content
stringlengths
0
557k
url
stringlengths
16
1.78k
timestamp
timestamp[ms]
dump
stringlengths
9
15
segment
stringlengths
13
17
image_urls
stringlengths
2
55.5k
netloc
stringlengths
7
77
Imageio’s user API¶ These functions represent imageio’s main interface for the user. They provide a common API to read and write image data for a large variety of formats. All read and write functions accept keyword arguments, which are passed on to the format that does the actual work. To see what keyword arguments are supported by a specific format, use the help() function. Functions for reading: - imread()- read an image from the specified uri - mimread()- read a series of images from the specified uri - volread()- read a volume from the specified uri - mvolread()- read a series of volumes from the specified uri Functions for saving: - imwrite()- write an image to the specified uri - mimwrite()- write a series of images to the specified uri - volwrite()- write a volume to the specified uri - mvolwrite()- write a series of volumes to the specified uri More control: For a larger degree of control, imageio provides functions get_reader() and get_writer(). They respectively return an Reader and an Writer object, which can be used to read/write data and meta data in a more controlled manner. This also allows specific scientific formats to be exposed in a way that best suits that file-format. All read-functions return images as numpy arrays, and have a meta attribute; the meta-data dictionary can be accessed with im.meta. To make this work, imageio actually makes use of a subclass of np.ndarray. If needed, the image can be converted to a plain numpy array using np.asarray(im). Supported resource URI’s: All functions described here accept a URI to describe the resource to read from or write to. These can be a wide range of things. (Imageio takes care of handling the URI so that plugins can access the data in an easy way.) For reading and writing: - a normal filename, e.g. 'c:\foo\bar.png' - a file in a zipfile, e.g. 'c:\foo\bar.zip\eggs.png' - a file object with a read()/ write()method. For reading: - an http/ftp address, e.g. '' - the raw bytes of an image file get_reader("<video0>")to grab images from a (web) camera. imread("<screen>")to grab a screenshot (on Windows or OS X). imread("<clipboard>")to grab an image from the clipboard (on Windows). For writing one can also use '<bytes>' or imageio.RETURN_BYTES to make a write function return the bytes instead of writing to a file. Note that reading from HTTP and zipfiles works for many formats including png and jpeg, but may not work for all formats (some plugins “seek” the file object, which HTTP/zip streams do not support). In such a case one can download/extract the file first. For HTTP one can use something like imageio.imread(imageio.core.urlopen(url).read(), '.gif'). imageio. help(name=None)¶ Print the documentation of the format specified by name, or a list of supported formats if name is omitted. imageio. imread(uri, format=None, **kwargs)¶ Reads an image from the specified file. Returns a numpy array, which comes with a dict of meta data at its ‘meta’ attribute. Note that the image data is returned as-is, and may not always have a dtype of uint8 (and thus may differ from what e.g. PIL returns). imageio. mimread(uri, format=None, memtest="256MB", **kwargs)¶ Reads multiple images from the specified file. Returns a list of numpy arrays, each with a dict of meta data at its ‘meta’ attribute. imageio. volread(uri, format=None, **kwargs)¶ Reads a volume from the specified file. Returns a numpy array, which comes with a dict of meta data at its ‘meta’ attribute. imageio. mvolread(uri, format=None, memtest='1GB', **kwargs)¶ Reads multiple volumes from the specified file. Returns a list of numpy arrays, each with a dict of meta data at its ‘meta’ attribute. imageio. get_reader(uri, format=None, mode='?', **kwargs)¶ Returns a Readerobject which can be used to read data and meta data from the specified file. imageio. get_writer(uri, format=None, mode='?', **kwargs)¶ Returns a Writerobject which can be used to write data and meta data to the specified file. - class imageio.core.format. Reader(format, request)¶ The purpose of a reader object is to read data from an image resource, and should be obtained by calling get_reader(). A reader can be used as an iterator to read multiple images, and (if the format permits) only reads data from the file when new data is requested (i.e. streaming). A reader can also be used as a context manager so that it is automatically closed. Plugins implement Reader’s for different formats. Though rare, plugins may provide additional functionality (beyond what is provided by the base reader class). get_data(index, **kwargs)¶ Read image data from the file, using the image index. The returned image has a ‘meta’ attribute with the meta data. Raises IndexError if the index is out of range. Some formats may support additional keyword arguments. These are listed in the documentation of those formats. get_length()¶ Get the number of images in the file. (Note: you can also use len(reader_object).) - The result can be: - 0 for files that only have meta data - 1 for singleton images (e.g. in PNG, JPEG, etc.) - N for image series - inf for streams (series of unknown length) get_meta_data(index=None)¶ Read meta data from the file. using the image index. If the index is omitted or None, return the file’s (global) meta data. Note that get_dataalso provides the meta data for the returned image as an atrribute of that image. The meta data is a dict, which shape depends on the format. E.g. for JPEG, the dict maps group names to subdicts and each group is a dict with name-value pairs. The groups represent the different metadata formats (EXIF, XMP, etc.). get_next_data(**kwargs)¶ Read the next image from the series. Some formats may support additional keyword arguments. These are listed in the documentation of those formats. iter_data()¶ Iterate over all images in the series. (Note: you can also iterate over the reader object.) - class imageio.core.format. Writer(format, request)¶ The purpose of a writer object is to write data to an image resource, and should be obtained by calling get_writer(). A writer will (if the format permits) write data to the file as soon as new data is provided (i.e. streaming). A writer can also be used as a context manager so that it is automatically closed. Plugins implement Writer’s for different formats. Though rare, plugins may provide additional functionality (beyond what is provided by the base writer class). append_data(im, meta={})¶ Append an image (and meta data) to the file. The final meta data that is used consists of the meta data on the given image (if applicable), updated with the given meta data. set_meta_data(meta)¶ Sets the file’s (global) meta data. The meta data is a dict which shape depends on the format. E.g. for JPEG the dict maps group names to subdicts, and each group is a dict with name-value pairs. The groups represents the different metadata formats (EXIF, XMP, etc.). Note that some meta formats may not be supported for writing, and individual fields may be ignored without warning if they are invalid.
https://imageio.readthedocs.io/en/latest/userapi.html
2020-01-17T17:23:47
CC-MAIN-2020-05
1579250589861.0
[]
imageio.readthedocs.io
Extended Deployment is a Suite of 3 Application Infrastructure products that can be bought separately or as a package:
https://docs.bmc.com/docs/display/Configipedia/IBM+WebSphere+Extended+Deployment
2020-01-17T17:52:50
CC-MAIN-2020-05
1579250589861.0
[]
docs.bmc.com
Authorization Linking ALPHA Description # By default, Cronofy implicitly links calendar accounts that authorize using the same browser. The mechanism used is a persistent cookie. This feature allows the calling application request that the calendar account authorized to be explicitly linked to a pre-existing Cronofy account. This enables combining authorizations across different devices. The mechanism used is the generation of a temporary link_token which is passed to the authorization page to identify the account to be linked to. This is an experimental feature and is enabled on a per application basis. Contact [email protected] if you would like access to this. Generating a Link Token # Using the access_token for the pre-existing account you wish to link, POST to the /v1/link_tokens end point. The response will contain the link_token. Example Request # POST /v1/link_tokens HTTP/1.1 HOST: api.cronofy.com Content-Type: application/json; charset=utf-8 Authorization: Bearer {ACCESS_TOKEN} Example Response # HTTP/1.1 200 OK Content-Type: application/json; charset=utf-8 { "link_token" : "{LINK_TOKEN}" } Requesting a Linked Authorization # The link_token is then passed as an additional query string parameter to the authorization request URL, eg: ?response_type=code &client_id={CLIENT_ID} &redirect_uri={REDIRECT_URI} &scope={SCOPE} &state={STATE} &link_token={LINK_TOKEN} See Request Authorization
https://docs.cronofy.com/developers/api-alpha/explicit-linking/
2020-01-17T16:49:26
CC-MAIN-2020-05
1579250589861.0
[]
docs.cronofy.com
An individual page in a document. Provides access to a dictionary of additional actions to be performed when the page is opened or closed. Indicates the tab order that shall be used for annotations on the page. Provides access to the collection of annotation dictionaries that contain indirect references to all annotations associated with the page. Specifies the art box defining the boundaries of the meaningful content (including potential white space) on a page as intended by the page's creator. Provides access to the collection of indirect references to all article beads appearing on the page. Specifies the bleed box defining the region to which the contents of the page shall be clipped when output in a production environment. Gets the PDF page commands. Specifies the crop box imposing the page boundaries displayed in a PDF Viewer. Indicates the display duration of a page (also called its advance timing): the maximum length of time, in seconds, that the page shall be displayed during presentations before the viewer application shall automatically advance to the next page. Indicates the digital identifier of the page's parent Web Capture content set. Specifies the date and time when the page's contents were most recently modified. Specifies the media box defining the boundaries of the physical medium on which the page is to be printed. Provides access to a metadata stream that contains metadata for the page. Provides access to a page-piece dictionary associated with the page. Specifies the page's preferred zoom factor, i.e. the factor by which it shall be scaled to achieve the natural display magnification. Rotates the document page at the specified angle. Indicates the key of the page's entry in the structural parent tree. Provides access to a stream object that defines the page's thumbnail image. Provides access to a transition dictionary describing the transition effect that shall be used when displaying the page during presentations. Specifies the group attributes dictionary that specifies the attributes of the page's page group for use in the transparent imaging model. Specifies the trim box defining the intended dimensions of the finished page after trimming. Indicates the size of default user space units, in multiples of 1⁄72 inch.
https://docs.devexpress.com/OfficeFileAPI/DevExpress.Pdf.PdfPage._properties
2020-01-17T15:23:28
CC-MAIN-2020-05
1579250589861.0
[]
docs.devexpress.com
Introduction Elasticsearch is an open-source, RESTful, distributed search and analytics engine built on Apache Lucene. Elasticsearch has quickly become the most popular search engine, and is commonly used for log analytics, full-text search, security intelligence, business analytics, and operational intelligence use cases.. The speed and scalability of Elasticsearch and its ability to index many types of content mean that it can be used for various purposes: - Application search - Website search - Enterprise search - Logging and log analytics - Infrastructure metrics and container monitoring - Application performance monitoring - Geospatial data analysis and visualization - Security analytics - Business analytics Due to the high availability and efficient indexing features, the Elasticsearch cluster is very popular in large, mission-critical IT infrastructures, which require ready and reliable services at all times. In such environments, the non-availability of the cluster or any of its core components, rapid erosion of storage space provided by the storage system, and inconsistencies in I/O load-balancing across disks/LUNs/Aggregate/Volumes can result in short/prolonged delays in the delivery of storage services, which will ultimately slowdown the dependent end-user services. To avoid this, it is imperative to watch out for issues in the operations and usage of the cluster on a regular basis. topic details how eG Enterprise monitors the RabbitMQ cluster and what metrics it reports.
https://docs.eginnovations.com/Elasticsearch/Introduction_to_Elasticsearch_Monitoring.htm
2020-01-17T16:48:06
CC-MAIN-2020-05
1579250589861.0
[array(['../Resources/Images/start-free-trial.jpg', None], dtype=object)]
docs.eginnovations.com
Investment The energy sector is a big contributor to the UK economy and invest in low carbon technologies to optimise the system. Investment in the energy sector is a necessity to continue the progression towards a low carbon economy. Investment into more efficient and low carbon generation will not only improve the UK’s energy security, but provide health benefits with cleaner air and a more diverse generation mix. The National Infrastructure and Construction (NIC) pipeline illustrates planned investment throughout both the private and public sectors. In 2017 our Energy in the UK report shows an increase in the number of projects within the energy sector up to 108 projects from 96 in 2016. Some key Watch our video or read our latest report.
https://docs.energy-uk.org.uk/energy-industry/investment.html
2020-01-17T16:21:05
CC-MAIN-2020-05
1579250589861.0
[]
docs.energy-uk.org.uk
$ sudo yum install -y postgresql postgresql-server postgresql-devel Ruby on Rails is a popular web framework written in Ruby. This guide covers using Rails 4 on OpenShift Container Platform. For this guide you will need: Basic Ruby/Rails knowledge Locally installed version of Ruby 2.0.0+, Rubygems, Bundler Basic Git knowledge Running instance of OpenShift Container Platform v3 using your email address and password. the config/database.yml is using the postgresql adapter. Make sure you updated default section in the config/database.yml file, so it looks like this: default: &default adapter: postgresql encoding: unicode pool: 5 host: localhost username: rails password: Create your application’s development and test databases by using this rake command: $ rake db:create This will create development and test database in your PostgreSQL server. controller index action $ oc new-project rails-app --description="My Rails application" --display-name="Rails Application" After creating the we wire with the database service Creating a route for your application. To bring your application to OpenShift Container Platform, you need to specify a repository in which your application lives, using once again the oc new-app command, in which you will need to specify database related environment variables we setup in the image, builds your application image, and deploys the newly created image together with the specified environment variables. The application is named rails-app. You can verify the environment variables have been added by viewing the JSON document of the rails-app DeploymentConfig: $ oc get dc rails-app -o json You should see the following section: env": [ { "name": "POSTGRESQL_USER", "value": "username" }, { "name": "POSTGRESQL_PASSWORD", "value": "password" }, { "name": "POSTGRESQL_DATABASE", "value": "db_name" }, { "name": "DATABASE_SERVICE_NAME", "value": "postgresql" } ], To check the build process: $ oc logs -f build rails-app-1 Once the build is complete, you can look at the running pods in OpenShift Container Platform. $ oc get pods You should see a line starting with myapp-<number>-<hash>, and that is your application running in OpenShift Container Platform. Before your application will be functional, you need to initialize the database by running the database migration script. There are two ways you can do this: Manually from the running frontend container: $. To expose a service by giving it an externally-reachable hostname like use OpenShift Container Platform route. In your case you need to expose the frontend service by typing: $ oc expose service rails-app --hostname=
https://docs.openshift.com/container-platform/3.6/dev_guide/dev_tutorials/ruby_on_rails.html
2020-01-17T15:43:57
CC-MAIN-2020-05
1579250589861.0
[]
docs.openshift.com
AutoSync Does Not Work in Grid When Using Server Grouping Environment Description I have the autoSync option set to true in the Grid. If I enable server-side grouping and group the Grid by a column, the auto-sync functionality stops working. Steps to Reproduce - Create a Grid with the editable: trueand groupable: truesettings. - In the DataSource of the Grid, set autoSync: trueand serverGrouping: true. - Group the Grid by columns. - Try to change a cell value in the Grid. The Grid does not sync the changed value with the server. The auto-sync starts working if you ungroup the Grid. Cause This behavior is a limitation in the Grid. The default "incell" editing mode combined with the autoSync: true DataSource setting is not supported when you use server-side grouping in the Grid. Suggested Workarounds You can either: Disabling Server Operations In the dataSource configuration of the Grid, set serverGrouping: false. For the Kendo UI Grid for ASP.NET MVC, set ServerOperations(false) in the DataSource configuration. This approach might decrease client-side performance especially when the Grid handles large amounts of data. Saving Values Manually When the Grid is grouped, manually call the saveChanges() method of the Grid in the cellClose event. This approach guarantees that the changes which are made in the cell before it was closed will be sent to the server. function onCellClose(e) { var grid = e.sender; if (grid.dataSource.group().length > 0) { grid.saveChanges(); } }
https://docs.telerik.com/kendo-ui/knowledge-base/grid-no-autosync-when-server-grouping
2020-01-17T17:16:34
CC-MAIN-2020-05
1579250589861.0
[]
docs.telerik.com
Properties Property Description Result Text Gets or sets the text associated with the drop down button control Image Gets or sets the image that is displayed on the button control TextAlignment Gets or sets the alignment of the text on the button control TextImageRelation Gets or sets the position of text and image relative to each other AllowShowFocusCues Indicates focus cues display, when available, based on the corresponding control type and the current UI state DisplayStyle Specifies the options for display of image and text primitives in the control DropDownDirection Gets or sets a value indicating the direction in which the dropdown item emerges from its parent container ShowArrow Gets or sets a value indicating whether the arrow is shown Items Gets or set the RadItemOwnerCollection that stores the drop down items Methods Method Description ShowDropDown Shows the pop up with items HideDropDown Hides the pop up with items Events Event Description DropDownOpening Occurs when the drop-down window is about to open DropDownOpened Occurs when the drop down is opened DropDownClosed Occurs when the drop down is closed See Also Properties Methods Events
https://docs.telerik.com/devtools/winforms/buttons/dropdownbutton/properties-methods-events
2018-03-17T10:47:50
CC-MAIN-2018-13
1521257644877.27
[]
docs.telerik.com
WebClient.OpenWriteAsync Method (Uri, String, Object) [ This article is for Windows Phone 8 developers. If you’re developing for Windows 10, see the latest documentation. ] Opens a stream for writing data to the specified resource, using the specified method. This method does not block the calling thread. Namespace: System.Net Assembly: System.Net (in System.Net.dll) Syntax Public Sub OpenWriteAsync ( _ address As Uri, _ method As String, _ userToken As Object _ ) public void OpenWriteAsync( Uri address, string method, Object userToken ) Parameters - address Type: System..::.Uri The URI of the resource to receive the data. - method Type: System..::.String The method used to send the data to the resource. If null, the default is POST for HTTP. - userToken Type: System..::.Object A user-defined object that is passed to the method invoked when the asynchronous operation completes Exceptions Remarks. Windows Phone OS Supported in: 8.1, 8.0, 7.1, 7.0 Platforms Windows Phone
https://docs.microsoft.com/en-us/previous-versions/windows/apps/ms144219(v=vs.105)
2018-03-17T10:22:23
CC-MAIN-2018-13
1521257644877.27
[]
docs.microsoft.com
Select a Machine Key Decryption Method (IIS 7) Applies To: Windows 7, Windows Server 2008, Windows Server 2008 R2, Windows Vista Select a machine key decryption method to provide added security for the machine key you create. The default decryption method, Auto, works with whichever encryption method is specified. The following decryption methods are available: Auto, the default, works with whichever encryption method that you specified. Advanced Encryption Standard (AES) is relatively easy to implement and requires little memory. AES has a key size of 128, 192, or 256 bits. This method uses the same private key to encrypt and decrypt data, whereas a public-key method must use a pair of keys. Triple Data Encryption Standard (TripleDES) is a minor variation of (DES). It is three times slower than regular DES but can be more secure because it has a key size of 192 bits. If performance is not your primary consideration, consider using TripleDES. Data Encryption Standard (DES) uses a 56-bit key to both encrypt and decrypt data. If your server, site, or application does not require the strongest security, consider using DES. Prerequisites For information about the levels at which you can perform this procedure, and the modules, handlers, and permissions that are required to perform this procedure, see Machine Keys Feature Requirements (IIS 7). Exceptions to feature requirements - None To select a machine key decryption method a decryption method from the Decryption method drop-down list. The default decryption method is Auto. In the Actions pane, click Apply. Command-line To select a machine key decryption method, use the following syntax: appcmd set config /commit:WEBROOT /section:machineKey /decryption:Auto|AES|TripleDES|DES The variable decryption is the decryption method that is used by the application services. The default value is Auto. For example, to set the decryption method to AES, type the following at the command prompt, and then press Enter: appcmd set config /commit:WEBROOT /section:machineKey /decryption:AES5 Note When you use Appcmd.exe to configure the <machineKey>: - <machineKey> element, defined in Machine.config file. For more information about IIS 7 configuration, see IIS 7.0: IIS Settings Schema on MSDN. WMI Machine Keys in IIS 7
https://docs.microsoft.com/en-us/previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/cc754704(v=ws.10)
2018-03-17T11:08:17
CC-MAIN-2018-13
1521257644877.27
[]
docs.microsoft.com
OEInvertSurface¶ bool OEInvertSurface(OESurface &surf) Reverses all the triangle orderings and normal vectors in the surface. This essentially turns the surface inside-out because all the normals facing out are turned in and vice versa. Hint Water pockets inside of protein structures have their normals facing into the protein. This can be used to make the disconnected surface a surface enclosing the occluded water.
https://docs.eyesopen.com/toolkits/java/spicolitk/OESpicoliFunctions/OEInvertSurface.html
2021-07-24T04:34:42
CC-MAIN-2021-31
1627046150129.50
[]
docs.eyesopen.com
Create a WebSub/WebHook API¶ Overview¶ A WebSub API, also known as a WebHook API, is a streaming API in WSO2 API Manager that is implemented based on the WebSub protocol specification. WebSubs only allows one-way communication, from a caller web app to a callee web app. After the API is created, it will provide you a call back URL, which you can register to any WebHook provider. Therefore, the user-facing API from API Manager will adhere to WebSub specification whereas the backend can be anything that could send events to this callback URL. You can create a WebSub API from scratch in WSO2 API-M and export the WebSub APIs that are created within WSO2 API-M as AsyncAPI definitions. Alternatively, you can also import existing AsyncAPI definitions to create SSE APIs in WSO2 API-M. This section will guide you through the process of creating a WebSub API from scratch in WSO2 API-M. After a WebSub API is created, you will be able to register it's URL as the callback URL for your WebHook provider and be able to receive events from them. How it works¶ The client who intends to receive the events from the server, web app or publisher has to register its URL against the interesting events in the publisher. When an event occurs, if a client is registered for that event, the publisher will make an HTTP POST request to the registered URL of the client to notify the event. Example usage¶ For example, you can use WebSub APIs to get notifications as soon as a new message is received in a specific Slack channel. WebSub APIs can also be used to get notifications when a new commit is added or a new issue is created on a GitHub repository. Likewise, WebSub APIs are used to send notifications to an already registered web URL with regard to the changes that happen in the WebHook provider (e.g., GitHub, PageDuty, Slack, SendGrid, etc.) Basic flow¶ Follow the instructions below to create a WebHook API using the basic flow:. Step 2 - Configure the Topics¶ Topics of a WebSub/Webhook API are always Subscribe only. By default, a WebSub/Webhook API will have a topic with the name _default. Click Topics under API Configurations to navigate to the Topics page. Modify the topics as follows and click Save to update them. Optionally, click delete, as shown below, to delete an existing topic. Select sub under Types, enter the Topic Name, and click + as shown below, to add a new topic. The newly added topic is displayed as follows. Expand the created topic to view its Callback URL. You can use this when registering the topic with a WebHook provider (WebSub Provider). Step 3 - View the AsyncAPI Definition¶ Click AsyncAPI Definition under API Configurations. The AsyncAPI definition of the streaming API, which you just created, appears. Step 4 - Configure the Runtime Configurations¶ Click Runtime under API Configurations. The Transport Level Security defines the transport protocol on which the API is exposed. If you wish to limit the API availability to only one transport (e.g., HTTPS), uncheck the appropriate checkbox under Transport Level Security. Both HTTP and HTTPS transports are selected by default. Step 5 - Generate a Secret¶ When required by a WebHook provider (e.g., GitHub), the secret generated by the WebSub/WebHook API can be used to register the WebSub/WebHook API with the WebHook provider. This is used by the WebHook provider to sign the payload when sending events back to the WebSub/WebHook API. Click Topics under API Configurations to navigate to the Topics page, and expand the Subscription Configuration section. Click Enable to enable subscription configurations. Select SHA1 as the Signing Algorithm. Click Generate, which will generate a secret. Click Save. The generated secret can be used when registering the topic with a WebHook provider. Now, you have successfully created and configured a Streaming API. Next, let's Publish your API. End-to-end tutorial¶ Learn more by trying out an end-to-end tutorial on Creating and Publishing a WebSub API, which uses the default Streaming Provider that works with WSO2 API Manager, namely the WSO2 Streaming Integrator. See Also¶ Learn more on the concepts that you need to know when creating a Streaming API: Learn how to test a Streaming API. For an example, see Test a WebSub/WebHook API. Learn how to expose a stream as a managed API. Learn how you can use a third-party Streaming Provider.
https://apim.docs.wso2.com/en/latest/use-cases/streaming-usecase/create-streaming-api/create-a-websub-streaming-api/
2021-07-24T04:30:31
CC-MAIN-2021-31
1627046150129.50
[]
apim.docs.wso2.com
The editorial workflow for preprints is simple compared to the editorial workflow for journal articles. When a preprint is submitted it is immediately in the Production stage and Production is the only stage in the workflow. An activity log, similar to what is in place in OJS, indicates all of the activity that has taken place on the submission. Generally, the author has more control over the process than they would when submitting to a journal. Authors can self-post immediately upon submission, or a screening process can be used, depending on the server’s screening policy. Additionally, unlike journals, preprints are not organized into issues. A typical workflow could be the following, with variations depending on the preprint server’s policies (see above): This chapter explains the steps in the editorial workflow for Authors, Moderators, and Preprint Server Managers. All active and archived (published or declined) submissions for the preprint server will appear in the Submissions dashboard. Which submissions are visible will depend on the role of the logged in user. See Learning OJS 3 for further information about the Submissions dashboard and tasks. The editorial workflow in OPS starts when an author submits a new manuscript. How an author can make a submission is explained in Learning OJS 3. It is the same in OJS and OPS except that when the author makes a submission of a new preprint, they can choose a Category to submit to instead of a Section. Depending on your preprint server policies, the preprint will be published immediately after submission or it will be screened by a Moderator. It is also possible to have moderation done by the research community after a preprint is posted and made public. The next section explains the pre-publication moderation process. The Preprint Server Manager will receive a notification that a new submission was received and can assign a Moderator to the submission. Or in the Server Settings, they can assign a Moderator to a Category or Section, which means that any new submissions to that category or section will automatically be assigned to the moderator. If your server chooses to assign moderators to screen submissions before they are posted, you can manage, assign, and notify participants for a submission as necessary using the ‘Participants’ list. Selecting the arrow next to a user’s name shows the list of options, which include ‘Remove’, ‘Edit’, ‘Notify’ (this option will create a new Discussion), and ‘Login As’. It’s possible to add a new participant to the submission by selecting the ‘Assign’ button. When assigning a moderator it’s possible to allow for them to view and edit submission metadata (this option is selected by default) and/or to only recommend an editorial decision, in which case a Server Manager or another Moderator needs to record the decision to either post or decline the submission. If the Moderator wants to ask the author a question or have a discussion with the author, another moderator, the Preprint Server Manager, or another participant in the submission, they can Add a Discussion in the Production Discussions. How to create a response to a discussion is explained in Learning OJS 3. There are two possible editorial decisions, which are ‘Decline Submission’ or ‘Schedule for Publication’. Selecting ‘Decline Submission” will open a pop-up with the option to notify the author(s) or not, and selecting ‘Schedule for Publication’ will move the user to the Publication tab. The Publication tab can be accessed at any time, not just when ‘Schedule for Publication’ is selected. This tab contains the submission’s metadata and galleys. A Galley is a final publication-ready file that has been prepared for readers and will be posted on the preprint site. It’s important to note that the metadata and galley files for review and publication can be freely edited by both the author(s) and editorial team prior to posting. Any publication files submitted by the author will be visible under the Galleys tab. Data sets and other supplementary files can be uploaded and published in any format in the Galleys tab, and it’s also possible to set the file label and language. For more information on the tabs and options available, please refer to the Publication tabs section of the Learning OJS guide. For information about managing and posting metadata in multiple languages, see Multilingual Submissions in Learning OJS 3. The preprint status (indicating whether it has been submitted to or published in a journal) can be altered in the dropdown menu that becomes available by selecting the ‘Relations’ button. For more information on preprint status, please refer to the Preprint Status section in this guide. In order to post the preprint, it’s necessary to select the ‘Schedule for Publication” button which opens a pop-up asking the user to confirm that they would like to move forward with the posting of the preprint. This will immediately release the preprint to public view. Once the preprint is published, the options to ‘Unpublish’ or ‘Create New Version’ become available. By unpublishing, it’s possible to edit the current version of the preprint without creating a new version, as published preprints can’t be edited while public. Adding a new version will keep the current version as is and create a new record. For more information on versioning, please refer to the Publish New Versions section of this guide below. There are three possible relational statuses for a published preprint. Only the bottom two relational status will appear on the abstract page if selected. Submission statuses can be updated even after a Preprint has been posted. Additionally, once the preprint has had its Version of Record (VoR) published in a journal, the DOI assigned to the published preprint can be added by going to the “Relations” button and selecting the last option, that will show a text box in which the user should add the VoR’s DOI link. Once a DOI has been entered, it will appear publicly on the Preprint abstract page. Versioning is an important feature of preprint servers because it allows researchers to correct, expand, and improve their articles over time. Since preprints can change significantly between versions, it is important to post and clearly identify all versions of a preprint. OPS allows you to post different versions of an article and display all of the versions on the posted article page. By default, only Server Managers can create new versions of a posted preprint. The ‘Create New Version’ button is available next to the ‘Unpublish’ button: Clicking ‘Create New Version’ will open a pop-up asking if you are sure you’d like to create a new version. It’s important to note that, once a new version is created, it’s not possible to delete it; OPS allows the user to unpublish a version and create new ones, but not to delete an existing record. Note that an unpublished version of a preprint is only visible to the Server Managers and Authors. Only once a new version is created by the Server Manager the author is allowed to edit it and add/edit metadata and galleys when they have permission to do so (for more information on this, please refer to the “Granting Author permissions” section of this guide). Please keep in mind that metadata that accurately and unambiguously describes the relationships between different versions should be maintained as it’s useful for helping indexing servers and reference managers deduplicate records and point readers to new versions when available. The Server Manager can view all past and current versions of a preprint in the ‘All Versions’ button, which becomes available next to the ‘Relations’ button and the preprint Status. The current version is displayed in gray and the other versions are in blue. For more information on versioning and editing a posted preprint, check the Versioning of Articles section of the Learning OJS guide. It is currently not possible to withdraw a posted preprint. There are ongoing discussions to integrate an option for this for future release. In this case, it’s recommended that the Preprint Manager replace the existing PDF with a “placeholder” PDF indicating that it has been withdrawn and the reason. In the future, it should be possible for authors to submit their posted preprints for publication in a journal via OPS, using the SWORD protocol.
https://docs.pkp.sfu.ca/learning-ops/3.2/editorial-workflow.html
2021-07-24T04:32:36
CC-MAIN-2021-31
1627046150129.50
[]
docs.pkp.sfu.ca
You can at any time contact us at [email protected] or chat privately on our Discord server or use our forum section Not able to open web interface¶ - Make sure you use latest raspberry image. Older version might be incompatible. - You can type journalctl -u UAVcast-Web.service --since yesterdayin the rpi console to get more debug information. Where can i download latest version?¶ - See the installation instructions Cannot activate UAVcast-Pro license¶ - Make sure you have proper internet connection for your RPI. During the validation, RPI needs to contact uavmatrix.com license server for validation. Installation validation fails.¶ - Make sure you use a supported raspberry image as decribed in the installation instructions. - For other installation issues, please navigate to UAVcast-Pro/installfolder and copy the Installation.logto your computer. Create a new discussion in our forum discuss.uavmatrix.com and attach the file. Im not able to receive video or telemetry¶ - Make sure you have added video and telemetry port to your firewall rules. - Verify that you have proper connection with your flight controller. You can run the connection test from the Flight Controller page. - If you have changed the default ports for video 5600 or telemetry 14550 you need to change this on your ground control station device as well. No Mavlink Heartbeats received in UAVcast-Pro¶ - Make sure the configuration in UAVcast-Pro Flight Controller page reflects the settings in the Flight Controller. You can see the FC setttings using Mission Planner => All parameters list => search for Serial0 (USB) or Serial1 (Telem1 port) or Serial2 (Telem2) - Make sure you are using a good USB cable with large cross-sectional area to minimize the voltage drop supplied to Fligth Controller. - If you are connected by GPIO pins, make sure you have connected the ground, rx, tx wires correctly. - Make sure you use default configuration in Flight Controller (Ardupilot, Px4) for UART / Telemetry ports. Cant receive video, but telemetry works¶ - [PiCam] Please make sure you have enabled PiCam in the Raspberry config raspi-config - [Logitech cams] Check logfiles and see if there is any errors. If you see Internal data stream error its most likey a unsupported resoultion or fps. Try play with those settings. Other Application issues.¶ If you experience any issues with UAVcast running on your Raspberry, please Navigate to the UAVcast page and press "Download Logfiles" button. This will download a zip file containing all logs related to UAVcast and its running components. Log content will only contain application data and not user data. Create a new discussion in our forum discuss.uavmatrix.com and attach the zip file, or mail it to our support department [email protected]
https://docs.uavmatrix.com/troubleshooting/
2021-07-24T04:26:24
CC-MAIN-2021-31
1627046150129.50
[array(['../images/install-logfile.jpg', 'logfiles'], dtype=object)]
docs.uavmatrix.com
# How to Use Advanced Cash On the Buy Crypto popup window in the I spend field enter the amount and select the type of currency that you want to spend. cryptocurrency). # Credit or Debit Card payment method Enter your bank card information. Note: AdvCash payment system may request a photo of your ID and/or other documents to verify the payment. Click Pay. Follow the instructions on the screen to confirm the payment by entering a code sent from your bank to your mobile phone. The instructions may differ depending on the card type and the issuer bank (for example, you can get a MasterCard 3D Secure alert). Click Continue to complete the payment. If you have previously logged in verified AdvCash account in this browser, the system will transfer the specified amount from your card to AdvCash wallet and then automatically transfer the funds to your Waves.Exchange account. If you have not previously logged in your AdvCash account in this browser, the system will ask you to log in your AdvCash account and confirm the payment. If you don't have AdvCash account, proceed with the registration and verification steps below. # AdvCash Wallet payment method > If you have AdvCash account: Login to your AdvCash account. Click Continue to complete the payment. If you have enough funds on you AdvCash wallet, the system will automatically transfer the specified amount of cryptocurrency from your AdvCash account to your Waves.Exchange account. If you don't have enough funds on your AdvCash wallet, top up the wallet and try again. Note: The AdvCash payment system may request payment confirmation by sending pincode to your registered email address. > If you don't have AdvCash account: Click Forgot password?. Click Register. Enter your First name, Last name, Email and a secure password. To complete your AdvCash registration, drag the slider to the right and click Register. The system will then prompt you to start the verification. Click Get Access to proceed to verification. To verify your account you will need to upload scans or photos of your documents and enter the code you receive to your mobile phone. Full account verification unlocks all features of your wallet. Verify your identity. To confirm your identity, please fill in the Identity Verification form and upload photo of your Passport or Driving license or National ID card. Verify your address. To confirm your address, please fill in the Address Verification form and upload photo of the document that contains your registered address your full name. Verify your mobile phone number. To confirm your number, please enter it in the Mobile Phone Verification form and click Send Code. Then enter the received numeric code in the verification field. It usually takes no more than 2 hours for the KYC service to check the documents. In many cases, it takes just a few minutes. Once the check is completed, you'll get an SMS and an email. Sometimes documents get refused: for instance, if an edge is cropped or if the picture isn't clearly visible etc. In this case, you will have to take another photo or scan and upload it again. Once you are verified, the system will prompt you to complete the purchase. If this doesn't happen (for instance, if it took you very long time to complete verification), go back to Waves.Exchange and submit the purchase request again. Once the transaction is confirmed, make sure to check your email. Sometimes the AdvCash security department insists on an additional verification of the bank card itself. In this case you'll get an email with a link. Follow the link in the email to open the card verification page. You can also access it by clicking on the transaction in the section 'Account' → 'Transaction History'. For card verification AdvCash requires a picture of you holding your passport and the bank card. In most cases card verification takes several minutes. Once the checks are complete, you'll get an email and a text message. If the documents are rejected (for example, the card number isn't clearly visible), take new photos and resubmit your verification form. As soon as the card is verified, the status of the transaction in AdvCash will change to 'Processed', and a new transaction will appear on the list (the transfer from your AdvCash wallet to your Waves.Exchange wallet). Each bank card needs to be verified only once. In the future, whenever you buy cryptocurrency using the same account and card, you can expect seamless transaction without additional verification. If you have difficulties with Waves.Exchange, please create a support (opens new window) ticket or write a question (opens new window) on our forum.
https://docs.waves.exchange/en/waves-exchange/waves-exchange-online-desktop/online-desktop-advcash
2021-07-24T04:26:05
CC-MAIN-2021-31
1627046150129.50
[array(['/assets/img/advcash-00.11c70b03.png', None], dtype=object)]
docs.waves.exchange
Mobile Verification Toolkit Mobile Verification Toolkit (MVT) is a tool to facilitate the consensual forensic analysis of Android and iOS devices, for the purpose of identifying traces of compromise. In this documentation you will find instructions on how to install and run the mvt-ios and mvt-android commands, and guidance on how to interpret the extracted results.
https://mvt-docs.readthedocs.io/en/latest/index.html
2021-07-24T03:26:13
CC-MAIN-2021-31
1627046150129.50
[array(['./mvt.png', None], dtype=object)]
mvt-docs.readthedocs.io
Learning Windows Internals Coming straight out of the UNIX-dominated academic world, I realized that I have negligible knowledge of the Windows system architecture and kernel. Systems courses taught in most schools only use the UNIX-platform. So I have no idea what the windows message pump is, or how the kernel manages processes and threads or why they put the entire graphics subsystem into the kernel. Besides architectural questions, I am curious to know how to open a socket, create a thread and use synchronization primitives. After visiting Borders a couple of times and reading reviews on the web, I finally decided to get two interesting books: - Microsoft Windows Internals (4th edition) by Mark E. Russinovich, David A. Solomon - Windows System Programming (3rd edition) by Johnson M. Hart These books make an interesting combination for anyone interested in studying Windows concepts as well as the API from an OS point of view.
https://docs.microsoft.com/en-us/archive/blogs/rushidesai/learning-windows-internals
2021-07-24T05:43:12
CC-MAIN-2021-31
1627046150129.50
[]
docs.microsoft.com
Vpn UAVcast currently supports Zerotier and OpenVPN without the need for any additional software running on the Raspberry Pi. VPN page Overview Zerotier¶ Zerotier establishes a direct connection between the connected devices, even if they are behind a NAT. Note Depending on your cellular providers NAT policy - if you are having issues with video streaming over UDP, try using a TCP for your connections or try OpenVPN. OpenVPN¶ OpenVPN connects devices togheter using server in-the-middle principle. Many cloud services has prebuildt servers with openvpn for easy startup. When you have started your vpn access server, login and add a user / client. For the user you want to asign to UAVcast, make sure you have ticked the auto-login box. Now, login with your newly created user Download the (Yourself- Autologin profile) Drag this file into UAVcast-Pro => vpn page and hit connect. For more information about setting up OpenVPN, please see the Open VPN Wiki.
https://docs.uavmatrix.com/pages/Vpn/
2021-07-24T05:23:11
CC-MAIN-2021-31
1627046150129.50
[array(['/images/pages/vpn/overview.jpg', "'VPN'"], dtype=object) array(['/images/pages/vpn/auto-login-openvpn.jpg', "'Autologin'"], dtype=object) array(['/images/pages/vpn/download-openvpn.jpg', "'Autologin'"], dtype=object) ]
docs.uavmatrix.com
Build from source¶ It’s generally recommended to install a package if available. This section is about building the binary from git. Install dependencies¶ You need a recent rust compiler. It’s usually recommended to install a rust compiler with rustup, but if you’re system ships the most recent compiler in a package that works too. Note that some systems aren’t fully supported by rustup (like OpenBSD and alpine) and you need to install rust from a package in that case. Debian/Ubuntu/Kali¶ $ apt install build-essential libsqlite3-dev libseccomp-dev libsodium-dev publicsuffix pkg-config Warning On a debian based system make sure you’ve installed rust with rustup.
https://sn0int.readthedocs.io/en/latest/build.html
2021-07-24T05:28:27
CC-MAIN-2021-31
1627046150129.50
[]
sn0int.readthedocs.io
The AnyConcreteTypeNotAlreadyRegisteredSource, or “ACTNARS” as we call it, is an example of a registration source that Autofac ships with that allows you to resolve any concrete type from the Autofac container regardless of whether or not you specifically registered it.(); }
https://autofac.readthedocs.io/en/v4.0.0/advanced/registration-sources.html
2021-07-24T03:33:34
CC-MAIN-2021-31
1627046150129.50
[]
autofac.readthedocs.io
Upgrade your Bugsnag On-premise clustered installation. If you have the Single Machine version of Bugsnag On-premise, please follow the single machine upgrade guide instead. Upgrading Bugsnag will take approximately 15 minutes. During the upgrade there should not be any downtime if you have enabled high availability features. Before upgrading, ensure you have backups of your current installation. See Backup & Restore guide for more information. It is not necessary to upgrade notifier libraries used by your applications when upgrading Bugsnag On-premise, although sometimes new features will require upgrading notifiers. Run the following from the same directory as which the installation was run and contains the .ship folder to upgrade to the latest version: docker pull replicated/ship && \ docker run -it -p 8800:8800 --rm -v `pwd`:/out \ -v /var/run/docker.sock:/var/run/docker.sock \ -e HTTP_PROXY -e HTTPS_PROXY -e NO_PROXY \ replicated/ship update --headed This machine will require internet access during the upgrade. Follow the steps in the tool to finish the upgrade. For more information about the updates see.
https://docs.bugsnag.com/on-premise/clustered/upgrade/
2021-07-24T04:22:13
CC-MAIN-2021-31
1627046150129.50
[]
docs.bugsnag.com
If you want to add a tag to your contact, do this: 1. Under Contact details, click on Tags 2. In the Add a new tag and press enter field type in any tag you want and hit Enter 3. You will see this tag under Existing Tags You can also select already an existing tag from the Existing Tags section. Just click on any tag you want and it will be added to your contact.
https://docs.customerly.help/customer-support/how-to-assign-a-tag-to-a-contact
2021-07-24T04:36:34
CC-MAIN-2021-31
1627046150129.50
[]
docs.customerly.help
Installation Media We provide ready to use ISO images that include pre-installed software. These can either be used "live" without installation, or they can be used to set up a Fedora Linux Workstation based system that includes a set of Neuroscience software. Computational Neuroscience A Fedora Linux Workstation based ISO image is available for download from the Fedora website..
https://docs.fedoraproject.org/cs/neurofedora/install-media/
2021-07-24T03:38:06
CC-MAIN-2021-31
1627046150129.50
[]
docs.fedoraproject.org
openvidu-classroom 🔗. Get and execute the code 🔗. Deploy openvidu-classroom 🔗 Using the OpenVidu Dockerhub image 🔗 1) Redefine the /opt/openvidu/docker-compose.override.yml As the deployment docs says, to make it works with OpenVidu stack, you will need redefine the /opt/openvidu/docker-compose.override.yml by the OpenVidu Classroom docker-compose-override.yml. This is how should looks like the docker-compose-override.yml after be redefined: version: '3.1' services: app: image: openvidu/openvidu-classroom:2.17.0 restart: on-failure network_mode: host environment: - SERVER_PORT=5442 - OPENVIDU_URL= - OPENVIDU_SECRET=${OPENVIDU_SECRET} Creating my own docker image 🔗 Under the root project folder, you can see the docker/ directory. Here it is included all the required files yo make it possible the deployment with OpenVidu. First of all, you will need to create the openvidu-classroom docker image. 1) Run create_image.sh script: ./create_image.sh This script will create an image named openvidu/openvidu-classroom-demo:X.Y.Z. If you want to create a image with another different name, you can do it change the name here. Once the openvidu-classrom image has been created, you will can deploy it. 2) Redefine the /opt/openvidu/docker-compose.override.yml The steps are exactly the same as those described above but you have to take account change the image name by your custom name ( openvidu/openvidu-classroom-demo on this sample). Here it is the docker-compose-override.yml used by OpenVidu Classroom application. version: '3.1' services: app: image: openvidu/openvidu-classroom-demo:2.17.0 restart: on-failure network_mode: host environment: - SERVER_PORT=5442 - OPENVIDU_URL= - OPENVIDU_SECRET=${OPENVIDU_SECRET}
https://docs.openvidu.io/en/2.17.0/demos/openvidu-classroom/
2021-07-24T05:29:51
CC-MAIN-2021-31
1627046150129.50
[]
docs.openvidu.io
This release contains many fixes and some new features. All users of Varnish Enterprise are encouraged to upgrade. Most notably we have fixes in H2 code and VHA, but there are also fixes in the JSON output of varnishlog and of how grace works when caching requests which have a request body. Among the new features are a faster MSE startup and more VHA counters. For a complete list of features and bug fixes, see the Changelog.
https://docs.varnish-software.com/releases/varnish-cache-plus-6.0.6r1/
2021-07-24T04:45:41
CC-MAIN-2021-31
1627046150129.50
[]
docs.varnish-software.com
Configuring Keystores in WSO2 API Manager¶ WSO2 products use asymmetric cryptography by default for the purposes of authentication and data encryption. In asymmetric cryptography, keystores (with key pairs and certificates) are created and stored for the product. Keystore is a repository where private keys and certificates can be stored. It is possible to have multiple keystores so that the keys used for different use cases are kept unique. For more information about keystores and its concepts, see About Asymmetric Cryptography . In WSO2 API Manager, there are three different keystores in use. - Primary Keystore - Secondary Keystore (TLS Connections) - Internal Keystore Primary Keystore is used for sigining and encryption for the data which is externally exposed. Example use cases are signing SAML response, OAuth ID Token Signing and signing JWTs. Secondary Keystore is used for authenticating communication over SSL/TLS. This is used in various transports used by WSO2 API Manager including servlet transport (used for webapps), Synapse transport (used in gateway), thrift, binary and JMS. Internal Keystore is used for encrypting internal critical data including passwords and other confidential information in configuration files. The wso2carbon.jks keystore file, which is shipped with all WSO2 products, is used as the default keystore for all functions. However, in a production environment, it is recommended to create new keystores with new keys and certificates. If you have created a new keystore and updated the client-truststore.jks file, you must update the <API-M_HOME>/repository/conf/deployment.toml file in order to make the keystore work. Info If you want to change the default truststore details, you can do it by adding the configurations under [truststore] field in the <API-M_HOME>/repository/conf/deployment.toml. Refer the below example which defines the type of the truststore as "JKS" (Java KeyStore), the file_name of the trustore as "modified-client-truststore.jks" and the password as "modified_password". [truststore] type= "JKS" file_name = "modified-client-truststore.jks" password= "modified_password" Configuring the Primary Keystore¶ By default, the primary keystore is configured with wso2carbon.jks. In order to configure the primary keystore, open <API-M_HOME>/repository/conf/deployment.toml and add below configurations. [keystore.primary] file_name = "keystore.jks" type = "JKS" password = "passwd12#" alias = "mydomain" key_password = "passwd12#" The elements in the above configuration are described below: Important Your private key password (key_password) and keystore password (password) should be the same. This is due to a limitation of some of the internal 3rd party components used by WSO2 API Mananger. By default, the primary keystore configured as above is used for internal data encryption (encrypting data in internal data stores and configuration files) as well as for signing messages that are communicated with external parties. In other words, if we define the primary keystore only, it will be used as both Secondary Keystore (TLS) and Internal Keystore. However, it is sometimes a common requirement to have separate keystores for SSL/TSL connections, communicating messages with external parties (such as JWT, SAML, OIDC id_token signing) and for encrypting information in internal data stores. This is because, for signing messages and external communications, the keystore certificates need to be frequently renewed. However, for encrypting information in internal data stores, the keystore certificates should not be changed frequently because the data that is already encrypted will become unusable every time the certificate changes. Configuring the Secondary Keystore for TLS connections¶ In order to configure a seperate keystore as the secondary keystore, add below configurations to deployment.toml. [keystore.tls] file_name = "tls_keystore.jks" type = "JKS" password = "passwd12#" alias = "mydomain" key_password = "passwd12#" Configuring the Internal Keystore¶ Configuring a seperate internal keystore facilitates you to keep the certificate used for those encryptions unchanged while the certificate used for signing are changed. For that, add below configurations to deployment.toml. [keystore.internal] file_name = "internal_keystore.jks" type = "JKS" password = "passwd12#" alias = "mydomain" key_password = "passwd12#" Warning Using a totally new keystore for internal data encryption in an existing deployment will make already encrypted data unusable. In such cases, an appropriate data migration effort is needed. Hence, if you have already been using the same keystore for both primary and internal keystores for sometime and later decided to use a seperate internal keystore, use the current keystore for internal keystore and use the new keystore for primary keystore instead. This avoids unnecessary data migration. [keystore.primary] file_name = "new_keystore.jks" type = "JKS" password = "passwd12#" alias = "mydomain" key_password = "passwd12#" [keystore.internal] file_name = "existing_keystore.jks" type = "JKS" password = "passwd12#" alias = "mydomain" key_password = "passwd12#" Important Due to a known limitation of the GA version of WSO2 API Manager 3.0.0, note that there are a few other configuration required when changing the default keystores. For more information, see the ticket Need to support keystore/truststore configuration properly from deployment.toml. that the primary keystore will also be used for signing messages when the product communicates with external parties (such SAML, OIDC id_token signing). Have separate keystores for encrypting sensitive internal data/information as a recommended practice.. The internal keystore. If you encounter the following error after changing the default keystore, log in to the carbon console and navigate to /_system/config/repository/esb/inboundregistry location and remove the inbound-endpointsresource. Once it is removed, restart the server. FATAL - ServiceBusInitializer Couldn't initialize the ESB... java.lang.IllegalArgumentException: KeyStore File repository/resources/security/xxxx.jks not found
https://apim.docs.wso2.com/en/3.0.0/administer/product-security/configuring-keystores/configuring-keystores-in-wso2-api-manager/
2021-07-24T04:41:17
CC-MAIN-2021-31
1627046150129.50
[]
apim.docs.wso2.com
Step 10: Delete the Movies Table with .NET In this step of the Microsoft .NET and DynamoDB Tutorial, you delete the Movies table in Amazon DynamoDB. The Main function in DynamoDB_intro waits on DeletingTable_async, which is implemented in the 10_DeletingTable.cs file. using System; using System.Threading.Tasks; namespace DynamoDB_intro { public static partial class DdbIntro { public static async Task<bool> DeletingTable_async(string tableName) { var tblDelete = await Client.DeleteTableAsync(tableName); return true; } } } DeletingTable_async waits on the low-level DynamoDB method AmazonDynamoDBClient.DeleteTableAsync to delete the table..
https://docs.aws.amazon.com/amazondynamodb/latest/developerguide/GettingStarted.NET.10.html
2021-07-24T04:37:28
CC-MAIN-2021-31
1627046150129.50
[]
docs.aws.amazon.com
You must have administrator access in Jira for authorizing Crowdcontrol to access your Jira account. To authorize Crowdcontrol to access your Jira account, specify the following information on the Authorization page: - Display name: Name for the integration. - Site: URL for your Jira domain. You can authorize Crowdcontrol to access Jira using Jira Cloud OAuth, Jira Server OAuth, or Username and password. Clients must allow list the following IPs. The IPs are a cluster of squid proxies that provide high availability for outgoing integration requests.IPs: - 52.1.126.10 - 52.86.183.27 - 52.86.229.29 Port: - 443 The default port used for Jira is 443 SSL/TL but it may vary depending on your Jira configuration. If you have any issues, send an email to [email protected]. Authorizing Jira CloudAuthorizing Jira Cloud If your Jira instance is hosted at *.atlassian.net, then select the Jira Cloud OAuth option. Click Authorize. In Authorize for, select the Jira instance hosted at *.atlassian.netand click Accept. The Integration authorized message is displayed. Also, the Jira integration details section displays the Cloud ID and Instance name automatically, and Authorization in the left pane shows a tick mark indicating that authorization is complete for Jira Cloud. After authorizing Jira Cloud, configure the Jira project. For information, see configuring Jira project. Authorizing Jira ServerAuthorizing Jira Server If your Jira instance is self-hosted, select the Jira Server OAuth option. Log in to Jira and go to Settings > Products. In Integrations, click Application Links. The Configure Application Links page is displayed on the right. Specify the URL for creating a new link. The No Response was received.. error message is displayed. Provide the same URL and click Continue. The Link applications page is displayed. - Specify the following details: - Application Name: Descriptive name for the integration. - Application Type: Select Generic Application. - Service Provider Name: Provide name as Bugcrowd. - Consumer Key: Use the same Consumer keyyou provided in Crowdcontrol integration. The following values are only used for an Outgoing Authentication flow, which is currently not leveraged. Hence, use the provided arbitrary values: - Shared Secret: Bugcrowd. - Refresh Token URL:. - Access Token URL:. - Authorize URL:. Select the Create Incoming link option. Click Continue. - Specify the following details: - Consumer Key: Use the same Consumer keyyou entered within the Crowdcontrol Jira Integration. - Consumer Name: Use a name for the integration, we recommend Crowdcontrol. - Public Key: Enter in the public key from the Crowdcontrol Jira integration. Click Continue. The Application Link is persisted within Jira. Go back to Crowdcontrol Jira integration page and click Authorize. The Integration updated message is displayed. After authorizing Jira Server, configure the Jira project. For information, see configuring Jira project. Authorizing Jira Using Username and PasswordAuthorizing Jira Using Username and Password On the Jira Integration page, select the Username/Password option. - Specify the following: - Username: Your Jira user name. - Password: API token generated in Jira. For information about generating API tokens, see Jira documentation. Click Test authorization. The Jira authentication successful message is displayed. After authorizing Jira, configure the Jira project. For information, see configuring Jira project.
https://docs.bugcrowd.com/customers/integration-management/jira/authorizing-crowdcontrol-to-access-jira/
2021-07-24T05:06:24
CC-MAIN-2021-31
1627046150129.50
[array(['/assets/images/customer/jira/authorizing-crowdcontrol/display-name-site.png', 'display-name-site'], dtype=object) ]
docs.bugcrowd.com
openvidu-ionic-capacitor and Ionic to serve the app. Install them with the following commands sudo curl -sL | sudo bash - sudo apt-get install -y nodejs sudo npm install -g ionic@latest 2) Clone the repo: git clone -b v2.17.0 3) Install dependencies cd openvidu-tutorials/openvidu-ionic-capacitor npm install Now depending on the platform you want to run your app... In the browser 🔗 See how to run in the browser section of openvidu-ionic. In an Android device with native app 🔗 For previous steps, see how to run in Android device section of openvidu-ionic. 9) Capacitor provide us a special command for automatically open the Android code in your Android Studio: # In openvidu-tutorials/openvidu-ionic-capacitor npx cap open android Optionally, you can do it manually, opening the openvidu-tutorials/openvidu-ionic-capacitor/android directory in your Android Studio. In an iOS device with native app 🔗 For previous steps, see how to run in iOS device section of openvidu-ionic. 4) The native platforms are included in openvidu-ionic-capacitor . You don't need to do any extra about this. 5) Capacitor provide us a special command for automatically open the iOS code in your xCode: # In openvidu-tutorials/openvidu-ionic-capacitor npx cap open ios You will need to sign your application in Xcode (opening folder openvidu-ionic/platforms/ios) with your developer team to avoid any errors. From Apple official documentation: Understanding the code 🔗 See Understanding the code section of openvidu-ionic. Android specific requirements 🔗 See Android specific requirements section of openvidu-ionic. iOS specific requirements 🔗 See iOS specific requirements section of openvidu-ionic. Moreover, an explicit change to bear in mind is in the applyIosIonicVideoAttributes method. You will need to remove the zIndex property line (required in the openvidu-ionic tutorial) allowing to the iOS videos get visible to the html. The method would be as follows: private applyIosIonicVideoAttributes() { const ratio = this._streamManager.stream.videoDimensions.height / this._streamManager.stream.videoDimensions.width; this.elementRef.nativeElement.style.width = '100% !important'; this.elementRef.nativeElement.style.objectFit = 'fill';(); }
https://docs.openvidu.io/en/2.17.0/tutorials/openvidu-ionic-capacitor/
2021-07-24T04:47:38
CC-MAIN-2021-31
1627046150129.50
[array(['img/tutorials/openvidu-ionic.png', None], dtype=object) array(['img/tutorials/xcode_sign.png', None], dtype=object)]
docs.openvidu.io
Open your favorite browser and navigate to the site. The Smartstore installation page will be displayed. In the Store Information section, provide all the necessary store admin user information as per the description in the table given below. Once you’ve entered the information in the Store Information section, scroll down to the Database Information section. In the Database Information section, provide all the necessary database details as per the description in the table given below. Once you provide the complete database information, click Install. A message box asking you to confirm the start of the installation of Smartstore will be displayed. If you click on confirm, Smartstore will start installing your store. Once the database is built and all plugins are installed, the installation will be completed successfully and a success message will be displayed. Your Smartstore shop is now ready to be customized.
https://docs.smartstore.com/plugins/viewsource/viewpagesrc.action?pageId=46203217
2021-07-24T04:47:35
CC-MAIN-2021-31
1627046150129.50
[]
docs.smartstore.com
VAR_POP returns the population variance of a non-null set of numbers (nulls being ignored). VAR_SAMP ( [DISTINCT | ALL] <number-expression> ) where ALL includes (and DISTINCT excludes) duplicate values in the input set. ALL is the default. When the the input set has no non-null data, VAR_SAMP returns NULL. VAR_POP uses the following calculation: (SUM(expr*expr) - SUM(expr)*SUM(expr) / COUNT(expr)) / COUNT(expr) In other words, for a given set of non-null values, using S1 as the sum of the values and S2 as the sum of the squares of the values, VAR_POP returns the result (S2-S1*S1/N)/N. You can use VAR_POP as either an aggregate or an analytic function. Applied to an empty set, it returns null.
https://docs.sqlstream.com/sql-reference-guide/built-in-functions/var-pop/
2021-07-24T04:36:21
CC-MAIN-2021-31
1627046150129.50
[]
docs.sqlstream.com
Caelus Documentation¶ - Version 9.04 - Date Aug 29, 2020 Caelus is a software library suitable for numerical simulations of problems in Continuum Mechanics (CM), with many applications in Computational Fluid Dynamics (CFD) for a wide range of scientific and engineering applications across commercial and academic environments. Caelus was forked from OpenFOAM®, version 2.1.1 released by OpenFOAM® Foundation which is mainly a collection of libraries written in C++. Caelus is developed and maintained by Applied CCM Pty Ltd.. This documentation is split into three parts: a tutorial, a theory and a validation manual. New users should start with the tutorial manual that provides examples of usage. Tutorial Manual¶ - Tutorials: Introduction - Tutorials: Incompressible Laminar Flow - Laminar Flat Plate - Tee Junction - Circular Cylinder - Triangular Cavity - Spherical Cavity - Totorials: Incompressible Turbulent Flow - Turbulent Flat Plate - Bump in a Channel - NACA Airfoil - Convex Curvature - Backward Facing Step Validation Manual¶ - Validation: Introduction - Validation: Incompressible Laminar Flows - Validation: Incompressible Turbulent Flows
https://caelus-cml.readthedocs.io/en/latest/
2021-07-24T04:23:38
CC-MAIN-2021-31
1627046150129.50
[]
caelus-cml.readthedocs.io
From the Submissions page, you can perform the following tasks: - Search and filter submissions based on status and assignee - Set the status for a submission - Reward a submission - Set the priority for a submission - Assign a submission to someone in your organization - View a submission’s details - Reply to the researcher regarding a particular submission - View priority percentile Role Requirements for Viewing and Managing Submissions: Your role in the organization determines your level of interaction with a submission. Submission Inbox The Submissions Inbox lists all submissions on the left hand side of the screen. You can click on any submission to view its details. The submissions filter lets you narrow the list of submissions down based on a set of criteria. To learn how to build a filter query, see filtering submissions. Submission Details and Activity Stream The Details and Activity Stream displays the information for the submission you currently have selected in the Submission Inbox. You can review the details to learn what the bug is and how the researcher discovered it. Below the details, you can view the activity, which includes comments and historical events, for the submission. Read more about the submission details and activity stream. Submission Settings The Submission settings displays all of the tasks that you can perform for a submission, which includes the following tasks: Add Reward The Add Reward shares when a suggested reward amount differs from the range currently in the program settings. If the range changes, researchers can still expect to be paid according to what was advertised at the time they created their submissions.
https://docs.bugcrowd.com/customers/getting-started/the-submissions-page/
2021-07-24T04:08:31
CC-MAIN-2021-31
1627046150129.50
[array(['/assets/images/customer/submissions/with-blocker.png', 'submission page'], dtype=object) array(['/assets/images/customer/submissions/list.png', 'submissions list'], dtype=object) array(['/assets/images/customer/submissions/filtering.png', 'filtering submissions'], dtype=object) array(['/assets/images/customer/submissions/activity-feed.png', 'activity-feed'], dtype=object) array(['/assets/images/customer/submissions/actions.png', 'submission-settings'], dtype=object) array(['/assets/images/customer/submissions/add-reward.png', 'Add Reward'], dtype=object) ]
docs.bugcrowd.com
Application. Application startup executes. At this point the second CPU and RTOS scheduler are started. This process is explained in detail in the following sections. First stage bootloader¶ After SoC reset, the CPU will start running immediately to perform initialization. The reset vector code is located in the mask ROM of the ESP32-S2 chip and cannot this. For power-on reset, software SOC reset, and watchdog SOC reset: check the GPIO_STRAP_REGregister if a custom boot mode (such as UART Download Mode) is requested. If this is the case, this custom loader mode is executed from ROM. Otherwise, proceed with boot as if it was due to software CPU reset. Consult ESP32-S2 datasheet for a description of SoC boot modes and how to execute them. For software CPU reset and watchdog CPU reset: configure SPI flash based on EFUSE values, and attempt to load the code from flash. This step is described in more detail in the next paragraphs. Note During normal boot modes the RTC watchdog is enabled when this happens, so if the process is interrupted or stalled then the watchdog will reset the SOC automatically and repeat the boot process. This may cause the SoC to strap into a new boot mode, if the stapping GPIOs have changed. Second stage bootloader binary image is loaded from flash starting at address 0x1000. The 4kB sector of flash before this address is unused. Second stage bootloader¶ In ESP-IDF, the binary image which resides at offset 0x1000 in flash is the second stage bootloader. Second stage bootloader source code is available in components/bootloader directory of ESP-IDF. by default at offset 0x8000 (configurable value). See partition tables documentation for more information. The bootloader finds factory and OTA app partitions. If OTA app partitions are found in the partition table, the bootloader consults the otadata partition to determine which one should be booted. See Over The Air Updates (OTA) for more information. For a full description of the configuration options available for the ESP-IDF bootloader, see Bootloader. For the selected partition, second stage bootloader reads the binary image from flash one segment at a time: For segments with load addresses in internal IRAM (Instruction RAM) or DRAM (Data RAM), the contents are copied from flash to the load address. For segments which have load addresses in DROM (data stored in Flash) or IROM (code executed from Flash) regions, the flash MMU is configured to provide the correct mapping from the flash to the load address. Once all segments are processed - meaning code is loaded and flash MMU is set up, second stage bootloader verifies the integrity of the application and then jumps to the application entry point found in the binary image header. Application startup¶ Application startup covers everything that happens after the app starts executing and before the app_main function starts running inside the main task. This is split into three stages: Port initialization of hardware and basic C runtime environment. System initialization of software services and FreeRTOS. Running the main task and calling app_main. Note Understanding all stages of ESP-IDF app initialization is often not necessary. To understand initialization from the application developer’s perspective only, skip forward to Running the main task. Port Initialization¶ ESP-IDF application entry point is call_start_cpu0 function found in components/esp_system/port/cpu_start.c. This function is executed by the second stage bootloader, and never returns. This port-layer initialization function initializes the basic C Runtime Environment (“CRT”) and performs initial configuration of the SoC’s internal hardware: Reconfigure CPU exceptions for the app (allowing app interrupt handlers to run, and causing Fatal Errors to be handled using the options configured for the app rather than the simpler error handler provided by ROM). If the option CONFIG_BOOTLOADER_WDT_ENABLE is not set then the RTC watchdog timer is disabled. Initialize internal memory (data & bss). Finish configuring the MMU cache. Enable PSRAM if configured. Set the CPU clocks to the frequencies configured for the project. Initialize memory protection if configured. Once call_start_cpu0 completes running, it calls the “system layer” initialization function start_cpu0 found in components/esp_system/startup.c. System Initialization¶ The main system initialization function is start_cpu0. By default, this function is weak-linked to the function start_cpu0_default. This means that it’s possible to override this function to add some additional initialization steps. The primary system initialization stage includes: Log information about this application (project name, App version, etc.) if default log level enables this. Initialize the heap allocator (before this point all allocations must be static or on the stack). Initialize newlib component syscalls and time functions. Configure the brownout detector. Setup libc stdin, stdout, and stderr according to the serial console configuration. Perform any security-related checks, including burning efuses that should be burned for this configuration (including permanently limiting ROM download modes). Initialize SPI flash API support. Call global C++ constructors and any C functions marked with __attribute__((constructor)). Secondary system initialization allows individual components to be initialized. If a component has an initialization function annotated with the ESP_SYSTEM_INIT_FN macro, it will be called as part of secondary initialization. Running the main task¶ After all other components are initialized, the main task is created and the FreeRTOS scheduler starts running. After doing some more initialization tasks (that require the scheduler to have started), the main task runs the application-provided function app_main in the firmware. The main task that runs app_main has a fixed RTOS priority (one higher than the minimum) and a configurable stack size. Unlike normal FreeRTOS tasks (or embedded C main functions), the app_main task is allowed to return. If this happens, The task is cleaned up and the system will continue running with other RTOS tasks scheduled normally. Therefore, it is possible to implement app_main as either a function that creates other application tasks and then returns, or as a main application task itself.
https://docs.espressif.com/projects/esp-idf/en/stable/esp32s2/api-guides/startup.html
2021-07-24T05:28:35
CC-MAIN-2021-31
1627046150129.50
[]
docs.espressif.com
openvidu-call-ionic 🔗 OpenVidu Call Ionic demo, built with Ionic v4 and Angular 9, allows users to make videoconference calls in theirs devices with many of the capabilities integrated by OpenVidu platform. It is a frontend-only application. OpenVidu-Call-Ionic is composed by the five Angular components displayed in the image below. Get and execute the code 🔗 Using the browser 🔗 🔗 To deploy the apk Android) and 2) stated above, we must continue with the following commands: 3) Now you need the IP of your PC in your LAN network, which we will use in points 4) and 5) to configure OpenVidu Server and your app. In Linux/OSX you can simply get it by running the following command on your shell (will probably output something like 192.168.1.111) awk '/inet / && $2 != "127.0.0.1"{print $2}' <(ifconfig) 4) OpenVidu Platform service must be up and running in your development machine. The easiest way is running this Docker container which wraps both of them (you will need Docker CE). Set property DOMAIN_OR_PUBLIC_IP to the IP we just got in point 4), that would be: 6) Connect the device to the same network as the PC. 7) Connect the device to the PC via USB. You can check if your device is authorized with the adb devices command. 8) Run the tutorial: cd openvidu-call-ionic npm install<<
https://docs.openvidu.io/en/2.17.0/demos/openvidu-call-ionic/
2021-07-24T04:35:09
CC-MAIN-2021-31
1627046150129.50
[array(['img/demos/openvidu-call-ionic-diagram.png', None], dtype=object) array(['img/tutorials/xcode_sign.png', None], dtype=object)]
docs.openvidu.io
setup_plugin_for_backup A newer version of this documentation is available. Use the version menu above to view the most up-to-date release of the Greenplum 4.x documentation. setup_plugin_for_backup Plugin command to initialize a storage plugin for the backup operation. Synopsis plugin_executable setup_plugin_for_backup plugin_config_file local_backup_dir scope_backup command must exit with a value of 0 on success, non-zero if an error occurs. In the case of a non-zero exit code, gpbackup displays the contents of stderr to the user.
https://greenplum.docs.pivotal.io/43270/admin_guide/managing/plugin_api/setup_plugin_for_backup.html
2021-07-24T04:45:52
CC-MAIN-2021-31
1627046150129.50
[]
greenplum.docs.pivotal.io
Virtual paths A virtual path is a logical link between two WAN links. It comprises of a collection of WAN paths combined to provide high service-level communication between two SD-WAN nodes. This is done by constantly measuring and adapting to changing application demand and WAN conditions. The SD-WAN appliances measure the network on a per-path basis. A virtual path can be static (always exists) or dynamic (exists only when traffic between two SD-WAN appliances reaches a configured threshold). Static virtual pathsStatic virtual paths The virtual path settings are inherited from the global wan link auto-path settings. You can override these configurations and add or remove the member path. You can also filter the virtual paths based on the site and the applied QoS profile. Specify a tracking IP address for the WAN Link that can be pinged to determine the state of the WAN Link. You can also specify a reverse tracking IP for the reverse path that can be pinged to determine the state of the reverse path. To configure static virtual paths, from the site level, navigate to Configuration > Advanced Settings > Virtual Paths > Static Virtual Paths. The active member paths are listed in the Active Member Paths section, you can view or edit the member path settings. - IP DSCP Tagging: A tag for the external IP header of the Virtual Path Control Protocol (VPCP) frame. - Loss Sensitive: If enabled, a path might be marked as BAD due to loss and incurs a latency penalty in a path score. Set the percentage of loss over the time required to mark the path as BAD. Disable this option if loss of bandwidth is intolerable. - Percent Loss: If packet loss exceeds the set percentage over the configured time, the GOOD Path state changes to BAD. - Over Time: If packet loss exceeds the set percentage over this configured time, the path state is marked as BAD. - Silence Period: The path state transitions from GOOD to BAD when no packets are received within the specified amount of time. - Path Probation Period: The period to wait before changing the path state from BAD to GOOD. Instability Sensitive: Latency penalties due to BAD state and other spikes in latency are considered. The WAN link details for the selected active member paths are listed, you can change the settings as required. The UDP port settings can be configured for both IPv4 and IPv6. - UDP Port: The port used for LAN to WAN and WAN to LAN packet transfer. You can also specify. - Alternate Port: The alternate UDP Port to be used when UDP port switching is enabled. - Port Switch Interval: The interval, in minutes, that the WAN Link alternates its UDP Port. - Tunnel Header Size in Bytes: The size of the tunnel header, in bytes, if applicable. - Active MTU Detect: The LAN to WAN paths for dynamic virtual paths is actively probed for MTU. Enable UDP Hole Punching: The MCN assists UDP connectivity between compatible NAT-protected client sites. Dynamic virtual pathsDynamic virtual paths With demand for VoIP and video conferencing, the traffic between offices has increased. Setting up full mesh connections through data centers is time consuming and inefficient. With Citrix SD-WAN, you can automatically create paths between offices on demand using the Dynamic Virtual Path feature. The session initially uses an existing fixed path. As the bandwidth and time threshold is met, a new path is created dynamically if that new path has better performance characteristics than the fixed path. The session traffic is transmitted through the new path resulting in efficient usage of resources. The dynamic virtual paths exist only when they are needed and reduce the amount of traffic transmitted to and from the data center. To configure dynamic virtual paths, from the site level, navigate to Configuration > Advanced Settings > Virtual Paths > Dynamic Virtual Paths. Select Override Global Defaults to override the virtual path settings inherited from the global wan link auto-path settings. Select Enable Dynamic Virtual Paths to allow dynamic virtual paths between this site and other sites connected through an intermediate node. Set the maximum allowable dynamic virtual paths for the site. Set the UDP port and dynamic virtual path threshold. Specify the throughput threshold, in kbps or packets per second, on the intermediate site at which the dynamic virtual paths are triggered on LAN to WAN or WAN to LAN.
https://docs.citrix.com/en-us/citrix-sd-wan-orchestrator/site-level-configuration/virtual-paths.html
2021-07-24T05:11:57
CC-MAIN-2021-31
1627046150129.50
[array(['/en-us/citrix-sd-wan-orchestrator/media/static-virtual-path.png', 'Static virtual path'], dtype=object) array(['/en-us/citrix-sd-wan-orchestrator/media/dynamic-virtual-paths.png', 'Dynamic virtual paths'], dtype=object) array(['/en-us/citrix-sd-wan-orchestrator/media/dynamic-virtual-path-threshold.png', 'Dynamic virtual path threshold'], dtype=object) ]
docs.citrix.com
This is documentation for Orange 2.7. For the latest documentation, see Orange 3. Scoring (scoring)¶ Feature score is an assessment of the usefulness of the feature for prediction of the dependant (class) variable. Orange provides classes that compute the common feature scores for classification and regression regression. The script below computes the information gain of feature “tear_rate” in the Lenses data set (loaded into data): >>> print Orange.feature.scoring.InfoGain("tear_rate", data) 0.548795044422 Calling the scorer by passing the variable and the data to the constructor, like above is convenient. However, when scoring multiple variables, some methods run much faster if the scorer is constructed, stored and called for each variable. >>> gain = Orange.feature.scoring.InfoGain() >>> for feature in data.domain.features: ... print feature.name, gain(feature, data) age 0.0393966436386 prescription 0.0395109653473 astigmatic 0.377005338669 tear_rate 0.548795044422 The speed gain is most noticable in Relief, which computes the scores of all features in parallel. The module also provides a convenience function score_all that computes the scores for all attributes. The following example computes feature scores, both with score_all and by scoring each feature individually, and prints out the best three features. import Orange voting = Orange.data.Table("voting") def print_best_3(ma): for m in ma[:3]: print "%5.3f %s" % (m[1], m[0]) print 'Feature scores for best three features (with score_all):' ma = Orange.feature.scoring.score_all(voting) print_best_3(ma) print print 'Feature scores for best three features (scored individually):' meas = Orange.feature.scoring.Relief(k=20, m=50) mr = [ (a.name, meas(a, voting)) for a in voting.domain.attributes] mr.sort(key=lambda x: -x[1]) #sort decreasingly by the score print_best_3(mr) The output: Feature scores for best three features (with score_all): 0.613 physician-fee-freeze 0.255 el-salvador-aid 0.228 synfuels-corporation-cutback Feature scores for best three features (scored individually): 0.613 physician-fee-freeze 0.255 el-salvador-aid 0.228 synfuels-corporation-cutback It is also possible to score features that do not appear in the data but can be computed from it. A typical case are discretized features: import Orange iris = Orange.data.Table("iris") d1 = Orange.feature.discretization.Entropy("petal length", iris) print Orange.feature.scoring.InfoGain(d1, iris) Calling scoring methods¶ Scorers can be called with different type of arguments. For instance, when given the data, most scoring methods first compute the corresponding contingency tables. If these are already known, they can be given to the scorer instead of the data to save some time. Not all classes accept all kinds of arguments. Relief, for instance, only supports the form with instances on the input. - Score.__call__(attribute, data[, apriori_class_distribution][, weightID])¶ All scoring methods support this form. - Score.__call__(attribute, domain_contingency[, apriori_class_distribution]) - - Score.__call__(contingency, class_distribution[, apriori_class_distribution]) - The code demonstrates using the different call signatures by computing the score of the same feature with GainRatio. import Orange titanic = Orange.data.Table("titanic") meas = Orange.feature.scoring.GainRatio() print "Call with variable and data table" print meas(0, titanic) print "Call with variable and domain contingency" domain_cont = Orange.statistics.contingency.Domain(titanic) print meas(0, domain_cont) print "Call with contingency and class distribution" cont = Orange.statistics.contingency.VarClass(0, titanic) class_dist = Orange.statistics.distribution.Distribution( \ titanic.domain.class_var, titanic) print meas(cont, class_dist) Feature scoring in classification problems¶ - class Orange.feature.scoring.InfoGain¶ Information gain; the expected decrease of entropy. See page on wikipedia. - class Orange.feature.scoring.GainRatio¶ Information gain ratio; information gain divided by the entropy of the feature’s value. Introduced in [Quinlan1986] in order to avoid overestimation of multi-valued features. It has been shown, however, that it still overestimates features with multiple values. See Wikipedia. - class Orange.feature.scoring.Gini¶ Gini index is the probability that two randomly chosen instances will have different classes. See Gini coefficient on Wikipedia. - class Orange.feature.scoring.Cost¶ Evaluates features based on the cost decrease achieved by knowing the value of feature, according to the specified cost matrix. - cost¶ Cost matrix, an instance of Orange.misc.CostMatrix. If the cost of predicting the first class of an instance that is actually in the second is 5, and the cost of the opposite error is 1, than an appropriate score can be constructed as follows: >>> meas = Orange.feature.scoring.Cost() >>> meas.cost = ((0, 5), (1, 0)) >>> meas(3, data) 0.083333350718021393 Knowing the value of feature 3 would decrease the classification cost for approximately 0.083 per instance. - class Orange.feature.scoring.Relief¶ Assesses features’ ability to distinguish between very similar instances from different classes. This scoring method was first developed by Kira and Rendell and then improved by Kononenko. The class Relief works on discrete and continuous classes and thus implements ReliefF and RReliefF. ReliefF is slow since it needs to find k nearest neighbours for each of m reference instances. As we normally compute ReliefF for all features in the dataset, Relief caches the results for all features, when called to score a certain feature. When called again, it uses the stored results if the domain and the data table have not changed (data table version and the data checksum are compared). Caching will only work if you use the same object. Constructing new instances of Relief for each feature, like this: for attr in data.domain.attributes: print Orange.feature.scoring.Relief(attr, data) runs much slower than reusing the same instance: meas = Orange.feature.scoring.Relief() for attr in table.domain.attributes: print meas(attr, data) - class Orange.feature.scoring.Distance¶ The 1-D distance is defined as information gain divided by joint entropy H_{CA} (C is the class variable and A the feature): 1-D(C,A) = \frac{\mathrm{Gain}(A)}{H_{CA}} - class Orange.feature.scoring.MDL¶ Minimum description length principle [Kononenko1995]. Let n be the number of instances, n_0 the number of classes, and n_{cj} the number of instances with feature value j and class value c. Then MDL score for the feature A is \mathrm{MDL}(A) = \frac{1}{n} \Bigg[ \log\binom{n}{n_{1.},\cdots,n_{n_0 .}} - \sum_j \log \binom{n_{.j}}{n_{1j},\cdots,n_{n_0 j}} \\ + \log \binom{n+n_0-1}{n_0-1} - \sum_j \log \binom{n_{.j}+n_0-1}{n_0-1} \Bigg] Feature scoring in regression problems¶ - class Orange.feature.scoring.Relief Relief is used for regression in the same way as for classification (see Relief in classification problems). - class Orange.feature.scoring.MSE¶ Implements the mean square error score. - unknowns_treatment¶ Decides the treatment of unknown values. See Score.unknowns_treatment. Base Classes¶ Implemented methods for scoring relevances of features are subclasses of Score. Those that compute statistics on conditional distributions of class values given the feature values are derived from ScoreFromProbabilities. - class Orange.feature.scoring.Score¶ Abstract base class for feature scoring. Its attributes describe which types of features it can handle which kind of data it requires. Capabilities - computes_thresholds¶ Indicates whether the scoring method implements the threshold_function. Input specification - needs¶ The type of data needed indicated by one the constants below. Classes with use DomainContingency will also handle generators. Those based on Contingency_Class will be able to take generators and domain contingencies. - Generator¶ Constant. Indicates that the scoring method needs an instance generator on the input as, for example, Relief. - DomainContingency¶ Constant. Indicates that the scoring method needs Orange.statistics.contingency.Domain. - Contingency_Class¶ Constant. Indicates, that the scoring method needs the contingency (Orange.statistics.contingency.VarClass), feature distribution and the apriori class distribution (as most scoring methods). Treatment of unknown values - unknowns_treatment¶ Defined in classes that are able to treat unknown values. It should be set to one of the values below. - ReduceByUnknown¶ Constant. Features with unknown values are punished. The feature quality is reduced by the proportion of unknown values. For impurity scores the impurity decreases only where the value is defined and stays the same otherwise. Methods - __call__() Abstract. See Calling scoring methods. - threshold_function(attribute, instances[, weightID])¶ Abstract. Assess different binarizations of the continuous feature attribute. Return a list of tuples. The first element is a threshold (between two existing values), the second is the quality of the corresponding binary feature, and the third the distribution of instances below and above the threshold. Not all scorers return the third element. To show the computation of thresholds, we shall use the Iris data set: iris = Orange.data.Table("iris") meas = Orange.feature.scoring.Relief() for t in meas.threshold_function("petal length", iris): print "%5.3f: %5.3f" % t - best_threshold(attribute, instances)¶ Return the best threshold for binarization, that is, the threshold with which the resulting binary feature will have the optimal score. The script below prints out the best threshold for binarization of an feature. ReliefF is used scoring: thresh, score, distr = meas.best_threshold("petal length", iris) print "\nBest threshold: %5.3f (score %5.3f)" % (thresh, score) - class Orange.feature.scoring.ScoreFromProbabilities¶ Abstract base class for feature scoring method that can be computed from contingency matrices. - conditional_estimator_constructor¶ The classes that are used to estimate unconditional and conditional probabilities of classes, respectively. Defaults use relative frequencies; possible alternatives are, for instance, ProbabilityEstimatorConstructor_m and ConditionalProbabilityEstimatorConstructor_ByRows (with estimator constructor again set to ProbabilityEstimatorConstructor_m), respectively. Other¶ - class Orange.feature.scoring.OrderAttributes(score=None)¶ Orders features by their scores. - Orange.feature.scoring.score_all(data, score=Relief(k=20, m=50))¶ Assess the quality of features using the given measure and return a sorted list of tuples (feature name, measure). Bibliography
https://docs.biolab.si/2/reference/rst/Orange.feature.scoring.html
2019-08-17T23:22:26
CC-MAIN-2019-35
1566027313501.0
[]
docs.biolab.si
Product Relations In this article you will learn what product relations are and how to work with them. You will also be presented with some of the use cases where it's recommended to use product relations. What are Product Relations Product relations are either one-way or two-way relations between products, linked by a relation type. A product can have multiple product relations to other products and the product relations can be used in different contexts based on the relation type. We have listed some of the more popular use cases: - Product Bundles - Configurable products - Similar products - Product X is often bought with product Y - Customers who bought product X also bought product Y If you're interested in learning more about configurable products, read the following articles on how to work with configurable products. If you're interested in the last two use cases then you should take a look at the Inconceivable app which dynamically creates product relations based on orders in the system. Product Relation Types A product relation type is an entity used to group product relations. When using products relations for multiple use cases, you want to be able to distinguish the product relations based on which use case they belong to. You will have a product relation type for each use case and use it to distinguish which product relations belong to which use case. Now we are going to look into how to create a new product relation type. The use case we are going to present is creating product relations between similar products for upselling opportunities and the product relation type will be named "Similar Products". The first thing we need to do is navigate the to "Settings" section of Ucommerce, open the "Catalog" node and right click on the "Product Relations" node as shown below. Once you click "Create" you will be asked to enter a name for the new product relation type and in this case it will be "Similar Products". After you click the create button, you will be presented with the view shown below. You have now successfully created a new product relation type. How to work with Product Relations Now we are going to use the newly created product relation type to create product relations. To do this we're going to navigate to a product, open the "Related products" tab and click the "Add new relations button" as shown below. You should see the following dialog where we have to pick a product relation type, whether it's a one-way or a two-way relations and which products we want to create the product relations between. In this case, we're going to set the product relation type to "Similar Products" and I have picked three products that are similar to the Black and White Wonderland shirt. Having two-way relations means that the two relations are made for each product picked, one from the Black and White Wonderland shirt to the other shirt and another one from the other shirt to the Black and White Wonderland shirt. Once we have picked how we want to create the product relations and the products that we want to create the relation between, we click the "Save" button and we should see the following: Getting related products in the frontend can be done by using the following APIs either CatalogLibrary.GetRelatedProducts(string sku, string relationTypeName = null) CatalogLibrary.GetRelatedProducts(int productId, string relationTypeName = null) In this example I'm going to use the first method and get the relations based on a product Sku and a relation type name. var productRelationDictionary = CatalogLibrary.GetRelatedProducts("BWWMSFSS-LE", "Similar Products"); var products = productRelationDictionary[productRelationDictionary.Keys.First()]; The GetRelatedProducts(...) methods both return a dictionary of the type Dictionary<ProductRelationType, List<Product>>. If you don't specify a relation type name then it will return all the product relations grouped by their product relation type. In this case, we only get the product relations with the product relation type "Similar Products". Summary In this article you've learned how to work with product relations and that: - Product relation types group together product relations. - Product relations can be either one-way or two-way. - Ucommerce APIs support getting a product relations for a product or only product relations of a specific product relation type.
https://docs.ucommerce.net/ucommerce/v7.16/getting-started/catalog-foundation/product-relations.html
2019-08-17T22:44:51
CC-MAIN-2019-35
1566027313501.0
[array(['images/ProductRelations1.png', 'image'], dtype=object) array(['images/ProductRelations2.png', 'image'], dtype=object) array(['images/ProductRelations3.png', 'image'], dtype=object) array(['images/ProductRelations4.png', 'image'], dtype=object) array(['images/ProductRelations5.png', 'image'], dtype=object)]
docs.ucommerce.net
Message-ID: <527304891.494888.1566084618508.JavaMail.confluence@docs-node.wso2.com> Subject: Exported From Confluence MIME-Version: 1.0 Content-Type: multipart/related; boundary="----=_Part_494887_267269427.1566084618507" ------=_Part_494887_267269427.1566084618507 Content-Type: text/html; charset=UTF-8 Content-Transfer-Encoding: quoted-printable Content-Location: If you no longer need an existing sequence, you can delete it from the ESB. Click the check box for each sequence you want to delete, and then c= lick the Delete link above or below the table. Clicking the Delete link in a specific row will only delete the sequence= in that row. To delete multiple sequences, be sure to click the Delete lin= k that appears above or below the table.
https://docs.wso2.com/exportword?pageId=33136307
2019-08-17T23:30:18
CC-MAIN-2019-35
1566027313501.0
[]
docs.wso2.com
Adding a Menu to the Visual Studio Menu Bar Note This article applies to Visual Studio 2015. If you're looking for the latest Visual Studio documentation, use the version selector at the top left. We recommend upgrading to Visual Studio 2019. Download it here This walkthrough shows how to add a menu to the menu bar of the Visual Studio integrated development environment (IDE). The IDE menu bar contains menu categories such as File, Edit, View, Window, and Help. Before adding a new menu to the Visual Studio menu bar, consider whether your commands should be placed within an existing menu. For more information about command placement, see Menus and Commands for Visual Studio. Menus are declared in the .vsct file of the project. For more information about menus and .vsct files, see Commands, Menus, and Toolbars. By completing this walkthrough, you can create a menu named TestMenu that contains one command. Prerequisites Starting in Visual Studio 2015, you do not install the Visual Studio SDK from the download center. It is included as an optional feature in Visual Studio setup. You can also install the VS SDK later on. For more information, see Installing the Visual Studio SDK. Creating a VSIX Project that has a Custom Command item template Create a VSIX project named TopLevelMenu. You can find the VSIX project template in the New Project dialog under Visual C# / Extensibility. For more information, see Creating an Extension with a Menu Command. When the project opens, add a custom command item template named TestCommand. In the Solution Explorer, right-click the project node and select Add / New Item. In the Add New Item dialog, go to Visual C# / Extensibility and select Custom Command. In the Name field at the bottom of the window, change the command file name to TestCommand.cs. Creating a Menu on the IDE Menu Bar To create a menu In Solution Explorer, open TestCommandPackage.vsct. At the end of the file, there is a <Symbols> node that contains several <GuidSymbol> nodes. In the node named guidTestCommandPackageCmdSet, add a new symbol, as follows: <IDSymbol name="TopLevelMenu" value="0x1021"/> Create an empty <Menus> node in the <Commands> node, just before <Groups>. In the <Menus> node, add a <Menu> node , as follows: <Menus> <Menu guid="guidTestCommandPackageCmdSet" id="TopLevelMenu" priority="0x700" type="Menu"> <Parent guid="guidSHLMainMenu" id="IDG_VS_MM_TOOLSADDINS" /> <Strings> <ButtonText>TestMenu</ButtonText> <CommandName>TestMenu</CommandName> </Strings> </Menu> </Menus> The guidand idvalues of the menu specify the command set and the specific menu in the command set. The guidand idvalues of the parent position the menu on the section of the Visual Studio menu bar that contains the Tools and Add-ins menus. The value of the CommandNamestring specifies that the text should appear in the menu item. In the <Groups> section, find the <Group> and change the <Parent> element to point to the menu we just added: <Groups> <Group guid="guidTestCommandPackageCmdSet" id="MyMenuGroup" priority="0x0600"> <Parent guid="guidTestCommandPackageCmdSet" id="TopLevelMenu"/> </Group> </Groups> This makes the group part of the new menu. Find the Buttonssection. Notice that the Visual Studio Package template has generated a Buttonelement that has its parent set to MyMenuGroup. As a result, this command will appear on your menu. Building and Testing the Extension Build the project and start debugging. An instance of the experimental instance should appear. The menu bar in the experimental instance should contain a TestMenu menu. On the TestMenu menu, click Invoke Test Command. A message box should appear and display the message "TestCommand Package Inside TopLevelMenu.TestCommand.MenuItemCallback()". This indicates that the new command works. See Also Commands, Menus, and Toolbars
https://docs.microsoft.com/en-us/visualstudio/extensibility/adding-a-menu-to-the-visual-studio-menu-bar?view=vs-2015
2019-08-17T23:16:44
CC-MAIN-2019-35
1566027313501.0
[]
docs.microsoft.com
Streamline Patient Referrals with Referral Management Where: This feature is available through the Health Cloud Platform permission set license in Lightning Experience in Enterprise, Performance, and Unlimited editions where Health Cloud is enabled. The reports for the referral management feature are available through an unmanaged package. Who: Users must have the Health Cloud Permission Set License and the Health Cloud Platform permission set assigned to them. Why: Referral management closes the loop on the referral process—no more dropped referrals. Prioritize the best referrals, ensure timely referral processing, and track the referral to the final confirmation back to the referring physician. - Support multiple channels for how referrals come in to your company—whether it’s through faxes, through a provider community, or from a call center. - Get intelligent insights into referral patterns, including scores for top referrers, referral priority based on insurance or patient condition, closure tracking, and referral priority. - Track referrals from submission to closure, including closure tracking, escalations, and reminders to ensure that no referral is dropped. - Two referral records: one based on the Lead object and the other on the Opportunity object - Record types for patient referrals on Lead and Opportunity objects - Standard and compact page layouts for referrals on Lead and Opportunity objects - A lead queue for open referrals - New fields added to Lead, Opportunity, and Contact objects that support referral management Add the Referrals list view to a partner community, and let physicians and others create referrals in your organization. We packaged up a set of reports that you can put on your home page dashboard. Install the unmanaged package, and let your users drill in to types of referrals, open referrals, and network leakage, all from one convenient dashboard.
https://docs.releasenotes.salesforce.com/en-us/spring19/release-notes/rn_health_referral_management.htm
2019-08-17T23:25:16
CC-MAIN-2019-35
1566027313501.0
[array(['release_notes/images/rn_health_rm_community.png', 'Screenshot of the Referrals list in a community'], dtype=object) array(['help/images/health1_referral_dashboard.png', 'Screenshot of referrals dashboard with five reports'], dtype=object) ]
docs.releasenotes.salesforce.com
Send Users to a Custom URL When They Log Out You can now send users to a custom URL during single logout (SLO) when Salesforce is the service provider. Where: This change applies to Lightning Experience and Salesforce Classic in Professional, Enterprise, Performance, Unlimited, and Developer editions. How: Configure both the identity provider SLO URL and custom logout URL on the SAML Single Sign-On Settings page. When Salesforce is the service provider and initiates a logout request, the identity provider can post a logout response to redirect the user back to Salesforce. In this scenario, Salesforce sends the user to the custom URL upon logout. If the identity provider doesn’t redirect the user back to Salesforce in a logout response, the identity provider determines the SLO redirect URL upon logout.
https://docs.releasenotes.salesforce.com/en-us/spring19/release-notes/rn_security_redirect_to_custom_url_saml_slo.htm
2019-08-17T22:53:03
CC-MAIN-2019-35
1566027313501.0
[]
docs.releasenotes.salesforce.com
Changelog for package cob_gazebo_worlds
http://docs.ros.org/kinetic/changelogs/cob_gazebo_worlds/changelog.html
2019-08-17T23:54:04
CC-MAIN-2019-35
1566027313501.0
[]
docs.ros.org
Point. Inequality(Point, Point) Point. Inequality(Point, Point) Point. Inequality(Point, Point) Point. Inequality(Point, Point) Operator Definition public: static bool operator !=(System::Windows::Point point1, System::Windows::Point point2); public static bool operator != (System.Windows.Point point1, System.Windows.Point point2); static member op_Inequality : System.Windows.Point * System.Windows.Point -> bool Public Shared Operator != (point1 As Point, point2 As Point) As Boolean Parameters Returns true if point1 and point2 have different X or Y coordinates; false if point1 and point2 have the same X and Y coordinates. Examples; } Private Function overloadedInequalityOperatorExample() As Boolean Dim point1 As New Point(20, 30) Dim point2 As New Point(45, 70) ' Check whether the two Points are not equal, using the overloaded ' inequality operator. ' areNotEqual is True. Dim areNotEqual As Boolean = (point1 <> point2) Return areNotEqual End Function Remarks A point's X and Y coordinates are described using Double values. Because Double values can lose precision when operated on, a comparison between two Point values that are logically equal might fail.
https://docs.microsoft.com/en-us/dotnet/api/system.windows.point.op_inequality?view=netframework-4.7.1
2019-08-18T00:24:19
CC-MAIN-2019-35
1566027313501.0
[]
docs.microsoft.com
Windows Mobile Features (Native) 4/8/2010 Many features included with a Windows® phone can be tailored according to their specific requirements and user needs. This section provides the necessary information to extend, interact with, and configure many of the components, technologies, and services provided by Windows phones. In This Section - Applications and Services Covers ActiveSync, POOM, and other services for application developers. - Browser Applications Information on supported web browsers. - Component Services (COM and DCOM) Support for COM and DCOM. - Core OS Services Low-level services. - Encoded Media Digital Rights Management and DirectShow reference. - File Systems and Storage Management Information on supported file storage systems. - International Creating international applications. - Internet Client Services Support for browser applications, and support for scripting languages. - Internet Explorer Support Components Programming elements available to Internet Explorer applications. - Networking - Core Core networking technologies, such as TCP/IP. - Networking - Remote Wide Area Network technologies. - Networking - Wireless Wireless technologies. - Phone Features Information on the Phone API set. - Power Management Topics covering all aspects of monitoring and making the most of power resources on mobile devices. - Security for Windows Mobile Devices Essential information on security models and authentication. - Shell, GWES, and User Interface Comprehensive information regarding the Windows Mobile user interface and controls. - Voice over IP Phone Services Support for VoIP technologies. Related Sections - Windows Mobile Features (Managed) Reference documentation for developing in Managed Code.
https://docs.microsoft.com/en-us/previous-versions/bb158483(v=msdn.10)
2019-08-17T23:13:26
CC-MAIN-2019-35
1566027313501.0
[]
docs.microsoft.com
Caveat Emptor - this script will DELETE target files and folders. Be certain that the targets listed in the XML are OK to be removed. Test and test again before putting the script into production. A full discussion on managing Profile Container size can be found in this article: A Practical Guide to FSLogix Containers Capacity Planning and Maintenance. Remove-ProfileData.ps1 is used to delete files and folders in the user profile to reduce profile size, thus keeping Profile Containers sizes to a minimum. The script runs within the user session and reads an XML file that defines a list of files and folders to remove from the profile. Actions on a target path can be: Prune - the XML can include a number that defines the age in days for last write that the file must be older than to be deleted. Essentially reducing the size of the folder. Delete - the target path will be deleted. Where the administrator may want to remove a target path, the Delete action will delete the entire folder. Trim - where the target path contains sub-folders, this action will remove all sub-folders except for the newest folder. Supports -WhatIf and -Verbose output and returns a list of files removed from the profile. Add -Verbose will output the total size of files removed from the user profile and processing time at the end of the script. All targets (files / folders) that are deleted, will be logged to a file. Deleting files from the profile can potentially result in data loss, so testing is advised and the use of -Confirm:$False is required for the script perform a delete. Remove-ProfileData.ps1 and supporting files are available on in the repository on GitHub. To enable the script to report on what would be removed from user's profile, the following example command would be run in the user's context: .\Remove-ProfileData.ps1 -Targets .\targets.xml -WhatIf To enable the script to clean up the user's profile, the following example command would be run: .\Remove-ProfileData.ps1 -Targets .\targets.xml -Confirm:$False The age of files specified in the XML can be overridden with the -Override switch. This will remove files of any ages as specificed in the XML targets file. .\Remove-ProfileData.ps1 -Targets .\targets.xml -Confirm:$False -Override By default, logs are kept for files that are deleted in %LocalAppData% and up to 30 logs will be kept. This number can be changed with the -KeepLog parameter. .\Remove-ProfileData.ps1 -Targets .\targets.xml -Confirm:$False -LogPath $env:AppData -KeepLog 7 Remove-ProfileData.ps1 is be run in the user session which could be done in several ways: A logon script - the script can be run to prune the user profile during login; however, consider potential login storms and impacts on IO and CPU A scheduled task - configure Windows Task Scheduler to run the script as the logged on user. Consider using task schedule trigger and condition properties to stagger the task across multiple users or desktop A logoff script - run the script during user logoff where applications are typically closed and user logoff actions are likely to be staggered To run Remove-ProfileData.ps1 in a Group Policy login or logoff script action, create a new GPO (or edit an existing GPO) to add Remove-ProfileData.ps1 as a script. Open the User Configuration / Policies / Windows Settings / Scripts (Logon/Logoff) node. Edit either Logon or Logoff Click the PowerShell Scripts tab and click the Show Files button. Copy Remove-ProfileData.ps1 into the location displayed in Explorer. Edit Remove-ProfileData.ps1 and make the following changes: Remove ConfirmImpact = 'High' (approximately line 49, starting with CmdletBinding) Change Mandatory = $True to Mandatory = $False for the Targets parameter (approximately line 53) Copy Targets.xml to a central location. The NETLOGON share is a good candidate to ensure that the file is available centrally Add Remove-ProfileData.ps1 as a script with the -Targets parameter (e.g. -Targets "\\home.stealthpuppy.com\NETLOGON\ProfileTargets.xml") Link the GPO to an organisational unit containing target user accounts (or use where the GPO is linked to a computer OU with Loopback enabled).
https://docs.stealthpuppy.com/docs/fslogix/profile
2019-08-17T23:28:11
CC-MAIN-2019-35
1566027313501.0
[]
docs.stealthpuppy.com
Include Even More Special Characters in Passwords Get more creative with your passwords. Salesforce now supports these special characters: ! " # $ % & ' ( ) * + , - . / : ; < = > ? @ [ \ ] ^ _ ` { | } ~. Where: This change applies to Lightning Experience and Salesforce Classic in Contact Manager, Essentials, Group, Professional, Enterprise, Performance, Unlimited, Developer, and Database.com editions.
https://docs.releasenotes.salesforce.com/en-us/spring19/release-notes/rn_security_extended_list_password_characters.htm
2019-08-17T23:01:09
CC-MAIN-2019-35
1566027313501.0
[]
docs.releasenotes.salesforce.com
Recently Viewed Topics Export a Dashboard Required User Role: Basic, Scan Operator, Standard, Scan Manager, or Administrator In the new Tenable.io interface, the export feature allows you to export dashboard data in standard PDF and detailed PDF formats. You can create dashboard exports on demand, or you can schedule automated exports to specified recipients. Note: Executive Summary, Spectre/Meltdown, and Security Management Summary dashboards do not provide PDF-Detailed exports. Note: You cannot export the Tenable-provided Vulnerability Management Overview dashboard. You can use the Export PDF feature to share customized dashboards externally (e.g., email and presentations). The exported PDF is a generated report of the selected dashboard. To export a PDF: View the dashboard you want to export. In the dashboard header, click the button. The Exports plane appears. In the Actions section, click the button. An options menu appears. Select PDF - Standard or PDF - Detailed. Note: The PDF - Standard report contains the displayed information for the selected dashboard. The information that you see on the screen is the information that will be included in the report. The PDF - Detailed report has in depth information, including vulnerability details, that goes beyond the items displayed. A confirmation message appears, informing you that the export is in progress. The export request and status appears in the exports table on the Exports plane. When the export is complete, download the PDF: In the exports table, roll over the export you want to download. Click the button. Tenable.io notifies you by email when the export is complete. Note: Smaller exports (under 10 MB) are included as attachments in the email. For larger exports, the email includes a link for downloading the export. The Schedule Export option allows you to send exports at specified times. To schedule an export:
https://docs.tenable.com/cloud/Content/Analysis/ExportaDashboard.htm
2019-08-17T23:40:46
CC-MAIN-2019-35
1566027313501.0
[array(['../../Skins/Default/Stylesheets/Images/transparent.gif', 'Closed'], dtype=object) array(['../../Skins/Default/Stylesheets/Images/transparent.gif', 'Closed'], dtype=object) ]
docs.tenable.com
All Files Scan Module Top Menu The menu commands in the Scan application let you access commands for executing many different tasks. Scan Menu If you are using macOS, the Scan menu commands let you display product and version information, and close the Harmony. Command Description About Scan Displays product and version information. Exit In macOS, closes the Harmony and ends the current session. File Menu The File menu commands let you open drawings, select scanned drawings to load, create a list of labelled cells and close your session. Command Description Open Drawings Opens the Database Selector dialog box in which you select the drawings to be scanned or add new scenes and elements to a job. Load From File Lets you select a previously scanned drawing to load into the Harmony Scan module. Build Manual List Opens the Manual List dialog box for you to create a list of labeled cells. Exit In Windows or Linux, closes the Harmony Scan module and ends your current session. Edit Menu The Edit menu commands let you open the drawing list, reverse the drawing list, select the vectorization style, and create a plain text file for each scan. Command Description Drawing List Opens the Drawings Selector dialog box for labelling cells to accept drawings. Reverse Drawing List Reverses the sequence of drawings in the Drawing List. Vectorize Style Opens the Vectorization Styles dialog box for selecting the vectorization style to apply when scanning drawings. Create ScanInfo File Creates a plain text file for each subsequent scan. This file contains information such as the paper size and DPI used during scanning. Each plain text file is located in the same directory and has the same file name as the scanned image with the file extension SI. Scanner Menu The Scanner menu commands let you eject paper from a scanner and access scanner information. Command Description Info Opens the Scanner Information dialog box to view scanner name, device, model, and description information. Eject Page Ejects a page from a scanner’s automatic document feeder (ADF). This command is only activated when a paper jam occurs. This option is not available on all the scanners. Help Menu The Help menu commands let you access scanner information, identify problems when scanning and access the documentation. Command Description About In Windows or Linux, displays product and version information. Debug Mode Identifies a problem encountered in Harmony. Help Opens the online help product documentation.
https://docs.toonboom.com/help/harmony-15/premium/reference/menu/main/scan-module-top-menu.html
2019-08-17T23:26:16
CC-MAIN-2019-35
1566027313501.0
[]
docs.toonboom.com
The Unity Standard Shader is a built-in shader is to create a user-friendly way of achieving a consistent, plausible look under different lighting conditions. It models how light behaves in reality, without using multiple ad-hoc models that may or may not work. To do so, it follows principles of physics, including energy conservation (meaning that objects never reflect more light than they receive), Fresnel reflections (all surfaces become more reflective at grazing angles), and how surfaces occlude themselves (what is called Geometry Term), among others.:
https://docs.unity3d.com/2018.1/Documentation/Manual/shader-StandardShader.html
2019-08-17T23:24:44
CC-MAIN-2019-35
1566027313501.0
[]
docs.unity3d.com
public interface LicenseListener License listener interface tracks how licensed seats (connections) are used. T-Plan Robot Enterprise licensing is based on a maximum number of allowed simultaneous desktop connections. This limit is enforced through the software license key. To register a listener for the license usage notifications call ApplicationSupport.addLicenseListener(com.tplan.robot.LicenseListener). The licenseStatus(com.tplan.robot.LicenseEvent) method will be called immediately to pass the initial information such as the number of total licensed connections/seats (available through LicenseEvent.getTotalSeats()) and currently free ones ( LicenseEvent.getFreeSeats()). The method then gets called when a connection is pooled or reused (removed from the connection pool). The remaining two listener methods of licenseUtilized(com.tplan.robot.LicenseEvent) and licenseReleased(com.tplan.robot.LicenseEvent) will be called asynchronously when a seat gets utilized (through connection to a desktop) or released (after disconnection from a client). For a simple, ready-to-use listener listener see the DefaultLicenseListener class. void licenseStatus(LicenseEvent event) This method has several purposes. First of all it is called immediately when the listener registers for license notifications through ApplicationSupport.addLicenseListener(com.tplan.robot.LicenseListener) with the event type of LicenseEvent.TYPE_STATUS. The method then gets called when the status of the desktop clients changes without an immediate impact on the overall license number status. These changes include these type events: LicenseEvent.TYPE_POOLEDtype is fired when a connection is pooled. Reuse of the connection and its removal from the pool fires a LicenseEvent.TYPE_REUSEDevent. Though these events mean no change to the license status because pooled connections keep holding the license seat, it is useful for debugging of the pool mechanism. Be aware that this behavior is subject to configuration and this type of event may be never fired if this feature is set off. See the RemoteDesktopClientFactoryclass for details on connection pooling. LicenseEvent.TYPE_WAITINGtype is fired in a situation when the number of licenses is already exhausted and the client requesting a license seat is queued to wait for a released license. Be aware that this behavior is subject to configuration and this type of event may be never fired if this feature is set off. event- license event providing the initial information about the total number of licensed seats (connections) as well as the free ones. void licenseReleased(LicenseEvent event) event- license event with information about license numbers and a reference to the desktop client which released the seat. void licenseUtilized(LicenseEvent event) event- license event with information about license numbers and a reference to the desktop client which reserved the seat.
http://www.docs.t-plan.com/robot/docs/latest/api/com/tplan/robot/LicenseListener.html
2019-08-17T23:03:17
CC-MAIN-2019-35
1566027313501.0
[]
www.docs.t-plan.com
You are here: Start » Introduction » Programming Conventions Programming Conventions Organization of the Library Adaptive Vision Library is a collection of C++ functions that process machine vision related types of data. Each function corresponds to a single data processing operation, e.g. DetectEdges_AsPaths performs a Canny-like 2D edge detection. As a data processing library, it is not particularly object-oriented. It does use, however, modern approach to C++ programming with automatic memory management, exception handling, thread safety and the use of templates where appropriate. Namespaces There are two namespaces used: - atl – the namespace of types and functions related to Adaptive Template Library. - avl – the namespace of types and functions related to Adaptive Vision Library as the whole. - avs – Adaptive Vision Studio Code Generator equivalents of Adaptive Vision Library functions. Not recommended to use. Enumeration Types All enumeration types in Adaptive Vision Library use C++0x-like namespaces, for example: namespace EdgeFilter { enum Type { Canny, Deriche, Lanser }; } This has two advantages: (1) some identifiers can be shared between different enumeration types; (2) after typing "EdgeFilter::" IntelliSense will display all possible elements of the given enumeration type. Example:); Function Parameters Contrary to standard C++ libraries, machine vision algorithms tend to have many parameters and often compute not single, but many output values. Moreover, diagnostic information is highly important for effective work of a machine vision software engineer. For these reasons, function parameters in Adaptive Vision Library are organized as follows: - First come input parameters, which have "in" prefix. - Second come output parameters, which have "out" prefix and denote the results. - The last come diagnostic output parameters, which have "diag" prefix and contain information that is useful for optimizing parameters (not computed when the diagnostic mode is turned off). For example, the following function invocation has a number of input parameters, a single output parameter (edges) and a single diagnostic output parameter (gradientImage).); Diagnostic Output Parameters Due to efficiency reasons the diagnostic outputs are only computed when the diagnostic mode is turned on. This can be done by calling: avl::EnableAvlDiagnosticOutputs(true); In your code you can check if the diagnostic mode is turned on by calling: if (avl::GetAvlDiagnosticOutputsEnabled()) { //... } Optional Outputs Due to efficiency reasons computation of some outputs can be skipped. In function TestImage user can inform function that computation of outMonoImage is not necessary and function can omit computation of this data. the TestImage Header with last two optional parameters: void avl::TestImage ( avl::TestImageId::Type inImageId, atl::Optional<avl::Image&> outRgbImage = atl::NIL, atl::Optional<avl::Image&> outMonoImage = atl::NIL ) Example of using optional outputs: avl::Image rgb, mono; // Both outputs are computed avl::TestImage(avl::TestImageId::Baboon, rgb, mono); // Only RGB image is computed avl::TestImage(avl::TestImageId::Baboon, rgb); // Only mono image is computed avl::TestImage(avl::TestImageId::Baboon, atl::NIL, mono); In-Place Data Processing Some functions can process data in-place, i.e. modifying the input objects instead of computing new ones. There are two approaches used for such functions: - Some filters, e.g. the image drawing routines, use "io" parameters, which work simultaneously as inputs and outputs. For example, the following function invocation draws red circles on the image1 object: avl::DrawCircle(image1, circle, atl::NIL, avl::Pixel(255, 0, 0), style); - Some filters, e.g. image point transforms, can be given the same object on the input and on the output. For example, the following function invocation negates pixel values without allocating any additional memory: avl::NegateImage(image1, atl::NIL, image1); Please note, that simple functions like NegateImage can be executed even 3 times faster in-place than when computing a new output object. Work Cancellation Most of long-working functions can be cancelled using CancelCurrentWork function. Cancellation technique is thread-safe, so function CancelCurrentWork can be called from different thread. To check cancellation status use the IsCurrentWorkCancelled function. void ProcessingThread() { while (!avl::IsCurrentWorkCancelled()) { std::cout << "Iteration start" << std::endl; avl::Delay(10000); // Function with cancellation support std::cout << "Iteration complete" << std::endl; } std::cout << "Processing thread stop" << std::endl; } int main() { avl::InitLibrary(); std::thread thread {ProcessingThread}; std::cout << "Press Enter to stop execution." << std::endl; std::cin.get(); // Cancel work in ProcessingThread and in avl::Delay avl::CancelCurrentWork(); thread.join(); return 0; } Library Initialization For reasons related to efficiency and thread-safety, before any other function of the AVL library is called, the InitLibrary function should be called first: int main() { avl::InitLibrary(); //... } Debug Preview For diagnostic purposes it is useful to be able to preview data of types Image and Region. You can achieve this by using functions from the Debug Preview category. They can be helpful in debugging programs and displaying both intermediate and final data of such types. avl::Image image; avl::LoadImage("hello.png", false, image); // Show loaded image in new window. avl::DebugPreviewShowNewImage(image); // Wait until window is closed. avl::DebugPreviewWaitForWindowsClose();
https://docs.adaptive-vision.com/4.12/avl/introduction/ProgrammingConventions.html
2019-08-17T22:52:24
CC-MAIN-2019-35
1566027313501.0
[]
docs.adaptive-vision.com
New In The 8.1 Release The table below summarizes the schema changes that occurred to iWD Data Mart tables between the 8.0.003.16 and 8.1.x releases. Where a column was renamed in 8.0.x, data types remained the same and therefore, are not listed in the table. Because of its relational structure, changes were also made to the construction and/or names of: - Views that were based on tables that were altered. - Indexes (because the names of some primary keys were changed). For index and view constructions, refer to the sql_scripts/<db_type> directory that is deployed during installation, where <db_type> is one of the following: - mssql - oracle - mysql Beginning with the iWD 8.0.002 release, the provided schema supports Genesys Interactive Insights for iWD—a Genesys product that offers summary and detail reports that cover various aspects of task management within an enterprise. Also new in this release of this document are guidelines/instructions for how to customize statistics and aggregates. Refer to the Customizing IWD topic for this information. For other types of changes to this release, such as to iWD deployment and functionality, refer to the intelligent Workload Distribution 8.1 Deployment Guide, the intelligent Workload Distribution 8.1 Release Notes, the Genesys Migration Guide, and other documents within the iWD documentation set. Feedback Comment on this article:
https://docs.genesys.com/Documentation/IWD/8.1.0/Ref/NewInThisRelease
2019-08-17T23:07:44
CC-MAIN-2019-35
1566027313501.0
[]
docs.genesys.com
Extract data from utterance text with intents and entities LUIS gives you the ability to get information from a user's natural language utterances. The information is extracted in a way that it can be used by a program, application, or chat bot to take action. In the following sections, learn what data is returned from intents and entities with examples of JSON. The hardest data to extract is the machine-learned data because it isn't an exact text match. Data extraction of the machine-learned entities needs to be part of the authoring cycle until you're confident you receive the data you expect. Data location and key usage LUIS provides the data from the published endpoint. The HTTPS request (POST or GET) contains the utterance as well as some optional configurations such as staging or production environments.<appID>?subscription-key=<subscription-key>&verbose=true&timezoneOffset=0&q=book 2 tickets to paris The appID is available on the Settings page of your LUIS app as well as part of the URL (after /apps/) when you're editing that LUIS app. The subscription-key is the endpoint key used for querying your app. While you can use your free authoring/starter key while you're learning LUIS, it is important to change the endpoint key to a key that supports your expected LUIS usage. The timezoneOffset unit is minutes. The HTTPS response contains all the intent and entity information LUIS can determine based on the current published model of either the staging or production endpoint. The endpoint URL is found on the LUIS website, in the Manage section, on the Keys and endpoints page. Data from intents The primary data is the top scoring intent name. Using the MyStore quickstart, the endpoint response is: { "query": "when do you open next?", "topScoringIntent": { "intent": "GetStoreInfo", "score": 0.984749258 }, "entities": [] } If your chatbot or LUIS-calling app makes a decision based on more than one intent score, return all the intents' scores by setting the querystring parameter, verbose=true. The endpoint response is: { "query": "when do you open next?", "topScoringIntent": { "intent": "GetStoreInfo", "score": 0.984749258 }, "intents": [ { "intent": "GetStoreInfo", "score": 0.984749258 }, { "intent": "None", "score": 0.2040639 } ], "entities": [] } The intents are ordered from highest to lowest score. If you add prebuilt domains, the intent name indicates the domain, such as Utilties or Communication as well as the intent: { "query": "Turn on the lights next monday at 9am", "topScoringIntent": { "intent": "Utilities.ShowNext", "score": 0.07842206 }, "intents": [ { "intent": "Utilities.ShowNext", "score": 0.07842206 }, { "intent": "Communication.StartOver", "score": 0.0239675418 }, { "intent": "None", "score": 0.0168218873 }], "entities": [] } Data from entities Most chatbots and applications need more than the intent name. This additional, optional data comes from entities discovered in the utterance. Each type of entity returns different information about the match. A single word or phrase in an utterance can match more than one entity. In that case, each matching entity is returned with its score. All entities are returned in the entities array of the response from the endpoint: "entities": [ { "entity": "bob jones", "type": "Name", "startIndex": 0, "endIndex": 8, "score": 0.473899543 }, { "entity": "3", "type": "builtin.number", "startIndex": 16, "endIndex": 16, "resolution": { "value": "3" } } ] Tokenized entity returned Several cultures return the entity object with the entity value tokenized. The startIndex and endIndex returned by LUIS in the entity object do not map to the new, tokenized value but instead to the original query in order for you to extract the raw entity programmatically. For example, in German, the word das Bauernbrot is tokenized into das bauern brot. The tokenized value, das bauern brot, is returned and the original value can be programmatically determined from the startIndex and endIndex of the original query, giving you das Bauernbrot. Simple entity data A simple entity is a machine-learned value. It can be a word or phrase. Composite entity data A composite entity is made up of other entities, such as prebuilt entities, simple, regular expression, and list entities. The separate entities form a whole entity. List entity data List entities represent a fixed, closed set of related words along with their synonyms. LUIS does not discover additional values for list entities. Use the Recommend feature to see suggestions for new words based on the current list. If there is more than one list entity with the same value, each entity is returned in the endpoint query. Prebuilt entity data Prebuilt entities are discovered based on a regular expression match using the open-source Recognizers-Text project. Prebuilt entities are returned in the entities array and use the type name prefixed with builtin::. The following text is an example utterance with the returned prebuilt entities: Dec 5th send to +1 360-555-1212 "entities": [ { "entity": "dec 5th", "type": "builtin.datetimeV2.date", "startIndex": 0, "endIndex": 6, "resolution": { "values": [ { "timex": "XXXX-12-05", "type": "date", "value": "2017-12-05" }, { "timex": "XXXX-12-05", "type": "date", "value": "2018-12-05" } ] } }, { "entity": "1", "type": "builtin.number", "startIndex": 18, "endIndex": 18, "resolution": { "value": "1" } }, { "entity": "360", "type": "builtin.number", "startIndex": 20, "endIndex": 22, "resolution": { "value": "360" } }, { "entity": "555", "type": "builtin.number", "startIndex": 26, "endIndex": 28, "resolution": { "value": "555" } }, { "entity": "1212", "type": "builtin.number", "startIndex": 32, "endIndex": 35, "resolution": { "value": "1212" } }, { "entity": "5th", "type": "builtin.ordinal", "startIndex": 4, "endIndex": 6, "resolution": { "value": "5" } }, { "entity": "1 360 - 555 - 1212", "type": "builtin.phonenumber", "startIndex": 18, "endIndex": 35, "resolution": { "value": "1 360 - 555 - 1212" } } ] Regular expression entity data A regular expression entity extracts an entity based on a regular expression pattern you provide. Extracting names Getting names from an utterance is difficult because a name can be almost any combination of letters and words. Depending on what type of name you're extracting, you have several options. The following suggestions are not rules but more guidelines. Add prebuilt PersonName and GeographyV2 entities PersonName and GeographyV2 entities are available in some language cultures. Names of people People's name can have some slight format depending on language and culture. Use either a prebuilt personName entity or a simple entity with roles of first and last name. If you use the simple entity, make sure to give examples that use the first and last name in different parts of the utterance, in utterances of different lengths, and utterances across all intents including the None intent. Review endpoint utterances on a regular basis to label any names that were not predicted correctly. Names of places Location names are set and known such as cities, counties, states, provinces, and countries/regions. Use the prebuilt entity geographyV2 to extract location information. New and emerging names Some apps need to be able to find new and emerging names such as products or companies. These types of names are the most difficult type of data extraction. Begin with a simple entity and add a phrase list. Review endpoint utterances on a regular basis to label any names that were not predicted correctly. Pattern roles data Roles are contextual differences of entities. { "query": "move bob jones from seattle to redmond", "topScoringIntent": { "intent": "MoveAssetsOrPeople", "score": 0.9999998 }, "intents": [ { "intent": "MoveAssetsOrPeople", "score": 0.9999998 }, { "intent": "None", "score": 1.02040713E-06 }, { "intent": "GetEmployeeBenefits", "score": 6.12244548E-07 }, { "intent": "GetEmployeeOrgChart", "score": 6.12244548E-07 }, { "intent": "FindForm", "score": 1.1E-09 } ], "entities": [ { "entity": "bob jones", "type": "Employee", "startIndex": 5, "endIndex": 13, "score": 0.922820568, "role": "" }, { "entity": "seattle", "type": "Location", "startIndex": 20, "endIndex": 26, "score": 0.948008537, "role": "Origin" }, { "entity": "redmond", "type": "Location", "startIndex": 31, "endIndex": 37, "score": 0.7047979, "role": "Destination" } ] } Pattern.any entity data Pattern.any is a variable-length placeholder used only in a pattern's template utterance to mark where the entity begins and ends. Sentiment analysis If Sentiment analysis is configured, the LUIS json response includes sentiment analysis. Learn more about sentiment analysis in the Text Analytics documentation. Sentiment data Sentiment data is a score between 1 and 0 indicating the positive (closer to 1) or negative (closer to 0) sentiment of the data. When culture is en-us, the response is: "sentimentAnalysis": { "label": "positive", "score": 0.9163064 } For all other cultures, the response is: "sentimentAnalysis": { "score": 0.9163064 } Key phrase extraction entity data The key phrase extraction entity returns key phrases in the utterance, provided by Text Analytics. { "query": "Is there a map of places with beautiful views on a favorite trail?", "topScoringIntent": { "intent": "GetJobInformation", "score": 0.764368951 }, "intents": [ ... ], "entities": [ { "entity": "beautiful views", "type": "builtin.keyPhrase", "startIndex": 30, "endIndex": 44 }, { "entity": "map of places", "type": "builtin.keyPhrase", "startIndex": 11, "endIndex": 23 }, { "entity": "favorite trail", "type": "builtin.keyPhrase", "startIndex": 51, "endIndex": 64 } ] } Data matching multiple entities LUIS returns all entities discovered in the utterance. As a result, your chatbot may need to make decision based on the results. An utterance can have many entities in an utterance: book me 2 adult business tickets to paris tomorrow on air france The LUIS endpoint can discover the same data in different entities: { "query": "book me 2 adult business tickets to paris tomorrow on air france", "topScoringIntent": { "intent": "BookFlight", "score": 1.0 }, "intents": [ { "intent": "BookFlight", "score": 1.0 }, { "intent": "Concierge", "score": 0.04216196 }, { "intent": "None", "score": 0.03610297 } ], "entities": [ { "entity": "air france", "type": "Airline", "startIndex": 54, "endIndex": 63, "score": 0.8291798 }, { "entity": "adult", "type": "Category", "startIndex": 10, "endIndex": 14, "resolution": { "values": [ "adult" ] } }, { "entity": "paris", "type": "Cities", "startIndex": 36, "endIndex": 40, "resolution": { "values": [ "Paris" ] } }, { "entity": "tomorrow", "type": "builtin.datetimeV2.date", "startIndex": 42, "endIndex": 49, "resolution": { "values": [ { "timex": "2018-02-21", "type": "date", "value": "2018-02-21" } ] } }, { "entity": "paris", "type": "Location::ToLocation", "startIndex": 36, "endIndex": 40, "score": 0.9730773 }, { "entity": "2", "type": "builtin.number", "startIndex": 8, "endIndex": 8, "resolution": { "value": "2" } }, { "entity": "business", "type": "Seat", "startIndex": 16, "endIndex": 23, "resolution": { "values": [ "business" ] } }, { "entity": "2 adult business", "type": "TicketSeatOrder", "startIndex": 8, "endIndex": 23, "score": 0.8784727 } ], "compositeEntities": [ { "parentType": "TicketSeatOrder", "value": "2 adult business", "children": [ { "type": "Category", "value": "adult" }, { "type": "builtin.number", "value": "2" }, { "type": "Seat", "value": " ] } } ] } Next steps See Add entities to learn more about how to add entities to your LUIS app. Feedback
https://docs.microsoft.com/en-us/azure/cognitive-services/LUIS/luis-concept-data-extraction
2019-08-17T23:21:54
CC-MAIN-2019-35
1566027313501.0
[]
docs.microsoft.com
What's in this manual Use the Installation Manual to learn how to install Splunk Enterprise. In this manual, you can find: - System requirements - Licensing information - Procedures for installing - Procedures for upgrading from a previous version ...and more. Note: If you want to install the Splunk universal forwarder, read "Universal forwarder deployment overview" in the Forwarding Data Manual. Unlike Splunk heavy and light forwarders, which are full Splunk Enterprise instances with some features changed or When generating the installation manual as PDF the resulting document is duplicate resulting double the pages in size (e.g. 0 - 124 and 124-248 are identical yet included in the table of contents and document Thanks for pointing that out about the PDF. We have fixed the issue, sorry for the inconvenience!
https://docs.splunk.com/Documentation/Splunk/6.0.15/Installation/Whatsinthismanual
2019-08-17T23:26:46
CC-MAIN-2019-35
1566027313501.0
[array(['/skins/OxfordComma/images/acrobat-logo.png', None], dtype=object)]
docs.splunk.com
This section covers more advanced development techniques, which will be useful to developers and teams who are comfortable with the basics of developing in Unity. The topics in this section give you more powerful control over working with scenesA Scene contains the environments and menus of your game. Think of each unique Scene file as a unique level. In each Scene, you place your environments, obstacles, and decorations, essentially designing and building your game in pieces. More info See in Glossary, managing assets, and streamlining your project. Did you find this page useful? Please give it a rating:
https://docs.unity3d.com/2019.1/Documentation/Manual/AdvancedDevelopment.html
2019-08-17T23:26:20
CC-MAIN-2019-35
1566027313501.0
[]
docs.unity3d.com
THE AMERICAN FILM INSTITUTE UNVEILS FULL SLATE OF AFI DOCS 2015 FILMS 81 Films from 25 Countries Including Four World Premieres to Screen June 17–21 in Washington, DC and Silver Spring, MD FOR IMMEDIATE RELEASE, MAY 20, 2015, WASHINGTON, DC — Today, the American Film Institute (AFI) announced the slate of films for the AFI DOCS 2015 Film Festival, running June 17 the HBO documentary film MAVIS! from AFI DOCS alumna Jessica Edwards. AFI DOCS will recognize Emmy® Award-winning filmmaker Stanley Nelson (THE BLACK PANTHERS: VANGUARD OF THE REVOLUTION) as its 2015 Charles Guggenheim honoree at the National Archives' William G. McGowan Theater on June 19. Spotlight Screenings include THE ARMOR OF LIGHT (DIR Abigail Disney), THE DIPLOMAT (DIR David Holbrooke), the world premiere of FIRST AND 17 (DIR Brad Horn) and MOST LIKELY TO SUCCEED (DIR Greg Whiteley). Panel discussions or extended Q&As with special guests will follow each Spotlight Screening. This year’s AFI DOCS program also includes two Special Screenings. The world premiere of Discovery's RISE: THE PROMISE OF MY BROTHER'S KEEPER (DIR Dawn Porter) screens at the Newseum on June 18. SALAM NEIGHBOR (DIRS Chris Temple and Zach Ingrasci) coincides with World Refugee Day with a world premiere screening on June 20. Additional films from notable documentarians include IN TRANSIT (DIR Albert Maysles, Lynn True, Nelson Walker, Ben Wu and David Usui), the East Coast premiere of STEVE JOBS: THE MAN IN THE MACHINE (DIR Alex Gibney) and THE LOOK OF SILENCE from AFI DOCS alumnus Joshua Oppenheimer. "Audiences will see the most renowned documentary films of the year, all of which will inspire, inform and entertain," said Michael Lumpkin, Director of AFI DOCS. "This year's slate celebrates documentary filmmaking while providing a launch pad for meaningful dialogue between audience members, filmmakers and policy leaders." AFI DOCS will offer additional programs for festival filmmakers as a way to connect with film industry and policy leaders. The festival will also include a two-day Filmmaker Conference open to the documentary filmmaking community at-large. Details will be announced in the coming weeks. AFI DOCS 2015 DOCUMENTARY FESTIVAL PROGRAM OPENING AND CLOSING NIGHT, SPECIAL AND SPOTLIGHT SCREENINGS Wednesday, June 17 OPENING NIGHT: BEST OF ENEMIES: DIRS Morgan Neville, Robert Gordon. USA. In the summer of 1968, the media landscape changed forever when ABC hired two politically opposed intellectuals — Gore Vidal and William F. Buckley, Jr. — to debate the issues of the day on live television. The directors will be in attendance for a discussion and Q&A following the film. Thursday, June 18 SPECIAL SCREENING: RISE: THE PROMISE OF MY BROTHER'S KEEPER: DIR Dawn Porter. USA. Discovery Channel’s documentary film about President Obama’s challenge to implement a community-level cradle-to-college-and-career strategy for young people, including boys and young men of color, to ensure they can reach their full potential. World premiere. Friday, June 19 THE CHARLES GUGGENHEIM SYMPOSIUM: The Charles Guggenheim Symposium honors the legacy of the late four-time Academy Award®-winning filmmaker Charles Guggenheim. This year, the free Symposium pays tribute to pioneering documentary filmmaker Stanley Nelson. AFI DOCS is proud to present Nelson's latest documentary THE BLACK PANTHERS: VANGUARD OF THE REVOLUTION as part of the 2015 program. The Symposium includes a conversation with Nelson moderated by The Washington Post film critic Ann Hornaday and a series of excerpts from his work. Nelson's films include Emmy Award®-nominated THE BLACK PRESS: SOLDIERS WITHOUT SWORDS (1999), Emmy Award®-winning THE MURDER OF EMMETT TILL (2003), BEYOND BROWN: PURSUING THE PROMISE (2004), JONESTOWN: THE LIFE AND DEATH OF PEOPLES TEMPLE (2006), Emmy Award®-winning FREEDOM RIDERS (2011) and FREEDOM SUMMER (2014). SPOTLIGHT SCREENING: MOST LIKELY TO SUCCEED: DIR Greg Whiteley. USA. The American education system has remained virtually unchanged for more than 100 years. In today’s highly competitive age of information and technology, experimental schools such as San Diego’s High Tech High aim to change that. SPOTLIGHT SCREENING: THE DIPLOMAT: DIR David Holbrooke. USA. The son of the late Ambassador Richard Holbrooke unflinchingly examines the career of his brash and talented father, whose life had global reach and unquestioned historical impact. Saturday, June 20 SPOTLIGHT SCREENING: FIRST AND 17: DIR Brad Horn. USA. Da’Shawn Hand, the top-ranked high school football recruit of 2013, navigates the pressures of being aggressively pursued by more than 90 colleges. World premiere. SPOTLIGHT SCREENING: THE ARMOR OF LIGHT: DIR Abigail Disney. USA. Abigail Disney’s directorial debut follows a prominent evangelical Christian leader who begins to reconsider his moral and political assumptions about gun rights after a major tragedy hits close to home. SPECIAL SCREENING: SALAM NEIGHBOR: DIRS Chris Temple, Zach Ingrasci. USA/Jordan. A film team spends one month living in Jordan’s Syrian Za’tari refugee camp to uncover the personal stories behind a rapidly growing global crisis. World premiere. Sunday, June 21 CLOSING NIGHT: MAVIS!: DIR Jessica Edwards. USA. Mavis Staples, the legendary gospel and R&B singer, has been making music for more than 60 years. From her roots in Chicago with the family group The Staple Singers, led by her father, Roebuck “Pops” Staples, to her award-winning work as a solo artist, MAVIS! traces the life and career of a remarkable woman with an unstoppable voice. The director will be in attendance for a discussion and Q&A following the film. FEATURE FILM SELECTIONS: 3 ½ MINUTES, TEN BULLETS: DIR Marc Silver. USA. The 2012 murder of African-American teen Jordan Davis by a middle-aged white man, following an argument over loud music, sparked a national debate about Florida’s controversial “stand your ground” law. ALL THINGS MUST PASS: DIR Colin Hanks. USA. Explore the rise and fall of Tower Records in this fascinating account of the iconic titan of the music business, which closed its doors in 2006. East Coast premiere. ALTHEA: DIR Rex Miller. USA. Tennis great Althea Gibson rose from the tough streets of Harlem to become the first athlete of color to win Wimbledon. Rex Miller’s documentary tells the story of a strong and resilient champion. AMONG THE BELIEVERS: DIRS Hemal Trivedi, Mohammed Ali Naqvi. Pakistan. Within Pakistan’s borders, a violent clash of ideologies between radical Muslim extremists and moderates is shaping the path of the country’s future. ATTACKING THE DEVIL: HAROLD EVANS AND THE LAST NAZI WAR CRIME: DIRS Jacqui Morris, David Morris. UK/Canada. Sunday Times editor Sir Harold Evans uses his newspaper to shed light on the harmful effects of the drug thalidomide during the late 1960s and early ‘70s. U.S. premiere. THE BLACK PANTHERS: VANGUARD OF THE REVOLUTION: DIR Stanley Nelson. USA. Director Stanley Nelson offers a fascinating account of activist group the Black Panthers and its place in America’s history. CARTEL LAND: DIR Matthew Heineman. USA/Mexico. A citizen vigilante group in Mexico fights back against the encroaching drug cartels, which have brought widespread fear, violence and corruption to the area for years. The Washington Post Film Strand. THE CHINESE MAYOR: DIR Hao Zhou. China. Mayor Geng Yanbo has ambitious plans to refurbish and develop the Chinese city of Datong, but progress comes with a price CITY OF GOLD: DIR Laura Gabbert. USA. Join Pulitzer Prize-winning food critic Jonathan Gold as he ventures off the beaten path in search of the most adventurous cuisine that Los Angeles has to offer and enjoy the fascinating personal stories that are often served up for dessert. CODE: DEBUGGING THE GENDER GAP: DIR Robin Hauser Reynolds. USA. Though computer science touches every aspect of life, women are barely represented in a coding community urgently seeking millions of skilled workers. CODE asks, “Why?” DRONE: DIR Tonje Hessen Schei. Norway. Drone technology has been a highly controversial issue in recent years as it has come to define the modern War on Terror. DRUNK STONED BRILLIANT DEAD: THE STORY OF THE NATIONAL LAMPOON: DIR Douglas Tirola. USA. Take a fascinating look into the history of National Lampoon, the hilariously twisted, profane and influential humor magazine that launched an astounding number of successful comedy careers. FRAME BY FRAME: DIRS Alexandria Bombach, Mo Scarpelli. USA. Four photojournalists in Afghanistan work to re-establish a free press after years of oppression under the Taliban regime. The Washington Post Film Strand. FRESH DRESSED: DIR Sacha Jenkins. USA. This fun and colorful history of hip-hop fashion looks at how the fresh trends that were born on urban streets found their way into mainstream America. FROM THIS DAY FORWARD: DIR Sharon Shattuck. USA. Filmmaker Sharon Shattuck explores her father’s gender identity struggles and how her parents have remained married through it all. HOT TYPE: 150 YEARS OF THE NATION: DIR Barbara Kopple. USA. Two-time Oscar® winner Barbara Kopple tracks the iconic progressive weekly The Nation from its 1865 founding by abolitionist Republicans to present-day challenges facing print media of all stripes. HOW TO DANCE IN OHIO: DIR Alexandra Shiva. USA. As they prepare for their first formal dance, a high-functioning co-ed group of autistic teenagers learns the intricacies of social interaction. I WANT TO BE A KING: DIR Mehdi Ganji. Iran. Abbas runs a B&B-like tourist destination out of his Iranian home, but with the success of his business, his plans grow increasingly ambitious and outlandish. U.S. premiere. INDIA'S DAUGHTER: DIR Leslee Udwin. UK/INDIA. INDIA’S DAUGHTER tells the tragic story of a 2012 gang rape and murder of a medical student and presents a searing indictment of the culture of misogyny behind the assault. IN TRANSIT: DIRS Albert Maysles, Lynn True, Nelson Walker, Ben Wu, David Usua. USA. Legendary documentary pioneer Albert Maysles captures a cross-section of people in transitional stages of life as they journey across America by train. KING GEORGES: DIR Erika Frankel. USA. Take a look behind the scenes of five-star French restaurant Le Bec-Fin in Philadelphia, run by its famously demanding owner and chef, Georges Perrier. LARRY KRAMER IN LOVE & ANGER: DIR Jean Carlomusto. USA. A portrait of outspoken writer and AIDS activist Larry Kramer, one of the most fiery, passionate, complicated and fascinating people you will ever get to know. LISTEN TO ME MARLON: DIR Stevan Riley. UK. Drawing on hundreds of hours of previously unheard personal audio recordings, filmmaker Stevan Riley lets actor Marlon Brando tell his extraordinary life’s journey from beyond the grave. THE LOOK OF SILENCE: DIR Joshua Oppenheimer. Denmark/Indonesia/Norway/Finland/UK. In his follow-up to THE ACT OF KILLING, director Joshua Oppenheimer continues to unearth the ghosts of Indonesia’s violent past, shifting his focus from the perpetrators to those left in the aftermath. LOVE MARRIAGE IN KABUL: DIR Amin Palangi. Australia. In Afghanistan, Abdul and Fatemeh have fallen in love and wish to marry, but their voices in the matter all but disappear within the complex negotiations and exchanges of money that must occur between the two extended families before an agreement can be made. OF MEN AND WAR: DIR Laurent Bécue-Renard. France. The devastating effects of post-traumatic stress disorder on returning American combat soldiers who served in Iraq and Afghanistan are explored in this essential testimony documented by French filmmaker Laurent Bécue-Renard over the course of five years. OUT TO WIN: DIR Malcolm Ingram. USA/Canada. The world of professional sports has long been dogged by a reputation of homophobia, steeped in the fear that openly gay players provide a potential “distraction” to the other teammates. However, times are changing. PEACE OFFICER: DIRS Scott Christopherson, Brad Barber. USA. A former Utah sheriff investigates the increased militarization of police forces following the death of his son-in-law during a police standoff. PEGGY GUGGENHEIM: ART ADDICT: DIR Lisa Immordino Vreeland. USA. Born into New York’s prominent Guggenheim family, Peggy Guggenheim made her own mark as one of the premier art collectors and exhibitors of her day. A POEM IS A NAKED PERSON: DIR Les Blank. USA. Unseen for more than 40 years, Les Blank’s portrait of singer-songwriter Leon Russell is a brilliantly freewheeling and poetic film experience ready for rediscovery. East Coast premiere. PROPHET'S PREY: DIR Amy Berg. USA. Filmmaker Amy Berg examines the alarming allegations surrounding the rogue polygamist religious sect known as the Fundamentalist Church of Jesus Christ of Latter-Day Saints (FLDS) and its incarcerated leader, Warren Jeffs. RADICAL GRACE: DIR Rebecca Parrish. USA. When you hear the words “feminist,” “activism” and “politics,” Catholic nuns are not usually the first thing that come to mind. However, this group of nuns is turning tradition on its ear. U.S. premiere. REQUIEM FOR THE AMERICAN DREAM: DIRS Peter Hutchison, Kelly Nyks, Jared P. Scott. USA. Noam Chomsky offers a riveting discourse on income inequality and its devastating effects, which threaten to erode democracy itself. REQUIEM FOR THE DEAD: AMERICAN SPRING 2014: DIRS Nick Doob, Shari Cookson. USA. During the spring of 2014, more than 8,000 individuals lost their lives to gun violence in the United States. REQUIEM focuses on these gun tragedies, weaving a series of vignettes from police footage, 911 calls and social media. East Coast premiere. THE RUSSIAN WOODPECKER: DIR Chad Gracia. UK. Was Chernobyl really an accident? Ukrainian artist Fedor Alexandrovich investigates an unusual conspiracy theory behind the infamous disaster. East Coast premiere. STEVE JOBS: THE MAN IN THE MACHINE: DIR Alex Gibney. USA. Alex Gibney takes a candid and critical look at Steve Jobs, the iconic visionary behind Apple Inc., whose impact helped define the tech industry. East Coast premiere. THE STORM MAKERS: DIR Guillaume Suon. Cambodia/France. Through revealing interviews with victims and perpetrators, filmmaker Guillaume Suon exposes the human-trafficking industry in Cambodia that ensnares tens of thousands of victims annually. THE THREE HIKERS: DIR Natalie Avital. USA. In 2009, when American hikers Sarah Shourd, Shane Bauer and Josh Fattal mistakenly wandered off the beaten path near Iraq’s poorly marked border with Iran, they quickly experienced the draconian consequences of their error. World premiere. The Washington Post Film Strand. TYKE ELEPHANT OUTLAW: DIR Stefan Moore, Susan Lambert. Australia. After years of mistreatment, Tyke the circus elephant goes on a rampage in this tragic and unforgettable tale of performing-animal abuse. UNCERTAIN: DIRS Anna Sandilands, Ewan McNicol. USA. Stunningly beautiful and disarmingly funny, UNCERTAIN delivers a portrait of the literal and figurative troubled waters of Uncertain, Texas, a 94-resident town on the brink of extinction. VERY SEMI-SERIOUS: DIR Leah Wolchok. USA. This fascinating, funny film explores the history and process of The New Yorker’s iconic cartoons through the lens of its cartoon editor, Bob Mankoff. WELCOME TO LEITH: DIRS Michael Beach Nichols, Christopher K. Walker. USA. When notorious white supremacist Craig Cobb decides to settle in Leith, North Dakota, the townspeople work together to evict their unwanted neighbor. WHAT HAPPENED, MISS SIMONE?: DIR Liz Garbus. USA. Nina Simone trained as a classical pianist but evolved into one of jazz music’s most beloved and complex figures. Lending her voice to the civil rights movement, Simone battled demons that ultimately drove her into a self-imposed exile. THE WOLFPACK: DIR Crystal Moselle. USA. Tucked inside an apartment in Manhattan’s Lower East Side live the Angulo siblings, a tight-knit group who have barely left home due to the overbearing hand of their father. They spend countless hours re-creating scenes from their favorite movies, which have shaped their view of the outside world. THE YES MEN ARE REVOLTING: DIRS Laura Nix, The Yes Men. USA. The prankster activists known as The Yes Men are at it again. Traveling the globe posing as corporate and government spokesmen, the mischievous pair stages elaborate stunts designed to draw attention to the issue of climate change. SHORT FILM SELECTIONS: THE 414S: THE ORIGINAL TEENAGE HACKERS: DIR Michael T. Vollmann. USA. When a group of teenagers began testing their hacking skills in 1983, they started a firestorm by stumbling into a national laboratory’s computer system. ALLEN & ALINEA: DIR Daniel Addelson. USA. In his home kitchen, Allen tackles the complicated recipes from Alinea, a high-end restaurant. In the process, he unlocks his own creativity and confidence. BODY TEAM 12: DIR David Darg. Liberia. It’s perhaps the most dangerous job in the world: collecting dead bodies from Ebola-stricken villages. BORN TO BE MILD: DIR Andy Oxley. UK. Members of the Dull Men’s Club explain their non-threatening passions (mailboxes, traffic circles, bricks, milk bottles) without shame and without judgment. COBBLER: DIR Madelon Vroom. UK. A feisty artisan seems poised to be the last shoemaker in his family — until his inexperienced son joins the business, triggering a lively dialogue. COMIC BOOK HEAVEN: DIR E.J. McLeavey-Fisher. USA. A long-standing comic book store in Queens prepares to close its doors for good. A CONVERSATION WITH MY BLACK SON: DIRS Blair Foster, Geeta Gandbhir. USA. A group of racially diverse parents discuss the importance of having a conversation with their young black sons about racism and interacting with the police. CROOKED CANDY: DIR Andrew Rodgers. USA. An adult collector shows off his illegal Kinder Egg collection, the egg-shaped chocolate candies banned in the U.S. DEAR ARAUCARIA: DIR Matt Houghton. UK. When the creator of a long-running newspaper crossword is diagnosed with terminal cancer, he begins leaving a cryptic message within the puzzles. GIOVANNI AND THE WATER BALLET: DIR Astrid Bussink. Netherlands. Ten-year-old Giovanni is the only boy trying out for the synchronized swimming team. HANGAR B: DIR Thomas Beug. USA. A group of men, some in their eighties and nineties, stays active working at a hangar at Floyd Bennett Airfield in Brooklyn, restoring old planes. KATSUO-BUSHI: DIR Yu Nakajima. Japan. Japanese cuisine’s umami flavor depends upon dried, smoked and fermented tuna. While most processors have industrialized production, the finest artisans continue to use age-old methods. THE LAND: DIR Erin Davis. USA. A radical European playspace for children encourages independence and risk-taking. LAST REEL: DIR Steven Bognar. USA. With the arrival of new technological advances, Ohio’s Little Art Theatre prepares to say goodbye to 35mm movie prints. LETTING YOU GO: DIR Kim Faber. Netherlands. This delicate film explores one woman’s heartbreaking decision to self-euthanize. LOSERS, A FILM ABOUT LOSS: DIR Arianne Hinz. Netherlands. Three young people share their different stories of loss: a stuffed animal, a fencing tournament and a loved one. MEND AND MAKE DO: DIR Bexie Bush. UK. As Lyn looks back on her past, her imagination brings to life her treasured memories in the shape of her most familiar belongings. MIDNIGHT THREE & SIX: DIR Joe Callander. USA. As Lyn looks back on her past, her imagination brings to life her treasured memories in the shape of her most familiar belongings. OBJECT: DIR Paulina Skibińska. Poland. A Polish rescue team dives into the freezing depths to retrieve a mysterious object hidden beneath the ice. SANDORKRAUT: DIRS Emily Lobsenz, Ann Husaini. USA. A “fermentation fetishist” blends his ritualistic culinary process with his own personal feelings on eating, living and mortality. SLEEPERS' BEAT: DIR Anastasia Kirillova. Russian Federation/UK. The romance of the rails is beautifully captured in this meditative look at the workers on long-distance Russian trains who sleep to its rhythmic beat. A STRONG BEAT: DIR Daniel Addelson. USA. A man receives a heart transplant and then falls in love in a most unexpected way. THE TIMEKEEPER: DIR Katherine Wells. USA. How long is one second? Demetrios Matsakis keeps the official time for the U.S. by measuring fractions of a nanosecond with cutting-edge atomic clocks. WATERLILIES: DIR Tanya Doyle. Ireland. Irish lasses in their sixties learn to swim for the very first time while discussing their marriages, children and interests. A WEE NIGHT IN: DIR Stuart Edwards. Scotland. An elderly Scottish couple enjoys an evening at home together, delighting in all the wee things that make life special. WHO STOLE THE RUBY SLIPPERS? DIR Theodore James. USA. The investigation of the theft of one of the iconic pairs of ruby slippers from THE WIZARD OF OZ from the Judy Garland Museum. WOMEN IN SINK: DIR Iris Zaki. Israel/UK. In this charming film, the director converses with Arab and Jewish women as she washes their hair, revealing a nuanced portrait of contemporary Israel. AWARDS: Audience Awards will be bestowed upon films based on the results of ballots cast by festival attendees after theater screenings. The winners of the Audience Awards for Best Feature and Best Short will be announced on Sunday, June 21. SPONSORS: Presenting Sponsor: AT&T Official Sponsors: American Airlines (official airline of AFI), Corporation for Public Broadcasting, NBCUniversal, VIZIO Screen Partners: Discovery Communications, HBO, Netflix Major Sponsors: Amtrak, The Annenberg Retreat at Sunnylands, CYM Media & Entertainment, Fledgling Fund, Maryland Film Office, SonicPool, Sony Contributing Sponsors: Downtown Silver Spring, International Documentary Association, Picture Motion Supporting Sponsors: Greater Silver Spring Chamber of Commerce, HSBC Bank USA, N.A. Major Media Sponsor: The Washington Post Official Media Sponsors: The Advocate, Screen International, Variety, The Wall Street Journal, WHUT-TV Affiliate Media Sponsors: Indiewire, WAMU 88.5 FM, WTOP 103.5 FM, Yelp Official Festival Underwriters: Stephanie and Hunter Hunt Major Festival Underwriters: Anonymous (2), Jarecki Family Foundation Official Hotels of AFI DOCS: Hotel George, Hotel Monaco
http://afidocspress.afi.com/press-releases/2015-press/afi-docs-announces-full-slate
2018-02-18T01:07:35
CC-MAIN-2018-09
1518891811243.29
[]
afidocspress.afi.com
classtools¶ Collection of small class-related utilities that will hopefully save you a tiny bit of grief, in the vein of itertools and functools. - class classtools. classproperty(desc, fget, fset=None, fdel=None)¶ Method decorator similar to @property, but called like a classmethod. class Square(object): @classproperty def num_sides(cls): return 4 Setting and deleting are not supported, due to the design of the descriptor protocol. If you need a class property you can set or delete, you need to create a metaclass and put a regular @propertyon it. This decorator is of questionable use for normal classes, but may be helpful for “declarative” classes such as enums. - class classtools. frozenproperty(fget)¶ Similar to the built-in @propertydecorator, but without support for setters or deleters. This makes it a “non-data” descriptor, which you can overwrite directly. Compare: class Cat(object): @property def num_legs(self): return 2 + 2 >>> cat = Cat() >>> cat.num_legs 4 >>> cat.num_legs = 5 ... AttributeError: can't set attribute Versus: class Cat(object): @frozenproperty def num_legs(self): return 2 + 2 >>> cat = Cat() >>> cat.num_legs 4 >>> cat.num_legs = 5 >>> cat.num_legs 5 classtools. keyed_ordering(cls)¶ Class decorator to generate all six rich comparison methods, based on a __key__method. Many simple classes are wrappers for very simple data, and want to defer comparisons to that data. Rich comparison is very flexible and powerful, but makes this simple case tedious to set up. There’s the standard library’s total_orderingdecorator, but it still requires you to write essentially the same method twice, and doesn’t correctly handle NotImplementedbefore 3.4. It also doesn’t automatically generate __ne__from __eq__, which is a common gotcha. With this decorator, comparisons will be done on the return value of __key__, in much the same way as the keyargument to sorted. For example, if you have a class representing a span of time: @keyed_ordering class TimeSpan(object): def __init__(self, start, end): self.start = start self.end = end def __key__(self): return (self.start, self.end) This is equivalent to the following, assuming 3.4’s total_ordering: @total_ordering class TimeSpan(object): def __init__(self, start, end): self.start = start self.end = end def __eq__(self, other): if not isinstance(other, TimeSpan): return NotImplemented return (self.start, self.end) == (other.start, other.end) def __ne__(self, other): if not isinstance(other, TimeSpan): return NotImplemented return (self.start, self.end) != (other.start, other.end) def __lt__(self, other): if not isinstance(other, TimeSpan): return NotImplemented return (self.start, self.end) < (other.start, other.end) The NotImplementedcheck is based on the class being decorated, so subclassses can still be correctly compared. You may also implement some of the rich comparison methods in the decorated class, in which case they’ll be left alone. - class classtools. reify(wrapped)¶ Method decorator similar to @property, except that after the wrapped method is called, its return value is stored in the instance dict, effectively replacing this decorator. The name means “to make real”, because some value becomes a “real” instance attribute as soon as it’s computed. The wrapped method is thus only called once at most, making this decorator particularly useful for lazy/delayed creation of resources, or expensive computations that will always have the same result but may not be needed at all. For example: class Resource(object): @reify def result(self): print('fetching result') return "foo" >>> r = Resource() >>> r.result fetching result 'foo' >>> r.result 'foo' >>> # result not called the second time, because r.result is now populated Because this is a “non-data descriptor”, it’s possible to set or delete the attribute: >>> r.>> r.result 'bar' >>> del r.result >>> r.result fetching result 'foo' Deleting the attribute causes the wrapped method to be called again on the next read. While it’s possible to take advantage of this to create a cache with manual eviction, the author strongly advises you not to think of this decorator as merely a caching mechanism. Strictly speaking, cache eviction should only ever affect performance, but consider the following: class Database(object): @reify def connection(self): return dbapi.connect(...) Here, reifyis used as lazy initialization, and its return value is a (mutable!) handle to some external resource. That handle is not cached in any meaningful sense: its permanence is guaranteed by the class. Having it transparently evicted and recreated would not only destroy the illusion that it’s a regular attribute, but completely break the class’s semantics. - class classtools. weakattr(name)¶ Descriptor that transparently wraps its stored value in a weak reference. Reading this attribute will never raise AttributeError; if the reference is broken or missing, you’ll just get None. To use, create a weakattrin the class body and assign to it as normal. You must provide an attribute name, which is used to store the actual weakref in the instance dict. class Foo(object): bar = weakattr('bar') def __init__(self, bar): self.bar = bar >>> class Dummy(object): pass >>> obj = Dummy() >>> foo = Foo(obj) >>> assert foo.bar is obj >>> print(foo.bar) <object object at ...> >>> del obj >>> print(foo.bar) None Of course, if you try to assign a value that can’t be weak referenced, you’ll get a TypeError. So don’t do that. In particular, a lot of built-in types can’t be weakref’d! Note that due to the __dict__twiddling, this descriptor will never trigger __getattr__, __setattr__, or __delattr__.
http://classtools.readthedocs.io/en/latest/
2018-02-18T00:44:35
CC-MAIN-2018-09
1518891811243.29
[]
classtools.readthedocs.io
fft_tools Package¶ image_registration.fft_tools.shift Module¶ Shift¶ Fourier-transform based shifting. scipy.fftpack.shift does about the same thing, but only in one dimension upsample Module¶ Fourier upsampling (or interpolation, scaling, zooming) is achieved via DFTs using a dot product rather than the usual fft, as there is (probably?) no way to perform FFTs with a different kernel. This notebook demonstrates 1-d Fourier upsampling.
http://image-registration.readthedocs.io/en/latest/image_registration.fft_tools.html
2018-02-18T00:46:19
CC-MAIN-2018-09
1518891811243.29
[]
image-registration.readthedocs.io
Source Locations¶ - class gccjit. Location¶ A gccjit.Location encapsulates a source code location, so that you can (optionally) associate locations in your language with statements in the JIT-compiled code, allowing the debugger to single-step through your language. You can construct them using gccjit.Context.new_location(). You need to enable gccjit.BoolOption.DEBUGINFOon the gccjit.Contextfor these locations to actually be usable by the debugger: ctxt.set_bool_option(gccjit.BoolOption.DEBUGINFO, True) gccjit.Location instances are optional; most API entrypoints accepting one default to None. Faking it¶ If you don’t have source code for your internal representation, but need to debug, you can generate a C-like representation of the functions in your context using gccjit.Context.dump_to_file(): ctxt.dump_to_file(b'/tmp/something.c', True) This will dump C-like code to the given path. If the update_locations argument is True, this will also set up gccjit.Location information throughout the context, pointing at the dump file as if it were a source file, giving you something you can step through in the debugger.
http://pygccjit.readthedocs.io/en/latest/topics/locations.html
2018-02-18T01:25:32
CC-MAIN-2018-09
1518891811243.29
[]
pygccjit.readthedocs.io
year. Prerequisites For information about the levels at which you can perform this procedure, and the modules, handlers, and permissions that are required to perform this procedure, see HTTP Response Headers Feature Requirements (IIS 7). Exceptions to feature requirements - None To configure the expires. Command Line" Important The data type for the httpExpires attribute of the <clientCache> element is string. Therefore, make sure that you type the correct format as a three-character day followed by a comma, then the date, a three-character month, the year, and time in hh:mm:ss, plus UTC. The whole value must be enclosed in quotation marks. For example, /clientCache.httpExpires:"Fri, 28 Jul 2006 15:30:00 UTC". For more information about Appcmd.exe, see Configure the HTTP Expires Response Header (IIS 7). Configuration The procedure in this topic affects the following configuration elements: <clientCache> element under <staticContent> For more information about IIS 7 configuration, see IIS Settings Schema on MSDN. WMI Use the following WMI classes, methods, or properties to perform this procedure: HttpClientCache class StaticContentSection.ClientCache.HttpExpires
https://docs.microsoft.com/en-us/previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/cc770661(v=ws.10)
2018-02-18T02:11:04
CC-MAIN-2018-09
1518891811243.29
[]
docs.microsoft.com
ARW Start is the latest legacy of minimalist innovation. The superb clean design emphasizes your fashion stuffs without unnecessary clutter or bloat. What makes it even more special is that the new generation and powerful of control panel can push your store to the limit with hundreds of customization options. ARW Start is a must-have item in your collection to build an incredible online store!:
http://docs.arw.tf/display/ARWSTARTUG/ARW+Start+User+Guide;jsessionid=3E10CC9F6F1992A748BEB17EFD751C67
2018-02-18T00:48:17
CC-MAIN-2018-09
1518891811243.29
[]
docs.arw.tf
We’ve been hard at work on a huge new feature for new Magento Theme and we’re excited to share a big move named ARW Leka. Introducing ARW Leka, Leka Block, and Blog extension,:
http://docs.arw.tf/pages/diffpagesbyversion.action?pageId=4489226&selectedPageVersions=2&selectedPageVersions=3
2018-02-18T00:47:53
CC-MAIN-2018-09
1518891811243.29
[]
docs.arw.tf
API Documentation A Developer's Best Friend Welcome to Gusto's API documentation. This site serves as both a technical reference for the endpoints available and a general overview of payroll. We designed the objects and their properties to require as little domain-specific payroll knowledge as possible. Getting Started Please be aware that Gusto is not accepting new integrations at the moment, although this may change in the future. Existing partners have been given API credentials. These include the application id and secret necessary to interact with any part of the Gusto API. Next, you'll want to successfully authenticate a user using OAuth. The Authentication Example has everything you need to get started. Payroll Basics Payroll in its entirety is rather complex, but the API is designed to shield as much complexity as possible from the end user, without sacrificing functionality. This section gives a birds-eye view of the objects that make up the Gusto system. Starting with an authenticated user, you will notice that they may be administrators for multiple companies. This is not uncommon, and your application should prepare for it. Accountants use Gusto to manage payroll for many companies simultaneously. Companies themselves are, naturally, a collection of one to hundreds of employees. Employee data, on the payroll side, is relatively static. Compensation information, addresses, and tax information changes rather infrequently once set. Companies can have multiple work locations, across multiple states, but everyone gets paid at the same time. Pay periods are the combination of a company, a subset of its employees, and a time range. Not every employee at a company will be a part of every payroll. One-off (or'off-cycle') payrolls are run for special events such as hiring or termination, and employees can be excluded from payrolls. Regular payrolls are tied to a specific pay periods, and all associated information - vacation & sick time, hours worked, bonuses, etc. - should be applied to that time range. By using the Gusto API, you are agreeing to the following terms and conditions.
http://docs.gusto.com/
2018-02-18T01:33:08
CC-MAIN-2018-09
1518891811243.29
[]
docs.gusto.com
Getting started with Castor In this section, you’ll find everything you need to get started with Castor in no time! Remember we’re always here to help – just drop us an email at [email protected]. Account To create an account, you will need either a Facebook account, a Google account or an email address and a password. To sign up, click on the Facebook or the Google icon or write your email address and your password in the appropriate fields and click on the Reset your password You don't remeber your password? It's okay click on Lost password? at the bottom of the form. Enter your email address in the Email field and click on the Recover password button. Check your inbox, we'll send you an email recovery link! If you want to log out, simply click on the Menu (square) icon on the top right corner of your dashboard in Editing mode and select TV and Editing Modes You can customize and edit your dashboard while on the Editing Mode, and display your dashboard on a screen using the TV Mode. When in Editing Mode, click on the green TV MODEbutton at the top left corner of the screen to exit Editing mode and switch to TV Mode. If you want to edit your dashboard while in TV Mode, click on the tiny Edit iconon the top right corner of the screen as shown on the Screenshot. Editing Mode Edit your dashboard At first, your dashboard is totally empty. You can add whatever content you want using the Widgets offered. Simply click on a Widget icon, fill in the required information and save the changes. You can resize the widgets as you want, using their bottom right borders. You can also move them by dragging them wherever you want on the dashboard. Add or remove lines and columns of your dashboard by clicking on the + and - buttons on the bottom right corner of the Edit window. Add a dashboard (PRO) If you suscribed to a Castor Pro plan, you can have unlimited dashboards. You can navigate between your dashboards using arrows situated at the top of the screen. To add a dashboard, simply click on the right arrow when you're on the last available dashboard – it'll be instantly created Delete a dashboard (PRO) You can only delete one of your dashboards all the widgets on that dashboard are deleted. Once your dashboard is empty, a Trash icon will appear next to the numbered dashboards. Click on the Trash icon to delete the dashboard. You cannot remove a dashboard if it's your last dashboard. TV Mode The TV Mode displays your dashboard on your screen. You can set your browser to Full Screen mode and zoom in or out to fit your dashboard to your screen. Dashboards transition (PRO) If you have several dashboards, you can make them appear one after the other, just like in a Slideshow. In Editing Mode, click on the Menu icon, on the top right corner. Select Playback settings and enable dashboard transitions. You can also choose the transition frequency using the Frequency drop down. Do not forget to Save your changes before leaving the window. Widgets Add, Edit and Remove a Widget To add a Widget, click on the its icon in the menu bar fill in the required fields. If you are satisified, click Save. To edit a widget, click the Edit button next to the widget title. To remove a widget, click the Edit button next to the widget title and select Remove. Widget types Clock The clock widget displays an analog or digital clock in the desired timezone. Add a clock widget on your dashboard using the orange Clock icon in the menu bar. Enter a name (ie. Montreal), choose between an analog or a digital display and select the appropriate time zone. Calendar The calendar widget allows you to display multiple calendars on your dashboard. Add a calendar widget on your dashboard using the red Calendar icon in the menu bar. To display a calendar, provide its ICS link in the URL field. You can change the color of your events by choosing between the colours provided. Add another calendar by pressing +. Good to know: ICS file is sometimes called ICAL file, depending on your Calendar Program. If you use Google Calendar, you’ll need the private ICAL URL of your Calendar File. Learn how to get that URL on the Google Support Pages. Countdown Using this widget, you can display a countdown to a specific date on your dashboard. Add a countdown widget on your dashboard using the white countdown icon in the menu bar. Enter a title and pick a date and a time by editing the appropriate field. Weather The weather widget always adds a fun and nice touch to any dashboard. Add a weather widget on your dashboard using the pink weather icon in the menu bar. Click on the Weather icon, enter the location name and its geographic coordinates. You can use the built in geolocation module to find your geographic coordinates. Don't forget to set the right temperature unit - Celsius or Fahrenheit. Custom Table See Custom Table section in Data Sources. Custom Frame The custom frame widget allows you to display any web page on your Castor dashboard. It's really useful if you want to create and host your own widgets! Add a custom frame widget on your dashboard using the blue "link" icon in the menu bar. You will need an https address to enter in the widget settings, as most modern web browsers will disable frames linking to a non-secure page from a secure page. Custom Text The custom text widget will display... a custom text! Use it to display dashboard titles, or information like visitors/users count, etc. Add a custom text widget on your dashboard using the green document icon in the menu bar. Please note that text will auto-resize based on its length to fit the widget. Custom Chart See Custom Chart section in Data Sources. RSS The RSS widget allows you to display multiple RSS or Atom feeds by aggregating them into one list. Add an RSS widget on your dashboard using the red RSS icon in the menu bar. Enter your feeds addresses, and select a matching colors: article titles from a feed will be displayed with the matching color to help you identify articles sources.
https://docs.getcastor.com/getting-started/
2018-02-18T00:44:26
CC-MAIN-2018-09
1518891811243.29
[array(['../img/editing-mode.png', 'Editing Mode icon'], dtype=object)]
docs.getcastor.com
Introduction Welcome to the Zip-Tax.com Sales Tax API By. Getting Started Request header requirement curl --header "Accept:application/json". API Subscription Types General API The general Zip-Tax.com sales tax API allows jurisdiction lookups using any combination of zip code, city, and state. This API level does not provide full address level lookup and only provides county data via response. Note when using this method, multiple response values may be returned where multiple tax jurisdictions match the query inputs. Geo API (address level) The GEO API version of Zip-Tax.com allows queries with full address lookup. This method returns only a single response with the address level sales tax jurisdiction in the response. This is the recommended subscription type for use with our API. Request Base URL The API request URL is used to form your request to the API from your application. The base request URL consists of three parts. HTTP Request Base URL Example curl --header "Accept:application/json" GET Query Parameters (body data) Additional Query Parameters (requires geo plan) Full Request Example (with query parameters) Request Example with Query Params curl --header "Accept:application/json" This endpoint returns a sample request. GET Response Codes The Zip-Tax.com API returns the following response codes based on request results. Response Results Sample Response (json) { "version": "v30", "rCode": 100, "results": [ { "geoPostalCode": "90264", "geoCity": "MALIBU", "geoCounty": "LOS ANGELES", "geoState": "CA", "taxSales": 0.0925, "taxUse": 0.0925, , "districtUseTax": 0.03 } ] } Support For questions or comments please contact us via email at: [email protected].
http://docs.zip-tax.com/
2018-02-18T00:47:20
CC-MAIN-2018-09
1518891811243.29
[]
docs.zip-tax.com
JInstallerLanguage::discover install_install Description Custom discover install method Basically updates the manifest cache and leaves everything alone. Description:JInstallerLanguage::discover install [Edit Descripton] public function discover_install () - Returns - Defined on line 543 of libraries/joomla/installer/adapters/language.php See also JInstallerLanguage::discover_install source code on BitBucket Class JInstallerLanguage Subpackage Installer - Other versions of JInstallerLanguage::discover_install SeeAlso:JInstallerLanguage::discover install [Edit See Also] User contributed notes <CodeExamplesForm />
https://docs.joomla.org/index.php?title=API17:JInstallerLanguage::discover_install&oldid=96235
2016-02-06T09:42:59
CC-MAIN-2016-07
1454701146241.46
[]
docs.joomla.org
VolumeAttachment Description Describes volume attachment details. Contents - attachTime The time stamp when the attachment initiated. Type: DateTime Required: No - volumeId The ID of the volume. Type: String Required: No
http://docs.aws.amazon.com/AWSEC2/latest/APIReference/API_VolumeAttachment.html
2016-02-06T09:03:45
CC-MAIN-2016-07
1454701146241.46
[]
docs.aws.amazon.com
Difference between revisions of "Start Here" From Joomla! Documentation Latest revision as of 14:35, 29 July 2012.
https://docs.joomla.org/index.php?title=Help25:Start_Here&diff=prev&oldid=69835
2016-02-06T09:22:36
CC-MAIN-2016-07
1454701146241.46
[]
docs.joomla.org
Information for "Access Control System In Joomla 1.6" Basic information Display titleAccess Control System In Joomla 1.6 Redirects toArchived:Access Control System In Joomla 1.6 (info) Default sort keyAccess Control System In Joomla 1.6 Page length (in bytes)58 Page ID29:49, 27 May 2013 Latest editorTom Hutchison (Talk | contribs) Date of latest edit07:49, 27 May 2013 Total number of edits1 Total number of distinct authors1 Recent number of edits (within past 30 days)0 Recent number of distinct authors0 Retrieved from ‘’
https://docs.joomla.org/index.php?title=Access_Control_System_In_Joomla_1.6&action=info
2016-02-06T10:30:55
CC-MAIN-2016-07
1454701146241.46
[]
docs.joomla.org
Add this function in a subclass to get a notification when a model has completed importing. This lets you modify the imported Game Object, Meshes, AnimationClips referenced by it.Model that references meshes in the imported fbx file. root is the root game object of the imported model. // Adds a mesh collider to each game object that contains collider in its name class ColliderOnName extends AssetPostprocessor { function OnPostprocessModel (g : GameObject) { Apply(g.transform); } function Apply (transform : Transform) { if (transform.name.ToLower().Contains("collider")) transform.gameObject.AddComponent.<MeshCollider>(); // Recurse for (var child in transform) Apply(child); } }
http://docs.unity3d.com/ScriptReference/AssetPostprocessor.OnPostprocessModel.html
2016-02-06T09:03:03
CC-MAIN-2016-07
1454701146241.46
[]
docs.unity3d.com
Changes related to "Category:Tips and tricks 1.5" ← Category:Tips and tricks 1.5 This is a list of changes made recently to pages linked from a specified page (or to members of a specified category). Pages on your watchlist are bold. 4 February 2016 16:57Understanding Output Overrides (diff; hist; 0) Cmb
https://docs.joomla.org/index.php?title=Special:RecentChangesLinked&limit=50&target=Category%3ATips_and_tricks_1.5
2016-02-06T10:01:21
CC-MAIN-2016-07
1454701146241.46
[array(['/extensions/CleanChanges/images/Arr_.png', None], dtype=object) array(['/extensions/CleanChanges/images/showuserlinks.png', 'Show user links Show user links'], dtype=object) ]
docs.joomla.org
Difference between revisions of "Where do I find web page diagnostic tools?" From Joomla! Documentation Redirect page Revision as of 20:18, 22 June 2013 (view source)Tom Hutchison (Talk | contribs)m (added Category:Template Reference using HotCat)← Older edit Latest revision as of 07:07, 23 June 2013 (view source) Tom Hutchison (Talk | contribs) m (redirect) (One intermediate revision by the same user not shown)Line 1: Line 1: −The following diagnostic tools may prove useful when developing templates.+#REDIRECT [[Web page diagnostic tools]] −{{:Diagnostic tools}}<noinclude>+<noinclude> [[Category:Template FAQ]] [[Category:Template FAQ]] [[Category:Template Development FAQ]] [[Category:Template Development FAQ]] [[Category:Template Reference]] [[Category:Template Reference]] </noinclude> </noinclude> Latest revision as of 07:07, 23 June 2013 Web page diagnostic tools Retrieved from ‘’ Categories: Template FAQTemplate Development FAQTemplate Reference
https://docs.joomla.org/index.php?title=Where_do_I_find_web_page_diagnostic_tools%3F&diff=100922&oldid=100870
2016-02-06T10:39:47
CC-MAIN-2016-07
1454701146241.46
[]
docs.joomla.org
Article merge requests From Joomla! Documentation Revision as of 20:39, 1 February 2013 by Tom Hutchison (Talk | contribs) Articles and/or pages marked for merge. Ideally, this category should remain empty, please verify the listed items are still being discussed. If older than 1 week, proceed with merging them into the suggested article. Pages in category ‘Article merge requests’ The following 7 pages are in this category, out of 7 total.
https://docs.joomla.org/index.php?title=Category:Article_merge_requests&oldid=80346
2016-02-06T09:41:53
CC-MAIN-2016-07
1454701146241.46
[]
docs.joomla.org
Difference between revisions of "Inserting a list into an Article" From Joomla! Documentation Revision as of 13:15,}}. Numbered and un-numbered lists are a very common way of presenting information. To add a list to an article. - Open the article for editing either by: - Opening the Article Manager, selecting the article and clicking the Edit toolbar button or, - Clicking the Add New Article button in the Control Panel. - Locate the position in the article where you want to insert a list with the cursor. - Choose either the Numbered or Unnumbered list button on the editor toolbar. - The default numbered list starts with 1. and the unnumbered list starts with a bullet point. - Type enter to create a new line and number/bullet. - Type enter twice to finish the list or start a new line and click the Numbered List or Unnumbered List button. Note the following: - Change the list type part way through by clicking the alternate button. - The numbering will restart in a numbered list if you create a new list later in your article. - Use the indent controls to create child lists. You may change the type of this indented list by clicking the alternat button.
https://docs.joomla.org/index.php?title=Inserting_a_list_into_an_Article&diff=8153&oldid=7920
2016-02-06T10:29:50
CC-MAIN-2016-07
1454701146241.46
[]
docs.joomla.org
Editor Overview Thank you for choosing Telerik RadEditor for ASP.NET AJAX! RadEditor for ASP.NET AJAX is the successor for the well-known industry standard Editor for ASP.NET. The tight integration with ASP.NET AJAX and powerful new capabilities of the suite features the new WYSIWYG Editor as a flexible and lightweight component, turning it into the fastest loading Web Editor. Among the hottest features are: Unmatched loading speed Minimal script size New semantic rendering Out-of-the-box XHTML-enabled output Industry-best cross-browser support Single-file, drag-and-drop deployment (all editor resources, including the dialogs reside in the same DLL) Multilevel undo/redo with action trails 7 ways to paste from Word AJAX-based file browser dialogs Full keyboard accessibility Flexible skinning mechanism Simplified and intuitive toolbar configuration Ability to have editors with different skins on the same page
http://docs.telerik.com/devtools/aspnet-ajax/controls/editor/overview
2016-02-06T09:12:54
CC-MAIN-2016-07
1454701146241.46
[array(['images/editor-productlogolight.gif', None], dtype=object) array(['images/radeditorpreview.png', None], dtype=object)]
docs.telerik.com
Changes related to "Upgrading from an existing version" ← Upgrading from an existing version This is a list of changes made recently to pages linked from a specified page (or to members of a specified category). Pages on your watchlist are bold. No changes during the given period matching these criteria.
https://docs.joomla.org/index.php?title=Special:RecentChangesLinked&from=20121115105243&target=Upgrading_from_an_existing_version
2016-02-06T10:06:18
CC-MAIN-2016-07
1454701146241.46
[]
docs.joomla.org
Global Warming Document. - glo_09091601b.pdf - NEMS-NRDC_Results_of_ACES.xls NEMS-NRDC runs were conducted by OnLocation, Inc., and commissioned by the Natural Resources Defense Council as part of its effect to model the economic impact of the American Clean Energy and Security Act (ACES). - MARKAL_Results_of_ACES.xls MARKAL runs were conducted by International Resources Group, and commissioned by the Natural Resources Defense Council as part of its effect to model the economic impact of the American Clean Energy and Security Act (ACES). - glo_09101501a.pdf NRDC responses to the House Energy and Commerce Committee on modeling assumptions, November, 2009 - glo_10031101a.pdf Technical Appendix: A Clean Energy Bargain: More Jobs, Less Global Warming Pollution, and Greater Security for Less Than the Cost of a Postage Stamp
http://docs.nrdc.org/globalWarming/glo_09091601.asp
2016-02-06T08:59:46
CC-MAIN-2016-07
1454701146241.46
[]
docs.nrdc.org
Menus Menu Item User Password Reset From Joomla! Documentation Revision as of 15:05, 2 January 2013 by Tom Hutchison (Talk | contribs).> User Password Reset shown:
https://docs.joomla.org/index.php?title=Help33:Menus_Menu_Item_User_Password_Reset&direction=prev&oldid=79706
2016-02-06T09:50:58
CC-MAIN-2016-07
1454701146241.46
[]
docs.joomla.org
A joint venture is a relationship between two or more people who combine their labor or property for a single business under¬taking. They share profits and losses equally, or as otherwise provided in the joint venture agreement. The single business undertaking aspect is a key to determining whether or not a business entity is a joint venture as opposed to a partnership. Get Unlimited Access to Our Complete Business Library Plus
http://premium.docstoc.com/docs/26395886/Joint-Venture-Agreement
2013-12-05T08:07:54
CC-MAIN-2013-48
1386163041955
[]
premium.docstoc.com
: ). . Edit. .
http://docs.codehaus.org/pages/viewpage.action?pageId=182780030
2013-12-05T07:57:55
CC-MAIN-2013-48
1386163041955
[array(['/download/attachments/114786474/quality-profiles.jpg?version=1&modificationDate=1287150134688&api=v2', None], dtype=object) array(['/download/attachments/114786474/quality_profiles1.png?version=1&modificationDate=1259272728946&api=v2', None], dtype=object) array(['/download/attachments/114786474/create_profile1.png?version=1&modificationDate=1259272728883&api=v2', None], dtype=object) array(['/download/attachments/114786474/quality_profiles.png?version=1&modificationDate=1259274412397&api=v2', None], dtype=object) array(['/download/attachments/114786474/configrules.png?version=1&modificationDate=1259272826132&api=v2', None], dtype=object) array(['/download/attachments/114786474/projectprofiles.png?version=1&modificationDate=1259272917624&api=v2', None], dtype=object) array(['/download/attachments/114786474/coding_rules1.png?version=1&modificationDate=1259274720698&api=v2', None], dtype=object) ]
docs.codehaus.org
Description / Features This plugin enables the analysis of Python projects. It is compatible with the Sonar Eclipse plugin to track issues while coding. It is also compatible with the Issues Report plugin to run pre-commit local analysis. Version 1.2 (unreleased) (4 issues) Version 1.1 (12 issues) Version 1.0 (26 issues) Version 0.1 (5 issues)
http://docs.codehaus.org/pages/viewpage.action?pageId=231081640
2013-12-05T07:57:46
CC-MAIN-2013-48
1386163041955
[]
docs.codehaus.org
) I moved you to the Editors group. Try it now. Chris Davenport 23:36, 23 December 2008 (UTC))... Hi Chris, You just deleted the user who created this spammy page - but not the page itself :P Link:Need_To_Read_Shed_Buying_Suggestions best, George --Wilsonge (talk) 11:30, 21 February 2013 (CST)
http://docs.joomla.org/index.php?title=User_talk:Chris_Davenport&oldid=81865
2013-12-05T08:01:38
CC-MAIN-2013-48
1386163041955
[]
docs.joomla.org
() The") Options) For more extensive information on the packer and the options that it can take, see the man pages and page 183 of John Ousterhout’s.
http://docs.python.org/3.3/library/tkinter.html
2013-12-05T07:56:37
CC-MAIN-2013-48
1386163041955
[]
docs.python.org
Table of Contents the section called “Embedding A Flow On A Page” and the section called “Embedding a Flow On a Page”. Support for the JSR-303 Bean Validation API is now available building on equivalent support available in Spring MVC. See the section called “Validating a model” for more details. Starting with Web Flow 2.3 a flow managed PersistenceContext is automatically extended (propagated) to sub-flows assuming the subflow also has the feature enabled as well. See the section called 2 applications. See the section called
http://docs.spring.io/spring-webflow/docs/current/spring-webflow-reference/html/ch02.html
2013-12-05T07:58:07
CC-MAIN-2013-48
1386163041955
[]
docs.spring.io
. Satya new project sector-102 gurgaon 9911312936 By s_saini9351 on September 17, 2013, 49 views, 0 comments Tags: satya new project, satya new project in gurgaon, real estate projects, new projects in gurgaon, gurgaon projects ATS new projects call 9911312936 By s_saini9351 on September 17, 2013, 56 views, 0 comments Tags: ats new projects, ats property, ats noida, real estate projects, ats projects in noida, ats projects in gurgaon, ATS marigold, ATS allure, ats almond, ats one hamlet, ats kocoon, ats village, ats tourmaline Cashtastic Money System - ZERO OUT OF POCKET COST DAILY INCOME By souhaibe_jme on June 14, 2013, 102 views, 0 comments Tags: Cashtastic, money, system, Make, earn, Income, How, To, real, proof, review, znz, make money online, ways to make money, ways to earn money for free, make money online on 2013, make money fast Toronto cleaning services Specialists in Real Estate Cleaning By brilhoservices2012 on July 20, 2012, 221 views, 7 comments China Baby Food and Infant Formula Market Research Report Outlook to 2016 By bharatbookseo on July 16, 2012, 253 views, 6 comments Tags: china, baby food, cereals, Juices, food, Market Research Reports All About New Hampshire Real Estate By henryjohn34 on July 16, 2012, 175 views, 0 comments Tags: NH real estate, buy NH real estate All About New Hampshire Real Estate By henryjohn34 on July 16, 2012, 175 views, 0 comments Tags: NH real estate, buy NH real estate Cleaning Services Toronto about Real Cleaned Homes By brilhoservices2012 on June 23, 2012, 244 views, 0 comments Tags: Cleaned, real, Toronto Top 20 Contract Research Organizations (CRO) - Asia-Pacific, Especially India and China By bharatbookseo on June 14, 2012, 223 views, 0 comments Tags: contract, real estate, Construction, Asia Pacific, India, Market Research Reports Baby Food and Infant Formula Market in China-Outlook to 2016 By 3271886 on June 4, 2012, 238 views, 7 comments Tags: Yilli and Yashili, Nestle, Abbott, Wyeth, Beingmate, Danone, Mead Johnson, canned baby food and snacks, bottled baby food, cereals, ready-to-eat baby food and juices, dried baby food, infant formula, baby food
http://docs.thinkfree.com/docs/?selSrchType=tag&q=real
2013-12-05T07:56:53
CC-MAIN-2013-48
1386163041955
[]
docs.thinkfree.com
. ... - Scala and Maven - Maven Day at Intuit (Thursday October 9th) - Maven Patch Day - Getting Started with Maven - - OSS 计算技术 - HAWEBS.NET - Maven Wiki (Maven 中文维基). ...
http://docs.codehaus.org/pages/diffpagesbyversion.action?pageId=37177&originalVersion=62&revisedVersion=70
2013-12-05T07:57:48
CC-MAIN-2013-48
1386163041955
[]
docs.codehaus.org
“Descriptors” are objects that describe some attribute of an object. They are found in the dictionary of type objects. The type object for the built-in descriptor types. Return true if the descriptor objects descr describes a data attribute, or false if it describes a method. descr must be a descriptor object; there is no error checking.
http://docs.python.org/release/3.2.5/c-api/descriptor.html
2013-12-05T07:59:08
CC-MAIN-2013-48
1386163041955
[]
docs.python.org
New in version 2.3. The datetime module supplies classes for manipulating dates and times in both simple and complex ways. While date and time arithmetic is supported, the focus of the implementation is on efficient member extraction for output formatting and manipulation. There are two kinds of date and time objects: ``naive'' and ``aware''. This distinction refers to whether the object has any notion of time zone, daylight saving time, or other kind of algorithmic or political time adjustment. Whether a naive datetime object represents Coordinated Universal Time (UTC), local time, or time in some other timezone is purely up to the program, just like it's up to the program whether a particular number represents metres, miles, or mass. Naive datetime objects are easy to understand and to work with, at the cost of ignoring some aspects of reality. For applications requiring more, datetime and time objects have an optional time zone information member, tzinfo, that can contain: 1. 9999. See Also:
http://docs.python.org/release/2.5/lib/module-datetime.html
2013-12-05T08:08:52
CC-MAIN-2013-48
1386163041955
[]
docs.python.org
Administrative Job Summary Report Overview The Administrative Job Summary Report displays information about all administrative jobs that ran in the CommCell during the specified time period. Last modified: 3/2/2018 1:08:23 PM
http://docs.commvault.com/commvault/v11/article?p=39464_1.htm
2020-02-17T10:12:31
CC-MAIN-2020-10
1581875141806.26
[]
docs.commvault.com
public class SocketHandler extends StreamHandler LogRecords are published to a network stream connection. By default the XMLFormatter class is used for formatting. Configuration: By default each SocketHandler is initialized using the following LogManager configuration properties where <handler-name> refers to the fully-qualified class name of the handler. If properties are not defined (or have invalid values) then the specified default values are used. For example, the properties for SocketHandler would be: For a custom handler, e.g. com.foo.MyHandler, the properties would be: The output IO stream is buffered, but is flushed after each LogRecord is written. SocketHandler() throws IOException IllegalArgumentException- if the host or port are invalid or are not specified as LogManager properties. IOException- if we are unable to connect to the target host and port. public SocketHandler(String host, int port) throws IOException host- target host. port- target port. IllegalArgumentException- if the host or port are invalid. IOException- if we are unable to connect to the target host and port. public void close() throws SecurityException closein class StreamHandler SecurityException- if a security manager exists and if the caller does not have LoggingPermission("control"). public void publish(LogRecord record) publishin class StreamHandler record- description of the log event. A null record is silently ignored and is not.
http://docs.cs.up.ac.za/docs/jdk/java/util/logging/SocketHandler.html
2020-02-17T09:47:44
CC-MAIN-2020-10
1581875141806.26
[]
docs.cs.up.ac.za
To create a printable key, either paste the contents of your keyfile or a key export in the text field below, or select a key export file. To create a key export use borg key export /path/to/repository exportfile.txt If you are using keyfile mode, keyfiles are usually stored in $HOME/.config/borg/keys/ You can edit the parts with light blue border in the print preview below by click into them. Key security: This print template will never send anything to remote servers. But keep in mind, that printing might involve computers that can store the printed image, for example with cloud printing services, or networked printers. borg key import /path/to/repo scannedfileOr run borg key import --paper /path/to/repoand type in the text below.
https://borgbackup.readthedocs.io/en/stable/paperkey.html
2020-02-17T10:06:31
CC-MAIN-2020-10
1581875141806.26
[]
borgbackup.readthedocs.io
Project Online Desktop Client or Visio Online Plan 2 (previously named Visio Pro for Office 365), if you have a subscription plan that includes those products. The Office Deployment Tool, which is available on the Microsoft Download Center. You can download the Office 365 ProPlus software to your local network by using the Office Deployment Tool. Any supported version of Office 365 ProPlus. A supported version of RDS or Windows with Office 365 ProPlus, which includes any of the following: - Windows 8.1 - Windows Server 2016 - Currently supported Windows 10 SAC release a client operating system image, such as one running Windows 8.1 or Windows 10.. Related topics Overview of shared computer activation for Office 365 ProPlus Troubleshoot issues with shared computer activation for Office 365 ProPlus Remote Desktop Services in Windows Server 2008 R2 Remote Desktop Services Overview (Windows Server 2012 and Windows Server 2012 R2) Feedback
https://docs.microsoft.com/en-us/DeployOffice/deploy-office-365-proplus-by-using-remote-desktop-services
2020-02-17T10:37:30
CC-MAIN-2020-10
1581875141806.26
[]
docs.microsoft.com
System. Threading. Tasks Namespace The System.Threading.Tasks namespace provides types that simplify the work of writing concurrent and asynchronous code. The main types are Task which represents an asynchronous operation that can be waited on and cancelled, and Task<TResult>, which is a task that can return a value. The TaskFactory class provides static methods for creating and starting tasks, and the TaskScheduler class provides the default thread scheduling infrastructure.
https://docs.microsoft.com/en-us/dotnet/api/system.threading.tasks?view=netcore-2.2
2020-02-17T11:01:38
CC-MAIN-2020-10
1581875141806.26
[]
docs.microsoft.com
TowerCoverage Integration Splynx has ability to use Towercoverage to help you understand where your existing and potential clients are located. Towercoverage integration is a part of the Self Registration add-on. That's why you have to install Self Registration add-on first. After installation open add-on settings - Config / Integrations / Modules list Enable Towercoverage: Add customer to Towercoverage - when the customer registers via Self Registration, his coordinates will appear in the Towercoverage portal. It is necessary to have Towercoverage account. You can register it here - Copy Towercoverage Account Id and Account key to Splynx. Then, create Multi-coverage map (aka Multimap), open it and copy it's ID to Splynx. You can find ID of the Mutimap in your browser. It will be the last part of the URL. Finally, enter the country code (where you create Multimap), and save the settings. You can see the list of country codes here - When customer registers his account and Towercoverage integration is enabled, then Street and City fields are required to fill. Street and City values entered by the customer will be transferred to Towercoverage. Towercoverage will try to translate Street and City to geographical coordinates and if it is possible - customer will be added to the Towercoverage portal.
https://docs.splynx.com/addons_modules/towercoverage/towercoverage.md
2020-02-17T10:21:25
CC-MAIN-2020-10
1581875141806.26
[array(['http://docs.splynx.com/images/get?path=en%2Faddons_modules%2Ftowercoverage%2FModules_list.png', 'Modules_list.png'], dtype=object) array(['http://docs.splynx.com/images/get?path=en%2Faddons_modules%2Ftowercoverage%2FModule_edit.png', 'Module_edit.png'], dtype=object) array(['http://docs.splynx.com/images/get?path=en%2Faddons_modules%2Ftowercoverage%2Ftower_enable.png', 'tower_enable.png'], dtype=object) array(['http://docs.splynx.com/images/get?path=en%2Faddons_modules%2Ftowercoverage%2Ftower_register.png', 'tower_register.png'], dtype=object) array(['http://docs.splynx.com/images/get?path=en%2Faddons_modules%2Ftowercoverage%2Ftower_API.png', 'tower_API.png'], dtype=object) array(['http://docs.splynx.com/images/get?path=en%2Faddons_modules%2Ftowercoverage%2Ftower_API2.png', 'tower_API2.png'], dtype=object) array(['http://docs.splynx.com/images/get?path=en%2Faddons_modules%2Ftowercoverage%2Ftower_multimap.png', 'tower_multimap.png'], dtype=object) array(['http://docs.splynx.com/images/get?path=en%2Faddons_modules%2Ftowercoverage%2Ftower_country.png', 'tower_country.png'], dtype=object) array(['http://docs.splynx.com/images/get?path=en%2Faddons_modules%2Ftowercoverage%2Ftower_registration.png', 'tower_registration.png'], dtype=object) ]
docs.splynx.com
Group 65 Go to Staffomatic by Easypep All Collections Staffomatic Help Center Locations How do I create a new location? How do I create a new location? Written by Claas Babendererde Updated over a week ago In order to create a new location you have to click the '+' icon in the location overview: Did this answer your question?
https://docs.staffomatic.com/en/articles/885887-how-do-i-create-a-new-location
2020-02-17T09:42:17
CC-MAIN-2020-10
1581875141806.26
[]
docs.staffomatic.com
Apache Module: MPM ITK Overview The mod_mpm_itk Apache module causes the Apache process to switch to the domain owner’s user identifier (UID) and group identifier (GID) before it responds to the request. This allows each user to isolate their files from others with the standard file permission settings. To query all of the SETUID and SETGID values on a server, run the following command: find / -type f \( -perm -04000 -o -perm -02000 \) \-exec ls -lg {} \; Usage Use this module only if you run modules that do not require thread-aware code. Requirements This module requires EasyApache 4, Apache 2.4, MPM Prefork, and the CGI PHP handler. We strongly recommend that you only install the mod_mpm_itk Apache module on a system that runs CentOS 7 with Secure Computing Mode (seccomp v2) enabled in the kernel. The mod_mpm_itk Apache module will run on CentOS 6, but will not be as secure. Compatibility The MPM ITK module is not compatible with the following functions: - mod_http2 - mod_ruid2 - mod_userdir - EAccelerator - Mod suPHP - CloudLinux’s™ PHP Selector feature - cPanel’s Leech Protection feature (cPanel >> Home >> Security >> Leech Protection) If you select the MPM ITK option, we strongly recommend that you remove the Leech Protection feature from your users' feature lists. Use WHM's Feature Manager interface (WHM >> Home >> Packages >> Feature Manager) to change your users' feature lists. setuid() and setgid() restrictions The MPM ITK Apache module implements restrictions on the use of the setuid() function and the setgid() function. As a result, scripts that depend on these functions may encounter problems. This includes scripts that use the mail() function, the shell_exec function, or the sudo command. You can resolve these restrictions with one of the following methods: - Do not use the MPM ITK Apache module. - Update your script to no longer require escalated privileges. Turn off the security and allow users to execute scripts as the rootuser. You can allow users with UID or GID between 0and 4294496296to bypass security if you add the following code to your /etc/apache2/conf.d/includes/pre_virtualhost_global.conffile.Warning: We strongly recommend that you do not enable rootprivileges for your users. This action has major security implications and could endanger your server. How to install or uninstall the module The cPanel Default + MPM ITK EasyApache 4 profile contains the mod_mpm_itk Apache module by default. In the interface The easiest way to install or uninstall the mod_mpm_itk Apache module is with WHM’s EasyApache 4 interface (WHM >> Home >> Software >> EasyApache 4). On the command line Install the module You must manually uninstall MPM Worker and install MPM Prefork in order for the MPM ITK module to work correctly. You must perform the following steps on the command line before you install the MPM ITK module: To install the mod_mpm_itk Apache module, run the following command on the command line: yum install ea-apache24-mod_mpm_itk Uninstall the module To uninstall the mod_mpm_itk Apache module, run the following command on the command line: yum remove ea-apache24-mod_mpm_itk
https://docs.cpanel.net/ea4/apache/apache-module-mpm-itk/
2020-02-17T08:56:31
CC-MAIN-2020-10
1581875141806.26
[]
docs.cpanel.net
Sketch2D Custom Component is not related to a Wall, Opening, or Slab boundary. Severity Crucial. Detailed Description The Sketch2D Custom Component is not related to a wall, opening, or slab boundary. The object can be deleted using the Clean Database test command. Possible Cause In previous versions of the software, some scenarios in Place commands may have generated an orphan object. Possible Impacts No impact. What You Should Do Open the model. Run the Clean Database command to delete the object.
https://docs.hexagonppm.com/reader/jOiy0DET2ma7Jbl8eDiV7A/EsgorNzW5SugBuc9PplCZQ
2020-02-17T09:01:07
CC-MAIN-2020-10
1581875141806.26
[]
docs.hexagonppm.com