joined with all the system of Shenjia the excellent Emperor. Over and above his psychic heart and soul, plenty of channels of light have been flowing and fueling the power within Shenjia the excellent Emperor’s human body. His horrible students gazed into the skies as if it could pierce through paradise and globe. It was much like the Incredible Pathway collapsing and almost everything switching into nothingness. The only thing that decided to go into your fissure of nothingness would fall and perish. The sword pa.s.sed through s.p.a.ce, penetrated the fissure, and begun to damage the surrounding vicinity apart. This tearing compel grew to be more alarming the way it gifted rise to the boundless black colored pit across the sky. The cultivators on the yardage have been delivered speechless from this scene while they gazed for the ravaged s.p.a.ce. Was this swordsmans.h.i.+p something which a mortal could carry out?! “All individuals, back away.” At this moment, the body of Shenjia the good Emperor uttered a number of thoughts. It was actually Ye Futian’s body. Easily, the aces on Ye Futian’s area who are involved in overcome retreated. They seemingly fully understood what he designed. persian arts of the book Once the invasion fell, the stream of sword power unleashed by Swordmaster of Taichu was destroyed little bit after little. He looked over the scenario facing him, feeling only give up hope and a sense of disbelief. a savage place hardcover He could be taking a risk. “No…” A dismal scream sounded. Persons could observe the human body of the immensely talented cultivator shredded into bits inside the fissure. He died having a crumbled physique plus a shattered heart and soul. It was pathetic. He did not even get the opportunity to avoid. A Wonder Book for Girls & Boys the broken man cast In addition to, the one who destroyed him became a simple point six with the Renhuang Aeroplane. Whoosh… A ghastly Sword Will swept along the sky and clamored extensively. Right in front from the seemingly endless amounts of Sword Qi loomed a ma.s.sive fissure. The Sword Will begun to wreak havoc throughout the kingdom like it was subsequently the Sword of all the Manifestations. “Be cautious,” somebody reminded him. Many powerhouses could see the possibility. It sensed as if the entire body of Shenjia the truly amazing Emperor has been completely changed out by Ye Futian and had come to be a part of him. If it truly obtained occured, he could unleash their own tactics at will. Lord Taixuan stared with the sword. Likewise, ripples of sentiment surfaced within him. This became the sword he pa.s.sed through to Ye Futian, the Fleeting Swordsmans.h.i.+p. “No…” A unpleasant scream sounded. People today could understand the system of any immensely talented cultivator shredded into portions around the fissure. He died by using a crumbled human body and a shattered heart and soul. It had been pathetic. He failed to even get the opportunity to avoid. the top of the world alaska Now, Ye Futian was getting ready to use the strength of Shenjia the good Emperor to unleash an assault on this sword to wipe out his challenger. Ye Futian. He was using the system of Shenjia the truly great Emperor to release their own potential! Why would this occur? With regards to powerhouses who have been previously involved in combat, all of them were fleeing a number of directions. The scene obtained every spectator inside the far-away Incredible Mandate Town shuddering in pear. Lots of leading aces was really fleeing because of streak of sword might. afloat on the ohio As for the powerhouses who were previously involved in eliminate, them all were fleeing in numerous instructions. The scenario obtained every spectator during the far-away Heavenly Mandate Community shuddering in pear. A lot of very best aces was actually fleeing due to a streak of sword could. He might be taking a gamble. tanglewood tales horse Now, Ye Futian was getting ready to use the strength of Shenjia the excellent Emperor to unleash an infiltration using this type of sword to eliminate his opponent. If the infiltration declined, the river of sword electricity unleashed by Swordmaster of Taichu was damaged touch after tad. He looked at the world in front of him, feeling only lose faith and a sense of disbelief. The hearts with the aces trembled. In the event that was the truth, how effective would he be? Dragon King’s Son-In-Law The hearts and minds of the aces trembled. If that was the fact, how powerful would he be? Chapter 2255: Sword of Annihilation “This…” Some people looked at the place around Ye Futian’s system. Instantly, the potency of Shenjia the truly amazing Emperor’s system erupted again and have become much more horrifying. The wisps of Sword Will turned into an unceasing surprise of Sword Qi that began raging across the the planet. Along with Shenjia the good Emperor’s physique, you could even vaguely start to see the experience of some other guy. It belonged to not any other than Ye Futian. Nyoi-Bo Recording studio “Be watchful,” a person reminded him. Numerous powerhouses could see the danger. It felt as though the body of Shenjia the Great Emperor ended up being completely changed out by Ye Futian and had turn into part of him. In the event that truly had happened, he could unleash his own strategies at will. “Go!” Ye Futian shouted. All instantly, Sword Qi enveloped the boundless s.p.a.ce. Higher than the heavens, there also seemed to be sword-fashioned runes. For a while, everybody in the entire Incredible Mandate Metropolis could view the skies filled with Sword Runes infused with the effectiveness of annihilation. “Let’s retreat.” Also the aces that have been spectating the challenge within the long distance commenced retreating. This boundless s.p.a.ce was seemingly enveloped by Sword Qi, in particular by those which came from the sword facing Shenjia the Great Emperor’s entire body. The sword seemed invincible, with out a single experienced the courage to face that blade. Whoever that applied a hit from that blade would most likely perish. The hearts in the aces trembled. If that was the fact, how powerful would he be? Novel–The Legend of Futian–The Legend of Futian
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764499919.70/warc/CC-MAIN-20230201081311-20230201111311-00024.warc.gz
CC-MAIN-2023-06
6,727
40
https://chilly-durango.itch.io/level-generator-toolkit/devlog/17125/new-directions-again
code
New Directions Again If you follow me on twitter or have seen any of my posts on /r/procgen or /r/pixelart recently, you'll have noticed I've been using the Toolkit a lot more for generating textures and artwork for games, rather than levels, as it was originally intended. I've done this before in the past - usually by using toolkit functions in another project to draw things. Space-filling things like rough terrain, patterned floors, or brick walls. I've decided to make the sandbox an environment to do this in natively - since image files are completely transportable. Construct 2 offers limited in-built support for this sort of thing however - compositing and manipulating images is beyond the functionality of the basic setup. One simple plugin - Paster by Scirra forums god R0j0hound - changes this. Hence, the toolkit is now available in two flavours. The plugin allows texture manipulation - but without it all the functions of the toolkit STILL WORK. It's only the freely-available functionality of the sandbox that is affected by not having the plugin. That said, it is a VERY neat plugin, and has yet to surprise me with unexpected results - ignore/avoid it at your peril, C2 users! Anyway, with the toolkit being a viable environment for procedurally drawing artwork, some new things are in the pipeline. First of all - scripts are getting a little cumbersome. I've gotten loops and indexing working now, so scripts can be simply looped over the same chunk of code. Next up is mathematical operators - so loop indexes can be used more effectively to control aspects of procedures. In the 'maybe' pipeline is functions, and checking expressions. I may choose to fork the project soon, releasing a texture scripting engine separate from (but based upon) the Toolkit. This would be a dev tool freely-available on itch in both browser and downloadable form. Feedback welcome. Get Level Generator Toolkit Leave a comment Log in with itch.io to leave a comment.
s3://commoncrawl/crawl-data/CC-MAIN-2021-04/segments/1610703521139.30/warc/CC-MAIN-20210120151257-20210120181257-00758.warc.gz
CC-MAIN-2021-04
1,972
9
https://deerfield.edu/students/news/2013/11/introducing-the-i-lab/10199582/
code
The Library’s new Innovation Lab (a.k.a. i-Lab) on the main floor is a space that encourages self-directed learning, where students can innovate, create, and experiment, working on class projects or pursuing ideas of personal interest. Still under development, it already contains robot-building tools/parts, a 3-D printer, Lego sets, games, small white boards, bean bag chairs, and student project storage bins. Coming soon are origami paper, rolling white boards, and several different kinds of moveable chairs. Check it out, use the space to be creative, and give us suggestions for other things you’d like to see in it!
s3://commoncrawl/crawl-data/CC-MAIN-2018-26/segments/1529267863519.49/warc/CC-MAIN-20180620124346-20180620144346-00175.warc.gz
CC-MAIN-2018-26
627
3
http://www.natcorp.ox.ac.uk/tools/index.xml?ID=body.1_div.2
code
Some example tasks using XAIRA Click on 'how' for detailed instructions on how to use the XAIRA client to do each task. |Search for a word or phrase||how| |Find a word/phrase occurring in a particular category of text||how| |Delete unwanted concordance lines||how| |Save search results||how| |Search by POS tags (or other attribute values)||how| |See non-verbal clues||how| |Display search results as a chart||how| For more information about how to use the XAIRA client for Windows, see the XAIRA Manual. For a set of examples showing how to carry out some specific tasks, see the BNC XML Edition with XAIRA or BNC Baby with XAIRA pages.
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224648209.30/warc/CC-MAIN-20230601211701-20230602001701-00062.warc.gz
CC-MAIN-2023-23
637
10
https://www.cfd-online.com/Forums/star-cd/65096-residuals-posdat-star-cd-4-06-windows-print.html
code
Residuals in POSDAT (Star-CD 4.06 / Windows) I have a problem accessing the residuals in posdat.f under Windows. Using Linux the following worked fine: When accessing them, I get the error [ 1 ] ***Received signal 11 - EXITING and the solver stops. Same happens with RESMAXEQ and RESMAXSC. Any ideas how to get the residuals in posdat? Hi I experiencing the same error in windows, anyone know why? I upgraded the star-cd to 4.08 and no problem while running in windows ^ ^ |All times are GMT -4. The time now is 10:59.|
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560284411.66/warc/CC-MAIN-20170116095124-00115-ip-10-171-10-70.ec2.internal.warc.gz
CC-MAIN-2017-04
519
11
http://web.cecs.pdx.edu/~jeskem/chpfaq/fixes/platform.html
code
Claris Home Page FAQ There are several cross-platform issues to consider when using CHP or any web page creation program, or for that matter doing anything involving more than one platform. Here are some of the major cross-platform issues encountered by Claris Home Page users with solutions and detailed discussions. Occasionally, I will even point a finger at who is to blame (since that is what we all really want to know when there is a problem), though be aware that I am a MacAddict (I doubt you can have gotton this far into my site and not realized that) and I am much more eager to blame a problem on Microsoft (it is basically guilty until proven innocent, and even then). Windows 95 Filename Case Changing Filename Changes During Win <--> Mac File Transfer The Problem, The Solutions, The Discussion This is a really strange and annoying thing which happens with the Windows 95/NT version of CHP. It can also be an issue with web content creation in general. Several things might happen: Pages where this occurs works when viewed locally, as Win 95 ignores case when identifying a file. However, if and only if the pages are uploaded to a UNIX webserver (UNIX destinguishes between uppercase and lowercase in filenames), the links and images may be "missing". This just means that although the files themselves were uploaded, the links, in the view of the UNIX-based webserver, point to completely different files. Use CHP to upload all your files. It will upload them in the right case. Use filenames which do not meet the 8.3 specification. This will apparantly force all applications to see it your way. Use .jpeg instead of .jpg, .html instead of .htm, use longer filenames. Explicit renaming in My Computer. People have said it doesn't work, and it really doesn't, I've checked. If you have a file Test.txt (which is really TEST.TXT) and you rename it Test.txt, nothing changes. Apparantly Win95/NT thinks it can save some cycles by not bothering to change the name when it is already that name, ACCORDING to My Computer. So what you need to do is change it to something completely different, such as Think.different, and then change it back again to the name you want it to have. Yet another way to get more use out of Windows. If you want to create files with this problem, find some old non-Win32 applications and save some files. They too will have dual names. Sorry, can't resist, but upgrade to an operating system that can handle filenaming properly, and doesn't overrule your naming decisions. Hopefully this will clear up the problems for those with them, and no hard feelings about the anti-Windows/pro-Macintosh rants, OK. They are mixed in with actual on-topic stuff. Since this has been a big issue over the past several days, amounting to as big a "discussion" as we have had in the past on "Absolute URLs" and "Anchors and Links", I went and found a WinNT machine with CHP, and experimented with it for about an hour and a half, playing all kinds of filenaming games with the OS and with CHP. What I discovered is summarized in the following rant. No one take offense. This problem is caused by Windows' way of dealing with files, and more specifically, its habit of "adjusting" file names to meet its aesthetic standard. This Microsoft mistake is revealed when non-Win 95 programs name files the way they have always named files, or if users do the same. None of this poses a problem until you upload to a UNIX server. Here is my ideological rant on this subject (as seen on CHP Talk): <RANT subject="Windows filename casing" keywords= "Windows, UNIX, case-sensitive, web publishing" author="Marcin Jeske"> I have found that the current incarnation of Windows is seriously flawed as a platform for creation of web-based content. These flaws cause numerous errors when files are moved to case-sensitive platforms, such as UNIX, which constitute the majority of current Internet servers. These flaws attest to the controlling, sloppy, and inconsistent nature of Microsoft and its products, and can cause Microsoft's customers to waste time and money attempting to compensate for the low quality of Microsoft's software. The saddest truth is that when Microsoft corrects, or more likely slightly lessens, these and the many other flaws in their operating systems, these same customers will get to pay them more money Here's my write up of my experiment with WinNT: Windows NT Workstation 4.0 Claris Home Page 2.0 for Windows A simple folder called INDEX.HTM Now that I've ranted and raged against Microsoft, I can take a breath. Here is what I found. First, I played around with WinNT by itself, not launching CHP. I created a file named index.html. It was just an empty text file. When looking at the file, I used three interfaces: the Finder-like "My Computer", the "Command Prompt" which is a UNIXed-up DOS, and through the eyes of a fairly standard FTP application, WS_FTP32. So index.html appeared the same in all three. Then in My Computer, I attempted to change the name to INDEX.HTM. WinNT apparantly corrected me and changed the file name to Index.htm instead. Hence my reference to their controling nature. You cannot name a file in My Computer INDEX.HTM, no matter how much you rant and scream. You can type that name in, see it on the screen, but the minute you click away, WinNT decides it doesn't like your casing. Or does it... The file which I intended to name INDEX.HTM appears as: Index.htm in My Computer INDEX.HTM in Command Prompt index.htm in WS_FTP32***interesting note: when I make a copy of Index.htm in My Computer, I get Copy of INDEX.HTM*** It seems the issue revolves mainly around filenames which may be Win long file names, but conform to the 8.3 spec. Such files will include almost all web files, since we use .jpg, .gif, .pdf, .ps, .mov, .avi, .cgi, etc. They will only apply to html files if we use .htm as opposed to .html. So even though a filename is NOT a DOS filename, it is treated as such, and there the ambiguity begins. You see above that three different "programs" got three different answers to the question: What is the name of this file? On a PC, this confusion is only cosmetic, as Windows is case insensitive. But it apparantly also tends to ignore case. On MacOS, a file has a certain ASCII name, and no program can muck around with the case of any of the characters. Even though it is case-insensitive, it recognizes case. You can specify a file search to "Match Case", and there is no ambiguity. As long as these Win-maligned files stay on a Win or Mac machine, it is all smooth sailing. However, the web market, though many low volume sites do use Macs, depends mainly on the POWERS of UNIX. UNIX *IS* case-sensitive, and if those three programs aforementioned were told to all upload the file INDEX.HTM/Index.htm/index.htm to a UNIX server, we would end up with THREE different files. Which is where the CHP problems come in. CHP, being a good HTML editor, wants to make sure that even though our links may work on our personal computer, we don't run into any problems when we take it up to a UNIX box. So it dutifully checks whether the casing in our link matches that of the path to the file. So, if the casing has been changed, or the file name was typed in inaccurately (I mess up capitalization all the time) the problem is fixed and averted. THank You CHp. On a Mac, this works fine. A file has one and only one name. But on a PC ... From what I can figure, CHP uses the same facility as the Command Prompt to find the name of the file, which I think is right, as that is the name I intended for my file. However, when you upload the file with, say, WS_FTP32, the file gets uploaded with a different name, index.htm. Why doesn't this happen with Netscape Gold and other editors - they don't BOTHER to check!!! You can change case right under the nose of Navigator Gold 3, and it is none the wiser, which also means your web page will be messed up when uploaded. Lance Crocker <[email protected]> , who early on posted to the CHP Talk mailing list regarding the solution of explicitly changing the filename under "My Computer". He was also insightful (or knowledgeable enough) to state that this was not a CHP bug, but rather a fundamental inconsistency in the way Win95/NT handled filenames. He also mentioned that the problem files were ones which had been created by Pre-Win95/NT applications which could not handle lowercase characters. Here is his web site address: http://usmcug.usm.maine.edu/~crocker Filename Changes During Win <--> Mac File Transfer The Problem, The Solutions, The Discussion When you transfer files via floppy or Zip disk or other medium between a Windows Computer and a Mac and vice versa, the filenames appear to get maimed. My_Cool_File.html becomes MY_COO~1.HTM. Transfer them across the Network/Internet using FTP. The names will stay intact. Most modern FTP clients, such as Fetch and WS_FTP32 can transfer entire folder hierarchies. Use the power of zip (no, not the drive, but the compression standard). The .zip compression format stores folder hierarchies, so you pack it up on one platform, then unpack it on the other platform, and all is good. You can find zip compression utilities for both platforms at shareware.com:WinZip for Windows95/NT is I think pretty common and easy to use. ZipIt is one program I've used on the Mac. ***StuffIt Expander with Expander Enhancer can decompress .zip too. ***The commercial version of StuffIt can do even more ***Check their site at www.aladdinsys.com I encountered this problem too when moving files cross-platform, and I use the .zip solution. Not only do the names stay unchanged, but I save space. This will be added soon... Be aware there are two other cross-platform issues which can mess things up. First, PC and Mac files (and UNIX, to a lesser extent) have a different selection of characters allowed in the filename. Macs use the : for path delimeters, Windows uses the \, and UNIX uses the /, so if you do plan to move files, don't use those characters. Also, spaces are a touchy issue. If you are dealing with just Macs and PCS, they will pass, but they are not recommended. Just try deleting a file named Bob's File on a command line interface - it can't be done, or rather, it can.***If you ever do have to delete a file named Bob's File on a command ***line interface, tell it to delete Bob's%20File and it will work. For this very reason, you might avoid putting %'s in file names, and leading ~ (UNIX home directory shortcut) and *'s (wildcard characters in UNIX and DOS) and ? (also wildcards) and ... The other problem is with filename length. Here are the limitations: A Macintosh filename can be composed of a maximum of 31 characters.That's 31 + : (path delimeter) = 2^5 A Windows *path* can be composed of no more than 256 characters.That included C:\ and all subsequent path delimeters. In other words, each file on a Windows machine must have a unique name of nomore than 256 = 2^8 characters. It is highly unlikely that you will reach these limits, for hardly anyone named their files longer than 31 characters, and you really have to work at it to create enough nested folders to exceed the 256 character limit. For the record, starting at C:\WINNT\Profiles\mjeske\Desktop, whitch is 32 characters, I had to create *16* nested folder each with a name 13 chars long (plus the path delimeter) just to get the measly message:"This folder cannot be opened. Path too long." But these are still issues you should keep in mind. More cross-platform issues to come ... It seems that the filesystem is still a version of DOS, so each file has a 8.3 name, which, because of DOS's history, is in all caps. Win 95 also gives it a long name (I'm not certain where this long name is stored) which works very much like Mac filenames. So each file has two names.
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571911.5/warc/CC-MAIN-20220813081639-20220813111639-00704.warc.gz
CC-MAIN-2022-33
11,854
56
https://linuxsay.com/t/sysv-rc-conf-installation-not-working/2360
code
Hi I am following the article at: Article says to install sysv-rc-conf, just type sudo app-get install sysv-rc-conf. Did that and got: Package sysv-rc-conf is not available, but is referred to by another package. This may mean that the package is missing, has been obsolete, or is only available from another source. How do I get this and proceed from step 26 of the above article? I am a complete noob, so need detailed instructions. This is my first install - installing on windows 10 hyper-v. Hi package sysv-rc-conf you are trying to install present in Universe Repository. So you have to enable the Universe Repository before installing the package. To enable it fallow the below steps Open Software Sources Under Ubunut software tab ,check the option "Community-maintained free and open-source software (universe). #sudo apt-get update. and now try to install the package #sudo apt-get install sysv-rc-conf once look at the below link it may help you I am installing ubuntu server, so there’s no tabs, but I typed in the commands you listed and it works! Will read up on the Repository info.
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764499816.79/warc/CC-MAIN-20230130101912-20230130131912-00789.warc.gz
CC-MAIN-2023-06
1,099
16
https://tr.ifixit.com/Answers/View/537604/Why+is+there+no+lighting+to+my+echo+show
code
Why is there no lighting to my echo show? My echo show works perfectly, except the lighting is permanently turned off. I adjusted the brightness to the highest settings and it won't light up. My son was watching a video on it one day and it was like a power outage, the brightness, light turned off. We can still use it, but can barely see videos because it's dark, no lighting. So we stopped watching videos and taking face to face phone calls. How do I fix this?
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570913.16/warc/CC-MAIN-20220809064307-20220809094307-00541.warc.gz
CC-MAIN-2022-33
464
2
https://sharepoint.stackexchange.com/questions/163097/cant-upload-aspx-to-site-assets
code
I just created a new site on SharePoint online. I'm trying to upload a file called index.aspx into site assets but I keep getting index.aspxSorry, your files couldn't be uploaded. The upload might be too large or the server might be experiencing high network traffic. I've enabled publishing features just in case but that didn't help
s3://commoncrawl/crawl-data/CC-MAIN-2021-17/segments/1618039603582.93/warc/CC-MAIN-20210422100106-20210422130106-00408.warc.gz
CC-MAIN-2021-17
334
4
https://nim.nsc.liu.se/projects/2992/
code
How to resuscitate a dead galaxy? ||How to resuscitate a dead galaxy?| ||SNIC Medium Compute| ||Nils Ryde <[email protected]>| ||2019-11-01 – 2020-11-01| Understanding the origin of galaxies in general, and of our Milky Way in particular, requires to describe how the gas produced during the Big Bang is converted into stars. A growing number of observations report that this process (rate, efficiency etc.) is strongly dependent on the galactic environment. For instance, elliptical galaxies are known to be deprived of gas, and thus to have ceased to form stars: they are often called "dead galaxies". However, new observations have reported a significant star formation activity in some ellipticals, which thus questions our current understanding of star formation and galaxy evolution. A possible explanation is that when an elliptical interacts with another galaxy, in theory it could gravitationally capture the gas of the companion gas and could thus "resuscitate" the star formation activity, which would explain the observations. If valid, this idea would drastically change our perspective on the very process of star formation. However, this process has never been modeled nor quantified and it is still uncertain that it could account for the entire activity reported. The proposed project aims, for the first time, at modeling numerically the gaseous fueling of a non star forming galaxy, and the restart of its star formation activity. By monitoring a large range of physical processes (flows, turbulence, cooling, radiative transfer, gravitational collapse etc.) at high resolution, we will propose a holistic scenario for the mechanism and test our hypotheses against observational data. We will run hydrodynamical simulations of interacting galaxies, in addition to control runs of galaxies in isolation. We will compare the evolution of the star formation rates and efficiencies in these two sets. We will start with relatively medium resolution simulations to first get a better understanding of the process, and then choose the best set of parameters (galaxy mass, size, orbit of the encounter, etc.) to run high resolution simulations that will fully capture the interplay of the physical processes involved. The final outcomes of this project will be (i) an understanding the details of the physical process, (ii) the finding of which model best matches the observations, (iii) a holistic theory on the topic, (iv) predictions to prepare new observation campaigns and (v) outreach material.
s3://commoncrawl/crawl-data/CC-MAIN-2020-34/segments/1596439736057.87/warc/CC-MAIN-20200810145103-20200810175103-00565.warc.gz
CC-MAIN-2020-34
2,514
7
https://www.deviantart.com/andrrei1992/favourites/48645237/Resources
code
Silent Aero Glass Silent Aero Glass is a little utility I wrote that prevents the annoying demo version message of Big Muscle's Aero Glass for Windows 8 from popping up. At the moment it only works on the 64-bit version of DWMGlass. Feel free to modify it for 32-bit if you need it. If you don't trust the pre-compiled binaries I provided in the download section get Visual Studio 2010/2012, clone the source and compile it yourself. Make sure you use Visual Studio 2010's compiler (even if you're on VS2012). Also, this dll can be modified to suppress any kind of messagebox system-wide on x64 systems. This software does not modify bigmuscle's software in any way, as it merely hooks MessageBoxW system-wide, so it does not violate any kind of copyright.
s3://commoncrawl/crawl-data/CC-MAIN-2019-22/segments/1558232258120.87/warc/CC-MAIN-20190525144906-20190525170906-00502.warc.gz
CC-MAIN-2019-22
756
5
https://irrlicht3d.org/index.php?t=1011
code
When I released CopperLicht CopperLicht uses WebGL to render 3d graphics, and uses GLSL shaders to do this. GLSL shaders are simple programs which are sent to the graphics drivers, which then compiles these and runs them on the GPU. One of the major benefits of GLSL is, as quoted from the Wikipedia page: Cross platform compatibility on multiple operating systems, including Linux, Mac OS and Windows. But since I now found and fixed the bug which caused CopperLicht not to work on MacOSX, I can say this statement is not true. Different graphics driver, different shader features you can use. Appearently the compilers in different graphic drivers currently don't even agree if you can multiply a vec4 with an integer or not. Which caused CopperLicht to tragically fail on Mac OS X systems with a driver which didn't want you to multiply vec4's with integers. . The engine developers (== me) will be taking care of this :)
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500392.45/warc/CC-MAIN-20230207071302-20230207101302-00138.warc.gz
CC-MAIN-2023-06
924
6
http://forums.qj.net/everything-windows/35960-ram-psu-question-advice.html
code
the 2x512mb ram I have now is DDR2 PC3200 and I want to add another gig of ram. If the ram I buy is 2x512mb DDR2 PC4200 can these 4 sticks work together? or do they have to all be 3200? I am currently upgrading an HP PSU 300 watt to something better since I added a 6600GT and the PSU can no longer handle it. So I'm wondering, should I get a 40$ canadian thermaltake psu at 430w to handle my system for a year or 2 or should I get a really high end one like a raidmax 580w for 80$ candian and make it last to my next computer ?
s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386163054424/warc/CC-MAIN-20131204131734-00082-ip-10-33-133-15.ec2.internal.warc.gz
CC-MAIN-2013-48
528
2
http://stackoverflow.com/questions/18361239/net-float-precision-appears-to-be-9-digits
code
I'm porting an app from .NET to the Mono Runtime, and at one point in the code I can see that a float has the value 158136.422. My understanding of float was that it was 7 digit precision, so how is that number acceptable? Mono trims it to 7 digits as I'd expect. If in C# I do float f = 158136.422f; It gets rounded to 158136.4.
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783397842.93/warc/CC-MAIN-20160624154957-00084-ip-10-164-35-72.ec2.internal.warc.gz
CC-MAIN-2016-26
329
5
https://www.truenas.com/docs/hub/tasks/advanced/editingacls/
code
5 minute read An Access Control List (ACL) is a set of account permissions associated with a dataset and applied to directories or files within that dataset. These permissions control the actions users can perform on the dataset contents. ACLs are typically used to manage user interactions with shared datasets and are created when a dataset is added to a pool. When creating a dataset, you can choose how the ACL can be modified by selecting an ACL Mode: Passthrough only updates ACL entries (ACEs) that are related to the file or directory mode. Restricted does not allow chmodto make changes to files or directories with a non-trivial ACL. An ACL is trivial if it can be fully expressed as a file mode without losing any access rules. Setting the ACL Mode to Restricted is typically used to optimize a dataset for SMB sharing, but can require further optimizations. For example, configuring an rsync task with this dataset could require adding --no-permsas an extra option for the task. To view an ACL, go to Storage > Pools and click the Edit Permissions option for a nested dataset within a pool. The ACL for a new file or directory is typically inherited from the parent directory and is preserved when it is moved or renamed within the same dataset. An exception is when there are no File Inherit or Directory Inherit flags in the parent ACL owner@, group@, or everyone@ entries. These non-inheriting entries are added to the ACL of the newly created file or directory based on the Samba create and directory masks or the umask value. Basic Permissions Editor The Permissions Editor option will allow basic adjustments to a datasets ACL. ACL Manager - Editing an ACL Click the ACL Manager button to adjust file ownership or account permissions to the dataset. The first time the ACL Manager is accessed a screen pops up that with basic presets or custom acl settings. Once they have been set you can go back anytime to adjust your ACL’s. Choose Select a preset ACL and choose a preset. The preset options are OPEN, RESTRICTED, or HOME. Choose Create a custom ACL to create a new list of customized permissions. The selected User controls the dataset and always has permission to modify the ACL and other attributes. The selected Group also controls the dataset, but can have permissions changed by adding or modifying a Any user accounts or groups imported from a directory service can be selected as the primary User or Group. You can quickly apply a standardized ACL with preconfigured Access Control List Entries (ACEs) by choosing one of the Default ACL Options. Otherwise, add a new item to the ACL, define Who the ACE applies to, and configure permissions and inheritance flags for the ACE. To view an ACL information from the console, go to System Settings > Shell and enter command: Permissions are divided between Basic and Advanced options. The basic options are commonly used groups of the advanced options. - Read ( r-x---a-R-c---): view file or directory contents, attributes, named attributes, and ACL. Includes the Traverse permission. - Modify ( rwxpDdaARWc--s): adjust file or directory contents, attributes, and named attributes. Create new files or subdirectories. Includes the Traverse permission. Changing the ACL contents or owner is not allowed. - Traverse ( --x---a-R-c---): Execute a file or move through a directory. Directory contents are restricted from view unless the Read permission is also applied. To traverse and view files in a directory, but not be able to open individual files, set the Traverse and Read permissions, then add the advanced Directory Inherit flag. - Full Control ( rwxpDdaARWcCos): Apply all permissions. - Read Data ( r): View file contents or list directory contents. - Write Data ( w): Create new files or modify any part of a file. - Append Data ( p): Add new data to the end of a file. - Read Named Attributes ( R): view the named attributes directory. - Write Named Attributes ( W): create a named attribute directory. Must be paired with the Read Named Attributes permission. - Execute ( x): Execute a file, move through, or search a directory. - Delete Children ( D): delete files or subdirectories from inside a directory. - Read Attributes ( a): view file or directory non-ACL attributes. - Write Attributes ( A): change file or directory non-ACL attributes. - Delete ( d): remove the file or directory. - Read ACL ( c): view the ACL. - Write ACL ( C): change the ACL and the ACL mode. - Write Owner ( o): change the user and group owners of the file or directory. - Synchronize ( s): synchronous file read/write with the server. This permission does not apply to FreeBSD clients. Basic inheritance flags only enable or disable ACE inheritance. Advanced flags offer finer control for applying an ACE to new files or directories. - Inherit ( fd-----): enable ACE inheritance. - No Inherit ( -------): disable ACE inheritance. - File Inherit ( f): The ACE is inherited with subdirectories and files. It applies to new files. - Directory Inherit ( d): new subdirectories inherit the full ACE. - No Propagate Inherit ( n): The ACE can only be inherited once. - Inherit Only ( i): Remove the ACE from permission checks but allow it to be inherited by new files or subdirectories. Inherit Only is removed from these new objects. - Inherited ( I): set when the ACE has been inherited from another dataset. Was this page helpful? Glad to hear it! Please tell us how we can improve. Sorry to hear that. Please tell us how we can improve.
s3://commoncrawl/crawl-data/CC-MAIN-2021-04/segments/1610703500028.5/warc/CC-MAIN-20210116044418-20210116074418-00093.warc.gz
CC-MAIN-2021-04
5,501
75
https://lists.kernelnewbies.org/pipermail/kernelnewbies/2015-July/014619.html
code
sudipm.mukherjee at gmail.com Fri Jul 17 04:11:16 EDT 2015 On Fri, Jul 17, 2015 at 1:25 PM, Navy <navych at 126.com> wrote: > Goto is recommend in linux kernel programming, but it is despised in many other situation. There are four rationable for using goto in Documentation/CodingStyle. Do you have some viewpoints about "why goto" or "why not goto"? I'm glad to get your point. Check the file drivers/staging/dgap/dgap.c there is a function called dgap_init_one() which is using 6 goto statements. Please try to convert that file without using goto and i hope you will understand practically why goto. More information about the Kernelnewbies
s3://commoncrawl/crawl-data/CC-MAIN-2021-25/segments/1623487598213.5/warc/CC-MAIN-20210613012009-20210613042009-00525.warc.gz
CC-MAIN-2021-25
644
10
https://github.com/aslapkov
code
Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users. You must be logged in to block users. Contact GitHub support about this user’s behavior. Learn more about reporting abuse. 👨💻 My personal small website built with Gatsby js and deployed for free with Netlify Forked from react-hook-form/react-hook-form 📋 React hooks for forms validation without the hassle. 😎 🐣 A starter boilerplate for a universal web app with the best development experience and a focus on performance and best practices. Seeing something unexpected? Take a look at the GitHub profile guide.
s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656104690785.95/warc/CC-MAIN-20220707093848-20220707123848-00690.warc.gz
CC-MAIN-2022-27
649
11
https://salesforce.stackexchange.com/questions/342213/how-can-i-automate-page-load-time-testing
code
I'm trying to get metrics for page load times. I'd like to load the page many times, say 100 times, and get the average time it took to load the page, from a virtual Cmd-R to the page remaining stable because the data has loaded. The page contains datatable that loads 50 records using SOQL on Apex. ?eptVisible=1 to get what Salesforce calls "Experienced Page Time," but this doesn't seem to actually record the time to load the page, but perhaps the time to load my web components. It doesn't seem to start counting until a couple of seconds into page load. Is there a tool, preferably perhaps a Chrome extension, that can help with this?
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817398.21/warc/CC-MAIN-20240419110125-20240419140125-00098.warc.gz
CC-MAIN-2024-18
640
3
http://www.isea-archives.org/isea96-john-law-drawing-on-the-brain-an-art-science-collaboration-2-2-2-2-2-2-2-2-2-2-2-2-2-2/
code
A basic set of terms and models are developed to describe a range of possible sound-action models. Mention is made of how existing technologies could serve to implement these models. Most of the discussions concerning the rapid technological evolution of desktop and networked-based multimedia have focused on the domain of progress, a “progress” given by sets of numbers that are clearly greater in magnitude with every passing year. This numerophilia is understood palpably as a Being-towards-convergence, in particular, as the hope that multimedia over the Internet will, once we have conquered the problems of bandwidth and the right feature set, provide as flexible and useful a medium as desktop multimedia has been. Java, ShockWave, and ahost of nascent networking technologies exist as the current emissaries of this hope, though they have yet to advance any real works of quality multimedia. Underlying this hope, however, is a fundamental myopia that reinforces a human computer interaction model derived from a conceptually sophomoric transactional client/server model of distributed systems. Akin to the assumptions about technology as progress raised by our Heideggerian post-atomic consciousness, we have no corresponding epochal awakening that the fetishization of progress in informational technologies is overshadowing the exploration of creative alternative interfaces by its own relentless and demonstrable gains in bandwidth and speed. Sound models, in particular, have only evolved in small steps from a simplistic, isomorphic and stateless action/response model. Little thought, if any, has been given to a detailed consideration of alternative models of sound/action interaction for networked multimedia. In making an inquiry intended to systematic and comprehensive, one must speculate intelligently upon the perceptual and psychological ramifications of different sound models upon the user. Since these effects are not obvious, experiments could subsequently be derived in which it could be seen how users would react to more complex or intelligent uses of sound in the context of their actions.This paper articulates a detailed taxonomy that adds another level of complexity to the simple and ubiquitous action/response model. This level explores the possibility of an added level of indirection, an agent, between a set of sounds and actions. This idea is developed with examples by examining potentially useful data structures to associate with the action, a consideration of models that recognize sound as both static sound objects and as dynamic sound streams (with modifiable real-time parameters), and a consideration as to the different levels (mircostructural/macrostructural) that can be affected by the agent. Relationships and interaction with bundled visible objects (sprites) are also considered. This schemata, comprising seven possible models, proceeds from defining the different models, to discussions of how the models might be implemented in Director/Lingo, or on the web in HTML, Java, or ShockWave. Lastly, a perceptual model of reinforcement is examined in a speculation as to the perceptual ramifications of more complex sound/action relationships and their possible efficacy and uses. - Brett Terry, USA, Burnett Group Full text p.91-93
s3://commoncrawl/crawl-data/CC-MAIN-2021-10/segments/1614178365454.63/warc/CC-MAIN-20210303042832-20210303072832-00049.warc.gz
CC-MAIN-2021-10
3,291
4
http://ufazavtra.ru/chatjackingoff-26668/updating-microsoft-outlook-2016.html
code
If you are upgrading from a version earlier than Outlook 2007 Service Pack 2, then several extensive file structure changes to the pst-file are being made which could take a lot of time (especially with a large pst-file). Upgrading from a later version usually goes a lot quicker. You’ll find the setting under: Computer Configuration-If you were using Outlook Business Contact Manager (BCM) with Outlook, then you’ll no longer be able to use it with Office 2016. BCM will not be updated for Office 2016 compatibility. For more information see: Should I install the 32-bit or 64-bit version of Office/Outlook? Note: Even when you are using the 32-bit edition of Office 2016, some add-ins might not be compatible yet with Office 2016. If the update isn’t being offered to you yet, go to: File-There is no need to uninstall your current Office 365 installation first. Now that your machine has been prepared, you can run the installer to install Office 2016. If the 32-bit edition is what you want (again; this is recommended), then just follow the setup instructions and move to the next section in this guide. If you want to install the 64-bit edition, keep reading…In order to install the 64-bit edition of Office 2016, you’ll first need to uninstall all 32-bit Office applications, including older versions. If any such application is still installed, you will not be able to install the 64-bit edition of Office. It of course never hurts to make a backup of your Outlook data first. If you are having difficulties removing your current version of Office via Control Panel, you can use the Fix It from the Microsoft KB article below which matches with the version that you wish to uninstall: When you are currently using an Office 365 installation of Office 2013, then upgrading to Office 2016 is going to be really easy as it will be offered as a regular update. When you are currently using Outlook 2013 as part of an Office 365 subscription, you can postpose the automatic upgrade to Office 2016 for up to a year after its release by setting a Registry value.
s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376823702.46/warc/CC-MAIN-20181211194359-20181211215859-00131.warc.gz
CC-MAIN-2018-51
2,074
14
https://www.experts-exchange.com/questions/20817397/DNS-Active-Directory-with-external-router-WAN-connection.html
code
It's been quite a while since I've set up AD/DNS, and that was in a corp. environment with a networking group to do the DNS stuff... I have donated my time to a museaum to set up new computers for them. Server is WIN2k running AD / integrated DNS. Here is my config: WAN/Router/firewall (DSL line). Servers and workstations will have static inside (private) addresses. My question - how to make the SERVER DNS provide OUTSIDE resoulution (internet sites like this one!) to the users inside? I know this is an easy one for you guys.
s3://commoncrawl/crawl-data/CC-MAIN-2018-34/segments/1534221217909.77/warc/CC-MAIN-20180821014427-20180821034427-00414.warc.gz
CC-MAIN-2018-34
531
4
https://joind.in/event/dutch-php-conference-2018/machine-learning-and-trend-analysis-in-php
code
Talk in English - US at Dutch PHP Conference 2018 Short URL: https://joind.in/talk/da4a1 (QR-Code (opens in new window)) The world we live in is one where data is one of the most valuable assets. There are many different pieces of data we can analyse on all kind of data from analytics of user behaviour of your platform, user generated content, monitoring of exception rates, or when your core business model is to provide some kind of analytics platform. This talk will talk about how you can, in your PHP applications, perform utilise machine learning techniques to build models, analyse data to get useful information and spot anomalies. Comments are closed. Was a really good talk and informative A lot of things were explained in a reasonable time. Nice introductional talk. Michael explained the mathematics very well! It was clear for me how I could use machine learning in an basic way to predict some outcomes. I liked the introduction of the 'learning' part of people. Michael got my full attention the whole 45 minutes. And as usual an great presentation skills. ? Very good talk! One of the top talks I've seen this conference Talk was ok, but the general theory could have been dealt with far more quickly and I would like to have seen some real world examples because I feel like the two algorithms shown are very difficult to apply to sets with multiple types of data like log files. Great talk. Both the basics of the mathematical theory and a working PHP implementation explained.
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224657144.94/warc/CC-MAIN-20230610062920-20230610092920-00416.warc.gz
CC-MAIN-2023-23
1,498
10
http://blog.aclark.net/2015/10/05/i-reinstalled-again/
code
A while back I wrote about reinstalling OS X. A while back I wrote about reinstalling OS X: http://blog.aclark.net/2010/10/15/i-reinstalled-recently. This is another one of those posts. I like to reinstall OS X, a lot. So much so, you’d think I’d find some way to automate the process. There must be something soothing about it, though, because I keep doing it. I’m writing this post now because since my last post, I’ve begun storing a snippets on gist.github.com to help automate the process. This way, I get “the best of both worlds”: Specifically, with El Capitan I’ve settled on these 4 snippets: Next, I perform various additional steps manually either because I’ve not figured out how to automate them or the automation prospects are not attractive: Still, I’d trade all these steps for full automation if I could find an approach that’s not more tedious than cut & pasting the above. Lastly, I hope this helps someone. Please add a comment below if you have a better approach.
s3://commoncrawl/crawl-data/CC-MAIN-2018-05/segments/1516084888135.38/warc/CC-MAIN-20180119204427-20180119224427-00619.warc.gz
CC-MAIN-2018-05
1,004
8
https://www.linux.com/news/cost-ubuntu-disk-encryption
code
It's been a while since last running any Ubuntu Linux disk encryption benchmarks, but thanks to recent encryption improvements within the upstream Linux ecosystem, it's time to deliver some new Linux disk encryption benchmarks. In this article are results comparing Ubuntu 13.04 without any form of disk encryption to using the home directory encryption feature (eCryptfs-based) and full-disk encryption (using LUKS with an encrypted LVM). May 20, 2013 The Cost Of Ubuntu Disk Encryption Read more at Phoronix
s3://commoncrawl/crawl-data/CC-MAIN-2019-26/segments/1560627998339.2/warc/CC-MAIN-20190617002911-20190617024911-00208.warc.gz
CC-MAIN-2019-26
509
4
https://greschool.design/landscape/olivia-pemberton/
code
MLA Landscape Architecture Charlton Mix And Sample: An Edible And Visual Feast Along The Capital Ring This project takes inspiration through the act of walking and studying various objects found within the landscape. By sampling and mixing these different objects, this proposal takes the form of a walk which explores ideas of views, time, position and speed. This walk facilitates the discovery of objects and interest, while reconnecting Charlton Park back to the Capital Ring.
s3://commoncrawl/crawl-data/CC-MAIN-2021-39/segments/1631780057508.83/warc/CC-MAIN-20210924080328-20210924110328-00569.warc.gz
CC-MAIN-2021-39
480
3
https://unix.stackexchange.com/questions/77899/why-is-my-tar-file-bigger-than-its-contents/77902
code
I have a tar file that I have recreated from two files - xaa, xab (the results of using the split command). The tar file is the size I expect it to be but when I extract it the folder I get is a fraction of the size of the tar file. See the terminal output below for the sequence of my commands. Unfortunately I don't have the orignal tar file or folder - so this is my only chance to recover this data. When I open the archive in the 'File Roller' I see the same folders as I do on the command line after extraction and these are only a subset of the files I'd expect to see. Can anyone suggest why this might be? ~> cat xa* > archive ~> file archive archive: POSIX tar archive (GNU) ~> ls -la archive -rw-r--r-- 1 hugo users 24471439360 Jun 1 18:50 archive ~> tar xf archive ~> cd repos ~/repos> du --max-depth 0 -h 83M . ~/repos> cd ../ ~> tar cf newarchive repos ~> ls -la newarchive -rw-r--r-- 1 hugo users 53288960 Jun 1 19:57 newarchive
s3://commoncrawl/crawl-data/CC-MAIN-2019-43/segments/1570987838289.72/warc/CC-MAIN-20191024012613-20191024040113-00340.warc.gz
CC-MAIN-2019-43
943
2
http://serverfault.com/questions/434629/how-to-install-network-drivers-during-installation
code
I have a server that I'm attempting to install windows onto. However, the disk is an iscsi target provided by ipxe. Everything appears to go well until about 3/4 through the install process I get an error about a critical driver missing and the installation is cancelled. I would say the critical driver would be the network card. It's an intel nic and the drivers are not on the windows installation CD. I tried slipstreaming them with RTSevenLite, but after it created the CD it seems it failed to make it bootable. I've also not been successful in making a bootable USB thumb drive or USB HDD. I suspect a buggy bios even though I have the latest. How to install network drivers during installation? Windows used to provide an optional F6 during install feature but this seems to be missing in Windows Servert 2008. Perhaps there is a way to do this, or another method?
s3://commoncrawl/crawl-data/CC-MAIN-2016-30/segments/1469257824204.68/warc/CC-MAIN-20160723071024-00010-ip-10-185-27-174.ec2.internal.warc.gz
CC-MAIN-2016-30
872
6
https://nirvdrum.com/2011/11/30/presenting-web-consistency-testing.html
code
Before I started working on Mogotest I spent a lot of time thinking about the current state of Web development and testing and how we might be able to improve upon it. I was frustrated with the seeming lack of progress being made because it appeared the entire industry was stuck on some local maxima. Having a machine learning and HCI background, I tried to think of Web testing in terms of what matters to a visitor and how a computer could automate that process. This initial work formed the basis for what would evolve into Web Consistency Testing and eventually started my career at Mogotest trying to advance these concepts. Web Consistency Testing (WCT) is a new approach towards testing Web pages. It tests how a page is rendered — how it’s viewed by those visiting your site or using your web app. This is arguably one of the most important aspects of a site. Study after study has shown how a poor user experience is tightly correlated with loss in revenue. More recently startups have been relying on the design of their sites as a way to differentiate themselves from the pack. The look and feel of a site or app is what sets each of us apart, but it’s also one of the hardest things to implement correctly and maintain (regressions are all too common). On top of all that, we traditionally haven’t tested this core aspect of our sites & apps because there hasn’t been a good way to automate it and testing manually is laborious, expensive, and error-prone. I recently was fortunate enough to present Web Consistency Testing at Google’s Test Automation Conference. The talk goes into the details of how it works and how to build a WCT system, with Mogotest serving as the vessel through which many of these concepts have been validated. I also set up a site at http://webconsistencytesting.com for the community to experiment, learn, and further develop the principles. We had always planned on opening up the work we do at Mogotest and we have opensourced a lot of code, but this is the first time we’ve really detailed how everything works. We’re happy to be the go-to company for Web Consistency Testing, but competition is good, and more than anything else we’d like to see the industry test smarter and spend more time making the Web a better place for all. I hope you enjoy.
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506329.15/warc/CC-MAIN-20230922034112-20230922064112-00552.warc.gz
CC-MAIN-2023-40
2,310
3
http://www.willstrohl.com/Blog/PostId/544/DotNetNuke-Hackathon-Meeting-Details-amp-Door-Pri
code
I am in the middle of finalizing the details and preparations for the largest and most exciting Orlando DotNetNuke® Users Group (ODUG) meeting to date. Part of the reason for the excitement is because it features Nik Kalyani. That’s only the beginning though. There is so much more to look forward to. For instance, we have joined forces with the local .Net user group, ONETUG. Both groups have a great chemistry, so this will be interesting. First of all, the meeting is this Tuesday, on May 4th at 6:30 PM at the Orlando City Hall (9th floor) in downtown Orlando. Register to Attend the ODUG Meeting This month we have a fun and exciting new format to unveil to everyone. It’s called a hackathon. This is an event where the speaker hold an interactive coding session where everyone can watch or follow along at their own pace. Our speaker, Nik Kalyani, will be showing us how to build a DotNetNuke® module using the Model-View-Presenter (MVP) pattern. DO NOT take this for-granted. Nik is an exceptional speaker, and has a vast array of technical knowledge, and it doesn’t just center around DNN. So BE THERE and PICK HIS BRAIN! At the end of the session (or even before), you will have all of the tools and knowledge to get started with your own DNN module, and that’s the point. This is because the hackathon isn’t just a cool meeting. It’s a COMPETITION, with the grand prize winner getting a cherry red Dell Vostro 3500 notebook! Runners up will get an Acer netbook. All you have to do is use the very simple project specs to create an open source, MIT licensed module within 24 hours. Then, you and your fellow hackathon participants will vote on their favorite entries. Winner takes all! Make sure you check out the Hackathon website to register and learn more about the prizes, projects, and other details. Projects: http://hackathon.in/Cities/Orlando/Projects.aspx Rules: http://hackathon.in/Cities/Orlando/Rules.aspx We have a ton of prizes people. Seriously! This isn’t just marketing mumbo-jumbo. Check out this non-inclusive list of door prizes and/or prize sponsors: There are many more prizes to put on that list, but I do not have the full list of prizes coming from the ONETUG. Aside from our prestigious speaker, we have two other special guests coming in from out of town to be at this meeting. First, we are welcoming back Megan Hopkins. She is flying in from San Francisco to help us out with our newest sponsor, Signature Consultants. Megan has been a huge supporter of all developers in the Central Florida area for a long time, even from afar. So, this is a very special treat for everyone, as she will be introducing us to the other local folks at Signature. We will also be welcoming Will Morgenweck, the owner of one of the most popular DNN module companies, Active Modules. Will is also coming from out of town, and will be giving away a few licenses for Active Social and Active Forums. You must be present for these goodies! If you’re present, you also get to spend time with the brain of AM. Bring your questions! Normally, the ODUG meets at CoLab Orlando, but our meeting is way too big this month to fit into their facility. Luckily, this problem was quickly and easily solved when the ONETUG offered to join us. Part of what makes that very special is that we get to hold our meeting with them at their venue, the Orlando City Hall. I have been to numerous user group meetings in many places, and this is hands down, the best venue for a user group that I have been to so far. We would like to not only thank the ONETUG for letting us use their meeting space, but also JT. He is the ONETUG Treasurer, and works for the city of Orlando and makes sure that we get the venue when we need it. Where would we be without our fantastic sponsors?! Simply put… No where special. Our sponsors have added value to our user group for a long time. While this is a challenge to maintain for any user group, our sponsors have made this incredibly easy. Not only that, but our newest ODUG board member, Alex Buckles, has done a phenomenal job of rounding up and organizing sponsors over the past month. This meeting in particular has a very special sponsor. Our meeting sounds this great for one reason. PowerDNN has stepped up to the plate to sponsor nearly everything that is going on at this meeting. This includes some of the swag, and the hackathon grand prizes. We cannot thank PowerDNN enough for their generous contributions and exceptional support to make this event happen. If you have a moment, please write them a thank you note.
s3://commoncrawl/crawl-data/CC-MAIN-2018-26/segments/1529267861899.65/warc/CC-MAIN-20180619041206-20180619061206-00223.warc.gz
CC-MAIN-2018-26
4,580
16
http://forums.na.leagueoflegends.com/board/printthread.php?s=&t=1074158
code
Earrly game dominance @Riot This concern stems from what info has been released about dominion so far. The concern is that strong early game champions will dominate early game, giving an immediate advantage to a team with fewer carry champs or champs that are simply much stronger early game. When they take the early lead, they only get stronger from having that early lead and the gap simply widens from there. Speaking theoretically in the instance of no skill difference between the two teams it seems to me that the team that games the early lead by having better champs for early game will simply snowball,and never give the opposing team the chance to recover or come back. Is this a baseless concern, and if so why? If not, what are you going to do about this possible balance issue. |All times are GMT -8. The time now is 09:54 PM.| (c) 2008 Riot Games Inc
s3://commoncrawl/crawl-data/CC-MAIN-2015-14/segments/1427131299114.73/warc/CC-MAIN-20150323172139-00178-ip-10-168-14-71.ec2.internal.warc.gz
CC-MAIN-2015-14
865
7
https://www.suse.com/security/cve/CVE-2020-7943/
code
DescriptionPuppet Server and PuppetDB provide useful performance and debugging information via their metrics API endpoints. For PuppetDB this may contain things like hostnames. Puppet Server reports resource names and titles for defined types (which may contain sensitive information) as well as function names and class names. Previously, these endpoints were open to the local network. PE 2018.1.13 & 2019.5.0, Puppet Server 6.9.2 & 5.3.12, and PuppetDB 6.9.1 & 5.2.13 disable trapperkeeper-metrics /v1 metrics API and only allows /v2 access on localhost by default. This affects software versions: Puppet Enterprise 2018.1.x stream prior to 2018.1.13 Puppet Enterprise prior to 2019.5.0 Puppet Server prior to 6.9.2 Puppet Server prior to 5.3.12 PuppetDB prior to 6.9.1 PuppetDB prior to 5.2.13 Resolved in: Puppet Enterprise 2018.1.13 Puppet Enterprise 2019.5.0 Puppet Server 6.9.2 Puppet Server 5.3.12 PuppetDB 6.9.1 PuppetDB 5.2.13 Overall state of this security issue: Resolved This issue is currently rated as having important severity. |National Vulnerability Database| |National Vulnerability Database||SUSE| Status of this issue by product and package Please note that this evaluation state might be work in progress, incomplete or outdated. Also information for service packs in the LTSS phase is only included for issues meeting the LTSS criteria. If in doubt, feel free to contact us for clarification. |SUSE Linux Enterprise Module for Advanced Systems Management 12||puppet||Not affected| |SUSE Linux Enterprise Server 11 SP4 LTSS||puppet||Not affected|
s3://commoncrawl/crawl-data/CC-MAIN-2021-25/segments/1623487584018.1/warc/CC-MAIN-20210612132637-20210612162637-00611.warc.gz
CC-MAIN-2021-25
1,569
9
https://www.diversifytech.co/job-board/senior-software-engineer---learning-games-(unity)-curriculum-associates/
code
Job Board/Senior Software Engineer - Learning Games (Unity) at Curriculum Associates Your game development skills can help children learn. Our team (i-readycentral.com/LearningGames) creates delightful, award-winning games that help students master math and develop a positive relationship with intellectual challenge. We’re a tight-knit, passionate crew often greeted by cheers and applause when we walk into classrooms – we’ve even signed autographs for our kid fans. Our engineering team is looking to hire a Senior Software Engineer to help us develop cross-platform games and expand existing titles. Our studio creates games in unique circumstances. Rather than building a game that will find its market niche for some months (years if you're lucky) and moving onto the next game, our games are platforms for learning that will continue to evolve over the next 5-10 years as our relationship to curricula advances. We're more willing to invest in testing and solid foundational design than other game studios. Of course, we also have constraints like a need to make initial WebGL export files very lean so we can support schools with low internet bandwidth. Join us if you want to make games that positively impact kids' lives with internal architecture as beautiful as their outward appearance. The impact you’ll have: Lead Unity development: we’re a small team, so your focus is implementation. You’ll be collaborating with all to add new features and game mechanics to existing titles, bring new game concepts from prototype to polished final product, iteratively refine student interactions to maximize learning and fun – and fix bugs, of course! Elevate our Unity codebase: you’ll evolve and expand our library of education and game components that underlie our suite of mobile and web games in multiple genres. A focus here can provide growth into an Architect role. Mentor game engineers on a growing team: perform team code reviews and share knowledge about our common library as it evolves, as well as design patterns, 3rd party libraries and more. What we’re looking for: Passion for helping children learn. Ability to work from our San Francisco office, located next to Montgomery BART. 8+ years working in the game industry, 2+ years working on the Unity platform. (Note: we may also be building games in HTML or other platforms, but the majority will be in Unity. Also, if you jumped into games from another industry but meet our other criteria, give us a shout!) A portfolio of diverse, high-quality, cross-platform games. Ability to discuss the merits of common game patterns and reusable architecture. Willingness to advocate for additional improvements to our technology and processes. Experience creating modular classes and services for reuse across diverse titles. Comfort taking on myriad responsibilities on a small, entrepreneurial, collaborative, Agile team. We’d also love to see: Passion for improving the production pipeline. Experience optimizing for performance and memory footprint.
s3://commoncrawl/crawl-data/CC-MAIN-2019-13/segments/1552912201672.12/warc/CC-MAIN-20190318191656-20190318213656-00099.warc.gz
CC-MAIN-2019-13
3,037
18
https://community.sap.com:443/t5/enterprise-resource-planning-q-a/is-the-fifo-value-stored-in-the-database-where/qaq-p/8295176
code
We are working on an implementation project of B1 with an integration to SAP ERP. We need to find the stock value somewhere in the database. Does this exist if you are running FIFO? Is running a stock report the only way to find the stock value when running FIFO, nothing is stored in the DB? Your help is much appreciated.
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474649.44/warc/CC-MAIN-20240225234904-20240226024904-00756.warc.gz
CC-MAIN-2024-10
323
2
https://www.mirketa.com/new-subscription-management-api/
code
In today’s life the Salesforce empowers the business who uses self-service-channel by providing Subscription Management API. This API will help the automation of billing, invoicing, and collecting payments for subscribed items/products and one-time sales. The Salesforce Clients who uses the Einstein AI they can use this API for calculating Risk of late payments and increase in revenue. Developer can use this API with websites, Slack, and mobile apps. The implementation logic of this is in the form of separate API hence it decouples it from Application Layer. Examples of some of the use cases which support recurring subscriptions sales are: - Price Adjustments and Calculating Prices - For all Service Channels with ‘Buy Now’ (checkout) - Cancellation and Renewing of Subscription - Payment and Billing Process The implementation of subscription involves following Salesforce configuration - Connected App – OAuth 2.0 (Optional) - Payment Gateway - Product Data - Pricing and Invoicing Info - Tax Provider The Subscription Management API includes collection of Synchronous and Asynchronous APIs. We need to configure OAuth 2.0 authorization flow (refer the link for Connected App config steps using OAuth 2.0 Protocol)using Connected Apps to access these APIs. The widely used applications which involve Preconfigured Payment Methods and lets customer to select the Products and purchase it known as buy now solution (checkout) By chaining one and more APIs we can achieve end to end functionality. To integrate with external systems we can use REST-APIs of Subscription Management API In case of Asynchronous API Platform Event gets published when Process completes execution. A subscriber who is subscribed to it , listen to that event. There are many ways to listen it. Invoke Subscription Management API- Developer can invoke it using one or more combinations of tools. Salesforce provides Flows to invoke this API. We can use invocable Actions to call this API. Following diagram demonstrate the use of Flow Pause Element . The Asynchronous Action gets executes and completes all events. These are Platform Events. The Pause element wait for this events to complete. When Invoice creation gets complete then it publishes the invoice processed event. Using Apex we can call invocable actions and subscribe to the Platform Events which is completion events in this scenario. We can use LWC as User Interface to call this Subscription Management API . When these Asynchronous system are outside of Salesforce environment. We can invoke REST APIs of Subscription Managements using tools. We can then subscribe the completion events of Asynchronous API using cometD client (refer https://cometd.org/). This client is used in various popular open source languages. Please refer the Example with some sample data for Subscription Cost- 100$ per month Tax – .57 after calculation of percentage of tax This shows the POST request POST – /services/data/v54.0/composite
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100942.92/warc/CC-MAIN-20231209170619-20231209200619-00438.warc.gz
CC-MAIN-2023-50
2,982
30
http://www.thegamerplanet.com/forums/showthread.php?s=4d79a4afc2132c822c4bb66b0fd697cb&t=13458
code
Smokey gets the better sound quality I went out and updated my sound. I bought a SoundBlaster X-FI Extreme Music sound card. Also I picked up a Turtle Beach Ear Force HPA headset. It definatly smokes out my old stuff the AC97 onboard and logitech $19.99 headset. The sound is excellant you can a lot. For example I heard a guy crawling on Insurgent Camp from the tents all the way around the building. Now if you are looking to upgrade this package costed me $230, but it is definatly worth the money as the X-FI is top notch, and the HPA Headset recieved some good reviews on various pc and gaming sites.
s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187820487.5/warc/CC-MAIN-20171016233304-20171017013304-00200.warc.gz
CC-MAIN-2017-43
605
2
https://discourse.julialang.org/t/excel-files-julia/91253
code
It’s exam time, and I need to script the reading of content from a number of Excel files, put the information into a DataFrame, compute grades, and write the result to an Excel file. Last time I did this, I used package DataFrames (in 2020). It seems like ExcelFiles was last updated in 2019. - What is the best way to read the content of Excel files in Julia at the moment - Similarly for writing to Excel files I think most people use XSLX.jl, although that would have been true in 2020 as well so maybe there was a specific reason why you didn’t choose it then? In any case if you’re essentially doing the same thing you did 2 years ago and it worked for you at that point you might not want to chang anything - just re-instantiate the manifest from when you last did this and work with the versions of packages that worked for you last time! I have to modify it… the way to compute grades has changed :-o. I don’t remember why I chose ExcelFiles last time, but will check XSLX. The package XLSX seems to be still in an early state. In my case a number written in the form of readxlsx() to crash with the missleading error message ERROR: Styles not found for this workbook. What about Pandas.jl? It might be that the issue is caused by the digital delimiter char, which is on my machine the comma After I have tried the alternatives: Pandas.jl I have to admit, the others are also failing with my Excel-File. I use XLSX successfully, and OdsIO for LibreOffice. I only use North American decimal characters though.
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510516.56/warc/CC-MAIN-20230929122500-20230929152500-00248.warc.gz
CC-MAIN-2023-40
1,526
19
http://www.freeos.com/taxonomy/term/43
code
Links - Articles Oracle has sued Google, accusing it of copyright and patent infringement. Oracle is claiming that Google’s Android OS is illegally using some ideas and code base from Java, which was developed by Sun. Oracle bought Sun in January. Google is denying the charges. Apache is an Open Source WebServer. Apache is a module based web server, which means the functions or individual piece of code that allows the server to handle a certain kind of request or file in appropriate way. This is a step by step tutorial of Apache Installation on Linux. Visit To Go Tutor for a guide on how to install Apache on Linux. I spend most of my time teaching classes on Solaris internals, device drivers, and kernel crash dump analysis and debugging. When explaining to classes how various subsystems are implemented in Solaris, students often ask, "How does it work in Linux?" or, "In FreeBSD, it works like this, how about Solaris?" This article examines three of the basic subsystems of the kernel and compares implementation between Solaris 10, Linux 2.6, and FreeBSD 5.3. The Linux and Toyota communities are both composed of engineers, so members have the same skills as their colleagues and speak the same language. But these groups are far more disciplined and rigorous in their approach to work than are other engineering communities. Mod_rewrite is apaches most powerful and mystifying module. The basics are introduced and some practical uses include improving URLS for search engines and preventing people from hotlinking to your images are covered. This article presents an approach to combine the best of the open source and proprietary software development worlds In battles over operating system superiority, emotions run high. Capabilities are assembled like armies and run out on discussion boards to face the flames. So let me say this now: your operating system is probably better than mine. Most modern operating systems are better than FreeDOS when considered by any objective criteria. FreeDOS doesn't multitask, doesn't surf the Internet easily, isn't great for multimedia productions, and doesn't even do Windows. But I love it anyway.
s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218189802.18/warc/CC-MAIN-20170322212949-00554-ip-10-233-31-227.ec2.internal.warc.gz
CC-MAIN-2017-13
2,159
10
http://must-know-mac.blogspot.com/2008/05/adium-and-amsn-instant-messaging-for.html
code
If you've used a computer you probably have used instant messaging. Instant messaging is great for chatting with all your friends online. When it comes to clients for instant messaging there are tons for Windows but few for Mac. The big one many people used is "Windows Live Messenger". On Windows it's great... on Mac, not so much. If you are used to "Windows Live Messenger" and like it's features then you may want to try aMsn. The way it is set up is much more similar to Windows Live Messenger. It also has most of the features of Live Messenger like video and audio chat. Perfect, so what's the downside? Well aMsn does not perform as well as Adium. There is yet to be a stable release of it to come out. Updates for aMsn are also much less frequent so if you have a problem you need to switch or wait a while. The next option is the one I use. It's called Adium. Adium is truly a Mac instant messenger. It is very similar to iChat without the Video and Audio chat. This sucks because you can't use the lovely iSight camera that comes with all (other then the mini and pro) Macs. On the bright side though, Adium is much more stable, gets more updates, and is the MOST customizable instant messenger client out there for Mac. You can change almost everything about it. The colors, the emoticons, the message styles, the window styles, the icons... almost everything. Their site has plugins, emoticons, sound sets, service icons, status icons, apple scripts, message styles, window styles, dock icons and other things. You can download hundreds of things to customize Adium and make it however you want. The only edge aMsn has on Adium is the Video and Audio chat. Although these are really cool features to have I would say, survive without them for now. Adium is currently working on bringing Audio and Video chat to Adium. It shouldn't be long so keep your ears open. So there you have it, aMsn and Adium. Both great, I'll leave it up to you to decide. Adiums Website: http://adiumx.com/ aMsn Website: http://www.amsn-project.net/index.php
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917123484.45/warc/CC-MAIN-20170423031203-00401-ip-10-145-167-34.ec2.internal.warc.gz
CC-MAIN-2017-17
2,047
19
http://www.mhonarc.org/archive/html/ietf/2008-02/msg00422.html
code
This is a retransmission with a source address accepted on this Apologies to those who received it already. If you respond, please use preferably this copy. Harald Alvestrand wrote: One approach to achieve it could be ias follows: Mark Andrews skrev: You also don't want to do it as you would also need massive churn in Microsoft gets this wrong as they don't register the privacy addresses in the DNS which in turn causes services to be blocked because there is no address in the DNS. perhaps the advent of IPv6 will result in people finally (*finally*) giving up on this sorry excuse for a security blanket? (calling it a "mechanism" is too kind) Or perhaps it'll just make people register wildcard records at the /64 level in ip6.arpa :-( - An IPv6 link where some privacy source addresses may be used would have in the DNS a record for a "generic privacy address". - This address would be the /64 of the link followed by an agreed "joker IID" (0:0:0:0 or some other to be agreed on, e.g. FFFF:0:0:0). - Resolvers, if they recognize a privacy remote address, would query the reverse DNS with this "generic privacy address" of the remote link. - They could also do this type of queries after failures of full Privacy addresses, as specified today, cannot be distinguished with 100% certainety from addresses obtained with stateful DHCPv6. A proposal would be an addition to the privacy extension spec (rfc - A variant of privacy addresses would be defined for "dsitinguishable - These addresses would, for example, have FF00::/8 at the beginning of their IID (no currently specified IPv6 IID begins that way; randomness on 58 bits is good enough). - Then resolvers could recognize such privacy addresses for sure, and could query the reverse DNS with the generic privacy address only when this is appropriate. IMHO, this is a feasible step to reconcile: (1) privacy requirements of individuals; (2) desire to know which site is at the other end where and when such a desire exists. IETF mailing list
s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386163844441/warc/CC-MAIN-20131204133044-00009-ip-10-33-133-15.ec2.internal.warc.gz
CC-MAIN-2013-48
2,001
36
http://stackoverflow.com/tags/liferay-6/info
code
Liferay is an open source Java portal and social platform. The 6th version was released on June 2010. Liferay is a free and open-source Java-based enterprise portal, content management system, and social platform used to power corporate intranets and extranets. It supports plugin development using many languages, including PHP and Ruby. The 6.1 GA2 Community Edition and 6.1 GA2 Enterprise Edition were released on the 31st of July 2012. Liferay has released 6.2 community edition and one of the most important and remarkable improvements of the new version of Liferay Portal are the new mobile capabilities that come out of the box. A lot more information is available in the main liferay tag.
s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440645311026.75/warc/CC-MAIN-20150827031511-00228-ip-10-171-96-226.ec2.internal.warc.gz
CC-MAIN-2015-35
696
5
https://arc.ucar.edu/knowledge_base/70549999
code
These libraries have been compiled from source to use native CUDA (GPU) and MPI libraries, increasing the capabilities over downloadable distributions that are available online. The ML/DL library installations can be found in NPL versions for Python 3.7.9. Users load them by activating the NCAR Python Library (NPL). The libraries available are: ML/DL workloads are most likely targeted toward NVIDIA's Tesla V100 hardware. To start an interactive job on a Casper node using a V100 GPU, run the execcasper command with the ngpus=# and gpu_type=v100 resources set as shown in this documentation. Then load the modules you need, including Python version 3.7.9, and activate the NPL.
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100545.7/warc/CC-MAIN-20231205041842-20231205071842-00429.warc.gz
CC-MAIN-2023-50
681
5
https://learn.microsoft.com/en-us/answers/questions/1372214/solicitud-de-aprobaci-n-programaci-n-de-recordator
code
Regarding the requirements you raised, in my opinion, I need to create two flows to solve it perfectly: The first flow is used to control whether the manager has permission to edit this record. The second flow is used to approve the values filled in by the user. Here is test for your reference: Here is list: Here is first flow: Triggered every day through Recurrence, Then you need to set the trigger conditions here In this way, the flow will only be executed on the first eight days of each month. filter query filters out the records whose month is this month Condition determines whether the current date is the first day of each month If yes, we share the editing rights of the filtered item with the manager Recipients : manager email If the current date is not the first day, then determine whether it is the eighth day. If it is the eighth day, we will stop sharing this item. Here is second flow: Set the trigger condition. This trigger will only fire when the value is not empty. If the answer is helpful, please click "Accept Answer" and kindly upvote it. If you have extra questions about this answer, please click "Comment". Note: Please follow the steps in our documentation to enable e-mail notifications if you want to receive the related email notification for this thread.
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510427.16/warc/CC-MAIN-20230928162907-20230928192907-00058.warc.gz
CC-MAIN-2023-40
1,294
18
https://www.funkyfreeads.com/services/computer/classifieds_for_free/ready-to-transform-your-virtualization-contact-hyper-v-experts_i2004857/classifieds-for-free/itasca
code
Explore the capabilities of our Microsoft Hyper-V services. Our seasoned experts specialize in leveraging Hyper-V to optimize virtualization solutions for your projects. From scalable infrastructure to efficient resource management, we bring proficiency and innovation to every engagement. Collaborate with us to harness the full potential of Microsoft Hyper-V and drive efficiency in your virtualized environment. Enable your virtualization environment with seamless performance and optimum resource utilization. Ready to elevate your virtualization solutions with Microsoft Hyper-V? Partner with our Hyper-V services and embark on a journey of digital efficiency and innovation.
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474641.34/warc/CC-MAIN-20240225171204-20240225201204-00114.warc.gz
CC-MAIN-2024-10
680
3
https://www.integrams33.com/prodigy-pocket
code
Prodigy's Pocket glucose meter is small, lightweight,convinent.No coding is required; simply insert a test strip into the test strip port, and the prodigy pocket will automatically power on. The small blood sample size makes it easy for a patient to utilize alternate site testing. Easy to use no coding required Approved for alternate site testing (AST) Get Accurate results in 7 seconds Standard USB to download the test results
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510219.5/warc/CC-MAIN-20230926175325-20230926205325-00324.warc.gz
CC-MAIN-2023-40
430
5
https://www.designnominees.com/games/king-pong-arcade-remake
code
This arcade game is a remake of the Pong game, which offers a real physics simulation with appreciable graphics. Tap the screen on the left and right or slide to move the platform to return the ball. Optional: object spawn on the ground. SEVERAL GAME MODES One Player (against an AI). Two Player (on the same device). Wall (make the maximum of exchanges possible, the ball is more and more fast). Survive (dodge the enemy, infinite and faster and faster). GET SUCCESS AND BEST SCORES ONLINE Each game mode features an online leaderboard.
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296816942.33/warc/CC-MAIN-20240415045222-20240415075222-00868.warc.gz
CC-MAIN-2024-18
537
8
https://www.valeriearmas.com/fashion
code
top of page Fashion is the ultimate form of expression. I believe that it is through what we wear that we tell the world who we are. Fashion allows us to visually talk about out individuality. That being the most precious thing a human can have. Here, I showcase some of the work I have been developing throughout the years in the spirit of communicating a specific concept and/or idea. bottom of page
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296945333.53/warc/CC-MAIN-20230325130029-20230325160029-00231.warc.gz
CC-MAIN-2023-14
401
3
https://www.fujitsu.com/global/support/products/computing/peripheral/scanners/fi/faq/win2016-fi-5015c.html
code
The compatibility statuses of the fi-5015C supported driver and software with Windows Server® 2016*1 are indicated in the following tables. |FUJITSU TWAIN / ISIS™| |TWAIN Driver||Supported by V9.19.922 or later.| |ISIS™ Driver||Supported by V1.0.11207.17001a or later.| |Error Recovery Guide||Supported by V184.108.40.206 or later.| |Image Processing Software (Trial)||Supported by V2.5L28 or later.| |ScandAll PRO V1||Not supported.*2| |ScandAll PRO V2||Supported by V2.1.0 or later.| |ScandAll PRO V2 Premium||Supported by V2.1.0 or later.| |Third party Products| |Scan to Microsoft SharePoint||Supported by V3.4.2 / V5.0.1 or later.| |Adobe Acrobat Standard (V11 or earlier)||Not supported.| |QuickScan Pro V4.x (Trial)||Not supported.| *1 : Windows Server® 2016 indicates the following: Windows Server® 2016 Standard *2 : Upgrade V1 to V2.x (which is non-free) to use ScandAll PRO in Windows Server® 2016 . Refer to "ScandAllPRO V2" above for the compatibility status of the application. Share this page
s3://commoncrawl/crawl-data/CC-MAIN-2020-34/segments/1596439736962.52/warc/CC-MAIN-20200806121241-20200806151241-00056.warc.gz
CC-MAIN-2020-34
1,015
18
https://snicsolutions.com/knowledge/what-services-need-to-be-running-for-a-network-license
code
What Services Need to be Running for a Network License? The network license is not being detected. What services need to be running for a network license? There are two services that need to be running on the computer where the network license is installed in order for the license to be detected over the network. - FLEXnet Licensing Service - Opcenter APS License Manager Click here for more information. NOTES AND REFERENCES OS Version: n/a
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474686.54/warc/CC-MAIN-20240227184934-20240227214934-00871.warc.gz
CC-MAIN-2024-10
443
8
https://nashvillesoftwareschool.com/programs/20230304software-engineering-jumpstart08/
code
This class is live online (i.e. synchronous). Are you curious about software engineering? Have you started exploring the world of software engineering and want to know whether you’re heading in the right direction? Have you been thinking about a career change and want to see what it’s like to write software? Would basic knowledge of programming fundamentals be an asset in your current career? Are you seeking admission to the Software Engineering with Java/AWS Specialization program and need a bit of guidance on programming fundamentals? Are you interested in a guided introduction to software development fundamentals? If you answered yes to any of these questions, the Software Engineering Jumpstart is designed for you. Is this course for you? What will the course cover? Programming FundamentalsLearn fundamental concepts behind software development, including variables, functions, loops, conditionals, collections, and simple data types. PythonLearn to program with Python, one of the most widely used and beginner friendly programming languages in the world. Practice development with the language behind many of your favorite websites. Basic Command Line UsageTake a look under the hood of your computer. Learn to navigate with the command line. Make your way through directories. Run programs. Move, copy, and delete files. Developer ToolsWork with powerful tools of modern software development, including Visual Studio Code and the Python shell. Software Engineering CareersLearn about the types of jobs available to software engineers. How will you learn the material? What is required? - A personal computer running Windows, macOS, or an Ubuntu-based Linux distribution (with camera and microphone). No Chromebooks or tablets, the software we use will not work on these devices. - Must be 18+ years of age - No prior technical training or software engineering experience is required. - Basic computer skills and proficiency. You should know how to use common applications, such as word processing, and have familiarity with web browsers and navigating the internet. ScheduleSaturday, Tuesday, Thursday S: 9AM - 2PM CT | Tu/Th: 6PM - 9PM CT LocationThis class is live online (i.e. synchronous). DatesMarch 4 - March 23, 2023 $500 credit toward any NSS bootcamp. (Only one $500 Jumpstart credit may be applied per bootcamp.) Our policy regarding absences is based on the short duration of the course and the schedule of the material covered. We want to make sure you are getting the most out of this course possible! For the following scenarios, we would be happy to work with you and point you at resources to help fill in what you missed. The instruction staff is happy to catch you up to speed. For the following scenarios, we would encourage you to look into enrolling in the next available course. Courses are regularly offered and there might be one that better fits your schedule. If there are no future courses listed, make sure to ask us and we’ll let you know roughly when the next class is slotted for. Tuition will be refunded, minus a $50 administration fee, if a request is made prior to the start of the second class session. If you would like to transfer your ticket to a different month or Jumpstart, please email [email protected] before requesting a refund.
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764501407.6/warc/CC-MAIN-20230209045525-20230209075525-00724.warc.gz
CC-MAIN-2023-06
3,297
24
https://sss9.or.kr/call/papers.asp
code
NOTE: The link for abstract submission is now closed. The Organising Committee of the 9th International Space Syntax Symposium invites any interested parties to submit their papers of original research for presentation at the Symposium. Abstracts for your papers should be submitted electronically through this web page no later than 10 February 2013 and: Be no longer than 500 words. Include at most 5 keywords. Indicate to which of the 8 Themes it corresponds. Paper submission requires a prior submission of abstract, so you may not register papers unless you have the abstract submitted. Abstract submission link will be opened from 20 October 2012 to 10 February 2013. NOTE: The deadline for full paper submission has been extended to 5 June (24:00 GMT) Paper submission can be made as additions to the abstract through the Personal Page, which was created when the abstract was submitted. We wish to remind you that papers should be submitted no later than 26 May 2013. Papers received after this date will not be considered. Papers will be classified in two groups: long papers and short papers. Long papers will be presented orally in parallel sessions with three or four other papers. Please consider a presentation of approximately 20 minutes, to give time for questions and discussion. Short papers will be presented as posters in the poster session. Instruction to Paper Authors A Paper should be submitted as a single word document (.doc or .docx) through the Personal Page. Authors may follow further instructions as they appear in the application interface, but basically: Long papers are expected to be a maximum of 6000 words (not including bibliography and abstract) Short papers are expected to be a maximum of 3000 words (not including bibliography and abstract) The reference system used will be Chicago Author-Date, as can be found at Chicago-Style Citation Quick Guide. Each figure or table should be placed with its label and caption written directly underneath it. You may have a maximum of eight figures in a long paper, and four figures in a short paper. You may not include your personal information in papers when submitting them. The organizing committee will not actively be proof-reading the papers, we therefore urge you to make sure your papers are readable, using correct language, and are correctly spelled when they are submitted. Referee Process and Outcome All papers will be refereed, and all accepted papers will be published in the proceedings (consisting of printed publication of abstracts and a CD with all the papers). Once refereed, long papers can be: accepted, accepted with corrections, accepted as short papers (does not require a new referee round) or rejected. Short papers can be: accepted, accepted with corrections, or rejected. If corrections are of heavy nature, a second referee round might be expected. For the referee work to flow as smoothly as possible, we would like you to keep in mind what symposium theme you consider your paper to best fit into. Announcement of accepted papers will be made on 1 Aug 2013, after which authors may go through early or late registration process For submission support and other questions please make contact at:
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474688.78/warc/CC-MAIN-20240227220707-20240228010707-00627.warc.gz
CC-MAIN-2024-10
3,210
22
https://www.econ.iastate.edu/ask-an-economist/us-consumer-economy
code
I here a bit more these days about our being a consumer economy. What other types of economies are there? Thanks a bunch! Ours is called a consumer economy because consumption is nearly 70% of our GDP. Countries like China, are more investment-driven with investment (often by the public sector) at nearly 50% of GDP.
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474676.79/warc/CC-MAIN-20240227153053-20240227183053-00770.warc.gz
CC-MAIN-2024-10
317
3
https://michelsalib.com/2011/11/03/bccextratoolsbundle-for-symfony2-now-includes-new-features/?shared=email&msg=fail
code
The purpose of this blog post is to review the last features that have been included into the BCCExtraToolsBundle. As you may know, its current main feature is a command that extract translation string from your template and dump them into your translation files. It has been so popular that the code has been adapted and merged it into the code Framework a few months ago with the help of the community. Sadly, I will eventually remove this functionality from the bundle when the 2.1 version will come out. Hopefully, I recently add new cool stuffs into the Bundle recently that you may find useful. A date parser You may know that the Bundle currently includes a date formatter that provides you a nice way to localize your dates directly with a twig filter. I reviewed the code recently to provide a way to make the operation working the other way. You can now do such things : // obtain a datetime instance for a normally formated string $date = $dateFormatter->parse(‘November 1, 2011’); // obtain a datetime instance using a defined locale $date = $dateFormatter->parse(‘1 Novembre 2011, 20;14’, ‘fr’); // obtains a datetime instance with a uncommon string $date = $dateFormatter->parse(‘Nov. 2011); Basically, the code is trying every parsing it can using the formats available for the formatter (more information here http://www.michelsalib.com/2011/07/a-twig-extension-that-translates-countries-and-dates/) and more so that it can parse almost anything. Of course it can be very handy when you consume some weird API using nonstandard datetime formatting. A unit converter About consuming API. I can be very annoying to find some values in a unit don’t want to use. The unit formatter is here to help you: // transform a value knowing the source and destination units echo $unitConverter->convert(1000, ‘m’, ‘km’); // echoes : 1 // transform a value knowing only the destination units echo $unitConverter->guessConvert(‘1h’, ‘m’); // echoes : 60 To do such work, your value will go through different phases:: – A chain unit converter will try to convert using its DI registered unit converters – A ratio unit converter which converts units that are strictly proportional will take care of most your conversion – The ratio unit converter supports different kind of units registered using DI, such as length, weight, speed, time… those are called ratio unit providers – Ratio units providers defines units and ratios related to a specific unit kind. It includes also the locale where the unit is applicable and the prefixes that can be associated to the unit. For instance, the computer capacity unit kind will define the octet, the bit and the byte with their corresponding conversion ratio and the applicable prefixes (k, M, G…). With such a structure, the converter insure you that any prefix is taken into account, that the conversion is done between coherent units (it won’t try to convert time into money… sadly), and it also takes into account your current locale (the ‘metre’ is the french unit for the ‘meter’). I’ll try to add more units and documentation in the coming posts. The BCCExtraToolsBundle continues to provide useful features to the developers. Get the code of the datetime parser and the unit converter on the BCCExtraToolsBundle github : https://github.com/michelsalib/BCCExtraToolsBundle. Don’t hesitate to report issues, feedback and improve the code 🙂
s3://commoncrawl/crawl-data/CC-MAIN-2019-04/segments/1547584431529.98/warc/CC-MAIN-20190123234228-20190124020228-00154.warc.gz
CC-MAIN-2019-04
3,448
28
https://ersi.vivaldi.net/2021/05/24/emacs-as-word-processor-selection/
code
Before copying or cutting, the normal thing to do is to select a region for it. Here are some of the relevant commands and configuration options. The keybind C-space sets the mark in Emacs’ terminology. That is, it initiates selection that can be expanded into a region by moving the point by ordinary movement keys. The movement keys are left and right arrows to move per character, C-left and C-right or M-f and M-b to move by word, up and down arrows to move by line, C-up and C-down by paragraph. If the mark is first set, these movement keys expand and contract the region accordingly. The keybind to select a word (to the end, not to the beginning when in the middle of it) is M-@. Pressing it multiple times selects more following words one by one. By default, Shift+movement-keybinds should also work for selection, even though in terminal emulators one might run into issues. For example, Control-Shift-left should select words towards the beginning and pressing the combination multiple times extends the selection. The keybind to select a full paragraph is M-h. Pressing it multiple times selects more following paragraphs. Pressing M-h on a heading selects the heading and its entire contents in Org mode. To copy the selected region, the default keybind is M-w. Cut works by C-w. These keybinds save the copied or cut region for a later pasting. To delete the selected region without preserving it, use the Delete key. Undo is keybound to C-x u. In most (nearly all) editors (and word processors), the region is automatically deleted when typing over the region. This behaviour can be obtained in Emacs by putting the following in Emacs’ main config:
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100484.76/warc/CC-MAIN-20231203030948-20231203060948-00863.warc.gz
CC-MAIN-2023-50
1,667
6
https://www.mikechambers.com/blog/2009/06/16/what-new-game-apis-do-you-want-in-the-flash-player/
code
I have been learning some game development lately, and building my first game (well, at least my first game since Flash 4). I think game development and deployment are some of the real strengths of the Flash player, but ones which we haven’t specifically focused on in a while. While working on my game, there were a couple of things I needed to do where additional player APIs could have made the development easier (as well as likely speeding up execution). This got me to thinking about other APIs that would be useful for game development. So, what new Flash Player APIs would you like to see that would make game development easier? Here are a couple from me: Hit test that tests visible bounds of Sprites. Something like: Basically, something similar the API Grant Skinner created, but native to the player. The next API I would like is one that would check for hits against multiple sprites, and return a vector of sprites that we colliding. This would make it easy to do collision detection for multiple items, and perhaps lead to a performance boost. So, what APIs would you like to see that would make game development easier. Please be as specific as possible (i.e. don’t just say “Physics engine” or 3D support). Leave you suggestions in the comments.
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224653608.76/warc/CC-MAIN-20230607042751-20230607072751-00579.warc.gz
CC-MAIN-2023-23
1,271
8
https://www.br.freelancer.com/projects/php/customer-website-info/
code
We would like a new feature added to our website. The feature will have the following: 1. A text block that will allow our customer to enter their URL 2. It will prompt them to add either Http:// or Https:// , If they do not add one of the following, it will alert them and make them redo it. 3. It will have limits as to how many chars they can enter 4. It will have min limits that make sure they do not try to enter in less than 3 letters. 5. It will be safe against injections 6. It will have a button under the text area that says "Add website" with a fa "+" icon 7. The info will be saved in our table. 8. The code must be 1 page and only require 1 page. 9. Use the variable $db to connect to our per-existing db * Note * Any freelancer who does not have a proposal that clearly outlines that you understand this project will be blocked from all projects including future one. * Note * * Note * No FTP access will be provided. Only the DB table name will be provided * Note * 26 freelancers are bidding on average $128 for this job Hello Sir I can create the pop up window that will ask user to add a valid url with given restrictions. Please check my profile for work and experience. Regards Ashwin Ok I am bidding with following assumption that you have $db instance of mysqli? and with one page I am free to use bootstrap as you are not going to give access to your code right? Hi, I read your requirements very-well, I will provide you job according to your requirements. Hope you will give me a chance to do work with you, waiting for your reply. Thank you I am php expert, I can easily create a webpage with a form that has a textbox where the user needs to enter a valid URL, which will be saved in mysql databse
s3://commoncrawl/crawl-data/CC-MAIN-2018-13/segments/1521257647901.79/warc/CC-MAIN-20180322170754-20180322190754-00650.warc.gz
CC-MAIN-2018-13
1,725
17
https://softpanorama.org/Bulletin/Sp2013_v25/bulletin25_04.shtml
code
|(slightly skeptical) Educational society promoting "Back to basics" movement against IT overcomplexity and bastardization of classic Unix Prev | Contents | Next Dr. Nikolai Bezroukov Copyright 2012-2013, Dr. Nikolai Bezroukov. This is a copyrighted unpublished work. All rights reserved. Strategically Windows is very complex and as a result of this complexity very insecure system with almost zero integrity checking because security was never the Microsoft development priority. And generally speaking, should not be Microsoft top priority, as they are in the consumer market, not Pentagon software development market (althouth they are now definitely a target of some Pentagon efforts ;-). And that consumer nature of Windows is reflected in Windows architecture which does not segregate well between "system" components and "applications" components (although Authenticode does help a lot). Windows historically started as GUI on top of DOS, a one user OS for an isolated PC. And that heritage is strongly reflected in modern Windows architecture, becuase it structured user expectations even after Windows was completly rewrittten as Windows NT. Unlike Unix which from the beginning was a multiuser system and needed to pay great attention to the tasks of separating user and application activities from system activities in Windows there is no such separation. Typically Windows users are logged as administrators and application can install whatever they wish on the system with almost zero control. At the same time modern Windows provide reasonably comfortable environmt is user mode too, and this is used in enterprise deployments of Windows. The fact that Windows became dominant consumer OS with over 80% of the market changed the game completely. Any "monoculture" of this magnitude attracts attackers like honey attracts flies. Moreover, Windows is now used far beyond its scope of applicability (for example in computers which control industrial processes -- SCADA devices). Also despite, in essence, being a consumer OS, Windows now is widely used by governments, which theoretically should use something like Trusted Solaris. And recently we face government-sponsored attempts to write information stealing Trojans for Windows as if regular cyber criminals are not enough (see, for example, description of Flame). It goes without saying that for a consumer oriented OS enough money and research can produce devilish exploits that will penetrate even fully patched Windows XP or Windows 7 installation like knife goes through the butter. And it's naive to think that this situation can be changed. That mean that Windows can be now and will be in foreseeable future an easy target for determined and well funded attackers. A good thing about determined and well funded attacker is that they are pretty selective in their targets and probably will never try to get into computer of a regular Joe User. They go after a bigger fish. But a bad thing is that methods used by them now are in the open and will be gradually adopted by lower level cyber criminals and first of all by those who specialize in stealing financial information. That means that regular consumers now should pay special attention to this type of activity and preferably use for it a special PC (which is just a minor inconvenience). Old laptop with reinstalled minimal Windows installation is a good first platform for doing financial transactions and taxes. This PC should not be used for anything else. There are several major things that you need to be aware of based on fundamental architectural weaknesses of Window: A new study by Imperva, a data security firm in Redwood City, Calif., and students from the Technion-Israel Institute of Technology is the latest confirmation of this. Amichai Shulman, Imperva’s chief technology officer, and a group of researchers collected and analyzed 82 new computer viruses and put them up against more than 40 antivirus products, made by top companies like Microsoft, Symantec, McAfee and Kaspersky Lab. They found that the initial detection rate was less than 5 percent. On average, it took almost a month for antivirus products to update their detection mechanisms and spot the new viruses. And two of the products with the best detection rates — Avast and Emsisoft — are available free; users are encouraged to pay for additional features. This despite the fact that consumers and businesses spent a combined $7.4 billion on antivirus software last year — nearly half of the $17.7 billion spent on security software in 2011, according to Gartner. For really dangerous data stealing Trojans and worms, the period from infection to detection is rarely less then a couple of weeks and typically user became aware about infection only several months later. When the gap between an infection and detect can be months or even years (yes, years) you better understand the risk you take. And use the second computer (or VM) for private activities as doing taxes and access to financial sites. Extra computer for this purpose is only around $300, which is a non-significant price for the peace of mind. Again, no matter what AV you have for processing of your confidential and financial data now you should use a different, second "secure" computer. Now PCs became almost so cheap that simple step is the most viable strategy of minimizing your risks. And this problem of "chronic Windows insecurity" became more noticeable in the last couple of years and actually drive people from Windows to Apple. If not all, but the most defections of Windows users to Apple are driven by considerations that Windows became "a can of worms". And I think this information should get to Microsoft brass. There is a hope that Microsoft will gradually improve Windows, not if they don't take well publicized and effective measures situation for them can deteriorate despite the best efforts of Microsoft engineers. The problem is that many really effective antimalware measures break compatibility and as such is hugely undesirable form other points of view... The other go again the nature of Windows as a consumer system (for example signing of all executable that can run with root privileges with Authenticode). |If not all, but the most defections of Windows users to Apple are driven by considerations that Windows became "a can of worms". I suspect that as of 2012 malware became strategic threat to Microsoft dominant positions and revenues in consumer market. Windows insecurity (inability of Microsoft to stop recurrent infections of user PCs by architectural methods) now became the selling point of alternative OSes and first of all Apple OS X. The most typical explanation of people who switched to Apple has nothing to do with the interface or slick design. It is "I am tied to fight malware/viruses in Windows" and "Apple has MS Office and that almost all what I need; and it does not have viruses". The latter is not true, but even if people just believe that Apple is more secure against viruses then Windows, that will generate migrations. Apple also greatly benefit from "security by obscurity" as it currently represents just 3% of the market or so. Gradual erosion of Windows position also happening due to growing share of Android devices sales, which with stylus represent more viable alternative to PC then before (see, for example, Samsung Galaxy Note 10.1 with S-pen as a typical representative of this class of tablets). Currently Android positions in tablet market, unlike desktop, are weak, but that might change as version 4.2 which represents more competitive platform for tablets then previous versions of Android. Attempt of Microsoft to capture part of tablet market while admirable distracts its attention to security problems. Windows 8 forte is touch interface that gives it opportunity to compete neck to neck with iPad and Android tablets, not so much greater security. This is a big and complex topic we will just scratch the surface here. The key idea behind writing thissection is show that you just can't secure Windows, no matter what you try. It is unsecure by design. First of all I would like to say that Microsoft is a great software development organization that brought to the world such masterpieces of software as MS Word 6 for DOS, Visual C++ 6.0, Excel 2003, FrontPage 2003, and many more. Which will be used and are used for many, many years after those version were discontinued by Microsoft. Most of strategic goals of Microsoft, until recently, were not aligned well with the security. Now the train, unfortunately, left the station as architecture of Windows is by-and-large fixed and changing it will break compatibility with valuable for consumer products and also deprive of revenue dozens of security companies which now control Microsoft in more ways than you can think (as Symantec lawsuit had shown). Simply put, finding security exploits in Windows and, especially, protecting users from them became quite big and extremely profitable business. Using them to exploit PC users became also quote profitable business as revenue of fake antivirus companies can attest. In such a situation, any single company even as big as Microsoft will be outnumbered and outgunned and will find itself on a losing side. To a certain extent that was unavoidable development due to huge success of Microsoft Os in consumer market where they essentially wiped out all the competition. Monocultures are always more successfully attacked. Microsoft did demonstrated some courage under fire and managed to changing the situation to the positive with Windows XP SP3 after set of network worms and, especially in Windows 7, where signing of executables was at last (better late then never) promoted to the key files. Windows 7 also attempts to mitigate "universal admin mode" under which Windows are typically used via UAC. But here like in other attempts to beef up Windows security they forget to test social engineering side of equation. One of the questionable benefits of UAC is that it has conditioned people to believe that as long as the screen background is grayed out they can trust whatever is on the screen. As XP Antivirus Pro scareware demonstrated, this is not a reasonable assumption (Anatomy of a malware scam). Latest worms also represent is kick in chin for Microsoft and Windows 8 has some additional measures that help better to protect it from attacks. But it does not change the whole grim situation with Windows security, when user need to pay "security tax" just to use their PCs. But in 2011 and 2012 Microsoft has found themselves under the barrage of heavy artillery with such monsters as Flame and Duqu. That completely changed the picture again and put on the forefront the architectural problems of Windows, which are many. Unfortunately, some of security flaws of Windows are unsolvable within the current compatibility framework. Microsoft made several very bad for security decisions (should we call them blunders ?) in Windows design. They are partially dictated by desire to make Windows more user friendly. Among those we can mentions the following (no attempts was made to create an authoritative list here): Shadow data streams in executables. This increases malware potential to hide the data. Non existent defense against changes of "system" attribute. System attribute actually is very important and useful attribute but the way it was implemented by Microsoft made is almost useless. Anybody with permission to write to the file can change the attribute, while change of attributes of the file should be higher level permission and attributes like system should be sticky -- once set it would be impossible to remove in normal windows setting like attribute immutable in FreeBSD. Ability to run unsigned ActiveX. In general Microsoft was late in implementing sandboxing in Windows. For a long time Microsoft just did not pay any attention to security at all and was primarily concerted with growth of market share (and then maintaining its dominant position) and compatibility issues. It essentially created and nourished the huge antivirus industry that now sucks a lot of money from consumers (this is a real Microsoft Tax). But truth be told, Microsoft does not exist in vacuum. And other software development companies are much worse. Some popular application running under Windows such as Adobe products often represent far greater threat then Microsoft OS or any of Microsoft applications. Also as for applications, I am not sure that flaws in IE design were less important contributor to the current explosion of Windows malware then Windows OS problem in and by itself. Microsoft generally can be considered to be a king of software complexity. It used it as a way to weed out competition and created such masterpieces as Excel, FrontPage, Word and several other "all-dancing-all-signing" software applications. The fact that they still are able to debug Excel is a testament of Microsoft unique abilities. But on OS level this infatuation with overcomplexity returns and bite them. And recently it did really hard ;-) Typical Windows XP installation has over 300 drivers in C:\WINDOWS\system32\drivers\ and more then 2000 files in C:\WINDOWS\system32. The methods for determining from where and when particular driver of executable came are rudimentary. The methods of determining if particular driver or executable belongs of Windows or not are even more so outside signed executables. The idea of registry as a specialized for configuration settings database was a great one. But implementation did not have clear architectural blueprint and degenerated into a mess. The key here in my opinion is understanding that registry should be more like a specialized virtual filesystem with timestamps for all elements and protection from unauthorized access on various levels (including using immutable attribute). To me it's classic example of "road to hell is paved with good intentions". Microsoft wanted to replace the mess that text file configuration file represented and in a process created even a bigger mess. Level of architectural thinking in registry design is so low that now it is impossible to correct it without massive problems with compatibility. Now Windows registry with its innumerous ways of launching executables is a perfect hiding place for malware. Inpenetratable maze of hives where you can hide an elephant, not just a single malware executable. Still couple of changes in the direction of making it more filesystem line can make it more secure: Structure of Windows system directories is also pretty chaotic. Application programs write their files God knows where. There is at least half-dozen of Temp directories, which are not automatically cleaned on shutdown. That prevent designating certain directories as read-only like it is possible in Unix during mounting of partitions. But that of course cuts user-friendliness of Windows, as any update of the drive became more complex procedure that requires reboot to safe mode. By extension Windows update also became limited to safe mode, which as the recent malware had shown can be a good thing to do. In view of tremendous complexity of Windows, there should be a clear, iron distinction between system (Microsoft and its trusted partners providing drivers like Intel and Nvidia) and "application" directories in filesystem. No Symantec of MacAfee junk should ever pollinate system directories ;-). That "exile" should also be extended to third party drivers and DLL. And it goes without saying that no application program should be able to write to system directories. Windows has a one interesting attribute that can be enhanced -- so called system attribute. For example, the system attribute should be used as a lock (may be with a physical button on the computer case) that allows changing critical files and directories. Once set it none should be able to remove it in the normal mode, only in safe mode. That change actually can be implemented by a binary patch to Windows and used in secure environments along with other measures. System attribute can play the role that the "immutable" attribute plays in Unix and it should be automatically assigned to signed executables and in Professional edition and higher it should be changeable only in safe mode. Situation, when any malware can install drivers, like is the case in Windows XP, this is just a very bad architecture. And when IE does not automatically use "sandbox" for running non-signed ActiveX, it is also a very bad architecture. Visibility of attributes of files and folders in Windows without special tools is ridiculously low. That creates massive opportunities for abuse. Yes another problem is Windows update process which each and every software producer implements independently and that create a large network of covert channels into your system. Each updater can be malicious and represent a hidden channel via which malware is delivered to the computer. Historically this already was the case with Microsoft update. Why Microsoft can't enforce a single update mechanism for all software packages? Why Adobe, the company that I disrespect and don't trust should have its updater on my system. Why Symantec should be another one. Google with its history of collecting excessive information about user browsing behavior another one (and pretty difficult to remove ;-). Mozilla yet another one. And so on. And how difficult is to compromise one of several dozens of updaters installed, some of which are really just dirty hacks. I think that update process is a soft underbelly of Windows and as such should be especially protected. May be it should be performed in a special mode, distinct from normal. The fact that Windows update is running as a regular process behind the user back is an architectural weakness that was already exploited and will be exploited in the future. One way to "castrate" all this swarm of windows updaters is to block target IPs with which they communicate. The best way to do this is to use a private IP space with proxy. Non proxies protocols in this case will simply die out, and proxied can be tightly controlled. You can also block specific processes from using TCP/IP, which is a simpler Similar situation exists with private schedulers. Almost each large software vendor has one and installs it (for obvious reason to control his update process). Backup program vendors like Acronis have one. Antivirus vendor have another one. And so on. Another negative factor is a strong, dominant tradition of using administrator account for browsing Internet and reading email in consumer PCs. Again Microsoft did some steps to mitigate this "tradition" in Windows 7 (by introducing User Account Control (UAC) ), but they are not very successful. This horrible "tradition" is way too strong to overcome, but that makes Windows even more vulnerable than it should be. Web browsers and its plugin run with user credentials and if you are not an administrator, malware has much less "open space" to exploit. But typically only in corporate environment you can see users who do not administrator access to the desktop. This policy is enforced centrally and makes Web browsing much more secure. Each AV company on the market tries to cover the whole filed. And fail miserably. There is no specialization among AV companies. Each of them claim that they are latest and greatest in everything. This is not true. The reality is that many Trojans in a wild are not detected by those companies in a six months period since first infection, in a year or never if infection scope is local and company mainly operate on a different territory. They are not more and more rely on automatic creation of signatures and malware authors know that and take countermeasures. So when choosing an AV product it is important to understand that in a sense you are choosing from junk. It might work against more or less trivial threats. But as if the Trojan that infected your PC is complex you might not be lucky. Both McAfee, Symantec and Microsoft Security essentials list as healthy files obvious Trojans, even if customers send them samples several months before. Here is one telling example. There are cases of infection that demostrate themselve (among other psossble scenarios with four files in Desktop -r-x------+ 1 nnb None 28365 Dec 9 2010 geraam.exeThose files (and respectively PC infection) are known since September 2012 or even earlier. But if you scan those files with a bunch of commercial antivirus none will be able to disinfect them. A couple will warn you about generic threat that those files represent. But this is about it. Here are results for the file done 2012-12-02 -r-x------+ 1 nnb None 53121 Dec 9 2010 kiaqas.exe -r-x------+ 1 nnb None 57217 Dec 9 2010 mssvig.exe -r-x------+ 1 nnb None 53121 Dec 9 2010 stdlas.exe Antivirus Result Update Agnitum Suspicious!SA 20121201 AhnLab-V3 Spyware/Win32.Zbot 20121202 AntiVir TR/Crypt.XPACK.Gen 20121202 Antiy-AVL - 20121202 Avast Win32:Virtu-C 20121202 AVG Win32/Heri 20121202 BitDefender Gen:Variant.Symmi.6097 20121202 ByteHero - 20121130 CAT-QuickHeal - 20121201 ClamAV - 20121202 Commtouch - 20121201 Comodo UnclassifiedMalware 20121202 DrWeb Trojan.Siggen4.22099 20121202 Emsisoft Virus.Win32.Suspic.AMN (A) 20121202 eSafe - 20121202 ESET-NOD32 a variant of Win32/Kryptik.ANIX 20121202 F-Prot - 20121201 F-Secure Gen:Variant.Symmi.6097 20121202 Fortinet W32/Suspic 20121202 GData Gen:Variant.Symmi.6097 20121202 Ikarus Virus.Win32.Heri 20121202 Jiangmin - 20121202 K7AntiVirus Riskware 20121130 Kaspersky Virus.Win32.Suspic.gen 20121202 Kingsoft Win32.AutoInfector.a.(kcloud) 20121119 Malwarebytes Trojan.SpyEyes 20121202 McAfee Generic.dx!bfzg 20121202 McAfee-GW-Edition Heuristic.LooksLike.Win32.SuspiciousPE.J 20121202 Microsoft - 20121202 MicroWorld-eScan Gen:Variant.Symmi.6097 20121202 NANO-Antivirus Trojan.Win32.Siggen4.yjqnv 20121202 Norman W32/Troj_Generic.EJKWZ 20121202 nProtect - 20121202 Panda Trj/OCJ.A 20121202 PCTools - 20121202 Rising - 20121130 Sophos - 20121202 SUPERAntiSpyware - 20121202 Symantec Suspicious.MH690.A 20121202 TheHacker - 20121202 TotalDefense - 20121202 TrendMicro TROJ_SPNR.06JB12 20121202 TrendMicro-HouseCall TROJ_SPNR.06JB12 20121202 VBA32 Malware-Cryptor.General.3 20121130 VIPRE Trojan.Win32.Generic!BT 20121202 ViRobot - 20121202 In reality this is a password stealing Trojan that belong to Win32-Zbot family. In other words, insecurity of Windows feeds multiple security companies which often produce useless or harmful products or are trying to sell marginally useful services. And in case of fake anti-virus vendors, harmful services bugled with extortion. A lawsuit filed against Symantec Corp claims that the software maker seeks to persuade consumers to buy its products by scaring them with misleading information about the health of their computers. James Gross, a resident of the state of Washington, filed the suit in District Court in San Jose, California on Tuesday, according to his attorneys. A copy of the complaint provided to Reuters by Gross's attorneys alleges that Symantec distributes trial versions of its products that scan a consumer's system, then invariably report that harmful errors, privacy risks and other problems exists on the PC, regardless of the real condition of the machine. A Symantec representative could not immediately comment on the lawsuit, which seeks class-action status. The company uses that scanning software to market Norton Utilities, PC Tools Registry Mechanic and PC Tools Performance Toolkit software, according to the complaint. Norton Utilities and PC Tools are products that Symantec says help improve the performance of PCs and keep online activities private. "The software is falsely informing the consumer that errors are high priority and in addition it is falsely informing the consumer that their overall system health and privacy health is low," said Chandler Givens, an attorney with Edelson McGuire LLP, the firm that filed the suit on behalf of Gross. He said that his firm tested other Symantec products, but was only able to find problems with the three mentioned in the complaint. Symantec, the top maker of consumer anti-virus software, is the maker of Norton 360, Norton Internet Security and Norton AntiVirus software. Sales of all Symantec's consumer products -- including PC Tools and Norton Utilities -- rose 4 percent to $2 billion in its most-recent fiscal year. The suit describes Norton Utilities and PC Tools as forms of "scareware," a common type of malicious software that causes pop-up messages to appear on computers telling users that they are infected with a virus. "The truth, however, is that the scareware does not actually perform any meaningful evaluation of the user's computer system, or of the supposed 'errors' detected by the software," the complaint claims. "The scareware does not, and cannot, actually perform the valuable tasks represented by Symantec through its websites, advertising, and in-software display screens." You should never fully trust security companies claims about percentages of malware they detect. In reality even with all of them installed you can have a passwords and financial information sniffing Trojan for many months. They are just "necessary evil" in the correct situation of malware proliferation which is byproduct of Windows popularity on one hand (and the ability to extract financial games from certain type of malware as well as form selling Windows exploits on black market) and architectural weaknesses of Windows on another. While doing some useful and necessary work (for good money) they are always sitting between two chairs. Their revenue stream depends on your insecurity, not security. So on one hand they perform important and difficult role of protecting us from cyber criminals. On the other hands that are part of the ecosystem that stimulate the rise of cyber crime and sometimes serve as cyber criminals enablers. Here is one telling episode written by Jeremy Kirk (What's the price of a new Windows 8 zero-day vulnerability ) for Computerworld on November 2, 2012 It's not exactly the type of advertisement most people would understand. For sale: "Our first 0day for Win8+IE10 with HiASLR/AntiROP/DEP & Prot Mode sandbox bypass (Flash not needed)." It's part of a recent message on Twitter from Vupen, a French company that specializes in finding vulnerabilities in widely used software from companies such as Microsoft, Adobe, Apple and Oracle. Vupen occupies a grayish area of computer security research, selling vulnerabilities to vetted parties in governments and companies but not sharing the details with affected software vendors. The company advocates that its information helps organizations defend themselves from hackers, and in some cases, play offense as well. Vupen has found a problem somewhere in Microsoft's new Windows 8 operating system and its Internet Explorer 10 browser. The flaw has not been publicly disclosed or fixed by the company yet. Vupen's finding is one of the first issues for Windows 8, released last week, and Internet Explorer 10, although vulnerabilities have since been found in other third-party software that runs on the Windows 8. Dave Forstrom, Microsoft's Trustworthy Computing director, said the company encourages researchers to participate in its Coordinated Vulnerability Disclosure program, which asks that people give it time to fix the software problem before publicly disclosing it. "We saw the tweet, but further details have not been shared with us," Forstrom said in a statement. Vupen's Twitter message, written on Wednesday, implies the vulnerability would allow a hacker to bypass security technologies contained within Windows 8, including high-entropy Address Space Layout Randomization (ASLR), anti-Return Oriented Programming and DEP (data execution prevention) measures. The company also indicates it is not dependent on a problem with Adobe System's Flash multimedia program. One wrong click and your PC is unusable. Or if your favorite site was broken and became malware distributor just a visit to this site. And recent racket performed by worms designed for financial gain is far from the work of amateurs, it is quite sophisticated. If you analyze July 2012 version of "Data Recovery" scareware, or launched in the second half of 2012 version of another fake called "Security Shield" as well as various version of Win32:Sirefef – a family of malware that controls infected computer’s Internet activities by redirecting requested URL to a different one, you will feel real anger toward Microsoft and other software vendors (Adobe recently became favorite target of malware authors with its pathetic Acrobat and insecure Flash as they provide ready backdoors for those who want to penetrate your computer; it looks like Adobe is patching Acrobat each week). Microsoft is under pressure with shrinking market share and they can't switch to total signing of executables as this will destroy the industry they created (AV vendors) which became powerful enough to control Microsoft technical direction so that it does not hurt their profits. They tried to tighten the screws in Windows 7 but the security industry fought back (with Symantec suing them -- this company is really the most greedy and nasty of all AV vendors) and won. Like with financial industry you, the user, is a lucrative franchise that can be milked by both malware vendor and AV vendors. Squeezes from both sides. Recently quite prominent position was achieved by a new type of malware which is called Scareware (but is as close to extortionware as one can get ;-). It's the main purpose of this scam creation is financial gain via some sort of implicit threat to the user. It became a real problem for Windows users, but also exists for Apple OsX. The number of users who paid those extortionists is probably millions so we can talk about hundred of millions or even a billion of dollars of criminal revenue. This is not profits at the level of narcobarons revenue but this is not a small change either. XP Antivirus 2008 was remarkably successful defrauding scheme that brought authors around 100 million dollars. On February 10, 2010 the United States District Court for the District of Maryland entered a default judgment and order for permanent injunction against Jain, Sundin and Innovative Marketing, Inc. that imposed a judgment of more than $163 million. Subsequently, on May 26, 2010, Jain, Sundin and Reno were indicted by a federal grand jury for the United States District Court, Northern District of Illinois for wire fraud, conspiracy to commit computer fraud and computer fraud. The indictment alleges that from December 2006 to October 2008, Jain and Sundin placed false advertisements on the websites of legitimate companies. Currently both Jain and Sundin are fugitives and the FBI is offering a $20,000 reward for information that leads to their arrest.. That means that against new high volume, high penetration speed written by professional programmers exploits AV software is always late. As Jesper M. Johansson noted in his 2008 whitepaper Anatomy of a malware scam devoted to XP Antivirus 2008 and 2012 scams: This type of malware is very, very disturbing. One can only wonder how many users have been duped into installing ineffective security software, and what happened to their private information and credit card data when they paid for it. The presence of such software, and the overall very high quality of the ruse it presents, is frightening. More than likely, thousands of people have been fooled. In fact, this type of deception has been around for several years now, and it would not still be here if it did not work well. This should serve as a dire warning to all: be extremely careful what you trust, and question everything that looks even remotely suspicious. For example, no website can run an anti-malware scan on your computer simply by your visiting the site. Any site that purports to do so is almost certainly run by criminal gangs. Using PC for committing financial crimes including creation of army of zombie computers that are remotely controlled by the "master" of particular zombie network and used for spamming and other purposes make elimination of malware really difficult as it is now created not by malevolent amateurs, but by highly paid professionals who analyze deeply internals of Windows. That limit usefulness of security companies like McAfee, Kaspersky, etc as their opponent operates now work on the same or higher level of technological sophistication as they are. Other approaches are needed. At the same time to abandon Windows based on its insecurity is an overreaction. Linux is probably more secure as installed, but relative absence of high profile exploits is mainly connected to the fact that on desktop it is niche OS. Android might change that and there is already a mess with Android security... Also in a way if you can access Facebook from a device you do not need malware. You already have it ;-) Another type of malware ( is called Remote Access Trojans( RATs). Some of malware belonging to this category can be part of any other type of malware, but most often can be found with data stealing Trojans Facing this new generation of cyber-criminals even former IT security professionals like myself feel insecure and start viewing their own PC as a snooping device that is constantly on. You start feeling like the main hero of The Conversation(1974), the famous film by Frank Coppola. This is the way I how feel about PC :-). |Facing this new generation of cyber-criminals even former security professionals like myself feel insecure and start viewing their own PC as a snooping device that is constantly on. Social sites is another problem. Some of them like Facebook are essentially private information collecting agencies masquerading as social sites. Facebook and other services are collecting so much information on their users that (as famous Onion spoof suggests), they actually outdid three letter agencies. In any case you can say privacy good buy. It is privacy of crowded street with video cameras each ten yards. Not all people can close their Facebook accounts as for many (not me) they represent essential services, a new reincarnation of AOL. Even if you don't have Facebook account, Facebook can collect (based on your IP) list of sites that you visited if the site has "Like" button. That means that there is a need to create a special architecture to make our PCs more secure. Architectural approaches to increasing security are the most promising because they fundamentally change the environment in which malware operated. And the law of evolutions is that the more specialized organism is and the more adapted to the current environment it becomes, the more disruptive are to it even small changes in the environment. This is perfectly true about the malware which is a highly specialized software that makes several implicit assumption about the way PC operates. While fundamental weaknesses of Windows as a consumer system make infections inevitable, there are step that increase the level of Windows "malware resistance" and cut the time and effort for returning the system to normal (in the order of increasing complexity). Some useful method of working with Windows that really increase security are difficult to acquire and I failed and returns to my old good ways multiple times. Please remember that something like Flame can be installed on you computer any time you visit unknown web site or open email with attachments and there is no way to prevent it even if you've all AV in the world installed on your PC with the most recent signatures and other bell and whistles. That also should serve as a motivation and nobody wants to be a hapless victim. To fight the invaders is the basic human instinct. And we should defend out territory and make life of cyber criminals more difficult to the extent we can without unduly harming our own productivity. Currently computers are so cheap that using two to increase security is no-brainer. One computer should be dedicated to "sensitive transaction and information" such as tax forms access to your financial records and such. The other should be used for everything else. They can share a file system via network attached drive. Never use the same computer for browsing Web and reading email and for working with confidential information such as preparation of your Tax forms and Bank and investment sites. Use "Tandem computing" with one "disposable" computer used for browsing and Webmail. That means running your applications on a "trusted computer" on one computer and Web browser and email from the second computer (which can be either virtual -- easy to implement on Windows 7 Pro or "real") with the "disposable" image. No matter whether you implement "disposable computer" using real computer or virtual image you should never store any confidential documents on it or access your financial and other important sites from it. The second "sensitive information" computer should generally have minimal necessary for work number of applications installed and should be shut down when you are not using it. With towers you can put "disposible computer on your left side and your "trusted" computer on the right side and label them as "Secure" and "For Web browsing". Then you need to learn the discipline using each for particular tasks. The first step is to delete non-relevant book marks from each computer. You can access "disposable" computer from trusted using Windows Remote Desktop but not vise versa. Those who know Linux well can also use a Linux machine (in this case you can use VNC) which provide higher level of protection because Linux is much less popular them Windows and rarely is targeted by malware authors. As such it is safer for Web browsing. When you enable Remote Desktop, by default anyone who belongs to the local Administrators group on the machine can log on to it remotely using Remote Desktop Connection. The same arrangement can be used on your working place, for example With the current prices that set you back $300 for additional new desktop (Dell Inspirion 660s is $299 with Intel G465 CPU and 2 GB of memory: adequate for browsing and watching video. And a used one is just $150. Actually $150 is just three year subscription to a AV package such as McAfee or Symantec that provide only illusory protection while the second PC provides you real protection from malware with less hassle. Again you can connect to it using Windows Remote Desktop One advantage the setup with two identical laptops that I discovered is that you have an extra battery and tan take it on long trip on airplane. For example Dell E6320 can last one battery approximately 5 hours which is not enough for flights from the USA to Europe but two battery accommodate 9 hours flight just fine. And for laptops an additional battery is usually quite expensive and can cost as much as $130. On laptop virtual machine can be used and Windows 7 Pro is perfect for that. One trick that helps is to make setting in IE in administrative account high for your "fortress laptop". That's generally make browsing intolerable enough to switch to other account to see the sites ;-). You can "specialize" Windows installation on your "insecure computer" by using methods of protection of public computers. In XP and Vista you can use Windows Disk Protection (requires freeing some space on the harddrive by shrinking C partition) or some similar approach ("Install and forget" in Acronis). You can also emulate this mode on Windows 7. In this case changes made during the session will be discarded on reboot, which provides perfect protection against malware, protection unachievable with the traditional AV tools. But there is a better and simpler way to protect your "insecure" part of the tandem: just use a virtual machine on the second computer. Most dangerous malware typically detects present of VM and just refuse to run, suspecting that it got into AV lab environment. Which is extremely desirable behavior, the behavior that what we need. Here is a pretty telling note by a user with nickname pbust, made in February 22, 2012 in Wilders Security Forums: Approximately 1 out of every 6 malware samples we receive every day in 3rd level PandaLabs (called "critical malware" = most dangerous) is VM-aware and will either not run or run differently in a VM or sandbox environment. There's also readily-available tools to runtime-pack or crypt malware with detection of VM, Norman sandbox, Anubis, CWSandbox, etc. Windows 7 Professional and Ultimate allows running second Windows instance (so called Windows XP-mode) which can be used for his purpose even on a single laptop allowing you to have a more secure environment within a single, portable computer. With virtual image is it easy to dispose all changes made to Windows configuration: you just overwrite the image with a backup. The Windows XP-mode is highly integrated with Windows 7, offering seamless operation (MICROSOFT VIRTUALISATION TEAM, 2009). That allows laptop users to benefit from "dual computers" configuration and enjoy complete protection from spyware as the browser and email are running is a separate, disposable Windows XP SP3 instance (virtual image). The installation for this additional Windows XP SP3 is free to download for Windows 7 Professional, Enterprise and Ultimate owners. another important Windows XP-mode has an advantage as it can be implemented on a single laptop and enjoy "tandem computing" in a completely portable way. In case of real computer this mode can be enhanced using a third party separate firewall (for example a custom Linux box). See also Managing Remote Desktop and Windows Disk Protection for more information. Take special measures that that compromise of your account on one site, for example linkedin or gmail did not cascaded into compromise of your more important accounts. Break the opportunity to exploit your other accounts, especially financial accounts by stealing your password from social site and like by individualizing passwords with, say, two letter that reflect the site. For example, you can use am.camry.le12 for your Amazon account and eb.camry.le12. for eBay account. Or a.camry.le12.n and e.camry.le12.y. Don't worry too much about all this buzz about weak passwords. Passwords should be easily memorazable first, as the number of attempts to break them by brute force is very limited in most circumstances. There are also other more sophisticated ways to implement this idea. Have a master list of all your passwords and keep it in handwritten paper format in a safe or on a SD card inserted in one of your old, disconnected, phones that has ability to read SD cards (Old Blackberry phone is perfect for this purpose). Backups can be used strategically -- not just as backups but also as a powerful security technology. See Softpanorama Spyware removal strategy for detailed explanation of ideas behind this strategy and steps necessary for accommodating it for the purposes of malware defense. The key idea here is that a good disk image creating program (ghosting program) is worth a dozen of anti-spyware, anti-virus tools. It does not mean that the are useless. Microsoft Security Essentials (renamed into Windows Defender in Windows 8) is a good free AV tool that is well integrated and well tested with Windows for compatibility. So to ignore it is unwise. But even for company with huge resources like Microsoft, it is very difficult to cleanly uninstall sophisticated malware which was designed with one or several mechanisms of recreating itself if some part is preserved after the cleanup. Also malware that is infected your computer is just one of hundred of instances for Microsoft and mostly is processed for creation of signatures automatically, so this approach has obvious limitations for sophisticated spyware which checks the environment in which it operates. But by using an image restoration you can defeat even the most sophisticated spyware. The only precaution is that you should have multiple (for example daily) backups as the point of infection can be quite remote in time from the point of detection. It also make sense to perform a full backup of drive C before installation of any new programs. Windows 7 64 bit has around 60GB on system partition (without user data). Windows XP system partition footprint is typically 50GB or less (if user data are stored on the different partition). That will take less that an hour to backup such a partition which is a minuscule amount of time in comparison with the time usually spend in restoring Windows system after the infection (two or three days are common). You can do it daily or weekly but in any case this way you always have several previous versions that might be not infected. Existence of full C-partition backup also provides a baseline that gives you an opportunity to understand what changes the installation performed on your system. Add to this registry snapshot (less then 200MB) and you are well equipped to resist even the most sophisticated malware. Unlike AV program which depends on the recency and quality of their database this approach will work as it does not need to understand what this malware is about. It just return you to the "status quo". Splitting the "system" hard drive into smaller C (System) partition (say 80-120 GB) that contain just OS files and a larger Data partition with user data is a very simple to accomplish in Windows 7. see Adopt a "separate user data partition" setup: dual partition Windows configuration Windows 7 can shrink system partition on the fly so freeing space in typical "all hard drive is C partition" configuration is just one click away. This logical step allow to shrink the size of "system" partition which in turn makes restoration of your OS from backup much more easier (as user data will be a separate partition) and your personal data more secure and more easily recoverable. On desktops instead of shrinking system partition and creating an new one for data it is easy to install a second harddrive, This approach is also possible on laptops with replaceable media bay, for example Dell Latitude Laptops -- you can simply replace DVD with the second harddrive and use USB DVD when needed. This setup also makes use of Softpanorama Spyware removal strategy easier as amount of data you need to backup on C partition is much less then in the case all your hard drive in one huge C Partition. Cyber criminals generally are conditioned to a "single account" PCs and even if they get admin privileges by exploiting some windows hole they generally limit their information search activities to this broken account (keylogging is a different matter as it works for all accounts) For example, if you create account taxi to make your taxes by logging to it and install Intuit or TaxCut only for it. That makes your financial information more secure especially if after submitting taxes you make an encrypted archive out of data directory and delete actual files. Creation of taxes and other once a year reports can be neatly separated by using different accounts which actually helps you organize you files as well. Differentiate security of accounts by setting IE security for Internet zone to high on those account that matter. Please note that sharing applications between accounts is more difficult. For example Cygwin has difficulties if you use it simulaniously from Administrator accoutns and from a regular user account, as directories created while logged as Administroar are not writable from a a regular account. But is you are not going to extreme modest separation of your activities between different account does help. It is actually pretty quick to switch to a different account. Takes less then 10 sec. so it is not time or effort prohibitive. But it requires disipline that is difficult to aqure for user who never used Unix and got used to a "single account" environment to such an extent that "single account usage" is almost synonymous with Windows. BTW Windows 7 provides much better protection from malware for regular user accounts then for administrator account (or any account with admin privileges) Windows 8 does more steps in the direction of converting Windows into more secure "appliance for browsing the Web emailing and shopping" so it might be better for entry level users then Windows 7. Not so for advanced user,s as it tried to hide all command line related Windows capabilities. And that's really hurts. Unfortunately the dominant culture of Windows usage is to use all powerful admin account for everything. Only some large enterprises limit their users to proper "less powerful" accounts as they can afford to administer PCs by a separate dedicated staff and they are more interesting in unification and security of corporate data then productivity of the users. This recommendation typically is ignored by users but it requires very little discipline as most users do not install anything often. Never store important data in folders belonging to User home directory tree for account you use to browse the Web. If confidential data are not used pack them with the archiver using password for protection. Create executable self-unpacking archives as in case your archiver become incompatible with old backup format you still have access to the data. Most modem Archivers such as rar, 7zip, WinZip, has capability to encrypt the archives using user supplied password. You do not need complex password for this, but you need to save it in some paper form so that it never lost. This is a simple and reasonably reliable way to protect your financial data. Always a different account for your tax preparation, bank access then from browsing and reading email. Encrypt your financial data with zip, 7zip or similar archiver, so that unencrypted stage was limited to periods when you are really working with them. There is no sense to give up your financial data such as IRS returns, etc that typically are stored on the same computer and the same account you use for browsing the WEB. That's plain vanilla negligence. Why you want to give all those data to the first jerk who manage to install a malware on your computer. Practice "separation of duties" policy. When you browsing unknown sites run IE only under some regular user account that can't write to the registry (use switch to user option -- it's really fast). Never do "leisure" browsing from the account with admin privileges. Create yet another account and use only it for financial transaction, never for browsing the Web. Starting with Windows Vista and Windows 7, Microsoft introduced User Account Control (UAC), which, when enabled, allowed users to run with least user privileges. This scenario limits the possibility of attacks by malware and other threats that require administrative privileges to run. You can configure UAC in your computer to meet your preferences: Unlike Chrome, IE does not use sandboxing, but generally IE 10 is a secure browser. So malware authors attack you mainly via applications such as Aobe Reader (fake PDF files) or Flash (fake Flash files). In ideal case the whole browser should run in a disposable VM. Also IE as a dominant browser is attacked more often. But still you can make IE 9 and 10 (but not IE8, which should never be used; on XP please use Chrome or FireFox browser) less malware friendly. The problem with this recommendation is that it is actually easier said then done. Anyway there are there are three steps that are implementable to make your Web browser less of a "gateway for malware": Use OpenDNS as you DNS provider (this actually helpful for any browser). This will prevent you from visiting sites that are systematically spreading malware as well as sites that were just created to do so (less then 30 days old sites). As period of existence of malware sites is pretty short consulting blacklist and limiting your ability to browse sites that are less then say 30 or 90 days old is an important security measure. Set high security mode for Internet Zone. The key idea is simple: use IE with high security mode for Internet Zone and medium in trusted zone where you should put your regular visited sites. Typical way malware authors get into your computer is that they buy Google adwords and position their site high in some Web searches. You click and if you have anything then high mode for Internet sites you are hosed. At the same time the most important sites (Amazon, your webmail, etc) that are crippled if Internet is assigned to high security mode can be still accessed if you put them in the trusted zone. This probably can be done automatically (Microsoft sucks big way by not providing more granular security modes and relevant automation), but even manually this maintenance step is not a big burden. The rule is simple: each time you add a favorite you also need to add it to Trusted zone. This probably should be done automatically. I personally use Firefox for such sites. but this requires strict discipline and this is not for every user (most user will follow this routine after spending six or more hours recovering from malware infection (and losing some money in he process), but after a couple of months this experience became forgotten and users return to their old, bad ways. Again, a much better way to secure the browser is to run it in VM as is possible with Windows 7 Professional and above by using Windows XP compatibility box. Or (for desktops) on a separately ("disposable") computer which is reimaged each night. This method is often used at university labs and proved to be quite efficient as for malware protection. It is especially effective defense from RATS -- remote access Trojans -- which convert your PC into remotely controlled zombie. Despite all security programs that you have installed RATs can exist on your computer for months if not years. That means that if you store confidential information on your computer it is vital to reimage your computer when you start some important or confidential activity. In modern world doing something confidential on "dirty" image is neither confidential, not prudent. On most PCs the set of installed applications nowadays is quote static and this fact makes creating so called "trusted image" much simpler. In you update your trusted image in parallel with main computer then restoring it when you are infected or need to perform some highly secure activities like filing your annual tax return (it goes without saying that you tax return should be copied from the harddrive to USB dives and backup CR-ROM. Do not leave highly confidential data like you tax return on your primary computer. You can also use a separate computer for highly confidential activities. Many households have such computers collecting dust in the closet. Reimage it once a year (tax preparation) or each time you need to do something that needs additional security. Do not use it for Internet browsing. You can use "brute force" approach and restore the image using Ghost-like program ( for example Acronis True Image ) or linux live CD and Partimage. If your laptop has SSD this method is pretty fast, with restore less then 20 min. In this case the "Windows of opportunity" for malware is the period between re-imaging of the computer. Moreover as image is static you are better equipped for scanning dynamically registry, system and /Users folders for new executables that entered the system. This method is OK mainly for advanced Windows users and IT professionals. This is a typical method used in enterprise environment for protecting users but it is relatively easy to implement in home environment too. If you use a second physical computer that is running Linux for browser this is a natural thing to do and a very worthwhile enhancement. The key advantage is that all you Web transactions are logged and can be analyzed to see who is telegraphing information from your computer. You will be surprised how many vendors do that. If you have a box with a Web proxy (either real of virtual) you can point to it your Web browsers. In this case you ability to block sites by various criteria are extended by capabilities of the proxy. That permits blocking such snoopy sites as Facebook which polluted tremendous amount of sites with "like" button and copycats of this idea from Google. For home office and small firms Squid is free and very good Web proxy that I highly recommend. For larger firms appliances like Blue Coat are typically used. This method can protect you from many threats as well as excessive attention of Facebook and other information collecting monsters. It also moved the definition of "trusted sites" to the proxy level. For corporate environment it also can serve as anonimizer as all requests are coming from a single IP address. That method requires some Linux qualification and the desire to learn squid or other Web proxy configuration. With current laptops with 4GB of memory, SSD drives and 3 GHz dual core CPUs and even more powerful desktops, scanning harddrive does not consume much resources and if it is artificially slowed it is not even noticeable. The simplest way is to run periodic, say once an hour scan and compare critical directories and critical parts of registry with the baseline. This method detects critical changes of configuration within a certain amount of time after they occurred although not "on the fly". As such it is a valuable method of protecting yourself from Data Stealing Trojans -- a new and dangerous class of malware that is created with the criminal intent to defraud you from your assets. But this method require higher level of qualification that regular user have so it is mostly suitable for advanced users and corporate environment. It also requires quit a bit of discipline in maintaining baseline and installing/upgrading applications and OS on your reference computer (which can be the same computer in which you just swap harddrive) first before installing it on your "main", working horse computer. Installation of new applications and upgrade of OS should first be done of a reference computer on which there is no user activity. Individual user can create such reference computer by buying second harddrive identical to the one that is installed on the desktop/laptop for system image and replacing it each time one need to install software. Without maintaining reference image is difficult to sport the infection of you primary computer. In addition existence of reference image simplifies verification that nobody run anything in addition to what is installed on the computer. This is the way images are created in corporate environment. Usually this method requires existence of support personal who is at least part time are responsible for the maintenance of the reference image. It is difficult to implement for individual user. But this is the only method that allow you to protect yourself from the compromise introduced by the insider who has physical access to the computer. For example a corporate spy who tried to install some programs on your computer. Although in modern PCs you can install boot password making booting your computer without credentials much more difficult. Some laptops also have capability to use smart cards for boot authentication (Dell Latitude is one example). This allow logs all the rejection and as such provides "on the fly" information as for components of PC which are trying to communicate to outside world without your permission and outside your control. Typically that setup requires high level of qualification and is support intensive so it is limited to large corporate environment. Although I saw them in some computer enthusiasts home networks. Running your own DNS root server stops many attacks cold as after infection they will be no able to figure out how to communicate back to "mothership". Still they can do damage like deleting or modifying information on the computer. Several major corporation use this approach for protecting internal networks (not just DMZ but all internal network). This is a major undertaking and requires good knowledge of DNS and analysis of typical activity on the computer. There are two general recommendation: Steps described above can be foiled by determined attacker, but they do increase level of Windows "malware resistance" and decrease the time it take to return Windows setup to normal after the infection without investment in some expensive tools or hardware. Methods presented should not be used indiscriminately, you can select those that most suit your needs. You will be better off, if you create your own "protection set", depending on specific on your situation. For example, for people who know Linux well, more emphasis can be made on using Linux for Web browsing and media consumption. Also it is easier to implement networking components of malware defense such as caching DNS and Web proxy (Squid) on Linux. I hope that this flexible approach will be useful for those who what to follow "semi-independent" path of securing their own Windows installation and not to be completely dependent on security companies. Groupthink : Two Party System as Polyarchy : Corruption of Regulators : Bureaucracies : Understanding Micromanagers and Control Freaks : Toxic Managers : Harvard Mafia : Diplomatic Communication : Surviving a Bad Performance Review : Insufficient Retirement Funds as Immanent Problem of Neoliberal Regime : PseudoScience : Who Rules America : Neoliberalism : The Iron Law of Oligarchy : Libertarian Philosophy War and Peace : Skeptical Finance : John Kenneth Galbraith :Talleyrand : Oscar Wilde : Otto Von Bismarck : Keynes : George Carlin : Skeptics : Propaganda : SE quotes : Language Design and Programming Quotes : Random IT-related quotes : Somerset Maugham : Marcus Aurelius : Kurt Vonnegut : Eric Hoffer : Winston Churchill : Napoleon Bonaparte : Ambrose Bierce : Bernard Shaw : Mark Twain Quotes Vol 25, No.12 (December, 2013) Rational Fools vs. Efficient Crooks The efficient markets hypothesis : Political Skeptic Bulletin, 2013 : Unemployment Bulletin, 2010 : Vol 23, No.10 (October, 2011) An observation about corporate security departments : Slightly Skeptical Euromaydan Chronicles, June 2014 : Greenspan legacy bulletin, 2008 : Vol 25, No.10 (October, 2013) Cryptolocker Trojan (Win32/Crilock.A) : Vol 25, No.08 (August, 2013) Cloud providers as intelligence collection hubs : Financial Humor Bulletin, 2010 : Inequality Bulletin, 2009 : Financial Humor Bulletin, 2008 : Copyleft Problems Bulletin, 2004 : Financial Humor Bulletin, 2011 : Energy Bulletin, 2010 : Malware Protection Bulletin, 2010 : Vol 26, No.1 (January, 2013) Object-Oriented Cult : Political Skeptic Bulletin, 2011 : Vol 23, No.11 (November, 2011) Softpanorama classification of sysadmin horror stories : Vol 25, No.05 (May, 2013) Corporate bullshit as a communication method : Vol 25, No.06 (June, 2013) A Note on the Relationship of Brooks Law and Conway Law Fifty glorious years (1950-2000): the triumph of the US computer engineering : Donald Knuth : TAoCP and its Influence of Computer Science : Richard Stallman : Linus Torvalds : Larry Wall : John K. Ousterhout : CTSS : Multix OS Unix History : Unix shell history : VI editor : History of pipes concept : Solaris : MS DOS : Programming Languages History : PL/1 : Simula 67 : C : History of GCC development : Scripting Languages : Perl history : OS History : Mail : DNS : SSH : CPU Instruction Sets : SPARC systems 1987-2006 : Norton Commander : Norton Utilities : Norton Ghost : Frontpage history : Malware Defense History : GNU Screen : OSS early history The Peter Principle : Parkinson Law : 1984 : The Mythical Man-Month : How to Solve It by George Polya : The Art of Computer Programming : The Elements of Programming Style : The Unix Hater’s Handbook : The Jargon file : The True Believer : Programming Pearls : The Good Soldier Svejk : The Power Elite Most popular humor pages: Manifest of the Softpanorama IT Slacker Society : Ten Commandments of the IT Slackers Society : Computer Humor Collection : BSD Logo Story : The Cuckoo's Egg : IT Slang : C++ Humor : ARE YOU A BBS ADDICT? : The Perl Purity Test : Object oriented programmers of all nations : Financial Humor : Financial Humor Bulletin, 2008 : Financial Humor Bulletin, 2010 : The Most Comprehensive Collection of Editor-related Humor : Programming Language Humor : Goldman Sachs related humor : Greenspan humor : C Humor : Scripting Humor : Real Programmers Humor : Web Humor : GPL-related Humor : OFM Humor : Politically Incorrect Humor : IDS Humor : "Linux Sucks" Humor : Russian Musical Humor : Best Russian Programmer Humor : Microsoft plans to buy Catholic Church : Richard Stallman Related Humor : Admin Humor : Perl-related Humor : Linus Torvalds Related humor : PseudoScience Related Humor : Networking Humor : Shell Humor : Financial Humor Bulletin, 2011 : Financial Humor Bulletin, 2012 : Financial Humor Bulletin, 2013 : Java Humor : Software Engineering Humor : Sun Solaris Related Humor : Education Humor : IBM Humor : Assembler-related Humor : VIM Humor : Computer Viruses Humor : Bright tomorrow is rescheduled to a day after tomorrow : Classic Computer Humor The Last but not Least Technology is dominated by two types of people: those who understand what they do not manage and those who manage what they do not understand ~Archibald Putt. Ph.D Copyright © 1996-2021 by Softpanorama Society. www.softpanorama.org was initially created as a service to the (now defunct) UN Sustainable Development Networking Programme (SDNP) without any remuneration. This document is an industrial compilation designed and created exclusively for educational use and is distributed under the Softpanorama Content License. Original materials copyright belong to respective owners. Quotes are made for educational purposes only in compliance with the fair use doctrine. FAIR USE NOTICE This site contains copyrighted material the use of which has not always been specifically authorized by the copyright owner. We are making such material available to advance understanding of computer science, IT technology, economic, scientific, and social issues. We believe this constitutes a 'fair use' of any such copyrighted material as provided by section 107 of the US Copyright Law according to which such material can be distributed without profit exclusively for research and educational purposes. This is a Spartan WHYFF (We Help You For Free) site written by people for whom English is not a native language. Grammar and spelling errors should be expected. The site contain some broken links as it develops like a living tree... |You can use PayPal to to buy a cup of coffee for authors of this site Last modified: March, 12, 2019
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474948.91/warc/CC-MAIN-20240301030138-20240301060138-00075.warc.gz
CC-MAIN-2024-10
67,071
155
https://support.microfocus.com/kb/doc.php?id=7020834
code
Windows 2012 Server To set up and configure NFS share on Windows follow these instructions: Installing NFS Server 1. Go to Server Manager 2. Click on Add Roles and Features. This will pull up the Add Roles and Features Wizard. Click Next 3. On the Installation Type, select the Role-based or feature based installation, and click Next. 4. Select the Server, in the Server Pool section with what you want to be the NFS server. Click Next 5. In Server Roles look for File and Storage Services and expand. Then expand File and iSCSI Services. Check the box Server for NFS. This will bring up a prompt to Add features that are required for NFS. Click on Add Features. Click Next. 6. Click Next on features. 7. Click Install. Setting Up An NFS Share Once the NFS Server is installed, the next step is to setup the NFS Share. You can do this by following the steps: 1. Provision a directory for Server for NFS Share a. Click File and Storage Services b. Click Shares c. Create a File Share either by clicking the link, or right clicking and clicking New Share d. Select NFS Share - Quick e. The next screen will ask you to Select the server and path for the share. Share by selecting custom path. Type in the path to where you want to share. Click Next f. Browse to a directory that is on the server that has been previously shared. Note: Be sure to create a directory first before you begin the NFS share. g. Type in the share name. This will need to be remembered for the mount point on the Linux box. h. For authentication check the boxes: No Server authentication (AUTH_SYS) Enable unmapped user access Allow unmapped user access by UID/GID i. Specify the permission by clicking Add. Add in the host, and add in the ipaddress or host name of the Linux server. Click on the drop down for Share permissions and set to read/write Click on Allow root access. Click Add j. On the next screen, specify permissions to control access, click on Next. Nothing to do. (screen shot) k. Click Create. This will successfully create your NFS share. Mounting NFS Share on Linux The next step is to mount the directories on a Linux box, and point it to the NFS Shares that were created. Create a directory in the /mnt directory. This is the local mount path. Once created, be sure you are inside the directory when you mount the nfs share on the Windows system. Type in the following command on the Linux box to mount the share (mounting is similar to mapping a drive in Windows) - mount -t nfs <remotes server>:/<exported path> /<local mount path> - EXAMPLE: mount -t nfs WinServer1:/grpwise/po1 /mnt/reload/po1 (be sure to create /mnt/reload/po1) Test the mount by creating a text file within the new NFS Share and check that you can see it on both systems.
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446711064.71/warc/CC-MAIN-20221205232822-20221206022822-00652.warc.gz
CC-MAIN-2022-49
2,740
36
http://bidgely.com/jobs/software-engineer-in-test/
code
Jobs at Bidgely! Software Engineer in Test What can Artificial Intelligence do to reinvent the energy industry? This is your opportunity to join a world-class team and help us figure that out. A growth-phase start-up headquartered in the heart of Silicon Valley, Bidgely is transforming the way utility customers use energy. By combining the power of machine learning and behavioral insights, Bidgely provides a suite of enterprise solutions that help customers save energy and enable utilities to build enduring customer relationships worldwide. It’s an exciting time in the company’s evolution. We just closed our Series C fund, have acquired some of the biggest names in the industry as customers, and we’re breaking ground on new products and markets. In addition to our headquarters in Mountain View, we have a global presence in Europe, India, and Asia Pacific. Bidgely is looking for extraordinary and dynamic Software Engineer in Test to be part of its core team in Bangalore. You must have delivered exceptionally high quality robust products dealing with large data, machine learning models and responsive User Interface. You are a highly analytical test engineer who is notorious among the developer community for breaking into any code and could cause enough embarrassment to some of the brightest programmers ( in a positive way). Be part of a highly energetic and innovative team that believes nothing is impossible with some creativity and hard work. - Design and develop framework, internal tools and scripts for testing large scale data systems, machine learning algorithms and responsive User Interface. - Understand requirements, design exhaustive test scenarios, execute manual and automated test cases, dig deeper into issues, identify root causes and articulate defects clearly. - Simulate and test data streams from various hardware devices. - Strive for excellence in quality by looking beyond obvious scenarios and stated requirements and by keeping end user needs in mind. - Deliver a high quality robust product in a fast paced start-up environment. - Collaborate with engineering team and product management to elicit & understand their requirements and develop potential solutions. - Stay current with latest technology, tools and methodologies; share knowledge by clearly articulating results and ideas to key decision makers. - 2+ years of experience in test cases design, manual and automated testing. - BS/MS in Computer Science, Electrical or equivalent - Strong analytical and problem solving skills. - Fluency in scripting and programming in perl /python/ C/C++/ Java. - Fluency in automation tools such as Selenium, TestNG, JUnit etc.. - Good in RDBMS or any of the large data system such Hadoop, Cassandra etc.. - Experience of testing on various browsers and devices. - Strong communication and collaboration skills. To apply for this position, please email your resume to [email protected].
s3://commoncrawl/crawl-data/CC-MAIN-2019-09/segments/1550249578748.86/warc/CC-MAIN-20190224023850-20190224045850-00481.warc.gz
CC-MAIN-2019-09
2,949
22
https://symfony.com/blog/new-in-symfony-3-4-user-impersonation-improvements
code
New in Symfony 3.4: User impersonation improvements User impersonation is a popular Symfony security feature that allows you to browse the application as if you were another user, for instance when you are debugging or trying to understand a bug a user sees that you can't reproduce. In Symfony 3.4 we improved this feature a bit to make it easier to debug. Added the impersonator to the log context¶ The well known security log message "User was reloaded from a user provider." includes the user provider and the username of the impersonated user in its context. In Symfony 3.4, to make things easier to debug, this context will also include the username of the impersonator user via the Added impersonation details in the debug toolbar¶ In Symfony 3.4, the security panel of the Web Debug Toolbar will include more details when using impersonation. First, it will also show the username of the impersonator user. Second, it will include a link to exit from the impersonation: New in Symfony 3.4: User impersonation improvements symfony.com/blog/new-in-symfony-3-4-user-impersonation-improvementsTweet this Become a certified developer! Exams are online and available in all countries.Register Now Comments are closed. To ensure that comments stay relevant, they are closed for old posts.
s3://commoncrawl/crawl-data/CC-MAIN-2021-39/segments/1631780057589.14/warc/CC-MAIN-20210925021713-20210925051713-00220.warc.gz
CC-MAIN-2021-39
1,291
13
http://travel.stackexchange.com/questions/tagged/hiking+outdoor-activities
code
to customize your list. more stack exchange communities Start here for a quick overview of the site Detailed answers to any questions you might have Discuss the workings and policies of this site What are some recommended day trips from New York City for outdoor activities? I am specifically interested in walking/hiking/cycling rather than going to the beach or skiing. Feb 10 '12 at 18:16 newest hiking outdoor-activities questions feed Hot Network Questions Why is "distro", rather than "distri", short for "distribution" in Linux world? Special case for last element with \foreach What? No error? Is "You gonna slice them up real nice" right? What is this type of flexible contact strip called? "Read more" link bad or good for SEO? Is there such thing as "touchscreen-friendly" user interface? I am considering co-signing on a car. What can go wrong? Is it appropriate for an employer to ask skilled professionals to do manual labor? What is the difference between Ukraine and the Ukraine? What to do if assignment is against student's religion? Equation with an infinite number of solutions Bash Script to repeat every word in a line? What was SpaceX's original vision for booster reusability? Output an image of your source code (not-quite-a-Quine) Numbering Theorems/Definitions together, by section and without section symbol What do rodents do? Multiply each element of an array by another array? Is it a bad idea to take drugs? Is there a practical point in learning foreign words while travelling? Where is "See you Space Cowboy" from? Why can we still crack snapchat photos in 12 lines of Ruby? How does an A330 detect stall without airspeed? Console.WriteLine() and the need for so many argument overloads? more hot questions Life / Arts Culture / Recreation TeX - LaTeX Unix & Linux Ask Different (Apple) Geographic Information Systems Science Fiction & Fantasy Seasoned Advice (cooking) Personal Finance & Money English Language & Usage Mi Yodeya (Judaism) Cross Validated (stats) Theoretical Computer Science Meta Stack Overflow Stack Overflow Careers site design / logo © 2014 stack exchange inc; user contributions licensed under cc by-sa 3.0
s3://commoncrawl/crawl-data/CC-MAIN-2014-10/segments/1393999645422/warc/CC-MAIN-20140305060725-00068-ip-10-183-142-35.ec2.internal.warc.gz
CC-MAIN-2014-10
2,163
52
https://community.qlik.com/t5/QlikView-App-Dev/For-discussion-Inputfields-and-simulations/td-p/205789
code
The users of my QlikView application are examining the chance of using QlikView to do simulations for What-If scenarios. For one particular application in shipping, users want to be able to change the estimated spending field for various expenses and to see how these revisions affect the budget. I have experimented a couple of times with an input box but it seems like one must use inputfield when loading in the script. As my script is reloaded every evening, I am unsure as to how to handle an inputfield in a table as the row numbers are changing all the time. My table has fields like: _KEY, G/L account, Estimated spending, Budget, Actual My solution would call for inserting an inputfield called "Estimated spending revised" which can be used as a basis for calculating other information and trust to the unique key to keep track of an input field. Does anyone have experience or am developing apps with inputfields or simulations? How about declaring variables that are tied to input boxes? The variables could be preset with default values and the user simply changes them to see the effects where the variable contents are used in expressions in a pivot table, for example. I have about 30 G/L accounts which would require input boxes then. hmm, I think I should try that out and see how it works. Have you scripted inputfields in any of your applications? Yes, I use it in a couple of documents. For example for a user to test the effects on margins if rates were to change (and also to condition text colors etc). In the expression, a variable such as vRate is simply referred to as vRate (no bracketing or $ signs required. I have some experience with inputfields and simulations. Your concern about new records coming in all the time is absolutely correct. I'm trying to position my "Simulation" functionality as "play and discard", for that same reason. If you have to keep the entered values for long periods of time, you need to do one of the following: 1. Either ensure that your data is loaded with chronological order - newer rows are always appended at the end and no deletions are allowed ( I know, this is pretty hard to do). 2. Or, try to extract the entered values into an external text file and apply saved values during the reload. Yiou can extract inputfield values using macros. Hi Oleg and Gordon Your advice has been very helpful. Luckily, the inputfield data is strictly for simulation and can be discarded as we do not have much control about how new data is loaded. Do any of you have a simulation script you can load as an example? Thanks! I've done a budget application, were I had the same issue with assosiating the loaded values correctly. Our solutions was simply to write them down, and then reread (and reset) when reloading. So the user enter some values, when he is done, he presses save. Save uses a macro to generate a csv containing the new data set (I added a datestamp to the name, so I had the history). Then when reloading, you load the newest file, and reset the values in your input fields (there was some trick here with the reset, that I can't remember). And voila you have the adjusted numbers. Hope I understood you right 🙂 Dear Maja,InputField are reset automatically during reload. Inputfield is a property of a field. Default value for the field is set during the reload... I guess what Torben said is that saving the inputfield in a csv file was used to retrieve the previously updated values. My inputfields does not reset automatically during reload. I have confirmed in several posts in the forum that inputfields survive reload. So my question is how do I reset them without using a macro? I have QlikView 8.5
s3://commoncrawl/crawl-data/CC-MAIN-2021-17/segments/1618039544239.84/warc/CC-MAIN-20210421130234-20210421160234-00422.warc.gz
CC-MAIN-2021-17
3,678
23
https://github.com/Et0h/syncplay/commit/523dda8e1ddc682dbda7d325e2a727db9ce19412
code
Please sign in to comment. No argument room cmd w/o file go to default room Currently using the room command without arguments will cause an error if no file has been opened. This will make it go to the default room (i.e. the room you joined when you first connected). - Loading branch information... Showing with 5 additions and 1 deletion.
s3://commoncrawl/crawl-data/CC-MAIN-2016-40/segments/1474738660467.49/warc/CC-MAIN-20160924173740-00204-ip-10-143-35-109.ec2.internal.warc.gz
CC-MAIN-2016-40
341
5
https://www.caresource.com/ga/producers/tools-resources/marketing-materials/dsnp/
code
If you would like printed copies of any of these materials, please use PrintSource to order them. If you have onboarded but have not yet received your PrintSource login, please contact our Broker Service department. Please see the PrintSource Quick Reference Guide for instructions on how to order materials. 2020 Marketplace Reference Guide Overview of our Marketplace plans, service area and benefits.
s3://commoncrawl/crawl-data/CC-MAIN-2021-04/segments/1610703506697.14/warc/CC-MAIN-20210116135004-20210116165004-00222.warc.gz
CC-MAIN-2021-04
403
3
https://www.aldeburghpoetryfestival.org/ios-system-update-from-ios9/
code
The Ultimate Short Go Highlevel Review 2022- GoHighlevel Review Have you ever envision having ClickFunnels as your software application to establish your company site and also funnels? Exactly how about an all-in-one system that also allows you to track clients, handle tasks, and also automate your sales procedure? Well, that’s specifically what GoHighLevel is. GoHighLevel is a full sales and advertising automation platform created especially for agencies. It consists of whatever you require to run your agency, from a CRM to a task administration device, to an e-mail marketing system, to an agreement monitoring system. And also, it includes an integrated blog writing system as well as social networks management device, so you can easily create as well as take care of content for your customers. GoHighLevel is a great option for agencies of all dimensions, as it supplies a wide range of attributes as well as an affordable cost point. Be certain to examine out GoHighLevel if you’re looking for an all-in-one solution for your agency. Go Highlevel Review: Overview In this short article, we will certainly cover the following topics: - What is GoHighLevel? - What are the crucial functions of GoHighLevel? - Just how much does GoHighLevel cost? - That is GoHighLevel for? What is GoHighLevel? GoHighLevel is a complete sales and also advertising automation platform made specifically for agencies. It consists of whatever you need to run your agency, from a CRM to a job monitoring device, to an e-mail advertising and marketing platform, to an agreement monitoring system. Plus, it features a built-in blogging platform and social networks management device, so you can quickly take care of and also develop web content for your customers. GoHighLevel is a wonderful selection for agencies of all dimensions, as it supplies a vast array of attributes and a budget friendly rate factor. If you’re seeking an all-in-one solution for your company, after that make certain to check out GoHighLevel. What are the vital attributes of GoHighLevel? GoHighLevel includes whatever you need to run your firm, from a CRM to a job administration tool, to an email advertising and marketing platform, to an agreement administration system. And also, it comes with a built-in blogging system as well as social networks management device, so you can conveniently manage and also develop material for your customers. A few of the vital functions of GoHighLevel consist of: Firm CRM: Keep track of your clients and also leads with the integrated CRM. Task administration: Stay on top of your jobs with the integrated task monitoring tool. Email marketing: Automate your email advertising and marketing with the built-in e-mail system. Agreement administration: Manage your agreements with the integrated agreement monitoring system. Social media management: Schedule and publish content to social media with the integrated social media sites management device. How much does GoHighLevel cost? With all the functions mentioned what do you believe GoHighLevel would certainly cost you? You would be surprise to know that it just cost $97 monthly for the whole suite of items. We really feel that this is a fantastic worth wherefore you obtain, particularly when compared to various other all-in-one solutions on the market. Do you recognize what’s the best part? You can try GoHighLevel absolutely free for 14 days, so you can see if it’s the ideal fit for your agency. As well as would you such as to hear something even crazier? You can branded the software application with your agency domain and customize the platform for branding function! Just how much you think that would cost you? A great deal? With GoHighLevel, it just cost you $297 per month! That’s an unbelievable deal that you do not intend to miss. Do not trust me? Go check it out for yourself below. Who is GoHighLevel for? GoHighLevel is a fantastic selection for agencies of all dimensions, as it provides a variety of features and also a budget friendly cost point. Be sure to check out GoHighLevel if you’re looking for an all-in-one service for your agency. GoHighLevel is for you if you aware of the importance of branding. If you do not mind the understanding contour and also have every little thing one roof after that GoHighLevel is for you. If you are an advertising training agency that wants to offer organization in a box then GoHighLevel is for you since you can export as well as import it with a click of switch. Watch this video from 7 Figure Agency Josh Nelson sharing his experience on using Go HighLevel. Who is GoHighLevel Not for? GoHighLevel needs some technical knowledge not as basic as ClickFunnels. It is still a lot easier after that WordPress … Oh one more points is GoHighLevel not quite ideal for eCommerce. After thatClickFunnels + Shopify would certainly be a better mix, if you run eCommerce store. As well as finally, GoHighLevel can not keep info on medical and also regulation things. That you require some personal database for that. GoHighLevel Pros as well as Cons - All-in-one remedy - Affordable rate - 14-day totally free trial - Requires some technical knowledge - Not quite suitable for eCommerce Finally, GoHighLevel is an all-in-one sales and advertising and marketing automation system designed especially for companies. It consists of every little thing you require to run your firm, from a CRM to a job management device, to an e-mail advertising platform, to an agreement monitoring system. And also, it includes a built-in blog writing system and social media monitoring tool, so you can conveniently produce and handle material for your customers. Be sure to examine out GoHighLevel if you’re looking for an all-in-one remedy for your agency.
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571153.86/warc/CC-MAIN-20220810100712-20220810130712-00069.warc.gz
CC-MAIN-2022-33
5,776
67
http://www.webassist.com/forums/posts.php?id=16004
code
I am creating a site with Site Assist. The program creates a Home and Content CSS and Menu. The Content menu has one extra tab for Home page and manages to fit this in okay in all the template pages. Due to reasons a little complex to add here I added a Home tab to the Home menu making this, in theory, the same size as the menu for the Content menu. In IE and Chrome the page appears fine but in Firefox the menu goes to two lines throwing everything out of kilter. I have searched the CSS for any differences between between the Home and Content menus to discover why the tabs I have fit perfectly in the template pages but not on the index page. The program automatically configures the template pages to have one extra tab so there must be some difference somewhere that allows this to fit. If someone could point me in the right direction I would greatly appreciate it.
s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579251672537.90/warc/CC-MAIN-20200125131641-20200125160641-00437.warc.gz
CC-MAIN-2020-05
875
2
https://www.graphis.com/entry/4f1d5a75-8ae1-4740-a974-a59819656905/
code
Sorry, full access to our website is available to Only! Become a Member today and get benefits listed below. This project covers a full branding campaign for the release of the Converse Chuck 70 High Top Sneaker. This specific style of sneaker is a high end spin off of the traditional Converse High Top, in order to attract a new demographic of consumer that has a greater appreciation for sneaker and street style culture. The shoe features Chrome eyelets, Ortholite insole cushioning, and wing tongue stitching, adapted to create the most comfortable and luxurious feel. In order to create the perfect campaign, we wanted to focus our research on the specific target demographic. After studying our demographic, we noticed the Chuck70 perfectly embodies the way our generation thinks about fashion and technology. This shoe seamlessly blends the new technology in all of those fine details, elevating it to a more comfortable and luxurious status, while still holding true to the classic Chuck Taylor style, making it that perfect combination between tech and fashion that people cannot get enough of. Our photoshoot and branding focused on this concept through our core theme of tech-based fashion. Throughout this project, we were able to keep a few consistent themes that represented the shoe in a high end way, while still holding true to its classic style. A mix of hi-fi and lo-fi imagery, references to artificial preservation, and the contrast between old and new technology best communicated the concept. Instagram Content: https://vimeo.com/291982754Website: https://vimeo.com/292001682General Video: https://vimeo.com/296464889
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593655897844.44/warc/CC-MAIN-20200709002952-20200709032952-00593.warc.gz
CC-MAIN-2020-29
1,641
6
https://www.atozexams.com/test/ibps/computer-knowledge/computer-knowledge.html
code
Computers use the ___ number system to sotre data and perform calculations None of these _____ are words that a programming language has set aside for its own use None of these A————is approximately a million bytes. A computer ___ is set of program instructions that can attach itself at a file, reproduce itself, and spread to other files. Which of the following could do to remove a paragraph from a report you had written? Delete and edit Highlight and delete Cut and paste What does an electronic spreadsheet consist of? (choose the best answer) All of these Which of the below is not related to the Internet and web development? ________ is used by public and private enterprises to publish and share financial information with each and industry analysts across all computer platforms and the Internet? Extensible Markup Language (EML) Extensible Business Reporting Language (XBRL) Enterprise Application Integration (EAI) Sales Force Automation (SFA) software You may be required to insert the program disc into the drive while you use , or ___ , the software Which types of charts can excel produce? Line graphs and pie charts only Only line graphs Bar charts, line graphs and pie charts Bar charts and line graphs only To change the name of an Excel worksheet Click on the worksheet tab by holding CTRL key and type a new namex Choose Save AS option from file menu Add a (?) at the end of file-name while saving the workbook Press CTRL + SHIFT keys and new name Double click at the worksheet tab and type a newname Which is not a basic function of a computer? Accept and process data You use a (n) _______ such as a keyboard or mouse, to input information. Which of the following does not correctly explain a desk - top computer? It is a personal computer It is a computer intended for regular use at a single location Desktops have lower price in comparison to laptops It is portable computer In desktops, power consumption is not as critical as in laptop computers To what temporary area can you store text and other data, and later paste them to another location? The hard drive ______ allows users to upload files to an online site so they can be viewed and edited from another location. Softcopy is the intangible output, so then what is hardcopy The physical parts of the computer The printed parts of the computer The printed output The physical output devices The computer abbreviation KB usually means ___ To open disk mouse the pointer is placed on disk icon and then – Mouse is dragged pushing the button Mouse is double-clicked Mouse is rotated around Mouse is clicked after rotating it DPI stands for Due Protocol Inspection Dit per it Dots Per Inch Do Per Instruction The ___ settings are automatic and standard A cell in a different sheet can be referred using (Sheet name), (Cell reference) (Sheet name) = (Cell reference) (Sheet name) . (Cell reference) (Sheet name) ! (Cell reference) (Sheet name) ; (Cell reference) Which out of the following is not a DBMS software? Data base 2000 A name or number used to identify a storage location devices? All of these The basic unit of a worksheet into which you enter data in Excel is called a In a database ___ fields store numbers used to perform calculation _____ is a form of permanent memory that holds all the other computer needs to start up does not get erased when the power is turned off The network interface card (NIC) The human readable version of a program is called The name a user assigns to a document is called a(n)- Specialized programs that allow particular input or output devices to communicate with the rest of the computer system are called –
s3://commoncrawl/crawl-data/CC-MAIN-2019-47/segments/1573496665575.34/warc/CC-MAIN-20191112151954-20191112175954-00013.warc.gz
CC-MAIN-2019-47
3,645
76
https://blogs.oracle.com/hinkmond/learn-more-about-java-me-technology
code
Oracle has a new Web site to learn more about Java ME and Java Card Technology. W00t! Nice site. Here's a quote: Java Platform, Micro Edition (Java ME) You betcha! Oracle has some fabulous technology. No wonder why certain companies try to cheat and steal their way in getting this technology for free... Allegedly. :-)
s3://commoncrawl/crawl-data/CC-MAIN-2019-22/segments/1558232258849.89/warc/CC-MAIN-20190526045109-20190526071109-00461.warc.gz
CC-MAIN-2019-22
319
4
http://www.perlmonks.org/index.pl?node_id=482954
code
I feel I need to clarify my statement. in reply to Re^3: On Commenting Out 'use strict;' in thread On Commenting Out 'use strict;' When I say "There are no trivial error messages", I mean exactly that: there are no trivial error messages that Perl gives you. I do not consider the error messages produced by or die "blah blah blah" constructs as I consider them a representation of the program logic created by a programmer who (supposedly) knows what (s)he is doing. I also specifically said that I do not talk about warnings - those are _not_ error messages, they are just that - warnings... What I mean is when you write a script, and run it, and Perl gives you an error message, it means there is a problem that must be fixed or the script won't run (properly|at all). It's similar to writing a resume and not doing a spell check - if it contains misspellings, it will most likely be rejected outright. Unusual grammar constructs etc. can be overlooked - spelling errors are not. Same thing in coding - warnings can be overlooked, errors should not be. Just my 2 cents... An idea is not responsible for the people who believe in it...
s3://commoncrawl/crawl-data/CC-MAIN-2016-22/segments/1464053379198.78/warc/CC-MAIN-20160524012939-00095-ip-10-185-217-139.ec2.internal.warc.gz
CC-MAIN-2016-22
1,138
7
https://fold.it/forum/bugs/hovering-over-network-does-not-show-box-with-details-anymore
code
It makes optimization more difficult Hmm, I'm having trouble reproducing this—the details box shows up fine for me. What's the build ID for your Foldit application? (This is available in "General Options" in the Main Menu.) Make sure you've checked "show" for the "Hydrogen Bond Network" filter. Working for me on 20180725-d14dae34c3-win_x86-devprev. Thank you bkoep and locioiling.I did not check tooltips popup in general options. now i get it The tooltips option did not occur to me. One more thing for the wiki. Closing this feedback.
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030338213.55/warc/CC-MAIN-20221007143842-20221007173842-00447.warc.gz
CC-MAIN-2022-40
540
7
http://forums.linuxmint.com/viewtopic.php?f=110&t=16724
code
In case anyone is watching this thread I finally solved the problem by reinstalling Linpus and then installing desktop-switch-0.3-1.i386.rpm.gz, which I found at a German Blog http://www.iphpbb3.com/forum/39151476nx ... -t218.html . The defualt archive GUI in Linpus wouldn't work for me so I had to use the terminal. I think it was gzip -d desktop-switch-0.3-1.i386.rpm.gz . Then I installed it with sudo rpm -i desktop-switch-0.3-1.i386.rpm . It adds the icon to the panel at the bottom allowing you to switch between screens. Hope this helps someone else,
s3://commoncrawl/crawl-data/CC-MAIN-2016-07/segments/1454701153736.68/warc/CC-MAIN-20160205193913-00321-ip-10-236-182-209.ec2.internal.warc.gz
CC-MAIN-2016-07
558
4
https://www.cs.wisc.edu/node?page=11
code
All new CS graduate students are welcome to attend. This informal social event is a great opportunity to mingle with the faculty and other new grad students. Complimentary hors d'oeuvres and beverages. Infinite state systems such as distributed protocols are challenging to verify using interactive theorem provers or automatic verification tools. Of these techniques, deductive verification is highly expressive but requires the user to annotate the system with inductive invariants. Even if the rest of the proof is automatically checked, inductive invariants are challenging to find, even for experts, who must often go through many iterations before successfully proving safety. Abstract: Two major hardware security design flaws--dubbed Meltdown and Spectre--were broadly revealed to the public in early January 2018 in research papers and blog posts that require considerable expertise and effort to understand. To complement these, this talk seeks to give a general computer science audience the gist of these security flaws and their implications. The goal is to enable the audience can either stop there or have a framework to learn more. Abstract: Are there good soba noodle places nearby? How do I get to JFK by train? When does this park close? Show me Stonehenge! Helping people explore and get things done in the real world is the task our team has taken on, and it is a rather challenging one. In this talk I will describe the technical complexity of creating models that reflect the real world for products such as Google Maps, Search and Google Earth. With Moore's Law coming to an end, architects must find ways to sustain performance growth without technology scaling. The most promising path is to build highly parallel systems that harness thousands of simple and efficient cores. But this approach will require new techniques to make massive parallelism practical, as current multicores fall short of this goal: they squander most of the parallelism available in applications and are too hard to program.
s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376823322.49/warc/CC-MAIN-20181210101954-20181210123454-00479.warc.gz
CC-MAIN-2018-51
2,026
5
http://www.geekstogo.com/forum/topic/230326-ie-does-not-display-some-images/
code
When I browse some sites like www.neopets.com, some of the uploaded pics from users are not showing up. I am getting a red x in their place. The things I have done so far: Cleared cookies, cache, everything Made sure "Show Pictures" was checked in Advanced settings Made sure my settings were set low enough that images should be showing up. Tried changing the image host I was using to display pics. No malware, spyware or anything else is present on the computer. This is a brand spankin' new computer with Trend Micro Antivirus software. The main thing I care about is my layout for my account on there. I can see it all perfectly fine with Firefox, but no show in IE, just grey. There is a limited amount of coding I can use (4000 character max, no java, flash, etc. Just basic CSS and html, no exception coding) If there's something that can be done, please, please let me know. I've never had a problem with the layouts I created before, so I don't know what is going on. The page I care about that I can't see is: http://www.neopets.c...l?user=lovagees
s3://commoncrawl/crawl-data/CC-MAIN-2018-26/segments/1529267859904.56/warc/CC-MAIN-20180617232711-20180618012711-00491.warc.gz
CC-MAIN-2018-26
1,059
12
https://forum.duolingo.com/comment/4435852/Zij-draagt-dezelfde-broek-als-jij
code
In American English, "do" is often left implied. "The same pants as you do" is certainty correct, but "the same pants as you" is much more common. This also applies to "be", and even native speakers get tripped up on pronouns because of it. You can't see that with the example sentence as given (because "you" is the same form for subject and onject) so let's change it: She wears the same pants as I (do). She's just as tall as I (am). Incorrect, but common: She wears the same pants as me. She's just as tall as me. You wouldn't ever use "me do" or "me am", but with the verb only implied "as" gets misread as a preposition instead of a conjunction.
s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590347394756.31/warc/CC-MAIN-20200527141855-20200527171855-00440.warc.gz
CC-MAIN-2020-24
651
5
https://www.tonicmag.com/sup-news/2017/04/wild-coast/
code
Check out this stunning edit featuring local SUP surfers Emre Bosut and Glen Parsons as they discuss the experience of living and surfing in Tofino, British Columbia. The waves look pretty incredible and the best thing is there are no crowds! Directed/Edited by Kelsey Thompson Starring- Emre Bosut, Glen Pearson Special thanks- David Smart, John Rathwell, Tsimka Martin, T’ashii Paddle School With support from Blackfish Paddles- http://www.blackfishpaddles.com Like Lee Visual on Facebook- https://www.facebook.com/Lee-Visual-205605622847191/ Follow Lee Visual on Instagram- https://www.instagram.com/lee_visual/
s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600401598891.71/warc/CC-MAIN-20200928073028-20200928103028-00750.warc.gz
CC-MAIN-2020-40
616
7
https://www.kristinomdahl.com/whats-new/2019/1/12/announcing-new-video-series-create-zen-with-kristin
code
Announcing New Video Series: Create Zen with Kristin In this series of videos, join me as I enjoy a few minutes of nature. Pour yourself a beverage and just enjoy the scenery or grab a craft and create alongside me! In episode 001 video, watch an incredible fireball sunset over the Gulf of Mexico in Southwest Florida as I work on 5 color crochet motifs in Be So Baby Yarn. Download the crochet chart here: https://www.kristinomdahl.com/whats-new/2017/12/7/serene-mandala-wall-hanging-and-dreamcatcher-free-crochet-pattern?rq=mandala Order Be So Baby Yarn here: https://www.kristinomdahl.com/kristin-omdahl-shop/be-so-baby-yarn?rq=be%20so%20baby Order a personalized, autographed copy of "80 Handmade Gifts: Year-Round Projects to Cook, Crochet, Knit, Sew & More" by Kristin Omdahl HERE: https://www.kristinomdahl.com/kristin-omdahl-shop/80-handmade-gifts-book-pre-order Order a personalized, autographed copy of "Motif Magic: 17 Join As You Go Projects to Knit and Crochet" by Kristin Omdahl HERE: https://www.kristinomdahl.com/kristin-omdahl-shop/y20gcs77vkqk3ea8pimyb0nhzm2h1y Subscribe here for more videos: https://www.youtube.com/user/KristinOmdahl More quick handmade gift videos: https://www.youtube.com/playlist?list=PLIDlgC28fLmQPQPfCCQW7421MXsyQveb6 Watch more of my knitting videos here: https://www.youtube.com/playlist?list=PLIDlgC28fLmQJh6nDTUHxlJYWBAE6Qbdh Watch more of my crochet videos here: https://www.youtube.com/playlist?list=PLIDlgC28fLmSZPhrWLUxJDhSfmqyq1NQl Watch more of my recipe videos here: https://www.youtube.com/playlist?list=PLIDlgC28fLmRv1lrW8eBUkqZllByjnZi6 Watch more of my sewing videos here: https://www.youtube.com/playlist?list=PLIDlgC28fLmSrS1DCOaYxKqP7Sn4jIxvF Watch more of my Create Share Inspire Podcast videos here: https://www.youtube.com/watch?v=1qMtVc_m-18&list=PLIDlgC28fLmShjGv6fy65kERxoSKPHxhc Watch more of my 15 Moments with Kristin videos here: https://www.youtube.com/playlist?list=PLIDlgC28fLmTiTnHqCeeR44zz0XON2QzI Watch more of my Connecting with Kristin videos here: https://www.youtube.com/playlist?list=PLIDlgC28fLmTLUmTzYbcowwL-afovPqft Follow me on social media! Sign up for my free and exciting mailing list here: http://eepurl.com/cBCUIr Kristin’s Amazon Shop: https://www.amazon.com/shop/kristinomdahl Kristin’s RedBubble Shop: https://www.redbubble.com/people/KristinOmdahl/shop?asc=u Kristin’s Spoonflower Shop: https://www.spoonflower.com/profiles/kkomdahl?sub_action=shop Join my new Facebook group where we can chat, share and inspire each other! https://www.facebook.com/groups/196367737612689/members/ Check out my online shop where you can order directly from me! Thank you to our generous sponsors: eucalan.com for Wrapture all natural delicate wash karity.com for Kristin Omdahl’s makeup Bright Tech for Kristin's favorite magnifying crafter lamps https://brightechshop.com/collections/magnifier-lamps/magnifier-floor?a_aid=5b9a5f8836fe3
s3://commoncrawl/crawl-data/CC-MAIN-2019-47/segments/1573496665976.26/warc/CC-MAIN-20191113012959-20191113040959-00444.warc.gz
CC-MAIN-2019-47
2,924
27
http://fmwww.bc.edu/repec/bocode/r/rowsort.html
code
Row sort a set of integer variables rowsort varlist [if exp] [in range] , generate(newvarlist) [ ascend descend missing(#) ] rowsort creates new variables containing the sorted (ordered) values in each observation of varlist. varlist should contain only numeric variables with integer values. Missing values are allowed. By default they are sorted to arbitrarily high values, as is standard in Stata. This may not be what you want, so see the documentation of the missing() option. By default, the first (second, ...) new variable contains the lowest (second lowest, ...) value within each observation. The descend option may be used to reverse order. rowsort loops over observations and may be relatively slow. It may be faster to reshape, sort within blocks, and reshape again. generate() specifies new variable names for the variables to be generated, one for each variable in varlist. newvarlist may be specified in hyphenated form, as in s1-s5. This option is required. ascend specifies that newvarlist should contain ascending values and is the default. descend specifies that newvarlist should contain descending values, such that ordering is from largest downwards. missing() specifies that missing values should be treated as the number specified while sorting. Typically, missing() specifies some negative value that does not occur in the data, to ensure that missings are sorted to the end. Thus given 1 . 3 . 5 . 7, rowsort by default sorts these to 1 3 5 7 . . ., which is fine if you want to read off the lowest, next lowest and so forth. But with the descend option, rowsort would sort to . . . 7 5 3 1, which makes it difficult to read off the highest, next highest, and so forth. With missing(-999), say, the set would be treated as 1 -999 3 -999 5 -999 7, sorted to 7 5 3 1 -999 -999 -999 and reported as 7 5 3 1 . . .. Note that there is no check of whether the number specified occurs in the data and that no attempt to made to distinguish different types of missing data. For other ways of handling this kind of problem, see mvencode. . rowsort x1-x5, gen(s1-s5) . rowsort x1-x5, gen(s1-s5) descend Nicholas J. Cox, Durham University [email protected] A problem raised by Alice Dobson led to the missing() option.
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446711417.46/warc/CC-MAIN-20221209144722-20221209174722-00232.warc.gz
CC-MAIN-2022-49
2,234
13
https://www.softpile.com/author/domino-computing-services/
code
MyScreen combines presentation annotation tools with screen capture and manipulation tools. MyScreen’s combination of these features is as unique to the market as is it’s quickness in accessing them. The one-click solution to using your computer screen as an interactive presentation, teaching, and learning tool. Effortlessly annotate and focus attention on whatever is showing on your monitor. An HTML editor with many features found nowhere else in this market. There are no clumsy and obstructive wizards to get in your way, just intuitive and efficient tools to help you get your work done quickly. A system tray utility that gives you quick rightclick access to printing or saving selected text from Window’s programs. Just select some text in your app, rightclick on the icon and choose an item from the menu, and enjoy your output.
s3://commoncrawl/crawl-data/CC-MAIN-2021-21/segments/1620243989856.11/warc/CC-MAIN-20210511184216-20210511214216-00062.warc.gz
CC-MAIN-2021-21
845
4
https://forum.zorin.com/t/pdf-to-doc-converter-using-ocr/22431
code
I am looking for a .pdf to .doc converter with OCR function. I have tried PDFStudio, MasterPDF etc but they are paid version. I used Foxit editor in windows10 and it worked like charm. is there any such alternate software in zorin? Foxit comes also for Linux OS. Does the default PDF viewer that comes with Zorin have the OCR function? I don't use PDF software a lot. I just open them through my browser. Don't know. I don't edit pdf files. But Foxit is available for Linux from their homepage. K. When I was using Windows, I used Adobe Acrobat for opening PDFs. This was before I knew foxit existed. BTW, what is OCR in PDFs? With the use of image text converter, we can easily convert image into text Optical Character Recognition So what does that do? Optical Character Recognition. In terms of Windows Apps, Sumatra PDF has always been far superior to Adobe Reader, not least because when Reader was over 100 Mb in size, Sumatra was only 10 Mb. Adobe, like M$ is bloatware. You can also extract text from a pdf using Sumatra PDF, this being reliant on a PDF having been created with OCR function. This function under Windows is needed for applications such as Abbyy Fine Reader and OmniPage, neither of which I liked at work. GNU/Linux is far superior for it's OCR apps and tools. If a PDF has not been created with OCR, then it becomes an image. Enter the command line tool of ocrmypdf. ocrmypdf [name of pdf] output.pdf If not able to convert with above command; ocrmypdf --force-ocr [name of pdf] output.pdf (You can use different name to output.pdf - just easier to locate. You can always rename afterward. Whilst PDF Studio is a paid for version, it is only 1/5 the cost of Adobe Acrobat with all the extras Adobe charges for in addition at no extra cost. It is good to support Software that supports GNU/Linux. Just to add you should not be saving to .doc format on any platform due to security issues with .doc files, should only be .docx if creating for Windows recipient. Only foxit reader is availbale for linux. I want to use foxit editor which has the capability to covert .pdf to an editable .docx file. I cant find any such alternate software for zorin. Time to write a long letter to Foxit then Just tried this with Unofficial Manual and it works well:
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446710462.59/warc/CC-MAIN-20221128002256-20221128032256-00529.warc.gz
CC-MAIN-2022-49
2,271
20
https://forums.asp.net/t/2142990.aspx?Basic+config+files
code
Last post Jun 28, 2018 12:23 PM by AnyUserNameThatLetsMeIn Jun 28, 2018 09:06 AM|AnyUserNameThatLetsMeIn|LINK I'm not looking for anything complex here but, every time I read another page about this, it starts wading into stuff that is way too much for what I need. My web service creating in ASP.NET Core 2.1 needs to have a config file. In simpler times, I would have a config.xml or something. It will contain info such as: <?xml version="1.0" encoding="utf-8" ?> <add key="UserId" value="user1" /> <add key="UserPassword" value="Password123" /> <add key="InterfaceVersion" value="1.0" /> <add key="InterfaceName" value="WebApi" /> <add key="TargetServer" value="localhost" /> <add key="UserHTTPS" value="N" /> <add key="LogFilePath" value="./ApiLogs/" /> When the web api is called, it needs to read the values from this config file. Don't worry about the password being in plain text. I have 2 controllers in my api that pick up HTTPPost data. During that call, the config needs to be read to pick up the info in it. That cannot be complicated can it? Can someone point me in the right direction or give me an example? Jun 28, 2018 11:07 AM|mgebhard|LINK There is no getting around using the standard ASP Core configuration convention. That means reading and understanding the docs. Configuration is stored in the appsetting.json file. The configuration object is injected using DI. Create a simple project to play with configuration. Once you are able to read from configuration files, then add environments to the mix. Create a appsetting.development.json, appsetting.staging.json, and appsetting.production.json. The environment is driven by the ASPNETCORE_ENVIRONMENT variable which you can find in the project properties under debug. Change development to staging to see what happens. Next, move all of the sensitive configuration to "User Secrets" on your development machine and to environment variables on the web servers. Keep the other stuff in appsetting.XXX.json. For example, my staging server has an environment variable ASPNETCORE_ENVIRONMENT = Staging. I do this once and any successive deployments invoke Staging settings. Jun 28, 2018 12:23 PM|AnyUserNameThatLetsMeIn|LINK That works :)
s3://commoncrawl/crawl-data/CC-MAIN-2021-21/segments/1620243992721.31/warc/CC-MAIN-20210513014954-20210513044954-00556.warc.gz
CC-MAIN-2021-21
2,209
23
http://hv.greenspun.com/bboard/q-and-a-fetch-msg.tcl?msg_id=002C2C
code
I am getting a fatal error message. S-Mart not working at all.greenspun.com : LUSENET : S-Mart Shopping Cart : One Thread I am just starting to set up S-Mart. I have followed all the setup information as written in Readme.html. I can't get the script to work. I am on Hypermart. Here is the error I get in response to http://www.affordable-treasures.com/cgi-bin/S-Mart.cgi?command=review: Failed Script (Apache Error 500) The script you're trying to access has suffered a fatal error. If you've recently altered the code, you may try to isolate the error by running perl -w . Alternately, if you are a visitor, please try again at a later time. The site administrator has already been notified of the error; it may be helpful if you could contact us with any additional information about your form input. At the cgierror location the following message appears: Premature end of script headers: /data1/hypermart.net/treasure-house/cgi-bin/S-Mart.cgi -- Beverly F. Jones ([email protected]), January 02, 2000 The access permission for all related files has not been changed. Please do the following: chmod 755 *.cgi chmod 755 *.lib chmod 777 demo.db chmod 755 *.html * PS - remember to read the documentation first (README file) before trying out anything. -- Patrick Chan ([email protected]), January 17, 2000.
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572408.31/warc/CC-MAIN-20220816151008-20220816181008-00461.warc.gz
CC-MAIN-2022-33
1,322
11
https://opensource.hcltechsw.com/volt-mx-docs/docs/documentation/Iris/iris_user_guide/Content/BuildAnAppForiOS.html
code
Build an iOS Application Once you have created and configured an app’s assets, resources, and services, you compile and link them by building your app. This topic covers the following topics: About App Transport Security (ATS) As of January 2017, Apple Corp. requires that all iOS apps make use of App Transport Security (ATS), which implements the https protocol when communicating with internet resources. Introduced in iOS 9, ATS enforces secure connections between internet resources (such as the backend server) and an iOS app, ensuring that internet communications via the iOS platform conform secure connection best practices. Doing so lessens the likelihood of accidentally disclosing sensitive information either directly through an app or through a library consuming data. Volt MX Iris supports ATS and assumes that 1) your iOS applications make use of https, and 2) your communication through higher-level APIs is encrypted using TLS version 1.2 with forward secrecy. As a workaround to this requirement, if your app needs to make a request to an insecure domain, you have to specify this domain in your app's info.plist file. For more information, see the Apple Developer site. Automatically Modify info.plist with Custom Key Value Pairs When you build an app for the iOS platform in Volt MX Iris, Xcode generates a build properties file called info.plist. By modifying this file, you can customize the properties of the build, which are reflected in the app the next time you build it. Modifications to info.plist take priority over whatever properties are set by Volt MX Iris. If your app requires that the info.plist file be configured with sets of key value pairs of native SDK or custom-defined entries, you can automate this customization using a json file. The json file contains the key value pairs that you want added to info.plist, and during the building of the app, this json file is incorporated into the kar file. When the kar file is extracted, iOS incorporates the key value pairs in the json fie into To automatically modify info.plist with custom key value pairs, do the following: - Create a json file with the following file name: - Place the json file in the following Volt MX Iris project folder: - Edit the json file, adding the key value pairs that you want automatically incorporated into the info.plistfile. Save the file and close it. - In Volt MX Iris, build the app. The json file is incorporated into the kar file. When the kar file is extracted, iOS incorporates the key value pairs in the json fie into Using Application Reference Counting Automatic Reference Counting (ARC) implements automatic memory management for Objective-C objects and blocks, freeing the programmer from the need to explicitly insert retains and releases. By default, all Volt MX frameworks are built with ARC. However, in final application projects, ARC is disabled, to ensure that existing non-ARC FFI's work without breaking. If your application does not use FFI's, or if all the used FFI's are ARC-compatible, enable ARC in the final Application by adding the following to "enableARC" : true Automatically Add Required System Frameworks to the XCode Project When you use FFIs with Volt MX Iris, if the FFI has dependencies on any system frameworks, you can add those system frameworks to your XCode project. You can do so by configuring a voltmx_frameworks.json file. To add system frameworks to the XCode project, do the following: - Navigate to the common folder in your Volt MX Iris project. For example, - In the folder, create a JSON file and name it voltmx_frameworks.json. - Open the JSON file in any text editor. - Add a JSON object with the key as systemframeworks and value as an array containing all the system frameworks that are dependencies for FFI’s. For example "systemframeworks" : ["AVFoundation", ”Security”, ”LocalAuthentication”] 5. In Volt MX Iris, build the app. The JSON file is incorporated into the KAR file. When the KAR file is extracted, system frameworks provided in the JSON is added to the XCode project. Build an App To build an app with new or different settings, do the following: - On the Build menu, click Build and Publish Native. - In the Build Generation dialog box, select the channels and platforms for which you want to build your app. For example, you may want to build a native type of app for Mobile (phone) devices and Tablet devices for the iOS and Android platforms. For more information about native and SPA apps, see Types of Applications. Select the build mode. - Debug mode - To help you identify and fix errors, Volt MX Iris emits the complete symbolic debug information . To lessen the amount of time necessary to complete the build, the build is not optimized for code execution, so it may tend to execute slower than a build optimized for release. Also, the inclusion of the symbolic debug information causes the final executable to be larger than a release build. - Release mode - Volt MX Iris optimizes the build for execution, requiring more time to generate the build. It also does not emit the complete symbolic debug information, making the final executable smaller than a debug build. - Protected Mode - Applications built in Volt MX Iris can use the additional security enhancements by building the application in the Protected Mode. Volt MX IrisPlatform code for iOS and Android is equipped with mechanisms that can protect your application by detecting attacks like tampering, swizzling, debugging, jail breaking (iOS), rooting (Android), and information disclosure. Additional security mechanisms are provided through the use of White Box Cryptography to protect application business logic and source code. Application reacts to the attack by exiting upon detecting attacks to prevent further attempts. If you choose to build an application in Protected mode, then setting the public and private keys is mandatory. To do so, go to Project Settings > Protected Mode. For more details on how to generate public and private keys, click here. - Test Mode - To help you identify and fix errors, Volt MX Iris provides the ability to Test the application on the device or an emulator. When you build an app using the Test Mode, you can leverage the Jasmine testing framework of Volt MX Iris to thoroughly test your app and ensure your application is errors free. You can run jasmine test cases, test suites and test plans by building an app using the Test mode. Important: If you want to build your iOS app with multiple workspaces, you must select the Support Multiple iOS Workspaces from the Build section (Edit > Preferences > Build). If this option is not checked, the workspace is replaced for every build. When this option is checked, a separate workspace is created for each application. It will reduce the time and effort required for building applications every time you switch from one application to another. Exclude an app from iCloud backup If you want to exclude your application from the iCloud backup, you can configure the fileExcludeFromBackup Boolean value in the info.plist file. To exclude the app from the backup, do the following: - In Xcode, open the project you want to exclude from backup. - From the VoltMXJS folder, open info.plist. - Add a new key fileExcludeFromBackup - Set the type of the key to Boolean The default value for this property is No. Configure the value to Yes. The application will be excluded from iCloud backups.
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474661.10/warc/CC-MAIN-20240226162136-20240226192136-00011.warc.gz
CC-MAIN-2024-10
7,455
56
http://stackoverflow.com/questions/315093/configure-symlinks-for-single-directory-in-tomcat
code
I have a directory to which a process uploads some pdf files. This process is out of my control. I need to make those files available through the website using Tomcat. I have a directory available to the web, with the browser I can see files in it : /var/lib/tomcat5/webapps/test1 So I created a symbolic link to point at the directory with the pdf files : /var/lib/tomcat5/webapps/test1/files/ But I can't see anything in that directory. How can I enable sym links in the "test1" directory only? I don't want to enable sym links everywhere, just so that directory with pdf files is available to the web.
s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386164038825/warc/CC-MAIN-20131204133358-00084-ip-10-33-133-15.ec2.internal.warc.gz
CC-MAIN-2013-48
604
6
https://www.openwall.com/lists/oss-security/2022/06/27/5
code
Date: Mon, 27 Jun 2022 20:30:57 +0000 From: Tim Allison <[email protected]> To: [email protected] Subject: CVE-2022-33879: Apache Tika: Incomplete fix and new regex DoS in StandardsExtractingContentHandler Severity: low Description: The initial fixes in CVE-2022-30126 and CVE-2022-30973 for regexes in the StandardsExtractingContentHandler were insufficient, and we found a separate, new regex DoS in a different regex in the StandardsExtractingContentHandler. These are now fixed in 1.28.4 and 2.4.1. Credit: This incomplete fix was discovered and reported by the CodeQL team member [@atorralba (Tony Torralba)](https://github.com/atorralba) and [@jarlob (Jaroslav Lobačevski)](https://github.com/jarlob) from Github Security Lab. The new ReDos was discovered by the Apache Tika team. Powered by blists - more mailing lists Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list. Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446711042.33/warc/CC-MAIN-20221205164659-20221205194659-00489.warc.gz
CC-MAIN-2022-49
1,094
4
https://roboticadiy.com/raspberry-pi-4-case-dual-fan-heat-sink-aluminium-armor-thermal-testing/
code
Hello guys, in this tutorial, I am going to compare heating (Thermal Testing) results of raspberry pi with dual fan heat sink aluminium armor and without heat sink & fan. So lets get started. I did two experiment, one without heat sink and fan. Second with dual fan heat sink aluminium armor. I did both the experimentation then i realized that i could use “watch” command for monitoring the temperature. But i am showing how you can use watch command. Just type watch before the command. That said. It will run that command every two second and display output in console like this. Every two second it will update current temperature of GPU. watch vcgencmd measure_temp Raspberry Pi Temperature Command: 1) Raspberry Pi GPU temperature 2) Raspberry Pi ARM CPU temperature cpu=$(</sys/class/thermal/thermal_zone0/temp) echo "$((cpu/1000)) c" divide output by 1000 to get ARM CPU temperature. Experiment 1: Without Heatsink and Fan. I am going to run it for one hour. In first half an hour i will be playing youtube videos to see how much it will increase the temperature. Next half will be idle. We will see how it drop the temperature. Now We can see maximum temperature was 82 *C and minimum temperature was 65 *C. My ambient was temperature 30 *C. Experiment 2: With Dual Fan and Heatsink. Similarly we will run youtube video on raspberry pi for half an hour and watch how much temperature is increased. Next half an hour will be idle. We can see clearly difference between the temperatures with dual fan and heat sink and without heat sink & fan. We can see maximum temperature was 61 *C and minimum temperature was 45 *C. If we consider my room temperature which is 30 *C. This dual fan heatsink armor dissipate heat nicely. Buy on Amzon Dual Fan Heat Sink Aluminium Armor Case. Till then keep learning keep making.
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370510352.43/warc/CC-MAIN-20200403061648-20200403091648-00455.warc.gz
CC-MAIN-2020-16
1,824
18
https://dceg.cancer.gov/news-events/events/dceg-seminar-zli
code
Methods for Population Health with Limited Data - Dr. Li Biostatistics Branch Seminar Series March 31, 2020 | 10:30 AM – 11:30 AM Zehang (Richard) Li, Ph.D. Department of Biostatistics, Yale School of Public Health Data describing health outcomes of hidden populations and in low-resource areas are usually noisy and incomplete. In this talk, I will discuss two projects in such data-constrained settings. In the first project, I propose probabilistic approaches to estimating cause of death distributions using verbal autopsies (VA). VA is a survey-based method that is routinely carried out to assign causes to deaths when medically certified causes are not available. I will present an approach to use latent Gaussian graphical models to characterize the joint distribution of symptoms and causes of death while accommodating informative prior knowledge about their marginal associations. This allows us to combine noisy data from multiple sources to improve the cause of death classification. I will also briefly discuss the broader impact of probabilistic modeling of VA based on pilot studies to integrate VA with existing civil registration system. In the second project, I will discuss methods to evaluate population-level public health interventions for combating the opioid epidemics. Opioid use and overdose has become an important public health issue in the United States. However, understanding the dynamics of opioid overdose incidents and effects of public health interventions remains challenging, as comprehensive data-sets describing drug use usually lack. I will discuss challenges in evaluating impacts of spatially- and time-varying exposures with unmeasured confounding and spillover effects. I will discuss methods to leverage the space-time structures to adjust for certain types of confounding due to smooth latent processes and develop strategies to evaluate the sensitivity of such adjustments. Meeting number: 735 749 349 Join by phone 1-650-479-3207 Call-in toll number (US/Canada) Access code: 735 749 349
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662527626.15/warc/CC-MAIN-20220519105247-20220519135247-00759.warc.gz
CC-MAIN-2022-21
2,037
12
http://developer.nokia.com/community/discussion/showthread.php/242443-Resume-device-audio?p=925583
code
As far as I know all you can do is to Pause and Resume the music that its playing. If you do something like this: It will pause the current musing being played. If you do this: It will resume the music that was playing. You still need to check if something is playing and save a state to issue the resume instruction only if there is anything to be resumed. Also take in consideration that if I recall correctly you need to ask user permission before pausing the music, as per rules of submission to the store. If in testing they see that you pause a music that its playing without asking authorization to do so, your app may fail the certification process. Hope that helps you.
s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1408500801235.4/warc/CC-MAIN-20140820021321-00085-ip-10-180-136-8.ec2.internal.warc.gz
CC-MAIN-2014-35
678
7
https://www.computing.net/answers/windows-xp/how-can-i-accsess-my-used-laptop/189201.html
code
|"I have no problem with wiping the whole thing clean"| Your best bet would be to wipe it clean. I have no idea why you are trying to crack the passwords. If there is a bios password installed, you may as well use the laptop for a small boat anchor Some HELP in posting on Computing.net plus free progs and instructions Cheers
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281001.53/warc/CC-MAIN-20170116095121-00512-ip-10-171-10-70.ec2.internal.warc.gz
CC-MAIN-2017-04
326
4
http://diego4funzone.blogspot.com/2017/02/relhalo-4-cortana-human-nude.html
code
Original models from Infinity Ward,Capcom,Electronics Arts, Microsoft, Ubisoft and Treyarch,Xnalara and tombraider forums Users(rexil,Oocrofty,fullmon etc)Valve,Gmod and all developers that have created those models! I don't own any credits for those models!!!! terça-feira, 7 de fevereiro de 2017 [REL]Halo 4 Cortana Human Nude I have just ported this Cortna (human version) nude :)
s3://commoncrawl/crawl-data/CC-MAIN-2019-26/segments/1560627999000.76/warc/CC-MAIN-20190619143832-20190619165832-00399.warc.gz
CC-MAIN-2019-26
384
4
https://line-of-action.com/art/view/2849
code
Back on it© 2020 Tokenkobold Got busy with life and other projects, but I'm practicing again (also wouldnt let me upload for a few weeks because I dont have premium) Done as part of a 30 minute class. My current goal is: Improve at correctly capturing the overall proportions of the human form More from Tokenkobold
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500837.65/warc/CC-MAIN-20230208155417-20230208185417-00064.warc.gz
CC-MAIN-2023-06
316
5
http://www.freetech4teachers.com/2011/07/webcasts-and-keynotes-from-iste-2011.html
code
ISTE conference this year you can still access some of the great messages that were shared at the conference. All of the Elluminate recordings from ISTE Unplugged are now available online. To find the recordings just go to the ISTE Unplugged schedule and scroll to the right of the session titles to find the recordings. One of the recordings that I'm looking forward to spending some time with is Jackie Gerstein's Flipped Classroom Model: The Full Picture. The opening and closing keynotes from ISTE 2011 are available on ISTE's YouTube channel. I've embedded below the closing keynote delivered by Chris Lehmann. Chris's message starts around the 37 minute mark in the video.
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917122996.52/warc/CC-MAIN-20170423031202-00234-ip-10-145-167-34.ec2.internal.warc.gz
CC-MAIN-2017-17
678
2
https://world.optimizely.com/forum/developer-forum/CMS/Thread-Container/2016/1/create-contenttype-from-admin-environment-some-properties-are-not-rendered-propertly/
code
I created a contenttype in admin mode (as opposed to in code) and added a dropdownlist with values there. Now if i create a page with this contenttype, the dropdownlist is not properly rendered in All Properties Edit Mode (no values are shown for the dropdown). Is there a way to fix this? We use 9.0.2, perhaps this is fixed in a later version? I use this specific way to also enable Content Editors to add contenttypes without having to resort to programming in c#. Thanks in advance
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474843.87/warc/CC-MAIN-20240229134901-20240229164901-00850.warc.gz
CC-MAIN-2024-10
485
4
https://way2java.com/java-introduction/what-is-java/
code
What is Java ? is explained in Simple terms for a Beginner to get an idea of Java. Java, developed by Sun Microsystems and released to market in 1995, is a high-level programming language with many unparalleled features. It can be used to develop standalone applications, web applications (applets and servlets), e-commerce applications, enterprise applications (like banking) and mobile applications. Very strong in LAN based as well as Client-Server programming with predefined methods. Java is simple to practice, due to predefined classes and methods added to each version released now and then. To quote the simplicity, a linked list program can be mastered just in 15 minutes. Within 15 minutes of learning, you can do more operations than what you have learnt in C/C++ coaching, like deleting a range of nodes etc. In socket programming, one line of code is enough on client side just to send a simple message like "Hello Server" to server. To say one word, there is no part of world where Java is not used. A Java student can get a job anywhere in the world. It is object-oriented and platform independent. If written like this, books and notes will get exhausted. Let us go into the subject slowly, perhaps you are definitely interested. Get all the features from the following posting. Pass your comments of how far this tutorial on "What is Java ?" is helpful to you.
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100518.73/warc/CC-MAIN-20231203225036-20231204015036-00090.warc.gz
CC-MAIN-2023-50
1,378
8
https://www.sologig.com/jobs/Java-Developer/J3N6KR79Q4M2HPPTC1G
code
AceInfo is currently seeking a Java Developer to support our federal project, in (Crystal City) Arlington, VA. • Designs and codes software components, units, and modules that meet product specification and development schedules using Java/JEE and open source technologies. • Provides direct application/solution architecture/design and support for strategic solutions. • Play a key role applications modernization, development and communication of technology solutions. • Develops systems and system element architecture, design, and interface definition. • Maintains knowledge of current/growing design and analysis methodologies, emerging technologies for incubation and implementation. • Adheres to product build and release schedules and strategies and acts as a technical resource for lower-level developers. • Works with the developers and systems engineers to solve critical problems and identify efficiencies in implementing technical and functional requirements and tasks. • Utilize Test Driven Development (TDD) and Continuous Integration and Continuous Delivery as much as possible. • Experience scaling systems to support large-scale systems, including applications, databases, message queues, webservices, and caching strategies. • Experience in performance tuning and capacity planning. • Experience in developing REST and SOAP based APIs/services. • Hands-on experience working with Java, J2EE, SOA (ESB/REST APIs), web development and Open source technologies frameworks (i.e., Spring, Struts, Hibernate, GWT etc.) in an Agile SDLC based environment. • A Minimum of 5 years’ experience with system integration and development and package implementations. • A Minimum 5 years’ experience with Java and Java-based technologies, Oracle Database, Oracle Weblogic Server, and Oracle ROLE based security using Spring security. • Demonstrates ability to do technical design and development using Java (JDK 1.7 or above) technologies including JSP and Servlets. • Web development (JSP, JSF, HTML, CSS, AJAX, spring, XML, JSON) - for web applications. • Familiar with SQL and / or experience with database technologies such as Oracle or Microsoft SQL Server. • Solid understanding of all parts of Software Engineering (e.g. Requirements, Design, Implementation, Testing) and the Software Development Life Cycle (SDLC). • Technical leadership experience and developed technical designs for software and lead the development schedules in Agile Scrum or Kanban/Lean SDLC environment through DevOps CI/CD pipeline, build and deployment automation using tools like Maven, Jenkins and automated test tools. US Citizens, Greencard or EAD's only. No sponsorship is available for this position. Ace Info Solutions is an Equal Opportunity Employer with a commitment to diversity. All individuals, regardless of personal characteristics, are encouraged to apply. All qualified applicants will receive consideration for employment without regard to race, color, religion, gender, sexual orientation, gender identity, disability or veteran status. IT & Technical
s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578624217.55/warc/CC-MAIN-20190424014705-20190424040051-00071.warc.gz
CC-MAIN-2019-18
3,099
23
https://www.experts-exchange.com/questions/20153111/when-upgrading-from-97mdb-to-2000mdb.html
code
I tried to upgrade a MDB from a 97 vesjon to a 2000 versjon, by converting it from the tools in access 2000, but when I try to execute the asp Page I get this error !! Microsoft OLE DB Provider for ODBC Drivers (0x80004005) [Microsoft][ODBC Microsoft Access Driver]General error Unable to open registry key 'Temporary (volatile) Jet DSN for process 0x70c Thread 0x748 DBC 0xf3be004 Jet'. ....and since the asp worked fine before, then I wonder if what to do !!!
s3://commoncrawl/crawl-data/CC-MAIN-2018-17/segments/1524125937113.3/warc/CC-MAIN-20180420022906-20180420042906-00067.warc.gz
CC-MAIN-2018-17
461
8
https://www.capterra.com.de/software/168367/siebel-marketing-resource-management
code
Du bist nicht sicher, ob Siebel CRM das Richtige ist? Mit einer beliebten Alternative vergleichen Weitere gute Alternativen zu Siebel CRM Bewertungen über Siebel CRM The Siebel CRM works by allowing you to manage your company’s data and operations from a central loc Kommentare: The Siebel CRM is a comprehensive business process management system that allows you to manage your company’s data and operations from a central location. This comprehensive guide provides everything you need to know about the Siebel CRM system, from installation to customization. Siebel CRM is a widely used customer relationship management (CRM) software. It has been recognized as the most comprehensive and user-friendly CRM software on the market. It offers a variety of features that make it an excellent choice for business organizations of all sizes. Some of the benefits of using Siebel CRM include: - Easy to use interface: The Siebel CRM interface is very easy to navigate, making it suitable for both experienced users and new users. This makes it an ideal choice for businesses with a large number of customers or employees. - Extensive capabilities: Siebel CRM offers a wide range of capabilities, including contact management, sales tracking and inventory management. This allows businesses to manage their operations in an efficient and effective way. - Robust data storage: The Siebel CRM database is well-organized and reliable, which allows businesses to store large amounts of data without experiencing any problems. This makes it an ideal choice for businesses that need to keep track of important information related to their customers and sales transactions. One of the most common criticisms of the Siebel CRM is that it is complex and difficult to use. Other users have also complained about the lack of support from Siebel, and the slow response times from customer service. Overall, there are a number of reasons why people might choose not to use a Siebel CRM, making it a less popular option compared to other software options. The cons of using the Siebel CRM include: it can be difficult to find qualified personnel to use the system, and it can be expensive to upgrade the system. In Betracht gezogene Alternativen: Siebel The CRM Product Kommentare: CRM can be used for many types of applications and services as well. Siebel CRM is the best of bread CRM Product compared to its contemporaries. It’s is pretty costly to implement and needs an experienced person to set it up. Siebel call center software Kommentare: Siebel was a very good software for managing information in a call center when it was working, but that’s the key, when it was actually working. The software became unresponsive at way too many critical times. The layout of the information. Files were easy to see what I needed right away without starting a sales call with long pauses to figure out what’s going on with the file. I actually worked with Siebel for 2 different companies over the years with different needs. So Siebel was able to be customized to each companies needs. One company we needed to run credit checks that could be done for that company, another company we had complex pricing structures since it was insurance Siebel could handle that. Too many times Siebel went down. I’m not a tech guy but working in Medicare related health insurance it was a running joke, nightmare, that the last week of the Medicare open enrollment Siebel would go down at least once if not multiple times. Activity planning using Siebel resource management Kommentare: Siebel marketing resource management helps the user to keep a track on different marketing campaigns and activities. It gives the added Project activity templates Spending a day performance across enterprise Powerful analytics and business processes based on best practices Automate key marketing processes Enterprise resource planning in terms of profit Vs loss to a particular marketing activity can be improved further Part of Siebel MRM Development / Implementation Team Gained deep understanding of Organizations Marketing life cycle. Siebel MRM out of the box functionalities are good fit for most of the Organizations marketing process like Budget Management, Campaign Management, Event Management etc. It has key features like - Improve management with a common platform across brands and regions. Gain visibility into marketing spending and performance across the enterprise. Automate key marketing processes. Improve quality with best practice processes. Improve budgeting and planning with standardized processes and metrics. Optimize marketing investments with insight into past performance. Ease of Usage for End Users - Offers unique interactive assistance called Help that helps speed user training, increase user adoption, and enforce best practice Efficient Project Management and Collaboration - Provides robust project management capabilities that help marketers ensure that tasks are captured and communicated to everyone who needs to see them and critical deadlines are met. Real-Time Financial Insight and Reporting - Empowers all users in the marketing organization to be more effective by providing near real-time visibility into marketing performance and spending status through integrated analytic dashboards and reports that are tailored to their specific business needs. Improved Budgeting and Expense Management - Prepare and manage budget requests across different levels of the marketing hierarchy, including organization, plan, brand or product line, industry, and geography Workflow-Driven Approvals and Activities - Using the application's approval workflow process, users can circulate, review, and approve important marketing items, including proposed marketing plans and tactics, budget requests, and marketing content Collaboration with Third Parties - provides a Partner Portal to help manage key partners and agencies collaborating in the overall marketing process Higher Upfront Cost On-premise systems are classified as CAPEX (Capital Expenditure) i.e. require large upfront purchase. On top of it perpetual maintenance costs to ensure support and functionality upgrades. Longer implementation times On-premise implementations take longer due to the time needed for complete installations on servers and each individual computer/laptop. Ongoing maintenance With an on premise system, you are responsible for maintaining server hardware and software, data backups, storage and disaster recovery. This can be an issue for smaller companies who have limited budgets and technical resources.
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947473738.92/warc/CC-MAIN-20240222093910-20240222123910-00382.warc.gz
CC-MAIN-2024-10
6,592
32
http://somemath.blogspot.com/2014/09/question-of-absolutes.html
code
One of the more common refrains with someone claiming important mathematics is: I have mathematical proof! And a great draw of mathematics is the stated ability to be absolutely correct, though there is a problem, how do you know when something is actually proof? That question drove me to a simple answer: begin with a truth, and proceed by logical steps, then whatever you have at each step must be true. That is, I concluded that truth follows from truth. Which revolutionized my thinking, but I had a problem: how did I know that I could really trust logic? My problem was with the oxymoron "logical paradox", and so I went to look the so-called ones over, and concluded that there were form issues and a failure to appreciate exceptions. For instance, consider the following set: Consider a set that includes all and only sets that exclude themselves, except itself. And I found I could remove "paradox" from every so-called example questioning the foundations of logic, as it was a necessity! By linking logic to mathematical proof, I had to resolve any issue bringing the consistency of logic into question. That effort is shown in several posts on this blog including this one: Ultimately I concluded that mathematics is provably a subset of logic, and came up with a rather simple definition of truth itself. That may sound pretentious but it was a necessity of my proof definition. I had to know what "truth" meant in it. By claiming "logical steps" were necessary I had to consider logic and conclude that mathematics depended on logic and not the other way around. From those foundations I found I could move forward, and importantly knew what a mathematical proof was, and how to check a claim of one. So I went around using it! And found my definition worked perfectly. I could even scan through complex mathematical arguments where much of the math was unfamiliar to me, by keeping up with linkages--individual steps in the argument. Checking linkages can be easier than checking every detail of the mathematical argument. Any break in any one of the linkages mean the conclusion is not proven by the argument given. It's actually really cool. And the idea that mathematical proofs simply link truth to truth is one I pondered over for quite some time, and it's kind of weird! But it also helped me turn to identities with what I call tautological spaces. Of course one person can claim mathematical proof, and you can have a perfect way to check one, but what if people disagree anyway? Is there nothing left but endless argument? Nope. Correct mathematical arguments are not refutable, right? So far beyond what you may think is possible, the mathematics will work! While incorrect mathematical arguments are limited within perception, the idea that they work operates within a limited zone, with a refutation out there somewhere. Mathematics is an infinite subject. Like with my mathematical research, it builds forward I like to say, where there is more that follows from it than I will ever know! Like with algebra. There is no end to it. In contrast, flawed mathematical arguments are error constrained--even the appearance of success must operate in a special zone. For instance, I innovated by factoring polynomials into non-polynomial factorizations, which turned out to be the thing which broke mathematical ideas which seemed ok as long as, yup, you didn't factor polynomials into anything other than polynomials! And it IS remarkable when you see where people have stayed within the lines in such a way that they can't see something that jumps out at you if you just try something different. One of the troubling things I've seen at times from the mathematical community at large is an emphasis on personal opinion, where things are believed to be true because a bunch of mathematicians say they are true, which is a running away from certainty. Which is why I emphasize checks which do not require expertise, like asking: what does your research predict about what actual numbers will do? The innovations I introduced allow you to do more. And the mathematics that follows from the truth will always exceed our finite human imaginations. It is the promise that has been fulfilled with advances like algebra and calculus--there is always an infinite more out there than we now know, and is the promise that makes mathematics such a power in all our lives.
s3://commoncrawl/crawl-data/CC-MAIN-2018-30/segments/1531676591140.45/warc/CC-MAIN-20180719144851-20180719164851-00123.warc.gz
CC-MAIN-2018-30
4,382
21
http://www.tomshardware.com/forum/67954-63-black-sreen-cursor
code
Hello, I have a blank screen with cursor. I can run task manager. From there I can enter a website and it starts explorer. However, not sure how to fix problem? Any thoughts? More aboutblack sreen cursor You're probably going to need to provide more information. It might be a driver issue. Have you installed any new drivers lately? In the task manager click new task i believe and type explorer.exe this should bring back the explorer. You may want to check the Event Viewer, and if you are unsure of how to access that I can step you through it. on another pc make a hirem boot cd and scan for virus.
s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187824820.28/warc/CC-MAIN-20171021152723-20171021172723-00187.warc.gz
CC-MAIN-2017-43
603
6