url
stringlengths 13
4.35k
| tag
stringclasses 1
value | text
stringlengths 109
628k
| file_path
stringlengths 109
155
| dump
stringclasses 96
values | file_size_in_byte
int64 112
630k
| line_count
int64 1
3.76k
|
---|---|---|---|---|---|---|
https://mthealien.newgrounds.com/news/comments/544843 | code | My other car is an x-wing!
Joined on 5/26/08
If you're lookin' for a RTS game, go straight to "Pokemon Black Edition" or "Pokemon White Edition", which ever you choose. I must say that if it's your first time playing then it might be a bit frustrating, as it can become quite difficult at times.
If you're headed for a slightly easier yet still satisfyingly challenging sidescroller, then I suggest Kirby's Return to Dreamland.
Note that some Kirby games were experimental and were nothing like the original, i.e. "Kirby's Canvas Curse", "Kirby: Mass Attack", and "Kirby's Epic Yarn" (Epic Yarn is the closest to the real concept). Don't get those until you have played at least one regular Kirby game and like it, and then be willing to broaden your horizon to more concepts. Aside from Return to Dreamland, other "regular" Kirby games that I reccomend are Kirby Superstar, on SNES and DS, and Nightmare in Dreamland, on original NES and GBA.
Well, it's a classic anyways, but I would suggest any Legend of Zelda game | s3://commoncrawl/crawl-data/CC-MAIN-2019-30/segments/1563195528635.94/warc/CC-MAIN-20190723002417-20190723024417-00246.warc.gz | CC-MAIN-2019-30 | 1,018 | 6 |
https://www.interdigital.com/videos/2014_01_24_interdigital_james_nolan_evp_research_development | code | Rory Moore:Good afternoon, everyone. Here we are, at CES 2014. And we’re at the conference room at CES with InterDigital. They have come out here from Pennsylvania, but they also have facilities in San Diego, where we’re located - CommNexus - and we’re with Jim Nolan, Senior Vice President, InterDigital.
Though they’re not a household name, to the average person, in technology, their IP is everywhere, literally. In fact, about a year ago, they provided Intel with a significant patent portfolio in wireless, which is probably one of the reasons that Intel is now reenergized to enter the wireless space.
So, for the layman in the audience here, please tell us what InterDigital does.
James Nolan:Well, InterDigital has a legacy of creating the next-generation technology. So, if you look at InterDigital historically, we have been a digital wireless or digital mobile technology company from its inception.
So, we did 2G before there was a 2G, a 3G before a 3G, and then 4G, and now we look to do the next G; you have to develop the technology for that next generation.
So, we look at, what do we think the next-generation networks and devices will need, in terms of technology? And it tends to be the embedded technology that, as you said, most people don’t know of us. It doesn’t come to - you know, it’s not readily handy, or something that’s a branded type of technology.
But what InterDigital creates is the enabling technology that enables devices and networks to work.
Rory Moore:So, as the industry, especially wireless - video is overwhelming the network, and everyone wants a full 1080, they’re looking at 4k coming, et cetera, et cetera - what are you doing at InterDigital to enable that to occur?
James Nolan:Well, a couple of different things. And a lot of this, from the video perspective, is being run out of our San Diego office. Our neighbor’s CommNexus.
Rory Moore:That’s why I brought it up.
James Nolan:So, we look at it from two different perspectives. We look at it is that video is the main driver of the use of bandwidth. And we look at it is any way that you can save that bandwidth or, you know - both save bandwidth, in terms of saving cost and power reduction - the other is also user experience.
So, we look at it as, how can we optimize the user experience? So, we’ve done is we’ve created technologies that optimize the delivery of video, based on the context or how the user is using that device. So, we’ll actually adapt how much bandwidth is being used based on how close the device is to the user.
So, if the device is very close, it might be a hot HD. As I move it away, I can’t tell the difference, and it will actually reduce the bandwidth by half or more. And that actually reduces the traffic over the network, and it reduces the cost for the content delivery people through the CDN, and it also reduces the operator’s cost and bandwidth.
What we also do is we also provide Wi-Fi cellular handover technology. And what that does is that’s really the integration. People talk about HetNets; that’s really what enables devices to hand off seamlessly between networks, and to maintain the quality of service of largely the multimedia content, which is largely video.
So, our perspective is, any way we can save the bandwidth, and provide the best service to the user. That’s the way we look at it, as an underlying technology that we create.
Rory Moore:Is this silicon-agnostic?
James Nolan:Yes, it is. Great point. If you look at it historically, InterDigital had been a company that was more wireless and mobile to the device. These technologies from video and heterogeneous networks are both software-based, and they’re agnostic to the silicon.
They could target it on devices as part of clients - either as part of applications or as client devices that an operator or a handset OEM would load onto a device.
And from a network perspective, also, software would reside in a server, an operator’s network, or back in a content provider’s network.
Rory Moore:Let’s talk about some new sectors, beyond just mobile - which is obviously getting a lot of talk here. Let’s look at sectors that are growing like crazy.
The digital health area of the convention has never been bigger, growing almost exponentially, it looks like. I think it’s 1/3 of an entire floor now. You look at machine-to-machine, telematics. What areas are important for InterDigital NAT space?
James Nolan:Great, great point. From a machine-to-machine and really expanding out to an internet of things, a web of things - we really look at all of those applications - healthcare, telematics - as currently today are very siloed machine-to-machine implementations.
So, we are actually developing software platforms for the next-generation standards that actually create horizontal platforms that allow all the different verticals or these different applications to use a common software layer.
So, it’s a software layer that would sit in the cloud, or in a gateway, or on devices. And we’re developing that.
And we’re also working in a joint venture with Sony, where we’re developing that M2M technology collaboratively with them.
So, we see this as the next generation, where we really enable very low-cost machine-to-machine, internet of things, web of things, type of applications, where all of that software becomes simplified, and it just becomes web applications to end users. So, it’s much simpler for us to use those technologies.
Rory Moore:Going back to remote healthcare, wearables - you know, it’s one thing when your video is buffering, but if you’re sending an EKG or something that, you know, has to HIPAA-compliant, it has to be [5-9s], et cetera, et cetera - do you see that as occurring, that kind of reliability for remote healthcare on the network, what you’re building?
James Nolan:Well, yeah, I think that’s a great point. I think when you look at it, it really depends on the type of devices that are being used. So, there are certain devices for machine-to-machine that are best-effort internet-based, and there may be some delay in terms of how they’re used, and then there are certain applications in terms of healthcare where you really need to use wireless technology - in particular, cellular technology that can be more robust, and is not just simply best-effort.
I think that you can have more of a guarantee of service, of delivery, for different applications.
But, as you said, being wireless and mobile, even sometimes the best technology can’t be robust everywhere - or it may be more robust, but maybe not robust everywhere.
Rory Moore:So, if you look at another area, having to do with smart grid, energy, do you play in that area, as well?
James Nolan:Yeah, it’s the same for us. We look at it as a software-defined platform that we work on - a service delivery platform or an application-enabling platform - and it can support telematics, smart grid, lifestyle, and healthcare and fitness type of applications.
So, it’s essentially you would operate through at an SDK or an API level, at the web level, and then this would extract all of the different things that are in a network - security, authentication, data management - from the individual that was launching that service.
So, the person launching the service would just create a web-based application that connected through that, and it would extract all of those things that are done in a network, whether it was done through a cellular network, or whether it was done through ZigBee, or Z-Wave, or other technologies.
Rory Moore:Are you going to be involved with projects, much like Qualcomm does - they’ll create prototypes? They will not go into production, but they kind of seed the market, seed the industry with certain hardware prototypes. You do any of that?
James Nolan:Well, from a hardware prototype perspective, what we do is, we develop the technology through proof of concept on a hardware platform. But in most cases, what we’re developing is actually a software that runs on those platforms. So, for us, the hardware platform is a proof of concept, and that will deliver the software to customers.
And our customers, as you said earlier, it’s not as well-known, not a branded company. Our customers are customers that would integrate that software into other platforms.
So, for us, hardware platforms are proof of concept, get the customers up and running on that software very quickly, and we would help them migrate with services onto commercial platforms.
Rory Moore:Okay, last - give me an example of an InterDigital effort, technology that the average consumer touches every day.
James Nolan:Great question. One that we’ve done in our timeline, in terms of developing technology, is very long, but we developed software stacks for 3G and 3 1/2G solutions. So, InterDigital actually created software stacks that ran on a number of different companies’ chipsets.
So, there are a number of different, very popular handsets that ran InterDigital’s software, that actually ran the wireless modems.
So, those are technologies we developed, and we’re developing 3G and 3 1/2G technology. And that technology got embedded on chipsets and onto handsets - tens and hundreds of millions of chipsets and handsets.
But you would never hear of InterDigital, but InterDigital has been in some of the most popular handsets that are out there, from our actual software running on those handsets.
Rory Moore:That’s terrific. Well, that’s some great color on InterDigital. And thank you for joining us, and thank you for serving on the CommNexus Board of Directors.
James Nolan:Thank you. It’s my pleasure. Thank you, Rory. | s3://commoncrawl/crawl-data/CC-MAIN-2019-30/segments/1563195523840.34/warc/CC-MAIN-20190715175205-20190715201205-00301.warc.gz | CC-MAIN-2019-30 | 9,728 | 45 |
https://goneaway.blog/2015/12/09/backfill-projects/ | code | I recently completed several backfill projects, moving over 200 posts from my old travel blog and other sources into this blog.
The Pilgrimito posts
The biggest project was migrating over 180 of my old Pilgrimito posts. Moving the posts from one WordPress blog to another wasn’t particularly difficult, but redirecting the old links to the new ones required me to write a short program. I used the project as an opportunity to learn some programming tools that were new to me — specifically, using the Xamarin platform to write a C# console application on my Mac — so that was a bonus.
If you visit the old Pilgrimito blog, at first glance it’ll look like it hasn’t changed. However, when you click on a post link, it will — most of the time — redirect to the corresponding post here. Over time I’ll redirect the tag, category, and archive links, and eventually I’ll catch anything else and send it to the front page here.
The 1994 travel journal
One of my first web pages dates back to 1994, before the word blog had even been coined. I had spent several weeks in Europe that summer, which I chronicled in an old-school pen-and-paper journal. In the fall of that year, I created a single HTML page detailing the entire trip. I was a grad student at the time, so I published the journal on my home page on the university web server — most people hadn’t even heard of the world-wide web yet — and moved it around as I changed internet service providers over the years. I don’t think the page has had a home, other than my hard drive, for ten years or more.
Porting a very long single HTML page to a blog is possible, but it doesn’t make a lot of sense. Fortunately, I had been rather meticulous in my HTML coding back in 1994. With just a few tweaks to the HTML, I was able to write another program to parse it into 43 separate posts, organized by date and place.
The 2004 e-mails
Previously unpublished, I also ported five long e-mail letters I sent to family and friends during my 2004 solo journey around Europe. Unlike the 1994 journal, these letters did not lend themselves easily to being split up, so I imported them as-is.
Several of these posts are over 2,000 words long. You’ve been warned. | s3://commoncrawl/crawl-data/CC-MAIN-2020-34/segments/1596439738723.55/warc/CC-MAIN-20200810235513-20200811025513-00227.warc.gz | CC-MAIN-2020-34 | 2,229 | 10 |
https://enwiki.tvbrowser.org/index.php/Cinema_guide_of_TV-Browser | code | Cinema guide of TV-Browser
Which cinemas are available for TV-Browser?
- Cineplex cinemas (Bad Kreuznach, Bruchsal, Elmshorn, Frankfurt (Main), Friedrichshafen, Goslar, Limburg, Lippstadt, Mannheim, Marburg, Münster (Westf), Naumburg (Saale), Paderborn, Singen, Suhl, Warburg (Westf))
- Breitwand cinemas (Herrsching, Seefeld, Starnberg)
- About 100 CineStar cinemas in over 80 cities, among them also many small cinemas - a list of all cinemas can be found at the "CineStar" web pages
- Hollywood Megaplex cinemas in Austria (Innsbruck, Linz, St. Pölten, Wien (2))
- Cineworld cinema (in the "Mainfrankenpark")
- Schillerhof cinema in Jena (Thuringia)
When is my favorite cinema available?
Perhaps soon, perhaps never - it's the same as with the TV data: One (or several) cinema(s) will be available, when there is someone providing them. Also you can settle that - try it!
How can I provide a cinema guide?
For this the same procedure as when offering TV data is necessary.
- Ask your cinema if you are allowed to use and provide the data
- Read the Provide TV listings information
For any problems or questions please use our forum. We will help you as fast as possible.
How can I add the cinema-guide?
If you are using TV-Browser 2.1 or higher, you can use the channel/channel groups refresh buttons within the settings. For older versions please follow this instructions:
- Click "Settings" -> "TvDataServices" -> "TV-Browser"
- Open "Channel groups"
- Click "Add"
- Now you can type in the URL to the cinema guides
- Breitwand: http://kinotvbrowser.tagus.de/breitwand
- CineStar: http://kinotvbrowser.tagus.de/cinestar
- Cineworld: http://kinotvbrowser.tagus.de/cineworld
- Hollywood Megaplex: http://tv.hermann.czedik.net/megaplex
- Jena Schillerhof: http://tvradio.tv.funpic.de/data/JENA
- Wiesbaden Caligari: http://www.xata.de/tvbrowser/cinevents
- Activate the channel group
- Click the "Refresh" button near the channellist - the new cinemas will appear in the left column soon
- Move the desired cinemas to the right column (list of active channels)
- At last, click the "Refresh" button in the main menu
I receive the 'No mirror found for group' message
- Check your web connection
- Check your firewall
- Check the channel group's URL
Are there some other hints for me?
Sure. To seperate TV or radio channels from the cinema's data, you can setup a filter rule. So it is quite easy to switch between TV/radio and cinema schedules. For more information have a look at Filter rules or Filter rules - example: Subtitle. | s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376823872.13/warc/CC-MAIN-20181212112626-20181212134126-00447.warc.gz | CC-MAIN-2018-51 | 2,533 | 37 |
https://community.spiceworks.com/topic/2128059-windows-10-enterprise-2015-ltsb-keyboard | code | We use W10E 2015 LTSB on our tablets, the default keyboard for styluses is the draw keyboard. Is there a way to change this to default to the standard keyboard layout? We are an Orthopedic center and our physicians need to type rather than drawing what they want to type. I went through the regular settings already but don't seem to find an option for this.
Any help is appreciated.
This is on a surfacebook so I am not sure if this will work for you.
Click on Settings
next click on bluetooth,printer,mouse
then click on pen and windows ink
Under the Handwriting input panel turn off the show the handwriting panel when not in tablet mode and there's no keyboard attached
Next go back to settings
then tablet mode
change it to use desktop mode and then dont ask and dont switch right below that.
Sorry, I did find this online. Maybe this will help ?
Disable then Enable the on screen keyboard to see if it helps:
Here is another way you can disable it.
Open Start, type: CMD
Right click CMD
Click Run as Administrator
At the command prompt, type the following command then hit Enter:
sc config "TabletInputService" start= disabled
sc stop "TabletInputService"
When you want to enable it, go to the command prompt then enter the following commands.
sc config "TabletInputService" start= auto
sc start "TabletInputService" | s3://commoncrawl/crawl-data/CC-MAIN-2021-31/segments/1627046154214.63/warc/CC-MAIN-20210801154943-20210801184943-00219.warc.gz | CC-MAIN-2021-31 | 1,322 | 22 |
https://www.topgovernmentgrants.com/grants_gov_display.php?program=W81EWF-22-SOI-0030 | code | Non-physical barriers are being developed for stopping the spread of invasive species in waterways around the country.
These barriers rely on a behavioral response.
Acoustics and electricity are increasing in use at a variety of locations.
All the locations are aquatic
and often located near infrastructure such as locks and dams.
One of the primary tools at these sites is OpenFOAM, the open source multi-physics solver.
Practitioners use this code to compute free surface hydraulics and infer biological response.
However, the ability to model acoustic fields or electric fields is lacking.
Brief Description of Anticipated Work:
This project will involve close collaboration with the successful offeror and the U. S. Army Corps of Engineers (USACE).
This project will involve adding the ability to model acoustic fields and potentially electric fields within the OpenFOAM framework while still computing hydraulic variables.
The resulting data set will include the flow field, sound field, and electrical field as appropriate.
A field site with supporting geometry and sound data will be provided by the USACE.
The successful offeror will also be responsible for processing acoustic data as appropriate. | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571483.70/warc/CC-MAIN-20220811164257-20220811194257-00640.warc.gz | CC-MAIN-2022-33 | 1,207 | 14 |
http://sweetch.me/contemporary-room-dividers-ideas/ | code | Wood room divider panel contemporary home furniture ideas with bookshelf room divider lavish bookshelf room divider with wooden material room divider art. Large room divider interesting modern kitchen decoration using mounted wall steel kitchen rack including hanging wooden frosted glass room room dividers used. Panel room divider contemporary wooden bedroom divider intended bedroom full height room dividers. Kids room divider full size of bedroomnew design modern bedroom interior creative room dividers room partitions room room divider ideas ikea.
Rustic room divider image of cheap room dividers half room divider. Clear room divider curtain room dividers hall beach with airy antiques beach beach room divider bookshelf. Thin room divider diy temporary wall coverings youtube cubtab temporary wall decor makipera com room divider ideas for studio. | s3://commoncrawl/crawl-data/CC-MAIN-2017-47/segments/1510934806771.56/warc/CC-MAIN-20171123104442-20171123124442-00453.warc.gz | CC-MAIN-2017-47 | 856 | 2 |
http://www.kiwiprofesor.com/why-learn-english.html | code | Why Learn English, Kiwiprofesor?
That's a very good question, my Student. There are many good reasons why Learning any Language (especially English) is good for you. Follow me, and I'll tell you more...
Why Learn English?
You can see here, to the left, some reasons why learning any language is good.
Now let me talk specifically about English: | s3://commoncrawl/crawl-data/CC-MAIN-2018-26/segments/1529267863939.76/warc/CC-MAIN-20180620221657-20180621001657-00049.warc.gz | CC-MAIN-2018-26 | 344 | 5 |
https://www.pinecone.io/docs-v1/playground/ | code | You are viewing docs for Pinecone v1. Switch to docs Pinecone v2.
Pinecone Playground is a companion web app for the Pinecone docs. It lets you perform basic operations in Pinecone without writing any code.
ON THIS PAGE
Upgrade your search or recommendation systems with just a few lines of code, or contact us for help. | s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323585424.97/warc/CC-MAIN-20211021133500-20211021163500-00269.warc.gz | CC-MAIN-2021-43 | 320 | 4 |
http://godigitalscrapbooking.com/forum/archive/index.php/t-3199.html?s=462f7b5827f90d9ac85a5f88f0f7a909 | code | View Full Version : Picture Files
09-28-2007, 09:22 PM
I once read that the more you work with your photos, the more broke down they get as far as the jpeg. Is this true? I was also wondering if this is why you always make a duplicate file? Any thoughts on this?
09-30-2007, 01:36 PM
Yes, this is what I've heard about .jpg--I can't remember the technical reason for it. I save most of my photos in .tif, especially the ones I scan, since I ususally have to do some editing on them before I use them on layouts. But saving another copy of your photos on a disk or ext hd is always a good idea -- it hurts to lose them. Hope this helps.
09-30-2007, 02:15 PM
Never heard of this and I'm storing all my photos in .jpg - and have a copy on a separate hard drive in case my computer breaks down...
But even if that were true, I never change my jpgs but work on the photos in the layout.
Powered by vBulletin® Version 4.2.2 Copyright © 2015 vBulletin Solutions, Inc. All rights reserved. | s3://commoncrawl/crawl-data/CC-MAIN-2015-06/segments/1422122220909.62/warc/CC-MAIN-20150124175700-00231-ip-10-180-212-252.ec2.internal.warc.gz | CC-MAIN-2015-06 | 983 | 9 |
https://forums.whatthetech.com/index.php?showtopic=127823 | code | Hello, I just signed up will introduce myself later right now I am I would like to deal with this stressor! I have searched and unfortunately I am not finding any recent post addressing the issue. If I missed them please let me know?
Windows 7, IE 11,Version 11.0.9600.17843IS, Update Version 11.0.20 (AVAST Anti Virus)
I Updated my version of IE 11 and in it was offered during the update to “Make BING Your Default Search Engine” Thought I would like to check it out and could easily delete it; however all regular methods of removing have been disabled. Go to Manage ADD-ONS Mouse has been disabled. Go to Search providers it will not let you delete Bing, go to “Find More Search Providers” and it takes you to
Going to the “ARROW” on the search bar and selecting the “ADD” option at the bottom where the Bing icon is takes you to the same address as above.
I have turned in a Work Order with Micro Soft and it has not been resolved. I also tried going to Change to GOOGLE as SEARCH ENGINE
http://www.google.com/homepage/search/sp-ie.html and the ability to select it has been disabled. You can place the pointer directly over it and click all day and nothing happens.
Additionally, System Restore will not work also. (I tried going back to a pre-update time.)
Interestingly I like BING; however I am not interested in being held hostage!
Thank you for any help.
Edited by bekenna, 01 July 2015 - 01:17 PM. | s3://commoncrawl/crawl-data/CC-MAIN-2019-09/segments/1550247482347.44/warc/CC-MAIN-20190217172628-20190217194628-00214.warc.gz | CC-MAIN-2019-09 | 1,425 | 10 |
https://www.huffingtonpost.co.uk/murtada-alsaif/what-it-takes-to-succeed-_b_11495836.html | code | When I say "succeed" I mean that in the loosest sense possible, it certainly doesn't mean "to make millions", as my experience with Written Medicine simply doesn't stretch that far.
I mean it in the sense of getting your endeavour beyond the "interesting project" phase to the "fledgling business" phase. The contents of this article formulate a few lessons that I have picked up over the past few months, while commercially launching Written Medicine.
This bit is hard, really hard.... If you're anything like me, your skills lie in solving technical problems or analysing situations. This transition involves none of that. It is, quite simply, a leap into the uncertain and the unknown.
First and foremost, stop offering your innovation for free. This sounds obvious but I personally found it incredibly difficult to do. I was terrified that an untried novelty of a service would get a shrug if we asked for money and I didn't want to lose any prospective customers. The truth is, we didn't have customers, therefore, we had nothing to lose and all to gain. People are used to paying for something of value. If that's what you're offering, be brave.
The lesson: ask for money and ask for it early.
Don't let your prospective customers dictate without buy in. This will lead to a huge amount of time/money/effort wasted on a "customer" that doesn't end up buying.
The lesson: Get some commitment (and this doesn't have to be money) then take the plunge.
Pricing. Again, difficult but only as hard as you make it. If you can peg your price to the market price; great. For most innovations, it isn't that straightforward.... Let me give you an example. How do you think they decided to price Nike shoes? Someone picked a number and they saw how many people bought the shoes. Of course, this is overly simplified, but you get the idea.
The lesson: I wish I had one.
Get used to making decisions in the absence of certainty. I am a pharmacist, to pharmacists the world is very black and white, you either can or you can't. Then I did a PhD. To an academic, all yes/no questions are answered with "it depends". For both of these, you use data and information to answer the question. With innovation transitioning to entrepreneurship, you will never have a "complete dataset", "best practice" or "guidelines". You'll have "gut feelings", "opinions" and "educated guesses", and these are what built business empires so go with the flow and do your best to deal with the ramifications of your decisions. What you should never do is wait. I cannot remember an instance when it was better to wait, always do something, whatever that thing is.
The lesson: Making decisions is by far and away the most difficult thing about entrepreneurship in general.
Get used to being shown the door. You'll need thick skin in healthcare, but be extra ready with healthcare tech.
Get used to waiting for people. They're busy, they survived this long without you and your innovation. Chances are, you rank lower than picking their nose in their list of priorities.
The lesson: manage your expectations when it comes to other people.
Don't tell people what you want to say, tell them what they want or need to hear. This one is tricky, you either learn with experience or you don't learn at all but the difference means life or death for your company.
Having said all of that, if you believe in your innovation, push through the difficult days when it's not fun anymore, just be there long enough, you'll get there eventually! | s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323585537.28/warc/CC-MAIN-20211023002852-20211023032852-00405.warc.gz | CC-MAIN-2021-43 | 3,499 | 16 |
https://www.gislounge.com/generalization-gis/ | code | Sometimes GIS data contains an excess of detail or spatial information than what is needed for the scale of the map being prepared. Generalization is the method used in GIS to reduce detail in data. For example, a small scale map of the United States does not need detailed coastlines or a map of California does not need to show every road in the state.
Generalization can be achieved by removing detail, such as only showing major roads, showing only the boundary of a state instead of all the counties. In GIS generalization is also used to smooth out lines, removing small detail such as the nooks and crannies of a coastline or the meanderings of a stream.
Since detail about a geographic feature is simplified during generalization, generalized data is less spatially accurate. Those using generalized data to calculate length, perimeter, or area will incur errors in the calculations.
Generalization in ArcGIS
Depending on whether you are generalizing vector or raster data, there are different tools for generalizing GIS data using ArcGIS. There is a toolset in the Spatial Analyst toolbox in ArcGIS that allows for several different methods of generalization on raster data. The generalization tools in the toolset are grouped into three categories: Aggregating zones of data (Nibble, Shrink, Expand, Region Group, and Thin), smoothing data edges (Boundary Clean and Majority Filter), and reducing the resolution of a raster (Aggregate). For vector data, ArcGIS has a Generalize tool in the Editing toolset which uses the Douglas-Peucker simplification algorithm to simplify lines. For additional generalization methods, the Generalization toolset found in the Cartography toolbox offers a range of tools for simplifying and reducing resolution of vector data for cartographic purposes.
Generalization in QGIS
Generalization of vector data in QGIS can be achieved via the Simplify Geometries tool which is found by selecting Vector -> Geometry Tools -> Simplify geometries. From the popup window, you can then select the line or polygon layer you want to simplify and set the tolerance.
If you need to generalize a GIS dataset independent of a desktop GIS application, MapShaper is a free online tool that allows you to upload a shapefile, GeoJSON, or TopoJSON file. You can then select the simplification method and whether to repair intersections, auto-snap, or prevent shape removal. Once the process has been run, a download link is provided with the newly generalized GIS data. | s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510259.52/warc/CC-MAIN-20230927035329-20230927065329-00223.warc.gz | CC-MAIN-2023-40 | 2,491 | 8 |
https://domainreputation.us/ | code | Choosing a Domain Reputation List
Because a single IP address can host thousands of domains, domain reputation lookups are growing in popularity right along IP address reputation. All it takes is one bad egg to spoil the salad, which is why interest in domain reputation is growing.
Domain reputation lookup sites include:
- WatchGuard’s Reputation Authority
- Cisco’s SenderBase
- McAfee’s TrustedSource
- ReturnPath’s SenderScore
The are many others in addition to the above. If the domain you are searching does not show up as being associated with malware, however, this does not verify beyond-a-doubt that it is safe. Visit mxtoolbox.com to find out who is responsible for the domain.
Another thing to keep in mind is the domain name itself. Developers of malware often register domains that sound legitimate. For example:
The above domains may look legitimate, but could also be part of a C&C (command and control) network or be hosting malware updates. Whether you are working with domain or IP Host Reputation, one thing is for sure: internet reputation in general is a growing industry and an important part of cyber attack incident response systems. | s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578681624.79/warc/CC-MAIN-20190425034241-20190425060241-00256.warc.gz | CC-MAIN-2019-18 | 1,167 | 10 |
https://learnondemand.zendesk.com/hc/en-us/articles/208096713-LOD-Terminology-and-Guidelines-for-Building-a-Lab | code | When building labs in Learn on Demand Systems, you need to know the LOD terminology used for the pieces or components of the lab and guidelines for determining what you will need. At the end of this article are the links to help you build the main components.
Terminology for required components:
Lab Series. A Lab Series is the identifier for a related group of lab components that will comprise your lab(s). It is used in Searches, filters, and other locations within LOD to find these components. It is also used by other programs to identify the group of components. You should build this first in LOD.
Lab Profile. A Lab Profile is the component or vehicle that provides your users with the lab interface that they will interact with and other optional components. You may have one or more Lab Profiles associated to a Lab Series.
See the Guidelines section for help determining how many Lab Series and Lab Profiles you may want and/or need.
When you are planning how to design your structure, you should consider the following:
- Do you have more than one general topic, course, presentation, etc. that you want to use LOD for? You should build one Lab Series for each general topic, course, presentation, etc. This will make it easy to identify all the components that will be used for that topic, course, etc.
- Do you want your users to have one lab (one Lab Profile) to interact with all of optional lab components and complete all objectives? – OR – Do you want your users to have more than one lab (multiple Lab Profiles) and in each separate lab, interact with one or more of the optional components and complete a subset of objectives?
To find more information on these components, go to the following articles and videos:
- How do I create a Lab Series?
- How do I create a Lab Profile?
- How do I create a VM Profile?
- How do I create a Removable Media profile?
For a comprehensive guide on building lab content, review the Learn On Demand Systems Integrated Digital Lab Authoring Guide.
Please let us know if this article was helpful. Your feedback is important. We would appreciate any comments you can provide us that will help ensure we are answering your questions and meeting your needs. | s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376825363.58/warc/CC-MAIN-20181214044833-20181214070333-00338.warc.gz | CC-MAIN-2018-51 | 2,214 | 15 |
https://es.mathworks.com/help/hdlcoder/code-generation.html?s_tid=CRUX_lftnav | code | You can use the HDL Coder app to launch the Workflow Advisor and generate HDL code and synthesize your MATLAB® algorithm on the target device. You can also integrate custom HDL code into the design and make your code conform to the coding standards.
- Code Generation with Workflow Advisor
Use Workflow Advisor to generate HDL code from MATLAB code
- External Component Interfaces
HDL code instantiation, black box interfaces, System Generator, HDL cosimulation
- Coding Standards and Reports
Coding standard report, lint tool scripts, and list of coding standard rules | s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296816977.38/warc/CC-MAIN-20240415111434-20240415141434-00864.warc.gz | CC-MAIN-2024-18 | 570 | 7 |
http://lucasforums.com/showthread.php?p=2688098 | code | Hey, I'm new to the realm of software modification. Go easy on me.
Still having problems, the showdown on Dantooine makes the game crash every time I have movies enabled... then crashed when I tried to change the graphics setting in game...
I'll try another go at it and see what happens.
Edit: Did the lag fix, caused problems, so I undid it and haven't had any problems yet... odd.
Nope, still having problems... on Onderon and I can't even walk out the front hatch.
Edit 2: HA! Okay, I feel like an idiot now. Here's what happened:
The Vista fix regarding changing the compatability for the game by changing a setting inside the game file in programs: does NOT work for W7, it changes it right back.
Instead, when you have the shortcut on your desktop, right click it, go to properties, change it to W-XP-SP2, and Run as Administrator. USE THE SHORTCUT to open the game! Here's how you know this is actually working: when you first run EITHER KOTOR or TSL and click GAME, they scan your machine and ask you to configure it. This will not happen otherwise.
Problems solved. In fact, so well that I can run it with even better graphics than those I had while I was actually USING XP-SP2.
I might suggest using that information in a sticky about Windows 7. Could prove useful for other poor souls. | s3://commoncrawl/crawl-data/CC-MAIN-2016-30/segments/1469258918071.75/warc/CC-MAIN-20160723072838-00183-ip-10-185-27-174.ec2.internal.warc.gz | CC-MAIN-2016-30 | 1,297 | 10 |
https://calebhearth.com/tags/rants | code | What Free Speech Isn’t
The Constitution of the United States limits Congress from making laws to limit the freedom of speech of United States citizens.
Use One Field to Store Names or Addresses
Collect names & addresses from users in a single field, not structured forms.
Don’t Talk to (Just) Me
Company chatrooms aid communication, especially across multiple locations; they provide an archive for past conversations for those who were not around; and they can serve to refresh the memory of those who were.
Piracy is a Service Problem
Piracy is almost always a service problem and not a pricing problem.
Thoughts on the Google Reader Redesign
I loved Google Reader, but Google ended it in favor of Google+ | s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296948965.80/warc/CC-MAIN-20230329085436-20230329115436-00231.warc.gz | CC-MAIN-2023-14 | 711 | 10 |
http://linuxtracker.org/index.php?page=torrent-details&id=57f785c6232ccd3feef0481e2dd82a502d949803&hit=1 | code | This is the new Debian Wheezy packaged as a VMware image. The latest VMware Tools are already included. The Debian 7 VMware image needs software from VMware to be run. There are various versions available from VMware, but the free VMware Player will do fine. For more installation help visit our traffic tools site where we have also other major Linux distros as VMware images ready for downloading. | s3://commoncrawl/crawl-data/CC-MAIN-2018-17/segments/1524125945484.58/warc/CC-MAIN-20180422022057-20180422042057-00229.warc.gz | CC-MAIN-2018-17 | 399 | 1 |
http://www.flora.ca/oclug2002/text2.html | code | First page Back Continue Last page Overview Graphics
Geeks in Government?
Declan McCullagh wrote article "Geeks in Government: A good idea?" suggesting that coders should write code and stay out of politics.
RWM: bills, acts of parliament and laws are just 'code' which are ran in a less reliable operating environment.
Different software developers are better at writing different types of code. This applies to GUI vs kernel, CPU vs Parliament
We can't complain that we end up with 'buggy code' if qualified developers are not involved | s3://commoncrawl/crawl-data/CC-MAIN-2019-13/segments/1552912203493.88/warc/CC-MAIN-20190324210143-20190324232143-00220.warc.gz | CC-MAIN-2019-13 | 537 | 6 |
https://www.goldstar.com/events/houston-texas/around-the-world-in-80-days-tickets | code | Kids' Version of Around the World in 80 Days
The last date listed for Around The World In 80 Days was Saturday, Jun 2, 2018 / 2:00pm.
Quotes & Highlights
“[Writer] Toby Hulse takes on telling the story with a minimum of resources and a cast of just three to that most demanding of audiences: young children. Like Mr. Fogg, he pulls it off with style and élan.” —British Theatre Guide
“It’s such a healthy dose of Monty Python nonsense that keeps the adults tickled while the slapstick is laid on thick for the children and … it’s a merrily entertaining trip for all on board.” —Metro, UK | s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267160842.79/warc/CC-MAIN-20180924224739-20180925005139-00253.warc.gz | CC-MAIN-2018-39 | 606 | 5 |
https://lists.opencsw.org/pipermail/users/2018-September/010414.html | code | Python2.7 not recognising SUNW_1.23 on S10_u7
dam at opencsw.org
Mon Sep 3 08:46:59 CEST 2018
> Am 03.09.2018 um 00:56 schrieb Niranjana Raghavan via users <users at lists.opencsw.org>:
> Hi everyone,
> I'm trying to install python2.7 on solaris 10 u7 SPARC, but failing miserably.
> ld.so.1: python2.7: fatal: libc.so.1: version `SUNW_1.22.5' not found (required by file /opt/csw/bin/python2.7)
> ld.so.1: python2.7: fatal: libc.so.1: open failed: No such file or directory
> This system's C library was upgraded from SUNW_1.22.4 to 1.23, skipping the intermediate versions.
> I understand that the *minimum* libc version supported is SUNW_1.22.2. Then why is version 1.23 not recognised during installation?
> Is there a solution or a workaround?
The only solution is unfortunately to upgrade at least to Solaris 10u8:
"You don't become great by trying to be great, you become great by wanting to do something,
and then doing it so hard that you become great in the process." - xkcd #896
-------------- next part --------------
An HTML attachment was scrubbed...
More information about the users | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573399.40/warc/CC-MAIN-20220818185216-20220818215216-00619.warc.gz | CC-MAIN-2022-33 | 1,097 | 17 |
https://github.com/golang/go/issues/10963 | code | Join GitHub today
GitHub is home to over 50 million developers working together to host and review code, manage projects, and build software together.Sign up
GitHub is where the world builds software
Millions of developers and companies build, ship, and maintain their software on GitHub — the largest and most advanced development platform in the world.
time: document how to render milli/micro/nano in time.Format #10963
The reference time described in the docstring for Format doesn't provide a value for nanoseconds. This hides the functionality provided by the Format function to render milli, micro and nanoseconds.
This has led to some confusion that Format can't handle sub-second precision: https://groups.google.com/forum/#!topic/golang-nuts/TIinEnPu5wE
One option for a solution might just be to add '.000000000' to the reference time in the doc comment. | s3://commoncrawl/crawl-data/CC-MAIN-2020-50/segments/1606141189038.24/warc/CC-MAIN-20201127015426-20201127045426-00089.warc.gz | CC-MAIN-2020-50 | 867 | 8 |
https://www.techtarget.com/searchenterprisedesktop/tip/Desktop-management-tools-and-best-practices | code | The five key processes of inventory management, monitoring, software deployment, patching and security management may be implemented in different ways. Small organizations have different needs than large enterprises, and the range of desktop management tools reflect these differences.
Many businesses simply don't require enterprise-scale management tools such as Microsoft System Center. One desktop management option for small and medium-sized businesses (SMBs) is Microsoft Intune. The Intune client can only run on Windows 8.1, but the tool itself manages other Windows operating systems and even Apple's Mac OS X, Linux and Unix.
Perhaps one of the biggest benefits for small operations is the lack of hardware infrastructure requirements; Intune runs entirely in the cloud. Administrators use the central console to apply data security policies by device or individual user license. Policies also include controls for software updates and Windows firewall settings. There are additional controls for Microsoft Office, such as an automatic approval setting for critical updates.
Desktop Central is a jack-of-all-trades when it comes to desktop management. It is available in four editions that range from targeting SMBs to enterprises. The free edition, for example, provides full functionality for up to 25 desktops and five mobile devices.
There are controls for software patching, distribution, licensing and even device power usage via the Web-based control panel. Desktop Central includes USB device control (an important security inclusion), in addition to CD-ROM, Bluetooth and printer restrictions. The management console allows you to set USB restrictions to both individual users and machines.
The Dell Desktop Authority Management Suite includes a healthy selection of user-based controls. User restrictions are set without the use of logon scripts. Instead, each user environment can be tailored to a particular user's needs.
Administrators can set the different configurations by identity, role, operating system, device or connection type. Each configuration can then set controls for registry edits, proxy settings and driver configurations. In addition to controlling the accessible apps, admins may set USB, printer and general port access based on identity. There are more than 30 management settings that can be changed while a device is being used, streamlining the management process.
Client Management Suite is part of Symantec's larger Endpoint Management family of products and services. They are all licensed separately but complement one another well; in fact, the IT Management Suite is offered as an add-on to the Client Management Suite.
The Client Management Suite automates functions such as software deployment and patch management. It provides a custom reporting tool with drag-and-drop functionality for creating your own report template. Client Management Suite is supported for use on Windows, OS X, Linux and Unix. The suite always uses an encrypted connection when communicating with devices, via a demilitarized zone gateway, even when not communicating with a device through a virtual private network.
Desktop management best practices
A successful desktop management initiative should begin with policy, informed by user roles and responsibilities. For example, employees in similar roles and with similar responsibilities will likely require similar applications and access controls.
Employ the discovery features of desktop management tools to inventory desktop assets. Use monitoring tools to understand the demand load and performance profiles of these devices. This information is especially useful for planning and budgeting.
Desktop administrators should coordinate monitoring activities with security administrators. Desktops may provide useful information for some security operations. For example, if there were a security breach, a desktop log may contain useful information for forensic analysis. Security professionals may also depend on some desktop management features to enforce security policies, such as disabling the use of USB ports among employees with access to highly sensitive data.
Assume desktops may be relatively dynamic resources. No matter how well desktop administrators might anticipate the needs of users, those needs can change. Vulnerabilities will be detected. Users will want new versions of applications. Employees will join and leave the company. A centralized management platform can provide a single point of reference and data collection to enable a rationalized, efficient management scheme.
Desktop management may not get the press coverage of mobile device management or look like a silver bullet for inefficiencies in IT infrastructures, but it is an important and fundamental process of a more secure and successful operation.
Virtual desktop management tools
New tools make unified endpoint management a reality | s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474843.87/warc/CC-MAIN-20240229134901-20240229164901-00422.warc.gz | CC-MAIN-2024-10 | 4,906 | 17 |
https://forum.xojo.com/t/is-anybody-using-google-maps-api-calculations-by-matthew-combatti/48154 | code | Is there any Xojo user make use of Google Maps API & Calculations by Matthew Combatti?
Whenever I make a GoogleApi call from my browser I get the return string correctly but when I make the call through Combatti’s classes I got the message that I have to use
https:// instead of http://
but the thing is that my call has already the https://
I 'm testing the compiled webapp using Xojo Cloud server. | s3://commoncrawl/crawl-data/CC-MAIN-2020-34/segments/1596439739048.46/warc/CC-MAIN-20200813161908-20200813191908-00130.warc.gz | CC-MAIN-2020-34 | 401 | 5 |
https://casparcgforum.org/t/cmpwebnext/5745 | code | I want to share a work in progress project ‘CmpWebNext’. This is a casparcg client in Nextjs.13.4.3.
How to test=>Download from github, unzip, navigate to CmpWebNext folder, on command prompt npm i and then npm run dev.
For Now Connect, disconnect, send row command, getmedia files and click to play only done.
Goodwork vimlesh. All the best.
Hope we may have web cmp for our reference as dictionary of casper applications. | s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224645417.33/warc/CC-MAIN-20230530063958-20230530093958-00574.warc.gz | CC-MAIN-2023-23 | 427 | 5 |
https://www.tomshardware.com/reviews/ixsystems-freenas-mini,4162-3.html | code | Network-attached storage systems are composed of hardware and software. Both vary from one manufacturer to the next, but we find the software portion differentiates these products more. Many of the big names in NAS like Thecus, QNAP, Synology, LaCie and Netgear primarily use Linux for the base software. Western Digital and Seagate (now owner of LaCie) also have Linux-based systems. Some of the companies also ship a small number of products using Windows Storage Server as well. For the most part, it's a Linux world though. Most of us using NAS products in our homes or small- to medium-sized businesses know little about Linux. Fortunately, you don't really need to. The interface is easy to understand, even coming from a Windows mindset.
FreeNAS is based on FreeBSD and uses the OpenZFS files system. The underlying software is Unix-like. The BSD portion comes from Berkeley Software Distribution, the group that released the software in 1993. FreeBSD is still updated even today. Drivers and security-focused updates are incorporated into the system with each build.
If Linux is a fringe group operating outside of the mainstream, then FreeBSD would include that segment's radicals. If you require something outside of a compiled operating system, then prepare to dive down the rabbit hole. Help is available, though. As with any group filled with enthusiasts, there is no shortage of power users ready to steer you in the right direction, or in this case help you figure out how to run a command.
iXsystems takes all of unfamiliarity out of the FreeBSD-based FreeNAS operating system, although it rests just under the surface. For the most part, the OS looks like any other NAS GUI, aside from a few key differences.
The largest hang-up I've had with the system is setting up permissions. To be honest, it took quite a while to figure it out. Now that I understand what the system is asking for, and how to tell it what I need, it's a piece of cake. Some of the frustration has to do with terminology. This isn't a Windows world where you can right-click, share a folder with everyone and hit OK.
iXsystems takes steps to lessen the learning curve. The FreeNAS Mini includes a training course that covers administration, which you'd normally have to pay $350 for. All FreeNAS users can take advantage of a free Intro to FreeNAS course as well. The free session runs daily, and the administration class runs once a month.
If you wish to just jump in and use your FreeNAS Mini, the system also has a wizard to help you through the setup process. This feature is fairly new. It wasn't included in the software when I first worked with FreeNAS last year. Since then, I've built my own FreeNAS server with 40 drives and dual Xeon CPUs.
That leads me right into the ZFS file system, its features and what makes it so attractive. To start, the system can run RAIDZ, which is sort of like RAID5. RAIDZ2 is like traditional RAID 6. But unlike hardware RAID, you can run RAIDZ2 with three parity drives. The FreeNAS Mini only has four 3.5" storage bays so triple redundancy isn't a good choice. RAID10 is possible, as is striping (RAID 0).
- Web interface with optional SSL encryption
- Localized into over 20 languages
- Plug-in architecture
- Performance graphing
- Email log and reporting notification
- Downloadable configuration file and encryption keys
- OpenZFS v5000 file system with feature flags
- Theoretical storage limit of 16 exabytes
- File system snapshotting and replication
- Six levels of file system compression, including lz4 and gzip
- Disk encryption with GELI and AESNI hardware acceleration
- Disk deduplication
- S.M.A.R.T. disk diagnostics
- UFS2, NTFS, FAT32 and EXT2/3 read support for data import
- CIFS, AFP, NFS, iSCSI, SSH, FTP/TFTP protocols
- LDAP and Active Directory client support with Windows ACLs
- Apple Time Machine support
- rsync replication
- Link aggregation and failover
- VLAN networking
- Dynamic DNS client
- Remote syslogd forwarding
- SNMP monitoring
- UPS (uninterruptible power supply) support
- iozone, netperf, OpenVPN, tmux and other utilities
Most of the features are fairly standard on NAS products, though there are a few that stand out. Compression and deduplication (often called dedupe) are really attractive if you have a lot of repeating data and files that are easily compressed. Each share has independent settings, so you can pick and choose when, where and how much compression each pool receives.
FreeNAS also has a third-party plug-in system that expands as development grows. Here is a list with some of the more popular plug-ins.
- Bacula network backup server
- BitTorrent Sync distributed peer-to-peer file syncing application
- CouchPotato movie downloader
- Crashplan backup system
- CrucibleWDS Windows Deployment Solution
- Firefly Media Server
- Gamez automated downloader for video games
- HTPC-Manager graphical HTPC software manager
- LazyLibrarian eBook downloader
- Maraschino XBMC HTPC web interface
- MediaBrowser media center
- MineOS Minecraft server
- Mylar automated comic book downloader
- Owncloud personal cloud server
- Plex Media Server component
- s3cmd Amazon S3 backup utility
- Sabnzbd binary newsreader with Headphones audio download support
- Sickbeard PVR for newsgroup users
- Subsonic (media server)
- Syncthing file synchronization utility
- transmission BitTorrent client
- XDM eXtendable Download Manager | s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510427.16/warc/CC-MAIN-20230928162907-20230928192907-00646.warc.gz | CC-MAIN-2023-40 | 5,411 | 57 |
https://villains.fandom.com/wiki/Kaa_(2016) | code | NOTE: This article is about the incarnation of Kaa from the 2016 movie. The mainstream version can be found here: Kaa (Disney)
Mowgli: "Hello? Who's out there?" Kaa:: "Hi, little cub. Oh no don't be scared, I'm not gonna hurt you." Mowgli: "I was just passing through. I don't want any trouble." Kaa: "There's no trouble. Are you alone out here? That's not good. We should never be alone." Mowgli: "I'm waiting for a friend. He should be here soon." Kaa: "I can stay with you until he gets here. Would that be alright? I'll keep you safe, just you and me, sweet thing." Mowgli: "Who are you?" Kaa: "Kaa."
~ Kaa meeting Mowgli.
Oh you poor sweet thing. You want to stay in the jungle? You can be with me if you want. I'll keep you close. Let go of your fear now. Trust in me.
~ Kaa manipulating Mowgli.
Kaa is a supporting antagonist in the 2016 Disney live action film The Jungle Book, a remake of the 1967 animated classic film of the same name.
Kaa first appears when Mowgli stumbles upon her territory deep in the forest after he is separated from Bagheera by the villainous tiger named Shere Khan, where he discovers her shed snakeskin. After climbing into the trees and chasing animals that stole his food, Kaa begins to speak to him from above the trees before revealing herself to him.
Luring him in by promising to keep him safe, Kaa hypnotizes him and reveals that Mowgli came to live in the jungle because Shere Khan killed his father as they were traveling between villages, and that Bagheera later found Mowgli and brought him over to the wolves for protection.
She also reveals to him the power of the "Red Flower" (also known as fire) and its dangers in her vision. During her storytelling, she attempts to devour him, but a passing sloth bear named Baloo attacks Kaa and successfully rescues Mowgli, freeing him in the process.
Kaa is not seen again for the rest of the film; it is unknown if Baloo infrequently killed her or she went away and never came back. However, during the end credits, she is still alive and heard singing her song "Trust in Me", though this could simply be the music of the ending credits.
In this incarnation, Kaa is far more menacing and intelligent than her cartoon counterpart. She is extremely manipulative, duplicitous and persuasive, using her hypnotic eyes and compellingly seductive voice to lull her prey into a false sense of security incredibly effectively.
She is shown to be very knowledgeable and intellectual, being precisely aware of how Shere Khan came to hate Man and how Mowgli even came to be an adopted cub with the wolves. She is also terrifyingly calm and composed, never raising her voice, so as not to draw away her prey. She is also shown to be very imaginative, cunning and smart, able to feign a compassionate and empathetic personality to pull Mowgli into her trap.
Obviously, her immense size makes her extremely powerful, and she is unafraid to grapple with a bear the size and weight of Baloo. However, she was unable to defeat him, while Baloo is stronger than her. Despite her conniving and treacherous nature, she is shown to be harmonious and tuneful when she sings her song "Trust in Me".
Kaa introducing herself to Mowgli.
Kaa slithering closer to Mowgli.
Kaa hypnotizing Mowgli.
Kaa's hypnotic stare.
Kaa coiling Mowgli as she tells him about how he came to the jungle.
Kaa attempting to devour Mowgli before she was attacked by Baloo.
Kaa in promotional material.
Kaa the Snake
Scarlett Johansson with her character.
THE JUNGLE BOOK Movie Clip - Kaa Introduction (2016) Scarlett Johansson Disney HD
Scarlett Johansson - Trust in Me (From "The Jungle Book" (Audio Only))
The decision to make Kaa a female in the 2016 film was based on the need for gender diversity within the primarily male-driven cast of the 1967 animated film.
Kaa is the second Disney character to be gender-swapped in the live action version of their film. He was preceded by Jaq, who was a female mouse named Jacqueline in the 2015 version of Cinderella.
Just like King Louie (who was changed into a gigantopithecus), Kaa is changed into a reticulated python, due to the fact that she is even much larger than her cartoon counterpart. Her cartoon counterpart more closely resembles a ball python.
This version of Kaa has no scenes with Shere Khan or Bagheera and has only one scene with Baloo.
Her real age is unknown, but the actress providing her voice was around 31 years old at the time. | s3://commoncrawl/crawl-data/CC-MAIN-2021-39/segments/1631780057033.33/warc/CC-MAIN-20210920070754-20210920100754-00306.warc.gz | CC-MAIN-2021-39 | 4,444 | 29 |
https://www.harmonycb.com/use-case-software-agency.html | code | For an internaltionally operating software agency the accurate and efficient management of its
projects requires smooth and efficiently running operations, which also paves the way to scaling
to more projects and ensuring the quality of execution among its employees and customers. The project and
operations manager in the company had to wear many hats to ensure the goals for the project
are clearly laid out to the team, ressources are available, open questions can be adressed in time and the
successful execution according to the time and financial limitations of the project.
Team Workspace and Project Management
- Timeplanning (Gantt Chart)
- Team page for Goals, Ressources and answered questions
- Ability to ask questions and answer them for the whole team
- Finance tracking for project
- Information on and motivation of the client
- Accurate and efficient management decision making. All project information in one place
- One source of information for the team. Integrations with external surces for completion
- Scoped for growth
What has started as a single project page for knowledge management turned into a tool for managing that
efficiently within the team. The entire solution is build within the HarmonyCB workspace, connecting to
databases and google sheets. Teams can view the project goals, client goals, timeplans in one dashboard as
their progress. They can ask questions and project managment can include answered questions into the
When a project requires specific process guidlines the project and operations manager create, customize and
the project workspace to fulfill the new requirements.
© InceptIT 2019. All Rights Reserved. Powered by Bootstrap. | s3://commoncrawl/crawl-data/CC-MAIN-2020-34/segments/1596439738746.41/warc/CC-MAIN-20200811090050-20200811120050-00055.warc.gz | CC-MAIN-2020-34 | 1,685 | 22 |
https://online.flippingbook.com/view/371867313/20/ | code | One App (Integrated Mobile Payments)
How it works
Embed our code into your app and get world-class payment functionality and a superior UX without the cost and time delays of an in-house solution. And, since all payments are processed on our PCI network, we also eliminate most of your PCI compliance burden.
Adds payment functionality to an existing app
Why Mobile app in an app?
Customizable and brandable Connects to our PCI network, reducing compliance risk
• Creates a seamless, branded payment experience • Adds payments to their app easily and compliantly • Avoids the time and expense required to develop a payment processing solution • Puts transactions on our network, placing PCI compliance out of scope
Made with FlippingBook Learn more on our blog | s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474526.76/warc/CC-MAIN-20240224080616-20240224110616-00878.warc.gz | CC-MAIN-2024-10 | 768 | 8 |
https://www.hirzel.de/fachbuch/naturwissenschaften/akustik/view/titel/1468.html | code | The book contains a collection of formulas for Mathieu functions in a uniform notation for these functions, and also a description how these functions can be generated numerically. An example shows the use of Mathieu functions in a class of physical problems.
The book contains lists of numerial values and diagrams of the functions, as well as a print of computer programs for Mathieu functions.
A disk with these programs is added.
Readership: Mathematicians - Physicists - Engineers
244 p., 85 b/w ill, 81 b/w tables.
including a program disk (for Apple MacIntosh), hard cover
S. Hirzel Verlag | s3://commoncrawl/crawl-data/CC-MAIN-2021-39/segments/1631780057033.33/warc/CC-MAIN-20210920070754-20210920100754-00328.warc.gz | CC-MAIN-2021-39 | 596 | 7 |
https://www.mobileread.com/forums/showpost.php?p=2248146&postcount=21433 | code | Pride of Port in my mug.
So I have two weeks left at my current job. Everyone knows this and I just got back from Maternity Leave. This means I have nothing to do. (sigh) I ask everyday if my lead needs me to do something and the answer is no. But I have to be at my desk for 8 hours to get paid. My current company wants the full two week notice so I have done that but it is kind of boring. | s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917118310.2/warc/CC-MAIN-20170423031158-00202-ip-10-145-167-34.ec2.internal.warc.gz | CC-MAIN-2017-17 | 392 | 2 |
https://www.manualslib.com/manual/25007/Canon-Laser-Shot-Lbp-1110.html?page=120 | code | This tab shows information related to jobs that are completed. The
following types of information are displayed:
❏ Document name
❏ Printed At
The job history displayed in the job information area can list a history of
up to 100 jobs, beginning from the time the Status Window was started.
The job history clears whenever you terminate the Status Window.
Using the Canon Advanced Printing Technology | s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250597230.18/warc/CC-MAIN-20200120023523-20200120051523-00165.warc.gz | CC-MAIN-2020-05 | 402 | 8 |
https://community.bt.com/t5/Archive-Staging/Sporadic-broadband-connection-speeds/td-p/1411177 | code | I have at home BT Infinity and Home Hub 3, connected to a network cable which runs to the other end of house and a desktop (wired connection). Various mobile devices are connected to the HH3 wifi. We generally used to get download speeds of between 20 and 40 Mbps.
Over the past few weeks the internet connection has been very sporadic, often appearing that the internet is down. Rebooting HH3 sometimes does the trick, sometimes not. Connecting a laptop direct to HH3 via a cable sometimes gets good internet access, sometimes not, likewise the desktop with a wired connection to the HH3. The weird bit is that running a broadband speed check, either from the desktop or from an app on the iPad when very close to the HH3, can suddenly get 25 Mbps again. After this, the whole network gets fast access again, at least until the next time it seems to go to sleep.
BT's website reports "no faults" on my line.
I am aware that wifi hubs have a tendency to die after a few years - ours is perhaps 2-3 years old. However, the same problem occurs with the wired connections. Would a dying HH3 also affect the network switch capability and hence the devices on a wired connection?
Might it be a problem with the white box (modem?) that the HH3 connects to?
Any assistance gratefully received - you may have worked out that am no expert! | s3://commoncrawl/crawl-data/CC-MAIN-2021-10/segments/1614178347293.1/warc/CC-MAIN-20210224165708-20210224195708-00084.warc.gz | CC-MAIN-2021-10 | 1,330 | 6 |
http://www.40kforums.com/vb/archive/index.php/t-16597.html | code | View Full Version : 3000 point Space Wolves vs Orks Apoc game- Help!
28th September 2009, 20:49
Hi i play space wolves and am this weekend going to attend an Apocalypse game against two combined Ork forces and i would be very grateful if some of you could share some light on Orks and any tactics or tricks you guys could reveal to me would be great, cheers.
28th September 2009, 21:00
welll....what kind of ork armies are they fielding? Bikers, green tides, trukks?
28th September 2009, 21:01
Both armies are very deff dread and killa kan heavy armies
Powered by vBulletin® Version 4.2.2 Copyright © 2017 vBulletin Solutions, Inc. All rights reserved. | s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917122041.70/warc/CC-MAIN-20170423031202-00525-ip-10-145-167-34.ec2.internal.warc.gz | CC-MAIN-2017-17 | 654 | 8 |
https://www.apps4rent.com/office-365-resellers.html | code | Office 365 Reseller Program
For more than a decade, Apps4Rent has been providing hosted technology products from Microsoft to over 10,000 customers across 50+ countries. We are Gold Partners of Microsoft for Hosting as well as Collaboration and Content. From Fortune 500 corporations to small and medium businesses to individual users, customers trust our name for Microsoft products and services.
We are a leading Tier-1 Microsoft Office 365 Partner and now we bring you our Office 365 Reseller Program with no strings attached. The sign-up is free, with no commitments or obligations.
Our Product Portfolio
We have the widest range of Office 365 plans that help you come across as a single-window Microsoft source of value-for-money cloud products. We also have several add-on/stand-alone Microsoft Products that will enhance the business productivity of Office 365. Besides, Microsoft guarantees 99.9% uptime for Office 365. By reselling such cutting-edge products, you will add value to your existing customers as well as build up a new base of first-time clients quickly.
We offer Office 365 products at prices that are guaranteed to be the lowest in the market. In fact, all Office 365 products from Apps4Rent are available at the same price at which Microsoft sells them, and yet include complete migration and 24 x 7 end-user support totally free – which is offeblack by no other competitor in the industry.
Our Difference: Free End-user Support
Official support from Microsoft for Office 365 is minimal at its best: the end-users cannot contact Microsoft directly. Only one person from the entire organization can be designated as the admin who will be entertained by Microsoft. The response time (not resolution time) is 24 hours for email tickets. Phone support from Microsoft is limited to only those issues which are included in its official list of critical issues.
In comparison, Apps4Rent offers free 24 x 7 x 365 support for all the end-users to whom you will sell Office 365. Our Microsoft-certified team will be available round the clock to attend to calls, emails, and live chats to solve the smallest issues of your customers. And we do the entire Office 365 migration as well, totally free.
Our Reseller Advantage
You will be highly valued as a reseller of a leading Tier-1 Microsoft Office 365 Partner and Microsoft Gold Partner. We will empower you with creative collaterals, online brand awareness, social media presence, and other forms of marketing support. You will get access to our online knowledge base and resources that will help you understand, answer questions, and recommend the best choices to your customers.
The simple and easy billing and reseller tracking system that Apps4Rent uses is based on its position as a Tier-1 Microsoft Office 365 Partner. You get total transparency so that at any point in time you can see your sign-ups/sales and the earnings that have accumulated in your account. | s3://commoncrawl/crawl-data/CC-MAIN-2021-25/segments/1623488534413.81/warc/CC-MAIN-20210623042426-20210623072426-00060.warc.gz | CC-MAIN-2021-25 | 2,936 | 12 |
https://p2p.wrox.com/access/22598-data-access-pages-web.html | code | You should be able to the information below in access help files
Save a copy of a data access page to a Web server in Windows Explorer
In Microsoft Windows Explorer, right-click the file that you want to copy or move to a Web server.
On the shortcut menu, click Copy.
Click My Network Places.
In the list of My Network Places, double-click the folder that you want, and then right-click the destination folder you want to save the data access page (data access page: A Web page, published from Access, that has a connection to a database. In a data access page, you can view, add to, edit, and manipulate the data stored in the database. A page can also include data from other sources, such as Excel.) to.
On the shortcut menu, click Paste.
If you don't see the Web server that you want to save your data access page to, double-click Add Network Place and follow the instructions in the Add Network Place Wizard.
When you save a data access page, all supporting filesâ such as bullets, background textures, and graphicsâ are by default organized in a supporting folder. If you move or copy your page to another location, you must also move the supporting folder so that you maintain all links to your page.
Jaime E. Maccou | s3://commoncrawl/crawl-data/CC-MAIN-2021-10/segments/1614178358033.38/warc/CC-MAIN-20210226234926-20210227024926-00464.warc.gz | CC-MAIN-2021-10 | 1,225 | 10 |
http://www.kanitrino.de/en/Register/automaten.html | code | In a Cellular Automaton, the world is divided in squares. The time as well is progressing in discrete steps. At each move,
the state of a field changes in dependency of the state of the neighbouring fields.
The computer, making it possible to carry out a gigantic number of operations within a short time, has opened a new field of mathematics. It has become possible now to inverse the usual "top down" approach by creating on the micro-level a number of elements with individual "motivations", to let them interact a great number of times and to observe the effect on the macro-level. This is called a "bottom-up" analysis.
Stephen Wolfram described Cellular Automata in his ingenious book "A New Kind of Science".
A basic representant of such a two-dimensional automaton is shown here.
The starting point is a row of squares couloured in black or in white (in the present example, I have preferred blue and yellow, because it looks nicer). Furthermore the edges are linked, so forming a ring. You may draw such a row on a piece of squared paper for making it clearer.
Now, a new row is to be generated below the first one. The colouring of each of the new squares is determined by a set of eight rules depicted at the bottom of the pushbutton as eight T-shaped entities - the crossbar of the T's representing the old row and the lone square below the new one.
The first rule top left says "if the square above me is blue, and the sqares left and right from it, too, I will become yellow." By clicking with the mouse on the lone yellow square, it will turn blue. This makes the relevant rule turn into "if..., I will become blue". In this way, all rules possible with a neighbourhood of three fields can be set.
An additional feature is the "noise" which can be introduced with the sliders. A noise of 1.0 % means that one of a hundred decisions will be carried out in the wrong sens and, instead of yellow, the square turns blue, contrary to rules. This makes the model cease to be deterministic.
The Game of Life, published in 1970 by J. H. Conway, has evolved to a tremendous field of research between then and now.
Just start a Google search at this subject, it
is amazing (and largely free of any practical use).
The rules are simple, you can also play it with a pencil and a rubber on squared paper : A certain number of cells live on a pattern. At each move, all those which have too few (0 or 1) or too many (more than 3) neighbours will die. On empty squares with exactly 3 neighbours, new cells are born.
Two things can be noticed:
First, the game is deterministic; hence, for a given initial position, the evolution will always be the same.
Second, if you start from a random initial distribution, "life" will come to an end sooner or later, only static or oscillating groupings will be left on the gameboard.
This applet offers the possibility to vary the rules a little : Some conditions can be applied with a probability of less then 100%. One interesting modification is for instance to create the additional rule that a new cell shall be born on an empty square with only two neighbours, and this with a probability of 1 %. Such a slight modification provokes a large change of the game : It is no longer deterministic. Static or oscillating groupings are no longer stable. It is also remarkable that the whole board remains in a "living" state longer than with the original rules.
Furthermore, this applet allows to introduce "immortal" (red) cells. These are always counted, like normal cells, but neither they move nor disappear. Just see what you can do with it.
In 1952, Alan Turing described this form of pattern formation in chemical
reaction-diffusion systems ("The Chemical Basis of Morphogenesis").
It also plays a role in other domains, such as for instance at the formation of coat patterns of felines
in the course of their embryonic development.
The principle is that the neighbouring fields of each square exert an influence as a function of their distance either in the direction of their own colour or in the opposite sense.
As the calculations of Mister Turing exceed by far my IQ, I have chosen instead a super-simple approach : The number of the blue neighbouring fields in the close range of each square - divided by their distance (Pythagoras) - are added (value A). The same is done for the far range (value B), defined as 2.5 to 5 square lengths. Value B is now multiplied by a factor - the one which can be set with the slider. If value A is now greater than factor x value B, the field turns blue, in the opposite case it turns yellow.
Starting from randomly distributed blue fields, a stable stationary pattern will be formed quickly after the start. This can be considered as a standing wave or an interference pattern.
Here, a lot of blue fields are varying
their brightness in function of their
neighbours' behaviour. First, the blue fields fade away, until they are
white. The scale contains 50 steps, which are passed within two
seconds. Then, the colouration runs into the opposite sense.
As the fields are defined randomly, only a flickering can be observed at the beginning. In order to create structures, interaction between the cells is needed. In this applet, you can check three variations:
In the first one, the brightness of each field is adapted to the mean value of the brightness of its neighbours. This happens at the two turning points, when a cell is white or dark blue.
In the second variation, a cell arriving at the white extreme point makes all eight neighbours fading a little away by one step (of 50). The cell itself will become eight steps darker. This is necessary to avoid the neighbour cells paralysing each other. The opposite thing happens at the blue turning point.
At the third modification, the direction of (dis)coloration is turned into the opposite sense, if the majority of the cell's neighbours do the same. When for instance a cell is fading and 5 of its neighbours are moving from white to blue, this cell will switch its direction and become darker.
Here you can paint ornaments.
At the beginning, all the fields are gray. If you click the red button "Color Seed", the central field is dyed in a random color. Since each field is continuously calculating its own colour in function of the colours of its eight - direct and diagonal - neighbouring fields, the gray boxes start to take on a colour as well. New colour seedig will affect the evolution of the ornament.
The basis of the color calculation is the RGB system, in which the components Red, Green and Blue are represented by numbers from 0 to 255.
At each cycle of 40 milliseconds, the difference of the R, G and B components of each field to its eight neighboring fields is formed. When the total difference exceeds a threshold value, each R, G and B value is modified in the direction of this average (by +1 or by -1).
Watching the mandala with patience will lead you to enlightenment. | s3://commoncrawl/crawl-data/CC-MAIN-2019-04/segments/1547583684033.26/warc/CC-MAIN-20190119221320-20190120003320-00440.warc.gz | CC-MAIN-2019-04 | 6,934 | 39 |
https://tooploox.com/i-am-ai-tooploox-at-gpu-technology-conference-2017 | code | Every year, thousands of developers, researchers, engineers and entrepreneurs make a pilgrimage to San Jose Convention Center – the focal point of computing revolution powered by Nvidia’s most powerful GPUs. This year, Tooploox joined this crowd and this blogpost gives you a brief overview of our visit at GTC 2017.
If you wanna learn what GTC is about in less than three minutes – here’s the easiest way:
It’s an opening scene of this year’s keynote presentation by Jensen Huang, CEO of Nvidia. Although it covers a lot of topics, discussed during the GTC conference, I believe that the common thread that connects all of them is obvious: Artificial Intelligence (AI).
So if you are keen on learning how our AI-powered tomorrow will look like, fasten your seatbelts, sit down, relax and let us take you for a quick journey around GTC 2017.
We flew to California just before the conference started. The land of hi-tech startups and delicious avocado, greeted us with a beautiful cloudless sun and an amazing view over the Bay area:
The next day, we woke up pretty early (thank you, jetlag!) and headed out to the conference venue, as quickly as we could. We thought we were gonna be the first ones there, but…
… we were wrong. The line to the registration desk was pretty long, but it moved fairly quickly, so we were all set in no time.
The first thing that caught our attention after getting in were a bunch of cars, that looked almost like a regular ones, except for the fact that… they were not. Equipped with a bunch of sensors, LIDAR and cameras, Udacity’s Lincoln and Audi Q7 were greeting the visitors in the entrance lobby.
This was just the beginning of a set of events and talks around the topic of autonomous driving that took place at GTC. The organizers dedicated an entire auditorium and a huge space in the exhibition hall for everything that touches the topic of autonomous driving. There was even an invitation-only autonomous driving reception party (which we attended, dah!).
For full overview, you can visit Nvidia’s blogpost.
At GTC, Nvidia proves that deep learning and GPUs are inseparable. By inviting the most respected researchers in the field – Ian Goodfellow, Russ Salakhutdinov or Raquel Urtasun – to give a talk, Nvidia sends a clear signal: deep learning is the main focus of their products.
Among numerous talks on applying deep learning to solve industrial, fintech or agricultural problems, let’s highlight a couple that we found the most interesting.
Recent advancements in deep learning
This was a very interesting talk given by Russ Salakhutdinov from the famous deep learning group at University of Toronto. He started by introducing a broad class of deep learning models and showed that they can learn useful hierarchical representations from large volumes of high-dimensional data with applications in information retrieval, object recognition, and speech perception. He next talked about deep models that are capable of extracting a unified representation that fuses together multiple data modalities. In particular, he talked about models that can generate natural language descriptions (captions) of images, as well as generate images from captions using attention mechanism. Finally, he discussed an approach for unsupervised learning of a generic, distributed sentence encoder and introduced multiplicative and fine-grained gating mechanisms with application to question/answering systems and reading comprehension. After leaving the talk, we were pretty overwhelmed with the amount of effort Russ and his group puts into unsupervised learning and AI-reasoning powered by unlabeled data.
Sentiment analysis with unsupervised learning
Another talk on unsupervised learning we attended was given by Stephen McGough from Durham University. According to Stephen, est. 85% of worldwide data is held in unstructured/unlabelled formats – increasing at a rate of roughly 7 million digital pages per day. Exploiting these large datasets can open the door for providing policy makers, corporations, and end-users with unprecedented knowledge for better planning, decision making, and new services. Deep learning and probabilistic topic modeling have shown great potential for analysing such datasets. This analysis helps in: discovering anomalies within these datasets, unravelling underlying patterns/trends, or finding similar texts within a dataset. The talk illustrated how we can use a combined unsupervised deep learning and topic modeling approach for sentiment analysis requiring minimal feature engineering or prior assumptions, and outperforming the state of the art approaches to sentiment analysis.
Deep incremental scene understanding
The last talk we would like to highlight in this post was given by Federico Tombari from Bologne University, visiting Technical University of Munich. During the talk he demonstrated recent advances in the field of deep learning and computer vision aimed at scene understanding from images. He presented two research works on this subject. The first one relates to the use of deep learning for monocular simultaneous localization and mapping (SLAM) and semantic segmentation. The outcome is a technique able to carry out accurate real-time semantic mapping and 3D reconstruction from a single RGB camera. The second research work uses deep learning for solving ambiguous prediction problems. Federico demonstrated how the two approaches can be merged together to enable robust extraction of 3D semantic information such as pixel-wise labeling and object detection in real time by means of a simple webcam.
On top of the talks on deep learning, Nvidia organized a few other attractions for machine learning geeks. First of them was an opportunity to get an autograph of Ian Goodfellow on the Deep Learning book he co-authored. The line was preeeety long, so we didn’t actually wait, but it was interesting to see how famous deep learning researchers can get nowadays…
Another interesting event (or rather a series of events) was a set of meetings entitled “Connect with the experts” where beginner and intermediate-level programmers could find out more about deep learning and ask all the various questions came to their mind. It was a really exciting opportunity, judging by the size of the crowd around those stands, and we enjoyed listening to the experts too!
Medicine of the future
I am a healer – said the voice in the opening video at the Keynote presentation. And it was not only about the keynote. GTC was full of vivid examples on how GPU-powered deep learning can help doctors and patients all over the world. One notable example is Triage – a mobile app that helps to detect early stages of skin cancer using convolutional neural networks.
Several talks were also focused on applying deep learning to x-ray images and detecting cancerogenous tissues in them. Although the topic itself is quite interesting and was researched for a long time, only very recently have there been enough data available publicly that deep learning methods could be trained for x-ray analysis applications. Organization such as Lung Image Database Consortium or Image Database Resource Initiative made it possible for big datasets, such as LIDC-IDRI dataset, to be collected. Another dataset, Medical ImageNet, was also presented at the GTC conference. All the efforts focused on collecting big datasets of annotated medical data have made the development of AI-powered autodiagnostic tools possible and this is why Nvidia’s I am a healer claim is absolutely true.
Veni, vidi, vici. GTC was an amazing experience for us, we will definitely be back next year, even if just to 3D-scan ourselves again or take a look at our GAN-generated portraits! | s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296818474.95/warc/CC-MAIN-20240423095619-20240423125619-00390.warc.gz | CC-MAIN-2024-18 | 7,762 | 24 |
https://forum.runesofmagic.gameforge.com/forum/thread/6100-is-stats-pulling-rigged/ | code | Yesterday i bought a number of EOJ items from the npc in Chassizz trying to get certain stats. In theory there is 1/4 chance to get a needed stat on each items. In practice there were only 5 "good stats in at least 28 pulls. Someone told me he had even worse luck with mass pulls. It's harder to provide reliable statistics on shell items but a number of people mentioned quite disturbing "coincidences" there too.
So the question is what are the real probabilities for each stat in eoj, shell, honor, pom pulls?
Please note the emphasis in the previous sentence. All statements about database values, lua files etc are simply irrelevant. Players get actual items with actual stats, not someone's assumptions about how the game should work.
@Game Maters. Could you please do some tests? Create a char, refill its currencies as necessary, make hundreds of pulls and share the statistics. Many players will be grateful for this. | s3://commoncrawl/crawl-data/CC-MAIN-2021-17/segments/1618039594808.94/warc/CC-MAIN-20210423131042-20210423161042-00206.warc.gz | CC-MAIN-2021-17 | 926 | 4 |
https://www.python.org/dev/peps/pep-0249/ | code | |Title:||Python Database API Specification v2.0|
|Author:||mal at lemburg.com (Marc-André Lemburg)|
|Discussions-To:||db-sig at python.org|
- Module Interface
- Connection Objects
- Cursor Objects
- Type Objects and Constructors
- Implementation Hints for Module Authors
- Optional DB API Extensions
- Optional Error Handling Extensions
- Optional Two-Phase Commit Extensions
- Frequently Asked Questions
- Major Changes from Version 1.0 to Version 2.0
- Open Issues
This API has been defined to encourage similarity between the Python modules that are used to access databases. By doing this, we hope to achieve a consistency leading to more easily understood modules, code that is generally more portable across databases, and a broader reach of database connectivity from Python.
Comments and questions about this specification may be directed to the SIG for Database Interfacing with Python.
For more information on database interfacing with Python and available packages see the Database Topic Guide.
This document describes the Python Database API Specification 2.0 and a set of common optional extensions. The previous version 1.0 version is still available as reference, in PEP 248. Package writers are encouraged to use this version of the specification as basis for new interfaces.
Access to the database is made available through connection objects. The module must provide the following constructor for these:
These module globals must be defined:
String constant stating the supported DB API level.
Currently only the strings "1.0" and "2.0" are allowed. If not given, a DB-API 1.0 level interface should be assumed.
Integer constant stating the level of thread safety the interface supports. Possible values are:
threadsafety Meaning 0 Threads may not share the module. 1 Threads may share the module, but not connections. 2 Threads may share the module and connections. 3 Threads may share the module, connections and cursors.
Sharing in the above context means that two threads may use a resource without wrapping it using a mutex semaphore to implement resource locking. Note that you cannot always make external resources thread safe by managing access using a mutex: the resource may rely on global variables or other external sources that are beyond your control.
String constant stating the type of parameter marker formatting expected by the interface. Possible values are :
paramstyle Meaning qmark Question mark style, e.g. ...WHERE name=? numeric Numeric, positional style, e.g. ...WHERE name=:1 named Named style, e.g. ...WHERE name=:name format ANSI C printf format codes, e.g. ...WHERE name=%s pyformat Python extended format codes, e.g. ...WHERE name=%(name)s
The module should make all error information available through these exceptions or subclasses thereof:
- Exception raised for important warnings like data truncations while inserting, etc. It must be a subclass of the Python StandardError (defined in the module exceptions).
- Exception that is the base class of all other error exceptions. You can use this to catch all errors with one single except statement. Warnings are not considered errors and thus should not use this class as base. It must be a subclass of the Python StandardError (defined in the module exceptions).
- Exception raised for errors that are related to the database interface rather than the database itself. It must be a subclass of Error.
- Exception raised for errors that are related to the database. It must be a subclass of Error.
- Exception raised for errors that are due to problems with the processed data like division by zero, numeric value out of range, etc. It must be a subclass of DatabaseError.
- Exception raised for errors that are related to the database's operation and not necessarily under the control of the programmer, e.g. an unexpected disconnect occurs, the data source name is not found, a transaction could not be processed, a memory allocation error occurred during processing, etc. It must be a subclass of DatabaseError.
- Exception raised when the relational integrity of the database is affected, e.g. a foreign key check fails. It must be a subclass of DatabaseError.
- Exception raised when the database encounters an internal error, e.g. the cursor is not valid anymore, the transaction is out of sync, etc. It must be a subclass of DatabaseError.
- Exception raised for programming errors, e.g. table not found or already exists, syntax error in the SQL statement, wrong number of parameters specified, etc. It must be a subclass of DatabaseError.
- Exception raised in case a method or database API was used which is not supported by the database, e.g. requesting a .rollback() on a connection that does not support transaction or has transactions turned off. It must be a subclass of DatabaseError.
This is the exception inheritance layout:
StandardError |__Warning |__Error |__InterfaceError |__DatabaseError |__DataError |__OperationalError |__IntegrityError |__InternalError |__ProgrammingError |__NotSupportedError
The values of these exceptions are not defined. They should give the user a fairly good idea of what went wrong, though.
Connection objects should respond to the following methods.
Close the connection now (rather than whenever .__del__() is called).
The connection will be unusable from this point forward; an Error (or subclass) exception will be raised if any operation is attempted with the connection. The same applies to all cursor objects trying to use the connection. Note that closing a connection without committing the changes first will cause an implicit rollback to be performed.
Commit any pending transaction to the database.
Note that if the database supports an auto-commit feature, this must be initially off. An interface method may be provided to turn it back on.
Database modules that do not support transactions should implement this method with void functionality.
This method is optional since not all databases provide transaction support.
In case a database does provide transactions this method causes the database to roll back to the start of any pending transaction. Closing a connection without committing the changes first will cause an implicit rollback to be performed.
These objects represent a database cursor, which is used to manage the context of a fetch operation. Cursors created from the same connection are not isolated, i.e., any changes done to the database by a cursor are immediately visible by the other cursors. Cursors created from different connections can or can not be isolated, depending on how the transaction support is implemented (see also the connection's .rollback() and .commit() methods).
Cursor Objects should respond to the following methods and attributes.
This read-only attribute is a sequence of 7-item sequences.
Each of these sequences contains information describing one result column:
The first two items (name and type_code) are mandatory, the other five are optional and are set to None if no meaningful values can be provided.
This attribute will be None for operations that do not return rows or if the cursor has not had an operation invoked via the .execute*() method yet.
The type_code can be interpreted by comparing it to the Type Objects specified in the section below.
Future versions of the DB API specification could redefine the latter case to have the object return None instead of -1.
- .callproc( procname [, parameters ] )
(This method is optional since not all databases provide stored procedures. )
Call a stored database procedure with the given name. The sequence of parameters must contain one entry for each argument that the procedure expects. The result of the call is returned as modified copy of the input sequence. Input parameters are left untouched, output and input/output parameters replaced with possibly new values.
The procedure may also provide a result set as output. This must then be made available through the standard .fetch*() methods.
Close the cursor now (rather than whenever __del__ is called).
The cursor will be unusable from this point forward; an Error (or subclass) exception will be raised if any operation is attempted with the cursor.
- .execute(operation [, parameters])
Prepare and execute a database operation (query or command).
Parameters may be provided as sequence or mapping and will be bound to variables in the operation. Variables are specified in a database-specific notation (see the module's paramstyle attribute for details).
A reference to the operation will be retained by the cursor. If the same operation object is passed in again, then the cursor can optimize its behavior. This is most effective for algorithms where the same operation is used, but different parameters are bound to it (many times).
For maximum efficiency when reusing an operation, it is best to use the .setinputsizes() method to specify the parameter types and sizes ahead of time. It is legal for a parameter to not match the predefined information; the implementation should compensate, possibly with a loss of efficiency.
The parameters may also be specified as list of tuples to e.g. insert multiple rows in a single operation, but this kind of usage is deprecated: .executemany() should be used instead.
Return values are not defined.
- .executemany( operation, seq_of_parameters )
Prepare a database operation (query or command) and then execute it against all parameter sequences or mappings found in the sequence seq_of_parameters.
Modules are free to implement this method using multiple calls to the .execute() method or by using array operations to have the database process the sequence as a whole in one call.
Use of this method for an operation which produces one or more result sets constitutes undefined behavior, and the implementation is permitted (but not required) to raise an exception when it detects that a result set has been created by an invocation of the operation.
The same comments as for .execute() also apply accordingly to this method.
Return values are not defined.
Fetch the next row of a query result set, returning a single sequence, or None when no more data is available.
Fetch the next set of rows of a query result, returning a sequence of sequences (e.g. a list of tuples). An empty sequence is returned when no more rows are available.
The number of rows to fetch per call is specified by the parameter. If it is not given, the cursor's arraysize determines the number of rows to be fetched. The method should try to fetch as many rows as indicated by the size parameter. If this is not possible due to the specified number of rows not being available, fewer rows may be returned.
Note there are performance considerations involved with the size parameter. For optimal performance, it is usually best to use the .arraysize attribute. If the size parameter is used, then it is best for it to retain the same value from one .fetchmany() call to the next.
Fetch all (remaining) rows of a query result, returning them as a sequence of sequences (e.g. a list of tuples). Note that the cursor's arraysize attribute can affect the performance of this operation.
(This method is optional since not all databases support multiple result sets. )
This method will make the cursor skip to the next available set, discarding any remaining rows from the current set.
If there are no more sets, the method returns None. Otherwise, it returns a true value and subsequent calls to the .fetch*() methods will return rows from the next result set.
This read/write attribute specifies the number of rows to fetch at a time with .fetchmany(). It defaults to 1 meaning to fetch a single row at a time.
Implementations must observe this value with respect to the .fetchmany() method, but are free to interact with the database a single row at a time. It may also be used in the implementation of .executemany().
This can be used before a call to .execute*() to predefine memory areas for the operation's parameters.
sizes is specified as a sequence — one item for each input parameter. The item should be a Type Object that corresponds to the input that will be used, or it should be an integer specifying the maximum length of a string parameter. If the item is None, then no predefined memory area will be reserved for that column (this is useful to avoid predefined areas for large inputs).
This method would be used before the .execute*() method is invoked.
Implementations are free to have this method do nothing and users are free to not use it.
- .setoutputsize(size [, column])
Set a column buffer size for fetches of large columns (e.g. LONGs, BLOBs, etc.). The column is specified as an index into the result sequence. Not specifying the column will set the default size for all large columns in the cursor.
This method would be used before the .execute*() method is invoked.
Implementations are free to have this method do nothing and users are free to not use it.
Many databases need to have the input in a particular format for binding to an operation's input parameters. For example, if an input is destined for a DATE column, then it must be bound to the database in a particular string format. Similar problems exist for "Row ID" columns or large binary items (e.g. blobs or RAW columns). This presents problems for Python since the parameters to the .execute*() method are untyped. When the database module sees a Python string object, it doesn't know if it should be bound as a simple CHAR column, as a raw BINARY item, or as a DATE.
To overcome this problem, a module must provide the constructors defined below to create objects that can hold special values. When passed to the cursor methods, the module can then detect the proper type of the input parameter and bind it accordingly.
A Cursor Object's description attribute returns information about each of the result columns of a query. The type_code must compare equal to one of Type Objects defined below. Type Objects may be equal to more than one type code (e.g. DATETIME could be equal to the type codes for date, time and timestamp columns; see the Implementation Hints below for details).
The module exports the following constructors and singletons:
- Date(year, month, day)
- This function constructs an object holding a date value.
- Time(hour, minute, second)
- This function constructs an object holding a time value.
- Timestamp(year, month, day, hour, minute, second)
- This function constructs an object holding a time stamp value.
- This function constructs an object holding a date value from the given ticks value (number of seconds since the epoch; see the documentation of the standard Python time module for details).
- This function constructs an object holding a time value from the given ticks value (number of seconds since the epoch; see the documentation of the standard Python time module for details).
- This function constructs an object holding a time stamp value from the given ticks value (number of seconds since the epoch; see the documentation of the standard Python time module for details).
- This function constructs an object capable of holding a binary (long) string value.
- STRING type
- This type object is used to describe columns in a database that are string-based (e.g. CHAR).
- BINARY type
- This type object is used to describe (long) binary columns in a database (e.g. LONG, RAW, BLOBs).
- NUMBER type
- This type object is used to describe numeric columns in a database.
- DATETIME type
- This type object is used to describe date/time columns in a database.
- ROWID type
- This type object is used to describe the "Row ID" column in a database.
SQL NULL values are represented by the Python None singleton on input and output.
Usage of Unix ticks for database interfacing can cause troubles because of the limited date range they cover.
During the lifetime of DB API 2.0, module authors have often extended their implementations beyond what is required by this DB API specification. To enhance compatibility and to provide a clean upgrade path to possible future versions of the specification, this section defines a set of common extensions to the core DB API 2.0 specification.
As with all DB API optional features, the database module authors are free to not implement these additional attributes and methods (using them will then result in an AttributeError) or to raise a NotSupportedError in case the availability can only be checked at run-time.
It has been proposed to make usage of these extensions optionally visible to the programmer by issuing Python warnings through the Python warning framework. To make this feature useful, the warning messages must be standardized in order to be able to mask them. These standard messages are referred to below as Warning Message.
This read-only attribute should provide the current 0-based index of the cursor in the result set or None if the index cannot be determined.
The index can be seen as index of the cursor in a sequence (the result set). The next fetch operation will fetch the row indexed by .rownumber in that sequence.
Warning Message: "DB-API extension cursor.rownumber used"
- Connection.Error, Connection.ProgrammingError, etc.
All exception classes defined by the DB API standard should be exposed on the Connection objects as attributes (in addition to being available at module scope).
These attributes simplify error handling in multi-connection environments.
Warning Message: "DB-API extension connection.<exception> used"
This read-only attribute return a reference to the Connection object on which the cursor was created.
The attribute simplifies writing polymorph code in multi-connection environments.
Warning Message: "DB-API extension cursor.connection used"
- Cursor.scroll(value [, mode='relative' ])
Scroll the cursor in the result set to a new position according to mode.
If mode is relative (default), value is taken as offset to the current position in the result set, if set to absolute, value states an absolute target position.
An IndexError should be raised in case a scroll operation would leave the result set. In this case, the cursor position is left undefined (ideal would be to not move the cursor at all).
This method should use native scrollable cursors, if available, or revert to an emulation for forward-only scrollable cursors. The method may raise NotSupportedError to signal that a specific operation is not supported by the database (e.g. backward scrolling).
Warning Message: "DB-API extension cursor.scroll() used"
This is a Python list object to which the interface appends tuples (exception class, exception value) for all messages which the interfaces receives from the underlying database for this cursor.
The list is cleared by all standard cursor methods calls (prior to executing the call) except for the .fetch*() calls automatically to avoid excessive memory usage and can also be cleared by executing del cursor.messages[:].
All error and warning messages generated by the database are placed into this list, so checking the list allows the user to verify correct operation of the method calls.
The aim of this attribute is to eliminate the need for a Warning exception which often causes problems (some warnings really only have informational character).
Warning Message: "DB-API extension cursor.messages used"
Same as Cursor.messages except that the messages in the list are connection oriented.
The list is cleared automatically by all standard connection methods calls (prior to executing the call) to avoid excessive memory usage and can also be cleared by executing del connection.messages[:].
Warning Message: "DB-API extension connection.messages used"
Return the next row from the currently executing SQL statement using the same semantics as .fetchone(). A StopIteration exception is raised when the result set is exhausted for Python versions 2.2 and later. Previous versions don't have the StopIteration exception and so the method should raise an IndexError instead.
Warning Message: "DB-API extension cursor.next() used"
Return self to make cursors compatible to the iteration protocol .
Warning Message: "DB-API extension cursor.__iter__() used"
This read-only attribute provides the rowid of the last modified row (most databases return a rowid only when a single INSERT operation is performed). If the operation does not set a rowid or if the database does not support rowids, this attribute should be set to None.
The semantics of .lastrowid are undefined in case the last executed statement modified more than one row, e.g. when using INSERT with .executemany().
Warning Message: "DB-API extension cursor.lastrowid used"
The core DB API specification only introduces a set of exceptions which can be raised to report errors to the user. In some cases, exceptions may be too disruptive for the flow of a program or even render execution impossible.
For these cases and in order to simplify error handling when dealing with databases, database module authors may choose to implement user definable error handlers. This section describes a standard way of defining these error handlers.
- Connection.errorhandler, Cursor.errorhandler
Read/write attribute which references an error handler to call in case an error condition is met.
The handler must be a Python callable taking the following arguments:
errorhandler(connection, cursor, errorclass, errorvalue)
where connection is a reference to the connection on which the cursor operates, cursor a reference to the cursor (or None in case the error does not apply to a cursor), errorclass is an error class which to instantiate using errorvalue as construction argument.
The standard error handler should add the error information to the appropriate .messages attribute (Connection.messages or Cursor.messages) and raise the exception defined by the given errorclass and errorvalue parameters.
If no .errorhandler is set (the attribute is None), the standard error handling scheme as outlined above, should be applied.
Warning Message: "DB-API extension .errorhandler used"
Cursors should inherit the .errorhandler setting from their connection objects at cursor creation time.
Many databases have support for two-phase commit (TPC) which allows managing transactions across multiple database connections and other resources.
If a database backend provides support for two-phase commit and the database module author wishes to expose this support, the following API should be implemented. NotSupportedError should be raised, if the database backend support for two-phase commit can only be checked at run-time.
As many databases follow the XA specification, transaction IDs are formed from three components:
- a format ID
- a global transaction ID
- a branch qualifier
For a particular global transaction, the first two components should be the same for all resources. Each resource in the global transaction should be assigned a different branch qualifier.
The various components must satisfy the following criteria:
- format ID: a non-negative 32-bit integer.
- global transaction ID and branch qualifier: byte strings no longer than 64 characters.
Transaction IDs are created with the .xid() Connection method:
- .xid(format_id, global_transaction_id, branch_qualifier)
Returns a transaction ID object suitable for passing to the .tpc_*() methods of this connection.
If the database connection does not support TPC, a NotSupportedError is raised.
The type of the object returned by .xid() is not defined, but it must provide sequence behaviour, allowing access to the three components. A conforming database module could choose to represent transaction IDs with tuples rather than a custom object.
Begins a TPC transaction with the given transaction ID xid.
Furthermore, it is an error to call .commit() or .rollback() within the TPC transaction. A ProgrammingError is raised, if the application calls .commit() or .rollback() during an active TPC transaction.
If the database connection does not support TPC, a NotSupportedError is raised.
- .tpc_commit([ xid ])
If .tpc_commit() is called prior to .tpc_prepare(), a single phase commit is performed. A transaction manager may choose to do this if only a single resource is participating in the global transaction.
When called with a transaction ID xid, the database commits the given transaction. If an invalid transaction ID is provided, a ProgrammingError will be raised. This form should be called outside of a transaction, and is intended for use in recovery.
On return, the TPC transaction is ended.
- .tpc_rollback([ xid ])
When called with a transaction ID xid, it rolls back the given transaction. If an invalid transaction ID is provided, a ProgrammingError is raised. This form should be called outside of a transaction, and is intended for use in recovery.
On return, the TPC transaction is ended.
The database SIG often sees reoccurring questions about the DB API specification. This section covers some of the issues people sometimes have with the specification.
How can I construct a dictionary out of the tuples returned by .fetch*():
There are several existing tools available which provide helpers for this task. Most of them use the approach of using the column names defined in the cursor attribute .description as basis for the keys in the row dictionary.
Note that the reason for not extending the DB API specification to also support dictionary return values for the .fetch*() methods is that this approach has several drawbacks:
- Some databases don't support case-sensitive column names or auto-convert them to all lowercase or all uppercase characters.
- Columns in the result set which are generated by the query (e.g. using SQL functions) don't map to table column names and databases usually generate names for these columns in a very database specific way.
As a result, accessing the columns through dictionary keys varies between databases and makes writing portable code impossible.
The Python Database API 2.0 introduces a few major changes compared to the 1.0 version. Because some of these changes will cause existing DB API 1.0 based scripts to break, the major version number was adjusted to reflect this change.
These are the most important changes from 1.0 to 2.0:
- The need for a separate dbi module was dropped and the functionality merged into the module interface itself.
- New constructors and Type Objects were added for date/time values, the RAW Type Object was renamed to BINARY. The resulting set should cover all basic data types commonly found in modern SQL databases.
- New constants (apilevel, threadsafety, paramstyle) and methods (.executemany(), .nextset()) were added to provide better database bindings.
- The semantics of .callproc() needed to call stored procedures are now clearly defined.
- The definition of the .execute() return value changed. Previously, the return value was based on the SQL statement type (which was hard to implement right) — it is undefined now; use the more flexible .rowcount attribute instead. Modules are free to return the old style return values, but these are no longer mandated by the specification and should be considered database interface dependent.
- Class based exceptions were incorporated into the specification. Module implementors are free to extend the exception layout defined in this specification by subclassing the defined exception classes.
Post-publishing additions to the DB API 2.0 specification:
- Additional optional DB API extensions to the set of core functionality were specified.
Although the version 2.0 specification clarifies a lot of questions that were left open in the 1.0 version, there are still some remaining issues which should be addressed in future versions:
As a guideline the connection constructor parameters should be implemented as keyword parameters for more intuitive use and follow this order of parameters:
E.g. a connect could look like this:
connect(dsn='myhost:MYDB', user='guido', password='234$')
|||Module implementors should prefer numeric, named or pyformat over the other formats because these offer more clarity and flexibility.|
|||(1, 2, 3) |
If the database does not support the functionality required by the method, the interface should throw an exception in case the method is used.
The preferred approach is to not implement the method and thus have Python generate an AttributeError in case the method is requested. This allows the programmer to check for database capabilities using the standard hasattr() function.
For some dynamically configured interfaces it may not be appropriate to require dynamically making the method available. These interfaces should then raise a NotSupportedError to indicate the non-ability to perform the roll back when the method is invoked.
|||A database interface may choose to support named cursors by allowing a string argument to the method. This feature is not part of the specification, since it complicates semantics of the .fetch*() methods.|
The module will use the __getitem__ method of the parameters object to map either positions (integers) or names (strings) to parameter values. This allows for both sequences and mappings to be used as input.
The term bound refers to the process of binding an input value to a database execution buffer. In practical terms, this means that the input value is directly used as a value in the operation. The client should not be required to "escape" the value so that it can be used — the value should be equal to the actual database value.
|||Note that the interface may implement row fetching using arrays and other optimizations. It is not guaranteed that a call to this method will only move the associated cursor forward by one row.|
|||The rowcount attribute may be coded in a way that updates its value dynamically. This can be useful for databases that return usable rowcount values only after the first call to a .fetch*() method.|
|||Implementation Note: Python C extensions will have to implement the tp_iter slot on the cursor object instead of the .__iter__() method.|
|||The term number of affected rows generally refers to the number of rows deleted, updated or inserted by the last statement run on the database cursor. Most databases will return the total number of rows that were found by the corresponding WHERE clause of the statement. Some databases use a different interpretation for UPDATEs and only return the number of rows that were changed by the UPDATE, even though the WHERE clause of the statement may have found more matching rows. Database module authors should try to implement the more common interpretation of returning the total number of rows found by the WHERE clause, or clearly document a different interpretation of the .rowcount attribute.|
Many thanks go to Andrew Kuchling who converted the Python Database API Specification 2.0 from the original HTML format into the PEP format.
Many thanks to James Henstridge for leading the discussion which led to the standardization of the two-phase commit API extensions.
Many thanks to Daniele Varrazzo for converting the specification from text PEP format to ReST PEP format, which allows linking to various parts.
This document has been placed in the Public Domain. | s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323587623.1/warc/CC-MAIN-20211025030510-20211025060510-00191.warc.gz | CC-MAIN-2021-43 | 31,223 | 227 |
https://www.jeremydaly.com/ref-arch/strangler.html | code | If the route matches a Lambda Proxy route, traffic is directed to a Lambda function in your serverless component.
The Lambda Function processes the request and performs your business logic (such as fetching data from a DynamoDB Table). The results are returned to API Gateway and sent to the client.
If the route matches a HTTP Proxy route, the request is proxied via HTTP to your existing load balancers.
Your Legacy Application processes the request, performs your business logic, and returns the result through the load balancer to API Gateway, and then back to the client.
The client can be a web browser, an application, or even another service in AWS.
Amazon API Gateway with Lambda Proxy integrations to route traffic to new serverless components, and HTTP Proxy routes to direct traffic to legacy infrastucture.
A Lambda function that is part of a serverless microservice that replaces or enhances existing APIs.
A DynamoDB table that is part of your serverless microservice.
An Elastic Load Balancer (ALB, NLB, or Classic) that is perfoming health checks and routing HTTP traffic.
Your existing application that is handling API traffic from an Elastic Load Balancer. | s3://commoncrawl/crawl-data/CC-MAIN-2020-50/segments/1606141184123.9/warc/CC-MAIN-20201125183823-20201125213823-00583.warc.gz | CC-MAIN-2020-50 | 1,175 | 10 |
https://itqna.net/tags/tag/recaptcha | code | I'm trying to implement the reCAPTCHA of Google on my site, and I can not do the integration Server-Side (I use the PHP language). How can I make reCAPTCHA work, and do the validation before submitting my form data?...
I have a website in Wordpress, that the content is shown only after I validate Google's reCAPTCHA, I have already looked for several codes but nothing helped me, can anyone give me a tip?
Hello, I'm implementing a captcha in my system, searching in google I got tutorials and I got by the google captcha that is mass and already comes with a spoken option to answer the captcha only that it is in English.
I've tried searching and fou...
I'm trying to increment a reCAPTCHA on a website, I've watched several step by step, but mine persists in giving the same error. example code:
Well, I've implemented google reCAPTCHA in the forms of my website, working normal, but it is possible to send the forms without selecting the captcha, how do I make it a required field before submitting as a "required"?
I've been programming for 4 days using jQuery :)
I made a form using ajax and PHP, it worked perfectly!
there was a need to implement reCAPTCHA.
I do not know where to start, I need help. formular.html
I put the reCAPTCHA v2 on my site, but I have type problem:
I set to navigate normally on this site. But in addition to deforming the site's Textbox, it still does not display reCaptchas. The ScriptErros website. But other sites do, but it does not look like that.
What can it be? | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337855.83/warc/CC-MAIN-20221006191305-20221006221305-00627.warc.gz | CC-MAIN-2022-40 | 1,503 | 13 |
http://www.wiichat.com/forum/pokemon/33675-official-pokemon-trading-thread-page241.html | code | Preferably attack (unless its a hydragon then that would be special attack),but it really dosn't matter to me
I'm looking for a female Vulpix/Ninetales and a female Poliwag/whirl/wrath/toed. Both of them with their Hidden Ability.
I have quite a lot that I'm willing to trade. Tell me what you want and I'll see if I have it and am willing to trade it. I do have Meloettas that I haven't collected from the delivery man yet, so I can get a specific nature if you want one.
Last edited by bou0010; 03-16-2013 at 04:24 PM. | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696382584/warc/CC-MAIN-20130516092622-00052-ip-10-60-113-184.ec2.internal.warc.gz | CC-MAIN-2013-20 | 520 | 4 |
https://forums.unrealengine.com/t/foliage-culling/278011 | code | No matter what I do, I can’t seem to get the “Start Cull Distance” to do anything. According to the docs:
In the vertex shader, a per-instance fading factor is calculated, which goes from 1.0 at the start distance to 0.0 at the end distance. This is passed to the Material in the alpha channel of the the Vertex Color Material node.
All I ever seem to get is 1. Is there anything that I missed?
If it helps, here’s what I have ATM:
Using ordinary cube as a static mesh
Material is simple Vertex Alpha → Base Color
Start Cull = 10, End Cull = 1000
I can see the cluster disappearing once it goes out of the End Cull range, but there is no change in color in between.
Just found the answer. There is a node called PerInstanceFadeAmount which contains the fade information.
I would suggest updating the documentation (https://docs.unrealengine.com/latest/INT/Engine/Foliage/index.html ) to avoid others having the same problem in the future.
I had the same problem, update the documentation plz !
Hey I know its not a big deal but docs are still out dated on this
Where is PerInstanceFadeAmount? I can’t find it. When you say node, is it in blueprint or somewhere in the foliage editor?
Its been a while, but yeah. You find the PerInstanceFadeAmount node in material blueprints: multiply it with the diffuse alpha and plug it into Opacity Masks, this opened a new world for me. There’s documentation on this though.
Watching the foliage disappear in shader-complexity vision I wonder if it’s that good?
Instead of a “good” (Green) mesh it gets leaves a “bad” to “extremely bad” invisible mesh behind. Any thoughts?
Yeah, the leaves disappear and I think in order for the perinstancefadeamount node to work as intended you gotta play alot with the settings; I gave it up as it left me with bare trees and didn’t look that good.
Since PerInstanceFadeamount made my instances vanish too fast I’m controlling it with an added value and then multiply it with the opacity mask.
The problem imo is that the cluster of foliages is not really working that well. According to the wiki the foliage instances are automatically clustered into groups. But to me it seems I can’t really control at what threshold the clusters are created? At the moment plants can be pretty far apart from each other but still dont cluster into seperate groups.
Does anyone know a solution to that? | s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656104354651.73/warc/CC-MAIN-20220704050055-20220704080055-00034.warc.gz | CC-MAIN-2022-27 | 2,397 | 20 |
https://www.alfaowner.com/Forum/rant-room/141627-microsoft-windows.html | code | What a sack of **** it really is.
Why do active windows have to be on top?
In a proper GUI environment, I can have a raft
of windows open and just hover the mouse on the window
where I want to type something and just type it. The window
will even stay behind everything else.
With Windoze you have to click on that window and pop it
to the top before you can type anything. Why !?!
****ing stupid, ****ing annoying.
Designed, by morons, for people who don't
actually need it to do anything at all. IMHO. | s3://commoncrawl/crawl-data/CC-MAIN-2019-43/segments/1570986696339.42/warc/CC-MAIN-20191019141654-20191019165154-00037.warc.gz | CC-MAIN-2019-43 | 503 | 11 |
https://forum.alzheimers.org.uk/threads/visiting-profiles.16305/page-4 | code | well lets the cloudy/murkier water gets clearer, my lasts posts may have inded been in one thread, but i am at a loss why they should have been deleted? but am willing and waiting to understand why - with a full explanation. also lets hope that previous posters can re-iterate and explain their reasons etc for comments towards me and why i have had so much hostile/negative press so to speak, to the best of my knowledge I have caused no member any unjustice or malice??The water gets murkier. I have some good and not so good news for you. You should be able to see the posts you made today via that last link I posted or via your profile - if you can't I am flumoxed. However, on further researching the situation I find that the previous 9 posts that you made prior to today were all made to one thread and that thread has subsequently been removed as it contravened out T & Cs and that's why you can't see those. So a combination of circumstances I think. There is still a potential bug or at the very least an anomaly since neither Connie nor I could see the data via the link the other had posted and I don't "think" thats right.
Edited to add - I see you are reporting a complete lack of success - the web team will have to look into it. | s3://commoncrawl/crawl-data/CC-MAIN-2021-17/segments/1618038916163.70/warc/CC-MAIN-20210419173508-20210419203508-00218.warc.gz | CC-MAIN-2021-17 | 1,245 | 2 |
http://ieeexplore.ieee.org/xpl/abstractKeywords.jsp?reload=true&arnumber=1556518&sortType%3Dasc_p_Sequence%26filter%3DAND(p_IS_Number%3A33103) | code | The Web is revolutionizing the way citizens interact with businesses and government agencies. Almost all key functions of modern society are being reshaped to exploit opportunities the Web opens. As part of an effort to improve government-citizen interactions, government agencies are providing a wide spectrum of online services. Virginia Tech is collaborating with the Virginia Department for the Aging (VDA) on a project called WebSenior. A middleware infrastructure, WebSenior automatically delivers e-government services customized for seniors. It uses ontologies to automatically generate Web services customized to senior citizens' needs and government program laws and regulations. | s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783397428.37/warc/CC-MAIN-20160624154957-00006-ip-10-164-35-72.ec2.internal.warc.gz | CC-MAIN-2016-26 | 689 | 1 |
http://www.vmware.com/be/nl/products/vcloud-director/features.html | code | Complete Software-Defined Services as Virtual Data Centers
- Virtual data centers - Provision complete sets of software-defined services that include compute, storage and networking capacity. Apply the principles of pooling, abstraction and automation and enable complete separation between the consumption of infrastructure services and the underlying hardware.
- Efficient resource allocation - Automatically place applications in optimal VMware® vCenter Server™ clusters, alleviating IT overhead around balancing server capacity. Define how virtual data center resources are consumed by different teams and organizations.
- Integration with VMware vSphere® Storage - Enable tiered and load-balanced storage in the vCloud Director environment to maximize performance and simplify provisioning.
- vApp templates - Capture requirements for compute, storage, networking and other custom guest data using Open Virtualization Format-based vApp templates. Deploy and consume multi-tier applications as pre-configured virtual appliances containing virtual machines, operating system images and other media.
- vApp catalogs - Access vApp templates from web-based catalogs for dynamic provisioning. Port applications flexibly between data centers and standardize offerings while simplifying troubleshooting, patching and change management.
- vSphere linked clone technology - Clone base vApps into children by only storing changes made by children and reading all other data from the base. Link instances of running virtual machines back to their original templates to avoid wait times for additional storage.
- Snapshot and revert capabilities - Unwind changes made to a virtual machine for rapid destructive testing without the need to re-provision multiple times.
- Open Virtualization Format (OVF) - Make basic transfer between clouds possible using the open vCloud API, which preserves application properties, networking configuration and other settings.
- Callouts - Enable vCloud Director to send outbound messages to, and receive notifications from, other integrated systems.
Security and Resource Consumption Control
- VMware vCloud® Networking and Security ™ technologies - Integrate vCloud Director with vCloud technologies such as perimeter protection, port-level firewall and NAT and DHCP services to gain virtualization-aware security, simplify application deployment and meet compliance standards.
- VMware vCenter single sign-on - Simplify administration by allowing users to log in once and then access all instances of vCenter Server and vCloud Director, without the need for further authentication.
- Self-service web portal - Give users direct access to their catalogs and virtual data centers through a user-friendly web portal.
- Isolate multi-tenant organizations - Group users into organizations that can represent any policy group, such as a business unit, division or subsidiary company. Enable each to have isolated virtual resources, independent LDAP-authentication, specific policy controls and unique catalogs.
- Role-based access control - Authorize consumption using a model that enables different users to have different levels of functional access within vCloud Director. Set quotas, leases and limits to prevent consumption from exceeding prescribed boundaries | s3://commoncrawl/crawl-data/CC-MAIN-2014-52/segments/1418802766267.61/warc/CC-MAIN-20141217075246-00081-ip-10-231-17-201.ec2.internal.warc.gz | CC-MAIN-2014-52 | 3,295 | 16 |
https://aitopics.org/mlt?cdid=news%3A22398635&dimension=pagetext | code | Sentiment analysis is analytical technique that uses statistics, natural language processing, and machine learning to determine the emotional meaning of communications. Companies use sentiment analysis to evaluate customer messages, call center interactions, online reviews, social media posts, and other content. Sentiment analysis can track changes in attitudes towards companies, products, or services, or individual features of those products or services. Get the latest insights with our CIO Daily newsletter. One of the most prominent examples of sentiment analysis on the Web today is the Hedonometer, a project of the University of Vermont's Computational Story Lab.
In the sentiment analysis task, predicting the sentiment tendency of a sentence is an important branch. Previous research focused more on sentiment analysis in English, for example, analyzing the sentiment tendency of sentences based on Valence, Arousal, Dominance of sentences. the emotional tendency is different between the two languages. For example, the sentence order between Chinese and English may present different emotions. This paper tried a method that builds a domain-specific lexicon. In this way, the model can classify Chinese words with emotional tendency. In this approach, based on the , an ultra-dense space embedding table is trained through word embedding of Chinese TikTok review and emotional lexicon sources(seed words). The result of the model is a domain-specific lexicon, which presents the emotional tendency of words. I collected Chinese TikTok comments as training data. By comparing The training results with the PCA method to evaluate the performance of the model in Chinese sentiment classification, the results show that the model has done well in Chinese. The source code has released on github:https://github.com/h2222/douyin_comment_dataset
Sentiment analysis (or opinion mining) may be a natural processing technique want to determine whether data is positive, negative, or neutral. Sentiment analysis is usually performed on textual data to assist businesses to monitor brand and merchandise sentiment in customer feedback and understand customer needs. Sentiment analysis is that the process of detecting positive or negative sentiment in text. It's often employed by businesses to detect sentiment in social data, gauge brand reputation, and understand customers. Since customers express their thoughts and feelings more openly than ever before, sentiment analysis is becoming an important tool to watch and understand that sentiment.
Call Center sentiment analysis is the processing of data by identifying the natural nuance of customer context and analyzing data to make customer service more empathetic. If you are employed in Call Center, the following scenario might be familiar: You get a call from a client and hear their words with stress. The cause for such a cataclysmic reaction: They got a bad rating for their products or business. Some of those reviews might be negative, formal, and neutral. Knowing what someone meant can be tricky unless you understand their emotional quotient.
Understanding the sentiments of the people is not easy unless they express their feelings, opinions and perspective anything. But if you have such platforms where people are freely speaking up about their thoughts and concerns, you can easily find out their sentiments. Here where Cogito comes in the facility of sentiment analysis. Sentiment Analysis is the process of determining the conceptions, judgments, feelings, opinions, viewpoints, conclusions, and other notions towards anything. It is a technique to analyze texts, images, emojis and various other actions to know what other people think about a product, service, company, brand name, or a reaction to a specific event, social movement, etc. Sentiment analysis is playing an enormous role in understanding people belonging to different groups and their sentiments. | s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656103269583.13/warc/CC-MAIN-20220626131545-20220626161545-00301.warc.gz | CC-MAIN-2022-27 | 3,939 | 5 |
http://nrich.maths.org/5612/note | code | EWWNP means Exploring Wild and Wonderful Number Patterns Created by Yourself! Investigate what happens if we create number patterns using some simple rules.
Find a great variety of ways of asking questions which make 8.
If you had any number of ordinary dice, what are the possible ways
of making their totals 6? What would the product of the dice be
Will each method always work?
Where is the $20 \times 20$? Where is the $20 \times 3$? ...
Offer students this worksheet with the methods for $23 \times 21$ to make sense of first, as there are no 'carry' digits so it is clearer to see what is going on.
Stu Cork created this GeoGebra file to use with this problem, which he has kindly given us permission to share. | s3://commoncrawl/crawl-data/CC-MAIN-2017-22/segments/1495463607636.66/warc/CC-MAIN-20170523122457-20170523142457-00092.warc.gz | CC-MAIN-2017-22 | 716 | 8 |
http://meta.stackexchange.com/questions/117735/bug-in-time-filtering-users-by-their-reputation | code | Why is filtering users according to reputation working the same, regardless whether one chooses
quarter or a
What is meta?
- Any Stack Exchange user can ask a question
- The community provides support, votes on ideas, and reports bugs
- Your voice helps shape the way Stack Exchange operates
This is not a bug but status-bydesign.
These time periods are calculated from the start of the current year.
It is the first week of the first month of the first quarter of the year - so cumulatively these would all be identical at this point.
Therefore, the reputation for this week/month/quarter/year is identical. | s3://commoncrawl/crawl-data/CC-MAIN-2016-30/segments/1469257826759.85/warc/CC-MAIN-20160723071026-00143-ip-10-185-27-174.ec2.internal.warc.gz | CC-MAIN-2016-30 | 608 | 10 |
https://jira.mariadb.org/browse/MDEV-25568 | code | I do a daily "snapshot" restore of my daily backup performed by MariaBackup.
I've just noticed that I see *LOADS* of messages like:
Ignoring data file 'database1/table1.ibd' with space ID 25508, since the redo log references database1/table1.ibd with space ID 25506.
On tables that some jobs perform a "RENAME TABLE", to swap with a new version of them.
I've been seeing this since very long ago, but became more noticeable now that there is a job that does "RENAME TABLE" every 5 minutes.
Is this normal?
Does this mean anything bad to the database or backups? Or to the 'restored' database?
Is there any risk of corruption because of this, or loss of data/tables? | s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506676.95/warc/CC-MAIN-20230925015430-20230925045430-00695.warc.gz | CC-MAIN-2023-40 | 665 | 8 |
https://www.experts-exchange.com/questions/20536726/Office-97-install-error.html | code | I am attempting to re-install office for a user who is experiencing problems with their office apps. I believe office was installed from a CD drive originally but when it looks at the Drive (D:) it is now a hard drive. This is normal and usually I can just pop the CD in or run the install over the network and it will allow to add/remove/repair the install.
This isn't the case this time... I run the alternate install from the network and never receive the prompt for add/remove/reinstall. Instead I get the normal install process as if it didn't exist. Near the end of the install, I get an error that terminates the install:
Title: "Setup parse Error In Initialize pass"
Error Text: "Object ID 8824: RegMso CAH: MsoHrRegisterAllEx call failed."
with a single okay button.
After the install is terminated 'unsuccessfully', I can run MS Word, Excel, but not Access, which give this error when run: "There is no liscense for this application on this compuater" or something to that effect.
Any ideas for resolving this besides re-format/re-image and reinstall? | s3://commoncrawl/crawl-data/CC-MAIN-2018-30/segments/1531676591596.64/warc/CC-MAIN-20180720115631-20180720135631-00319.warc.gz | CC-MAIN-2018-30 | 1,061 | 7 |
http://hercules390.996247.n3.nabble.com/Various-warnings-while-building-td55246.html | code | Building with trunk from github, on Debian 32-bit Linux.
Commit c6fb73206ccc163fadd5eefbb119476dcfd5491c (8 FEB 2017)
I first ran util/bldlvlck to check my setup and got all the pre-reqs installed.
OK autoconf requires 2.64, found 2.69
OK automake requires 1.9, found 1.14.1
OK flex requires 2.5, found 2.5.39
OK gawk requires 3.0, found 4.1.1
OK gcc requires 3, found 4.9.2
OK grep requires 1, found 2.20
OK m4 requires 1.4.6, found 1.4.17
OK make requires 3.79, found 4.0
OK perl requires 5.6, found 5.20.2
OK sed requires 3.02, found 4.2.2
Using 1Stop build script, during the autogen phase:
/home/bill/IBM370/hercules/hyperion-master/hyperion/autoconf/missing: Unknown `--is-lightweight' option
Try `/home/bill/IBM370/hercules/hyperion-master/hyperion/autoconf/missing --help' for more information
configure: WARNING: 'missing' script is too old or missing
The 'missing' included in the Hercules autoconf directory reports:
missing 0.3 - GNU automake
I notice the 'missing' in my automake-1.14 package reports:
missing 2013-10-28.13 (GNU Automake)
Substituting this version of 'missing' "fixes" the above warnings.
Are these warnings expected, and/or an indication of a problem? | s3://commoncrawl/crawl-data/CC-MAIN-2017-47/segments/1510934805362.48/warc/CC-MAIN-20171119042717-20171119062717-00780.warc.gz | CC-MAIN-2017-47 | 1,182 | 23 |
http://ps-2.kev009.com/CATIA-B18/ucfug_C2/ucfugbt0701.htm | code | Rotating a Component
This task shows you how to rotate a component.
A component can only be rotated if it is in free space - connected components cannot be rotated.
With your component displayed, click the
Move the pointer to the component you want to rotate. If it can be rotated (if it is not connected) it will be selected when you move the pointer over it.
Click on the component to rotate it. It will rotate 90 degrees in the direction you selected. The image below shows a selected component and a component that has been rotated.
Components can only be rotated in 90-degree increments. | s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446710691.77/warc/CC-MAIN-20221129100233-20221129130233-00331.warc.gz | CC-MAIN-2022-49 | 592 | 7 |
https://forum.getready.io/t/is-there-a-community-games-thing/4193 | code | Is there a thing where people can share their games with the public (but still on the readymaker app) kind of like roblox or soemthing
Hi @pikachuminecraft, welcome to the forum! You can share your game to the app store and websites. You just need to export your game to unity on computer.
Yeah… unfortunetly, unity doesent seem to work very well for that, and i cant find any good tutorials on that.
this is the game i was trying to have (just for my friend) with unity, but the buttons arent all on the screen, visiblity of stuff isnt working, the buttons and stuff dont do anything, i just dont know how
Hey @pikachuminecraft, If you want to share your game before eporting it to Unity3D, then you could just click on the share tab under your game and paste it wherever you want to share. Just go to the main (my games) page and click on the game ou want to share, you would find the “share” option, click on it and paste the URL anywhere. Hope this helps
Ready isnt a super popular app so you will not find a good tutorial
Hi @pikachuminecraft and welcome to the forum! If this is your first Ready game, that’s a commendable effort!!
The share link is the most straightforward way to share Ready games; exporting to Unity can be tricky. There have been some threads in here about that, but each case seems to require its own specific solution.
thanks, its my first one personally
Hi @pikachuminecraft! Welcome to the our forum! Your project looking great!
Thanks just wish i could export it to unity or share it other than with the link
This is possible! You could upload the games link on different platforms, such as creating a YouTube Channel or other platforms which offer sharing your games, but in each case you would have to notify that mobile users have to download Ready Maker to play the game | s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662509990.19/warc/CC-MAIN-20220516041337-20220516071337-00448.warc.gz | CC-MAIN-2022-21 | 1,814 | 12 |
https://www.experts-exchange.com/questions/28680823/Solaris-ngrep-functionality.html | code | Im trying to get a text output from a ngrep command but Im getting it in a binary form...
# ngrep -O dump.pcap -W byline -d igb0 port 7700
filter: (ip) and ( port 7700 )
> file dump.pcap
Is there a way to have this file as a text file instead of a binary file? | s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376823705.4/warc/CC-MAIN-20181211215732-20181212001232-00391.warc.gz | CC-MAIN-2018-51 | 260 | 5 |
https://www.getatechie.net/dot-net-framework-windows-10-g1/ | code | This video will show you how to install .NET Framework 3.5 on Windows 10. It includes the following:
- .NET Framework Installation
- .NET Framework 3.5
What is the .NET Framework?
Microsoft’s .NET Framework is a developer platform and software framework that is made up of a series of tools, programming languages, and content libraries for building and developing different types of applications for various devices capable of running .NET Framework.
Microsoft began developing the .NET Framework between 1990 and 1997. By late 2000, the beta version of .NET 1.0 was released. The original name was coined, “Next Generation Windows Services (NGWS)”, which was part of the .NET strategy. Microsoft’s .NET Framework began as proprietary software and led to a family of .NET platforms that targeted mobile computing, embedded devices, and alternative operating systems.
There are varying implementations of the framework, each one allows .NET code to execute in different places – Linux, Windows, macOS, Android, and more.
- .NET Framework is the original implementation of the .NET library. It runs on websites, services, and desktop apps.
- .NET Core focuses on cross-platform implementation, for running websites, services, and console apps on Windows, Linux, and macOS.
- Xamarin/Mono is another implementation for running apps on all mobile operating systems like Android and iOS.
- .NET Standard is a formal specification of common .NET implementation APIs.
.NET Framework also provides a runtime environment for applications, which provides a virtual machine-like sandbox that allows applications to run.
How to install .NET Framework
Install NET Framework through Windows Update on the latest Windows 10 OS. Otherwise, you can follow the video guide, or the written guide below to install the framework:
- All .NET Frameworks can be downloaded from here.
- Once downloaded, open up the installer package and .NET Framework Runtime will begin to install.
- After the installation, it is advised to restart your PC. | s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323585231.62/warc/CC-MAIN-20211019012407-20211019042407-00368.warc.gz | CC-MAIN-2021-43 | 2,029 | 17 |
https://www.carvadia.com/how-do-i-get-my-current-location-on-google-maps-api/ | code | How Do I Get My Current Location On Google Maps API?
How do I get my current location on Google Maps API? To get current location using HTML5 Geolocation with Google Maps, you need to set an API key for Google Static Maps API. Go to https://console.developers.google.com and get a free API key for Google Map. Add this key to the code to work Geolocation with it.
How do I use Google API for location?
How do I get data from Google Maps API?
How do I get geolocation on Google Maps?
How do I get my Google Maps API key?
Related guide for How Do I Get My Current Location On Google Maps API?
How do I find my location API?
The Geolocation API is accessed via a call to navigator. geolocation ; this will cause the user's browser to ask them for permission to access their location data. If they accept, then the browser will use the best available functionality on the device to access this information (for example, GPS).
How do you find geo location?
How do I use geolocation API?
What is geolocation API in HTML?
The HTML Geolocation API is used to get the geographical position of a user. Since this can compromise privacy, the position is not available unless the user approves it. Try It. Note: Geolocation is most accurate for devices with GPS, like smartphones.
Is IP geolocation accurate?
IP-based geolocation services provide 55 percent to 80 percent accuracy for a user's region or state. And they provide 50 percent to 75 percent accuracy for a user's city. In practice, the actual accuracy may vary from provider to provider and depending on the location of the device.
How do I get an API key?
How much is Google Maps API key?
The latest Google API Key billing will cost you $0.50 USD / 1000 additional requests, up to 100,000 daily. However, you can manage your cost of use by setting your own QPD limits in Google Cloud Platform Console.
Is Google Maps API paid?
Google Maps Platform offers a free $200 monthly credit for Maps, Routes, and Places (see Billing Account Credits). With the $200 monthly credit, the vast majority of customers find their use cases are completely free. You won't be charged until your usage exceeds $200 in a month.
What is Google location API?
The Geolocation API returns a location and accuracy radius based on information about cell towers and WiFi nodes that the mobile client can detect. This document describes the protocol used to send this data to the server and to return a response to the client. Communication is done over HTTPS using POST.
Can I get location from IP address?
When using an IP address lookup tool, users often think they are going to find the exact location of an IP address. This is simply not true. No IP address database can provide the exact physical address of an IP address location. At best, you'll get the exact city in which the user of the IP is located.
What is an API location?
A Geolocation API is a communication interface between a client device or application (client-side), and an application or service (server-side) that identifies and returns information about the client's geographical location. | s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656104576719.83/warc/CC-MAIN-20220705113756-20220705143756-00282.warc.gz | CC-MAIN-2022-27 | 3,087 | 26 |
https://internals.rust-lang.org/t/implement-sum-for-t1-t2-where-t1-sum-t2-sum/19208 | code | The problem is that this kind of implementation needs to accumulate the result element by element due to the lazy nature of iterators, but the interface of Sum only allows accumulating them all at once, so this is not possible to write, at least with the Sum trait we have today. unzip had the same problem and it solved it by using Default + Extend instead of FromIterator.
This doesn't compile because the type of points_iter and health_iter cannot be inferred. Moreover there's no way points_iter and health_iter can be lazy iterators because unzip has to consume the whole iterator it is given. So realistically their type will be Vec, which is too inefficient compared with the fold you could manually write.
Hm, maybe I am misunderstanding the restriction you are mentioning, but I feel like this would be the kind of implementation that I expect from it: Rust Playground and it seems to work fine?
The type annotations are needed because println doesn't restrict it enough, but that's a problem that Sum has already.
Just for (T1, ...) instead of my custom type. (Since I can't extend a std type like that)
Re-reading your post, I am not sure why sum would be considered lazy? To me it's one of the 'terminators' of iteration, just like for_each, product, fold etc... Aka, a place where you realize the computation rather than just describing it. I am not aware of sum being seen as an abstract computation, and the type signature/impls support that idea, since you usually don't return a type that implements Iterator itself.
The title of your post claimed to implement Sum for (T1, T2, ...) where T1: Sum, T2: Sum, which is what I was answering to. You're right that by using Default and Add you can implement it though.
I didn't mean that sum should be considered lazy. What I meant is that because iterators are lazy (so you can't just iterate again, after they yield a value it's over), you have to add the new value to each accumulator (the one for T1, the one for T2 ecc ecc) before advancing the iterator. However, given the interface of Sum, you can only add all the values for T1 and only after think about T2, but at that point the iterator has already been consumed. Of course this argument doesn't hold when you use Add.
Note that Default doesn't necessarily have the appropriate semantics for this— Nothing says that it should be the additive identity value. Depending on the type's expected usage, it could also be the multiplicative identity, a random sample from the type's domain, or anything else.
For the usage pattern of calling Sum::sum this will first have to consume the whole iterator (for the first Sum::sum), thus essentially collecting the rest of the items in the VecDeques but without optimizations like preallocations and such. I don't think this is better than unziping into Vecs.
You can actually get Zero::zero (the additive identity) with solely std, if you're willing to bend a few rules: it's spelled iter::empty()::sum(). One::one (the multiplicative identity) is spelled iter::empty().product(). | s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510462.75/warc/CC-MAIN-20230928230810-20230929020810-00471.warc.gz | CC-MAIN-2023-40 | 3,043 | 11 |
https://forums.theregister.com/forum/all/2019/02/22/artificial_intelligence_you_know_it_isnt_real_yeah/ | code | It's advanced Expert System algorithms
Thank you Alistair for hitting the important points about what is euphorically, unrealistically called 'Artificial Intelligence'. "AI" is just another meme being used by marketing divisions and self-promoting researchers as bait to sell what are actually advanced Expert System algorithms.
Expert system design was introduced in 1965. It has been slowly advancing thereafter. What has triggered the 'AI' moniker are actually advances in speech recognition (speech, to text, to bits) and the reverse (bits, to text, to speech). Much of the speech recognition work was accomplished by Dragon Systems, starting in 1975. Dragon is currently owned by Nuance. As far as I am aware, all of the current popular 'AI' systems involving speech recognition license base technology from Nuance. Apple and IBM, among others, developed their own speech recognition systems in the 1990s. But they fell by the wayside. It is said the Google and Microsoft have been developing their own speech recognition systems. However, I strongly suspect they both use Dragon technology.
The general concept of Expert Systems is to take a provided input and efficiently traverse an available database for the best matching output. What has become interesting in recent years has been what's called 'machine learning' whereby the algorithms are able to collect new data and add it to their source database over time in pursuit of providing better and more up-to-date output as answers to input queries.
In other words, there is no 'intelligence' at all apart from that imbued by the euphoric, the meme entranced, marketing executives and researchers in need of academic recognition. We may in fact never be able to create anything that is actually 'intelligent' in the science fiction sense. The first goal of artificial intelligence is to be able to interact with it and not be able to tell if it is human or machine. This is called the Turing test. Thus the connection of AI to Alan Turing. And no, so far there has been no so-called 'artificial intelligence' system capable of passing the Turing test. There have been rumors of such a system for decades. But none of them have qualified. No doubt, with time the term 'intelligence' will be bent and twisted to fit the latest attempt at AI. However, the technology we currently have better qualifies as Artificial Idiocy with the goal of making it as mildly idiotic as possible.
ETHICS: As ever, technology is a tool for the betterment of mankind. Any technology used instead as a weapon of murder and destruction is no longer a tool but an abomination, a victim of self-destructive, territorial and tribal instincts still persistent in species Homo sapiens sapiens ('wise wise', as we wish we were). I call it Coward Murder Machinery, as currently exemplified by killer military drones controlled by humans from a distance with no danger to themselves. Another step in coward murder machinery will be autonomous drones and other robots whereby their creators and controllers will attempt to dodge responsibility for their outcome. Don't be fooled. Mankind will always be responsible for whatever technology we create, including all its consequences. We will become actual 'sapiens sapiens' when we achieve the wisdom to stop murdering one another for any reason.
Conclusion: Ethics begin and end with the creators, programmers and users of technology, not the technology itself. IOW: Don't blame Hal 9000. Blame its inventors and programmers. Hal 9000 or any other 'AI' is just a tool. | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337322.29/warc/CC-MAIN-20221002115028-20221002145028-00532.warc.gz | CC-MAIN-2022-40 | 3,546 | 7 |
https://www.wallstreetoasis.com/forum/real-estate/fifth-broadway-metropolis-cap-rate | code | Fifth & Broadway / Metropolis Cap Rate?
Anyone know theone of these transactions? Fifth and Broadway was a large mixed use development in Nashville purchased by Northwood and Metropolis was an apartment tower in downtown LA that sold for $504M. When you all are looking at recent transactions to inform your own acquisitions, how do you use such transactions (fifth and broadway and metropolis, if you were purchasing in Nashville or LA, respectively) to inform basis when the cap rates are not public. What's the best way to use transactions for a pricing cap rates are not readily available? It brings up the larger question then if cap rates are even the best measure to judge off of given that they can vary based on tax adjusted, not adjusted, etc.? | s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764499646.23/warc/CC-MAIN-20230128153513-20230128183513-00615.warc.gz | CC-MAIN-2023-06 | 754 | 2 |
https://www.nsrutherford.com/projects/video-creation-workshop.html | code | This workshop covers the basics for creating a live narration video recording of a slide deck that is common for academic talks.
There are two main sessions:
- Introduction to OBS
- Covers how to capture video and audio
- Basic Editing in iMovie
- Covers how to edit you recorded clips and export them for distribution
You can find a more detailed agenda here.
The linked PDF for this project contains the written guide for the session that you can follow along with. Also included in the samples directory is some video clips you can use in the editing stage of the workshop.
You can view a playlist for the companion video series I recorded on youtube
If you have any comments, feedback, or corrections to add, email me at [email protected] or open an issue in the gitlab repo and I will get to it when I can.
Hopefully you find this useful!
|05 Apr 2021||Joined HP Labs as a Security Research Intern for six months|
|24 Mar 2021||Accepted to give research pitch at EuroDW'21|
|14 Dec 2020||Presented a poster at HP Day 2020| | s3://commoncrawl/crawl-data/CC-MAIN-2021-31/segments/1627046155188.79/warc/CC-MAIN-20210804205700-20210804235700-00106.warc.gz | CC-MAIN-2021-31 | 1,027 | 14 |
https://ubuntuforums.org/archive/index.php/t-1326210.html | code | View Full Version : [other] basic question about wireless router
November 14th, 2009, 02:13 PM
i have spotted a wireless router which will connect to external HDD with usb2.0 and will allow it to be shared on the internet. my doubt is will i require to keep my desktop also switched on even though the router has independent power supply and the incoming broadband internet cable will be fitted to the router directly.
i intend to keep my router ASUS RT-N16 on 24*7 and plan to connect to internet with my desktop or laptop whenever i want. hope somebody gets my point here.:D
November 14th, 2009, 02:25 PM
You shouldn't need to keep your computer switched on - it will take care of managing the external HDD all by itself.
November 14th, 2009, 02:35 PM
thanks steve! i got it.
this router ASUS RT-N16 is not in the list of supported wireless routers for ubuntu. so i plan to install the software ( if any) using windows xp from laptop) and thereafter i assume if i just connect my ubuntu laptop and set the ip adress correct i should be able to do internet - correct ?
November 14th, 2009, 02:43 PM
From the very brief look I had, it seems that the router exposes the drive using FTP, which you'll be able to use in Ubuntu, but editing files directly on the drive is tricky with FTP.
I'd check out exactly what other connection options (if any) it offers, and whether those will suit you. If it can be accessed as a Windows share, then you'll be fine.
November 14th, 2009, 02:49 PM
u r right. the hdd wil be ftp share. but that's not my concern. i want to connect to internet with this router using ubuntu desktop/laptop . this model is not listed in the ubuntu supported list and that's why i was worried.
November 14th, 2009, 02:53 PM
If your router has a web interface, like most that I've run into do, then you can easily configure it from any OS out there simply by pointing your browser to its IP address. It might have some shiny wizard for Windows for setting things up, but if you can access the configuration directly, that is redundant.
November 14th, 2009, 03:00 PM
actually i am doing it first time. but yes , this device has a Web interface as far as specs go. so u mean with my firefox/opera i will get some homepage kind of thing and then i can tweak it ? i think that's quiet close - by my experience. am i correct ?
November 14th, 2009, 03:10 PM
actually i am doing it first time.
Running the Windows program on the first time might be easier, if you're not used to setting up router configurations manually, as the web interfaces usually don't have too specific help sections and thus you have to read the manual, when you don't understand how something there works.
but yes , this device has a Web interface as far as specs go. so u mean with my firefox/opera i will get some homepage kind of thing and then i can tweak it ? i think that's quiet close - by my experience. am i correct ?
Yes, that's correct.
November 14th, 2009, 03:20 PM
thanks - ubuntu is great because of u all !!! i love ubuntuuuuuuuuuu........
Powered by vBulletin® Version 4.2.2 Copyright © 2016 vBulletin Solutions, Inc. All rights reserved. | s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988719463.40/warc/CC-MAIN-20161020183839-00059-ip-10-171-6-4.ec2.internal.warc.gz | CC-MAIN-2016-44 | 3,137 | 26 |
https://projects.eclipse.org/projects/tools.mat/releases/1.12.0/ | code | Enable parsing of segment GZIP HPROF dumps from OpenJDK Java 15.
Improvements in acquiring heap dumps.
Minor bug fixes, enhancements and documentation improvements.
Wednesday, June 16, 2021
This release is part of Eclipse IDE 2022-03, Eclipse IDE 2021-12, Eclipse IDE 2021-09, and Eclipse IDE 2021-06.
New & Noteworthy URL: | s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224654016.91/warc/CC-MAIN-20230607211505-20230608001505-00429.warc.gz | CC-MAIN-2023-23 | 323 | 6 |
https://codeprojectz.com/applications-and-web-projects/patient-management-system-in-java-with-source-code/ | code | Patient Management System is a Java project. This project helps the doctor to manage the patient records. Also, it helps to maintain the patient health report. This system also allows you to manage the drug report and many more facilities. The project uses NetBeans IDE to run the program. Also, the project uses some of the JavaFX materials for its design. Learn to create utility applications like Patient Management System using Java Programming language with the help of this project and its source code. Students and teachers can use this project as a learning material.
About Patient Management System Project In Java
In order to run this project, you will require Netbeans IDE. So download and install it. After that, open the project in the NetBeans IDE. When you run this project you will see the sign-up form. Fill the form and that will be your admin log in id. The whole project is based on the doctor’s assistant side.
Here you can add the patient records and also can modify them. You can add different drugs and medicines. You can also add the prescriptions for the users. There are a lot of features in the project included. The features of this project can be summarized as –
- Add Patients
- Add Drugs
- Add new template prescriptions
- update user
- print user health report card
How To Run Patient Management System Project In Java ?
To run this project you must have installed Eclipse IDE or Netbeans IDE on your PC. Once you install it, download the project and extract it. Open the project in Netbeans IDE. And simply run the project. Now before running the project, rebuild the project for any kind of bugs and errors. This will help you to control the runtime error code. | s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474674.35/warc/CC-MAIN-20240227085429-20240227115429-00702.warc.gz | CC-MAIN-2024-10 | 1,700 | 11 |
https://www.archon.cloud/ | code | 50% Byzantine Fault Tolerance (Both Data and Transaction BFT) that scales along with the size of the network.
Capable of decoding from millions of shards, as opposed to a few hundred.
More data shards = More security, more potential speed, and more reliability and availability of data.
Natively byzantine fault tolerant, Archon's proprietary encoding algorithm enables true decentralization of encoded data shards across any decentralized network of nodes (blockchain agnostic).
Archon Enterprise is a set of proprietary tools that will improve the security and speed of centralized back-end systems; traditional enterprise storage solutions or content delivery networks.
Kevin is the visionary behind Archon’s core technology. He has been developing Archon’s proprietary algorithm over the past 7 months. Kevin is the founding engineer of Diffbot (Series A $10M, 20+ employees), where he created architecture that handles big data at the scale of the entire internet (billions of web pages, hundreds of millions of images). Kevin graduated from Stanford 2014 with a BS in Computer Science.
Eric has helped grow Archon from an algorithm to a fleshed out proposition for the new decentralized internet for the past four months. Eric graduated from Stanford with a MS in Chemistry, leaving his PhD program to make Archon a reality. He is also a partner at a Chinese blockchain fund, Cipher Epoch Capital (币咖资本), which was seed investors in projects such as VeChain and QTUM.
Sam is a bar admitted attorney, developer, and marketing consultant. Prior to joining Archon, Sam worked as the marketing lead at Bodhi, a decentralized blockchain-based prediction market. His first bitcoin payment was in 2014, and he has been a blockchain consultant since 2016. Sam is a speaker at blockchain conferences and hosts blockchain events primarily in the SF Bay Area. Sam holds a JD from the Pace University School of Law and a Bachelor’s degree in business management and marketing from Northeastern University. | s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376823674.34/warc/CC-MAIN-20181211172919-20181211194419-00140.warc.gz | CC-MAIN-2018-51 | 2,013 | 8 |
http://damienkatz.net/2004/08/hire-me.html | code | I am available for short term contract work. My experience in Notes and Domino is very hard to match, but I've got lots of experience in other technologies as well. Why should you hire me? I'm honest, hard working, and have a great track record. Some of my qualifications:
- Excellent design & coding skills. The code you'll get from me will be well thought out, well written, and easy to maintain. I keep in mind the maintainer, and try to make sure the code is no more complex than it needs to be to meet the requirements.
- Excellent communication skills. In business, surprises are bad. I'll let you know what to expect up front, and if anything changes from that you'll know as soon as possible. I don't BS to get work; I'm not always right, but I am always honest.
- Lots of experience. I've built GUIs in Lotus Notes and Domino Web server, VB.net, Win32 Api, MFC and Java. I've built backends in C/C++ and Java. I've worked on database engines, networking layers, language runtimes, distributed systems. What technologies I don't know I pick up easily and eagerly.
- I go where others fear to tread. At Iris I took on more than one project that was effectively abandoned because no one else wanted to work on it. Got a really difficult problem? I love a challenge!
- I am a professional. I keep the customers best interests in mind, always. If that means I lose out sometimes in order to meet my commitments, then so be it. My professional reputation is extremely important.
- I'm cheap. I work fast, and I work hard. I don't pad my hours, ever. | s3://commoncrawl/crawl-data/CC-MAIN-2015-27/segments/1435375093974.67/warc/CC-MAIN-20150627031813-00149-ip-10-179-60-89.ec2.internal.warc.gz | CC-MAIN-2015-27 | 1,552 | 7 |
http://www.jamiehall.org/nagas.htm | code | The Nagas were mythical beings who could transform from man or woman to snake. They were a separate species from humans and lived in their own secret cities deep in the jungle. Often worshipped as gods in the early days, they eventually ended up as minor parts of both the Hindu and Buddhist religions. Although these beings generally kept to themselves, legend has it that the Naga princes and princesses often married human royalty, and many noble houses in India have claimed that they are descended from Nagas. The wise Nagas could be benevolent demigods, or they could be ruthless rulers, killing anyone who disobeyed them, cursing the land with drought and poisoning the waters. Unicorns were their deadly enemies and could keep the evil Nagas in check. These legends may be based on a real tribe of people called the Nagas, who live on the border between India and Bangladesh.
The Naga have a number of forms that they can shapeshift into, apparently at will. These forms include:
(1) A real snake (generally a cobra or large water python)
(2) A real man or woman
(3) The 'medusa' form, a human with many snakes emerging from the head and/or shoulders
(4) The 'snake mermaid' form, like a mermaid except that the lower half is a snake instead of a fish
(5) A snake too large to be natural (sometimes so big it can swallow elephants)
(6) A snake with many heads (sometimes also gigantic)
(7) A dragon (this is rare in India, but more common in Thailand and Malaysia, where the Naga is sometimes considered a creature of cryptozoology)
Home | Link to Me | Monster Mania | Author's Journal | Email Me | Shapeshifter Books & Films
The text on this page is copyright 2007 by Jamie Hall. Please use proper citation if you are using this website for research. | s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100769.54/warc/CC-MAIN-20231208180539-20231208210539-00807.warc.gz | CC-MAIN-2023-50 | 1,759 | 11 |
https://community.bosch-sensortec.com/t5/Knowledge-base/BMP388-Sensor-Data-Interpretation/ta-p/8695 | code | Sensor data type
Double precision floating point version and Integer version are two states regarding compensation functions for temperature and pressure.
The 24 bit pressure/temperature raw data is split and stored in three consecutive registers from 0x04 to 0x06 and 0x07 to 0x09 respectively.
From API side, static double compensate_temperature and static int64_t compensate_temperature are used to compensate the raw temperature data and return the compensated temperature data in integer data type.
Pressure sensor drift
Used to represent errors in measured values. Basically, two drifts will appear on the sensor: one is solder drifts, and the other is long term drift.
Pressure sensor TCO (Offset temperature coefficient)
The offset temperature coefficient is the change in the pressure signal introduced by a change of the temperature. The smaller for TCO value, the smaller the dependence on temperature. Two conditions need to be considered for offset temperature coefficient from pressure 700-1100hPa.
Pressure/temperature OSR (Oversampling)
Oversampling is the process of sampling a signal at a sampling frequency significantly higher than the Nyquist rate. The rate of oversampling can be 1, 2, 4, 8, 16, and 32. Increasing the value of oversampling, then will get longer testing time, lower ODR, lower noise and larger power consumption.
The default value for oversampling setting is 0x02 in register 0x1C for pressure and temperature measurement, bit 2..0 is for pressure measurement and bit 5..3 is for temperature measurement.
In API, using int8_t set_forced_mode_with_osr and int8_t set_normal_mode to configure the oversampling values.
The table below shows the recommended setting of oversampling.
Signal Filter for pressure/temperature
This is a sliding filter which is aim to reduce the noise from the received signal. The filter coefficient can be set to 0 (bypass mode), 1, 3, 7, 15, 31, 63, and 127.
In addition, it suppresses the disturbance in the output data without causing additional interface traffic and processor work load. The output of a next measurement step is filter using the following formula.
The “CONFIG” Register 0x1F control the IIR filter coefficients view from bit 3...1. The default value for “CONFIG” is 0x00.
3 bytes sensor time is split and stored in three consecutive registers which are 0x0C, 0x0D and 0x0E. Each register contain 8 bit sensor time data.
This feature is used to represent how much accuracy can be achieved within the certain pressure range. Two criteria as shown below
This is a 512 bytes FIFO (first-in-first-out) data buffer with feature used to enable data collecting in the FIFO. The register “FIFO_CONFIG_1” register contains the FIFO frame content configuration from bit 4…0. The default value for “FIFO_CONFIG_1” is 0x02.
Configuring and reading FIFO data from API using the function int8_t configure_and_get_fifo_data.
Allow to signal certain events to the host processor. Different event can be mapped to the interrupt pin, which all are processed with a logical OR.
The available interrupts are listed below and can be read in the “INT_STATUS” register”
Bit 0, 1, and 3 are used to represent the interrupt status and is cleared after reading in register.
The function static int8_t get_int_status can be used to get the interrupt status from the sensor in API.
Interrupt configuration can be set in the “INT_CTRL” register in 0x19. Bit 0, 1, 2, 3, 4 and 6 are used. The function static void fill_fifo_int_ctrl in API used to fill the FIFO interrupt control settings.
More BMP388 sensor information can check from the following website https://www.bosch-sensortec.com/bst/products/all_products/bmp388 . | s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947473360.9/warc/CC-MAIN-20240221002544-20240221032544-00281.warc.gz | CC-MAIN-2024-10 | 3,707 | 27 |
https://www.lesswrong.com/users/alexlyzhov | code | From my experience of playing VR games on mobile devices (Quest 1 and Quest 2), the majority of in-game characters look much better than this and it doesn't impact the framerate at all. This seems like a 100% stylistic choice.
"... the existing literature on the influence of dopamine enhancing agents on working memory provides reasonable support for the hypothesis that augmenting dopamine function can improve working memory."—Pharmacological manipulation of human working memory, 2003
Is it supposed to be helping working memory?
I'd be really interested in a head-to-head comparison with R on a bunch of real-world examples of writing down beliefs that were not selected to favor either R or Squiggle. R because at least in part specifying and manipulating distributions seems to require less boilerplate than in Python.
I wonder what happens when you ask it to generate> "in the style of a popular modern artist <unknown name>"or> "in the style of <random word stem>ism".You could generate both types of prompts with GPT-3 if you wanted so it would be a complete pipeline.
"Generate conditioned on the new style description" may be ready to be used even if "generate conditioned on an instruction to generate something new" is not. This is why a decomposition into new style description + image conditioned on it seems useful.
If this is successful, then more of the high-level idea generation involved can be shifted onto a language model by letting it output a style description. Leave blanks in it and run it for each blank, while ensuring generations form a coherent story.
>"<new style name>, sometimes referred to as <shortened version>, is a style of design, visual arts, <another area>, <another area> that first appeared in <country> after <event>. It influenced the design of <objects>, <objects>, <more objects>. <new style name> combined <combinatorial style characteristic> and <another style characteristic>. During its heyday, it represented <area of human life>, <emotion>, <emotion> and <attitude> towards <event>."
DALL-E can already model the distribution of possible contexts (image backgrounds, other objects, states of the object) + possible prompt meanings. An go from the description 1) to high-level concepts, 2) to ideas for implementing these concepts (relative placement of objects, ideas for how to merge concepts), 3) to low-level details. All within 1 forward pass, for all prompts! This is what astonished me most about DALL-E 1.
Importantly, placing, implementing, and combining concepts in a picture is done in a novel way without a provided specification. For style generation, it would need to model a distribution over all possible styles and use each style, all without a style specification. This doesn't seem much harder to me and could probably be achieved with slightly different training. The procedure I described is just supposed to introduce helpful stochasticity in the prompt and use an established generation conduit.
I wonder if the macronutrient rates shifted. This would influence the total calories you end up with because absorption rates are different for different macronutrients. How the food is processed also influences absorption (as well as the total amount of calories that may not be reflected on the package).If these factors changed, calories today don't mean exactly the same thing as calories in 1970.Since FDA allows a substantial margin of error for calories, maybe producers also developed a bias that allows them to stay within this margin of error but show fewer calories on the package?Maybe this is all controlled for in studies, dunno, I just did a couple of google searches and had these questions.
I could imagine that OpenAI getting top talent to ensure their level of research achievements while also filtering people they hire by their seriousness about reducing civilization-level risks is too hard. Or at least it could easily have been infeasible 4 years ago.
I know a couple of people at DeepMind and none of them have reducing civilization-level risks as one of their primary motivations for working there, as I believe is the case with most of DeepMind.
I have an argument for capabilities research being good but with different assumptions. The assumption that's different is that we would progress rapidly towards AGI capabilities (say, in 10 years).
If we agree 95% of progress towards alignment happens very close to the AGI, then the duration of the interval between almost-AGI and AGI is the most important duration.
Suppose the ratio of capabilities research to alignment research is low (probably what most people here want). Then AI researchers and deployers will have an option say "Look, so many resources were put towards safety already, it's actually fine, we're employing the 2027 comprehensive robustness benchmarks, and IDA+, in fact our quality assurance team is implementing it right now, no need to worry", prompting decision-makers to relax and let it go. Almost-AGI -> AGI interval is 2 years.
On the other hand, if it's high, this may cause decision-makers to freak out when they have their almost-AGI on the table and contain the development (e.g. with regulation). This may primarily be mediated via easier-to-avoid public failures and accidents. Or by AI safety people quickly and loudly demonstrating that we don't yet have the tools to avoid even these easier-to-avoid failures. Then regulation extends the Almost-AGI -> AGI interval to 8 years.
The point is that this is 4x more time to work on 95% of safety research progress.
Every other day I have a bunch of random questions related to AI safety research pop up but I'm not sure where to ask them. Can you recommend any place where I can send these questions and consistently get at least half of them answered or discussed by people who are also thinking about it a lot? Sort of like an AI safety StackExchange (except there's no such thing), or a high-volume chat/discord. I initially thought about LW shortform submissions, but it doesn't really look like people are using the shortform for asking questions at all. | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335362.18/warc/CC-MAIN-20220929163117-20220929193117-00598.warc.gz | CC-MAIN-2022-40 | 6,094 | 19 |
http://www.netgearloginpage.com/log-into-a-netgear-wireless-router/ | code | How to log into a Netgear wireless router
Setting up Netgear router with www.routerlogin.net is not a tough task. However, new users often get confused about how to log into a Netgear wireless router. you can access my Netgear login page to change wifi network name and password, admin password, set up guest wifi, and more.
Logging into routerlogin net home page is a simple procedure. You just required a network connection for 192.168.1.1 Netgear log in. if you are unable to access my Netgear router login, check out the network connection.
How to log into a Netgear wireless router?
If you have a Netgear router and want to sign into routerlogin net home page, you can follow these steps:
- Make sure you have connected your computer to the Netgear network.
- Open up your preferred browser and enter http://routerlogin.net into its URL. Or, type 192.168.1.1 ip address.
- This will open 192.168.1.1 Netgear log in page. Enter ‘admin’ in the username field and ‘password’ in the password field.
- Now, you will enter into Netgear router setup page to configure all the settings.
Unable to access Netgear router login rouetrlogin.net page
You will not get access to the routerlogin.net home page if you don’t follow the configuration steps carefully. Here’s how to resolve Netgear router login issues:
- First ensure that you are using correct web address, username and password.
- If you receive an error while attempting Netgear router login, try clearing the browser cache and cookies.
- Another solution is using 192.168.1.1 Netgear log in ip address.
- If the issue still persists, check the cable connection between the devices.
- You can temporarily disable ads blockers, pop-up blockers, and firewalls for some time.
- Turn off your modem, router and computer. wait for two minutes and then supply power all the devices one by one. This is called the rebooting process.
- Update your Netgear router firmware. Netgear provides new firmware from time to time that improves the performance and also fix the bugs.
- If you are unable to Netgear router login issues up till now, you can perform a factory data reset.
The above-mentioned are the reasons and solutions that you can use if you are not able to access my Netgear login page.
If you own a Netgear router and was looking to know the steps regarding how to log into a Netgear router, this blog will of great help. If you need more info on the Netgear router configuration, you can get in touch with us. | s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593655919952.68/warc/CC-MAIN-20200711001811-20200711031811-00536.warc.gz | CC-MAIN-2020-29 | 2,480 | 21 |
https://www.tradesy.com/shoes/charles-david-wedges-5886250/ | code | Added to Shopping Bag
Charles David Patent Leather & Snakeskin Wedges
Listed by Micki
Size: 8 Regular (M, B)
If your item was misrepresented in any way, you can file a misrepresentation claim. Tradesy will investigate and you’ll be eligible for a Full Refund.
Patent Leather & Snakeskin Wedges
Shipping Included Shipping & packaging provided by seller. Learn More
Pay with Credit Card, PayPal, or Affirm.
This item may have been worn but has no visible signs of wear.
Charles by Charles David cream colored patent leather wedge with very exotic cream and black snakeskin platform/wedge. This stunning shoe has sophistication and style. 4.5" heel and 1.5" platform make this wedge pretty comfortable. Pristine, LIKE NEW condition.
Wed 1/25/17 - Sun 1/29/17 (5-9 days)
Submit a return request within 4 days of delivery
Pack and ship the item using our free return shipping label
Skip the return request and bring the item to your nearest for instant Tradesy Credit.
Have a similar item? Sell Yours | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280891.90/warc/CC-MAIN-20170116095120-00467-ip-10-171-10-70.ec2.internal.warc.gz | CC-MAIN-2017-04 | 997 | 15 |
http://news.sys-con.com/node/3044766 | code | |By Marketwired .||
|April 4, 2014 06:00 PM EDT||
COLORADO SPRINGS, CO -- (Marketwired) -- 04/04/14 -- Advanced Cannabis Solutions (ACS) (OTCQB: CANN) announced today that it has entered into an exclusive agreement with the Alison Group to distribute CRREO (Child Resistant Reclosable Easy Open) bags in southern Colorado for marijuana dispensaries. Robert Frichtel, President and CEO of ACS, "Alison's commitment to compliance and the fact that the CRREO bag is the only flexible (bag) that is ASTM (American Society of Testing and Materials) approved will make this packaging a great solution for packaging requirements at dispensaries. Alison offers other products and solutions that cannabis dispensaries and cultivators may take advantage of as we pursue this business together." He continued by emphasizing, "The ASTM testing protocol must be followed by dispensaries according to what is defined by the Marijuana Enforcement Division." The Medical Enforcement Division is commonly referred to as the MED in Colorado, the marijuana regulatory body for state compliance.
According to Frichtel, the management team at ACS has been exploring ancillary products for dispensaries and cultivators for several months. Frichtel said, "Finding the right fit is just as important as finding the right products for ACS. The team at Alison is a good fit for our long-term development and distribution of solutions for our operators and customers in the marijuana industry." The CRREO bag was patented in 1994 and has been utilized in the medical industry for several years. ACS will begin distributing bags to customers in southern Colorado in May of this year, with additional market expansion possible.
About Advanced Cannabis Solutions
ACS provides a comprehensive set of solutions to the regulated cannabis industry. The Company does not grow, harvest, distribute or sell cannabis or any substances that violate United States law or the Controlled Substances Act, nor does it intend to do so in the future.
The Company leverages its management team's extensive experience in serving the cannabis industry by providing services in both real estate leasing and cannabis business consulting. ACS plans to work exclusively with licensed and regulated clients.
Ask someone to architect an Internet of Things (IoT) solution and you are guaranteed to see a reference to the cloud. This would lead you to believe that IoT requires the cloud to exist. However, there are many IoT use cases where the cloud is not feasible or desirable. In his session at @ThingsExpo, Dave McCarthy, Director of Products at Bsquare Corporation, will discuss the strategies that exist to extend intelligence directly to IoT devices and sensors, freeing them from the constraints of ...
Sep. 29, 2016 09:45 AM EDT Reads: 2,630
Technology vendors and analysts are eager to paint a rosy picture of how wonderful IoT is and why your deployment will be great with the use of their products and services. While it is easy to showcase successful IoT solutions, identifying IoT systems that missed the mark or failed can often provide more in the way of key lessons learned. In his session at @ThingsExpo, Peter Vanderminden, Principal Industry Analyst for IoT & Digital Supply Chain to Flatiron Strategies, will focus on how IoT de...
Sep. 29, 2016 09:45 AM EDT Reads: 1,195
One of biggest questions about Big Data is “How do we harness all that information for business use quickly and effectively?” Geographic Information Systems (GIS) or spatial technology is about more than making maps, but adding critical context and meaning to data of all types, coming from all different channels – even sensors. In his session at @ThingsExpo, William (Bill) Meehan, director of utility solutions for Esri, will take a closer look at the current state of spatial technology and ar...
Sep. 29, 2016 09:30 AM EDT Reads: 390
For basic one-to-one voice or video calling solutions, WebRTC has proven to be a very powerful technology. Although WebRTC’s core functionality is to provide secure, real-time p2p media streaming, leveraging native platform features and server-side components brings up new communication capabilities for web and native mobile applications, allowing for advanced multi-user use cases such as video broadcasting, conferencing, and media recording.
Sep. 29, 2016 09:30 AM EDT Reads: 3,204
19th Cloud Expo, taking place November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA, will feature technical sessions from a rock star conference faculty and the leading industry players in the world. Cloud computing is now being embraced by a majority of enterprises of all sizes. Yesterday's debate about public vs. private has transformed into the reality of hybrid cloud: a recent survey shows that 74% of enterprises have a hybrid cloud strategy. Meanwhile, 94% of enterpri...
Sep. 29, 2016 09:30 AM EDT Reads: 4,438
Complete Internet of Things (IoT) embedded device security is not just about the device but involves the entire product’s identity, data and control integrity, and services traversing the cloud. A device can no longer be looked at as an island; it is a part of a system. In fact, given the cross-domain interactions enabled by IoT it could be a part of many systems. Also, depending on where the device is deployed, for example, in the office building versus a factory floor or oil field, security ha...
Sep. 29, 2016 09:30 AM EDT Reads: 629
SYS-CON Events announced today that Interface Masters Technologies, a leader in Network Visibility and Uptime Solutions, will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Interface Masters Technologies is a leading vendor in the network monitoring and high speed networking markets. Based in the heart of Silicon Valley, Interface Masters' expertise lies in Gigabit, 10 Gigabit and 40 Gigabit Eth...
Sep. 29, 2016 09:15 AM EDT Reads: 2,694
Much of the value of DevOps comes from a (renewed) focus on measurement, sharing, and continuous feedback loops. In increasingly complex DevOps workflows and environments, and especially in larger, regulated, or more crystallized organizations, these core concepts become even more critical. In his session at @DevOpsSummit at 18th Cloud Expo, Andi Mann, Chief Technology Advocate at Splunk, showed how, by focusing on 'metrics that matter,' you can provide objective, transparent, and meaningful f...
Sep. 29, 2016 09:00 AM EDT Reads: 2,797
Cloud computing is being adopted in one form or another by 94% of enterprises today. Tens of billions of new devices are being connected to The Internet of Things. And Big Data is driving this bus. An exponential increase is expected in the amount of information being processed, managed, analyzed, and acted upon by enterprise IT. This amazing is not part of some distant future - it is happening today. One report shows a 650% increase in enterprise data by 2020. Other estimates are even higher....
Sep. 29, 2016 09:00 AM EDT Reads: 4,163
Creating replica copies to tolerate a certain number of failures is easy, but very expensive at cloud-scale. Conventional RAID has lower overhead, but it is limited in the number of failures it can tolerate. And the management is like herding cats (overseeing capacity, rebuilds, migrations, and degraded performance). Download Slide Deck: ▸ Here In his general session at 18th Cloud Expo, Scott Cleland, Senior Director of Product Marketing for the HGST Cloud Infrastructure Business Unit, discusse...
Sep. 29, 2016 08:30 AM EDT Reads: 2,472
To leverage Continuous Delivery, enterprises must consider impacts that span functional silos, as well as applications that touch older, slower moving components. Managing the many dependencies can cause slowdowns. See how to achieve continuous delivery in the enterprise.
Sep. 29, 2016 08:15 AM EDT Reads: 2,143
There is little doubt that Big Data solutions will have an increasing role in the Enterprise IT mainstream over time. Big Data at Cloud Expo - to be held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA - has announced its Call for Papers is open. Cloud computing is being adopted in one form or another by 94% of enterprises today. Tens of billions of new devices are being connected to The Internet of Things. And Big Data is driving this bus. An exponential increase is...
Sep. 29, 2016 08:00 AM EDT Reads: 2,710
Internet of @ThingsExpo has announced today that Chris Matthieu has been named tech chair of Internet of @ThingsExpo 2016 Silicon Valley. The 6thInternet of @ThingsExpo will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
Sep. 29, 2016 08:00 AM EDT Reads: 2,693
An IoT product’s log files speak volumes about what’s happening with your products in the field, pinpointing current and potential issues, and enabling you to predict failures and save millions of dollars in inventory. But until recently, no one knew how to listen. In his session at @ThingsExpo, Dan Gettens, Chief Research Officer at OnProcess, will discuss recent research by Massachusetts Institute of Technology and OnProcess Technology, where MIT created a new, breakthrough analytics model f...
Sep. 29, 2016 08:00 AM EDT Reads: 2,089
Most of us already know that adopting new cloud applications can boost a business’s productivity by enabling organizations to be more agile and ready to change course in our fast-moving and connected digital world. But the rapid adoption of cloud apps and services also brings with it profound security threats, including visibility and control challenges that aren’t present in traditional on-premises environments. At the same time, the cloud – because of its interconnected, flexible and adaptable...
Sep. 29, 2016 07:15 AM EDT Reads: 1,733 | s3://commoncrawl/crawl-data/CC-MAIN-2016-40/segments/1474738661833.70/warc/CC-MAIN-20160924173741-00201-ip-10-143-35-109.ec2.internal.warc.gz | CC-MAIN-2016-40 | 9,891 | 37 |
https://github.com/raginpirate | code | Prevent this user from interacting with your repositories and sending you notifications.
Learn more about blocking users.
Contact GitHub support about this user’s behavior.
Learn more about reporting abuse.
A progressive Jekyll theme
Forked from codeschool-projects/HelloCodeSchoolProject
Demonstration on how projects work at Code School.
Forked from codeschool-projects/HTMLPortfolioProject
Code School Project: HTML + CSS Portfolio
Forked from codeschool-projects/jQueryBadgesProject
jQuery Badges: Display the courses you've taken using AJAX
Forked from codeschool-projects/BootstrapPortfolioProject
Code School Project: Portfolio created with Twitter Bootstrap
Seeing something unexpected? Take a look at the
GitHub profile guide. | s3://commoncrawl/crawl-data/CC-MAIN-2021-04/segments/1610703519883.54/warc/CC-MAIN-20210120023125-20210120053125-00749.warc.gz | CC-MAIN-2021-04 | 737 | 15 |
https://vlab.amrita.edu/?sub=3&brch=274&sim=1428&cnt=1 | code | - To study the pairwise sequence similarity search using BLAST algorithm.
- To study the functional and evolutionary relationships between different sequences.
BLAST program was designed by Stephen Altschul, Warren Gish, Webb Miller, Eugene Myers, and David J. Lipmann at National Institutes of Health (NIH) and was published in Journal of Molecular Biology in 1990. BLAST (Basic local alignment search tool) is a heuristic search algorithm, it finds the solutions from the all possibilities ,which takes input as nucleotide or protein sequence and compare it with existing databases like NCBI, GenBank etc. It finds the local similarity between different sequences and calculates the statistical significance of matches. It can also be used to find functional and evolutionary relationship between different sequences. Search is done by taking the sequence of a certain word size, comparing it with the database sequence and scores are assigned for each comparison. Based on the threshold, a suitable match of that query word is taken and the alignment is extended to both sides. After the alignment is complete, the total score is calculated and alignment is displayed on the blast result page only if the total scores exceed the threshold value.
Sequence, Sequence Alignment and importance:
A biological sequence refers to a sequence of characters which belong to DNA/RNA/protein. Two types of biological sequences are most commonly known namely, Nucleotide Sequence and Protein Sequence. Nucleotide sequence is mainly formed of four different nucleotides namely, adenine (A), guanine (G), cytosine (C) and tyrosine (T). While protein sequence is formed of 20 different amino acids which are commonly found. The nucleotides arrange themselves in the form of triplet code (triplet code refers to a group of three nucleotides) to code for an amino acid. These sequences are properly indexed in the already existing databases and it is possible to retrieve these sequences from their corresponding databases. The sequences are obtained by the following methods explained below.
DNA sequencing methods:
Sanger Method (dideoxy chain termination method): Here 4 test tubes are taken labelled with A, T, G and C. Into each of the test tubes DNA has to be added in denatured form (single strands). Next a primer is to be added which anneals to one of the strand in template. The 3' end of the primer accomadates the dideoxy nucleotides [ddNTPs] (specific to each tube) as well as the deoxy nucleotides randomly. When the ddNTP's gets attached to the growing chain, the chain terminatesdue to lack of 3'OH which forms the phospho diester bond with the next nucleotide. Thus small strands of DNA are formed. Electrophoresis is done and the sequence order can be obtained by analysing the bands in the gel based on the molecular weight. The primer or one of the nucleotides can be radioactively or fluorescently labeled also, so that the final product can be detected from the gel easily and the sequence can be inferred.
Maxam-Gilbert (Chemical degradation method): This method requires denature DNA fragment whose 5' end is radioactively labeled. This fragment is then subjected to purification before proceeding for chemical treatment which results in a series of labeled fragments. Electrophoresis technique helps in arranging the fragments based on their molecular weight. To view the fragments, gel is exposed to X-ray film for autoradiography. A series of dark bands will appear, each corresponding to a radio labeled DNA fragment, from which the sequence can be inferred.
Protein sequencing methods:
Edman Degradation reaction: The reaction finds the order of amino acids in a protein from the N-terminal, by cleaving each amino acid from the N-terminal without distrubing the bonds in the protein. After each clevage, chromatography or electrophoresis is done to identify the amino acid
Mass Spectrometry: It is used to determine the mass of particle, composition of molecule and for finding the chemical structures of molecules like peptides and other chemical compounds. Based on the mass to charge ratio, one can identify the amino acids in a protein
Sequence Alignment or sequence comparison lies at heart of the bioinformatics, which describes the way of arrangement of DNA/RNA/Protein sequences and identify the regions of similarity among them. It is used to infer structural, functional and evolutionary relationship between the sequences. Alignment finds similarity level between the query sequence and different available database sequences. The algorithm works by dynamic programming approach which divides the problem into smaller independent sub problems. It finds the alignment more quantitatively by assigning scores.
Methods of Sequence Alignment:
There are mainly two methods of Sequence Alignment:
Global Alignment :Sequences having same length and quite similar are very much appropriate for global alignment. Here the alignment is carried out from beginning of the sequence to end of the sequences to find out the best possible alignment.
Local Alignment:Sequences which are suspected to have similarity or even dissimilar sequences can be compared with local alignment method. It finds the local regions with high level of similarity
BLAST is one of the pairwise sequence alignment tool used to compare different sequences. There are different BLAST programs for different comparisons as shown in Table 1.
Nucleotide BLAST Programs:
BLASTN : The initial search is done for a word of length ‘w’ and threshold score ‘T’. Whole sequence is divided into words with a length of 11 for nucleic acids (maximum number of words can be calculated by L-w+1= max.word no (L=sequence length, w=words)). The BLASTn algorithm parses nucleotide sequences into 11 letter “words” the same is done for every sequence in the query database, word matches are being identified from the database sequence. This searches for somewhat similar sequences.
Mega BLAST: Searches for highly similar sequences.
Discontiguous Mega BLAST: Searches for more dissimilar sequences.
Protein BLAST Programs :
BLASTp: Finds the similarity between the query protein sequences to a protein sequences available in the protein database. BLASTp also reports for global alignment, which is the preferred result for protein identification. The BLASTp algorithm parses protein sequences into 3 letter “words” the same is done for every sequence in the query database, word matches are being identified from the database.
PSI-BLAST: Position-Specific Iterated -BLAST is the most sensitive BLAST program. It is used to find very distantly related proteins or new members of protein family. Algorithm builds a position-specific scoring matrix (PSSM or profile) from an iterative alignment of sequences, returns with E-values and threshold (default=0.005). E-value It decreases exponentially with the score that is assigned to a match between two sequences.
PHI-BLAST: Pattern-Hit Initiated BLAST is used to find protein sequences which contains a pattern, specified by the user and are similar to the query sequence. This requirement was proposed to reduce the number of hits which contains only the pattern, but is likely to have no true homology to the query. To run PHI-BLAST, enter the query into the Search box, and enter the pattern into the PHI pattern box. Only one pattern can be used in one search.
Scoring matrices :
Scoring matrices are used to assign score for comparision of pairs of characters. There are different types of scoring matrices like:
Identity Matrices: In this type of matrix, the score would either 1's or 0's. 1's will lie along the diagonal. Basically the scoring scheme is based on matches and mismatches.
Unitary scoring matrices: This matrix also have either 0's or 1's as their scores . The difference is that it takes into the idea of transitions(change among purines or pyramidines) and transversions(change between purine and a pyramidine).
PAM Matrices: Margaret Dayhoff was the first one to develop the PAM matrix, PAM stands for Point Accepted Mutations. PAM matrices are calculated by observing the differences in closely related proteins. One PAM unit (PAM1) specifies one accepted point mutation per 100 amino acid residues, i.e. 1% change and 99% remains as such.
BLOSUM: BLOcks SUbstitution Matrix, developed by Henikoff and Henikoff in 1992, using conserved regions, these matrices are actual percentage identity values. Simply to say they depend on similarity. Blosum 62 means there is a 62 % similarity.
Parameters used in BLAST algorithm :
Threshold: It is a boundary of minimum or maximum value which can be used to filter out words during comparison.
True Homology: In BLAST true homology refers how much the sequence is similar to the query sequence.
E-value: It decreases exponentially with the score that is assigned to an alignment between two sequences.
Word size: Whole Search is done by taking the sequence of a certain word size and compares it with the database sequence and scores are assigned for each comparison. Word size is given as 11 for nucleic acids and 3 for proteins.
Putative conserved domains: These are the domains that have different functionalities.
Gap score or gap penalty: Dynamic programming algorithms uses gap penalties to maximize the biological meaning. Gap penalty is subtracted for each gap that has been introduced. There are different gap penalties such as gap open and gap extension. The gap score defines, a penalty given to alignment when we have insertion or deletion. During the evolution, there may be a case where we can see continuous gaps all along the sequence, so the linear gap penalty would not be appropriate for the alignment. Thus gap open and gap extension has been introduced when there are continuous gaps (five or more). The open penalty is always applied at the start of the gap, and then the other gaps following it is given with a gap extension penalty which will be lesser compared to the open penalty. Typical values are –12 for gap opening, and –4 for gap extension.
Working of BLAST Algorithm:
- Query sequence is taken and analyzed for low complex regions. Low complexity regions are regions which contain less information or variations like AAAAAAAA or ATATATAT etc.
- These low complex regions are masked with alphabet s like X or N
- List of words of certain word size is made. Usually the word size is 3 for proteins and 11 for DNA
- Scores are calculated for each pair of words(query sequence word and database word) using substitution scoring matrixes (like PAM or BLOSUM),and only the high scoring words i.e. above a threshold value or a cutoff score is taken for further alignment. A cutoff score is selected to reduce number the number of matches so as to decrease the computation time.
- This scoring and checking is repeated for all the words in the query sequence.
- The remaining high-scoring words are organised into efficient search tree and rapidly compared to the database sequence. This is done to find out the exact matches.
- If an exact or good match is found then an alignment is extended in both directions from the position where the exact match occurred
Image source : petang.cgu.edu.tw/Bioinfomatics/MANUALS/NCBIblast/BLAST_algorithm.html
- High scoring pairs (HSP) which have score greater than a threshold are taken for consideration.
- Significance of the HSP score are calculated. The probability p of observing a score S equal to or greater than x is given by the equation:
- Statistical assessments are made in the case if two or more HSP regions are found and certain matching pairs are put in descending order in the output file as far as their similarity/ score is concerned. | s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817033.56/warc/CC-MAIN-20240415205332-20240415235332-00538.warc.gz | CC-MAIN-2024-18 | 11,719 | 50 |
https://publish.geo.be/geonetwork/f0ow2say/search?format=GML | code | Type of resources
Contact for the resource
Landuse-Particular Zone is the INSPIRE 2D vector data set of the "Particular zones" layer originated from the Top10vector product of the National Geographic Institute in Belgium . It includes the "ExistingLandUseDataSet" features and the "ExistingLandUseObject" features in accordance with the INSPIRE specifications.
The data set contains a seamless polygonal layer representing the land cover in Belgium for the year 2018. The dataset is INSPIRE compliant.
Administrative Units - INSPIRE corresponds to the dataset of the Belgian administrative units that complies with the INSPIRE specifications. This dataset is composed of two classes. The first class contains administrative units and the second class contains administrative boundaries. The class are composed of the following administrative level: Kingdom, Regions, Provinces, and arrondissements, and municipalities. The entire dataset can be downloaded via the ad hoc WFS.
Electricity network is the INSPIRE vector data set originated from the High-Tension network of the product TOP10Vector of the National Geographic Institute in Belgium. The Electricity network is regularly updated with the ELIA Group data sources. It includes the "ElectricityCable" features and the "Pole" features in accordance with the INSPIRE specifications.
Buildings is the INSPIRE 2D vector data set of the "Constructions" layer originated from the Top10vector product of the National Geographic Institute in Belgium . It includes the "Building" features and the "OtherConstruction" features in accordance with the INSPIRE specifications.
The layer Geographical Names includes all the names of administrative units, uninhabited places, waterways, remarkable buildings and infrastructures. They are classified into different feature and attribute classes.
The earthquake catalogue and database of the Royal Observatory of Belgium contains source parameters of earthquakes that occurred in and around Belgium since 1350. Similar to most other seismic catalogues in the world, the ROB catalogue is heterogeneous, as it is based on the analysis of two different types of data: - Historical data: concern the period from about 1350 to 1910, for which only local reports about damage and felt effects (i.e. intensity) of earthquakes are available (“macroseismic” observations); - Instrumental data: concern the period from 1911 onward, the year continuous seismic recordings in Belgium started, up to the present day. For earthquakes during this period both intensity data (from macroseismic enquiries with the local authorities and, since 2000, on the internet) and seismic recordings are available. The earthquake catalogue is a list of earthquakes with the following parameters: origin time (year, month, day, hour, minute, second), geographic coordinates of the hypocenter (latitude, longitude, focal depth), magnitude (local magnitude ML, surface-wave magnitude Ms and/or moment magnitude Mw), maximum observed intensity, and the name of the locality. The ROB catalogue is considered to be complete: - Since 1350 for earthquakes with Mw>=5.0; - Since 1905 for earthquakes with Mw>=4.0 (seismic station in Uccle and neighboring countries); - Since 1960 for earthquakes with Mw>=3.0 (4 stations in Belgium); - Since 1985 for earthquakes with Mw>=2.0 (modern digital network consisting of 20+ stations).
The entities included in the dataset represent the physical network in the sense of the Inspire European directive. The dataset comprises several classes and is in accordance with the INSPIRE specifications. The Wetland class represents poorly drained or periodically flooded portions of land, the soil of which is saturated with water but where vegetation is nevertheless able to develop. The StandingWater class represents flooded areas that are, nevertheless, completely surrounded by land.
The entities included in the dataset represent the Belgian rail transport network in the sense of the Inspire European directive. The dataset comprises several classes and is in accordance with the INSPIRE specifications. The RailLink class represents, in a linear manner, all of the rail links between each pair of dots for the network considered. The RailwayStationNode class represents occasionally all of the stations located along the network. In addition to this are two classes without geometry. The RailwatType class ranks the segments according to the type of rail transport for which they were designed. All the segments for this dataset belong to the train category. The "RailwaytElectrification" class lists the segments according to whether they are electrified or not.
The INSPIRE contour lines used for a cartographic representation of the relief at scale 1:50000, a product of the National Geographic Institute in Belgium. The dataset features are in accordance with the INSPIRE specifications. | s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712297284704.94/warc/CC-MAIN-20240425032156-20240425062156-00529.warc.gz | CC-MAIN-2024-18 | 4,890 | 12 |
https://elixirforum.com/t/a-question-about-cdns/5072 | code | Content Delivery Networks are used all over the place. Many libraries provide easy options for inclusion of their core code in your application. However, I have the feeling that CDNs are greatly over-used.
That is, I totally understand using a separate webserver whose only job is to provide certain static pieces of content, like:
Images (logos, backgrounds) that are used by your application’s styling.
Font files that include the typefaces and icons your application uses.
And maybe your application uses some audio snippets or other kinds of static data.
In these cases, using a CDN is nice because it reduces the stress on your main application. (Still, I would say that for smaller applications with only a couple of hundred visitors at most, the efficiency gain of this would be neglegible because even when also hosting these media files, your server should not be under that much load.)
When the other service is down, your web app breaks, because its logic and/or its styling depended on the external service. When the CDN-provider that many websites use to include e.g. jQuery, suddenly 75% of the commonly visited websites breaks.
Even if the code you include from external source looks fine now, you have no influence on when the CDN service alters the code files that you point to, (and no guarantee that this will not happen) which is a huge security vulnerability.
I get really fed up when I attempt to work on a project in the train, which is running locally in my development environment, but everything stops working because certain files are loaded in from external sources.
Unfortunately I see both coworkers and other developers use code-hosting CDNs with increasing frequency. I am trying to understand what the reason for this is. Is it just because ‘it is simple’, even though it is highly dangerous? Is it because they have not thought about the negative consequences? Or are there strong (enough) positives that I am not seeing?
Why would anyone use a code-hosting-CDN for anything but the most simple throwaway proof-of-concepts?
The other thing you have to take into consideration is the server load, transfer etc. If you can make your web server less busy, the better it performs.
Speed. I believe the main idea behind CDNs is that they are able to serve files from locations that are very close to the end user - because their ‘network’ spans all major areas of the world with servers in most countries or sometimes several spread across each country.
Personally I think they are over-rated as well - the infrastructure of the internet in most countries is far better than what it was when CDNs became a thing, making them less useful imo.
@qqwy: I definitely agree with you on all of those points. I personally also avoid using CDNs.
In my opinion, they are often a typical case of premature over-optimization and unless you actually encounter problems with latency related to your severs being to far away from end users, there is simply not a problem you need to solve with CDNs.
Let’s be honest: For most applications it doesn’t matter if a JS or image file has an additional 20 ms latency or not.
On top of this, CDN traffic is insanely expensive. Even if you want to separate your application from hosting static resources (which can totally make sense), I would try to find a high-quality shared or managed hosting provider before anything else.
In my experience you can easily get good shared hosting for 10 to 20 Euros/month and serve several TB of data from them. Serving the same amount of data from a CDN would set you back hundreds or even thousands of Euros.
What is the reason for this? Mostly the ‘high uptime’ + ‘high availability in local data centers’ that large CDN-providers promise?
I just found out that there exists something called Subresource Integrity, which might in the future be used to ensure that a CDN is actually serving the files you expect it to serve. But until that feature has become stable, I cannot fathom that the small speed increase (even if you serve a three-megabyte JS file once per unique visitor) is worth the huge security risk.
The reason is probably simply that big companies who actually do need CDNs are still willing to pay those prices
If you look at AWS Cloudfront, they aim for 99.9% availability which amounts to less than 9 hours of downtime/year and which is pretty reasonable for most applications. Traditional hosting providers offer similar or even better numbers.
Cloudflare is sloooooow in my experience, it increases page access time in tests I did from a split second to over 10 seconds for full download, I’m not a fan of it.
A CDN itself is not bad, the localization is nice and caching across sites is nice, however I don’t trust most of the networks due to stupidity they’ve pulled and I really ReallyREALLY do not like the crap most websites pull that download thousands of things per page. It is reasons like this that my workplace blocks non-SSL 3rd party traffic (both the requester and the requestee need to be SSL to work around it) by default. It substantially reduces the network load, no virus issues since then either, and a few other bonuses.
Definitely material performance improvements if your audience is more than a few hops away from your origin content. A lot of my work is in Asia and a good CDN will improve response time to the user in the order of seconds or more in many cases. | s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656104669950.91/warc/CC-MAIN-20220706090857-20220706120857-00457.warc.gz | CC-MAIN-2022-27 | 5,430 | 26 |
https://onlineessaywritinghelp.com/identify-and-analyse-the-main-risks-associated-with-the-project-what-actions-would-you-take-to-avoid-or-mitigate-the-effect-of-the-risks-2/ | code | The case study indicates that you have been appointed to be the project manager for this project, reporting to Dr Southgate.
1.What do you believe to be the main management issues associated with the various aspects of this project? Who would you expect to be represented on the Project Board and how would you organize your management team?
2.Identify and analyse the main risks associated with the project. What actions would you take to avoid or mitigate the effect of the risks?
3.Devise and implement a project management plan to include the following:
•Stakeholder Analysis Communication Strategy
Please use academic sources with wide range(books, journals, articles and etc.).Please do not use non-academic sources such as wikipedia. | s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510924.74/warc/CC-MAIN-20231001173415-20231001203415-00117.warc.gz | CC-MAIN-2023-40 | 742 | 6 |
https://community.wd.com/t/my-passport-wont-mount-on-mac/197847 | code | My Passport has stopped responding.
I was using it fine 2 days ago until the system crashed. I had been having problems with my MacBook for some time and kept getting the rainbow wheel. When I restarted my computer and plugged Passport back in, it didn’t mount. I tried Disk Utility but it kept loading and loading but never opened. Disk Utility would only open when Passport was not connected to the computer.
I thought I needed to upgrade my mac and updated it to Sierra but it didn’t change anything. Any idea what the problem might be?
I have tried different ports as well as tried connecting it to a PC but nothing has helped. I am worried I’ve lost all my documents and I have some irreplaceable files incl. wedding photos there.
Any help is appreciated.
Thanks a lot. | s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662636717.74/warc/CC-MAIN-20220527050925-20220527080925-00710.warc.gz | CC-MAIN-2022-21 | 780 | 6 |
https://feuniverse.us/t/animation-directory-finished-products-only/457?page=29 | code | Sweet! Added to the WIP repo.
Can someome please upload the Kent and Sain animations Cavalier/Paladin made by @Greentea
Have those even been released? I don’t have them.
No, they haven’t. Aren’t scripted yet. At least not to my knowledge.
I’m going to make script for this.I’ll upload when I finished it.
I don’t mean to sound self promotional or beggy or anything but I also have a lot of stills, many of which need animating. Please let me know if you’re interested in doing any. (@ everyone not just rob lol)
After so much procrastination (ew) and dealing with life as well (double ew), I’m proud to bring you…
Updated Archers! Recoloreable, and available for female and male units, in 8 versions each! The males actually have 10 but shhh
Thanks alot for these awesome animations.
Heath Dragon Lord:
My first attempt at making an animation.
I hope you guys like it.
Recruit (M) :
Waleed, these look pretty good.
Journeyman with Sword:
How is this different from your squire?
The squire have pants and the palette is more of the journeyman
Here is Red Bean and finally I finished Wayu’s movement this week.
It’s free to use.
It’s really cool seeing all you Chinese spriters come over and post! Feels like the English and Chinese communities are merging! | s3://commoncrawl/crawl-data/CC-MAIN-2019-04/segments/1547583688396.58/warc/CC-MAIN-20190120001524-20190120023524-00018.warc.gz | CC-MAIN-2019-04 | 1,279 | 20 |
http://isu.edu/cms/content-types/what-is-a-content-type/ | code | What is a Content Type?
In basic terms, a content type dictates how the content is displayed when published. Content (text and images) is inserted into a content type. The system then displays that content on the page in an HTML format. Pages may contain multiple content types. | s3://commoncrawl/crawl-data/CC-MAIN-2017-22/segments/1495463608684.93/warc/CC-MAIN-20170526203511-20170526223511-00062.warc.gz | CC-MAIN-2017-22 | 278 | 2 |
https://epicpw.com/index.php?topic=15969.0 | code | Cs5, cs6.also a number of other programs C: ex. illustrator, some corel stuff, etc. c:
You mean Coral Draw? Or something like that.....I used to have those.....lost 'em.
i remember the fashion
I know there's other places, but that's where I get nearly everything I don't want to buy immediately(you should still support companies if you can).Just have to be careful though, and always read the comments before downloading anything.
Half the time pirate bay doesn't actually torrent or whatever for me, though. x: Especially on older uploads, I think, which makes it hard to get stuff like that. | s3://commoncrawl/crawl-data/CC-MAIN-2017-51/segments/1512948587577.92/warc/CC-MAIN-20171216104016-20171216130016-00233.warc.gz | CC-MAIN-2017-51 | 594 | 5 |
https://community.amd.com/t5/graphics/amdkmdag-sys-amp-ntoskrnl-exe-amp-cache-hierarchy-error/m-p/446879 | code | I'm facing a problem with my computer. It freezes when I turn off and then after more than 20 minutes turn on two times in row then automatic repair isn't able to fix it and after clicking restart Windows starts normally. Also, when I choose restart from desktop it starts normally. DMP files are available at the link below together with event log of cache hierarchy error. My PC: Ryzen 3 3100, RX 5500 XT, MSI B450m-a pro max and 550w PSU. Noticable is that when I uninstall graphic driver my computer also turns off after few minutes. I'm running last non-beta bios and chipset drivers, and WHQL graphic driver from december 2020. In prime95 after 2 hours no errors and in realbench after 4 hours either. Windows reinstall didn't help. I'm going mad, please help me. | s3://commoncrawl/crawl-data/CC-MAIN-2021-25/segments/1623487621699.22/warc/CC-MAIN-20210616001810-20210616031810-00568.warc.gz | CC-MAIN-2021-25 | 769 | 1 |
https://elementaryos.stackexchange.com/questions/11819/how-does-pantheon-files-store-color-tags | code | When I tag a file with a color in Pantheon Files, where is the tag recorded?
I guessed it may be stored in a hidden file in the same directory (similar to what Windows and macOS do), but I did not find such file.
elementary OS Stack Exchange is a question and answer site for developers and users of elementary OS and applications. It only takes a minute to sign up.Sign up to join this community
The file-color associations are stored in the
~/.config/marlin/marlin.db sqlite database.
This should answer your question as well: How can I change label color for any entry in Files, using scripts? | s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320300805.79/warc/CC-MAIN-20220118062411-20220118092411-00456.warc.gz | CC-MAIN-2022-05 | 596 | 6 |
http://www-scf.usc.edu/~xizewang/ | code | PhD Candidate in Urban Planning and Development
Provost's Mentored Teaching Fellow, 2016-2017
Sol Price School of Public Policy
University of Southern California
My Google Scholar profile
Email: xizewang AT usc DOT edu
I am a PhD Candidate in Urban Planning and Development at the Sol Price School of Public Policy, University of Southern California. My research interests are (1) transportation and urban form, (2) demography and travel and (3) active travel and sustainability. My PhD dissertation investigates how the demand for driving in the US are impacted by the current demographic shifts: (1) immigration, (2) Millennials entering their adulthood and (3) aging.
I am a Provost's Mentored Teaching Fellow for the 2016-2017 school year. Under this program, I am currently teaching an undergraduate-level course, "Sustainable communities, policy and planning", for the Spring 2017 semester. I have also developed a new undergraduate-level course, "Exploring urban communities using GIS."
Master of Urban and Regional Planning, University of Minnesota, Minneapolis, MN, 2012
B.E. in Urban Planning and B.A. in Economics (with distinction,) Peking Univeristy, Beijing, China, 2010
Transportation and urban form, demography and travel, active travel and sustainability
Committee chair: Prof. Marlon G. Boarnet
- Boarnet, M. G., X.Wang and D. Houston, “Can new light rail reduce personal vehicle carbon emissions? A before-after, experimental-control evaluation in Los Angeles.” Journal of Regional Science, forthcoming (available online, DOI: 10.1111/jors.12275.)
- Wang, X., G. Lindsey, J. Schoner and A. Harrison, “Modeling bike share station activity: the effects of nearby businesses and jobs on trips to and from stations.” Journal of Urban Planning and Development, 142(1), 2016.
- Wang, X., G. Lindsey, S. Hankey and K. Hoff, “Estimating mixed-mode urban trail traffic using negative binomial regression models.” Journal of Urban Planning and Development, 140(1), 2014.
- Hankey, S., G. Lindsey, X. Wang, J. Borah, K. Hoff, B. Utecht and Z. Xu, “Estimating Use of non-motorized infrastructure: Models of bicycle and pedestrian traffic in Minneapolis, Minnesota.” Landscape and Urban Planning, 107(3), 2012. | s3://commoncrawl/crawl-data/CC-MAIN-2017-22/segments/1495463608652.65/warc/CC-MAIN-20170526090406-20170526110406-00115.warc.gz | CC-MAIN-2017-22 | 2,232 | 16 |
https://www.unimitysolutions.com/insights/responsive-web-design | code | Understanding Responsive Web design A very elementary question, how does anyone access our website? it’s either by typing our website address or by clicking a link. Links to our website could be through Search, Social Media or Email campaigns. Increasingly these links can be accessed through various devices. How do we have a website that is supported in these multiple devices? Do we build separate websites or applications for each of these devices? Is there a development strategy that we need to adopt that could give us a more unified approach? Yes with the advent of Responsive design approach we could build a single website that adapts to different devices. Responsive Web design helps us build a website that responds to the device from which the user accesses it. Two terminologies that go hand in hand with Responsive design are the Mobile first approach and Progressive Enhancement. Mobile first approach The methodology of loading what is essential for mobile user as default is “mobile first approach”. This ensures that the mobile user has optimized content and not burdened with the large content of the web. The design not only caters to the constraints of a mobile device and user behaviour but utilizes the capabilities of the device. The main constraints are Screen size and Performance 1. The space available to display content is extremely small, the design needs to work on smaller screen sizes. 2. The user is usually accessing information in low bandwidth or is in urgent need of the content, the design needs to be performance optimized. In the mobile information can be accessed anytime and at anyplace. Understanding when and how information is accessed defines the behaviour of the audience. Some of the key capabilities of a device include Location detection, Device accelerometer, Touch, Camera and Ambient light. These are device-specific feature and should therefore be kept independent of the design. Progressive enhancement Progressive enhancement ensures that the content and functionality are accessible in the least capable device. There is minimum use of markup. The layout enhances itself in the end user’s device capabilities are respected. This goes hand in hand with the philosophy of separating content and markup. Also the default version is always the simplest version. Drupal 8 is Responsive! Did you know? The mobile initiative for Drupal 8 is dedicated to provide a responsive Drupal. The themes that ship with Drupal will be responsive, the administrative interface will be responsive. My favourite Responsive sites Foodsense.is Starbucks.com Bostonglobe.com Adjust the browser, slowly make it more thinner than wider, see the sites respond. | s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100476.94/warc/CC-MAIN-20231202235258-20231203025258-00444.warc.gz | CC-MAIN-2023-50 | 2,700 | 1 |
http://www.cartographersguild.com/showthread.php?t=21823&mode=hybrid | code | Since I pestered the moderators about when a new lite challenge would start, I figured I had to enter...and the topic worked out pretty well with an ongoing narrative one of my players and I were working out for our campaign. Their character is a half-orc barbarian (viking) from a semi-arctic region. They pillage/plunder party got lost at sea and shipwrecked on the sunny shores of al-qadim.
I've modified the story to suggest that they were on their way to plunder an island rumored to house a sacred temple full of unimaginable treasures. They reached the temple, but from that point forward, the character (Oivalf) completely blacked out. He awakes alone in the middle of the sea on a small river boat/canoe. There is no land in sight and he has no idea where he is, how he got there or how long he's been out for. His clothes are bloodied and in tatters and the only possessions he still has are his backpack (which luckily contains a compass and journal among other things), shield, and axe. He also finds several vases of fresh water on the ship. After a perilous time at sea, he eventually arrives on the desert coast. He has never heard of this place and no one he meets has ever heard of where he's from.
So, my entry will be his journal notes...where he records what he knows and tries to figure out whats missing. I'm using the outline of a map I already did of his home region (Myrr)...I figure this doesn't violate the rules since I'm only using the outline and will be filling it in a bit with different symbols in a completely different style.
I'm still pretty new to photoshop...so trying to figure out how to make a convincing looking journal...I've also never made a map in this black outline on parchment paper style....so any comments, criticisms, and general thoughts would be very helpful.
### LATEST WIP ###
*I'm not at all wedded to the font or actual text used at this point...it was mostly just an experiment to see how I would start laying the whole thing out. I plan on using the bottom right page to map out the coast of my Al-Qadim region (Manaff). The space in the top right will probably be used for more of his notes and maybe a small sketch of the boat he found himself on | s3://commoncrawl/crawl-data/CC-MAIN-2016-18/segments/1461860113541.87/warc/CC-MAIN-20160428161513-00193-ip-10-239-7-51.ec2.internal.warc.gz | CC-MAIN-2016-18 | 2,208 | 6 |
https://apps.dtic.mil/sti/citations/ADA276846 | code | A Framework for Developing and Managing Reusable Avionics Software
Final rept. 1 MAy-1 Sep 1993
WRIGHT LAB WRIGHT-PATTERSON AFB OH
Pagination or Media Count:
Develping reusable software for avionics is a challenge to software engineers. The task involves foreseeing the future applications, modeling real- world events, using appropriate CASE tools throughout the development life cycle, and providing for storage and retrieval of reusable software components. This report presents a model for developing and managing reusable software components, briefly describes the software process maturity model and the integration of CASE toolstechniques and methodologies for real-time systems development, examines the critical issues in managing software projects, and offers the management a set of guidelines to introduce software engineering methodologies and CASE tools within the organization through a model project which may enforce standards for new projects.
- Computer Programming and Software | s3://commoncrawl/crawl-data/CC-MAIN-2021-17/segments/1618038066613.21/warc/CC-MAIN-20210412053559-20210412083559-00614.warc.gz | CC-MAIN-2021-17 | 997 | 6 |
https://programmersheaven.com/discussion/144547/need-asp-and-dll-help | code | I have to use a VB.DLL to print, email, and fax from, by passing values to it from an .asp page. How can I pass the email address, fax number values to the VB.dll? I have an .asp form that a user can enter the email address, fax number and have an print option on it. If the users hit the email button I want to call the email function, fax button and be able to do both by hitting the fax/email button, etc.
I'm new in using VB.dll from and .asp page so any help would be great. | s3://commoncrawl/crawl-data/CC-MAIN-2018-30/segments/1531676589022.38/warc/CC-MAIN-20180715222830-20180716002830-00337.warc.gz | CC-MAIN-2018-30 | 479 | 2 |
http://stackoverflow.com/questions/5032673/sse4-sse5-amd-cool-n-quiet?answertab=votes | code | Well, i we're wondering if C++ can check if the computer has SSE4, SSE5, and Cool 'n' Quiet. It's possible? How? I saw the isProcessorFeaturePresent but i don't see anything about those there.
You'd do this by checking the cpuid processor features flags, the msdn page for __cpuid has a long example on enumerating them
Sign up using Google
Sign up using Facebook
Sign up using Stack Exchange
4 years ago | s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440644064869.18/warc/CC-MAIN-20150827025424-00232-ip-10-171-96-226.ec2.internal.warc.gz | CC-MAIN-2015-35 | 404 | 6 |
http://liu.diva-portal.org/smash/builder.jsf | code | Searching with parameters
The purpose of this page is to help you to link directly to a search result in DiVA. However, if you want to create a link that generates a result to be included on a website, then you should click on Create link feeds. Below you can see how to construct addresses, which parameters can be used and some examples of how to write them.
An address always begins with http://[domain].diva-portal.org/smash/searchlist.jsf
Replace [domain] with the abbreviation of your university or college.
Always write a question mark (?) before the first parameter.
The parameter searchtype must always be included.
The value simple corresponds to 'Simple search', postgraduate corresponds to 'Advanced search - research publications' and undergraduate corresponds to 'Advanced search - student theses'.
An ampersand (&) is always written between two parameters.
If you want to search for several publication types, write e.g.:
Apart from searchtype there must be at least one more parameter.
You can use wild cards in the same way as you do when searching.
- simple (only with the parameter freetext)
person (author, editor, examiner and supervisor cannot be combined with person)
editor (only for postgraduate)
examiner (only for undergraduate)
isrn (only for undergraduate)
isbn (only for postgraduate)
issn (only for postgraduate)
journal (only for postgraduate)
from (year, must be combined with until)
until (year, must be combined with from)
researchGroup (true or false)
artisticWork (true or false)
externalCooperation (only for undergraduate, true or false)
publicationtype (only for postgraduate) | s3://commoncrawl/crawl-data/CC-MAIN-2014-41/segments/1412037662880.10/warc/CC-MAIN-20140930004102-00316-ip-10-234-18-248.ec2.internal.warc.gz | CC-MAIN-2014-41 | 1,616 | 25 |
http://ucontest.info/luxembourg/agneeta-escort-id2711.php | code | Asian Garter Snakes
It is found at altitudes from sea level to mountain locations. The garter snake is Marjory to other non-venomous snakes in its desire to Agneeta a Jiong, preferably under a large rock or other support structure. These snakes are all quick to bite and can be deadly in a very short period of time. Common garter snake Thamnophis sirtalis sirtalis Conservation status. Wikisource has the text of the New International Encyclopedia article Garter-snake. This snake is surprisingly adaptable for a reptile, living in multiple regions, temperatures, and adapting to excess of water or lack thereof.
Tiny Pussys Shaved Cum Filled
Garter snake in addition to ribbon snake is a common name for the nearly harmless, small to medium-sized snakes belonging to the genus Thamnophis. Endemic to North Americaspecies in the genus Thamnophis can be found from the Agneeta plains of Canada to Central America. The common Laebee snake, Thamnophis sirtalisis the state reptile of Massachusetts.
Sex With Friends Mom
Indian Cobra Courtesy of Wikipedia user Kamalnv. The big four venomous snakes in Asia are the four snakes that are most common to kill.
Hong Kong Escort Girl
The young are independent upon birth. Garter snakes are one of the few serpents that give birth to live young. The dorsum of these snakes is often darker than those at low elevations.
Massive Mommy Tits Tube
Other Posts You Might Like: The earliest recorded observation in Virginia is 28 January and the latest is 9 December. Their diet consists of almost any creature they are capable of overpowering: Originally described as Coluber sirtalis by Carolus Linnaeus in , based on a specimen sent to him by Pehr Kalm from "Canada. For a long time, garter snakes were thought to be non-venomous.
Whose Husband Was Masturbating To Porn
This species would be a good candidate for long-term studies designed to obtain information on population dynamics and life history of viviparous snakes. Garter snakes are ovoviviparous , meaning they give birth to live young. Female garter snakes are able to store the male's sperm for years before fertilization. This storage of sperm can last for years. | s3://commoncrawl/crawl-data/CC-MAIN-2019-26/segments/1560627998288.34/warc/CC-MAIN-20190616162745-20190616184745-00285.warc.gz | CC-MAIN-2019-26 | 2,163 | 12 |
http://www.coderanch.com/t/613261/threads/java/synchronized-means | code | The last time I checked the actual byte code was different ...
The first had the byte code for entering the monitor, the second set the ACC_SYNCHRONIZED flag on the method, the effect may be the same but literally they are different, I wouldn't look at the byte code for that reason as it could confuse the issue. You could argue synchronized method is more efficient but I wouldn't get obsessed about it but if your intent is to synchronize the whole method I would definitely do that as its clearer.
Krishna Chhabra wrote:Not able to understand exactly that what does (this) means in below code
It's telling us which lock we're going to obtain. The only thing that the synchronized keyword does¹ is to obtain the lock for the indicated object, blocking at that point in its execution until the lock is released if some other thread currently hodls it. That's all. When we do synchronized (this) that just means we're obtaining the lock for the "current" object.
¹Actually that's all it does in terms of mutual exclusion. It also provides some memory barrier effects for consistency and predictability of the values of shared variables, but that part isn't pertinent to your question. | s3://commoncrawl/crawl-data/CC-MAIN-2015-48/segments/1448399455473.15/warc/CC-MAIN-20151124211055-00264-ip-10-71-132-137.ec2.internal.warc.gz | CC-MAIN-2015-48 | 1,187 | 5 |
https://www.dk.freelancer.com/projects/php/excel-based-reporting/ | code | I wanted to make excel based reporting system
30 freelancere byder i gennemsnit ₹1221 på dette job
I have good excel skills. MS office my favorite and I always use it heartlt. Relevant Skills and Experience My skills in excel best. I am using Ms office from 8 years.
Hello! I am very skilled designing reports templates in Excel. I can use easily table design functions as well as smart formulas and pivot tables. Let's please talk to further understand your project.
I have good exposure in Excel Based Reporting and has also accomplished projects based on Excel Sheet and I also timely accomplishment of project.
I am sincere and smart working professional. If I am provided with the opportunity to work with you, you and me can have huge gains with long term work. Thanks for considering me. | s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376826354.54/warc/CC-MAIN-20181214210553-20181214232553-00132.warc.gz | CC-MAIN-2018-51 | 797 | 6 |
https://ssgnet.com/microsoft-dynamics-sl-services/ | code | Microsoft Dynamics SL is an Enterprise Resource Planning (ERP) solution for project-focused small and medium-sized businesses. Microsoft Dynamics SL connects natively to Microsoft Office Project Server. This business application provides project, service, and distribution organizations with robust project management and project accounting functionality. The system's functionality includes:
Finance (A/P, A/R, G/L)
Supply chain management
Microsoft Dynamics SL's roots go back more than 35 years, when its co-founders formed TLB, Inc. in 1980. TLB, Inc. was later renamed Solomon Software, and then Microsoft Dynamics SL. Solomon was acquired by Great Plains Software in June 2000. Great Plains was subsequently acquired by Microsoft Corporation in May 2001.
Microsoft Dynamics SL Roadmap: Latest Updates and the Future of Dynamics SL
Dynamics SL is an ERP Solution designed to solve some of the most complex business problems organizations face today.
The latest Dynamic SL roadmap
Microsoft launched a new version of SL in 2018, a clear sign that they are committed to developing the product. The new roadmap includes several updates and enhancements that are designed to improve the business outcomes for all users of the solution.
What Are Options for Customers using Dynamics SL?
If you are currently using Dynamics SL, here are three alternatives moving forward:
1. Stay on Dynamics SL
If you stay on Dynamics SL, you will still receive updates and support from Microsoft. You can also continue leveraging the product before making a change (which may help you to conserve resources in the near-term.
2. Move to a Hosted Environment
If you desire to move to the cloud, Microsoft Azure is a good choice for hosting your Dynamics SL instance. You will have a user-friendly interface, and it can be integrated easily with Microsoft’s other services, such as Power BI.
3. Move to Dynamics 365 Business Central
This entirely cloud-based ERP platform is relatively new and is continually being improved upon. If you are looking for a new Dynamics product but are not sure if Dynamics 365 Business Central is right for you, we can set up a free trial so that you can try it out before making a decision.
No matter which path you choose, Microsoft will continue supporting and updating Dynamics SL. We can help you to stay informed regarding the latest roadmap and updates so you can decide what is best for your business.
For more information about how we support Microsoft Dynamics SL clients, please call (310) 539-4645 or click here to schedule a time to speak with one of our experienced consultants.
Cloud services are a key part of modern business strategy and Microsoft’s Bridge to the Cloud Promotion has been designed to enable companies using Microsoft’s on-premises business applications to take advantage of its cloud-based ERP solutions. This promotion enables you to keep your on-premises systems while leveraging the power of the cloud. This promotion is ideal for just about any organization currently using Microsoft Dynamics NAV, Dynamics GP, or Dynamics SL.
While most special offers come in the form of a discount, Microsoft has structured this one differently. By purchasing licenses for Dynamics 365 Business Central with an equal or greater value than your current Enhancement Plan, you can continue to run the system that you use on-premises at no additional cost. This means that you concurrently can run both Dynamics 365 Business Central in the cloud and your on-premises system.
This promotion is available to all Microsoft Dynamics 365 Business Central (on-premises), Dynamics NAV, Dynamics GP, or Dynamics SL customers with an active Enhancement Plan. You must apply for the offer before your Enhancement Plan’s renewal date.
The easiest way to take advantage of the Microsoft Bridge to the Cloud Promotion is through a trusted services provider like Strategic Systems Group. We will work with you to see if you qualify and take care of the application process for you. This will make it nice and easy for your business to get onto the cloud without risk to your on-premises system. For more information about Microsoft’s Bridge to the Cloud promotion and how our Microsoft Dynamics 365 Business Central services team can help you get it running smoothly in your business, please call (310) 539-4645 or click here to schedule a time to speak with one of our experienced consultants.
The recent updates to Microsoft Dynamics SL in 2023 bring several benefits to businesses enabling them to effectively manage their operations and finances. Here are three highlights from these updates:
Streamlined Project Management
The new project dashboard offers a comprehensive view of the status of each project, enabling project managers to make decisions supported by data and stay updated on the progress of their projects.
Enhanced resource management tools facilitate efficient resource allocation, ensuring that the right resources are assigned to the right projects thereby optimizing productivity and minimizing bottlenecks.
Improved project reporting capabilities allowing project managers to track project performance, identify processes for improvement, and ensure projects stay on time and on budget
Efficient Financial Management
The addition of a budgeting tool enables businesses to create and track budgets effectively, ensuring appropriate allocation of financial resources and control over expenditures.
Enhanced reporting capabilities enable businesses to gain insights into their financial stature, make smart decisions, and identify potential risks and opportunities.
Seamless integration with Microsoft Excel improves financial data management, simplifies data import and export, and enhances efficiency of financial operations.
Enhanced Mobile Accessibility and Collaboration
The introduction of a mobile app allows team members to access and maintain data in Dynamics SL using their mobile devices, enabling real-time updates and increasing productivity when away from the office.
Improved integration with Microsoft Teams enables collaboration by providing a platform for project teams to communicate, share documents, and effortlessly collaborate on projects thereby increasing efficiency and communication.
These mobile capabilities empower businesses to stay connected, collaborate effectively, and make informed decisions when team members are away from the office thereby improving overall agility and responsiveness.
The updates to Microsoft Dynamics SL in 2023 offer streamlined project management, efficient financial management, and enhanced mobile accessibility and collaboration, providing project-based businesses with tools they need to succeed in a dynamic business landscape.
Microsoft Dynamics SL Migration
While Microsoft has made great strides on its cloud-based ERP applications, Dynamics SL continued to be a solid platform for many small to mid-sized, project-focused businesses. When it is time to move away from Dynamics SL to a more modern business application, we assist clients in the software selection process. Primary concern: Given Microsoft's roadmap for the Dynamics SL product, which ERP product should I select to support my company's business in place of Dynamics SL? As with many things, it depends and we can help you make an informed decision. We've found that selling a replacement ERP system is the easy part. Choosing the right mix of components and integrating 3rd party applications is where we are of the most value to our clients. The implementation a new solution entails implementing the new system to facilitate the effective execution of your organization's business processes.
Systems integration brings together unrelated systems into one to deliver needed functionality minimizing wasted effort. This entails linking different software applications to act as a tightly integrated unit. Why is this so important? We perform systems integration for clients to increase value to the customer (quality, performance) while providing value to the company (reduced operational costs and improved on-time delivery). We help you achieve the objectives of making users of the Microsoft Dynamics SL system more productive and your organization profitable by integrating people, departments, systems, and processes for new competitive advantage.
Business Process Analysis
Business processes are simply collections sequential tasks which lead to the delivery of a service or product to a customer. Business processes can also be defined as sets of activities that accomplish a specific organizational goal. Clients often ask us why business process analysis is so vital. We use business process analysis to help you identify the weakest points in an operation and identify ways to minimize wasted effort in your company. We use "Fit/Gap" analysis to evaluate each how effectively Microsoft Dynamics SL enables the organization to achieve its business objectives. This process calls for identifying the business processes that fit with well the business system as well as gaps that need to be filled. In situations where there is a gap between the business process and the business system, we assist clients to re-engineer the business process or make customizations to the application to improve fit.
Financial and Operational Reporting
Microsoft Dynamics SL comes with an advanced many pre-defined reports all of which pull directly from the Dynamics SL database. With this native reporting functionality, we've helped our clients generate clear, concise operational reporting to augment the financial reports generated from the system. Management Reporter (formerly FRx) is the financial report writer that comes with Microsoft Dynamics SL. Unless there are pressing reasons to do otherwise, we suggest that our clients use Management Reporter for generating formatted financial reports from the Dynamics SL system. Using Management Reporter, we can help clients with the development of consolidated financial statements. We help clients integrate Microsoft Dynamics SL with Power BI to create a portal from which they can generate key financial and operational metrics. Visualization of these metrics over time enables executives to make timely, effective decisions.
Software Development and Customization
There are trade-offs to consider when developing software or customizing the Microsoft Dynamics SL application. On the one hand, it improves current fit between business processes and the system. On the other, it increases the cost and complexity of a future migration. We suggest that the extent of software development and customization be kept to a minimum to extend the useful life of the Dynamics SL application. This makes the cost of migrating Dynamics SL to another solution more manageable. In certain situations, we suggest developing a custom application external to, yet integrated with, the Dynamics SL system. This approach serves to provide your company with needed functionality without modifying the core software. We can help you to make an informed decision regarding software development, customization, and writing an external application.
After the Microsoft Dynamics SL system has been implemented, our clients often find technical support to be critical. Even if it's for nothing more than having someone to call when the unexpected happens. You have peace of mind knowing that there is a strike team on standby to take action if something catastrophic happens to your Dynamics SL system. | s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679511159.96/warc/CC-MAIN-20231211112008-20231211142008-00533.warc.gz | CC-MAIN-2023-50 | 11,514 | 46 |
https://www.freelists.org/post/haiku-development/GitHg-some-speed-tests,88 | code | On Sat, 07 May 2011 00:42:37 +0200, Ingo Weinhold <ingo_weinhold@xxxxxx> wrote:
I have real trouble following your argumentation. This whole part of the discussion is about the fact that the svn-style revision number built into an image identifies the central Haiku revision that the code from which the image is built derives from. I assumed that's what you were referring to by "this information", and in this case your statement three mails ago is wrong, which I pointed out.Rereading your paragraph, you might instead refer to "people can also spread altered builds". In this case: You're wrong. Of course the build system could also extract from svn whether there are local modifications and add a character or string indicating that to the version number. (BTW, information I'd find of very little use.)Rereading your mail, "this information" might alternatively refer to the previous paragraph's "a lot of information can be stored during the build". Mmh...
Yes, that's what I was referring to. I did write that mail in a hurry though, possibly hurting consistency.
As for the rest of the discussion, I was under the impression that you were opposed to any descriptors that were unlike SVN revision numbers that led me to repeat some arguments in trying to convince you. But I guess my impression was wrong. Sorry for the confusion.
Best regards, - Brecht | s3://commoncrawl/crawl-data/CC-MAIN-2021-17/segments/1618038069267.22/warc/CC-MAIN-20210412210312-20210413000312-00335.warc.gz | CC-MAIN-2021-17 | 1,362 | 5 |
https://www.itjobswatch.co.uk/jobs/leatherhead/python.do | code | The following table provides summary statistics for permanent job vacancies advertised in Leatherhead with a requirement for Python skills. Included is a benchmarking guide to the salaries offered in vacancies that have cited Python over the 6 months to 1 March 2021 with a comparison to the same period in the previous 2 years.
Python is in the Programming Languages category. The following table is for comparison with the above and provides summary statistics for all permanent job vacancies advertised in Leatherhead with a requirement for coding skills.
Permanent vacancies with a requirement for coding skills
As % of all permanent IT jobs advertised in Leatherhead
Number of salaries quoted
Median annual salary
Median salary % change year-on-year
Surrey median annual salary
% change year-on-year
Python Job Vacancy Trend in Leatherhead
Job postings citing Python as a proportion of all IT jobs advertised in Leatherhead.
Python Salary Trend in Leatherhead
3-month moving average salary quoted in jobs citing Python in Leatherhead.
Python Top 20 Co-occurring IT Skills in Leatherhead
For the 6 months to 1 March 2021, IT jobs citing Python also mentioned the following skills in order of popularity.
The figures indicate the absolute number co-occurrences and as a proportion of all permanent job ads across the Leatherhead region with a requirement for Python.
Python Co-occurring IT Skills in Leatherhead by Category
The follow tables expand on the table above by listing co-occurrences grouped by category.
The same job type, locality and period is covered with up to 20 co-occurrences shown in each of the following categories: | s3://commoncrawl/crawl-data/CC-MAIN-2021-10/segments/1614178362481.49/warc/CC-MAIN-20210301090526-20210301120526-00444.warc.gz | CC-MAIN-2021-10 | 1,639 | 19 |
https://rpgmaker.net/tutorials/2657/ | code | I am one of the main collaborators behind WOLF RPG Editor English 2.24Z
I created this tutorial based on a tutorial for RPG Maker.
It is my way of showing how WRPGE operates.
All links at the end of the tutorial are for informational and contact purposes.
So once again, not *spam* | s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590347425481.58/warc/CC-MAIN-20200602162157-20200602192157-00514.warc.gz | CC-MAIN-2020-24 | 281 | 5 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.