url
stringlengths 13
4.35k
| tag
stringclasses 1
value | text
stringlengths 109
628k
| file_path
stringlengths 109
155
| dump
stringclasses 96
values | file_size_in_byte
int64 112
630k
| line_count
int64 1
3.76k
|
---|---|---|---|---|---|---|
https://johnnydollar.us/files/140301.php | code | Weekend Links and Open Thread
03/01/14 00:00 Filed in: links
- Bigelow: Reliable Sources edits out criticism of its host.
- Media Buzz videos: Piers, the age issue, Ronan Farrow.
- Reliable Sources: Bridgegate, Justice Thomas, Fox News.
- Piers: CNN was just holding me back! Growing pains.
- Geraldo’s Scandalous premieres Saturday...or does it?
- Somerby: The three faces of Nunziato. Today’s apology.
- Your Buzz videos: Trial by media, Zimmerman, FCC bias?
- Thank you for being a friend. Sunday talk: turn the table.
- Factor video: ‘Harmful entertainment’ debate gets personal.
blog comments powered by Disqus | s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224657169.98/warc/CC-MAIN-20230610095459-20230610125459-00014.warc.gz | CC-MAIN-2023-23 | 623 | 12 |
http://forums.macrumors.com/archive/index.php/t-1323731.html | code | View Full Version : Memory Leak Help
Feb 13, 2012, 09:27 PM
I am at the final stage of my non-ARC iPhone app and I am having trouble with memory leaks. Instruments only points out 3 memory leaks when I run the app on my device. However, when I run and Analyze in Xcode, I get like 50 potential leaks. Which one should I trust? Are there any alternate(non-apple) methods for detecting leaks?
Feb 14, 2012, 01:25 AM
You look at each instance and decide if the analyzer is telling the truth. It's pretty good at identifying leaks. I've seen a few cases, like blocks, can confuse the the situation.
Feb 14, 2012, 02:25 AM
I think you should check all of them.. Leaks can cause an application to crash hard and be rejected by Apple in the end. And it's just not fun when you're using the application that it will crash eventually.
Check each instance, what are you retaining, when not, when should you release, autorelease, set to nil and so on.
Feb 14, 2012, 07:46 AM
Look at all the ones that show up in Analyze but only fix them if they make sense. I've found the Leaks instrument to be more accurate.
Feb 14, 2012, 06:18 PM
Thanks For Your Responses!!
I am having some trouble: When using my device, stack traces only have system libraries, none of my methods. When I double click on a leak, there is no code. It gives the error:"No Source". This does not appear when I use the simulator. Also, How can I hide system libraries? The box is grayed out.
Just in Case This Helps: I am using Bugsense (http://www.bugsense.com/) and "strip debug symbols during copy is set to NO"
Feb 15, 2012, 07:05 PM
You may be interested in 'Diagnosing Memory Problems' at new site NSScreencast.com | s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1408500825010.41/warc/CC-MAIN-20140820021345-00278-ip-10-180-136-8.ec2.internal.warc.gz | CC-MAIN-2014-35 | 1,678 | 16 |
https://www.sony.co.in/electronics/support/articles/S500011234 | code | Changing the encodings of web page when it displays irrecognizable encodings andcannot be browsed properly.
All web pages contain the information of language encodings (setting of language and character) used by that web page.
If the chosen encodings are wrong, the web page cannot display properly.
In addition, if Auto-Select is opened, it will automatically select the proper encodings.
If web page cannot display properly via Auto-Select, user has to change encodings manually with the steps below.
|■||The version before Internet Explorer 6.0
|■||Internet Explorer 7.0 | s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100518.73/warc/CC-MAIN-20231203225036-20231204015036-00639.warc.gz | CC-MAIN-2023-50 | 577 | 7 |
https://github.com/jmasterx/Agui | code | C++ GUI API Aimed at Games
Agui is an Object Oriented Graphical User Interface library for games written in C++. It has full UTF8 Unicode support and is back end independent. Comes with many widgets by default.
Agui uses the CMAKE build system.
Currently Allegro5 and SFML2 backends are implemented and supported. | s3://commoncrawl/crawl-data/CC-MAIN-2020-50/segments/1606141191692.20/warc/CC-MAIN-20201127103102-20201127133102-00100.warc.gz | CC-MAIN-2020-50 | 313 | 4 |
http://www.siegemedia.com/category/seo | code | The title of this post is a question I’ve heard a few times recently, including after my last presentation at the Engage conference in Portland. It’s a good question, and one worth thinking about.
Although I don’t have access to the algorithm, I do have experience and some ideas about how Google and their algorithm might interpret the problem.
Are there words that help you rank besides the keywords themselves? We wanted to know, so we diagnosed a large sample of competitive terms to uncover the words that showed up most often. This post is the result of that research.
Google wants our sites to be "mobile-friendly". But that doesn't mean we should make our sites fit a template, but actually have bad mobile experiences. Move beyond a checklist using the theories in this post. | s3://commoncrawl/crawl-data/CC-MAIN-2017-22/segments/1495463615093.77/warc/CC-MAIN-20170530105157-20170530125157-00425.warc.gz | CC-MAIN-2017-22 | 790 | 4 |
https://archive.sap.com/discussions/thread/1857423 | code | One invoice document in two currencies
We have a requirement where we need to create a sales order in USD, however, provide the 2 invoices to the customer---one in USD and one in GBP.
I've searched the boards and couldn't find much on this subject matter. One post I read mentioned an additional output type, but I'm not really sure how to go about that.
If anyone can provide any direction on this, that would be great. | s3://commoncrawl/crawl-data/CC-MAIN-2019-04/segments/1547583681597.51/warc/CC-MAIN-20190119201117-20190119223117-00225.warc.gz | CC-MAIN-2019-04 | 420 | 4 |
https://www.economist.com/the-economist-explains/2013/04/22/why-are-your-friends-more-popular-than-you | code | DO YOU ever feel like your friends are more popular than you are? That may be because it is true—for nearly everyone. This odd result, dubbed the "friendship paradox", has most recently been observed to apply on Twitter. When researchers from the University of Southern California looked at 5.8m microbloggers (and 194m links between them) they found that, on average, both the people a user follows and, worse, those who follow him, have more followers than he does. How can this be?
The friendship paradox was first identified in 1991 by Scott Feld, a sociologist working at the State University of New York at Stony Brook. Back then, of course, Dr Feld was looking at real-world social networks rather than online ones. Then, last year, scientists from Cornell University confirmed that the result holds for Facebook's active users (721m people at the time of the research, joined by 69 billion virtual bonds of friendship). In fact, it obtains for any network where some members are more popular than others. And it stems from basic arithmetic.
Consider a simple social network composed of four people: Alice, Bob, Chloe and Dave. Alice's only friend is Bob. Bob is also friends with both Chloe and Dave, who are friends with each other, but not with Alice. This means that Alice has one friend (Bob); Chloe and Dave each have two friends (one another and Bob); and Bob has three. On average, then, each person in the network has two friends (eight friends divided by four people). But now consider how many friends each person's friends have (in other words, friends of friends). Alice has one friend, Bob, who in turn has three friends. Chloe's friends are Bob, who has three friends, and Dave, who has two, which means that Chloe's friends have five friends between them (even though their lists of friends overlap). The situation is analogous for Dave. Bob's friends, Alice, Chloe and Dave, have five friends in all. So the total number of friends of friends is 18. But the total number of friends in the network is eight, as before. So the average number of friends of friends (ie, how many friends each person's friends have) is 2.25 friends each (18 divided by eight), more than the two friends, on average, of the four people in the network. The reason, of course, is that Bob, who has most friends in the first place, is also counted most often in the friends-of-friends category, raising the average. The same is true for other networks: a few well-connected individuals have more friends than most people, and they skew the average for everyone in whose network they appear (which, because of their connectedness, is a lot of people).
This number-crunching has some intriguing consequences—other than to justify not getting worked up about your relative social status. During the H1N1 flu outbreak in 2009, for instance, Nicholas Christakis of Harvard University and James Fowler of the University of California, San Diego, kept tabs on a large group of randomly picked Harvard undergraduates. They also monitored the people those participants named as friends. Remarkably, the friends became ill about two weeks before the random undergraduates, probably because they were, on average, better connected. With the world only imperfectly prepared for a pandemic, being able to spot trends in this way could be useful. | s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296946584.94/warc/CC-MAIN-20230326235016-20230327025016-00377.warc.gz | CC-MAIN-2023-14 | 3,335 | 4 |
https://searchwhat.info/netgear-rangemax-wpn111-driver-7627.php | code | Netgear rangemax wpn111 driver
- User rating:
Safe! Checked Antivirus(05.12.2019)
Product information Product Dimensions 1. We own a Netgear router so thought, sure, a Netgear wireless adapter will work with it, right? I suspect the hardware is defective. Add Your Review. Add No Thanks. It works, what can I say. When first plugged in, the adapter did not recognize the wireless network. English Choose a language for shopping. Amazon Inspire Digital Educational Resources. Message 2 of 4. Parts, labor and shipping included. Image Unavailable Image not available for Color: Free business-day shipping within the U. See questions and answers. | s3://commoncrawl/crawl-data/CC-MAIN-2019-51/segments/1575540482284.9/warc/CC-MAIN-20191205213531-20191206001531-00184.warc.gz | CC-MAIN-2019-51 | 643 | 4 |
https://www.uksmallbusinessdirectory.co.uk/listing/106414/ | code | Mastersworld Of ComputingI help people with all kinds of pc related issues. I will create a website for your company or your your pleasure. This site has been designed with the intention of helping as many people for free as possible. If you have written a tutorial you would like to see on my website why not just email me so I can take a look at it. If I believe it will benefit others I will upload it. My web address is: http://www.mastersworldofcomputing.com/ You will find all my contact information there.
To add your business listing - Register Here » | s3://commoncrawl/crawl-data/CC-MAIN-2017-51/segments/1512948522343.41/warc/CC-MAIN-20171213084839-20171213104839-00386.warc.gz | CC-MAIN-2017-51 | 560 | 2 |
http://scamphish.blogspot.com/2014/06/liliane-bettencourt-libttctgmailcom.html | code | from: Reinsercion laboral <[email protected]>
date: 22 June 2014 15:04
Top Of The Day Greetings To You
I, Liliane authenticate this email, you can read about me on: http://en.wikipedia.org/wiki/Liliane_Bettencourt I write to you because I intend to give to you a portion of my Net-worth which I have been banking.
I want to cede it out as gift hoping it would be of help to you and others too. Respond to this email: [email protected] With love, Liliane Bettencourt | s3://commoncrawl/crawl-data/CC-MAIN-2018-22/segments/1526794863410.22/warc/CC-MAIN-20180520112233-20180520132233-00635.warc.gz | CC-MAIN-2018-22 | 478 | 5 |
https://help.regpack.com/hc/en-us/articles/5834316752411-Create-a-New-Project-FAQ | code | 1) What are my options?
When creating a new project, you can create a new project or copy an existing project. When copying a project, user data can be ported to the no project! As the admin, you will be responsible for making any edits or changes to the project.
2) How does the pricing work?
All new or copied projects are FREE to create and edit. If you are not comfortable creating or editing your project, select YES to add Project Manager Assistance during the project creation process to confirm a $350 payment for a Regpack Project Manager. This is an optional service that will assign a Project Manager to assist you with your project set up. They can help review form flow, provide recommendations, and ensure triggers and products are setup to work as you intend.
3) What happens to the original version of our system?
It's stays put! You'll be able to access your old system by clicking the drop down next to your project name at the top right of the page.
4) Will I still have access and for how long?
Yes! You will still have access to your original project, and you'll be able to switch back and forth as desired by clicking on the project name in the bottom left corner of the screen. You can simply set the old project to "closed" for registration to prevent any additional signups. You have the option as well to archive the old project, however archiving it will prevent data from porting over to it's new copy.
5) Will I need new iFrame codes that link to the new the system copy?
Yes, you will need to switch out your iFrame code on your website. See this article for more one accessing your iframe embed code. Each system in Regpack has a unique iFrame embed code, so ensure you use the code on your website from the system you'd like to present.
6) How does the user data porting work?
When you copy your project, you have the option to copy over your applicants data. This means that when your previous applicants log in to the new system, their answers to their questions from the previous registration cycle will automatically appear in the new project. In order for this porting to occur, two things need to happen:
a) The applicants in the "source" system (the project you copied the information from) must remain as active users (don't mark these users inactive or archive the project)
b) User information porting is the default setting on copied projects. Note that if you'd like users to answer a specific question again in the new project, you'll need to delete the field in the new project and recreate it. We recommend this for age/grade fields, etc.
7) If I have outstanding payment plans going in the old system, how will the system copy affect that?
It won’t! When you copy a project, your original project is not changed in any way. Applicants would still be charged in the original project on schedule, and they would not be charged in the new project (since they haven’t logged in yet, ordered products, made payments, etc...).
8) Will users still be able to log in and complete forms in the old system?
Yes - you will have two systems, each with its own link and embed code. Ensure that you put the correct code on your website for each unique project.
9) How does the having a copy of the system affect our billing moving forward?
It doesn't! Projects are unlimited and free :)
10) Do I have to manually archive users in the original project if I don’t want their data to be ported?
No! Just turn off user information porting when copying the project (settings --> project settings --> create new project --> copy project --> copy settings) and data porting will NOT happen when you create the copy of the project.
11) I would like to be able to see a user's history from past semesters. Is that still available to me when returning customers register on the new project?
If you want to see past semesters you can look up the information in the original project. Follow the steps to switch between projects here.
12) Where are my users?!?!
Users from the previous project will populate in the new project when they log in. The only users in your new system are those who are registering in that project.
13) Do my returning users need to fill out their information again if the data is ported over? What about questions I want them to answer again this year?
No, if you copy your project user information will port to the new project. Learn more here | s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296816977.38/warc/CC-MAIN-20240415111434-20240415141434-00742.warc.gz | CC-MAIN-2024-18 | 4,398 | 28 |
http://www.overclock.net/t/604845/official-amd-athlon-ii-x4-club/290 | code | I know you guys probably hate newbies, but I have read some of your threads and trust in your advice. I recently purchased a Canon HF200 camcorder (AVCHD) and my present computer will not handle the files. I have an emachine t5246. I am not a gamer and have only used my pc for internet or burning movies. I am looking to build a pc based around the athlon ii x4 620, ASRock M3A785GXH/128M, with 4gb ddr3 (undecided). I was planning to reuse as much from my previous machine as possible, mainly the HD, case and 300W power supply. I do not plan to overclock, but would like to retain the option. My questions are
1) Is this a sound choice?
2) Do I need a larger power supply if at most I will have (2) hard drives and (1) burner?
eMachines T5246 (i included this, but I know these specs are not even on your radar)
CPU 2.21GHz AMD Athlon 64 X2 4200+
2GB 667MHz DDR2 SDRAM
Graphics 128MB (shared) Nvidia GeForce 6150SE
Hard drive 400GB, 7,200 rpm
16x dual-layer DVD burner | s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187824357.3/warc/CC-MAIN-20171020211313-20171020231313-00439.warc.gz | CC-MAIN-2017-43 | 971 | 9 |
https://synthiam.com/Robot/Inmoov-s-New-Gripper-89 | code | I found a design for a robotic gripper on Instructables, so I thought I would make one for my InMoov. The basic design was done by Techiebot here's the link to it;http://www.instructables.com/id/Universal-Gripper-Syringe-Powered/
I had to design and print a few parts to adapt everything to fit into the arm of my robot. It will pick up small objects and with a little more suction the gripper could pickup bigger objects.
The EZ-Robot OS sure makes it easy to animated things like this but I don't need to tell you all that.
The first video shows it working and the second one describes the build. | s3://commoncrawl/crawl-data/CC-MAIN-2019-04/segments/1547584445118.99/warc/CC-MAIN-20190124014810-20190124040810-00561.warc.gz | CC-MAIN-2019-04 | 598 | 4 |
https://lobste.rs/threads/damncabbage | code | Sydney, Australia. ✨
Context for the potentially “…huh?”-inducing “Allow one open import without warning” line:
https://github.com/purescript/purescript/issues/1869 and then
I am starting to think that unqualified imports / namespace escapes are an anti-pattern. Sure, they may save programmers some keystrokes, but they also have a tendency to make code harder to read and understand, and can lead to potentially surprising behavior when names conflict. So why allow them at all (I am asking a general question here, not about why they should or should not be allowed in PureScript)? | s3://commoncrawl/crawl-data/CC-MAIN-2019-22/segments/1558232257605.76/warc/CC-MAIN-20190524104501-20190524130501-00536.warc.gz | CC-MAIN-2019-22 | 596 | 4 |
https://forums.comodo.com/t/installed-a-program-in-the-virtual-sandbox-how-do-i-make-a-desktop-shortcut/309669 | code | Im NOT talking about installing a program on the main system THEN sandboxing it as you run it.
Im talking about installing a program IN the sandbox. Do I need to start the virtual desktop everytime I want to access that program? Or can I make a desktop shortcut to run that program in the sandbox mode?
I dont want auto sandboxing and I would like to be able to installed test programs in the sandbox without the need to start the virtual desktop through comodo each time I want to access it.
So is there something like…
Install program in sandbox
Make shortcut of said program on the REAL desktop
Now when you click the shortcut, the program is auto started in the sandbox.
I know this works with installing a program on the MAIN computer but its kind of a pointless if you’re supposed to be using the sandbox to be safer about what you install. Its just basically an inconvenience to have to go through comodo and start the virtual desktop each time I want to run something in there. | s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224649105.40/warc/CC-MAIN-20230603032950-20230603062950-00385.warc.gz | CC-MAIN-2023-23 | 989 | 8 |
https://www.physicsforums.com/threads/meaning-of-size-in-subatomic.235501/ | code | What is, and is not meant, by size when it comes to the subatomic world? The FAQ's of this forum, and a wikipedia article I read recently seem to agree that "the very notion of a discrete 'particle' has been ultimately replaced by the concept of something like wave-packet of an uncertain boundary". I think I like that statement, but I still read from time to time that subatomic particle P has size less than 10^-M meters, for example. How would one conclude that without assuming a certain boundary? In what ways do these size statements have meaning and in what ways do they not have meaning subatomically? | s3://commoncrawl/crawl-data/CC-MAIN-2018-47/segments/1542039742968.18/warc/CC-MAIN-20181116004432-20181116030432-00456.warc.gz | CC-MAIN-2018-47 | 610 | 1 |
https://community.rstudio.com/t/logic-behind-dplyrs-keeping-stripping-of-data-frame-classes/4575 | code | Is there a reason some
dplyr functions strip classes from data frames and others preserve them? I could see stripping for functions that are more "create a new data frame" than "change an existing data frame", but it's tough to nail down exactly where that line is, and it really doesn't seem to be between
d <- data.frame(x = 1:5) %>% structure(., class = c("my_df", class(.))) select(d, x) %>% class() #> "my_df" "data.frame" mutate(d, x = x) %>% class() #> "data.frame" | s3://commoncrawl/crawl-data/CC-MAIN-2019-09/segments/1550247513222.88/warc/CC-MAIN-20190222033812-20190222055812-00251.warc.gz | CC-MAIN-2019-09 | 474 | 3 |
https://paxful.com/zh/offer/6QJmqZ4JJ1w | code | I would like to buy bitcoin by depositing cash into your Bank of America, Wells Fargo, BBVA or any Coop shared network branch.
After you open a trade, provide me with your full name and account number. Once I deposit, I'll upload a photo of the receipt with some trade details written on it. Please verify the deposit and release escrow in a timely fashion.
Deposit complete within 60 minutes.
By opening a trade with me you agree that you are not a New York resident. No deposits will be made to New York accounts. | s3://commoncrawl/crawl-data/CC-MAIN-2018-30/segments/1531676592579.77/warc/CC-MAIN-20180721125703-20180721145703-00341.warc.gz | CC-MAIN-2018-30 | 515 | 4 |
https://community.gazebosim.org/t/beta-release-of-robotx-simulation/137 | code | NPS and OSRF are happy to announce that we are doing an early beta release (v0.1.1) of the Gazebo/ROS RobotX simulation environment. We are still working on many parts of this (and welcome any contributions!), but the current simulation includes:
- Visual and collision models of the base WAM-V platform
- Gazebo plugins to simulate simple hydrodynamics, waves, wind and propulsion
- A world definition roughly similar to the coastline at Sand Island, HI (the RobotX 2018 venue)
All of the code is of course open source. The source, along with documentation and tutorials is available at https://bitbucket.org/osrf/vmrc .
This is an open source project, so we welcome the feedback and contributions from the community - submit a pull request today!
Brian Bingham and Carlos Agüero | s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662527626.15/warc/CC-MAIN-20220519105247-20220519135247-00181.warc.gz | CC-MAIN-2022-21 | 781 | 7 |
https://www.npmjs.com/package/appjs-linux-x64 | code | This is the Linux package for AppJS. See the included appjs folder for the full README.
( The MIT License )
Copyright (c) 2012 Morteza Milani and other AppJS contributors
See the LICENSE file for details.
Manage developer teams with varying permissions and multiple projects. Learn more about Private Packages and Organizations…
how? learn more | s3://commoncrawl/crawl-data/CC-MAIN-2017-39/segments/1505818687906.71/warc/CC-MAIN-20170921205832-20170921225832-00354.warc.gz | CC-MAIN-2017-39 | 346 | 6 |
http://forum.fop2.com/44-working-with-touchscreen-dialpad-needed/2012/3 | code | for working only with a touchpad and a headset there is a need for
a dialpad (0-9*#) like a phone and a small keyboard. The dialpad
for the numbers and a keyboard for entering names and so on.
Both of these features slidable (in/out) when not used. The size
of the buttons should be like the action-buttons top-left. | s3://commoncrawl/crawl-data/CC-MAIN-2019-39/segments/1568514572517.50/warc/CC-MAIN-20190916100041-20190916122041-00160.warc.gz | CC-MAIN-2019-39 | 316 | 5 |
https://androidforums.com/threads/disable-turn-down-keyboard-sounds.79698/ | code | Hey, is there a way to turn down or turn off the click sound that the keyboard makes when you use it? I'm not talking about the audible touch tones in the dialer, or the selection noise when you select something, I'm talking about when you're texting or whatever, and the keyboard "clicks" every time you press a letter. I find the sound very loud and annoying and I can't seem to turn it off unless I put the phone on silent. Is there a way to turn theses sounds down/off? I'm using the Sony Keyboard. | s3://commoncrawl/crawl-data/CC-MAIN-2017-47/segments/1510934805466.25/warc/CC-MAIN-20171119080836-20171119100836-00273.warc.gz | CC-MAIN-2017-47 | 502 | 1 |
https://homebodygames.com/2016/08/22/a-quack-update-1/ | code | Hello! It’s been a little while since I last touched base with everyone about Captain Quack. My goal going forward is to be as transparent as possible with the development of this game (and any future HBG titles).
Things have admittedly slowed down subsantially as far as development goes since the campaigns failed. I’ve taken a lot of time to reflect on feedback, the current state of the game, and where I want the game to end up at the finish line.
The result of this is stripping down the game to the fundamentals and refining them. After this, experimenting with various systems and new mechanics that will hopefully greatly enhance the game.
Let me be clear, I in no way think that the game is in any way bad as it was, but my end goal is to make it the best game that I possibly can, in every aspect. What I’ve come up with is exciting, and I can’t wait to start showing off some of the new ideas in the coming months.
The game at this point is going to take a lot longer to develop, as I now have full-time work that will take up lot of my time, so the project will now move to my free time. But the plus side is that with the job I can completely self-fund the project.
With this in mind, I won’t even begin to give an estimate for a release date, but it will simply be done when I’m finished with it! I look forward to sharing this journey with you all. | s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296943625.81/warc/CC-MAIN-20230321033306-20230321063306-00518.warc.gz | CC-MAIN-2023-14 | 1,376 | 6 |
http://www.mikeobrien.net/blog/f-learning-resources | code | F# Learning Resources January, 2008
Mike Jones has posted an analysis of an adaptation of the Concurrent Life app (That ships with the F# distro) here. I haven't gotten through the entire article yet but so far it is great. The sample app has a C# interface and consumes an F# library. He suggests that C#'ers not familiar with functional programming use F# imperatively to get comfortable with the language syntax then tackle the functional style.
Also, I came across these articles by Thomas Petricek that are proving very helpfull:
And also a nice intro by The Flying Frog Consultancy... | s3://commoncrawl/crawl-data/CC-MAIN-2019-04/segments/1547583659063.33/warc/CC-MAIN-20190117184304-20190117210304-00251.warc.gz | CC-MAIN-2019-04 | 590 | 4 |
https://simonwillison.net/2009/Sep/23/diesel/ | code | Diesel. Yet Another Asynchronous Python Comet Library, of interest because this is the first one I’ve seen that uses Python’s generator coroutines, taking advantage of the return value of the yield statement to feed messages in to a generator function. Currently only works on Python 2.6 on Linux due to a dependency on 2.6’s epoll support.
- ChatGPT should include inline tips - 30th May 2023
- Lawyer cites fake cases invented by ChatGPT, judge is not amused - 27th May 2023
- llm, ttok and strip-tags - CLI tools for working with ChatGPT and other LLMs - 18th May 2023
- Delimiters won't save you from prompt injection - 11th May 2023
- Weeknotes: sqlite-utils 3.31, download-esm, Python in a sandbox - 10th May 2023
- Leaked Google document: "We Have No Moat, And Neither Does OpenAI" - 4th May 2023 | s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224649193.79/warc/CC-MAIN-20230603101032-20230603131032-00513.warc.gz | CC-MAIN-2023-23 | 809 | 7 |
http://ux.stackexchange.com/questions/tagged/structure+usability | code | My current sidebar setup looks like this: The sidebar is present on multiple pages and can include: section ('employees' is a section) specific information (lists that section pages have in ...
I must change the following menu in some web site. This menu contain almost 30 items! Screenshot: Any idea? Categories: Home, Games, Leisure Children, Openly Software, Recipes, Study Lessons, ...
Larger View Here's a screenshot of something I'm currently working on. I decided to use tabs at the top because filling in the "Office Details" is just as important as the list of employees and ... | s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1406510261249.37/warc/CC-MAIN-20140728011741-00082-ip-10-146-231-18.ec2.internal.warc.gz | CC-MAIN-2014-23 | 587 | 3 |
https://designawards.shawcontract.com/project/16-2/ | code | The project uses large-scale, texture and pattern products to highlight and position each area. This customer is a consulting management company related to numbers and management, pursuing rigor and refinement. At the same time, as a modern multinational corporation and technology company, there is people-oriented thinking. In a large area, jump blue color highlights the dynamics and increases the work and happiness of employees.
Blue tone, irregular shape of the color match, but also to increase a rigorous work, pleasurable and flexible space. | s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578711882.85/warc/CC-MAIN-20190425074144-20190425100144-00234.warc.gz | CC-MAIN-2019-18 | 550 | 2 |
https://motemapembe.com/language-models-as-zero-shot-planners-extracting-actionable-knowledge-for-embodied-agents.html | code | Big language styles (LLMs) have built amazing improvements in language generation and knowing.
A new study on arXiv.org appears to be like into the chance of working with LLMs not only for linguistic responsibilities but to make target-pushed choices in interactive, embodied environments.
The scientists look into how to increase understanding about higher-level tasks (these as “make breakfast”) to a series of groundable steps (like “open fridge” and “grab milk”). It is shown that LLMs can be prompted to generate plausible intention-pushed action strategies, but this sort of plans are routinely not executable. Hence, scientists propose many instruments to boost the executability of the design era without the need of any invasive modifications to design parameters.
The human analysis of the approaches demonstrates that it is attainable to improve the executability of motion programs from 18% to 79%.
Can world expertise discovered by large language designs (LLMs) be utilised to act in interactive environments? In this paper, we look into the likelihood of grounding high-level responsibilities, expressed in natural language (e.g. “make breakfast”), to a decided on established of actionable techniques (e.g. “open fridge”). While prior do the job concentrated on finding out from specific stage-by-move illustrations of how to act, we astonishingly come across that if pre-properly trained LMs are substantial sufficient and prompted correctly, they can correctly decompose substantial-level duties into very low-level options devoid of any even more education. Nonetheless, the ideas generated naively by LLMs frequently can’t map specifically to admissible actions. We propose a technique that circumstances on existing demonstrations and semantically interprets the options to admissible actions. Our evaluation in the modern VirtualHome natural environment reveals that the resulting system considerably increases executability more than the LLM baseline. The carried out human analysis reveals a trade-off among executability and correctness but demonstrates a promising indicator toward extracting actionable understanding from language designs. Web page at this https URL.
Exploration paper: Huang, W., Abbeel, P., Pathak, D., and Mordatch, I., “Language Designs as Zero-Shot Planners: Extracting Actionable Understanding for Embodied Agents”, 2022. Hyperlink: https://arxiv.org/abdominal muscles/2201.07207 | s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296818464.67/warc/CC-MAIN-20240423033153-20240423063153-00452.warc.gz | CC-MAIN-2024-18 | 2,454 | 6 |
https://4theswarm.co.uk/projects/Le6PYr?album_id=75872 | code | Sharing the Undead Tarrasque I've had the pleasure to sculpt for Dungeon In A Box and their upcoming new releases!!
As always big thanks for the opportunity and direction to Lauren Covarrubias - Illustration!!
This is going to be a large piece around 75mm tall and it's finally available for pre-orders!
Make sure to check their page and website for more info: https://dungeoninabox.com/
I'll post some previews of the first resin samples as soon as I can!! Cheers!! | s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100583.13/warc/CC-MAIN-20231206031946-20231206061946-00895.warc.gz | CC-MAIN-2023-50 | 466 | 5 |
https://www.experts-exchange.com/questions/28346398/Migrate-ESX-vm's-to-Hyper-v-2012-not-R2.html | code | I know there are a lot of tools to migrate esx vm's to hyper-v as there is the VMM from Microsoft, tried to download the vhd trial but can't make it work.
So please advise on you best practises/experiences on migration. Which tool to use?
I have an esxi 5.5 running some vm's already have latest vmware tools and hardware vm version, 2 vm's up and running, in total about 40 vm's.
Furthermore setup hyper-v is straight forward right (no surprises, just next next finish, attach network to virtual switch, load vm and boot)? Don't feel like it to configure/check each machine by hand. | s3://commoncrawl/crawl-data/CC-MAIN-2018-22/segments/1526794867859.88/warc/CC-MAIN-20180526190648-20180526210648-00018.warc.gz | CC-MAIN-2018-22 | 583 | 4 |
https://www.stat.auckland.ac.nz/~paul/ItDT/HTML/node45.html | code | XML (the eXtensible Markup Language)
is a data description language that can be used for storing data.
It is particularly useful as a format for sharing information
between different software systems.
The information in this
chapter describes XML 1.0, which is a W3C Recommendation.
Within this chapter, any code written in a sans-serif oblique font
represents a general template; that part of the code
will vary depending on the names of the elements and
the names of the attributes that are used to
store a particular data set.
This work is licensed under a Creative Commons Attribution-Noncommercial-Share Alike 3.0 New Zealand License. | s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662529538.2/warc/CC-MAIN-20220519141152-20220519171152-00402.warc.gz | CC-MAIN-2022-21 | 639 | 12 |
http://web2.sys-con.com/node/2615503 | code | |By PR Newswire||
|April 13, 2013 08:36 AM EDT||
PITTSBURGH, April 13, 2013 /PRNewswire-USNewswire/ -- Participation of women in the computing field has diminished by half since the 1990s. Bucking that trend are outstanding students like Calista Frederick-Jaskiewicz, 16, of Wexford, Pa., and her school, the Pennsylvania Cyber Charter School.
Calista, a PA Cyber student since kindergarten, is one of 35 young women in the U.S. to receive the 2013 Award for Aspirations in Computing from the National Center for Women & Information Technology (NCWIT.) The national award was presented March 9 during an expenses-paid weekend event at the Ritz-Carlton in Charlotte, N.C., hosted by Bank of America.
Today, Saturday, April 13, Calista will be recognized as NCWIT presents awards to regional winners at the William Pitt union ballroom, University of Pittsburgh.
Among those attending Saturday's ceremony will be Ruthe A. Farmer, director of strategic initiatives for NCWIT, and the person who expanded the organization's scope from recognizing 30 young women a year to more than 1,000 nationwide.
"Women are very under-represented in computing careers, declining from 37 percent in the 1990s down to 18 percent," Farmer said. The dot-com bubble, which made computing careers appear high-risk to students, and stereotypes of men as computer geeks are among reasons for the decline, she believes.
"There's no shortage of smart girls that can do math, but those girls are choosing to do other rigorous occupations like law or medicine where there is less gender disparity and fewer cultural issues," said Farmer.
The purpose of the NCWIT awards program is to identify high-potential young women like Calista Frederick-Jaskiewicz who have an interest in computer science, introduce them to like-minded peers, and provide a support mechanism to guide them into college and a career, Farmer said.
After observing Calista at the NCWIT national awards weekend in Charlotte, Farmer said, "She is a natural leader, you could tell. A bit of a spitfire with a very large personality."
Farmer realized she had met Calista before, at the 2010 Intel Education Visionary Conference in Washington, D.C., where she appeared as the performing student pianist on stage taking a distance lesson from a composer located in California. Calista connected and configured both the computer software and the Yamaha Disklavier's piano settings for the demonstration.
Her parents, Cynde Frederick and Dr. David Jaskiewicz of Wexford, enrolled Calista as a kindergarten student in the PA Cyber Charter School in 2001, the online school's second year of existence.
According to her mother, the PA Cyber learning environment enables Calista to meet her potential both as a student and as a person.
About Calista Frederick-Jaskiewicz
Receiving the NCWIT Award is only one of many honors and achievements earned by Calista.
Calista is a Nestle Very Best in Youth 2013 National Finalist, Prudential Spirit of America 2013 Distinguished Finalist, and a 2013 recipient of the gold President's Volunteer Service Award. She is a Davidson Institute Young Scholar Ambassador and Teen Mensan.
She is a third-year participant in the NASA INSPIRE Online Community and an avid follower of NASA news. On August 5, 2012, she attended the NASA Curiosity Landing festivities at Ames Research Center in Mountainview, Calif.
Calista was a team member on the FIRST FRC robotics rookie team "Girls of Steel" in 2011 in Pittsburgh, and served as a volunteer referee at regional FIRST Tech Challenge competitions at Robert Morris University in 2012 and 2013.
Calista is the founder and CEO of Origami Salami, through which she advocates for STEM through origami, the ancient art of paper folding. She leads 12 student Origami Salami chapters in the United States, Australia, and the Philippines who "Inspire the world to fold for food."
Folding for Good is Calista's community service spin-off organization. Her ongoing Folding for Good project, called "Operation Sandy Hook: Peace to You" continues to engage folders from around the world - from 13 countries and growing - who have joined together to fold origami peace cranes for the Sandy Hook School community. Schoolchildren from Muskogee, Okla., and Jonesborough, Tenn., to Shantalla, Ireland; Budapest, Hungary; and South Africa, have folded and sent in cranes. Adults and professional origamists have also sent in cranes.
To date the peace crane count stands at 8,425. An exhibit about the project is in the planning stages at the Carnegie Science Center, with tentative launch in October.
Calista authored an online course called "Investigation: Paper Engineering" in 2011 for cyber curriculum provider Lincoln Interactive.
She invites people to visit her website, www.OrigamiSalami.com, "like" her Facebook page, www.facebook.com/OrigamiSalami1, follow her on Twitter @OrigamiSalami1 #OperationSandyHook, and visit her blog on STEMplanet.org.
Calista is a third degree black belt in taekwondo, and an accomplished pianist, violist and figure skater. She fences on the Pine-Richland High School team.
At age 12, Calista began taking college classes on campus at LaRoche College, earning 12 credits in courses such as Arabic language. She earned another dozen college credits through the University of Nevada in 2011 and 2012 at Davidson THINK Summer Institute. Beginning in 2011, she earned more credits at Robert Morris University, where her current favorite class is Circuits and Electromagnetism.
By the end of the current semester, Calista will have earned 77 college credits, all as a dual enrollee. She plans to graduate from high school in spring 2014 and attend college in the fall, majoring in electrical and computer engineering.
"Calista is brilliant, talented and tireless, and a very nice and personable young lady as well," said Dr. Michael J. Conti, CEO of PA Cyber Charter School. "She is a role model for every young woman who seeks high achievement, especially in the fields of science and technology. We are exceptionally proud of who she is and what she has achieved."
About PA Cyber and STEM
Recognized as an educational innovator, PA Cyber's efforts to foster student interest in STEM (science, technology, engineering, math) careers includes a partnership with the Los Alamos National Laboratories to create a series of courses called Cutting Edge Science (CES), supplementing its large selection of regular science and technology courses. Students who join the CES Club undertake projects and interact with working scientists at Los Alamos.
CES courses include epidemiology, biotechnology, biofuels, forensic science, emerging genetics, sports medicine, stem cell research, energy, solar technology, future transportation and climate. Engineering courses are grouped into a School of Engineering and include introduction to engineering, applied engineering, land speed vehicles, and critical thinking.
About half the students enrolled in PA Cyber's CES courses are female, according to Jennifer Shoaf, senior administrator for curriculum.
This year, PA Cyber launched an extracurricular group called "Sciber Sisters" for girls in grades 5-12 who are interested in STEM careers. Monthly online meetings include discussion of college and careers, and contact with women working in STEM fields.
PA Cyber is Pennsylvania's first K-12 statewide cyber charter school. With a current enrollment of 11,500, it is recognized as the state's most successful cyber school, and a national innovator in online education. PA Cyber (www.pacyber.org, 1.888.PACYBER) is now enrolling for the 2013-2014 school year.
(Source: PA Cyber Charter School. Contact Jill Valentine, 724.624.0473)
SOURCE PA Cyber
Why do your mobile transformations need to happen today? Mobile is the strategy that enterprise transformation centers on to drive customer engagement. In his general session at @ThingsExpo, Roger Woods, Director, Mobile Product & Strategy – Adobe Marketing Cloud, covered key IoT and mobile trends that are forcing mobile transformation, key components of a solid mobile strategy and explored how brands are effectively driving mobile change throughout the enterprise.
Sep. 30, 2016 03:45 AM EDT Reads: 2,234
SYS-CON Events announced today that ReadyTalk, a leading provider of online conferencing and webinar services, has been named Vendor Presentation Sponsor at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. ReadyTalk delivers audio and web conferencing services that inspire collaboration and enable the Future of Work for today’s increasingly digital and mobile workforce. By combining intuitive, innovative tec...
Sep. 30, 2016 03:45 AM EDT Reads: 3,066
If you’re responsible for an application that depends on the data or functionality of various IoT endpoints – either sensors or devices – your brand reputation depends on the security, reliability, and compliance of its many integrated parts. If your application fails to deliver the expected business results, your customers and partners won't care if that failure stems from the code you developed or from a component that you integrated. What can you do to ensure that the endpoints work as expect...
Sep. 30, 2016 03:15 AM EDT Reads: 1,747
WebRTC adoption has generated a wave of creative uses of communications and collaboration through websites, sales apps, customer care and business applications. As WebRTC has become more mainstream it has evolved to use cases beyond the original peer-to-peer case, which has led to a repeating requirement for interoperability with existing infrastructures. In his session at @ThingsExpo, Graham Holt, Executive Vice President of Daitan Group, will cover implementation examples that have enabled ea...
Sep. 30, 2016 03:00 AM EDT Reads: 1,624
There is growing need for data-driven applications and the need for digital platforms to build these apps. In his session at 19th Cloud Expo, Muddu Sudhakar, VP and GM of Security & IoT at Splunk, will cover different PaaS solutions and Big Data platforms that are available to build applications. In addition, AI and machine learning are creating new requirements that developers need in the building of next-gen apps. The next-generation digital platforms have some of the past platform needs a...
Sep. 30, 2016 03:00 AM EDT Reads: 1,933
So, you bought into the current machine learning craze and went on to collect millions/billions of records from this promising new data source. Now, what do you do with them? Too often, the abundance of data quickly turns into an abundance of problems. How do you extract that "magic essence" from your data without falling into the common pitfalls? In her session at @ThingsExpo, Natalia Ponomareva, Software Engineer at Google, provided tips on how to be successful in large scale machine learning...
Sep. 30, 2016 02:45 AM EDT Reads: 2,430
In his session at @ThingsExpo, Kausik Sridharabalan, founder and CTO of Pulzze Systems, Inc., will focus on key challenges in building an Internet of Things solution infrastructure. He will shed light on efficient ways of defining interactions within IoT solutions, leading to cost and time reduction. He will also introduce ways to handle data and how one can develop IoT solutions that are lean, flexible and configurable, thus making IoT infrastructure agile and scalable.
Sep. 30, 2016 02:15 AM EDT Reads: 1,635
SYS-CON Events announced today that Numerex Corp, a leading provider of managed enterprise solutions enabling the Internet of Things (IoT), will exhibit at the 19th International Cloud Expo | @ThingsExpo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Numerex Corp. (NASDAQ:NMRX) is a leading provider of managed enterprise solutions enabling the Internet of Things (IoT). The Company's solutions produce new revenue streams or create operating...
Sep. 30, 2016 02:00 AM EDT Reads: 2,081
In his general session at 18th Cloud Expo, Lee Atchison, Principal Cloud Architect and Advocate at New Relic, discussed cloud as a ‘better data center’ and how it adds new capacity (faster) and improves application availability (redundancy). The cloud is a ‘Dynamic Tool for Dynamic Apps’ and resource allocation is an integral part of your application architecture, so use only the resources you need and allocate /de-allocate resources on the fly.
Sep. 30, 2016 12:45 AM EDT Reads: 2,982
IoT is fundamentally transforming the auto industry, turning the vehicle into a hub for connected services, including safety, infotainment and usage-based insurance. Auto manufacturers – and businesses across all verticals – have built an entire ecosystem around the Connected Car, creating new customer touch points and revenue streams. In his session at @ThingsExpo, Macario Namie, Head of IoT Strategy at Cisco Jasper, will share real-world examples of how IoT transforms the car from a static p...
Sep. 30, 2016 12:00 AM EDT Reads: 1,681
Fifty billion connected devices and still no winning protocols standards. HTTP, WebSockets, MQTT, and CoAP seem to be leading in the IoT protocol race at the moment but many more protocols are getting introduced on a regular basis. Each protocol has its pros and cons depending on the nature of the communications. Does there really need to be only one protocol to rule them all? Of course not. In his session at @ThingsExpo, Chris Matthieu, co-founder and CTO of Octoblu, walk you through how Oct...
Sep. 30, 2016 12:00 AM EDT Reads: 2,382
Web Real-Time Communication APIs have quickly revolutionized what browsers are capable of. In addition to video and audio streams, we can now bi-directionally send arbitrary data over WebRTC's PeerConnection Data Channels. With the advent of Progressive Web Apps and new hardware APIs such as WebBluetooh and WebUSB, we can finally enable users to stitch together the Internet of Things directly from their browsers while communicating privately and securely in a decentralized way.
Sep. 29, 2016 11:30 PM EDT Reads: 1,219
"My role is working with customers, helping them go through this digital transformation. I spend a lot of time talking to banks, big industries, manufacturers working through how they are integrating and transforming their IT platforms and moving them forward," explained William Morrish, General Manager Product Sales at Interoute, in this SYS-CON.tv interview at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York City, NY.
Sep. 29, 2016 10:30 PM EDT Reads: 4,061
The Internet of Things can drive efficiency for airlines and airports. In their session at @ThingsExpo, Shyam Varan Nath, Principal Architect with GE, and Sudip Majumder, senior director of development at Oracle, will discuss the technical details of the connected airline baggage and related social media solutions. These IoT applications will enhance travelers' journey experience and drive efficiency for the airlines and the airports. The session will include a working demo and a technical d...
Sep. 29, 2016 10:00 PM EDT Reads: 1,818
Developing software for the Internet of Things (IoT) comes with its own set of challenges. Security, privacy, and unified standards are a few key issues. In addition, each IoT product is comprised of (at least) three separate application components: the software embedded in the device, the back-end service, and the mobile application for the end user’s controls. Each component is developed by a different team, using different technologies and practices, and deployed to a different stack/target –...
Sep. 29, 2016 08:45 PM EDT Reads: 1,557
Identity is in everything and customers are looking to their providers to ensure the security of their identities, transactions and data. With the increased reliance on cloud-based services, service providers must build security and trust into their offerings, adding value to customers and improving the user experience. Making identity, security and privacy easy for customers provides a unique advantage over the competition.
Sep. 29, 2016 06:15 PM EDT Reads: 3,732
SYS-CON Events announced today that Commvault, a global leader in enterprise data protection and information management, has been named “Bronze Sponsor” of SYS-CON's 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Commvault is a leading provider of data protection and information management solutions, helping companies worldwide activate their data to drive more value and business insight and to transform moder...
Sep. 29, 2016 05:15 PM EDT Reads: 2,865
SYS-CON Events has announced today that Roger Strukhoff has been named conference chair of Cloud Expo and @ThingsExpo 2016 Silicon Valley. The 19th Cloud Expo and 6th @ThingsExpo will take place on November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. "The Internet of Things brings trillions of dollars of opportunity to developers and enterprise IT, no matter how you measure it," stated Roger Strukhoff. "More importantly, it leverages the power of devices and the Interne...
Sep. 29, 2016 04:45 PM EDT Reads: 3,485
Personalization has long been the holy grail of marketing. Simply stated, communicate the most relevant offer to the right person and you will increase sales. To achieve this, you must understand the individual. Consequently, digital marketers developed many ways to gather and leverage customer information to deliver targeted experiences. In his session at @ThingsExpo, Lou Casal, Founder and Principal Consultant at Practicala, discussed how the Internet of Things (IoT) has accelerated our abil...
Sep. 29, 2016 04:45 PM EDT Reads: 2,809
Digital innovation is the next big wave of business transformation based on digital technologies of which IoT and Big Data are key components, For example: Business boundary innovation is a challenge to excavate third-party business value using IoT and BigData, like Nest Business structure innovation may propose re-building business structure from scratch, as Uber does in the taxicab industry The social model innovation is also a big challenge to the new social architecture with the design fr...
Sep. 29, 2016 04:30 PM EDT Reads: 1,356 | s3://commoncrawl/crawl-data/CC-MAIN-2016-40/segments/1474738662133.5/warc/CC-MAIN-20160924173742-00140-ip-10-143-35-109.ec2.internal.warc.gz | CC-MAIN-2016-40 | 18,331 | 75 |
https://gowda.ai/ | code | Thamme Gowda is a Research Scientist at Microsoft Translator. He obtained his Ph.D. (2022) and MS (2017) from USC, both majoring in Computer Science. Previously, he worked as a Research Engineer at USC ISI (2017-22; for five years!), a Data Scientist intern at NASA JPL (2016-17), a Committer and Project Management Committee member at the Apache Software Foundation, a full-stack software developer at a startup (2012-14), and co-founder at Datoin.com (2014-15).His recent focus is on neural machine translation and rare phenomena learning problem (dissertation, slides).
|2022/12/07||I have officially started my new role at Microsot Translator a month ago! I have been busy learning Azure and ecosystem. My new teammates are awesome and inspiring! There are plenty of exciting problems to work on 😀 I am feeling grateful for the opportunity.|
|2022/10/21||My time at USC/ISI has come to an end🥲. I am looking forwarding to starting a new chapter at Microsoft! Thanks to my friends and collaborators; special thanks to my advisor, Prof. Jonathan May, for the support, all the lessons, and mentorship over the past years.|
|2022/10/12||My O-1A visa has been approved! Thanks USCIS! Huge thanks to many outstanding researchers made this possible by submitting recommendation/reference letters to the US govt.|
|2022/05/28||Professional:I am eagerly looking forward to joining Microsoft Translate as a Sr. Researcher if USCIS approves my (O1) visa. Thanks to everyone who talked to me during my job search; special thanks to Microsoft, Amazon Alexa, Meta, AI2, and NASA JPL teams. Personal: I got married!|
|2022/03/28||I've successfully defended my Ph.D. dissertation! (dissertation, slides). (I'm looking for a new role!)|
|2022/03/24||One of my tools (
|2022/03/16||I've released a massively multilingual translation model that translates 600 languages into English; see the demo at rtg.isi.edu/many-eng|
I speak Kannada/ಕನ್ನಡ, Telugu/తెలుగు, and Hindi/हिन्दी (+English, of course!). I was raised by a family of farmers in a southern Indian village. So, beside the "professional" experience that I have displayed here, I also have much more experience in agriculture that you will not hear: vineyard, silkworms, dairy, sheep, poultry...!
I came to this grad school for learning the artificial intelligence, but I also ended up learning a bit about myself/consciousness: | s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296948620.60/warc/CC-MAIN-20230327092225-20230327122225-00693.warc.gz | CC-MAIN-2023-14 | 2,411 | 10 |
https://piefed.social/post/78297 | code | A place to post new communities all over Lemmy for discovery and promotion.
The rules may be more established as time goes on, but it's important to have a foundation to work on.
1. Follow the rules of Lemmy.world - These rules are the same as Mastodon.world's rules, which can be found here.
2. Include a community title and description in your post title. - A following example of this would be
New Communities - A place to post new communities all over Lemmy for discovery and promotion.
3. Follow the formatting. - The formatting as included below is important for people getting universal links across Lemmy as easily as possible.
Please include this following format in your post:
*This provides a link that should work across instances, but in some cases it won't*
You should also include either:
*Q: Why do I get a 404?*
A: At least one user in an instance needs to search for a community before it gets fetched. Searching for the community will bring it into the instance and it will fetch a few of the most recent posts without comments. If a user is subscribed to a community, then all of the future posts and interactions are now in-sync.
*Q: When I try to create a post, the circle just spins forever. Why is that?*
A: This is a current known issue with large communities. Sometimes it does get posted, but just continues spinning, but sometimes it doesn't get posted and continues spinning. If it doesn't actually get posted, the best thing to do is try later. However, only some people seem to be having this problem at the moment.
Fahmi, CC BY 4.0 https://creativecommons.org/licenses/by/4.0, via Wikimedia Commons | s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296816879.72/warc/CC-MAIN-20240414130604-20240414160604-00469.warc.gz | CC-MAIN-2024-18 | 1,630 | 14 |
http://www.redmine.org/issues/2639 | code | Easier time reporting
|Assignee:||Jean-Philippe Lang||% Done:|
First of all, thanks for great software. We're using Redmine for IT development and plan to expand it to the entire organization. One of the things we'd like is to have easier time reporting.
- Make the "Log Time" link available on the overview page so you can access it directly (not through reports)
- Allow a tag in the commits (refs #123(4)) that allows you do commit your time so that developers don't explicitly have to write it into Redmine. | s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267156376.8/warc/CC-MAIN-20180920020606-20180920040606-00082.warc.gz | CC-MAIN-2018-39 | 511 | 5 |
https://coeai19.wixsite.com/coe-ai-bbsr/post/extractive-odia-text-summarization-system-an-ocr-based-approach | code | Extractive Odia Text Summarization System: An OCR based Approach
Automatic text summarization is considered as a challenging task in natural language processing field. In the case of multilingual scenarios particularly for the low-resource, morphologically complex languages the availability of summarization data set is rare and difficult to construct. In this work, we propose a novel technique to extract Odia text from the image files using optical character recognition (OCR) and summarize the obtained text using extractive summarization techniques. Also, we performed a manual evaluation to measure the quality of summaries to validate our techniques. The proposed approach is found suitable for generating summarized Odia text and the same technique can also extend to other low-resource languages for extractive summarization systems.
After given the perfect shape, the “Tesseract” tool kit performs Odia character extraction. For text summarization, we have used “Term Frequency-Inverse Document Frequency”. The sentences which are extracted from the image are tokenized which split them into sentences. After sentences are tokenized, the sentences are split into words. To remove unnecessary words that are present in the sentences, the stop-word filtration process is performed. As in Odia language, less number of a stop-word dataset is present. We have made our dataset. After removing of stop-words, the rest of the words “Term-Frequency (TF)” are calculated by the given formula below
Result And Conclusion:
When the proposed technique applied to the selected data, we got the summarized text as per our desire. The extracted Odia text and the generated Odia summaries are shown in Figure. To judge the summarization, we have evaluated our results by human evaluators. We have chosen four human evaluators who can read, write, and understands Odia properly. We have set five parameters for the manual evaluation as mentioned in the Table. We have decided to do the human evaluation as in our case we find it difficult for automatic evaluation. So, we provide the Odia extracted text and the generated summaries to the four experts (person who know Odia, who can write Odia properly, who can read Odia properly, and who can understand Odia properly). According to their evaluation, we find that all our results are purely related to the extracted Odia text hence the summarization is related to the topic. According to our result, they also have gone through our evaluation criteria and they give us results in percentile format. The manual evaluation results are shown in the Table. | s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100551.2/warc/CC-MAIN-20231205140836-20231205170836-00433.warc.gz | CC-MAIN-2023-50 | 2,610 | 5 |
http://www-10.lotus.com/ldd/lcwiki.nsf/xpDocViewer.xsp?lookupName=IBM+Connections+4.0+documentation&res_title=Enabling_and_disabling_the_My_Page_view_ic40&content=pdcontent | code | About this task
When you install IBM
® Connections, the My Page view is disabled by default. If you have migrated from a previous version of the product, the view is enabled by default. You can override the default setting from the Administration view.
To enable or disable the My Page view, complete the following steps:
Parent topic: Administering the Home page from the user interface
- Open the Administration view.
- Select Enabled or Disabled from the The Widget page is currently list, and then click Save. | s3://commoncrawl/crawl-data/CC-MAIN-2016-50/segments/1480698544672.33/warc/CC-MAIN-20161202170904-00134-ip-10-31-129-80.ec2.internal.warc.gz | CC-MAIN-2016-50 | 514 | 7 |
https://www.xtratime.org/forum/107-arabian-football/167826-brazilian-soccer-players-arabian.html | code | Brazilian soccer players to Arabian
I'm a Brazilian agent and start to negociate brazilian soccer players to the Arabian market.
I have contact with all players that are playing in Brazil and if someone can help me to offer the players to Arabian Clubs, please contact me.
At this moment i'd like to know if Al-Nassr(KSA) chose the coach for this season.
And if someone want some information about Brazilian soccer players, ask me...
Thanks a lot, | s3://commoncrawl/crawl-data/CC-MAIN-2019-43/segments/1570986677884.28/warc/CC-MAIN-20191018032611-20191018060111-00090.warc.gz | CC-MAIN-2019-43 | 447 | 6 |
https://webhighlands.com/hostgator-vs-inmotion-hosting/ | code | Hostgator Vs Inmotion Hosting
In 2002, HostGator was founded by Brent Oxley in his dormitory at Florida Atlantic University. The company has actually grown significantly since then and also continues to do so, year after year. Their logo design is “We eat up the competition.”Hostgator Vs Inmotion Hosting
Today, HostGator has headquarters in both Austin and Houston, Texas, after growing out of several other websites. In 2007, their Brazil workplace was opened. HostGator has actually won lots of awards for assistance as well as holding solutions.
An EIG Owned Environment-friendly Host In June 2012 HostGator was bought out by the Endurance International Team (a company that likewise has numerous other holding service providers aside from HostGator). However, it continues to trade under the HostGator name.
HostGator is an environment-friendly energy firm. The firm purchases Green-e accredited Renewable Energy Debts (RECs) from a wind farm in Texas. 130% environment-friendly power cools down as well as powers all shared and reseller web servers.
We might earn a commission– at no additional cost to you– if you decide to acquire any of the products, software or services we describe and also promote on our internet site. The opinions expressed are of our very own independent customers & creating personnel, commissioned to give useful reviews & their honest opinion.
You should presume that every outside web link that you click on our web site is an affiliate link that brings about us being paid by a partner of ours.
Summary of HostGator’s Top Functions
Whenever there’s a discussion regarding webhosting, the name HostGator is bound ahead up, and with good reason. Hostgator Vs Inmotion Hosting
Having actually been around for more than a years, HostGator can be said to be one of the most relied on and identified webhosting. It excels in a number of locations including client assistance, hosting flexibility, uptime, shared hosting, plus a lot a lot more.
This excellence in a number of elements of webhosting coupled with the firm’s experience, variety of features, as well as efficiency makes HostGator a smart option for any type of website proprietor.
What Advantage Do You Get?
HostGator supplies a variety of strategies. If you’re having a hard time to choose on which strategy to pick, take into consideration these features, which we’ll discuss listed below:
- You handle your account making use of cPanel, the industry-standard user interface
- To keep your account protected, you obtain a free Secure Sockets Layer (SSL) certificate
- If you want to enhance protection as well as malware scanning, you will certainly need to buy SiteLock
- Even the entry-level shared hosting plan features assistance for limitless email accounts
- Monthly payment options are readily available
- One-click installs, even from the standard planHostgator Vs Inmotion Hosting
- Accessibility to the web site builder– at a cost
- A Web Content Distribution Network (CDN) keeps your website fast
- Numerous assistance alternatives consisting of live chat
With all the other host suppliers that are readily available, why choose HostGator? Well, the reality is that no single webhosting is ideal. So, whether you’re an amateur web designer or are looking to transform webhosting, here’s a glance at the excellent as well as the poor of HostGator to assist you make the ideal choice.
HostGator’s Hosting Packages
Among the most effective features of HostGator is the reality that the business uses flexible plans that leave individuals (both huge and little businesses/blogs) with plenty of room to expand.
The most fundamental of the bundles, the “Hatchling Plan,” includes support for one domain name, endless transmission capacity, disk area, data sources, shared SSL certificate, lots of e-mail addresses, and assistance for third-party applications like content administration systems.
Other shared organizing plans improve this Hatchling plan by including added features such as endless domains, personal SSL certificate, and a toll-free contact number (just to name a few.).
VPS and Dedicated Hosting Plans.
Conversely, if you require even more power, or have particular needs that shared servers can not satisfy, there’s the alternative of advanced bundles such as VPS and also Committed server plans. The highest rate VPS package supplies 8GB RAM, 240GB storage space, and regular monthly data transfers covered at 3TB.
Dedicated web server packages, on the other hand, can be customized with as much as 16GB of RAM, 25TB of monthly information transfers, as well as a remarkable 1TB of storage.
HostGator additionally supplies Cloud as well as WordPress hosting, which we explore below. You can constantly go to HostGator’s main websites to locate the most upgraded holding plans on offer as well as their specifics.
The company likewise gives WordPress holding with the most inexpensive plan enabling one website with as much as 100,000 site visitors every month. The most affordable WordPress plan additionally includes 1GB back-ups. Higher-end strategies enable approximately 3 sites as well as up to 500,000 site visitors monthly.
At the same time, the top WordPress hosting plan additionally enables up to 3GB in backups.Hostgator Vs Inmotion Hosting
Tons Ahead of The Competition
All WordPress holding plans include enhanced cloud style, low-density web servers, CDN, and also multiple caching layers which indicate that websites load up to an alleged 2.5 times faster than rivals.
HostGator professionals are likewise handy to supply a totally free movement solution and also premium assistance in case anything breaks.
What Concerning Efficiency and also Uptime?
HostGator guarantees a 99.9% uptime and has the sources to back it up.
Powered by Hundreds Of Global Servers.
One of the largest as well as most popular webhosting, HostGator has hundreds of servers under its administration.
HostGator servers are kept an eye on 24/7 by on-site technical team. Protected Facilities for Connection of Service. In addition to being purposefully situated across the world, these web servers make use of top-notchserver equipment as well as are housed in cutting edge information centers that take all the required measures (UPS battery backup devices, top-tier A/C systems, consistent infrastructure tracking, fire protection systems, and so on) to make certain performance remains remarkable as well as nonstop.
Thanks to these world-class information centers as well as their strategic locations, HostGator provides reputable, quality efficiency that never ever lets down.
Uptime and Rate
HostGator has an over 90% customer satisfaction (from a June 2008 customer fulfillment study). HostGator preserves an average of 99.9% uptime. And also in addition to the reputable uptime, HostGator additionally provides satisfactory tons times with speeds varying from 22 to 940ms depending on the browser’s place.
Exactly How Excellent is HostGator’s Customer Assistance?
When it comes to consumer assistance, really couple of web hosts can compete with HostGator’s customer support. The business also has awards to confirm this reality. For general concerns as well as concerns, you can make use of HostGator’s email assistance, which is always readily available, social networks support on Facebook, Twitter, Google+.
When you register for a HostGator plan, you can request a free website transfer.
Or seek solutions from the business’s substantial knowledgebase, which contains FAQs, handy posts, and also video tutorials that stroll you with several of the controls. HostGator likewise uses a discussion forum where you can ask questions and answer those positioned by various other customers of the web host.
Alternatively, if you require a little bit more instant help, or are experiencing a problem that needs unique focus, HostGator has consumer support representatives on standby 24/7/365 all set to assist you with whatever concerns you may have.
These agents can be gotten to by phone or live conversation.Hostgator Vs Inmotion Hosting
Exists a Money-Back Warranty?
No locked-in contracts and also a 45-day money-back assurance. Meaning if you decide to cancel within the very first 45 days of joining, you get a complete reimbursement, no questions asked.
Even more making HostGator a good catch is the truth that the web host throws in a few added functions with their various organizing strategies. For example, each hosting plan includes a number of freebies.
You get a free site builder and website structure tools, endless bandwidth and also disk area, over 4,000 site themes, free domain name transfers, and endless MySQL data sources.
Other extras that you can look forward to with HostGator include:.
- $ 150 worth of Google Adwords or Bing/Yahoo advertising credit histories.
- Totally free site transfers when you want to move your website from an additional host to HostGator. As well as the most effective component is that your website can be upgraded throughout the transfer at no charge. Nevertheless, the stated migration needs to be done within 1 month from the day you subscribe.
- A complimentary domain for the first term when you transfer as well as establish a new account.
- 1-click sets up offered for all major open-source jobs such as WordPress, Magento, and also Joomla.
- A 45-day money-back guarantee for all HostGator hosting strategies. A lot of web hosting firms just offer you a 30-day home window to terminate your account as well as get your refund.
- A getting-started email with web links to every one of the resources you will require to construct your site and also get it up and running.
What are the Advantages and disadvantages of HostGator?
So, is HostGator the ideal webhosting for you?
Well, offered the fact that HostGator gives you a basic way to develop as well as handle your website, provides you with all the sources you’ll need to deliver top-level solutions on your website, provides a number of feature-packed holding packages, and brings a ton of experience to the table, it can be an excellent web host for anybody with an internet site.
A Lot Of Pros
HostGator provides numerous benefits consisting of:.
- Reliable uptime and also rapid action times.
- Affordable hosting plans.
- Lots of space for growth.
- The choice of cloud organizing.
- Versatile e-mail administration.
- Free shared or personal SSL certificate on all organizing plans.
- Generous 45-day money-back warranty that provides consumers assurance.
- Substantial Knowledgebase.
- No limitation on data transfer, disk space, and also emails.
- Well-founded security.
- Free Weebly site builder.
- A wonderful control panel with a lots of attributes varying from an online file supervisor to more advanced functions such as cron jobs, photo manager, error logs, as well as apache trainers.
Additionally, HostGator has a huge data base with solution to almost any inquiry you might have varying from the simplest to one of the most advanced. So, when the client assistance team takes as well long to respond to, you can seek the option to your problem from this knowledgebase.
What Are the Cons?
When it comes to the downsides of the firm, you’ll just need to take care of the issue of regular backups, sluggish client reaction times (according to several of the host’s customers), an innovative cPanel that needs some obtaining used to, and no one-stop WordPress import.Hostgator Vs Inmotion Hosting
Attempt Without Any Commitment
Given that HostGator has a lot to such as and also very few things to do not like, you ought to definitely try the business if you own a website or plan to build one.
If the web host does not make an excellent suitable for your web site, the 45-day money-back assurance available will certainly enable you to walk away without shedding cash. | s3://commoncrawl/crawl-data/CC-MAIN-2021-39/segments/1631780057687.51/warc/CC-MAIN-20210925142524-20210925172524-00409.warc.gz | CC-MAIN-2021-39 | 11,867 | 84 |
https://humanitarian.atlassian.net/wiki/spaces/imtoolbox/pages/54788162/Mapping | code | Geospatial analysis involves the collection, manipulation and display of data with geographic coordinates.
IMOs with the mapping skillset spend most of their time identifying trends and relationships between humanitarian issues and places to provide an overview of the humanitarian situation.
Mapping and Geospatial Analysis - Examples
Articles and Reports:
Community and Open Source Network: | s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320303956.14/warc/CC-MAIN-20220123015212-20220123045212-00565.warc.gz | CC-MAIN-2022-05 | 392 | 5 |
https://www.freelancer.com/projects/PHP-Perl/Article-Rewriter-using-synonyms-PHP.4135356/ | code | Need an article rewriter in PHP or in other language but can be called by PHP under Linux environment.
The rewriter wroks by replacing certain words with synonyms. Note that simply choosing a random synonym is very simple and even I can write such script in 5 minutes. However it WILL NOT work because words are context dependant and the result will be a total bizzaire. Im looking for a slightly more sophisticated solution that can rewrite the article without altering word's context.
Database wise, I'm not interested in using third party API unless it is free and supports unlimited queries. So is best to use a local database.
In your bid please let me know which public database you are going to use or how you are going to build the database, also how you are going to find synonyms with same context. | s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187826114.69/warc/CC-MAIN-20171023145244-20171023165244-00256.warc.gz | CC-MAIN-2017-43 | 808 | 4 |
https://www.bragginlightz.com/products/2003-2005-subaru-forester-fog-light-covers | code | SG5 Forester Fog Light Deletes. Switched to a FMIC? Or maybe your just not a fan of fog lights or you just want something different. This should fit the bill, we used fog light covers from HD tuning, cut out an F-Badge and added a frosted acrylic with sequential strips all incased in a cad designed fbadge enclosure. We have a limited quanitity of these so order fast if you want a set. | s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100135.11/warc/CC-MAIN-20231129173017-20231129203017-00188.warc.gz | CC-MAIN-2023-50 | 387 | 1 |
https://www.ideaplan.io/roadmap-templates/goals-roadmap | code | A Goals Roadmap is a visual planning tool used to set and achieve goals in a specific timeframe. It outlines the specific objectives to be achieved and specifies the timeline for completion. The roadmap is used to track progress towards the goals and communicate it to stakeholders. It helps teams to prioritize the most important goals and plan their actions accordingly.
The Goals Roadmap is particularly useful for organizations that want to align their activities with their strategic objectives and measure their success. It is also helpful for keeping everyone on the same page, ensuring that everyone involved in the project understands the timeline and the goals for each development cycle. Overall, the Goals Roadmap is a valuable tool for managing projects and ensuring that teams are delivering value to customers and achieving their strategic objectives efficiently and effectively. | s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296816465.91/warc/CC-MAIN-20240412225756-20240413015756-00706.warc.gz | CC-MAIN-2024-18 | 894 | 2 |
http://dhtmljavascriptmenu.com/how-to/add-tab-html.html | code | Ready to use button templates and submenus themes.
Overlap all Html Elements on the Page
Submenus drop down over all the objects of the page (select, flash, object, embed).Sub Menu Disabled In Vista
Create your own button themes
Theme editor helps you create your own themes or modify existing ones.Mouseover Or Mouse Over
Css Drop Down Menus
Create drop down menus based on css using Vista Buttons. Make various styles for each submenu item adjusting css styles.Coded Side Menu
Menu Template:Large Buttons Blue - Rounded Corner
Add Tab Html
Add Tab Html Screenshots
Button and Icon Samples
- To create your own theme, you should create the button image states first. It contains button image for each Normal/Hot state of the button, one-by-one, vertically. Button image states is a .bmp file like this one. Each button image state must have the same height. In the example below the button states image has size 50x150. It contains three button state images, 50x50 each.
- ".. are you saying the button creater will be able to generate code that will enable my google editor to link into the images"
- "..How can I set up Vista Buttons dreamweaver extension?"
- "..How do I make the sub-menu backgrounds non-transparent so that web page text that is behind the sub-menus when the website menus open does not appear?"
- ".. However now I'm just wanting to edit the webpage menu itself."
- "..I want the web page navigation bar in the top frame but the sub menus to appear in the bottom frame." | s3://commoncrawl/crawl-data/CC-MAIN-2016-22/segments/1464049275181.24/warc/CC-MAIN-20160524002115-00005-ip-10-185-217-139.ec2.internal.warc.gz | CC-MAIN-2016-22 | 1,493 | 17 |
https://forums.developer.ebay.com/questions/666/getting-a-specific-transaction-and-the-details.html | code | I started with the ebay API because I try to find a solution to the following problem. In Germany ebay started a payout process. The customer does not pay to the seller directly instead the way through ebay is used. To get details about the payout process there is a payout API.
Now I like to get a list of the date of the payout, the payout id, the transaction id, the buyer, the adress of the buyer and the private note that is attached to the transaction.
A payout bundles a number of transactions. I started to get the list of transactions for every payout. Now I like to get the transaction for the specific transaction ID. The API is so huge, I do not find the entry point to get a transaction by ID.
Than I need the details that are attached to the transaction. The private note and the shipping adresse of the buyer. I have no clue where to start. The only thing I know it it seems to be that I have to use the TransactionType for this.
Could anyone help me?
Thanks in advance, | s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446710417.25/warc/CC-MAIN-20221127173917-20221127203917-00316.warc.gz | CC-MAIN-2022-49 | 985 | 6 |
https://sourceforge.net/projects/nbvst/?source=directory | code | A module for netbeans that allows quick implementation of the jvstWrapper java-vst programming interface from the new project dialog, including automatically created gui and parameter control.
- Quickly create java-based VST Plugins
- Use automatically created GUI or make your own Swing-based GUI
- Default code handles all interaction between the host program and your plugin
- Coming soon: support for synth template
great idea! very helpful indeed | s3://commoncrawl/crawl-data/CC-MAIN-2017-47/segments/1510934807344.89/warc/CC-MAIN-20171124085059-20171124105059-00045.warc.gz | CC-MAIN-2017-47 | 451 | 6 |
https://www.lg.com/za/support/product-help/CT20230071-20153247885357 | code | The Black Stabilizer feature increases the contrast on dark screens, revealing color differences to make it easier to detect enemies hiding in dark areas.
* Left side is without Black Stabilizer mode applied, right side shows the screen with Black Stabilizer applied.
How to set up Black Stabilizer mode
➔ Using the joystick, navigate to "Menu > Picture/Color Setting > Picture > Black Stabilizer" to access and adjust the value from 0 to 100 (in increments of 20).
1. Adjusting the black level can increase object visibility on dark screens.
Increasing the Black Stabilizer value brightens the darker areas of the screen. (This can make it easier to distinguish objects in dark game visuals.)
Lowering the Black Stabilizer value darkens the darker areas of the screen, increasing the dynamic contrast ratio of the image.
- FPS1, FPS2, and RTS are preset modes.
- In Gamer 1, 2, and 3, the Black Stabilizer setting can be adjusted internally.
This guide was created for all models, so the images or content may be different from your product. | s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100508.23/warc/CC-MAIN-20231203125921-20231203155921-00449.warc.gz | CC-MAIN-2023-50 | 1,044 | 10 |
https://www.sindark.com/2014/03/13/first-kerbal-space-program-mun-return-vehicle/ | code | I used to take breaks from academic work by playing Starcraft II, but I haven’t loaded that game once since I got the demo and eventually the full version of Kerbal Space Program (KSP). It’s unambiguously one of my favourite games of all time. Nonetheless, there are several steep learning curves. Each stage of your development in KSP roughly approximates an area of knowledge necessary for real rocket science: maneuvering, orbital mechanics, rocket design, the understanding that a lot of your astronauts will die because of your mistakes (especially if you tinker with spaceplanes).
The full version of the game doesn’t come with a craft that has a decent chance of landing on the Mun and returning safely to Kerbin. I have modified the Kerbal X to be able to do this with amateur piloting skills.
This craft relies on a couple of plugins: MechJeb (fly to the Mun, land, and return home without using it at all for major geek points) and Kerbal Joint Reinforcement (your rocket may shake apart and explode without it).
Here it is: Modified Kerbal X with more fuel and engines and extras to help you land on the Mun (version IV) | s3://commoncrawl/crawl-data/CC-MAIN-2018-22/segments/1526794866894.26/warc/CC-MAIN-20180524224941-20180525004941-00040.warc.gz | CC-MAIN-2018-22 | 1,137 | 4 |
https://mirknig.su/knigi/programming/378014-machine-learning-in-the-aws-cloud-add-intelligence-to-applications-with-amazon-sagemaker-and-amazon-rekognition.html | code | Machine Learning in the AWS Cloud: Add Intelligence to Applications with Amazon SageMaker and Amazon RekognitionКНИГИ » ПРОГРАММИНГ
Название: Machine Learning in the AWS Cloud: Add Intelligence to Applications with Amazon SageMaker and Amazon Rekognition Автор: Abhishek Mishra Издательство: Sybex Год: 2019 Формат: True PDF Страниц: 510 Размер: 18.1 Mb Язык: English
Put the power of AWS Cloud machine learning services to work in your business and commercial applications! Machine Learning in the AWS Cloud introduces readers to the machine learning (ML) capabilities of the Amazon Web Services ecosystem and provides practical examples to solve real-world regression and classification problems. While readers do not need prior ML experience, they are expected to have some knowledge of Python and a basic knowledge of Amazon Web Services. Part One introduces readers to fundamental machine learning concepts. You will learn about the types of ML systems, how they are used, and challenges you may face with ML solutions. Part Two focuses on machine learning services provided by Amazon Web Services. You’ll be introduced to the basics of cloud computing and AWS offerings in the cloud-based machine learning space. Then you’ll learn to use Amazon Machine Learning to solve a simpler class of machine learning problems, and Amazon SageMaker to solve more complex problems. • Learn techniques that allow you to preprocess data, basic feature engineering, visualizing data, and model building • Discover common neural network frameworks with Amazon SageMaker • Solve computer vision problems with Amazon Rekognition • Benefit from illustrations, source code examples, and sidebars in each chapter The book appeals to both Python developers and technical/solution architects. Developers will find concrete examples that show them how to perform common ML tasks with Python on AWS. Technical/solution architects will find useful information on the machine learning capabilities of the AWS ecosystem. | s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652663039492.94/warc/CC-MAIN-20220529041832-20220529071832-00682.warc.gz | CC-MAIN-2022-21 | 2,078 | 3 |
https://archive.owentrueblood.com/junk-db/ | code | My hoard in the attic of my childhood home
I have always been a hoarder of junk. I love the possibilities represented in junked machines. Digging through a junk pile is a great way to get inspired. And sometimes you get lucky and find just the part you need for what you are working on.
At various points I've tried to use or build systems to organize my junk collection so it would be more useful to me. I made my first attempt at building one of these systems when I was in middle school. I called it JunkDB. It was a crappy CRUD application written in PHP. It was fun to work on but I never really used it intensively because of the prohibitive time cost of entering the information about my junk collection into its database. | s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296950422.77/warc/CC-MAIN-20230402074255-20230402104255-00265.warc.gz | CC-MAIN-2023-14 | 729 | 3 |
https://hungrygen.com/overcoming-financial-fears/ | code | Do you have financial fears? What is the purpose of giving? Pastor Vlad shares a message that may answer questions you’ve had about finances and how finances look with God.
Other Messages from Vladimir Savchuk
Sensitivity to the Holy Spirit – Part 2
Friendship with the Holy Spirit – Part 1
Triggered by Trauma
Raising Warriors – Part 3
Managing Emotional Mayhem – Part 2
Parenting on Purpose – Part 1
The Secret Place
How to Have Margin in Your Life, Finances, and Morality.
Spirit of Python
What does the Bible say about transgenderism | s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100568.68/warc/CC-MAIN-20231205204654-20231205234654-00795.warc.gz | CC-MAIN-2023-50 | 549 | 12 |
http://www.trekearth.com/workshops/525450/photo97900.htm | code | Only registered TrekEarth members may rate workshop photos.
I tried to give the b/ground some depth, cropped the frame, and added a border in black. Hope you like it.
- Copyright: Bahram Mehr (mehr) (1360)
- Genre: Places
- Medium: Color
- Date Taken: 2004-08-18
- Categories: Daily Life
- More Photo Info: view
- Photo Version: Original Version, Workshop
- Edited by: JEAN PAUL (japiey) (10163)
- Edited Image Upload Date: 2007-04-24 18:47
- Date Submitted: 2006-12-03 12:56 | s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218190295.65/warc/CC-MAIN-20170322212950-00075-ip-10-233-31-227.ec2.internal.warc.gz | CC-MAIN-2017-13 | 475 | 12 |
https://meta.serverfault.com/users/97616/vindicated-halcyon | code | awaiting some sense
Top network posts
- 72 Can I export a variable to the environment from a Bash script without sourcing it?
- 62 How to gzip all files in all sub-directories into one compressed file in bash
- 43 bash command to convert html page to a text file
- 20 "Incorrect string value" when trying to insert UTF-8 into MySQL via JDBC?
- 10 Check if checkbox is checked with jQuery
- 8 How to use Expect inside a Bash script
- 7 Organize code in unix bash scripting
- View more network posts →
This user doesn’t have any gold badges yet.
This user doesn’t have any silver badges yet.
Keeping a low profile.
This user hasn't posted yet. | s3://commoncrawl/crawl-data/CC-MAIN-2021-39/segments/1631780057366.40/warc/CC-MAIN-20210922132653-20210922162653-00255.warc.gz | CC-MAIN-2021-39 | 647 | 14 |
https://www.my.freelancer.com/projects/php-ajax/wanted-steady-php-coder-for/ | code | WANTED: Steady PHP Coder for a Los Angeles Web Designer
I am a designer looking to outsource coding end of my design jobs. If we work together, it will be for the longterm, because I have many projects already lined up, and my current coders are too busy. I need a capable and reliable coder that is great at slicing psd's into tableless css, looking for people who can match my PSD in alignment, padding, styles, etc exactly to the pixel. Coder will need to be very clean and organized with coding and css. The winning candidate will need to meet the following requirements:
expert knowledge of
- tableless css
- PHP & SQL knowledge
- experience in jquery & mootools AJAX
- must be deadline driven!
- please provide me ONLY 5 samples of your best work - I am dustinbd on gmail
- Long lists and AUTOMATED REPLIES WILL BE IGNORED.
10 pekerja bebas membida secara purata $1990 untuk pekerjaan ini
I am an experienced application programmer. As I have developed fully customized database driven applications in php, you can view my work once we are in direct contact. Please see my profile. | s3://commoncrawl/crawl-data/CC-MAIN-2018-17/segments/1524125945222.55/warc/CC-MAIN-20180421125711-20180421145711-00611.warc.gz | CC-MAIN-2018-17 | 1,087 | 11 |
https://www.eurecom.fr/en/publication/6693 | code | Web tracking has evolved to become a norm on the Internet. As a matter of fact, the web tracking market has grown to raise billions of dollars. Privacy cautious web practitioners and researchers extensively studied the phenomenon proving how widespread this practice is, and providing effective solutions to give users the option of feeling private while freely surfing the web. However, because all those studies looked at this trend only from the trackers’ perspective, still there are a lot of unknowns regarding what the real impact of tracking is on real users. Our goal with this paper is to fill this gap in the web tracking topic. Thanks to logs of web browsing telemetry, we were able to look at this trend from the users’ eyes. Precisely, we measure how fast a user encounters trackers and research on options to reduce her privacy risk. Moreover, we also estimate the fraction of browsing histories that are known by trackers and discuss two tracking strategies to increase the existing knowledge about users.
When Sally met trackers: Web tracking from the users’ perspective
USENIX 2022, 31st USENIX Security Symposium, 10-12 August 2022, Boston, MA, USA
Copyright Usenix. Personal use of this material is permitted. The definitive version of this paper was published in USENIX 2022, 31st USENIX Security Symposium, 10-12 August 2022, Boston, MA, USA and is available at :
PERMALINK : https://www.eurecom.fr/publication/6693 | s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817438.43/warc/CC-MAIN-20240419141145-20240419171145-00823.warc.gz | CC-MAIN-2024-18 | 1,442 | 5 |
https://pme.uchicago.edu/de_pablo_lab/people/emre_sevgen/ | code | Crystallization-driven self-assembly can drive formation of supramolecular assemblies into fibrils and spherical micelles with applications in immunology and drug delivery. A better understanding of the interplay between polymer physics and chemistry and their influence on important parameters such as drug release profile, particle size, stability and transport/clearing can guide development of better nanoparticles. My project includes all-atom molecular dynamics to elucidate self-assembly mechanisms and kinetics, development of nanocarriers for cancer immunotherapeutics based on those results, and investigation of basic polymer physics of fibrillar micelles using both experimental methods such as extensional flow in microfluidics as well as computational results.
Emre is from Istanbul, Turkey. He got his bachelor's degree from the University of Illinois at Urbana-Champaign in 2013, where he studied chemical engineering, bioengineering and mathematics. He is currently pursuing a Ph.D in molecular engineering at the University of Chicago, co-advised by Prof. Juan de Pablo and Prof. Jeffrey Hubbell. | s3://commoncrawl/crawl-data/CC-MAIN-2019-39/segments/1568514573070.36/warc/CC-MAIN-20190917101137-20190917123137-00320.warc.gz | CC-MAIN-2019-39 | 1,114 | 2 |
http://stackoverflow.com/questions/3022498/svnignore-for-a-file-already-committed-in-subclipse | code | I am trying to ignore some files that I have already committed to the repository in subclipse
I followed this from Subclipse svn:ignore
You can't svn:ignore a file that is already commited to repository.
So you must:
- Delete it from the repository
- Recreate it in Eclipse
- Set svn:ignore on it via Team->Add to svn:ignore
I am still getting a greyed out menu when I select Team->Add to svn:ignore
- I deleted the folder I don't want from the repository
- I reverted the project Team->Revert (this is the bit I may have done wrong)
- selected Team->Add to svn:ignore but it is greyed out.
what do I need to do? | s3://commoncrawl/crawl-data/CC-MAIN-2016-30/segments/1469257825358.53/warc/CC-MAIN-20160723071025-00067-ip-10-185-27-174.ec2.internal.warc.gz | CC-MAIN-2016-30 | 612 | 12 |
http://www.societyofrobots.com/robotforum/index.php?topic=13056.0 | code | I am a new member to the forum and was surfing for my humanoid stuff.
I am working with a group of 4 students for the project.
The problems are:
1)Mechanical design,how to get a suitable design?
2)Are the components i have selected proper?
3)Is motor controller required for servos.
Other things will discuss progressively.
Here I'll share the specifications:
Size- 2ft (approx)
Weight- 10 kg
Body material -
Skeleton structure (like plates n rods) made of carbon fibre,PVC
and Aluminum Coverings on it.
Nos. of motors- 8
Type of motors- servo motor.
Application- Human bots,robust in construction with metallic gear.
Type- Atmel with minimum 56 pins
Arduino board with good design and Quality.
Gyro sensor(1 in no.)
G-sensor(7 in nos.)
6-axis sensor(7 in nos.)
H-Bridge( for 8 motors)
Can any one please help me for the components and is the torque requirement correct? | s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917122739.53/warc/CC-MAIN-20170423031202-00401-ip-10-145-167-34.ec2.internal.warc.gz | CC-MAIN-2017-17 | 870 | 23 |
http://new.empegbbs.com/ubbthreads.php/topics/372244/Re:_How_things_could_become_mo | code | Well, I've just spent the last 6 hours upgrading my MK2a from 16MB to 32MB. This must be the least productive hardware upgrade i've ever undertaken!
Now, I've been soldering things since the age of about 10 (I am currently 28), including some rather bizare mods involving surface mount components on NetStations (don't worry, probably only means something to Hugo, and even then not much), so I wouldn't consider myself a amateaur.
All I can say is that is is way more difficult than, say, replacing the surface mounted StrongArm chip.
The things that, IMO, make this hack difficult are:
a) that the legs on the memory chip are very fragile and very small and very hard to straighten. Even then, they are only just long enough and you have to get them all at exactly the right angle, which is just shy of 90 degrees
b) you definately need a high-strength freestanding magnifying glass. My eyesight is very good yet there is no way I would have been able to complete the work without a glass (I did try, before giving in).
c) The solder prefers to bridge adjacent pins than join the two chips if there is even the tinest gap between the bottom of the pins on the top chip and the top of the pins on the bottom chip. I would very strongly recommend the use of a no-clean flux pen. Maplin (code HH62) and RS sell them.
It would certianly be useful to have all the info in one place (took me an age to find everything I needed on the bbs) - I might look to start doing just that over the weekend if I get a chance, then ask Tony to update the FAQ.
I won't be doing another one of these in a hurry, and definately won't be trying for 48MB or 64MB using this method. Howerver, no broken pins and I do get:
Thanks to mlord, pgrzelak, Hugo, Stu and everyone else who helped to make this possible. | s3://commoncrawl/crawl-data/CC-MAIN-2020-34/segments/1596439738777.54/warc/CC-MAIN-20200811115957-20200811145957-00294.warc.gz | CC-MAIN-2020-34 | 1,788 | 10 |
https://airvpn.org/tags/Ubuntu%20Linux/ | code | Search the Community
Showing results for tags 'Ubuntu Linux'.
Found 1 result
Personally I'm using gufw for linux, and it works very well. However, it's important to remember that gufw is just a graphical frontend for ufw, and ufw, in turn, is just a friendlier system for manipulating IPTABLES (which is again a system for manipulating netfilter directly in the running kernel). Gufw is perhaps over simplified, which is why I find it not really that great for anything else than providing an overview of your rules and turning the firewall on an off. With regards to firestarter, I have tried it once, but I didn't really have any good experience with it, since, as you guys have already posted, it seems rather poorly coded and does some odd things when manipulating IPTABLES. What I found invaluable about ufw is its ability to specify rules based on interface and its simplictity even though its quite powerful. This was my main motivation for using it over other solutions like Firestarter, and Shorewall was too complicated for my taste. My rule approach goes like this: Allow connections OUT to AirVPN servers I use the most (for connecting/reconnecting to the AirVPN service, entry IP's, marked RED on the screenshot) Allow connections OUT FROM the tun0 interface TO anywhere (when I'm connected, this is the interface used to communicate to the Internet, marked GREEN on the screenshot) Allow connections (UDP/TCP) IN TO the tun0 interface to a specific port (to enable AirVPN's port forwarding feature, marked BLUE on the screeshot) Allow connections IN FROM the 192.168.1.0/24 network TO the eth0 interface (enable home networking. Notice how it's on a different interface, YELLOW) Allow connections OUT FROM the eth0 interface TO the 192.168.1.0/24 network (enable home networking, also on the eth0 interface, YELLOW) Block ALL other traffic (by choosing DENY/DENY in gufw) When the VPN drops (and the tun0 interface is disabled), the only connections allowed OUT from the computer are to the AirVPN server IP's (to reconnect) and the local 192.168.1.0/24 network (to still function in the LAN). And the only connections allowed TO the computer are from the local network as well. No leaks. Now, the gufw GUI doesn't allow for specifying the interface (remember, it's over simplified), so to do that, it's necessary to use ufw directly. Gufw can, however, display the rules when created by ufw. For example: "sudo allow out on tun0 from any to any" - is quite straightforward, and of course creates the rule that allows for communication TO the Internet when connected to AirVPN. "sudo allow in on tun0 from any to any port xxxxx" - enables the port forwarding feature by allowing packets to the specified port on the tun0 interface to pass through. Tips: - the order of the rules is very important - mimic mine on the screenshot attached - to add rules in a specific order from the command line, use "insert x": "sudo insert 3 allow in on tun0 from any to any port xxxxx" - inserts the rule at the 3rd position and moves rules below it downward, includin the previous rule nr 3. - when adding rules via the commandline, press F5 in gufw to force a refresh and view the newly added rule - the UFW manual is well worth reading, although you may not need any more information than offered in this post - with this approach, you're blocking multicasting addresses possibly forwarded by your router. Just a thing to have in mind in case you need it; it is of couse easily remedied by creating a new rule allowing the address(es). Let me know how this works for ya | s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446711344.13/warc/CC-MAIN-20221208150643-20221208180643-00672.warc.gz | CC-MAIN-2022-49 | 3,571 | 4 |
https://learn.microsoft.com/en-us/azure/defender-for-iot/organizations/how-to-work-with-alerts-on-premises-management-console?WT.mc_id=AZ-MVP-5003408 | code | View and manage alerts on the on-premises management console
Microsoft Defender for IoT alerts enhance your network security and operations with real-time details about events logged in your network. OT alerts are triggered when OT network sensors detect changes or suspicious activity in network traffic that needs your attention.
This article describes how to view Defender for IoT alerts on an on-premises management console, which aggregates alerts from all connected OT sensors. You can also view OT alerts on the Azure portal or an OT network sensor.
To have alerts on the on-premises management console, you must have an OT network sensor with alerts connected to your on-premises management console. For more information, see View and manage alerts on your OT sensor and Connect sensors to the on-premises management console.
To view alerts the on-premises management console, sign in as an Admin, Security Analyst, or Viewer user.
To manage alerts on the on-premises management console, sign in as an Admin or Security Analyst user. Management activities include acknowledging or muting an alert, depending on the alert type.
For more information, see On-premises users and roles for OT monitoring with Defender for IoT.
View alerts on the on-premises management console
Sign into the on-premises management console and select Alerts on the left-hand menu.
Alerts are shown in a simple table, showing the sensor that triggered the alert and alert details in two columns.
Select an alert row to expand its full details. For example:
In an expanded alert row, do any of the following to view more context about the alert:
On the on-premises management console, New alerts are called Unacknowledged, and Closed alerts are called Acknowledged. For more information, see Alert statuses and triaging options.
Filter the alerts displayed
At the top of the Alerts page, use the Free Search, Sites, Zones, Devices, and Sensors options to filter the alerts displayed by specific parameters, or to help locate a specific alert.
Acknowledged alerts aren't listed by default. Select Show Acknowledged Alerts to include them in the list.
Select Clear to remove all filters.
Manage alert status and triage alerts
Use the following options to manage alert status on your on-premises management console, depending on the alert type:
To acknowledge or unacknowledge an alert: In an expanded alert row, select ACKNOWLEDGE or UNACKNOWLEDGE as needed.
To mute or unmute an alert: In an expanded alert row, hover over the top of the row and select the Mute button or Unmute button as needed.
For more information, see Alert statuses and triaging options.
Export alerts to a CSV file
You may want to export a selection of alerts to a CSV file for offline sharing and reporting.
Sign into your on-premises management console and select the Alerts page.
Use the search and filter options to show only the alerts you want to export.
The CSV file is generated, and you're prompted to save it locally. | s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764499829.29/warc/CC-MAIN-20230130201044-20230130231044-00472.warc.gz | CC-MAIN-2023-06 | 2,982 | 27 |
http://www.phoronix.com/forums/showthread.php?72209-OUYA-A-99-Android-Linux-Game-Console/page12&p=276029 | code | 07-20-2012, 10:41 AM
Not really. I was simply riffing on ways to increasing distribution and value through partnerships. I could have just as easily said "Comcast, EA, Nvidia". CableCard is one piece of tech which AMD likely acquired during the ATI acquisition, and Nvidia (to my knowledge) does not.
Originally Posted by XorEaxEax
I've always believed that ATI/AMD could win the GPU wars tomorrow if they played their cards correctly and leveraged the full breadth of technology available to them. I also believe that it is likely AMD will likely lose due to mismanagement, missed opportunities, and lack of focus. It won't be due to poor engineering, it will be due to bad corp leadership.
07-20-2012, 05:38 PM
Couldn't have said that better.
Originally Posted by russofris
07-20-2012, 09:12 PM
Well, last two are not "toys" but a development tools. After playing enough with them you can go further and design your very own piece of hardware similar to those. Be it some automation or module, etc. In fact it allows to design a range of computer-like devices. Now even small startup or even individual devs could design their very own devices comparable to tablets/phones/some kinds of computers on their own. In fact, just a few years ago, dev. kit for things like that had much higher prices. In fact, beagleboard could be considered fairly cheap when it comes to dev tools.
Originally Posted by t.s.
You see, in the world of electronics only things manufactured in millions are cheap. Everything else is not. And things manufactured in millions are usually not well suited for development. For example they tend to lack schematic, PCB layout files and other documentation. So you can't just modify PCB and re-manufacture changed version of device should you need/want to do so for any reason. Sure, not everyone needs this. But it allows development of many customized devices relatively easily. | s3://commoncrawl/crawl-data/CC-MAIN-2015-18/segments/1429246633512.41/warc/CC-MAIN-20150417045713-00001-ip-10-235-10-82.ec2.internal.warc.gz | CC-MAIN-2015-18 | 1,901 | 11 |
http://forums.devx.com/showthread.php?139102-Help-on-URL-class-and-timeout&goto=nextnewest | code | creating a JDO object
I have set up mySQL. I am trying to run the example given in tutorial. When I create a JDO object with an existing database "mydb" (I have even tried it with the default database "test"), I get an exception:
Exception in thread "main" java.lang.NoClassDefFoundError: javax/transaction/Syn
The exceptions occurs at line:
JDO jdo = new JDO("mydb");
Does anyone know why am I getting this exception?
I'd appreciate all the help.
Top DevX Stories
Easy Web Services with SQL Server 2005 HTTP Endpoints
JavaOne 2005: Java Platform Roadmap Focuses on Ease of Development, Sun Focuses on the "Free" in F.O.S.S.
Wed Yourself to UML with the Power of Associations
Microsoft to Add AJAX Capabilities to ASP.NET
IBM's Cloudscape Versus MySQL | s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386163064915/warc/CC-MAIN-20131204131744-00054-ip-10-33-133-15.ec2.internal.warc.gz | CC-MAIN-2013-48 | 751 | 13 |
https://community.amd.com/thread/208616 | code | "Physically Based Rendering nvidia" and the first links point directly to nvidia's solution: iRay.
if you google
"Physically Based Rendering amd" you just get random articles on PBR and nothing that AMD has to offer - this despite the fact that AMD's ProRender (previously known as FireRender) offers that functionality.
Nvidia has been ahead of AMD in capturing this segment for a while now. They looked into the market for software that could benefit from iRay and pushed iRay towards them. For example Daz Studio from Daz3D.
This is a slide from 2015 from nvidia's GPU tech conference:
Here is the full presentation: http://on-demand.gputechconf.com/gtc/2015/presentation/S5536-Martin-Karl-LeFrancois.pdf
Basically they approached the Daz3D people and worked with them to develop an iRay solution (which supports nvidia GPU and CPU acceleration only) bundled free of charge.
Note that they are competing against LuxRender, which is a freeware PBR renderer made by a bunch of developers. But nvidia saw a huge market which could mean more sales of their graphics cards....
Can AMD also try to expand their ProRender technology to more software developers too?
|Application||AMD Support (ProRender)||Nvidia Support (Iray)|
|Autodesk 3ds Max||Yes||Yes|
|Cinema 3D||In progress?||Yes|
|Blender (Cycles)||In progress..||Yes (CUDA)|
AMD try to reach out to Daz Studios and more amateur rendering software developers too please. | s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600400228707.44/warc/CC-MAIN-20200925182046-20200925212046-00461.warc.gz | CC-MAIN-2020-40 | 1,424 | 14 |
http://ches-mapper.org/wiki/index.php/Tutorial_-_Structural_clustering_using_OpenBabel_fingerprints_-_v2 | code | Tutorial - Structural clustering using OpenBabel fingerprints - v2
- 1 Background
- 2 Requirement
- 3 CheS-Mapper Wizard Settings
- 4 CheS-Mapper Viewer
You will use CheS-Mapper to cluster a dataset according to structural properties of the compounds.
The dataset consists of 467 COX-2 inhibitors, that have been tested for the selective inhibition of the human enzyme Cyclooxygenase-2 (COX-2) (see http://pubs.acs.org/doi/abs/10.1021/ci034143r). The experimentally derived activity of each compound is stored in the dataset as 'IC_50' value (half maximal inhibitory concentration). The inhibitors are structurally very similar, as they have to fit the active site of the COX-2 enzyme.
We will use MACCS keys for the 3D embedding, and investigate if there is a relationship between the structural properties encoded in the MACCS keys, and the activity.
To follow this tutorial in detail, you need to have Open Babel (Version ≥ v2.3) and R running on your machine. The tools are freely available for Linux, Windows and Mac, and can be installed in just a view minutes.
Without Open Babel / R: You can do this tutorial without Open Babel and R, but this will produce a slightly different embedding and clustering result.
CheS-Mapper Wizard Settings
Run CheS-Mapper to start the CheS-Mapper wizard.
- Step 1: Load Dataset To directly load the dataset into the application (without downloading the file first), press 'Open file' in the first wizard step and copy the dataset link into the text-field (http://opentox.informatik.uni-freiburg.de/ches-mapper/data/cox2.sdf).
- Step 2: Create 3D Structures The 3D structure generation can be skipped (Select 'No 3D Structure Generation'), as we have precomputed the 3D structures with OpenBabel.
- Step 3: Extract Features Double click on 'Match SMARTS Lists' within 'Structural Fragments', select the MACCS list, and hit the 'Add feature' button. Click on the 'Settings for fragments'-Link, and make sure that the min-frequency is set to 10 and Open Babel is selected. You can pre-compute the fragment matching by clicking the 'Load feature values' button: 97 fragments are found.
- Step 4: Cluster Dataset Click on 'Advanced >>' and select the 'Hierachical - Dynamic Tree Cut' method. As dissimilarity measure, select 'Tanimoto' similarity (which is appropriate for structural fragments as it ignores common non-matching fragments).
- Step 5: Embed into 3D Space Click on 'Advanced >>' and select the 'Sammon 3D Embedder' method. Again, as dissimilarity measure, select 'Tanimoto' similarity.
- Step 6: Align Compounds Select Maximum Common Subgraph Aligner.
Hit the 'Start mapping' button to start the viewer.
Without Open Babel / R: The MACCS features can be matched with CDK, for clustering and embedding use default settings in the '<< Simple' wizard view.
Investigate the cluster result
When the mapping process is finished, the viewer shows that there are 7 clusters of different sizes (39 - 110). Click on a cluster-compound to zoom into a cluster. Use the slider (at the bottom left) to decrease the compound size (move the handle to the left): the compounds will overlap less. Press the 'X' (next to the compound list at the top left) to zoom out again.
Select single compounds
Select All compounds in the cluster list (at the top left). This will enable single compound selection. When hovering the mouse over compounds, you can now select single compounds (instead of the entire cluster). Click a compound to zoom in. Hit the 'X' button twice to zoom out again.
Highlight structural fragments
The feature list (on the right side) shows the mean feature values of the compounds in the dataset. For example, the feature CSN does not match 208 compounds, and matches 208 compounds in the dataset. Click on the feature to highlight its values. Compounds that match this fragment will be highlighted in red. The SMARTS code of this fragment is shown above the chart in the bottom right ([#6]-[#16]-[#7]). It encodes a fragment of 3 Atoms (Carbon - Sulfur - Nitrogen; double click on the SMARTS code [#6]-[#16]-[#7] to open a visualization of this fragment using http://smartsview.de).
Select a single compound that matches this fragment (either by selecting a cluster first, or by selecting All compounds first, before clicking on the compound). You will note that the matching fragment is highlighted in orange. Enable Highlighting > Sphere highlighting to indicate the feature value with spheres instead of changing the atom color.
Determine important feature values for a cluster
Select an arbitrary cluster. You will note that the features list at the right changes its ordering. The most important features for each cluster are at the top, in order to aid finding out the most specific features for a cluster (details). In the example below, all compounds in cluster 3 match the top fragment (in the feature list for this cluster), but most compounds in the overall dataset do not match this fragment.
Edit > superimpose compounds will move compounds within each cluster to the same position in 3D space (to the center of each cluster). As these compounds are aligned according to common substructures, they are 'overlayed' based on the maximum common fragment in each cluster. Select 'MCS' in the drop down menu on the bottom left to highlight the MCS.
Embedding stress and filtering
When zooming out to the entire dataset, the embedding quality is shown at the top right: it is 'moderate' with a Concordance Correlation Coefficient (CCC) of 0.64 (more on Embedding quality). This means, that the distance in the 3D-space does not perfectly resemble the Tanimoto distance for each compound pair. To inspect compounds with high embedding stress, click on '3D embedding' in the feature list (or select 'Embedding stress' in the drop down menu on the bottom left).
The most similar (based on feature values) compounds to a particular compound are nearby in 3D space, when a compound has low embedding stress. To identify the nearest neighbors of compounds with high embedding stress, select a compound and press 'Alt+D' (or: 'Edit > Distance to..'). This shows the Tanimoto distance of all other compounds to this compound.
You can filter the view, showing only a selection of compounds. Having the Tanimoto distance feature selected, click on 'All compounds' and select the first compound in the list while holding down the Control-key (this will prevent the viewer from zooming in). Holding down the 'Shift'-Key and selecting a compound below in the list, will select the multiple compound (the selected compound and its nearest neighbors). Now press the small filter icon next to the compound list, to remove all other compounds from the viewer. You can remove the filter by pressing the X-Button at the top left.
Select the feature 'IC50_mM'. As this feature is log-distributed (see chart at the bottom right), select Highlighting > Highlight colors... and enable log-highlighting. Also reverse the color gradient by pressing the '<->' button. Now active compounds (with low feature values) will be colored in red. Click on the blue 'high'-button and select a green color. Inactive compounds will be now be colored green. In order to get a better overview of the endpoint value distribution in the feature space select 'Dots' at the bottom left. You will note that the compounds are separated quite well in 3D space according to the endpoint value (even though this feature was not used for embedding). Moreover, the clusters differ largely in mean endpoint value as well (see mean IC50 values in the cluster list at the top left). This indicates that the selected structural fragments are correlated to the endpoint.
Computing activity cliffs
Activity cliffs are pairs of compounds that are similar based on the feature value, but dissimilar based on the endpoint values. You can compute mean SALI values here: Edit > Activity cliffs.. (use IC50_mM as endpoint, and compute the index based on the log-transformed values). A special case for this definition are compounds that have identical structural features. In this case, 61 cliffs are found. These cliffs include compounds that cannot be distinguished based on their features, but have different endpoint values. This indicates that not all of the structurally very similar Cox2-inhibitors cannot be distinguished with the MACCS keys, and that more features are required to better model the structure activity feature relationship. | s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376828018.77/warc/CC-MAIN-20181216234902-20181217020902-00159.warc.gz | CC-MAIN-2018-51 | 8,445 | 37 |
http://zerosauce.net/2011/11/28/im-not-dead-and-neither-is-this-blog/ | code | It seems like people often start blogs and are passionate about them at first but then something comes up and they post less and less until the blog disappears into oblivion. Eventually the poster realizes that they have abandoned their site and begin writing “content coming soon” posts. Well, this is not a post to inform you that content is coming soon. Instead, this is a post that will tell you why content is not here already.
Back in August I began my first real semester of graduate school at SIUC. I had started in the summer, but I was not taking any classes or doing serious research. In fact, I took a readings class which was a simple pass/fail course and I was in charge of recording two classes, three times a week for four total hours each day. Now that I have actually begun taking relevant courses and started getting into more serious research and academic activities (I just got back from the SC11 conference in Seattle) I am finding out what life is really like as a graduate student. Not to say that I am overburdened or unable to handle the material –quite the opposite– I am just not used to this environment and getting accustomed to it has taken some time.
My time is split between being a research and a teaching assistant. As an RA I usually research ways to implement code required for our research projects. I devote the rest of my time to my teaching assistant duties in which I am responsible for having office hours that students can attend for extra help in the course as well as grading any and all assignments the students receive. The grading is by far the most demanding of my responsibilities. Learning the material is not very difficult, especially since I have taken the course prior, but being a fair grader is! I cannot count the number of times I have had to recalculate grades just to make sure I am being fair to all the students.
In any case, this semester is nearly over (only two weeks of courses remain) and after that time I will return to semi-regular posting on this blog. I already have four nearly complete posts, they only need a few touch-ups and some extra content before I decide to publish them. | s3://commoncrawl/crawl-data/CC-MAIN-2015-06/segments/1422122328486.60/warc/CC-MAIN-20150124175848-00217-ip-10-180-212-252.ec2.internal.warc.gz | CC-MAIN-2015-06 | 2,163 | 4 |
https://lists.yoctoproject.org/g/yocto/message/11856 | code | lmsensors-apps builds, but not in final image?
I'm hoping someone can quickly spot my mistake. I'm attempting to use this recipe:
with my meta-intel/crownbay build under denzil 7.0.1.
I put the recipe in my layer, and added "lmsensors-apps" to my IMAGE_INSTALL_append in my layer's layer.conf.
The software builds, and I can see the files in tmp/work/crownbay-poky-linux/lmsensors-apps-3.3.2-r2.
But it doesn't make it into tmp/work/core-image-minimal-1.0-r0/rootfs or the .hddimage file. | s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656103947269.55/warc/CC-MAIN-20220701220150-20220702010150-00035.warc.gz | CC-MAIN-2022-27 | 488 | 6 |
https://www.noisebridge.net/index.php?title=Maker_Faire_2009&direction=next&oldid=4908 | code | Maker Faire 2009
Noisebridge is going to Maker Faire. whoop!
Please see below to volunteer for the Huge Hardware Hacking Area! -- please sign up for this separately.
Maker Faire is May 30 and 31 at the San Mateo County Expo Center. We have a table and should bring a ton of cool projects! We'll be able to get a bunch of passes, the exact number is not determined yet but will probably relate to how many people commit to coming.
If you want to come and spend some time at the table interacting with people, put your name here:
- Christie - Heading up SWARM, but will stop in for a bit.
- Eric Boyd
- Mark - Will be working the HAM booth both days, but plan on going to both Noisebridge areas to help out as well
- Peter Youngmeister
- Shannon Lee
Projects to bring (add yours!):
- LED sign. (I would like to make some nice-looking show-and-tell pictures and diagrams for the sign so we don't have to open it up. Let me know if you have experience doing this and want to help. -nils)
- a phone project
- Cyborg eyes-in-the-back-of-your-back vest
- Cyborg north-facing anklet
- Vague plans to make an audio-reactive noisebridge animation running on either a monitor on the table or perhaps projected on the wall, pending availability of hardware (I'll figure out what I need and then start asking) -steen
Huge Hardware Hacking Area
Also, Mitch is setting up a Huge Hardware Hacking area at the Maker Faire. There will be 40 solder stations where we will be teaching hundreds and hundreds of people to solder and make cool things. This is a mongo version of our own Circuit Hacking Mondays.
Lots of volunteers are needed to make this work. It is really fun to volunteer! Do a 4-hour shift, and you get a free pass for the entire weekend at the Faire. If you are interested in volunteering for the Huge Hardware Hacking Area, please add your name here:
- Gregg I emailed you about helping, just keep me in the loop!
- Slim - It's been a long time since I've taught anyone to solder, but I suspect that with a brief refresher I'd do just fine. However my electronics/circuitry knowledge is essentially zero at this point. So although I am a willing HHA volunteer, depending on your needs, I may be better suited to the main NB area. | s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100535.26/warc/CC-MAIN-20231204214708-20231205004708-00143.warc.gz | CC-MAIN-2023-50 | 2,228 | 21 |
https://robincourant.github.io/info/ | code | I am a PhD student in Computer Vision, affiliated with the VISTA team (previously GeoViC) at LIX, Ecole Polytechnique, under the supervision of Vicky Kalogeiton and Marc Christie. Previously, I was a research engineer in the VirtUs team at INRIA mentored by Marc Christie. I also completed an end-of-study internship in the VISTA team at LIX, supervised by Vicky Kalogeiton, Marc Christie, and Christophe Lino. I hold a Master’s in Mathematical and Computational Engineering from IMT Atlantique.
My research interests include computer vision, deep learning, and cinematography in two axes: extracting cinematic features and generating cinematic content.
|Dec 22, 2022||I attended to ICVSS 2023!|
|Dec 22, 2022||Honored that our paper received the best student honorable award at ACCC 2022!|
|Nov 1, 2022||I have started my PhD in the VISTA team at Ecole Polytechnique!|
|Nov 1, 2021||I have joined the VirtUs team at INRIA!|
|Oct 18, 2021||Happy that our paper received the best paper award at the CVEU ICCV-W 2021!|
- BluNF: Blueprint Neural FieldIn Proceedings of the IEEE/CVF International on Conference of Computer Vision (ICCV) Workshops, 2023
- JAWS: Just A Wild Shot for Cinematic Transfer in Neural Radiance FieldsIn Conference on Computer Vision and Pattern Recognition (CVPR), 2023
- Transformers and Visual TransformersIn Machine Learning for Brain Disorders, 2023
- FunnyNet: Audiovisual Learning of Funny Moments in VideosIn Asian Conference on Computer Vision (ACCV), 2022
- Smart Motion Trails for Animating in VRIn International Conference on Artificial Intelligence and Virtual Reality (AIVR), 2022
- High-level features for movie style understandingIn Conference on International Conference of Computer Vision Workshop for Creative Video Editing and Understanding (ICCV-W), 2021 | s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100575.30/warc/CC-MAIN-20231206000253-20231206030253-00553.warc.gz | CC-MAIN-2023-50 | 1,798 | 13 |
https://www.plantedtank.net/forums/8-general-planted-tank-discussion/669106-marble-tile-affect-ph.html | code | The vinegar test is pretty unreliable, and often gives false-negatives.
If it's actually marble (not ceramic with a marble pattern, granite, or something else), it will affect the pH. Maybe not quite as bad under the substrate, but marble is pretty much entirely carbonate. This dissolves into the water and raises your KH (maybe GH as well), and the carbonates react with any acids, and end up raising the pH of the water.
Slate is pretty reliable, people have used it for years, it's a silicate rock, so it won't affect water parameters, and it's relatively easy to drill (I've done it once with a regular high speed bit (that I never used again...)) | s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370518622.65/warc/CC-MAIN-20200403190006-20200403220006-00508.warc.gz | CC-MAIN-2020-16 | 652 | 3 |
https://www.geeksforgeeks.org/string-shrink_to_fit-function-in-cpp-stl/?ref=rp | code | string shrink_to_fit() function in C++ STL
The C++ Standard Template Library (STL) provides a variety of useful classes and functions for working with data structures, including the std::string class for manipulating strings. One of the features of the std::string class is the shrink_to_fit() function, which allows developers to reduce the amount of memory allocated for a string to the minimal amount needed to store its current contents.
When working with strings in C++, it is important to keep in mind that the std::string class is designed to be a dynamically resizable string. This means that the class may allocate more memory than is actually needed to store the string’s contents. The shrink_to_fit() function allows developers to reduce the amount of memory allocated for a string to the minimal amount needed to store its current contents. This can be useful in situations where memory usage is a concern, such as in resource-constrained environments or when working with large amounts of data.
It is important to note that shrink_to_fit() doesn’t guarantee that capacity will be reduced, it just request the reduction, but the implementation is free to ignore it.
Also, it’s worth noting that this function does not change the size of the string, only the capacity. The size will continue to reflect the number of characters in the string, while the capacity will be the amount of memory allocated for the string.
I recommend using namespace std; directive in C++ can be considered bad practice because it can lead to naming conflicts and make the code harder to read and understand.
Parameters: This function does not accept any parameters.
Return value: This function does not return anything.
The shrink_to_fit() function can be called on a string object using the dot notation. For example, the following code demonstrates how to use the shrink_to_fit() function to reduce the amount of memory allocated for a string:
String is: geeksforgeeks is best Size of the string is :21 After resizing string is: geeksforgeeks Capacity of the string is :21 New size of the string is :13 New capacity of the string is :13
Time complexity: O(N), N is length of string.
Auxiliary space: O(N), because string is immutable.
Please Login to comment... | s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296943483.86/warc/CC-MAIN-20230320114206-20230320144206-00715.warc.gz | CC-MAIN-2023-14 | 2,259 | 13 |
https://reds.heig-vd.ch/en/rad/projects/movable | code | MicrOscopic VisuAlization of BLood cElls for the Detection of Malaria and CD4+
- THOMA Yann
February 2014 -
Context and objectives
Early diagnostic based on Point of Care (POC) devices allow to more rapidly act on a patient, based on its illness, and they can be qualitative or quantitative. Within this context the MOVABLE project aimed at developing a quantitative POC system able to count infected and normal blood cells with optical methods. This vast goal was decomposed into two applications : quantification of CD4+ cells for the evaluation of an infection degree, and quantification of psalmodium infected cells for the detection of malaria. This initial goal was also to use smartphones for taking images, but the research allowed to conclude that such devices are not yet ready to supply images with a quality good enough for such detection.
The objective of the malaria subproject was to automatize the detection of infected blood cells by malaria and to estimate the ratio of infected cells to the total number of red blood cells. This ratio is an important indicator of how to treat the patient and current practice let a technician perform this analysis, with a very high error rate. As the evaluation of smartphones showed that the resulting images are not good enough for the size of plasmodium, the project exploited images previously acquired by the team of Dr. Guy Prod'Hom (CHUV).
The software developed at HEIG-VD is based on a supervised learning algorithm (KernelBoost, a generalization of AdaBoost). It exploits the knowledge of a pratician in order to learn what are the psalmodium infected cells so as to become more and more accurate. A graphical user interface has also been developed and offers the visualization of images and more specifically with the identification of the infected cells.
The next image shows the graphical user interface:
The final software set is a unique tool now available on github https://github.com/reds-heig/movable
with no equivalent.
Finally, the software is currently under clinical evaluation by the team of Dr. Guy Prod'Hom. It will allow to validate its potential in terms of clinical use. However it is clear that a certification process should be started as this software is a medical device. | s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510994.61/warc/CC-MAIN-20231002100910-20231002130910-00533.warc.gz | CC-MAIN-2023-40 | 2,257 | 11 |
http://alice-at-ubuntu.blogspot.com/2011/03/restore-ctrlaltbackspace-combination-to.html | code | * Get to the System->Preferences->Keyboard menu.
* Select the "Layouts" tab and click on the "Layout Options" button.
* Then select "Key sequence to kill the X server" and enable "Control + Alt + Backspace".
If this doesn't work (e.g. the option is unchecked but the key sequence still works), you can edit your /etc/X11/xorg.conf:
The DontZap option in the /etc/X11/xorg.conf file enables or disables the CTRL-ALT-BACKSPACE shortcut to restart the X-server. In previous Ubuntu releases, this shortcut was enabled by default, however this has changed with 9.04 "Jaunty", as a number of users have complained about accidentally restarting their X-Server, which results in a sudden, unexpected logout which brings to the logon screen.
You can install the dontzap package and use the command dontzap --disable, or you can manually edit your /etc/X11/xorg.conf,
sudo nano /etc/X11/xorg.conf
then type your password, press enter, and use the simple text editor to add a ServerFlags section like this to the start, end, or middle of the file (Ctrl+O to save file):
Option "DontZap" "false"
And then restart the Computer (or log out and back in) to apply the changes. The shortcut should be re-enabled now.
If you want to disable the shortcut, either delete the section (in Jaunty) or change it to this or add this:
Option "DontZap" "true"
And then restart the Computer (or log out and back in) to apply the changes. The shortcut should be disabled now. | s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917118707.23/warc/CC-MAIN-20170423031158-00393-ip-10-145-167-34.ec2.internal.warc.gz | CC-MAIN-2017-17 | 1,446 | 13 |
https://www.tekool.net/blog/2012/01/29/puremvc-employee-admin-demo-for-jquery-mobile/ | code | I started this project last year when jQuery Mobile was still in alpha stage. The first version of Employee Admin demo I made with alpha version of jQuery Mobile was interesting but not fully functional. I so have waited near a year to work on it again. Now that jQueryMobile is final and even passed version 1.0.1 few days ago it was worth it to try to finish the project completely. As recalled for my recent Employee Admin demo for jQuery (call it desktop so) that demo does not use a port of the PureMVC framework for jQuery Mobile. It is not necessary. The two are compatible but independent one from the other.
For those who do not yet know much how jQuery Mobile works, it is loaded in addition to the jQuery framework on a mobile HTML page. The library, once loaded render the HTML page (with some minor jQuery Mobile specific additions) to make it identical to any native mobile application. The framework supports a maximum mobile platforms.
All pages of a jQuery Mobile application must be hosted on a single HTML page. This is the so called jQuery Mobile multi-page template. Using address bar anchors, the framework is responsible to navigate between different pages of the application without changing the root HTML page hosting the application. For the demonstration I chose to only have two pages. One to manage the list of users, one to manage the form to enter data related to each user. In this demo, there is no dedicated page to manage user roles, it would have been ridiculous to make navigation so complex only to have a page hosting a panel when it can be made with a simple multiple select box.
Consequently there is no UserRoleMediator nor UserRole panel in this version of the Employee Admin demo, UserRoleMediator and UserRole does all the job here. Rest of the classes which are not UI related are still the exact same as in all others Employee Admin demos.
Also what is an important part for PureMVC developers, it means that the whole application is finally displayed in a single main view in a single context. jQuery Mobile is responsible for page display, which finally only consist in hiding all the pages but the one the user is on. The application in itself doesn't have to manage «complex» data transition between pages as it could have to be done in an Android app. Pages associated model/controller are the same and they could all communicate directly through PureMVC notifications system as we are used to in any PureMVC app.
The problem is that today jQuery Mobile does not expose any API to facilitate the handling of dynamic components like select menus. When it comes to feed select menus with data there is no method to do so. The method is to manually change <options /> HTML tags of the select menu and then refresh its content using a jQuery Mobile method. Then select menu is decorated with jQuery Mobile own tags. The reference to the component returned by the framework does not match what is seen but a reference to the original form component. The framework is supposed to maintain reltionship between original components and decorated one.
Here is how feeding a select menu with data works.
The original code from the list of departments:
<select id="department" tabindex="-1"> <option value="-1">Select department</option> <option value="0">Accounting</option> <option value="1">Sales</option> <option value="2">Plant</option> </select>
The code decorated with jQuery Mobile tags after page initialization:
<div class="ui-select"> <a href="#" role="button" id="department-button" aria-haspopup="true" aria-owns="department-menu" data-theme="c" class="ui-ui-btn btn-icon ui-btn-right-corner-all ui-ui-shadow-up btn-c"> <span class="ui-btn-inner ui-btn-corner-all"> <span class="ui-btn-text">Select department</span> <span class="ui-icon ui-icon-shadow"></span> </span> </a> <select id="department" tabindex="-1"> <option value="-1">Select department</option> <option value="0">Accounting</option> <option value="1">Sales</option> <option value="2">Plant</option> </select> </div>
To dynamically populate the list you have to re-write content of the <select /> tag and then ask jQuery Mobile to refresh its display using the refresh method.
Dynamic change of the list of departments data:
var department = $("#department").selectmenu(); department.html('<option value="-1">Select department</option>'); department.selectmenu('refresh');
The jQuery Mobile developers tell that version 2.0 of the framework will be oriented to smarter understanding of dynamic content for components forms and pages. But for now I had many problems using what was supposed to work reading documentation. I had to do something much more complicated than in the example above to manage initialization and refresh for the UserForm select menus. This said, what have been done by jQuery Mobile developers is already quite impressive and allow to work with ready for production mobile websites.
The project uses:
- objs for the definition of classes, inheritance and namespaces
- jQuery for communication with the DOM
- jQuery Mobile for rendering, navigation and forms
- YUIcompressor and ANT to minify generated application files
Live demo, sources
Of course, let me know if it doesn't work on any of the mobile platform you use. It all has been tested on an Android 2.2 mobile. | s3://commoncrawl/crawl-data/CC-MAIN-2017-51/segments/1512948517917.20/warc/CC-MAIN-20171212192750-20171212212750-00158.warc.gz | CC-MAIN-2017-51 | 5,311 | 22 |
https://www.northantslive.news/rss-feeds/ | code | You can access any RSS feeds for Northants Live by placing ?service=rss after any section URL.
For example if you go to www.northantslive.news/news and add ?service=rss to make https://northantslive.news/news/?service=rss you can see the RSS feed
Here's some ready made ones:
Whole site - https://northantslive.news/?service=rss
News - https://northantslive.news/news/?service=rss
Sport - https://northantslive.news/sport/?service=rss
What's On - https://northantslive.news/whats-on/?service=rss | s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510100.47/warc/CC-MAIN-20230925215547-20230926005547-00769.warc.gz | CC-MAIN-2023-40 | 495 | 7 |
http://qcad.org/rsforum/viewtopic.php?f=33&t=2017&p=6383 | code | Yes I think you are right, I can see it peaking sometimes and rarely up at 50%, but generally for woking around 10-20%, 4% memory.
So was looking a bit further and think its the video rendering. Today the machine (being my laptop and undocked) at 1366x768 res seems to be better than when its plugged to external VGA (1920 res). It especially noticable when you select edit text (ie a large redraw), I have typed 3 4 chars before the box even can appear and misses those chars.
Click the edit tool today and I can count to 2sec before the new toolbar is there.
Messed around with Libre office and thats quick, so do not think its machine. Video acceleration is working fine, glxgears etc.
Its not a big deal, but it does seem less responsive than Qcad2.2, you have to set your mind to pause between each click and generally feels less productive.
Switch away from QCAD > Another App > QCAD > choose Edit tool = 6sec
Stay in Qcad choose edit tool =- 2-3sec, backup, select Edit tool again and its still 2-3 sec. | s3://commoncrawl/crawl-data/CC-MAIN-2016-36/segments/1471982295854.33/warc/CC-MAIN-20160823195815-00160-ip-10-153-172-175.ec2.internal.warc.gz | CC-MAIN-2016-36 | 1,010 | 7 |
https://2dcurves.com/polynomial/polynomialg.html | code | ||last updated: 2004-01-28
Some polynomials are defined inside an expression, e.g. inside an series with infinite
The Bernoulli polynomials (Bi) are used in some formulae that relate a
series and a integral. Some slowly converging series can be written as an (easy to solve)
The Euler polynomials (Ei) are used to clarify phenomena of some
alternating series 1).
1) Temme 1990 p.13. | s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446710712.51/warc/CC-MAIN-20221129232448-20221130022448-00859.warc.gz | CC-MAIN-2022-49 | 382 | 7 |
https://forum.inductiveautomation.com/t/modbus-dl06-tmra-timer-accumulator/56291 | code | In DL06 when using TMRA instruction the Accumulator value is stored at TA# and is a double word BCD value. Can anyone tell me how to configure the Modbus driver to read this location properly so that I can display the decimal value of the Timers accumulator?
…likewise, how to configure the V# memory location for the preset value, so that I can enter it as decimal on the screen with an implied decimal?
Think you are going to need to use actual modbus addressing. I think the type you want is HRBCD_32, but you will need to know the register number for the first holding register. I have some Schneider plc’s that use topological addressing when programming, but in ignition i have to use modbus addressing.
The DL06 manual shows holding registers are from 768 to 3839, so your ignition tag would be something like
[device_name]1HRBCD_32768 where the 1 being the device ID (If you device id is 1, that is the default and you can omit it.) and 768 being the first holding register of you double word. Similarly your preset value, assuming it is a single word would be something like
The DL06 modbus addressing says something about Timer input registers are on addresses 0 through 127, so you may need to use
[device_name]1IRBCD_320 instead. Also your device setup in ignition will need to use zero based addressing.
A decimal representation used in Modbus typically comes in 2 words of 2 bytes each.
You must refer to your device manual to understand how data should be read. A typical case is BCD conversion, but I’ve seen a lot of devices that lets you read data as INT (32 bits) and then you must apply a mathematical operation over it: example divide by 100.
If read with BCD, don’t worry, Ignition will write in BCD doing the conversion behind scenes.
See the numerical scaling options for OPC tags.
Yes, applying Scaling in Tag Configurations**
AutomationDirect has a spreadsheet that will calculate the Modbus addresses for various DirectLogic memory registers. It’s available here: AutomationDirect Technical Support - Technical and Application Notes It’s listed as ‘AN-MISC-010’.
For TMRA0, for example, the Modbus address would be 6145. In Ignition, that would be [devicename]HRBCD_326145.
Also note that the ‘Reverse Word Order’ check box needs to be checked in the driver page. | s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446711013.11/warc/CC-MAIN-20221205064509-20221205094509-00207.warc.gz | CC-MAIN-2022-49 | 2,310 | 15 |
https://www.diabloii.net/forums/threads/on-mephisto-and-azurewrath.139019/ | code | On Mephisto and Azurewrath Azurewrath Phase Blade One-Hand Damage: 102 to 115 Required Dexterity: 136 Required Strength: 25 Required Level: 85 Sword Class - Fastest Attack Speed Indestructible Item Version: 1.10 Expansion Item Level: 87 Fingerprint: 0x6b58ee0a +9 to Strength +9 to Energy +9 to Dexterity +9 to Vitality +231% Enhanced Damage Adds 250-500 magic damage Adds 250-500 cold damage over 10 seconds +3 to Light Radius 30% Increased Attack Speed +1 to All Skill Levels Level 13 Sanctuary Aura When Equipped After losing my original map seed with my sorc /clicked on normal instead of hell/ , reloaded my .org backup ATMA file , checked the seed and used the command. Azurewrath fell from MEphisto. Item Level is obviously 87. Mephisto is lower. How ? Is this a side effect of the -seed command ? | s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376826842.56/warc/CC-MAIN-20181215083318-20181215105318-00478.warc.gz | CC-MAIN-2018-51 | 804 | 1 |
https://eventespresso.com/topic/is-there-a-maximum-limit-of-association-of-promotional-codes-to-events/ | code | Posted: November 8, 2018 at 1:27 am
We have an application that generates massive one-use codes applied to an event. We have to generate 15,000 promo codes with a 100% discount. We have put the ticket limit at 20,000.
We are generating 2000 codes in 2000, but when we pass the 8,000 discount codes associated with an event, we are prevented from editing the event.
If you delete the codes inserted in wp_esp_promotion, wp_esp_promotion_object, wp_esp_price, the editing and creation of events works perfectly.
Is there a maximum limit of association of promotional codes to events or can they be limitations of our hosting server?
We have another open incident with this problem, but we have redirected it here once we have seen the causes of the error.
In WP-Debug we get the following error:
[07-Nov-2018 19:11:54 UTC] PHP Warning: mysqli_query(): MySQL server has gone away in /home/salonesgqb/www/wp-includes/wp-db.php on line 1924
[07-Nov-2018 19:11:54 UTC] PHP Warning: mysqli_query(): Error reading result set’s header in /home/salonesgqb/www/wp-includes/wp-db.php on line 1924
In the logs of the server:
I attach the information of Health Check:
### WordPress ###
### Installation size ###
Uploads Directory: 6.52 GB
### Active Theme ###
Name: Januas | Shared By showthemes.com
### Active Plugins (36) ###
Akismet Anti-Spam: Version 4.0.8 by Automattic
### Inactive Plugins (8) ###
Duplicator: Version 1.2.52 by Snap Creek
### Media handling ###
Active editor: WP_Image_Editor_Imagick
### Server ###
Server architecture: Linux 4.14.19-ovh-vps-grsec-zfs-classid x86_64
### Database ###
### WordPress Constants ###
### Filesystem Permissions ###
The main WordPress directory: Writable
We don’t have limits on the number of promotions, with a ‘MySQL server has gone away’ error your likely hitting a limitation of your hosting, but that may also mean we need to alter something with our queries.
We’ll need to so do some digging into this, may I ask, how are you creating the promotion codes currently?
While creating or editing an Event, seems like the program is reading all promotions and prices. This makes the program more slow in time, while promotions are growing in number.
We have PHP script that make this inserts:
We read from another tables and insert the data as needed in those fields.
All help is appreciated.
It’s not reading promotions, but promotions create prices, and it does pull in all default prices, are you setting the
Can you send me the script so I can try and reproduce this locally?
Yep, that field is set to 1 automatically by default. Shall we set the field to 0?
Thats a module, and it adds to WordPress tools (to access when installed: Menu -> tools -> Codigos Masivos)
I paste the code here:
Yes, set that field to 0.
Promotion price objects are not ‘default prices’ and thats likely what is causing your problem as default prices are all pulled into the the event editor. It was never expected that a user would have 8,000+ default prices on an event (a default price would usually be asigned to a default ticket, meaning an event with 8,000 default tickets).
Side note, is there any reason your not using our models to create these objects?
Had you have used those to add the prices the default field would have automatically been set to 0. I’m going to create a ticket to investigate why that field defaults to 1 but I would still recommend switching the above to use the model system as it handles a lot of what you are doing automatically.
Thanks for all, it was really helpfull.
We have already made the change and it finally works fine. Thanks so much!
We didn’t really noticed that it exists. We will consider update our code for using your model system as u mentioned above to create codes. Thanks for suggestion!!
You’re most welcome, I’m glad that worked for you.
With regards to the models, I’d highly recommend looking into using them, the handle a lot of the background work for you so once you know how to use them its much easier to work with EE than rolling your own.
The support post ‘Is there a maximum limit of association of promotional codes to events?’ is closed to new replies.
Have a question about this support post? Create a new support post in our support forums and include a link to this existing support post so we can help you. | s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578526807.5/warc/CC-MAIN-20190418201429-20190418222517-00077.warc.gz | CC-MAIN-2019-18 | 4,328 | 50 |
https://www.lynda.com/After-Effects-tutorials/Idea-corner-two-Independent-slam/78545/79337-4.html?w=0 | code | Ready to watch this entire course?
Become a member and get unlimited access to the entire skills library of over 4,974 courses, including more Video and personalized recommendations.Start Your Free Trial Now
- View Offline
The After Effects Apprentice videos on lynda.com were created by Trish and Chris Meyer and are designed to be used on their own and as a companion to their book After Effects Apprentice. We are honored to host these tutorials in the lynda.com Online Training Library®.
- Understanding how keyframes work under the hood
- Controlling the Anchor Point to create more predictable animations
- Mastering the Graph Editor for the ultimate control over keyframes
- Animating parameters including motion paths
- Hand-drawing motion paths to simplify complex movements
- Applying and tweaking Motion Blur
- Using Hold keyframes
Skill Level Beginner
We'd like to leave you with one more idea corner to explore. Again, drawing upon and extending things you've learned earlier in this lesson. Now you might remember this animation from earlier on when we're playing around with hold keyframes. We used to hold keyframes to go ahead and slam the word Reject into various positions and poses and also use hold keyframes opacity to blink the frame that goes round the word Reject. Well, the fact that Reject came as one entire word, it did kind of limit what we can do with it. However, if we have any access or any control over how this file is created, we can make some requests such as hey, could you give me each character of that word Reject as a separate layer in Illustrator or Photoshop? Because if you do that, when I bring it into After Effects, I can animate each layer independently and create a really fun, complex slam-down animation.
Well, we've done that for you. Let's go ahead and import a layered version of this Reject. First, I am going to select the folder I want to import into. In this case, Idea Corner, and I go to File > Import > File. If you have exercise files that came with this lesson, go to Exercise Files > Sources and select Reject_split. That's with the character split onto their own layers inside Illustrator. I can ignore the Import As dialog for now, because I will get the second dialog where I decide how I'm going to import this layered file.
In this case, I want to import it as a Composition. A composition that contained each of those characters as their own layer. I get some choices about how those layers get cropped. Are they cropped based on the entire document size, or an each individual layer size? Quite often, I prefer the individual layers size. The reason is, if I crop down each character and the anchor point defaults to the center of each layer, chances are really strong that that anchor point is going to default to the middle of each of those characters, which is already going to make it much easier to animate.
So I pick Layer Size. I click OK and now I have two things. I have a comp called Reject_split, and I have a folder of each of those individual layers, R, E, J,E, C, T, and the frame. Let's go ahead and play around with this. Well, initially, when I import a layered file as a composition, the composition it creates is going to be the size of either the document size in Illustrator, or of the image itself. In this case, it's smaller than I want for true video image. That's okay.
You can edit the composition settings after the fact. I'll go to Composition Settings. Let's go back to that size we're working with, 640 x 480. I'm happy with the frame rate, remember that, and let's pick something shorter like 5 seconds for now, and the background color black is kind of boring actually. Let's go ahead and do something on white. That makes it pop a lot better. Click OK. I want to animate this down and let's go ahead and make it really exciting. I'm going to make it to slap down into positions on every three frames.
When you go ahead and set new keyframes or new poses, every certain number of frames, like every three frames, that's referred to as animating on threes. If you do it every two frames, it would be call animating on twos, et cetera. Okay, another piece of advice we've given you is sometimes your ending pose is a good place to put your first keyframe. Let's say I want to have one pose, two poses, third pose, fourth pose, and maybe a fifth pose there.
That's where I want to end up here. I'm going to select all of my layers by clicking on the first one, and then Shift+Clicking on the last one, the entire range will be selected. I'll type P to reveal their Position, Shift+S to reveal their Scale, and I could optionally animate the Rotation as well. But since I am going to have a lot going on these characters, I'm going to leave rotation out of it for now. Drag up my Timeline panel to see a bit more what's going on. Click on the animation stopwatch for one of these, Position, and just drag down the list with my mouse held down, and now I've set the keyframes for all those properties.
Life is good. Now let's have fun positioning each character. I'll go ahead and click off for now, so nobody is selected. Otherwise, I might move everybody at once. Go one, two, three frames earlier. Pick up the R. Go ahead and pick a new Scale value for him, like say around there, and he is looking fuzzy. Well, that's because the Continuous Rasterization switch did not default to being on. If this was a pixel-based layer, it'd always be fuzzy. But since it's an Illustrator file based on vectors, if I enable Continuous Rasterization, After Effects knows to render this file on-the-fly to always be sharp.
It's only works for things like fonts and other path-based objects. Click on that. Now it's sharper. Let's go ahead and do that for everybody. Click on 1, and drag down the list, until they are all selected. Great! They're all going to be sharp now. Let's go ahead and move E over to different pose say down here. This is random and I can always move these things later on. Let's go ahead and pick up the J. Fill up some space there with them. Became big and maybe they can crowd in little bit. Take the other E. You are getting the idea.
We're just kind of goofing around here, looking for some interesting balance, and also some surprises. Putting a few things you don't expect them to be, maybe even cut off a little bit. C, yeah, he is fine down here, just scrolling down, scaling. And finally T. Let's just scale him up in place to see what he looks like. Continues to fill some space over here. Scale him up a little.
And the frame, I think I'll have fun scaling him to different sizes as we slam down as well. So let's just try that for now for an alternate framing. Kind of like how that bridges through there, ties these together. Okay, one, two, three frames earlier by pressing Page Up. Pick some different poses. Move the R to an unexpected part of the frame. Scroll up to where I can see him. You notice that the default path is Auto Bezier. That's okay. When I turn it into a hold keyframe for Position, it's not going to matter. Scale him up to some bigger value like there.
Take this E. Cram him up into this corner, make him bigger. Take the J. Move him down here to fill this space up and you know just to randomize things, let's scale him down rather than up. We don't need to have everyone doing the same thing. We need some variety. Repetition with variation, it's one of the main principles of art. Okay, C. Oh, the C is going to be better over here. So let's put the C there, then pick up the J, and move him over there, like that.
All right! I'm sure you've got the idea by now. So there is no need to make you watch me create the rest of these keyframes in real-time. So let's zip ahead while I create the rest of these. If you're working along with me, go ahead and pause this video, create your own keyframes, and let's get back together, set the work area, and preview our work. I go to 20. Type N to set down on my work area. As you probably remember from the earlier lesson, if I just RAM Preview this, I just have a bunch of characters sliding around, and frankly, that's not horrible.
But I want to go for that slam animation. So I'll drag a marquee around all my keyframes, right-click on any one of them, and choose Toggle Hold Keyframe. Notice how all my motion paths drained out automatically, and now I got do-do-do, slamming into position. Remember, if I want to do something with the characters or whatever later on, I can convert these ending keyframes to linear and keyframe some other animation later on. Now in fact, I think I'm going to want to do that with my frame. Let's go ahead and hold down a Command on Mac, Ctrl on Windows.
Click on the keyframes to convert them to linear. Just for fun, I'm going to move the Current Time Indicator back there. Hold Shift so it snaps. Shift+R to add Rotation, and keyframe that too so things drift over time. Get down to this point. A little bit Rotation on the frame. Just to create something fun. Scale up a little bit. I could do more Rotation. Okay, there is my drift. As I drag my Current Time Indicator, I notice something funky is going on here.
The R is actually still animating. As I scroll up my Timeline, ha, I forgot to select them and make those hold keyframes. That was a mistake on my part. But sometimes you get happy accidents. So I'm going to leave like that for now, and see if I want to change him later on. Anyway, I'm going to go back to the home, time 0, start of my comp. I've got a kind of red mess here. It's kind of an abstract. But maybe I want some ways of seeing these things more clearly.
One way to help is lift a layer off of other layers behind it and get some space and distinction is to add a drop shadow to it. I'm going to my Effects & Presets panel and search for Drop Shadow. Double-click him and he'll be added to my layer. Now you see I've got some separation between my R layer and all of the other layers. I'm going to go ahead and scrub the Distance a little bit larger to get little bit more distance and a little bit Softness, because I like the organic feel. Before, after.
Now when I don't have very much softness, you'll see that I'm losing definition on the inside of the R, because my Drop Shadow is going this direction but I don't have anything casting back in the other direction to distinguish the hold on that R. If I increase my Softness, you'll see that this shadow spread so much, it gives me a little bit of definition in there as well. So go ahead and get a little bit of outline there. Once I have one shadow that I like, I can select it, Command+C or Ctrl+C to copy it, and paste it to the other layers.
I'll go ahead and select E through T by Shift+Clicking, and then do Command or Ctrl+V to paste the shadow to them all. Click off to deselect. That's pretty cool. I don't think I'll lost any of my charm either here. So let's go ahead and preview. That's kind of fun with that R moving around, and then I've got my whole frame moving in the background. Now this is a very busy animation, and frankly I'm kind of losing out what's happening to the frame behind stuff. So let's say we let these characters have their hero day and then after they've come down in position, go three frames later and then drag my outer frame to start then in time.
After all, the fun's happen with the other characters. To slide a layer in time, I click anywhere in the layer bar, start to dragging, and notice the keyframes come along with me. I can hold the Shift key to make it snap with the Current Time Indicator, just like I could snap keyframes. Now let's see how that looks. Drag my work area to add a little bit later, to encompass my entire animation, and preview. It's a nice rhythm. The rhythm kind of carries over from the characters to the frame.
I can start it a little bit earlier. Try that. Now it's getting lost. Or start it later since more of a surprise element. Preview. Yeah, just when I think I'm done, something fun happens with that frame. I am going to go ahead and select the Drop Shadow. I had one of other layers, paste it to the frame because it's looking lonely without it. That's little bit more cohesive. Finally, since I have this R sliding around, let's say we enable Motion Blur for that R just for laughs. Peview that.
This is one of those cases when I don't think Motion Blur helped. So I turn it off for that layer, preview again, and I got an alternate slam down, and actually that's fun. That's something that will hold the viewers attention more than once. That's something we try to create. It's something called an "again" animation. Once the animation is where a viewer watches something one time, they get it, and frankly, they're going to go to the fridge and get a sandwich the next time this is on TV. However, if you create something with complexity, and subtlety, and interest, you've created an again animation where someone wants to see it multiple times, and that adds more value for your client, be it a commercial or whatever.
Anyway, that's one idea of what to do with a layered version of this particular title. If you have exercise files, we've created another idea and stored it in Idea Corner > Idea2. Here is the folder of all the individual layers and here is the comp with an alternate idea. We encourage you to go try your ideas. We don't have the only solutions. This is art. Art is somewhat subjective. Experiment on your own.
Come up with your own look and above all have fun. | s3://commoncrawl/crawl-data/CC-MAIN-2016-36/segments/1471982958896.58/warc/CC-MAIN-20160823200918-00161-ip-10-153-172-175.ec2.internal.warc.gz | CC-MAIN-2016-36 | 13,488 | 36 |
http://stackoverflow.com/questions/5625173/good-introduction-to-the-berkeley-db-c-api-installed-on-os-x | code | I'm looking for a good introduction to the Berkeley db api that is installed on OS X. I have looked at this Oracle document: http://download.oracle.com/docs/cd/E17076_02/html/gsg/C/BerkeleyDB-Core-C-GSG.pdf
Which seems to be a newer version. I am not able to compile this and get the following error:
test.c:23: error: ‘DB_CREATE’ undeclared (first use in this function) test.c:23: error: (Each undeclared identifier is reported only once test.c:23: error: for each function it appears in.) test.c:26: error: ‘DB’ has no member named ‘open’ test.c:42: error: too many arguments to function ‘dbp->close’
AFAIK, the version installed on OS X is the old BSD licensed 1.85. | s3://commoncrawl/crawl-data/CC-MAIN-2014-10/segments/1394678683400/warc/CC-MAIN-20140313024443-00068-ip-10-183-142-35.ec2.internal.warc.gz | CC-MAIN-2014-10 | 685 | 4 |
http://www.okcareertech.org/about/state-agency/divisions/sdcs/resources/presentations/plone-system-requirements | code | Plone System Requirements
OS, Memory, Hardware.
Plone - Guts
What makes up Plone? Plone System Requirements
- Operating System
Plone Operating System
- Plone can run on almost any modern operating system.
- Typically installed on a Linux distribution ex: OpenSuSe
- Offically: XP or later, OSX 10.4 or later, Linux 2.6 or later.
Plone Memory Requirements
- Plone can run on as little as 200MB to 300MB according to their documentation.
- There is a direct correlation between the speed of the site and RAM. Ex: As the site grows in content, users, product etc more RAM will be required for caching.
- We have traditionally used 1-2GB of RAM for our production sites.
- A single processor is fine for small deployments.
- We have used a single dual core AMD 64 processor for years for production sites.
- Recently we have virtualized and continue to only allocate a single processor.
- The CPU utilization is generally very low.
Plone Hardware (cont.)
- Storage requirements will naturally vary by project.
- Careertech production CMS weighs in at 164GB
- Horizon CMS just 5GB
- Traditionally we have used single SATA 7200RPM drives. Very low cost and have done well, going on 5 years.
- Software dependencies, not an inclusive list:
- libjpeg, readline, zlib, libbz2, libxslt, libxml2, python, gcc
- Note: allow your package manager to get these for you | s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917124297.82/warc/CC-MAIN-20170423031204-00630-ip-10-145-167-34.ec2.internal.warc.gz | CC-MAIN-2017-17 | 1,353 | 25 |
https://www.freelancer.com.bd/projects/programming/ethereum-eth-smart-contract-make/ | code | i need a smart contract developer.
i need smart contract to send dividends who own an erc 20 token (we will call MS token) in his address
step one: snapshot of eth blockchain of MS token contract address (token contract address) excluding developer address.
step two: read how many eth is there in one specified ETH address (DEV ETH ADDRESS)
step tree: send (montly) ETH in proportionaly of token holded in our address.
snapshot of ETH blockchain of MS contract holder:
address A: 150 token
address B: 100 token
address C: 250 token
total 500 token
addres DEV: 1000 token (excluding from dividends)
address WALLET ETH: 1 eth
smart contract read that there are 500 token in pubblic address, 1000 token in DEV address, and 1 ETH IN WALLET
1) 40% of eth in wallet ETH will send in other wallet (if in ETH wallet there is 1 ETH, i need 0.4 ETH sended in other address)
2) 60% of eth in wallet ETH will divided who hold token,so:
address A (150 token 30% of total token) receive 0.18 ETH - fee
address B (100 token 20% of total token) receive 0.12 ETH - fee
address C ( 250 token 50% of total token) receive 0.30 ETH - fee
total sent to 40% address = 0.4 ETH - fee
total ETH send 0.6 ETH - fee
total ETH sended 1.00
i thinks is so clear.
payments will be made after developing smart contract. | s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376823236.2/warc/CC-MAIN-20181210013115-20181210034615-00421.warc.gz | CC-MAIN-2018-51 | 1,287 | 23 |
https://rt.cpan.org/Public/Bug/Display.html?id=14260 | code | |Subject:||HTML::Element's _xml_escape should be left to a filter that knows that the encodings involved are|
_xml_escape as applied by as_XML, called by Class::DBI::AsForm was causing data corruption during round tripping when unicode was involved. My workaround was to assign an empty sub to _xml_escape. My guess is that data was decoded as latin 1 or something by the browser (Despite meta http-equiv specifying utf-8, as well as the server agreeing with it WRT to the Content-Type header). This data was then sent back to the server, but it was unicode reinterpreted as latin 1, converted into unicode, so wide characters were made into accented narrow ones from the latin 1 space. Anyway, my point is that since HTML::Element has no control over where it's output data will be fed to eventually this should be an optional feature, that can be easily disabled or replaced, where another filter to replace unprintable characters can be applied to the string resulting from 'as_XML' by the output handler (for example a catalyst plugin, that hooks on output, or a special perl io mode). Ciao, and thanks! | s3://commoncrawl/crawl-data/CC-MAIN-2021-17/segments/1618038087714.38/warc/CC-MAIN-20210415160727-20210415190727-00465.warc.gz | CC-MAIN-2021-17 | 1,107 | 2 |
https://www.motobit.com/help/asp-dictionary-object/cm410.htm | code | Sets and returns the comparison method for comparing string keys in the Dictionary object.
vCompareMode = Dictionary.CompareMode
Dictionary.CompareMode = vCompareMode
CompareMethod - Compare method for Dictionary keys.
Dim D As New Multi.Dictionary D.CompareMode = BinaryCompare D("Martin") = 3812 D("Alex") = 2534 'OK, binary compare D.Add "MArtin", 1520 D.Add "MARtin", 1130 D.RemoveAll D.CompareMode = TextCompare D("Martin") = 3812 D("Alex") = 2534 'Err, Martin = MArtin D.Add "MArtin", 1520 D.Add "MARtin", 1130
Free threaded dictionary object. Lets you work with unique/non-unique keys, any VARIANT values and connect to other dictionary in the same process.
Dictionary is a COM class specially designed as a free-threaded dictionary in Application scope of ASP/ASP.Net pages. It also works with script other engines in VB Script and JScript (ASP,ASP.Net, WSH, CHM, HTA), VB Net, Visual basic (VBA - VB 5, VB 6, Word, Excel, Access, …), C#, J#, C++, ASP, ASP.Net, Delphi and with T-SQL OLE functions - see Use ByteArray object article. You can also use the object in other programming environments with COM support, such is PowerBuilder.
Source code for Dictionary is available within distribution license, please see License page for Multi Dictionary or License page for ASP file upload and ScriptUtilities.
Free-threaded (multithreaded) dictionary object. Lets you work with unique/non-unique keys in VBScript and JScript envinronment (share application/session variables in ASP) or any other programming language. You can share dictionary variables between processes or computers, you can save or restore dictionary variables to a disk, work with keys using regular expression and more.
© 1996 - 2009 Antonin Foller, Motobit Software | About, Contacts | e-mail: [email protected] | s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506027.39/warc/CC-MAIN-20230921105806-20230921135806-00061.warc.gz | CC-MAIN-2023-40 | 1,791 | 10 |
https://neurips.cc/virtual/2023/poster/72183 | code | The Gaussianity assumption has been consistently criticized as a main limitation of the Variational Autoencoder (VAE) despite its efficiency in computational modeling. In this paper, we propose a new approach that expands the model capacity (i.e., expressive power of distributional family) without sacrificing the computational advantages of the VAE framework. Our VAE model's decoder is composed of an infinite mixture of asymmetric Laplace distribution, which possesses general distribution fitting capabilities for continuous variables. Our model is represented by a special form of a nonparametric M-estimator for estimating general quantile functions, and we theoretically establish the relevance between the proposed model and quantile estimation. We apply the proposed model to synthetic data generation, and particularly, our model demonstrates superiority in easily adjusting the level of data privacy. | s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474784.33/warc/CC-MAIN-20240229035411-20240229065411-00590.warc.gz | CC-MAIN-2024-10 | 912 | 1 |
http://eab.abime.net/showpost.php?p=1016036&postcount=33 | code | Originally Posted by Cylon
Yeah, that makes perfect sense: Not storing the aplha channel in an IFF chunk while PNG uses the very same chunk mechanism but instead creating an additional file in a non-common format with probably bigger file size.
It makes a lot more sense then storing the alpha channel in an IFF chunk that not a single program can (and likely never will) use. Furthermore, I suggested it as an option
, so that the alpha channel can obtained as an 8bit gray scale BMP (easy file format, easy to use), and is not simply lost (and also the original 24bit color data).
BMP is of course very common in that it can be read by just about every image processing software in existence. This includes 8bit per pixel palette and gray scale images. BMP is anything but uncommon.
So, yes, it makes perfect sense. Whether or not jsr wants to implement it or not, is up to jsr. | s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988721555.36/warc/CC-MAIN-20161020183841-00218-ip-10-171-6-4.ec2.internal.warc.gz | CC-MAIN-2016-44 | 880 | 6 |
https://www.excelforum.com/word-formatting-and-general/1260239-how-do-i-add-file-name-characters-to-dictionary.html | code | I'm working on a user guide which contains a ton of file and folder names with an underscore ( _ ) or path with \.
For example, file_name_sample.dat or C:\FolderA\FolderB\filename.xlsx. Or worse, C:\FolderA\FolderB\file_name_here.xlsx
How do I add these to the dictionary so every single one isn't highlighted in spell check? I tried adding *_* but it didn't work.
Your help would be greatly appreciated! | s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446711121.31/warc/CC-MAIN-20221206225143-20221207015143-00299.warc.gz | CC-MAIN-2022-49 | 404 | 4 |
https://bitbucket.org/rude/love/issues/506/constructors-accepting-all-possible-types | code | Constructors accepting all possible types
I think it would be nice if constructors could accept all types which can be converted to something which the constructor can use. Here's a list of things that constructors could but don't yet accept:
- Image - FileData
- SpriteBatch - Filename, File, ImageData, FileData
- ParticleSystem - Filename, File, ImageData, FileData
- Source - FileData
- SoundData - FileData
Edit: I've thought of one reason why this might not be so good for ParticleSystems, and theoretically SpriteBatches too. ParticleSystems could be created quite often, and I assume using an already created Image is much faster and uses less memory than constructing it with a filename/File/ImageData/FileData and having to create a new image every time. SpriteBatches would also have the same problem, but I imagine they'd generally be created much less frequently. | s3://commoncrawl/crawl-data/CC-MAIN-2017-39/segments/1505818689823.92/warc/CC-MAIN-20170924010628-20170924030628-00651.warc.gz | CC-MAIN-2017-39 | 876 | 8 |
https://volantec.biz/programming-languages/what-are-the-best-programming-languages/ | code | Programmer is one of the most demanded and highly paid professions. The choice of a programming language is important at the stage of training, the choice of an IT profession, the industry in which you want to work, at the stage of creating a program! What language should you choose to transform the task at hand into a finished program?
Go is often compared to C++ when it comes to low-level programming and implementations that require faster processing, such as Graphical User Interfaces (GUIs). In fact, many claim that Go is superior to C++ in terms of its concurrency and ease of use. Most graphical application toolkits, though, are still written using C or C++, and so they don’t enjoy the benefits of using a modern programming language such as Go.
The programming language affects the speed of creating a program, the speed of testing, the ability to port to other platforms and quickly make changes, the speed of the final product. It should be said that there is no ideal language. Quite often, beginners ask themselves which language is the most popular? How are the popularity ratings of languages compiled and what does knowledge about the position of a particular programming language in them give us?
Rating rating strife
Ratings can be made by companies based on a variety of patiently collected data, they can reflect market trends, the popularity of programming languages or their prospects.
To analyze the popularity of languages, you can analyze the number of lines of code written in different languages and uploaded to GitHub, a platform for developers where many people store their projects. Obviously, in this case, we will not learn anything about the code of banking systems, automation systems of large companies and the amount of code written in them. It’s just that no big business will publish their projects to GitHub.
But there are ratings that are usually trusted, and the methodology for compiling the index is more or less objective. One such index is the TIOBE Index. TIOBE specializes in assessing and monitoring software quality. The company verifies over 1,056 million lines of code daily for its customers in real time around the world. By checking such a volume of code, TIOBE were able to create their own rating of the popularity of programming languages, which for 20 years has been telling us who comes first.
Several interesting trends can be seen in the published TIOBE Index for October 2020.
Table 1. TIOBE Index for October 2020
In the first place we see the C (C) language. Unexpected, isn’t it? Considering that the C language was developed in 1969-1973, its popularity in 2020 looks unlikely to say the least. Let’s see how its index has changed over the past 18 years.
Chart 1. TIOBE Index for October 2020, C (C) programming language
The graph clearly shows that the C (C) language experienced its rebirth in 2017 and broke into the first position. We’ll talk about why this is possible and sometimes happens with different languages later, but now let’s look at the trends in other programming languages.
What about the popular Python language?
From table 1, we learn that Python is already in third place in popularity and has come close to the Java language. Moreover, its popularity continues to grow.
Chart 2. TIOBE Index for October 2020, Python programming language (Python)
The growth rate of Python’s popularity leaves no doubt that in a few months it will be able to move to the second position, and possibly reach the first within a year.
Well, in order to compare the first three languages, of course I would like to look at Java.
Chart 3. October 2020 TIOBE Index, Java Programming Language (Java)
From the graph, we can assume that the language is going to decline, and very soon it is possible that Python will take its place, pushing it somewhere to the margins. However, it is not. Almost the entire banking sector is written in Java, the vast majority of the harsh Enterprice, the Android operating system and most mobile applications for it, the super popular Minecraft game and much, much more. It is impossible to supplant Java.
What do the ratings actually tell us?
It turns out that the ratings are not talking about the coolness of this or that language and not about the fact that you need to run and retrain everyone to the most popular one. These ratings can tell us about deeper processes taking place in IT.
1. Growth of the small and medium IT sector
Whenever we see the rise of simple programming languages that are relatively little used in harsh and large Enterprise programming, we realize that there is an active growth in small businesses around the world.
The fact is that Python, PHP and other relatively simple languages are often used in small and medium-sized projects, the number of which in percentage terms on the Internet is growing and will continue to grow even more.
At the same time, all large business began its automation a long time ago and reached its certain maximum and will continue to grow, but not so actively. It is this factor that leads to the fact that such languages as Java, C#, C ++ is slowing its growth.
2. Frequency of updates
Everyone knows that when a new version of the iPhone comes out, its popularity immediately takes off. Everyone is talking about him only, his photographs are spread across all billboards, bloggers show how to unpack it, and every student comes to his parents with the words “buy”, and new features become simply vital, and it’s not clear how we lived without them.
The same thing happens with programming languages. For example, Python is updated quite frequently. Some updates result in previous versions being no longer supported, for example when migrating from Python2 to Python3.
Therefore, new versions always lead to a surge in the popularity of this language, especially if the updated version contains useful features and does not support previous versions.
In the languages of the big three: Java, C / C ++, C #, it is difficult to imagine that a version will be released that does not support all the previous ones. After all, a ton of code was written on previous versions in large companies. Therefore, there is no surge in popularity during the update, but developers moving to new versions just start using new features of the language.
Therefore, the graph of the popularity of a programming language is often associated with its intensity of development and the paradigm of support for old versions.
3. The emergence of new directions in IT
How can the popularity of languages show us new milestones? Quite simply, if we see that a programming language has experienced its rebirth, then this suggests that a new application has been found for it. And this is an application in a field that is actively developing and growing.
How do ratings of languages affect the quality of a programmer’s life? Let’s look at the example of a programmer Boris (the name has been changed, since we care about his case, not Boris himself). He works for a large company and develops in the Swift programming language. Writes mobile applications for iOS. The Swift language is not very popular. It is not included in the top three, five or even ten popular languages.
However, Boris has a well-equipped workplace, a salary of 290K rubles plus bonuses, a full social package, including a dentist, and a good perspective for development.
Why is that? There are simply not enough people like Boris on the market. After all, Boris was not originally a Switch programmer, he had fundamental knowledge of programming and created games in Python. With this knowledge, I mastered Swift in a few weeks and got a new job.
There are tens of thousands of people like Boris in various IT companies.
Hence the conclusion that it is not so important which programming language you are now starting to learn, whether it is growing in popularity Python or widespread Java, it is important that you can get fundamental knowledge + experience in creating real projects.
Have you always wanted to learn Python, but never quite known how to start?
More applications than we realize are being developed using Python because it is easy to learn, read, and write. You can now start learning the language quickly and effectively with the help of this interactive tutorial. | s3://commoncrawl/crawl-data/CC-MAIN-2021-21/segments/1620243991514.63/warc/CC-MAIN-20210518191530-20210518221530-00451.warc.gz | CC-MAIN-2021-21 | 8,322 | 40 |
https://www.codeproject.com/Articles/1548/CToolTipListCtrl-A-CListCtrl-derived-class-providi | code | upon a time, I felt the need to use CListCtrls to display (obviously
multi-column-line) mathematical matrices, most of which turned out to have
explicitly as individual cell elements entities with physical real-world
significance. This either meant that I should scorch for extra-space in my
already cluttered form view to accommodate the more explicit, although redundant,
data display, or try to find an ingenious alternative.
about commenting each cell/SubItem with tool/info tips? I immediately
remembered Matt Weagle's great article “Using
that referred to the matter of using info tips through
as stated by the MSDN documentation, there is no way of doing this method with
more granularity than to comment Items with info tips. I then thought about
searching CodeProject for tool tip implementations and prayed to find something
done on ListCtrl. Well, although I didn't find exactly what I was looking for,
I did discover a great article by Nate Maynard
(thanks! I owe you one! :) )
derived class providing per item tool tip support and thought “why not make my
first humble contribution to CodeProject?”.
here it is. Most of my class uses the ideas from Nate Maynard's article, so as to
avoid redundancy (ok: I confess! To avoid losing to much time… :) )
I will only address the
specifics in this article. Please refer to Mr Maynard's article for <a
href="http: www.codeproject.com="" useritems="" ctooltiptreectrl.asp"="">further insights
on the general issue.
it works (specifically for CListCtrls)
two major problems I had to deal with when planning my
CToolTipListCtrl were the
CListCtrl specific issues:
1. There are no handles for
SubItems, so I couldn't use
to map the ToolTip strings.
2. The right
to use for hit-testing the SubItems would be
SubItemHitTest, which, due to
would had to have its use be re-evaluated in that particular override…
for the first problem, I addressed it using
CMapStringToString with its
CString keys being formed by a
simple algorithm: (Item * 100 + SubItem). Not very elegant, but it does solve
the problem for list controls with less than 100 SubItems per Item (I hope that's
not your case… :) )
second was a little trickier (or at least it seemed so at first) but then I
stumbled through the
macro in MSDN which solved my problem.
only other thing you must be aware of is that the
CListCtrl masks differ from the
CTreeCtrl‘s on the prefix,
which in the earlier must be
I didn't have much time to override and overload as many base class members as
Nate Maynard, but the one's I did I hope (at least for me they did) will do the
job. They were
the other added functions do the same things as their
of course having their own adapted arguments and returns. They were
DeleteItem( int nItem )
virtual BOOL SetItemToolTipText( int nItem,
int nSubItem, LPCTSTR lpszToolTipText )
virtual CString GetItemToolTipText( int
nItem, int nSubItem )
last remark: I have added a
statement in the class' destructor so as to avoid memory leakages by not
you have it, and it works! But is this the end of it?
think not. You see, there are some unanswered questions. For example, check the
note I left on this code-snippet:
//Deal with UNICODE
if (pNMHDR->code == TTN_NEEDTEXTA)
lstrcpyn(pTTTA->szText, strTipText, 80);
_mbstowcsz(pTTTW->szText, strTipText, 80);
if (pNMHDR->code == TTN_NEEDTEXTA)
_wcstombsz(pTTTA->szText, strTipText, 80);
lstrcpyn(pTTTW->szText, strTipText, 80);
return FALSE; //We found a tool tip,
//tell the framework this message has been handled
// ****** Special note *****
// Still don't understand why the function must return FALSE for CListCtrl
// so as not to cause flickering, as opposed to Nate Maynard's derivation
// from CTreeCtrl.
// I have experimented with disabling Tooltips for the control
// and found out that a "ghost" tooltip appears for a fraction of a second...
// I am completely at a loss...
// Seems to work, though...
return FALSE; //We didn't handle the message,
//let the framework continue propagating the message
was I forced to return
override, even when the function did find the string? I would appreciate some
usual, “if you have any suggestions, find errors, or if you just find it
useful, please feel free to drop me a line”. | s3://commoncrawl/crawl-data/CC-MAIN-2020-50/segments/1606141180636.17/warc/CC-MAIN-20201125012933-20201125042933-00619.warc.gz | CC-MAIN-2020-50 | 4,231 | 85 |
http://infoz.ffzg.hr/INFuture/conference/conference-topics | code | Official language of the conference is English. Papers undergo international double blind peer review and are indexed in relevant databases.
Submitted papers should be related to one or more of the main topics of the Conference
1. Governmental and Business Sector Informatics (G&B)
2. e-Health Applications and Solutions (e-H)
3. Human-Computer Interaction and Language Technologies (HCI<)
4. Digitisation, Records Management and Digital Preservation (D-RM-DP)
5. Personal Digital Information Management (PDIM)
6. e-Science (eSCI)
7. Her.IT.age (HIT)
8. Community Informatics and Service-learning (CI-SL)
9. Integration of ICT in Education (ICT-E)
10. e-Encyclopaedia (e-E) - topic organised in association with The Miroslav Krleža Institute of Lexicography
Conference topics in detail
1. Governmental and Business Sector Informatics (G&B) - e-Services, Governmental e-solutions, G2B, G2C, B2B, B2C, Data security and integrity, Business continuity and disaster recovery techniques, Legal informatics, Implementation of new regulations: GDPR, e-IDAS, Human factor, Software reliability, Project management, Marketing and digital economy, Cloud solutions, Mobile applications, Web applications, Business intelligence, Business analytics, Big data, Internet of things, Data Mining and Knowledge Discovery, eDiscovery, User Data Analysis, Cryptocurrencies and disruptive technologies...
2. e-Health Applications and Solutions (e-H) - Medical image analysis and biomedical visualization, Computer-aided diagnosis, Telemedicine, Telehealth and remote monitoring...
3. Human-Computer Interaction and Language Technologies (HCI<) - Semantic web studies, Computational intelligence, Machine translation, Natural language processing, Assistive technologies, Ontologies, Machine learning...
4. Digitisation, Records Management and Digital Preservation (D-RM-DP) - Standards and methodologies in digitisation, Innovations in music recognition, OCR and ICR, Technological advancements of AV and 3D digitisation, Use of blockchain in records management, Records management solutions, Computer generated description, Crowdsourcing solutions for digital humanities, Evolving metadata standards, Metadata exchange and aggregation, PAIS and OAIS based solutions, Standardisation of SIPs, AIPs and DIPs, Long term preservation – new solutions for conversion, emulation, migration and virtualisation, Trust in digital records, Freedom of information, Data protection, Right to be forgotten...
5. Personal Digital Information Management (PDIM) - Management of information by individuals for their own personal use, Contemporary personal fonds and collections, Creation of virtual collections from material stored on various cloud and communication services, Virtual arrangement and archival description of electronic personal fonds...
6. e-Science (eSCI) - Methods, resources, research data creation, research data evaluation and research data management, Online collaboration, Developments in scientific publishing...
7. Her.IT.age (HIT) - Heritage and information and communications technology; Heritage and new technologies; Multimedia & mobile for heritage interpretation and presentation; Heritage, ICT & tourism; Heritage documentation...
8. Community Informatics and Service-learning (CI-SL) - Community-engaged learning & ICT, Community-based learning & ICT, Social media applications...
9. Integration of ICT in Education (ICT-E) - ICT integration in curricula, Teacher and student experiences, Integration of digitised heritage resources in education, ICT curriculum analysis, Innovative teaching solutions...
10. e-Encyclopaedia (e-E) - ICT-based lexicography & encyclopedistics, Knowledge organisation, Networking and dissemination, Open access online encyclopaedias and dictionaries, Integration of reference works in research, education and popularisation of science, Biographical data and reference works, Lexicography and encyclopaedistics as a component of digital humanities... (This topic is organised in cooperation with The Miroslav Krleža Institute of Lexicography)
We accept the following paper categories
Full paper (up to 10 pages)
Finished or consolidated R&D works, to be included in one of the Conference topics. These papers will be classified as one of the following categories: original scientific paper, review or professional paper.
Short paper (up to 5 pages)
Ongoing works with relevant preliminary results open to discussion. These papers will be classified as one of the following categories: preliminary communication or professional paper.
Case study (up to 6 pages)
Papers with focused research presenting in-depth and detailed investigation of a subject relevant to a Conference topic.
Project presentation (up to 6 pages)
Presentation of a project, project results, solutions, research problems etc., focused on a Conference topic.
Company paper (up to 4 pages)
Companies’ papers that show practical experience, R&D, tools, etc., focused on a Conference topic.
Tool demonstration paper (up to 4 pages)
Papers that demonstrate functionalities or possibilities of software and/or hardware solutions focused on a Conference topic.
Poster paper (up to 4 pages)
Initial work with relevant ideas, open to discussion. Poster should be displayed during the conference. | s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376824822.41/warc/CC-MAIN-20181213123823-20181213145323-00082.warc.gz | CC-MAIN-2018-51 | 5,288 | 38 |
https://socradar.io/top-10-threat-intelligence-browser-extensions-for-soc-analysts/ | code | Top 10 Threat Intelligence Browser Extensions for SOC Analysts
Browser extensions simplify several tasks. They are not limited to standard web surfing but may also be helpful for cybersecurity specialists.
It takes less time for security experts to research a website or online service, regardless of whether they are searching for possible security flaws or just doing a background check.
These are some of the most helpful browser extensions. We hand-picked extensions from various solutions to let you securely conduct threat intelligence investigations on the internet and extensions that may assist your research process.
Best Browser Extensions for Threat Intelligence
1- Pulsedive Threat Intelligence
Pulsedive Threat Intelligence may serve as an all-encompassing resource for security experts desiring comprehensive data collection about a website.
Unlike some other platforms, it includes user reports and threat intelligence feeds in addition to third-party services. Therefore, you have access to an extensive network for gathering information about a website for any purpose.
The insights include SSL certificates, WHOIS data, risks, technology, etc. It might thus replace several browser add-ons. You may find the material overwhelming as a user, but you may still explore it to acquire a sense of it.
2- Privacy Badger
The Privacy Badger is a browser extension created by the Electronic Frontier Foundation (EFF) that prevents advertising and third-party trackers from monitoring the websites you visit. When it recognizes marketers that follow you across many websites without your permission, it prevents them from injecting more material into your browser.
Remember that this is not a typical ad blocker since it was not designed to block advertisements entirely. It focuses on blocking any third-party scripts or images, visible or invisible, that seem to be monitoring your activity even though you have explicitly requested not to be tracked by providing a Do Not Track header. Because most of these third-party trackers are ads, most of them will be banned.
3- Fake news debunker by InVID & WeVerify
The Fake News Debunker tool lets you quickly obtain contextual information on Facebook, Twitter, and Youtube videos. It also allows performing reverse image searches on Google, Yandex, Bing, Tineye, Baidu, or Karma Decay (for Reddit) to fragment videos from various platforms (Facebook, Instagram, Youtube, Twitter, Daily Motion) into keyframes. Thus, you can enhance and explore keyframes and images through a magnifying lens and query Twitter more efficiently through time intervals and man-made.
Download: Fake news debunker by InVID & WeVerify for Chrome
Wappalyzer is a beneficial browser extension for identifying the technologies used to develop a website.
It can recognize the Content Management System (CMS), programming language, widgets, databases, Content Delivery Network (CDN), and script, among many other things.
With knowledge of the technology, a researcher may zero in on a specific feature while attempting to identify a problem with a website.
HackBar is an efficient tool for security experts. This application allows you to identify vulnerabilities on a website and assess its security measures. You will need to use Chrome’s developer tools to access it. If you’re interested, you can check this open-source project on GitHub.
Download: HackBar for Chrome
Sputnik is an OSINT tool to gather information and insights about a website. With accessible third-party service integrations, you may get the IP address, SSL certificate information (to test security), and other relevant data.
It saves you time by swiftly sending you to such services to get site-specific information.
7- Link Redirect Trace
Link Redirect Trace is a powerful tool for analyzing links whenever a website redirects.
When you click on a link, it links to other resources besides the website you’re attempting to access. You may get all the necessary information on these links using this tool.
It will tell you whether the links are secure, accessible (or broken) and provide further information on backlinks. Additionally, you may identify hidden redirection that certain websites may use for harmful purposes.
Mitaka is a web browser extension that may detect malware, determine the legitimacy of an email account, and determine whether a URL is related to anything suspicious. Manabu Nieski authored the work. After installation, suspicious text and indicators of compromise (IoC) may be selected and inspected through a range of search engines with a few mouse clicks.
This extension can:
- Extract and reformat IoC from a chosen text block.
- e.g. example[.]com to example.com, test[at]example.com to [email protected], hxxp:/example.com to http://example.com, etc.
- Search/scan it on many search engines.
- e.g. VirusTotal, urlscan.io, Censys, Shodan, etc.
9- User-Agent Switcher and Manager
This extension enables you to spoof your browser’s “user-agent” string with a custom identifier, preventing websites from learning specifics about your surfing configuration.
It also allows you to customize the sites you want to impersonate and deactivate normal surfing.
10- Open Port Check Tool
The Open Port Checker enables you to verify the port status of your external IP address or any other IP address you provide and search your connection for open ports. This tool is beneficial for determining if your port forwarding configuration is accurate and whether or not your server apps are blocked by a firewall. An open port checker may also be used as a port scanner to search your network for regularly used ports, such as HTTP (port 80). Some ports, such as port 25, may be closed by default and are often banned at the ISP level to avoid undesired activity.
Download: Open Port Check Tool for Chrome | s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947476452.25/warc/CC-MAIN-20240304133241-20240304163241-00383.warc.gz | CC-MAIN-2024-10 | 5,835 | 38 |
https://www.mnpals.org/islandora-8-learning-series/ | code | Since the PALS Islandora team is learning so much about Islandora 8, we decided to share our new knowledge in this blog series. We’ll introduce you to Islandora 8 and cover everything from Drupal nodes and taxonomies to Fedora architecture. Our goal is to highlight key aspects and features of Islandora 8 and the differences between Islandora 7 and 8. Throughout this series, we will be drawing heavily on the documentation from the Islandora GitHub repository and the main Islandora web site for inspiration.
- Islandora- more than software: Learn about the active and diverse community that implements and contributes to the project.
- Drupal: Drupal plays an expanded role in Islandora 8, so we’ll cover how different aspects of the platform are used within Islandora, including modules, entities, nodes, themes, views, blocks, users, roles, and taxonomies.
- Metadata: In Islandora 8 metadata is now stored in Drupal. This allows users to interact with metadata almost entirely using standard Drupal processes.
- Linked Data: We’ll dig into some basics of linked data and how they work within Islandora 8.
- Fedora: Fedora is a powerful backend repository that stores Islandora content.
- Microservices: These are small, specialized services that Islandora communicates with to provide services outside of Drupal. Microservices are used for such things as generating technical metadata, generating video and audio, and generating OCR (Optical Character Recognition).
- Solr: Solr is the search and discovery layer of Islandora, used for its speedy response time.
- Matomo: Matomo is a web analytics application that provides usage statistics and a rich dashboard for Islandora 8.
We know it sounds like a lot! Our goal is to break it all down into manageable, bite-sized chunks of information so by the time we migrate to Islandora 8 we’ll all be able to hit the ground running.
Fun Fact: Islandora was originally developed by the University of Prince Edward Island’s Robertson Library. Islandora is a portmanteau word made by combining Island + Fedora. | s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233511170.92/warc/CC-MAIN-20231003160453-20231003190453-00611.warc.gz | CC-MAIN-2023-40 | 2,068 | 11 |
https://forums.steinberg.net/t/strings-and-show-properites-for-guitar-notation/708181 | code | This may have been covered previously but it would be great to have the properties for Notes and Rests (Strings) located next to String Indicators (Show). Since I want to adjust both properties when I add a string indication on guitar, I have to scroll from far left to far right to adjust both properties. Thank you in advance.
See Properties Panel Active items
In your case type “str” in the search box of the properties panel.
Thank you very much. Your comment was very helpful. Your instructions make perfect sense but are not intuitive. I have a music and programming background and I would have never guessed that to isolate the needed properties, I would use a keyword or partial keyword to search/sort/edit the properties list. Thus, isolating the properties required. Now that I understand it, I’m sure I’ll use it all the time. Thanks again. | s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320304859.70/warc/CC-MAIN-20220125160159-20220125190159-00516.warc.gz | CC-MAIN-2022-05 | 859 | 4 |
http://vgmpf.com/Wiki/index.php?title=Hikoshi_Hashimoto | code | Hikoshi Hashimoto is a Japanese composer and sound designer who has composed music and sound for various game companies; mainly for Sega games such as SIMS. Ever since 1991 he has been a freelance musician.
To create music and sound on the SNES, Hikoshi programmed his own sound driver. He would then create MIDI files and converted them to his sound driver. He would take into account not to go over 8 channels. | s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600402101163.62/warc/CC-MAIN-20200930013009-20200930043009-00476.warc.gz | CC-MAIN-2020-40 | 412 | 2 |
https://stevenmurawski.com/powershell/2014/08/dealing-with-bad-behavior-in-a-community/ | code | It may come as no surprise, but I'm pretty active in a variety of technically focused communities. Most recently, I've become a Community Manager for Chef and joined the Board of Directors for LOPSA. I've been an active member of the PowerShell community for about as long as I've been in IT. I try to keep active in my local technical community.
There are a few things in these communities I've been silent on that continue to rear their ugly heads and if I don't address it, I'm just as guilty as those who perpetrated those action.
At Chef, I'm losing a co-worker due to the inability of some people to self-edit and behave in a civilized manner. In LOPSA, we lose people due to a level of hostility (towards women, towards conservatives, towards Christians, towards Windows administrators) present in the IRC chat rooms. In the PowerShell community, we are fractured and cliquish (and lacking a good bit of diversity).
Community is what binds us together
We seek out and become part of larger community to find a place we fit in, with people who have experiences or interests that mirror ours. Some of us stay quiet and lurk around the edges of the community, engaging only when we have to. Others are right out front, sharing their thoughts, opinions, and in the case of technical communities, code, scripts, projects, etc. Many are in the middle, we share occasionally and are quiet participants much of the time.
There will be disagreements
Because we've joined (explicitly or implicitly) a community around a particular subject, we are likely to have strong opinions about topics in that space. That is OK.
We can debate these opinions and we can criticize opinions. That is OK as well.
We can dislike people's personalities. That is natural and almost guaranteed in any community.
But when the disagreements turn personal or we act on dislike of a person, that's where the line is crossed.
So what? People argue all the time
When attacks turn personal, it can encourage them to leave the community, or at least silence them. When the attacks turn physical or to threats of physical violence, we cross into the realm of criminal behavior.
The diversity in opinions, approaches, and experiences is what gives a community its strength and potential. Efforts to minimize that threaten the existence and purpose of the community. It turns the community toxic.
How can we encourage good behavior
First, we can demand our communities have a code of conduct. At Chef, we have some community guidelines. LOPSA has an etiquette policy. PowerShell.org does not have one at this point in time, though after I post this, I'll be reaching out to them to formulate one. Having a code of conduct is a start. There also needs to be known consequences for violating those policies and a formal way to report violations (that is safe for reporters).
Second, know how to report violations of that code of conduct. Even if you aren't directly impacted, you are impacted by the dilution of your community. *Every act that seeks to silence or minimize members of your community is a direct attack on YOU. * You join a community to enhance and improve your quality of life. Efforts to undermine that community are directly impactful to you. People external to your community see these things happen and become less likely to participate in your community.
Third, model the good behavior. Don't engage in "joking" that belittles a person, gender, race, or operating system preference. Call out those that are, or if you don't feel comfortable doing that, use the reporting mechanism you identified as above. Or if you really don't feel comfortable, let me know, either via the contact form on my blog, a DM on twitter (@stevenmurawski), ping me on Skype (steven.murawski) or Google Hangouts (steven.murawski at gmail.com). I am happy to be your advocate. I want people to be welcome in my communities and I want those communities to be able to grow.
Fourth, demand that your organization follow up on these incidents and release as much detail as they publicly can. Transparency (as much as legally possible) is a boon to the community.
What are my communities doing?
I'm advocating for something similar at LOPSA and we are investigating ways to make our etiquette policy more visible and define what the punitive actions are.
As I mentioned above, I'll be reaching out to PowerShell.org to get this on their radar as well.
What are you going to do in your communities?Want more great reading? Check out my reading list! | s3://commoncrawl/crawl-data/CC-MAIN-2017-47/segments/1510934807146.16/warc/CC-MAIN-20171124070019-20171124090019-00602.warc.gz | CC-MAIN-2017-47 | 4,505 | 22 |
http://www.deepseanews.com/about/rr-helm/comment-page-1/ | code | RR Helm, aka Rebecca, is a Ph.D. candidate at Brown University, where she studies jelly development and evolution under the direction of Dr. Casey Dunn.
Rebecca has worked on projects ranging from biogeography to genomics, but her current and lasting love is a beautiful group of jellies, the stinging sea nettles, and its black sheep member the mauve stinger (Pelagia noctiluca), with its strange open ocean life cycle. Before joining DeepSeaNews, Rebecca was the captain and crew of JellyBiologist.com, where many a jelly tale may still be found.
When not “in the field” (aka the French Riviera) hunting for mauve stingers, you can find Rebecca plowing through data, camping in a desert, working for a safari company, or living in a Zen center. But the best place to look would probably be the local tea house, or any other shop that serves croissants. | s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218189092.35/warc/CC-MAIN-20170322212949-00260-ip-10-233-31-227.ec2.internal.warc.gz | CC-MAIN-2017-13 | 858 | 3 |
http://android.stackexchange.com/questions/tagged/mp3+2.3-gingerbread | code | Device: Huawei Ascend Y 200 Android: Gingerbread 2.3.6, not rooted. On my SD card, there is a folder called Audio which includes MP3 files (with English and Hindi Sub Folders). There are 134 music ...
I'm trying to download podcast MP3s to my phone so I can listen to them in my car. Ideally, I'd like to be able to Chrome-to-Phone them from my computer at home, and then choose to download and play ... | s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1408500826679.55/warc/CC-MAIN-20140820021346-00347-ip-10-180-136-8.ec2.internal.warc.gz | CC-MAIN-2014-35 | 403 | 2 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.