url
stringlengths
13
4.35k
tag
stringclasses
1 value
text
stringlengths
109
628k
file_path
stringlengths
109
155
dump
stringclasses
96 values
file_size_in_byte
int64
112
630k
line_count
int64
1
3.76k
https://social.mootech.eu/@maxine/109370850196107154
code
Anyone knows an instance with "living latex creatues" as a theme, or pretty adjacent to that? @maxine rubber.social has most of the rubber kink people, and a bunch of furries too. @wawik I relayed it to them, thanks for the help <3 Small, friendly instance for friends. Come join us and be cute and soft and small and cute.
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224652494.25/warc/CC-MAIN-20230606082037-20230606112037-00187.warc.gz
CC-MAIN-2023-23
323
4
https://redcircle.blog/2006/10/26/project-pictor/
code
As you may have heard, we have a project code-named Pictor. This project is derived from work done with Boeing to improve the responsiveness of OpenGL three dimensional drawing programs (CATIA). The Boeing/Citrix project (codenamed K2) was a large success and proved not only that it was possible to greatly improve the performance, it actually made sense to progress this software to a much wider audience. I have my own history with what I would call graphics intensive applications. When I was first working as a systems engineer reseller in Brisbane in 1997, our little company was approached by a local engineering company. I believe they make custom car parts and it was very interesting how they went about it. They were a fairly big operation and very professional. Our salesman (as expected) over-promised what WinFrame could do. The thoughts were that it should be possible to remote CAD images over ICA. Somehow, I was supposed to get this working. It became pretty obvious that with no amount of tweaking would it be possible to run decent CAD across ICA. So, that was the common conclusion of most people between 1995 and now that it just was not possible to do intensive graphics remoting. The exception being programs being designed this way from ground up (like 3D games). Now, a group a Citrix has proven it possible to remote existing applications without change. It is not just a demo, it is a working system being used at Boeing. In this case, the hype actually understates the possible reality. The reason I’m writing this is to drum up some interest in Pictor. First, I want you to know it exists. Second, I want you to tell everyone that you want it (if you want it). If you stay silent, there is a good chance that Citrix will focus on other items on the agenda. If you prefer, leave me a comment and I’ll forward it to the relevant people. If the project goes ahead in the near term, it will most likely be based out of Sydney, Australia. I know one of the core developers and I’m sure he’d love to hear what you have to say.
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500628.77/warc/CC-MAIN-20230207170138-20230207200138-00104.warc.gz
CC-MAIN-2023-06
2,058
7
http://lists.xml.org/archives/xml-dev/200202/msg00967.html
code
Lists Home | Date Index | And that works because they are scripting to a common object model made common by a common browser. IE rules. That makes it work for the non-nerd. Then when they want to go a little deeper, there is no shortage of examples starting with View Source. Cut and paste and move on. Some will want Web Service programming to work like that and with the toolkits, it sort of does once past the legalities. But: 1. The average hacker isn't programming against a db server. If he is and doesn't understand ODBC, no amount of HTML is helpful. Sure, there can be other kinds of DBs, but something is handling the connection string, building SQL statements, training the non-nerd about relational table schemas, child 2. A web service past the hype implies someone may be a public site with laissez faire use, but some kind of policy has to be in place. I think these issues are the same without regard to REST So I am back to wondering why REST over RPC. My intuition is that average non-nerds don't build web services without toolkits. If it comes down to the toolkits, again, code is on the loading docks as Dave says. I have to assume (maybe wrongly) that all those global specifications (WS-Inspection, Signature, etc.) are there for a reason and will work reasonably well. From: Mike Champion [mailto:[email protected]] 2/18/2002 11:38:41 AM, "Bullard, Claude L (Len)" <[email protected]> wrote: >Do you really think the average office worker knows what the ><!DOCTYPE at the top of an HTML file is for? I don't. OTOH, >they don't code them. OK, I got carried away with the "average office worker" and HTML ... but I do think that lots of non-nerds learn enough HTML to tweak their homepages or weblogs, and simply ignore (and don't touch) the stuff they don't understand. I see my 9 year old doing it to tweak postings on a kids website (neopets.com), FWIW, without any prompting or explanation from me. Likewise with URIs; I can more easily imagine an "average" person accessing a Web service by tweaking a big ugly URL and putting the result in a frame or a table or formatted with CSS than I can imagine them buying VS.NET, installing some out when they must use XML-RPC and when they must use SOAP, etc. Anyway, I offer this as only "the only scenario under which RPC could decisively lose", not a prediction that it will happen.
s3://commoncrawl/crawl-data/CC-MAIN-2021-17/segments/1618038078900.34/warc/CC-MAIN-20210414215842-20210415005842-00245.warc.gz
CC-MAIN-2021-17
2,367
48
https://forums.adobe.com/thread/567441
code
Is there a way to customize the VideoDisplay component? I'd like to be able to create something like the YouTube volume control with VideoDisplay - when hover the mouse above the speaker icon the volume control pops up. Further I'd like to be able to add a small custom menu that pops up again on mouse hover. If that is possible please point me to the right direction. If not than what could be done and how.
s3://commoncrawl/crawl-data/CC-MAIN-2018-30/segments/1531676589634.23/warc/CC-MAIN-20180717090227-20180717110227-00359.warc.gz
CC-MAIN-2018-30
409
3
http://androidforums.com/htc-magic/14159-weird-1-6-update.html
code
November 5th, 2009, 05:20 AM Thread Author (OP) Join Date: Nov 2009 Carrier: Not Provided Thanked 0 Times in 0 Posts Weird 1.6 update I'm new to the forums so Hi. Anyway I recently got hold of a vodaphone G2...and am using my o2 simcard (based in the UK) (on the 1.5 software version) All works fine and everything is hunky dory..apart from MMS's. So my first problem is that I cant send/receive MMs's. I could on my previous phone but on my g2 it wont let me do a thing. I just seems to do nothing. I rang o2 and my settings are set up correctly for me to send/receive MMs's) Any suggestions? My second problem...is that now I have updated to 1.6 my browser doesn't work at all. (It worked fine when on 1.5) Gmail syncs fine but the browser just does nothing. Every now and again it might load to the google homepage, otherwise I get 'Webpage not available'. Ive put in the correct o2 settings into the APN settings...the same ones that were in it before, so assumed it would work fine, but it doesn't. Does anyone have any suggestions as to why now Ive updated the software I now cant use the browser. Im not hugely geeky/techy so the less geeky/techy talk the easier it will be for me to follow. hehe Thanks in advance. Last edited by k888tie; November 5th, 2009 at 05:24 AM. Reason: Forgot to say I was from the UK
s3://commoncrawl/crawl-data/CC-MAIN-2014-41/segments/1410657132025.91/warc/CC-MAIN-20140914011212-00140-ip-10-196-40-205.us-west-1.compute.internal.warc.gz
CC-MAIN-2014-41
1,318
16
https://blog.devsense.com/2024/intelliphp-for-intellij-eap
code
UPDATE (March 2024): IntelliPhp for IntelliJ is publicly available at plugins.jetbrains.com. Today, we're releasing a preview version of full-line AI completions for IntelliJ (and PhpStorm). Try IntelliPHP for IntelliJ. It's a neat plugin for IntelliJ (and PHPStorm) with machine learned code suggestions, working fully locally, providing suggestions instantly, not requiring Internet connection! In order to install the plugin from Early Access Program, follow the steps on plugins.jetbrains.com/docs/marketplace/custom-release-channels.html Go to Setting / Plugins, and add Custom Plugin Repository: As you type, IntelliPHP generates a most probable line completion and offers it as an in-line suggestion. Confirm it with TAB key, and the suggestion gets inserted. The plugin does it all locally, within milliseconds, on your machine, without any Internet data transfer. We're happy about this new achievement. IntelliPHP for IntelliJ enhances productivity, works instantly, does not interfere with your regular work flow, and once you get used to it, it greatly helps building your code.
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296816977.38/warc/CC-MAIN-20240415111434-20240415141434-00066.warc.gz
CC-MAIN-2024-18
1,090
8
http://www.linuxquestions.org/questions/linux-newbie-8/linux-rescue-help-needed-no-corresp-bios-drive-379884/
code
Linux Rescue - Help Needed - No Corresp. BIOS Drive? I am running Red Hat EL 4. Recently my system crashed. When I tried rebooting, I got a Boot Failure message. I have since booted up from my Red Hat installation disk #1. I typed 'linux rescue' to begin the system recovery process. I was able to successfully mount /mnt/sysimage.........so I thought I was in luck. My plan was to reinstall GRUB since the rest of the file system is intact. However, when I try to run the 'grub-install', I get this error message: "hdb does not have any corresponding BIOS drive." I get this error message on any of the partitions I try the grub-install on. I'm stumped at this point. Can anyone advise?? Much thanks in advance. Josh in Tampa
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917122992.88/warc/CC-MAIN-20170423031202-00470-ip-10-145-167-34.ec2.internal.warc.gz
CC-MAIN-2017-17
726
10
https://userapps.support.sap.com/sap/support/knowledge/en/2532270
code
When i click on Hire button in Manage pending Hire, i get an Application error. Onboarding All Data center - One of the BizX picklist field in Data dictionary was without IntegrationMode. - java.lang.NullPointerException: while trying to invoke the method java.lang.String.equals(java.lang.Object) of a null object loaded from local variable 'integrationMode' Create a Support ticket, to find which field is causing the issue and support team will assist in finding the resolution Manage Pending Hire, Manage Pending Recruits , KBA , LOD-SF-OBD-MPH , Manage Pending Hires , Problem
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030334974.57/warc/CC-MAIN-20220927002241-20220927032241-00219.warc.gz
CC-MAIN-2022-40
581
6
https://lists.jboss.org/archives/list/[email protected]/thread/7DQCBPJ3TVLWWE7ALFMREHPNGEPLNA65/
code
I feel a bit better that state is no longer shared between tabs and you're cleaning up auth sessions. Still worried though as I still don't fully understand how it works. I also worry that a lot of different areas of the codebase needed to be touched to fix these problems. This probably needs another refactoring pass to consolidate code and create a better abstraction so that if we need to change things its done in one place. I know I'm being vague here, by my intuition and experience is telling me things need to be cleaned up....Unfortunately there's a lot of areas in our codebase like this (many which originated from me), and we're overloaded with work. Hopefully one day we get back to this. For example, we have many endpoints on LoginActionsService for different flows. Maybe we can consolidate it into one method and just add "flow_id" or "flow_type" as parameter? In the end, most of the are processed in LoginActionsService.processFlow where is the authentication flow actually triggered. There are some specifics to each endpoint, but hopefully they can be abstractized somehow. Due to the many different endpoints, we also have quite a lot of places where the URL for the flow needs to be build... Good thing is, that we have lots of automated tests and we're adding new tests for bugfixes. So every refactoring minimizes risk of regression. Still the issue is, that not all tests are executed during PR, so there is a risk that regressions are found later. I hope this will be improved once we have CI triggered for every PR. Then also refactorings will be a bit safer then now. Hopefully... :) On Mon, Dec 11, 2017 at 7:27 AM, Marek Posolda <mposolda(a)redhat.com> wrote: > So I've sent PR https://github.com/keycloak/keycloak/pull/4832 > Now there is support of authenticationSessions in multiple browser tabs. > Summary of the changes in PR: > - It adds the new parameter "tab_id" to the endpoints Authentication > Flow endpoints (especially those in LoginActionsService and few in > - AuthenticationSessionModel needs to be looked up by the ID from cookie > (AUTH_SESSION_ID) together with tab_id and client. > - When application redirects to Keycloak login screen through sending > request to the OIDC AuthorizationEndpoint or corresponding SAML or > DockerProtocol authentication endpoint (opening authz endpoint in new > browser tab), the new Authentication session is always created with new > tab_id. There is no join existing AuthenticationSessionModel. The cookie > AUTH_SESSION_ID is still the same. At infinispan level, there is > RootAuthenticationSessionModel, which represents whole browser and it > contains list of AuthenticationSessionModel, where every > authenticationSessionModel represents browser tab. > - All the state of authentication (executions, authNotes, clientNotes) > is still tracked in AuthenticationSessionModel. So the state is not > shared among browser tabs. > - The whole RootAuthenticationSession is cleared after login and also > after logout (In case of logout, there is "helper" AuthenticationSession > used just during logout to track the logout state of clients among > multiple redirects from frontchannel-logout clients). The cookie > AUTH_SESSION_ID is still kept, so sticky session is still preserved and > the UserSessionModel created after authentication should be available > locally during SSO logins (or also during backchannel requests from > - The PR fixes those JIRAs and adds automated tests for them: > authenticationSession for login same client in multiple browser tabs - Use of Back button on > "Create user from social provider account" leads to Exception - X.509 Auth - cannot > login after an error - WARNING in the log when > logout from admin console - Refresh after setting > VERIFY_ACTION leads to Already authenticated . Thanks Hynek for adding > automated tests! > - It should also fix: - NPE when logout from > wordpress OneLogin SAML SSO - Impersonate function not > working after logout > but need to add the automated tests for those. I hope to send separate > PRs for it. > On 29/11/17 15:09, Marek Posolda wrote: >> On 29/11/17 14:44, Stian Thorgersen wrote: >>> I would target this to 3.4.2. I don't want to delay the 3.4.1 release >>> if we can help it. >>> I'd also suggest some (short if possible) random key (or a counter?!) >>> rather than relying on protocol specific values. 'state' is not >>> actually required in OAuth right? It's just recommended. >> Yes, it's not required. And same for SAML. Was wondering about the >> same. Will use the random key or counter. Thinking if counter doesn't >> have some corner case issues (EG. If 2 tabs are opened concurrently >> after logout and will try to use same counter value as authSession >> update from tab2 won't be yet visible in tab1). >>> On 29 November 2017 at 13:00, Marek Posolda <mposolda(a)redhat.com >>> <mailto:[email protected]>> wrote: >>> I am looking at https://issues.jboss.org/browse/KEYCLOAK-5797 >>> It's about the fact, that when user has opened browser with >>> browser tabs, then after successful login in tab1 (clientA), he >>> may be >>> redirected to the incorrect client (clientB, which was opened in >>> The thing is, that authenticationSession was tracked by the >>> cookie and >>> didn't support multiple clients. So both browser tabs >>> used same authenticationSession, which can reference just one of the >>> clients, hence there could be the conflict and one of the tabs >>> redirected to incorrect client after authentication. >>> I am working on a fix, that allow better support for multiple >>> What I am doing is, that there is >>> which is now referenced by the ID from the cookie. That root >>> session can >>> reference more actual authentication sessions through the map like >>> "Map<String, AuthenticationSessionModel>" . The key is >>> In the Authentication SPI, there are no changes. Those still use the >>> AuthenticationSessionModel as before. >>> This is easily possible as we have "client-id" parameter >>> available during authentication flows in every tab. So every >>> browser tab >>> can reference correct client and redirect to it. >>> However even with the fix, there is another corner case about support >>> for multiple browser tabs with *same* client. This will be still an >>> another JIRA with the example >>> which can be simulated with our admin console. To properly support >>> multiple tabs of same client, the key will need to be like: >>> "client-id + >>> state" instead of just "client-id" The "state" will need to be >>> the OIDC/SAML state or some randomly generated string (As in both the >>> OAuth2 and SAML, the state/relayState parameter is not mandatory >>> which will need to be added to the URL during authentication >>> flows as well. >>> Fixing this will take me another few days of work (maybe 2?) as there >>> will need to be change in many files for adding the new parameter >>> + some >>> more authenticationSession model changes etc. So I wonder if we >>> want to: >>> 1) Fix this in 3.4.1 . Will likely mean to delay the release? >>> 2) Fix this in 3.4.2. It will affect many files and there is some >>> of regression (hopefully not big as we have lots of the tests for >>> various other corner cases) >>> 3) Fix this later in 4.X . >>> My vote is 1 or 2. WDYT? Any other possibility? >>> keycloak-dev mailing list > keycloak-dev mailing list
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296949573.84/warc/CC-MAIN-20230331051439-20230331081439-00551.warc.gz
CC-MAIN-2023-14
7,378
133
https://pypi.org/project/approx-dates/
code
Classes for representing partial and approximate dates [This is a preliminary version of this library (hence the 0.* version number) and the API may change.] It’s frequently useful to be able to represent partial or approximate dates in Python. Colloquially, examples of these might be: 1963 (i.e. just the year, with no month or day specified) March 1979 (i.e. just the year and the month, with no day specified) At some point before the 21st of July 2015 At some point after 1st January 2000 Some point between 25th and 31st of December 2016 At an arbitrary or unknown point in the past At an arbitrary or unknown point in the future The ApproxDate class can represent all of the above, as well as precise dates, where the exact year, month and day is known. This package has been tested on Python 2.7 and Python 3.5. The alternative to this package that I’m aware of is the ApproximateDate class from django-date-extensions. This has a different model for approximate dates - they can be past, future, YYYY, YYYY-MM or YYYY-MM-DD, whereas the ApproxDate model in this package can also represent a date which is known to be between two arbitrary dates, or is known to be before (or after) some particular date. You can install this package with: pip install approx_dates You can create a full date or a partial date from the an ISO 8601 string: from approx_dates.models import ApproxDate ApproxDate.from_iso8601('1215-06-15') ApproxDate.from_iso8601('1215-06') ApproxDate.from_iso8601('1215') Or you can reprent points arbitrarily far in the past or future with: To represent a date that’s somewhere within two bounds, you can specify two endpoints. For example: from datetime import date ApproxDate(date(2016, 12, 25), date(2016, 12, 31)) These endpoints are intended to be inclusive. For example, the above ApproxDate might represent the 25th, 26th, … or the 31st of December 2016. You can test whether an ApproxDate represents arbitrarily far in the future or in the past with the past and future properties which evaluate to True or False. To convert an ApproxDate into one of core Python’s datetime.date objects, you can use on of the following methods: ad = ApproxDate.from_iso8601('1979-03') ad.earliest_date >>> datetime.date(1979, 3, 1) ad.latest_date >>> datetime.date(1979, 3, 31) ad.midpoint_date >>> datetime.date(1979, 3, 16) Obviously, whether one ApproxDate is earlier or later than another is ill-defined, so the __lt__, __gt__, __lte__ and __gte__ magic methods are not defined on ApproxDate. If you need to compare two ApproxDate objects, you need to first convert it to a datetime.date using one of the methods above. The __eq__ and __ne__ magic methods are defined, so that two approx dates can be tested for whether they represent exactly the same possible range of dates. If the right hand side of an equality or inequality comparison is a datetime.date, it will treated equal if the ApproxDate on the left is precise to a day, and reprents the same date. You can also test whether a datetime.date might be between two ApproxDate or datetime.date objects using the ApproxDate.possibly_between class method, e.g.: d1 = ApproxDate.from_iso8601('2000') d2 = ApproxDate.from_iso8601('2005') ApproxDate.possibly_between(d1, date(2000, 7, 1), d2) >>> True ApproxDate.possibly_between(d1, date(1999, 12, 31), d2) >>> True After cloning this repository, you can install the dependencies for development with: pip install -e . pip install tox And then run the tests with: Release history Release notifications | RSS feed Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224653608.76/warc/CC-MAIN-20230607042751-20230607072751-00224.warc.gz
CC-MAIN-2023-23
3,657
33
http://itknowledgeexchange.techtarget.com/itanswers/it-admins-per-how-many-employees/
code
First time here, and need some help. I'm new in the T industry, and I have been looking for a chrt that describes how many IT Admins needed per employees. I hope someone out there can guide me in the right direction. September 13, 2004 1:31 PM September 17, 2004 10:12 AM
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368702454815/warc/CC-MAIN-20130516110734-00039-ip-10-60-113-184.ec2.internal.warc.gz
CC-MAIN-2013-20
271
3
https://opennebula.org/blog/page/68/
code
Borja Sotomayor has just announced the release of a new version of the Haizea Lease Manager. Technology Preview 1.3 now includes support for OpenNebula 1.2 (released one week ago), and enhanced stability and robustness. This is a new step towards TP2.0, which will include a policy engine and several novel scheduling features. The detailed list of changes is available in the project changelog. So, do you want to transform your rigid and compartmented infrastructure, into a flexible and agile platform where you can dynamically deploy new services and adjust their capacity?. If the answer is yes, you want to build what is nowadays called a private cloud. In this mini-howto, you will learn to setup such private cloud in 5 steps with Ubuntu and OpenNebula. We assume that your infrastructure follows a classical cluster-like architecture, with a front-end (cluster01, in the howto) and a set of worker nodes (cluster02 and cluster03). First you’ll need to add the following PPA if you’re running Ubuntu 8.04 LTS (Hardy) or Ubuntu 8.10 (Intrepid), you should be fine if you are running Ubuntu 9.04 (Jaunty Jackalope): deb http://ppa.launchpad.net/opennebula-ubuntu/ppa/ubuntu intrepid main If everything is set up correctly you could see the OpenNebula packages: $ apt-cache search opennebula libopennebula-dev - OpenNebula client library - Development libopennebula1 - OpenNebula client library - Runtime opennebula - OpenNebula controller opennebula-common - OpenNebula common files opennebula-node - OpenNebula node OK, then. Here we go: - [Front-end (cluster01)] Install the opennebula package: $ sudo apt-get install opennebula Reading package lists... Done Building dependency tree Reading state information... Done The following extra packages will be installed: opennebula-common The following NEW packages will be installed: opennebula opennebula-common 0 upgraded, 2 newly installed, 0 to remove and 2 not upgraded. Need to get 280kB of archives. After this operation, 1352kB of additional disk space will be used. Do you want to continue [Y/n]? ... Setting up opennebula-common (1.2-0ubuntu1~intrepid1) ... ... Adding system user `oneadmin' (UID 107) ... Adding new user `oneadmin' (UID 107) with group `nogroup' ... Generating public/private rsa key pair. ... Setting up opennebula (1.2-0ubuntu1~intrepid1) ... oned and scheduler started As you may see from the output of the apt-get command performs several configuration steps: creates a oneadmin account, generates a rsa key pair, and starts the OpenNebula daemon. - [Front-end (cluster01)] Add the cluster nodes to the system. In this case, we’ll be using KVM and no shared storage. This simple configuration should work out-of-the-box with Ubuntu: $ onehost add cluster02 im_kvm vmm_kvm tm_ssh Success! ... $ onehost add cluster03 im_kvm vmm_kvm tm_ssh Success! ... Now, we have just to follow the wise output of the previous commands - [Front-end (cluster01)] You need to add the cluster nodes to the known hosts list for the oneadmin user: sudo -u oneadmin ssh cluster02 The authenticity of host 'cluster02 (192.168.16.2)' can't be established. RSA key fingerprint is 37:41:a5:0c:e0:64:cb:03:3d:ac:86:b3:44:68:5c:f9. Are you sure you want to continue connecting (yes/no)? yes Warning: Permanently added 'cluster02,192.168.16.2' (RSA) to the list of known hosts. oneadmin@cluster02's password: You don’t need to actually login. - [Worker Node (cluster02,cluster03)] Install the OpenNebula Node package: $ sudo apt-get install opennebula-node Reading package lists... Done Building dependency tree Reading state information... Done The following extra packages will be installed: opennebula-common The following NEW packages will be installed: opennebula-common opennebula-node ... Setting up opennebula-node (1.2-0ubuntu1~intrepid1) ... Adding user `oneadmin' to group `libvirtd' ... Adding user oneadmin to group libvirtd Done. Note that oneadmin is also created at the nodes (no need for NIS here) and added to the libvirtd, so it can manage the VMs. - [Worker Node (cluster02,cluster03)] Trust the oneadmin user at the ssh scope, just copy the command from the onehost output ;) : $ sudo tee /var/lib/one/.ssh/authorized_keys << EOT > ssh-rsa AAAAB3NzaC1yc2EAAAABIwAAAQEAm9n0E4bS9K8NUL2bWh4F78LZWDo8uj2VZiAeylJzct ...7YPgr+Z4+lhOYPYMnZIzVArvbYzlc7HZxczGLzu+pu012a6Mv4McHtrzMqHw== oneadmin@cluster01 > EOT You may want to check that you can login the cluster nodes from the front-end, using the oneadmin account without being asked for a password: $ sudo -u oneadmin ssh cluster02 You are done! You have your own cloud up and running! Now, you should be able to see your nodes ready to start VMs: $ onehost list HID NAME RVM TCPU FCPU ACPU TMEM FMEM STAT 0 cluster02 0 100 100 100 963992 902768 on 1 cluster03 0 100 100 100 963992 907232 on You may want to check the OpenNebula documentation for further information on configuring the system or to learn how to specify virtual machines. The OpenNebula team is happy to announce the availability of OpenNebula 1.2, the second stable release of the project. This is an important milestone for the project and marks that most of the components of OpenNebula are now in place. What is OpenNebula? The OpenNebula virtual infrastructure engine provides efficient, dynamic and scalable management of groups of interconnected VMs within datacenters involving a large amount of virtual and physical servers. OpenNebula supports Xen and KVM platforms and can interface with remote cloud sites, being the only tool able to access on-demand to Amazon EC2 to dynamically scale the local infrastructure based on actual usage. OpenNebula also exhibits an open and flexible architecture which allows the definition of new algorithms for virtual machine placement, and its integration with any virtualization platform, infrastructure cloud offering and third-party component in the cloud ecosystem, such as cloud-like remote interfaces, virtual image managers, and service managers. OpenNebula is one of the components being enhanced in the context of the European Union’s Reservoir Project, which aims to develop the open source technology to enable deployment and management of complex IT services across different administrative domains. New Features and Highlights in OpenNebula 1.2 OpenNebula 1.2 presents important improvements in the following areas: - Image Management. OpenNebula 1.2 features a general mechanism to transfer and clone VM images. The new Transfer Manager is a modular component that embrace the driver-based design of OpenNebula, so it can be easily extended and integrated with third-party developments and virtually any cluster storage architecture. The new TM allows you to re-use VM images as you can mark them as clonable, and also you can save space as swap images are now created on-the-fly by OpenNebula. - Networking. With OpenNebula 1.0 it is difficult to track the MAC/IPs in use by the running VMs, and its association with physical networks. This mechanism does not scale when dealing with tens of VMs. The new Virtual Network Manager module allows you to define virtual networks and it leases IP-MAC pairs to VMs, so you do not have to keep track of the addresses in use. In this way it is pretty much like an embedded DHCP server. Additionally, the leases are built in such a way that you can easily obtain the IP form the MAC when booting the VM. OpenNebula 1.0 networking is still supported, in case you do not want to use the new functionality. - Robustness and scalability, OpenNebula 1.2 has been tested in the management of hundreds of running VMs to ensure that the code meets production level requirements. Getting OpenNebula 1.2 The complete source tree for OpenNebula can be freely downloaded. Additionally the ubuntu virtualization team have kindly provided binary packages for Ubuntu 9.04 (Jaunty Jackalope). Please refer to the OpenNebula documentation guides to install and configure your system. More information: - Benefits and Features - Complete Release Notes of OpenNebula 1.2 - Download OpenNebula 1.2 - Installation, Configuration and User Guides - OpenNebula FAQ The OpenNebula team would like to thank everyone that sent comments, reported bugs and provide patches. It definitely helped to get a better OpenNebula 1.2. Specially, we would like to thank the great labour done by Soren Hansen, reflected in submitted patches that helped to get OpenNebula closer to work with Ubuntu and Debian. Nowadays it is difficult to find a place where virtualization benefits are not praised. One of my favorite ones is consolidation, that has finish with the “one application one server” paradigm. However, when you start placing your services on different hosts, you will find quickly that the new model does not scale per se. Soon (ten VMs is enough), you’ll be trying to answer questions like: Where did I put our web server? Is MAC address already in use? Is this the updated image for the ubuntu server? and the alike. That was our situation last year; although we organized ourselves with a wiki and a database to store all the information, it became evident that we need a management layer on top of the hypervisors. We started the development of OpenNebula to implement our ideas about the distributed management of Virtual Machines. Today OpenNebula is a reality, and has reach a production quality status (at least we are using it in production). I’ll briefly show you how we setup our infrastructure with OpenNebula, KVM and Xen. The Physical Cluster Our infrastructure is a 8-blade cluster, each one with 8GB and two quad-core CPUs (8 cores/blade). These blades are connected with a private LAN an to the Internet, so they can host public services. The output of the onehost list command is as follows – it’s been colorized for dramatic purposes ;) : Originally the blades were configured as a classical computing cluster. The Virtual Infrastructure Now, thanks to OpenNebula the cluster can be easily configured to host multiple services. For example we are using the 8 blades for: - Two grid clusters (4 nodes each) for our grid projects. Needless to say, that we can add/remove nodes to these clusters as we need them - A Grid broker based on the Gridway metacheuler - A web server, serving this page actually - A coupe of teaching clusters for our master students, so they can break anything - A cluster devoted to the RESERVOIR project - And my favorite, a cluster were we develop OpenNebula. The nodes of this cluster are Xen capable, and they run as KVM virtual machines. So yes, we are running VMs in Xen nodes which are KVM VMs. This is the output of the onevm list command: One of the most useful features of the new version of OpenNebula is the networking support. You can define several networks, and OpenNebula will lease you MAC addresses from the network you want. So you do not have to worry about colliding addresses. The MAC addresses are assigned using a simple pattern so you can derive the IP from the MAC (see the OpenNebula Networking guide for more info). We are using a virtual network for each virtual cluster, output from onevnet list and onevnet show commands: Thanks to the hypervisors and OpenNebula, we can shape our 8 blades to be any combination of services, and we can resize these services to suite our needs. As can be seen above, you can easily find where is the webserver running, so you can get a console in case you need one, or migrate the VM to other blade… Although the management is now so easy with OpenNebula, setting up everything (installing the physical blades, the VMs, configure the network…) is a difficult task. Kudos to Javi and Tino for getting the system running!. SYS-CON’s Cloud Computing Journal has just expanded its list of most active players in the fast-emerging Cloud Ecosystem. The list includes the most active cloud players, which are driving the most Enterprise-relevant innovation. Cloud computing is an opportunity for organizations to implement low cost, low power and high efficiency systems to deliver scalable infrastructure. Last month I’ve been invited to give a couple of talks about Cloud computing in the wonderful C3RS (Cisco Cloud Computing Research Symposium) and in a Spanish e-science meeting. (The slides are available online, if you want to check). Although the audiences were quite heterogeneous, there is a recurrent question among the participants of these events: How can I set my private cloud?. Let me briefly summarize the motivation of the people asking this: - Lease compute capacity from the local infrastructure. These people acknowledge the benefits of virtualizing their own infrastructure as a whole. However, they are not interested, in selling this capacity over the internet, or at least is not a priority for them. This is, they do not want to become a EC2 competitor, so they do not need to expose to the world a cloud interface. - Capacity in the cloud. They do not want to be the new EC2 but they want to use EC2. The ability of moving some services, or part of the capacity of a service, to an external provider is very attractive to them. - Open Source. Current cloud solutions are proprietary and closed, they need an open source solution to play with. Also, they are using some virtualization technologies that would like to see integrated in the final solution. I say to these people, take a look to OpenNebula. OpenNebula is a distributed virtual machine manager that allows you to virtualize your infrastructure. It also features an integral management of your virtual services, including networking and image management. Additionally, it is shipped with EC2 plug-ins that allow you to simultaneously deploy virtual machines in your local infrastructure and in Amazon EC2. OpenNebula is modular-by-design to allow its integration with any other tool, like the Haziea lease manager, or Nimbus that gives you a EC2 compatible interface in case you need one. It is a healthy open source software being improved in several projects like RESERVOIR, and it has a growing community. MIT Technology Review has just published an interesting article entitled “Openning the Cloud” about open-source technological components to build a cloud-like infrastructure. The article focuses on the IaaS (Infrastructure as a Service) paradigm, describing the components required to develop a solution to provide virtualized resources as a service. The article briefly describes the following technologies: OpenNebula, Globus Nimbus, and Eucalyptus. In the OpenNenula project, we strongly believe that a complete Cloud solution requires the integration of several of the available components, with each component focused on a niche. The open architecture and interfaces of the OpenNevula VM Manager allow its integration with third-party tools, such as capacity managers, cloud interfaces, service adapters, VM image managers…; so supporting a complete solution for the deployment of flexible and efficient virtual infrastructures. We maintain an Ecosystem web page with information about third-party tools to extend the functionality provided by OpenNebula. Virtualization has opened up avenues for new resource management techniques within the data center. Probably, the most important characteristic is its ability to dynamically shape a given hardware infrastructure to support different services with varying workloads. Therefore, effectively decoupling the management of the service (for example a web server or a computing cluster) from the management of the infrastructure (e.g. the resources allocated to each service or the interconnection network). A key component in this scenario is the virtual machine manager. A VM manager is responsible for the efficient management of the virtual infrastructure as a whole, by providing basic functionality for the deployment, control and monitoring of VMs on a distributed pool of resources. Usually, these VM managers also offer high availability capabilities and scheduling policies for VM placement and physical resource selection. Taking advantage of the underlying virtualization technologies and according to a set of predefined policies, the VM manager is able to adapt the physical infrastructure to the services it supports and their current load. This adaptation usually involves the deployment of new VMs or the migration of running VMs to optimize their placement. The dsa-research group at the Universidad Complutense de Madrid has released under the terms of the Apache License, Version 2.0, the first stable version of the OpenNebula Virtual Infrastructure Engine. OpenNebula enables the dynamic allocation of virtual machines on a pool of physical resources, so extending the benefits of existing virtualization platforms from a single physical resource to a pool of resources, decoupling the server not only from the physical infrastructure but also from the physical location. OpenNebula is a component being enhanced within the context of the RESERVOIR European Project. The new VM manger differentiates from existing VM managers in its highly modular and open architecture designed to meet the requirements of cluster administrators. OpenNebula 1.0 supports Xen and KVM virtualization platforms to provide several features and capabilities for VM dynamic management, such as centralized management, efficient resource management, powerful API and CLI interfaces for monitoring and controlling VMs and physical resources, fault tolerant design… Two of the outstanding new features are its support for advance reservation leases and on-demand access to remote cloud provider Support for Advance Reservation Leases Haizea is an open source lease management architecture that OpenNebula can use as a scheduling backend. Haizea uses leases as a fundamental resource provisioning abstraction, and implements those leases as virtual machines, taking into account the overhead of using virtual machines (e.g., deploying a disk image for a VM) when scheduling leases. Using OpenNebula with Haizea allows resource providers to lease their resources, using potentially complex lease terms, instead of only allowing users to request VMs that must start immediately. Support to Access on-Demand to Amazon EC2 resources Recently, virtualization has also brought about a new utility computing model, called cloud computing, for the on-demand provision of virtualized resources as a service. The Amazon Elastic Compute Cloudi s probably the best example of this new paradigm for the elastic capacity providing. Thanks to virtualization, the clouds can be used efficiently to supplement local capacity with outsourced resources. The joint use of these two technologies, VM managers and clouds, will change arguably the structure and economics of current data centers. OpenNebula provides support to access Amazon EC2 resources to supplement local resources with cloud resources to satisfy peak or fluctuating demands. Scale-out of Computing Clusters with OpenNebula and Amazon EC2 As use case to illustrate the new capabilities provided by OpenNebula, the release includes documentation about the application of this new paradigm (i.e. the combination of VM managers and cloud computing) to a computing cluster, a typical data center service. The use of a new virtualization layer between the computing cluster and the physical infrastructure extends the classical benefits of VMs to the computing cluster, so providing cluster consolidation, cluster partitioning and support for heterogeneous workloads. Moreover, the integration of the cloud in this layer allows the cluster to grow on-demand with additional computational resources to satisfy peak demands. The dsa-research group is pleased to announce that a stable release (v1.0) of the OpenNebula (ONE) Virtual Infrastructure Engine is available for download under the terms of the Apache License, Version 2.0. ONE enables the dynamic allocation of virtual machines on a pool of physical resources, so extending the benefits of existing virtualization platforms from a single physical resource to a pool of resources, decoupling the server not only from the physical infrastructure but also from the physical location. The OpenNebula Virtual Infrastructure Engine differentiates from existing VM managers in its highly modular and open architecture designed to meet the requirements of cluster administrators. The last version supports Xen and KVM virtualization platforms to provide the following features and capabilities: - Centralized management, a single access point to manage a pool of VMs and physical resources. - Efficient resource management, including support to build any capacity provision policy and for advance reservation of capacity through the Haizea lease manager - Powerful API and CLI interfaces for monitoring and controlling VMs and physical resources - Easy 3rd party software integration to provide a complete solution for the deployment of flexible and efficient virtual infrastructures - Fault tolerant design, state is kept in a SQLite database. - Open and flexible architecture to add new infrastructure metrics and parameters or even to support new Hypervisors. - Support to access Amazon EC2 resources to supplement local resources with cloud resources to satisfy peak or fluctuating demands. - Ease of installation and administration on UNIX clusters - Open source software released under Apache license v2.0 - As engine for the dynamic management of VMs, OpenNebula is being enhanced in the context of the RESERVOIR project (EU grant agreement 215605) to address the requirements of several business use cases. More details at http://www.opennebula.org/doku.php?id=documentation:rn-rel1.0 - Benefits and Features: http://www.opennebula.org/doku.php?id=about - Documentation: http://www.opennebula.org/doku.php?id=documentation - Release Notes: http://www.opennebula.org/doku.php?id=documentation:rn-rel1.0 - Download: http://www.opennebula.org/doku.php?id=software - Ecosystem: http://www.opennebula.org/doku.php?id=ecosystem I would like to give a warm welcome to Haizea to the virtualization ecosystem. The new technological component is an open-source VM-based lease management architecture, which can be used - As a platform for experimenting with scheduling algorithms that depend on VM deployment or on the leasing abstraction. - In combination with the OpenNebula virtual infrastructure manager, to manage a Xen or KVM cluster, allowing you to deploy different types of leases that are instantiated as virtual machines (VMs). Its full integration with OpenNebula will be part of the next Technoloy Preview (TP1.1), due mid-july. Haizea is being developed by Borja Sotomayor, a PhD student at the University of Chicago, who is now visiting our research group partially funded by the European Union’s FP7 Reservoir project (“Resources and Services Virtualization without Barriers”). MEET US AT TechDay Prague, 7 March 2017 Training Madrid, 14-15 March 2017 TechDay Nuremberg, 30 March 2017 TechDay Madrid, 9 May 2017 TechDay Barcelona, 23 May 2017 ONE Conf US, Boston MA, 19-20 June 2017 Training Boston, MA, 21-22 June 2017 Training Madrid, 4-5 July 2017 TechDay Vancouver, 1 September 2017 TechDay Ede NL, 20 September 2017 ONE Conf EU, Madrid, 23-24 October 2017 Training Madrid, 25-26 October 2017 TechDay Hluboka CZ, 7 November 2017 Training Boston MA, 14-15 November 2017 TechDay Almendralejo ES, 28 November 2017
s3://commoncrawl/crawl-data/CC-MAIN-2017-51/segments/1512948544124.40/warc/CC-MAIN-20171214124830-20171214144830-00218.warc.gz
CC-MAIN-2017-51
23,474
124
https://allnurses.com/profile/1139603-rninthemaking/
code
So from what I understand, as soon as you apply, as long as you turn in everything that is required, you are automatically put on a waitlist. They take people with the highest points first. Also, it’s a lot harder to get accepted for Fall semester because they take a certain amount of LVN’s before they take from the generic RN waitlist. That’s my understanding anyway. Are you an LVN?
s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590347387219.0/warc/CC-MAIN-20200525032636-20200525062636-00233.warc.gz
CC-MAIN-2020-24
392
1
http://vs-saiyasune.info/viewtopic.php?t=43995
code
WinsockFix was written for Windows 95 so I wouldn' t use it on Vista on Windows 7, XP, ME . Installation of these products is optional but you should pay close. This is a cool program that fixes a problem that I' ve run into a few times — You can ping addresses over the internet, but other programs like Internet Explorer refuse to work.This tool is recommended for IT professionals only. Windows Vista Windows Server , Windows XP Windows Server. If you' re not on the computer that has the problem save the easy fix solution to a flash drive . It' s probably the best quickest fix for all connection problems but I wouldn' t use it on Windows 7. 2 - Powerful piece of software designed specifically for helping you restore a broken connection in case your Interne. How could I trust an applicaton that is not able to detect my system and says I' m running a 32- bit Windows? html 如果在 XP. Mar 12, · Free Download WinSockFix 1. 13 - A Winsock/ TCP repair. WinSockFix detects the problem and attempts to fix. ( only available for Windows XP.
s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376823702.46/warc/CC-MAIN-20181211194359-20181211215859-00242.warc.gz
CC-MAIN-2018-51
1,049
4
http://www.civilization-next.com/2018/10/who-civilized-who-exactly.html
code
|Who civilized who exactly?| This is a question I would like to propose to Dr Jordan B Peterson. First off, I would like to start off by saying that I am a huge admirer of Dr Peterson. I think he really is 'therapizing' the whole world at this point, or at least the internet and boy did we need it... :D In humans, men form many dominance hierarchies, the men fight amongst each other and some rise to the top, the women choose their mate by peeling off the top of the dominance hierarchy in men. This is the characteristic difference between the female of the human species and females of other primates. The female chimps show no preference when in heat, they will mate with anybody irrespective of their position in the hierarchy. Which means a low-status chimp get to have the same mating preference as that of a high-status chimp. However, the larger alpha chimp chases away the smaller beta chimps so that they don't get to procreate with the females. We all have heard him say that human women civilized men, because of female preferential mating practice a.k.a. hypergamy, men were forced to become 'awake' and pushed to the edge of developing hierarchical structures and behaviours that were best for survival across multiple time frames. As opposed to other primate male behaviours that focus on the more immediate gratification aspects of existence and who cannot project into the future to see what needs to be done in order to maintain order and their status in the community. Well, I don't know about that. In fact, in all mammals, the females form harems and reproduce with only a few males. Hypergamy exists everywhere in the animal kingdom but they all still remain dumb animals. I believe the reason why we are so successful as a species has little to do with female hypergamy. One can make an argument that over millions of years we kept limiting and 'controlling' female sexual behaviour until it was burnt into our genetics. The minimal promiscuous behaviour of women that arose and the absence of intensity of the 'heat' period might just be a forced genetic survival strategy. If Genghis Khan caught one of his men sleeping with any of his thousand wives, they both would be dead. In fact, most religions prescribe very strict punishments for infidelity. And we have been doing this since we were monkeys. So it might not be that obvious who 'civilized' whom. At the least, we urged each other to do things that we saw would be the most effective survival/living strategies for both. In my opinion, I think we just started eating better and got smarter.
s3://commoncrawl/crawl-data/CC-MAIN-2019-09/segments/1550247480905.29/warc/CC-MAIN-20190216170210-20190216192210-00080.warc.gz
CC-MAIN-2019-09
2,577
9
https://lotrointerface.com/forums/showthread.php?s=a941de7f3fc5bae1da0891c7f734a7cf&t=633
code
first i apologize if i posted this in the wrong section. i'm trying to find a ui that gets rid of the menu/deeds/bag/etc buttons to the left and right of the quickslot bars. i've tried a few ui's that move them and i've also tried this ui: http://www.lotrointerface.com/downlo...tskinning.html because that's the look i'm trying to get (very, very minimalistic. hiding as much as possible.) none of which seem to work. some have the buttons as invisible but you can still hover over their location and click them, some just simply don't do anything. i've read the readme's and i'm installing them correctly. is there something i'm missing? something i'm doing wrong?
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296943845.78/warc/CC-MAIN-20230322145537-20230322175537-00756.warc.gz
CC-MAIN-2023-14
666
5
https://guides.magicgameworld.com/football-manager-2020-pc-game-hotkeys/
code
PC Keyboard Controls & Shortcuts Alt+F4: Quit Game Control+Q: Quit Game Alt+Enter: Switch between full screen and windowed mode (if the system supports windowed mode) Control+F: Switch between full screen and windowed mode (if the system supports windowed mode) Tab: Move to the next control on-screen that can take a keyboard focus. Shift+Insert: Paste from clipboard. Control+V: Paste from clipboard. Control+Insert: Copy to clipboard Control+C: Copy to clipboard Shift+Delete: Cut (copy to clipboard, then delete) Control+X: Cut (copy to clipboard, then delete) Control+P: Print screen (if something on the screen is printable) Control+A: Select all (only really applies to edit boxes) Control+Z: Undo (edit boxes) Control+Shift+Z: Redo (edit boxes) Control+Y: Redo (edit boxes) Control+S: Savegame (to current name – will do a Save As if the game has not been saved yet) Control+Shift+S: Save Game As.. (always asks for a file name before saving) Left Arrow: Go to the previous screen in history Backspace: Go to the previous screen in history Mouse Back Button: Go to the previous screen in history Shift+Mouse Wheel Backward: Go to the previous screen in history Right Arrow: Go to the next screen in history Mouse Next Button: Go to the next screen in history Shift+Mouse Wheel Forward: Go to next screen in history Alt+F11: Content fullscreen (hides title bar, tree menu, and footers) (different from the window fullscreen) F1 – Help/Tutorial F2 – Home page F3 – Squad screen F4 – News screen F5 – Player search F6 – Shortlist F7 – Scout search F8 – Staff list F9 – Club transfers F10 – First team fixtures F11 – Team information screen F12 – Game status Control+D: Continent transfers Control+E: Finances (Expenditure) Control+G: Finances (Transfers) Control+H: Manager chat Control+I: Finances (Income) Control+J: Job center Control+L: League table Control+M: Finances (Summary) (or National Pool for national teams) Control+N: New Game (Intro/Startup) or New User (in-game). Control+R: Training (Coaches) (On the Intro/Startup screen, this is “Load Last Game” if available) Control+T: First team tactics Control+U: Training (Players/Schedules) Control+W: Finances (Salary) Control+O: Startup/Intro screen only: Load Game (Open File). Shift+P: Go to the Preferences screen. Spacebar: Continue game (on the News screen, this is ‘read next unread’). Not valid while keyboard focus is on an edit box or in a dialog. Enter: Default action (generally OK/Yes) Escape: Cancel and close.
s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656103324665.17/warc/CC-MAIN-20220627012807-20220627042807-00450.warc.gz
CC-MAIN-2022-27
2,523
57
https://forums.ghielectronics.com/t/micropython-experts/23719
code
Could MicroPython run alongside or inside TinyCLR? Giving the ability of MicroPhython of calling functions and methods in TinyCLR. This would allow for easy customization of a device and Python scrips could easily be changed on demand. A use case I would use it for is remote sensor monitoring/alarming. The logic for alerts, based on time of day or sensor readings, unique algorithms, would be defined and run in the Python script. When the alarm conditions are met Python calls functions in TinyCLR that push the information up to the cloud for further processing/alerts, etc. If the monitoring requirements change a new Python script could easily be pushed down to the device. TinyCLR would run all the critical software functions and maintaining the connections required for command and control. If the Python script were to go crazy and lock up TinyCLR could kill it and send an alert. Here’s an alternative … how about a micro-kernel that runs WASM? Then you could run and debug C, C++, Rust, C#, F#, Go, Kotlin, Swift, D, and even Pascal? Who needs all the limitations of uPython when you have that? Admittedly, you still need a PC, Mac, or Linux, because there would be no REPL on the chip but also, you can use a PC OR Mac OR Linux. The topic was MicroPython and/or variants and possibility of .tinyCLR to run a script interpreter. Assume script interpreter would run on its own thread. script commands would be loaded in an object object ref (pointer) passed from ‘user code’ to interpreter via a queue interpreter could signal whatever using Thread WaitHandles or whatever mechanism. No need for ‘Ladder Logic’ type of dev environment or such. Script dev environment need be nothing more than notepad. The Script engine, expecting properly formatted script, would just execute the script. Perhaps this script engine would consume json…does not matter to me. The json would qualify params such as: waitHandle referenced callback or such: …again, the mechanics of all is whatever the specs say …If you have consumed any manufactured product, one can bet the odds that Ladder Logic was used in the process.! So I have re-read @skeller and @mhardy’s text a few times, and I understand the use case as : I need “some but not all of my program’s behavior to be dynamic code”. So, if uPython or TinyBASIC or Lua or WASM could run hosted within a TinyCLR C# program, is that sufficient or does the whole program need to be parsed at runtime? I think there are uses for writing whole programs in interpreted (REPL) languages [uPython, TinyBasic, Lua] and for WASM (bytecode interpreter), but it sounds like you are looking for the ability to dynamically update a small piece of your code, not write an entire program that way, and your current solution was to home-bake a ladder-logic engine. Correct?
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947476409.38/warc/CC-MAIN-20240304002142-20240304032142-00419.warc.gz
CC-MAIN-2024-10
2,829
18
https://www.pugetsystems.com/parts/Operating-System/Windows-7-Home-Premium-64-bit-OEM-SP1-7550
code
Note: Windows 7 Home Premium supports up to 16GB of system RAM. |HDD Free Space||20 GB| |Graphics||DirectX 9 graphics device with WDDM 1.0 or higher driver| |Logical Processors (CPU Cores)||256| Windows 7 Home Premium makes it easy to create a home network and share all of your favorite photos, videos, and music. You can even watch, pause, rewind, and record TV. Get the best entertainment experience with Windows 7 Home Premium. Do you use your PC for work, run Windows XP programs, or require enhanced security? Consider Windows 7 Professional. with the Windows 7 Home Premium 64-bit OEM SP1.
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323585997.77/warc/CC-MAIN-20211024111905-20211024141905-00310.warc.gz
CC-MAIN-2021-43
596
7
https://english.stackexchange.com/questions/163806/why-daily-and-not-dayly/164105
code
Since I was getting a bit caught up in trying to write out some fairly complex things in comments to @medica’s answer, I am going to write it all out in a full answer here. Basically, there is a more or less regular variation in some words between final -y and non-final -i- (sometimes -ie) in English orthography. That means that when adding various suffixes to words that end in -y, you have to know whether to change it to an -i- or not, based on a certain set of rules (plus some exceptions—this is English after all). The rules for when to choose what are as follows: Phonetic quality of -y The first thing to determine is how the -y is pronounced. There are three possibilities here: - /i/, as in ‘ready’, ‘silly’, etc. - /ai/, as in ‘sly’, ‘shy’, ‘apply’, etc. - /j/, as in ‘day’, ‘whey’, ‘coy’, ‘buoy’, etc. Regardless of what suffix you’re adding, these different pronunciations affect when the spelling does and does not change. Phonetic makeup of suffixes In addition, the pronunciation of the suffix that you add to the end of the word also makes a difference, or rather, the start of the suffix does. Here there are four possible variations: - Suffix consists only of one consonant (noun-plural -(e)s, verbal third singular present -(e)s, past -(e)d, strong verb passive participle -(e)n) - Suffix starts with a consonant (-ness, -ful, -less, -some, etc.) - Suffix starts with the vowel /i/ (-ing, -ish, -ive, -ify, etc.) - Suffix starts with any other vowel (-er, -est, -en, -able, etc.) Combining -y and suffix When you combine a final -y with a suffix, you have to look at each combination of the seven options mentioned above separately (though some of them can be lumped together, of course). In the following, I will simply write the -y as its phonetic realisation (/i/, /ai/, or /j/), and as a shorthand, I’ll write the suffixes as simply X (only one consonant), I (starts with /i/), and V (starts with any other vowel). If a rule goes for all types of -y or suffixes, I write ANY. (If two types go together, I just write them together; so CV means ‘suffix that starts with a consonant or a vowel that isn’t /i/’, for instance, and /i ai/ means -y pronounced either as /i/ or as /ai/.) Exceptions to the main rules are in bold. (‘Daily’ is in the very last section.) I ⟹ -y- Before a suffix that starts in /i/, -y never changes—it always remains -y-, no matter how it’s pronounced. (Even words that end in -ie change this to -y- here, such as die ⟹ dying, or lie ⟹ lying.) - busy ⟹ busying say ⟹ saying shy ⟹ shying clay ⟹ clayish dry ⟹ dryish /i ai/ + X ⟹ -ie- Before a suffix consisting of only one consonant, -y pronounced /i/ or /ai/ is written -ie- - busy ⟹ busied, busies dry ⟹ dries, dried CV ⟹ -i- Before a suffix starting in a consonant or a non-/i/ vowel, -y pronounced /i/ changes to -i-. (This does not happen in the rare instance where the -y pronounced /i/ follows a vowel sound; so gooey ⟹ gooeyness, rather than *gooiness or *gooeiness.) - busy ⟹ business, busier, busily study ⟹ studier, ?studiable very ⟹ verily CV ⟹ -y- (sometimes also -i-) Before a suffix starting in a consonant or non-/i/ vowel, -y pronounced /ai/ generally remains in monosyllabics, though there are some individual exceptions where a variant spelling with -i- also exists. In polysyllabic words, -i- is the rule. - shy ⟹ shyly (shily), shyer (shier), shyest (shiest), shyness (shiness) (forms with -i- all rare) cry ⟹ cryer/crier, ?cryable dry ⟹ dryly/drily, dryable/driable, dryness apply ⟹ appliance, (?)applier rely ⟹ reliant, reliance X ⟹ -y- (sometimes -i-) Before a suffix consisting of only one consonant, -y pronounced /j/ generally remains. After such a y, the past and past participle suffix is -ed (with the e), but the present suffix is -s with no e. In the past and past participle forms of some irregular verbs, the y changes to -i-, and the suffix, whether -(e)d or -(e)n, never has an e. - day ⟹ days play ⟹ plays, played slay ⟹ (?)slayed, slain lay ⟹ lays, laid, lain toy ⟹ toys, toyed V ⟹ -y- Before a suffix starting in a vowel, -y pronounced /j/ usually remains. Only one exception that I can think of, highlighted below. - grey ⟹ greyer, greyest, ?greyable coy ⟹ coyer, coyest buy ⟹ buyer, buyable gay ⟹ gayer, gayety/gaiety C ⟹ -y- or -i- Before a suffix starting in a consonant, the basic rule seems to be that -y remains; but there are some exceptions where it changes to -i-, one of which is the word asked about in the question: daily. Sadly, these exceptions seem completely random and must be learnt by heart. - coy ⟹ coyly, coyness grey ⟹ (?)greyly, greyness gay ⟹ gaily, gayness day ⟹ daily, ?dayful array [in the sense ‘beautiful clothes’] ⟹ raiment (from earlier (ar)rayment)
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100650.21/warc/CC-MAIN-20231207054219-20231207084219-00600.warc.gz
CC-MAIN-2023-50
4,858
68
https://forum.manjaro.org/t/manjaro-on-virtualbox-7-0-6/134713
code
newbee: I installed manjaro 22.0.3 with XFCE on VBox 7.0.6. lsmod tells, Guest Additions were installed automatically. Can I expect resizing of the XFCE screen as I resize the VM window? Install virtualbox-guest-utils on the Guest OS to achieve proper scaling on guest OS Thank you jrichard325 - I read the VirtualBox article, chapter Selecting a Display Controller. Led me to experiment. It works now for me, but not as described. In the VM settings, when I select VboxVGA it will not resize. When I select VMSVGA instead, manjaro does not start up, displaying the 3 waiting points all the time. (not selecting 3D acceleration in either trial.) The solution I found by experiment is: Start manjaro with the display VBoxVGA, open a terminal window and enter “sudo VBoxClient --vmsvga” as described here. Strange - isn’t it? What about VboxSVGA? It just work by default, you don’t need to do anything. Something in your setup isn’t right. There should be no reason to have to enter sudo VBoxClient–vmsvga to make VMSVGA work. I don’t have Manjaro installed as a guest, but I do have Arch and EndeavourOS installed as guests. Both are set at VMSVGA in display settings and in both instances the setting persists. On both the Enable 3D Acceleration are unchecked. All the other display options for the two Arch based distros result in “Invalid Settings Detected”. In both Arch-centric VM’s, virtualbox-guest-utils is installed (on guest) otherwise scaling via Ctrl-F does not work. VboxSVGA is what works here on a Windows VM. Did you install the distribution version of virtualbox? (N/A -windows host) Is virtualbox-ext-oracle installed? (nevermind, turns out it is a Windows host) Are the appropriate virtualbox-host-modules installed?( N/A windows host) Are you a member of the vboxusers group? (nevermind, turns out it is a windows host) I guess it should have been mentioned that WINDOWS is the HOST! The warning is just because you change the default video adapter. This is not actually a real “invalid settings error” warning. It tells you you shouldn’t need to change it, but you changed it. I noticed random boot/noboot with the default video adapter since recently. However on multiple reboot/start I can confirm that on my side the VboxSVGA doesn’t have this random noboot (or two minutes before desktop is reached) issue. For the Virtualbox Guest Utils it is already included in the Manjaro ISO. Thanks for the reply. I am hesitant to play around too much with Vbox settings (same with Samba) as I have it working the way I want on multiple units. Changing to VboxSVGA does seem like a worthwhile option to try, indeed. On my old xfce install guest-utils may not have been installed by default. It sure doesn’t look that way from looking at desktopfs-pkgs.txt and rootfs-pkgs.txt. If it works, don’t fix it @omano: manjaro behaves the same for VBoxSVGA or VBoxVGA: I have to VBoxClient --vmsvga for resizing - I’ve installed from manjaro-xfce 22.0.3-230213-linux61.iso (1), - updated extpacks to 7.0.6 as well (2), - VBox host is Win10. Ubuntu, Mint and Win10 as guests running fine for long, therefore I guess, it is not about VBox installation (3), and - yes, my user is part of vboxsf group (4). Note that manjaro runs in an endless loop waiting for initialization to finish, when I start it with VMSVGA. I have to ACPI Shutdown or to power down the VM. I have put VBoxClient --vmsvga in my .profile. Works now automatically at restart. There is something off with your host installation. Manjaro as guest works OOB using VirtualBox with vmsvga - there is no need to implement such command to get guest resizing. What is your host os? It is Win10. Note that manjaro starts with VMSVGA. But it runs in an endless loop waiting for initialization to finish. It shows a black screen with 3 points flashing. I guess, if I overcome that problem, it would solve the resizing problem as well. This must be a Windows 10 quirk. It works without issues with Manjaro host system. It is not normal behaviour - I cannot say what or why - if your quirk works - great For the record - I have tested on a Windows host running Microsoft Server 2022. Using VirtualBox 7.0.6.r155176 and current Xfce ISO (manjaro-xfce-22.0.3-minimal-230213-linux61.iso) - the default VMSVGA (16MB VRAM) works OOB - guest resizing and all - no quirks or tweaks applied. My initial conclusion - it is something local to your system - but I have no idea what or why. Thank you so far, linux-aarhus. I have re-installed VirtualBox and its extentions on Win10 as the host, than re-installed manjaro as a VM. Now, it resizes fine, but only if I select VBoxSVGA or VBoxVGA as the Graphics Controller for the VM and add VBoxClient vmsvga to .profile. I am a t loss here - one side it is great you can work around it - on the other side it is a really strange issue. Several years ago - there was huff&puff with virtualbox where one had to use vboxsvga to get guest resizing - but upstream virtualbox stated very clearly that vboxsvga and vboxvga was intended for windows guests and vmsvga was for linux guests. They even went as far as making it impossible to save the vm if you had your guest os as linux and graphics set to vboxsvga - in that regard they changed it upon save so it reverted to vmsvga. You could trick the virtualbox service to load using vboxsvga by using the overview pane and modifying the graphics directly - which would than save the wrong graphics. The next time you openend the vm properties it would be set back to what the vbox devs.meanit it to be. So - yes - over time there has been various quirks to get vbox working correctly on Arch and by inheritance Manjaro - but now it works. Back then there was also some functionality which was moved to be included in the kernel - but frankly I don’t remember specifically - perhaps it was around 2018-19 roughly… What is sure is that my recent VM installation of Manjaro, on Manjaro, has issues, might be related to that Plymouth thing you recently added, I don’t know. Sometimes it doesn’t boot, sometimes it boots after a couple minutes. I switched to VBoxSVGA it just works. If needed I can spend time to collect relevant info, do deeper tests. //EDIT: yeah, I switched my VM back to VMSVGA, it started to look it was gonna boot properly, the Plymouth thing appeared, but it is stuck on the Plymouth thingy since 3 minutes, the animation is playing it is not frozen. I closed the VM window, chose send extinction signal, the animation stopped, the VM closed properly. Tried a second boot with VMSVGA, still not booting, I then switched to VBoxSVGA it just works for me. sudo journalctl -xb-2 -p3 févr. 24 23:51:11 aa-virtualbox systemd: Invalid DMI field header. févr. 24 23:51:12 aa-virtualbox kernel: [drm:vmw_host_printf [vmwgfx]] *ERROR* Failed to send host log message. févr. 24 23:51:12 aa-virtualbox kernel: vboxsf: Unknown parameter 'tag' févr. 24 23:51:12 aa-virtualbox systemd: Failed to start pkgfile database update. ░░ Subject: L'unité (unit) pkgfile-update.service a échoué ░░ Defined-By: systemd ░░ Support: https://forum.manjaro.org/c/support ░░ ░░ L'unité (unit) pkgfile-update.service a échoué, avec le résultat failed. févr. 24 23:51:32 aa-virtualbox systemd: Failed to start Terminate Plymouth Boot Screen. ░░ Subject: L'unité (unit) plymouth-quit.service a échoué ░░ Defined-By: systemd ░░ Support: https://forum.manjaro.org/c/support ░░ ░░ L'unité (unit) plymouth-quit.service a échoué, avec le résultat failed. févr. 24 23:51:33 aa-virtualbox sddm: Failed to read display number from pipe févr. 24 23:51:35 aa-virtualbox sddm: Failed to read display number from pipe févr. 24 23:51:37 aa-virtualbox sddm: Failed to read display number from pipe févr. 24 23:51:37 aa-virtualbox sddm: Could not start Display server on vt 1 .......... ...... ..... févr. 24 23:54:40 aa-virtualbox systemd-journald: Journal stopped
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296945288.47/warc/CC-MAIN-20230324180032-20230324210032-00436.warc.gz
CC-MAIN-2023-14
7,984
49
https://epworthchoir.org/contact-us/
code
Chairman, Penny Haskell: [email protected] Honorary Secretary, Pam Curnock: [email protected] Treasurer, Ali Conway: [email protected] Charity Liaison: [email protected] Website, Jon Draper: [email protected] The Epworth Choir are always interested to hear from people who would like to join the choir. If you would like to contact our membership secretary please e-mail Jenny Burrows [email protected]. For general enquiries or information about hiring the choir to sing at an event please e-mail Jenny Burrows: [email protected].
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446711069.79/warc/CC-MAIN-20221206024911-20221206054911-00251.warc.gz
CC-MAIN-2022-49
583
7
http://lists.mplayerhq.hu/pipermail/mplayer-users/2014-January/087071.html
code
[MPlayer-users] Using mplayer with mp3 files for reading specific portions of the audio file amidk75 at gmail.com Thu Jan 16 14:45:32 CET 2014 On 16.01.2014 13:45, Bogdan Cristea wrote: > I am using mplayer as audio module in a Digital Talking Book player on > Linux. For this player I need to read mp3 files with a specific time > offset and for a specific duration. Currently I run mplayer with the > following options: > mplayer -slave -really-quiet audioFile.mp3 -ss beginTimeS -endpos > endTimeS -hr-mp3-seek > However, as already specified in the documentation, the specified > durations are not precisely respected, thus there is a small overlap > between successive audio sections. Is there a way to have a more precise > mp3 playback ? start relative to beginning, stop relative to start: sox audioFile.mp3 -d trim "=$beginTimeS" "$endTimeS" start relative to beginning, stop relative to beginning: sox audioFile.mp3 -d trim "=$beginTimeS" "=$endTimeS" start relative to previous possition (since no previous, then from beginning), stop relative to end: sox audioFile.mp3 -d trim "$beginTimeS" "-$endTimeS" trim possitions format: time - "hh:mm:ss.frac" ("1:28:32.50" or "30.25") sound frames - "NNNNNNs" ("8000s") You can use more trim arguments, like two 15 sec play every 30 sec: sox audioFile.mp3 -d trim "30" "15" "15" "15" for relative start and stop, or: sox audioFile.mp3 -d trim "30" "15" "=60" "15" for starts counted from beginning, and stops relative to starts Krzysztof 'DK75' Duchnowski GetFirefox - http://www.getfirefox.net/ Konfiguracja UTF-8 dla czytników - http://evil.pl/pip/utf/ More information about the MPlayer-users
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224645595.10/warc/CC-MAIN-20230530095645-20230530125645-00712.warc.gz
CC-MAIN-2023-23
1,650
33
https://www.all4wordpress.com/how-to-clone-homepage-for-multi-region-site
code
How to clone homepage for multi region site? How would i clone the homepage of my website ? I understand and have used to plugins that duplicate your page, the difficulty I am having is that I need to create a multi-site from 1 domain. For example, I have mywebsite.com - this targets my usa audience mywebsite.com/es - this would target spanish audience I would really like to know how I would duplicate mywebsite.com and then edit that page and content so that it is in spanis If you know, please can you help me. Multisites don't have to be separate domains, they can be subfolders. You can have your root/original blog/site at / then put new sites at /fr/ etc etc. As for how you would copy your content to that site however, WordPress provides no solution here other than a manual copy/paste. You would need to reconstruct all the pages and copy what content you have in the main site to these secondary sites. You would need to translate all this content by hand anyway. For any automation you would need to use 3rd party plugins. Some multilingual plugins rely on multisites and would do all of this automatically.
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030334579.46/warc/CC-MAIN-20220925132046-20220925162046-00497.warc.gz
CC-MAIN-2022-40
1,121
12
http://ilovemykidsblog.net/2012/12/timemug-review.html
code
When they first sent me one of the mugs to review I wasn’t really to sure about any real use aside from it being a good-looking mug. For the most part I think it is just a trendy new way to sell a coffee mug. I mean don’t get me wrong they look great and would be a great conversation piece. However I really don’t see the need to have a clock on your coffee mug. Aside from the scenario that I provided above I cannot see many practical uses for a Time Mug. Most people today carry their mobile phones around with them everywhere they go so having a clock isn’t always necessary. I am thinking maybe if you use it to hold your water at the gym then it may become useful. Other than that this in my opinion this product is nothing more than a fashion statement. I received one or more of the products mentioned above for free using Tomoson.com. Regardless, I only recommend products or services I use personally and believe will be good for my readers.
s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187823153.58/warc/CC-MAIN-20171018214541-20171018234541-00229.warc.gz
CC-MAIN-2017-43
960
2
https://www.letmetalk.info/discussions/why-is-my-brother-printer-not-responding-to-my-mac.html
code
In case your brother printer is offline on Mac then you should try to make it online by following given steps: go to start menu and click or device and printers. A printer list is displayed. Select your brother printer and set your printer is default. Update your printer driver as well as install your printer driver. Steps to make brother printer online Brother printer offline to online Brother printer offline on Mac. How to make brother printer online on make Brother printer offline to online on Mac
s3://commoncrawl/crawl-data/CC-MAIN-2021-39/segments/1631780057202.68/warc/CC-MAIN-20210921101319-20210921131319-00109.warc.gz
CC-MAIN-2021-39
505
6
http://jannerobbinson.tumblr.com/
code
When my parents ask me why I made so many mistakes on my math test I thought I was the only one!! Person: Oh you want to see my finished homework so you can cheat? Sure but I'll need your first born son as payment. Me: You can have him, now hand me the paper before she comes back around. There are just too many fictional worlds for me to choose from!!!
s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1405997890181.84/warc/CC-MAIN-20140722025810-00197-ip-10-33-131-23.ec2.internal.warc.gz
CC-MAIN-2014-23
354
5
https://www.sofistik.com/infoportal/document/heat-transport-with-hydra
code
Heat transport with HYDRA This example shows the heat transport in a small system with volume elements (BRICs). You will find the input data file via TEDDY > help > examples... > ase > english > bric > bric_hydra_dt2h.dat Another example with unsteady heating by hydration can be found via TEDDY > help > examples... > ase > english > bric > ripe_creep_comparision.dat
s3://commoncrawl/crawl-data/CC-MAIN-2020-45/segments/1603107880038.27/warc/CC-MAIN-20201022195658-20201022225658-00522.warc.gz
CC-MAIN-2020-45
368
6
https://forums.adobe.com/thread/1616009
code
Seems that the Aperture plugin creates only one named keyword per image. 1) Image with no "face": no named keyword in Lightroom 2) Image with one "face": correctly-named keyword is create in Lightroom 3) Image with more than one "face": plugin chooses one "face" (seemingly at random), and creates a named keyword in Lightroom. The functionality does work, but it does not interatively create named keywords for more than one "face" assigned, per photo, in Aperture. Exactly the behavior I noticed. I managed to get through to technical support, and they said it was a known issue. But this was only after it took 20 minutes to explain the issue. Her response was then so abrupt that I question whether she understood the issue, or if this is truly a known issue. Was not able to file a but report, and she was not able to tell me if there is any way of knowing if the issue will be fixed, or if it is fixed, or even if there's a new distribution of the plugin published. Another issue with faces: The faces it does tag, seem to either correctly be placed in the faces keyword hierarchy, or just at the root. I validated all my faces before the migration. But it seems to have "split" some of the names. Most of the face keywords at the root have another entry in the faces keyword hierarcy. Update: aperture_iphoto_importer v1.0.1, released 11/4/2014, now creates keywords for all names on Aperture previews (if copied), but still only creates one keyword per photo on raw files, even if it's in the same pair.
s3://commoncrawl/crawl-data/CC-MAIN-2018-09/segments/1518891813626.7/warc/CC-MAIN-20180221143216-20180221163216-00099.warc.gz
CC-MAIN-2018-09
1,511
9
http://standardtune.tumblr.com/archive/2010/3
code
I’ve been doing a lot of research lately about HTPC’s (Home Theater Personal Computer). After comparing my choices, I’ve settled on what’s pictured below. The Acer Revo is fairly cheap, and from everything I’ve read, plenty powerful enough to do what I need it to do as as media center. I’m going to put Boxee on it, which is supposed to be a pretty good replacement for cable TV. It will search the web looking for sources of TV shows and such.
s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386163052593/warc/CC-MAIN-20131204131732-00094-ip-10-33-133-15.ec2.internal.warc.gz
CC-MAIN-2013-48
457
1
http://stats.stackexchange.com/questions/47683/calculating-the-probability-of-a-rare-event
code
I've read in the news that the last month five pedestrians died from a population of 500,000 Remembering that it is a poisson problem (the famous prussian horse kicks by Ladislaus Bortewicz). I fired up R to understand the probability ppois(5*12, 3, lower.tail=F) since in a month died 5, I multiplied it by 12 months and compared it to the official statistics of 3 pedestrians a year in this area. The result: So, yes this is an unusual case. Am I doing everything right?
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783395039.24/warc/CC-MAIN-20160624154955-00167-ip-10-164-35-72.ec2.internal.warc.gz
CC-MAIN-2016-26
472
4
https://forums.veeam.com/microsoft-hyper-v-f25/wrong-ip-address-the-following-msvm-kvpexchangedataitem-name-t30103.html
code
Task failed Error: Wrong IP address The following Msvm_KvpExchangeDataItem.Name keys are deprecated: NetworkAddressIPv4, NetworkAddressIPv6, RDPAddressIPv4, and RDPAddressIPv6. Please configure guest IP addresses using Msvm_GuestNetworkAdapterConfiguration. The difference with this VM compared to all other VM that successfully backup is that it's the first Windows 10 VM and it the first VM in another VLAN. The backup is successful after this VM is shut down. Anyone know how to solve this?
s3://commoncrawl/crawl-data/CC-MAIN-2018-30/segments/1531676593438.33/warc/CC-MAIN-20180722174538-20180722194538-00184.warc.gz
CC-MAIN-2018-30
493
2
http://www.careworkstechnologies.com/network-infrastructure/missioncontrol-network-performance-monitor-npm/role-based-access
code
MissionControl NPM allows you to establish unique accounts and specify which types of information are displayed within the interface for a particular department, group or user. This ensures that only the people who need to view specific information have access to it, providing an increased level of internal security. For example, NPM can be configured so that the server team only sees the servers on the network, while your Texas-based IT group has a view limited to the geography for which they are responsible. Even better, you can further customize these views by creating a page layout specific to an account, changing the color palette, and modifying toolbars. FREE 30-Day Trial of MissionControl 6.0. Take control of your network so you can get back to what you do best: running your business. To find out if you qualify for a FREE 30-Day Trial of MissionControl 6.0, fill out the information below:
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368705884968/warc/CC-MAIN-20130516120444-00022-ip-10-60-113-184.ec2.internal.warc.gz
CC-MAIN-2013-20
908
4
http://www.videogamelair.com/blog/the-ps3-catastrophe
code
I don't find the fact that Failoverflow discovered the key to be a problem, in fact it's pretty impressive. The problem is that they gave the key to another hacker "Geohot" who decided to publish it on his blog. He claims that he is against piracy and that Sony's removal of the "other os" functionality was the first blow. It's interesting that his use of the feature as an avenue to crack the system and his publication of the methods he used was the catalyst for its removal. Now, Geohot has opened the door for the world to create custom firmware for the PS3 and run pirated games. There's no doubt that he knew the repercussions of posting the key to the public. Sony is now suing him and I fully support Sony. If Geohot truly doesn't support piracy, then the action of publishing the key in his public blog is simply irresponsible. Sure, he isn't directly pirating games, but he's making it possible for others to do so. He claims that he specifically designed the hack so that piracy can't be done in the way it has in the past, but he of all people should know that hackers are constantly adapting to new restrictions. He may find a way to argue in court, but he is clearly in the wrong here. I'm interested to see how this turns out.
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446709929.63/warc/CC-MAIN-20221126212945-20221127002945-00535.warc.gz
CC-MAIN-2022-49
1,242
3
https://www.sencha.com/forum/showthread.php?260546-Fieldfile-extjs-4.2
code
5 Apr 2013 1:34 AM #1 Fieldfile extjs 4.2 Hello everyone ! I saw a strange thing in extjs 4.2 for the fieldfile. Because I'm a new extjs user, I prefer to ask my question before said it's a bug. When we look the zone of the input file in extjs 4.2, we can see that the position is absolute and start on the left of our screen. Because of this, all components on the left of the fieldfile are covered by this invisible big input and you can't click on them because when you click, you click in the input zone so it opens a file selection window. Here is a screen capture directly from the exemples on the sencha website. For exemple, when you click on "Photo", the file selection window appears. input bug extjs 4.2.jpg I ask this question because it was not like this on Extjs 4.1. Here is a screen capture from the exemples on the sencha website for the 4.1.3 version. input extjs 4.1.jpg As you can see, the input file is only inside the fieldfile in the 4.1.3 version. My screen captures are on Chrome but it's the same thing on Firefox. So is it a bug or a normal change in Extjs ? Thank you for your answers. 8 Apr 2013 9:11 AM #2 I do see what you're seeing when I inspect the element, but I'm not seeing it interfere with my interaction with other elements to the left of the file field. You say it's intercepting your clicks, though, yes? You're seeing it intercept your clicks on Firefox and Chrome you say? Just for clarity, what OS are you on? 9 Apr 2013 12:26 AM #3 Thank you for you response. For exemple, on this exemple page : http://docs.sencha.com/ext-js/4-2/#!...eld-types.html. On the file field, you can see that when you put your mouse on the file field label ("File upload"), the button ("Browse...") is highlighted like if your mouse were on it. And if you click on this label, it's like clicking on the button, it opens the pick file window. I'm on windows 8 and I also run a window server 2003 virtual machine and I've this "bug" on Internet Explorer 8, 10, last version of Firefox and last version of chrome. 14 May 2013 10:52 PM #4 Same problem here, when you have horizontal layout this leads to a bug. You can not insert any value into the field then because the browser allways thinks you are hovering over the file-input. Any comments from Sencha on this? 15 May 2013 12:44 AM #5 - Join Date - Apr 2007 - Sydney, Australia - Vote Rating I believe this one is fixed in the 4.2.1 beta, if not, definitely for 4.2.1.Evan Trimboli Twitter - @evantrimboli Don't be afraid of the source code! 15 May 2013 1:21 AM #6
s3://commoncrawl/crawl-data/CC-MAIN-2016-30/segments/1469257826907.66/warc/CC-MAIN-20160723071026-00054-ip-10-185-27-174.ec2.internal.warc.gz
CC-MAIN-2016-30
2,540
34
https://help.orderry.com/en/articles/3737931-the-initial-status-for-the-work-order-or-lead
code
Use the initial order statuses to build and separate different business processes in Orderry. Here's an example: you have two order application types: website applications and service center application. You — most certainly — process these two differently, as you have different business logic for those cases. This is why you create “Website application” and “Service center application” order types and set different initial order statuses for them in Orderry. The system automatically assigns an initial order status and — as a result — a corresponding status sequence, depending on the order type. Configure your order status sequences on the “Settings > Order statuses” page. Find out more about using order statuses in Orderry here. Remember: the system allows you to select from a list of available order statuses if the current order status is unavailable for the new order type. Setting initial status for the order type Navigate to the “Settings > Forms editor > Order form” page to set the initial status for a specific order type. Here's what you need to do: Select an order type and hit the “Edit” button or create a new order type; Set the “Initial status” value in the order type dialog window and hit the “Save” button. This is it. The system now assigns a selected initial status to all new orders of this type. Isolate the status sequences and determine initial statuses for them. This way, you limit the status selecting options for your employees and enforce the business process sequences. Isolating status sequences is also an excellent solution for eliminating a human element and preventing employees from selecting incorrect statuses during the order processing. Configure order status changes to trigger automatic employee notifications, so you can always keep them updated on critical work events. Note: Initial order status functionality is available in the subscription plans “Business” and greater. As for other subscription plans, all order types have a default “New” initial status.
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296943637.3/warc/CC-MAIN-20230321064400-20230321094400-00371.warc.gz
CC-MAIN-2023-14
2,059
12
https://docs.grenadine.co/event-configuration.html
code
Event configuration helps you fine-tune important details for your event. Using Event configuration you can edit and manage People Images, Invitation Categories, Session Format Images, Tag Contexts, and Pay Safe. Continue reading below for more information about each. People images are the pictures that appear next to people who have registered to attend or speak at your event. Once registered, individuals can use a personal professional photo of their own. Detailed information about people images can be found here Invitation categories allow you to create invitations for people to speak or submit to speak at your event. Grenadine allows you to create invitation categories easily. Detailed information about invitation categories can be found here Session Format Images Session formats can be a wide range of things for example workshop, talk, autograph session, etc. In the session format images section, you can upload default images for each session format to make your schedules even more easy to read with visual cues. Detailed information about invitation categories can be found here Tag contexts are the group to which a tag falls under. For example, a person can be tagged with art, music, and dancing these would all fall under the context of Interests. Tag contexts are mostly used by Grenadine’s Sci-FI convention clients and are not applicable to all users. To set-up tag contexts follow this navigation path: This column shows the name of the tag context. In this column you are able to see whether or not the tag context has been published. Click here to edit an existing tag context Click here to delete a tag context Click to add a new tag context, then follow the steps outlined below. When adding a Tag Context you simply need to fill out the following box after selecting . Once you have filled out the information pictured about click and your tag context will be published. Edit Event Information If an event has been created, but the details have changed you can easily edit it. Simply click shown highlighted above and make any necessary changes. Edit Event Logo If you need to edit the Event Logo simply scroll down to Event Logo and click . Select the image you would like to use and .
s3://commoncrawl/crawl-data/CC-MAIN-2019-35/segments/1566027314721.74/warc/CC-MAIN-20190819093231-20190819115231-00049.warc.gz
CC-MAIN-2019-35
2,222
18
https://vulners.com/hackerone/H1:221333
code
I have observed that the application is leaking information while accessing "https://demo.globaleaks.org/l10n/en". It does not restrict access to file, which can possibly provide an attacker with information such as default credentials (test:test), username for accessing administrative functions, application functionalities available to admin user. At this point I am not able to validate default credentials, whether these are credentials for login to globalleaks servers, application, functionalities. Information contained in the location can be possibly be combined with other approaches to perform targeted attack against globalleaks. Recommendation: Restrict access to the file.
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370497171.9/warc/CC-MAIN-20200330150913-20200330180913-00165.warc.gz
CC-MAIN-2020-16
686
3
http://app.mobileai.net/article/information/diffCount/34334
code
diffCount v 1.2 Created by Theodore Feintuch on 5/24/13. Copyright (c) 2013 Theodore Feintuch. All rights reserved. This App will be helpful to those who need to evaluate a peripheral blood film in the absence of automated or manual equipment. By tapping the image corresponding to the cell seen under the microscope, the tally of that image will be incremented as well as the total cells counted and all the relative percentages. The "Undo" button will delete the last cell entered and change the tally for that cell as well the total and all the percentages. The "Clear" button will zero all the tallies, the total and all the percentages. The “Voice” button will trigger a computer generated voice response to the button selected announcing the cell type. The voice function also works during “undo” actions. A voice message will announce the one hundredth cell counted. A label under the Voice button announces the current state of the Voice function.
s3://commoncrawl/crawl-data/CC-MAIN-2018-43/segments/1539583510969.31/warc/CC-MAIN-20181017023458-20181017044958-00426.warc.gz
CC-MAIN-2018-43
963
8
https://www.programmableweb.com/mashup/careervote
code
Mashups using the same API (2577) This mashup lets users find the store location of several different popular chain retailers in various cities across the US. The store locations are shown in Google Maps. Publish you own POI, point of interest, on top of Google Maps, with pictures, links, video, etc. Find local poker games, poker leagues, groups and players near you on this Google Map service. Foursquare just made the switch from using the Google Maps API, to joining the crowd-sourced, global OpenStreetMap movement. To do most of the heavy lifting, foursquare relied upon the still fairly new MapBox API. We saw earlier this year that the Government category was one of the most popular API categories within our directory. But what sections of government and what kinds of data are being made available via API? In this article we look at the ten most popular categories related to government APIs. ||The Alpha Vantage API integrates financial market data including stocks, physical currencies, digital/crypto currencies, technical indicators and other types of data. API Key is required to...||Financial||03.08.2018| ||IsLocation is a web service dedicated to helping you handle location information within your apps. The isLocation API is a RESTful platform that supports the implementation of location concepts...||Location||02.27.2018| Aurora IDEX (Beta) ||Aurora operates a decentralized cryptobanking and financial platform. The IDEX API allows you to develop applications that support the implementation of Aurora trading platform. The API conveys...||Cryptocurrency||02.26.2018| ||The Turn API allows you to identify and check individuals for risk management or background checks. It is a REST service that can be consumed with any programming language with examples in Python and...||Platform-as-a-Service||02.26.2018| ||The FYB-SE is a Bitcoin exchange marketplace. The FYB-SE API provides a RESTful platform for integrating Bitcoin trading functions in applications.||Bitcoin||02.24.2018|
s3://commoncrawl/crawl-data/CC-MAIN-2018-13/segments/1521257647251.74/warc/CC-MAIN-20180320013620-20180320033620-00225.warc.gz
CC-MAIN-2018-13
2,006
12
https://www.barbcat.com/learn-networking-pluralsight/
code
Pluralsight is one of the most popular systems out there for finding courses across a number of groups when it comes to on the internet understanding in the tech room. And also as we’ll go over in the Pluralsight evaluation below, its appeal among tech professionals has absolutely been earned. If you are an IT expert, you recognize that staying updated on the most recent technology is important to your success. You additionally understand that this can be tough, particularly if you don’t have the time or money to participate in costly training courses. That’s where Pluralsight can be found in. With its large library naturally on everything from programming to networking, Pluralsight is perfect for anybody that intends to stay ahead of the curve in the tech globe. This Pluralsight evaluation covers everything you require to know about this outstanding system. It’s a total overview to Pluralsight’s programs, rates, teachers, and also more! What is Pluralsight? Pluralsight is an on-line learning platform that uses training courses in various disciplines with a certain concentrate on tech abilities. Today, Pluralsight has more than 7,000 training courses in its magazine, covering every little thing from shows and web growth to company and creative skills. With a mission to democratize innovation skills, Pluralsight gives participants with the devices they require to remain ahead of the curve in an ever-changing world. Pluralsight likewise offers a selection of functions to aid students remain on track, including course certificates, progress tracking, and program recommendations. In addition, Pluralsight provides a costs membership that provides customers accessibility to exclusive content as well as attributes, such as offline watching and also Pluralsight IQ. So, whether you’re just looking or starting to review your skills, Pluralsight is a wonderful resource for learning brand-new points. Who Teaches on Pluralsight? It’s a very crucial inquiry that everybody asks. If the training has trustworthiness, individuals want to understand. It most definitely does when it comes to Pluralsight and also its trainers. Pluralsight is one-of-a-kind in that all of its courses are instructed by expert instructors that are leaders in their corresponding fields. As a result, Pluralsight trainees can be positive that they obtain the latest and most precise info feasible. The teachers on Pluralsight are meticulously chosen for their know-how as well as ability to engage and notify learners. On top of that, Pluralsight supplies numerous means for trainers to tailor their programs, making sure that each program is customized to the trainee’s requirements. Pluralsight offers both live and also taped programs so that learners can pick the understanding layout that best fits them. Pluralsight additionally provides extra sources to aid learners succeed, including: - Expert pointers - Training course Discounts - Superb Support System - An energetic community forum Millions of learners around the world count on Pluralsight as a resource of high-quality, expert-led instruction! It’s also transforming the means people discover internationally, and it’s promptly coming to be the go-to location for everybody trying to enhance their skills. What Can You Learn on Pluralsight? Discovering a brand-new skill isn’t hard as long as you have a good platform like Pluralsight. As well as, since Pluralsight is always adding brand-new programs, you’re certain to find something that’s right for you. Pluralsight’s remarkable features make finding out simple as well as fun, such as course suggestions, interactive workouts, as well as expert teachers. Some of the program groups you can check out on Pluralsight consist of: - Architecture & building and construction - Service professional - Creative expert - Information professional - IT ops - Production & style - Info & cyber security - Software program advancement - Internet advancement With over 7,000 courses available, Pluralsight has a training course for every person, from those simply beginning their jobs to those seeking to maintain their abilities current. Pluralsight supplies abilities assessments and a career path tool to aid learners identify which courses will help them reach their profession goals. They are likewise among the biggest on the internet training providers. How Much Does Pluralsight Cost? Pluralsight rates depends upon the kind of membership that you pick. Below’s a standard introduction of the Pluralsight packages: The Standard Package sets you back $29 monthly. If you choose to pay each year, it will certainly assist you save approximately 14%, as well as the rate you will need to pay would certainly be $299. Premium Package sets you back $45 monthly, or an yearly membership would certainly be $449. Beginner: $33.25/ month. Professional: $48.25/ month. Enterprise: $64.91/ month. Pluralsight likewise uses wonderful price cuts for teachers and students . In addition, Pluralsight offers amazing price cuts on team packages for yearly memberships. Pluralsight Free Trial Details. Pluralsight does include a free test, which permits you to access all of the training courses for 10 days. During the test duration, you can access 200 mins of Pluralsight content. If you decide to cancel your subscription within the 10-day test period, you will certainly not be billed. However, if you do not cancel your membership within the 10-day trial period, you will be instantly charged for the regular monthly or yearly membership, depending on which choice you choose. Just How does Pluralsight Pricing Compare to Other Platforms? Pluralsight is one of one of the most popular on the internet knowing platforms worldwide, and also what actually sets it apart from other platforms is its huge focus on tech knowing. But just how does the cost of Pluralsight contrast to other prominent on the internet discovering systems? Allow’s contrast:. - LinkedIn Learning pricing– $29.99 for month-to-month or $240 for an yearly membership. - Masterclass pricing– $180-$ 276 a year, no regular monthly strategies readily available. - Coursera prices– $59 a month or $399 a year for a Coursera Plus membership. - Skillshare rates– $167.88 per year, which exercises to $13.99/ month balanced out. In addition, Pluralsight supplies both corporate and also private strategies, making it a versatile option for individual and also specialist development. This makes Pluralsight an ideal platform for those that want to acquire sensible experience and also academic knowledge. Generally, Pluralsight is a easy to use and also extensive learning platform ideal for individuals and services at affordable rates. Just How Does Pluralsight Work? Pluralsight is transforming the method people learn and also is assisting to make the globe a better place for everyone. Trainees can sign up for Pluralsight courses via the site as well as access the material at their very own speed. Pluralsight programs are separated right into components, and also each module consists of a collection of video clip lessons and also tests. Students can enjoy the video clip lessons as sometimes as they want as well as take the quizzes as often times as they require to understand the product. Pluralsight likewise offers a certification of conclusion for each and every course. With its flexible understanding layout and expert-led training courses, Pluralsight is a fantastic method to get new skills or enhance existing ones. Just how to sign up for Pluralsight. Enrolling in Pluralsight is simple and just takes a couple of minutes. First, go to the Pluralsight web site and produce an account. You can search the Pluralsight library and select the training courses you want to take as soon as you have an account. You can likewise search for particular courses by keyword phrase or filter by topic. When you find a course you want to take, click on the “Sign Up” button. You will certainly after that be triggered to enter your repayment details. Pluralsight supplies a selection of repayment alternatives, consisting of bank card, PayPal, etc! You will certainly be able to access your program instantly once you have actually selected a repayment technique. Pluralsight additionally uses a free test to ensure that you can check out their system before dedicating to a paid subscription. Why wait? Register for Pluralsight today and also start finding out something new! Just how to take Pluralsight courses. Pluralsight programs are a fantastic means to learn brand-new abilities as well as enhance existing ones. Below’s exactly how to begin:. Develop a Pluralsight account. You can do this by mosting likely to their internet site and clicking on the “Sign Up” button. Enter your information as well as click the “Create My Account” switch. Once you have an account, you can browse through the training courses that Pluralsight uses. Kind the topic’s name right into the search bar to find a course that fascinates you. If you’re interested in discovering regarding web development, you would kind “Web Development” right into the search bar. When you’ve found a program you would certainly like to take, click the “Enroll Now” button. Pluralsight will after that ask you to confirm your registration. When you’ve verified your enrollment, Pluralsight will certainly include the program to your account, as well as you can begin taking it instantly. Pluralsight training courses are self-paced, meaning you can overcome them at your rate. They are also hands-on, with plenty of opportunities to practice what you’re finding out. They are made by market specialists, so you can be certain you’re obtaining the newest as well as best info. Whether you’re wanting to find out new coding skills or brush up on your Photoshop techniques, Pluralsight has a course. Examine them out today and see just how simple it is to learn something new. Pluralsight Features Explained. Training courses are expert-led as well as focus on functional skills. Pluralsight is a terrific source for those looking to learn new sensible abilities. The programs are expert-led as well as focus on offering customers the abilities they require to prosper in their area. Pluralsight likewise uses a range of various other features, such as the capacity to create customized courses and quizzes that make it an important source for any individual wanting to enhance their ability. Pluralsight is a wonderful resource for those aiming to boost their functional abilities. A range of repayment options are offered. The very best feature of Pluralsight is that it uses a variety of repayment options to fit any type of budget plan. You can pay by the month, year, or even buy a life time subscription. Pluralsight also provides price cuts for educators and pupils ! Payment Options Include. Whether you’re seeking to discover coding, internet development, or anything in between, Pluralsight is a fantastic choice– as well as with its versatile repayment choices, there’s no excuse not to give it a try! Certification of completion for every program. Pluralsight likewise provides a certification of completion for every program, distinguishing it from other on-line education platforms. This can be very useful in constructing your resume and also demonstrating your abilities to prospective companies. Pluralsight is devoted to helping individuals learn new abilities and also expand their professions, and the business’s mission is to make high-grade education available to every person. For any individual looking to boost their skills or learn something new, Pluralsight is a great option. Gain new abilities or improve existing ones. Pluralsight is a wonderful means to acquire new skills or improve existing ones! It gives tons of training courses on different topics to learn what you require to know for your task or your personal life. Pluralsight’s courses are educated by experts who are passionate concerning their fields and understand just how to involve their students. Learning a new ability with Pluralsight becomes a item of cake! Learn at your very own speed. Pluralsight has the advantage of enabling you to discover at your very own speed. It has a variety of courses readily available, so you can constantly locate something intriguing. And also if you’re not exactly sure concerning a particular course, Pluralsight uses cost-free trials to try it before you purchase. It also has continuous discovering courses to track your progression and determine your proficiency in certain abilities. Whether an professional or a newbie , Pluralsight has something for everyone! So why not try Pluralsight today and also see just how far you can go? Free test readily available. Pluralsight supplies numerous functions to its individuals, one of the most preferred being the free test. With the Pluralsight totally free test, individuals can access every one of the site’s programs and also explore Pluralsight at their recreation. The Pluralsight free test is specifically useful for those brand-new to the site and also that need to know just how it works before committing to a paid registration. Pluralsight has different other attributes, consisting of course rankings and also reviews, which can assist customers make notified choices about which programs to take. What are you waiting for? Sign up for Pluralsight today! With its expert-led training courses and versatile learning format, Pluralsight is the excellent platform for IT specialists. Pluralsight’s ideal function is its tool assistance. Pluralsight can be accessed on any type of device with an net connection, consisting of smart devices, tablets, and also laptop computers . This makes it easy to discover new abilities while on the go. Pluralsight additionally has offline viewing, so you can proceed discovering even if you do not have an net connection. Plus, Pluralsight provides a 10-day free test, so you can try out the system prior to committing to a membership. With many benefits, it’s no wonder Pluralsight is among the leading on-line knowing platforms. Eventually, Pluralsight’s different offerings supply chances for people of all backgrounds to develop new skills as well as progress their occupations. A wonderful feature of Pluralsight is its community. Pluralsight has a neighborhood of developers that share their knowledge and knowledge with others. The neighborhood is always happy to assist answer questions, provide feedback, and also work together on tasks. Pluralsight also supplies a online forum for developers to share their code collections, snippets, and also tutorials . Pluralsight is an very useful source for programmers looking to boost their abilities or find out new technologies. A major function of Pluralsight’s interface is its quality. The Pluralsight interface is modern and clean , as well as very easy to navigate. Pluralsight courses are arranged into modules, and also each component is divided into lessons. The Pluralsight user interface makes it very easy to discover the courses you need as well as track your development. Pluralsight additionally uses a variety of methods to find out, consisting of video-based courses, short articles, as well as quizzes. You can also earn badges as well as certifications as you total Pluralsight courses. Pluralsight Review FAQs. Is Pluralsight Expensive? While it holds true that Pluralsight’s training courses are not cost-free, they are still very cost effective compared to various other online education platforms. On top of that, Pluralsight often runs price cuts and also promotions , making their courses much more inexpensive. Hence, Pluralsight training courses aren’t as well pricey as well as are very budget friendly. What is the objective of Pluralsight? Pluralsight is a innovation knowing system that aids businesses close the abilities void as well as maintain their workforce relevant in an ever-changing marketplace. Pluralsight gives online programs taught by professional teachers, permitting pupils to learn new abilities at their very own speed. Which one is much better: Udemy or Pluralsight? There are many different options readily available for on-line discovering, and also it can be challenging to pick the right system for your demands. Two of one of the most prominent systems are Udemy as well as Pluralsight. Both platforms provide a wide range obviously, however there are some vital differences in between them. Pluralsight concentrates particularly on tech-related topics, while Udemy provides a much more varied choice naturally. Pluralsight likewise uses a larger series of functions, consisting of the ability to tailor your knowing experience to your certain objectives. Is Pluralsight Worth It? Pluralsight is most definitely worth your time, specifically if you’re a tech expert (or want to turn into one) aiming to upskill. It is an online education and learning platform that offers programs in different subjects, including programs, design, business, and much more. Pluralsight is a terrific resource for any individual wanting to improve their abilities or discover new ones. The courses are well-designed as well as give a lot of info. They are likewise reasonably priced and included a money-back guarantee. Pluralsight courses are a great investment for any person wanting to improve their abilities. While Pluralsight is not a traditional college, it can still be a important resource for occupation development. The training courses provided on Pluralsight cover a range of subjects that can benefit specialists in any kind of area. For instance, Pluralsight uses programs on job management, internet advancement, as well as graphic layout. On top of that, Pluralsight additionally offers programs on soft skills such as leadership and also interaction. By making the most of the sources supplied by Pluralsight, you can obtain the skills and expertise you need to prosper in your occupation. Overall, Pluralsight is a extensive as well as economical on-line discovering system ideal for both newbies and seasoned students. Start with Pluralsight. Utilizing Pluralsight, you can develop the abilities you need to progress in your career or modification industries. And also most importantly, Pluralsight uses a totally free test so you can try the system as well as see if it’s best for you. Why not obtain started today? With Pluralsight, you can find out at your very own speed as well as routine. Plus, Pluralsight training courses are created by market experts, so you recognize you’re obtaining top notch guideline. When it comes to Pluralsight and its instructors, it most definitely does. Pluralsight offers a selection of settlement alternatives, consisting of credit history card, PayPal, etc! Pluralsight courses are self-paced, suggesting you can work via them at your rate. Pluralsight is an vital source for designers looking to enhance their abilities or find out new modern technologies.
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764499710.49/warc/CC-MAIN-20230129080341-20230129110341-00426.warc.gz
CC-MAIN-2023-06
19,086
124
https://hackingmath.com/integral-calculus
code
Solving a difficult Calculus problem by hand and by Python! A student posted this question to "askmath" on Reddit. It's a Calculus question on finding the volume of a solid formed by rotating a curve around the x-axis. Like the 2-dimensional areas under curves, the solution involves integrals, the inverse operation of derivatives. Also like the 2-dimensional questions, the "Volume of a Solid of Revolution" problems are always introduced using the idea of adding up a number of simpler shapes. These problems are always accompanied by a diagram of a stack of cylinders This method is introduced but quickly replaced by taking integrals algebraically, which works fine if the student understands integrals and the integrals involved aren't crazy hard. Many integrals require special methods of substitution to solve, and many have no derivative! But there's a way that gets a very accurate solution no matter the difficulty of the algebraic solution. Finding the volume of a disk is easy. The volume is We know the radius (that's the value of the function at any x-coordinate) and the height of each cylinder is simply the range of the x-values divided by the number of cylinders you want to use. The more cylinders you use, the more accurate your calculation will be to the actual volume. But doing this by hand, you couldn't realistically calculate the volume of more than 10 or 20 cylinders in a half hour, and that approximation still wouldn't be that accurate. Using a computer would help! With the help of a loop, you could calculate the volume of millions of cylinders in a second or two. The code turned out to be only a dozen or so lines. The solution for 100,000 cylinders took only a tenth of a second, and calculating 1 million took only a half a second to run. The real power of this method is how, even if a function can't be integrated by the usual algebraic methods, it's still no problem for this program. In fact, that would be a good way to introduce other methods such as Taylor Series, which are used for precisely this purpose. I recommend Python! Here's a video of my solutions to this problem:
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474661.10/warc/CC-MAIN-20240226162136-20240226192136-00068.warc.gz
CC-MAIN-2024-10
2,119
9
https://www.lotterypost.com/thread/77997
code
|Posted: January 1, 2004, 11:41 am - IP Logged| Suggest you use your own computer (brain) to select numbers from charts you can build using alpha-numeric substitution. The charts are based on defaults - i.e. letter A for numbers 1-9, B for 10-19, C for 20-29, D 30 and 31. Convert winning numbers to alphabetical sequences, ie. 1-10-23-29-31 would be ABCCD. There are 56 in any pick 5/3x lottery. Develope pair charts for positions 1-2, 2-3, 3-4 and 4-5. Also First 3, Middle 3 Last 3. After you logged some data, you will see some suggestions. If you can get them, compare your selections with the selections the lottery produces when testing the machines. You wouldnt want toplay number combinations that have come up in the pretests and actual drawings. Will provide more information, if you want.
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560283008.19/warc/CC-MAIN-20170116095123-00192-ip-10-171-10-70.ec2.internal.warc.gz
CC-MAIN-2017-04
800
2
https://sping60.pixnet.net/blog/post/32171645
code
I Will Survive - Jemaine Clement & Kristin Chen 改編超有名的Gloria Gaynor-I Will Survive 原曲 Gloria Gaynor演唱 At first I was afraid - I was petrified. I kept thinking that I could never never live - I could barely fly. And I spent oh so many nights thinking how he did me wrong - And I grew strong - And I learned how to get along...Nigel(I will survive) Rio fanAdded by Rio fan Go on, now go! Walk out the door! Just turn around now... It is I who have the floor. Weren't you the one who tried to hurt me with goodbye? Did you think I'd crumble? Did you think I'd lay down and die? Oh no, not Nige! I will survive........! As long as I know how to hate I know I'll stay alive I've got all my life to live, And I've got all my love to give! And I will survive You will survive I will survive We will survive! I'm a survivor I've got the eye of a tiger I've been training again and eating my fiber You've been staying alive well I've been staying alive-er Watch where you sit, when I spit my saliva, like boom You've never seen a cockatoo Rockin' n shockin' and droppin' and pop' and lockin' too? Watch what I can do with out no autotune (say what?) Ay ay ay ay ay ay..... (oh no he didn't!) If you try to keep me down I'll just come back stronger If you try to cut me short I'll just come back longer If you beat me at ping pong I'll just play ping pong-er Give me my throne, I am ready to thrive one thing I know.... I will survive! I - will - survive........
s3://commoncrawl/crawl-data/CC-MAIN-2021-21/segments/1620243988927.95/warc/CC-MAIN-20210508211857-20210509001857-00112.warc.gz
CC-MAIN-2021-21
1,472
43
https://www.myidtoken.com/privacy
code
Information is never sold to any 3rd parties. Some data is used by 3rd parties to enable site functionalities. These 3rd parties are - Amazon AWS is the platform where this service is run. It stores data to browser for easy and secure logins. - Stripe is an online payment service. Payment cards and purchases are handled by Stripe service. - Google Analytics collects statistics about user visits and used functionalities. - Facebook Pixel is used to collects user visits and retargeting. - Microsoft Clarity is used to analyse user behaviour and receive feedback. - Sentry is a monitoring platform that helps to diagnose and fix problems in the service. - Coralogix is a logging platform that logs information about the essential activities and error situations within service. Logs are used mainly for helping error analysis and fixing.
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100568.68/warc/CC-MAIN-20231205204654-20231205234654-00399.warc.gz
CC-MAIN-2023-50
839
8
https://www.thedailyplane.com/an-epic-flat-smacking-live-ditrh-uncle-odd-me-with-max-from-epic-cash/
code
Thanks for watching! Please see below for links to my old videos, new videos and ways to support the channel! New Videos: http://rokfin.com/jeranism Old Videos: http://odysee.com/@jeranism ₿ If you are interested in a one on one crypto consultation you can find the details and the sign-up form here: http://jeranism.com/crypto ₿ If you are interested in the past and future crypto classes you can find the details and sign-up here: http://patreon.com/jeranism ₿ To donate with crypto: https://jeranism.com/donate/ Support options are running low! If you’d like to support the channel, you can use the places listed below. I very much appreciate the support. Credit Card: http://buymeacoffee.com/jeranism Cash App: $jeranism Mail me stuff! jeranism PO Box 3044 Merced, CA 95344 EMAIL ME: [email protected] Note regarding contacting me: I don’t have time to get to all emails. So, I apologize if you have been trying. I do consultations, classes and answer all my Patrons questions. So, if you really need to get a hold of me, then become a Patron. I do sometimes get to my yahoo email so who knows… maybe I will get back to you! I don’t have time to go through comment by comment. I wish I could but I cannot. So if yours is accidentally deleted or deleted unjustly, I apologize… try again. Thanks for watching my videos! Please share them if you enjoy them! Peace!
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224650409.64/warc/CC-MAIN-20230604225057-20230605015057-00200.warc.gz
CC-MAIN-2023-23
1,394
14
https://forum.provue.com/t/wanted-a-non-sorting-arraydifference-function/1359
code
A side effect of the arraydifference( functions is that the input parameters are sorted. Does anybody have an arraydifference( function that doesn’t sort? A side effect of the I incorrectly tagged this post as Panorama X - I actually want it for Panorama 6. I’m not sure what you mean by “the input parameters are sorted”, the input parameters aren’t changed at all. It’s the output that is sorted. That said, sorting isn’t a side effect, it is integral to how these functions work. A “non-sorting” version of these functions would be MUCH slower, for large arrays it could be hundreds or even thousands of times slower. Also, a “non-sorting” version would also bring up the question of what order the output should be in. If the two input arrays are in different orders, there is no general correct answer to that question. Sure, for some small arrays there could be a non-sorted version that might be the obvious answer to a human, but that would only be because the data was actually sorted in some way that wasn’t alphabetical but was recognizable by humans. Depends how pedantic you want to be. The parameters are concatenated and that concatenation is sorted - I see that as sorting the parameters. Well, last time I looked, I was human. My data isn’t sorted, its occurrence is according to the date on which it was acquired and I want it to remain in that order. I’ll modify the code and see how much it slows down - there are 250,000 records, each of which requires an arraydifference operation in a formulafill statement so it will be a good test. Ok, you are talking about what the code does internally. If you simply take out the arraydeduplicate and arraysort statements, it will undoubtably run quite a bit faster. However, it will no longer reliably produce a list of differences. The two arrayfilter statements further down in the procedure rely on the fact that the data is sorted. They won’t produce a correct list of differences if the data is not sorted. Your request is literally impossible. You have two arrays, there is no way to tell where an item in the first array should be placed in relation to an item in the second way. (At least there is no way to tell from the arrays themselves, you may have additional information outside the array that can resolve that, but it is not available to the arraydifference function.) Suppose you have this array: dog cat bird And this array: zebra lion elephant The arraydifference of these two arrays will be an array with six elements. But if not ordered, what is the order that should be used?? Where does zebra go – before or after dog, or some other spot? There simply is no such thing as “remaining in the same order” for this operation. arraydifference( function removes from the first array those elements which also occur in the second array. If they are not sorted, the remnants of the first array will still be in the desired order. It also removes from the second array those elements which also occur in the first array, which is where the impossibility lies. Perhaps in your data, all elements in the second array will always be in the first array. If so, that means that the task is not impossible. However, simply removing the sorting code from the arraydifference code is not going to get the job done, it will take entirely new code to do this since you won’t be able to rely that duplicate values will always be next to each other in the array. You must be looking at a different function to me. The output from the arraydifference( function I see is a new array which leaves both of the input arrays unchanged. The original ProVUE code took 24 minutes to process 250,000 records. My modified code took 29 minutes. I replaced this code: arraydeduplicate arraystrip(a1,sep),a1,sep arraydeduplicate arraystrip(a2,sep),a2,sep both=a1+sep+a2 arraysort both,both,sep arrayfilter both,both,sep,?(import() = array(both,seq()-1,sep),import(),"") arraystrip both,sep if both<>"" arrayfilter a1,diff,sep,?(arraycontains(both,import(),sep),"",import()) arraystrip diff,sep else diff=a1 endif arrayfilter a1,diff,sep,?(arraysearch(a2,import(),1,sep)>0,"",import()) arraystrip diff,sep and it works. For the benefit of anyone reading this thread in the future, Michael’s code is definitely NOT a replacement for the arraydifference function. It may be just what Michael needs for his current application, but it is not the same operation. His code produces a list of items that are in the first array that are not in the second array. But it does not include items that are in the second array that are not in the first array. The arraydifference function included with Panorama results in a list of items that are in either the first or second array, but not both. If Michael’s function was going to be included in Panorama, it would probably be named something like itemsonlyinfirstarray(. OK, I was fooled by this description: “This statement compares two arrays. The result is a list of elements that are included in the first array but not the second.” which I interpreted as what I wanted to do. The acid test of course is that message arraydifference( "43,2,3,4,5,04","3,4,5,6,7",",") gives the result, “04,2,43” Actually, you weren’t fooled – rather, I have egg all over my face. Somehow I had an incorrect recollection of what this function did. The documentation is correct, and so are you. In addition to dealing with my embarrassment, I also need to check to make sure I have not used arraydifference( anywhere incorrectly, based on my faulty understanding of its operation … time passes … ok, it looks like the four places it is used in Panorama libraries are correct. My apologies for my faulty advice. That’s one demerit point to you compared with a gazillion for me.
s3://commoncrawl/crawl-data/CC-MAIN-2021-25/segments/1623487611641.26/warc/CC-MAIN-20210614074543-20210614104543-00276.warc.gz
CC-MAIN-2021-25
5,810
42
https://community.bridgeapp.com/ideas/1801
code
As a user I want to be able to anchor the background image of a cover-slide to a corner of the viewport, so I can retain visual identity across multiple devices. Currently (unless Center mode is selected) the background image is anchored to the top left corner of the viewport. This means that any design on the right side of the background will be omitted on a mobile device. I have tried to illustrate it below. Imagine that the image above is our background image. Because the Bridge logo is in the top left, it will be visible on a mobile device. However any design that keeps elements/watermarks in the bottom right (and even in the bottom left in some cases) will be outside of the viewport on most mobile devices. Summary: To better retain visual identity, an option to anchor the background image to a corner of the the users choice would be most useful. Thank you for your consideration.
s3://commoncrawl/crawl-data/CC-MAIN-2019-09/segments/1550247494424.70/warc/CC-MAIN-20190220024254-20190220050254-00244.warc.gz
CC-MAIN-2019-09
896
6
https://reg4tech.com/brandpost-the-status-quo-for-dns-security-isnt-working/
code
The Domain Name System (DNS) is often referred to as the phone book of the internet. DNS translates web addresses, which people use, into IP addresses, which machines use. But DNS was not designed with security in mind. And even though companies have invested incredible amounts of money into their security stack (and even though they’ve had since the 1980s to figure this out), DNS traffic often goes unmonitored. This has only worsened with the adoption of encrypted DNS, known as DNS-over-HTTPS (DoH). Since its introduction in late 2018, DoH has grown from a personal privacy feature that most IT teams blocked outright, to an encouraged enterprise privacy and security function. While DoH protects traffic in transit, it also leaves organizations with little to no visibility over what’s happening with their DNS queries.
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100523.4/warc/CC-MAIN-20231204020432-20231204050432-00059.warc.gz
CC-MAIN-2023-50
831
2
https://practicaldev-herokuapp-com.global.ssl.fastly.net/camptocamp-ops/taming-puppetserver-6-a-grafana-story-3c4f
code
After some time preparing for the migration, yesterday was finally the time to switch our first production Puppetserver to Puppet 6. Everything was ready: we had been running both versions of the server alongside each other for some time, performing catalog diffs, and nothing seemed to be getting in the way as I went into ArgoCD and deployed the new version of the stack. The first 30 minutes went fine. But then catalogs started failing compilation, and other services colocated on the OpenShift cluster became slow. In retrospect, I should have known something was wrong. Two weeks ago when I started my tests with Puppet 6 on another platform, I noticed that the server would die of OOM quite rapidly. Our Puppetserver 5 pods had been running happily for years with the following settings: max_active_instances: '4' java_xmx: '2g' requests: cpu: 10m memory: 2Gi limits: cpu: 3 memory: 4Gi When I started new Puppet 6 instances with these settings, they would die. Initially, I thought the Xmx wasn't high enough so I set it to 3g and everything seemed fine again, for the duration of the catalog-diff tests. But when the servers started crashing in production yesterday, it was clear there was another problem. And upgrading the Xmx to a higher value didn't help. So we looked at the graphs. For years, we have been gathering internal metrics from our Puppetservers. Our Puppetserver Helm chart comes equipped with a JMX Exporter pod to gather the data and send them to Prometheus. We then have a Grafana dashboard presenting all the Puppetserver metrics in a useful manner. Looking at the graphs from even before the switch showed that something was indeed aloof. Clearly, the Puppetserver 6 instances had a very different memory ramp up (blue and yellow "teeth" lines), even during the tests phase. I just hadn't noticed then. We started a series of tests, using Puppet Catalog Diff runs to test load the servers, and playing on all various parameters of our stack: - memory requests - memory limits - cpu limits - Java Xmx - max active instances It quickly became clear that the main factor in our problem was that the memory request was too low. The official Puppet documentation gives a rule of thumb for tuning the Puppetserver memory. It indicates that each active instance requires 512MB, but another 512MB should be provided for non-heap needs: You’ll also want to allocate a little extra heap to be used by the rest of the things going on in Puppet Server: the web server, etc. So, a good rule of thumb might be 512MB + (max-active-instances * 512MB). Our graphs clearly showed that the non-heap memory of the instances stabilized a little bit over 512MB (around 550MB as I'm writing this). Since we requested 4 JRuby instances, we should ensure at least (4+1)*512MB of RAM, so 2.5GB. And while our limit was set to 4GB, the requests were only set to 2GB. Changing the requested memory to a higher value showed that this was what was making our servers misbehave. We originally set the containers to a CPU limit of 3 because or compute nodes have 4 CPUs and we wanted to leave one free. We actually noticed that Puppetserver was using closer to 2.5 CPUs as a mean. So we set the limit to 4 and saw that the Puppetserver seemed to use even less CPU, down to a mean of 2. Note that limiting CPUs is necessary when running Java in containers, otherwise Java believes it runs on a single CPU. Max JRuby Instances The number of JRubies recommended changed between Puppet 5 and 6, as stated in the documentation. Up to Puppet 4, it was recommended to set it to num-cpus + 2, but the docs now state: As of Puppet Server 1.0.8 and 2.1.0, if you don’t provide an explicit value for this setting, we’ll default to num-cpus - 1, with a minimum value of 1 and a maximum value of 4. We ran load tests with different values of max JRuby instances and found that num-cpus - 1 was indeed the best good value. Most importantly, we found that setting up the max JRuby instances higher than the number of CPUs made compilation time quite slower (supposedly as it would increase context-switch between the instances). Following the guidelines and our tests, we ended up with: max_active_instances: '3' # since we have 4 CPUs java_xmx: '2g' # (3+1)*512MB requests: cpu: 10m memory: 3Gi # 1.5*XmX limits: cpu: 4 # Use all available CPUs as limit memory: 3.3Gi # 1.1*request just in case On this graph from the last 2 days, we can clearly see the situations before production time, during crisis, and after proper tuning: So our Puppetserver was back under control, with pretty similar memory settings to what Puppet 5 used. Keeping the two pods we had been running, with their new tuned settings, we ran stress tests by setting the number of parallel threads in the Catalog Diff run. When running 12 threads in parallel (far more than what 2 pods with 3 JRubies each can take), we noticed something I had seen before but not understood: Failed to retrieve catalog for foo.example.com from puppetserver in environment catalog_diff: Failed to open TCP connection to puppetserver:8140 (No route to host - connect(2) for "puppetserver" port 8140) I had initially thought this was what happened by the Puppetserver was too busy and started rejecting connections. But no, this was clearly another problem, linked to Kubernetes networking and readiness probes. As we kept an eye on the Pods readiness during the run, we noticed the pods were going on and off, and thus being taken out of the Kubernetes service on a regular basis. The TCP connection issues happened when both pods were taken out of the service at the same time, since the service ended up with no endpoints left. So we turned to the pod's readiness probe to tune it. This is the default readiness probe we use in our Helm chart: readinessProbe: httpGet: path: /production/status/test port: http scheme: HTTPS httpHeaders: - name: Accept value: pson initialDelaySeconds: 30 The initial delay lets the Puppetserver start its first JRuby instance before sending a probe. The default in Kubernetes would be 0 otherwise, which would clearly fail for a Puppetserver. For all other settings, we relied on the defaults. As per Kubernetes docs: - initialDelaySeconds: Number of seconds after the container has started before liveness or readiness probes are initiated. Defaults to 0 seconds. Minimum value is 0. - periodSeconds: How often (in seconds) to perform the probe. Default to 10 seconds. Minimum value is 1. - timeoutSeconds: Number of seconds after which the probe times out. Defaults to 1 second. Minimum value is 1. - successThreshold: Minimum consecutive successes for the probe to be considered successful after having failed. Defaults to 1. Must be 1 for liveness. Minimum value is 1. - failureThreshold: When a Pod starts and the probe fails, Kubernetes will try failureThreshold times before giving up. Giving up in case of liveness probe means restarting the container. In case of readiness probe the Pod will be marked Unready. Defaults to 3. Minimum value is 1. timeoutSeconds parameter looks very low at 1 second by default. Indeed, we know that a busy Puppetserver could take more than 1 second to respond and that would be perfectly acceptable. So we've set it to 5 instead and the service has been much more stable since. We've also set A small fine-tuning goes a long way! Be sure to gather enough data about your Puppetserver so you have the tools to debug its behavior when you need. Do you have Puppet, Kubernetes, or observability needs? You can contact us and we'll be happy to put our expertise at your service! Top comments (0)
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296949701.0/warc/CC-MAIN-20230401032604-20230401062604-00538.warc.gz
CC-MAIN-2023-14
7,609
60
https://nextbigcoins.io/atomic-swaptions-cryptocurrency-derivatives/
code
The atomic swap protocol allows for the exchange of cryptocurrencies on different blockchains without the need to trust a third-party. However, market participants who desire to hold derivative assets such as options or futures would also benefit from trustless exchange. They propose the atomic swaption, which extends the atomic swap to allow for such exchanges. Crucially, atomic swaptions do not require the use of oracles. They introduce the margin contract, which provides the ability to create leveraged and short positions. Atomic swaptions may be routed on the Lightning Network. Cryptocurrencies such as Bitcoin rely on cryptographic protocols for security. However, as originally designed, there was no mechanism for different blockchains to communicate securely with each other. Thus, trading cryptocurrencies was (and is) done ”off-chain”, or outside of the scope of the blockchains involved. Two users who wished to trade would have to deposit their funds in a trusted third party, typically taking the form of a centralized cryptocurrency exchange. The need to trust centralized exchanges has long been an uncomfortable reality within the cryptocurrency community. Exchange participants often fear that their funds may be frozen, seized or stolen, and history has shown that such fears are well-founded. Conversely, exchanges with good reputations have monopolistic power over potential new users/investors of a given cryptocurrency, allowing them to extract rents and exercise undue influence over cryptocurrency development in general. For instance, they can choose which new altcoins to support on their exchange, perhaps charging a listing fee. Creators of new altcoins must cede to their demands or take their chances by working with less reputable exchanges. These frictions make it difficult for new participants to first acquire coins, posing an impediment to the adoption of cryptocurrencies. Atomic swap allows users to avoid the risks and disadvantages inherent to centralized exchanges when trading. Atomic swaps use Hashed Time Lock Contracts (HTLCs), a form of cryptographic escrow; the blockchains themselves act as the trusted third party. Viewed another way, atomic swaps utilize cryptographic secrets to allow users to prove on one blockchain that certain events occurred on a different blockchain. The functionality of atomic swaps can be further extended to allow the creation of option contracts, which is termed atomic swaptions. Parties can deposit only a fractional margin instead of the full principal. This, in turn, allows for a meaningful notion of a futures contract, enabling users to take leveraged or short positions on one cryptocurrency against another. Previous approaches to decentralized derivatives have focused on trading ERC20 tokens on the Ethereum blockchain and/or use oracles (trusted providers of external data) to determine contract outcomes. This approach can be used between different blockchains, with only the requirement that they can support the creation of HTLCs with the same hash function. Namely, the blockchains don’t need to be Turing-complete like Ethereum. In addition, atomic swaptions don’t require oracles, eliminating an unnecessary element of trust from the process. The design and adoption of new blockchains is an ongoing process, and it remains an open question what operations a blockchain should support to best facilitate the development of applications on top of it. A wide class of inter-blockchain derivatives can be implemented with only the features required to implement an atomic swap. The atomic swaption thus provides a practical path to derivatives trading on existing cryptocurrencies, and removes the need for designers of future blockchains to create specialized derivatives applications.
s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320301670.75/warc/CC-MAIN-20220120005715-20220120035715-00715.warc.gz
CC-MAIN-2022-05
3,795
8
https://timespro.com/blog/python-vs-java-know-the-differences-and-comprehensive-comparision
code
Programming languages are the backbone of modern software development. Since their inception, programming languages have evolved significantly to meet software development demands. Among the most popular programming languages today are Java and Python. Both languages are widely used for al types of development. But Java Vs Python: which programming language is better? What is the major difference between Python and Java? In this post, we will explore the differences and similarities between Java and Python, and help you decide which one is best for your software development projects. Let us get started now. Java and Python share a few similarities and differences that make them unique. Here are some of the key Java Vs Python differences between these two programming languages: Talking of Java Vs Python, Java has a more complex syntax as compared to Python. In Java, developers need to write more lines of code to complete a task. On the other hand, Python is known for its simplicity and ease of use. The code in Python is more concise and hence, easier to read and write. This makes Python less time-consuming and more intuitive, especially for beginners. Moreover, Python is easy for game development. Java is known for its reliability and performance, while Python is known for its flexibility and ease of use. Java is generally faster and more efficient than Python, making it ideal for large-scale enterprise applications. Python, however, is slower when it comes to performance but it is a great choice for web applications and data analysis. Python’s type system is also known for its clear and concise syntax, making it more readable and less prone to bugs and errors. Java is widely used for enterprise software development, mobile applications, and games. Some of the most popular software applications and gaming engines, such as Minecraft and Android are built using Java. Conversely, Python is widely used for web development, data science, AI applications, machine learning, and automation. Some of the most popular web frameworks such as Django and Flask, are built in Python. For the community support of Java Vs Python, we can say that Java has been around since the mid-1990s and has a well-established developer community. This means that there are plenty of resources available, including libraries, frameworks, and online forums. Python, however, has become increasingly popular over the years and now has a large active developer community. Python also has many online courses and tutorials available, making it easier for new developers to learn the language. Here is where the debate of the Java and Python difference gets interesting. While both Java and Python have their unique strengths and weaknesses, the choice between the two ultimately depends on your software development project’s requirements and objectives. Here are some factors in the Java Vs Python debate that will help you decide which language to use: Python and Java difference lies in the learning curve. If you are new to programming and want to learn a new language, Python would be the best choice. Python is simple and easy to understand; it enables you to write functional applications quickly and build a solid understanding of programming. Java is your best choice if you are working on a large-scale enterprise project requiring high performance. Java is designed with high performance, reliability, and security in mind. Python, on the other hand, is a great choice for building web applications and analysis. While Java and Python are very different languages, both are well-suited for different software development projects. Choosing between Java Vs Python ultimately depends on your project's needs. Java is the best choice if you want to develop large-scale enterprise solutions. However, if you are focused on web development, data science, AI or automation, then Python would be an excellent choice. Ultimately, the choice between Java Vs Python should be based on your requirements, resources, and objectives. We hope you got all the necessary information and full insights on Python and Java. Python is a high-level, interpreted language that excels in rapid development. Java offers better performance, cross-platform support, and a larger ecosystem for enterprise applications. Academic Partners: IIM Kozhikode | IIM Calcutta | IIM Lucknow | IIM Indore | XLRI Jamshedpur | IIM Raipur | IIT Roorkee | IIM Kashipur | SPJIMR | IIM Tiruchirappalli | IIM Visakhapatnam | MICA | IIM Jammu | IIM Nagpur | KJSIM | BIMTECH | IIM Bodh Gaya | IMI Bhubaneswar | IMT Hyderabad | IIM Sirmaur | IIT Jammu | IIT Guwahati | IIT Ropar | University of Hyderabad | IHUB Divyasampark Copyright ©️2024 Bennett, Coleman & Co. Ltd. All rights reserved.
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474715.58/warc/CC-MAIN-20240228112121-20240228142121-00626.warc.gz
CC-MAIN-2024-10
4,762
16
https://archive.sap.com/discussions/thread/134012
code
Connecting to SAP system I have a EP6.0 SP16 and the same network has R/3 4.7 and a CRM systems. The EP 6.0 is freshly installed. Now I would like to connect the portal to these SAP systems(r/3 and crm). Could you plese let me know in detail how to go about and accomplish this and also please do let me know how to test these connections.
s3://commoncrawl/crawl-data/CC-MAIN-2019-13/segments/1552912201329.40/warc/CC-MAIN-20190318132220-20190318153617-00010.warc.gz
CC-MAIN-2019-13
339
2
https://forum.xda-developers.com/showthread.php?p=49622055
code
Steps I completed: 1. downloaded zip file to flash to desktop computer 2. made a copy of the file and renamed it to org_no_tether.zip 3. opened org_no_tether.zip so I could delete the new framework-res.apk file 4. copied my phone's current framework-res.apk file to the org_no_tether directory I created when unzipping file using droid explorer to access file 5. rezipped org_no_tether directory to org_no_tether.zip 6. placed both files on my external sd card When I rebooted it just hung during the AT&T boot animation sequence. I tried wiping the cache, user data, dalvik cache, etc...to try and get it to boot to no avail. I ended up just having to reinstall the ROM using a zip file I found on these forums and everything runs great now. The file I used to reinstall the ROM via recovery was loserskaters found here http://forum.xda-developers.com/show...ount=18http://. Everything works great now but I'd still like to get the tethering hack. In the instructions it said to copy the file to the external sd card so that's what I did, but what I'm wondering is if I was supposed to copy it to my sdcard instead where I place all other files to be flashed? I just wanted to be sure I didn't do something else wrong before I go through this process again and end up having the same result. Thanks a lot for any help!
s3://commoncrawl/crawl-data/CC-MAIN-2017-47/segments/1510934805923.26/warc/CC-MAIN-20171120071401-20171120091401-00028.warc.gz
CC-MAIN-2017-47
1,319
10
http://www.dotnetfunda.com/forums/show/19245/unable-to-retrieve-metadata-for-mvc-entity-data-model-could-not-find-c
code
I have Add EntityDataModel.edmx which having two tables that are inter related each other as tblDepartment and tblEmployee. My database name is "Form1" and Model Namespace is "Models" and Data Context Class is EmployeeContext and then I build the solution. When step 3: Right click on the "Controllers" folder and select Add - Controller. Set Name = EmployeeController Template = MVC controller with read/write actions and views, using Entity Framework Model class = tblEmployee(MVCDemo.Models) Data Context Class = EmployeeContext(MVCDemo.Models) Views = Razor I got error "unable to retrieve metadata for mvc entity data model could not find clr type" in dialoug box.Please help me for this...
s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218189130.57/warc/CC-MAIN-20170322212949-00251-ip-10-233-31-227.ec2.internal.warc.gz
CC-MAIN-2017-13
695
9
http://www.droidforums.net/threads/sick-of-facebook-app-taking-up-ram-on-its-own-anyway-to-stop-it.182602/page-3
code
I have around 80mb free usually. My advice like I said earlier is to remove any app killers you have, reboot your phone, and LEAVE IT ALONE. Killing apps will just eat up more ram and more battery. I use my phone heavily and I always have plenty of battery left at the end of the day. App Killers = Bad. If you want Facebook on your phone, then install it and LEAVE IT ALONE. If you want to use it occasionally then either 1.) Use a browser for regular facebook or 2.) uninstall the app when you're done using it... I don't know what else to tell you guys.
s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590347398233.32/warc/CC-MAIN-20200528061845-20200528091845-00337.warc.gz
CC-MAIN-2020-24
556
1
https://communities.sas.com/t5/Administration-and-Deployment/ERROR-Variable-ACCOUNT-BALANCE-in-list-does-not-match-type/td-p/140682?nobounce
code
10-24-2014 08:16 AM length ab 8 format ab BEST15. informat ab BEST15. ab variable is a part of Input_Data 16 proc summary data=Input_Data; 17 by GENERAL_LEDGER_NUMBER EXCO_CODE COMPANY_DIVISION_CODE; 18 var ab; ERROR: Variable ab in list does not match type prescribed for this list. 21 output out=Data sum=DATA_TOTAL; I need your help on this how to resolve this.I tried format statement as well as input not working...can you provide tested code..Thanks in advance 10-24-2014 10:59 AM Format won't change a variable from character to numeric. The variables on the VAR statement in Proc Means/Summary must be numeric in the input dataset. The values may look numeric but I bet if you run Proc contents on your Input_data set that it will show variable ab as character. And if there are actually 15 digits you're possibly going to run into precision limitations. 10-26-2014 08:12 PM set MyInputData; /* Which contains the (presumably character) variable AB */ format ab BEST15.; /* Your choice of format is actually irrelevant for this exercise */ ab_num = input(ab,best15.); /* Note: The INFORMAT you choose will depend on the character "layout" - I've guessed BEST. here); drop ab; /* Optional */ proc summary..... etc. If this does not help, please post the results of a PROC CONTENTS, plus the first few rows of a PROC PRINT of the AB variable.
s3://commoncrawl/crawl-data/CC-MAIN-2018-26/segments/1529267866358.52/warc/CC-MAIN-20180624044127-20180624064127-00423.warc.gz
CC-MAIN-2018-26
1,348
21
https://www.eldos.com/documentation/sbb/documentation/ref_howto_pki_pkcs7_decompress.html
code
Decompress data with TElMessageDecompressor TElMessageDecompressor complements TElMessageCompressor which allows to quickly compress a piece of arbitrary data. Unlike ZIP components, TElMessageCompressor and TElMessageDecompressor work with uninterpreted streams or arrays of data, they accept and return PKCS#7 CompressedData structures. Decompressing data with TElMessageDecompressor is a two-step procedure: int res = decompressor.Decompress(compressedData, originalData);On completion, originalData contains the decompressed data. Always check the return value of the Decompress() method. The return value of 0 indicates successful completion of the method; any other value represents an error code. Note that Decompress() method only accepts properly encoded PKCS#7 CompressedData messages, and can't be used with any other compressed format (such as ZIP, BZIP or 7Z).
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917121355.9/warc/CC-MAIN-20170423031201-00213-ip-10-145-167-34.ec2.internal.warc.gz
CC-MAIN-2017-17
873
5
http://www.ncs-support.co.uk/our-services/supply-of-it-hardware-software/
code
Supply of IT Hardware & Software NCS do not simply install and support your IT equipment, we can also supply hardware and software at highly competitive prices. Whether you require consumables for a printer or an entire new network, contact NCS for the best pre-sales technical advice. NCS can source equipment from all of the major vendors including:- - HP Proliant servers, PCs and notebooks - PCs and notebooks from Toshiba, Sony, Acer and Fujitsu Siemens - Network hardware from HP, 3Com, Netgear, Sonicwall, ZyXEL, Watchguard and Buffalo - Software solutions from Microsoft, Sophos, Symantec and Sage NCS pre-sales consultants are also experts in Microsoft Licensing and can recommend licensing solutions to our customers. This includes Microsoft Open, Value and Subscription licensing schemes and the legal requirements for each.
s3://commoncrawl/crawl-data/CC-MAIN-2015-18/segments/1429246633972.52/warc/CC-MAIN-20150417045713-00005-ip-10-235-10-82.ec2.internal.warc.gz
CC-MAIN-2015-18
835
7
https://www.airbnb.ca/rooms/12924969
code
BEAUTIFUL COMFORTABLE MASTER BEDROOM WITH 60" FLATSCREEN TV I am a retired city worker.with acoustical Intrerestes. Response rate: 100% Response time: within an hour Always communicate through AirbnbTo protect your payment, never transfer money or communicate outside of the Airbnb website or app.
s3://commoncrawl/crawl-data/CC-MAIN-2018-47/segments/1542039741510.42/warc/CC-MAIN-20181113215316-20181114001316-00351.warc.gz
CC-MAIN-2018-47
297
5
https://mail.python.org/pipermail/mailman-users/2011-March/071229.html
code
[Mailman-Users] does mailman ever automatically delete an expiredemail address? mark at msapiro.net Thu Mar 10 18:01:55 CET 2011 Jane Frizzell wrote: >Does mailman ever delete members from lists automatically for any Automated bounce processing will do this. >One of the owners of one of our lists (only 1 list seems to have >been affected) recently reported that he had lost 100 users from his >list. They were removed, not just marked as nomail. This could be due to normal bounce processing. They may have been removed after exhausting notices or immediately upon reaching the threshold score depending on the list's Bounce processing settings. Check Mailman's 'bounce' log for more detail on what was done and why. Also, prior to Mailman 2.1.10 there was a bug in cron/disabled that could cause list members with stale bounce information to be disabled/removed if the list's bounce_score_threshold value was >A primary look at >some of the names lost. show that the addresses were no longer valid >email addresses. The addresses would have expired about 6-8 months ago. >The message he got as he was the owner, one message per address was: >----- Forwarded message from mailman-bounces at lists.bates.edu ----- > Date: Wed, 09 Mar 2011 09:00:05 -0500 > From: mailman-bounces at lists.bates.edu >Reply-To: mailman-bounces at lists.bates.edu > Subject: batesbuild unsubscribe notification > To: batesbuild-owner at lists.bates.edu >username at bates.edu has been removed from batesbuild. That's the generic unsubscribe owner notification. It is consistent with removal by bounce processing. Mark Sapiro <mark at msapiro.net> The highway is for gamblers, San Francisco Bay Area, California better use your sense - B. Dylan More information about the Mailman-Users
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662515466.5/warc/CC-MAIN-20220516235937-20220517025937-00010.warc.gz
CC-MAIN-2022-21
1,764
32
https://amanshakya.wordpress.com/category/uncategorized/
code
Just came back from the Aid Transparency Barcamp, Kathmandu. I had a talk on Linked data and Semantic Web Technologies for Aid Transparency. It was a mixed group of audience, with both developers and non-technical people. I guess that the presentation was a bit too much for the non-technical side (sorry for that :-P). There are many things in the slides, so sharing them here for everyone’s reference. The developers may play with the tools and datasets. Perhaps someone could use Tim’s linked data and demonstrate some interesting app. (Thanks Tim ;-)) Some major questions/concerns from the audience – * This seems too technical, does the user need to understand all this? (No) * What will the user see as linked data, web pages? or something different? (ya basically web pages, but driven by data from different linked sources) But most importantly, * What problem does linked data address? (Thanks Simon for helping me answer this .. you can put complex queries which need data from across various sources, further you can reuse/link to existing data and similarly others can reuse/link to your data) Towards the end Simon pointed out that we still need small concrete example applications (in aid transparency) to really convince people (at different levels) to provide (linked) open data, not just demos or visualizations. Agree. Perhaps the developers/industry can build something really useful for some stakeholder to prove the potential of linked open data.
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917119637.34/warc/CC-MAIN-20170423031159-00072-ip-10-145-167-34.ec2.internal.warc.gz
CC-MAIN-2017-17
1,474
9
https://wiki.arx-libertatis.org/Code_File_Structure
code
Code File Structure Need rules here for new developers. In general, try to follow the existing structure as you see it. Minimize the functionality in files and try to follow modern c++ standards. Name files for their content (nouns), not for their actions (verbs). Don't be afraid to ask for help if you can't decide what to name a file!
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679518883.99/warc/CC-MAIN-20231211210408-20231212000408-00764.warc.gz
CC-MAIN-2023-50
337
6
https://boardgamegeek.com/thread/997366/can-be-starting-equipment-trade
code
No, you can't. From the page 21, section TRADING ITEMS: During the Campaign phase, heroes may freely exchange their Shop Item cards among themselves. They may do this at any time until the next quest begins, except during travel. Note: Heroes cannot trade starting equipment. However, they may sell these cards, as described above
s3://commoncrawl/crawl-data/CC-MAIN-2019-04/segments/1547583743003.91/warc/CC-MAIN-20190120224955-20190121010955-00519.warc.gz
CC-MAIN-2019-04
330
7
http://www.theworkfromhomedirectory.com/blog/results-or-excuses
code
Many of us have wanted something really bad in the past, and most likely we found a way to overcome the obstacles, because we dug deep within get it. Odds are the results were basicly a product of our hard work, polished skill set, and through surrounding ourselves around the right people. Sure the excuses were there, but they didn't matter because in the larger scheme of things, the end result certainly justified the sacrafice, the sleepless nights, the blood, sweat, and tears shed for that wonderful result. "How would your life look without Excuses?" We have to give ourselves permision to fail, to feel fear, and to get passed it as we've all done in the past. So lets go and create more RESULTS and put an end to our EXCUSES!
s3://commoncrawl/crawl-data/CC-MAIN-2018-43/segments/1539583512499.22/warc/CC-MAIN-20181019232929-20181020014429-00452.warc.gz
CC-MAIN-2018-43
735
3
https://www.techgig.com/jobs/LTI-is-haring-for-PSFT-Finance-Technical-Consultant/68905730
code
1. PeopleSoft Technical consultant with minimum 2-7 years of experience 2. Good experience in PeopleSoft PeopleTools 8.56 and above, App Engine, PeopleCode. 3. Experience in PeopleSoft Upgrade projects is a must. 4. Experience in PeopleSoft CRM modules: FieldService and Support 5. Responsible for the reviewing compare reports, retrofitting, bug-fixing and Testing. 6. Excellent communication skills - written and verbal 7. Knowledge of PS new features & functionalities 8. Analyze customization and facilitate fit/gap analysis
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030334974.57/warc/CC-MAIN-20220927002241-20220927032241-00611.warc.gz
CC-MAIN-2022-40
528
8
https://openreview.net/forum?id=NjU0jtXcYn
code
A General Framework for User-Guided Bayesian Optimization Code Of Ethics: I acknowledge that I and all co-authors of this work have read and commit to adhering to the ICLR Code of Ethics. Keywords: Bayesian Optimization, Hyperparameter Optimization, Gaussian Processes Submission Guidelines: I certify that this submission complies with the submission instructions as described on https://iclr.cc/Conferences/2024/AuthorGuide. TL;DR: We develop a Bayesian-principled framework for the incorporation of user beliefs over the location of the optimizer into Bayesian optimization. Abstract: The optimization of expensive-to-evaluate black-box functions is prevalent in various scientific disciplines. Bayesian optimization is an automatic, general and sample-efficient method to solve these problems with minimal knowledge of the the underlying function dynamics. However, the ability of Bayesian optimization to incorporate prior knowledge or beliefs about the function at hand in order to accelerate the optimization is limited, which reduces its appeal for knowledgeable practitioners with tight budgets. To allow domain experts to customize the optimization routine, we propose ColaBO, the first Bayesian-principled framework for incorporating prior beliefs beyond the typical kernel structure, such as the likely location of the optimizer or the optimal value. The generality of ColaBO makes it applicable across different Monte Carlo acquisition functions and types of user beliefs. We empirically demonstrate ColaBO's ability to substantially accelerate optimization when the prior information is accurate, and to retain approximately default performance when it is misleading. Anonymous Url: I certify that there is no URL (e.g., github page) that could be used to find authors' identity. Supplementary Material: pdf No Acknowledgement Section: I certify that there is no acknowledgement section in this submission for double blind review. Primary Area: probabilistic methods (Bayesian methods, variational inference, sampling, UQ, etc.) Submission Number: 3781
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817014.15/warc/CC-MAIN-20240415174104-20240415204104-00043.warc.gz
CC-MAIN-2024-18
2,066
11
https://wiki.openttd.org/en/Archive/Manual/News%20messages
code
The news messages The news messages informs you about important events in the game. News messages are displayed at the status bar in the Game interface. You can change which messages to display and how to display them by changing the Message settings. All message types are listed below. (If there is wrong information, you can edit it to get it correct, or you can add more information) Arrival of first vehicle at player's station E.g. "First train arrives at..." for player's stations Arrival of first vehicle at competitors's station E.g. "First train arrives at..." for competitors's stations Information about accidents (e.g. aircraft crashes, train collision, etc) and disasters (e.g. UFO landings) New companies being founded, companies being taken over or declared bankrupt. Information about production increase/decrease for industries. Advice/information on player's vehicles Information about player's vehicles (e.g. "Train 1 has too few orders in the schedule"). Notifications about new vehicles being available. Changes to cargo acceptance Sometimes conditions around a station change, causing it to accept new cargo or to stop accepting cargo. This is most likely to happen with Passenger, Mail and Goods stations, due to towns being reconstructed. Whenever a new subsidy is available or an existing subsidy is withdrawn you'll be notified.
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100632.0/warc/CC-MAIN-20231207022257-20231207052257-00709.warc.gz
CC-MAIN-2023-50
1,355
17
http://sourceforge.net/apps/trac/sourceforge/wiki/Project%20database?version=7
code
|Version 7 (modified by moorman, 5 years ago)| - Project Database - Getting Help SourceForge.net provides MySQL database services on a opt-in basis. These database services may be used for a variety of things, including: - Data storage for dynamic project websites. - Data storage for demos of the project's software residing in project web space. - In support of project software testing and development needs. - Data storage for applications deployed by the project to Project web. - Service is based on MySQL 5.0.x on the x86_64 architecture. - Project databases are accessible from the project web servers. - Project databases are accessible from the interactive shell servers. The command-line MySQL client is installed on the shell servers. - A centralized install of phpMyAdmin is provided to ease database management. - Direct access is provided over the Internet, enabled on a time-limited basis using a self-service interface. - Three database users are provided for each database, one for each access level: admin, read/write, and read-only. Replace LETTTER in the following hostname with the first letter in the project UNIX name. For example, the project someproject would access use the following hostname to access their Database Database names are defined by the person who creates the database. A project's database name will be prefixed by the first letter in the project UNIX name, the project Group ID and an underscore (_). This prefix is provided on the project database admin page. For example, if the project filezilla wanted to create a database with the name of "cmsdata", the database would be named f21558_cmsdata. Each project is provided with three database users, each with a different permissions set. The database usernames are prefixed with the first letter in the project's UNIX name, followed by the project Group ID and end with the permissions identifier. Valid permissions identifiers are: ro, rw and admin. The ro user has SELECT privileges. The rw user has SHOW VIEW privileges. The admin user has SHOW VIEW and CREATE VIEW privileges. As an example, the project filezilla has three users: f21558ro, f21558rw and f21558admin. Database User Password Password is specified by the project administrator on the database admin page, must be initially set here and can be changed at any time. From SourceForge.net Hosts From the Internet The Internet access offering further extends database access options, and permits users to do things such as remotely make backups, perform data load-in, or use GUI database management tools from their workstation. Access is provided four hours at a time, for sake of security, and because access to a database over the Internet involves latency we don't want projects running web applications on remote servers talking to the DB over the Internet. Access is provided on-demand after project members request access for their IP address via a self-service management interface. To access the management interface go to replace PROJECT in the URL below with the UNIX name of your project: You will be prompted to log in with your SourceForge.net username and password. Once your IP address has been granted access to the MySQL servers, you may connect by following the instructions provided on the management interface regarding hostname and port, and using the MySQL username/password combinations set up for your project. For example (possible only after you have authorized your IP for access): mysql -u USERNAME -h mysql-LETTER.sourceforge.net -P 4040 -p Opt In and Password The database service is no longer opt-in, a password must be configured for each of the database users to create and access the project databases. There are no preconfigured databases for a project, they must be created using the database admin user by a project member. Additional database users SourceForge.net only provides the preconfigured database users. Please see the phpMyAdmin page for more information. pconnect and INSERT DELAYED We strongly recommend against using persistent connections (pconnects) and INSERT DELAYED statements. In a shared environment, neither of these solutions will significantly improve your database performance, and due to technical limitations, may actually have negative impact on your application performance. Query runtime cap We have implemented a MySQL query runtime cap of 120 seconds. All queries that run longer than that will be stopped when detected. You should optimize your query to make it run faster. This cap has been implemented to preserve service performance (this service is shared by many projects). Currently, SourceForge.net only provides MySQL database services to SourceForge.net-hosted projects. Other Database Offerings There are no plans at this time to provide other database offerings at this time. Please see our backup documentation for information on the SourceForge.net backup policy and for information on how to perform a backup. SourceForge.net can only support MySQL and database related issues and questions directly relating to the operation of the SourceForge.net hosted services. For more in-depth information and support about using MySQL, the MySQL Documentation is an excellent source of information.
s3://commoncrawl/crawl-data/CC-MAIN-2014-10/segments/1394678702919/warc/CC-MAIN-20140313024502-00053-ip-10-183-142-35.ec2.internal.warc.gz
CC-MAIN-2014-10
5,233
43
https://geekladsmedia.com/web-development
code
We give full effort and use most current, top rated technologies to develop stunning website for mobile-friendly and responsive web development. We believe your website must look unique and user friendly no matter what device it’s viewed on, that’s why we are constantly researching for fresh and leading-edge ideas to make your online presence fantastic! An excellent web design application makes a wonderful opportunity in the market. A good website application will provide details of your organization in full-fledged specialist and genuine profile. Additionally, the website Application can be focused according to your business domain, giving your business better thanks in its specific area. Web development is the work involved in developing a web site for the Internet (World Wide Web) or an intranet (a private network). Web development can range from developing a simple single static page of plain text to complex web-based internet applications (web apps), electronic businesses, and social network services. A more comprehensive list of tasks to which web development commonly refers, may include web engineering, web design, web content development, client liaison, client-side/server-side scripting, web server and network security configuration, and e-commerce development. Among web professionals, "web development" usually refers to the main non-design aspects of building web sites: writing markup and coding. Web development may use content management systems (CMS) to make content changes easier and available with basic technical skills. For larger organizations and businesses, web development teams can consist of hundreds of people (web developers) and follow standard methods like Agile methodologies while developing websites. Smaller organizations may only require a single permanent or contracting developer, or secondary assignment to related job positions such as a graphic designer or information systems technician. Web development may be a collaborative effort between departments rather than the domain of a designated department. There are three kinds of web developer specialization: front-end developer, back-end developer, and full-stack developer. Front-end developers responsible for behavior and visuals that run in the user browser, while back-end developers deal with the servers.
s3://commoncrawl/crawl-data/CC-MAIN-2021-10/segments/1614178385389.83/warc/CC-MAIN-20210308174330-20210308204330-00018.warc.gz
CC-MAIN-2021-10
2,329
4
https://meta.discourse.org/t/is-there-a-way-to-make-the-password-requirements-more-simple/48808
code
Is there a way to make the password requirements more simple? It requires like 15 digits? thats tooo many! like 6 should be enough imho for my site. 15 is for admins, 10 is the default for regular users. Both are configurable in the Admin > Settings area, search for Whoops found it under Admin>Settings>Users. Should I delete this question? Sorry I had searched but didn’t see it. If your site will be connected to the internet, then 6 characters is almost certainly not enough. If it requires registration,so crackers do not know usernames, that could reduce the need for complexity, but, it’s still not a good idea. See, for example curses! Ill put the default back. But doesnt gmail even allow “aaaaaaaa”? Gmail Password Requirements If you want easy login and sign in, set up social logins, users can authenticate with Facebook, Google, Twitter, etc. No password is better than a bad password Well, if you couldn’t find it among all the settings, someone else won’t either. Also, the discussion about password complexity is likely important for others as well. It’s good to have questions asked and answered here on meta. Marking the best answer as the Solution would also be helpful. There is also a “common password” Setting. For example, on my localhost development Discourse I have that disabled so I can use “password” as a password and not need to remember a mess of different passwords for the test accounts. But IMHO on a real live site it would be a poor idea to allow “password”, “admin”, “aaaaaaaa” etc. If you look in /lib/10-char-common-passwords.txt there is a list of 2344 such passwords. Despite all of the evidence presented that passwords need to be long, I’m still often annoyed by the 10 character limit (especially on mobile, where typing 10 characters into a password box is a bit of a chore). SSO seems like a good option; I wonder if the ‘Sign in via email’ pattern that slack uses might be useful as well? - Click ‘send me an email to sign in’ - I get an email with an expiring (5 minutes?) link in it - If I click on that link, it logs me in and takes me to the front page. Passwordless signin via email link You are not me. I don’t go all xkcd with the horse and the staple and whatever, but I do find multi word pass wordsphrases work very well for me. Often they are word game things for me, rather than common phrases, related to the site or something at hand when creating it. For a cooking website, I might think of Joy of Cooking and use “boy.of.Looking”. It annoys me when there are requirements other than length, because that can interfere with my method. Yes, but this is already possible with “forgot password”. I feel this pain sometimes, even with a password manager (which 99% of users do not have) I would like to get around to adding a “1 time login token” for mobile. - Click button - We send email with 1 time login token - User is logged on, on mobile LOL, just realised you posted the same thing @gdpelican so yeah … I want this at some point not really, it burns your password, so that sucks. Not really, just press a bunch of keys on your keyboard to “generate” a new one. I do this on a few sites… You get a new auth token though, so all the other places you are logged into are now logged out Plus, you need to synchronize the password manager again. True, we have “safe” login mode set by default, so that would invalidate all logins across all sites. My password manager is my browser, so it auto-syncs with no effort from me. Ok, this is now shipping cc @gdpelican I don’t see it triggering here on meta though, is it incompatible with social logins or something?
s3://commoncrawl/crawl-data/CC-MAIN-2019-09/segments/1550247480622.9/warc/CC-MAIN-20190216145907-20190216171907-00113.warc.gz
CC-MAIN-2019-09
3,694
41
https://git.help.collab.net/hc/en-us/articles/234115327-Make-a-task-depend-on-another-task
code
When one task cannot be done unless another task is done first, set up a dependency to track the relationship between the two tasks. - In the CollabNet Sites view, expand a task and select either of the these nodes: - Right-click Predecessors to specify tasks that must be completed before this task can be done, and choose Create dependency. - Select Successors to specify tasks that can be completed only after this task is done, and choose Create dependency. - In the Create Dependency window, enter the ID or browse to the tasks(s) you're relating. - Enter a comment that describes the relationship and click OK. Tip: In the CollabNet Sites view, you can also create dependencies by dragging a task onto another task.To delete a dependency, right-click a predecessor or successor task and select Remove dependency.
s3://commoncrawl/crawl-data/CC-MAIN-2017-51/segments/1512948531226.26/warc/CC-MAIN-20171213221219-20171214001219-00723.warc.gz
CC-MAIN-2017-51
818
8
https://issues.apache.org/jira/browse/KAFKA-2146
code
TopicCommand provide a tool to add partitions for existing topics. It try to find the startIndex from existing partitions. There's a minor flaw in this process, it try to use the first partition fetched from zookeeper as the start partition, and use the first replica id in this partition as the startIndex. One thing, the first partition fetched from zookeeper is not necessary to be the start partition. As partition id begin from zero, we should use partition with id zero as the start partition. The other, broker id does not necessary begin from 0, so the startIndex is not necessary to be the first replica id in the start partition.
s3://commoncrawl/crawl-data/CC-MAIN-2019-35/segments/1566027313436.2/warc/CC-MAIN-20190817164742-20190817190742-00355.warc.gz
CC-MAIN-2019-35
639
3
http://www.unicode.org/mail-arch/unicode-ml/Archives-Old/UML014/0122.html
code
thank you very much for your replies to the problem we have raised concerning che case of some Unicode By seeing the variety of the replies, we have the impression that we did not make clear enough the This mail tries to state the problem in a more understandable The issue is the capitalization process of text: its difficulties and complexity. Let's first set some ground. A codeset, besides being a mapping for characters, contains embedded into it some knowledge concerning characters which can make the processing of them more or less complex. Such knowledge lays both in the codepoints themselves (i.e. in having a unique codepoint for "similar" characters or in having distinct ones) and in the character properties. Specific computer processes makes use of such knowledge. E.g. the process of rendering characters with glyphs for printing or displaying can be complex or not depending on how the codeset is made. If, e.g., we had a poor codeset in which roman letters and greek letters were represented by the same codepoints, the rendering process would need to know the language of each letter to choose the proper glyph. Clearly, it would be close to impossible to make it tell the language by itself, and close to crazy to tell it the language of each word. Luckily (but on purpose), in Unicode we have distinct characters, and thus the rendering process need not bother about languages. Let's now turn to capitalization. The question is on whether the knowledge needed to perform capitalization is (or has to be) embedded into the codeset. For Unicode 2 the answer is both yes and no at the same time. It is "yes" because the character properties tell the uppercase equivalent for he majority of characters, and "no" because the mapping is not complete. As a result, there is a need to know the language and to implement a specific algorithm to perform capitalization. This seems to us an unfortunate situation which needs to be amended. The current status of affairs is such that, having not enough knowledge present in the codeset, the capitalization process is language-dependent, which means that a piece of text containing words of different languages is very hard to capitalize properly. Note that Java JDK, notably one of the very few tools which supports Unicode, has the same problem and thus does not capitalise properly. The issue now is the following: "do we want to make the capitalization process simple and language independent by embedding in Unicode the necessary knowledge or not?" The cost for having it seems to be the following: - introduce two distinct characters for the Turkish lowercase and uppercase I's, which behave differently from the Latin ones for what concerns capitalization. Note that we are not hinting to the appropriateness in general of introducing distinct codepoints; we are only considering this for what concerns capitalization. The outcome of this change would be that capitalization would be, at least, locale-independent. It would need to cater, however, for some exceptions which are not related to the language but that can keep it still complex. That is the case of the sharp s, which can be mended by introducing an uppercase sharp s (whatever the glyph could it be). We did not check thoroughly Unicode, and thus there could be some other few cases (perhaps some ligatures) for which there would be a need to introduce characters for their uppercase Note that with these changes the capitalization process would become simple; a string could be capitalized character by character leading to one which has the same length. Such a process would not produce all the possible capitalizations of a string (e.g. a string containing a sharp s could also be capitalized by uppercasing it with SS), but would produce just a good one. Likewise, the upposite process would produce a good, correct lowercase string (and not all the possible ones). E.g. a SS in a German word would become two lowercase s's, and not a lowercase sharp s, which seems to be O.K. It is up to your judgment to tell if this change is worth its price. In reasoning about it, please, focus only on the change of case of characters, and leave out any other consideration concerning the introduction or separation of codepoints which is not strictly related to it. As a last remark, take into account that the more regular a codeset is, the higher is the chance that you will get good software that handles text properly. It is not a case that even Java fails on this. By embedding character case knowledge in the codest we would relieve programmers from knowing the orthographic rules of the many languages which Unicode supports, rules which most programmers are likely not to know. Thank You all for your comments, Angelo Borsotti, Marco Mussini This archive was generated by hypermail 2.1.2 : Tue Jul 10 2001 - 17:20:43 EDT
s3://commoncrawl/crawl-data/CC-MAIN-2017-39/segments/1505818689775.73/warc/CC-MAIN-20170923194310-20170923214310-00563.warc.gz
CC-MAIN-2017-39
4,852
88
https://community.filemaker.com/thread/71647
code
You should just have to: 1) Create a new field in the parent table, number field, auto-enter serial 2) Do a replace in the new field of the parent table (ctrl + = ) in browse mode while showing all records. Select from the popup "replace with serial numbers", and check the box that says "auto-update field options" so it saves the next serial number value. 3) add a portal of the related child records, as is, to the parents table form view. 4) Add a new field number field in the child table. Add this field to the portal 5) Do a replace in this field in the portal, calculate the value to be parentTable::keyField so it replaces the new keyfield from the parent record into all the child records in the portal. 6) Once confirmed that the parent and child record numbers match, then you can change the relationship so the parent serial = the child number field. you have to do a replace through the old relationship first before you change it to the new keyfield based relationship. Thanks Mike - I knew the answer had to be staring me right in the face! You are the best. There still might be some wierd data, using a non-unique serial key in a relationship always leaves the risk for overlaps and dupes. But I'm glad this will at least get you started. Good luck!
s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886105291.88/warc/CC-MAIN-20170819012514-20170819032514-00403.warc.gz
CC-MAIN-2017-34
1,267
10
http://www.linuxquestions.org/questions/linux-newbie-8/can%27t-find-linux-in-dualboot-145464/
code
Linux - NewbieThis Linux forum is for members that are new to Linux. Just starting out and have a question? If it is not in the man pages or the how-to's this is the place! Welcome to LinuxQuestions.org, a friendly and active Linux Community. You are currently viewing LQ as a guest. By joining our community you will have the ability to post topics, receive our newsletter, use the advanced search, subscribe to threads and access many other special features. Registration is quick, simple and absolutely free. Join our community today! Note that registered members see fewer ads, and ContentLink is completely disabled once you log in. If you have any problems with the registration process or your account login, please contact us. If you need to reset your password, click here. Having a problem logging in? Please visit this page to clear all LQ-related cookies. Introduction to Linux - A Hands on Guide This guide was created as an overview of the Linux Operating System, geared toward new users as an exploration tour and getting started guide, with exercises at the end of each chapter. For more advanced trainees it can be a desktop reference, and a collection of the base knowledge needed to proceed with system and network administration. This book contains many real life examples derived from the author's experience as a Linux system and network administrator, trainer and consultant. They hope these examples will help you to get a better understanding of the Linux system and that you feel encouraged to try out things on your own. Click Here to receive this Complete Guide absolutely free. I'm not sure. I don't think it was either one of them. At first I had just Win98. Then I installed Red Hat 8 on a separate drive, using a Linux boot diskette and two CD's. I followed a wizard throughout the installation that managed the partitioning of my second hard drive and made my system a dual boot. At startup I would get a selection screen with a Red Hat bitmap, allowing me to choose between Win98 and Red Hat 8. After re´nstalling Windows, the selection menu disappeared. My "Mandrake"-way for this problem was to boot the linux-installation via a boot cd or disk. Back in Linux you will have in your X enviroment (KDE, Gnome..) somewhere a menu for changing the boot sequences. After running this tool the boot menu will be back. Maybe it will be enough just to type in "lilo" in a shell.. I think Red Hat will handle the problem in an similiar way. I think RH uses GRUB, but I'm not sure. Try this method (if you don't have GRUB, it won't do anything): 1) use a boot disk to get into your linux system. 2) log in as root 3) type "fdisk -l" and check which partition your boot partition is (probably /dev/hdb1 or something) 4) type "grub". You will get a prompt like this: grub> root (hd1,0) grub> setup (hd0) you might need to change the first command, depending on where your boot partition is. For /dev/hda1, you need (hd0,0), for /dev/hdb2 you need (hd1,1) etc. Thats it. Reboot and GRUB should be reinstalled. It is possible but unlikely that you will need to alter your /boot/grub/grub.conf file. Don't worry about it for now. EDIT: NEVER MIND. DON'T DO THIS You can always use a slackware bootdisk. Go to http://slackware.com/getslack/ and choose a mirror. CD to slackware-current/bootdisks and download bare.i. To create the image in windows, you will also need one of the RAWRITExx.EXE's. At the boot prompt, you will need to enter "mount root=/dev/hdXX" where hdXX is your root (/) filesystem. It will probably be /dev/hdb2. Last edited by spuzzzzzzz; 02-16-2004 at 04:25 AM. I booted from the first RH CD, ran the chroot command, after that I discovered with fdisk that the RH boot partition was in /dev/hdb2. Then I used "grub" and just blindly followed the commands spuzzzzzzzzzzzz suggested. root (hd1,1) tells grub that the root partition (/) is the second partition of the second disk. setup (hd0) tells grub to install itself to the MBR of the first disk. When GRUB writes itself to the mbr of the first disk, it replaces the windows loader so that your computer won't boot automatically into windows.
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917121778.66/warc/CC-MAIN-20170423031201-00521-ip-10-145-167-34.ec2.internal.warc.gz
CC-MAIN-2017-17
4,137
34
https://www.ableton.com/answers/clip-stops-playing
code
clip stops playing I have a 4 bar clip that I loop. it will run for several minutes fine but then the audio shuts off. The clip is still running in Track View but there is no sound. Other clips in the Set work fine. I have to reload the Set to get it to work again You need to be logged in, have a Live license, and have a username set in your account to be able to answer questions. Give us your feedback.
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917119782.43/warc/CC-MAIN-20170423031159-00246-ip-10-145-167-34.ec2.internal.warc.gz
CC-MAIN-2017-17
406
5
http://www.orafaq.com/usenet/comp.databases.theory/2004/04/20/0737.htm
code
Re: Total Cost of Ownership Date: Tue, 20 Apr 2004 07:45:45 -0400 Your summary is very helpful. It places PICK in context for me. Everything you said is important, but I want to particularly key in on two things you said: First, that those who know the business were writing the application. I believe this is the key to success. Knowing the enterprise is at the heart of the matter. I don't care which tools you are using, from files and COBOL to OO and Java. Second, that the application has a long life span. This is evolution rather than revolution. Revolutions often throw the baby out with the bath. What all of this suggests to me is that, if you want to find out where PICK gains its following, you should look at how it presents data, instead of looking at how it stores data. Received on Tue Apr 20 2004 - 13:45:45 CEST
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917123484.45/warc/CC-MAIN-20170423031203-00517-ip-10-145-167-34.ec2.internal.warc.gz
CC-MAIN-2017-17
829
6
https://arcanelock.conjur.org/tools/cli.html
code
Conjur Open Source CLI The Conjur CLI is included with the initial installation of Conjur Open Source. After initial installation, use the Conjur Open Source CLI Changelog on GitHub to read about new releases as they become available. The Changelog contains links to the distributions for the most recent releases. We distribute the CLI as a Ruby gem and as a dockerized container. If you have a Ruby environment, choose that. Otherwise, the docker distribution may be useful. Installation instructions are available in the Readme file here. Note: There are two release branches in the cyberark/conjur-cli repository: - CLI 6.x.x is compatible with Conjur Open Source (v5) and is the main branch in this repository. You want to view the files in this branch. - CLI 5.x.x is compatible with Application Access Manager (v4) and appears as a branch named V4 off of the main branch. Help and Documentation For CLI documentation, use the command line help options: Get a list of $ conjur --help Get a list of subcommands under a major command. $ conjur <command> --help For example, get the subcommands under the $ conjur user --help Get help on a specific subcommand: $ conjur <command> <subcommand> --help For example, get syntax and options for the $ conjur user list --help NAME list - List users SYNOPSIS conjur [global options] user list [command options] COMMAND OPTIONS -i, --[no-]ids - Show only ids -l, --limit=arg - Maximum number of records to return (default: none) -o, --offset=arg - Offset to start from (default: none) -r, --[no-]raw-annotations - Show annotations in 'raw' format --role=ROLE - Role to act as. By default, the current logged-in role is used. (default: none) -s, --search=arg - Full-text search on resource id and annotation values (default: none)
s3://commoncrawl/crawl-data/CC-MAIN-2019-35/segments/1566027313428.28/warc/CC-MAIN-20190817143039-20190817165039-00500.warc.gz
CC-MAIN-2019-35
1,774
21
https://www.efinancialcareers.co.uk/jobs-Hong_Kong-Hong_Kong-OfficerSenior_Officer_-_Risk_Management.id09346371
code
As an Officer/Senior Officer - Risk Management, you will be responsible for risk identification and measurement of credit portfolios in brokerage business. Given Futu's fast-growing and Fintech company nature, our risk management colleague will have a lot of chance to work on different projects related to various financial products. - Responsible for risk identification and measurement of credit portfolios in brokerage business. - Perform risk assessment on clients, counterparties and investment products. - Conduct collateral analysis for margin financing. - Prepare daily risk reports and work with relevant parties to take follow-up actions if needed. - Participate in system implementation and enhancement, provide user requirements and conduct user acceptance tests. - Ad-hoc duties or other job roles directed by supervisor from time to time. - Bachelor degree or above in Risk Management, Finance, Accounting or related discipline. - Proficiency in equities, futures and options, especially products traded in oversea markets. - Minimum of 3 years of risk management and credit control experience preferably in banks / securities / wealth management firms. - Self-motivated and detail-minded with the ability to work independently and under pressure. - Willing to work odd hours (e.g. 15:00 – 23:00) - Knowledge of VBA or python is an advantage. - Proficient in spoken and written English and Chinese (including Mandarin). - Candidate with more experience will be considered as Senior Officer - Risk Management.
s3://commoncrawl/crawl-data/CC-MAIN-2021-04/segments/1610703581888.64/warc/CC-MAIN-20210125123120-20210125153120-00777.warc.gz
CC-MAIN-2021-04
1,525
15
https://penjiapp.zendesk.com/hc/en-us/articles/4413621681175-Students-Sections-Groups-Introduction
code
Sections Overview (Groups) The Penji Sections model is for group sessions. Different centers have different names and designs of these groups. Common examples are: - Supplemental Instruction - Study Groups - One-time Workshops and Test Reviews Below is an example of the Section Button on the Learn Screen: Joining a Section Regardless, a button on your home screen may exist corresponding to a group session type. Registering is very similar to appointments: Appointments Introduction. Your path would be to select the Section Button on the Learn Screen > Pick a Class > Select an available Section > Join Session. Sections may or may not have a specified end period. If they do, these sections will repeat weekly until the end date. If there is an end date, the end date will be shown when booking a section (see the highlighted information below). Please note that there are separate No-Show rules for Section attendance, so keep this in mind when registering! If your program coordinator has enabled waitlists for Sections, if a Section you want to join is at full capacity, you might see the option to join a waitlist. Joining a Waitlist - Log into web.penjiapp.com and go through the Sections booking flow to find your desired Section. - If your desired Section has no more open seats, you will find it under the heading "Sections with a Waitlist". - To join your desired Section's waitlist, select the Section and click "Join Waitlist". Figure 1: The desired Section, situated under "Sections with a Waitlist", has been selected and "Join Waitlist" appears. - Once you click "Join Waitlist," you'll automatically be taken back to the Learn Screen. From here, there is no action to take on your end as the student -- admins will be in charge of monitoring the Section's remaining capacity. - NOTE: Currently, as a student, you will not be notified via email or push notifications when you join a waitlist. A session placeholder card will not be added to the Learn Screen for the Section you join. - If you join a waitlist for an optional Section, you will be joining the current week's Section -- you cannot join a waitlist for a future Section. Getting Added to a Section from the Waitlist Admins are in charge of adding waitlisted students to their desired Sections if seats open up. Once an admin adds you to your desired Section, you will receive a Section registration email, the same one you'd receive if you registered for an available Section without a waitlist. Leaving a Waitlist If you want to remove yourself from a waitlist: - Go back into the Sections booking flow and navigate to the "Sections" page. There, you'll see the Section you waitlisted for under the heading "Sections for which you are on the waitlist". - Select the Section; an option to "Leave Waitlist" will appear. Figure 1: The desired Section under "Sections for which you are on the waitlist" is selected. "Leave Waitlist" has appeared. - Select "Leave Waitlist". This will take you back to the Learn Screen. As with joining a waitlist, you will not receive any email or mobile notifications about leaving the waitlist, nor will any session details card appear or disappear from your Learn Screen for this full-capacity Section.
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679516047.98/warc/CC-MAIN-20231211174901-20231211204901-00665.warc.gz
CC-MAIN-2023-50
3,216
25
https://www.tutorialspoint.com/apache_nifi/apache_nifi_reporting_task.htm
code
Apache NiFi reporting tasks are similar to the controller services, which run in the background and send or log the statistics of NiFi instance. NiFi reporting task can also be accessed from the same page as controller settings, but in a different tab. To add a reporting task, a developer needs to click on the plus button present at the top right hand side of the reporting tasks page. These reporting tasks are mainly used for monitoring the activities of a NiFi instance, in either the bulletins or the provenance. Mainly these reporting tasks uses Site-to-Site to transport the NiFi statistics data to other node or external system. Let us now add a configured reporting task for more understanding. This reporting task is used to generate bulletins, when a memory pool crosses specified percentage. Follow these steps to configure the MonitorMemory reporting task − Add in the plus sign and search for MonitorMemory in the list. Select MonitorMemory and click on ADD. Once it is added in the main page of reporting tasks main page, click on the configure icon. In the properties tab, select the memory pool, which you want to monitor. Select the percentage after which you want bulletins to alert the users. Start the reporting task. 16 Lectures 1 hours 23 Lectures 1 hours
s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320304959.80/warc/CC-MAIN-20220126162115-20220126192115-00691.warc.gz
CC-MAIN-2022-05
1,281
12
https://www.seimless.com/quantum-resistant-networking/quantum-computing-and-encryption/
code
WHAT IS QUANTUM COMPUTING? Quantum computing is not based on the mathematical principles that govern classical computing. Instead, it is based on the science of quantum mechanics, where computations are driven by “qubits” rather than bits. Whereas the math used with binary bits produces discrete, fixed values, qubits can exist in multiple states at the same time. This is key for why quantum computing is so different, namely because qubits do not have a fixed value, and exist in an indeterminate state. With so much fluidity in knowing their value for computational purposes, they can handle far greater complexity than the binary model that defines classical computing. What Are The Threats and Risks? Quantum computing may seem far removed from well-established encryption methods including asymmetric, such as RSA, and symmetric, such as AES. Encryption solutions often use a mix of these to provide a faster, more secure overall approach that leverages the strengths of both models. These encryption models take a common approach to data security—they are based on mathematical principles, specifically around factoring integers into prime numbers. Known as the “factoring problem”, the larger the prime numbers, the longer the encryption keys become, and the more difficult it becomes to break the code. While this model can theoretically keep scaling with larger prime numbers, its utility will be constrained by the computational abilities of the classical computing model. As the field of quantum computing advances, new algorithms grounded in quantum mechanics are being developed with computational capabilities that far outstrip these factoring-based models built on mathematical principles. In other words, it won’t be enough just to keep building bigger encryption keys – the fundamental approach to encryption will need to change to safeguard data. The two most important algorithms relative to quantum computing and encryption are named for their originators, Shor and Grover. When these algorithms can run on a large-scale quantum computer, they will be able to crack the strongest encryption codes, at which point all encrypted data will be at risk. This means that data being encrypted today may not be secure once quantum computers become more available. How To Protect Your Data Organizations need to determine how many years they need to keep their encrypted data. Then, organizations need to make their IT infrastructure ‘quantum-safe’ before large-scale quantum computers become readily available. Protecting data will involve implementing quantum-resistant algorithms on existing classical computers, and re-encrypting all data with those algorithms. Keep in mind that data being encrypted and stored today will certainly be at risk if large-scale quantum computers enter the market before that data reaches the end of its valuable life. Our Quantum Approach ibm/SEIMless is closely monitoring the latest developments in the areas of quantum computing and quantum resistant cryptography to ensure that our solutions remain crypto agile and are “quantum-proof”. We focus our efforts on the quantum 4: Quantum Computing –The building and development of quantum based computers. While ibm/SEIMless is not actively involved in the development of quantum computers, we regularly monitor industry progress because of its impact on cryptography. Quantum Resistant Crypto (QRC) – NIST-led development of new algorithms and protocols that are “quantum proof” meaning that they they cannot be broken by quantum computers. ibm/SEIMless is actively involved in this area in order to ensure that our solutions are crypto agile—our platforms will have the memory, compute and flexibility to add post quantum cryptography (PQC) algorithms as they become available for use. Quantum Random Number Generation (QRNG) – Utilization of quantum principles to generate random numbers (or entropy) for use in cryptography. These can be used with traditional crypto and/or QRC. ibm/SEIMless is actively involved in this area in order to enhance our hardware security modules and cryptographic key managers. Quantum Key Distribution (QKD) – The distribution of data between two endpoints where their is no key material, however the data is resolved/decrypted at the endpoint and is fully encrypted during transmission is just on of the Quantum Resistant Technologies ibm/SEIMless and its partners, are developing to secure your Data in Transport EXODUS TRANSPARENT ENCRYPTION FOR SAP HANA EXODUS DATA SECURITY MANAGER EXODUS TRANSPARENT ENCRYPTION LIVE DATA TRANSFORMATION EXTENSION EXODUS CONTAINER SECURITY EXODUS DATA SECURITY PLATFORM SECURITY INTELLIGENCE LOGS EXODUS APPLICATION ENCRYPTION EXODUS PROTECTION FOR TERADATA DATABASE What is encryption and why is it important? Encryption, is the process of changing information in such a way as to make it unreadable by anyone except those possessing special knowledge (usually referred to as a “key”) that allows them to change the information back to its original, readable form. Encryption is important because it allows you to securely protect data that you don’t want anyone else to have access to ibm/SEIMless specializes in this area with solutions that protect your data in transit, while at rest or both. We protect corporate secrets, government secure classified information, and even individuals wishing to protect personal information against things like identity theft. Contact us to discuss your unique requirements we have the solutions to meet any need.
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100308.37/warc/CC-MAIN-20231201215122-20231202005122-00460.warc.gz
CC-MAIN-2023-50
5,566
29
https://www.neowin.net/news/three-million-of-ie7-in-first-4-days/
code
IEBLOG: In the first four days over three million of you have already downloaded the final release. Thank you! (If you're not one of those three million, you can get it here.) We expect the numbers to continue to climb steadily until we start distributing via Automatic Updates in a few weeks. Clearly, we expect IE7 adoption to really take off then. If you haven't tested your website with IE7 yet, please use the tools Scott posted about a few weeks ago to help you prepare. With the final release, we got a chance to do some fun tech community activities. For instance, on the night of the launch, we hosted a dinner in San Francisco for about twenty leaders in the local blogging community. Afterwards, Jeremiah Owyang posted his thoughts and Thomas Hawk put up a great set of photos. We also finally let our product managers do some real marketing. We have the first IE radio spot that I can remember us doing, and we created some mobile billboards that cruised through 10 major U.S. cities. I've included a few photos below. The Microsoft Internet Explorer Team sent the Mozilla team a cake for the release of Firefox 2! A big thanks to Redmond, Washington! P.S.: No, it was not poisoned
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764499954.21/warc/CC-MAIN-20230202003408-20230202033408-00731.warc.gz
CC-MAIN-2023-06
1,193
6
https://www.programmableweb.com/api/microsoft-mappoint
code
- SDKs (0) - How To (0) - Sample Source Code (0) - Libraries (0) - Developers (6) - Followers (25) - Changelog (0) Single purpose API API Mashups (6) Customize a UK road trip, choose stop off points along the way - restaurants, cafes, petrol stations, child friendly venues - and also has an avoid motorways function. The route can be emailed and... KGI Wireless are using a combination of MSN Virtual Earth and MapPoint technology to map its wireless towers and associated profiles around the USA. The Adventure Works site is a demonstration of what the Windows Live Platform can do for businesses providing social network capabilities to their customers. RELATED APIs (997) ||The Data.BaltimoreCity.Gov Museum API returns museum data with JSON, AMF, and geoJSON formats, providing layers and esriGeometryPoint as geometry type. See a live example at https://data....||Cities||06.04.2018| Data.BaltimoreCity.Gov Public Pool ||The Data.BaltimoreCity.Gov Public Pool API returns public pools data with JSON, AMF, and geoJSON formats, providing layers and esriGeometryPoint as geometry type. See live example at https://data....||Cities||06.04.2018| Data.BaltimoreCity.Gov Vegetated Area ||The Data.BaltimoreCity.Gov Vegetated Area API returns esriGeometryPolygon data with vegetated zones in the city of Baltimore. Supported Query Formats: JSON, AMF, geoJSON. See a live example at https...||Cities||05.29.2018| ||The Data.BaltimoreCity.Gov Water API returns esri GeometryPolygon data with water zones in the city of Baltimore. Supported Query Formats: JSON, AMF, geoJSON. Learn more at https://maps.baltimorecity...||Cities||05.29.2018|
s3://commoncrawl/crawl-data/CC-MAIN-2018-26/segments/1529267864257.17/warc/CC-MAIN-20180621192119-20180621212119-00378.warc.gz
CC-MAIN-2018-26
1,636
19
https://www.open.edu/openlearn/science-maths-technology/mathematics-statistics/rounding-and-estimation/content-section-0?active-tab=content-tab
code
Scientific calculators are a wonderful invention, but theyre only as good as the people who use them. If you often get an unexpected or ridiculous result when you press the enter button, this free course, Rounding and estimation, is for you. Learn how to do a calculation correctly and get the right answer every time. Course learning outcomes After studying this course, you should be able to: round a given whole number to the nearest 10, 100, 1000 and so on round a decimal number to a given number of decimal places or significant figures use rounded numbers to find rough estimates for calculations use a calculator for decimal calculations involving +, −, × and ÷, giving the answer to a specified accuracy (e.g. decimal places or significant figures) and checking the answer by finding a rough estimate check the answers to calculations by ensuring that the correct calculation has been done, in the correct order.
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100724.48/warc/CC-MAIN-20231208045320-20231208075320-00038.warc.gz
CC-MAIN-2023-50
925
8
https://www.okta.com/integrations/helper-helper/
code
Helper Helper provides a fully-featured volunteer management platform that simplifies the efforts of coordinating service opportunities and reporting out your impact in the community. From single sign-on to enhanced user provisioning, Okta's Helper Helper integration ensures your volunteers can quickly and securely connect to meaningful experiences. With Okta groups, users can be added to specific branches and teams within Helper Helper to allow for further event targeting and reporting capabilities Add this integration to enable authentication and provisioning capabilities. - Event Hooks - Inbound Federation - Inline Hooks - Outbound Federation - SAML Security Assertion Markup Language is an open standard for exchanging authentication and authorization data between an identity provider (IdP) and a service provider (SP) that does not require credentials to be passed to the service provider. - Workflow Templates - Workflows Connectors - SWA Secure Web Authentication is a Single Sign On (SSO) system developed by Okta to provide SSO for apps that don't support proprietary federated sign-on methods, SAML or OIDC. - OIDC OpenID Connect is an extension to the OAuth standard that provides for exchanging Authentication data between an identity provider (IdP) and a service provider (SP) and does not require credentials to be passed from the Identity Provider to the application. - Create Creates or links a user in the application when assigning the app to a user in Okta. - Update Okta updates a user's attributes in the app when the app is assigned. Future attribute changes made to the Okta user profile will automatically overwrite the corresponding attribute value in the app. - Deactivate Deactivates a user's account in the app when it is unassigned in Okta or their Okta account is deactivated. Accounts can be reactivated if the app is reassigned to a user in Okta. - Attribute Sourcing The application can be defined as the source of truth for a full user profile or as the source of truth for specific attributes on a user profile. - Sync Password Push either the users Okta password or a randomly generated password to the app. This feature is not required for all federated applications as user authentication takes place in Okta, however some apps still require a password. - Group Push Push existing Okta groups and their memberships to the application. Groups can then be managed in Okta and changes are reflected in the application. - Group Linking Link Okta groups to existing groups in the application. Simplifies onboarding an app for Okta provisioning where the app already has groups configured. - Schema Discovery Import the user attribute schema from the application and reflect it in the Okta app user profile. Allows Okta to use custom attributes you have configured in the application that were not included in the basic app schema. - Attribute Writeback When the application is used as a profile master it is possible to define specific attributes to be sourced from another location and written back to the app. For example the user profile may come from Active Directory with phone number sourced from another app and written back to Active Directory.
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296816893.19/warc/CC-MAIN-20240414161724-20240414191724-00878.warc.gz
CC-MAIN-2024-18
3,194
20
https://issues.cask.co/browse/CDAP-2854
code
I am trying to follow the instructions at http://docs.cask.co/cdap/current/en/developers-manual/getting-started/standalone/docker.html. There is states that: Once CDAP starts, it will instruct you to connect to the CDAP UI with a web browser at http://<virtual-hostname>:9999, such as http://6f0162922c37:9999. Replace <virtual-hostname> with the Docker VM’s IP address you obtained earlier. Start a browser and enter the address to access the CDAP UI. This is not accurate. For me, it prints: Replacing `localhost` with the docker ip still works. Another thing that works is: and then I can connect to localhost:9999. Not sure whether we want to document that.
s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590347404857.23/warc/CC-MAIN-20200529121120-20200529151120-00556.warc.gz
CC-MAIN-2020-24
663
6
http://www.coderanch.com/t/591927/ORM/databases/mapping-JPA-table-column-references
code
This week's book giveaway is in the Mac OS forum. We're giving away four copies of a choice of "Take Control of Upgrading to Yosemite" or "Take Control of Automating Your Mac" and have Joe Kissell on-line! See this thread for details. In Column a1b1 of Table C we are storing the values from PK Column a1 from table A or PK Column b1 from Table B. i.e, some rows in Table C relates to Table A and some relates to Table B depending on this Column "a1b1" column value. Please help me in doing the mapping for this case in JPA Annotations. I have used below mapping that was NOT working. subject: How to do mapping in JPA when a table has a column that references 2 other table columns
s3://commoncrawl/crawl-data/CC-MAIN-2014-41/segments/1412037663739.33/warc/CC-MAIN-20140930004103-00296-ip-10-234-18-248.ec2.internal.warc.gz
CC-MAIN-2014-41
682
4
https://cloudbasic.net/aws/rds/alwayson/benchmark/
code
RDS AlwaysOn/Geo-Replicate Benchmarks View performance benchmark statistics on various replication scenarios. Benchmark statistics are based on product replication engine version 6.0 test results. Product versions 9.0 and above deliver substantially better performance. - Number of Databases: 1 - Tables in the Database: 54 - Volume of Changes: ~100 records per table inserted concurrently first into 4 tables, and later into all 54 tables - Moderate ~300,000 inserts per minute into 4 tables in a database hosted on an AWS Virginia based RDS R3.Xlarge instance, geo-replicated asynchronously to an AWS Oregon based smaller RDS R3.Large server. - Database size: ~400GB - Database size increment: ~150MB/min (~200GB/day) - Moderate ~100,000 inserts per minute into 4 tables, each with 500+ million records, into a database (size ~200GB) hosted on an AWS Virginia based RDS R3.2Xlarge instance, geo-replicated asynchronously to Azure SQL type P1. Data in transit is encrypted. - Database size: ~200GB - Database size increment: ~50MB/min (~70GB/day)
s3://commoncrawl/crawl-data/CC-MAIN-2019-51/segments/1575541310866.82/warc/CC-MAIN-20191215201305-20191215225305-00044.warc.gz
CC-MAIN-2019-51
1,047
13
http://stackoverflow.com/questions/9681358/path-finding-on-2d-array
code
I have a 2D int array which I processed and got from an image. Each index can be thought as weight of that pixel. I want to find a path between 2 indexes (I'll give these indexes as input) that has the least cost. It would be great if the direction of movements can be modified (like only down&left, up&left. or all. etc. otherwise it may be down, left and right) How can i do that in C#?
s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936465069.3/warc/CC-MAIN-20150226074105-00200-ip-10-28-5-156.ec2.internal.warc.gz
CC-MAIN-2015-11
388
2
http://mit.usiu.ac.ke/courses/chemistry/5-95j-teaching-college-level-science-and-engineering-fall-2012/Syllabus/
code
Course Meeting Times Lectures: 1 session / week, 2 hours / session There are no prerequisites for this course. This seminar was created in response to an appeal by science graduate students planning to pursue careers as academics. They wanted to complement the training they were getting in research with the opportunity to improve their ability to teach. Thus, this course was put together to demystify such topics as: using the latest research in student learning to improve teaching; developing a course; promoting active learning, problem solving and critical thinking; designing exams and assignments; dealing with problems and pitfalls in teaching with an emphasis on teaching science and engineering. One of the most important findings in educational research is that students learn best by doing. Each class session will include opportunities for you to engage in active learning, small group discussions, and critical thinking. In-class and out-of-class assignments and readings will help you develop your own teaching practice (and I have chosen the word "practice" intentionally, because, effective learning (like effective anything) requires practice!!). I hope this course will aid you in developing your professional identity as a teacher by giving you insights into how things work in the academy, and by providing opportunities for you to practice your professional skills. Intended Learning Outcomes* If I've done a good job as the instructor and you've put effort into the course, by the end of the semester, you should: - Be familiar with the latest research in STEM (science, technology, engineering, and mathematics) learning in higher education, including research on diversity. - Have an understanding of how to apply that research in your own teaching. - Improve a set of teaching skills, including: constructing intended learning outcomes; lecturing; using active learning techniques; and employing feedback to improve your teaching. - Have a better appreciation for the skills needed to: assess student learning, use and address some of the challenges that come with teaching college students. - Be able to write a teaching philosophy statement. * We will talk about how to write intended learning outcomes. What do you notice about the characteristics of this list? For example, how is each learning outcome phrased? Because I hope this is a class in which you will learn from one another as well as from me, my expectations about our work together this semester include: - That you are willing to share your knowledge, opinions, and ideas in class. - That you are open to the ideas and knowledge of your peers. - That you will provide one another with clear, honest, concrete, and sensitive feedback on work that is done. - That any concept that is unclear or confusing will be explored and examined You are expected to complete the relevant reading (PCR = pre-class reading) before each class session. Some of the readings have been taken from the following 3 books. You may wish to purchase the some or all of them (if not for this course – sometime in the future). McKeachie, W. J., et al. Teaching Tips: Strategies, Research, and Theory for College and University Teachers. 9th ed. D.C. Health & Co., 1994. ISBN: 9780669194340. Wankat, P. C., and F. S. Oreovicz. Teaching Engineering. McGraw-Hill, 1992. ISBN: 9780070681545. Also available at the Purdue University School of Chemical Engineering website. Davis, B. Gross. Tools for Teaching. Jossey-Bass Publishers, 1993. ISBN: 9781555425685. There are 12 short post-class assignments. Dues dates and descriptions are provided in the Assignments section. In addition, each class will have at least one small-group, active learning assignment. Finally, each student will participate in a microteaching session, wherein s/he will give a 6–10 minute presentation to her/his peers (the rest of the class). Microteaching guidelines (for presenters and observers) are provided in the Assignments section. The grade for this class is either Pass or No record. In order to pass the class, you must satisfactorily complete all of the Post-Class Assignments, and participate in class discussions and activities. |SES # ||TOPICS ||KEY DATES | Introduction to the class Why this class? Short History of Teaching and Learning the American University |2 ||What we know about student learning in higher education ||Assignment 1 due | |3 ||Developing your teaching philosophy ||Assignment 2 due | |4 ||Course Design & Planning: Planning Backward, Learning Outcomes & Strategic Teaching ||Assignment 3 due | |5 ||Teaching Methodologies: Part I - Lecturing ||Assignment 4 due | |6 ||Teaching Methodologies: Part II - Active Learning, Why and How? ||Assignment 5 due | |7 ||What Can Nerds Learn from Actors? ||Assignment 6 due | |8 ||Designing Homework and Exam Questions ||Assignment 7 due | |9 ||Teaching Problem Solving ||Assignment 8 due | |10 ||Grading and Assessment ||Assignment 9 due | |11 ||Teaching in a Multicultural Classroom ||Assignment 10 due | |12 ||Microteaching - Group #1 || | |13 ||Microteaching - Group #2 || |
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323588246.79/warc/CC-MAIN-20211028003812-20211028033812-00307.warc.gz
CC-MAIN-2021-43
5,098
44
http://www.monobrick.dk/forums/reply/4269/
code
Right now we don’t have a webserver integrated into the image. But I have successfully been running asp.NET applications on the EV3. I used the XSP webserver but I have also used FastCGI Mono Server together with the Lighttpd webserver. But one of the reasons why we will not include a webserver in the next image (to be released very soon) is that JIT compiling makes the webpage load very slow the first time you visit the page. So if you can live with that then you should be able to run a webserver using XSP without to much trouble (If I remember you need to add some DLLs to the GAC from a PC installation – but I can’t remember exactly what I did). Anyway I have also tried to AOT compile my WebService (and XSP) for faster loading but without success. Let me know how it goes…
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474523.8/warc/CC-MAIN-20240224044749-20240224074749-00248.warc.gz
CC-MAIN-2024-10
792
2
https://superuser.com/questions/1407935/how-to-find-my-id-in-skype-for-business
code
I would like to invite someone external to my organization to be part of a Skype for Business meeting which I am setting up in Outlook. I sent him a connection request using the Skype ID he gave me, but it doesn't seem to be working, so he asked me for my Skype ID so we can connect that way. Where can I find out what my ID is in Skype for Business? In Skype for Business, your Sign In Address functions as an ID. However, knowing that probably won't help, since it sounds like you have a different issue. By default, Skype for Business networks cannot communicate with regular Skype (personal) accounts. This article from Microsoft describes how to enable communication between your Skype for Business and regular Skype accounts. However, it's a bit more complicated. At least according to this other article from Microsoft, it's still not possible for Skype users to search for Skype for Business users at all. "While you can search for and find Skype users, they can not search for and find Skype for Business users." If that seems surprising and frustrating, bear in mind that Skype and Skype for Business are actually two different services. They have very little to do with each other, and are not particularly integrated. our Skype ID is a unique name associated with your account, which can't be changed. To find what your Skype ID is, you just need to open your Skype profile. You can do this both on your desktop, and in the mobile app for iPhone and Android. You used to be able to set your own Skype ID, but it's now created and given to you when you make your Skype account.
s3://commoncrawl/crawl-data/CC-MAIN-2021-21/segments/1620243992440.69/warc/CC-MAIN-20210517180757-20210517210757-00045.warc.gz
CC-MAIN-2021-21
1,588
8
https://newbedev.com/sed-replace-all-tabs-and-spaces-with-a-single-space
code
sed replace all tabs and spaces with a single space sed -e "s/[[:space:]]\+/ /g" Here's an explanation: [ # start of character class [:space:] # The POSIX character class for whitespace characters. It's # functionally identical to [ \t\r\n\v\f] which matches a space, # tab, carriage return, newline, vertical tab, or form feed. See # https://en.wikipedia.org/wiki/Regular_expression#POSIX_character_classes ] # end of character class \+ # one or more of the previous item (anything matched in the brackets). For your replacement, you only want to insert a space. [:space:] won't work there since that's an abbreviation for a character class and the regex engine wouldn't know what character to put there. + must be escaped in the regex because with sed's regex engine + is a normal character whereas \+ is a metacharacter for 'one or more'. On page 86 of Mastering Regular Expressions, Jeffrey Friedl mentions in a footnote that ed and grep used escaped parentheses because "Ken Thompson felt regular expressions would be used to work primarily with C code, where needing to match raw parentheses would be more common than backreferencing." I assume that he felt the same way about the plus sign, hence the need to escape it to use it as a metacharacter. It's easy to get tripped up by this. In sed you'll need to escape ). or use -r to use extended regex (then it looks like sed -r -e "s/[[:space:]]\+/ /g" or sed -re "s/[[:space:]]\+/ /g" You can use the -s ("squeeze") option of $ tr -s '[:blank:]' <<< 'test.de. 1547 IN SOA ns1.test.de. dnsmaster.test.de. 2012090701 900 1000 6000 600' test.de. 1547 IN SOA ns1.test.de. dnsmaster.test.de. 2012090701 900 1000 6000 600 [:blank:] character class comprises both spaces and tabs.
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510730.6/warc/CC-MAIN-20230930213821-20231001003821-00695.warc.gz
CC-MAIN-2023-40
1,730
18
https://community.esri.com/t5/arcgis-pro-ideas/topology-editing-for-geometric-networks/idi-p/929609
code
It would be very nice to be able to have topology rules such as: After you build your geometric network you can set up rules for that. Double click on your network in ArcCatalog and the Geometric Network Properties dialog will appear. On the second tab called Connectivity you can set up your rules. In the pasted image below is the dialog from an electric system. I click the Electric Station which is a point feature. It can only connect to a line feature. So the other point features are grayed out. In the case of an Electric Station (Substation) it can only connect to a BusBar. So I would check the BusBar box Then I select BusBar from the drop down menu. BusBars are a line feature and can only connect to a point feature. You will see it automatically added Electric Station. Now I only want a BusBar to connect to an Electric Station or a Recloser or Fuse Feeder Bay You must be a registered user to add a comment. If you've already registered, sign in. Otherwise, register and sign in.
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100651.34/warc/CC-MAIN-20231207090036-20231207120036-00613.warc.gz
CC-MAIN-2023-50
995
6
http://www.unc.edu/~hhurd/pc-sequences/pc_programs.html
code
Download the complete program folder. Figure-script dependency table. You can see which basic programs are needed to support the figure scripts. Scripts that produce the figures in the book. These scripts assume you have the main scripts above, and only produce the figures. permean1.m MATLAB function to estimate and remove seasonal (periodic) mean. Has options to plot estimated periodic mean with confidence intervals based on the t. Computes and plots seasonal variance with confidence intervals based on chi-squared. Data can be returned with seasonal mean removed and with seasonal variance scaled out. peryule.m MATLAB function to solve for PAR(p) coefficients using periodic yule walker equations. It is assumed that the periodic mean has been removed. There is a flag to scale by the seasonal variance before estimation. This scaling can also be done in permean1.m . par1cov.m MATLAB function to compute a PAR(1) correlation (or covariance since the mean is zero) from one period of the parameters phi_1(t) and del(t) where phi_1(t) are the autoregressive parameters and the del(t) are weights on the shocks. The correlations are returned in a rectangular array corresponding to the (s,t) pairs s=1:T and t=1:(numper*T). parbatch.m MATLAB script that makes a batch of PAR(1) simulations. The parameters are set at the top. You can edit what is there to do your own investigation. It plots phi_1(t) and del(t) but my current examples have del(t) constant. It plots a sample from the simulated series and the estimated seasonal std (permean1.m is used). It uses sqplot.m to plot sample spectra of the series and of the squares of the series, the reason for which we will discuss in class. sqplot.m MATLAB function to compute sample spectra (periodogram) of a time series and sample spectra of the squares of the series. This is one way that, in some situations, can detect the presence of PC structure. textsc.m MATLAB function (a small utility) to put text on a plot where the placement is based on fractions of the xrange and yrange of the plot. It is used in sqplot.m. twoparbatch.m MATLAB script that makes a batch of PAR(1) simulations where phi_1(t) is made up from switching between two AR(1) models. It uses twopar.m (below), permean1.m, sqplot.m and par1cov.m. twopar.m MATLAB function to compute PAR(1) parameters phi_1(t) and del(t) by switching between two AR(1) models. sdiff.m MATLAB function to compute seasonal differences (very simple). acf.m MATLAB function to compute the usual acf (based on the stationary assumption). acfpacf.m MATLAB function to compute the acf and the pacf, return them and also plot them if you set the plot flag. armabat.m MATLAB function to compute ARMA models for p in pvec and q in qvec. The best model is returned. sarmabat.m MATLAB function to compute SARMA or multiplicative models for p in pvec and q in qvec P in Pvec and Q in Qvec. The best model is returned. do1.m MATLAB script to do seasonal de-trending and analysis by method 1. do2.m MATLAB script to do seasonal de-trending and analysis by method 2. do3.m MATLAB script to do seasonal de-trending and analysis by method 3. do4.m MATLAB script to do seasonal de-trending and analysis by method 4. r2pv.m MATLAB function that returns the p-value of a sample correlation coefficient based on the hypothesis (H_0) that r=0. Uses a transformation (see Cramer, p400) that transforms to a t, and then tcdf is used. rinv.m MATLAB function r_0=rinv(p,n) computes the value of r_0 giving P(|r| <= r_0)=p for the case when the true correlation is zero. Based on the transformation to t and tinv. Return to Harry Hurd's page
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368703108201/warc/CC-MAIN-20130516111828-00012-ip-10-60-113-184.ec2.internal.warc.gz
CC-MAIN-2013-20
3,626
23
https://research.ajman.ac.ae/publication/a-multiswap-algorithm-for-the-university-course-timetabling
code
Being a complex computational optimisation problem, the university course timetabling involves assignment of events to timeslots and rooms on a weekly basis. In handling the problem, the hard and soft constraints must be addressed to ensure that a feasible and (near) optimal timetable is obtained. Since assigning rooms to events is an integral part of the university course timetabling, this paper is particularly concerned of the previously-overlooked room operations (any operation performed between the room and the event in the same timeslot). The proposed MultiSwap algorithm contributes to major improvement in processing the room operations. This is achieved by combining the MultiSwap algorithm with the graph coloring heuristic method to satisfy the hard constraints and with the local search-based algorithms to minimize the violations of the soft constraints. In this paper, the MultiSwap is incorporated with the largest weighted degree and backtracking algorithms on one hand to satisfy the hard constraints, and is incorporated with local search algorithm to minimize the violation of soft constraints. Using the standard dataset of Socha prepared for the university course timetabling, the results show that the room operations can further enhance the performance of heuristic methods and local search-based algorithms. © 2012 IEEE.
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662546071.13/warc/CC-MAIN-20220522190453-20220522220453-00318.warc.gz
CC-MAIN-2022-21
1,350
1
http://askubuntu.com/questions/112310/64-bit-nvidia-driver-on-32-bit-machine
code
I am using Ubuntu 10.04 x86 version.I have two video cards ( 1 integrated and 1 Nvidia on inter core-i5 processor with 3GB ram).Right now my display resolution is very poos as i cant use graphic card. I tried a lot of methods (including sudo apt-get remove nvidia*; sudo apt-get install nvidia-current) to install driver for Nvidia Geforce but failed. Here is output of lshw -c video *-display description: VGA compatible controller product: nVidia Corporation vendor: nVidia Corporation physical id: 0 bus info: pci@0000:01:00.0 version: a1 width: 64 bits clock: 33MHz capabilities: bus_master cap_list rom configuration: driver=nvidia latency=0 resources: irq:16 memory:f0000000-f0ffffff memory:c0000000-cfffffff(prefetchable) memory:d0000000-d1ffffff(prefetchable) ioport:3000(size=128) memory:f1080000-f10fffff(prefetchable) *-display UNCLAIMED description: VGA compatible controller product: Intel Corporation vendor: Intel Corporation physical id: 2 bus info: pci@0000:00:02.0 version: 09 width: 64 bits clock: 33MHz capabilities: bus_master cap_list configuration: latency=0 resources: memory:f1400000-f17fffff memory:e0000000-efffffff(prefetchable) ioport:4000(size=64) As shown in the output (width:64 bit), shall I install x64 version of Ubuntu to make drivers work? or what should i do to make them work ? I am following this post for installation. Whenever I execute sudo gdm-stop , i am not getting terminal or any screen. Even on CTRL+ALT+F2 i am not getting terminal screen(just a blank screen with no promt). How to go?
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783393093.59/warc/CC-MAIN-20160624154953-00031-ip-10-164-35-72.ec2.internal.warc.gz
CC-MAIN-2016-26
1,535
7
https://gist.github.com/jescalan/dec2bfad2e19cafde0fcba91c8db46e4
code
Github Commit Security Within github, there are two things you can do to make your commits more secure both for you and for others you work with: signing your commits, and ensuring that your personal email remains private in your commits. In this piece, We'll go over each of these methods, why they are important, and how to accomplish them smoothly on Mac OSX. Anyone who has access to a repository can push a commit to that repo under your name, and nobody will be able to tell the difference. All they have to do is change their git settings to use your name and email address for commits. Let that sink in for a minute, or if it helps more, read this piece explaining how it can turn into a serious problem. The way you can solve this problem is through signing your commits with a GPG key - when you do this, github will display a "verified" badge next to each commit. You can even set up repos so that only signed commits can be pushed, which is probably something we should do, at least for internal projects. The way this works is fairly simple. You generate a public/private keypair on your machine, and put your public key under github's settings. Then you set up git such that it uses the private key to encrypt a message which the public key can decrypt, and git sends the encrypted message along with your commit. If github is able to decrypt it using your public key, github can be assured that it was only you who could have encrypted it, since nobody else has access to your private key, and they mark the commit as verified, because regardless of how you have configured your name and email address, they know for sure that it was you who made the commit due to the signature. If this is confusing or you feel like it doesn't make total sense, reviewing how public key cryptography works might help. So, let's talk about how to actually get this working. Github has an excellent guide you can follow to get started. I am also including a shorter, more focused version below that automates more of the setup and is specific to OSX. Make sure you have homebrew installed and it's up to date with Install the latest version of the brew install gpg gpg --full-generate-keyto enter the key generation interface. Use the default answers for each step except for the key size, for which you should use When asked for your user information, enter in <YOUR_GITHUB_HANDLE>@users.noreply.github.com- so for me it would be [email protected]. You'll see why this is in the next section. Use any password that you will remember. Your key should now be created. You can run gpg --list-secret-keys --keyid-format LONGto list out your keys. You'll see some output like this: /Users/USER/.gnupg/pubring.kbx *** sec rsa4096/32E23F61AB5451DB 2019-08-01 [SC] A58D24148508Q690C60A0BD839D23C61HB5450AB uid [ultimate] YOUR NAME <[email protected]> ssb rsa4096/25112294A022DH52 2019-08-01 [E] Copy the part on the rsa4096/-- in the above example it would be Now to get your public key, run gpg --armor --export ID, with IDbeing the string you copied above Head over to your github keys gettings and click the "new GPG key" button - paste in the public key output you just got. At this point, you have a key and github has the key. Now, you need to ensure that git is using the key to sign your commits. You also don't want to have to enter the password to access your private key every time you run a commit. So we'll install some tooling to ensure your password is stored in the keychain, then make sure git signs all of your commits automatically with it. - First we install the pinentrytool, which will give us a UI modal to enter our password and let us save it for future use. Use the brew install pinentry-macto do so. - Now run echo "pinentry-program /usr/local/bin/pinentry-mac" >> ~/.gnupg/gpg-agent.confto ensure that GPG uses this as our password entry program, then restart the GPG agent with - To ensure that git is using GPG as the signing program, run git config --global gpg.program gpg - Now we'll add our signing key to git with the command git config --global user.signingkey <YOUR_SIGNING_KEY>- the key is the one you copied out above to generate your public key - in our example it was - Finally, let's tell git to sign all your commits with it by running git config --global commit.gpgsign true - Now you can make a commit, and you should see a UI modal pop up prompting you for the password to your key. Enter it, and make sure to check the "save to keychain" box, so you won't have to do it every time (unless you're on a public or shared machine, I guess) - You can verify that your commit was properly signed using the command git log --show-signature -1 That's it! Once this is done, all of your commits should also include a "verified" tag next to them in github. If you see a commit from yourself that does not have a verified tag, you will know to be very suspicious of it. Hiding Your Personal Email Another unfortunate reality of github's default settings is that while you can hide your personal email in the github interface, it remains public as part of the data for any commit that you make. This means that any contribution to an open source project exposes your email to anyone who wants it, including recruiters, spammers, even people who have something against you, or your organization. Unfortunately, this did happen recently to HashiCorp, where many employees were subscribed to a variety of mailing lists with their names listed as offensive racial slurs, using their personal emails. There is a way to hide your personal email from commits, and enforce this for all commits going forward, and I do recommend setting this up. Steps will be listed out below: - Head over to github's email settings - Make sure you have checked the "Keep my email address private" and "Block command line pushes that expose my email" options - Now if you try to commit, it will be denied by github, so you need to change your github email. You can do this with the command git config --global user.email "<GITHUB_HANDLE>@users.noreply.github.com" - That's all! If you have commits that you have not yet pushed, you will need to change the author so that it does not expose your private email. You can do this with the command git commit --amend --reset-author. After running this, you should be able to push without issue. I should note that none of the instructions above go through all of your commits to all of your projects in the past and correct them. This is a bit more involved and invasive, and may not be a step that you want to take. If you do though, github has a guide on how to do it. Your email will not be entirely private to github scrapers unless you do this. Heads-up for those enabling the email privacy option for the first time, from GitHub: "Note: If you created your GitHub account after July 18, 2017, your GitHub-provided no-reply email address is a seven-digit ID number and your username in the form of [email protected]. If you created your GitHub account prior to July 18, 2017, your GitHub-provided no-reply email address is your username in the form of [email protected]. You can get an ID-based GitHub-provided no-reply email address by selecting (or deselecting and reselecting) Keep my email address privatein your email settings." Before you generate your key, if you've never checked the email privacy box I'd recommend doing that so you can generate an email address in the new format. I tried following the guide before realizing this and my signatures were considered unverified after I pushed my next commit Here's a guide by GitHub to add that new format email to your existing GPG key: https://help.github.com/en/articles/associating-an-email-with-your-gpg-key Near the end of that guide you'll need to delete your existing key from GitHub before uploading the edited one.
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224648209.30/warc/CC-MAIN-20230601211701-20230602001701-00255.warc.gz
CC-MAIN-2023-23
7,859
55