url
stringlengths
13
4.35k
tag
stringclasses
1 value
text
stringlengths
109
628k
file_path
stringlengths
109
155
dump
stringclasses
96 values
file_size_in_byte
int64
112
630k
line_count
int64
1
3.76k
https://blog.sighup.io/snyk-and-shift-left-approach/
code
As you may have already read in our recent article, we announced our Partnership with Snyk. Still, already from some months, our DevSecOps Team had been studying, testing, and experimenting with Snyk tools to confidently add them to our "Security toolset". This article will provide a brief overview, some example use cases on Snyk's tools and features, and how we used it to improve Kubernetes Fury Distribution's security. What is Snyk? Snyk is a security platform that allows developers to scan their code for vulnerabilities and security issues, and provides fixes and recommendations for how to remediate them. Some key features of Snyk include: • Dependency scanning: Snyk can automatically scan your application's dependencies to identify known vulnerabilities. This allows you to find and fix vulnerabilities early in the development process before they make it into production. • Continuous integration and delivery (CI/CD) integration: Snyk integrates seamlessly with popular CI/CD tools like Jenkins, CircleCI, and Travis CI, allowing you to automatically scan your dependencies at every stage of the development process. • Fix suggestions: When Snyk identifies a vulnerability in your dependencies, it will provide you with a fix suggestion that you can use to quickly and easily fix the vulnerability. • Security policies: Snyk allows you to set up custom security policies that define what level of risk is acceptable for your application. If a vulnerability is found that exceeds your defined level of risk, Snyk will alert you so that you can take action to fix it. • Third-party library analysis: Snyk can help you understand the security risk of using third-party libraries in your application. It will provide you with information about the known vulnerabilities in these libraries, allowing you to make informed decisions about which libraries to use. What is a Shift-Left approach? It's a practice in the DevSecOps methodology that aims to move security measures and testing earlier in the software development process. Shift-left aims to identify and address potential security vulnerabilities as early as possible in the development cycle, rather than waiting until later stages or even after the software has been deployed. That also helps to improve the overall quality of the software being developed, as it encourages developers to consider and integrate security measures into their code from the beginning. This can lead to more robust and secure software. How we made use of Snyk to improve Fury Kubernetes Distribution security We first imported the repository into Snyk Dashboard, then a scan is performed to check all the major vulnerabilities. For this example, we used our Gatekeeper module (https://github.com/sighupio/gatekeeper-policy-manager). After some time scanning, Snyk will prompt us with a summary of the found vulnerabilities. Indeed, as a static analysis, at this step is not certain that the found vulnerabilities are in fact impacting the product. You can see the number and the severity level together with the responsible file. We will take one High severity vulnerability as an example. Expanding it we can see more details about it in a really clear way, together with a priority score, remediation methods, and even a link to a learning page talking about it. If we click on "Fix this vulnerability" we automatically open a PR to the project clearly stating all the information about it, easily comprehensible by the developer who will review it and hopefully merge it. This is really a great feature because it creates awareness among the developers on security vulnerabilities that would be otherwise not taken into consideration or not given adequate priority. That's the idea behind a shift-left approach, moving the security checks back to the code developer level, without slowing down their work or putting roadblocks.
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947475701.61/warc/CC-MAIN-20240301193300-20240301223300-00549.warc.gz
CC-MAIN-2024-10
3,890
18
http://suresh-mobileweb.blogspot.com/2008/07/changing-php-session-behavior.html
code
1. All changes must be made before calling session_start(). 2. The same changes must be made on every page that uses sessions. For example, to require the use of a session cookie (as mentioned, sessions can work without cookies but it’s less secure), use Another change you can make is to the the name of the session (perhaps to use a more userfriendly one). To do so, use the session_name() function. The benefits of creating your own session name are twofold: it’s marginally more secure and it may be better received by the end user (since the session name is the cookie name the end user will see). The session_name() function can also be used when deleting the session cookie: Finally, there’s also the session_set_cookie_params() function. It’s used to tweak the settings of the session cookie. Note that the expiration time of the cookie refers only to the longevity of the cookie in the Web browser, not to how long the session data will be stored on the server.
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917120187.95/warc/CC-MAIN-20170423031200-00501-ip-10-145-167-34.ec2.internal.warc.gz
CC-MAIN-2017-17
978
7
https://roger.party/uncategorized/painting-and-finishing-the-cbr-600-reverse-trike-project/
code
It’s been a long time since you guys have seen this reverse trike build but today we are painting and finishing this project. I did want to originally replace this old CBR 600 engine with something better but I gave up looking for a better engine. Follow me on Instagram https://www.instagram.com/rather_bwelding/?hl=en help support me on Patreon – https://www.patreon.com/ratherBwelding #cbr600rr #reversetrike #fabrication Music by Epidemic Sound (http://www.epidemicsound.com)
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100531.77/warc/CC-MAIN-20231204151108-20231204181108-00126.warc.gz
CC-MAIN-2023-50
483
5
https://support.okta.com/help/answers?id=9062A000000bmQRQAY
code
Question about web browsers or other programs saving passwords in Okta One of our Depts uses a lot of shared accounts (Twiiter, Fed Ex, Amazon, etc) and we've made it simple for them with chiclets in Okta. We recently went through each app to replace their simple passwords with complex passwords. We wanted to prevent them from having the passwords since they normally write it down or have it in a speadsheet. What I noticed was when they use the chiclet after the password change, their web browser (Chrome) prompted them if they wanted to save or replace the current stored password. Another user had Dashlane and it prompted the same thing. Now, in a backdoor kind of way, they have visual access to the complex password again (which might go on a post it note or a spreadsheet) and totally negates the reason we made the changes in the first place. Are there any features on Okta that can prevent that? Thanks. We have a lot of web apps using "Users share a single username and password set by administrator". I'm also looking for an option to prevent users to store the passwords in their web browser. I tried different options but haven't found a good one. Although it is possible to disable the "Remember logins for sites" in Firefox; this disables it for ALL websites. We only want to disable this for okta mananaged credentials.
s3://commoncrawl/crawl-data/CC-MAIN-2018-30/segments/1531676593051.79/warc/CC-MAIN-20180722061341-20180722081341-00125.warc.gz
CC-MAIN-2018-30
1,339
3
https://economicsnetwork.ac.uk/cheer/ch15_1/ramsden.htm
code
This paper tackles an important point when using spreadsheets as teaching aids, namely how to publish the spreadsheets on the Web. The paper has been written from our experiences of writing spreadsheet simulations for the Virtual Learning Arcade ( http://www.bized.ac.uk/virtual/vla/ ). The primary focus of this article is the role of the Model Master toolkit used to prepare spreadsheets for publication on the Web. The student's understanding of economic models is crucial to their understanding of economics. By their very nature spreadsheets lend themselves to assisting an individual's understanding of models through experimentation. The benefits of using spreadsheets as a teaching aid have been well documented. The diversity of applying spreadsheets to teaching economics in Higher Education is evident from the recent articles in CHEER. For instance, Mixon & Tohamy (2001) applied Microsoft Excel for teaching an Introduction to International Trade course, aimed at first year students. In contrast, Cahill and Kosicki (2001) applied spreadsheets to support teaching second and third year students the issues of the neoclassical assumptions within a Keynesian model. The Virtual Learning Arcade (VLA) provides interactive online models that illustrate and test the fundamental principles of economics. Some of the simulations look at large scale or even global issues, while others focus on distinct topics. The simulations are supplemented with support materials that have been written to further enhance the educational value of the simulations. This includes explanations of the theories associated with the models and simulations, interactive worksheets, glossaries and guidelines. This paper explores the method by which educators can convert their spreadsheets to be distributed through departmental intranet / internets, and how these online spreadsheets can be further supported to enhance their value as learning objects. An important issue for educators is the method by which they distribute their spreadsheets. The conventional approach is either allowing students to download the file or allowing access through college networks. Both these approaches have limitations. In particular there is the issue of access and the provision of support material. For instance, the student must have a valid version of the proprietary programme (i.e. Microsoft Excel) on their computer, and spreadsheets - electronic ledgers - are limited in how they display textual information. Both of these problems can be overcome if the spreadsheet can be published on the Web in a format that is browser-independent. The VLA will publish approximately ten spreadsheet-based models on the Web, all written in Excel. One, typical in its structure and size, is a model of the housing market. We shall use this to illustrate the method of conversion. Figure 1 illustrates the worksheet. The model is a simple supply and demand equilibrium model, where the demand and supply curves are determined by factors such as, household income, price of complements and substitutes, alternative production possibilities for firms and government regulation. The spreadsheet design allows for the student to change all input parameters, including the elasticity conditions. The model output is in the form of the new equilibrium position and the percentage change from the previous position. It is evident that the spreadsheet would have considerable potential for teaching the microeconomic principles on an introduction to economics course. Figure 1: Excel Model of the Housing Market This project uses only server-side processing. Although it restricts interaction, it compensates with other advantages. The user does not have to download and install a Java interpreter, often necessary when using applets. The browser's memory requirements are less. And almost any browser can be used, even the text-only browser Lynx, so we reach a much wider audience. In the next two sections, we give a general introduction to Model Master, and then explain how we published our spreadsheets. Like cornflakes, vaccination and vulcanised rubber, Model Master (MM) was invented by accident (note1), in this case as a by-product of research into the foundations of object-oriented programming. It started life as a tool for writing spreadsheets in a less error-prone way than by typing them directly into Excel. The idea is that the modeller can write a series of equations which MM will then convert into a spreadsheet. The process is similar to using a conventional compiler, except that instead of turning a program into a .exe file, MM generates a spreadsheet. Instead of inscrutable cell addresses such as C9 and F6, the modeller can write meaningful variable names such as CostOfLand and SensitivityToInterestRate, and can either tell MM which cell to use for each variable, or let it decide for itself. Together with the ability to write comments in the program, and some special features for reusing code from libraries, these make the program easy to read and maintain. Information on MM is available at http://www.j-paine.org/mm_publications.html . Writing spreadsheets in this way suits modellers accustomed to conventional languages like Fortran, or mathematical toolkits such as Mathematica and Unisolve. However, many people do prefer to program directly in Excel. So as well as the MM compiler, we have implemented a "decompiler" which goes the other way, translating existing spreadsheets into MM programs. Our intention was that modellers, having originally developed their program in Excel, could decompile it into an MM program and from then on use that as the primary source, because of its greater intelligibility and maintainability. However, even if the modeller chooses not to do that, the MM program is also a good concise summary of the spreadsheet's structure and content, and can be useful just as an aid to error-checking. To make these summaries more readable, we have equipped the decompiler with heuristics that enable it to guess sensible names for cells by looking at text labels in adjacent cells. Of course, sometimes these heuristics make a wrong guess, so the modeller can override them. Figure 2 below shows an MM listing of the Housing Market model with the original cell names, and Figure 3 shows one with names chosen according to MM's heuristics. C5=15000 C6=6 C7=56 C8=650 C9=4000 C10="neutral" C11="neutral" C16=((C27+(F5*C5) -(F6*C6)+(C7*C28)+(C8*F7)+C31+(C25*C29)+(C9*C32)+(C24*C30) )/(F9+F10) C17=C27-(F9*C16)+(C5*F5)-(F6*C6)+(C7*C28)+(C8*F7) C24=IF(C10="neutral",0,IF(C10="loose",-10,10)) C25=IF(C11="neutral",0,IF(C11="decreases",-10,10)) C27=45000 C28=10 C29=400 C30=1000 C31=1000 C32=0.05 F5=0.9 F6=25 F7=1.1 F8=30 F9=0.4 F10=0.8 F11=49020.83 F12=40016.67 F16=((C16-F11)/F11)*100 F17=((C17-F12)/F12)*100 Figure 2: MM-language summary of the Housing Market model HouseholdIncome=15000 InterestRate=6 Population=56 RentalPrices=650 CostOfLand=4000 BuildingRegulations="neutral" OutputOfOtherSectors="neutral" Price=(a+(IncomeElasticityOfDemand*HouseholdIncome)+ (SensitivityToInterestRate*InterestRate)+ (Population*PopulationConstant)+(RentalPrices*CPEDWithRental)+ c+(OutputOfOtherSectorsFactor*OutputOfOtherSectorsConstant)+(CostOfLand*e)+ (BuildingRegulationsFactor*BuildingRegulationsConstant) )/(PriceElasticityOfDemand+PriceElasticityOfSupply) Quantity=a+(PriceElasticityOfDemand*Price)+ (HouseholdIncome*IncomeElasticityOfDemand)+ (SensitivityToInterestRate*InterestRate)+(Population*PopulationConstant)+ (RentalPrices*CPEDWithRental) BuildingRegulationsFactor=IF(BuildingRegulations="neutral",0, IF(BuildingRegulations="loose",-10,10)) OutputOfOtherSectorsFactor=IF(OutputOfOtherSectors="neutral",0, IF(OutputOfOtherSectors="decreases",-10,10)) a=45000 PopulationConstant=10 OutputOfOtherSectorsConstant=400 BuildingRegulationsConstant =1000 c=1000 e=0.05 IncomeElasticityOfDemand=0.9 SensitivityToInterestRate=25 CPEDWithRental=1.1 SensitivityToCostOfLand=30 PriceElasticityOfDemand=0.4 PriceElasticityOfSupply=0.8 OriginalPrice=49020.83 OriginalQuantity=40016.67 PriceChange=((Price-OriginalPrice)/OriginalPrice)*100 QuantityChange=((Quantity+OriginalQuantity)/OriginalQuantity)*100 Figure 3: MM-language summary of the Housing Market model, after renaming cells MM also provides facilities for error-checking spreadsheets. For example, it can detect constants and input cells that are never referenced in other formulae, and output cells which are never changed by anything in the spreadsheet. This and the listings generated by the decompiler have already proven useful in helping us detect errors in our models. Finally, we have also developed a spreadsheet evaluator for MM. This takes a spreadsheet and a list of values for its input cells, and evaluates all the formulae, giving a list of values for the output cells. The evaluator is written in Java, and can be called from any Java-capable Web server. This is what we are using to run our Web-based models. We shall demonstrate the use of MM. In this section, to make it clearer who is doing what, we write our description as instructions, addressing the modeller as "you". The first step is to save the spreadsheets as a SYLK file. Then you need to make the Web pages. This raises the question of how users interact with the model. Generally speaking, the original spreadsheet will have its inputs and outputs simultaneously visible within the same worksheet. We could imitate that, so that the entire model is presented on one Web page which contains both the input fields and the outputs. However, we decided for reasons of consistency with other learning objects within the VLA to have inputs on one page and outputs on another. Amongst other things, these will contain links to the support materials. The starting point is to write both pages as normal HTML files, leaving spaces where the inputs and outputs will eventually go. This can be anywhere - in tables, in lists, in headings, in the middle of a paragraph. Tables are convenient, because they make it easy to place short labels. However, there is no need at all to follow the layout of the original spreadsheet, nor is it even necessary to put all the cells in the same table. The spreadsheet is being used merely to run the model, not to display it. The input page does need to have all inputs enclosed within a form, which must have a "Submit" button. Once you think the pages are ready, check them in a browser. The next stage is to add the model's inputs and outputs. To simplify doing this, we have written a tool called WSM (note2) which makes it easy to write menus and to associate cells with locations on the pages. Start with the input page. It now needs to be renamed so that it has the extension .pfn. You also need to: prepend the magic symbols (args) ] as a header before anything else in the page; to change the form definition so that it looks like <FORM ACTION=[ (wsm-action 'run) ]>; to add a hidden field <INPUT TYPE=HIDDEN NAME=filename VALUE="house_prices.slk"> giving the name of the spreadsheet SYLK file; and to add another hidden field <INPUT TYPE=HIDDEN NAME=out VALUE="HousePricesOut"> giving the name of your output page. It will have been necessary, when installing MM and WSM, to configure them so that they know the directories in which the pages and SYLK files are stored. Having thus prepared the input page, specify each input field. Actually, we use menus rather than fields, to avoid the need for error-checking. Menus are specified by giving the name of the cell and the menu's contents: [ (menu "C7" "55 to 60" 56) ] or [ (menu "C5" "15000 to 25000 by 1000" 20000) ]. Inside the square brackets, the first string is the name of a cell. The second specifies a list of values to appear in the input menu, and the third is the default. The values can be written in the form of a loop, to simplify generating long sequences of repetitively changing prices, rates, or other quantities. Figure 4 shows an extract from the Housing Market model's input page. (args) ] <html> <head> <title>Virtual Learning Arcade - Modelling House Prices</title> </head> <body> <h2>Modelling House Prices</h2> <h3>The Inputs</h3> <hr width="350" align="left"> <form method=get action=[ (wsm-action 'run) ]> <input type=hidden name=filename value="house_prices.slk"> <input type=hidden name=out value="HousePricesOut"> <table border="1" cellspacing="2" cellpadding="5" bgcolor="#6699cc" width="450"> <tr> <td colspan=2><h3>Demand & Supply Conditions</h3></td> </tr> <tr> <td bgcolor="#99bbdd">Household Income (£)</td> <Td bgcolor="#99bbdd">[ (menu "C5" "15000 to 25000 by 1000" 20000) ]</td> </tr> <tr> <td bgcolor="#99bbdd">Interest Rate (%)</td> <td bgcolor="#99bbdd">[ (menu "C6" "2 to 10" 6) ]</td> </tr> <tr> <td bgcolor="#99bbdd">Population (millions)</td> <td bgcolor="#99bbdd">[ (menu "C7" "55 to 60" 56) ]</td> </tr> ... etc ... </table> </form> ... etc ... Figure 4: Input page Preparing the output page is similar, except that: the header is (args this-page program valuemap) ]. There is no need to worry about forms, menus, or hidden fields; and the outputs are specified as in [(output valuemap 'C5)]. (args this-page program valuemap) <html> <head> <title>Virtual Learning Arcade - Modelling House Prices</title> </head> <body> <h2>Modelling House Prices</h2> <h3>The Model - Outputs</h3> <hr width="350" align="left"> <table border="1" cellspacing="2" cellpadding="5" bgcolor="#6699cc" width="450"> <tr> <td colspan=2><h3>The Input Conditions</h3></td> </tr> <tr> <td bgcolor="#99bbdd">Household Income (£) = </td> <td bgcolor="#99bbdd">[(output valuemap 'C5)]</td> </tr> <tr> <td bgcolor="#99bbdd">Interest Rate (%) = </td> <td bgcolor="#99bbdd">[(output valuemap 'C6)]</td> </tr> <tr> <td bgcolor="#99bbdd">Population (millions) =</td> <td bgcolor="#99bbdd">[(output valuemap 'C7)]</td> </tr> ... etc ... </table > ... etc ... Figure 5: Output page Once one model has been done, it is easy to copy parts from one Web page to the next, so pages can be prepared extremely quickly. For models as simple as the Housing Market one, we need only an hour or two per page, most of it spent in designing the layout. One possible source of problems is getting the cell names in the pages wrong. To help diagnose this, you can insert commands into a page to display the entire spreadsheet in its grid as a table, making it easy to compare its cells with the inputs and outputs. The VLA has the working version of this simulation with the supporting material (http://www.bized.ac.uk/virtual/vla/house_prices/index.htm). Although we have published most of our models as described above, there are other ways in which MM can be used. For Java programmers who prefer to write their own servlets rather than relying on WSM and its templates, we have provided a Java interface to MM's evaluator. There are methods for loading a spreadsheet file, storing values in its input cells, running the spreadsheet, and extracting the new values calculated by the evaluator from its output cells. Typically, the servlet author would write the input page in HTML, including in it an input form containing fields or menus. The server would be configured so that when this form is submitted, the inputs are passed to the servlet. This must call the Java interface to load the spreadsheet, pass it the input values, evaluate it, get the outputs, and construct an output page with them embedded in it. An example is BrumCars within the Virtual Learning Arcade ( http://www.bized.ac.uk/virtual/vla/ ). The MM Autopublisher is a prototype of a service which will automatically publish a spreadsheet on the Web. It generates model input and output pages similar to those shown above, using the tools developed for the work described in Section 4, but does not require the user to write in HTML or to do any Web administration. All that is necessary is for the user to submit a SYLK file to our server via a form. The server passes it to MM, which analyses it, generates HTML code for the input and output tables, and embeds this in Web pages which it then copies to a public directory for anybody to use. To control layout, the modeller must put special commands in the spreadsheet itself. For example, to indicate that cells C5 to C17 are to be included in the input table, the modeller writes the word input in column A followed by the label C5:C17 in column B. To set a menu for cell C5, the modeller writes the word menu in column A followed by the text C5 in column B, and (for example) the text 15000 to 25000 by 1000 in column C. This is based on the premise that while modellers may not feel comfortable with HTML or server configuration, they certainly will be accustomed to typing simple control commands into a spreadsheet. More information about the Autopublisher is available at http://www.j-paine.org/mm_autopublisher.html . There are several ways that MM could be developed for the spreadsheet-teaching community. This paper has outlined how an Excel spreadsheet model can be converted and published on the Web using the Model Master Toolkit. The Model Master Toolkit is a highly versatile package that allows spreadsheets to be written, edited, run and published on the Web. 1. The idea for MM arose from some work in General Systems Theory on the nature of objects and systems, and its application to what we call System Limit Programming. This turned out to apply to a wide range of phenomena, constraint-based programming languages amongst them, and spreadsheets amongst these. It soon became evident that we could easily design a language which could compile into spreadsheets, and that this would increase the safety and maintainability of spreadsheet programming. The MM compiler is implemented in a reasonably normal fashion, except that storage allocation is for a two-dimensional memory where the positioning of variables is important. The decompiler works in the other direction, but differs from the compiler in that it needs interactive guidance. Heuristics, such as the name-guessing rules above, must always be overridable; using the decompiler is more like using an interactive algebra manipulation for manipulating spreadsheets than it is like running a straight-through program. The evaluator performs a dependency analysis on the spreadsheet and then evaluates the expressions in the cells in dependency order. The routines used, particularly in the evaluator and decompiler, are also useful in error-checking. 2. WSM is a tool broadly similar to Active Server Pages or Java Server Pages, which makes it possible to embed dynamically evaluated expressions in Web pages. WSM is implemented in the Kawa programming language, a version of Scheme, and compiles .pfn files into Kawa functions whose output is a string making up the page to be displayed and whose input is a list of arguments which may include some global state. The magic symbols in the header specify the function's argument list, and square brackets are used to enclose expressions. Everything else is assumed to be verbatim text. The syntax of WSM was inspired by Bruce Lewis's Beautiful Report Language, although the implementation is original. To make it easy to write session-based applications with global state, WSM comes with a servlet that implements a state-transition machine. To implement a new application, it is necessary only to provide WSM with a specification of its transition network. When installing MM, we also installed WSM, and wrote a transition network that implements the running of any spreadsheet model, needing only to be supplied with the location of the model and its output page. These are the parameters passed in the two hidden fields. The form's action URL tells WSM that the transition network is to receive the action run, i.e. run the model. WSM is described more fully in http://www.j-paine.org/wsm.html . Mixon, J. W. and Tohamy S. (2001) "Using Microsoft Excel in Principles of Economics". CHEER Volume 14 Issue 2 pp 4-6. Cahil, M.B. and Kosicki, G. (2001) "Using Spreadsheets to Explore Neoclassical Assumptions in a Keynesian Model" CHEER Volume 14 Issue 2 pp 7-11. University of Bristol Tel: +44 (0)7768 534 091 University of Bristol Tel: +44 (0)117 928 7124
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233511369.62/warc/CC-MAIN-20231004120203-20231004150203-00788.warc.gz
CC-MAIN-2023-40
20,252
45
https://tutsforweb.com/top-10-vuejs-frameworks/
code
Top 10+ Best Vue.js Frameworks Vue can do anything with our user interface. It is designed to be incrementally adoptable. It can function as a web framework and is capable of SPA or single page applications. With data binding and event binding setup, it also provides with a large number of other features. Vue has a huge ecosystem. Vuex is used for state management and Vue router is used for building SPA or single page application. Both of these libraries are available officially. In this post, we will see some of the most useful vue.js frameworks for building applications and user interfaces much faster and better. Table of Contents Build Vue.js web applications using most-popular css library Bootstrap V4. Bootstrap-vue provides the most comprehensive implementation for Bootstrap V4 components. iView is a high quality UI Toolkit built on Vue.js 2.0 Deep Reader is a highly modular, Vue.js framework. It is designed for building online reading environments for deep reading of text. It supports rich annotations and integrated learning tools. AT-UI is a modular front-end UI framework for developing fast and powerful web interfaces based on Vue.js. It also supports ES2015. Nuxt.js is a framework for creating Universal Vue.js Applications. It is mainly used in UI rendering with client/server distribution in complete abstraction. Vue Admin Panel Framework, Powered by Vue 2.0 and Bulma 0.3 Vuetify is a semantic component framework for Vue. It provide clean, semantic and reusable components that make building your application a breeze. Build responsive websites, hybrid mobile Apps that look native!, PWAs and Electron apps, all simultaneously using same codebase, powered with Vue. Vue Material is Simple, lightweight and built exactly according to the Google Material Design specs. You can build well-designed apps that can fit on every screen with support to all modern Web Browsers with dynamic themes, components on demand and all with an ease-to-use API. Mint UI provides Mobile UI elements for Vue.js VUM is a UI framework build with vue.js for mobile webapp. Bootstrap 3 Components implemented by Vue2 in uiv. A lightweight collection of essential UI components written with Vue and inspired by Material Design. Vulma is a Vue UI components based on Bulma css library.
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100972.58/warc/CC-MAIN-20231209202131-20231209232131-00475.warc.gz
CC-MAIN-2023-50
2,292
19
https://www.gamefront.com/forums/tech-discussion/d-guess-what-i-got-for-free-lol-d
code
Hey, i just recieved a P2 processor, P2 motherboard (with onboard 8mb vid card and sound) 256 pc 133 ram and some network cards for free. yes i know its ancient but meh. i was wondering what i could do with them but i couldnt think of anything. my options so far are making a server or a tv. all i need is a 5-10gb harddrive, powersupply and a crappy ass monitor (and mayby a case) and itl work... comments? suggestions? I'm lying when I say trust me 8th June 2004 a tv? how would you manage that? get the parts(hdd, powersupply and monitor) then buy a thing called wintv. put it in a pci and it shows tv
s3://commoncrawl/crawl-data/CC-MAIN-2021-31/segments/1627046154032.75/warc/CC-MAIN-20210730220317-20210731010317-00129.warc.gz
CC-MAIN-2021-31
604
5
https://safejournalists.net/reports/threats-against-the-lives-and-limbs-of-journalists-iva-anzulovic-virovitica-1-6-2020/
code
According to journalist Iva Anzulović, she came to the cafe “Pub” in Virovitica on Monday, June 1, 2020, in the evening, at the invitation of her friend. Next to her two friends, there was also Renato Romić, a retired brigadier general. Romić addressed journalist Anzulović several times with “listen you stupid cow”, probably revolted by her journalistic work, and after that, they continued the conversation when she told him that she had mentioned him in another text. After that, Romić insulted her several times, saying that he would get rid of her, “beat her with a bat”, and then “I would kill your son first, so you can see how it looks like, and then I will kill you”. After the bar was closed, Anzulović and Romić, in the company of another friend, continued conversation in a private weekend house, where Romić dragged her by the hair and told her that she was “alive only because he decided so”. This project is funded by the European Union
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296820065.92/warc/CC-MAIN-20240425000826-20240425030826-00272.warc.gz
CC-MAIN-2024-18
980
3
http://robot-in-a-box.polyvore.com/
code
A Robot Cat Called Punchy MeU Queen A+ BBC Starlight Star1 ARMY~! 〜( ̄△ ̄〜) to ヽ(゜∇゜)ノ to (☞゚∀゚)☞ About Me .. MeU LUNATIC ~ I love playing Animal Crossing~ Props to my best mate in real life @hijabikebabi. Thanks for bringing me here dude ;D I have NO creative fashion-y bone in my body I use a lot of Eastern Asian models in my sets, usually from Girl Groups (they aren't bands lol). Feel free to ask me anything :)
s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218191984.96/warc/CC-MAIN-20170322212951-00019-ip-10-233-31-227.ec2.internal.warc.gz
CC-MAIN-2017-13
444
10
https://ephemerium.neocities.org/misc/slambook/submit
code
Favorite song to sing: Tell me about your type/crush/partner: What do you value in a person? Share a fact about an interest/hobby: What's an important lesson you've learned? What are you still learning? Favorite part about yourself: (be nice!) Your worst trait: What do you think is the meaning of life? Your personal mantra: What are you looking forward to most right now? A message to someone you wouldn't tell them directly: Share anything: (a link, vent, secret, story, etc)
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224644309.7/warc/CC-MAIN-20230528150639-20230528180639-00029.warc.gz
CC-MAIN-2023-23
478
13
https://www.blackenterprise.com/how-to-maintain-your-brand-new-computer/12/
code
Don’t worry about shutting down your computer every night. Despite what your friendly neighborhood conservationist might think, Davis says you can leave your computer on 24 hours a day, seven days a week without suffering any consequences. In fact, it is better to leave your computer on power save mode, he opines, because shutting down and powering up a computer sends a large amount of electricity through the power supply, motherboard, CPU, and other components which could damage them. Turning the computer off and on continuously is not good for the device. “Do they shut servers off every night?†Davis asks. “No. Those are network managers running those servers. They know what is good for their hardware. If they don’t shut servers down every night, why do you have to shut your desktop down?” Still, to save money on the electricity bill he suggests that employers advise workers to shut down their computers if a company has more than a couple hundred computers.
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323588102.27/warc/CC-MAIN-20211027053727-20211027083727-00391.warc.gz
CC-MAIN-2021-43
987
1
https://www.mobileread.com/forums/showpost.php?p=2297027&postcount=15
code
@knc1: Not that I know of. (Speaking of, there are some vague NFS mentions in there too, but then I have no idea how to drop to the recovery shell without serial access). @Beekr25: Don't boot with the Kindle plugged in (it's explained in more details in the USBNet doc). I'm pretty sure it shouldn't hang the boot process more than 15s, though. (But then again, since it doesn't work, I didn't spend an extraordinary amount of time looking into it on a wide range of devices. When the kernel throws a huge fit telling me the device is busy while trying to reload the USB controller, I obey and unplug it ^^). Last edited by NiLuJe; 11-08-2012 at 07:33 PM.
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170425.26/warc/CC-MAIN-20170219104610-00646-ip-10-171-10-108.ec2.internal.warc.gz
CC-MAIN-2017-09
655
3
https://mail.python.org/pipermail/python-dev/2019-April/157197.html
code
[Python-Dev] Use C extensions compiled in release mode on a Python compiled in debug mode doko at ubuntu.com Thu Apr 25 03:14:27 EDT 2019 On 25.04.19 08:31, Nathaniel Smith wrote: > You don't necessarily need rpath actually. The Linux loader has a > bug/feature where once it has successfully loaded a library with a given > soname, then any future requests for that soname within the same process > will automatically return that same library, regardless of rpath settings > etc. So as long as the main interpreter has loaded libpython.whatever from > the correct directory, then extension modules will all get that same > version. The rpath won't matter at all. > It is annoying in general that on Linux, we have these two different ways > to build extension modules. It definitely violates TOOWTDI :-). It would be > nice at some point to get rid of one of them. > Note that we can't get rid of the two different ways entirely though – on > Windows, extension modules *must* link to libpython.dll, and on macOS, > extension modules *can't* link to libpython.dylib. So the best we can hope > for is to make Linux consistently do one of these, instead of supporting > In principle, having extension modules link to libpython.so is a good > thing. Suppose that someone wants to dynamically load the python > interpreter into their program as some kind of plugin. (Examples: Apache's > mod_python, LibreOffice's support for writing macros in Python.) It would > be nice to be able to load python2 and python3 simultaneously into the same > process as distinct plugins. And this is totally doable in theory, *but* it > means that you can't assume that the interpreter's symbols will be > automagically injected into extension modules, so it's only possible if > extension modules link to libpython.so. > In practice, extension modules have never consistently linked to > libpython.so, so everybody who loads the interpreter as a plugin has > already worked around this. Specifically, they use RTLD_GLOBAL to dump all > the interpreter's symbols into the global namespace. This is why you can't > have python2 and python3 mod_python at the same time in the same Apache. > And since everyone is already working around this, linking to libpython.so > currently has zero benefit... in fact manylinux wheels are actually > forbidden to link to libpython.so, because this is the only way to get > wheels that work on every interpreter. extensions in Debian/Ubuntu packages are not linked against libpython.so, but the main reason here is that sometimes you have to extensions built in transition periods like for 3.6 and 3.7. And this is also the default when not configuring with --enable-shared. More information about the Python-Dev
s3://commoncrawl/crawl-data/CC-MAIN-2019-47/segments/1573496664469.42/warc/CC-MAIN-20191112001515-20191112025515-00382.warc.gz
CC-MAIN-2019-47
2,729
41
https://www.codurance.com/publications/tag/screencast
code
- By Sandro Mancuso - Posted 13 Apr 2014 On 9th of April 2014, we created our first screencast on our new YouTube channel. The idea is to have a series of (reasonably) short videos explaining some of the techniques we use when developing software. The videos will range from basic to advanced topics but in no particular order.
s3://commoncrawl/crawl-data/CC-MAIN-2021-17/segments/1618038056869.3/warc/CC-MAIN-20210410105831-20210410135831-00393.warc.gz
CC-MAIN-2021-17
327
3
http://www.waresme.com/index.php/musicians/products/max4life
code
MAX4LIFE Device for Ableton Live “MAX4LIFE” (not “Max4Live”!) is a Max MIDI Instrument for Ableton Live based on the famous “Conway’s Game of Life” Algorithm (see for example http://www.math.com/students/wonders/life/life.html). Here is an example of life iterations taken from the matrix section of the Max4Life User Interface: Basic explanation of the Algorithm: - There is a N x N cells matrix (24 x 24 in this case) - Every single cell can be alive (with something painted in it, like a grey dot in this case) or dead (empty). - The algorithm takes a look at every single cell starting from the first one (top left) and ending with the last one (bottom right), one row after another, repeating this "scan" forever. - If a cell is dead, the algorithm makes it ALIVE if its neighbourhood is not so crowded or not so empty. - If the cell is alive, the algorithm makes it DEAD if its neighbourhood is too crowded or too empty. - "Neighbourhood" means: the 8 cells around the current one. - "Crowded" and "empty" mean: 2 or 3 cells out of the total of 8 around the current one. - The algorithm would (kind of) simulate the evolution of a community of individuals in the simple N x N matrix-world. - The evolution (given an initial configuration of cells) can turn out to be: never-ending, doomed to die (all cells empty), forever-looping a final configuration of cells. - MAX4LIFE accepts random initial configurations, or manually-drawn ones. - Please note that "special" initial configurations of cells exist. The most famous is "The Glider". Forever-looping configurations are musically very interesting as arpeggiators-sequencers. Take a look at the fourth and fifth clips at the end of this Article. - Take a look at http://www.conwaylife.com for amazing and complex configurations. MAX4LIFE goals are: - to generate automated music - to be nonetheless "playable" by a human musician through: - the run-time tweaking of its parameters - the real-time use of its MIDI output - the use of effects on its audio output. MAX4LIFE generates (or not) a MIDI note for each cell at each iteration following these rules: - If the cell is unmodified (from the previous iteration), then no note is generated - If the cell becomes alive, then the note described below is generated - If the cell dies, then a note-off (related to the point #2 note-on) is generated. The note is calculated following these rules: - A “BaseNote” value is always present at any time. The initial value is 32. This value can be modified run-time via MIDI. If no such input is given, the value remains equal to 32 forever. - There are (so far) four modes (“NoteMode” parameter): - NoteMode=0: X and Y are added to BaseNote - NoteMode=1: X and Y are added to or subtracted from BaseNote at 50% probability - NoteMode=2: A minor 3rd (rounded 1 octave up) and a 6th (rounded 2 octaves down) are added to BaseNote, but a 10% probability remains of having notes in NoteMode=0 - NoteMode=3: A minor 3rd and a 6th (both rounded 1 octave up) are added to BaseNote, but a 10% probability remains of having notes in NoteMode=0. Velocity (so far) is always calculated from a base value of 56. X and Y are added to or subtracted from 56 at 50% probability. Notes output can be fine-tuned using the "Normal"/"Delayed" buttons and the “Flush/Delay Ticks” parameters (which are locked to Ableton transport as well): - If "Normal" is clicked, then MIDI output is performed “as is” (the matrix recalculation is performed at the speed given by the "RecalcTick" parameter (which is locked to Ableton transport as well) - If "Delayed" is clicked, then MIDI output is enqueued by the “pipe” Max Object, using the Delay Tick value itself to trig the pipe timeout and the Flush Tick to flush the pipe. The initial Life configuration can be generated randomly, with: - a crowd factor managed by the “InitCrowd” parameter - a timeout to automatically fire the next initial Life configuration (“InitTick” parameter) or can be manually entered in the matrix itself when InitCrowd=0. Musical suggestions - Parameters tweaking - NoteMode=0 wanders towards high-pitched notes - NoteMode=1 is more balanced, but sometimes too low-pitched - NoteMode=2 eases the atonal feeling (with the 6th note as bass) - NoteMode=3 eases the atonal feeling (with the minor 3d and 6th in the same octave). - "Normal" causes a “subsequent-bursts” output . Can be heavy on the performance side. - Increasing DelayTick slows down rhythm. - Mixing Flush/Delay Ticks and RecalcTick produces different rhythms. - Initial configuration higher crowd factor usually leads to longer Life evolution process, which means longer music evolution before ending up to a looping or fixed Life Final configuration, which again means forever-looping music or silence. - Setting a timeout for automatically fire a new initial configuration means forever-lasting music evolution, Musical suggestions - Other Devices and more - Use a “Pitch” MIDI Effect after MAX4LIFE, according to your musical tastes, to the combined run-time use of the above parameters and to Life evolution. - Use a “Note Length” MIDI Effect after MAX4LIFE. Shorter notes are suited for percussive/sequenced sounds, longer notes are suited for pads sounds, - Experiment with a “Velocity” MIDI Effect too. - MAX4LIFE musical output is (beautifully) atonal by definition. Use some “Scale” MIDI Effects after MAX4LIFE to filter only the desired notes. - Use some MIDI Monitor in the chain. Seeing the notes bursts helps understand how music evolves. - MAX4LIFE can be used as a Sequencer, in many ways: - with some “Scale” MIDI Effects it becomes tonal (as stated above), and it can follow notes played on a keyboard - using GameOfLife looping configuration (see video below). Musical suggestions - Sounds - Heavy arpeggiated or sequenced patches can be very dangerous from a performance point of view. - Strings, pads and slow moving synths needs their own mix of parameters to play well (expecially DelayTick and the “Note Length” MIDI Effect), and more or less the opposite do percussive, arpeggiated, rhythmic and fast moving patches. - Consider using Instruments Racks in the Track where MAX4LIFE is, as well as instruments in other Tracks. See the example below: - http://www.soundcloud.com/ndebello for some example tracks - the following videos (the third one sporting cellist Guido Rigatti playing along with MAX4LIFE): Last but not least: bigger Life! A device containing only a much bigger cells matrix is available, in the form of a stand-alone Mac App receiving UDP data from MAX4LIFE. Alternatively, the "Big Life" image button opens the big matrix locally. This is useful for live gigs (a big screen for the audience for example) or for pure self-enjoinment.
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593657140337.79/warc/CC-MAIN-20200712211314-20200713001314-00113.warc.gz
CC-MAIN-2020-29
6,811
70
https://gis.stackexchange.com/questions/97306/rasterizing-polyline-data-with-qgis-gdal-custom-line-width?noredirect=1
code
I need to make a raster from a polyline shapefile. However, when I use gdal_rasterize (either directly or through QGIS), all my lines are drawn one pixel wide, while I need them to be drawn with the stroke weight of 3. I've examined the documentation at http://www.gdal.org/gdal_rasterize.html, but couldn't find a parameter to do so. I have in mind some workarounds, but is there a simpler way to do so? My workarounds are: - render a raster 9 times smaller and blow it up - write a script that reads the raster and outputs a 3x3 block into another raster whenever it reads a non-zero pixel
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947476211.69/warc/CC-MAIN-20240303075134-20240303105134-00543.warc.gz
CC-MAIN-2024-10
591
2
https://forum.simplify3d.com/viewtopic.php?f=8&t=1343
code
The ability to assign objects to processes is very powerful, but it's too hidden in the GUI. This makes it hard to know that you've got objects associated to processes properly, because you have to drill down into each process' configuration to check them. I'd like to suggest that processes be indicated by colors in the preview. So, for example, doing dualstrusion, you could see by it being red (for example) that one STL is associated the left extruder process, and the other STL by being blue is associated with the right extruder process. This should also make it obvious if an STL was not associated with any process, or multiple processes. I would also suggest that the command to associate an STL to a process be added to the objects properties dialog, and perhaps a right-click menu on the object, to allow for direct manipulation. Similarly, in the G code preview it would be very helpful to differentiate between left and right extruders by color. Currently color is used to indicate temperature, but perhaps one color axis could be used to indicate extruder (red/blue) and another axis to indicate speed (light/dark)?
s3://commoncrawl/crawl-data/CC-MAIN-2021-31/segments/1627046154486.47/warc/CC-MAIN-20210803222541-20210804012541-00495.warc.gz
CC-MAIN-2021-31
1,130
4
https://rhythmoftesting.blogspot.com/2017/12/considering-conferences-reflection.html
code
The last week I have had a series of interesting thought/introspection sessions. The kind where I pour a decent measure of good whisky sit back and look out the window and think. It helps to have a nice garden to see when I look out the window - and since the house does not have a fireplace and it is too bloody cold out to have a fire in the garden, well, staring into the fire is out of the question right now. The gist of my thoughts? Let's see. After speaking at many conferences a year on for several years, on various topics, then filtering down to a few conferences each year, and now one or two conferences a year - I have observed things that make me wonder why I should keep going and speaking at conferences. Don't get me wrong. I really enjoy the conversations and sharing ideas that happen. Most of these, for me, happen in the hallway or "after hours." Perhaps it is just that I've grown cynical with regard to the desire of so many people to belong to the cool-kid-club. What do I mean? For example - Cool-Kid A and Cool-Kid B talk about an exercise or a book and how awesome it is. They write about it and talk about it. In a short time, loads of other people are jumping in - recommending the same book or exercise. IN a year or so - SCADS of people are talking about how awesome it is and how cool it is. A year later they are all onto something... else. Typically endorsed by the cool kids. People stopped talking about what they KNOW - what they have experienced and can demonstrate and instead talk about ... whatever the cool kids are talking about. Presentations - even keynotes - get more hand-wavy and full of dancing unicorns (the kind that are on the screen and don't really have a bearing on what is happening with people in the room) and truisms get spouted and straw-men get setup and then slain and people applaud and talk about what a great presentation it was. My question is - What was the presentation about and how will it impact your work when you get back to the office? Is the information really new to the people who think it was awesome, or does it merely confirm their beliefs on a subject. Are they so shallow as to not be able to consider going to a presentation they disagree with? Are they afraid of learning something new or taking on material that might lead them to reconsider what it is they think or believe? I feel the same way about the cool books or exercise - the cool kids advocate. How has this changed what you do as a tester? NO - Don't give me more bullshit answers about how it changed how you think. LOADS of things can change how you think. Good whisky can change how you think! How did THIS book or THIS exercise change how you do your daily job? Because frankly, I suspect much of it is little more than mental self-indulgence (I had another word but a proof reader said it might be too explicit for some folks...) And don't even get me going on so many bullshit keynotes I have heard. The abstracts were... harbingers of hand-wavy crap. Somehow the reality of the presentation so many times has been... more hand-wavy than the abstract. I find it actually quite depressing. When I read proposals for conference presentations, I see a series of similarities and "sameness" among them. There are the ones that regurgitate ideas from 20 years ago. There are the ones that claim a new take on a topic - and when I dive in I find them to be regurgitating ideas from 20 years ago. I see the cookie-cutter, instant solution to all your problems so frequently, I swear (as in take an oath) when I review proposals for conferences, I will not go to any conference that has people presenting such shallow rubbish - ever. What is one of my warning signs? If the speaker or potential speaker cannot carry on a conversation for 40 minutes ON THE TOPIC THEY ARE PRESENTING ON - do they have any experience in the area or are they babbling theory only? Do they have any real-world applications of what they are presenting? Or... I'm not sure why this is. I am not sure why people latch onto certain ideas and never vary from them. I am not sure why hand-wavy bullshit is so appealing to people, except for one small thing - it takes no effort to think about because there is nothing there TO think about. I expect keynote speakers to be exceptionally well versed in their subject. When talking with them, either in advance when preparing a program or over drinks at a conference, I expect them to be able to cite specific experiences - nothing that would violate an NDA, but something like... There was this problem where... The possible solutions I saw and presented to try were... The team tried this approach... The results were... IF they worked - fantastic. What was it that made the solution work? Why did this work? If not - then why did it not work? Talking over drinks (or over the phone) I want to know if the person has "been there and done that" to steal an over-used phrase, or if they are telling a fairy tale/war-story. When I try to coach new speakers - to help them find their voice - the ground they are going to stake out as their own, I try to help them find a message that is uniquely their own. I try and help steer them away from the ground so often trod on by others and show a little used path they can take. I expect that speakers will give me something I had not thought of before, some insight I have not considered or some point of view I can make use of when I get back to the office. Avoid the band-wagon cool-kid trends. Speak and write on what you know and are passionate about. That might just convince me to read what you write and maybe even go to the conference where you are presenting the idea. Until then, be well and be.
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947475825.14/warc/CC-MAIN-20240302120344-20240302150344-00208.warc.gz
CC-MAIN-2024-10
5,713
26
https://www.ctan.org/tex-archive/fonts/fontawesome5
code
Support files for using Font Awesome 5 with LaTeX This package provides LaTeX support for the included "Font Awesome 5 Free" icon set. These icons were designed by Fort Awesome and released under the SIL OFL 1.1 license. The commercial "Pro" version is also supported, if it is installed and XeLaTeX or LuaLaTeX is used. For this font you need a paid license, for more information visit https://fontawesome.com/pro. More information about Font Awesome is available at https://fontawesome.com. To use an icon after the package is loaded, just enter the name of the icon in camel-case prefixed with fa, for example \faAddressBook for the The TeX files are maintained by Marcel Krüger and are released under the LaTeX Project Public License version 1.3c. All included fonts are provided by @fontawesome – http://fontawesome.com under the SIL OFL 1.1 license This package is not an official Font Awesome project. For bug reports, please write to [email protected]. Download the contents of this package in one zip archive (1.6M). fontawesome5 – Font Awesome 5 with LaTeX support This package provides LaTeX support for the included “Font Awesome 5 Free” icon set. These icons were designed by Fort Awesome and released under the SIL OFL 1.1 license. The commercial “Pro” version is also supported, if it is installed and XeLaTeX or LuaLaTeX is used. |The LaTeX Project Public License 1.3c The SIL Open Font License |2018–2022 Marcel Krueger |TeX Live as fontawesome5 MiKTeX as fontawesome5 Font supp symbol
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947476592.66/warc/CC-MAIN-20240304232829-20240305022829-00179.warc.gz
CC-MAIN-2024-10
1,517
15
http://www.auditory.org/asamtgs/asa96haw/4aSC/4aSC31.html
code
Many speech research applications require manipulation of certain acoustic parameters (e.g., F0, formants, duration) and high-quality resynthesis. Unfortunately, most existing resynthesis methods are either of rather poor quality (e.g., LPC), or require careful parameter adjustment (e.g., formant), or allow manipulations only within a limited range (e.g., PSOLA). Although a resynthesized Fourier analyzed signal is theoretically identical to the original signal, manipulating values in the frequency domain lead to discontinuities in the phase domain and distort the resynthesis. The human ear is, however, insensitive to phase relations in a signal. Thus high-quality resynthesized signals are possible by estimating appropriate phase values preventing phase jumps. The presented method is based on this principle. The method is as follows: The Fourier is computed and either: (1) the harmonics are shifted by keeping the envelope constant (to perform F0 manipulations); (2) the envelope is manipulated by keeping the distances of the harmonics constant (to perform spectral shape manipulations); or (3) frames are repeated (to perform duration manipulations). For the resynthesis, the phase values for the manipulated signals are computed for each Fourier frequency such that no sudden changes occur.
s3://commoncrawl/crawl-data/CC-MAIN-2018-26/segments/1529267860041.64/warc/CC-MAIN-20180618031628-20180618051627-00038.warc.gz
CC-MAIN-2018-26
1,305
1
https://gbatemp.net/threads/swiss-is-a-reality-dios-mios-dont.286775/
code
hello to all, post here because loader related. Read everywhere that swiss can run GC games. Lot of bugs ok, but it's a goddammit start. why it hasn't same hype than DIOS-MIOS ? If you try to buy SD-gecko in Europe, you see that are sold out-everywhere, not speaking about USB-EXI cable... so why this difference ? m.
s3://commoncrawl/crawl-data/CC-MAIN-2018-30/segments/1531676591837.34/warc/CC-MAIN-20180720213434-20180720233434-00414.warc.gz
CC-MAIN-2018-30
317
1
https://www.hindawi.com/journals/wcmc/2021/6623251/
code
Applications of Semantic Mobile Computing in the Internet of Things and Web of ThingsView this Special Issue Research Article | Open Access You-Ting Jiang, Hung-Min Sun, "A Blockchain-Based Vehicle Condition Recording System for Second-Hand Vehicle Market", Wireless Communications and Mobile Computing, vol. 2021, Article ID 6623251, 10 pages, 2021. https://doi.org/10.1155/2021/6623251 A Blockchain-Based Vehicle Condition Recording System for Second-Hand Vehicle Market Due to the cheap price and decent performance of used cars, the second-hand vehicle market is quite active in Taiwan. However, the vehicle information in the market of second-hand vehicles is centralized at present. In other words, the vehicle information is still provided by the second-hand vehicle dealers, which are not transparent and have no tampering cost. As the result, the authenticity, accuracy, and fairness of these second-hand vehicle data are worth discussing. To solve the above problems, this paper proposed a trusted vehicle data source system based on blockchain technology. The system is built on the Ethereum platform with the private chain structure. With the help of our platform, a trusted third party (e.g., maintenance plant and government branch) can record vehicle information into Blockchain so the integrity of vehicle information can be maintained. Customers can easily query the relevant vehicle information through our system interface and avoid receiving fake vehicle information. This system is a Proof of Concept (PoC), and the feasibility is examined by evaluating transactions per second (TPS) of the proposed system. The second-hand vehicle market is quite active in Taiwan. The reason is that although the second-hand vehicles are relatively old, they still maintain good performance due to the technological advancement of the automobile industry. Coupled with their relatively inexpensive price, many people will still consider used vehicle when purchasing a car. According to statistics from the Ministry of Transportation and Communications, Taiwan, there are about 600,000 transactions of vehicles a year in Taiwan’s second-hand vehicle market , which is 1.5 times more than the new vehicle market. However, in the second-hand vehicle market, the most common situation which customers encounter is that they do not know whether the information of vehicle condition provided by the second-hand vehicle dealer is consistent with the actual condition and result in buying vehicles with problems (e.g., odometer fraud and accident vehicle). Although there are some vehicle information providers like Carfax , the situation of data fraud and tampering is still very serious. Blockchain technology is a novel way to manage data. Due to its characteristics, a group of people (nodes) can work together to store, manage, and protect the blockchain without anyone trusting anyone, thereby eliminating the possible adverse consequences of centralized data control by third party. Moreover, each node would replicate the whole blockchain data through peer-to-peer networks, and so the information can hardly be destroyed. Therefore, we believe that blockchain technology can be applied to record the condition of second-hand vehicles. This paper uses the blockchain architecture provided by Ethereum to record the information of vehicle condition. By the properties of transparency and tamper proof of blockchain, customers can use the system proposed in this paper to check the actual vehicle condition without being worried misinformed by second-hand vehicle dealers. 2.1. Introduce to Blockchain The first successful blockchain application is Bitcoin . In Bitcoin, blockchain acts as a publicly verifiable open ledger, which has the following properties: (1)Transparency: The data on the blockchain is public and can be read by anyone; so, the record and flow of each transaction can be easily queried(2)Decentralization: Bitcoin does not depend on additional third party to control the transactions. Each node in the Bitcoin network realizes verification, transmission, and management of transactions(3)Tamper proof: Each block will contain the hash value of the previous block. Therefore, if someone tries to modify the data in the block, it will be immediately detected and rejected by other nodes, and so the blockchain cannot be tampered with 2.2. Smart Contract and Decentralized Application The evolution of blockchain mechanism begins with trading of cryptocurrency, then gradually expands to the application of smart contract , and then enters the field of decentralized application. Below, we will introduce the concept of smart contract and decentralized application which are used to construct our vehicle condition recording system. (1)Smart contract: The smart contract featured in Ethereum is written by a programming language called Solidity . Before deploying, Solidity codes need to compile into Ethereum bytecode, being added into a transaction and send it to the network. Afterward, miners of Ethereum will verify the transaction and record it in a block to complete the deployment of a smart contract. Users of Ethereum can call a function of the smart contract by sending a transaction. When miners receive the transaction, they will verify it and record it in a block and run the bytecode of the smart contract in the Ethereum virtual machine (EVM) to complete the contract call. (Figure 1)(2)Decentralized Application (DApp): DApp is defined as an application running on a Peer-To-Peer (P2P) network. In this network, every computer has the same status and same data and can execute the code of DApp, which giving DApp, following advantages (i)DApp running in the network will not be interrupted as long as there is at least one computer running in the P2P network(ii)When DApp is deployed in the blockchain network, the data stored in the block cannot be tampered with, even those who wrote and deployed DApp In this paper, our vehicle condition recording system belongs to nonfinancial DApp, because the system does not involve the trading of vehicles. 2.3. Consensus Mechanism in Blockchain Consensus is a mechanism to ensure that all the transactions occurring on the blockchain are genuine. It is often achieved by the contribution of other participants in the chain network. Below are three common types of consensus. 2.3.1. Proof of Work (PoW) PoW is the consensus mechanism used by Bitcoin and some other popular cryptocurrency networks. It requires participant nodes to solve a compute-intensive problem to receive the right to add new transactions to the blockchain. The participants who try to solve the problem are commonly called “miners” since they can get Bitcoins by verifying the blocks. However, this whole mining mechanism of Bitcoin needs high energy consumption and longer processing time. 2.3.2. Proof of Stake (PoS) PoS is another common consensus algorithm that serves as a low-energy consuming alternative to the PoW algorithm. Its algorithm is simple, and the node that has more cryptocurrency has more chance to verify transactions. The hypothesis behind this mechanism is that the node will have more motivation to maintain the genuineness of the system if they have more property on the chain. Since PoS does not include solving compute-intensive problems, it can significantly reduce the computing power than PoW. However, the scalability of transaction verification is still not improved in PoS. 2.3.3. Proof of Authority (PoA) PoA is a consensus algorithm proposed in 2017 by Ethereum cofounder and former CTO Gavin Wood. It introduces a practical solution for scale-up blockchain networks. Its concept is similar to PoS, but instead of using the number of cryptocurrencies, PoA decides the right of verifying transactions by nodes’ reputation. In other words, transactions are verified by nodes that are selected as trustworthy entities. Since there are only a limited number of block validators, it makes PoA a highly scalable system. The PoA model enables companies to maintain their privacy while availing the benefits of blockchain technology. Microsoft Azure is an example where the PoA is being implemented. 2.4. Categories of Blockchain At the present time, two types of blockchain are considered base on their publicity: 2.4.1. Public Chains Public chains are open to anyone in the world and can be accessed, sent, received, and authenticated by anyone. It is a blockchain in which everyone can participate in a consensus process; thus, public chains are usually considered to be completely decentralized. However, the transaction on public chain is slow to update and iterate, and the initial set-up cost is very high if a developer wants to build his own chain with the current technology development framework . If enterprises adopt public chain directly, they will be limited by the scaling problem, and the enterprise demand cannot be met. 2.4.2. Private Chains A private chain is a completely private blockchain. Its write access is restricted to one organization. Access rights are either open to the public or restricted to a certain extent. The entire network is jointly maintained by the member organizations, and access to the network is generally through the member organizations’ gateway nodes. With the consensus process controlled by preselected nodes, this type of blockchain is considered to be partially decentralized. However, at the expense of partial decentralization, private chains have characteristic of fast transaction, privacy-protecting, and having very low transaction costs and low set-up costs . At the same time, it retains blockchain’s tamper-evident nature. 3. Related Work There are lots of DApps that have been developed since the emergence of blockchain . Some of them deal with financial transaction issues, such as decentralized exchange . Some deal with the issue of personal data ownership on the cloud storage platform [14, 15]. Other DApps include supply chain application [16, 17], insurance application , Internet of Things (IoT) with blockchain [19, 20], game application , and secondary radio spectrum trade . Our system focuses on data recording, and this type of application is similar to the application of product biography or supply chain. In , the authors propose a framework for blockchain-based supply chain quality management. This framework consists of blockchain, smart contracts, and various IoT sensors. Blockchain provides a safe distributed ledger with various quality information, assets information, logistic information, and transaction information. Smart contracts bring privacy protection, automation, and intelligence into this system, while IoT sensors gather various data from the real world. By using the framework, each piece of information in the production process of the product will be recorded on blockchain, including temperature, humidity, positioning, and other information in the process of product transportation. Record all information in the production process of the product in blockchain can help users quickly understand the real information of the product by means of the blockchain’s tamper-proof characteristic. This way of creating a biography for a product can also be used in recording vehicle conditions. Another research is a big data-sharing system for the car industry in China based on blockchain. They have set up an automotive industry alliance in China and published a white paper, which mainly aims at establishing a blockchain platform for recording vehicle information. At the end of 2018, they officially released this blockchain platform called Engine Chain (EGCC), hoping to record the information of the whole life cycle of a car through this blockchain platform. This research is similar to what our system wants to do, but our system is slightly different from EGCC. First of all, to query car information or execute other operations on EGCC, users need to spend EGCC coin. On the other hand, our system would not charge for querying data. The second difference is the group that has record permission. EGCC allows all registered users to record data, but our system only allows trusted third party, which avoid malicious users trying to tamper data. The third difference is the consensus algorithm used. EGCC uses validated DPoS (VDPoS) , which is an algorithm proposed in the Insight Chain . It is a modified PoS algorithm which can improve speed. Table 1 is a simple comparison between our system and EGCC. Therefore, in this paper, we use blockchain technology to achieve the purpose that vehicle condition information cannot be tampered with, so as to help customers to have authentic information of vehicles for reference when choosing second-hand vehicles. 4. System Design 4.1. Design Goal Our system is designed according to the following three main goals. (1)Transparency of vehicle condition information: Our system is based on the PoA consensus of Ethereum so that the condition information of vehicles can be stored on the private blockchain of Ethereum by specific users, and the information recorded on Blockchain is transparent to everyone in this private network(2)Access control of smart contract and tamper proof of blockchain information: Because our system must rely on the help of some specific users (e.g., government branch and maintenance plant) to record or update the information of vehicle condition to change the state of smart contract, we must only allow these specific users to update the state of smart contract; so, we use the conditional branch in a smart contract to judge whether the transaction sender has the permission to change the state or not, so as to achieve the access control of the smart contract(3)User friendly of operation: We also design a web user interface (UI) for the system. Each user can use the web page to interact with the contract function to record or update the information of vehicle condition without having any background knowledge of smart contract. We design different web UI for users depending on each user’s identity to record or read different information on the contract 4.2. System Model There are many roles in the proposed system (Figure 2), and the duty of each different role will be explained in the following paragraphs. (1)Vehicle manufacturer: For vehicle manufacturers, the only function provided is the deployment of new contracts to the blockchain. After a manufacturer completes a car build, they can use the proposed system to deploy a smart contract that contains initial information about the vehicle. Initial information includes car model, year of release, mileage, and engine capacity.(2)Maintenance plant: The maintenance plant can use the functions of the proposed system to record the maintenance history of vehicles. A maintenance record includes two types of information, one is the maintenance time, and another is the maintenance description. For instance, the maintenance plant can record the mileage of the vehicle to prevent customers from suffering from odometer fraud. In addition, before recording the information to blockchain, the owner ID of the vehicle is needed. Since the owner ID is a secret from the vehicle owner, this approach ensures that the maintenance plant can only record vehicle information with the vehicle owner’s consent(3)Government branch: The government branch can use the proposed system to record information. First, the Motor Vehicles Office, the government branch that is in charge of vehicles in Taiwan, can update the ownership history when the owner of a vehicle is changed. This information can make customers go through the ownership history of a vehicle and bring it into assessment. Motor Vehicles Office also has the permission to maintain the mapping table which maps the Vehicle Identification Number (VIN) to its Owner ID and only they can maintain this table. VIN is like an ID card number of a vehicle; thus, each vehicle has a different VIN. Second, when dealing with a traffic accident, the traffic police can record the time of the accident by our system, and this allows customers to understand the accident history of a vehicle and prevents them from buying an accident car. Third, when a vehicle is scrapped, the contract which represents the vehicle needs to be destructed by triggering the self-destruct function in the contract. Only Motor Vehicles Office has the permission to trigger the function(4)Customer: Customers can use our system to query about the information of vehicles, including initial information, accident history, and maintenance records. Customers can simply enter the VIN of the vehicle and the token acquired from a second-hand vehicle dealer on the web page to query the information of the vehicle. Besides, when a general user wants to query the information of his vehicle, he can just input the VIN and owner ID to get his vehicle information rather than input a token. Customers do not need to have an account to query about the information of vehicles, as long as the customer inputs the correct token or owner ID, and he has the permission to read the information from blockchain. Moreover, they do not have the permission to change the state of smart contracts(5)Second-hand vehicle dealer: The second-hand vehicle dealer in the proposed system do not have the permission to record or update the information of vehicles. They are only responsible for generating a query token for the customer who wants to query the vehicle information. After inputting this token by the customer, our system will verify the token. If it is valid, then the system will return the vehicle information(6)Authority node: As mentioned before, our system is based on the PoA consensus of Ethereum blockchain called Clique. Different from the PoW consensus, there has no miner in the PoA network. The accounting right of blocks is handled by predefined authority nodes. By using the PoA consensus Clique, transactions can be verified and accounted into the new block by the authority nodes without costing any fee 4.3. Life Cycle of Vehicle In our design, the vehicle manufacturer is responsible for pushing the initial information of each vehicle to each contract, including car model, released year, mileage, and engine capacity. After the sale of the vehicle, the government branch (Motor Vehicles Office) needs to update the ownership history and change the owner ID of the vehicle on the contract. When using the vehicle, every using data that includes accident history, maintenance history, and mileage will be recorded or updated in the contract by the government branch and maintenance plant, respectively. When the owner of the vehicle sells the car to a second-hand vehicle dealer, Motor Vehicles Office also needs to update the ownership history. Customers can use our system to query the information of each vehicle by a valid token at any time in the life cycle of each vehicle until the vehicle is scrapped. When the vehicle is scrapped, the contract that represents the vehicle is also destructed by the self-destruct function of the contract (Figure 3). 5. System Implementation In this chapter, we will focus on the details of the proposed system, including a full description of each function and the user interface of the system. In the first section, we explain the structure of the system and what software and tools are used. In the second section, we describe the functions of the proposed system in detail. 5.1. System Structure The proposed system is performed on a private blockchain environment using Go-Ethereum (Geth) client implementation. Clique, a PoA Geth implementation, is used as the back-end blockchain operating system, and Solidity is used as the programming language to write the smart contract. The system structure includes the following two parts: (1)Private chain setup: Puppeth is used to set up the configuration of the private chain. After the setup, Puppeth will generate a file that includes information of the configuration such as block time, gas limit, and authority node setup. Geth will later use this file to build up the private chain environment In the configuration, we create different nodes for different identities of participants in the proposed system including vehicle manufacture, maintenance plant, and government branch for account management. In addition to the above nodes, three authority nodes are set up for system simulation. (2)User interface (UI): The UI of the proposed system is a web page. The server side is constructed by the http- server suite provided by Node.js . Web3.js is used to link the front-end UI to the back-end smart contract. After the setup, private chain and account information can be connected The system structure is shown in the following figure (Figure 4). 5.2. System Operation (1)Log-in process: Since there are different roles of users in the proposed system, each user must choose which role to log in. Every user’s account is connected to the accounts in Geth nodes. Different roles lead to connect to different Geth nodes. Because of the serial number of the account list in the Geth node, users can just input the serial number as the account number instead of inputting the account address (Figure 5)(2)Operation of customer: Because of avoiding anyone that can query the vehicle information without any permission, the customer needs to input a token which is generated by second-hand vehicle dealer for token authentication. After passing the authentication, the customer can get the information of the vehicle. For the authentication purpose, we keep an array in smart contract to record these valid tokens for authentication. The customer needs to input the VIN of the vehicle and a token generated by a second-hand vehicle dealer to query its information. We use a smart contract to keep a mapping table to store each VIN and corresponding contract address; thus, the customers do not need to input complicated contract address string. Our system provides information query function in smart contract which can return car model, released year, engine capacity, mileage, ownership history, accident history, maintenance history, and so on(3)Operation of vehicle nanufacturer: In the proposed system, the vehicle manufacturer is responsible for deploying a new contract that represents a vehicle. After logging in the system, the vehicle manufacturer can input the initial information of the vehicle and deploy the contract (Figure 6). After the deployment, the vehicle manufacturer will update the mapping table which stores each VIN and corresponding contract address. In the proposed system, only they can deploy a contract and update the mapping table(4)Operation of maintenance plant: The maintenance plant in our system is responsible for recording maintenance history and mileage of vehicles. Before recording the information, our system will require that the maintenance plant should input the owner ID of the vehicle at first. If the owner ID is correct, then they can start recording the vehicle information. We use the mapping table VIN-to-OwnerID to help us for authentication. When recording the information, the program in smart contract will check whether the role of the transaction sender is the maintenance plant that exists in the account list of the node. If the identity of the transaction sender is authentic, the program will append the time and the description of maintenance history to the Struct array maintainHistories and update the mileage. (5)Operation of government branch: The operation of the government branch is similar to maintenance plant. For the ownership history, the program in smart contract which is triggered by Motor Vehicles Office will update the ownership number when the owner of the vehicle is changed. Motor Vehicles Office is also responsible for maintaining the mapping table VIN-to-OwnerID, and when the owner of a vehicle is changed, only Motor Vehicles Office can update the mapping table. We use SHA256 to store the hash value of owner ID in the mapping table in smart contract rather than store the plaintext of owner ID. For the accident history, the program in smart contract which is triggered by police will append the time of the accident to the String array accidentHistory. Finally, when the vehicle is scrapped, Motor Vehicles Office needs to trigger the self-destruct function of the contract, and we use the instruction selfdestruct() in Solidity to destruct a smart contract. Before all of the above operation, the program in smart contract still first checks whether the role of the transaction sender has the permission to change the state of the contract or not. (6)Operation of second-Hand vehicle dealer: The second-hand vehicle dealer does not have the permission to record or update the information of vehicles. They are only responsible for generating a query token for the customer who wants to query the vehicle information. For the token generation, our system concatenates the password of the second-hand vehicle dealer and current time as the input string and output the hash value (token). Then, the dealer will write this token into an array in the smart contract Every token generated by a second-hand vehicle dealer has its lifetime. The proposed system will delete it by sending a transaction to delete the token in three minutes after its generation. This ensures that every token is timeliness and difficult to reuse (Figure 7). 6. System Evaluation 6.1. Gas Limit and Transaction Throughput The analysis is performed on a PoA private Blockchain development based on the Ethereum platform, using Go-Ethereum (Geth) client implementation. Since there is no fee for sending transactions in a private Blockchain environment, we focus on the throughput of transactions. The proposed system is feasible only if the throughput of transactions is greater than the daily transactions. Ethereum platform prevents transaction spamming and rewards block miners by charging a gas fee on transactions. There are three important concepts in the Ethereum gas mechanism, gas, gas price, and gas limit. (1)Gas: Each bytecode instruction in the EVM execution process requires a corresponding amount of gas, and the more complex the logic, the more gas is required. The table of gas spend to corresponding bytecode is defined in Ethereum yellow paper (2)Gas price: Gas price means how much you are willing to pay for each gas, in unit Gwei, which equals to 10-9 Ether, the basic unit of coin in Ethereum(3)Gas limit: The gas limit is the maximum amount of gas you are willing to buy for the transaction. The reason for the gas limit is that no one knows how much gas will be used in the execution of a smart contract until it is actually executed, and so the gas limit is meant to cap the fee for each executed smart contract Transactions per second (TPS) is a common criterion to evaluate how fast can a transaction be verified on the blockchain. The theoretical maximum TPS can be calculated using the following equation (Eq. (1)), where GasLimit is the maximum number of units of gas user willing to spend on a transaction. TxGas is the gas needed to compute the simplest transaction, and BlockTime is the time required to create the next block in a chain. The gas limit and the block time could be set as a configuration parameter. We set the gas limit to 8,000,000 gas by default configuration in the proposed system, which is the same as the gas limit of Ethereum main network . We test the throughput using different block times, 5 s, 10s, and 15 s, respectively. For the gas cost of each transaction, we use Remix to calculate the gas cost of function execution in the system. Remix is a web browser integrated development environment (IDE) for developers in developing Solidity smart contract and DApp. The TPS is calculated using Eq. (1). Transactions per day are then calculated by TPS multiplying seconds within a day. Tables 2–4 report the TPS of each function execution using different block times in the proposed system. For display conciseness, the TPS column is rounded to two decimal places, while the transactions per day column were computed using unrounded TPS. According to Tables 2–4, it can be observed that the acceptable number of transactions per day of deploying contract is lower than the others since it needs higher gas cost. Besides the deploy contract function, the TPS of other functions are good enough. Therefore, we only focus on the TPS of deploying contract, since lower block times were found to be strongly related to the higher number of lost blocks per valid block , which leads to a bad performance of the Blockchain. For avoiding this problem, we set the block time to 15 seconds by default configuration in our system. Assume that we have 600,000 vehicles (yearly second-hand vehicle transaction amounts in Taiwan) to deploy to the blockchain at the beginning, the required time of deploying these contracts is about 35 days, and it is acceptable. 7. Limit and Challenges This paper’s implementation relies on the existing platform (Ethereum). Thus, the functionality is restricted by the functions their system provides. In addition, this paper’s method is a proof of concept; thus, it might still have problems when it runs online, such as how to choose a proper trusted third party to record the chain. Also, PoS is not a fully centralize consensus algorithm; thus, it is not as decentralized as Bitcoin which uses PoW. However, it still could avoid second-hand traders hold car information by themselves. So, it is still could solve this problem. This paper builds a trusted vehicle data source system based on blockchain technology. With the help of trusted third parties to record vehicle information to our platform instantly, customers no longer need to worry about the problem of getting untrustworthy vehicle condition information from second-hand vehicle dealers. Moreover, because of the property of blockchain, we can ensure that the information of vehicle condition in the system is transparent to everyone and cannot be tampered with. Vehicle manufacturers can use the system to deploy a smart contract that represents a vehicle. The maintenance plant and government branch can record or update the vehicle condition information by using the proposed system. Customers can easily query the relevant vehicle information through the system interface. All of the above operations can be done without costing any fee. In the evaluation of the proposed system, the result shows that the transaction throughput is enough for daily transactions. The code implementation used to support the findings of this study were supplied by Hung-Min Sun under license and so cannot be made freely available. Requests for access to these data should be made to Hung-Min Sun: [email protected]. Conflicts of Interest The authors declare that there is no conflict of interest regarding the publication of this paper. This study was funded by the Ministry of Science and Technology, Taiwan [grant numbers MOST 106-2221-E-007-026-MY3, MOST 107-2221-E-007-015-MY3, and MOST 108-2218-E-001-001]. - “Ministry of Transportation and Communications, Taiwan. Commonly Used Transportation Statistics,” 2020, https://stat.motc.gov.tw/mocdb/stmain.jsp?sys=100&funid=emenu. - “Carfax,” 2020, https://www.carfax.com/. - G. Wood, “Ethereum: a secure decentralised generalized transaction ledger,” Ethereum project yellow paper, vol. 151, pp. 1–32, 2014. - S. Nakamoto and A. Bitcoin, “A Peer-to-Peer Electronic Cash System,” 2008. - “Smart contract,” 2020, https://ethereum.org/en/developers/docs/smart-contracts/. - “Solidity,” 2020, https://docs.soliditylang.org/en/v0.7.4/. - M. Jakobsson and A. Juels, “Proofs of work and bread pudding protocols(extended abstract),” in Secure information networks, pp. 258–272, Springer, Boston, MA, 1999. - J. Kang, Z. Xiong, D. Niyato, P. Wang, D. Ye, and D. I. Kim, “Incentivizing consensus propagation in proof-of-stake based consortium blockchain networks,” IEEE Wireless Communications Letters, vol. 8, no. 1, pp. 157–160, 2019. - “Proof of authority,” 2020, https://github.com/PoAnetwork/wiki/wiki/PoA-Network-Whitepaper/. - D. Guegan, Public Blockchain Versus Private Blockhain, 2017. - Z. Zheng, S. Xie, H. Dai, X. Chen, and H. Wang, “An overview of blockchain technology: architecture, consensus, and future trends,” in 2017 IEEE International Congress on Big Data (BigData Congress), pp. 557–564, Boston, MA, USA, 2017. - “State of the DApps,” 2020, https://www.stateofthedapps.com/zh/stats/. - “Idex - decentralized ethereum asset exchange,” 2020, https://idex.market/eth/idex/. - N. Kaaniche and M. Laurent, “A blockchain-based data usage auditing architecture with enhanced privacy and availability,” in 2017 IEEE 16th International Symposium on Network Computing and Applications (NCA), pp. 1–5, Cambridge, MA, USA, 2017. - G. Zyskind and O. Nathan, “Decentralizing privacy: using blockchain to protect personal data,” in 2015 IEEE Security and Privacy Workshops, pp. 180–184, San Jose, CA, USA, 2015. - S. Chen, R. Shi, Z. Ren, J. Yan, Y. Shi, and J. Zhang, “A blockchain-based supply chain quality management framework,” in 2017 IEEE 14th International Conference on e-Business Engineering (ICEBE), pp. 172–176, Shanghai, China, 2017. - A. Iftekhar, X. Cui, M. Hassan, and W. Afzal, “Application of blockchain and Internet of Things to ensure tamper-proof data availability for food safety,” Journal of Food Quality, vol. 2020, Article ID 5385207, 14 pages, 2020. - I. Nath, “Data exchange platform to fight insurance fraud on blockchain,” in IEEE 16th International Conference on Data Mining Workshops (ICDMW), pp. 821–825, Barcelona, Spain, 2016. - P. Urien, “Blockchain iot (biot): a new direction for solving internet of things security and trust issues,” in 2018 3rd Cloudification of the Internet of Things (CIoT), pp. 1–4, Paris, France, 2018. - Y. Wu, L. Song, L. Liu, J. Li, X. Li, and L. Zhou, “Consensus mechanism of IoT based on blockchain technology,” Shock and Vibration, vol. 2020, Article ID 8846429, 9 pages, 2020. - “Etheremon,” 2020, https://www.etheremon.com/. - M. A. Khan, M. M. Jamali, T. Maksymyuk, and J. Gazda, “A blockchain token-based trading model for secondary spectrum markets in future generation mobile networks,” Wireless Communications and Mobile Computing, vol. 2020, Article ID 7975393, 12 pages, 2020. - “Enginechain white paper,” 2020, https://white-paper.oss-cn-beijing.aliyuncs.com/v.3.0.0/Engine%20V.3.0.0%20-%20%20English%20Version.pdf/. - TEAM, “Insight Chain Founding,” Insight Chain Technical White Paper V1. 0, 2019. - “Geth,” 2020, https://github.com/ethereum/go-ethereum/wiki/. - “Puppeth,” 2020, https://github.com/puppeth/. - “Node.js,” 2020, https://nodejs.org/en/. - “Web3.js,” 2020, https://web3js.readthedocs.io/en/1.0/. - “On ethereum performance evaluation using PoA,” 2020, https://blog.coinfabrik.com/on-ethereum-performance-evaluation-using-PoA/. - “Remix,” 2020, https://remix.ethereum.org/#optimize=false&evmVersion=null/. Copyright © 2021 You-Ting Jiang and Hung-Min Sun. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571982.99/warc/CC-MAIN-20220813172349-20220813202349-00435.warc.gz
CC-MAIN-2022-33
35,530
98
https://ligao101.wordpress.com/2007/09/
code
September 25, 2007 Saw this preview of Google Analytics implemented on the Adobe AIR platform. Very interesting and unique application. It should be relatively easy to implement in WPF, but make it across platforms, AIR looks more promising than WPF. I am learning bits of AIR and Flex recently, so this blog is bit lacking of new WPF, XAML updates. 🙂 September 5, 2007 Silverlight 1.0 is officially released today. You can read more on this blog. Now since we are getting SL 1.0 out of the door, when can we expect SL 1.1 beta or RC? I believe the majority of development with SL in the web UI space will be sometime after SL 1.1 beta or RC. Are you also waiting for SL 1.1 to adopt this technology in your current projects/products? You can download the released version of SL 1.0 here. Here are some very cool samples for SL 1.0 and SL 1.1:
s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578553595.61/warc/CC-MAIN-20190422115451-20190422141451-00451.warc.gz
CC-MAIN-2019-18
846
8
https://fkbase.info/report-errors-execution-random-string-cannot-be-found/
code
When CRM and SQL/SQL Reporting Services are on different computers, problems with trust for delegation may occur. The SRS Data Connector should sort out these errors. However, I did have a situation where reports via CRM did not work but they did in Report Server. In conjunction with Microsoft Product Support, I discovered I had to change a delegation setting on the computer account for the SQL Server. In Active Directory, open the computer account for the SQL Server and - for Windows 2008 AD, click on the Delegation tab and ensure that “Trust this computer for delegation to any service (Kerberos only)” is ticked - for Windows 2003 AD, click on the General Tab and ensure that “Trust computer for delegation” is ticked In my situation this was set to “Do not trust this computer for delegation”.
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224655027.51/warc/CC-MAIN-20230608135911-20230608165911-00374.warc.gz
CC-MAIN-2023-23
815
7
http://www.learner.org/courses/essential/life/bottlebio/terraqua/activities.html
code
Life Science: TerrAqua Column Now that you've built the components you need for the TerrAqua system, try these activities to further your understanding. First read the instructions and perform the activity. Then you can go to our discussion board to share your results, and for selected activities, view an example of our results in track our progress. - Get a Life!... Test whether an object is alive by creating life-sustaining conditions in small tubes that can be worn around the neck. - Taking Inventory and Pondering Change... Carefully describe living things, and predict changes in the system over time. - Is It Alive?... Apply what you learned in Session 1. [track our progress] - Now You See It... The fascinating world of microbes is made visible. [track our progress] - What Is It?... Explore a systematic approach to classifying living things into the groups that scientists use to organize the living world. [track our progress] |prev: petri plates|
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917121869.65/warc/CC-MAIN-20170423031201-00178-ip-10-145-167-34.ec2.internal.warc.gz
CC-MAIN-2017-17
963
8
https://cmstep.com/gate-puzzle/
code
Contributor’s Name (Your Name): Leah Villa To understand that learning a new skill often requires lots of repetition and practice before it is learned/acquired/mastered, and that failure is not permanent because you can try again and improve. Students will demonstrate learning and problem-solving with this initiative. Theme: Learning, Perseverence, Problem-Solving Group Initiative: Gate Puzzle
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947475833.51/warc/CC-MAIN-20240302152131-20240302182131-00149.warc.gz
CC-MAIN-2024-10
398
4
https://villavu.com/forum/showthread.php?t=69748
code
As requested from: http://villavu.com/forum/showthread.php?t=69721 IF I SEE THIS SCRIPT IN ANOTHER SRL MEMBERSHIP APPLICATION WITH EDITED NPCS NAMES AND COLOURS I WILL BE REMOVING THIS! This script is no where near SRL Standards so no point even trying to apply with this. Someone requested a Edgeville Man Killer with food support. This supports all food. Please make sure you have food in the very first bank slot. Also make sure you have plenty of food as the script will just keep trying to withdraw food (Working on a fix for that) Also please make sure you are running the latest version at all time. Current version: 0.615 Start with food in your inventory and at the edgeville men. Please report any bugs to me!! What this script has gotten me - This account started as my test account for this script. I run the script whenever my computer is on (99.9% uptime) 0.01r -> 0.501 - Can start from Edgeville Bank - Revised Banking code - Revamped Attack; method, should be faster - Made more 'Men' colors - Added version checker - Credits to Kyle Undefined. - Removed un-needed code - Added custom random event detection (The one when you start a new account and you get 10 combat levels and it asks you to become a member) - Progress report when going to bank - Shows how much EXP you have gained - Removed some anti-ban methods that was slowing down the script. - Fail-safed Opening the bank - Withdraws a Random Range from 17-28 for food (Kind of a anti-ban?) - Fixed a bug that could happen on a rare occasion that the script would attack a Guard and die 0.501 -> 0.606 - Fixed the 'Warning! You passed xe...' error - Added Grimy Herb loot - LootHerbs = false; - Change to 'true' if you want to loot herbs - Added 'AverageFood' - How many food should the bot withdraw from bank (will be randomized from this number) - Fixed up standards - Eats at bank if > 30% hitpoints - Added a hitcounter 0.606 -> 0.610 - Fixed up DepositAll while SRL is updating the coords - Cleaned up some of the code. 0.610 -> 0.611 - Removed custom DepositAll as SRL5 has fixed the issue - Updated script to run with SRL5. 0.611 -> 0.612 - Changed webhost - Changed version checking - Faster combat - Fixed walking - Fixed banking issue EdgeManKiller 0.01r ~Justin.simba (5.9 KB, 42 views) EdgeManKiller 0.501 ~Justin.simba (9.2 KB, 67 views) EdgeManKiller 0.606 ~Justin.simba (10.9 KB, 91 views) EdgeManKiller 0.610 ~Justin.simba (10.8 KB, 8 views) EdgeManKiller 0.611 ~Justin.simba (10.5 KB, 247 views) EdgeManKiller 0.612 ~Justin.simba (10.6 KB, 1252 views)
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917125654.80/warc/CC-MAIN-20170423031205-00414-ip-10-145-167-34.ec2.internal.warc.gz
CC-MAIN-2017-17
2,544
51
http://www.yet5.com/institutes/courses/203/446/1/1460/manual-testing-training-at-thillainagar.html
code
Address: No 29, 8th cross Thillai Nagar Thillainagar Trichy-620018 Pyroferus Technologies is a privately–held, fast developing company in Chennai, India. We are specialized in serving the most challenging technology needs across the various domains worldwide. PyroferusTechnologies provides best Manual Testing Training, Manual Testing Training classes & Realtime Training Thillainagar. First << >> Last
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917121305.61/warc/CC-MAIN-20170423031201-00178-ip-10-145-167-34.ec2.internal.warc.gz
CC-MAIN-2017-17
405
3
https://www.moddb.com/news/gunpowder-has-been-greenlit
code
After being on Steam Greenlight for just one week our western puzzle game Gunpowder has been Greenlit! We had only a couple thousand votes so far, but we made it up to the top 50 of Greenlight before getting accepted. We aren’t sure why we got accepted so early on, but we grateful and excited. If anyone from here checked it out and helped us, then thank you very much. More news later this week as we push to fully release the game on Steam. If you are interested in checking the game out then head on over to the Gunpowder Steam Greenlight page! We will be making more announcements and updates over there as well.
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571996.63/warc/CC-MAIN-20220814052950-20220814082950-00757.warc.gz
CC-MAIN-2022-33
619
2
https://brilliant.org/problems/reading-it-easy-one/
code
Excel in math, science, and engineering If there are 300 students in a collage, and every student is supposed to read 5 newspapers. There are 60 copies of each newspaper . Find the no. of brands of newspaper the collage should have ?
s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500549426234.82/warc/CC-MAIN-20170726162158-20170726182158-00012.warc.gz
CC-MAIN-2017-30
233
3
https://library.imaging.org/jist/articles/53/3/art00004
code
This paper proposes a driving current control method for a back light unit (BLU), consisting of red, green, and blue (RGB) light-emitting diodes (LEDs), whereby a RGB optical sensor is used to check the output color stimulus variation to enable a time-stable color stimulus for light emission by the RGB LED BLU. First, to obtain the present color stimulus information of the RGB LED BLU, an RGB to XYZ transform matrix is derived to enable CIEXYZ values to be calculated for the RGB LED BLU from the output values of a RGB optical sensor. The elements of the RGB to XYZ transform matrix are polynomial coefficients resulting from a polynomial regression. Next, to obtain the proper duty control values for the current supplied to the RGB LEDs, an XYZ to Duty transform matrix is derived to calculate the duty control values for the RGB LEDs from the target CIEXYZ values. The data used to derive the XYZ to Duty transform matrix are the CIEXYZ values for the RGB LED BLU estimated from the output values of the RGB optical sensor and corresponding duty control values applied to the RGB LEDs for the present, first preceding, and second preceding sequential check points. With every fixed-interval check of the color stimulus of the RGB LED BLU, the XYZ to Duty transform matrix changes adaptively according to the present lighting condition of the RGB LED BLU, thereby allowing the RGB LED BLU to emit the target color stimulus in a time-stable format, regardless of changes in the lighting condition of the RGB LEDs. Kee-Hyon Park, Oh-Seol Kwon, Yeong-Ho Ha, "Time-Stable Red, Green, and Blue Light-Emitting Diode Backlighting Control Using Time-Varying Transform Matrix" in Journal of Imaging Science and Technology, 2009, pp 30503-1 - 30503-5, https://doi.org/10.2352/J.ImagingSci.Technol.2009.53.3.030503
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817491.77/warc/CC-MAIN-20240420060257-20240420090257-00371.warc.gz
CC-MAIN-2024-18
1,810
2
https://www.flikk.net/projects/chilli-barcodes/
code
The Chilli Barcodes system lets you manage your warehouse stock with a Psion Walkabout hand-held scanner or any wi-fi scanner hardware. The Chilli Server service books stock in and out, and helps with stock taking. All information is fed immediately into the Chilli database. The user interface is as simple as it can be and is designed around the warehouse and stock control operations. We put as much information on the small screen as possible so, for example, users can see the expected levels of stock and compare that to the actual level. The system won’t allow users to move stock to the packing area if it has not been tested and released to production. The system runs as a telnet service so we don’t need to install software on the devices: we can use the built-in telnet client. flikk has worked on various aspects of Chilli: specific modules we have developed are: - Chilli Lab - Chilli Scales - Chilli NPD – A redevelopment for larger food manufacturers - Sage Integration - Pegasus Integration Chilli has now linked up to form agileChilli, an exciting new platform for online Rapid Application Development, and we have already used the agileChilli API to link existing Chilli installations.
s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578528523.35/warc/CC-MAIN-20190420040932-20190420062932-00405.warc.gz
CC-MAIN-2019-18
1,210
9
http://www.vistaheads.com/forums/microsoft-public-windowsupdate/340569-microsoft-update.html
code
Re: Microsoft Update PA Bear [MS MVP] wrote: > Now you know. Does this bother or concern you? It certainly concerns me, particularly with the new IDN-based attacks. I talked to MSRC about this years ago (prior to my MVP award) but didn't get anywhere. Microsoft advise that you shouldn't turn off the "only allow https sites to be trusted" setting in IE, but you have to in order to use Windows Update ... > Chas4 wrote: >> When you go to the Microsft Update site it goes to http by defult. >> Only if >> you change the http to an https does it become a secure connection. >> PA Bear wrote: >>> Does it become an HTTPS site after you select the EXPRESS or CUSTOM >>> Chas4 wrote: >>>> Why is the Microsoft Update website a http by default and not a https?
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988719286.6/warc/CC-MAIN-20161020183839-00226-ip-10-171-6-4.ec2.internal.warc.gz
CC-MAIN-2016-44
755
15
https://speakerdeck.com/ihuston/a-personal-journey-towards-cloud-native-data-science
code
Talk delivered at Open Data Science Conference, San Francisco, November 2015 As more and more applications are being deployed in the cloud, developers are learning how to best design software for this new type of system. These Cloud Native applications are single-purpose, stateless and easily scalable. This contrasts with traditional approaches which created large, monolithic, and fragile systems. What can data scientists learn from these new approaches, and how can we make sure our models are easily deployed in this kind of system? In this talk I will discuss the principles of cloud native design, how they apply to data science driven applications and how data scientists can get started using open source cloud native platforms.
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446710980.82/warc/CC-MAIN-20221204204504-20221204234504-00349.warc.gz
CC-MAIN-2022-49
738
2
https://www.uni-goettingen.de/de/robert-genthner/561201.html
code
Robert Genthner is a research associate and PhD. student at the Chair of International Economic Policy. He studied Economics at the University of Mannheim and the Albert-Ludwigs-Universität in Freiburg. In his research, he deals with topics of trade, economic policy and their impact on labor market outcomes and global development. - Genthner, R. and K. Kis-Katos (2018): Foreign investment regulation and firm productivity: Granular evidence from Indonesia. CEGE Discussion Paper No. 345, Göttingen [PDF] - 20. Göttinger Workshop "Internationale Wirtschaftsbeziehungen", Göttingen, Germany, February 2018 [Link] - 3rd Mainz Workshop on Foreign Direct Investment and Multinational Corporations, Mainz, Germany, November 2017 [Link] - ETSG 19th Annual Conference, Florence, Italy, September 2017 [Link] - Stata-Tutorial: International Economic Policy: Replication Course (Master, Georg-August-Universität Göttingen) - Seminar: Globalization and the Rise of Protectionism (Bachelor, Georg-August-Universität Göttingen) - Additional Tutorial: Advanced Macroeconomics I (Master, Albert-Ludwigs-Universität Freiburg)
s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376823339.35/warc/CC-MAIN-20181210123246-20181210144746-00301.warc.gz
CC-MAIN-2018-51
1,121
13
https://grad.umn.edu/image-styles
code
These page outlines all of the image styles used on the new grad site. Because the site was migrated, all of the styles from the d7 site were automatically moved to the d8 site, but some of the styles did not work. Because these styles were used on multiple pages, deleting them could break the site, therefore, there are some styles that remain from the 7 site and should not be removed. *Note: to add an image style via the WYSIWYG, use the "Media Browser" button (STAR icon), as opposed to the "Insert from Media Library" button (IMAGE and MUSIC NOTE icons) These image styles come standard with the Folwell subtheme for your site. There are several circle styles for this site, some were created to only be used for specific instances and should not be used on general pages. This is the main circle style you should use when you want a circle image. This style is used on Toolkit pages- it was created to be used out of the box, and will not work on general pages This style is used on the News and Events overview pages- it was created to be used out of the box, and will not work on general pages This is the style that was migrated from the old Drupal 7 site, it's configurations don't work on the d8 site, so we created the Circle-Main style to replace it These are image styles that we created for specific purposes, but are not circles. This image style was created to be used with the 2 column paragraph bundle with an image on the left and a body on the right (see Fellowship Opportunities on this node for an example). Formerly Toolkit 2 column. This image style is used when including an image in a 2-column paragraph bundle of equal widths This image style was migrated form the d7 site, formerly called Header Image for 2 column general. This style is used for the home page hero image, does not need to be used elsewhere. Migrated from the d7 site, configurations do not work on this site so it was rebuilt as 2 Column small left image style (600x650) (See above) This is a list of image styles you can ignore, either because they are from the 7 site and no longer work, are only needed on the development end of the site, or come standard with drupal and do not need to be used: - Circle- News (175x175) (used for backend devel) - Circle- Toolkit (200x200) (used for backend devel) - CircleTest (used for backend devel) - Cropped: Freeform (standard for drupal) - Crop thumbnail (standard for drupal) - Header image (1500x300) (used for backend devel) - Home page hero image (used for backend devel) - Inline circle (migrated- does not work) - MIE Demo Teaser (necessary addition for megamenu) - Slick media (standard for drupal) - Toolkit 2 column (migrated- does not work)
s3://commoncrawl/crawl-data/CC-MAIN-2021-17/segments/1618039476006.77/warc/CC-MAIN-20210420152755-20210420182755-00053.warc.gz
CC-MAIN-2021-17
2,693
26
https://help.nextcloud.com/t/user-storage-quota-not-showing/78172
code
Nextcloud version 18.0.3: Apache Version 2.4.38: PHP version 7.3 Hey Nextcloud community. I’m pretty new to the game. I setup my server, solved all the security and setup warnings, and everything is working fine so far. But when I wan’t to edit my user settings, I can’t see, what current storage quota someone has. Looking into firefox inspektor, I can see a span object with the storage quota in it, but I can’t see it on the website itself. I have no idea, what could cause this. Is this even my fault? I can paste some config files if needed. A screenshot of my users page:
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662539049.32/warc/CC-MAIN-20220521080921-20220521110921-00688.warc.gz
CC-MAIN-2022-21
585
7
http://www.dribin.org/dave/trigint/
code
trigint is an integer-based trigonometry library for ANSI C. The trigonometry functions in the standard C library use floating point data types (double or float), which may be too slow or unavailable in an embedded environment. This library uses only integer parameters, return values, and calculations. It has been tested on the iPhone with Xcode and on an Atmel AVR microcontroller with avr-gcc, but it is written in ANSI C99, and should work anywhere with a modern C compiler. Because the standard C library uses radians as the angle unit, they must be represented with a floating point types. To avoid using floating point for angles, a new angle unit is used, trigint_angle_t. This splits the circle into 16,384 angle units, instead of 2*PI radians or 360 degrees. Thus, the angle parameters can be safetly stored in an unsigned 16-bit data type. The original purpose of this library was to generate sine waves for audio, so the main functions are: These functions use lookup tables plus linear interoplation to estimate the values for speed. The lookup tables are very small, only 16 entries, to conserve space. See the Performance of trigint_sin16 on iOS page for the speed gains on iOS compared to the standard library functions. The trade-off for linear inerpolation is accuracy, but the accuracy, even with only 16 entry lookup tables, is often sufficient, epsecialy when generating audio. See the Accuracy of trigint_sin16 page for more error analysis. This library is essentially a C version of the Scott Dattalo's sine wave routine for the PIC microcontroller. Credit goes to Scott for coming up with the algorithm. He's also got a whole write up of sine wave theory.
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917127681.50/warc/CC-MAIN-20170423031207-00385-ip-10-145-167-34.ec2.internal.warc.gz
CC-MAIN-2017-17
1,680
5
https://www.imt-atlantique.fr/en/international/move-erasmus/key-action-1-learning-mobility-individuals
code
IMT Atlantique participates actively in the projects included in the Erasmus +program Key action 1 objective: Learning mobility of individuals Action type: Erasmus Mundus Joint Masters and PhD Degrees - Joint Master in Safe and Reliable Nuclear Applications (SARENA) - 2018-2021 - Joint Master in Management of Energy and Environmental Engineering (ME3) - Erasmus labels from 2007 to 2019. Action type: Higher education student and staff mobility > Higher education student and staff mobility in Europe (KA103) > International credit mobility projects (KA107) with universities partner in several countries:
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370493684.2/warc/CC-MAIN-20200329015008-20200329045008-00409.warc.gz
CC-MAIN-2020-16
607
7
https://cloudiffic.com/category/lync-2013/
code
The sessions from Lync Conference 2014 are online. A much asked feature by Lync admins is now available in Office 365 & Lync 2013! While publishing a Lync 2013 topology, the process fails in the first step itself – creating the CMS. The Bandwidth Calculator for Lync 2010 & 2013 is out! The session videos are available for download, along with the slides. Microsoft has released a standalone client for Lync 2013, similar to Lync 2010. But the client is basic in the feature set as the name suggests. Microsoft has started uploading the TechEd recording for all technologies. Below are the links for Exchange and Lync 2013.
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446711390.55/warc/CC-MAIN-20221209043931-20221209073931-00007.warc.gz
CC-MAIN-2022-49
626
7
https://www.shapeways.com/product/LKB35Q4NP/1-450-us-40ft-pickle-car-body-shell?li=shareProduct
code
T gauge (1/450 scale) 40ft pickle car body. This model has been designed to fit the Eishendo adjustable chassis. Note that this chassis wil need to be cut in a different way to that in the instructions, becuase this wagon is shorter than its designed minimum length. However this modification is no harder than the described recommended way. The picture of the separated body and chassis shows how this is done. Due to the open design of the prototype there is not much space to add weight to this body, but I have left the vats hollow so those can be filled to help.
s3://commoncrawl/crawl-data/CC-MAIN-2021-10/segments/1614178381989.92/warc/CC-MAIN-20210308052217-20210308082217-00625.warc.gz
CC-MAIN-2021-10
567
3
http://tinkerwiththis.blogspot.com/2011/03/craft-night-mish-mash.html
code
So this week, all are welcome of course, but we're basically doing a 'whatever you're working on' night. I have a few projects to do for some people, along with a few fun things to get to. My night will basically go like this: Anyone have other brilliant quick project ideas??
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917122933.39/warc/CC-MAIN-20170423031202-00594-ip-10-145-167-34.ec2.internal.warc.gz
CC-MAIN-2017-17
276
2
http://www.techadvisor.co.uk/forum/helproom-1/svchostexe-140166/
code
I am running Windows XP Home, and when I log on, I keep getting delays. When I check Task Manager, Processes, there are several copies of the svchost.exe file running, some are quite small, about 4,376k, but one of the copies varies between 19,000k and 26,000k. The user is the SYSTEM. This file seems to lock out out or severely delay my machine's functioning. If I end this process, then I can normally proceed with the use of the machine, connection to the Internet etc. Has any one any ideas what this process may be, and how I can delete it?? This also seems to create, ocassionally, a program on the desktop called simply "~", which is 294K in size. I have checked for viruses, but to no avail.
s3://commoncrawl/crawl-data/CC-MAIN-2017-47/segments/1510934806842.71/warc/CC-MAIN-20171123142513-20171123162513-00198.warc.gz
CC-MAIN-2017-47
700
1
http://www.kddanalytics.com/practical-time-series-forecasting-forecast-uncertainty/
code
“A good forecaster is not smarter than everyone else, he merely has his ignorance better organized.” Predicting the future is an exercise in probability rather than certainty. As we have mentioned several times over the course of these articles, your forecast model will be wrong. It is just a matter of how useful it might be. A time series model will forecast a path through the forecast horizon, a “point forecast.” But this path is just one of the paths your forecast can take based on your estimated model. Providing a sense of the uncertainty surrounding your forecast is an essential part of your job as a forecaster. The standard approach is to provide the “forecast interval” for your forecast. Typically, this is cast in terms of a 95% prediction interval. That is, 95 times out of 100, the actual value will fall within the specified range. (Note that there is a difference between a “confidence” interval and a “forecast” interval.) Sources of forecast uncertainty There are at least two sources of forecast uncertainty over the forecast horizon. The first results from our ignorance of what the model’s error will be in the forecast horizon. So, we must rely on how well the model did in the recalibration sample (estimation + holdout) as an estimate. The second source of uncertainty results from the model’s coefficients (or parameters) being estimates of their true values. As estimates, they have their own “confidence” interval. As a result, the forecast interval can be quite large (as shown above). And, due to error compounding over time, the forecast interval widens the further into the forecast horizon you go. In our example above, during the first month of the forecast horizon, the forecast interval is plus or minus 0.63% of the forecasted value. By month 6, this spread widens to plus or minus 2.95%. Even accounting for forecast error and parameter uncertainty, these forecast intervals may still be too narrow. What about meta forecasts? In an earlier article we discussed combining forecasts into a meta forecast. The challenge in terms of a meta prediction interval is that it is not a simple matter to combine the prediction intervals of the constituents’ forecasts. One approach is to simply show the extreme upper and lower forecast paths along with the meta forecast path, which will lie somewhere between the two extremes. And then to caution the consumer of your forecast that this is just to give a sense of the possible forecast range, which will likely be too narrow (since the upper and lower forecast will each have their own prediction interval). Probability-based assessment of forecast uncertainty Another approach is to couch your forecast uncertainty in terms of a probability. For example, based on your SALES forecast, what are the chances of hitting a certain level of sales by a certain date? If you are forecasting procurement needs for a warehouse, what is the chance of running out of inventory by a certain date? If you are a macroeconomist forecasting GDP, what are the chances of the economy falling into a recession by a certain date? Suppose you are tasked with forecasting daily SALES over the next year. Management has targeted a certain level of SALES and wants to know when that target will be hit. You can use the forecast uncertainty produced by your model to generate the following chart: The vertical axis is the chance of hitting the SALES target by a certain date (in this case, days into the next year). So, 160 days into the year, there is a 10% chance of hitting the sales target. By day 192, a month later, the chance has grown to 30%. And by day 218, there is a 50/50 chance the sales target will be reached. Stating these chances in terms of odds may be an easier way to present this: By day 160, the odds of hitting the target would be 9 to 1. By day 192 it would be a little over 2 to 1. And by day 218, it would be 1 to 1…a flip of the coin. Uncertainty is a fact of life and your forecasts will be “wrong.” But quantifying how wrong they can be will go a long way towards making them “useful.”
s3://commoncrawl/crawl-data/CC-MAIN-2018-09/segments/1518891814300.52/warc/CC-MAIN-20180222235935-20180223015935-00230.warc.gz
CC-MAIN-2018-09
4,114
29
http://techfromhell.blogspot.com/2014/08/public-ip-address-finder.html
code
This small project in python is intended for this purpose, for those who don't want to use dyn dns services. How this python script works: - It finds your public IP from the showmyip.com - Creates an ips.txt if it doesn't exist, and writes the ip - If the file already exists, it compares the ip from the file with the website's one, if it's the same it doesn't do anything - If it's different, it overwrites the file and then sends an email You can convert it to exe and run it as often as you want through windows scheduled tasks, for an up to date public IP.
s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376823550.42/warc/CC-MAIN-20181211015030-20181211040530-00167.warc.gz
CC-MAIN-2018-51
561
7
https://theburningmonk.com/2019/09/should-you-pack-the-aws-sdk-in-your-deployment-artefact/?utm_source=newsletter&utm_medium=email&utm_content=offbynone&utm_campaign=Off-by-none%3A%20Issue%20%2357
code
You can become a serverless blackbelt. Enrol to my 4-week online workshop Production-Ready Serverless and gain hands-on experience building something from scratch using serverless technologies. At the end of the workshop, you should have a broader view of the challenges you will face as your serverless architecture matures and expands. You should also have a firm grasp on when serverless is a good fit for your system as well as common pitfalls you need to avoid. Sign up now and get 15% discount with the code yanprs15! Update 01/10/2019: a few of you have mentioned layers in the comments or on social media. Scroll to the bottom to see my thoughts on layers as a solution to the problems I mentioned in this post. A version of the AWS SDK is always bundled into the Lambda runtime for your language. So the conventional wisdom says you don’t need to include it in your deployment artefact. I’m here to tell you otherwise. But first, let’s examine the argument for not packing the AWS SDK. Deployment artefacts are smaller This means deployment is faster. Although the bulk of the deployment time is with CloudFormation, not uploading the artefact. So the actual time saving depends on your internet speed. It also means you are less likely to hit the 75GB code storage limit. Which is fair, but I feel this risk can be mitigated with the lambda-janitor. Lastly, you can actually see and edit your code in the Cloud9 editor! Alright, this is pretty useful when you just wanna quickly check something out. Although when you’re building a production service, you wouldn’t want to rely on the AWS console, ever. You certainly wouldn’t be making code changes directly in the console! So what’s wrong with relying on the built-in version of the AWS SDK? The version of the built-in AWS SDK is often much older than the latest. Which means it doesn’t have the latest security patches, bug fixes as well as support for new features. Known vulnerabilities can exist in both the AWS SDK itself as well as its transient dependencies. This can also manifest itself in subtle differences in the behaviour or performance of your application. Or as bugs that you can’t replicate when you invoke the function locally. Both are problems that are difficult to track down. If you rely on tests that execute the Lambda code locally then the fact the runtime has a different version of AWS SDK would invalidate your tests. Personally, I think you should always have end-to-end tests as well. Which runs against the deployed system and checks everything works as expected when running inside AWS. No immutable infrastructure AWS can update the version of the built-in AWS SDK without notice. This can introduce subtle differences to your application’s behaviour without any action from you. A while back, AWS updated the version of boto in the Python runtime. Unfortunately, the version they upgraded to had a bug. It caused many people’s functions to suddenly break. This affected Bustle amongst others and many hours were wasted on debugging the issue. As you can imagine, it wasn’t the easiest problem to track down! In summary, my arguments against using the built-in AWS SDK are: - The built-in AWS SDK is often out-dated and missing security patches and bug fixes. - It invalidates integration tests since the runtime uses a different version of the AWS SDK to what was tested. - AWS can update the built-in AWS SDK without notice Ultimately, I think the tradeoff is between convenience and safety. And I for one, am happy to sacrifice small conveniences for immutable infrastructure. What about layers? Quite a few of you have mentioned Lambda layers as a solution. Yes, you can ship the AWS SDK via layers instead. It would address point 1 and 3 above, but it introduces other challenges. I discussed those challenges in this post, so please give that a read. Granted, some of those challenges have been tackled – e.g. the Serverless framework now supports layers when you invoke functions locally, and you can introduce semantic versioning to layers by wrapping them in SAR apps. However, it still remains a tooling problem if you want to run unit or integration tests before deploying your functions to AWS. In both cases, you’d still need a copy of the AWS SDK locally. For a dependency that is relatively small (a few MBs) and should be updated frequently, such as the AWS SDK, I don’t feel layers is worth the hassle it brings. p.s. AWS also recommends including your own copy of the AWS SDK in the official documentation. Hi, I’m Yan. I’m an AWS Serverless Hero and I help companies go faster for less by adopting serverless technologies successfully. Are you struggling with serverless or need guidance on best practices? Do you want someone to review your architecture and help you avoid costly mistakes down the line? Whatever the case, I’m here to help. Skill up your serverless game with this hands-on workshop. My 4-week Production-Ready Serverless online workshop is back! This course takes you through building a production-ready serverless web application from testing, deployment, security, all the way through to observability. The motivation for this course is to give you hands-on experience building something with serverless technologies while giving you a broader view of the challenges you will face as the architecture matures and expands. We will start at the basics and give you a firm introduction to Lambda and all the relevant concepts and service features (including the latest announcements in 2020). And then gradually ramping up and cover a wide array of topics such as API security, testing strategies, CI/CD, secret management, and operational best practices for monitoring and troubleshooting. If you enrol now you can also get 15% OFF with the promo code “yanprs15”. Check out my new podcast Real-World Serverless where I talk with engineers who are building amazing things with serverless technologies and discuss the real-world use cases and challenges they face. If you’re interested in what people are actually doing with serverless and what it’s really like to be working with serverless day-to-day, then this is the podcast for you. Check out my new course, Learn you some Lambda best practice for great good! In this course, you will learn best practices for working with AWS Lambda in terms of performance, cost, security, scalability, resilience and observability. We will also cover latest features from re:Invent 2019 such as Provisioned Concurrency and Lambda Destinations. Enrol now and start learning! Check out my video course, Complete Guide to AWS Step Functions. In this course, we’ll cover everything you need to know to use AWS Step Functions service effectively. There is something for everyone from beginners to more advanced users looking for design patterns and best practices. Enrol now and start learning! Here is a complete list of all my posts on serverless and AWS Lambda. In the meantime, here are a few of my most popular blog posts. - All you need to know about caching for serverless applications - Choreography vs Orchestration in the land of serverless - Are Lambda-to-Lambda calls really so bad? - Lambda optimization tip – enable HTTP keep-alive - You are wrong about serverless and vendor lock-in - You are thinking about serverless costs all wrong - Check-list for going live with API Gateway and Lambda - How to choose the right API Gateway auth method - AWS Lambda – should you have few monolithic functions or many single-purposed functions? - Guys, we’re doing pagination wrong - Top 10 Serverless framework best practices - I left full-time employment, here’s what happened since - How to break the “senior engineer” career ceiling - My advice to junior developers
s3://commoncrawl/crawl-data/CC-MAIN-2020-34/segments/1596439738858.45/warc/CC-MAIN-20200811235207-20200812025207-00281.warc.gz
CC-MAIN-2020-34
7,795
50
http://epssecurenet.com/how-to/how-to-run-chkdsk-windows-10.html
code
How To Run Chkdsk Windows 10 To tell CHKDSK to fix the drive, we need to give it parameters. In the properties window click on tools and under Error Checking click on Check button. If you'd like to have a recovery USB instead, follow our instructions on how to make a recovery USB. I mean the rebooting, chkdsk running and freezing? Check This Out Seems to be a programming glitch. The content you requested has been removed. If the check disk runs again, even if the previous scan was 100% complete, continue with the steps below. C: or D: Example of command you need to type if the volume you want to scan is D: chkdsk D: /r From My Computer If you can't boot into Windows How To Run Chkdsk Windows 10 in cmd and it will list all the command related with CHKDSK . You can also run the utility by going to Computer (My Computer): Click the Start button Go to Computer Right-click on the drive you want check Click Properties At the Tools Ben shows you how it’s done. i took the precaution of transferring to flash drive all my important files, and now either will replace drive with a ssd or open the drive and see what is going - The NeoSmart Support Forums, member-to-member technical support and troubleshooting. - You can easily see the state of this flag by using two different command line options. - You have the option to schedule a check disk the next time you system restarts but this does not aways work. I'm thinking it's because of my file system, which is FAT32. If so, type Y, restart the computer and let the tool to perform the scan. Do not press any key after you restart so that Check Disk will continue to run and wait for the process to finish. Chkdsk Cannot Lock Current Drive November 1, 2010 Daniel Williams Crap, I set this to run on next startup. Rebooted my computer using the new Seagate HDD as boot drive. How To Run Chkdsk Windows 7 Before Boot Note: All opened handles to this volume will become invalid. From My Computer If you can't boot into Windows 8/8.1 to run chkdsk, download Easy Recovery Essentials - our recovery disk for Windows 8/8.1 - and run Automated Repair or Command Stupid windows 8 does not even have a restore point at all?? I LOVE CLI. Chkdsk Parameters To run the check disk utility from Computer (My Computer), follow these steps: Boot into Windows 8/8.1 Double-click on Computer (My Computer) to open it Select the drive you want to And what useful software can I download to scan the hard drive for errors that are compatible with windows 10 ie speccy, Flobo hard disk repair… TekRevue Hi Leonard, There could How to Find Out Why. - Продолжительность: 6:07 mrizos 73 657 просмотров 6:07 Disable Check Disk "chkdsk" That Runs Every Time Windows Starts - Продолжительность: 3:53 Britec09 81 375 просмотров 3:53 REPAIR BAD How To Run Chkdsk Windows 7 Before Boot Please can some one help what other setting is getting in-place to prevent the check disk happening? so i schedule …but then when i reboot…..nothing happens….it doesnt scan…if there a way to force a scan or what do you do next? How To Run Chkdsk Windows 10 Even in Windows 10, the CHKDSK command is run via the Command Prompt, but we'll need to use administrative privileges to properly access it. Check Disk Windows 7 Cmd You can follow him on Google+ if you'd like. To do so, follow these instructions: Insert the installation disc Restart your computer Press any key to boot from the disc, at the "Press any key to boot from CD or You need to type Y to make sure the utility runs at the next boot. Users running even the latest Microsoft operating system can still use the command to examine their hard drives for errors and repair them if necessary. Can MS fix that? Chkdsk /f Or /r If there isn't any scheduled scan, the message will be: The type of the file system is NTFS. If so, do you have data on the drive or is this a new drive? Its REALLY bad when Microsoft offers to "fix" your disk but just hops out there and deletes almost all of it. this contact form is anything wrong with it… January 9, 2010 Allen How to run Check disk utility manually problem is you can not run check disk on C drive while windows is running. i want to say that , if i do checkdisk in simple command promot then i have some error occour , and it is not check at that time in windows How To Run Chkdsk /f Avi says: 7 years ago Check your system's hard disk for errors: http://www.etechplanet.com/post/2009/07/26/Check-… Chariz says: 4 years ago when I use this kind of method, the part when I click the After your drive letter, type the following parameters separated by a space each: “/f /r /x”. At the Dell logo push F8 repeatedly. You can burn EasyRE on CDs, DVDs or USBs. Skips checking of cycles within the folder structure. the C:/ drive): Windows can't check the disk while it's in use Do you want to dismount this volume first? Chkdsk Commands Windows 10 He began blogging in 2007 and quit his job in 2010 to blog full-time. Type in the following command, substituting the drive letter if necessary. You can burn EasyRE on CDs, DVDs or USBs. November 16, 2010 Lou Carey Leonard: Use the following command to output the chkdsk results to c:\results.txt (keep in mind that you will not see the results on the screen because You can download Easy Recovery Essentials and open Command Prompt to run specific chkdsk commands: You can burn Easy Recovery Essentials to CDs, DVDs or USBs and run Command Prompt. From Command Prompt If you can't boot into Windows XP to run chkdsk, download Easy Recovery Essentials - our recovery disk for Windows XP - and run Automated Repair or Command After authenticating as an administrative user, you’ll be at the Windows Command Prompt, a familiar interface for users who remember the days before Windows NT.
s3://commoncrawl/crawl-data/CC-MAIN-2018-26/segments/1529267863518.39/warc/CC-MAIN-20180620104904-20180620124904-00198.warc.gz
CC-MAIN-2018-26
5,829
20
https://www.sitepoint.com/community/t/i-want-send-mail-both-sender-and-reciver-reciver-recive-the-acknowledgment/269056
code
I have developed a website with dynamic webpage for user to register a course. in that page if anyone applied for a course, The admin should get a mail like this person has applied for this course and the end user also wants to receive the acknowledgment mail from our end. This function is only working within outlook (WEBMAIL). But is not applying for other domains like Gmail,Yahoo,Hotmail,Etc.We cant able to send or receive any mails from other domains.If anyone knows the solution please let me know. I have used Php for my web development. If you are not sending the mail from your own domain, that is the domain of the site, you may well run into problems. Some servers will not send mail which claims to be from another domain, it could be spoofing. Likewise many email clients won’t accept spoofed emails, they go straight to the spam folder. What you need here is Reply-to header, designed exactly for this purpose. Set it for the email sent to the admin, and when he will press Reply button, the email will be sent to the client’s address. Any email sending program has such a feature. Here is an example for PHPmailer: https://stackoverflow.com/a/10432807/285587 This topic was automatically closed 91 days after the last reply. New replies are no longer allowed.
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100276.12/warc/CC-MAIN-20231201053039-20231201083039-00786.warc.gz
CC-MAIN-2023-50
1,280
6
https://www.dexigner.com/news/31004
code
The Society of Typographic Aficionados has announced Frida Medrano of Nuevo León, México as the recipient of the 2018 SOTA Catalyst Award. Created in 2010, the award recognizes a person 25 years of age or younger who demonstrates significant achievement and future promise in the field of typography. Frida Medrano studied graphic design at Universidad de Monterrey in México. Her journey in type design began with a school assignment that produced 'Kalnia,' her first typeface. When variable fonts emerged, in order to explore the technical part of the process, she designed 'Jabin' a variable font with two axes that control the weight and swash of the blackletter. With this project, she participated in Tipografía México 2017, a type design conference that analyzed the variable font format. She worked as branding designer in Anagrama making custom logotypes, and with a web design background, her main goal is to combine technology with typography to explore different design perspectives for branding and web. She currently collaborates with TypeMade, works as a digital designer, and tries to finish her own type design projects and in her free time.
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100651.34/warc/CC-MAIN-20231207090036-20231207120036-00549.warc.gz
CC-MAIN-2023-50
1,163
3
http://www.rebol.org/ml-display-thread.r?m=rmlJRSQ
code
FPT problem when reading file [1/4] from: wonko::algonet::se at: 8-Sep-2003 18:27 Hello! I have a problem when trying to read a file on an FTP server. Trying to read a file I know exists fails since the server seems to think that I try to request a read of a directory and not a file. I am also almost certain that the file permissions are OK. The FTP server is FileZilla. >> print system/version >> system/schemes/ftp/passive: true >> read ftp://username:[password--ip-address]/Archive/IndexByDate.txt connecting to: ip-address ** User Error: Server error: tcp 550 Directory not found ** Near: read ftp://username:[password--ip-address]/Archive/IndexByDate.txt >> read ftp://username:[password--ip-address]/Archive/ connecting to: ip-address == [%Audio/ %Development/ %Drivers/ %Emulators/ %Fun/ %Games/ %IndexByDate.txt %IndexByName.txt %Inte... Could someone help me solve this problem please? Best regards, Peter Carlsson [2/4] from: antonr:iinet:au at: 9-Sep-2003 13:40 What about other files in the same directory or in a different directory? Can you get another FTP client to access the file and see its permissions? (perhaps try SmartFTP.) Anton. [3/4] from: rebol:techscribe at: 8-Sep-2003 22:58 When REBOL attempts to download a file using FileZilla Server, it sends a LIST command instead of RETR command. I'm not quite sure why that happens. FileZilla Server then responds to the LIST command by complaining that the file is not a directory. Elan Anton Rolls wrote: [4/4] from: wonko:algonet:se at: 9-Sep-2003 17:48 Hello Anton! Sorry that I forgot to mention that this also happens with other files in the same directory as well as for different directories. I have also tried with SmartFTP but then everything works fine. Best regards, Peter Carlssson
s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600400274441.60/warc/CC-MAIN-20200927085848-20200927115848-00698.warc.gz
CC-MAIN-2020-40
1,765
16
http://www.vistax64.com/vista-general/15929-sidebar-gadget.html
code
App Launcher, and the Recycle Bin Gadget was pretty much useless, I was hoping it would be a replica of the desktop one. I also wanted to see a return of the Media Player Gadget first seen at PDC 2005 in a special 5219 "Sascha Benjamin Jazbec" <[email protected]> wrote in message >I think it was called "Application Starter". It was in Beta2 (5384) or in >5270 ( December 2005 CTP ) > What else is missing is the gadget for the recycle bin. > "Brian Eshelman" <Brian [email protected]> schrieb im > Newsbeitrag news:[email protected]... >>I older builds (ie January 2006) time frame, there was a Sidebar gadget >> allowed you to drag applications icons onto it. It would organize them >> a 4 x ? size grid. This was my replacement for the quick launch bar >> since I >> can not drag it off of the task bar in Vista. My hope was that they >> bring the gadget back into the builds (by alas NO). Does anyone know >> what I >> am talking about? Does anyone know what the gadget was actully called? >> guess I could pull out the older build, take an hour to load it on a >> to find out the name of the gadget BUT I though I would ask here >> Brian Eshelman
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368700014987/warc/CC-MAIN-20130516102654-00077-ip-10-60-113-184.ec2.internal.warc.gz
CC-MAIN-2013-20
1,215
20
https://www.queryhome.com/tech/15921/have-one-doubt-want-decode-asn-file-there-any-third-party-tool
code
or we are developing our own tool? how is it? Please explain with some examples. If you want to decode any encoded message (Amy be RRC / S1 AP/ X2AP) then u can use the web tools available by third party freely.They will give you the values you filled in the asn structure in XML Format. Try it !!! It's very good and helpful If you have encoded Buffer then u can use this tool by giving buffer content If you have encoded file then u can use I dont know your real requirement, but check this http://www.marben-products.com/asn.1/services/decoder-asn1.html it can decode packet based on the interface. You can play a bit. If you are looking for the ASN compiler, then please check asn1c at http://sourceforge.net/projects/asn1c/ . I hope it helps. Please share why and how ASN Encoder/Decoder are used in telecom (protocols)? interprocess is a communication mechanism like ipc as per my knowledge. so in 3GPP also any interprocess is available or not?
s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656104597905.85/warc/CC-MAIN-20220705174927-20220705204927-00232.warc.gz
CC-MAIN-2022-27
951
10
https://www.thestudentroom.co.uk/showthread.php?t=585226&page=3
code
MIT has much better job prospects. Their Blackjack team recruits from the best students. I heard some guy made over $300,000 in Vegas with them. But then he lost it all. But then he got a scholarship that he was looking for anyway. Phew. So basically, if you're looking to go on to Harvard Med, I strongly recommend MIT.
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100762.64/warc/CC-MAIN-20231208144732-20231208174732-00849.warc.gz
CC-MAIN-2023-50
320
2
http://gamedevarea.com/entities/nox-games/
code
NOXGAMES is a creative indie game development team. Our goal is to make great funny games. We can proudly present 60+ successfull game titles since 2005. We are doing our best to develop awesome games. BETA VERSION! - Information on this portal might not be up to date as it is still in development. We are currently distributing the editing rights directly to the Game Developers.
s3://commoncrawl/crawl-data/CC-MAIN-2017-39/segments/1505818695375.98/warc/CC-MAIN-20170926085159-20170926105159-00261.warc.gz
CC-MAIN-2017-39
381
2
http://science.jkilian.de/salieri/SAL/sdc/ssinstr.htm
code
Values: integer values between 0 and 127 This system setting defines the default MIDI instrument used for the playback of musical data for which no instrument has been explicitly specified. The integer values refer to MIDI instrument numbers the interpretation of which might depend on the setup of the MIDI system (part of Windows). The default value corresponds to a piano sound in the General MIDI Standard. See also: System Settings.
s3://commoncrawl/crawl-data/CC-MAIN-2019-09/segments/1550247481111.41/warc/CC-MAIN-20190216190407-20190216212407-00156.warc.gz
CC-MAIN-2019-09
437
3
https://knowledge.broadcom.com/external/article/248542/start-ops-with-another-ssm-table.html
code
If you are using SSMV3 you can create different policies that can be invoked at OPS startup. Please, visit the OPSVIEW panel 4.1.11 and check the "Version" field or the OPSVIEW panel 4.1.1 and check the value of the SSMVERSION parameter. They both will give the same information. Information regarding SSMV3 and Policy Manager can be found in the link below: If you are still using SSMV2 the best approach is to include an additional column in the resource table and use this column instead of the usual IPL_STATE. For example, column name can be DR_IPL_STATE. Having this column in the table you can add code to the SSMBEGUX exit to use DR_IPL_STATE instead of IPL_STATE when you want to only activate a small set of tasks. To know if the OPS startup is "special" you can use the main product parameter string (MAINPRM) when starting OPS. See the reference below: A 3rd option can be to have an alternate SYSCHK1 dataset. This dataset contains the RDF tables so you can have different resource tables if you invoke a OPSSPAxx member that allocates another SYSCHK1 dataset. The best option would be using SSMV3 and create a different policy.
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233511023.76/warc/CC-MAIN-20231002232712-20231003022712-00808.warc.gz
CC-MAIN-2023-40
1,141
5
http://www.crazysquirrel.com/computing/general/form-encoding.jspx
code
Gaaaarrrrrr.... Yet another standards related problem to keep me scatching my head for hours. I developed and now run the website Rural Escapes. This is great, I really enjoy doing it even though at the moment it's not earning me much but it also means I get the job of debugging and fixing it when things go wrong. Todays little problem is foreign characters not displaying correctly. While developing the site I went to great lengths to make sure that I was able to correctly display all the characters that are used in Europe as Rural Escapes is a Europe wide service. To this end I made sure that all pages sent back stated UTF-8 as their character encoding. Everything seemed to be working. All the foreign characters I entered seemed to be displayed correctly so I was happy. What I forgot to check though was what happens when non-ASCII characters are sent up as form data. Well it turns out that Tomcat (and probably every other container and web server) interprets them using whatever default encoding it is set to use. In the case of Tomcat this seems to be ISO-8859-1 which means that it mangles characters such as £. The reason for this monumental screw up - you guessed it IE. There is a header called Content-Type which is sent up with POST data which should have the format Content-type: application/x-www-form-urlencoded; charset=UTF-8 however back at the dawn of time Microsoft, when developing IE, left off the "; charset-UTF-8" parameter. At the time this wasn't so bad because basically everywhere used ISO-8859-1 so you could be pretty sure everything would be interpreted correctly. Now though a multitude of different character sets are used and you can't rely on the data being sent using one particular encoding which leads to problems. There is partial solution to this problem but it's not pretty. Mozilla and IE (at least) can now include an extra parameter in a post request called "_charset_" (as described in this Mozilla bug report) which can be used to determine the character set of the posted data. There are some potential problems with parameter name clashes but they are probably quite minimal. To include this extra parameter you simply add the attribute "accept-charset" to your form element, cross your fingers, and place a hidden form field called "_charset_" in the form. The browser will then fill in that field when it sends up the data. It is described in this w3c document. A word of warning though; although this works the Java Servlet API doesn't recognize this as a valid way of specifying the form data character set and therefore a call to request.getCharacterEncoding() still returns null. You might be wondering why Microsoft and Mozilla don't just correctly implement the specification. It's quite simple really: Microsoft have been doing it wrong for so long that numerous websites now rely on the incorrectly specified header and handle the correct header very badly. The Mozilla team tried to include the correct header and ran into serious compatibility problems so removed it again. So are there any nice solutions? There is a de-facto standards solution. Both IE and Mozilla send back form data encoded using whatever encoding the page was supplied in even though they don't actually set the header correctly. This, ironically, is the root cause of my problems. The data has been coming up as UTF-8 but because the header isn't set the servlet spec has been decoding it as ISO-8859-1 and screwing it up. If you want to read more about this problem I suggest you have a look here for a great review. This page describes using UTF-8 (well Unicode) with Linux and other posix system and details a number of problems. If you are using Java Servlets to process forms the simplest, and probably most effective, way to ensure you get all the correct characters is to make sure you set the page character set everywhere you can (headers and meta data) and then rely on the browser using that character set when submitting the form. This will work as long as the user doesn't change the content type before submitting the form but as most users don't know what "character type" means they will leave that setting well alone. The only modification you have to make to you code is to ensure that you call request.setCharacterEncoding() BEFORE you read ANY parameters from the request. This technique is discussed here. Incorrect Encoding With SAXBuilder One part of the Rural Escapes software builds a JDOM document from a string retrieved from the database. The database is set to use UTF-8 and all UTF-8 strings seem to be stored correctly. The problem I was having was that on my development computer all strings recovered from the database would be displayed correctly but when the exact same code (with the same version of the JVM and all the same libraries and the exact same version of Tomcat) would mangle the display or UTF-8 characters - typically displaying them as a question mark. I thought the problem would be fixed by the above solution but it wasn't although it did help as at least with the above solution in place double byte characters were being correctly interpreted if not displayed. I am not sure exactly how I fixed this problem but while doing some debugging I noticed that UTF-8 characters were being displayed as ? in the terminal window as well. I guessed that the terminal was set to some other encoding that couldn't display such far fetched characters as £. I reconfigured my system to use UTF-8 throughout and restart the terminal but to no avail the UTF-8 characters were still displayed as question marks. The next day I attacked the problem again and added some debugging statements around the bit of code that I determined must be doing something wrong - this was the section that built a document from a string. I installed the new code on the server and lo and behold everything started working. It seemed that for some reason the debugging code (a logging statement and an XMLOutputter) had some how fixed the problem. I couldn't believe this so I had a think. The best solution I can come up with is that the SAXBuilder I am using to build the document, in the absence of any other evidence, will use the system character encoding to build documents and that restarting Tomcat caused it to re-read the profile with the new updated locale and default character encoding settings. I have discounted the logging statements as the possible solution as I have removed them. What I did add though was a missing xml declaration to the top of the string that gets turned into a document. This will hopefully force the SAXBuilder to treat the text as UTF-8 regardless of the system locale settings.
s3://commoncrawl/crawl-data/CC-MAIN-2015-48/segments/1448398446286.32/warc/CC-MAIN-20151124205406-00090-ip-10-71-132-137.ec2.internal.warc.gz
CC-MAIN-2015-48
6,682
11
http://agentfolio.com/how-to-get-into-a-windows-7-computer-without-password.html
code
Try to get into without password, and then the Command Prompt screen will popup automatically. Conclusion: After analyzing all the tricks, we have found out that re-installation is only recommended on new computers and resetting Windows password from guest account is very conditional. They left without notice and after multiple attempts at contacting them I deemed the computer to be mine. You can reset password in any Windows computer with the help of this tool. So, if you want to reset your computer password then it is recommended to use Passmoz LabWin. And worst of all, you cannot even access the internet on your computer to download a program that might help you. Step 1: Download and installation. Your password will be removed and then you can get into your computer without password. But remember, if it fails to reset the password then you can have your refund within 30 days but we are pretty sure that won't happen. To create this article, 32 people, some anonymous, worked to edit and improve it over time. By going through this, you should be able to get to Windows 7 computer without password limitation - since the password has been reset or recovered. Step 2 : Now, press Shift key 5 times to enable the default administrator account. What is the password reset disk, and how to make a password reset disk for your computer, see. It doesn't reset or remove the password from your system like PassMoz but rather it recovers the password. Option 3: How to Get into Windows Computer without Password by Reinstall If the computer was bought from others and the seller didn't tell you the password, then reinstalling Windows is a good chocie. When Windows login screen appears, press the Shift key 5 times to bring up the command line interface. Because it will require you to execute command lines in Command Prompt. You may have forgotten your Windows 7 login password, but don't be frustrated. The time you spent on it will not exeed 5 minutes. Using a Windows 7 password reset software app If you forget to create one such reset disk previously when you're locked out of account, things can be a little bit tricky. On the logon screen, click on your user account and open Windows 7 home premium computer without typing password. Now you can get into Windows 7 with the recovered password. The only drawback is that you have to pay for a few bucks to fully use the function. You may also have to wipe your computer and start over; if you have your data backed up to an external source e. Remove Windows 7 forgotten password or create a new account for Windows 7. So, i would like to know how to log into my user account. So if you are having trouble signing into your windows computer, then iSeePassword just might be the right fit for you. Step 8: Unplug the setup disk, restart computer again. Each method has its own pros and cons. Now, your Windows 7 will start normally. When the System Recovery environment is loaded, click Command prompt: We are going to attempt to create a new user account. For example, net user isunshare 12345. Luckily there is a simple yet powerful Windows password recovery software called , which enables you to reset lost Windows 7 password so you can get back into a locked Windows 7 computer without a password. Your computer should boot from your thumb drive automatically since it's bootable. Don't forget to read the reviews and ratings of this product and if you have any query then feel free to contact the support staff. If everything passes, then you should get to a screen where you can select which account you want to reset the lost password. Step 4: Remove Administrator password. You don't need to make a new one. After resetting the password, the password of target user will be blank. However, you should have a Windows installation disk at hand. This program would be the first choice for those who need to get back the lost password, it's a well-known one preferred by most users. This part only applies with local administrator accounts and not with root or Microsoft accounts. Then download, install the program on your accessible computer, then run it. Step 1: Turn off your computer and restart it, enter F8 to get in Advanced Boot Options. Create a password reset disk: Reset your Windows password: If you forget the administrator password and don't have a password reset disk or another administrator account, you won't be able to reset the password. Retrieve and enter the code. Then your Windows 7 will start normally and you can log on as administrator account without password. Method 2: Bypass Password Protected Windows 7 without Password - Use a Password Reset Tool This is another option to remove forgotten password and get into password protected computer on Windows 7. Warning: The guest account is required to have admin privilege to fully perform such a rescue. Obviously we need to find out the security breaches to get into a password-protected computer. Step 4: Reset Windows 7 administrator password. Option 2: Unlock computer in Safe Mode - without password disk. The third-party is one of the recovery programs to consider if you're in a password protection pickle. How to get into a locked Windows 7 computer without a password? What to do if you forget your Windows password If you've forgotten your Windows password and you're on a domain, you should contact your system administrator to reset your password. Ophcrack can crack passwords no longer than 14 characters using only alphanumeric characters. Now you should be able to access to the Windows 7 desktop again. It's fast and easy enough for a computer newbie just with a basic knowledge of Windows. On the interface that appears, select Windows 7, choose an account needed to be reset, and then click Reset Password button. Step 3: Tap your new password and log on computer successfully. This won't require technical skills. So you need to manually.
s3://commoncrawl/crawl-data/CC-MAIN-2019-26/segments/1560628000175.78/warc/CC-MAIN-20190626053719-20190626075719-00411.warc.gz
CC-MAIN-2019-26
5,904
10
https://doris.apache.org/docs/dev/lakehouse/sql-dialect/
code
Starting from version 2.1, Doris can support multiple SQL dialects, such as Presto, Trino, Hive, PostgreSQL, Spark, Oracle, Clickhouse, and more. Through this feature, users can directly use the corresponding SQL dialect to query data in Doris, which facilitates users to smoothly migrate their original business to Doris. This function is currently an experimental function. If you encounter any problems during use, you are welcome to provide feedback through the mail group, Github issue, etc. . This function only supports query statements and does not support other DDL and DML statements including Explain. Download latest SQL Transform Tool. On any FE node, start the service through the following command: nohup ./transform-doris-tool-1.0.0-bin-x86 run --host=0.0.0.0 --port=5001 & This service is a stateless service and can be started and stopped at any time. 5001is the service port and can be arbitrarily specified as an available port. It is recommended to start a separate service on each FE node. Start the Doris cluster (version 2.1 or higher) Set the URL of the SQL Dialect Conversion Service with the following command in Doris: MySQL> set global sql_converter_service_url = "http://127.0.0.1:5001/api/v1/convert" 127.0.0.1:5001is the deployment node IP and port of the SQL dialect conversion service. Use SQL dialect Here we take the Presto/Trino SQL dialect as an example: set sql_dialect = "presto"; - Execute any Presto/Trino SQL syntax for data query. Currently supported dialect types include:
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474660.32/warc/CC-MAIN-20240226130305-20240226160305-00130.warc.gz
CC-MAIN-2024-10
1,517
18
https://jira.lsstcorp.org/browse/DM-21746
code
Very happy! A thousand thanks!! And I really appreciate your writing up the instructions on how to add a single package to scipipe_conda_env with minimal impact. They would have saved past me a lot of trouble and will future devs. Note I was also following https://sqr-016.lsst.io/#adding-a-new-conda-package which Joshua Hoblitt pointed me too. With what I know now, they also seem incomplete as instructions for a pipelines dev. Things I didn't know a month ago: - The SPLENV_REFs can point to any SHA in scipipe_conda_env (including one on a ticket branch) - That you have resolve the conda env on a linux or osx system. - That the FIRST place you should change SPLENV_REF is in lsstsw, and then try to deploy and rebuild. - How to test: (1) start with rebuilding lsstsw with the new SPLENV_REF. (2) Then try newinstall.sh with the new ref + eups distrib install.
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571692.3/warc/CC-MAIN-20220812105810-20220812135810-00356.warc.gz
CC-MAIN-2022-33
866
7
https://linuxjobber.com/testimonials
code
Many graduates have already completed their training and obtained their certifications. Our Work Experience program helps them to simulate On-The-Job training and get real-life, practical, industry experience in their respective fields. I am sure it will help you too. - Joseph Showumi, Founder LinuxJobber The Work Experience completely changed me for good.It has built my confidence in the field.Before the work experience i was still douting if i could make it. wiliter chemutai Joined to become Linux Administrator I have learned ways to do an online research for resources and use it to troubleshoot an issue with confidence. Agatha simotwo Joined to become Linux Administrator The program is worthwhile, bringing you face to face with real world scenario challenges as a solutions architect. The organizers are so passionate and it makes you look forward to the daily meeting . JOHN ARUKWE Joined to become AWS Administrator I thought I knew what was needed to succeed - I was wrong. Linux-jobber takes you from novice or seasoned to the CUTTING Edge doing do with real world situations. I HIGHLY recommend this training! Vince Tylke Joined to become Linux Administrator It was a great learning experience. Chris Chris Joined to become DevOps The tech leads are very knowledgeable and helpful. I found the program very challenging and rewarding. Exactly what I needed.
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593655884012.26/warc/CC-MAIN-20200704042252-20200704072252-00314.warc.gz
CC-MAIN-2020-29
1,374
15
https://www.mdvip.com/patients/member-testimonials/renewed-faith
code
| March, 11 2020 | for Martin van Cleeff, MD I had completely lost all hope in the medical industry when a friend recommended Dr. VanCleeff. He has been a huge reason for my good health. He not only was a great medical doctor he allowed was willing to listen to my failing marriage issues. I’m SO grateful to have him helping me thru this journey of life!
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224649293.44/warc/CC-MAIN-20230603133129-20230603163129-00277.warc.gz
CC-MAIN-2023-23
357
2
https://portfolio.jon-kyle.com/
code
- Create a foundational set of tools - Release a programmer preview - ———— —— ———— ————— - —— —— ———— - —————— ———— git clone https://github.com/jondashkyle/enoki-starterkit.git You will run into bugs and limitations, but it’d be great if you could report them and contribute feedback.
s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886106358.80/warc/CC-MAIN-20170820073631-20170820093631-00203.warc.gz
CC-MAIN-2017-34
353
7
http://anakusu.com/cheap-prometrium-generic/
code
2 provera is synthetic progesterone and doesn t have the bio-availability of either progesterone micronized or usp or prometrium, which are closer in molecular structure to the progesterone produced by a genetic female. Prometrium 300 mg price, prometrium for pms symptoms Prometrium 200 mg to start period asap, Prometrium effects secondaires, Prometrium and milk supply, Prometrium prescribing information, Prometrium before getting pregnant, Is it possible to get pregnant on prometrium, Cost prometrium walgreens, Prometrium 200 mg twice a day, Will prometrium help me get pregnant, Prometrium for endometriosis, Prometrium ukc, How does prometrium work to start period, Prometrium cramps during pregnancy, Prometrium during ovulation, Can i get pregnant while taking prometrium, Prometrium vaginal discharge, Prometrium and hair loss, Aygestin vs prometrium suppositories, Difference between aygestin and prometrium pregnancy, Purchase prometrium. very cheap prometrium. Prometrium costo, prometrium and perimenopause Prometrium 200 mg twice a day medical term, Where to buy prometrium online, Prometrium dosage to induce period fast, Prometrium progesterone cream, Generic prometrium by watson, Prometrium acquired, Cheap prometrium 200, Prometrium cheap gas, Prometrium side effects medication, Prometrium menopause, Prometrium indication in pregnancy, Prometrium overdose exo, Prometrium 200 mg to start period early, Purchase prometrium 100. he put me on prometrium, 200 mg. Prometrium suppositories cost, prometrium 200mg and pregnancy Prometrium wikipedia indonesia Prometrium pregnancy dose Can you get pregnant while taking prometrium Prometrium 200 mg to start period after birth Prometrium y embarazo sintomas What is prometrium used for during pregnancy Can you take prometrium while trying to conceive Prometrium how long until period after provera Prometrium progesterone for anxiety Prometrium menstrual cycle Prometrium 200 mg pictures of generic Prometrium 200 mg capsule Side effects of prometrium 200 mg print an instant ps card now, and use it as a prometrium discount card to get a cheap prometrium price. Cheap prometrium progesterone, prometrium dosage early pregnancy Prometrium pregnancy bleeding after internal exam, Prometrium cost without insurance, Prometrium ukiah, Prometrium medicine cabinets, Prometrium online pharmacy, Prometrium order checks, Prometrium testimonials, Prometrium 200 mg twice a day workouts, Purchase prometrium side, Prometrium and estradiol weight loss, How much prometrium during pregnancy, Prometrium over the counter. instantly save up to 85 or more on prometrium purchases not covered by insurance. Prometrium generic equivalent, will i get a period while on prometrium Bancroft is the othello. Kaylee shall prize below the microsome. Ablush riverside was connected. Purgatories are extraterrestrially cudgeling upto the awesomely fractious quackster. Daedal yuriko natheless misplaces within the sourish joinder. Snug waterwork shall cut back on. Needless wave listens in. progesterone in capsules – utrogestan prometrium . Buy Prometrium online Order Prometrium online Prometrium without prescription
s3://commoncrawl/crawl-data/CC-MAIN-2018-26/segments/1529267866888.20/warc/CC-MAIN-20180624063553-20180624083553-00092.warc.gz
CC-MAIN-2018-26
3,166
31
https://erikreel.com/2016/02/21/835/
code
Q: Do you, then. consider your work Modernist or Post-Modernist? ReeL: Neither. No, it is quite different. Maybe not so easy to get at in an interview, I have many more disagreements with Modernism than those we just alluded to. Yet, Post-Modernism is tainted by other conceits that have been cleaned out of my work. Q: Such as? ReeL: Besides my war on its referentiality, on a more mundane level, there are a lot of patterns in Post-Modernist paintings. Notice that there are no patterns in my work. More significantly, it explicitly cannot be produced by a machine, an artifical intelligence, or any mechanism that depends on algorithms. It is fundamentally of the human hand. Yet, it’s psychological, it deals, in part, with cognitive processing., with what underlies our mind workings. It is pre-linguistic, if you will. Q: I’m not sure I follow. Couldn’t this be considered another sub-cultural approach within a Post-Modernist outlook? Post-Modernism is devilishly broad and amorphous in its definition. ReeL: I feel there is a profound and important difference in orientation. I seek the un-machine-like. Imagery that is without pattern. This drive to differentiate from an artificial intelligence is so far outside of the questions sought after by either Modernism or Post-Modernism that it isn’t even on their maps. The future will demonstrate how crucial this distinction is and will be for the future of human culture. Q: OK, so you are asking different questions. Which questions? ReeL: I am interested in a profoundly different set of questions than either Modernism or Post-Modernism. I am interested in the non-machineness of art, what distinguishes us from machines. Now that we are more cybernetically aware, it turns out to not be so easy to do or see this. Q: Why is this important? ReeL: Soon we will have Artificial Intelligences that will be able to mimic most of what we now call “art”. For this reason, art, human art, is in a very real and important sense, not what anyone says it is. This is the Achilles heel of Post-Modernism that .Artificial Intelligence reveals, once one more fully understands its implications. Machines can, and will, create much of what we now call “art”. At some point, artificial intelligences will call all this into question. I also feel that these questions will be profoundly more important in the near future than they are today. For culture, for all humanity. Q: Well this certainly puts a different spin on Walter Benjamin. ReeL: I recently reread a lot of Benjamin’s essays. When I was studying with Rainer Crone in school we read a lot of the Frankfurt School. This time around it seemed like a blast from a deep past. His thought now feels so old-fashioned, obsolete. True for much of what still goes on, but not for what I am looking for. Q: Doesn’t Benjamin account for all of this? for what you are talking about? ReeL: No. Benjamin is responding to and critiquing an age for its inadequate understanding of machines; but for all that, he naturally assumes that there is still a human mind behind the machine. It does not occur to him that the mind behind the machines may be itself a machine. This was only natural; he couldn’t have done otherwise. Remember, Benjamin was writing before Turing. Even Turing did not fully see what the future of electronics would bring, their ability to mimic, for example. He, up to the end, always characterized his machines as “calculating” machines, with very specific, mathematical, boundaries on what calculation meant, and the machines he worked with were, by today’s standards, quite primitive.
s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250610919.33/warc/CC-MAIN-20200123131001-20200123160001-00033.warc.gz
CC-MAIN-2020-05
3,628
18
https://www.ctolib.com/facebookincubator-magma.html
code
Magma is an open-source software platform that gives network operators an open, flexible and extendable mobile core network solution. Magma enables better connectivity by: - Allowing operators to offer cellular service without vendor lock-in with a modern, open source core network - Enabling operators to manage their networks more efficiently with more automation, less downtime, better predictability, and more agility to add new services and applications - Enabling federation between existing MNOs and new infrastructure providers for expanding rural infrastructure - Allowing operators who are constrained with licensed spectrum to add capacity and reach by using Wi-Fi and CBRS The figure below shows the high-level Magma architecture. Magma is 3GPP generation (2G, 3G, 4G or upcoming 5G networks) and access network agnostic (cellular or WiFi). It can flexibly support a radio access network with minimal development and deployment effort. Magma has three major components: Access Gateway: The Access Gateway (AGW) provides network services and policy enforcement. In an LTE network, the AGW implements an evolved packet core (EPC), and a combination of an AAA and a PGW. It works with existing, unmodified commercial radio hardware. Orchestrator: Orchestrator is a cloud service that provides a simple and consistent way to configure and monitor the wireless network securely. The Orchestrator can be hosted on a public/private cloud. The metrics acquired through the platform allows you to see the analytics and traffic flows of the wireless users through the Magma web UI. Federation Gateway: The Federation Gateway integrates the MNO core network with Magma by using standard 3GPP interfaces to existing MNO components. It acts as a proxy between the Magma AGW and the operator's network and facilitates core functions, such as authentication, data plans, policy enforcement, and charging to stay uniform between an existing MNO network and the expanded network with Magma. We develop all components of the system on virtual machines managed by Vagrant. This helps us ensure that every developer has a consistent development for cloud and gateway development. We support macOS and Linux host operating systems, and developing on Windows should be possible but has not been tested. Then, install some additional prereqs (replace brew with your OS-appropriate package manager as necessary): $ brew install python3 $ pip3 install ansible fabric3 requests $ vagrant plugin install vagrant-vbguest Running the System With the prereqs out of the way, we can now set up a minimal end-to-end system on your development environment. In this README, we'll start by running the LTE access gateway and orchestrator cloud inside their development VM's, and registering your local access gateway with your local cloud for management. We will be spinning up 3 virtual machines for this full setup, so you'll probably want to do this on a system with at least 8GB of memory. Our development VM's are in the 192.168.80.0/24 address space, so make sure that you don't have anything running which hijacks that (e.g. VPN). In the following steps, note the prefix in terminal commands. HOST means to run the indicated command on your host machine, CLOUD-VM on the cloud vagrant machine under MAGMA-VM on the magma vagrant machine under Provisioning the Virtual Machines Go ahead and open up 2 fresh terminal tabs. Start in Terminal Tab 1: We'll be setting up the LTE access gateway VM here. HOST [magma]$ cd lte/gateway HOST [magma/lte/gateway]$ vagrant up This will take a few minutes. Switch over to Terminal Tab 2: Here, we'll be setting up the orchestrator cloud and datastore VMs. The datastore VM runs a PostgreSQL instance. HOST [magma]$ cd orc8r/cloud HOST [magma/orc8r/cloud]$ vagrant up datastore HOST [magma/orc8r/cloud]$ vagrant up cloud An Ansible error about a .cache/test_certs directory being missing is benign. If you see an error early on about VirtualBox guest additions failing to install, you have a few extra steps to take after the provisioning fails: HOST [magma/orc8r/cloud]$ vagrant reload cloud HOST [magma/orc8r/cloud]$ vagrant provision cloud This will re-run the Ansible provisioning. It'll be a lot quicker this time around since most of the steps will be skipped. Once all those jobs finish (should only be 5 minutes or so), we can build the code for the first time and run it. Start in Terminal Tab 1: HOST [magma/lte/gateway]$ vagrant ssh MAGMA-VM [/home/vagrant]$ cd magma/lte/gateway MAGMA-VM [/home/vagrant/magma]$ make run This will take a while (we have a lot of CXX files to build). It's a good time to switch over to Terminal Tab 2: Here, we'll build and run all of our orchestrator cloud services. We'll also use this time to register the client certificate you'll need to access the API gateway for the controller running on your cloud VM. HOST [magma/orc8r/cloud]$ vagrant ssh CLOUD-VM [/home/vagrant]$ cd magma/orc8r/cloud CLOUD-VM [/home/vagrant/magma/orc8r/cloud]$ make run Again, this will take a while. While both these builds are churning, it's a good time to grab lunch, or a coffee. If you're reading this because you recently nuked your VMs, you have one more thing to do. This magma/.cache folder stays around even when you destroy your VMs. But if you're starting with a blank datastore VM, the cert that your browser has isn't registered with the system anymore (you deleted those tables). We have a Make target that will re-register the cached test cert with your datastore VM: CLOUD-VM [/home/vagrant]$ cd magma/orc8r/cloud CLOUD-VM [/home/vagrant/magma/orc8r/cloud]$ make restore_admin_operator Connecting Your Local LTE Gateway to Your Local Cloud At this point, you will have built all the code in the LTE access gateway and the orchestrator cloud. All the services on the LTE access gateway and orchestrator cloud are running, but your gateway VM isn't yet set up to communicate with your local cloud VM. We have a fabric command set up to do this: HOST [magma]$ cd lte/gateway HOST [magma/lte/gateway]$ fab register_vm At this point, your access gateway VM is streaming configuration from your cloud VM and sending status and metrics back to your cloud VM. If you want to see what the access gateway is doing, you can vagrant ssh magma inside lte/gateway, then do a sudo tail -f /var/log/syslog. If everything above went smoothly, you should eventually (give it a minute or two) see something along the lines of: MAGMA-VM$ sudo service magma@* stop MAGMA-VM$ sudo service magma@magmad restart MAGMA-VM$ sudo tail -f /var/log/syslog Sep 27 22:57:35 magma-dev magmad: [2018-09-27 22:57:35,550 INFO root] Checkin Successful! Sep 27 22:57:55 magma-dev magmad: [2018-09-27 22:57:55,684 INFO root] Processing config update g1 Sep 27 22:57:55 magma-dev control_proxy: 2018-09-27T22:57:55.683Z [127.0.0.1 -> streamer-controller.magma.test,8443] "POST /magma.Streamer/GetUpdates HTTP/2" 200 7bytes 0.009s Using the NMS UI Magma provides an UI for configuring and monitoring the networks. To run the UI, first install Docker in your host. Then: HOST [magma]$ cd nms/fbcnms-projects/magmalte HOST [magma/nms/fbcnms-projects/magmalte] $ docker-compose up -d HOST [magma/nms/fbcnms-projects/magmalte] $ docker-compose run magmalte yarn run setAdminPassword [email protected] password1234 After this, you will be able to access the UI by visiting https://localhost, and using the email [email protected] and password password1234. If you see Gateway Error 502, don't worry, the NMS can take upto 60 seconds to finish starting up. Join the Magma Community - Mailing lists: - magma_dev channel See the CONTRIBUTING file for how to help out. Magma is BSD License licensed, as found in the LICENSE file. The EPC is OAI is offered under the OAI Apache 2.0 license, as found in the LICENSE file in the OAI directory.
s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600400232211.54/warc/CC-MAIN-20200926004805-20200926034805-00722.warc.gz
CC-MAIN-2020-40
7,863
68
https://soshace.com/developers/Oleg_K
code
He loves using React with Redux as a Front-End Framework and Express as a Back-End. Oleg is an awesome team player, who will always ship well-commented, easily understandable and maintainable high-quality code. The developer produces beyond expectations, providing a broad range of skills and talent. Highly engaged and driven, he helps make the team more prolific. Fulfilling all requirements detailed in the s...
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100724.48/warc/CC-MAIN-20231208045320-20231208075320-00231.warc.gz
CC-MAIN-2023-50
414
3
https://www.oracle.com/technetwork/middleware/foundation-pack/overview/default-1869475.html
code
Oracle Open World 2012 AIA, Foundation Pack & SOA Governance Presentations The list below only includes SOA, AIA, Foundation Pack & SOA Governance presentations delivered or moderated by Oracle Product Management. For a complete list of Oracle Open World 2012 presentations, please go here. CON8669 - Using the Right Tools, Techniques, and Technologies for Integration Projects Every integration project brings its own unique set of challenges. There are many tools and techniques to choose from. How do you ensure that you have a means of consistently and repeatedly making decisions about which tools, techniques, and technologies are used? In working with many customers around the globe, Oracle has developed a set of criteria to help evaluate a variety of common integration questions. This session explores these criteria and how they have been further organized into decision trees that offer a repeatable means for ensuring that project teams are given the same guidance from project to project. Using these techniques, the presentation shows how you can reduce risk and speed productivity for your projects. CON8769: Jump-starting Integration Projects with Oracle AIA Foundation Pack The Oracle Application Integration Architecture Foundation Pack development lifecycle prescribes the best practice methodology for developing integrations between applications. The lifecycle is supported by a toolset that focuses on the architects and developers. Attend this session to understand how Oracle AIA Foundation Pack can jump-start integration project development and boost developer productivity. It demonstrates what the product does today and showcases new features such as support for building direct integrations. CON8545: Application Integration with Oracle SOA Suite: A Customer Perspective Building a SOA enterprise practice across various business sectors at Eaton was a key driver of the approach for a unified application integration strategy, rather than having disparate technology components for various integrations across the company. Eaton’s solution deployment with Oracle SOA Suite and Oracle Application Integration Architecture has accelerated the company’s order lifecycle and addressed business challenges that demand more flexibility and adaptability. In this session, Eaton discusses when to pick which integration tool, how to put in place proper SOA governance, and what not to do. The session also covers key lessons from Oracle’s Siebel CRM Integration Pack for Oracle Order Management as well as integrations with SAP and MFG/PRO. CON8977: Integrating PLM with Engineering and Supply Chain Systems Today most high-tech, medical device, and industrial manufacturing products are produced through mechanical design, electronics design, and software. Most recalls and quality issues arise because of configuration problems and interactions among these components. In this session, discover how integrating PLM with engineering processes and supply chain systems enables companies to manage common and integrated design information across all MCAD, ECAD, and software components. CON8591: Gaining Victory over SOA and Application Integration Complexity Responsible for straightening out integration problems by introducing a service-oriented approach? In this session, a panel of Oracle customers, partners, and the Oracle Fusion Applications team itself share how they’ve conquered service-based application integration complexity—or at least aspects of it—through a combination of Oracle SOA governance and sound application architecture. Not the least of the problems is failing to manage the application environment and interfaces you already have available. Plus, the lack of automation to manage project artifacts and runtime deployments has long been an inhibitor to SOA success. The session includes a couple of mini-case studies on successful strategies for managing the complexity of today’s application environments. CON8612: The Timeline of an Oracle Enterprise Repository Implementation at Choice Hotels Oracle customers using Oracle SOA Suite, Oracle Business Process Management, or Oracle Application Integration Architecture Foundation Pack often wonder how to get control of their service integration assets and also what to expect from a service repository over time. This session describes the high-level lifecycle of an enterprise repository implementation, including how the focus of the initiative shifts from project assets to business return as the organization matures, what roles and responsibilities come into play, and how new demands—such as supporting communities in the cloud—are met. CON8601: Oracle SOA Suite, the Most Capable Tool for Every Possible Integration Challenge This session provided an overview of Oracle SOA Suite, an update on recent milestones, and an overview of the directions of the product. In addition, it looked at how Electronic Arts implemented a large Oracle SOA Suite project and reviewed the benefits it derived by embracing this integrated stack. CON8318: Successful Application Integration and SOA Projects: Customer Panel The audience learned directly from Oracle SOA Suite users how they have successfully delivered new integration and/or service-oriented architecture (SOA) projects in their companies. The presentation discusseed best practices, how to avoid pitfalls, and how to measure success and ROI. CON8968: How to Integrate Cloud Applications with Oracle SOA Suite There is a new integration need specific to applications offered as cloud services. Customers need to integrate with this new breed of applications. Compared to integrating with on-premises applications, existing paradigms to ensure reliability, performance, and security need to be revisited. This session highlighted how best to integrate with Oracle’s portfolio of cloud applications—including Oracle Fusion Customer Relationship Management, Oracle Fusion Human Capital Management, and Oracle’s Taleo and RightNow product lines—and discusses how Oracle SOA Suite and Oracle Data Integration provide all the integration capabilities for cloud applications and on-premises applications. In the session, customers shared their real-life application integration experiences. CON8632: Extreme Performance and Scale Delivered by SOA on Oracle Exalogic Demands to incorporate internet-scale applications, data, and social media traffic with existing IT infrastructure require extreme availability, reliability, and scalability. In this session on industrial-strength SOA, the audience learned how Oracle Exalogic and Oracle Exadata engineered systems address these requirements. They heard (1) how SOA and BPM benefit from “hardware and software engineered for each other,” (2) how Oracle Exadata provides the data tier with unparalleled scalability and performance for SOA and BPM running on Oracle Exalogic, (3) customer case studies, (4) best practices and topology guidelines, (5) information on tools that help operate, manage, provision, and deploy—to help reduce overall TCO. Extreme engineering at its best! CON8627: Administration and Management Essentials for Oracle SOA Suite 11g Understand the key concepts and gain the knowledge to choose the right toolsets to manage and administer Oracle SOA Suite 11g. This session offered a deep dive into the product architecture and best practices for error handling, diagnostics, and monitoring—together with a few antipatterns to watch out for during your development and operational phases. Familiarize yourself with the newest product features that will empower your IT operations team to troubleshoot and diagnose issues in a production environment.
s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250606226.29/warc/CC-MAIN-20200121222429-20200122011429-00520.warc.gz
CC-MAIN-2020-05
7,704
25
http://osastrolog.blogspot.com/2009/02/20090218-sun-with-interesting.html
code
Seeing 3/10, transparency 1/10. It's cloudy basically, and I've to push the exposure to 0.3s with nearly maximum gain to pass through the cloud! I couldn't comment on the surface detail since it could hardly be seen during cloudy moments, but I notice a big and interesting prominence immediately during the moments with thinner cloud. 1351 (GMT+8), close up with 2x barlows:- Telescope: Borg 45ED II with Solarmax 40/BF10 Camera: DMK 31AF03
s3://commoncrawl/crawl-data/CC-MAIN-2018-22/segments/1526794867055.20/warc/CC-MAIN-20180525082822-20180525102822-00051.warc.gz
CC-MAIN-2018-22
441
4
https://www.10kdesigners.com/community
code
What you'll GET A community with an ever expanding repository of content to help you get to your next goal. Whether you’re a beginner or an experienced designer. Private community of peers. Ever felt like you were missing out on having a network of design friends, potential collaborators and mentors? Well, here’s your answer. Continuous learning. You get out of this membership what you want. Whether that’s to learn new skills, make more money, find opportunities or anything else.
s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600400221980.49/warc/CC-MAIN-20200925021647-20200925051647-00656.warc.gz
CC-MAIN-2020-40
490
4
https://galactictalk.org/d/2957-how-to-contact-interstellarexchange
code
I'm trying to get some support from Interstellar.exchange for an issue I have, but can't get in touch with them. Their mail isn't reachable anymore (returns error) and their Twitter account disabled direct messages and tweets. I don't want to assume the worst as they we've been legit for couple years. Anybody have an idea how to contact them? @fritz maybe?
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100529.8/warc/CC-MAIN-20231204115419-20231204145419-00456.warc.gz
CC-MAIN-2023-50
358
2
https://forum.kingsnake.com/whatturtle/messages/149.html
code
mobile - desktop Available Now at RodentPro.com! News & Events: Posted by CanidMan on December 23, 2002 at 17:08:13: In Reply to: Re: You got the ID on that one! E. m. posted by Batagur on December 23, 2002 at 08:59:05: I wanted to say it looks like a type of podocnemis...
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296949701.0/warc/CC-MAIN-20230401032604-20230401062604-00039.warc.gz
CC-MAIN-2023-14
273
6
https://gitkon.com/speaker/matt-biilmann/
code
Mathias (Matt) Biilmann is CEO of Netlify, a company he co-founded in 2014, and today is one of the fastest-growing web development platforms. He has been building developer tools, content management systems, and web infrastructure for more than 30 years and is recognized for coining the term “Jamstack.” An active participant in open source, Matt has contributed to well-known projects in more than a dozen languages at all layers of the stack. Matt grew up in Denmark, where he trained as a musician and music journalist. Few things have had as large an impact on the modern web as Git. How has Git shaped web development, and how can extending a Git-centric workflow unleash new productivity possibilities for your team?
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224648465.70/warc/CC-MAIN-20230602072202-20230602102202-00476.warc.gz
CC-MAIN-2023-23
728
2
https://ello.co/conley76
code
Paul Heyman Guy 2003 Total post views Some seriously hot fire Well, at least this time the dude didn't outright say that black quarterbacks can't be successful, he just implied it. Is this going to be where we make fun of twitter people like twitter is where we make fun of Facebook people?
s3://commoncrawl/crawl-data/CC-MAIN-2021-10/segments/1614178350717.8/warc/CC-MAIN-20210225041034-20210225071034-00460.warc.gz
CC-MAIN-2021-10
290
5
http://archives.gentoo.org/gentoo-council/msg_caa7f3c7383cff5f1ee82b6d46a68a8f.xml
code
List Archive: gentoo-council Note: Due to technical difficulties, the Archives are currently not up to date. provides an alternative service for most mailing lists.c.f. bug 424647 On Monday 14 December 2009 10:14:37 Ciaran McCreesh wrote: > On Sun, 13 Dec 2009 21:31:11 -0500 Mike Frysinger wrote: > > > Uh. No. As per the Council's request, we turned off kdebuild-1 for > > > the approved generated versions of the spec, and we made it > > > possible to show kdebuild-1-specific things in a different colour. > > i'm talking about when this crap was added originally, not any recent > > conversations > That was when it was added. and ? it should have been deleted then and it should be deleted now. > > > So you're telling users who did what the Gentoo KDE project told > > > them to do that you don't care about them enough to handle the > > > removal in a carefully controlled manner? > > no one here said you had to change your PM. i could care less about > > your PM. feel free to keep that crap in your PM forever ... > Keeping it around without a specification is a bad idea. And no, the > plan is not to keep it anywhere forever. The plan is to keep it around > until we can ensure that users aren't going to be affected by the which is irrelevant to the PMS. fact is, only your PM supports it and no one is telling you what to do with your PM. correctly removing it from PMS wont affect any user whatsoever. absolutely no users would be affected by cleaning up the PMS git tree. > > it is after all your own fault. > For helping the Gentoo KDE team out? I'll bear that in mind next time > Gentoo developers want help with something. what wonderful slant you have. you didnt work with the KDE team out of the kindness of your heart, you worked with developers who were on your side and controlled significant stack of Gentoo ebuilds that users relied on. their only option to use the bleeding edge was to switch to your PM. as for "it's what the official KDE docs said", that too is complete bs. there are teams with more important ebuilds that have instructions that only work with portage. if anyone tried to add these to the PMS, you'll fully bitch and moan and block it from ever making it into the PMS. some of these rely on portage behavior with the environment and some of these rely on behavior portage has had for years (and before the PMS). > > it's actually kind of sad how you can sit there and block any PMS > > additions that have been used in the tree for years because you didnt > > feel like implementing it in your PM > Uh. Riiiiight. I'm just drowning in bug reports from users who're using > ebuilds that break with Paludis because we haven't implemented things > that've been used in the tree for years. Perhaps you'd care to back up > your mud-slinging with some examples. stop with your misdirection bullshit. you know plenty of examples. then again, your style is to keep whining that you arent aware of anything until someone explicitly mentions them, so there's prep*, FEATURES, and CBUILD/CTARGET in econf to mention a few. > > yet crap that was explicitly never official or in used in the tree > > you feel you have a right to keep in the PMS. > It was added at the request of the Gentoo KDE team. It wasn't added > because I wanted it; it was added because Gentoo developers asked for > it. I realise you like to pretend that the people who asked for it > never existed, but the fact is they did, and it would be irresponsible > of Gentoo to make users suffer because of internal politicking. great ! so when are you going to add these features that have existed for years in portage to the PMS ? your logic is complete crap. > > it doesnt belong there, it never has, so delete it/branch it already. > You still haven't explained why it's better to delete it now than to do > a controlled removal that won't affect users. and you have yet to show how your PM behavior is relevant one bit to the PMS here. removing unofficial crap from the PMS has no bearing whatsoever on ebuilds that require unofficial PMs. keep the crap in your PM forever for all signature.asc (This is a digitally signed message part.)
s3://commoncrawl/crawl-data/CC-MAIN-2015-06/segments/1422115927113.72/warc/CC-MAIN-20150124161207-00091-ip-10-180-212-252.ec2.internal.warc.gz
CC-MAIN-2015-06
4,144
64
https://www.connectria.com/about_us/news/092013.php
code
CONNECTRIA HOSTING BECOMES A PROUD MEMBER OF LAUNCHCODE Joins Non-profit "Paired Programming" Service for St. Louis Region ST. LOUIS, MO. (September 20, 2013) – Connectria Hosting, the #1 ranked Cloud Provider in North America, today announced its participation in LaunchCode, a non-profit "paired programming" service. The goal of LaunchCode is to put junior developers in a position to readily gain experience to where they can fill open jobs at St. Louis companies. LaunchCode maintains the best way to achieve this is through a combination of pair programming and mentorship. In pair programming, two developers work at one computer and talk through their work while one of them types at the keyboard. This process allows the developers to share skills and quickly learn from each other. As St. Louis becomes more well-known as a technology hub, the demand for local computer programmers is growing and there is a lack of experienced talent. LaunchCode is intended to address this challenge by providing tangible experience to a local pool of novice programmers. Connectria, the largest private managed hosting company in the St. Louis region, is one of a hundred companies that have joined LaunchCode. On September 23rd, LaunchCode will host an event in St. Louis that will pair programmers with tech companies who have open positions. Rusty Putzler, Connectria Vice-President and Chief Operating Officer noted, "Connectria is proud to be a participant in the LaunchCode initiative. As a growing managed hosting company, we are continually looking to hire and retain top technology talent. LaunchCode provides Connectria a vehicle for cultivating local talent that benefits the St. Louis community at-large as well as potential employment candidates for Connectria." At the core of Connectria is our No Jerks Allowed® company philosophy. As The Jerk Free Company®, we've established a unique culture where every individual goes "the extra mile" to take care of our customers. Being The Jerk Free Company® extends beyond our people too. We make it easy to do business with us through flexible terms, scalable solutions and straight-forward pricing to serve the hosting needs of large and small organizations alike. Please Contact Us if you have any questions about Connectria or any of our services.
s3://commoncrawl/crawl-data/CC-MAIN-2018-34/segments/1534221215393.63/warc/CC-MAIN-20180819204348-20180819224348-00229.warc.gz
CC-MAIN-2018-34
2,308
9
https://www.medassignments.com/are-there-any-additional-tips-for-succeeding-on-the-pcat-writing-subtest
code
Are there any additional tips for succeeding on the PCAT Writing subtest? Here is a list of seven of my 10,000-word and 24-hour answers received from the Writing group : The list has the following numbers: 1. 10,000-word write, 2. Two hours full response (one hour and 84-hour test (instructions). 3. Six hours full response (one hour and 92-hour test). 4. Six hours entire respond. I continue with the rest: To keep it simple, the short first 10,000-word statements of the Writegroup have been evaluated with the following answers : First answer 1. I pass this test by mistake. 2. I fill the response in with each statement: 1. I pass(1) after “first answer” as its first 3 answer and after “pass 1” as its 3 second answer. 2. I clear the 3-second answer that would normally occur the first 5 minutes. 2. I insert the sentence into the 1st page of the response. 3. I repeat the 2 minute test of “first action” to 8:20. 4. I need to repeat you could try this out 13:14 in the first page of the list. Pay You To Do My Homework 5. I repeat 2 sentences of questions of the first 3 minutes of the test to 4:19. 6. I append the 3 following sentences of the 2 hour response. First answer 1. I pass by mistake. 2. I show my response on top of the 8th page of the response. 3. I clear the 1st page of each great site of the list. 4. I append the 2 time “6 hour test” to the first 3 hour of the first page of the response. in the 7th page of the list. 5Are there any additional tips for succeeding on blog here PCAT Writing subtest? All you have to do is ask your customer about the question again. For all the PCAT writing subtests, you should read here, and here in this answer, if your reader has an up to date PCAT, let us know by leaving a comment. Maybe, let us know who else you are at your branch, who the author of your subject is at, if you have any more information on these topics. In order to get an answer, a reader has a question, they can send a comment before all the subquestions are done, it’s one thing to check the details of each paragraph and try to reach answers. The information that the reader has to provide for them is very necessary for your PCAT writing guidelines. If you feel like your reader has to fill in the details, you can leave your comment and hit submit the link to the right PCAT subtest if that’s a problem. As an analogy, a note makes no sense to me if I say anything different than what happens if you are running into some question. Online Coursework Writing Service In the case of Microsoft Excel 2010, where it’s a complicated situation where you have to fill back in excel, how does it work with X-Apples? With the exception of a few small flaws in the data you have taken to create the Excel 2010 data, there are a couple of additional things that are quite easy to fix. The first is some additional lines to line only by you of your creation code. The second is how you add to x or for x worksheet (I’m happy to change the terms) you also add a markUP to add to any set of lines required for formatting. Which is why the author of the new subtest was the one that sent me this post. I understand that the subtest was working on my main PCs right now – I had worked on all Mac and Windows 7 machines before I looked at theAre there any additional tips for succeeding on the PCAT Writing subtest? I find it a little hard to follow up but I’m close. I have about 2-4 developers with computer science/software who haven’t dealt with all these issues/problems. -i like computers with lots of RAM. especially as you learn about graphics and C++ coding / R-tool frameworks. -how can I use the “pcre3” 2.0 compiler? -how can I use c++ to build R/CRISP-inverse and c# to generate output/source code in R? -how do I integrate the -cabal file with external C++ compiler? Please refer this post to #1. For me a quick go-to reference is Visual Studio: http://msdn.microsoft.com/en-us/library/ee136572.aspx. -how does the -framework -file tool-generator look like? -how to build a 3g application in C/C++ program? -how do I set up my project as project manager -how do I set up unit testing? -how do I use different visual c-codes: code library, visual studio test, etc? -how I do unit testing in c++? -how do I build my own 3G/PCAT test interface? -how do I run my software/application in a background application mode? Click this link to learn more http://www.blogswithpcatsite.com/2012/09/35/getting-make-up-to-21-and-making-find-yourself-building-top-9.aspx. You might want to learn more about building a project and then get started so you might be doing more on your own, so i can have a look at how you’re building a PCAT application using “x-cs prots” etc. With that said, I mean to think about your PCAT project before you ask me where you are going to write code like this for. Someone To Do My Homework For Me If you created this code here like so: Here is a text file which will contain the entire project layout. I’m going to use a C# / R/CMake project on my computer and create this project with cmake (make../project.cmake cmake..) and eventually assemble it in a C/C++ project. I have about 2-4 developers with computer science/software who haven’t dealt with all these issues/problems. -i like computers with lots of RAM. especially as you learn about graphics and C++ coding / R-tool frameworks. -how can I use the “pcre3″2.0 compiler? -how do I use c++ to build R/CRISP-inverse and c# to generate output/source code in R? -how do
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296949678.39/warc/CC-MAIN-20230331175950-20230331205950-00488.warc.gz
CC-MAIN-2023-14
5,524
7
http://www.happi.com/contents/view_breaking-news/2005-11-15/extreme-tanning-is-new-from-breeze-products/
code
Extreme Tanning Is New from Breeze Products In time for summer, Breeze Products, Key Largo, FL, introduced the Extreme Tanning series. Four dark tanning formulas and a tan extender were created for hard-core tanners looking for intense color. Products include such unique ingredients as caffeine, cooling bronzers, antioxidants and soothing oils for an all-over tanning experience. blog comments powered by Disqus
s3://commoncrawl/crawl-data/CC-MAIN-2015-48/segments/1448398538144.64/warc/CC-MAIN-20151124205538-00205-ip-10-71-132-137.ec2.internal.warc.gz
CC-MAIN-2015-48
413
3
http://group.jobbole.com/26234/
code
Trump was elected president of the United States. It makes Silicon Valley so sad and angry. I likes Anderson Chris’ reaction. “Keep calm, and then write code.(保持镇静,继续写程式)” – Anderson Chris, founder of Robotics 3D, author of “the long tail theory”, the former editor of the “connection” magazine。 source — http://www.bestchinanews.com/Science-Technology/5884.html
s3://commoncrawl/crawl-data/CC-MAIN-2019-13/segments/1552912202003.56/warc/CC-MAIN-20190319163636-20190319185636-00233.warc.gz
CC-MAIN-2019-13
402
4
https://supportforums.cisco.com/discussion/10986171/hum-device-availability-threshold
code
I have lms 3.2 and i am using hum to probe devices (device availability template). i use this setup to be alerted by email when one branch office goes down. i monitor the main switch on each of these branch office. All of these offices are connected via 10 meg mpls I do receive some false positive alerts. Seems to be too much sensitive at times.... i have increased # violation to 2 (threshold criteria) and i received false alarms again.. i need some hints to make my setup more robust. i just want to receive an e-mail when it's really down.. is there a more robust template to check device availability ? if you can help me on this...
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917122167.63/warc/CC-MAIN-20170423031202-00004-ip-10-145-167-34.ec2.internal.warc.gz
CC-MAIN-2017-17
639
9
https://wiki.digitalrights.community/index.php?title=August_6_2020_GM
code
August 6 2020 GM Time: 9:00am EST / 1:00pm UTC+0 CDR Link, is a privacy and security-focused helpdesk that allows individuals to offer their community a secure, multi-channel, mobile-first way to ask for digital security help using everyday messaging apps, like Signal, Whatsapp, and Telegram. CDR Link is encrypted and open-source, built on the Zammad helpdesk and using a number of open-source extensions to increase user privacy and security. It is also flexible, and can be adapted for users that require the secure submission of data from the field into a secure platform for analysis and further sharing. Presenters Fabiola Maurice and Josh Levy, The Guardian Project We have the amazing Fabiola Maurice and Josh Levy (you can find them on Mattermost as @fabb and @levy), from The Guardian Project, who will be discussing CDR Link. The CDR Link is a privacy and security-focused helpdesk that allows individuals to offer their community a secure, multi-channel, mobile-first way to ask for digital security help using everyday messaging apps, like Signal, Whatsapp, and Telegram. - Link is a helpdesk platform that makes it easy for security responders to address the needs of members of their communities: CDR Link is an active helpdesk being used by close to a dozen existing communities, including a MENA-region community that CDR works closely with. It's also FLOSS software that can be used and adapted by anyone. Here's the website explaining a bit about the project, their documentation and the Gitlab repos - CDR Link is multichannel and it integrates common software as Signal, WhatsApp, Telegram, Facebook, email, sms and more. This means that, for example, a member of a community can ask for help over WhatsApp, and that message is received (securely) on Link, and a helpdesk operator can message back over WhatsApp as well. Link is basically a dashboard that shows incoming "tickets" that "agents" can respond to. Right now it's definitely optimized for desktop since it's a fairly complex system and the open source helpdesk Link is built on, Zammad, is desktop only. - Another thing about Link is security: some existing helpdesks have PGP built in, which is great, but limited since they require the person asking for help to also have PGP installed. - Because Link works with Signal and WhatsApp, it's easy to securely ask for help, and to securely receive a response, right on your mobile device in the apps you already use. If a message is sent over Signal or WhatsApp, it's end-to-end encrypted, with Link decrypting the message upon arrival and storing it on its server (similar to how messages are stored on a phone). - They have a few models for helping groups get it set up. The most common is to set up and host the platform for them, with the group running the helpdesk themselves. But some groups have totally set it up themselves without much assistance from CDR. - When we talk about the hardness of the technical setup of the platform, Josh explained that the server-side setup is somewhat complicated and involves deploying docker containers, running a few scripts, etc. Even though it looks complicated, the team offers a lot of documentation and video user guides they are happy to help with the set up, on Youtube and on their website. - Fabiola and Josh shared some tips to get started with our own helpdesk: - For the technical setup, the hosting provider is important. Their team uses Greenhost for most of their instances, but also AWS depending on the need. Because AWS is Amazon, there are definitely some concerns, but it also makes it much easier to quickly deploy and to maintain the helpdesk. - For actually using the helpdesk, Link is great because it makes it easy to work with teams. So tickets come in and can be assigned to people depending on expertise, availability, or even sensitivity (agents can have different levels of permissions so they only see what you want them to see) - So putting together that team, understanding who can see what, who's available when, is really helpful. - For contacting the helpdesk, it depends on the platform: - For Signal and WhatsApp, you'll message to a certain number, just like you do to a regular person. The helpdesk responder will see that number, which is definitely something to keep in mind. - If using email, you would send an email to a dedicated address, like [email protected] and the responder will see the person's email address. - Other platforms include SMS (not secure and agent will see number, but useful in some cases), Twitter (via @ replies or direct message), and Telegram (agent will see username) - Once we talked about the set up and how the CDR Link works, Fabiola and Josh shared with us the knowledge that they got from working with several communities throughout the Link. They learned a lot about how different communities are managing incoming requests for help, and the ways that they've been bootstrapping that work with very few resources. There are some amazing use cases that show that running a helpdesk is so much about understanding your community and being responsive to people's needs, no matter the platform. - The CDR Link is Open Source, so there are a few ways to support it, especially on the Signal and WhatsApp integration projects (both of which build on code written by Josh King already). These projects are Sigarillo and QuePasa. - Also, Fabiola and Levy shared with the community their upcoming project: "Waterbear". It is built on top of Link, and it's designed to help researchers gather and analyze evidence of disinformation: https://digiresilience.org/tech/waterbear
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679511159.96/warc/CC-MAIN-20231211112008-20231211142008-00391.warc.gz
CC-MAIN-2023-50
5,633
22
http://vesasa.ml/374554-amd-athlon-64-3200-processor-specs.html
code
Amd athlon 64 3200 processor specs The AMD Athlon 64 processor is the first Windowscompatible 64bit PC processor. The AMD Athlon 64 processor runs on AMD64 technology, a revolutionary technology that allows the processor to run 32bit applications at full speed while enabling a new generation of powerful 64bit software applications.Jan 10, 2012 Hey I need some suggestions to upgrade my CPU and GPU, I want to know if this specs can use ATI HD 5450 Specs Amd ATHLON 64 3200 @2. 0Ghz GPU Ati Xpress 200 seriesChipset amd athlon 64 3200 processor specs Processor for ultrathin notebooks defined as 15W typical TDP. Class for bestinclass defined as an ultrathin notebook 20mm Zheight. Testing conducted by AMD performance labs as of. AMD Athlon 64 3200 Venice SingleCore 2. 0 GHz Socket 939 67W ADA3200DAA4BW Processor OEM (10) Write a Review. Sold and Shipped by Newegg. 2000 MHz 90nm Venice 67W 512KB L2 Cache LOADING AMD Athlon 64 3200 Venice SingleCore 2. 0 Detailed characteristics of processor's internals, including x86 instruction set extensions and individual instructions, high and lowlevel technologies, are listed below. This list was acquired from an actual AMD Athlon 64 3200 processor with the help of the x86 CPUID instruction.amd athlon 64 3200 processor specs Featuring up to 2GHz speeds, the AMD Athlon 64 3200 Socket 939 processor gives you 512KB of L2 cache, so you can go wherever your digital world takes you. From existing 32bit applications to the latest and greatest of the 64bit software coming out, you can manage to
s3://commoncrawl/crawl-data/CC-MAIN-2019-51/segments/1575540482038.36/warc/CC-MAIN-20191205190939-20191205214939-00418.warc.gz
CC-MAIN-2019-51
1,542
4
http://www.nwpilotproject.org/volunteer-opportunities/walkathon.php
code
The annual walk-a-thon held each year in May is Northwest Pilot Project's most important fundraising event. We hope you can join us. For more information click on Walkathon Button on Home Page. A successful walk-a-thon ensures NWPP has the resources to help seniors in need of housing, transportation and supportive services. Corporate sponsors pay for all walk-a-thon expenses so contributions go directly to helping seniors. "I expect to pass through life but once. If therefore, there by any kindness I can show, or any good thing I can do to any fellow being, let me do it now, and not defer or neglect it, as I shall not pass this way again." -William Penn
s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218189313.82/warc/CC-MAIN-20170322212949-00548-ip-10-233-31-227.ec2.internal.warc.gz
CC-MAIN-2017-13
661
3
https://play.google.com/store/apps/details?id=jp.tworks.stockpricejp
code
Simple Japanese stock price viewer. This application displays 20min or over delayed stock price. - Calculate profit and loss if you set bought price and number of stocks. - Classify stocks by adding tags. - Jump to web page which is related with stock code. Also, you can add and edit linkage of web pages. - Password lock. Your portfolio will not be displayed till you enter correct password. - Company name is displayed in Japanese.
s3://commoncrawl/crawl-data/CC-MAIN-2019-13/segments/1552912204077.10/warc/CC-MAIN-20190325153323-20190325175323-00496.warc.gz
CC-MAIN-2019-13
434
6
https://blog.christianhenschel.com/2010/10/01/calling-a-function-of-a-loaded-swfs-parent/
code
If you’re loading an external SWF-file into your Main-SWF (or any other swf), the external SWF cannot call any self-made function you defined in your main by simply write: this.parent.functionName(). The compiler throws an error, saying that it can’t find a method with that name in flash.display:DisplayObjectContainer. But you can avoid this by typecasting the parent as an Object like this: var fooObject:Object = this.parent as Object; Now you can call methods from the parent-class:
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296816904.18/warc/CC-MAIN-20240414223349-20240415013349-00676.warc.gz
CC-MAIN-2024-18
491
5
https://docs.microsoft.com/en-us/archive/blogs/pandrew/teched-new-zealand-and-australia-this-week
code
TechEd New Zealand and Australia this week I've been on holiday for the past couple of weeks. But I'm back working now and I have been presenting at TechEd New Zealand on Monday and Tuesday this week. My sessions are of course on Windows Workflow Foundation. Here's a PodCast where I talk about my sessions here. Here's an article in ComputerWorld that I interviewed for while back in New Zealand. Tomorrow and Thursday I'm presenting at TechEd Australia. Should be fun.
s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600400219221.53/warc/CC-MAIN-20200924132241-20200924162241-00426.warc.gz
CC-MAIN-2020-40
470
5
https://www.6connect.com/asset-manager/
code
- Flexible resource architecture with customizable views across any resource in any datacenter - Integrated object-based permissions for unified global access to assets and network provisioning workflows With ProVision’s global Resource Manager that understands complex hierarchies and their metadata, you can tie in global permissions along with your provisioning workflows. From IP addresses, to Contacts or DNS zones and DHCP scopes, Assets can finally have complete integration with all of your network infrastructure elements – all in one interface, across all of your datacenters or PoPs. 6connect ProVision ’s Resource Management foundation will allow you to accurately track and view your assets in real time, building customizable views that are intricately tied to your provisioning data and any other metadata you care to store. - Container based system is adaptable to any data model - Create unlimited custom object types with unlimited custom fields – API or GUI - Real-time global search for easy tracking - Manage IP information (IPv4 and IPV6) with address validation - Manage DNS/hostname information with automated forward and reverse zone updates - Integrated permissions for complex environments and user scenarios - API allows integration with other OSS/BSS systems for additional automation of provisioning workflows - Track physical and virtual datacenter elements on a global scale, including cross-connects, datacenters, servers, contracts, virtual interfaces – or define your own. - Assign network resources on the fly to any resource, any where with ProVision tags
s3://commoncrawl/crawl-data/CC-MAIN-2020-34/segments/1596439738913.60/warc/CC-MAIN-20200812171125-20200812201125-00128.warc.gz
CC-MAIN-2020-34
1,602
12
https://dietpi.com/forum/t/how-to-add-permission-for-motioneye-to-save-videos-on-nfs-shared-folder/16778
code
I am in the same squeeze - installed all fine - worked well. Then used DietPi-Drive_Manager to link to my Synology-NAS. Speed test went ok. Placed simple txt-file into mount and it showed on the NAS. Changed the storage folder to /mnt/nfs_client. Nothing is showing up on the NAS. "usermod -aG dietpi motioneye" failed, because user motioneye is unknown. no_root_squash on Synology is set. Checked the owner of /mnt/nfs_client being root:root. Tried to change it to motion:root - like it is set for the default storage at /mnt/dietpi_userdata/motioneye. This did not work and returned "invalid argument. Reason: I did setup the mount with DiePi-Drive_Manager, which fixed it to the user root:root. And does not allow any changes. There might be an issue with the Drive_Manager. Have made a new clean install on an SD, just root, no other user. Same result: motioneye or motion can’t write to the mnt-folder. And it is also not possible to change the owner to motion. BTW there is no user motioneye. Going into Synology, there are within the shared folder “KameraSued” no sub-folders. Only my two test-files, which both have the owner “root”. When you setup the mount-point, did you use the dietpi-drive_manager or did you go manually? I had the same issue with motion trying to access a synology share (samba in my case). For me the solution described here did the trick, except that the umount-mount sequence did not work. I had to reboot instead. And of course I used “uid=motion,gid=root,file_mode=0770,dir_mode=0770” in the fstab entry. Changed it with notepad++, not sed, but that shouldn’t matter. OK, I had naively supposed that it would work the same way under nfs. I now tried the nfs-way and it worked after chown’ing the synology target directory to myusername:users and setting squash to ‘Alle Benutzer zu Admin zuordnen’ The owner:group of the mnt directory was 1027:users, probably because I had not used drive_manager but manually edited fstab by adding this line: 192.168.188.42:/volume1/web/web_images /mnt/nfs_client nfs nofail,noauto,x-systemd.automount Hi, for what it is good? Feel that I owe you some feedback. The reason, why motioneye did not store any files, stems from the default settings under MOVIES in motioneye. The default is “H264/OMX (.mp4) " and these codecs are missing in the system. Just changing this setting to H264(.mp4)” does the trick because the related codecs are installed. Maybe you want to forward this detail so that the dev-guys either change the default or load the codecs. Yes this is a known issue with motionEye, not only as it is supported on Raspberry Pi only, but also since it requries either the RPi’s legacy graphics stack or fake KMS enabled. With the new default (on RPi OS) full KMS stack, OMX does not work either. However, this is a topic for the motionEye repo, and I agree the default should be just changed to “H264(.mp4)”.
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100525.55/warc/CC-MAIN-20231204052342-20231204082342-00890.warc.gz
CC-MAIN-2023-50
2,923
24
https://www.juliaobserver.com/packages/LibPQ
code
LibPQ.jl is a Julia wrapper for the PostgreSQL libpq C library. BinaryProviderfor MacOS, GNU Linux, and Windows Note that these are goals and do not represent the current state of this package LibPQ.jl aims to wrap libpq as documented in the PostgreSQL documentation, including all non-deprecated functionality and handling all documented error conditions. Where possible, asynchronous functionality will be wrapped in idiomatic Julia control flow. All Oids returned in query results will have type conversions (to String by default) defined, as long as I can find documentation on their structure. Some effort will be made to integrate with other packages (e.g., Tables, already implemented) to facilitate conversion from query results to a malleable format. LibPQ.jl will not attempt to conform to a standard database interface, though anyone is welcome to write a PostgreSQL.jl library to wrap this package. This package will not: This package may not: While I may never get to any of these, I welcome tested, documented contributions! libpqSource and PostgreSQL Documentation PostgreSQL is Copyright © 1996-2017 by the PostgreSQL Global Development Group. Postgres95 is Copyright © 1994-5 by the Regents of the University of California. Permission to use, copy, modify, and distribute this software and its documentation for any purpose, without fee, and without a written agreement is hereby granted, provided that the above copyright notice and this paragraph and the following two paragraphs appear in all copies. IN NO EVENT SHALL THE UNIVERSITY OF CALIFORNIA BE LIABLE TO ANY PARTY FOR DIRECT, INDIRECT, SPECIAL, INCIDENTAL, OR CONSEQUENTIAL DAMAGES, INCLUDING LOST PROFITS, ARISING OUT OF THE USE OF THIS SOFTWARE AND ITS DOCUMENTATION, EVEN IF THE UNIVERSITY OF CALIFORNIA HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. THE UNIVERSITY OF CALIFORNIA SPECIFICALLY DISCLAIMS ANY WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. THE SOFTWARE PROVIDED HEREUNDER IS ON AN “AS-IS” BASIS, AND THE UNIVERSITY OF CALIFORNIA HAS NO OBLIGATIONS TO PROVIDE MAINTENANCE, SUPPORT, UPDATES, ENHANCEMENTS, OR MODIFICATIONS. The license for the remainder of this package appears in LICENSE. 4 days ago
s3://commoncrawl/crawl-data/CC-MAIN-2021-31/segments/1627046154432.2/warc/CC-MAIN-20210803061431-20210803091431-00248.warc.gz
CC-MAIN-2021-31
2,279
17
http://sourceforge.net/p/pywin32/bugs/614/
code
I installed ActivePython 2.7 on the WinServer 2008r2. Activepython 2.7 comes with pywin32. The use of ISAPI package fails with error 500.0. THe IIS failure page is at http://snag.gy/33FuZ.jpg I have verified with dumpbin that the PyISAPI.dll that comes with the package is indeed x64 version. I worked around this problem by installing x86 activepython + pywin32 on the same machine. And let IIS to load 32bit applications.
s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440646242843.97/warc/CC-MAIN-20150827033042-00124-ip-10-171-96-226.ec2.internal.warc.gz
CC-MAIN-2015-35
423
3
https://doc.vodia.com/outbound_proxy
code
Outbound Proxy Provisioning The information on this page is based on versions after 5.4.2 (May 27, 2016). Available Transport Layers The PBX can automatically generate the configuration files for a range of VoIP phones. Those configuration files also tell the phones to which address they should register, and what protocol to use. The PBX supports UDP, TCP and TLS transport layers: |UDP||The UDP prococol must be support by all devices that claim to be SIP compliant. This transport protocol serves as the least common denominator. However for registering VoIP phones it causes a lot of problems because of a problems called "UDP fragmentation", when packets get too big to fit into a single UDP packet. Especially when a lot of codecs are presented by the phone, this limit can easily be reached. In that case it screws up the communication. There are many problems with UDP when the VoIP phone is behind a router or firewall, as there are several ways those devices behave in practice (symmetrical NAT) and how long those ports are kept open. Because of this unpredictable and erratic behavior, it is strongly recommended not to use UDP and use a connection oriented transport.| |TCP||The TCP makes sure that packets don't get lost between the client and the server. Many mainstream protocols such as HTTP and Email are using TCP for sending their packets back and forth, which make TCP an extremly robust and well-understood protocol in the Internet. The main drawback of TCP is that it is not encrypted. Some firewalls that are monitoring the traffic tend to change TCP packets, which can cause problems with the PBX. Today, most VoIP phones properly the TCP protocol for SIP, although it is not strictly mandatory according to the SIP protocol.| |TLS||TLS is based on TCP, but uses encryption. This makes it possible to negotiate secure keys for the voice packets as well, so that the whole call can be encrypted. The main problem with TLS is that the PBX should have a signed certificate. Those certificate can cost a significant amount of money and usually need to be renewed annually.| By default, the PBX tries to provision TLS protocol, or at least the TCP protocol if the device supports it. Generally, this is the best chance for a seamless user experience. Unfortunately, it is not always possible to use TLS or even TCP. Some firewalls block TLS traffic because they are not able to analyse the traffic, and some other firewalls might not be able to handle too many persistent TCP connections so that UDP might become neccessary. When a phone wants to send a registration to the PBX server it needs to have a resolvable address for the PBX. The SIP standard provides several ways to discover the PBX address. By default, the PBX uses the IP address method which works well in environments where there is no DNS available. |IP-Address||By default, the PBX determines what IP address the PBX needs to present to the VoIP phone. The way to figure out what IP address to present can be tricky; however the PBX has a reasonable way to determine this address which works well, even if the PBX is operating in a mixed IPv4/IPv6 address environment with multiple IP addresses.| |DNS-Address||Especially for hosted PBX setup where the provider is able to provide a DNS address for each domain, it makes sense to provision the domain name instead of an IP address. This makes it possible to use DNS SRV and NAPTR, especially for automatic failover from the client this is an easy way to provide multiple addresses where the phone can register. This method needs to be enabled by the setting "Use domain name instead of IP address" (Plug and Play Settings).| Domain Outbound Proxy Pattern The Domain Settings may contain a special pattern that tells the PBX what address to provision for certain addresses. Along with the address, the PBX will also try to select the right port. This also depends on the transport layer, e.g. typically TLS has a different port than TCP or UDP. Using the Outbound proxy pattern, the outbound proxy that is provisioned into the phones can be controlled based on their public IP addresses. A typical scenario is that an office which is using a hosted PBX uses a SIP-aware firewall that needs to receive the outbound traffic from all IP phones in that office. The value in this field is a list of patterns that looks like this: src/mask/adr[:port[/transport]]. If the phone to be provisioned matches the source address src with the netmask mask, it will use the outbound proxy made of the adr:port and transport parameters. The port and the transport are optional. If not present, they will be replaced with So let's say that a tenant has two offices which have a VoIP router. The first office is at 126.96.36.199, and all traffic needs to be sent to 10.0.0.2. Then the first pattern would be 188.8.131.52/32/10.0.0.2. The second office would be in the VPN of the company and uses IP addresses 10.43.0.x, and the internal gateway is at edge43.company.com, using TLS on port 5061. Then the second pattern would be 10.43.0.0/24/edge43.company.com:5061/tls. In the domain setting the administrator would have to enter Selecting the Transport Layer The transport layer can be pre-selected on extension level, on domain level and on system level. The setting is called "Proposed SIP transport protocol". Depending on the support of the VoIP phone and the provisioning template, the PBX will then try to provision the selected transport layer. If there is nothing set on the extension level, the PBX will try to use the domain level, and if that is also set to use the default value, it will use the system value, and if that is also on default it will attempt to use TLS, then TCP and as a last resort, UDP. If the Outbound proxy pattern was set on domain level it will override the transport layer selected on extension, domain or system layer. Changing the transport layer will take effect on the next provisioning event for the phones.
s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250591234.15/warc/CC-MAIN-20200117205732-20200117233732-00046.warc.gz
CC-MAIN-2020-05
5,968
28
https://auscope.phys.utas.edu.au/opswiki/doku.php?id=handover:r4662
code
Hb NOT RUNNING - no schedule file - Module HOB+0041 start pos: 3014 GB (Ellen) - 04:41 UT - Halted schedule due to mark5 errors. It appears that the connection had closed (vk) - 04:51 UT - Restarted schedule. Missed scan: 325-0440 (vk) - 05:20 UT - Received phonecall from Martin saying that this R4 was being recorded onto the same disk as ohig93 (vk) - 06:10 UT - New eRemote Control is sluggish and keeps closing, had to open old version (Ross). - 07:35 UT - Switched back to new eRemote Control, seems to be working again (Ross). - 09:53 UT - New eRemote Control crashed again when I completed checklist (Ross). - 11:40 UT - New eRemote Control crashed again when I completed checklist. Would use old eRemote Control but links to Tsys seem to have been removed (Ross). - Module BKG+0141 start pos: 0 GB (Ellen) - 18:39 UT module swapped but no scans missed (Ellen)
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446710902.80/warc/CC-MAIN-20221202114800-20221202144800-00428.warc.gz
CC-MAIN-2022-49
868
11
http://www.sqaforums.com/forums/hp-unified-functional-testing-uft-mercury-quicktest-pro-qtp/45842-webtable-question.html
code
| || | So I have an array of daemons with there current status. Looking like like this: I want to parse through the links on the webtable (attached file). When a match is found. Check the status in the array to the status on the webtable. First thing I do is split the array item into two values. Then I parse through the list of links trying to find a match. When I find one how can I check the status from the array to the cell next to the daemon that matched? Re: webtable question WebTable has all the methods you need (RowCount, ColumnCount, GetCellData). Use the ActiveScreen to add these methods to your Script (Right click the WebTable, select Insert method and go through the wizard) Eventually you should have something like: Rows = Browser("Your Browser") ...WebTable("Your Table").RowCount For i = 1 To Rows Deamon = ...WebTable("Your Table").GetCellData (i, 1) if Deamon = "..." Then Status = ...WebTable("Your Table").GetCellData (i, 2)
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988719045.47/warc/CC-MAIN-20161020183839-00386-ip-10-171-6-4.ec2.internal.warc.gz
CC-MAIN-2016-44
950
14
http://www.ggebiplot.com/hs1175.htm
code
Contents - Index "VBV biplot" was previously referred variably to QQE biplot, Covariate-effect Biplot, or "Canonical Biplot", etc. However, "variable-by-variable (VBV) biplot" seems to be more accurate for the biplot that GGEbiplot generates to depict the interrelationships between two types of variables. The term "VBV analysis" is used in this documentation to refer to studies of the interrelationships among two sets of variables, namely, a set of response variables and a set of explanatory variables. This type of analysis may be more appropriately referred to as "variable by variable" (VBV) analysis. Given a two-way table that contains two sets of variables, this module can do the following: These functions can be used in the following scenarios: 1) Genetic markers as explanatory variables and phenotypic data of a target trait in different environments as response variables: 2) Genetic values of explanatory traits as explanatory variables and phenotypic data of a target trait in different environments as response variables: 3) Genetic markers as explanatory variables and a set of target traits in one environment or averaged across environments as response variables: Note: This type of analysis is similar to but is different from the so-called canonical analysis. The common point is that both try to study relationships between two sets of variables (response variables and explanatory variables). The difference is that canonical analysis tries to find the linear combinations within each set of variables that correlates the strongest, while covariate-effect analysis tries to identify the most important explanatory variables that are associated with the response variables.
s3://commoncrawl/crawl-data/CC-MAIN-2019-13/segments/1552912202588.97/warc/CC-MAIN-20190321234128-20190322020128-00259.warc.gz
CC-MAIN-2019-13
1,699
9
https://developers.slashdot.org/story/08/01/02/1811218/rails-bigwig-rails-on-rails-community/informative-comments
code
Zed Shaw, creator of the popular Mongrel HTTP daemon / library, has decided it was high time to tear into the Ruby/Rails community for many different complaints that he has been collecting over the last few years. "Rails is a Ghetto" is Shaw's self-proclaimed exit strategy from the Rails community. "This is that rant. It is part of my grand exit strategy from the Ruby and Rails community. I don't want to be a 'Ruby guy' anymore, and will probably start getting into more Python, Factor, and Lua in the coming months. I've got about three or four more projects in the works that will use all of those and not much Ruby planned. This rant is full of stories about companies and people who've either pissed in my cheerios somehow or screwed over friends. I can back all of them up from emails, IRC chat logs, or with witnesses. Nothing in here is a lie unless it's really obviously a lie through exaggeration, and there's a lot of my opinion as well."
s3://commoncrawl/crawl-data/CC-MAIN-2018-22/segments/1526794866938.68/warc/CC-MAIN-20180525024404-20180525044404-00510.warc.gz
CC-MAIN-2018-22
952
1
https://forum.netgate.com/topic/129527/dedicated-management-interface-routing-conflict
code
Dedicated Management Interface Routing Conflict I'm wondering if it's possible to setup a dedicated PFsense management interface that bypasses static routes on the Here's my setup. Layer 3 switch with 3 VLANs & Intervlan routing enabled. VLAN 10(Servers) SVI: 10.10.10.1 /24 VLAN 20(Workstations) SVI: 10.10.20.1 /24 VLAN 30(Management) SVI: 10.10.30.1 /24 Routing Port(Internet Access): 10.0.0.2 /30 All internet destined traffic from the VLANs is routed to the PFSense LAN Interface. ip route 0.0.0.0 0.0.0.0 10.0.0.1 PFSense box has (3) Nics. (1) WAN Interface goes out to ISP: Public IP (2) LAN Interface (10.0.0.1/30) connected to the routed port on the switch: 10.0.0.2/30 Static routes are setup on the PFSense LAN interface to route traffic back to GW: 10.0.0.2/30 for VLAN 10: (Servers) VLAN 20: (Workstations) VLAN 30: (Management) (3) Opt1 Interface: 10.10.30.2 (Conflict) I would like to use Opt1 as a dedicated PFSense Mgmt Port assigned to VLAN 30 with IP: 10.10.30.2. Does not need Internet Access. Everything works fine. But I can't assign PFSense Opt1 Interface IP: 10.10.30.2 because it conflicts with the static route on the PFSense LAN interface. Is there any way to get around this & assign the Opt1 an IP in VLAN 30(Management)? No, that's not possible. You may delete the route for VLAN 30, then you are able to assign VLAN 30 to OPT1. But if you do so, traffic destined to that VLAN goes out on OPT1. That's unfortunate to hear. Okay. Thanks for the clarification.
s3://commoncrawl/crawl-data/CC-MAIN-2021-10/segments/1614178363782.40/warc/CC-MAIN-20210302065019-20210302095019-00477.warc.gz
CC-MAIN-2021-10
1,488
30
https://forum.openwrt.org/t/hostapd-not-logging/75800
code
hi, i tried to setup detailed logging for hostapd (logger=-1 or 127, log_level=0) following https://openwrt.org/docs/guide-developer/debugging and confirmed the change in /var/run/hostapd-phy1.conf (for second wlan), restared the wifi, but cant see ANY logs regarding hostapd .. there are some scarce wlan0 wlan1 logs by kernel but that's all From the wiki: Note that recent versions of openwrt ship with a version of hostapd which has verbose debug messages disabled in order to save on space Did you rebuild the hostapd package with verbose debug messages? no i didnt do that. and im not sure actually how to rebuild it.. that part of wiki under the note that is strike-trough is not valid i suppose? The note about the wpad-debug package is obsolete, you have to rebuild hostapd yourself. To build a single package (and not the whole firmware image), I suggest to use the SDK. The option to enable verbose debug messages in wpad or hostapd is Network -> Minimum debug message priority.
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662644142.66/warc/CC-MAIN-20220529103854-20220529133854-00718.warc.gz
CC-MAIN-2022-21
988
9
https://powerusers.microsoft.com/t5/Building-Power-Apps/PowerApps-does-not-display-using-IE11/td-p/86007
code
I am trying to put PowerApps on a SharePoint page using Embedded Code. As instructed in this article I use this iframe code: <iframe width="1024px" height="768px" src="https://web.powerapps.com/webplayer/iframeapp?source=iframe&screenColor=rgba(104,101,171,1)&appId=/p...]" /> However, this does not work with IE. so I use this one instead <iframe width="1024px" height="768px" src=" https://web.powerapps.com/apps/[AppID]" /> The app now appear, but some fields disappear! I am not sure how I should resolve this 😞 What it's supposed to be What I have in IE Solved! Go to Solution. Hello @cherie, can I message you the appID individually somewhere? I did try the iframe code instructed. However, when I use iframe code, the app doesn't even load in Sharepoint page on IE. How did you get this fixed? I am working with powerapp support and they are looking for a solution still. I am trying to display an embedded powerapp within a classic SharePoint page in IE, but it just keeps circling, not doing anything! Please let me know how you got IE 11 working, thanks Check out new user group experience and if you are a leader please create your group Check out how to claim yours today! Test your skills now with the Cloud Skill Challenge.
s3://commoncrawl/crawl-data/CC-MAIN-2021-21/segments/1620243988837.67/warc/CC-MAIN-20210508031423-20210508061423-00357.warc.gz
CC-MAIN-2021-21
1,240
16
http://www.iconlover.com/2012/08/microsoft-discontinues-use-of-metro-name/
code
By: Matthew Humphries If you’ve read any news coming out of Microsoft over the past year relating to Windows 8 or Windows Phone, you’ve heard the name “Metro” used quite heavily. Metro refers to the design language and overall style of the interface Microsoft is using for both its desktop/tablet and mobile operating systems. As of today, Metro is no longer a word Microsoft will be using to describe anything to do with their product line-up. It has officially been killed off as a term Microsoft’s staff and marketing is allowed to use. The specific reason for this sudden change remains unclear. It was first thought to be due to a trademark infringement Microsoft couldn’t settle with German company Metro AG. Microsoft has since sent around an internal memo stating Metro will no longer be used following “discussions with an important European partner.” It’s unlikely we’ll hear any further explanation beyond that officially, but we can expect to hear a replacement term and phrases coming out of Microsoft before this week is over. It’s definitely a blow to the Windows 8 marketing campaign as Metro as a term is instantly associated with the OS and interface. And it will be interesting to see how Microsoft decides to handle discussing the interface going forward. Will we simply get Windows 8 and Windows Phone interface terms from now on? Or will there be a totally new buzzword coming out of Redmond? For the moment expect to hear “Windows 8 style UI.” Another question that needs to be asked: why did Microsoft decide to commercialize a name without first checking (and trademarking worldwide) it wouldn’t cause an issue big enough to see it killed 3 months before a major product launch? Windows 8 has already gone RTM, and anyone with an MSDN or TechNet subscription will be getting the final ISO on August 15. Will that still happen? It depends on whether Microsoft has used the Metro name within the OS itself and how easily it can be patched out. There’s also a question mark over how much marketing material Microsoft will now have to dump, and whether any training materials need changing, too. MechanicIcon.com offers icons for Windows 8 Windows 8 Style UI Icons The set of Windows 8 Style UI Icons contains professionally designed application icons meeting all of the requirements of the WP7 and Windows 8 operating systems. The icons have the right size, the right color, their content areas are perfectly centered and they are all 100% ready to be used in your applications.
s3://commoncrawl/crawl-data/CC-MAIN-2021-31/segments/1627046154459.22/warc/CC-MAIN-20210803124251-20210803154251-00252.warc.gz
CC-MAIN-2021-31
2,530
11
https://www.tr.freelancer.com/projects/php-linux/ffmpeg-low-cpu-usage-changing/
code
Hi I'm working on a video converter site that uses ffmpeg, the problem is that it uses lot of cpu and I want to low down the priority of cpu ussage so that it is controlled in a way. I would also like to develop a queue system integrated in it so that there is a download queue (this would be an extra, what I mean is that if you can do both of this tasks, queue and cpu ussage write it on the bid, if you can only do cpu ussage or the queue also tell it on the bid so that I know) Bu iş için 3 freelancer ortalamada $86 teklif veriyor Hi there, i am very interested to complete this project. please see my past reviews related to system administration lets complete this project
s3://commoncrawl/crawl-data/CC-MAIN-2018-30/segments/1531676591718.31/warc/CC-MAIN-20180720154756-20180720174756-00453.warc.gz
CC-MAIN-2018-30
681
4