url
stringlengths
13
4.35k
tag
stringclasses
1 value
text
stringlengths
109
628k
file_path
stringlengths
109
155
dump
stringclasses
96 values
file_size_in_byte
int64
112
630k
line_count
int64
1
3.76k
https://svgideas.netlify.app/svg-cleaner-online.html
code
Svg Cleaner Online. Online raster to vector converter. SVG Cleaner is an open source batch tunable crossplatform SVG cleaning program. Because of how Scalable Vector Graphics SVGs are defined they can be rewritten without affecting the resulting image. Dont worry about security. Cleaning SvgMaid Services svgCleaningbundle svgClean Up set Bucketcleaning woman svgLady Maids SVGClean equipment svgMaid Service png DigitalPixelstore 5 out of 5 stars 400 Sale Price 139 139 185 Original Price 185 25 off. This tool removes such superfluous information thereby reducing the size of your SVG files. It doesnt do anything else. Just drop your svg files on the page and you can convert it to more than 250 different file formats without registration giving an email or watermark. When the status change to Done click the Download SVG button. Convert your images jpeg jpg or png into scalable and clear vector art svgepsdxf.
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323585231.62/warc/CC-MAIN-20211019012407-20211019042407-00161.warc.gz
CC-MAIN-2021-43
917
4
https://www.maxstblog.com/post/what-is-ar
code
The smartphone and tablet PC craze that has swept the world since several years ago is changing not only the consumption tendency but also the lifestyle patterns. As such, these days IT devices have a very close relationship with our daily lives. That is because anyone can easily use the new technology that can only be seen in movies. One of the representative new technologies is “Augmented Reality”. However, many people confuse Virtual Reality (VR) with augmented reality. Virtual reality uses a virtual image that is both the self (object) and the background/environment is not real, whereas augmented reality (AR) is a technology that superimposes a 3D virtual image on a real image or background to display a single image. Augmented reality is also referred to as Mixed Reality (MR), and augmented reality was introduced to the world for the first time around 1990 when Boeing, an airplane manufacturer, added virtual images to the airplane assembly process. Augmented reality is a very complex and difficult image technology internally, but basically it works in the following principle and order. There are several things necessary to apply augmented reality technology, a GPS device that transmits and receives geographic/location information, a gravity (tilt + electronic compass) sensor (or gyroscope sensor), and a location information system that stores detailed information according to this information (Internet connection required), an augmented reality application that receives detailed information and displays it on a real background, and finally an IT device (smartphone, tablet PC) that will output it to the display. First, when the user (after running the augmented reality application) illuminates a specific street or building with a built-in camera (cam) such as a smartphone, the current location's latitude/longitude information, tilt/gravity information, etc. are temporarily recorded on the smartphone through the GPS receiver. Then, this GPS information is transmitted to a specific location information system over the Internet. This is because it is practically impossible to store all detailed information of an area or building within the radius of the location on a smartphone. Upon receiving GPS information such as location/tilt from the user, the location information system searches for detailed information of a corresponding area or object in its own database and transmits the result back to the smartphone. It contains, of course, the name of the specific building and phone number. The smartphone that receives this data is matched with the current map information through an augmented reality application and then displayed on a real-time screen. Since the above data transmission/reception step is continuously maintained and performed, detailed information on the area and surroundings is sequentially displayed on the screen when passing the distance with the smartphone. Google Glass has received the most attention as a device using augmented reality technology. These smart glasses, which were developed and released by Google on a trial basis, are worn on the eyes like regular glasses, and Google Android operating system is built-in like a smartphone, so you can search the Internet, take photos, get directions, and use SNS through glasses. Google Glass basically operates with voice commands, and it is mounted on a prism for screen output on one lens, so a virtual screen about 25 inches in size appears in front of the user's eyes. Meanwhile, blind spots caused by augmented reality technology cannot be excluded. It is certain to make everyday life convenient and enriching, but there may be situations where you are completely enchanted by the virtual world and cannot distinguish between reality and virtual. It's similar to the case where you can't lead a normal life because you fall into computer online games. In addition, since the augmented reality technology so far has been concentrated on advertising-type and publicity-type content, there is concern that it will only focus on single-shot attention in the future. #MAXST_AR #MAXST #AR #AugmentedReality #B2B_AR #B2C_AR #AR_technology #AR_platform #AR_SDK #immersive_experience #realistic_content #AR_future #AR_content #CAD #BIM #VR #VirtualReality #3d_AR #MR #MixedReality #AR_history #gps #AR_smartphone #map_information #AR_application #real_time #Google_Glass #smart_glasses #AR_glasses #virtual_screen
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947476399.55/warc/CC-MAIN-20240303210414-20240304000414-00590.warc.gz
CC-MAIN-2024-10
4,436
8
https://www.gameinformer.com/b/news/archive/2017/03/01/microsoft-reveals-new-xbox-live-creators-program.aspx
code
Microsoft Reveals New Xbox Live Creators Program At this year's Game Developers Conference, Microsoft announced the Xbox Live Creators Program, which should make it easier to get a game published on the Xbox One or Windows 10 marketplace. The key differentiator between this new program and the team's current ID@Xbox program (which lets developers self-publish on the platforms) is a lower barrier to entry: Anyone with an Xbox One can use that console in conjunction with a number of compatible game engines (including Construct 2, MonoGame, and Unity) to develop a game for it and the Windows 10 store, complete with full Xbox Live integration. The games will have their own section in both stores. Microsoft will not have to provide concept approval of the game in order for it to go up on the store. A chart on the program's official page shows off the differences between a Creators game and an ID@Xbox game: Creators games won't have a "Rich Presence" on the storefront, multiplayer support, or achievements. Anyone interested in developing games through the Creators program can start here. Additionally, Creators program participants can enroll in the ID@Xbox program even after their game releases, allowing them to scale features after a game's initial launch. With Microsoft building this program and Valve replacing Greenlight with Steam Direct, more platforms and moving towards less curated, more open platforms. I have to wonder if Sony and Nintendo will soon move towards more open platforms as well.
s3://commoncrawl/crawl-data/CC-MAIN-2021-10/segments/1614178370752.61/warc/CC-MAIN-20210305091526-20210305121526-00402.warc.gz
CC-MAIN-2021-10
1,517
5
https://www.alsc.ala.org/blog/2019/12/alsc-needs-your-input-on-core-competencies/
code
In 1989, the ALSC Education Committee drafted the Core Competencies for Librarians Serving Children in Public Libraries. Since then, these competencies have served as a tool to guide librarians serving children by providing excellent library services. As an ongoing commitment, the Education Committee has reviewed the competencies periodically to ensure that the resource continues to adequately represent the skills necessary to continue this high level of service. The Education Committee is currently working on of these scheduled reviews and we need your input! Please consider responding to our initial survey to give us your feedback on any part of the existing competencies; we welcome input on individual sections or on the entire document. The survey can be accessed at https://www.surveymonkey.com/r/JFC5HQF through December 20th. Our committee believes that user feedback is critical to ensuring that the competencies are serving librarians in providing high-quality library services to children. We appreciate your time and your expertise. Amanda Yother/ALSC Education Committee co-chair
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370529375.49/warc/CC-MAIN-20200405053120-20200405083120-00182.warc.gz
CC-MAIN-2020-16
1,100
4
https://help.adobe.com/en_US/livecycle/11.0/DesignerHelp/WS92d06802c76abadb-728f46ac129b395660c-7cfc.2.html
code
Cell properties in the Value tab When you select a cell that is set to an object type to which Value options apply (such as text field and numeric field objects), the Value tab in the Object palette displays several options. The options presented on the Value tab depend on the type of cell that is selected. For example, if you select a Text Field cell, the Value tab shows the options for a Text Field object. The options that appear in the Value tab are the same as the options that are available from the Value tab if you add the object directly to the form.
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947473824.13/warc/CC-MAIN-20240222161802-20240222191802-00746.warc.gz
CC-MAIN-2024-10
562
11
http://forum.freeipodguide.com/32/t-38034.html
code
Using a Mac A quick answer would be appreciated...If my ref uses a Mac to complete the whole process will I get credit as usual? I'm not entirely sure but it depends on what browser you use to do the offers on. Some people use Macs, some people use Windows, some use Safari some use Firefox some use I.E and some use ones I've never heard of. I've been told by various people that they use Firefox without any problems whatsoever, so if you're using Firefox on a Mac you should be fine. Don't take my word for it though. I run all my offers on Safari, you should be okay. So far nearly no crediting issues. Some offers aren't compatible with a mac (i.e. AOL) but other than that I've never had any problems, and I use Safari. Yea I work on a mac most of the time, but when completing offer I always do it from Windows Internet Explorer (computer in same network), I just don't want to spend the time to have to get manual credit....especially if its a browser/OS issue... It was a friend of mine. I have no idea what browser he used, but I got credit in less than a day. D I sometimes use a mac with firefox...way better than safari, and no problems with crediting Another friend tried to do True with a Mac and it still hasn't credited. I think that might be part of the problem...
s3://commoncrawl/crawl-data/CC-MAIN-2019-13/segments/1552912202299.16/warc/CC-MAIN-20190320044358-20190320070358-00528.warc.gz
CC-MAIN-2019-13
1,282
11
https://goblincoding.com/page/3/
code
I recently ran into a problem where I needed to build a Qt application that depended on a library that made use of MFC. I started by building the Qt side (GUI, etc) with QtCreator and then proceeded to import the .pro file into VS2008 using the standard VS Qt plugin before adding the mentioned native … Continue reading Qt Application, VS2008 and “requires MFC shared dll version” This here is a simple sample of what my Qt Creator Zen Burn theme looks like and is not so much a write-up as it is a redirect since all the reading you might need to do is already available from the download link: Enjoy! The fun is over, you've written your Qt 5.x application, compiled it for Ubuntu and it is time to deploy your software to a vanilla box (a PC without any Qt libraries on it), how do you go about it? I spent quite some time struggling with this problem so now that I have finally … Continue reading Deploying Qt 5 Applications on Ubuntu 12.04 Some time ago I decided to take a few of the C++11 features for a spin on Ubuntu 12.04, but the default Clang version for this distro (3.06) wasn't good enough so I decided to build from source. I ended up following these instructions to the letter and it was a walk in the park...until I … Continue reading Very Slow Clang Build Times I've been playing around with capturing screencasts on Ubuntu 12.04 and since I found the process slightly more complicated than expected, I thought I would document it here for future reference. The procedure I followed was to start by downloading and installing the following software: recordmydesktop Arista Transcoder OpenShot Video Editor There are numerous forums … Continue reading Screencasts on Ubuntu
s3://commoncrawl/crawl-data/CC-MAIN-2019-35/segments/1566027315750.62/warc/CC-MAIN-20190821022901-20190821044901-00449.warc.gz
CC-MAIN-2019-35
1,704
5
https://careers.tradebay.co/jobs/1119548-front-end-developer-react-tailwind-typescript
code
TradeBay is a start-up challenging a multi-billion dollar, old-fashioned, and overlooked industry - we are about to revolutionize the way one trades fruit! By creating an online B2B marketplace for large-scale fruit trading, we empower the farmers to finally get better paid for their produce and reduce food waste as a bonus. Our current stack We have two parts of TradeBay right now: a public-facing website and an invite-only marketplace web app. - All code is written in TypeScript both on the frontend & backend - React & Apollo Client - GraphQL using Hasura & Postgres - CSS with Tailwind (and some SCSS) - Testing with Cypress & Jest - Continuous integration & delivery with GitHub + GitHub Actions What we offer - Competitive salary - Training budget - Wellness allowance - Office space in central Stockholm (but we're open to remote candidates too!) - Anything else that you think we should offer? We're a new company and we love input from our team! We care more about what you can do than how long you’ve been working, so please don't hesitate to apply even if you don't tick all the boxes & send us a message with some projects you are proud of! - Pragmatic attitude & result oriented - Strong skills in React & CSS - Experience in web development (probably > 3 years) - Experience in statically typed languages - Strong programming skills - An eye for design - Attention to detail - Excellent English communication skills - Proven record of shipping features - Organized and self-sufficient - Happy to work with TypeScript, React & GraphQL.
s3://commoncrawl/crawl-data/CC-MAIN-2021-21/segments/1620243988758.74/warc/CC-MAIN-20210506144716-20210506174716-00338.warc.gz
CC-MAIN-2021-21
1,555
27
https://www.dell.com/community/XPS-Desktops/vidieo-card/td-p/8315367
code
have nvidia gtx 1050 ti installed now whats the biggest card i can upgrade too You can measure the space. Just pop the cover and measure. @bonaiuto I don't think you provided enough information for someone to answer your question. What model XPS do you have, what is the rating of your power supply, etc.? if you had XPS 8930, top Dell oem card above 1050ti include
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296945315.31/warc/CC-MAIN-20230325033306-20230325063306-00633.warc.gz
CC-MAIN-2023-14
365
4
https://info.microsoft.com/WE-AzureApp-CATALOG-FY21-04Apr-27-AzureKubernetesSummitShipfasteroperatewitheaseandscaleconfidently-SRDEM72734_CatalogDisplayPage.html?wt.mc_id=AID3032087_QSG_EML_529321
code
Azure Kubernetes Summit: Day 1 The sessions we created for the first day of the Summit are to ensure we all start with the basis during an AKS-101 session. During the first session Roy de Milde will cover the basic of Kubernetes and our managed Kubernetes service, AKS. You will learn how Kubernetes works, why AKS is a good idea, and you will learn some tips and tricks for your first deployment. We will even show a live deployment of AKS through the portal experience and look at the Azure CLI you can use. All in all, a great session to get started with Kubernetes and Azure. After this session we will drill down into our hybrid vision. We will cover our Hybrid strategy and dive into the use-cases, stories, options, and different service that we are having. How can our services make you successful in your hybrid strategy? We will focus on Kubernetes management in a hybrid world but also talk a bit about virtual machines and running data services in your platform. The last session of day 1 will be about the best practices we are seeing. We will discuss a couple of best practices that we are seeing around the world. We will talk on a high-level about the various topics.
s3://commoncrawl/crawl-data/CC-MAIN-2021-25/segments/1623487616657.20/warc/CC-MAIN-20210615022806-20210615052806-00497.warc.gz
CC-MAIN-2021-25
1,183
3
https://lemaro.nl/microsoft-security-essentials-for-windows/
code
Your house Pc is given real-time safeguard from viruses, malware, and other harmful programs thanks to Microsoft Security Essentials. You can be sure that your Pc is protected by the most recent solutions by downloading Microsoft Security Essentials for independent from Microsoft. It is quick to use, simple to use, and usually up to date. If your computer is secure, you can tell right away because you’re’re in good shape. It’s’s really that easy. You can use your Windows-based Computer however you like without breaks or protracted notebook worry years thanks to Microsoft Security Essentials, which operates peacefully and effectively in the background. - Panels 4.10.0209.0 of Windows Confidentiality Elements - Measurements of a document: - 12.3 Mebibyte - Windows Vista, - Windows 7. - Languages that are spoken: - most recent change: - 10th of October 2023, Thursday - Microsoft’s’s Corporation
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224646144.69/warc/CC-MAIN-20230530194919-20230530224919-00359.warc.gz
CC-MAIN-2023-23
916
12
https://github.com/jopasserat
code
Create your own GitHub profile Sign up for your own profile on GitHub, the best place to host code, manage projects, and build software alongside 28 million developers. Workflow engine for exploration of simulation models using high throughput computing Scala library for accessing various file, batch systems, job schedulers and grid middlewares. chroot, mount --bind, and binfmt_misc without privilege/setup fRReE (free Research Report Enlightenment) is a LaTeX class to quickly change the style of research papers written in LaTeX and make them available freely on the Internet. A Scala SDK for the iExec decentralised computing platform 249 contributions in the last year in private repositories Press h to open a hovercard with more details.
s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267157203.39/warc/CC-MAIN-20180921131727-20180921152127-00367.warc.gz
CC-MAIN-2018-39
746
10
https://www.geoplanit.co.uk/?p=105
code
Well that was interesting! Today I was contacted via email by someone working in the UK in a similar related industry who had an HP DeskJet 500 printer at their office and had just solved the problem of getting it to work with Windows 7 (64bit). They ‘googled’ the solution to see if others had done the same and this post came up on my site: “HP DesignJet 500 and Windows 7: Yes it does work even without the HPGL2 card!” Trouble was GeoPlanIT seemed to get his browser (Firefox 3.6) in a refresh loop and didn’t display the post correctly! It seems it was at this point he did some detective work (not that difficult to find me) and emailed me at work and let me know. It turns out that a module on my blog to do with Amazon Associates was causing the problem. So I have disabled this module (don’t worry you aren’t missing anything!). Please accept my apologies to all those who might have experienced this outage (drop me a line if it happens again). Anyway upon receiving the email I saw that he was in the UK (very important to have an email signature), and since it was Friday (and therefore a bit quiet) I decided to give him a call. We then had a very nice brief chat and not just about printers and blogs…. I’m sure he wasn’t expecting a call or then for me to write this blog post, but hey life is full of surprises! Anyway you know who you are so thank you for telling me about my blog issues, and I hope some of my other posts prove useful to you. I guess the serious point of this post is to highlight the fact that sharing your experiences via a blog (or via any media) can help others and hopefully save us all from ‘reinventing the wheel’. Most of my walkthroughs and blog posts stem from researching the internet and piecing together useful information. I always try to acknowledge where I got it from and hopefully add to it. If when reading one of my posts you have ideas or further suggestions please post a comment, and I will include the new information within my post (plus acknowledgement of course!). That is all, now have a good weekend…..
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100674.56/warc/CC-MAIN-20231207121942-20231207151942-00237.warc.gz
CC-MAIN-2023-50
2,092
9
https://meta.stackexchange.com/questions/121924/what-to-do-if-a-more-accurate-solution-is-answered-on-an-already-accepted-questi
code
Is it possible to change the chosen answer? One of my question which is answered and also accepted, but after some day I got a more accurate answer. So I want to accept his answer and undo the previous acceptance. can I do this? Or. I have to satisfy the more accurate answer only with a upvote. If I can switch my accepted answer, then what happens to the 15 reputations given to the previous accepted answer? Will that reputations remains as it is or that will be deducted? If the answer is "Yes the reputations will be deducted", then why, what is the mistake of that answer?
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100873.6/warc/CC-MAIN-20231209071722-20231209101722-00645.warc.gz
CC-MAIN-2023-50
578
5
http://www.phonetik.uni-muenchen.de/Bas/BasKorporaeng.html
code
Gleiche Seite in deutsch This page was last updated 2016-09-22 Please note that selected corpora may be downloaded for free by academic users from the CLARIN Repository (partly marked with a (*) in the following). (If not stated otherwise, the language of the corpora is German.) Presently the following corpora are available on CD-R/DVD-R/Harddisc. Note that a subset of these corpora is also online accessible for university members and licensees of BAS resources in the BAS CLARIN Repository (tagged with (*) in the following list). The TED corpus is currently distributed by ELDA. Therefore BAS will only disseminate further copies of the corpus, if this first edition is run out. For further questions or orders please contact In a second step the signals are analysed in more detail. An automatic segmentation in phonemes and words is carried out (MAUS), deviations from the canonical word form are detected and other features extracted. All results from further analysis are stored in the BAS Partitur Format (BPF). In a sub-project of the German BITS project (TP8) all currently available BAS corpora are re-validated against public guidelines. The results of this re-validation will be published on the BITS webserver. Within the CLAIN initiative these guidelines for validation must be followed before publication within the BAS CLARIN repository. File Formats and Software Most of the disseminated speech corpora of BAS contain signal files in NIST SPHERE formats. Some corpora contain SAM or PhonDat A description of the formats used in BAS corpora can be found here. Of course all formats are described in detail in the accompanying corpus documentation on CDROM (you can access most of these on-line by looking up the WWW page of the corpus). Last but not least on each BAS CDROM you will find a small collection of software and ANSI C functions for the access to the signal files. Furthermore you will find tools to transform the PhonDat format into NIST/SPHERE format, SAM format or raw soundfiles.
s3://commoncrawl/crawl-data/CC-MAIN-2018-26/segments/1529267864957.2/warc/CC-MAIN-20180623093631-20180623113631-00056.warc.gz
CC-MAIN-2018-26
2,014
23
https://man.uex.se/1/kyua-report-junit
code
KYUA-REPORT-JUNIT(1) General Commands Manual KYUA-REPORT-JUNIT(1) kyua report-junit — Generates a JUnit report with the results of a test suite run kyua report-junit [−-output path] [−-results-file file] The kyua report-junit command provides a simple mechanism to generate JUnit reports of the execution of a test suite. The command processes a results file and then generates a single XML file that complies with the JUnit XSchema. The JUnit output is static and self-contained, so it can easily be plugged into any continuous integration system, like Jenkins. The following subcommand options are recognized: Specifies the file into which to store the JUnit report. −-results-file path, −s path Specifies the results file to operate on. Defaults to ‘LATEST’, which causes kyua report-junit to automatically load the latest results file from the current test suite. The following values are accepted: Requests the load of the latest results file available for the test suite rooted at the current directory. Requests the load of the latest results file available for the test suite rooted at the given directory. Test suite name Requests the load of the latest results file available for the given test suite. Requests the load of a specific results file. Explicit file name (aka everything else) Load the specified results file. See “Results files” for more details. Because of limitations in the JUnit XML schema, not all the data collected by Kyua can be properly represented in JUnit reports. However, because test data are extremely useful for debugging purposes, the kyua report-junit command shovels these data into the JUnit output. In particular: The test case metadata values are prepended to the test case’s standard error output. Test cases that report expected failures as their results are recorded as passed. The fact that they failed as expected is recorded in the test case’s standard error output along with the corresponding reason. Results files contain, as their name implies, the results of the execution of a test suite. Each test suite executed by kyua-test(1) generates a new results file, and such results files can be loaded later on by inspection commands such as kyua-report(1) to analyze their contents. Results files support identifier-based lookups and also path name lookups. The differences between the two are described below. The default naming scheme for the results files provides simple support for identifier-based lookups and historical recording of test suite runs. Each results file is given an identifier derived from the test suite that generated it and the time the test suite was run. Kyua can later look up results files by these fileds. The identifier follows this pattern: where ‘test_suite’ is the path to the root of the test suite that was run with all slashes replaced by underscores and ‘YYYYMMDD-HHMMSS-uuuuuu’ is a timestamp with microsecond resolution. When using the default naming scheme, results files are stored in the ˜/.kyua/store/ subdirectory and each file holds a name of the form: Results files are simple SQLite databases with the schema described in the /usr/share/kyua/store/schema_v?.sql files. For details on the schema, please refer to the heavily commented SQL file. The kyua report-junit command always returns 0. Additional exit codes may be returned as described in kyua(1). Workflow with results files Let’s say you run the following command twice in a row: kyua test -k /usr/tests/Kyuafile The two executions will generate two files with names like these: Taking advantage of the default naming scheme, the following commands would all generate a report for the results of the latest execution of the test suite: && kyua report-junit cd /usr/tests && kyua report-junit --results-file=LATEST kyua report-junit --results-file=/usr/tests kyua report-junit --results-file=usr_tests kyua report-junit --results-file=usr_tests.20140731-151730-997451 But it is also possible to explicitly load data for older runs or from explicitly-named files: kyua report-junit \ kyua(1), kyua-report(1), kyua-report-html(1) GNU October 13, 2014 KYUA-REPORT-JUNIT(1)
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296818072.58/warc/CC-MAIN-20240422020223-20240422050223-00727.warc.gz
CC-MAIN-2024-18
4,160
43
https://forum.arduino.cc/t/autonmous-robot-gps-compass/18319
code
Hi I want to interface a gps and compass to arduino for autonmous mobile robot, anybody help me how we calculate the heading angle and the distance? You can't calculate the distance. The heading angle is simply the angle you measure as north. what i mean i want to move form point to other point (predetermined) so im using the gps for get the conrdination for calculate the distance and the compass for the heading angle, for that i need help for the code... Here's a link to the formulas you will need and some useful hints on implementation.
s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320301720.45/warc/CC-MAIN-20220120035934-20220120065934-00428.warc.gz
CC-MAIN-2022-05
544
4
http://www.scsitaly.com/mobile/hpc.html
code
The use of HPC resources can reduce of two orders of magnitude the computations time, allowing to get more accurate results and more rapid product development time. According IDC, 95% of companies that adopted HPC increases its usage. We provide a HPC cloud service in a Platform-as-a-Service fashion. Our systems are managed via a web portal from which it is possible to access to the page to: manage the resources, launch one or more simulations, upload inputs files and access the results. Moreover, with a service of remote visualisation it is possible to verify the results directly on our server without having to wait for their download.
s3://commoncrawl/crawl-data/CC-MAIN-2017-47/segments/1510934806939.98/warc/CC-MAIN-20171123195711-20171123215711-00727.warc.gz
CC-MAIN-2017-47
644
2
https://www.freshersworld.com/jobs/cloud-platform-support-engineer-jobs-in-chennai-abbio-corporprate-solutions-india-pvt-ltd-908060
code
Need a Institute/Coaching Class? IT Courses / Govt Exam Preparation Higher Studies / Studies Abroad Cloud Platform Support Engineer · Work in 24x7 rotational shifts · Troubleshoot customer issues for client customized cloud platform tools. · Troubleshoot issues related to CI/CD jobs · Debug and troubleshoot issues related to Linux, storage and network management, dependency management, logging, load balancing · Work with engineers to analyze the logs, reproduce customer issues and develop strategies to permanently customer issues · Be the SME and provide after-hours support as needed for emergency or urgent situations · On-call support on a rotation basis · Working within Kanban or Lean methodologies · Bachelor's or Master’s Degree in Computer Science · 5+ years of cloud infrastructure experience · Industry experience in Cloud Technologies and Stacks (IaaS/PaaS) – Azure/GCP · Experience supporting large scale, highly available, production Windows and Linux environment. Desired Qualification and Experience · Experience in implementing and managing the Kubernetes cluster is preferred. Strong background in container technologies such as Kubernetes, Dockers, VMWare. · Cognizant of CI/CD tools and frameworks (Jenkins, Maven, NPM, Nuget, Nexus, Github, Ansible etc.) · Experience with Windows or Linux Server deployment and Administrations · Knowledge on Dashboarding, monitoring, alerting and automation of alert resolution. · Possess practical Linux systems administration skills in a Cloud or Virtualized environment. Abbio Corporate Services India Pvt ltd is a growing HR Service company focusing on Recruitment, Payroll Management, Staffing, Compliance Management, Accounting & Corporate Event Management. We have presence at Bangalore, Chennai, Hyderabad, Mumbai & Ahmedabad. Abbio started out in the year 2014, Our operations and services are guided by professionalism and principles that stem from our core values and business ethics: integrity, trust, continuous learning and partnering progress. Our goal is to build enduring long-term relationships with our clients by partnering with them for mutual growth and benefit. Abbio is committed to a sustainable win-win relationship, built on integrity and trust with its corporate partners; by identifying and providing exemplary human resource services, thereby facilitating them to achieve and exceed their corporate goals Fully solved online mock placement papers with latest test pattern,count down timer,detail test analysis with answer and explanation is available at Power Placement Preparation:P3. Start your preparation now with P3 and increase your success probabiltiy.
s3://commoncrawl/crawl-data/CC-MAIN-2021-49/segments/1637964363337.27/warc/CC-MAIN-20211207075308-20211207105308-00566.warc.gz
CC-MAIN-2021-49
2,671
26
https://www.visualmusicdesign.com/forum/technical-support/up-to-15-gb-ram
code
I have a "small" problem with SeeMusic. The RAM consumption increases every second up to 15 GB. I have disabled all effects and in the media settings all files are disabled. So SeeMusic has NOTHING to do actively. My system has crashed several times and I have had to disable the program via Task Manager or restart the computer. Where does this enormous consumption come from?
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335609.53/warc/CC-MAIN-20221001101652-20221001131652-00727.warc.gz
CC-MAIN-2022-40
377
6
https://gitlab.com/Remmina/Remmina/-/issues/1049
code
When "Server" GtkComboBox is selected, TAB key doesn't work Created by: ppsshh Unable to switch to the next input field using keyboard TAB button if "Server" ComboBox is focused/selected (in "New Connection" and "Edit Connection" windows) Bug introduced in b54ea4af by the line gtk_widget_set_can_focus (widget, TRUE); When compiled without that line, everything works as expected.
s3://commoncrawl/crawl-data/CC-MAIN-2020-45/segments/1603107882581.13/warc/CC-MAIN-20201024110118-20201024140118-00682.warc.gz
CC-MAIN-2020-45
381
6
https://sharepoint.stackexchange.com/questions/98679/web-services-in-sharepoint
code
I want to host a web service in sharepoint 2013 to upload xml documents and then consume it. I know how to do it in a pure .Net web app, how can I host it in Sharepoint 2013? maybe is only a sharepoint 2013 app? You can deploy you web service in Sharepoint under "_vti_bin" folder. The following article help you in deploying your service in sharepoint:
s3://commoncrawl/crawl-data/CC-MAIN-2021-31/segments/1627046154805.72/warc/CC-MAIN-20210804111738-20210804141738-00233.warc.gz
CC-MAIN-2021-31
353
3
http://www.engblaze.com/2011/10/
code
Ah yes… the wonderful and oft-misunderstood world of microcontroller interrupts. Are you looking to build a project that relies on very precise timing or needs to react quickly to an input? Then don’t change that channel, my friend. In this tutorial we’ll cover what interrupts are, what they do, and how to use them. Oleg has written up a project detailing how to get your Arduino talking to an inexpensive USB cell modem (~$25 from DealExtreme, among other retailers). It’s based on a BenQ M23 GSM/GPRS wireless module and uses a standard AT command set. This is the cheapest we’ve seen for a plug-and-play cellular solution, so it’s definitely a good resource. His site walks you through the setup process and provides example code plus a complete library, so if you’re looking to do something similar, check it out. Have a power hungry Arduino and looking for a dead simple solution? Fear not, hardware hacker. The community has come to your aid. There are several libraries available that abstract all of the gritty AVR commands needed to make your Arduino drowsy. The Arduino is sleeping... the cat joined it. The SIMCom SIM900 GSM module isn’t very well documented (in English, at least), but it is dirt cheap. If you fancy putting cellular communications in your Arduino project, there are a few intrepid pioneers that have paved the way. Seeedstudio sells a GSM/GPRS shield utilizing the SIM900, and have a well-developed wiki page with getting started tips, a walkthrough, and plenty of sample code. If you’re looking for more of a drop-in solution, Open Electronics has a library to talk to a similar shield with the same SIM900 module. It’s unclear if that particular shield is still for sale, but the library should be adaptable to Seeedstudio’s version or others without too much work. Sleep and power saving modes are popular topics in the various AVR and Arduino communities. How do I put my device to sleep? How can I wake it up? How can I control what does or doesn’t get turned off? It took me a while to round up answers to all of these questions during my own hacking journey, so this post is an attempt to compile the basics in one place. What do I need to know before putting my precious Arduino to sleep? Putting your Arduino to sleep is not as drastic as, say, doing the same to the family pet, but there are a few things you should be aware of before you start. If you’re looking to make your Arduino talk with the outside world, you have lots of options. A cellular modem can give you the most flexibility in terms of where and how you can send messages or transfer data. Cell modems can be finicky and difficult to work with, but some are easier than others. Although the Telit GM-862 has been superseded by other modules in Telit’s GSM lineup, it’s still relatively easy to find, easy to work with, and inexpensive. Alexander Weber’s description of how to connect a GM-862 to the Arduino’s serial bus and his sample library code are largely applicable to many cell modems. Most units still utilize some form the ancient Hayes AT command set, so the commands used in Alexander’s project can be adapted elsewhere with little modification. Although it’s been around for a few years now, the Kill-a-Watt and other “outlet” power monitors have gotten a lot of press for their ability to highlight the power use of many household devices that are otherwise black boxes. However, measuring your power usage 1 appliance at a time is difficult and time consuming. Even if your energy provider isn’t thinking about smart metering yet, why not analyze the energy consumed by your whole house over time?
s3://commoncrawl/crawl-data/CC-MAIN-2019-26/segments/1560627999066.12/warc/CC-MAIN-20190619224436-20190620010436-00495.warc.gz
CC-MAIN-2019-26
3,664
14
https://techdroid.kbeanie.com/2010/09/16/expandablelistview-on-android/
code
As with any other widget on Android, you are free to customize the widgets as per your needs. Here, I will show how to create such a custom list adapter for the ExpandableListView. For this example, I want to show a list of vehicles with their names. Also, I want to group them according to their category. I have a method called getRandomVehicle(String name) which returns a random vehicle instance setting the name that I pass. The vehicle can be a Bus, Car or a Bike. Its completely random. In the ExpandableListAdapter, (the custom adapter), there’s a method called addItem(Vehicle vehicle), which manages the groups and their children. In the SampleActivity, I have initialized a blank ExpandableListAdapter and set it to the list view. Now, I start a thread, which gets a random vehicle after every 2 seconds, and adds it to the adapter, and calls the adapter to notify that the data has changed. There are a few methods, in the ExpandableListAdapter, which you should go through carefully. I have two layout files, group_layout.xml and child_layout.xml which are used as the layout for the group views and the child views of the ExpandableListView. There you go, you have a custom ExpandableListView. You can find the full source code for this example here, ready to run. There are some more methods that you might be interested in, like, how to change the “arrow icon” for the group views(official doc link), or how to expand or collapse a group at will, or how to handle specific events like group collapsed or group expanded. Read the docs on ExpandableListView.
s3://commoncrawl/crawl-data/CC-MAIN-2021-39/segments/1631780060882.17/warc/CC-MAIN-20210928184203-20210928214203-00513.warc.gz
CC-MAIN-2021-39
1,578
8
https://www.manualslib.com/manual/571269/Canon-Lbp3200.html?page=145
code
Displaying the [Document Properties] Dialog Box from the [Printers] Specifying the Printing Preferences The [Document Properties] dialog box will appear. The [Document Properties] dialog box can also be opened by right-clicking the [Canon LBP3200] icon and selecting [Printing Preferences] from the pop-up menu. From the [Start] menu, select [Settings] ➞ [Printers]. For Windows XP Professional: Click the [Start] menu ➞ [Printers and Faxes]. For Windows XP Home Edition: Click the [Start] menu ➞ [Control Panel] ➞ [Printers and Other Hardware] ➞ [Printers and Faxes]. The [Printers] folder will appear.
s3://commoncrawl/crawl-data/CC-MAIN-2019-43/segments/1570987826436.88/warc/CC-MAIN-20191022232751-20191023020251-00376.warc.gz
CC-MAIN-2019-43
613
10
https://supportforums.cisco.com/t5/application-networking/css-ftp-script/td-p/663985
code
I use a CSS to load-balance ftp server. To validate the availability of my ftp servers, I would like to write a script that logs on each ftp server and then tries to get a copy of a small file on the server (the file are not stored locally on the ftp server, so I need this to validate that the server is able to retrieve the file from my storage). Is it technically possible or not using scripts ? (the ftp script provided by Cisco only logs on the server) If yes, has anyone already done this ? How can I do this ? Topology & Design: Two ACI fabrics Stretching VLANs using OTV Both fabrics are advertising BD subnets into same routing domain Some BDs(or say VLANs) are stretched, but some are not. Endpoints can move betwee... VMware Trunk Port Group is supported from ACI version 2.1 VMM integration must be configured properly ASA device package must be uploaded to APIC ASAv version must be compatible with ACI and device package version Topology &Design:Traffic flow within same fabric:Endpoint moves to Fabric-2Bounce Entry Times OutTraffic Black-holedSummarySolutionAppendix: In the Previous articles of ACI Automation, we are using Postman/Newman a...
s3://commoncrawl/crawl-data/CC-MAIN-2018-13/segments/1521257647782.95/warc/CC-MAIN-20180322073140-20180322093140-00256.warc.gz
CC-MAIN-2018-13
1,160
15
http://roseindia.net/answers/viewqa/PHP/29029-Father-of-PHP-Scripting-Language-.html
code
Please tell me the latest version of PHP with the detail explanation of the newly added features in PHP. Also who is the father of PHP? PHP is a general purpose scripting language, which can be used to create web applications quickly. PHP can be easily embedded with the HTML and it also support the MYSQL Database. Founder of PHP Scriptin Language - Marco Tabini is the father of the PHP Scripting Language. Latest Version of PHP Scripting Language - So far, PHP 5.4.10 and PHP 5.3.20 has been released. It has fixed many bugs, which is found in the earlier version on PHP scripting language. You can find all the latest release info on PHP at "php.net" website.
s3://commoncrawl/crawl-data/CC-MAIN-2018-22/segments/1526794866201.72/warc/CC-MAIN-20180524092814-20180524112814-00191.warc.gz
CC-MAIN-2018-22
663
3
https://hn.boxpiper.com/u/m3047
code
God save the internet, and its fascist regime! Recent @m3047 Activity God save the internet, and its fascist regime! I upvoted you because you're clearly a fanatic in this space. (Hello!) However, I disagree. Viktor punches above his weight (we've gone a couple rounds). I'm against CAs because they are fabrications who do a beauty show primarily for the browser makers, and everybody else has to deal with the fallout (eschewing political comparisons... deep breaths...); they also provide cover for "infrastructure vendors" who mint their own CAs. They say that DNS encapsulates the two most difficult problems in data science: naming and cache expiry (I'd add delegation). So if we already have one global tribe attempting to solve this problem, how much of our attention budget do we really want to spend on people who have discovered this "new problem": CA chains: really? There are (Derrida-not) misconfigurations which routinely happen (PeeWee Herman "I meant to do that") which clearly benefit from DNSSEC. Surely noone would configure their network to trust the name of, say a file server, which serves the executables for your short order diner. Dang. It's such a brilliant idea. Why doesn't it pan out? JasBug hasn't been solved, other than M$ saying "don't do that". What if the DNS solved it? We're writing here for the public so yes, "CA chains" is technically inaccurate. I don't care. DNSSEC works fine for me, why not? When people break it, I get early warning. When people implement it and don't utilize it, I find out. But in all seriousness my sights are on DANE and ultimately eliminating Certificate Authorities. I've always had things I work on, and I've always been an iconoclast. I call myself an "internet plumber and data sous chef" ("internet plumber" is on my business cards). I struggle with the notion of this activity being "working on side projects" because I was a consultant for 20 years. I come from an age where PDPs roamed the Berkely campus and LSD came from the drinking fountains. There was no commercial internet. Software development and uptake was not driven by advertising air wars. There was no GitHub; there was no GPL. Since even then my poorly formed notion was to work horizontally across industries, it was important that I be able to retain and reuse a collection of tools and libraries and I wrote that into contracts as "software tools of the trade"; and one of the key differentiators was that I did work on them for multiple clients, or for my own account. That was then, this is now. I went to work for a cybersecurity company and ended up playing a lot with DNS. The first few years were complete chaos, but hella fun! But that changed, and my suggestions weren't listened to. In my opinion, Sand Hill Road has ruined the threat indicator space (omitting the journey for brevity). I suppose what I'm doing now is 1) illustrating cool or quirky things about the technology and 2) making winners and losers in the DNS / DDI space. I don't know that someone without the discipline to run their own business (and the wisdom not to if you don't have to, IOW move fast or go far) is going to be able to make money on side projects consistently. I'm not really trying to. So let's talk about the non-monetary rewards. I meet the other fanatics in this space. When I make winners, they're allies. When I make losers, they provide me with free publicity. I have an awesome rollidex (look it up). <--- these are the true reasons I do it Does this ever make me money? Indirectly yes I suppose it does. I know what I can do, and other people at the top of their game know what I can do; and I know who's at the top of their game (and oftentimes who's not). People reach out to me about quirky opportunities: I spent last winter hunting medical devices on a network (because DDI). Would you do anything for money? Would you do anything your heart called you to do? Think about what truly motivates you and why. How does your project align with your motivation? Make a pitch deck for your project, or for the problem area it addresses (a plea for help). In my case, I always produce working code; so that's what I do. Then publicize it, see what feedback (any kind) you get; be gracious (ok, at least try). How'd it go? Check back with your motivation compass: is the path from here to the North clear? If not, can you plot a course? Yes? Pivot. Repeat. Just like a business, really. No? Move on to something else. Meta: You're using words like "managing", "discipline", "slacking", "guilt"... and also "relaxing" and "working". But you don't use them in the same paragraph as "money". 1) Above, I made a comment about "move fast or go far": in my experience things oftentimes start out as "move fast" and transition to "go far". Are you a go-it-alone person, or do you find safety in numbers? 2) Baseball. Do baseball players make better baseballs because they know how to hit home runs? Is winning the game the result of discipline and training, or is it just something that tends to happen more often when you're part of (or are) a cold-blooded, well-oiled and single-minded machine? There is MDNS for example. Also in terms of alternatives to BGP, you're still going to need to figure out routes. And / or, you going to have to detect loops. Different "anycast" nodes could use something like this to detect each other's presence. You could use the (IP) TTL to limit how many hops a packet will traverse looking for a particular server (no similar concept at the MAC level AFAIK). I hope you have fun! Personally I don't see a use case other than advertising or surveillance for a web page doing 20 DNS lookups (and that includes CNAME chains). Having said that... > extra second of lookup Hrm. Sounds like you want it to work like today's internet, with today's internet services. You're using radios, what's your traffic shaping look like UDP vs TCP? I know from experience that media devices spam the crap out of wifi (weird stuff too, like multicast MAC addresses). A common scenario is a TCP channel for control, and an accompanying UDP spew for the actual content. DNS resolution according to the standards which were promulgated in the 1980s uses UDP, unless a (UDP) reply indicates that the request should be retried with TCP: there is no use of TCP, as in there is no "and if all else fails, retry with TCP". For media, this provides a first mover advantage: whomever resolves their service and starts streaming first attenuates DNS resolution for the latecomers. I actually wrote about this on HN and wrote a demo TCP-only forwarder (which also conveniently does DoT) https://github.com/m3047/tcp_only_forwarder but nobody was very interested. Point being, if DNS resolution is failing or slow and you can't / won't do traffic shaping you might want to force DNS over TCP / TLS. > Advanced protocols may be able to use SRV records to distribute further traffic, but web browsers can't Not for lack of trying from the DNS community, more like web browsers won't. However if you haven't already you should take note of the HTTPS and SVCB DNS record types: https://datatracker.ietf.org/doc/draft-ietf-dnsop-svcb-https... One of the harmful externalities of the practice is that when incorrect / impossible prophetic claims are made (and they are), they negatively impact the progress of science since they are generally presumed to be true and so might be used to refute a legitimate science or technical claim. If you want DNSSEC to work, be sure you set up NTP and that it's working properly. Run your own recursive server and instrument the crap out of it: https://github.com/m3047/rear_view_rpz You can't get local knowledge from anywhere else. The latest BIND has DoT (DNS over TLS) out of the box, or you can put nginx in front of any decent DNS server to terminate TLS just like you do with a web server (this is fundamentally TCP not UDP however). The root servers use anycast, so you can figure there are "several" nameservers with the same address scattered around the 'tubes, and distinguished by the routes announced in different places. There are and have been alternate roots since the beginnings of internet time, notiwthstanding Mockapetris' opinion that people who advertise false root should be shot. Writing a decent recursive nameserver is nontrivial, I've written several for specific purposes but generally I use BIND. I concur that running a recursive server for your SMTP server is best practice because network intelligence is oftentimes utilized for spam / malware mitigation. I'm unclear why you need it for e.g. HTTP. > few root servers with a few people that have keys to them Well, kind of. As said, there are quite a few root servers although the control is in the hands of relatively few. Maybe you realize this, maybe you don't but yes there are keys for DNSSEC. I'm not sure exactly how it works, but several people have to cooperate to sign the root zone. They have key signing ceremonies which are televised online. During COVID I watched them drill a lockbox, because one of the keyholders couldn't make it to the ceremony; fun times. > Few VCs [...] want the industry perception that they get founders investigated for fraud when things go sideways. That would be refreshing! I might pitch to them. > It's Borat trying to patent a hoverboard Wow! That's interesting! While nobody has been paying attention, forward-looking patents have become acceptable (I don't agree that this is a good thing). Seriously, that's a fact; and here comes Holmes apparently claiming to have the science, am I right? There is language which apparently (IANAL) needs to be watched especially around verb tense when filing such patents. I believe "moral hazard" is the term of art for what you describe. I think the OP is playing 20 questions for their own entertainment. I think what they're not telling you is that there's nothing to prevent someone from making a closed-source product incorporating something which is MIT licensed (but they're still supposed to give credit where due). That's also not the whole story. Squirrel! They're asserting ownership. By asserting ownership they're converting good will and assuming the mantle of authority, which will sway plenty of weak-minded people: hey it's Microsoft. If the owner of the site contacts me I'm happy to discuss... dig 'a test.hazel10.messwithdns.com' txt +short "test" Sure, people who are making money building on FOSS tools should understand that they bear the burden of fitness for their environment. Maybe they do. If so, they've done a good job of deflecting attention. Let me tell you a story about something that happened to me this spring. I had trouble logging in to my customer account at a critical infrastructure provider (utility provider). When I called customer support one thing led to another and they ended up reading me my password from their internal systems. (Let that sink in.) So I spent a week trying to get ahold of someone to let them know how fucked up that is, which they avoided, until ultimately they claimed I was "threatening" them. I reached out to the "hidden hand" of the internet, did anyone have contacts with their MSP (with "National" and [edit: changed from "Infrastructure"] "Information" in the name)? But nobody did, so someone whose name would be recognized offered to tweet it. Didn't take long to hear from MSP's Chief Cloud Architect. The story that they tell is that they'd like to turn the feature off but the customer won't let them. IANAL but I am an internet plumber. Happy to provide expert witness that e.g. Hover, owned by Tucows, has a toggle for whois in their domain admin dashboard but it does nothing: I cannot turn whois on even if I want to. Having, or publishing, an email address does not mean I care to, choose to, or will in fact receive email sent by you; or that I will display or treat it in the fashion you desire. > Yes agreed for complicated, rare problems you should do your own research if you can. When it doesn't work out the way they planned when they pull it out their a* they call that a "complication". Seriously. I think there's operant conditioning at work: It seems like there's less interest in extracting money from us by (cough) "practicing" medicine than in edubicating us that something is "serious" and it's our obligation to learn more about it, and extracting money from us that way. I think there's a model for this operational paradigm, I think it's the smart phone. They train you to dismiss "alerts". Then they show you inchoate alerts, engendering anxiety and a feeling of lack of control. Then they propose a way you can get "in control" by following their narrative. Are you really an expert because you're over 50 and you still have college loans to pay off? Really? You're gonna say that with a straight face, doc? Funny you should mention Covid. Last year I asked for an antibody test, they said they'd do it. They didn't. They lied and said I'd never asked. Then they piled it higher and deeper by telling me that if they had, they'd have had to report the result to the CDC. WTF? Is that a bad thing? My wife was there for both exchanges. Furthermore, because electronic records there is no record of the tests which were ordered, only of the ones they want to tell you about: that is correct, I have no receipt for the blood which was taken or the tests which were ordered. (Lesson learned.) I suppose it's easy to attribute this to some grand plan, but I'll choose mundane misfeasance as the reaction to errors arising from incompetence. If there's any question about the efficacy of the treatment or any way for these amateurs to screw it up, why the hell would I trust my life to them?
s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320302355.97/warc/CC-MAIN-20220120160411-20220120190411-00456.warc.gz
CC-MAIN-2022-05
13,729
67
http://crypto.stackexchange.com/questions/tagged/padding-oracle+compression
code
to customize your list. more stack exchange communities Start here for a quick overview of the site Detailed answers to any questions you might have Discuss the workings and policies of this site Is it safe to use GZIP to avoid padding related attacks I am designing a library that supports encrypting some in-memory data using AES in CBC mode. Now I need a padding but it seemed to me that Apple's CommonCrypto library and OpenSSL have different ... Sep 20 '13 at 16:06 newest padding-oracle compression questions feed Hot Network Questions Polynomials over finite fields How to list hardware in DOS? Is Hard Link equivalent to Windows Shortcut Maintaining a bunch of generic functions How to do a flawless and natural presentation? How to stop feeling guilty about the unfinished work? Is my coding technique progressing in terms of C# loops? How to force a group to choose a leader? Time complexity of a compiler Why does the STD not decrease when I do more measurements? How do I make an ESL character sound realistic? Why can't find -regex match a newline? How to acknowledge contributions of anonymous referee in new paper? Conversion: If G-d really wanted me to be a Jew (and observe mitzot), why was I not born into a Jewish family run php function when order complete Why does locals() return a strange self referential list? Is the possibility of Harry being named Elvendork from the books? Occasional counter too large error despite \MakePerPage Is the shell permitted to optimize out useless terminating commands? How can you download all profile pictures for all users in a given SF org? What is a tactful way to address client's lack of cooperation with a project? Why am I allowed to access protected Windows files when I boot Ubuntu from USB? Right way to ask financial help ___, ___, and I am/are… more hot questions Life / Arts Culture / Recreation TeX - LaTeX Unix & Linux Ask Different (Apple) Geographic Information Systems Science Fiction & Fantasy Seasoned Advice (cooking) Personal Finance & Money English Language & Usage Mi Yodeya (Judaism) Cross Validated (stats) Theoretical Computer Science Meta Stack Overflow Stack Overflow Careers site design / logo © 2014 stack exchange inc; user contributions licensed under cc by-sa 3.0
s3://commoncrawl/crawl-data/CC-MAIN-2014-10/segments/1394011070356/warc/CC-MAIN-20140305091750-00005-ip-10-183-142-35.ec2.internal.warc.gz
CC-MAIN-2014-10
2,258
52
https://proxies-free.com/2013-open-with-explorer-via-http-makes-explorer-crash/
code
We currently have the effect that when clicking Open with explorer in a document library we can’t add / edit / change items. The folder opens but as soon as we try to add something the explorer.exe freezes. Same goes for mapping a library to a drive letter. By default we access our intranet via http. About a year ago we added the option to access it via https. And when accessing our Intranet via https everything works fine. Anyone else has this feature/bug? Is there a way to fix it (a patch that might have been responsible)? We use SharePoint 2013 on Windows Server 2012 R2. Client OS is Windows 10.
s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600400191780.21/warc/CC-MAIN-20200919110805-20200919140805-00260.warc.gz
CC-MAIN-2020-40
607
5
https://forum.nette.org/en/27577-form-using-a-huge-selectbox
code
- David Šolc - Member | 5 I created a form with Kdyby/FormsReplicator and inside each container is a select box with “products”. Problem is that “products” are also created by the user and there is a lot of them now. I looked at Select2, which I got working with ajax call loading data from DB via some query using LIKE, but I got stuck with setting items for SelectBox, since I can not load all of the products and set them via setItems(), so I am unable to getValues() on form, because of getValue() on the selectBox. Another story is that I used this form to also edit these values via setDefaults(), so it is also not working, since it does not have items set. So I was thinking about some kind of ajax SelectBox, which will set items dependent on a query sent from Select2 and possibly set items (which will be set as defaults)? Any ideas or a piece of advice? Thanks a lot for any! Last edited by David Šolc (2016-11-28 20:24)
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679101195.85/warc/CC-MAIN-20231210025335-20231210055335-00204.warc.gz
CC-MAIN-2023-50
942
8
https://www.jondjones.com/learn-episerver-cms/episerver-find/how-to-search-for-content-using-epifind/
code
EpiFind is a power search provider developed by EpiServer; if you've stumbled across this post and you're considering using EpiFInd I suggest you read this article, Review Of The Different Search Providers Available To Use On Your Episerver Project. In today's post, I'll cover some basic code snippets to query Find. Performing A Basic Search Performing a search is pretty easy. The best approach to query find is to inject the Find API, IClient. In this example, I'm returning a PageData object, we can then use the standard PageData properties to display that search result: like: For those of you who are interested in the old singleton version,SearchClient, looks like this: Querying finds EpiFind results in the ContentResult object being returned. ContentResult has several useful bits of data, like facets, total results and the search results themselves. To get the search results, you can use this code: You can get the total number of results returned, like: If you want to only search for certain content types, you can do that like this: To get the facets, you can use this snippet: EpiFind is very simple to get started with and offers a pretty powerful API. In today's post, I've covered some of the basic bog-standard ways to query find and display those results on your website.
s3://commoncrawl/crawl-data/CC-MAIN-2021-17/segments/1618038064520.8/warc/CC-MAIN-20210411144457-20210411174457-00561.warc.gz
CC-MAIN-2021-17
1,295
9
https://forums.creativecow.net/docs/forums/post.php?forumid=398&postid=8850&univpostid=8850&pview=t
code
I'm working on a feature in 1080p 23.98. The other departments want SD 29.97. No problem I think, I'll have my Kona 3 do it quick and dirty out to tape, downconverting and adding the 2:3 at the same time. Everything works great, except the "A" frame isn't the same each time. We are not using deck control. I'm simply playing out from the Final Cut Pro timeline and crash recording. Nonetheless, the first frame of picture in my sequence is the same, and I'd expect it to be the "A" frame every time. Sometimes it is. Sometimes it's not. Can I get the "A" frame consistent without using deck control?
s3://commoncrawl/crawl-data/CC-MAIN-2019-13/segments/1552912202188.9/warc/CC-MAIN-20190320004046-20190320030046-00483.warc.gz
CC-MAIN-2019-13
600
3
https://community.khronos.org/t/multitexturing-per-vertex-alpha/39493
code
hmm, so i’ve never worked with multitexturing before, and i want to texture a model with 4 different RGB textures. the alpha values for the vertices in the model are going to change every frame, so i’d rather not use RGBA textures and upload the new alpha channel constantly. instead, i was wondering if it would be possible to do something like this: texture unit 0 glColor(… Alpha 0) texture unit 1 glColor(… Alpha 1) texture unit 2 glColor(… Alpha 2) texture unit 3 glColor(… Alpha 3) glVertex(…) // render the vertex basically i was wondering if i could specify a different color/alpha pair to be modulated with each texture during the multitexturing stage? if this isn’t possibly, does anyone have any other ideas as to how i could specify per vertex alpha values without first rendering the model into each texture’s alpha channel? with GL_EXT_tex_env_combine / GL_ARB_tex_env_combine you can assign previous textures alpha (or a constant value) to the current texture. you can set the CONSTANT color for a COMBINE. there is a lot of things you can do with this extension. without it, I wouldnt know how to get rid of the “A” in a RGBA texture. oh and make sure you set texenvf for every texture stage. (in this case it would be GL_COMBINE) this thing here: shows the older EXT_tex_env_combine quite nice, the ARB version can do a bit more, and with other extensions like crossbar (or nv_combine4) you can jump around in the texture units. combine and the others from recolection can’t handle 4 textures at once. you will need something more powerful eg check out glsl Careful how you word that, on the face of things it can’t quite handle 4 per vertex weights however it can do overall weights and more than one per vertex, probably three if you consider that one color gets you two by blending between two and maybe all 4 if you use alpha and rgb colors separately. This question keeps coming up with a negative response… hmmmm… The only vertex attribute you can read with texture_env_combine is the primary color, so that gives you two per-vertex blending weights (RGB and A). This allows you to blend three textures with as many texture units. You can’t access the secondary color or anything like that, so if you want to add a fourth texture, the alpha is going to have to come from a texture. If you run out of texture units at this point, you’ll either have to resort to multiple passes, or use a more sophisticated extension (in increasing order of hipness: NV_register_combiners/ATI_fragment_shader, ARB_fragment_program, or GLSL). thanks for the responses, but i’m not sure i completely understand. when i retrieve GL_MAX_TEXTURE_UNITS, the value returned is 4, so i think i should be able to handle combining 4 textures at once, no? let me clarify what it is i’m looking for. at each vertex i want to have: vertexColor = (tex0color * alpha0) + (tex1color * alpha1) + (tex2color * alpha2) + (tex3color * alpha3); where alpha0-3 are different for each vertex on the model, and their values change every frame. if i follow you right, this cannot be done using just the ARB_texture_env_combine extension? i would have to use a shading language (such as glsl) or use multiple rendering passes where each pass the current texture is modulated with the surface color (1,1,1,current alpha) and then summed with what is already in the framebuffer? yes, at least to my knowledge that sounds correct, then again I am just learning this stuff myself. with combine you could only give a alpha value (using GL_CONSTANT) to each texture, you could change that value per frame as well, but it would be for the entire surface not per vertex. or using PRIMARY_COLOR in the combine requiring multiple passes, as someone else already pointed out. cause primary color can only take the current pass’ vertex alpha.
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100047.66/warc/CC-MAIN-20231129010302-20231129040302-00207.warc.gz
CC-MAIN-2023-50
3,849
31
https://www.zotero.org/support/_export/xhtml/plugins
code
SPIP plugin to synchronise a Zotero library with SPIP (a content management system). References can be presented in web pages and searched through a dedicated webpage. A complementary plugin (BiblioCheck) allows a research unit to manage corrections to apply to the unit bibliography. (PHP) Replace terms (e.g. journal titles) in citations with their abbreviation. See the May 2014 release announcement on the CitationStylist site for usage notes. To review past discussion of the plugin, see the relevant forum thread (note that many early issues have been resolved in recent plugin releases). Works with both official Zotero and Juris-M. Uppercase Subtitles: Entering titles in “sentence case” is strongly recommended. The first character of a subtitle (following a colon) should be set in lowercase, unless it is a proper noun or acronym. Styles will convert titles to “title case” as necessary. Some citation styles (e.g., APA) require that the first word of subtitles also be uppercase. This plugin can enable such formatting. This plugin also patches Zotero's citation processor to the latest version. This plugin is not necessary for most users.
s3://commoncrawl/crawl-data/CC-MAIN-2017-47/segments/1510934805911.18/warc/CC-MAIN-20171120032907-20171120052907-00329.warc.gz
CC-MAIN-2017-47
1,160
4
https://help.eclipse.org/latest/nftopic/org.eclipse.platform.doc.isv/reference/api/org/eclipse/core/runtime/preferences/IScope.html
code
public interface IScope Clients contributing a scope to the Eclipse preference system must implement this interface to aid Eclipse in creating a new node for the hierarchy. Clients may implement this interface. createCreate and return a new preference node with the given parent and name. Must not return null. Clients are able to create a new node in memory or load the node's contents from the backing store. Neither the parent or name arguments should be Implementors should note that the node might not have been added to the child list of the parent yet, and therefore might not be able to be referenced through navigation from the root node. parent- the node's parent name- the name of the node - the new node
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296816863.40/warc/CC-MAIN-20240414002233-20240414032233-00234.warc.gz
CC-MAIN-2024-18
715
9
http://jasonormand.com/2012/08/27/sinatra-with-haml-and-scss-example-app/
code
I really like Sinatra’s simplicity but I find that I pretty much always prefer to use HAML and SCSS. I didn’t want to have to think about everytime I created a new project. So I created a cloneable example for use with mini apps. It’s also Heroku friendly. It’s hosted on Github: https://github.com/okor/sinatra-haml-scss. Some may find it helpful but it’s there more for me, more than anything.
s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187825399.73/warc/CC-MAIN-20171022165927-20171022185927-00233.warc.gz
CC-MAIN-2017-43
405
1
https://community.kde.org/Kexi/Configuration
code
Started by Jstaniek 21:35, 27 November 2011 (UTC) This page defines requirements for supporting entities of the program(s) that are configurable. Levels of configuration Three can be at least three levels of configuration defined: - Application level (per user) - Defaults come from Application defaults - Project level - Defaults come from Application defaults and project template defaults - User Project level - Defaults come from Project's defaults defined for users Certain settings can be present at more than one level. Inheritance can occur then. - Requirement 1: good defaults for settings, ie. expected, easy to remeber by user, typical. - Requirement 2: each setting should have assigned level(s) where it belongs to; settings should have described inheritance if it is present - Requirement 3: settings should be versioned - Requirement 4: Harmonization with Calligra and KDE settings: typical settings should be harmonized regarding defaults and naming with identical settings in other Calligra and KDE software. - Requirement 5: The very same configuration system should be accessible to Kexi database/application developers for defining application-specific settings at Kexi, application, and user level KEXI settings are currently (up to 2.4) accessible via kexirc configuration file. No GUI is available because it is clear the configuration system in Kexi would heavily differ compared to document-driven applications. Current settings are documented in the source code tree, kexi/doc/dev/settings.txt. There is advantage of having formal notation for settings documentation: they can be used for automatic generation of - handbook page(s) - manual page(s) - --help messages - What's this and Tool tips in the GUI All this with less maintenance overhead. Thus it is reasonable to keep the documentation of settings in the version control system.
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100184.3/warc/CC-MAIN-20231130094531-20231130124531-00304.warc.gz
CC-MAIN-2023-50
1,863
23
http://gaming.stackexchange.com/questions/tagged/jumper
code
to customize your list. more stack exchange communities Start here for a quick overview of the site Detailed answers to any questions you might have Discuss the workings and policies of this site tag has no wiki summary. What are the gameplay/level design differences between Jumper and Jumper: Redux? I understand that in Jumper:Redux, graphics and sound effects are improved over the original Jumper. As well a few new features have been added, like multiplayer. What I want to know though is there ... Dec 1 '12 at 2:11 newest jumper questions feed Hot Network Questions How is DNA Read Collection with both Set and List interface Sultanas and raisins, I'm confused Antonym for "discombobulate" How to input special character, such as Celsius symbol, and common greek letters? Baby turning during nappy change Why the need for multiple I2C ports? How to remove the capitalization of names Incorporating Women into a Fantasy World Army? Integral evaluation (step-by-step) How to politely decline an interview? How can we take pictures of something billion of light years away? Was Hagrid acquitted of opening the Chamber? Remove next-to-last extension in a file name the type of this* in C++ Why is ;; allowed after a local variable declaration, but not after a field declaration? Does Enhance Ability apply to attack based on that ability score? Use two different ip addresses per host in SSH What do units like joule * seconds imply? Was the pronunciation of “symmetry” different in the past? Gold coated pads How much of the Middle Earth universe had Tolkien invented when he wrote The Hobbit? Decision and PhD. Take a once-in-a-lifetime opportunity or pursue a life dream Lottery odds calculated in your head, or pen and paper. more hot questions Life / Arts Culture / Recreation TeX - LaTeX Unix & Linux Ask Different (Apple) Geographic Information Systems Science Fiction & Fantasy Seasoned Advice (cooking) Personal Finance & Money English Language & Usage Mi Yodeya (Judaism) Cross Validated (stats) Theoretical Computer Science Meta Stack Exchange Stack Overflow Careers site design / logo © 2014 stack exchange inc; user contributions licensed under cc by-sa 3.0
s3://commoncrawl/crawl-data/CC-MAIN-2014-52/segments/1418802777889.63/warc/CC-MAIN-20141217075257-00141-ip-10-231-17-201.ec2.internal.warc.gz
CC-MAIN-2014-52
2,179
53
https://channel9.msdn.com/Forums/Coffeehouse/Is-There-an-Abstraction-Calculus/9e682bb6db1d4e3286c49e42016a0e33
code
Is there any such formalization of the process of abstraction? You know, in the same way there is a formalization of lambda calculation via the lambda calculus? If not, couldn't there be? It's one thing to understand a program, another thing to abstract, another thing still to understand and reason about the process of abstracting during program development. If there were an 'abstraction' calculus, maybe it would be easier to teach engineers about abstraction as well as when and how to do it?
s3://commoncrawl/crawl-data/CC-MAIN-2018-09/segments/1518891815843.84/warc/CC-MAIN-20180224152306-20180224172306-00611.warc.gz
CC-MAIN-2018-09
497
3
https://blog.risa.com/post/how-to-import-a-risasection-shape-into-risa-3d-1
code
RISASection 2.0 includes the ability to assign your section as one of the predefined hot rolled steel Shape Types (Wide Flange, Channel, Tube, etc.). This means that when the shape is imported into RISA-3D, you will now be able to get design results and code checks for the member. First, make sure that you assign the appropriate shape type in the Section Information dialog in RISASection. Save the RISASection file and then open RISA-3D. Please note, you must close and reopen RISA-3D after saving because RISA-3D only reads in the database information when it initially starts up. To select the shape in RISA-3D, open the Shape Database. Use the Database menu to select RISASection. If you assigned the shape as Hot Rolled Steel in RISASection, click on the Hot Rolled tab. If you assigned the shape as General in RISASection, click on the General tab.
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224648245.63/warc/CC-MAIN-20230602003804-20230602033804-00028.warc.gz
CC-MAIN-2023-23
856
5
https://www.techrepublic.com/resource-library/whitepapers/workflow-support-using-proclets-divide-interact-and-conquer/
code
Institute of Electrical & Electronic Engineers Classical workflow notations primarily support monolithic processes. They are able to describe the lifecycle of individual cases and allow for hierarchical decomposition. Unfortunately, real-life processes are fragmented and are often composed of separate but intertwined life-cycles running at different speeds and coping with different levels of granularity. The proclets framework was one of the first formalisms to acknowledge this. Proclets are lightweight interacting processes that can be used to divide complex entangled processes into simple fragments and, in doing so, place increased emphasis on interaction related aspects of workflows.
s3://commoncrawl/crawl-data/CC-MAIN-2020-34/segments/1596439740679.96/warc/CC-MAIN-20200815035250-20200815065250-00182.warc.gz
CC-MAIN-2020-34
695
2
https://wordpress.org/support/topic/how-to-disable-fake-google-crawler-when-you-cant-access-settings-through-admin
code
The fake Google crawler firewall routine is unforgiving in that it locks the site and leaves a nasty screen. I do not know how practical this method will assist the client's safety while leaving the site inaccessible to the public, client and admin. Ultimately the outcome makes the admin or site developer look bad. Our staff concerning WordPress matters at Talking Manuals is observing complaints that the fake Google crawler firewall routine within Wordfence does more harm than good, in that it locks the entire site down and bars access to all for no apparent security reason. To unlock the site, you must strong arm and FTP to rename Wordfence. What is theoretically is a good thing, backfires. When seen through the eyes of the client and the viewing public this kind of security measure is usually too harsh, unacceptable and embarrassing. Possibly a better way is to block site accessibility for a set time upon detection of a fake Google crawler (and flag a report to the admin), then unblock and allow access. At present state, I would suggest Wordfence users not set this routine as active. see complete product reviews for Wordfence: http://talkingmanuals.com/wordpress-plugin-reviews/wp-security
s3://commoncrawl/crawl-data/CC-MAIN-2016-07/segments/1454701158609.98/warc/CC-MAIN-20160205193918-00199-ip-10-236-182-209.ec2.internal.warc.gz
CC-MAIN-2016-07
1,209
5
https://www.oschina.net/news/23537/s3ql-1-7-released
code
S3QL 是个用来在线存储数据的文件系统,支持 Amazon S3 、SFTP 服务器等。 S3QL 1.7 改进内容: - Metadata is now stored in a custom, delta-encoded binary format, and inodes are assigned sequentially and not reused. - This makes S3QL fully NFS-compatible. - s3qlcp now also copies extended attributes and no longer generates incorrect block reference counts when copying a file which has identical blocks. - This release eliminates a race condition in s3qlcp. - When copying a file with s3qlcp immediately after it was modified or created, it was possible that s3qlcp would copy the new file attributes but the old data blocks.
s3://commoncrawl/crawl-data/CC-MAIN-2019-43/segments/1570987823061.83/warc/CC-MAIN-20191022182744-20191022210244-00210.warc.gz
CC-MAIN-2019-43
650
7
https://slashdot.org/~unit8765
code
What you say is mostly sensible, however it breaks down at certain points: I actually don't see any real obligation, if I were an atheistic evolutionist, to do anything about the earth. Or, for that matter, to do anything for humanity. Unless I see a distinct benefit in it for me AND I have a desire to reap said benefit. In your post you go about declaring how being a humanitarian is in your best interest. You do not actually answer the above statement - That doing something about the earth is in your best interests. What do I care if we as a species die out? We wouldn't die immediatly... life would slowly become harder and harder, and more than likely people would have fewer children than is necessary to maintain the population (the earth's carying capacity would fall slowly, and we would die out) Secondly your argument that humanitarianism is a result of evolution breaks down because being a humanitarian is often not to your advantage. For example, it makes no sense for a species to preserve its invalid members - result of harmful mutations - because this would pollute it's gene pool. However, we build assylums and we have special schools for instance. In these situations, humanitarianism offers no selective advantage versus a "selfish" mentality. This can be applied to the human universe where we send money to help with famine, poverty, war, disease. While this is not a direct result of mutations, the concept is often the same. Whenever somebody needs something, often they will need it again. Giving relief money just aleviates the symptoms of the problem. The problem being the poor econonmic problems, the people afflicted by them will rarely escape, and relief money just prolongs their suffering. I do not believe that cooperation, doing things for humanity, whatever you wish to call it, evolved. I believe that the only way for this ammount of cooperation to come about amoung humans is if they were created. If you look at moral reletavism, which is the logical conclusion for the absense of God, you can see that a society that is truely based on these concepts will ultimately break down. In conclusion a quote: "There are only two possibilities as to how life arose: one is spontaneous generation -- a rising evolution. The other is a supernatural act of God. There is no third possibility. Spontaneous generation was scientifically disproved 120 years ago by Pasteur and others. This leaves us with only one logical conclusion -- that life arose as a supernatural act. I will not accept that, philosophically, because I do not want to believe in God. Therefore, I choose to believe that which I know is scientifically impossible." George Wahl, former Harvard professor and Nobel Prize winner in biology.
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917122621.35/warc/CC-MAIN-20170423031202-00161-ip-10-145-167-34.ec2.internal.warc.gz
CC-MAIN-2017-17
2,742
7
https://support.evosecurity.com/hc/en-us/articles/5583765885211-View-user-devices
code
There is currently limited detail available regarding an end-user device. - From the top navigation, click Tenants. - In the displayed list of tenants, find the tenant you want to administer. Click anywhere in the row for the tenant. - From the side navigation, click Devices. List of all devices The initial table view presents you with a list of all devices that have been registered. You can also administer a single or multiple devices from the table. For more information on managing user devices see How do I disable, enable, or delete user devices? Individual device details To view the details of a specific device, click the Device ID from the table. You’ll be presented with some limited detail about the device, can change the device status (Enable/Disable), or delete the device.
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573104.24/warc/CC-MAIN-20220817183340-20220817213340-00144.warc.gz
CC-MAIN-2022-33
793
8
https://apple.stackexchange.com/questions/221663/is-there-a-good-syslog-viewer-for-mac
code
I have many devices from which I want to get logs using a syslog server hosted on my iMac. To get in touch with logs and analyse them, I am looking for a good syslog viewer for mac which have the following functionalities : - color log by level - stats & graphs - send mail and alert I tried the common logs viewers (console, SU => https://superuser.com/questions/320575/mac-os-x-logfile-viewer) but the two last functionalities I look for are not supported by them. It exists loggly.com but only on cloud version and logmx but which exist only in free version without stats. Has someone any idea of a good syslog viewer (opensource / free if possible) which had these functions for mac ?
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233511717.69/warc/CC-MAIN-20231005012006-20231005042006-00260.warc.gz
CC-MAIN-2023-40
688
7
https://softwareengineering.stackexchange.com/questions/134540/are-utility-classes-with-nothing-but-static-members-an-anti-pattern-in-c/134553
code
The question Where should I put functions that are not related to a class has sparked some debate over whether it makes sense in C++ to combine utility functions in a class or just have them exist as free functions in a namespace. I come from a C# background where the latter option does not exist and thus naturally trend toward using static classes in the little C++ code I write. The highest voted answer on that question as well as several comments however say that free functions are to be preferred, even suggesting static classes were an anti-pattern. Why is that so in C++? At least on the surface, static methods on a class seem indistinguishable from free functions in a namespace. Why thus the preference for the latter? Would things be different, if the collection of utility functions needed some shared data, e.g. a cache one could store in a private static field?
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593655886802.13/warc/CC-MAIN-20200704232817-20200705022817-00569.warc.gz
CC-MAIN-2020-29
878
3
https://joonholeegroup.com/News.html
code
Check out our first member-led work, “Unified Framework for Open Quantum Dynamics with Memory” by Felix, Lachlan, and Joonho, which was just out on arXiv! We showed how two prominent methods in non-Markovian Open Quantum Dynamics are fundamentally related through a novel diagrammatic approach. We also showed how this approach could have applications in quantum sensing and Hamiltonian learning. The group celebrated this milestone and the holiday season by having a party at Joonho's place--cheers for what's to come! Lee Group Holiday Party! PJ graciously hosts the members for a Holiday Party celebrating the coming Christmas and New Year. What fun! The second group outing. Joonho and the members enjoy a Thanksgiving lunch in company at Smoke Shop. Yum! Joonho named a Laureate of the 2023 Blavatnik Regional Awards for Young Scientists! We are thrilled to share that Joonho had been named a Laureate of the 2023 Blavatnik Regional Awards for Young Scientists. Laureates are awarded $30,000 each and two Finalists in each disciplinary category are awarded $10,000 each in unrestricted funds. In 2023, there were 121 nominations from 28 academic institutions in the New York metropolitan region. Joonho was recognized for "development of state-of-the-art quantum chemistry algorithms for classical and quantum computers. Lee’s work aims to provide a microscopic understanding of emergent functional materials, including solar cells, electrocatalysts for the hydrogen economy, and optoelectronics." See the full article here. PJ Robinson and Adam Rettig join the group! We welcome postdocs PJ Robinson from Columbia University and Adam Rettig from UC Berkeley. The group visits the Harvard Museum of Natural History! To commemorate the first month anniversary of the group, Joonho and the members spent a wonderful afternoon together in the Harvard Museum of Natural History. Get to know us and what we are up to. Tong and Zeyu join the group! Experienced postdocs Tong Jiang from Tsinghua University and Zeyu Zhou from the University of Pennsylvania are joining the group. Tong will apply his expertise on numerical methods for electron correlation problems, while Zeyu is working on understanding various approximations for polaron transport in solids. We are happy to have Tong and Zeyu onboard! their future works. After a productive QSE rotation, Adrian decides to join the Lee Group! He will be thinking about the frontier of quantum advantage with the quantum-classical quantum Monte Carlo (QC-QMC) algorithm and other classical applications of Auxiliary Field Quantum Monte Carlo (AFQMC). Welcome Adrian! on his future works. Artur and Hieu join the group! We are extremely pleased to welcome Artur and Hieu! Artur is computing electron-phonon matrix elements from first principles, while Hieu is working on testing the boundaries of the celebrated variational quantum eigensolver (VQE) approach. on their future works.
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817184.35/warc/CC-MAIN-20240417235906-20240418025906-00668.warc.gz
CC-MAIN-2024-18
2,937
23
http://trollsplatterer.be/GM/game_detail.php?game_id=41
code
|The Invention of Life| |Game for the GameJolt Invention Contest.| |A survival game with many weapons and enemies.| |RK-1 Revenge of the Rats| |Use RK-1 to defeat nasty burglar insects!| |Infinite Stick War of Death V3| |The third remake of the epic, endless war God has started.| This example shows how to make a particle emitter follow an instance of an object in D&D. D&D doesn't have an action to relocate an emitter, GML does. * : The rating makes use of your IP-address to remember your vote. IP addresses may change, but your vote will be kept, even though it may no longer be visible here.
s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187824618.72/warc/CC-MAIN-20171021062002-20171021082002-00608.warc.gz
CC-MAIN-2017-43
597
9
https://masterplumbers.com/forums/reply/8047/
code
The may be a problem with the term “vertical”. Others assume this means the pipe is vertical and the face of the face hub is therefore horizontal. If that is the case then the previous answers about cutting off the hub will work. But then making a lead joint is also a simple process. But since the majority of lead connections are into a tee in the main stack, which makes the pipe horizontal and the hub face vertical, cutting off the hub will compound your problem immensely.
s3://commoncrawl/crawl-data/CC-MAIN-2021-25/segments/1623488525399.79/warc/CC-MAIN-20210622220817-20210623010817-00068.warc.gz
CC-MAIN-2021-25
482
1
https://viewer.scuttlebot.io/channel/publibertynetwork
code
Looks like you had a nice influx (of a lot of brand new butts!) https://ssb.picoreclame.nl/Map%20of%20the%20network%20with%20popular%20names.jpg (warning: large file) I have looked for an alternative server without much luck... There is no alternative, AFAIK, but you can install an earlier and more stable version: $ npm install -g 'firstname.lastname@example.org' You can set e.g. NPM_CONFIG_PREFIX=~/.npm-global and include $PATH to avoid installing and running the damn thing as root. Show whole feed
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100146.5/warc/CC-MAIN-20231129204528-20231129234528-00764.warc.gz
CC-MAIN-2023-50
504
9
https://support.vcom.com/support/solutions/articles/1000233864-i-am-having-trouble-publishing-my-web-site-using-webeasy-webeasy-professional-kb005202-
code
General instructions are contained in the Help system, but for those new to uploading using FTP, follow these detailed instructions. Take them one at a time, and do not improvise unless you really know what you are doing. 1) Build your site into HTML files Your web site must be built into HTML files before it can be published. This collection of HTML files is referred to as a Package. With your web site open, go to the "Build" menu and select "Web Site (HTML)". The "Build as an Internet Web Site" screen will appear. Here you can specify link colors, whether to use Standard or Dynamic HTML and some other options. For the purposes of publishing, the most important options are "Folder" and "Package Name". "Folder" is the location on your computer where the HTML files are stored before they are published. You should not need to change the default setting for this unless you are building many different web sites and wish to keep them separate. "Package Name" is used to identify your site in the Publishing Assistant. The Package Name is also the name of your web site that will appear in your web site's URL. The default setting for this is the name of your web site document, with a couple of minor changes to ensure that there are no invalid characters. When you update your web site at a later point, it must have the same package name as it did originally if your changes are to overwrite your original site. If you provide a different package name, you are effectively creating a whole different web site. When you click the "OK" button to proceed with building the HTML files, you may see a message similar to the following: "Web Easy has detected that the folder 'C:\Program Files\V Communications\Web Easy\HTML' contains other files and packages. Do you want to remove all files and packages that are not required for 'album1'? Note: you should keep these files if they are used in your web site or other packages." What this means is that the folder in which the HTML files are about to be built already contains some other files. Often these files will be from other web sites you have created, in which case you should probably select "No", so as not to delete them. The fact that there are other files in the folder where you are building your site will not have any effect on the building process. 2) Set up a connection profile Before your HTML files can be published, you need to set up a Connection Profile. A Connection Profile consists of the information Web Easy needs to know about your ISP or Hosting Provider in order to publish your files. Most of the information required is specific to your ISP or Hosting Provider, so you must ask them for it. The details of what information is required are listed below. You need to be connected to the Internet (via dial-up, cable, DSL, LAN, etc.) in order to continue. Once the package of HTML files has been built, and you have established your Internet connection, start the Publishing Assistant. Go to the "Tools" menu and select "Publish Assistant" - you will be presented with a welcome message. Click the "Next" button to continue, then click the "Connect" button to set up a Connection Profile. The first thing to do is pick a name for the Connection Profile, preferably something that has meaning for you, like "My ISP" or "My Work Account". Enter this name in the box labelled "Profile". This will allow you to select this Connection Profile in the future, the next time you want to publish your site. The first three pieces of information required from your ISP or Hosting Provider are: - Host Name or IP Address This is the name of the server to which your HTML files will be published. It can either be a Host Name (similar to 'www.mysite.com', 'ftp.mysite.com', 'users.isp.com', etc.) or an IP Address (similar to '192.168.1.1'). Enter only the Host Name or IP Address - do not enter quotation marks, slashes, or file or folder names here. - User Identifier This is your user name, provided to you by your ISP or Hosting Provider when you signed up with them. This is your password, provided to you by your ISP or Hosting Provider when you signed up with them. The above information must be entered in the fields provided on the "Remote Access" page of the Connection Profile screen. Next, click the "General" tab and examine the following fields: - Initial remote folder The word "remote" here means the server to which your HTML files will be published. This is where you specify the folder in which you wish your files to be placed. Unless you want to create a complex folder structure on the server, or your ISP or Hosting Provider specifically requires it, you should leave this field blank. If you do enter a folder name here, ensure that you use forward-slashes "/" in the name, rather than backslashes "\". - Initial local folder This is the folder on your computer that contains the HTML files you will be publishing. If you accepted the default value for the "Folder" field when building the HTML files you will not need to change this setting. If you change this value, ensure that you use backslashes "\", not forward-slashes "/". - Timeout (sec) This specifies the number of seconds WebEasy will wait for a response from the server when publishing files. If you get "timeout" or "winsock" errors later on when you are publishing your files, you can try changing this to a higher value. It is recommended that this be set to "30" or "45" initially. - IP Port This is the port number to use when transferring files via FTP. This setting should be "Default" or "21", unless you are advised otherwise by your ISP or Hosting Provider. Click the "WWW Site" tab and set up the following fields: - World Wide Web site address: This is the URL of your web site. It must be the full URL, including the "http://" part, and any required path information after the server name. Examples of this are "http://www.mysite.com" and "http://members.myisp.com/johndoe". Do not enter quotation marks, and be sure to use forward-slashes "/", not backslashes "\". - Primary Page: This is the name of the first HTML file that will be displayed when someone visits your web site. If your ISP or Hosting Provider uses UNIX servers, you should usually set this to "index.html". If Windows servers are used, it will usually be "default.htm". Setting this field correctly will cause the first page of your web site to appear automatically when someone visits your web site. Web Easy Professional provides one other section in the Connection Profile screen called "Firewall". You will generally not need to change the settings in here unless you are in an environment with a firewall, such as a corporate office. If in doubt, ask your network administrator or ISP. The settings are as follows: There are several different types of firewall. If you are not using a firewall, select "None". If you are using a firewall, the most common is the "User" type, but if you have doubts, ask your network administrator or ISP. This is the Host Name or IP Address of the firewall computer. Your network administrator or ISP can tell you what this is. This is the port number to use when connecting to the firewall. This setting should be "Default" or "21", unless you are advised otherwise by your network administrator or ISP. - User ID and Password These fields are the user ID and password to use when connecting to the firewall. Your network administrator or ISP can tell you what these values are. Often, these fields are not required. - Use Passive Transfer In some environments, for instance when a firewalling technique known as IP Masquerading is being used, this box must be checked. Your network administrator or ISP can tell you whether to do this or not. If you are using a personal firewall program, you should generally check this box. Once all the above information has been entered, click "OK" to connect. If you receive an error message at this point, check the following things: - Make sure your Internet connection is active. Open your web browser and see if you can view other people's web sites. - Contact your ISP, Hosting Provider or network administrator and double check the settings you entered in your Connnection Profile. 3) Publish your site Having successfully created a Connection Profile and connected to the server, you should now see a list of Web Site Packages (collections of HTML files you have built) that can be published. Select the package you wish to publish and click the "Next" button to continue. If you cannot see the package you just built in this list, click the browse button - this is the little picture of the folder above the package list - and browse until you find the folder you specified when building your HTML files. Next, you are presented with the package name, the local folder name and the remote folder name. If you want to change the remote folder, you can do so here by clicking the browse button next to the remote folder name. This allows you to create new folders on the server if you desire. You will not usually need to bother with this - just accept the default remote folder location. The other two things that can be specified on this page are as follows: - Make this package the default Web Site If this box is checked, the web site you are publishing now will become the default site on the server. You should only uncheck this box if you are publishing many different sites to the same server. - Let Web Easy automatically manage the Web Site If this box is checked, only files that have changed since the last time you published your site will be uploaded, and Web Easy will check for files that are not used in the package. If this box is not checked, all files will always be published, regardless of whether or not they have changed. After you have reviewed the above settings, click the "Next" button, and publishing will commence. Once all files have been published you will see the final page of the Publishing Assistant. Clicking "Finish" will close the assistant. If you have checked the "View Publish Report Now" box, your web browser will open and display a report listing the files transferred. If you have checked the "View Web Site Now" box, your web browser will open and go to your web site, provided you entered the correct value for "World Wide Web site address" in your Connection Profile. If you had previously published your site and are now updating it, you may see the "Cleaning the selected Web Site" screen. Here you are provided with the opportunity to remove any files that are no longer used in your web site. Simply select the files to delete from the "Files to be kept" list and move them to the "Files to be deleted list" using the buttons provided.
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817670.11/warc/CC-MAIN-20240420153103-20240420183103-00046.warc.gz
CC-MAIN-2024-18
10,715
58
http://reliawiki.org/index.php/Repository.BlockSim.ImportBlockSimXMLFile
code
Jump to navigation Jump to search Member of: SynthesisAPI.Repository Imports data from an XML file into the current BlockSim project. Returns a Boolean value; when true, indicates a successful import. Remarks: The XML file can include the block properties and information on how the blocks are connected in a reliability block diagram or fault tree diagram. Data on visual aspects, such as diagram style settings, block style settings, etc., are not supported. - Required. String. The complete path to the XML file to be imported. This example assumes that an XML file called "BlockSimData.xml" exists in the C: drive. The code ignores the return value. VBA|VB.NET 'Declare a new Repository object and connect to a Synthesis repository. Dim MyRepository As New Repository MyRepository.ConnectToAccessRepository("C:\RSRepository1.rsr10") 'Import the data from the XML file into project #1 in the repository. MyRepository.Project.SetCurrentProject(1) MyRepository.BlockSim.ImportBlockSimXMLFile("C:\BlockSimData.xml")
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224648245.63/warc/CC-MAIN-20230602003804-20230602033804-00392.warc.gz
CC-MAIN-2023-23
1,015
7
https://creativedivergents.com/2010/12/constellation-of-one/
code
See the full artistic statement and description of my first large-scale sculpture by following the link below. This project was funded by the artist and community donations. About Creative Divergents All submissions prior to 2014 have been reposted by Creative Divergents. To have your previous entries associated with your current account, go to Claim Account.
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296948900.50/warc/CC-MAIN-20230328232645-20230329022645-00637.warc.gz
CC-MAIN-2023-14
361
4
https://forum.maxwellrender.com/viewtopic.php?p=399193
code
- Tue Feb 25, 2020 6:44 pm How awesome is this!!!! I do have one question suggestion (you'll hate me for it, I know, but I'm really curious)... In doing my own testing and work to integrate Substance with Maxwell, I find that the metal materials created by substance aren't as good as those created in Maxwell. This has led me to exporting the metal map, tweaking it, and using it as a layer mask over a Maxwell Metal Material. It is a clumsy process and doesn't look great without a lot of work, but, when it's done right, it looks really good. So, my question is, how will you be handling metals? Let's say you have an aluminum material with paint on it and the paint is being worn off the edges. Will the underlying aluminum layer look like it would if we just created an aluminum material in Maxwell?
s3://commoncrawl/crawl-data/CC-MAIN-2020-50/segments/1606141748276.94/warc/CC-MAIN-20201205165649-20201205195649-00177.warc.gz
CC-MAIN-2020-50
804
5
https://stream.liv.ac.uk/9q2apscq
code
About this video This is a video showing how to create a meeting in Adobe Connect if you have a license. Please note the video unfortunately has no sound, it is just for demonstrable purposes. 1: URL - Connect.liv.ac.uk 2: Login (MWS username/password) 3: Select 'create new meeting' 4: Fill in the room request form 5: Invite University staff (set their participation status as either Host/Presenter/Participant) 6: Enter the room via the 'Enter' button or URL (Distribute the URL to guests) 7: Invited members will receive an Outlook Calendar Event 8: Begin conference Please login to leave comments.
s3://commoncrawl/crawl-data/CC-MAIN-2021-21/segments/1620243988882.94/warc/CC-MAIN-20210508151721-20210508181721-00088.warc.gz
CC-MAIN-2021-21
602
11
https://priorart.ip.com/IPCOM/000236556
code
A System and Method to Model User's Behavior in Online Social Networks with MapReduce Publication Date: 2014-May-02 The IP.com Prior Art Database Disclosed are a method and system to model user’s behavior in Online Social Networks (OSNs) with MapReduce that scales with regard to the social network size, allows real-time updates on the graph representation of the social network, allows updates through streaming data, and hence allows adaptive modeling and evolution of the models. Page 01 of 6 A System and Method to Model User ' Online Social Networks (OSNs) are a widely used tool of information diffusion , a process for widely spreading a new idea or action through communication channels . Large OSNs are useful for studying information diffusion as topic propagation in blog space, linking patterns in a blog graph, favorite photo marking in a social photo sharing service, among many other domains. In this context, modeling user's behavior on these OSNs becomes an interesting problem due to the variety, complexity, and abundance of data within online media . Agent-Based Simulation (ABS) is one type of modeling that is consistent with the sciences of complexity. Agents are autonomous entities capable of acting without direct external intervention. Multi-agent systems can handle the complexity of solutions through decomposing, modeling, and organizing the interrelationships between components. Hence, methods can model each user behavior independently based on the available OSN data. Big data plays a very important role when modeling OSN. For instance, a single social network can generate millions of posts per day. A method is needed to build agent-based models using a massive amount of data and very large networks . The novel contribution is a MapReduce*-based solution for building agent-based models with massive amounts of data. Since its first seminar paper about MapReduce, there are many other works proposing the use of MapReduce framework for a wide different type of problems . Common to all of these works, the main applications is to scale out data analytics workloads in cheap clusters. The proposed solution is different from existing works because it scales multi -agent based simulation of large social networks. This method is the first to address the problem of building agent-based information diffusion models on large OSN using the MapReduce framework. The core idea of is a method and system to model user's behavior in Online Social Networks (OSNs) with MapReduce that scales with regard to the social network size, allows real-time updates on the graph representation of the social network , allows updates through streaming data, and hence allows adaptive modeling and evolution of the models. The method is composed of three jobs : 1. User's states computation 2. User's transition computation 3. The computation of the pattern recognition of the transitions With these jobs, it is possible to separately store the user's states, the transitions, and the patterns. Therefore, any changes and evolution on the user's states and transitions '''s Behavior in Online Social Networks with s Behavior in Online Social Networks with Page 02 of 6 can be recomputed for the user and the associated network , rather than to the full network. Moreover, big networks can be computed in a distributed environment . Figure 1: Overview Figure 1 shows the MapReduce-based proposed solution from a macro perspective . For each user, the...
s3://commoncrawl/crawl-data/CC-MAIN-2018-13/segments/1521257647892.89/warc/CC-MAIN-20180322151300-20180322171300-00204.warc.gz
CC-MAIN-2018-13
3,474
24
https://community.cisco.com/t5/collaboration-voice-and-video/jabber-config-file-generator/tac-p/3112626/highlight/true
code
Please find the attached HTML document, download and open it on your PC. This provides an easy to use form where you simply answer a few questions and it will render the proper jabber-config.xml file for you to copy/paste. There is built in logic to verify you are entering in the correct information for the deployment selected, as well as valid XML characters. Update 2015-07-09: Updated with 11.0 keys, testing new automated method to mine key values from public facing documentation, new UI. Feedback on the new UI is welcome Update 2015-03-12: Update default selection for new keys. Update 2015-02-18: Added more keys from 10.6. Update 2015-01-28: Update for 10.6 keys. Update 2014-12-17: Update value generation when using reserved characters (&/&) so that only substitution takes place once. Update 2014-11-19: Reworked the Jabber-Plugin additions, relaxed hostname verification, more import enhancements, updated missing keys in 10.5, corrected default value selection. Update 2014-10-22: Updated CSS, corrected a few default values to match updated documentation and user comments in this forum, enhanced import function, added optional Telemetry Suggestion from existing data. Update 2014-10-09: Added text import of existing jabber-config.xml file to pre-populate the form (works in FireFox & Chrome, IE not tested). Removed SHA Hash generation of TelemetryCustomerID field. Update 2014-08-29: Added 10.5 J4W keys which should apply to the other 10.5 releases as well, with additional logic to aid with some of the more complex key configuration. Update 2014-05-12: Modified UI slightly, also corrected problem with checkbox inputs Update 2014-05-09: Updated logic to include PhoneMode keys for versions past 9.2; although not all clients support PhoneMode yet. Update 2014-04-24: Corrected misspelled keys, and validation errors. Update 2014-04-21: Added J4W 9.7 specific fields, as well as simplifying data entry for BDI fields. If using BDI, simply make sure you've selected OSX, iOS, or Android, and the script will copy whatever fields you have entered for the EDI integration, and automatically create the BDI specific keys for you. Update 2014-01-02: Added partial Mac 9.2 specific fields for BDI, Windows 9.6 specific fields. Update 2013-07-25: Modified Search Base validation logic to include the default CN in addition to OU's Update 2013-05-17: Added 9.2 specific fields. Update 2012-12-29: Added 9.1 specific fields and implented version switching for it to work with both 9.0, 9.1, and any future version dependent fields Update 2012-08-16: resolution to CSCua39052 in Jabber 9.0(4) resolved the Base Filter open/close bracket problem. Updated validation tests to reflect this change. As such, this script will only work for Jabber 9.0(4) and later when using a custom Base Filter; if using Jabber prior to 9.0(4), simply remove the last closing bracket in the Base Filter tag before uploading to TFTP. Hi all. We need to emulate an environment that is currently sitting on VCS version 8.9.2 with two VCS C's and two E's but I am struggling to find out how to go to 8.9.2 - there is no OVA on the Cisco downloads or upgrade file that I can see?&nb... I am looking for a MIBs that can report on various dial-peer configuration items on CUBE's. Following this document, I found the following OIDS:DIAL-CONTROL-MIB::dialCtlPeerCfgOriginateAddress Hey, I just installed Unity 12.5 and uploaded some licenses to it using the offline method with the authorization code etc. In the "smart" license area of my licenses shows I have lots of these, but in Unity GUI under licensing I get "No License in Use " ... Hello, New to all this and I have a question. I have 6 users. 3 are in a Hunt group. Using CUCM 11.5 and CUC 11.5.1. Working so far is: Call comes in and hits the route point goes to Call Handler in Unity, Plays Greeting, goes back to Hunt ... Hello everyone, I'm a newbie on the topic of script creation, the idea is to read a database, call contacts and touch a prompt, all that works correctly, but the question is how can I measure the duration of that call ?, since the user can listen to part ...
s3://commoncrawl/crawl-data/CC-MAIN-2019-47/segments/1573496670448.67/warc/CC-MAIN-20191120033221-20191120061221-00443.warc.gz
CC-MAIN-2019-47
4,129
24
http://icyspherical.blogspot.com/2010/07/why-resthttp-based-client-side.html
code
Over the last few years I've written various methods to integrate or decouple parts of the snowglobe viewer to add scriptable features. C++ is good for a lower-level optimization, yet there is so much already written in C++ for the viewer that doesn't need to be in C++. There is also the need to separate tasks being done in the main loop of the viewer that doesn't need to be done in the main loop. Eventually, after several models and rewrites, the REST/HTTP based API has helped overcome many obstacles that other usual methods fail. I'll get to the Client-Side Scripting features in later, yet we have to dig deep to understand some concerns before the desired features to understand why choose REST/HTTP. The REST/HTTP/XML based API automatically deals with one major concern and that is byte size and byte order. I've tried GObjects, P/Invoke, and few other methods. We could complain about trashed code that works until you understand how high I set the bar for desired functionality. Byte size and byte order seems to be the major gotcha even for those that claim otherwise. I still see those that want language agnostic and platform agnostic interfaces yet choose something that isn't so agnostic about byte order. They may hate XML until they understand how it guarantees machine-readable data structures. Some still tend to think that those data structures must be transferred in XML. Let's make this easy, here is a default REST/HTTP/XML interface that guarantees its agnostic ability. From there, add other paths that maybe stream more native or shared formats. The next concern on the table to put the renderer into a shared library. I have done this, once. There was much that needed to be manually updated source wise for every update to the upline repository. The only way to end this time consumption to manually update it was to minimize any customization to the viewer source. This meant being able to have the user interface totally separate from the scene renderer. The tricky part to keep in mind is the ability to swith to fullscreen where the window overlays aren't being controlled by the desktop anymore. I've already tested new code to do such overlays and set it aside until the REST interface is more complete. Being able to create the shared library again should be easier to maintain now with the minimization done. The touched code went down from over 150 files down to about 10. The shared library of LL code should help to further embed the renderer instead of extra source changes to load an arbitrary custom library from the viewer now. What I did in the past was to have C# load LL code as a shared library and control its main loop. A few GObjects can do well here for this shared library initialization and loop control. Some are concerned that REST/HTTP is too slow for method calls. That really depends on design of each call. One shouldn't expect to do thousands of object updates every frame by separate individual methods calls when one could more optimally setup a shared memory area and burst that updates at blit speed. For now, I've implemented a simple burst mode where if two or more calls on the REST/HTTP queue or about to be sent individually that the code is smart enough to combine them into a single call for multiple queries. That was needed now because the current implementation of the main render loop only addresses the network every frame. That network poll per frame is a major bottleneck. The combined queuries easily overcomes that. Asynchronous interaction between different objects in code become more and more desired. The main loop of the renderer is based on synchronous optimization to avoid locks. As the components are separate out there is the question of data states when queried. If data is accessed at the wrong time in the main loop then it could be in the wrong state. Direct hooks worked fine, yet only if one hooks into the loop at proper time to access the data. This kind of documentation is not obvious in code no matter how well written in such synchronous style on such large source code base. The REST interface allows asynchronous calls in and out and dispatches as needed. The asynchronousity allows a more modular design in code. Now several threads can simple use the REST interface to manage these kinds of tasks instead. In a common sychronous design there tends to be custom code at every point of the way to test for proper states. A generic REST design (even without HTTP) doesn't suffer such state conflicts as typical SOAP design. I could surely rant about a few more areas. The above I tend to often repeat in one way or another.
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917121305.61/warc/CC-MAIN-20170423031201-00626-ip-10-145-167-34.ec2.internal.warc.gz
CC-MAIN-2017-17
4,630
7
https://forums.visual-paradigm.com/t/use-case-packages/9944
code
I am new here, I am currently undetaking a 3rd year dissertation for the construction of a web site. I am drawing my use case diagrams. I have a few questions: Firstly, can use cases be drawn in levels. I.e. a high level use case, then lower levels. Secondly, if i create lots of lower level use case diagrams i.e. outlining specific tasks, can these be placed in packages to show the high level use case? Thanks very much
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570879.37/warc/CC-MAIN-20220809003642-20220809033642-00118.warc.gz
CC-MAIN-2022-33
422
4
http://www.w3.org/TR/PNG-Compression.html
code
Deflate-compressed datastreams within PNG are stored in the "zlib" format, which has the structure: Compression method/flags code: 1 byte Additional flags/check bits: 1 byte Compressed data blocks: n bytes Check value: 4 bytesFurther details on this format are given in the zlib specification [RFC-1950]. For PNG compression method 0, the zlib compression method/flags code must specify method code 8 ("deflate" compression) and an LZ77 window size of not more than 32K. Note that the zlib compression method number is not the same as the PNG compression method number. The additional flags must not specify a preset dictionary. The compressed data within the zlib datastream is stored as a series of blocks, each of which can represent raw (uncompressed) data, LZ77-compressed data encoded with fixed Huffman codes, or LZ77-compressed data encoded with custom Huffman codes. A marker bit in the final block identifies it as the last block, allowing the decoder to recognize the end of the compressed datastream. Further details on the compression algorithm and the encoding are given in the deflate specification [RFC-1951]. The check value stored at the end of the zlib datastream is calculated on the uncompressed data represented by the datastream. Note that the algorithm used is not the same as the CRC calculation used for PNG chunk check values. The zlib check value is useful mainly as a cross-check that the deflate and inflate algorithms are implemented correctly. Verifying the chunk CRCs provides adequate confidence that the PNG file has been transmitted undamaged. In a PNG file, the concatenation of the contents of all the IDAT chunks makes up a zlib datastream as specified above. This datastream decompresses to filtered image data as described elsewhere in this document. It is important to emphasize that the boundaries between IDAT chunks are arbitrary and can fall anywhere in the zlib datastream. There is not necessarily any correlation between IDAT chunk boundaries and deflate block boundaries or any other feature of the zlib data. For example, it is entirely possible for the terminating zlib check value to be split across IDAT chunks. In the same vein, there is no required correlation between the structure of the image data (i.e., scanline boundaries) and deflate block boundaries or IDAT chunk boundaries. The complete image data is represented by a single zlib datastream that is stored in some number of IDAT chunks; a decoder that assumes any more than this is incorrect. (Of course, some encoder implementations may emit files in which some of these structures are indeed related. But decoders cannot rely on this.) PNG also uses zlib datastreams in zTXt chunks. In a zTXt chunk, the remainder of the chunk following the compression method byte is a zlib datastream as specified above. This datastream decompresses to the user-readable text described by the chunk's keyword. Unlike the image data, such datastreams are not split across chunks; each zTXt chunk contains an independent zlib datastream. Additional documentation and portable C code for deflate and inflate are available from the Info-ZIP archives at
s3://commoncrawl/crawl-data/CC-MAIN-2021-39/segments/1631780055645.75/warc/CC-MAIN-20210917120628-20210917150628-00403.warc.gz
CC-MAIN-2021-39
3,151
11
https://flylib.com/books/en/1.237.1.93/1/
code
Secret-key encryption, also referred to as symmetric encryption, is designed to work on large amounts of data. As such, symmetric encryption code works on streams of data as opposed to arrays of bytes. When you wrap a stream of regular data inside a specialized encryption stream called a CryptoStream, data is encrypted on the fly as it is placed into the stream. The same is true of decryption; data is decrypted on the fly as it is read from the stream. As mentioned earlier, in symmetric encryption the key used to encrypt the data is the same key that is used to decrypt the data. As a result, the safety of the key is paramount. If someone were to obtain your key, not only could he decrypt your private data, but he could encrypt his own data as if he were you. Also, remember that to properly encrypt blocks of data using symmetric encryption, you need an Initialization Vector (IV) to allow the encryption algorithm to encrypt blocks with partial data from previous blocks to reduce the predictability of output. The code in Listing 15.1 shows the use of symmetric encryption and decryption to encrypt a message into a binary file on disk and then use another CryptoStream to read from the encrypted file. Listing 15.1. Symmetric Encryption and Decryption
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100583.13/warc/CC-MAIN-20231206031946-20231206061946-00558.warc.gz
CC-MAIN-2023-50
1,264
5
https://premium.wpmudev.org/forums/topic/coursepress-hanging-on-enrol-button-click
code
I am attempting to setup a test course and enrol to it as a test of the click flow and payment process. When I am logged in and click on enrol for the course, the program seems to hang with no feedback and I am presented with a blank popup window and cannot continue any further. This problem appears to persist through update to the latest version of the plugin. Can you advise on where to look? Perhaps I have not done enough to setup the test course?
s3://commoncrawl/crawl-data/CC-MAIN-2019-35/segments/1566027315809.69/warc/CC-MAIN-20190821043107-20190821065107-00415.warc.gz
CC-MAIN-2019-35
453
4
http://absolutepunk.net/showthread.php?t=3035661&page=2
code
I actually used to love his voice. I didn't listen to DYKWYA for a few years, and when re-listening, his voice was sort of hard to take. It didn't make the album unlistenable, it's far too good for that, but my love for it definitely diminished a little. Joy Division (my avatar is from "Control", as well). Hmmmm, I felt the other way. That's what I'd figured, being the original.
s3://commoncrawl/crawl-data/CC-MAIN-2016-07/segments/1454701163663.52/warc/CC-MAIN-20160205193923-00176-ip-10-236-182-209.ec2.internal.warc.gz
CC-MAIN-2016-07
381
4
http://www.crec.info/windows-10-help/
code
Windows 10 Help Windows 10 is Microsoft’s latest version which is available on all of its devices such as laptops, phones, tablets and Xbox. If you have run into a problem while using Windows 10 and don’t feel like taking your laptop or PC to the service center, you do not have to! Windows 10 is equipped with various built-in support apps and software. Getting help is easier than ever in Windows 10. The search box in the lower left corner besides the start menu helps you find information about how to use the device and discover several features that are available. If you have a complex issue which requires technical help and experience then you can directly contact Microsoft service center. Windows 10 comes with a built-in support app called “Contact Support”. In order to execute the app you can navigate to it through the search box or through Cortana virtual assistant if you would rather talk than write. Contact Support gives technical support to its users and directs them to the solutions efficiently and effectively. Once you find your specific issue on the main page, it would direct you to Microsoft’s team where you can get detailed help. If you do not like waiting for the Microsoft service agent to pick-up your phone call, Contact Support further provides you easier options, such as Microsoft community forums where you can post your query in order to get help in Windows 10. Or you can just setup a future estimated time when you would be available so the Microsoft team can contact time at that specific time. Sometimes, you may have an issue which even the Microsoft team cannot assist you with. In that case, posting your questions on multiple tech websites would be a better alternative or even searching through the already posted threads on those sites.
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917119120.22/warc/CC-MAIN-20170423031159-00210-ip-10-145-167-34.ec2.internal.warc.gz
CC-MAIN-2017-17
1,795
6
https://www.loveclosely.com/products/pink-jersey
code
$57.00 USD $69.00 USD Buy One, Get One 50% Off our Satin Collection As translated, "The Sun Rises in the East". The satin jerseys are a subtle luxury. We continue our concept of exotic cats representing Eastern culture. The gold and pink colors provide unique flash and are definitely standout pieces in any closet. The black provides a great essential. - INTERNATIONAL SHIPPING - FREE EXCHANGES & EASY RETURNS - SIZING DETAILS HERE Check our our shipping and return/exchange policy here.
s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600401614309.85/warc/CC-MAIN-20200928202758-20200928232758-00460.warc.gz
CC-MAIN-2020-40
488
7
http://mathematica.stackexchange.com/questions/tagged/script+manipulate
code
to customize your list. more stack exchange communities Start here for a quick overview of the site Detailed answers to any questions you might have Discuss the workings and policies of this site Possible to use Manipulate in GUIRunModal? Is it possible to use the widget created by ? I intend to run the file using ... Mar 15 '13 at 19:31 newest script manipulate questions feed Hot Network Questions Why is p for 8 times heads out of 21 flips not 8/21? How can I allow an user to edit a specific system file normally restricted to root? Make a code square with your favorite word Is it better to use a root password, or use 'sudo bash'? A word for saying things indirectly because you do not know the correct word Ragged edges vs. alignment Guided tours in English and Spanish languages. Why didn't they just take the ring to the Valinor? How to decline participation in team building activities Entering in Canada - visa coming late and tourist authorization Write the whole of the holed using the unholed Is it possible to shield a camera so as to record from the inside of a running microwave oven? A flight I booked months ago just got rescheduled dramatically, into a time that is not possible for me, what can I do? How durable is the insulation on magnet wire? Removing a string prefix What does Unix programming mean, exactly? How could we travel to the nearest supermassive Black hole? A fantastic excerpt for learning the usage of prepositions Survival type activies for Scout camp What is the terminal velocity of a sheep Apply function to every element of list regardless of depth Difference between a mortgage and buy-to-let in UK What's the best way to represent a number which is over/under a reference? Unable to pass a bash variable as a python argument in bash more hot questions Life / Arts Culture / Recreation TeX - LaTeX Unix & Linux Ask Different (Apple) Geographic Information Systems Science Fiction & Fantasy Seasoned Advice (cooking) Personal Finance & Money English Language & Usage Mi Yodeya (Judaism) Cross Validated (stats) Theoretical Computer Science Meta Stack Exchange Stack Overflow Careers site design / logo © 2014 stack exchange inc; user contributions licensed under cc by-sa 3.0 Mathematica is a registered trademark of Wolfram Research, Inc. While the mark is used herein with the limited permission of Wolfram Research, Stack Exchange and this site disclaim all affiliation therewith.
s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1406510273663.2/warc/CC-MAIN-20140728011753-00052-ip-10-146-231-18.ec2.internal.warc.gz
CC-MAIN-2014-23
2,430
54
https://cs.stackexchange.com/questions/126084/efficient-way-to-concatenate-strings-to-find-specific-split-up-values
code
I'm working with a list of objects ("Section") that contains a string value among other fields. The strings in all of the sections can be concatenated to form the complete text. I am, however, wanting to implement a method that searches for a specific (given) value and returns the Section object(s) it found the value in. There are however two different scenarios as described below. "John went to the restaurant to pick " ✔️ "up the food he ordered online before " "he went to his mother's house." Current behaviour: Found in Section 1 Desired behaviour: Found in Section 1 "John went to the restaura" "nt to pick up the food he ord" "ered online before he went to his mother's house." Current behaviour: Couldn't find the value Desired behaviour: Found in list(Section 1, Section 2) Scenario 1 is easily solved as the value is found completely in section 1. In the 2nd scenario, the value is never found as it is split up between sections. I have written an algorithm that tries to stitch these sections together. It appears to work when the given value is simple e.g., "car" or "boat". I'm having troubles with compound strings such as "the supermarket" or "a green flower". I wrote the code a couple of months ago and tried debugging it, but even I fail to understand my own code here. I deliberately left my code out of this post as it has rough hardcoded rules and has extreme levels of code complexity. I'd like to rethink the algorithm without looking at the current one to refrain from blatantly copying sections of the existing code. The code is written in Java in case anyone knows some handy Java functions that might help.
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100632.0/warc/CC-MAIN-20231207022257-20231207052257-00552.warc.gz
CC-MAIN-2023-50
1,640
14
https://space.stackexchange.com/questions/36568/exit-pressure-value-for-vacuum-nozzle
code
This question already has an answer here: What value of exit pressure should I use in the design equations for a small liquid rocket engine nozzle for 200km-500km operating conditions? Since using zero as a value is not possible or else nozzle size will be infinite what is the exit pressure that I should use for my nozzle and how do propulsion engineers do it? I guess engineers use a rather low altitude value and let the nozzle be under-expanded at vacuum conditions. I have checked out these atmospheric properties tableslink for the tables but using those values gives a huge nozzle which is impossible to design and use. So please help me find a value that I can use.
s3://commoncrawl/crawl-data/CC-MAIN-2019-43/segments/1570986702077.71/warc/CC-MAIN-20191020024805-20191020052305-00259.warc.gz
CC-MAIN-2019-43
674
2
http://egoboo.informe.com/forum/trying-to-fix-the-slippery-function-dt277.html?highlight=
code
Joined: 23 Dec 2007 Location: New Zealand |Posted: Sat Jan 05, 2008 1:24 am Post subject: Trying to fix the slippery function... |Hey, I got a problem understanding the code. First, something doesn't make sense to me. I was thinking that if( is_slippy ) would be changed to if(if_slippy) would fix it, but you know what happened? The menu got screwed up and the load player modules had starter modules as well as import modules. Why does that happen? What does if( is_slippy ) have to do with the menu? And second, why would slippery work in the gnome starter and not in the ask palace? Projects for Egoboo: Egoboo - Adventure edition Egoboo community job: Fixing bugs and game testing. Total code bug fixes: 3 Total game bug fixes (This season): 1
s3://commoncrawl/crawl-data/CC-MAIN-2019-13/segments/1552912202471.4/warc/CC-MAIN-20190320210433-20190320232433-00343.warc.gz
CC-MAIN-2019-13
748
10
http://worldwoman.net/text-complexity-analysis-worksheet/
code
Published at Tuesday, January 21st 2020, 04:19:37 AM. worksheet. By Maree Humbert. Kansas textity pd modules and math flipbooks common analysis worksheet tool examples. Text complexity analysis worksheet kansas pd modules and math flipbooks common examples for. Text complexity analysis worksheet qualitative measures rubric literary examples for.
s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600402127397.84/warc/CC-MAIN-20200930172714-20200930202714-00324.warc.gz
CC-MAIN-2020-40
347
2
https://stackoverflow.com/questions/30491766/how-do-i-expand-the-children-inside-a-button
code
I just updated to Fedora 22, and got with it Gnome 3.16. I'm running a small app of mine and I get a deprecation warning. The xscale property of the Alignment object is going away. There is a problem however, I can not expand the children of a button without it. I created this simple test code: #!/usr/bin/env python3 import sys from gi.repository import Gtk class Application(Gtk.Application): def __init__(self): super().__init__() self.connect('activate', self.on_activate) self.connect('startup', self.on_startup) def on_startup(self, app): self.window = Gtk.ApplicationWindow(application=app) self.window.set_position(Gtk.WindowPosition.MOUSE) self.window.set_default_size(600, 200) button = Gtk.Button(label='test') image = Gtk.Image.new_from_file('noimage.png') button.set_always_show_image(True) button.set_image(image) # I can't expand without this property bellow button.get_child().set_property('xscale', 1.0) self.window.add(button) def on_activate(self, app): self.window.show_all() if __name__ == '__main__': main_app = Application() exit_status = main_app.run(sys.argv) sys.exit(exit_status) You should see a small wide window, with a button in it, covering all of the window's available space. Inside the button you should see an invalid image icon on the left, and a text label on the right. I separated the image from the label using the xscale property, this expands the size of the Alignment object inside the button and gives more space for the label and image to expand apart. I'd like to know a way to achieve the same result without it. I used the gtk inspector (Ctrl+Shift+D while the app is running) and tried every sane, and less sane, property in pretty much all objects in that window, with no success. I tried my trusty search engine but couldn't find anyone with such a specific problem.
s3://commoncrawl/crawl-data/CC-MAIN-2019-47/segments/1573496668525.62/warc/CC-MAIN-20191114131434-20191114155434-00474.warc.gz
CC-MAIN-2019-47
1,819
6
http://aaronstechcenter.com/pros-cons-automatic-garbage.php
code
Pros and Cons of Automatic Garbage Collection Take any group of application developers, and ask them what their opinion of automatic garbage collection is. Undoubtedly, at least one person will have some very strong reasons for the dislike of automatic garbage collection. While some of their reasons may be somewhat legitimate, most of their opinions are more likely misconceptions, based-on older versions of garbage collectors, or just myths. The purpose of this essay is to examine the pros and cons of automatic garbage collection, while disregarding the prevailing myths. The advantages of automatic garbage collection (hereafter known as AGC) are not always apparent. There is the obvious increased speed of development. With AGC, developers can spend more time solving the actual problem at hand, and less time allocating, reclaiming, and keeping track of their memory usage. Another advantage of AGC is that you have a reduction in memory leaks (allocated memory that is unable to be reclaimed). Of course, someone who is an expert (in their chosen language) could succeed in writing manual memory management that runs perfectly. But the facts remain that manual memory management requires human intervention, and humans inevitably make mistakes. Therefore, the potential for memory leaks is actually lower when a developer just allows AGC to do its job. This next advantage actually counters a well-propagated myth about garbage collection: that it is performance intensive. In fact, some researchers have noted that AGC actually uses less CPU cycles than manual reclamation. Microsoft researcher Benjamin Zorn noted that manual memory reclamation has an amount of CPU overhead that is “comparable” to AGC (Zorn, 1993). AGC has come a long way since that publication. Additionally, the system determines the best time for AGC to happen. Calling a destructor at the wrong time has the potential for performance implications. While garbage collectors of the past may have significantly hindered performance (Java, prior to version 1.2), most modern AGC's are quite in-obtrusive. With all of the myths and misconceptions out there, listing the disadvantages of AGC is a difficult task. The biggest that I can see, is that the lower levels of memory management are abstracted and hidden from the developer. This provides little to no opportunity for improvement of resource usage. Additionally, if a memory leak should happen to occur (however rare) debugging and fixing it becomes a very difficult task. However, there are some applications for which AGC is not desirable. A daemon, or program that runs in the background of a server would not do well with AGC. This is because servers are meant to run all of the time, which in-turn means that the daemon will run all of the time. If there happened to be a memory leak that AGC could not solve, that program has a very good chance of running long-enough to consume all available memory. Of course, that would have the added effect of degrading performance for everything else running on that server, as well. A daemon with a memory leak is an even bigger (potential) problem on a Windows server. Windows servers are usually rebooted on a regular or semi-frequent basis. This means that the daemon would most-likely be periodically restarted (forcibly reclaiming memory) and making the problem more-difficult to find. By comparison, a Linux server could potentially run for several months without a reboot (only required for updates to the Linux kernel). Thus, a similar daemon with the same problem is more-likely have an opportunity to fail and be discovered in a Linux environment. While the potential for a memory leak in a program (written in a language with good AGC) is quite rare, there is another reason as to why it is not preferable to use AGC while writing server daemons. While in the background, a daemon can go idle for extended periods of time. During this time, the chance is great that the daemon's memory will be swapped-out to disk. If AGC were to run while the memory is in the swap space, the potential exists for a noticeable degradation in performance, as reading from the disk is significantly slower. In conclusion, I believe that there is a time and a place for both manual reclamation and automatic garbage collection. During my research for this essay, I noted that there is more misguided opinion out there than actual fact. As the future of application development progresses, we will see further advances in garbage collection algorithms and techniques, making the use of AGC even faster and safer than it already is. Sure, there are some who will still hold to their opinions and believe that they can manage their own memory reclamation better themselves. As for me, I believe that it is best to not get in-the-way of letting the system do what it was designed to do. Stephen Leibowitz, (2004), "Automatic Garbage Collection in Java and C++", https://googledrive.com/host/0B8HeaZzKMqdWZ3Z4bDRFUXg1ekU/CPP_Java/AGC.html Brian Goetz, (Jan 2004), "Java Theory and Practice: Garbage Collection and Performance", http://www.ibm.com/developerworks/java/library/j-jtp01274.html Ian Kaplan, (Dec 2005), "Memory Allocation and Garbage Collection", http://www.bearcave.com/software/garbage.htm Ravenbrook Ltd. (2001), "Memory Management Reference FAQ", http://www.memorymanagement.org/faq.html Benjamin Zorn, (July 1993), "The Measured Cost of Conservative Garbage Collection", http://eprints.kfupm.edu.sa/70498/1/70498.pdf
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446711417.46/warc/CC-MAIN-20221209144722-20221209174722-00554.warc.gz
CC-MAIN-2022-49
5,508
15
http://www.debate.org/opinions/has-microsoft-ruined-skype
code
I am a Skype veteran who broke my neck 12 years ago I use Skype pretty much every day all day talking to another paralyzed friend I have Skype out and a Skype number. They have totally wrecked everything about it you can even make two-way calls have to time anymore definitely thumbs down I have a $6 credit on Skype but I guess I'll never get to use it, because MSFT has no idea what federated identity is, or OpenID. Instead, they require you to give them the password to your email account (e.G. Gmail) in order to "link" your email to your Skype account "for recovery purposes." Yeah, sure... It's not so that they can crawl your gmail in order to give you targeted ads on Skype. I guess I'll just forfeit that $6 credit and find a Skype alternative. I'll never sign into Skype again. Why isn't there an open-source version of Skype, at least for Internet-only connections? Skype used to be quick, it would get out of the way, it was simple and easy to use. Now it takes time to start up, takes time for exit conversations, it's laggy. Skype now doesn't close when you tell it to it instead minimises and their isn't an obvious way to tell it to close. I finally found the old conversations but loading them is slow and they are also incorrect. I feel like everything microsoft has done to Skype has just made it worse. Microsoft are like Heat Mizer on steroids. Everything they touch turns to a particularly offensive pile of excrement. The new account sign-up process is now abysmally invasive and convoluted. The software has become so bloated and resource-hungry it's almost not worth running. Sadly, Skype has a practical monopoly and it's virtually impossible to just say "screw it" and use another product. Suddenly Microsoft decided they would take away my photo, disappear my paid credit and generally make my life miserable. I have created whole new accounts on a new computer in hopes that I can get away from their tentacles. I called and cancelled my Microsoft account -- on that I had never, to my knowledge, even opened. They keep denying my passwords and generally making my life miserable. Have used it for years... But ever since MS took it over, it's been downhill. My first gripe was the stupid ads that would cause you to not be able to start typing (because it was still loading the ad), and recently it will simply freeze up randomly and require a restart. Add to that its insatiable need for resources and you've taken a decent program and turned it into garbage. Oh and BTW, STOP PUSHING SKYPE HOME... Nobody like you Skype Home... Go away! 1. It is now much more difficult to locate contacts who are not on Skype. 2. Skype now disconnects a person in the middle of a conversation when they run out of money. 3. Money runs out fast since my payments are limited to 600 yen. 4. The old interface was much more user friendly. Microsoft tries to force us to only communicate with other Skype users. 5. Microsoft doesn't set things up from the users (customers) point of view. So to hell with Microsoft. WHAT IS A GOOD ALTERNATIVE TO SKYPE? I click a name it crashes ctrl alt del and its still there once i finally re open it it asks me to update it i click update then i get cant because some microsoft programe isnt on my pc its going same way now as yahoo messenger i stopped using that when they ruined it soon il stop with skype Have you ever tried to recover an account that ms have decided for some unknown reason is being used by someone else !!! Have they never heard of people using VPN !!! And because I can't remember what colour socks I was wearing on the day I created my account, it has now been locked . Thanks Microshite - its less hassle to get my bank password reset !! Like everything they lay their fangs on, they managed to ruin Skype as well. They could just have done LITERALLY nothing and it would still be great. A couple of programmers managed to develop and update that thing flawlessly and got themselves a massive customer base. Then a multi billion dollar company buys it and it's riddled with bugs and glitches, riddled with ads, uses up gigabytes of RAM, uses up big amounts of bandwidth when idle, stripped of its most basic features (can't even see the name of a person in a group chat just a profile pic for example), terribly laggy and unresponsive, and so so so many other things wrong with it. Microshit really had to try to ruin this once great piece of software. Putting two skilled developers on it would have been enough to keep it good. There are lots of new bug in Skype after Microsoft has taken it over * Message sequence is incorrect * Read messages show as unread even after a reply * mark as read not working * copy-paste can crash it * it raised an update in December-2016 and erased all my history, * really really slow * crashing ofter * Login issues I don't really agree with the fact that skype is ruined, i think skype is still one of the best communication tool out there. It is decreased its usage in USA, but in other countries Skype still remains on top. Also we must consider all the similiar companies like tango as well which one other reason why we forgot skype.
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320570.72/warc/CC-MAIN-20170625184914-20170625204914-00496.warc.gz
CC-MAIN-2017-26
5,151
34
https://zfnd.org/the-zcash-foundation-welcomes-a-new-engineering-project-manager/
code
The Zcash Foundation is very excited to welcome Pili Guerra as our Engineering Project Manager. Pili has 15 years of experience working in the tech industry as a software developer, solutions engineer, consultant and project manager. She has previously worked at the Tor Project as a Project Manager for the Tor Browser, Community and UX Teams. Before that she was at Red Hat, a leader in the open source world, working as a solution engineer. Pili has worked for a variety of companies varying in size from successful startups to Fortune 500 companies. Pili is passionate about Open Source Software and in particular software for the common good and feels privileged and excited that she gets to work with nonprofits, working towards enabling the right to privacy for people everywhere. She is looking forward to helping the Zcash Foundation’s engineering team to release the first alpha release of Zebra and accelerating any future releases and projects.
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100056.38/warc/CC-MAIN-20231129041834-20231129071834-00098.warc.gz
CC-MAIN-2023-50
958
3
https://grokbase.com/t/python/python-list/111ncs81bq/htsql-2-0-rc1-a-query-language-for-the-accidental-programmer
code
Kirill Simonov and myself would like to introduce HTSQL, a novel to relational database access which is neither an ORM nor raw SQL. HTSQL is a URI-based high-level query language for relational databases. It's implemented as a Python WSGI application. Currently it supports PostgreSQL and SQLite (more databases & juicy features forthcoming). At this point, HTSQL 2.0 may not be mature enough for production use; we expect to fill in any remaining gaps in the coming months. We're curious what you think. Join us in #htsql on freenode , to the mailing list and please come to our PyCon 2011 talk . Clark & Kirill
s3://commoncrawl/crawl-data/CC-MAIN-2021-49/segments/1637964362999.66/warc/CC-MAIN-20211204154554-20211204184554-00331.warc.gz
CC-MAIN-2021-49
613
10
https://msdn.microsoft.com/library/windows/apps/microsoft.phone.shell.applicationbar.defaultsize(v=vs.105).aspx
code
[ This article is for Windows Phone 8 developers. If you’re developing for Windows 10, see the latest documentation. ] Gets the distance that the Application Bar extends into a page when the Mode property is set to Default. The current value of DefaultSize is 72.0 pixels. Windows Phone OS Supported in: 8.1, 8.0, 7.1
s3://commoncrawl/crawl-data/CC-MAIN-2016-07/segments/1454701159985.29/warc/CC-MAIN-20160205193919-00051-ip-10-236-182-209.ec2.internal.warc.gz
CC-MAIN-2016-07
319
5
https://docs.zyte.com/zyte-api/reference/ui/ide/devtools.html
code
Smart Browser DevTools# Smart Browser DevTools is a view of the Smart Browser DevTools IDE to debug custom browser scripts. To access Smart Browser DevTools, follow the instructions at Debugging a script. Smart Browser DevTools offers the following nested tabs: Browser Tools, open by default, shows: At the top, a web view of the target URL where you can see your interaction at work in real time. At the bottom, Chrome DevTools, for debugging. Request Details offers the following nested tabs: Logs shows timestamped log messages. Actions shows the run time, status and error details of your interaction. Stats shows some stats about the processing of the request. Raw Response shows the response that you would get from Zyte API.
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296944606.5/warc/CC-MAIN-20230323003026-20230323033026-00064.warc.gz
CC-MAIN-2023-14
732
12
http://tex.stackexchange.com/questions/tagged/tabbing+algorithms
code
TeX - LaTeX TeX - LaTeX Meta to customize your list. more stack exchange communities Start here for a quick overview of the site Detailed answers to any questions you might have Discuss the workings and policies of this site TeX - LaTeX Controlling vertical space within a “tabbing” environment I'm using the "tabbing" environment to typeset algorithms. Because I'm using math formulas within the algorithms (yes I know about specific packages to do this), the vertical space needs a bit of ... Oct 6 '11 at 17:45 newest tabbing algorithms questions feed Hot Network Questions Should this be written with exception handling instead of nested if-thens? What's the inspiration for the owlbear? Is the possibility of Harry being named Elvendork from the books? How can I resize the color thumbnails in Illustrator's swatch panel? Is my coding technique progressing in terms of C# loops? Time complexity of a compiler How much extra time should I reserve to enter the US from Canada with the Windsor-Detroit Tunnel Bus as a European VWP citizen? expl3 code with tabularx Mandelbrot image in every language Why does the STD not decrease when I do more measurements? Why is 未有 used here? Which one and why? don't or not to Maintaining a bunch of generic functions Performing user studies on blind and other disabled users How to respond to "Why shouldn't we hire you?" Does a Windows 7 update bundle for USB exist? What is $DISPLAY environment variable Word for a person who loses or has lost faith? Why did Dumbledore put students in danger by not removing the vanishing cabinet from the Room of Requirement? How do I get two mathrings centered over a variable? Is the shell permitted to optimize out useless terminating commands? Should I add sound effects to my web site? What is a tactful way to address colleague's lack of cooperation with a project? What happens if I fart on someone's balls? more hot questions Life / Arts Culture / Recreation TeX - LaTeX Unix & Linux Ask Different (Apple) Geographic Information Systems Science Fiction & Fantasy Seasoned Advice (cooking) Personal Finance & Money English Language & Usage Mi Yodeya (Judaism) Cross Validated (stats) Theoretical Computer Science Meta Stack Overflow Stack Overflow Careers site design / logo © 2014 stack exchange inc; user contributions licensed under cc by-sa 3.0
s3://commoncrawl/crawl-data/CC-MAIN-2014-10/segments/1394011017001/warc/CC-MAIN-20140305091657-00042-ip-10-183-142-35.ec2.internal.warc.gz
CC-MAIN-2014-10
2,342
55
https://blog.hunterlab.com/blog/easymatch-qc/backing-up-data-in-easymatch-qc/
code
FAQ: “What is the best way to back up data from the EasyMatch QC software?” There are several ways to backup the data from the EasyMatch QC software. First note that data is stored two ways in the EasyMatch QC software. First, any and all standard and sample measurements that are taken are stored in the database. Second, data can be stored in EasyMatch QC in Jobs. Jobs contain specific sets of standards and samples that the user defines. For example you might have a product ‘Blue’ and you would have a ‘Blue’ Job that contains the Blue standard and then all sample measurements associated with the Blue product. You will have to discuss with your colleagues how exactly they wish to back up their data, i.e. if they would prefer to back up the data stored within the Jobs or just store measurements. At the very minimum it is recommended that you back up the database. To identify the database that the EasyMatch software is currently using open the software and go to Options/ System Configuration/ Data Storage. A new window will open. One of the fields in this window is Database Name, and the space to the right of this identifier indicates the path and name of the current database being used. For EasyMatch QC software V 4.00, the database should be located at C:\Program Files\HunterLab\EasyMatchQC\Jobs. For EasyMatch QC V 4.20 and above, it will be located at C:\HunterLab\EasyMatchQC\Jobs. The EasyMatch QC database is stored as a Microsoft Access Database (a .mbd file.) If your colleagues wish to also back up all jobs that they use, you can simply back up the whole Jobs folder at the location described above. Mr. Philips has spent the last 30 years in product development and management, technical sales, marketing, and business development in several industries. Today, he is the global market development manager for HunterLab, focused on understanding customer needs, providing appropriate solutions and education, and helping to solve customer color challenges across these industries and cultures.
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652663035797.93/warc/CC-MAIN-20220529011010-20220529041010-00735.warc.gz
CC-MAIN-2022-21
2,034
8
http://www.m3post.com/forums/showpost.php?p=13306016&postcount=8
code
Originally Posted by Andrew@ActiveAutowerke From what I have gathered just clearing adaptions on a stock ecu usually produces another 5-10 whp. Clear it and see what happens. Sometimes you'll lose power when cleared. Sometimes it takes 20 runs to get it to adapt and make even more power. Glad you are enjoying the tune and test pipe OP. I thoroughly enjoyed watching the second video and the exhaust looked fantastic in person!
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917119838.12/warc/CC-MAIN-20170423031159-00368-ip-10-145-167-34.ec2.internal.warc.gz
CC-MAIN-2017-17
428
5
https://skysonginnovations.com/technology/causal-rule-learning-for-combat-information/
code
Combat groups like the Islamic State of Iraq and al-Sham (ISIS) have taken the lives of thousands as they attempt to gain control of more cities. In order to stop ISIS’s oppression and tyranny, it is necessary to determine their method of military operation. Therefore, there is a need to create a model that accurately depicts and simulates the military tactics that ISIS uses in order to prevent more casualties and deaths of innocent civilians. Researchers at ASU have developed software to analyze group behavior, especially that of combat groups (e.g. ISIS). The data-driven software uses annotated probabilistic temporal (APT) logic combined with causal reasoning (i.e. for a given action, what the potential causes are). The software determines probabilities for various cause-and-effect scenarios based on over 2000 incidents of ISIS military activity. Overall, the software uses the data to develop a set of actions ISIS may take based on a specific provocation. - Predictive software - Military decision-making - Policy creation Benefits and Advantages - Predictive – Data collected from 2200 military incidents drives an APT-logic, rule learning, and causal reasoning algorithm to identify cause-and-effect behavior rules concerning ISIS’s actions - Faster – The improved process removes extraneous cause-and-effect combinations from computation, dramatically reducing algorithm run time - Innovative – The novel software represents a purely data-driven study of ISIS that combines a causality framework with APT logic For more information about the inventor(s) and their research, please see:
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233511424.48/warc/CC-MAIN-20231004220037-20231005010037-00211.warc.gz
CC-MAIN-2023-40
1,614
10
https://www.agileambition.com/pmi-acp-retrospective/
code
I feel similarly about my PMI-ACP certification as I do my college degree. Some years ago, I decided that I’d pursue some agile-based certifications as a means to challenge myself and expand my skillset. If some committee has convened and defined a body of knowledge worth learning, that seems like a good enough place to start. A more difficult decision was which certification to select as my objective. In my estimation, there were four primary certifying bodies. PMI, Scrum Alliance, Scrum.org, and IC Agile. I evaluated the options based on several criteria. Given that one goal of obtaining certification is to secure future employment, I put on my hiring manager hat to consider which certificate might hold more clout than others. I spoke with certified contacts that to gauge how valuable they found the experience. I researched the prerequisites and testing procedures of each certification to determine which ones might seem more stringent. I was looking for a certification that was exam-based but wouldn’t break the bank. I managed to narrow it down to the PMI-ACP vs. the Scrum Alliance’s CSM. I opted for PMI-ACP for four reasons: Job postings in my local area (even for agile positions) primarily require the PMI-PMP. Having the agile alternative to that certification seemed a good compromise. The Project Management Institute is a recognized name, but the material was agile-focused. The PMI-ACP requires you to have a minimum number of hours working on real-life projects. In this way, the certification would also serve as a verification of my experience, not just the mere fact that I can study and pass an exam. PMI-ACP covers multiple agile approaches. Alternative certifications focus on just Scrum or just one aspect of the agile mindset. I felt the formality of the exam itself somehow added clout to the certification. Test takers must show up at a test center and verify their identity before sitting the exam. I totally over-prepared for this exam. Self-doubt lulled me into studying through most of my eligibility window (which is one year). In retrospect, that was most certainly overkill, but the extra knowledge gained can only help me in my career. To meet the PDU requirements to sit the exam, I purchase the Agile PrepCast podcast course. I cannot say enough great things about this course. I listened to it while I was running, mowing the yard, and driving to work. I loved Cornelius Fichtner’s voice. He has a slightly cheesy sense of humor, but if you’re reading this blog, you can probably guess that’s right up my alley. If you’re looking to meet the required PDUs and prepare for the exam, I totally recommend you check these guys out. The majority of my book-based learning focused on the following three books: I also read or browsed several of the books that were on the PMI-ACP reading list at the time: The process of being seated for the exam is about what you’d expect if you’ve taken other proctored exams. You have to show some ID, put all of your personal and electronic bits in a locker, and submit to being frisked. The overall process was similar to my experience taking the GRE. They may have been more frisking involved, but additional safeguards are warranted given the leaps and bounds of camera technology. Shit got real once I was seated in front of the computer and took the first five or so questions. There is a good chance that it was a side effect of my anxiety and fear of failure, but the inquisitors might as well have written the questions in a different language. Several of my study materials helped set expectations for how the exam would word questions and provided techniques to reason through and identify the correct answer. I’d also taken several practice tests and thought I had a grasp on the convoluted wording. However, as I sat there taking the actual exam, I couldn’t help but feel like a trickster god had written some of these questions. I obviously can’t share an actual question from the exam with you, so as an example, I’ll use a question based on one of my favorite book series. Ron Weasley was one of seven children. Two of his siblings were twins. His youngest sibling married Harry Potter. The song singing headgear that directed Ron to Gryffindor was of what hue? - A.) Blend of blue & orange - B.) Pink - C.) Blend of blue and orange with patches - D.) Horcrux I’ll share my thought process behind answering this question. As I first begin to read the question, I assume this must be something about Ron’s other siblings that aren’t named. The actual question, though, has nothing to do with the whole first part about the siblings. That’s annoying and makes me question my sanity for a few seconds. I have no idea what “song singing headgear” is; I’ll just ignore that tidbit for the time being. Isn’t hue just a fancy word for color? Perplexed, I read the possible answers to see if they might provide context. Most options do appear to relate to color. It’s a reasonable assumption that the exam is asking the color of some song singing headgear. Ron was sent to Gryffindor by the sorting hat. Wait. A hat is headgear; the sorting hat did sing songs every year. So, I think the question is asking about the color of the sorting hat. Who in their right mind calls the sorting hat song singing headgear? I’m relatively sure the hat was just brown. None of the possible answers are brown. It definitely wasn’t blue and orange. It definitely wasn’t pink. That leaves horcrux. Horcrux isn’t a color; it’s an object that stores a piece of a wizard’s soul. Given that a horcrux can be any object, they could be any color and thus aren’t guaranteed to be brown. I don’t see how horcrux can be the answer either. A and C look very similar. That’s usually an indication that one of them is the correct answer. Oh, wait, a BLEND of blue and orange. If you blend blue and orange paint, I think you actually would get brown. Ah, the answer must be A. Wait though, the only difference between A and C is the addition of “with patches.” I can’t remember for sure if the sorting hat had patches, but it stands to reason that it would since it’s nearly one thousand years old. C is the answer. Now, imagine going through that 120 times! This example highlights a pet peeve of mine. Is this exam’s purpose testing my critical thinking skills or validating my understanding of the agile body of knowledge? What is the gain in obfuscating the actual question and answers? Perhaps I just don’t understand the science behind crafting questions for a high-quality certification. Maybe there is a reason we need to make the questions so complicated and arduous, but I can’t bring myself to see it. What would have been wrong with this question: What color is the sorting hat? - A.) Black - B.) Pink - C.) Brown - D.) Gray By the time I was over halfway through, the questions weren’t getting more straightforward, and my anxiety was compounding. I started to seriously doubt I would pass the test. I then began to debate whether I would pay the fee to retake it. Around question 80, I had no idea if I would fail or pass this test. I wouldn’t have been surprised if I’d missed them all or gotten them all correct. I had no bearings on how I might be doing. By the time I got to question 100, I was angry. I decided if I failed this test, it wasn’t worth retaking it. After I finished all questions, I reviewed some of the ones I’d marked for review. I was exhausted and ready for this dreadful assessment to end. I hit the submit button, crossed my fingers, and tried not to have a heart attack while waiting for the results. Pass. Above target in all domains. I can’t say I’m not happy with this result, but the overall exam experience made me question my sanity. Success is a journey, not a destination. The doing is often more important than the outcome. -Arthur Ashe I believe the body of knowledge that the PMI-ACP tests for is worth knowing. However, you can learn that without sitting for the exam. In my opinion, the exam is also a bit pricy, considering all you get for your money is a shot to receive a certification. The cost of alternative certifications is readily justifiable, given that you’re paying for the course. In addition to that, I’ve seen very few job postings that show a preference for the PMI-ACP. I think my advice to most would be to study and practice for the exam, but only get the certification if you’re the type that likes to collect them all or perhaps if you have some training budget that you need to spend. For me, I’ll think twice before taking a similar exam in the future. Like my college degree, I’m glad that is over, I appreciate the knowledge gained, but I wouldn’t want to do it again. I can’t recommend it to everyone, but I’m proud I have that little piece of paper.
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224650409.64/warc/CC-MAIN-20230604225057-20230605015057-00210.warc.gz
CC-MAIN-2023-23
8,895
52
https://hueniversedotcom.wordpress.com/2007/07/16/how-i-got-into-microblogging/
code
Ever since singing up to the now defunct Six Degrees site, I have been toying with the idea of real-time social networks. Back in 1997, excited about the amazing potential of social networks, I added all my friends’ email addresses to my Six Degrees profile, only to discover a few days later that they were all rejected out of fear of their email address being used for spam. But there was something amazing in the simple idea of building a network of people on-line and then using that network to create a community. When Friendster showed up, and later MySpace, I no longer had the time to spend on-line building a virtual social network. About two years ago, while working for a major bank in New York, my team was relocated from a great space where we all had private offices (some with river views) to tiny cubicles straight out of Office Space. I was observing how the frustration from the move caused the team to produce more gossip than C++ code, and for the most part it was highly entertaining. The problem was, working in an open space in the heart of Corporate America, it was hard spreading gossip about peers and management without being afraid of getting in trouble. I started thinking about using instant messaging to spread rumors around the office, and the idea evolved into a more elaborate service in which users create channels and others subscribe to via email, instant messaging, SMS, or read on the web in real-time as the content is being posted. I wrote a 5 page document and called it Extreme Blogging. The more I thought about it the more I realized how big the challenge of building such a service is. Working as a software development manager building high frequency trading applications, I started toying with what it would take to build such a platform from the ground up. Around July 2006 I started talking to friends about this idea, and the following month formed a small partnership with two other developers to try and build a prototype of such service. But with demanding day jobs the partnership didn’t work out and faded away. What didn’t fade away way my growing interest in seeing this idea materialize.
s3://commoncrawl/crawl-data/CC-MAIN-2018-26/segments/1529267864172.45/warc/CC-MAIN-20180621133636-20180621153636-00276.warc.gz
CC-MAIN-2018-26
2,152
5
http://bicycles.stackexchange.com/questions/tagged/skewer?sort=frequent
code
to customize your list. more stack exchange communities Start here for a quick overview of the site Detailed answers to any questions you might have Discuss the workings and policies of this site tag has no wiki summary. Quick Release on Fixed Gear Bike I recently purchased a fixed gear bike, Kilo TT. I had some fenders lying around, SKS raceblade. I tried to install them on my bikebut noticed that the fenders attached to the skewers. My fixed gear ... Jul 30 at 19:40 recently active skewer questions feed frequent question tagged Stack Exchange Gives Back 2014 Hot Network Questions Is every language written in C? Did banning abortion in Chile lead to lower maternal mortality? Making a rules-light non-combat version of Call of Cthulhu Text across several summation symbols Five professors and nine dishes Why not log-transform all variables that are not of main interest? Reasons for avoiding large ID values now for the gravy... -- meaning? Why does this random value have a 25/75 distribution instead of 50/50? Digit sequence that is not prime in any base Farewell 2014 welcome 2015 - "Math Golf" Writing FizzBuzz like this makes me feel like a small child How to politely decline an interview for a PhD program? When do you add the proficiency bonus? Why do we need pull-up resistors or tri state pins for AVR external interrupts? How do you deal with clients who bash your designs? Why didn't Bilbo become a creature like Gollum? Is there a word or expression for when someone passionately wants something, and then discovers afterwards that it's different from how he imagined? Why is "mathematical induction" called "mathematical"? Why are my games slower on battery power, even with the power plan set to High Performance? 6 yo smothers his food in sauce -- how can I change this? What do you call someone who obsessively thinks they are sick? Stack the Christmas Gifts Why does the US President fly in an obsolete 747-200? more hot questions Life / Arts Culture / Recreation TeX - LaTeX Unix & Linux Ask Different (Apple) Geographic Information Systems Science Fiction & Fantasy Seasoned Advice (cooking) Personal Finance & Money English Language & Usage Mi Yodeya (Judaism) Cross Validated (stats) Theoretical Computer Science Meta Stack Exchange Stack Overflow Careers site design / logo © 2014 stack exchange inc; user contributions licensed under cc by-sa 3.0
s3://commoncrawl/crawl-data/CC-MAIN-2014-52/segments/1419447547854.96/warc/CC-MAIN-20141224185907-00048-ip-10-231-17-201.ec2.internal.warc.gz
CC-MAIN-2014-52
2,381
55
https://docs.teradata.com/r/pHy91bB4RBTQI6MrH4D6vw/8vE8i1~UpJZZdFfPkcOH5w
code
Using Priority Scheduler Priority Scheduler can do the following for you: Provide better service for your more important work Control resource sharing among different applications Automate changes in priority by time of day or by amount of CPU used Place a ceiling on Teradata Database system resources for specific applications When using Priority Scheduler, keep the following in mind: Start out simple, monitor, and build from there. You can change parameters at any time using the schmon utility. Any changes you make to any parameter, including weight, take place immediately across all nodes in the configuration. You can delete the definitions of unused Resource Partitions, Performance Groups, and Allocation Groups using a Teradata Database system utility like schmon. The element that you want to delete cannot be in use when you perform the deletion. This means that an Allocation Group or Resource Partition must not be referenced by a Performance Group, and a Performance Group must not be referenced by a currently logged on user. You can change the name of a defined but unused Resource Partition or Performance Group to make it obvious it is unused. For example, you might name the unused Resource Partition or Performance Group UNUSED or NULL.
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446710916.70/warc/CC-MAIN-20221202215443-20221203005443-00835.warc.gz
CC-MAIN-2022-49
1,260
19
https://www.fallout76mods.com/sort-friend-requests/
code
Sort Friend Requests Interface replacement that sorts the friends list so that pending friend requests appear at the top of the list. Huge thanks to Keretus for lending me his knowledge and time, and teaching me a lot (and doing most of the work). This is a full interface replacement since standalone changes done to overlay.swf are ignored on load. Displays pending friend requests at the top of the friends list. Extract the SeventySix – Interface.ba2 replacement to your ..\Fallout76\Data folder. This does not fix the invisible friend bug, but it helps with accepting friends faster (hopefully before the bug can occur).
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947476374.40/warc/CC-MAIN-20240303111005-20240303141005-00355.warc.gz
CC-MAIN-2024-10
627
7
http://ficsit.app/mod/7J2LyFzTakqPQ5
code
This Mod adds 3 Tiers of Body Equipment items to the Game. This mod does not add any Modules! You will have to install other mods for that. This Mod should fully work in Multiplayer... kinda™ Please report bugs on the Discord or on GitHub. Modules placed in the inner Inventory of the Suit can influence the bonuses provided by the Suit Compared to the initial Release, the Suit does not have Flight unlocked by default anymore and instead Flight has to be enabled/unlocked by a Module from another Mod. To change how loud the Suit jetpack sounds are, you can use the in-game Effects or Master volume sliders. Or you can change just the Suit volume - read the Mod Configuration section. The Controls are: - CTRL tap "Space" to activate Hover mode - Hold Space to Activate Fly Mode - Hold "Space" to ascend - Hold "Shift" to accelerate directionally - Hold "Left-Alt" to descend - Hold "Left-Alt" while Sliding to enter PowerSlide Mode - Press "L" to switch to 3rd Person Camera (only works with SML cheats enabled) - Press "Right-Alt" to open the Equipment Inventory Window - Equipment Inventory Window can be resized by dragging the bottom right corner - Equipment Inventory Window can be dragged and moved on screen by grabbing the Title Note that some controls will not do anything unless you have a module that grants you that ability You can reload the configs without restarting the game with the chat command /reloadPowerSuitConfig. There is no confirmation message when it runs, it will just reload the configs. It does log to the SML console, though, if you have that on. The configs are separate for multiplayer host and client; each has their own set. You can edit these configuration options in <Satisfactory install directory>/configs/PowerSuit.cfg: - HoverFlightIgnitionDelaySeconds: ( 0.375sec by default) How long in seconds the jetpack waits to start fly when your suit is capable of hovering (ex. Hover Jetpack module installed). You may want to increase this value if you want to ensure you reach the apex of your jump before your jetpack turns on. - RegularFlightIgnitionDelaySeconds: ( 0.375sec by default) How long in seconds the jetpack waits to start fly when your suit is not capable of hovering (ex. Thrust Boots or Integrated Jetpack modules installed). You may want to increase this value if you want to ensure you reach the apex of your jump before your jetpack turns on. - BypassIgnitionDelaysIfFalling: ( trueby default) If the ignition delays should be bypassed if space is pressed while falling, which starts the jetpack immediately. With this setting enabled, the other two ignition delays will be ignored if you have negative Z velocity when you press spacebar. The purpose of this setting is to allow the jetpack to start quickly when falling, but still allow jumping around without triggering the jetpack too easily. - GlobalVolumeMultiplier: ( 0.7by default) Multiplier for all sounds produced by a PowerSuit. 0.0 is muted. 0.5 is 50% quieter. 1.5 is 50% louder. Remember that you can also modify this with the in-game volume sliders Effects and Master. This setting allows you to control just PowerSuit sounds as opposed to everything the game considers an Effect sound. When Regular Fly mode is activated, the Suit will provide thrust as long as you are holding space. When Hover Fly mode is activated, the Suit will provide thrust until contact with the Ground is made, its deactivated or when it runs out of Power. For acceleration (shift) in the Air, Fuel is required. The mod has changed significantly since these videos were made, but they are still a good intro to how it works. PowerSuit & PowerSuit Modules - Satisfactory Mod Spotlight - by Random Gamer PowerSuit & Modules Mod Spotlight [Satisfactory Game] - by TotalXclipse Accepted Fuels are (per full tank, in order of selection preference): - 1x Packaged TurboFuel - 2x Packaged Fuel - 2x Packaged BioFuel - 2x Solid Biofuel - 10x Wood - 200x Leaves Internal Inventory sizes unmodified are: - MK1 -> 4 - Mk2 -> 9 - Mk3 -> 16 This Inventory is for Modules to enhance the Suit and give you extra abilities. By Default this mod adds NO Modules. Full Source of this Mod is available and this Mod relies on other Mods to implement Modules. To implement Modules, download the Source of this Mod, add it to your UE4 SML Project and create a EquipmentModuleDescriptor. Fill out the EquipmentStats and then treat it as any other ItemDescriptor. Most of the Properties have Tooltip Notes on how they work and some aren't yet implemented or are not functioning properly. You can use the Attachment Actor feature to attach an actor of your choice to the player and run custom BP code. Here is a screenshot of some of the many Module settings on offer. Testing and Balance : Robb#6731 Icons by deantendo#4265 Assets Used: Freepik - Designed by macrovector_official
s3://commoncrawl/crawl-data/CC-MAIN-2021-04/segments/1610703528672.38/warc/CC-MAIN-20210121225305-20210122015305-00315.warc.gz
CC-MAIN-2021-04
4,856
59
https://phabricator.wikimedia.org/T119038
code
Recently i have seen that when you upload over a previous image, the changes don't seem to show up (for the picture atleast) [the resolution and size remain current], i thought it was an issue with my browser in the beginning but then i tried with 4 other browser on my PC and they all came looking the same as the previous image, The thumbnail on the file history may look updated or may not looked updated, it depends, here are two examples, - I made a major change to this image (https://commons.wikimedia.org/wiki/File:Kim_Jong-Un_Photorealistic-Sketch.jpg) but it doesn't look changed at all, unless you look at the thumbnail below - I tried this on another image, a higher resolution one and as previously, "ctrl +f5" multiple times but it still did not update to the "less pinkish" recent version (https://commons.wikimedia.org/wiki/File:Bernie_Sanders_September_2015.jpg) An admin on commons told me he had issue like this as well and another user on IRC told me to change the pixels by 1 to get the "current" version" of the image...is this a known issue?.. I'm on FF43b1 on WinVista ..just in case..
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224648635.78/warc/CC-MAIN-20230602104352-20230602134352-00662.warc.gz
CC-MAIN-2023-23
1,109
5
https://forum.knime.com/t/installing-biovoxxel-toolbox-using-imagej-update-site-fails/7915
code
I tried to install the BioVoxxel toolbox today, as its Erode and Dilate functions are far superior to those standard in FIJI. However using the update site I copied from FIJI it throws an error: "No repository found at http://sites.imagej.net/BioVoxxel/ ." First I thought it was because there was a point in the end of the url, but that is just from the error message, the site url ends with a "/". Any thoughts on this? I'm a bit confused. Are you trying to install the BioVoxxel Toolbox into KNIME? The BioVoxxel Toolbox is a set of plugins for ImageJ1 / FIJI. KNIME hat it's own system of update-sites, not yet integrated with ImageJ. We are planning, that in the future KNIME will support ImageJ2 update-sites but this is not possible yet. May I ask what you are trying to do? Maybe we have something similar like the BioVoxxel Toolbox in KNIME. I want to use their Erode and Dilate. As it produces far better results in terms of using them after each other. The end result resembles the original better. I found the .jar file of the biovoxxel toolbox, and moved that into the KNIME folders, under ImageJ2, however not showing up in KNIME after a restart. What would be the appropriate place? I also saw the Tubeness plugin is installed as a demo, but I can't find that as a Node. Perhaps for the same reasons I can't install the BioVoxxel toolbox? BioVoxxel Toolbox is ImageJ1 based. We can only auto-generate nodes from ImageJ2 plugins. However, you can try the KNIME node called "Morphological Image Operations" to perform arbitrary combinations of erode/dilate. On our example server there are several tutorials how to use the nodes. I figured this out, so I thought I'd share if maybe someone else wants to know. I used winzip to get the .class files out of the .jar file, and put these files in the imageJ1 plugin folder in the KNIME folder. Then using the Macro Node I was able to execute them. Downside of this is that settings would need to be found out in ImageJ or FIJI, and then copied into KNIME through the record macro options. a bit late but I just stumbled over this conversation. Since I want to stepwise also migrate my plugins into IJ2 compatible mode, I could start with e.g. the EDM Binary Operations since this is still a moderate amount of modifications. Before I start on that... What are the minimal requirements for the plugin to be recognized by KNIME later on? Is it already sufficient to start the class with the standard IJ2 parameter annotation and create a dialog using the parameterized dialog or is there other things in addition? Do I have to exchange every usage of any IJ1 object and method to get it running in KNIME? the minimum requirement is that you have an IJ2 plugin which has KNIME compatible Input/Output parameters, a menu path and the headless flag in the Plugin annotation is set to true. You can of course still use IJ1 functionality. However, when it comes to deployment (i.e. distributing your plugin via a KNIME update-site) I suggest that we have a quick chat how we can easily facilitate this. Please find some examples here: https://github.com/knime-ip/knip-imagej2/tree/master/org.knime.knip.imagej2.fragmentdemo/src. I'm happy to discuss all options how to integrate the BioVoxxel Toolbox into KNIME via IJ2 here or via Skype / telephone. I think at the moment my favourite solution would be that you implement your stuff as IJ2 plugins and I would help you settings everything up to work with KNIME (i.e. a plugin which can be distributed via the KNIME update-site etc). What do you think? I'd also be interested in getting help how to set up a KNIME update site for own IJ2 plugins. Maybe we could add a guide/tutorial to the wiki at http://imagej.net/KNIME ? I'd be willing to contribute and test :) at the moment you'd have to create a KNIME Plugins which includes the plugins (see e.g. https://github.com/knime-ip/knip-imagej2/tree/master/org.knime.knip.imagej2.fragmentdemo/src). Afterwards you have to export/expose the plugin on an eclipse-update site which can then be accessed by others. However, the best solution for IJ2 plugins would be that we somehow enhance the IJ2/FIJI update-sites such that KNIME can consume them.... I'll check with the IJ2 guys about how realistic this is and how fast we could achieve this.
s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656103269583.13/warc/CC-MAIN-20220626131545-20220626161545-00584.warc.gz
CC-MAIN-2022-27
4,293
21
https://rosettacode.org/wiki/Mirelle
code
This programming language may be used to instruct a computer to perform a task. Mirelle is a programming / scripting language for the .NET platform. It is designed to be strongly statically typed, imperative, object-oriented and keyboard-friendly. Mirelle is implemented as a compiler which emits .exe files in the format of .NET assemblies. While not being very powerful yet, it can be extended by other .NET-compliant code.
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817576.41/warc/CC-MAIN-20240420091126-20240420121126-00817.warc.gz
CC-MAIN-2024-18
425
3
https://srfc.bmfa.org/november-club-night
code
The evening was split into two parts: Club members had been asked to bring along models they wished to put into the annual Builder’s Trophy but regrettably only two were brought along. Les Crane’s Hawker Tempest V Mark Vale’s Hot Dawg Club member Derek Woodley gave us a talk on a typical flight from London Heathrow to New York’s JFK; on a previous talk he had given a technical presentation. The talk was expected to last just half the evening but in the event the evening was taken up with this very interesting subject with many questions being asked by the audience. Derek used some general presentation material to give his talk structure with a number of videos and photos to go with it.
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474795.48/warc/CC-MAIN-20240229071243-20240229101243-00295.warc.gz
CC-MAIN-2024-10
702
6
https://forum.howtomanagedevices.com/endpointmanager/intune/intune-license-ownership-and-management/
code
Intune License ownership and management Can you pls advise me on the following scenario “x” vendor has already procured and owning m365 license Now, “y” service provider wants to take ownership and provide services including all m365 license is it possible to transfer license from “x” to “y” ? if not, should “y” acquire new M365 license and request “x” to cancel existing license Which is the best way that “y” can adopt to provide service to “x” Kindly share your advise Thanks in Advance Answers ( 2 ) It’s a pure licensing question and I don’t think anyone on this forum can confirm anything about Intune License transfer queries It’s something you need to discuss with Microsoft licensing team via your organization’s Microsoft contact. Ok Anoop, thank you for the response.
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224646652.16/warc/CC-MAIN-20230610233020-20230611023020-00069.warc.gz
CC-MAIN-2023-23
820
12
https://community.sonarsource.com/t/more-php-rules-to-write-efficient-error-free-and-safe-regular-expressions/52193
code
Hello PHP developers, This is to announce that we added 8 new rules to help you write regular expressions. These rules are coming on top of the 8 existing regexp rules we released in Sept on SonarCloud. You now have 16 rules to write efficient, error-free and safe regular expressions. Here are the list of the ones we added with this update: Bug Detection Rules: - S5856: Regular expressions should be syntactically valid - S6001: Back references in regular expressions should only refer to capturing groups that are matched before the reference - S6002: Regex lookahead assertions - S5850: Alternatives in regular expressions should be grouped when used with anchors Code Smell Detection Rules: - S6019: Reluctant quantifiers in regular expressions should be followed by an expression that can’t match the empty string - S5843: Regular expressions should not be too complicated - S5867: Unicode-aware versions of character classes should be preferred - S5857: Character classes should be preferred over reluctant quantifiers in regular expressions These rules are available now on SonarCloud and will be included in SonarQube 9.2
s3://commoncrawl/crawl-data/CC-MAIN-2021-49/segments/1637964362287.26/warc/CC-MAIN-20211202175510-20211202205510-00484.warc.gz
CC-MAIN-2021-49
1,133
15
https://www.hireitpeople.com/resume-database/64-java-developers-architects-resumes/153995-sr-java-j2ee-full-stack-developer-resume-kansas-city-mo
code
- Over 8 years of strong software experience in Developing, Testing, Implementing Enterprise Applications using Java/J2EE platform and web - based applications using Object Oriented Analysis and Design(OOAD). - Experienced on various SDLC (Software Development Life Cycle) like Waterfall, Rapid Application Development (RAD) and Agile (SCRUM) models. - Implemented React JS and worked with Redux and Fluxarchitecture. - Experience in developing Angular 4 advanced features such as Interfaces, nested components, services, routing and modules. - Extensively worked with Angular 4Pipes, Observables, directives like ngfor, ngifelse. - Extensively used Angular 4 for developing single page Applications and usedrouters to develop customized components - Extensive experience with Core Java, Multithreading, Transaction Management, Exception Handling, Concurrency, Collections, Data Structures, Lambda Expressions, Functional Interfaces and JDBC - Extensive working experience with various J2EE Frameworks like EJB, Struts, JSF, JSP, JSI (Prime Faces). - Expert level skills in spring framework modules like Spring MVC, Spring Batch, Spring Security, Spring Data, Spring Boot, Spring Cloud, Spring JTA, Spring AOP, Spring Core. - Worked with Spring Cloud Config, Hystrix Circuit Breaker, Ribbon, Apigee API- gateway and Zuul API-Gateway in the Spring Cloud and Netflix Eureka service to provide weighted load balancing based on several factors like traffic, resource usage and implemented security functionality OAuth 2.0, Spring security (User Access Management, JWT), SSL and SiteMinder (SSO). - Worked on WSDL and WADL implementing SOAP services using Axis-2 and Apache CXF (JAX-WSframeworks). - Developed Restful web services using JAX-RS in JERSEY, Apache CXF to expose the data to springmodule. - Extensively worked on Micro Services with Spring Boot and created dynamic documentation for RESTful webservice usingSwagger. - Integrated Micro Services with Hibernate ORM using Spring Boot and wrote HQL queries for data access. - Experience with SQL and PL/SQL to query various Relational Database Management Systems including Oracle, MS SQL, MySQL, DB2 and PostgreSQL and No SQL databases like Mongo DB, CouchDB,Cassandra, Dynamo DB andGraph DB. - ExperienceininteractingwithNoSQLdatabasesusingMongooseConnectorand Cassandra Node Driver. - Worked with Drools to provide Business Rules Management System (BRMS) solution that provides a core Business RulesEngine. - Hands on experience with build tools like ANT, Maven, Gradle and logging tools like Log4J. - GoodunderstandingofClient-sidebuildtoolslikeGulp,NPM,Webpack,Grunt,and Bower. - Strong experience in integration tools like Apache CXF, Apache Camel Spring Integration and Mule ESB to integrate the enterprise application technologies with existing JVMenvironment. - Experience in testing with JUnit Framework using Mockito and Easy Mock, Spring Junit Runner,JMeter. - Strong Knowledge on automated java based behavioral testing and integration testing of the applications using Cucumber and Seleniumrespectively. - Experience in building and deployment of EAR, WAR, JAR files on different environments in IBM WebSphere Application Serverv7. - Experience in deploying and configuring application servers such as Oracle WebLogic, Glassfish, IBM WebSphere, Jboss and ApacheTomcat. - Sound learning on consistent mix and persistent improvement devices like Jenkins, Hudson, Puppet andBamboo. - Experience in Unix and Shell Scriptingwhich allows the user to interact with OS. - Good knowledge in building real time dashboard applications using Elastic Search, Logstash and Kibana (ELK) to profile and monitor the streaming data of theapplication. - ExperienceinWindowsAzureserviceslikePAAS,IAASandworkedonstorageslike Blob and SQL Azure. - Professional experience in Log4J for extensible logging, debugging and errortracing. - Good Knowledge in Amazon Web Services (Amazon SQS, Amazon EC2, Amazon S3, Amazon Elastic Load Balancing, Amazon Simple DB, Amazon EBS, Amazon Lambda and Amazon CloudFront). - Hands on experience in implementation of Pivotal Cloud Foundry (PCF) services such as Pivotal Container Service, Pivotal Application Service and Pivotal Functional Service. - Good experience using Docker for installing, upgrading, testing, removing and running softwareapplications. - Good understanding of OpenShift platform in managing Docker containersand Kubernetes Clusters. - Made use of Apache Kafka, Active MQ, Rabbit MQ, IBM MQ as a Message Oriented Middleware for coordinatingapplications. - UsedvariousversioncontrolsoftwaresuchasGIT,GITLAB,SVN,CVS,BigBucket for maintaining code repositories. Programming: C, C++, Java JDK 1.4/1.5/1.6/1.7 , PHP, SQL, PL/SQL, UNIX Shell Script Java/J2EE: Servlets, JDBC, JSP, JSTL, JMS, JPA JNDI, RMI, EJB, JFC/Swing, AWT, Java Beans, Applets, Java Networking, Multi: threading, Web Services, HibernateSpring, SOAP, RESTFUL Application/Web: Oracle/BEA WebLogic, IBM WebSphere 8.x/6.x, JBoss, Apache Tomcat Servers: 8.0/7.x/6.x, Jetty Server, jerkins, AEM, Nginx. Frameworks: Struts 2.x/1.x, Spring 3.x/4.x/5/x, Hibernate, JSF, iBatis, Angular Ionic, RCP DevOps Tools: Docker, Kubernetes, Rancher, Amazon Web Services (EC2, EBS, EKS), Jenkins Web technologies: HTML, HTML5, CSS/CSS3, AJAX, Bootstrap, XML Frameworks: React.js, Express.js, Ember.js, Handlebars.js JAXWS, JAXRPC, JAX: RS, Apache CXF, Axis, Jersey Methodologies: Agile, Scrum, RUP, TDD, OOAD, SDLC Waterfall model Messaging: JMS (Java Message Service), IBM MQ, Apache Active MQ, Apache Kafka Database Servers: Oracle, DB2, SQL Server, MySQL, Postgre Version Control: CVS, SVN, Clear Case, Git, Bitbucket Build Tools: ANT, Maven 3.0, Gradle, NPM, Grunt, Gulp, Bower, Jenkins Cloud: Amazon Webservices (AWS) Cloud, Pivotal Cloud Foundry (PCF) Operating Systems: Windows, Linux, Mac OS and UNIX Testing: JUnit, JMeter, Mockito, Cucumber, SPock, TestNg, Mocha, Chai, Karma Technologies/tools Jasmine, Protractor: Modeling Tools: UML, Rational Rose, Visio Confidential, Kansas City, MO Sr. Java/ J2EE Full Stack Developer - Developed the front-end featuring rich web interface implemented using HTML,CSS3, Angular, React JSand Bootstrapfor responsivedesign. - Developed multiple Angular 2.0 components which are compatible with latest versions of typescript, angularCLI. - Lazy Loaded the application using Angular 2for performanceoptimization. - Configured React-Redux for state management and React-Router for programmatic navigation. - Implemented Store-Redux for holding the whole state tree of application and Reducer-Redux for describing action. - Developed various Typescripts (ES6) objects including Components,ngModules, Providers, Services and Classes using arrow functions and optionaltypes. - Developed various single page applications (SPA) using REACT JS and used various components in the REDUXlibrary. - Closely worked with Application using React.JS and Node.JS libraries NPM,gulp directories to generate desired view and REDUX to root the URL's properly. - React JS Virtual DOM used for client-side view rendering services, React-Redux for statemanagement. - Used Node JS along with Express JS to achieve reusability and gain centralizedlogic. - Implemented generating the verification hash code using crypto package on Node.JS and added user validations and user permissions by usingNode.JS - Worked with Node.JS framework including authoring complex directives, services, controllers andfilters. - Developed readable and writable streams of Node JS to process the data from external means of theapplication. - Configured Express JS node http framework to set up middle-wares to respond to HTTP requests and used its front-end tooling like web packs, starter packs, boiler plates efficiently. - At a later point, migrated from Express JS to Hapi JS which is configured on top of Node JS to attain better performance, to use built in authentication and authorization techniques. - Migrating existing application into REST based Microservices to provide all theCRUDcapabilities using Spring Boot. - Designed and developed RESTfulweb services using Spring Boot andJersey framework. - Used Spring Boot which removes boilerplate configuration and makes application faster. - Developed some standalone Micro services using Spring Boot micro service architectural patterns - Developed the micro services using Spring Boot to get range of non-functional features and using spring rest to create rest producers and rest. Clients using spring rest temple. - Used Swagger specification for documenting REST API's which exposes description of a RESTful web services to differentclients. - Used Apache Kafka to handle data pipeline for high speed filtering, pattern matching and for monitoring data pipelines. - Implemented Spring Cloud- Netflix ZUUL to building micro services to communicate with each other. - Implementation of Hystrix circuit breaker to avoid loss of messages during handling of messages at the consumer level. - UsedSpringDataJPAastheORMframeworktoconnectwithMYSQLdatabaseand Cassandra data node to connect with Cassandra database. - Verified data integrity on Cassandra cluster while batchloading. - Configured Docker container service and build pipe line Jenkins CI/CD tool for continuous integrating and deploying application onservers. - Worked on Docker hub, creating Docker images and handling multipleimages primarily for middleware installations and domainconfigurations. - Extensively used Orchestration container Kubernetes for load balancing and to schedule the tasks across the computer cluster and load balancers for backend API services - Authenticating Users and to provide the security to RESTful web servicesusing OAUTH 2.0. - Implemented Spunk dash board and log management with ELK (Logstash serves as data ingestion engine). - Good understanding of PAAS platforms like Openshift and Pivotal Cloud Foundry native service cloud architecture for deploying Micro Services. - Used Pivotal Cloud Foundry, service binding details are injectedfromthe deployed cloud platform itself. - Automated different Unit Test Cases using Jasmine and Karma Testing Frameworkson Angular and made use of Mocha and Chai for React JS. - Used Mockito, Junit, Mock MVC and thereby achieving Test Driven Development (TDD). - Used JIRA as the bug tracking system to track and maintain the history of bugs/issueson everydaybasis. Environment: Angular 4.0, React JS, Cassandra DB, MySQL DB, HTML, CSS3, Typescript, Angular CLI, Redux, NPM, Spring, Docker, Jenkins, REST, Spring Boot, Jersey, Jasmine, Karma, Mocha, Chai, AWS, RabbitMQ, JIRA Confidential, Kansas City, MO Sr. Java Full Stack Developer - Developed the web application based on the MEAN Stack using Mongo DB, Express JS, Angular2and NodeJS. - Used Angular 2.0 forms like Template Driven forms and Modern Driven (Reactive) forms to performform validations both on server and client side - Implemented form validation on HTML forms using the built-in validation properties andmethods in Angular 2.0. - Developed pages using Angular2.0 directives, expressions, routing capabilities for bookmarking, filters, validations and Angular UI components such as grid, buttonscarousels, date pickers, modal dialogs and other input components. - Experience in developing client-side validations using Angular 2.0 and developing custompipes, Shadow DOM. - Delivering a login page using Angular 2.0, where it uses JWT to prevent Cross-site request forgery (XSRF or CSRF) where it is a method of attacking a Web site in which an intruder masquerades as a legitimate and trusted user. - Used Axios AJAX request to data from back-end based on user interface input and post updated data back tobackend. - Created the Application using Angularand Node.js libraries NPM (Node Package Manager), to generate desired view to root the URL's properly. - Implemented JSON web tokens mechanism for authentication and authorization security configurations usingNode.js. - Implemented modules into Node JS to coordinate with plans andnecessities. - Implemented Node.js router to make cross-domain requests to API services like GitHub API,MongoDB - Worked on Mongo DB database concepts such as locking, transactions, indexes, Sharding, replication, schema design,etc. - Created a pipeline from Mongo DB cluster by configuring MongooseConnector. - Implemented Elastic Search in Mongo DB for synchronization of data in thedatabase. - Used Express JS which is fast, assertive, essential and moderate web frameworkof Node.js that helps manage a sever and routes. - Implemented a metrics collection mechanism for the server by utilizing Apache Kafka to stream server-side events. - Design and develop a gateway interface for Order processing using Spring Boot, Spring Integration and RabbitMQ messaging middleware and ensuring security using OAuth. - Used continuous build using Jenkins and supported the Application for production deployment and postproduction. - Implemented Netflix Zuul API gateway for all the requests from the devices and websites by registering services to Eureka. - Implemented Kibana for centralized logging and monitoring that builds on Elastic search of the application data for analytics and visualization of the user's login. - Designed, built and deployed application using the AWS stack (Including EC2, Mongo DB, Docker, Kubernetes Orchestration container (EKS)) focusing on high- availability, fault tolerance and auto-scaling. - Implemented cloud automation using AWS Cloud Formation Templates, Chef and Puppet. - Used Amazon Web Services (AWS) for promoting code in variousEnvironments. - Deployed EC2 instances provisioning on AWS environment and implemented security groups, administered Amazon VPCs. - Implemented Single Sign On (SSO) Authentication using CA Site Minder for cross browser logging and social loginsauthorization. - Developed unit test cases using Mocha and Chai as unit test runner to test various React JS components. - Developed Test classes using Junit and Easy Mock and test coverage using EMMA plug-in. - Developed the ANT scripts for preparing WAR files used to deploy J2EE components. Environment: Mongo DB, Express JS, React JS, Node JS, View, Flux, Mongoose, Apache Kafka, HTML, CSS3, Typescript, EKS, JSON, Redux, NPM, Chef, Puppet, Pivotal Cloud Foundry, Jenkins, Mocha, Chai, AWS, Single Sign On, CA Site Minder Confidential, Houston, TX Java Full Stack Developer - Involved in the life cycle of the software design process including requirement definition, prototype design, design, interface implementations, unit testing andmaintenance. - Developed dynamic web pages using HTML5, jQuery, Bootstrap, Less,CSS3(SASS) and AJAX. - UsedAngularJStocreateviewstohookupmodelstotheDOMandsynchronize data with server as a Single Page Applications. - UsedmanyAngularJS-1.xdirectiveswhichallowdevelopingmanycustomand reusable HTML for data binding and behavior of components. - Implemented ng-controller directive to create controller object using Angular Controller Function. - Involved in developing components on Reporting Dashboard with Spring MVCand Hibernate. - Worked with Spring Batch to convert xml files to data base records using Quartz Scheduler and to create custom readers and writers to work with theapplication. - Implemented Spring MVC framework which includes writing Controller classes for handling requests, processing form submissions and performed validations using Commonsvalidator. - Developed application modules utilizing J2EE technologies like JSP to develop view and model parts of MVCframeworks. - Used Spring IOC framework to enable the interactions between JSP/View layer and implemented distinctive design patterns with J2EE and XMLtechnology. - Involved in development of Spring DAO layer which invoked databasequeries. - DB2 database used to load the application data and written PL/SQL procedures, complex queries to perform various dataoperations. - Used spring as middle tier application framework, persistence strategy using spring support to IBatis and declarative transaction management. - Design and development of business components using Spring AOP and Authentication, Authorization using SpringSecurity. - Responsible for creating Model/Value Objects in MVC Design Pattern. - Involved in writing Spring Container and Controllerclasses. - Worked on Spring Framework handling major concepts like Dependency Injections, Transaction Management Declaratives (annotationsbased). - Implemented Spring Batch to run daily and monthlybatches. - Message broker services are achieved in the application using Active MQ withJMS framework - Integration of automation batch run job with JENKINS. Worked with Jenkins Continuous Integrationtool. - Wrote and integrated with the business validations for the application in the Droolslayer. - Developed test framework in Selenium for UI Regression Test Automation and when necessary, and potentially execute Unit Test automation(Junit). Environment: HTML5, CSS3, jQuery, Bootstrap, Less, CSS3(SASS), AJAX, Angular JS -1.x, DOM, Angular Controller Function, Hibernate, Spring MVC, Spring Batch, Rest Controller, DAO Classes, Spring IOC, JSP/View, J2EE, XML, Spring DAO, DB2, PL/SQLSpring Cloud, Spring AOP, MVC, Spring Container, Controller classes, DependencyInjections, Transaction Management Declaratives, Spring Batch, Message broker services, Active MQ, JMS, JENKINS, Drools,Selenium Confidential, San Diego, California Full Stack Java Developer - Involved in analysis, specification, design, and implementation and testing phases of Software Development Life Cycle (SDLC) and used agile methodology (SCRUM) for developingapplication. - Created responsive UI modules using Backbone JS with hard codeddependency of Underscore JS in combination with Handlebar JS for templating. - Used Backbone JS to utilize its rendering functions and create controllers to handle events triggered by clients and send request toserver. - Implemented the application using Java Server Faces (JSF) which is based on Model View Controller designpattern. - Build web application using JSF Prime Faces by assembling reusable UI components in a page and wiring the client generated events to server-side eventhandlers. - Configured faces-config.xml and applicationcontext.xml for JSFIntegration. - Dependency Injection for managing the components and bean life cycle is achieved in the application using SpringIOC. - Used Spring AOP Module to implement logging in the application to know the applicationstatus. - Used Spring AOP module to handle transaction management services for objects in any Spring-basedapplication. - Developed SOAP web services using Apache-CXF which would be available for other local OSGibundles. - Developed Several SOAP based JAX-WS Web Service interfaces for integrating multiple systems, codere-usability. - Used SOA Architecture to Develop REST Web services, generated WADL and consume theservices. - Modeled the resources provided by the service layer and the relationships between them usingWADL. - Wrote stored procedures, complex queries using PL/SQL to extract data from the database, delete data and reload data on Oracle DB. - Followed Test Driven Development (g) and wrote server-side test cases usingJunit. - Worked on creating the persistence layer using Hibernate ORM framework. This involves developing mapping files and Hibernate (POJOs/DAOs). - Used Maven build tool to deploy the application on web servers i.e.JBoss. - Involved in creating unit testing of various layers using JUnit and created automated test scripts for integration testing usingSelenium. Environment: Backbone JS, Underscore JS, Handlebar JS, Java Server Faces, Spring IOC, Spring AOP, SOAP, Apache-CXF, JAX-WS, WADL, PL/SQL, Oracle DB, Hibernate, Maven, JBoss, Junit, Selenium Associate Software Engineer - Designed and developed web interfaces and business logic using Jakarta Struts Framework (MVC architecture), JSP, Servlets, Java Beans, JDBC, AJAX, Java Script, HTML, DHTML and XMLTechnologies. - Development of Action Forms, Action Servlets, Action and Validating Action Formsin Struts framework. - Implemented the MVC pattern by using Struts with help of controller servlet. Action mappings, actions and global forwards are defined in struts-config xml file and method call implementations are developed inAction. - Integrated Struts with Hibernate and used ORM tool hibernate to interact withdatabase. - UsedHibernateformappingjavaclasseswithdatabaseandcreatedquerieswith Hibernate query language (HQL) and integrated business layer with DAO layer. - Used Hibernate as an Object-Relational Mapping ORM tool to store the persistent data and for communicating with Oracle database and to customize the data for newapplications. - Planned, Scheduled and Implemented on Linux boxes as part of proactive maintenanceandSecure Shell (SSH) Implementation. - Created and scheduled Batch process using Java Batch and Spring Batch and implemented job throttling for spring batchprocess. - Used Spring Batch to develop batch processing to handle bulk requests from theclients. - Used Maven as build tool to build artifacts on the sourcecode. - Installed and configured IBM Web Sphere application server and http web server for development and production environment and used Web Sphere message broker and Web Sphere Message Queue for route, transform, migrate and enhancedata. - Develop and implement patch deployment plans used to patch development and production Linux and Windowsservers. - Modified Korn and Bourne shell scripts to automate administration tasks like customizing user environment and performancemonitoring. - Used Drools rules engine for defining business rules andValidations. - Implemented Multithreading feature for processing the multiple requests to achieve high performance. - Worked with Core Java concepts like Collections Framework, Multithreading,and Memorymanagement. - Used Log4J to capture the log that includes runtime exceptions, monitored error logsand fixed theproblems. Environment: Struts 2.2, Spring 3.1, Spring IOC, Maven, Spring MVC, iBatis, SQL, IBM Web Sphere, Web Sphere Message Broker, Web Sphere Message Queue, Linux, Drools, Multithreading and Log4j. - TheapplicationisdesignedusingJ2EEdesignpatternsandtechnologiesbasedonMVC architecture. - Functionalitieslikeautocompletionofformsanduservalidationareimplementedusing jQuery. - Implemented forms and action classes for the application using EJB and StrutsFramework. - Developed EJB deployment descriptor using XML and used JAXB components for transferring the objects between the application and thedatabase. - Used Multithreading concept to post data from files to tables involving transformation of file from one format toanother. - Successfully wrote and implemented SQL Queries, Stored procedures and Triggers in SQL SERVER. - Implemented JDBC for database connectivity with MySQLServer. - Developed and implemented the MVC Architectural pattern using STRUTS framework including JSP andServlets - Developed dynamic web pages using JSP and used Struts Validation framework to perform inputvalidation. - Developed Ant scripts and developed builds using ApacheANT. - Used Clear Case for source codemaintenance.
s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600402123173.74/warc/CC-MAIN-20200930075754-20200930105754-00266.warc.gz
CC-MAIN-2020-40
23,238
201
https://github.com/perl6/doc/issues/1807
code
Join GitHub today GitHub is home to over 28 million developers working together to host and review code, manage projects, and build software together.Sign up File Extension Conventions #1807 A Reddit Thread asked what's the best practice for Perl 6 code file extensions and recommended those would be codified somewhere. I pointed to https://docs.perl6.org/language/modules and turns out a lot of the examples there (including comments in the code examples) use .pl or .pl6? .pl conflicts with Perl 5 scripts and .pl6 binds Perl 6 to the number '6'. The Perl 6 language should not wed itself to the number '6'. A simple increment in version number from Perl 5 does a disservice to both dialects of Perl - Perl 5 and Perl 6. We need room for both Perl 5 and Perl 6 to grow without stepping on each other's toes. The Perl 6 dialect needs its own distinctive non-numeric name. Once we have that - distinctive, non-numeric file extension(s) are likely to follow naturally: It really is time for Perl to get a grip of the branding for Perl 6 - not least because the Artistic Licence 2.0 relies on it. Let's keep the ".p6" thing as an interim fudge until we work out what we really want instead of '6'. Well we have a difference of opinion. The "6" in the name "6lang" unnecessarily associates it with a version number. Including a "6" in the name doesn't help Perl 5 either. I absolutely support, however, a new distinctive name for the Perl 6 dialect - just not one that involves a version number hard-wired into it. "6lang" is distinctive and shortish - which is good, however it's not easy to read or straightforward to pronounce. It feels like some more iterations are needed. Having seen the punning powers of the #perl6 IRC channel over the years I'm sure we can come up with something that doesn't involve a "6"! ;-) I appreciate that Zoffix has got the ball rolling with renaming the Perl 6 dialect - we just need to find something that is: shortish, distinctive, with command-line type-ability and Google find-ability and works with the Perl parent trade mark: Well, there's no chosen name yet. But you have a nice list of features for the upcoming name. FYI for 6lang that you didn't like: I guess you specifically want it to be “Perl Something” and I'm pretty sure this option is not really considered even. One of the major reasons for doing this naming thing is to break off the connection to perl5, and having “perl” in the name is not a good way to accomplish that. Thanks for distilling some of those points about what makes a good name. You're right, "6lang" - does tick most of the boxes - it's not easy to come up with a name that does that. I appreciate Zoffix putting effort in there. Unfortunately though, IMO the presence of a "6" is overall a show-stopper, especially given the cultural scar tissue around (5 => 6). This is not easy - I would like to work with you and Zoffix to get a good result for Perl. It's a good idea to present Larry with a selection of names prior to the 6.d release for his stamp of approval (he may even have one or two of his own up his sleeve). I don't have a problem with "6lang" being amongst the names for consideration. We just need to come up with some other names too. I've updated the Perl branding proposal to include a list of features for what makes a good runtime name: Let's work together ... My two cents here: do we really need to distinguish Perl 6 code from Perl 5 one? On the other hand, the Could it be the Perl 6 name is the same of the logo (camelia)? I don't know, suirely it will give a large breath and remove any number discussion. I'm not suggesting any decision on the matter, and I let people that are interested in such discussion to take the right (or better) choice with regard to different views, but I do see too much effort in this matter. Doesn't look like proposal hasn't garnered a lot of good feedback: https://www.reddit.com/r/perl/comments/7zr5if/free_all_the_butterflies_a_proposal_for_perls/ Sorry to say, but my biggest point was that having Well we have a difference of opinion there. I don't think we need to jettison "Perl" from naming Perl 6 nor do we need to jettison it from Perl 5. You don't have to take "Apple" out of the Apple iPad or out of the Apple iPhone - the parent brand still means something - it's a badge of origin - and a set of associations with their product(s). Sub-brands can flourish under the parent brand's umbrella and sometimes are differentiated enough to standalone (e.g., iPhone). The fact is both Perl dialects share the Perl Way. We shouldn't try and sweep that under the carpet - it's actually something to be proud of and what differentiates Perl 5 and Perl 6 from other computer languages - that's marketing differentiation. Both Perl languages are pragmatic, TMTOWTDI, practical computer languages that help solve problems and get things done = Perl (R). These are good brand values to keep. So "Perl" already gives us a differentiator with other computer languages - now we just need a differentiator between dialects. Bumping the version number between the two doesn't really tell the true story and misses the opportunity for both languages to differentiate themselves in the future. I'm in no way suggesting diluting Perl's brand - if anything I would like it to grow and get stronger. Brands are strongest when their honest. The truth is Perl is no longer a designator of just one language dialect - we should be real about that. iPhone does not dilute Apple's brand - it just enhanced it. Likewise, sub-branding for Perl projects - increases differentiation while goodwill accrues to the Perl parent brand. That's just patently false. It's not an "Apple iPad", it's an "iPad". Just look at the ads: Even the "apple watch" is marketed as just "watch" with Apple's logo. Together with "AirPods", undoubtedly a move to avoid further diluting the "i The equivalent of "Apple" in your examples would be "The Perl Foundation", not "Perl". Not just "we". What you propose flies directly opposed by common wisdom in this line of work. Pick up any marketing book, and I bet it'll have something on the topic, likely followed by "line expansion will lead to short-term boost to sales, but will ultimately damage the brand". What the heck is "the Perl Way"? I've used Perl 5 for over a decade, uploaded hundreds of modules to CPAN, and I am both the user and contributor to Perl 6 and I've no idea what you're talking about, yet you're just throwing this out as if it's something well-known and well-understood that'll attract tech users to the language. And just because you keep calling them "dialects" doesn't change the fact that they're entirely different languages to the core. Except you don't get to pick and choose what to keep. Stability and performance are part of the Perl brand, but these aren't the strong points of Perl 6, which is why I'm saying your proposal is diluting and damaging the Perl brand. Those who expect stability and performance from a "Perl" will be disappointed when they can no longer get that from a "Perl" and will stop trusting the brand to deliver on those values. This is exactly why "Perl" should remain owned by Perl 5—it has everything those who prefer that brand want. Moreover, unreadability and antiquity are part of the Perl brand. Why does it make sense to carry that over to a brand new, more readable language that leads in latest Unicode and concurrency support? Considering earlier you mentioned me several times, I think you're well aware that "bumping the version number" isn't what we're working on and here you're just attempting to strawman. But you're explicitly suggesting it should be hijacked by other projects that don't even carry its attributes! Why is that the truth? What's your evidence for that truth? Just 18 hours ago I had to clarify that "Perl" in a post about regex features was referring to Perl 5. Just as "Apache" is a web server for an average tech person so "Perl" is a line-noise language popular in the '90s. Hell, even inside the community there's confusion that there's only one "Perl" and Perl 6 is aimed to replace Perl 5. Here you're just corroborating my point: multiple different things under the same name dilute the brand. In summation, I think what you're proposing aims to solve the confusion around version numbers by introducing confusion around branding and doesn't address several other branding issues that exist. The proposal intends to change the well-settled meaning of "Perl" in people's minds—something prominent marketers deem impossible and something that's most definitely isn't working even in the proposal's own examples. And the proposal argues that by making "Perl" mean many quite different things, we'll make the "Perl" brand stronger—which is a contradiction. Patently false? A quick Google image search shows numerous Apple promotional shots where they use the master brand in combination with their products and sub-brands. There's plenty more where that came from! ;-) Apple do associate their master brand AND their sub-brands. This is standard umbrella branding strategy. Thanks for being honest about your real reservations about my proposal. I don't share your concerns, however, that Perl 6's current performance and reliability will impact the overall Perl brand. This is where the sub-brands can, will and should diverge - it's about being honest and communicating what the reality is. Different associations will attach to each dialect: It's about being clear - there is a good story to tell here and having different sub-brands will help us tell it. [1,2] illustration only
s3://commoncrawl/crawl-data/CC-MAIN-2018-43/segments/1539583515041.68/warc/CC-MAIN-20181022113301-20181022134801-00235.warc.gz
CC-MAIN-2018-43
9,633
63
https://hackaday.io/project/19725-mandalorian-infiltration-vambrace/log/53951-a-thank-you-to-those-who-came-before-and-to-those-who-follow
code
Our project was built so that anyone (even me) can build it. None of the components of the project are original. However they are all collected into one place. I will list out the links to any software or detailed instructions for creating the hardware. DBAN USB - This USB (works) is a bootable USB that will autorun Derik's Boot and Nuke, a program that will irrevocable delete the hard drive of the computer it boots to. The program you need to make the usb is here - https://www.pendrivelinux.com/install-dban-to-a-usb-flash-drive-using-windows/ The link to the free version of DBAN is here - https://dban.org/ USB killer - This device will send a high voltage current through the USB drive and cause serious damage to anything it plugs into. This is where we bought the Bug zapper for the USB Killer - http://www.harborfreight.com/ Other components required include - USB Male salvaged from a USB Cable Kali Linux Boot - This USB will allow you to boot up a copy of Kali Linux and bypass Windows Basic security (passwords etc.). We will put a video of us bypassing Windows when we have time but for now you will have to trust us that it works. Link to Kali Linux - https://www.kali.org/downloads/ Link to program to create a bootable Linux USB - https://sourceforge.net/projects/win32diskimager/ Mini-EMP - This EMP will cause some issues for anything that runs off electricity. i.e. small electronics, phones, vending machines, and pacemakers. This is not a toy, and in the wrong hands it can cause destruction of property or death. That being said, here is a youtube on how to make one. The video lists out the hardware required to make any equipment.
s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320304600.9/warc/CC-MAIN-20220124185733-20220124215733-00333.warc.gz
CC-MAIN-2022-05
1,658
13
https://www.oreilly.com/library/view/microsoft-adonet-entity/9780735675674/ch15.html
code
Chapter 15. Mapping data types to properties After completing the chapter, you’ll be able to Entity Framework automation generally does a great job of mapping types in your database to types that the .NET Framework can understand. In fact, you’ve seen this automation at work in many of the chapters of this book so far. Most applications will make use of the automatic mappings that the Entity Framework provides. There are situations where you want to provide custom mapping of standard data types, or you need to provide the Entity Framework with the information ...
s3://commoncrawl/crawl-data/CC-MAIN-2021-25/segments/1623488257796.77/warc/CC-MAIN-20210620205203-20210620235203-00463.warc.gz
CC-MAIN-2021-25
573
4
https://tor.stackexchange.com/questions/14898/better-understanding-of-the-routing-tables-inside-each-tor-router
code
Great question. I'd like to start out by explaining the concept of onion routing so satisfy your comment that the concepts are unclear to you, then discuss some key areas that should answer your question about routing tables. Onion routing is a technique for anonymous communication over the unsecure internet by using PKI encryption between each pseudo-random onion router that belongs to an onion routing group, such as the Tor network. The goal of onion routing is to provide anonymity for the SOURCE IP ADDRESS as well as possibly the HIDDEN SERVICES it uses. Let's rise up from the details and discuss an example. Let's say you're at home on your computer and you open your favorite browser and go to https://www.anywebsite.com. The people at that website can see which source ip address (YOUR ip address) hit their server. Now let's say for ANY reason at all you still want to get to that website, but you DO NOT want them to know YOUR ip address that you originated from at home. Here's how you do it. Assuming you have already downloaded/installed your onion routing software, you open your browser and go to that website. From there, the onion routing software designs (NOT CREATES!) a "circuit of relays" that will get you from your home to the destination. Here's something to keep in mind. Normal internet routing communications are designed to provide you with the shortest Autonomous System to the destination. Onion routing's goal is anonymity. Here's how it works. Your onion routing software looks in it's constantly-updated table of relays/bridges to determine which onion routers (it needs a MINIMUM of three) it will use for THIS particular communication. Your computer then sends its traffic to the entry node (aka The first onion router). That entry node creates an encrypted https session to the second onion router (aka, the intermediary), then sends it to the intermediary. (See torproject.org for exact encryption methods) The intermediary creates an encrypted https session to the next onion router (let's assume that in this example, the next one is the EXIT NODE - aka last onion router in the circuit) then sends the data there. The exit node at this point sends the data to that website. SO WHAT WAS ACHIEVED?? Nobody in the entire circuit KNOWS THE PATH of the entire circuit because they only know what came directly before it and what comes directly after it! The entry node (first onion router) only knows the IP of the originating computer and the IP of the next onion router. The intermediary node only knows the IP of the originating entry node and the IP of the next onion router (in this case, the EXIT NODE). The exit node only knows the IP of the intermediary node and the destination IP address. This all succeeds because the information is encrypted/encapsulated in "layers", such as the layers of an onion. Hence, onion routing. Ok, now onto your question. Your question was, "isn't it an issue if we look at the routing table of a tor node to get the previous/next one of a specific client's circuit and then watch the routing table of the previous next router ... till we reach the client or the server ?". Answer: It is not an issue because the "circuit" is pseudo random and changed frequently, so it's mathematically not possible to guess which onion routers will be in play for the next circuit without somehow tampering with the process. Once this circuit is complete, your next circuit could be a set of any other pseudo-random onion routers. BUT!! For argument's sake, let's go ahead and say the circuit never changed. Realistically, what would have to be done is this. You watch the traffic leaving your computer and notice where the traffic is going and write down that IP address. You then need to discover where that IP address is physically in the world, then contact that person/business so you can go inspect their onion router. Let's say they agree and tell you the onion router is in India - come take a look. You go there, or remote to it, and tell yourself, "Ok, I know that if I do a SHOW IP ROUTE I can see the route table, but this is a Windows machine" (or Linux, I suppose - but Windows in this example). Are you sunk? Not if you got to that Windows machine in time before the netstat table entry expires. So you drop to a command prompt and to a NETSTAT -a and a list of "TCP connections" (not routes) appear and show what you're connected to under the Foreign Address column. So now that you're staring at a screen filled with TCP connections (assuming you didn't send traffic using UDP, because if you did then they won't list here because UDP is connectionless) you realize that you have no idea which one of these connections goes to the "intermediary node" because that information was encrypted and encapsulated (See torproject.org for details on that). So are you sunk? Remember, an onion router only knows where it DIRECTLY came from, and where it's DIRECTLY going. The entry node knows the originating IP, and in the tenth of a second or less it knew where the next onion router was. But because it processes SO MANY requests like this and they expire quickly, there's too many to choose from and now we're talking exponential mathematics to take all of the results and do the same thing on those. But for argument's sake, let's say that nobody was using the entire onion-routing network during that time except you and the netstat table only showed ONE connection - and that connection was to your next onion router! Ok, contact them, fly there or remote onto it if you can speak their language (before the netstat table expires) and do the same thing until you get to the exit node. On the exit node, you find the IP of the destination. Did you finally do it!!?? Well, that depends on what your goal was. If your goal was to know the source IP, the path it took for THAT connection, and know the destination IP, then given all of these circumstances, you have found that information for that one connection stream. But if your goal was to KNOW what conversation took place, are you sunk? Let's go a step further and say that a packet capture was running on all of these onion routers while this communication took place and you now have access to all of them!!! Now what do you have!!?? You have all of the encrypted traffic that went between the originating pc and that website because all of that was encrypted on the application layer when they typed in HTTPS. You are now the proud owner of multiple packet captures filled with PKI encrypted data. It's at this point, you're sunk. I hope this information was useful!
s3://commoncrawl/crawl-data/CC-MAIN-2019-30/segments/1563195524972.66/warc/CC-MAIN-20190716221441-20190717003441-00138.warc.gz
CC-MAIN-2019-30
6,602
4