url
stringlengths
13
4.35k
tag
stringclasses
1 value
text
stringlengths
109
628k
file_path
stringlengths
109
155
dump
stringclasses
96 values
file_size_in_byte
int64
112
630k
line_count
int64
1
3.76k
https://lists.debian.org/debian-user/2011/03/msg00091.html
code
Steve Smith wrote: Was going to setup a central time server, but found that NTP-Server is no longer available in Squeeze. Are there any alternatives?Thanks, Steve Instead of the 'ntp' server what you probably want is 'ntpdate' installed, it's the client, it will check to Internet server and set the time at each boot. It's in your Debian repos. -- Jimmy Johnson SimplyMEPIS 11.0 Beta-2 at sda12 Registered Linux User #380263
s3://commoncrawl/crawl-data/CC-MAIN-2018-17/segments/1524125947931.59/warc/CC-MAIN-20180425154752-20180425174752-00208.warc.gz
CC-MAIN-2018-17
425
4
https://4archive.org/board/g/1823
code
>$ sudo pacman -Syu >a shitload of updates is available >net upgrade size: Take that, Obongo and Devuan shitposters. Arch is anti-bloat BY DESIGN! My packages get SMALLER as they get updated!!1 Enjoy your 4.0+ processor load and bloatshit Gnome DE memes aside, why are there still people who recommend Ubuntu over Mint? anyone try to charm a tech company like goog or whatever with your being.. to keep you a job? I'm thinking of writing to a tech company hoping they sponser me for my advice on their company... you know that millenials are asking big tech giants for jobs but they dont even get paid, they are just happy they can write that in their resume later. you cant expect to be paid. I got a brand new Alcatel POP 4 that I will not use as my own personal phone. I cannot sell it. I cannot root it. What use can give it? Then buy a stand and convert it to baby monitor/home surveillence/spy camera. Build a nice box around it using some material like plexiglass or whatever you have at your hand. foobar2000 has virus da only reason me tryin to learn programming is to build ma bery own POS system coz me wishin to open ma business within the next few yeers n I no trust any programmes made by som1 I dun know of. So you want to learn programming? Pick a starting language. For beginners, there are generally two recom- eh... hold on. Start with English. We will get to programming after you pick up English. Intentionally Not anime Edition. Old thread >>61140848 Google is your friend, you are our bitch. Trying to get Pokémon GO on my Samsung Galaxy S3, running Android 4.4.2. It crashes on the Niantic logo screen. Older versions get a bit further, to the log in, but won't authenticate. Is my only option root and install a more recent OS? Where do I get retro computers like 386 or 486? Best would be anything that can run some kind of unix/Linux. Looked on eBay and they are expensive as shit on there Well not sure desu. Just thought about learning better C and maybe asm. Also I am doing lots of project Euler recently and was curious if I could solve most problems on there in reasonable amount of time. I have 4 raspberries at home. Two laying around. Prolly just want an old x86 machine for shits n giggles What are /g/'s opinions on Hacking Games, like uplink and hacknet? Alright you niggerfaggots, I asked in /sqt/ twice now and got no answer, so I'll ask in this shit thread: HOW much actual impact does font antialiasing have on GUI performance? I'm ricing a 1gig RAM T42 and want to know if there's any point in suffering the sight of unfiltered fonts. ANSWER ME REEEEEEE I am now teaching myself how to Python. How long would it take for me to reach a certain level where I can make a very basic game like snake or minesweeper on my own? If your sole goal is to program Snake in Python then you could do it in a few days tops, but I'm assuming you mean learning the fundamentals of programming, so it'll take more time. Not OP but if I want to make a game like snake in a language I'm unfamiliar with should I pseudocode it first and google everything after or should I learn syntax then just do it what does /g/ think about msi? am wondering if i'm the only one that had shit customer experiences with them, my 980's second fan just went rip after 1.5 years... and o boi their half-assed translations Has anyone made some money in this website? You can make plenty of money if you play dirty like everyone else. Lie about your skillset and sell yourself below minimum wage. eg. offer german translation services and use google translate I want to make my own game server for Jackbox Games (one of those games). I've already started looking st wireshark pcaps of the conversation that occurs when you try to start a multiplayer game, and it's unencrypted http and websocket. What's the next step? It's my first time doing something like this.
s3://commoncrawl/crawl-data/CC-MAIN-2020-34/segments/1596439735833.83/warc/CC-MAIN-20200803195435-20200803225435-00092.warc.gz
CC-MAIN-2020-34
3,870
45
https://launchpad.net/ubuntu/+source/exult/1.2-15.2
code
exult 1.2-15.2 source package in Ubuntu exult (1.2-15.2) unstable; urgency=low * Non-maintainer upload to help for libpng transition * Allow building with libpng 1.5. Thanks to Iwamatsu Nobuhiro for the patch. Closes: #649549 * Build-Depends on libpng-dev. Closes: #662319 * Lintian cleaning: - drop debian/files in clean rule - add build-arch and build-indep build rules -- Christian Perrier <email address hidden> Thu, 15 Mar 2012 22:21:27 +0100 - diff from 1.2-15 (in Ubuntu) to 1.2-15.2 (6.8 KiB) No changes file available. Binary packages built by this source - exult: No summary available for exult in ubuntu saucy. No description available for exult in ubuntu saucy. - exult-studio: tools for editing and viewing exult games expack - Command line tool for creating and extracting Flex (.flx) files. Flex files are used by Ultima 7 to store most of its data. splitshp - Command line tool to take a multi-frame shp file and split it into its individual frames. shp2pcx - Command line tool to convert shp files to pcx format; the shp files can be extracted using expack. ucxt - Tool to translate usecode back into `human readable', roughly assembly like code. The output can be presented in a variety of different format, including one which will, later, have a suitable compiler back into usecode. ucc - A usecode compiler. exult_studio - An editor for games using the Exult engine. These are all works in progress. A GIMP plugin is provided, so that if you have the GIMP installed you can edit and create game graphics with it.
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917122955.76/warc/CC-MAIN-20170423031202-00179-ip-10-145-167-34.ec2.internal.warc.gz
CC-MAIN-2017-17
1,533
24
https://institutefordiseasemodeling.github.io/EMOD/malaria/dev-install-build-emod.html
code
Build EMOD from source code¶ You can build the Eradication.exe for Windows 10, Windows Server 12, and Windows HPC Server 12 (64-bit) using Microsoft Visual Studio or SCons. You can build the Eradication binary for CentOS 7.1 on Azure using SCons. If you want full debugging support, you must build using Visual Studio. However, Visual Studio is only capable of a monolithic build that includes all supported simulation types. EMOD supports the following simulation types for modeling a variety of diseases: - Generic disease (GENERIC_SIM) - Vector-borne diseases (VECTOR_SIM) - Malaria (MALARIA_SIM) - Tuberculosis (TB_SIM) - Sexually transmitted infections (STI_SIM) - HIV (HIV_SIM) If you want to create a disease-specific build, you must build using SCons. However, SCons builds build only the release version without extensive debugging information. Build a monolithic Eradication.exe with Visual Studio¶ You can use the Microsoft Visual Studio solution file in the EMOD source code repository to build the monolithic version of the EMOD executable (Eradication.exe), which can be either a release or debug build. Visual Studio 2015 (Professional, Premium, or Ultimate) is the currently supported version. Visual Studio creates a debug build by default. However, you must use a release build to commission simulations to COMputational Platform Service (COMPS); attempting to use a debug build will result in an error. - Open the EradicationKernel solution in Visual Studio. - From the Solution Configurations ribbon, select Debug or Release. - On the Build menu, select Build Solution. Eradication.exe will be in a subdirectory of the Eradication directory. Build Eradication.exe or Eradication binary with SCons¶ SCons is a software construction tool that is an alternative to the well-known “Make” build tool. It is implemented in Python and the SCons configuration files, SConstruct and SConscript, are executed as Python scripts. This allows for greater flexibility and extensibility, such as the creation of custom SCons abilities just for EMOD. For more information on Scons, see www.scons.org. SCons 2.5.0 is the currently supported version. EMOD will not build if you use the --Debug flag. To build a debug version, you must use Visual Studio. Open a command window. Go to the directory where EMOD is installed: Run the following command to build Eradication.exe: For a monolithic build: For a disease-specific build, specify one of the supported disease types using the scons --Release --Disease=Vector The executable will be placed, by default, in the subdirectory build\x64\Release\Eradication\ of your local EMOD source. Additionally, you can parallelize the build process with the --jobs flag. This flag indicates the number of jobs that can be run at the same time (a single core can only run one job at a time). scons --Release --Disease=Vector --jobs=4
s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320304515.74/warc/CC-MAIN-20220124054039-20220124084039-00206.warc.gz
CC-MAIN-2022-05
2,879
34
http://donovanljbtl.tinyblogging.com/The-best-Side-of-python-project-help-19973374
code
For that reason, the learners who don't have a clear concept of item orientation find Python live help from us. It is a new technological know-how obtaining State-of-the-art capabilities, for which students choose help with Python homework assignments to be aware of more about the topic. For example, when it comes to your time difficulties, our professional tutors are superior at time administration. They will certainly post your paper promptly. In reality, after you make an order, the most fitted writer is assignment in your get the job done, and he commences engaged on it right away. These are knowledgeable that you are minimal by time; So, they constantly strive to produce your paper lots of hrs prior to the deadline. This offers you a possibility to go through your paper and confirm whether or not your Guidelines are adhered to. As a result, when undertaking enterprise with us, concerns about time shouldn't worry you. Additionally, if you are feeling such as you are having late with all your assignment, you may e-mail the guidance employees using the headline: Get python homework performed for me inside the presented time framework. Then demonstrate the adjustments within the deadline, and also your paper will be submitted within just your asked for deadline. Also, With regards to problems pertaining on the complexity of python assignments, Now we have a solution to the condition. Your assignment are going to be assigned to the most preferable tutor. Consequently he will likely have the aptitude and expertise in dealing with your paper. Pros There are a selection of Added benefits you will get when you choose to convey your python assignments to us. The following are quite possibly the most noteworthy benefits: Consumer Interface: The design in the consumer interface of our Internet site is easy and simple to navigate. It is simpler for you to entry any data you need about us, when you go to our web pages. You do not need to have elaborate Personal computer expertise to navigate by our Internet site. Web framework making use of C# or C++ is Similarly easy. Programming assignment help supplied by allassignmenthelp.com can take treatment of these fundamentals and many of our tutors are successful with each individual programming assignment. The Objective: Despite the identify, the actual “hangman” element isn’t essential. The leading objective here is to create a type of “guess the term” recreation. The person requirements in order to enter letter guesses. A Restrict should also be established on the quantity of guesses they will use. This implies you’ll want a means to seize a phrase to utilize for guessing. Recommendations Testimony 1: I loved the way which the corporate taken care of my python homework. After I had put an buy, it didn't choose extended for the corporation to assign a writer for me. The person assigned to write my paper was quite kind And that i cherished the fashion which he responded to my queries. Also, I received my do the job inside the offered deadline. Due to the exceptional services I got from the business, I'm intending to use the exact same corporation to generally be executing my python hw for me. Testimony 2: I had been relieved when I learned that the company experienced the aptitude of supplying tutors who could guide me with my python homework. Homework help accounting biology chemistry economics finance administration math physics statistics taxation Homework Help You could critique your operate endlessly without locating an answer, that may be exceptionally irritating. Fortunately, You can find help for all these circumstances. When you’re struggling to complete your homework, don’t Allow any more time slip by. The syntax for programming in Python is straightforward and thus the coding language can be recognized quickly with PYTHON writers. Privacy: We are incredibly aware of your respective privacy requirements. We don't wish to breach your privacy and We now have put in place guidelines aimed at preserving any information and facts you give us. This features your name, e-mail addresses, and so forth. Welcome to the planet of programming and study programming. If you are fighting the homework of Java, C, C++ or another programming language, then our gurus are offered to help you whenever. We also give assistance to be able to proceed to enhance your Python programming capabilities. By means of specific tutorials, you can grasp the concepts applied with your homework. Python with its detailed library also provides interpreters accessible for several working systems letting to operate diverse code above different units. What are the different programming languages for which we provide programming assignment help in Canada? Our organization also comprises of application growth experts who are directory well acquainted While using the technicalities of programming language. The apps they develop help students to carry out specific jobs. Students also acquire much better knowledge of the underlying composition of any programming language.
s3://commoncrawl/crawl-data/CC-MAIN-2019-22/segments/1558232256546.11/warc/CC-MAIN-20190521182616-20190521204616-00016.warc.gz
CC-MAIN-2019-22
5,082
14
https://codecide.net/blog/how-to-fix-a-broken-application-update-linux/
code
Sometimes you can get into what seems like a very serious problem when you update an application that results in the tool being completely broken. This can happen even if the update was suggested and validated by the software manager of your distribution. For example, the manager notifies you of a few application updates and you simply hit "ok" to apply them; the process applies all the dependencies and goes complete successfully, yet one of the updated apps doesn't start, or else crashes as it launches with an undecipherable error. In such cases, you are unlikely to find a direct solution on the web, since the error is likely caused by a code update that is but a few hours old. The Stack Overflow volunteers aren't that quick at providing new answers 😉 You can't mitigate a critical program error, you can't undo an installation, and you probably don't have the time or resources to waste figuring out what went wrong and how to fix it (assuming that is even possible). You will need to go back and re-instate a working version of the now faulty application. Luckily, all Linux application providers maintain a repository of their older versions. This means that you will be able to find a slightly older package that either matches the one you just updated or else one that will work properly on your system. That is one of the reasons why most package filenames append the version number: it makes it easier for humans to navigate the packages and their dependencies in case there's trouble. Here's how you can revert a package when a critical error occurs after an update:
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100164.15/warc/CC-MAIN-20231130000127-20231130030127-00730.warc.gz
CC-MAIN-2023-50
1,588
4
https://stephanvdkruis.com/category/microsoft/azure/page/2/
code
So in Deploy a Azure Web App using Gitlab – Part 1 the Gitlab server was deployed and the url was changed by using an ssh connection. In the second part I wanted to share how to implement a SSL certificate into your Gitlab server so you can have a secure connection. Please note that I bought a certificate for my sub domain. There is also documentation available on Gitlab, but I will show every step I took to accomplish this. Furthermore I came across some issues synchronizing Gitlab with my local PC. This was caused by not having the appropriate Root Certificates on the Gitlab server, however this was not explained in the Gitlab documentation. OK so you will need your key and .crt file. These files will be copied to Gitlab. If you enable HTTPS on your Gitlab server, Gitlab will check the /etc/gitlab/ssl/ directory for the key and certificate. This directory does not exist by default so this has to be created by running [cc lang=”bash”]sudo mkdir -p /etc/gitlab/ssl sudo chmod 700 /etc/gitlab/ssl Continue reading “Deploy a Azure Web App using Gitlab – Part 2” So recently I decided to start writing about things that I want to learn and that interest me. One of the first things I thought of doing was to use Gitlab to deploy virtual machines on Azure. I recently saw the power of using Desired State Configuration (DSC) to manage Windows machines, which were deployed from Gitlab. Basically you can deploy entire environments with some simple code. I thought this was amazing and I wanted to learn how to do this. But I wanted to start small, and first set up an environment from where I can build more complex projects. So I decided to create a simple Azure Web app to test my environment. This Web App should be connected to a private Gitlab repository. In the process of building this environment I was faced with some challenges, so I thought why not make this the subject of my first blog post. I will show some basic configurations, including enabling HTTPS on Gitlab. And I will show how to deploy a simple website using Gitlab, by pushing code from a local pc. Continue reading “Deploy a Azure Web App using Gitlab – Part 1”
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296818452.78/warc/CC-MAIN-20240423002028-20240423032028-00346.warc.gz
CC-MAIN-2024-18
2,165
9
https://www.eclipse.org/lists/tycho-user/msg06904.html
code
This seems pointless (and counter-productive): the required version specifies the minimum version (Or version range) required by the current bundle. It is used to ensure compatibility at build & installation time. P2 will then ensure that the installation is consistent (Or fail if the problem is unsatisfiable). Automating this would only reduce the range of supported versions and the flexibility of custom installations. For example, some bundles might require specific versions of UML (5.x) because they rely on its metamodel, while other bundles would work with any version of UML2 (e.g. the bundles that only provide helpers for general UML Concepts that haven’t changed since UML2 1.0.0) Forcing a version range of “exactly 5.1.0” removes all the benefits of the “acceptable version range” for each bundle: someone who’d like to use only the “helpers bundle” (In practice, compatible with the entire UML2 range) wouldn’t be able to use it with UML2 4.1.0 because the range would be over-constrained by such a tool. And if he wants to install both the “helpers bundle” (With the [1.0.0, 6.0.0[ compatibility range) and the “metamodel-specific bundle” (With the [5.0.0, 6.0.0[ compatibility range), then P2 would be smart enough to determine that the only solution is using a UML2 5.x bundle. So it’s probably not supported by Tycho, and it shouldn’t In addition, Tycho is Manifest-first (Pom generated from the Manifest, not the other way round), so that would certainly be against the Tycho philosophy Jeff & Tycho user communauty, Sorry to come back on this. To make my question perhaps more clear: I have one eclipse Tycho project with many eclipse-plugin submodules Each of them has their own MANIFEST.MF Sometimes they share the same Required Bundles. I would like to make sure that all manifests have the same bundle version I have sometimes: With basic java maven projects, I could externalize the version number in the parent pom, ensuring I have the same version across all children modules. Here I do not know how to do it? Thanks in advance. De : tycho-user-bounces@xxxxxxxxxxx [mailto:tycho-user-bounces@xxxxxxxxxxx] De la part de Jeff MAURY Envoyé : lundi 23 novembre 2015 10:45 À : Tycho user list <tycho-user@xxxxxxxxxxx> Objet : Re: [tycho-user] externalize version of bundle outside manifest On Mon, Nov 23, 2015 at 8:54 AM, LE FEVRE FRANCOIS <francois.le-fevre@xxxxxx> wrote: I would like to know if it is possible to externalize a specific bundle version outside the manifest. I have a multiple eclipse modules project managed by Tycho. So I have Manifest.MF and pom.xml I wanted to benefit of maven filtering feature in order to replace at build time the version of a specific bundle used at several places. But it seems not to be possible since Tycho build phase is before maven verify phase. Do you know how I can factorize my bundle version with a maven properties in the parent pom? In order to be sure all eclipse plugins use the same version of the bundle? tycho-user mailing list To change your delivery options, retrieve your password, or unsubscribe from this list, visit
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679103810.88/warc/CC-MAIN-20231211080606-20231211110606-00538.warc.gz
CC-MAIN-2023-50
3,138
32
https://proxify.io/developers/hossein-python-golang-expert
code
Hossein is an enthusiastic software engineer who has nine years of commercial background, working in international companies as a backend developer and technical team leader. During his overall experience, he has gained the ability to lead challenging projects in a fast-paced environment, meet strict deadlines, and increase performance through multitasking. He has been developing technical solutions with Python for nine years. Also, Hossein has been working for almost four years with Golang. Thus, he has replaced an old storage solution with a custom solution developed by pure Golang in three weeks, making file management much simpler for the business manager. Can easily maintain and deploy high-traffic backends with 99.9% uptime. - Python 9 years - Django 7 years - Golang 4 years - Flask 7 years - MySQL 7 years - Redis 7 years TurkeyBook Hossein R. Senior Software Engineer EZPin - 3 years 1 month - Worked with departments across the company, including marketing and project management, in developing new ideas, initiatives, products, and services - Managed the work of 8 employees, increasing crew efficiency and delivery time by 10%, - Designed and maintained HiGift as the company's B2C E-commerce platform to increase the company's retail income - Implement 5 new dedicated payment solutions for customers from the US, Canada, UAE, Turkey - Developed Bitpay gateway solution to make Cyptocurrency available for 20% of sales around the world. - Integrate NSure API to prevent fraud payments, guarantee transactions, and decrease purchase risks to 0 percent. Instructor of Python 7Learn - 4 years 1 month - Instructed more than 200 students, leading them to learn python and find a job through a complete A to Z Python course during the past 3 years. Technical Team Lead LaraX - 1 year 7 months Responsibilities as a leader: - Build a small team of 5 developers from hiring to mentoring and coaching - Coach developers to contribute toward the team’s goals, - Coordinate teams’ contributions through other teams. - Define technical strategy and stack for projects and Implement core modules of projects. - Participate in more than 7 projects in fintech, video streaming, gaming... Yara Information - 2 years - Prepare web-based services in several Python design patterns. - Create high-traffic APIs for mobile applications and games around the world. - Wide use of celery, RabbitMQ, and Redis to manage several async tasks. - Implement multi-thread/process crawlers to manipulate data around the web for different projects using Python and Golang. - Design and create a small data mining project to process several services’ data and help managers to make decisions using Python, NumPy, and Pandas. Ashrafi Isfahani University · 2010 - 2014 Find your next developer within days, not months We can help you deliver your product faster with an experienced remote developer. All from €31.90/hour. Only pay if you’re happy with your first week. In a short 25-minute call, we would like to: - Understand your development needs - Explain our process to match you with qualified, vetted developers from our network - Share next steps to finding the right match, often within less than a week First developer starts within days. No aggressive sales pitch.
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510983.45/warc/CC-MAIN-20231002064957-20231002094957-00628.warc.gz
CC-MAIN-2023-40
3,274
43
https://qservicesit.com/blog/post/announced-the-new-version-of-flutter-1-22-an-extensive-support-for-ios-14-and-android-11
code
In 2018, Google had launched a cross platform development tool named Flutter which allows developers to create applications available for Windows, Linux, Android, iOS and also for web versions. Being a developer, Flutter offers some ease the level of app development. For example, it provides the ambience to the app developers to create an android and iOS app using the single codebase. Google has released the updated version of Flutter 1.22 on Oct 2020 just after the previous release 1.20 which was on august 2020. Let’s get aware about some of the features of Flutter 1.22: Android 11 and iOS 14 support Cupertino Package Update Android state restoration Addition in Host of New material button family Google Maps and web views Improved Navigator 2.0 Stable Platform views Hosting of Inspector tab from Dart Dev tools App size analysis Tool Flutter iOS 14 Update: As Xcode requires iOS 9.0 version or higher which was not possible earlier but now there is support for Xcode 12. Developers are also able to get the preview support for app clips. The font rendering issues and specifiec crash reported specific to iOS are also got fixed with this amazing update. In case of developer using the Cupertino icons 1.0 with Flutter 1.22 will get the acess to almost 900 new icons via Cupertino Icons API. Flutter Android 11 Update: The version of flutter has been engineered especially to support the newly released Android version 11. There are two updates for android developers. Flutter supports revealing the safe insets of Android marks, cutouts and edges of waterfall displays. This will facilitate the placement of elements via MediaQuery and SafeArea APIs. And the second one is that animations are now in synchronization with the Android keyboard. New material button universe: Google has expand the whole new universe of buttons to keep flutter updated and developer can use the new replacement button widgets and themes rather than using the existing button classes and themes. Google Maps and Flutter Web Views: Flutter 1.22 supports Google map and flutter web view plugins are now ready for production. Developer can write the code, build the APK, and liberate it, as per convenience. The note given by the Flutter team is that Android developers will have to manually enable web view flutter until it becomes a default setting. New l1on localization and i18n Internationalization Support: Flutter 1.22 versions enables hot reload support to update your app and includes localized messages, dates, currencies and numbers. Flutter always consists of characters package which is available by default in the flutter projects and there is no need to add it manually. Another feature is state restoration for android which simply resume the flutter app from you left previously without losing your place. Navigator 2.0 Implementation: As every developer is familiar that flutter widgets works in data structures and uses Navigator.push() and Navigator.pop() for building screens in the stack. But in case of complex routing, it’s really hard to see the stack properly. So in order to resolve this issue, this new implementation of Navigator 2.0 enables to visualize the stack of pages.
s3://commoncrawl/crawl-data/CC-MAIN-2021-04/segments/1610703506832.21/warc/CC-MAIN-20210116165621-20210116195621-00652.warc.gz
CC-MAIN-2021-04
3,195
23
https://jira.camunda.com/browse/OPT-4055
code
We currently apply a default sort order to entities that we return in the context of collections. We want to support sorting according to provided sorting parameters. The response will stay the same and we will use the following new API query params: - Entities within a collection are returned sorted by the field and in the order of the provided parameter values - If entity order cannot be resolved by the provided field, the default sort is used as a secondary criteria - If the sorting field value is not supported, we return an error, - If an order is supplied without a field, we return an error - If no order is supplied, we use ascending order - API documentation is updated
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474643.29/warc/CC-MAIN-20240225203035-20240225233035-00432.warc.gz
CC-MAIN-2024-10
683
8
http://www.coin-or.org/Doxygen/Cbc/todo.html
code
Add a pointer to function member which will allow a client to install their own decision algorithm to decide whether or not to call the CGL generateCuts method. Create a default decision method that looks at the builtin criteria. It strikes me as not good that generateCuts contains code specific to individual CGL algorithms. Another set of pointer to function members, so that the client can specify the cut generation method as well as pre- and post-generation methods? Taken a bit further, should this class contain a bunch of pointer to function members, one for each of the places where the cut generator might be referenced? Initialization, root node, search tree node, discovery of solution, and termination all come to mind. Initialization and termination would also be useful for instrumenting cbc.
s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386164039593/warc/CC-MAIN-20131204133359-00043-ip-10-33-133-15.ec2.internal.warc.gz
CC-MAIN-2013-48
808
3
https://forums.docker.com/t/ucp-2-0-1-with-dtr-error-creating-container-required-at-least-one-valid-signer-none-found/25314/4
code
I cannot get any trusted images deployed to my UCP cluster when I require content trust. I have set Content Trust in UCP to allow any valid UCP user. On the DTR server I have created a new repository, under the username “james”. There is a user account called “james” on the UCP cluster that I am also using. I have installed the notary client and configured it with the UCP bundle. I have then run: notary init -p ddc-05.ddclab.quru.com/quru/helloworld (quru is an Organization on the DTR server, and james is a member of the quru organization) And set up passwords for the relevant keys. Where I was asked to log in, I provided the “james” user account details for DTR, which were accepted. I then perform a “docker login ddc-05.ddclab.quru.com” with the user account “james”. Then: export DOCKER_CONTENT_TRUST=1 And finally: docker push ddc-05.ddclab.quru.com/quru/helloworld:1.0.2 The image is successfully signed, and appears in DTR as signed. I can manually deploy the image to any of my docker worker nodes using: docker pull ddc-05.ddclab.quru.com/quru/helloworld:1.0.2 This works fine. However if I try and use this image in a simple docker-compose from the UCP interface, I am met with the error: Error creating container: required at least one valid signer, none found What does UCP consider as a valid signer, and what am I doing wrong here? This is frustratingly close to working!
s3://commoncrawl/crawl-data/CC-MAIN-2020-34/segments/1596439738674.42/warc/CC-MAIN-20200810102345-20200810132345-00430.warc.gz
CC-MAIN-2020-34
1,413
15
https://www.arbetslivsinstitutet.se/jobb/it-consultant/
code
OBS! Ansökningsperioden för denna annonsen har Windows Server 2012: Installing, administering and configuring Advanced Windows Server 2012 services. Designing and implementing an advanced server infrastructure, network infrastructures, network hardware, and protocols and services. Microsoft SQL Server Querying SQL Server. Administering and developing databases. Implementing a data warehouse, data models and reports and designing database and business intelligence solutions. Designing and implementing Microsoft Server virtualization solutions using Hyper-V and System Center. Windows PowerShell skills are required. Skills to take part in evaluating, planning, deploying, and operating the Office 365 services, including its dependencies, requirements, and supporting technologies. Experience with the Office 365 Admin Center and an understanding of Exchange Online, Lync Online, SharePoint Online, Office 365 ProPlus, and Azure Active Directory. A CV and a cover letter should be e-mailed to [email protected]
s3://commoncrawl/crawl-data/CC-MAIN-2021-49/segments/1637964362969.51/warc/CC-MAIN-20211204094103-20211204124103-00090.warc.gz
CC-MAIN-2021-49
1,030
8
https://ce3c.ciencias.ulisboa.pt/member/beatrizafonso
code
I am conducting a Ph.D. in Biology and Ecology of Global Changes (BEAG) by the University of Aveiro starting in 2022 within the Carnivore Conservation Ecology research subgroup of cE3c. I am conducting the project “Trophic rewilding: unrevealing the effect on carnivores’ assemblage”. The main objective of this work is to understand the impact of trophic Rewilding, based on large domestic and wild herbivores populations restoration, on the spatial ecology, abundance, and fitness of Mediterranean populations of mesocarnivores. This project has supervision from Luís Miguel Rosalino, from Department of Animal Biology at Lisbon University, João Carvalho, from UVS at Aveiro University and Jella Wauters from Department of Reproduction Biology at Leibniz Institute for Zoo and Wildlife Research, Germany. Oliveira, F.G., Tapisso, J.T., Afonso, B.C., Pereira, J.V., Neves, T., von Merten, S., Mathias, M.L. & Rychlik, l. (2022) Dissimilar use of an external heat source for thermoregulation by shrews from different geographic regions.Journal of Thermal Biology, 104, 103193. DOI:10.1016/j.jtherbio.2022.103193 (IF2021 3,189; Q2 Biology) NON-cE3c affiliated Grilo, C., Afonso, B.C., Afonso, F., et al. (2022) Mammals in Portugal: a data set of terrestrial, volant, and marine mammal occurrences in Portugal.Ecology, 103(6), e3654. DOI:10.1002/ecy.3654 (IF2021 6,433; Q1 Ecology) Afonso, B.C., Swanepoel, L.H., Rosa, B., Marques, T.A., Rosalino, L.M., Santos-Reis, M. & Curveira-Santos, G. (2021) Patterns and drivers of rodent abundance across a South African multi-use landscape.Animals, 11(9), 2618. DOI:10.3390/ani11092618 (IF2021 3,231; Q1 Veterinary Sciences) Page not found.
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446711376.47/warc/CC-MAIN-20221209011720-20221209041720-00061.warc.gz
CC-MAIN-2022-49
1,689
5
https://reviews.llvm.org/rL341760
code
[Tooling] Improve handling of CL-style options This patch fixes the handling of clang-cl options in InterpolatingCompilationDatabase. They were previously ignored completely, which led to a lot of bugs: Additional options were being added with the wrong syntax. E.g. a file was specified as C++ by adding -x c++, which causes an error in CL mode. The args were parsed and then rendered, which means that the aliasing information was lost. E.g. /W4 was rendered to -Wall, which in CL mode means -Weverything. CL options were ignored when checking things like -std=, so a lot of logic was Differential Revision: https://reviews.llvm.org/D51321
s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600400213454.52/warc/CC-MAIN-20200924034208-20200924064208-00250.warc.gz
CC-MAIN-2020-40
641
9
http://learnchase.com/course/best-establish-itil-based-problem-management-process-itil-training/
code
1. Course Introduction 2. ITIL Basic Concepts Review The Service Lifecycle and Stages of the Lifecycle The Service Portfolio Processes and Functions A Brief Discussion of the Various ITIL Processes Roles and Responsibilities 3. Problem Management Overview Understanding Problem Management as an Aspect of All Roles in an Organization What Problem Management is Not What is a Problem? What is Problem Management? Purpose and Objectives of Problem Management Why a Consistent and Predictable Approach to Identifying and Making Decisions about Problems is Important to Your Business Policies, Principles, and Basic Concepts Sources of Information Metrics and Measurements for Problem Management Challenges and Risks Roles and Responsibilities 4. A Real-World, High-Volume Approach to Problem Management Establishing a Vision and Baseline for Problem Management Building a Problem Management Process Based on Real-World Examples Defining Problems, Workaround, and Known Errors How Problems and Incidents are Related Establishing a Situational Approach to Problem Management Overview of Problem Management Techniques 5. Establishing a Vision and Baseline for Problem Management Understanding and Agreeing to the Desired State for Problem Management in Your Organization Understanding the Current State of Problem Management in Your Organization Problem Management Audit of Intent Problem Management Audit of Action Problem Management Assessment Questions Problem Management Key Performance Indicator, Metrics, and Measurements Problem Management Roles and Responsibilities Problem Management Process Integration Documenting the Difference Between the Vision and the Baseline 6. Building a Problem Management Process Based on Real-World Examples Why Most Problem Management Processes Fail Understanding and Making Decisions about Problems in a High-Volume Way Real-World Example 1-A Short Bridge (or Vehicles that are too Tall) Real-World Example 2-My First Car (Proactive and Reactive Problem Management) Real-World Example 3-A Bent CPU Pin (Or Controlling Assumptions) Real-World Example 4-Availability Management and Time Zone Coding Real-World Example 5-An IT Application Update 7. Defining Problems, Workarounds, and Known Errors What Is a Problem? What Is a Workaround? What Is a Known Error? What Information is Contained in a Problem Record? What Information is Contained in a Known Error Record? How Are Problem Records Used? How Are Known Error Used? Storing Records in a Known Error Database Basic Functionality of a Known-Error Database How Changes and Problems are Related 8. How Problems and Incidents are Related What is an Incident? Typical Relationships Between Incidents and Problems Establishing an Effective Boundary Between Problem and Incident Management Definition of Workarounds Creation of Known Errors Use of Known Errors Using Changes to Correct Problems 9. Establishing a Situational Approach to Problem Management Common Problem Situations When to Use Chronological Analysis? When to Use Pain Value Analysis? When to Use Brainstorming? When to Use Affinity Mapping? When to Use the Five Whys? When to Use Fault Isolation When to Use Hypothesis Testing When to Use Technical Observation Post? When to Use Ishikawa Diagrams? When to Use Pareto Analysis? 10. Using Chronological Analysis What Is Chronological Analysis? How Does Chronological Analysis Help? What Are the Steps in Chronological Analysis? Using Chronological Analysis in Your Organization 11. Using Pain Value Analysis What Is Pain Value Analysis? How Does Pain Value Analysis Help? What Are the Steps in Pain Value Analysis? Using Pain Value Analysis in Your Organization 12. Using Brainstorming What Is Brainstorming? How Does Brainstorming Help? What Are the Steps in Brainstorming? Using Brainstorming in Your Organization 13. Using Affinity Mapping What Is Affinity Mapping? How Does Affinity Mapping Help? What Are the Steps in Affinity Mapping? Using Affinity Mapping in Your Organization 14. Using the Five Whys What Are the Five Whys? How Do the Five Whys Help? What Are the Steps in Using the Five Whys? Using the Five Whys in Your Organization 15. Using Fault Isolation What is Fault Isolation? How Does Fault Isolation Help? What Are the Steps in Using Fault Isolation? Using Fault Isolation in Your Organization 16. Using Hypothesis Testing What Is Hypothesis Testing? How Does Hypothesis Testing Help? What Are the Steps in Hypothesis Testing? Using Hypothesis Testing in Your Organization 17. Using the Technical Observation Post What Is a Technical Observation Post? How Does a Technical Observation Post Help? What Are the Steps to Conducting a Technical Observation Post? Using the Technical Observation Post in Your Organization 18. Using Ishikawa Diagrams What Are Ishikawa Diagrams? How Do Ishikawa Diagrams Help? What Are the Steps to Using Ishikawa Diagrams? Using Ishikawa Diagrams in Your Organization 19. Using Pareto Analysis What is Pareto Analysis? How Does Pareto Analysis Help? What Are the Steps in Using Pareto Analysis? Using Pareto Analysis in Your Organization Review of Concepts Learned Questions and Answers Exercise 1: A Practical Understanding of Basic Service Management Concepts Exercise 2: Understanding the Theory of Problem Management Exercise 3: Establishing a Situational Approach to Problem Management Exercise 4: Establishing a Vision and Baseline for Problem Management Exercise 5: Real-World Approaches to Problem Management Exercise 6: Defining Problem and Known Error Records Exercise 7: Establishing an Effective Boundary between Problem and Incident Management Exercise 8: Understanding Common Problem Situations Exercise 9: Using Chronological Analysis Exercise 10: Using Pain Value Analysis Exercise 11: Using Brainstorming Exercise 12: Using Affinity Mapping Exercise 13: Using the Five Whys Exercise 14: Using Fault Isolation Exercise 15: Using Hypothesis Testing Exercise 16: Using a Technical Observation Post Exercise 17: Using Ishikawa Diagrams Exercise 18: Using Pareto Analysis - 10 Days - 0 Units - 0 Hrs
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100276.12/warc/CC-MAIN-20231201053039-20231201083039-00285.warc.gz
CC-MAIN-2023-50
6,055
148
https://www.b-list.org/weblog/2008/mar/12/pycon/
code
Where to find me at PyCon My flight arrived in Chicago a while ago, and despite an attempt by the hotel to screw it up, I’m currently sitting in my room enjoying a beer before bed. Here’s my plan for the next few days: - Thursday: Working on slides and stuff morning/afternoon, doing the code lab tutorial in the evening. - Friday: Definitely hitting up both Django-related talks. - Saturday: Hear me speak! - Sunday: Probably going to the “What Zope did wrong” talk. Outside of these predictable time slots, I’ll probably be all over the place; I haven’t yet made up my mind which non-Web-oriented sessions Ill be going to, so if you’re trying to find me just keep an eye out. In case anybody’s curious, I look like this, though I may not be wearing the beanie the whole time…
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446711151.22/warc/CC-MAIN-20221207085208-20221207115208-00624.warc.gz
CC-MAIN-2022-49
795
7
http://ftp4.gwdg.de/pub/linux/misc/gazette/issue86/tag/3.html
code
From Mark Morshedi Answered By Thomas Adams, David Mandala, John Karns, Rick Moen, Mike "Iron" Orr, Didier Heyden, Heather Stern What if the only option is to use the power switch to turn off the system. there are times that mouse doesn't work and keyboard is dead. how does one manages that without destorying the file system. [Thomas] My first indication is that this is VERY much hardware specific. You should check that your motherboard can handle processes like the one that you wish to implement under linux. Typically the programs that you would want to use are: "apm" which is most likely, the program that will control the "power-down" feature via the power button anyway, and also "lm_sensors" so that you can get the current state of your system. As far as not allowing the filesystem to get mangled, you can set the maximum mount check point to an arbitrary value (I have it set at 100), using the "tune2fs" program. Thus you can specify: tune2fs -c 100 means that your filesystem WONT be checked until it has been mounted 100 times. You can extend this further to say that: tune2fs -i [d/m] whereby you can set the next check to be in either days or months. Have a look at "man tune2fs" for more details. [Heather] Note that lm_sensors is specifically not recommended for some hardware; some thinkpad models crash hard and in fact the hardware suffers wickedly (see http://www.linux-thinkpad.org for details). Do check the internet for comments about lm_sensors and your motherboard before just brazenly invoking it. [David] One can try the three finger salute Control Alt Delete which sometimes will cause a orderly shutdown and restart. Or one can use the ext3 filesystem option on newer versions of Linux which are safer to data loss. If the machine is networked you could try sshing or telnetting into the locked machine, sometimes the console is locked but the machine is still active on the network and you can gain control that way. [John] Re: journaling filesystems (ext3 mentioned below) I've been very happy with reiserfs over the past 18 months. Then there is the SGI (?) contributed XFS. See the LG issue 68 article about journaling filesystems for more info about them. The magic SysRQ can also help, unless the kernel is locked up hard. It's worked for me on a number of occasions. For a system lock-up, the key sequence that I most often use is Alt-SysRq-S, Alt-SysRq-U, and Alt-SysRq-B which syncs buffers, unmounts fs's, and reboots, respectively. You may need to recompile your kernel to enable the feature though. For moe info, see /usr/src/linux/Documentation/sysrq.txt [David] I remember reading somewhere how to hook up the power switch on an ATX power supply to do an orderly shutdown but I don't remember where. Anybody else remember? [Rick] You might be thinking of Joris van Rantwijk's Linux PowerSwitch Driver. Description: "The powerswitch driver makes it possible to use the ATX power button on your computer to shutdown Linux. You simply press the power button, and the driver shuts down Linux and powers off the machine, just like the shutdown command does." - A different approach: - Or a kernel patch for the ACPI code: [Iron] Since this is a different driver than the keyboard driver, it may work even when the keyboard doesn't respond. However, if not losing data is your primary concern, the first step to do is to switch to a journalled filesystem. It's easy to switch from ext2 to ext3. - Make sure your kernel has ext3 support compiled in. (Not a module, because you don't want it to fail if something happens to the module files.) - Boot to single-user mode (or use "telinit s"). - For each filesystem: - Verify it's unmounted or mounted read-only. - Run "tune2fs -j /dev/THE_PARTITION". - Change "ext2" to "ext3" in /etc/fstab for the affected filesystems. - Switch back to multi-user mode. You can also place /usr on a separate partition and mount it read-only except when installing software, to prevent those files from being corrupted in an unclean shutdown. Make sure your rescue floppy (from your distribution, www.toms.net/rb/, etc) has support for the journalled filesystem you're using, or you won't be able to repair it from the floppy. Last I saw, Tom's supported ext3 out of the box, but for ReiserFS you had to put a custom kernel on the floppy. You may also want to leave /boot as ext2 (mounted read-only of course) to ensure it's repairable from the widest variety of rescue floppies, should the need ever arise. Of course, you'll also want to determine why the keyboard is not responding and how to fix it. However, if you're stuck with unreliable hardware, immature drivers for your gee-whiz must-have peripherals, or you occasionally run out of both memory and swap, there's not much you can do except press the reset button or the power switch. [Didier] I'm being rather off-topic here, but this summarizes perfectly the problem I had with my old graphics board -- a hardware issue ... seemingly solved by replacing the defective (or MVP3-incompatible) thing with another video card. [Iron] But your first line of defense when the console hangs is to try to ssh or telnet in from another computer, because usually those services are unaffected. It may take a long time if the system is "thrashing" (meaning free memory is so low it's constantly swapping to disk), but you may be able to do a clean "halt" or "reboot" command that way. [Didier] Regarding 'ext3' however, it may be worth mentioning the following discussion about a data corruption bug recently found in the 2.4.20 kernel: The funny thing is, ever since I started using 2.4.x kernels, and regardless of the actual 'ext' filesystem subtype, I've had to 'sync' multiple times and introduce artificial delays right before powering off the beast, otherwise the filesystems are almost invariably found to "have not been unmounted cleanly" on the next boot. [Heather] The nature of the problem, and a workaround, is summarized nicely on this kernel-traffic entry: http://kt.zork.net/kernel-traffic/kt20021209_195.html#16 This bug has been caught and the patch is now available; to be safe you need to be either using an early enough kernel (the nasty bug was introduced in 2.4.20-pre5, but I think I saw discussion about interaction with a more subtle bug that lurked in the 2.4.19 series) or a late enough one (this one was nailed in 2.4.20-pre1, and two more notable ext3 bugs were nailed in -pre2). When I realized that some of my dev work was going to heavily crash my development workstation, I decided I needed journals; saving everything aside for a thorough reiserfs makeover looked like no fun, so ext3 was my first try. That was when 2.4.19-pre10 was current and I've not encountered any sync problems; I'd certainly know, because a lot of my testing involves swapping drives around, so I'm up and down all the time deliberately as well. Also, It's not at all clear whether this ever affected the backported-to-2.2.x ext3 support, since the main flaw was in an optimization trick. There was apparently some benchmark comparing reiserfs and ext3 mid-year 2002; it generated an awful lot of mailing list traffic at the time, easy to find in Google/linux when looking for both keywords together. |Meet the Gang 1 2 3 4
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296816535.76/warc/CC-MAIN-20240413021024-20240413051024-00886.warc.gz
CC-MAIN-2024-18
7,256
40
http://moonlightwalk.deviantart.com/
code
All right, guys, whoever reads this: I need some help. I've been looking into getting some art classes. I think it's long overdue that I took some, but the problem is: I can't find any! Or well, no evening/weekend classes, only professional schools. I found one class and it's only for painting. Very very sad. I'm gonna keep looking, but with the start of evening classes being in September, I'm a bit stuck. I really wanna improve. I'm sick and tired of not feeling that I'm getting better, that I'm not learning. So what I ask is: Give me some pointers on what I should really concentrate on. Share your favourite tutorials or even your own tips and tricks. Whatever works! If you livestream, that's great too, cause I learn better after watching something. I'm open for trying new stuff, my grandpa told me I should experiment a little to find my own style, so all's fine. Thanks in advance for helping! Gonna list accumulated info here. Hope this doesn't update every time I edit (tell me if it does) Things to work on: Try skeletons first, not everything at the same time. Pay attention to where everything should go (look at real pictures) Pay attention to proportions! Fashion magazines/catalogues for poses (would never have thought of this) - sets mood of a picture Use complementary colours to shade o Use stock images as reference fav.me/d6axkrj (varying in thickness) o Other tips: - References (not downright for copying, but to see how stuff works, lighting, poses, ... ) - try using textures - try varying eye shapes - Try 'copying' others style without really copying it to find your own (?)
s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1409535921550.2/warc/CC-MAIN-20140901014521-00157-ip-10-180-136-8.ec2.internal.warc.gz
CC-MAIN-2014-35
1,608
23
https://fedoraproject.org/wiki/FWN/Issue136
code
Fedora Weekly News Issue 136 Welcome to Fedora Weekly News Issue 136 for the week ending July 26, 2008. Fedora Weekly News keep you updated with the latest issues, events and activities in the fedora community. If you are interested in contributing to Fedora Weekly News, please see our 'join' page. Being a Fedora Weekly News beat writer gives you a chance to work on one of our community's most important sources of news, and can be done in only about 1 hour per week of your time. We are still looking for a beat writer to summarize the Fedora Events and Meetings that happened during each week. In this section, we cover announcements from the Fedora Project. Contributing Writer: Max Spevack FESCo Election Results Brian Pepple announced the results of the Fedora Engineering Steering Committee election: "The results of the Fedora Engineering Steering Committee (FESCo) election are in: Bill Nottingham, Kevin Fenzi, Dennis Gilmore, Brian Pepple, and David Woodhouse have been elected to full two-release terms, and Jarod Wilson, Josh Boyer, Jon Stanley and Karsten Hopp have been elected to a one-release term." Cast your vote for the Fedora 10 Codename! Josh Boyer reminded folks to vote: "As long as you have signed the CLA and belong to one additional group in the Fedora Account System, you can cast your vote. Voting will end and be tallied at 23:59:59 28 July 2008 UTC." Fedora 10 Alpha Freeze Jesse Keating announced: "We have our first development freeze of the Fedora 10 cycle tomorrow. This is the alpha freeze, which is non-blocking. Release Engineering will be making a freeze inside the buildsystem of tomorrow's rawhide content. This will be the basis of the Fedora 10 Alpha release." Announcing the Fedora OLPC Special Interest Group Greg DeKoenigsberg announced: "Thus, I am proud to announce the formation of the Fedora OLPC Special Interest Group. Our mission: to provide the OLPC project with a strong, sustainable, scalable, community-driven base platform for innovation. 1. To identify and take responsible ownership of as many OLPC base packages as possible. 2. To maintain an excellent Sugar environment for Fedora, including a dedicated Sugar spin. 3. To identify useful opportunities for collaboration (infrastructure, localization, etc.)" Fedora Unity releases updated Fedora 9 Re-Spin Jeroen van Meeuwen informed us: "The Fedora Unity Project is proud to announce the release of new ISO Re-Spins (DVD) of Fedora 9. These Re-Spin ISOs are based on the officially released Fedora 9 installation media and include all updates released as of July 18th, 2008. The ISO images are available for i386 and x86_64 architectures via Jigdo starting Sunday, July 20th, 2008." Feature Process Improvements John Poelstra had some excellent news on the feature front: "I was recently talking with Paul Frields about how to make the feature process more accessible... this combined with feedback in the rpm thread have led to a (hopefully) clearer presentation of how the feature process works." FUEL opens up collaborative standardization of localization terms FUEL (Frequently Used Entries for Localization) aims at solving the problem of inconsistency and lack of standardization in computer software translation across the platform for all Languages. It will try to provide a standardized and consistent look of computer for a language computer users. In this section, we cover the highlights of Planet Fedora - an aggregation of blogs from Fedora contributors worldwide. Contributing Writer: Max Spevack Shameless Recruiting Pitch We begin this week's summary of Planet Fedora with a recruitment pitch for Fedora Weekly News beat writers, scribed by Karsten Wade. Intel's Moblin moves to Fedora The topic that took Planet Fedora by storm on Friday and Saturday was the announcement of Intel's Moblin moving from Ubuntu to Fedora as its base OS. Yaakov Nemoy, John Palmieri, Seth Vidal, and Karsten Wade all weighed in with their thoughts. A number of event reports were posted on Planet Fedora this week. - LUG Radio Live UK, attended by Max Spevack. - Ottawa Linux Symposium (day 1), as reported by Dennis Gilmore. - LTSP Hackfest (day 1), which included hackers from numerous Linux distros, and Fedora's own Warren Togami. - A GUADEC trip report (including pictures) from Dimitris Glezos. - A second place finish in the 2008 RoboCup World Championships, with a report from Tim Niemueller. In other event news: - Sandro "red" Mathys has posted details about the upcoming Fedora Ambassador Day EMEA. - James Morris shared his Ottawa Linux Symposium paper with us, which is a detailed update on SELinux. Transifex 0.3 has been released. "Transifex 0.3 is a major release, including a lot of under-the-hood changes. We’ve added full i18n support, and now in addition to the templates, per-module information stored in the database, such as names and descriptions, can be translated as well," explains project lead Dimitris Glezos. Lorenzo Villani is working on adding the ZYpp stack into Fedora. He explains, "It seems that with the latest releases of sat-solver, libzypp and zypper, the whole stack has become more stable on Fedora, especially, in the past few weeks I wasn’t able to update packages due to various resolver’s problems, but now it seems that 'zypper up' does its job smoothly." Other Interesting Posts In this section, we cover the Fedora Marketing Project. Contributing Writer: Pascal Calarco Linus Torvalds' personal Linux distro? Fedora 9, of course Larry Cafiero reported that the creator of Linux, Linus Torvalds, currently uses Fedora 9 "on most of his computers" as reported in a recent interview. "I've used different distributions over the years ... Fedora had fairly good support for PowerPC back when I used that, so I grew used to it. But I actually don't care too much about the distribution, as long as it makes it easy to install and keep reasonably up-to-date," Torvalds added. Asus Eee PC Fedora Respin Valent Turkovic asked if there was interest in working on a Fedora spin for the Eee PC. Clint Savage reported that his kickstart for the Eee is working almost perfectly, and Mathieu Bridon pointed to the [EeePc wiki page] for this activity. Zimbra changes license to address Fedora concerns Rahul Sundaram reported that Yahoo has responded to the suggestion that the license language for Zimbra be modified to allow it to be consonant with the Fedora project, which now paves the way for Zimbra to be made available in Fedora. "Our colleagues in the Fedora community were concerned that the old version of 6.2 did not give licensees enough certainty that they could keep exercising their license, even if they followed its requirements. We thought this change was a reasonable request, and we were very pleased that we were able to respond to the Fedora community in the way they asked. Many thanks to our Fedora friends for their input," the Yahoo spokesman explained. Jeroen Van Meeuwen added that efforts are already underway to package Zimbra for Fedora. Seneca College teams with FOSS projects for hands-on learning Rahul Sundaram shared a feature from Linux.com detailing the growth of the free and open source software program at Seneca College in Toronto, Canada. Beginning this fall, thanks to Fedora, it will add the graduate-level Linux/Unix System Administration program. The article continues with Greg DeKoenigsberg, Fedora's liaison with Seneca, saying, "There's a lot of knowledge that's just not taught that you need [in order] to participate in an open source project. There's a difference in how open source is approached [compared to] traditional software, and it's not like you can learn it in a book. It's very much an apprenticeship model." Intel's Moblin switches from Ubuntu in favor of Fedora Rahul Sundaram shared news reported in the UK's Register that Intel has shifted from use of Ubuntu to Fedora. "Under the changes, the existing Ubuntu-based kernel is out and Fedora is in, along with a set of Gnome-compatible mobile components that updates Moblin's previous Gnome implementation." Intel's director of Linux and open-source strategy explained that "there was no falling out with Ubuntu, but the move to Fedora was a technical decision based on the desire to adopt RPM for package management." Rahul followed up with more information on this development, reported later in heise open source. Fedora launches OLPC group Rahul Sundaram forwarded news that the Fedora Project has started a Open Laptop per Child Special Interest Group to help with the educational computing effort. Fedora will offer increased help with package maintenance for OLPC, "maintain an excellent Sugar environment for Fedora, including a dedicated Sugar spin; to identify opportunities for collaboration on things such as infrastructure and localisation." A discussion list has also been established for this, and all are welcome to join these efforts. Ring. Ring. It's Fedora calling Rahul Sundaram shared a story in CNET News this week about Fedora Talk, a VOIP project that "allows Fedora contributors to use any standard VoIP hardware or software to sign into the Fedora system and make and receive calls to other Fedora contributors." CNET added, "It's an intriguing way for the Fedora community to tighten the development process by bringing developers together. IM, mailing lists, and e-mail are great, but talking with someone is sometimes the best way to make things happen." Linux Symposium Proceedings Available Rahul Sundaram posted that the 2001-2008 proceedings of the Linux Symposium were now freely-available, along with the GCC Summit Proceedings. Video: Fedora Live Rahul Sundaram shared a recent article in Red Hat Magazine featuring the Fedora Project's Paul Frields talking with developer Jeremy Katz "to discuss the Live USB feature debuted in Fedora 9 ... See a live demo of the persistent desktop, and find out how to get more involved in the next Fedora release." In this section, we cover Fedora Ambassadors Project. Contributing Writer: Jeffrey Tadlock FAD EMEA 2008 - Date & Location Determined Sandro Mathys announced that the data and location for FAD EMEA 2008 have been determined. It will take place in Basel, Switzerland from 2008-11-14 to 2008-11-16. Additional information is available on the FAD EMEA 2008 wiki page. Planning for Fedora 10 Release Parties Francesco Ugolini posted to the ambassadors list a request for feedback for planning for Fedora 10 release parties. We had great success with out Fedora 9 release parties - be sure to get your suggestions in for planning Fedora 10 release parties in the future. Event Reports Reminder Max Spevack posted a reminder that event reports are required if you were the leader of an event. Event reports are also encouraged from attendees of events as well. The event reporting guidelines page covers what should be included in an event report. In this section the people, personalities and debates on the @fedora-devel mailing list are summarized. Contributing Writer: Oisin Feeley Erratum: FWN#133 "Shark" is a JIT not a VM Gary Benson kindly corrected an error in FWN#133 "Java, So Many Free Choices" which reported on the work being done by Red Hat engineers to expand the availability of a FOSS Java across more architectures. The gist of the correction is that Shark is not a Virtual Machine(VM) as stated in the article. Gary explained that OpenJDK is composed of a VM named HotSpot and a class library. HotSpot runs on a limited number of architectures and so there have been two independent attempts to increase VM coverage. One of these is pre-existing project named CACAO which is a VM whose maintainers are implementing the OpenJDK class interface. The other is a Red Hat initiative, named zero, to remove architecture-specific code from HotSpot in order to make compilation on diverse platforms easier. As zero is slow and in need of a JIT. This JIT could well end up being Shark. Thanks to Gary for taking the time to clarify this point. We encourage readers to correct important technical issues and misunderstandings and can be contacted via "[email protected]". New libraw1394 Rebuild Exposes Closed ACLs A simple warning made by Jarod Wilson of a soname bump of libraw1394 (which among other things allows easy switching between juju and the older drivers) revealed that Fedora's KDE maintainers are not using open ACLs for their packages. The issue of whether open ACLs should be used to allow any interested community member (e.g. with a FAS account) to start making changes without bureaucracy has been visited several times on @fedora-devel and has been argued[1a] to be one of the exciting "post-merge" aspects of the FedoraProject. Objections have included those based on security (see FWN#112 "Open By Default: New FAS Groups Proposed"[1b]) and the logistics of co-ordinating such open access (see FWN#91 "Community Control And Documentation Of New Workflows"[1c]). At times it has appeared that those who were non-Red Hat employees and contributing to the pre-merge "Extras" repository were the strongest advocates for open ACLs. Jarod provided a short list of affected packages including kdebase and kdebase3 and wondered whether he should "do a fancy chainbuild, or just let rawhide be busted for a day?" Following advice received offlist he decided that the procedure would be to first bump and tag each of the packages, and then from within the devel-branch of a dependent package issue a: [jwilson foo fedora-cvs/pkg11/devel]$ make chain-build CHAIN="libraw1394 pkg1 ... pkg10" This eventually worked, but first Jarod had to contact maintainers that disallowed commit access using open ACLs and get them to do the bump and tag in order to use the above method. Early on in the chain of events Kevin Koffler noted the necessity to do this for the KDE packages. "Drago01" wondered why there were closed ACLs to which Rex Dieter replied that it was not necessary for non-core development platform bits and he would try to change the ACLs for them. Konrad Meyer defended the choice on the basis that "KDE is a major system component and the KDE team (which is something like 6-8 people) does a very good job of fixing things as soon as they need fixing." Further probing for an actual reason by Rahul Sundaram resulted in Konrad stating that it was necessary to prevent people from making mistakes and that the kernel package was handled similarly. Rahul was unconvinced by this and Jon Stanley agreed it should be possible, as with GNOME, to use open ACLs to allow anyone to help. XULRunner Security Update Breakage Stimulates Bodhi Discussion After Michael Schwendt published a summary of broken dependencies for Fedora 9 it was noticed by Martin Sourada that most of the problems were due to a recent update of xulrunner which now provides gecko-libs (see FWN#110.) Martin discovered that gxine, which was his particular responsibility, did not depend on a specific version of gecko-libs and thus removed the versioned dependencies. He suggested that a review by carried out of the other affected packages to determine whether this was also the case for them. Martin was further concerned that the policies for pushing security updates for a stable release be examined in the light of this particular case because it would fail to install due to all the broken dependencies. He suggested that it ought to be possible to use chain builds (the Koji buildsystem allows packages to be grouped into sets during the build process and to only report success if all the packages complete perfectly) to ensure that such breakage does not occur. He also wondered why the security update was not mentioned on the "-devel(-announce) list?" Nicolas Mailhot agreed strongly wondering: "why the hell is this stuff not tested in -devel first? [...] When the update process is not streamlined in -devel, it's no surprise it bombs in -stable when security updates are due." The answers to these questions came from Adel Gadllah (drago01) who replied that as it was a security fix it had to go to updates-stable immediately instead of following the normal procedure. David Nielsen interjected that this method did not deliver a quick security fix because those using, for example, epiphany failed to get the update because the dependencies had not been properly handled. Michael Schwendt also made the same point: "Doesn't matter. It doesn't install at all if it breaks dependencies of *installed* packages. Not even *skip-broken helps in that case." Adel clarified that he was explaining "why it was done, not that it was the right thing to do. As I already said, bodhi should block updates that break deps." Generally bleeding-edge changes for the next version of Fedora are published in the "fedora-rawhide" repository, which is derived from a CVS branch named "-devel". The "fedora-updatestesting" repository contains bleeding edge changes for the current maintained release, the idea being that volunteers will test them and provide feedback before they are pushed to the "fedora-updates" repository for general consumption. Broken Upgrade Paths Due to NEVR A report listing packages which failed to upgrade smoothly was emailed to the list on Mon 21st. This would appear to be the output of Jesse Keating's revamped version of the old Extras script upgradecheck (previously discussed in FWN#108 "Package EVR Problems") which examines Koji tags to determine whether upgrades from one package version to another will work. NEVR stands for Name, Epoch, Version, Release. http://fedoraproject.org/wiki/FWN/Issue108#Package_EVR_Problems Michael Schwendt noticed that at least one reported failure, of audacity to upgrade from "dist-f8-updates-testing" to "dist-f9-updates" was a false positive because it omitted to take the possible intermediate tag "dist-f9-updates-testing" into account. Jesse Keating pondered the idea and while admitting the possibility that someone might "at one time [have] installed F8 testing updates, and then upgraded to F9 + updates, but without F9 updates-testing. However, it's more plausible that if they were using updates-testing on F8 that they would upgrade to F9 + updates + updates-testing." He suggested that he would break the testing down into two separate paths: "F8, F8-updates, f9-updates" and "F8-updates-testing, F9-updates-testing" and also list the person that built the broken instance instead of listing the owners of the broken packages. As the owner can change per branch Michael Schwendt suggested that the pkgdb could be queried for branch-specific ownership data, but Jesse thought that it was more interesting to know who built the package rather than who owned it. He hoped that "the <pkg>-contact fedoraproject org or some such gets created soon so that the script can just email that + the person whom built the problematic package" and Seth Vidal quickly implemented this after Toshio Kuratomi made some changes to pkgdb. Application Installer "Amber" Provides Browser Interface to Packages A description was posted by Owen Taylor of a visual means to rate, browse and install packaged applications in a repository. The discussion around this revealed some differences over the advisability of providing separate ways for ordinary end-users on the one hand and package maintainers on the other to discover and discuss the software available from the FedoraProject. Owen's post was to announce that he had hacked up a web-browser plugin (a detailed README is available which includes discussion of security and cross-browser support) which used PackageKit to allow the installation of packages selected from this website. He had hopes that this would be "robust against inter-distro differences in package names" and wondered "[w]hat do people think... does this make sense as part of the PackageKit project?" Following a suggestion from Tom Callaway that it be integrated with PackageDB (this is the central repository of meta-information on packages and is currently targeted to the needs of package maintainers and release-engineering to track ownership and ACLs) there were questions from Jeff Spaleta about what that meant. Owen replied with more detail, and explained that the web application would take information from PackageDB but that the plugin would use PackageKit (and YUM and hence comps.xml) to display actual installable packages. He listed other possible operations beyond simple installation of packages. It would be possible to offer installation to any anonymous user, but after authentication rating and commenting on packages could be authorized for users in the FAS class. Similarly, the ability to edit package information could be authorized for package owners. Jeff emphasized that he would prefer to see Owen's interface replace, or augment, the existing PackageDB one in order to increase user-maintainer communication by simplifying and reducing the number of interfaces. Bill Nottingham wondered "Does anyone actually use packagedb to browse for available software?" and although there were a couple of affirmative replies there was no aggregate data presented to answer this question. Nicolas Mailhot replied with some possible uses for expanded meta-information based upon the experience of the Fonts SIG. Robin Norwood explained to Jeff that the PackageDB was for one audience "(mostly) targeted at people interested in the plumbing of Fedora" while the new interface was "targeted at people who are looking for applications to install and 'do stuff' with." He posted a link to the Feature page for this ApplicationInstaller. Work seems to have progressed quite far with both the web-application side, which is tentatively named "Amber" and is available for proof-of-concept testing and also with Owen's plugin. Jeff re-iterated his point that "driving users to a different site than the package maintainers... and allowing them to comment [is] going to cause a communication gap" and characterized this as "driveby commenting and rating." Matthias Clasen did not accept that the use cases and requirements were the same as those for PackageDB and argued that "[t]his is not an effort to improve package quality or gain new contributors. This is an effort to make life of users better. It is not about packages, but about applications." Robin was against Jeff's idea of a "monolithic app" and emphasized that he was using existing infrastructure to provide a new interface and also planning easy export of the data. He envisioned this data as providing, for example, a feed of comments about each package to PackageDB: "More of a semantic web type idea than an isolated database or a 'one-stop shop'." RPM Inspires Intel Moblin2 Shift From Ubuntu An excited Peter Robinson copied a link to "The Register" to the list. The article claimed that Intel's next version of "Moblin" (cunningly codenamed Moblin2) would be replacing the "Ubuntu-based kernel" with the Fedora kernel and cited Dirk Hohndel. Specifically it attributed a desire to "move to Fedora [as] a technical decision based on the desire to adopt RPM for package management [and also that] having a vibrant community push is the winning factor." The article has since been rebuffed by Hohndel in a comment on one of his blogs as "not only low on detail, it's also high in content that's made up or blown out of proportion" but he does confirm that "we decided to move to an rpm based distribution as that gave us better build tools and most importantly a better way to manage the licenses under which the individual packages are released." Moblin is a GNU/Linux-based software stack for Mobile Internet Devices which includes Xorg,GStreamer,ALSA,the MatchboxWM, GTK, Cairo, Pango, D-Bus, Avahi, Evolution Data Server and more. In order to make life easy for developers a Moblin Image Creator makes it easy to create a small 350-600MB binary image for a particular architecture. Moblin explicitly aims to provide an alternative to GNOME and KDE. http://www.moblin.org/resource.center.php Commentary on @fedora-devel tended to cautious optimism mixed with a desire for a lot more information. Jeff Spaleta asked whether the idea was to have Moblin2 be a "part of the larger Fedora project or is it going to be a downstream derived distribution that will include components such that it can not carry the Fedora name?" and broached the idea that Moblin2 might be a candidate for a Secondary Architecture (see FWN#90 and FWN#92.) DavidWoodhouse (posting with an Intel.com sig) also liked the idea of a Moblin2 SIG producing a Fedora spin for MIDs (Mobile Internet Devices.) While "yersinia" thought that the emphasis on RPM was interesting Hansde Goede was intrigued by the emphasis on community activity. Hans suggested that Jeff Spaleta contact Dirk Hohndel to emphasize the dynamic nature of the FOSS community behind Fedora. Jeff suggested that Karsten Wade could meet with Dirk at this week's OSCON. Ex-Red Hat star employee Arjanvande Ven volunteered to do what he could to help make contact with Dirk, describing himself as "on the other side of a cube wall" from him. In response to Rahul Sundaram's request for concrete information from Intel Arjan responded that he would do his best to get the right people to make contact, but that much of the speculation on @fedora-devel concerned topics which have an "eh we don't know yet" answer. He also repeated cautions against believing anything which journalists write. Paul Frields followed up with details of a meeting at OSCON with senior Fedora hackers. It seemed that the ability to use OpenSuSE's Open Build System (which is based on RPM) was one of the main motivations behind Intel's move. Apparently Koji (the Fedora Project's buildsystem) lacks some specific functionality. Discussion between Paul Frields and Jeff Spaleta centered around whether the apparent Moblin2 plan of acting as a downstream derivative of the Fedora kernel would allow them to garner community contributions and whether this mattered anyway given Intel's vast resources. Arthur Pemberton thought that this was a good opportunity to take on some of the anti-RPM and anti-YUM misinformation which had been spread about. David Nielsen thought it was best to merely demand proof from those spreading FUD. Seth Vidal conceded that perhaps not enough had been done to publicize the improvements in YUM and RPM over the last few years and cited a particular case-study of a smartpm user comparing it with YUM to the advantage of the latter. In this section, we cover the Fedora Artwork Project. Contributing Writer: Nicu Buculei After Martin Sourada laid out some plans last week for the Nodoka GTK2 theme engine development, he updated the Fedora Art list with news about the topic: "Considering that the Feature freeze for F10 is nearing and I haven't finished yet with the sketching, I'll push it for Fedora 11, while in Fedora 10 we'll have new notification theme , maybe the Echo icons and some minor improvements to the gtk theme/engine." Gathering feed-back about Fedora 10 theme proposals After the first round of the theme creation process for Fedora 10 ended, Nicu Buculei started gathering feed-back from the community (everyone is invited to participated, including the Fedora Weekly News readers): "Since the first round for F10 themes just ended, I wrote to my (infamous) blog an article listing all the proposals, including thumbnails and descriptions and asked for feedback (noting that the preferred way is this mailing list). Also posted about it on FedoraForum." A possible Bluecurve revival Andy Fitzsimon shared on the Fedora Art list a theme mockup "I didn't design it specifically for fedora but I hope someone here finds it useful for future mocks" and very quickly Hylke Bons expressed his interest and idea about using it in combination with his own project "I think this will fit well in my attempt to ressurect Bluecurve" (Bluecurve is the venerable theme introduced in Red Hat Linux 8 and used as a default until Fedora 6). In this section, we cover Security Advisories from fedora-package-announce. Contributing Writer: David Nalley Fedora 9 Security Advisories - mantis-1.1.2-1.fc9 - https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00801.html - dbmail-2.2.9-1.fc9 - https://www.redhat.com/archives/fedora-package-announce/2008-July/msg01094.html - libetpan-0.54-1.fc9 - https://www.redhat.com/archives/fedora-package-announce/2008-July/msg01093.html - php-5.2.6-2.fc9 - https://www.redhat.com/archives/fedora-package-announce/2008-July/msg01021.html - ruby-22.214.171.124-1.fc9 - https://www.redhat.com/archives/fedora-package-announce/2008-July/msg01016.html - gnutls-2.0.4-3.fc9 - https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00980.html - licq-1.3.5-2.fc9 - https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00879.html - perl-5.10.0-27.fc9 - https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00874.html - linuxdcpp-1.0.1-3.fc9 - https://www.redhat.com/archives/fedora-package-announce/2008-July/msg01106.html - sipp-3.1-2.fc9 - https://www.redhat.com/archives/fedora-package-announce/2008-July/msg01160.html Fedora 8 Security Advisories - wireshark-1.0.2-1.fc8 - https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00798.html - asterisk-126.96.36.199-1.fc8 - https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00839.html - mantis-1.1.2-1.fc8 - https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00813.html
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662658761.95/warc/CC-MAIN-20220527142854-20220527172854-00643.warc.gz
CC-MAIN-2022-21
29,527
136
https://forums.watchuseek.com/f11/seth-thomas-pocket-watch-fake-751665.html
code
I don't know a thing about pocket watches but I came across my Grandfathers old jewelry box and inside was this Seth Thomas pocket watch. I'm quite certain it's fake as it just doesn't look right. The metal casing feels "tinny" and I have no idea of the metal type. The guts look circa 1970's to me and to my knowledge Seth Thomas stopped producing stop watches around 1915 but I could be wrong? It does reference Seth Thomas in the guts in a couple of spots along with "17 jewels". I can't find any serial numbers to reference either inside nor on the case. Can someone take a look at the pics and just confirm my suspicions?
s3://commoncrawl/crawl-data/CC-MAIN-2019-39/segments/1568514573173.68/warc/CC-MAIN-20190918003832-20190918025832-00375.warc.gz
CC-MAIN-2019-39
626
1
https://blogs.oracle.com/narayanaa/entry/running_web_application_under_large
code
Running web application under large concurrent user loads By narayanaa on Jul 11, 2008 Whenever we talk about the load/performance typically it depends on all the tiers on which the application is working. Hence we need to look at the following things. - Nature of the Application vs.Hardware on which the application runs because -- " machine which appears slower in a single-threaded test will likely be faster in a multi-threaded world." - Tune the DB/EIS tier, - Tune the Application Server for the middle tier (where POJOs & SLSBs run) and also - Tune the Web/portlet Container where the eVision application - Apart from that the application since it can have some really "messy code" which takes longer time to load the page or loads in Ideally in in such cases we should think of load balancing the Application under consideration in a cluster. Once you do this there are few other things you need to look at with respect to the following: - JVM options of the Application server. A set of properties like Heapsize, Garbage Collection properties etc. depending upon the Application's nature. - Increase the pool size of the DataBase that is being hit from the connector/JCA perspective with in the Application Server - Do DB/EIS tuning: Tuning the database performance is not a simple task and it depends on Application specific requirements, the operating system and the target hardware. There is no single approach. The goal is to avoid obvious slowdowns and balance the available resources (I/O bandwidth, memory and CPU). - From the Web/portal server perspective.We need to tune the - AccessManager (Manages Sign on) - this can have issues if running behind firewall or the network settings. - Directory Server - Run some tuning scripts those come by default with the portal - Thread Pools : The Java Virtual Machine (JVM) can support many threads of execution at once. To help performance, both Access Manger and Portal Server or Application Server one or more thread pools. Thread pools, allow you to limit the total of threads assigned to a particular task. When a request is passed into the web container from a browser it will flow through several thread pools. A thread pool contains an array of WorkerThread objects. These objects are the individual threads that make up the pool. The WorkerThread objects will start and stop as work arrives for them. If there is more work than there are WorkerThreads, the work will backlog until WorkerThreads free up. Assigning an insufficient amount of threads in a thread pool can cause a bottleneck the system which is hard to see. Assigning too many threads to a thread is also undesirable but normally is not critical. These can be managed either using Admin console or any script provided or using any other means given by the vendor.
s3://commoncrawl/crawl-data/CC-MAIN-2016-36/segments/1471982298977.21/warc/CC-MAIN-20160823195818-00169-ip-10-153-172-175.ec2.internal.warc.gz
CC-MAIN-2016-36
2,795
42
https://devpost.com/software/cards-against-gifs
code
We wanted to be creative with Giphy's API. We're also big fans of board games, and strongly got influenced by Cards Against Humanity :). What it does GIFS Against Humanity is a multiplayer web game that can be played in a browser. Users can create or join a game room. The game works like cards against humanity except that players are given a set of random gifs and each player chooses a gif to compliment the given card. The judge then decides which card was the funniest, or chooses a winner. How we built it We've built it using React on the frontend and Python on the backend. Challenges we ran into Getting the frontend to connect with the backend and some UI styling. Getting api endpoints to behave how we wanted them to. Accomplishments that we're proud of We're proud of crossing borders to participate in this hackathon with no sleep, especially our boy Chris who battled through the night, and got our app ready. What we learned We learned how web sockets worked in order for multiple users to communicate to the server and get real-time updates from the server. What's next for GIFS Against Humanity Many cleanup, prettify-ing and optimization. ;) Add some voice coms!
s3://commoncrawl/crawl-data/CC-MAIN-2021-21/segments/1620243991378.48/warc/CC-MAIN-20210515070344-20210515100344-00182.warc.gz
CC-MAIN-2021-21
1,181
13
https://pic-microcontroller.com/stepper-motor-driver-using-pic18f4550-microcontroller-2/
code
In this tutorial we are going to drive a Single unipolar stepper motor using PIC18F4550 Microcontroller in various different stepping modes. The source code and Project files are free to download at the end of this page. Stepper motor due its excellent features is very famous in between hobbyist for various robotic applications. Running DC, Stepper motor and servo is the most basic requirement in any robotic application which moves. Stepper motor’s ability to run in various modes with various speed and torque gives it a more degree of advantage over the simple DC motor for various projects, especially in robotics based projects. So in this basic stepper motor tutorial we will learn to drive a simple 5 wire unipolar stepper motor using a 40 pin PIC18F4550 microcontroller. For a little more sophisticated Stepper motor Driver you can also follow my USB Stepper Motor Driver project which is quiet similar to current project , however this driver tutorial does not involve any interaction to any computer system directly except for writing the codes. The stepper Motor can be also connected directly without ULN2003, but during the testing the results were not satisfactory hence a ULN2003 was added. Caution!: 9V power supply is given to Stepper Motor which is not same as the voltage for the PIC18F4550 power supply (5V). Do not connect both the power supply together as the PIC18F4550 cannot bear more than 5V, both the supply must not be shot together or the microcontroller will be damaged. If you have a single source of power supply for both the Stepper motor supply and Microcontroller, then add a MCP102 or an IC 7805 Voltage regulator (5v) before the VSS terminal of the Microcontroller, which would keep the input voltage to microcontroller at 5V. It is important to understand the color code of the stepper motor for identifying the Coils and Common wire before it can be connected across the Microcontroller pins. The diagram below shows which color cables are connected across which pin of the microcontroller. The source code is compiled with MPLAB X IDE and X C8 Compiler which can be loaded into the microcontroller using pickit2 or JDM Programmer. It can be also compiled with Mplab and C18 compiler without much effort. For convenience I have added both versions of the source code at the end of this post with the compiled HEX file. For our Stepper Motor Driver we are not going to use any external Oscillator with the microcontroller. There are two source code posted here, the source code 1 demonstrate the basic and simple Single Stepping mode of a stepper motor. The second source code is little more complex and has three other stepping modes (Single, FULL and HALF) cycling with delay of 5 seconds each. For more detail: Stepper Motor Driver using PIC18F4550 Microcontroller
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506479.32/warc/CC-MAIN-20230923030601-20230923060601-00571.warc.gz
CC-MAIN-2023-40
2,810
11
https://communicator.livejournal.com/724063.html
code
Reason I mention it is that in episode 2 there was a scene between Jason (Sookie's brother) and Andy the Sheriff talking in the diner - a middle aged man and a waster talking about protecting each other and so on - and I thought 'Hey, this is taking the piss out of Breaking Bad isn't it?', and then 'Come off it woman, you are imagining it'. Anyway, I am turning this question over in my mind, when blow me down, the two of them decamp to a meth lab and start throwing bags of crystals around. Tell me that's just a coincidence. I'll be interested if that's just a one-off nod, or if this will be developed as a running joke. Probably a one-off. It's nice when a joke develops in that way, just at the speed you cotton on to it. Because the joke wouldn't have worked if the suspicion wasn't already forming, or conversely if it had been resolved. One of the things I am most impressed by in the new golden age of telly is the way the timing is so well judged. Not just of jokes of course, but revelations and conundrums and all the rest. Or perhaps I call those shows 'golden' which have pacing that matches my attention span.
s3://commoncrawl/crawl-data/CC-MAIN-2021-39/segments/1631780057033.33/warc/CC-MAIN-20210920070754-20210920100754-00507.warc.gz
CC-MAIN-2021-39
1,127
2
https://itectec.com/superuser/lowering-the-throttling-temperature-in-windows-8-for-a-laptop/
code
I've seen a lot of posts about disabling the throttling temperatures but none regarding setting them. I have an Acer V17 Nitro, i7 laptop and it's CPU temperature reaches 95°C before throttling. It's a very powerful laptop, crippled by a bad cooling system. I already undervolted by 70mV and disabled hyper boost. Currently, I have to go into Power Options and adjust Maximum CPU Frequency between 40% and 80% to keep the temperatures under 80°C. But this depends on the application. And I have to do this manually for each application I'm using. Ironically, some applications (especially Fortnite) will run just fine with the CPU frequency set to 30-40% with the temperatures only rising to 80°C, while others will run at the same temperatures with the maximum frequency set to 80%. It just depends on how the code was written and how many cores are being used. I know the throttling temperature is set to 95°C for the CPU, but even if it doesn't melt the CPU, it can cause a lot of other issues, like melting the case. I would prefer to lower the throttling temperature to something like 80°C. This way I don't have to adjust the maximum CPU frequency by hand every time. Is there a way to do this from the BIOS? From Windows? Via a third party app?
s3://commoncrawl/crawl-data/CC-MAIN-2021-39/segments/1631780058589.72/warc/CC-MAIN-20210928002254-20210928032254-00657.warc.gz
CC-MAIN-2021-39
1,256
7
http://www.efunda.com/forum/show_message.cfm?start=1&thread=11772&id=11778
code
Microsoft Excel is WRONG!!! Beware... Actually, I'm not so sure it's wrong. I think =-(3+6)^2 only seems ambiguous as to whether the negative refers to the (3+6) or the entire expression. If I were after the opposite of the square, I would have the entire expression in parentheses, =-((3+6)^2). I believe the rule for negation is that it applies to the adjacent TERM. I would be interested in two things: 1.) the MS Excel documentation, and 2.) an opinion from an actual text or mathematician.
s3://commoncrawl/crawl-data/CC-MAIN-2018-30/segments/1531676589417.43/warc/CC-MAIN-20180716174032-20180716194032-00186.warc.gz
CC-MAIN-2018-30
494
3
https://documentation.anyline.com/ios-sdk-component/44.1.0/demos-and-sample-codes.html
code
Demos and Example Codes Our demo app bundle hosted on Github has all the example codes needed for you to get started writing code with Anyline. The bundled demo app includes some of the most common use cases that we support, and could also serve as a good resource for learning how certain scanning features are achieved. The Anyline website also offers a sample sheet PDF to test the SDK, which you can download from here: Questions or need further assistance? Reach us at [email protected].
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510149.21/warc/CC-MAIN-20230926043538-20230926073538-00762.warc.gz
CC-MAIN-2023-40
492
5
https://news.ycombinator.com/item?id=10152830
code
Lucid Software is building world class graphical applications in the browser and on mobile devices. Our first product, Lucidchart (http://www.lucidchart.com), is an online diagramming application with 4M+ users. We recently launched our second product, Lucidpress (http://www.lucidpress.com), which is an online layout and design application. Lucid is a startup founded by Karl Sun, a former Google exec, and Ben Dilts, our CTO. We're profitable and rapidly growing in every dimension of the business and need people to join our team. For fun we raft river rapids on company retreats, have Friday BBQs, and eat lots of pizza. Talent and ability to learn are more important than specific skills. BACKEND SOFTWARE ENGINEER (all experience levels) - Lucidchart and Lucidpress run with various decoupled services in a Linux environment using Scala, MongoDB, AWS, and MySQL. At Lucid your responsibilities would include enhancing existing services, building new services, integrating with 3rd party applications and ensuring services are highly available, secure, and scalable. Requirements: - Talent - BS degree Recommended experience: - Building large products / applications - Scala or Java - MySQL or other relational database - NoSQL databases - Cloud computing (AWS) Apply here: https://hire.jobvite.com/j?aj=oa2cZfw7&s=Hacker_News Apply here: https://hire.jobvite.com/j?aj=odrjZfwG&s=Hacker_News *The application requires a current resume, cover letter, and an unofficial or official university transcript.
s3://commoncrawl/crawl-data/CC-MAIN-2021-17/segments/1618038088264.43/warc/CC-MAIN-20210415222106-20210416012106-00430.warc.gz
CC-MAIN-2021-17
1,508
6
https://forums.tomshardware.com/threads/two-asus-b550-plus-boards-wont-power-on-psu-is-confirmed-working.3745682/
code
I'm building my first new PC in a few years. i am on my second Asus B550-Plus mobo. connecting to power supply (only) and shorting power switch pins does nothing. the RGB strip near the 20 pin block cycle colors. i have my old 990fx board and doing the same with 2 different power supplies (600w and 750w atx compatible ) works as expected in both cases. Asus support was 0 help. i figure i must be doing something stupid, Asus have been reliable in the past and having two of them being bad in two days is pretty horrible luck. Thanks in advance.
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506480.35/warc/CC-MAIN-20230923062631-20230923092631-00255.warc.gz
CC-MAIN-2023-40
547
1
http://con.ca/view/news/10378-We-should-be-very-careful-about-what-software-we-use-on-a-device-that-is-always-on-and-in-our-pocket-24h-a-day
code
Open-source engineer and digital rights activist Nikos Roussos reminds us that companies like Google, Apple and Microsoft are all working together to provide intelligence agencies with your private data. The way around it, at least with Google, is to free your Android, and run only open-souce software. He explains how. Starting from the very basic thing that makes our smartphone operate, it seems that we don't have many options. So if you are using Iphone or Windows Phone, let me remind you that both of these companies are in the infamous NSA slides for giving access to users private data. So this post is about Android and my current setup of running only Free Software on my smartphone. I know what you are thinking.. that Google is also part of NSA's "special friends". Android is self-defined as an "Open Source Platform" (AOSP), and pretty much it is since it's released under a mix of Apache and GPL license (although mostly developed behind closed doors). But this isn't what you get when you buy a smartphone. Your device will certainly have preinstalled all of the Google's proprietary stuff (gmail, play, etc) and probably manufacturer and/or vendor applications. Things that you have no idea what they do, besides their "normal" functionality, because we don't have the code to look at. |PiPhone: Raspberry Pi Homemade Mobile Phone| |"It's still a tiny computer in your pocket."| |CellScope: Turn Your Smartphone Into a Microscope| |“These days, the children don’t play at break time anymore.”| |EARonic, the iPhone Cases That Look Like Ears| |“We are considering public transport free of charge in order to reduce the number of private cars.”| |"Automation will disrupt millions of Canadian jobs, not far in the future, but in the next dozen years."| |"What if plant cells could be grown for food by regular people."| |The 24 Carrot Cake| |Japanese Robot Serves Ice Cream From Inside a Vending Machine| |“What happens when anyone can make it appear as if anything has happened, regardless of whether or not it did?"| |How to Avoid Jury Duty| |CaptchaTweet: Write Tweets in Captcha Form| |“Can a platform be 'cool' if your aunt, grandfather, and third grade teacher all use it?”| |The (Very Scary) People of Public Transit| |Fake Name Generator| |“From Self-Driving Cars to Beyond!”|
s3://commoncrawl/crawl-data/CC-MAIN-2018-09/segments/1518891811243.29/warc/CC-MAIN-20180218003946-20180218023946-00634.warc.gz
CC-MAIN-2018-09
2,321
20
https://www.iacpartners.com/en/etudes-de-cas/supporting-a-major-defense-player-on-its-procurement-transformation-program/
code
A European defense actor As part of the transformation programme at group level, the client chooses IAC to carry out competitive actions on a consolidated basis of 250 million euros. The gains, whose initial objectives are set at 20% of the purchasing portfolio, must be identified and secured over a period of 10 weeks. To achieve the objectives, IAC consultants solicit the participation of several entities based in Europe and propose a dynamic and multi-party methodology. In view of the delays, IAC consultants propose 3 complementary methodologies carried out in parallel 1- Product-oriented approach: 2- Supplier Oriented Approach: 3- Transverse approach:
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474650.85/warc/CC-MAIN-20240226030734-20240226060734-00638.warc.gz
CC-MAIN-2024-10
662
7
http://ualr.edu/crc/index.php/home/resources/
code
Our strength lies in our platform diversity. Regardless of whether big memory or lots of CPUs or Linux or Microsoft Windows or even auto-parallelization is required, we probably have a system to address your needs. Our resources also comply to FISMA standard. Our first supercomputer was brought online in May of 2009. Argon is a traditional Rocks 5.4 cluster running CentOS 5.5 to achieve 5.45 Tflops (trillion floating point operations per second) theoretical peak performance. Argon is appropriate for situations where a problem can be split up between numerous processors and where the researcher is comfortable with writing or modifying code to take advantage of parallel processing. - 512 computing cores (2.66 GHz) on 64 nodes - 1 TB compute-node memory (16GB per node) - 64TB local scratch (1 TB per node) - 40TB Lustre Filesystem - 20Gbps DDR Infiniband Based on ScaleMP’s vSMP software, Boron runs CentOS 6.2, has a high memory to CPU ratio, and is ideal for researchers who are not familiar with writing parallel code but still have the need for parallelization. The vSMP platform itself handles parallelization of straight or conventional code, allowing researchers to spend more time focusing on their actual research and less time debugging code. - 192 computing cores (3.2 GHz) on 16 nodes - 768GB memory (48GB per node) - 60TB local scratch (4TB per node) - 40bps QDR Infiniband Our Microsoft Windows HPC Server 2008 R2 cluster serves to address the needs of the multitude of users who are bound to Microsoft platforms and applications. It is the first cluster of its kind within the Arkansas research community and provides a distinct flexibility to the CRC that sets us apart from other regional HPC facilities. - 180 computing cores (2.66 GHz) on 15 nodes - 720GB memory (48GB per node) - 60TB local sctarch (4 TB per node) - 20Gbps DDR Infiniband X9000 storage array available through both Ethernet and 40Gbps QDR Infiniband. - 192TB raw disk space - 125TB useable storage Erbium, our big memory machine by HP, is the most tightly integrated stand‐alone computer in the world as of November 2012! It is the perfect solution for problems involving very large matrices, databases, or datasets. For example, loading an entire genome into memory at one time enables an entirely new way of working in this field, and affords researchers the ability to focus on the subject at hand without the distractions and tedium normally associated with breaking up sequences, analyzing said partial sequences, and dovetailing results. Another example is performing data entity resolution on truly large datasets without having to artificially break up the sets, without the performance hits related to working with swap space, and without having to worry about missing information that crosses over between points of dataset demarcation. - 80 processors (160 hyperthreaded) - 4TB memory (in a single node) - Intel MKL - High-Performance Linpack (HPL) - Gaussian G03 and G09
s3://commoncrawl/crawl-data/CC-MAIN-2014-15/segments/1397609536300.49/warc/CC-MAIN-20140416005216-00344-ip-10-147-4-33.ec2.internal.warc.gz
CC-MAIN-2014-15
2,981
26
https://forums.mixedmartialarts.com/t/attn-eddiebravo/1514416
code
Hey Eddie, will you be at the tournament in the Convention Center tomorrow? Although I'm not competing I was thinking of going to watch/support. Let me know, thanks! Haha yeah I saw that -- I feel honored. lol Kyle can you still bench 315?? I will be at that tournament too! Really? Man its been forever -- hopefully we can meet up. I just moved out here. I honestly don't know if I can do 315 right now, but probably pretty close :) you live in SO Cal now?? Awsome hey eddie, have you tried herijuana?
s3://commoncrawl/crawl-data/CC-MAIN-2021-49/segments/1637964360951.9/warc/CC-MAIN-20211201203843-20211201233843-00468.warc.gz
CC-MAIN-2021-49
502
7
https://lucatrevisan.wordpress.com/category/theory/
code
Today I would like to discuss the Khot-Naor approximation algorithm for the 3-XOR problem, and an open question related to it. Continuing from the previous post, we are going to prove the following result: let be a -regular Cayley graph of an Abelian group, be the normalized edge expansion of , be the value of the ARV semidefinite programming relaxation of sparsest cut on (we will define it below), and be the second smallest normalized Laplacian eigenvalue of . Then we have As life is tentatively returning to normal, I would like to once again post technical material here. Before returning to online optimization, I would like to start with something from 2015 that we never wrote up properly, that has to do with graph curvature and with Buser inequalities in graphs. In the second week of July, 2022, there will be a summer school on algorithmic fairness at IPAM, on the UCLA campus, with Cynthia Dwork and Guy Rothblum among the lecturers. Applications (see the above link) are due by March 11, 2022. We will soon put up a call for nominations for the test of time award to be given at FOCS 2021 (which will take place in Boulder, Colorado, in early 2022). There are three award categories, recognizing, respectively, papers from FOCS 2011, FOCS 2001, and FOCS 1991. In each category, it is also possible to nominate older papers, up to four years before the target conference. For example, for the thirty-year category, it is possible to nominate papers from FOCS 1987, FOCS 1988, FOCS 1989, FOCS 1990, in addition to the target conference FOCS 1991. Nominations should be sent by October 31, 2021 to [email protected] with a subject line of “FOCS Test of Time Award”. Nominations should contain an explanation of the impact of the nominated paper(s), including references to follow-on work. Self-nominations are discouraged. In the second week of November, 2021, the Simons Institute will host a workshop on using cryptographic assumptions to prove average-case hardness of problems in high-dimensional statistics. This is such a new topic that the goal of the workshop will be more to explore new directions than to review known results, and we (think that we have) already invited all the authors of recent published work of this type. If you have proved results of this type, and you have not been invited (perhaps because your results are still unpublished?) and you would like to participate in the workshop, there is still space in the schedule so feel free to contact me or one of the other organizers. For both speakers and attendees, physical participation is preferred, but remote participation will be possible. I moved back to Italy exactly two years ago. I was looking for some change and for new challenges and, man, talk about being careful what you wish for! Last year was characterized by a sudden acceleration of Bocconi’s plans to develop a computer science group. From planning for a slow growth of a couple of people a year until, in 5-7 years, we could have the basis to create a new department, it was decided that a new computer science department would start operating next year — perhaps as soon as February 2022, but definitely, or at least to the extent that one can make definite plans in these crazy times, by September 2022. Consequently, we went on a hiring spree that was surprisingly successful. Five computer scientists and four statistical physicists have accepted our offers and are coming between now and next summer. In computer science, Andrea Celli (who won the NeurIPS best paper award last year) and Marek Elias started today. Andrea, who is coming from Facebook London, works in algorithmic game theory, and Marek, who is coming TU Eindhoven, works in optimization. Within the next couple of weeks, or as soon as his visa issues are sorted out, Alon Rosen will join us from IDC Herzliya as a full professor. Readers of in theory may know Alon from his work on lattice-based cryptography, or his work on zero-knowledge, or perhaps his work on the cryptographic hardness of finding Nash equilibria. Two other computer science tenured faculty members are going to come, respectively, in February and September 2022, but I am not sure if their moves are public yet. Meanwhile, I have been under-spending my ERC grant, but perhaps this is going to change and some of my readers will help me out. If you are interested in coming to Milan for a post-doc, do get in touch with me. A call will be out in a month or so. After twenty years in Northern California, I am still readjusting to seasonal weather. September is among Milan’s best months: the oppressive heat of the summer gives way to comfortable days and cool nights, but the days are still bright and sunny. Currently, there is no quarantine requirement or other travel restrictions for fully vaccinated international travellers. If you want to visit, this might be your best chance until Spring Break (last year we had a semi-lockdown from late October until after New Year, which might very well happen again; January and February are not Milan’s best months; March features spectacular cherry blossoms, and it is again an ok time to visit). I just heard that Benny Chor died this morning. Chor did very important work on computational biology and distributed algorithms, but I (and probably many of my readers) know him primarily for his work on cryptography, for his work on randomness extraction and for introducing the notion of private information retrieval. I only met him once, at the event for Oded Goldreich’s 60th birthday. On the occasion, he gave a talk on the Chor-Goldreich paper, which introduced the problem of randomness extraction from independent sources, and which introduced min-entropy as the right parameter by which to quantify the randomness content of random sources. He did so using the original slides used for the FOCS 1985 talk. I took a picture during the talk, which I posted online, and later he sent me an email asking for the original. Sadly, this was the totality of our correspondence. I heard that besides being a brilliant and generous researchers, he was a very playful, likeable and nice person. My thoughts are with his family and his friends. This coming Fall semester the Simons Institute for the Theory of Computing in Berkeley will have in-person activities, including the really interesting program on the complexity of statistical inference, within which I will co-organize a workshop on cryptography, average-case complexity, and the complexity of statistical problems. As it had been the case before the pandemic, all Simons Institute events will be streamed and available remotely. This includes a new series of Public Lectures called “Breakthroughs” that starts next week with a talk by Virginia Williams on matrix multiplication. In Rome we have an expression, mai una gioia (literally, “never (a moment of) joy”) that applies well to the present times. Yesterday, there was, finally, something to be joyous about: the announcement that two of my heroes, Laszlo Lovasz and Avi Wigderson, will share the 2021 Abel Prize, one of the highest honors of mathematics. The reader can find a very good article about them on Quanta Magazine. Instead of talking about their greatest accomplishment, here I would like to recall two beautiful and somewhat related results, that admit a short treatment. The Bulletin of the AMS has just posted an article by Keith Ball on the legacy of Bourgain’s work on geometric functional analysis. This beautifully written article talks about results and conjectures that are probably familiar to readers of in theory, but from the perspective of their mathematical motivations and of the bigger picture in which they fit. I am recruiting two postdocs for two-year positions to work with me starting in Fall 2021 at Bocconi University. The positions have competitive salaries and are tax-free. If applicable, I will pay for relocation expenses, including the assistance of a relocation agency for help in finding a place to live and activate utilities, to complete immigration formalities, and to sign up for the national health care service. Milan has been suffering as much or more than other European and American big cities for the effects of the Covid-19 pandemic. I have seen Milan in its normal condition for a few months from September 2019 to February 2020, and it is a beautiful cosmopolitan city, with an active cultural and social life, and with beautiful surroundings. Like San Francisco, it is smaller than one would expect it to be and very walkable (no hills!). Bocconi is situated in a semi-central area, about twenty minute walk from the Duomo. I have received a large European grant that, besides paying for these postdoc positions, has a budget for senior visitors and for organizing two workshops over the duration of the grant. In particular, I was planning a workshop to be held last May in a villa on Lake Como. All such plans have been on hold, but Fall 2021 should be around the time that the global pandemic emergency ends, and I am planning for a lot of exciting scientific activity at Bocconi in the academic year 2021-22 and beyond. I am looking for candidates with an established body of work on topics related to my research agenda, such as pseudorandomness and combinatorial constructions; spectral graph theory; worst-case and average-case analysis of semidefinite programming relaxation of combinatorial optimization problems.
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323585321.65/warc/CC-MAIN-20211020121220-20211020151220-00109.warc.gz
CC-MAIN-2021-43
9,472
27
http://binaryoptionssignalsfacts.com/binary-options-trading-tips/dual-binary-finance/
code
Forex Binary Options Trading Software Free Download 2014 Best FX Auto trading Robot Platform Online Forex Binary Options Trading Software Free Download 2014 is a revolutionary piece of software that hasmade me incredible sums of money and I'm going to give it to youabsolutely free hi my name is Kevin and I'm gonna giveyou access to a binary options trading I developed alongside appearing verysmart people one of them tom had been a successfultrader for close to 30 years when he decided to forex trading his father before him had been a brokerand this guy knows trading like I know breathing the other one Marcus isa computer programmer who has worked for two with the largest online companies inthe world maybe you've heard of them Google andYahoo together we have created a piece forex trading software that is fully automatedcompletely selfcontained rediculous Luisi use 10 Vesta mallinsanely profitable so need to fill in your information atthe bottom of this page you'll be taken to a secure page whereyou'll be given download instructions installing our supper is so easy youwon't believe it them them them them. Exponential Moving Average Cross Strategy Walk Through Hi, my name's Jared Broad, and in this screencast,we're going to be going over the iconic moving average cross trading strategy. This strategyhas been around for awhile, and people seem to keep coming back to it. First we're going to cover the theory of themoving average cross, and then some of the common pitfalls in its implementation. Thenwe're going to code up the strategy from scratch using the basic template, and perform a sanitycheck on our results. Once we've got a working algorithm, we're going to tweak it a littlebit to try and optimize the output. So let's dig into it. Firstly, what is the moving average crossstrategyé Put simply, it's just a trending indicator, and it's one of the most simpletrending indicators possible. First, you have a moving average of the prices over time,and a second, faster moving average, which uses list data samples. When one moving averagecrosses over the other one, it's a signal to buy or sell stock. Using this indicator,people have tried to predict the trends for a long time.Next we're going to talk aboutsome common pitfalls on how you implement the strategy. Firstly, when you're using numerical indicators,you need to debounce the signal to ensure you're not getting many more orders than youactually have signals. As a human, we tend to automatically average and approximate,where a computer, bound by exact precision, can sometimes see the thousand orders whenyou had expected to only see one. Here we have the 10year view of the SP500,where if you zoom in, you can see locations where you wouldn't want the algorithm to tradebecause the signal wasn't sufficiently strong enough. Secondly, because your algorithm isrunning on a loop, it's easy to fire the same order over and over again by mistake. Youneed to make sure you only have one shot or one trigger per signal. So for example, the code below would be somethingyou might write on the first attempt of an algorithm. If the emaShort is greater thanthe emaLong, then we'll just buy some stock. However, as the algorithm is running on aloop, this would mean that your algorithm would buy stock over and over and over againuntil you ran out of money. The better way to do this is to simply keeptrack of when your signal is triggered. You can do this using a Boolean and checking forit before you place your order. The last and most common mistake is overfitting.With a strategy like EMA, it's tempting to adjust the short and long moving average parametersuntil it optimizes the return. Adjusting these values without any foundation in reality orsome fundamental principle to set the values is essentially fitting your algorithm to thepast performance. You'll soon find as you go to trade your algorithm live that the pastperformance does not reflect the future, as the markets will be continually changing. Now we're going to jump into coding the strategyfrom scratch. We're going to start from a basic template so you'll learn the most possible. First you clone the basic template by clickingon the quot;Start algorithm.quot; Now we have the basic template, and I can just use Controland the arrow key to make the font larger so you guys can see it, and we can start simplyby renaming the algorithm. quot;Moving average demo,quot; so that it's a comparable strategyto the other ones that we see regularly. Let's trade it on the SP500. Now let's configure the initialize functionto set up a testing environment while we develop the algorithm. We ideally don't want to testover a really long period; otherwise, every test that we do to see if there's any bugswill take a very long time to get back. This just tests it over a few months, maybe fromJanuary 1 to March 1. And we'll test it with $30,000 cash, we'll test it with minute resolutiondata, and we'll run it in Series mode.
s3://commoncrawl/crawl-data/CC-MAIN-2018-22/segments/1526794866107.79/warc/CC-MAIN-20180524073324-20180524093324-00468.warc.gz
CC-MAIN-2018-22
4,971
11
https://ipvm.com/forums/video-surveillance/topics/hi-i-have-a-banking-client-who-has-20-branches-as-satellite-sites-to-the-hq
code
Michael, first to clarify, do they want to (1) record it first locally at each branch (with a recorder) and then back it up to their HQ or (2) send the video straight from their cameras directly to the HQ? This choice has a big impact on reliability, cost, etc. From your description, I am not positive which of these 2 approaches your client wants to take. Michael, what country is the customer located in? 15-20Mbps gives you the ability to transfer roughly 150-200GB per 24 hours, assuming the bandwidth is exclusively available for backup/data transfer and is not being shared by the branch for other functions. A camera with a 3Mbps average bitrate (low, but acheivable. possibly.) will accumulate approximately 30GB of data per 24 hours. If you're doing continuous recording and want to backup video offsite your 15-20Mbps of bandwidth would support about 6 cameras, and if the network is ever down for more than a few hours you'll fall behind and will need to skip some of the video for backup. You're specifying 20 branches and 700-800 cameras, which comes out to 35-40 cameras per branch. Even with motion-only recording on a majority of those cameras I don't think the math works out to have video backed up to a central location. For systems like this, from an overall design approach the most practical solution is just to record to 2 servers simultaneously. This means you need the bandwidth to support the aggregate of all your camera streams, which you'll find comes out to the same rough estimate as what you'd need to maintain a 24 hour backup cycle. If the 35-40 cameras per site estimate is correct, then you'd need somewhere around 100-150Mbps of dedicated connectivity for this to work. Another approach is to record locally and use a platform that supports some kind of data aging, transcoding, etc. to reduce the size of the stored video. Then you could backup the "pruned" video. In this case, you're most likely looking at something where the onsite video is at full-resolution for 30 days, then pruned, then backed up remotely. This would give you some amount of long-term retention ability at the central site, but would not give you the redundancy of the full-resolution video. I like the way Brian thinks. So far I hear 800 cameras in HD using 1tb per camera for a years storage, not likely if they want HD. As John said this will be PB's of storage. I have heard data upgrade is no problem before and yet, 15 to 20 Mbps per site would require 300 to 400 Mbps at the central location. Have they considered using a tape method where video would be exported daily to tape or other means and then travel to the HQ by transport with other documentation. Old school but possibly more effective. Michael having deployed already the exact same solution, I would suggest a bank should be looking out for quality, scaleability and propoer SI delivery not only pricing. We deployed a combination of Cisco, Milestone Corporate with X protect retail (if they want transaction based searches), EMC in the data center infrastructure and Lenovo on the edge for local 31 day storage. The requirements for this specific market included minimum 1.3mp for general views and 2mp for specific cameras in terms of recording. I cant go into specifics but we have 27 sites all linked back using vpn. The architecture is relatively straight forward. You federate milestone, using express on the edge with interconnect licenses, and milestone corporate in the HQ. If you have any breakage in links when the lease line connections come back up, the data bases synchronize automatically and the video is available on both sides. We are recording 4 months in the NOC and 31 days on the edge storage. Another point worth mentioning is Axis has a new technology called zipstream which reduces your storage requirements tremendously not to mention data traffic. Bottom line, for a bank environment you want a very robust infrastructure from well known proven manufacturers that can scale out (after 12 years in this business I sadly have to say you can count those on your right hand). I respectfully don't agree with some of the comments made above regarding pricing and trying to get things on the cheap. What is cheap today will cost you and your client alot in the long run. Build a relationship, provide them a well engineered solution, support them technically well, and your business will continue to grow.
s3://commoncrawl/crawl-data/CC-MAIN-2018-26/segments/1529267863830.1/warc/CC-MAIN-20180620163310-20180620183310-00061.warc.gz
CC-MAIN-2018-26
4,410
11
https://community.airtable.com/t5/formulas/blank-or-not-blank-which-one-is-correct/td-p/140673
code
Well, if I look at the documentation (https://support.airtable.com/docs/identifying-blank-values) I would have to write Price = Blank(), to check if it is blank. And I am interpreting, that != Blank() would be the way to check if it is NOT blank. But like I said: I've been using != Blank() and NOT(Blank()) with different results. Confusing. Well, to clarify what you're doing, what result are you trying to achieve? What field types are you checking for blank values (Link Fields, Numeric Fields, Email fields etc), and what is the output you're needing in the formula field that's checking if the target fields are blank? In my Not(Price) example, whenever there's a value a 0 will return, if price is blank then a 1 will appear. Alternatively, in my formula field if I write; Then this will return a 1 when my price field has a value, and a zero if price is blank.
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764499845.10/warc/CC-MAIN-20230131055533-20230131085533-00413.warc.gz
CC-MAIN-2023-06
868
4
https://forums.macrumors.com/threads/a-tool-for-os-9-2-2-to-merge-split-concat-segmented-files.343834/
code
Hi. I am downloading a large file, that was segmented with split & concat into several parts. the file itself will work on OS 9, but I have found I can not use split & concat to merge it because that is apparently for OS X only. My question is basically can these segmented files be merged by another program that works on os 9, or am I not going to be able to merge them at all? i have only downloaded a third of the files so far and i have a long ways to go so i thought i better find out now rather than waste time and be dissapointed much later after waiting for it to finish! Many thanks!
s3://commoncrawl/crawl-data/CC-MAIN-2018-47/segments/1542039748901.87/warc/CC-MAIN-20181121133036-20181121155036-00552.warc.gz
CC-MAIN-2018-47
593
1
https://support.shorturl.gg/knowledge-base/how-can-i-use-direct-redirects-in-the-api/
code
As a Simple URL Shortener premium business user there is multiple options when using the API and if you want to use the direct redirects instead of the “Page Redirect” then follow the instructions below to directly bypass and transparently redirect to your users to your page of choice though the API. To use developers API with the direct redirect add the below code to the end of the URL: so the final API call will be: Apply this to your code base and run it and all your shortened URLs will redirect directly to the destination URL that you want your users to land. Also please note that the example above use a custom branded domain value which is a premium paid feature. If you want to use your own custom domain then go to our pricing page for more information.
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296816024.45/warc/CC-MAIN-20240412132154-20240412162154-00679.warc.gz
CC-MAIN-2024-18
772
5
https://conops.susi.swiss/index.php?title=Network_identification_service
code
Network identification service The network identification service requires operators to share flight data by making them available to the U-space service provider of their choice. Those are aggregated by U-space service providers active in the same area and made available to authorized users: USSPs, the traffic information service, air traffic service units, relevant authorities and the general public. The data shared by the Network remote identification service are available in their entirety to all authorized users. They include: - the UAS operator registration number as required by (EU) 2019/947. The number can be obtained from FOCA on its UAS.gate portal. The registration number is public but related date are not. They can be requested by competent authorities following existing rules and processes for data sharing between administrative units. - the unique serial number of the unmanned aircraft or, if the unmanned aircraft is privately built, the unique serial number of the add-on; - the geographical position of the UAS, its altitude above mean sea level and its height above the surface or take-off point; - the route course measured clockwise from true north and the ground speed of the UAS; - the geographical position of the remote pilot or, if not available, the take-off point; - the emergency status of the UAS; - the time at which the messages were generated. The standard used for data exchange among U-space service providers is the network portion of the ASTM F3411-19 standard. It defines mechanism to discover relevant service providers in an area and exchange data with them.
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474737.17/warc/CC-MAIN-20240228143955-20240228173955-00263.warc.gz
CC-MAIN-2024-10
1,610
11
http://wannabelib.blogspot.com/2007/05/flickr-mashups.html
code
I have spent some time (way too much time) fooling around with Flickr mashups. Here's a cute one, called FlickIt which generates thumbnail images based on a word. In this example, I set the image size to 85 and the query (or subject) to "book": Images from FlickIt! FlickIt "is the simple yet extremely useful web service for dynamically generating thumbnails of anything." The images are somewhat random and change with each screen refresh, lending a certain air of unpredictability but a nice feeling of dynamic content. Another fun mashup is depictr which combines photos from FlickR with song lyrics.
s3://commoncrawl/crawl-data/CC-MAIN-2018-26/segments/1529267867424.77/warc/CC-MAIN-20180625033646-20180625053646-00458.warc.gz
CC-MAIN-2018-26
604
6
https://nathaniel-brown.com/caricarton.html
code
An academic research project for the school of design at the University of Leeds, it was the result of 6 months of research into e-commerce packaging techniques compiled from usability testing, questionnaires and observations to develop a sustainable packaging type to deliver click and collect shopping. This outcome of which was a fully working prototype of fold flat packaging and a 20,000 word thesis. It was one of the many projects I was awarded a distinction for during my time as a mature student on my Masters degree in Design. CariCarton Portfolio.pdf > CariCarton Thesis.pdf > CariCarton Website >
s3://commoncrawl/crawl-data/CC-MAIN-2019-22/segments/1558232256281.35/warc/CC-MAIN-20190521062300-20190521084300-00062.warc.gz
CC-MAIN-2019-22
608
5
https://bucardo.org/Bucardo/schema/
code
The main Bucardo schema is contained in the bucardo.schema file. This file is processed when running bucardo install to create the Bucardo control database. There are also some tables and functions that are created on the remote databases. All tables and functions are always in the ‘bucardo’ schema. End Point Dev offers professional support for Bucardo, as well as specializing in developing, designing, and marketing effective websites. Since 1995, our diverse team of developers has shown that End Point can handle your organization’s greatest web and database challenges.
s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320305266.34/warc/CC-MAIN-20220127133107-20220127163107-00094.warc.gz
CC-MAIN-2022-05
582
2
http://www.muktware.com/3586/ubuntu-forks-gnome-control-center
code
Ubuntu systems team has forked Gnome Control Center as Ubuntu Control Center which will be used in Ubuntu from 12.10 onwards. Bilal Akhtar, a young Ubuntu developer writes, "Gnome-contacts will be installed by default, clutter will be on the CD, totem will be updated to the latest version, and Ubuntu 12.10 should ship with a near-complete GNOME 3.6 stack (sans Shell, of course, and control-center)." The fork of Gnome Control Center presumably gives Ubuntu more control over how they want to enhance the user experience by tweaking it the way they want fit. One may wonder how different will the Ubuntu Control Center be from Gnome Control Center, Bilal explains, "Most importantly, support for subsections written in Python, etc. Right now, clicking on the Ubuntu One icon opens up a new window, and we don't want that to happen. Also, there's the whole revamp of the Appearance dialog, that now includes Unity-specific settings too." Ubuntu engineer Ken VanDine further explains, "The changes to control center probably won't be much more than we already have in the gnome-control-center that is in 12.04, it is only a fork in the sense of how we maintain the patches. Our patches have become too hard to manage as-is, so forking means it is easier to rebase on upstream as needed." The report comes from Ubuntu Developer Summit going on in California.
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368704132298/warc/CC-MAIN-20130516113532-00099-ip-10-60-113-184.ec2.internal.warc.gz
CC-MAIN-2013-20
1,357
6
http://thecreativeconfessional.com/search/mirrored
code
The Movember is over and it's time to shave, cut, trim or remove the mustache (Moustache?) and style it any way possible! You can read my articles here: http://www.electroboom.com Follow me on Facebo... Here is a new compilation of my vine series 'Ryan Gosling Won't Eat His Cereal' Thanks to everyone for sharing :D (and thanks to Ryan Gosling for not eating his cereal) Vine - https://vine.co/RyanMc... Best Vines Logan Paul Vines Compilation 2016. NEW Logan Paul Vines. Please share your views on this vine compilation. Subscribe VineBros For funny Vines Compilation Every Day : https://goo.gl/umtWqT
s3://commoncrawl/crawl-data/CC-MAIN-2018-05/segments/1516084893629.85/warc/CC-MAIN-20180124090112-20180124110112-00618.warc.gz
CC-MAIN-2018-05
603
10
https://udn.realityripple.com/docs/Archive/Mozilla/Firefox_Sync/Syncing_custom_preferences
code
When preferences sync is enabled, Firefox Sync will synchronize preferences between the same application based on a whitelist. That means preferences between Firefox and Fennec, for instance, are never synced. To sync preferences between Firefoxes, Fennecs, Thunderbirds, etc., ensure the prefs are whitelisted. The whitelist is determined as follows: for each services.sync.prefs.sync.<pref> preference that is set to true, Firefox Sync will sync the <pref> preference. For example, if your add-on had a pref called extension.frobnaz.foobar, to have it synced, create a bool preference called services.sync.prefs.sync.extension.frobnaz.foobar and set it to true. The most convenient place for this would be your add-on's default preferences, though if you want to give the user a choice to opt-in, you can also do it programmatically. See adding_preferences_to_an_extension.
s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656103269583.13/warc/CC-MAIN-20220626131545-20220626161545-00587.warc.gz
CC-MAIN-2022-27
875
7
https://weblogs.java.net/node/238772/atom/feed
code
Shutup About the Book, Already I have nothing to say about our Filthy Rich Clients book today. But other people do. InfoQ posted an in-depth review of the book this week. It's a great review overall, although I take issue with some points (apparently I'm "not adverse to the odd corny-joke or two." Hmph.) It's great to see that people are enjoying the book. They also posted an excerpt of Chapter 14, which is an introduction to the Timing Framework. So if you've been pining for more recent documentation on that library (older articles on it predate a lot of the refactoring and new features that came in a year ago), you might check that Also, JavaRanch is hosting Romain and I this week on their Swing forum. We're trolling the forum all week, answering questions and generally making nuisances of ourselves. Apparently, there's a drawing for free books from the folks who post there. I hope I win one!
s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440644064517.22/warc/CC-MAIN-20150827025424-00299-ip-10-171-96-226.ec2.internal.warc.gz
CC-MAIN-2015-35
907
17
https://community.shopify.com/c/Technical-Q-A/Can-someone-help-me-to-undo-quot-Get-customers-to-choose-an/td-p/1023524
code
Recently I followed a tutorial todisable the auto-selecting variant and add "pick an option" instead. So, my clients would be able to choose the variant manually. But I had to add another code to fix the installment information and now I need to undo the "pick an option" code so that the installment code, works perfectly. I tried to do it myself, but in the3rd stepof "Edit your product page template"(print below), I had to delete some codes and now I don't know where to put it back again. My theme is Minimal. Can someone please help me to fix this? I really would appreciate it, I'm new in this code thing so I'm really lost in it.
s3://commoncrawl/crawl-data/CC-MAIN-2021-10/segments/1614178376006.87/warc/CC-MAIN-20210307013626-20210307043626-00623.warc.gz
CC-MAIN-2021-10
637
4
https://clementfevrier.fr/articles/5_servercertificateinthunderbird.php
code
Friday Oct 20, 2017 18:43, last edition on Friday Oct 20, 2017 19:23 While I was configuring the certificate for my mail server, I wanted to check if everything works fine in Thunderbird. It turns out that one cannot check the server certificates in Thunderbird. With a simple web search, I found a post from August 2006, i.e. more than 11 years ago, with the same question. The answer was that it was not possible and no extension doing it exists. I asked to see if things changed since them and the answer is no. This process is very simple in Firefox. In my opinion, this should be a critical feature to have.
s3://commoncrawl/crawl-data/CC-MAIN-2021-25/segments/1623488517048.78/warc/CC-MAIN-20210622093910-20210622123910-00324.warc.gz
CC-MAIN-2021-25
612
3
https://kanesmarket.com/microsoft-introduces-a-new-way-for-faster-building/
code
It offers a wide range of templates, APIs, and apps that you can use to build a better back-end for an app without the need for coding. Python is a general-purpose programming language gaining popularity as it is easier to use for beginners. From entry-level to leadership, across all business and industry segments, get to know our people harnessing technology to make a difference, every day. How hard is Azure developer? In conclusion, Microsoft Azure certification exams are quite difficult to achieve but not impossible. A little knowledge and experience can work wonders for you. Moreover, you need to have determination and confidence which is essential to ace Azure certification. Microsoft Azure is a cloud service by Microsoft which is used for building, deploying, testing, monitoring, and managing applications and services. This course will get you up to speed on Azure services, security, privacy, compliance, trust, pricing, and support. azure cloud engineer This course focuses on IT professionals who are responsible for development, deployment, security, storage, and computing in an Azure cloud environment. There is a high demand for Azure developers because of the limited number of these specialized professionals. Overall, a total of 5 attempts are allowed per year to pass the Azure exams. Some community colleges offer courses in Microsoft Azure Development. This is an ideal pathway for students who don’t have the time or money for a four-year degree. Community colleges provide students with the necessary tools and technologies to excel in this career path. QCon Plus brings together the world’s most innovative senior software engineers across multiple domains to share their real-world implementation of emerging trends and practices. What skills do Azure developers need? - Develop for unpredictability. Unpredictability? - Develop with costs in mind. - Scale your applications. - Scale your data. - Create a monitoring and diagnostics pipeline. - Develop for resiliency. - Script your environments. - Choose the right services. The primary role of an Azure AI Engineer is the translation of the vision of solution architects for the development of end-to-end solutions. In the course of this process, the Azure AI Engineer should also work in collaboration with data engineers, AI developers, data scientists, and IoT specialists. The AZ-204 Azure Certification is in the beta stage and is the new standard exam for an Azure developer. This certification is ideal for cloud developers involved in different phases of development, such as designing, building, deploying, and maintaining cloud solutions. The AZ-104 certification exam is the ideal Azure certification for the role of Microsoft Azure Administrator. AZ-104 is the updated version of the existing exam for the Microsoft Azure Administrator exam (AZ-103). You can choose the course under this program for which you want to avail the voucher for. If desired, we can give this course in Dutch, in the form of in-company training. Call Wesley, chat or get called back for more information about a training or a tailored training solution. Learn new skills faster and get your hands cloudy with thousands of real, guided labs on all things cloud from novice to guru. We’ll guide you through the exact skills you need to gain to progress from novice to guru across a variety of cloud specialties. This Azure training will make you an expert in Azure applications and architecture. Through this Microsoft certified azure training program, you will understand the main principles of cloud computing and how they have been implemented in Microsoft Azure. With Simplilearn’s Azure certification, you can easily acquire these skills and experience a rewarding career ahead. Azure has a steep learning curve and may not be the best option for those new to programming or who don’t have many experiences with software development Microsoft Azure. It hosts many tools and applications, which developers can use to develop their applications.
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296945282.33/warc/CC-MAIN-20230324113500-20230324143500-00322.warc.gz
CC-MAIN-2023-14
4,032
17
https://phys.org/news/2023-04-planet.html
code
Researchers confirm a new forming planet A study led by Monash University astronomers published new near-infrared images of the system HD 169142, which enabled the confirmation of a protoplanet forming in the system. The research team used data from the European Southern Observatory's Very Large Telescope (VLT) in Chile of a star over 350 light years away surrounded by a protoplanetary disk. "We expect planets to be hot during their formation, and the telescope observed HD 169142 in the near infrared to search for signatures of planet formation around the star," said lead study author Ph.D. candidate Iain Hammond from the Monash University School of Physics and Astronomy. The images captured with the SPHERE instrument at the VLT reveal a compact source moving over four years (2015-2019). "We successfully detected a protoplanet at approximately 37 au (slightly further than the orbit of Neptune) from the star in all four observations, and it orbits its host star at the expected velocity defined by Kepler's third law." "This represents a confirmation of previous observations published in Gratton et al. (2019) that claimed a tentative detection of a protoplanet." The new study confirms this hypothesis through both a re-analysis of the data used in their work as well as the inclusion of new observations of better quality. Only two other exoplanets have been imaged during formation: PDS 70 b and c, which both orbit the star PDS 70. This latest discovery of HD 169142 b pushes that number up to three. The researchers also found the planet had carved a gap in the disk (the ring-like structure) as it attracted material from the disk itself. "In the near-infrared we can see a spiral arm being excited in the disk by the planet, which strongly suggests other protoplanetary disks that contain similar spirals could host yet-undiscovered planets," Iain said. The spectrum suggests that a large amount of dust surrounds the planet, which reflects stellar light. This is expected if the planet is buried in a significant amount of dust that it has accreted from the disk. "This planet also makes for an exciting target for the recently deployed James Webb Space Telescope." The high sensitivity of JWST will enable researchers to detect hot dust surrounding the planet. The material is expected to take the shape of a circumplanetary disk (a disk around the planet itself) which could form small satellites such as moons. This new detection has proved it is possible to directly image such forming planets even when still completely buried in dust. The latest study is published in the Monthly Notices of the Royal Astronomical Society (MNRAS). More information: H Garg et al, A kinematic excess in the annular gap and gas-depleted cavity in the disc around HD 169142, Monthly Notices of the Royal Astronomical Society (2022). DOI: 10.1093/mnras/stac3039 Journal information: Monthly Notices of the Royal Astronomical Society Provided by Monash University
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506480.7/warc/CC-MAIN-20230923094750-20230923124750-00153.warc.gz
CC-MAIN-2023-40
2,969
15
https://www.mongodb.com/community/forums/t/mongodb-4-2-7-rc0-is-released/4140
code
MongoDB 4.2.7-rc0 is out and is ready for testing. This is a release candidate containing only fixes since 4.2.6. The next stable release 4.2.7 will be a recommended upgrade for all 4.2 users. Fixed in this release: - SERVER-47553 mongos crashes due to client disconnecting when signing keys being refreshed - SERVER-46487 The mongos routing for scatter/gather ops can have unbounded latency - SERVER-47190 Shutdown command with force:true should ignore all stepdown errors - SERVER-38731 Ability to specify sync source read preference in initial sync As always, please let us know of any issues. – The MongoDB Team
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662529538.2/warc/CC-MAIN-20220519141152-20220519171152-00092.warc.gz
CC-MAIN-2022-21
617
8
https://forums.envato.com/t/i-need-your-feedback-before-upload/162441
code
Very good you themes I think that approved good luck regards. Stunning! Great idea… Good Luck! We recommend that you should remove the URL & submit for the review because envato team will be making the final decision not the people in the forums. - Some responsiveness issues on smaller devices. - On clicking Load More button appears nothing but white space. The reviewer will be able to point out more! Thank you, But I believe the people on the fourm could save the review time by pointing out any problem just like you did, About the problem you mentioned: 1 - Could you try to check on real small device or refresh the page once you resize and let me know ? 2 - Does white space area are clickable, Could you hover and see if you can click there ?
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571989.67/warc/CC-MAIN-20220813232744-20220814022744-00041.warc.gz
CC-MAIN-2022-33
754
8
https://bugzilla.gnome.org/show_bug.cgi?id=620832
code
GNOME Bugzilla – Bug 620832 make _gtk_window_group_get_current_grab() public Last modified: 2011-02-04 16:12:18 UTC I'm porting libview to gtk+ 3, and it needs access to that function, which is currently an internal gtk+ symbol. Neither in the mail or here have you described what libview is doing - *why* it needs this. (The code snippet in the mail doesn't have any context.) This is vital information to evaluate the request and to document any function that is added. This is for a widget we have called AutoDrawer, which is for dropping down a toolbar (or whatever) when the mouse cursor is at the top of the screen (well, maximized/fullscreen window). I'm not an expert on this widget, but the idea is that we're trying to get the widget that currently has the grab in the window. Based on this, we decide whether to immediately drop down the AutoDrawer and keep it open. We key off this logic based on the type of widget owning the grab, and whether or not it's an ancestor of an EventBox that AutoDrawer connects to. I'm CC'ing the original developer of this widget (I think he wrote this anyway). For what it's worth, this is functionality we need to keep working in VMware Workstation and Player, so it's pretty important for us to have access to this functionality. Owen, you can look at the AutoDrawer code at (search for "grab" in that page) Essentially, the drawer is a container which can contain an arbitrary widget hierarchy. The purpose of the drawer is to well, open like a drawer. In one mode, the drawer can show/hide automatically. In that mode, we open the drawer as soon as (and keep the drawer opened as long as): 1) The mouse cursor is over the drawer (indicating the user is showing interest to see what is inside the drawer, and is about to interact with the drawer) 2) There is a focused widget inside the drawer (indicating the user is interacting with a widget in the drawer, such as a text box) 3) There is grabbed by a widget inside the drawer (indicating the user is interacting with a widget in the drawer, such as a pop-up menu attached to a drop-box for example) To do #3 above, we evaluate group->grabs at line 249. As Jonh Wendell noticed, in GTK+ 3, this requires _gtk_window_group_get_current_grab(). Currently that function is private, we would like it to be public as libview's use of it seems legitimate. It would be nice if it would added in gtk+ 2.x as well. I cannot say that the code in libview looks very 'legitimate' to me. Special-casing menus, and navigating up the menu hierarchy, etc... I think what you rather want to do is listen for grab-notify on your event-box and keep track of it being grab-shadowed. But I guess making this function public does not cost us much, so we should just do it. Just to comment that it seems that a error was included with this patch. I get this error compiling gtk: ./.libs/libgtk-x11-2.0.so: undefined reference to `_gtk_window_group_get_current_grab' You can also see this error on build.gnome.org: Alejandro: fixed in gtk-2-22 in commit fa7ace866cf794e3f320fe736eede93876e3b074
s3://commoncrawl/crawl-data/CC-MAIN-2021-49/segments/1637964363135.71/warc/CC-MAIN-20211205035505-20211205065505-00328.warc.gz
CC-MAIN-2021-49
3,071
25
https://rdrr.io/cran/ddpcr/man/positive_dim.html
code
Get or set the positive dimension (X or Y), which is defined as the dimension that has a high fluorescence intensity in all non-empty drops in a 1 2 3 A ddPCR plate. The dimension to set as the positive dimension ("X" or "Y") Add the following code to your website. For more information on customizing the embed code, read Embedding Snippets.
s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320305341.76/warc/CC-MAIN-20220128013529-20220128043529-00060.warc.gz
CC-MAIN-2022-05
342
7
https://gdr.openei.org/search?q=28966
code
Search GDR Data Showing results 1 - 2 of 2. Show results per page. GEOPHIRES files for DDU techno-economic simulations During 2017-2019, the U.S. Department of Energy funded six geothermal deep direct-use (DDU) projects to investigate feasibility of DDU for heating, cooling and thermal storage in the United States. In a follow-on study conducted at the National Renewable Energy Laboratory (NREL), ... Beckers, K. and Kolker, A. National Renewable Energy Laboratory Mar 31, 2021 GEOPHIRES Simulations for Deep Direct Use (DDU) Projects This folder contains the GEOPHIRES codes and input files for running the base case scenarios for the six deep direct-use (DDU) projects. The six DDU projects took place during 2017-2020 and were funded by the U.S. Department of Energy Geothermal Technologies Office. They investiga... Beckers, K. National Renewable Energy Laboratory Jun 30, 2020
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224649105.40/warc/CC-MAIN-20230603032950-20230603062950-00306.warc.gz
CC-MAIN-2023-23
884
11
http://www.wtae.com/national/Huge-python-caught-in-Everglades/19704844
code
Vandergrift man accused of sex with 14-year-old girl and drinking teens' blood Tommy Owen, who works at Everglades Adventure Tours, rangled a 10.5-foot Burmese python while giving an eco-tour to a family of tourists in the Everglades on Tuesday. The American financial system is at risk. No email address was supplied by To complete your registration on this site, please supply an address. Please confirm or modify the email address to which you will have subscription offers sent. For a more personalized experience, please supply the following optional information.
s3://commoncrawl/crawl-data/CC-MAIN-2015-27/segments/1435375102712.76/warc/CC-MAIN-20150627031822-00108-ip-10-179-60-89.ec2.internal.warc.gz
CC-MAIN-2015-27
568
7
https://healthedventure.org/book/5794-abhijit-guha-quantitative-aptitude-book-771-444.php
code
Abhijit guha quantitative aptitude book Quantitative Aptitude for Competitive Examination by Abhijit Guhanice book df bdfvdfddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddd 5 Best Quantitative Aptitude Books for IBPS, SBI Exams Quantitative Aptitude for Competitive Examination Convert currency. Add to Basket. Ltd, Condition: New. This revised edition has been upgraded with 22 original test papers of the examinations mentioned above. Comprising 25 chapters, each chapter has around questions of every conceivable type under the solved examples and unsolved exercises. Number Systems and Number Series 2. Thank you for sharing the requirements with us. We'll contact you shortly. The ingenuineness of this review appears doubtful. Justify your opinion. View more comments. Quantitative Aptitude for Competitive Examinations is a very extensive and comprehensive book that is readily relied upon used by students and job aspirants who are competing at some of the most difficult competitive examinations in the country. This book contains chapters on HCF, LCM, number system, decimals and fractions, profit and loss, percentage, work and wages, linear equations, time and distance and trigonometry and geometry. The book also has a good question bank of unsolved and solved model test papers. Students can use these for practice and revision. Quantitative Aptitude as we all know is the skill to deduce information, communicate and understand the basic logic behind a given problem. This is done by using charts, graphs, percentages, numbers and tabular data. Post a Comment. Friday, September 9, , Goodreads helps you keep track of books you want to read. Want to Read saving…. You can Check this PDF for quality before buying and purchase this book online from websites like Flipkart and Amazon. I am providing links below to download or purchase this book. This aptitude book is also available in the market from your near by book stores at the price of nearly Rs. This book is highly recommended by many coaching centers of India for all those candidates who are seeking job in Government Sectors as it covers all the important quant questions that are likely to be asked in the upcoming competitive exams. He has been serving for few years with Jharkhand Government in Engineering sector. The download link is provided below from where you can download free version of the PDF eBook. You can also purchase this book from the links of ecommerce websites which have been mentioned below. Number System 2. Number Series 3. Fractions and Decimals 5. Square Root and Cube Roots 6. Indices and Surds 7.
s3://commoncrawl/crawl-data/CC-MAIN-2021-31/segments/1627046154486.47/warc/CC-MAIN-20210803222541-20210804012541-00224.warc.gz
CC-MAIN-2021-31
3,227
10
https://community.linuxmint.com/idea/view/195
code
12 years ago In my opinion Tutorials are not only for the how to do something but how you managed to... A) get into trouble. B) the route you took in finding a solution. then... C) how you got out of the muck and reached salvation stories. The tutorial pages do it for me, sorry @heltonbiker. New > Rejected FullCircleMagazine? Link a blog page to their profile? Why do we need another section that I doubt would be used much? How is this different from the tutorial section on the website? @Rovanion: I think like you either. I guess the solution itself would be much better looked for in forums, which exist many and very good ones in ubuntu community sites. This journal-form is meant to aggregat knowledge much more from a computer-culture point of view than a technological one, somewhat of a leisure way to write and read about the universal situation of fighting against/in-favour of your own machine, much like a knight fights for killing the dragon AND saving the princess at the same time (just in this case the deffective computer (beast) BECOMES the prize (working computer / princess)). - excuses for the poetic coloring... Interesting idea. It could work, tough I think that having it in this journal-form may be ineffective for someone who has a problem. It may be hard to find others with the same problem as you while it is easy to see what issues a specific user has been trough.
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764499700.67/warc/CC-MAIN-20230129044527-20230129074527-00384.warc.gz
CC-MAIN-2023-06
1,397
11
https://coexistwithmeg.com/category/uncategorized/page/2/
code
Over the years of living in South African game reserves, I have had a lot of snake encounters with various species including Mozambique Spitting Cobras, Black Mambas, Puff Adders, Rhombic Egg Eaters, Spotted Bush Snakes and African Rock Python. I wanted to share a different side to my adventures today so here’s 3 of my favourite snake encounter stories: 1) Mozambique Spitting Cobra. This story always comes to mind because the situation resolved itself with surprising ease. I was outside with rhino orphan Ithuba and fellow carers Aly and Axel when we noticed something moving along the wall towards us and towards the rhino night room. As the sun was beginning to set we needed to keep a close eye on the snake to make sure it did not go into any of the care or preparation rooms. We sent a photo of the snake to a ranger and received immediate identification that the snake was a Mozambique Spitting Cobra (very dangerous). As we weren’t in a position to remove the snake safely ourselves and we lived in isolation in the middle of a reserve getting someone to help us would’ve been a time-consuming process, we decided instead to simply block the snakes path, keep our distance and hope the Cobra would turn around and go back into the bush. It was a simple plan but our options were pretty limited and we were hopeful. We kept our distance while trying to keep a constant eye on the snake. The other thing we needed to do was keep ever-curious white rhino calf Ithuba away from the snake too. This was challenging as Ithuba knew there was something going on and wanted to take a closer look himself. Fortunately, after a bit of a tussle we managed to convince him to play with his favourite tyre bowl at the other side of the enclosure while we waited for the cobra to decide where it wanted to go. Thankfully, upon meeting our blockade, the snake changed direction and began to pick its way back towards the bush. It was in no rush but gradually we watched it slither across the length of the outside enclosure, out between the slats of the enclosure poles and towards the bush. Satisfied the Mozambique Spitting Cobra was not in or near the night room we finished the evenings games with Ithuba, got sorted for nightshift and locked up. Of course, I was still VERY aware of the possibilities of snakes, spiders and scorpions as I slept on the floor in the preparation room or under the heat lamp with the rhino orphans. 2) Puff Adder relocation. This was a pretty fun one. It was a really quiet day and while I was sitting in the office I heard one of our staff members screaming my name (bordering on hysterical). Not sure what the problem was I rushed outside to check everything was okay. I was met with two of our team screeching with terror and pointing towards the grass next to the car. Laying there, completely still, was a Puff Adder (very dangerous). There’s a lot of fear of snakes within the communities so I wasn’t at all surprised by the shouting, snakes are often killed on sight so I was very relieved they had kept their distance and shouted me instead of trying to kill the snake. As Puff Adders are very dangerous and we had several people and animals living on the property I said we would carefully move it away from the orphanage. I closed our dog inside, grabbed the snake tongs and enlisted the help of Vikki (because there was no way I was doing this on my own and Viks had worked previously as a ranger). The main issue was that we couldn’t find a suitable container to use to put the snake in so we agreed on using the large, plastic bin that we used in the kitchen as the ‘transport crate’. Getting the Puff Adder into the bin was easy using the snake tongs and after we showed our team (who were now a lot less hysterical) the Puff Adder and gave them a bit of information about the species we carefully put the bin onto the back of the truck ready to drive far from the orphanage to release the snake. Now, we had a decision to make. Although, it was more of a ‘rock, paper, scissors’ situation that Viks lost. That meant it was Viks job to sit at the back of the truck holding the bin upright and ensuring the lid of the bin stayed in place as I slowly drove us across the reserve. Despite driving slowly, the road was incredibly bumpy so I watched the rear view mirror tentatively as I picked my way across the reserve. We reached a spot that was far enough away without any issues and chose an area that seemed suitable to release the snake. The car slowly rolled to a stop and I jumped out to help Viks with the bin. We removed the lid and gently laid the bin down, letting the the Puff Adder go. We sat on the back of the truck as we watched the snake for a few minutes then we made our way back to the orphanage. Happy everyone was safe and the snake could continue on, unharmed. 3) African Rock Python sighting. The third is a wildlife sighting that blew my mind. Angie and I were on a road trip and we made our way to Kruger National Park, after some careful thought we decided to stick to the more northern areas of the park. We’d been told we wouldn’t see as much wildlife in those areas but we liked the fact that there’s very few other people around and the idea that we’d have to work extra hard to spot wildlife. We stuck to our original idea and entered Kruger through one of the gates in the North region and see how we got on. I’m not kidding, we’d been in the park for 10 minutes and OUR FIRST SIGHTING was an African Rock Python eating a duiker. WHAT. It was insane, we couldn’t believe it!!! We sat there absolutely fascinated, no other cars around, in fact we only saw one or two other cars in the whole day. This was the first time I’d seen a snake in the bush like this, the Rock Python was huge! The whole scenario was just unreal. As you can imagine, that started our day in a magnificent way and we went on to have all sorts of wonderful sightings including elephants, leopards and even a honey badger! I hope you enjoyed reading these snake stories! Tread lightly on this Earth, For information on snake species within Africa head over to: https://www.africansnakebiteinstitute.com/
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224656675.90/warc/CC-MAIN-20230609100535-20230609130535-00029.warc.gz
CC-MAIN-2023-23
6,185
16
http://stackoverflow.com/questions/10090984/afnetworking-possible-to-easily-use-this-64-bit-libraries-in-32-bit-architectu
code
So I'm trying to use AFNetworking library for REST services on a project I want to build on my 2006 Macbook. The Macbook is a first-gen 2006 32-bit Core Duo w/ snow leopard. I'm fairly new to Objective-C development and I'm following the tutorial to get started with AFNetworking here: https://github.com/AFNetworking/AFNetworking/wiki/Getting-Started-with-AFNetworking Using xcode 4.2 my problem is that right away when I create a new project and try and build I get: Semantic Issue - Synthesized property 'window' must either be named the same as a compatible ivar or must explicitly name ivar. I checked the Build Settings of my new project and for some reason xcode by default assumes 64-bit Intel architecture when my machine is 32bit?! weird. I swapped it to 32-bit and this is where the error came up. So I can correct this Semantic Issue now by explicitly creating my own window instance var in AppDelegate via: NSWindow * _window; I read about this on building out for 32bit objc: Synthesizing a property without instance variables which seems VERY common (lack of ivar declarations) in lots of public github project code I see. Is everyone forcing 64-bit on us now or just too lazy to create the instance vars? :( So my problem is that it looks like AFNetworking library was built out for 64-bit Intel because when I add AFNetworking to my project I get the same Semantic Issue ivar errors all over the place. Looking at the library code there are no explicit instance variables declared throughout the code for any properties. Am I completely screwed here? I could fix this situation by manually creating instance vars for all the properties but this would be such a pain for long-term project maintenance. I guess what I'm wishing here is that there was some sort of compiler flag that I could add that would fix this all in one-shot?? but I'm guessing that I'm out of luck and it's simply time to trash this Macbook and pickup a new modern one.
s3://commoncrawl/crawl-data/CC-MAIN-2015-14/segments/1427131297587.67/warc/CC-MAIN-20150323172137-00269-ip-10-168-14-71.ec2.internal.warc.gz
CC-MAIN-2015-14
1,957
10
http://www.eluminary.org/en/QnA/Inverting_columns_based_on_date_(Excel)
code
I have a spreadsheet whose main body consists of one column of date data (mm/dd/yy), and six columns of numerical data. There are approximately 1,675 rows. The later dates are at the top. I need to reverse the order so that the new data is entered at the botwhile maintaining the integrity of the data (obviously). Can you help me out? You should just be able to select all of the data, and then SORT based on date, ascending. Correct? That should keep all of your data together and just reverse the order. Keep in mind that you're starting to get to the point where it makes sense to move up to a DATABASE program like MS Access.starts to get clumsy when you're dealing with thousands of records.
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947476432.11/warc/CC-MAIN-20240304065639-20240304095639-00580.warc.gz
CC-MAIN-2024-10
697
3
https://filewikia.com/software/audio/mikmod
code
- Category: Audio - Platform: Windows Mac Linux MikMod is a Audio program. It is available on various platforms, including Windows, Mac, and Linux. MikMod for Windows, Mac, and Linux can be found on respective sources. MikMod supported file formats include .669 and other formats of similar type. Other MikMod supported filename extensions besides .669 are .AMF, .DSM, .FAR, .IMF, .IT, .MED, .MTM, .OKT, .S3M, .STM, .STX, .ULT, .UNI, .XM. You can open .669 and other files with MikMod in two ways: - You can double-click on .669 file (or any other supported file) with left click mouse button. If you have installed MikMod on your Windows or Mac, the file will open successfully. - You can open .669 file from the MikMod menu. The menu button can be found on MikMod dashboard. Other file extensions used by MikMod This link follow to webpage, where you will find links to official sources of MikMod. If you are Windows, Mac, Linux user, then just click to button below and go to the page with link. Please note that this app may ask for permissions when installed.
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335365.63/warc/CC-MAIN-20220929194230-20220929224230-00061.warc.gz
CC-MAIN-2022-40
1,064
9
http://manjaristic.blogspot.com/2016/02/super-silent-mice-in-space.html
code
Performance at the Institute for Culture of Vojvodina, Novi Sad // on February the 5th 2016 // An acoustically unique Gallery MOST produced timeless vacuum allowing performers to explore micro-tonalities on the threshold of silence. Imaginative set is a first encounter of Ristić / Džukljev duo with composer and performer Đorđe Marković. Performance was held as #76 IMPROSTOR series. Recorded with ambient instrumental sound textures overlap with movements of the audience as well as alive space, and distant sounds of the street - all in the same mind capsule, breathing organically... Special thanks to Zavod za kulturu and Dragan Ilić // Released February 11, 2016 Manja Ristić, violin, built instruments, sound objects, cardboard panel, editing Marina Džukljev, prepared piano, sound objects, percussive instruments Đorđe Marković, prepared electric guitar
s3://commoncrawl/crawl-data/CC-MAIN-2019-22/segments/1558232256764.75/warc/CC-MAIN-20190522063112-20190522085112-00453.warc.gz
CC-MAIN-2019-22
872
9
https://forum.adalo.com/t/limit-user-to-a-certain-amount-of-clicks-of-a-button-per-day/23528
code
Clicking the button in this page takes you back to the first page and displays a new Thriller movie for you to watch. What I’m trying to achieve is basically limit the user to maximum 3 movies per day per category. Once you have seen your 3 Thriller movies, then the Thriller category list should be hidden. When a new day starts you should be able to get 3 new thriller movies again. I just can’t figure out how to get it to work and don’t know how to configure it. I’ve been playing around with adding current date/time, adding a count every time you click the button and visibility rules but don’t know how to use the date and time and do a “reset” every new day. Or maybe, if it’s easier, somehow set up the limit so that the list will only show x amount of items every day and not being dependent on the user clicking on the “OK, I’ve seen it. Give me a new one.” button… Hi @Bobzifer , Would the user count be triggered by clicking “Ok, I have seen it” or by just entering the details page? Because if he enters the details page and not click the video, would that still count as 1 view? I would see this with a Collection of “Views”, where you would add a timestamp, category and count of views. Whenever user would click button or enter details it would add record to that collection. also when entering screen before the other action, it would compare for that day using “todays date” if there would be a timestamps for that category where the count would be = 3. That’s a good question. I was thinking that you need to actually click on the “i’ve seen it” button in order to get a new movie. In case you change your mind and want to go back to the other main movie categories list, you might not want the first movie to disappear. The first part I understand with creating a new “Views” collection with the properties in it. Not sure about the second part though: “also when entering screen before the other action, it would compare for that day using “todays date” if there would be a timestamps for that category where the count would be = 3.” Do you mean before going back to the main movie list with all the categories (named Watch list in the picture)? Where would you then do the comparison, in the button click action? Feeling really stupid because I still can’t figure this out. I assume that when pressing the button, the Click Action should be to Create a record in the “Views” Collection with the current date/time and the category. Not sure what you meant with “and count of views”. Do you mean adding a Property in the “Views” Collection named “Count” and then add a number of “1” each time the button is pressed? What I don’t get is how to count the records in the Views collection and show/hide the list based on this. Also, using the suggested action to present a modal screen will not hide the list that has reached the daily limit, will it? Yes exactly, when you click the button the movie should be “checked of the list” as seen and then be “not visible”. As for what happens the next day, the movies that have been checked as “seen” should continue to be marked as seen. I’m thinking that I will just use a list of movies where each movie has a number (ID). The user is able to watch maximum two movies per day (per category). The next day it should just continue to show the next movie in the list. Exactly. I will only let them watch maximum 2-3 movies per day. Then they will have to wait until the next day for the next movie(s) in the list to become available. No freedom of choice here The thought is that they will have a limited choice and only be able watch what I’m giving the user and not just scroll through the list of all movies. It would be no fun if the user could potentially scroll through the whole list of movies on day 1. Then you can just use Netflix instead My idea was to just present the movies in order to keep it simple. How I solved it is that each time a user has clicked the “OK, I’ve seen it…” button it will add the ID of that movie to a property of that user called “SeenMovies”. I then added a Custom filter for the list which is suggesting the movies and I’ve limited the maximum amount of items to 1. This filter will then show movie with ID 3. There’s probably a lot of better ways of solving this but it does work at least So now I think it’s just the time limit/reset thing i need to solve. I actually wasn’t building any particular service or app in the beginning. I was just trying to learn the tool and had to come up with some sort of use case and thought about a movie library of some sort. The idea with limiting the movies came up a few days ago when I spent over an hour browsing Netflix and HBO for a movie to watch. There’s just too much to choose from so I thought it would be nice to not be given so many options but just have about 5-6 movies to choose from. The next step will be to try and make better and more tailored/accurate suggestions suited to the user instead, based on som sort of logic or preferences. But need to solve the time thingy first
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662533972.17/warc/CC-MAIN-20220520160139-20220520190139-00233.warc.gz
CC-MAIN-2022-21
5,153
32
https://www.adenin.com/apps/yammer/sharepoint/
code
With our Card maker web part you can easily add Yammer to any SharePoint page and customize the layout using the built-in Adaptive Cards Designer No credit card required Your Yammer data is now securely showing in SharePoint Use adenin to integrate Yammer and SharePoint for a powerful, seamless user experience. With this combo, you can embed Yammer posts right into SharePoint, make use of the SharePoint Web part for Yammer, and even perform a unified search across Microsoft 365. Here are the key features you get with this adenin integration: And the benefits? They're plenty: Developers, you'll love this: adenin makes it super easy to do all of this. With a developer-friendly API and clear documentation, you can integrate Yammer with SharePoint like a pro, in no time. Hey, why stop at just dreaming about these benefits? Start your free adenin account today, and make your Yammer and SharePoint integration a reality! Get more out of your SharePoint investment by increasing visibility of your Yammer data where it matters most Your Yammer data At every refresh, your Yammer data is collected directly by your browser. adenin doesn’t store this data anywhere else, and you can revoke your access rights anytime. Apart from SharePoint, the adenin platform offers users a dashboard that can be easily customized to show you all the data that matters to you at a glance
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100112.41/warc/CC-MAIN-20231129141108-20231129171108-00637.warc.gz
CC-MAIN-2023-50
1,378
12
https://biteon.org/2022/12/15/download-microsoft-support-and-recovery-assistant/
code
Choose the right version of Outlook Вы этого не сделаете, – как ни в чем не бывало сказал Хейл. – Вызов агентов безопасности разрушит все ваши планы. Я им все расскажу. Microsoft 2016 outlook support free download Can you help us improve? You can add other email addresses to Outlook. To find out what version of Outlook you’re using, see What version of Outlook do I have? If yours did, before installing Office for the first time, sign in with an existing or new Microsoft account and enter your product key at office. October 5, , update for Outlook (KB) – Microsoft 365 Upgrade to Microsoft Edge to take advantage of the latest features, security updates, and technical support. Use the links on this page to get more information about and download the most recent updates for the perpetual versions of Outlook and Outlook Outlook compatibility with Microsoft and your on-premises environment depends on the system requirements for your deployment:. Microsoft works with any version of Outlook that is in mainstream support, which includes the latest version of Outlook For previous versions of Outlook, only those that have extended support may continue to work with Microsoft ssupport, although with reduced functionality. For more information, see Microsoft Lifecycle Policy. For Exchange on-premises deployments, follow the system requirements for your version of Outlook:. Exchange system requirements. Support for Office ends on April 11, If you haven’t already begun to upgrade your Office environment to a newer version of Office, we recommend that suppoft start now. For more information, see Plan an upgrade from older versions of Microsoft 2016 outlook support free download to Microsoft Apps. Skip to main content. This browser is no longer supported. Download Microsoft Edge More info. Table of contents Microsott focus mode. Table of contents. Note The information in this article only applies microsoft 2016 outlook support free download perpetual versions of Outlook that use the Windows Installer MSI installation technology. For example, if you installed a volume licensed version of Outlook, such as Outlook included with Перейти на источник Professional Plus The information in this article doesn’t apply to Microsoft Apps. To find out what version of Outlook you’re using, see What version of Outlook do I have? For more information about installing Office updates, see Install Office updates. Important Support for Office ends больше на странице April 11, Submit and view feedback for This product This page. View all page feedback. In this article. November PU KB August PU KB SP1 KB October PU KB
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224644855.6/warc/CC-MAIN-20230529105815-20230529135815-00173.warc.gz
CC-MAIN-2023-23
2,773
12
https://cissecure.com/product/tempest-dual-ip-ft221-network-isolation-switch/
code
Manufacturer: CIS Secure Computing - NSTISSAM 1-92 Level I - NATO SDIP-27 Level A (equivalent) - CID09/15A (equivalent) - Bright classification status sign - COTS appliance simplicity - AMX, Crestron, or CIS remote control - DE9 Copper and SC Fiber Ethernet ports - Users Selectable Color Scheme - All Off position between connections—eliminates any potential momentary crosstalk when switching - Switched power connectors—Pulsed power connector ensures codec reboot between security levels. Active When Off connector ensures external devices is not powered during IP operation. When used with the DTD-530S, this feature can disable ISDN calling when in an active IP mode. - No RS232 controls—eliminates additional communication path that can compromise switch integrity. Remote control is accomplished via contact closures only. - Switch security—manual and remote control allows only one mode of operation at a time - No RJ45 interfaces—inherently non-secure RJ45 copper LAN connectors are converted to DE9 and SC Fiber - User selectable color codes—Red or Green Secure/Non Secure lighted status indicator - Designed, built, and tested to meet TEMPEST Level 1 and exceed TEMPEST 2-95 specifications. - Gender controlled connectors—prevents accidental cross domain cable connections. The Dual IP Network Isolation Switch enables devices with a single Ethernet interface to switch between two different LANs simply and securely. Isolation between the ports is designed and tested to meet NSTISSAM 1-92 Level I TEMPEST specifications providing EMI protection and exceed TEMPEST 2-95 guidelines for Red-Black separation using optical and electrical isolation. It also provides switching simplicity without software, memory, or console port security vulnerabilities and includes Department of Defense network switch policy features: codec reboot, contract closure remote control, status indication, gender controlled connectors, all off position.
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337855.83/warc/CC-MAIN-20221006191305-20221006221305-00475.warc.gz
CC-MAIN-2022-40
1,957
18
https://magenaut.com/how-can-i-avoid-sql-injection-attacks-in-my-asp-net-application/
code
I need to avoid being vulnerable to SQL injection in my ASP.NET application. How might I accomplish this? Thank you for visiting the Q&A section on Magenaut. Please note that all the answers may not help you solve the issue immediately. So please treat them as advisements. If you found the post helpful (or not), leave a comment & I’ll get back to you as soon as possible. Even though your question is very generic, a few rules always apply: - Use parameterized queries ( SqlParameter) and put user input into parameters. - Don’t build SQL strings out of unchecked user input. - Don’t assume you can build a sanitizing routine that can check user input for every kind of malformedness. Edge cases are easily forgotten. Checking numeric input may be simple enough to get you on the safe side, but for string input just use parameters. - Check for second-level vulnerabilites – don’t build SQL query strings out of SQL table values if these values consist of user input. - Use stored procedures to encapsulate database operations. Use Prepared Statements (link to an ASP.NET tutorial that uses prepared statements in the ‘To add nodes for products’ section). that’s all there is to it. Use parameters! It really is that simple 🙂 Create your queries like this (for MS Sql server with C#): SqlCommand getPersons = new SqlCommand("SELECT * FROM Table WHERE Name = @Name", conn); Here @Name is the parameter where you want to avoid sql injection and conn is an SqlConnection object. Then to add the parameter value you do the following: Here theName is a variable that contains the name you are searching for. Now it should be impossible to do any sql injections on that query. Since it is this simple there is no reason not to use parameters. Never trust user input – Validate all textbox entries using validation controls, regular expressions, code, and so on Never use dynamic SQL – Use parameterized SQL or stored procedures Never connect to a database using an admin-level account – Use a limited access account to connect to the database Don’t store secrets in plain text – Encrypt or hash passwords and other sensitive data; you should also encrypt connection strings Exceptions should divulge minimal information – Don’t reveal too much information in error messages; use customErrors to display minimal information in the event of unhandled error; set debug to false Useful link on MSDN Stop SQL Injection SQL injection occurs because the query to the database is being constructed in real time, for example: SELECT * From Table1 WHERE " + UserInput UserInput may be malicious and contain other statements that you do not intend. To avoid it, you need to avoid concatenating your query together. You can accomplish this by using parametrized queries – check out the DBCommand object for your particular DB flavor. Use parametrized queries and/or stored procedures and parse your parameters via SQL parameters. Never generate SQL code by concatenating strings. Also do some reading about SQL injection and about writing secure code, because preventing SQL injection is only a small part of security. There is many more (like XSS – Cross Site Scripting). If a hacker wants to compromise your site/application he will look for more then only SQL injection. Scott Guthrie posted a decent little article about this a while back. In it, he offers 5 suggestions for protecting yourself: - Don’t construct dynamic SQL Statements without using a type-safe parameter encoding mechanism. […] - Always conduct a security review of your application before ever put it in production, and establish a formal security process to review all code anytime you make updates. […] - Never store sensitive data in clear-text within a database. […] - Ensure you write automation unit tests that specifically verify your data access layer and application against SQL Injection attacks. […] - Lock down your database to only grant the web application accessing it the minimal set of permissions that it needs to function. […] He does a decent job of explaining why these are important, and links to several other resources as well… NEVER trust user input, always validate it, and use sql parameters. Should be enough basis to prevent SQL injection. Hopefully, this will help: The short answer is to use parameterized queries. Always use only parameterized queries. As others have said, don’t concatenate user input to create dynamic sql statements; always use parameterized SQL when using dynamic SQL. However I will point out that this rule also applies when creating dynamic sql inside of a stored proc. This fact is something people often overlook. They think they are safe because they are “using stored procedures.” The book, “Building Secure ASP.NET Applications” guideline has a section on this topic. Use XSS Secured UrlEncode using Microsoft.Security.Application.AntiXss.UrlEncode and SQL injection will not work. Or You can use ASP.NET – JSON – Serialization and Deserialization Also test your application with SiteDigger from Macfee Fre Tool. Few More are from here .NET Security Toolkit v1.0 Everyone says “Use parameters”. We’d have to say it less if it wasn’t so perversely difficult. Use QueryFirst. The temptation to concatenate is removed, and the right way becomes the easiest way. You create a parameter just by typing @myParam in your SQL, the tool does the rest. disclaimer: I wrote QueryFirst Understand what exactly SQL Injection is and then never write anything that is vulnerable to it. Try to use Stored Procedures, and validate the input on your data. Do not use any direct SQL like INSERT INTO …
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500126.0/warc/CC-MAIN-20230204110651-20230204140651-00396.warc.gz
CC-MAIN-2023-06
5,676
53
http://forums.autodesk.com/t5/Autodesk-Revit-MEP/Importing-AutoCad-3D/m-p/3620282
code
I am trying to import architectual and structural from an AutoCad 3D file I created a family [mass] inserted the cad file but when I import the file into the project I recieve an error that reads "This family insance has too many edges. Remove unnecessary geometry or split the instance into multiple instances" Is there any way around this It will not let me import the family with this error. Thanks.. Instead of using the mass family, have you tried the generic model family template? Please give Kudos as appropriate to enhance the value of these forums.
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368699201808/warc/CC-MAIN-20130516101321-00066-ip-10-60-113-184.ec2.internal.warc.gz
CC-MAIN-2013-20
558
3
https://grindingdown.wordpress.com/tag/psp/
code
I’ve never understood anyone more than when they say that they don’t like to eat. I mean, c’mon now. Eating is universal, providing heterotrophic organisms with energy, which allows for growth. Or maybe this is me being hypersensitive to food and nom nom nom-ing delicious things after spending more than a year working hard to lose weight and keep my calorie intake in check. For those curious, I’ve dropped almost fifty pounds by managing everything that goes into my mouth and doing my best to avoid downfalls like devouring an entire box of Cheez-Its in one sitting or having a bowl of pasta for every meal. Either way, I’m all for that eating, which is probably why I relate intimately with the green alien blob in Tales from Space: Mutant Blobs Attack. See, the little green alien blob thing you control in Tales from Space: Mutant Blobs Attack, which is a cataclysmic science-fiction puzzle-platformer if you ever needed a crazy mouthful of varying genre labels, has an insatiable appetite. Also, mutant powers, like the ability to cling to metal walls or squeeze through tiny gaps or grow in size after consuming enough food slash junk slash people. There are also mini-games to contend with that reminded me a bit of Marble Madness, with an overhead perspective and the goal being to get the green gluttonous ball to the level’s exit without falling into any holes; they are super short, but a lot of fun. Otherwise, your mission is to reach the end of the level, bypassing puzzles or platforming sections, eating up whatever gets in your way along the way. I’m about halfway through Tales from Space: Mutant Blobs Attack and enjoying it quite a bit. The game is broken up into a bunch of worlds, each with their own specific count of levels. Personally, I prefer the more traditional platforming sections, where the goal is to get enough substance inside your gelatinous body to move forward. There are parts where you gain the ability to rocket around in zero gravity, and I found the controls less precise–most likely on purpose–and harder to handle there. I’m currently in the fourth world, the Badlands, and I have to wonder if I’ve seen all of this game’s tricks; if so, that’s perfectly fine, as the levels are relatively short to get through and too many gimmicks would complicate things. Also, I will not be going back to rescue the missing friend collectibles, no matter how cute or sad they look. Sorry, little blobs. It’s got a cool retro style mimicking the look and sound of the 1940s and 1950s, which, while I never personally got to experience in the flesh, is an aesthetic I find interesting nonetheless. Some other noted examples: Fallout 3, L.A. Noire, and Who Framed Roger Rabbit. Well, Tales from Space: Mutant Blobs Attack comes from Drinkbox Studios, which is a name I now associate with going all in on style, having later put out the tough yet rewarding platformer Guacamelee!, which, let the record show, I did beat. Oh, and did you know they are making a Guacamelee! 2? Anyways, like that first game, this has some nods to other indie titles, such as with the Phil’s Fish restaurant or billboard advertisement for Awesomenuts, and these are cute to find as you push your blob hero forward towards greater consumption. Will completing Tales from Space: Mutant Blobs Attack be the straw that breaks the camel’s back and finally gets me to try out my copy of Katamari Damacy that I’ve had for years? Will I ever stop hungering for things like Cheez-Its and bowls of noodles? Will 2018 be our true downfall wherein we are consumed wholly by large, green alien blobs bent on the destruction of mankind? Stay tuned for answers, maybe.
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224648209.30/warc/CC-MAIN-20230601211701-20230602001701-00776.warc.gz
CC-MAIN-2023-23
3,698
5
https://blog.mamc-llc.com/2022/10/13/microsoft-edge-wont-start-after-windows-10-upgrade/
code
This was a very frustrating issue that puzzled me for several hours before I figured it out. Essentially, Microsoft Edge would not start for me. Normally I prefer to use Firefox, as it is the safest and most respectful of privacy (in my opinion)… however there are some websites that just do not play nicely with Firefox, such as sites designed to work primarily with Chrome-based browsers in mind. Thus, I use Edge for those purposes. I had just performed a Windows 10 upgrade to a newer version, and shortly after noticed that Edge would no longer start. I would click the button in the start menu and the program would never launch. I rebooted a few times – no luck. I downloaded the offline installer for the latest version of Edge and reinstall it that way – again, no luck. I had followed several guides out there that suggested a repair of Edge via “Add/Remove Programs” – also no luck. I tried to retrace my steps and ask myself what else had I done besides a feature upgrade to the OS? I installed some new drivers, updated some other software… but that couldn’t really explain it. Then I realized that I have a habit of re-hardening my OS after every feature upgrade, because I have noticed that many if not most settings such as telemetry sharing tend to reset to the default after upgrades. Once of the best utilities for hardening and privacy enhancement is a tool called O&O Shutup10++ (link: https://www.oo-software.com/en/shutup10). I decided to review my O&O Shutup10++ settings. The first thing I did was disable every setting that I had related to Edge: After setting all the options back to their default “no”, I was immediately able to launch Edge! So I knew one of the settings had to be causing the problem. I stepped through one by one each setting until I identified which setting broke Edge. It was the option to “Disable sending data about browser usage”. Darn! I didn’t want to enable the setting because I like all forms of telemetry disabled. However if it is a choice between having a working browser and not, then I guess I will have to live with it. Besides, Edge is just my fallback browser for when a site does not work with Firefox. To elaborate, this particular setting in O&O Shutup10++ corresponds to the regkey value MetricsReportingEnabled (a REG_DWORD type with data value of 0), located in COMPUTER\HKEY_CURRENT_USER\SOFTWARE\Policies\Microsoft\Edge. If you toggle the setting back off, then the regkey gets deleted (rather than say, changing the data value of the key). I decided to check in the Edge GUI to see if there was perhaps a more valid option to select from – and sure enough, there isn’t! It appears that they now force you to send “diagnostic data” telemetry back to MS – and you cannot disable it! In a nutshell there does not appear to be another way to handle this, and if you want to use Edge you will just have to live with the setting as such. I do have to wonder if this was intentional to have Edge crash if that regkey is set, or whether it is just a bug in the startup process of the browser? Originally, I had confused the fact that I recently upgraded to a newer version of Windows 10 with the issue of Edge crashing, when really it is because I re-ran my OS & browser hardening utility shortly after the upgrade. I do so because Microsoft and other vendors have a habit of re-initializing settings, especially those related to privacy, after upgrades. This led me to keep searching google for terms like “Edge won’t start after Windows upgrade” – and led me down a fruitless path of trying to repair the browser. Those of us who tinker with settings so as to maximize our security and/or privacy, or even to maximize performance, often end up causing ourselves much grief due to our seemingly abnormal efforts; and because we run non-default/standard configurations, it can make troubleshooting that much more frustrating. I hope this article helps you out if you were having this type of problem! Edit: looks like O&O updated their utility to no longer set a value of that regkey – the setting is gone entirely! I probably should have upgraded to a newer version after the Windows 10 upgrade. Shame on me! #edge #edgebrowser #edgewontstart #edgecrashing #edgewontlaunch #edgenotstarting #edgefailure #edgehardening #browserhardening #ooshutup #edgetelemetry #browsertelemetry
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296945473.69/warc/CC-MAIN-20230326142035-20230326172035-00303.warc.gz
CC-MAIN-2023-14
4,391
18
http://www.pro-football-reference.com/linker/
code
This tool allows you to automatically (via just a single click): Add links to Sports-Reference.com player pages in your blog posts, bulletin board posts, and text you are reading on a website. You just need to add our bookmarklet and then click it whenever you like bookmarks, but slightly different. A bookmark contains an address for a webpage and clicking on it sends you to that page. A this will send you to a different page, but often it may just change what you see on the current page. To add to your browser you need to do one of the two following things. Click on, hold, and then drag the link above to your bookmarks or bookmark bar (works in FireFox, Safari, and Chrome). Note that your bookmark bar must be visible (under View or Bookmarks in Chrome, View -> Toolbars in Firefox or View -> Favorites bar in Safari), or Right Click on the link above and add to favorites or bookmarks (doesn't work for Chrome). Internet Explorer will ask you if you really want to do this. It asks there is the possibility of security issues from untrustworthy To make sure you've done it right you can test it with player names. If it doesn't work, you can edit the bookmark url which should appear like the following. Note that there are encoded symbols (necessary for the bookmarklet in some browsers) listed below that may not appear when clicking edit. These are of the form %X or %XX). To make sure you've done it right, if you edit the bookmark, the url should appear like the following. Note that there are encoded symbols (necessary for the bookmarklet in some browsers) listed below that may not appear when clicking edit. These are of the form %X or %XX). PLEASE SAVE ANY WORK prior to using the bookmarklet. While we have made a serious effort to never lose any of your content, we can not make any guarantees. Generally, the easiest way to use the tool is to just write up your post in the blog text box and click the bookmarklet in your brower. The tool grabs the text you wrote, runs it through our player linker and returns the text with links enclosed. When using with blogs or bulletin boards for adding links to posts while composing, you must click the bookmarklet while using the "Edit Html" or "Html" view rather than the "Visual", "Rich Text", or "Compose" View. You can switch back and forth from the two views, so you can write in the Visual view, switch to the HTML view and click Save your draft Change into HTML view if needed Click the linker bookmarklet A Working notice should appear, and when it disappears all of the player names should be linked. Currently, the scripts only looks at players who played in 2006 or later. Names inside of links will be matched as well, to avoid this write something like "Dan Fouts" with two spaces rather than "Dan Fouts" with one space. It will render the same way in HTML since extra spaces are collapsed by default. Player names will be bolded and linked automatically. Names with multiple associated players will go to the search engine results for that name or to the common choice for that name. Search is by longest names to shortest names No matching will occur across hard line returns. A name with a </a> after it will not be matched, so it won't overwrite existing links.
s3://commoncrawl/crawl-data/CC-MAIN-2014-41/segments/1410657102753.15/warc/CC-MAIN-20140914011142-00123-ip-10-196-40-205.us-west-1.compute.internal.warc.gz
CC-MAIN-2014-41
3,244
42
https://hackaday.io/project/4961-kindle-paperwhite-2-root-access
code
Kindle Paperwhite 2 (Root Access) The following shows how to get root access to the kindle pw2 shell by using the serial port (console). Become a Hackaday.io member Not a member? You should Already have an account? Just one more thing To make the experience fit your profile, pick a username and tell us what interests you. Pick an awesome username Your profile's URL: hackaday.io/username. Max 25 alphanumeric characters. Projects that share your interests People that share your interests Does this project spark your interest? Become a member to follow this project and never miss any updates
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224644506.21/warc/CC-MAIN-20230528182446-20230528212446-00212.warc.gz
CC-MAIN-2023-23
595
13
http://reboot.pro/index.php?s=c393786c806a7a0521950f0829800905&showtopic=18090&hl=
code
How do I install Ethernet drivers You dont have to read whats below this sentence. An answer to my question will make me happy. What I am running: Asus Sabertooth z77 6GB of DDR3 RAM 16GB PNY Flash Drive So my network device (Built into the motherboard) and my Wifi card (thats on the motherboard) is not showing up in the 'Adapter Settings' and 'Device Manager' There is a bug I found to. After refreshing devices in Device Manager things get buggy.. After messing around for about 3 minutes I get a BSOD. What I did was put the ISO I built onto my 16GB flash drive, then took the drivers for my Intel Ethernet and put them in a folder I made on my flashdrive. I tried to run them..It said I needed to be running "windows management instrumentation service." I found how to turn that on and then I tried to install the drivers. It wasnt giving me a "windows management instrumentation service needs to be running" error anymore and then right when its about to install it gives me an error code. I also noticed that there was no C drive mounted. I looked in the Partitioning Disk Utility (Or whatever it is) and I didnt see anything mounted as C: That really made me sorta mad. Why is the OS mounted as a different drive letter? But I finally gave up and came here. Regular windows 7 notices my Wifi card straight from installation of the OS and then I use that to download drivers. Hell, Even ubuntu, Linux Mint, and many others notice my wifi card. But I've went through the hassle of stringing my modem, router, and many cords over my bed just to plug in a Ethernet cord to the back of my motherboard...That didnt work.
s3://commoncrawl/crawl-data/CC-MAIN-2021-17/segments/1618038863420.65/warc/CC-MAIN-20210419015157-20210419045157-00473.warc.gz
CC-MAIN-2021-17
1,623
13
https://dut-iptv.github.io/
code
-Watch CanalDigitaal/KPN/NLZiet/Telfort/T-Mobile/XS4ALL/Ziggo Live TV and content from anywhere in the EU -Unofficial 3rd Party repo and plugins for Kodi -Watch Live TV channels (dependent on your subscription) -Replay programs from the last 7 days from all channels in your subscription -Supports watching TV and listening to Radio using the IPTV Simple PVR Addon -Supports Catchup using IPTV Simple PVR Addon in Kodi 19 -Subscription to any of the supported providers (not free) -Kodi 18 or higher with Widevine Support (free) Instructions adopted from the kodi wiki, see HOW-TO:Install add-ons from zip files -Step 1: Download the repository.anon.iptv ZIP-file from here -Step 3: Select Install from zip file -Step 4: If you have not enabled Unknown Sources, you will notified that it is disabled. If you wish to enable select Settings, if you do not wish to enable select OK. If you have already enabled Unknown sources skip to Step 7. -Step 5: When you select Settings you will be taken to the Add-ons settings window. Enable Unknown sources if you wish to install your add-on or repository from a zip file. -Step 6: After you enable Unknown sources you will be presented with a Warning. Make sure you read and understand this warning, then select Yes if you wish to proceed. -Step 7: If you have selected Yes and enabled Unknown sources you can then navigate back to the Add-on browser and once again select Install from zip file -Step 8: You will now be presented with a browser window where you can navigate to where your zip file is stored. Your zip file can be stored anywhere your device has access to and can be either on local storage or a network share. -Step 9: Once you have navigated to the zip file you downloaded in Step 1, select it then select OK. You will be notified when the repository is installed succesfully. -Step 10: Navigate back to the Add-on browser and select Install from repository -Step 11: Navigate to Dutch IPTV Repository -Step 12: Navigate to Video add-ons -Step 13: Select one or more of the available addons to install, dependencies will automatically be installed The addons require the pycryptodomex packages, which is not included in OSMC and possibly general linux distributions These steps are not required for CoreELEC/LibreELEC/Windows/Android/Mac Execute the following commands in a terminal: sudo apt-get install python-crypto sudo apt-get install build-essential python-pip sudo pip install -U setuptools sudo pip install wheel sudo pip install pycryptodomex -Matt Huisman for his development of the kodi addons that where used as a base for this addon -peak3d for Inputstream Adaptive -phunkyfish for IPTV Simple PVR -Team Kodi for Kodi
s3://commoncrawl/crawl-data/CC-MAIN-2021-04/segments/1610703519883.54/warc/CC-MAIN-20210120023125-20210120053125-00553.warc.gz
CC-MAIN-2021-04
2,689
29
http://techtonicguides.com/microsoft/office/office-365/newsfeed/
code
Newsfeed is the news service included in Microsoft’s Office 365 enterprise cloud services. Office 365 provides web-based access to an organisation’s hosted Exchange services including email, contacts, calendar and tasks. Learn more about Office 365 here. Newsfeed has two columns. The left column displays the user’s name, profile pic and links to the user’s profile page, blog, apps and tasks. The right column is the main content area that changes depending on the section of Newsfeed. On the homepage, posts from co-workers the user is following are displayed by default on the left side. Click the Everyone section to see all employees’ posts or click the Mentions link to see posts that mention the user. Click the … to access the Activities and Likes sections to see the activities the user has posted and what they have liked. At the top of the left side is a text area that can be used to write a post for everyone or a specific coworker. The right side of the homepage displays a summary of the number of people, documents, sites and tags that the user is following. There is also a list of trending tags. At the top of the right side is a search bar that can be used to search conversations, people and sites. Newsfeed lets users add their own links to the left column for quick access. To add a link, click Edit Links at the bottom of the left column. The left column will then expand to display an area where a link can be dragged and dropped. Alternatively, click the Link button to open the Add a link dialog and manually enter the link label in the Text to display text field and the link URL in the Address text field. Click Try link to open the URL in a new window to test it is correct. Click the OK button to add the link. After adding links, click the Save button at the bottom of the left column to save the links or click the Cancel button to remove the links. Starting a conversation To start a conversation, click on the Newsfeed link on the left column to return to the news feed and then click on the Start a conversation text field at the top. Enter a message and optionally tag the post using the hash symbol (#tag) or mention a user using an at symbol (@user). Click the Camera button to add an image if required and then choose whether to share the conversation with everyone or just a particular site. When finished, click the Post button. Searching conversations, people and sites To search conversations, click on the Newsfeed link on the left column to return to the news feed and then click on the Search conversations text field in the top-right corner. Enter a keyword and then click the magnifying glass icon or press the Enter key. To search people, sites or everything, click the down arrow in the search field and then select People, This Site or Everything before performing the search. Editing a profile Click the About Me link on the left column to display the user’s profile. Click the Edit link at the top to edit the profile information. Three sections of information will then be displayed. There is also a Focus on Content button in the top-right corner that can be used to hide the left column. The Save all and close button at the bottom can be used to save changes to all the sections or the Cancel and go back button can be used to undo changes. The Basic Information section allows the user to enter information about themselves, change their profile picture and enter their responsibilities and topics of expertise. Clicking on the About Me text area displays a ribbon at the top with the standard Office clipboard, font, paragraph and styles options. There are also Markup options that allow the HTML source code to be viewed, edited and converted to XHTML. Click the Browse tab to hide the ribbon. The Contact Information section displays the user’s email address and allows their mobile, fax and home phone numbers, office location and assistant to be entered. Click the Address Book button on the right side of the Assistant text field to search for and select an assistant. The email, mobile phone and assistant are viewable by everyone, but there are dropdowns on the right side that allow the fax and home phone numbers and office location to be made visible only to the user. The Details section allows the user to enter their past projects, skills, schools, birthday and interests. There are dropdowns on the right side that can be make each item is visible only to the user. Changing news feed settings Click the About Me link on the left column to display the user’s profile, click the Edit link at the top to edit the profile information, click the … to the right of Details and then select the Newsfeed Settings menu item. The news feed settings will then be displayed. Enter tags in the Followed #Tags text field to choose which posts should be displayed in the feed. Use the dropdown on the right to choose whether the followed tags are visible only to the user. Use the People I follow checkbox to choose whether others can see who the user is following and who is following the user. Use the Email Notifications checkbox to choose whether to be notified by email when someone follows the user, mentions the user, replies to a started conversation, replied-to conversation or community discussion post and whether to receive suggestions for people and keywords the user might be interested in. Use the Activities I want to share in my newsfeed checkboxes to choose whether to share whenever the user tags someone, follows a person, document, site or tag, celebrates their birthday, changes their job title, has a workplace anniversary, updates their Ask Me About section, posts on a note board, likes or rates something, writes a new blog post or participates in communities. Changing regional settings Click the About Me link on the left column to display the user’s profile, click the Edit link at the top to edit the profile information, click the … to the right of Details and then select the Language and Region menu item. The regional settings will then be displayed. A list of the configured display languages is displayed in the Language section. Click the X icon on the right side of a language to delete it or use the up and down arrows to change the priority of languages. To add a new language, pick one in the dropdown below the list and then click the Add button. To change the content and search languages, click the Show Advanced Language Settings link. If the IT administrator allows it, change the timezone using the Time Zone dropdown. By default, the IT administrator chooses the regional settings. To override them, choose the Always use my personal settings radio button and then choose the locale, calendar, alternate calendar, time format and define the work week. Managing a site Click the Blog link on the left column to view the user’s site. Learn more about managing sites here. Click the Apps link on the left column to view a list of the site contents including lists, libraries and apps. Click on a library to open it in SkyDrive Pro. Learn more about SkyDrive Pro here. Click the add an app button to add a new app to the site. The Document Library and Site Mailbox apps are preinstalled to provide the site with document and email sharing features. There is also an Access app available to link the site to an Access database and an Import Spreadsheet app to import a spreadsheet and display it on the site. Many more free and paid third-party apps available on the SharePoint Store. Click the Tasks link on the left column to view a list of tasks. By default, the active tasks are displayed. Click the Important and Upcoming section to view a timeline of tasks and their due dates along with lists of important tasks and upcoming tasks. Click the Completed section to view a list of tasks that have been completed. Click the … for options to filter by recently added or by a category. Use the search bar to search tasks for a specific keyword. Creating a new task Click the New Task button, or the Add Tasks button if there are no tasks left, to create a new task. Alternatively, click the Tasks tab in the top-right corner to open the Tasks ribbon and then click the New Task button in the New section. Enter a title for the task and then click the calendar icon to choose the due date. Click anywhere away from the row to save the new task. Editing a task After saving the task, it will be added to the task list. Click anywhere on the task row to select it. All the buttons on the Tasks ribbon will then become enabled. There are options to mark the task as complete, mark it as important or choose whether the task should be displayed on the timeline in the Actions section. The Manage section has options to edit, rename or delete the task. The Settings section has options to change task settings, sync tasks to Outlook and group tasks by project. Alternatively, it is possible to rename the task by clicking in the area to the right of the task name or click the due date to change it. There is a box to the left of the task name that can be used to mark the task as complete and an exclamation point that can be used to mark it as important. The order of tasks can by changed by clicking and dragging the tick on the left side of the row. To edit a task, click on its name on the row. Change the task name, start date, due date, description and whether it is completed. Click the Save button to save changes or the Cancel button to undo changes. Changing task settings The Settings button on the ribbon can be used to change task settings. Choose how long a task must go without being changed to become hidden, how far in the future a task must be due to be considered upcoming, how long before an important task becomes unimportant, how many days a task should appear in the Recently Added view, the date range of the timeline and how long before hiding empty filters. There is also the option to rearrange the order of projects and set the default colours of each project on the timeline. Click the Save button to save changes to the settings or click the Cancel button to undo changes.
s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386163052338/warc/CC-MAIN-20131204131732-00055-ip-10-33-133-15.ec2.internal.warc.gz
CC-MAIN-2013-48
10,129
44
https://help.wrike.com/hc/ja/community/posts/9626101161495-Bring-back-Daily-To-Do-Emails
code
Wrike completely cancelling the automated Daily To-Do Emails is a problem for us. It was the only feature that would land in the our team's inbox with some actionable information about more than a single task. As recent Wrike users, we are focusing on getting everyone transitioned away from working directly from their email inbox. The ultimate goal is to get them working purely in Wrike. However, the Daily To-Dos Emails were the bridge that supported that transition. Wrike Support has suggested "workarounds" but none serve this purpose: - Adding @mentions to tasks that are due soon would generate a separate email notification for each task individually (nuisance). - Generating an automated report only sends out a link to open the report, so no actual information about what is coming up. - Adding a dashboard with the same information the Daily To-Do Emails had just misses the point entirely. It does not provide a friendly reminder to use Wrike... One has to already BE in Wrike to actually see it. Conclusion, what the competition does naturally and instinctively, Wrike has decided to shutdown: help users remember to actually use the tool. Not everyone takes on new tools and habits instantaneously. Wrike not sending out daily email digests, in our case, equals Wrike not being top of mind. If anyone knows of a workaround that would serve our purpose, please let me know. In the meantime, I really hope Wrike will reconsider supporting the transition from email based work to working purely in Wrike.
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947473738.92/warc/CC-MAIN-20240222093910-20240222123910-00651.warc.gz
CC-MAIN-2024-10
1,517
7
http://www.cinematography.com/index.php?showtopic=46299
code
It's a comedy short with two talented British actresses. I'm the writer/director, and here I am on IMDB. As you can see, it's not my first day on the job, so it'll be a fun, professional shoot. I'm very easygoing to work with. Also, I'm very collaborative so you'll have lots of input if you want. (Don't worry, I know the effect I want, so you won't end up having to direct, too.) Alas, there's no budget to pay, but we will of course feed you This would be good for someone who wants some comedy on their reel. I'll have an edit for you in a few weeks. Please email me if interested. Thanks! Edited by David Willis, 11 May 2010 - 10:15 PM.
s3://commoncrawl/crawl-data/CC-MAIN-2018-22/segments/1526794867254.84/warc/CC-MAIN-20180525235049-20180526015049-00581.warc.gz
CC-MAIN-2018-22
641
5
https://jpsoft.com/help/viewmenu.htm
code
Restores the Take Command window to its normal size, and restores the ribbon, File Explorer, and Command Input windows to their default state and size. Maximizes the tab window size by autohiding the ribbon, File Explorer, and Command Input windows, and maximizing the Take Command window. Show or hide the Command Input window. Show or hide the File Explorer window. If you want to have more room for your tab windows, you can set the File Explorer window to AutoHide (i.e., it will be collapsed to a single tab label when not in use). If you don't want the File Explorer window to appear at all, you can toggle it off with this option. Show or hide the tabbed toolbar. Show or hide the status bar. Show or autohide the Take Command ribbon menu. Make the Take Command window always on top of other (non-topmost) windows. Display items in the File Explorer window using large icons. Display items in the File Explorer window as a list. Display directory entries in the File Explorer window with a DIR-style display (Name, Size, Date/Time). You can enter an expression to use to filter the directory entries displayed in the File Explorer window. The Filter combo box allows you to enter wildcards to filter the directories and files displayed in the File Explorer window. You can also set the filter from TCC with the TCFILTER command. The Filter combo box will save its last 10 entries in each session and restore them when Take Command restarts. The Folder combo box changes the current directory for the File Explorer window.
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296818474.95/warc/CC-MAIN-20240423095619-20240423125619-00689.warc.gz
CC-MAIN-2024-18
1,528
15
https://www.torrentdownloads.me/torrent/877625/ip2country+module+for+php
code
ip2country module for php Name:ip2country module for php Torrent added: 2009-08-27 08:07:23 Torrent Files List Distributed by Mininova.txt (Size: 13.06 KB) (Files: 2) Distributed by Mininova.txt 0.28 KB ip2country.tar.gz 12.78 KB Announce URL: http://tracker.mininova.org/announce This is the ip2country module used by Mininova.org to quickly convert an ip address to a country code (O(log(n)) lookups). It makes use of the MaxMind Geoip database. It is written by me (Erik) and hereby released under the GNU General Public License. More information can be found in the README.txt Torrent name health leech seeds Size
s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218190295.4/warc/CC-MAIN-20170322212950-00179-ip-10-233-31-227.ec2.internal.warc.gz
CC-MAIN-2017-13
617
12
http://www.rctech.net/forum/nitro-road/167008-2008-florida-winternats-8.html
code
I've been busily editing the wikipedia article for the Winternats. It is meant to be informational, not an advertisement. Please check it out and give me constructive opinions. If you have any additional info or know where to find it, please let me know. I haven't talked with Art yet, so there should be much more history to add. I want to compile a list of past Winternats winners. Please let me know if you have any records. I have 2004 - 2007, plus Barry won sedan in 2003. Everything else is a little fuzzy on the exact years that people won.
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988719215.16/warc/CC-MAIN-20161020183839-00537-ip-10-171-6-4.ec2.internal.warc.gz
CC-MAIN-2016-44
547
2
https://url-decode.com/tool/base64-encode
code
With the Free & Online Base64 Encode tool, you can effortlessly encode the decoded Base64 string or decode the Base64 encoded string into a human-readable format. What is encoding? Encoding is the simple process of converting the information or instruction into some specific form. Suppose there are three applications, A, B, and C. Application A is using the X encoding scheme. Application B is using the Y encoding scheme, which is a subset of the X encoding scheme. Application C is using the same encoding scheme as application A. Let it be more specific. Application A is using the UTF-8 encoding scheme. That can potentially encode 2,164,864 characters. Application B is using the ASCII encoding scheme. That can potentially encode 128 characters (That is just a small fraction of the UTF-8 encoding scheme). Application C is using the same encoding scheme as application A (UTF-8 encoding scheme). The best solution is to send the data from Application A to C. Because sending the encoded data from Application A to B would cause many problems because Application B would not interpret some of the data sent from Application A correctly. There is another encoding scheme called Base64 Encode. What is Base64 encoding? Base64 is simply a binary to ASCII encoding scheme. That encoding scheme is used to store and transfer the binary data over the medium, designed to deal with textual data, and does not support binary data. Such as when embedding an image into a database, CSS files, or HTML. A base64 encoded string looks like this: Base64 encoding scheme uses the same 64 characters that are present in the majority of character sets. Therefore, these are not used as controlled characters on the internet. So when you encode with Base64, you are confident that your data will decode at the destination without any issue. These characters are - Upper case alphabet characters A-Z. - Lower case alphabet characters a-z. - Number characters 0–9. - Characters + and /. - The character = is used for padding. How Base64 encoding works? Bytes that formed the data are broken into 24 bits (3*8, three bytes at a time). These three bytes (24 bits) are broken into four packs of 6 bits each. Those 6 bits form a number corresponding to the index in the character set supported by the Base64 encoding scheme. But what if the number of characters to be encoded does not come with a multiple of six bits? Then zeros will be added to complete the last six-bit sequence. If the number of bytes is not in numbers of three, then padding is used; == for 1 byte and = 2 bytes In simple, Base64 encoding converts the three bytes of data into four base64 encoded characters. Some major Base64 implementations are. - It is used to store and transfer the data without any feat of data corruption. - It is used to embed the files within the web pages and scripts to avoid external file dependency. - It is used to obfuscate the data, even though the final result is not human-readable. But it cannot be used as a security mechanism because it can be decoded. - Data hashing schemes like SHA and MD5 often produce results that are not human-readable and transferable. Therefore, the hash data is usually converted to Base64 encoded form to be displayed readily. Why is the Base64 encoding scheme widely used? The Base64 encoding scheme is widely used and preferred over the other encoding schemes like HEX encoding and Decimal encoding because - It includes the 64 characters that are present in the majority of character sets. Therefore, these are not used as controlled characters on the internet. So when you encode with Base64, you are confident that your data will arrive at the destination without interruption. - The HEX encoding scheme encodes each byte into the Hex pair, resulting in two bytes after encoding. - In the Decimal encoding, each byte of data would represent three numbers. That means each byte of encoded data would result in three bytes of data. How to encode the data by using a Free & Online Base64 Encode tool? To encode the data by using the Base64 encoding scheme. Perform the following steps. - Open the Free & Online Base64 Encode tool. - You can either copy and paste the data, use the "Load from URL" option, or use the "Browse" option to upload the data. - After uploading the data, click on the "Base64 Encode" button. - The tool will convert the provided data into Base64 encoded format. - Please copy the resulted data, and paste it into the desired location. - You can decode the data using the same tool or using the Free & Online Base64 Decode tool. How to use the Load Sample Data option in the Free & Online Base64 Encode tool? Checking the results by using the sample data is beneficial. It shows you the output and removes the ambiguity that you may have related to the tool. For using that option, do the following steps. - Click on the "Load Sample Data" button. - A sample data will appear " Greeting by url-decode.com" in the above section. - Click on the "Base64 Encode" button. - The tool will perform the Base64 encoding scheme and provides you the result in that Note: We do not keep a copy of the resulted Base64 encoded form. Therefore, please copy the resulting Base64 encoded format, paste it to the desired location for future use if you are happy, and be satisfied with the results.
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474649.44/warc/CC-MAIN-20240225234904-20240226024904-00381.warc.gz
CC-MAIN-2024-10
5,328
58
https://community.jmp.com/t5/Discussions/Running-JSL-script-via-a-exe-file/m-p/4330
code
I've created a script and just as an enhancement I thought if there is a way I can run this script without opening JMP. I can currently do this via PERL using the following script : print "Script Initializing....","\n"; my $jmp = Win32::OLE->new('JMP.Application'); Can someone shed some light on how to make a VBscript(or any other code) that would do the same via a .EXE file. I am not very well versed with visual basic but I've been tinkering around a bit with it in the last few days so please consider me a newbie at VB. JMP scripts can be configured to "Auto-Submit", that is, execute instead of open in a script editor when double-clicked or opened from the OS. (double backslash, exclamation point) on the very first line of the script will cause it to run rather than open. Then as your script above, in Perl, Python, R, VBscript, etc. one can simply open the file rather than explicitly first opening JMP via OLE. See Chapter 3 of the JMP Scripting Guide. See also the JMP Automation help file. I am not sure what you might be referring to of doing the same thing via an .EXE file. Do you want a compiled program to call/execute your JMP script?
s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590347388012.14/warc/CC-MAIN-20200525063708-20200525093708-00260.warc.gz
CC-MAIN-2020-24
1,156
6
https://forums.unrealengine.com/t/problem-with-the-dialogue-typewriter-widget/722261
code
ENGINE: UNREAL ENGINE 5.1 I was testing out the dialogue widget I created by following the tutorial, but the displayed text when simulating goes outside the screen despite border being set up. Any solutions to that? I’m also wondering how I can connect these variables to get the dialogue from the String Table, and if the dialogue has no voiceover, how I can make it detect the “space” so it’ll stop playing the beep sound when typewriting? Note the Hierarchy. Hello, you must wrap the text for that. Is very simple. You can use ‘auto wrap’ or set a value to wrap at. I personally like to use ‘wrap text at’. If your box/border width has 900px for example, you could wrap at 890 (just for example). Are you converting strings to text to use on your widget? I’ll look into that wrapping later… if it’s there. Haven’t completely made the Options functional yet, but I’m trying to make it tied to the Dialogue String tables, based on the game’s selected language. For ex. if English is selected, English String Tables are used. Oh, but I don’t think you need all that work for this. You could use Localization Dashboard to get all the texts, translate it and then call inside your widget using ‘Set Current Culture’ node. For my game, I’m using ‘combo box’ and from the selected item (string) I connect to the ‘Set Current Culture’ node and automatically updates all the texts from the game to the desired language (of course, you must translate it before). There is also a good tutorial from Unreal that I’ve used to implement on my game. This is a very long video, but its good. There is shorter videos and I think it works the same way. The implementation is pretty simple, but in this video they explain everything more detailed
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500042.8/warc/CC-MAIN-20230203024018-20230203054018-00259.warc.gz
CC-MAIN-2023-06
1,776
14
https://shimmeringtrashpile.com/author/rob/
code
I know you’ve been searching the internet for a 10-minute talk about my work, speculative design, design fictions, speculative histories, anarchist collectives, pirate radio, collective ideation frameworks, and teaching. *does the math…* That’s aboooouuuut 75 seconds per topic. Ha! Hi! I gave an artist talk at the RAFFMA on Thursday, October 13th, 2022. Please check it out! Adventures in pirate radio, augmented reality, cassette tapes, and 3D printing! The Changes You Made May Not Be Saved I have a show up at the Robert and Frances Fullerton Museum of Art (RAFFMA) through December 3, 2022. The show is called “The Changes You Made May Not Be Saved.” Come check it out! Robbing the Gradle It seems inevitable that you will run into either a Gradle or Java error when trying to build an AR or VR application. The latest incantation 🪄 of this problem 🚨 for me is a missing Gradle installation in Unity 2021.3.6f1. A version of Gradle is typically found in Unity’s Tools directory. The path to this Tools directory should be /Applications/Unity/Hub/Editor/<Your Unity Version>/PlaybackEngines/AndroidPlayer/ but it isn’t there. I had 2021.3.5f1 installed, so I copied and all seems good. There’s more conversation about the issue over at this answers.unity.com thread. The fastest path to get going in Augmented Reality is using Unity’s AR Foundation which acts as a…. “gateway” of sorts to Google’s ARCore and Apple’s ARKit. I want to use the simulation features of AR Foundation 5 (which is currently in pre-release) while remaining on Unity 2021 LTS. It is currently a bit challenging to do this. Typically to do this you would set up your Unity Package Manager to include Pre-release packages and this gets you access to the new scary and probably unstable stuff. But when I did this in Unity 2021, I still only got AR Foundation 4.2.3 packages ( cue the * sad trombone * 📯). There are two ways to get around this. The first way is to go into your Unity project’s ../Packages/manifest.json file and add this line. This will automatically go get the 5.0-pre.12 packages and you are good to go. Shout out to Dilmer Valecillos for mentioning this in the comments of his Unity AR Foundation Simulation Tools Are Here! video. The second way to get the 5.0-pre.12 packages (plus a lot of cool samples) is to clone Unity’s AR Foundation Samples github repo. You will then open up this repo in your Unity Hub. Unity Hub will bark at you saying: “This project was made in a different editor version. To open this project, please install or switch to Unity 2022.” But you will have the option to choose another Editor version and you can pick your 2021 LTS installation. You will get a couple of “Are you really really sure?”-type messages. I said “yes” and so far I’m good. ../Assets/Scenes/ARFoundationMenu for the Menu.unity file. This will launch a pushbutton grid-style menu with all the samples available. Note: Some buttons will be disabled based on your build platform. For example, Object tracking is not available on Android. I connected with Ettore Sottsass‘s designs through his work within the Memphis Group. I have yet to find an interview where he didn’t seem one-half asleep and one-half distracted. This makes me like him even more. Designing for Creative Inclusivity I really enjoyed this episode of Metamuse. Adam Wiggens (@_adamwiggins_), Mark McGranaghan (@mmcgrana) chat with guest Weiwei Xu (@weiweiwei33) It was cool hearing about Xu’s Sprout adventures and her interest in designing for what I’ve always called “creative inclusivity,” in product design. Product design frameworks should always empower people to apply their own experimentation, modification, and play to their experience of our work. To disallow it is hostility on our friends. …and can we make places online that feel more like our living room or our bedroom rather than this giant lobby or this giant stadium that nobody really belongs to but is big enough for anyone, and everyone, to come through.Weiwei Xu on Metamuse episode 39 “Hello Blender” and World Documents I’ve been spending the day uploading introductory Blender videos to my “Pixel, Vectors, and Voxels” YouTube playlist and thinking about Matt Webb’s * mental note: spelled with two tees two bees * Interconnected post “Sending lo-fi virtual realities to aliens and also to each other.” Matt ideates, Instead of preparing a Google Doc, why not build a miniature explorable world? Not VR in photorealistic 3D, but a virtual reality of (mainly) text.Matt Webb in “Sending lo-fi virtual realities to aliens and also to each other” and it makes me think about Yoon Park‘s “Type in Space” text/typography-based work for HoloLens 2. It would be fun to be able to send someone a text message or email that has spatial awareness. - A reminder to pick up 🥑 by their door. 🚪 - A cake emoji 🎂 by their clock on their birthday. ⏰ - A dirty joke every time they flush the toilet 🚽 This would require some sort of very low friction and also very precise spatial permissions structure. Hrmm… 🤯 Ouch 🤯. It is still fun to think about though. I really enjoyed Jeff Rona’s interview on Darwin Grosse’s Art + Music + Technology podcast. It’s all about creating experiences. It’s about creating… not creating an emotion but creating a space in which the audience can have an emotion.Jeff Rona on Art + Music + Technology with Darwin Grosse. Podcast 363: Jeff Rona, August 29, 2021 Also this little snippet on deadlines is excellent. “…your creativity is limited not by what you can do but what you can do by the end of the day today…”Jeff Rona on Art + Music + Technology with Darwin Grosse. Podcast 363: Jeff Rona, August 29, 2021 Prince worked really really hard. Morris Day’s interview with the Questlove Supreme crew (June 22, 2021) is really great. I was particularly wowed by his comment about Prince’s work ethic. Prince would rent out an empty club so he could review the night’s performance and critique the entire band. Prince seemed like a nightmare to work for but… I try to remind myself about his commitment to excellence when I get that urge to slack off. And so you know… I was video-ing the shows. And that’s something that stuck with Prince throughout his career. And, I don’t care… You know, even when we did the Musicology tour with him, or the dates that we did do. He would make everybody, his band, and everybody had to go to whatever club he rented out afterwards and he would have that show on the projection and everybody had to watch it. [Questlove Supreme hosts react with laughter and astonishment.] Getting on the musicians, ‘Hey you were behind on that song.’ ‘Hey you did this wrong…’ the whole thing, the whole show. Every show he did that.
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296948817.15/warc/CC-MAIN-20230328073515-20230328103515-00427.warc.gz
CC-MAIN-2023-14
6,870
47
https://www.osnews.com/story/130969/are-we-wayland-yet/
code
Yes, I know Wayland has made some controversial design choices. The fact is, Wayland is the only viable X11 successor, which will hopefully bring more security and stability to the Linux desktop. Regardless of how it pans out, there’s nothing like a bit of competition to drive innovation. I won’t discuss any more politics in this post. Also a disclaimer: I’m no systems programming expert (though I aspire to be), neither am I an expert in X11, Wayland, or their associated protocols or codebases. This post merely draws on my experiences as an end user that enjoys a highly customised workflow. Wayland has been the talk of the town in the Linux world for quite a while now, but it seems a lot of important pieces of a modern desktop Linux distribution simply aren’t ready for it. I’ve been using Wayland only on Fedora and Ubuntu for three or four years now and it has worked pretty well. That’s all with Intel or AMD graphics hardware. I’ve just been blacklisting the Nvidia cards in the laptops I use. They get used in a Windows dual boot but never in Linux. And yes of course XWayland is used for a lot of things. And so? Are apps not “OS X Ready” if they run X on top of Quartz, or Windows DWM? Windows is maybe a good example since it runs emulation of two or three older graphics stacks on top of their current Windows 10 one. I’ve been trying Wayland on regular basis starting from Fedora 28. With latest realease I have no any major issues with it, but of course there are some small annoyances – like not cleaned window back-buffer which cause a momentary garbage to appear on screen, or stattering mouse pointer under load (I’m not sure if this one is Wayland specific or it just Gnome Mutter specific). Overall, I think it is ready for most desktop users, unless I miss something critical in mine workflow.
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296949387.98/warc/CC-MAIN-20230330194843-20230330224843-00439.warc.gz
CC-MAIN-2023-14
1,845
8
http://www.my-guides.net/en/guides/linux/how-to-add-unity-progress-bars-to-firefox
code
Firefox is the default browser of Ubuntu. However it could integrate better with it. It doesn't support Unity's on launcher progress bar and downloads counter badge. Here comes Unityfox, a Firefox extension which adds a download progress bar and active downloads count to the Firefox icon on the launcher in Unity. Install Unityfox and start using it immediately, no restart is needed! Here is a screenshot of how an active download looks like.
s3://commoncrawl/crawl-data/CC-MAIN-2015-40/segments/1443736677497.37/warc/CC-MAIN-20151001215757-00200-ip-10-137-6-227.ec2.internal.warc.gz
CC-MAIN-2015-40
444
1
https://groups.google.com/g/dawn-graphics/c/1UWT-q9QO9U
code
To start with, thanks a lot to the great team behind Dawn. I have been struggling building an app on Widows + Vulkan without using GLFW (directly using WinAPI). My main issue is the whole process around the creation of the swap chain. I have struggling to understand how to use `dawn::native::vulkan::CreateNativeSwapChainImpl` and then later `wgpuDeviceCreateSwapChain`. Would anybody have an example he/she could share? Many thanks. Alternative question: is anybody "maintaining" documentation somewhere with respect to how Dawn is intended to be used (with examples, etc.)? I would be happy to contribute to that effort if someone is already leading that project. When you look for Dawn you land on the Google project page. I am super happy about the work put into that project (and very appreciative of it) but I could find any docs. So happy to aggregate info if this is of interest).
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224657735.85/warc/CC-MAIN-20230610164417-20230610194417-00630.warc.gz
CC-MAIN-2023-23
889
4
https://www.petri.com/category/windows-client-os/windows-7/page/8
code
Introduction If you have ever taken a look at the Service Control Manager, shown in Figure A, then.. Introduction I can’t seem to recall where I saw it, but I read a review last week of.. Working with Windows 7 (currently in beta) I soon discovered a whole bunch of cool new features that.. Working with the Command Prompt is one of an IT Professional’s required skills. In previous Windows operating systems,.. Windows 7 is the next generation of operating system due from Microsoft and it is still working on.. To get started, you will need to get hold of the Windows 7 Beta installation media. Thankfully Microsoft.. With its planned upcoming release of Windows 7, presently slated for release in early 2010, Microsoft has released.. Folks, it seems that Microsoft is coming up with something quite interesting in Windows 7. Feature is called.. Introduction Windows Vista has drawn a lot of criticism for running more slowly than Windows XP did on.. Windows 7 is the name of the next version of Windows-based operating system. Windows 7 is next version.. Join us on Tuesday, August 24th and hear from Microsoft MVPs and industry experts about how to take advantage of Microsoft 365 at a technical level and dive deep into the features and functionality that will make your environment more secure and compliant.
s3://commoncrawl/crawl-data/CC-MAIN-2021-31/segments/1627046154302.46/warc/CC-MAIN-20210802012641-20210802042641-00097.warc.gz
CC-MAIN-2021-31
1,318
11
https://www.libhunt.com/posts/1045861-sourcehut-will-blacklist-the-go-module-mirror
code
The Go programming language > the ban prevents me from discussing the matter further Hi ddevault, FWIW, in May 2022 on that #44577 issue you had opened, it looks like someone on the core Go team commented there recommending that you email the golang-dev mailing list or email them directly. Separately, it looks like in July 2022, in one of the issues tracking the new friendlier -reuse flag, there was a mention of the #44577 issue you had opened. In the normal course, that would have triggered an automatic update on your #44577 issue... but because that #44577 issue had been locked by one of the community gardeners as "too heated", that automatic update didn't happen. Of course, communication on large / sprawling open source projects is never quite perfect, but that's a little extra color... groupcache is a caching and cache-filling library, intended as a replacement for memcached in many cases. I remember one of the first real-world uses of Go being the groupcache package: https://github.com/golang/groupcache (to serve Chrome downloads, IIRC?) > comes with a cache filling mechanism. Whereas memcached just says "Sorry, cache miss", often resulting in a thundering herd of database (or whatever) loads from an unbounded number of clients (which has resulted in several fun outages), groupcache coordinates cache fills such that only one load in one process of an entire replicated set of processes populates the cache, then multiplexes the loaded value to all callers. Collect and Analyze Billions of Data Points in Real Time. Manage all types of time series data in a single, purpose-built database. Run at any scale in any environment in the cloud, on-premises, or at the edge. Structured, pluggable logging for Go. If they change the case on their username on the other hand, the Go ecosystem explodes: https://github.com/sirupsen/logrus/issues/570#issuecomment-3... Slog: Zero-dependency structured logging in Go 4 projects | dev.to | 4 Nov 2023 Pico with C 2 projects | /r/raspberrypipico | 15 Aug 2023 Reducing Go Execution Tracer Overhead with Frame Pointer Unwinding 2 projects | news.ycombinator.com | 31 Jan 2023 Release v0.4.0 · gookit/slog - Lightweight, configurable, extensible logging library written in Go. 2 projects | /r/golang | 4 Jan 2023 proposal: log/slog: structured, leveled logging · Issue #56345 · golang/go 2 projects | /r/golang | 24 Oct 2022
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100800.25/warc/CC-MAIN-20231209040008-20231209070008-00420.warc.gz
CC-MAIN-2023-50
2,391
21
http://maplight.org/us-congress/guide/tools/bills-and-votes/money-near-votes-bill
code
Money Near Votes: Bill See all contributions given within days, weeks, or months of a vote. - Date of this vote. - Table shows all contributions within 30 days of this vote. Each row in the table shows details for one contribution: contributor (who gave), interest group (of the contributor), amount of contribution, date, Senate or House member (recipient), their party and state, and how they voted. Interest groups opposed to the bill are shown in red. Interest groups in support are shown in green. - To change the date range shown, type the number of days and click Apply Changes. '30 days' shows a 60-day window, from 30 days before to 30 days after the vote. '0 days' shows only contributions received on the same day as the vote. - Table of Contributions By Legislator shows contributions to each legislator by support and opposition interests, and the legislator’s vote. This table shows only contributions made during the date range selected above. - Add Data Filters to see results for only certain legislators, to modify the date range of contributions, or to choose different interest groups. Any data filters applied also affect the table of contributions on the top half of the page. Note: This tool shows all contributions made to all legislators within days of one vote. The Money Near Votes: Legislator tool shows all contributions made near all votes by interest groups taking a stance on those bills, for one legislator. For example, this tool—Money Near Votes: Bill—shows money from banks given to any legislator within 30 days of a vote on this credit card bill. In contrast, Money Near Votes: Legislator shows all contributions where Nancy Pelosi received a contribution from any interest group within 30 days of her vote on a bill relevant to that interest group.
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917125654.80/warc/CC-MAIN-20170423031205-00182-ip-10-145-167-34.ec2.internal.warc.gz
CC-MAIN-2017-17
1,793
8
https://www.adobe.com/hk_en/products/coldfusion-enterprise.html
code
Meet ColdFusion Enterprise (2016 release) Take advantage of the security code analyzer to automatically detect vulnerabilities in code and use the API Manager to extend reach via APIs. Benefit from performance improvements to run existing code as much as 30% faster. Embrace leading-edge technologies. Move your APIs swiftly from concept to production with the all-new API Manager. Manage APIs across their lifecycle, get insights into usage and track all aspects of performance. Secure your APIs, restrict access beyond a specified threshold and maximise returns on your APIs through the developer portal. Deploy enterprise-ready applications. Get unprecedented control over PDF generation and manipulation using new capabilities like redaction and sanitisation. Use the new security code analyzer to automatically detect vulnerabilities. Leverage performance enhancements to make existing applications work faster. Build applications quickly. Work faster with new features that include a command-line interface, CFML enhancements, SOAP to REST translation and web services support. Leverage your existing CFML skills to develop mobile apps and use built-in integration with Adobe PhoneGap Build. ColdFusion API Management platform Publish and oversee APIs in a secure and scalable environment. Readily import ColdFusion based REST services into the API management gateway by configuring the ColdFusion server within the API Manager admin portal. Set up API Manager and ColdFusion to share the same JVM for faster access when the load is minimal. HTML to PDF conversion Use the powerful conversion engine from Adobe to generate superior quality PDF files from HTML pages. The engine parses the CSS and applies its settings to ensure that the content in the PDF appears and functions as it does in the web browser, retaining its formatting, layout and hyperlinks. Work faster by using CFML for your scripting needs. Execute CFM files via the command line to work with files, databases and email or invoke web services. Pass named or positional parameters to the CFM files for dynamic customisation. Software developer quickly updates scalable projectmanagement solutions that keep customers on track. Enterprise resource planning tools built and deployed with ColdFusion put information and people to work to improve revenue. Service management company relies on Adobe ColdFusion to build a world-class, cloud-based help desk and customer service platform.
s3://commoncrawl/crawl-data/CC-MAIN-2018-26/segments/1529267864019.29/warc/CC-MAIN-20180621020632-20180621040632-00416.warc.gz
CC-MAIN-2018-26
2,456
16
https://www.microfocus.com/documentation/enterprise-developer/ed50/ES-NET/GUID-5FD7E2C3-C635-4DF6-B412-D7DCBA0EB3AA.html
code
The main MFBSI documentation is in the Enterprise Developer product help (see Micro Focus Batch Scheduler Integration) and applies to the native Enterprise Server product. The architecture of Enterprise Server for .NET implementation is slightly different although the main functionality is the same. The main things schedulers need that aren't provided by cassub/ cassout are a way to determine when a job has finished, and what the results of the job (status, exit code, output) were. MFBSI does this by creating files in an MFBSI work directory as jobs are processed. The default MFBSI user exit called mfbsiemx.dll has been compiled into managed code and is included in the \binAnyCPU\SEE folder and will be on the path provided by the Enterprise Server command prompt. The mfbsijcl utility is common to Enterprise Server andEnterprise Server for .NET and should be on the path set by the Enterprise Developer command prompt. mfbsiemx and mfbsijcl both need two environment variables set in order to function correctly. Setting environment variables for mfbsiemx means setting them in the seepubsub environment (as discussed below). For mfbsijcl, you can set them in the command session where you are running mfbsijcl, if you have started it manually. If you want to run it under control of a scheduler, you might want to put it in a script. The variables are: These variables can be included in the seepubsub.exe.config file as described in the section seepubsub Configuration File. As described in the MFBSI documentation, you need to create an MFBSI configuration file, which you'll put in the MFBSI work directory. This is a text file named mfbsi.cfg with a simple format covered in the MFBSI documentation. The following is an example mfbsi.cfg file: * Configuration file for MFBSI * How to contact the server ES-Server=-stcp:localhost:9122 * How to submit JCL, and path to folder containing it JCL-Submit=-jD:\dev\jcldemo * Extension for JCL files JCL-Ext=jcl * Let MFBSIJCL wait for region startup if a job is pending ES-SHUTDOWN-JWAIT=continue * Request JESYSMSG log from ES and write it to file <sjobid>.log JESYSMSG * Form sjobid from the ES job number SJobID=JobNo The critical parameter for Enterprise Server for .NET is ES-Server, which specifies how to connect to the region for the cassub and the casout commands. It must use the "-s" form (for example - "-s:tcp:localhost:9022"), because Enterprise Server for .NET does not support the other options. This is the development configuration, similar to running self-hosted dispatcher and SEPs. The main advantages are: Interactive mode is not ideal for production use, but might be useful when developing an MFBSI configuration. This is the recommended production configuration. To see MFBSI in action, you can run mfbsijcl manually to have it submit a job, and then check the results. You can also execute it using a third-party scheduler. In either case, the JCL source you wish to submit must be in the directory specified by the JCL-Submit directive in your MFBSI configuration file. You can use the JCLDEMO.JCL sample that comes with Enterprise Server (located in \etc\SEE\files\sysunder your product installation directory). Running mfbsijcl manually
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474775.80/warc/CC-MAIN-20240229003536-20240229033536-00344.warc.gz
CC-MAIN-2024-10
3,224
17
https://janclemenslab.org/das/intro.html
code
Welcome to DAS¶ DAS — short for deep audio segmenter — is a tool for annotating song in audio recordings. At the core of DAS is a deep neural network, implemented in Tensorflow. The network takes single- and multi-channel audio as an input and returns the probability of finding a particular song type for each audio sample. DAS can be used with a graphical user interface for loading audio data, annotating song manually, training a network, and generating annotations on audio. Alternatively, DAS can be used programmatically from the command line, in python notebooks, or in your own python code via the If you use DAS, please cite: Elsa Steinfath, Adrian Palacios, Julian Rottschäfer, Deniz Yuezak, Jan Clemens (2021). Fast and accurate annotation of acoustic signals with deep neural networks, bioRxiv, https://doi.org/10.1101/2021.03.26.436927 Convert your own data, train and evaluate a network, predict on new samples in realtime.
s3://commoncrawl/crawl-data/CC-MAIN-2021-31/segments/1627046154127.53/warc/CC-MAIN-20210731234924-20210801024924-00356.warc.gz
CC-MAIN-2021-31
944
5
https://gangnam-style.proboards.com/thread/1366/dark-monochrome-banner-ps-cs4
code
Post by edward on Aug 21, 2012 15:58:48 GMT -8 Hey, y'all. I just thought I'd post up a little tutorial here on this dumb banner I made one time. Hopefully, it'll give a good idea on some different types of textures, layer types, etc. This was made in photoshop CS4, but I'm sure it's translatable to other CS...es. I'm not so sure about GIMP and such, but you can give it a whirl, if you'd like. It's going to seem pretty long because I tried to describe each step in as much detail as I could. I hope you can learn not only how to make this graphic, but to learn how to use some photoshop functions if you're a beginner or if you're not familiar with them. So what we're making looks like this: IT'S BIG SO CLICK HERE Here's what you'll need: OKAY SO HERE'S WHAT YOU'RE GONNA DO:1) Make a new canvas/project/whatever. The dimensions for this one are 710px by 400 px. Then you're gonna paste the skeleton image on it and use the free transform tool (control + t) to shrink it and place it on the canvas. Make sure you're holding the shift button while you resize so that the dimensions remain proportional! So far, mine looks like this: CLICK HERE. I also cut around the edges of the skeleton a bit, but that's purely optional. It'll barely make any difference in the final product. 2) Next, use the eyedropper tool (i) to grab the background color from the skeleton picture. It should be a very dark gray, with a hex code around #161616. We're going to make a new layer (control + shift + n) BELOW the skeleton picture and use the bucket fill (g) tool to make the entire background this color. It should look like this: CLICK HERE. 3) Now we get to do the fun part: applying textures! First, we're going to use the black scratch texture, FOUND HERE. We're going to paste this over the entire picture, then use the free transform tool (control + t) to shrink it down a bit. I believe I shrank it about as small as it could go while still being able to cover the entire image, but use your own discretion. Then, set the layer to screen with an opacity of seventy percent. Finally, using the toolbar at the top, sharpen (filter --> sharpen --> sharpen) this entire layer. Your image should now look like this: CLICK HERE. 4) Next, we're going to apply our TORN PAPER TEXTURE. We're going to lay it over our picture so it looks something like this: CLICK HERE. Then, set this layer to screen with an opacity of one hundred percent. The result of this step should look something like this: CLICK HERE. 5) Our last texture is the GRAINY one, and this step's a little tricky. In fact, it won't make a HUGE impact on the final product, and can even be left out of if you don't want to do it. So this texture isn't actually wide enough to stretch across the entire banner, and there are weird black borders on the left and right sides. So we're going to erase the borders (you can use the eraser tool or the selection tool and delete button), and then place it strategically along the bottom, twice, so that it can cover the whole thing. It should now look like this: CLICK HERE. With me so far? Okay, now merge these two layers together. You can do that by selecting both of them (hold control while clicking a layer to select more than one), then pressing control + e to merge them together. Now, set this new merged layer to something that makes both it and the paper texture beneath it clearly visible. I set mine to screen, for example, and it looks like this: CLICK HERE. With both layers visible, use a soft brush (for example, the first brush option) on the eraser tool (e) to erase roughly the area where the grainy texture goes on to the dark gray part of your image. Here's what this looks like: CLICK HERE AND CLICK HERE. By no means do you have to be exact with the erasing, because now we're going to set this layer to multiply at an opacity of one hundred percent to give us something that looks like this: CLICK HERE. 6) THAT WAS A DOOZY. But the good news is that it's pretty easy from here on out, especially the next step. We're just going to make a black and white gradient map (layer --> new adjustment layer --> gradient map) to go over the whole image. This will raise our contrast and brightness a bit. It should look almost the same as the last step: CLICK HERE. 7) The next step is another gradient map! But this one's a little more specific. In the gradient map menu, you can set the location and color specifically, so I'm going to tell you each coordinate. It looks like this: CLICK HERE. At location 0, make a point with color #000000. At location 20, make a point with color #83350a. At location 40, make a point with color #d08055. At location 60, make a point with color #e7e376. At location 100, make a point with color #ffffff. If everything is correct, it should look like this: CLICK HERE. Finally, just set this layer to exclusion with an opacity of forty percent. It should look like this: CLICK HERE. 8) Next is a simple exposure layer (layer --> new adjustment layer --> exposure) to increase the contrast and brighten it up. Basically, the two things you want to focus on are exposure and gamma correction. The latter will give you contrast, while the former will brighten up. These are the settings I used: GAMMA CORRECTION: 0.64 With those settings, the image should look like this: CLICK HERE. 9) Next is...another gradient map! This one is just black and white again, to remove the brown/blueness. It'll look like this wit that layer applied: CLICK HERE. 10) The last step, should you choose to include it, is to add text! For example, I've got this right here: CLICK HERE. But I'm terrible with text, and you can really do whatever you want. If anyone's curious, however, the text I used is #373737 and the font is Rosewood STD. That's it! Happy crafting!
s3://commoncrawl/crawl-data/CC-MAIN-2021-25/segments/1623487582767.0/warc/CC-MAIN-20210612103920-20210612133920-00325.warc.gz
CC-MAIN-2021-25
5,795
22
https://chrome.google.com/webstore/detail/currency-converter/dbfpghagihnlpkndohhdbakfjiedbkco?hl=en
code
Convert Currency using live data Total support of 167 currencies. Select any currency values in any website and click the extension then converted values will be in your hands or just click the extension and type the value. supported formats for selecting values in website: 1.123 equals to 123 2.123.45 equals to 123.45 3.123k equals to 123000 4.123m equals to 123000000 5.123b equals to 123000000000 and above formats supports comma(,) and dollar($) symbols. Note: Please refresh already opened tabs after installation
s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376826856.91/warc/CC-MAIN-20181215131038-20181215153038-00466.warc.gz
CC-MAIN-2018-51
520
11
https://www.cur8able.com/stephanie-thomas
code
What is Disability Fashion Styling? Why does it matter? I answer these questions and more in my TEDx Talk delivered at TEDxYYC, the third largest TEDx event in Canada. TEDx Innovations featured my talk as 1 of 7 talks that highlight people with disabilities. My goal with this talk is to empower as many people as possible, so please watch and share the TEDx TALK with anyone you think it may help. If you'd like to learn more about my story here is a link.
s3://commoncrawl/crawl-data/CC-MAIN-2018-22/segments/1526794867220.74/warc/CC-MAIN-20180525215613-20180525235613-00175.warc.gz
CC-MAIN-2018-22
457
2