url
stringlengths
13
4.35k
tag
stringclasses
1 value
text
stringlengths
109
628k
file_path
stringlengths
109
155
dump
stringclasses
96 values
file_size_in_byte
int64
112
630k
line_count
int64
1
3.76k
https://pages.dataiku.com/keys-to-modern-data-architecture
code
Data architecture is both complex and constantly changing. How can it support the scaling of AI across an organization? This ebook provides three key recommendations, including inspiration from the modern data stack, for IT teams looking to build for the future of data democratization. Ultimately, the modern data stack is about providing a seamless experience for all users, no matter what their data needs are. It: Even for organizations that have a much more complex existing, legacy setup and therefore can’t fully leverage the simplicity of the modern data stack, the goal of providing a seamless experience for all users to work with data is a valuable takeaway. Scaling AI from a data architecture perspective requires rethinking the role of IT itself. Business objectives should inform data architecture — not the other way around. People across all lines of business, including those without formal data analysis training, need to be able to access and use data for their day-to-day work. That means providing people with the tools to access and use data is the core of IT’s role in the modern enterprise. To avoid becoming burdened with data processing and integration jobs, AI platforms (like Dataiku) can ease the burden on IT teams Dataiku was built from the ground up to be one central, controlled environment used by a range of profiles. This includes low-code analysts and no-code contributors on the business side. But it’s not just a low- and no-code solution. Dataiku and offers robust features to give IT teams maximum flexibility yet control over architecture: For those on the technical side — like data scientists, but also data engineers, architects, and more — Dataiku facilitates quick experimentation and operationalization for machine learning at scale.
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947476137.72/warc/CC-MAIN-20240302215752-20240303005752-00398.warc.gz
CC-MAIN-2024-10
1,794
7
https://teamtreehouse.com/community/what-else-do-i-have-to-do-to-make-this-work
code
Welcome to the Treehouse Community Want to collaborate on code errors? Have bugs you need feedback on? Looking for an extra set of eyes on your latest project? Get support with fellow developers, designers, and programmers of all backgrounds and skill levels here with the Treehouse Community! Looking to learn something new? Treehouse offers a seven day free trial for new students. Get access to thousands of hours of content and join thousands of Treehouse students and alumni in the community today.Start your free trial What else do I have to do to make this work? I am pretty sure about the instructions. It won't let me pass so can you tell me if you see something wrong. import sys start = input("If you want to start the movie press n or N. Press anything else to exit") if start.lower == 'n' print("Enjoy the show!") else: sys.exit() Daniel BoisselleFront End Web Development Techdegree Student 17,438 Points I entered this into the prompt and this worked for me: import sys response = input("If you want to start the movie press n or N. Press anything else to exit") if response == 'n' or response == 'N': sys.exit() else: print("Enjoy the show!")
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224644907.31/warc/CC-MAIN-20230529173312-20230529203312-00684.warc.gz
CC-MAIN-2023-23
1,158
10
https://addons.mozilla.org/en-US/firefox/addon/sensex-ticker/eula/29534?src=cb-btn-updated
code
To try the thousands of add-ons available here, download Mozilla Firefox, a fast, free way to surf the Web!Close Welcome to Firefox Add-ons. Choose from thousands of extra features and styles to make Firefox your own.Close Sensex Ticker 0.21.1-signed End-User License Agreement Sensex Ticker requires that you accept the following End-User License Agreement before installation can proceed: You may obtain a copy of the License atrnhttp://www.mozilla.org/MPL/ All changes made to the extension, must keep an easy access to the about box. And keep author and home page easily easily accessible. Software distributed under the License is distributed on an "AS IS" basis, WITHOUT WARRANTY OF ANY KIND, either express or implied. The Initial Developer of the Original Code is Kapil Chhabra. Copyright (C) 2008, Kapil Chhabra ([email protected]) All Rights Reserved. Alternatively, if you need any other type of licence/agreement, Please mail me: [email protected] This add-on is not compatible with your version of Firefox because of the following:
s3://commoncrawl/crawl-data/CC-MAIN-2016-07/segments/1454701153998.27/warc/CC-MAIN-20160205193913-00153-ip-10-236-182-209.ec2.internal.warc.gz
CC-MAIN-2016-07
1,057
12
https://pypi.org/project/lizard-structure/0.1/
code
Structure of Lizard, defined and documented in a REST interface Lizard-structure project documentation Tagline of this app: structure of Lizard, defined and documented in a REST interface. Reinout van Rees started this library. Changelog of lizard-structure Documented the four core Lizard concepts. [reinout] Set up documentation generation at https://lizard-structure.readthedocs.org/ . [reinout] Set up testing on travis: https://travis-ci.org/lizardsystem/lizard-structure . [reinout] Removed lizard-ui dependency. [reinout] Initial project structure created with nensskel 1.30.dev0. [reinout] Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446710924.83/warc/CC-MAIN-20221203043643-20221203073643-00002.warc.gz
CC-MAIN-2022-49
708
11
https://hannahmumby.co.uk/
code
FacilitationI create reflective spaces where I help teams explore and learn from the tangled knots of their collaborative work. I use Creativity and Curiosity to Help People Collaborate Better. I specialise in helping people delve into the messy process of Co-Production, using effective facilitation practices and an interactive tool called The Co-Production Oracle that I created with the University of Exeter. What is Co-Production? “Co-production is an uncomfortable process. Co-production is losing control. Co-production is contamination and cross-pollination of different worldviews, seeking to break the monopoly of any one perspective to tackle the challenges we are facing as a collective. Co-production is not only putting yourself in the shoes of others, but allowing their voices, experiences and even their recalcitrant views to shape your own beloved projects, and ideas.” - Dr Ernesto Schwartz, University of Exeter
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296816832.57/warc/CC-MAIN-20240413180040-20240413210040-00041.warc.gz
CC-MAIN-2024-18
935
6
http://limtorrent.com/why-data-science-is-widely-used/
code
Revolution of Data Science has altered the entire world with its basic effects. It’s a study of information or advice, what it signifies, from where it’s accessed and how to change it into a precious method when inventing business and IT policy. It’s thought of as a biggest asset by each organization in now 's aggressive world. It is among those areas that find software across different business, including communicating, finance, manufacturing, health care, retail etc. ) - The health care industries have profited from Data Science since it produces a down-to-earth therapy difficulties, diagnostic, individual tracking such as medical administrative expenditures and a overall price for healthcare. It’s been a potent weapon for combating diabetes, various heart disease and cancer. - The information science gives a massive chance for the financial company to reinvent the company. In finance, the use of information science is Automating Risk Management, Predictive Analytics, Handling customer information, Fraud detection, real-time Analytics, Algorithmic trading, Consumer Analytics. - From the production industry, itcan be utilised at a great deal of ways as the firms are needing to locate the most recent options and use cases with this particular information. Additionally, it has been valuable to the production firms as it accelerate implementation and creates large scale procedure. - The domain retail has grown quickly. It enables the retailer to handle data and make a psychological image of the client to learn their tender points. Thus, this trick employed by the merchant will affect the client readily. Types of Jobs Offered in Data Science. The need of people with great skills in this discipline is high and will continue to raise. Data Science professionals have been hired with the biggest names in the industry that tend to cover huge salary to the expert professionals. The kinds of jobs include: - Information Scientist: An info scientist is a person who deciphers huge quantities of information and extracts significance to assist a company or firm to increase its operations. They utilize different tools, methodologies, data, algorithms, techniques and so to further analyze information. - Company Intelligent Analyst: To be able to examine the present status of an organization or at which it stands, a Business Analyst utilizes information and looks for patterns, company trends, relationships and includes a report and visualization. - Data Engineer: An info engineer also works with substantial volume of information extracts, cleanses and generates sophisticated algorithms for information company. - Information Architect: Data Architect functions with system developers, users and programmers to keep and protect data resources. - Machine Learning Engineer: A machine learning engineer functions with numerous algorithms associated with machine learning such as clustering, decision trees, classification, arbitrary forest and so forth. What are the prerequisites to be a Data Science professional? From the IT industry, the instructional requirements of information science are precipitous. Data Scientist position requirement for advanced levels like Master's degree, PhD or MBA. Some companies will take a four-year mentor 's degree in Computer Science, Engineering and Hard Science, Management Information System, Math & Statistics, Economics. Data Science tools are also available on the internet and a few educational suppliers also provide online training of this program. These training focus on the technology and abilities needed to be a information scientist such as Machine learning, SAS, Tableau, Python, R and a lot more. Machine Learning vs Data Science Machine Learning is a custom of analyzing algorithms and data and coaching the computer to carry out a particular job for the recognition of particular data. When a pair of information is provided as input by employing certain calculations, the machine provides us the desired outcome.
s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590347413786.46/warc/CC-MAIN-20200531213917-20200601003917-00396.warc.gz
CC-MAIN-2020-24
4,005
17
https://byjus.com/cbse-notes/cbse-class-8-maths-notes-chapter-16-playing-with-numbers/
code
What is the General Form of Numbers? If a two digit number pq needs to represented in general form, then Divisibility by 9 and 3 If a number X has the sum of its digits divisible by 3 and 9, then the number is divisible by 9 and 3. For example, let’s see the divisibility of the number 15287 by the number 3. Let’s see the addition of the digits in the given number 1+5+2+8+7 =23 and the number is not divisible by 3. Therefore, 15287 is not divisible by 3 Let’s see another example of a three digit number 24x which is divisible by 9 and what is the value of x. The addition of the digits 2+4+x=6+x should be divisible by 9 and this results in the values 6 + x =9 or 18 and since x is a single digit, therefore, 6 + x = 9, x= 3 Reversing the Digits in a number with 2 digits Lets us assume a number ab in which a is in the tens place and b is in the units place. And then the representing numbers in general form results in ab=10a+b. Reversing the number will result in the form ba=10b+a. After adding the two number, we get : (10a+b) + (10b+a)=11a+11b=11(a+b) The given number is a multiple of 11. Reversing the Digits in a number with 3 digits The general form of a number of three digits is abc=100a+10b+c. After reversing, the number will be cba=100c+10b+a - If a>c, the difference between the numbers will be - Similarly, if c>a, then the difference will result in 99(c-a) - If a=c then difference is 0 - Find out the value of y if 21y5 is divisible by 9 and y is a number - Find out the value of z if 31z5 is divisible by 9 and z is a number - Find out the value of x if 24x is divisible by 3 and x is a digit - Find out the value of z if 31z5 is divisible by 3 and z is a digit
s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250606696.26/warc/CC-MAIN-20200122042145-20200122071145-00442.warc.gz
CC-MAIN-2020-05
1,691
22
https://chess.stackexchange.com/questions/40501/have-there-been-gms-playing-consistently-super-risky
code
Three things I don't mean with super-risky: - Tal was a risky player but he could calculate extremely well and had reasons to believe that if a refutation of his sacrifices exist, the opponent wouldn't find it (only today's engines). - In a lost position anything is fair game, so no point of thinking about the objective centipawn value of a move. - In rapid games you can risk far more anyway. I thus define a super-risky move as a trap in about equal position in a tournament game that can be seen through by the average opponent (say, GM level) and ends up to the disadvantage of the trapper. (That's surely not 100% objective but shall suffice.) Have there ever be any GMs (especially including GM-strength players before the title existed) playing consistently super-risky? (I throw at least one suggestion into the room: Dawid Janowski.)
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764499744.74/warc/CC-MAIN-20230129144110-20230129174110-00338.warc.gz
CC-MAIN-2023-06
844
6
https://github.com/kdart/pycopia/tree/master/QA
code
Fetching latest commit… Cannot retrieve the latest commit at this time. |Type||Name||Latest commit message||Commit time| |Failed to load latest commit information.| ========== Pycopia-QA ========== Pycopia QA package. Pycopia packages to support professional QA roles. A basic QA automation framework. Provides base classes for test cases, test suites, test runners, reporting, lab models, terminal emulators, remote control, and other miscellaneous functions. There is a remote control agent that uses a subset of Pycopia to allow controlling Linux and Windows hosts for distributed testing. There is also an ANSI terminal emulator that can be used as a stream filter for console applications (simplifying automation).
s3://commoncrawl/crawl-data/CC-MAIN-2019-43/segments/1570987803441.95/warc/CC-MAIN-20191022053647-20191022081147-00022.warc.gz
CC-MAIN-2019-43
721
5
http://www-10.lotus.com/ldd/lewiki.nsf/xpDocViewer.xsp?lookupName=Lotus+Expeditor+6.2.3+Documentation&res_title=Publishing_the_properties_XPD623&content=pdcontent
code
One of the interesting aspects of this Lotus Notes ® view container is the way that the values are published when more than one document is selected. The idea is to emulate the copy/paste functionality of a spreadsheet. This idea means that if multiple documents are selected, you can publish the values with carriage return line feeds to separate each property from each document. This approach can be taken one step further by supporting properties with multiple values in them (when a list is returned for a single property). These values are published with a \t or the tab character. This approach makes it easy to take the values from the selections and place them in a table on the target end. For more details, consult the publish() method in the full source provided in the next section, Notes View container class implementation Parent topic: Implementing a Lotus Notes view container
s3://commoncrawl/crawl-data/CC-MAIN-2016-50/segments/1480698542665.72/warc/CC-MAIN-20161202170902-00200-ip-10-31-129-80.ec2.internal.warc.gz
CC-MAIN-2016-50
894
5
https://extpose.com/ext/205635
code
The ultimate search extension for C/C++ The ultimate search extension for C/C++. https://cpp.extension.sh ⭐️ Features - Search standard library docs - Offline mode supported - Builtin commands (:header, :posix and :history etc) ⭐️ How to use it Input keyword cc in the address bar, press Space to activate the search bar. Then enter any word you want to search, the extension will response the related search results instantly. - (2022-08-29) Dmytro Shestakov: Very handy - (2022-03-07) m ustaches: I use it all time. Thank you very much! - (2021-11-04) Khalil Estell: Use this extension literally everyday and it makes looking up details in C++ so much faster. This is a great too for C++ power users. - (2021-04-20) Luna Lucadou: This extension is perfect! Chrome never seems to suggest cpp docs from my history (probably because of std:: being mistaken for a protocol, and "thread", "string", etc. being too generic), so this saves those extra clicks to get to them. - (2021-03-21) Tom Pekrul: Awesome! - (2020-10-01) Darius-Florentin Neațu: Awesome! You can directly open a page for a feature/entity from docs. - (2020-09-30) Bifidy CAPs: Cool! Search C/C++ docs in the address bar is definitely a genius idea! You're a genius! - (2020-09-30) Folyd Dur: Awesome extension! Can't believe this is so handy to search cppreference.com docs! - (2021-03-30, v:0.2.0) Kurama o: games you should make that it can build games
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296944452.97/warc/CC-MAIN-20230322211955-20230323001955-00457.warc.gz
CC-MAIN-2023-14
1,429
12
https://www.aviation.govt.nz/licensing-and-certification/medical-certification/medical-manual/part-3-clinical-aviation-medicine/cardiovascular-system/atrio-ventricular-block/
code
First degree heart blocks are common and often the result of high vagal tone. In this situation, increasing the heart rate to a higher level, i.e. 100 bpm or more, by doing some exercise, and repeating the ECG, should see a normalisation of the PR interval. A conduction defect must be suspected if the PR interval does not normalise, or if the PR interval increases over time. The PR interval can occasionally be found to be very prolonged. If normalising with exercise, this is likely to be due to a very high vagal tone in a healthy individual. The combination of AV block and a bundle branch block however suggests the existence of a conduction tissue disorder. Mobitz I (Wenkebach) AV block may be seen in normal individuals during sleep. However, the presence of second degree block requires investigation as those can occasionally progress to complete block. Mobitz II AV block and complete heart blocks are generally not acceptable. On the first occasion that the PR interval is abnormal (i.e. ≥210 ms); or if the PR interval has increased since last investigated.
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817081.52/warc/CC-MAIN-20240416093441-20240416123441-00200.warc.gz
CC-MAIN-2024-18
1,074
6
https://www.lawpracticetipsblog.com/2005/07/making-copies-of-unsent-e-mails.html
code
Readers may ask "Why would anyone want to make a copy of an unsent e-mail?" Like so many tech tasks, once I learned how to do it, then I came up with many reasons why to do it. I might have drafted a long important e-mail and wanted someone else to review it before I sent it to the intended recipient, so I make a copy and e-mail it to the other. Or I am sending the exact same e-mail to ten people, but not as a group, like RFP’s. Or, like last week, when my son’s team won the Pee Wee Baseball Championship in Norman, OK, and I created an e-mail with imbedded pictures of him with his team (and the trophy) that I wanted to send to several different groups of friends. Or I’m sending out an e-mail to a very large people, but only want to send it out in groups of twenty to avoid spam filters. Or, perhaps most importantly, I want to create a collection of "form e-mails" to be used when needed. Well, I do this frequently and it may prove useful to some of you. In the open (and completed) Outlook e-mail, click on File and then Copy to Folder. I usually copy unsent e-mails to the Drafts folder. Note that you can create many copies of the same e-mail in the same folder, as opposed to a file, where one file with the same name overwrites the prior file. The same method can be used to make copies of e-mails you have received, but dragging and dropping those to a folder usually seems quicker.
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679099281.67/warc/CC-MAIN-20231128083443-20231128113443-00783.warc.gz
CC-MAIN-2023-50
1,405
3
https://lists.debian.org/debian-user/2009/03/msg02603.html
code
Installation with multiple Software RAID devices + LVM I'd like to install Lenny into existing LVM volume group built top of Software RAID-1 physical volumes like this: PV VG Fmt Attr PSize PFree /dev/md0 LVM_VG_2 lvm2 a- 50,13G 0 /dev/md1 LVM_VG_2 lvm2 a- 14,80G 80,00M Personalities : [raid1] md1 : active raid1 hda9 hdc6 15518686 blocks super 1.2 [2/2] [UU] md0 : active raid1 hda7 hdc5 52564544 blocks [2/2] [UU] Partitions are type "fd Linux raid autodetect" and autodetected fine using existing installation (mix of etch and lenny). I used "priority=medium" boot option to give more control during install. But Lenny installer or kernel doesn't autoassemble md1, only md0. I think it should bring md1 up too. Could it be about superblock version (md1 has version 1.2 superblock). Why version 0.90 is default? As workaround how I assemble array manually from installer without erasing (I'm not subscribed)
s3://commoncrawl/crawl-data/CC-MAIN-2017-47/segments/1510934804610.37/warc/CC-MAIN-20171118040756-20171118060756-00344.warc.gz
CC-MAIN-2017-47
910
19
https://www.bankrollmob.com/forum.asp?mode=thread&id=484003
code
Joined: Feb '13 Age: 45 (M) Just hit the break and now down to last 101 players from 1159 entries. Sitting in 52nd of 101 after taking big hit to stack with AK vs QQ and them hitting set on flop and me dead pretty much. But managed to win some chips back and double back up with A5 vs K10s and nobody hitting anything an me doubling. AK really playing some tricks fr me today and costing many chips. Had another great run cut down so ugly in a $2.50 180 player turbo when AA vs KK vs Q10 and KK spikes river set to crush my dreams. would've been chip leader almost 3-1 at that pont but managed to finish top 18 for profit atleast. Be back later on with another update. ------------ My dude you are my idol mang! Another great treat for your recent great run. Good luck again mate and mash that tourney! ------------ blew up out in around 80th for 13$. another profit but can't seem to get over hump to make real money. Edited by TheIrish77 (23 February 2018 @ 22:20 GMT) Hello the Irish77... Any new updates yet,..you still in the tournament,. Hope tommorow i see a reply,..with awesome news that you bag some nice amount off hard csh Gl with the tournament iff you still in ,..and good luck with the other games you going to play,.. May the pokergods be with u Joined: Mar '09 Age: 46 (F) You busted early this time, but still, you made a decent profit for your buy in. And this tournament has lots of players, over 1k of them. SO it is not such an easy task to final table. Besides your A game you need plenty of luck too. Better luck in your next game. Joined: Mar '14 Age: 49 (M) Well done to TheIrish77 on finishing in the money in the US$4,000 guaranteed tournament. US$13 is not a bad return on your little investment. It must have been appalling when a 2-outer King spiked on the river. 13 $ its okay iff you got youre money back i guess,.. But its a shame you didnt get any further,.. I use to play the 60 k 1.10 rebuy,.. Sometimes with a nice stack,...but seems that game never suits me cus i always busted with the best hand before the flops and then loose
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506528.3/warc/CC-MAIN-20230923194908-20230923224908-00705.warc.gz
CC-MAIN-2023-40
2,067
19
https://www.getrecall.ai/summary/stanford-online/stanford-ee364a-convex-optimization-i-stephen-boyd-i-2023-i-lecture-10
code
Stanford EE364A Convex Optimization I Stephen Boyd I 2023 I Lecture 10 - Penalty functions describe the irritation with a residual of a certain value. - The goal is to minimize total irritation by minimizing the sum of these penalties. - L1 (Lasso) penalty functions are sparsifying, often resulting in many zero entries in the solution to an optimization problem. - L1 penalties are relatively relaxed for large residuals and upset with small residuals, while quadratic penalties are the opposite. - Huber penalties blend quadratic and L1 penalties, matching least squares for small residuals and resembling an L1 penalty for large residuals. - Regularized approximation is a criterion problem with multiple objectives, often involving tracking a desired trajectory, minimizing input size, and minimizing input variation. - Weights (Delta and Ada) shape the solution and can be adjusted to achieve desired results. - Changing the penalty function to the sum of absolute values (L1) would likely result in a sparse solution. - Sparse first difference means that most of the time the value is equal to the previous value, encouraging piece-wise constant inputs. - Signal reconstruction aims to form an approximation of a corrupted signal by minimizing a regularization function or smoothing objective. - The trade-off in signal reconstruction is between deviating from the given corrupted signal and the size of the smoothing cost. - Cross-validation can be used to select the amount of smoothing by randomly removing a portion of the data and pretending it is missing. - When the penalty is an L1 Norm on the first difference, it is called the total variation, and the solution is expected to have a sparse difference corresponding to a piece-wise constant approximation. - Total variation smoothing preserves sharp boundaries in images. - Excessive regularization of total variation denoising results in a cartoonish effect with constant grayscale values in different regions. - Robust approximation addresses uncertainty in the model by ignoring it or taking an average of possible values. - The most common method for handling uncertainty in practice is to ignore it or use a mean and variance as a probability distribution. - A better approach is to simulate multiple scenarios or use an educated guess to account for uncertainty. - Regularization in machine learning and statistics addresses uncertainty in data. - Different approaches to handling uncertainty include stochastic methods, worst-case methods, and hybrids of these. - Stochastic methods assume that the uncertain parameter comes from a probability distribution. - Worst-case methods assume that the uncertain parameter satisfies certain constraints. - Robust stochastic methods combine elements of both stochastic and worst-case methods. - A simple example illustrates the different methods and their effects on the resulting model. - A practical trick for handling uncertainty is to obtain a small number of plausible models and use a min-max approach. - The speaker discusses how to generate multiple plausible models when faced with uncertainty in data. - One approach is to use bootstrapping, which is a valid method in this context. - Another principled approach is to use maximum likelihood estimation and then generate models with parameters that are close to the maximum likelihood estimate. - The speaker introduces the concept of stochastic robustly squares, which is a regularized least squares method that accounts for uncertainty in the data. - Regularization, such as Ridge regression, can be interpreted as a way of acknowledging uncertainty in the features of the data. - The speaker provides an example of a uniform distribution on a unit disc in Matrix space to illustrate the concept of uncertainty in model parameters. - The speaker emphasizes the importance of acknowledging uncertainty in data and models, and suggests that simply admitting uncertainty can provide significant benefits. Maximum Likelihood Estimation - The video discusses statistical estimation, specifically maximum likelihood estimation. - Maximum likelihood estimation aims to find the parameter values that maximize the likelihood of observing the data. - The log likelihood function is often used instead of the likelihood function since maximizing both functions is equivalent. - Regularization can be added to the maximum likelihood function to prevent overfitting. - Maximum likelihood estimation is a convex problem when the log likelihood function is concave. - An example of a linear measurement model is given, where the goal is to estimate the unknown parameter X from a set of measurements. - The log likelihood function for this model is derived and shown to be convex when the noise is Gaussian. - The maximum likelihood solution for this model is the least squares solution. - The noise distribution can also be Laplacian, which has heavier tails than a Gaussian distribution. - Maximum likelihood estimation with Laplacian noise is equivalent to L1 estimation. - L1 estimation is more robust to outliers compared to least squares estimation because it is less sensitive to large residuals. - The difference between L2 fitting and L1 approximation can be explained by the difference in the assumed noise density. - Huber fitting can be interpreted as maximum likelihood estimation with a mixture of Gaussian and exponential distributions. - Logistic regression is a model for binary classification where the probability of an outcome is modeled using a logistic function. - The logistic map corresponding to the maximum likelihood is infinitely sharp because making it less sharp would drop the probability and lose log likelihood. - When the log-likelihood is unbounded above, it means the data are linearly separable, and this issue can be fixed by adding regularization. - In basic hypothesis testing, a randomized detector is a 2xN matrix that determines the probability of guessing the distribution from which an outcome originated. - The confusion matrix, or detection probability matrix, is obtained by multiplying the randomized detector matrix by the probability distributions P and Q. - The goal is to have the detection matrix be an identity matrix, indicating perfect accuracy in guessing the distribution. - The choice of the randomized detector involves a multi-criterion problem, balancing the probabilities of false negatives and false positives. - In some cases, an analytical solution exists for the optimal randomized detector, resulting in a deterministic detector. - The likelihood ratio test is a simple method for determining the distribution from which an outcome originated based on the ratio of P over Q. - In infinite dimensions, determining the density of two continuous distributions can be done by comparing their ratio to a threshold. - Deterministic detectors can be used to classify data points based on their density ratio. - Other approaches, such as minimizing the probability of being wrong, can also be used for classification. - These approaches often result in non-deterministic detectors.
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817144.49/warc/CC-MAIN-20240417044411-20240417074411-00040.warc.gz
CC-MAIN-2024-18
7,104
60
https://www.jesperjoneros.com/project01
code
AI Bird Companion made in Group Engine "Dog Engine" My goal with this project was to create a companion, that felt like a real bird following you. One problem I needed to solve was that birds always need to move in the air and I wanted it to move naturally, not just moving in a circle around the player. I also wanted it to seem like it had a mind of its own, taking detours and interests in the environment. Beside following the player, I wanted the bird to be able to guide the player through objectives. Not deciding how you complete the quest but helping you to find the way. I started with adding a circle that follows the player. The companion follows a position, that it determined from an angle that is scaled by time. When the companion reaches its heading position, a tick function is called which gives the companion a new position on the circle. The next step was to get more circles with intersection points where the companion could change which circle and direction to follow. I made it possible to ajdust the number of circles and each circles size and rotation. I did this to make it easier to get a good result. Here I changed how the companion moves. instead of just setting a position, it moves in a forward direction. This makes the companion movement more smooth and less circular. I added a noise and used amplitude to make the y-axis non-linjar. I also adjusted the circles it follows so that it can not fly outside the screen. I changed the speed of the bird to be higher when it flies downwards and slower upwards. The small yellow spheres are positions that the bird uses to rotate towards. It does that sometimes, to make it look less like an airplane. I also made the bird look up or down depending on its direction. Guiding different objectives I started with making it possible to choose how many objectives and how many guiding points there should be for each objective. I made the companion fly straight towards the next guiding point when the player got within a certain distance of the current guiding point. When the bird reaches the next point, it "alarms" the player with a red sphere expanding. Then I added a Takeoff, InAir and a Landing node in the behavior tree. The takeoff and landing node use curves that the bird follow. The curve is adjustable. Between takeoff and landing it just flies straight. I updated the movement between guiding points. Now the whole path can be change using a curve tool. I use the value on the curve to calculate what y-position the bird should have. The bird also rotates up and down depending on if it is going to fly upwards or downwards. Implemented wander behavior so that the bird does not fly straight to the next guiding point. The player has a circle around him that updates its center postion when the player moves outside of the circle. If the player stays inside the circle for a little while, the bird will land on the ground. As soon as the player moves outside the circle and it updates its middle position the birds start following the player again. If I Had More Time If I had more time I would make the bird avoid other meshes. My first approach would be using raycasts in front and on the sides of the bird. If they hit something of a certain layer, I would have increased the rotation speed and got a slightly narrower curve to avoid the obstacle. Wander Behavior for Guiding I would have spent more time polishing the wander behavior when the bird flies between guiding points. I would start by using perlin noise that I can use with an amplitude to offset it horizontally. When it lands I would lower the amplitude value to get it to approach its target more accurately. The same would go for taking off from a point, so that it would not get too much offset in the beginning. Then, as I do now, I would use an adjustable curve to determine the height of the path. I started on a behavior that makes the bird fly and land on the ground if the player is within a certain circle for a while. With more time, I would have worked on the movement when landing and taking off. Also been able to tag "landing spot" positions in our editor on for example trees, signs etc. Curve Tool and Debug Drawer: Filip Tynell Player Model: Ditte Frederiksen Player movement: Simon Broqvist Player Animations: Jacky Coh
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296943484.34/warc/CC-MAIN-20230320144934-20230320174934-00524.warc.gz
CC-MAIN-2023-14
4,295
26
https://forum.arduino.cc/t/arduino-and-dc-motor-is-it-possible/6399
code
Maybe this is a silly question, but I would like to ask if is possible to control a dc motor with arduino mini (pro 5v, Atmega 328) using a L293D motor driver. I have to admit that I’m not exactly an expert but I’m already used to make some stuff with arduino. I previously made a simple circuit with arduino duemilanove and I was wondering if is a good idea to adapted it to arduino mini. I want to make it small… Any idea! Thanks in advanced!
s3://commoncrawl/crawl-data/CC-MAIN-2021-39/segments/1631780058467.95/warc/CC-MAIN-20210927181724-20210927211724-00312.warc.gz
CC-MAIN-2021-39
450
4
https://rdrr.io/cran/partR2/man/mergeR2.html
code
Description Usage Arguments Details Value Examples The function merges partR2 object based on a full model with interactions with a partR2 object based on a reduced model without interaction. The reduced model is used to infer main effect semi-partial R2s. This function essentially takes over the complete partR2 object for the full model and adds semi-partial R2s which have been calculated based on the reduced model and are not already present in the full model partR2 object (which can be main effects). The function also combines the bootstrap estimates, accessible with partR2_obj$R2_boot. partR2 object for the full model, with the interaction (but not the main effects) in partvars. other partR2 objects, which do not contain the interaction so that the semi-partial R2s for the main effects could be calculated. This function is experimental and should be used with caution. See vignette or paper on how to use it to obtain semi-partial R2s for main effects which are also involved in interactions. Returns an object of class partR2, which takes most components from the full model except for semi-partial R2s. 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 data(biomass) library(lme4) # scale data biomass <- lapply(biomass, function(x) if (is.double(x)) scale(x) else x) # Full model mod_full <- lmer(Biomass ~ Year + Temperature * Precipitation + SpeciesDiversity + (1|Population), data = biomass) # Semi-partial R2 for interaction and all other predictors of interest (R2_full <- partR2(mod_full, partvars = c("Temperature:Precipitation", "SpeciesDiversity", "Year"), data = biomass)) # model without interaction to get main effect semi-partial R2s mod_noIA <- lmer(Biomass ~ Year + Temperature + Precipitation + SpeciesDiversity + (1|Population), data = biomass) (R2_noIA <- partR2(mod_noIA, partvars = c("Temperature", "Precipitation"), data = biomass)) # combine both (R2_comb <- mergeR2(R2_full, R2_noIA)) Add the following code to your website. For more information on customizing the embed code, read Embedding Snippets.
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296949331.26/warc/CC-MAIN-20230330132508-20230330162508-00636.warc.gz
CC-MAIN-2023-14
2,044
12
http://lists.gnu.org/archive/html/help-gnu-emacs/2007-10/msg00431.html
code
Does anyone know how to change the size of windows automatically created by various hooks? E.g., when I invoke latex-run-command, I would like the automatically created *tex-shell* buffer to be resized to a smaller height. Or more ambitiously, I would like the entire frame to be made taller and *tex-shell* window smaller, etc. How can I achieve this?
s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578681624.79/warc/CC-MAIN-20190425034241-20190425060241-00337.warc.gz
CC-MAIN-2019-18
352
2
https://www.headhonchos.com/jobs/mobile-head-senior-management-technology-internet-ecommerce-noida-258197.html
code
Responsibilities & Duties: Must have minimum 6-8 years of exp. Minimum 4-5 years on core mobile platform --both on IOS and android (development). Experience in handling team (minimum team size 2-8) - both on IOS and android. Should have Mobile UI and mobile product development experience. Should have a very strong understanding of how mobile impacts business/consumers. Working in close-co-operation with Marketing, engineers, product team, user experience Specialists, testers, and technical developers (Android, IOS) to deliver first-class mobile applications. Continuously discover, evaluate, and implement new technologies to maximise development efficiency. Strong inter-personal skills and ability to work in a collaborative environment
s3://commoncrawl/crawl-data/CC-MAIN-2016-50/segments/1480698540698.78/warc/CC-MAIN-20161202170900-00234-ip-10-31-129-80.ec2.internal.warc.gz
CC-MAIN-2016-50
744
10
http://squtch.quiet-like-a-panther.org/story/added_chat_to_the_site-85
code
Added chat to the site I just added a module called Chatbox to the site. A friend of mine was looking in to chat software, and I decided to give it a go to see how it works out. To use it, you will need to register and login. Then go down the left column to find the link to join the chatbox. I set the refresh to 20 seconds for now, at least till I see how much of a load it puts on the server.I doubt that it will be all that much, and I will be able to crank it up to a 10 second refresh after a while. Of sourse there needs to be a couple of people around at the time for it to be of any use. I'm online most afternoons.
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917121528.59/warc/CC-MAIN-20170423031201-00642-ip-10-145-167-34.ec2.internal.warc.gz
CC-MAIN-2017-17
624
4
http://www.linuxquestions.org/questions/linux-networking-3/packet-forwarding-from-eth0-to-eth1-isn%27t-working-551892-print/
code
Packet Forwarding from eth0 to eth1 isn't working I have a FC6 machine, kernel 2.6.18. I'm trying to forward packets from my eth0 interface to eth1 interface. It is not working. I have disabled the firewall as well. Eth0 is on the network : 192.168.11.0 , netmask - 255.255.255.0 Eth1 is on the network : 172.16.0.0, netmask - 255.255.255.0 I have done the following settings in my machine: 1. Turned ON the packet forwarding by setting net.ipv4.ip_forward to 1 in the /etc/sysctl.conf file. 2. Added static routes to the file static-routes in /etc/sysconfig. The contents of this file are as under: any: host 172.16.0.202 dev eth0 any: host 172.16.0.203 dev eth0 any: host 172.16.0.204 dev eth0 any: host 172.16.0.205 dev eth0 any: host 172.16.0.206 dev eth0 any: host 172.16.0.207 dev eth0 any: host 172.16.0.208 dev eth0 any: host 172.16.0.209 dev eth0 any: host 172.16.0.210 dev eth0 any: host 172.16.0.211 dev eth0 any: host 172.16.0.212 dev eth0 any: host 172.16.0.213 dev eth0 any: host 172.16.0.214 dev eth0 any: host 172.16.0.215 dev eth0 any: host 172.16.0.216 dev eth0 any: host 172.16.0.217 dev eth0 The same configuration works on my other FC2 machine, kernel 2.6.5 Please suggest what's wrong with the FC6 machine. Is there any more setting to be done in the FC6 box? Thanks and regards, When I routed my desktop through my laptop in order to have access to my wireless router, I didn't add host routes like you are doing. However, I found out that I needed to modprobe ip_conntrack before it would work. |All times are GMT -5. The time now is 07:34 PM.|
s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218186530.52/warc/CC-MAIN-20170322212946-00154-ip-10-233-31-227.ec2.internal.warc.gz
CC-MAIN-2017-13
1,568
28
https://mail.python.org/pipermail/python-list/2017-April/721557.html
code
Quote of the week tjreedy at udel.edu Tue Apr 25 13:11:07 EDT 2017 On 4/25/2017 6:32 AM, Steve D'Aprano wrote: > "If it's not important enough to require tests it's not important enough to > be in Python." -- Ethan Furman The original had a smily ';)' at the end. In the context of debating how to improve python from where it is now, I do not find the quote very helpful, as it glosses over real difficulties of testing. I will try to explain in the original thread. Terry Jan Reedy More information about the Python-list
s3://commoncrawl/crawl-data/CC-MAIN-2019-30/segments/1563195524475.48/warc/CC-MAIN-20190716015213-20190716041213-00080.warc.gz
CC-MAIN-2019-30
522
12
http://nextgoalwins.com/overview.php?section=league
code
You can view the progress of other managers in your league. It shows the total, this weeks and last weeks points. You can also pick a kit for your team which appears in that table. The league page also shows recent transfers of players between teams in your league. Share a bit of friendly banter with the other managers in your league on the forums. Use the graph feature to compare your team's progress against other teams in your league. There are a range of different stats to plot on the graphs.
s3://commoncrawl/crawl-data/CC-MAIN-2019-13/segments/1552912202698.22/warc/CC-MAIN-20190322220357-20190323002357-00373.warc.gz
CC-MAIN-2019-13
500
4
https://codedump.io/share/MO3r0M3Y76TT/1/db2start-in-linux-redhat-7
code
I created a partition in linux redhat using xfs system and installed db2 product in this partition. I installed db2instance using response file and automatically created a user with bash-4.2 . This has been tried in centos and it works but the environment of the console is not the same. Why is db2start command not found in redhat linux 7? has been done using manually create /.bash_profile and /.bashrc in user db2inst1 and set profile to db2path/db2profile
s3://commoncrawl/crawl-data/CC-MAIN-2017-47/segments/1510934806124.52/warc/CC-MAIN-20171120183849-20171120203849-00420.warc.gz
CC-MAIN-2017-47
459
3
https://community.yellowfinbi.com/topic/how-do-i-limit-report-to-last-10-non-sequential-dates
code
How do I limit report to last 10 non sequential dates? I am trying to build a report showing last 10 events based on event date. My problem is that the Top N advanced functions used in tutorials & examples are not available for datetime fields, so how do I rank using the date? I cannot use the ID field as they are not in sequence with the event date field. Other option is to sort by event date, then set the report row limit to 10, but then Yellowfin displays the truncated data set message which I don't want. Any ideas to get around this?
s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656103983398.56/warc/CC-MAIN-20220702010252-20220702040252-00207.warc.gz
CC-MAIN-2022-27
543
6
https://discourse.webflow.com/t/dot-lottie-extension-animations-dont-load-on-code-export/240807
code
I have noticed that upon exporting code from webflow to Hostinger (linux hosting) which includes the animation files, The .lottie extension animations are not working anymore, however .json extension lotties are working fine. Here is the link - Webflow version - https://boat-watch.webflow.io/ Exported version - https://metaminds.studio/Portfolio_watch/index.html Only the scroll based animations (which were in .lottie) are no longer visible. So either this is happening because they are scroll based or because they are in .lottie extension. I have noticed people have encountered similar problem before in the forum, but couldn’t find a solution that worked for me. PS - Someone mentioned adding a special id tag from webflow, but couldn’t understand it.
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224655244.74/warc/CC-MAIN-20230609000217-20230609030217-00767.warc.gz
CC-MAIN-2023-23
762
9
https://docs.microsoft.com/en-us/azure/migrate/tutorial-assess-hyper-v
code
Assess Hyper-V VMs with Azure Migrate Server Assessment This article shows you how to assess on-premises Hyper-V VMs, using the Azure Migrate:Server Assessment tool. This tutorial is the second in a series that demonstrates how to assess and migrate Hyper-V VMs to Azure. In this tutorial, you learn how to: - Set up an Azure Migrate project. - Set up and register an Azure Migrate appliance. - Start continuous discovery of on-premises VMs. - Group discovered VMs, and assess the group. - Review the assessment. Tutorials show you the simplest deployment path for a scenario so that you can quickly set up a proof-of-concept. Tutorials use default options where possible, and don't show all possible settings and paths. For detailed instructions, review the How-to articles. If you don't have an Azure subscription, create a free account before you begin. - Complete the first tutorial in this series. If you don't, the instructions in this tutorial won't work. - Here's what you should have done in the first tutorial: Set up an Azure Migrate project In the Azure portal > All services, search for Azure Migrate. In the search results, select Azure Migrate. In Overview, under Discover, assess and migrate servers, click Assess and migrate servers. In Getting started, click Add tools. In the Migrate project tab, select your Azure subscription, and create a resource group if you don't have one. - The project region is used only to store the metadata gathered from on-premises VMs. - You can select a different Azure target region when you migrate the VMs. All Azure regions are supported for migration target. In Select assessment tool, select Azure Migrate: Server Assessment > Next. In Select migration tool, select Skip adding a migration tool for now > Next. In Review + add tools, review the settings, and click Add tools. Wait a few minutes for the Azure Migrate project to deploy. You'll be taken to the project page. If you don't see the project, you can access it from Servers in the Azure Migrate dashboard. Set up the Azure Migrate appliance Azure Migrate:Server Assessment uses a lightweight Azure Migrate appliance. The appliance performs VM discovery and sends VM metadata and performance data to Azure Migrate. The appliance can be set up in a number of ways. - Set up on a Hyper-V VM using a downloaded Hyper-V VHD. This is the method used in this tutorial. - Set up on a Hyper-V VM or physical machine with a PowerShell installer script. This method should be used if you can't set up a VM using the VHD, or if you're in Azure Government. After creating the appliance, you check that it can connect to Azure Migrate:Server Assessment, configure it for the first time, and register it with the Azure Migrate project. Download the VHD Download the zipped VHD template for the appliance. In Migration Goals > Servers > Azure Migrate: Server Assessment, click Discover. In Discover machines > Are your machines virtualized?, click Yes, with Hyper-V. Click Download to download the VHD file. Check that the zipped file is secure, before you deploy it. On the machine to which you downloaded the file, open an administrator command window. Run the following PowerShell command to generate the hash for the ZIP file C:\>Get-FileHash -Path <file_location> -Algorithm [Hashing Algorithm] - Example usage: C:\>Get-FileHash -Path ./AzureMigrateAppliance_v1.19.06.27.zip -Algorithm SHA256 For appliance version 2.19.07.30, the generated hash should match these settings. Create the appliance VM Import the downloaded file, and create the VM. After downloading the zipped VHD file to the Hyper-V host on which the appliance VM will be placed, extract the zipped file. - In the extracted location, the file unzips into a folder called AzureMigrateAppliance_VersionNumber. - This folder contains a subfolder, also called AzureMigrateAppliance_VersionNumber. - This subfolder contains three further subfolders - Snapshots, Virtual Hard Disks, and Virtual Machines. Open Hyper-V Manager. In Actions, click Import Virtual Machine. In the Import Virtual Machine Wizard > Before you begin, click Next. In Locate Folder, select the Virtual Machines folder. Then click Next. In Select Virtual Machine, click Next. In Choose Import Type, click Copy the virtual machine (create a new unique ID). Then click Next. In Choose Destination, leave the default setting. Click Next. In Storage Folders, leave the default setting. Click Next. In Choose Network, specify the virtual switch that the VM will use. The switch needs internet connectivity to send data to Azure. Learn about creating a virtual switch. In Summary, review the settings. Then click Finish. In Hyper-V Manager > Virtual Machines, start the VM. Verify appliance access to Azure Configure the appliance Set up the appliance for the first time. If you set up the appliance using a PowerShell script instead of the downloaded VHD, the first two steps in this procedure aren't relevant. In Hyper-V Manager > Virtual Machines, right-click the VM > Connect. Provide the language, time zone, and password for the appliance. Open a browser on any machine that can connect to the VM, and open the URL of the appliance web app: https://appliance name or IP address: 44368. Alternately, you can open the app from the appliance desktop by clicking the app shortcut. In the web app > Set up prerequisites, do the following: - License: Accept the license terms, and read the third-party information. - Connectivity: The app checks that the VM has internet access. If the VM uses a proxy: - Click Proxy settings, and specify the proxy address and listening port, in the form http://ProxyIPAddress or http://ProxyFQDN. - Specify credentials if the proxy needs authentication. - Only HTTP proxy is supported. - Time sync: Time is verified. The time on the appliance should be in sync with internet time for VM discovery to work properly. - Install updates: Azure Migrate Server Assessment checks that the appliance has the latest updates installed. Register the appliance with Azure Migrate - Click Log In. If it doesn't appear, make sure you've disabled the pop-up blocker in the browser. - On the new tab, sign in using your Azure credentials. - Sign in with your username and password. - Sign-in with a PIN isn't supported. - After successfully signing in, go back to the web app. - Select the subscription in which the Azure Migrate project was created. Then select the project. - Specify a name for the appliance. The name should be alphanumeric with 14 characters or less. - Click Register. Delegate credentials for SMB VHDs If you're running VHDs on SMBs, you must enable delegation of credentials from the appliance to the Hyper-V hosts. This requires the following: - You enable each host to act as a delegate for the appliance. If you followed the tutorials in order, you did this in the previous tutorial, when you prepared Hyper-V for assessment and migration. You should have either set up CredSSP for the hosts manually, or by running a script that does this. - Enable CredSSP delegation so that the Azure Migrate appliance can act as the client, delegating credentials to a host. Enable on the appliance as follows: On the appliance VM, run this command. HyperVHost1/HyperVHost2 are example host names. Enable-WSManCredSSP -Role Client -DelegateComputer HyperVHost1.contoso.com HyperVHost2.contoso.com -Force Enable-WSManCredSSP -Role Client -DelegateComputer HyperVHost1.contoso.com HyperVHost2.contoso.com -Force Alternatively, do this in the Local Group Policy Editor on the appliance: - In Local Computer Policy > Computer Configuration, click Administrative Templates > System > Credentials Delegation. - Double-click Allow delegating fresh credentials, and select Enabled. - In Options, click Show, and add each Hyper-V host you want to discover to the list, with wsman/ as a prefix. - Then, in Credentials Delegation, double-click Allow delegating fresh credentials with NTLM-only server authentication. Again, add each Hyper-V host you want to discover to the list, with wsman/ as a prefix. Start continuous discovery Connect from the appliance to Hyper-V hosts or clusters, and start VM discovery. - In User name and Password, specify the account credentials that the appliance will use to discover VMs. Specify a friendly name for the credentials, and click Save details. - Click Add host, and specify Hyper-V host/cluster details. - Click Validate. After validation, the number of VMs that can be discovered on each host/cluster is shown. - If validation fails for a host, review the error by hovering over the icon in the Status column. Fix issues, and validate again. - To remove hosts or clusters, select > Delete. - You can't remove a specific host from a cluster. You can only remove the entire cluster. - You can add a cluster, even if there are issues with specific hosts in the cluster. - After validation, click Save and start discovery to start the discovery process. This starts discovery. It takes around 1.5 minutes per host for metadata of discovered servers to appear in the Azure portal. Verify VMs in the portal After discovery finishes, you can verify that the VMs appear in the portal. - Open the Azure Migrate dashboard. - In Azure Migrate - Servers > Azure Migrate: Server Assessment page, click the icon that displays the count for Discovered servers. Set up an assessment There are two types of assessments you can run using Azure Migrate Server Assessment. |Performance-based||Assessments based on collected performance data||Recommended VM size: Based on CPU and memory utilization data. Recommended disk type (standard or premium managed disk): Based on the IOPS and throughput of the on-premises disks. |As on-premises||Assessments based on on-premises sizing.||Recommended VM size: Based on the on-premises VM size Recommended disk type: Based on the storage type setting you select for the assessment. Run an assessment Run an assessment as follows: Review the best practices for creating assessments. In Servers > Azure Migrate: Server Assessment, click Assess. In Assess Servers, specify a name for the assessment. Click View all to review the assessment properties. In Select or create a group, select Create New, and specify a group name. A group gathers one or more VMs together for assessment. In Add machines to the group, select VMs to add to the group. Click Create Assessment to create the group, and run the assessment. After the assessment is created, view it in Servers > Azure Migrate: Server Assessment. Click Export assessment, to download it as an Excel file. Review an assessment An assessment describes: - Azure readiness: Whether VMs are suitable for migration to Azure. - Monthly cost estimation: The estimated monthly compute and storage costs for running the VMs in Azure. - Monthly storage cost estimation: Estimated costs for disk storage after migration. View an assessment In Migration goals > Servers > Azure Migrate: Server Assessment, click Assessments. In Assessments, click on an assessment to open it. Review Azure readiness In Azure readiness, verify whether VMs are ready for migration to Azure. Review the VM status: - Ready for Azure: Azure Migrate recommends a VM size and cost estimates for VMs in the assessment. - Ready with conditions: Shows issues and suggested remediation. - Not ready for Azure: Shows issues and suggested remediation. - Readiness unknown: Used when Azure Migrate can't assess readiness, due to data availability issues. Click on an Azure readiness status. You can view VM readiness details, and drill down to see VM details, including compute, storage, and network settings. Review cost details This view shows the estimated compute and storage cost of running VMs in Azure. Review the monthly compute and storage costs. Costs are aggregated for all VMs in the assessed group. - Cost estimates are based on the size recommendations for a machine, and its disks and properties. - Estimated monthly costs for compute and storage are shown. - The cost estimation is for running the on-premises VMs as IaaS VMs. Azure Migrate Server Assessment doesn't consider PaaS or SaaS costs. You can review monthly storage cost estimates. This view shows aggregated storage costs for the assessed group, split over different types of storage disks. You can drill down to see details for specific VMs. Review confidence rating When you run performance-based assessments, a confidence rating is assigned to the assessment. - A rating from 1-star (lowest) to 5-star (highest) is awarded. - The confidence rating helps you estimate the reliability of the size recommendations provided by the assessment. - The confidence rating is based on the availability of data points needed to compute the assessment. Confidence ratings for an assessment are as follows. |Data point availability||Confidence rating| Learn more about best practices for confidence ratings. In this tutorial, you: - Set up an Azure Migrate appliance - Created and reviewed an assessment Continue to the third tutorial in the series, to learn how to migrate Hyper-V VMs to Azure with Azure Migrate Server Migration.
s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590347394074.44/warc/CC-MAIN-20200527110649-20200527140649-00449.warc.gz
CC-MAIN-2020-24
13,126
163
https://mamedev.emulab.it/haze/2018/03/20/now-you-c-inside/
code
Team CAPS0ff recently devised a way to dump the internal EPROM from the Taito ‘c-chip’ protection modules The TC0030CMD aka ‘c-chip’ is a custom Taito module which integrates a UPD78C11, RAM, ROM and a custom ASIC into a single package and was used to protect a number of Taito games in the late 80s / early 90s. It was, to my knowledge, the only time Taito used a custom package like this rather than simply using an off-the-shelf MCU directly. CAPS0ff had previously managed to dump the UPD78C11 part of the c-chip (which is a common kernel shared by all the c-chips) using optical techniques, basically decapping the chip, imaging the ROM area (which could be done because the internal ROM of the UPD78C11 is a MASK rom) and entering the data manually. That was done some months ago, and to the best of our knowledge was correctly dumped as the internal checksum it does at least matches without any special fudging being needed. Dumping of the EPROM part required more thought, it couldn’t be done with the same technique as it isn’t a MASK rom so in the end a new way was found, hooking up the ROM die directly and dumping it after some very fine / delicate work. You can read all about that on the Team CAPS0ff blog. The c-chip does several things for the games on which it is used. Firstly it manages the player inputs and some of the other system inputs, reading them and putting them in a shared RAM area for the 68k-side game code to read. One slightly odd quirk is that one of the digital ports is read through the ADC (Analog to Digital) port of the UPD78C11 which is an incredibly inefficient way of doing things. In most cases this port is used for the Player 2 cocktail mode controls. The most important function of the c-chip, as with any good protection scheme is providing per-game protection functions that are tightly integrated with the actual game logic. Taito made use of this to varying extents across the games using it. Bonze Adventure has had issues in MAME for the entire time it has been emulated, with all of these coming due to various inaccuracies in the c-chip simulation. One of the main things the c-chip handles comes in the form of the restart positions when the player dies. The game code passes in the current co-ordinates and expects to get back the correct restart position for those co-ordinates. Failure to return the correct values results in the game crashing. While the return values used by the simulation in MAME had been extracted from a running PCB there was still something clearly wrong with the simulation, like some coordinates had been missed, or there were flaws in the algorithm. Maybe this isn’t too surprising as the game is full of secret locations, and the actual restart positions are sometimes slightly illogical (sometimes skipping ahead, rather than backwards – depending more on which restart position you’re closest too, rather than which one you’ve passed) Either way, this left MAME users with a choice of using an older version of MAME with guessed / inaccurate restart positions that didn’t outright crash, but could be glitched quite easily, or a newer version, with verified coordinates that for other reasons didn’t work (or hacked up builds that partially restored the old behavior) None of the emulated solutions were actually correct, even the PS2 Taito Legends port was incorrect because that was based off the same knowledge MAME had at the time. Using the correct dump of the original c-chip all these problems go away, and the game now has correct restart points, and won’t crash if you die in the secret locations etc. Due to historical significance of the game as part of the Bubble Bobble series, this was possibly one of the most important c-chips so having it dumped is a huge milestone even if end users might not notice a huge difference here. Rainbow Islands is one of the most extensively protected c-chip games but also one where the simulation was already very good thanks to tireless work by a couple of people who were big fans of the game. Having extensively studied the behavior of the chip over the years, and extracted the various data tables from it already it’s fair to say the game was already very well emulated. Very well emulated isn’t the same thing as correctly emulated however. Even with the extensive studies of the c-chip responses that had been done there was still some guesswork, of note in the generation of the y coordinates at goal-in where the random number generation was not understood and a simple table of observed values substituted for the real algorithm. By running the real c-chip code the need to understand this goes away (although it would now be possible to analyze the c-chip program and work out what the real algorithm was) The beauty of hooking up the real protection MCUs in cases like this is that things ‘just work’ because you’re simply running the correct code, not having to simulate anything. This also allows for extensive cleanups of the MAME code as simulations of complex ‘black-box’ style protection devices inevitably end up being large and unwieldy as a well programmed MCU can do a lot of work for the game. Being able to simply delete those simulations and know the original code is being emulated instead is a big boost for the project, and for preservation in general. Rainbow Islands is an interesting case because it did spawn a bootleg, Jumping, on which some of the earlier protection simulations in MAME (and RAINE) were based prior to the more extensive studies that I previously mentioned. While the bootleggers had managed to work around the protection, they hadn’t got it right as beyond surface level there were many, many problems with the hacks the bootleggers had used to work around the protection in Jumping making it a much less desirable product. Despite this bootleg existing, it shows what a good job Taito did of the protection. Rainbow Islands Extra This semi-sequel of Rainbow Islands uses a different c-chip to Rainbow Islands. This c-chip isn’t actually dumped yet (and needs to be) but in the meantime I’ve applied the differences in the simulation code to the Rainbow Islands MCU so that it still runs using a fake c-chip ROM. Maybe the real one actually holds more secrets, maybe the real one has the actual MCU code tidied up a bit (as it looked to me like there were some unused tables in the Rainbow Islands MCU) In the meantime there’s not much to say about this, it’s the same basic protection Rainbow Islands but with different data due to the rearranged levels. Personally I’ve never really seen the point of Rainbow Islands Extra, it feels more like a cheap hack, none of the remixed levels really make any sense and it loses most of the charm of the original by starting you off on a very dull looking level. This one was dumped by CAPS0ff, allowing the real behavior to be studied, and differences between the simulation and proper emulation to be observed. While Superman is not the best protected of the C-Chip games, and doesn’t tie any critical game logic to c-chip responses it does make the c-chip responsible for passing a chunk of 68k code back to the main CPU, this code is used to manage the sound command buffers in the game. The previous simulation of the c-chip returned this code for the 68k CPU, it was accompanied in the MAME source by the comment “This code for sound communication is a hack, it will not be identical to the code derived from the real c-chip” F01B20: 48E7 8080 movem.l D0/A0, -(A7) F01B24: 206D 1C40 movea.l ($1c40,A5), A0 F01B28: 302F 000C move.w ($c,A7), D0 F01B2C: 1080 move.b D0, (A0) F01B2E: 5288 addq.l #1, A0 F01B30: 203C 00F0 1C40 move.l #$f01c40, D0 F01B36: B1C0 cmpa.l D0, A0 F01B38: 6604 bne $f01b3e F01B3A: 41ED 1C20 lea ($1c20,A5), A0 F01B3E: 2B48 1C40 move.l A0, ($1c40,A5) F01B42: 4CDF 0101 movem.l (A7)+, D0/A0 F01B46: 4E75 rts With the real c-chip emulated we can see that the above statement if indeed true, because the actual 68k routine supplied by the original c-chip looks like this. F01B20: 4E56 0000 link A6, #$0 F01B24: 48E7 0100 movem.l D7, -(A7) F01B28: 3E2E 0008 move.w ($8,A6), D7 F01B2C: 0C07 00FF cmpi.b #-$1, D7 F01B30: 6742 beq $f01b74 F01B32: 0C6D 0003 1CCA cmpi.w #$3, ($1cca,A5) F01B38: 660E bne $f01b48 F01B3A: 082D 0003 1C4B btst #$3, ($1c4b,A5) F01B40: 6606 bne $f01b48 F01B42: 0C07 0019 cmpi.b #$19, D7 F01B46: 662C bne $f01b74 F01B48: 48E7 0080 movem.l A0, -(A7) F01B4C: 206D 1C40 movea.l ($1c40,A5), A0 F01B50: 10C7 move.b D7, (A0)+ F01B52: 2E3C 00F0 1C40 move.l #$f01c40, D7 F01B58: B1C7 cmpa.l D7, A0 F01B5A: 6606 bne $f01b62 F01B5C: 41ED 1C20 lea ($1c20,A5), A0 F01B60: 600A bra $f01b6c F01B62: 2E2D 1C44 move.l ($1c44,A5), D7 F01B66: B1C7 cmpa.l D7, A0 F01B68: 6602 bne $f01b6c F01B6A: 5388 subq.l #1, A0 F01B6C: 2B48 1C40 move.l A0, ($1c40,A5) F01B70: 4CDF 0100 movem.l (A7)+, A0 F01B74: 4CDF 0080 movem.l (A7)+, D7 F01B78: 4E5E unlk A6 F01B7A: 4E75 rts Superman also has a second block of 68k code supplied by the C-Chip, but from what I can tell there are no jumps to it from the main code, so it is probably a leftover from development. F01B80: 4E56 0000 link A6, #$0 F01B84: 3F3C 0007 move.w #$7, -(A7) F01B88: 4EBA FF32 jsr (-$ce,PC) ; ($f01abc) F01B8C: DFFC 0000 0002 adda.l #$2, A7 F01B92: 48E7 80C0 movem.l D0/A0-A1, -(A7) F01B96: 41F9 0090 0001 lea $900001.l, A0 F01B9C: 302E 0008 move.w ($8,A6), D0 F01BA0: 1140 0000 move.b D0, ($0,A0) F01BA4: 4228 0002 clr.b ($2,A0) F01BA8: 302E 000A move.w ($a,A6), D0 F01BAC: 1140 0004 move.b D0, ($4,A0) F01BB0: 4E45 trap #$5 F01BB2: 3F3C 0007 move.w #$7, -(A7) F01BB6: 4EBA FF04 jsr (-$fc,PC) ; ($f01abc) F01BBA: DFFC 0000 0002 adda.l #$2, A7 F01BC0: 4A28 0002 tst.b ($2,A0) F01BC4: 67EA beq $f01bb0 F01BC6: 3F2E 0008 move.w ($8,A6), -(A7) F01BCA: 4EBA FEF0 jsr (-$110,PC) ; ($f01abc) F01BCE: DFFC 0000 0002 adda.l #$2, A7 F01BD4: 1E28 0000 move.b ($0,A0), D7 F01BD8: E14F lsl.w #8, D7 F01BDA: 1E28 0002 move.b ($2,A0), D7 F01BDE: 41E8 0004 lea ($4,A0), A0 F01BE2: 226E 000C movea.l ($c,A6), A1 F01BE6: 1010 move.b (A0), D0 F01BE8: 12C0 move.b D0, (A1)+ F01BEA: D0FC 0002 adda.w #$2, A0 F01BEE: 51CF FFF6 dbra D7, $f01be6 F01BF2: 4CDF 0301 movem.l (A7)+, D0/A0-A1 F01BF6: 4E75 rts As you can see, the real sound communication code is somewhat more complex than the fake code that was being used. Of note, it actually checks the status of the Demo Sound dipswitch (stored in RAM) and doesn’t pass on sound commands in attract mode if Demo Sounds are disabled, the fake code completely ignored that. The check of ‘ F01B3A: 082D 0003 1C4B btst #$3, ($1c4b,A5)‘ is where the real code is checking the dipswitch value in RAM while ‘ cmpi.w #$3, ($1cca,A5)‘ is checking if the game is in gameplay or attract mode (4 is gameplay, 3 is attract mode) There are also other subtle differences in the way the sound commands are handled. Maybe having the Demo Sound dipswitch behave the same as real hardware isn’t the biggest piece of news but it’s one of those small accuracy things that is good to know is now correct. I haven’t tried to work out the point of the apparently unused code, or when it would be called. Like all the other games the c-chip is also directly responsible for handling inputs and putting them in shared RAM. The previous simulation just shoved them directly into RAM. This is another one that has been dumped by CAPS0ff and is now fully emulated. The Volfied protection sits somewhere in the middle of the others, supplying palette data for enemies, and managing a few counters (eg for ensuring an enemy attacks you when your shield runs out) It isn’t an especially interesting protection, but some of the behavior it has wasn’t 100% obvious or trusted prior to having the proper c-chip dump. The Volfied emulation still seems to have some other timing issues even with the c-chip emulated, because the 2nd attract mode how to play sequence does not appear to complete correctly, there are unused messages telling the player that the enemy gets smaller as you box it in which aren’t triggered because the player dies too early. The actual behavior needs verifying on the PCB and I suspect is related to some video flags, not the c-chip. Having the real c-chip dump and emulation at least allows us to 100% rule out that being some kind of subtle c-chip related behavior. The Operation Wolf c-chip is not yet dumped. Bryan McPhail has sent one for processing, and considering the amount of research he has done over the years to improve the simulation of it I’m sure he’ll be very interested in seeing what the real code has to offer. Operation Wolf appears to be the first, and most heavily protected of the c-chip games with many small details of the game logic being tied to protection functions. It took many, many years for the simulation to be any good at all, I definitely suggest reading Bryan’s blog for more information about that. Once this one is dumped all that simulation code can be cleaned up. Chances are Bryan will be the one to hook this up when it gets dumped because given the amount of work he’s put in over the years, and also it being his chip being sent for processing, it just kinda makes sense if he is the first one to look at it. I guess the interesting sub-note for Operation Wolf so far is that the UPD78C11 part of the dump we have actually came from an Operation Wolf c-chip, and we do have a partial dump of the EPROM from another Operation Wolf c-chip (missing half the code / data) but both of those were casualties in the process of figuring out how to dump these properly. Operation Wolf is also historically significant because it was bootlegged back in the day, however the bootleggers chose to use a Z80 to simulate the behavior of the c-chip. This resulted in a lot of incorrect assumptions that the original c-chips were Z80s and the bootleggers had managed to extract the code. Truth be told the bootleggers had simply tried their best to analyze the protection behavior and recreate it, much as the emulation developers had. The Z80 code, one studied actually turned out to be full of bugs and incorrect behaviors. Rumours did however still persist that the c-chip was a Z80 due to this until the very day it was actually decapped and proven not to be. The Mega Blast c-chip is also not dumped yet, although it might well be blank or recycled from another game. It would be fair to say that the C-Chip on Mega Blast exists for decoration, it isn’t used beyond the startup check. Once the command to jump out of the MASK rom area of the UPD78C11 and into the EPROM has been sent no further commands are sent to the C-chip, and no accesses are done to the shared region, the game doesn’t even read the inputs through the c-chip. As long as the c-chip RAM works, and it returns the correct value for having passed the UPD78C11 MASK rom checksum the game will run. It’s literally used for nothing. CAPS0ff do currently have a Mega Blast chip, and will eventually dump it, at which point we’ll see if it is indeed blank, from another game, or maybe even contains protection code that Taito never got around to hooking up, or that might have been used on an earlier / unreleased version of the game but ultimately ended up being disabled because there were problems with it. It’s definitely the least interesting of the c-chip games on the surface (because it doesn’t even make use of it) but if it holds some secrets / tells a forgotten story of development it does still have the potential to be one of the more interesting ones for the arcade archaeologist. Even with all this done there are a few things we don’t fully understand about the c-chip, but as far as the protection functions go they’re not important. One thing of note is that the internal UPD78C11 code actually includes an additional mode of operation not triggered by any of the games. This mode includes various diagnosis features that we were hoping could be used to dump the EPROMs without having to resort to the physical attack CAPS0ff needed in the end. Unfortunately upon sending the correct command to enter this mode we found the 68k was locked out of all responses from the c-chip. This is presumably due to a port write to ‘PORT F’ that only happens when triggering that mode. There might be some way to get the 68k to see the responses again, but we couldn’t find it, the chip simply stopped responding at that point. None of the games use that port, so it was clearly something intended for development / debugging of the original c-chips only, I guess it’s possible the code is non-functional on the retail modules. If somebody else did want to independently research the c-chips beyond the work done here there’s definitely a lot more to work with now than there was prior to the work done by CAPS0ff, and I imagine at some point it will become necessary to start building replacement c-chips as they do seem to be a source of failure with these boards.
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947473824.45/warc/CC-MAIN-20240222193722-20240222223722-00625.warc.gz
CC-MAIN-2024-10
17,022
105
https://siteorigin.com/thread/not-available-for-home-page-blog-page/
code
I have taken over the website of my work for the corona periode. Im not a webdeveloper/designer, Im a social worker, so as you can imagine its been a bit of a rocky road… Please help! :-) Im really not understanding what I did wrong, on the “Page” page under costume sidebar, ()Homepage and Blogpage) is written “Not available for Home Page; Not available for Blog Page”. Any help is be dearly appreciated here in Berlin !
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593655911896.73/warc/CC-MAIN-20200710175432-20200710205432-00349.warc.gz
CC-MAIN-2020-29
432
3
https://vic20.blipp.com/pipermail/icq-devel/2001-November/000282.html
code
[icq-devel] New SNAC packet. rejetto at libero.it Mon Nov 5 18:21:58 CET 2001 Monday, November 05, 2001, 4:06:47 AM, you wrote: PW> I'm receiving the packet below in my logins is anobody receiving some similar? i added that uin to the roaster, and i'm receiving the SNAC(3,A) packet too. aim protocol says "reject notification", and in fact the snac contains only the uin, no other info. mistery is why we can't have notification, cause server databases has still info about that uin, it replies when i query it. i could think that it's a privileged uin but 1) it's a spammer, don't think it could be a privileged one, lol 2) icq-staff uins are not privileged, i receive SNAC(3,B) so, here comes three: 1) it's a spammer, it has been fired in some (never seen) way by AOL 2) it's a feature of icq2001 (that i don't know) that lets you have some greater privacy 3) you are a clone programmer, it's a icq-staff member that's trying to get we fool, lol More information about the icq-devel
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323587908.20/warc/CC-MAIN-20211026134839-20211026164839-00292.warc.gz
CC-MAIN-2021-43
986
20
https://docs.cardinal.so/the-creator-standard/how-it-works/token-proxy-methods
code
Token Proxy Methods Since the underlying token is frozen by the mint manager, the default SPL-Token program instructions do not work out of the box. A set of new instructions are needed that act as 1:1 proxies to the SPL-Token instructions. In each proxy method, we simply thaw the token, call the SPL-token method, and re-freeze the token. The only detail in the proxy transfer instruction is that the rules in the mint manager's ruleset are enforced before transferring the token. Functionally speaking, the Creator Standard is no different than the regular token program (and in the future other token programs like token-22). The only difference is that the additional set of rules (allowlist/denylist specified by the token's ruleset) is enforced in the transfer proxy. Program diagram of thaw, transfer and re-freeze on transfer
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764499911.86/warc/CC-MAIN-20230201045500-20230201075500-00378.warc.gz
CC-MAIN-2023-06
834
5
https://forum.mql4.com/72668
code
I have an issue with an EA which seems to hang after a few passes during backtesting with optimization. Trying to figure out what's going on, I am using the following code: void subFileWriteFlush (string sFilename, string str) int iHandle = FileOpen (sFilename, FILE_READ|FILE_WRITE|FILE_CSV, "/t"); FileSeek (iHandle, 0, SEEK_END); FileWrite (iHandle," Time " + TimeToStr(CurTime(),TIME_DATE|TIME_SECONDS) + ": " + str); and then placing calls to this at various places in my code. The code compiles cleanly, but I can't see any output in any of my MT4 folders. 1) Does anybody know of any issues using such code to trace? 2) Does anybody have any better ideas on how to trace an EA in backtesting with optimization mode? Thank you for any ideas. That's it ... I was looking in the wrong place. Everything is under /tester/files ... Thank you once again. To add comments, please log in or register
s3://commoncrawl/crawl-data/CC-MAIN-2016-40/segments/1474738659833.43/warc/CC-MAIN-20160924173739-00251-ip-10-143-35-109.ec2.internal.warc.gz
CC-MAIN-2016-40
898
13
http://troymorehouse.ca/
code
Troy Morehouse is a Senior Network Architect for the FibreOp Core Network (VPLS/VPRN/MPLS transport technologies) at Bell Aliant / Bell Canada. Troy has several years experience in network engineering design, network & capacity management, and has an electrical engineering background with specialization in networking and computer programming. As a side project, Troy developed and operates eFlea.ca, an online auction system that provides charities and groups an easy way to raise funds for worthy causes. He is also is an occasional contributor to the opersource communities on GitHub and Stack Exchange and also helps develop websites for people and companies as a hobby. Troy is a member of the Association of Professional Engineers and Geoscientists of New Brunswick (APEGNB), and also has received the Nokia (formerly Alcatel-Lucent) certification of NSR-I (#3568).
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224644506.21/warc/CC-MAIN-20230528182446-20230528212446-00277.warc.gz
CC-MAIN-2023-23
872
4
https://www.sitefinity.com/developer-network/forums/developing-with-sitefinity/seach-results
code
I have seach implemented on our website and have few issues with it functionality. First, it looks up in all html text. For xmpl, if I have web control with id 'google' on the page and if some one will search for 'google', results will include this page. So I need info how to set up search only for web pages content. Also I need to find code behind for search result control. Seems that the links for search results are broken(not all). I activated search for a few days on live website to let you see were is a problems ( I beleive no one will use search a lot for this moment:) www.aerosan.ie Could you advise so I can go and fix this. Thanks.
s3://commoncrawl/crawl-data/CC-MAIN-2018-13/segments/1521257649961.11/warc/CC-MAIN-20180324073738-20180324093738-00069.warc.gz
CC-MAIN-2018-13
647
3
https://www.weisbergfamilyfoundation.org/betterhelp-jobs-reviews/
code
BetterHelp Treatment: A Comparison of Online Therapy Platforms and Standard In-Person Therapy Traditional in-person treatment has been the go-to option for lots of years, however with the increase of innovation, online therapy has actually become a popular option. BetterHelp is one of the leading online therapy platforms, but how does it compare to other online therapy platforms and traditional in-person treatment? Online Therapy Platforms Online therapy platforms provide the benefit of accessing treatment from the convenience of your own house. They are ideal for individuals who live in remote areas, have movement problems, or merely prefer the convenience of online therapy. Here’s how BetterHelp compares to other online therapy platforms. BetterHelp vs. Talkspace Talkspace is another popular online therapy platform. Both Talkspace and BetterHelp provide comparable services, consisting of private and couples therapy. There are some key differences between the 2 platforms. BetterHelp has a bigger network of therapists, which implies that clients have a much better opportunity of finding a therapist who is a good fit for them. In addition, BetterHelp offers more cost effective prices strategies compared to Talkspace. Nevertheless, Talkspace provides a totally free consultation, which BetterHelp does not. BetterHelp vs. BetterUp BetterUp is an online coaching and counseling platform that focuses on expert and individual advancement. While BetterUp uses training services, it does not offer treatment services like BetterHelp. BetterUp is perfect for individuals who wish to concentrate on individual development and profession advancement instead of psychological health issues. BetterHelp vs. Amwell Amwell is an online healthcare platform that provides telemedicine services, including psychological health services. Amwell’s psychological health services are provided by licensed therapists, but the platform does not specialize in psychological health like BetterHelp does. In addition, Amwell’s psychological health services are just readily available in specific states, while BetterHelp is offered nationwide. Traditional In-Person Therapy Standard in-person treatment is still the most popular kind of therapy. It includes conference with a therapist in person at their workplace. Here’s how traditional in-person treatment compares to BetterHelp. Among the most significant advantages of BetterHelp is benefit. With online treatment, you can access treatment from the comfort of your own home, at a time that matches you. In-person treatment, on the other hand, requires you to arrange appointments and commute to your therapist’s office. The cost of therapy can be a barrier for many individuals. In-person treatment is generally more costly than online treatment. BetterHelp provides more budget friendly rates plans compared to conventional in-person treatment. Privacy is a concern for lots of people when it comes to treatment. With BetterHelp, you can access treatment from the comfort of your own home, which can provide a sense of privacy. In-person therapy, on the other hand, needs you to consult with a therapist in person at their office. Your alternatives for therapists might be limited by your place when it comes to in-person therapy. With BetterHelp, you have access to a larger network of therapists, which means that you have a better opportunity of finding a therapist who is an excellent suitable for you. In conclusion, BetterHelp therapy provides several benefits over standard in-person therapy, including therapist, expense, and convenience choice. While there are other online treatment platforms readily available, BetterHelp stands out for its big network of therapists and budget friendly pricing strategies. Ultimately, the choice in between online therapy and conventional in-person treatment boils down to individual choice and specific requirements. Treatment can be useful for a wide range of psychological health conditions. In this article, we’ll explore 10 various conditions that people might have and how treatment can assist. Depression is a common psychological health condition that impacts millions of individuals worldwide. Therapy can help by offering a safe area to discuss your feelings and feelings. A therapist can help you recognize unfavorable thought patterns and behaviors and work with you to establish coping strategies and positive habits. Stress and anxiety is another common psychological health condition that can be incapacitating. Treatment can help by teaching you relaxation strategies, such as deep breathing and mindfulness, and working with you to develop coping methods to handle anxiety triggers. PTSD, or post-traumatic stress disorder, is a mental health condition that can establish after experiencing or witnessing a distressing event. Treatment can help by supplying a safe area to process the injury and develop coping methods to manage the signs of PTSD. OCD, or obsessive-compulsive condition, is a mental health condition identified by invasive ideas and compulsive behaviors. Therapy can assist by teaching you how to recognize and handle these thoughts and behaviors, as well as establish coping methods to handle the symptoms of OCD. Bipolar affective disorder is a mental health condition identified by extreme mood swings, ranging from depressive episodes to manic episodes. Treatment can assist by offering support and assistance in managing these mood swings, developing coping strategies, and improving communication abilities. Eating disorders, such as anorexia and bulimia, are mental health conditions that can have severe physical effects. Treatment can assist by resolving the underlying psychological and psychological issues that add to the eating disorder, as well as developing techniques to manage the physical signs. Substance abuse can be a difficult routine to break, however therapy can be an effective tool in handling addiction. Therapy can help by dealing with the underlying psychological and mental issues that contribute to drug abuse, in addition to establishing strategies to manage cravings and triggers. Relationship issues, such as interaction issues and conflict, can have a significant influence on psychological health. Treatment can help by providing a safe area to discuss these issues and establish methods to improve communication and solve conflict. Sorrow and loss Betterhelp Jobs Reviews Sorrow and loss can be a tough experience to browse, however therapy can assist by supplying assistance and assistance through the mourning process. A therapist can help you determine and handle the feelings related to grief and loss, in addition to establish coping methods to move forward. Tension is a typical experience for lots of people, but it can have unfavorable impacts on psychological health. Therapy can help by teaching relaxation techniques and establishing coping techniques to handle tension, as well as determining and attending to the underlying psychological and psychological issues that contribute to stress. In conclusion, therapy can be an efficient tool in managing a vast array of psychological health conditions, from anxiety and stress and anxiety to substance abuse and relationship problems. Consider looking for the support and guidance of a licensed therapist if you are struggling with your psychological health. Seeing a therapist can have many benefits for a person’s mental health and health and wellbeing. Here are a few of the benefits of seeing a therapist from a psychological perspective: Among the main benefits of seeing a therapist is increased self-awareness. A therapist can assist you identify patterns in your emotions, thoughts, and behaviors, in addition to the underlying beliefs and values that drive them. By becoming more familiar with these patterns, you can get a deeper understanding of yourself and your inspirations, which can lead to personal development and advancement. Improved emotional regulation Psychological regulation is the capability to manage and manage one’s emotions in an adaptive and healthy method. Seeing a therapist can help individuals learn and practice emotional policy strategies, such as deep breathing and mindfulness, that can be valuable in managing difficult feelings and lowering tension. Better social relationships Social relationships are a vital element of mental health and wellbeing. Seeing a therapist can help people enhance their communication abilities, assertiveness, and compassion, which can result in much healthier and more satisfying relationships with others. Increased analytical abilities Therapy can likewise assist people establish problem-solving skills. By working with a therapist, individuals can find out to approach problems in a more methodical and efficient method, determine possible options, and make decisions that are lined up with their objectives and values. Self-esteem refers to an individual’s sense of self-regard and worth. Seeing a therapist can assist individuals determine and challenge negative self-talk and beliefs that can add to low self-esteem. Through treatment, people can learn to develop a more positive and reasonable self-image, which can cause increased self-esteem and self-regard. Boosted coping abilities Coping skills are techniques and techniques that people utilize to manage tension and misfortune. Seeing a therapist can assist individuals establish and practice coping skills that are customized to their specific requirements and preferences. Coping abilities can consist of mindfulness, relaxation techniques, problem-solving, and social assistance, among others. Minimized symptoms of mental illness Therapy can likewise work in lowering signs of mental disorder, such as anxiety, anxiety, and post-traumatic stress disorder (PTSD). Therapists use evidence-based treatments, such as cognitive-behavioral therapy (CBT), dialectical behavior modification (DBT), and eye movement desensitization and reprocessing (EMDR), to help people handle symptoms and enhance their overall quality of life. In conclusion, seeing a therapist can have many advantages for a person’s psychological health and health and wellbeing. By increasing self-awareness, enhancing emotional policy, improving interpersonal relationships, developing problem-solving skills, enhancing self-esteem, enhancing coping abilities, and minimizing symptoms of mental disorder, treatment can be an effective tool for personal growth and advancement.
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510501.83/warc/CC-MAIN-20230929090526-20230929120526-00438.warc.gz
CC-MAIN-2023-40
10,527
44
https://www.navelqueens.com/top-5-indian-hot-web-series-to-watch-alone-2022-hot-top-5-ullu-web-series/
code
These are the Top 5 New Hot Indian web series to watch alone . Indian new hot web series Our Official social media handel ► 🎦Secand Channel ► 📧 Business Mail ► [email protected] the video is for educational purpose only. Copyright Disclaimer Under Section 107 of the Copyright Act 1976, allowance is made for “fair use” for purposes such as criticism, comment, news reporting, teaching, scholarship, and research. Fair use is a use permitted by copyright statute that might otherwise be infringing. Non-profit, educational, or personal use tips the balance in favor of fair use. :# , , .
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764499700.67/warc/CC-MAIN-20230129044527-20230129074527-00086.warc.gz
CC-MAIN-2023-06
616
6
https://github.com/phpmyadmin/phpmyadmin/issues/13397
code
Join GitHub today GitHub is home to over 28 million developers working together to host and review code, manage projects, and build software together.Sign up hide side menu in standard #13397 when login, hide side menu in standard To be clear about what you're asking, you'd like the default state to be hidden, right? Currently, it's an extra mouse click for you to have to hide the frame manually. I suppose that we could at least remember this preference, either locally in the browser storage or in the phpMyAdmin Configuration Storage/user preferences and restore the state when the user starts a new session. I'm not sure I see enough demand to add another configuration directive outright, though.
s3://commoncrawl/crawl-data/CC-MAIN-2018-43/segments/1539583518753.75/warc/CC-MAIN-20181024021948-20181024043448-00051.warc.gz
CC-MAIN-2018-43
704
6
https://docs.transcend.io/docs/consent-management/reference/debugging-and-testing
code
Testing and Debugging Consent Here are some console commands that may be helpful as you are configuring and testing Transcend Consent. * API only available when extended monitoring is enabled via data-monitoring="export" on the airgap.js script tag. This is helpful to see if airgap.js is holding a request in quarantine, causing something to not load on your site. Using the console is helpful to understand issues that arise when first setting up the consent manager. The guide features common console errors and troubleshooting steps if airgap.js does not seem to behave as expected. Before going live with the consent manager in production, it's a good idea to thoroughly test the implementation. It's recommend to test the consent experience for each privacy regime (including the default when there is no privacy regime detected for a user) to confirm the experience with the consent banner is as expected. It's also helpful to view as many pages on the site as possible to ensure that essential functionality needed for the site is being allowed through by the consent manager. We support a couple of different ways of testing: - Simulate Consent via userscript. Pros: Quick, no code deploys, no risk of breaking your website. Cons: Only runs local to the user's browser, hard to catch all edge cases. - Install "Test" Consent bundle to a staging/test environment. Pros: Exact mirror of the set-up that you will have in production. Cons: Requires code change and deploy. It is recommended that you try simulating Consent via userscript first to get a feel for the API and how it interacts with your website, then proceed to adding the test snippet itself to your staging/test environment. We support 2 bundle types: Test and Production. The Test bundle is hosted at cm-test/BUNDLE_ID/airgap.js while the Production bundle is hosted at cm/BUNDLE_ID/airgap.js. Changes made in the Admin Dashboard can be applied to either bundle without modifying the other. The Test bundle can be thought of as a test branch of your Production bundle. We recommend that you add the Test bundle to your staging environment, and keep the Production bundle on your production environment. In Consent , under "HTML Snippet", you can find the appropriate HTML snippet for either bundle by selecting the bundle type. Copy this snippet and add it to your testing/staging site header, as you would for the production site. To publish changes for either bundle, click "Set Changes Live". You will be prompted to choose which bundle type you would like to apply the changes to: You can also install our simulator userscript to test Consent directly in production, without actually having to change anything in production. This is useful if your site makes any requests that use different domains on production as opposed to dev & staging. You can install Tampermonkey for your browser of choice via the following links: Once you have installed Tampermonkey, you can click “Install userscript” under Developer Settings. It is recommended that you don’t use the airgap.js userscript on a site that already has airgap.js installed. If you already added the script to your site, you can enable debug logging by setting the attribute data-log="*" on your airgap.js script tag. Once you have userscript installed, you can visit your site with the Tampermonkey extension enabled, and open up your dev console. You should see logs like this: The first link/button you see in the console will bring up the default UI that airgap.js ships with. The pop-up/banner will vary based on your location/data rights.
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474808.39/warc/CC-MAIN-20240229103115-20240229133115-00786.warc.gz
CC-MAIN-2024-10
3,583
22
https://defaultskin.com/pros/we-beat-sypherpk-and-bugha-in-this-fortnite-tournament-w-jordan-fisher-benjyfishy-cented/
code
WE BEAT SYPHERPK AND BUGHA IN THIS FORTNITE TOURNAMENT! W/ Jordan Fisher, Benjyfishy & Cented I competed alongside Jordan Fisher, Benjyfishy and Cented in this Fortnite competition and we faced off against SypherPK and Bugha! FOLLOW & WATCH ME everyday: 📺 http://www.twitch.tv/dakotaz 👻 USE CODE: “dakotaz” – in the itemshop! 👻 ( #EpicPartner / #ad ) LIKE 👍🏼 and SUBSCRIBE ❤️ if you enjoyed this video! Don’t forget to ring the 🔔 Bell 🔔 to join my Notification Pack! USE CODE “DAKOTAZ” for 10% OFF GFUEL 💗 FOLLOW ME #Dakotaz #Fortnite #FortniteBattleRoyale 🌙 Good Night, and Good Luck.
s3://commoncrawl/crawl-data/CC-MAIN-2020-50/segments/1606141164142.1/warc/CC-MAIN-20201123182720-20201123212720-00134.warc.gz
CC-MAIN-2020-50
628
10
http://www.sqlbits.com/Sessions/Event12/Blend_SQL_Azure_with_SQL_Server_to_drive_Performance_Insight
code
Blend SQL Azure with SQL Server to drive Performance Insight Peter O'Connell will talk about how SpotlightEssentials.com uses SQL Azure to collect and mine over 40TB of SQL Server Performance data across thousands of instances to drive unique insights into SQL Server Performance. Sorry, there are no downloads available for this session. Dell Software makes it easy to securely manage and protect applications, systems, devices and data to help organizations of all sizes fully deliver on the promise of technology. For SQL Server, our Quest IT management solutions ensure database quality, performance and availability to maintain productivity, control costs and protect data. The video is not available to view online.
s3://commoncrawl/crawl-data/CC-MAIN-2016-50/segments/1480698541361.65/warc/CC-MAIN-20161202170901-00231-ip-10-31-129-80.ec2.internal.warc.gz
CC-MAIN-2016-50
721
5
https://brilliant.org/discussions/thread/some-properties/
code
(1) Reflexive Property-- A quantity is congruent (equal) to itself. \(a=a\) (2) Symmetric Property-- If \(a = b\), then \(b = a\). (3) Transitive Property-- If \(a = b\) and \(b = c\), then \(a = c\). (4) Addition Postulate-- If equal quantities are added to equal quantities, the sums are equal. (5) Subtraction Postulate-- If equal quantities are subtracted from equal quantities, the differences are equal. (6) Multiplication Postulate-- If equal quantities are multiplied by equal quantities, the products are equal. (also Doubles of equal quantities are equal.) (7) Division Postulate-- If equal quantities are divided by equal nonzero quantities, the quotients are equal. (also Halves of equal quantities are equal.) (8) Substitution Postulate-- A quantity may be substituted for its equal in any expression. (9) Partition Postulate-- The whole is equal to the sum of its parts. Also: Betweeness of Points: \(AB + BC = AC\). Angle Addition Postulate: \(\angle ABC + \angle CBD = \angle ABD\). (10) Construction-- Two points determine a straight line. (11) Construction-- From a given point on (or not on) a line, one and only one perpendicular can be drawn to the line.
s3://commoncrawl/crawl-data/CC-MAIN-2019-04/segments/1547584547882.77/warc/CC-MAIN-20190124121622-20190124143622-00626.warc.gz
CC-MAIN-2019-04
1,175
13
https://moresharepoint.wordpress.com/tag/yammer/
code
It is always confusion. I hear you. When to use TEAMs and when to use Yammer. And hold, who is using Yammer. Oh there is a lot. But honestly not like TEAMs. Alright, so what communities may we create to engage employees in Yammer and definitely make sure that still they do not leave TEAMs behind! take care of that. Let us brainstorm examples/scenarios: and please feel free to add more in the comments: 1- Employees for example, selling something they do not need anymore, rather than using dubbizle or Olx, users can share it with the organization on Yammer. –> I had a customer, whom had a user selling a swimming pool. Someone else in the same organization, was interested to purchase it. [It is a collaboration on non work stuff]. 2- Parenting stuff, example, you send your kids for training, piano or Tennis, or even swimming, you think this a nice place or club out there, you share with the organization. –> You want to expand your network in the organization you work in, why not bring kids with your BOSS’s / Co-worker’s kids and from here built a network. 3- Marathon .. honestly a lot of people participate to motivate themselves and to take care of their health. –> I participated once in Marathon, with Infusion [ex-employer] co-workers, it was a lot of fun. 4- Offers in schools for this organization specifically. Ya why not. 5- Let us go a little bit beyond, Something in common between Organizations, example: “Contoso” and “Litware”, amazing we can do external sharing network in Yammer to share and collaborate with another organization through Yammer. You don’t really have to invite them through your tenant or so at all. –> They could be same industry. They could be your contractor outsourcing organization. 6- Usually, Yammer is the best tool for CEO announcements, to reach the whole organization. Why? because by default in Yammer, there is a community called “All Company”. Everyone is a member in it.
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224647525.11/warc/CC-MAIN-20230601010402-20230601040402-00042.warc.gz
CC-MAIN-2023-23
1,956
14
http://www.finheaven.com/archive/index.php/t-135117.html
code
FinHeaven Your Home for: Miami Dolphins, Miami Dolphins Forums, Miami Dolphins News Games, Graphics, and Other Fun things to do Graphics Talk and Requests > Make me a Sig? View Full Version : Make me a Sig? 04-05-2006, 06:40 AM Can someone make me a sig??? with the Players Ronnie Brown, Chris Chambers, Daunte Culpepper, and Randy McMichael. thank you guys. :wink: 04-05-2006, 06:43 AM Post this in the Graphics Forum. Powered by vBulletin® Version 4.2.2 Copyright © 2015 vBulletin Solutions, Inc. All rights reserved.
s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440644063825.9/warc/CC-MAIN-20150827025423-00241-ip-10-171-96-226.ec2.internal.warc.gz
CC-MAIN-2015-35
521
12
https://estebanperez.myportfolio.com/sketchbook
code
Process and iterations are a big part of my work. Behind every project there are countless hours of brainstorming, sketching, word diagrams, typographic studies, color systems and concept development before putting finger to keyboard. In this initial phase, I believe no idea is ever stupid, ridiculous or bad; in sketching nothing is wrong. Not being afraid of failure is what enables me to learn and grow. Nonetheless, in my crazy mind, they are perfectly understandable.
s3://commoncrawl/crawl-data/CC-MAIN-2019-35/segments/1566027317339.12/warc/CC-MAIN-20190822172901-20190822194901-00257.warc.gz
CC-MAIN-2019-35
473
4
https://melroth.com/why-isnt-there-a-window-size-extension-for-safari/
code
Why isn’t there a window size extension for Safari? I had this question on my mind for a while, not realizing there was a simple answer all along. So I’m posting it here in case anyone else has been wondering the same thing. I use Google Chrome often, but I have been using Safari more these days. I find it faster than Chrome and the integration between my iPhone and MacBook pretty handy. Being used to Google Chrome, I thought there must be a Safari Extension for seeing what size my browser is. But I kept coming up empty in my search. “How can this be?” I would think to myself before moving on to another task. I use the screen size extension to check for breakpoints in a responsive website, but mostly I use the extension to set my browser to a certain common screen size to take a screenshot. Lo and behold I hadn’t been looking closely enough into the built in features of Safari. In the Develop menu is an option to “Enter Responsive Design Mode”. I had used this tool before to test layouts in the various screen sizes included with the tool. But until recently I hadn’t realized I could change the screen sizes of the desktop screens. Because the tool allows resizing of the window, I soon realized it’s a great tool, even better than the screen size extension I had been using in Google Chrome. And that’s why there wasn’t a browser size extension for Safari. It’s already built in to the Responsive Design Mode tool, and it works great. Once you realize it’s there and what it can do, you’re golden!
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296948951.4/warc/CC-MAIN-20230329054547-20230329084547-00328.warc.gz
CC-MAIN-2023-14
1,542
8
http://lists.freedesktop.org/archives/dbus/2005-January/002021.html
code
D-BUS: Somewhere OBVIOUS, explain _specifically_ why D-BUS vs CORBA, vs. DCE, vs. SOAP, etc. Fri Jan 21 19:07:40 PST 2005 (Reading this now, after my other reply.) Basically I don't feel this defensive about it, or have a need to "sell" D-BUS; my core contention is that just because two things are both "IPC" that doesn't mean they are the same thing, any more than two things being "a file format" means they are the same thing. There's a unique problem space when implementing a UNIX desktop environment as a swarm of processes (that's what GNOME/KDE are). If you implemented the UNIX desktop as one big process (like the Lotus Workplace desktop) or had a different architecture entirely as Windows does, then you would have a different set of problems. Why is D-BUS right for what we're doing? - *because* it isn't standard, we are free to make it do what we need for the two use cases we have in mind; there's a simple control issue - we can also avoid implementing a bunch of useless stuff just to be - it's intended to be sufficiently similar to dcop - it has the right implementation properties (licensing, plain C, etc) - someone happened to write it so it's there There isn't really a fancy justification. If you say that IIOP could have been adapted to work for this, then I won't disagree with you; maybe it could. If you say d-bus is useless outside of the two intended use cases, I won't disagree with that either. In computing a custom-designed solution is almost always better-suited to the problem than a standard one. The standard one may have benefits that outweigh that: a larger ecosystem to participate in, prebuilt implementation, or whatever. Or it may not. For this particular problem I don't think the standard IPC systems offer much. GNOME uses the standard nature of CORBA maybe in one place (so Java can access the accessibility bridge), and our implementation of CORBA has countless extensions and policy additions vs. the CORBA spec. It's an open question whether dbus itself is any better, but I hope it is. It at least seems to work OK as the systemwide bus. Anyhow, in short if someone thinks dbus is a wheel reinvention and they want to use CORBA, then they should use CORBA... why shouldn't they? I have no idea a priori whether dbus is actually better for whatever they are trying to do. More information about the dbus
s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1409535922763.3/warc/CC-MAIN-20140909051013-00273-ip-10-180-136-8.ec2.internal.warc.gz
CC-MAIN-2014-35
2,356
40
https://benfoster.io/tags/aspnet-mvc/
code
March 19, 2014 In this post I introduce some of the new membership features in ASP.NET Identity and swap out my dodgy hard-coded authentication logic to validate user credentials against information stored in a database . March 7, 2014 This post covers setting up cookie based authentication (the replacement for Forms Authentication) in ASP.NET MVC using the new ASP.NET Identity Libraries and nothing else. January 11, 2014 If you’ve ever struggled to configure custom error pages in ASP.NET MVC then this post is for you. April 5, 2013 In this post I cover how to serve static content such as stylesheets and scripts with Nancy and ASP.NET MVC. April 2, 2013 In this post we look at how to create a very basic web site from scratch using both Nancy and ASP.NET MVC frameworks.
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296949107.48/warc/CC-MAIN-20230330070451-20230330100451-00250.warc.gz
CC-MAIN-2023-14
781
10
https://www.gravsoft.pl/Aspose-Tasks-for-Cloud/298/
code
Aspose.Tasks for Cloud is a REST API for manipulating Microsoft Project documents in the cloud. It allows you to work with all aspects of a Project document including conversion. The API offers a wide range of Microsoft Project export options. The Aspose.Tasks for Cloud API allows developers to convert Project documents to various formats including XML, HTML, BMP, PNG, PDF, and XSLX. The API can be used to list document properties such as a project’s default start and finish time, minutes per week and days per month, work format, default task type, and so on. The API also provides the capability to retrieve information about each task from a Project data file hosted in the cloud. Task information such as name, ID, duration, and start and end dates, can be retrieved. In addition, the API can add new tasks to projects and retrieve information about task links and task assignments. The Aspose.Tasks API can manage project resources for documents hosted in the cloud. It supports adding a new resource, retrieve a list of project resources, and delet existing resources from the Project data. The API also facilitates retrieval of resource assignments information for resources assigned to project tasks. The API provides full access to a project’s calendar collection. Details about project calendars such as ID, name, and working days and time, can be read. New calendars can be added or deleted from hosted project data files. The API can be used to create new calendar exceptions to the Project’s calendars and retrieving a list of existing exceptions. Aspose.Tasks for Cloud’s platform independent document manipulation API is a true REST API that can be used with any language: .NET, Java, PHP, Ruby, Rails, Python, jQuery and many more. You can use it with any language or platform that supports REST. (Almost all platforms and languages support REST and provide native REST clients to work with REST APIs). You do not need to worry about language or platform limitations. You can use it with any platform — web, desktop, mobile, and cloud. The API integrates with other cloud services to give you the flexibility you need when processing documents. It is suitable for any type of business, document, or content. Aspose.Tasks for Cloud transforms Microsoft Project file format (MPP) to HTML, BMP, XPS, TIFF, PDF, PNG, SVG, CSV, TXT, XLS, XLSX, Primavera XER and XML formats. It is easy to get started with Aspose.Tasks for Cloud and there is nothing to install. Simply create an account at Aspose Cloud and get your application information (app key and SID). Then go ahead and use the Aspose.Tasks for Cloud REST API with any language, on any platform. We have clients of many different types, including:
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506623.27/warc/CC-MAIN-20230924055210-20230924085210-00131.warc.gz
CC-MAIN-2023-40
2,730
10
https://serverfault.com/questions/332593/asterisknow-migration-shared-extension-space
code
I am testing the possibility of migrating from an old Avaya phone system to AsteriskNow. The migration would cover several hundred phones--but spread out over several years. (Management wants to move buildings to the new phone system one by one as cables get cut or time permits.) Two other directive is that extensions must not change and they want a GUI that other admins (non-Linux geeks) can manage. They currently use 9XXX for all extensions. We linked the Avaya and Asterisk box via PRI card and they both are communicating. From the Avaya side, if we move (for example) extension 9001 to Asterisk, we forward the call over the PRI to the AsteriskNow box and the SIP phone rings. In AsteriskNow we have an outgoing rule '_9XXX' that routes all 4-digit extensions starting with 9 back to Avaya. Here's the trouble. Dialing 9001 (the extension moved over to AsteriskNow) causes the call to be routed out the PRI to the Avaya box, then the Avaya box routes the call back to Asterisk, and Asterisk routes it to the SIP phone. As we get more and more users switched over, it will use up more and more channels over the PRI card. Is there a way I can ask Asterisk to check it's local extensions first--then forward off to the Avaya system if it starts with '_9XXX'? (I know how I can do it when editing the raw config files, I'm just looking for a way to do it in the GUI so other admins can manage it if necessary.) As a last-ditch plan, I know I can specifically add '_9001' as an outgoing call rule and sent it directly to extension 9001--but I'd really hate to do that for several hundred phones
s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590347425148.64/warc/CC-MAIN-20200602130925-20200602160925-00299.warc.gz
CC-MAIN-2020-24
1,599
9
http://www.dbtalk.net/comp-databases-ms-sqlserver/simultaneous-updations-deletions-between-databases-4195.html
code
simultaneous updations and deletions between databases - 07-18-2004 , 01:35 PM hello to all, there are two databases named A and B. One database contains employee id as primary I have another project database which includes that employee id as foreign key. How can I reflect my updations,deletions thank you in advance, Re: simultaneous updations and deletions between databases - 07-18-2004 , 03:17 PM If you have two databases then you can not have a FK defined between the two. At a guess you actully have two tables with a FK defined between them. To reflect changes to the referenced table in the referencing table then use the cascade options on the FK. If you are using CREATE TABLE statements to create the FKs then use the ON DELETE CASCADE, to reflect updates to the referenced keys use ON UPDATE CASCADE. If you are using the diagramming tool in SQL Server Enterprise Manager check the cascade update related fields and cascade delete related records on the relationships tab. "vishnu mahendra" <vishnu_mahendra (AT) yahoo (DOT) com> wrote
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368710115542/warc/CC-MAIN-20130516131515-00006-ip-10-60-113-184.ec2.internal.warc.gz
CC-MAIN-2013-20
1,050
17
https://www.datacareer.co.uk/job/4410/machine-learning-engineer/
code
The core mission of the Machine Learning Engineer is to develop and implement analytical models to analyze sensors data for mobile devices. You must be excited to work with sensor data, and work with our clinical team to find never-before-seen signatures in those data. You will then work to show that these signatures has correlation with disease deterioration and disease complication, aiming to help Medopad be more proactive in fixing disease. You will facilitate Medopad to create predictive and research-based deployments internally, aiming to discover patterns in our health data. Where appropriate these projects will result in the production of research papers, patents, highlighting Medopad’s effectiveness. Additionally, the analytical tools created could be used externally by our clients as well. AI-ResearchDevelop and enhance the current model which analyzes the motion sensors dataAI-InfrastructureDesign and build tools that are generic, modular, user friendly and deployable to AWS cloud A Masters or PhD degree in mathematics or computer science.Creative and able to work between teams and collaboratively with colleaguesIn-depth knowledge of applied statistics and statistical machine learningIndependent and goal driven individual with a passion for artificial intelligenceExperience with R and PythonExcellent communication skills, including the ability to communicate deeply technical concepts to non-technical audiences at all levels and in all mediums from email to written and oral presentations. We believe magic happens when you bring together diverse ideas, experiences, and styles. We want to create a world where people live longer, fuller lives, and to do that well we need a team that represents all of the people and communities who use our solutions. We are an environment where everyone has the opportunity to do their best work; come and join us. If there are any adjustments we can make for our process to be more inclusive, please get in touch. To all recruitment agencies: Medopad does not accept agency resumes. Please do not forward resumes to our jobs alias, Medopad employees or any other organization location. Medopad is not responsible for any fees related to unsolicited resumes.
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585371830894.88/warc/CC-MAIN-20200409055849-20200409090349-00431.warc.gz
CC-MAIN-2020-16
2,229
7
https://www.thedigitalmediazone.com/2009/12/16/windows-media-center-and-dvblink-with-hdpvr-tutorial/
code
If you want more than just your local channels in HD within Media Center, you either have to have a generous cable company which doesn’t encrypt their QAM channels, get an ATI CableCard tuner or wait for Ceton’s M-card tuner. There are other ways but until David took time to write up a tutorial over at Geektonic, these things seemed a little complicated. Well, this latest guest post has you covered. David takes time to walk you through the entire process of getting the Hauppauge HDPVR working within Media Center using DVBLink. With screenshots galore and step-by-step instructions, you should have no trouble getting HD satellite or cable channels into Media Center. Take a look at the sample below: Here are the steps I used to obtain DirecTV HD using Windows 7 MCE, but you should be able to use any Set Top Box. The Hauppauge HDPVR will record from your set top box to an h.264 wtv file. At the moment the Xbox 360 is the only MCE extender that can play video produced by the HDPVR. Most of the instructions taken from the 1geek1tool wiki. Install Windows 7 I did a clean install of Windows 7 Business. I ran Windows Update and installed all the Important updates. Install the latest drivers for your graphics card Windows Update didn’t give me the latest drivers for my ATI HD 2600 XT. Having a card that has a hardware h.264 decoder is recommended if you plan on using your HTPC to connect to your TV to cut down on CPU usage. If you plan on using the Xbox 360 as your extender then the h.264 decoder is not needed. If you want to read the rest, head over to Geektonic and get all the info. Some of us are willing to wait for Ceton in 2010, but if you’re not one of those people or you have satellite service, this guide should be right up your alley.
s3://commoncrawl/crawl-data/CC-MAIN-2021-49/segments/1637964363437.15/warc/CC-MAIN-20211208022710-20211208052710-00257.warc.gz
CC-MAIN-2021-49
1,770
8
https://archive.virtualmin.com/comment/743725
code
Our domain is henryind.com and we use Webmin as IMAP/pop client for the "scan-to-email" function of our printers (hyenryind-printers). Last week this function went down on all our printers. All other printer functions work as they should. All are networked and can be accessed. All printers have the correct settings and port assignment and have been working flawlessly a long time. Last Tues. they ceased to "scan-to-email." What's changed?
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100575.30/warc/CC-MAIN-20231206000253-20231206030253-00693.warc.gz
CC-MAIN-2023-50
441
1
https://builtwithdot.net/project/4635/microsoft-azure-datalake-usql-sdk
code
"This SDK includes interfaces for UDO development and components for compiling and executing U-SQL scripts locally on developer workstations or in testing environment. To compile U-SQL scripts, you will also need correspondent Microsoft Visual C++ Compiler (currently VC14) and Windows SDK (currently 10.0.10240.0). User guide can be found here: https://docs.microsoft.com/en-us/azure/data-lake-analytics/data-lake-analytics-u-sql-sdk" Project website: https://azure.microsoft.com/services/data-lake-analytics/ "携程Apollo客户端 与Microsoft.Extensions.Configuration集成请使用Com.Ctrip.Framework.Apollo.Configuration包 与System.Configuration.ConfigurationManager集成(.net 4.7.1及以后版本)请使用Com.Ctrip…" "Allows getting the content written by script files which use the document.write() method. Originally created to support the SignalR chat sample application when adding c…" Hello, I'm Corstiaan. I'm a .net developer from the Netherlands and I manage BuiltWithDot.Net. I created this site as a place where developers working with .net technology can showcase their projects and inspire other developers. There's so much you can build with .net these days that I thought it would be nice to have a corner of the web dedicated to the breadth of .net. Enjoy! Get weekly updates about new projects built with .net tech No spam. Unsubscribe any time.
s3://commoncrawl/crawl-data/CC-MAIN-2021-21/segments/1620243992514.37/warc/CC-MAIN-20210513204127-20210513234127-00467.warc.gz
CC-MAIN-2021-21
1,376
8
https://www.techradar.com/news/python-code-libraries-are-riddled-with-security-holes
code
Almost half of the packages in the official Python (opens in new tab) Package Index (PyPI) repository have at least one security issue, according to analysis by Finnish researchers. The researchers used static analysis to uncover the security issues in the open source (opens in new tab) packages, which they reason end up tainting software that use them. In total the research scanned through 197,000 packages and found more than 749,000 security issues in all. - Protect your devices with these best antivirus software (opens in new tab) - These are the best ransomware protection tools (opens in new tab) - Here's our choice of the best malware removal (opens in new tab) software on the market “With these results and the accompanying discussion, the paper contributes to the field of large-scale empirical studies for better understanding security problems in software ecosystems,” note the researchers (opens in new tab) in their paper. Cause for concern Explaining their methodology the researchers note that despite the inherent limitations of static analysis, they still found at least one security issue in about 46% of the packages in the repository. The paper reveals that of the issues identified, the maximum (442,373) are of low severity, while 227,426 are moderate severity issues. However, 11% of the flagged PyPI packages have 80,065 high severity issues. In terms of the issue types, exception handling and different code injections were found to be the most prevalent. “Of the 46% of all packages with at least one issue, the median number of issues is three,” note the researchers. Of course it’s not evenly distributed with a few packages riddled with a lot more issues, including five that were found to have more than a thousand issues. The researchers have reason to be concerned. PyPI has been at the receiving end of several campaigns to poison the repository with malicious packages. Earlier this year in June, PyPI was purged of half a dozen typosquatting packages (opens in new tab) that contained cryptomining (opens in new tab) malware, and a month before that the repository was flooded with spam packages (opens in new tab). - Also take a look at the best laptops for programming (opens in new tab)
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446710916.70/warc/CC-MAIN-20221202215443-20221203005443-00127.warc.gz
CC-MAIN-2022-49
2,242
15
https://msdn.microsoft.com/en-us/library/ee483779(v=WinEmbedded.60).aspx
code
DirectDraw Display Driver Reference (Windows Embedded CE 6.0) For your driver, you must modify the functions and callbacks to reflect your specific hardware needs. To get your driver running quickly, you should implement the driver initialization code first, and then add functionality. For example, add flipping functionality first. In addition to the functions, callbacks, macros, and structures listed in this reference, you must include both Ddrawi.h and Ddraw.h in your driver. Both of these include files are provided with Microsoft DirectX Platform Adaptation Kit (DXPAK).
s3://commoncrawl/crawl-data/CC-MAIN-2015-48/segments/1448398464396.78/warc/CC-MAIN-20151124205424-00214-ip-10-71-132-137.ec2.internal.warc.gz
CC-MAIN-2015-48
579
3
https://shondalai.com/topic/category-groups/
code
Hello CJ Staff! I've been playing around with the extension that there's a feature I'd like to request. Currently, as you know, the software has Top Level categories, which are used essentially as section headers, and Forums. Subcategories inside of this can be displayed, but they're displayed as folders inside of a forum listing. What I would suggest is allowing users to create a category group. If they have, for instance, 10 categories, they can group them into two groups of five top level categories each. Then, you can make a menu item link to a group, so that you could essentially have two different pages of different forums. This helps because organization through top-level categories is a possibility, but you can only link one top-level to a menu item at a time. I think it would be useful to be able to link to a group, so that multiple top-level categories can be displayed. Let me know if this is possible. Thanks :)
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100508.23/warc/CC-MAIN-20231203125921-20231203155921-00689.warc.gz
CC-MAIN-2023-50
935
4
http://eab.abime.net/showpost.php?p=598041&postcount=22
code
Originally Posted by antonvaltaz On a technical note, I know I can use DOSBox for older games, but are there any general things I should know for getting Windows 9x games working under XP/Vista? I know that's probably a huge question, but if anyone could point me to any tools or guides online I can do some research myself... One other important thing to note is that some old Windows games (like some old DOS games) have timing issues on too fast CPUs, independently of the Windows version used. Blade Runner (which I mentioned in my last post) for instance has some bits that don't work properly on CPUs above about 1 GHz (as far as I recall). Such problems can be subtle and barely noticeable, but also complete show stoppers. For example, in Blade Runner, there's a scene you can't survive when those problems occur. Sometimes there are patches, sometimes you need slowdown software.
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988721606.94/warc/CC-MAIN-20161020183841-00314-ip-10-171-6-4.ec2.internal.warc.gz
CC-MAIN-2016-44
888
3
https://community.sap.com:443/t5/enterprise-resource-planning-q-a/price-not-picking-while-creating-purchase-order/qaq-p/2521786
code
i have created a pricing procedure and assigned to the vedor, but while creating purchase order the material price is not picking up.if i use the standard one the price is picking up. can anyone explaing any setting iam missing. In your pricing procedure For the condition type Automatic Gross price PB00, you have assigned am Access sequence. <b>Access sequence</b>: An access sequence is a search strategy by means of which the system searches for valid records in various condition tables. It consists of one or more accesses. The sequence of accesses controls the priority of the individual condition records among each other. Through the accesses, the system is told where to look first and where to look next for a valid condition record in each case. Once the pricing procedure triggers, System looks for the valid condition recorrd for the condition type PB00 as per the priority listed in Access sequence. Example: If purchase info record is the first priority and you maintained the Info record then system picks the price from Info record into PO. If no valid condition record found then it will trigger PBXX Manual Gross price condition in PO and ask to enter the price manually.This is called condition technique. So check whether you maintained the Condition record for PB00 or not?
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474440.42/warc/CC-MAIN-20240223153350-20240223183350-00822.warc.gz
CC-MAIN-2024-10
1,296
8
https://mail.python.org/pipermail/python-list/2015-July/694320.html
code
Proposed keyword to transfer control to another function antoon.pardon at rece.vub.ac.be Tue Jul 21 19:33:09 CEST 2015 On 07/19/2015 02:21 AM, Chris Angelico wrote: > On Sun, Jul 19, 2015 at 9:32 AM, Gregory Ewing > <greg.ewing at canterbury.ac.nz> wrote: >> Personally I'd be fine with your initial syntax, but >> something else might be needed to get it past Guido. >> He didn't like my 'cocall f()' construct in PEP 3152, >> which is syntactically isomorphic to 'transfer f()'. > Maybe it should get written up and rejected, then, to be something to > point to any time anyone advocates TCO. Those who remember the history of pep 308 will not find that a strong deterrent. More information about the Python-list
s3://commoncrawl/crawl-data/CC-MAIN-2019-30/segments/1563195526506.44/warc/CC-MAIN-20190720091347-20190720113347-00067.warc.gz
CC-MAIN-2019-30
714
15
http://opensource.sys-con.com/node/2475834
code
|By Maureen O'Gara|| |December 10, 2012 08:00 AM EST|| Nutanix, a cloud hardware start-up that's offering a hybrid scale-out compute-cum-storage appliance backed by $72 million in VC funding only half of which is reportedly spent, has put out next-generation software-defined data center products. It's updating its server hardware and its software to deal with divergent workloads. It's going to a quad-node box made by Quanta and should be able to support 400 VMs per chassis, up from 300. It's got VM-centric disaster recovery, adaptive compression and a new highly configurable hardware platform. The widgetry includes Nutanix OS 3.0 and NX-3000 series hardware. It's supposed to help enterprises build next-generation software-defined data centers. Besides VM-level disaster recovery and adaptive post-process compression, Nutanix OS 3.0 delivers dynamic cluster expansion, rolling software upgrades and support for KVM, its second hypervisor after VMware's. Its software enhancements, coupled with the configurable NX-3000 series platform, enable flexibility, performance and scalability in enterprise data centers. With NX-3000, Nutanix delivers a configurable platform in which compute- and storage-heavy nodes co-exist in a single heterogeneous cluster. It includes hardware models that vary in capacity and the number of PCIe-SSDs, SATA SSDs and SATA DDs server nodes. The nodes can have different CPU cores per socket and variable memory capacities. This allows for independent scaling of compute and storage in a single system that's optimized for every use case and can scale to address evolving business requirements. The Scale-Out Converged Storage (SOCS) virtual disk controllers that make the Nutanix server cluster into a SAN so compute and storage are on the same cluster and the compute jobs are close to the storage. Nutanix uses Flash The NX-3000 uses Intel's Sandy Bridge chips - the eight-core E5-2660 processors running at 2.2GHz - and delivers VM density in a 2U form factor. Nutanix claims to be the first to deliver RAID, high availability, snapshots and clones at the VM-level. It says it's implemented a highly differentiated VM-centric disaster recovery engine. The new Nutanix OS 3.0 includes native storage-optimized disaster recovery that enables multi-way, master-master replication supposedly never seen before in traditional storage arrays. Administrators can configure disaster recovery policies that specify protection domains and consistency groups in primary sites, which can then be replicated to any combination of secondary sites to ensure maximum business resiliency and application performance. And any Nutanix cluster can serve as both a primary and secondary site simultaneously for different protection domains, providing even more flexibility and choice. Nutanix OS 3.0 is supposed to deliver best-in-class runbook (failover and failback) automation that's hypervisor-agnostic, which means native disaster recovery capabilities are available and consistent regardless of the underlying virtualization platform or management tools. One of the pillars of the Nutanix solution is a highly efficient MapReduce-based framework that implements information lifecycle management in the cluster to achieve tiering, disk rebuilding and cluster rebalancing. It's supposedly the first of its kind in the storage industry. The same framework is being leveraged to deliver adaptive post-process compression of cold data as it migrates to the lower data tiers, so as not to impact the normal IO path. By leveraging the information lifecycle management capabilities inherent in Nutanix' software, the system dynamically determines which data blocks to compress based on how frequently they're being accessed by the VMs. Post-process compression is ideal for random or batch workloads and delivers the highest possible overall performance. In addition, Nutanix' OS 3.0 supports basic in-line compression that works as the data is being written, which is better suited for archival and sequential workloads. The company says, "While our existing storage solutions support compression in general, the granularity of Nutanix compression allows us to set policies at the VM level, ensuring maximum business value and storage utilization," With Nutanix OS 3.0, the company is supposed to deliver on its commitment to bring all of its enterprise features to the broadest range of platforms in the industry. The software, which was designed to be hypervisor-agnostic, will now support KVM and VMware vSphere 5.1. Regardless of the underlying virtualization platform or management framework, enterprises benefit from all of the capabilities of the Nutanix software. The KVM hypervisor provides financial flexibility for enterprises and works well in workloads such as Hadoop. Nutanix OS 3.0 also uses a discovery-based protocol to auto-detect new nodes added to the same network as a cluster, enabling administrators to quickly and easily expand a cluster without incurring any downtime. In the background, the system will then rebalance the data across the entire storage pool, including the newly added nodes, to provide maximum I/O performance. The new software also uses software-defined networking tricks to achieve rolling software upgrades in the always-on cluster. Upgrades are delivered in a peer-to-peer framework to enable rapid software upgrades while retaining maximum cluster availability. The features and capabilities delivered in Nutanix OS 3.0 and NX-3000 are supposed to usher in a new era of business resiliency and data center optimization. The start-up thinks it's displaced $25 million in server and SAN storage sales and is close to doubling sales every quarter. Its co-founder and CEO Dheeraj Pandey built the first Exadata clusters at Oracle. Co-founder Mohit Aron was chief architect at Aster Data and lead designer of the Google File System that led to Hadoop. SYS-CON Events announced today that CA Technologies has been named “Platinum Sponsor” of SYS-CON's 20th International Cloud Expo®, which will take place on June 6-8, 2017, at the Javits Center in New York City, NY, and the 21st International Cloud Expo®, which will take place October 31-November 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA. CA Technologies helps customers succeed in a future where every business – from apparel to energy – is being rewritten by software. From ... Mar. 25, 2017 01:30 PM EDT Reads: 1,654 The taxi industry never saw Uber coming. Startups are a threat to incumbents like never before, and a major enabler for startups is that they are instantly “cloud ready.” If innovation moves at the pace of IT, then your company is in trouble. Why? Because your data center will not keep up with frenetic pace AWS, Microsoft and Google are rolling out new capabilities In his session at 20th Cloud Expo, Don Browning, VP of Cloud Architecture at Turner, will posit that disruption is inevitable for c... Mar. 25, 2017 01:15 PM EDT Reads: 2,021 SYS-CON Events announced today that Cloudistics, an on-premises cloud computing company, has been named “Bronze Sponsor” of SYS-CON's 20th International Cloud Expo®, which will take place on June 6-8, 2017, at the Javits Center in New York City, NY. Cloudistics delivers a complete public cloud experience with composable on-premises infrastructures to medium and large enterprises. Its software-defined technology natively converges network, storage, compute, virtualization, and management into a ... Mar. 25, 2017 12:45 PM EDT Reads: 1,848 Keeping pace with advancements in software delivery processes and tooling is taxing even for the most proficient organizations. Point tools, platforms, open source and the increasing adoption of private and public cloud services requires strong engineering rigor - all in the face of developer demands to use the tools of choice. As Agile has settled in as a mainstream practice, now DevOps has emerged as the next wave to improve software delivery speed and output. To make DevOps work, organization... Mar. 25, 2017 12:45 PM EDT Reads: 1,640 The explosion of new web/cloud/IoT-based applications and the data they generate are transforming our world right before our eyes. In this rush to adopt these new technologies, organizations are often ignoring fundamental questions concerning who owns the data and failing to ask for permission to conduct invasive surveillance of their customers. Organizations that are not transparent about how their systems gather data telemetry without offering shared data ownership risk product rejection, regu... Mar. 25, 2017 12:30 PM EDT Reads: 5,047 SYS-CON Events announced today that Loom Systems will exhibit at SYS-CON's 20th International Cloud Expo®, which will take place on June 6-8, 2017, at the Javits Center in New York City, NY. Founded in 2015, Loom Systems delivers an advanced AI solution to predict and prevent problems in the digital business. Loom stands alone in the industry as an AI analysis platform requiring no prior math knowledge from operators, leveraging the existing staff to succeed in the digital era. With offices in S... Mar. 25, 2017 12:30 PM EDT Reads: 1,146 SYS-CON Events announced today that Interoute, owner-operator of one of Europe's largest networks and a global cloud services platform, has been named “Bronze Sponsor” of SYS-CON's 20th Cloud Expo, which will take place on June 6-8, 2017 at the Javits Center in New York, New York. Interoute is the owner-operator of one of Europe's largest networks and a global cloud services platform which encompasses 12 data centers, 14 virtual data centers and 31 colocation centers, with connections to 195 add... Mar. 25, 2017 12:00 PM EDT Reads: 892 SYS-CON Events announced today that SoftLayer, an IBM Company, has been named “Gold Sponsor” of SYS-CON's 18th Cloud Expo, which will take place on June 7-9, 2016, at the Javits Center in New York, New York. SoftLayer, an IBM Company, provides cloud infrastructure as a service from a growing number of data centers and network points of presence around the world. SoftLayer’s customers range from Web startups to global enterprises. Mar. 25, 2017 11:15 AM EDT Reads: 1,511 SYS-CON Events announced today that CrowdReviews.com has been named “Media Sponsor” of SYS-CON's 20th International Cloud Expo, which will take place on June 6–8, 2017, at the Javits Center in New York City, NY. CrowdReviews.com is a transparent online platform for determining which products and services are the best based on the opinion of the crowd. The crowd consists of Internet users that have experienced products and services first-hand and have an interest in letting other potential buyers... Mar. 25, 2017 11:00 AM EDT Reads: 3,531 SYS-CON Events announced today that T-Mobile will exhibit at SYS-CON's 20th International Cloud Expo®, which will take place on June 6-8, 2017, at the Javits Center in New York City, NY. As America's Un-carrier, T-Mobile US, Inc., is redefining the way consumers and businesses buy wireless services through leading product and service innovation. The Company's advanced nationwide 4G LTE network delivers outstanding wireless experiences to 67.4 million customers who are unwilling to compromise on ... Mar. 25, 2017 10:45 AM EDT Reads: 2,063 SYS-CON Events announced today that Infranics will exhibit at SYS-CON's 20th International Cloud Expo®, which will take place on June 6-8, 2017, at the Javits Center in New York City, NY. Since 2000, Infranics has developed SysMaster Suite, which is required for the stable and efficient management of ICT infrastructure. The ICT management solution developed and provided by Infranics continues to add intelligence to the ICT infrastructure through the IMC (Infra Management Cycle) based on mathemat... Mar. 25, 2017 10:00 AM EDT Reads: 2,906 SYS-CON Events announced today that SD Times | BZ Media has been named “Media Sponsor” of SYS-CON's 20th International Cloud Expo, which will take place on June 6–8, 2017, at the Javits Center in New York City, NY. BZ Media LLC is a high-tech media company that produces technical conferences and expositions, and publishes a magazine, newsletters and websites in the software development, SharePoint, mobile development and commercial UAV markets. Mar. 25, 2017 09:15 AM EDT Reads: 4,206 SYS-CON Events announced today that Telecom Reseller has been named “Media Sponsor” of SYS-CON's 20th International Cloud Expo, which will take place on June 6–8, 2017, at the Javits Center in New York City, NY. Telecom Reseller reports on Unified Communications, UCaaS, BPaaS for enterprise and SMBs. They report extensively on both customer premises based solutions such as IP-PBX as well as cloud based and hosted platforms. Mar. 25, 2017 08:30 AM EDT Reads: 2,026 "I think that everyone recognizes that for IoT to really realize its full potential and value that it is about creating ecosystems and marketplaces and that no single vendor is able to support what is required," explained Esmeralda Swartz, VP, Marketing Enterprise and Cloud at Ericsson, in this SYS-CON.tv interview at @ThingsExpo, held June 7-9, 2016, at the Javits Center in New York City, NY. Mar. 25, 2017 08:00 AM EDT Reads: 4,072 In his keynote at @ThingsExpo, Chris Matthieu, Director of IoT Engineering at Citrix and co-founder and CTO of Octoblu, focused on building an IoT platform and company. He provided a behind-the-scenes look at Octoblu’s platform, business, and pivots along the way (including the Citrix acquisition of Octoblu). Mar. 25, 2017 08:00 AM EDT Reads: 14,009 SYS-CON Events announced today that HTBase will exhibit at SYS-CON's 20th International Cloud Expo®, which will take place on June 6-8, 2017, at the Javits Center in New York City, NY. HTBase (Gartner 2016 Cool Vendor) delivers a Composable IT infrastructure solution architected for agility and increased efficiency. It turns compute, storage, and fabric into fluid pools of resources that are easily composed and re-composed to meet each application’s needs. With HTBase, companies can quickly prov... Mar. 25, 2017 06:45 AM EDT Reads: 2,788 Web Real-Time Communication APIs have quickly revolutionized what browsers are capable of. In addition to video and audio streams, we can now bi-directionally send arbitrary data over WebRTC's PeerConnection Data Channels. With the advent of Progressive Web Apps and new hardware APIs such as WebBluetooh and WebUSB, we can finally enable users to stitch together the Internet of Things directly from their browsers while communicating privately and securely in a decentralized way. Mar. 25, 2017 03:00 AM EDT Reads: 5,774 DevOps is often described as a combination of technology and culture. Without both, DevOps isn't complete. However, applying the culture to outdated technology is a recipe for disaster; as response times grow and connections between teams are delayed by technology, the culture will die. A Nutanix Enterprise Cloud has many benefits that provide the needed base for a true DevOps paradigm. Mar. 25, 2017 12:15 AM EDT Reads: 1,757 What sort of WebRTC based applications can we expect to see over the next year and beyond? One way to predict development trends is to see what sorts of applications startups are building. In his session at @ThingsExpo, Arin Sime, founder of WebRTC.ventures, will discuss the current and likely future trends in WebRTC application development based on real requests for custom applications from real customers, as well as other public sources of information, Mar. 25, 2017 12:00 AM EDT Reads: 669 TechTarget storage websites are the best online information resource for news, tips and expert advice for the storage, backup and disaster recovery markets. By creating abundant, high-quality editorial content across more than 140 highly targeted technology-specific websites, TechTarget attracts and nurtures communities of technology buyers researching their companies' information technology needs. By understanding these buyers' content consumption behaviors, TechTarget creates the purchase inte... Mar. 24, 2017 10:15 PM EDT Reads: 4,242
s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218189083.86/warc/CC-MAIN-20170322212949-00423-ip-10-233-31-227.ec2.internal.warc.gz
CC-MAIN-2017-13
16,162
71
https://forums.theregister.co.uk/forum/all/2009/05/20/review_inkjet_printer_hp_officejet_pro_8500_wireless/
code
Lafite isn't Champagne Although either taste better than inkjet inks. HP has a difficult game to play. It wants to increase usage of its inkjet printers and all-in-ones by selling them small business, but in doing so it risks hitting the colour laser printer market, in which it’s the major player. The OfficeJet Pro 8500 Wireless is a case in point. It's a fast, high-capacity inkjet all-in-one … I'm a great fan of HP Officejets for low-cost colour. The duplexor is usually an option, i.e. there may be a cheaper model that is the same but without duplexor (which one could then decide to buy separately at a later date). In any case, having it removable makes clearing the rare paper jam from inside the duplexor very easy. It DOES have linux "drivers". In fact, better than that. It's open-source supported by hplip. All but the very cheapest HP printers are, though sometimes not until a little while after the product launches. For this one: You can also often get away with telling your system you have an earlier HP model that looks like the newer one. This can be an alternative to building the latest version of hplip on a distribution that isn't officially distributing it yet. Doesn't always work, a bit hit-or-miss, but takes little time to try. -Card readers/Pict bridge connections (I use a PC to edit and preview anything I print) -Scanner (I have one in a drawer and don't want needless bulk & complication) -Bells + Whistles Basically, I'm fairly happy with my Epson R200. But I wish I could integrate it (or something like it) more easily into my home WLAN. Any suggestions? I bought a Epson SX405 Ink printer and as I did not find a working driver for Linux I asked Epson for help. The reply was that Epson does not support Linux at all. Some digging and now it works alright. I stopped using HP years ago as the ink business was too obvious. I hope they are finally getting a bit smarter. All customers are not complete idiots. I still doubt them (HP), however. It it could do Postscript or PCL, have an actual fax-modem inside, and would do A3. The point is, laser printers have now developed to a stage where they just work. You just install the driver for a HP LaserJet 4 on your computer and print to the printer. It'll simply work, a feature inkjet printers are struggling to provide. HP is by far the most LInux-friendly of Inkjet and MFC manufacturers. HPLIP is a fully open-source project, being run with HP's blessing and support. It supports most features of all but the really cheap "throw-away" HP printers. It's bundled with most distros (and the source code is pretty easy to build as well). Note that because HPLIP is open-source, you *can* trust that you won't be prevented from upgrading your OS for lack of a (closed source, binary) printer driver. Even if HP was acquired by Microsoft tomorrow, all the know-how to make Linux play with an HP 8500 and all the other current HPLIP-supported models is already out there and GPLed, so someone could and would pick up the reins should HP drop them. In our office, we have an HP OfficeJet Pro L7780. This is functionally very similar to the 8500 model (although it has the optional hi-capacity extra tray too). I liked it so much I got a L7680 for home, too. To answer the comments about Linux: HP may not provide Linux drivers, but Linux provides OfficeJet drivers. The OfficeJet Pro L7780 and L7680 work very well indeed under Ubuntu. In fact, the latest Ubuntu (9.04) automatically detects the printer, works out how to connect to it and installs the necessary drivers using UK defaults (for us in the UK, anyway). I imagine that the experience for the 8500 will be similar, although you might need to persuade it the printer's an L7680 if it hasn't heard of the 8500 yet. Doubtless the proper printer description files will be along very shortly if that's the case. I agree about the duplexer. It does look an afterthought, yet the duplexer unit has been a standard fit on most OJPro printers since forever. However, the simple removal (press in a button at either side) makes for a very easy fix on the rare occasions the duplexer gets a paper jam. It does increase the printer's footprint, though, adding 6cm to the depth at minimum, or 14cm if you want to open the back flap for maintenance. These aren't printers you can put on a shallow printer trolley! It sounds overall like the 8500 is a small step-change onwards from the excellent L7680/L7780 units. If that's so, I can heartily recommend them. Do keep a spare set of ink tanks somewhere. You have to change them so rarely that it's easy to forget to keep stock! (Declaration of interests: none, just a very happy customer.) My experience of other OJ Pros in the series is that they, also, just work. And keep working, too, through boxes and boxes of paper. A word to the wise, by the way. HP offers two installation options for its suite of printer drivers and related gubbins. You can do a full installation, or the basic installation (what they describe as drivers only). I have found the full installation to be a royal pain, and often highly incompatible with laptops that are being taken in and out of sleep mode often. Just use the basic install, and forget the extra cruft! You won't regret it, or miss the extra rubbish. Biting the hand that feeds IT © 1998–2019
s3://commoncrawl/crawl-data/CC-MAIN-2019-39/segments/1568514573098.0/warc/CC-MAIN-20190917161045-20190917183045-00394.warc.gz
CC-MAIN-2019-39
5,326
30
https://pianoclack.com/forum/d/646/2
code
You know that I'm also interested in synths and have published a few synth arrangements of Bach. I also try to create synth patches on my ASM Hydrasynth keyboard from time to time (it's a fantastic synth BTW, supports polyphonic aftertouch, very intuitive to program patches from scratch and to learn sound synthesis, my favorite keyboard after the pianos I have). I sometimes get asked on YouTube to publish some of the patches and since my Dropbox is already full, I can simply use PianoClack to share them 🙂 It's also a good opportunity for exposing PianoClack to more keyboard heads. I've also created a new tag for synths, as you can see. A user recently asked me about a patch I created that resembles the 80-s type of brass sound that is often performed on Roland Juno: In a comment he asked me to upload all my patches, so here they are: These are all my patches I've ever created. Most of them are not in any polished/finished state, no fancy name or macros, varying output level... There are also many consecutive patches with sequential numbers - these are the various versions that I save throughout the patch creation. The brass in question is the last one in that bank and is called There's another video with a patch that is inspired by my love for Lyle Mays (R.I.P. Lyle 😕) of Pat Metheny Group: In the bank above the patch is called
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474660.32/warc/CC-MAIN-20240226130305-20240226160305-00569.warc.gz
CC-MAIN-2024-10
1,355
6
https://www.girlsnotbrides2018.org/blog/2017/11/21/pick-the-right-format-for-your-session
code
There are plenty of ways to make your session at the Global Meeting interesting and interactive. Here are some ideas. Workshops are 90 minute sessions during which organizers are asked to use creative approaches (interactive dialogue techniques, simulations and gaming, etc.) to engage participants to share their knowledge. Professional facilitators are highly recommended and should therefore be involved in the planning and ideally also staging of the workshop. The "Fish bowl" session is a very dynamic and efficient format used to structure debates or discuss controversial topics (90 min). There are different possible set-ups: the model is to create an inner circle with chairs occupied by contributors (fishbowl) and various outer circles of chairs occupied by observers. The moderator will introduce the topics and facilitation is limited to the core group. The variations include (not limited to): - Open fishbowl: one seat in the inner circle is always available for an observer to enter the discussion. A contributor must voluntarily become an observer when this happens. - Closed fishbowl: all the seats in the inner circle are occupied. The moderator decides when time is out and the circles are changed. - Homogeneous fishbowl: the inner circle share the same opinion. - Heterogeneous fishbowl: the inner circle shares different perspectives. A think tank is a 90 min session focusing on a single topic. A moderator/leader will orient participants to the issue and divide the audience into smaller groups for further in-depth discussions. As the session winds down, the audience is reunited and refocuses on what has been learned or/and the next steps in an action-based development. Campfire – in the “village” Campfire sessions (60 min) are set in a relaxed environment where a speaker introduces (max 15 min) a topic to a group of people and then becomes a facilitator, inviting responses to comments and questions from those attending. Campfires allow attendees to listen to multiple perspectives on the same issue and learn directly from their peers. Experience with group facilitation is highly recommended. Storytelling is more than a way of sharing information and extending ideas. If you’d like to organise a session sharing lessons / success stories / challenges on a certain topic, consider using story-telling. Stories can reveal universal truths and enhance multicultural understanding. Stories should be consistent with the conference topics and they should also reflect the genuine and authentic experience of an individual, or a community. For example, a story session could involve a story of a successful or less than successful attempt to respond to religious extremism. A story could also describe the challenges faced and overcome – in full or partially – when addressing the needs of married girls. Individual stories of 15 min each. There are opportunities to showcase your organisation’s work, or discuss specific issues, in parallel to the official programme. More information on submission of alternative formats will be shared once your application has been accepted. Consider how you can incorporate social media into your session, such as welcoming online questions before or during your session. If you’re active on Twitter, include your handle or that of your organisation on a screen behind you.
s3://commoncrawl/crawl-data/CC-MAIN-2018-34/segments/1534221219692.98/warc/CC-MAIN-20180822065454-20180822085454-00228.warc.gz
CC-MAIN-2018-34
3,358
16
https://www.ritlabs.com/en/forums/forum4/topic77/message652/
code
When searching the knowledge base, I found a link to a "newest" version of the bayesit, but that version is older than the one included in the download (bat3). Also there is a link to "all I need to know" about the plug-in. But that site http://klirik.narod.ru/usefuls/bayesiteng.htm it says this: ATTENTION! It is deprecated document which is actual for the plugin up to version 0.4gm. Since the add-on BayesIt was included into official distribution of the last versions of The Bat!, the information page about installing and setting up the plugin (ver. 0.5.x and newer) is now placed at RitLabs website (see at section "Solution" on official RitLabs site http://www.ritlabs.com) yeah great - I am going in circles!!! Still on the klirik.narod.ru site I see a picture of an initial training wizard. Is that one out? It is really frustrating to scroll thru outdated info in a support section. Can you please tell me, what to do? I did "add" and try to configure the plug-in. But I do not see as many options as in the "initial training wizard".
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506658.2/warc/CC-MAIN-20230924155422-20230924185422-00366.warc.gz
CC-MAIN-2023-40
1,045
3
https://www.horseforum.com/horse-training/try-re-teaching-horse-heart-495697/page3/
code
I was reading this thread by reiningcatsanddogs https://www.horseforum.com/horse-trai...eption-523273/ that referenced this article from 2005 about current research and findings about equine thinking abilities http://www.equineresearch.org/suppor...nkinghorse.pdf While I was reading it, about halfway through, there was the following phrase: "This horse displayed the ability of “learning to learn” by using a general solution (one pattern in each pair was always rewarded) to more easily solve subsequent tests and was able to retain 77.5% of the [correct answers] after 6 mo." I was So Very Excited when I read this, because this is exactly it. It is exactly what happened with my boy that changed him from a fearful-to-act horse into a determined-to-get-it-right horse. He "learned to learn". He learned there always was a right answer and how to go about figuring out what it is. And then, once he'd figured it out, he'd not only remember that answer, but use it to figure out the answer to the questions or challenges I'd face him with next. I especially thought the idea of teaching horses enough so they have broad categories to toss novel objects into rather than having to figure out every band new thing as an individual potential monster is dead on. To start with, every cue and every object is a separate cue or object on its own that takes its own time and worry to deal with. Once a horse has seen enough "stuff" most of them, including mine, seem to start to begin "lumping" a new thing into a category they have in their head of old things so that they just treat it like they treat the other things in that group. For example, my guy seems to understand that "bridges" are a thing and sometimes there are noises. Rattly chains, echoing foot falls, etc. But no matter how visually different or different they sound (overpass, railroad tie construct, graveled culverts, stone, etc) I now imagine him thinking, "Oh. This is one of THOSE things" as he sighs and moves over ones he has never seen the likes of before. This article also validates my personal pet theory which is that we should act crazy around our horses (from their point of view) sometimes to teach them that the proper response to erratic or crazy human behavior is to ignore us. That way when my horse sees someone ignorant of horses 'act crazy' while we're out it the world, my horse can go, "Oh. We've done this one before. Standing quietly is the right answer. Can do" rather than freaking out. So often people look at me as though I've lost my mind. "You'll scare the horse!" Yes. That is the point, and done in a planned, careful manner, it is so that they're NOT scared when this happens under saddle and my health and life are at risk.
s3://commoncrawl/crawl-data/CC-MAIN-2020-45/segments/1603107922411.94/warc/CC-MAIN-20201031181658-20201031211658-00275.warc.gz
CC-MAIN-2020-45
2,729
7
http://www.insidehoops.com/forum/showpost.php?s=66a7719008e897491718cd1bbeed6166&p=4534083&postcount=1
code
Grizzlies reportedly re-signing Rudy Gay for the max I don't see him as a maximum-salary player. I'm surprised the team is doing this. But better to overpay him a little than lose him. So not bad. But still a bit high in salary Last edited by insidehoops : 07-10-2010 at 02:29 AM.
s3://commoncrawl/crawl-data/CC-MAIN-2018-43/segments/1539583513548.72/warc/CC-MAIN-20181021010654-20181021032154-00131.warc.gz
CC-MAIN-2018-43
280
3
https://listman.redhat.com/archives/fedora-list/2007-November/276109.html
code
F8 Installation Issue - Second Try tom.horsley at att.net Wed Nov 14 17:13:13 UTC 2007 On Wed, 14 Nov 2007 08:28:19 -0800 Srikanth Konjarla <srikanth.konjarla at gmail.com> wrote: > I have tried network installation booting through Rescue CD but the > installation fails with the same error. OK, it probably isn't the drive, but if you want to avoid the drive entirely, you can mount the iso image file and extract the isolinux/vmlinuz and isolinux/initrd.img files, stash them in the /boot directory of your existing linux and make a grub entry pointing to them, you can then boot into the installer directly without needing a dvd or cd at all (I've been doing this a lot on machines at work so I don't have to crawl under desks to get to the dvd drive :-). Of course, if there really is no drive problem, none of this will do any good :-(. More information about the fedora-list
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446710421.14/warc/CC-MAIN-20221210074242-20221210104242-00304.warc.gz
CC-MAIN-2022-49
880
18
https://www.monicaalbini.com/privacy-policy/
code
Who we are Our website address is: https://www.monicaalbini.com. What personal data we collect and why we collect it This website does not collect user personal data: - User registration and authentication is disabled - Visitor comments are not allowed - Media uploading is not present - No Analytics Contact form on https://www.monicaalbini.com/contact/ page requires sender’s data as: - First Name - Last Name - Email Address We use these data to create the message and we never store them on website. For further information, contact us from https://www.monicaalbini.com/contact/ page
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100381.14/warc/CC-MAIN-20231202073445-20231202103445-00739.warc.gz
CC-MAIN-2023-50
589
14
https://community.dynatrace.com/t5/Real-User-Monitoring/What-are-the-exact-definitions-of-the-Action-Duration/td-p/23331
code
We are trying to identify a performance issue between various vendors responsible for aspects such as pc's, network, SaaS. We need to define perfectly clearly what the contributors to some of the poor response time spikes are before we start pointing fingers. Could someone please express exactly, in technical terms, how Dynatrace defines "Server consumption", "Network consumption", "Document interactive time", "Action duration" including the timing points it is using to provide these. I've provided a couple of screenshot examples. Solved! Go to Solution. Sorry for the delay of the reply. Because of vacation time, your question got lost. We are mainly using the browser navigation timing values to calculate those values. see the processing model chart (https://www.w3.org/TR/navigation-timing/#processing-model).
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100545.7/warc/CC-MAIN-20231205041842-20231205071842-00031.warc.gz
CC-MAIN-2023-50
820
5
https://randomgeekery.org/note/2021/05/oh-no-i-added-a-javascript-search-thing/
code
<button _="on click get value of #searchQuery call executeSearch(it, false)">Search</button> And yeah I’m back on Hugo. Spent so much time in the last couple weeks touching up the static repo and ignoring the Statamic live site. Decided not to fight it. Anyways, now that I started clearly the logical next step will be GatsbyJS. For flexible values of "logical."
s3://commoncrawl/crawl-data/CC-MAIN-2021-39/segments/1631780057508.83/warc/CC-MAIN-20210924080328-20210924110328-00716.warc.gz
CC-MAIN-2021-39
365
2
https://mail.python.org/pipermail/europython/2003-November/003640.html
code
[EuroPython] Pictures of the venue tom at aragne.com Tue Nov 11 09:16:46 EST 2003 I'm unable to reach that page. Jacob Hallén wrote: > Mmm. Forgot to say where the pictures are: > On måndag 10 november 2003 20.51, Jacob Hallén wrote: >> I have taken some pictures of the venue. They are high resolution, >> but unfortunately I haven't managed to keep the camera as steady as >> necessary. However, it should give you some idea of the >> There are 3 lecture halls with 170 person capacity. >> There are 2 lecture halls with 100 person capacity. >> There is one lecture hall with unknown capacity, somewhere between >> 150 and 200. >> These halls are all on the same level, situated around the central >> Upstairs, floors 1-4, from this level, there are 20 rooms with 50 >> person capacity. These can be rearranged with fewer tables and more >> seats if necessary. >> Downstairs from the foyer, there is a cafe. >> Next to the foyer there is a big atrium. We may be able to use this. >> The foyer surrounds an open-air yard. >> The student Union is 2 minutes walk away. I did not manage to get >> into the big hall there because it was occupied. >> Our options are more varied than expected and there is enough space >> for a very large event. We don't have to worry about running out. It >> should be possible for us to make detailed bookings fairly late, >> adjusting the amount of space after the number of attendees. >> Preliminary plans are good for making a budget though. >> Jacob Hallén >> EuroPython mailing list >> EuroPython at python.org > EuroPython mailing list > EuroPython at python.org More information about the EuroPython
s3://commoncrawl/crawl-data/CC-MAIN-2018-09/segments/1518891815560.92/warc/CC-MAIN-20180224112708-20180224132708-00237.warc.gz
CC-MAIN-2018-09
1,642
34
https://support.keenswh.com/spaceengineers/pc/topic/steam-error-accessing-service
code
Steam: Error Accessing Service Hello I have been having this problem for the past few days. I am unable to post blueprints to the workshop and I keep getting the same ambiguous message. Steam: Error Accessing Service. I hade posted to the Steam discussions hoping someone had a fix but with no luck. Also I am not opting in for Mod.io ever. 1. Tried restarting game/Steam/computer = No Results. 2. Clear out steam cloud data for SE = No Results. 3. Make a new fresh world and a fresh BP = No Results. 4. Verify SE files through Steam = No Results. 5. Uninstall SE and Reinstall SE = No Results. 6. Uninstall SE and delete all files on my computer associated with SE (except for worlds and BPs). Reinstalled SE = No Results. I am at my wits end please help. Thank you.
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323585204.68/warc/CC-MAIN-20211018155442-20211018185442-00559.warc.gz
CC-MAIN-2021-43
767
10
https://www.studiocalico.com/users/supertoni/galleries?offset=12&without=90004-hello-noelle
code
- Rolesville, NC - Joined on Jun 21, 2012 Hello. My name is Toni From. I love to scrapbook, work on Project Life, make cards, mini albums, and other home decor items. I am a list addict and love a great planner. Organization is my jam. I love to laugh and find joy in everyday moments (often through photography.) I enjoy a great corny joke, quick wit, and storytelling.
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510214.81/warc/CC-MAIN-20230926143354-20230926173354-00148.warc.gz
CC-MAIN-2023-40
370
3
https://maroon.tugraz.at/
code
8604d766ee6d2e5ce90056c4e7b9066e7969caa20a36d0041c2c4be72a144dfc Maroon-PC-v4_0-2020-08-28.zip a74d5b8d26d01438ddb81fd7cde382a65231f21a43bf82a69361c410e5b09db6 Maroon-VR-v4_0-2020-08-28.zip Maroon is an immersive physics laboratory designed to support the flexible integration of different interactive learning experiences. The user can approach one of the stations and teleport themself to a room containing the content, simulation or experiment. The lab is developed using Unity software at Graz University of Technology. Using video game technology enables the system to provide a high-quality 3D environment across different devices, such as browsers, desktop PCs and VR platforms. A short documentary (in German, English subtitles available) from ORF explains the basic concepts of Maroon and mentions future visions of the project. Maroon is an open source project hosted on GitHub. You are welcome to contribute ideas, report issues or create pull requests. We are also looking for students who are interested in adding functionality, enhancing the virtual reality experiences, or adding new learning experiences (e.g. physics experiments) to Maroon. For more info regarding possible fields for a bachelor or master thesis contact Johanna Pirker. Possible fields are:
s3://commoncrawl/crawl-data/CC-MAIN-2021-04/segments/1610703527224.75/warc/CC-MAIN-20210121163356-20210121193356-00513.warc.gz
CC-MAIN-2021-04
1,274
6
http://forum.shuffleit.nl/index.php?topic=2405.0
code
Thanks for providing a detailed list of which cards caused problems. I was aware of the fact for Hermit, but Poor House and Crossroads are news to me. After doing some tests, it looks like the log will be filled with the *current* state of the revealed zones (at the decision on which the game has been reloaded), instead of the state at the time the reveal happened. Hermit reveals (at least to yourself) your discard pile, while Poor House and Crossroads reveal your hand. Notice that in game #7748919, when you reload it at the end, it claims that all your Poor House plays revealed a Hamlet. This is the *current* contents of your hand. If you reload at decision 220, just after the last time you played a Poor House (in turn 14), it will show much more cards. Similiarly, most of your Hermit plays will claim that you looked at 4 Hamlets, a Duchy and 2 Estates, which is *exactly* the content of your discard pile at the end of the game (easily verifyable in the log as you shuffle your deck sometimes during your last turn.)
s3://commoncrawl/crawl-data/CC-MAIN-2019-13/segments/1552912201904.55/warc/CC-MAIN-20190319052517-20190319074517-00051.warc.gz
CC-MAIN-2019-13
1,030
4
http://www.anniefitzgerald.com/2012/07/12/lets-not-wait-too-long-official-music-video-release/
code
So excited to share this with you. A HUGE thanks to my director/creative/producer/friend Jim Hoppin (www.jimhoppin.com) for making this with me. You are SUCH a talent. I’m so lucky to have my music come to life through your eyes! As a special thanks & “yippie for music”, the ENTIRE RECORD ‘In Good Time’ is available for download for only $4.99 on my website HERE: http://www.nimbitmusic.com/anniefitzgerald Hope you all ENJOY! Thank you for watching & feel free to share with friends! xo, Annie
s3://commoncrawl/crawl-data/CC-MAIN-2018-09/segments/1518891814124.25/warc/CC-MAIN-20180222140814-20180222160814-00562.warc.gz
CC-MAIN-2018-09
506
3
https://git.ruby-lang.org/ruby.git/diff/NEWS?id=e29c109d2afa62068528c0adaa3b42dee557cba9&id2=e3120abd58e7ee2f29a57c658526e5d84aa7b4fe
code
Diffstat (limited to 'NEWS') 1 files changed, 4 insertions, 0 deletions @@ -239,5 +239,9 @@ with all sufficient information, see the ChangeLog file. === Build system updates === Implementation changes * OS/2 is no longer supported * Borland-C is no longer supported +* Haiku now stable and best effort
s3://commoncrawl/crawl-data/CC-MAIN-2021-17/segments/1618038916163.70/warc/CC-MAIN-20210419173508-20210419203508-00204.warc.gz
CC-MAIN-2021-17
301
8
https://www.daniweb.com/hardware-and-software/microsoft-windows/threads/121989/stop-0x0000007b-0xbacc3528-0xc0000034-0x00000000-0x00000000
code
i recently put this in tips and tweaks by accident and i apologize i have a custom built computer that i decided to upgrade not to long ago. I bought new ram, cpu, and a mobo to go along with an ide hdd and nx8600gts video card. i use windows xp mobo is lanPartyDK 790FX series cpu is an amd athlon 64 x2 dual-core processor ram is 2 gigs of g.skill ddr2 800 i get a blue screen which used to just flash for about 1/4 of a sec but a was able to stop that by disabling "automatic reboot after system failure" The error was about scanning for viruses which i cant do since it will not load windows. the tech info is "stop: 0x0000007B (0xBACC3528,0xC0000034, 0x00000000, 0x00000000)" ive been troubleshooting for a few days but nothing has worked so far, my guess is that the hardware is either uncompatable or i need to reformat.
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817765.59/warc/CC-MAIN-20240421101951-20240421131951-00737.warc.gz
CC-MAIN-2024-18
827
7
https://assamtribune.com/bhaichung-vijayan-question-indias-football-culture
code
NEW DELHI, June 10: �Sleeping giants�, �passionate giants�, so says FIFA but it�s cheerleaders that best describes India when the world�s biggest single sport spectacle comes around every four years. Playing in a FIFA World Cup remains a pipe dream for India and if stalwarts of the game � such as Bhaichung Bhutia and IM Vijayan � are to be believed, the scenario is unlikely to change anytime soon with distinct lack of �football culture� in the country. On and off, here and there, football is discussed in the build-up to the quadrennial FIFA event, but hopes of competing continue to border on absurdity. �I think that will remain so till we have a strong sporting culture, a strong football culture,� Bhutia, who wore the blue jersey a record 104 times during an illustrious career spanning a decade and a half, told PTI. Events, such as a friendly international involving Lionel Messi�s Argentina and a star-studded Bayern Munich turning up for Bhutia�s farewell game, did generate unprecedented frenzy all over the country but these at best can be termed as exceptions. But the 41-year-old Bhutia feels more �needs to be done� for the global sport in a country otherwise enamoured with cricket. FIFA remains convinced of football�s potential in the world�s second most populous nation, its belief bookended by the successful hosting of the U-17 World Cup last year. After a string of impressive results over the last couple of years, India are currently ranked 97th in the FIFA chart, but rankings alone are not a true reflection of progress. �It�s obviously great that we have done well in recent times, but if you talk of World Cup, then it�s a different thing,� Bhutia said, reiterating, �building a football culture is paramount�. �There is no dearth of talent, the infrastructure is much better now, and youth development schemes are being initiated. But culture is one thing that is still missing,� the �Sikkimese Sniper� harped. The 41-year-old Bhutia himself is one of India�s best strikers to have played the game. � PTI
s3://commoncrawl/crawl-data/CC-MAIN-2021-49/segments/1637964363598.57/warc/CC-MAIN-20211208205849-20211208235849-00063.warc.gz
CC-MAIN-2021-49
2,097
11
https://indico.cern.ch/event/1109611/contributions/4820755/
code
Development of a new framework for the derivation of order-by-order hydrodynamics from the Boltzmann equation is necessary as the widely used Anderson-Witting formalism leads to violation of fundamental conservation laws when the relaxation-time depends on particle energy, or in a hydrodynamic frame other than the Landau frame. We generalize an existing framework for the consistent derivation of relativistic dissipative hydrodynamics from the Boltzmann equation with an energy-dependent relaxation-time by extending the Anderson-Witting relaxation-time approximation. We argue that the present framework is compatible with conservation laws and derives first-order hydrodynamic equations in the landau frame. Further, we show that the transport coefficients, such as shear and bulk viscosity as well as charge and heat diffusion currents, have corrections due to the energy dependence of relaxation-time compared to what one obtains from the Anderson-Witting approximation of the collision term. The ratio of these transport coefficients are studied using a parametrized relaxation time, and several interesting scaling features are reported.
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337360.41/warc/CC-MAIN-20221002212623-20221003002623-00575.warc.gz
CC-MAIN-2022-40
1,146
1
https://daikatana.fandom.com/wiki/Barrier
code
The Barrier is a weapon never seen in the final version. It is a staff that has bat wings that uncurl when the player takes it out. When fired, the player will move the Barrier around, but nothing happens. Based on the weapon's name, it is supposed to create some sort of barrier. Of note is that the barrier's .dll file is named “Celestril”, which is a character shown in Daikatana concept art, but never appeared in the game. It is likely that the player was supposed to obtain the Barrier from Celestril in one way or another.
s3://commoncrawl/crawl-data/CC-MAIN-2019-09/segments/1550247493803.26/warc/CC-MAIN-20190219223509-20190220005509-00457.warc.gz
CC-MAIN-2019-09
533
2
https://www.tek-tips.com/faqs.cfm?fid=5314
code
There are only a couple of tricks to extracting files out of general fields. First you have to isolate just one file into it's own .FPT file, and secondly you have to strip the correct number of characters off the start of the resulting file before you write out the stored file. Even files with the same extension can have vastly different headers, so this code is definitely not one-size fits all and will work best when all or most of the files were created consistiently so that the header matches the sample file. I suppose someone could build a library of 'starter strings' and/or how VFP handles loading/storing each one. I also noticed that while the program works with Excel files too, the extracted file opens into Excel as hidden and needs to be unhidden. Weird huh? This code assumes you have a filename without a path stored in the dbf... if you don't have this situation you can always make one by adding a character field and populating it with transform(recno()). Anyway, just copy and paste this code into a prg and run. CLOSE ALL lcSafe=SET("safe") SET safe off messagebox("Please select the table you want to extract files from.") lcTargetTable=FULLPATH(GETFILE([dbf])) lcFilename = INPUTBOX("Type in the name of the field with your file names.") lcGeneralFieldname = INPUTBOX("Type in the name of the general field.") messagebox("Please select an example of the file type you want to extract e.g. a Word file") lcTestStr=LEFT(FILETOSTR(GETFILE()),10) SET DEFAULT TO JUSTPATH(lcTargetTable) USE (lcTargetTable) SCAN lcOutputNameAndPath=SYS(5)+SYS(2003)+[\]+&lcFilename COPY FIELD (lcGeneralFieldname),&lcFilename TO MyTempFile NEXT 1 lcFile=FILETOSTR("MyTempFile.FPT") lcFile=RIGHT(lcFile,LEN(lcFile)-(ATC(lcTestStr,lcFile)-1)) IF ATC(lcTestStr,lcFile)<1000 &&otherwise assume it's a different file type STRTOFILE(lcFile,lcOutputNameAndPath) ENDIF ENDSCAN
s3://commoncrawl/crawl-data/CC-MAIN-2020-34/segments/1596439735906.77/warc/CC-MAIN-20200805010001-20200805040001-00345.warc.gz
CC-MAIN-2020-34
1,874
11
https://docs.vmware.com/en/VMware-vSphere/6.5/com.vmware.vsphere.update_manager_utility.doc/GUID-65E4DEFE-BE3F-4620-AE03-C247332E3A6D.html
code
By using the Update Manager Utility, you can change the database connection settings and proxy authentication, re-register Update Manager with vCenter Server, and replace the SSL certificate. Start the Update Manager Utility and Log InTo use the Update Manager Utility, you must start the utility and log in. Launch the Update Manager Utility with UMDSTo use the Update Manager Utility with UMDS, you must log in to the machine on which UMDS is installed. Reconfigure the Proxy SettingsIf your system proxy settings change after you have installed the Update Manager server or UMDS, you must reconfigure the Update Manager server and UMDS to use the new proxy settings. Change the Update Manager Database Connection SettingsYou can specify a different user name and password for the Update Manager or UMDS database connection. Re-register Update Manager with vCenter ServerYou might need to re-register Update Manager with vCenter Server in certain situations, for example when the IP address of vCenter Server or Update Manager changes. Change the Update Manager SSL CertificateYou can change the SSL certificate that Update Manager uses to authenticate against vCenter Server. Restart the Update Manager ServiceIn certain cases, such as when you change the network connectivity settings, you must restart the Update Manager service.
s3://commoncrawl/crawl-data/CC-MAIN-2018-17/segments/1524125947693.49/warc/CC-MAIN-20180425041916-20180425061916-00290.warc.gz
CC-MAIN-2018-17
1,334
1
http://birdsanctuary.co.uk/sir-loin/
code
Sir Loin is a simple graphic adventure with a series of basic quests played against the clock. The player has to find different servants and swap specific items between them. The ultimate goal is to get the correct servant with the correct item into the King’s Throne Room at a specific time. Apart from wandering around the castle and searching for servants, Sir Loin also has to stab various opponents (including ghosts) with his sword, otherwise they reduce the amount of time he has left to achieve the tasks. The look and feel of the castle (along with the control system employed), is very similar to Firebird's own arcade adventure, Black Lamp
s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250608295.52/warc/CC-MAIN-20200123041345-20200123070345-00283.warc.gz
CC-MAIN-2020-05
652
3
https://forums.gta5-mods.com/topic/9006/fib-building-round-table-room
code
FIB Building - Round Table Room There's a room in the FIB building that you can't enter - not even using Spooner Mode. It seems to just be an illusion, which is cunt, because it's the best looking interior in the game. Is there any possible way of that room being recreated? I don't think the table is even a prop in the game - but I figure if modders can make cars and weapons - it be possible to make props? Could someone link a modder who could possibly dial into this
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233511053.67/warc/CC-MAIN-20231003024646-20231003054646-00673.warc.gz
CC-MAIN-2023-40
471
4
https://www.oreilly.com/library/view/advanced-internet-protocols/9780470499030/12_chapter05.html
code
MULTIPROTOCOL LABEL SWITCHING This chapter describes Multiprotocol Label Switching (MPLS) technologies, which enable networks to perform traffic engineering, resident communication, virtual private networking, Ethernet emulation, and so on. First, an overview of MPLS is provided. Next, the functions and mechanisms of MPLS are described. Finally, MPLS applicabilities are discussed. A key purpose of MPLS is to provide a tunneling mechanism that uses labels. MPLS is an Internet Engineering Task Force (IETF) standard intended to enhance the forwarding performance and traffic engineering intelligence of packet-based networks including Asynchronous Transfer Mode (ATM) and Internet Protocol (IP). MPLS communication is connection oriented, while IP datagram communication is connectionless. In the connection-oriented communication, a connection is established before starting communication. In connectionless communication, communication immediately starts by exchanging datagrams between source and destination hosts without establishing a connection. MPLS carries IP and non-IP payloads, and can operate over any data link layer. The layer of MPLS is considered to be between the data link layer (layer 2) and the network layer (layer 3). MPLS separates the control plane from the forwarding plane. MPLS enables the IP control plane to run on devices that cannot understand IP or recognize packet boundaries. The architecture of MPLS is discussed in more detail in .
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446711016.32/warc/CC-MAIN-20221205100449-20221205130449-00636.warc.gz
CC-MAIN-2022-49
1,471
3
https://www.bleepingcomputer.com/forums/t/245494/prob-installing-xp-pro/
code
Posted 30 July 2009 - 10:29 AM I started having trouble about a week ago. First my Malware was not working when i went to run it. Then, I could not get on line to update it. Next, I found the error/virus was in Document and Settings, Admin, Loc Settting, Temp file. I deleted all that was in there and the problem still persisted. I decided to re-instal the operating system, but did not have the original XP Home, so was attempting a full install of XP Pro that i have. It started to install...i put the key code in and all..then I got a black screen with the white cursor in the upper left. What can I do?
s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376823895.25/warc/CC-MAIN-20181212134123-20181212155623-00080.warc.gz
CC-MAIN-2018-51
607
8
http://www.cnczone.com/forums/general_metal_working_machines/6686-brother_computer-numeric-control_100_a.html
code
i have just viewed a brother tc211 machine.fitted with a brother cnc 100 control and i am trying to find out as much info as possible. what i want to know is can i do some light milling on it (all parts are in ali) i will need to mill some circular pockets and am not sure this will be poss. Any info you can give me will be great!! I need help setting tool length on a brother tc227. I am trying to manually enter the tool length and it will not accept it. Can any one Help me Please!
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368699755211/warc/CC-MAIN-20130516102235-00009-ip-10-60-113-184.ec2.internal.warc.gz
CC-MAIN-2013-20
485
5
https://thebeardedhousewife.com/how-to-make-christmas-pyramid-cards/
code
LEARN TO MAKE COOL PYRAMID CARDS FOR CHRISTMAS ON YOUR CRICUT CUTTING MACHINE I have seen pyramid or tee-pee cards in the past but have never tried one. I thought they would make a great tree card! What better way than to have a Christmas Tree?? In this tutorial, I’ll give you my step by step instructions and tell you what materials I think work best when making this project. This post contains some affiliate links (which means if you make a purchase after clicking a link, I will earn a small commission at no additional cost to you). Read my full disclosure policy here. CHRISTMAS TREE PYRAMID CARD – MATERIALS LIST - I am using my Cricut Maker. You could also use your Cricut Explore Air 2, Cricut Explore 3, or Cricut Maker 3! - Cricut Scoring Wheel or Scoring Stylus - Cricut StandardGrip Cutting Mat (green) - Cardstock. I am using my standard white cardstock, reds, greens, yellow, and patterned paper. - Glue or adhesive - Cricut Scraper - Cricut Brayer Post a photo in the comment section or tag your projects on social media @thebeardedhousewife using the hashtag #beardedhousewife! I’d love to see how yours turn out!!
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817382.50/warc/CC-MAIN-20240419074959-20240419104959-00147.warc.gz
CC-MAIN-2024-18
1,139
14
http://www.thestalkingdirectory.co.uk/showthread.php/122697-Swarovski-3-18-x-50-and-optilocks
code
I'm having a switch around with my scopes. I have a Swarovski z6i 3-18 x 50 that I'm moving over to my tikka t3 lite. I am already using optilocks with 34mm rings at the moment, but as the z6i has a 30mm tube I will need to get some new rings. My question is, can I go to extra low rings? I like my scope as low as possible. Annoyingly I had some before I had a swap around a few years ago, but I seem to remember either selling them or I've misplaced!! The scope I had before was a 3-12 x 50 Zeiss duralyt and that had enough clearance, I'm guessing this will also be fine for clearance too. So does anyone have a tikka t3 the aforementioned scope and extra low rings. I also guess if someone had a sako and the same scope that would also give me a good idea. Thanks in advance.
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988718285.69/warc/CC-MAIN-20161020183838-00219-ip-10-171-6-4.ec2.internal.warc.gz
CC-MAIN-2016-44
779
7
http://www.verycomputer.com/282_7aa7e36830774b2f_1.htm
code
: Is there any way to access the Alias post filter functions from a shell? : I want to make a batch post filter script (that does other stuff too) so : need to know how to access this _or_any_other_ filtering command. : Anything that could apply a 3x3 convolution filter would be EXCELLENT. Unfortunately the only Alias operations available at the command line involve translating databases, such as turning a wire into an sdl, a dxf file into a wire, etc. However, sgi's do have a fairly decent range of image processing tools available, including "convolve", which could be utilized in a batch postfiltering script. These tools only work with sgi format images, so you'd need to run "fromalias" on your images first to convert them. The image tools are located at /usr/sbin. If your machine doesn't have them installed, they are available on the OS CD for installation. If I remember correctly, they are listed in inst as "Image Tools", or "Image Works" or something like that. I'm not at an sgi at the moment, else I'd check for you........ Hope this helps. image design, nyc
s3://commoncrawl/crawl-data/CC-MAIN-2019-35/segments/1566027315750.62/warc/CC-MAIN-20190821022901-20190821044901-00554.warc.gz
CC-MAIN-2019-35
1,078
18
https://wiki.th3-gr00t.tk/vim
code
This is not a holy grail, just a dump of notes. # my best option visual mode 1. enter visual mode 2. select lines you want to comment 3. press SHIFT + i to enter insert mode 4. enter the comment symbol (note it will comment all the lines once you have pressed ESC key) 5. press ESC key. After copy pasting codes in vim, the indentation is usually messed up alot of times. Here is a way to unindent multiple lines. 1. enter visual mode 2. select lines you want to unindent 3. press the < shift to left 4. press . to repeat the indent ^: move to the begining of the line $: move to the end of of the line Increament and Decrement number… VIM Tips CTRL+a: ++ CTRL+x: --
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510085.26/warc/CC-MAIN-20230925183615-20230925213615-00107.warc.gz
CC-MAIN-2023-40
668
7
https://docs.w3cub.com/haxe~javascript/html/audio/mediastreamaudiodestinationnode/
code
Inherits properties from its parent, read only stream:MediaStream MediaStream containing a single AudioMediaStreamTrack with the same number of channels as the node itself. You can use this property to get a stream out of the audio graph and feed it into another construct, such as a Media Recorder. © 2005–2018 Haxe Foundation Licensed under a MIT license.
s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600400189264.5/warc/CC-MAIN-20200918221856-20200919011856-00377.warc.gz
CC-MAIN-2020-40
360
6
https://www.hardwareforums.com/threads/game-key-needed.2215/
code
I have the Original CD of F-22 Lightening 3 which i bought from Best buy a long time ago. Now I have lost its cover which had the key written on it. Does any body know how can i get the key for the game. Personally, I don't understand why the HELL!! do companies put a key on their products. Certainly it cannot be for security purposes as if one goes through imesh or some other p2p software almost all the keys are available there.
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662517245.1/warc/CC-MAIN-20220517095022-20220517125022-00410.warc.gz
CC-MAIN-2022-21
433
1
http://www.apug.org/forums/viewpost.php?p=949125
code
yes i did notice but im still in shock, doesn't this just kill the desire for people to use the material there? I mean if the price dropped more people might shoot on it and they would make more money from more film processing...etc a see saw so to speak.... hmm its none of my business. but still WOW!!! "Its my profession to hijack time" ~ Stephen Frizza.
s3://commoncrawl/crawl-data/CC-MAIN-2015-22/segments/1432207928479.19/warc/CC-MAIN-20150521113208-00194-ip-10-180-206-219.ec2.internal.warc.gz
CC-MAIN-2015-22
357
2
https://joe.kgatos.com/
code
Software Architect Engineer Hi, my name is Joe Kramer and I like to build things for the web. For the past seventeen years, I have been passionate about crafting visually stunning and user-friendly app and web experiences. Through my extensive experience, I have developed a diverse skill set and taken on various roles, allowing me to comprehend and design innovative product developments that cater to user needs while aligning with business requirements and maintaining impeccable engineering standards. My enthusiasm for design and code drives me to tackle challenging projects with utmost dedication. Primary Tech Stack - Advanced proficiency in CSS and ReactJS, enabling creation of intricate designs with interactivity, layering, animation, and seamless responsiveness to window resizing, among other essential features. - I have an affinity for all things art and engineering, but my expertise is in custom designing new enterprise level applications from scratch. - Well-rounded professional software engineer with over sixteen years of experience designing, developing, and maintaining diverse sets of technologies for small businesses, startups, and large international corporations. - Committed to meeting industry standards and best practices. Establishes processes, workflow, communication, and tools for an effective and efficient engineering team. Writes exceptionally clean and documented code. - Lifelong learner. Constantly researching and testing new technologies and processes. - Comprehensive understanding and experience of the complete life cycle of development: from discovery and business analysis, defining requirements and priorities, user experience design, full stack development, testing and debugging, to deployment of product releases. - Decisive leader of initiatives to promote organizational growth and optimal utilization of emerging technologies. - Excellent collaboration skills. Works great in small teams as well as individually and remotely. Helps teach and train others with valuable insight. Helps others troubleshoot coding problems and debugging. - Skilled in solving extremely complex logic problems in large systems as well as applying artistic visual qualities in extraordinary precision and detail. - Built enterprises from concept into production with millions of users. - Exceptional at finding and recruiting the best engineers, and building teams with a great culture. - Communication with clients to articulate and simplify complex technology, demo products, and assist with questions and integrations. Software Architect Engineer UI focus on multiple projects. New features and bug fixes to data reporting internal tools using TypeScript and ReactJS. Adobe Photoshop UXP plugin using TypeScript. Director of Engineering Leading Front End development with offshore team on an innovative next generation security solution for enterprises that encrypts, injects rights management, and traceability into documents. Successfully implemented workflow, processes, tools, and communication to get the stalled project organized and back on track to deliver new features and bug fixes. Working with clients on testing, implementation, and features. Senior Software Engineer Developed next gen video player agnostic AdTech container system to display a variety of ad formats (traditional and next gen) on top of or around the video player on desktop and mobile devices using TypeScript. Successfully completed the project months ahead of schedule and rolled out to clients using 20 different video providers proving the system to be player agnostic, adaptable, and configurable. Joe is a brilliant full-stack engineer with a proven track record of success. He is highly skilled in a plethora of programming languages. Joe’s grit is unmatched and he can bring small to enterprise level products to life. One strength is Joe’s ability to deal with conflicting priorities in high-pressure situations. He never loses his cool which is one of the reasons he stands out. I had the pleasure of working with him at a startup. He trained me in product design (UX/UI) and pushed my knowledge of IT and business to new heights. As a leader, he is always available to help. Joe also allows you to have autonomy on projects, which keeps employees happy and helps them to grow. He has helped mentor and train junior to mid-level developers who are now successful. I saw some of the new technologies he created for a company. He was able to create a new interactive tool that was a first of its kind. I won’t be surprised if he has a unicorn in the near future. Any company that hires him is fortunate because he will be an asset. - Nicholas Navarra Right from the start, I could tell that Joe was experienced, patient, and a unicorn. During the time I worked with him, I learned of and appreciated his resilient nature that was extremely necessary in a startup. He was always understanding and consistently helped me with my career progression throughout Grabit. His skills communication and management was great, given our remote environment. Joe asked all the critical questions, poked holes into everything and was a architecture wizard. He was a critical part of my personal growth and I value him as a friend. Cheers to crossing paths again professionally! - Daniel Gih Joe is hands down one of the most versatile and talented people I have ever had the pleasure to know or work with. He has an experienced, honed, and effective set of engineering skills that allow him to tackle problems all the way from complex architecture design, through to complete software. His technical ability and personality make him the type of leader you WANT to follow. Joe is always looking out for everybody on his team, and beyond his ability to create great products, he is just an excellent leader overall. He truly invests himself in everything he makes, and the people he works with. Anybody, including myself, would be lucky to have him as part of a team. - Jeremy Brenner "Walk with the dreamers, the believers, the courageous, the cheerful, the planners, the doers, the successful people with their heads in the clouds and their feet on the ground." - Wilferd Peterson Belief in the best of outcomes and stiving to make it reality. Ongoing expansion of knowledge and skill sets to arrive prepared in a continuously changing environment. I'm a life long learner and always trying to better myself. Making up your mind that you're going to achieve a goal, and taking action to keep pushing forward until it's accomplished. Generating or recognizing ideas, possibilities, and alternatives that are new and valuable, that may be useful in solving problems, communicating, or entertainment.
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233508977.50/warc/CC-MAIN-20230925115505-20230925145505-00419.warc.gz
CC-MAIN-2023-40
6,718
33
https://meta.stackoverflow.com/questions/403419/i-added-three-questions-and-my-questions-are-not-answered?noredirect=1
code
I have added already 3 questions, and none of them are viewed to the readers. Every time I get a response from your editor, I adjust it and correct the editors notes. What am I doing wrong? In this question Can I display more than one chart on the same page? you've included a script.js file but that is not going to work as viewers don't have that script.js file. You need to include it in the snippet because that script.js contains the reason why your chart doesn't work. Your questions are tagged correctly, have a well written title and are complete. Some nitpick might say the code/Markdown is not minimal, but that is about it. I'm not sure if there are related / similar questions that you looked at, but they didn't solve your problem. It might help if you include links to those and explain why those other questions didn't help. Your questions got 18 and 30 views. In the heavy traffic tags that isn't too bad, but you need to stumble on just the right person that has some spare minutes left to produce an answer for you. While SO is a popular site it still is volunteer labor without service level agreements. Give it 6 to 8 weeks to receive an answer.
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233511002.91/warc/CC-MAIN-20231002164819-20231002194819-00842.warc.gz
CC-MAIN-2023-40
1,165
4