url
stringlengths 13
4.35k
| tag
stringclasses 1
value | text
stringlengths 109
628k
| file_path
stringlengths 109
155
| dump
stringclasses 96
values | file_size_in_byte
int64 112
630k
| line_count
int64 1
3.76k
|
|---|---|---|---|---|---|---|
http://www.ibm.com/developerworks/websphere/library/techarticles/1007_behl/1007_behl.html
|
code
|
Editor's note: Know a lot about this topic? Want to share your expertise? Participate in the IBM Lotus software wiki program today.
“To measure is to know. If you cannot measure it, you cannot improve it.” -- Lord Kelvin
At the core of WebSphere Portal effectiveness is the ability to gauge that the portal is fulfilling its objectives and to measure that planned improvements on the portal have their desired impact. In practice, however, measuring portal effectiveness is a gray area. Often portal sites lack the the tools, the techniques, and the empirical metrics needed for meaningful measurement.
This article describes the available tools and technologies that you can use to monitor portal usage, including WebSphere Portal site analytics, IBM Lotus® Web Content Management rendering portlet analytics, WebSphere Portal personalization logging, and various open source and commercial offerings.
This article also compares these tools and technologies, providing usage guidelines in various scenarios and the design patterns and best practices for tracking portal usage.
The article also address how to interpret portal usage statistics to build quantitative portal effectiveness scores through a number of techniques and examples. These techniques enable mappings across the usage statistics, the prioritized portal objectives, and the nature of portal usage.
Finally, it wraps up by illustrating how to analyze the WebSphere Portal effectiveness scores for determining the next steps that you can take to improve effectiveness.
To get the most from this article, you should have at least have a basic understanding of the concepts and the use of WebSphere Portal and, preferably, some real-life experience with how the WebSphere Portal affects various constituencies within the organization.
This article can be helpful to anyone working in WebSphere Portal management, particularly with respect to administrative and organizational aspects.
Measuring effectiveness: An overview
A portal is often perceived to provide significant benefits, but frequently these benefits are thought to be intangible. This article demonstrates how to assess, quantify, and assign impact to those benefits.
The measurement of portal effectiveness can be viewed conceptually as the difference between having the portal available and not having a portal available. This measurement incorporates the impact that WebSphere Portal can have on multiple communities and its overall benefits to the organization.
Table 1 illustrates the typical portal constituencies and their potential benefits.
Table 1. Portal constituencies and their impact
|Portal constituencies||Overall benefits|
|Help desk team|
The process for measuring WebSphere Portal effectiveness consists of: these tasks:
- Monitoring usage and satisfaction
- Determining key impact criteria and priorities to construct metrics
- Building the WebSphere Portal value model
Figure 1 illustrates this process.
Figure 1. Strategy for measuring portal effectiveness
Tracking portal usage and satisfaction
After the portal is live, there are important questions to address as to whether the portal is meeting its expectations and how it's being used:
- How satisfied are the users with the portal?
- What are the most frequent user complaints about the portal? Are the complaints growing, steady, or declining?
- How many users are accessing the portal and when is the peak usage? Is the usage growing, steady, or declining?
- What are the profiles of the users who access the portal most frequently? How much time do the users spend on the Dashboard page? Can user activity be correlated with their profiles or with any known external events?
- What is the average time for a content item to get stale? What is the average number of search queries for users to find what they're looking for?
- What WebSphere Portal applications and functions do users access the most?
There is no single means to answer these questions; rather, they can be addressed through a composite of techniques. Table 2 describes some of the available techniques.
Table 2. Techniques to track WebSphere Portal usage and satisfaction
|Technique||Description||When to use|
|Server-side site analytics (based on site analytics file analysis)||For portal sites requiring visibility into the user behaviors but not requiring any real-time feedback.|
|Real-time active analytics||For e-commerce sites supporting user campaigns.|
|Feedback database||For sites actively supporting user personalization.|
|User satisfaction surveys||All sites.|
|User complaint tracking||Sites supporting an active user help desk.|
|Observations on live portal usage||Mission-critical sites.|
Figure 2 shows a snippet of the WebSphere Portal site analytics log file for server-side analytics.
Figure 2. Log file snippet
Refer to the developerWorks® article, “IBM WebSphere Developer Technical Journal: 'Using portal analytics with open-source reporting tools',” for open source-tool approaches to processing the log file to generate usage reports. These reporting tools provide a low-cost means to gain insights into both the overall portal web-traffic characteristics and the portions of the portal that are being used heavily.
There are also more advanced commercial products available to perform real-time monitoring of WebSphere Portal and to deliver on a dashboard the detailed analysis of portal activity. Some examples of vendors that offer such products are Webtrends and Coremetrics, as discussed in the paper, “IBM WebSphere Portal version 6.1.5 Tracking and Reporting Using Webtrends.”
Five-step process for measuring effectiveness
WebSphere Portal usage and satisfaction data can be correlated against business goals to determine effectiveness. This correlation can be viewed as a five-step process:
- Map business goals to their supporting WebSphere Portal capabilities.
- Develop WebSphere Portal capabilities into design artifacts that can lead to specific portal activities to be monitored.
- Assign impact formulas to the monitored WebSphere Portal activities based on the traffic and associated business value.
- Construct impact ratios based on anticipated impact and measured impact.
- Develop an overall effectiveness ranking based on multiple criteria, including impact ratios, user satisfaction surveys, problem reports, and usability studies.
Figure 3 illustrates these five steps.
Figure 3. Model for measuring portal effectiveness
Step 1. Map business goals to portal capabilities: Financial Representatives Insurance portal example
The first step in determining WebSphere Portal effectiveness is to identify the business goals, with the priorities of those goals, and to map them to the applicable portal technologies.
Let's demonstrate this concept by using the example of the hypothetical Financial Representatives Insurance portal that delivers information and services to independent field representatives.
Table 3 illustrates an example of mapping the business goals for the insurance portal to WebSphere Portal server capabilities.
Table 3. Mapping business goals to WebSphere Portal server capabilities
|Sample business goals||Business goal priority||Portal capabilities||Sample applicable WebSphere Portal technology|
|Increase revenue for each representative||High||Enable delivery of full suite of customer relationship management applications||Application integration|
|Enhance the effectiveness of information and services||High||Deliver targeted content||Content personalization|
|Reduce support costs||Medium||Provide self-service capabilities and help functions||Application integration, custom portlets, and content delivery|
|Increase the appeal against competitive offerings||Medium||Provide rich interaction capabilities||Asynchronous Java and XML (Ajax)-based user interface and semantic tags|
|Improve communications and interactions with representatives||Medium||Deliver blogs and forums||Collaboration suite|
Step 2. Identify the WebSphere Portal activities to be measured
The next step is to map the requirements and portal capabilities derived from Step 1 to facets of portal design so that you can identify the WebSphere Portal activities to be monitored.
Table 4 illustrates an example of mapping aspects of portal design to the monitored WebSphere Portal activities with the sample insurance portal.
Table 4. Identify portal activities to be monitored
|Portal capability||Portal design||Sample monitored WebSphere Portal activity|
|Customer relationship management (CRM) application delivery||Deliver role-based access to the full suite of eService applications||Launch of eMyClient application|
Launch of Client Insight portlet
|Targeted content||Deliver personalized content for products and services||Portfolio and Annuities content access|
|Self-service and help||Deliver user profile application and help content||Launch of Profile application|
Help content access
|Rich interactions||Web 2.0 theme and search engine||Search engine hits (user satisfaction scores in portal surveys)|
|Blogs and forums||Number of blogs|
Step 3. Build impact formulas
In this step, the activities monitored in Step 2 are incorporated into a set of impact formulas. You can do this task by associating a proportional relevance derived from the value of the business goal associated with the monitored WebSphere Portal activity and combining it with the portal traffic figures for the activity.
Table 5 outlines this step for the sample insurance portal.
Table 5. Building WebSphere Portal impact formulas
|Monitored activity||Business goal and value||Proportional relevance (adjusted across scale of 100)||Sample impact formulas|
|eMyClient application launch||Increase revenue (High, score 3)||14||<Average daily eMyClient launches>|
|Client Insight portlet launch||Increase revenue (High, score 3)||14||<Average daily Insight launches >|
|Content access - Portfolio||Enhance information delivery (High, score 3)||13||<Average daily Portfolio access >|
|Content access - Annuities||Enhance information delivery (High, score 3)||13||<Average daily Annuities access >|
|User-profile application access||Reduce support cost (Medium, score 2)||9||<Average daily Profile access >|
|Search engine hits||Increase appeal (Medium, score 2)||10||<Average daily search queries>|
|Content access - Help||Reduce support cost (Medium, score 2)||9||<Average daily help access >|
|Blog posts||Improve communications (Medium, score 2)||9||<Average daily blog access>|
|Forum posts||Improve communications (Medium, score 2)||9||<Average daily forum posts>|
Step 4. Construct WebSphere Portal activity-impact ratios
We construct the quantitative scores to assess the impact of the activities by using the formulas in table 5. Both the anticipated impact score, based on the original expectations of the portal, and the measured impact score are constructed, so that you can build an impact ratio of the measured as opposed to the anticipated.
Table 6 outlines the process of generating impact ratios with the sample insurance portal. NOTE: The impact formulas and porportional relevance are defined in table 5.
NOTE: The impact ratios of the monitored activities are averaged to construct the overall portal impact ratio.
Table 6. Constructing impact scores and ratios for the portal
|Monitored activity||Anticipated impact||Measured impact||Impact ratio (Measured/anticipated) * (proportional relevance / 100)|
|eMyClient application launch||12000||4000||5%|
|Client Insight Portlet launch||12000||10000||12%|
|Content access - Portfolio||36000||12000||5%|
|Content access - Annuities||36000||15000||6%|
|User-profile application access||4000||3000||9%|
|Search engine hits||24000||15000||6%|
|Content access - Help||2000||1000||6%|
|Overall portal-activity impact ratio||N/A||N/A||60%|
Step 5. Build WebSphere Portal effectiveness ranking
Measuring the impact of the activities as described previously is only one of several dimensions to assessing WebSphere effectiveness. The portal activity impact ratios can be combined with user satisfaction measurements, problem ticket reports, and usability studies to build an overall effectiveness ranking (see table 7).
Table 7. Constructing the effectiveness ranking with the sample insurance portal
|Ranking||Goal||Measured||Impact ratio [(measured / goals) * 100]|
|Activity impact||100||60 (mean impact score from table 6)||60|
|User satisfaction surveys||High satisfaction (Ranking: 3)||Medium-high satisfaction (Ranking: 2)||66|
|Problem reports||Average daily reports less than 20||Average daily reports around 40||50|
|Usability studies||Very usable (Ranking: 3)||Medium-low usability (Ranking: 1.5)||50|
|Overall portal effectiveness ratio||N/A||N/A||57|
The value of 57 for the portal effectiveness ratio is below expectations, leading to a “B-” ranking for our sample portal; a 90 to 100 percent portal-effectiveness-ratio range in our example would earn an “A” ranking.
Now let's analyze how to improve the effectiveness of the sample Insurance portal to at least a “B” ranking.
Tuning WebSphere Portal effectiveness
The data in tables 1–7 provide some key metrics to enable you to improve WebSphere Portal effectiveness. For example, table 6 shows that the eMyClient application launch from the portal is one-third of its anticipated value; in addition, there are significant shortfalls in the levels of anticipated content access to Portfolio and Annuities products.
Some new strategies to improving effectiveness can include the following:
- Improving access to the eMyClient application. Place the eMyClient application launch icon on the portal home page for ease of access, and add new content highlighting the availability of eMyClient.
- Enhancing the quality of content for Portfolio and Annuities. Increase the available new content for Portfolio and Annuities products by speeding up the content approval process.
- Enhancing the portal usability. Refine the portal navigation to improve on the portal usability experience.
These two strategies are just a start; the objectives of measuring WebSphere Portal effectiveness are to build a continuous refinement and measurement cycle.
It is possible to systematically measure WebSphere Portal effectiveness by correlating business goals with the monitored activities on the portal. This approach enables the compiling of metrics that can help guide you toward specific actions to improve effectiveness, which is an integral part of ensuring that the portal is aligned for success.
- Participate in the discussion forum.
- Read the WebSphere Portal wiki article, “Site analytics and optimization."
- Read the developerWorks white paper, "Site analytic support in IBM WebSphere Portal 6.1.5."
- Refer to the IBM WebSphere Portal Version 6.1.5 Information Center.
- Refer to the IBM developerWorks WebSphere Portal zone.
- Contribute to the WebSphere Portal Family wiki.
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-40/segments/1474738662166.99/warc/CC-MAIN-20160924173742-00207-ip-10-143-35-109.ec2.internal.warc.gz
|
CC-MAIN-2016-40
| 14,925
| 128
|
https://support.sitewrench.com/hc/en-us/articles/360015281391-Why-does-my-responsive-image-not-display-the-whole-image-for-all-website-visitors
|
code
|
It is common for websites to feature large scale background images. This is most commonly seen in the top portion of a website when a visitor first pulls up a page. For the sections on your website that contain an image in the background, it's possible that depending on the screen size the image may be trimmed off a little bit on certain areas or look like it's "overflowing the container". We do our best to minimize how much of the image gets trimmed by adjusting the background image placement, but with the diversity of screen sizes, technology is simply limited on how we can control this.
There is a background property that we apply to background images called "cover". It simply declares that any image that is set to be a background always cover the size of it's container. So if a container shrinks or grows, the image always fills that container, or "covers it".
Let's say for example you have a banner image that's 2000px wide and 500px tall. If you try to stretch that image across a larger screen such as a 27" monitor you'll have the image trying to render itself at 3000px wide by 800px tall. This conflicts with content being pushed down below the image and the image trying to render at such a large size it will either lose most of it's quality or slow down the page load time. The cover property helps this by truly being an out of the box responsive approach to growing containers and image sizes.
To summarize: the cover property means the entire image remains full width, but sacrifices the height depending on the size of the screen. If the image was NOT using cover property, then the image remains full sized, but does not stretch full width to suit the container of the screen and is therefore not considered responsive.
What if I create an image that has text embedded on it?
We do not recommend creating an image with embedded text for many reasons. One reason is that the image text is not crawlable by Google, so your text is not being associated with your site or its page. For instance, if you wanted to promote a special event and created an image with the date and time of the event, search results would not pull this up. But if you create an event and insert an image, and then within the body of text on your website put the date and time, this content will be searchable for website visitors.
Another reason it is not optimal to embed text in images is because your website visitors may not see the full image (and therefore the text) when they come to visit your website.
Here's an example of a full image where it can be fully displayed on the website:
Here's an example of when text does not display based on the Cover Property and the viewport size:
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474808.39/warc/CC-MAIN-20240229103115-20240229133115-00381.warc.gz
|
CC-MAIN-2024-10
| 2,694
| 9
|
https://hunch.net/?p=1762
|
code
|
The Heritage Health Prize is potentially the largest prediction prize yet at $3M, which is sure to get many people interested. Several elements of the competition may be worth discussing.
- The most straightforward way for HPN to deploy this predictor is in determining who to cover with insurance. This might easily cover the costs of running the contest itself, but the value to the health system of a whole is minimal, as people not covered still exist. While HPN itself is a provider network, they have active relationships with a number of insurance companies, and the right to resell any entrant. It’s worth keeping in mind that the research and development may nevertheless end up being useful in the longer term, especially as entrants also keep the right to their code.
- The judging metric is something I haven’t seen previously. If a patient has probability 0.5 of being in the hospital 0 days and probability 0.5 of being in the hospital ~53.6 days, the optimal prediction in expectation is ~6.4 days. This is evidence against point (1) above, since cost is probably closer to linear in the number of hospital days. As a starting point, I suspect many people will simply optimize conditional squared loss and then back out an inferred prediction according to p=ex-1, with clipping. The standard approach of ensembling should be effective.
- The team structure seems a bit strange to me. I’m not sure there is a good reason for it from a prediction point of view and 8 may be too hard a limit on team size, imposing bin packing problems on the entrants.
- Privacy is clearly a huge concern. They anonymized the data, require entrants to protect the data, and admonish people to not try to break privacy. Despite that, the data will be released to large numbers of people, so I wouldn’t be surprised if someone attempts a join attack of some sort. Whether or not a join attack succeeds could make a huge difference in how this contest is viewed in the long term.
- The Accuracy Threshold is a big deal. If they set it at an out-of-reach point (which they could easily do), the size of the prize becomes 0.5M. This part of the contest is supposed to be determined next month.
This contest is not a slam-dunk, but is has the potential to become one, and I’ll be interested to see how it turns out.
3 Replies to “The Heritage Health Prize”
Given the contest rules, most people in the industry will have to skip this one:
By registering for the Competition, each Entrant (a) grants to Sponsor and its designees a worldwide, exclusive (except with respect to Entrant), sub-licensable (through multiple tiers), transferable, fully paid-up, royalty-free, perpetual, irrevocable right to use, not use, reproduce, distribute (through multiple tiers), create derivative works of, publicly perform, publicly display, digitally perform, make, have made, sell, offer for sale and import the entry and the algorithm used to produce the entry, as well as any other algorithm, data or other information whatsoever developed or produced at any time using the data provided to Entrant in this Competition (collectively, the “Licensed Materials”), in any media now known or hereafter developed, for any purpose whatsoever, commercial or otherwise, without further approval by or payment to Entrant (the “License”) and (b) represents that he/she/it has the unrestricted right to grant the License. Entrant understands and agrees that the License is exclusive except with respect to Entrant: Entrant may use the Licensed Materials solely for his/her/its own patient management and other internal business purposes but may not grant or otherwise transfer to any third party any rights to or interests in the Licensed Materials whatsoever.
Anyone (faculty, postdocs, graduate students, etc) who works at a university will have signed an intellectual property agreement that conflicts with this pretty severely. So academic researchers are out too. I suppose it is just for the self-employed.
So does this mean that they own the whole thing or can the entrant also later, when the competition ends, publish the entry for anyone else to use, if he wishes (without the data set ofcause)?
Comments are closed.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296946584.94/warc/CC-MAIN-20230326235016-20230327025016-00324.warc.gz
|
CC-MAIN-2023-14
| 4,214
| 13
|
https://www.gopitbull.com/threads/satin-balls.16941/
|
code
|
My question is someone had said it was 10,000 calories per serving but I found out that is for the batch. How much and how often do you feed your dogs Satin balls? I have 2 dogs who I really need to put weight on before animal services is called! lol No, i like think in shape dogs but these two girls are really skinny and I cannot seem to put weight on them. I am making a half batch today but not too sure how often or how much to feed. Any help would be great!
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-39/segments/1631780056578.5/warc/CC-MAIN-20210918214805-20210919004805-00685.warc.gz
|
CC-MAIN-2021-39
| 464
| 1
|
https://www.unrealengine.com/marketplace/en-US/product/multiplayer-server-browser-master-server-server-listing/questions?lang=en-US
|
code
|
Multiplayer Server Browser - Master Server - Server Listing
This Plugin allows you to make a servers browser to get a list of your online multiplayer dedicated and listen servers for any platforms.
Supported Engine Versions
4.24 - 4.27, 5.0 - 5.3
This product contains a code plugin, complete with pre-built binaries and all its source code that integrates with Unreal Engine, which can be installed to an engine version of your choice then enabled on a per-project basis.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474737.17/warc/CC-MAIN-20240228143955-20240228173955-00596.warc.gz
|
CC-MAIN-2024-10
| 472
| 5
|
https://www.giannivanhoecke.com/portfolio/smooththermistor/
|
code
|
A flexible thermistor reading library. Calculates the temperature based on the Steinhart–Hart equation, smoothed by taking a number of samples.
SmoothThermistor can be found and installed through the Arduino Library Manager.
The easy and most common circuit looks as follows:
However, to get more accurate readings, you can use the 3.3V pin on the Arduino, which has less noise. Make sure your thermistor is fed using 3.3V, along with the AREF pin. The circuits looks as follows:
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296949689.58/warc/CC-MAIN-20230331210803-20230401000803-00686.warc.gz
|
CC-MAIN-2023-14
| 481
| 4
|
http://www.columbiamissourian.com/a/94928/no-scientific-theory-with-intelligent-design/
|
code
|
There continues to be debate about whether both evolution theory and intelligent design theory are science. More discussion about the scientific method might be helpful to your readers.
The foundation of science, the scientific method, starts with a statement that predicts an outcome called a hypothesis. For example, evolutionary theory might posit: “Changes in organisms result from an evolutionary process.” Intelligent design theory might posit: “Differences among organisms result from intelligent design.”
These hypotheses are tested using data that can be measured and obtained by one of the following methods: 1) conducting an experiment, or 2) observing new, naturally occurring data. This second method is often ignored in statistics textbooks, but we could not address theories about the galaxies, geological formations, ancient civilizations and evolutionary or creationist events without this part of the scientific method. Each method requires the collection of data with clear descriptions of the methodology, so that others can duplicate the research.
If the data support the hypothesis, then the research is accepted as supporting the underlying theory. If not, doubt is cast on the theory. A key point is that the data must have the potential for either being consistent or inconsistent with the scientific hypothesis.
We know many discoveries have been made that are consistent with the theory of evolution. It is possible that data could be found that would be inconsistent with the theory of evolution, and doubt would be cast on that theory. Although theory of intelligent design researchers have presented data they believe is consistent with their theory, they have not described what discoveries or data might cast doubt on their theory.
Thus, evolutionary theory is a matter of science. But until intelligent design theory uses the scientific method instead of simply attacking evolutionary theory, it is not a matter of science.
|
s3://commoncrawl/crawl-data/CC-MAIN-2015-18/segments/1429246641054.14/warc/CC-MAIN-20150417045721-00254-ip-10-235-10-82.ec2.internal.warc.gz
|
CC-MAIN-2015-18
| 1,964
| 6
|
http://www.vansairforce.com/community/showthread.php?s=4a5481b7a909756f7bae4c658559e603&t=156070
|
code
|
I used Visio to draw my schematic (24 B-sized pages and counting).
However, I was to do it again, I'd use a bona-fide schematic capture program.
There are some great programs out there (Altium, Eagle, OrCad, Pads), which I used at work in the past, but no longer have available, and I didn't want to spring for the three or four figure price tags.
There are some good free ones, though: KiCad, TinyCAD, EasyEDA, and others.
- Does a great job keeping track of all the wiring, including maintaining netlists between all components.
- Easy search of connections by user net name
- Forces you to include all connectors and other misc components
- Generates a bill of materials (often directly exportable to Mouser, Digikey, etc)
- You can build virtual cable bundles by combining individual wires into busses, helping fuselage wiring layout.
- Have to learn a new SW tool, and these tools are not easily "self discoverable"
- Have to make individual "components" for all the non-generic stuff like avionics, special relays, fuse holders, etc. This is a big job if you're going glass.
- Are constrained to their grid system and schematic presentation styles (ie, your schematic may look a bit uglier and be more confusing that you'd like)
In the end, though, the benefits outweigh the initial investment to set up the components in the system. It make tweaking and schematic management much easier in the end. YMMV.
N430WB (reserved) RV-7 #74152, tip-up. Working the baffles
Log at: http://rv7.wbencze.com
Defeating gravity one rivet at a time
VAF 2018 donation happily made
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376830305.92/warc/CC-MAIN-20181219005231-20181219031231-00316.warc.gz
|
CC-MAIN-2018-51
| 1,570
| 17
|
https://technical.ly/person/dana-bauer/
|
code
|
is a freelance mapmaker and GIS specialist. She is a former employee of Azavea.
‘Ingenious’: local author Jason Fagone on invention’s automotive impact
Balloon Mapmaking: see 600+ aerial images of Penn’s Landing
Chief Data Officer Mark Headd talks open data at Hacks/Hackers meetup
Hacks/Hackers meetup features Philly.com data-driven project demos from local hackathons [VIDEO]
Women entrepreneurs and technologists: a growing community more welcomed here than Bay Area, other tech hubs [VIDEO]
Hacks/Hackers Philly launches, will host first meetup to connect journalists, technologists
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573104.24/warc/CC-MAIN-20220817183340-20220817213340-00720.warc.gz
|
CC-MAIN-2022-33
| 595
| 7
|
https://qhmit.com/css/properties/css_border-color.cfm
|
code
|
border-color property allows you to set the border color of a box.
border-color property is a shorthand property for
border-left-color. If you only want to specify a border color for some sides (but not all sides), you can use one or more of those properties instead.
You can provide between one and four color values. If you provide all four values, these set the top, right, bottom and left border, respectively.
The following examples demonstrate how the number of values affects the outcome.
One Color Specified
Two Colors Specified
Three Colors Specified
Four Colors Specified
In addition, all CSS properties also accept the following CSS-wide keyword values as the sole component of their property value:
- Represents the value specified as the property's initial value.
- Represents the computed value of the property on the element's parent.
- This value acts as either
initial, depending on whether the property is inherited or not. In other words, it sets all properties to their parent value if they are inheritable or to their initial value if not inheritable.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100724.48/warc/CC-MAIN-20231208045320-20231208075320-00327.warc.gz
|
CC-MAIN-2023-50
| 1,072
| 14
|
https://www.sqlservercentral.com/Forums/Topic938065-1291-1.aspx
|
code
|
I am using a table which has got a LocationID for a location with primary key constraint.
Now I have another record for same location and I want to add that one on.
Just to keep it clear this LocationID is getting used in different other databases as well and every night there is data coming into the database update records in different tables and Ialso don't want to drop the constraint.
so actually what I want to do is add to LocationID's for the same place. How can I get around it.
Thanks very much.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-05/segments/1516084887423.43/warc/CC-MAIN-20180118151122-20180118171122-00562.warc.gz
|
CC-MAIN-2018-05
| 506
| 5
|
http://www.techyv.com/question-category/windows-os/question/question/37782?page=20
|
code
|
How to modify the Host File In Windows 7 Or Vista? I receive the following error in my machine Windows 7;
You don’t have permission to save in this location.
Contact the administrator to obtain permission.
Would you like to save in the My Documents folder instead?
What is this error message? Please guide to properly secure.
I am not able to finish the installation. The file gives the error message regarding Paragon's installer .msi
Error 1901. Error attempting to read from the source
installation database: C:\Windows\Installer\4c2aebe4.msi.
Please guide me to get a working version of this program since I require shifting my Operating System!
Although I adjusted my desktop clock accordingly, I found it gave a different time on the next day and also a different date.
Can you tell me why this is happening? Please provide me a solution please.
Hello TechyV friends,
My computer suddenly crashed and I want to view the SQL dump files because I would like to retrieve my log files. Could you help me find the best tool to view the SQL dump files. I need a website where I could download it for free. I specifically need an SQL dump viewer for Windows.
Your help will be highly appreciated. Thank you.
When my Window focus is not reaper I tend to get this error more often, for example when I use another window then switch back to reaper all my midi inputs cannot open. Does anyone experience similar problems and how can I solve it? It is quite frustrating especially when I am with a client and I have to restate the draw each time.
The following MIDI inputs could not be opened:
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-41/segments/1410657124771.92/warc/CC-MAIN-20140914011204-00143-ip-10-196-40-205.us-west-1.compute.internal.warc.gz
|
CC-MAIN-2014-41
| 1,589
| 16
|
https://forum.checkmk.com/t/agent-controller-not-registered/32251
|
code
|
CMK Version: 2.1.0 RAW
OS: Windows Server 2019
Agent controller not registered
After multiple clean installations specifically on this server I can’t get CheckMK to work.
The service is started.
With telnet i can connect to the agent from the OMD server.
I get a return with value: 16
The web test connection has a successfull ping but the agent output is: Agent controller not registered
I’ve successfully registered the controller but sadly this didn’t change anything. I currently have Checkmk running on about 50 windows devices and haven’t seen this issue yet.
Any help would be appreciated.
Double-check your registration process. Most likely you mistyped the hostname.
Additionally check out this troubleshooting section.
Thanks for replying! I was indeed being a bit stupid.
I’ve only recently started working at this company, i thought there were 3 vm’s File, File01 and File02.
Apperantly the “File” server was a dns name which opens up the “master” machine as the File01 and File02 are setup in HA.
Glad to here you could fix it!
If those names are your actual host names, maybe the first order of business for you should be to start a proper naming concept, as a poor naming concept can cause you quite some pain.
same failure here. In 2.1.0p4, host cannot registered. Hostname is correct. Query status successfull.
But host didnt register to CMK. In our environment are two Windows Server 2016. There’s no firewall between, test ok, telnet “16”. Multiple times re-install. No chance to register these servers.
Is the host TLS registered?
“C:\Program Files (x86)\checkmk\service\cmk-agent-ctl.exe”" register --hostname %host% --server [Put CHECKMK server here] --site [Site name here] --user automation --password [Put password here]"
Yes. Host has already been removed, added back for registration. Everything that is in the manual. No success.
What is the output of cmk --debug -vv [hostname] from the omd cli?
Check_MK Agent Version: 2.1.0p4, OS: windows, Update error: The agent updater is not registered at the deployment server(!), No successful connect to server yet(!), Agent plugins: 6, Local checks: 19
cmk “status” on host: Version 2.1.0.p4
Agent socket: operational
Connection: “cmk server”
Connection type: pull-agent
Certificate validity: Tue, 05 Jul 2022
and so on.
I can see all services. everything is fine. Only the host wont register @ cmk server…
After 60 minutes, registration isn’t successfull.
registration process “old style”:
check_mk_agent.exe updater register
after this “new” registration process, Service restart.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572161.46/warc/CC-MAIN-20220815054743-20220815084743-00759.warc.gz
|
CC-MAIN-2022-33
| 2,604
| 35
|
https://thefiringline.com/forums/showpost.php?p=5285869&postcount=11
|
code
|
Colt sells a 6920 Magpull edition... MOE handguard, MP BUIS, and 2 30 rd Pmags, and a couple other little goodies a first time owner won't notice in exchange for the round traditional forend, and the carry handle you can buy from a takeoff on gunbroker for ~50-70 bucks depending on patience. At that point the only thing I had to do was buy the bipod and mounting hardware, as well as optics and I was good to go.
I Also decided to swap out the coverplate for an ASAP sling mount, though I now think that was more work than it was worth with the clamshell style out there, and I'm waiting on a B.A.D. lever to install. That little thing is way too slick for 25-30 bucks.
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170624.14/warc/CC-MAIN-20170219104610-00431-ip-10-171-10-108.ec2.internal.warc.gz
|
CC-MAIN-2017-09
| 671
| 2
|
https://godaddy.uservoice.com/forums/255813-godaddy-pro/suggestions/7545049-let-us-know-what-this-is-how-it-works-why-we-sho
|
code
|
Let us know what this is, how it works, why we should sign up.
Is there some way I can find out what godaddypro is and how it works?
Hi there. GoDaddy Pro is a tool that allows you to manage your clients and their products (domains, hosting, etc). There are other features like site monitoring as well. Were you unable to discover this through the product? Is there anything we can do to improve how we communicate this?
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500294.64/warc/CC-MAIN-20230205224620-20230206014620-00465.warc.gz
|
CC-MAIN-2023-06
| 420
| 3
|
https://github.com/Homebrew/legacy-homebrew/pull/16976
|
code
|
I attempted to replicate the features of the clojurescript bootstrap script, to setup clojurescript on a system. I'm not sure how proper this script is, so any feedback would be appreciated.
Added ClojureScript formula
We typically don't like downloading stuff inline via curls; can any of these be dependencies instead?
I'm going to try working on this further, but it looks like I'll have to investigate how the program is hooking into the clojure.jar file. I'll submit a new pull request when I have a cleaner version on a separate branch.
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-22/segments/1495463608058.57/warc/CC-MAIN-20170525102240-20170525122240-00318.warc.gz
|
CC-MAIN-2017-22
| 542
| 4
|
http://tinkymcfrog.blogspot.com/2008/09/
|
code
|
The Geekdad blog is part of Wired.com. Several geeky dads (and a couple geeky moms) contribute several daily posts to the blog. I currently have 120 of them bookmarked on Bloglines. You read that right - One Hundred And Twenty individual posts bookmarked!
The following little gem gets off to a slow start. They could have cut the first 40 seconds, in my opinion. But I was laughing out loud at a minute & thirty:
Dad or mom, if you tend toward geekiness at all (and if you're a knitter, that's likely), you should check out Geekdad.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-30/segments/1531676592650.53/warc/CC-MAIN-20180721164755-20180721184755-00407.warc.gz
|
CC-MAIN-2018-30
| 533
| 3
|
https://sitecore.stackexchange.com/questions/28565/how-to-import-renderings-components-from-solution-folder-to-sitecore
|
code
|
I copied over the views and controllers from the solution folder to my local project, built and deployed. sitecore got updated with new files.
I am wondering how to import the renderings/components from the solution folder to sitecore. I see a lot of *.yml files such as one-column.yml. Can I import those to sitecore?
I tried copying them into my local project and syncing with sitecore but they don't show up as changes.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320302723.60/warc/CC-MAIN-20220121040956-20220121070956-00410.warc.gz
|
CC-MAIN-2022-05
| 422
| 3
|
https://2020.animationfest-bg.eu/bg/films/thefilm/section/selection/id/6785/
|
code
|
- конкурсна програма
Моята агенция за модели
A boy who participated in the model club once again saw the classmates who had previously ruined his efforts, so he entered the fantasy world of his heart to protect his love.
Биография на режисьора
Learning animation design for four years, I realize that it’s not easy to make original animation in Taiwan. Time flies, I’m about to graduate from the university, yet I am still not sure whether I have talent in making animation. To brighten the animation in Taiwan, I plan to spend several years on training and improving myself, hoping that I can make original animation that belongs to my country.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571719.48/warc/CC-MAIN-20220812140019-20220812170019-00173.warc.gz
|
CC-MAIN-2022-33
| 706
| 5
|
https://forums.motorhomefacts.com/135-morocco-touring/71562-lpg-availability-morocco-2.html
|
code
|
Join Date: Jul 2007
Thanked 0 Times in 0 Posts
I didn't appreciate that you were using this adapter already.
You are right, the female part ( the Gaslow bottle end ) will go straight onto the Morocan bottles. , No past or sealant required, there should be a seal on the fitting.
your only problem might me is getting the morocan bottle close enough.
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578529962.12/warc/CC-MAIN-20190420180854-20190420202854-00269.warc.gz
|
CC-MAIN-2019-18
| 349
| 5
|
http://www.hotnewhiphop.com/clyde-carson-what-would-i-do-video.1195.html
|
code
|
Clyde Carson "What Would I Do" Video
Peep Clyde Carson "What Would I Do" Video, the latest visual from Clyde Carson. It dropped on Friday, March 4th, 2011. Clyde Carson's odds keep getting better with each new leak, and Clyde Carson "What Would I Do" Video will undoubtedly improve his chances of winning. It's a worthy addition to a respectable catalogue that has seen a lot of growth since Clyde Carson debuted in this game. We're looking forward to the follow-up.
How does this compare to Clyde Carson's previous work?
Check out the latest video from Clyde Carson, Clyde Carson "Something To Talk About (In Studio)" Video.
Hit up Clyde Carson's profile page for the latest info, news, songs, and mixtapes. Check out Clyde Carson's Twitter.
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-10/segments/1393999674642/warc/CC-MAIN-20140305060754-00053-ip-10-183-142-35.ec2.internal.warc.gz
|
CC-MAIN-2014-10
| 742
| 5
|
https://www.mobileread.com/forums/showpost.php?p=1982047&postcount=23
|
code
|
Originally Posted by kodomo
I'd be interested in the .config as well.
Moreover a request:
Could someone who's successfully compiled software for the M92 write a short summary/primer on using the SDK under https://wiki.mobileread.com/wiki/Boox...re_development
I'm currently doing my first steps and am running into probably silly problems (currently cmake complains about not knowing ENABLE_QT when I try to compile a modified calculator version as a first test)
Maybe the steps to compile ones first program amongst those available in the std. repositories?
Even stuff that might be trivial to you would help newbies to the sdk
Cheers and (hoping
) thx in advance!
You are right, this would help a lot. Actually I also ran into many small difficulties and so I planned to document how to compile software for the M92. But afterwards, these difficulties seemed so silly to not being worth mentioned, so I abandoned my plans. Let me try to write something down and let us see if it works for you.
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917119995.14/warc/CC-MAIN-20170423031159-00091-ip-10-145-167-34.ec2.internal.warc.gz
|
CC-MAIN-2017-17
| 995
| 10
|
https://hansgroeneveld.nl/
|
code
|
Call me: xxx Mail me: email@example.com
< website under construction !! sorry.. The hosting provider of my platform was not able to extent a grace period due to upgrade problems beyond my control I lost therefore all managed admin services and have to start all over again.. please be patient and come back anytime ! thanks for visiting >
Painter living in Haarlem, The Netherlands...
"Creating images with paint ..."
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-47/segments/1542039741294.2/warc/CC-MAIN-20181113062240-20181113084240-00000.warc.gz
|
CC-MAIN-2018-47
| 417
| 4
|
https://discourse.haproxy.org/t/x-frame-options-in-haproxy/4055
|
code
|
We use haproxy version 1.8.16 for our sites. one week ago we saw one site is using our site by means of iframe tag in its site, I think this is a kind of clickjacking. We could stop them with below command in our front end:
rspadd X-Frame-Options:\ SAMEORIGIN
This worked very well and stop them
but we need to except some sites from this. I have found nothing about this issue in internet for haproxy.
Thanks for ur help
X-Frame-Options is a feature implemented in browsers, therefore not pertaining to HAProxy (or any other web-server or load-balancer out there).
However you should have a look at the Mozilla documentation pertaining to this header (they even have an example for HAProxy):
Unfortunately, based on their compatibility matrix, except Firefox (and surprisingly IE), only the
sameorigin option looks to be fully supported by most browsers.
That being said, another alternative is to inject the
X-Frame-Option: deny only when the
Referer request header is different than the domains you want to whitelist. (You should also make sure to configure the
referrerpolicy option of the
All in all, please take into account that the success of any of these measures depends on the browser, and in the end there is nothing that HAProxy (or for that matter any web server out there) can actually do to stop this kind of attacks.
<iframe> and either “escape” from it, or issue an alert to the user, or perhaps even redirect that iframe to a warning page.
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-35/segments/1566027315811.47/warc/CC-MAIN-20190821065413-20190821091413-00518.warc.gz
|
CC-MAIN-2019-35
| 1,462
| 15
|
http://books.gigatux.nl/mirror/javascriptandajax/0321430328/ch04lev1sec9.html
|
code
|
Building Wraparound Slideshows
Script 4.16. This HTML page creates a slideshow.
Script 4.17. This script builds a slideshow that the user can click through using links to control movement forward and back.
This script builds a slideshow that wraps aroundthat is, if you go past the end of the list you go back to the beginning and vice versa. Figure 4.14 shows the new slideshow.
Figure 4.14. Clicking the Previous or Next link calls the processPrevious() or processNext() function, respectively.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-43/segments/1539583509958.44/warc/CC-MAIN-20181015225726-20181016011226-00075.warc.gz
|
CC-MAIN-2018-43
| 496
| 5
|
https://www.anypromo.com/trade-show-events/table-covers/convertible-table-throw-p764612
|
code
|
Convertible Table Throw
About this Convertible Table Throw:
- Easily converts from a 8' table to a 6' table!
- Full color premium quality polyester material!
- A must have for tradeshows and presentations to give your space a finished, professional look!
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-51/segments/1575540537212.96/warc/CC-MAIN-20191212051311-20191212075311-00513.warc.gz
|
CC-MAIN-2019-51
| 254
| 5
|
https://lists.debian.org/debian-devel/1999/02/msg01932.html
|
code
|
Re: It's time to talk about Free Software
Wichert Akkerman wrote:
> Previously Joseph Carter wrote:
> > I think it's time to abandon the Open Source, Eric can HAVE it. We
> > need to wake up those of the community that have a clue and dig in
> > for what's going to be a very long night.
> I don't agree: as long as Eric does not own the Open Source-trademark
> we can do some damage-control.
I think we can do better damage control if we simple ignore that odious
term, and stick to talking about free software. The word "open" is
something that turns off suits to start with, so the whole idea that
"Op*n S*urce" will be more acceptable to suits is silly in the first
place. Suits have been hearing lies about "open" this and "open" that
for years, and to them, "open" means "we can't compete on a level field,
so we're trying to pretend our proprietary hacks are industry
Let the whole "Op*n S*urce" debacle die a well-deserved death.
Chris Waters email@example.com | I have a truly elegant proof of the
or firstname.lastname@example.org | above, but it is too long to fit into
http://www.dsp.net/xtifr | this .signature file.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-13/segments/1521257646914.32/warc/CC-MAIN-20180319120712-20180319140712-00301.warc.gz
|
CC-MAIN-2018-13
| 1,129
| 19
|
https://techdocs.genetec.com/r/en-US/Genetec-Mission-ControlTM-Deployment-Guide-2.13.4.0/Deployment-model-3-Running-RabbitMQ-on-a-separate-server
|
code
|
You can use this architecture of deployment when each component of Genetec Mission Control™ needs its own server.
Deployment architecture: Running RabbitMQ on separate server
- Server 1: Security Center Directory and Genetec Mission Control™
- Expansion server: Incident Manager role
- Server 3: RabbitMQ
- Server 4: SQLNOTE: SQL Enterprise is recommended.
For information on SQL server permissions, see Assigning SQL permissions on remote SQL server
Each of these components can be configured for high availability. If RabbitMQ is not installed on the same server as the Incident Manager role, copy the RabbitMQ certificates to the Incident Manager server.
You can use the same RabbitMQ server or failover cluster with other Genetec Inc. plugins and Genetec Mission Control™ setups. For example, Sipelia™ and Genetec Mission Control™ can use the same RabbitMQ cluster simultaneously if both support the same RabbitMQ version.
For more information on configuring high availability, see Failover in Genetec Mission Control™.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100508.42/warc/CC-MAIN-20231203161435-20231203191435-00632.warc.gz
|
CC-MAIN-2023-50
| 1,035
| 10
|
http://platform-binary-options-best-try.pw/how-to-win-in-binary-option-9648.php
|
code
|
How to win in binary option
For a single-cohort based GWAS, the GWAS cohort itself can be used as the reference set. For a meta-analysis, you can use one of the largest participating cohorts as the reference set. If none of them are available, you might use data from the 1000 Genomes Project (you will need PLINK2 --vcf option to convert the data into PLINK binary PED format).
Please see Figure 1 of Bakshi et al. 2016 for a comparison of results using different reference sets for LD.
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-09/segments/1550247481612.36/warc/CC-MAIN-20190217031053-20190217053053-00023.warc.gz
|
CC-MAIN-2019-09
| 487
| 3
|
https://oddballcomics.com/free-chess-games
|
code
|
♡ 30 ( +1 | -1 ) King & Rook vs. King and Bishop.I have never been in this situation before, but in a game I am playing at a different site the board is clear except I (white) have K on d2 and a R on d4. My opponent has K on h5 and a B on f7. It is me (white) to move. Is a win possible for me in this position, and generally, can a King and Rook always beat a King and Bishop eventually?
♡ 11 ( +1 | -1 ) atrifixI dare you to show me where 2 knights and a king vs. a king can possibly force checkmate.
It cannot be done.
♡ 46 ( +1 | -1 ) to chessnoviceThere are actually a chance for 2 Knights to checkmate the King but only in given position in which the weak player have his King in the corner and the strong side have his King and the Knights block his way out(meanwhile set up a checkmate web).I read this from an endgame book but if you are not convinced then I will try to post it for you. In real game it will be impossible 'cause the weak side doesn't just run his King to the corner and the strong side can't force him to do so.
♡ 46 ( +1 | -1 ) ...I agree that it is a POSSIBILITY to mate with just 2 knights and a king, but it relies on multiple mistakes from the opponent. The other combinations atrifix mentioned, the mates are forced. With 2 knights + king vs. king, you have to rely on the opponent's ineptitude. And even then it would be pretty much too difficult.
Thus, two knights and a king cannot mate a king.
♡ 42 ( +1 | -1 ) atrifixIndeed you've given the example of how to mate with two knights and a king, but my point is that it's not a forced mate. How did the black king end up on h8? Could it possibly have been pushed there? No.
If you played someone smart enough to take you to an endgame of just 2 knights + king vs. king, I seriously doubt that the person would be dumb enough to walk his king into the corner voluntarily to get mated.
♡ 52 ( +1 | -1 ) I dont usually play words but "cannot" sounds like it is impossible.But I think that as long as there is a chance you may consider to use another word? Maybe there is a position in which the Black King is still in the corner(due to castling) while the hasty White King have already approached and the fantasy position appear.Of course everything usually has to rely on blunder from your opponent 'cause it's really hard to win from a game in which nobody makes any mistakes.
♡ 99 ( +1 | -1 ) The point isthat there is the possibility that two knights can mate a bare king, and so this does not fall under the 'insufficient material to checkmate' category of draws ("The game is drawn when a position has arisen in which neither player can checkmate the opponent's king with any series of legal moves. . .this immediately ends the game.").
If this were the case, then endgames like KNN vs. KN and KNN vs. KB would automatically be declared a draw even though the side with KNN can sometimes force checkmate.
For example: W: Kg6, Nh2, Nd4 B: Kg8, Pa5
White plays 1. Ne6 a3 2. Ng4 a2 3. Nf6+ Kh8 4. Ng5 and now 4... a1=Q would lose but 4... a1=N! draws by claim of insufficient material to checkmate (even though white could play 5. Nf7# next move).
I'm sure there are dozens of drawn endgames where the 'stronger' side cannot force a win, but my intention was only to clarify the situations which are automatically drawn when a side does not have enough material to checkmate (KNN vs. K does not fall into this category).
♡ 67 ( +1 | -1 ) ...Your argument that KNN v. K would have to be agreed upon to draw makes sense, though I would be annoyed by someone if they tried to continue a game with me when there is obviously no win coming to them.
I enjoyed your example, too. I appreciate the thought you're putting into this. However, your example is that of KNN v. KP. At least in that, you have the option to restrict the king's movement and continue the game. When it's just KNN v. K, you don't get that option, which is essential for the mate.
But still, case in point. I suppose since there is that very unlikely mistake of being mated by KNN, you can't call KNN v. K an automatic draw...
♡ 19 ( +1 | -1 ) K+R vs K+B: there depends on corner where weaker's king is. Same color as bishop - lost different - draw.
you can play opposit bishop without pawns. You can arrange mate too:)
♡ 42 ( +1 | -1 ) I have a game whichcould reach a B and K against R and K. Its a draw, but the opponent (who beat me in our first game) has a much higher rating and continues to play. A very instructive game. diversemanx: board #687974. I told him I am ready to play even 100 moves. I am a very patient player.
♡ 72 ( +1 | -1 ) Just pointing out: Here on Gameknot the rules allow for looking up move databases, so it is technically legal here to look up a move set from an endgame database. The K+R versus K+B would fall under the 4-piece database set and could be looked up for the perfect set of moves.
Please note: I have seen some sites not allow endgame databases, claiming it is using a program. To this, I completely disagree. An endgame database by its very definition is not a calculating enging. It is merely a list of moves. A person could simply print out all the moves onto sheets of paper and it would suddenly be legal research again. Like if I were to keep a dictionary of the 4-piece moves, it would be completely clean and legal.
♡ 24 ( +1 | -1 ) Query for more informationHas somebody ever seen (and could provide) links to pages on this subject? I mean K+R+pawns vs K+B+pawns... . I know all endgames has their own identification codes (as how beginnings have all thess A00, B46 and so)... Can somebody say about that more?
♡ 29 ( +1 | -1 ) King-Rook v. King-BishopI saw a book somewhere...
Is it that the side with the King and Bishop should make the way to a corner ? The book says it will be a draw then.
Anyone can enlighten me on this ?
♡ 8 ( +1 | -1 ) desertfoxI am not nearly as good a player as either of you - but I would fancy myself in his position!
♡ 58 ( +1 | -1 ) What?!Endgame tablebases are allowed here on GK? I didn't know that, and I very much object to it. To me, an endgame tablebase is like using a computer since these perfect moves were calculated using a computer, so it doesn't matter whether you have it running "live" or you just use its results.
Opening books are something different, they were compiled by humans, and also, openings can never be as objective as endgames where there is a very clear outcome (win, draw or loss).
I will continue to play my endgames without the help of tablebases.
♡ 57 ( +1 | -1 ) But That's purely a subjective opinion about an otherwise completey inate raw data set. The database could have been done by hand and then you'd have no point. That fact that the move lists were generated by computers does NOT mean it was calculated. The computers merely made listing the moves more efficient than if you did it by hand.
I repeat, endgame database sets are NOT calculated. It is merely the some total of every possible move. If written out by hand, any objection would have no grounds to stem from.
♡ 45 ( +1 | -1 ) Hmmm thanks all......I think my opponents King is nearer to a corner of opposite colour (black) to his (white square) bishop so shall i draw it now or play 100 moves and hope that somewhere along the line his king goes nearer a white corner? I do not know the opponents rating or if he knows about K&B vs K&R endings (1st time i personally have had this type of ending...) - I would guess he is similar to me 1800-1900 rating (if he were on gameknot...)
♡ 18 ( +1 | -1 ) Wrong"i draw it now or play 100 moves" You couldn't play 100 moves. By rules you have to checkmate or move a pawn (you haven't them already) during 50 moves. Otherwise - a draw...
♡ 64 ( +1 | -1 ) The endgame tablebases could NOT be done by hand simply because the amount of data is much too large for a human to process. It would take ages.
How can you say they are not calculated? Maybe you are under a misconception as to how endgame tablebases are created. It is the exact same process that a chess engine uses to find the "best" move in any given position, and it is done by a computer. The only difference to using a chess engine in a normal position is that the variation tree is shallow enough to allow the computer to reach a conclusive result, as opposed to the vague rating in decimal pawn plusses or minuses you get in normal positions.
♡ 105 ( +1 | -1 ) Ahh By the very same token, opening books are also calculated the same way in terms of what the computer sees them as (which is raw data). Also you should be aware that large portion of the "human created" openings were actually refined by checking with computers. Many GMs not only admit to this, but also admit to coming up with new lines to add to the opneing book by using the computer.
My misconception as you put it is based on scientific fact, where as yours is based on an ideal. Whether or not it would take humans "ages" to write down the moves lists is completely moot because it can eventually be done. Much like the opening books being 500 years of preparation mind you. From a scientific standpoint, opening books and endgame books are no different. They are simply raw data. How they originated is your only foundation, which is ironic seeing as how both were made with the help of computers. You can't have your cake and eat it too (or however that saying goes).
♡ 72 ( +1 | -1 ) One more thing: Just want to point out one last thing,
I assume that you would have no objection to the database if it had been written out by hand. My question to you is:
Why would anyone waste the time to do that when the data is already there? Your argument causes a paradox in that the database would be fine if written out by hand, yet it is forever too late to do that. Everyone would simply copy the already available data. I could by example claim I had an army of humans write down all the moves. Since the data would be EXACTLY the same as the generated data, there would be no way to tell the difference. Yet one would be more "pure" than the other. That I disagree with the logic of.
♡ 104 ( +1 | -1 ) Well, so opening books were double-checked and enhanced with computers, but all that under human supervision. You cannot possibly write a computer program to automatically create an opening book suitably for competition against humans.
I don't think it is a "moot point" that the amount of work to be done is astronomically large. Already the tablebases for 6 pieces take up many, many gigabytes of memory. IT CANNOT BE DONE BY HUMANS. By your line of reasoning, I should also be allowed to use a chess engine: since there is a finite (albeit immensely large) amount of moves which can be played in a game of chess, ultimately it is possible to analyze the game out, that is, it is theoretically possible to come up with the objectively best move in every position. Where is the difference? Only the depth of analysis, and you claim it to be insignificant.
And please, drop your condescending attitude of you holding the objective, scientific truth; your opinion is as subjective as mine is. It is really not good discussion style.
♡ 108 ( +1 | -1 ) Before I begin, I'd like to remind you that you were the one to start with the attitude by calling my point a misconception. I merely returned the favor by addressing what I feel of your view in that I believe it is based on ideal, rather than scientific fact.
Now, let's address what you've said:
First you admit opening books were enhanced with computers, but then you say that they cannot totally be made by computers without human supervision. Here's the pickle: an endgame database can be done entirely by humans as well as an opening book. A computer was used simply to make the process easier and faster (much like a giant opening book is now).
2nd, you are using and unfair comparison when you claim my line of logic would allow the use of a computer engine for normal moves. You are forgetting that A computer has to assign a point-value system to each move and return the best one by it's own preference, rather than by solution. This is completely different from a database and is totally unfair to use that against me.
♡ 27 ( +1 | -1 ) As for your last comment: as I said, you could not gather enough humans to write down the moves for 6 pieces before the world ends, not even mentioning the problems in organizing such a feat. Therefore, you could not credibly claim to have done so.
♡ 63 ( +1 | -1 ) So it would be up to you to decide just how much humans could write down? Are we allowed to write down a 3-piece list? 4? 5? A 3-piece list could be done in short order by hand, so you'd have to start judging what you would and wouldn't allow as "humanly" possible to have been written. This opnes up a can of worms.
You can see why I have a problem with that. Just how much humans could write down is a completely hypothetical scenario. I ague that if we have to resort to imagined scenarios in order to disregard raw data, then opening books should not be allowed either.
♡ 104 ( +1 | -1 ) What I said was that you MIGHT be under a misconception; from what you said, it was not obvious that you clearly understood how such a tablebase is created. Let's however not split hairs here, that is not the point of our discussion.
While you might argue that both an opening book and an endgame tablebase can be created by humans (see my above posts for my stance on this), you admit that an endgame tablebase can be created by a computer ALONE, while an opening book cannot (unless the game is analyzed out, of course, which will never happen). To me, this sounds like a good characteristic to determine what may be used in ongoing games and what not.
Also, I don't think it was an unfair comparison. The computer's analysis is a better approximation of the "perfect" solution than what I can come up with, but it is still sub-optimal. Why, however, should it be legal to use the perfect move (which, according to your logic, exists, and may therefore be used, regardless if I found it myself or not), but not the possibly WORSE move produced by the computer?
♡ 29 ( +1 | -1 ) "A 3-piece list could be done in short order by hand..."
In "short order"?! Sit down and try it. You will then appreciate the amount of calculation that goes into an endgame tablebase. Consider that the amount of work rises exponentially with every piece you add.
♡ 22 ( +1 | -1 ) There is a very simple way to find out if humans can do something: to try it. This is no "imaginary scenario". As you yourself said, much of our current opening books were created in that manner over hundreds of years.
♡ 41 ( +1 | -1 ) What a long post for something...so simple. K+R vs. K+B can win ONLY under very special circumstances. Except for these, this ending is a draw. K+2N vs. K?, please, it's a draw!, unless you help your opponent to mate you. Paradogicaly, K+2N vs. K+P can win if the pawn is not very advanced because your opponent has extra forced tempos that you can use to win without stalemate him. These are elemental things, canonical endgames. What's the problem? I don't understand.
♡ 49 ( +1 | -1 ) Secrets of pawnless endingsKomei , this ending is generally a draw. It would be wrong for me to tell you how to win or draw but... I dont see nothing wrong with pointing you in the right direction. Try "Secrets of Pawnless Endings" by John Nunn. Excellent book!! In fact, a priceless book for anyone playing serious Chess via internet. It has won and drawn many endings for me that would have been otherwise beyond my grasp.
♡ 50 ( +1 | -1 ) Loreta and BellepheronLoreta, are you teaching me the chess rules? I said 100 moves to emphasize my patience, that's all. Bellepheron, in French there is a saying "Qui vivra verra". Black has the advantage, but it is not enough for a win. Reminds me of my game with hadenough. He had a rook against two knights and a pawn for me. He scarificed his rook for my pawn and had a theoretical draw, although I was two pieces up. Don't look only at the material situation, that's the mistake computers make, they get a material short term advantage but in the long run it serves them in no way.
♡ 53 ( +1 | -1 ) desertfoxPerhaps, you are right.
But at my skill level, and that of most of my opponents, I think that game is far too early to call a draw! It would almost be like calling a draw before the first move since the positions are 'equal'!
I would hope to catch my opponent in a tactical mistake, were I in his position. Whereas in yours I would gladly accept a draw!
In a way I do not look forward to achieveing such a high level of skill, because I enjoy the thrill of discovering how the game will go, as I piece it together...
♡ 33 ( +1 | -1 ) K, R and pawns vs K, B and pawnsI'm playing a game right now (board #737470) where white has KRPPP and black has KBPPP. I'm struggling to draw in that game. Feel free to look at it. However the game is not over yet so please don't comment. I'll return when the game is over.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656103324665.17/warc/CC-MAIN-20220627012807-20220627042807-00761.warc.gz
|
CC-MAIN-2022-27
| 17,085
| 65
|
http://ghostsquared.blogspot.com/2010/03/office-cure.html
|
code
|
If M$ Office's Word does not start or starts too slowly, check how fast it starts with the "/a" option, like:
In this mode all the add-ins and the templates do not apply.
If that's true (fast start with the /a), then:
Try to rename ~\Application Data\Microsoft\Template\Normal.dot (and probably the similar in that folder).
Go to Word's options dialog->add-ins, and try to disable all suspicious active add-inns.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-26/segments/1529267864958.91/warc/CC-MAIN-20180623113131-20180623133131-00624.warc.gz
|
CC-MAIN-2018-26
| 412
| 5
|
https://community.powerbi.com/t5/Issues/Unable-to-use-two-dimensions-in-visual-breaks-when-publishing-to/idi-p/460643
|
code
|
I am having issues with simple visuals like matrix and clustered column charts, where I want to use to columns from my dimension table in either row/column or axis/legend.
This is working fine in PBI Desktop, but when publishing to the portal I get the common error prompt on the visual:
Can't display the visual -
Couldn't retrieve the data for this visual. Please try again later. Please try again later or contact support. If you contact support, please provide these details.
When altering the combination by editing the report in the portal the measure works fine. Also in other one-dimensional visuals. But whenever the measure is set to display on two-dimensions - the visual breaks.
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578517745.15/warc/CC-MAIN-20190418161426-20190418183426-00307.warc.gz
|
CC-MAIN-2019-18
| 690
| 5
|
https://blog.nerdbucket.com/sloccounts-sloppy-slant-or-how-to-manipulate-programming-projects-the-wheeler-way/article
|
code
|
Sloccount is my newest Awesome Software Discovery. It’s a great idea, but is far too simple to do what it claims: estimate effort and expense of a product based on lines of code. And really, I wouldn’t expect it to be that great. The model used to estimate effort is certainly not the author’s fault, as it isn’t his model. But that idiot (David Wheeler) doesn’t just say it’s a neat idea – he actually uses this horrible parody of good software to “prove” that linux is worth a billion dollars. For the record, I prefer linux for doing any kind of development. I hate Windows for development that isn’t highly visual in nature (Flash, for instance kind or requires Win or Mac), and Macs are out of my price range for a computer that doesn’t do many games. So Linux and I are fairly good friends. I just happen to be sane about my liking of the OS. (Oh, and BSD is pretty fracking sweet, too, but Wheeler didn’t evaluate it, so neither will I)
To show the absurdity of sloccount, here’s a customized command line that is assuming pretty much the cheapest possible outcome for a realistic project. The project will be extremely easy for all factors that make sense in a small business environment. We assume an Organic model as it is low-effort and most likely situation for developing low-cost software.
Basically I’m assuming a very simple project with very capable developers. I’m not assuming the highest capabilities when it comes to the dev team because some of that stuff is just nuts – the whole team on a small project just isn’t likely to be having 12+ years experience, and at the top 10% of all developers. But the assumptions here are still extremely high – team is in the top 75% in all areas, and 6-12 years of experience, but pay is very low all the same. This should show a pretty much best-case scenario.
Also, I’m setting overhead to 1 to indicate that in our environment we have no additional costs – developers work from home on their own equipment, we market via a super-cheap internet site or something (or don’t market at all and let clients do our marketing for us), etc.
Other factors (from sloccount’s documentation ):
- RELY: Very Low, 0.75
- We are a small shop, we can correct bugs quickly, our customers are very forgiving. Reliability is just not a priority.
- DATA: Low, 0.94
- Little or no database to deal with. Not sure why 0.94 is the lowest value here, but it is so I’m using it.
- CPLX: Very Low, 0.70
- Very simple code to write for the project in question. We’re a small shop, man, and we just write whatever works, not whatever is most efficient or “cool”.
- TIME: Nominal, 1.00
- We don’t worry about execution time, so this isn’t a factor for us. Assume we’re writing a GUI app where most of the time, the app is idle.
- STOR: Nominal, 1.00
- Same as time – we don’t worry about storage space or RAM. We let our users deal with it. Small shop, niche market software, if users can’t handle our pretty minimal requirements that’s their problem.
- VIRT: Low, 0.87
- We don’t do much changing of our hardware or OS.
- TURN: Low, 0.87
- I don’t know what this means, so I’m assuming the best value on the grid.
- ACAP: High, 0.86
- Our analysts are good, so we save time here.
- AEXP: High, 0.91
- Our app experience is 6-12 years. Our team just kicks a lot of ass for being so underpaid.
- PCAP: High, 0.86
- Again, our team kicks ass. Programmers are very capable.
- VEXP: High, 0.90
- Everybody kicks ass, so virtual machine experience is again at max, saving us lots of time and money.
- LEXP: High, 0.95
- Again, great marks here – programmers have been using the language for 3+ years.
- MODP: Very High, 0.82
- What can I say? Our team is very well-versed in programming practices, and make routine use of the best practices for maintainable code.
- TOOL: Very High, 0.83
- I think this is kind of a BS category, as the “best” system includes requirements gathering and documentation tools. In a truly agile, organic environment, a lot of this can be skipped simply because the small team (like 2-3 people) is so close to the codebase that they don’t have any need for complexities like “proper” requirements gathering. Those things on a small team can really slow things down a lot. So I’m still giving a Very High rating here to reflect speedy development, not to reflect the grid’s specific toolset. For stupid people (who shouldn’t even be reading this article), this biases the results against my claim, not for it.
- SCED: Nominal, 1.00
- Not sure why nominal is best here, but it’s the lowest-effort value so it’s what I’m choosing. Dev schedules in small shops are often very flexible, so it makes sense to choose the cheapest option here.
So our total effort will be:
0.75 * 0.94 * 0.70 * 1.00 * 1.00 * # RELY - STOR 0.87 * 0.87 * 0.86 * 0.91 * 0.86 * # VIRT - PCAP 0.90 * 0.95 * 0.82 * 0.83 * 1.00 * # VEXP - SCED 2.3 # Base organic effort = 0.33647 effort
We’re also going to assume a cheap shop that pays only $40k a year to programmers, because it’s a small company starting out. Or the idiot boss only pays his kids fair salaries. Or something.
sloccount --overhead 1 --personcost 40000 --effort 0.33647 1.05
For something simple like Bloodsport Colosseum, this is an overly-high, but acceptable estimate. With HTML counted, the estimate is 5.72 man-months. Without, it’s 4.18 man-months. We’ll go with the average since my HTML counter doesn’t worry about comments, and even with rhtml having embedded ruby, the HTML was usually easier than the other parts of the game. So this comes to 4.95 months. That’s just about 21 weeks (4.95 months @ 30 days a month, divided by 7 days a week = just over 21). At 40 hours a week that would work out to 840 hours. I spent around 750 hours from start (design) to finish. I was very unskilled with Ruby and Rails, so this estimate being above my actual time is certainly off (remember I estimated for people who were highly skilled), and a lot of the time I spent on the project was replacing code, not just writing new code. But overall it’s definitely an okay ballpark figure.
When you start adding more realistic data, though, things get worse.
If you simply assume the team’s capabilities are average instead of high (which is about right for BC), things get significantly worse, even though the rest of the factors stay the same:
0.75 * 0.94 * 0.70 * 1.00 * 1.00 * # RELY - STOR 0.87 * 0.87 * 1.00 * 1.00 * 1.00 * # VIRT - PCAP 0.90 * 0.95 * 0.82 * 0.83 * 1.00 * # VEXP - SCED 2.3 # Base organic effort = 0.4999 effort
This changes our average from 4.95 man-months to 7.3 months, or about 31 weeks. That’s 1240 hours of work, well more than I actually spent. From design to final release, including the 1000-2000 of lines of code that were removed and replaced (ie, big effort for no increase in LoC), I spent about 40% less time than the estimate here.
…And for the skeptics, no, I’m not counting the rails-generated code, such as scripts/*. I only included app/, db/ (migration code), and test/.
However, this still is “close enough” for me to be willing to accept that it’s an okay estimate. No program can truly guess the effort involved in any given project just based on lines of code, so being even remotely close is probably good enough. The problem is when you look at less maintainable code.
Just for fun, you can look at the dev cost, which is $21k to $28k, depending on whether you count the HTML. I wish I could have been paid that kind of money for this code….
This app took me far less time than BC (no more than 150-200 hours). I was more adept at writing PHP when I started this than I was at writing Ruby or using Rails when I started BC. But the overall code is still far worse because of my lack of proper OO and such. So I tweak the numbers again, to reflect a slightly skilled user of the language, but worse practices, software tools, and slightly more complex product (code was more complex even though BC as a project had more complex rules. Ever wonder why I switched from PHP for anything over a few hundred lines of code?):
0.75 * 0.94 * 0.85 * 1.00 * 1.00 * # RELY - STOR 0.87 * 0.87 * 1.00 * 1.00 * 1.00 * # VIRT - PCAP 0.90 * 0.95 * 1.00 * 1.00 * 1.00 * # VEXP - SCED 2.3 # Base organic effort
WHOA. Effort jumps to 0.8919! New command line:
sloccount --overhead 1 --personcost 40000 --effort 0.8919 1.05
This puppy ends up being 3.4 months of work. That’s 14.5 weeks, or 580 hours of work — around triple my actual time spent!
Looking at salary info is something I tend to avoid because as projects get big, the numbers just get absurd. In this case, even with a mere 3500-line project, the estimate says that in the environment of cheap labor and no overhead multiplier, you’d need to pay somebody over $10k to rewrite that game. Good luck to whatever business actually takes these numbers at face value!
But these really aren’t the bad cases. Really large codebases are where sloccount gets absurd.
Big bad code
Slash ’em is a great test case. It isn’t OO, is highly complex, and has enough areas of poor code that I feel comfortable using values for average- competency programmers. So here are my parameters, in depth:
- RELY: Very Low, 0.75
- Free game, so not really any need to be highly-reliable.
- DATA: Nominal, 1.00
- The amount of data, in the form of text-based maps, data files, oracle files, etc. is pretty big, so this is definitely 1.00 or higher.
- CPLX: Very High, 1.30
- Complex as hell – the codebase supports dozens of operating systems, and has to keep track of a hell of a lot of data in a non-OO way. It’s very painful to read through and track things down.
- TIME: High, 1.11
- Originally Nethack was built to be very speedy to run on extremely slow systems. There are tons of hacks in the code to allow for speeding up of execution even today, possibly to accomodate pocket PCs or something.
- STOR: Nominal, 1.00
- I really can’t say for sure if Slash ‘Em is worried about storage space. It certainly isn’t worried about disk, as a lot of data files are stored in a text format. But I don’t know how optimized it is for RAM use – so I choose the lowest value here.
- VIRT: Nominal, 1.00
- Since the app supports so many platforms, this is higher than before. I only chose Nominal because once a platform is supported it doesn’t appear its drivers change regularly if at all.
- TURN: Low, 0.87
- Again, I don’t know what this means, so I’m assuming the best value on the grid.
- ACAP: Nominal, 1.00
- Mediocre analysts
- AEXP: Nominal, 1.00
- Mediocre experience
- PCAP: Nominal, 1.00
- Mediocre programmers
- VEXP: Nominal, 1.00
- Okay experience with the virtual machine support
- LEXP: Nominal, 1.00
- Mediocre language experience
- MODP: Nominal, 1.00
- The code isn’t OO, which for a game like this is unfortunate, but overall the code is using functions and structures well enough that I can’t really complain about a lot other than lack of OO.
- TOOL: Nominal, 1.00
- Again, nominal here – the devs may have used tools for developing things, I really can’t be sure. I know there isn’t any testing going on, so I can be certain that 1.00 is the best they get.
- SCED: Nominal, 1.00
- The nethack and slash ’em projects are unfunded, and have never (as far as I can tell) worried about a release schedule. Gotta choose the cheapest value here.
0.75 * 1.00 * 1.30 * 1.11 * 1.00 * # RELY - STOR 0.87 * # TURN (the rest are 1.00) 2.3 # Base organic effort
Total is now 2.166 effort. New command line, still assuming cheap labor and no overhead:
sloccount --overhead 1 --personcost 40000 --effort 2.166 1.05
Slash ‘Em is a big project, no doubt about it. But the results here are laughable at best. The project has 250k lines of code, mostly ansi c. The estimate is that this code would take nearly 61 man-years of effort. The cost at $40k a year would be almost $2.5 million! With an average of just under 24 developers, the project could be done in two and a half years.
I worked for a company a while ago that built niche-market software for the daycare industry. They had an application that took 2-3 people around 5 years to build. It was Visual C code, very complex, needed a lot more reliability than Slash ‘Em, was similar in size (probably closer to 200k lines of code), and had a horrible design process in which the boss would change his mind about which features he wanted fairly regularly, sometimes scrapping large sections of code. That project took at most 15 man-years to produce. To me, the claim that Slash ‘Em was that much bigger is a great reason to make the argument that linux isn’t worth a tenth what Wheeler claims it is. Good OS? Sure. But worth a billion dollars??
Linux and the gigabuck
I’m just not sure how anybody could buy Wheeler’s absurd claim that Linux would cost over a billion dollars to produce. Sloccount is interesting for sure, particularly for getting an idea of one project’s complexity compared to another project. But using the time and dollar estimates is a joke.
Wheeler’s own BS writeup proves how absurd his claims are: Linux 6.2 would have taken 4500 man-years to build, while 7.1, released a year later, would have taken 8000 man-years. I’m aware that there was a lot of new open source in the project, and clearly a small team wasn’t building all the code. But to claim that the extra 13 million lines of code are worth 3500 years of effort, or 400 million dollars…. I dunno, to me that’s just a joke.
And here’s the other thing that one has to keep in mind: most projects are not written 100% in-house. So this perceived value of Linux due to the use of open source isn’t exclusive to Linux or open source. At every job I’ve had, we have used third-party code, both commercial and open source, to help us get a project done faster. At my previous job, about 75% of our code was third-party. And in one specific instance, we paid about a thousand dollars to get nearly 100,000 lines of C and Delphi code. The thing with licensing code like this is that the company doing the licensing isn’t charging every user the value of their code – they’re spreading out the cost to hundreds or even thousands of users so that even if their 100k lines are worth $50k, they can license the code to a hundred users at $1000 a pop. Each client pays 2% of the total costs – and the developmers make more money than the code is supposedly worth. And clearly this saves a ton of time for the developer paying for the code in question.
If you ignore the fact that big companies can use open source (or commercially-licensed code), you can conjure up some amazing numbers indeed.
I can claim that Bloodsport Colosseum is an additional 45 months of effort simply by counting just the ruby gems I used (action mailer, action pack, active record, active support, rails, rake, RedCloth, and sqlite3-ruby). Suddenly BC is worth over $175k (remember, labor is still $40k a year and I am still assuming a low-effort project) due to all the open source I used to build it.
Where exactly do we draw the line, then? Maybe I include all of Ruby’s source code since I used it and its modules to help me build BC. Can I now claim that BC is worth more than a million dollars?
Vista is twice as good as Linux!
As a final proof of absurdity, MS has a pretty bad track record for projects taking time, and the whole corporate design/development flow slowing things down. Vista is supposed to be in the realm of 50 million lines of code. Using the same methods Wheeler used to compute linux’s cost and effort, we get Vista being worth a whole hell of a lot more:
Total physical source lines of code: 50,000,000 Estimated Development Effort in Man-Years: 17,177 Estimated cost (same salaries as linux estimate, $2.3 billion $56,286/year, overhead=2.4)
To me these numbers look just as crazy as the ones in the Linux estimate, but MS being the behemoth it is, I’m not going to try and make a case either way. Just keep in mind that MS would have had to dedicate almost 3,000 employees to working on Vista full-time in order to get 17,177 years of development done in 6.
The important thing here is that by Wheeler’s logic, Vista is actually worth more than linux. By a lot.
Linux fanatics are raving idiots
So all you Linux zealots, I salute you for being so fiercely loyal to your favorite OS, but coming up with data like this (or simply believing in and quoting it) just makes linux users appear a ravenous pack of fools. Make your arguments, push your OS, show the masses how awesome Linux can be. But make sound arguments next time.
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-50/segments/1606141692985.63/warc/CC-MAIN-20201202052413-20201202082413-00084.warc.gz
|
CC-MAIN-2020-50
| 16,731
| 105
|
https://markoheijnen.com/fresh-new-start/
|
code
|
Starting of today I’m moving all my sites to a new server with a WordPress network installation. First reason is that the current server runs Apache with Directadmin but I wanted to have full control over what I install on the server.
The current implementation is a Debian (testing) distribution with nginx 1.3.5 as server with SPDY installed. I don’t yet need SPDY but I do have some plans coming where secure connection is needed. Also I installed APC
Since I switch to nginx I stopped using W3 Total Cache. It’s a really powerful plugin but I want something that I can control with hooks instead of a settings. Also a lot of option can’t really be used when running nginx. Browser cache is something nginx already take care off.
For object caching I use for APC Object Cache Backend from Mark Jaquith.
Another thing is the CDN. I don’t really need to store my files on another server. I do however want to have a cookieless domain. So I rewrite all the needed urls to another domain what still get the images from my server.
Last thing is page caching. This is something I’m unsure about. I will look into WP Super Cache and Batcache. It’s most likely I will end up with file caching since my host has SSD caching so reading those files will hopefully be really fast. Who knows I try to combine something together so switching over to Batcache is possible then.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100529.8/warc/CC-MAIN-20231204115419-20231204145419-00326.warc.gz
|
CC-MAIN-2023-50
| 1,379
| 6
|
https://brugbart.com/syntax-highlighting
|
code
|
Syntax highlighting is the coloring of certain syntaxes in a markup or programming languages. It is commonly used by source viewers, and editors used when programming, scripting, and coding generally.
Large source files can be quite overwhelming to developers, so Syntax highlighting has been integrated as a feature to improve readability of code. Many editors support multiple languages, some even allow their users to add new languages.
It also helps programmers spot errors in their code, in that it can highlight syntax errors.
Editors and other Tools
Many editors allow for customization of the color schemes used, but their highlighting may not always be entirely accurate.
If you are looking for editors, and other tools, then have a look in Web Designers Tools List.
The above list is far from complete, so if you know of other free tools with support for Syntax highlighting as a minimum feature, then don't hesitate to post them in the comments of the above article.
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-47/segments/1510934805417.47/warc/CC-MAIN-20171119061756-20171119081756-00079.warc.gz
|
CC-MAIN-2017-47
| 977
| 7
|
http://thecrowdsourcingadvisor.org/virtualbox-install-ubuntu-on-mac-os-x.html
|
code
|
For information on this, have a look here:. How to Remove or Uninstall Oracle VirtualBox Extension Pack The above method to install Extension Pack on VirtualBox is not only limited to portable editions, but it also works perfectly on other editions. Select Disk Utility Select your disk on the left side. Since distributing driver modules separately from the kernel is not something which Linux supports well, the install process creates the modules on the system where they will be used. Am I supposed to write all the code in manually? But if you are a developer, and you really need those functionalities, you should not think once again before you download and install a Pack.
I said hackintosh because you have to prepare you virtual machine for osx sierra. Use either of the following commands: VirtualBox. Can the display resolution be increased? If you know the Installation process then skip step 1. So it may be worth it to look up vmware and see if that plays more nicely with this vmdk. Eric Gosh September 9, 2017, I ran through the instructions but did not shut down VirtualBox the first time through. The instructions assume that you have not changed too much from the original installation, particularly not installed a different kernel type. I personally think this is better than installing as a bootable media on the hard disk.
If you suspect that something has gone wrong with module installation, check that your system is set up as described above and try running the following command, as root: rcvboxdrv setup 2. I just installed following your tutorial. As part of the installation you will be asked to select a username and a password. VirtualBox provides you with both of these things, so you can use it with confidence that you will not end up with problems a year down the line. .
Jake May 11, 2017, Hey Karolina, Most of the time critical errors such as yours happen due to the code. In this case, find out the current group memberships with the groups command and add all these groups in a comma-separated list to the command line after the -G option. It may be specific to 5. The running kernel and the header files must be updated to matching versions. I have tried just about all the commands you can find floating around as possible solution. Let me know how it works Luke. I guess I am missing something or doing something wrong, I just do not know.
Once the postinstall script has been executed your installation is now complete. Let me know how it works for you, Karolina. Its current available version is exclusively designed to meet domestic net surfing issues successfully. This usually means first installing software packages from the distribution which are needed for the build process. Click Select and then click Ok to save the changes you made.
I've adapted these commands in part from this. Now, all that you have to do is find your Command Prompt cmd and Run as an administrator. Installing these should fix your repeated reboot problem. Is there any work around of this problem? So anyways… i will stop rambling now. Step 5 Tell me how it goes, Sean. How do I fix error code 0xc0000005 in Windows 7. I would let you know if I am able to reproduce your issue.
The following guide uses Ubuntu 15. At this point you should be connected to the Internet and completely ready to go — have fun! On the next screen click on customize button. To do this it installs a driver module called vboxdrv which does a lot of that work into the system kernel, which is the part of the operating system which controls your processor and physical hardware. If you have tried that then try disabling your security and then try again. Cobra March 23, 2018, Yeah… this guide has been floating around for some time now, being posted by different authors. Michel Lavigne March 17, 2018, Hi Jake.
The vboxusers Group The Linux installers create the system user group vboxusers during installation. It is safe to click Install Now, so do just that. Double click on the file. Install Ubuntu Server Install Ubuntu Server using the installation wizard with the default settings. I have virtual box installed on my 3rd drive; went through all the steps, and the commands on the command line just kept cycling through over and over again. Until then, keep me updated and let me know how it goes, Casper.
If there is no such code, it is usually kernel-devel. Step 2: Select the Extension option and just select the package you want to uninstall. Jake June 23, 2017, Hey James, It mostly likely could be the location of the drive indeed. I installed it on a Core i7 Ubuntu 64bit host machine. If anyone else tries the same. Here are some solutions that you may try. This entire tutorial should take approximately 20 minutes not including download times.
Any idea what could be the cause? I am using Version 4. The debconf system is used to perform this task. Installing on Oracle Solaris Hosts For the specific versions of Oracle Solaris that are supported as host operating systems, see. So, download Image and install the same and get a first-hand look and feel into the whole virtual set up and how it operates and helps you. Click next followed by finish to complete the creation of new virtual hard disk. This is to make sure that you are not running on an older Windows update Step 2: Do System Reboot.
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579251694071.63/warc/CC-MAIN-20200126230255-20200127020255-00451.warc.gz
|
CC-MAIN-2020-05
| 5,330
| 10
|
http://www.dreamincode.net/forums/topic/115451-beginning-scheme-programming/
|
code
|
I'm still a bit of a beginner to Scheme myself, so this will be very basic.
However, Scheme is a natural language for me and I learn it rather quickly so I'll likely be adding updates when I learn more.
Anyway, let's begin.
First off, Scheme is in a family of languages called LISP, short for list-processing. As such, the language specializes in processing lists (go figure).
Lists can be very powerful tools if used properly. You can manage entire sets of data at once using lists. There are a few peculiarities of the LISP languages that date back to its initial inception. I will make an attempt to explain these the best I can as I go along.
First things I would like to discuss about the language. The basic design of the language is oriented towards 'functional programming'. Basically, functional programming attempts to create clean, concise functions without the types of side-effects that can arise in object-oriented languages and the like.
The method for producing functions is based on Alonzo Church's Lambda Calculus. As I am not an expert at this topic, I won't go into it at depth. Suffice it to say that functions are generally formed using lambda notation derived from the lambda calculus. Also, the syntax of the language is in prefix notation like the lambda calculus (in other words instead of most languages that would say something like f(x, y) Scheme says (f x y)).
One of the cool things about Scheme is that defined data are merely symbols and can represent anything. Not only that, but certain alphanumeric characters that are normally restricted from use in naming are not restricted in Scheme. Still, it's best not to get too wild with your naming conventions. One reason I point this out is there is a specific naming convention in Scheme that all predicate symbols are followed with a ? and all symbols that cause side-effects are followed with a !
Anyway, onto some coding.
Since Scheme is a powerful calculating language, most of this tutorial will be about forming powerful calculating functions. As such I will not include the typical "Hello world" example in this tutorial. Instead I will start by giving some examples of how to form basic statements in Scheme.
First of all, there is something called 'arity' which describes how many arguments a function can have. If you attempt to use a function defined for a different number of arguments than what you have supplied, Scheme will produce an arity-error.
(+ 1 2)
This means the same as 1 + 2.
Since it's in prefix notation, even things like + and - are used at the beginning of a function. The only common exception to this is the use of complex numbers of the form #.#+#.#i .
let's try some more
(+ (* 2 3) (/ 6 2))
This will yield (2 * 3) + (6 / 2) or (6 + 3) or 9
you can layer your code as deep as you want.
(+ (* (+ (* (+ 2 3) 4) 5) (+ 2 8)) (- 7 4))
this would yield (((((2 + 3) * 4) + 5) * (2 + 8)) + (7 - 4))
when you get more parentheses, sometimes it's easier to add them on new lines
(+ 2 (* 3 (+ 5) ) )
or you can indent if you'd like
(+ 3 (- 7 (* 2 3)))
now let's introduce some basic list concepts.
There are two ways to form lists. You can either construct a list using a single data item and a list to add it onto. Or you can take two data items.
However, if you construct a list using only two data items, you'll get what is called a 'dotted pair'. This can easily be remedied by using the list keyword.
Also, Scheme reads your statements starting with the definition of the first item in the list (something like (+ 2 3) can be considered a list of 3 elements) and attempts to evaluate it. If you don't want it to be evaluated, you have to quote it. You can either do this using the keyword quote or by using '. Thus (quote a) and 'a would both yield a whereas (a) would attempt to evaluate whatever a is. If a is not defined as anything (a) would yield an error.
(cons 'a '(b c)) (cons 'a 'b) (list 'a 'b)
The above code will yield the following:
(a b c)
(a . b)
You can also form a list by constructing a list (via the cons keyword) using a data item and the empty list ()
(cons 'a (cons 'b (cons 'c ())))
The above code should yield (a b c) as well.
Now let's discuss breaking a list into pieces. Suppose you start out with a list such as (a b c). There are two very special keywords that can be used to access particular pieces of the list.
The first keyword is car... this is a keyword that originally meant 'contents of the address register' back when LISP was first created. Also, there is the keyword cdr... this meant 'contents of the decrement register'. The car of a list is the first data item in a list, even if that data item is a list itself. The cdr (pronounced "could-er") of a list is every element less the first one. Thus if you had a list named z that was defined as (a b c) then
(cons (car z) (cdr z))
will yield z back again.
If you want to access other elements of a list, you have to do combinations of these keywords. So, if z is still defined as (a b c) then:
(car z) (car (cdr z)) (car (cdr (cdr z))) (cdr z) (cdr (cdr z)) (cdr (cdr (cdr z)))
will yield the following:
( c )
As you may have noticed in the last example if you're only left with a list of one element, the car will be the element while the cdr will be the empty list.
Now that we've covered constructing and destructing lists, let's do something useful with this knowledge.
First, I want to tell you about the let and define keywords. The let keyword allows you to temporarily set a value to a symbol for use in a single expression. The define keyword allows you to set a value on a function until it's changed or until you end the session.
(let ( (x 2) (y 3) ) (+ x y) )
This will first set the variables x and y temporarily to 2 and 3 respectively. Then it adds them together. The value 5 should result.
Now let's try it with define.
(define x 2) (define y 3) (+ x y)
The first two lines will evaluate, then after the third line it will yield 5. Then if you type x or y after that they will evaluate to 2 or 3 respectively.
Let's define something a little bit more difficult. Let's make a function that will accept two values x and y and do a little arithmetic.
(define f (lambda (x y) (* x y) ) )
This should evaluate and say something like "function f".
Now let's make an absolute value function.
(define absol-val (lambda (x) (if (< x 0) (- 0 x) x )))
In this case I've introduced the if keyword.
If automatically has the so-called 'else' statement built into it.
It's a one condition keyword. It works as follows:
If - condition - consequence - alternative
However, you can form the equivalent of an if/else statement with it.
If - condition - consequence - if...
However, there is a keyword cond that takes conditional statements.
Based on the way the if keyword works, it's pretty self-evident how cond works, so I'll not cover it here.
Anyway, the above code works like so: if x is less than 0 then subtract x from 0 (hence getting the negative of the number) else return x
Now that we know how to do this, let's get into a deeper concept: recursion. Recursion allows you to define something in terms of itself. By changing the value being checked each time and setting some termination condition, one can make a clean and concise function by using recursion.
Let's use the common factorial function as an example.
(define fact (lambda (x) (if (<= x 1) 1 (* x (fact (- x 1) ) ) )))
What this code is saying basically is that if x is less than or equal to 1 then return 1, otherwise return x * fact(x - 1)
So, if we take the number 5 for example...
(* 5 (* 4 (* 3 (* 2 1)))) -> (* 5 (* 4 (* 3 2))) -> (* 5 (* 4 6)) -> (* 5 24) -> 120
Now let's have some fun... next we're going to use the list processing that we learned earlier and our fact function we just defined and make a new function that will take a list of values such as (1 2 3 4 5) and return a new list of equal length of their factorials such as (1 2 6 24 120).
(define fact-list (if (eq? x ()) x (cons (fact (car x) ) (fact-list (cdr x) ) ) ))
Now this function's really neat. First we check to see if x is equal to the empty list (= is only used to check numbers, thus a predicate like eq? must be used to check if it's a list) and if it is then simply return the empty list. Otherwise, construct a list of the fact of the first element and the fact-list of the rest of the list. Intuitively, this may seem difficult to grasp what's going on at first, but let me elaborate with an illustration... Suppose we started with the list (1 2 3 4 5) so the statement was
(fact-list '(1 2 3 4 5))
then it would evaluate as follows:
x is not empty -> fact of car (1 2 3 4 5) is 1, cdr x is (2 3 4 5) ->
x is not empty -> fact of car (2 3 4 5) is 2, cdr x is (3 4 5) ->
x is not empty -> fact of car (3 4 5) is 6, cdr x is (4 5) ->
x is not empty -> fact of car (4 5) is 24, cdr x is (5) ->
x is not empty -> fact of car (5) is 120, cdr x is () ->
x is empty...
This will look like
(cons (fact 1) (cons (fact 2) (cons (fact 3) (cons (fact 4) (cons (fact 5) ())))))
according to Scheme. Thus yielding (1 2 6 24 120).
Now you know some of the basics of Scheme... Have fun scheming!
This post has been edited by Jaakuuta: 19 July 2009 - 12:15 PM
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917123590.89/warc/CC-MAIN-20170423031203-00138-ip-10-145-167-34.ec2.internal.warc.gz
|
CC-MAIN-2017-17
| 9,205
| 87
|
http://zulinz.xyz/archives/5107
|
code
|
Lovelyfiction Dual Cultivation read – Chapter 650 – B.r.e.a.s.t Milk safe deeply reading-p2
Novel–Dual Cultivation–Dual Cultivation
Chapter 650 – B.r.e.a.s.t Milk count powder
absalom absalom chapter 7
“That cultivation pace is just not fair… but what else will we be expecting from somebody that was in the past an Immortal on his previous daily life?” Zhu Mengyi stated that has a look in her facial area.
“Let’s not squander it…” Wu Jingjing spoke as she began licking the Yang Qi off Zhu Mengyi’s entire body.
After the occasion of silence, Wu Jingjing questioned him, “When you don’t brain me inquiring, how would you perish within your past everyday life?”
conan compilation – the coming of conan the cimmerian pdf
“Having said that, right after creating some thought, I have got made a decision to stop learning to be a coward and convey those who wish to be around me into the Divine Heavens. After all, generally if i cannot even defend the women I enjoy, may i even be known as a mankind?”
Following sucking on the b.r.e.a.s.ts for a couple of times, Su Yang spoke having a content smile, “It style wonderful. The feel is clean and rich and creamy even though the prefer is subtly sugary. I wouldn’t whine should i needed to ingest this everyday.”
“Let’s not spend it…” Wu Jingjing spoke as she started licking the Yang Qi off Zhu Mengyi’s system.
Su Yang nodded and licked around her pinkish circle prior to sucking in it with pressure, contracting her b.r.e.a.s.t dairy with his jaws.
“Come right here,” Su Yang pulled the two beauties towards himself and produced the 2 of them take a seat on each of his laps.
Ability to hear their answer, Su Yang nodded by using a smile and claimed, “Before we follow the customs, let me let you know the family procedures.”
Wu Jingjing and Zhu Mengyi exchanged glances collectively ahead of nodding in silence. They converted to view Su Yang and spoke simultaneously, “We have been willing!”
Joy of Life
Some time afterwards, Su Yang calmly laid around the bed furniture, because it was finally the ladies’ use consume his whole milk.
“Our company is willing!” They responded without hesitation.
Su Yang silently patiently waited for their response.
He then proceeded to clarify the principles they must comply with as part of his Su Household.
planet voodoo mercury
After giving Wu Jingjing and Zhu Mengyi an instant to put together themselves mentally, Su Yang spoke, “Let’s start with my qualifications. Firstly, my entire body may possibly be 18 years, although i am actually older the truth is, while i have memories of my former existence. Put simply, I had expert reincarnation, plus i was once an Immortal around my previous everyday life.”
A couple of instances afterwards, Su Yang licked his lips and nodded using a completely satisfied encounter, “Mmm… it’s approximately the same as Wu Jingjing— I really like it.”
“That cultivation speed is simply not fair… but what else will we expect from somebody that had been an Immortal as part of his prior lifestyle?” Zhu Mengyi stated by using a look on the facial area.
He then proceeded to explain the principles they have to stick to as a member of his Su Family members.
dead mystery writers
“Whoa~! There’s a lot!” Zhu Mengyi exclaimed, feeling very hot across her entire body.
“Having said that, right after creating some idea, We have chosen to stop like a coward and convey those who would like to be around me to the Divine Heavens. Naturally, should i cannot even protect the ladies I adore, can one also be referred to as mankind?”
In the meantime, Wu Jingjing and Zhu Mengyi performed together to enjoyment Su Yang’s decrease entire body with Wu Jingjing stroking his divine sword and Zhu Mengyi ma.s.saging his jewels with regards to their hands and fingers while on his lap.
“We have been ready!” They responded without reluctance.
Ability to hear their remedy, Su Yang nodded by using a teeth and reported, “Ahead of we follow the customs, allow me to let you know a family procedures.”
the picture of dorian gray quotes
Each Zhu Mengyi and Wu Jingjing stared at him with extensive sight full of impact, because they didn’t expect this type of revelation from Su Yang.
“Then let us commence the personalized, the place I can provide our family Secure.” Su Yang spoke when he began loosening his robes.
In the meantime, Wu Jingjing and Zhu Mengyi worked together to enjoyment Su Yang’s reduce physique with Wu Jingjing stroking his divine sword and Zhu Mengyi ma.s.saging his jewels because of their hands and wrists while located on his lap.
youth and sexuality in church
Then he proceeded to spell out the principles they abide by as part of his Su Family members.
A few moments afterwards, he questioned them, “I am going to request you one final time— have you been willing?”
“Amazing~! There’s so much!” Zhu Mengyi exclaimed, experiencing very hot around her body system.
“Let’s not spend it…” Wu Jingjing spoke as she started off licking the Yang Qi off Zhu Mengyi’s body system.
A few instances later on, Su Yang licked his lips and nodded using a satisfied experience, “Mmm… it’s about the same as Wu Jingjing— I really like it.”
“Now onto precisely why I didn’t want to carry accountability. Though I am just now nowadays, I do not intend on keeping right here throughout my entire life, and I have plans to abandon this put and come back to my own, personal world in approximately 24 months. We have a lot of foes within the Divine Heavens, plus i didn’t need to put you or our kids at risk, for this reason why I didn’t dare to take you with me.”
A short while afterwards, Su Yang also produced his dairy, photographing all of it over their own bodies as well as hitting the roof.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296949035.66/warc/CC-MAIN-20230329213541-20230330003541-00786.warc.gz
|
CC-MAIN-2023-14
| 5,875
| 43
|
https://www.pinterest.com/explore/chest-workout-for-mass/
|
code
|
A list of the best chest exercises for mass, including detailed instructions on how to perform each movement and helpful illustrations.
Chest workouts for mass!
Learn how beginners can build a massive chest! This guide discusses the chest, its function and recommended exercises. Try these 5 great chest workout programs for size!
Chest WORKOUT For Mass and muscle building Tips http://alphateam.sg
The Best Inner Chest Workout for Mass
Bodybuilding.com - 5 Chest Workouts For Mass - A Beginner's Guide!
The Best Shoulder Exercises for Mass - Take Fitness
<p>Bicep and Tricep Workout Routine for mass. This routine can be perform 2 times a week with two days of resting between each workout session.</p>
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280835.22/warc/CC-MAIN-20170116095120-00150-ip-10-171-10-70.ec2.internal.warc.gz
|
CC-MAIN-2017-04
| 703
| 8
|
https://ijpam.eu/contents/2013-82-1/4/index.html
|
code
|
IJPAM: Volume 82, No. 1 (2013)
Department of Mathematics and Computer Science
Papua New Guinea University of Technology
Lae, PAPUA NEW GUINEA
Abstract. The utility of complex analysis in providing a rich family of holomorphic functions has motivated the extension of the planar theory based on complex numbers to a -space study with functions of a quaternion variable. A function of a quaternion variable is a function with domain and range in the quaternion. Such functions naturally appear when one considers the projection of a quaternion onto its scalar part or onto its vector part, as well as the modulus and versor functions. A very useful function of quaternion variable is the function which rotates the vector part of a quaternion by twice the angle of a quaternion In this paper, we present a brief survey of some interesting discrete properties of as well as propose its utility in the description of pythagorean triples. Representing the quaternion in matrix form, along with a microscopic modification of our results in this paper, resolves an open problem by Mircea Crasmareanu [#!CM!#] concerning a connection between the pythagorean triple preserving matrix and the algebra of quaternions.
Received: August 13, 2012
AMS Subject Classification: 11D09, 20D15
Key Words and Phrases: complex number, quaternion, rotation, pythagorean angle, pythagorean triple
Download paper from here.
Source: International Journal of Pure and Applied Mathematics
ISSN printed version: 1311-8080
ISSN on-line version: 1314-3395
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224657169.98/warc/CC-MAIN-20230610095459-20230610125459-00447.warc.gz
|
CC-MAIN-2023-23
| 1,524
| 12
|
http://www.w3.org/2008/01/08-hcls-minutes.html
|
code
|
See also: IRC log
<LeeF> thanks, zakim
<Vipul> Welcome jennier
<LeeF> Scribe: Jennifer
<Vipul> EricP can you come on Zakim
<Vipul> 1. Roll Call
<Vipul> 2. Admin Issues: Set up mailing List
who will do this?
<Vipul> EricP, please come on line?
Eric will set up mailing list for COI task force, but he is not on the call
<LeeF> ScribeNick: fostel
<Vipul> 3. Mock Patient Data for Diabetes and Hypertension
vipul: good meting with
... should have mock data soon
Parsa: format of data? out / in
... historic data?
vipul: example of each in and
outpt; data items in example;
... example protocols from clinicaltrials.gov
narrative or structured?
vipul -- format should not be an issue
parsa -- searched reports for outpt data + history + contextual data; have several cases in narrative form; will upload
parsa -- not of the data reports have all of the elements listed by vipul; need a handful of pts showing different data elements
parsa: discussion with UTx clinic; collect outpt data; willing to share whole data set, lab reports in a few days. 2K pts data; need to strip out IDs
vipul: sample of pts from this database
parsa: focus on diabetes nad hypertension; use remaining to test our format / model
next agenda: Jyoti clarification
Joyti - plannignmeeting with div epidemiology planned for early Feb; will try to obtain data
action item - jyoti report back after this meeting
<Vipul> ACTION: Jyoti to report back after 1st Feb [recorded in http://www.w3.org/2008/01/08-hcls-minutes.html#action01]
<Vipul> Peter Elkin
joyti: peter Elkin not aware / not interested
jyoti: harold in not in the loop at this point; need to involve him; will discuss this week; send e-mail to vipul
vipul: tom still working on data;
set up a meeting
... useful to get data from different sources to stress the system
rachel: no access to data; provide dummy data?
sorry about typos!
vipul: progress on dummy pt data;
data requirements ... George?
... George will come up with data requirements for hypertensive study
... minimum dataset for clinical study; particular data items must be included
fostel: we should check CONSORT
for minimum data
rachel?: not aware of minimal data in research trials
fostel: argee with rachel re minimal reqs
vipul: data from free research
protocols; distributed to data people; will upload the
... work on mapping
... will identify key data items from the spreadsheet;
... aim to look at data requirements eg pt age; HL7 RIM - how is pt age modeled
... role = pt; attribute = birth time; data type = time stamp
<Parsa> URL for CONSORT: http://www.consort-statement.org/
vipul; yesterday distributed spreadsheet; tom-- how will DCM elements be found?
vipul: gender example -- HL7 has
code; RIM has well defined domains
... RIM has terminology, eg male / female; also can bind user own data terms
... blood pressure -- observation; obs type = physical exam for instance
... RIM obs.code and obs value; code = obs type; this is what Tom was referring to
... obs value domain bind to ICD9, or bind to SNOMED; HL7-RIM is agnostic to vocab, can bind ot any set of terms
who?: in NL can use terminology, JP can use another teminology
vipul: drug = zenical; HL7-RIM
would need route, dosage, frequency, time of delivery
... we need to model time
fostel: time is a critical thing to model, indeed!
vipul: model needs to be general; pt recruitment, trial, etc. not hard code it based on one use case
Tom: some folks may store these
data, eg administration of drug, in which case route,
frequency, etc would be stored
... :pt is taking fentinyl" is a different case; eg pt is taking the drug but we do not have administration details
... if the derived data are frequently-queried, then store them; they always store granular administration data
parsa: direct and indirect
evidence -- pts may have assertion that he has fever (in vital
signs) or may have medication for fever in chart
... model depends on goal; physician note/diagnosis regarding disease, med, symptom; or is it sufficient to infer this from other evidence?
vipul: example - document posted on wiki -
parsa: self-reported fever; family-reported fevel; practitioner-reported fever; objeective fever (based on measurement)
vipul: we are thinking of
modeling the first three as inference
... these will be identified suring mapping across systems
... assessment not inference
... example, protocol 8, criteria 16: uncontrolled hypertension has value greater than N; in ER would only have the raw values, reasoner would need to be able to infer diagnosis
... will distribute the spreadsheet; can we fill out DCM elements?
... any standard; not just DCM
... action item for tom -- DCM values for these rows
... HL7 has std way to go to vocab; will we use this method or another?
tom: they have internal vocab; may be mappable to LOINC, etc, but they bind their model to their terms
<Vipul> ACTION: Tom Oniki to come up with DCM elements for the list of HL7/RIM elements [recorded in http://www.w3.org/2008/01/08-hcls-minutes.html#action02]
parsa: std way to map?
vipul: next agenda: clarification
to some folks; will send further
... scope of project; something accomplished within 6 to 9 months, but not too narrow a scope
... good prospects - Deni (institution in Ireland?) has identified a student to help with the tasks
... lee (online but muted) cambridge informatics, implementation of mapping model
... need to answer questions raised before mapping
<LeeF> Cambridge Semantics, actually :)
vipul: much work in mapping to be done; RIM to use case
<Vipul> ACTION: Vipul to send out the brainstorming slides to the rest of the group [recorded in http://www.w3.org/2008/01/08-hcls-minutes.html#action03]
who? fine grained details about contents of fields; this is useful in order to line up groups to handle the tasks
vipul: high level functional specs; details (RDF, Owl, ..) up to implementer
who = Parsa
parsa: is there a sematic
representation of HL7RIM that we can use as basis of mapping or
do we have to create one?
... every narrative has to be converted ton RDF/OWL representation
vipul: no single structure now; we are not making one; we want to make a representation that will be useful to other use cases
<LeeF> suggestion: model the RIM to the extent we have instance data for it for the use case
parsa: yes, we are not modeling entier RIM; but part that is useful to our use case still needs to bemapped
<LeeF> (ah, I guess that's what Parsa just suggested also :-)
vipul: we are sending the specs around
<JyotiPathak> Apologies -- I am signing out; need to run for another meeting.
who: RIM Is Obj Oriented; they have UML; we need to translate this to class hierarchy in automated way
who?: propose RIM-OWL demonstration;
who? look at data description not RIM model; RIM is high level
<LeeF> who = Helen, I think
vipul: look at sematic binding
helen: then go to CDA
... RIM doesn't lend much to semantics
tom: RIM is high level; not as up
to date as Dan as how they do constraints
... constrain HML representation of document
vipul: look at CDA into more detail
susie (aka helan): translate directly into RDF from CDA
keep us all inthe loop!
vipul: work with Dan on HL7 descriptions, Tom RIM, Helen CDA
<scribe> ACTION: email spreadsheet [recorded in http://www.w3.org/2008/01/08-hcls-minutes.html#action04]
<Vipul> ACTION: Helen Chen to investigtat the CDA [recorded in http://www.w3.org/2008/01/08-hcls-minutes.html#action05]
vipul: see you next week!
This is scribe.perl Revision: 1.128 of Date: 2007/02/23 21:38:13 Check for newer version at http://dev.w3.org/cvsweb/~checkout~/2002/scribe/ Guessing input format: RRSAgent_Text_Format (score 1.00) Found Scribe: Jennifer Found ScribeNick: fostel WARNING: No "Topic:" lines found. Default Present: Tony, LeeF, +1.781.416.aaaa, +1.519.746.aabb, Susie, Helen_Chen, Bo.Anderssen, Vipul, Jennifer, +1.813.484.aacc, TomL, RachelRichesson, Parsa Present: Tony LeeF +1.781.416.aaaa +1.519.746.aabb Susie Helen_Chen Bo.Anderssen Vipul Jennifer +1.813.484.aacc TomL RachelRichesson Parsa WARNING: No meeting title found! You should specify the meeting title like this: <dbooth> Meeting: Weekly Baking Club Meeting WARNING: No meeting chair found! You should specify the meeting chair like this: <dbooth> Chair: dbooth Got date from IRC log name: 8 Jan 2008 Guessing minutes URL: http://www.w3.org/2008/01/08-hcls-minutes.html People with action items: chen email helen jyoti oniki tom vipul WARNING: Input appears to use implicit continuation lines. You may need the "-implicitContinuations" option. WARNING: No "Topic: ..." lines found! Resulting HTML may have an empty (invalid) <ol>...</ol>. Explanation: "Topic: ..." lines are used to indicate the start of new discussion topics or agenda items, such as: <dbooth> Topic: Review of Amy's report[End of scribe.perl diagnostic output]
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917118552.28/warc/CC-MAIN-20170423031158-00216-ip-10-145-167-34.ec2.internal.warc.gz
|
CC-MAIN-2017-17
| 8,813
| 129
|
https://forum.mattermost.com/t/kanboard-pllugin-for-mattermost/10131
|
code
|
I noticed recently TODO plugin was added for Mattemost which is in beta right now. Thank you for adding the TODO plugin!
Now, I also noticed there is a plugin for Kanboard on GitHub but it is not being maintained for Mattermost.
Any though on picking up the support for Kanboard plugin for Mattermost?
We are in the middle of deciding to go with Kanboard but had hoped that it was integrated into Mattermost but not sure if Mattermost team has any thoughts on the Kanboard.
Many thanks in advance of providing any feedback or directing me to another plugin within Mattermost that would do a job similar to Kanboard.
Can I please confirm if you were referring to the Mattermost plugin for Kanboard as I can see that the page has been dormant since 2 years ago?
I have also reached out internally to see if we have any updates on Kanban Plugin for Task Management as well. Not specific Kanboard but potentially something that you might also be interested with.
Yes, I am referring to the Mattermost plugin for Kanboard.
Yes, something that would manage and track tasks would be great.
Much appreciate any feedback.
Any updates on this? Did you get any information after reaching out internally regarding the Kanban plugin? I’m very interested in this, too!
Hi, @ssimkt and @pandel
I can confirm that it was a proof of concept during a Hackathon event. It would need changes in the plugins system to work and looks like is not going to happen soon unless there is a reason to move in that direction.
I hope that helps to clarify the status of the plugin.
Just a word to say that software that use Slack integration via webhook usually also work for Mattermost.
For Kanboard, I tried https://github.com/kanboard/plugin-slack which works with Mattermost.
The final notification which appears in Mattermost channel is very rudimental (no hyperlink towards the related kanbord task) but I think very few adjustments would be needed to make it nice. Anyway it basically works.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652663039492.94/warc/CC-MAIN-20220529041832-20220529071832-00632.warc.gz
|
CC-MAIN-2022-21
| 1,970
| 17
|
https://www.motioncontroltips.com/plc-watchdog-timers/
|
code
|
Basically, the function of a watchdog timer is to make sure that some processing malfunction does not shut down the entire system. Examples of malfunctions can be hardware failures or a program error that may, for instance, send the program into an infinite loop.
In PLCs, watchdog timers are typically involved with the program scan part of the system. That is, they monitor how long it takes for the processor to scan through the program. If it exceeds some pre-set limit, the timer sends a signal to the PLC processor to stop the program until the problem is corrected.
Getting back to normal operation requires fixing the underlying problem and restarting the PLC.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233511284.37/warc/CC-MAIN-20231003224357-20231004014357-00367.warc.gz
|
CC-MAIN-2023-40
| 668
| 3
|
https://www.nxtbook.com/nxtbooks/advanstaruk/pte_201007/index.php?startid=6
|
code
|
Pharmaceutical Technology Europe - July 2010 - (Page 6)
Data Matrix barcodes: points to consider
A 2D Data Matrix barcode contains data that enable a product to be identified, and can also incorporate additional attributes, such as the batch number and expiry date and, if required, unique serial numbers. Certain modules of the barcode can also be used as error correction values in case the data does not decode correctly. These variable data requirements make it necessary to print the barcodes when the product is being packaged, but there are certain potential problems that must be taken into consideration. The structure of the Data Matrix barcode requires the perimeter of the symbol to be well defined because this is where scanners begin when they attempt to decode the data. There is a finder pattern (which is usually square) where two adjacent sides create a shape that looks like an ‘L’ (Figure 1), and the opposite two adjacent sides consist of alternating dark and light modules. An area of clear space must be left around this finder pattern to enable the scanner to easily locate the Data Matrix barcode. If the finder pattern is not well printed, it may lead to problems with decoding the barcode.
Figure 1: Data Matrix finder pattern.
Figure 2: Data Matrix code with horizontal gap.
1 CONTENTS 8 EDIBLE MICROTAGS
3 OVERCOMING OBSTACLES 9 X-RAY ANALYSIS
4 EU LEGISLATION 11 RAMAN SPECTROSCOPY
6 DATA MATRIX CODES 14 TOP TECHNOLOGIES
Table of Contents for the Digital Edition of Pharmaceutical Technology Europe - July 2010
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320305494.6/warc/CC-MAIN-20220128104113-20220128134113-00572.warc.gz
|
CC-MAIN-2022-05
| 1,546
| 10
|
https://www.daniweb.com/programming/web-development/threads/348614/comment-box
|
code
|
I have developed (with some invaluable and greatly appreciated help!) a comment box using Java script (see bottom of this page http://www.antobbo.webspace.virginmedia.com/webediting/documents.htm) but I would like now to be able to receive comments via email. At the moment if you click on the comment button it opens the comment box (which is great) but if you type something and click "send" it opens outlook and try to send an email to the specified address. Upon clicking "Send" I would like the comment to be sent automatically to the email address specified.
Now, I have done some research and looked around a bit and from what I gathered I need to have a PHP script that handles the comment and a database where the comment gets kept to be then called by the script and dealt with..or something like that. Granted that I have no experience in either Java script (this is the first script I ever done) or in PHP (never done anything) I wonder if you have any other suggestion on how to achieve the above.
Is there, say, any library that I could use so that the comment input by the users gets somehow automatically handled or do I have to write the PHP script myself?
Also I read that a lot depends on the internet provider as well, in so much so that if their server do not support PHP then I have to find another way.
So, in brief is there an alternative way?
If not, and I have to do that myslef, what do I exactly need to do?
Is it really difficult to write a script in PHP that handles the comment? That done what else?
If anybody could give me a details explanation of what needs to be done that'll be greatly appreciated.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-04/segments/1610703513062.16/warc/CC-MAIN-20210117143625-20210117173625-00224.warc.gz
|
CC-MAIN-2021-04
| 1,634
| 8
|
https://www.fr.freelancer.com/projects/php-website-design/stay-site/
|
code
|
I have a new site. It is a "news" site. The only thing that i need is: when a user wants to reed an article or a feed on my site, not to leave and goes to the site that gave me the rss, but to open in a new window (a new tab) so the user to stay on my site.
I have communicate with the support department of the company i bought the software and they gave me istructions of how to do this. It is very simple. It needs only to add: " target='_blank' " in some files. I know that this is easy and i tryed to do it first, but then it did not worked and when i asked the support department again, they told me that it must be the same think in every file that works for the rss feeds of the site.
Can please someone do this for me?
Hi, I'm interested taking this job, this is really a quick job. Talk to you soon. Best regards, Sachin
12 freelance font une offre moyenne de $63 pour ce travail
Hi, I have a lot of experience in web-programming, I can complete this for you right now and I can guarantee my work will be fast and of the highest quality
Hello Sir! I understood your problem, I can solve it quickly and easily for you.. I can deliver it within a day.. Thanks
Hi, WE expertise in web development and can do this job immediately with perfection. Pls. check PMB for samples. Thank you.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-13/segments/1521257648226.72/warc/CC-MAIN-20180323122312-20180323142312-00295.warc.gz
|
CC-MAIN-2018-13
| 1,291
| 8
|
http://freecode.com/tags/soap?page=1&sort=updated_at&with=&without=15671
|
code
|
Magento API Client is a PHP client library for the Magento SOAP API v2. It supports the Mage_Catalog, Mage_CatalogInventory, Mage_Checkout, Mage_Customer, Mage_Directory, Mage_Sales, Enterprise_CustomerBalance, Enterprise_CustomerGiftCard, Mage_GiftMessage, Mage_Core, and Store_View modules. The library uses namespaces and is based on composer tools.
Zato is an Enterprise Service Bus (ESB) and app server written by pragmatists for pragmatists. It provides an HA load-balancer, hot-deployment, and hot-reconfiguration almost everywhere (forget server restarts). It has a browser-based GUI, CLI, and API (forget XML configuration). It supports many protocols, industry standards, and data formats, including HTTP, JSON, SOAP, REST, AMQP, JMS WebSphere MQ, ZeroMQ, Redis, SQL, and FTP.
Citrus is a test framework written in Java that enables automated integration testing of message-based enterprise SOA applications. The tool can easily simulate surrounding systems across various transports and protocols (e.g. JMS, SOAP WebServices, HTTP, TCP/IP, etc.) in order to perform end-to-end use case testing. Citrus provides strong validation mechanisms for XML message contents and allows you to build complex testing logic such as sending and receiving messages, database validation, automatic retries, variable definitions, dynamic message contents, error simulation, and many more.
XINS is a technology used to define, create, and invoke remote APIs. XINS is specification-oriented. When API specifications are written (in XML), XINS will transform them to HTML-based documentation and Java code for both the client-side and the server-side. The communication is based on HTTP. XINS competes with the complex SOAP technology. Main design goals include simplicity, scalability, and testability. XINS is not only a specification technology, but also an application development framework. It offers transaction logging, unique log documentation, and active code generation.
Moose is a framework for getting XML into and out of Java software. It integrates easily with Spring, Spring Web Services, or plain Java applications. It will generate an XML schema which describes your mapping configuration. Spring Web Services can wrap Moose's schema generator, creating a nice stack for simple, rapid development of SOAP Web services in Java.
SOAP/REST Mock Service is a simple configurable framework to mock out SOAP or RESTful (or "REST-like") Web services. Its main goal is to support automated integration testing of applications that integrate with 3rd party Web services. Functionality and usage scenarios of the mock service are in a way analogous to unit testing mocking tools (like Mockito or EasyMock). Once properly configured, SOAP/REST Mock Service exposes Web service mocks that can be called from application code and controlled via a REST interface from integration test code (setup, verify, etc.).
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-10/segments/1394010776308/warc/CC-MAIN-20140305091256-00017-ip-10-183-142-35.ec2.internal.warc.gz
|
CC-MAIN-2014-10
| 2,906
| 6
|
https://hackmd.io/@manodeep/BJs_LXa8O
|
code
|
# The Research Software Engineer Australia-New Zealand (RSE-AUNZ)
## Membership and Governance
Last revised date: Jan 25, 2022
Initial Acceptance: TBD
### Organisational Mission
The Research Software Engineer Australia-New Zealand (RSE-AUNZ) Association is an inclusive community that strives to:
* Maintain an active, diverse, sustainable RSE Community.
* Explore the role of RSEs within the eResearch, Academic, and Professional context.
* Form a connection between communities: people and organisations.
* Obtain recognition for RSE-AUNZ and its role.
### Code of Conduct
All members of the RSE-AUNZ community are required to follow the
[RSE-AUNZ Code of Conduct](https://rse-aunz.github.io/code-of-conduct/) in all RSE-AUNZ activities, forums, and communications. As stated in our Code of Conduct, we welcome and encourage members regardless of gender, gender identity and expression, sexual orientation, disability, physical appearance, body size, race, age, religion, or national and ethnic origin.
Membership in the RSE-AUNZ community is simply joining the moderated email list. Membership is open to anyone who satisfy the following criteria:
1. identify as an RSE working within Australia, New Zealand or nearby regions without an RSE community
2. some verifiable connection to the research ecosystem
The current Steering Committee reserves the right to limit communication that violates the RSE-AUNZ [Code of Conduct](https://rse-aunz.github.io/code-of-conduct/)], and may temporarily suspend or permanently revoke the membership for offenders.
### Steering Committee Roles and Number
The Steering Committee consists of eight spots with the following kinds of roles:
- two co-Chairs, one each representing New Zealand and Australia
- one Secretary
- five ordinary members
The Steering Committee has the following responsiblities:
* The Steering Committee is responsible for setting the overall policy, activities and the direction of the RSE-AUNZ community
* Members of the Steering Committee have the ability to grant or remove administrative rights for
RSE-AUNZ affiliated accounts and communication channels including but not limited to:
* The RSE-AUNZ google group
* The rse-aunz.org domain and website
* All repositories in the RSE-AUNZ GitHub organisation
* All mailboxes associated with the rse-aunz.org domain name
* Any other official accounts intended to represent the overall organisation, now or in the future (e.g., Twitter, Facebook, LinkedIn, etc.)
The Steering Committee strives for consensus in its decisions. In the case of a dispute or argument within the community, a majority vote of all of the Steering Committee members will result in a final decision. In the event of a tie, the Steering Committee needs to seek out less fractious options, or wait for another meeting if the voting preferences for *all* Steering Committee members are not known (e.g., some Committee members are absent). At all Committee meetings, quorum is at least one half of the members.
### Steering Committee Elections and Terms
Steering committee members are elected to a 2-year term. To provide continuity, steering committee members will have staggered terms, with four or five members elected each year.
Nominations for open positions will be solicited from all members at least 6 weeks before the election. The list of nominated candidates will be announced at least 3 weeks before the election. All US-RSE members in good standing on the date that the nominations are opened are eligible to be nominated as candidates.
When electing Steering Committee members, or when other membership elections take place, each RSE AUNZ member in good standing will be entitled to one vote.
### Steering Committee Meetings and Communication
Steering Committee meetings will take place at a minimum of once per quarter, and typically will be held monthly. All Steering Committee meetings will have notes recorded and made publicly available to the community. The tallies of any votes of the Steering Committee will also be made available.
The Chairs will set the agenda and preside over Steering Committee meetings or arrange for another Steering Committee member to do so.
[needs checking >> ](/5rks3MyMSbqWGQ5eLZ-Yig)
Who is responsible for ensuring the community is kept informed of Association activities through
regular newsletters, social media posts, etc. In addition, the Vice-Chair will annually prepare a
report of Association activities in the past year.
#### Returning Officer for Elections
The Returning Officer will be responsible for collecting nominations for Steering Committee elections, running such elections, and running other polls as required. The Returning Officer will be appointed by the Steering Committee from an external organisation (e.g., ARDC, NeSI, AeRO).
[needs checking >>](/iooU5ycJRZWuiGYq7j1nLA)
The Treasurer will be responsible for the finances of the US-RSE Association. The Treasurer will present an
overall budget for approval by the Steering Committee in advance of the Annual General Meeting, and
then present this budget to the US-RSE membership in the Annual General Meeting.
The Treasurer additionally has the authority to authorize spending (as previously approved in the budget)
of US-RSE funds held by our Fiscal Sponsor, as do the Chair and Vice-Chair.
The Secretary will be responsible for ensuring that notes are taken in each meeting of the Committee
and published after the meeting. In the absence of the Secretary, the presiding officer of the
meeting will appoint another member to take on this responsibility.
A Steering Committee member may choose to resign by informing the Steering Committee Chair via
email. Additionally, the Steering Committee Chair can resign by informing the full committee via
email. The resignation will take effect at the time specified in the notice, and, unless otherwise
specified, formal acceptance of the resignation is not necessary.
Steering Committee members can be removed by a two-thirds (⅔) vote of the full Steering Committee.
In the event that that Committee is considering the removal of the Chair, the Vice-Chair will preside.
If a seat on the Steering Committee becomes vacant, the remaining members of the Steering Committee may choose to appoint someone to fill the position for the remainder of the term. If the Steering Committee chooses to fill the position, the replacement will be chosen by a majority vote of the remaining members of the Steering Committee. In the event that a majority vote cannot be achieved, the seat shall remain open until the end of the seat's term.
## Committees, Working Groups, and Community Involvement
Organisational functions of the US-RSE Association will be managed by standing committees that may consist of one or more members of the Steering Committee and interested members of and participants in the Association. These organizational activities include communications (website, social media, etc.), conference planning, and others to be determined by the Steering Committee.
Other activities, events, and efforts that have a fixed end date will be managed by working groups. These working groups can and should be initiated by members at large through discussion with the
Steering Committee to ensure alignment with US-RSE priorities. Working groups should have at least three (3) RSE-AUNZ members as participants.
## Changes to Governance
Minor revisions to this document can be made with the approval of at least two-thirds (⅔) of the current steering committee members. Major changes to the governance structure or this document will requirea vote of the membership directly.
Details and names will appear here after being published.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100276.12/warc/CC-MAIN-20231201053039-20231201083039-00579.warc.gz
|
CC-MAIN-2023-50
| 7,683
| 68
|
https://morioh.com/p/fe5d4cfd3362
|
code
|
In part 1: We will look at data acquisition and building a python script to acquire, clean, and transfer data. In part 2: We will look at building visualizations and dashboards in Kibana and Elasticsearch. In Part 3: We will look at operationalizing the script into sustainment.
This is a multi-part series on OSINT with Python and ELKstack.
In part 1: We will look at data acquisition and building a python script to acquire, clean, and transfer data.
In part 2: We will look at building visualizations and dashboards in Kibana and Elasticsearch.
In Part 3: We will look at operationalizing the script into sustainment.
I had an opportunity to interview with a large tech company but I didn’t know much about them (I’ve been oblivious to what’s popping up in Silicon Valley). Following due diligence and better prepare for the interview, I spent the weekend working on script to help me better understand the general sentiments and what the company was about. At that point in time, any news is new news, and I wanted to consume it.
Twitter is a great social networking platform that delivers almost real-time news generated and posted by “regular people”. It’s great, because it’s really unfiltered and you’re able to somewhat grasp what people are thinking. The goal of this project is to build a twitter scrapper, dump it into Elasticsearch and create visualization dashboards using Kibana.
Like most people, I’m a visual person. I love looking at dashboards, graphs, and pictures that makes sense of data. It helps me comprehend and gain insight in a particular subject. I’m also a project based learner. I learn better when I have an end goal. In this case, I’m learning: Python, Elasticsearch, and Kibana. I’m also learning how to use the Twitter API for other projects that I’m working on like Natural Language Processing (Sentiment Analysis, bots, docker, etc.)
Master Applied Data Science with Python and get noticed by the top Hiring Companies with IgmGuru's Data Science with Python Certification Program. Enroll Now
Python for Data Science, you will be working on an end-to-end case study to understand different stages in the data science life cycle. This will mostly deal with "data manipulation" with pandas and "data visualization" with seaborn. After this, an ML model will be built on the dataset to get predictions. You will learn about the basics of the sci-kit-learn library to implement the machine learning algorithm.
Data Science and Analytics market evolves to adapt to the constantly changing economic and business environments. Our latest survey report suggests that as the overall Data Science and Analytics market evolves to adapt to the constantly changing economic and business environments, data scientists and AI practitioners should be aware of the skills and tools that the broader community is working on. A good grip in these skills will further help data science enthusiasts to get the best jobs that various industries in their data science functions are offering.
Many a time, I have seen beginners in data science skip exploratory data analysis (EDA) and jump straight into building a hypothesis function or model. In my opinion, this should not be the case.
Data science is omnipresent to advanced statistical and machine learning methods. For whatever length of time that there is data to analyse, the need to investigate is obvious.
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-45/segments/1603107906872.85/warc/CC-MAIN-20201030003928-20201030033928-00368.warc.gz
|
CC-MAIN-2020-45
| 3,403
| 13
|
http://www.vistaheads.com/forums/microsoft-public-windows-vista-networking-sharing/188772-password-now-i-cant-share.html
|
code
|
> OK. I've got a PC running XP Pro. My printer is hooked up to it via USB. I've
> been connecting to the PC's folders and printing to the printer from my
> notebook running Vista Ultimate for the past 9 months.
> I finally got tired of my cat waliking on the notebook's keyboard and
> messing things up, do I put a password on my User Name on the notebook. Now,
> I can't connect to the PC to share folders or print to the printer. I went to
> the PC and tried to mess with the security, but my notebook's name is not in
> the "Locations" and there does not seem to be a way to add it.
> I took the password off my Notebook user name and now I can share folders
> and print again. I'd really like to put the passord back on.
> Any help would be appreciated.
I'm not really sure how setting a password will keep your cat out but I
suppose it could work if you don't tell the cat what the password is.
If you want to use passwords (a good idea in any case), simply create
matching user accounts and passwords on all machines. You do not need to
be logged into the same account on all machines and the passwords
assigned to each user account can be different; the accounts/passwords
just need to exist and match on all machines. If you wish a machine to
boot directly to the Desktop (into one particular user's account) for
convenience, you can do this. The instructions at this link work for
both XP and Vista:
Configure Windows to Automatically Login (MVP Ramesh) -
Elephant Boy Computers
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-50/segments/1480698542323.80/warc/CC-MAIN-20161202170902-00246-ip-10-31-129-80.ec2.internal.warc.gz
|
CC-MAIN-2016-50
| 1,487
| 23
|
https://primer.style/components/textarea/
|
code
|
Textarea is used to set a value that is multiple lines of text.
On this page
On this page
Use a textarea to allow users to input a long string of free-form text.
Focused: The input has been navigated to and is ready to accept input.
Disabled: The input cannot accept input or become focused.
Invalid: The value failed validation.
Valid: The value passed validation.
For more information about the "valid" and "invalid" states, see the validation section of the form design pattern guidelines.
Label (required): The input's title. It should be as concise as possible and convey the purpose of the input. The label may be visually hidden in rare cases, but a label must be defined for assistive technologies such as a screen reader.
Required indicator: Indicates that a value is required. Must be shown for any required field, even if all fields in the form are required.
Input (required): Accepts user free-form text input
Caption: Provides additional context about the field to help users fill in the correct data or explain how the data will be used. Caption text should be as short as possible. Caption text may be displayed at the same time as a validation message, or it may be hidden if it only provides redundant information.
Validation message: A single validation message may be displayed to provide helpful information for a user to complete their task. It is most commonly used to explain why a value is invalid so they can correct it and submit the form.
By default, a textarea will the width of a line of 30 characters.
You can change this to be any number of characters, or render the textarea to fill the width of its parent element.
By default, a textarea will the height of 7 lines of text.
You can change this to be any number of lines. Consider the length of the expected value to set a height.
If the height of the content exceeds the height of textarea, users can scroll the content or resize the textarea.
By default, a textarea can be resized vertically and horizontally.
You can limit a user's resizing options to:
- no resizing
- only resize vertically
- only resize horizontally
- Textareas must be labeled. The label may be visually hidden, but visible labels are preferred.
- Placeholder text is never an acceptable substitute for a label because:
- The placeholder text disappears as soon as the input has a value
- Placeholder text colors are typically too light to meet the minimum color contrast ratio required for accessibility
- Screen readers do not read placeholder text as a label
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100047.66/warc/CC-MAIN-20231129010302-20231129040302-00577.warc.gz
|
CC-MAIN-2023-50
| 2,516
| 29
|
https://help.ambientcg.com/02-Using%20the%20assets/Using_SBSAR_files.html
|
code
|
Using .sbsar files #
A substance archive (.sbsar) is an exported graph from Substance Designer.
This means that it contains a material that can be adjusted using predefined sliders that have been set by it’s author. You can use it to create your own variations of a material found on ambientCG.
Using substance archives (sbsar files) in different tools #
3DS Max, Maya, Modo, Houdini, Unity, Unreal Engine #
Plugins for 3DS Max, Maya, Modo, Houdini, Unity, Unreal Engine and many other tools can be found on the Substance website.
Blender and other tools without native sbsar-support #
If you are working with a program that has no built-in (or plugin-based) substance support (Blender has neither), you can use the free Substance Player software from the Substance website.
How to use the Substance Player #
Once you have downloaded the Substance Player you can install it like any other program. Run it and open the .sbsar file. You will then find a number of sliders to your right hand side. To your left you will see a 2D and 3D Preview. Adjust your settings until the material appeals to your needs. Then click on “Export as Bitmaps” in the top left corner.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-39/segments/1631780057337.81/warc/CC-MAIN-20210922072047-20210922102047-00116.warc.gz
|
CC-MAIN-2021-39
| 1,168
| 10
|
http://companyontop.com/c/544772
|
code
|
OWIT Lake Geneva is a professional business and social network whose focus is to unite professional women and men across the Lake Geneva region (Switzerland). OWIT Lake Geneva is a non-profit organization and chapter of the Organisation of Women in International Trade (OWIT), which has approximately 3,000 members in 25 chapters throughout the world. OWIT’s mission is to foster international trade and the advancement of women in business.
Our events, conferences and networking happy hours are open to our members and non-members alike. We also have an open LinkedIn group that aims to offer its members a lively interactive experience, providing them with networking and educational opportunities online and offline. To become a member of our LinkedIn group, just go here: http://linkd.in/REX6gO
To learn more about OWIT Lake Geneva, our events and all the advantages you get when you become a member, go to http://owit-lakegeneva.org
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-43/segments/1539583516003.73/warc/CC-MAIN-20181023023542-20181023045042-00443.warc.gz
|
CC-MAIN-2018-43
| 940
| 3
|
https://unix.stackexchange.com/questions/126566/ssh-login-alert-using-pam-exec?noredirect=1
|
code
|
Hi I have been trying to follow the information about pam_exec from here: Ssh login hook?
When a user log's in they get:
/etc/pam.d/email-alert.sh failed: exit code 8
My sshd file has this at the end:
session optional pam_exec.so debug seteuid /etc/pam.d/email-alert.sh
My email-alert.sh script has this,
echo 'ALERT - Remote SSH Shell Access (SERVERNAME) on:' `date` `who` | mail -s "Alert: Remote SSH Access from `who | cut -d'(' -f2 | cut -d')' -f1`" MYEMAIL@MYEMAIL.com
I have tested the script on its own and it emails me no problem.
If anyone could point me in the right direction it would be much appreciated as I've been scratching me brain's out trying to figure it out.
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-34/segments/1596439740733.1/warc/CC-MAIN-20200815065105-20200815095105-00317.warc.gz
|
CC-MAIN-2020-34
| 679
| 9
|
https://discourse.nixos.org/t/is-there-a-way-to-share-a-nix-store-across-multiple-machines/18186
|
code
|
Hi! I posted this question on the discord, but they said it was probably a better question for here. I have Proxmox running on a relatively storage constrained server at home, and I have a few NixOS VMs on it. All my VMs share the same flake.lock, and are deployed at the same time. As a result, I figure that the store has a good bit of duplication across my VMs, and I was wondering if there was any good way to potentially share a /nix/store across these VMs I’m hosting in order to minimize storage usage. I’ve considered putting /nix/store on a network file share, but I’m not sure how robust it is or if it’s even possible for a NixOS machine (The wiki dosen’t seem to mention anything about it on NixOS). At the end of the day it’s not really the end of the world if I can’t share the store, but it’d certainly help me put off buying more storage for a while.
By “NixOS VMs”, do you mean VMs created with
nixos-rebuild build-VM , or just multiple NixOS images?
The script that
nixos-rebuild build-vm creates by default transparently makes the host’s
/nix/store available, which should take care of any duplication. If you’re not already using that, it may serve as inspiration
It’s just multiple unrelated NixOS images (aside from sharing the flake.lock). They aren’t running on top of NixOS, but on top of Proxmox (think VMWare or something). These VMs are running on top of a host that isn’t nix aware in any way. As for the build-vm script, I see the area with the build-vm here, but admittedly I don’t know how to read bash scripts very well. It looks like it just calls
nix-build -A vm with whatever was passed to the script. Nix-build takes me to the
nix binary, and from there on things get a lot more complex.
Using LVM with deduplication was also mentioned on the discord, and I’m starting to think that’s realistically the best option if I do want to bother trying to do the above.
I meant the script that
build-vm writes The source for NixOS VM-building infra lives here: nixpkgs/default.nix at 634141959076a8ab69ca2cca0f266852256d79ee · NixOS/nixpkgs · GitHub
This actually helps a lot, I think I might be able to do the same trick with passing the store path as a VirtFS. This is the first time I’m hearing about them, but I imagine if I make one holding /nix/store or something I’ll be able to pass it to all the guests? Either way, at least I have something to try now!
If you are comfortable with fiddling with mountpoints, you can probably designate one VM for a “master nix store” and have the nix stores of all others reside on overlayfs-mounts.
You may need to use
fileSystems.<name>.depends to ensure
lower are available before the overlay itself is mounted.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100476.94/warc/CC-MAIN-20231202235258-20231203025258-00534.warc.gz
|
CC-MAIN-2023-50
| 2,732
| 17
|
https://forum.solidworks.com/thread/243373
|
code
|
I am new to Solidworks Cam. I am programming an odd shaped part. I was considering making one end of the stock long and leaving it un-machined until the end to use for work holding.
I am using area clearance to machine the top first, but I cannot seem to find a way to keep Solidworks Cam (using Avoid or Contain with a rectangle sketch) from cutting this end. I think there is something fundamental that I do not understand. Any help is appreciated.
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-50/segments/1606141177607.13/warc/CC-MAIN-20201124224124-20201125014124-00491.warc.gz
|
CC-MAIN-2020-50
| 450
| 2
|
https://forum.audacityteam.org/t/another-copy-of-audacity-is-running-problem/53078
|
code
|
I had two Audacity projects in progress, when all of a sudden we had a power outage. When power returned I tried to open Audacity and got this message:
The system has detected that another copy of Audacity is running.
Running two copies of Audacity simultaneously may cause
data loss or cause your system to crash.
From a google search there is a lock file at, /var/tmp/audacity-myusername/audacity-lock-myusername that does not get cleaned up after a hard shutdown…that creates this problem.
Can someone please give this newbie simple instructions on how to correct this situation?
Thanks for any and all help!!!
See this FAQ in the Audacity Manual: https://manual.audacityteam.org/man/faq_errors.html#already_running
We have logged this recently as an ENH (enhancement request) in our bug tracker: https://bugzilla.audacityteam.org/show_bug.cgi?id=2052
I’m hoping we might get it fixed for the next release.
Hi. I realize this post that I’m replying to is from several years ago, but I’m still having the same issue.
I can see from your Wiki page that the way to correct that is:
On Mac the lock file is in:
Look in the SessionData folder and delete any files and folders you find there.
However, I cannot figure out how to locate that folder on my MacBook Pro.
Can you give me any advice on how to navigate there?
- run Finder
- in the menu bar at the top of screen click Go
- select Go to Folder
- type this string (or copy and paste it) in the data entry box in “Go to the folder”
- click on ****
Note carefully that the “~” squiggle tilde character at the front of the string is important.
And thanks FleeceActress for following the instructions on our Facebook page and coming here for support (I did see your post there)
And actually this is a very recent Forum thread - so you’re actually very current
Thank you SO much!! This worked perfectly.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474526.76/warc/CC-MAIN-20240224080616-20240224110616-00805.warc.gz
|
CC-MAIN-2024-10
| 1,871
| 25
|
http://peetsketches.blogspot.com/2010/08/experiment-of-sorts.html
|
code
|
I'm not sure if the experiment was a success or not. I'm going to say something terribly cliche and therefore I apologize in advance. I am my own worst critic.
What I'm going to post for your judgment is the original sketch and the same sketch digitally inked by myself. I've never done this before, this is for a "contest" for monsterfactory.net (there stuff is AWESOME, thank you Meg for showing me)
This is the first time I've used my Wacom tablet to ink something instead of just drawing something brand new with it. So seriously, leave some feed back!
Above is obviously the original sketch (at 72dpi). You can see where I got bored of drawing/anxious to try digital inking.
Here's my attempt at digital inking it's real size is 11"x17", and at 72dpi it's not too bad. However at 300dpi it looks like I asked Michael J. Fox to ink it. Maybe I should get tested to make sure I don't have MS like Teenwolf.
Anyway, lemme know what you guys think!
Also here's the image of the monster I included in my illustration:
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-22/segments/1526794864466.23/warc/CC-MAIN-20180521181133-20180521201133-00280.warc.gz
|
CC-MAIN-2018-22
| 1,017
| 7
|
http://2015blogger.blogspot.com/2011/09/so-you-remember-tally-hall-and-notes.html
|
code
|
So right now, I am keeping my laptop on the network so I can simultaneously burn a DVD of a band performance for Carlynton's Band Director.
Getting past that, this past Friday, I was able to attend a Carlynton Football Game. Normally this means a three hour contest where our home team loses. However, it was quite contrary to that. We won, it took four hours, and I still have to edit all of that for a highlight reel. (I should start working on that)
So, Remember Tally Hall? Anyway, Recently someone posted a video (see it off to the side) of 750 pictures played kind of like in Lapsing Reality, only better. Check it out.
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917121267.21/warc/CC-MAIN-20170423031201-00544-ip-10-145-167-34.ec2.internal.warc.gz
|
CC-MAIN-2017-17
| 625
| 3
|
https://learn.microsoft.com/en-us/azure/partner-solutions/dynatrace/dynatrace-how-to-configure-prereqs
|
code
|
This article describes the prerequisites that must be completed in your Azure subscription or Azure Active Directory before you create your first Dynatrace resource in Azure.
To set up Dynatrace for Azure, you must have Owner or Contributor access on the Azure subscription. First, confirm that you have the appropriate access before starting the setup.
Add enterprise application
To use the Security Assertion Markup Language (SAML) based single sign-on (SSO) feature within the Dynatrace resource, you must set up an enterprise application. To add an enterprise application, you need one of these roles: Global administrator, Cloud Application Administrator, or Application Administrator.
Go to Azure portal. Select Azure Active Directory, then Enterprise App and then New Application.
Under Add from the gallery, type in
Dynatrace. Select the search result then select Create.
Once the app is created, go to properties from the side panel, and set the User assignment required? to No, then select Save.
Go to Single sign-on from the side panel. Then select SAML.
Select Yes when prompted to Save single sign-on settings.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764499845.10/warc/CC-MAIN-20230131055533-20230131085533-00269.warc.gz
|
CC-MAIN-2023-06
| 1,123
| 10
|
https://forums.brainsuite.org/forums/topic/mri-data/
|
code
|
Hi BrainSuite community,
Is it possible to open the MRI data in BrainSuite to do the segmentation? If not how can i use BrainSuite for MRI images? ( are there any ways i could convert MRI images to nii format or vice versa?
Thanks for your help
I’m probably a bit late replying but :-
to convert Dicom to Nifti – try “dcm2nii” or the updated version “dcm2niix”
to convert Nifti to Dicom you might need (x)medcon from http://xmedcon.sourceforge.net//Main/HomePage
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947475711.57/warc/CC-MAIN-20240301225031-20240302015031-00414.warc.gz
|
CC-MAIN-2024-10
| 474
| 6
|
https://www.computerhope.com/jargon/h/hyphen.htm
|
code
|
Alternatively known as a dash, subtract, negative, or minus sign, the hyphen ( - ) is a punctuation mark on the underscore key next to the "0" key on U.S. keyboards. Pictured is an example of the hyphen and underscore key.
Where is the hyphen key on the keyboard?
Below is a computer keyboard with the hyphen keys highlighted in blue. One is on the main keyboard, and the other is on the numeric keypad.
How to create the hyphen symbol
Creating the "-" symbol on a U.S. keyboard
The hyphen is easier to use on the numeric keypad with math formulas.
Creating the "-" symbol on a smartphone or tablet
Differences between dash, hyphen, and minus
Although the same keyboard key is used for a dash, hyphen, and minus, there are differences between these terms. Below is a basic definition for each of these terms.
- A dash is a punctuation mark to insert an interjection or pause in a sentence.
- A hyphen is a punctuation mark that's used to join words.
- A minus is a math operator to perform a subtraction between two numbers.
- A negative is placed before a number to indicate it's not a positive number.
What is a hyphen used for on a computer?
Hyphen in a math formula
In a math formula, a hyphen represents a subtraction (minus). For example, the formula below shows that 2 <minus> 1 equals 1.
2 - 1 = 1
Hyphen in word processors
In many word processors, an optional hyphen or hyphenation is automatically inserted when a word is cut off by the end of a line. When formatting marks are enabled, these hyphens are represented with the conditional hyphen mark.
A hyphen can also be used to create an en dash and em dash in many word processors by doing two or three hyphens next to each other.
Hyphen in a search
With Internet search engines, the hyphen is used as a boolean operator that tells the search not to include a result. For example, if you used the below search, the search engine would return results containing "free," "computer," and "help" but would not return any results containing "expensive."
free computer help -expensive
A hyphen in English
Hyphens are used in some compound words to make the word easier to read and help clarify words used together. For example, "to-do," "merry-go-round," "high-risk," "T-shirt," and "sixty-six" are all words with hyphens. See the when should I hyphenate words section for further information.
Creating a line separator
Joining several hyphens together helps create a divider line in the text to make things easier to read, as shown below.
Example of some text.
That has been separated with several hyphens.
Word processors and some other text editors may automatically convert several hyphens placed together into a solid line.
Hyphen in shortcuts
Other places with the minus symbol
A minus symbol or a horizontal line indicates a decrease, remove, move up, or zoom out on software programs and hardware devices. In Microsoft Windows, the minus or underscore is also shown on the top-right side of a window to represent the minimize feature.
How to create a longer hyphen
When should I hyphenate words?
Hyphens are used in some compound words (connected words) to make the word easier to read and help clarify words used together. For example, "to-do," "merry-go-round," "high-risk," "T-shirt," and "sixty-six" are all words with hyphens. Below are rules of hyphenation. Keep in mind many rules only apply in certain circumstances.
- Hyphenate two or more words that act as a new word or has a new meaning when connected. For example, "know-how" has a different meaning than "know" and "how."
- Hyphenate words that act together to modify the following word. For example, "full-scale" modifies "test" in "full-scale test." However, do not hyphenate connected words that act as adjectives.
- Do not hyphenate connected words if the first word ends with "ly."
- Use a hyphen when writing a compound number. For example, "eighty-two" and "twenty-two" are both compound numbers that need a hyphen.
- Compound verbs are either hyphenated or should appear as one word.
- When writing a word with a prefix, avoid using hyphens in most situations.
- All spelled-out fractions should be hyphenated.
- Always use a hyphenation when splitting a word at the end of a line.
What is the other symbol on the hyphen key?
On U.S. keyboards, the hyphen key is shared with the underscore key, which may be shown next to or above the hyphen symbol.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100781.60/warc/CC-MAIN-20231209004202-20231209034202-00862.warc.gz
|
CC-MAIN-2023-50
| 4,386
| 46
|
https://mstdn.jp/@tdemin
|
code
|
all it takes to turn an empty file into an award-winning project is the madman creating that file
"do one job and do it well" is clearly not the principle I follow when doing university classes 😄 like my simple Petri net tester has just grown into a full-blown net emulator, I now wonder if it's time to make a library of it since it does things anyway
...when you write a reply to a post an then see it ends with "no replies please".
On Google+ you could disable comments when creating a post. Ownership of the things that appear on your own "site" is a pretty important concept.
I think G+ was really more of a blog system instead of a Twitter-ish "microblog".
and for whatever reason I haven't closed my Instagram account yet 🤷
amusingly, G+ was originally to replace Instagram on my social network list, and it's now going to be closed, so I now have to lurk for something else 😔
wait, do I only use 13 emojis of the ~2.8k available?
#KOMPAS does its absolute best at making viewing the drawings a huge PITA for those with small laptops. Can't scale the drawing since no NumPad present on the keyboard, can't even scroll through without moving the cursor to the edge of the screen and then slooowly scrolling with the direction keys.😐
Sadly, I've now got to close my G+ account since G+ itself is getting closed by Google. 😢
A day off would be amazing.
It's ironic that iOS screentime app sends you push notifications to tell you how much time you spend on the screen. 🤦♂️
It's amazing when you do work appreciated by others. 😔
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-43/segments/1539583515564.94/warc/CC-MAIN-20181023002817-20181023024317-00282.warc.gz
|
CC-MAIN-2018-43
| 1,556
| 13
|
https://docs.netgate.com/pfsense/en/latest/firewall/show-bogons.html
|
code
|
Netgate is offering COVID-19 aid for pfSense software users, learn more.
Bogons Firewall Table¶
pfSense® software maintains an internal list of “bogon” networks, which are networks that are marked as reserved and not yet allocated. Traffic from within these bogon networks should never be seen as coming from the Internet.
This view will show the current list of bogon networks and offers a button which, when clicked, will cause pfSense to Download an updated bogon network list. The list will be updated automatically once per month. This frequency may be changed on pfSense software version 2.2 and later by visiting System > Advanced, Firewall/NAT tab. Set the desired Update Frequency there. The default update frequency is Monthly but it may also be set to Weekly or Daily.
It is rare, but not unheard of, for netblocks to be assigned from this list and put into use before the list can be updated to reflect that fact.
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600400188841.7/warc/CC-MAIN-20200918190514-20200918220514-00590.warc.gz
|
CC-MAIN-2020-40
| 931
| 5
|
https://www.moddb.com/members/mlhadley101/comments
|
code
|
This member has provided no bio about themself...
I am a total Noob how do I install this?
Wait how do I join the server the downloads page has nothing?
sorry but I kinda suck at this sort of thing sorry if it turns out to be obvious.
Ok so I got to my title screen and made my guy then I input my info and pressed play.after a few seconds it says it was not posible to connect ti the server.
At first I thought the server was down because it was Night time so I waited a day but nothing changed even though it says the server is online.
I also tried to update but it says cant conect to the server (184.108.40.206).
Never mind I think I found it out thanks to everyone!
Thanks but I suck with pc games how do I find steam though
Open it says desktop short cuts but I cant find steam.
Thanks sorry I suck at this so much.:(
Ok I installed it but now it say master.dat not found
I dont know why but I got it on steam so maybe thats why.
Is this hard to get working?
Or do you just download and play I dont whant to download unless I know.
Thanks in advavnce.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-26/segments/1529267861981.50/warc/CC-MAIN-20180619080121-20180619100121-00574.warc.gz
|
CC-MAIN-2018-26
| 1,057
| 16
|
https://www.thejournal.club/c/paper/311435/
|
code
|
A growing body of work makes use of probing in order to investigate the working of neural models, often considered black boxes. Recently, an ongoing debate emerged surrounding the limitations of the probing paradigm. In this work, we point out the inability to infer behavioral conclusions from probing results, and offer an alternative method which focuses on how the information is being used, rather than on what information is encoded. Our method, Amnesic Probing, follows the intuition that the utility of a property for a given task can be assessed by measuring the influence of a causal intervention which removes it from the representation. Equipped with this new analysis tool, we can ask questions that were not possible before, e.g. is part-of-speech information important for word prediction? We perform a series of analyses on BERT to answer these types of questions. Our findings demonstrate that conventional probing performance is not correlated to task importance, and we call for increased scrutiny of claims that draw behavioral or causal conclusions from probing results.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817438.43/warc/CC-MAIN-20240419141145-20240419171145-00537.warc.gz
|
CC-MAIN-2024-18
| 1,091
| 1
|
https://www.swishschool.com/vb/showthread.php?t=14102
|
code
|
Dual-booting nightmare: XP & 7, flashed BIOS, now boot-up is borked:
Ok, I'll try and be clear and succinct, but I APOLOGIZE in advance for the super length here! Here's the essential "backstory" of what was/is going on, and where I am right now:
Had an XP machine for 4 years; two months ago, I bought and added in another HD. At reboot, I put in my Win 7 64 Ultimate disc, and installed 7 to the new HD; so I've been dual-booting for 2 months now, with the classic black & white dual-boot screen at startup:
"Which operating system do you want to use:
Older version of Windows
So I've been gaming exclusively on the 7 HD, playing SupCom 2 via Steam. In one week, it BSOD'd four times, so I sent my minidumps to another forum, and I was told the crashes were due to two things: video driver, and hardware. So I un/re-installed the video driver, and then, using the Asus AutoUpdate (I have an AMD cpu/ASUS mobo), I flashed my BIOS to the latest. Win 7 was totally fine, and I believe it fixed all the errors, played my game, and turned if off.
The next morning I needed some files on XP, and that's when I saw the crap had hit the fan. I chose "earlier version of Windows", and it simply BSOD immediatley; and I've not been able to get back in since. So, of course, I tried to fix it on my own. I searched online, and the first thing I did was put the XP disc in, and hit R for Repair right away; this brought me to the black and white screen. The problem was, it showed that I had two HD's, and it listed them just like this:
I chose C:, totally assuming it was my XP HD. Then, at the C:COMMAND> line, I typed in "FIXBOOT" (minus the quotes), as that was what I read. Well, that really seemed to bork things up. After reboot, instead of getting the "Which OS do you want" choice screen, I only got the "Windows cannot boot, do you want Safe Mode, Safe Mode w/Networking", etc. etc. screen. So I then unplugged my 7 HD, put in the XP disc again, tried to Repair Reinstall over the XP, and that didn't work either.
So finally, I plugged my 7 HD back in, put in the Win 7 disc, booted from DVD (and yes, both my HD's are where they should be in BIOS; XP is SATA 1, and 7 is SATA 2), and did the Win 7 Repair Startup option. That got me right back into Win 7, as if there was never a problem at all. This was yesterday morning. So I then spent the entire day migrating my backed up XP data from an external HD onto my 7 HD, and putting it all in the correct folders, and then backing all that up again to the same external HD (to be super safe, haha), and then last evening, I finally needed to re-boot.
And that brings me to my current problem/state of affairs. At reboot, or normal boot-up, I now come to a black and white screen with roughly the words "Boot error, please insert disc and hit Enter." So essentially, it again does not bring me to the "which OS do you want screen", just this new screen. So, I put in the Win 7 disc, and did a hard reboot. As expected, after reboot, the next words to come up were "Hit any key to boot from CD or DVD...", but to test things, I hit NO KEY. I let it pass. Guess what? The two choices screen came up! "Earlier version of Windows, or Windows 7". Very perplexed, I chose Win 7, and it boots up no problem. So, to test it out again, I took out the 7 DVD, and rebooted. Wham, same problem black and white screen: "Boot error, please insert disc and hit Enter". So I did, but this time I DID hit a key, went into 7 setup, and tried the "Win 7 repair startup" option, and rebooted w/out the disc and tried it again; again, SAME "boot error" message! But when I put the Win 7 disc in, hard reboot, let it come back up, display the "Hit any key to boot from DVD" and I SKIP THIS (hitting no key), it then goes to the "correct" screen of offering me two choices. I hit Win 7 every time, and it boots up fine. (whew).
So, I essentially have two very important, very specific questions. They are;
1. How can I first get Win 7 under control, and fix this boot up error? Do I need to keep doing the Win 7 Repair Startup about four, five, six more times, or what? Or do I need to use EasyBCD? And if so, HOW do I use that program, as I've never used it before?
2. Once I do get Win 7 startup fixed, and under control, it's quite clear that my XP HD is fried beyond repair, so I would like to erase it, and just use it as extra storage. So my second question is: because I am currently dual-booting, and went through XP (XP being first, added a second HD put 7 onto that), HOW or WHAT do I do to make the Win 7 HD the only OS in my machine, and have it look only for itselt, and not two OS's, at boot up?
I know this is extremely long, and I'm very sorry for that, but I hope this helps anyone and everyone who is looking at this. What should I do? Thank you all very much in advance. Best, Dave. :D
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-22/segments/1526794867904.94/warc/CC-MAIN-20180526210057-20180526230057-00615.warc.gz
|
CC-MAIN-2018-22
| 4,830
| 14
|
https://community.blynk.cc/t/blynk-2-0-how-to-make-access-to-notifications-for-the-user/54250
|
code
|
I invited a new user for my template, registered this user in Blink 2.0. But this user will not receive push notifications. Only the Owner of the device is in the push notifications setting and get notifications. What should be specified in the settings of recipients of push notifications for this user?
However, it might be not exactly what you need here. In general, you should not set the device owner in the meta field of the template. Because that’s a default value that will be used if the device doesn’t have an owner. If you want the new user to see the notifications you can transfer device ownership to this user - Actions with devices - Blynk Documentation.
In that case you don’t need to set the device owner in the template.
If you’re not the owner of the device, you still can get the notifications, for example you can specify receivers as “All users of the organization” or you can add the “contact” metafield to the device and fill it within the specific device with your email. In that case you’ll need to add “contact” meta as a receiver in the notifications.
I got confused - after I transferred the Owner to the new User for some time notifications came to the device that was no longer the owner and nothing but the Device owner was registered in the recipient by default. Why?
Sorry to write on this old post, but I have the same problem and after looking thru the forum I found this one with a good solution, but unfortunately the step 3 dont work for me. After clicking on notifications settings the only page that appears is to search event.
what I am missing?
Hi Pete. In fact after doing a lot of work on all pages, I did a refresh and event showed on step3. From there I can include/exclude users from receiving notification, but the funny part is that on the event itself, I still only see the owner user.
I just posted the step 1, because as I said the step 3 appeared after I did a refresh on the page. Now i can make changes on the users. The only thing that I dont understant is why I can do it on the Edit Event page… but anyway, is working… thanks,
Good morning Pete. I assumed that was worked too fast. None of the users assigned received a notification… I read the documentation - Notifications Settings - Blynk Documentation - and the only thing that is different is the screenshot below:
That´s what is my page:
Although I can hover over the name and click on it and this screen appears:
As you can see there are 3 users listed.
As I said before, I still cannot change the users when configuring the event itself - see below:
and just to confirm, notifications management is enable…
What do you think is happening?
And just one last note, I checked if the notification is enable on the smartphones… they are…
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510225.44/warc/CC-MAIN-20230926211344-20230927001344-00138.warc.gz
|
CC-MAIN-2023-40
| 2,784
| 17
|
http://math.stackexchange.com/questions/248731/ring-theory-question-pleasesimple
|
code
|
We have the Cartesian product $B \times B$ and there we have the addition $$(f,g)+(h,k)=(f+h,g+k)$$ and the multiplication $$(f,g) \cdot (h,k)=(f\cdot h+g\cdot k,f\cdot k+g\cdot h).$$ I want to find the identity element of the group related to the addition. So I must have something like $(f,g)+e=(f,g)$. What do I do now? Is it something like ($f+e,g)=(f,g)$?
- Anybody can ask a question
- Anybody can answer
- The best answers are voted up and rise to the top
Of course $e$ is also a pair, $e=(e_1,e_2)$. What can you conclude from $(f,g)+(e_1,e_2)=(f,g)$?
Assuming $B$ is a group, it has an identity element $e$. In $B \times B$, therefore $$ (f,g) + (e,e) = (f + e, g + e) = (f,g) $$ for any elements $f$ and $g$, so $(e,e)$ is the identity in $B \times B$.
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783395039.24/warc/CC-MAIN-20160624154955-00062-ip-10-164-35-72.ec2.internal.warc.gz
|
CC-MAIN-2016-26
| 762
| 6
|
https://radar.inria.fr/report/2019/opis/uid9.html
|
code
|
Section: Research Program
Optimization over graphs
Graphs and hypergraphs are rich data structures for capturing complex, possibly irregular, dependencies in multidimensional data. Coupled with Markov models, they constitute the backbones of many techniques used in computer vision. Optimization is omnipresent in graph processing. Firstly, it allows the structure of the underlying graph to be inferred from the observed data, when the former is hidden. Second, it permits to develop graphical models based on the prior definition of a meaningful cost function. This leads to powerful nonlinear estimates of variables corresponding to unknown weights on the vertices and/or the edges of the graph. Tasks such as partitioning the graph into subgraphs corresponding to different clusters (e.g., communities in social networks) or graph matching, can effectively be performed within this framework. Finally, graphs by themselves offer flexible structures for formulating and solving optimization problems in an efficient distributed manner. On all these topics, our group has acquired a long-term expertise that we plan to further strengthen. In terms of applications, novel graph mining methods are proposed for gene regulatory and brain network analysis. For example, we plan to develop sophisticated methods for better understanding the gene regulatory network of various microscopic fungi, in order to improve the efficiency of the production of bio-fuels (collaboration with IFP Energies Nouvelles).
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817002.2/warc/CC-MAIN-20240415142720-20240415172720-00668.warc.gz
|
CC-MAIN-2024-18
| 1,502
| 3
|
https://svn.haxx.se/users/archive-2005-04/0715.shtml
|
code
|
Based on past obliterate discussions, my group may actually win in the "most
disk usage" category. :)
Due to influences outside our control, we have need to switch source control
systems near the end of the year, and after evaluating both commercial and
non-commercial packages, Subversion (coupled with svk for the offline and
merge capabilities) is up near the top of our list.
For our projects, ALL source assets go into the SCM tool. This allows us to
have a one stop shop for all assets needed to reconstitute the target build
at any point in history. However, the target building process can take a
very long time, so we also commit the targets at the same time as the source
assets. Any past build can be obtained quickly, and we aren't tied to a
"build of the day" type scenario. It has been a very effective system for
The entire checked out directory tree for one of our projects (half
finished) is around 7 to 8 gigabytes (last I checked a few months back). In
a nutshell, it is broken down like so:
* Project Root\
* Raw Assets\ - Around 4 gigabytes.
* Source Code\ - A couple hundred megabytes.
* Final Target\ - Around 2.5 gigabytes.
* Tools Binaries\ - Several hundred megabytes.
We use a considerable number of branches, too. Most are private user
branches, but some are feature branches.
In the past, our server has not had enough disk space to keep up (also out
of our control). I'm told high-end industrial hard drives aren't exactly
cheap. Near the end of the last two projects, we were obliterating old
revisions like crazy to have enough disk space. Of course, we didn't want
to and it caused us some grief at times, but there wasn't a choice. Over
the lifetime of the project, we had accumulated a history of 500 to 600
gigabytes. We only had half that on our server. :(
We have more disk space now, but we are already worrying about running out
down the road.
A dump/load of the database won't work, as it can't filter out old
revisions. Worse, a dump/load of a 500+ gigabyte repository would cause a
LOT of downtime.
All said, we want to put in another request for a Subversion obliterate. I
don't see it on the Roadmap, but I am aware of a bug in the Issue Tracker.
Reclaiming disk space is huge.
This isn't a deal breaker. I just don't know what the workaround would be.
We are very interested in continuing to store ALL of our assets in source
control. I've been investigating this for a while, but at this point, my
best course of action is to solicit the input from people way smarter than I
am (that's all of you... ;) ).
(As an aside, most of our people do not need all of the Raw Assets, but they
do need some. For this purpose, I have an extension to svnserve.exe and
svn.exe that allows for a client-side file to define a "mapping" of visible
and invisible directories. It is very Perforce-like. I can specifically
isolate the 100 megabytes of Raw Asset data I need without grabbing almost 4
gigabytes of fluff. When Subversion 1.2 comes out, I'll update my changes
and submit it as a patch, for those who care.)
Thanks for everybody's help in advance.
To unsubscribe, e-mail: email@example.com
For additional commands, e-mail: firstname.lastname@example.org
Received on Tue Apr 12 07:15:55 2005
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510219.5/warc/CC-MAIN-20230926175325-20230926205325-00033.warc.gz
|
CC-MAIN-2023-40
| 3,230
| 53
|
http://webapps.stackexchange.com/questions/tagged/firewall+xmpp
|
code
|
Web Applications Meta
to customize your list.
more stack exchange communities
Start here for a quick overview of the site
Detailed answers to any questions you might have
Discuss the workings and policies of this site
Bypass corporate firewall for IM
My friend happens to sit deep inside a corporate firewall with no access to Gmail, Yahoo! or any reasonable site that would allow you to chat or instant message. Is there any alternate means in which ...
Jul 5 '10 at 19:31
newest firewall xmpp questions feed
Hot Network Questions
What's the difference between the Model B and B+?
How to use fields in java enum by overriding the method?
Could I access a blocked website via a virtual machine if the host OS has the web address blocked in its hosts file?
Caveman Duels (or: Me poke you with sharp stick)
Solving recurrence relation: Product form
vim: hide first n letters of all lines in a file
Why does Pluto's orbit cross Neptune's orbit?
How to number the letters of a sentence?
Beach landing or shallow waters?
Replacing lines containing a pattern with sed
What are the downsides of a twisted wheel?
How to survive the heat in regions with very high temperature?
Is automatic text wrapping in an ArcMap layout text element possible?
Reducing the salary after job offer?
What is an official collection of laws/books/etc. called?
How does a language expand itself?
Why do op-amps keep amplifying?
Checking whether two tables have identical content in PostgreSQL
Get SObject by Id
Draw the Sawtooth Alphabet
Would leaving the headlights on for two hours permanently damage the battery?
Is it safe to stand by the windows during a thunderstorm?
Does using std::array<T, N> lead to code bloat?
The sun is a large object, WHILE having a diameter of nearly a million miles
more hot questions
Life / Arts
Culture / Recreation
TeX - LaTeX
Unix & Linux
Ask Different (Apple)
Geographic Information Systems
Science Fiction & Fantasy
Seasoned Advice (cooking)
Personal Finance & Money
English Language & Usage
Mi Yodeya (Judaism)
Cross Validated (stats)
Theoretical Computer Science
Meta Stack Exchange
Stack Overflow Careers
site design / logo © 2014 stack exchange inc; user contributions licensed under
cc by-sa 3.0
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1406510267075.55/warc/CC-MAIN-20140728011747-00380-ip-10-146-231-18.ec2.internal.warc.gz
|
CC-MAIN-2014-23
| 2,212
| 53
|
https://www.freeaibook.com/book/in-memory-machine-installation-and-administration-guide-for-linux-pdf-free-download-48066.html
|
code
|
Title: In-Memory Machine Installation and Administration Guide for Linux
Size: 1.80 MB
112 Pages | 1.04 MB |
EMC PowerPath for Linux Installation and Administration Guide. 2 ... Installing PowerPath when Veritas Storage Foundation is already installed .. 18 ... Configuring PowerPath in a RHEL 6.x or OL 6.x Boot from SAN setup.
48 Pages | 789.92 KB |
stopping the CAS controller and its worker nodes using the Red Hat Linux version 6 ... see “Set Up the cas Account” in SAS Viya for Linux: Deployment Guide.
42 Pages | 564.55 KB |
You manage configuration properties for SAS Viya services using the Configuration pages .... to Your Identity Provider” in SAS Viya for Linux: Deployment Guide.
24 Pages | 378.62 KB |
SAS identity management is not used in a programming-only deployment. In such ..... Installation Tasks” in SAS Viya for Linux: Deployment Guide. Note: 9 ...
Installation Guide for Linux (2007)
56 Pages | 583.70 KB |
Commerce – Express fix pack. Installation Guide for Linux. Version 126.96.36.199 ...... Corrected an issue where the session code didn't extract the storeId from the body ...
32 Pages | 499.86 KB |
In SAS Viya, authentication options vary, based on which interface is being ... In a full deployment, the pluggable authentication module (PAM) validates the ...... (.authinfo is the default filename on Linux). ... SAS/CONNECT 9.4 User's Guide.
84 Pages | 1.12 MB |
This guide provides detailed installation instructions for IBM® XL Fortran for. Linux, V15.1.1 for both big endian and little endian distributions. For each compiler ...
29 Pages | 482.79 KB |
openCRX Installation Guide for Tomcat 6 - Version 2.8.0. Table of ..... (Linux). If you want to deploy openCRX on a Tomcat version different from. Tomcat v6.0.26 ...
583 Pages | 3.65 MB |
SuSE Linux AG essentially adheres to the manufacturer's spelling. Names of ... Please direct suggestions and comments to firstname.lastname@example.org. Authors:.
28 Pages | 449.58 KB |
12c Release 1 (12.1) for IBM: Linux on POWER Little Endian. Systems. E64754-03 ..... 2-7. 3 Installing and Removing Oracle Database Client. 3.1. Downloading and ..... GNU Make 3.82 for powerpc64le-redhat-linux-gnu ... If you want to use GNU Compiler Collection (GCC) as the primary compiler, see the.
88 Pages | 1.18 MB |
Table 7. IBM XL Fortran for Linux, V15.1.5 packages and default installation .... v For the RHEL 7.1, RHEL 7.2, RHEL 7.3, and CentOS 7 operating systems, see.
195 Pages | 1.50 MB |
To unpack the tar file containing the software for the version of Linux that the server is running, enter: ...... If media format is not known to Archive Manager, the.
297 Pages | 3.42 MB |
Linux iptables Pocket. Reference. Linux Pocket Guide. Linux Network. Administrator's Guide. Running Linux. LPI Linux Certification in a. Nutshell. Linux Server ...
20 Pages | 365.59 KB |
This document describes how to install and run ArtiSynth on 64-bit Linux machines. ..... can be obtained at instructions.php. ... SVN connectors interface Subversive to the SVN server, and are OS and ...
222 Pages | 1.53 MB |
Entering Your License File Information Manually. 3-7. Using the FLEXnet Publisher License Editor. 3-7. Chapter 4. Installing and Starting Creo Elements/Pro.
45 Pages | 1.83 MB |
How do I install a CUDA driver with a version less than 367 using a network repo?................38 ..... The package "cuda-core" has been deprecated in CUDA 9.1.
56 Pages | 2.89 MB |
PGI Installation Guide for Intel 64 and AMD 64 CPUs ii. TABLE OF ..... Prepare to Install PGI Workstation or PGI Server on Linux. ...... AMD OpenCL components.
188 Pages | 3.96 MB |
3 Power up, connect to, reboot, and shut down the appliance. 23. Power up the ... Run the setup-cassandra script. 36 ...... MAC verified OK.
99 Pages | 1.29 MB |
POSIX ACLs (the connector must run on Linux and the file system must support them). .... The Distributed Index Handler distributes data across multiple.
250 Pages | 7.98 MB |
Red Hat Enterprise Linux 7 Storage Administration Guide. Deploying and configuring single-node storage in Red Hat Enterprise Linux. 7.
136 Pages | 1.22 MB |
Novell CIFS Administration Guide ... What's New or Changed in Novell CIFS (OES 2018) . ...... 2018: Distributed File Services Administration Guide for Linux.
242 Pages | 1.68 MB |
source server (OES Linux) or file on the NetWare server. 1c The ..... the VLDB” in the OES 2018: Distributed File Services Administration Guide for.
24 Pages | 876.67 KB |
Thermo-Calc may work well on other Linux distributions too but the program .... sudo apt-get update. > sudo apt-get install gfortran. CentOS 6.3, 32 and 64 bit.
176 Pages | 1.52 MB |
Storage. Administration Guide. Deploying and configuring single-node storage in Fedora. Josef Bacik ... basic to intermediate knowledge of Red Hat Enterprise Linux or Fedora. ... 4. 3. LVM (Logical Volume Manager). 7. 3.1. What is LVM2?
26 Pages | 467.70 KB |
Next Steps After Installation on Red Hat Enterprise Linux ... 5.2. OPENSHIFT CONSOLE INACCESSIBLE ON MICROSOFT EDGE BROWSER.
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578689448.90/warc/CC-MAIN-20190425054210-20190425080210-00536.warc.gz
|
CC-MAIN-2019-18
| 5,039
| 53
|
https://listman.redhat.com/archives/fedora-devel-list/2007-October/msg00141.html
|
code
|
Default Firefox settings
pemboa at gmail.com
Wed Oct 3 15:54:20 UTC 2007
I recently asked about ways to benchmark Firefox because of how
slow I found Firefox to be on Fedora 7. It was almost unusably slow,
prompting me to switch to Konqueror as much as possible.
However I have found a short tutorial which after following the speed
seems to at least be on par which my laptop (which has half the
processing speed, and a slower, IDE hard drive, and slower memory)
Assuming I haven't encountered some freak situation, it may be
necessary to consider changing the default Firefox settings, one of
which is IPV6 DNS. I have zero issues against IPV6 myself, but if it
helps make Firefox useful, by all means.
Again, if I can provide any objective metrics, please let me know.
Fedora 7 : sipping some of that moonshine
( www.pembo13.com )
More information about the fedora-devel-list
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656103322581.16/warc/CC-MAIN-20220626222503-20220627012503-00751.warc.gz
|
CC-MAIN-2022-27
| 878
| 17
|
http://boboroshi.com/2003/01/04/spank-yes-spank
|
code
|
Spank? Yes. Spank.
Tonight/last night, I went to a suare for the owner of DC Social Insider at a club called Spank. It was her birthday party. The club is above 1223 (or however it goes in roman numerals). Nice club. My friend Adam (aka Skytwin) was spinning the room that night. Good stuff. We spent too much. And we didn’t even get to see anyone get spanked. What a misnomer :)
Regardless, this marked the fourth night in a row of drinking. The new year is coming along well.
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-47/segments/1510934807650.44/warc/CC-MAIN-20171124104142-20171124124142-00276.warc.gz
|
CC-MAIN-2017-47
| 479
| 3
|
http://support.microsoft.com/find-solutions/office/excel/custom-settings-function-appearance/other
|
code
|
Select a solution
- Create flexible, effective conditional formats in Excel 2007 - Excel - Office.com
Learn how to create flexible, effective conditional formats in Excel 2007.
- Excel 2013 column filter options' appearance changes
Previously, after applying data filter, I can select/deselect each option. After a recent update of Excel 2013, these checkboxes disappear by default. Only When you click one option, it deselect that
- Problem with Custom Types Chart Option
I loaded an Excel add-in program called Jwalk Charting Tools. Since doing so, I have been unable to access the Custom Types chart options. I have tried to run the Microsoft repair tool to no avail. I
- Custom date settings in excel-2003
Hi, I want my date to be in the format (mm/dd/yyyy) irrespective of how I type. e.g. I used to type 72812 in the cell, the output should be converted as 07/28/2012. ( kindly have a close look that, I
- toggle appearance of textboxes and arrows?
How can I toggle the appearance of textboxes and arrows (perhaps grouped)? I want to put an expanation of some things into textboxes (not cell comments), with arrows pointing to one or more cells. I
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-10/segments/1394678693548/warc/CC-MAIN-20140313024453-00040-ip-10-183-142-35.ec2.internal.warc.gz
|
CC-MAIN-2014-10
| 1,153
| 11
|
https://sites.google.com/view/secularlibrary/systems/slclassification
|
code
|
Secular Library Classification
Realms of Knowledge
The first realm of knowledge is Reality, and it lists the collation system and the other realms as categories.
000: Process (collation)
In the practical application for libraries, the Reality section of the Secular Library Classification system will probably be used to organize the current serials and general references, which is very similar to how the first section (000-099) of the Dewey Decimal system is used in libraries.
is the format for organizing lists
The Secular Library Classification collation is a list of seven words that provide a semantic cue for determining the division order of subjects - format - formula system for lists.
- 000. Process
- 001. Systemations
- 002. Applications
- 003. Individuations
- 004. Organizations
- 005. Doctrinations
- 006. Classifications
This list of semantic cues is the scientific theory that distinguishes the SLC system from the Dewey and Library of Congress systems. The theory suggests that every subject can be divided into the six subdivisions of information that describes the subject.
There are icons and a simple six primary colors (rainbow) code to help remember the cues and navigate the system more swiftly than having to read and interpret the numerical coding, which is easier to learn than the Dewey and Library of Congress call number codes. There have been a couple of thesis papers written by library professionals requesting a signage/icon system for the library shelving systems, but because the subsisting systems lack of a reliable collation, such signage are near impossible to implement. The SLC offers the solution to the problems that the library professional describe.
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-30/segments/1563195526818.17/warc/CC-MAIN-20190721020230-20190721042230-00046.warc.gz
|
CC-MAIN-2019-30
| 1,699
| 16
|
http://soa.sys-con.com/node/2326325
|
code
|
|By Bob Gourley||
|August 10, 2012 01:00 AM EDT||
A review of the key properties of network virtualization can inform your planning and help in requirements generation as you architect new systems. The best source of information I’ve found on network virtualization is at Nicira, a firm anyone with an infrastructure should be paying attention to now.
The following is drawn from their paper on The Seven Properties of Network Virtualization”
1. Independence from network hardware
In the emerging multi-tenant cloud, the old rules of vendor lock-in are rapidly changing. A network virtualization platform must be able to operate on top of any network hardware, much like x86 server hypervisors work on top of any server. This independence means the physical network can be supplied by any combination of hardware vendors. Over time, newer architectures that better support virtualization as well as commodity options are becoming available, further improving the capital efficiency of cloud.
2. Faithful reproduction of the physical network service model
The vast bulk of enterprise applications have not been written as web applications, and the cost/payback ratio of rewriting tens of billions of dollars of application development is neither realistic nor even possible. Therefore, a network virtualization platform must be able to support any workload that runs within a physical environment today. In order to do so, it must recreate Layer 2 and Layer 3 semantics fully, including support for broadcast and multicast. In addition it must be able to offer higher-level in-network services that are used in networks today such as ACLs, load balancing, and WAN optimization.
It is also important that the virtual network solution fully virtualize the network address space. Commonly, virtual networks are migrated from or integrated with physical environments where it is not possible to change the current addresses of the VMs. Therefore, it is important that a virtual network environment not dictate or limit the addresses that can be used within the virtual networks, and that it allows overlapping IP and MAC addresses between virtual networks.
3. Follow operational model of compute virtualization
A key property of compute virtualization is the ability to treat a VM as soft state, meaning it can be moved, paused, resumed, snapshotted, and rewound to a previous configuration. In order to integrate seamlessly in a virtualized environment, a network virtualization solution must support the same control and flexibility for virtual networks.
4. Compatible with any hypervisor platform
Network virtualization platforms must also be able to work with the full range of server hypervisors, including Xen, XenServer, KVM, ESX, and HyperV, providing the ability to control virtualized network connectivity across any network substrate as well as between hypervisor environments. This “any-to-any” paradigm shift provides for:
- More effective utilization of existing network investments,
- Cost and management reduction of new, Layer 3 fabric innovations,
- Workload portability from enterprise to cloud service provider environments.
5. Secure isolation between virtual networks, the physical network, and the control plane
The promise of multi-tenancy requires maximum utilization of compute, storage and network assets through sharing of the physical infrastructure. It is important that a network virtualization platform maintain this consolidation while still providing the isolation needed by regulatory compliance standards such as PCI or FINRA, as well as provide the same security guarantees of compute virtualization.Like compute virtualization, a network virtualization platform should provide strict address isolation between virtual networks (meaning one virtual network cannot inadvertently address another) as well address isolation between the virtual networks and the physical network. This last property removes the physical network as an attack target unless the virtualization platform itself is undermined.
6. Cloud performance and scale
Cloud drives a significant increase in the scale of tenants, servers, and applications supported in a single data center. However, current networks are still bound by the physical limitations of networks, especially VLANs (which are limited to 4,096). VLANS were designed during an earlier era before server virtualization dramatically increased the requirements for the numbers of virtually isolated environments. Network virtualization must support considerably larger scale deployments with tens thousands, or even hundreds of thousands of virtual networks. This not only enables a larger number of tenants, but also support critical services like disaster recovery, data center utilization, etc., which outstrip current limitations.
A virtual network solution should also not introduce any chokepoints or single points of failure into the network. This roughly entails that to all components for the solution must be fully distributed, and all network paths should support multi-pathing and failover. Finally, a network virtualization solution should also not significantly impact data path performance. The number of lookups on the data path required to implemented network virtualization is similar to what data paths perform today. It is possible to implement full network virtualization in software at the edge of the network and still perform at full 10G line rates.
7. Programmatic network provisioning and control
Traditionally, networks are configured one device at a time, although this can be accelerated through the development of scripts (which emulate individual configuration). Current approaches make network configuration slow, error prone and open to security holes through a mistaken keystroke. In a large-scale cloud environment, this introduces a level of fragility and manual configuration costs that hurt service velocity and/or profitability.
A network virtualization solution should provide full control over all virtual network resources and allow for these resources to be managed programmatically. This allows the provisioning to happen at the service level versus the element level significantly simplifying provisioning logic and any disruption that might occur due to physical network node failure. The programmatic API should provide full access to management and configuration of a virtual network to not only support dynamic provisioning at cloud time scales, but also the ability to introduce and configure services on the fly.
The seven key features above are a great starting point for requirements for your enterprise architecture. The good news is that you can enjoy all these features of network virtualization without significant change. The only thing it really requires is an understanding of this new approach and access to the technical thought leadership.
For more on this topic a great place to start your research is with Nicira.
A strange thing is happening along the way to the Internet of Things, namely far too many devices to work with and manage. It has become clear that we'll need much higher efficiency user experiences that can allow us to more easily and scalably work with the thousands of devices that will soon be in each of our lives. Enter the conversational interface revolution, combining bots we can literally talk with, gesture to, and even direct with our thoughts, with embedded artificial intelligence, wh...
May. 25, 2016 08:00 PM EDT Reads: 1,870
I have an article in the recently released “DZone Guide to Building and Deploying Applications on the Cloud” entitled “Fullstack Engineering in the Age of Hybrid Cloud”. In this article I discuss the need and skills of a Fullstack Engineer with relation to troubleshooting and repairing complex, distributed hybrid cloud applications. My recent experiences with troubleshooting issues with my Docker WordPress container only reinforce the details I wrote about in this piece. Without my comprehensive...
May. 25, 2016 07:30 PM EDT Reads: 1,843
The 19th International Cloud Expo has announced that its Call for Papers is open. Cloud Expo, to be held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA, brings together Cloud Computing, Big Data, Internet of Things, DevOps, Containers, Microservices and WebRTC to one location. With cloud computing driving a higher percentage of enterprise IT budgets every year, it becomes increasingly important to plant your flag in this fast-expanding business opportunity. Submit y...
May. 25, 2016 06:00 PM EDT Reads: 1,884
Internet of @ThingsExpo, taking place November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA, is co-located with the 19th International Cloud Expo and will feature technical sessions from a rock star conference faculty and the leading industry players in the world and ThingsExpo New York Call for Papers is now open.
May. 25, 2016 05:00 PM EDT Reads: 1,719
Many banks and financial institutions are experimenting with containers in development environments, but when will they move into production? Containers are seen as the key to achieving the ultimate in information technology flexibility and agility. Containers work on both public and private clouds, and make it easy to build and deploy applications. The challenge for regulated industries is the cost and complexity of container security compliance. VM security compliance is already challenging, ...
May. 25, 2016 05:00 PM EDT Reads: 1,058
IoT generates lots of temporal data. But how do you unlock its value? How do you coordinate the diverse moving parts that must come together when developing your IoT product? What are the key challenges addressed by Data as a Service? How does cloud computing underlie and connect the notions of Digital and DevOps What is the impact of the API economy? What is the business imperative for Cognitive Computing? Get all these questions and hundreds more like them answered at the 18th Cloud Expo...
May. 25, 2016 02:15 PM EDT Reads: 2,130
Cloud-based NCLC (No-code/low code) application builder platforms empower everyone in the organization to quickly build applications and executable processes that broaden access, deepen collaboration, and enhance transparency for all team members. Line of business owners (LOBO) and operations managers know best their part of the business and their processes. IT departments are beginning to leverage NCLC platforms to empower and enable LOBOs to lead the innovation, transform the organization, an...
May. 25, 2016 12:00 PM EDT Reads: 1,674
@DevOpsSummit taking place June 7-9, 2016 at Javits Center, New York City, and Nov 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA, is co-located with the 18th International @CloudExpo and will feature technical sessions from a rock star conference faculty and the leading industry players in the world.
May. 25, 2016 11:00 AM EDT Reads: 3,293
SYS-CON Events announced today the Docker Meets Kubernetes – Intro into the Kubernetes World, being held June 9, 2016, in conjunction with 18th Cloud Expo | @ThingsExpo, at the Javits Center in New York, NY. Register for 'Docker Meets Kubernetes Workshop' Here! This workshop led by Sebastian Scheele, co-founder of Loodse, introduces participants to Kubernetes (container orchestration). Through a combination of instructor-led presentations, demonstrations, and hands-on labs, participants learn ...
May. 25, 2016 10:00 AM EDT Reads: 1,847
Just last week a senior Hybris consultant shared the story of a customer engagement on which he was working. This customer had problems, serious problems. We’re talking about response times far beyond the most liberal acceptable standard. They were unable to solve the issue in their eCommerce platform – specifically Hybris. Although the eCommerce project was delivered by a system integrator / implementation partner, the vendor still gets involved when things go really wrong. After all, the vendo...
May. 25, 2016 10:00 AM EDT Reads: 1,366
The initial debate is over: Any enterprise with a serious commitment to IT is migrating to the cloud. But things are not so simple. There is a complex mix of on-premises, colocated, and public-cloud deployments. In this power panel at 18th Cloud Expo, moderated by Conference Chair Roger Strukhoff, panelists will look at the present state of cloud from the C-level view, and how great companies and rock star executives can use cloud computing to meet their most ambitious and disruptive business ...
May. 25, 2016 09:15 AM EDT Reads: 2,083
Agile teams report the lowest rate of measuring non-functional requirements. What does this mean for the evolution of quality in this era of Continuous Everything? To explore how the rise of SDLC acceleration trends such as Agile, DevOps, and Continuous Delivery are impacting software quality, Parasoft conducted a survey about measuring and monitoring non-functional requirements (NFRs). Here's a glimpse at what we discovered and what it means for the evolution of quality in this era of Continuo...
May. 25, 2016 07:15 AM EDT Reads: 1,446
You might already know them from theagileadmin.com, but let me introduce you to two of the leading minds in the Rugged DevOps movement: James Wickett and Ernest Mueller. Both James and Ernest are active leaders in the DevOps space, in addition to helping organize events such as DevOpsDays Austinand LASCON. Our conversation covered a lot of bases from the founding of Rugged DevOps to aligning organizational silos to lessons learned from W. Edwards Demings.
May. 25, 2016 07:00 AM EDT Reads: 1,351
When I talk about driving innovation with self-organizing teams, I emphasize that such self-organization includes expecting the participants to organize their own teams, give themselves their own goals, and determine for themselves how to measure their success. In contrast, the definition of skunkworks points out that members of such teams are “usually specially selected.” Good thing he added the word usually – because specially selecting such teams throws a wrench in the entire works, limiting...
May. 25, 2016 05:30 AM EDT Reads: 1,481
As AT&Ts VP of Domain 2.0 architecture writes one aspect of their Domain 2.0 strategy is a goal to embrace a Microservices Application Architecture. One page 9 they describe how these envisage them fitting into the ECOMP architecture: "The initial steps of the recipes include a homing and placement task using constraints specified in the requests. ‘Homing and Placement' are micro-services involving orchestration, inventory, and controllers responsible for infrastructure, network, and applicati...
May. 25, 2016 05:15 AM EDT Reads: 1,617
Application development and delivery methods have undergone radical changes in recent years to improve scalability and resiliency. Container images are the new build and deployment artifacts that are used to ship and run software. While startups have long been comfortable experimenting with and embracing new technologies, even large enterprises are now re-architecting their software systems so that they can benefit from container-enabled micro services architectures. With the launch of DC/OS, w...
May. 25, 2016 05:00 AM EDT Reads: 1,351
Earlier this week, we hosted a Continuous Discussion (#c9d9) on Continuous Delivery (CD) automation and orchestration, featuring expert panelists Dondee Tan, Test Architect at Alaska Air, Taco Bakker, a LEAN Six Sigma black belt focusing on CD, and our own Sam Fell and Anders Wallgren. During this episode, we discussed the differences between CD automation and orchestration, their challenges with setting up CD pipelines and some of the common chokepoints, as well as some best practices and tips...
May. 25, 2016 04:15 AM EDT Reads: 1,278
SYS-CON Events announced today TechTarget has been named “Media Sponsor” of SYS-CON's 18th International Cloud Expo, which will take place on June 7–9, 2016, at the Javits Center in New York City, NY, and the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. TechTarget is the Web’s leading destination for serious technology buyers researching and making enterprise technology decisions. Its extensive global networ...
May. 25, 2016 04:15 AM EDT Reads: 3,059
Korean Broadcasting System (KBS) will feature the upcoming 18th Cloud Expo | @ThingsExpo in a New York news documentary about the "New IT for the Future." The documentary will cover how big companies are transmitting or adopting the new IT for the future and will be filmed on the expo floor between June 7-June 9, 2016, at the Javits Center in New York City, New York. KBS has long been a leader in the development of the broadcasting culture of Korea. As the key public service broadcaster of Korea...
May. 25, 2016 04:00 AM EDT Reads: 1,723
Automation is a critical component of DevOps and Continuous Delivery. This morning on #c9d9 we discussed CD Automation and how you can apply Automation to accelerate release cycles, improve quality, safety and governance? What is the difference between Automation and Orchestration? Where should you begin your journey to introduce both?
May. 25, 2016 02:45 AM EDT Reads: 1,294
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-22/segments/1464049275429.29/warc/CC-MAIN-20160524002115-00237-ip-10-185-217-139.ec2.internal.warc.gz
|
CC-MAIN-2016-22
| 17,286
| 66
|
https://git.etalabs.net/cgit/linux-sh/log/lib/semaphore-sleepers.c?h=v4.12-rc7&id=86feeaa8120bb1b0ab21efed49e9754039395ef1&showmsg=1
|
code
|
This patch moves the common code in x86 and x86-64's semaphore.c into a
single file in lib/semaphore-sleepers.c. The arch specific asm stubs are
left in the arch tree (in semaphore.c for i386 and in the asm for x86-64).
There should be no changes in code/functionality with this patch.
Signed-off-by: Benjamin LaHaise <email@example.com>
Cc: Andi Kleen <firstname.lastname@example.org>
Signed-off-by: Jeff Dike <email@example.com>
Signed-off-by: Andrew Morton <firstname.lastname@example.org>
Signed-off-by: Linus Torvalds <email@example.com>
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656104628307.87/warc/CC-MAIN-20220705205356-20220705235356-00309.warc.gz
|
CC-MAIN-2022-27
| 542
| 9
|
http://www.przoom.com/news/40166/Ideaca-Knowledge-Services-a-Finalist-in-Four-Categories-for-Microsoft-Partner-Program-IMPACT-Awards/
|
code
|
Ideaca Knowledge Services, a leading Information Technology services company that provides business application solutions to the Canadian market, announced today that they have been selected as a finalist in four categories for the 2008 Microsoft Partner Program IMPACT Awards. The sixth annual IMPACT Awards recognize excellence within the Microsoft technology partner community in Canada as well as the innovative solutions and value they deliver to customers.
“Partners are at the core of Microsoft’s business model and Microsoft has always relied upon a strong network of technology partner companies to bring technology to customers and provide the foundation for delivering solutions to the marketplace.” said Lora Gernon, Director, Partner Group, Microsoft Canada Co. “We are proud to celebrate companies like Ideaca Knowledge Services at the Microsoft Partner Program IMPACT Awards as they help drive business growth and customer satisfaction through their stellar demonstration of industry leadership.”
Ideaca was chosen as a finalist for four awards: Business Intelligence Partner of the Year, Information Worker Partner of the Year, Marketing Innovation award – Enterprise, and Microsoft Business Solutions Partner of the Year – License Sales. Ideaca has won an IMPACT Award for four consecutive years.
Ideaca, along with other technology partner winners and finalists in each of the award categories, will be honored at a gala event in Toronto on November 13, 2008.
About Ideaca Knowledge Services
Ideaca is a leading Information Technology services company providing business application solutions to the Canadian market. Ideaca currently employs over 180 information technology professionals in their Toronto, Calgary, Edmonton and Vancouver offices. Recognized globally for delivering innovative solutions, Ideaca focuses on Microsoft Dynamics™ AX, Microsoft Dynamics™ CRM, Portals and Collaboration Tools, Custom Application Development, Business Intelligence and Application Integration.
About the Microsoft Partner Program IMPACT Awards
In 2003, Microsoft Canada replaced all of its previous technology partner awards with a unified program that also recognizes customer service, marketing, and contribution to the community. Microsoft Canada has outlined 30 categories to highlight the Partner Program competencies to honour the achievements of top technology partners.
The Microsoft Partner Program IMPACT Awards were open to Systems Integrators, Large Account Resellers, Direct Market Resellers, Value Added Resellers, Distributors, Systems Builders, Authorized Education Resellers, Certified Partners for Learning Solutions, Microsoft Certified Partners, Independent Software Vendors, Channel Suppliers, Microsoft Business Solutions (MBS) Partners and Original Equipment Manufacturers.
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-39/segments/1505818696681.94/warc/CC-MAIN-20170926193955-20170926213955-00583.warc.gz
|
CC-MAIN-2017-39
| 2,825
| 9
|
http://freecode.com/tags/windows?page=1&sort=popularity&with=218&without=2892
|
code
|
Snort is a network intrusion detection and prevention system. It is the most widely deployed technology of its kind in the world. It performs detection using a variety of methods including rules-based detection, anomaly detection, and heuristic analysis of network traffic. Its rules language is open source and available to the public as well.
MultiTail lets you view one or multiple files like the original tail program. The difference is that it creates multiple windows on your console (with ncurses). Merging of 2 or more log files is possible. It can also use colors while displaying the log files (through regular expressions) for faster recognition of what is important. It can also filter lines (again with regular expressions). It has interactive menus for editing given regular expressions and deleting and adding windows. One can also have windows with the output of shell scripts and other software. When viewing the output of external software, MultiTail can mimic the functionality of tools like 'watch'.
GKrellM is a GTK-based stacked monitor program that charts SMP CPUs, disks, load, active net interfaces, and internet connections. There are also builtin monitors for memory and swap, file systems with mount/umount feature, mailbox checking including POP3 and IMAP, clock/calendar, laptop battery, sensors (temperatures, voltages, and fans), and uptime. It has LEDs for the net monitors and an on/off button and online timer for PPP. There is a GUI popup for configuration, plugin extensions can be installed, and many themes are available. It also features a client/server monitoring capability.
ntopmg is a network probe that shows network usage in a way similar to what top does for processes. It acts as a Web server, creating an HTML dump of the network status. It sports a flow collector, an HTTP-based client interface for creating ntop-centric monitoring applications, and RRD for persistently storing traffic statistics. Its C++ core can be scripted in Lua, for changing the appearance and extending functionality.
Check_MK is a complex addon for Nagios/Icinga and consists of three subprojects. The check and inventory system Check_MK is a general purpose Nagios plugin for retrieving data. It adopts a new approach for collecting data and obsoletes NRPE, check_by_ssh, NSClient, and check_snmp. It features a significant reduction of CPU use on the Nagios host and automatic inventory of items to be checked, and is especially useful with larger Nagios installations. "MK Livestatus" gives immediate and fast access to live and historic Nagios status data. It's a supported backend for many addons including NagVis, NagiosBP, and Thruk. "Check_MK Multisite" is a feature complete replacement for the Nagios GUI, and uses MK Livestatus as a backend. It is very fast, and supports efficient distributed monitoring.
aircrack-ng is a set of tools for auditing wireless networks. It's an enhanced/reborn version of aircrack. It consists of airodump (an 802.11 packet capture program), aireplay (an 802.11 packet injection program), aircrack (static WEP and WPA-PSK cracking), airdecap (decrypts WEP/WPA capture files), and some tools to handle capture files (merge, convert, etc.).
Performance Co-Pilot (PCP) is a framework and set of services for supporting system-level performance monitoring and performance management. It provides a unifying abstraction for all of the interesting performance data in a system, and allows client applications to easily retrieve and process any subset of that data using a single API. A client-server architecture allows multiple clients to monitor the same host, and a single client to monitor multiple hosts. Archive logging and replay are integrated so that a client application can use the same API to process real-time data from a host or historical data from an archive.
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-15/segments/1398223206647.11/warc/CC-MAIN-20140423032006-00171-ip-10-147-4-33.ec2.internal.warc.gz
|
CC-MAIN-2014-15
| 3,838
| 7
|
https://tmbw.net/wiki/Talk:Shows/2010-06-26a
|
code
|
From This Might Be A Wiki
Hope this is OK. It will need formatting somewhat, but I am doing this on a phone in the cafe-ish area of the Hall building, so cannot do that right now. The setlist I've done is as performed, written down while being performed, so may not be the same as that given out at the end of the show to the people in the stalls.
The photos took of the kids show are at http://www.flickr.com/photos/oharab/4771841217/in/set-72157624319677597/
You're free to add them if you like.
from a little digging id say the balloons were probably the Festo AirPenguin and AirJelly
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296949533.16/warc/CC-MAIN-20230331020535-20230331050535-00124.warc.gz
|
CC-MAIN-2023-14
| 587
| 5
|
https://loyola.screenstepslive.com/a/1588377-how-do-i-add-items-to-the-calendar
|
code
|
The Calendar tool allows instructors (and site maintainers) to post items to the class calendar. You may use the Calendar tool to post reminders about class activities and due dates.
Select Add Event to create a new event.
Note: multiple day (overnight) events cannot be added as a single event; they need to be added as an all day event with a frequency of daily.
A Title, Date, and Start Time to are required create an event. All other fields are optional.
- The Title will be displayed on the calendar, so it is best to make it something short and informative.
- The Date is the day that the event takes place. Use the calendar picker to select a date.
- The Start Time is the time of day when the event begins.
- The Duration is how long the event will last. Selecting an amount of time from the Duration dropdown menu will automatically update the End Time accordingly.
- The End Time is when the event is expected to end. Selecting a time of day from the End Time dropdown menu will automatically update the Duration accordingly.
- Provide additional event details in the Message field. The Rich Text Editor is available in the Message field.
Elect to display the event to the whole site, or to selected groups. Display to site is the default.
Note: The course must have existing groups for the "display to selected groups" option to appear.
Select the Frequency button to add a recurring event.
Select the frequency option from the dropdown menu that best describes the event.
- Select the appropriate event interval from the Every dropdown menu.
- Specify when the frequency Ends (Optional). Elect for it to end after a certain number of times, until a specific date, or never. For example, when posting office hours to repeat on the same day and time each week until the end of the term, select the last day of the term as the end date.
- Select Save.
Select the Event Type dropdown menu to view all available event types and choose a type for this event. The default event type is Activity.
If the event is happening in a specific location, enter the Event Location here.
Select Add Attachments to browse for and select a file to attach to the Calendar event.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100583.13/warc/CC-MAIN-20231206031946-20231206061946-00055.warc.gz
|
CC-MAIN-2023-50
| 2,169
| 20
|
https://www.boloji.com/poem/11385/flame
|
code
|
What shall I write from the empty, desolate heart,
when every word is being scraped?
You want to clean the mess of a lifetime,
yet labour brings loneliness
and you inherit the depth of a problem.
A thought which has no ending.
A constant battle with yourself
in the bleak winter of age.
One by one they have died,
Your invisible gods.
The vast landscape of knowing the truth
still remains unconquered.
Pursue you must
for the sake of moment
a flame which has no heat!
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764499468.22/warc/CC-MAIN-20230127231443-20230128021443-00466.warc.gz
|
CC-MAIN-2023-06
| 467
| 15
|
https://ffxiv.fanbyte.com/forum.html?mid=1376617520147435444&forum=152&howmany=50
|
code
|
I did some checking in phase 3, and apparently certain Final Fantasy character names are unusable by players.
Sephiroth appears to be one of them. So if someone wants to be Sephiroth, they have to misspell it. Same with virtually every FF main character and a handful of other Square names.
If random outcomes aren't acceptable to you, then don't play with random people.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764499541.63/warc/CC-MAIN-20230128090359-20230128120359-00459.warc.gz
|
CC-MAIN-2023-06
| 371
| 3
|
https://rulesofplay.co.uk/products/last-second-quest
|
code
|
- No. of players: 2-5
- Playing time: 20 minutes
- Age: 14+
Last-Second Quest: - Rules of Play says:
In Last-Second Quest, you and your opponents are adventurers in a rush! With a gridded board representing your backpack and a big pile of random items, you have only seconds to pack as many items as you can!
Each round, you get a new quest with a unique set of required and forbidden items. Pack the required items and avoid the forbidden ones! Once everyone is packed, take turns defending your choice of items, then score based on how well you prepared, and how few empty spaces are left over. The best prepared adventurer wins!
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296816893.19/warc/CC-MAIN-20240414161724-20240414191724-00116.warc.gz
|
CC-MAIN-2024-18
| 631
| 6
|
https://www.wowebook.biz/cleaning-data-for-effective-data-science/
|
code
|
Cleaning Data for Effective Data Science
- Paperback: 498 pages
- Publisher: WOW! eBook (April 9, 2021)
- Language: English
- ISBN-10: 1801071292
- ISBN-13: 978-1801071291
It is something of a truism in data science, data analysis, or machine learning that most of the effort needed to achieve your actual purpose lies in cleaning your data. Written in David’s signature friendly and humorous style, this book discusses in detail the essential steps performed in every production data science or data analysis pipeline and prepares you for data visualization and modeling results.
The Cleaning Data for Effective Data Science book dives into the practical application of tools and techniques needed for data ingestion, anomaly detection, value imputation, and feature engineering. It also offers long-form exercises at the end of each chapter to practice the skills acquired.
You will begin by looking at data ingestion of data formats such as JSON, CSV, SQL RDBMSes, HDF5, NoSQL databases, files in image formats, and binary serialized data structures. Further, the book provides numerous example data sets and data files, which are available for download and independent exploration.
Moving on from formats, you will impute missing values, detect unreliable data and statistical anomalies, and generate synthetic features that are necessary for successful data analysis and visualization goals.
- How to think carefully about your data and ask the right questions
- Identify problem data pertaining to individual data points
- Detect problem data in the systematic “shape” of the data
- Remediate data integrity and hygiene problems
- Prepare data for analytic and machine learning tasks
- Impute values into missing or unreliable data
- Generate synthetic features that are more amenable to data science, data analysis, or visualization goals
By the end of this Cleaning Data for Effective Data Science book, you will have acquired a firm understanding of the data cleaning process necessary to perform real-world data science and machine learning tasks.
[ Exclusive Offer! Order Wall Mounted Magnetic Basketball Bottle Opener Now. Get Lowest Price & 60 Day Return Policy. Huge Discounts Available! Bravo Goods Special Offer Expires Soon. ]
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100304.52/warc/CC-MAIN-20231201183432-20231201213432-00429.warc.gz
|
CC-MAIN-2023-50
| 2,249
| 19
|
https://www.zendesk.es/blog/tier-0-customer-support/
|
code
|
Reflecting the importance of providing excellent self-service to manage rapid growth and satisfy customers, you might want to launch tier 0 customer support. What is tier 0? It’s the self-service tier; the support available to customers that does not require directly interacting with a customer advocate. This includes the knowledge base available in an online help center, the product training that is available to customers, as well as assistance that is available in the product’s user interface.
Tier 0 customer support isn’t a staffed team, it’s an initiative to better contribute to and manage self-service as a support channel; to better handle a tier 0, making the most of self-service ever-increasing amount of incoming support requests that can be easily answered with these self-help resources.
Tier 0 goals
There are two goals for tier 0:
- Provide support that makes use of employee knowledge, which means that reps are both generating and sharing knowledge-base content (internally and with customers).
- Devise ways to help customers discover and use that self-help content. An example of this is to use proactive support to spot an issue that a customer is having or is about to have, then proactively create a ticket that contains a link to the knowledge-base article that will help them resolve it themselves.
Getting started with self-service
Fully embracing self-service might seem intimidating, but as we’ve shown in our white paper: you’re probably already doing it. Simple changes to activities your team already engages in, such as writing responses to support requests and tracking one-touch tickets, can lead to an effective tier 0.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474746.1/warc/CC-MAIN-20240228211701-20240229001701-00812.warc.gz
|
CC-MAIN-2024-10
| 1,671
| 8
|
https://forum.inductiveautomation.com/t/schedule-email-with-a-table-containing-data-of-sql-tag/34994
|
code
|
Hello to everybody
I need an help.
I need to send the result of a query tag that I already show on a dedicated page and that I can export in excel format by pressing a button.
I am already able to send an email with this file attached on it (client side) but,
how can I schedule the delivery of this email every evening with this very simple table (gateway side) without manual operations?
Thank you in advance.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446710421.14/warc/CC-MAIN-20221210074242-20221210104242-00708.warc.gz
|
CC-MAIN-2022-49
| 411
| 6
|
https://www.vn.freelancer.com/projects/website-design-graphic-design/adsense-project-urgent/
|
code
|
I want to build a website which can earn atleast $15 per day through adsense.
I will first review the work and see if google approved it or not.
Also will see for 1 week if we are able to earn $15 or not then only i will pay.
This is for serious bidders only!!
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-30/segments/1531676591216.51/warc/CC-MAIN-20180719183926-20180719203926-00574.warc.gz
|
CC-MAIN-2018-30
| 260
| 4
|
http://mystifiedmusic.com/index.php?/archives/P2.html
|
code
|
A musician with a computer can do a lot with a little. A good portion of my music, perhaps 30%, uses or includes sounds from one folder on my hard drive called "Field Work". This folder contains about 30-40 sounds I recorded with a minidisc player, then broke into samples. I pounded a bedpost with a hammer. I shook a glass jar filled with nails. I recorded the tub filling, and the microwave beeping.
It's absolutely phenomenal how much music has come from this raw material-- all I have to do is effect or process the sounds, and they just keep giving me more and more good results.
Maybe it's a bit like when Brian Eno pointed out that he likes his bass guitar, because it only has a few positions.
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560285315.77/warc/CC-MAIN-20170116095125-00491-ip-10-171-10-70.ec2.internal.warc.gz
|
CC-MAIN-2017-04
| 702
| 3
|
https://www.danielsinclair.com/?p=124
|
code
|
Computers make it easier to do a lot of things, but most of the things they make it easier to do don't need to be done. ~ Andy Rooney
So I've decided to sell the old Thinkpads around my house that no one uses – turns out, if I keep our best T41, I can sell the rest, which includes two other T41's, a T30, a T20, and three T20's that are only good for parts (no workie).
Anyway, the process for getting these ready for sale is interesting. It goes like this:
- Download the ISO file of the Universal Boot CD
- Burn the ISO image to a CD (luckily, you can Burn ISO Images Natively in Windows 7)
- Boot from the UBCD, then run CopyWipe to wipe all data (reformatting a drive does not remove all your data, all it does is clear the index)
- Install Windows XP Pro w/ SP3
Not that hard once you do it once or twice, but anyway, one of my T20's that I've already sold took a tumble and broke the corner off. I took the picture to the right, then used a Picnik filter to make it artsy for this post.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446710534.53/warc/CC-MAIN-20221128171516-20221128201516-00724.warc.gz
|
CC-MAIN-2022-49
| 995
| 8
|
https://www.freelancer.com/projects/jQuery-Prototype-AJAX/Sortable-Items-jQuery-AJAX/
|
code
|
Hi everybody, I need your help.
I need the sortable items of Listview on the client side in asp.net (WebForms).
I have upload examplary template of site as "[url removed, login to view]" picture between files of this project - LOOK AT THAT !!
It will be a simple homepage.aspx.
Here are more specific details:
- only lectures are sortable
- order of lectures is saved on the server side when new position of lecture is dropped
- lectures can be moved/dropped inside all Sections and between Sections (from 1 Section to 2 Section and from 2 Section to 1 Section)
- if Section dont have any lecture user can move/drop here some lecture from other Section
- lecture cannot be moved/dropped between "yellow and yellow division", "yellow and green division - one exception is when Section dont have any lecture", "yellow and orange division", "orange and orange division"
- if Section has some lecture, "yellow division" is always at the bottom of Section
- it´s not important how you store paths of lecture (you can use what is more comfortable for you from this three: mssql, xml, directories of server)
- at the end I will transform your code and store this paths in mssql and concrete files in directories of server (sqlAzure and BLOPs of azure when my webapplication will be ready to publish).
- if is it possible use one Listview for Sections and one Listview for lectures of one Section
PLEASE GIVE ME FEEDBACK IN YOUR OFFER HOW YOU WILL SOLVE THIS PROJECT !!
IF YOU HAVE ANY QUESTIONS, ASK ME !!
THANKS IN ADVANCE !!
i am a software engineer and responsible for creating a web and desktop applications using different languages and technologies if u r interested just send me a message thank you and good luck
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-05/segments/1516084891277.94/warc/CC-MAIN-20180122093724-20180122113724-00266.warc.gz
|
CC-MAIN-2018-05
| 1,713
| 18
|
http://www.popartbooks.co.uk/jalal-hose-clamp-pliers-3pcs-nylon-fuel-water-line-clamp-tool-hose-pinch-pliers.html
|
code
|
JALAL Hose Clamp Pliers, 3Pcs Nylon Fuel Water Line Clamp Tool Hose Pinch Pliers
- Product Code: B08CVG55P9
- Availability: In Stock
- 【Multi Porpose】Great for hose lines, brakes, fuel lines, heaters and radiators clamp.
- 【Non-Conductive】Made from durable nylon, non-conductive, ensure security.
- 【Humanized Design Handle】The smooth, rounded jaw edges can effectively prevent damage to internal hose reinforcement.
- 【High-Visibility 】High-visibility bright color can be easily to find, which can prevent accidental loss of clamps.
- 【Buckle Design】This hose pinch plier can be caught by a safety buckle according to the size of the clamp, releasing the hands and being more easy for using.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-04/segments/1610703550617.50/warc/CC-MAIN-20210124173052-20210124203052-00435.warc.gz
|
CC-MAIN-2021-04
| 712
| 8
|
https://forum.mbse-capella.org/t/semanticbrowserservices-3-1-1/5015
|
code
|
I have no experience in AQL and M2doc, so I have started to read the online available documentation.
Is there a version of SemanticBrowserServices for the 3.1.1 or a list of examples that can be used in 3.1.1 to extract the same kind on information?
I need to extract from my Capella model the following tables:
OPERATIONAL ACTIVITIES TO SYSTEM FUNCTIONS
SYSTEM FUNCTIONS TO LOGICAL FUNCTIONS
LOGICAL FUNCTIONS TO REQUIREMENTS
SYSTEM FUNCTIONS TO OPERATIONAL ACTIVITIES
LOGICAL FUNCTIONS TO SYSTEM FUNCTIONS
REQUIREMENTS TO LOGICAL FUNCTIONS
Thanks for the help
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-49/segments/1637964363641.20/warc/CC-MAIN-20211209000407-20211209030407-00399.warc.gz
|
CC-MAIN-2021-49
| 561
| 10
|
https://android.stackexchange.com/questions/226968/mobile-data-only-works-when-tethering-is-active
|
code
|
Issue is exactly as described in the title, works when used as hotspot and connected with computer, but not on the phone directly(regardless the hotspot setting). Moreover I have to add:
I am abroad in Italy. This is vodafone "data only sim". Bought two days ago and last time it worked was yesterday evening. I have two sims and my native-roaming enabled sim works fine. I tried swapping slots, having one sim, removing/changing/restoring apns, changing dns, restarting phone multiple times. When I try changing apns it goes back to the default one automatically. I cannot call customer service as they do not speak English.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-39/segments/1631780057202.68/warc/CC-MAIN-20210921101319-20210921131319-00549.warc.gz
|
CC-MAIN-2021-39
| 625
| 2
|
https://www.freelancer.com/projects/excel/website-data-scrape-20113641/
|
code
|
I would like a website scraped for data. Information needs gathering from url and on page including image and category structure
Hello Sir, I am expert in web scrapping, i can get you all the on page including image and category structure data with 100% accuracy and very quickly using python, i am ready to start the job right away.
41 freelancers are bidding on average £111 for this job
Hi! how are you? I am interested in your project I have been developed many scraped project using C# for 10 years. I can do your project well. I want to work with you for a long time. Please contact me. Best Regards.
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-35/segments/1566027322170.99/warc/CC-MAIN-20190825021120-20190825043120-00190.warc.gz
|
CC-MAIN-2019-35
| 607
| 4
|
https://www.florentmacrez.fr/amazon-machine-learning-salary.html
|
code
|
amazon machine learning salary. See salaries, compare reviews, easily apply, and get hired. com The Applied Machine Learning team works on problems across Amazon. Find our Machine Learning Engineer, Amazon Search, Search Science and AI job description for Amazon located in Palo Alto, CA, as well as other career opportunities that the company is hiring for. Salary information comes from 5 data points collected directly from employees, users, and past and present job advertisements on Indeed in the past 12 months. *Answer the questions crisp and short and be clear with it. From 0 to 1: Machine Learning, NLP & Python-Cut to the Chase (Loony Corn/Udemy): "A down-to-earth, shy but confident take on machine learning techniques. Amazon Machine Learning Engineer II vs SDE II salary. 339 Amazon Machine Learning Intern jobs in United States. Become a Machine Learning Engineer. The platform, which was recognised a leader in Gartner's Magic Quadrant for AI developer services, is assisting businesses of all sizes in rediscovering what's possible in the ML world. Amazon India announces machine learning programme for engineering students; Amazon India announces machine learning programme for engineering students The curriculum of ML Summer School will cover the fundamental concepts in ML while linking them to practical industry applications through an immersive 3-day course. Let's say in Table B, the mean salary is 50K and the median salary is 100K. AI is a broad field and encompasses a number of job roles that you can explore. Amazon Machine Learning endpoints and quotas. So I don't know about this round. Find your next job near you & 1-Click Apply!. 20 Best aws machine learning jobs in Remote (Hiring Now!). Secure and highly flexible services will be provided by the benefits of the infrastructure of Google. The Amazon Machine Learning REST API allows developers to build applications based on Amazon Machine Learning models that find patterns in data. Machine Learning Engineer Salaries 2022, Average salary ₹29 lakhs. Amazon Machine Learning Engineer salaries - 3 salaries reported: £40,000/yr: Apple Machine Learning Engineer salaries - 3 salaries reported: £69,976/yr: Bloomberg L. The interviewer will ask you a series of questions on fundamental machine learning concepts, like explanations of different machine learning models, bias-variance tradeoff, and overfitting. As the demand for data scientists and machine learning engineers grows, you can also expect these numbers to rise. Interview stories - Machine Learning Interview. com Machine Learning Engineer Salaries with Jobs in. Amazon Machine Learning reads data through Amazon S3, Redshift and RDS, then visualizes the data through the AWS Management Console and the Amazon Machine Learning API. The Amazon Machine Learning software intends to provide any developer and data scientist access to machine learning capabilities. The average salary for Machine Learning Engineer is £55,025 per year in the London Area. Machine Learning Engineer - Amazon Go jobs at Amazon in Seattle, WA 04-14-2022 - DESCRIPTION Job summary Amazon Go is a new kind of store with no lines and no checkout-you just grab and go! Customers simply use the Ama. Top 10 Machine Learning Tools 2021. Today's top 339 Amazon Machine Learning Intern jobs in United States. Apply for Software Engineer, Machine Learning via Google Careers. com Machine Learning Engineer yearly pay in the United States is approximately $137,213, which meets the national average. Machine learning professionals, data scientists, and engineers can use it in their day-to-day workflows: Train and deploy models, and manage MLOps. 31-star weighted average rating over 80 reviews. Amazon Augmented AI (Amazon A2I) is a machine learning service which makes it easy to build the workflows required for human review. Description: "Amazon Machine Learning is a service that makes it easy for developers of all skill levels to use machine learning technology. Machine Learning Data Associate, Information. This textbook aims to provide a coherent introduction to machine learning and the algorithmic paradigms it provides. Answer (1 of 2): Salary — it depends on the work experience and knowledge gain on ML/DL. Machine Learning salaries at Amazon can range from ₹2,93,905-₹6,22,224. The following are the service endpoints and service quotas for this service. Amazon and the University of Southern California will. Here are Data Scientist Salary for cities in the USA: San Francisco: $121,836. Difference Between Data Science and Machine Learning. The average salary for a machine learning engineer is $117,457 per year in the United States. MLU's curriculum is designed to sharpen the skills of current ML practitioners, while also giving neophytes the tools they need to deploy machine learning for their own projects. They are suitable for jobs in various employment areas such as Data Science, Machine Learning and Artificial Intelligence. Machine Learning and Data Science. Hence, it continues to evolve with time. Amazon's new machine-learning tool will help businesses spot flagging KPIs. Halfway There: Course 2 and SageMaker Docs. As part of the AiData Team at AWS you will responsible for delivering high-quality training data to ensure the best performance of the AWS machine learning systems. More From Our Machine Learning Experts Artificial Intelligence vs. • Coursework or thesis in machine learning, data mining, information retrieval, statistics or natural language processing • Advanced knowledge of performance, scalability, enterprise system architecture, and engineering best practices Amazon is committed to a diverse and inclusive workplace. Average : £11,804 Range : £2,060 - £67,648. Amazon Machine Learning vs Azure Machine Learning. Job summaryAmazon Web Services (AWS) is looking for a Machine Learning Data Linguist to help with annotations and data analysis. AWS announces free machine learning educational materials. However, machine learning is not a simple process. Every single Machine Learning course on the internet. Highly sought after due to the technical nature of their work, they command high salaries (between 10 and 12 LPA), and are mostly responsible for making sure that machine learning projects function efficiently. According to Glassdoor, the national average machine learning engineer salary is INR 7. Offered by Amazon, this certification proves expertise in creating, training, refining, and deploying machine learning models on the AWS Cloud. Experience in deep learning, active learning, generative…. I can say for a resource of 1-3 years of experience resources with good communication, deep knowledge on ML/AI/DL, Hands-on , the salary level will be around 6L - 12L. [Hiring] Machine learning job: Senior Software Development Engineer - Amazon Music Machine Learning at Amazon (Berlin, Germany) Amazon Music reimagines music listening by enabling customers to unlock millions of songs and thousands of curated playlists and stations with their voice. The Amazon Scholars program has broadened opportunities for academics to join Amazon in a flexible capacity, in particular part-time arrangements and sabbaticals. 6 lakhs, while Payscale's national average is INR 7 lakhs per annum. Before using this tutorial, you should be familiar with using the AWS Glue console to add crawlers and jobs and edit scripts. Amazon Machine Learning offers several machine learning models you can use with data stored in S3, Redshift or R3, but you can't export the models, and the training set size is rather limited. Recommended blog: Introduction to XGBoost Algorithm for Classification and Regression Limitations of Classification Model. Amazon Web Services (AWS) hiring Machine Learning Engineer. SLAC National Accelerator Laboratory 4. PASSED: AWS Certified Machine Learning - Specialty. In the search box, enter a parameter and choose a parameter type, for example TrainingJobName. So, this took me to end of week 2. Data Science and Machine Learning (ML) Platforms Reviews. Amazon A2I brings human review to all developers, removing the undifferentiated heavy lifting associated with building human review systems or managing large numbers of human reviewers whether it runs on AWS or not. Machine Learning Engineer Salary. Now that you have a fair idea of what APIs are, let's see how you can wrap a machine learning model (developed in Python) into an API in Python. Asos Asos Location: London, England How it's using machine learning: Asos is an online fashion outlet with a vast collection of clothing items — about 85,000 at any given time. According to the reviews, most of the companies provide services in the range of either $25 - $49 per hour or $50 - $99 per hour. 9 Applications of Machine Learning from Day. The AWS Step Functions Data Science Software Development Kit (SDK) is an open-source library that. Machine learning is the step towards a digitized future. Predicting the Future, Amazon Forecast Reaches General. Amazon plans on hiring 25,000 workers for each of its new mega-offices (collectively dubbed "HQ2") in New York City and Virginia. js, Amazon Machine Learning , Machine Learning Playground, Machine Learnings, 250 Machine Learning Conferences of 2018, mlblocks, LostTech. • Analyses feedback submitted by customers and identifying the root cause of failure. 2022 Machine Learning Engineer Salary in Boston (Updated. are being employed in the finance industry. Machine Learning in Finance. 8 Lakhs per year based on 5 salaries. Average Amazon Machine Learning Scientist - Big Data/NLP salary in India is ₹ 26. I've googled salaries for Machine Learning Engineer, and they're honestly not much different from salaries for regular Software Engineers. For instance, Amazon web services which is Amazon’s own machine learning platform, sits on 16 billion dollars worth unrecognised revenue, according to a leading financial daily. Exam AWS Certified Machine Learning - Specialty topic 1 question 30 discussion. Discover common errors and inconsistencies in your data through guardrails, and better understand recommended actions and apply them automatically. Colan Infotech is a machine learning development company, affords dignity solutions, drives growth, and efficiency with advanced Machine Learning Solutions for enterprises. Machine Learning is a technology that is focused on machines independently learning from the data without much human intervention or explicit programming. The average Machine Learning Engineer salary in Washington, DC is $136,363 as of February 25, 2022, but the salary range typically falls between $123,422 and $151,356. How Amazon Automated Work and Put Its People to Better Use. Read on to learn more about the skills needed to become an ML engineer. Total number of tech users on Built In Boston. For numeric values, use operators such as is equals to, lesser than, or or greater than. 00 per annum + + Bonus/benefits ; MARS · Competitive Salary + Benefits ; Rise Technical Recruitment . Machine learning (ML) has been strategic to Amazon from the early years. Amazon: Machine Learning Engineer. The percentage of missing values is less than 5% for the full data frame. Amazon unveils dozens of machine learning tools. Discover top 9 alternatives to Papers with Code on Product Hunt. What is the salary range for the Machine Learning. With 100% Latest Amazon Exam Dumps Questions you don't need to waste hundreds of hours learning. Building large scale, highly available and low latency machine learning (deep learning) inference system. Round 1 — This round tested the breadth of Machine Learning/Statistics knowledge with several quick definition/quiz type questions just like the Phone Screen Round 1 for 30 minutes. How AI and machine learning are helping to tackle COVID. Some new hires abandoned jobs before they even began, according to former recruiters. Luckily, we can extend many practices from disciplines that came before ML. Amazon Machine Learning Challenge. Explore machine learning methods for clinical and healthcare applications and how emerging trends will shape healthcare policy and personalized medicine. For example, Linear learner is an algorithm that provides a supervised method for regression and classification. COM INC range from $147,430 to $199,180 with the average base salary of . The way I prepared for this was by reading about all the techniques/algorithms that I had used/mentioned in my Resume. Machine Learning and Computer Vision Engineer. Learning the skills and practicing the concepts helps pave the way to success. The Machine Learning Engineer at Amazon works with massive amounts of data to build Machine Learning (ML)and Deep Learning (DL) Models for various clients. Zillow uses it to estimate house prices. Research and develop machine learning models for training resources. Amazon Certification Exam Practice Test Questions.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656103821173.44/warc/CC-MAIN-20220630122857-20220630152857-00423.warc.gz
|
CC-MAIN-2022-27
| 12,942
| 1
|
https://zfoh.ch/
|
code
|
The HaskellerZ meetup group has been around since 2011. After organising many meetups and events, in particular ZuriHac, which attracts people from all over the world, there was a need to formalise our group a bit more.
In the short term, this allows us to work together better with sponsors for ZuriHac. In the long term, however, we would like to guarantee the long-time success of a Zurich-based Haskell interest group, not dependent on one or two key volunteers.
The rules are set up so that we encourage non-monetary contributions (e.g. giving a talk). Of course, membership is optional and not required to attend any of our events.
For members, we ask a yearly contribution of either:
Occasionally, we reach out to our members with volunteering opportunities. Also, once a year we would send you an email to confirm and update the membership.
Thursday 29 October, 19:00
I spent the last few weeks using the soon-to-be released LinearTypes GHC extension in anger and I would like to share my experience with it. I am going to talk about why I am excited to see it in the wild, what it looks like, but also the annoying parts and limitations.
There are already many talks and articles on this extension ; so my aim for this one will be to focus more on the learning experience, ergonomics, and give you a feel of what it looks like and have a discussion after that.
This will be an online event. We will be using Zoom for video conference and Slack for chat. The video will be recorded and uploaded to YouTube after the event.
Please join the ZuriHac Slack workspace using the following link and then join the #meetup channel. https://join.slack.com/t/zurihac/shared_invite/zt-ihhh18a9-FKo~zAPdf6_IEdqfbHkNuA
Please join the video conference using the following link.
Our main yearly event is the organisation of ZuriHac, a yearly Haskell Hackathon that attracts over 300 attendees. It is probably one of the oldest and definitely the largest Haskell Hackathon currently in existence.
The first ZuriHac was organised in 2010 at the Zürich Google office by Johan Tibell and Christophe Poucet. Currently, we are organising it at the Hochschule für Technik Rapperswil with the help of many Zürich Friends of Haskell members and volunteers.
We try to record all of our meetups and keynotes so Friends of Haskell who are not in the Zürich area can enjoy the content as well.
This playlist contains all our Haskell-related videos.
We have also collected the slides of the presentations in this repository. Unfortunately, the collection is currently incomplete.
Current board members of the Zürich Friends of Haskell association:
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-50/segments/1606141745780.85/warc/CC-MAIN-20201204223450-20201205013450-00321.warc.gz
|
CC-MAIN-2020-50
| 2,631
| 17
|
https://www.quest.com/community/dams/f/forum/31742/replacing-desktop-authority-usb-lockdown
|
code
|
Desktop Authority has just been unusable for the better part of a year for us, we've got developers looking into the issues but its just taking to long to fix.
The only part of DA we currently use anyway is the usb port security it works well as we can white list a bunch of devices such as dictaphones and also unlock the software with a password whenever it is needed which is essential to our business needs. speed test
Is there anything lightweight out there that can do just this? I've been looking and found a few things but a lot of stuff seems to be part showbox of some bigger management system which we don't need, we just want a simple usb lockdown solution with a way to disable it on the fly.
Thanks! usps tracking
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-31/segments/1627046153531.10/warc/CC-MAIN-20210728060744-20210728090744-00193.warc.gz
|
CC-MAIN-2021-31
| 727
| 4
|