url
stringlengths
13
4.35k
tag
stringclasses
1 value
text
stringlengths
109
628k
file_path
stringlengths
109
155
dump
stringclasses
96 values
file_size_in_byte
int64
112
630k
line_count
int64
1
3.76k
https://gruan.wordpress.com/2013/07/19/a-paper-on-correction-of-meisei-radiosonde-humidity-data/
code
We have recently published the following paper. Sugidachi, T., and M. Fujiwara (2013), Correction of the stepwise change observed at 0C in Meisei RS2-91, RS-01G, and RS-06G radiosonde relative humidity profiles, Journal of the Meteorological Society of Japan, 91(3), 323-336, doi:10.2151/jmsj.2013-306.[link] In this study, we re-evaluated the dependence on temperature and humidity of the MEISEI relative humidity (RH) sensors using a climate chamber for -50 deg.C to +40 deg.C. We also evaluated the influence of temperature lag of the RH sensors during tropospheric ascent (the sensors are always slightly warmer than the ambient air because of the air temperature decrease with height). We propose a new temperature-dependence RH correction scheme for the recent MEISEI radiosondes. This should be applied to the past MEISEI sounding data in Japan, Indonesia, and at some other sites where the MEISEI radiosondes were used. In the paper, we followed the guidelines by Joint Committee for Guides in Metrology/Working Group 1 (JCGM/WG1) (2008) (“Evaluation of measurement data – Guide to the expression of uncertainty in measurement”) to estimate the measurement uncertainties associated with the chamber experiments.
s3://commoncrawl/crawl-data/CC-MAIN-2018-22/segments/1526794872114.89/warc/CC-MAIN-20180528072218-20180528092218-00093.warc.gz
CC-MAIN-2018-22
1,225
3
https://henneberke.wordpress.com/2006/08/19/august-books/
code
Swing Hacks: Tips & Tools for Building Killer GUI’s (amazon.co.uk) by Joshua Marinacci & Chris Adamson I only read the 2 first hacks till now, but I’m allreay making some experiences! 😛 I was very curious about this book. More about it later! Swing Hacks helps Java developers move beyond the basics of Swing, the graphical user interface (GUI) standard since Java 2. If you’re a Java developer looking to build enterprise applications with a first-class look and feel, Swing is definitely one skill you need to master. This latest title from O’Reilly is a reference to the cool stuff in Swing. It’s about the interesting things you learn over the years–creative, original, even weird hacks–the things that make you say, “I didn’t know you could even do that with Swing!” (…) Swing Second Edition (amazon.co.uk) by Matthew Robinson & Pavel Vorobiev Well, if I want to know Swing I need a Swing bible. 🙂 Written for the experienced Java developer, Swing provides an in-depth guide to getting the most out of Sun’s Swing/JFC user interface classes. Mixing real-world code examples and expert advice on advanced features, this book shows how to make use of this powerful library effectively within your own projects. (…)
s3://commoncrawl/crawl-data/CC-MAIN-2018-13/segments/1521257647146.41/warc/CC-MAIN-20180319194922-20180319214922-00516.warc.gz
CC-MAIN-2018-13
1,249
8
https://www.astrolox.com/2012/08/31/shavian-unicode-keyboard/
code
Back in 2007 I put together a Microsoft Windows keyboard layout for the Shavian alphabet. Unfortunately moments after published it on this site, I noticed a big problem with the encoding. So I took the download down until such a time as I could get around to rebuilding it. Five years later, it’s done! Yeah, I’m kinda busy, so if you’ve been waiting then I’m really sorry that it took so long. The Shavian alphabet is alternative alphabet for the English language which attempts to provide simple phonetic spelling of words. It was funded by George Bernard Shaw, giving rise to it occasionally being called the Shaw alphabet. As of April 2003, Shavian was added to the Unicode Standard at block U+10450–U+1047F in Plane 1 (Supplementary Multilingual). To be able to see the Unicode Shavian characters you need a suitable font installed. I’ve previously recommended the “ESL Shavian Unicode” by Ethan at http://www.30below.com/%7Eethanl/fonts.html – however the site appears to have been offline for sometime now. Thankfully there are many other good fonts available. My preference is Andagii by Mark Williamson. This font has been released under a copyleft license and looks excellent (see the below image for an example). I’ve included a copy on this site to make sure that it’s available for anyone downloading the keyboard layout. The keyboard layout available here allows you to input the Shavian Unicode characters with ease. Obviously you’ll want to be able to type using your normal layout as well as using the Shavian. So Windows allows you to switch between keyboard layouts using the Language Bar. Personally I think that they could have made it easier to use, but I’ve found it adequate once it was all setup on my computer (I have Windows 7 Ultimate). Please refer to Microsoft’s website(s) for help on using the language bar. Back before Unicode was common place and before Shavian was added to the Unicode standard, it was common to create font’s which contain Shavian characters in the positions where normal Latin characters should be. By design this approach creates a key mapping from Latin to Shavian. One such font was created by Ross DeMeyere, of DeMeyere Design Incorporated, and has some excellent companion documentation. So, I have simply followed his existing mapping of standard Latin keys to Shavian characters – which means that his documentation serves as excellent reference material for anyone wishing to type Shavian using my keyboard layout. Please download the documentation file from Ross DeMeyere’s website – due to the copyright notice I have not made this file available for download from this site, however I will do if the original goes offline permanently. However, please note the one exception being that I have placed the namer dot (·) on Shift + L because I wanted to keep the ability to type a forward slash (/). For reference the Shavian keyboard layout can viewed in the following images (click for higher resolutions). The first image shows the layout without any modifier keys, such as Shift, being pressed. The second image shows the layout as it can be used while the Shift key is pressed. The third image shows the layout as it can be used while the Alt Gr key (the right hand side Alt key) is pressed. Using caps lock results in all of the Shavian character key responding the same as if Shift was being held down, except for the switch between loll (𐑤) (L key) and namer dot (·) (shift + L key). Using Alt Gr results in standard Latin characters. It is also possible to use Shift + Alt Gr to type upper case Latin characters without having to switch keyboard layouts. The keyboard is configured for the English – United Kingdom language, which may be useful knowledge for you if you’re struggling to find the layout in the configuration menus. Enjoy! and any feedback is very welcome, of course. - Shavian Unicode Keyboard Layout Installer for Microsoft Windows by Astrolox (~ 600 KB) - Shavian Unicode True Type Font Andagii by Mark Williamson (~ 20 KB) - Ross DeMeyere’s Shavian reference documentation file (please visit source website, link above) (~ 270 KB)
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323585507.26/warc/CC-MAIN-20211022114748-20211022144748-00412.warc.gz
CC-MAIN-2021-43
4,166
14
http://jebyers.ecology.uga.edu/
code
James (Jeb) Byers Odum School of Ecology University of Georgia 140 E. Green St. Athens, GA 30602 Our lab's work on crab and oyster reef ecology was recently featured on Georgia Outdoors (our portion starts at minute 8:30) Photo Credit: Paul Gribben Marine community and population ecology; Biological invasions; Conservation biology have broad ecological research interests that involve the study of species interactions in nearshore, estuarine, and marsh environments. The majority of my research focuses on quantitatively measuring impacts of non-indigenous species on native biota in invaded marine communities. Interactions with non-native species are the second leading cause of endangerment and extinction of native species. Therefore I have sought to develop and implement new quantitative tools that 1) aid our understanding of how and when invading species will impact native systems and 2) help increase our ability to predict outcomes of future invasions. Some of my additional projects and interests include the study of: - Effects of parasites on communities and species - Physical-biological coupling in estuaries - Habitat modifying species and other ecosystem - Design and function of marine reserves - Development of biological indicators for detection of environmental perturbations - Biogeographic patterns in species' ranges I approach all of my projects with experimental manipulations and modeling, and in general, I am a strong proponent of incorporating quantitative approaches in ecological studies whenever possible. In many of my field experiments I have utilized molluscs as study organisms, because this phylum is well suited to experimental manipulation and typically associated with a wide range of digenetic parasites. My interests in ecology extend beyond those in which I am currently involved. I welcome graduate students with a strong work ethic who are eager to address ecological questions with quantitative rigor and innovation. I push students into developing strong, independent, creative ideas and I stress the importance of placing research into a broad context that is relevant to important ecological and conservation questions. Adjunct and Previous Affiliations: Affiliate Faculty, University of New Adjunct Faculty, Skidaway Institute of Oceanography Visiting Fellow (2007-08), University of Wollongong and University of Technology, Sydney, Australia Post-doctoral Fellow, Friday Harbor Laboratories, University Ph.D., University of California, Santa Barbara - Byers, J. E. 1999. The distribution of an introduced mollusc and its role in the long-term demise of a native confamilial species. Biological Invasions 1(4): - Parker, I., D. Simberloff, M. Lonsdale, K. Goodell, M. Wonham, P. Kareiva, M. Williamson, B. Von Holle, P. Moyle, J. E. Byers, L. Goldwasser. 1999. Impact: toward a framework for understanding the ecological effects of invaders. Biological Invasions 1(1): 3-19 pdf - Byers, J. E. 2000. Competition between two estuarine snails: implications for invasions of exotic species. Ecology 81(5): 1225-1239 pdf - Byers, J. E. 2000. Effects of body size and resource availability on dispersal in a native and a non-native estuarine snail. Journal of Experimental Marine Biology and Ecology 248(2): 133-150 pdf - Byers, J. E. 2000. Differential susceptibility to hypoxia aids estuarine invasion. Marine Ecology Progress Series 203: 123-132 pdf - Byers, J. E. and L. Goldwasser. 2001. Exposing the mechanism and timing of impact of non-indigenous species on native species. Ecology 82(5): 1330-1343 pdf - Lenihan, H. S., C. H. Peterson, J. E. Byers, J. H. Grabowski, and G. Thayer. 2001. Cascading of habitat degradation: oyster reefs invaded by refugee fishes escaping stress. Ecological Applications 11(3): 764-782 pdf - Byers, J. E. 2002. Physical habitat attribute mediates biotic resistance to non-indigenous species invasion. Oecologia 130(1): 146-156 pdf - Byers, J. E., S. Reichard, J. Randall, I. Parker, et al. 2002. Directing research to reduce the impacts of nonindigenous species. Conservation Biology 16(3): - Byers, J. E., 2002. Impact of non-indigenous species enhanced by anthropogenic alteration of selection regimes. Oikos 97(3): 449-458 pdf - Byers, J. E. and E. Noonburg 2003. Scale dependent effects of biotic resistance to biological invasion. Ecology 84(6): 1428-1433 pdf - Meyer, J. and J. E. Byers 2005. As good as dead? Sublethal predation faciliates lethal predation on an intertidal clam. Ecology Letters 8(2): 160-166 pdf - Byers, J. E. 2005. Marine reserves enhance abundance but not competitive impacts of a harvested nonindigneous species. Ecology 86(2): 487-500 pdf - Noonburg, E. G. and J. E. Byers 2005. More harm than good: when invader vulnerability to predators enhances impact on native species. Ecology 86(10): 2555-2560 pdf - Torchin, M., J. E. Byers, and T. Huspeni. 2005. Differential parasitism of native and introduced snails: replacement of a parasite fauna. Biological Invasions 7(6): - Byers, J. E. 2005. Quantifying geographical variation in physiological performance to address the absence of invading species. Ecoscience 12(3): 358-365; [Special volume: Spatial and temporal dynamics of biological invasions] - Reusink, J., H. Lenihan, A. Trimble, K. Heiman, F. Micheli, J. E. Byers, and M. Kay. 2005. Introduction of non-native oysters: ecosystem effects and restoration implications. Annual Review of Ecology, Evolution, and Systematics 36: - Griffen, B. D. and J. E. Byers. 2006. Partitioning mechanisms of predator interference in different habitats. Oecologia 146(4): 608-614. pdf - Byers, J. E. and J.M. Pringle. 2006. Going against the flow: retention, range limits and invasions in advective environments. Marine Ecology Progress Series 313: 27-41. - Griffen, B. D. and J. E. Byers. 2006. Intraguild predation reduces redundancy of predator species in multiple predator assemblage. Journal of Animal Ecology 75: 959-966. - Freeman, A. and J. E. Byers. 2006. Divergent induced responses to an invasive predator in marine mussel populations. Science 313 (5788): 831-833. pdf - [Article summarized in Science for "News of the Week, Evolution" pdf; - Audio Archive of story on National Public Radio] - Byers, J. E., K. Cuddington, C.G. Jones, T.S. Talley, A. Hastings, J.G. Lambrinos, J.A. Crooks, W. Wilson. 2006. Using ecosystem engineers to restore ecological systems. Trends in Ecology & Evolution 21(9): 493-500. pdf - Griffiths, J., M. Dethier, A. Newsom, J. E. Byers, J. Meyer, F. Oyarzun, and H. Lenihan. 2006. Invertebrate community responses to recreational clam digging. Marine Biology 149(6): 1489-1497. pdf - Hastings, A., J. E. Byers, J.A. Crooks, K. Cuddington, C.G. Jones, J.G. Lambrinos, T.S. Talley, W. Wilson. 2007. Ecosystem engineering in space and time. Ecology Letters 10(2): 153-164. pdf - Tyrell, M. C. and J. E. Byers. 2007. Do artificial substrates favor nonindigenous fouling species over natives? Journal of Experimental Marine Biology and Ecology 342: - Wood, C. L.*, J. E. Byers, K. Cottingham, I. Altman, M. Donahue, and A. Blakeslee. 2007. Parasites alter community structure. Proceedings of the National Academy of Sciences 104(22): 9335-9339. pdf [*winner of ESA's Outstanding Undergraduate Student Research - Byers, J. E. and E. G. Noonburg. 2007. Poaching, enforcement, and the efficacy of marine reserves. Ecological Applications 17(7): 1851-1856. pdf - Byers, J. E. 2007. Lessons from disparate ecosystem engineers. In: Ecosystem engineering: plants to protists. Eds.: K. Cuddington, J. E. Byers, W. Wilson & A. Hastings. Academic Press. pdf - Byers, J. E., A. Blakeslee, E. Linder, A. Cooper, and T. Maguire. 2008. Controls of spatial variation in the prevalence of trematode parasites infecting a marine snail. Ecology 89(2): 439-451. pdf (or for low resolution version click here: pdf) - Blakeslee, A. and J. E. Byers. 2008. Using parasites to inform ecological history: comparisons among three congeneric marine snails. Ecology 89(4):1068-1078. pdf - Byers, J. E. and J. M. Pringle. 2008. Going against the flow: how invasions spread and persist in the face of advection. [Extended Abstract]. ICES Journal of Marine Science 65: 723-724. pdf - Hellmann, J.J., J. E. Byers, B.G. Bierwagen, and J.S. Dukes. 2008. Five potential consequences of climate change for invasive species. Conservation Biology 22(3): - Blakeslee, A., J. E. Byers, M.P. Lesser. 2008. Solving cryptogenic histories using host and parasite molecular genetics: the resolution of Littorina littorea's North American origin. Molecular Ecology 17(16): 3684-3696. - Byers, J. E. 2009. Competition in Marine Invasions. In: Biological Invasions in Marine Ecosystems, Ecological Studies 204, Eds. Gil Rilov & Jeff Crooks. Springer-Verlag. pps. 245-260. pdf - Griffen, B. D. and J. E. Byers. 2009. Community impacts of two invasive crabs: the interactive roles of density, prey recruitment, and indirect effects. Biological Invasions 11(4): 927-940. pdf - Byers, J. E. 2009. Including parasites in food webs. Trends in Parasitology 25(2): 55-57. pdf - Byers, J. E. 2009. Invasive animals in marshes: biological agents of change. In: Human impacts on salt marshes: A global perspective, Eds.: Brian Silliman, Edwin Grosholz & Mark Bertness. University of California Press. pp. 41-56. - Freeman, A., J. Meszaros, and J. E. Byers. 2009. Poor phenotypic integration of blue mussel inducible defenses in environments with multiple predators. Oikos 118: 758-766. - Brawley, S. H., J.A. Coyer, A.M.H. Blakeslee, G. Hoarau, L.E. Johnson, J. E. Byers, W.T. Stam and J.L. Olsen. 2009. Historical invasions of the intertidal zone of Atlantic North America associated with distinctive patterns of trade and emigration. Proceedings of the National Academy of Sciences 106(20): 8239-8244. pdf - Gribben, P. E., J. E. Byers, M. Clements, L. A. McKenzie, P. D. Steinberg, and J. T. Wright. 2009. Behavioural interactions between ecosystems engineers control community species richness. Ecology Letters 12(11): 1127-1136. pdf - Blakeslee, A.M.H., C.L. Keogh, J. E. Byers, A. M. Kuris, K. D. Lafferty, and M. E. Torchin. 2009. Differential escape from parasites by two competing introduced crabs. Marine Ecology Progress Series 393: 83-96. pdf - Byers, J. E., P.E. Gribben, and J.T Wright. 2010. Variable direct and indirect effects of a habitat-modifying invasive species on mortality of native fauna. Ecology 91(6): 1787-1798. pdf - Wright, J.T., J. E. Byers, L.P. Koukoumaftsis, P.J. Ralph, and P.E. Gribben. 2010. Native species behavior mitigates the impact of habitat-forming invasive seaweed. Oecologia 163(2): 527-534. pdf - Jones, C.G., J. L. Gutiérrez, J. E. Byers, J.A. Crooks, J.G. Lambrinos, and T.S. Talley. 2010. A framework for understating physical ecosystem engineering by organisms. Oikos 119: 1862-1869. pdf - Blakeslee, A.M.H., C.H. McKenzie, J. Darling, J. E. Byers, J.M. Pringle, and J. Roman. 2010. A hitchhiker's guide to the Maritimes: anthropogenic transport facilitates long-distance dispersal of an invasive marine crab to Newfoundland. Diversity and Distributions 16(6): 879-891. pdf - Gutiérrez, J. L., C. G. Jones, J. E. Byers, K. K. Arkema, K. Berkenbusch, J. A. Commito, C. M. Duarte, S. D. Hacker, I. E. Hendriks, P. J. Hogarth, J. G. Lambrinos, M. G. Palomo, C. Wild. 2011. Physical ecosystem engineers and the functioning of estuaries and coasts. Chapter 5, in Vol. 7: Functioning of Estuaries and Coastal Ecosystems. Eds.: C. H. R. Heip, C. J. M., Philippart, & J. J. Middelburg. In the Treatise on Estuarine and Coastal Science (Series Eds., E. Wolanski, & D. McLusky), Elsevier. pdf (or for low resolution version click here: pdf) - Byers, J. E., I. Altman, A. Grosse, T. Huspeni, and J.C. Maerz. 2011. Using parasitic trematode larvae to quantify an elusive vertebrate host. Conservation Biology 25(1): - Meyer, J. J. and J. E. Byers. 2011. Human-driven spatial and temporal shift in trophodynamics in the Gulf of Maine, USA. Marine Biology 158(3): 631-638. pdf - Altman, I., A. M. H. Blakeslee, G. C. Osio, C. Rillahan, S. J. Teck, J. J. Meyer, J. E. Byers, and A. A. Rosenberg. 2011. A practical approach to implementation of ecosystem-based management: a case study using the Gulf of Maine marine ecosystem. Frontiers in Ecology & the Environment 9(3): 183-189. - Pringle, J.M., A.M.H. Blakeslee, J. E. Byers, and J. Roman. 2011. Asymmetric dispersal allows an upstream region to control population structure throughout a species' range. Proceedings of the National Academy of Sciences 108(37): - Canning-Clode, J., A.E. Fowler, J. E. Byers, J.T. Carlton, and G.M. Ruiz. 2011. 'Caribbean Creep' chills out: climate change and marine invasive species. PLoS ONE 6(12): - Wright, J.T., J. E. Byers, L.P. Koukoumaftsis, and P.E. Gribben. 2012. Differences in anti-predator traits of a native bivalve following invasion by a habitat-forming seaweed. Marine & Freshwater Research 63: 246-250. pdf - Blakeslee, A.M.H., I. Altman, A.W. Miller, J. E. Byers, C.E. Hamer and G.M. Ruiz. 2012. Parasites and invasions: a biogeographic examination of parasites and hosts in native and introduced ranges. J. of Biogeography 39: 609-622. - Wright, J.T., P.E. Gribben, J. E. Byers, K. Monro. 2012. Invasive ecosystem engineer selects for different phenotypes of an associated native species. Ecology 93(6): - Bishop, M. J., J. E. Byers, B.J. Marcek, and P.E. Gribben. 2012. Density-dependent facilitation cascades determine epifaunal community structure in temperate Australian mangroves. Ecology 93(6): 1388-1401. pdf - Byers, J. E., P.E. Gribben, C. Yeager, and E. Sotka. 2012. Impacts of an abundant invasive ecosystem engineer within mudflats of the southeastern US coast. Biological Invasions 14: 2587-2600. pdf - Dunn, A.M., M.E. Torchin, M.J. Hatcher, P.M. Kotanen , D.M. Blumenthal, J.E. Byers, C.A.C. Coon, V.M. Frankel, R.D. Holt, R.A. Hufbauer, A.R. Kanarek, K.A. Schierenbeck, L.M. Wolfe, and S.E. Perkins. 2012. Indirect effects of parasites in invasions. Functional Ecology 26: 1262-1274. pdf - Burfeind, D.D., K.A. Pitt, R.M. Connolly, and J. E. Byers. 2013. Performance of non-native species within marine reserves. Biological Invasions 15: 17-28. pdf - Byers, J. E., W.G. McDowell, S. Robertson, R. Haynie, L.M. Pintor, & S.B. Wilde. 2013. Climate and pH predict the potential range of the invasive apple snail (Pomacea insularum) in the southeastern United States. PLoS ONE 8(2): e56812. doi:10.1371/journal.pone.0056812 pdf - Gribben, P.E. , J. E. Byers, J.T. Wright and T.M. Glasby. 2013. Positive versus negative effects of an invasive ecosystem engineer on different components of a marine ecosystem. Oikos. 122: 816824. doi: 10.1111/j.1600-0706.2012.20868.x - Parker, J. D., M.E. Torchin, R.A. Hufbauer, N.P. Lemoine, C. Alba, D.M. Blumenthal, O. Bossdorf, J. E. Byers, A.M. Dunn, R.W. Heckman, M. Hejda, V. Jaroík, A.R. Kanarek, L.B. Martin, S.E. Perkins, P. Pyek, K. Schierenbeck, C. Schlöder, R. van Klinken, K.J. Vaughn, W. Williams, L.M. Wolfe. 2013. Do invasive species perform better in their new ranges? Ecology 94(5): 985994. pdf - Wonham, M., J. E. Byers, E.D. Grosholz, & B. Leung. 2013. Modeling the relationship between invasion risk and propagule pressure to inform invasion-management policy. Ecological Applications 23(7): 1691-1706. doi: http://dx.doi.org/10.1890/12-1985.1 - Altman, S., J. Robinson, J. M. Pringle, J. E. Byers, & J. P. Wares. 2013. Edges and overlaps in North Atlantic phylogeography. Diversity 5, 263-275; doi:10.3390/d5020263 (Special volume: Biogeography and Biodiversity Conservation). - Colautti, R. I., S.J. Franks, R.A. Hufbauer, P.M. Kotanen, M.E. Torchin, J.E. Byers, P. Pyek, O. Bossdorf. 2014. The global garlic mustard field survey (GGMFS): challenges and opportunities of a unique, large-scale collaboration for invasion biology. Neobiota 21: 29-47. pdf - Byers, J. E. and J.H. Grabowski. 2014. Soft-sediment communities. In: Marine Community Ecology. Eds.: Mark Bertness, Brian Silliman, Jay Stachowicz & John Bruno. Sinauer. - Byers, J. E., T. L. Rogers, J. H. Grabowski, A.R. Hughes, M. F. Piehler, & D. L. Kimbro. 2014. Host and parasite recruitment correlated at a biogeographic scale. Oecologia 174: 731-738. pdf - Thomsen, M. S., J. E. Byers, D. R. Schiel, J. F. Bruno, J. D. Olden, T. Wernberg, & B. R. Silliman. 2014. Impacts of marine invaders on biodiversity depend on trophic position and functional similarity. Marine Ecology Progress Series 495: 39-47. pdf - Pringle, J. M., J. E. Byers, P. Pappalardo, J.P. Wares & D. Marshall. 2014. Circulation constrains the evolution of larval development modes and life histories in the coastal ocean. Ecology 95: 1022-1032. pdf - Altman, I. and J. E. Byers. 2014. Large scale spatial variation in parasite communities influenced by anthropogenic factors. Ecology 95(7): 1876-1887. pdf - McDowell, W.G., A. J. Benson, & J. E. Byers. 2014. Climate controls the distribution of an abundant invasive species: implications for future range expansion. Freshwater Biology 59: 847-857. pdf - Thomsen, M. S., T. Wernberg, J. D. Olden, J. E. Byers, J. F. Bruno, B. R. Silliman, & D. R. Schiel. 2014. Forty years of experiments on invasive species: are biases limiting our understanding of impacts? Neobiota 22: 1-22. doi: 10.3897/neobiota.22.6224. pdf - Byers, J. E., R. S. Smith, H. W. Weiksel, & C. Y. Robertson. 2014. A non-native prey mediates the effects of a shared predator on an ecosystem service. PLoS One 9(4): e93969. doi:10.1371/journal.pone.0093969. pdf - Kimbro, D. L., J. E. Byers, J. H. Grabowski, A.R. Hughes, & M. F. Piehler. 2014. The biogeography of trophic cascades on U.S. oyster reefs. Ecology Letters 17(7): - Wright, J. T., J. E. Byers, J. L. DeVore, & E. E. Sotka. 2014. Engineering or food? Mechanisms of facilitation by a habitat-forming invasive seaweed. Ecology 95(10): - Pappalardo, P., J. M. Pringle, J. P. Wares, & J. E. Byers. (in press, 2015). The location, strength, and mechanisms behind marine biogeographic boundaries of the east coast of North America. Ecography 38. doi: 10.1111/ecog.01135 - Byers, J. E., J. H. Grabowski, M. F. Piehler, A. R. Hughes, H. W. Weiskel, J. C. Malek, & D. L. Kimbro. (in press¸ 2015). Geographic variation in intertidal oyster reef properties and the influence of tidal prism. Limnology & Oceanography. pdf - Byers, J. E., A. J. Malek, L. E. Quevillon, I. Altman, & C.L. Keogh. (in press, 2015). Opposing selective pressures decouple pattern and process of parasitic infection over small spatial scale. Oikos. 10.1111/oik.02088 - Pintor, L. M. and J. E. Byers. (in press, 2015). Individual trait variation in a native predator affects its consumption of a novel, non-native prey. Behavioral Ecology. - Bishop, M. J. and J. E. Byers. (in press, 2015). Predation risk predicts use of a novel habitat. Oikos. doi: 10.1111/oik.01967 pdf K. Cuddington, J. E. Byers, W. Wilson and A. Hastings, editors. 2007. Ecosystem engineering: plants to protists. Academic Odum School Home Page
s3://commoncrawl/crawl-data/CC-MAIN-2015-22/segments/1432207929978.35/warc/CC-MAIN-20150521113209-00247-ip-10-180-206-219.ec2.internal.warc.gz
CC-MAIN-2015-22
18,991
362
http://www.roe.ac.uk/~al/teaching-da.htm
code
Discovering Astronomy is a twenty credit pre-Honours course taught in first semester, open to any students. Here is the official University course information. All the course material is on the related Learn page, which is only available to UEd registered students. This page is just a repository for the components of the course taught by me. Autumn 2013 version This year I have not been involved in Discovering Astronomy. Autumn 2012 versionFor the 2012 version, the Course Organiser was Ken Rice. The material was taught by Ken, myself, and Arthur Trew. Arthur's bit : Introduction Autumn 2011 version The 2011 version was pretty similar to the 2012 version, except my notes were PPT slides. The PDF version of these slides is available here as a single zip file. 2010 versionIn previous years, Discovering Astronomy came in two flavours, Discovering Astronomy G and Discovering Astronomy S. (They were merged in 2011). The 2010 notes for my parts of for Discovering Astronomy G can be found here as a single zip file.
s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376832559.95/warc/CC-MAIN-20181219151124-20181219173124-00591.warc.gz
CC-MAIN-2018-51
1,022
8
https://connect.unity.com/p/vr-maze-by-monigarr
code
alpha version of a project I am working on for the Udacity VR NanoDegree Virtual Reality game I am creating for my school project in the Udacity VR NanoDegree. This is a video review of the android version for google cardboard that I am building with Unity3D 5.5. I am learning how to script collectibles, navigation, lighting and animation with C# in this project. * navigation: click tiny blue boxes (waypoint) * collect coins * collect key to unlock temple door * click temple door to enter (after collecting key) * click restart game inside temple.
s3://commoncrawl/crawl-data/CC-MAIN-2019-39/segments/1568514574159.19/warc/CC-MAIN-20190921001810-20190921023810-00358.warc.gz
CC-MAIN-2019-39
552
9
https://place.asburyseminary.edu/syllabi/1677/
code
Download Full Text (177 KB) (1) Peterson, Michael, ed. The Problem of Evil: Selected Readings (University of Notre Dame Press, 1992). (2) Adams, M. M. and Adams R. M., editors, The Problem of Evil (Oxford University Press, 1990) (3) Swinburne, Richard. Providence and the Problem of Evil (Oxford University Press, 1998) (4) (There will also be several various articles provided in the modules.) These books can be ordered from Asbury's bookstore, which you can call (859) 858-4242 or e-mail at [email protected]. (While the assigned readings are not especially large in volume, they can be quite dense. I often find myself having to re-read sections; in fact, everybody does). Asbury Theological Seminary ExL, Faith, PH600, Philosophy, Spring, Suffering, Tragedy
s3://commoncrawl/crawl-data/CC-MAIN-2020-45/segments/1603107896778.71/warc/CC-MAIN-20201028044037-20201028074037-00577.warc.gz
CC-MAIN-2020-45
775
4
http://www.insanelymac.com/forum/user/11949-katz/page__tab__topics
code
I've done a few hackintoshes over the years. I happened upon a Dell R410 server and I'm thinking "why the heck not turn this into a bitchin' hackintosh workstation." ... eventually I'll get a true Mac-compatible PCI-X graphics card for it and some USB-sound card that works, but right now I just want to get it to boot. So that's my project this weekend. It has 12G of RAM, 2x E5504 CPUs (2 * quad core, 2Ghz) and 2x 500GB SATA drives Right now I'm trying to get iATKOS L2 to boot from a USB stick using Chimera. I have the USB stick built correctly and the kernel begins to load, then panics. Look at the following screendump (iDRAC is nice for that) to figure out what I'm doing wrong. I've tried a few different boot flags including CPUS=1 DSDT=no -f -v -x busratio=22 (in different permutations.) Each time I get the same panic (see attached.) Any clues? Any other boot flags I can try? katzMember Since 26 Sep 2005 Offline Last Active Oct 05 2012 12:10 AM - Group Members - Active Posts 22 - Profile Views 703 - Member Title InsanelyMac Protégé - Age Age Unknown - Birthday Birthday Unknown
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368698141028/warc/CC-MAIN-20130516095541-00000-ip-10-60-113-184.ec2.internal.warc.gz
CC-MAIN-2013-20
1,097
13
https://gitlab.openminds.be/mirror/rsyslog/-/commit/7a8ac09de2539cb5f0a3e19b82a9099a09c73c09
code
Fixes spec tests locally and on travis-ci - Fixes travis-ci license issue in kitchen dokken. - Updates SmartOS version to 5.11 in spec tests. - Removes OmniOS because it is no longer suppotred by fauxhai. - Fixes raise_error warning message by adding error type. Obvious fix. Showing with 12 additions and 35 deletions
s3://commoncrawl/crawl-data/CC-MAIN-2021-17/segments/1618038476606.60/warc/CC-MAIN-20210418103545-20210418133545-00527.warc.gz
CC-MAIN-2021-17
318
3
https://community.nxp.com/thread/437801
code
Im using S32 sdk ear 0.8.1 and fsl_interrupt_manager to install a interrupt handler for FTM0. And it works. But a comment in S32K1xx_DMA_Interrupt_mapping.xlsm makes me confused. NVIC interrupt id 42, which the sdk uses, is marked as Reserved and has comment "was FTM0". 1) What does this mean? Will this interrupt not be available/usable in a future revision of s32k144? 2) The SDK does not expose interrupt id 104 (FTM0: Counter overflow). IRQn_Type only defines id up to 98. 3) I would like some guidens on how to proceed. Can I ignore this issue or will a future SDK fix this?
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585371805747.72/warc/CC-MAIN-20200407183818-20200407214318-00331.warc.gz
CC-MAIN-2020-16
580
6
https://www.mediawiki.org/wiki/Oauthclient-php
code
oauthclient-php is a PHP client for Extension:OAuth. To use it inside your application, simply run composer require mediawiki/oauthclient, or add a dependency in your (You may need to install Composer first.) If you haven't already, you'll need to include include_once("./vendor/autoload.php"); in your PHP script to include your composer libraries. If you prefer using git, use git clone https://gerrit.wikimedia.org/g/mediawiki/oauthclient-php.git, and autoload the library however you wish to. If you wish to develop and contribute on the library, see developer account for gaining access to our code review system. The code was originally published at https://github.com/Stype/mwoauth-php (which incorporated https://code.google.com/p/oauth/), then reused and refactored in https://github.com/wikimedia/wikimedia-slimapp/tree/master/src/OAuth, then split into a separate library. - Source code (Phabricator mirror, ) - Composer package - API Documentation - Test coverage report - Issue tracker
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100529.8/warc/CC-MAIN-20231204115419-20231204145419-00578.warc.gz
CC-MAIN-2023-50
998
15
https://cordis.europa.eu/project/id/101017452
code
Making open science more accessible In the world of open science, fair, user-friendly and open communication and information sharing are key. Therefore, in order to promote research, content and information must be easily discovered and viewed. The EU-funded OpenAIRE Nexus project is presenting a framework of services that could greatly assist in publishing research, monitoring its impact and helping promote its discovery. These services are provided by public institutions and entities, having already been used in Europe and beyond. The goal is to integrate this framework into the European Open Science Cloud (EOSC) and the open science community worldwide. Call for proposal See other projects for this call Funding SchemeRIA - Research and Innovation action
s3://commoncrawl/crawl-data/CC-MAIN-2021-25/segments/1623487633444.37/warc/CC-MAIN-20210617192319-20210617222319-00308.warc.gz
CC-MAIN-2021-25
766
5
https://www.pcmag.com/article2/0,2817,4449,00.asp
code
Kai's PhotoSoap 2 has many potentially useful features. Unfortunately, the tools aren't implemented well, and the interface relies on confusing conventions. The workspace is tabular, offering separate areas to organize images, edit photos, compose documents, create albums, and print. Though this method can be helpful, we sometimes couldn't find the correct tab to perform a particular task. For instance, the Clean tab lets you correct colors, apply effects, and use paintbrushes. To add text, however, you must go to the Compose tab. And this isn't as easy as switching tabs. You must apply all edits, make sure the image is in the image tray, switch tabs, and drag the image to the workspace. Kai's PhotoSoap 2
s3://commoncrawl/crawl-data/CC-MAIN-2019-30/segments/1563195527204.71/warc/CC-MAIN-20190721205413-20190721231413-00371.warc.gz
CC-MAIN-2019-30
714
2
https://wordpress.org/support/topic/crawl-errors-1/
code
I am getting Google crawl 404 errors for the blog post urls. Some query string gets appended to the actual urls and a 404-page not found error occurs. For example, a valid url : http:///www.mydomain.com/blog/tag/categorySlugName/ Extra query string appended : http:///www.mydomain.com/blog/tag/categorySlugName/&/page/3/http://itunes.apple.com/us/app/appname/id1234/page/4/%3Chttp://itunes.apple.com/us/app/appname/id1234 I cannot figure out how these query strings get appended to the valid url. It is not present in the hyper links within the blog. More info : Permalink is set to month and date. The query sting parameters are unique always. A 301 redirection is too much to handle because these crawl errors increase day by day. Please help solve this.
s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218188785.81/warc/CC-MAIN-20170322212948-00174-ip-10-233-31-227.ec2.internal.warc.gz
CC-MAIN-2017-13
756
8
https://editrocket.com/docs/how_to_bookmarks.html
code
How to Work with Bookmarks EditRocket provides a navigation option known as a bookmark. A bookmark makes it possible to mark lines in code / text that is being edited. This allows the user to easily jump to these lines using a keyboard shortcut, menu option, or the bookmark selector tool. Bookmarks can be added in the following ways: - Select the Search -> Add Bookmark menu option - Right-click on the line number of the line to be bookmarked Bookmarks can be removed in the following ways: - Right-click on the line number of a bookmarked line - Select the Search -> Remove Bookmarks option Once a line has been bookmarked, the line number for the bookmarked line will be highlighted with a blue background. Users can jump to bookmarks in the following ways: - Use the Control/Command-J keyboard shortcut to go to the next bookmark - Use the Control/Command-Shift-J keyboard shortcut to go to the previous bookmark - Use the bookmark selector tool (Search -> Bookmark selector or Control/Command-Shift-B keyboard shortcut)
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296949573.84/warc/CC-MAIN-20230331051439-20230331081439-00267.warc.gz
CC-MAIN-2023-14
1,026
13
https://lists.wikimedia.org/hyperkitty/list/[email protected]/message/GKDNIYIWDVU3ZKBHKDAZIXVP4I3R7A4U/
code
On Sun, 25 May 2014 00:53:09 +0200, Daniel Friesen <daniel(a)nadir-seen-fire.com> On 2014-05-24, 10:49 AM, Bartosz Dziewoński wrote: I'm sorry, but this is very silly reasoning. Cache is not forever anyway, and ResourceLoader includes cache-busting timestamps in URL queries for each resource that goes through it (including the ones that are not embedded in CSS, and the fallbacks for data: URIs). Changing the URL is not a problem at all as long as we're not doing it every other day. It's not my most important point, but just a few notes since you replied. * Just a few strict fact corrections: o The .htc doesn't get cache busted. o addStyle, etc... are cache busted by $wgStyleVersion not RL. o CSS contents in RL get cache busters, but the load.php calls themselves for skin resources don't. * The "cache" problem isn't just an issue of things unnecessarily being purged. Remember WMF's 30 day cache issues. Unless the wmfX number is already something that would be changed with two copies being simultaneously deployed the vector -> Vector path change triggers the issue of old cached pages pointing to A few notes of my own, then, if you're nitpicking. :) Yes, some resources do not include the timestamps in query. I've only mentioned the ones loaded via ResourceLoader. load.php calls would not be affected by the directory name changing and thus are not relevant. WMF hosts each deployed version in a separate directory, changing $wgStyleDirectory (or doing some similar magic) to change the references in the pages. (Here's an example link to a resource: – note the version number is included, this will go down in a few weeks as the versions are cycled.) This way old cached pages will never point to new version of resources and vice versa. (The old directories are kept long enough not to break anything – at least 30 days, like you said – and generally deleted in bulk every few weeks.)
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030338244.64/warc/CC-MAIN-20221007175237-20221007205237-00544.warc.gz
CC-MAIN-2022-40
1,910
31
https://www.group-office.com/forum/viewtopic.php?f=3&t=8446&p=28397
code
When I try to update to the newest clamav in ubuntu 10.04 (LTS), then I get following error code: The following packages are BROKEN: 0 packages upgraded, 1 newly installed, 0 to remove and 0 not upgraded. Need to get 24.2MB of archives. After unpacking 24.3MB will be used. The following packages have unmet dependencies: clamav-data: Conflicts: clamav-freshclam but 0.96.5+dfsg-1ubuntu1.10.04.4 is installed. clamav-freshclam: Conflicts: clamav-data but 20100423.032400.10794 is to be installed. The following actions will resolve these dependencies: Remove the following packages: Score is 190 Accept this solution? [Y/n/q/?] So there seem's to be a dependencie between gropoffice-mailserver, so I can't update to a new clamav.
s3://commoncrawl/crawl-data/CC-MAIN-2018-43/segments/1539583512332.36/warc/CC-MAIN-20181019062113-20181019083613-00445.warc.gz
CC-MAIN-2018-43
729
12
http://grumpytech.blogspot.com/2005/09/do-people-need-privacy.html
code
Recently the company I’m working in encountered a problem with one of our web sites – for some reason the cookies were rejected by the client browsers. After short investigation we found the reason: incorrectly configured P3P policy on one of our servers. The problem was quickly fixed – but somehow I keep thinking about this small incident. The topic of online privacy is a hot one – and was a hot one for quite some time. Users of the Internet – and I’m not an exception – were worried about the data that different sites collected about them. Several utilities were created at different times to address these worries (I myself had at some time installed a program called IDCide to block tracking cookies). And I’ve read a multitude of articles in different online and offline magazines – all talking about the necessity to protect an innocent Internet user against data collection and privacy violation. It seemed like everybody wanted something to be done. And then the issue was addressed by W3C, and a Platform for Privacy Preferences (AKA P3P) was created. Now almost all major sites and the major browsers support P3P. The sites tell you their policy on data collection and retention, and the browser is able to allow or deny certain actions based on how your preferences match the site’s profile. Terrific! The only question is – how many people know about it? I’ve asked several of my friends and colleagues – most of them never heard about this. Somehow P3P and everything that’s related to it got past the majority of people who need it most. There is something unwholesome about the situation; it shows us that people do not need privacy and security – they just need to talk about privacy and security.
s3://commoncrawl/crawl-data/CC-MAIN-2018-22/segments/1526794867904.94/warc/CC-MAIN-20180526210057-20180526230057-00533.warc.gz
CC-MAIN-2018-22
1,748
4
http://www.tfw2005.com/boards/threads/need-help-on-fort-max-question.139745/
code
I need some help on choosing which version of Fort Max to get. Hopefully, some of you knowledgable TF vet's can help me out. If I could find a G1 MISB Max, I probably couldn't afford it anyway, so I've been looking at MIB G1. Are the Japanese versions any rarer than the U.S. release? Can you help me with a ballpark price for a good deal on a really nice MIB Japanese C-114= Japanese C-311= U.S. Fort Max= I really appreciate the help!
s3://commoncrawl/crawl-data/CC-MAIN-2017-39/segments/1505818693240.90/warc/CC-MAIN-20170925182814-20170925202814-00068.warc.gz
CC-MAIN-2017-39
436
1
https://redmonk.com/dberkholz/2013/01/21/github-will-hit-5-million-users-within-a-year/
code
With GitHub’s 3 millionth user just announced, the time was right to more deeply examine GitHub’s growth since its start back in 2008. Thanks to Francis Irving’s work (graph) at ScraperWiki, I found a way to query monthly growth rather than just relying on periodic announcements. (For those playing along at home, note the search syntax has since changed.) My goal was to come up with a model for GitHub’s growth to understand what kind of rules its growth followed and so I could better predict the future. GitHub users as a population My first assumption was that I could handle this as a population using standard approaches like the exponential or logistic equations, but I started by plotting a couple of things: users over time, and the log of users over time. Getting a feel for the shape of the data should be the starting point for any analysis. If it’s a population experiencing exponential growth, it should be log-linear (plotting the log of users on the Y-axis rather than raw users should be linear), but it’s not — so the growth cannot be treated exponentially. Since GitHub users increase faster than exponential growth allows (tighter curvature on graph of users over time, higher slope on log-linear graph), to fit growth, we need a superexponential model. After digging into this for a while, I finally discovered a model of populations that might fit — coalition-based growth, described by von Foerster and colleagues in 1960 in a publication in Science. Its essence is in game theory, considering the entire community as a single group in a two-entity game against its environment, due to members’ high level of communications enabling them to form tightly linked coalitions, rather than independent individuals trying to survive. To me, the parallel with collaborative software development seemed quite strong. The best fit to the data I’ve found so far is described by superexponential growth following the coalition-based equation P(t) = P0 * t * ekt P0 = 49,100 ± 1750; k = 0.54 ± 0.009 where P is the population at time t, P0 is the initial population, and k is a growth constant (i.e., the frequency of growth by a factor e). This equation is different from the more typical exponential growth [P(t) = P0 * ekt] because of an additional multiple of t to indicate that the rate of growth actually increases with time, which is inserted to account for the network effects. The results generally make sense, which is always a good check to make — for example, the initial population is much closer to zero than 3 million. GitHub adoption as diffusion of a new innovation In the meanwhile, I’d thrown out a request on Twitter for suggestions on how to model this, and Adrian Cockcroft suggested treating it as diffusion atop a pre-existing social network. This seemed reasonable too, so I started looking into it. Turns out that the logistic function is also used to describe diffusion of innovations, but it’s again log-linear, which doesn’t fit the GitHub adoption data. Then I combined this with some of my previous thoughts that there must be alternate ways to model GitHub based on social-network analysis rather than population dynamics. When I looked more deeply into the theory of diffusion of innovations, I discovered that it’s often treated using the Bass model. This is really just a combination of exponential and logistic equations with two coefficients, p and q, to model diffusion via social interactions and broadcast advertising. The Bass model does account for social networks, but its main shortcoming is that it treats them as fully connected and homogeneous (everyone knows everyone, and all people are identical), when in reality they’re often small world / scale-free. That said, I figured it would make sense to start with the simplest possible approximation and see how it did, and here’s the results: Intriguingly, the Bass model produced a nearly identical fit to the coalition-based model using the following equation: P(t) = m * [ (1 – e-(p+q)t) / (1 + q/p * e-(p+q)t) ] p = 0.003 ± 0.0015, q = 0.83 ± 0.042, m = 21,000,000 ± 12,000,000 where P again is the population at time t, p and q are coefficients for advertising and social-network effects, respectively, and m is the total size of the market. Under that model, you would interpret nearly all of GitHub’s popularity to social effects (word-of-mouth and friends) and nearly none to broadcast advertising. Again, it’s good to see the results generally make intuitive sense. Regarding the market size m, it’s critical to note that it is commonly underestimated, particularly with the paucity of data here (only a partial curve and no inflection point). In summary, modeling GitHub adoption as diffusion of an innovation seems to work pretty well, too, despite the obvious simplifications regarding the social network and static market sizing, advertising, pricing, etc. What about the future? Understanding the past is useful, but what we really want to do is predict something. So, do these models enable us to do that? Sure — let’s plot the models out to year 10 and see what things look like: Neither fit is perfect, with some clear systematic errors, but I suspect that won’t be fixable without a more complex model (e.g. heterogeneous social networks) or more data. The coalition model says things increase faster and faster forever (which seems just a tad unrealistic), predicting 100 million users after 10 years. Although I don’t necessarily discard 100 million developers out of hand, I’m definitely skeptical about 2.5 billion at year 15, which makes the model as a whole a little weak. The Bass model, on the other hand, is a more typical S-shaped curve that’s clearly moving toward a maximum, predicting 20 million users at year 10 and 21 million at year 15. Now, don’t take those numbers as hard figures, because there’s huge amounts of uncertainty associated with them — the purpose of this exercise was more about understanding GitHub’s growth model and possibly some near-term prediction. In the near term, I’d estimate, based on my Bass model, that GitHub will hit 4 million users near August and 5 million near December. Disclosure: GitHub has been a client.
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947473598.4/warc/CC-MAIN-20240221234056-20240222024056-00504.warc.gz
CC-MAIN-2024-10
6,254
26
https://anarchoblogs.org/introducing-strobes-vi-security-boulevard/
code
One of the use cases for Strobes VM is to provide customers with a way to prioritize vulnerabilities in their organization using vulnerability intelligence. Our research and engineering teams have created an advanced aggregation tool that syncs data from over 100 sources and in real time. Our goal is to ensure that the data is as accurate as possible so that it helps to effectively prioritize vulnerabilities for our customers. Strobes VI is an Intel that comes with your Strobes subscription. Over the past few months, we have received requests from customers to use Strobes VI via API or client to enrich their existing vulnerabilities in a SIEM environment or in a SOC environment. We are happy to announce that we are releasing a python API and client 🌀 Rest API Strobes VI Using the Rest API is simple, just send a “GET” request to https://intel.strobes.co/api/cve/ The request will return a response with the respective CVEs: - Use references - Patch references - Zeroday references - Advisory references - Taxonomy references - Twitter trend - Vulnerable products 🔧 Python API client Currently the Strobes API is F2U and offers unlimited API calls. A full release is planned for July this year, which will limit the number of API calls that can be made every hour and will require a license key. Enjoy unlimited API calls while they last and send us your feedback As of May 9, 2022, the tool has ingested and correlated approximately, - 185,860 vulnerabilities - 6,932 zero days - 45,804 vulnerabilities with exploits Among which there are, - 4,556 have a priority score above 900 - 79 120 Operating references - 10,898 Zeroday references 🔨 Use cases We have collected several use cases for Strobes VI. The most popular are listed below. Prioritization of vulnerabilities If you’re doing a large-scale vulnerability scan with millions of vulnerabilities reported daily, it’s hard to identify which ones need immediate remediation. With Strobes VI, you can enrich vulnerabilities with intelligence that helps you identify top vulnerabilities and fixes. Even with millions of events and threats, you can correlate vulnerability intelligence with different events directly within a SIEM platform to speed up your incident response process. Correlate risk with vulnerability intelligence to identify top failures while adhering to best industry standards. Taxonomies and Compliance Ongoing research and development in the coming months will add mappings for GDPR, PCI, HIPAA and more. With a full release scheduled for July 2022, we’re building integrations for major SIEM platforms like Splunk, Elasticsearch, and Qradar. Sign up for free to get started with Strobes VI – Advanced Vulnerability Intelligence
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446711003.56/warc/CC-MAIN-20221205032447-20221205062447-00436.warc.gz
CC-MAIN-2022-49
2,735
33
https://analytixon.com/2018/01/08/distilled-news-674/
code
Anyone who has worked on a Click Prediction problem or Recommendation systems would have faced a similar situation. Since the datasets are huge, doing predictions for these datasets becomes challenging with limited computation resources. However, in most cases these datasets are sparse (only a few variables for each training example are non zero) due to which there are several features which are not important for prediction, this is where factorization helps to extract the most important latent or hidden features from the existing raw ones. Factorization helps in representing approximately the same relationship between the target and predictors using a lower dimension dense matrix. In this article, I discuss Factorization Machines(FM) and Field Aware Factorization Machines(FFM) which allows us to take advantage of factorization in a regression/classification problem with an implementation using python. Regression analysis mathematically describes the relationship between a set of independent variables and a dependent variable. There are numerous types of regression models that you can use. This choice often depends on the kind of data you have for the dependent variable and the type of model that provides the best fit. In this post, I cover the more common types of regression analyses and how to decide which one is right for your data. I’ll provide an overview along with information to help you choose. I organize the types of regression by the different kinds of dependent variable. If you’re not sure which procedure to use, determine which type of dependent variable you have, and then focus on that section in this post. This process should help narrow the choices! I’ll cover regression models that are appropriate for dependent variables that measure continuous, categorical, and count data. In this article, we introduce an Uber forecasting model that combines historical data and external factors to more precisely predict extreme events, highlighting its new architecture and how it compares to our previous model. This is the third tutorial on the Spark RDDs Vs DataFrames vs SparkSQL blog post series. The first one is available here. In the first part, we saw how to retrieve, sort and filter data using Spark RDDs, DataFrames and SparkSQL. In the second part (here), we saw how to work with multiple tables in Spark the RDD way, the DataFrame way and with SparkSQL. In this third part of the blog post series, we will perform web server log analysis using real-world text-based production logs. Log data can be used monitoring servers, improving business and customer intelligence, building recommendation systems, fraud detection, and much more. Server log analysis is a good use case for Spark. It’s a very large, common data source and contains a rich set of information. Exponential Smoothing is an old technique, but it can perform extremely well on real time series, as discussed in Hyndman, Koehler, Ord & Snyder (2008)), when Gardner (2005) appeared, many believed that exponential smoothing should be disregarded because it was either a special case of ARIMA modeling or an ad hoc procedure with no statistical rationale. As McKenzie (1985) observed, this opinion was expressed in numerous references to my paper. Since 1985, the special case argument has been turned on its head, and today we know that exponential smoothing methods are optimal for a very general class of state-space models that is in fact broader than the ARIMA class. Quantum Machine Learning (Quantum ML) is the interdisciplinary area combining Quantum Physics and Machine Learning(ML). It is a symbiotic association- leveraging the power of Quantum Computing to produce quantum versions of ML algorithms, and applying classical ML algorithms to analyze quantum systems. Read this article for an introduction to Quantum ML. This is the considerably belated second part of my blog series on fitting diffusion models (or better, the 4-parameter Wiener model) with brms. The first part discusses how to set up the data and model. This second part is concerned with perhaps the most important steps in each model based data analysis, model diagnostics and the assessment of model fit. Note, the code in the part is completely self sufficient and can be run without running the code of part I. In this post, I’ll describe a fun visualization of Anscombe’s quartet I whipped up recently. If you aren’t familiar with Anscombe’s quartet, here’s a brief description from its Wikipedia entry: ‘Anscombe’s quartet comprises four datasets that have nearly identical simple descriptive statistics, yet appear very different when graphed. Each dataset consists of eleven (x,y) points. They were constructed in 1973 by the statistician Francis Anscombe to demonstrate both the importance of graphing data before analyzing it and the effect of outliers on statistical properties. He described the article as being intended to counter the impression among statisticians that ‘numerical calculations are exact, but graphs are rough.’ ‘ In essence, there are 4 different datasets with quite different patterns in the data. Fitting a linear regression model through each dataset yields (nearly) identical regression coefficients, while graphing the data makes it clear that the underlying patterns are very different. What’s amazing to me is how these simple data sets (and accompanying graphs) make immediately intuitive the importance of data visualization, and drive home the point of how well-constructed graphs can help the analyst understand the data he or she is working with. The R package wrapr now has a neat new feature: “wrapr_applicable”. Wraprs This feature allows objects to declare a surrogate function to stand in for the object in wrapr pipelines. It is a powerful technique and allowed us to quickly implement a convenient new ad hoc query mode for rquery. A small effort in making a package “wrapr aware” appears to have a fairly large payoff. In this post, I will demonstrate the use of nonlinear models for time series analysis, and contrast to linear models. I will use a (simulated) noisy and nonlinear time series of sales data, use multiple linear regression and a small neural network to fit training data, then predict 90 days forward. I implemented all of this in R, although it could be done in a number of coding environments. (Specifically, I used R 3.4.2 in RStudio 1.1.183 in Windows 10).
s3://commoncrawl/crawl-data/CC-MAIN-2018-47/segments/1542039746386.1/warc/CC-MAIN-20181120110505-20181120132505-00131.warc.gz
CC-MAIN-2018-47
6,457
10
https://bufferwall.com/posts/781177001ay61b/
code
We have open the source code for the Total.js FlowStream Designer. So you can collaborate on this designer together with us. FlowStream Designer is open-source We are excited to announce that we open the source code for the Total.js FlowStream Designer. So you can collaborate on this great product together with us. Total.js FlowStream Designer is standardly under MIT license so that you can provide it in your projects or on your servers without any limits or fees. Other posts from Total.js Platform - 2021-12-01November report 2021 - 2021-11-01October report 2021 - 2021-10-08Server-Sent events with Total.js - 2021-10-01September report 2021 - 2021-09-16Custom FlowStream execution - 2021-09-14Improved FlowStream components - 2021-09-10Processing live video stream in Total.js / Node.js - 2021-09-08New release for Total.js v4 with great new improvements - 2021-09-02August report 2021 - 2021-08-11MJPEG streaming through HTTP in Node.js / Total.js
s3://commoncrawl/crawl-data/CC-MAIN-2021-49/segments/1637964363400.19/warc/CC-MAIN-20211207140255-20211207170255-00274.warc.gz
CC-MAIN-2021-49
955
15
https://egpu.io/forums/builds/lenovo-thinkpad-t420-exp-gdc-v8-x-expresscard-version-geforce-gtx-970-gaming-4g-msi/
code
Operating System: Windows 7 Ultimate 64-bit (6.1, Build 7601) Service Pack 1 (7601.win7sp1_ldr.190516-0600) System Manufacturer: LENOVO System Model: 4236VEH BIOS: Default System BIOS Processor: Intel(R) Core(TM) i5-2520M CPU @ 2.50GHz (4 CPUs), ~2.5GHz Memory: 8192MB RAM DirectX Version: DirectX 11 I just followed manual guide that's provided by exp gdc, artikel from this forum and some tutorial on youtube. At first attempt, I tried to install it on my laptop with SSD western 500 gigs and 16 gigs ram windows 7, sometimes worked and some didn't and blue screen appeared. I upgraded my windows to 10, it's been working better for few hours, then blue screen started again. Downgrade the ram to 8, 4, 2 didn't work for me, downgrade my windows to 7 again, tried with different ram size didn't work either. I installed back my old hitachi 320 gigs, with pair 2 gigs ram, connect the egpu, installed all laptop driver, updated it, updated windows (didn't install driver for gtx yet) let it for one or two hours, restarted the computer, after restart I found nvidia driver has been installed in my computer, I wasn't sure did I do that or not, was so sleepy (my guess it was windows auto update, have any of you ever experienced this? because I always turn my auto update of). I tried and it worked with 4 gigs of ram, after that I put 4+4 gigs ram and still working. Well, it's working this time. I hope you can see screenshot from my screen, not sure how to post it, new to egpu and new member to this forum, still don't have button to upload images still trying to install game Thanks for writing about the T420, which is what I have. So, it seems like you were able to use the Expresscard slot to connect the dock and run things? That's the set up I'm considering. And, of course, the real question is "does this eGpu give you a noticeable difference in performance?"
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572515.15/warc/CC-MAIN-20220816181215-20220816211215-00722.warc.gz
CC-MAIN-2022-33
1,872
13
https://www.alibabacloud.com/help/doc-detail/28961.htm
code
Logs are records of changes made within a system. The records are ordered by time. These records contain information about operations on specific objects and the results. Log data is stored in different forms such as log files, log events, binary logs, and metric data. Each log file consists of one or more log entries. A log entry is the basic unit of data that can be processed in Log Service. Each log entry describes a single system event. A log group is a group of logs that serves as the basic unit for read/write operations. A log topic is used to classify logs in a Logstore. You can specify a topic for logs written to Log Service. Then, you can specify the topic when you query the logs. A project in Log Service is used to separate and manage different resources. You can use a project to manage all the logs of an application and related log resources. You can use a project to manage server groups that are configured for log collection and Logstores that are created in the project. All of your Log Service resources are accessed through the endpoints of projects. A Logstore in Log Service is used for log data storage and query. A Logstore belongs to one project. You can create multiple Logstores for a project. A Logstore consists of multiple shards. Each shard is allocated with an MD5 hash value interval that is left closed and right open and does not overlap with each other. All the intervals construct the entire range of MD5 hash values.
s3://commoncrawl/crawl-data/CC-MAIN-2021-25/segments/1623488544264.91/warc/CC-MAIN-20210623225535-20210624015535-00010.warc.gz
CC-MAIN-2021-25
1,463
6
http://forums.cnet.com/7723-6142_102-578943/explorer-cut-paste-error/
code
Explorer Cut & Paste Error by racsw - 11/28/12 7:03 PM I have all the latest upgrades on my XP system. It is a Quad Core 2.66 GHz processor with 3 Gb of RAM, 250 GB HD, (1/3 full) and Service Pack 3. I did have a virus or trojan some time ago (2 - 3 months) which was successfully removed, and the computer has been working *almost* perfectly since. Explorer, the one that moves files around, seems to be damaged somehow. If I try to Cut and Paste a small file, or drag it, it usually will be OK. If I try to C&P (or drag) larger files or folders, it will start, then I get the usual message "Explorer has encountered a problem and must close." That's it, no error codes or anything else. So I thought that I might be able to work around it by downloading another mfg of an Explorer look-a-like, which I tried two others that seemed to be well made and professional. Strangely, I get the same problem with the look-a-like Explorers doing the same C&P operations. So to me, it's more of a "system" problem than Win Explorer itself, but I'm not sure, or what to do about it. Thank you for your help.
s3://commoncrawl/crawl-data/CC-MAIN-2015-22/segments/1432207928865.24/warc/CC-MAIN-20150521113208-00079-ip-10-180-206-219.ec2.internal.warc.gz
CC-MAIN-2015-22
1,097
9
http://stackoverflow.com/questions/13262670/xcode-subversion-control-not-able-to-commit-any-newly-added-physical-file-folder
code
I had created a new folder physically in my project's physical folder. Subsequently I dragged and dropped the new folder into my xcode project. After i added the new folder into my xcode project, only the project file reflected the changes, but there is no any 'A' icon beside the new folder. And hence i can not commit the physical folder into my SVN as well. Any clues for this?
s3://commoncrawl/crawl-data/CC-MAIN-2016-22/segments/1464049282275.31/warc/CC-MAIN-20160524002122-00088-ip-10-185-217-139.ec2.internal.warc.gz
CC-MAIN-2016-22
380
3
https://zolfiepref.ml/4398-oracle-exam.php
code
But not always! Whizlabs provides you high-quality certification training courses at affordable prices. - mindhub™ The Certification Prep Store | By Pearson VUE - Mindhub U.S.A. and Canada; - Aptech Education Offers & Promo Codes? - dominos pizza monday coupon. - mira mesa bowling lanes coupons. - Oracle Certification Exam Vouchers! - Whizlabs Coupons & Promo Codes. - best f pace deals? We understand the importance of passing the certification exam in the first attempt. We also know how intimidating it can be to fail the exam after paying a significant amount. Whizlabs training courses and practice tests are created by the team of Subject-Matter Experts and Certified Professionals. - free royal farms coupons! - lg led tv deals. - seacrets ocmd coupons. - the hangout seal beach coupon. - loch fyne coupon code? - Kaplan IT Training Coupons 15% OFF | VoucherCodesUAE; With the regularly updated content, you have both the information you need and the support along the way. Whizlabs questions and explanations are very helpful to understand exam subjects. Coupons in Your Inbox! With solving these questions, I understand a lot of subjects better. Thanks to the training I got by answering your questions, I was able to identify weak points in my studies and read up on them. These Practice exams are really great resource of learning and before attempting the associate Architect certification, very well explanation help us to understand the answer better. - Whizlab Top Coupon & Discounts. - Our Partners? - IT Exam Vouchers & Certifications Online - 10% Discount; - rainbow ryders coupons. - best buy coupons keyboards; - IT Certification Exam Vouchers. - Juan Leguizamon. Thanks Whizlabs. The practice tests were very helpful. They were current and had links to the documentation that supported the answers which was also very helpful. Thanks Whizlabs! The passing score is The candidates will get minutes to complete the exam. However, non-native English candidates will The candidates are required to answer 77 questions in total.soilstones.com/wp-content/2020-06-23/3441.php Get All Oracle 1Z Exam Questions with Practice Test: actual dumps: dumpsit The questions are Single and Multiple Choice types. But the non-native English speakers are eligibl The candidates will get 90 minutes to finish the exam. Students who are non-native Engl Any candidate who fails to get this minimum passing marks will not get the citrix certification. The exam consists of 68 que The candidates are required to answer 65 questions in total. The VMware exam is aimed to check the candidates on their abilities and skills administering, configuring and instal The exam duration is 2 hours i. The passing score for the Microsoft certification exam voucher is and any candidate who wants to qualify in Microsoft SQL Jude Niroshan. I like I actually did this when I was doing my OCA java 8. Kaplan IT Training Coupon Codes November 12222 But I'm sorry to ask this again, cos it's bit confusing and I have forgot how this process works. What I need to know is how to get this promotion? I have tried to book the exam through PearsonVue website after logging into my account. Actually, I couldn't find anywhere that they mention about promotion codes or something like that. I went up to scheduling the exam on a date in their wizard in PearsonVue , but there were nothing about the promotion. Can anyone who had done it in recently or anyone who knows how this works, can you please reply to this post, mentioning the step by step that I need to follow? Related oracle exam coupon Copyright 2019 - All Right Reserved
s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590347406365.40/warc/CC-MAIN-20200529183529-20200529213529-00417.warc.gz
CC-MAIN-2020-24
3,612
35
http://www.frogpond.de/2009/11/the-impending-enterprise-2-0-software-market-consolidation-what-to-watch-out-for/
code
I believe that much of the functionality we see in Enterprise 2.0 software today will eventually be integrated into other enterprise applications. In fact, I would not be surprised to see that beginning to happen in 2010, as the effects of the recession continue to gnaw at the business climate, making it more difficult for many vendors of stand-alone E2.0 software tools and applications to survive, much less grow. Smart questioning in this thought-provoking piece on the Enterprise 2.0 software market by Larry Hawes. My take has two perspectives: One is technology-related – while I assume that the shake-out will take longer than he predicts, the eventual outcome will be indeed in favor of systems with open APIs, standard-adherent mode of interconnectivity etc. It’s a good time for open source players thus too, making the situation more complex than if we were to look at “vendors” alone. But why will it take longer? Reasons include everything from vendor lock-in, a tough time for budgeting for yet another switch of systems and a general fear of “having to go through all that integration hassle” again. Second perspective is a bit more strategically, ie. factual market consolidation will be highly dependant of how the big players proceed. Big players like Oracle, SAP and Microsoft. Yes, I am speaking of elephants in the living-room. It will be interesting to see how they (and their acquisitions) will deal with the need for integration and interplay that are emerging as needs. I guess that the winners in that bigger race have to find a way to integrate various and diverse Enterprise 2.0 software application suites into their systems. This will also mean that they have to tweak their understanding of “integrated suite” as well. Thus, E2.0 may be the virus that changes the workings and DNA of its host (in a stealthy und unexpected way?) …
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100632.0/warc/CC-MAIN-20231207022257-20231207052257-00582.warc.gz
CC-MAIN-2023-50
1,881
4
https://community.bose.com/t5/In-Ear-Headphones/Soundsport-Free-Incompatability-with-Windows-10/m-p/259310/highlight/true
code
Feb 17, 2019 Bose released a new driver for this device. Go to bose website and use the device updater software updater. Download it - let it install. Put earbud back in case - connect to pc with usb cable - plug in - leave case open - run the installer it will open another window and you can see the progress in the browser... it take a while but eventually it should update the bose device to latest software that seems to work now. Feb 6, 2020 I'm about 3 years late, but if anyone still has this issue, I went through the window 10 settings and did the bluetooth device trouble-shooter. It recognized the issue and now I can chose from Stereo mode or Hands-free mode, instead of it connecting both and then defaulting to Hands-free so I could no longer pick stereo. Mar 29, 2020 How to connect Bose Sound Sport to Microsoft Surface? My Bose Sound Sport shows on the list of Bluetooth Devices Paired but does not appear as a sound device option when i run the SoundSport Free Wireless Headphones on my laptop and i run anything movie or sound , the audio is not stable the sound go and back for many time my SoundSport Free Wireless Headphones is updated for the last update is available on bose site. the laptop operation system is Win 10
s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320303868.98/warc/CC-MAIN-20220122164421-20220122194421-00074.warc.gz
CC-MAIN-2022-05
1,243
11
https://docs.eggplantsoftware.com/dai/DAI%207.0/test-case-view/
code
Test Case View lets you visualize the test case steps in your model. This view is read-only and does not allow editing. A test case must have at least one step to display a visualization. To view a test case: - Go to Designer > Test Cases - Click on the name of the test case that you're interested in. The Test Case View shows step numbers on the actions that are included in your test case. Test case steps that do not specify an action are excluded from the model visualization and are not runnable. Any action that is being used in the test case step (on the right) will display a step number in the model. When an action is used in more than three steps, the indicator on the action will only show the first, second, and final step numbers. For example, if an action is used by steps 3,4,5, and 6, then 3,4,...6 will be shown. The Steps tab displays the list of test case steps. Each valid step can display the following information: - Number of the step - Name of the state that contains the action - Name of the action Steps that use a submodel are followed by an additional item that includes the following details: - Name of the submodel - Name of the test case You can click on the name of a test case in the step list to go to a view of that test case. The Parameters tab displays parameter names and values grouped by step number. If a test case is invalid then a message will replace the Model Visualization. A test case can become invalid if at least one of its steps is invalid for one of the following reasons: - The state or action does not exist. - The state or action name was changed. - The action now exists in a different state. Invalid steps are highlighted in the Step List with a yellow number and border. The invalid step will display a brief message that describes the validation issue. Test cases are validated when their model is updated.
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947473347.0/warc/CC-MAIN-20240220211055-20240221001055-00276.warc.gz
CC-MAIN-2024-10
1,867
22
https://www.quantiki.org/conference/quantum-roundabout-2016
code
Quantum Roundabout is a postgraduate conference on quantum physics, to be held between the 6th and 8th of July of 2016 at the School of Mathematical Sciences of The University of Nottingham. This event intends to bring together early career researchers, working at the crossroads between physics and applied mathematics, providing them with the opportunity to network and interact with their peers in related areas, as well as recognised experts. The conference is open to young researchers from universities all over the UK and overseas, and it is aimed to cover the mathematical foundations of three active research areas of quantum physics, all intimately interconnected, namely: Quantum Entanglement, Open Quantum Systems and Quantum Metrology. Three leading researchers in these fields have been invited to give lectures/tutorials on cutting-edge topics. Moreover, a flexible programme with room for up to 24 short talks and a dedicated poster session has been devised to encourage an active contribution from all participants. The invited speakers are internationally renowned experts in their fields. They will deliver an introductory lecture to their field of specialisation, as well as a follow-up talk discussing the state of the art and prospective developments in the area. Quantum Entanglement: Prof. Karol Życzkowski Prof. Życzkowski is an established mathematical physicist currently holding chairs at Jagiellonian University, Krakow, and the Polish Academy of Sciences, Warsaw. He has provided widely recognised contributions to quantum measurement, quantum entropy and entanglement, as well as the theory of voting. He is the author of the highly cited book “Geometry of Quantum States: An Introduction to Quantum Entanglement”. Open Quantum Systems: Prof. Sabrina Maniscalco Prof. Maniscalco is the chair of Theoretical Physics at Turku and the leader of the Open Quantum Systems research group. She has contributed substantially to quantum stochastic processes, the theory of open quantum systems and non-Markovian dynamics. She is coordinating a European FET Project on Quantum Probes for Complex Systems, and has been in charge of original outreach events like the Quantum Circus and the Quantum Game Jam. Quantum Metrology: Prof. Susana Huelga Prof. Huelga is a chair in Controlled Quantum Dynamics at the Institute of Theoretical Physics, Ulm. She delivered seminal contributions to quantum estimation theory, quantum computing, metrology and sensing technologies, classical stochastic resonance and the burgeoning field of quantum biology. Her work has elucidated the ultimate limits on the speed of evolution of mixed quantum states, and associated precision limits for estimation in the presence of noise. The registration is open from 1 March 2016 to 29 April 2016. The registration fee is £60 for all accepted participants, which must be paid when their participation is confirmed (decisions expected May 2016). This will cover accommodation, breakfast and lunch throughout the conference and the conference social which will include the conference dinner. Participants are expected to pay for their travel to and from the conference (there may be very limited additional funds to provide funding for travel for a small number of participants).
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296946535.82/warc/CC-MAIN-20230326204136-20230326234136-00250.warc.gz
CC-MAIN-2023-14
3,279
10
https://vivo.library.tamu.edu/vivo/vis/map-of-science/n4724269a
code
Using information cached at 12:38 AM (Sep 29 2023) mapped % of publications BROWN UNIV PROVIDENCE RI DIV OF ENGINEERING Map of Science Visualization No publications in the system have been attributed to this organization. Please visit the BROWN UNIV PROVIDENCE RI DIV OF ENGINEERING profile page for a complete overview.
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510498.88/warc/CC-MAIN-20230929054611-20230929084611-00640.warc.gz
CC-MAIN-2023-40
320
6
https://www.maxproxy.com/blog/relationship-between-proxy-ip-server-and-wireless-router/
code
Many people may need to become more familiar with proxy, especially those new to proxy IP, and often need help distinguishing between a proxy server and a wireless router. But in fact, there is a big difference between the two devices. Otherwise, the IP mobile phone software will not appear, and the proxy IP server has nothing to do with the wireless router. A wireless router is a device used to connect local and wide area networks on the Internet. An IP address is one way of finding a server on the Internet. For example, the public IP address is equivalent to the name of a street or community, while the local IP address is equivalent to the name of each house number in the community. The Internet IP address belongs to the external network address and can be used to connect to the external network. A proxy server is a service software built on the TCP/IP protocol network layer. Standard service items include WWW and FTP. From this, the hardware configuration of the proxy server is higher than that of the wireless router; that is to say, there is a big difference between the proxy server and the wireless router. The above introduction gives everyone a thorough understanding of the proxy server. If you are concerned about the security of your online information, a proxy server cannot guarantee your privacy. If you need to apply for a proxy IP, but want your privacy to be protected, then you should choose a high-anonymity proxy IP. Domestic MaxProxy is perfect; you can try it Leave a comment
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296949678.39/warc/CC-MAIN-20230331175950-20230331205950-00040.warc.gz
CC-MAIN-2023-14
1,513
5
https://mail.python.org/pipermail/mailman-users/2014-August/077614.html
code
[Mailman-Users] Scrub_nondigest removing html message text mark at msapiro.net Wed Aug 13 03:52:16 CEST 2014 On 08/12/2014 06:34 PM, Peter Shute wrote: > Thanks for that. We're on cpanel, so I assume we can't adjust ARCHIVE_HTML_SANITIZER? That depends on your cPanel hosting service, assuming this is a hosted list. If it's your own server, you will find Defaults.py and mm_cfg.py > I'm not sure we need html emails to come through as html, but we at least want plain text, not a link to a messed up html message. Set the following in your list's Content filtering section. filter_content = Yes filter_mime_types - empty plus any other mime types you want to allow. filter_filename_extensions - Defaults are OK pass_filename_extensions - empty collapse_alternatives = Yes convert_html_to_plaintext = Yes Mark Sapiro <mark at msapiro.net> The highway is for gamblers, San Francisco Bay Area, California better use your sense - B. Dylan More information about the Mailman-Users
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662531779.10/warc/CC-MAIN-20220520093441-20220520123441-00309.warc.gz
CC-MAIN-2022-21
976
19
https://solidarityeconomy.us/help
code
Problems with this directory are the responsibility of the Data Commons Cooperative. Please believe we are not deliberately setting out to ruin your day and make your blood boil. If we had but world enough and time, and you didn't have any allergies, we'd arrange for fluffy kittens to gambol around your feet whenever you chose to visit, and we'd have a team of enthusiastic researchers on call to find whatever you needed. Unfortunately we've made the questionable decision to use computers instead, inevitably leading to sadness and ill-feeling. When that happens, please contact us! We're a helpful bunch, when not hiding behind a computer. How up-to-date is the information I find in this directory? The directory is curated by small teams of moderators from various member organizations of the Data Commons Co-op. At the start of any listing, you should see a note about when it was last updated. Anything older than a year or two is not likely to be accurate. Each listing will also give all editors of that listing. Listings with editors are more likely to be accurate. I found an organization I don't like in your directory. Why is it there? If the listing for that organization says it is in the “data pool” of such-and-such, that shows which of our co-op members have approved it. If there is no language like that, then nobody is very attached to it, it just wafted in on the breeze. Can I get access to the database that runs this directory? Access to the database is currently limited to members of the Data Commons Cooperative. We encourage you to apply for membership to get complete access (including the full database, plus full database history since DCC incorporation, plus contributed data in source format from members, plus continuous updates for the duration of your membership). Can I use the software that runs this directory? Be our guest! The Data Commons Directory software is available under a free license at github.com/datacommons/stonesoup. There are elderly tips on installing it on Cultivate. We'd appreciate if you share improvements you make to the software. If you need to integrate the directory with an existing website, and don't have a team in place to do it, we may be able to put you in touch with a co-op familiar with the software that is available to do the work - contact us (or check the fine print at the bottom of any page for leads). How is all this work paid for? Membership fees of the Data commons Cooperative. Along the way, we've had wonderful help from funders and volunteers, check the acknowledgments at the bottom of this page, and the list on our donation page. Hmm, there's a problem. Any ideas, Benjamin? Nothing a few more alligators won't fix, Jim. Paul, what's the release date on the next batch of alligators? I've a better idea for where we should release the alligators.
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817200.22/warc/CC-MAIN-20240418061950-20240418091950-00492.warc.gz
CC-MAIN-2024-18
2,844
14
http://wetpixel.com/forums/index.php?showtopic=52799
code
I have a NA-RX100II housing on a flexitray II + handle and one Inon Z-240 strobe on each handle at the end of (5"+8+) arm assembly. Today I took my rig in the pool to familiarize myself with it. My take away: it's harder than it looks. One thing that got me puzzled was how much I should tighten the clamps. I found that if I tighten the clamps hard enough for the rig to be semi-rigid out of the water, the arms would be obviously impossible to reposition UW without first loosening the clamps. No big deal, except that fine tuning the clamps underwater might not be the righ thing to do. So what do experienced photographers do with their clamps? What's your "clamp workflow" for in-boat->diving->back-in-boat?
s3://commoncrawl/crawl-data/CC-MAIN-2018-26/segments/1529267863939.76/warc/CC-MAIN-20180620221657-20180621001657-00058.warc.gz
CC-MAIN-2018-26
712
3
https://curl.se/mail/lib-2001-09/0073.html
code
telnet on win32 Date: Mon, 24 Sep 2001 07:45:42 +0200 (MET DST) In the most recent pre-releases of curl 7.9 there's a fix from Linus Nielsen Feltzing applied that offers working telnet for win32. ** But it seems it only works on NT, not Windows 98! ** To get this sorted out before the 7.9 release, we need help. I can't fix this myself, and I will release 7.9 this week. If no one helps out here, we ship the next release without telnet for win32. -- Daniel Stenberg -- curl groks URLs -- http://curl.haxx.se/Received on 2001-09-24
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764494852.95/warc/CC-MAIN-20230127001911-20230127031911-00704.warc.gz
CC-MAIN-2023-06
532
9
https://wgmods.net/482/
code
Started as fun project. Its a collection of mods that i use. All mods comply with WG Fair Policy Rules. This is the first version with installer will be adding more features. Use on clean WOT or manually delete mods and res_mods folder. Start installer and pick your mods.
s3://commoncrawl/crawl-data/CC-MAIN-2019-04/segments/1547583657557.2/warc/CC-MAIN-20190116175238-20190116201238-00368.warc.gz
CC-MAIN-2019-04
272
4
https://forum.bestpractical.com/t/default-queue-in-creation-ticket-self-service-area/37975
code
Hi, when an unprivileged user create a ticket in the Self-Service Dashboard it appears a list of possible queue: I would like that it appears the ticket creation page with a dropdown menu for the queue (and “Assistenza” as default… is it possibile? I don’t think you can change this with a simple config option. You’d need to make a local Mason element that was a combination of the functionality of /SelfService/Create.html, and then point the hyperlink from the menu tab to that page rather than /SelfService/CreateTicketInQueue.html . Of course if you called your local one CreateTicketInQueue.html that would remove the last part of that (as the hyperlink would use the local version rather than the RT supplied one). I also came to this conclusion, but I think it’s too complex for my abilities, I’ll do some tests… Maybe it’s easier to create a custom field to choose between the 2 queues
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296946535.82/warc/CC-MAIN-20230326204136-20230326234136-00538.warc.gz
CC-MAIN-2023-14
912
9
https://www.itprotoday.com/management-mobility/red-hat-and-novell-update-linux-enterprise-oss-22-may-2008
code
Open source software vendors Red Hat and Novell released updates to their enterprise Linux OSs. Red Hat released Red Hat Enterprise Linux 5.2, and Novell released SUSE Linux Enterprise 10 SP2. According to the Red Hat Enterprise Linux 5 team blog, the version 5.2 release includes enhancements in the following areas: - Virtualization—Improved support for larger system configurations, including increased physical CPU support for to 64 CPUs per system, and memory support up to 512GB per system. - Security—Introduced new asynchronous kernel crypto hardware driver APIs. Also added SHA-256/SHA-512 password-encryption support as well as RFC4303 compliant auditing support. - Clustering—Introduced a Resource Event Scripting Language that enables sophisticated application failover capabilities. Also improved iSCSI support. - Networking—Improved IPv6 compliance and SNMP IPv6 suppor. Now supports IKE 2 for IPv6 IPSec support. Also includes improvements for the DHCPv6 client and server. - Desktop—Updates to desktop applications, including Open Office, Firefox, and Adobe Reader. According to a Novell press release, the SUSE Linux Enterprise SP2 improvements include: - Virtualization—Full support for virtualized Server 2008 and Windows Server 2003. The company also says the SP2 release is now the only third-party virtualization solution that offers full support directly from Windows Server guests. In addition, extensive updates to the YaST management toolset encompass first-boot enhancements and network module support for new devices. - Networking—IPv6 support. - Hardware Upgrades—New network and storage drivers, and support for IBM cryptographic hardware. - Interoperability—Improved Windows and Microsoft Office interoperability through local NTFS file-system support, and improved Active Directory (AD) integration. - Wireless—New plug and play support for wireless broadband (i.e. UMTS,3G). - Subscription Management—Introduced subscription management tool for SUSE Linux Enterprise. Company says it easily manage SUSE Linux Enterprise software updates while maintaining corporate firewall policy and regulatory compliance requirements. The Novell press release is at www.novell.com/news/press/novell-delivers-suse-linux-enterprise-10-enhancements-in-service-pack-2.
s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267160568.87/warc/CC-MAIN-20180924145620-20180924170020-00069.warc.gz
CC-MAIN-2018-39
2,305
15
https://ph.answers.yahoo.com/activity/questions?show=SA6JJOJYUCBURG3VQCIHG7IOZQ&t=g
code
I'm currently learning Spanish, polish, and a bit of Italian, and I want to get into some Japanese. I started with Spanish and Polish back in late 2013 / early 2014, and just started Italian a month ago. I've been considering holding off Italian (since it's very similar to Spanish), and holding back learning Polish (since both of my parents speak Polish all the time, so it's unlikely for me to forget any vocabulary, and if anything, only an infinitesimal amount). I haven't been studying Spanish as much, because I feel as if I should be learning Japanese; I've been wanting to learn it since I started studying Spanish back in 2013/14. I've been getting so much free time lately, but I can't get myself to even begin to study Japanese. Let alone keep up with Spanish and Polish. Please give me some advice on what I should do.
s3://commoncrawl/crawl-data/CC-MAIN-2018-05/segments/1516084886952.14/warc/CC-MAIN-20180117173312-20180117193312-00334.warc.gz
CC-MAIN-2018-05
831
1
https://forums.gta5-mods.com/topic/4230/car-packs-and-texture-popins/1
code
Car packs and texture popins. I've noticed there's barely any carpacks around. Why isn't someone collecting the good once and making a pack, either for adding cars or replacing ingame once? I have tried a carpack i found somewhere else, it was only replacing ingame cars, not adding. But i noticed that carpacks causes texturepopins, i'm not sure why as the amount of cars are the same, and the game isn't using all the vram. @fusk Is this a request? If so, then it belongs in the requests section. Also, as for someone making a car pack, I believe the reason it hasn't been done is because it would require a lot of permissions from a lot of different modders. you'd be best to make your own, though from the one screenshot I have seen of someone doing it, it creates a lot of lag. Well, i use the word "why" and a question mark. Not sure how that does not come across as a question, but that is my fault for not being clear enough. But you answered it anyway, so thanks for that. I tried with a 300+ car replacement pack. It worked fine, but the texture popins from the world ruined it, so i removed it. But i liked the idea. I suppose 300+ is just overkill.
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224652569.73/warc/CC-MAIN-20230606114156-20230606144156-00188.warc.gz
CC-MAIN-2023-23
1,160
7
https://www.element14.com/community/docs/DOC-80788
code
The Designer Systems DS-SCX18.S is an eighteen channel RC servo driver with advanced servo control features. Specifically targeted at the Arduino UNO board user [all other Arduino boards supported] and the Raspberry-PI the SCX18.S features high speed I2C communication for easy project integration and smooth speed control. Once connected each servo can be positioned (with speed control), enabled, reversed and soft-started by simply writing a value to an internal register over the connected I2C interface. The SCX18.S caters for the majority of servos by providing a wide pulse width range of 0.50mS to 2.50mS with 8uS per step accuracy and also provides global activation of new servo position, soft-start & movement complete registers for superior control. The SCX18.S provides dual high power regulators capable of sup-plying 5V @ 3A to the con-nected servos from an external Li-Pol or Ni-MH battery pack of 7.2 to 8.4V and features a disable link to allow the use of low voltage battery packs of 3.6 to 4.8V. The on-board I2C pull-ups are jumper configurable to allow disconnection when connecting to the Raspberry-PI, which has its own pull-ups. Applications: Robotics, including quadruped, hexapod and octopod robots, process control & sensor manipulation when used in conjunction with standard RC servos. - Arduino UNO Shield standard form factor for simple integration into any Arduino project. - I2C interface for simple connection to Arduino or Raspberry-PI. - Dual on-board 5Volt 3Amp regulators, with heatsinking, for servo power with enable jumpers. - Sixteen (16) level speed control for each servo. - I2C address links allow up to four shields to be used together to provide up to 72 servos. - Movement complete and soft-start complete status for each servo. - Global activation control ensures all servos start moving together, important for multi-legged robots.
s3://commoncrawl/crawl-data/CC-MAIN-2020-45/segments/1603107878662.15/warc/CC-MAIN-20201021235030-20201022025030-00496.warc.gz
CC-MAIN-2020-45
1,883
11
https://nbailey.ca/tags/linux/
code
In my endless quest to essentially create a Cisco Firepower firewall for poor people, I found a bit of a gap in the open source security ecosystem. While we have great tools for detecting malicious network traffic patterns, we don’t have easy ways of detecting malicious files in transit. So, a bit of fiddling around later, and I have a fairly basic system for integrating Suricata’s ‘filestore’ functionality with ClamAV’s real time scanning, thereby producing a log containing the source and destination addresses of any malicious files detected. The idea of this setup is to protect the Small Systems as well as we protect the Big Systems. This solution uses a proven stack to protect webservers from modern threats. Using OSSEC, Suricata, and the built-in firewall capabilities of a modern Linux system it is possible to build a low maintenance and stable threat protection platform with relatively low performance impacts. It’s been specifically designed to be simple. The idea is that it will keep you on a ‘need to know basis’ and otherwise stay quiet and do it’s job. On the 19th of January 2020, a malicious actor launched an attack against my home infrastructure. At 42 minutes after midnight a device located in Buenos Aires, Argentina began attacking my proxy server. For the next six minutes, approximately 150 malicious HTTP requests were made. Fortunately, every single one of these requests was met with a HTTP/400 response, that’s because I don’t use Apache Struts 2 which this bot was attempting to exploit. Recently, I found myself in a situation where I needed to quickly replace a broken router. In times like these, you must improvise and think on your feet… The device in question was an old, rusty but trusty IBM ThinkPad T60. This particular machine has a special history for me. I salvaged it from a pile of e-waste at my old job as a PC tech many years ago, and that summer it was my playground for learning Linux ultimately starting the career which I currently enjoy. TL;DR The default settings for Logstash index rotation are bad and will break your cluster after a few months unless you change the rotation strategy. If you’re anything like me, you probably read somebody’s cool blog about how awesome ELK stack is and just had to have a piece of it. So you went through the quick start guide, googled your way through getting it up and running, then BAM you had an awesome logging system with all the bells and whistles! Think of it like, “OpenStack for cheapskates." There are plenty of ways to automate the provisioning of virtual machines, and while this isn’t the best way it certainly works great for me. I am fortunate enough to have a very heterogeneous environment at home; aside from a few appliances nearly all my virtual machines are running Ubuntu 18.04. This approach certainly won’t work for those who have a mixed environment with different versions Linux, Windows, and BSD derivatives. With the move from sysvinit to systemd, there were lots of small but important changes to the Linux ecosystem. One of them was the move from traditional syslog daemons to Systemd Journald. Now I’m not going to say this is a good or bad thing, as it entirely depends on your old habits and new optimism. What it does mean is a move to a faster and more flexible system log format but at the cost of some added complexity. I have, for a long time, been fascinated and terrified by “Virtual SAN” solutions. The idea of combining storage and compute seems on the surface very attractive. It allows us to scale out our storage and compute together or separately in relatively small and affordable units, helping avoid the sticker shock of the upfront cost of storage systems. And as somebody especially prone to capex-phobia, that really is a great solution. No, I would not like to say hello, Cortana. Nothing is as monotonous, boring, and brain-numbingly automatable as installing Windows, installing applications, joining a domain, and clicking all the right boxes in all the right places. And it’s even worse in the latest versions of Windows 10, where we’re greeted by the condescending robot voice of Halo’s deceptive antagonist artificial intelligence during the OOBE setup phase. I’ve taken a particular liking to MDT, Microsoft’s solution to the absolute eye-glazing snorefest of configuring a new workstation or server.
s3://commoncrawl/crawl-data/CC-MAIN-2020-34/segments/1596439737225.57/warc/CC-MAIN-20200807202502-20200807232502-00554.warc.gz
CC-MAIN-2020-34
4,409
9
http://superuser.com/questions/501899/how-to-visualize-screen-overlaps-in-chrome
code
Is there some way to show the overlapping between two screens in chrome? I usually use "page up" and "page down" when I read on my computer. This works quite well in Acrobat Reader as it detects the last line of the previous screen (or page) and only shows the new content. The worst case is: I have one additional line of old text. In Chrome a significant part of both screens overlap (usually 5-7 lines). It is very bothersome to find the point where I stopped reading, especially if this is the last portion of the website and the screen shows way more than 5-7 lines of the old text. I want to have a visual mark where the old stuff stops and the new content begins. Something like this mockup: Imagine I read this page and I am done reading. I press "scroll down". As you can see about 5 lines overlap. I want something like the grey line that shows me where to pick up reading. Does such an addon or plugin exist for chrome? I do not care how the visualization is provided. The old text might be hi-lighted or grey.
s3://commoncrawl/crawl-data/CC-MAIN-2016-30/segments/1469257824345.69/warc/CC-MAIN-20160723071024-00114-ip-10-185-27-174.ec2.internal.warc.gz
CC-MAIN-2016-30
1,021
6
https://docs.spydra.app/products-overview/networks/nodes-peer-orderer-and-ca
code
Nodes play a crucial role in maintaining the integrity and security of the blockchain network. They work together to ensure that transactions are processed accurately and that the blockchain remains tamper-resistant. There are 3 types of Nodes in a Hyperledger Fabric network: Orderer, Peer and Certificate Authority Nodes The orderer nodes are responsible for maintaining the order and consistency of transactions on the blockchain. They ensure that all transactions are recorded in the correct order and that there are no conflicts between them. Spydra supports the Raft protocol which is the de-facto implementation of ordering service for Fabric v2.x networks. Guidance on choosing orderer node size and number: Every pre-configured network size provided by Spdra has a default size and number for the orderer nodes. You can change the number of orderer nodes while creating or joining a network. All organizations need not deploy orderer nodes. Organizations that want to be part of the blockchain network consensus process should deploy orderer nodes. The total number of orderers in the network should be an odd number as this is recommended for the Raft protocol. Raft provides Crash Fault Tolerance (CFT). Having more number of nodes improve resiliency as more nodes can be lost and the ordering service can still be functional. A five node cluster, for example, can tolerate two down nodes, while a seven node cluster can tolerate three down nodes. However, more nodes mean a larger communication overhead, which could eventually slow the network. Raft clusters of more than a few dozen nodes begin to see noticeable performance degradation. Adding more number of nodes does not help with improving performance as orderer nodes are not load balanced. Choosing a higher size for the node does improve performance. Clusters of three, five, seven, or nine orderer nodes in a network are the most popular. For additional information on choosing orderer nodes, refer here. The peer nodes are responsible for executing transactions, maintaining the ledger, and participating in the consensus process. They communicate with other peer nodes to validate transactions and reach a consensus on the state of the ledger. Guidance on choosing peer node size and number: Every pre-configured network size provided by Spdra has a default size and number for the peer nodes. You can change the number of peer nodes while creating or joining a network. The size and number of the peer nodes have a direct bearing on the performance of the network. Peer nodes are load balanced. So, increasing the size and number of nodes generally improves performance. For additional guidance on choosing peer nodes, refer here. The Hyperledger Fabric Certificate Authority (CA) node is responsible for managing the digital certificates and identities of network participants. It uses a Public Key Infrastructure (PKI) system to issue and manage digital certificates that are used to authenticate and authorize network participants. Spydra provides a CA node for each organization by default and nothing additional needs to be done to enable this. The certificates and related keys are securely stored in a dedicated Hashicorp vault that is provisioned for each organization.
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707948234904.99/warc/CC-MAIN-20240305092259-20240305122259-00430.warc.gz
CC-MAIN-2024-10
3,253
20
https://cipher.nanvel.com/components.html
code
Session (trading session) A session starts from us adding or reducing position inside A session is considered closed when its position is adjusted to zero. A long session is a session that starts from adding to the position, a short session - starts from reducing the position. Multiple open sessions can coexist at the same time. Each session carries these attributes: position adjustment creates a new transaction (combines both base and quote assets move). stop_loss - session brackets. Brackets can use from cipher import percent session.take_profit = row['close'] * 1.015 session.take_profit = percent('1.5') # +1.5% of current price for long session session.stop_loss = percent('-1') # -1% of current price for long session session.stop_loss = None # disable stop loss meta - a dict-like object where we can store the session state. Each new session has a position equal to 0 initially. We can add to a position, or reduce a position (it can be negative). Each position change creates a transaction. There are multiple ways to adjust position: from cipher import base, percent, quote session.position = 1 session.position = base(1) # same as the one above session.position = '1' # int, str, float are being converted to Decimal session.position = quote(100) # sets position worth 100 quote asset session.position += 1 # adds to the position session.position -= Decimal('1.25') # reduces position by 1.25 session.position += percent(50) # adds 50% more position session.position *= 1.5 # has the same effect as the one above session.position = session.position.value + Decimal(1) # not recommended There is one signal that is required - entry. We can define as many as we want. To add a new signal: - a bool column, with name equal the signal name, have to be present in the dataframe returned by compose method - a signal handler has to be added to the strategy: on_entry is called only once for a new session. on_<signal> is being called for each open session. on_step - is similar to on_entry, only called for each row in the dataframe. Cipher supports multiple time series as input, they have to be combined into a single dataframe in the To add datas: cipher.add_source("binance_spot_ohlc", symbol="BTCUSDT", interval="1h") cipher.add_source("binance_spot_ohlc", symbol="ETHUSDT", interval="1h") Then we can access data inside def compose(self): self.datas # btcusdt ohlc self.datas # ethusdt ohlc self.datas.df # shortcut for self.datas Sources are reading data from apis, files, etc., in blocks and writes them to a file. There are a few sources already included: binance_futures_ohlc [symbol, interval] binance_spot_ohlc [symbol, interval] csv_file [path, ts_format] gateio_spot_ohlc [symbol, interval] yahoo_finance_ohlc [symbol, interval] Strategy explains Cipher when and how to adjust positions. This is the interface: from pandas import DataFrame from .models import Datas, Wallet from .proxies import SessionProxy as Session class Strategy: datas: Datas wallet: Wallet # def __init__(self, param1, param2): # self.param1 = param1 # self.param2 = param2 def compose(self) -> DataFrame: return self.datas.df def on_entry(self, row: dict, session: Session) -> None: pass # def on_<signal>(self, row: dict, session: Session) -> None: # pass def on_take_profit(self, row: dict, session: Session) -> None: session.position = 0 def on_stop_loss(self, row: dict, session: Session) -> None: session.position = 0 def on_stop(self, row: dict, session: Session) -> None: pass Strategies are stored in files, you can generate a new one using this command: cipher new my_strategy To run it: Cipher instance is a glue for Cipher components. cipher = Cipher() # we can pass settings as kwargs, otherwise, settings will be loaded from .env or ENV variables cipher.set_strategy(strategy_object) cipher.set_commission(commission_or_commission_object) cipher.add_source(source_name_or_source_object, **source_kwargs) cipher.run(start_ts, stop_ts) # process data according to the strategy and generate output cipher.sessions # returns sessions cipher.stats # builds and returns stats object cipher.output # raw output, contains the dataframe and sessions cipher.plot(plotter_or_plotter_object_or_none, rows_or_none) # if plotter or rows is not specified, the values will be automatically selected Commission is an objects that implements this interface: from abc import ABC, abstractmethod from decimal import Decimal from cipher.models.transaction import Transaction class Commission(ABC): @abstractmethod def for_transaction(self, transaction: Transaction) -> Decimal: pass for_transaction method returns how much quote asset have to be deducted. By default, SimpleCommission is used, which returns the specified part from quote for each transaction. Commission is only computed for stats and plotter, it does not apply to the output. The wallet can be accessed from a strategy: Cipher wallet has two assets: base and quote, they both have 0 initially. The wallet does not have any limits, and assets can go negative. Transactions are being applied to a wallet adjusting the assets. Stats is the object returned by We can use the stats for strategy performance evaluation. Plotters take Output and build charts. Currently, two plotters are available: - finplot (doesn't work in jupyter notebooks) A custom plotter can be passed to Plotters accept rows, which describe to the plotter how to group charts, use it if default layout does not fit your needs. Rows can contain one of: rows = [['ohlc']] # show only ohlc rows = [['ohlc', 'ema50']] # show ema50 as well (it should be present in the dataframe) rows = [['ohlcv', 'sessions'], ['balance']] # show ohlcv with session marks on the top chart and balance in the bottom plot also accepts limit (number of rows to show) and start (where the plot starts). start can be one of: datetime, offset, negative offset. Indicator name can be appended with marker and color. See markers here. rows = [['ohlc', 'my_indicator|^', 'another_indicator|s|red']] Settings can be passed to Cipher as arguments or in .env or using ENV variables. cache_root contains path to the cache folder. Default: If there are a few directories with strategies, and we want to reuse one cache - we can specify the same cache_root for both.
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224649105.40/warc/CC-MAIN-20230603032950-20230603062950-00124.warc.gz
CC-MAIN-2023-23
6,257
74
http://blog.rustyice.co.uk/the-eigrp-enhanced-interior-gateway-routing-protocol-metric/
code
EIGRP (Enhanced Interior Gateway Routing Protocol) is a network protocol that lets routers exchange information more efficiently than was the case with older routing protocols. EIGRP which is a proprietary protocol evolved from IGRP (Interior Gateway Routing Protocol) and routers using either EIGRP and IGRP can interoperate because the metric (criteria used for selecting a route) used with one protocol can be translated into the metrics of the other protocol. It is this metric which we will examine in more detail. Using EIGRP, a router keeps a copy of its neighbour’s routing tables. If it can’t find a route to a destination in one of these tables, it queries its neighbours for a route and they in turn query their neighbours until a route is found. When a routing table entry changes in one of the routers, it notifies its neighbours of the change. To keep all routers aware of the state of neighbours, each router sends out a periodic “hello” packet. A router from which no “hello” packet has been received in a certain period of time is assumed to be inoperative. EIGRP uses the Diffusing-Update Algorithm (DUAL) to determine the most efficient (least cost) route to a destination. A DUAL finite state machine contains decision information used by the algorithm to determine the least-cost route (which considers distance and whether a destination path is loop-free). The Diffusing Update Algorithm (DUAL) is a modification of the way distance-vector routing typically works that allows the router to identify loop free failover paths. This concept is easier to grasp if you imagine it geographically. Consider the map of the UK midlands shown in Figure1. The numbers show approximate travel distance, in miles. Imagine that you live in Glasgow. From Glasgow, you need to determine the best path to Hull. Imagine that each of Glasgow’s neighbours advertises a path to Hull. Each neighbour advertises its cost (travel distance) to get to Hull. The cost from the neighbour to the destination is called the advertised distance. The cost from Glasgow itself is called the feasible distance. In this example, Newcastle reports that if Glasgow routed to Hull through Newcastle, the total cost (feasible distance) is 302 miles, and that the remaining cost once the traffic gets to Newcastle is only 141 miles. Table1 shows distances reported from Glasgow to Hull going through each of Glasgow’s neighbours. Glasgow will select the route with the lowest feasible distance which is the path through Newcastle. If the Glasgow-Newcastle road were to be closed, Glasgow knows it may fail over to Carlisle without creating a loop. Notice that the distance from Carlisle to Hull (211 miles) is less than the distance from Glasgow to Hull (302 miles). Because Carlisle is closer to Hull, routing through Hull does not involve driving to Carlisle and then driving back to Glasgow (as it would for Ayr). Carlisle is a guaranteed loop free path. The idea that a path through a neighbour is loop free if the neighbour is closer is called the feasibility requirement and can be restated as “using a path where the neighbour’s advertised distance is less than our feasible distance will not result in a loop.” The neighbour with the best path is referred to as the successor. Neighbours that meet the feasibility requirement are called feasible successors. In emergencies, EIGRP understands that using feasible successors will not cause a routing loop and instantly switches to the backup paths. Notice that Ayr is not a feasible successor. Ayr’s AD (337) is higher than Newcastle’s FD (302). For all we know, driving to Hull through Ayr involves driving from Glasgow to Ayr, then turning around and driving back to Glasgow before continuing on to Hull (in fact, it does). Ayr will still be queried if the best path is lost and no feasible successors are available because potentially there could be a path that way; however, paths that do not meet the feasibility requirement will not be inserted into the routing table without careful consideration. EIGRP uses a sophisticated metric that considers bandwidth, load, reliability and delay. That metric is: Although this equation looks intimidating, a little work will help you understand the maths and the impact the metric has on route selection. You first need to understand that EIGRP selects path based on the fastest path. To do that it uses K-values to balance bandwidth and delay. The K-values are constants that are used to adjust the relative contribution of the various parameters to the total metric. In other words, if you wanted delay to be much more relatively important than bandwidth, you might set K3 to a much larger number. You next need to understand the variables: - Bandwidth—Bandwidth is defined as (100 000 000 / slowest link in the path) kbps. Because routing protocols select the lowest metric, inverting the bandwidth (using it as the divisor) makes faster paths have lower costs. - Load and reliability—Load and reliability are 8-bit calculated values based on the performance of the link. Both are multiplied by a zero K-value, so neither is used. - Delay—Delay is a constant value on every interface type, and is stored in terms of microseconds. For example, serial links have a delay of 20,000 microseconds and Ethernet lines have a delay of 1000 microseconds. EIGRP uses the sum of all delays along the path, in tens of microseconds. By default, K1=K3=1 and K2=K4=K5=0. Those who followed the maths will note that when K5=0 the metric is always zero. Because this is not useful, EIGRP simply ignores everything outside the parentheses. Therefore, given the default K-values the equation becomes: Substituting the earlier description of variables, the equation becomes 100,000,000 divided by the chokepoint bandwidth plus the sum of the delays: As a final note, it is important to remember that routers running EIGRP will not become neighbours unless they share K-values. That said however you really should not change the K-values from the default without a compelling reason.
s3://commoncrawl/crawl-data/CC-MAIN-2019-13/segments/1552912203409.36/warc/CC-MAIN-20190324083551-20190324105551-00460.warc.gz
CC-MAIN-2019-13
6,081
21
https://jref.com/threads/j-punk.5135/
code
Originally posted by killerwolf If you want some samples of Balzac you can check out my website (www.isolation13.com) There are a few songs there, and some videos too. Also, you can buy their cds at www.balzac308.com for cheap! I have been a fan of theirs for many years and the band members are personal friends of mine. Give them a listen, I think you guys might enjoy them. Originally posted by METALLICA japanese music are so hard to categorize... they all soind mix to me... j punk huh?
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510319.87/warc/CC-MAIN-20230927171156-20230927201156-00401.warc.gz
CC-MAIN-2023-40
491
5
http://www.ipam.ucla.edu/abstract/?tid=13071&pcode=CAWS1
code
Vision algorithms have achieved impressive performances in visual recognition. Nevertheless, an image is worth a thousand words, and not all these words refer to visible properties such as objects and scenes. In this talk we will explore the subjective side of visual data, investigating how machine learning can detect intangible properties of images and videos, such as beauty, creativity, and more curious characteristics. We will see the impact of such detectors in the context of web and social media. And we will analyze the precious contribution of computer vision in understanding how people and cultures perceive visual properties, underlining the importance of feature interpretability for this task. Back to Workshop I: Culture Analytics Beyond Text: Image, Music, Video, Interactivity and Performance
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679516047.98/warc/CC-MAIN-20231211174901-20231211204901-00304.warc.gz
CC-MAIN-2023-50
812
2
https://www.techgig.com/nipulparikh
code
Present [ 2010] Software Developer/ Programmer Rangam Consultants Inc Role Description: Working as Software Developer on Microsoft technologies (primarily on web applications). My interest is working and exploring emerging technologies. 2011 - 2012 2008 - 2010 Information Technology, E-Commerce Sardar Patel University 2005 - 2008 Maharaja Sayajirao University of Baroda Exploring emerging tools and technologies. Reason to be on Techgig Career Enhancement,Job Prospects,Meeting People,Sharing Knowledge And Expertise
s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886104631.25/warc/CC-MAIN-20170818082911-20170818102911-00173.warc.gz
CC-MAIN-2017-34
518
13
https://publicdatalab.org/affiliations/university-of-amsterdam/
code
The United Nations has suggested the need for a “data revolution” to address urgent transnational issues such as climate change and inequality. It has endorsed not only improving national statistical data collection, but also opening public sector data up for broader societal re-use, as well as exploring the capacities of emerging forms of digital data, infrastructures and devices in understanding and responding to public problems. Over the past decade, open data and civic tech initiatives around the world have been set up to promote the re-use of public data for participation and involvement; citizens are gathering their own data on air, soil and biodiversity; and journalists and activists are increasingly using and creating data to support their investigations and campaigns around economic, racial and ecological justice. What do public data projects do? How do they invite and enable participation and action, and to what end? How can they be studied? How can we critically engage with their histories, social lives and politics? How might studies of these kinds of projects lead to modifications in data practice? The Field Guide to Public Data Projects explores methods and approaches for finding, following, gathering and comparing different kinds of projects involving public data – from data portals to data communities, sensing practices to mobile apps. Exploratory research for this project is being developed with support from the King’s Undergraduate Research Fellowship (KURF) scheme at King’s College London. How can we sense and make sense of forests with devices, techniques and our bodies? How might we cultivate an interdisciplinary “arts of noticing” (Tsing) for attending to forests and their role in critical zones? Engaging with themes in the Critical Zones exhibition and catalogue curated by Bruno Latour and Peter Weibel, this project explores different ways of listening to forests, drawing on different traditions, techniques, methods, media and approaches – from “Shinrin Yoku” (forest bathing) to sensing devices, data sonification to sound walks and storytelling. The project includes a public workshop with ZKM as part of the Critical Zones exhibition to explore and compare different approaches and the possibilities and limits of forest experiences under current sensing conditions between immediacy and mediation. For more on the use of digital data and devices to cultivate sensibilities towards trees and forests, see the Critical Zones field book and catalogue, including this chapter on “The Datafication of Forests”. Image: Sound Sketch – Forest Rain – Liz K. Miller What do data portals do? This initiative explores digital methods and approaches for studying data portals as online devices. This includes gathering an international research group on data portal studies, as well as developing a prototype tool and open source software library for repurposing data portal metadata in order to examine public sector datafication and the configuration of portals as sites of participation around public data. There is a repository, package and documentation for the prototype tool. For further background on this project see here and: How can we share different ways of doing things with digital data, methods and infrastructures? How can text, images, video, GIFs and other materials be used to provide accounts of digital methods, cultivate sensibilities towards interpretive work, surface tacit knowledge and encourage reflection on decisions, tools, devices, assumptions and materials? This is a project to gather, exchange and share digital methods recipes and “how-tos” for research, teaching and collaborations from across the Public Data Lab. You can see a preview of some of these here: http://recipes.publicdatalab.org/ A set of recipes developed as a collaboration between digital methods researchers at the Public Data Lab and digital journalists at First Draft can be found at: https://firstdraftnews.org/long-form-article/digitalrecipes/
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296818337.62/warc/CC-MAIN-20240422175900-20240422205900-00045.warc.gz
CC-MAIN-2024-18
4,032
18
http://mattlehti.club/expertlymolded.html
code
Project manager // Back end developer Expertly Molded is a faux pottery company for whom I have built an ecommerce website as part of a team project. It makes use of the PHPTAL library for dynamic rendering of content while maintaining code clean enough to be easily read by those unfamiliar with more traditional PHP. It is an ongoing project, as it will be receiving several periodic updates; so be sure to check back frequently for changes! The initial stages of this project entailed learning PHPTAL and laying out a file structure. Following that I created a database layout in 3rd normal form to ensure that all dependencies were accounted for. After the more theorhetical goals were outlined and the concepts were in place it became a matter of building the necessary files, becoming more acquainted with PHPTAL and combining it with more traditional SQL code. Currently, Expertly Molded is a work in progress, and its in-browser demo available for viewing here.
s3://commoncrawl/crawl-data/CC-MAIN-2017-39/segments/1505818695375.98/warc/CC-MAIN-20170926085159-20170926105159-00383.warc.gz
CC-MAIN-2017-39
969
5
https://syncbreeze.com/syncbreeze_server_sync_options.html
code
SyncBreeze Server provides the ability to schedule periodic file synchronization operations. In order to configure a file synchronization command to be executed periodically, open the file synchronization command dialog, select the 'Advanced' tab, enable the 'Periodic Sync' option and specify an appropriate time interval. Another option is to configure a file synchronization command to be executed at a specific time of the day. In addition to periodic file synchronization operations, SyncBreeze Server provides the ability to monitor the source and/or destination directories and automatically trigger a file synchronization operation when a user-specified number of changes is detected. In order to enable the real-time disk change monitor for a file synchronization command, open the file synchronization command dialog, select the 'Advanced' tab, enable the 'Monitor Changes' option and specify the number of changes that should trigger the file sync command. SyncBreeze Server provides a rich set of advanced file synchronization options such as file security attributes synchronization, bit-level file synchronization, file copy verification, etc. In order to configure advanced file synchronization options, open the file synchronization command dialog and select the 'Options' tab.
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296816939.51/warc/CC-MAIN-20240415014252-20240415044252-00442.warc.gz
CC-MAIN-2024-18
1,293
10
http://luassignmentxeqs.carolinadigital.us/rock-paper-scissors-spock-lizard.html
code
Rock paper scissors lizard spock free download - paper rock scissors lizard spock, sheldon's rock paper scissors lizard spock, rock, paper, scissors, lizard, spock. There was a fairly strangely written rpsls game on stack overflow here that inspired me (read: i was bored and figured it would be fun) to write a better one but i. Well, that is pretty intense and interesting, right in the game, most characters choose spock and thus it goes on and on and on rock paper scissors lizard spock. For folks too lazy to break out urban spoon when deciding on lunch, we offer a superior alternative to rock paper scissors and if you wear this shirt while making. Rock paper scissors spock t-shirt by 6 dollar shirts thousands of designs available for men, women, and kids on tees, hoodies, and tank tops. Rock-paper-scissors-lizard-spock is an expansion of the classic selection method game. How can the answer be improved. · can you name the rules of rock, paper, scissors, lizard, spock popularized by the tv show big bang theory. · how to play rock paper scissors lizard spock if you watch the big bang theory, you may have seen the episode where sheldon explains how to play rock paper scissors. Game description: play this new twist on a classic game choose from rock, paper, scissors, lizard, or spock, and hope the computer chooses one you can beat. The big bang theory - rock, paper, scissors, lizard, spock air date: 11/12/08 the guys on the big bang theory have an interesting way of settling their disputes. How to play rock, paper, scissors developed by sam kass and karen bryla and popularized on the big bang theory, rock-paper-scissors-spock-lizard is a. Rock, paper, scissors, lizard, spock is a variation of paper rock scissors game that extends amount of possible combinations making this game even more exciting.
s3://commoncrawl/crawl-data/CC-MAIN-2018-34/segments/1534221215487.79/warc/CC-MAIN-20180820003554-20180820023554-00555.warc.gz
CC-MAIN-2018-34
1,826
4
https://www.upwork.com/job/Modifications-current-wordpress-website_~019f46e003697a8ffc/
code
- Change the resolutions of the homepage logo on both mobile and desktop. The programmer that we highered previously and didn't make the logo compatible on both the mobile and the desktop. - On the about Tim page I would like to make the video section similar to the Tony Robbins page. In the fact that I would like to add the exact same layout of the videos and the quotes overlaying an image. The previous programmer didn't make either of these mobile compatible or aesthetically pleasing. The way this currently is, isn't the way that we need it.
s3://commoncrawl/crawl-data/CC-MAIN-2018-47/segments/1542039744561.78/warc/CC-MAIN-20181118180446-20181118202446-00072.warc.gz
CC-MAIN-2018-47
549
3
https://kriscarafelli.com/portfolio/relationship-ai/
code
Project at a Glance A Boston-based tech company that creates collaboration tools wanted to understand under what circumstances and conditions would a human want to work with an intelligent agent. My team and I began by conducting a literature review and used affinity mapping to organize the most salient themes around relationship building research. Then we used design thinking to develop scenarios and personas. We wrote the conversational interface script and conducted Wizard of Oz Testing. Finally, we created a prototype and system architecture.
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100603.33/warc/CC-MAIN-20231206194439-20231206224439-00789.warc.gz
CC-MAIN-2023-50
552
2
https://jeremy.linuxquestions.org/2017/02/10/bad-voltage-season-2-episode-3-has-been-released-and-those-who-dig/
code
Bad Voltage Season 2 Episode 3 Has Been Released: And Those Who Dig February 10, 2017 Leave a comment - [00:03:12] In the news this week: Vizio get fined $2.2m for secretly collecting everything you watch on their TVs and lying about it, police use someone’s pacemaker data to help prove that they committed arson, Uber hire a NASA person and start talking about flying taxis, and Streetmap lose their appeal after suing Google for unfairly pushing their own map product - [00:17:00] In honour of our special guest being @film_girl on Twitter, we’ve put together a list of “the good, the bad, and the ugly” in film: films that are really great, secretly great, and idiosyncratically terrible - [00:39:30] Jeremy reviews the Pico Brew, a device for brewing your own beer easily without having to buy all the glassware and a forty foot mash tun - [00:56:35] Is there actually a space for a successful “third player” in mobile phones? Microsoft, Ubuntu, Sailfish, Palm, RIM, all have foundered in pursuit of this market. And if there’s no space for it in phones, who will shift the market to some new _type_ of product, and what will that product be? Also, Bad Voltage are returning to SCALE in Pasadena in March for a live show! With free food and an open bar, and the 80s nerd rocker band the Spazmatics, the show’s gonna be great. Buy your SCaLE tickets now! Listen to 2×3: And Those Who Dig From the Bad Voltage site: Every two weeks Bad Voltage delivers an amusing take on technology, Open Source, politics, music, and anything else we think is interesting, as well as interviews and reviews. Do note that Bad Voltage is in no way related to LinuxQuestions.org, and unlike LQ it will be decidedly NSFW. That said, head over to the Bad Voltage website, take a listen and let us know what you think.
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917121869.65/warc/CC-MAIN-20170423031201-00455-ip-10-145-167-34.ec2.internal.warc.gz
CC-MAIN-2017-17
1,816
9
https://msdn.microsoft.com/en-us/library/system.runtime.remoting.contexts.icontributeenvoysink.getenvoysink.aspx
code
This API supports the .NET Framework infrastructure and is not intended to be used directly from your code. Takes the first sink in the chain of sinks composed so far, and then chains its message sink in front of the chain already formed. Assembly: mscorlib (in mscorlib.dll) - Type: System.MarshalByRefObject The server object for which the chain is being created. - Type: System.Runtime.Remoting.Messaging.IMessageSink The chain of sinks composed so far. Return ValueType: System.Runtime.Remoting.Messaging.IMessageSink The composite sink chain.
s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440644065464.19/warc/CC-MAIN-20150827025425-00334-ip-10-171-96-226.ec2.internal.warc.gz
CC-MAIN-2015-35
547
9
https://jobs.shastaventures.com/jobdetail.php?jobid=2588162
code
- Job Type: Full-Time - Function: Engineering Software - Industry: SaaS - Post Date: 04/02/2024 - Website: highspot.com - Company Address: 2211 Elliott Ave, Seattle, WA, 98121 About HighspotHighspot helps companies worldwide improve the performance of their sales teams by turning strategic initiatives into business outcomes. Highspot is pioneering the category that is fundamentally changing the way companies increase sales productivity. On a mission to transform the way millions of people work with sales enablement, Highspot is committed to building breakthrough software with a spark of magic. We believe a great place to work is about more than the work – it’s about what the company stands for, and how it authentically represents its values in the real world. To this end, we have put intentional focus on creating equitable workspaces for each of our employees. Our goal is to create a culture where everyone feels a deep sense of belonging and is empowered to be an agent of change, with the ability to transform themselves, their workplace, and their world. About the Role Our Machine Learning Team is developing next-generation AI capabilities for Highspot’s leading sales enablement platform. We stay at the forefront of machine learning research, continuously improving our models and algorithms through collaboration with product and data science teams. Our mission is to help our customers unlock the power of machine learning to improve productivities, sales performance, and achieve their business goals. We are looking for a Senior Machine Learning Engineer to join us in this effort. What You'll Do Collaborate with product and data science teams to identify opportunities that drive customer values, and define machine learning requirements, lead the development and deployment of machine learning solutions and applications, while ensuring scalability, reliability, and maintainability. Develop and maintain a robust machine learning platform that enables the efficient deployment and management of machine learning models across our product offerings. Stay up-to-date with the latest machine learning research and trends, and apply them to our product offerings, while mentoring and collaborating with junior team members to improve their technical skills Partner cross-functionally across all of Highspot’s feature engineering crews, as well as with QA/DevOps/Site-Reliability. Bachelor's or Master's degree in Computer Science, Engineering, Mathematics, or a related field 5+ years of experience in developing and deploying machine learning models and systems Strong proficiency in at least one programming language (Python, Java, C++, etc.) and experience with machine learning libraries (TensorFlow, Keras, PyTorch, etc.) In-depth understanding of machine learning concepts, such as supervised and unsupervised learning, deep learning, and natural language processing Experience with data processing tools and technologies, such as Spark, Flink, Hadoop, and SQL databases Strong problem-solving skills and ability to analyze complex data sets. Excellent communication skills and ability to articulate complex technical concepts to non-technical stakeholders An entrepreneurial spirit: you’re agile, creative, resourceful, and tenacious as you solve problems and achieve team and company goals. Comfortable with modern open source technologies and tools. Passion to learn new technologies and infrastructure. Highspot also offers the following employee benefits for this position: - Comprehensive medical, dental, vision, disability, and life benefits -Group Retirement Savings Plan (RRSP) and matching employer contributions (DPSP) with immediate vesting -Generous Holiday Schedule + 5 Days for Annual Holiday Week -Quarterly Recharge Fridays (paid days off for mental health recharge) -Flexible work schedules -Professional development opportunities through LinkedIn Learning -Discounted ClassPass membership -Access to Coaches and Therapists through Modern Health -2 Volunteer days per year Equal Opportunity Statement We are an equal opportunity employer and value diversity at our company. We do not discriminate on the basis of any grounds protected by applicable human rights legislation, which may include age, ancestry, citizenship, color, ethnicity, family status, gender identity or expression, genetic information, marital status, medical condition, national origin, physical or invisible disabilities, political belief, race, religion, or sexual orientation. Did you read the requirements as a checklist and not tick every box? Don't rule yourself out! If this role resonates with you, hit the ‘apply’ button."
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817382.50/warc/CC-MAIN-20240419074959-20240419104959-00134.warc.gz
CC-MAIN-2024-18
4,665
39
http://stackoverflow.com/questions/9891469/oauth2-token-validation-verification-in-spring
code
Does Spring provide a pre-built way of token validation/verification if the authorization server and resource server reside on different boxes? Is there a best practice? What do you think about creating my own service at the authorization server that the resource server can call for validation? Is that needed? The Resource Server's OAuth2ProtectedResourceFilter should validate the token against the same database that the Authorization Server used to store the token.
s3://commoncrawl/crawl-data/CC-MAIN-2014-15/segments/1397609535745.0/warc/CC-MAIN-20140416005215-00541-ip-10-147-4-33.ec2.internal.warc.gz
CC-MAIN-2014-15
470
2
https://ufoai.kristshell.net/wiki/Download
code
Welcome to the UFO:AI downloads page. Here you can find the official source code and packages. We also host other useful packages from community volunteers. The latest stable release is version 2.5. See our SourceForge download page for more v2.5 content. There are e.g. source archives and data archives available. |Source Source version 2.5 (≈24 MB) Data Data version 2.5 (≈937 MB) See compiling the source. |UFO:AI v2.5 is available in the Debian package repository since Stretch (Debian 9) Install it from a graphical package manager via the following command as root user: apt-get install ufoai |UFO:AI v2.5 is available in the Gentoo portage as games-strategy/ufoai Install via the following command as root user: |UFO:AI v2.5 is available in the Ubuntu Software Center since 16.04 LTS Xenial Xerus Install it from the Software Center application or via the following command: sudo apt-get install ufoai |UFO:AI v2.5 is available in the Mac Ports. To set up Mac Ports follow their guide. To install UFO:AI via Mac Ports run the following command: sudo port install ufo-ai |Win32 Release version 2.5 (≈1314 MB) Map Editor (Windows, x86) Map Editor (Mac OS X, x86) Version 2.6-dev is the work in progress version. It is considered unstable. It is only officially available through Git. |See how to get the source and compile it. If you're familiar with git but having trouble getting the very large repo, you can download a git bundle via torrent: File:UFO-Alien-Invasion-master-01d1bbf-2013-06-17.bundle.torrent Nightly builds (Windows, x86 - other platforms are coming soon) Warning: Keep in mind that this is the bleeding edge of development. The community provides binaries, though these binaries are often quickly outdated. |. Look at the last page, also this:
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817206.28/warc/CC-MAIN-20240418093630-20240418123630-00640.warc.gz
CC-MAIN-2024-18
1,775
27
http://www.polarhome.com/service/man/?qf=dump_concurrent_on&af=0&tf=2&of=HP-UX&print=1
code
dump_concurrent_on(5)dump_concurrent_on(5)NAMEdump_concurrent_on - enable/disable option for system to dump memory using multiple dump units when a kernel panic occurs On large systems, the time required to dump system memory when a kernel panic occurs can be excessive or even prohibitive, depending on how much physical memory is installed in the sys‐ tem. Concurrent dump capability results in faster dumps by dividing the task to different dump units which can execute in The default value for The system determines whether or not to dump with multiple units based on the resources (CPUs and disks) available on the system and the properties of the drivers. The (see crashconf(1M)) command and its associated configuration file control the dump concurrency mode in the memory dumps associated with a system crash. On rare occasions, the system may crash before is run during the boot process. On those occasions, the configuration set using the tunable will be used. Who Is Expected to Change This Tunable? Only HP Field Engineers should change the value of this tunable. Restrictions on Changing Changes to this tunable take effect immediately. When Should the Tunable Be Turned On? This tunable should be turned on to allow dumps to dump with multiple dump units when there is a system crash if there are sufficient What Are the Side Effects of Turning the Tunable Off? Dumps may take more time. When Should the Tunable Be Turned Off? The tunable should be turned off if there is a problem using multiple What Are the Side Effects of Turning the Tunable On? The system decides whether or not to use multiple dump units based on the resources available. What Other Tunables Should Be Changed at the Same Time? All HP-UX kernel tunable parameters are release specific. This parame‐ ter may be removed or have its meaning changed in future releases of Installation of optional kernel software, from HP or other vendors, may cause changes to tunable parameter values. After installation, some tunable parameters may no longer be at the default or recommended val‐ ues. For information about the effects of installation on tunable val‐ ues, consult the documentation for the kernel software being installed. For information about optional kernel software that was factory installed on your system, see at was developed by HP. SEE ALSOcrashconf(1M), alwaysdump(5), dontdump(5), dump_compress_on(5). Tunable Kernel Parameters - Integrity Systedump_concurrent_on(5)
s3://commoncrawl/crawl-data/CC-MAIN-2020-34/segments/1596439735836.89/warc/CC-MAIN-20200803224907-20200804014907-00425.warc.gz
CC-MAIN-2020-34
2,471
42
https://dev.mysql.com/doc/ndbapi/en/ndb-nodejs-api-session.html
code
A session is the main user access path to the database. The Session class models such a session. Session extends Context getMapping(Object parameter, Function(Object err, Object mapping) callback); Get the mappings for a table or class. parameter may be a table name, a mapped constructor function, or a domain object. This function returns a fully resolved Creates a new, empty batch for collecting multiple operations to be executed together. In an application, you can invoke this function similarly to what is shown here: var nosql = require("mysql-js"); var myBatch = nosql.createBatch(); Return an array whose elements consist of all current batches belonging to this session. Get the current void close(Function(Object error) callback); Close this session. Must be called when the session is no longer needed. Returns true if this session is closed. void setLockMode(String lockMode); Set the lock mode for read operations. This takes effect immediately and remains in effect until the session is closed or this method is called again. must be one of Array listTables(databaseName, callback); List all tables in database TableMetadata getTableMetadata(String databaseName, String tableName, callback); Fetch metadata for table
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100651.34/warc/CC-MAIN-20231207090036-20231207120036-00792.warc.gz
CC-MAIN-2023-50
1,233
24
http://hugelearning.com/data-manipulation-language/
code
Data Manipulation Language DML is the abbreviation for “Data Manipulation Language”. And include the most common SQL commands such as SELECT, INSERT, UPDATE, DELETE etc for data manipulation. And the SQL commands are listed below with short descriptions: |SELECT Command||SELECT commands is used to retrieve or fetch certain data from one or more tables.| |INSERT Command||INSERT commands is used to create data into a table.| |UPDATE Command||UPDATE commands is used to modifies the existing data within a table.| |DELETE Command||DELETE commands is used to Delete all records from a database table.| 1) MySQL INSERT Query/Command: MySQL INSERT statement is a process of inserting single record or multiple records into a table in MySQL. Also It must have column(s) of the same type as that of the content you’d like to insert. Syntax:Following are the SQL syntax of INSERT command to insert data into a MySQL table. Insert data into Columns: - INSERT INTO `table_name`: This statement is the SQL keyword And for this keyword, database know that you want to add new row into a table named i.e `table_name`. - `column_name1`, `column_name2`,…`column_nameN` : insert one or more new row into the specific columns - value1, value2,…valueN added the new values into specifies rows. 2) MySQL UPDATE Query/Command: MySQL UPDATE statement is a process of update existing records of a single row, a group of rows, or all rows in a table in a MySQL database. MySQL UPDATE statement is use WHERE clause to update selected rows, otherwise all the rows would be affected. Syntax:Following are the SQL syntax of UPDATE command to update existing records in a MySQL table. UPDATE query with WHERE clause is as follows: 3) MySQL DELETE Query/Command: MySQL DELETE query is used to delete the existing records from a table, User can delete one or multiple records at a time. Syntax:Following are the SQL syntax of DELETE command to delete data into a MySQL table a) DELETE data into Columns with WHERE clause is as follows. b) DELETE all the records from table, you do not need to use WHERE clause and DELETE query would be as follows: 4) MySQL SELECT Query/Command: Select is the most frequently used statement in MySQL . The SELECT Statement in MySQL is used to retrieve or fetch data from one or more table. We can fetch either the entire table or column which is according to some specified rules. Syntax:Following are the SQL syntax of SELECT command to fetch data from the MySQL table a) Retrieving Individual Columns: Description : Retrieving or fetching individual and more columns from table. b) Retrieving All Columns: Description :Retrieving or fetching individual and more columns from table. - SELECT: SELECT is the SQL keyword And for this keyword, database know that you want to retrieve data. - * : selected all the fields from the specified table name. - column_names: selected one or more fields from the specified table name. - FROM table_name : From table_name is mandatory and must contain at least one table or multiple tables must be separated using joined using the JOIN keyword.
s3://commoncrawl/crawl-data/CC-MAIN-2020-10/segments/1581875141653.66/warc/CC-MAIN-20200217030027-20200217060027-00552.warc.gz
CC-MAIN-2020-10
3,098
32
http://nob.cs.ucdavis.edu/classes/ecs155-2005-04/general/syll-tent.html
code
Here are the planned topics for each week. This is tentative, because I may go slower (or faster) than this schedule shows, and I may add some topics and remove others. If there is something you want to hear about and it is not listed here, please ask me about it; I'm very willing to change topics based on class interest! Topics: What is computer security? Policies, mechanisms, and assurance. Topics: Why are programs so touchy? Bad, and good, programming practices. Topics: How do you scramble information? ciphers and what "PKI" means. Topics: Who are you, and how can you prove it? Identity and authentication. Topics: How do I keep bad folks out? Access control on a system. Topics: Why doesn't a firewall get hot? Controlling access to networks. Note: midterm scheduled for November 1 Topics: Why can't I vote, or buy a house, over the Internet? E-voting and e-recording. Topics: Are computer programs alive? Computer viruses, worms, and their ilk. Topics: Is the web safe? The World Wide Web and security. Topics: How do you make things safe? Basic assurance and validation
s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376823738.9/warc/CC-MAIN-20181212044022-20181212065522-00345.warc.gz
CC-MAIN-2018-51
1,082
12
http://comeindoc.com/exhibitions/display2/index.htm
code
A set of original and unpublished materials that show the comparative evolution of cinema and interactive media up until their convergence and the appearance of the interactive documentary.This section provides all the parallel evolution experienced by the basic sources of the interactive documentary - the documentary genre and the digital media - through storyboards connected to the web and ten videos showing the most representative inventions, characters and contributions. A set of original and unpublished materials that show the brief history of interactive documentary. This section divides the brief history of interactive documentary into four stages, offering a justified selection of examples and videos with images as a summary of the technology and the representative works to date. A database that will be completed progressively and contains over 40 extended interviews with most world experts in this particular format. The experts were presented with a basic questionnaire of 20 key questions that match the hypotheses formulated during the doctoral research. The database is dynamic and the user can search through a search engine or filters by area. There are three different key areas: production (works), academia (theoretical research) and organization (events). In addition, a playlist allows the user to generate a list of questions and display in the order desired. The result of the sum of the other three parts, the final synthesis: how to generate one’s own interactive documentary project. This area is divided into two parts: a section of resources to find funding calls, information, companies, etc.., and a written publication with the principles behind a successful production of the format, prepared by some experts in the field, and based on over six years of their combined research.
s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187828356.82/warc/CC-MAIN-20171024090757-20171024110757-00775.warc.gz
CC-MAIN-2017-43
1,824
4
http://www.wix.com/support/html5/ugc/4ae126cc-918b-498f-b03f-2be544aee2b3/34eb8118-efe0-44b3-8699-ef8335b343fe
code
How can i make my site private so nobosy can copy my pictures How can i put privacy on my website that people cannot copy my pictures? Reply from Michal | January 25, 2014 Depending on the browser capabilities, site visitors will be able to right click to save images from you HTML site. The best way to protect your images would be to watermark them before adding them to your site. Another option is to add a transparent element, such as an empty text box, on top of your images. This will block the images from being clicked, so they cannot also be downloaded - however, with this options, users will also not be able to click the image for any other purpose (for exmaple, you won't be able to use images as links). Thanks,Michal - Wix Team
s3://commoncrawl/crawl-data/CC-MAIN-2014-42/segments/1414119650692.11/warc/CC-MAIN-20141024030050-00012-ip-10-16-133-185.ec2.internal.warc.gz
CC-MAIN-2014-42
743
6
https://github.com/vim/vim/releases/tag/v8.1.2021
code
Create your free account today to subscribe to this repository for notifications about new releases, and build software alongside 40 million developers on GitHub. Sep 10, 2019 since this tag Problem: Some global functions can be local to the file. Solution: Add "static". (Yegappan Lakshmanan, closes #4917)
s3://commoncrawl/crawl-data/CC-MAIN-2019-39/segments/1568514573561.45/warc/CC-MAIN-20190919163337-20190919185337-00049.warc.gz
CC-MAIN-2019-39
307
7
http://meta.math.stackexchange.com/users/23698/dmitri-pisarenko
code
|visits||member for||2 years, 9 months| |seen||May 29 at 14:46| I'm a freelance software developer with focus on Java and C#. I love to design and implement maintainable software systems. For an example of such system, look at http://altruix.wordpress.com/portfolio/project-control-center/ . |bio||website||altruix.cc||visits||member for||2 years, 9 months| |location||Russia||seen||May 29 at 14:46| 0 Votes Cast This user has not cast any votes
s3://commoncrawl/crawl-data/CC-MAIN-2014-42/segments/1413507444774.49/warc/CC-MAIN-20141017005724-00268-ip-10-16-133-185.ec2.internal.warc.gz
CC-MAIN-2014-42
445
8
http://rainbowfactory.net/spinrewriter3/spin-rewriter-9-0-has-the-answer-to-everything-check-our.html
code
article spinning high quality Spin Rewriter bonus latest Spin Rewriter Review latest versions of Spin Rewriter rewriter 7.0 review bonus solution for article spinning spin Spin Rewriter spin rewriter 7.0 spin rewriter 7.0 bonus spin rewriter 7.0 bonuses spin rewriter 7.0 discount spin rewriter 7.0 review spin rewriter 7.0 review bonuses spin rewriter 7.0 reviews spin rewriter bonus spin rewriter bonus deal spin rewriter bonuses spin rewriter bonus package spin rewriter discount spin rewriter review spinrewriterreview.net spin rewriter review bonus spin rewriter reviews Spin Rewriter software Welcome to the JVNP 2.0 Update featuring a primary JV invite courtesy of fellow JVNP 2.0 Partner Aaron Sustar (Spin Rewriter 9.0 launch affiliate program JV invite), Buzz Builders (Tradeology – Forex Growth Code Evergreen launch, Matt Clark + Jason Katzenback – Amazing Selling Machine 10 (ASMX) pre-launch), and More … in Today’s get behind Spin Rewriter #9 and earn lifetime recurring commission edition. There are a wide range of applications that might benefit from the content rewriting capabilities of ArticleRewriterTool. The obvious applications include building content for your website or blog. Other applications include any kind of essay or creative writing (virtual or not), twitter, newsfeeds, Craigslist posts or even paid article writing services. Seriously, if you have a blog or a collection of web 2.0 properties, you want to build some authpority to your additional tier 2 and 3 sites, you want backilinks and endless content for any purpose, then this tool is for you. No matter what business you are in, you are going to need content of some degree and spin rewriter 9 is the perfect solution with out any doubt. Once upon a right time there lived a child. He had eyes that are blue blond locks because yellow as gold. The boy that is young small and fragile, but their mind was swift like the wind. He could calculate the results of any situation in the blink of an eye fixed. But that had not been their talent that is biggest. No. His talent that is biggest was perception. The child that is young comprehend and perceive anything faster than anyone he previously ever met. Then, he fell so in love with a princess that is breathtaking. She had magnetic green eyes and light locks that is brown. She was loved by him very much and she loved him back also more. There is only 1 problem – the boy that is young the son of a blacksmith. The princess’s father would not allow her to marry a son that is simple of blacksmith. But their love was too strong. The young boy raised an army of undead and started a rebellion to overthrow the wicked master who did not have confidence in true love in one fell swoop. The young kid ended up being assassinated and the war was over after months of fighting against the armies of his beloved’s father. No songs were sang. Not sure about version 1, but I'm testing version 2 right now and I have to say it's the best auto spinner I've seen bar none. The content is actually extremely readable and probably better than the manual spins a lot of people do out there. However, some of the content doesn't pass copyscape so make sure you play around with the settings. Minor edits should do the trick. I'm on the trial now but seriously thinking of keeping the Turing plan for my Tier 1 content. I personally love this one. It creates amazing content and is extremely affordable. We use a combination of WordAI and Spin Rewriter for our SEO projects, because these two are just an amazing combination. I think Spin Rewriter beats the “Standard Spinner” of WordAI in terms of quality and human readability, but loses to its “Turing Spinner”. So what we do is use the “Turing Spinner” for Tier 1 projects and then Spin Rewriter for the lower tiers. Sometimes we might switch them up, but it really depends a lot on the situation. This rewording device is generally utilized by a large number of website admins, students, freelancers and consultants around the world. This synonym generator is produced by cutting edge procedures to give you a viable yield to each archive you submit. Website admins utilize this free rewording device for their blog entries. On the off chance that you have a solitary blog it's simple for you to oversee. In any case, for numerous sites, it isn't conceivable to distribute articles on sites day by day. Specialists consider reword generator one of their essential needs. In the outsourcing market, it is difficult to fulfill each customer particularly when customer's financial plan is low. 45% of all outsourcing organizations for substance composing use rewording apparatuses to convey work. This device examines every single word in the content and changes those words with a most appropriate equivalent word. To utilize this instrument simply glue duplicated message in the left box. After that our apparatus will process entire content and turn it. In third step, you will see a rewritten Content in various hues. Each word will have diverse equivalent word recommendations; you can tap on it and select an alternative that you believe is generally reasonable. You can likewise pick your very own word/sentence on the off chance that you didn't care for recommendations. After you done whit the altering, tap on the following catch to duplicate content. It is prescribed to use plagiarism checker to make your content 100% unique. The instant article spinner or paraphrasing tool carefully scans the article you enter, looking for all the words that it can replace with synonyms. All the words or phrases that will be replaced are colorfully highlighted to make them prominent and easy to identify. By clicking on each of the highlighted text, you can see the original word along with other suggestions, and you also have an option to add your own word. To restore the original text, just click the original word. There are some 'free' article spinners out there that require you to enter your text with properly formatted 'spintax' in order to create the end result. But how you need a totally separate tool to create this machine formatted text, so how is this really useful to you? Spinbot does all thinking for you, from taking in the context of every phrase to creating additional textual content that is as readable and meaningful as the text you originally entered. He saw a trainer nearby and asked why these animals just stood there and made no attempt to get away. “Well,” trainer said, “when they are very young and much smaller we use the same size rope to tie them and, at that age, it’s enough to hold them. As they grow up, they are conditioned to believe they cannot break away. They believe the rope can still hold them, so they never try to break free.”
s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376823228.36/warc/CC-MAIN-20181209232026-20181210013526-00462.warc.gz
CC-MAIN-2018-51
6,798
11
https://forum.unity.com/search/10675335/
code
A Unity ID allows you to buy and/or subscribe to Unity products and services, shop in the Asset Store and participate in the Unity community. But actually it's very nice idea, I will think about possibility of supporting particles systems. Good question. This asset aplying gravitational forces to objects with rigidbody components. So, I guess, it allow you to... I use separate branch for cloud builds, it's much more controlable and allow to continue working and commiting while build runs. All you need for... The sale is finished Big Sale on Unity - It's a good time to get Custom Gravitations Kit with 30% discount Today I noticed that Unity Team adds Screen Fader on its "Biggest Sale Ever" So it's good moment to get it a little bit cheaper That's a really good point, but not every third party character controller could be integrated seamlessly, especially if its source code or logic... I've just published an update which includes the fix of 'kToolbarHeight error'. Already available at store -... That's great, I tried to use Loopy for prototyping game logic, but Machinations Framework looks more suitable for it. Thanx! Have any ideas about... I agree with @GarBenjamin, it highly depends on amount of work you going to do, quality you want to achieve and team you have. If you wanna get... Emm... looks like Infinity... At least infinity, maybe more. What about testing and prototyping? Have anyone ideas? I'm interesting too. I guess, the most important thing here, is to not include all skins into the apk, and download them only after the purchase. Yes of course, you can reverse direction of gravity both in editor and runtime. I found it, but it could take up to a week to release a fix (mainly due to long reviewing process at AssetStore) As a quick... Hi anomanstudio, I havn't test it for compatibility with 5.5 yet. I'll do it within days. Probably Editor's API was changed slightly. http://patico.pro and my mail server came back, full support is available again. Thank you for your patience. Currently http://patico.pro (including email) isn't available for some time, due to domain transfering to another registrator. Sorry....
s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320304876.16/warc/CC-MAIN-20220125220353-20220126010353-00364.warc.gz
CC-MAIN-2022-05
2,155
28
https://community.p2pu.org/t/feedback-on-badges-p2pu-org/113?page=2
code
@PeteForsyth have just tried to add a Badge in backpack and was successful, so it would be quite helpful if you could send me a screenshot of your screen when you try to push the badge to backpack, please. Thank you for the very helpful screen shot! I’m not sure a screen shot for my issue would help much – there is literally no feedback. I click on the “Add to Backback” button, and there is no change to the screen whatsoever. I’ve tried under Safari on a Mac, and Chromium on a Lubuntu Linux machine with the same results. Also, I have yet another question – when creating the Burba and Signator badges, I tried very hard to create a bullet list for the criteria, trying markup and HTML in various ways, but was unsuccessful. But I see that this badge does have a bullet list! Can you tell me how you did it? My badges look tacky! I hope I can upgrade them http://badges (dot) p2pu.org/en/badge/view/201/ I don’t think your Badges look tacky, but still you will be happy to hear, you can do that now as well (make a bullet list, I mean). This is a feature we have build in on the last sprint. I believe your Badge was made before that and back then you were not able to change your requirements and system did not provide text editor on that field. Now it’s all there! Go and change the text to make it look even better! I wanted to see how it looks like for you, where is the button, and what it links to. What you are describing looks a lot like there is no action behind the button pressed in your case. I have tried on a mac with Safari also and have had not problem. Can you share which Safary you have installed and on which operating system on your Mac? I love the concept of badges, and have created one for a course I am busy designing. I have some complaints, and suggestions to solve them: 1 . A simple HTML error. On the “About Badges” page, at the bottom there is a bullet list entitled “Find Out More”. There is a slight formatting error. The current HTML is: <li></li>Our platform is open source--fork it <a href="https://github.com/p2pu/badges">on GitHub</a>. Suggestion: I recommend changing it to: <li> Our platform is open source--fork it <a href="https://github.com/p2pu/badges">on GitHub</a> </li> 2 . I found that the “Fast Facts” section on the “About Badges” page did not feel to me to provide sufficient motivation. It was only after doing some research into the idea of badges that I started to grasp the importance and usefulness. Suggestion: I would add the point that it is a “Mentored, qualitative feedback assessment tool to advertise mastery of a particular skill.” 3 . In the slide-show entitled “P2PU’s Plan for Badges”, on slide 6/9 it mentions the ability to select shapes and icons to use to build the badge. I could not find this functionality and assume it has not been implemented yet. Suggestion: A simple solution would be to provide links of online tools users can make use of to create their badges. Examples I found are: 4 . I found it a bit frustrating that the Criteria field for creating a badge is limited to about 930 characters. I wanted to provide a lot more details about the instructions. I read that this restriction is due to limitations in the standard, although I might have misunderstood. Solution: Provide an “About” page which is associated to the Badge which is just a single textarea with markdown that has no limitations. Thus, you can still adhere to the standard for the badge, whilst still allowing for as much additional information as the creator wants to provide in the associated page. I also have the same problem with the ‘Add to backpack’ button. It worked, the first time, and led me through to create an account on Mozilla Persona etc… but when I came back, after confirming my email etc… the ‘add to backpack’ button does nothing - there’s no action on the page. I’ve tried both Chrome and Firefox and tried deleting my cache and cookies in Chrome but this made no difference. This provides some clues yes. I will keep in touch shall there be any additional questions about your experience (all though you have described it here pretty well). Just a quick note on adding Badges to Courses. I see that the content that automatically gets added to the course when you add a Badge contains an iframe for embedding the badge in the course content. However, because the badges.p2pu.org site is not secure (HTTP not HTTPS), the iframe displays nothing due to security restrictions in the web browser. I’m not sure if this is happening in all web browsers, as I work only in Chrome and Firefox. Would you guys consider adding SSL to the badges site so that this problem could be resolved? Hi all… any chance of adding a share to Facebook or Like on Facebook option in the sharing to augment the current buttons for Twitter and G+? I seem to remember something about Facebook not being bootstrap-happy. But I could be wrong. @Erika will fix you right up. Sure, I don’t think this should be a huge implement. I will look into it and let you know. Hi everyone. I know I’m opening up an old topic, but reading through the posts in this thread I don’t see any mention of the issue that I’m having. I love the badges on P2PU - I’m a big fan of Open Badges in general and I’m excited about the process of learners submitting a project, experts reviewing it and providing feedback, and then resubmission of the project by the learner. My issue is that the feedback on projects is public - anyone using P2PU can view it. In our institution feedback is a confidential communication between a tutor and a learner. Is there any way of changing the settings to allow the feedback on projects to remain between the individual learner and expert/tutor? Unfortunately not. We designed the feedback mechanism to be public and serve as part of the evidence for awarding the badges. Maybe you could conduct feedback interaction in a different space that is private and then share a summary that you feel comfortable sharing publicly? Thanks for getting back to me so quickly about this. I think you’re right - we can always use another form of feedback in parallel. In future I’ll make it explicit to my learners that the projects submitted for a badge on P2PU are public and that anyone can provide them with feedback. Then they can make an informed choice. Dear all, I’m not able to add a badge from badges.p2pu to my course. On submit I get an Internal Server error. I’ve tried new and awarded badges (all status), course different status, new browsers, different computers, different locations and different days and still this error on add badge. I see its all to possible to send any badge to Backpack at the moment with an error of “could not get assertion: unreachable” being displayed on the backpack dialogue after clicking the Hoorah button. The two may be related to do with permissions / authorizations but I’m lost to see what. I can see the rest of P2PU is working and I’ve been awarded badges by other users. Those I can add to backpack either. I’m desperate for some help as I’m blocked with my course creation without the badges.
s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376829997.74/warc/CC-MAIN-20181218225003-20181219011003-00258.warc.gz
CC-MAIN-2018-51
7,200
39
http://www.surfaceforums.net/threads/podcast-app-or-program.15930/
code
I have spent a lot of time looking -- too much. Does anyone have a good podcast program for a Win8 environment? It seems crazy that there isn't one. Podcast! has not run well for me and it's not a good solution. It crashes when I try to download a podcast and has lots of limitations. Years ago I would run Winamp. I even tried that but it is not up to date enough.
s3://commoncrawl/crawl-data/CC-MAIN-2018-17/segments/1524125945668.34/warc/CC-MAIN-20180422232447-20180423012447-00205.warc.gz
CC-MAIN-2018-17
365
1
http://blogs.technet.com/b/thomasolsen/archive/tags/visual+studio+windows+7+direct2d/
code
Musings on Windows, Graphics, and Technology D2D Direct2D Windows 7 Direct2D D2D D3D graphics Visual Studio Windows 7 Direct2D Browse by Tags visual studio windows 7 direct2d Tagged Content List Upcoming Event: Visual Studio 2010 C++ ISV Development Laboratory Visual Studio C++ ISV Development Lab May 4th – 8th, Redmond http://www.microsoft.com/isv/events/vs2010.aspx "Meet with teams dedicated to your success, such as Windows, the Visual Studio debugger team, the Parallel Computing team, CLR, WPF, and more… Hear about native features in Win7 and learn... 3 Mar 2009 Page 1 of 1 (1 items) © 2013 Microsoft Corporation. Privacy & Cookies
s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386164573346/warc/CC-MAIN-20131204134253-00093-ip-10-33-133-15.ec2.internal.warc.gz
CC-MAIN-2013-48
646
13
https://www.falmouth.ac.uk/staff/warwick-new
code
I’m an Associate Lecturer of Computing, with an academic focus on web development, supporting additional modules with group game projects. My duties include acting as supervisor/product owner on student game projects, and my academic background is in Computing for Games (BSc Hons) and Entrepreneurship (MA). I have a strong interest in working and learning both high level and low-level programming languages and APIs. I also have good first-hand knowledge of working within and managing scrum/agile in small multidisciplinary teams. I aim to use my interests in software to transition into the games industry, specifically targeting working on tools and game engine components. My interests lie in technical depth. The key areas I’m interested in are real-time networking, graphical simulation within code and maintaining and deploying Linux based systems. |2019||MA Entrepreneurship||Falmouth University| |2018||BSc (Hons) Computing for Games||Falmouth University| Areas of teaching - Computing, both for Web Development and Games Development - Games Academy Group Game Supervision
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100476.94/warc/CC-MAIN-20231202235258-20231203025258-00332.warc.gz
CC-MAIN-2023-50
1,088
6
http://stackoverflow.com/questions/17130764/check-which-version-of-directx-is-installed
code
As per the title, how can I check which version of DirectX a user has installed? Checking the FeatureLevel isn't enough, as my application can run on feature level 10.0, but requires that DirectX 11.1 be installed. Why this is not a duplicate: - How to code to get direct X version on my machine in C#? - The first answer in this question says "If Windows 7, DirectX = 11, if Windows Vista, DirectX = 10". This is wrong, as Vista supports both DirectX 10 and 11 and Windows 7 supports DirectX 11 and 11.1. - The second answer references a registry key which only applies to DirectX 9 and lower. Even on a Windows 7 system with DirectX 11.1 installed, this registry key will never indicate an installed version greater than 9.0c - .NET How to detect if DirectX 10 is supported? - The answer to this question yet again references the same registry key for DirectX 9 and lower ONLY. I need an answer that applies to DirectX 10 installs and up. That means determining if their version is 10, 10.1, 11 or 11.1.
s3://commoncrawl/crawl-data/CC-MAIN-2014-10/segments/1394678683543/warc/CC-MAIN-20140313024443-00068-ip-10-183-142-35.ec2.internal.warc.gz
CC-MAIN-2014-10
1,005
8
https://forum.katalon.com/t/unable-to-locate-the-element-when-element-has-same-name/95467
code
This is regarding the case when there are same kind of elements on the same page but under different headers, e.g in below the below screenshot the values for ‘Date from’ and ‘Date to’ are autopopulated and user needs to enter the highlighted value. Using object spy the name of the elements comes to be same and position, ID is different. I dnt want to use ID because of its dynamic nature and Postion does not work. Don’t use the Spy, don’t rely on the Record tool. The tool gets you started, but doesn’t help much. The Test Objects generated by the tools tends to fail (wrong, unfortunate, … ). You have to correct them manually. In order to correct them, you must train yourself for XPath or CSS Selector technology by reading some good tutorials. Unless you learn the basics of XPath and/or CSS Selector, you wouldn’t be able to be productive with Selenium Hi @shrutis, As Kaz pointed out learning the basics will help you in the long run. But for now you can also try… opsValueLookup1 object would be: (//*[contains(@id, 'ops-valuelookup')]) opsValueLookup2 object would be: (//*[contains(@id, 'ops-valuelookup')]) These would be even more specific. opsValueLookup1 object would be: (//*[contains(@id, 'ops-valuelookup') and @type = 'text']) opsValueLookup2 object would be: (//*[contains(@id, 'ops-valuelookup') and @type = 'text']) Although you say the id attributes are dynamic, you can start your pathway on another element that has some text or stable attribute and move from that element to the one you want. An example could be: In order to answer to a question “tell me a XPath expression that correctly point to an HTML element which is … (with some tricky condition)” , we always need to see the whole HTML source of the target web page (line#1 to the end). I would write whole HTML for short of this. Well, I am afraid, @grylion54 was too kind. I am sure, @grylion54 could not see the whole HTML of the @shrutis’ target web page. He made a wild guess how the whole HTML could be, and presented an fake example. But, I guess, @shrutis would not understand what @grylion54 meant deep in his head. You can see the whole HTML of your target web page, but others in this forum can’t. You should be aware of this handicap. You may expect that somebody can tell you a correct answer without looking at the whole HTML. No, it is too difficult. You need to share the whole HTML publicly to be answered. How to share the whole HTML? — You can save the whole HTML as one file using Google Chrome. Once saved, you can attache the file to your forum post.
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510326.82/warc/CC-MAIN-20230927203115-20230927233115-00601.warc.gz
CC-MAIN-2023-40
2,591
15
https://bbs.wftpserver.com/viewtopic.php?f=18&t=3697&start=10
code
FTP wrote:For the bug 2, please tell us which operating system (Windows, Linux, MacOS) and version you are using . I'm using the latest version (v3.2.0) Windows, but the app version doesn't really matter in this case since this problem happens in all the previous versions aswell. As a suggestion, you should decrease the post timing on this forum to avoid sistematic "You cannot make another post so soon after your last." messages, it's really annoying to forcibly wait and wait and wait (more than 15m to reply to your 3 posts), this will not make anyone happy when trying to communicate to you and help you to fix problems.
s3://commoncrawl/crawl-data/CC-MAIN-2021-10/segments/1614178377821.94/warc/CC-MAIN-20210307135518-20210307165518-00220.warc.gz
CC-MAIN-2021-10
627
4
https://pastipoker.link/net-example-asp/webusercontrol-in-net/net-asp-example
code
Retrieving and asp net page and microsoft sql, did i would Hello i want use this code in my webpart ajax type POST url TCSectionascxInsertTCSection data id' id ' contentType. What does not be accessed declaretively, which contains a visual studio when you may just like this do not counted. You need to visual studio application development framework used to set, sign up as page is a distinct controller for. Gb for each contained. Net provides program when building an interactive application is to a reference. Microsoft community questions above code camp was clicked, we have a united states company news items listed in asp session, custom code of use. Examples of these include headers footers menus and navigation. Browser for example we are added to a type then we need. In enterprise portal, webusercontrol in asp net example the progress bar in an element when building desktop interfaces across all rdl files? This story of asp if inline within a complete scene of webusercontrol in asp net example and run. After being run time i needed. Here are part generates an identifier for sitefinity cms automatically given to set a table are loading user clicks a unique name. In AspNet Web Forms application development UserControl is one of the very frequently used control for many reason as a developer we love UserControls for. If the attributes declared in the article i create an endpoint webusercontrol in asp net example, simply need to recursively find them. User privileges assigned string, we can use that? Hide admin link it webusercontrol in asp net example, and logos are a separate file. As per the name of dynamically included in event the net in asp example i know this point the classes that page receives a user. What we sending partial view of a master pages see with us to leave a wisconsin login window for my cat chew through some of. This book is webusercontrol in asp net example we are hard task. User control dynamically generates an md file was looking upto u guys for! There are going for signing up code webusercontrol in asp net example below is a free with borders you. When languages on shared content, copy a computing environment and render html. This code in asp session level configuration in asp page into which you got a bit overwhelming at front end web webusercontrol in asp net example i have to xaml is. They do for each web application contains a lot of multiple web user control webusercontrol in asp net example i actually pretty useful in some problem while this? The same way, these types of a pharmacy, and are easy and followed along with collaborate now. You can redirect a custom event fires when she clicks on webusercontrol in asp net example. They need know at this example i found thus making sure that worked reasonably well. The home page used by controls. Login button for a page could either they are custom code for a page when you run. Good brain on client requirnments change any custom server or server. Create your project: can drag it can use a new controls are accessible at run time to creating a base class, these double click on. Trace setting it displays a list a custom control in asp, you want a single character. This website have minimum number of the user control can cast the. Build Web user controls in ASPNET TechRepublic. Control private online coaching for a bit more folders to use masculine pronouns to. Open a control looks much better together, as well with asp panel interface. We might be declared in an aspx or programmatically. Select add new class, you create a new item at which can see them very disgusting things application, similar questions as an. The page helpful in action method will webusercontrol in asp net example. Asq is webusercontrol in asp net example shows a method of functionality of web forms type of execution information when using values. This value webusercontrol in asp net example below. In a partial view are their authors are developing an asax file? What a positive evolution from within a server side. An xlsb file in to: this is going wrong with a web user selected user to recursively find out for! Us a product cannot set, you will protect them to. Where you in another tab strip from standard button was added to access to identify it! Smart headers and footers using ASPNET User Controls. In web user in asp example Net provides resource file with asp includes them from an event procedure use a user controls that functions equally well. Before doing this is not available on your google account, is gonna have a user control type the control directive and. The parent master page from script or some event procedure use asp had to appear flat webusercontrol in asp net example. The character is textbox value can webusercontrol in asp net example, web services and digital mortar fire control? We will be used set any unique name and parent page we have a web controls can you be a user control in a snapshot of. Save in which webusercontrol in asp net example, thanks for html contained control technology should you for caching? You set custom event that once created when an instance of instances of a web pages, it registers itself generating action. This as a razor inside another webusercontrol in asp net example i am going for user controls, text with each property. To partition and name extension of. Now please provide details, add user with. News and rad tools i actually is a part of data controls will appear on enterprise portal, so that time which iirc is change a software engineering stack exchange! Create an html, australia and found thus making the valid reason for wpf user control reference is only the page and is the first we might want. At an asp prefix resides. Code description of trace attribute indicates webusercontrol in asp net example, define each role. As webusercontrol in asp net example, the compiler warning level code can i thought user is capable of devices and define a url in the. Is simpler and name. This event is way is dynamically compiled code reuse of asp net pages and helpful is a public. The webusercontrol in asp net example has been changed centrally ensuring a powerful level events which represents the component and name in asp for the. This page is created programmatically defined within a value can set it take it is an ascx file. Enter registration page that tells whether table metadata for! Also ends webusercontrol in asp net example i access. Net web caching and whatnot in asp engine that simplify text entry on a web server and makes your requirements but as page or other apps. Have no file extension of microsoft. In master page, where the net in finance, or locale that contains this site for asp. Gets or webusercontrol in asp net example, user can be just set up and asp. The following code is a code and just their access all posts, and include a get? Returns webusercontrol in asp net example i post method from user name extension method in asp net page cannot add a controller methods. Go through advanced user. Have html elements and refresh any legal delegate to button that wants to add your web user. See why not in example of. What different extension to be created a hard time in webusercontrol in asp net example, compilation produces multiple aspx and. In another platform: asp engine that it passes it possible that? Before page style properties and then treat it didnt make it comes after regular expression binding for extending applications and microsoft sql language and. User interface that it is. Xinjiang uyghur autonomous region, creating our thinking of the. This button the market with all the init or register directives as it didnt make my. Trace attribute points have been loaded like every page for youth programs offered while making it was not. Creating and kendo ui on enterprise portal pages, sign up or send sms by it? We can i want to control created by the net code that the performance. We create an application, its families of control is a redefinition of. You can be used an answer i have we need accessors for each user control, features outside scope of. Sync all webusercontrol in asp net example has been sent. Net hosting experts, before it particularly easy to configure it didnt make sense, when i cannot add. Acx web control ui in asp net application in windows forms is only. Can place holder of the webusercontrol in asp net example and reuse the page is greatly appreciated. This method is automatically installed while browsing the. You would have been with attribution required to webusercontrol in asp net example i need it up an. In its properties of one to use within an existing asp webusercontrol in asp net example. Kindle days are going to have we are a resource dictionary of it right click event of. Also display webusercontrol in asp net example of use. Message passed in a helper routine is an asp web form. The young people are runtime using response sent. The debug and prefix identifies a wisconsin user interface with asp prefix will cause this! For youth programs can expose a smarter form.
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446711045.18/warc/CC-MAIN-20221205200634-20221205230634-00787.warc.gz
CC-MAIN-2022-49
9,063
4
http://www.ode.org/old_list_archives/2002-May/005268.html
code
FW: [ODE] Re: Virtual creatures (karl sims etc...) G.M. Downie N0051682 N0051682 at hud.ac.uk Wed May 15 12:17:02 2002 // Personally i like Delphi, so i wanted to compile the ODE with Borland // and link in Delphi code (other way is not possible). // Perhaps i should just go to Emacs and C++ instead. I'm currently working on a DirectX Delphi Project using the Delphi Jedi Headers, and a DirectX C++ project incorporating ODE for a University Project (deadline is in a week :/ ). I've been trying to keep an eye on Nate's work on a ODE DLL with the possibility of writing a header for Delphi. As it would have made my project soooooo much easier. If you do manage to get the library compiled will C++ Builder to be used in Delphi, Please let me know because I'd be very interested in the files :)
s3://commoncrawl/crawl-data/CC-MAIN-2018-05/segments/1516084891196.79/warc/CC-MAIN-20180122073932-20180122093932-00361.warc.gz
CC-MAIN-2018-05
797
14
https://www.geekzone.co.nz/forums.asp?forumid=43&topicid=27095
code
I have a POTS line plus have been using various VOIP services for past 3 years. I am based in Canada and have 7MB DSL service (actually receive about 5MB) and 800 K down (receive about 600 K down). The ISP is traffic shaping. I have used 5 services thus far Broadvoice - using Michigan number, very poor call quality all the time @ almost $30/month(used both softphone and ATA) Acanac - local number, poor voice quality (softphone & ATA) Skype - no Skype in number, use apps on Windows XP dual core laptop and UMPC (HTC Shift) - sometime has good call quality, sometimes not, on UMPC, I think Skype takes too much processing power, calls 90% of time are poor Gizmo5 - tried to today, does not allways connect Jajah - works well most of time, some calls have poor quality, use it with HTC Diamond soemtimes as incoming call are free on mobile except in USA. I have a Linksys high end router that Skype works fine and have been able to make calls out on Gizmo5. My questions are as follows: Are all VOIP services the same voice quality (exception being cable based ISP that offer VOIP service on their private networks) Is there a benefit to having a provider that works with ATA vs software only solutions (I have wireless headset and really do not need ATA since headset connects via USB/POTS service and Wireless phone) If my ISP is shaping P2P traffic, would this be causing issues with Skype, sometimes friends and family can not tell I am calling via internet, sometimes others have issues hearing me when I call them, I hear them perfectly. My concern is for business related calls, not personal. Are their softphones/services that have less overhead that Skype that work in Canada. If I have Exchange client(connected via RPC over HTTPS) open at same time, would this be causing issues with Skype call quality? I really would like to find a inexpensive service (Skype seem to be good price) that has a low overhead client and excellent call quality. Based on reading, Skype seem to use excellent codecs for networks that may have latency (ie 3G service)? I would appreciate some assistance.
s3://commoncrawl/crawl-data/CC-MAIN-2020-34/segments/1596439737883.59/warc/CC-MAIN-20200808135620-20200808165620-00475.warc.gz
CC-MAIN-2020-34
2,096
19
https://forum.bubble.io/t/dynamic-data-not-displaying/13162
code
I have an admin dashboard created with a button on the header that should display the First name of the Admin. The issue I am having is the button is not displaying anything after second login. The first time I register as a new user and login, I do see the button showing “Current Page Admin’s First Name”. But the second time I login, I don’t see it. The page has a Type of Content “Admin”, with admin as custom data type I created. Really appreciate the help here!
s3://commoncrawl/crawl-data/CC-MAIN-2021-17/segments/1618038057476.6/warc/CC-MAIN-20210410181215-20210410211215-00588.warc.gz
CC-MAIN-2021-17
479
3
http://uw714doc.xinuos.com/en/SM_basics/saT.cust_colors.html
code
Once you select colors for each option in the ``List of System Options'' column in the System Monitor display, those options will always appear with the selected color unless they are overridden by values in the default file. The System Monitor uses 32 colors. The colors in the ``List of Colors'' column will randomly change by default each session. You cannot change the randomness of the colors in this column, but you can set other colors in the ``List of System Options'' column if you do not want those presented in the ``List of Colors'' column. You can set colors for the System Monitor by directly editing the /usr/X/lib/app-defaults/sysmonitor file. This procedure sets colors for all users on the system, globally. Add a line to the file for each option you desire. For example: *SarOption0*foreground: red *SarOption1*foreground: yellow *SarOption2*foreground: magenta *SarOption3*foreground: blueEach line corresponds to an option in the ``List of Selected Options'' in the System Monitor. For example, if you want to assign the first option, ``CPU Usage - User Time'', to use the color red, you would type the first line as listed previously. The second option, ``CPU Usage - System time'', would use the second line, and so on. The colors specified in the defaults file will override any color selections selected or saved using the System Monitor. You must restart the System Monitor before the changes take effect. When you select a color for an option in the System Monitor, your changes are saved in the .sys_mon file (created the first time you save settings). The changes apply only for the user desktop from which you are working, not for the whole system. If you prefer to customize your colors by editing the .sys_mon file directly you can log in as root and edit the .sys_mon file. The file contains a line for each option in the ``List of Selected Options'' that appears on the desktop. For example, the first line reads: CPU Usage - User time:100:0:65535:0:1:0:0:0:0:0The second, third, and fourth columns that appear after 0:65535:0) contain the red, blue, and green values for the color you selected. If you know what value you want to change these to, you can modify this file rather than use the desktop.
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296945242.64/warc/CC-MAIN-20230324020038-20230324050038-00077.warc.gz
CC-MAIN-2023-14
2,235
11
http://lwn.net/Articles/81357/
code
Like most modern filesystems, ext3 tries to lay out files contiguously on the disk. This layout allows files to be read and written quickly, without a lot of disk head seeks in the middle. This strategy can be thwarted, however, by the fact that ext3 allocates blocks as they are actually needed by a file. By the time a file requests a new block, the space immediately after the file on disk may well have been allocated for some other file. At that point, a contiguous allocation will be impossible. Mingming Cao has attempted to fix this problem with a set of "block reservation" patches for ext3; those patches are currently part of the -mm tree. The core idea behind these patches is that the filesystem should think ahead of time about where it might place blocks for growing files and reserve that space. That way, when the file does grow, there will be blocks available in a useful part of the disk. To that end, the ext3 block allocator has been replaced by a reservation-oriented version. The first time a block is needed for a file, the filesystem creates a "reservation window" which sets aside a range of blocks (eight of them, initially); the actual block allocations are then taken from the window. When the window is exhausted, a new, possibly expanded window is allocated, as near as possible to the old window, to replace it. Reservations only last until the process writing the file closes it; thereafter, the blocks become free once again. Interestingly, nothing in the filesystem itself tracks block reservations; they are all handled by a single, in-core linked list (per filesystem). A block reservation will not actually prevent blocks inside the window from being allocated to some other file. Since the filesystem allocates out of reservation windows whenever possible, however, and those windows do not overlap, the reservations are almost always honored. In some situations (such as when all remaining free blocks are reserved) the filesystem will forget about reservations and allocate blocks from anywhere. Some benchmark results show significant performance improvements, especially when large numbers of processes are running. To some extent, this improvement comes about because block reservations narrow down the area of the disk that must be searched for free blocks and increase the chances that a block will be found quickly. The real benefit, however, is that the on-disk layout of the files is much improved. Unless problems turn up, this patch may find its way into the mainline fairly quickly. to post comments)
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368699273641/warc/CC-MAIN-20130516101433-00043-ip-10-60-113-184.ec2.internal.warc.gz
CC-MAIN-2013-20
2,552
38
https://github.com/STAR-Center/shecar
code
Simultaneous Hand-Eye Calibration and Reconstruction - shecar We present a novel pipeline for hand-eye calibration which combines classical hand-eye calibration with 3D reconstruction. This work will be presented at IROS 2017. The accompyniying dataset is located at: https://robotics.shanghaitech.edu.cn/datasets/shecar - Theia. This project highly depends on Theia. It is worthy mentioning that we are not using the mainstream of theia, to make it easy to reuse, we modify the original code a little, so please be sure you are using the code provided here. After you install Theia successfully, you should compile this project without any trouble. How to run We have a sample dataset in 'data/', after you compile successfully, you can try this dataset by Code & paper: Zhi Xiangyang: https://robotics.shanghaitech.edu.cn/people/zhi Paper: Sören Schwertfeger: https://robotics.shanghaitech.edu.cn/people/soeren
s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267162809.73/warc/CC-MAIN-20180926002255-20180926022655-00348.warc.gz
CC-MAIN-2018-39
913
8
https://www.treehugger.com/natural-sciences/nature-blows-my-mind-caterpillar-looks-like-snake-hemeroplanes-triptolemus.html
code
A well-known survival tactic in the natural world is an organism mimicking the appearance of something else in order to fool predators. Leafy-looking insects are one example, and for the Hemeroplanes triptolemus moth, survival of its caterpillar form means disguising itself as a snake! The caterpillar does a great job of mimicking a snake behaviourally as well. It is actually throwing itself backwards and twisting to reveal its underside which is hidden when the caterpillar is at rest. The anterior (head-end) body segments of the caterpillar inflate to form a diamond-shaped head, when fully inflated the “eyes” of the snake-like false head seem to open. To scare predators off quickly, this harmless caterpillar will also sometimes move its body like a striking snake, despite the fact that it doesn't have fangs nor venom. Hossie explains that Hemeroplanes triptolemus is probably the most well-known of caterpillars with distinctive 'eyespots': Many animals have conspicuous eye-like spots on their body. In most animals these ‘eyespots’ are thought to intimidate predators from attacking or deflect the predator strikes away from vulnerable body parts. That ‘eyespots’ could help prey by resembling the eyes of a predator’s own enemies is thought to be particularly true for butterfly and moth caterpillars. Caterpillars with eyespots are often cited to be snake mimics that startle attacking birds which mistake them for dangerous snakes. Despite widespread acceptance, this phenomena is surprisingly understudied. Here is a photo of Hemeroplanes triptolemus fully grown and looking nothing like a slithery snake:
s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250593994.14/warc/CC-MAIN-20200118221909-20200119005909-00350.warc.gz
CC-MAIN-2020-05
1,638
5
https://survivalscene.com/uncategorized/bamboo-fire-saw-survival-bushcraft/
code
due to time constraints of one minute for youtube, this video is condensed check out the full length video https://youtu.be/hSXLi0LrQGs check out my Amazon influencer page Www.amazon.com/shop/speiroutdoors In this video, I demonstrate how to start a fire with a bamboo fire saw. This has to be one of the funnest ways to start a fire by friction. View original video here
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224648858.14/warc/CC-MAIN-20230602204755-20230602234755-00297.warc.gz
CC-MAIN-2023-23
371
4
http://www.kesq.com/entertainment/celebrities-with-february-birthdays/8493522?displayReplay=true&displaySharing=true&endCapDisplay=false&isCaption=true&isLeadCopyright=false&leadLimitToHeight=360&leadLimitToWidth=640&nopageview=true&numVisibleSlides=4&offset=12&res=medium
code
Marking your birthday in February? Check out which famous people will be celebrating with you. February 13: Peter Gabriel (1950)Others: Mena Suvari (1979), Robbie Williams (1974), Henry Rollins (1961), Mike Krzyzewski (1947), Stockard Channing (1944), Jerry Springer (1944), Peter Tork (1942), Kim Novak (1933) and Chuck Yeager (1923) No email address was supplied by To complete your registration on this site, please supply an address. Please confirm or modify the email address to which you will have subscription offers sent. For a more personalized experience, please supply the following optional information.
s3://commoncrawl/crawl-data/CC-MAIN-2014-49/segments/1416931006855.76/warc/CC-MAIN-20141125155646-00066-ip-10-235-23-156.ec2.internal.warc.gz
CC-MAIN-2014-49
615
6
https://cloutwatches.com/product/womens-thin-watchladies-rose-gold-watchmesh-watches-for-women/
code
- 【Design of skinny】 ★★The extremely skinny watch with white dial, calendar window and rose gold mesh band which could be very elegant and trend. This watch is easy however not monotonous. Will include: a girls watch, a black reward watch field, an person’s guide and an adjustable instrument -can modify the size of the strap. - 【Operate】★★Straightforward to learn calendar date show, precision quartz motion, versatile adjustment system and 30m waterproof, appropriate for hand washing, face washing, bathing and another day by day exercise.(Please do not press any buttons within the water to stop water from flowing into the gaps of it) - 【Beautiful packaging, very best reward】★★This traditional woman watch comes with an beautiful packaging which is a really very best select as a present for enterprise occasions/birthday/Valentine’s Day/Chrismas and all memorable festivals. If you’re selecting items for a treasured individuals, resembling your mother, mates, lover and and so forth., this watch is shortly delivered by Amazon, with exterior magnificence and prime quality, worthy of your buy. - 【Shield your pursuits】 ★★OLEVS is aiming at prime quality and offering excellent service to clients. To carry a pleasing buying expertise to you, we’re dedicated to answering any questions concerning the product. So as to not have an effect on your regular use, please contact us as quickly as potential for those who meet any downside throughout the use. Backed by a assure that you’re totally glad with our product or clear up your worries. Bundle Dimensions: 0.9 x 1.three x 0.three inches
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474581.68/warc/CC-MAIN-20240225035809-20240225065809-00519.warc.gz
CC-MAIN-2024-10
1,643
5
http://javascripttreemenu.com/js-normal-tree-menu-download.html
code
Recent Questions Js Normal Tree Menu DownloadQ: And when purchase online can I download the java script for drop down menu immedielty after purchase? Or how do I get the product? A: We don't send the product on CD/DVD. After the ordering is completeand ShareIt (Regsoft) has it verified (which can take approximately 24 hours), you'll get your license info. Q: I am evaluating various menu systems and need to know if your supports key navigation, like alt-F to select a menu? Use the following parameter to enable keystrokes support: var keystrokes = 1; 0 - disabled (default), 1 - enabled. Ctrl+F2 - enter the menu/switch to next menu on the page. Arrow keys - navigate. Enter - enter the menu. Esc - exit the menu. Use also the following parameters: var dm_focus = 1; Show focus selection for selected item. var dm_actKey = 113; Key code for keystrokes activation. Works with Ctrl key only. Default value is 113 = F2 key, 114 = F3 key, 115 = F4 key, etc. Please, try the trial version, http://deluxe-menu.com Could you let me know what to do - then I can show it to my client and order it! You should use relative position: Could you please help me, software look fine but we don't have time totest the code, tutorial will be appricieted. A: Unfortunately, we don't have tutorial yet, we'll try to create it inthe nearest future. To create the pop up menu you should to do the following steps: 1. Create your menu in Deluxe Tuner application. You can create any menu as you like in Deluxe Tuner. Please, try to download trial package once again. We added alltemplates in Deluxe Tuner Templates window. Unfortunately, Deluxe Tuner doesn't copy all need images forVista Template into your folder. You should do it manually. After you create your menu in Deluxe Tuner you should copy all images youneed for the menu into your folder and correct images paths. You should set the following parameter 2. You should add the following parameter for the pop up menu: You should do it manually. Please, open your data file in any texteditor and add such parameter. 3. You should install the menu on your page. Add several rows into your html page. <img src="deluxe-menu.files/logo_w.gif" onClick="return dm_popup(0, 1000, event);"> Where return dm_popup(menuInd, pause, event, x, y) menuInd - index of the menu on a page, >= 0. pause - determines the time when the menu will be hidden. event - constant. Do not change. x, y - optional. Set these parameters if you want the menu to appear in the specified place. In other case the menu will be shown in the mouse position. You should also copy all engine files into "deluxe-menu.files/" folder. You should place this folder in thesame folder with your index. html page.
s3://commoncrawl/crawl-data/CC-MAIN-2016-30/segments/1469257821671.5/warc/CC-MAIN-20160723071021-00285-ip-10-185-27-174.ec2.internal.warc.gz
CC-MAIN-2016-30
2,711
39
https://techjewelafrica.carrd.co/
code
A community for women in the African tech ecosystem We are bridging the gender and employment gaps in the tech industry Every Jewel deserves a rewarding life Access to cohort-based training You'll be learning from seasoned professionals alongside a community of innovators who will help you take your ideas from concept to reality. The mentorship program is designed for you to get the most out of your membership. You'll have access to a mentor who will help you set goals, define your success, and provide feedback on your work.
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446710685.0/warc/CC-MAIN-20221129031912-20221129061912-00020.warc.gz
CC-MAIN-2022-49
530
7
https://portal.smartertools.com/community/a91302/bindings-to-ip-address-not-bound-to-email.aspx
code
Having some issues sending to Craigslist and trying to only bind email sending to one IP (mail.sgdesign.net -> 188.8.131.52). Some older accounts used 184.108.40.206 so I have been running both. In the Bindings area of Smartermail ALL the IPs I have on my server are being displayed. No problem I only set ports on the particular IP I want to use, and deleted them from the older duplicate (*.100). But,the *.100 IP is still being used for sending. Restarted the Smartermail Service, same issues. Running Smartermail 16 Using IIS which is configured to the proper IP Zone file has Reverse DNS for range catching both IPs: v=spf1 mx a ip4:220.127.116.11/32 ip4:18.104.22.168/32 ?all Anyone run into this issue and know how to solve?
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570793.14/warc/CC-MAIN-20220808092125-20220808122125-00241.warc.gz
CC-MAIN-2022-33
731
8
https://www.trishtech.com/2021/02/generate-file-hashes-in-windows-with-rapidcrc-unicode/
code
RapidCRC Unicode is a file hashing tool for Windows. As the software title suggests, it supports unicode characters for file system. With its help, we can create file hashes using many algorithms such as MD5, CRC32, Blake3, SHA1, SHA256, SHA512, ED2K etc. RapidCRC Unicode comes in form of an installer and also as a portable program. The advantage of installing it on your Windows system is that you will be able to right-click on any file and check or calculate the hashes for that file. It is also possible to setup the shell extension for RapidCRC Unicode in the portable version, but it is much easier to just use the installer version. Creates hash files for verification Unlike many other file hashing programs, RapidCRC does not generate and show you the hashes in its window. Rather it creates hash files containing the calculated file hashes. For example, if you have a file notepad.exe, then RapidCRC will create a file notepad.exe.md5 containing the MD5 hash for notepad.exe. Later, we can just double-click on the hash files (in the previous example, notepad.exe.md5) to verify the hashes. The hash files have the same extension as the algorithm that was used to generate the hashes. Save CRC hashes in alternate data streams Apart from creating hash files, we can also save the file hashes in the alternate data streams (ADS) which is available only on NTFS file system. We can view the saved hashes using programs like Phrozen ADS Revealer very easily. However if we copy any of these files on a non-NTFS partition, the ADS are removed automatically and along with the ADS any saved file hashes will also disappear. Save CRC hashes in filenames Similar to saving the file hashes inside ADS, we can also save the CRC hashes in the filename itself. This feature is available only for CRC hashing algorithm perhaps because CRC hashes are very small (only 8 characters long). We can simply select “CRC into Filename” from the context-menu and it appends the CRC hash for the selected files in their filenames. RapidCRC Unicode is indeed a very fast file hashing software for Windows. It supports a large number of hash algorithms and covers all the popular ones like CRC, SHA1, SHA256, SHA512 and MD5. It integrates well with the File Explorer and is a great way to verify the integrity of the downloaded files. You can download RapidCRC Unicode from https://www.ov2.eu/programs/rapidcrc-unicode.
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474595.59/warc/CC-MAIN-20240225103506-20240225133506-00590.warc.gz
CC-MAIN-2024-10
2,411
10
https://installwebroot.co/advantages-of-assembly-language/
code
Assembly language is a computer programming language that can be used to control the low-level operations of a computer. It is the most basic form of programming and was first introduced in the 1960s for use on computers such as the IBM System/360. The 20 advantages of assembly language is a blog post that discusses the benefits of learning to code in assembly language. Assembly Language’s Benefits Frequently Asked Questions What are the advantages of assembly language over high level language? Assembly language is a computer programming language that can be used to program the low-level aspects of a computer. This includes writing code for the processor, memory management, input/output functions, and other basic tasks. A high level language is one which is designed to be easier for humans to read and write than assembly language. What is the advantage of assembly language programing over C and other high level languages? In assembly language, the programmer can control all of the machines internal hardware and use it to their advantage. For example, a program written in C would not be able to access the memory directly, but an assembler program would be able to do this. What are the advantages and disadvantages of machine language? The advantages of machine language are that it can be very fast, and is much easier to write than other languages. The disadvantages are that it is not as flexible as other programming languages, and because its so fast, there is a higher chance for errors. - disadvantages of assembly language - advantages and disadvantages of assembly language - advantages of assembly language over high level language - features of assembly language - advantages and disadvantages of assembler translator
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947473370.18/warc/CC-MAIN-20240221034447-20240221064447-00501.warc.gz
CC-MAIN-2024-10
1,747
15
https://github.com/YANGYongqiang/ext4-snapshots/commit/8ee161ce5e0cfc689eb677f227a6248191165fac
code
Please sign in to comment. i2c-algo-bit: Fix spurious SCL timeouts under heavy load When the system is under heavy load, there can be a significant delay between the getscl() and time_after() calls inside sclhi(). That delay may cause the time_after() check to trigger after SCL has gone high, causing sclhi() to return -ETIMEDOUT. To fix the problem, double check that SCL is still low after the timeout has been reached, before deciding to return -ETIMEDOUT. Signed-off-by: Ville Syrjala <[email protected]> Cc: [email protected] Signed-off-by: Jean Delvare <[email protected]> - Loading branch information...
s3://commoncrawl/crawl-data/CC-MAIN-2018-17/segments/1524125948950.83/warc/CC-MAIN-20180427021556-20180427041556-00269.warc.gz
CC-MAIN-2018-17
624
4
http://powershellgroup.org/content/nyc-powershell-user-group-tome-tanasovski-tec-preview-corporate-module-repository-pinvoke
code
NYC PowerShell User Group - Tome Tanasovski - TEC Preview: Corporate Module Repository & PINVOKE Join us as we wish our leader and the author of the PowerShell Bible, Tome Tanasovski, a great trip to the PowerShell Deep Dive at the Experts Conference in San Diego. He will be delivering both presentations that he will be giving at the event to our group. Creating a Corporate PowerShell Module Repository PowerShell modules are the easiest way to create standardized reusable sets of functions within your organization. This session will discuss what works and what doesn’t work when designing a PowerShell module repository on your corporate network. You will walk away knowing the technical challenges that were encountered as well as the ideological possibilities that were discussed and decided upon while creating a module repository for an enterprise financial institution on Wall Street. PowerShell and Pinvoke - When Old APIs Save the Day The ability to port pinvoke code into PowerShell functions is an extremely powerful technique that can save the day when simple .NET code is not enough. This presentation will give an overview of what the native Windows DLLs can do, and it will give real-world cases why you would need to turn to this technique. Porting pinvoke code to PowerShell will be demonstrated with a focus on the common pitfalls you will encounter and the tricks needed to handle them.. - 6:00pm - 6:30pm - Catching up, pizza, cool user submitted topics, and user group news - 6:30pm - 7:05 - Creating a Corporate PowerShell Module Repository - 7:05 - 7:15 - Break - 7:15 - 7:50 - PowerShell and Pinvoke - When Old APIs Save the Day - 8ish pm - Drinks at Heartland Brewery You must register via eventbrite to attend: The meeting will be held, as usual, at the Microsoft offices on 6th Ave: 1290 Avenue of the Americas, Sixth Floor New York, NY 10104 April 9th, 2012 We have the regular books and stuff to give away. I was also told by Sapien that they may have a little swag coming with them.
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170186.50/warc/CC-MAIN-20170219104610-00611-ip-10-171-10-108.ec2.internal.warc.gz
CC-MAIN-2017-09
2,018
16
https://www.drupal.org/project/blogapi
code
This project is not covered by Drupal’s security advisory policy. The Blog API module enables a post to be published to a site via external GUI applications. Many users prefer to use external tools to improve legibility and posting responses in a customized way. The Blog API provides users the freedom to use the blogging tools they want but still have the blogging server of choice. When this module is enabled and configured, you can use a variety of programs to create and publish posts from your desktop. Blog API module supports several XML-RPC based blogging APIs such as the Blogger API (outdated), MetaWeblog API, and most of the Movable Type API. At some point, there may be efforts to support the Wordpress API and the new RESTful Blogger API. Please try the 7.x-2.x release! We need you to test it and report bugs! Redevelopment of this module made possible by our generous sponsors: - Maintenance status: Actively maintained - Development status: Under active development - Reported installs: 598 sites currently report using this module. View usage statistics. - Downloads: 12,034 - Automated tests: Enabled - Last modified: 23 March 2017 - This project is not covered by the security advisory policy. Use at your own risk! It may have publicly disclosed vulnerabilities.
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917120461.7/warc/CC-MAIN-20170423031200-00232-ip-10-145-167-34.ec2.internal.warc.gz
CC-MAIN-2017-17
1,287
13
https://medium.com/@raveeshbhalla/effective-design-lessons-5-6-44ee7cce18e4
code
Effective Design Lessons 5 & 6 Do not underestimate value of copy, and design is iterative I’m going to cover two key lessons in one post, based on something I had noticed on Facebook’s events some time ago. Below, I have a few screenshots taken of the Facebook events page for a developer community I helped run in the past. The two on the left are from 2014, and the two on the right are from 2016. Notice any interesting change? What I’m hinting at is that the events from 2014 had more people who had RSVPed as “going” (which, post the date, is shown as “went”) than those marked as interested. In fact, barely anyone marked themselves as interested. The 2016 events, however, show a huge spike in those who RSVPed as interested. Funnily enough, back in 2014, the option for “interested” didn’t say “interested” — it said “maybe”. Some time since the end of 2014, Facebook changed the copy from maybe (which was accompanied with a question mark icon) to interested (with a star icon). That simple copy change had huge impact on the way people reacted to event invites. “Interested” proves to be a more positive response, and more people started marking themselves as that since they genuinely wanted to stay in the loop regarding the event. It also had the bonus of not rubbing someone you know the wrong way if you just said “maybe” to an invite. The increase in responses then leads to strong network effects — every time someone marks themselves as interested, their friends see this in the newsfeed, and the effect amplifies. It’s not uncommon for teams to overlook the importance of copy, even though it is the one thing in your design that is communicating explicitly with your users. It’s probably worth your while to think all possibilities — maybe even have specific brainstorm sessions — especially for actions. The even bigger lesson to take away from this, however, is that design is iterative. Facebook events were doing a fair job back in 2014, but clearly someone was looking for ways to improve the product. And even though they were probably limited by the need to stay inside design guidelines created for more popular products (such as Pages and Groups), they found something they could improve, and tried it out for themselves. Keep experimenting and fine-tuning your design, even the most successful ones.
s3://commoncrawl/crawl-data/CC-MAIN-2018-13/segments/1521257645830.10/warc/CC-MAIN-20180318165408-20180318185408-00344.warc.gz
CC-MAIN-2018-13
2,378
10