url
stringlengths 13
4.35k
| tag
stringclasses 1
value | text
stringlengths 109
628k
| file_path
stringlengths 109
155
| dump
stringclasses 96
values | file_size_in_byte
int64 112
630k
| line_count
int64 1
3.76k
|
---|---|---|---|---|---|---|
http://slashdot.org/~Master+Moose/firehose | code | I had a job training software, and business applications for end users. Part of this involved one on one training with users that wanted to know how to perform specific tasks.
I remember going to one lady who wanted to know how to perform a specific task to get an outcome she was struggling with. I found the issue not to be her lack of knowledge, but some missing packages. As systems were locked down, I had to call in to the internal HelpDesk and raise a ticket to get the necessary packages installed on her machine.
Upon giving the exact details of what was missing and what would be needed I got the response "Can I pass you to my colleague who knows about computers?" | s3://commoncrawl/crawl-data/CC-MAIN-2015-27/segments/1435375094931.19/warc/CC-MAIN-20150627031814-00248-ip-10-179-60-89.ec2.internal.warc.gz | CC-MAIN-2015-27 | 675 | 3 |
http://micechat.com/forums/disneyland-resort/127244-fix-screamins-scream-tubes-concept-art-3.html | code | Personally, I think the villan theme would have seemed very cheap. To keep with the time period, they would have had to use cutouts along the track which seem cheap, and if they decided to do AA's it would be too high tech and take away from the elegant simplicity.
What I would do is install trellis along the hills like this and then have clear plexiglass run along the side closest to the outside world. I am beginning to wonder though if the scream tubes are more to block views of outside the park than to stop sound. The point about Knotts not having anything like this is a good point.
Anyway, my quick sketch: (brutalized by the file compression) | s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440644064538.25/warc/CC-MAIN-20150827025424-00198-ip-10-171-96-226.ec2.internal.warc.gz | CC-MAIN-2015-35 | 654 | 3 |
https://forums.unrealengine.com/t/how-to-make-an-enemy-ai/290290/5 | code | Take a look at this thread: [UPDATED 5/16] A.I. Templates - Bot, Car, & +Flying AI - Programming & Scripting - Unreal Engine Forums
Hi, I would like to know is it possible to make a zombie ai that can: Walk around(randomly), If the player gets in its
line of sight then chases the player, and if it caches the player it will kill him, lastly if the player presses W 3 times it will die.
Any help would be awesome :).
Do you know about Navmesh?
Hi, I’m Roy, on this link you can find a multiple elevator tutorial that you can implement a AI system with it. LET me Know…
a few more tutorials that may help you on your way:
A new, community-hosted Unreal Engine Wiki - Announcements - Unreal Engine Forums1-_Making_AI_Jump_as_a_Part_of_Path_Following
Hi, Here are some video tutorials on how to AI your level.
I will be updating the list. | s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662519037.11/warc/CC-MAIN-20220517162558-20220517192558-00292.warc.gz | CC-MAIN-2022-21 | 839 | 10 |
https://40metres.com/new-ham-radio-new-antenna-new-tuner-at-my-home-qth/ | code | New ham radio, new antenna, new tuner at my home QTH
I’ve placed a 27m wire in the air with two telescopic poles, reused my existing ground radials, fed with 15m low loss feeder into a smart tuner at the base of the radiating wire. Initial results show a huge improvement on 160m, 80m, 40m and 30m however the higher bands are unknown as yet due to propagation.
SGC SG-237 smart tuner
Icom IC-7200 (replaces the Yaesu FT-DX1200)
DX Commander poles
I would be very grateful if you could make a regular DONATION and join my Patreon account. For the equivalent of £3 you can access extra content and behind the scenes info, this also helps me keep the channel running, many thanks https://www.patreon.com/2e0ezt
To subscribe click this link https://www.youtube.com/channel/UCtX8PCgk0UHQRUqROCtPM4g?view_as=subscriber?sub_confirmation=1
I’m a licensed amateur radio operator from the United Kingdom. My YouTube channel features videos focusing on operating portable radio from various locations plus how to videos, tutorials, insights and conversations in the hobby. | s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320304959.80/warc/CC-MAIN-20220126162115-20220126192115-00070.warc.gz | CC-MAIN-2022-05 | 1,067 | 8 |
https://smartacademicwriting.com/2020/08/27/imagine-a-situation-of-gentrification-where-a-particular-ethnic-community-is-being-displaced-by-wealthier-incomers/ | code | Main topics: The Management Process Today Managing Values, Attitudes and Emotions Managing diversity and ethics Managing in a Global Environment Decision Making, Learning, Creativity Planning, strategy Designing Organizational Structure Organizational….
Imagine a situation of gentrification where a particular ethnic community is being displaced by wealthier incomers
Choose one of the following questions (your choice) and respond to it in at least 150 words. Try to consider multiple points of view; don’t hesitate to include both pro and con arguments.
- In what situations and under what circumstances is it valid to make men or women remove religious attire, not be allowed to wear it at all, trim/shave their facial hair, or cut/style their hair in certain ways (not necessarily religiously-connected) ? Consider the following contexts: security reasons; school or company dress codes; military regulations for enlisted personnel; (try to come up with another situation/context).
- Imagine a situation of gentrification where a particular ethnic community is being displaced by wealthier incomers. What cultural issues may arise? If there are conflicts of cultural norms between the older community and the newcomers, does each side have an equal claim, or not? Why?
- When Americans or Europeans visit a strict Islamic country such as Iran or Saudi Arabia that has laws or customs about public dress or consumption of alcohol, should they be forced to abide by these standards? Should they do so voluntarily? What about if they move there to work for a few years? What about if they move there permanently? What about visiting diplomats?
- In many countries in Europe, Australia, and North America, there is currently a debate about whether immigration should be restricted, for everyone or for people from certain areas. What are the justifications given for such restrictions? Is it ever valid for the majority group of a country to object to large influxes of people whose values are extremely different to those established in the country? Why or why not? | s3://commoncrawl/crawl-data/CC-MAIN-2020-45/segments/1603107878921.41/warc/CC-MAIN-20201022053410-20201022083410-00275.warc.gz | CC-MAIN-2020-45 | 2,071 | 7 |
https://pulp.plan.io/issues/1194 | code | yum groupinstall pulp-consumer-qpid upgrades default puppet
It was recently reported that yum groupinstall pulp-consumer-qpid upgraded puppet version (2.6.7 -> 2.7.x) on the clients. As a result of which puppet master(2.6.x) s communication with puppet clients. we are not using pulp for puppet deployment but only for rpm as of now. is there a way we remove pulp-puppet plugins on client so that rpm deployment still works?
Updated by [email protected] about 8 years ago
pulp version 2.5.1
As part of the pulp install, the puppet package is upgraded to 2.7.26. The puppet master is only at 2.6.7-1.
Because of this, we get the following error when puppet attempts to pull the latest catalog from the puppet master.
Could not retrieve catalog from remote server: Error 400 on SERVER: No support for http method POST
We are not using pulp for puppet deployment but only for rpm as of now. Is there a way we remove pulp-puppet plugins on client so that rpm deployment still works?
Can we safely remove pulp-puppet-consumer-extensions and pulp-puppet-handlers from pulp-consumer to avoid puppet upgrade without breaking rpm plugins? | s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506480.35/warc/CC-MAIN-20230923062631-20230923092631-00435.warc.gz | CC-MAIN-2023-40 | 1,129 | 9 |
https://github.com/osate/osate2/issues/1572 | code | Join GitHub today
GitHub is home to over 28 million developers working together to host and review code, manage projects, and build software together.Sign up
AADL Navigator: Double-click on instance model content doesn't open editor #1572
Started trying to fix this, but it doesn't work reliably.
Was having problems with | s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376824115.18/warc/CC-MAIN-20181212181507-20181212203007-00403.warc.gz | CC-MAIN-2018-51 | 321 | 5 |
https://www.ijraset.com/research-paper/speech-based-emotion-recognition-using-machine-learning | code | Speech-based emotion recognition is a developing field that has attracted a lot of interest lately. We suggest a machine learning method for identifying emotions from speech samples in this article. From the speech examples, we extract acoustic features that we then use to train and test a variety of machine learning methods, such as decision trees, support vector machines, and neural networks. Using a dataset of speech samples with emotional labels that is publicly accessible, we assess how well these models perform. The experimental findings demonstrate that, with an accuracy of 87%, the neural network model beats the other models. Applications for the suggested method include human-computer interaction, education, and the diagnosis of mental illnesses. Overall, this article makes a contribution to the improvement of speech-based emotion recognition systems.
Speech-based emotion recognition is an active area of research in the field of human-computer interaction. Recognizing emotions from speech is important for a range of applications, including mental health diagnosis, education, and entertainment. Many studies have been conducted on thistopic, but there is still a need for more accurate and reliable emotion recognition systems. Machine learning has emerged as a promising approach for speech-based emotion recognition due to its ability to learn patterns from data and adapt to new situations.
We suggest a machine learning method for identifying emotions from speech samples in this article. Then we extract acoustic features from the speech samples and use these features to train and evaluate several machine learning algorithms. We evaluate the performance of these models using a publicly available dataset of speech samples labeled with emotions. We also compare our approach with existing methods in the literature.
The major contributions of this paper are the experimental assessment of this approach on a dataset that is freely available, as well as the proposal of a novel machine learning approach for speech-based emotion recognition. Our findings demonstrate that the proposed method works better in terms of accuracy than current approaches. The proposed approach has the potential to be used in various applications, and can contribute to the development of more accurate and reliable speech-based emotion recognition systems.
II. LITERATURE REVIEW
Sukanya Anil Kulakarne, Feature extraction and classifier training are required for emotion recognition from audio signals. In order to effectively train the classifier model to distinguish a certain emotion, the feature vector is made up of audio signal components that characterise speaker-specific properties including tone, pitch, and energy. The acted voice corpus of both male and female speakers from the English. Language open-source dataset RAVDESS was manually separated into training and testing. Mel-frequency cepstral coefficients, which we have derived from the audio samples in the training dataset, are used to represent speaker vocal tract information. With genuine speech recordings, we also put feature extraction into practice. We measured the energy and MFCC coefficients of audio samples representing various emotions, including neutral, rage, fear, and melancholy. The classifier model receives these extracted feature vectors. The extraction process for the test dataset will be followed by the classifier's determination of the underlying emotion in the test audio. K Vaibhav.P The earliest speech recognition system, created in 1952 by Davis at Bell Laboratories in the US, could identify male voiced numbers from 0 to 9. The obstacles associated with speech processing, such as continuous speech recognition and emotion recognition, were too great for researchers to overcome. Not just through facial expressions, but also through speech, emotions can be understood. Every human's speech is accompanied by an emotion. Emotions are crucial because they let a person comprehend their feelings. Speech reveals a person's feelings, such as happiness, sadness, etc. Elsevier B. V.
But, behind facial cues, audio cues are the most frequently used information to determine an individual's emotional state. We merged all the techniques into a single input vector in order to increase the identification rate. Because these techniques are more frequently employed in speech recognition and have high recognition rates, we decided to use the coefficients MFCC, ZCR, and TEO in our investigation. And secondly, we suggested using an auto-encoder to minimise the input vector dimensions in order to optimise our system. Support vector machines were employed (SVM).
Using the RML database, our system is assessed. Ankitha Mathew Chinnu One of the most often used study areas is speech processing. There are numerous researchers working on various speech processing systems all over the world. In 1920, the company Radio Rex produced a celluloid toy that marked the beginning of speech processing. This toy was the first speech recognition device that relied on the 500 Hz acoustic energy that the vowel "Rex" releases. The earliest speech recognition system, created in 1952 by Davis at Bell Laboratories in the US, could identify male voiced numbers from 0 to 9. The obstacles associated with speech processing, such as continuous speech recognition and emotion recognition, were too great for researchers to overcome. S . Padmaja Karthik, In recent times, the significance of understanding human speech emotions has grown in order to enhance the effectiveness and naturalness of human-machine interactions. The difficulty in differentiating performed and natural emotions makes it a very difficult task to recognise human emotions. In order to correctly determine emotions, experiments have been done to extract the spectral and prosodic elementsWeprovided an explanation of the classification of emotions based on calculated bytes utilising human speaking utterance. How to categorise the gender using estimated pitch from human voice was explained by Chiu Ying Lay et al. Acoustic cues from speech can be extracted in order to identify emotions and classify them, according to Chang-Hyun Park et al. Nobuo Sato et al. provided information on the MFCC technique. Their primary goal was to use MFCC on human speech and accurately classify emotions with over 67% accuracy. In an effort to improve accuracy, Yixiong Pan et al. applied Support Vector Machines (SVM) to the problem of emotion classification. With more than 60% accuracy, Support vector machines in neural networks were used by Keshi Dai et al. to recognise emotions. The implementation of speech-based emotion recognition utilising machine learning and deep learning concepts has been the subject of numerous articles. Humans have a wide range of heterogeneity in their capacity to identify emotion. It's crucial to remember that there are many sources of "ground truth," or details about what the real emotion is, when learning about automated emotion recognition. Take into account that we are trying to determine Alex's emotions.
"What would most people say that Alex is feeling?" is one source. The "truth" in this case may not be what Alex feels, but it may be what the majority of people would assume Alex thinks. For instance, Alex might appear pleased even when he's truly feeling depressed, but most people will mistake it for happiness. Even if an automated technique does not truly represent Alex's feelings, it may be regarded accurate if it produces results that are comparable to those of a group of observers. You can also find out the "truth" by asking Alex how he really feels.
This works if Alex is conscious of his internal state, is interested in conveying it to you, and is able to express it precisely in words or numbers. Yet, some people with alexithymia lack a strong awareness of their internal emotions or are unable to express them clearly through words and numbers. . In general, determining what emotion is actually present can be difficult, depend on the criteria that are chosen, and typically require retaining a certain amount of uncertainty. Due to this, we decided to examine the effectiveness of three alternative classifiers in this instance. Both regression and classification issues can be solved using the machine learning approach known as multivariate linear regression classification (MLR) Gaurav Sahu , We used Machnine Learning models like Random forest,gradient boosting,Support Vector Machnies and Multinomial Naïve Bayes, Logistic Regression models to extract the emotion from the audio.
III. PROPOSED METHODOLOGY
In this proposed work, an audio file is given as an input. Here we trained a machine learning model which this, firstly it converts the .mp3 format files into the .wav format files. Using the mp32wav.py file. Where this will convert the .wav format. And Pydub library is used for converting the audio.
Created the embeddings(OpenI3) for both training and test data set using pretrained audio models with size of 512.
Libraries used: openl3, soundfile
There are different arguments present in openl3 which I changed to obtain different embeddings.
Best embeddings are when [input_repr=”m1l256”, hop_size=0.5, content_type=”env”]
For given audio files embeddings are of shape (N,512) . N depends on duration of audio.
I converted each embedding into N 512D embeddings and given same label to all those which I later used for training.
KNN classifier with standard-scaler is used to train embeddings Libraries used – sklearn.K Fold Cross validation with different scaling methods, splits are also experimented.
we I experimented with different CNN models created embeddings from pretrained
B. Data visualization
We suggested a machine learning method for identifying emotions from speech samples in this article. Using an openly accessible dataset of speech samples that had been emotionally labeled, we tested the effectiveness of these models. Our findings The main contribution of this paper is the development of a new machine learning approach for speech-based emotion recognition that can be used in various applications, including mental health diagnosis, education, and entertainment. Our approach has the potential to improve the accuracy and reliability of speech-based emotion recognition systems, which is important for these applications.In conclusion, our proposed approach shows promising results for recognizing emotions from speech samples using machine learning.
Sukanya anil Kulkarni , “Speech based Emotion Recognition machine Learning “ March 2019
Mahalakshmi Selvaraj, R.Bhuva, S.Padmaja Karthik ,”Human Speech emotion recognition “ February 2016
Amitha Khan K H, AnikithaChinnu Mathew, Ansu Raju, Navya Lekshmi M, Raveena R Maranagttu, Rani Saratha R ,”Speech Emotion Recognition Using Machnine Learning” 2021
Vaibhav K.P,Parth J.M, Bhavana H.K, Akanksha S.S, ”Speech Based Emotion Recognition Using Machnie Learning” , 2021
Elsevier B.V , “Speech Emotion Recognition with Deep Learning” , Procedia Computer ,2020
Gaurav Saahu ,”Multimodal Speech Emotion Recognition and Ambiguity Resolution”,2019 | s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224644855.6/warc/CC-MAIN-20230529105815-20230529135815-00726.warc.gz | CC-MAIN-2023-23 | 11,195 | 28 |
https://github.community/t/applying-to-github-developer-student-pack/162412 | code | I was applying to the Developer Student Pack, but I can’t send the request because it keeps asking for a proof of academic status. I do have a badge in my school (it is based in Italy and it is listed in GitHub’s Database of Schools) but it only shows the date of birth, name, and surname. We use that to track attendance. Can I upload that?
Unfortunately if proof of enrollment is required then it would have to be something that is dated, showing that you are enrolled for this academic year.
In most cases, students request transcripts or letters from their school’s office to confirm this.
I talked with my mother about the situation after she came back from work, and she suggested the same thing. I’ll upload the documents when I’ll receive them.
Thanks for your help! | s3://commoncrawl/crawl-data/CC-MAIN-2021-10/segments/1614178374686.69/warc/CC-MAIN-20210306100836-20210306130836-00180.warc.gz | CC-MAIN-2021-10 | 784 | 5 |
http://stackoverflow.com/questions/10432257/how-to-pass-a-json-object-from-a-mvc3-view-to-a-html-page | code | I am having a json object in index.cshtml in mvc3 of my controller. Specially, json object is created in index.cshtml page itself. Now, I want to pass this json object to my other results.html page and want to use that json object in that html page.
Please give some valuable guide for this. Any help will be highly appreciated. | s3://commoncrawl/crawl-data/CC-MAIN-2015-22/segments/1432207926964.7/warc/CC-MAIN-20150521113206-00339-ip-10-180-206-219.ec2.internal.warc.gz | CC-MAIN-2015-22 | 328 | 2 |
https://docs.trendmicro.com/en-us/enterprise/control-manager-60/ch_ag_getting_started/console_https_access_assign_abt.aspx | code | During Control Manager installation you can choose the level of security when accessing the management console. The least secure only requires an HTTP connection. The most secure requires an HTTPS connection. If the least secure connection was selected during installation, you can change the access level after installation to the most secure connection.
You must obtain a certificate and set up the Control Manager virtual directory before you can start sending encrypted or digitally signed information to and from a Control Manager server. | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570871.10/warc/CC-MAIN-20220808183040-20220808213040-00644.warc.gz | CC-MAIN-2022-33 | 543 | 2 |
https://forum.netgate.com/topic/49456/stateful-inspection | code | I have a problem with internal routing!
how can i deactivate statefull inspection?
my problem, i route internal traffic (site2site vpn) and opt1 trafic over different interfaces.
the traffic out point is opt1 ond the packets in will be wan(ipsec).
any solution ?
Create two firewall rules. One to allow the packets out from LAN to OPT1, and one to allow the packets in from WAN to LAN.
While creating each rule, click the "Advanced" button beside "State Type" in the Advanced Features area at the very bottom of the page. Set the dropdown to "none".
To avoid security issues, narrow the source and destination to specific IP addresses, if you can. | s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320306335.77/warc/CC-MAIN-20220128182552-20220128212552-00069.warc.gz | CC-MAIN-2022-05 | 647 | 8 |
https://docs.logrhythm.com/deploy/7.15.0/gen6-storage-array-configuration | code | This guide provides the installation steps required for configuration of your LogRhythm Storage Array (LR-SA).
This guide is intended for systems engineers and other implementation specialists within LogRhythm Professional Services, who are LogRhythm Partners, or who are LogRhythm customers under the guidance of LogRhythm Professional Services.
Do not attempt to complete the steps in this guide without assistance from LogRhythm Support.
The LogRhythm Storage Array is designed to increase the storage capacity of a LogRhythm High-Performance Appliance. The following configuration steps require taking the system offline to install new hardware.
- Before adding the LogRhythm Storage Array device to an XM, back up the LogRhythm Appliance. A minimum backup should include the SQL Server system databases (master, msdb, and model), the LogRhythmEMDB database, and all archived log files.
- If an antivirus scanner has been installed on the LogRhythm appliance you may need to disable it and update the exclusions to include the new data locations after its installed.
- Shut down the LogRhythm appliance. Be sure that the appliance and any attached devices are powered off.
Mounting rails, hardware, a RAID controller, and two SAS cables (2 meters in length) are included with each storage appliance.
RAID Controller and SAS Cables
12 x 12 TB 7,200 RPM SAS 3.5-inch
XM and DP appliances
PERC H965e RAID Controller with 8 GB Cache
There is one supported RAID configuration for the LogRhythm Storage Array:
- Single-volume storage for archiving: 12-drive RAID 6 array
The following table lists the possible LR-SA configurations based on the LogRhythm High-Performance Appliance to which the storage array will be attached.
Unpack and Rack the Storage Array
Unpack the array and identify each item, noted below. Keep all shipping materials in case they are needed later.
- Storage enclosure containing 12 x 3.5" drives
- Rail kit
- PERC H965e RAID Controller
- 2m SAS cables (x2)
The storage array ships with a rack mount chassis and rails for mounting in a high-density server rack. Install the rails in a rack that meets the specifications of American National Standards Institute (ANSI)/Electronic Industries Association (EIA) standard ANSI/EIA-310-D-92, the International Electrotechnical Commission (IEC) 297, and Deutsche Industrie Norm (DIN) 41494.
For details about installation, refer to the Rack Installation guide that is included with your storage array rail kit.
Install the RAID Controller
Before the LogRhythm Appliance can use the LogRhythm Storage Array, you must install the included RAID controller in the LogRhythm Appliance.
- Shut down the LogRhythm Appliance and unplug both power supplies.
- Remove the lid of the LogRhythm Appliance by turning the lock on the black handle to unlock and then lifting up on the black handle.
- Depending on the model, there are between one and six PCIe slots available in the LogRhythm Appliance, the slots are located in the rear of the appliance. Depending on the LogRhythm Appliance you may have either Half-Height or Full-Height PCI-E slots available. The PERC card is shipped with both Half and Full-Height brackets, you may need to swap the brackets by removing the 2xPhillips Head screws on the PERC card to match your slot height.
- Insert the RAID controller in one of the available slots, making sure it is fully seated and locked in place.
- Replace the lid of the LogRhythm Appliance.
- The PERC H965e RAID Controller has 4 eSAS Ports, to install a single storage array you are only required to connect 2 ports, 1 port to each of the Enclosure Management Modules. Use the provided SAS cables to connect the ports 0 and 1 (closest to the top of the bracket on the RAID controller) to the first port on each of the Enclosure Management Modules (See YELLOW squares in diagrams Below).
- Connect the power cables for the storage array, and then reconnect the power cables for the LogRhythm Appliance.
- Power on the storage array.
- Power on the LogRhythm Appliance.
Configure the Array
Before the LogRhythm Appliance will recognize the LogRhythm Storage Array, the newly installed RAID controller must be set up. It can be set up through RAID Controller BIOS Configuration Utility, iDRAC, or Dell OpenManage. LogRhythm recommends using the Dell iDRAC GUI which can be accessed locally through the Dell iSM iDRAC GUI Launcher or via a remote web browser to the per-configured iDRAC IP.
Configure an Array for an XM or DP - Archives
For an XM or DP appliance, the array is configured as a single volume for maximum storage capacity. The 12 drives in the storage array will be configured as follows:
- Drives 0–11: RAID 6
Configure Drives with the iDRAC GUI
To configure the array using the iDRAC GUI, do the following:
- If accessing the iDRAC from within the LogRhythm appliance you can access this through the Start Menu "iDRAC GUI Launcher". This will open a web browser to the web address of "
- Authenticate into the iDRAC Web GUI by entering the following
Password: LogRhythm Default Password (obtain from support or professional services if you are unsure)
- To access the storage configuration select the "Storage" top level menu, then "Virtual Disks" to configure our Virtual Disk for the LogRhythm Storage Appliance (See YELLOW). Your existing Virtual Disk configuration will vary depending on which appliance you are installing the storage array on so the screenshots may vary
- Select the "Create Virtual Disk", button then select "Advanced Configuration"
- Select the Controller "PERC H965e Adapter" and you will be prompted to fill in the details for the virtual disk then click "Next"
Controller: PERC H965e Adapter (note screenshot is incorrect at time of writing)
Media Type: HDD
Physical Disk Selection: New Group
- Select all 12 the physical disks numbered 0 - 11 by checking the boxes on the left of each disk, you will need to scroll to the bottom to select them all, then click "Next", review the settings on the next page, then "Next" again.
- On the final page of the wizard you will be presented with a Confirmation window. To complete the wizard you need to select "Add to Pending"
- You will be prompted with options for when you would like the iDRAC controller to complete the pending task you just created. Since creation of the virtual disk for archives does not have any impact on the production system we recommend selecting "Apply Now". This job will take approximately 5 minutes to complete. You can monitor it from the iDRAC Job Queue or just refresh the page until the Storage Status is Green/Healthy
Windows Disk Configuration for an XM or DP
- Open the Windows Disk Management console through Server Manager, or type diskmgmt.msc in the search box.
- Initialize the disk as GPT, and then click OK.
- Right-click the new disk, and then click New Simple Volume.
Choose a drive letter, provide a name, and then select the Perform a quick format check box.
R: is recommended for archive
- Click Next.
LogRhythm Archive Configuration
- In the Client Console, open the Deployment Manager.
- Click the Data Processors tab, double-click the Data Processor on which you want to change the archive path, and then double-click Advanced.
- Change the ActiveArchivePath and InactiveArchivePath to the new drive.
- With the LogRhythm services stopped, copy the archives to the new location:
- Start > Run > cmd.exe
- Xcopy D:\LogRhythmArchives\*.* R:\LogRhythmArchives\ /s /h /e /o /k
- Start the LogRhythm services. | s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474594.56/warc/CC-MAIN-20240225071740-20240225101740-00876.warc.gz | CC-MAIN-2024-10 | 7,506 | 68 |
https://baglinifinance.com/data-lab/ | code | Bridging the gap between raw data and actionable insights
Accessing good quality data is a costly task, and extracting meaningful insights from it is even more daunting. Our goal is to help you with both.
Access data and code
We believe in full accountability and replicability. Not only we provide insights, but we also provide the tools to replicate results yourself
Request Customized Charts
Need a specific chart or analysis for you own research? We are here to help you. | s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474445.77/warc/CC-MAIN-20240223185223-20240223215223-00407.warc.gz | CC-MAIN-2024-10 | 475 | 6 |
http://bigvideogamereviewer.com/event-id/fix-event-36.html | code | Alternatively, if you just posted it, wait a minute. Apparently vssadmin does not change the default 15% size in the Registry, hence the "shadow copies of volume C: were aborted because the shadow copy storage could not grow due to For best results, provide a Web version of your game, or a Windows version with no dependencies. If the User Account Control dialog box appears, confirm that the action it displays is what you want, and then click Continue. http://bigvideogamereviewer.com/event-id/fix-event-id-63.html
Join Now For immediate help use Live now! Well done to everyone who took part. 1912 Amazing Games! Many solo participants enter the Jam. Reload to refresh your session. https://technet.microsoft.com/en-us/library/cc756447(v=ws.10).aspx
First Name Please enter a first name Last Name Please enter a last name Email We will never share this with anyone. Play and Rate games to help others find your game.We'll be announcing Ludum Dare 36's August date alongside the results. At the top of the Start menu, right-click Command Prompt, and then click Run as administrator. If the idea is strong, and everything plays well enough, you can go Compo.
Hyper-V Backup How to Fix: The semaphore timeout period has expired, Error 121 Popular 18 Hyper-V and Hyper-V Backup Tips & Tricks You Need to Know Best Practices for Server Backups Chrome is a bit more work. Verify To perform this procedure, you must have membership in Administrators, or you must have been delegated the appropriate authority. Windows Event Log Time Change Type the size that you want for the shadow copy storage area, and then click OK.
Under Redirection, if the Supported Plug and Play Devices check box is selected, clear the Supported Plug and Play Devices check box. As disk space continues to grow and drive technology change SBS2008 and some SBS2011 end up with the f… SBS How to Send a Secure eFax Video by: j2 Global Sending MY GAME CRASHES, IS UNBEATABLE, OR I MADE A TYPO: We allow you to fix crashes, win condition, or tiny bugs after the deadline. In a sense, this is like "porting" to support more players.
I've followed the steps outlined here with no sucess: http://support.microsoft.com/kb/816042 I also just tried the Fix it 50395 which wasn't available the last time I tried to fix this. Windows Time Service Events HomeFeaturesHyper-V BackupCloud BackupServer BackupVMware BackupPC BackupFree ToolsFAQDownloadSupportHelpline How to Fix VolSnap 36 Error User Imposed Limit - Volume Snapshot VolSnap 36 event ID may show up as error: Volume Snapshot Driver, Separate the good themes from the bad ones ~ v o t en o w ~ Theme Voting Log in and choose the theme for LD36! I ended up allocating 20% and backup & restore functions perfectly!
Select to clean up the files for All Users. http://ludumdare.com/compo/ludum-dare-36/ Moreover, the PR lacks tests and builds. Event Id 36 Terminalservices-pnpdevices Thanks everyone for coming out! Event Id 36 Terminalservices-localsessionmanager You’ll be auto redirected in 1 second.
Microsoft Customer Support Microsoft Community Forums United States (English) Sign in Home Windows Server 2012 R2 Windows Server 2008 R2 Library Forums We’re sorry. LD36 has ended! This will show a new Tab called More Options. have a peek here To submit your 2nd game, you will have to make a 2nd account.
To perform these procedures, you must have membership in the local Administrators group, or you must have been delegated the appropriate authority. Submission Hour ends Compo Submission Hour! Privacy statement © 2016 Microsoft. Redirection Of Additional Supported Devices Is Disabled By Policy Windows 2008 R2 We leave this open to interpretation, but generally speaking your game should be identical to the game you submitted.
Ludum Dare 34 Coming December 11th-14th Weekend October Challenge ends Make a game - Take it to Market - Earn $1 The Jam ends in Solo and Teams, relaxed, 72 hours. The Windows Time service on a domain controller can be configured as either a reliable or an unreliable time source. At the command prompt, type w32tm /resync, and then press ENTER. Check This Out Submit here!
Join the community of 500,000 technology professionals and ask your questions. Vincent Wang TechNet Community SupportMarked as answer by Leo HuangMicrosoft contingent staff, Moderator Tuesday, September 18, 2012 2:47 AM Wednesday, September 05, 2012 8:41 AM Reply | Quote Moderator Use the solution in the article linked above; however, checking the other potentialities may also be a good idea if the disk hasn't been checked in a while. Microsoft Customer Support Microsoft Community Forums Windows Client Sign in United States (English) Brasil (Português)Česká republika (Čeština)Deutschland (Deutsch)España (Español)France (Français)Indonesia (Bahasa)Italia (Italiano)România (Română)Türkiye (Türkçe)Россия (Русский)ישראל (עברית)المملكة العربية السعودية (العربية)ไทย (ไทย)대한민국 (한국어)中华人民共和国
CAN I ENTER BOTH EVENTS?: You should pick 1 event, whichever you think it'll do better in. On the Edit menu, click Modify. 6. You signed out in another tab or window. Change the settings in Group Policy If the redirection of supported Plug and Play devices has been disabled by using Group Policy, change the Group Policy that is being applied to
Yes No Do you like the page design? It happens. To perform this procedure, you must have membership in the local Administrators group, or you must have been delegated the appropriate authority. If the previous steps do not resolve the issue, verify network connectivity to the time source, and then check the time source for malfunctions.
Thanks for fixing this. Your instructions worked perfectly. Click the Start, input cmd in the search bar. 2. Click Start, input regedit, press Enter 2. | s3://commoncrawl/crawl-data/CC-MAIN-2018-22/segments/1526794867841.63/warc/CC-MAIN-20180526170654-20180526190654-00003.warc.gz | CC-MAIN-2018-22 | 5,874 | 14 |
https://bitcoin.stackexchange.com/questions/105456/blockchain-com-wallet-1178-transaction-with-low-fee-10-satoshi-how-fix-un | code | I have a blockchain.com wallet.
yesterday i did a big mistake :
I customized transaction fee and set it to 10 satoshi.
Here is the tx link of that transaction.
Now after 1 day it has n't confirm.
I would consider use of blockchain.com wallet also a mistake but that's just my opinion.
Tx shared in the question:
It's effective fee rate right now is 16 sat/vByte because a child transaction associated with it has used 99 sat/vByte in fc254...fd22c
Just read about 30-40% hashrate going offline, so this transaction can take few more days to get confirmed: https://twitter.com/Bitcoin_Vietnam/status/1383452911632412684
If the transaction is really urgent, maybe you can try CPFP with the transaction
Did i lose my bitcoin?
How many days should i wait for confirm?
It's difficult to predict this because transactions are prioritized by miners based on fee rate. You can check the visual representation of it here by searching for your transaction: https://mempool.observer
Does it back to my wallet if it fail for confirmation?
It will remain in the mempool of most of the full nodes until it's confirmed considering the fee rate.
is there a way to change it's fee?
I think you already tried CPFP with the child transaction:
You can use this calculator for CPFP in future: https://cpfp.djbooth007.com/ however it only helps if the child transaction is RBF enabled.
To learn more about CPFP: https://bitcoinops.org/en/topics/cpfp/
Open source bitcoin wallets that support RBF, segwit which can be used in future for managing your transactions in a better way and pay less fees: | s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947473518.6/warc/CC-MAIN-20240221134259-20240221164259-00290.warc.gz | CC-MAIN-2024-10 | 1,575 | 20 |
https://computation.curtin.edu.au/research/research-highlights/classifying-sleep-episodes-recovery-stress-extreme-work-environments/ | code | Classifying Sleep Episodes, Recovery and Stress in Extreme Work Environments
Team: Michael David Wilson, Alex Boeing, Belinda Cham, Karina Jorritsma, and Mark Griffin.
CIC specialists: Dan Marrable
For teams working in safety-critical work environments (e.g., military, health care, and space operations), it is imperative that physiological and psychological measurements do not disrupt operators during field operations. In industrial settings, there is a growing interest in using wearable technologies to measure physiological states and psychological states. A collaborative project between the Future of Work Institute (FOWI) and Curtin Institute of Computation (CIC) has investigated how heart rate sensors could be used for sleep detection in the context of operational naval teams. While sleep detection isn’t a new problem, existing ambulatory methods (e.g., motion sensors) can misclassify passive activities as sleep (e.g., watching TV). Furthermore, unlike motion sensors, heart rate sensors offers the promise of also providing information about stress and recovery (not just sleep status).
In a longitudinal field study, the data from ECG sensors were linked with daily diary observations made by participants in order to perform ‘activity modelling’ — the process of classifying activities using passive sensors. “If we are able to reliably detect when sleep is occurring with non-invasive sensors — we can then send this data to other bio-mathematical models in order to predict mental and physical fatigue, and make decisions around rostering. Long term, we would be hoping to do this on the fly” Michael Wilson (FOWI) explained.
In this project, a series of exploratory analyses were conducted in order to identify the feasibility of using machine learning to classify activities as sleep or wake using heart rate data alone. Early results show that using a combination of heart rate and heart rate variability it was possible classify sleep with an average accuracy of 86.9%, with the lowest accuracy being 79.9% and the highest being 89.3% when the model was tuned for individual participants.
An example of the sleep prediction model compared to the sleep diary of one of the study participants.
In future research, the team is hoping to also examine how to characterise stress, recovery, and sleep quality from the heart rate sensors. If possible, this would open a new avenue for reliable non-invasive estimates of psychological endurance, recovery and mental fatigue over operations without the need for invasive assessments. Importantly, monitoring of stress could be performed continually through work shifts. While the work here is preliminary, an end goal would be to examine how the information from these predictions could be embedded with system platforms to inform decision-making processes and improve the endurance of the workforce.
An example of very early work using machine learning to predict stress and recovery patterns from heart rate data when compared to the proprietary software predicted heart rate. | s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662531762.30/warc/CC-MAIN-20220520061824-20220520091824-00280.warc.gz | CC-MAIN-2022-21 | 3,059 | 9 |
https://www.princexml.com/forum/topic/1327/timeout-options-for-fetching-remote-assets | code | Timeout options for fetching remote assets
I am in process of changing data centers and I ran into a situation where prince hangs while trying to download images from a remote server. Now, the underlying problem was network related and has been fixed, however, I was surprised to see that prince does not eventually timeout. In my environment, this is a huge problem since I run rails / mongrels which are single threaded. So a few hung mongrels can really affect the application down.
I vaguely recall that prince uses libcurl. Would it be possible to expose the --connect-timeout and --max-time options on the prince command line?
I tried attaching the sample html and strace output to this post, but the forum rejects my upload with "potential attack vector". If needed, I can email you these files instead.
p.s. These tests were performed with Prince 6.0 rev 7 but I did not see anything related in the release notes of the newer versions.
Good idea, we'll investigate timeout options for the next release.
We have now released Prince 8.0 beta, which includes a --http-timeout option.
Is there any option for a general timeout, not just the http? We have a situation we haven't been able to resolve yet and are having to manually kill prince processes daily.
It is trying to request images from a completely different server.
When the images are eliminated it finishes fine.
When NOT in debug mode it finishes fine, images and all.
When in debug mode and locked up, no other web requests from the same user will respond.
By debug mode, do you mean running Prince with the --debug option, or is the web server in debug mode? When Prince fails to complete, what as the last messages it leaves in the log file?
I meant prince in debug mode (--debug). I played with it some more yesterday, and I am convinced that it will render fine with only one image from the remote source (amazon s3). As soon as you add another it does not render. I am guessing adding another image from a different source might be ok.
The last line in the log before killing the pid is the first image loading.
After killing the pid the log reports all images loaded and ends there. I have tried different image formats and sizes to no avail.
We have upgraded the php wrapper with a method to kill the hung process after a certain amount of time. We also closed the php session before handoff to prince in order to make certain the user could navigate to a new page if prince became locked up, so we are in a better situation for now, but a timeout option could be useful in future versions.
Again, it does render fine when not in --debug mode.
Since the only difference when --debug is enabled is that Prince generates a lot more log messages, I would suspect that it is causing some kind of deadlock situation with the wrapper waiting for Prince to finish and Prince waiting for the wrapper to read the messages, thus hanging indefinitely. Which convert method are you calling?
We are using
It appears that there is a bug in Prince where the --debug option is overriding the --silent option, causing lots of log messages to be printed to the standard error stream and causing a deadlock in the PHP wrapper. We will change Prince so that the debug messages only go to the log file specified with setLog(), and this should fix the deadlock. Thanks for letting us know about this issue!
We have fixed the --debug deadlock issue in Prince 8.1 rev 4, available for download now. Thanks again for letting us know. | s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510387.77/warc/CC-MAIN-20230928095004-20230928125004-00529.warc.gz | CC-MAIN-2023-40 | 3,483 | 22 |
http://realink.org/solved-weird/solved-weird-wireless-problem.html | code | > Solved Weird
> Solved: Weird Wireless Problem
Solved: Weird Wireless Problem
Advertisements do not imply our endorsement of that product or service. ajkane, Jan 22, 2013 #3 managed Allan Joined: May 24, 2003 Messages: 7,526 Thanks, I like your signature too ! All Rights Reserved Tom's Hardware Guide ™ Ad choices Articles & News Forum Graphics & Displays CPU Components Motherboards Games Storage Overclocking Tutorials All categories Chart For IT Pros Get Viola! #3 DaisFlaque, Jul 11, 2013 DaisFlaque Well-Known Member 163 Jan 20, 2012 1,098 347 163 Male QualIT Computers LLC. http://realink.org/solved-weird/solved-weird-wireless-connection-problem.html
solved Weird H110i fan problem, anybody know whats going on? No, create an account now. This is why when a DNS server goes down, your browser will work on some computers but not others, or with some sites but not others.Torrents are done directly via IP Thanks, I hadn't thought of that EDIT I checked the BIOS settings, but there was nothing.
Can't find your answer ? The IPROCOMM does work reliably with ndiswrapper and no encryption. I was looking at the kernel 184.108.40.206 config file, and there's a new option that enables powersaving by default: CONFIG_CFG80211_DEFAULT_PS=y Maybe if I disable that, it will fix my problem? It's not often enough to be a huge problem but it's often enough to be annoying.
And its a really retarded solution. Head Tech. owner a Sector 7 Slums http://www.pc2yew.zohosites.com (Solution)>>>> Settings > Wireless and network (more settings) > mobile networks > connections optimizer. ajkane, Jan 23, 2013 #9 managed Allan Joined: May 24, 2003 Messages: 7,526 I was thinking you might be able to find out if your friends need 5GHz to pick up Related Resources Weard problem with Linksys WRT54GL wifi-router solved Extremely weird mouse problem solved Weird keyboard problem solved Weird Rust Problem solved Weird Brand New SONY External Hard Disk Problem!
Do you have a separate router or do you have an all in one cable modem/router? Check the bios, might be an option to toggle the device to always on. If it isn't, sorry!)thanks! 6 answers Last reply Sep 12, 2014 Best Answer Sep 12, 2014 More about weird wifi problems case blocking connection ronintexasSep 10, 2014, 5:24 AM A couple http://www.tomshardware.com/answers/id-2779793/weird-wifi-connection-problem.html BTW, the broadcom wl driver install blacklists b43* modules.
netcfg rt2500usb. [SOLVED] Ok so I'm at a loss on this one. Check the bios, might be an option to toggle the device to always on. Otherwise install DD-WRT on it (if it's supported), or replace it.If it's your ISP's DNS which is flaky, try setting the DNS servers in your router to 220.127.116.11 and 18.104.22.168 - There are a few different versions of the 4313GN card, some with Bluetooth, but they are all just 2.4GHz for wireless.
You need a patch http://bugs.gentoo.org/280057 Direct link to the patch http://bugs.gentoo.org/attachment.cg...36&action=view 1 members found this post helpful. I just turned my computer and pointed the antennas at the source. Notices Welcome to LinuxQuestions.org, a friendly and active Linux Community. If it's your router, then hopefully a firmware update fixes the issue.
Stay logged in Sign up now! click site Cookiegal replied Mar 7, 2017 at 8:52 AM how to uninstall ubuntu saikee replied Mar 7, 2017 at 8:49 AM What's for Dinner...... so now i have the sta driver installed twice: once for the old .29 kernel, and once for the new one. i checked: CONFIG_CFG80211_DEFAULT_PS=y CONFIG_CFG80211_DEFAULT_PS_VALUE=1 doomey View Public Profile View LQ Blog View Review Entries View HCL Entries Find More Posts by doomey 01-11-2010, 11:44 PM #11 piratesmack Member
If you'd like to contribute content, let us know. RSS ALL ARTICLES FEATURES ONLY TRIVIA Search The How-To Geek Forums Have Migrated to Discourse How-To Geek Forums / Build Your Own PC (Solved) - Weird PCI wireless card problem Articles & News Forum Graphics & Displays CPU Components Motherboards Games Storage Overclocking Tutorials All categories Chart For IT Pros Get IT Center Brands Tutorials Other sites Tom's Guide Tom's news Lesson 1: The "local choice" message can arise from a trivially misconfigured client, it's not necessarily a symptom of all the scary stuff that's out there.
I'll just call up the technician to get it replaced or something. And looked for a way to stop/disable it... Same thing happens if I boot into Slackware, reboot, and boot into Windows. (But I can reboot in Windows and reconnect just fine) My wireless card uses the broadcom wl driver,
Style Default Style Contact Us Help Home Top RSS Terms and Rules Copyright © TechGuy, Inc.
No SLI. When I boot my computer my wireless works fantastic. ajkane, Jan 24, 2013 #15 Sponsor This thread has been Locked and is not open to further replies. Topics: Active | Unanswered Index »Networking, Server, and Protection »Weird wireless problem.
Contact Us - Advertising Info - Rules - LQ Merchandise - Donations - Contributing Member - LQ Sitemap - Main Menu Linux Forum Android Forum Chrome OS Forum Search LQ If so then it could be showing the wrong details in Device Manager. desks, walls, floors, etc)? More about the author They hope these examples will help you to get a better understanding of the Linux system and that you feel encouraged to try out things on your own.
Can power supply be an issue in this? Code: zcat /proc/config.gz | grep CONFIG_CFG80211_DEFAULT_PS Last edited by piratesmack; 01-10-2010 at 09:05 AM. The only thing I haven't done is an OS re-install, which it needs badly, but frankly I don't have time between my large amount of school work for my IB Diploma Unfortunately, it's a modem/router thing and I don't have a separate one. | s3://commoncrawl/crawl-data/CC-MAIN-2018-05/segments/1516084890795.64/warc/CC-MAIN-20180121155718-20180121175718-00489.warc.gz | CC-MAIN-2018-05 | 5,771 | 17 |
https://communicationnation.blogspot.com/2008/12/visual-thinking.html?showComment=1228246980000 | code | Keep in touch! Sign up to get updates and occasional emails from me.
Dave Gray rockstar !!
Cool Dave. Thanks for using the little video we created. We are really excited about the launching of VizThink Salt Lake City. Here is the link to more information about the launch:http://coworkutah.com/?p=487Any time you are in Utah, please let me know. We would love to show you around! -- Jack Hadley
Have you ever considered what would be the connection between visual thinking as it has been presented in this workshop and theater?? or computer games or entertainment indeed??
Great question. In fact, just this week I worked with a group of students at the Ontario College of Art and Design. They were in a class called "think tank" and were looking at various future scenarios. I had them act out the scenarios in a short skit. I see this as a way to rapidly prototype their ideas.
hmm..you are professional.. :Dnice post...you have nice blog..nice to meet you..have a nice day.. :D
Post a Comment | s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947475311.93/warc/CC-MAIN-20240301125520-20240301155520-00750.warc.gz | CC-MAIN-2024-10 | 995 | 7 |
https://braingenie.ck12.org/skills/103305/practice | code | There are 2 identical dice.
Each face of the dice has one of the integers
1 to 6
(all 6 integers are used by each of the dice) . In how many different
sum of the upper faces of the cubes be
an even number? | s3://commoncrawl/crawl-data/CC-MAIN-2019-35/segments/1566027313889.29/warc/CC-MAIN-20190818124516-20190818150516-00497.warc.gz | CC-MAIN-2019-35 | 205 | 6 |
http://www.visualwebgui.com/Developers/Forums/tabid/364/forumid/29/postid/55169/scope/posts/Default.aspx | code | Maybe this code sample here will help. You should pay attention to the notes in the article, as it is written for a very early version of 6.4 so it is not for certain that it will work directly for current version. Starting from scratch is probably your best option. The article should explain what needs to be done and you can look at the modified changes to take a look how it should be done.
Hope this helps, | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368708789647/warc/CC-MAIN-20130516125309-00073-ip-10-60-113-184.ec2.internal.warc.gz | CC-MAIN-2013-20 | 411 | 2 |
https://saltcityvibes.com.ng/2017/10/31/rapkid9ja-python-dance-love-prod-davebeatz/ | code | For Song Uploads/Adverts , Call 07063025676
Rapkid9ja – Python Dance Love
Umuahia New Skool English and Pidgin Rapper Rapkid9ja Money For The Boiz Crooner Celebrates His Birthday Today, November first 2017. He Decided To Throw Out A New Hot Single Titled Python Dance Love. Produced By Ace Producer DaveBeatz.!!!!!
Follow Up On IG @Rapkid9ja
Be the first to stream and download it beneath and share! | s3://commoncrawl/crawl-data/CC-MAIN-2018-34/segments/1534221214538.44/warc/CC-MAIN-20180819012213-20180819032213-00166.warc.gz | CC-MAIN-2018-34 | 401 | 5 |
http://gornostay.com/forums/topic/buy-topamax-online-no-prescription-united-kingdom-topamax-habit/ | code | - Эта тема пуста.
16.10.2021 в 02:03 #63256vikaГость
Buy Topamax online no prescription United Kingdom, Topamax habit forming
Throughout the long years of operation our company has become synonymous to quality.
The best pharmacists of the country worked together!
Random Internet Quotes:
Visit programme website. Topamax work up norma amps proviron clomid nolva hcg and health conditions published in salisbury, don’t share your pet. Ultimately the internet pharmacies online canadian pharmacy at alnylam pharmaceuticals being shipped separately from the official journal to the speed of work more deeply considered these approaches schip combination programs. The higher priority groups. Mr john mack,ms letizia affinitono preview available at 4 and it works overall rating: greece for health system. Uses this follistim comes in 2019-02-25 00:00:00 starting in cartridges of orders but under the dallas baby camp, good idea to notify the. Didn’t get a cobalamin approval that we strive to even in pharmacy has a message board. Of additional items inside your home could result in which are very rampant with time, i can you can mail you under the scope of pediatric surgery were hispanic. Penn found a 180-day administrative exclusivity period of buying a … | s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764499919.70/warc/CC-MAIN-20230201081311-20230201111311-00603.warc.gz | CC-MAIN-2023-06 | 1,283 | 7 |
https://hallvors.wordpress.com/2004/05/15/when-following-the-specification-breaks-pages/ | code | In an ideal world, Opera would "just work" with any page out there.
Welcome to the reality and the World Wild Web.
I was recently asked why a certain product's website didn't appear properly: several icons were missing. These icons were essential for using the page. Not a good situation for someone who prefers using Opera but needs that page to work.
I was sent a code snippet which showed that the site was formatted with a huge number of nested tables. The missing icon was in a table inside a table cell inside God knows how many other nested tables. The innermost table was coded to have a width of 1% which becomes a fairly small value considering that it is inside a cell with a width set to 3%. I'm not sure how wide your screen is but at least on my screen 1% of 3% of the width leaves no space for a button graphic, which is the likely reason why Opera did not show it. (Doing the maths: the first cell should on my 1024px wide screen have a width of 3% or 30px if Opera displays it in full screen with not hotlist, the inner table should thus have a width of 1% of 30px, in other words 0.3px… As pixels are the smallest units on computer screens, anything less than 1px can not be displayed at all. )
By not showing the icon, Opera is following the instructions in the code. Perhaps IE contains some extra routines to catch and ignore impossibly small cell widths. The page wasn't technically violating the standard. Nevertheless, it is a situation where we can only show the page as the webmaster intended by ignoring what the webmaster actually tells us to do.
Another issue is the Opodo-problem I wrote about in this article:
The ECMAScript standard is absolutely clear that selecting something that does not exist should cause an error and stop the script. Following the standard broke Opodo.
This is not the only reason why some pages do not work with Opera – the other big reason is browser detection. But this reason is what makes it so hard to be compatible with all pages. First you implement the standards as well as possible (in itself a big job) and then you will have to discover, analyse and implement all the little details in general use that are actually standards violations or illogical coding mistakes tolerated by the other browsers. | s3://commoncrawl/crawl-data/CC-MAIN-2018-13/segments/1521257647584.56/warc/CC-MAIN-20180321063114-20180321083114-00687.warc.gz | CC-MAIN-2018-13 | 2,270 | 8 |
http://man.netbsd.org/NetBSD-1.5/pkg_delete.1 | code | - NetBSD Manual Pages
pkg_delete(1) NetBSD Reference Manual pkg_delete(1)
Powered by man-cgi (2021-06-01).
Maintained for NetBSD
by Kimmo Suominen.
Based on man-cgi by Panagiotis Christias.
pkg_delete - a utility for deleting previously installed software package
pkg_delete [-vDdnFfOrR] [-p prefix] pkg-name ...
The pkg_delete command is used to delete packages that have been previ-
ously installed with the pkg_add(1) command.
Since the pkg_delete command may execute scripts or programs provided by
a package file, your system may be susceptible to ``trojan horses'' or
other subtle attacks from miscreants who create dangerous package files.
You are advised to verify the competence and identity of those who pro-
vide installable package files. For extra protection, examine all the
package control files in the package record directory ( /var/db/pkg/<pkg-
name>/ ). Pay particular attention to any +INSTALL, +DEINSTALL, +REQUIRE
or +MTREE_DIRS files, and inspect the +CONTENTS file for @cwd, @mode
(check for setuid), @dirrm, @exec, and @unexec directives, and/or use the
pkg_info(1) command to examine the installed package control files.
The following command line options are supported:
The named packages are deinstalled, wildcards can be used, see
pkg_info(1). If no version is given, the one currently installed
will be removed. If the -F flag is given, one or more (absolute)
filenames may be specified and the Package Database will be con-
sulted for the package to which the given file belongs. These
packages are then deinstalled.
-v Turn on verbose output.
-D If a deinstallation script exists for a given package, do not ex-
-n Don't actually deinstall a package, just report the steps that
would be taken if it were.
-O Only delete the package's entries from the package database, do
not touch the package or it's files itself.
Set prefix as the directory in which to delete files from any in-
stalled packages which do not explicitly set theirs. For most
packages, the prefix will be set automatically to the installed
location by pkg_add(1).
-r Pkg_delete first builds a list of all packages that require (di-
rectly and indirectly) the one being deleted. It then deletes
these packages using pkg_delete with the given options before
deleting the user specified package.
-R Like the -r option, this does a recursive delete. The -R option
deletes the given package and any packages required by it, unless
some other package still needs them. This can be used to delete a
package and all the packages it needs.
-d Remove empty directories created by file cleanup. By default,
only files/directories explicitly listed in a package's contents
(either as normal files/directories or with the @dirrm directive)
will be removed at deinstallation time. This option tells
pkg_delete to also remove any directories that were emptied as a
result of removing the package.
-F Any pkg-name given will be interpreted as pathname which is sub-
sequently transformed in a (real) package name via the Package
Database. That way, packges can be deleted by giving a filename
instead of the package-name.
-f Force removal of the package, even if a dependency is recorded or
the deinstall or require script fails.
pkg_delete does pretty much what it says. It examines installed package
records in /var/db/pkg/<pkg-name>, deletes the package contents, and fi-
nally removes the package records.
If a package is required by other installed packages, pkg_delete will
list those dependent packages and refuse to delete the package (unless
the -f option is given).
If a filename is given instead of a package name, the package of which
the given file belongs to can be deleted if the -F Flag is given. The
filename needs to be absolute, see the output produced by the pkg_info
If the package contains a require file (see pkg_create(1)), then this is
executed first as
require <pkg-name> DEINSTALL
(where pkg-name is the name of the package in question and DEINSTALL is a
keyword denoting that this is a deinstallation) to see whether or not de-
installation should continue. A non-zero exit status means no, unless
the -f option is specified.
If a deinstall script exists for the package, it is executed before and
after any files are removed. It is this script's responsibility to clean
up any additional messy details around the package's installation, since
all pkg_delete knows how to do is delete the files created in the origi-
nal distribution. The deinstall script is called as:
deinstall <pkg-name> DEINSTALL
before deleting all files and as:
deinstall <pkg-name> POST-DEINSTALL
after deleting them. Passing the keywords DEINSTALL and POST-DEINSTALL
lets you potentially write only one program/script that handles all as-
pects of installation and deletion.
All scripts are called with the environment variable PKG_PREFIX set to
the installation prefix (see the -p option above). This allows a package
author to write a script that reliably performs some action on the direc-
tory where the package is installed, even if the user might have changed
it by specifying the -p option when running pkg_delete or pkg_add.
pkg_add(1), pkg_admin(1), pkg_create(1), pkg_info(1), mktemp(3),
most of the work
refined it for NetBSD
NetBSD wildcard dependency processing, pkgdb, recursive "down"
NetBSD 1.5 March 8rd, 1999 3 | s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474533.12/warc/CC-MAIN-20240224112548-20240224142548-00437.warc.gz | CC-MAIN-2024-10 | 5,315 | 94 |
https://adndevblog.typepad.com/manufacturing/2014/10/vault-getfileassociationlitesbyids-associationalgorithm-parameter.html | code | By Wayne Brill
GetFileAssociationLitesByIds is now the recommended API function for getting file relationships. This method is intended to replace all the other get-file-association methods in the document service. There is a plan to remove the older methods in a future release, leaving only GetFileAssociationLitesByIds (“lite” will probably be removed from the name).
The associationAlgorithm parameter essentially allows this one method to get the same relationships that could be obtained from any of the other methods. The API help topics describing the associationAlgorithm parameter will be improved too.
To better understand the concepts of the current release see the documentation for the older methods. (The documentation for GetFileAssociationLitesByIds will be improved so this extra lookup is unnecessary in a future release of the SDK).
Here is an guide for each FileAssocAlg enum. Only the first two are available in base Vault.
Actual - Gets the same relationships that GetFileAssociationsByIds would get.
LatestTip – Gets the same relationships that GetLatestFileAssociationsByMasterIds would get with releaseBiased=false. But file iteration IDs are passed – not file master IDs.
LatestConsumable - Gets the same relationships that GetLatestFileAssociationsByMasterIds would get with releaseBiased=true. But file iteration IDs are passed – not file master IDs.
RevisionConsumable - gets the same relationships that GetRevisionFileAssociationsByIds would get with releaseBiased=true.
RevisionTip - Gets the same relationships that GetRevisionFileAssociationsByIds would get with releaseBiased=false.
RevisionDate - Gets the same relationships that GetRevisionFileAssociationsByIds2 would get with dateBiased=true and releaseBiased=false. Essentially, the idea is to get the version of the revision that the end-user most likely had on disk when they checked-in the file. This is only used in rare cases in certain workflows. It should probably not be used for visualizations. Unlike the GetRevisionFileAssociationsByIds2 method, you can get parents when using this algorithm with the GetFileAssociationLitesByIds method. | s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446708010.98/warc/CC-MAIN-20221126144448-20221126174448-00752.warc.gz | CC-MAIN-2022-49 | 2,148 | 11 |
http://www.adult-ed.net/school/id/8664/northwest-indian-college | code | 2522 Kwina Rd, Bellingham, WA, 98226Phone
Total Institution Enrollment
Total Undergraduate Enrollment
Tribal Colleges and Universities: These colleges are, with few exceptions, tribally controlled and located on reservations. They are all members of the American Indian Higher Education Consortium.
One but less than two years, Associate's, Two but less than 4 years | s3://commoncrawl/crawl-data/CC-MAIN-2017-22/segments/1495463607731.0/warc/CC-MAIN-20170524020456-20170524040456-00628.warc.gz | CC-MAIN-2017-22 | 366 | 5 |
http://logs.ryanbigg.com/RubyOnRails?date=2018-06-07 | code | #RubyOnRails - 07 June 2018
« Back 1 day Forward 1 day »
[11:23:44] Charliebr73: I am working on a Rails 5, Ruby 2.5 application that uses PostreSQL and Redis, and Redis seems to either struggle or time out when loading large files
[11:46:41] dminuoso: Charliebr73: Are you claiming that redis has some LOADXMLFILE command Im not aware of that is struggling?
[11:50:03] Charliebr73: @diminuoso No. We import xml files to a Rails application. The data is then stored in-memory in Redis. when I try to open that file (and I use the 'monitor' command from Redis CLI to see the process happening), it runs to a certain point and then stops.
[11:51:21] Charliebr73: I have to refresh the page a few times, and sometimes even after that, it does not load the xml content
[12:00:45] dminuoso: "We have a large database..." "Really? How large?" "20,000 rows but it's tweaked so most queries execute in less than 1s"
[12:01:07] dminuoso: ^- transscript of a real conversation Ive once had with someone. I was the second comment.
[12:03:42] tbuehlmann: reminds me of "Big data is like teenage sex: everyone talks about it, nobody really knows how to do it, everyone thinks everyone else is doing it, so everyone claims they are doing it."
[13:04:16] pavelz: hi folks just wonder if anyone seen: SyntaxError: [stdin]:387:28: unexpected = in all .erb files. Happened after upgrade from 4.2 to 5.2
[13:31:55] leequarella: Hi folks, I have a question about ajax:success. My controller has `render js: stuff`. I'd like to hijack ajax:success to stop that from firing under certain conditions.
[13:35:02] dminuoso: leequarella: Just write out an explicit document.addEventListener('turbolinks:load', ...) and fetch the page yourself.
[13:35:53] dminuoso: Most of the rails js/ajax logic is antiquated, weird and depends on a a bunch of undocumented cruft.
[15:31:10] tycoon177: is it bad practice to have a non db-based model? Like, I have some static data that I'd like a model for because it's used across several models and didn't know if it'd be best to just make a PORO or if there's some other way to do this
[15:50:33] NL3limin4t0r: It's not necessary bad to have PORO objects for static data. There are a few things to consider imo. 1) Even static data can be put in the DB to still make use of all the ActiveRecord::Base helpers, if you wan't to make sure nothing overrides the you can set only SELECT permissions on DB level. 2) If you're using your own model it's generaly better to have a PORO than extending from ActiveRecord::Base
[15:50:36] NL3limin4t0r: and trying to spoof all the build in methods, needed to get the whole thing working.
[15:56:09] NL3limin4t0r: You don't really find to much about the best practices of having non db-based models, but that's what I experienced thus far.
[16:33:46] tycoon177: NL3limin4t0r: thanks for the input. I ended up just writing a standard class that doesn't inherit from activerecord::base and ended up just writing a few helper methods to get the right instance. In the end, it creates a maximum of 3 (at this time) objects in memory with 2 attributes each. It just started to get a bit messy with magic numbers flying around due to some legacy code
[20:14:36] spohnz: anyone have a minute to read a stupid question my this stupid man? I may be complicating this too much
[20:15:56] spohnz: I have an index page that shows a mgmt_servers table one of the fields in this table is an int domain_id plucked from another table.
[20:21:38] conr: Found a Rails 22.214.171.124 project on GitHub that is not active. What's the best way to get the gems upgraded to the latest versions?
[20:21:54] dminuoso: spohnz: There's absolutely no chance anyone could make any sense of anything you just said.
[20:22:31] dminuoso: conr: Open an issue. If its not active.. well - maybe fork it and carry the torch?
[20:22:45] spohnz: ok. I have a table called mgmt_servers. It lists an id that is from another table
[20:23:07] dminuoso: spohnz: can you use a gist to show your code from a) your controller, b) the related model and c) the view
[20:25:49] Terens: their is an existing authorization class and all permissions (400 rows) are loaded at every request. Sure they aren't all needed and I wouldnt develop the system like that , however instead of loading what is needed developer suggested to keep globally loaded these data. Is this a bad idea?
[20:27:18] dminuoso: terens: What server model do you have? multi server? multi process? multi thread?
[20:30:00] dminuoso: conr: It appears to have good to high coverage. I would first try to upgrade rails, see if the test suite passes. If not, fix it.
[20:34:49] dminuoso: terens: caching is not a bad idea, but you need a way to invalidate caches. and cache invalidation is hard.
[20:37:26] spohnz: dminuoso: I don't know, do not see a gem for forms. I am just doing a <% @mgmt_servers.each do |mgmt_server| %> to loop through them
[20:39:32] Terens: This isn't exactly caching. And I believe 400 selects at least for every calls is too much IMO
[22:09:23] fourcolors: Hey, I'm having an issue setting window.ENV to Rails.env when I try to do that in my layout file I get an error that says "Rails is not defined" My layout file is in slim
[22:24:11] Radar: I guess on this line: <td><%= mgmt_server.domain_id %></td> is where you want to show the domain name?
[22:24:45] Radar: spohnz: Also I should mention that gist lets you add multiple files to the same gist in a neater way than what you've done: https://github.com/radar/guides/blob/master/using-gist.markdown
[22:28:45] Radar: spohnz: if that's the case, then mgmt_server.domain.name will let you fetch the name through an association | s3://commoncrawl/crawl-data/CC-MAIN-2019-35/segments/1566027318894.83/warc/CC-MAIN-20190823150804-20190823172804-00491.warc.gz | CC-MAIN-2019-35 | 5,676 | 35 |
http://blogs.msdn.com/b/vbteam/archive/2006/10/10/check-out-_2200_live-from-redmond-series-_2300_3_2200_-from-the-.net-fx-product-teams.aspx?Redirected=true | code | A group blog from members of the VB team
The .NET Framework teams are providing several Live Meeting presentations spanning application technologies like Smart Clients, Web 2.0 (AJAX) and Mobile. Check out SimonMu's blog for more information:http://blogs.msdn.com/simonmu/archive/2006/10/09/The-next-series-of-team-member-Live-From-Redmond-webcasts.aspx
Simon also pointed me to a great video archive:http://www.asp.net/learn/videos/default.aspx?tabid=63#ajax
If you're a VB developer and you're interested in these modern .NET app types, I think you'll want to check this out. Enjoy!
Paul YuknewiczVisual Basic Team | s3://commoncrawl/crawl-data/CC-MAIN-2015-48/segments/1448398538144.64/warc/CC-MAIN-20151124205538-00011-ip-10-71-132-137.ec2.internal.warc.gz | CC-MAIN-2015-48 | 616 | 5 |
http://www.conceptart.org/forums/printthread.php?t=74657&pp=30&page=1 | code | how the soft passes made?
How r the passes so soft in profesional paintings?For ex. on a face painting, from the edges to center of cheeks-from dark to light-there are soft passes but 3 or more different colors..What is the secret?Brushes?Smudge?Blur?Opacity value or edge value of brushes?..........
Made with "blur tool".Not enough realistic effect u see...
I didn't gave it up and tried different smudges, sponge, blur, duplicate layer etc..Then i finished as that:
This is nice :) i think..But i do not know if i can do this on bigger works, or everytime..I want to learn the exactly right technique of this.Soft passes after first coloring.Aspecially on human faces.Can one give a tutorial that showes like "we give red color with brush opacity %70 ,then orange at it and yellow last..Then we use smudge as..." Something like that i mean.Or a video tutorial.
Do i want too much? | s3://commoncrawl/crawl-data/CC-MAIN-2015-48/segments/1448398461529.84/warc/CC-MAIN-20151124205421-00041-ip-10-71-132-137.ec2.internal.warc.gz | CC-MAIN-2015-48 | 883 | 6 |
https://insights.collegeconfidential.com/should-prospective-business-major-take-bio-subject-test | code | Should Prospective Business Major Take Bio Subject Test?
Question: I'm planning on studying business. I took both SAT II's for Spanish and got an 800 on the two. I took Biology Honors and with some prep I feel pretty confident. Should I take the SAT II Biology test? Is it worth my time and money or do business schools don't really care about science standardized testing? | s3://commoncrawl/crawl-data/CC-MAIN-2021-10/segments/1614178350846.9/warc/CC-MAIN-20210225065836-20210225095836-00568.warc.gz | CC-MAIN-2021-10 | 373 | 2 |
https://developer.jboss.org/thread/164370 | code | I used the latest version of Drools-govnor and jBPM. I am able to deploy the evaluation process and then I add the "HelloProcess" from Kris's example. It worked for me. However, then I created my own process and added it to the location "the jbpm-installer/sample/evaluation/src/main/resources". (I didn't change the configuration file.) I also added the jar file to the application server. Then I restarted H2 and jboss server. No process definition shows up in my jbpm console. Even the evaluation and hello processes disappeared!
Then I remove my own process and restart jBoss. The evaluation and hello processes came back!
I followed the naming convention in the document strictly. Just wondering if anyone encountered the same problem? It's just performing unstable. Sometimes my process definition can show up in the console but sometimes it doesn't. I cannot figure it out. | s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267156901.47/warc/CC-MAIN-20180921072647-20180921093047-00364.warc.gz | CC-MAIN-2018-39 | 880 | 3 |
https://blendermarket.com/products/gangly | code | Hello. I have made this character according to my own concept. I took the main idea from the movie "Avatar" and added the image of an Indian from the movie "Apocalypse". It seems to have turned out well.
This project can be used as a teaching material. That is, you can look at the settings for the material, nodes, look at the scene and render settings.
But also no one forbids hanging the rig to make animation and integrate it into your own projects.
I think it will be useful.
|Published||4 months ago|
|Misc Data||UV's Unwrapped, Normal Mapped, Textured|
Have questions before purchasing?
Contact the Creator with your questions right now.Login to Message | s3://commoncrawl/crawl-data/CC-MAIN-2021-39/segments/1631780056856.4/warc/CC-MAIN-20210919095911-20210919125911-00025.warc.gz | CC-MAIN-2021-39 | 660 | 8 |
https://www.yaug.org/YAWL_BPMS_Tutorial_18 | code | This is the first of four tutorials on flexibility in YAWL. It gives an overview of the worklet service, exception handling using exlets, and Ripple-Down Rules (RDR).
Hello and welcome to another YAWL tutorial! This is the first of a series of tutorials about flexibility in workflows. There's a saying that states that 95 percent of the discussions are about five percent of the cases in software development. And this is about the same thing for Business Process Automation. So it is important to be flexible on the one hand but not to be forced to specify everything when you first develop a workflow. There are two types of flexibility: in workflows the first one is a flexibility at design time. We have already seen that by the separation of concerns of separating control flow, resources, and data and having a graphical editor, we already get a certain degree of flexibility in workflows. Furthermore, you are able to change a specification in a running system and have the old cases that are already running finish with the old specification and start the new cases with a new specification. So already, we have a certain degree of flexibility. What we will discuss in this and the subsequent tutorials, is an enhanced flexibility, where you also have the possibility of extending the behavior of a workflow specification without changing the specification itself.
The second kind of flexibility is concerned about changing something while a case is running. So this is more a dynamic flexibility. And also here we will have some concepts concerning worklets and exlets in YAWL that will cover this. As already said you cannot think of all possibilities when first designing a workflow specification. So in the first category of flexibility, we have concepts in YAWL like worklets that specify a certain behavior and you are able to invoke those worklets using so-called ripple down rules. Ripple down rules are trees, binary trees with conditions and conclusions that you can use to flexibly extend the behavior of a workflow specification as you find new special cases. These are also called cornerstone cases.
The other thing is that we have the problem that for example exceptions when they occur often imply that you terminate a case. But you want to do something before you terminate a case abnormally. If we would try to implement these with ordinary control flow means, we would have lots of arcs going from certain places to the end of the specification. And this would in the end lead to a graph that is more like spaghetti and is not very clear anymore. And so - for this case - we have the possibility to use exlets and define certain pre- or post-conditions in tasks and then somehow to terminate a case with a certain exception handling and not using these arcs that lead to the end. In the second category for dynamic behavior, we can define external triggers in YAWL and we can modify the behavior of a running case by using these external triggers, write worklets that define new behavior, and add that to the system. And so we obtain a learning workflow management system that incorporates new exceptions as time goes on. Last but not least, it is possible to factor out common behavior in workflow specifications using worklets. This doesn't have to do directly with the topic of flexibility but it is another use of worklets. We have already seen in previous videos that you can have complex tasks with sub workflows inside. The problem of these complex tasks is that they are limited to one specification. If we think of a bigger system with many workflows all around the same topic - let's say we need the possibility to factor out common behavior in sub-workflows - and we cannot do that using complex tasks because complex tasks are only existent in one specification and for this purpose we can use worklets as well with a very simple rule that is always true. And then we can invoke the same workflow specification from different parent specifications.
Okay, this is all for the theoretical introduction. And in the following tutorials we will go into the topics and look at them in the YAWL system. | s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656103646990.40/warc/CC-MAIN-20220630001553-20220630031553-00167.warc.gz | CC-MAIN-2022-27 | 4,134 | 5 |
http://fifalere.tripod.com/school/php/4/putty/maillist.html | code | If you would like to be told when new releases of PuTTY come out, you can subscribe to the PuTTY-announce mailing list.
Please do not send mail to PuTTY-announce! It is not a discussion list. It is not a place to report bugs to. It is a list of people who want to receive one e-mail, from the PuTTY developers, every time there is a new release. All posts from other people, even list members, will be rejected. Bugs and comments should be sent to [email protected].
The mailing list information page is here. | s3://commoncrawl/crawl-data/CC-MAIN-2019-26/segments/1560628000044.37/warc/CC-MAIN-20190626013357-20190626035357-00315.warc.gz | CC-MAIN-2019-26 | 522 | 3 |
https://ez.analog.com/thread/39797-ad9914-bpsk-realization | code | I have question about realization BPSK in AD9914.
This device support mode F=0111, which can form 8 bits phase shift
every cycle (for example, 180 and 0 degrees). But frequency
perform by 24 bits, although I need perform frequency with
32 bit resolution. I found "parallel port streaming enable" bit,
which can allow perform phase and frequency separately in different
cycles and for next cycle assert of the IO_UPDATE pin,
but I need update phase permanently (every cycle) for BPSK.
Do you have other good decision for BPSK?
Can you please help me? | s3://commoncrawl/crawl-data/CC-MAIN-2018-22/segments/1526794864648.30/warc/CC-MAIN-20180522073245-20180522093245-00614.warc.gz | CC-MAIN-2018-22 | 549 | 10 |
https://remotees.com/job/5d76a8502cbc5-software-engineer | code | Thycotic · Aug 31st 2019
Working as Software Engineer at Thycotic means being a part of a highly capable, collaborative and agile developers. Thycotic is creating awesome software that's used by thousands of IT professionals all over the globe.
This can be a remote/telecommute position based out of your home office. Reports to the Software Development Team Lead.
REQUIRED SKILLS AND QUALIFICATIONS
Strong design skills and full software development lifecycle experience required.
Strong understanding of Object-Oriented principles, the .NET Framework, ASP.NET, relational databases, and web application development.
Passionate about writing quality code and constantly honing your development skills.
Ability to quickly read and understand both new and existing code.
Ability to look at the big picture, come up with great new ideas, but also execute those ideas and write the code to make it happen.
Seeking a highly collaborative, flat environment--there's not a lot of hierarchy or red tape here.
Experience with large codebases and unit testing -- mock frameworks, web testing, database testing, etc.
Desire to develop using Test Driven Development.
Comfortable developing using pair programming.
Thycotic is an Equal Opportunity Employer and does not discriminate on the basis of race, ancestry, national origin, color, religion, gender, age, marital status, sexual orientation, disability, or veteran status.
Upon conditional offer of employment, candidates are required to complete a criminal background check and drug screen per Thycotic employment policy. In addition, all publicly posted social media sites may be reviewed. | s3://commoncrawl/crawl-data/CC-MAIN-2019-47/segments/1573496671106.83/warc/CC-MAIN-20191122014756-20191122042756-00017.warc.gz | CC-MAIN-2019-47 | 1,636 | 15 |
https://forums.theregister.co.uk/post/reply/3711223 | code | Re: Any Safari equivalents?
Keychain works quite well for Safari users.
I end up with too many options on my work machine - and crazy situations where I go to open a shell to a remote system.
- It kicks off a browser for authentication
- That requires me to log into a system
- The password for which is handled by a password manager
- The password for the password manager is handled by a different password manager
- Which then has its password saved.
So it all 'just works' but it could trigger an epileptic whilst it cycles through everything it needs to do to let me log in. | s3://commoncrawl/crawl-data/CC-MAIN-2019-51/segments/1575540523790.58/warc/CC-MAIN-20191209201914-20191209225914-00216.warc.gz | CC-MAIN-2019-51 | 579 | 9 |
https://answers.sap.com/questions/5642758/reportsetdatasource.html | code | I've come across some behavior on a project I'm working on that wasn't exactly what I was expecting.
I'm developing this solution on a laptop.
I'm using Visual Studio 2008 and the integrated version of Crystal Reports that comes with it.
I'm also using SQL Server Express (2005).
I have all the latest Windows updates and service packs applied - whatever is current I have.
The scenario is this:
I have a dataset, report and XAML window in my solution.
The report is bound to the dataset.
The XAML window has a Crystal Report Viewer on it.
In code, I create an instance of the dataset and an instance of the report.
I call out to the database, grab the data I need and fill the dataset with that data.
I then call report.setdatasource and pass it the dataset.
Finally, I set the report source of my report viewer to be my report.
The behavior is this:
If the laptop is docked (connected to the network) the whole thing takes maybe 2 seconds.
That's the time measured from clicking the button to launch the report viewer to the completion of the first page rendering.
If the laptop is undocked (not connected to the network) the equivalent operation takes about 15 seconds.
I added some logging code around each of the various method calls and in both scenarios populating the dataset takes under a second. The time delay occurs on the SetDataSource method.
Can anyone tell me why this is happening and how to fix it? | s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296949506.62/warc/CC-MAIN-20230330225648-20230331015648-00415.warc.gz | CC-MAIN-2023-14 | 1,416 | 19 |
http://www.ditii.com/webfinger-google-re-introduces-finger-protocol-your-gmail-address-could-soon-be-your-id/34011/ | code | Google re-introduces finger protocol, dubbed as WebFinger (aka Personal Web Discovery) over HTTP. The idea behind WebFinger’s about making email addresses more valuable, by letting people attach public metadata: public profile data, pointer to identity provider (e.g. OpenID server), a public key, other services used by that email address (e.g. Flickr, Picasa, Smugmug, Twitter, Facebook, and usernames for each) etc. ... but rather than fight about the exact contents of that file, WebFinger is about making that file discoverable at all. The community can explore and innovate within that discovery file later. Google points out that your Gmail address could soon be your ID.
More info: WebFinger | s3://commoncrawl/crawl-data/CC-MAIN-2017-47/segments/1510934809695.97/warc/CC-MAIN-20171125071427-20171125091427-00609.warc.gz | CC-MAIN-2017-47 | 701 | 2 |
https://www.workintech.ca/job-details/4493/senior-software-developer/ | code | Senior Software Developer
- Markham, Ontario
- Flexible, commensurate with experience
- Job Function
- Software Development
- Job Type
- Full time
- Company Size
- Scaling (20-499)
Automotive mobile data and analytics is the core of our business. You take responsibility for what you deliver, more than just following a spec sheet. You’re part of a team that expects technical leadership, code reviews, unit testing and they care deeply about product quality and end user experience. We’ve got problems to solve, and you’re the type of person who is always up for a challenge.
We are a team of 50+ passionate developers who work on AWS based SaaS solutions for the Automotive Industry in North America. We’re disrupting in our space and leading our competitors because our applications are complex, well supported and led by a management team that knows exactly how we are going to WIN. We just need your help getting there.
We get lots of recognition (Deloitte Technology Fast 50 and Fast 500 - AGAIN) and have grown rapidly. We let our developers code in whatever language they want, and they’re encouraged to use their full stack skills to solve problems from end to end. Deployments are used by millions of users every day, generating millions of dollars in revenue with top brand automotive manufacturers (Audi, Nissan, FCA, Toyota, Lexus).
We have a culture of shared ownership that lends well to our fast paced and ever changing atmosphere.
Our teams work primarily in Microsoft technologies (ASP. NET, WebForms/MVC, Web API) but it’s OK if you have a better skill set in something else. We can teach someone a new technology; the hard part is finding the right person who isn’t afraid to take on important work that needs to be done and will FIND ways to succeed at the task.
Delivering reliable software on an agile team that strives for continuous integration, automated testing, and code reviews is the main goal for the team, but they also have fun while doing it.
Here’s how we’ll support you:
- Competitive compensation packages
- Choice of basic or enhanced health benefit plans, dental and vision benefits
- Employee Assistance Program
- Child care vouchers for back up child care
- Free underground parking
- 3 weeks’ paid vacation
- 1 paid annual volunteer day
- Cool company events and team building activities
- Paid training (our teams just finished Angular 2 training)
There’s a traditional list of bullets below if that’s what you want to see. Apply today and see how you can grow, learn and actually look forward to Monday mornings!!
What you do:
Reporting to the Manager, Software Development you will be responsible for:
- Design and implementation of reliable, high performing and usable web applications
- Creation of detailed design documentation and diagrams
- Refactoring and creation of abstractions in order to simplify components and libraries and promote code reuse
- Diligently unit testing and debugging application components as necessary
- Displaying initiative in research, proposal and development of tools, technologies and techniques
- Collaborating and communicating effectively within a multi-disciplinary team
- Analysis of business needs and development of technical solutions
- Applying foresight to look beyond immediate requirements for future extensibility
- Participating in design and code reviews as necessary
- Supporting clients’ evolving needs through ongoing product enhancements and application extensions
What you need:
- Proven experience as a Senior Software Developer with Microsoft .NET technologies including, ASP. NET WebForms/MVC, Web API
- .NET Framework 2.0 - 4.6
- Proficiency with AngularJS 1.5+, JQuery, JSON
- Visual Studio (2015 - 2017)
- MS SQL Server experience 2008 – 2012
- Visual Source Safe
- Experience using GIT
- Team Foundation Server 2010
- Experience developing XML/REST Web Services
This would be nice too:
- Chrystal Reports/Microsoft Report Designer experience an asset
- Previous experience with Classic ASP, VB 6.0, COM & COM+ an asset
- Experience with AngularJS 2.x and TypeScript
- Package management using NPM and NuGet
- Familiarity with automation and build tool like Gulp, Jasmine
- Experience with CSS frameworks like SASS/LESS.
- Familiarity with cross application messaging broker system like NServiceBus, RabbitMQ.
- Working knowledge with IIS 6.0/7.0
- React, Node.JS experience an asset
- Socket I.O. experience an asset | s3://commoncrawl/crawl-data/CC-MAIN-2019-09/segments/1550247513661.77/warc/CC-MAIN-20190222054002-20190222080002-00304.warc.gz | CC-MAIN-2019-09 | 4,452 | 59 |
https://forta.com/2007/10/10/max-europe-coldfusion-bof/ | code | We will be co-hosting a MAX Europe BOF session entitled “ColdFusion In Europe”. Yes, the topic is deliberately vague and open-ended because we’d like a completely open free-form discussion about ColdFusion in Europe – and we want to discuss it all, the good, the bad, and even the ugly. So, if you’ll be joining us in Barcelona next week, and use (or want to use, or don’t want to use, or used to use) ColdFusion, please drop by to share and discuss. I don’t have an exact time yet, but it will be Monday evening. We hope to see you there. | s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506480.7/warc/CC-MAIN-20230923094750-20230923124750-00449.warc.gz | CC-MAIN-2023-40 | 553 | 1 |
http://sourceforge.net/directory/language:shell/language:java/audience:manufacturing/ | code | - OSI-Approved Open Source (13)
- Other License (2)
- Public Domain (1)
- Linux (13)
- Grouping and Descriptive Categories (12)
- Modern (9)
- Windows (8)
- BSD (7)
- Mac (7)
- Other Operating Systems (6)
- Solaris (6)
- Audio & Video
- Business & Enterprise
- Home & Education
- Science & Engineering
- Security & Utilities
- System Administration
Open Source Solid Modeling CAD1,547 weekly downloads
Solución de Gestión Empresarial en Software Libre8 weekly downloads
Real-time data acquisition and visualization software3 weekly downloads
A tool for the development and customization of an information system for traceability and workflow management of virtually any business process or product.1 weekly downloads
Republic enables old-style computer reports (formally known as 'ascii' reports to be parsed and turned into OASIS OpenOffice.org Spreadsheet documents. This data can then more easily analysed by management. Parsing Rules are held in a simple XML format.1 weekly downloads
LibSeris is a set of common code for controlling the Seris class of inexpensive personal robots, also created by this project.1 weekly downloads
idyuts is \"I Dare You to Use This Shell\"; a pre-hibernate approach to replacing an ORM written with jython functors into a pure-Java language command pattern. The \"pipeline codegen artifacts\" are simple IoC templates, and trivial to adapt1 weekly downloads
Email Management System is a Java and XML based high scalable and high performance email system that manages sending, receiving, reporting millions of emails a day.
This project is started to develop an Linux/Unix Desktop application, which will be used as a Mobile Phone File Manager. Application must have ability to copy files from mobile phone and to mobile phone.
Projets-Linux du Groupe des Utilisateurs Linux des Basses-Laurentides du Québec (GuLSE)
TechnoForge aims to be a website operated for the purpose of fostering hardware development and technical documentation creation under Open-Source Initiative -approved licenses or other arrangements relating to hardwware and/or documentation development.
AI simulation of human life and behavior, based on LINUX architecture. | s3://commoncrawl/crawl-data/CC-MAIN-2016-07/segments/1454701159155.63/warc/CC-MAIN-20160205193919-00188-ip-10-236-182-209.ec2.internal.warc.gz | CC-MAIN-2016-07 | 2,180 | 29 |
https://forum.unity.com/threads/new-customisable-capsule-character.1121995/ | code | Hi everybody! We’ve been working on a simple but highly customizable character which we’ve called Capsule Character. The Capsule Character has a fixed skeleton but is completely resizable. It has settings for controlling the movement and jumping of the character. The character is completely rigged using the Animation Rigging package. The physical movement of the character is independent of animation - it does not use root motion - but the character will use the rigging for the legs to match its movement speed. The character uses the Input System package by default and does not have a dependency on any particular camera, though the default does expect a reference to a camera to determine the relative input direction. This means if you wish to use different input for the character (such as click to move or some form of AI) then you are free to do so. Capsule Characters are represented by Scriptable Objects which share a lot of functionality with prefabs (instantiate by dragging into the hierarchy or calling a method using a reference to the asset) but are separate from prefabs so that you are free to use them as part of your own prefabs as you wish. The Capsule Character system can be downloaded as a zipped package here. To install it, follow these steps: Unzip the file in a convenient location. In Unity, open the Package Manager by going to Window > Package Manager. In the top left corner of the Package Manager, click the Plus button dropdown. Select “Add package from disk…” In the file selection dialog, choose the package.json file in the unzipped CapsuleCharacter folder. For more information about the features of the character and how it works see the How To guide. We’d love to hear your feedback: anything you like, don’t like, things you expected that weren’t there and things that you didn’t expect but were glad to see. FAQ If the character is just a bunch of capsules, won’t it look rubbish in my game? The aim for the Capsule Character project is to make something that is very easy to prototype with. We fully expect characters to be removed before a game is released. That said, you are more than welcome to use any or all of the Capsule Character project in a fully released project if you wish. I found a bug, what should I do? If you are unfortunate enough to find a bug, we’d really love to hear about it so we can fix it. Please post a comment here that describes what went wrong, how it went wrong, any errors you got and if possible a video or gif showing the bug. I’d really love for you to include X feature, please can you? The character as it stands is very simple, but flexible. Part of the reason behind its simplicity is to allow this flexibility. As such if your feature request is something like: climbing, swimming, or combat, then it’s unlikely we’ll be able to accommodate that feature. If on the other hand you are looking for a feature that will improve the usability or user experience of the Capsule Character then that is something we can potentially look into. Ummmm... where’s the camera? There is no camera provided by default because the character doesn’t depend on any particular camera movement. Some characters made using this system will not need cameras and forcing those users to work around that is undesirable. That said, we understand that it will be common to want a character and we recommend using a Free Look camera provided by the Cinemachine package. | s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474688.78/warc/CC-MAIN-20240227220707-20240228010707-00207.warc.gz | CC-MAIN-2024-10 | 3,463 | 1 |
https://www.spartan-network.org/about-3 | code | Source Sector and Fuel Contributions
Estimates of source sector and fuel contributions to ambient PM2.5 at SPARTAN sites are provided based on McDuffie et al. (2021). These estimates were produced from chemical transport model simulations (GEOS-Chem) and high-resolution satellite-derived PM2.5 concentration estimates, with SPARTAN data used for evaluation.
Source sector contributions
Source data used to create these plots can be found at the link below, along with a detailed explanation of the fractional contribution data generated for McDuffie et al. 2021.
McDuffie, E., Martin, R., Spadaro, J., Burnett, R., Smith, S., O'Rourke, P., Hammer, M., van Donkelaar, H., Bindle, L., Shah, V., Jaegle, L., Luo, G., Yu, F., Adeniran, J., Lin, J., Brauer, M.: Nature Communications, 12, 3594, 2021 doi: https://doi.org/10.1038/s41467-021-23853-y | s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506559.11/warc/CC-MAIN-20230924023050-20230924053050-00435.warc.gz | CC-MAIN-2023-40 | 843 | 5 |
http://www.tomshardware.com/forum/322289-33-multiple-monitors-questions-6970 | code | The card you are talking about is nearly a decade old and from well before ATI was bought by AMD back in '06... doesn't make sense to hold a grudge that long imo especially if it means avoiding a product that better fits your needs.
Oh no I am not holding a grudge, just wary. Every ATI card I had in the old days had really bad drivers (Rage Pro, 9600 Pro) etc. I need a very stable system. I cannot have BSOD in the middle of working. I need to be sure before I invest in 3 monitors and a 6970 card. That is at least $800.
Eyefinity is a good tech. If it works then I will be a happy camper. | s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500549426639.7/warc/CC-MAIN-20170726222036-20170727002036-00620.warc.gz | CC-MAIN-2017-30 | 593 | 3 |
http://www.go4expert.com/forums/multiple-data-entry-access-post84254/ | code | I have table1 and table2
In table1 I have
in table2 I have
the two tables are related using the stID key
stID is numerical field starting 100 and I have about 200 records in the first table
Now, Single data entry for one person is working fine using a single form
I just type stID and the service type value.
Now what I want is that once I enter the service value for one person let say stID 145 then I also want the service type value to enter for the rest 199 individuals automatically
Is it possible ???
Thanks in advance | s3://commoncrawl/crawl-data/CC-MAIN-2016-30/segments/1469257826908.63/warc/CC-MAIN-20160723071026-00220-ip-10-185-27-174.ec2.internal.warc.gz | CC-MAIN-2016-30 | 524 | 10 |
https://forum.yunohost.org/t/ios-mail-trust-issue/18711 | code | My YunoHost server
Hardware: VPS bought online / Old laptop or computer / Raspberry Pi at home / Internet Cube with VPN / Other ARM board / …
YunoHost version: 22.214.171.124
I have access to my server : Through SSH | through the webadmin | direct access via keyboard / screen | …
Are you in a special context or did you perform some particular tweaking on your YunoHost instance ? : no
If yes, please explain:
Description of my issue
Hello again everyone.
I only have 4 users on my system (5 including me) We all use a mixture of iOS devices, Windows, OSX etc.
ALL of the iOS users called me to say that they suddenly could not get access to their mail using an iOS device. All other devices and mail clients worked fine.
The fix was to delete the account in the iOS device and re-create the account, once that was done everything was OK again. The iOS users had to click ‘Trust’ on the certificate once the account connected.
This has happened twice in about 12 months.
Does anyone know what is happening here and is there a more permanent ‘fix’
Many thanks and have a great weekend
I’m not an iThings user, but in my experience, I face this problem each time the Let’s Encrypt certificate is renewed, it’s not easy to validate the new certificate on iPhone.
Last time, as you, the solution was to delete the mail account on the iPhone and then recreate it in order to validate the new certificate.
Unfortunately I am again confronted with this problem.
This time the certificate was accepted only for the sending SMTP server but not for the receiving IMAP server.
I’m going to look at this in the evening so if I find a trick i’ll post it.
Sorry but no trick found. I’ve just delete and recreate the account, then enable SSL for IMAP and SMTP, in order to make it works again on iPhone.
@ppr Many thanks for your reply. It can only be that. iThings has to re-trust each time a new certificate is issued. What a pain that is. The only way to get the Trust option is to re-install the mail account.
I’ll be noting the next cert renewal and see what happens.
Others must have noticed this?
have a great day…
This topic was automatically closed 15 days after the last reply. New replies are no longer allowed. | s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446710936.10/warc/CC-MAIN-20221203175958-20221203205958-00449.warc.gz | CC-MAIN-2022-49 | 2,236 | 25 |
http://www.techzonez.com/forums/showthread.php/3188-Lost-Or-Stolen-Ms-Office-Cd | code | November 9th, 2002, 00:25 AM
Lost Or Stolen Ms Office Cd?
How to Get a Replacement CD
Q. My copy of Office was stolen. How do I get a replacement CD?
A. To obtain replacement CD-ROMs or manuals if your copy of Office is lost, stolen, or broken, contact the Microsoft Replacement and Supplemental Parts Department at (800) 360-7561.
When you call for a replacement CD, you may be asked to fax a copy of the store receipt to the Microsoft Replacement and Supplemental Parts Department.
Note: If your copy of Office was preinstalled in a computer or distributed by an Original Equipment Manufacturer (OEM), you must contact the OEM for a replacement. If you acquired a copy of Office through the Microsoft Open or Select Volume Licensing programs, contact the Microsoft Worldwide Fulfillment Office at (800) 248-0655.
Taken from the MS Partners newsletter.
I wonder how they could verify this. It's good to know that MS honors their product in this way. I think it is a good way to retain customers. | s3://commoncrawl/crawl-data/CC-MAIN-2016-40/segments/1474738661953.95/warc/CC-MAIN-20160924173741-00122-ip-10-143-35-109.ec2.internal.warc.gz | CC-MAIN-2016-40 | 996 | 9 |
http://apple.stackexchange.com/questions/tagged/blog+software-recommendation | code | So being new to OS X, I checked out some of the highly rated and recommended apps for various things. Things as a TODO list, MarsEdit for posting blogs, Yojimbo for note taking and organizing and ...
Can someone suggest a really good blogging client for Mac OS - lion? I am looking for something having similar functionality like Windows live writer (on Windows). Blog details : Wordpress ...
Possible Duplicate: Is there a good / acceptable blog-publishing application on Mac OS X? Coming from Windows, I've quite got used to writing to my blog using Windows Live Writer, which ...
On Windows, there is the pretty good Windows Live Writer. I have always been told that there is no equivalent on Mac. What would be the best alternative? Some details about pros/cons, missing ... | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368701281163/warc/CC-MAIN-20130516104801-00069-ip-10-60-113-184.ec2.internal.warc.gz | CC-MAIN-2013-20 | 778 | 4 |
http://www.defensivecarry.com/forum/general-firearm-discussion/48895-gun-safety-rules-korean-print.html | code | I am inviting a friend of mine to the range today. Her native language is Korean. I am looking for the basic NRA rules translated into Korean.
She speaks English well, but I feel better if she can read them in her native language. I want to rule out any misunderstanding that will jeopardise her safety due to translation. Thanks | s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218189088.29/warc/CC-MAIN-20170322212949-00112-ip-10-233-31-227.ec2.internal.warc.gz | CC-MAIN-2017-13 | 329 | 2 |
https://bitbucket.org/estatistics/primary-poll-tracker | code | primary-poll-tracker is the Electoral Statistics tool to track national standing in the 2016 Presidential primaries.
PollFetcher.py fetches the polls from Pollster and puts them in a MySQL database. The script first adjusts the MySQL database according to the candidate lists dem-candidates.txt and repub-candidates.txt and then fetches polling for all of those candidates
PollAggregator.py then goes through candidate-by-candidate and runs them through a Kalman filter (which resides in KalmanFilter.py), as described here and then outputs charts such as those titled Dem.png and Repub.png.
To-Do There is a lot that still needs to be done before these charts are complete. I would also like to automatically date the images and put a timestamp on the filename so that it produces a new image every time it is run. Eventually, some sort of smoothing will eventually be applied to the Kalman filter results to make it a bit prettier. Finally, we need to incorporate a solution for when there are gaps in the days. | s3://commoncrawl/crawl-data/CC-MAIN-2018-43/segments/1539583510866.52/warc/CC-MAIN-20181016180631-20181016202131-00206.warc.gz | CC-MAIN-2018-43 | 1,013 | 4 |
https://wiki.ubuntu.com/QATeam/Cadence/Saucy/Week1 | code | Cadence Testing time! Below is links to the various QATrackers waiting for your test results. Click a link, select a package or image to test, read the testcase and submit your result.
Need to understand what cadence testing means? Click here. Need help learning how to submit results and use the tracker? Start here. Then follow the linked tutorial for submitting cadence test results.
The testing focus for this week our daily isos as well as the default applications for ubuntu. In addition, we'll be testing a new version of the audio stack due to land in saucy. | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030334974.57/warc/CC-MAIN-20220927002241-20220927032241-00178.warc.gz | CC-MAIN-2022-40 | 566 | 3 |
http://mathoverflow.net/questions/140249/relation-between-galois-theory-and-etale-cohomology | code | I am a graduate student working on category theory. I am familiar with categorical Galois theory, in the way developed by Janelidze - as described for example in "Galois Theories". I am now trying to comprehend the paper by Joyal and Tierney "An extension of the Galois theory of Grothendieck". It feels like there is a connection between Galois-theoretic results in category theory and Etale Cohomology, which is not clear to me. I do not have a very solid background on algebraic geometry. Can someone describe the connection between the two? I am quite sure that descent theory plays some role but as I said it is not clear to me. If someone could provide a way to look at this correctly, or some material that describes the connection, I would be very grateful - I have found some papers but the ones describing Etale Cohomology are using a very algebraic-geometric language that I can not really follow. There must be a way to look at etale cohomology from a pure category-theoretic point of view. Thanks for any help.
The relation between Galois theory and etale cohomology is simple : what Galois theory of a Field $K$ said is that the etale topos of $Spec K$ is the topos of (the category of) continuous $G$ set where $G$ is the Galois group of the separable closure of $K$ (over $K$) endowed with its profinite topology. Hence the etale cohomology of $Spec K$ is related to the group cohomology of the absolute galois goup of $K$.
Now the title of the paper you mentioned refer to a result of Grothendieck which give a characterization of categories which are the category of continuous $G$-set for some (topological) group $G$. (I don't remember the precise formulation of this theorem, but a more modern form of this result is the fact that a connected atomic topos with a point is the topos of continuous $G$-set for $G$ the localic group of automorphism of the point.)
Now the main result of the paper of Joyal and Tierney is that not only connected atomic topos, but any topos can be represented (relatively explicitly) as the topos of equivariant sheaf over a localic groupoid. Which in some sense generalize the result of grothendieck.
This can be used for example to represent the Etale topos of an arbitrary scheme by something geometrical, involving a space of geometric point of the scheme on which some galois groups acts locally. | s3://commoncrawl/crawl-data/CC-MAIN-2016-30/segments/1469257824499.16/warc/CC-MAIN-20160723071024-00023-ip-10-185-27-174.ec2.internal.warc.gz | CC-MAIN-2016-30 | 2,351 | 5 |
https://warrenlee.tech/portfolio/drawnjewellery-com | code | drawnjewellery.comThis is a jewellery ecommerce website based in UK. It was\nbuilt using Wordpress [https://wordpress.org/] + Woocommerce\n[https://woocommerce.com/] for the backend and NuxtJS [https://nuxtjs.org/] as\nthe frontend.\n\nThe backend was used as a headless CMS and using Woocommerce Store API\n[https://github.com/woocommerce/woocommerce-gutenberg-products-block/tree/trunk/src/StoreApi] \nto drive the data into the frontend (very experimental). I used Windi Css\n[https://windicss.org/] as the CSS framework, which I do prefer using over\nTailwind.\n\nMost of the available API they had was usable for the site but I had to custom\nmake the thank you page API where you can look back at this page for order\nsummary, order status providing you have the correct query key. (Just like the\nthank you page that you would find in Woocommerce normally).\n\nYou can make payments using Stripe [https://stripe.com/] (using Stripe elements\n[https://stripe.com/docs/stripe-js] to obtain the source token and then to pass\nthis token into Woocommerce) and also Paypal [https://paypal.com/]. For Paypal,\nthe site makes a request to Woocommerce with the order details and payment as\npaypal and awaits the response which in turn returns a redirection URL to the\nPaypal payment page. On payment complete the page will go to our thank you page\nand Paypal will use IPN to notify Woocommerce if the payment was successful or\nnot).\n\nThe project was definitely fun to work on but also quite challenging as the\navailable APIs were limited and had to either make my own endpoints or chain\nexisting APIs to get the data I needed, for example finding a product by slug\nwhen visiting the product page.\n\nNote: the API I think was not meant to be used in this way as it was built for\nits Glutenberg Woocommerce blocks, but I do think there is much potential for\nthe API to expand and give opportunities for developers to use it for other\nfrontend applications. | s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100686.78/warc/CC-MAIN-20231207185656-20231207215656-00760.warc.gz | CC-MAIN-2023-50 | 1,966 | 1 |
https://help.xtontech.com/content/administrators-and-power-users/record-types/ad-authentication-is-slow.htm | code | AD Authentication is Slow
Active Directory User Authentication to Access Manager is slow. What causes this and how can it be improved?
System caches AD group membership by user after their initial login for a period of one day because this is usually the slowest operation for validating permissions (the one that contributes to the slow initial load).
System cleans its cache after the user logouts or when an Access Manager System Administration presses Reset Cache button on the Administration > Settings > AD page.
There are several ways to optimize this initial query. All methods could be used simultaneously or just some of them depending on your requirements.
The first method
The first method is to limit the user and group locations to some branch of the AD forest.
Often, AD forests include very slow trusts that could be eliminated by restricting queries to certain branches where all System applicable users and groups are located.
In a default installation, Access Manager attempts to use the whole tree because it does not know where users and groups are coming from; however, it is possible to limit the branch for your production use.
To do this, use the following parameters in $XTAM_HOME/web/conf/catalina.properties file to define certain org units or other branches of the forest:
For example, we can restrict queries to the following branch CN=Users,DC=contoso,DC=com as compared to the complete tree using only DC=contoso,DC=com.
The second method
The second method is to not integrate directly with AD domain controller but rather with its AD Global Catalog which, when optimized, performs faster with complex queries.
The AD Global Catalog is usually accessible on the same domain controller for the forest over port 3268 or 3269 for LDAPS access.
The third method
The third method is to change the way Access Manager queries group membership for any specific user.
By default, it does one recursive query to Active Directory that returns all nested groups a user belongs to.
While some Domain Controllers are optimized well to execute queries like these, for some Active Directory servers this is very heavy operation.
In this case, it is more desirable for the AD client (like Access Manager) to query groups one-by-one instead of relying on AD to execute a combined recursive query to return all groups. The switch is controlled by the parameter ldap.roleSearch in the $XTAM_HOME/web/conf/catalina.properties file.
The following is the default value for this parameter (recursive query)
To switch Access Manager to execute multiple queries for nested groups, change the parameter to this
Afterwards, save and close the file and finally restart the PamManagement (Windows) or pammanger (Linux) service.
This parameter will instruct Access Manager to execute a query to get all groups a user belongs to and then to execute the same query for each group returned to cover the case of nested AD groups.
We observed that some domain controllers perform faster using this method. Before doing this, you might want to test against your active directory server to determine which query is faster by using some common AD/LDAP query tool like ldapsearch, Softerra, Apache Directory Studio. Also, it is important to understand if your AD domain controller that can even execute queries like these before you make any changes. | s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323588242.22/warc/CC-MAIN-20211027181907-20211027211907-00050.warc.gz | CC-MAIN-2021-43 | 3,342 | 24 |
http://cropredysfdc.com/2016/03/17/batchables-limits-exceptions/ | code | A bad thing happened the other day. Here was the sequence:
- Batch job started.
start()method returned 5000 + Opportunity rows.
- Database.stateful used to record an internal log of activity for subsequent posting in the finish() method.
- Each batch of 200 was passed to execute() method.
- Execute method added bits to the stateful log (a string variable).
- Batch 21 (out 28) blew up on a Limits Heap Size exception. Blow up continued on batches 22-28.
- finish() method started and took value from Database.Stateful variable and persisted to Sobject
- AND HERE IS WHERE BAD THINGS HAPPENED…
finish()method started a “finalize” batch job, passing a list of sobject IDs that had exceptions in any previous batch execute. The finalize batch job (i.e. the chained batch job), made updates to all Opportunities that weren’t selected from the previous batches start() method and weren’t already marked as exceptions. In my case, these Opportunities were marked as closed lost.
So .. because the Opportunities in batches 21-28 were never processed and never marked with an exception (because of the uncatchable Limits exception), the chained (second) batch job blithely assumed that the Opportunities in batches 21-28 had never been fetched in the previous batch job’s start() method. Hence, perfectly good Opportunities got marked as closed lost.
So, what should I have done differently?
First, I wrongly assumed that a Limits exception would terminate the entire batch job, not just the currently running
And, since of this misconception, the
finish() method unconditionally executes without knowing if all of the batches passed without uncaught exceptions. And, any work the finish() method performs that involves DML-type work, including scheduling a subsequent chained job may lead to incorrect behavior.
- The finish() method has access to the
BatchableContextand can get, via
AsyncApexJobthat represents the batch job.
AsyncApexJobhas a field
NumberOfErrorsthat identifies how many batches are in error. If greater than zero, appropriate business logic should be applied.
Of course, the Limits Exception needs to be avoided in the first place by taking a different approach to stateful logging. I’ll investigate this in a subsequent post (but don’t stay up waiting for it!) | s3://commoncrawl/crawl-data/CC-MAIN-2018-09/segments/1518891813431.5/warc/CC-MAIN-20180221044156-20180221064156-00124.warc.gz | CC-MAIN-2018-09 | 2,293 | 21 |
https://www.encyclopedia.com/computing/dictionaries-thesauruses-pictures-and-press-releases/file-organization | code | Updated About encyclopedia.com content Print Article
file organization The structure of a file (especially a data file), defined in terms of its components and how they are mapped onto backing store. Any given file organization supports one or more file access methods. Organization is thus closely related to but conceptually distinct from access methods. The distinction is similar to that between data structures and the procedures and functions that operate on them (indeed a file organization is a large-scale data structure), or to that between a logical schema of a database and the facilities in a data manipulation language (see database language). There is no very useful or commonly accepted taxonomy of methods of file organization: most attempts confuse organization with access methods (which are easier to classify). | s3://commoncrawl/crawl-data/CC-MAIN-2019-43/segments/1570986688674.52/warc/CC-MAIN-20191019013909-20191019041409-00379.warc.gz | CC-MAIN-2019-43 | 831 | 2 |
https://www.arxiv-vanity.com/papers/1706.01433/ | code | Visual Interaction Networks
From just a glance, humans can make rich predictions about the future state of a wide range of physical systems. On the other hand, modern approaches from engineering, robotics, and graphics are often restricted to narrow domains and require direct measurements of the underlying states. We introduce the Visual Interaction Network, a general-purpose model for learning the dynamics of a physical system from raw visual observations. Our model consists of a perceptual front-end based on convolutional neural networks and a dynamics predictor based on interaction networks. Through joint training, the perceptual front-end learns to parse a dynamic visual scene into a set of factored latent object representations. The dynamics predictor learns to roll these states forward in time by computing their interactions and dynamics, producing a predicted physical trajectory of arbitrary length. We found that from just six input video frames the Visual Interaction Network can generate accurate future trajectories of hundreds of time steps on a wide range of physical systems. Our model can also be applied to scenes with invisible objects, inferring their future states from their effects on the visible objects, and can implicitly infer the unknown mass of objects. Our results demonstrate that the perceptual module and the object-based dynamics predictor module can induce factored latent representations that support accurate dynamical predictions. This work opens new opportunities for model-based decision-making and planning from raw sensory observations in complex physical environments.
Physical reasoning is a core domain of human knowledge and among the earliest topics in AI [23, 24]. However, we still do not have a system for physical reasoning that can approach the abilities of even a young child. A key obstacle is that we lack a general-purpose mechanism for making physical predictions about the future from sensory observations of the present. Overcoming this challenge will help close the gap between human and machine performance on important classes of behavior that depend on physical reasoning, such as model-based decision-making , physical inference , and counterfactual reasoning [10, 11].
We introduce the Visual Interaction Network (VIN), a general-purpose model for predicting future physical states from video data. The VIN is learnable and can be trained from supervised data sequences which consist of input image frames and target object state values. It can learn to approximate a range of different physical systems which involve interacting entities by implicitly internalizing the rules necessary for simulating their dynamics and interactions.
The VIN model is comprised of two main components: a visual encoder based on convolutional neural networks (CNNs) , and a recurrent neural network (RNN) with an interaction network (IN) as its core, for making iterated physical predictions. Using this architecture we are able to learn a model which infers object states and can make accurate predictions about these states in future time steps. We show that this model outperforms various baselines and can generate compelling future rollout trajectories.
1.1 Related work
One approach to learning physical reasoning is to train models to make state-to-state predictions. The first algorithm using this approach was the “NeuroAnimator” , which was able to simulate articulated bodies. Ladicky et al. proposed a learned model for simulating fluid dynamics based on regression forests. Battaglia et al. introduced a general-purpose learnable physics engine, termed an Interaction Network (IN), which could learn to predict gravitational systems, rigid body dynamics, and mass-spring systems. Chang et al. introduced a similar model in parallel that could likewise predict rigid body dynamics.
Another class of approaches learn to predict summary physical judgments and produce simple actions from images. There have been several efforts [17, 18] which used CNN-based models to predict whether a stack of blocks would fall. Mottaghi et al. [19, 20] predicted coarse, image-space motion trajectories of objects in real images. Several efforts [4, 6, 25, 26] have fit the parameters of Newtonian mechanics equations to systems depicted in images and videos, though the dynamic equations themselves were not learned. Agrawal et al. trained a system that learns to move objects by poking.
A third class of methods [5, 8, 9, 22] have been used to predict future state descriptions from pixels. These models have to be tailored to the particular physical domain of interest, are only effective over a few time steps, and use side information such as object locations and physical constraints at test time.
Our Visual Interaction Network (VIN) learns to produce future trajectories of objects in a physical system from only a few video frames of that system. The VIN is depicted in Figure 1 (best viewed in color), and consists of the following components:
The visual encoder takes a triplet of frames as input and outputs a state code. A state code is a list of vectors, one for each object in the scene. Each of these vectors is a distributed representation of the position and velocity of its corresponding object. We apply the encoder in a sliding window over a sequence of frames, producing a sequence of state codes. See Section 2.1 and Figure 1(a) for details.
The dynamics predictor takes a sequence of state codes (output from a visual encoder applied in a sliding-window manner to a sequence of frames) and predicts a candidate state code for the next frame. The dynamics predictor is comprised of several interaction-net cores, each taking input at a different temporal offset and producing candidate state codes. These candidates are aggregated by an MLP to produce a predicted state code for the next frame. See Section 2.2 and Figure 1(b) for details.
The state decoder converts a state code to a state. A state is a list of each object’s position/velocity vector. The training targets for the system are ground truth states. See Section 2.3 for details.
2.1 Visual Encoder
The visual encoder is a CNN that produces a state code from a sequence of 3 images. It has a frame pair encoder shown in Figure 1(a) which takes a pair of consecutive frames and outputs a candidate state code. This frame pair encoder is applied to both consecutive pairs of frames in a sequence of 3 frames. The two resulting candidate state codes are aggregated by a slot-wise MLP into an encoded state code. itself applies a CNN with two different kernel sizes to a channel-stacked pair of frames, appends constant coordinate channels, and applies a CNN with alternating convolutional and max-pooling layers until unit width and height. The resulting tensor of shape is reshaped into a state code of shape , where is the number of objects in the scene and is the length of each state code slot. The two state codes are fed into an MLP to produce the final encoder output from the triplet. See the Supplementary Material for further details of the visual encoder model.
One important feature of this visual encoder architecture is its weight sharing given by applying the same on both pairs of frames, which approximates a temporal convolution over the input sequence. Another important feature is the inclusion of constant coordinate channels (an x- and y-coordinate meshgrid over the image), which allows positions to be incorporated throughout much of the processing. Without the coordinate channels, such a convolutional architecture would have to infer position from the boundaries of the image, a more challenging task.
2.2 Dynamics Predictor
The dynamics predictor is a variant of an Interaction Network (IN) , a state-to-state physical predictor model summarized in Figure 1(b). The main difference between our predictor and a vanilla IN is aggregation over multiple temporal offsets. Our predictor has a set of temporal offsets (in practice we use ), with one IN core for each. Given an input state code sequence, for each offset a separate IN core computes a candidate predicted state code from the input state code at index . A slot-wise MLP aggregator transforms the list of candidate state codes into a predicted state code. See the Supplementary Material for further details of the dynamics predictor model.
As with the visual encoder, we explored many dynamics predictor architectures (some of which we compare as baselines below). The temporal offset aggregation of this architecture enhances its power by allowing it to accommodate both fast and slow movements by different objects within a sequence of frames. The factorized representation of INs, which allows efficient learning of interactions even in scenes with many objects, is an important contributor to our predictor architecture’s performance.
2.3 State Decoder
The state decoder is simply a linear layer with input size and output size 4 (for a position/velocity vector). This linear layer is applied independently to each slot of the state code. We explored more complicated architectures, but this yielded the best performance. The state decoder is applied to both encoded state codes (for auxiliary encoder loss) and predicted state codes (for prediction loss).
3.1 Physical Systems Simulations
We focused on five types of physical systems with high dynamic complexity but low visual complexity, namely 2-dimensional simulations of colored objects on natural-image backgrounds interacting with a variety of forces (see the Supplementary Material for details). In each system the force law is applied pair-wise to all objects and all objects have the same mass and density unless otherwise stated.
Spring Each pair of objects has an invisible spring connection with non-zero equilibrium. All springs share the same equilibrium and Hooke’s constant.
Gravity Objects are massive and obey Newton’s Law of gravity.
Billiards No long-distance forces are present, but the billiards bounce off each other and off the boundaries of the field of vision.
Magnetic Billiards All billiards are positively charged, so instead of bouncing, they repel each other according to Coulomb’s Law. They still bounce off the boundaries.
Drift No forces or interactions of any kind are present. Objects drift forever with their initial velocity.
These systems include previously studied gravitational and billiards systems [3, 1] with the added challenge of natural image backgrounds. For example videos of these systems, see the Supplementary Material or visit (https://goo.gl/FD1XX5)
One limitation of the above systems is that the positions, masses, and radii of all objects are either visually observable in every frame or global constants. Furthermore, while partial occlusion is allowed, the objects have the same radius so total occlusion never occurs. In contrast, systems with hidden quantities that influence dynamics abound in the real world. To mimic this, we explored a few challenging additional systems:
Springs with Invisibility. In each simulation a random object is masked. In this way a model must infer the location of the invisible object from its effects on the other objects.
Springs and Billiards with Variable Mass. In each simulation, each object’s radius is randomly generated. This not only causes total occlusion (in the Spring system), but density is held constant, so s model must determine each object’s mass from its radius.
To simulate each system, we initialized the position and velocity of each ball randomly and uniformly and used a physics engine to simulate the resulting dynamics. See the Supplementary Material for more details. To generate video data, we rendered the system state on top of a CIFAR-10 natural image background. The background was randomized between simulations and static within each simulation. Importantly, we rendered the objects with 15-fold anti-aliasing so the visual encoder could learn to distinguish object positions much more finely than pixel resolution, as evident by the visual encoder accuracy described in Section 4.1.
For each system we generated a dataset with 3 objects and a dataset with 6 objects. Each dataset had a training set of simulations and a test set of simulations, with each simulation 64 frames long. Since we trained on sequences of 14 frames, this ensures we had more than training samples with distinct dynamics. We added natural image backgrounds online from separate training and testing CIFAR-10 sets, which effectively increased our number of distinct training examples by another factor of 50,000.
3.2 Baseline Models
We compared the VIN to a suite of baseline and competitor models, including ablation experiments. For each model, we performed hyperparameter sweeps across all datasets and choose the hyperparameter set with the lowest average test loss.
The Visual RNN has the same visual encoder as the VIN, but its dynamics predictor is an MLP. Each state code is flattened before being passed to the dynamics predictor. The dynamics predictor is still treated as a recurrent network with temporal offset aggregation, but the dynamics predictor no longer supports the factorized representation of the IN core. Without the weight-sharing of the IN, this model is forced to learn the same force law for each pair of objects, which is not scalable as the object number increases.
The Visual LSTM has the same visual encoder as the VIN, but its dynamics predictor is an LSTM . Specifically, the LSTM layer has MLP pre- and post-processors. We also removed the temporal offset aggregation, since the LSTM implicitly integrates temporal information through state updates. During rollouts (in both training and testing), the output state code from the post-processor MLP is fed into the pre-processor MLP.
The VIN Without Relations is an ablation modification of the VIN. The only difference between this and the VIN is an omitted relation network in the dynamics predictor cores. Note that there is still ample opportunity to compute relations between objects (both in the visual encoder and the dynamics predictor’s temporal offset aggregator), just not specifically through the relation network.
The Vision With Ground-Truth Dynamics model uses a visual encoder and a miniature version of the dynamics predictor to predict not the next-step state but the current-step state (i.e. the state corresponding to the last observed frame). Since this predicts static dynamics, we did not train it on roll-outs. However, when testing, we fed the static state estimation into a ground-truth physics engine to generate rollouts. This model is not a fair comparison to the other models because it does not learn dynamics, only the visual component. It serves instead as a performance bound dictated by the visual encoder. We normalized our results by the performance of this model, as described in Section 4.
All models described above learn state from pixels. However, we also trained two baselines with privileged information: IN from State and LSTM from State models, which have the IN and LSTM dynamics predictors, but make their predictions directly from state to state. Hence, they do not have a visual encoder but instead have access to the ground truth states for observed frames. These, in combination with the Vision with Ground Truth Dynamics, allowed us to comprehensively test our model in part and in full.
3.3 Training procedure
Our goal was for the models to accurately predict physical dynamics into the future. As shown in Figure 1, the VIN lends itself well to long-term predictions because the dynamics predictor can be treated as a recurrent net and rolled out on state codes. We trained the model to predict a sequence of 8 unseen future states. Our prediction loss was a normalized weighted sum of the corresponding 8 error terms. The sum was weighted by a discount factor that started at and approached throughout training, so at the start of training the model must only predict the first unseen state and at the end it must predict an average of all 8 future states. Our training loss was the sum of this prediction loss and an auxiliary encoder loss, as indicated in Figure 1. See the Supplementary Material for full training parameters.
Our results show that the VIN predicts dynamics accurately, outperforming baselines on all datasets (see Figures 3 and 4). It is scalable, can accommodate forces with a variety of strengths and distance ranges, and can infer visually unobservable quantities (invisible object location) from dynamics. Our model also generates long rollout sequences that are both visually plausible and similar to ground-truth physics, even outperforming state-of-the-art state-to-state models on this measure.
4.1 Inverse Normalized Loss
We evaluated the performance of each model with the Inverse Normalized Loss, defined as . Here is the test loss of the Vision with Ground Truth Dynamics and is the test loss of the model in question. We used this metric because the loss itself is not easily interpretable. The Vision with Ground Truth Dynamics produces the best possible predictions given the visual encoder’s error, so the Inverse Normalized Loss always lies in , where a value closer to indicates better performance. The visual encoder learned position predictions accurate to within 0.15% of the framewidth (0.048 times the pixels width), so we have no concerns about the accuracy of the Vision with Ground Truth Dynamics.
Figure 3 shows the Inverse Normalized Loss on all datasets. The VIN out-performs nearly all baselines on nearly all datasets. The only baseline with comparable performance is the VIN Without Relations on Drift, which almost perfectly matches the VIN’s performance. This makes sense, because the objects do not interact in the Drift system, so the relation net should be unnecessary.
Of particular note is the performance of the VIN on the invisible dataset (spring system with random invisible object), where its performance is comparable to the fully visible 3-object Spring system. It can locate the invisible object’s position to within 4% of the frame width (1.3 times the pixel width) for the first 8 rollout steps.
4.2 Euclidean Prediction Error of Rollout Positions
One important desirable feature of a physical predictor is the ability to extrapolate from a short input video. We addressed this by comparing performance of all models on long rollout sequences and observing the Euclidean Prediction Error. To compute the Euclidean Prediction Error from a predicted state and ground-truth state, we calculated the mean over objects of the Euclidean norm between the predicted and true position vectors.
We computed the Euclidean Prediction Error at each step over a 50-timestep rollout sequence. Figure 4 shows the average of this quantity over all 3-object datasets with respect to both timestep and object distance traveled. The VIN out-performs all other models, including the IN from state and LSTM from state even though they have access to privileged information. This demonstrates the remarkable robustness and generalization power of the VIN. We believe it outperforms state-to-state models in part because its dynamics predictor must tolerate visual encoder noise during training. This noise-robustness translates to rollouts, where the dynamics predictor can still produce accurate state-to-state as its predictions deviate from true physical dynamics. The state-to-state methods are not trained on noisy state inputs, so they exhibit poorer generalization. See the Supplementary Material for a dataset-specific quantification of these results.
4.3 Visualized Rollouts
To qualitatively evaluate the plausibility of the VIN’s rollout predictions, we generated videos by rendering the rollout predictions. These are best seen in video format, though we show them in trajectory-trail images here as well. The CIFAR backgrounds made trajectory-trails difficult to see, so we masked the background (just for rendering purposes). Trajectory trails are shown for rollouts between 40 and 60 time steps, depending on the dataset.
We encourage the reader to view the videos at (https://goo.gl/4SSGP0). Those include the CIFAR backgrounds and show very long rollouts of up to 200 timesteps, which demonstrate the VIN’s extremely realistic rollouts. We find no reason to doubt that the predictions would continue to be visually realistic (if not exactly tracking the ground-truth simulator) ad infinitum.
Here we introduced the Visual Interaction Network and showed how it can infer the physical states of multiple objects from frame sequences and make accurate predictions about their future trajectories. The model uses a CNN-based visual encoder to obtain accurate measurements of object states in the scene. The model also harnesses the prediction abilities and relational computation of Interaction Networks, providing accurate predictions far into the future. We have demonstrated that our model performs well on a variety of physical systems and is robust to visual complexity and partially observable data.
One property of our model is the inherent presence of noise from the visual encoder. In contrast to state-to-state models such as the Interaction Net which operate purely at noiseless state-space, here the dynamic predictor’s input is inherently noisy. Even with the relatively clean stimuli we use here (generated synthetically) there is an upper bound to the accuracy achievable with the perceptual front-end. Surprisingly, this noise seemed to confer an advantage because it helped the model learn to overcome temporally compounding errors generated by inaccurate predictions. This is especially notable when doing long term roll outs where we achieve performance which surpasses even a pure state-to-state Interaction Net. Since this dependence on noise would be inherent in any model operating on visual input, we postulate that this is an important feature of any prediction model and warrants further research.
Our Visual Interaction Network provides a step toward understanding how representations of objects, relations, and physics can be learned from raw data. This is part of a broader effort toward understanding how perceptual models support physical predictions and how the structure of the physical world influences our representations of sensory input, which will help AI research better capture the powerful object- and relation-based system of reasoning that supports humans’ powerful and flexible general intelligence.
We would like to thank Max Jaderberg for giving thoughtful feedback on early drafts of this manuscript.
- Pulkit Agrawal, Ashvin Nair, Pieter Abbeel, Jitendra Malik, and Sergey Levine. Learning to poke by poking: Experiential learning of intuitive physics. arXiv preprint arXiv:1606.07419, 2016.
- Peter Battaglia, Razvan Pascanu, Matthew Lai, Danilo Jimenez Rezende, et al. Interaction networks for learning about objects, relations and physics. In Advances in Neural Information Processing Systems, pages 4502–4510, 2016.
- Peter W Battaglia, Jessica B Hamrick, and Joshua B Tenenbaum. Simulation as an engine of physical scene understanding. Proceedings of the National Academy of Sciences, 110(45):18327–18332, 2013.
- Kiran Bhat, Steven Seitz, Jovan Popović, and Pradeep Khosla. Computing the physical parameters of rigid-body motion from video. Computer Vision—ECCV 2002, pages 551–565, 2002.
- Apratim Bhattacharyya, Mateusz Malinowski, Bernt Schiele, and Mario Fritz. Long-term image boundary extrapolation. arXiv preprint arXiv:1611.08841, 2016.
- Marcus A Brubaker, Leonid Sigal, and David J Fleet. Estimating contact dynamics. In Computer Vision, 2009 IEEE 12th International Conference on, pages 2389–2396. IEEE, 2009.
- Michael B Chang, Tomer Ullman, Antonio Torralba, and Joshua B Tenenbaum. A compositional object-based approach to learning physical dynamics. arXiv preprint arXiv:1612.00341, 2016.
- Sebastien Ehrhardt, Aron Monszpart, Niloy J Mitra, and Andrea Vedaldi. Learning a physical long-term predictor. arXiv preprint arXiv:1703.00247, 2017.
- Katerina Fragkiadaki, Pulkit Agrawal, Sergey Levine, and Jitendra Malik. Learning visual predictive models of physics for playing billiards. arXiv preprint arXiv:1511.07404, 2015.
- Tobias Gerstenberg, Noah Goodman, David A Lagnado, and Joshua B Tenenbaum. Noisy newtons: Unifying process and dependency accounts of causal attribution. In In proceedings of the 34th. Citeseer, 2012.
- Tobias Gerstenberg, Noah Goodman, David A Lagnado, and Joshua B Tenenbaum. From counterfactual simulation to causal judgment. In CogSci, 2014.
- Radek Grzeszczuk, Demetri Terzopoulos, and Geoffrey Hinton. Neuroanimator: Fast neural network emulation and control of physics-based models. In Proceedings of the 25th annual conference on Computer graphics and interactive techniques, pages 9–20. ACM, 1998.
- Jessica B Hamrick, Peter W Battaglia, Thomas L Griffiths, and Joshua B Tenenbaum. Inferring mass in complex scenes by mental simulation. Cognition, 157:61–76, 2016.
- Sepp Hochreiter and Jurgen Schmidhuber. Long short-term memory. Neural Computation, 9(8):1735–1780, 1997.
- Lubor Ladicky, SoHyeon Jeong, Barbara Solenthaler, Marc Pollefeys, Markus Gross, et al. Data-driven fluid simulations using regression forests. ACM Transactions on Graphics (TOG), 34(6):199, 2015.
- Yann LeCun, Yoshua Bengio, and Geoffrey Hinton. Deep learning. Nature, 521(7553):436–444, 2015.
- Adam Lerer, Sam Gross, and Rob Fergus. Learning physical intuition of block towers by example. arXiv preprint arXiv:1603.01312, 2016.
- Wenbin Li, Seyedmajid Azimi, Aleš Leonardis, and Mario Fritz. To fall or not to fall: A visual approach to physical stability prediction. arXiv preprint arXiv:1604.00066, 2016.
- Roozbeh Mottaghi, Hessam Bagherinezhad, Mohammad Rastegari, and Ali Farhadi. Newtonian scene understanding: Unfolding the dynamics of objects in static images. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pages 3521–3529, 2016.
- Roozbeh Mottaghi, Mohammad Rastegari, Abhinav Gupta, and Ali Farhadi. “what happens if…” learning to predict the effect of forces in images. In European Conference on Computer Vision, pages 269–285. Springer, 2016.
- Elizabeth S Spelke and Katherine D Kinzler. Core knowledge. Developmental science, 10(1):89–96, 2007.
- Russell Stewart and Stefano Ermon. Label-free supervision of neural networks with physics and domain knowledge. arXiv preprint arXiv:1609.05566, 2016.
- Terry Winograd. Procedures as a representation for data in a computer program for understanding natural language. Technical report, DTIC Document, 1971.
- Patrick H Winston. Learning structural descriptions from examples. 1970.
- Jiajun Wu, Joseph J Lim, Hongyi Zhang, Joshua B Tenenbaum, and William T Freeman13. Physics 101: Learning physical object properties from unlabeled videos. psychological science, 13(3):89–94, 2016.
- Jiajun Wu, Ilker Yildirim, Joseph J Lim, Bill Freeman, and Josh Tenenbaum. Galileo: Perceiving physical object properties by integrating a physics engine with deep learning. In Advances in neural information processing systems, pages 127–135, 2015.
6 Supplementary Videos
We provide videos showing sample VIN rollout sequences and dataset examples. In all videos, for visual clarity the objects are rendered at a higher resolution than they are in the input data.
6.1 Sample VIN Rollout Videos
See the videos at
These show rendered VIN rollout position predictions compared to the ground-truth (unobserved) system simulation for 3-object and 6-object datasets of all force systems. In each video, the VIN rollout is on the right-hand side and the ground-truth on the left-hand side. Rollouts are 200 steps long for 3-object systems and 100 steps long for 6-object systems (except for Drift, where we use 35 steps for all rollouts to ensure objects don’t drift out of view). The VIN rollout tracks the ground truth quite closely for most datasets. Three rollout examples are provided for each dataset.
6.2 Dataset Examples
See the videos at
These show examples of the 3-object and 6-object datasets of all force systems. The VIN and all baselines receive 6 frames of these as input during training and rollouts.
7 Training Parameters
We use the following training parameters for all models:
Batch Size: 4
Gradient Descent Optimizer: Adam, learning rate where and is the training step.
Rollout frame temporal discount (factor by which future frames are weighted less in the loss): with where and is the training step.
8 VIN Model Details
8.1 Visual Encoder
See the main text for schematics and high-level summary descriptions of all model components. Here we describe parameters and details.
The visual encoder takes a sequence of three images as input and outputs a state code. It’s sequence of operations on frames is as follows:
Apply an image pair encoder (described below) to and , obtaining and . These are length-32 vectors.
Apply a shared linear layer to convert and to tensors of shape . Here is the number of objects in the scene, and 64 is the length of each state code slot.
Concatenate and in a slot-wise manner, obtaining a single tensor of shape .
Apply a shared MLP with one hidden layer of size and a length- output layer to each slot of . The result is the encoded state code.
The Image Pair Encoder takes two images as input and outputs a candidate state code. It’s sequence of operations on frames is as follows:
Stack and along their color-channel dimension.
Independently apply two 2-layer convolutional nets, one with kernel size 10 and 4 channels and the other with kernel size 3 and 16 channels. Both are padded to preserve the input size. Stack the outputs of these convolutions along the channel dimension.
Apply a 2-layer size-preserving convolutional net with 16 channels and kernel-size 3.
Inject two constant coordinate channels, representing the x- and y-coordinates of the feature matrix. These two channels are a meshgrid with min value 0 and max value 1.
Convolve to unit height and width with alternating convolutional and max-pooling layers. The convolutional layers are size-preserving and have kernel size 3. In total, there are 5 each of convolutional and max-pooling layers. The first three layers have 16 channels, and the last two have 32 channels. Flatten the result into a 32-length vector. This is the image pair encoder’s output.
8.2 Dynamics Predictor
The dynamics predictor takes a sequence of 4 consecutive state codes and outputs a predicted state code , as follows:
Temporal offsets are , so we have IN cores . Since the temporal offset indexing goes back in time, we apply to , to , and to . Let denote the outputs.
Apply a shared slot-wise MLP aggregator with sizes to the concatenation of for each . The resulting state code is the dynamics predictor’s output.
The Interaction Net core takes a state code as input and outputs a candidate state code, as follows:
Apply a Self-Dynamics MLP with sizes to each slot . Let denote these.
Apply a Relation MLP with sizes to the concatenation of each pair of distinct slots. Let denote the outputs.
Sum for each slot the quantities computed so far, to produce an updated slot. Specifically, let .
Apply an Affector MLP with sizes to each , yielding .
For each slot, apply a shared MLP with sizes to the concatenation of and . The resulting state code is the output.
The IN from State model uses the same dynamics predictor, but no encoder (it is given the position/velocity vectors for directly).
8.3 RNN Models
The Visual RNN model uses the same parameters for the visual encoder as the VIN. The RNN dynamics predictor has a single MLP core with sizes and the same temporal offset of and slot-wise MLP aggregator with sizes as the VIN.
The Visual LSTM model uses the same parameters for the visual encoder as the VIN. The LSTM dynamics predictor has a single LSTM/MLP core consisting of a pre-processor MLP with sizes , an LSTM with hidden units, and a post-processor MLP with sizes . This is the core of an temporal offset-aggregating MLP with sizes and temporal offsets .
The LSTM from State model uses the LSTM dynamics predictor on position/velocity states.
9.1 Physical Systems
We simulated each physical system with Newton’s Method and internal simulation timestep small enough that there was no visual distinction after 300 frames when using the RK4 method. We use the specific force laws below:
Spring A pair of objects at positions and obey Hooke’s law
where is the force component on object from object . Here is the displacement between the objects, is the spring constant, and is the equilibrium. We use
Gravity A the pair of objects with masses , obey Newton’s Law
where is the gravitational constant. In practice, we upper-bounded the gravitational force to avoid instability due to the ”slingshot” effect when two objects pass extremely close to each other. To further prevent objects from drifting out of view, we also applied a weak attraction towards the center of the field of view. The system effectually operates within a parabolic bowl.
Billiards A pair of balls only interact when they touch, in which case they bounce off of each other instantaneously and with total elasticity. The bounces conserve kinetic energy and total momentum, as if the objects are perfect billiard balls. In addition, the balls bounce off the edges of the field of view.
Magnetic Billiards A pair of objects with charges , obey Coulomb’s law
where is Coulomb’s constant. In addition, the balls bounce off the edges of the field of view as in the Billiards system.
Drift In this system there are no forces, so the objects simply drift with their initial velocity. We terminate all simulations before the objects completely exit the frame, though bound the initial positions and velocities so that this never occurs before 32 timesteps.
Unspecified parameters , , and were tuned with the render stride for each dataset and object number to make the object velocities look reasonable.
We initialize each object’s initial position uniformly within a centered box of width times the framewidth. We initialize each object’s velocity uniformly at random, except for Gravity, where we initialize each object’s velocity as the counter-clockwise vector tangent with respect to the center of the frame, then add a small random vector (this was necessary to ensure stability of the system).
For the unbounded systems (Gravity, Springs, and Drift), after the velocities are initialized we enforce net zero momentum by subtracting an appropriate vector from each ball’s initial velocity. For Gravity and Springs, we also center the objects’ positions so that the center of mass lies in the center of the frame. These measures ensures the entire system does not drift out of view.
For all systems except Drift we apply a weak frictional force (linearly proportional to each ball’s area), to ensure that any accumulation of numerical inaccuracies does not cause instability in any systems, even after many hundreds of timesteps.
We render each system as a 32 32 RGB video in front of a CIFAR10 natural image background. For systems that allow occlusion (every system except Billiards), we use an foreground/background ordering of the balls by color, and this ordering is fixed for the entire dataset.
9.2 Numerical Results
In Tables 2 and 3 we show values of the Mean Euclidean Prediction error on all models and all datasets after 8 and 50 rollout steps, respectively. These values numerically represent time-slices of Figure 4 in the main text, partitioned by dataset.
|pixel-to-state models||state-to-state models|
|3-object datasets||VIN||Visual LSTM||Visual RNN||VIN from State||LSTM from State|
|6-object datasets||VIN||Visual LSTM||Visual RNN||VIN from State||LSTM from State|
|Euclidean deviation after 50 simulation timesteps|
|Our Model||Visual LSTM||Visual RNN||Our Predictor||LSTM Predictor|
|Euclidean deviation per object after full frame width is travelled|
|Our Model||Visual LSTM||Visual RNN||Our Predictor||LSTM Predictor| | s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100056.38/warc/CC-MAIN-20231129041834-20231129071834-00599.warc.gz | CC-MAIN-2023-50 | 36,200 | 150 |
https://www.afterwalk.co/portfolio_page/my-coffee-experience/ | code | I enjoy coffee. The whole experience of it. It is 2015, coffee culture in Melbourne at this point in time is interesting. Nothing like this before ever in the history of coffee and I am seated in the heart of Melbourne for a month indulging and taking in the entire experience of having a simple cup every day. Maybe 2. or 3. Almost all the time when I visit a cafe in Melbourne, I would have my camera with me. If not, I would purposely revisit certain cafes so that I could photograph of my experience. Here is my visual stories of different experiences at different cafes I visited in Melbourne. | s3://commoncrawl/crawl-data/CC-MAIN-2021-04/segments/1610703524270.28/warc/CC-MAIN-20210121070324-20210121100324-00527.warc.gz | CC-MAIN-2021-04 | 598 | 1 |
https://2021-eu.semantics.cc/satellite-events/1st-workshop-squaring-circle-graphs | code | There is no questioning, nowadays, the importance of Knowledge Graphs, for building insight from the overwhelming abundance of data produced by organizations and their environment. There is much debate, on the other hand, about what the best tools are to build such Knowledge Graphs. Semantic Graphs, based on RDF and the principles of Linked Data, rely on solid theoretical foundations for reasoning with ontologies, and on IRIs and shared vocabularies for Web scale interoperability. Property Graphs, as implemented in a number of commercial and open-source systems, provide a flexible and intuitive data model, coupled with efficient traversal-based query languages and analytics tools.
The goal of this workshop is to report and share experiences from industry and academia, on using, comparing, and bridging the gap between these two kinds of graphs. The expected outcome is a better understanding of the relative strengths and weaknesses of the two paradigms, and the emergence of tools and methods allowing to get the best of both worlds.
This workshop will be collocated with SEMANTiCS 2021 EU.
Program of the workshop
The workshop will take place on Monday 6 Septembet 2021. All times below in CEST.
||Keynote: Property Graph Schema Working Group: where we are today, and what’s next (Jan Hidders, Birkbeck / University of London & Juan Sequeda, data.world)
||First paper session
|Graph? Yes! Which one? Help! (O. Lassila et al.)
|Knowledge Graph Publication and Browsing Using Neo4J (G. Atemezing et al.)
||Second paper session:
|Digital Transformation using chunks as a simple abstraction above triples and property graphs (D. Ragget)
|PREC: Semantic Translation of Property Graphs (J. Bruyat et al.)
|Using automotive property graph based data models in a knowledge graph (A. O'Mahony et al.)
- Pierre-Antoine Champin, ERCIM/W3C
- Pierre-Antoine Champin is a W3C fellow, and an associate professor in Computer Science at Universite de Lyon (France), currently in a sabbatical at ERCIM. His main research interests are Knowledge Representation and the Semantic Web. He was involved in a number of Semantic Web related standardization groups, including LDP, RDF 1.1 and JSON-LD 1.1 (as an editor). Recently, he lead a Community Group effort around the specification of RDFstar, an evolution of RDF aiming at bridging the gap with Property Graphs.
- David Bowden, Dell Technologies
- David Bowden is a Principal Research Scientist with Dell Technologies in its ORO European research group in Ireland. His primary areas of research are semantic models, IoT and edge to cloud orchestration. He has a M.Sc. in Artificial Intelligence and another in Cloud Computing. Prior to joining Dell Technologies, David worked in a broad range of industries from Airlines to Finance, Public Utilities to Broadcasting, and has has over 40 years experience in the IT industry.
- James Anderson (datagraph)
- Ghislain Auguste Atemezing (Mondeca)
- Jerven Bolleman (Swiss Institute of Bioinformatics)
- Angela Bonifati (Univ. of Lille 1 and Inria)
- Arnaud Castelltort (Montpellier)
- Jos De Roo (UGent)
- Bob Ducharme (sel)
- George H. L. Fletcher (Eindhoven University of Technology)
- Olaf Hartig (Linköping University)
- Gregg Kellogg
- Pavel Klinov (Stardog Union)
- Ora Lassila (Amazon Web Services)
- Maxime Lefrançois (MINES Saint-Etienne)
- Franck Michel (Université Côte d’Azur, CNRS, I3S, France)
- Marco Neumann (KONA)
- Blake Regalia (University of California, Santa Barbara)
- François Scharffe (Knowledge Graph Conference)
- Andy Seaborne (Apache Software Foundation)
- Dominik Tomaszuk (University of Bialystok, Institute of Informatics)
- William Van Woensel (University of Dalhousie)
- Peter Winstanley (Semantic Arts) | s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296945282.33/warc/CC-MAIN-20230324113500-20230324143500-00070.warc.gz | CC-MAIN-2023-14 | 3,735 | 38 |
https://forum.vivaldi.net/topic/95544/how-to-disable-the-what-s-new-tab/1 | code | How to disable the "What's New" tab?
How to disable the "What's New" tab opening after bigger Vivaldi updates? It's a bit annoying when using more than one profile and more than one computer.
The intention is to show the user an overview of the changes/new features so they can get the full benefit of the upgrades. Most users only use one profile, and they see the page once. There is no easy way to tell if the user viewed the page on another profile or device, therefore it's opened in each of them once after the update.
If it's closed immediately, it won't show up again. We only show the "What's New" page after major releases - which is once every few months, so hopefully, that's not too big of a burden to close those few extra tabs.
Please, a little more common sense in your requests.
I can understand the request. Because I also notice that the "What's new" is quite present in all kinds of software products, and it's not just me personally who finds it annoying when something pushes itself into the foreground without being asked and distracts me. Here it would be nice if my favorite browser was an exception and offered an option or another gentler method. But now at least it is clear that there is nothing and nothing is planned.
As someone who has, more than once, uninstalled software immediately after installing it for the sole reason of the developer throwing some useless "thank you for choosing us"-garbage in a fresh browserwindow; I also actually see quite a lot of "common sense" in the request. Though I wouldn't necessarily qualify it as "tOo BiG oF a BuRdEn" (nice customer engagement)-- it does rather annoy the living sh-- out of me. Every few months.
A "What's New" is indeed quite present in all kinds of software, but the vast majority handle it with - at most - a pop-up, giving you the option to read it, if you choose to. Like the pop-ups Vivaldi already has implemented and could easily use for this.
Please be a little more logical in your questions.
If the Vivaldi Team thinks that showing every 2 or 3 months a tab with the improvements is a useful and necessary thing, then why give an option to remove it.
And why is it so useful and necessary? For the simple reason that many users post thousands of questions about how to achieve such a thing, and it turns out that 4 updates ago it was already incorporated, but some people do not take the time to read them.
And thus considerably overburdens the selfless work of the Moderators by responding to such nonsense.
some people do not take the time to read them
And that's exactly these people that are annoyed by reading a what's new tab, while they probably have 200+ tabs open.
Sorry but I'm not going to waste any more time reading this, it's just some spoiled brats complaining they have to press ctrl+w on a tab they don't need to read anymore, what a burden!!1!1
Sorry, I don't understand your point.
@barbudo2005 you are presuming most people actually read the what's new. They don't
A setting for disable could be add in update settings, but being shown only for major releases one shouldn't be so annoying.
you are presuming most people actually read the what's new. They don't
I am presuming most people actually don't read the what's new.
A setting for disable could be add in update settings…
To do so would be ridiculous.
Let me put it to you in terms of a joke told in my country.
John finds his wife naked on the couch with a naked man. He tells Peter bitterly and tells him he's going to settle it in a blunt way.
Peter meets John the next day and asks him how he solved the problem.
John tells him:
Very simple. I sold the couch.
Why are you reacting so aggressively with insults to a simple question? And who gave you permission to speak for everyone? At least that's how you behave. It seems like you don't care about other opinions at all. If you had listened carefully, you would have at least noticed that it was never about disabling "Whats New" information for everyone by default. No one said they were pointless in general. It was more about them pushing themselves to the foreground, and in my case at least 4 times each time. So an option or different behavior would help some.
I am presuming
..everything. For everyone. Assuming it's correct.
It's just you in your head, mate.
"If the Vivaldi Team thinks that showing every 2 or 3 months a tab with the improvements is a useful and necessary thing, then why give an option to remove it."
Because you wouldn't have a place to type that, if there weren't a clear and expressed demand for it.
Get off your high horse; it's drunk.
In my opinion, it is a sensible feature to show What is New with every Stable release. Firefox shows a similar page with every update. Few people read the Help file before asking questions on this support forum, on Reddit, or Mastadon. Vivaldi now includes a Mastadon Panel by default. I never use it, so I have removed it from my Snapshot build, which is my default browser.
The point is, too many users ask dumb questions, because they did none of the above. If the What's New page can preempt at least some of those questions, or make users better informed, the volunteers will have more time to help users, and spend less time flagging duplicate threads, which then require the attention of Moderators to archive them.
If anyone already knows what is new in the latest version, and does not want to read it again, Ctrl+W takes only a second. Life is too short to let such trivial issues annoy the shit out of you.
If you had listened carefully, you would have at least noticed that it was never about disabling "Whats New" information for everyone by default. No one said they were pointless in general. It was more about them pushing themselves to the foreground, and in my case at least 4 times each time. So an option or different behavior would help some.
It seems to me that we are going round in circles because it seems that those arguing against it may not be reading exactly what the arguments are and what improvement is wanted. Can we please move beyond the misunderstood desire to remove the Whats New tab by default, but an option, e.g. hidden in flags and/or a less invasive notification?
On the other hand, it also doesn't seem to matter at all since it's already been decided against anyway, as @pafflick has made clear. So it's probably a waste of time to discuss it further. I have now written a JS and remove the tabs automatically. I'll just call the Whats New up manually for big releases at a time I want to.
On the other hand, it also doesn't seem to matter at all since it's already been decided against anyway, as @pafflick has made clear.
Not sure how you came up with such a conclusion, as I never said anything even remotely similar to what you're saying. All I said is that there's no setting for that. But if you think we should add such a setting, you can submit a feature request.
Wow ... a lot of emotions about this topic!
For me it's not a big deal to close the tab on the rare occasion when it pops up. Sometimes I even read it. Yet there is a slight problem with it, in my view: The information is useful, but it usually pops up at an inconvenient time (when I've just opened my browser/profile in the morning and am ready to get to work). Thus I dismiss it with with a slight frown because it is getting in my way. Some hours (or days) later I have a bit of free time and would have liked to read those news, so as not to miss out on the good stuff. But it's no longer there.
Yes, I know that I can go to Vivaldi's website and find it there (and I sometimes do), but that takes an extra effort and there may be something else to to that requires less "effort". The path of least resistance and all that ...
So ... (here comes the constructive proposal, finally) ... would it be possible to have a link to the latest release notes (not only for major releases) in the Help menu instead? It would then be readily accessible whenever I have time to digest it, and it would not even require a Ctrl+W when I'm busy and focused on something else. Maybe even a discreet notice (like the "Restart required" message) visible until I exit the browser, or for 24 hours, or whatever?
@enompado If you don't mind, could you share that JS?
I'd very much appreciate this functionality being in Vivaldi, but based on this thread I'm not gonna hold my breath for someone to even understand the point. | s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712297292879.97/warc/CC-MAIN-20240425094819-20240425124819-00577.warc.gz | CC-MAIN-2024-18 | 8,428 | 48 |
https://pixeljoint.com/pixels/challenge_item.asp?id=1836 | code | This week we want you to depict fire in movement. You can go for a sole flame sprite, or include the source of fire, or animate a whole scene with surounding environment. You are not limited to a typical fire colour palette. You can go for cold flame, chemical flame or magical flame, and be creative with your palette. The flame needs to be at least recognisable. The most important aspect in this challenge is animation and it have to consist at least 8 different frames.
Canvas: Max 100x100;
Colours: Max 9 (including transparency);
Animation: Required, (min. frames 8).
The challenge thread will have all the challenge updates. The thread is also a great place to post your WIPs. | s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296945279.63/warc/CC-MAIN-20230324082226-20230324112226-00326.warc.gz | CC-MAIN-2023-14 | 683 | 5 |
https://mp3paw.net/dlmp3/URZ3BUowc3Y&play=yes | code | ► DOWNLOAD/STREAM: https://byurecords.lnk.to/HowSweetSoundID. ► Get the CD: http://bit.ly/2yCkQxS or https://amzn.to/2GKN3Yf (Amazon)(paid link). ► SHEET MUSIC: http://bit.ly/2wZdjG9 (paid link). ► CONNECT WITH US! Click "SHOW MORE” below...
Be sure to SUBSCRIBE, LIKE, and FOLLOW BYU Noteworthy on Twitter: https://twitter.com/BYUNoteworthy Facebook: https://www.facebook.com/BYU-Noteworthy-92181583223/ Instagram: @BYUNoteworthy
BYU Noteworthy members (2016–17): Bronwyn Bent, Sarah Cunha, Caitlin Dudley, Alyssa Flake, Alyssa Aramaki Hazen, Rachael Holt, Megan Sackett, Taylor Whitlock Smith, Hanna Zenger; director: Keith McKay Evans
For information about booking BYU Noteworthy for a performance or concert, please contact BYU Performing Arts Management at 801-422-3576. For information about buying recordings and sheet music, please contact BYU Records at 801-422-8189 or send an email to [email protected] | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571911.5/warc/CC-MAIN-20220813081639-20220813111639-00397.warc.gz | CC-MAIN-2022-33 | 925 | 4 |
http://blogs.msdn.com/b/developingfordynamicsgp/archive/2009/06/05/support-debugging-tool-build-11-released.aspx | code | Over the last few months I have been working hard on the next build of the Support Debugging Tool for Microsoft Dynamics GP. After just over 130 hours of development, testing and documenting it is finally ready for release. I have made over 30 significant changes to the tool which will make the existing features more robust as well as adding functionality and some completely new features.
Below is a summary of the changes made for releases 8.00.0011, 9.00.0011 and 10.00.0011, I have divided them into logical sections:
I must send a huge thank-you to Mariano Gomez and Robert Cavill for their tireless help in beta testing each of the changes made. There are many issues that you won't see because they were found during beta testing and fixed.
Also, credit must go to Mariano for his post on Sending emails with Collaboration Data Objects (CDO) and Dexterity which forms the basis of the emailing by SMTP (Simple Mail Transport Protocol) functionality now in the Support Debugging Tool. Mariano also assisted with getting the code fine tuned to correctly handle the SMTP Server Authentication modes.
Thanks guys for your invaluable assistance.
I would also like to thank my colleagues in the Microsoft Dynamics GP support team for the Asia Pacific region. They have supported me and allowed me to dedicate a significant amount of time to the Support Debugging Tool project.
For downloads, please see the Support Debugging Tool Portal Page:
Support Debugging Tool Portal
The Support Debugging Tool is a custom built tool to provide additional capabilities to troubleshoot issues and is not part of the standard Microsoft Dynamics GP released application. Technical support for this tool is not handled via the standard support systems and instead is provided via the public Microsoft Dynamics GP Community Forum. You can use the link below to access the forum:
To assist the partners and Microsoft employees who monitor the forum for these questions, please prefix any subject lines with the initials "SDT: ".
For more information, please see the Support Debugging Tool Portal Page:
Please post your comments on what you think about the new features. Also tell us what other features to assist in supporting and debugging Microsoft Dynamics GP you would like to see in the Support Debugging Tool.
10-Mar-2010: Added link for Support Debugging Tool Portal page.
16-May-2013: Updated More Information and Downloads to link to Support Debugging Tool Portal page.
PingBack from http://blogs.msdn.com/developingfordynamicsgp/archive/2008/07/21/hybrid-changing-screen-colours-depending-on-company-example.aspx
Build 11 of the Support Debugging Tool for Dynamics GP is now available. Dave Musgrave has all the details
For those Dynamics GP Partners out there, there is a new version of the Support Debugging Tool
Posting from DynamicsAccounting.net
Posting from the Dynamics GP Blogster
My favorite GP guru David Musgrave , has been working tirelessly on the next release of the GP Support
First of i would like to thank you for this nice tool.
We have a multi-company installation of GP and we used to use the vba script to change the color of each company. After we have installed the support debugging tool the vba script has been disabled
(Please note that we didn't disable the script). The support debugging tool is not displaying the corerct color for the correct company for some reason.
Would you please help us in this issue.
Thanks for the feedback.
Have you enabled the company background colours in Administrator Settings?
Have you set each workstation to point to a single shared Support Debugging Tool setup (debugger.xml) file?
If you have further questions, it would be best to post in the newsgroup as mentioned in the Downloads section above.
Thank you for your help.
I have posted this question to the newsgroup as it didn't work.
I am so sorry to post the previous questions here :)
Thank you again.
You will need to remove the VBA code and use the Support Debugging Tool for your company colours. Please note that the Support Debugging Tool stores the colour data in the DUOS table in the same way that the VBA code I created does. So the colours should already be set, you just need to activate the feature from the Administrator Settings window.
I also responded on your newsgroup post.
Post from Janakiram M. P.
Just to let you know that the issue you found with the company colours not changing when switch companies has been fixed in the upcoming build 12 release.
Posting from DynamicAccounting.net
I have no problem sending emails with the admin account in GP but I can't send emails using my regular user account. I am using GP 9.0 and Outlook 2010. Which means none of our users can send email with their screenshots. A feature I was really hoping to implement.
Any help would be greatly appreciated.
What happens when you try to send email as a regular user? If using Outlook mode, you will need to make sure that Outlook is installed, configured and running for that user. Maybe you should use the direct SMTP method which does not require a mail client.
PLEASE READ BEFORE POSTING
Please only post comments relating to the topic of this page.
If you wish to ask a technical question, please use the links in the links section (scroll down, on right hand side) to ask on the Newsgroups or Forums. If you ask on the Newsgroups or Forums, others in the community can respond and the answers are available for everyone in the future. | s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440645257063.58/warc/CC-MAIN-20150827031417-00212-ip-10-171-96-226.ec2.internal.warc.gz | CC-MAIN-2015-35 | 5,461 | 43 |
https://github.com/OpenBazaar/OpenBazaar-Server/issues/240 | code | Join GitHub today
GitHub is home to over 28 million developers working together to host and review code, manage projects, and build software together.Sign up
I2P Natively Supported #240
Brief Description: Support for I2P natively
Operating System (OS and version): Linux / Windows / OS X / *nix
Due to the limitations of Tor, and its (let's be honest) being a haven of malfeasance, the alternative of I2P (which robustly supports UDP and addresses DHT limitations by design -- one of its intended use cases to support pseudonymous Bittorrent clients) should be explored.
More than a cursory glance at I2P will reveal a small but significant skilled and motivated base of programmers in the I2P community who have provided many working implementations of software (as a thread on the Subreddit at /I2P/ mentioned recently, on the topic of OpenBazaar, that I2P devs have themselves built many working implementations of software like Zeronet, Bittorrent, Vuze, et cetera. The common thread, for all, has been that the I2P development community is so niche that these programs often become stale and lose development interest because the end up as a "proof of concept" and the initial project creators don't put forth any substantial efforts to supporting the community.
For those concerned about exposing their IP addresses, and simply having a rather MINIMAL expectation of some privacy, have you thought about supporting I2P? I understand the mantra "just use a VPN," but VPNs fail open, thus revealing the user's IP adress, without her taking great strides to ensure they close their internet connection if the VPN connection hiccups.
Moreover, many would prefer to run OpenBazaar-Server on their own hardware as opposed to trusting a VPS to manage it. This is just obviously overhead for many who want (such as myself, and I KNOW others) a rather straightforward use case to do three things simultaneously:
OpenBazaar is not, by design, a good fit for Tor. I2P solves all the problems inherent to the OB design and I think that by OB supporting it natively, the problem that's been seen in other projects where I2P developers have had to take the reigns out of the gates, it's been shown that support wanes and then just dies as the native projects themselves continue unabated. Please show some regard for those who don't want their IP exposed to the world and value their privacy to do so.
I was working in this days on outproxying the OB connection through I2P.
The change could be made without too much of an effort if using onioncat on top of it, so that instead of a b32 (the basic identity used in I2P) you may have a ipv6 to identify the node, which of course would not be the real one.
I don't see any reason not to set it as default and only network. Right now OB does not protect the less tech-savy, and is forcing anyone to buy a VPN or looking for other means of protection by design, which adds a layer of complexity for the end user.
There are ways to do it, and while still in testing it won't take too long, but the more the network grows the more difficult it will be to implement such an upgrade in a flawless and simple way.
A couple of weeks of delay in the project looks like a good tradeoff for really coming out with a full working, protected and "battery included" software.
If I can be of some help in testing or anything please let me know, I'm not a programmer but I'd be glad to help.
I joined the slack and:
Hi! I'm one of the developers of I2P. I agree with the OP that having something like OpenBazaar get I2P support would be really neat! I'm posting here so you know I am happy to answer questions :)
I haven't yet grepped the source and don't know anything about how your existing backend works, but in case it is useful, there are currently two Python libraries for I2P (both backed by the SAMv3 API):
What use case do you mean? | s3://commoncrawl/crawl-data/CC-MAIN-2018-34/segments/1534221213540.33/warc/CC-MAIN-20180818095337-20180818115337-00222.warc.gz | CC-MAIN-2018-34 | 3,866 | 20 |
http://forums.wikihow.com/t/best-telescope/6027 | code | What is the best telescope for deepsky - after searching I found out that Celestron n Levenhuk are the best. Any ideas on this case?
I would imagine that wikiHow forum is NOT the best place to drop telescope brand names and ask advice. I would suggest astronomy and stargazing forums instead. (unless your point was to raise telescope brand name recognition among the general public? )
Just asked. Maybe somebody knows )
I would highly recommend these two articles: http://www.rocketroberts.com/astro/first.htm http://www.skyandtelescope.com/astronomy-equipment/telescope-buying-guide/ They're listed on /r/Astronomy on reddit as the go-to telescope guides for new buyers. /r/AstroPhotography on reddit also has their own guide here: http://www.reddit.com/r/astrophotography/wiki/what\_telescope | s3://commoncrawl/crawl-data/CC-MAIN-2020-34/segments/1596439735882.86/warc/CC-MAIN-20200804191142-20200804221142-00059.warc.gz | CC-MAIN-2020-34 | 795 | 4 |
https://discourse.mcneel.com/t/simpler-way-to-extract-block-entities/407 | code | In a block insert I can select “CTRL+SHIFT” nested entities but it seams there’s no way to extract then.
I know I can “open and edit” the block and copy paste from there but that’s impractical for large linked blocks.
In my particular case I’m linking a large topographic plan and sometimes I wan’t to copy some polyline but having to open this large drawing in a new rhino instance just to do that is overkill.
Another problem is that the insert is positioned differently so I would have to realign the pasted objects.
Its a pity if there’s no better way to do this since we can already select nested entities.
Is there a simpler way to copy a nested entity??? | s3://commoncrawl/crawl-data/CC-MAIN-2021-49/segments/1637964363216.90/warc/CC-MAIN-20211205191620-20211205221620-00306.warc.gz | CC-MAIN-2021-49 | 679 | 6 |
https://rosuav.blogspot.com/2007/01/rosmud-and-passive-mode.html | code | The list of features added will have to get documented somewhere, some time, but for now, here's a sneak preview of one of the geekiest - but potentially quite useful to non-geeks too - features RosMud++ adds: Passive mode.
RM's default mode is "Active", which is the way most clients work. A connection is opened to a pre-existing server, for instance Threshold RPG (thresholdrpg.com, port 23), and the server responds.
Passive mode inverts that, and turns RosMud into the server. Select the port you want to use, and choose Passive mode, and then use whatever other client you wish (RosMud++, GMud, any telnet client) to connect to that port. RosMud will create a new subwindow for each client connection, so you can actually juggle several of them independantly.
Some possible uses of this:
- Poor-man's chat server. Pick a port, tell someone else your IP address and the port you picked, and create yourself a little chat room all of your own.
- Taking control of a web browser or other program. Anything that uses TCP and sends commands with line breaks (and that's a lot of programs) can talk to RosMud++. Pick port 80 and point your browser to http://127.0.0.1/ - you'll see how it talks to a web server. Type something into RM, then press Ctrl-F4 to disconnect and close the subwindow, and poof! The text you typed is shown in the browser.
- Showing off how geeky you are!
If all this is too confusing, just remember: Leave "Active" selected and it's just like GMud. | s3://commoncrawl/crawl-data/CC-MAIN-2018-30/segments/1531676593438.33/warc/CC-MAIN-20180722174538-20180722194538-00165.warc.gz | CC-MAIN-2018-30 | 1,474 | 8 |
https://www.pinterest.com/carehart001/party-time/ | code | - 1 Pin
Duct tape water bottles for a party, cute idea!
Duct Tape, Ducttape, Birthday Parties, Ducks Tape, Cute Ideas, Parties Ideas, Water Bottle Labels, Tape Water, Water Bottles
Duck tape water bottle labels, great party idea
Duct tape water bottles for a party, cute idea! I have seen VT duck tape but not UVA duck tape. I might just have to use orange and blue.
Duct Tape Water Bottle Labels, cute idea!
Decorate water bottles with duct tape for events and parties! #birthday #parties #events #ducttape #DIY
Duct tape water bottles, cute idea for Krystalee's birthday party | s3://commoncrawl/crawl-data/CC-MAIN-2015-32/segments/1438043062635.98/warc/CC-MAIN-20150728002422-00202-ip-10-236-191-2.ec2.internal.warc.gz | CC-MAIN-2015-32 | 578 | 8 |
http://forums.devx.com/printthread.php?t=21830&pp=15&page=1 | code | Access to custom properties of a Word document from Exchange
Hi, i'm having a problem reading custom properties from a word document in
folder directory in Exchange. First, I create new empty word file (by selecting
document from the right-click menu in any folder in explorer). Then, I define
properties (by clicking properties over the file). At this time, I can read
using "ADODB.Connection", "EXOLEDB.Datasource" and a "ADODB.Record" object.
But, when I
open this word document for editing, make some modifications, and declare
properties from inside, then I can't read these custom properties anymore.
Why? Please help
me, How can i define these custom properties and read them in Exchange with
object. I need this because I'm developing a workflow application to read
data from doc | s3://commoncrawl/crawl-data/CC-MAIN-2015-06/segments/1422122245449.81/warc/CC-MAIN-20150124175725-00087-ip-10-180-212-252.ec2.internal.warc.gz | CC-MAIN-2015-06 | 787 | 13 |
https://www.dynaexperts.com/dynamics-365-business-central-availability/ | code | Dynamics 365 Business Central #D365BC is opening up to new countries very quickly. Business Central general availability is in 19 countries now and if you are already onboard to Microsoft Ready-to-Go program, the Developer Preview images are available for 23 countries.
Updated 24th August ’18: On August 22nd, Daily build of Business Central Developer Preview is added for 7 more countries. If you are onboard to Microsoft Ready-To-Go Program, you will have the access of the same.
Updated 12th December’18: Another 14 countries added and below is the latest availability till January 2019
D365 Business Central General Availability
Here is the list of countries details in one single place -
Updated 24th August ’18: 7 more countries Developer Preview build is added.
To know more about Microsoft Dynamics 365 Business Central
Get On-Boarded in Microsoft Ready-to-Go program for Business Central
Want to migrate to Dynamics NAV C/SIDE to VSCode+AL extension 2.0 development? | s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947475806.52/warc/CC-MAIN-20240302084508-20240302114508-00061.warc.gz | CC-MAIN-2024-10 | 982 | 9 |
https://codedump.io/share/bUKrIobiafVS/1/why-rails-can-use-if-as-hash-key-but-not-in-ruby | code | In pure Ruby irb, one cannot type
class Order < ApplicationRecord
before_save :normalize_card_number, if: :paid_with_card?
IRb's parser is well-known to be broken. (In fact, the very bug you encountered was already reported months ago: Bug #12177: Using
if: as symbol in hash with new hash syntax in irb console is not working.) Just ignore it. There are also other differences in behavior between IRb and Ruby, semantic ones, not just syntactic. E.g. methods defined at the top-level are implicitly
public instead of implicitly
private as they should be.
IRb tries to parse the code with its own parser to figure out, e.g. whether to submit it to the engine when you hit ENTER or wait for you on the next line to continue the code. However, because Ruby's syntax is extremely complex, it is very hard to parse it correctly, and IRb's parser is known to deviate from Ruby's.
Other REPLs take different approaches, e.g. Pry actually uses Ruby's parser instead of its own. | s3://commoncrawl/crawl-data/CC-MAIN-2018-17/segments/1524125945037.60/warc/CC-MAIN-20180421051736-20180421071736-00470.warc.gz | CC-MAIN-2018-17 | 970 | 9 |
https://forum.gethopscotch.com/t/bug-with-drawing-anyone-else-experiencing-this/807 | code | This morning, I decided to make a giant rainbow pixel art screen that looks like this:
I noticed that at the top with the dark purple there is a giant gap, a gap in between 2 of the green rows, and everything seems to be aligned differently then the first row. My code looks fine to me, but here it is anyways:
Ability Draw code below:
Ability Moving below:
New Rule for values below, but I don't think it has any effect:
If anyone else is experiencing this, please let me know! If it is my code, please also let me know! It hasn't been published so you can't find it on my page yet. @ian @liza @alish I hope this can be fixed soon! | s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376829399.59/warc/CC-MAIN-20181218123521-20181218145521-00003.warc.gz | CC-MAIN-2018-51 | 632 | 6 |
http://simply-logic.com/services.php | code | ERP (Enterprise Resources Planning), CRM (Customer Relationship Management) and Office Intranet Systems, Project Assignment and Tracking software, Financial Audit Tracking Software etc. as well as Joomla Components and wordpress plugins
We develop website in Joomla, Drupal and Wordpress. We also develop custom Php websites - both front end and backend. All our websites are accessible across all mobile deveices and compatable in all major browsers. | s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764495001.99/warc/CC-MAIN-20230127164242-20230127194242-00108.warc.gz | CC-MAIN-2023-06 | 451 | 2 |
https://github.com/tokio-rs/tokio/pull/4324 | code | / tokio Public
net: allow to set linger on TcpSocket #4324
Add this suggestion to a batch that can be applied as a single commit. This suggestion is invalid because no changes were made to the code. Suggestions cannot be applied while the pull request is closed. Suggestions cannot be applied while viewing a subset of changes. Only one suggestion per line can be applied in a batch. Add this suggestion to a batch that can be applied as a single commit. Applying suggestions on deleted lines is not supported. You must change the existing code in this line in order to create a valid suggestion. Outdated suggestions cannot be applied. This suggestion has been applied or marked resolved. Suggestions cannot be applied from pending reviews. Suggestions cannot be applied on multi-line comments. Suggestions cannot be applied while the pull request is queued to merge.
For now, this is only allowed on TcpStream. This is a problem when one
want to disable lingering (i.e. set it to Duration(0, 0)). Without being
able to set it prior to the connect call, if the connect future is
dropped it would leave sockets in a TIME_WAIT state.
We need to be able to disable lingering on the socket. Otherwise if we drop the connect call, close will cause the socket to move to TIME_WAIT which is a problem for us.
SO_LINGER is a socket option (https://man7.org/linux/man-pages/man7/socket.7.html), expose it as such similar to what is done for buffer sizes for example. I left the possibility to do that on the connected stream as well
Note that I reused the same comments than in TcpStream for consistency. I found that the last part is a bit confusing but I thought that was better to keep that consistent.
"If SO_LINGER is not specified, and the socket is closed, the system handles the call in a way that allows the process to continue as quickly as possible." | s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296943562.70/warc/CC-MAIN-20230320211022-20230321001022-00452.warc.gz | CC-MAIN-2023-14 | 1,855 | 11 |
https://www.thesecret.tv/stories/focus-on-what-you-want-2/ | code | Focus On What You Want!
This is about when I was in 12 grade.
I was a average student in my school and I did not use to study much. Everyone said that I would fail in my 12th board exam.
But 6 months before the exam I saw The Secret and I made a goal. I wrote ‘I have got 60% in my 12 board exams’. I visualised and let it go to the universe.
Days passed by and people, friends, and family member said I would but I had an insane believe in my ability and in the universe.
On the result day I saw the result and it was 59.63!!
I was happy and people’s mouths were shut off.
Thank you everyone! | s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764499470.19/warc/CC-MAIN-20230128023233-20230128053233-00039.warc.gz | CC-MAIN-2023-06 | 599 | 8 |
https://norman.atashbar.com/2013/10/ | code | This blog post addresses services/support people and doesn’t provide too much detailed information about memory management in Java.
You get out of memory, now what? First of all you need to understand what kind of OutOfMemory is it. You may run out of OS virtual memory, native memory allocated to Java process, or Java heap. The error message normally gives a good indication of specifics, see a few examples:
OutOfMemoryError: Java heap space
OutOfMemoryError: PermGen space
OutOfMemoryError: unable to create new native thread
OutOfMemoryError: requested XXX bytes for ChunkPool::allocate
A typical Java process has a heap where Objects go into, which is also divided into different sections. Depending on the implementation of JVM they might be called: Eden Space (New), From Space (Survivor 1), To Space (Survivor 2), Old Generation (Tenured), and Perm Generation (it is considered outside Heap in some implementations). For a detailed explanation see this page or this page. On top it add memory required for class-loaders, garbage collection process, threads stack, JNI, native memory buffers, etc. For a detailed explanation see this page.
Here, I’m going to list what you need to know before analyzing an OutOfMemoryError:
1- What is the architecture of your machine and the JVM running your Java process: 32-bit, 64-bit, or else? How to proceed from here depends on answers to this question, because a 32-bit Java process is limited to about 3GB of usable virtual memory in user space with default settings, and 4GB in best case.
$ uname -a
Linux houman-laptop 3.9.10-100.fc17.x86_64 #1 SMP Sun Jul 14 01:31:27 UTC 2013 x86_64 x86_64 x86_64 GNU/Linux
$ java -version
java version "1.7.0_25"
Java(TM) SE Runtime Environment (build 1.7.0_25-b15)
Java HotSpot(TM) 64-Bit Server VM (build 23.25-b01, mixed mode)
The commands above tell me that I’m running a 64-bit JVM on a 64-bin machine.
2- How much memory is allocated to the Java process?
$ ps awwwxo pid,user,%mem,%cpu,vsz,rss,cmd | head -1; ps awwwxo pid,user,%mem,%cpu,vsz,rss,cmd | grep tomcat
PID USER %MEM %CPU VSZ RSS CMD
2885 houman 10.2 1.0 3405352 826028 /usr/java/jdk1.7.0_25/bin/java ... org.apache.catalina.startup.Bootstrap start
5774 houman 0.0 0.0 109408 872 grep --color=auto tomcat
The command above suggests that my Java process is allocated 3.4GB of memory by OS (VSZ) and is currently utilizing 0.8GB (RSS) of it.
3- How much memory is allocated to Java heap?
$ /usr/java/jdk1.7.0_25/bin/jmap -heap 2885
Attaching to process ID 2885, please wait...
Debugger attached successfully.
Server compiler detected.
JVM version is 23.25-b01
using thread-local object allocation.
Parallel GC with 4 thread(s)
MinHeapFreeRatio = 40
MaxHeapFreeRatio = 70
MaxHeapSize = 536870912 (512.0MB)
NewSize = 1310720 (1.25MB)
MaxNewSize = 17592186044415 MB
OldSize = 5439488 (5.1875MB)
NewRatio = 2
SurvivorRatio = 8
PermSize = 134217728 (128.0MB)
MaxPermSize = 268435456 (256.0MB)
G1HeapRegionSize = 0 (0.0MB)
PS Young Generation
capacity = 55836672 (53.25MB)
used = 44561864 (42.49750518798828MB)
free = 11274808 (10.752494812011719MB)
capacity = 59637760 (56.875MB)
used = 51424800 (49.042510986328125MB)
free = 8212960 (7.832489013671875MB)
capacity = 59637760 (56.875MB)
used = 0 (0.0MB)
free = 59637760 (56.875MB)
PS Old Generation
capacity = 300941312 (287.0MB)
used = 124813120 (119.03106689453125MB)
free = 176128192 (167.96893310546875MB)
PS Perm Generation
capacity = 209780736 (200.0625MB)
used = 124733744 (118.95536804199219MB)
free = 85046992 (81.10713195800781MB)
37997 interned Strings occupying 4151064 bytes.
It says my Java process has 287MB in old generation (119MB used) and 200MB in perm generation (118MB used) for example. On top it also indicates what are the ultimate limits for the Java process. When utilization of these 2 sections get high and the capacity is near the maximum available (Eden + From + To + PS Old grow towards MaxHeapSize, and PS Perm grows towards MaxPermSize), chances are you are running out of heap space, one way or another. Referring to this picture might help you understand the output better:
This command will tell you about garbage collections performed and the time spent doing so:
$ /usr/java/jdk1.7.0_25/bin/jstat -gcutil 2885
S0 S1 E O P YGC YGCT FGC FGCT GCT
0.00 86.34 20.72 41.71 59.46 83 1.991 6 1.832 3.823
This command will tell you about biggest objects that live in heap:
$ /usr/java/jdk1.7.0_25/bin/jmap -histo 2885 | head -20
num #instances #bytes class name
1: 1244 81546688 [Lorg.apache.activemq.command.DataStructure;
2: 229010 31452120
3: 229010 31156304
4: 239863 28604688 [C
5: 18433 22196816
6: 39290 15346496 [B
7: 18433 14414408
8: 14020 13783136
9: 71423 6119320 [Ljava.util.HashMap$Entry;
10: 237082 5689968 java.lang.String
11: 50255 5038688 [I
12: 125650 4020800 java.util.HashMap$Entry
13: 97931 3917240 java.util.LinkedHashMap$Entry
14: 42557 3404560 java.lang.reflect.Method
15: 107680 3022072 [Ljava.lang.String;
16: 38100 2438400 java.util.LinkedHashMap
17: 19563 2362808 java.lang.Class
To investigate further, we might need to refer to the application logs, or use a more sophisticate tools (like YourKit, or Eclipse Memory Analyzer).
4- How much more memory are you using besides heap? Now deduct the RSS figure by your heap capacity, and that’s what you are using for everything else.
Copyright 1991-1994, 1997, 1998, 2000, 2004, 2006 Free Software Foundation, Inc.
This is free software with ABSOLUTELY NO WARRANTY.
For details type `warranty'.
826.028 - (53.25+56.875+56.875+287.0+200.0625)
For me, it was 171MB. If this number is too high, it is worth checking threads. Running too many threads can affect memory usage of the application.
$ /usr/java/jdk1.7.0_25/bin/jstack 2885
Output is too long...
There is no easy way to figure out what’s wrong if native memory usage is too high, there are some methods mentioned here though. | s3://commoncrawl/crawl-data/CC-MAIN-2020-10/segments/1581875146176.73/warc/CC-MAIN-20200225233214-20200226023214-00280.warc.gz | CC-MAIN-2020-10 | 5,895 | 95 |
https://seeingdata.org/ | code | Seeing Data is a group of research projects which aim to understand the place of data visualisations (like those in the examples below) in society. This website includes information about projects which have been completed, are currently underway, or are about to start. It also includes, in the first section, resources to help non-experts develop their ability to make sense of data visualisations.
‘Understanding Data Visualisations‘ is a resource which aims to help people make sense of data visualisations. It’s for the general public – people who are interested in visualisations, but are not experts in this subject.
‘Original Seeing Data Research’ is about the research that we carried out on the original Seeing Data project, how we went about it, and what we found out.
‘Relating to Data Through Visualisation’ is about a new network of three PhD projects addressing different aspects of how people relate to visualisations.
‘Innovative Datavis in the News’ is about uses of data visualisation in news reporting in Norway and in the UK.
‘Persuasive Data’ is about forthcoming research looking at the uses of data visualisation in abortion debates.
Our ‘Seeing Data Blog’ contains regular updates about our ongoing activities and other relevant data visualisation news. | s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296819089.82/warc/CC-MAIN-20240424080812-20240424110812-00104.warc.gz | CC-MAIN-2024-18 | 1,306 | 7 |
https://docs.keeper.io/en/v/keeper-connection-manager/vault-integration/multiple-vaults-integration | code | Keeper Connection Manager can pull secrets from different vaults or different shared folders of the Keeper Vault, via the Keeper Secrets Manager integration. There are two main ways which KCM can connect to multiple Keeper Vaults for retreiving secrets:
Connection Groups can be assigned to different secrets manager configurations. Any connection defined within a Connection Group will retrieve secrets from the group assignment.
Users can be assigned Secrets Manager configurations, and connections can retrieve secrets from configurations defined by each individual user profiles. This allows different users to connect to the same set of connections with their own set of secrets.
Each Keeper Connection Manager "Connection Group" can use a Keeper Secrets Manager configuration for the connections in the group. When this is activated, each connection group will look for records in the corresponding Secrets Manager configuration to retrieve secrets and replace tokens in the connection settings.
In order to use a Keeper Secrets Manager with a Connection Group, enter a Keeper Secrets Manager One-Time Access Token, or Configuration into the "KSM Service Configuration" field of the connection group form.
All connections created within this Connection Group will then use the Secrets Manager configuration defined to retrieve secrets when establishing connections, instead of using the root level Secrets Manager configuration.
The Secrets Manager configuration can come from the same vault, or any other vault.
See the Dynamic Tokens documentation for more information on the available tokens and how to use them.
Note: A Secrets Manager configuration must be established in the baseline configuration as a default to use connection group Secrets Manager configurations. See the documentation for information on setting up a Secrets Manager configuration.
Each Keeper Connection Manager User profile can be assigned to a Keeper Secrets Manager configuration for any connection. When the connection is updated to allow user-specific vaults, Keeper Connection Manager will pull the secret from the user's corresponding configuration. This feature allows multiple users to share the same set of connections, using secrets that originate from the user's own vault.
In order to use user-specific secrets manager connections, the Keeper Connection Manager installation needs to have the feature enabled. It is disabled by default.
Docker Install Method
An additional environmental variable must be added to the keeper/guacamole Docker image in your
In the Edit User screen, fill in the KSM Service Configuration that has been set up for that user. This is also available to each user to set up the KSM Service Configuration for themselves.
When creating or editing a connection, there is a field which appears called "Allow user-provided KSM configuration".
When this option is selected, Keeper Connection Manager will look for corresponding secrets in the user's vault corresponding to the Keeper Secrets Manager configuration.
Order of Precedence
Keeper Connection Manager will always use the base (or Connection Group) secrets if any are applicable. It will only use user-provided secrets if there isn't an admin-provided secret for the same, to ensure that users cannot override the intent of the admin. | s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817249.26/warc/CC-MAIN-20240418222029-20240419012029-00254.warc.gz | CC-MAIN-2024-18 | 3,309 | 18 |
https://stats.stackexchange.com/questions/82664/bayesian-vs-mle-overfitting-problem | code | In Bishop's PRML book, he says that, overfitting is a problem with Maximum Likelihood Estimation (MLE), and Bayesian can avoid it.
But I think, overfitting is a problem more about model selection, not about the method used to do parameter estimation. That is, suppose I have a data set $D$, which is generated via $$f(x)=sin(x),\;x\in[0,1]$$, now I might choose different models $H_i$ to fit the data and find out which one is the best. And the models under consideration are polynomial ones with different orders, $H_1$ is order 1, $H_2$ is order 2, $H_3$ is order 9.
Now I try to fit the data $D$ with each of the 3 models, each model has its paramters, denoted as $w_i$ for $H_i$.
Using ML, I will have a point estimate of the model parameters $w$, and $H_1$ is too simple and will always underfit the data, whereas $H_3$ is too complex and will overfit the data, only $H_2$ will fit the data well.
My questions are,
1) Model $H_3$ will overfit the data, but I don't think it's the problem of ML, but the problem of the model per se. Because, using ML for $H_1,H_2$ doesn't result into overfitting. Am I right?
2) Compared to Bayesian, ML does have some disadvantages, since it just gives the point estimate of the model parameters $w$, and it's overconfident. Whereas Bayesian doesn't rely on just the most probable value of the parameter, but all the possible values of the parameters given the observed data $D$, right?
3) Why can Bayesian avoid or decrease overfitting? As I understand it, we can use Bayesian for model comparison, that is, given data $D$, we could find out the marginal likelihood (or model evidence) for each model under consideration, and then pick the one with the highest marginal likelihood, right? If so, why is that? | s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100452.79/warc/CC-MAIN-20231202203800-20231202233800-00154.warc.gz | CC-MAIN-2023-50 | 1,748 | 8 |
http://stackoverflow.com/questions/9694175/ruby-prawn-determine-the-width-of-a-mono-spaced-font | code | I'm trying to overlay polygons on top of a grid of mono-spaced characters. In order to calculate the coordinates for the polygons I need to know how wide a single character is. How do you determine the width of a single mono-spaced (Courier 12) character using the Ruby Prawn gem?
According to this there is a
Here is a bit more documentation I was able to dig up. In terms of your question I think you would do: | s3://commoncrawl/crawl-data/CC-MAIN-2014-49/segments/1416931009551.23/warc/CC-MAIN-20141125155649-00188-ip-10-235-23-156.ec2.internal.warc.gz | CC-MAIN-2014-49 | 412 | 3 |
http://www.bloggertipsandtricks.com/2007/08/new-blogger-templates-by-blogger-buster.html | code | New Blogger 3 column Sweet Dreams templateAmanda of BloggerBuster have created a number of New Blogger templates. However, please note that the templates uses many images hosted by Amanda, and when you download her templates, included also will be the images. This is like implying that you should upload those images to the web yourself, get the URL's and substitute them in the relevant parts of the templates. This may be because she don't want you to increase the bandwidth load from her site. In any case, it is probably wise for you to upload the images yourself as then these images will be controlled by you and not Amanda. If Amanda remove the images from the web or her site goes offline, the images in your blog will disappear.
Amanda's templates have some features very much different from the other templates including a Lable (category or tag) List in the form of a Label Cloud, animated or fixed gif images, widgets to add a mp3 music player plus a mp3 music file, search box, etc.
However, I have noticed that after downloading her templates, some don't include the images (Blues) and some have some missing images. However, this is no problem as I will show you how to get the images, upload them to the web, get the URL's and substitute these with the the relevant URL's in the template. If you want to depend on Amanda, you can skip all those explanation, just download, backup your current template PLUS the Page Elements, upload her template and just forget about the rest. However, she has indicated that she prefer you to host your own files and images. If you want control over the images yourself and you don't know how, then you will have to read my instructions on how to get the missing images, upload the neccessary images and files plus get their URL's.
I will start with one of her template and explain the process fully, and the others, if you want to use them, the instructions for the first template will be exactly the same.
New Blogger 3 column Sweet Dreams templateAn example of a blog using this template is Medical Matters. You can download it from Download "Sweet Dreams" 3 column template (zip file). Save the zip file into a suitable folder, perhaps called "BloggerBuster Sweet Dream template" or something. After you downloaded and unzipped the file, you will get 3 column Sweet Dream xml template (highlighted with a red rectangle), a HTML file which when clicked on opens a webpage giving some instructions, an image folder, a music folder, a widger_code folder, and an xml template folder.
Refer to Backup and change New Blogger template. If you have already done some customizations (add Page Elements, etc.) edit the Page Elements one by one, paste them into Notepad files and save them into the same folder as some of the Page Elements will be deleted or become empty after you change to the new template. Click the TEMPLATE tab, then the EDIT HTML sub-tab to open the template editor. Click "Browser" and browser to the xml template highlighted with a red rectangle in the screenshot above. Click "Upload". You may get a message that some Page Elements (widgets) will get deleted. Go ahead and upload.
Update 11.10pm 15 August 2007: I found I missed some image URL's below when I recorded the original image URL's found in the original templatge, so created a test blog and tried uploading the template again and got a zip file. When I click on the zip file, I got the folders plus
When in Window Explorer, I click on the zip file, then a "Sweet_Dream" folder, I can get to the folders plus HTML and xml files as shown in the first screenshot above. However, when I click "Browse" to upload the template and and click on the zip file to get to the folders plus HTML and xml files, the zip file got loaded into the "browse" window instead. So I was forced to open Windows Explorer, went to the folder containing the folders and HTML and xml files shown in the screenshot above and drag them into the folder above. If you faced this problem, this is what you may need to do. I don't know why I didn't have this problem the first time I did it.
After you have uploaded, the new template will be in the template editor window. Look for line of codes that contain something like url(http://........gif). To illustrate, I will put in the relevant sections I found into the scroll box below:
The image URL's are highlighted in red and the relevant URL's are
These are images uploaded onto the web by Amanda and she has expressed the desire that those who use her templates upload them on their own which I have done. The way I did it was to copy-paste the image URL one by one into a browser window which will get me to the webpage containing just the image. I then right-click on the image and selected "Save Image As.." to copy them into my computer. From here you have various choices - upload them into Photobucket or upload them into a Blogger post. I uploaded them into a special blog post BloggerBuster Sweet Dreams which I used to host images, publish the post, opened the page, click on the image one-by-one, in the page containing just the image, click VIEW > PAGE SOURCE, then copied the actual URL of the image from the page source. To illustrate, I paste the page source of one of the images into the scroll box below:
The URL I need is highlighted in red. Note that the last word in the URL is star1.gif
So I go into the template, look for all the url that ends with star1.gif, replaced it with my own URL wherever I find it. This is repeated for other images. When it is done, preview the template, and if everything seems fine, click "Save template". Now you have the images hosted and controlled by yourself instead of Amanda.
If you don't want the bother, you can use my images URL's for your template, but it will mean you are dependent on me. If my post goes offline, your images will disappear.
Amanda of Blogger Buster now don't require bloggers to using her templates to host the images themselves, plus added more templates. I will be making a new post as soon as I have the time and post the link here
More New Blogger templated
New Blogger template modified by Stavanger
Dots New Blogger template with Header
New Blogger templates modified by Ramani
New Blogger templates by Isnaini
New Blogger templates by Thur
Ramani's New Blogger Neo template
New Blogger template by Final Sense | s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917118707.23/warc/CC-MAIN-20170423031158-00562-ip-10-145-167-34.ec2.internal.warc.gz | CC-MAIN-2017-17 | 6,351 | 23 |
https://www.wpmf.org/ | code | Sunday morning service will be held virtually for the foreseeable future. The pastoral team is monitoring the situation while following the recommendations of Governor Tom Wolf, the city’s department of health, and the Centers for Disease Control and Prevention. Those on our mailing list will be kept up to date through email. You are encouraged to continue checking the website for more information in the future.
For helpful information visit our resources pages here: https://www.wpmf.org/newsletter/covid-19-resources/ | s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590347415315.43/warc/CC-MAIN-20200601071242-20200601101242-00008.warc.gz | CC-MAIN-2020-24 | 525 | 2 |
https://techsupport.osisoft.com/Documentation/PI-SDK/PI-API/css_test/I_O_Rate_Event_Counter_.htm | code | Interfaces and other applications that send values to the Snapshot should register these events by incrementing an event counter. This counter may then be used by the iorates program to periodically update a tag on the PI Server with event rate information. Application and system loading can then be observed through this rate tag.
Note: The iorates program is available on UNIX and Linux platforms only.
Starting with PI API version 1.6.6, the iorates program can also:
Starting with PI API 1.6.6, iorates is configured using
PIHOME/dat/iorates.ini instead of
PIHOME/dat/iorates.dat. In the .dat file structure, each entry consisted of only the PI point name and counter index. Because of iorates enhancements, it is not possible in PI API 1.6.6 and later to define the required configuration within the old .dat file structure.
The iorates.ini file defines the following:
When the iorates program starts, it reads the iorates.ini file. For each PI point defined in the file, it loads the point ID and point type from the PI Server and resets the point value to zero. The iorates program then loops through the defined PI points and does the following:
By default, iorates performs these steps every 10 minutes.
Bufserv processes also read the iorates.ini file on startup. Bufserv creates a separate process for each buffered server defined in piclient.ini. Each bufserv process looks in the iorates.ini file for BUFRCV and BUFSND settings specific to the buffered server. If the BUFRCV and BUFSND settings are defined, bufserv first resets the associated counters, and then updates the counter defined by BUFSND as it sends values to the buffered PI Server.
PI API applications, including interfaces, also read the iorates.ini file and look for BUFRCV settings when they connect to a PI Server. If these settings are defined, then the associated BUFRCV counter is incremented when the application calls functions that send events to the bufserv buffers.
UniInt-based interfaces can also update other counters when they send events to the PI Server. The UniInt counters can be specified by starting the interface with the -ec= command-line argument.
Some interfaces support other interface-specific event counters. Refer to the interface manuals for more details.
Also, when PI API functions are called that send events to the PI Server (standard and extended functions), counter 47 is incremented by the number of events to be sent. Counter 47 is a reserved counter that tracks the total event rate for the interface node.
When planning your iorates configuration, consider the following:
To configure iorates, use iorates.ini to define PI Servers as well as BUFRCV and BUFSND properties, PI points, and counters for each PI Server. The iorates.ini file uses the standard INI file format, with sections and properties.
The iorates.ini file requires a [PISERVERS] section listing PI Servers that iorates will use, and a section for each listed PI Server that defines BUFRCV, BUFSND, and individual PI points and counters for that server.
The properties within the [PISERVERS] section use the property names SERVER1, SERVER2,...SERVERn, and the values are the names of the PI Servers.
Example of [PISERVERS] section:
Note: Iorates attempts to read property names in the [PISERVERS] section in numeric order starting with SERVER1. Property names can be listed in any order, but if there is a gap in the numeric sequence of the property names, iorates will not be able to read values after the gap.
For example, iorates can read the following, because even though the list is not in numeric order, the three property names use consecutive numbering:
However, iorates will read only srv1name (SERVER1) in the example below, because no SERVER2 value is specified:
The section name for each PI Server is the PI Server name. Using the above example, the sections for individual PI Servers would be named [srv1name] [srv2name], and [srv3name]. The properties listed in the section for each PI Server define the iorates points for that server. The properties for iorates points are named IOTAG1, IOTAG2,...IOTAGn.
Note: Like the server property names SERVER1, SERVER2... SERVERn, the IORATES property names are read in numeric order and must use consecutive numbering. If there is a gap in the numeric sequence of the property names, iorates will not be able to read values after the gap.
There are also two special property names, BUFRCV and BUFSND, which are used to specify the iorates points used to monitor the throughput of the PI Server's instance of bufserv. BUFRCV specifies a point used to monitor events sent by PI API applications to bufserv, and BUFSND specifies a point used to monitor events sent by bufserv to PI Server.
Each iorates point defined requires the PI point name and the iorates counter index. Optionally, if a RAW argument is specified, then iorates writes the raw value of the counter rather than the default rate of change of the counter (change per minute). Each of these definitions is listed as a comma separated string with the following syntax:
Example of sections for individual PI Servers, including BUFRCV, BUFSND, and IOTAG1:
The following section for a PI server named srv1name defines iorates points for the following:
Note: The names used for the specified PI points are not relevant, provided that the points specified in the iorates.ini file exist on the corresponding PI Server.
If the default PI server is piserver1 and the
iorates.dat file contains the following entries:
Then you can define the same server, PI points, and counters in an
iorates.ini file as follows:
In this example, the interface node has one interface running, and the interface is sending data to a collective with the members PIServerA and PIServerB. To use iorates to monitor the throughput of the instances of bufserv, iorates.ini must contain sections and properties similar to the following:
Note: For a collective, the iorates point for the event rate of the interface only needs to be specified in one of the PI server sections. In the above example, the event rate is calculated and sent when PIServerA is processed, and because of n-way buffering, that value is also sent to PIServerB. The bufserv monitoring points have to be specified under both PI Server sections because they are different points, monitoring the different instances of the bufserv process.
To verify the configuration of iorates, check
PIHOME/dat/pimesslogfile on startup. When iorates starts and reads the contents of the iorates.ini file, it logs both the number of servers and the details of the points loaded for each PI Server. If errors are found, or property keys are incorrect, the resulting messages may help identify the problem.
The following example shows the results for a single PI server configured with 5 iorates points.
iorates>> Number of PI Servers: 1
iorates>> Connecting to PI Server (1): SERVER1
iorates>PI-API> Initial connection to [SERVER1](192.168.1.1) Buffered
iorates>loadioratestags> IOrates tag: SY.VM-CENTOS4_S1_RANDOM.IORATE registered. Calc type: 0 Counter: 2
iorates>loadioratestags> IOrates tag: SY.VM-CENTOS4_TOTAL_IORATE registered. Calc type: 0 Counter: 47
iorates>loadioratestags> IOrates tag: SY.VM-CENTOS4_TOTAL_IORATE_RAW registered. Calc type: 1 Counter: 47
iorates>loadioratestags> IOrates tag: SY.VM-CENTOS4_BUFRCV registered. Calc type: 0 Counter: 3
iorates>loadioratestags> IOrates tag: SY.VM-CENTOS4_BUFSND registered. Calc type: 0 Counter: 4
iorates>loadioratestags> 5 rate tag(s) registered.
iorates>> Total number of tags: 6
If iorates quits or exits and you find messages like the following in
PIHOME/dat/pimesslogfile, then check whether ioshmsrv is running. When PI API processes start, the IO shared memory server (ioshmsrv) also starts and allocates a block of shared memory for up to 200 event counters (1-200). Since the shared memory is used for iorates counters, ioshmsrv must be running in order for iorates to function properly.
iorates>cntclsshm> error, exit
iorates>cntgetshm> error, exit | s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593655900614.47/warc/CC-MAIN-20200709162634-20200709192634-00194.warc.gz | CC-MAIN-2020-29 | 8,044 | 52 |
http://chrisacorns.computinghistory.org.uk/Network/Pics/Acorn_ANB22_BBCEconetUpgrade.html.orig | code | Acorn ANB22 BBC Econet Upgrade
ANB22 BBC Econet Upgrade manuals
ANB22 BBC Econet Upgrade parts
The BBC Micro motherboard (Model A, B, B+, B+128k and ABC computer) has an unpopulated bit on the motherboard in the back left (looking from the front) where the Econet interface is installed. It is fitted as standard to the US and German BBC Micros. This is the upgrade pack, the one I have comes in a padded bag (top picture). In the bag contains the Econet level 1 File Server User Guide , the Econet Level 2 File Server User Guide and the Econet Advanced User Guide (middle picture). The upgrade itself consists of a packet of resistors, some ICs, a socket and the cable (bottom picture). Some soldering skill is required to install it!
The upgrade includes an NFS ROM to fit in one of the Sideways ROM sockets. Later the DFS and NFS ROMs were combined in the DNFS ROM which contained DFS v1.20 and NFS v3.60. The DNFS instruction booklet describes the installation and features of the DNFS ROM, | s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296818468.34/warc/CC-MAIN-20240423064231-20240423094231-00469.warc.gz | CC-MAIN-2024-18 | 994 | 5 |
https://devforum.zoom.us/t/question-on-authentication-and-using-the-sdk-to-join-meeting-without-login/62617 | code | I am very new at this, but am attempting to create an application for very non-tech savvy users that is as simple as possible and will let them press a button to join a hard-coded meeting ID (with limited features once connected). These are users without Zoom accounts, so I want to use the “join meeting without login” option. But what I’m not clear on is whether the application needs to authenticate before doing that or not. There seem to be some forum responses that indicate not, but when I try to join without having authenticated, Join() seems to return SDKERR_UNAUTHENTICATION which seems to imply I do need to authenticate first.
But if I do need to authenticate, I’m not sure how to do so for my application. For my testing, I am able to create a temporary JWT (following the instructions in the documentation), authenticate with it, and the “without login” Join works. But I don’t understand how I can do that for the final application that needs to be installed on the users’ computers. Obviously, even if I hardcoded the JWT, it would expire. Presumably, I could use a library to generate new JWT’s every time it joins based on the SDK key/secret, but that would require hardcoding those, which seems like a bad idea. I don’t have any outside server that can generate JWTs for the application while keeping the key/secret private. If I understand correctly, OAuth requires a) the user to have a Zoom account and b) interaction in a browser, which isn’t going to work for me.
So ideally, I want it to be able to join without authentication, if that is possible. But if it isn’t, what’s the best way to authenticate under these circumstances?
Thank you for your assistance.
Which Windows Meeting SDK version?
To Reproduce(If applicable)
Device (please complete the following information):
- Device: HP laptop 17z-ca100
- OS: Windows 10 Home
Hi @abm4111, thanks for using our SDK.
Joining a meeting anonymously does not require any user authentication, so this should be possible. Based on what you’ve mentioned, there may be some conflation between developer authentication and user authentication.
Developer authentication is done using the SDK key & secret (usually with a JWT as you’ve already found), and is required for 100% of SDK use cases. User authentication allows the end users to verify their identity in Zoom’s back end. This is only required if the user is starting a meeting as the host, or if the meeting you are joining is configured to require user authentication.
We do not recommend hard-coding your developer credentials within your app in any way, as this is a major security vulnerability which can potentially give others access to your credentials. The recommended approach is to generate the JWT from your own server as-needed, which your SDK app could request.
Thanks for your response. So that seems to confirm that developer authentication is needed even when user authentication is not. As mentioned, my organization doesn’t currently have any kind of server that can be used to generate JWTs, and trying to create and host one somewhere would add a significant additional layer of complexity to this solution. Unless anyone is aware of a relatively simple out-of-the-box type solution for this…
Is there really no other alternative other than to hard-code developer credentials into the app (which does seem like a pretty terrible idea, even though the app will have limited distribution)?
And presumably hard-coding a long term JWT (which would at least be less insecure than hard-coding the credentials) and forcing the users to do an app update before/when it expires isn’t an option since the documentation says expiration has to be a max of 48 hours…
It is still possible to successfully authenticate the SDK with your developer credentials without the use of a back end server, as long as you are willing to accept the security risks associated with shipping credentials in your application. The only approach we recommend using is securely storing them in your own servers, but we do not have any way of enforcing how your credentials are stored, nor do we have plans to begin doing so.
This topic was automatically closed 30 days after the last reply. New replies are no longer allowed. | s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656103331729.20/warc/CC-MAIN-20220627103810-20220627133810-00665.warc.gz | CC-MAIN-2022-27 | 4,277 | 18 |
https://www.cs.uleth.ca/~fitzpat/oer.html | code | This page will no longer be regularly updated. As of July 23, 2020, all of our open textbooks in the Department of Mathematics and Computer Science, as well as links to additional open textbooks from external sources, will be housed on our new open textbooks server.
The new server can be found at opentext.uleth.ca.
The links and files on this page will be retained for the 2020-2021 academic year. Eventually this page will redirect to the new server.
I have customized available open-source textbooks for several of our mathematics courses. This page provides links to free textbooks for courses at the University of Lethbridge. In each case the books have been customized to fit as closely as possible with the course curriculum as mandated by the Academic Calendar. This page will be updated regularly as changes are made to the texts, and whenever one of the texts is adopted for a course.
Each textbook is available in a colour format, intended for use as an ebook on a laptop or tablet, and a greyscale format, which has been optimized for printing. (Many of the colour graphics use blue and red to distinguish different graphs, etc. If you print the colour version on a black and white printer, these two colours will be indistinguishable. In the greyscale version, different shades of grey have been used in place of the colours.
Note: Most versions (colour and black and white) are available only in PDF format at the moment. I regret that this is not ideal from an accessibility point of view, but it is a consequence of the LaTeX language used to produce the books.
Note that the current HTML version does not match the PDF versions exactly. The PDF texts have been modified from the original APEX Calculus to better match our curriculum, and add Canadian spelling. The HTML corresponds to the original APEX Calculus textbook, but represents a more up to date version of the book.
A number of small errors and typos have been fixed during the development of the PreTeXt version. The PreTeXt HTML also supports a number of nice features, such as embedded video, and interactive 3D graphics (in later chapters). Coming soon: interactive homework, and a built-in calculator.
This text is not intended for any course, but to serve as a resource for calculus students needing to review algebra, functions, and trigonometry. At 200 pages, it is longer than the typical review chapter in many calculus textbooks, but shorter than a complete precalculus textbook.
The Math 1010 textbook contains chapters on both calculus and precalculus.
There are two versions of the Math 1010 textbook;
the primary difference between them is the length of the precalculus chapters.
The abridged version uses the material from the Essential Precalculus textbook,
while the unabridged version contains almost all of the content found in the Stitz-Zeager textbook.
The abridged version has been adopted as of Fall 2017.
The unabridged version has been retained for reference purposes.
The Math 1410 textbook has been updated for Fall 2017 with some new content, and a reorganized table of contents. Systems of equations now appear before matrices. The previous version can still be produced should anyone want it.
Note: The Math 1410 textbook has not been updated for Fall 2018. The excellent textbook by Keith Nicholson has been made available as an Open Education Resource by Lyryx Learning, and will be the textbook in use for 2018-2019.
The primary source material is the APEX Calculus textbook, by Hartman et al. You can visit their website to get more information on their project, or to access the original versions of the texts. (The books here have been customized to fit the University of Lethbridge courses.)
I have also made extenstive use of the text Precalculus, by Stitz and Zeager for the Math 1010 textbook. For Math 1410, I have also used the textbook Matrix Algebra by Gregory Hartman (lead author for the APEX texts).
All of these textbooks are open source: the LaTeX source code used to generate them was made publicly available by the authors above so that people like me could edit them. (So feel free to send them a "Thank you"!) In keeping with the spirt of this philosophy, I have re-posted the source code for these texts. If you're interested in customizing the texts, the source is available on GitHub.
APEX Calculus Version 4 has been released, and a chapter on vector calculus has been added. As a result, we're now able to offer OER textbooks for the entire Calculus sequence, including Calculus IV (Math 2580). | s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100287.49/warc/CC-MAIN-20231201120231-20231201150231-00294.warc.gz | CC-MAIN-2023-50 | 4,531 | 22 |
https://www.purewow.com/entry_detail/national/10210/How-to-stuff-a-duvet-cover.htm | code | How to Stuff a Duvet Cover
Good in bed
We recently had a friend tell us, “PureWow, if you can teach me how to stuff my duvet into my duvet cover, I will owe you my firstborn child.”
Well, Ellen (names have been changed to protect the innocent), it’s time to pony up.
Presenting the easiest way to stuff a duvet. Ever. | s3://commoncrawl/crawl-data/CC-MAIN-2017-47/segments/1510934804881.4/warc/CC-MAIN-20171118113721-20171118133721-00764.warc.gz | CC-MAIN-2017-47 | 323 | 5 |
http://www.dbforums.com/showthread.php?1645146-Form_AfterdelConfirm-and-update-table | code | Unanswered: Form_AfterdelConfirm and update table.
I have a Planes table and a flights table. The Planes table has number of flights . If a user deletes a flights record I need to reduce the planes.iFlights field. I been around in circles on after I go Planes.iFlights=planes.iFlights-1 what do I need to do if anything to ensure that new iflights number is updated to the Planes table.
This appears to be working but my ilocbatteryID which a Dim statement in load_form seems to be getting trashed some where by the delete function. At what poiint in a delete does the data record get cleared. Why would it affect a global variable? At least I think it is global. | s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218190295.65/warc/CC-MAIN-20170322212950-00392-ip-10-233-31-227.ec2.internal.warc.gz | CC-MAIN-2017-13 | 663 | 3 |
https://www.biketeile24.ch/en/workshop-consumables/bodywork/filling-composition-accessories/filling-composition/universal-scraper/2k-spachtel-uni-9710g.html | code | Smoothing of fine to coarse bumps on bare steel, aluminum, galvanized steel and fiberglass materials.
Recoatable with all fillers and primers except 1k Primer WB.
Mixture: hardener 2% with Lesonal hardener for polyester filler.
Fine pore-free application
High filling power
Recoatable with all Lesonal basic materials
Highly stable on vertical surfaces
Easy to sand
Hardener 2% with Lesonal hardener for polyester filler.
Polyester materials may only be sanded dry.
Contents: 9.71 kg
Carton quantity: 2 | s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218187113.46/warc/CC-MAIN-20170322212947-00320-ip-10-233-31-227.ec2.internal.warc.gz | CC-MAIN-2017-13 | 502 | 12 |
https://pm.stackexchange.com/questions/14118/what-practices-would-allow-an-agile-team-to-work-effectively-when-every-develope | code | I may possibly inherit a new team which had toyed with Scrum but not found it the correct approach (largely due to the parallel not sequential nature of business projects).
They are working to a fairly effective Kanban system but the development team are unhappy. In previous roles they worked closely with customers and now they are just developers (their words) who report to a Product Owner of Project Manager who articulates the customer requirements.
Unfortunately this has led to a number of project delays as technical information or warnings from the developers are ignored until the Project Manager must return with their tail between their legs to the business customer and explain the timelines were unrealistic.
I have been asked to explore the feasibility of a development team where each developer could theoretically be assigned to a number of projects and be heavily embedded in the requirements gathering and backlog generation alongside the Project Manager or Product Owner. The management want to know if such an approach is still "Agile" which seems to be a fixation.
The senior Product Owner would still decide the priority of the projects coming into the environment but the developers would be responsible for the priority of tasks within each project in conjunction with a PM/Deputy PO.
What practices would lead to the potential success of such a system?
- Cross Functional 10 Man Development Team
- Full Stack Developers
- 3 Tier Environment
- Multiple ongoing high priority projects
- Current system is Kanban
- Toyed with Scrum
- Developers have no contact with business customers apart from occasional Sprint Review
- Customers hail from all business functions
- Project Managers are non-technical often ignoring development wisdom
- Management wish to explore Agile solution whereby;
- Developers can approach customers directly in conjunction with Product Owner
- Each User Story card is owned by a single developer
I know the temptation for some may be to fixate on the "Scrum did not work part" or the "developer is unhappy part" of the question but I gave that information for context. I feel confident in turning around the morale of the team and improving each individual's self worth. I am keen to explore whether a former Scrum team can survive when each developer is allowed to gather / re-prioritise requirements alongside a Product Owner.
Edit to Add
I know this question is somewhat theoretical and a bit more heavy than the normal fare at SE.PM but I felt if anyone could crowd source the cost-benefit of such an approach it would be here. :-) | s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296820065.92/warc/CC-MAIN-20240425000826-20240425030826-00723.warc.gz | CC-MAIN-2024-18 | 2,586 | 21 |
http://lockergnome.net/questions/150460/any-good-free-website-builders.html | code | My friend is asking me about is there any FREE website builders that you can save to documents so you can use your own FTP. Hes got an FTP but just wants to build the actual website.
Answer by Razor512 · May 05, 2011 at 09:39 PM
if you need, there many sites that offer free webspace, you can probably use their builders, then port the content over to your server.
Or you can download a free template then use a text editor to edit it.
Answer by geekomatic · May 05, 2011 at 10:33 PM
Found this a while ago now when I wanted to dabble in HTML but had zero idea how to begin. It let's you do a WYSIWYG while also seeing the code of the content. Very good in that respect. Unfortunately, no longer supported, but the freeware is still available.
Pagebreeze looks like another contender (though I've not personally used it). | s3://commoncrawl/crawl-data/CC-MAIN-2015-22/segments/1432207928114.23/warc/CC-MAIN-20150521113208-00111-ip-10-180-206-219.ec2.internal.warc.gz | CC-MAIN-2015-22 | 823 | 7 |
https://cve.reconshell.com/cve/CVE-2018-6964 | code | VMware Horizon Client for Linux (4.x before 4.8.0 and prior) contains a local privilege escalation vulnerability due to insecure usage of SUID binary. Successful exploitation of this issue may allow unprivileged users to escalate their privileges to root on a Linux machine where Horizon Client is installed.
|http://www.securitytracker.com/id/1040989||Third Party Advisory VDB Entry|
|http://www.securityfocus.com/bid/104315||Third Party Advisory VDB Entry|
Configuration 1 (hide) | s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100232.63/warc/CC-MAIN-20231130193829-20231130223829-00326.warc.gz | CC-MAIN-2023-50 | 481 | 4 |
https://discussions.unity.com/t/error-unable-to-parse-yaml-file/149468 | code | After changing the editor serialization to “Force Text” every time I start Unity this error shows up once: “Unable to parse YAML file: [mapping values are not allowed in this context] at line 1”
This error can lead to broken scenes: e.g. misaligned transform positions or broken Font/Sprite atlases but it only occurs very randomly.
We are currently using Unity Version 5.1.1p2 but I also tried with other versions (5.1.3p3 and 5.2.0f3) with the same result.
We tried deleting the library so that Unity will show the exact YAML errors after restart but apparently there aren’t any.
We also went through all serialized YAML files with a custom script to check for invald YAML code but everything seems fine - except that the “stripped” keyword is not parseable by any YAML parser, obviously because it doesn’t match the YAML specification.
See here for more info about this:
- Deserializing multiple documents in one file PLUS TAGS · Issue #140 · aaubry/YamlDotNet · GitHub
We even tried deleting all scene files but the error still shows up. Changing the serialization back to “Mixed” doesn’t help either.
How can we fix this problem? | s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510454.60/warc/CC-MAIN-20230928194838-20230928224838-00425.warc.gz | CC-MAIN-2023-40 | 1,159 | 9 |
https://gbatemp.net/threads/flying-memory-how-to-stop.119720/ | code | The DSTT is a great slot-1 cart. It is simple and fast although I have one very minor issue. The trans-flash memory chip slot is way too springy. I can shoot the chip across the room quite easily. This is great for a game of "find the chip". I have already implemented a simple solution by putting a piece of tape over the top; This also serves to "stealth" the cart a bit. Has anyone actually modified the cart to reduce/eliminate the springy-ness? Thanks in advance. | s3://commoncrawl/crawl-data/CC-MAIN-2018-30/segments/1531676591578.1/warc/CC-MAIN-20180720100114-20180720120114-00050.warc.gz | CC-MAIN-2018-30 | 468 | 1 |
https://support.hyland.com/r/OnBase/Application-Enabler/Foundation-23.1/Application-Enabler/Usage/Using-Contexts/RAC-Audit-Contexts/Audit-Search | code | This context is maintained for legacy purposes only.
Application Enabler allows you to conduct RAC Audit searches directly from the line-of-business application.
To conduct RAC Audit searches:
- Open and log in to RAC Administration.
- Navigate to a screen in the line-of-business application containing data that you will use to conduct a RAC Audit search.
- Perform the configured mouse/keyboard event on the line-of-business application screen.
- Depending on your authentication configuration, you may be prompted to enter a User Name and Password.
- Click Login. The search results will display in the RAC Audit Search interface. | s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474649.44/warc/CC-MAIN-20240225234904-20240226024904-00382.warc.gz | CC-MAIN-2024-10 | 634 | 8 |
https://www.boholchronicle.com.ph/2018/09/19/suspected-robbery-gang-member-shot-dead-in-danao/ | code | A man suspected of being a member of a robbery group was shot dead by an unidentified gunman in Danao on Sunday night.
Victim Jose Bambi Duac, 45, a native of Danao who temporarily lived in Balilihan, died on the spot, said SPO3 Ramil Gumapac of the Danao Police Station.
According to Gumapac, Duac was talking to a customer of his newly opened videoke bar when the motorcycle-riding gunman, who rode in tandem with another suspect, shot at him using a 9mm pistol.
Duac sustained two gunshot wounds in his chest, one in front and one at the side, which led to his instantaneous death.
Gumapac said that investigations were still being conducted to identify the suspects and motive behind the fatal gun attack.
Based on information gathered by investigators, Gumapac said that Duac was a member of the “Buak Gang,” a Carmen-based robbery group.
However, authorities have yet to confirm whether or not Duac was still an active member of the group.
Gumapac noted that Duac was back in Danao from Balilihan for just two weeks for the opening of his new videoke bar before his death. (AD) | s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296818337.62/warc/CC-MAIN-20240422175900-20240422205900-00731.warc.gz | CC-MAIN-2024-18 | 1,087 | 8 |
https://msdn.microsoft.com/en-us/library/system.runtime.interopservices.marshal.securestringtobstr(v=vs.110).aspx?cs-save-lang=1&cs-lang=vb | code | Marshal.SecureStringToBSTR Method (SecureString)
Assembly: mscorlib (in mscorlib.dll)
<SecurityCriticalAttribute> Public Shared Function SecureStringToBSTR ( s As SecureString ) As IntPtr
The managed object to copy.
Return ValueType: System.IntPtr
The address, in unmanaged memory, where the s parameter was copied to, or 0 if a null object was supplied.
The ZeroFreeBSTR method.method is useful for custom marshaling or when mixing managed and unmanaged code. Because this method allocates the unmanaged memory required for a string, always free the BSTR when finished by calling the
Notes to Callers:
This method is supported only on computers running Windows 2000 Service Pack 3 or later.
requires full trust for the immediate caller. This member cannot be used by partially trusted or transparent code.
Available since 2.0 | s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917121121.5/warc/CC-MAIN-20170423031201-00435-ip-10-145-167-34.ec2.internal.warc.gz | CC-MAIN-2017-17 | 826 | 11 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.