url
stringlengths
13
4.35k
tag
stringclasses
1 value
text
stringlengths
109
628k
file_path
stringlengths
109
155
dump
stringclasses
96 values
file_size_in_byte
int64
112
630k
line_count
int64
1
3.76k
https://datavirtuality.com/connectors/google-bigquery/
code
Integrate your data in Google BigQuery Integrate your data into Google BigQuery with a few clicks or SQL commands Integrate data in Google BigQuery with Integrate data in Google BigQuery with the Logical Data Warehouse Connect Google BigQuery with your other data warehouses Load your data in Google BigQuery Get your data in Google BigQuery for your BI tools About Google BigQuery Google BigQuery is a fully managed, low cost enterprise data warehouse for analytics used by Fortune 500 companies and startups. Google BigQuery can scan TeraBytes in seconds and PetaBytes in minutes. Google BigQuery works in conjunction with Google Storage for interactive analysis of massively large data sets. Data Virtuality Benefits Connect in 5 minutes Data Virtuality is providing a simple wizard to type in your data source credentials to establish a connection. It only takes minutes and you see your data in a SQL query-able tables instantly after. Query connected data sources with SQL. Query, join and integrate data from Google Analytics, Salesforce, Oracle, MySQL and many more data sources using SQL commands. Read and Write data Read and Write data from connected data sources. Integrate data into an analytical database and write data back to data sources based on triggers.
s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600400219691.59/warc/CC-MAIN-20200924163714-20200924193714-00029.warc.gz
CC-MAIN-2020-40
1,273
16
https://www.bogleheads.org/forum/viewtopic.php?f=2&t=400249&newpost=7173800
code
I guess mine is maybe a "modified hub"... From a "hub" perspective - I use a Fidelity CMA - with a nominal amount of $ (mostly to maintain a MM fund that pays higher than a core position). It is the only account with an outside link - either in or out. The idea being if I need to move money from institution A to institution B - it "flows" through the "hub". As an example, the "hub" account is the only linked account to my HMBradley account (which used to be my "savings" account, although most of that has been moved into Fidelity and into T-Bills - but not relevant for this example). [Most years] We'd accumulate "cash" into HMBradley account, such that by end of year we'd have enough to front-load IRA, HSA, 529, and I & EE Savings bonds. By 1/1 we'd "pull" the funds from our "savings" account into the "hub" account. And then the money is either "automatically" withdrawn from the hub account (for example, IIRC our IRA's and 529 have an "automatic" investment to pull from the "hub", manually transferred (for example the HSA is funded from payroll - but we backfill "checking" since our net pay is reduced), or left for external use. Buying our I & EE Bonds from Treasury Direct is a great example of this last scenario, as the only account linked to TD is our "hub" account. This setup make's it easy for us to "change" accounts - like when we switched from HMBradley as our "savings" account to using a different Fidelty CMA with T-Bills as our "savings" account. I just did the "transfer" from my other Fidelity account instead of HMBradley, and everything else worked the same. I don't have to worry about needing to "change links", change "automatic" investments/transfers/etc.. And the only "maintenance" is if/when we "add" a new account - and we just need to link that account once with our "hub" account - and then via the hub we can send/receive money between all of our accounts (without change). As noted, we keep a nominal amount in the account - if it makes it simpler - think of the account as having $0 normally. Which also means that should any of our "links" and/or our "accounts" be compromised - there is normally $0 in the account that could be "stolen". Conversely, if there is money in the account - it's a sign I need to do something with it! For example, any dividends/interest in our "taxable" Fidelity accounts are automatically "swept" into this "hub" account, as is any "excess income" from my paycheck. So, if I see any money in the "hub" account - unless it was "waiting" there for something else (such as buying I & EE Bonds) - it's "waiting" to be moved/invested as per my AA. The "modified" part is that we still do the bulk of our "transactions" through our "checking" account, which has checks, an ATM/debit (that we rarely use), handles auto-pay on credit cards/utilities/etc., as well as has direct deposit configured. This ultimately was simpler for us - as it separates our "normal expenses/income" from our "other stuff". As an example, let's say we spend $5k a month, our direct deposit is setup to put $5k a month into "checking" and anything beyond (aka "excess income") goes into our "hub" account (actually some flows to other accounts too that have DD requirements - but not relevant). For example, let's say I get a bonus, that "excess" shows up in my "hub" account - where I can easily see "oh I need to do something with that money". And then my process looks something like: - Add to "checking" if its running low... - Add to "savings" until I'm at my "target" cash (as a reminder, I try to accumulate enough "cash" to front-load next years investments) - Invest anything else as per my AA (aka move funds to my brokerage account and buy more stocks or bonds as needed to maintain my AA) This "modified" part - with things like direct deposit, auto payments, etc. configured could have more "work" if we ever switch checking... But candidly, I don't see that as likely... Fidelity CMA has been awesome for us - we can use a higher rate MM fund if we want, no fee on ATM, fits into our [mostly] "one-stop-shop" with Fidelity, etc. Fidelty would have to end its CMA/checking offering, or something else "amazing" would have to exist for us to even consider that... As such - this works for us. It's not exactly a "full hub" - but works for our needs.
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296950528.96/warc/CC-MAIN-20230402105054-20230402135054-00097.warc.gz
CC-MAIN-2023-14
4,311
22
https://conf.researchr.org/track/models-2023/models-2023-tutorials
code
We invite proposals for tutorials to be held at MODELS 2023 as part of its satellite events from October 1 to 6, 2023. Tutorials provide intensive overviews on topics in the area of model-based software and systems engineering ranging from modeling methodologies and research methods through new modeling tools and technologies to thoughts on the past, current, and future development of the modeling discipline. Tutorials target an audience of practitioners, researchers (academic and industrial), students, and developers familiar with, and already working with, modeling techniques. The target audience typically has a strong interest in Model-Driven Engineering (MDE), including work on improving and evolving modeling languages (such as UML or DSLs), developing sophisticated MDE tool support, and using MDE to develop / test / reverse / maintain complex systems. Potential attendees may also be interested in how modeling has been applied effectively in specialized domains (e.g., in the automotive industry), and in learning about successful uses of MDE methods in real-world applications. The following themes are examples of what is considered relevant for tutorials: - Modeling techniques for specific domains (e.g., automobile, cyber-physical and hybrid systems, Industry 4.0, Internet of Things …) - Modeling methodologies and model-oriented processes (e.g., for agile modeling or modeling at scale) - AI in modeling (including search*based approaches, machine learning, planning, or flexible modeling) - Presentation of new tools or new versions of old tools (e.g., modeling tools, language workbenches, model transformation languages, model verification tools, model execution tools) - Collaborative modeling and integration with version control systems and CI/CD pipelines - Dissemination of project results from industry-related projects - Teaching of model-driven software development - Research methods in MD* (Model-Driven Development (MDD), Model Driven Engineering (MDE), Model Driven Software Development (MDSD), etc.) - Modeling for re-engineering and legacy evolution - Empirical studies in the context of modeling - User experience in model-based software engineering - Practical experiences of general interest - General topics of interest to young researchers, like presentation skills or research methodologies Tutorials are intended to provide independent instructions on a topic of relevance to the audience described above. Therefore, no sales-oriented presentations will be accepted. Tutorials relating to commercial tools or involving the use of commercial tools may be accepted but will be subject to closer scrutiny, including possible approval of presentation slides. Potential presenters should keep in mind that there may be quite a varied audience, including novice graduate students, seasoned practitioners, and specialized researchers. Tutorial speakers should be prepared to cope with this diversity. See the Proposal guideline page for details on the submission process. Proposals must be submitted electronically in PDF format through the MODELS 2023 Tutorials EasyChair submission page. - Fri 7 Jul 2023: Proposals submission deadline - Fri 4 Aug 2023: Notification to authors - Fri 11 Aug 2023: Camera-ready deadline Sun 1 OctDisplayed time zone: Amsterdam, Berlin, Bern, Rome, Stockholm, Vienna change 09:30 - 11:00 |T1: Tutorial on Rigorous and Agile Domain-Specific Modeling with openCAESAR 11:30 - 13:00 |T2: Collaborative Modeling and Metamodeling in the Cloud with Versioning TutorialsLink to publication 14:30 - 16:00 |T3: Compositional Modeling Languages in Action: Engineering and Application of Heterogeneous Languages Mon 2 OctDisplayed time zone: Amsterdam, Berlin, Bern, Rome, Stockholm, Vienna change 08:30 - 10:00 |T4: Digital Twins for Simulation-based Decision-Making in the Face of Uncertainty 10:30 - 12:00 |T6: Model-Based Capability Planning with UAF 13:30 - 15:00 |T7: Model-Driven Engineering on the Web and in Visual Studio Code with EMF and Epsilon 15:30 - 17:00 |T8: A Tutorial on Category Theory without math well, just a wee bit Don Batory University of Texas, AustinMedia Attached All submissions must be in English and adhere to the IEEE formatting instructions. The submission must include the following information in the indicated order: - Title -Presenters: Name, affiliation, contact information, and short bio. - Authors of the proposal or tutorial material, who are not going to be presenting, may be listed, but must be listed last with a footnote “Author only; will not be presenting”. - Abstract (maximum of 200 words) If accepted, the abstract will be used to advertise the tutorial. Thus, the abstract should clearly highlight the goals of the tutorial and the skills that participants will acquire. - Keywords (at least 5 keywords) - Proposed length (suggestion: up to 1.5-2 hours) -Level of the tutorial: beginner/introduction or advanced Target audience and any prerequisite background required by attendees to be able to follow the tutorial (beyond average modeling skills) - Description of the tutorial and intended outline (maximum of 4 pages) -Novelty of the tutorial -List offerings of similar tutorials at previous editions of the MODELS conference or other conferences, and discuss the differences with respect to the current proposal. - Required infrastructure: Explicitly specify the adaptations and actions you intend to do in order to make the tutorial suitable for a virtual environment. - Sample slides (minimum of 6 slides, maximum of 25 slides) - Supplementary material (optional) LaTeX users need to follow the IEEE LaTeX instructions and use the 8x5 x 11 2-column LaTeX Template; Overleaf users need to use the IEEE Conference Template. Note the information on how to use the LaTeX Bibliography Files. Word users need to use the 8x5 x 11 2-column Word Template, and choose Times New Roman for the text, author information, and section headings, and Helvetica for the paper title. The Tutorials Selection Committee will review each submitted proposal to ensure high quality, and select tutorials based on their anticipated benefit for prospective participants and their fit within the tutorial program as a whole. Factors to be considered also include: relevance, timeliness, importance, and audience appeal; effectiveness of teaching methods; and past experience and qualifications of the instructors. The goal will be to provide a diverse set of tutorials that attracts a high level of interest among broad segments of the MODELS participants. Note that, as per ACM policy, tutorials are not included in the proceedings of the conference companion. As in previous years, participants will pay a single satellite fee, which will cover both tutorials and workshops. This permits unifying the treatment of workshops and tutorials, and it makes tutorials more attractive to attendees. Under this scheme, tutorial presenters will not receive monetary compensation and will have to pay for their own registration for the satellite events. By submitting a tutorial proposal, the presenter accepts that there will be no compensation for giving the tutorial (if accepted) and that the registration fees for the instructors have to be funded by the instructors themselves. The benefit to the presenter is the opportunity to extend their sphere of influence to the MODELS community.
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474412.46/warc/CC-MAIN-20240223121413-20240223151413-00657.warc.gz
CC-MAIN-2024-10
7,386
46
https://careers.iriweb.org/jobs/13284562/optimization-software-developer
code
We are seeking candidates to assist with the development of What’sBest!, our optimization add-in to Excel. In addition, there will also be the possibility of providing development support for our other optimization products. The primary skills we are looking for include: Familiarity with software development tools such as MS Visual Studio and InstallShield. Languages such as C/C++, VBA, Excel. Knowledge and experience with algorithms for Linear and Integer optimization. Education: Masters degree, or higher, but will consider talented Bachelors candidates. Along with your resume, please provide a description of software projects you have worked on (short code samples are also welcome). At some point, we will also request references. About LINDO Systems Inc LINDO develops and markets three optimization software products: 1) What’sBest!, an optimization add-in to Excel, 2) LINGO, an algebraic optimization modeling language, and 3) LINDO API, a callable library engine for solving linear, integer, quadratic, general nonlinear, and stochastic optimization problems. For over 35 years LINDO Systems has been a leading provider of optimization modeling tools to business and educational communities around the world. Our mission is to provide fast, easy-to-use tools for solving linear, integer, quadratic, general nonlinear and stochastic optimization problems. LINDO pioneered the development of linear programming and nonlinear programming software on the PC, as well as optimization software in spreadsheets. Our solvers are in use at over half the Fortune 500--including 23 of the top 25.
s3://commoncrawl/crawl-data/CC-MAIN-2020-10/segments/1581875143963.79/warc/CC-MAIN-20200219000604-20200219030604-00247.warc.gz
CC-MAIN-2020-10
1,605
9
http://mathhelpforum.com/geometry/81795-endpoints-shortest-distance-between-skew-lines.html
code
I know the forumla to find the distance between two skew lines in space. But, I need to find out the coordinates on the two lines that represent the shortest distance. denote the equations of the two lines. I assume that and that exist To calculate the endpoints of the shortest distance between arbitrary points of the two lines the distance vector must be a multiple of the normal vector: You'll get a system of 3 simultaneous equations. Solve for (s, t, k). Plug in the values of s and t into the appropriate equations to get the endpoints of the distance. I'm sorry, but I'm not sure i understand the form you're using for the equation of a line. I've learned that the equation for a line is like the following: (2+3d)i + (3+2d)j + (1+4d)k Where: (2, 3, 1) is a point on the line. And 3i + 2j + 4k would be the vector representing the orientation of the line
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917118519.29/warc/CC-MAIN-20170423031158-00149-ip-10-145-167-34.ec2.internal.warc.gz
CC-MAIN-2017-17
862
7
https://techyeverything.com/coding-games/
code
To learn coding is not just being familiar or comfortable with the syntax but to understand the logic and improve logical and analytical skills. Every programming language has advantages and disadvantages but the basics are the same to a certain extent. We all know that the best method to learn a programming language is coding practice. It is also known that the key developers not just write the code but enjoy doing it. If the basics are not sorted, advanced programming tends to be boring. So if you are tired of the traditional ways to learn coding concepts and want some interesting methods, Here is the list of coding games that are proven to be beneficial to learn to code. These coding games are some of the best coding games for beginners. You can also use these coding games for kids since it is graphically rich and interactive. First in the list of coding games is CodeMonkey. CodeMonkey is an online coding game environment that is very beginner-friendly and teaches programming concepts to students with very limited or zero knowledge in coding in a fun and interactive manner. It uses CoffeeScript programming language to teach you to build your own games in HTML5. CodeMonkey is a great game to improve your logic and problem-solving skills whilst learning how to code. It was basically designed to teach kids about coding which makes it much more fitting as a class interactive activity. The fact that it was designed for kids doesn’t make it less useful for adults as well since the platform provides different MOOC courses as well. If you are looking for a way to improve your coding skills as well as learn new concepts but are tired of the regular tutorials and want something fun and interesting then you should definitely try CodinGame. One of the most amazing things about the CodinGame platform is that you can play with friends and colleagues, and even enter international coding competitions involving timed artificial intelligence, or code-golf challenges. The platform is also used by head hunters to contact exceptional players and provide job offers. All in all, it is a great coding game service to enhance your skills and eventually become a coding expert. Most Enjoyable in the list of coding games is Flexbox Froggy. Learning the concepts of CSS can be a bit boring at times but with Flexbox Froggy you can learn these concepts through a simple game. It is made using the CSS Flexbox module and teaches you the basics of how things align in the flexbox while you help Froggy and his friends. Simplicity is its main feature since the game was developed for absolute beginners who don’t have any understanding of programming and web development. The game has 24 levels each of which teaches a different concept and all you need to do is guide froggy to the lily pad on the right by using the justify-content property. Flexbox Defense is another coding game that uses the Flexbox module to teach CSS concepts. This game is similar to Flexbox Froggy and your job is to stop the incoming waves of enemies from getting past your defenses, using similar commands as in Flexbox Froggy. The players can play through 12 different levels, each one with a new property while positioning the defense towers using CSS and Flexbox to counter incoming enemies. It is a great game to learn the Flexbox Web Layout Module in a playful way. It is based on an island theme and the entire game consists of different island-based levels each one more difficult than the previous to ensure that you learn something new at each level of the game. In the world of CheckIO, no coder is alone since it allows for Sharing and comparing of puzzle solutions with other users. Its forum is filled with coders of all levels that are ever ready to offer advice to newer players on their code. CodinGame also has a wealth of knowledge just waiting to be tapped into because it has a strong community and a direct, in-game connection to Tech.io, which is a platform where advanced developers share their knowledge with less experienced coders. It is this community-led approach towards problem-solving, that has made CheckIO a popular coding game in the programming community. Codewars is a ninja theme-based gamified online platform that helps you improve your skills with the help of different puzzles and coding challenges. If you want to learn a particular language, you’ll have to clear a basic test to prove your skills and understanding of the language. This way you can quickly find bugs in your code and even get different approaches to solving the same problem. The main aspect while learning to code is practice and the Codewars platform provides ample contests, challenges, and puzzles to get your brain firing on all cylinders. Last in the list of coding games is Ruby Warrior. Ruby is a popular programming language widely used for web development purposes. If you are an absolute beginner in Ruby then Ruby Warrior is the perfect coding game for you. It is a game developed by Bloc. which is a part-time online coding boot camp that provides people with new opportunities to learn coding through projects like this. The game consists of beginner and intermediate tracks and you can choose either one depending on your skill level. It is a simple warrior themed game wherein the players need to guide their warrior from one level to another level by giving commands in Ruby. SQL Murder Mystery: The SQL Murder Mystery Game is a very intriguing game where you are the detective and have to solve a murder mystery using SQL commands. A crime has occurred and the investigative needs the best of the best investigator, that is you!. The investigative offered you the criminal offense scene report, put you in some way shed it (Even James Bond can make mistakes). You vaguely bear in mind that the crime was a murder that happened at some point on Jan. 15, 2018, situated in SQL City. Start by recovering the equivalent criminal offense scene report from the police department’s data source. Experienced SQL players can typically use data source inquiries to infer the framework of a data source. Each database system has different ways of handling this info. The SQL Murder Mystery is developed utilizing SQLite. Use this SQL command to find the tables in the Murder Mystery data source. SQL Murder Mystery is one of the Best Coding Games for beginners who want to master SQL. Modern CSS selectors have ended up being a lot more progressed with pseudo-classes and attribute selectors. Practicing these will take a lot of time and do you even have any idea where to begin? Well, CSS Diner is the answer to your question. The CSS Diner web app is truly fun and also genuinely educational for developers of all skill degrees. It asks you to create selector codes that select particular components on a restaurant table. You’re given the HTML structure and also you need to compose the very best selector for the job. You’ll undergo 26 different levels of difficulties. The initial few levels teach core fundamentals like aspect selectors and also class selectors. In the later levels, you’re collaborating with advanced concepts. After that prove it to yourself by beating the CSS Diner game if you believe you’re a CSS master. “Untrusted – Web of Cybercrime” (or basically, Untrusted) is an internet multiplayer (10 to 16 players) hacking/social deduction game inspired by the Werewolf/Mafia category. In Untrusted, hackers from the imaginary NETSEC team are charged with hacking a specific server on a computer system network. You can also check out some awesome hacking games which delve a lot deeper into cybersecurity. netsec participants should utilize their wits and also abilities to outmaneuver the covert AGENTs that will attempt each evening to do arrests or have various other gamers become snitches for them. The game finishes as quickly as the NETSEC group gets origin accessibility of the target node or when all AGENTs or NETSEC participants have been eliminated from the game. It is likewise instant game over if the NETSEC leader provides origin access to an AGENT participant. The Untrusted is so fun game to play and it is 10X more fun when you compete with your friends. Code Hunt is a major video gaming platform for coding competitions and also exercising programming abilities. All in all, it’s an amusing coding game. What I like regarding Code Hunt is that it forces trainees to do some important reasoning. They have clues to what the code ought to do as well as have to evaluate it to recognize the problem. They have to create the code to give the appropriate answer to the problem. They are forced to examine the syntax so that is good and helps you avoid making syntactical errors. Yet given that they need to utilize the phrase structure is greater than just a “repair this code” kind of thing. Robocode is an open resource instructional game begun by Mathew Nelson (originally provided by IBM). Presently payments are being made by different individuals; officially Flemming N. Larsen is servicing Robocode to maintain its existing and also repair the bugs. The game is developed to aid individuals learn to program in Java and appreciate the experience. Robocode is a programming game, where the goal is to develop a robotic battle tank to fight against various other containers in Java or .NET. The robot battles are running on-screen as well as in real-time. The slogan of Robocode is: Build the Best, damage the rest! An enjoyable and appealing coding game that teaches you all the essentials of computer system programming. VIM Adventures is an online game based on VIM’s keyboard shortcuts (motions, commands, and also drivers). When you start the game, you can just relocate up, down, left, or right making use of the keyboard to get through a maze, get some really amazing tricks and also treasure chests, and also follow tips to proceed to the following level as well as master VIM. The game can be really interesting when you are bored and also needs to learn VIM. Screeps is an enjoyable game and has a one-of-a-kind angle to it. While it still has some room to grow, it’s moving in the right pathway. Utilizing real programming instead of a pseudo-language really permits the gamers to focus on far better coding behaviors as well as makes the method fun. There is an extremely active area of people on the game’s Slack channel so it likewise has a touch of the MMO chat to it for the social developers available. In Duskers you pilot drones right into abandoned spacecraft to find the methods to endure and assemble together exactly how the universe became a gigantic graveyard. You are a drone driver, bordered by old sandy technology that acts as your only eyes as well as ears to the outside world. And also when you provide commands, you do it with a command-line user interface. This has one of the nicest interfaces that actually feels like real simulation and the game does intensify sometimes but is fun nonetheless. I personally feel that everyone should play this game as it improves your command line skill which is a basic skill for every programmer thus making Duskers one of the best coding games for beginners. Of course, there are plenty of different ways available to learn to code and you can even become an expert using these resources, but coding is just like art and the more you enjoy during the learning process, the more likely it is that you develop a passion towards coding. These coding games for kids will definitely be beneficial. The above-mentioned platforms will surely help you in learning core programming concepts and what better way to do this than while playing games!
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817014.15/warc/CC-MAIN-20240415174104-20240415204104-00119.warc.gz
CC-MAIN-2024-18
11,694
39
https://scheve-research.org/publications/
code
Peer-Reviewed Journal Articles 2022. “Improving Public Support for Climate Action Through Multilateralism” (with Michael Bechtel and Elisabeth van Lieshout). Nature Communications 2022. “The German Trade Shock and the Rise of the Neo-Welfare State in Early Twentieth-Century Britain” (with Theo Serlin). American Political Science Review. 2022. “Foundations of a New Democracy: Schooling, Inequality, and Voting in the Early Republic” (with Tine Paulsen and David Stasavage). American Political Science Review. 2022. “Equal Treatment and the Inelasticity of Tax Policy to Rising Inequality” (with David Stasavage). Comparative Political Studies. 2022. “Sustaining Capitalism and Democracy: Lessons from Global Competition Policy” (with Michael O. Allen). International Studies Review. 2021. “The Economic Origins of Authoritarian Values: Evidence from Local Trade Shocks in the United Kingdom” (with Cameron Ballard-Rosa, Mashail Malik, and Stephanie Rickard). Comparative Political Studies. 2021. “Economic Decline, Social Identity, and Authoritarian Values in the United States” (with Cameron Ballard-Rosa and Amalie Jensen). International Studies Quarterly. 2021. “City Limits to Partisan Polarization in the American Public” (with Amalie Jensen, William Marble, and Matthew J. Slaughter). Political Science Research & Methods. 2020. “Constant carbon pricing increases support for climate action compared to ramping up costs over time” (with Michael Bechtel and Elisabeth van Lieshout). Nature Climate Change. Supplementary Materials. 2018. “Inequality and Redistribution Behavior in a Give-or-Take Game” (with Michael Bechtel and Roman Liesch). Proceedings of the National Academy of Sciences Online Supporting Information 2017. “Who Cooperates? Reciprocity and the Causal Effect of Expected Cooperation in Representative Samples” (with Michael M. Bechtel). Journal of Experimental Political Science 4: 206-228. 2017. “Interests, Norms, and Support for the Provision of Global Public Goods: the Case of Climate Co-operation” (with Michael M. Bechtel and Federica Genovese). British Journal of Political Science. Online Appendix 2017. “The Structure of American Income Tax Policy Preferences” (with Cameron Ballard-Rosa and Lucy Martin). Journal of Politics Vol. 79 No. 1 (January): 1-16. Supplementary Materials 2016. “Self-Centered Inequity Aversion and the Mass Politics of Taxation” (with Xiaobo Lu). Comparative Political Studies Vol. 49 No. 14: 1965-1997. Online Appendix 2014. “Technology and the Era of the Mass Army” (with Massimiliano Onorato and David Stasavage). Journal of Economic History. Online Appendix 2013. “Mass support for global climate agreements depends on institutional design” (with Michael Bechtel). Proceedings of the National Academy of Sciences. Online Supporting Information. Video summarizing our findings. 2012. “Inequity Aversion and the International Distribution of Trade Protection” (with Xiaobo Lu and Matthew Slaughter). American Journal of Political Science Vol. 56 No. 3 (July): 638-655. This paper was originally entitled “Envy, Altruism, and the International Distribution of Trade Protection” National Bureau of Economic Research Working Paper #15700. Online Supporting Information 2012. “Democracy, War, and Wealth: Evidence from Two Centuries of Inheritance Taxation” (with David Stasavage). American Political Science Review Vol. 106 No. 1 (February): 82-102. Supplementary Materials 2010. “The Conscription of Wealth: Mass Warfare and the Demand for Progressive Taxation” (with David Stasavage). International Organization Vol. 64 (Fall): 529-61. Online Appendix 2010. “Social Identity, Electoral Institutions, and the Number of Candidates” (with Eric Dickson). British Journal of Political Science Vol. 40 No. 2: 349-375. Online Appendix 2009. “Institutions, Partisanship, and Inequality in the Long Run” (with David Stasavage). World Politics Vol. 61 No. 2 (April): 215-53. Online Appendix 2007. “Estimating the Effect of Elite Communications on Public Opinion Using Instrumental Variables” (with Matthew Gabel). American Journal of Political Science Vol. 51 No. 4 (October): 1013-1028. 2007. “Public Finance and Individual Preferences over Globalization Strategies” (with Gordon H. Hanson and Matthew J. Slaughter). Economics and Politics Vol. 19 No. 1 (March): 1-33. 2007. “Mixed Messages: Party Dissent and Mass Opinion on European Integration” (with Matthew Gabel). European Union Politics Vol. 8 No. 1: 37-59. 2006. “The Political Economy of Religion and Social Insurance in the United States, 1910-1939” (with David Stasavage). Studies in American Political Development Vol. 20 (Fall): 132-159. 2006. “Religion and Preferences for Social Insurance” (with David Stasavage). Quarterly Journal of Political Science Vol. 1 No. 3: 255-286. 2006. “Social Identity, Political Speech, and Electoral Competition” (with Eric Dickson). Journal of Theoretical Politics Vol. 18 No. 1: 5-39. 2004. “Economic Insecurity and the Globalization of Production” (with Matthew J. Slaughter). American Journal of Political Science Vol. 48 No. 4 (October): 662-674. Reprinted in David R. Cameron, Gustav Ranis, and Annalisa Zinn (eds.), Globalization and Self-Determination, New York: Routledge, 2006. 2004. “Public Inflation Aversion and the Political Economy of Macroeconomic Policymaking.” International Organization Vol. 58 No. 1 (Winter): 1-34. 2001. “What Determines Individual Trade-Policy Preferences?” (with Matthew J. Slaughter). Journal of International Economics Vol. 54 No. 2 (August): 267-292. Online Appendix 2001. “Analyzing Incomplete Political Science Data: An Alternative Algorithm for Multiple Imputation” (with Gary King, James Honaker, and Anne Joseph). American Political Science Review Vol. 95 No. 1 (March): 49-69. 2001. “Labor Market Competition and Individual Preferences Over Immigration Policy” (with Matthew J. Slaughter). The Review of Economics and Statistics Vol. 83 No. 1 (February): 133-145. 1999. “Electoral Surprise and the Midterm Loss in US Congressional Elections” (with Michael Tomz). British Journal of Political Science Vol. 29 (July): 507-521. 1998. “Interstate Competition and Welfare Policy” (with Mark C. Rom and Paul E. Peterson). Publius: The Journal of Federalism Vol. 28 No. 3 (Summer): 17-37. This article is also published in Sanford F. Schram and Samuel H. Beer (eds.), Welfare Reform: A Race to the Bottom?. Baltimore: Johns Hopkins University Press, 1999, pp. 21-42. 2016. Taxing the Rich: A History of Fiscal Fairness in the United States and Europe (with David Stasavage). 2001. Globalization and the Perceptions of American Workers (with Matthew J. Slaughter). Washington D.C.: Institute for International Economics. Selected Other Publications 2018. “How to Save Globalization” (with Matthew J. Slaughter). Foreign Affairs. November/December, pp. 98-108. 2017. “Wealth Inequality and Democracy” (with David Stasavage). Annual Review of Political Science 20:24.1-24.18. 2013. “Is the Estate Tax Doomed?” (with David Stasavage). New York Times March 24th. 2007. “A New Deal for Globalization” (with Matthew J. Slaughter). Foreign Affairs July/August, pp. 34-47.
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224648911.0/warc/CC-MAIN-20230603000901-20230603030901-00267.warc.gz
CC-MAIN-2023-23
7,311
42
https://markswinkels.nl/category/cloud/page/4/
code
Over 200,000 businesses rely on Veeam® for comprehensive, on-premises data protection. With this new program Veeam and its Veeam Cloud & Service Provider (VCSP) partners provide a simple and cost effective way for customers to try backup and disaster recovery in the Cloud. By using a VCSP, customers can avoid the cost and complexity of building and maintaining an off-site infrastructure while meeting their business and regulatory requirements for off-site backup and disaster recovery. Extend Availability to the Cloud with Veeam Cloud Connect and Veeam partners to ensure your business remains Always-On™! Sometimes it’s realy useful to list all the different VM sizes in Microsoft Azure for one Location, for example ‘West Europe’. You can see for example: the VM size, the number of cores, Memory, Max disk count, OS disk size, Resource disk size, etc. Very powerful to have an overview when choosing the right virtual machine within Microsoft Azure IaaS. ## Login to your subscription using PowerShell ## List all VM sizes in Location 'West Europe' Get-AzureRmVMSize -Location 'West Europe' Together Microsoft Press and Microsoft Virtual Academy have a number of Free eBooks available for download. The latest released eBook is “Enterprise Cloud Strategy” written by Barry Briggs and Eduardo Kassner. Enterprise Cloud Strategy outlines the benefits Enterprises can realize from adoption Microsoft Azure and the Cloud. Based on the authors real world experience they describe the details necessary to answer the most common questions Enterprises have on moving to the cloud. The different download formats for the book are available on the Free eBooks from Microsoft Press page, along with the full catalog of other Free eBooks that have been published. For convenience, I’ve included the file download links below: The following movie shows the power of Storage Spaces Direct in Windows Server 2016. From the local disks, to storage pools and cluster, all the layers are explained!! Very useful when you want to know exactly how Storage Spaces Direct (S2D) works. Software Defined will be the feature! So prepare yourself….. 🙂 Have you missed the Microsoft Ignite 2016 event…..no problem!! MVP Michel de Rooij has created a script to download all the content (videos and slidedecks). So you can watch all the content again. This script will download all the Ignite 2016 slidedecks and videos that are available from Techcommunity via the OneDrive URL on the session page. Video downloads will leverage a utility which can be downloaded from https://yt-dl.org/latest/youtube-dl.exe, and put it in the same folder as the script. The script itself will try to download the utility when the utility is not present. This book assumes that you are familiar with key concepts surrounding Windows Server (i.e., Microsoft Hyper-V, Networking, and Storage) as well as cloud technologies such as Microsoft Azure. In this book, we cover a variety of concepts related to the technology and present scenarios with a customer focus, but it is not intended as a how-to or design manual. You can use other sources, including the online Microsoft resources, to stay up to date with the latest developments on the roles and features of Windows Server 2016. The online resources will also contain the latest how-to procedures and information about designing a Windows Server 2016 infrastructure for your business. This book focuses on providing essential information about the key services of Azure for developers and IT professionals who are new to cloud computing. Detailed, step-by-step demonstrations are included to help the reader understand how to get started with each of the key services. This material is useful not only for those who have no prior experience with Azure, but also for those who need a refresher and those who may be familiar with one area but not others. Each chapter is standalone; there is no requirement that you perform the hands-on demonstrations from previous chapters to understand any particular chapter. Resizing a virtual hard disk in Azure Resource Manager is really easy to do through the Azure Managent Portal. In a few clicks you can extend the virtual hard disk size. Note that the VM should be turned off!! So you need to plan a maintenance window!! You can also extend the virtual hard disk with PowerShell. In this example I’ve extended the data disk from 25 to 30 GB. # Specify the VM $VM = Get-AzureRmVM -ResourceGroupName MSS-DEMO -VMName MSS-DEMO-DC01 # Set the new size of the data disk Set-AzureRmVMDataDisk -VM $VM -Name MSS-DEMO-DC01-20160801-100246 -DiskSizeInGB 30 # View the new size of the data disk(s) # Update the configuration in Azure Update-AzureRmVM -VM $VM -ResourceGroupName MSS-DEMO 1.) Login to the Azure Management Portal 2.) Check the current size of the data disk. In my example 25 GB 3.) Start PowerShell and login to your Azure subscription 4.) Change the data disk to the new value 5.) Update the configuration to Azure 6.) Check the new size of the data disk with PowerShell or within the Azure Management Portal. In my example the new size is 30 GB.
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764499949.24/warc/CC-MAIN-20230201180036-20230201210036-00570.warc.gz
CC-MAIN-2023-06
5,136
33
https://stason.org/TULARC/security/pgp/6-1-What-is-key-signing-PGP.html
code
This article is from the PGP FAQ, by Jeff Licquia [email protected] with numerous contributions by others. OK, you just got a copy of John Smith's public encryption key. How do you know that the key really belongs to John Smith and not to some impostor? The answer to this is key signatures. They are similar to message signatures in that they can't be forged. Let's say that you don't know that you have John Smith's real key. But let's say that you DO have a trusted key from Joe Blow. Let's say that you trust Joe Blow and that he has added his signature to John Smith's key. By inference, you can now trust that you have a valid copy of John Smith's key. That is what key signing is all about. This chain of trust can be carried to several levels, such as A trusts B who trusts C who trusts D, therefore A can trust D. You have control in the PGP configuration file over exactly how many levels this chain of trust is allowed to proceed. Be careful about keys that are several levels removed from your immediate trust.
s3://commoncrawl/crawl-data/CC-MAIN-2021-39/segments/1631780057427.71/warc/CC-MAIN-20210923165408-20210923195408-00711.warc.gz
CC-MAIN-2021-39
1,035
15
https://apps.splunk.com/app/2635/
code
In general there are two methods for installing apps into Splunk: github-modinput folder to Github Commits, the input you just added. Click Add new on that row. name (whatever name you want to give this input) owner (the owner of the Github repository, this is a Github username or org name) repository (the name of the Github repository) token if using a private repository and/or to avoid Github's API limits. To get a Github API token visit the Github settings page and make sure the public_repo scopes are selected. sourcetype=github_commits and you should see some commits indexed, if your repository has a large number of commits indexing them may take a few moments. As a Splunkbase app developer, you will have access to all Splunk development resources and receive a 10GB license to build an app that will help solve use cases for customers all over the world. Splunkbase has 1000+ apps from Splunk, our partners and our community. Find an app for most any data source and user need, or simply create your own with help from our developer portal.
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474715.58/warc/CC-MAIN-20240228112121-20240228142121-00126.warc.gz
CC-MAIN-2024-10
1,055
10
https://forum.audiogames.net/post/394715/karmaplus/adaed4817430c00a6d4ab5748e87d862fa88cea8/
code
I am having some problems playing The Curb Game, on a Windows 10 64-bit computer with Internet Explorer installed. The game loads fine, but for some reason, there are two instances of it running at once, and SAPI does not speak my score afterwords. Does anyone have any suggestions that would help? i had the same problem except for the 2 instances. Try restarting the game, but sapi will still not speak your score, at least didn't for me. Is there a way to make SAPI speak your score?
s3://commoncrawl/crawl-data/CC-MAIN-2019-04/segments/1547583688396.58/warc/CC-MAIN-20190120001524-20190120023524-00476.warc.gz
CC-MAIN-2019-04
486
4
http://www.java-news-center.org/2018/01/16/serverless-computing-with-aws-lambda-part-2-aws-lambda-with-dynamodb/
code
The first half of this article presented an overview of serverless computing with AWS Lambda, including building, deploying, and testing AWS Lambda functions in an example Java application. In Part 2, you’ll learn how to integrate Lambda functions with an external database, in this case DynamoDB. We’ll then use the AWS SDK to invoke Lambda functions from our example Java application. AWS Lambda and DynamoDB DynamoDB is a NoSQL document store that is hosted by Amazon Web Services (AWS). DynamoDB defines data abstractions as tables, which accept common database operations such as insert, retrieve, query, update, and delete. As with many other NoSQL databases, DynamoDB’s schema isn’t fixed, so some items in the same table can have fields that others do not. Source: New feed
s3://commoncrawl/crawl-data/CC-MAIN-2018-34/segments/1534221217901.91/warc/CC-MAIN-20180820234831-20180821014831-00465.warc.gz
CC-MAIN-2018-34
789
4
https://data.stackexchange.com/languagelearning/query/7709/find-my-fans
code
Find the users who have marked my questions as favorites. Q&A for students, teachers, polyglots, and anyone interested in the techniques of second-language acquisition -- Fan Finder -- Find the users who have marked my questions as favorites. declare @UserId int = ##UserId## select top 200 v.UserId as [User Link], count(*) as FavoriteCount from Votes v join Posts p on p.id = v.PostId where p.OwnerUserId = @UserId and v.VoteTypeId = 5 group by v.UserId order by FavoriteCount desc
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100227.61/warc/CC-MAIN-20231130130218-20231130160218-00124.warc.gz
CC-MAIN-2023-50
483
12
https://www.alibabacloud.com/help/doc-detail/174794.htm
code
You can create a node pool that supports confidential computing in an Alibaba Cloud Container Service for Kubernetes (ACK) cluster. This creates trusted execution environments (TEEs) to store code and sensitive data in your clusters. This way, you can protect your code and data from being sniffed and compromised. This topic describes how to create a node pool that supports confidential computing. - A managed ACK cluster is created. For more information, see Create a managed ACK cluster. The created cluster must meet the following requirements: - The network plug-in is Flannel. - The container runtime must be Docker. - The cluster must be deployed in a region where ECS Bare Metal Instances of ecs.ebmhfg5.2xlarge are available for purchase. - Log on to the ACK console. - Create a node pool that supports confidential computing. - In the left-side navigation pane, choose Node Pools in the Actions column. . Find the target cluster, click - In the left-side navigation pane, choose Node Pools page, select the target cluster from the Cluster drop-down list. . On the - In the upper-right corner of the Node Pools page, click Create Node Pool. - On the Create Node Pool page, configure the node pool.For more information, see Create a managed ACK cluster. The following table lists the required parameters of a confidential computing node pool. Parameter Description Confidential Computing Enable encrypted computing. Container Runtime You must select Docker. Auto Scaling Select whether to enable Auto Scaling (ESS). If you enable ESS, the node pool automatically scales based on the resource consumption. Instance Type Select ECS Bare Metal Instance and select ecs.ebmhfg5.2xlarge as the instance type.Note You can select multiple instance types. Only the ecs.ebmhfg5.2xlarge instance type supports confidential computing. If the stock of ecs.ebmhfg5.2xlarge instances is insufficient, you can select another instance type. However, the node pool will not support confidential computing. Quantity Specify the initial number of nodes in the node pool. If you do not need to create nodes in the node pool, set this parameter to 0. Operating System You can select only the Aliyun Linux operating system. Node Label You can add labels to nodes in the node pool. ECS Label You can attach labels to the selected ECS instances. - Click OK.On the Node Pools page, if the status of the node pool displays Initializing, this indicates that the node pool creation is in progress.In the left-side navigation pane of the ACK console, choose View Logs in the Actions column. On the Log Information page of the target cluster, you can view the logs of the newly created node pool that supports confidential computing.After the cluster is scaled out, the . Find the target cluster and click status of the node pool changes to Active.
s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600402132335.99/warc/CC-MAIN-20201001210429-20201002000429-00622.warc.gz
CC-MAIN-2020-40
2,826
13
https://www.vn.freelancer.com/projects/python/smart-home-project/
code
a research based project on a smart home system that controls the temperature via the use of windows, heating and cooling system. I require the implementation stage of such project including, wiring, diagrams, pictures, coding, flowchart and requirements include: Raspberry PI, Relay, Windows activator, breadboard, Temperature sensor DS18B20, wireless module NRF24LO1 and a 2.4ghz wireless receiver. also the program has to be on python and testing to be done. 20 freelancer đang chào giá trung bình £197 cho công việc này Hello, i'm interested in your project as a Rpi enthusiast . I have the experience and skills on Rpi, linux, python, GPIO ,electronic, ... I'm available to discuss about it if you agree : Regards. Zak yes buddy,its me imad, already did a lot of projects like this, u will get the best work accompanied with brotherhood,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, I DO NOT OUTSOURCE I have been a freelancer for the past 8 years, I believe that my experience and skill in this background will prove to be of great help to you. Contact me to discuss more on the details Hi, we could use a very very good opensource project that will give u the option to use maps, android, amazon echo , check all devices and see charts , get alarms , etc.. With over 5+ years in python programing & development experience, i have completed lots of Python project .i can design, develop and fix errors. My skills include ARM, AVR, PIC, C8051, FPGA, DSP, Python, ...
s3://commoncrawl/crawl-data/CC-MAIN-2019-22/segments/1558232255773.51/warc/CC-MAIN-20190520061847-20190520083847-00312.warc.gz
CC-MAIN-2019-22
1,470
7
https://findremote.work/remote-jobs/Product-Security-Engineer-Static-Code-Analysis-Support-Github-22108-152359
code
Posted Apr 19 GitHub is changing the way the world builds security software and we want you to help change the way we secure GitHub. We're looking for engineers to support our internal Code Analysis team. The Code Analysis team is part of GitHub's internal Product Security Engineering org and is responsible for keeping GitHub secure by driving the adoption of GitHub Advanced Security features -- CodeQL, secret scanning and Dependabot -- and our custom security tools internally at GitHub. Our aim is for our automated tools to be a joy for GitHub engineers to use and this role is a key part of making that possible. We're looking for candidates with a passion for security to support our engineering teams with the adoption of security tools. You will be a point of contact for engineering teams within GitHub to answer questions about the tools. You'll also be helping engineers to understand the findings from the tools, the underlying root cause and suggest potential fixes to engineers. Your customers will be other engineers here at Github, diving into their codebases. You'll also be responsible for summarizing engineer feedback and sharing that internally with Github's security products team to improve these features for our customers and the opensource community. You will be a member of the Code Analysis team, which builds and maintains internal tools to track vulnerabilities found via our static analysis tools as well as the public bug bounty program, internal Red Team operations and internal code review. This is the cornerstone of how we track vulnerabilities from discovery to remediation across the whole company. In addition to supporting our engineers outside of the security organization who use these tools, you'll also be working with other security teams such as the bug bounty, code review and red teams to ensure that their needs are met. Your responsibilities will include: A bonus if you have: (Colorado only) Minimum salary of 85,700 to maximum 179,000 + bonus + equity + benefits. Note: Disclosure as required by sb19-085 (8-5-20) of the minimum salary compensation for this role when being hired in Colorado. Who We Are: GitHub is the developer company. We make it easier for developers to be developers: to work together, to solve challenging problems, and to create the world’s most important technologies. We foster a collaborative community that can come togetheras individuals and in teamsto create the future of software and make a difference in the world. Customer Obsessed - Trust by Default - Ship to Learn - Own the Outcome - Growth Mindset - Global Product, Global Team - Anything is Possible - Practice Kindness Why You Should Join: At GitHub, we constantly strive to create an environment that allows our employees (Hubbers) to do the best work of their lives. We've designed one of the coolest workspaces in San Francisco (HQ), where many Hubbers work, snack, and create daily. The rest of our Hubbers work remotely around the globe. We are also committed to keeping Hubbers healthy, motivated, focused and creative. We've designed our top-notch benefits program with these goals in mind. In a nutshell, we've built a place where we truly love working, we think you will too. GitHub is made up of people from a wide variety of backgrounds and lifestyles. We embrace diversity and invite applications from people of all walks of life. We don't discriminate against employees or applicants based on gender identity or expression, sexual orientation, race, religion, age, national origin, citizenship, disability, pregnancy status, veteran status, or any other differences. Also, if you have a disability, please let us know if there's any way we can make the interview process better for you; we're happy to accommodate! Please note that benefits vary by country. If you have any questions, please don't hesitate to ask your Talent Partner. Remote Mix: 100% Remote Job Type: Full-Time Regional Restrictions: North America Only
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662543797.61/warc/CC-MAIN-20220522032543-20220522062543-00217.warc.gz
CC-MAIN-2022-21
3,979
20
https://net-informations.com/python/iq/multi.htm
code
Multithreading vs Multiprocessing | Python Multithreading and multiprocessing are both techniques to achieve parallelism in Python, but they have key differences in terms of execution, memory usage, and use cases. Multithreading in Python Multithreading involves running multiple threads within the same process. Threads share the same memory space, which means they can communicate more easily. However, Python's Global Interpreter Lock (GIL) allows only one thread to execute Python bytecode at a time, limiting the true parallel execution of CPU-bound tasks. Multiprocessing in Python Multiprocessing involves running multiple processes, each with its own memory space. This allows true parallel execution of CPU-bound tasks since the GIL doesn't apply to separate processes. However, inter-process communication can be more complex. Multithreading and multiprocessing are parallel execution techniques in Python with distinct characteristics. Multithreading involves running multiple threads within the same process, suitable for I/O-bound tasks, while multiprocessing runs separate processes with their own memory, ideal for CPU-bound tasks due to true parallelism and avoiding the GIL.
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100551.17/warc/CC-MAIN-20231205105136-20231205135136-00695.warc.gz
CC-MAIN-2023-50
1,191
7
https://mail.scipy.org/pipermail/scipy-user/2010-February/024225.html
code
[SciPy-User] How to fit data with errorbars Tue Feb 16 13:04:33 CST 2010 I'm not sure about scipy, but please have a look at paida. It's a pure python package that implements what you want. That's usually a decent package to have in your toolkit if you're doing data Hope that helps, On Tue, Feb 16, 2010 at 6:08 PM, Jeremy Conlin <[email protected]> wrote: > I have some data with some errobars that I need to fit to a line. Is > there anyway to use scipy.polyfit with the error associated with the > data? If not, how can I make a fit routine work with my data? > SciPy-User mailing list -------------- next part -------------- An HTML attachment was scrubbed... More information about the SciPy-User
s3://commoncrawl/crawl-data/CC-MAIN-2017-39/segments/1505818685912.14/warc/CC-MAIN-20170919164651-20170919184651-00386.warc.gz
CC-MAIN-2017-39
702
14
https://success.myshn.net/Skyhigh_Secure_Web_Gateway_(On_Prem)/Content_Security_Reporter_(CSR)/About_Content_Security_Reporter
code
Skyhigh Content Security Reporter (CSR, formerly: McAfee Content Security Reporter) is a reporting software solution that helps you identify and analyze a broad range of data collected from your network device. Once identified you can use the information to improve the web policy that you have implemented to ensure your network is protected against web threats. Documentation is provided here for Content Security Reporter, including an Installation Guide, Quick Start Guide, Product Guide, Interface Reference Guide, and Release Notes, see Content Security Reporter Documents. The documents are provided in PDF format. They refer to version 2.9. For some of this documentation, subject matter has changed or additions have been made to it, see Changes and Additions to the Content Security Reporter documentation Provided in PDF Format.
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571222.74/warc/CC-MAIN-20220810222056-20220811012056-00375.warc.gz
CC-MAIN-2022-33
839
4
http://trustus.org/touch/index.php
code
June 14th through "Trustus Theatre was the first in Columbia to produce this show in 1987, and we happily bring a newly imagined production back to the Capital City this summer. Sometimes sassy, sometimes su... (more information) 520 Lady Street, Columbia, SC 29201 (Google Map) Reservations (803) 254-9732 Box office hours are 1:00 PM to 6:00 PM, Tues through Sat. Box Office Manager - [email protected] Business Manager - [email protected]
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368700795821/warc/CC-MAIN-20130516103955-00004-ip-10-60-113-184.ec2.internal.warc.gz
CC-MAIN-2013-20
454
7
https://www.einsteinseyes.com/blog/author/mark-price
code
File Formats When streaming videos over the Internet you must decide to encode your videos in either MP4 or FLV formats. Most servers and players support both file formats. I personally recommend using MP4 because you get DVD quality videos at a much smaller file size. It also uses less CPU on client machines and it works on mobile phones. The downside to MP4 is that the videos will take longer to load than an FLV video. FFMPEG is a great free and very powerful encoder, but can be somewhat difficult to learn. It supports many popular video formats and has many options to configure. Bitrate is probably the most important factor in determining the quality and file size of your video. If your video contains lots of action and motion it will need to have a higher bitrate. Youtube encodes their normal videos at a bitrate of 200kbps and their high quality videos at 900kbps. Be wise in picking a bitrate because the higher it is the more likely users will experience streaming problems. Many of you SEO fanatics may have realized that CodeIgniter is not very SEO-friendly out of the box. It auto generates URLs based on routes which are made up of a controller name and method name. For URLs to be considered SEO-friendly and be universally recognized by search engines, keywords must be separated by a dash. Many of you are thinking you will just go rename your controllers and methods with dashes. That would be nice and easy, but this is not a legal syntax and PHP will throw errors. There is the option to manually enter each route in your routes.php file, but this could be a serious beat down and come back to haunt you later on down the road. Document Type Definitions (DTD), also known as DOCTYPES, are markup declarations of web standards designed to increase cross-browser compatibility. Unfortunately, there are many options to choose from and very few details on the web of what exactly they do and how they differ. As you may have noticed, most DTDs reference the website w3.org (W3Schools). This is because W3Schools is backed by a large community and is considered to lead the web development industry and define its standards.
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233511406.34/warc/CC-MAIN-20231004184208-20231004214208-00037.warc.gz
CC-MAIN-2023-40
2,148
3
https://www.graceandmabel.co.uk/clothing/dresses/vivian-dress-super-lemon.html
code
Vivian Dress - Super Lemon The Vivian dress from Custommade is designed in a yellow and monchrome python printed jacquard viscose. • Round neckline • Front button fastening and keyhole opening • Black trim edging • Side concealed zip fastening • Front inverted pleat detailing • Designer Name: Vivian • Designer Colour: Super Lemon • 100% Viscose • Hand Wash If for some reason you are not completely satisfied with your purchase, please contact us within 7 days of receipt of goods at [email protected] or on +44 (0)1225 461274, to request a Returns Authorisation Number (RAN). This number will be required for exchange or return of goods and we are unable to accept returns or exchanges without this number. Please return the item/items to us in their original condition within 14 days of receipt.
s3://commoncrawl/crawl-data/CC-MAIN-2019-47/segments/1573496669967.80/warc/CC-MAIN-20191119015704-20191119043704-00301.warc.gz
CC-MAIN-2019-47
830
13
https://inbox.zendesk.com/hc/en-us/articles/115006093588-Resetting-your-account-password
code
Team members can reset their own account passwords. At this time, it is not possible for admins to reset the passwords of other team members, but if you or another member of your account are unable to log in and cannot remember the password, they can go to https://yoursubdomain.zendesk.com/access/help to set one, followed by https://yoursubdomain.zendesk.com/access/normal to log in. To reset your password - Click the Menu icon (), then click your name to open up your profile. - Click Password. - Enter your current password, followed by your new password. - Click Save.
s3://commoncrawl/crawl-data/CC-MAIN-2020-10/segments/1581875145621.28/warc/CC-MAIN-20200221233354-20200222023354-00445.warc.gz
CC-MAIN-2020-10
574
6
https://andrewbwatt.com/2010/01/26/festivus-part-ii/
code
It happened to me at breakfast, as well. Kid grabs my ear, starts pulling. I grab his wrist, bend it up and behind him, and squeeze. “Do not lay hands on an adult. Do not start fights. You don’t know where a fight will take you, but usually it’s to bad and painful places.” Like, you know, prison. Why the heck does this keep happening to me?
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652663016853.88/warc/CC-MAIN-20220528123744-20220528153744-00053.warc.gz
CC-MAIN-2022-21
350
4
https://docs.solidaffiliate.com/data-export/
code
This addon adds a Data Export tool that allows you to export your Solid Affiliate data. All your core resources, including Affiliates, Referrals, Visits, Payouts, and Creatives will download to a CSV. There are no settings for this addon and it is enabled by default. You can find the tool in the Solid Affiliate menu as “Data Export”. The tool will show you how many records of each resource and what columns will be downloaded. In the future, we expect that export functionality will expand to allow filtering, more computed columns, etc.
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474660.32/warc/CC-MAIN-20240226130305-20240226160305-00223.warc.gz
CC-MAIN-2024-10
544
3
https://www.coh2.org/topic/94292/what-do-people-think-of-conscripts-after-the-patch/page/8
code
so do we just ignore the cost increase for teching ? Quite frankly... Yes. It's included in the teching whether you use it or not. But if you use your infantry they will become complete as you play. You can't quantify how much of the tech is allocated to each bit. Even right now, bp1 gives lmg, rifle nade and panzer grens. As well as part access to a new tier. How do you decide how much is split into each? How much of bp1 pays for panzergren access? Does any? Since it wasn't changed in price when they were MO Ed to t0? How much does the RG cost of that battle phase? Nobody knows because it's not disclosed. Or more likely it doesn't have a value. I doubt that if for some reason the rifle nade was removed that tech cost would change at all. It's a bonus that is timed behind teching rather than an ability that costs like teching. If that makes sense.... The fact of the matter is we CAN quantify the conscript upgrades because they do nothing but things for cons. The price of the upgrade is a direct increase on the cost of conscripts as they only benifit them. Most other sidegrades effect multiple squads in the core army, like weapon racks, or bolster (brit grenade tech being an outlier, meaning YES getting grenades on Tommies increased the amount paid per squad indirectly, since it has no other value elsewhere)
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593655878639.9/warc/CC-MAIN-20200702080623-20200702110623-00538.warc.gz
CC-MAIN-2020-29
1,328
4
https://reinvent-demo.awsevents.com/learn/bug-bust/
code
Log in to the attendee portal to plan your time onsite in Las Vegas. Join us online for keynotes, leadership sessions, and exclusive virtual content.Register now Content from Monday, Nov. 29 at re:Invent 2021 will be shared on demand. Please check the agenda for the latest information and stay tuned for futher updates.View agenda re:Invent 2021 is here! Register now to get free access to keynotes, leadership sessions, and much more.Register for virtual re:Invent Tickets for in-person re:Invent 2021 are now sold out. Register for virtual re:Invent to watch keynotes, leadership sessions, and breakout sessions for free.Register for virtual re:Invent Reserved seating is now open for registered attendees. Log in to the attendee portal and reserve your seat at your favorite sessions.Log in Review our updated COVID-19 vaccination requirements for attending re:Invent in Las Vegas.Learn more The AWS BugBust re:Invent Challenge runs from November 29, 10:00 AM (PST), to December 2, 2:00 PM (PST). Within this time frame, registered participants across the globe participating virtually, or onsite at the BugBust Hub in the re:Invent Expo, can compete to fix as many bugs as possible or improve the performance of a profiling group. Participants receive points based on the complexity of each bug that they fix. The more bugs they fix, the more points they gain and the higher they will climb up the leaderboard. The live leaderboard tracks each participant’s progress and showcases the number of bugs fixed and points received. Follow these step-by-step instructions to get started: Looking to host an AWS BugBust event for your organization? Join BugBust sessions to hear tips and tricks for hosting your AWS BugBust event. Also, hear tips for winning the BugBust re:Invent Challenge, get a sneak peek into the machine learning technology that powers the BugBust platform, and learn how you can help your dev teams improve their bug-fixing skills. While code reviews and bug bashes are common practices, teams are constantly looking for innovative and automated practices to fix bugs. In this session, discover how you can leverage AWS BugBust—the world’s first global competition for developers to collectively fix one million software bugs—to eliminate software errors and save millions of dollars for your organization. It's game on for developers and game over for bugs. Calling all Java and Python developers! This builders’ session provides developers of all skill levels an opportunity to get hands-on experience with AWS BugBust. Learn how you can implement an easy and fun solution to transform your bug bashes into an exciting team-building opportunity. Discover how to add friendly competition to improving your code quality and application performance. In addition, get a behind-the-scenes look into the underlying architecture of AWS BugBust using Amazon CodeGuru and how it leverages machine learning and automated reasoning to find bugs in your applications. You might have participated in a bug bash before. Many software companies run them in the weeks prior to launching a new product or feature. In this chalk talk, learn tips and tricks for organizing a successful bug bash for your organization. Discover best practices for getting the right set of stakeholders involved, helping your developers sharpen their coding skills, and helping your organization improve code quality. Join the mission to exterminate one million bugs! In this chalk talk, explore how you can empower your developers to discover and provide improvements in a short time while fostering team building and collaboration. Learn how you can go head-to-head with your teammates in your own private AWS BugBust events with built-in leaderboards, challenges, and rewards. Enable your team to recognize and celebrate their achievements. Visit our dedicated AWS BugBust page to find out more about AWS BugBust. To participate in the AWS BugBust re:Invent Challenge, create your BugBust profile and register for the event. The AWS BugBust re:Invent Challenge starts at 10:00 AM (PST) on Nov. 29 and ends at 2:00 PM (PST) on Dec. 2. No. All developers, whether registered virtually or attending in person, can participate in the BugBust challenge. You do not need to know how to use Amazon CodeGuru. To participate in the AWS BugBust, all you need are Java and Python coding skills.
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662577259.70/warc/CC-MAIN-20220524203438-20220524233438-00086.warc.gz
CC-MAIN-2022-21
4,382
19
https://www.entercoms.com/careers/principal-consultant-data-engineer
code
Entercoms empowers companies to accelerate value from their service supply chain. Leveraging advanced technologies such as Artificial Intelligence and Machine Learning, Entercoms delivers the ability to maximize revenue and drive greater control over business outcomes. As a digital technology and services company, Entercoms achieves true transformation of the service chain through business-driven Intellectual Property, advanced analytics, domain expertise, operations support services and cross-industry best practices. 8 to 12 years - Advanced level SQL and experience with data modelling in SQL. Exposure to PostgreSQL, MS SQL databases would be a plus. - Experience in building complex data pipelines, architectures, must have demonstrated expertise in building and optimizing data pipelines in minimum 2 projects. - Experience with any ETL like Talend/Open source. Exposure to BI tools would be a plus. - Hands on experience with python scripting and object-oriented programming. - Hands on experience with Procedures, Functions and complex queries. - Strong hold on Data migration and data warehousing concepts. - Self-starter who can come up with ideas to implement and optimize complex data pipelines. - Hands on experience with GIT, version controlling data and SQL. - Basic understanding of data science, data analysis and data anomalies identification. - Open to learning cross functional skills and sharing knowledge. - Good Communication skills. - Bachelor’s degree in any discipline. - Work with team of data scientists and subject matter expert. - Understand project requirements and build data pipelines. - Data ingestion, cleaning, versioning and modeling in SQL. - Work with database systems, APIs, ETL tools. - Work on optimizing already existing data pipelines and databases. - Implement streaming services or message queue using open source tools. - Build and maintain clean data warehouses. - Maintain documentation of data pipelines. - Troubleshoot data issues. - Improve data reliability, efficiency and quality by ensuring that data architecture in place supports data scientist and business stakeholders needs. - Collaborate with SME and data scientist in building python packages. Entercoms is committed to creating a diverse environment and is proud to be an equal opportunity employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, gender, gender identity or expression, sexual orientation, national origin, genetics, disability, age, or veteran status. Entercoms is also committed to compliance with all fair employment practices regarding citizenship and immigration status.
s3://commoncrawl/crawl-data/CC-MAIN-2021-17/segments/1618038879374.66/warc/CC-MAIN-20210419111510-20210419141510-00082.warc.gz
CC-MAIN-2021-17
2,672
26
https://skillsmatter.com/meetups/13752-rust-nigeria-ama
code
This AMA on the Rust ecosystem is a collaborative event between Rust Nigeria and Concordium Africa. The AMA will feature a panel with special guests from the across the Rust Ecosystem. We’ll be exploring the exciting ways in which Rust is being used for the Web, blockchain, embedded systems and its interoperability with other programming languages. Submit any questions you might have on the topics above here See you there Rustaceans 🦀 How viable is Rust for embedded software Rust solves many problems that typically plague embedded software written in c. This talk approaches the subject from the perspective of someone who spends most of their professional time working with managed languages like c#.net, java and python but who likes to write embedded software. It highlights the dangers of memory corruption in embedded software and explains how Rust solves this. The talk also introduces some features of Rust that allow you to simplify the design of your software like using async await, giving real world examples. David works in the investment banking industry as a senior developer and enjoys making embedded software in Rust in his free time The use of Rust at Concordium Ernest is the organizer of the Rust London Meetup Group. 🦀 Rust in a UniFFIed world How do you write Rust and then build an API for Swift/Kotlin/Python on top? It's a lot of work doing that manually. Computers are much better at doing that repetitive work, so we built UniFFI to do this task. Let's quickly explore how that works and why we so heavily rely on that at Mozilla. Istvan "Flaki" Szmozsanszky Web Developer turned DevRel turned Very Tired Open Source Person and others will be coming!Log in to see who else is coming
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224656675.90/warc/CC-MAIN-20230609100535-20230609130535-00658.warc.gz
CC-MAIN-2023-23
1,723
15
https://www.k6plus.com/phpBB3/viewtopic.php?f=1&t=1685&sid=d2b78110148e422bfd0e07416d973733
code
Sorry I haven't been here much, but between a really funky job market, and now having a Royal Majesty Prince V, time's been a bit lacking! Well, onto the questions: I've got two SDRAM chips I can't quite identify. They're definitely older units. I've been using Everest Home Edition v2.20, and if you go to Motherboard -> SPD, it'll list the RAM modules installed, and give you quite a bit of information, most importantly to my question Memory Timings. I'm using a P2-266 as my test-mule, and have thus gleaned quite a bit of info about some old DIMMs that I have (including a 4-chip, single-sided 32MB piece that's brutally fast at 100MHz . . runs 2-2-2-5, which I didn't think such small modules were available at). Anyway, there are two DIMMS I have that Everest can't identify. One of them is lacking that little SPD chip, though strangely, the other one has one, but Everest still simply won't list it at all. So, what I'm wondering is, does anyone know, or is there any free software out there, that will tell me what memory timings these two DIMMs will run trouble-free at a given FSB? The one without the SPD chip has NEC chips, 32MB total, 16 chips (8 on each side), with the following markings: Code: Select all NEC JAPAN D4516821AG5 -A10-7JF 9805AY007 There are also 2 stickers on it, each of which fits onto a single one of the chips, one of which reads: and the other: The second DIMM I think is a PC66 unit, though I've come across references stating that some PC66 modules will perform better than some PC100's. This is the one that has an SPD chip on it, but Everest acts as if it doesn't. It's also a 16-chip unit (8 chips on each side), and 32MB. Anyway, the chips on this one read: Code: Select all KOREA C206 9819 FFF0 HM5216805TT10H Void if Removed and the second of which spans 4 of the chips and reads: (a UPC bar code, with the following numbers under it: 0 75028 00000 4) Also printed on the corner directly on the module is: ASSY IN USA I've done quite a bit of searching on Google, but it's been mostly fruitless, other than that the former has NEC chips (duh) and is PC100, the latter has Hitachi chips (most likely), and is probably PC66. Anyone have access to datasheets, or know where I can get software that will definitely identify the SPD-equipped one? I tried searching Hitachi's and NEC's websites to no avail. My goal is really to find out what the ideal timings are at a given FSB.
s3://commoncrawl/crawl-data/CC-MAIN-2021-25/segments/1623487636559.57/warc/CC-MAIN-20210618104405-20210618134405-00015.warc.gz
CC-MAIN-2021-25
2,420
22
http://cyn.in/home/cyn.in-users/wiki-basics-cyn-in
code
A Wiki is a set of pages editable by collaborators in your space. Using a wiki is almost as natural as using a blackboard in real time. No special knowledge of HTML is needed. Every page in a wiki can be amended, edited, or even deleted by anyone with a web browser. From a user's perspective, the mechanics are simple. Typically each wiki page in cyn.in, will have a set of links to: - Switch from the View mode to an Edit mode - Show the revision history of the current page - indicating the changes made to the wiki - Add categories to make the wiki page more search-able - Add Related Content to the wiki page - Attach files to wiki pages - Jump to the wiki's home page (This is the wiki home page) - Search the full text of all pages in the wiki Wikis, due to their simplicity and flexible nature, can be easily used for applications like documentation, reporting, information management systems, project management, glossaries, dictionaries. Wikis facilitate collaborative creation, finding, shaping and sharing of knowledge. Start structuring your Wiki: To start with, the Wiki home page is a place where people first land and get an idea of the goal of the wiki, what are you trying to achieve and how you are going to put the information together in the wiki itself. This helps as people know what they are expected to do here. Editing a Wiki Page It's the Edit link that makes a wiki special. Click on that and you'll see the core content of the current page redisplayed in your browser, but now it's inside an editable rich text WYSIWYG editor. Follow the steps below to create an index page with a list of links to other pages. As you outline the main hierarchy of pages in this wiki, it will act as a navigation for yourself and others: - Click on the "Edit" link in the Blue bar above to start this wiki home page - Simply delete the content here, add your own title, description and content - The WYSIWYG editor lets you create stylized wiki documents Creating Wiki PagesWikis make hyperlinking easy, and they enforce link integrity. As each user cross-references his or her contribution with other pages, you can get an expanding "cloud" of pages. Wiki pages in cyn.in can be created in the following ways: Using Wiki Linking Wiki Linking allows you to create pages simply by putting [ [ double square-brackets ] ] around a word or phrase making it the title of the new page. The wiki link appears with a + sign next to it, indicating that such a page doesn't exist yet and collaborators in this space can create that page by clicking on it. Once you click on the link, a new page will be created with the title as mentioned between the double square brackets. Using the "Add" interface The Green Add Button in the blue actions bar above, allows you to add wiki pages, without linking to them from within the content of the wiki page. These are the steps involved: - Click on the Green Add Button and select Wiki Page - Add a Title and Description for the new wiki page you want to create - Save the wiki page and once done, click on Edit to start writing on the wiki page View all pages of the wiki You can view all the pages of the wiki in the Contents tab on the wiki home. From any page in the wiki, click on the wiki home page in the navigation on the left. Once on the home, click on the Contents tab in the blue actions bar and you will get a tabular view of all the pages in the wiki. Here, you can bulk manage the wiki pages like change workflow states, copy, move or delete. Adding metadata to the wiki pages Some additional features help make the cyn.in wiki more interesting and useful. A category in cyn.in is nothing but a tag, that can be pre-defined during the information architecture of the entire system or can be added by the user who creates the wiki page. The categories are displayed at the bottom of every page and make the content more searchable. The combination of folksonmony and taxonomy make the categorization in cyn.in unique and very useful. To add a category to a wiki page, simply edit the wiki page and go to the categories section. Here, you can choose from a set of categories defined by other users or create your own, by typing them in the New Categories block. Adding Related Content Any content in the cyn.in site can be linked with the wiki page to show other related blogs posts, images or files.
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917121644.94/warc/CC-MAIN-20170423031201-00365-ip-10-145-167-34.ec2.internal.warc.gz
CC-MAIN-2017-17
4,356
36
http://laela2.tripod.com/jpiano.html
code
Wai-Man Wong's Java Piano 1.1 This is an interactive electronic piano written in Java. To play, click on piano keys, Drum or Demo. To record, click Rec, click piano keys, then click Ply to re-play. It takes a little while to download the applet (about 210K bytes). (After you hear 21 music notes, my Java Piano will appear.) Send comments to author via e-mail. Click here to see license information. ©Copyright Wai-Man Wong. 1997.
s3://commoncrawl/crawl-data/CC-MAIN-2019-26/segments/1560627998882.88/warc/CC-MAIN-20190619023613-20190619045613-00136.warc.gz
CC-MAIN-2019-26
431
9
https://help.lumensoft.biz/knowledgebase/applying-various-methods-of-price-change/
code
Once you have loaded products in the grid, you have the option to change retail price in a number of ways: From Action drop down menu, select the action: Percentage of Retail Price: If you want to increase or decrease price of a product by a certain percentage of retail price, select this option. To increase price: Enter percentage of increase plus hundred in the value field. For example, if the price of a product is 2600 and you want to increase it by 10 percent of the retail price, enter 110 in the Value field and the new price will become 2860 To decrease price: Subtract the percentage you want to decrease the price by from 100 and enter in the value field. For example, if you want decrease price by 5 percent, you will enter 95 in the value field. Percentage of Cost price: Similarly, if you want to change price by a certain percentage of the cost price, select this option. For e.g., if the cost price is 500 and in the value field you enter 120, the new price will show a 20 percent increase in the old cost price. And if you enter 80 in the value field, the price will decrease by 20 percent of the cost price. Flat Increase: If you want to increase price of a product by a certain amount, enter the amount in Value field. For example, if the price of a product is 30 rupees and you want to make it 50, entering 20 in the value field will increase the price by 20 rupees. Flat Decrease: Similarly, to decrease the price of a product by a certain amount, select this ‘Action’ and enter amount in the value field.
s3://commoncrawl/crawl-data/CC-MAIN-2019-51/segments/1575541317967.94/warc/CC-MAIN-20191216041840-20191216065840-00539.warc.gz
CC-MAIN-2019-51
1,532
9
https://www.jjmasse.com/2017/07/07/bullet-proof-your-technology-stack-with-graphql/
code
It has taken a little time for technology like GraphQL to settle in. I find myself in conversations with folks about the use of GraphQL and whether or not it makes sense to use for their project. Maybe GraphQL is good for you, perhaps it is too soon - but by reading this post you should have an idea as to whether or not it is a good time to consider it. This post is from the perspective of an architect. Architects work from the high-level overview of a system rather than the specifics of its parts. GraphQL and orchestration technology is a tool for architects to consider. Micro-services and component-based architecture teach us that when we build systems and software, keeping things decoupled and somewhat abstracted leaves systems easier to maintain, extend or otherwise replace in parts ( cheaper and incremental ). One of the most common examples of this type of abstraction in life is the power outlet in a wall. From our perspective, we simply plug the lamp into the wall, but the "how the power gets there" is of no concern to us nor the lamp. As long as the lamp abides by the service level agreement while transacting with the wall socket, it will always behave as expected no matter where in the country we happen to plug it in. Traveling to other countries, however, things get a bit more interesting but for the sake of this example let's leave it at that. Engineering a system to be dismantled, to be portable and cheaply replaced is an ideal state to be in because upgraded and easy to maintain systems are more secure, reliable and typically performant platforms. For a technology company fast, maintainable and secure systems translate into improved bottom line through reduced labor investment and decreased time to market competitive advantage. Using abstraction strategically protects larger technology ecosystems from one another. GraphQL, or technology like it, fits in this space by providing means of communication between services using a common language to express data demand while encapsulating away the complexity of understanding where the data is sourced. GraphQL and orchestration would be the outlet in our lamp example. But why, why do we need abstraction from services? Perhaps "why" is not the right question to ask but "when". "When" because the system may be quite simple and not require any abstraction. We see this in the authoring of code all of the time. Engineers need to consider whether or not to use third party code outright or wrap the thing in a way that protects their software from being affected by any change that could occur. In addition, this abstraction would aid in being able to make a different decision in the future while incurring far less technical debt in doing so. But there are times when it makes no sense to do so. And we need to guard against this. Speaking against adoption for adoption sake. What about REST REST has done just a fine job at providing a simple language for software or services to request information from one another. The limitation with REST is that each service that cares to communicate with the other requires that they know the address, the interface of that service and the data it provides. For small semi-trivial systems, REST is just fine. For maturing businesses over time what we find is that services need to iterate to keep up with the increasing demands. Perhaps new features and data need to come about for a new set of features. Maybe testing new sources of information start to become interesting. Or a system is faced with a performance issue it would like to solve by decoupling various processes. This need for iteration on how content is served is critical for a business to stay fast as they work to learn and solve problems. Though changing and improving services that are communicating with each other is not the problem but it is the connections between services that begin to break down and create complexity. Take for example figure 1: Figure 1 represents the formal pattern of GET'ing content from various RESTful services. There is an underlying complexity that also exists here and that is that each application requesting information also needs to deal with connecting to and aggregating the responses from each service. The complexity around communicating with services The problem with any type of communication between services is inconsistency. Considering to connect with any service requires that we also think about these error scenarios in the cases where we may go offline, or if the service for one reason or another becomes unavailable. Engineers need to consider these possibilities for each service or request they are intending to make. Knowing the when Earlier I mentioned introducing technology like GraphQL is a question of when - it is perfectly fine to go out and roll your own solution, but it is important to learn how other engineers have solved these problems as well. You have multiple clients between services. Have a complex or unorganized data set that could lend itself well to being graphed. Have faced expensive API migrations in your business, or could potentially have the risk of one. You plan to iterate on content sources. For example, for the first quarter, you wish to fetch information about the weather from one source and find out in the second quarter that there is a better source out there that you would like to use instead. So how does technology solutions like GraphQL help us? I am picking on GraphQL a lot in this post because it was the first solution I had seen that had unlocked this type of thinking for me. Though I had considered other options take Netflix's Falcor project for instance, something about representing requests with a query language made sense to me. Without getting too far down the road, the query language allows us to care less about the structure of the source of information and more about the information we actually care about. Figure 2 illustrates what tends to happen when a new service comes online with a new address. In this simple example, we show how all connected clients are now responsible for making the appropriate updates to their code, regressing and redeploying to keep the business humming along. What's more is that we now have a service to take down once the connected clients have done their job of migrating away. For larger teams and companies with large suites of software in their arsenal, these changes are difficult and very expensive to get done. I have seen organizations take entire quarters getting this right. In the worst cases, legacy platforms are left behind still calling the older services forcing the company and departments to keep their legacy around for longer than they could have if they had some level of abstraction. Figure 3 shows us where we can think of libraries like GraphQL sit in our technology stack. GraphQL is a wedge between software. It sits as an interface to connect with various services in a predictable and practical way. Figure 4 is another simplified architectural perspective as to how clients may request for information and the GraphQL service becomes the fetcher and provider of data. In addition, we are using a bit of pseudo code in the drawing to represent how each client may request information without ever needing to know where exactly that information is sourced. The connected clients will not need to deal with the connection to and failure cases of any one particular service independently, but all at one time. Figure 5 shows us a more mature example of how orchestration fits into our technology stack. We can see services changing from behind the orchestration tier but none of the clients of the orchestration service need to care. More client facing software, or better yet components, are engineered and content is consumed as needed. What is not represented well in this diagram is the fact that not all services need to be called on every request. A powerful pattern that emerges from this architecture is that the content your services provide is only under load as needed by a client or component. This is different in the sense of monoliths doing all of the work all of the time. For instance, say we only wish to know about a user's likes and we already know the user's globally unique identifier, we may not need to put that stress on several services but only one that deals with an individual's likes. But how do we document this? The complexity of knowing what an orchestration service may express as content is a daunting one indeed. The good news is though that good solutions have already thought of this. The nature of solutions like GraphQL require that we manually express the how, where and type of information it may provide. By authoring this contract into the service it naturally creates documentation, or the means for creating new documentation, from what was expressed in the rules of how it is to provide content and from where. If we could imagine the instructions, or blueprint if we dare, an orchestration service understands it may look something like this: 1. get the first name from the users table, 2. get this users city from the address lookup 1. find this users likes 2. then look up related content tags 3. look up posts associated with those tags Which, with tools like GraphQL may translate into a piece of documentation like: postTitle: STRING, postContent: VARCHAR, These examples are hardly real code at all but the general representation is fairly accurate. From figure 6 we can surmise that there is some structured content there for us to read while never having to understand exactly how it is provided. Watch out for nails This post is not intended to convince you or your team to leverage GraphQL or orchestration as a strategy in your architecture. Instead, the goal is to provide a sense of just one way this technology may contribute to creating responsible boundaries in software. Think carefully before considering the adoption of these tools. Long term investment in a decision like this requires that a team keeps up with how it works, deal with keeping it optimized, managing the uptime and much more. GraphQL in the right situation will allow teams and entire companies to stay a more nimble in their ever evolving stack of technology. You may be wondering why? Why do we need to care? The benefit we are working to create is reducing the cost of managing software systems through labor. By reducing the cost of changing a system through means of creating meaningful layers of abstraction and giving work a home. Introducing systems that manage complexity for us, though incur debt, idealistically reduce the number of individuals, engineers, that require a deeper understanding a complex system in order to use it. Create points of meaningful understanding that serve as a facade to more complex work and keep your teams focused on the goals at hand. Reduce the costs associated with Creating new work. Replacing or repairing old work. Maintaining and expressing the potential of a system or series of systems. If you would like to continue this conversation, please feel free to comment below or reach out to me directly through LinkedIn or email.
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947476409.38/warc/CC-MAIN-20240304002142-20240304032142-00114.warc.gz
CC-MAIN-2024-10
11,192
47
https://indico.esa.int/event/386/
code
FOR THE 2022 EDITION PLEASE GO TO http://mbse2022.esa.int The European Space Agency is organising a two-day workshop on Model Based Space Systems and Software Engineering via the online platform Let's Get Digital on 29-30 September 2021. The workshop will provide a forum to exchange practical experiences, lessons learned and novel way forward ideas from applications of model-based techniques in the area of Space System and Software Architecting and Engineering. We expect the workshop to be attended by both practitioners from space agencies and European space industry (primes and their suppliers), and researchers in applied model-based techniques. The symposium will include invited talks/keynotes, participant presentations and interactive discussion sessions. All material presented at the workshop must, before submission, be cleared of any restrictions preventing it from being published on the MBSE2021 website.
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817128.7/warc/CC-MAIN-20240417013540-20240417043540-00578.warc.gz
CC-MAIN-2024-18
923
6
http://www.huntsforum.org.uk/11-latest-news/339-pension-increase
code
The Pensions Regulator: The minimum contributions that you and your staff pay into your automatic enrolment workplace pension scheme are increasing. It is your responsibility to make sure these increases are implemented. Minimum contributions are increasing in two phases. The first increase must be in place from 6 April 2018 and the second from 6 April 2019. For details of the dates please follow this link, or this link for full details
s3://commoncrawl/crawl-data/CC-MAIN-2018-09/segments/1518891815435.68/warc/CC-MAIN-20180224053236-20180224073236-00430.warc.gz
CC-MAIN-2018-09
440
3
https://static.blackhatworld.com/tags/azure/
code
Use these Cloud accounts for Hosting your websites, PBNs, or Cloud Storage, Emailing, and Streaming Purposes. 1. DigitalOcean account for Hosting (Port Closed: 20$) Comes with a Promo of 100$, Valid for 12 months. (With a 5$ droplet, you can host your website for free on Digitalocean for 12... Hi everyone, for those who are looking for how to make money online, do you know you can become an internet vendor, providing services and products others need. like you can be creating free AWS cloud Account, Azure cloud Account and google cloud accounts, and sale it out to client out there... I am not a reseller , I am creator of all accounts. So all can be assured for Quality accounts Linode Port SMTP 25 open account with $100 credit and 20 IPs Limit - Price $70 AWS SES 50K (North Virginia) - Price $500-$600 (Depend on region and quantity) Azure Trial Or pay as go account -... Virtual Bank Account : Verification ONLY U.S VBA For Verification $15 Note: Mini Deposit Screen will be provided within 2-3 Business days after VBA is linked to your PayPal account. Virtual Credit Card : PayPal Verification & Trial Accounts These card details are limited to one use only Im giving vcc for next 10 people. VCC WORKING EVERYWHERE SO YOU CAN ACTIVATE TRIALS AND TRIALS.. If you want the free vcc please reply here as following: Interested, "put here where you will be using it" People are always reselling aws vps' on here, or mentioning the $100 free credit on digital ocean. the thing is, those platforms require a new card and identity each time you sign up. on the other hand, Microsoft Azure dont check previously used cards and will give you $200 credit (lasting two... I already learned HTML and PHP. But i need few things that i can find here. I'm really happy to join this community. And in case if you have some questions about SEO, Azure Cloud and System Admin. Don't hesitate i can help with anything. I'm currently running a wordpress site and i'm getting the following error when i switch to my subdomain: Access to font at 'https://www.site.fr/wp-content/themes/Divi/core/admin/fonts/modules.ttf' from origin 'https://blog.site.fr' has been blocked by CORS policy: No... hello, i have a website already hosted on a server located on egypt (i made a bad deal). i'm on a very low budget for many reasons, but i want to keep working on my wordpress website (it has 10000 hits a month, some good month 15000 max). my question is simple, can i sign up for an azure free... Hello Guys :) I recently installed my wordpress website in Azure, but for some reason the redirection plugin that i installed in wordpress does not seem to work or take any effect. I'm trying to redirect my blog posts to my subdomain, i used various wordpress plugins for the redirection but... I'm facing a problem with my wordpress website, it has a subdomain, blog.domain.com, when i access the blog i get the following error in my console: Access to font at 'www.domain.com/wp-content/themes/Divi/core/admin/fonts/modules.ttf' from origin 'blog.domain.com' has been blocked by... I need where I can get azure login seller or cheap windows vps just for managing only adwords account no software or bot. Vps has to be fast like 3gb. I will need upto 200 vps per month. I want to open shitlist and report user Weblycos: https://www.blackhatworld.com/members/weblycos.641602/ As I need Azure Account and he PM to sell 4 Account = 60$, after payment he asked can not created Account and asked wait for refund. After fews day, he told many reason as payment process... Link report user: https://www.blackhatworld.com/members/weblycos.641602/ I have created Topic to Buy Azure Account and he pm to sell 4 Account = 60$. After payment few days, he asked can not create Account then ask wait for refund. But after 20 days passed , he told many reason and now keep...
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571993.68/warc/CC-MAIN-20220814022847-20220814052847-00128.warc.gz
CC-MAIN-2022-33
3,840
40
https://msazure.club/azure-hub-spoke-hub-hub-setup/
code
Thsoe setups are servered as architecture reference for network design in Azure. A simple hub spoke setup with NVA Another hub spoke setup with virtual network gateway Hub-hub vnet setup with NVA Hub-hub plus on-premise network setup with VPN gateway ↑ ↓ Navigate up/down Enter Go to article / Search new term Esc Close search You've successfully subscribed to Unofficial Azure Club Great! Next, complete checkout for full access to Unofficial Azure Club Welcome back! You've successfully signed in Success! Your account is fully activated, you now have access to all content.
s3://commoncrawl/crawl-data/CC-MAIN-2021-17/segments/1618039610090.97/warc/CC-MAIN-20210422130245-20210422160245-00413.warc.gz
CC-MAIN-2021-17
580
13
https://forums.pragprog.com/forums/14/topics/469
code
So I picked up “Practices of an Agile Developer” this past weekend. Read it this morning, and highlighted like crazy. I bought the book because I’m dealing with a specific problem: a small(1) project has been given the green light using what our company calls “Act2;” a combination of Scrum, Agile, and Act. It’s worked in the past for other projects, and our small project seemed to be similarly aligned. The problem we’re facing is the business management has made the technology decision to use .NET without fully understanding(2) what it would take (system, support, and developer - wise) to deliver the solution. We have great .NET developers, but little to no ASP.net developers (this is a web-app). Our server environment does not have the necessary structure to support ASP.net (we need an http_rewrite component - without IIS 7, or 3rd party Helicon, we’re toast). On the other hand, I have written extensively about the LAMP stack - how large its install base is here at our company, how many resources we have on-staff for supporting the code and servers, and have even put together a demo(3). So, after all my documenting, presenting, discussing with the top-brass, it seems that all my efforts have fallen on deaf ears. Chapter 4, practice 12 says “Justify Technology Use” and provides guidelines for approaching technology. I’ve followed those over the last 5 months (my opinions were documented back to January of this year). So, what do I do when all the tips have failed? Footnotes: (1) I called the project small, since I am confident I could deploy the solution within 30-60 days, with two demos to the stakeholders as a single developer, with one product owner. (2) I say “not fully understand,” and I don’t want that to seem like bashing - I just assume they don’t “get it” since the response has not been positive, or with any explanation of reason beyond “that’s how we roll” (3) We finished one 30-day sprint (there’s the Scrum part) - my “from scratch” demo took 4 days and exceeded the features completed in the 30-day sprint!
s3://commoncrawl/crawl-data/CC-MAIN-2018-17/segments/1524125945637.51/warc/CC-MAIN-20180422174026-20180422194026-00553.warc.gz
CC-MAIN-2018-17
2,098
4
https://forum.edu.cospaces.io/t/multiple-cameras/671
code
Can you use multiple cameras in a scene? And if so, would they all need to be on the same setting? (Orbit, walk, fly) Hi Mary Beth Burns, Though I only recently started using multiple cameras in my projects, they do not all need to be all in one setting. For example, my first camera is to adjust settings for a simulation I am making and the second is moved out of the control panel and can be controlled by the user (with walk). To set up multiple cameras I used this code: The main premise of this code is that on an activate of a button the camera is switched to the second. You start by giving your cameras names and enabling them in blockly. You then set then as variables and use the JS as I have. I hope this help, Thank you so much for your help!
s3://commoncrawl/crawl-data/CC-MAIN-2018-34/segments/1534221210058.26/warc/CC-MAIN-20180815102653-20180815122653-00294.warc.gz
CC-MAIN-2018-34
755
6
http://forums.zimbra.com/administrators/9406-mail-being-delivered-multiple-times-2.html
code
Ok, so after rm -rf /opt/zimbra/amavis/tmp/amavis* I still have the same emails coming in one after another (on the web interface). postqueue -p shows an empty queue amavis has a clean queue (i think, based on rm -rf the /tmp/ directories) we aren't using the spam filtering is there another queue it could be stuck in that i'm missing or something?
s3://commoncrawl/crawl-data/CC-MAIN-2016-22/segments/1464049270798.25/warc/CC-MAIN-20160524002110-00149-ip-10-185-217-139.ec2.internal.warc.gz
CC-MAIN-2016-22
349
7
https://polycount.com/discussion/231746/normal-only-shaders-max-vray
code
I want a normal-only shader that I can assign to a plane and then place that plane over other meshed (a decal, essentially) It'd be great for various types of damage - cracks, dents, edge decals etc I basically want the diffuse, for example, to not exist. I don't mean black, I mean non existent - or at least passed-through.. Think of an opacity map that ignores the normal, for example This is pretty common place in the realtime world but when you want to render these things in vray, its next to impossible it seems? Can someone shove me in the right direction please 😅
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764499468.22/warc/CC-MAIN-20230127231443-20230128021443-00191.warc.gz
CC-MAIN-2023-06
576
5
https://www.dk.freelancer.com/projects/elementor/website-replication-using-elementor/?ngsw-bypass=&w=f
code
Job ikke fundet Beklager, vi kunne ikke finde jobbet du ledte efter. Find de seneste jobs her: We would like to translate/proofread two powers of attorney from Spanish into English. We have already machine translated the Spanish into English to save us time and money in carrying out this translation task. There are around 10,000 words total. All applicants must be native speakers of English preferably and must possess a strong command of Spanish and verifiable proof of translation and/or pr... Greek translators required urgently Seeking NYC PR/publicist for Non Profit We are a non-profit looking for a NYC based experienced publicist to help create awareness about our Foundations projects within the Print, TV and online outlets. This is a project fee based gig and starts immediately. You should be well versed with event related PR; worked with local and National media outlets out of NY/NJ; able to get mentions and o... ============================================== Who is MERN stack Expert? I need someone who has rich experience with the MERN stack. You must have strong knowledge. If you are not, don't bid. Happy bid! ============================================== Hope you're safe & well. I do have transcription tasks. You have to listen to the Target languages Audios and need to type in your language only. No Translation is required. Segments need to be created for Transcription and Annotations within 30 seconds. The domain is News, TV serials, Youtube videos, etc. The transcription needs to be done on a certain portal along with Transcription... I have a project which has been developed with react, but there are so many things to be fixed. Urgently need senior developers' help. Hello, we are looking for long term freelancers to take care of transcription. Looking for highly determined freelancers, delivering top-notch output. Good communication is also key. thanks Need a developer with knowledge in Symfony and Angular js Candidate must be proficient with docker, gitlab & ci/cd. i need a good English translators urgently to translate from English to their local language je suis tre heuros caus je traveill por vous
s3://commoncrawl/crawl-data/CC-MAIN-2021-39/segments/1631780057447.52/warc/CC-MAIN-20210923195546-20210923225546-00470.warc.gz
CC-MAIN-2021-39
2,151
13
http://moraineparktech.blogspot.com/2011/12/application-of-knowledge-outside-of.html
code
My instructor, who is one of the instructors of the IT-Web Designer/Developer program at Moraine Park Technical College, told us we need to do more than the homework assigned to us. We need to practice and learn things on our own if we really want to be the best at what we do. This semester I’ve realized I have been using what I’ve learned in class outside of the classroom and class assignments. I volunteer in an office setting where I use a computer on a regular basis. While volunteering at an organization I was interested in, I was able to offer my time and skills. In return I’ve learned about office culture, and I’m able to apply what I’m learning in my classes. Frequently I use programs like Microsoft Word and Microsoft Excel. Without realizing it, I’ve developed a good understanding of file structures. I was able to comprehend how this office file structure works. My files on my personal computer are also very organized. I never have to wonder where I’ve saved something. If you’ve ever spent time looking for a file because you don’t remember where you put it or what you named it, you know how much time that can eat up. This blog has been an excellent resource for applying what I’ve learned in my classes. This semester I learned how to save files for the web so the file size is smaller (for faster download time) while maintaining quality. I’ve been able to create my own images and graphics and edit them. I’ve used my textbook to look something up that I had forgot how to do. On my own time I’ve been able to create things in Photoshop for fun and share them with my friends. The more I practice, the easier it becomes, and the more fun it becomes. During winter break I’m sure I’ll be working on some kind of fun project. If I put some thought into it, it could become my next portfolio piece.
s3://commoncrawl/crawl-data/CC-MAIN-2018-26/segments/1529267860684.14/warc/CC-MAIN-20180618164208-20180618184208-00535.warc.gz
CC-MAIN-2018-26
1,852
4
https://forum.nwoods.com/t/clarification-on-go-part-containinggroup-binding/7957
code
In all samples of grouping, diagram’ nodes/parts data sets use an attribute “group” to refer to a containing group, without binding to “containingGroup” defined in related templates. My assumption is that there is a default binding to the attribute named “group”. If so, is it possible to use a different attribute, like “parentGroup”, and define new go.Binding(“containingGroup”,“parentGroup”) ? The the model you can change the nodeGroupKeyProperty We do that in this sample: GoJS Visual Tree Using Nested Groups Thank you Simon. To add a bit of explanation: relationships are not implemented by data binding. Understanding and maintaining relationships between Parts is more complicated than binding, so relationships are implemented by specific code in the Models and in Diagram. Data binding is just copying property values around, within the scope of a Part, implemented by Binding and Panel.
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224648635.78/warc/CC-MAIN-20230602104352-20230602134352-00770.warc.gz
CC-MAIN-2023-23
924
7
https://jeremyhajek.com/2015/10/14/getting-shrewsoft-vpn-2-2-1-to-compile-on-ubuntu-15-04-for-use-at-illinois-tech.html
code
Getting ShrewSoft VPN 2.2.1 to compile on Ubuntu 15.04/10/16.04 for use at Illinois Tech If you are like me and want to use Ubuntu Linux and a VPN in conjunction with your university network - You have to use Shrewsoft VPN client. To use the Eucalyptus cloud and Euca2ools in the School of Applied Technology we need to access port 8773 which is not open from the outside.Here is how to get VPN software working with IITs VPN. Update: Now tested and works on Ubuntu 16.04 beta too for Linux you have to compile the application from source. Unfortunately there are no good instructions until now… - Download and untar the tarball from shrewsoft -> latest here (10/15/15): https://www.shrew.net/download/ike/ike-2.2.1-release.tgz - Install these dependencies: sudo apt-get install libedit2 libedit-dev qt-sdk cmake flex bison build-essential libssl-dev - In the directory where you extracted the tarball run the cmake command to build the application: cmake -DCMAKE_INSTALL_PREFIX=/usr -DQTGUI=YES -DETCDIR=/etc -DNATT=YES make sudo make install - Important Next go to /etcand copy the iked.conf.sample file renaming it to iked.conf Otherwise the key daemon won’t start - you will get an error message saying key daemon not started. sudo iked(to start the key daemon) - type ikea on the command line (for GUI interface) (on Ubuntu 15.10 I typed qikea) - Once the GUI tools starts click FILE > IMPORT (here you import your Cisco PCF and it will auto-populate everything) - Then you are ready to connect - use your iit account credentials and you are in! Take care
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296943746.73/warc/CC-MAIN-20230321193811-20230321223811-00175.warc.gz
CC-MAIN-2023-14
1,564
14
http://stackoverflow.com/questions/11390629/getting-troubles-when-trying-to-install-fosuserbundle-to-symfony2/11400495
code
When I'm trying to install FOSUserBundle I'm getting the following error: Fatal error: Call to undefined method Symfony\Bundle\DoctrineBundle\Registry::getManager() in W:\symproject\app\cache\dev\appDevDebugProjectContainer.php on line 1039 What can it be? I've also tried to install FOSUserBundle to a pure Symfony Standart Edition and encountered the same issue. I followed along this documentation.
s3://commoncrawl/crawl-data/CC-MAIN-2015-48/segments/1448398446535.72/warc/CC-MAIN-20151124205406-00021-ip-10-71-132-137.ec2.internal.warc.gz
CC-MAIN-2015-48
401
5
https://www.freelancer.com/projects/mobile-phone/send-whatsapp-notification-customer-form/
code
Job Not Found Sorry we couldn't find the job you were looking for. Find the most recent jobs here: I need a pitch deck designed from an existing document. The document is 12 pages and currently on powerpoint. Long term (6+ months) frontend development job, at 5-15 hours per week. You can expect that work will be based on specific features. In other words, it's not a constant maintenance position (although maintenance might be part of the work needed) -- it's development to build out a specific functionality. ### Your Skills 1. Design/UI -- I understand you aren't a UI/UX person. That&... i need integrate asp.net web site to wharsapp chatbot to [login to view URL] platform only integration of read and write to/from whatsapp chatbot Hi, We are redesigning our website along with its contents and require a website content writer to understand our business and write content. $20- $50 per hour -------- This project is only for Females -------- I am starting up a porn site. I need Open-minded females who can handle our client's. I will very happy if anyone interested to join us. I will pay for a very good hourly rate for this work. WORKS IS > - Login portal and join with our clients. - WOrks a client's requirements. - Give 2-3 hours in a day. Waiting for ... Freelancers required who are specialized in converting jpg file into ms word file. Fast typing freelancer required. agreement with vendor for developing the software and handing over back without being illegally used, legal agreement with end users for software usage Need to convert the JPG to DOC FILES project I am looking for an enthusiastic, hard-working junior writer to create news and listicle-style articles for a travel website in Australia approximately 20-40 hours per week. Th writer can be located anywhere and will be working remotely. This job would suit somebody looking for ongoing casual work, especially a recent graduate or someone currently studying. Excellent communication is therefore e... The details will be given to freelancers with STRAND7 experience only. hand calculations and FEA model will both be required. The software download link and access code will also be given. The milestone will be released only after the outcome of the project is verified as success.
s3://commoncrawl/crawl-data/CC-MAIN-2019-30/segments/1563195529007.88/warc/CC-MAIN-20190723064353-20190723090353-00175.warc.gz
CC-MAIN-2019-30
2,268
13
https://www.gnome-look.org/find/?search=unix&f=tags&page=1&pci=135&t=xfce
code
Search results for "unix" GTK3/4 Themes by kanehekili A GTK2/GTK3 Theme that has been derived from an old Gnomish-Grey and an ancient Greybird theme, tweaked for GTK 3.18 and completely rewritten for GTK3.22. The theme has been tested on Gnome 3.22+, XFCE and and Cinnmon 18 (3.18) and 19 (3.19). Works with compiz. Download the appropriate Version... greybird gnome xfce gradients linux unix theme Oct 23 2021 GTK3/4 Themes by vinigris Dark + /*Cool gray*/ + mint opensuse dark mate xfce linux unix theme gnome Oct 10 2021 GTK3/4 Themes by pnd23 This is a modification of the QAdwaita version 1.0 GTK theme. All backdrop references were removed from the GTK 3 part to display active and inactive windows the same way. The active window can be identified by disabling GTK client side decorations (CSD). The theme tries to hide CSD titles... gtk3 gtk2 xfce nocsd uniform linux unix theme gnome Oct 05 2021 GTK3/4 Themes by akui This is my very 1st gtk3 theme work. It' a fork of early version of Arc gtk theme for GTK3 , and the Numix Holo theme for GTK2. The color palette is a mix of both themes. This project is End Of Life (EOL) I moved to a more complete Mint-Y base, now my efforts are and will be involved on the... gtk3 xfce eol archive linux unix theme gnome Sep 15 2021 GTK3/4 Themes by SebastJava THE NEW COLORS OF A NEW ERA GTK theme: [url]https://github.com/SebastJava/mint-yz-theme[/url] Icons theme: [url]https://github.com/SebastJava/mint-yz-icons[/url] The interface of all the software and the entire desktop is now rejuvenated, modernized. This is a fork from the reliable Mint-Y... linux linuxmint mate cinnamon gnome unix xfce theme Jul 01 2021 GTK3/4 Themes by abhishekzambare [b]** If you like the theme then support project by giving ratings, thank you. **[/b] [b]Material-Original is a Material Design theme for GNOME/GTK based desktop environments.[/b] Based on Materia-theme -- [url=https://github.com/nana-4/materia-theme]( https://github.com/nana-4/materia-theme... gnome elementary materia material linux unix theme xfce May 10 2021 GTK3/4 Themes by gusaroo A modern and flat theme based on Materia Works with Gtk2, Gtk3 unix theme xfce linux gnome gtk3 Mar 17 2021 GTK3/4 Themes by leaf-watoru This is a GTK2/GTK3 theme that creates really green colored environment. That includes: • Green menus and background in GTK2/GTK3 applications: Thunar, File-roller, Leafpad, and others. • Green panel including the whisker menu. • Green context menus and tooltips. This is a theme that is... linux theme xfce xfce4 xubuntu unix gnome green evergreen Aug 31 2020 GTK3/4 Themes by paulxfce [b]Open images in new tab and enlarge for full view![/b] [b]Alu-Night[/b] This is the a dark, but easy-to-the-eyes theme with dark aluminium headerbars and traditional title-buttons. Especially suited for working in a dark environment. This theme has GTK2 and 4K-support. It has all the... theme xfce unix linux gnome cameo Jul 17 2020
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323588282.80/warc/CC-MAIN-20211028065732-20211028095732-00456.warc.gz
CC-MAIN-2021-43
2,952
37
http://www.accordancebible.com/forums/topic/2548-additional-locked-modules-on-disc/
code
additional locked modules on disc Posted 17 September 2008 - 09:36 AM My questions is, does the disc that comes with the scholars 8 premier package come with all the unlocked library 8 premier content? If so how would I go about unlocking it? I live in Nigeria so mail order is a big problem, however, if the disc I have already has the content I could simply purchase the codes needed to unlock it. Thanks for the help. Posted 17 September 2008 - 09:49 AM Posted 17 September 2008 - 10:02 AM Yes, not only is the Library Premier all on the same DVD so you can purchase just a code, but you can also request the Double Bundle package with both Premier levels, for extra savings (within 3 months). That sounds great! I have already purchased the scholars premier pack, so how would I go about taking advantage of the bundle offer? I can't see any option of an upgrade just the full bundle itself. Posted 17 September 2008 - 10:25 AM Posted 17 September 2008 - 11:40 AM I just sent the order and with the savings I was able to get the super premier double bundle (I love that name) and also the ANF fathers collection which I have been dying to get my hands on for ages. Thanks very much for your help. 0 user(s) are reading this topic 0 members, 0 guests, 0 anonymous users
s3://commoncrawl/crawl-data/CC-MAIN-2018-22/segments/1526794863410.22/warc/CC-MAIN-20180520112233-20180520132233-00471.warc.gz
CC-MAIN-2018-22
1,272
15
https://community.esri.com/t5/arcgis-survey123-questions/append-data/td-p/1192680
code
I have a dataset of 115 rows x 175 columns collected initially with Google Forms. We had one question for the neighborhood of the user. Then we migrated our form to Survey123, same questions. Now we need to append to Survey123 the date we collected in Google Forms. For the neighborhood question, we went row by row changing the "neighborhood" to proper coordinates format. I followed the instructions of the help article "How To: Append data to a Survey123 for ArcGIS survey from an existing survey with related tables", however, I can't apply the update uploading the data in Excel format. I get this error: "Error. Could not append data to layer." Before trying to append the data, I verified the schema and both are identical. The Append Data prompt successfully detects that all fields from Survey123 have a match on my local file, however, I get the error all times. I tried the suggestion from this thread and I disabled the sync option, however, still not working. I appreciate if you can provide me several workarounds to merge both databases. ¡Thanks in advance! Unfortunately, I don't have a solution for this issue, but I wanted to say thank you for linking "How to Append data to a Survey123" Esri technical article because it was very helpful to me for appending data between Survey123s in AGO. Good luck!
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679099892.46/warc/CC-MAIN-20231128151412-20231128181412-00444.warc.gz
CC-MAIN-2023-50
1,320
10
https://d2bs8hqp6qvsw6.cloudfront.net/article/304837/firefox_3_5_an_early_look/?fp=2&fpid=2
code
There was a time when Firefox was the Web browser for the cool kids who knew their tech. Most would still agree that it's better than Internet Explorer, but that's damning it with faint praise. Over the last year or so, Firefox has become better known in tech savvy circles for its relatively poor performance and mediocre memory management. Chrome's insane speed and Internet Explorer 8's overall improvement have also dinged Firefox's reputation. But now, Firefox 3.5 is almost ready to go. Does it have what it takes? I downloaded the latest beta, Firefox 3.5 beta 4, to find out for myself. I used it on two different PCs. The first was my workhouse Windows XP SP3 system, and the other was my Fedora 10 computer. The XP box was a Dell Inspiron 530S with a 2.2-GHz Intel Pentium E2200 dual-core processor, 4GBs of RAM, a 500GB SATA drive and an Integrated Intel 3100 GMA (Graphics Media Accelerator). For Fedora, I used a Gateway GT5622 desktop with a 1.8GHz Intel Pentium E2160 dual-core CPU, 3GBs of RAM, a 400GB SATA drive, and an Intel 950 GMA. On both systems, installing the browser took no more than five minutes. Once installed, I found that my two must-have Firefox extensions the Google Toolbar and XMarks were both working. However, on Windows, I found that two other extensions were DOA. These were the AVG Safe Search 8.5 malware detector and the Microsoft .NET Framework Assistant 1.0. I wasn't too surprised by either one. The AVG program has had issues with other versions of Firefox and the .NET Framework program has always been a pain. I should also note that, unlike Google Chrome, Firefox has a mature family of extensions. I really like Chrome a lot, but it's still taking baby steps when it comes to using extensions for added functionality. On the other hand, after running Firefox for days and with multiple windows and tabs, I found that on both Windows and Linux, Firefox is finally not hogging memory. Even with the debugging code that must be in a beta, I found that Firefox is no longer leaking memory. That's good for both the browser's stability and its security. I also noticed that Firefox has borrowed several nice improvements from Chrome. For example, it uses DNS (Domain Name System) pre-fetching so that when you click on a link you'll get to its page a bit faster. The new Firefox also has some nice features of its own. It now supports embedded Ogg and WAV video and audio format without the need for a helper program. It also far better privacy settings so you can use your own, or any other, computer without leaving any traces behind of what you've been doing. All-in-all, I found this beta to be a real step up from Firefox 3.0.x. Still, I find myself wishing that I could have a Firefox with Chrome's speed or Chrome that works on multiple operating systems and with Firefox's abundance of extensions. If you're already a confirmed Firefox user though you'll want to switch over to Firefox 3.5 as soon as the final version comes out. Look for it sometime in mid to late June.
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474688.78/warc/CC-MAIN-20240227220707-20240228010707-00762.warc.gz
CC-MAIN-2024-10
3,025
9
https://communities.vmware.com/t5/VMware-Horizon-Discussions/VMware-OS-Optimization-tool-and-Calculator-Photos-app/m-p/2977335
code
I currently use Horizon for my company's employees. For the master, I used the OS optimization tool and left all the boxes checked. Afterwards, some of the users complained about the lack of Microsoft's calculator and Photos app. So I managed to install with the Adguard site the applications with a script (as well as their dependencies, maybe not all of them though). However, when users click on these applications, it takes a long time to open. Do you know where it could come from? Thanks for your help. The slow opening of applications in your Horizon environment could be caused by several factors. Here are a few possible reasons and solutions to consider: Resource allocation: Check if the virtual machines (VMs) running the Horizon desktops have sufficient CPU, memory, and storage resources allocated to them. Inadequate resources can result in slow application launch times. Consider adjusting the resource allocation based on the specific requirements of the applications and the number of users accessing the VMs simultaneously. Network latency: Slow application launch times can be attributed to network latency. If the Horizon infrastructure is hosted remotely or if users are accessing it over a wide area network (WAN), network latency can introduce delays. You can analyze the network connectivity and consider optimizing the network infrastructure to minimize latency. Application size and dependencies: The size and complexity of the applications you installed, as well as their dependencies, can impact launch times. If the applications have large installation files or numerous dependencies, it may take longer for them to load. Consider evaluating the size and complexity of the applications you installed and ensure that the VMs have adequate storage and processing power to handle them efficiently. App virtualization approach: The method you used to install the applications might affect their performance. If the applications were installed using a virtualization method that involves streaming or virtualization layers, it could introduce additional overhead and cause delays. Ensure that you are using an efficient and optimized method for virtualizing the applications within your Horizon environment. Horizon infrastructure configuration: Verify the configuration of your Horizon infrastructure, including the connection server settings, load balancing, and pool settings. Misconfigurations in these areas can impact the performance of the applications. Review the Horizon documentation and best practices to ensure your environment is properly configured. Performance monitoring and troubleshooting: Implement performance monitoring tools to identify bottlenecks and areas of improvement within your Horizon environment. Analyze the system logs, performance metrics, and any error messages to pinpoint the specific causes of slow application launch times. This will help you narrow down the root cause and apply targeted solutions. Consider investigating these areas to identify the specific cause of the slow application launch times in your Horizon environment. It may also be beneficial to involve your IT infrastructure team or consult with a Horizon specialist who can provide more specific guidance based on your environment's configuration and requirements. Thanks for your help. Sorry for the late response I couldn't solve the problem... After many tests, even without the VMware optimization script, the problem remains. So I didn't want to waste time and installed open-source alternatives to these applications on the VMs.
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100540.62/warc/CC-MAIN-20231205010358-20231205040358-00423.warc.gz
CC-MAIN-2023-50
3,567
20
https://forum.algorand.org/t/am-i-doomed-need-help/5550
code
I’ve been researching and worrying about losing my 5 phrases to get into my wallet. I’ve totally fucked up and didn’t notice I didn’t fully take down all 25 phrases. I’ve seen there is python code to find the final 25th checksum phrase to get access. Do I have any hope in running something to get those final 4 phrases? 2000^5 is not what standard pc cannot handle So the wallet is gone? let me rephrase it 2000^5 is what standard pc can handle you should brute force it Oh ok. I’ve found others code on here but I’m not well versed in python to change the logic from 1 phrase to 5. Would you have any tips? Hi, @JrJr1996 ! The program to vary the last 36 bits of the 256 bit seed can be done relatively easily. Assuming that a PC can do 50 thousand checks/sec, the necessary time to run this brute forcing is 2**36 / 50000 / 3600 hours, = i.e. approximately 382 hours. So basically I’d leave a computer running it for 15 days which would be fine. Any idea on how to write the script to find the missing phrases?
s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320301737.47/warc/CC-MAIN-20220120100127-20220120130127-00401.warc.gz
CC-MAIN-2022-05
1,029
12
https://swiftpackageindex.com/omaralbeik/Drops
code
- Written by Omar Albeik and 7 other contributors. - In development for 2 years, with 46 commits and 16 releases. - There are no open issues and no open pull requests. The last issue was closed 2 months ago and the last pull request was merged/closed 2 months ago. - This package has no package dependencies. - MIT licensed - 831 stars - 1 library - No executables - No plugins - No macros When working with an Xcode project: When working with a Swift Package Manager manifest: Select a package version: A µFramework for showing alerts like the one used when copying from pasteboard or connecting Apple pencil
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100499.43/warc/CC-MAIN-20231203094028-20231203124028-00157.warc.gz
CC-MAIN-2023-50
610
14
https://derkvanderwoude.medium.com/a-real-world-example-of-microsoft-threat-protection-xdr-8403f20a06fb?source=post_internal_links---------7----------------------------
code
A real world example of Microsoft Threat Protection & XDR Microsoft Threat Protection (MTP) is a cross-service Security product with a single view for all Microsoft 365 E5 Security features (threat protection & vulnerability management). The products that are part of the Microsoft 365 E5 Security license are: - Azure ATP - Microsoft Defender ATP - Office 365 ATP - Microsoft Cloud App Security (including Azure AD Identity Protection) - Microsoft Threat Protection Microsoft Azure AD Privileged Identity Management (PIM) is also part of the E5 Security license but is not part of Microsoft Threat Protection. Microsoft Threat Protection correlates Incidents from multiple services into one single Incident for optimal triage, mitigation and RCA (Root Cause Analysis). While Incidents are passive in nature, Hunting is the pro-active approach which also has cross-service support. The Incident page provides an option to only see correlated alerts: enable the filter ‘Multiple service sources. Let’s look at two examples from our Cloud SOC (Security Operations Center) and highlight the power of MTP and XDR. Example #1 — Malicious URL opened in e-mail Microsoft Threat Protection Example #2 — Malicious file opened in e-mail Microsoft Threat Protection The cross-service Incidents are correlated into one single Incident which provides all insights for triage, mitigate and help to understand and write the RCA (Root Cause Analyses). Advanced hunting is the pro-active feature to hunt for malicious behavior or threats. The language used is KQL (Kusto Query Language), the same language used in Azure Sentinel. The advanced hunting cross-service options are: - Alerts (MTP) - Apps & identities (Azure AD & MCAS) - Email (Office 365 ATP - Devices (MDATP) - Threat & Vulnerability Management (MDATP) Let’s continue from the malicious e-mails above and hunt the environment for logon attempts (within 30 minutes) after the user received a known malicious e-mail via the KQL query below. //Define new table for malicious emails //List emails detected as malware, getting only pertinent columns | where MalwareFilterVerdict == “Malware” | project TimeEmail = Timestamp, Subject, SenderFromAddress, AccountName = tostring(split(RecipientEmailAddress, “@”)); | join ( //Merge malicious emails with logon events to find logons by recipients | project LogonTime = Timestamp, AccountName, DeviceName ) on AccountName //Check only logons within 30 minutes of receipt of an email | where (LogonTime — TimeEmail) between (0min.. 30min) Triage the output for possible compromised accounts. The examples above underline the power of XDR (eXtended Detection & Response), the integration of the E5 Security products. Let’s explain the malicious attachments example. - A user receives an e-mail with an (malicious) attachment - Office 365 ATP scans the e-mail but the ‘Indicator of Compromise’ percentage do not mark the e-mail as malicious (e.g. 80% or above is malicious but the analyze score was 78%). - The mail is delivered to the mailbox, and the attachment is opened on the Endpoint (device) - Microsoft Defender ATP has in-depth scanning capabilities and marks the attachment as malicious. - The hash of the attachment is shared with Office 365 ATP (Exchange EOP) - All new malicious e-mail(s) with the same attachment are blocked - All existing e-mail(s) with the same attachment are cleared via the ZAP (zero-auto purge) feature Here you can see the true power of one holistic Security solution. If we had a different endpoint AV/EDR or e-mail AV solution, the malware could have entered the organization and provide damage (e.g. IP theft by competitor, malware for financial gains or data destruction by nation state actors).
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446710829.5/warc/CC-MAIN-20221201153700-20221201183700-00308.warc.gz
CC-MAIN-2022-49
3,746
45
https://sharepoint.stackexchange.com/questions/127937/remove-custom-master-page-for-modal-popup
code
When you call the page you can use the IsDlg=1 query string. That may be enough for what you need, but it depends on how the custom page was implemented and if it's still make's use of the notdlg classes. Here is a potential answer on Stack Exchange regarding dynmaicly setting asp.net masterpages: Just tested this and it works from the PreInit of the Page that is using the nested MasterPage. protected void Page_PreInit(object sender, EventArgs e) this.Master.MasterPageFile = "/Site2.Master"; Another method that may be possible is creating your own pagelayout class, that is used in publishing pages. If you look at the pages they don't seem to reference a master page directly, but pagelayout assembly. Back to the notdlg classes, you could modify the masterpage and add in the MS class to the sections you want to hide and then just utilize the query string method. To clarify there are actually two different classes depending on version s4-notdlg - SP 2010 ms-dialogHidden - SP 2013
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100527.35/warc/CC-MAIN-20231204083733-20231204113733-00770.warc.gz
CC-MAIN-2023-50
991
11
https://blog.pivotal.io/author/kolsen
code
Based in Dallas, Savoya is currently building out their tech team from the ground up with the help of Pivotal Labs. This is a great opportunity to join a thriving company. If you’re interested in the position please reach out to the savoya team here: [email protected] ESSENTIAL DUTIES AND RESPONSIBILITIES: We are looking for a team of two developers located in Dallas, TX to work in conjunction with Pivotal Labs to create our next generation internal and external software platform. Read more »
s3://commoncrawl/crawl-data/CC-MAIN-2015-48/segments/1448398445033.85/warc/CC-MAIN-20151124205405-00280-ip-10-71-132-137.ec2.internal.warc.gz
CC-MAIN-2015-48
500
5
https://www.iaswww.com/apr/Computers/Software/Operating_Systems/Graphic_Subsystems/X11/Applications/Terminal_Emulators/
code
Terminal Emulators Applications X11 Graphic Subsystems Top: Computers: Software: Operating Systems: Graphic Subsystems: X11: Applications: Terminal Emulators - rxvt - An alternative to xterm with support for a terminal emulators background terminal emulators image and menu bar. - Linux Reviews - x11 Terminals - Links and guides. - XtermControl - Enables dynamic control of XFree86 xterm properties. - Eterm - A terminal emulator designed for the Enlightenment window manager. It x11 has a menu bar for settings and transparency support. - Xterm - First and most popular terminal emulator shell window. MySQL - Cache Direct
s3://commoncrawl/crawl-data/CC-MAIN-2018-22/segments/1526794864624.7/warc/CC-MAIN-20180522034402-20180522054402-00382.warc.gz
CC-MAIN-2018-22
624
8
https://w3epic.com/page/13/
code
External Links Handler is always good choice to alert your users when they clicks on External Links (link that outside of your website). It is also useful to be legal. If your users clicks on a external link, you can alert them – they are going out, you won’t be responsible of any content on… [Read More] Hi, in this SQL / MySQL tutorial, you will learn basics of MySQL. You will know what is MySQL, how to create-read-update-delete (CRUD) database, table, insert data into table, joint query, search in tables and some very important MySQL functions. Hi, this is a basic level AJAX tutorial for beginners. This AJAX guide will help you to do a fresh start of working with AJAX from beginning. In this AJAX tutorial, you will know what is AJAX, how AJAX works, how to prepend and append data in a web page without reloading it and more… Check the first part of this PHP tutorial – PHP Tutorial – a Beginner’s Basic PHP Guide Part 1 before continue reading this part. Working with Strings in PHP A string is traditionally a sequence of characters or symbols. Generally there is no limit of charecters on a string in PHP. String Functions Very common string… [Read More]
s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578530505.30/warc/CC-MAIN-20190421080255-20190421101438-00072.warc.gz
CC-MAIN-2019-18
1,185
4
https://github.com/absolutelyjustine
code
Create your own GitHub profile Sign up for your own profile on GitHub, the best place to host code, manage projects, and build software alongside 28 million developers.Sign up - Salt Lake City, UT Forked from Roll20/roll20-character-sheets Character sheet templates created by the community for use in Roll20. Forked from herrbischoff/awesome-macos-command-line Use your OS X terminal shell to do awesome things. These are problems found online that I have gone through to solve. Forked from zacanger/doc Cheat-sheets, guides, graphics, etc.; for myself, DevMountain folks, and whoever else might want them.
s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267156192.24/warc/CC-MAIN-20180919102700-20180919122700-00151.warc.gz
CC-MAIN-2018-39
607
10
http://judoresearch.org/library/search.php?sqlQuery=SELECT%20author%2C%20title%2C%20type%2C%20year%2C%20publication%2C%20abbrev_journal%2C%20volume%2C%20issue%2C%20pages%2C%20keywords%2C%20abstract%2C%20address%2C%20corporate_author%2C%20thesis%2C%20publisher%2C%20place%2C%20editor%2C%20language%2C%20summary_language%2C%20orig_title%2C%20series_editor%2C%20series_title%2C%20abbrev_series_title%2C%20series_volume%2C%20series_issue%2C%20edition%2C%20issn%2C%20isbn%2C%20medium%2C%20area%2C%20expedition%2C%20conference%2C%20notes%2C%20approved%2C%20call_number%2C%20serial%20FROM%20refs%20WHERE%20serial%20%3D%20104%20ORDER%20BY%20author%2C%20year%20DESC%2C%20publication&client=&formType=sqlSearch&submit=Display&viewType=&showQuery=0&showLinks=1&showRows=5&rowOffset=&wrapResults=1&citeOrder=&citeStyle=APA&exportFormat=RIS&exportType=html&exportStylesheet=&citeType=html&headerMsg=
code
||In this paper, for the first time, there is comprehensively tackling the problem of biomechanical optimization of a sport of situation such as judo. Starting from the optimization of more simple sports, optimization of this kind of complex sports is grounded on a general physics tool such as the analysis of variation. The objective function is divided for static and dynamic situation of Athletes couple, and it is proposed also a sort of dynamic programming problem Strategic Optimization. A dynamic programming problem is an optimization problem in which decisions have to be taken sequentially over several time periods linked in some fashion. A strategy for a dynamic programming problem is just a contingency plan, a plan that specifies what is to be done at each stage as a function of all that has transpired up to that point. It is possible to demonstrate, under some conditions, that a Markovian optimal strategy is an optimal strategy for the dynamic programming problem under examination. At last we try to approach the optimization of couple of athletes motion. Shifting s Trajectories study is a very hard and complex work, because falls among fractal, self similar trajectories produced by Chaotic, irregular, Dynamics. It is possible to Optimize Athletes motion planning. Motion planning could be defined as the problem of finding a collision free trajectory from the start configuration to the goal configuration. It is possible to treat motion as an optimization problem, to search the trajectory that drive adversary into a final broken symmetry position, where it is possible to collide and apply one of the two throwing tools: Couple or Lever.
s3://commoncrawl/crawl-data/CC-MAIN-2018-05/segments/1516084886792.7/warc/CC-MAIN-20180117003801-20180117023801-00305.warc.gz
CC-MAIN-2018-05
1,667
1
https://medium.com/@kimgildabode
code
Digital transformation has given us many ways to turn passive news consumers into active contributors to journalism. However, due to the culture of traditional newsroom operations, opportunities for user-assisted journalism are often overlooked. As a result, important issues, valuable viewpoints and compelling stories are left undiscovered. So when Jay Rosen, who coined the term The People Formerly Known as the Audience, asked me to teach the first-semester reporting class of his Studio 20 program at NYU, we quickly agreed that it should focus on how to report with, rather than on, a community. As opposed to anonymous audiences, measured by page views and clicks, communities can be defined by a common interest, such as where they live or a topic they care about. As their collective knowledge, personal stories and experiences can be incredibly valuable, they should be involved in the reporting process from the very beginning, before starting with a story even. …
s3://commoncrawl/crawl-data/CC-MAIN-2020-45/segments/1603107869933.16/warc/CC-MAIN-20201020050920-20201020080920-00239.warc.gz
CC-MAIN-2020-45
977
4
https://forum.vyos.io/t/static-interface-route-for-ip-sec-tunnel/2092
code
Hello VyOS community, I am new to VyOS and have a question regarding IP-Sec routing. VyOS have multiple interfaces, one WAN and further private LAN for example eth1. How can I route the traffic of one IP-Sec tunnel to eth1 interface (another FW)? Is there any way to set up something like route based VPN?
s3://commoncrawl/crawl-data/CC-MAIN-2018-43/segments/1539583513441.66/warc/CC-MAIN-20181020205254-20181020230754-00237.warc.gz
CC-MAIN-2018-43
305
3
https://designmadeinhongkong.com/event/13004/italian-design-day-2020/
code
Broadcasted in live streaming on 2020-11-30 A conversation around the theme of the future of design and on the importance of cultural exchange. Presenting the project: Design Made in Hong Kong 2020/2021 a project by Istituto Italiano di Cultura Hong Kong in collaboration with 5Vie curated by Mr. Lawrence AVA - Hong Kong Baptist University meets Sara Ricciardi
s3://commoncrawl/crawl-data/CC-MAIN-2021-10/segments/1614178358956.39/warc/CC-MAIN-20210227114444-20210227144444-00457.warc.gz
CC-MAIN-2021-10
361
7
https://coderanch.com/t/739269/engineering/Algorithmic-thinking
code
I am poor at correlating real-world, on-the-job problems with the ones I learned in a textbook. Does this book take examples from the real world, and how to identify its correlation with the already seen theoretical problem? I explicitly stay away from the standard examples that are so well-covered by books/tutorials/videos already. There are enough resources for those. I can't exactly claim that my examples are directly job-related -- I kept them small to focus on the data structure/algorithm at hand -- but at least I don't think you'll have seen these examples before. Connections between theory and practice was an important goal for me, too. Questions like: why is this data structure/algorithm useful? How do I know when to use it? What do the problems have to look like for me to deploy this data structure/algorithm? This discussion is important IMHO, otherwise you're left with a collection of data structures/algorithms but with little guidance for using them. Thanks, CodeRanch, for talking with me about my algorithms book! www.danielzingaro.com/alg
s3://commoncrawl/crawl-data/CC-MAIN-2021-10/segments/1614178361849.27/warc/CC-MAIN-20210301030155-20210301060155-00343.warc.gz
CC-MAIN-2021-10
1,066
5
https://forum.inductiveautomation.com/t/ignition-receive-tcp-msg-from-device/7902/8
code
I’m searching about possibility to receive TCP Message on specif Port (IPaddress:Port) from device (badge reader) with IGNITION . I can configure badge reader for send to me MSG on specific IPaddress:Port ; how can i read it? Somebody know if is possible? We have been attempting to solve the same issue, albeit from a completely different type of data source. at the moment the solution that we have put in place is to create a .bat file which runs on the server which in turn runs a .jar that i have created which listens to a port, the client then connects, which in your case would be the card reader. sends the data to the port then discconects, the program recieves the data and writes it to my SQL database which is then read into Ignition. Hope that this helps. There is the “UDP and TCP Drivers Module” that lets you receive basic data from these types of devices. It is included with the main install, so all you need to do to use it is go to Devices in the gateway and add a new TCP or UDP device. Whether or not it will work in your case will depend a bit on the device, but it’s worth a shot. MGambrell I’m have thonking to do the same… Colby, I have try to create connection but driver tell me always “Connected 0/1” The card reader try to connect in tcp mode only when a’ card is in touch with device then connection go down, may be this the problem. It is a relatively easy program to create, i wouldnt say that i am an expert programmer and i got the main part of the program working in a couple of hours only needing to tweak for the database connection and the fact that we are listening to a number of ports each with a different table. Colby, would it be possible to run this program in the gateway as a script if the code was written in python? this is what we had initially planned but using the IAlabs scripting module to dynamicly create/delete tags as needed. Which program are you wanting to run in the gateway script? If you are referring to your .bat file you could use the system.util.execute function. You should be able to configure the TCP driver to do receive the TCP message. If you are seeing 0/1 connections then maybe something else needs to be configured. Check your firewall settings, either disable (temporarily) or create an exception for the port being used for communication. Resurrecting this question… I have a similar instance, a checkweigher which is configured to send a TCP/IP data packet to a specific port on the Gateway, in this case port 4999. So, I need to somehow configure a TCP driver to be a passive listener on this port so I can grab the incoming packets. I have seen a few posts showing scripting to open a socket on a specific port, but those did not appear to apply to this application. Any ideas? Thanks in advance, We have a module that accepts tcp sockets and spits out the decoded values to an event script. We would have to change the decode and encoding pieces, but this might work for you Is there any documentation/manual for that module? I was trying whole day to get some values to ‘Kymera Socket Event Handler Module’, but I couldn’t… How a telegram needs to be compiled to get values to the module? You could also try the Generic TCP driver from here. It is principally designed for binary data, but is also able to receive a simple string that can be parsed in a value change event. I am using it for a couple of barcode scanners that send data to an UDP listener. The module is expecting a packed binary packet, and you define the in and output packets. If you are expecting json or xml, or anything other than a packed set of data, we would have to fork the module for you. I generally just import the java.net and java.nio classes for stream sockets and run a semi-permanent asynchronous thread listening as needed. Total control. But then, us controls engineers are biased that way. (-: No need for java.net, python also has a socket module. The hardest part is to get the semi-permanent asynchronous thread correct. It can’t be completely permanent, as you have to halt the thread when the code updates (otherwise the thread would keep existing and handling requests with outdated code until the gateway is completely restarted). I’ve set up a socket started from a timer on the server with a timeout every second. So at least every second, the code is updated. And the socket object itself can be stored in the legacy globals object from Ignition, so you reuse the connection (Phil helped with that last part). Here’s the extract of the code we use to send a request to a socket and handle the response: The SendMessages() function is called on a timed basis, and can also be called from a tag trigger (f.e. when you know there’s a message present to send). It works with our setup, but every socket implementation is a bit different in when they expect a connection to close, what request or acknowledgements they expect, how messages are delimited, … If you need a listener, you can use the same socket to listen on a port, but you also need a timeout to bail out from time to time and allow the underlying code to refresh. from datetime import datetime TIMEOUT = 10 # seconds > timeout for socket to generate answer on our request, after this timeout a new socket is created BUFFER_SIZE = 1024 # size of packets received busyConnecting = False busyConnecting = True globalVars = system.util.getGlobals() if "CtcSocket" in globalVars: s = socket.socket(socket.AF_INET, socket.SOCK_STREAM) globalVars["MySocket"] = s print "Connection succesful" print "Exception happened during _ConnectSocket" busyConnecting = False request = None globalVars = system.util.getGlobals() if not "MySocket" in globalVars: s = globalVars["MySocket"] request = "Whatever you want to send" startTime = datetime.now() response = "" while not response.endswith("message delimitor"): # happens when response doesn't fit in buffer response += s.recv(BUFFER_SIZE) if (datetime.now() - startTime).seconds > TIMEOUT: raise socket.timeout("Getting end of response took too long. Current data:\n" + response) # Handle response print "Exception in SendMessages; try to reconnect;\n" + str(request)
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764499949.24/warc/CC-MAIN-20230201180036-20230201210036-00665.warc.gz
CC-MAIN-2023-06
6,188
54
https://logsem.github.io/seminar/
code
LogSem Seminar, Autumn 2021 A seminar series on program verification, logic, semantics, type theory, proof assistants and related topics. The presentation format is pretty open. Everyone is welcome to present previous/current work, explain interesting papers, give tutorial talks on topics you find worth sharing. Typically, it’s a 45 min presentation + 15 min discussion, but, of course, flexible. We meet on Mondays from 13:00 to 15:00. Currently all meetings are either in-person or virtual on Zoom. This meeting is organized by Alejandro Aguirre. A preliminary schedule is available below. |March 1, 2021||Martin Bidlingmaier||The multiverse model of dependent type theory| |March 8, 2021||Cancelled| |March 15, 2021||Magnus Baunsgaard Kristensen||A model of Clocked Cubical Type Theory| |March 22, 2021||Philip G. Haselwater||SSProve: A Foundational Framework for Modular Cryptographic Proofs in Coq| |March 29, 2021||No seminar - Easter break| |April 5, 2021||No seminar - Easter Monday| |April 12, 2021||Cancelled| |April 19, 2021||Neel Krishnaswami||Adjoint Reactive GUI Programming| |April 26, 2021||Steffan Sølvsten Jørgensen||Efficient Binary Decision Diagram Manipulation in External Memory| |May 3, 2021||Simon Wimmer||Certification of timed systems model checking: past, now, and future| |May 10, 2021||Guilhem JABER||Complete compositional relational reasoning for state and control| |May 17, 2021||Cancelled| |May 24, 2021||No seminar - public holiday| |May 31, 2021||Dan Frumin||Semantic approach to cut elimination| |June 7, 2021||Alejandro Aguirre||Relational logics for probabilistic programs| |June 14, 2021||Nikolaj Sidorenco||Formal security analysis of MPC-in-the-head zero-knowledge protocols| |June 21, 2021||Cristina Matache||Recursion and sequentiality in categories of sheaves| |September 10, 2021||Troels Henriksen||Making pigs fly: design and implementation of the Futhark language| |September 13, 2021||Cancelled| |September 20, 2021||Maxime Legoupil||Categorical models for focused lambda-calculus| |September 27, 2021||Cancelled| |October 4, 2021||Alban Reynaud||A parametrized bisimulation for interaction trees| |October 11, 2021||Cancelled| |October 18, 2021||No seminar - Autumn break| |October 25, 2021||Boel Nelson||TBA| |November 1, 2021||Jonathan Sterling||TBA| |November 8, 2021||Pierre Cagne||TBA|
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323585997.77/warc/CC-MAIN-20211024111905-20211024141905-00707.warc.gz
CC-MAIN-2021-43
2,345
33
https://www.destructoid.com/steam-beta-update-allows-downloads-while-playing-games/
code
Oh how I’ve been waiting for this Initiating a game on Steam will annoyingly pause all of your active downloads but at least there’s been the option to alt-tab your way back and manually resume downloading. It’s a workaround that shouldn’t need to exist, and Valve is finally making progress here. A recent Steam client beta update adds the option to let games download while a game is running. There’s only one small problem: the feature is on a per-game setting. So it’s still not as seamless a process as it could be. The update also includes improvements to the user interface, Big Picture mode, and the Steam client for Linux — find the list below or at that link. - Add ability to limit what time of day Steam is allowed to automatically update apps - Add option to let other games download while a game is running (this is a per-game setting) - Add download regions for Calgary, Edmonton, Winnipeg, and Ottawa in Canada - Add ‘Copy all text to clipboard’ context menu option in the System Information dialog. Steam client UI - Improve downloading status text at the bottom of the main window - Added ability to opt into game betas and edit launch options - Added Inbox item under Linux if your machine requires a reboot due to OS level updates - Fix infinite loop of Cloud sync error dialogs on game launch - Fixed mouse cursor being visible during startup animation even if it hadn’t moved - Fix paste pasting stale text. - Fix Ctrl+C/Ctrl+V in client-hosted web page text controls. - Fix incorrect foregrounding of a blank window in some -silent startup cases.
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510100.47/warc/CC-MAIN-20230925215547-20230926005547-00095.warc.gz
CC-MAIN-2023-40
1,589
16
http://freecode.com/tags/officebusiness?page=1&with=176&without=
code
For users on Linux and Unix, KDE offers a full suite of user workspace applications which allow interaction with these operating systems in a modern, graphical user interface. This includes Plasma Desktop, KDE's innovative and powerful desktop interface. Other workspace applications are included to aid with system configuration, running programs, or interacting with hardware devices. While the fully integrated KDE Workspaces are only available on Linux and Unix, some of these features are available on other platforms. In addition to the workspace, KDE produces a number of key applications such as the Konqueror Web browser, Dolphin file manager, and Kontact, the comprehensive personal information management suite. The list of applications includes many others, including those for education, multimedia, office productivity, networking, games, and much more. Most applications are available on all platforms supported by the KDE Development. KDE also brings to the forefront many innovations for application developers. An entire infrastructure has been designed and implemented to help programmers create robust and comprehensive applications in the most efficient manner, eliminating the complexity and tediousness of creating highly functional applications. LyX is a document processor that encourages an approach to writing based on the structure of your documents, not their appearance. It is intended for people people who write and want their writing to look great without tinkering with formatting details, font attributes, or page boundaries. On screen, it looks like any word processor, but it uses the TeX engine for printed output and producing richly cross-referenced PDFs. It is stable and fully featured. OIO is a Web-based metadata/data management front-end which is built using Zope and works with Postgresql. No programming is required to build and manage Web-forms or to perform data mining/analysis on the collected data. It is in production at the Harbor/UCLA Medical Center for clinical outcomes management and research data. Forms created with OIO and hosted on any OIO server can be downloaded as XML files. Once downloaded from the "Forms library" and imported into an OIO server, the necessary database tables are automatically recreated and the imported forms become immediately available to the users of that OIO server. gtex-letter attempts to deliver an easy alternative interface to LaTeX-letter. It is heavily configurable, and it supports multiple letter headers and default letter openings (which are configurable in the rc-file). Users can choose from three different levels of graphical interface complexity. Novice is easy to understand, while expert is straight-forward. There is also a non-interactive mode that makes production of standard-letters very fast. gtex-letter is implemented in Python and based on GNOME. VCalSax is a simple Python module for managing scheduler data in XML. It enables loading data from VCalendar files into DOM trees, and to rewrite such trees as VCalendar files. To make such conversions, VCalSax defines a Sax parser which changes the VCalendar format to a specific XML format, and a XSL Transform to build VCalendar files. VCalendar is a standard format for scheduler data used in many calendar software (KOrganizer, Evolution, etc.).
s3://commoncrawl/crawl-data/CC-MAIN-2014-15/segments/1397609533308.11/warc/CC-MAIN-20140416005213-00262-ip-10-147-4-33.ec2.internal.warc.gz
CC-MAIN-2014-15
3,315
5
https://rpg.stackexchange.com/questions/122882/are-temporary-hp-added-to-normal-hp-to-determine-power-word-spells-effects
code
Yes, Temporary HP count for such effects The rules on temporary HP in 3.5 are not as explicitly defined as in 5e, but they do mention how temporary hit points work - by temporarily changing your actual hit point total: When a character gains temporary hit points, note his current hit point total. When the temporary hit points go away the character’s hit points drop to his current hit point total. (From the SRD, section Injury and Death) In other words, your "current hit point total" was actually higher while the temporary hit points were in effect. It is not a seperate, distinct pool, like it is in 5th edition. Power Word spells only reference "hit points", with no special mention of temporary HP. This is the same wording as the rules on temporary HP above, so Power Word spells look at the same, increased amount of hit points.
s3://commoncrawl/crawl-data/CC-MAIN-2020-45/segments/1603107874340.10/warc/CC-MAIN-20201020221156-20201021011156-00105.warc.gz
CC-MAIN-2020-45
840
6
https://www.mobileread.com/forums/showpost.php?p=2128346&postcount=1
code
Greetings to the community! I have a Kobo Touch and would like to make my own epubs for private use. These epubs would contain Japanese and Tibetan. I copied suitable fonts already into the fonts folder and they are available for manual selection. I would, however, like to reference them in the epubs. In this way one could for instance make them both available at the same time in one book. Based on discussions on how to achieve this with the Sony reader, I tried to reference the fonts in the css in this way: font-family: 'Tibetan Machine Uni', serif, sans-serif; font-family: 'Tibetan Machine Uni'; and in the content.opf in this way: <item id="font1" href="TibMachUni-1.901b.ttf" media-type="application/octet-stream" /> This, however, had no effect on the appearance of the book at all. I also tried to specify the path of the scr: url command in various ways. The only result was that with one variant starting with src: url("res:/// - I cannot recall the rest - the reader made a restart whenever I launched the book. Just to clarify, I would rather not like to embed the fonts in each end every epub. Could anybody please hint me in the right direction on how to reference fonts in the correct way? Thank you in advance,
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917122955.76/warc/CC-MAIN-20170423031202-00222-ip-10-145-167-34.ec2.internal.warc.gz
CC-MAIN-2017-17
1,231
10
http://www.dbforums.com/showthread.php?512275-adding-record-to-Address-table
code
I've been banging my head against the wall for a while, so I thought I'd post. It's a bit of explaining, so bear with me. I have a form that show's a patient's information -- name, address, doctor, etc. Right now I'm just trying to get the name and address working, so I have two tables behind the form: a Patient one and an Address one. A simplified version: When the user hits the Add button, a form pops up where they can choose a patient. That patient's name and address goes into the form. Since I don't think it's possible to update 2 tables in a form (i may be wrong), I put code behind the form to check to see if this address is in the Address table (dbo_Address). If it isn't in there, It creates a new record in the Address table with the new address, and an AddressID is created for it (it's an autonumber field). The problem comes when I want to assign the AddressID to the Patient record. I try doing Me!txtAddressID = ![AddressID] but it gives me an error saying "To make changes to this field, first save the record." I try to save the record, but the AddressID is a required field in the Patient table. It says "The Microsoft Jet database engine cannot find a record in the table 'dbo_Address' with matching field 'dboPatient.AddressID." Would a subform with the patient's address be the solution? I've thought about it, but i can't seem to figure it out. I've used subforms with other one-to-many relationships, but it doesn't seem exactly right in this situation. Any help you could give me would be greatly appreciated. If you AddressID field is Autonumber then Access will assign new value automatically. For new addresses you should display blank data entry form and new value of AddressID will be stored in your table, provided you correctly set up link between main form and subform. Yeah, i guess that makes sense. I've got the subform made, and it receives the correct address for existing clients. But do you have any ideas on how I can assign an existing AddressID to a patient that has an address that's already in the Address table? Based on two tables structure you posted here, I don't see any significant benefits for re-using patient addresses. Why don't you enter address for every new patient without re-using already entered ones? How many duplicate addresses do you expect? Several families having the same address? The problem is that these tables are linked from a separate database program, so their setup can't be changed much. We use smart cards for some of our services, so some of the data has to go in via this secondary database. It keeps track of the patient's charts and such. It's a complicated setup, but we're basically trying to link the smart card database with our Access one. Viewing or changing the data from either the Access or Respironics interface is no problem, it's adding a new record in Access that's killing me. If i had the choice, I would just put the address in the Patient table and not worry about the duplicate data, but I don't think that's really an option. When I look at the tables that came with this Respironics database, this Address table is used for the addresses of patients, doctors, insurance providers, etc. Their tables are normalized to all hell -- much more than makes sense, in my opinion. ok, i've got the address thing to work, more or less. I made up the subform, kept it bound to the Address table and linked to the main form, but did all the insertions of new address via code. If a user enters a duplicate address, i've made the AddressID on the main form be set to the existing AddressID. Otherwise a new record is made in the Address table and the ID is set in the main form. I then requery the main form to refresh the links to the subform. The only thing is that when i do a requery to re-link up the subform to the main form, the new record has to get saved and therefore my Undo Record button is basically useless. Is there any way to refresh the subform link without saving the record? Or am i doing something wrong and it's supposed to re-link on its own when i change the value of the AddressID field on the main form? If i make the subform unbound, the link to the main form wouldn't work then, right? And if that's the case, i guess i'd have to manually retrieve the address when i scroll thru existing records, right? I basically kept the subform bound and linked for ease of use while going thru existing records. The appropriate address then stays with the patient. But i'll give your unbound form idea a go. Thanx for the help.
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917123491.79/warc/CC-MAIN-20170423031203-00394-ip-10-145-167-34.ec2.internal.warc.gz
CC-MAIN-2017-17
4,537
18
http://www.ece.utexas.edu/speakers/corina-pasareanu
code
Corina Pasareanu is a researcher at NASA Ames, in the Robust Software Engineering group. She is employed by Carnegie Mellon University, at the Silicon Valley campus. At Ames she is developing and extending Symbolic PathFinder, a symbolic execution tool for Java bytecode. Her research interests include: Model checking and automated testing, Compositional verification, Model-based development, Probabilistic software analysis, Autonomy and Security. She was Program/General Chair for several conferences including: International Conference on Computer Aided Verification (CAV 2015), International Symposium on Software Testing and Analysis (ISSTA 2014), International Conference on Automated Software Engineering (ASE 2011), NASA Formal Methods Symposium (NFM 2009). She is the recipient of a best paper award (HVC 2014), an ACM Impact Paper Award (2010), the ICSE 2010 Most Influential Paper Award, the IBM HVC Conference Award (2007) and an ACM Distinguished Paper Award (2002). She is currently Associate Editor for the IEEE Transactions on Software Engineering (TSE) journal.
s3://commoncrawl/crawl-data/CC-MAIN-2018-26/segments/1529267859817.15/warc/CC-MAIN-20180617213237-20180617233237-00326.warc.gz
CC-MAIN-2018-26
1,080
1
https://docs.adacore.com/live/wave/aws/html/aws_ug/resources.html
code
AWS support embedded resources. It means that it is possible to build a fully self dependent executable. This is useful when distributing a server. The server program contains the code but also the images (PNG, JPEG, GIF), the templates, the HTML pages… more generally any file the Web Server must serve to clients. 10.1. Building resources¶ To embbed the files into the executable you must build a resource tree. This task is greatly simplified using AWSRes tool. For example let’s say that you want to build a simple server with a single page containing some text and one PNG image. The text is handled directly in the callback procedure and contain a reference to the logo.png. To build the resource tree: $ awsres logo.png This will create a set of packages whose root is the unit res by default. The resource tree is created. See awsres tool for the complete AWS’s usage description. awsres can also compress the resource files. This can be done by using awsres’s -z option. Compressed resources are handled transparently. If the Web client supports compression the resource is sent as-is otherwise a decompression stream will be created for the resource to be decompressed on-the-fly while sending it. 10.2. Using resources¶ This is really the simplest step. The resource tree must be linked with your executable, to do so you just have to ‘with’ the resource tree root into one of your program unit. This will ensure that the resource tree will be compiled and linked into the executable. AWS and Templates_Parser know about resource files and will pick them up if available. Note that this is transparent to users. It is possible to build the very same server based on standard files or resources files. The only change in the code is to ‘with’ or not the resource tree. Note that AWS supports only a single resource tree. If more than one resource tree is included into a program only one will be seen. 10.3. Stream resources¶ Users can build a response directly from a stream. In this case the callback answer is built using AWS.Response.Stream. It creates a resource object whose operations have been inherited from AWS.Resource.Stream.Stream_Type and redefined by the user. So the Read operation can dynamically create the result stream data, the End_Of_File operation must returns True when the stream data is out and so on. This feature is useful to let users completely create and control dynamically AWS’s response content. 10.4. awsres tool¶ AWSRes is a tool to build resource files. It creates a root package res by default and a child package for each resource Usage: awsres [-hopqrRuz] file1/dir1 [-uz] [file2/dir2...] packages are named after the actual filenames Display help message. Specify the output directory, by default it is the current directory. - -p name Append the specified prefix to the resource names. Activate recursive behavior. In this mode awsreswill parse recursively all subdirectories. If a directory is specified on the command line then all files in this directory and sub-directories will be added. If a file (possibly a pattern) is specificed on the command line then only files matching in directroy and sub-directories will be added. - -r name Set the root unit name. Default is res. Add following files as uncompressed resources. Add following files as compressed resources.
s3://commoncrawl/crawl-data/CC-MAIN-2021-25/segments/1623487658814.62/warc/CC-MAIN-20210620054240-20210620084240-00050.warc.gz
CC-MAIN-2021-25
3,346
33
https://www.oreilly.com/library/view/scala-for-data/9781785281372/ch01.html
code
Chapter 1. Scala and Data Science The second half of the 20th century was the age of silicon. In fifty years, computing power went from extremely scarce to entirely mundane. The first half of the 21st century is the age of the Internet. The last 20 years have seen the rise of giants such as Google, Twitter, and Facebook—giants that have forever changed the way we view knowledge. The Internet is a vast nexus of information. Ninety percent of the data generated by humanity has been generated in the last 18 months. The programmers, statisticians, and scientists who can harness this glut of data to derive real understanding will have an ever greater influence on how businesses, governments, and charities make decisions. This book strives to introduce ...
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337244.17/warc/CC-MAIN-20221002021540-20221002051540-00719.warc.gz
CC-MAIN-2022-40
762
4
https://pubmed.ncbi.nlm.nih.gov/15729658/?dopt=Abstract
code
Day range (daily distance traveled) is an important measure for understanding relationships between animal distributions and food resources. However, our understanding of variation in day range across species is limited. Here we present a day range model and compare predictions against a comprehensive analysis of mammalian day range. As found in previous studies, day range scales near the 1/4 power of body mass. Also, consistent with model predictions, taxonomic groups differ in the way day range scales with mass, associated with the most common diet types and foraging habitats. Faunivores have the longest day ranges and steepest body mass scaling. Frugivores and herbivores show intermediate and low scaling exponents, respectively. Day range in primates did not scale with mass, which may be consistent with the prediction that three-dimensional foraging habitats lead to lower exponents. Day ranges increase with group size in carnivores but not in other taxonomic groups.
s3://commoncrawl/crawl-data/CC-MAIN-2021-17/segments/1618038072082.26/warc/CC-MAIN-20210413031741-20210413061741-00445.warc.gz
CC-MAIN-2021-17
983
1
https://dev.to/iriskatastic/what-is-your-current-web-development-tech-stack-22ki
code
This is some kind of a poll to understand what is your current tech stack for web development. There are no right or wrong stacks, I just want to know why you choose some technologies over the rest. For example, in the company I worked in we used: In backend development Server – Nginx Frameworks – Ruby on Rails, Hanami, Sinatra, Node.js, Express Databases – MongoDB, Elasticsearch, Solr, Redis, Mysql, Postgres, Neo4j Frontend tech stack Libraries – React.js, Redux, Mobx, Apollo, GraphQL Markup – HTML5, CSS3 Infrastructure and DevOps Configuration, DevOps – Docker, Kubernetes, Terraform, Ansible, Capistrano Hosting – AWS, Heroku, Google Cloud, Microsoft Azure, DigitalOcean Why we use Rails? In a nutshell, Ruby on Rails backend development helps the workload become easier for software architects and developers through the collection of pre-packaged codes that make the development of the backend seamless and fast. It makes the entire programming a lot speedier and more profitable. Talking about other technologies my previous company used in web development: - Node.js because it is perfect for backend development of real-time and chat apps, workforce and facility management apps, web portals and field service apps. - PHP is great for general website development and server-side scripting, as well as supporting WordPress and Drupal projects. Also, it supports a wide range of databases. - React.js framework helps us to develop fast, scalable and simple user interfaces. We use it for stock trading and e-commerce solutions, web-based video conference apps, and other frontend services. React allows us to create large web applications that can change data without reloading the page. What about your web development tech stack?
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500304.90/warc/CC-MAIN-20230206051215-20230206081215-00030.warc.gz
CC-MAIN-2023-06
1,757
20
http://photo.stackexchange.com/badges/23/nice-answer?userid=6291
code
|Nice Answer||Answer score of 10 or more. This badge can be awarded multiple times.| Zds earned this badge 2 times may 31 '12 at 18:49How do I properly do shadowless product photos? oct 18 '11 at 16:51If I have a 18-55mm lens, is there a point in buying a 35mm prime lens?
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368701943764/warc/CC-MAIN-20130516105903-00013-ip-10-60-113-184.ec2.internal.warc.gz
CC-MAIN-2013-20
272
4
https://cloudcannon.com/documentation/host/
code
CloudCannon Hosting provides a preconfigured, fast, and reliable hosting for static websites. There are several of options to externally host your site while keeping the editing experience of CloudCannon. If your site is already on GitHub Pages, you need to connect the repository to CloudCannon. All updates made on CloudCannon are synced to GitHub, which then updates the GitHub Pages website. CloudCannon FTP sends updated files to your configured FTP provider. Another option is ftploy in combination with Git to get all the benefits of source control.
s3://commoncrawl/crawl-data/CC-MAIN-2021-31/segments/1627046154310.16/warc/CC-MAIN-20210802075003-20210802105003-00472.warc.gz
CC-MAIN-2021-31
556
4
https://github.com/lauripiispanen/angular-bacon
code
Make your AngularJS apps even more reactive, by using bacon.js FRP library to process your scope properties. Simply require angular-bacon in your AngularJS module, and both $rootScope and Bacon objects are augmented automatically with the following functions: This function is equivalent to $scope.$watchAsProperty but using $watchCollection instead of $watch, so that changes in Array and Object values are properly detected. Digests a bacon.js observable (stream or property) back to an AngularJS scope property. Attaches an .onValue handler to the observable, which simply $applies the property in the selected scope with the selected key. Digests multiple bacon.js observables at once. Simple syntactic sugar, when multiple observables are involved. observables is a map with object keys representing $scope property names into which the observables are digested into. Subscribes to scope hierarchy events as Bacon.EventStream. event is a name of the event. Created stream will contain AngularJS scope event objects, augmented with an .args property, containing a list of all additional arguments passed in the $emit call. For examples, see here. This example somewhat mimics raimohanska's awesome bacon.js tutorials: it features a simple login validation form, where a slow backend "is-nickname-taken" check is simulated by a stream with a 5-second delay. In addition, the two selected passwords must match, and be at least five characters long before the submit button is enabled. Use $evalAsync instead of $apply when digesting streams to scopes. This change is potentially backwards-incompatible for code that relies on synchronous digestion of streams. Fix issue with root scope digest already in progress when digesting streams in directives. Augment isolate scopes with angular-bacon functions. Add package.json main module. Fix issue with end of bus not having its scope bound correctly on scope destruction callback. Bump bacon.js to newer version. Add $watchCollectionAsProperty(). Requires Angular 1.2+. End $watchAsProperty() streams and unsubscribe .digest() listeners when scope is destroyed. Add MIT License.
s3://commoncrawl/crawl-data/CC-MAIN-2018-34/segments/1534221210387.7/warc/CC-MAIN-20180815235729-20180816015729-00686.warc.gz
CC-MAIN-2018-34
2,127
19
http://forums.materiamagica.com/topic/35244-v43-beta-game-addition-religion/
code
Religion will be for more than roleplaying; each Power has a shrine in the Sigil Underground. Each shrine is all NPK, as is the entirety of the Sigil Underground. The shrines have a standard design, to permit easy navigation. Approximately 150 rooms, the followers of the shrine's Power can use shortcuts to traverse through the shrine easily, while everyone else is forced to wind their way through twisty, long passages. Built-in weapons and traps allow the followers of the shrine's Power to repel invaders. At designated, periodic times, shrines will be subject to attack by members of competing religions. Each shrine has 4 emblematic control points, such as a giant salamander or a void demon. These 4 control points start out in the possession of the religion whose shrine they are in, but they may be corrupted by the presence of members of other religions. each control point has 250 integrity; every tick, for every member of a competing religion in that control point's room, one point of integrity is gained by that religion, and all other religions lose one integrity for that point. members of the control point's native religion cause the control point to regain integrity at a rate of 3 points per tick. a control point's integrity is not changed when combat is occurring in its room. when a competing religion reduces a control point's integrity to 0, that control point is lost. At the end of the duration during which shrines are attackable, a tally of which religions were able to maintain their control points and conquer the control points of other factions is made. For every control point a given religion took over, they earn 1 Power Standing for their religion; for every control point lost, they lose 1 Power Standing. Having a good Power Standing is useful for unlocking powerful new religion-based spells. Each religion has 3 special, religion-only spells. Each spell has a certain Power Standing requirement that must be met in order for it to be used. examples include Megalith, a Maradas utility spell that blocks an exit with a monolith for a few ticks or until it is dug through, and Magnetic Field, Vandyne's defensive armor spell that passively pulls off opponents' armor during battle. Religion will be open to players of all levels, and non-archon players will have special roles in attacking and defending shrines. There are traps and NPCs to assist in shrine combat, but PK is the driving force behind the dynamic. To roughly balance out the distribution of followers among religions, there will be a dynamic to divide each religions' spells' power by the number of followers relative to the number of other religions' followers. tl, dr: A new religion command will be added. You can follow gods. making your god powerful will confer religion-based spells. players of the same religion have a shrine that they defend, and attack other religions' shrines at certain times. conquering other religions' shrines unlocks more powerful religion-based spells.
s3://commoncrawl/crawl-data/CC-MAIN-2020-10/segments/1581875146485.15/warc/CC-MAIN-20200226181001-20200226211001-00222.warc.gz
CC-MAIN-2020-10
2,992
6
http://www.i-programmer.info/news/89-net/704-silverlight-diagram-component.html
code
The yFiles for Silverlight diagramming library provides a range of new capabilities for Silverlight applications that takes us well beyond pie charts and histograms - this is serious diagramming! The oddly named yFiles library for Silverlight is a new product from the similarly named yWorks that is worth looking at if you have a need for sophisticated and, as far as possible, automatic diagramming. The important point is that this is not just a statistics charting package but something that can create fairly complex network diagrams. It has algorithms for client-side automatic diagram layout and graph analysis. It also comes with a viewer component for visualizing and editing diagrams. yFiles attempts to find good automatic layouts of diagrams that, in the samples at least, look very complex including large UML diagrams, flowcharts, business process diagrams, organization charts, family trees, biological pathways, social networks, and so on. It is also claimed that the component is fast enough to deal with very large diagrams. It also includes graph and network analysis algorithms such as shortest path detection and connectivity analysis which are used to analyse the features that are relevant to the layout problem. The best way to see the range and sophistication level of the diagrams that yFiles tackles is to have a look at the samples in the web gallery. For a demonstration visit:http://www.yworks.com/products/yfilessilverlight and a 30 day evaluation is also available for download. Pricing starts at $4,900. More information from: http://www.yworks.com/
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917122865.36/warc/CC-MAIN-20170423031202-00497-ip-10-145-167-34.ec2.internal.warc.gz
CC-MAIN-2017-17
1,582
5
http://research.baidu.com/baidu-research-announces-new-open-source-deep-learning-benchmark/
code
Today at the O’Reilly AI Conference in New York, Baidu Research announced DeepBench, the first open source benchmarking tool for evaluating deep learning performance across different hardware platforms. The announcement was made during a presentation by Greg Diamos and Sharan Narang of Baidu Research’s Silicon Valley AI Lab. “Deep learning developers and researchers want to train neural networks as fast as possible. Right now we are limited by computing performance,” said Dr. Diamos. He added: “The first step in improving performance is to measure it, so we created DeepBench and are opening it up to the deep learning community. We believe that tracking performance on different hardware platforms will help processor designers better optimize their hardware for deep learning applications.” “DeepBench will help organizations – from startups to large companies – identify the optimal hardware platform for their deep learning applications,” said Mr. Narang. “Researchers can contribute new operations to DeepBench as they develop new algorithms, which will provide them with a voice to communicate their performance needs to hardware designers.” For more information, see our GitHub
s3://commoncrawl/crawl-data/CC-MAIN-2018-17/segments/1524125936914.5/warc/CC-MAIN-20180419110948-20180419130948-00348.warc.gz
CC-MAIN-2018-17
1,214
6
http://cluster.ischool.drexel.edu/manual/ibm/9atcauth.htm
code
If you enable client authentication, the server validates clients by checking for trusted certificate authority (CA) root certificates in the local key database. For each virtual host, choose the level and the type of client authentication. - Specify one of the following values in the configuration file on the SSLClientAuth directive, for each virtual host stanza . A virtual host stanza represents a section of the configuration file that applies to one virtual host. ||The server requests no client certificate from the client. ||The server requests, but does not require, a client certificate. If presented, the client certificate must prove valid. ||The server requires a valid certificate from all clients. For example, SSLClientAuth required If you want to use a certificate revocation list (CRL), add crl, as a second argument for SSLClientAuth. For example: SSLClientAuth required crl. - Save the configuration file and restart the server. - Specify one of the following directives in the configuration file, for each virtual host stanza: - Save the configuration file and restart (Back to the top)
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296949689.58/warc/CC-MAIN-20230331210803-20230401000803-00173.warc.gz
CC-MAIN-2023-14
1,108
20
http://forums.gideontech.com/index.php?topic=36210.0
code
Up for sale so I can make some room. I ship via USPS w/delivery confirmation to the lower 48 states. - (1) VZW Curve 8330 - this phone is absolutely mint. It has always been wrapped with a BestSkinzEver full body clear wrap and a OEM Blackberry silicone skin. I can load any version of the OS for the Curve you want on here, even hybrids. Just bear in mind hybrids are a mash up of other OS versions, so you will take that risk of something possibly not working. Original box, cables, charger, manual, etc. are included. I'll throw in a 2GB microSD card to get you started. $100 shipped - (1) MSI Geforce 6600GT - PCI-e with 128MB ram. Has DVI and VGA outputs. This used to be in my HTPC, but was upgraded a while back. No box or cables, bare card only. $25 shipped - (1) Creative Audigy 2 ZS PCI - bare card, no box or cables. Perfect if you have crappy on-board audio and don't feel like upgrading the entire mobo. $15 shipped - (1) Hynix PC2700 256MB DDR SODIMM 333Mhz CL2.5 - upgrade your old laptop? $5 shipped - (1) Elpida PC2-6400 1GB DDR2 SODIMM - upgrade your new laptop? $15 shipped
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917120349.46/warc/CC-MAIN-20170423031200-00496-ip-10-145-167-34.ec2.internal.warc.gz
CC-MAIN-2017-17
1,092
7
http://mags.acm.org/networker/200806?pg=41
code
A SEAMLESS END-USER EXPERIENCE ISN’T ONLY ABOUT TECHNOLOGY— IT IS ALSO ABOUT COORDINATION, AND BUSINESS RELATIONSHIPS. tional cube, grouping windows, and task switching with live previews, can offer real The official name of Linux’s 3D desktop is “compiz,” but in its effort to present a friendly face on nerdy underpinnings, Ubuntu calls it “desktop effects.” The 3D desktop is not enabled on install, but you can find it in the appearances control panel. I clicked to enable desktop effects. And in just a few seconds, ta-da—”desktop effects could not be enabled.” My laptop uses a video card by ATI, one of the largest such vendors. It is definitely new enough to handle 3D acceleration. When I installed Ubuntu, it automatically chose drivers for the ATI card, but these drivers do not support desktop effects. To use desktop effects, I would need to install the “official” drivers by ATI. Reading the directions at ATI’s website, I would need to download the source code to the drivers, download the Ubuntu packages for compiling programs, and then compile the drivers myself. Oh, fun. It turns out that there is a handy third-party app—named Envy—that does all this work for you. Using Envy, I had the official ATI drivers installed in a couple of clicks. My desktop effects were enabled. I was happy, albeit a little fatigued. Linux advocates—or apologists, depending on your point of view—will tell you why all of these problems came up. Usually, the answer is because it is the software ven- dor’s fault. After all, how is Ubuntu responsible for the shortcomings of Adobe or ATI in making their Linux software easier to install? Technically, this argument is correct. But as a user, I don’t care about those things. I just want stuff to work. And this is where creating a seamless end-user experience isn’t only about technology—it is also about coordination, and business relationships, and all the logistics work that go into making sure all of the pieces of the puzzle are actually in the box the puzzle comes in. Today, this remains Linux’s biggest challenge on the desktop. There is a disconnect between what users want and need, and what Linux vendors can deliver—even Ubuntu. But the gap is narrowing, and for some people Ubuntu might already offer everything they need. It does for my mother. She uses it every day to shop on EBay and read her Gmail, without even knowing what it is, and I no longer have to clean malware from her machine. And I use Linux every day, too. Despite the initial hassles, I now boot my laptop into Ubuntu rather than Vista nine times ou~t of ten. It’s getting there. So…very...close. Permission to make digital or hard coPies of all or Part of this work for Personal or classroom use is granted without fee Provided that coPies are not made or distributed for Profit or commercial advantage and that coPies bear this notice and the full citation on the first Page. to coPy otherwise, to rePublish, to Post on servers or to redistribute to lists, requires Prior sPecific Permission and/or a fee. © acm 1091-556/08/0600 $5.00
s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386164641332/warc/CC-MAIN-20131204134401-00063-ip-10-33-133-15.ec2.internal.warc.gz
CC-MAIN-2013-48
3,120
62
https://www.itprotoday.com/office-365/microsoft-enables-guest-access-office-365-groups
code
Office 365 Groups were introduced by Microsoft last fall as a collaboration tool that would bring together team members as they work on a specific project. Members of the group have access to a shared inbox, files and notebooks which allow any team member to be fully up to speed with the progress on the work at anytime. The use of Office 365 Groups for collaboration is great however, the reality of the business world today is that we work with many different organizations, contractors and individuals that are outside of our companies. Well this week Microsoft is removing that hurdle to team collaboration by making guest access possible for Office 365 Groups in a phased roll out. "Starting today, group owners can add guests to a group in Outlook on the web. Once added, guests receive a welcome email, are granted access to group files in SharePoint Online, begin receiving email messages and calendar invites sent to the group, and can access the group in Office on the web and the Outlook Groups mobile application. They also have automatic access to cloud-based file attachments. Guests have the option to leave the group at any time and visual indicators remind all members of guest participation in the group across all Outlook experiences." According to Microsoft guest members of your Office 365 Groups can use any business or consumer email account but if that email address is not already tied to a Microsoft Account they will have to create one to become a guest member of your group. This video from the Office Team gives you more information about how Office 365 Groups work in general: Looking for an awesome, no-nonsense technical conference for IT Pros, Devs, and Devops? Check out IT/Dev Connections!
s3://commoncrawl/crawl-data/CC-MAIN-2018-47/segments/1542039741151.56/warc/CC-MAIN-20181112215517-20181113001517-00080.warc.gz
CC-MAIN-2018-47
1,725
8
http://www.1emulation.com/forums/topic/2742-barnitos-giri-giri-hack-updates/
code
We are currently not able to get the emulator to see CD-R burns of games. The bios checks for the outer security ring that is only on Saturn disks and is impossible for CD Writers to reproduce. Anyone who has a Saturn BIOS that has been modded, please email me below. We need help compiling our compatibility list. When you test out a game, post the results at http://barnitos.1emulation.com,or send an email to [email protected] include the name of the game, its country, whether it accepted controller and/or keyboard input, whether it loaded at all, and if there were any graphical/audio glitches.
s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376831933.96/warc/CC-MAIN-20181219090209-20181219112209-00266.warc.gz
CC-MAIN-2018-51
613
1
http://www.avsforum.com/forum/149-blu-ray-players/1235612-official-samsung-bd-c5500-master-owner-s-thread-2.html
code
I have tried reading in other threads about the various audio stream options, but haven't figured out what's best for my setup. I have the HDMI from my 5500 going to my TV. The TV is used for audio probably 90% of the time, since my wife and kids don't care about 5.1 sound, and it annoys my wife if when you adjust the volume, you don't see feedback indicated on the TV screen. The TV is a Vizio SV420XVT. I have the optical output from the 5500 going to my ancient Yamaha RX-V540 receiver, it handles DTS and that's about it. From the chart in the manual, it looks like the only way I can get 5.1 using the optical output to my receiver is if I set the 5500 to Bitstream(re-encode). Is there any disadvantage to doing this, in terms of what is going to the TV when watching it without the AV receiver? I don't see anything in the TV manual about decoding DTS, though I get sound from the TV speakers. Ideally I'd upgrade my AVR to something more modern with HDMI and run everything thru it. Would be sweet if using HDMI passthru would display the volume setting on the TV screen, are there any AVR's that do that?
s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187820487.5/warc/CC-MAIN-20171016233304-20171017013304-00652.warc.gz
CC-MAIN-2017-43
1,115
5
http://stackoverflow.com/questions/9757891/adding-an-if-statement-in-mysql-queries-if-there-are-no-more-entries-to-load
code
sorry for the convoluted question. The issue I'm having is is there a way to add a conditional in the form of an if statement or similar function to check if when a mysql query is run, if there aren't any rows/data entries left? Basically how my site is set up is I've got a Twitter-esque blog page. On the site is displayed a bunch of posts descending by date added, which are all taken from a database. By default the page starts off displaying only 8 posts, with a "Click for more" button which then runs an Ajax function, loading in 5 more database entries, which you can keep clicking to load in more posts. Is there any way to check if there aren't any more data entries available? Basically what I want to do is have the "click for more" button to disappear when all of the database entries have been displayed/queried. Searching around hasn't done me any good, thanks for any help! :D
s3://commoncrawl/crawl-data/CC-MAIN-2014-49/segments/1416400373050.63/warc/CC-MAIN-20141119123253-00049-ip-10-235-23-156.ec2.internal.warc.gz
CC-MAIN-2014-49
892
3
https://slashdot.org/~Raisey-raison
code
How would we get a significant number of people to this planet? We would need to apply and quickly adapt the most cutting edge technology to survive - would we only take scientists, engineers and mathematicians? How would we successfully synthesize soil quickly enough? How would be know what kind of weather patterns to expect and how would we cope with them? Category 5 hurricanes could be a daily occurrence. Would we get enough sunlight? How would we make sure the temperatures do not exceed tolerable limits? Why not stay here on earth and gradually reduce the human population to around 500 million people. 500 million people could maintain a high standard of living without making Earth uninhabitable. We could allow large areas such as South America to go back to being forests and live in those areas that are most conducive for human life. And we could use space technology to mine asteroids to provide additional raw materials. We could even start removing excess carbon dioxide from the atmosphere and eventually bring it down to historic levels. 500 million people are few enough that we could all eat a lot of meat and it still would be sustainable. And we need a conversation about who does and does not care. The Middle East does not care about the planet. Neither does India or China or Indonesia or most of Africa. India's population has almost caught up with China. Regardless of reducing the world population or escaping the planet, how would we do this if most of the planet is not on board?
s3://commoncrawl/crawl-data/CC-MAIN-2016-50/segments/1480698541556.70/warc/CC-MAIN-20161202170901-00087-ip-10-31-129-80.ec2.internal.warc.gz
CC-MAIN-2016-50
1,512
3
http://sourceforge.net/u/tomasbisciak/profile/
code
Error: CSS did not load. This may happen on the first request due to CSS mimetype issues. Try clearing your browser cache and refreshing. Manage your website and any other passwords.Safely Encrypted Create Lazy to-do list just by typing anywhere. Trading journal for Currency,Stock,Commodity traders
s3://commoncrawl/crawl-data/CC-MAIN-2015-14/segments/1427131298177.21/warc/CC-MAIN-20150323172138-00050-ip-10-168-14-71.ec2.internal.warc.gz
CC-MAIN-2015-14
299
6
https://ohsem.me/2020/06/tech-i-s-fixes-the-e-learning-bug-by-filling-the-gap-between-the-new-age-e-learning-and-old-school-learning/
code
TOKYO, June 12, 2020 /PRNewswire/ — Due to COVID-19 pandemic, lots of business operations and services took a hit and it is totally unclear when these operations will resume normalcy. Many people use the isolation time to learn new things and acquire new skills, as a result Edu-Tech is booming in this pandemic situation. However, E-Learning has one problem. Almost 95% of candidates or students give-up due to lack of guidance of coding or motivation. To solve this problem, TECH I.S. offers programs where students can get on a Zoom call with tutors and learn programming and they can also get career guidance from their dedicated consultant so they can start their professional career as programmers once they complete their course. As a global programming school curated to fill the void in the Edu-Tech space, TECH I.S. has three branches in Silicon Valley (USA), Tokyo (Japan) and Bengaluru (India). The majority of the curriculum is made by Silicon Valley engineers, which includes Web Application Development and Data Science course. TECH I.S. was started from Japan as an offline programming school and helped over 300 students to become professionals in the Information Technology industry with industry-relevant curriculum and to make a professional web application portfolio. TECH I.S. is on a mission to fill the gap between the new age E-learning and old school learning to make online learning more simple and efficient. With increasing practice of social distancing, online learning from a tutor becoming the better alternate mode of education. TECH I.S. is currently operating from India and Japan, the tutors are based out of Bangalore, Tokyo, and Silicon Valley. The programs are available for anyone who has the passion to become a programmer. TECH I.S. offers Full-Time as well as Part-Time curriculum for 3 months and 6 months respectively. View original content to download multimedia:http://www.prnewswire.com/news-releases/tech-is-fixes-the-e-learning-bug-by-filling-the-gap-between-the-new-age-e-learning-and-old-school-learning-301074828.html Source: TECH I.S.
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817491.77/warc/CC-MAIN-20240420060257-20240420090257-00070.warc.gz
CC-MAIN-2024-18
2,090
7
http://flamory.com/en/integrations/app/amplifyjs
code
Flamory provides the following integration abilities: To automate your day-to-day AmplifyJS tasks, use the Nekton automation platform. Describe your workflow in plain language, and get it automated using AI. Flamory helps you capture and store screenshots from AmplifyJS by pressing a single hotkey. It will be saved to a history, so you can continue doing your tasks without interruptions. Later, you can edit the screenshot: crop, resize, add labels and highlights. After that, you can paste the screenshot into any other document or e-mail message. AmplifyJS is a set of components designed to solve common web application problems with a simplistic API. Amplify's goal is to simplify all forms of data handling by providing a unified API for various data sources. Amplify's store component handles persistent client-side storage, using standards like localStorage and sessionStorage, but falling back on non-standard implementations for older browsers. Amplify's request adds some additional features to jQuery's ajax method while abstracting away the underlying data source. Integration level may vary depending on the application version and other factors. Make sure that user are using recent version of AmplifyJS. Please contact us if you have different integration experience.
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474659.73/warc/CC-MAIN-20240226094435-20240226124435-00352.warc.gz
CC-MAIN-2024-10
1,285
5
http://www.greenplum.com/industry-buzz/data-heroics?page=1
code
RT @sherylchamb: Paul Maritz vision for cloud comes alive @gopivotal #emcworld keynote delivers 10:34 AM May 7th via Twitter for iPhone RT @gopivotal: EMC's Pivot Point: the birth and vision of Pivotal @Forbes http://t.co/s43ALwwhxS @VMware @EMCcorp @CETAS @cloudfoundry 9:54 AM May 3rd via HootSuite FOLLOW GREENPLUM: Facebook Twitter LinkedIn EMC2, EMC, Greenplum, Greenplum Chorus, and where information lives are registered trademarks or trademarks of EMC Corporation in the United States and other countries. © 2009-2012 EMC Corporation. All rights reserved.
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368697552127/warc/CC-MAIN-20130516094552-00096-ip-10-60-113-184.ec2.internal.warc.gz
CC-MAIN-2013-20
564
6
https://explore.glasp.co/?url=www.mckinsey.com%2Fcapabilities%2Fmckinsey-digital%2Four-insights%2Fa-smarter-way-to-jump-into-data-lakes
code
An agile approach to data-lake development can help companies launch analytics programs quickly and establish a data-friendly culture for the long term. it can be time consuming and complicated to integrate data lakes with other elements of the technology architecture, establish appropriate rules for company-wide use of data lakes Companies should instead apply an agile approach to their design and rollout of data lakes—piloting a range of technologies and management approaches and testing and refining them before getting to optimal processes for data storage and access. Stages of data-lake development Glasp is a social web highlighter that people can highlight and organize quotes and thoughts from the web, and access other like-minded people’s learning.
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100527.35/warc/CC-MAIN-20231204083733-20231204113733-00113.warc.gz
CC-MAIN-2023-50
768
5
https://hci.icat.vt.edu/news/chci-alumni-highlight--mohamed-magdy-farag.html
code
CHCI Alumni Highlight: Mohamed Magdy Farag March 14, 2022 Dr. Mohamed Magdy Farag is a Research Associate at the Center of Sustainable Mobility at the Virginia Tech Transportation Institute. He is working on developing intelligent large scale traffic simulation with vehicular networks. His dissertation and related research with Ed Fox (Advisor) and the Digital Library Research Lab was about developing intelligent large scale web information retrieval systems (event focused crawlers) about crisis/disaster events. During his work with the Center on the NSF funded projects “Crisis, Tragedy and Recovery Network'' (CTRnet) and “Integrated Digital Event Archiving and Library” (IDEAL), he was able to develop an intelligent web information retrieval system to collect relevant information related to crisis events. He also was able to learn and use the Hadoop Big Data system for large scale social media analysis.
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506623.27/warc/CC-MAIN-20230924055210-20230924085210-00336.warc.gz
CC-MAIN-2023-40
922
3
http://terrytlslau.tls1.cc/2014/09/migrating-file-servers-in-same-domain.html
code
How to migrate a non-DFS file servers? We will talk about the high level migration steps to migrate Windows File Server Role to a new Windows Server in the same domain. First of all, make sure both file servers were joined to a same domain. Then, administrators can check which folders are sharing by using "Computer Management" or performing "net share" on "Command Prompt". Remark: ADMIN$, IPC$, C$ are default share of file servers. After that, administrators can perform "Robocopy" to copy the folder with NTFS permissions from old server to new server or use backup software to back up and restore the folder and file with the same NTFS permissions to a new server.
s3://commoncrawl/crawl-data/CC-MAIN-2017-22/segments/1495463607369.90/warc/CC-MAIN-20170523045144-20170523065144-00009.warc.gz
CC-MAIN-2017-22
670
4
https://forums.babypips.com/t/from-forex-dummy-to-top-tier-trader-forex-fibonacci-trading-secret-part-1/254837
code
Fibonacci analysis will help you to be top tier trader from Forex dummy trader. Fibonacci analysis is the study of identifying possible support and resistance levels in the future based on previous price trends and reversals. Fibonacci analysis is established on mathematical pattern discovered by Leonardo Pisano—also known as Fibonacci. Fibonacci is credited with finding a sequence of number pattern, which is named after him: The Fibonacci sequence. The Fibonacci sequence is a series of numbers that progresses as 0,1,1,2,3,5,8,13,21,34,55…. The sum of the two preceding numbers becomes each subsequent number in the sequence. For example, you add 21 +34 (the two preceding numbers) to arrive at the number that follows 34 in the sequence. The sum of 21 +34 is 55, which is the next number in the sequence. The groundbreaking part of Fibonacci sequence is that there is a specific ratio between the numbers. Each sequence in Fibonacci sequence is 1.618 times larger than the previous number. For example, 34 is 1.618 times larger than 21 (34 ÷ 21 = 1.618). Fibonacci ratios are commonly used in the forex market with the following analysis tools: When a currency pair reverses trend, it is natural to wonder how far the pair is likely to move towards new direction. That’s when Fibonacci retracement levels become handy tool. Specific Fibonacci ratios are useful to determine the new behavior against previous trend. The ratios are helpful for you to find the following retracement levels: Calculated by dividing a number in the Fibonacci sequence by the third number following it in the sequence (21 ÷ 89 = 23.6%). Calculated by dividing a number in the Fibonacci sequence by the second number following it in the sequence (34 ÷ 89 = 38.2%). Calculated by finding the middle between 61.8 % and 38.2 % ((61.8% + 38.2%) ÷ 2 = 50%). Calculated by dividing a number in the Fibonacci sequence by next number (55 ÷ 89 = 61.8%). Calculated by finding the distance from 38.2 % and 23.6 % (38.2% – 23.6% = 14.6%) and adding it to 61.8 percent (61.8% + 14.6% = 76.4%). Calculated by finding where the previous trend began. Determining all six Fibonacci retracement levels gives potential support and resistance levels that you can utilize in your forex trading. See how Fibonacci levels can be used on the daily GBP/USD chart below. The levels were illustrated along with the trend highlighted by the red arrow. You can use each level to help you determine the entry and exit point as the currency pair began to turn around and move lower. Starting from Mid-June, see how the price of the currency pair moved up and down, bouncing off of these support and resistance levels for months, until finally going back up above the high established in late July by the previous trend (also known as the zero percent level) in late October.
s3://commoncrawl/crawl-data/CC-MAIN-2019-47/segments/1573496665521.72/warc/CC-MAIN-20191112101343-20191112125343-00344.warc.gz
CC-MAIN-2019-47
2,840
17