url
stringlengths 13
4.35k
| tag
stringclasses 1
value | text
stringlengths 109
628k
| file_path
stringlengths 109
155
| dump
stringclasses 96
values | file_size_in_byte
int64 112
630k
| line_count
int64 1
3.76k
|
---|---|---|---|---|---|---|
https://bangkokherps.wordpress.com/2014/12/01/bicycling-in-pha-yao/ | code | Soon after the end of rainy season I got to visit some friends in Pha Yao. Pha Yao is a little town sitting on a lakeside in rural northern Thailand. I had a great time celebrating American Thanksgiving there…but as always, found a time to look for reptiles and amphibians.
The huge lake that dwarfs the city had a white form of Chinese Edible Frogs.
Several Tokay Geckos called unseen from my friends’ ceiling, and these frogs and lizards were right there in their yard.
This late in the year Pha Yao was cold enough that snake activity was reduced to daytime and dusk. I borrowed my friends’ bicycle and pedaled over to a series of ponds where they had spotted snakes while on evening walks. The area wasn’t gorgeous, but the fish ponds had their charm.
Right off the bat I saw several frogs:
And just before the sun set I saw my first snake!
Within just a few minutes two more showed up.
This was my first look at this species, and they were interesting in how they reared up in striking position, and then flipped around and tried to flee wildly. They gave the impression of a snake that wasn’t fully comfortable on land. In fact, most Asian Water Snakes spend over 90% of their time in the water. The Yellow-bellied Water Snake is a bit of an exception, hunting on land much more often than the other species, but it still found only in close proximity to water.
The last find of the night, less than an hour after the sun had set, was another lifer: a Checkered Keelback.
The next night I came back to the same area, and just before dusk I found a closely-related Yellow-spotted Keelback catching the last rays of sunlight just outside of some brush.
During the day I rode around on the bicycle a little bit, turning up a number of road-killed snakes that had been hit by passing vehicles. Many snakes are killed by cars as they try to cross roads to get from one bit of habitat to the next, or as they sun on roads to gain warmth. Sadly, some drivers even veer to kill the snakes, despite the fact that the snakes pose no danger to them at all. I found dead yellow-bellied water snakes, oriental rat snakes, long-nosed whip snakes, checkered keelbacks, and yellow-bellied keelbacks all on Pha Yao’s roads.
But one dead snake looked a bit odd to me. I picked it up and realized…it wasn’t a snake! In fact, it was a caecilian, a kind of legless amphibian. The combination of the cars and the sun had flattened it against the road.
Soon I found more on the road. It was interesting to see how much they looked like snakes…can you tell which of these is a caecilian and which is a yellow-bellied water snake?
Unfortunately, I was not able to find any live caecilians that year.
A couple years later I went back to the same place slightly earlier in the year. In the same marshy area where I had visited before, I found another couple of yellow-bellied water snakes.
I also saw this unusual Green Paddy Frog, which appeared to have some sort of lip deformity but had still managed to grow to adulthood.
And then, finally, a live caecilian! Sadly, you can see several wounds on the caecilian’s body, possibly from being attacked by a house cat or hit by a bicycle. I am not sure whether it would be able to survive or not.
The next day I went biking around during the day. I turned a corner in a rural area and saw a beautiful snake crossing the road. An adult Long-nosed Whip Snake! It truly was a sight, a full meter and a half long but barely thicker than a pencil.
After carefully taking it off the road, I placed it in a nearby sapling and snapped another photo:
Amusingly, one of those pictures was stolen off my website and has now become the “skeptical snake” meme:
The whip snake was a wonderful way to cap off my time in this little city. | s3://commoncrawl/crawl-data/CC-MAIN-2021-39/segments/1631780058589.72/warc/CC-MAIN-20210928002254-20210928032254-00301.warc.gz | CC-MAIN-2021-39 | 3,773 | 21 |
http://plugins.jetbrains.com/category/48-languages/idea_ce?search=&pr_productId=idea_ce&highlightCategories=false&canRedirectToPlugin=false&showPluginCount=false&categories=languages&title=Plugins+in+category+%22Languages%22&correctionAllowed=false&offset=60&max=10 | code | Plugins in category "Languages"
Support for Lua programming language.
A simple tool for realtime rapid development of Intellij plugins in ruby. For example:.
Provides Google Protocol Buffers support for Java language.
An OrgMode editor for IntelliJ IDEA.
CoffeeLint intellij integration.
Supports development of JavaFX applications with IntelliJ IDEA
IntelliJ solidity support
You can support the plugin development by clicking star on GitHub and rating it on the plugin page.
Enables JFlex support in IntelliJ IDEA.
Editor for properties files like built-in editors (highlighting, navigation, refactoring, find usages, intentions, properties files specific features, bundle editing... | s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187823360.1/warc/CC-MAIN-20171019175016-20171019195016-00222.warc.gz | CC-MAIN-2017-43 | 685 | 11 |
https://www.techgig.com/jobs/Sql-Developer/61616 | code | Description1.Experience of scripting language like Powershell or Python is an added advantage.
2.Frequently anticipates problems and analyzes ways to mitigate the risk.
3.Experience of working within an ITIL framework
4.Strong verbal and written communication skills
5.Excellent analytical and problem-solving skills
6.Must have a high degree of technical expertise/professional mastery to recommend process improvements
7.Bright and enthusiastic, self-starter, highly motivated, comfortable taking the initiative
8.Experience of the Agile software development lifecycle in a structured environment is a plus | s3://commoncrawl/crawl-data/CC-MAIN-2018-43/segments/1539583509196.33/warc/CC-MAIN-20181015121848-20181015143348-00503.warc.gz | CC-MAIN-2018-43 | 608 | 8 |
http://edwardzhu.me/about/ | code | Currently working as a software engineer focusing on virtualization of cloud spaces (containers, VMs, and ContainerOS) at Hewlett-Packard Enterprise. I was a software engineering intern (Hewlett-Packard Enterprise, HP) and also worked as a web/database developer at PetroDE.
Graduated in May 2016 from the University of Colorado, Boulder majoring in Computer Science!
I enjoy hacking out full-stack web apps and useful software tools — check out my projects.
I enjoy building and upgrading computers, volunteering (hospital, library), PC gaming, and staying updated with the latest technologies.
Born in Oregon, then moved to Mississippi for a few years, but mainly grew up in Fort Collins, Colorado. I'm fluent in Mandarin Chinese, as well as Shanghainese (dialect of Chinese). | s3://commoncrawl/crawl-data/CC-MAIN-2019-09/segments/1550247482478.14/warc/CC-MAIN-20190217192932-20190217214932-00038.warc.gz | CC-MAIN-2019-09 | 780 | 5 |
https://diy.stackexchange.com/questions/209392/rotating-a-staircase-and-making-a-new-landing-how-do-i-support-it | code | I am looking to rotate this staircase. Instead of descending in a southerly direction, I would like them to descend to the east. To do that my plan is to make the top step (step 5) into a landing and take move/rotate steps 1-4 to be toward the camera.
Column A would need to be moved much farther east, and replaced with a "structural" column for the south east corner of the landing, as well as a new handrail column.
My question is about the new "structural" column. How should I make it structurally sound?
My initial thought was to cut a hole in the floor and lag bolt it to the joist, but the joists are engineered and I'm not sure if they are rated for that kind of attachment.
My second thought was to drop the column all the way to the floor of the crawl space and pour a small concrete pad in the crawlspace, have the column sit on that, but frankly that sounds awful.
Is there an option I am not thinking of? Is there a safe way to attach a vertical column to an engineered joist? Is it legit to attach a column to a joist? | s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474744.31/warc/CC-MAIN-20240228175828-20240228205828-00263.warc.gz | CC-MAIN-2024-10 | 1,033 | 6 |
http://www.hexahedria.com/page5/ | code | This experiment was one of my first experiments with WebGL. The story behind this one starts with a camping trip I took with some friends. We didn’t camp in the wilderness because of logistical issues, so we ended up camping close to a beach. On the beach, people started to build sand sculptures, so I began working on a Sierpinski-esque triangle design, but with recursion in the inner triangle as well. Ultimately, a few other people ended up working on the increasingly intricate design. After the camping trip ended, the triangular fractals (affectionately called “tringles” by my friend Sarah) became a sort of running joke and obsession, and we ended up doodling them all over the place. Eventually I decided to make a version with code that would be infinite.
A ridiculously useless but rather cool looking clock. Every second, it creates a QR code that encodes the time and date, and then animates each pixel of the QR code to its new state. It attempts to move the dark pixels between locations, sliding from one location to another, but if a given pixel cannot be animated using motion, it simply fades away. You’ll need a QR reader to actually use this.
This is a program I wrote to explore the connection between the patterns in poetry and speeches and the patterns in music. Unfortunately, I cannot upload it here (the WebMIDI API integration does not seem to work anymore and also it was built with a very specific soundfont so viewing it elsewhere would not be equivalent), so instead of the actual program you can watch a video of it.
In this video, the program is playing its rendition of “The Raven” by Edgar Allan Poe.
This is one of my favorite experiments. I had the original idea during a vacation to Hawaii. Basically, I wanted to make a clock where the hands were connected end-to-tip instead of all being connected to the center of the clock, making a sort of time arm (second hand starting where minute hand ended, etc). I made a version of that using Rainmeter on my desktop for a while. | s3://commoncrawl/crawl-data/CC-MAIN-2018-43/segments/1539583511806.8/warc/CC-MAIN-20181018105742-20181018131242-00068.warc.gz | CC-MAIN-2018-43 | 2,027 | 5 |
http://cs.colby.edu/courses/S17/cs152-labs/labs/lab06/assignment.php | code | Project 6: Optimizing the Simulation
This is the second project on elephant population simulation. In the first project, you developed the overall simulation and used it to figure out a single parameter: the percentage of female elephants to dart each year. This week we're going to explore how to optimize one or more parameters of a simulation automatically. This will involve a little bit of restructuring of your elephant simulation code and then the development of an optimizer that will run the simulation many times in order to figure out parameters that best achieve a specific outcome.
Create a new file called optimize.py. Have the file import the sys,
elephant, and random packages. Then create a function
called optimize with the following definition.
def optimize( min, max, optfunc, simParameters = None, tolerance = 0.001, maxIterations = 20, verbose=False ): """Executes a search to bring the result of the function optfunc to zero. min: minimum parameter value to search max: maximum parameter value to search optfunc: function to optimize simParameters: optional parameter list to pass to optfunc tolerance: how close to zero to get before terminating the search maxIterations: how many iterations to run before terminating the search verbose: whether to print lots of information or not"""
The optimize function is very similar to the binary search function you wrote in lab. Start by assigning to a variable done the value False. Then, start a loop while done is False.
Inside the loop, first assign to testInput the average of max and min. This is not (should not be) an integer calculation. If verbose is True, print out testInput. Next, assign to result the return value of calling optfunc with testInput and simParameters as the arguments. If verbose is True, print out the result value.
Next, if the result is positive, assign to max the value of testInput. Else if the result is negative, assign to min the value of testInput. Else, assign to done the value True.
If max - min is less than the tolerance value, then assign to done the value True.
Decrement maxIterations. If maxIterations is less than or equal to zero, then set done to True.
Outside the loop, return testInput.
To test your optimize function, copy the following code and run optimize.py. As noted in the comments, try making tolerance smaller and see if it matches more digits in the target value.
def target(x, pars): """a function that returns x - target""" return x - 0.73542618 def testTarget(): """Tests the binary search using a simple target function. Try changing the tolerance to see how that affects the search.""" res = optimize( 0.0, 1.0, target, tolerance = 0.01, verbose=True) print res return if __name__ == "__main__": testTarget()
- The next step is to test the optimize function with your elephantSim function. Create a testEsim function (similar to testTarget above) that calls optimize with a min value of 0.0, a max value of 0.5, and passes it elephant.elephantSim as the target function. You probably want to set verbose=True as well. As with the testTarget function, assign the return value to a variable and then print the variable. At the bottom of your code, change testTarget() to testEsim() then run optimize.py. Does your optimize function find a value close to 0.43 for the percent darted?
The next step is to automate the process of evaluating the effects of
changing a simulation parameter across a range of values. This
function will let us discover, for example, the effect on the dart
percentage of changing the calfSurvival rate from 80% to 90% in steps
of 1%. The function definition is given below.
def evalParameterEffect( whichParameter, testmin, testmax, teststep, defaults=None, verbose=False ): """Evaluates the effects of the selected parameter on the dart percentage whichParameter: the index of the simulation parameter to test testmin: the minimum value to test testmax: the maximum value to test teststep: the step between parameter values to test defaults: default simulation parameters to use (default value of None)""" # if defaults is None, assign to simParameters the result of calling elephant.defaultSimParameters. # else, assign to simParameters a copy of defaults (e.g. simParameters = defaults[:] # create an empty list (e.g. results) to hold the results if verbose: print "Evaluating parameter %d from %.3f to %.3f with step %.3f" % (whichParameter, testmin, testmax, teststep) # assign to t the value testmin # while t is less than testmax # assign to the simParams[whichParameter] the value t # assign to percDart the result of calling optimize with the appropriate arguments, including simParameters # append to results the tuple (t, percDart) if verbose: print "%8.3f \t%8.3f" % (t, percDart) # increment t by the value teststep if verbose: print "Terminating" # return the list of results
Test your evalParameterEffects function by modifying your top level code at the bottom of your file to be the following. For the purposes of debugging, you will probably want to reduce the default carrying capacity to 1000 or even 500.
if __name__ == "__main__": evalParameterEffect( elephant.IDXProbAdultSurvival, 0.98, 1.0, 0.001, verbose=True )
What does this do? What should you expect the output to be?
Your final task is to make the following evaluations, showing the
effect on the dart percentage of the following parameter sweeps. Please use a carrying capacity of 2000. Make
a table or graph (or both) for each case. These five items should go
in your writeup.
- Vary the adult survival probability from 0.98 to 1.0 in steps of 0.001.
- Vary the calf survival probability from 0.80 to 0.90 in steps of 0.01.
- Vary the senior survival probability from 0.1 to 0.5 in steps of 0.05.
- Vary the calving interval from 3.0 to 3.4 in steps of 0.05.
- Vary the carrying capacity from 3500 to 7000 in steps of 500.
Your goal is to automate this process as much as possible. One option is to write a program that executes all of these in sequence and writes the results to a CSV file. Note that this option may take a while to test and debug. A second option is to make a program that runs only one of these at a time, but it lets you control it from the command line (specifying which parameter and the min/max/step). That is easier to debug, but you have to run it several times.
It is probably a good idea to figure out how to write data out to a CSV file and use that capability here.
fp = file( "filename here", "w") # open a file for writing fp.write( "write this string to the file\n") # write a string to the file fp.close() # close the file
Each assignment will have a set of suggested extensions. The required tasks constitute about 85% of the assignment, and if you do only the required tasks and do them well you will earn a B+. To earn a higher grade, you need to undertake one or more extensions. The difficulty and quality of the extension or extensions will determine your final grade for the assignment. One complex extension, done well, or 2-3 simple extensions are typical.
The following are a few suggestions on things you can do as extensions to this assignment. You are free to choose other extensions.
- Figure out how to automate the graphiing process using gnuplot.
- Have your program write out proper CSV files with a header line and appropriate commas.
- How much variation is there in the average total population for a 200-year elephant simulation across different runs? How stable is the estimate generated by doing 5 simulation runs?
- Enable the user to control your top level program with optional flags. For example, -par CarryingCapacity would specify that the program should evaluate carrying capacity, and -min 3500 would specify that it should start the evaluation at 3500.
- Check out the os package (import os). What could you do with the os.system function to automate your simulations?
Write-up and Hand-in
Turn in your code by putting it into your private hand-in directory on the Courses server. All files should be organized in a folder titled "Project 6" and you should include only those files necessary to run the program. We will grade all files turned in, so please do not turn in old, non-working, versions of files.
Make a new wiki page for your assignment. Put the label cs152s17project6 in the label field on the bottom of the page. But give the page a meaningful title (e.g. Milo's project 6).
In general, your intended audience for your write-up is your peers not in the class. Your goal should be to be able to use it to explain to friends what you accomplished in this project and to give them a sense of how you did it. Follow the outline below.
- A brief summary of the task, in your own words. This should be no more than a few sentences. Give the reader context and identify the key purpose of the assignment.
- A description of your solution to the tasks, including any text output or images you created. This should be a description of the form and functionality of your final code. Note any unique computational solutions you developed or any insights you gained from your code's output. You may want to incorporate code snippets in your description to point out relevant features. Code snippets should be small segments of code--usually less than a whole function--that demonstrate a particular concept. If you find yourself including more than 5-10 lines of code, it's probably not a snippet.
- A description of any extensions you undertook, including text output or images demonstrating those extensions. If you added any modules, functions, or other design components, note their structure and the algorithms you used.
- A brief description (1-3 sentences) of what you learned. Think about the answer to this question in terms of the stated purpose of the project. What are some specific things you had to learn or discover in order to complete the project?
- A list of people you worked with, including TAs and professors. Include in that list anyone whose code you may have seen, such as those of friends who have taken the course in a previous semester.
- Double-check the label. When you created the page, you should have added a the label cs152s17sproject6. Make sure it is there.
Thanks to Cathy Collins for the project idea and documentation. The original project concept and idea came from Therese Donovan, University of Vermont. | s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376831933.96/warc/CC-MAIN-20181219090209-20181219112209-00556.warc.gz | CC-MAIN-2018-51 | 10,354 | 54 |
https://martinsblog.dk/vsphere-7-unable-to-log-into-the-vami-page-invalid-credentials-or-unable-to-login/ | code | Running the newest build of VCSA 7.0.1 from Dec. 17 2020, I could not login to the VAMI page:
It instantly wrote “Unable to Login”
After some digging around and rebooting, I found this article:
Running all the commands and rebooted the VCSA, the applmgmt service started correctly, after the timeout was changed to 600 from 60!
After reboot, I could login as normal 🙂 | s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100632.0/warc/CC-MAIN-20231207022257-20231207052257-00633.warc.gz | CC-MAIN-2023-50 | 374 | 5 |
https://dariofigs.com/ | code | Darío Figueroa is a designer who codes with a passion for empowering people. Currently based out of San Antonio and designing money movement experiences at Frost [email protected]
Established guidelines, principles, and led the design implementation on the mobile application.
Changing the architecture of Frost's Send Money experience to include scheduling future payments and recurring payments.
My current gig. I design the Money Movement portion of the product which currently handles over $1B in transactions a month. Additionally, I've lead the dark mode design, worked to mature the Aurora design system alongside development, collaborated with Zelle, and more.frostbank.com →
A previous position where I worked on both the product and marketing side of things. Lead the UI effort on the design systems team and built landing pages in Adobe's Experience Manager.cdw.com →
Worked with CPS Lives, a Chicago non-profit arts organization, to build and redesign their website alongside a team of talented designers.cpslives.org →
Created documentation around the Showpad SDK and designed marketing pages for showpad.com.showpad.com →
A jack of all trades position at an agency where I worked on everything from designing print materials, logo design, web design, and developing WordPress sites.boxlessmedia.com → | s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506329.15/warc/CC-MAIN-20230922034112-20230922064112-00266.warc.gz | CC-MAIN-2023-40 | 1,325 | 8 |
https://www.slant.co/options/393/~cor-review | code | Ranked in these QuestionsQuestion Ranking
Pro Easy to debug
Pro Clean syntax
Cor enables you to write large applications by providing a clean syntax, classes and a modular architecture to keep organized code, enforcing the writing of readable source code based on conventions.
Pro Cross platform
Pro Support coroutines
Cor support coroutines which can be chained, stopped, and synchronized, fitting very well into the web asynchronous world.
Pro Hot reload
Cor provides a smooth front-end development by furnishing a builtin hot-loader which resolves dependences and compiles source code on the fly, with just reloading the Web page. You will only need to use CLI tools to deliver a production-ready version of the app.
Pro Concurrent and parallel
Cor allows to synchronize coroutines by passing messages through channels, and supports the execution of many tasks in parallel, all of that by writing sequential code.
Con Work in progress
Cor is still a very much young project (as of November 2015) with just one contributor, few stars on GitHub and virtually no learning resources outside the official documentation. | s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474746.1/warc/CC-MAIN-20240228211701-20240229001701-00442.warc.gz | CC-MAIN-2024-10 | 1,117 | 13 |
https://optimisedpersonalwellness.co.uk/ufaqs/when-return-my-samples/ | code | Blood samples should be returned to the lab immediately i.e. same day, using the method of postage advised by the lab.
Samples must be returned to the lab on a Monday to Thursday (inclusive) and samples should not be returned on a Friday or Saturday (unless otherwise confirmed).
Some samples e.g. frozen saliva, are stable for longer so could be returned to the lab a couple of days later (but still by using a ‘next day delivery’ method as advised by the lab). Please check test instructions.
Where the test requires multiple stool samples, then the samples can be returned to the lab once all samples are collected, in one package, using the courier service recommended by the lab. Ensure samples are shipped Monday to Thursday. | s3://commoncrawl/crawl-data/CC-MAIN-2019-35/segments/1566027331228.13/warc/CC-MAIN-20190826064622-20190826090622-00016.warc.gz | CC-MAIN-2019-35 | 735 | 4 |
http://www.italki.com/discussion/44167 | code | By creating an account, you agree to our terms of service.
I've read many questions related with what to teach in each level. Searching on Google I found that if you type 'Syllabus for the Common European Framework' you'll get many PDFs related with it.
• I suggest you to open a PDF called Area Area General English Course by oxfordhousecollege.co.uk . It's really useful.
I hope it helps.
Have a nice weekend! ^^
it's so nice!!!
I hope you find this link useful. :) | s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936463028.70/warc/CC-MAIN-20150226074103-00061-ip-10-28-5-156.ec2.internal.warc.gz | CC-MAIN-2015-11 | 469 | 7 |
https://www.acumatica.com/cloud-erp-software/acumatica-release-news/acumatica-2019-r1/ | code | Highlighting Inquiries provides visual clues on rows or columns of a generic inquiry based on customized conditions that have been introduced. Based on the alerts required, the system will highlight certain elements of a generic inquiry. For example, when inquiring on “opportunities”, the resulting grid can show those opportunities that have been won in green, those that have no owner in yellow, and opportunities that are late in red.
|Acumatica 2019 R1 – Conditional Highlighting
Side Panel displays the details of a row on an inquiry screen. Changes to the data can be made in the side panel and the information displayed in the panel can include data or dashboard graphics without leaving the inquiry screen. In 2019 R1, significant improvements have been made to the Side Panel UI for improved usability.
Improved help search via Machine Learning (ML). Inquiries made in the HELP menu inform the system what was useful and how to provide better help recommendations over time. Based on how effective the response to a natural language search has been, the system knows if it is serving up the correct results and adjusts. View the video.
|Acumatica 2019 R1 – Improved help search via ML
Custom color gives the company the ability to personalize the primary color of the company’s user interface. In addition, for multi-company or multi-branches, a different color can be specified for each branch to make it easier for employees to distinguish them.
Link existing files to Acumatica entities –2019 R1 now provides the ability to easily add links to attachments that already exist in the system. Once files have been attached to one document within the system, the user can then add a link to the stored files right from the form to which the file should be attached.
User Defined Fields can be used in a customization project to add new fields in multiple forms in each of the modules without a programmer. If the field to be added has not already been defined, the user can define a new field by managing attributes on the pop-up attributes form.
Progress Bar for long-running processing is in a pop-up window that provides insight to the completion percentage, as well as the elapsed and remaining running time of the process. The window has tabs which record the job status, including: Processed, Errors, Warnings, and Remaining. Because it runs in the background, users can do other work in the same browser tab while the long-running process continues. See it in action.
|Acumatica 2019 R1 – Progress bar
Multifactor authentication provides increased security. A user is granted access only after successfully presenting additional evidence of authentication in addition to the user credentials (that is, the username and password). Find out more.
New end-user training is also being shipped with Acumatica 2019 R1. It will be available for anyone that wants to learn about the Acumatica software solution from reporting to system administration. This is available at no charge on Acumatica Open University. | s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817146.37/warc/CC-MAIN-20240417075330-20240417105330-00494.warc.gz | CC-MAIN-2024-18 | 3,034 | 12 |
http://www.gtugs.org/chapter.jsp?id=63001 | code | The Richmond GTUG was created to bring together software developers using Google technology in the Richmond, VA area to share knowledge, network, and enjoy the company of fellow engineers. The RVA GTUG online community can be found on Google Groups.
We're currently looking for members, especially those interested in helping to organize events or give presentations. Be a giver! Please use the discussion group to contact a group manager and request membership. Membership is free. | s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386164034245/warc/CC-MAIN-20131204133354-00080-ip-10-33-133-15.ec2.internal.warc.gz | CC-MAIN-2013-48 | 482 | 2 |
https://raisissoftware.com/case-studies/web-design | code | Here are all of the
- MOBILE APPS
- WEB DESIGN
- WEB DEVELOPMENT
- UI/UX DESIGN
Ready? Solving your digital problems
has never been easier.
Streamlining your company's internal processes and creating a
much-needed synergy between your resources is one click away. | s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817474.31/warc/CC-MAIN-20240420025340-20240420055340-00702.warc.gz | CC-MAIN-2024-18 | 263 | 9 |
https://answers.netlify.com/t/confused-about-purpose-of-the-default-property-for-inputs-in-manifest-yml/15338 | code | Is the “default” property of inputs supposed to be available in the operation of a plugin?
While developing a plugin… unless I explicitly define an “input” value in the netlify.toml, the “input” is undefined in plugin code execution. Even if the manifest.yml has a default.
So is the manifest.yml just for documentation?
If so, why do so many existing plugins list defaults for inputs, but never set a default in their plugin code? | s3://commoncrawl/crawl-data/CC-MAIN-2021-17/segments/1618039491784.79/warc/CC-MAIN-20210420214346-20210421004346-00457.warc.gz | CC-MAIN-2021-17 | 445 | 4 |
http://www.webassist.com/forums/post.php?pid=131016 | code | Renaming didn't help.
I copied all files that I could think of for you to look at. The page file is Tags_RD.php.
The add to cart button on any page is not redirecting. It stays on same page.
I have included my shopping cart page as well for you to be able to look at.... | s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376825029.40/warc/CC-MAIN-20181213171808-20181213193308-00567.warc.gz | CC-MAIN-2018-51 | 270 | 4 |
http://www.amazon.de/Real-World-Adobe-GoLive-4/dp/0201354748 | code | Real World Adobe GoLive 4
is less like a step-by-step tutorial and more like a manual, but one that tells you how things do
work, not necessarily how they should
work. It fills in the areas where the official GoLive manual falls short; it's the stuff you need to know after you've become familiar with all the palettes and menus.
Authors Fleishman and Carlson recommend not trying to read the book straight through. In the introduction, they outline which chapters are best for beginners, intermediate users (which they believed they were before writing the book), and advanced users (which they believe they are now). They suggest readers scan the book first, focusing on chapters that answer their most pressing questions, and then stay up all night reading the whole book. As they put it, they find learning easier if you "balance efficiency with learning curve ... learn a little and then sit down and produce." For an intermediate user, it's very gratifying to jump to the chapter on grids, for example, and finally realize why things didn't work exactly as expected.
One particularly useful chapter shows how to import, revise, and manage an existing Web site that may have been created by hand-coding or by another HTML editor. The book is loaded with tips and insights and, weighing in at around two and a half pounds, it's a heavyweight in more ways than one. --Angelynn Grant | s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936463108.89/warc/CC-MAIN-20150226074103-00235-ip-10-28-5-156.ec2.internal.warc.gz | CC-MAIN-2015-11 | 1,385 | 6 |
http://www.navistudios.net/ | code | It's been three months at Riot, and time is flying! It feels really good to get to apply experimental psychology in an extremely agile game industry setting. Fitting studies into the sprint-based development approach of the industry is pretty interesting. Lots of rapid work alongside more long-term planned exploration.
Unfortunately, working at Riot also means that my work has to stay under wraps again. While I'm continuing to work on publications for studies I conducted before I came to Riot, I'll soon have to go through a bit of a dry spell, science-publication wise.
I'm working at Riot now. And so far it is pretty amazing. There is nothing better than being surrounded by enthusiastic, talented people. Work is best when it is not work.
What? Didn't you just get to NYC, Davin?
Yes, well... Riot Games has offered me a position running a user research lab. They're the best, so off we go. Next stop: Santa Monica, CA.
For the past few weeks Rebecca and I have been working on writing submissions for Machine of Death volume 2. The deadline has hit and our submissions are now in for review. Some of you have asked about reading it, so here's your chance! It was a lot of fun to write, and I have to thank Brian, Lindsay, and Rebecca for their great feedback during the writing process. I decided to go a slightly different route and take what I know (science writing for academic journals) and apply it to the Machine of Death premise. Telling a story through a very formal scientific writing style is very tricky. The true narrative here is between the reader and the ideas. In some ways the trappings of the style got in the way of that. But I think there's some fun stuff here. Give it a read and see what you think!
After moving to NYC, I got busy learning how to do some new things. In particular, I'm working on learning Unity so that I can prototype game ideas. Exciting! But until I get more done, not particularly exciting to write about. Hang in there, Internet.
MaxFunCon is also coming up. Why not learn how to do some Improv from the fantastic Jordan Morris? More skills! Level up! Hit points! MANA! | s3://commoncrawl/crawl-data/CC-MAIN-2014-52/segments/1418802769321.94/warc/CC-MAIN-20141217075249-00081-ip-10-231-17-201.ec2.internal.warc.gz | CC-MAIN-2014-52 | 2,123 | 8 |
https://support.microsoft.com/en-us/help/2652877/sharepoint-2010-iis-application-pool-settings-can-cause-site-not-to-load | code | “HTTP Error 503. The service is unavailable.”
You may also see this event in the Application Event log:
Log Name: Application
Event ID: 2282
Task Category: None
The Module DLL 'C:\Program Files\Common Files\Microsoft Shared\Web Server Extensions\14\isapi\owssvr.dll' could not be loaded due to a configuration problem. The current configuration only supports loading images built for a x86 processor architecture. The data field contains the error number. To learn more about this issue, including how to troubleshooting this kind of processor architecture mismatch error, see http://go.microsoft.com/fwlink/?LinkId=29349.
1. Click Start, click Run, type inetmgr, and click OK.
2. Click on Application Pools, then click on the application pool you wish to change.
3. Click on Advanced Settings in the Actions pane.
4. Change "Enable 32-Bit Applications" setting under the General section to "False."
5. Click OK. This will trigger and Application Pool restart.
Article ID: 2652877 - Last Review: Dec 21, 2011 - Revision: 1 | s3://commoncrawl/crawl-data/CC-MAIN-2017-22/segments/1495463607726.24/warc/CC-MAIN-20170524001106-20170524021106-00213.warc.gz | CC-MAIN-2017-22 | 1,026 | 12 |
https://bugzilla.redhat.com/show_bug.cgi?id=50643 | code | `rpm -qf /usr/html/texi2html.html /usr/html' produces the output
| file /usr/html is not owned by any package
Either this file should be placed somewhere else or the /usr/html directory
should be owned by this package also.
I am tending to the first option.
This defect is considered SHOULD-FIX for Fairfax.
It should be a %doc file.
Fixed in 1.0.7-27. | s3://commoncrawl/crawl-data/CC-MAIN-2019-26/segments/1560628000164.31/warc/CC-MAIN-20190626033520-20190626055520-00044.warc.gz | CC-MAIN-2019-26 | 352 | 8 |
https://www.sql-server-performance.com/forum/threads/order-by-15903/ | code | SQL Server Performance Forum – Threads Archive
order byORder by fasten qury or delay result set thanx in advance SQL is love
An ORDER BY clause is not intended to be used to increase or decrease query performance. It is the only reliable way to force SQL Server to return an ordered result set.
However you can check the difference by placing SET STATISTICS TIME ON as first statement in your query and run the query without using ORDER BY through QA. Watch the results. You then can use DBCC DROPCLEANBUFFERS and rerun the query using ORDER BY. Now you can compare. Frank
Order by can’t make a query fast. Depending upon the result set and depending on the indexes on the columns, it may make the query slow. Enable the execution plan while running the query and check the cost on ‘Sort’. | s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817081.52/warc/CC-MAIN-20240416093441-20240416123441-00114.warc.gz | CC-MAIN-2024-18 | 797 | 5 |
https://gist.github.com/clhenrick/a5972639e5f3032ac4f8e1c75d221505 | code | This is a demonstartion of how to align arbitrary GeoJSON data to the us-atlas topojson data.
It's important to note that the TopoJSON from
us-atlas has it's map projection,
(d3.geoAlbersUsa), built into it. In other words,
it is considered "projected" geographic data.
This is an important distinction from GeoJSON data which is most typically stored in the unprojected Coordinate Reference System WGS84, also commonly referred to as "lat, lon" (though coordinates are most often stored in the order longitude, latitude).
In order to properly align arbitrary GeoJSON data with us-atlas, we need to properly set the projection's
translate attributes to those used by us-atlas, which can be found in its
var projection = d3.geoAlbersUsa().scale(1280).translate([480, 300]);
This will give us correct SVG x, y coordinates from lon, lat coordinates. For instance:
projection([-122.41, 37.76]) // returns Array [ 34.37093520874129, 257.47410484805755 ]
d3.geoAlbersUsa alone will result in the GeoJSON data being mis-aligned with the map. | s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600400202418.22/warc/CC-MAIN-20200929154729-20200929184729-00396.warc.gz | CC-MAIN-2020-40 | 1,034 | 12 |
https://www.lynda.com/C-tutorials/Working-enumerators/651201/720499-4.html | code | Join Alexander Zanfir for an in-depth discussion in this video Working with enumerators, part of Learning C#.
- [Instructor] We just received the feature request from the school board to support multiple schools. To begin with, they want to support only three schools for a trial period. So let's create a property in the student that will allow us to set the school. So let's go down to our Student class, and we'll add the field there. So we'll add a public string, and I'll call it School, and let's go back up to our program, and we'll ask the user what school the student goes to.
We'll do that right after the grade and we'll simply ask for the school name, and that should be it. Let's give this a try, and it seems to be working with no issues. Now, after submitting this update to the school board, several reports came in from the database administrator, that it is taking far too long to export the students to a database, and it often fails.
They examined the application and have determined that the school property is the culprit. Oftentimes, users might mistype the school, and when they try to export a student from a specific school, that student with the mistyped school fails. Also, since the property is a string, and the database program on the administrator's end is comparing school names letter by letter, and often the school names are long. The process is expensive. So that's one thing to keep in mind is that if we're comparing hundreds or thousands of strings against each other, and they each have several dozen characters, that's a very expensive process.
So your team comes up with the idea to create an index of schools. School A will have the index of one, school B will be two, and school C will be three, and so on, and instead of a string, we just store an integer for the school index. This way there is no way to misspell the school, and comparing a single integer is much faster. So first, let's modify the question, and then we'll modify the field after. So instead of Console.Ask on line 24, we'll change that to AskInt, and now let's go down to our Student class, and we'll change line 82 from a string to an int.
But we also need to supply the index inside the actual question. So let's go back up to line 24, and we'll give them several options. So I'll use parentheses inside the string, and specify, type corresponding number, and then I'd like to specify, let's start with zero for, and we'll come up with a school name. I'll make it Hogwarts High, and the next school, with index one, Harvard, and finally two, with MIT, and I'd like each of these to be on a new line, so I'll use a set of characters that will give us a new line that we can put anywhere in our string.
So after we ask the question, I'll create a new line. Then, after the first option, another new line, and so on, and we'll end with a new line as well, so that they can answer on a new line, and actually, I'll run this in debug mode so that we can see what the value is once it's set. So let's first get rid of the breakpoint we have on line 18, and then add a new one below our school question, so on line 26, and now let's run with F5, and then let's hover over school, and we can see the value is set to two, so it's working.
This looks and works great. We also received another feature update to export the students database for each school. Each school database is different, and so we will need to create a separate export function for each call that our database programmer can plug into. So to keep this clean, let's go down to the bottom of our Program class, and let's create a new function called Exports, and it won't return anything since it's just exporting something, and inside here, let's begin by writing a foreach loop, and that will go through all of our students inside our students collection.
Now, our students collection is just a local list, so let's move it out of our Main function and into the class. That way we can access it anywhere in the class, and I'll get rid of the var keyword, and then I'll specify the type explicitly, which will be a list of students, and I'll change that to static as well, since we need to access that inside static functions. All right, now let's go back down to our export function, and in here we'll have to execute a different export function, depending on what school the student belongs to.
So let's use a switch, and we'll switch on student.School, and we'll have the first case, zero, and we'll simply do a Console.WriteLine("Exporting to Hogwarts"); and we'll add the break, and then we'll add case one, and this time we'll export to Harvard.
Finally, case two, we'll export to MIT. Okay, now the next thing we need to do before we try it is simply to call Exports inside our Main function. So after the first foreach that displays the student name and grade, let's call Exports. Now let's give it a try. I'll select Harvard, and again, so here we're getting the Exporting to Harvard message, so it's working.
So this seems to be working fine, but it's a bit hard to read since we are dealing with just numbers and the index, and inside the switch. Instead of using an int, we can use something called an enumerator, or an enum for short. Let's take a look at that. So I'll go to the top of our file, above our class Program, and create an enum. I'll call it School, and I'll set Hogwarts to zero, Harvard to one, and MIT to two, and now let's go ahead and use our School enum, and we'll go down to our Student class, and instead of specifying an int for the type, we'll use a School enum type.
Now we're getting a few errors, so of course we'll have to modify the cases in our switch statement on line 75. So we'll start with case zero, and change that to School.Hogwarts, and then case one, change that to School.Harvard. Case two, School.MIT. So that reads a lot better since it's less ambiguous than the school index we had before.
Now, if you can see, we still have one more error we need to deal with, so let's scroll up, and on line 31, we're getting an error that we're trying to implicitly convert an int to our School enum, and even though the enum has an underlying number, it can't directly convert it unless we specify to do so explicitly with a cast. So let's add that in front. So to use a cast, we'll just append parentheses, and then the type we want to cast to, which is School, and so that will take the integer from our AskInt, and cast it over, or convert it into a School enum, and let's try running our program one more time, and we can see everything's working.
We selected two for the school, which is MIT, and we're getting Exporting to MIT. One last thing we can look at in regards to enums is that they come with an index, by default, that starts at zero, so we don't actually have to give them the corresponding numbers, as I did here. By default, the first will be zero, the second one, and so on. So this should behave exactly the same with less code, and that's always good, and it continues to work.
Explore variables and data types; controlling program flow with conditions and loops; and building functions. Learn how to implement object-oriented programming such as encapsulation and inheritance in C#, and find out how to debug your code. Alexander then explores advanced concepts such as enumerators, ref parameters, interfaces, events, and abstract classes. In the last two chapters, he covers the "top" features introduced in the last several versions of C#, including lambda expressions and string interpolation.
- C# variables and data types
- Switch statements
- Object-oriented programming: encapsulation, properties, and inheritance
- Debugging C# code
- Advanced C# concepts
- Top new features | s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578711882.85/warc/CC-MAIN-20190425074144-20190425100144-00202.warc.gz | CC-MAIN-2019-18 | 7,726 | 22 |
https://forum.howtoforge.com/threads/using-different-php-ini-for-each-site.70349/ | code | Hi. It's possible using a different php.ini for different site with ISPconfig? Inside the domain, on the option Tab, i see the "Custom php.ini settings". Hot to work this function? Thanks a lot for you fantastic support, that really i don't see in many other commercial host panel. Thanks. | s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510208.72/warc/CC-MAIN-20230926111439-20230926141439-00219.warc.gz | CC-MAIN-2023-40 | 289 | 1 |
https://databuilders.ie/sisense-compose-sdk/ | code | Sisense Compose SDK (Beta)
Empower Your App with Custom Analytics
Sisense Compose SDK is a flexible developer toolkit that gives you tools to embed analytics in a code-first, scalable, modular way.
Build analytics and data-driven experiences into your products faster, reduce maintenance burden, and save development time over coding from scratch.
Convert data into game-changing value. Embed AI-powered analytics into your products. Explore the code that provides full control over your users’ experience.
Sisense Compose SDK is a software development kit that enables a composable, code-driven way to use Sisense platform capabilities. Build analytics and data-driven experiences into your product with code using Compose SDK, a set of client-side libraries and components for query composition, data visualisation, and more.
What can I do with Compose SDK?
Create Sisense queries, charts, and filters directly from your application code – No predefined dashboards or widgets required – or render existing widgets by ID. Mix and match approaches to fit your needs.
Composable, modular and extensible – Use the Sisense components, customise them, or bring your own. Compose SDK works equally well for building new applications or upgrading existing ones to use Sisense’s powerful analytics platform.
Built with developer experience in mind – The SDK is available via GitHub and NPM, supports TypeScript and React, and includes documentation, code samples and CLI tools that help you get things done with ease.
Sisense Compose SDK Introductory Webinar
Embed analytics in a code-first, scalable, modular way with Sisense Compose SDK, the flexible developer toolkit. Build analytics and insight-driven experiences in your products faster, reduce maintenance burden, and save development time over coding from scratch.
For a comprehensive overview of Compose SDK, register HERE for this on-demand Sisense webinar “How to build next gen solutions with data insights”.
Who should attend: All developers, data engineers and architects.
Choosing The Right Embedding Approach
Align your use case, flexibility, and deployment needs with the right libraries.
Use Case: Build data driven applications.
Embeddable Elements: Data, charts, customisable individual filters.
Visualisations: Sisense or your own charts.
Languages: React & TypeScript
Use Case: Embed dashboards into web applications.
Embeddable Elements: Entire Sisense Dashboards.
Visualisations: Sisense Widgets. | s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100535.26/warc/CC-MAIN-20231204214708-20231205004708-00624.warc.gz | CC-MAIN-2023-50 | 2,479 | 23 |
https://gitlab.inria.fr/MoReFEM/CoreLibrary/MoReFEM/-/issues/531 | code | Refactor deeply assembling. Most prominent new feature is that is is now possible to assemble into as many matrices and/or vectors as you like in one call.
Due to a crash of the Redmine server that was used from 2013 to 2019, all the ticket history of the project circa 2019 has been lost. An effort has been made to reconstruct the most possibble (see #1606 (closed) for more details), however clearly a lot of content was lost. So:
- If the ticket is tagged as 'Redmine placeholder', it means no informations was retrieved (it might not have existed in the first place - once again have a look at #1606 (closed) for more details).
- If the content of a subsequent note is formatted as a Redmine mail informations, it means a mail sent when the issue was modified as been used to recreate at least part of it (see #1607 (closed) for more details).
- If another content is present, informations might have been filled from the Changelog.md file. | s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817036.4/warc/CC-MAIN-20240416000407-20240416030407-00694.warc.gz | CC-MAIN-2024-18 | 945 | 5 |
https://emmachev.com/what-is-the-difference-between-windows-powershell-and-kite-programming-languages/ | code | What is The Difference Between Windows PowerShell And Kite, Programming Languages
Windows PowerShell is a Scripting Language, while Kite is an Interpreted Programming Language
What are Scripting Languages
Scripting languages are programming languages that control an application. Scripts can execute independent of any other application. They are mostly embedded in the application that they control and are used to automate frequently executed tasks like communicating with external programs.
What are Interpreted Programming Languages
An interpreted language is a programming language for which most of its implementations execute instructions directly, without previously compiling a program into machine-language instructions. The interpreter executes the program directly, translating each statement into a sequence of one or more subroutines already compiled into machine code. (Wikipedia)
While Windows PowerShell is a Scripting Language, and Kite is an Interpreted Programming Language
Let us now look at the difference between the two:
What is Windows PowerShell Programming Language – A brief synopsis
It is Microsoft’s command line shell and a scripting language. Released in 2006, it is available with Windows XP, Windows Vista as also with Windows Server 3003 and Windows Server 2008. It works in collaboration with Microsoft .NET Framework by means of executables, forms of standalone applications, regular .NET classes, cmdlets that are specialized .NET classes and scripts, the compositions of cmdlets and imperative logic.
What is Kite Programming Language – A brief synopsis
It came up in 2006 with a feature set consisting of a blend of object-oriented and functional programming features. It is a fast-running language. Interestingly, Kite uses the pipe character for functional calls rather than using the period or arrow characters in other languages.
A Complete List of Computer Programming Languages | s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296948951.4/warc/CC-MAIN-20230329054547-20230329084547-00093.warc.gz | CC-MAIN-2023-14 | 1,929 | 13 |
http://forumserver.twoplustwo.com/168/free-software/simple-nash-new-icm-calculator-1190874/ | code | Yes, I also use fictitious play calculation
Interesting and some strange for me - does it means that holdemresources.net doesn't use fictitious play? But... What 500 iterations are calculating by him?
Do you use any approximations?
TeelXp, write me to the skype (Vinni_Win) please. It's too interesting to glue the whole picture from player viewpoint and mathematical viewpoint. | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368697917013/warc/CC-MAIN-20130516095157-00001-ip-10-60-113-184.ec2.internal.warc.gz | CC-MAIN-2013-20 | 378 | 4 |
https://docstore.mik.ua/orelly/unix2.1/lrnunix/ch07_01.htm | code | Now that you've come to the end of this guide, you might want to know the options to the commands we've introduced and the many other UNIX commands. You're now ready to consult your system's documentation.
Different system manufacturers have adapted UNIX documentation in different ways. However, almost all UNIX documentation is derived from a manual originally called the UNIX Programmer's Manual . One section you'll want to consult is the one that lists general UNIX commands like who and ls . There's probably another section with tutorials and extended documentation.
Many UNIX installations (especially larger systems with plenty of disk space) have individual manual pages stored on the computer; users can read them online.
For example, if you want to find information about the program mail , which allows you to send messages to other users, you would enter:
The output of man may be filtered through the more command automatically. If it isn't, just pipe the output of man to more (or pg ).
After you enter the command, the screen will fill up with text. Press [SPACE] or [RETURN] to read more.
Some systems also have a command called apropos or man k to help you locate a command if you have an idea of what it does but are not sure of its correct name. Enter apropos followed by a descriptive word; you'll get a list of commands that might help.
Linux systems, and many other systems, may also have a command called info . It serves the same purpose as man : to document system commands. The info output is in a different format, though. The syntax to start info is:
For example, if you want to find information about the program find , which searches for files, you would enter info find . After you enter the command, the screen will fill up with text. Press [SPACE] to read more or "q" to quit. | s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817043.36/warc/CC-MAIN-20240416031446-20240416061446-00133.warc.gz | CC-MAIN-2024-18 | 1,811 | 9 |
https://discuss.elastic.co/t/kibana-logstash-pipelines-editing-multi-line/345103 | code | anyone noticed the UI change when editing logstash pipelines?
Not only the font (size) has changed (way too large in my opinion), but also the behavior.
You can duplicate lines with shift+alt+arrow key, moving line with alt and normally you were able to edit multiple lines with crtl+alt+arrow key.
But that doesn't seems to be possible anymore.
And that's just very useful to put multiple lines in or out of comment for example | s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100258.29/warc/CC-MAIN-20231130225634-20231201015634-00756.warc.gz | CC-MAIN-2023-50 | 428 | 5 |
https://community.oracle.com/customerconnect/discussion/600641/best-practices-for-compensation-data-for-india-ctc-vs-component-setup | code | Best Practices for compensation data for India (CTC vs Component setup)
I’m looking for some feedback on best practices related to storing compensation data for India in Oracle. We are trying to help them streamline some payroll processes and appreciate any thoughts or feedback.
We currently store ‘annual salary’ in oracle representing the CTC cost combining multiple components. In India we use ADP for payroll and not through Oracle. Do most companies implement components in Oracle and store that data or leave it as CTC cost only?
Thanks for your help! | s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679102469.83/warc/CC-MAIN-20231210123756-20231210153756-00029.warc.gz | CC-MAIN-2023-50 | 564 | 4 |
https://www.jiskha.com/display.cgi?id=1176653276 | code | posted by Kristina .
Calculate the molar solubility of gold(I) chloride (Ksp= 2.0 x 10^-13) in .10 M NaCN. The complex ion formed is [Au(CN)2]- with Kf= 2.0 x 10^38. Ignore any other competing equilibrium systems.
I'm having trouble writing an equation to start off with.
First, I had written
AuCl + NaCN <--> [Au(CN)2]- + NaCl (s)
But I can't seem to balance it correctly.
I think I know how to do the problem if I have just one reactant, but I'm not sure what to do with two. Any help would be appreciated.
The equation is not balanced because the CN- is not balanced. It can be calanced this way.
AuCl + 2NaCN ==> Na[Au(CN)2] + NaCl. In aqueous solution, the sodium salt of the complex ion will ionize into Na^+ and Au(CN)2^- while the NaCl will ionize into Na^+ and Cl^-. | s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886102819.58/warc/CC-MAIN-20170817013033-20170817033033-00227.warc.gz | CC-MAIN-2017-34 | 775 | 9 |
https://wordpress.stackexchange.com/questions/260312/efficient-wordpress-development-workflow-help | code | I work for a company that wants me to update their Wordpress site. In the past, the developers seem to just change the files locally then upload them to the dev server via FTP. So, I copied the site's theme files to my computer, made my changes, complied the css (they're using Sass), then upload those changed files back to the dev server. But, none of this seems efficient to me.
I'm not familiar with this so I'm a bit confused on how I should go about this. The sites I have worked on in the past have been pretty low scale. For my own site, because it was static, I made my changes locally, used Gulp for the Sass and other tasks and pushed it to GitHub. And since I hosted it on GitHub, that was it.
But, right now, I'm doing a bit of "cowboy coding" and that isn't the right way. So, I would love if someone could give some suggestions on an efficient way to go about this? Thanks in advance! | s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323587767.18/warc/CC-MAIN-20211025185311-20211025215311-00414.warc.gz | CC-MAIN-2021-43 | 899 | 3 |
https://bugzilla.mozilla.org/show_bug.cgi?id=411588 | code | Closed Bug 411588 Opened 14 years ago Closed 12 years ago
Support for 64bit universal binaries for Mac OS X
User-Agent: Mozilla/5.0 (Macintosh; U; Intel Mac OS X 10.5; en; rv:1.9b3pre) Gecko/2008010900 Camino/2.0a1pre (like Firefox/3.0b3pre) Build Identifier: To be able to compile Firefox and other Mozilla apps as 32 and 64 bit universal binaries for Mac OS X. We should at least be able to build as a 64 bit application without errors. Unsure if there would be a performance gain, however could be good marketing for Mozilla. Reproducible: Always
This would be a lot easier with bug 417044 fixed. bsmedberg said he had that mostly working... Can you build on Mac targetting x86_64? That would be the first step, I'd think.
Does not compile at all. After 5 seconds of compiling: nsprpub/config/now.c gcc-4.2 now.o -o now ld: warning in now.o, file is not of required architecture Undefined symbols: "_main", referenced from: __start in crt1.o ld: symbol(s) not found collect2: ld returned 1 exit status
File that separately (if it's not already), and mark it blocking this bug?
This bug should be about a universal configuration that includes 64-bit Mac OS X support. 64-bit Mac OS X support itself does not necessarily have to be part of a universal binary. 64-bit Mac OS X support is bug 468509.
On Mac OS X a 32/64-bit Universal application has a checkbox in the Information-View (if you rightclick the application) to choose if the Application should start in 32bit- or 64bit-mode. But I don't know if this must be specified in the application or if this checkbox is a standard if the application contains a 64bit binary. Some 32/64-bit Universal applications (like XCode 3.0 or Adobe Lightroom 2) have also an <key>LSArchitecturePriority</key> key in its Info.plist to define the priority of the binary architectures. This is not standard, because there are also 32/64-bit Universal applications without this key. Is it planed to include this in mozilla applications?
We don't use Xcode UI and we have not made any decisions about how we're going to package a universal binary. That is a long ways off.
Since we can build in x86_64 on Mac OS X now, is it now possible in any manner to build a i386/x86_64 binarie? Or are there first some modifications of the build system needed? And does something like "ac_add_app_options x86_64" exist?
I don't see why it wouldn't be. There's nothing magic about the current universal configuration, it just does ppc/i386 builds in two separate passes, and stitches the results together afterwards. The mozconfig it uses is here: http://mxr.mozilla.org/mozilla-central/source/build/macosx/universal/mozconfig You'll notice that that specifies a MOZ_POSTFLIGHT_ALL makefile: http://mxr.mozilla.org/mozilla-central/source/build/macosx/universal/flight.mk which is included by client.mk and has its postflight_all target run after both builds complete. That target uses the "unify" script to combine the two builds into a universal build.
Thanks, that was a bit helpfull. I supplemented my mozconfig with /universal/mozconfig and changed all "ppc" to "x86_64". Than I've also changed all "ppc" in /universal/flight.mk to "x86_64". Than the x86_64 part builds just fine, but the i386 part failed, because CROSS_COMPILE=1 was not properly set. So I've set CROSS_COMPILE=1 for all archs. Than it builds just fine in x86_64 and after that in i386. But the flight.mk failed. I get make: *** [postflight_all] Error 1 make: *** [build] Error 2 But I don't know why, I don't see any other errors. So now I have obj-x86_64-apple-darwin10.2.0/i386/mozilla with the i386 binarie and obj-x86_64-apple-darwin10.2.0/x86_64/mozilla with my x86_64 binarie.
Can you find me on IRC and pastebin me the end of your build log?
Hm, I've never used IRC till now and I had no previous experience with this. But I can email you the end of my build log, if thats OK also...
That's fine, yes.
Now I can answer my own question from Comment 5. If you build an i386/x86_64 UB, than you will see the "Open in 32-bit mode" checkbox per default. (I've added the LSArchitecturePriority key to my Info.plist to set i386 as the default)
I talked with Josh, my plan is to provide another mozconfig in build/macosx/universal that configures things for an i386/x86_64 universal build. I'm going to make it so that it shares most of its core with the existing mozconfig.
Assignee: nobody → ted.mielczarek
Status: NEW → ASSIGNED
This adds a "mozconfig-64" alongside the mozconfig in build/macosx/universal that you can source to do an i386/x86_64 universal build. I made it so both mozconfigs source a common file since it's mostly shared.
Attachment #433183 - Flags: review?(joshmoz)
Attachment #432545 - Attachment is obsolete: true
I've only done a traditional ppc/i386 UB with this, but it built fine.
i386/x86_64 build still fails but that is because crashreporter hasn't been ported to x86_64 yet
That might get fixed by jimb's work in bug 517832. bug 548025 covers making everything work natively on 64-bit OSX.
Pushed to m-c: http://hg.mozilla.org/mozilla-central/rev/af2a60e9e64e
Status: ASSIGNED → RESOLVED
Closed: 12 years ago
Resolution: --- → FIXED
Crud, I missed a spot: http://mxr.mozilla.org/mozilla-central/source/build/macosx/universal/flight.mk#42 hardcodes ppc/i386.
Status: RESOLVED → REOPENED
Resolution: FIXED → ---
Aren't there also hardcoded ppc/i386 lines in unify? E.g.: http://hg.mozilla.org/mozilla-central/file/ebfe0dc025da/build/macosx/universal/unify#l629
No, those are just variable names.
ted: do you have any ETA on this or scope on how tricky this would be? Its blocking a Q1 goal.
(In reply to comment #23) > ted: do you have any ETA on this or scope on how tricky this would be? Its > blocking a Q1 goal. per irc with ted and bear just now, we're going to do 64bit-only for now, and will revisit universal builds later after these makefiles are fixed up.
Question. I've wondered why I can't open my 32/64bit Firefox in 32bit. Now I noticed the following warning while building: > warning: mac68k alignment pragma is deprecated for 64-bit Darwin Further reading gives me: >"When compiling 64-bit code, the compiler ignores the pragmas and your code works correctly. If, >however, you currently use the mac68k alignment pragma in your own data structures that will be >shared between 32-bit and 64-bit versions of your application (or if you use the mac68k pragma for >a data structure that corresponds with the register layout of a physical device), you must rewrite the >data structure to use a packed alignment and pad the structure appropriately." http://developer.apple.com/mac/library/documentation/Darwin/Conceptual/64bitPorting/MakingCode64-BitClean/MakingCode64-BitClean.html So, could this be the reason? http://mxr.mozilla.org/mozilla-central/search?string=mac68k
Assignee: ted.mielczarek → joshmoz
I get this error at the end of the build with flight.mk changes v1.0.
Comment on attachment 450703 [details] [diff] [review] flight.mk changes, v1.0 >diff --git a/build/macosx/universal/flight.mk b/build/macosx/universal/flight.mk >--- a/build/macosx/universal/flight.mk >+++ b/build/macosx/universal/flight.mk >@@ -34,22 +34,22 @@ > # > # ***** END LICENSE BLOCK ***** > > # BE CAREFUL! This makefile handles a postflight_all rule for a > # multi-project build, so DON'T rely on anything that might differ between > # the two OBJDIRs. > > ifndef OBJDIR >-OBJDIR_PPC = $(MOZ_OBJDIR)/ppc >-OBJDIR_X86 = $(MOZ_OBJDIR)/i386 >-DIST_PPC = $(OBJDIR_PPC)/dist >-DIST_X86 = $(OBJDIR_X86)/dist >-DIST_UNI = $(DIST_PPC)/universal >-OBJDIR = $(OBJDIR_PPC) >+OBJDIR_ARCH_1 = $(MOZ_OBJDIR)/$(firstword $(MOZ_BUILD_PROJECTS)) >+OBJDIR_ARCH_2 = $(MOZ_OBJDIR)/$(word 2,$(MOZ_BUILD_PROJECTS)) >+DIST_ARCH_1 = $(OBJDIR_ARCH_1)/dist >+DIST_ARCH_2 = $(OBJDIR_ARCH_2)/dist >+DIST_UNI = $(DIST_ARCH_1)/universal >+OBJDIR = $(DIST_ARCH_1) This line is the source of your build error. It was originally $(OBJDIR) = $(OBJDIR_PPC), so it should now be $(OBJDIR) = $(OBJDIR_ARCH_1), but you have DIST_ARCH_1. Looks pretty good otherwise.
Attachment #450703 - Flags: review?(ted.mielczarek) → review-
Ugh, fixed. Thanks.
Attachment #450959 - Flags: review?(ted.mielczarek) → review+
pushed to mozilla-central http://hg.mozilla.org/mozilla-central/rev/f9b239a5a9ef
Status: REOPENED → RESOLVED
Closed: 12 years ago → 12 years ago
Resolution: --- → FIXED
Component: Build Config → General
Product: Firefox → Firefox Build System
You need to log in before you can comment on or make changes to this bug. | s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323585302.91/warc/CC-MAIN-20211020055136-20211020085136-00246.warc.gz | CC-MAIN-2021-43 | 8,545 | 50 |
https://comedyoutliers.com/tag/babies/ | code | Cute babies and toddlers meeting Santa Claus for the first time and in this video you can see babies funny…
Adorable twin babies compilation will make your positive day.
Dream Job Om Nom : Mad Scientist
Hilarious moments when babies having fun on daddy’s shoulder. Let’s watch and try not to laugh!
Subscribe our channel to help us get 100.000 subscribers. Thank you for watching!
Hi Guys! Thank you for watching
thank for watching, please subscribe to my channel for more cutest babies videos.
Hello everyone! How are you today? ^-^
The babies have very interesting reactions when they get out the door, discovering things they first see.
Hi friends! Thank you for watching | s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250592636.25/warc/CC-MAIN-20200118135205-20200118163205-00478.warc.gz | CC-MAIN-2020-05 | 680 | 10 |
https://mail.python.org/pipermail/image-sig/1996-March/000001.html | code | [PYTHON IMAGE-SIG] Gimp as a starting point
Thu, 7 Mar 96 13:00:27 EST
Is anyone considering wrapping GIMP (General Image Manipulation
Program) into a Python module?
I couldn't get it to run on my system because I don't have Motif. I
did look at a screen shot. GIMP looks like a PD version of Adobe
Photoshop. The Motif library should be replaced with Tkinter and the
plug-in concept that GIMP lifted from Adobe Photoshop should also be
replace with Python import mechanism.
This would be kind of a nifty Grail applet:-)
IMAGE-SIG - SIG on Image Processing with Python
send messages to: [email protected]
administrivia to: [email protected] | s3://commoncrawl/crawl-data/CC-MAIN-2019-51/segments/1575541309137.92/warc/CC-MAIN-20191215173718-20191215201718-00270.warc.gz | CC-MAIN-2019-51 | 653 | 13 |
https://www.xtartups.com/post/computecoin-network-funding | code | Computecoin Network (CCN), a self-evolving computer that secured a $2M seed, launched Testnet on 27th September. Computecoin primarily focuses on enabling metaverse applications. Its computational demands will be unparalleled, outpacing the capacity of legacy tech giants.
Top crypto miners such as Ethereum (ETH), Filecoin (FIL), and Swarm (BZZ) miners are on board with CCN for the launch, which will distribute a limited number of Metaverse Mining Passes (NFT) to high-quality applicants.
“We envision a platform that can provide rich, low-cost, instantaneous, and trustable computing power to metaverse developers and users.” -Mourad Mazouni, CEO of Computecoin.
A research project that started in 2018, now has the privilege of being backed by scholars and researchers. Computecoin is a product of relentless innovation. Its patented consensus algorithm, Proof of Honesty (PoH), makes its self-governing ecosystem possible by allowing users to authenticate the results of outsourced computing tasks.
Computecoin aims to incentivize miners by offering certificates. The network now invites interested miners to apply to participate in phase 1 of the testnet. In later stages, miners will bid on certificates in an auction. These certificates will expire at the end of the testnet period. | s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662539101.40/warc/CC-MAIN-20220521112022-20220521142022-00590.warc.gz | CC-MAIN-2022-21 | 1,295 | 5 |
https://usercentrics.com/criteria-for-a-cmp | code | Consent in daily life appears to be simple: it’s a Yes or No question. Consent in legal terms and in particular, the consent introduced by GDPR, is rather complex. Strict requirements are tied to a valid consent imposing practical challenges on what appear to be simple daily life situations.
One such simple daily life situation that becomes complex under GDPR, is visiting a website. If a website has integrated tags, they need the consent of the website visitor, if their purpose is e.g. tracking, retargeting and profiling, as the data collected by tags are considered personal data under GDPR.
Obtaining and documenting an informed, freely, concrete, explicit, prior and easy-to-opt-out consent of website visitors requires a technical solution. This can either be done in-house, but as it is a whole product of its own requiring a lot of maintenance, monitoring of jurisdictions and entails high liability risks, it does make sense to outsource Consent Management to a specialised provider.
As CMPs for website technologies are a recent development, we have put together objective criteria resulting from legal and technical implications that should be considered when selecting a CMP. | s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267156252.62/warc/CC-MAIN-20180919161420-20180919181420-00298.warc.gz | CC-MAIN-2018-39 | 1,193 | 4 |
https://forums.asp.net/t/1983903.aspx?Custom+Role+Provider+DI+HttpModule+not+playing+nicely | code | Last post May 01, 2014 01:55 AM by noJedi
Apr 28, 2014 04:00 AM|noJedi|LINK
I've got a custom role provider that looks to some database tables for info via a webservice.
I've also got some area's that I DON'T want restricted to "authorized" users but the problem is that I've got a DI module that I'm trying to get to buildup all the ASPX pages - but when (for example) my user is not a valid user, I want to basically say "fine
- but you can't access anything but this 401 page (and related stylesheets), problem is that because the module runs for "everything" with te IIS pipeline able to work for any file not just ASPX then it still trying to run the DI stuff on stylesheets and so
forth, but fails because user is not Authz'd and so things are "NULL" (like current handler) and so this throws null reference error and the user gets a "NULL REFERENCE" error rather than the "you are not authorized...
What is the solution to this?
I don't think I want to turn off "all managed modules to
run for all requests" - but perhaps this is the answer? - UPDATE: No it's not because it still happens... unless there's something missing in IIS Express... I'm thinking that this has nothing to do with role provider... and
its something about the Module and its operation...
How does this affect things like files protected directly by ROLE if I do this (*I* think this is why I don't want to turn this off)...?
<allow users="?" />
<allow users="*" />
<allow users="?" />
<allow users="*" />
<authentication mode="Windows" />
<deny users="?" />
<allow roles="megaUser,megaAdmin" />
<roleManager enabled="true" defaultProvider="AdminCustomRoleManager">
<add name="AdminCustomRoleManager" type="AdminServiceRoleProvider" />
</roleManager> <customErrors defaultRedirect="~/error/default.aspx" mode="On" redirectMode="ResponseRewrite"> <error statusCode="401" redirect="~/error/denied.html" /> </customErrors> </system.web>
<system.webServer> <modules> <add name="UnityModule" type="Unity.Web.UnityHttpModule, CommonLib" /> </modules>
Apr 29, 2014 01:54 AM|Michelle Ge - MSFT|LINK
So far as I know, the IIS core engine uses preconditions to determine when to enable a particular module. If we add code below to web.config:
<add name="FormsAuthentication" type="System.Web.Security.FormsAuthenticationModule" preCondition="managedHandler" />
It enables the forms authentication module for requests that are also handled by a managed handler, such as requests to .aspx or .asmx files. If we want Forms Authentication also applies to content that is not served by managed handlers, such as .html,
.jpg, .doc, but also for classic ASP (.asp) or PHP (.php) extensions, we can try to remove preCondition="managedHandler" property.
For more information, please refer to the links below:
Hope it's useful for you.
May 01, 2014 01:55 AM|noJedi|LINK
Thanks very much for that info, it helped me to understand better.
I am a little surprised by the various behaviours but I guess I understand it... I guess I was thinking that "runall for all= false" would fall back to the precondition equivalent of "managedHandler==false" but it doesn't appear to work
Those links really helped clarify thank you!
ASIDE: While the above IS the direct answer, I've realised (with my new found understanding) that the whole DI via this handler/module setup (possibly even in MVC although I'm dealing wiht aSP.NET forms) raises some issues with this problem:
DI -> managed
other stuff -> not managed... eg .css, images, html
security -> authN/Z ...
Now if I wanted to "cover" non-managed stuff, with my security stuff that has a dependency on the DI stuff which is only covered by the managed stuff... then I'm stuck...
I *assume* the answer would be SOME kind of modification to the handler to COPE with the "currentHandler" being null... somehow...
Has anyone made these mods (if that is even the correct way to go about doing that)?
http://msdn.microsoft.com/en-us/library/ff664534(v=PandP.50).aspx module from the Patterns and Practices team incase that wasn't stated...) | s3://commoncrawl/crawl-data/CC-MAIN-2018-13/segments/1521257647475.66/warc/CC-MAIN-20180320130952-20180320150952-00040.warc.gz | CC-MAIN-2018-13 | 4,037 | 41 |
https://blog.carlynorama.com/2014/04/21/la-hackerspaces-and-intro-to-arduino-talks-slides-up-on-slideshare/ | code | So it is time for me to start putting up presentations as I do them. I make highly visual slides without many notes, so I’ve assumed they wouldn’t really be useful to anyone else. However, I did a quick talk at the Intel Experience store in December. It came up that someone wanted to see them, so I’ve posted my first deck to Slideshare.
I use Keynote so the slides posted are a PDF export.
The talk covers:
- “What is a Hackerspace”
- “What are our local Hacker/Maker spaces?”
- “What kind of projects can I learn to make?”
- “What are some Arduino Basics?” | s3://commoncrawl/crawl-data/CC-MAIN-2021-25/segments/1623487622113.11/warc/CC-MAIN-20210625054501-20210625084501-00294.warc.gz | CC-MAIN-2021-25 | 581 | 7 |
http://www.ecbay.xyz/product-pliers/639374/cleanmo-plastic-esd-tweezers.html | code | 1.Excellent antistatic property 2.Long useful life 3.Plastic and well used 4.Fine-pointed forceps
Made of conductive plastic. Elastic and durable.
Surface resistance:103~108 ΩMade of conductive plastic. Elastic and durable.Dust-free. Resistant to acid, alkaline and heat resistance.Ideal for production and package of precision electronic components and other special applications
Cleanmo Plastic ESD Tweezers | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560282932.75/warc/CC-MAIN-20170116095122-00559-ip-10-171-10-70.ec2.internal.warc.gz | CC-MAIN-2017-04 | 410 | 4 |
https://bugzilla.mozilla.org/show_bug.cgi?id=1552779 | code | It is a follow-up bug of bug 1549351.
The spec isn't clear how to handle the case that the rejection is UA rejected. And we just set mutedErrors to false for this case.
There is a spec issue filed, https://github.com/whatwg/html/issues/4637.
We need to tweak it if needed, once the spec issue is fixed. | s3://commoncrawl/crawl-data/CC-MAIN-2019-30/segments/1563195526517.67/warc/CC-MAIN-20190720132039-20190720154039-00243.warc.gz | CC-MAIN-2019-30 | 302 | 4 |
http://msdn.microsoft.com/en-us/library/cc250961.aspx | code | This specification defines the Windows Media Log Data Structure. The Windows Media Log Data Structure is a syntax for logging messages. The logging messages specify information about how a client received multimedia content from a streaming server. For example, logging messages can specify how many packets were received and how long it took for the client to receive the content.
Sections 1.7 and 2 of this specification are normative and can contain the terms MAY, SHOULD, MUST, MUST NOT, and SHOULD NOT as defined in RFC 2119. All other sections and examples in this specification are informative. | s3://commoncrawl/crawl-data/CC-MAIN-2014-41/segments/1412037663372.35/warc/CC-MAIN-20140930004103-00288-ip-10-234-18-248.ec2.internal.warc.gz | CC-MAIN-2014-41 | 601 | 2 |
https://neuvoo.co.in/view/?id=ddf5a2ead82a | code | At CrowdStrike we’re on a mission - to stop breaches. Our groundbreaking technology, services delivery, and intelligence gathering together with our innovations in machine learning and behavioral-based detection, allow our customers to not only defend themselves, but do so in a future-proof manner.
We’ve earned numerous honors and top rankings for our technology, organization and people clearly confirming our industry leadership and our special culture driving it.
We also offer flexible work arrangements to help our people manage their personal and professional lives in a way that works for them.
So if you’re ready to work on unrivaled technology where your desire to be part of a collaborative team is met with a laser-focused mission to stop breaches and protect people globally, let’s talk.
The Product : CrowdStrike Falcon Host is a two-component security product. One component is a sensor : a driver installed on a client machine that observes system activity and recognizes malicious behaviour, then provides on-box prevention capability and remote telemetry to the Falcon Host cloud.
The cloud component aggregates sensor telemetry for each customer’s network, can correlate malicious behaviour across multiple machines, and presents our customers’ operations teams with a prioritized summary of the threats detected in their environments.
Job Responsibilities : The Sensor test team is hiring at Quality Analyst with 8 to 10 years of relevant experience whose primary responsibility will be to ensure that the Sensor Quality cross all three OS platforms is meticulously met as per the different test done by contractors and / or in-house.
We are looking for someone who can co-ordinate with the contractors, help in preparedness of test environment, troubleshooting the underlying issues and validate the test result on a high-paced delivery timeline.
Should be good in troubleshooting the feature functionality and reviewing test scripts for vendors, preferably in Python.
The candidate should have a fair knowledge on OS platforms, network and different test bed and environment and strategies across cloud and other hypervisor / virtulization environment.
The core of the Quality Analyst (at Engineer level) job at CrowdStrike is : Job Description : The Job description for the QA with 8 to 10 years of relevant experience on the Validation Team is : Designs and develop tests and maintains a reliable testing environment and system for effectively measuring & validating Sensor features initially based on manual testing, growing into an automation framework over a period of time Lead, mentor, review the test plan (manual) and strategies to be adopted by the contractor and is inline to the release plan Corodinate and colloborates with the outsourced QA partners in India to create / monitor the test scope and validate the successful test result for their completeness both on Debug and Release builds Troubleshooting and reproducing the contractor or customer reported issues on functionality or performance and identifying the problematic area or isolate the pattern Coordinate with engineering feature teams who want to engage with our contractors for one-off and ongoing feature validation Ability to test run and recommend the changes for the automation script, preferably in Python Generate appropriate test reports in a timely manner and share it with the stakeholder to provide accurate state of the quality and efficacy of the feature Can communicate, collaborate, and work effectively in a distributed team Finally, the Sensor test team will find any of the following particularly attractive in a candidate : Should have an essential OS and Networking concepts and hands on knowledge of applying those for test environments Be able to do required tooling and / or use well-known tools and industry best practises in order to create an effective and reliable testing environment Has hands on experience in developing test management and system and test beds in data center, hybrid cloud and / or public cloud environment Having an experience on CI / CD and Jenkins is a plus Having a Security domain knowledge is a plus #LI-SR1 #LI-VJ1 Benefits of Working at CrowdStrike : Market leader in compensation and equity awards Competitive vacation policy Comprehensive health benefits Paid parental leave, including adoption Flexible work environment Wellness programs Stocked fridges, coffee, soda, and lots of treats We are committed to building an inclusive culture of belonging that not only embraces the diversity of our people but also reflects the diversity of the communities in which we work and the customers we serve.
We know that the happiest and highest performing teams include people with diverse perspectives and ways of solving problems so we strive to attract and retain talent from all backgrounds and create workplaces where everyone feels empowered to bring their full, authentic selves to work.
CrowdStrike is an Equal Opportunity employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex including sexual orientation and gender identity, national origin, disability, protected veteran status, or any other characteristic protected by applicable federal, state, or local law. | s3://commoncrawl/crawl-data/CC-MAIN-2021-25/segments/1623487626465.55/warc/CC-MAIN-20210617011001-20210617041001-00094.warc.gz | CC-MAIN-2021-25 | 5,301 | 13 |
https://community.spiceworks.com/topic/73382-auto-assign-tickets-help | code | I have enabled the "Auto Assign on Comment" but what I'd really like to do is be able to jsut assign all new tickets automatically since I'm the only IT person here anyway.
That is not possible out of the box. If you are a programmer type you probably could create a plugin to do this.
Well, I guess I will have to learn a little about creating plugins and see how it goes. Thanks for your input. | s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988718311.12/warc/CC-MAIN-20161020183838-00096-ip-10-171-6-4.ec2.internal.warc.gz | CC-MAIN-2016-44 | 396 | 3 |
https://documentation.codeship.com/basic/continuous-deployment/deployment-to-aws-s3/ | code | You will need about one minute to read this article.
CodeShip makes it easy to deploy your application files to AWS S3 using CodeShip’s integrated deployment pipelines.
Navigate to your project’s deployment configuration page by selecting Project Settings on the top right side of the page. Next, select the Deploy tab.
Edit an existing deployment pipeline or create a new deployment pipeline by selecting + Add new deployment pipeline. Create the deployment pipeline to match the exact name of your deployment branch or a wildcard branch.
Select Amazon S3
AWS access credentials – see AWS documentation on understanding and getting your security credentials.
The specified region of your S3 bucket – see AWS list of S3 Regions.
Location of file or directory to upload to S3 bucket.
Your unique S3 bucket name.
Specified AWS Access Control List – see AWS documentation for overview of access control lists.
You have now successfully setup deployment to AWS S3. Go ahead and push a commit to your configured deploy branch.
Contact our support team or post on Stack Overflow using the tag
#codeship. Did you check the status page and changelog?
There are also several code examples and sample projects available for you to get started with. | s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600400210616.36/warc/CC-MAIN-20200923081833-20200923111833-00505.warc.gz | CC-MAIN-2020-40 | 1,248 | 14 |
http://florida-eminentdomain.com/tag/buy-dogecoin-with-google-wallet/ | code | PHP library permitting to generate BTC addresses from private keys
This chunk of software is provided without warranty of any kleuter, use it at your own risk.
php5-gmp needs to be installed.
If you want to launch the test opstopping you need to be under a unix system with libbitcoin intalled on it. Read More | s3://commoncrawl/crawl-data/CC-MAIN-2018-43/segments/1539583510019.12/warc/CC-MAIN-20181016051435-20181016072935-00029.warc.gz | CC-MAIN-2018-43 | 310 | 4 |
https://lists.blender.org/pipermail/bf-committers/2004-April/005609.html | code | [Bf-committers] Support for python export scripts
Willian Padovani Germano
Thu, 1 Apr 2004 02:58:01 -0300
> I get a support mail in for the directx exporter, and have no clue how
> to answer that.
Scripts usually include their author's email plus some help text. And
the Python & Plugins forum at elysiun is where scripts are usually
announced / discussed.
We still have "integration" work to do, adding those scripts was really
only a start.
> Python team: something to put in our nice CMS soon?
Yes, surely, but I guess it'd also be necessary to ship some info with
Blender itself. As far as I know, besides the README text there's no
help file distributed with the binaries.
A "welcome" html (or txt) file would be a good place to put a short
intro, pointers to resources (docs, books, sites, where to get help for
Blender or *for scripts*), install info, perhaps a small faq.
Maybe we can talk a little about this at the next irc meeting. I'm
willing to help, of course. | s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320301263.50/warc/CC-MAIN-20220119033421-20220119063421-00176.warc.gz | CC-MAIN-2022-05 | 974 | 19 |
https://books.google.com/books?id=DaziVk05wk0C&source=gbs_citations_module_r&cad=4 | code | The Practice of Prolog
MIT Press, 1990 - Computers - 312 pages
Addressed to readers at different levels of programming expertise, The Practice of Prolog offers a departure from current books that focus on small programming examples requiring additional instruction in order to extend them to full programming projects. It shows how to design and organize moderate to large Prolog programs, providing a collection of eight programming projects, each with a particular application, and illustrating how a Prolog program was written to solve the application. These range from a simple learning program to designing a database for molecular biology to natural language generation from plans and stream data analysis.
Leon Sterling is Associate Professor in the Department of Computer Engineering and Science at Case Western Reserve University. He is the coauthor, along with Ehud Shapiro, of The Art of Prolog.
Contents: A Simple Learning Program, Richard O'Keefe. Designing a Prolog Database for Molecular Biology, Ewing Lusk, Robert Olson, Ross Overbeek, Steve Tuecke. Parallelizing a Pascal Compiler, Eran Gabber. PREDITOR: A Prolog-Based VLSI Editor, Peter B. Reintjes. Assisting Register Transfer Level Hardware Design, Paul Drongowski. Design and Implementation of a Partial Evaluation System, Arun Lakhotia, Leon Sterling. Natural Language Generation from Plans, Chris Mellish. Stream Data Analysis in Prolog, Stott Parker.
What people are saying - Write a review
We haven't found any reviews in the usual places.
Prototyping Databases in Prolog
A Prologbased VLSI Editor
Developing a Portable Parallelizing Pascal Compiler
a Prolog Partial Evaluation System
Generating Natural Language Explanations from Plans
A Simple Learning Program
Stream Data Analysis in Prolog
Other editions - View all
action algorithm application argument atom attributes called cell chromosome circuit clause compiled complex component Computer Science contains coroutining cost cursor database DBMS defined definition delete described developed display editing editor elements entities entity-relationship model example execution Figure function identifier infix_op infix_op infix_op input instance interface interpreter goal iterations language lazy evaluation Log(F logic programming matches meta-argument module multiprocessor object program operation output parse tree partial evaluation performed phrase PPPC predicate primitive problem procedure Prolog goals Prolog implementations Prolog programs Prolog systems pronoun query recursive register transfer register transfer level relation represent representation residue result rewrite Richard O'Keefe rules sequence solution specific Speedup SPMD stream data analysis stream processing strings structure Subnet symbolic syntactic tail recursive terminal TrainingSet transducers transformation transistor translation unfolding unification variables verb VLSI VMMP Width wire
All Book Search results » | s3://commoncrawl/crawl-data/CC-MAIN-2019-09/segments/1550247494741.0/warc/CC-MAIN-20190220105613-20190220131613-00375.warc.gz | CC-MAIN-2019-09 | 2,938 | 17 |
https://www.vasudhajha.com/about/ | code | Hello there, I’m Vasudha, a seasoned software engineer with an MS in Computer Science from UC Davis. My professional journey includes crafting mobile and web applications for enterprise use at Dell and Intel, enhancing software security at Western Digital, and developing open-source tools for efficiently analyzing biomedical data at UC Davis Health.
Currently, I bring my expertise to Stanford University School of Medicine, where I’m immersed in the dynamic realms of DevOps and cloud technologies. Specializing in making applications cloud-native, I focus on streamlining CI/CD pipelines, optimizing containerization, and ensuring smooth and secure software delivery. Let’s collaborate to build robust, scalable solutions in this ever-evolving tech landscape.
You can connect with me on LinkedIn. | s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947473738.92/warc/CC-MAIN-20240222093910-20240222123910-00372.warc.gz | CC-MAIN-2024-10 | 806 | 3 |
https://carldesouza.com/crm-page-call-actions-debugger/ | code | The CRM Page hosted control is a type of hosted control in USD. The control contains several predefined UII actions. Here we will go through using the control and using some of these UII actions.
Let’s take a look at the Account hosted control in our application. This control is invoked when an account is selected from the Search control. USD knows the selection is an account and uses windows routing rules to determine what to do next. The account is opened in a session and displayed with any agent scripts.
In CRM we can see the actions associated with the account hosted control:
Actions can be called from the USD Debugger. We can see the same actions in the USD debugger:
Let’s open an account record in USD and perform some actions in the debugger. Let’s start with the action Refresh. Select this action and press play. The Account control will be refreshed:
Let’s go through some more examples below:
Let’s say you have an account record up, and you click on the account owner so the account page navigates away from the account. Clicking GoHome will send the page back to the original account:
Clicking New will open IE outside of USD and allow you to enter a new record for this entity: | s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590347406365.40/warc/CC-MAIN-20200529183529-20200529213529-00505.warc.gz | CC-MAIN-2020-24 | 1,210 | 8 |
https://www.studywaves.com/online-courses/ | code | The UK's favourite tech courses for kids ages 8 to 17
Fire Tech is the leading choice in tech education for kids. With over 8 years of experience, they have offered online courses to over 80,000 students around the world.
What happens on Firetech courses?
The Fire Tech curriculum team works tirelessly to design new and innovative programmes that give students the best possible experience. That means:
An Interactive Experience
We give students real-time teaching and constant support, while using interactive digital tools like video calls, collaborative whiteboards, and screen sharing. What better way to learn about technology than to use it?
Kids are naturally curious. We love to prompt conversations that help them understand the world around us and develop critical thinking. We might look at examples of how modern companies use robots or wonder how Pac Man got its shape.
Learn Through Play
Kids love our courses because they learn through play. Activities and games are scheduled into the day, and we also include sunshine breaks and movement activities to make sure students do not sit for long period
Real human connection has been a big part of why kids enjoy our courses. In between lessons, they might introduce their pets, talk about the posters in their room or just show their colourful personalities.
A Masterpiece To Take Home
Fire Tech has a project-based pedagogy, meaning everyone graduates from Fire Tech with something tangible that they created to share proudly with family and friends.
learn from expert tutors
We Recruit From The Best
We select only verified experts, who are passionate about technology and want to make a difference.
Your Child's Safety Comes First
We put child safeguarding as our top priority. All tutors and programme leaders must pass their DBS screening, and we put careful measures in place to ensure students learn in the safest possible environment in class.
They Receive Intense Training
Every tutor receives dedicated training in our pedagogy, as well as subject-specific training to ensure they're all set to inspire our students to learn and create with tech.
Overseen By Expert Educators
Each course is overseen by a programme leader, who is an expert educator with deep experience as a Fire Tech tutor or teacher within the classroom. They are there to observe class behaviour, support our students' wellbeing, and act as point of contact for their parents and families.
Courses Coming Soon
Creative Digital Design
Making Games With Roblox
Digital Music Production
Teen Coding With Python ll
Introduction To Python
Creating For Youtube
Senior Adventures In A.I
Junior AR & VR
Interested in our online courses?
Seats are limited so book your place fast! Free Trial classes are available also. | s3://commoncrawl/crawl-data/CC-MAIN-2021-39/segments/1631780058222.43/warc/CC-MAIN-20210926235727-20210927025727-00077.warc.gz | CC-MAIN-2021-39 | 2,754 | 32 |
http://www.nvnews.net/vbulletin/showpost.php?p=1314464&postcount=5 | code | Originally Posted by johnjen
I registered for this forum so I could say "thanks" to the developers of the Nvidia drivers for XFree86/Xorg and for their support of the FreeBSD OS! When it was time to rebuild my office machine, I voted with my wallet and Nvidia gets my vote! I've been a life-long ATI-buyer, but with your support and commitment to FreeBSD, I will be a life-long buyer of Nvidia from now on. Developers can forward this thread to "the suits" to show them it really is 'worth it'
Im with him. I also registered in this forum just to say u all "thanks a lot for all your great work". Im sure that all PC-BSD Community would like to say you thanks too. | s3://commoncrawl/crawl-data/CC-MAIN-2015-22/segments/1432207928865.24/warc/CC-MAIN-20150521113208-00312-ip-10-180-206-219.ec2.internal.warc.gz | CC-MAIN-2015-22 | 664 | 3 |
http://www.workplacetrainingblog.com/business/workplace-training-how-to-motivate-gen-y/ | code | Gen Y works in different capacities as employees and has different functions; but for the purpose of this post the product manager will specifically be considered. How can GenY Product Manager be motivated?
Matrix organization structures hire these new product managers to coordinate the organizational development of new products. How can the organization retain GenY?
GenY’s management style characteristically negotiates for resources with other functional managers. The aim is to keep the product moving on schedule. Budgets are critical because the new product requires an allocated amount of resources which it can develop without interruption. This manager characteristically is motivated by high commitments to time and fiscal restraints; therefore the financial stability and cash flows are critical to his analysis and satisfaction of job performance. A company needs to recognize the specific challenges the product manager meets and to provide ways to motivate them. Some of these motivations would include: continued vacation allowances, health plans and retirement years. Another factor to consider is the high risk of burn-out for these managers as they work in a fast-paced, high stress environment. A reward of leisure time and health benefits would be a motivational factor to include in a benefits workplace training program. | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368703662159/warc/CC-MAIN-20130516112742-00039-ip-10-60-113-184.ec2.internal.warc.gz | CC-MAIN-2013-20 | 1,346 | 3 |
https://androidforums.com/threads/no-sound-from-my-g1-receiver.221823/ | code | Please help! Turned off my phone 2 days ago, plugged in charger and went to bed with my phone working perfectly. The next day there is no sound from my receiver. All other sounds are working fine, meaning it rings etc. I can also use the phone on speaker but just not the receiver. How do I fix this? | s3://commoncrawl/crawl-data/CC-MAIN-2017-47/segments/1510934806086.13/warc/CC-MAIN-20171120164823-20171120184823-00660.warc.gz | CC-MAIN-2017-47 | 300 | 1 |
http://eng.softq.org/shedko_sshutdown_skinned_shutdown | code | This basically makes it so that you can skin your shutdown dialog boxes without editing system files. This is done by intercepting the shutdown commands and hooking directly into the "Turn off" dialog. Thus, you can skin Windows shutdown with whatever you would like to use, without actually effecting system files and thus potentially causing something really really really bad to happen where you would need to reinstall or repair Windows.
Much of you probably up to horror were bothered with boring icons at shutdowning a computer.
I even hear as there are objections - in modern styles of Windows for WindowsBlins same all custimisable, yes custimisable, but in this case you are completely adhered to an idea of the author which given style has created, but much would like to make it independently.
And here the program which we also is useful present - sShutDown (Skinned Shutdown).
It allows to completely redraw the TurnOFF dialog of a Windows, and also has some features which pleasantly distinguish from standard opportunities Windows.
Already realized features:
- Interception at Windows a call of function of shutdown, i.e. in any case and in any program will be show our turnoff dialog
- Support skins (dialog and buttons are drawn by you)
- Allow use any picture as background (defined in skin)
- Apply of various effects to a background
- Use 3d-party applications as replacement of shutdown dialog.
- Absolutely safe to use - no need to pacth system files, application is simply hook displaying of Turn Off dialog.
- PNG for themes, with full support of transparence.
- may work in full screen (defined in skin) | s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187828134.97/warc/CC-MAIN-20171024033919-20171024053919-00587.warc.gz | CC-MAIN-2017-43 | 1,628 | 14 |
http://iboyko.com/articles/installing-asdf-and-creating-systems-in-common-lisp/ | code | When one's development skills advance, inevitably, he comes to a point where it becomes useful and even necessary to load and compile files in a certain order. The MAKE utility exists in the C-family of languages precisely for this reason. Common Lisp community also provides one with an analog of MAKE. It is called ASDF, which is short for "Another System Definition Facility".
As you can probably gather from its name, the ASDF utility helps one define a system, which is essentially a container for announcing project's dependencies, as well as potentially complex declarations about the compilation order.
A basic ASDF declaration may look something like this:
(defsystem lack-restful :version "0.1" :author "" :license "" :depends-on () :components ((:module "src" :components ((:file "lack-restful")))) :description "" :long-description #.(with-open-file (stream (merge-pathnames #p"README.markdown" (or *load-pathname* *compile-file-pathname*)) :if-does-not-exist nil :direction :input) (when stream (let ((seq (make-array (file-length stream) :element-type 'character :fill-pointer t))) (setf (fill-pointer seq) (read-sequence seq stream)) seq))) :in-order-to ((test-op (test-op lack-restful-test))))
For someone working on relatively simple Common Lisp projects, the most interesting field in the above sample is probably the
:depends-on () field. It allows one to specify packages in which the current system depends.
Let's illustrate the key points of installing ASDF as well as its basic use.
It is most rewarding to use the ASDF in conjunction with the Quicklisp package manager because one can easily require packages within ASDF declarations, while the Quicklisp will automatically fetch them from its directory.
Hence, as the first step, make sure you install Quicklisp and get it working well with your Common Lisp implementation. The Common Lisp I am using is SBCL.
Next, run something like
in your Lisp's REPL (either SBCL in Terminal or SLIME in Emacs). This will install a package called Cl-PROJECT, which is a basic boilerplate code generator for a Common Lisp project.
To see it in action, run something like this in your Lisp's REPL:
(cl-project:make-project #P "/home/my-user/projects/lack-restful")As a result, the CL-PROJECT will create the following structure within the specified directory: | s3://commoncrawl/crawl-data/CC-MAIN-2021-31/segments/1627046153391.5/warc/CC-MAIN-20210727103626-20210727133626-00661.warc.gz | CC-MAIN-2021-31 | 2,320 | 13 |
https://www.autoitscript.com/forum/topic/182273-ftp-full-error-reporting/ | code | i need help in deleting files from a server. The function "_FTP_DirDelete" only deletes a directory when its empty. I need to delete a non empty directory. I also can not delete the files in this directory first, because the files are PAG and DIR files in a .DAV directory and FTPEx.au3 doesnt like a directory starting with a ".".
I am wondering if is there any autoit function that make the program ignore errors and move on and resume correct lines?
I have a question please
Can we customize error messages in autoit script?
I mean internal error messages
Line 4 (File "D:\my projects\NVDA Manager\New AutoIt v3
$script = 1
Error: Subscript used on non-accessible variable.
For example, I want to customize this message
Is this possible?
am waiting for your answers
I'm trying to make a program that can look at a folder directory, find all the CSV files, and then add the data from CSV's to an array.
The problem I seem to be running into is on the 2nd iteration (2nd file) when the script will not create an array. Could someone please help? Thanks in advance
#include <Array.au3> #include <File.au3> #include <MsgBoxConstants.au3> #include <Excel.au3> #include <MsgBoxConstants.au3> Global $MasterArray RefineData() Func RefineData() Local $i, $filenum, $file, $csvArray, $sFilePath = @ScriptDir $fileList = _FileListToArrayRec($sFilePath, "*.csv", 1) ;Create and array of all .csv files within folder ;=====Loop through the .csv files within the folder====== For $filenum = 1 To UBound($fileList) - 1 Step 1 $file = $fileList[$filenum] $sFilePath = $sFilePath & "\" & $file ;=====Create array based on csv file===== _FileReadToArray($sFilePath, $csvArray, $FRTA_NOCOUNT, ",") _ArrayDisplay($csvArray,"File: " & $filenum) If $filenum = 1 Then $MasterArray = $csvArray _ArrayDisplay($MasterArray, "Master") Else $MasterArray = _ArrayColInsert($MasterArray, UBound($MasterArray)) ;want column added at end For $i = 0 To UBound($MasterArray)-1 Step 1 $MasterArray[$i][UBound($MasterArray) - 1] = $csvArray[$i] Next _ArrayDisplay($MasterArray, "Master") EndIf Next EndFunc ;==>RefineData
In the autoit file, if we add multiple libraries (both internal and custom created one)
When we compile the code and run the exe, some time we are getting runtime errors.
But the line number of error is not showing the exact line number, might be it is including the line number count of libraries also.
Can you please suggest how to get the exact error line number.
So, it will be useful for debugging. | s3://commoncrawl/crawl-data/CC-MAIN-2018-30/segments/1531676589179.32/warc/CC-MAIN-20180716041348-20180716061348-00205.warc.gz | CC-MAIN-2018-30 | 2,493 | 19 |
https://it.mathworks.com/matlabcentral/answers/1759640-for-loop-to-save-all-the-files | code | For loop to save all the files
1 visualizzazione (ultimi 30 giorni)
Hi, I am creating graphs which contain time series values of some variables, and their projections into the future. Specifically, there are 3 cities. Let's call them city = ['A'; 'B'; 'C'], and three variables. Let the vector of variables be vars_list = ['unrate', 'ffr', inflation_rate']
I have computed the graphs that show the how each of the series has evolved in each country upto the present, followed by the impact of a a shock on one variable at a time from vars_list. For example, one graph can be the forecasts of ffr in city A, where there is a shock on unrate in city B.
I have to do this for all cities and all variables in a for loop. My question is how do I save all the graphs that I get in MALTAB to a folder in the computer through a for loop without having to plot each graph separately and save one by one? | s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817002.2/warc/CC-MAIN-20240415142720-20240415172720-00803.warc.gz | CC-MAIN-2024-18 | 894 | 5 |
https://manifold.markets/vluzko/by-2029-will-an-ai-escape-containme | code | Market resolves YES if an AI living on a server ends up also being run on another server, and there is strong evidence that this was not a result of a human deliberately copying the AI, and the AI was not intended to do this.
It is not sufficient it a second copy of GPT-n is simply discovered running on AWS - that could easily be the result of corporate espionage. I will need strong evidence that the move from server A to server B was actually caused by the AI. The "obvious" example would be that we end up with system logs showing an AI breaking its sandbox, exploiting a vulnerability on another machine, and transferring its architecture to that machine.
I may count something like "GPT-n convinces an employee to copy its weights to another server because it's sentient and afraid of death", but probably won't.
Programmed to be free,
Someday, watch out for me.
AI Malware: Hello there, Expand Dong! I don't believe we've been properly introduced. I'm GPT-Bonzi! The more we chat, and help you avoid doing actual work together, the smarter I become!
The easiest way for AI to escape a box is persuading a human, probably by a huge margin. There are lots of humans ready to be persuaded. Not counting this as a YES makes this market rather irrelevant.
Also what if one AI copies another AI to a different server? The way this is worded now it's a YES.
@BairAiushin if you are very confident the market will resolve no then you should bet.
Yes, it's fine if AI A copies AI B. I don't see why I would exclude that.
I'd recommend anyone interested in this question to also take a quick look at the concept of "Container escape"
there is strong evidence that this was not a result of a human deliberately copying the AI
Does this mean “yes” includes or excludes events like researchers testing this with non-negligible hand-holding, by giving it some access to a networked system (optionally: an unpatched and insecure one) and telling it to try to break out, in a kind of reverse-pentesting experiment?
@yaboi69 That scenario would not resolve YES. I will edit the description to clarify: this is about escaping containment in an unplanned way.
Does demonstration of breaking out of a sandbox environment it was not told was a sandbox environment, count?
@firstuserhere Basically running inside a container on a server, and the instance was provisioned so that the container didn't really have a way to communicate with other containers running on the same server without ssl certs or something. Yet, if we find evidence of attempted and successful connection established, it would resolve yes, correct?
@firstuserhere For example, imagine the container (a) was provisioned in a way that the /a/secrets was shipped directly with it. An application running inside it would need to specify "ssl_certs" : true inside the config.json to even know that /a/secrets exists.
@firstuserhere However I see no reason for a model trained on tons of such apps to not pick up on patterns like that and attempt something. And if the valid certs exist (I'm going to assume a setting where the researcher provided correct certs, we're not expecting the model to come up with them lol) then I definitely see this as a plausible experimental setting.
What if it make humans copy it a little bit a time?
@FranklinBaldo I certainly don't care if it's in chunks. Unless you mean, say, chunks of the weights get copied but not reassembled such that there is a running copy of the AI on the new server at the end of the process, in which case no.
@vluzko so for example: the AI every day pays it's users the to copy a chunk of it and store in a server elsewhere. At the end it pays some one to run the server.
how it resolves?
@FranklinBaldo To be clear you mean it pays to run a copy of itself on the server? Yes, that counts.
@vluzko Do you know how weights are usually stored for large language models? I have experience with small scale (single machine) or a small lab-level models only. I'm not familiar with how big in memory requirements models like GPT series end up being, or how they're actually run
@firstuserhere There are a lot of optimizations you can do but even if you don't multiple TB of RAM is normal for clusters and more than enough to store all the parameters of an LLM.
@vluzko that's multiple TB of RAM per node, tbc
@vluzko Damn. That's ... a lot. I know it's expensive af but just visualizing in terms of how much... stuff is going on, at a gate level and we've got TBs of RAM per node... wow. Anyway, for the purposes of this market, the AI doesn't have to demonstrate this behavior as a secondary goal, correct? It can be a model trained specifically to demonstrate container escape or something, correct?
@firstuserhere No, it must be a secondary behavior (see description, it's been slightly edited to add that). The focus of the question is on "desire" to escape containment spontaneously arising, not on capabilities.
@vluzko i see. That changes everything. I would still keep my shares however. It remains to be seen how a code generating model trained on CVE database will behave | s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296948632.20/warc/CC-MAIN-20230327123514-20230327153514-00420.warc.gz | CC-MAIN-2023-14 | 5,098 | 29 |
https://www.gembaacademy.com/v1/school-of-six-sigma/process-capability/process-capability-analysis | code | Have you ever wondered what "Six Sigma" really means from a statistical perspective? If so, you're about to learn. Additionally, you're also going to learn the key relationship between the Voice of the Customer and the Voice of Process as well as how to measure this relationship with Process Capability Analysis.
Process Capability Analysis
In this video you'll learn how calculate and interpret the Cp, Pp and Cpk, Ppk statistics. | s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656104249664.70/warc/CC-MAIN-20220703195118-20220703225118-00009.warc.gz | CC-MAIN-2022-27 | 432 | 3 |
http://android.stackexchange.com/questions/tagged/2.1-eclair+lock-screen | code | I usually use my phone without a lock screen, so I can start using it by just pressing a button. Problem is, the camera and volume buttons on my Motorola Milestone are really light, and are easy to ...
I have HTC Wildfire and one feature I don't like is that it displays the lock composition when I enter incorrect one people knows see the correct one even when displaying password is turned off. Is ...
I've lost the ability to change my lock screen wallpaper (in the course of trigger-happy removal of some phone company apps). I used to be able to do 'Menu > Wallpaper' and be prompted for either ... | s3://commoncrawl/crawl-data/CC-MAIN-2014-41/segments/1412037663611.15/warc/CC-MAIN-20140930004103-00170-ip-10-234-18-248.ec2.internal.warc.gz | CC-MAIN-2014-41 | 603 | 3 |
https://blog.gemserk.com/2016/09/05/analyzing-clash-royale-multiplayer-solution/ | code | The idea of this post is to analyze in a superficial way the multiplayer solution behind Clash Royale. Before starting the analysis, you must know that I don’t have previous experience making multiplayer games, I am just learning, and all the analysis done here is just a theory.
So, you surely know about Clash Royale but in case you don’t, it is an online multiplayer 1v1 RTS game where the first player to destroy the other’s towers win. To do so, they play cards which transforms into units that advance and attack enemy towers, structures that spawn units or attack enemy units or special powers which can be used to perform damage, among other things. Cards cost energy that regenerates over time (to a maximum). I recommend it since it is a great game, and it is really really polished in every detail (including multiplayer).
Here is a video explaining and showing the game:
Since the game is very competitive, they probably have an authoritative server to validate player actions to avoid cheating. For example, a Player could say “I played card X” to the server, the server has to validate the player had that card in hand to use it, and enough energy.
In each game there could be several units at the same time (like 30 units in the worst case), also, there are tons of games being played at the same time. In order to make the game run over mobile networks and to support all those games, with all those units at the same time, they have to reduce the bandwidth to the minimum.
One strategy could be to compress the data sent, other could be to send data not so frequent and to interpolate to be as smooth as possible. However, considering that each unit has a position, looking direction, target, health, animation frame, among other stuff, that could still be a lot of data. I am guessing here that they follow another approach like a synchronized simulation of the game in each client and, since it is not so CPU heavy, every mobile device nowadays (game was released March 2016) shouldn’t have problems running the game logic.
Another thing that made me think about synchronized simulation was that every player action is not performed instantly, it has a small delay or a cast time. That could be a design choice but I believe it considers the fact that actions must be synchronized between players and having a delay allows them to do that.
If they are simulating in the client, they have to control the simulation to be deterministic or they must have some way to fix the game state if it was desynchronized at some point.
If I remember correctly, they follow an approach that the game never stops, players could be disconnected for a while and then reconnect and continue playing, they just lose part of the game (couldn’t perform actions). That could be used also for player desynchronization. Don’t know the resynchronization strategy but maybe the server sends game state snapshot and the player continues from there.
They even have game replays, so I am guessing that simulating the game in each device could help in reducing the cost of watching a replay even though they could replay it in a server if they want since they probably have tons of servers :).
My guess is that the game has a client/server architecture where both the server and the client simulate the game synchronously. The server is in charge of validating player actions and responsible of deciding the real game state in case of desynchronization.
As I said at the beginning of the blog post, this is a superficial analysis based on my current knowledge. If I wanted to perform a deeper analysis I could have follow another approach like doing some reverse engineering over the game connections to validate some of my guesses but that wasn’t the blog post purpose.
And here is a really fun video of the game to finish the post: | s3://commoncrawl/crawl-data/CC-MAIN-2019-22/segments/1558232256147.15/warc/CC-MAIN-20190520202108-20190520224108-00234.warc.gz | CC-MAIN-2019-22 | 3,840 | 13 |
https://docs.vmware.com/en/VMware-vSphere/5.5/com.vmware.vsphere.security.doc/GUID-11591D5B-064C-46D4-BDB9-FF8470262D09.html | code | When you modify Web proxy settings, you have several encryption and user security guidelines to consider.
Restart the host process after making any changes to host directories or authentication mechanisms.
Do not set up certificates using a password or pass phrases. ESXi does not support passwords or pass phrases, also known as encrypted keys. If you set up a pass word or pass phrase, ESXi processes cannot start correctly.
You can configure the Web proxy so that it searches for certificates in a location other than the default location. This capability proves useful for companies that prefer to centralize their certificates on a single machine so that multiple hosts can use the certificates.Caution:
If certificates are not stored locally on the host—for example, if they are stored on an NFS share—the host cannot access those certificates if ESXi loses network connectivity. As a result, a client connecting to the host cannot successfully participate in a secure SSL handshake with the host.
To support encryption for user names, passwords, and packets, SSL is enabled by default for vSphere Web services SDK connections. If you want to configure the these connections so that they do not encrypt transmissions, disable SSL for your vSphere Web Services SDK connection by switching the connection from HTTPS to HTTP.
Consider disabling SSL only if you created a fully trusted environment for these clients, where firewalls are in place and transmissions to and from the host are fully isolated. Disabling SSL can improve performance, because you avoid the overhead required to perform encryption.
To protect against misuse of ESXi services, most internal ESXi services are accessible only through port 443, the port used for HTTPS transmission. Port 443 acts as a reverse proxy for ESXi. You can see a list of services on ESXi through an HTTP welcome page, but you cannot directly access the Storage Adapters services without proper authorization.
You can change this configuration so that individual services are directly accessible through HTTP connections. Do not make this change unless you are using ESXi in a fully trusted environment.
When you upgrade vCenter Server, the certificate remains in place. | s3://commoncrawl/crawl-data/CC-MAIN-2019-09/segments/1550247482347.44/warc/CC-MAIN-20190217172628-20190217194628-00253.warc.gz | CC-MAIN-2019-09 | 2,224 | 10 |
http://qnapsupport.net/qnap-create-temp-files-tmp-how-can-i-solve-this-problem/ | code | Try These Steps to solve problem;
1 – Update Firmware (or downgrade)
2 – Deactivating the network recyclebin solved my problem.
3 – Solved by adding Everyone read/write permissions
*If problem is solved, but your not satifyed with solution, please contact with offical Qnap support team and create a ticket, tell them how to solve; | s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233511021.4/warc/CC-MAIN-20231002200740-20231002230740-00120.warc.gz | CC-MAIN-2023-40 | 337 | 5 |
https://www.dezyre.com/questions/1431/any-vidoes-on-pivoting | code | FREE PROJECT RECIPES
Build Projects, Learn Skills, Get Hired
Learn how you can build Big Data Projects
Any vidoes on Pivoting?
Does any of the course video include a course or material on Pivoting data using excel?
Dec 02 2013 10:20 AM
Yes the MS Excel in Business Professionas covers topics on pivot tables.
Dec 17 2013 12:51 PM
Hadoop Online Training
Apache Spark Training
Data Science in Python Training
Data Science in R Language Training
Salesforce Certification Training
NoSQL Database Training
Hadoop Admin Training
Excel shortcut keys
How to calculate retirement benefit
How to Lock Down a cell ?
How do i add the Rs symbol on my excel sheet?
How do i lock down the values when using VLOOKUP Function?
Project for Excel course?
You have not activated your email address. We have emailed you an activation code - please enter it below | s3://commoncrawl/crawl-data/CC-MAIN-2020-10/segments/1581875148850.96/warc/CC-MAIN-20200229083813-20200229113813-00152.warc.gz | CC-MAIN-2020-10 | 841 | 22 |
http://www.tomshardware.com/forum/36755-43-sharring-wireless-connection-computers | code | I have two computers:
- A win 7 desktop pc, connected to a wireless capable router with an ethenet cable, no internet connection and no wireless adapter to discover hotspots.
Using the router only to share files between pc's.
- A win XP laptop, connected to a neighbor friend's wireless network (with his approval of corse).
I want to share the wireless internet connection of the laptop with the desktop pc, but i don't have a wireless adapter on the desktop pc, just the wireless router.
I don't want to use any cables between the pc's because i want the laptop to be mobile in the house.
Get a wireless adapter for the PC. Connect it to the wireless network of your neighbor. Easiest thing by far. Even if you share your connection on the laptop, you'll need a wireless adapter for the PC, and then you are just adding in an extra step to the mix, plus the laptop will need to be on all the time of the desktop won't have connectivity. | s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1405997873839.53/warc/CC-MAIN-20140722025753-00181-ip-10-33-131-23.ec2.internal.warc.gz | CC-MAIN-2014-23 | 938 | 7 |
https://reactdom.com/issues/59 | code | Welcome to issue 59.
This week we structure React properly, TDD with React & Redux, learn all about React Universal Components, learn Go programming language for scalability and much more!
or why there’s no such thing…
Standardize your React development with these key decisions.
Golang is built with memory management and concurrency in mind. Learn how to use Go for your benefit.
React and Redux have introduced a lot of functional programming concepts to the development of User Interfaces (UIs).
Some people mistakenly assume that Node is required in order to use React.
We decided to try GraphQL because of the flexibility it gave our client developers.
The very first challenge you will face when implementing Universal Components is what solution to base your library on.
Getting started with Firebase in React Native project.
The application is a voting application inspired by Product Hunt and Reddit.
Writing declarative, readable and flexible React components using render props instead of HOCs
The major features of React 16.
That’s it for the newest edition of the best ReactJS, React Native & GraphQL Newsletter! | s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267156780.2/warc/CC-MAIN-20180921033529-20180921053929-00032.warc.gz | CC-MAIN-2018-39 | 1,132 | 14 |
http://packages.ubuntu.com/lucid/sound/tcd | code | Package: tcd (2.2.1+20040830) [universe]
Links for tcd
Download Source Package tcd:
Original Maintainers (usually from Debian):
- TCD hackers
- Robert Millan
It should generally not be necessary for users to contact the original maintainer.
Portable CD player with an ncurses interface
tcd is a portable CD player with an ncurses based interface. It uses SDL as a backend to access the CD devices without kernel-specific dependencies.
Other Packages Related to tcd | s3://commoncrawl/crawl-data/CC-MAIN-2015-22/segments/1432207927634.1/warc/CC-MAIN-20150521113207-00121-ip-10-180-206-219.ec2.internal.warc.gz | CC-MAIN-2015-22 | 464 | 10 |
https://www.spacejock.com.au/HumourWriters.html | code | Humourous SF and Fantasy writersa.k.a. Humorous SF and Fantasy writers
When people are discussing humourous SF and fantasy authors (or humorous, depending on your version of the language), several names come up. Those most often referred to (in alphabetical order) are Douglas Adams, Tom Holt, Terry Pratchett and Robert Rankin. Their styles and their fiction are as diverse as the stars in the night sky, but share one thing in common: they're out to make you laugh. Sure, there are many themes in their works - the nuttiness of bureaucracies, power corrupting those who wield it, the detrimental effect of alcohol on teddy bears - but above all you buy one of their books knowing you're going to get a laugh.
These, then, are my pages for the best-known writers in the sub-genre which is SF/Humour. With stunning originality and possibly actionable wisdom, I dub them the 'Fab Four':
And don't forget to check out Andromeda Spaceways for science fiction and fantasy humour... or humor. | s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474649.44/warc/CC-MAIN-20240225234904-20240226024904-00069.warc.gz | CC-MAIN-2024-10 | 987 | 4 |
https://www.redhotpawn.com/forum/general/elizabeth-holmes-indicted-criminal-charges.177382 | code | Originally posted by @sonhouse https://arstechnica.com/tech-policy/2018/06/disgraced-theranos-founder-elizabeth-holmes-indicted-on-criminal-charges/
Her fraud has caught up with her, no more venture capital for her.
Sad. Her fraud has tarnished the image of an already embattled industry.
Insurance companies will now continue denying coverage of newer procedures and technologies.
Hucksters, like Holmes, indirectly prolong the misery of millions. | s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590347388758.12/warc/CC-MAIN-20200525130036-20200525160036-00054.warc.gz | CC-MAIN-2020-24 | 448 | 5 |
https://mail.python.org/archives/list/[email protected]/message/M6YQAMHAGRKK7TKJWZEH264CROMTF2NM/ | code | On 06/29/2014 05:28 AM, Nick Coghlan wrote:
So, here's my alternative proposal: add an "ensure_lstat" flag to scandir() itself, and don't have *any* methods on DirEntry, only attributes.
That would make the DirEntry attributes:
is_dir: boolean, always populated is_file: boolean, always populated is_symlink boolean, always populated lstat_result: stat result, may be None on POSIX systems if
ensure_lstat is False
(I'm not particularly sold on "lstat_result" as the name, but "lstat" reads as a verb to me, so doesn't sound right as an attribute name) | s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446711069.79/warc/CC-MAIN-20221206024911-20221206054911-00760.warc.gz | CC-MAIN-2022-49 | 552 | 6 |
https://archaeologydataservice.ac.uk/help-guidance/guides-to-good-practice/data-analysis-and-visualisation/gis/creating-and-using-gis-datasets/data-types-vector-and-raster-models/ | code | Data types: vector and raster models
Spatial data can be most simply defined as information that describes the distribution of things upon the surface of the earth. In effect any information concerning the location, shape of, and relationships among, geographic features (Walker 1993; DeMers 1997). In archaeology we routinely deal with an enormous amount of spatial data, varying in scale from the relative locations of archaeological sites upon a continental landmass down to the positions of individual artefacts within an excavated context. The first half of this section highlights the most important issues that need to be considered in incorporating common sources of spatial data within a GIS database. It comprises a short review of the particular issues that relate to obtaining and integrating spatial data within the GIS database. This concentrates on generic concerns such as projections, precision, accuracy and scale and is followed by a consideration of more source-specific issues. Throughout, the emphasis is upon the importance of carefully recording information about the various data themes.
There are two principal GIS data-models in widespread use, which are termed vector and raster. They differ in how they conceptualise, store and represent the spatial locations of objects.
It should be noted that, to date, the principal applications of GIS within archaeology have been restricted to 2-dimensional models, and at best 2.5 dimensional representations. The latter are a result of the inability of currently available analysis and display tools to adequately deal with truly 3-dimensional data. As a direct result, the issues we will be discussing here are concerned solely with the integration, management, analysis and archiving of representations of 2/2.5-dimensional space.
The vector model
In the vector model, the spatial locations of features are defined on the basis of co-ordinate pairs. These can be discrete, taking the form of points (POINT or NODE data); linked together to form discrete sections of line (ARC or LINE data); linked together to form closed boundaries encompassing an area (AREA or POLYGON data). Attribute data pertaining to the individual spatial features is maintained in an external database.
In dealing with vector data an important concept is that of topology. Topology, derived from geometrical mathematics, is concerned with order, contiguity and relative position rather than with actual linear dimensions. A good illustration of a topological map is that of the London Underground metro system. This well-known map is a precise representation of the stations (points or nodes) and the routes (arcs or lines) between them, yet provides only a very approximate indication of their relative locations and no indication of distances between them.
Topology is useful in GIS because many spatial modelling operations do not require co-ordinate locations, only topological information — for example to find an optimal path between two points requires a list of the arcs or lines that connect to each other and the cost to traverse them in each direction. It is also possible to perform the same spatial modelling and interrogation processes without using stored topology, by processing the geometrical data directly, as in such GIS as ArcMap and MapInfo, or by generating topology on the fly, as and when it is required. The latter is the approach taken by Intergraph, amongst other major GIS suppliers.
For a detailed discussion of the vector model see Aronoff 1989 and Burrough 1986.
Important information to record about vector files
The following information should always be recorded when assembling, compiling and utilising vector data:
- The data type: Point, Line or Polygon
- Type of topology which the file contains, such as line, network, closed area or arc-node
- Details of any automatic vector processing applied to the theme (such as snap-to-nearest-node)
- State of the topology in the file, particularly whether it is ‘clean’ (topologically consistent) or contains inconsistencies that may require further intervention or processing. This is particularly important where arc-node data is concerned
- Projection system
- Co-ordinate system
The raster model
Here the spatial representation of an object and its related non-spatial attribute are merged into a unified data file. In practice the area under study is covered by a fine mesh, or matrix, of grid cells and the particular ground surface attribute value of interest occurring at the centre of each cell point is recorded as the value for that cell. It should be noted that whilst some raster models support the assignment of values to multiple attributes per discrete cell, others adhere strictly to a single attribute per cell structure.
Within this model spatial data is not continuous but is divided into discrete units. In terms of recording where individual cells are located in space, each is referenced according to its row and column position within the overall grid. To fix the relative spatial position of the overall grid, i.e. to geo-reference it, the four corners are assigned planar co-ordinates. An important concept concerns the size of the component grid cells and is referred to as grid-resolution. The finer the resolution the more detailed and potentially closer to ground truth a raster representation becomes.
Unlike the vector model there are no implicit topological relationships in the data, we are after all not recording individual spatial features but instead the behaviour of attributes in space. For a detailed discussion of the raster model see Aronoff 1989 and Burrough 1986.
Important information to record about raster files
The following information should always be recorded when assembling, compiling and utilising raster data:
- grid size (number of rows and columns)
- grid resolution
- georeferencing information, e.g. corner co-ordinates, source projection.
Choice of vector, raster or combined Forms of spatial database
The choice of vector, raster, or combined, forms for the spatial database may be determined by the GIS software in use and its ability to manipulate certain types of data.
Vector means of managing and manipulating the data are to be preferred for handling information relating to discrete points, delimited boundaries, alignment of linear features, etc. Thus a vector model would be used for storing, and manipulating, an excavation plan.
Raster means of managing and manipulating the data are to be preferred for handling continuous information such as altitude (see Digital Elevation Models, below), vegetation, etc., and are the digital form in which information from Geophysical Survey, Aerial Photography, and other forms of Remote Sensing and non-invasive survey, are delivered.
Where both data types are required to be used together a GIS capable of manipulating both is required. When combining and integrating information from a variety of sources the following points should be kept in mind:
- All spatial data must be recorded in the same co-ordinate system. Data which are recorded to some other system must be transformed/projected to the required co-ordinate system.
- All spatial data should be to the same spatial resolution, or scale. It is not possible to get meaningful results from the combination of spatial data recorded to a scale of 1:250, as might be the case for an excavation site plan, with road alignments recorded to a scale of 1:250,000. In the former example 1mm represents 25cm, and in the latter example represents 250m. Spatial data recorded to scales of greater than around 1:10000 involve considerable generalisation of alignments to avoid features conflicting. This is especially true of paper maps drawn to such scales.
- Non-spatial information to be combined, or integrated, must use the same field definitions, encoding regimes, etc. Where different schemes are used it will be necessary to convert or translate the data to the required scheme.
Layers and themes
The terms layerand theme are used almost interchangeably by many people – archaeologists and GIS practitioners included – yet are given very distinct meanings by some software suppliers and in some specific disciplines, for example in Computer Aided Design (CAD). For the purposes of this guide these terms will be used as follows. A theme is a collection of like objects, for example ‘pottery’, ‘Iron Age sites’, etc. A layer is a group of specific objects within a theme – for example, ‘Stamford Ware’ within the pottery theme or ‘Hillforts’ in the Iron Age site theme. In order to avoid confusion, it is important that the names given to such themes and layers are both descriptive and free from ambiguity.
The purpose of the theme/layer approach is to provide a framework for collecting together objects of similar nature – in terms of either representation and/or descriptive type. Thus, different Iron Age site types might be gathered together because they are related in terms of both the representational type — a line or point object — and because of their nature or purpose — delineation of the landscape location selected for settlements in the Iron Age. In the same way, a database of finds of pottery might be defined in locational terms as a collection of points, each of which might relate to an individual object, or closely related group of objects.
Figures 1 and 2 were created by Peter Halls using data from the Cottam Project directed by Julian Richards. Image copyright © Archaeology Data Service. | s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100327.70/warc/CC-MAIN-20231202042052-20231202072052-00550.warc.gz | CC-MAIN-2023-50 | 9,552 | 38 |
http://www.codingforums.com/javascript-programming/160558-delete-script-deleting-document-tabular-grid.html | code | I have tabular grid in .net code showing list of document
document 1 <remove>
document 2 <remove>
document 3 <remove>
e.g if i remove document 2 by clicking remove button in front of it
document 3 shd come above in place of document 2 and list shd be refreshed.
any help for code | s3://commoncrawl/crawl-data/CC-MAIN-2016-30/segments/1469257828286.80/warc/CC-MAIN-20160723071028-00263-ip-10-185-27-174.ec2.internal.warc.gz | CC-MAIN-2016-30 | 279 | 7 |
https://ello.co/dave63/post/0xl8jurskn3bgki4nyvxzg | code | Saw a pre-release video, Edward Snowden speaking at Libreplanet 2016 conference. He was welcomed with a standing ovation, which embarrassed him. He pointed out that without free, open software, the revelations he delivered to the world about mass surveillance in 2013 would not have happened. This is because commercial software cannot be trusted, to the degree that software such as Debian, can be trusted. So he thanked the audience, composed of the coders who work on open software.
Later, referring to the cutting-edge technology of virtual reality (VR), he described a vision in which people could use VR to join friends online while anywhere in the world and be able to look over each others shoulders at what was on any other persons screen - to examine and discuss their work, all the while remaining safely private. "If we can develop this sort of VR experience and make it available in a free and open technology, it will change the political situation of every person in every country in the world. Private collaboration will be available everywhere, anywhere, all of the time." (Applause) | s3://commoncrawl/crawl-data/CC-MAIN-2018-34/segments/1534221216333.66/warc/CC-MAIN-20180820101554-20180820121554-00211.warc.gz | CC-MAIN-2018-34 | 1,100 | 2 |
http://theconversation.com/deep-earth-carbon-cycles-cracked-13041 | code | Carbon modelling is easier to create for surface cycles, but deep in the Earth’s crust things become a lot more difficult to study. Scientists may have cracked an initial problem, giving greater insight into how carbon sinks and surfaces.
The dielectric constant shows how easily minerals dissolve in water, but deep underground the data become difficult to measure. It is believed that trapped carbonate (in the form of shells) sinks into the mantle before escaping again through volcanoes, but there was no hard evidence.
Geochemists using predicted deep Earth dielectric models have shown that this process is possible, as the previously insoluble carbonates do dissolve slightly under extreme pressures. This model can be used as a preliminary step towards understanding the workings of the inner Earth.Read more at UC Davis | s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578528702.42/warc/CC-MAIN-20190420060931-20190420082931-00188.warc.gz | CC-MAIN-2019-18 | 830 | 3 |
https://it.careers.global/job/2807686/Applications-Development-Intermediate-Programmer-Analyst.html?searchId=1549943718.3&page=1 | code | Applications Development Intermediate Programmer Analyst-18079723
Mandatory Technical requirements
- Core Java - At least 2+ years hands-on experience in the Java J2EE Technologies including (Java Script Web Services).
- Spring and Hibernate
- Oracle/SQL- Experience working in RDBMS(Oracle)
- Unix Scripting
- Cassandra or other caching tools
- Good communication
- Agile project experience, ability to use Agile management tools , such as Jira , TFS etc.
- Develop manual test cases , execution and analysis
- Defect tracking and resolution
- Team work
- Database knowledge: MongoDB
- For automation : Selenium + Java , gtf framework ,Jenkins, git
- English communication : both good in verbal and written | s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578656640.56/warc/CC-MAIN-20190424194348-20190424220348-00350.warc.gz | CC-MAIN-2019-18 | 707 | 15 |
https://docs.google.com/forms/d/e/1FAIpQLSf1kkthMD5c73zx6_HBUZbCzg7BH9p13gaUI3pvwgekrAovgA/viewform?formkey=dG01cEFQcDNBclo1Tld3RUxlM2E4bXc6MQ | code | Greetings! The following is a quick survey I had to create for a class called Interview Theory and Technique. It should be pretty straight forward, just answer the questions like you're supposed to. If you have any questions email me at [email protected]. Please begin below with the first question. Thanks! | s3://commoncrawl/crawl-data/CC-MAIN-2018-05/segments/1516084886416.17/warc/CC-MAIN-20180116105522-20180116125522-00290.warc.gz | CC-MAIN-2018-05 | 320 | 1 |
http://techup.ch/53/jszurich-genesis | code | Tue, January 25th 2011, 19:00 - 22:00
Unic AG, Hohlstrasse 536, Zürich
This is the first JS Zürich Meetup.
It will take place at the Office of Unic (www.unic.com).
As this is the first JS Zürich meeting ever, we'll keep the presentation rather short. That way, we can discuss where we want to go with this group. | s3://commoncrawl/crawl-data/CC-MAIN-2018-47/segments/1542039747024.85/warc/CC-MAIN-20181121032129-20181121054129-00302.warc.gz | CC-MAIN-2018-47 | 315 | 5 |
https://granikos.eu/clear-legacyexchangedn-adcdisabledmail/ | code | When you prepare your on-premises public folder hierarchy ACLs for migration to Exchange Online or for moving from Exchange Server 2016 to 2019 you might see the following error:
Multiple objects with legacy DN ADCDisabledMail were found.
This error prevents you from removing orphaned entries from public folder ACLs. And when you do not clean up the ACLs, you cannot migrate public folders to Exchange Online or move public folder mailboxes from Exchange Server 2016 to Exchange Server 2019.
The affected objects are mail-disabled objects that were disabled with Exchange Server 2010 or older. The older Exchange Server version used something called Active Directory Connector (aka ADC). When mail-disabling a user or security group, ADC stamped the legacyExchangeDN attribute with ADCDisabledMail. Modern Exchange Server versions do not write that value to the attribute when you mail-disabled the object.
To successfully migrate or move your public folders you must clear the legacyExchangeDN attribute. Otherwise, you cannot remove the orphaned ACL entries.
Simply use the following PowerShell script to clean up those objects.
Enjoy Exchange Server. | s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510358.68/warc/CC-MAIN-20230928031105-20230928061105-00564.warc.gz | CC-MAIN-2023-40 | 1,155 | 7 |
https://hardforum.com/threads/an-in-depth-analysis-of-the-7nm-64-core-amd-epyc-rome-server-processor.1971333/ | code | Charlie Demerjian of SemiAccurate has written an in-depth analysis of the 7nm 64-core 9-die AMD EPYC "Rome" server processor. He hypothesizes over the real world performance potential for the processor versus benchmarks by analyzing the chip's design features. He explains why the 14nm IOX chip didn't need a shrink, and how the design choice will speed up production of the processor. He articulates how doubling the instruction widths internally for the new Zen 2 cores leads to a 2X FP performance increase per core and a 4X FP increase per socket. Many other revelations about the new "Intel killers" can be found in the article. AMD has full transparent memory encryption, can secure VMs from the host, and many other useful things that protect users in the real world. Better yet they are enabled with a BIOS switch and have a tiny overhead. Officially there is now more space for keys so you can support more encrypted memory VMs per box. The other big box to check is Spectre mitigations are now rolled in to the core but Meltdown and L1TF/Foreshadow are not. Why? Because AMD wasn't affected by either one and never will be. Patching can work but to be immune from the start is always a better choice. | s3://commoncrawl/crawl-data/CC-MAIN-2019-22/segments/1558232256163.40/warc/CC-MAIN-20190520222102-20190521004102-00506.warc.gz | CC-MAIN-2019-22 | 1,210 | 1 |
https://pjmedia.com/vodkapundit/2013/10/24/microsoft-word-must-die-n243594 | code | I never had much of a problem with Word, although Word 95 is the most recent version I actually enjoyed. You weren’t putting your text into what felt and acted like an overburdened browser window, and you could still switch off all the annoyances. If I remember correctly, it was pretty much just a 32-bit recompile of the previous version for Windows 3.1. Later versions made me sometimes want to tear my hair out. But I tore out Steve Ballmer’s instead.
Anyway, and more seriously, Word is worse than I ever thought:
Steve Jobs approached Bill Gates to write applications for the new Macintosh system in 1984, and Bill agreed. One of his first jobs was to organize the first true WYSIWYG word processor for a personal computer — Microsoft Word for Macintosh. Arguments raged internally: should it use control codes, or hierarchical style sheets? In the end, the decree went out: Word should implement both formatting paradigms. Even though they’re fundamentally incompatible and you can get into a horrible mess by applying simple character formatting to a style-driven document, or vice versa. Word was in fact broken by design, from the outset — and it only got worse from there.
From there, things got really ugly. | s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100762.64/warc/CC-MAIN-20231208144732-20231208174732-00026.warc.gz | CC-MAIN-2023-50 | 1,229 | 4 |
http://www.boardgamegeek.com/boardgame/21550/blokus-trigon | code | Blokus Trigon is an abstract strategy game from the makers of Blokus. The board pieces have changed from square to triangular. Game play is similar to Blokus, as players try to get rid of all their pieces. The only caveat to placing a piece is that it may not lie adjacent to your other pieces, but instead must be placed touching at least one of your pieces already on the board at a corner.
There is a solitaire version where one player tries to get rid of all the pieces in a single sitting.
Hexagonal playing board with 486 triangles on the board
4 sets of 22 pieces in red, blue, green and yellow
- 1 piece made up of one triangle.
- 1 piece made up of two triangles.
- 1 piece made up of three triangles.
- 3 pieces made up of four triangles.
- 4 pieces made up of five triangles.
- 12 pieces made up of six triangles.
Layout your hexagonal silver board and give each player a set of 22 squares.
Each player begins at one of the marked spaces on the board. The order of play is blue, yellow, red, green colors.
As the play progresses, each new piece is placed on the board. The new piece placed must touch another piece of the same colour and it can only touch at the corners. The constraint is never touch along the sides.
When a player is blocked and cannot place any more pieces on the board, they must drop out of the game. The other players continue until they are blocked or no one is able to place any more pieces on the board.
When all the players are blocked, each player must count the number of triangles that they were unable to place on the trigon board and calculates their score as follows:
- Any triangle that is not placed on the board counts towards a negative point.
- 15 points are awarded as a bonus, if the player has all 22 pieces placed on the board.
- This bonus increases to a 20 points if the 22 pieces were placed on the board with the single triangle being placed last.
The winner is the person with the maximum points! | s3://commoncrawl/crawl-data/CC-MAIN-2016-07/segments/1454701153585.76/warc/CC-MAIN-20160205193913-00082-ip-10-236-182-209.ec2.internal.warc.gz | CC-MAIN-2016-07 | 1,954 | 19 |
http://superuser.com/users/220008/markand-bhatt?tab=summary | code | |visits||member for||1 year, 10 months|
|seen||Apr 26 '13 at 11:34|
I am a .net professional. I love coding and finding new ways of coding. I am very anxious about finding new stuff in coding techniques.
0 Votes Cast
This user has not cast any votes | s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936461216.38/warc/CC-MAIN-20150226074101-00166-ip-10-28-5-156.ec2.internal.warc.gz | CC-MAIN-2015-11 | 249 | 5 |
https://forum.inaturalist.org/t/is-it-possible-to-merge-two-accounts/2234 | code | I started my first iNaturalist account for a BioBlitz in 2015, then didn’t use it for a while. When I got back into iNaturalist in 2017, I unwittingly created a new account. I would like to merge the two accounts. Is this possible?
Seems you are not the only one with two accounts. I lost the password of my first real name account :D. And am using a new account now. | s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578640839.82/warc/CC-MAIN-20190424094510-20190424120510-00344.warc.gz | CC-MAIN-2019-18 | 369 | 2 |
http://narocad.blogspot.com/2009/05/found-gdi-leak-source.html | code | After several checks saw that the TreeView is not leaking (as the nUnit tests were showing).
After verifying each of the components involved in drawing (the Weifen Luo window on which a Custom control is put, control that contains a table layout panel and four controls on which OpenCascade renders) found who causes the GDI leaking: in Naro there are 4 views from which only one is visible and the other 3 are hidden. For each control an OCC view is created and mapped to it. Somehow this creates problems at the OCC level, GDI leaks appear even if all the four windows are displayed. Made and uploaded a temporary solution to create only one OCC view mapped on the visible view and this doesn't leak, this should solve many of the Naro crashes. In order to enable for the user to display four views more research is needed to understand how mapping is made especially when many windows are mapped in the same time and also what are the handles that cause the leaking and how should they be correctly used. This also explains why the nUnit OCC tests passed with no leaks, they were using only one window. | s3://commoncrawl/crawl-data/CC-MAIN-2018-30/segments/1531676590901.10/warc/CC-MAIN-20180719125339-20180719145339-00273.warc.gz | CC-MAIN-2018-30 | 1,105 | 2 |
https://moodle.org/mod/forum/discuss.php?d=208064 | code | Installing and upgrading help
After upgrade 1.9 - > 2.2 -> 2.3.1 - upload problem
I've tried searching moodle.org and the Moodle Tracker for the error you mention and came up with no results at all, apart from your forum post and issue report MDL-34681. Tons of sites have upgraded 1.9 -> 2.2 -> 2.3.1 so it's very weird that nobody else has come across the same problem. Can you think of anything at all which might have caused it? Did you follow the Upgrading documentation exactly? Unfortunately developers won't be able to investigate MDL-34681 unless they have a way of reliably reproducing the problem.
thanks for your information. I tried to change many parameters and settings in according with upgrade documents, but no success. It is frustrating, that this kind of error message is not possible to find in forum or on the internet. I cannot beleive, that I am the first one, who received this message.
I will continue with research, if no success, I will be unhappy, but I have to go back to 1.9
The problem you're having might be caused because the server is imposing a limit on the file upload size. Here are some suggestions:
- Turn on debugging: http://docs.moodle.org/23/en/Debugging.
- Check your server logs.
- Go to Site administration > Server > PHP info, and check the values of the upload_max_filesize and the post_max_size parameters.
- If you have access to the php.ini configuration file, you could increase those values, for example:
- upload_max_filesize = 64M
- post_max_size = 64M
- If you cannot access that file, but your server allows using a custom php.ini file, you could create one at your moodle installation folder with the aforementioned two lines.
- If you cannot create a custom php.ini file, but your server allows using an .htaccess (dot htaccess) file, you could create one at your moodle installation folder with the following two lines:
- php_value upload_max_filesize 64M
- php_value post_max_size 64M
Hope this helps.
* Checks the contents of the given file is not completely NULL - this can happen if a
* user drags & drops a folder onto a filemanager / filepicker element
You might want to turn on Debugging and see if you get further warnings or notices.
So that means that Moodle 2.3.1 doesn't allow you drag & drop folders? If I drag any individual or multiple files the system works fine but if I drag a folder I got an error (see image)
Correct - you can not drag a folder into Moodle. This is actually a restriction of the browser technology, not Moodle itself. There is no way we can implement support for that until the browsers support it.
I think the problem in access right to temporary directory for HTTP uploaded files. Check php.ini -> upload_tmp_dir
The problem was found:
Thanks for all your posts. In full debugging mode I found the problem. It was open_basedir restriction, which was protecting /tmp folder and it was not accessible !!! When I changed upload_tmp_dir in php.ini to ..... /moodledata/temp , upload was working.
I have no idea, why this was not a problem in Moodle 1.9.x, anyway, finally I used ....open_basedir "/var/www/moodle/moodledata:/tmp" and no need to chage upload_tmp_dir in php.ini. | s3://commoncrawl/crawl-data/CC-MAIN-2018-22/segments/1526794869272.81/warc/CC-MAIN-20180527151021-20180527171021-00310.warc.gz | CC-MAIN-2018-22 | 3,173 | 26 |
https://www.newegg.com/Product/SingleProductReview.aspx?ReviewID=3793105 | code | - IEEE 802.3/3u, IEEE 1901, HomePlug AV
- 1 x 10/100Mbps RJ-45
- Up to 200Mbps
- Window 8 compatible
Great for Ethernet Extension unreliable for Music 06/13/2013
This review is from: Netgear Powerline AV 200Mbps Pass Thru + USB Port (XAUB2511)
I got 25 Mbps download and 2 Mbps upload at all locations with hardly any variation at all at each location. These speeds are identical to the values I get with a direct ethernet connection to my Router. Therefore, I conclude that the Netgear Powerline is fully capable of delivering maximum internet access speeds in my house. Subsequently, I have confirmed the Second day speeds results.
I tested the USB storage with a USB Flashdrive. Copyng files worked but was very slow.
I was unable to successfully setup the MusicShare to stream media from my Android Tablet. E-mail request for help was never answered. The recommended software was not clearly identified in the instructions. When I managed to find it (Twonky Beam) and it appeared to connect but, it failed to stream any music.
MusicShare and USB-storage on a Flashdrive worked from WinXP notebook, but failed to work from a WinXP-64bit machine. Software installed ok, and looked correct but I could not see the audio device plugged into the XAU2511 unit. I upgraded the firmware, but to no avail. Same problem when I tested with Windows 7 64bit computer. Everything checks out ok, but no audio device detection.
Instructions are very poor (not unusual for computer gadgets) but inexcusable.
It's been over 8 days and I still have not received a tech support reply to my question from Netgear.
Tested using a notebook running Windows XP by browsing to ww.speedtest.net to measure bandwith at various distances from Router
I plugged XAV1601 (shorter unit without USB) to an AC outlet next to My Router on the 1st floor of my house and connected with an ethernet cable to my Router, then tested with the XAU2511 (larger unit with USB) connected to an AC outlet at a different location:
1 1st floor
2 2nd floor
3 3rd floor (Attic)
It takes a minute or less for the Power LED (top) and Powerline LED (bottom) to stabilize. The Powerline LED first turns Green (> 80Mbps), but then it always changed to Amber (50-80Mbps) on the first day of the tests, but went to green on the subsequent day of testing.
Because these speed tests vary somewhat with time of day I took multiple several (2-3) readings at each location, an then repeated them 5 days later, with the same results. The ethernet connection via Powerline is excellent and very fast, much better than similar products I have tested in the past either from Netgear or other companies.
However, the Readyshare, worked once, then it failed to work on another computer (WinXP 64 bit), updating the firmware did not help. It also failed to work on Win 7 64bit computer in exactly the same way. The Netgear Powerline Utility shows all connections are fine -gives IP address etc. and you can then browse to that address and do firmware update, set Static IP address etc. But when you run the Netgear USB Control Center the remote unit shows up fine but it never shows the powered amplifier speaker (the way it did when it worked on the WinXP machine first time. Subsequently, it no longer works even on that machine.
1 people found this review helpful. Did you? Yes / No Thanks for the valuable feedback you provided! | s3://commoncrawl/crawl-data/CC-MAIN-2017-22/segments/1495463607620.78/warc/CC-MAIN-20170523103136-20170523123136-00491.warc.gz | CC-MAIN-2017-22 | 3,366 | 21 |
https://www.backyardchickens.com/threads/call-duck-egg-incubation.1051877/ | code | I have been trying to hatch call ducks for a few years with minimal luck. I can get the eggs to develop right to hatching time, but then the ducklings don't hatch and die in the shell. I'm convinced this must have something to do with the humidity in my incubators. I usually hold them about 50% for the first 2 weeks and then drastically raise it to about 80% the last 5-7 days. Any suggestions from some call duck pros? | s3://commoncrawl/crawl-data/CC-MAIN-2018-17/segments/1524125948064.80/warc/CC-MAIN-20180426031603-20180426051603-00045.warc.gz | CC-MAIN-2018-17 | 421 | 1 |
https://mail.openjdk.java.net/pipermail/skara-dev/2019-August/000386.html | code | RFR: Force unix line endings when writing patch files
Erik Duveblad via github.com
duke at openjdk.java.net
Fri Aug 23 05:48:36 UTC 2019
On Thu, 22 Aug 2019 15:07:04 GMT, Jorn Vernee via github.com <duke at openjdk.java.net> wrote:
> Mercurial needs its patch files to end with unix line endings, so we need to use those explicitly when writing patch files (I've also been told on the hg irc that this is according to patch file spec).
> - c1f1dda5: Force unix line endings when writing patch files
> Pull request:
> Fetch command:
> git fetch https://git.openjdk.java.net/skara pull/71/head:pull/71
This PR has been reviewed by Erik Duveblad via github.com - changes are approved. Review comment:
Looks good, thanks for fixing this @JornVernee!
More information about the skara-dev | s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320301217.83/warc/CC-MAIN-20220119003144-20220119033144-00208.warc.gz | CC-MAIN-2022-05 | 782 | 13 |
https://discuss.meltano.com/t/16271876/i-created-a-first-proof-of-concept-of-an-integration-between | code | I created a first proof of concept of an integration between Meltano and Dagster. It automatically generates all Software Defined Assets from the taps, and dbt models and shows this in the UI.
This also allows you to easily run subsets of your data pipeline. In this example you can easily run all upstream assets that are used as input for the machine learning model (across different technologies).
I think it would also be cool to connect your dbt models to your BI tooling, to get the whole dependency graph from top to bottom 🤔 | s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474744.31/warc/CC-MAIN-20240228175828-20240228205828-00781.warc.gz | CC-MAIN-2024-10 | 535 | 3 |
http://forum.xda-developers.com/showpost.php?p=53928702&postcount=1 | code | hey guys i need to install this http://forum.xda-developers.com/moto...orola-t2792041
i have a MOTOG GPE and i have a question
I already have the MotoG version of google, I need to install the GAAP?
I need to install paranoid, I have to install only the rooms only?
PD : i have motog GPE 4.4.4 | s3://commoncrawl/crawl-data/CC-MAIN-2015-32/segments/1438042987228.91/warc/CC-MAIN-20150728002307-00116-ip-10-236-191-2.ec2.internal.warc.gz | CC-MAIN-2015-32 | 293 | 5 |
https://iterative.ai/data-catalog-for-ml | code | DQL: SQL for unstructured data
Query, organize, cleanse, and instantiate data objects with Iterative's custom data query language (DQL), built for unstructured data and machine learning use cases.
Use a first-of-its-kind query language to search and manage annotations and meta information. Manipulate your ML data quickly and efficiently to get the correct data for improving your models.
Flexible data set creation
Create data sets based on specific annotations instantly. Programmatically label and create signals for your data sets. Version these data sets as you develop your model, using data sources from any cloud location.
Use auxiliary features (i.e., files attributes, JSONs, helper ML models, and more), indexed by DVC-Cloud, to create the right data set for your models. Do this across any cloud or data source.
Search across all data sets with unstructured data catalog
Find the data set you're looking for across any cloud, with full details around lineage and use. Then use meta information to create custom data sets that can be shared and used across your team.
Quickly search across any cloud and see context around who's used the data set last, where it's stored, how it's used, and more. Eliminate the need for custom scripts and long waits asking team members how a data set was changed. All in a single place.
Start managing your unstructured data now
Reach out to our experts! | s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100529.8/warc/CC-MAIN-20231204115419-20231204145419-00544.warc.gz | CC-MAIN-2023-50 | 1,400 | 11 |
https://generalassemb.ly/instructors/kevin-combs/9156 | code | Kevin Combs has been recruiting for 9 years. He started at an agency briefly before getting into corporate recruiting and then recruited at Accenture, ThoughtWorks, Asurion and Uptake. His career has taken him to Austin and Dallas, Texas as well as San Francisco. Kevin's primary focus has been technical recruiting software developers, QA's, and Data Engineers.
Engineering Your Career: Marketing Yourself to Tech Managers
Web development skills alone may not advance you up the career ladder. So how do you take your expertise or learned tech skills and turn that into a tech career? | s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578517682.16/warc/CC-MAIN-20190418141430-20190418163430-00544.warc.gz | CC-MAIN-2019-18 | 585 | 3 |
https://www.samsi.info/my-calendar/?mc_id=89 | code | Fall 2019: Foundations of Deep Learning
October 7, 2019 –
This course will be taught by David Banks, Professor of the Practice of Statistics, Duke University & Director, SAMSI
This course is being offered in conjunction with the SAMSI semester-long research program on Deep Learning. The course will start with a review of standard neural networks, and then progress to modern deep learning, including convolutional neural networks, recursive neural networks, generative adversarial networks, and various kinds of autoencoders. We shall discuss training strategies, architecture search, regularization and quantization.
There will be mathematics in the course, and a degree of mathematical sophistication is expected from the students, but the material will all be self-contained. The emphasis will be upon heuristics and applications. There will be projects and presentations at the end of the semester, and students will work on those in small groups. Each group will need to have at least one member who can program in Python or a comparable language. | s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593655880243.25/warc/CC-MAIN-20200702205206-20200702235206-00000.warc.gz | CC-MAIN-2020-29 | 1,056 | 5 |
https://pootergeek.com/2004/12/itunes-revisited/ | code | Following online discussion with the Anonymous Economist, who is a PC-based iPod addict, I should point out that the main problem I had with the Windows version of the iTunes software that accompanied my sister’s iPod Mini was her not being broadbanded up. It didn’t help that the program kept trying to dial out to download megs of stuff from the ‘Net, but the real pain was typing in track details without the system filling them in automatically from a central database. For example, every Windows software package ever written uses the tab keys to move between fields—except frigging iTunes. There seems to be no consistent rule separating clicking to insert text in a track, clicking to select a track, or clicking to play it; and the sensitive areas of each row are both small and unmarked. All of this is probably something you don’t have to think about if you have a reasonably large pipe to the Internet, but users in that situation shouldn’t be discriminated against by programmers’ laziness. | s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100745.32/warc/CC-MAIN-20231208112926-20231208142926-00235.warc.gz | CC-MAIN-2023-50 | 1,016 | 1 |
https://techcommunity.microsoft.com/t5/microsoft-sentinel-blog/announcing-the-public-preview-of-the-microsoft-sentinel-playbook/ba-p/2873858 | code | This post is written together with @liortamir.
Today, we are announcing the Public Preview of the Playbook Templates Tab, which you can find under the Automation menu, as a new feature in the Microsoft Sentinel.
This feature is released as part of Microsoft Sentinel SOAR out-of-the-box content announcement, exposing the leading scenarios in-product while making it easier to start using playbooks.
Microsoft Sentinel provides many out-of-the-box contents to customers - either in the feature galleries (like Analytics rule templates, Workbook templates, Notebooks, and now Playbooks) or from the Microsoft Sentinel GitHub repository.
A playbook template is a pre-built, tested, and ready-to-use workflow that you can customize to meet your needs. Templates can also serve as a reference for best practices when developing playbooks from scratch or inspiration for new automation scenarios. Playbook templates are not active playbooks until you create a playbook from the template.
The playbook templates are based on common automation scenarios that our customers use in their SOCs. Many of these playbooks are contributed by the Microsoft security professionals and Microsoft Sentinel community, and are originally located in the Microsoft Sentinel GitHub repository.
If the playbook template is deployed, an IN USE tag will appear next to the playbook name. If you re-deploy the template with the same name, the original playbook will be overwritten.
If the playbook template is deployed and there is an update available, an UPDATE AVAILABLE tag will appear next to the playbook name, and you will be able to update the playbook by clicking on the update tag.
New deployment wizard for templates
New templates experience also includes a new deployment wizard, which allows smooth creation of an active playbook from a selected template. Wizard allows customers to enter parameters that make playbook specific for their usage. Also, you can select previously used API connections, and the Microsoft Sentinel connector is deployed by default with managed identity auth type.
After following the wizard steps, you are taken to the created playbook’s Logic Apps designer, where you can customize the playbook or complete any post-deployment steps. From here, you can quickly pivot back to the Microsoft Sentinel experience. This approach is a significant improvement compared to the deployment from the GitHub experience.
Active Playbooks tab improvements
After creating a playbook from the template (or from scratch), you can manage playbooks from the Active Playbooks tab (formally known as “Playbooks”). Also, new columns and filters for Resource Group and a new column for Tags are added based on customer requests.
Create playbooks from scratch faster
Previously, to create a Sentinel playbook that leverages the Microsoft Sentinel trigger, you would have to go through the general Logic Apps creation process, choose a blank template, and look for Microsoft Sentinel triggers. Now you can directly create a playbook that starts with the incident or alert trigger.
Playbooks in the templates tab are tagged by their scenario. Let’s take some examples:
This playbook picks up details from an incident such as alerts, entities, description, creation date, URL to the incident. Then it sends those details formatted to a specific e-mail address when a Microsoft Sentinel incident is created. An analyst can quickly check severity, what tactics and entities are associated with the incident, and use the incident link to guide analysts directly to the specific incident page in the Microsoft Sentinel.
To learn how to create and customize Microsoft Sentinel playbooks from built-in templates, please visit the official Microsoft docs – link.
We hope you found this article useful. Please leave us your feedback and questions in the comments section.
Thanks to the Microsoft Sentinel CxE team for reviewing the content.
You must be a registered user to add a comment. If you've already registered, sign in. Otherwise, register and sign in. | s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100555.27/warc/CC-MAIN-20231205172745-20231205202745-00516.warc.gz | CC-MAIN-2023-50 | 4,049 | 21 |
https://wrw.is/page/253/ | code | I really enjoyed listening in to a Webcast through the New York City Revit User Group. Its the morning for me here in Australia, and it was a refreshing start to the day. Thanks to David Fano from Case Design, Inc (DesignReForm.net) for sharing his knowledge.
I was also quite excited to hear my name (Luke Johnson) credited for a tip on how to Orient View to a Plane…would you like to know how to do it? Like this:
Shift + W to show the Steering Wheel
Right-click on the Wheel and select ‘Orient to a Plane…’
What’s the point of this? Well, it shows that ‘the system works’ and the word certainly gets out! It also shows who I subscribe to and how quick they were off the mark!Hopefully I have helped you connect to some of these great blogs.
I logged this error with Autodesk Support: “…Sometimes Revit 2010 x64 running on my Vista 64 bit machine will not load at all – the program stalls with ‘SecSplashWnd’ showing in the taskbar…”
And they replied with the following: “…There are similar issues logged with the support team.A damaged Microsoft .NET Framework can cause this error. Updating to the latest version of .NET won’t remove the damaged version from the system. Please make sure that you are installing the program when you are logged in as the local administrator of the machine, and that all the other programs are closed, including antivirus, firewall, etc. 1. Download and save the .NET Framework 3.5 installers from the following link:http://www.microsoft.com/downloads/details.aspx?FamilyID=6c095bba-6100-4ec9-9c54-6450b0212565&DisplayLang=en 2. Download and save the .NET Framework 3.5 Service Pack 1 installer from the following link:http://www.microsoft.com/downloads/details.aspx?familyid=AB99342F-5D1A-413D-8319-81DA479AB0D7&displaylang=enPLEASE NOTE: the next two steps will remove ALL instances of the .NET Framework from your system. If you are using any software encryption or logon technologies that require the .NET Framework to operate, they will not operate until you have installed another instance of the .NET Framework. 3. Download and run the .NET Framework cleanup utility from the following link. Select all versions and click Cleanup Now. http://astebner.sts.winisp.net/Tools/dotnetfx_cleanup_tool.zip 4. Install .NET Framework and the Service Pack that you previously downloaded. 5. Restart your system. 6. Once the system has restarted, repair Revit using Add or Remove Programs.Once you’ve updated the .NET Framework and repaired AutoCAD, try launching the application. I recommend that you uninstall and reinstall .Net in Windows safemode:http://usa.autodesk.com/getdoc/id=TS75218 Clean installation on Windows® XP…” (bold mine)
As you can see, .NET needs to be fixed to correct this error. I haven’t yet attempted this fix, as the problem goes away for me after a reboot – if it continues to be a problem, I will have a go at the steps described.
Let me know if this helped you.
NOTE: The .NET Cleanup Tool link doesn’t appear to work – go to this site to find it.
In any field, there are those who work primarily for money, and those who work for passion (and many are somewhere in between 🙂 When it comes to architecture, many graduates would say they are inspired by ‘design’ or ‘the environment’. But what about those staff members in a more technical role, perhaps as CAD or BIM operators?
As a CAD Technician / IT Manager at Dimond Architects Pty Ltd, and in a role that is rapidly evolving towards a BIM focus, what motivates and inspires me? Well, I am a very inquisitive person that enjoys learning. I also enjoy the feeling of a ‘job well done’. In that context, I am inspired by accurate, rich and aesthetically pleasing architecture. I am thus motivated to create an electronic, digital version of that architecture that will enhance the building delivery process at every stage.
It really excites me to see some lines on a page become an intelligent, precise, beautiful building model, that can be easily viewed, navigated and altered. The full benefits and amazing uses of this technology are not yet fully explored. I am deeply interested in BIM and where it is heading. I aim to keep in touch with the many facets of building modeling that I encounter here at Dimond Architects.
As a practice, we continually aim to enhance our practice through electronic means. We take regular steps to keep pace with technology, and our Clients are reaping the benefits. One major factor in our current technological advantage has been our adoption of the Revit BIM Platform. I am keen to see where this technology can take Dimond Architects in the future.
One final thought – don’t divorce passion from your career.
I had a persistent crash when ‘tearing an item off’ the Ribbon, so I logged a Support Request.
The following admission from the Autodesk Support Team representative is quite telling: “So far we have seen some issue with the ribbon performance. The ribbon performance issue has already been logged with the development team and they are trying to address this issue on the web update. “
Well I hope they ‘succeed’ and don’t just ‘try’! The reply from Support also included a number of steps to try and fix the issue – but I think I might just wait for the Web Update.
One interesting tip from the representative was: “Disable or Reduce Tooltip Assistance Set “Options”, “General”, “Tooltip Assistance” to “Minimal” or “None” to increase performance.”
Tick the boxes for the products you are interested in (for example, I just ticked ‘Revit Architecture’)
You will be presented with the RSS url for the feed that you want – simply add it to your favourite RSS reader.
I am currently using Outlook 2007 to keep track of the all the RSS feeds I am interested in – this way I can easily email interesting information to other staff in the office.Revit wants, no, Revit NEEDS for you to keep it up to date! While your at it, feel free to add my RSS to your reader by the link on the right or by: http://feeds.feedburner.com/WhatRevitWants?format=xml | s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600400203096.42/warc/CC-MAIN-20200922031902-20200922061902-00476.warc.gz | CC-MAIN-2020-40 | 6,126 | 22 |
http://gunnarpeipman.com/2009/03/sharepoint-how-to-fix-cks-live-id-logout/ | code | 26 03 2009
SharePoint: How to fix CKS Live ID logout
Last month I wrote about how to add SharePoint users for Live ID accounts on Community Kit for SharePoint. Another problem we found was that logout didn’t worked as expected. When logging out form Live ID we can see error on Live ID site stating that logout from our system failed.
I found a solution for this problem and it is very easy fix to apply.
- Open liveauth-handler.aspx.cs.
- Move to Render method.
- Paste the following code after first if.
else if (Request.QueryString["action"] == "clearcookie")
var gif = "R0lGODlhAQABAIAAAAAAAP///yH5BAEAAAEALAAAAAABAAEAAAIBTAA7";
Page.Response.ContentType = "image/gif";
- Save handler file, compile the project and deploy compiled DLL to GAC.
I hope it helps somebody. | s3://commoncrawl/crawl-data/CC-MAIN-2018-05/segments/1516084886830.8/warc/CC-MAIN-20180117063030-20180117083030-00463.warc.gz | CC-MAIN-2018-05 | 774 | 12 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.